Filter Configuration Command Reference

Command Hierarchies

IPv4 Filter Policy Commands

config
— filter
ip-filter filter-id [create]
[no] ip-filter {filter-id | filter-name}
default-action {drop | forward}
description description-string
embed-filter filter-id [offset offset] [{active | inactive}]
— no embed-filter filter-id
embed-filter flowspec [router {router-instance | service-name vprn-service-name}] [offset offset] [{active | inactive}]
— no embed-filter flowspec
embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}] [offset offset] [{active | inactive}]
— no embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}]
embed-filter vsd vsd-filter-id [offset offset] [{active|inactive}]
— no embed-filter vsd vsd-filter-id
entry entry-id [create]
— no entry entry-id
[no] action [secondary]
drop
drop packet-length {{lt | eq | gt} packet-length-value | range packet-length-value packet-length-value}
drop ttl {{lt | gt | eq} ttl-value | range ttl-value ttl-value}
remark dscp dscp-name
forward esi service-id esi service-id vpls-service-id
forward esi sf-ip vas-interface router esi sf-ip ip-address vas-interface interface-name router {router-instance | service-name service-name}
forward lsp lsp-name
forward next-hop [indirect] ip-address
forward next-hop [indirect] ip-address router {router-instance | service-name service-name}
forward redirect-policy policy-name
forward router {router-instance | service-name service-name}
forward sap sap-id
forward sdp sdp-id:vc-id
http-redirect rdr-url-string [allow-radius-override]
nat [nat-policy nat-policy-name]
rate-limit value
remark dscp dscp-name
description description-string
egress-pbr {default-load-balancing | l4-load-balancing}
— no egress-pbr
[no] filter-sample
log log-id
— no log
match [protocol protocol-id]
— no match
dscp dscp-name
— no dscp
dst-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
— no dst-ip
dst-port {lt | gt | eq} dst-port-number
dst-port port-list port-list-name
dst-port range dst-port-number dst-port-number
— no dst-port
fragment {true | false}
— no fragment
icmp-code icmp-code
— no icmp-code
icmp-type icmp-type
— no icmp-type
ip-option ip-option-value [ip-option-mask]
— no ip-option
multiple-option {true | false}
option-present {true | false}
port {lt | gt | eq} port-number
port port-list port-list-name
port range port-number port-number
— no port
src-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
— no src-ip
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
— no src-port
src-route-option {true | false}
tcp-ack {true | false}
— no tcp-ack
tcp-syn {true | false}
— no tcp-syn
pbr-down-action-override {drop | forward | filter-default-action}
sticky-dest hold-time-up
sticky-dest no-hold-time-up
filter-name filter-name
renum old-entry-id new-entry-id
scope {exclusive | template | embedded | system}
— no scope
shared-radius-filter-wmark low low-watermark high high-watermark
sub-insert-credit-control start-entry entry-id count count
sub-insert-radius start-entry entry-id count count
sub-insert-shared-pccrule start-entry entry-id count count
sub-insert-shared-radius start-entry entry-id count count
sub-insert-wmark low low-watermark high high-watermark

IPv6 Filter Policy Commands

These commands do not apply to the 7450 ESS (except in mixed mode).

config
— filter
ipv6-filter filter-id [create]
[no] ipv6-filter {filter-id | filter-name}
default-action {drop | forward}
description description-string
embed-filter filter-id [offset offset] [{active | inactive}]
— no embed-filter filter-id
embed-filter flowspec [router {router-instance | service-name vprn-service-name}] [offset offset] [{active | inactive}]
— no embed-filter flowspec
embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}] [offset offset] [{active | inactive}]
— no embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}]
embed-filter vsd vsd-filter-id [offset value] [{active | inactive}]
— no embed-filter vsd vsd-filter-id
entry entry-id [create]
— no entry entry-id
[no] action [secondary]
drop
drop hop-limit {{lt | eq | gt} hop-limit-value | range hop-limit-value hop-limit-value}
drop payload-length {{lt | eq | gt} payload-length-value | range payload-length-value payload-length-value}
remark dscp dscp-name
forward esi service-id esi service-id vpls-service-id
forward esi sf-ip vas-interface router esi sf-ip ipv6-address vas-interface interface-name router {router-instance | service-name service-name}
forward lsp lsp-name
forward next-hop [indirect] ipv6-address
forward next-hop [indirect] ipv6-address router {router-instance | service-name service-name}
forward redirect-policy policy-name
forward router {router-instance | service-name service-name}
forward sap sap-id
forward sdp sdp-id:vc-id
http-redirect rdr-url-string [allow-radius-override]
nat nat-type nat-type [nat-policy nat-policy-name]
rate-limit value
remark dscp dscp-name
description description-string
egress-pbr {default-load-balancing | l4-load-balancing}
— no egress-pbr
[no] filter-sample
log log-id
— no log
match [next-header next-header]
— no match
ah-ext-hdr {true | false}
— no ah-ext-hdr
dscp dscp-name
— no dscp
dst-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
— no dst-ip
dst-port {lt | gt | eq} dst-port-number
dst-port port-list port-list-name
dst-port range dst-port-number dst-port-number
— no dst-port
esp-ext-hdr {true | false}
flow-label flow-label [mask]
— no flow-label
fragment {true | false | first-only | non-first-only}
— no fragment
hop-by-hop-opt {true | false}
icmp-code icmp-code
— no icmp-code
icmp-type icmp-type
— no icmp-type
port {lt | gt | eq} port-number
port port-list port-list-name
port range port-number port-number
— no port
routing-type0 {true | false}
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
— no src-ip
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
— no src-port
tcp-ack {true | false}
— no tcp-ack
tcp-syn {true | false}
— no tcp-syn
pbr-down-action-override {drop | forward | filter-default-action}
sticky-dest hold-time-up
sticky-dest no-hold-time-up
filter-name filter-name
renum old-entry-id new-entry-id
scope {exclusive | template | embedded | system}
— no scope
shared-radius-filter-wmark low low-watermark high high-watermark
sub-insert-credit-control start-entry entry-id count count
sub-insert-radius start-entry entry-id count count
sub-insert-shared-pccrule start-entry entry-id count count
sub-insert-shared-radius start-entry entry-id count count
sub-insert-wmark low low-watermark high high-watermark

MAC Filter Commands

config
— filter
mac-filter filter-id [create]
[no] mac-filter {filter-id | filter-name}
default-action {drop | forward}
description description-string
embed-filter vsd vsd-filter-id [offset value] [{active | inactive}]
— no embed-filter vsd vsd-filter-id
entry entry-id [create]
— no entry entry-id
[no] action [secondary]
drop
forward esi service-id esi vpls-service-id
forward sap sap-id
forward sdp sdp-id:vc-id
rate-limit value
description description-string
log log-id
— no log
match [frame-type {802dot3 | 802dot2-llc | 802dot2-snap | ethernet_II}]
— no match
dot1p dot1p-value [dot1p-mask]
— no dot1p
dsap dsap-value [dsap-mask]
— no dsap
dst-mac ieee-address [ieee-address-mask]
— no dst-mac
etype 0x0600..0xffff
— no etype
inner-tag value [vid-mask]
— no inner-tag
isid value [to higher-value]
— no isid
outer-tag value [vid-mask]
— no outer-tag
snap-oui {zero | non-zero}
— no snap-oui
snap-pid snap-pid
— no snap-pid
ssap ssap-value [ssap-mask]
— no ssap
src-mac ieee-address [ieee-address-mask]
— no src-mac
pbr-down-action-override {drop | forward | filter-default-action}
sticky-dest hold-time-up
sticky-dest no-hold-time-up
filter-name filter-name
renum old-entry-id new-entry-id
scope {exclusive | template}
— no scope
type filter-type

System Filter Policy Commands

config
— filter
[no] ip ip-filter-id
[no] ipv6 ipv6-filter-id

Redirect Policy Configuration Commands

config
— filter
redirect-policy redirect-policy-name [create]
— no redirect-policy redirect-policy-name
description description-string
destination ip-address [create]
— no destination ip-address
description description-string
[no] ping-test
drop-count consecutive-failures [hold-down seconds]
— no drop-count
interval seconds
— no interval
timeout seconds
— no timeout
priority [priority]
— no priority
[no] shutdown
snmp-test test-name [create]
— no snmp-test test-name
drop-count consecutive-failures [hold-down seconds]
— no drop-count
interval seconds
— no interval
oid oid-string community community-string
— no oid
return-value return-value type return-type [disable | lower-priority priority | raise-priority priority]
no return-value return-value type return-type
timeout seconds
— no timeout
url-test test-name [create]
— no url-test test-name
drop-count consecutive-failures [hold-down seconds]
— no drop-count
interval seconds
— no interval
return-code return-code-1 [return-code-2] [disable | lower-priority priority | raise-priority priority]
— no return-code return-code-1 [return-code-2]
timeout seconds
— no timeout
url url-string [http-version version-string]
— no url
router router-instance
router service-name service-name
— no router
[no] shutdown
sticky-dest hold-time-up
sticky-dest no-hold-time-up

Match Filter List Commands

config
— filter
ip-prefix-list ip-prefix-list-name [create]
— no ip-prefix-list ip-prefix-list-name
[no] apply-path
bgp-peers index group reg-exp neighbor reg-exp
— no bgp-peers index
description description-string
[no] prefix ip-prefix/prefix-length
ipv6-prefix-list ipv6-prefix-list-name [create]
— no ipv6-prefix-list ipv6-prefix-list-name
[no] apply-path
bgp-peers index group reg-exp neighbor reg-exp
— no bgp-peers index
description description-string
[no] prefix ipv6-prefix/prefix-length
port-list port-list-name [create]
— no port-list port-list-name
description description-string
[no] port port-number
[no] port range start end

Log Filter Commands

config
— filter
log log-id [create]
— no log log-id
description description-string
destination {memory num-entries | syslog syslog-id}
[no] shutdown
[no] shutdown
summary-crit dst-addr
summary-crit src-addr
[no] wrap-around

Copy Filter Commands

config
— filter
copy
— ip-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
— mac-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
— ipv6-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]

Command Descriptions

Generic Commands

description

Syntax 
description description-string
no description
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>log
config>filter>mac-filter
config>filter>mac-filter>entry
config>filter>redirect-policy
config>filter>redirect-policy>destination
config>filter>match-list>ip-prefix-list
config>filter>match-list>ipv6-prefix-list
config>filter>match-list>port-list
Description 

This command creates a text description stored in the configuration file for a configuration context.

The no form of the command removes any description string from the context.

Default 

no description

Parameters 
description-string—
The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

Global Filter Commands

ip-filter

Syntax 
ip-filter filter-id [create]
[no] ip-filter {filter-id | filter-name}
Context 
config>filter
Description 

This command creates a configuration context for the specified IPv4 filter policy if it does not exist, and enables the context to configure the specified IPv4 filter policy.

The no form of the command deletes the IPv4 filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.

Default 

No IPv4 filter policy is created by default.

Parameters 
filter-id—
specifies the IPv4 filter policy ID expressed as a decimal integer
Values—
1 to 65535
create—
Keyword required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.
filter-name—
A string of up to 64 characters uniquely identifying this IPv4 filter policy.

ipv6-filter

Syntax 
ipv6-filter filter-id [create]
[no] ipv6-filter {filter-id | filter-name}
Context 
config>filter
Description 

This command creates a configuration context for the specified IPv6 filter policy if it does not exist, and enables the context to configure the specified IPv6 filter policy.

The no form of the command deletes the IPv6 filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.

Default 

No IPv6 filter policy is created by default.

Parameters 
filter-id—
specifies the IPv6 filter policy ID expressed as a decimal integer
Values—
1 to 65535
create—
Keyword required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.
filter-name—
A string of up to 64 characters uniquely identifying this IPv6 filter policy.

system-filter

Syntax 
system-filter
Context 
config>filter
Description 

This command enables the context to activate system filter policies.

Default 

n/a

mac-filter

Syntax 
mac-filter filter-id [create]
[no] mac-filter {filter-id | filter-name}
Context 
config>filter
Description 

This command, creates a configuration context for the specified MAC filter policy if it does not exist, and enables the context to configure the specified MAC filter policy.

The no form of the command deletes the MAC filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.

Default 

No MAC filter policy is created by default.

Parameters 
filter-id—
specifies the MAC filter policy ID expressed as a decimal integer
Values—
1 to 65535
create—
Keyword required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.
filter-name—
A string of up to 64 characters uniquely identifying this MAC filter policy.

redirect-policy

Syntax 
redirect-policy redirect-policy-name [create]
no redirect-policy redirect-policy-name
Context 
config>filter
Description 

This command, creates a configuration context for the specified redirect policy if it does not exist, and enables the context to configure the redirect policy.

The no form of the command removes the redirect policy from the filter configuration only if the policy is not referenced in a filter and the filter is not in use (applied to a service or network interface).

Default 

No redirect policy is created by default.

Parameters 
redirect-policy-name—
specifies the redirect policy name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. There is no limit to the number of redirect policies that can be configured.
create—
Keyword required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

log

Syntax 
log log-id [create]
no log log-id
Context 
config>filter
Description 

This command, creates a configuration context for the specified filter log if it does not exist, and enables the context to configure the specified filter log.

The no form of the command deletes the filter log. The log cannot be deleted if there are filter entries configured to write to the log. All filter entry logging associations need to be removed before the log can be deleted.

Default 

log 101

Special Cases 
Filter log 101—
Filter log 101 is the default log and is automatically created by the system. Filter log 101 is always a memory filter log and cannot be changed to a Syslog filter log. The log size defaults to 1000 entries, the filter log description is set to "Default filter log". The number of entries and wrap-around behavior can be modified.
Parameters 
log-id—
specifies the filter log ID expressed as a decimal integer
Values—
101 to 199
create—
Keyword required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

Filter Log Commands

destination

Syntax 
destination memory num-entries
destination syslog syslog-id
no destination
Context 
config>filter>log
Description 

This command configures the destination for filter log entries for the filter log ID.

Filter logs can be sent to either memory (memory) or to an existing Syslog server definition (syslog).

If the filter log destination is memory, the maximum number of entries in the log must be specified.

The no form of the command deletes the filter log association.

Default 

destination memory 1000

Parameters 
memory num-entries
specifies the destination of the filter log ID is a memory log. The num-entries value is the maximum number of entries in the filter log expressed as a decimal integer.
Values—
10 to 50000
syslog syslog-id
specifies the destination of the filter log ID is a Syslog server. The syslog-id parameter is the number of the Syslog server definition.
Values—
1 to 10

shutdown

Syntax 
[no] shutdown
Context 
config>filter>log
config>filter>log>summary
Description 

Administratively enables/disables (AdminUp/AdminDown) an entity. Downing an entity does not change, reset or remove any configuration settings or statistics. Many objects must be shutdown before they may be deleted.

The shutdown command administratively downs an entity. Administratively downing an entity changes the operational state of the entity to down.

Unlike other commands and parameters where the default state will not be indicated in the configuration file, shutdown and no shutdown are always indicated in system generated configuration files.

The no form of the command puts an entity into the administratively enabled state.

Default 

no shutdown for config>filter>log and shutdown for config>filter>log>summary

summary

Syntax 
summary
Context 
config>filter>log
Description 

This command enables the context to configure log summarization. These settings will only be taken into account when syslog is the log destination.

Default 

n/a

summary-crit

Syntax 
summary-crit dst-addr
summary-crit src-addr
no summary-crit
Context 
config>filter>log>summary
Description 

This command defines the key of the index of the minitable. If key information is changed while summary is administratively enabled (no shutdown), the filter summary minitable is flushed and recreated with different key information. Log packets received during the reconfiguration time will be handled as if summary was not active.

The no form of the command reverts to the default parameter.

Default 

summary-crit src-addr

Parameters 
dst-addr—
specifies that received log packets are summarized based on the destination IPv4, IPv6, or MAC address
src-addr—
specifies that received log packets are summarized based on the source IPv4, IPv6 or MAC address

wrap-around

Syntax 
[no] wrap-around
Context 
config>filter>log
Description 

This command configures a memory filter log to log until full or to store the most recent log entries (circular buffer).

Specifying wrap-around configures the memory filter log to store the most recent filter log entries (circular buffer). When the log is full, the oldest filter log entries are overwritten with new entries.

The no form of the command configures the memory filter log to accept filter log entries until full. When the memory filter log is full, filter logging for the log filter ID ceases.

Default 

wrap-around

ACL Filter Policy Commands

default-action

Syntax 
default-action {drop | forward}
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command defines the default action to be applied to packets not matching any entry in this ACL filter policy or to packets for that match a PBF/PBR filter entry for which the PBF/PBR target is down and pbr-down-action-override per-entry is set to filter-default-action.

Default 

default-action drop

Parameters 
drop—
default action is to drop a packet
forward—
default action is to forward a packet

chain-to-system-filter

Syntax 
[no] chain-to-system-filter
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command chains this filter to a currently active system filter. When the filter is chained to the system filter, the system filter rules are executed first, and the filter rules are only evaluated if no match on the system filter was found.

The no form of the command detaches this filter from the system filter.

Operational note:

If no system filter is currently active, the command has no effect.

Default 

no chain-to-system-filter

ip

Syntax 
[no] ip ip-filter-id
Context 
config>filter>system-filter
Description 

This command activates an IPv4 system filter policy. Once activated, all IPv4 ACL filter policies that chain to the system filter (config>filter>ip-filter>chain-to-system-filter) will automatically execute system filter policy rules first.

The no form of the command deactivates the system filter policy.

Default 

None of the IPv4 system filters is available by default.

Parameters 
ip-filter-id—
an existing IPv4 filter policy with scope system. This parameter can either be expressed as a decimal integer, or as an ASCII string of up to 64 characters.
Values—
1 to 65535 or the filter policy name (filter-name, 64 char max)

ipv6

Syntax 
[no] ipv6 ipv6-filter-id
Context 
config>filter>system-filter
Description 

This command activates an IPv6 system filter policy. Once activated, all IPv6 ACL filter policies that chain to the system filter (config>filter>ipv6-filter>chain-to-system-filter) will automatically execute system filter policy rules first.

The no form of the command deactivates the system filter policy.

Default 

None of the IPv6 system filters are available by default.

Parameters 
ipv6-filter-id—
an existing IPv6 filter policy with scope system. This parameter can either be expressed as a decimal integer, or as an ASCII string of up to 64 characters
Values—
1 to 65535 or the filter policy name (filter-name, 64 char max)

embed-filter

Syntax 
embed-filter filter-id [offset offset] [{active | inactive}]
no embed-filter filter-id
embed-filter flowspec [router {router-instance | service-name vprn-service-name}] [offset value] [{active | inactive}]
no embed-filter flowspec
embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}] [offset offset] [{active | inactive}]
no embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}]
embed-filter vsd vsd-filter-id [offset value] [{active | inactive}]
no embed-filter vsd vsd-filter-id
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command embeds a previously defined IPv4, IPv6, or MAC embedded filter policy or Hybrid OpenFlow switch instance into this exclusive, template or system filter policy at the specified offset value. Rules derived from the BGP flowspec can also be embedded into template filter policies only.

Note:

For MAC filters, embedding is supported for VSD filters or filter entries only.

The embed-filter open-flow ofs-name form of this command enables OpenFlow (OF) in GRT either by embedding the specified OpenFlow switch (OFS) instance with switch-defined-cookie disabled, or by embedding rules with sros-cookie:type “grt-cookie”, value 0 from the specified OFS instance with switch-defined-cookie enabled. The embedding filter can only be deployed in GRT context or be unassigned.

The embed-filter open-flow ofs-name system form of this command enables OF in system filters by embedding rules with sros-cookie:type “system-cookie”, value 0 from the specified OFS instance with switch-defined-cookie enabled. The embedding filter can only be of scope system.

The embed-filter open-flow ofs-name service {service-id | service-name} form of this command enables OF in VPRN/VPLS filters by embedding rules with sros-cookie:type “service-cookie”, value service-id from the specified OFS instance with switch-defined-cookie enabled – per service rules. The embedding filter can only be deployed in the specified VPRN/VPLS service. A single VPLS service can only support OF rules per SAP or per service.

The embed-filter open-flow ofs-name sap sap-id form of this command enables OF in VPLS SAP filters by embedding rules with sros-cookie:type “service-cookie”, value service-id and flow match conditions specifying the sap-id from the specified OFS instance with switch-defined-cookie enabled – per SAP OF rules. The embedding filter must be of type exclusive and can only be deployed on the specified SAP in the context of the specified VPLS service. A single VPLS service can only support OF rules per SAP or per service.

The no embed-filter open-flow ofs-name form of this command removes the OF embedding for the GRT context.

The embed-filter flowspec form of this command enables the embedding of rules derived from BGP flowspec routes into the filter policy that is being configured. The optional router parameter specifies the routing instance source of the BGP flowspec routes; if the parameter is not specifies, the routing instance is derived automatically from the context in which the filter policy is applied. Flowspec rules associated with one routing instance cannot be embedded in a filter applied to an interface of a different routing instance. Also, once flowspec rules associated with one routing instance are embedded into a filter, that filter policy cannot be applied to an interface of a different routing instance.

The no embed-filter flowspec form of this command removes the flowspec filter embedding from this filter policy.

The embed-filter vsd vsd-filter-id command refers to the VSD filter ID encoded _tmnx_vsd_filter-id. The filter is created dynamically and managed exclusively using the Python script, so rules can be inserted and removed in the proper VSD filters. The command is supported with IP, IPv6, and MAC filters. For more information on VSD filter provisioning, automation, and the Python script, refer to the Layer 2 Services and EVPN User Guide.

The no embed-filter vsd vsd-filter-id form of this command removes the VSD filter embedding from this filter policy.

The no embed-filter filter-id form of this command removes the embedding from this filter policy.

Please see the description of embedded filter policies in this guide for further operational details.

Default 

No embedded filter policies are included in a filter policy by default

Parameters 
filter-id—
specifies a previously defined embedded filter policy.
open-flow ofs-name—
specifies the name of the currently configured Hybrid OpenFlow Switch (OFS) instance.

Not including the system, service or sap parameters will specify OF in a GRT instance context by default. This allows embedding of OF rules into filters deployed in GRT instances from OFS with switch-defined-cookie disabled, or embedding rules from OFS with switch-defined-cookie enabled, when the FlowTable cookie encodes sros-cookie:type “grt-cookie”.

vsd vsd-filter-id
creates an embedded filter (filter ID: _tmnx_vsd_filter-id) for population by Nuage VSD
system—
used for OF control of system filters. Allows embedding of OF rules into system filters from OFS with switch-defined-cookie enabled. Only the rules with cookie value encoding “system-cookie” are embedded.
service {service-id | service-name}—
used for OF control of VPRN or VPLS services. Allows embedding of OF rules into a VPRN or VPLS access or network filters. Only the rules with cookie value encoding the specified service ID are embedded into the filter. The embedding filter can only be deployed in the context of the specified service.

service-id — specifies an existing VPRN or VPLS service ID that the embedding filter can be used for

service-name — specifies an existing VPRN or VPLS service name that the embedding filter can be used for

sap sap-id—
used for OF control of VPLS services when a PortID and VLAN ID match is required. Allows embedding of OF rules with a PortID and VLAN ID match into exclusive VPLS SAP filters. Only the rules with cookie value encoding the VPLS service, and flow table match encoding the specified SAP are embedded into the filter. The embedding filter can only be deployed in the context of the specified SAP.

sap-id — specifies an existing SAP that the embedding filter can be used for

flowspec—
keyword to indicate that rules derived from BGP flowspec routes should be embedded into (or removed from, in case of the no form) the filter.
router-instance—
specifies a router instance
offset —
an embedded filter entry X will have an entry X + offset in the embedding filter
Values—
0 to 65536
Values—
0
active—
specifies that embedded filter entries are to be included in this embedding filter policy and activated on applicable line cards – default if no keyword is specified and omitted in info command (but not info detail), or when saving configuration.
inactive—
specifies that no embedded filter policy entries are to be included in this embedding filter policy. The embedding is configured but will not do anything.

filter-name

Syntax 
filter-name filter-name
no filter-name
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command configures filter-name attribute of a given filter. filter-name, when configured, can be used instead of filter ID to reference the given policy in the CLI.

Default 

no filter-name

Parameters 
filter-name—
a string of up to 64 characters uniquely identifying this filter policy

The following restrictions apply to the filter-name:

– Policy names may not begin with a number (0-9).

– Policy names may not begin with the underscore “_” character (e.g. _myPolicy). Names that start with underscore are reserved for system generated names.

– “fSpec-x” (where x is any number) cannot be used as a user defined filter name.

scope

Syntax 
scope {exclusive | template | embedded | system}
scope {exclusive | template}
no scope
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command configures the filter policy scope as exclusive, template, embedded or system.

The scope of the policy cannot be changed when:

  1. the scope is template and the policy is applied to one or more services or network interfaces
  2. the scope is embedded and the policy is embedded by another policy

Changing the scope to/from system is only allowed when a policy is not active and the policy has no entries configured.

The no form of the command sets the scope of the policy to the default of template.

Default 

scope template

Parameters 
exclusive—
specifies that the policy can only be applied to a single entity. Attempting to assign the policy to a second entity will result in an error message.
template—
specifies that the policy can be applied to multiple entities
embedded—
specifies that the policy cannot be applied directly. The policy defines embedded filter rules, which are embedded by other exclusive/template/system filter policies. The embedded scope is supported for IPv4 and IPv6 filter policies only.
system—
specifies that the policy defines system-wide filter rules. To apply system policy rules, activate system filter and chain exclusive/template ACL filter policy to the system filter. The system scope is supported for IPv4 and IPv6 filter policies only.

shared-radius-filter-wmark

Syntax 
shared-radius-filter-wmark low low-watermark high high-watermark
no shared-radius-filter-wmark
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command configures the low and high watermark for the number of RADIUS shared filters reporting

Default 

no shared-radius-filter-wmark

Parameters 
low low-watermark
specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be raised by the agent
Values—
0 to 8000
high high-watermark
specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be cleared by the agent
Values—
1 to 8000

sub-insert-credit-control

Syntax 
sub-insert-credit-control start-entry entry-id count count
no sub-insert-credit-control
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command inserts point information for credit control for the filter.

The no form of the command reverts to the default.

Default 

no sub-insert-credit-control

Parameters 
entry entry-id
identifies a filter on this system
Values—
1 to 65535
count count
specifies the count
Values—
1 to 65535

sub-insert-radius

Syntax 
sub-insert-radius start-entry entry-id count count
no sub-insert-radius
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command inserts point information for RADIUS for the filter.

The no form of the command reverts to the default.

Default 

no sub-insert-radius

Parameters 
entry entry-id
specifies at what place the filter entries received from RADIUS will be inserted in the filter
Values—
1 to 65535
count count
specifies the count
Values—
1 to 65535

sub-insert-shared-pccrule

Syntax 
sub-insert-shared-pccrule start-entry entry-id count count
no sub-insert-shared-pccrule
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command defines the range of filter and QoS policy entries that are reserved for shared entries received in Flow-Information AVP via Gx interface (PCC rules – Policy and Charging Control). The no form of this command disables the insertion, which will result in a failure of PCC rule installation.

Default 

no sub-insert-shared-pccrule

Parameters 
start-entry entry-id
specifies the lowest entry in the range
Values—
1 to 65535
count count—
specifies the number of entries in the range
Values—
1 to 65535

sub-insert-shared-radius

Syntax 
sub-insert-shared-radius start-entry entry-id count count
no sub-insert-shared-radius
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command configures the insert point for shared host rules from RADIUS.

Default 

no sub-insert-shared-radius

Parameters 
entry entry-id
identifies a filter on this system
Values—
1 to 65535
count count
specifies the count
Values—
1 to 65535

sub-insert-wmark

Syntax 
sub-insert-wmark low low-watermark high high-watermark
no sub-insert-wmark
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command configures the low and high watermark percentage for inserted filter entry usage reporting.

The no form of the command reverts to the default.

Default 

sub-insert-wmark low 90 high 95

Parameters 
low low-watermark—
specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be cleared by the agent
Values—
0 to 100
high high-watermark
specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be raised by the agent
Values—
0 to 100

type

Syntax 
type filter-type
Context 
config>filter>mac-filter
Description 

This command configures the MAC Filter Policy sub-type as being either normal, ISID or VID.

Default 

type normal

Parameters 
filter-type—
specifies which type of entry this MAC filter can contain
Values—
normal — Regular match criteria are allowed; ISID or VID filter match criteria not allowed. isid — Only ISID match criteria are allowed. vid — Only VID match criteria are allowed on ethernet_II frame types.

General Filter Entry Commands

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command creates or edits an IPv4, IPv6, or MAC filter entry. Multiple entries can be created using unique entry-id numbers within the filter. Entries must be sequenced from most to least explicit.

An entry may not have any match criteria defined (in which case everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword will be considered incomplete and hence will be rendered inactive.

The no form of the command removes the specified entry from the filter. Entries removed from the filter are immediately removed from all services or network ports where that filter is applied.

Default 

No entry is created by default for any filter policy.

Parameters 
entry-id—
uniquely identifies a match criteria and the corresponding action. It is recommended that multiple entries be given entry-id in staggered increments. This allows users to insert a new entry in an existing policy without requiring to renumber all the existing entries. The parameter is expressed as a decimal integer.
Values—
1 to 65535
create—
keyword required to create the configuration context. Once the context is created, the user can enable the context with or without the create keyword.

action

Syntax 
[no] action [secondary]
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
Description 

This command enters the context to configure a primary (no option specified) or secondary (secondary option specified) action to be performed on packets matching this filter entry. An ACL filter entry remains inactive (is not programmed in hardware) until a specific action is configured for that entry.

A primary action supports any filter entry action, a secondary action is used for redundancy and defines a redundant L3 PBR action for an L3 PBR primary action or a redundant L2 PBF action for a L2 PBF primary action.

The no form of this command removes the specific action configured in the context of the action command. The primary action cannot be removed if a secondary action exists.

Default 

no action

Parameters 
secondary
secondary action to be performed on packets matching this filter entry. A secondary action can only be configured if a primary action is configured.

log

Syntax 
log log-id
no log
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
Description 

This command associates a filter log to the current filter policy entry and therefore enables logging for that filter entry.

The filter log must exist before a filter entry can be enabled to use the filter log.

The no form of the command disables logging for the filter entry.

Default 

no log

Parameters 
log-id—
the filter log ID expressed as a decimal integer
Values—
101 to 199

pbr-down-action-override

Syntax 
pbr-down-action-override {drop | forward | filter-default-action}
no pbr-down-action-override
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
Description 

This command allows overriding the default action that is applied for entries with PBR/PBF action defined, when the PBR/PBF target is down.

The no form of the command preserves default behavior when PBR/PBF target is down.

Default 

no pbr-down-action-override

Parameters 
drop—
packets matching the entry will be dropped if PBR/PBF target is down
forward—
packets matching the entry will be forwarded if PBR/PBF target is down
filter-default-action—
packets matching the entry will be processed as per default-action configuration for this filter if PBR/PBF target is down

sticky-dest

Syntax 
sticky-dest hold-time-up
sticky-dest no-hold-time-up
no sticky-dest
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
Description 

This command configures sticky destination behavior for redundant PBR/PBF actions. Configuring sticky destination has an effect on PBR/PBF actions whether or not a secondary action is configured.

The hold-time-up parameter allows the operator to delay programming of a PBR/PBF action for a specified amount of time. The timer is only started when transitioning from all configured targets being down (that is, the primary target if no secondary target is configured, or both the primary and secondary targets when both are configured) to at least one target being up.

When the timer expires, the primary PBR/PBF action is programmed if its target is up. If the primary PBR/PBF target is down and a secondary PBR/PBF action has been configured and its target is up, then this secondary PBR/PBF action is programmed. In all other cases, no specific programming occurs when the timer expires.

When sticky destination is configured and the secondary PBR/PBF target is up and its associated action is programmed, it is not automatically replaced by the primary PBR/PBF action when its target transitions from down to up. In this situation, programming the primary PBR/PBF action can be forced using the activate-primary-action tools command.

Changing the value of the timer while the timer is running takes effect immediately (that is, the timer is restarted immediately using the new value).

The no form of the command disables sticky destination behavior.

Default 

no sticky-dest

Parameters 
hold-time-up
initial delay in seconds. Zero is equivalent to no-hold-time-up (no delay).
Values—
0 to 65535 seconds

IP (v4/v6) Filter Entry Commands

action

Syntax 
drop
drop packet-length {{lt | eq | gt} packet-length-value | range packet-length-value packet-length-value}
drop ttl {{lt | eq | gt} ttl-value | range ttl-value ttl-value}
forward
forward esi esi service-id vpls-service-id
forward esi esi sf-ip ip-address vas-interface interface-name router {router-instance | service-name service-name}
forward lsp lsp-name
forward next-hop [indirect] ip-address
forward next-hop [indirect] ip-address router {router-instance | service-name service-name}
forward next-hop interface ip-int-name
forward redirect-policy policy-name
forward router {router-instance | service-name service-name}
forward sap sap-id
forward sdp sdp-id:vc-id
gtp-local-breakout
http-redirect rdr-url-string [allow-radius-override]
nat [nat-policy nat-policy-name]
rate-limit value
reassemble
remark dscp dscp-name
tcp-mss-adjust
Context 
config>filter>ip-filter>entry
config>filter>ip-filter>entry>action
config>filter>ip-filter>entry>action>extended-action
Description 

This command (under the config>filter>ip-filter>entry context) sets the context for specific action commands to be performed (under the config>filter>ip-filter>entry>action context) on packets matching this filter entry.

The following commands are available under the config>filter>ip-filter>entry>action context:

  1. drop
    A packet matching the entry will be dropped.
  2. drop packet-length
    A packet matching the entry will be dropped only if “Total Length” field in the packet’s IPv4 header meets the configured condition.
  3. drop ttl
    A packet matching the entry will be dropped only if “Time-to-live” field in the packet’s IPv4 header meets the configured condition.
  4. forward
    A packet matching the entry will be forwarded using regular routing.
  5. forward esi service-id
    A packet matching the entry will be forwarded to ESI identified first appliance in Nuage service chain using EVPN-resolved VXLAN tunnel in the specified VPLS service.
  6. forward esi sf-ip vas-interface router
    A packet matching the entry will be forwarded to ESI/SF-IP identified first appliance in Nuage service chain using EVPN-resolved VXLAN tunnel over the configured VAS interface in the specified VPRN service.
  7. forward lsp
    A packet matching the entry will be forwarded using the specified lsp.
  8. forward next-hop
    A packet matching the entry will be forwarded in the routing context of the incoming interface using direct or indirect IPv4 address in the routing lookup.
  9. forward next-hop router
    A packet matching the entry will be forwarded in the configured routing context using direct or indirect IPv4 address in the routing lookup.
  10. forward next-hop interface
    A packet matching the entry will be forwarded using the configured local interface.
  11. forward redirect-policy
    A packet matching the entry will be forwarded using forward next-hop or forward next-hop router and the IP address of destination selected by the configured redirect policy. If no destination is selected, packets are subject to action forward.
  12. forward router
    A packet matching the entry will be routed in the configured routing instance and not in the incoming interface routing instance.
  13. forward sap
    A packet matching the entry will be forwarded using the configured SAP.
  14. forward sdp
    A packet matching the entry will be forwarded using the configured SDP.
  15. gtp-local-breakout
    A packet matching the entry will be forwarded to NAT instead of being GTP tunneled to mobile operator’s PGW or GGSN.
  16. http-redirect
    An HTTP GET packet matching an entry is forwarded to CPM for HTTP captive portal processing; when configured with allow-radius-override, the system overwrites the configured rdr-url-string with the URL returned from Radius.
  17. nat
    A packet matching the entry will be forwarded to NAT.
  18. rate-limit
    Enables ACL rate limiting for packets matching the entry of this ACL filter policy. Rate limiters are configured by default with MBS = CBS = 10-ms-of-the-rate and high-prio-only = 0.
  19. reassemble
    A packet matching the entry will be forwarded to the reassembly function.
  20. remark
    Enables and configures the remarking of the DiffServ Code Points of packets matching the criteria of the IPv4 filter policy entry. Packets are remarked regardless of QoS-based in-profile or out-of-profile classification. QoS-based DSCP remarking is overridden.
  21. tcp-mss-adjust
    Configures the Maximum Segment Size (MSS) adjustment for TCP packets. A packet matching the entry will be forwarded to the ISA BB.
Default 

No specific action is configured by default.

Parameters 
dscp-name —
specifies the DSCP value to write
Values—
be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63
esi —
specifies a 10-byte Ethernet Segment Identifier
ip-address —
specifies the IPv4 address of a direct or indirect next hop to which to forward matching packets
ip-int-name —
specifies the name of an egress IP interface where matching packets will be forwarded from. This parameter is only valid for unnumbered point-to-point interfaces. If the string contains special characters (such as #, $, spaces), the entire string must be enclosed within double quotes.
interface-name —
specifies the (maximum 32-character) name of an egress R-VPLS IP interface used to forward the packets using ESI redirect for VPRN/IES service
lsp-name —
specifies an existing RSVP-TE or MPLS-TP LSP that supports LSP redirect
nat-policy-name —
specifies the NAT policy to be used in NAT redirect
policy-name —
specifies an IPv4 redirect policy configured in the config>filter>redirect-policy context
sap-id —
specifies an existing VPLS Ethernet SAP
sdp-id:vc-id —
specifies an existing VPLS SDP
packet-length-value —
specifies integer value to be compared against “Total Length” field in the packet’s IPv4 header
rdr-url-string —
specifies the HTTP web address that will be sent to the user’s browser
router-instance —
specifies “Base” or an existing VPRN service ID
service-name —
specifies an existing VPRN service name
ttl-value —
Specifies an integer value to be compared against “Time-to-live” field in the packet’s IPv4 header
value—
specifies the rate-limit value in Kb per second. A rate of 0 results in all traffic being dropped. A rate of max results in all traffic being forwarded.
Values—
0 to 2000000000 | max
vpls-service-id —
specifies an existing VPLS service ID or service name
lt —
specifies “less than”. lt cannot be used with the lowest possible numerical value for the parameter
eq —
specifies “equal to”. gt cannot be used with the highest possible numerical value for the parameter.
gt —
specifies “greater than”
range —
specifies an inclusive range. When range is used, the start of the range (first value entered) must be smaller than the end of the range (second value entered).

action

Syntax 
drop
drop hop-limit {{lt | eq | gt} hop-limit-value | range hop-limit-value hop-limit-value}
drop payload-length {{lt | eq | gt} payload-length-value | range payload-length-value payload-length-value}
forward
forward esi esi service-id vpls-service-id
forward esi esi sf-ip ipv6-address vas-interface interface-name router {router-instance | service-name service-name}
forward lsp lsp-name
forward next-hop [indirect] ipv6-address
forward next-hop [indirect] ipv6-address router {router-instance | service-name service-name}
forward redirect-policy policy-name
forward router {router-instance | service-name service-name}
forward sap sap-id
forward sdp sdp-id:vc-id
http-redirect rdr-url-string [allow-radius-override]
nat nat-type nat-type [nat-policy nat-policy-name]
rate-limit value
remark dscp dscp-name
tcp-mss-adjust
Context 
config>filter>ipv6-filter>entry
config>filter>ipv6-filter>entry>action
config>filter>ipv6-filter>entry>action>extended-action
Description 

This command (under the config>filter>ipv6-filter>entry context) sets the context for specific action commands to be performed (under the config>filter>ipv6-filter>entry>action context) on packets matching this filter entry.

The following commands are available in the config>filter>ipv6-filter>entry>action context:

  1. drop
    A packet matching the entry will be dropped.
  2. drop hop-limit
    A packet matching the entry will be dropped only if the “Hop Limit” field in the packet’s IPv6 header matches the configured condition.
  3. drop payload-length
    A packet matching the entry will be dropped only if the “Payload Length” field in the packet’s IPv6 header matches the configured condition.
  4. forward
    A packet matching the entry will be forwarded using regular routing.
  5. forward esi service-id
    A packet matching the entry will be forwarded to the ESI identified as the first appliance in the Nuage service chain using an EVPN-resolved VXLAN tunnel in the specified VPLS service.
  6. forward esi sf-ip vas-interface router
    A packet matching the entry will be forwarded to ESI/SF-IP identified as the first appliance in Nuage service chain using EVPN-resolved VXLAN tunnel over the configured VAS interface in the specified VPRN service.
  7. forward lsp
    A packet matching the entry will be forwarded using the specified LSP.
  8. forward next-hop
    A packet matching the entry will be forwarded in the routing context of the incoming interface using a direct or indirect IPv6 address in the routing lookup.
  9. forward next-hop
    forward next-hop router
    A packet matching the entry will be forwarded in the configured routing context using a direct or indirect IPv6 address in the routing lookup.
  10. forward redirect-policy
    A packet matching the entry will be forwarded using forward next-hop or forward next-hop router and the IP address of the destination selected by the configured redirect policy. If no destination is selected, packets are subject to action forward.
  11. forward router
    A packet matching the entry will be routed in the configured routing instance and not in the incoming interface routing instance.
  12. forward sap
    A packet matching the entry will be forwarded using the configured SAP.
  13. forward sdp
    A packet matching the entry will be forwarded using the configured SDP.
  14. http-redirect
    An HTTP GET packet matching an entry is forwarded to the CPM for HTTP captive portal processing. When allow-radius-override is configured, the system overwrites the configured redirect-url-string with the URL returned from RADIUS.
  15. nat
    A packet matching the entry will be forwarded to NAT.
  16. rate-limit
    Enables ACL rate limiting for packets matching the entry of this ACL filter policy. Rate limiters are configured by default with MBS = CBS = 10-ms-of-the-rate and high-prio-only = 0.
  17. remark
    Enables and configures the remarking of the DiffServ Code Points of packets matching the criteria of the IPv6 filter policy entry. Packets are remarked regardless of QoS-based in-profile or out-of-profile classification. QoS-based DSCP remarking is overridden.
  18. tcp-mss-adjust
    Configures the Maximum Segment Size (MSS) adjustment for TCP packets. A packet matching the entry will be forwarded to the ISA BB.
Default 

No specific action is configured by default.

Parameters 
dscp-name —
specifies the DSCP value to write
Values—
be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63
esi —
specifies a 10-byte Ethernet Segment Identifier
hop-limit-value—
specifies an integer value to be compared against the “Hop Limit” field in the packet’s IPv6 header
Values—
0 to 255
interface-name —
specifies the name of an egress R-VPLS IP interface used to forward the packets using ESI redirect for VPRN/IES service
ipv6-address —
specifies the IPv6 address of a direct or indirect next hop to which to forward matching packets
lsp-name —
specifies an existing RSVP-TE or MPLS-TP LSP that supports LSP redirect
nat-policy-name —
specifies the NAT policy to be used in NAT redirect
nat-type —
specifies the nat-type to be either dslite or nat64
policy-name —
specifies an IPv6 redirect policy configured in the config>filter>redirect-policy context
sap-id —
specifies an existing VPLS Ethernet SAP
sdp-id:vc-id —
specifies an existing VPLS SDP
payload-length-value —
specifies an integer value to be compared against the “Payload Length” field in the packet’s IPv6 header
rdr-url-string —
specifies the HTTP web address that will be sent to the user’s browser
router-instance —
specifies “Base” or an existing VPRN service ID
service-name —
specifies an existing VPRN service name
value—
specifies the rate-limit value in Kbits per second. A rate of 0 results in all traffic being dropped. A rate of max results in all traffic being forwarded.
Values—
0 to 2000000000 | max
lt —
specifies “less than”. lt cannot be used with the lowest possible numerical value for the parameter.
eq —
specifies “equal to”
gt —
specifies “greater than”. gt cannot be used with the highest possible numerical value for the parameter.
range —
specifies an inclusive range. When range is used, the start of the range (first value entered) must be smaller than the end of the range (second value entered).

extended-action

Syntax 
[no] extended-action
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command enables the context to configure an extended action for a filter entry's PBR action (configured under config>filter>ip-filter>entry>action and config>filter>ipv6-filter>entry>action context). The extended action is executed in addition to the configured PBR action.

The no version of the command removes the extended action.

Default 

No extended action is configured by default.

remark

Syntax 
remark dscp dscp-name
Context 
config>filter>ip-filter>entry>action>extended-action
config>filter>ipv6-filter>entry>action>extended-action
Description 

Enables and configures the remarking of the DiffServ Code Points of packets matching the criteria of the IPv4/IPv6 filter policy entry, in conjunction with a PBR action. Packets are remarked regardless of QoS-based in-profile or out-of-profile classification. QoS-based DSCP remarking is overridden. If the status of the PBR target is tracked and it is down, the extended action will not be executed; otherwise, the extended action will be performed.

Default 

By default DSCP remarking is not configured.

Parameters 
dscp-name—
specifies the DSCP value to write
Values—
be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63

egress-pbr

Syntax 
egress-pbr {default-load-balancing | l4-load-balancing}
no egress-pbr
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
Description 

This command specifies that the configured PBR action is applicable to egress processing. The command should only be enabled in ACL policies used by residential subscribers. Enabling egress-pbr on filters not deployed for residential subscribers is not blocked but may lead to unexpected behavior and thus should be avoided.

The no form of this command removes the egress-pbr designation of the filter entry's action.

Default 

no egress-pbr

Parameters 
default-load-balancing
sets load-balancing to the default (hash based on SA/DA of the packet)
l4-load-balancing
includes TCP/UDP port (if available) in the hash

filter-sample

Syntax 
[no] filter-sample
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
Description 

This command enables cflowd sampling for packets matching this filter entry.

If the cflowd is either not enabled or set to cflowd interface mode, this command is ignored.

The no form disables the cflowd sampling using this filter entry.

Default 

no filter-sample

interface-disable-sample

Syntax 
[no] interface-disable-sample
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
Description 

This command disables cflowd sampling for packets matching this filter entry, for the IP interface set to cflowd interface mode. This allows the option to not sample specific types of traffic when interface sampling is enabled.

If the cflowd is either not enabled or set to cflowd acl mode, this command is ignored.

The no form of this command enables sampling.

Default 

no interface-disable-sample

match

Syntax 
match [protocol protocol-id]
no match
Context 
config>filter>ip-filter>entry
Description 

This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied the action associated with the match criteria is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry. More precisely, the command can be entered multiple times but this only results in modifying the protocol-id, and does not affect the underlying match criteria configuration.

The no form of the command removes all the match criteria from the filter entry and sets the protocol-id of the match command to none (keyword). As per above, match protocol none is however not equivalent to no match.

Default 

match next-header none

Parameters 
protocol protocol-id
The protocol keyword configures an IP protocol to be used as an IP filter match criterion. The protocol type such as TCP or UDP is identified by its respective protocol number.
protocol-id—
Configures the decimal value representing the IP protocol to be used as an IP filter match criterion. Well known protocol numbers include ICMP(1), TCP(6), UDP(17).

Default Value: none (keyword)

Values—
0 to 255 in decimal format. Values can also be specified in hexadecimal format, in binary format, or using the following keywords:
none, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
* — udp/tcp wildcard
Table 46:  Protocol ID Descriptions 

Protocol

Protocol ID

Description

icmp

1

Internet Control Message

igmp

2

Internet Group Management

ip

4

IP in IP (encapsulation)

tcp

6

Transmission Control

egp

8

Exterior Gateway Protocol

igp

9

Any private interior gateway (used by Cisco for IGRP)

udp

17

User Datagram

rdp

27

Reliable Data Protocol

ipv6

41

IPv6

ipv6-route

43

Routing Header for IPv6

ipv6-frag

44

Fragment Header for IPv6

idrp

45

Inter-Domain Routing Protocol

rsvp

46

Reservation Protocol

gre

47

General Routing Encapsulation

ipv6-icmp

58

ICMP for IPv6

ipv6-no-nxt

59

No Next Header for IPv6

ipv6-opts

60

Destination Options for IPv6

iso-ip

80

ISO Internet Protocol

eigrp

88

EIGRP

ospf-igp

89

OSPFIGP

ether-ip

97

Ethernet-within-IP Encapsulation

encap

98

Encapsulation Header

pnni

102

PNNI over IP

pim

103

Protocol Independent Multicast

vrrp

112

Virtual Router Redundancy Protocol

l2tp

115

Layer Two Tunneling Protocol

stp

118

Spanning Tree Protocol

ptp

123

Performance Transparency Protocol

isis

124

ISIS over IPv4

crtp

126

Combat Radio Transport Protocol

crudp

127

Combat Radio User Datagram

sctp

132

Stream Control Transmission Protocol

match

Syntax 
match [next-header next-header]
no match
Context 
config>filter>ipv6-filter>entry
Description 

This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied the action associated with the match criteria is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry. More precisely, the command can be entered multiple times but this only results in modifying the next-header, and does not affect the underlying match criteria configuration.

The no form of the command removes all the match criteria from the filter entry and sets the next-header of the match command to none (keyword). As per above, match next-header none is however not equivalent to no match.

Default 

match protocol none

Parameters 
next-header next-header—
specifies the IPv6 next header to match. This parameter is analogous to the protocol parameter used in IPv4 Filter match command.

Default Value: none (keyword)

Values—
[1 to 42 | 45 to 49 | 52 to 59 | 61 to 255] — in decimal format. Values can also be specified in hexadecimal format, in binary format, or using the following keywords:
none, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
* — udp/tcp wildcard

dscp

Syntax 
dscp dscp-name
no dscp
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a DiffServ Code Point (DSCP) name to be used as an IP filter match criterion.

The no form of the command removes the DSCP match criterion.

Default 

no dscp

Parameters 
dscp-name—
configures a DSCP name. The DiffServ code point may only be specified by its name.
Values—
be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63

dst-ip

Syntax 
IPv4: dst-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name]}
no dst-ip
IPv6: dst-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
no dst-ip
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a destination address range to be used as a filter policy match criterion.

To match on the IPv4 or IPv6 destination address, specify the address and its associated mask, e.g., 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 can also be used for IPv4.

The no form of this command removes the destination IPv4 or IPv6 address match criterion.

Default 

no dst-ip

Parameters 
ip-address—
specifies the destination IPv4 address in dotted decimal notation
Values—
a.b.c.d
mask—
specifies the length in bits of the subnet mask
Values—
1 to 32
ipv4-address-mask—
specifies the subnet mask in dotted decimal notation
Values—
a.b.c.d (dotted quad equivalent of mask length)
ip-prefix-list or ipv6-prefix-list prefix-list-name —
specifies to use a list of IP prefixes referred to by prefix-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
ipv6-address —
the IPv6 prefix for the IP match criterion in hex digits
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D
prefix-length —
the IPv6 prefix length for the specified ipv6-address expressed as a decimal integer
Values—
1 to 128
ipv6-address-mask —
eight 16-bit hexadecimal pieces representing bit match criteria
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

dst-port

Syntax 
dst-port {lt | gt | eq} dst-port-number
dst-port port-list port-list-name
dst-port range dst-port-number dst-port-number
no dst-port
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a destination TCP, UDP, or SCTP port number or port range for an IP filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "dst-port eq 0" match criterion, may match non-initial fragments when the destination port value is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the destination port match criterion.

Default 

no dst-port

Parameters 
lt | gt | eq—
specifies the operator to use relative to dst-port-number for specifying the port number match criteria

lt specifies all port numbers less than dst-port-number match.

gt specifies all port numbers greater than dst-port-number match.

eq specifies that dst-port-number must be an exact match.

dst-port-number—
the destination port number to be used as a match criteria expressed as a decimal integer, as well as in hexadecimal or binary format. The following value is for decimal integer format only.
Values—
0 to 65535
port-list port-list-name—
specifies to use a list of ports referred to by port-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
range dst-port-number dst-port-number
specifies inclusive port range between two dst-port-number values

flow-label

Syntax 
flow-label flow-label [mask]
no flow-label
Context 
config>filter>ipv6-filter>entry>match
Description 

This command configures the flow-label and optional mask match condition.

The no form of the command reverts to the default.

Default 

no flow-label

Parameters 
flow-label—
specifies the flow label to be used as a match criterion. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format. The following value shows decimal integer format only.
Values—
0 to 1048575
mask—
specifies the flow label mask value for this policy IPv6 Filter entry. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format. The following value shows decimal integer format only.
Values—
0 to 1048575

fragment

Syntax 
IPv4:
fragment {true | false}
no fragment
IPv6:
fragment {true | false | first-only | non-first-only}
no fragment
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command specifies match criterion for fragmented packets.

The no form of the command removes the match criterion.

Default 

no fragment

Parameters 
true—
specifies to match on all fragmented IP packets
false—
specifies to match on all non-fragmented IP packets
first-only—
Matches if a packet is an initial fragment of a fragmented IPv6 packet
non-first-only—
Matches if a packet is a non-initial fragment of a fragmented IPv6 packet

ah-ext-hdr

Syntax 
ah-ext-hdr {true | false}
no ah-ext-hdr
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of AH Extension Header in the IPv6 filter policy.

The no form of this command ignores AH Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no ah-ext-hdr

Parameters 
true
matches a packet with an AH Extension Header
false —
match a packet without an AH Extension Header

esp-ext-hdr

Syntax 
esp-ext-hdr {true | false}
no esp-ext-hdr
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of ESP Extension Header in the IPv6 filter policy.

The no form of this command ignores ESP Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no esp-ext-hdr

Parameters 
true
matches a packet with an ESP Extension Header
false —
match a packet without an ESP Extension Header

hop-by-hop-opt

Syntax 
hop-by-hop-opt {true | false}
no hop-by-hop-opt
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of Hop-by-Hop Options Extension Header in the IPv6 filter policy.

The no form of this command ignores Hop-by-Hop Options Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no hop-by-hop-opt

Parameters 
true—
matches a packet with a Hop-by-Hop Options Extension header
false—
matches a packet without a Hop-by-Hop Options Extension header

icmp-code

Syntax 
icmp-code icmp-code
no icmp-code
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

Configures matching on ICMP/ICMPv6 code field in the ICMP/ICMPv6 header of an IPv4 or IPv6 packet as a filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "icmp-code 0" match criterion, may match non-initial fragments when the Layer 4 header is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the criterion from the match entry.

Default 

no icmp-code

Parameters 
icmp-code—
the ICMP/ICMPv6 code value that must be present to match. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format, or even using keywords. The following value shows decimal integer only.
Values—
0 to 255

icmp-type

Syntax 
icmp-type icmp-type
no icmp-type
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures matching on the ICMP/ICMPv6 type field in the ICMP/ICMPv6 header of an IPv4 or IPv6 packet as a filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "icmp-type 0" match criterion, may match non-initial fragments when the Layer 4 header is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the criterion from the match entry.

Default 

no icmp-type

Parameters 
icmp-type—
the ICMP/ICMPv6 type value that must be present to match. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format, or even using keywords. The following value shows decimal integer only.
Values—
0 to 255

ip-option

Syntax 
ip-option ip-option-value [ip-option-mask]
no ip-option
Context 
config>filter>ip-filter>entry>match
Description 

This command configures matching packets with a specific IP option or a range of IP options in the first option of the IP header as an IP filter match criterion.

The option-type octet contains 3 fields:

1 bit copied flag (copy options in all fragments)

2 bits option class

5 bits option number

The no form of the command removes the match criterion.

Default 

no ip-option

Parameters 
ip-option-value—
enter the 8 bit option-type as a decimal integer, binary, or hexadecimal format. The mask is applied as an AND to the option byte, the result is compared with the option-value.

The decimal value entered for the match should be a combined value of the eight bit option type field and not just the option number. Thus to match on IP packets that contain the Router Alert option (option number = 20), enter the option type of 148 (10010100).

Values—
0 to 255
ip-option-mask—
optional parameter may be used when specifying a range of option numbers to use as the match criteria

This 8 bit mask can be configured using the following formats:

Table 47:  ip-option-mask Formats 

Format Style

Format Syntax

Example

Decimal

DDD

20

Hexadecimal

0xHH

0x14

Binary

0bBBBBBBBB

0b0010100

Values—
255 (decimal) (exact match)
Values—
1 to 255 (decimal)

multiple-option

Syntax 
multiple-option {true | false}
no multiple-option
Context 
config>filter>ip-filter>entry>match
Description 

This command configures matching packets that contain one or more than one option fields in the IP header as an IP filter match criterion.

The no form of the command removes the checking of the number of option fields in the IP header as a match criterion.

Default 

no multiple-option

Parameters 
­true—
specifies matching on IP packets that contain more than one option field in the header
false—
specifies matching on IP packets that do not contain multiple option fields present in the header

option-present

Syntax 
option-present {true | false}
no option-present
Context 
config>filter>ip-filter>entry>match
Description 

This command configures matching packets that contain any IP options in the IP header as an IP filter match criterion.

The no form of the command removes the checking of IP options in the IP header as a match criterion.

Default 

no option-present

Parameters 
true—
specifies matching on all IP packets that contain any IP options in the IP header. A match will occur for all packets that have any IP option present. An option field of zero is considered as no option present.
false—
specifies matching on IP packets that do not have any IP option present in the IP header. (an option field of zero). An option field of zero is considered as no option present.

port

Syntax 
port {lt | gt | eq} port-number
port port-list port-list-name
port range port-number port-number
no port
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a TCP/UDP/SCTP source or destination port match criterion in IPv4 and IPv6 CPM (SCTP not supported) and/or ACL filter policies. A packet matches this criterion if the packet TCP/UDP/SCTP (as configured by protocol/next-header match) source OR destination port matches either the specified port value or a port in the specified port range or port-list. .

Operational Note: This command is mutually exclusive with src-port and dst-port commands. Configuring "port eq 0", may match non-initial fragments where the source/destination port values are not present in a packet fragment if other match criteria are also met.

The no form of this command deletes the specified port match criterion.

Default 

no port

Parameters 
lt | gt | eq—
specifies the operator to use relative to port-number for specifying the port number match criteria
lt—
specifies all port numbers less than port-number match
gt—
specifies all port numbers greater than port-number match
eq—
specifies that the port-number must be an exact match
port-number—
specifies a source or destination port to be used as a match criterion. The port number can be expressed as a decimal integer, as well as in hexadecimal or binary format. The following value shows a decimal integer only.
Values—
0 to 65535
port-list port-list-name
specifies an inclusive range of source or destination port values to be used as match criteria
range port-number port-number
specifies an inclusive range of source or destination port values to be used as match criteria

routing-type0

Syntax 
routing-type0 {true | false}
no routing-type0
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of Routing Type Extension Header type 0 in the IPv6 filter policy.

The no form of this command ignores Routing Type Extension Header type 0 presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no routing-type0

Parameters 
true —
match if a packet contains Routing Type Extension Header type 0
false —
match if a packet does not contain Routing Type Extension Header type 0

src-ip

Syntax 
src-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
no src-ip
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a source IPv4 or IPv6 address range to be used as an IP filter match criterion.

To match on the source IPv4 or IPv6 address, specify the address and its associated mask, for example, 10.1.0.0/16 for IPv4. The conventional notation of 10.1.0.0 255.255.0.0 may also be used for IPv4.

The no form of the command removes the source IP address match criterion.

Default 

no src-ip

Parameters 
ip-address—
specifies the destination IPv4 address specified in dotted decimal notation
Values—
a.b.c.d
mask—
specifies the length in bits of the subnet mask
Values—
1 to 32
ipv4-address-mask—
specifies the subnet mask in dotted decimal notation
Values—
a.b.c.d (dotted quad equivalent of mask length)
ip-prefix-list or ipv6-prefix-list prefix-list-name —
specifies to use a list of IP prefixes referred to by prefix-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
ipv6-address —
the IPv6 prefix for the IP match criterion in hex digits.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D
prefix-length —
the IPv6 prefix length for the specified ipv6-address expressed as a decimal integer.
Values—
1 to 128
ipv6-address-mask —
eight 16-bit hexadecimal pieces representing bit match criteria.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

src-port

Syntax 
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
no src-port
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a source TCP, UDP, or SCTP port number, port range, or port match list for an IP filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "src-port eq 0" match criterion, may match non-initial fragments when the source port value is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the source port match criterion.

Default 

no src-port

Parameters 
lt | gt | eq—
specifies the operator to use relative to src-port-number for specifying the port number match criteria

lt specifies all port numbers less than src-port-number match.

gt specifies all port numbers greater than src-port-number match.

eq specifies that src-port-number must be an exact match.

src-port-number—
The source port number to be used as a match criteria expressed as a decimal integer, and in hexadecimal or binary format. Below shows decimal integer only.
Values—
0 to 65535
port-list port-list-name—
specifies to use a list of ports referred to by port-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
range src-port-number src-port-number
specifies inclusive port range between two src-port-number values.

src-route-option

Syntax 
src-route-option {true | false}
no source-route-option
Context 
config>filter>ip-filter>entry>match
Description 

This command enables source route option match conditions. When enabled, this filter should match if a (strict or loose) source route option is present/not present at any location within the IP header, as per the value of this object. The no form of the command removes the criterion from the match entry.

Default 

no src-route-option

Parameters 
true—
enables source route option match conditions
false—
disables source route option match conditions

tcp-ack

Syntax 
tcp-ack {true | false}
no tcp-ack
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures matching on the ACK bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-ack

Parameters 
true—
specifies matching on IP packets that have the ACK bit set in the control bits of the TCP header of an IP packet
false—
specifies matching on IP packets that do not have the ACK bit set in the control bits of the TCP header of the IP packet

tcp-syn

Syntax 
tcp-syn {true | false}
no tcp-syn
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures matching on the SYN bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The SYN bit is normally set when the source of the packet wants to initiate a TCP session with the specified destination IP address.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-syn

Parameters 
true—
specifies matching on IP packets that have the SYN bit set in the control bits of the TCP header
false—
specifies matching on IP packets that do not have the SYN bit set in the control bits of the TCP header

Match List Configuration Commands

match-list

Syntax 
match-list
Context 
config>filter
Description 

This command enables the configuration context for match lists to be used in filter policies (IOM/FP and CPM).

Default 

n/a

ip-prefix-list

Syntax 
ip-prefix-list ip-prefix-list-name [create]
no ip-prefix-list ip-prefix-list-name
Context 
config>filter>match-list
Description 

This command creates a list of IPv4 prefixes for match criteria in IPv4 ACL and CPM filter policies.

The no form of this command deletes the specified list.

Operational Notes:

An ip-prefix-list must contain only IPv4 address prefixes.

An IPv4 prefix match list cannot be deleted if it is referenced by a filter policy.

Please see general description related to match-list usage in filter policies.

Default 

n/a

Parameters 
ip-prefix-list-name—
a string of up to 32 printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

ipv6-prefix-list

Syntax 
ipv6-prefix-list ipv6-prefix-list-name [create]
no ipv6-prefix-list ipv6-prefix-list-name
Context 
config>filter>match-list
Description 

This command creates a list of IPv6 prefixes for match criteria in ACL and CPM IPv6 filter policies.

The no form of this command deletes the specified list.

Operational Notes:

An ipv6-prefix-list must contain only IPv6 address prefixes.

An IPv6 prefix match list cannot be deleted if it is referenced by a filter policy.

Please see general description related to match-list usage in filter policies.

Default 

n/a

Parameters 
ipv6-prefix-list-name—
a string of up to 32 printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

apply-path

Syntax 
apply-path
no apply-path
Context 
config>filter>match-list>ip-prefix-list
config>filter>match-list>ipv6-prefix-list
Description 

This command enables the context to configure auto-generation of address prefixes for IPv4 or IPv6 address prefix match lists. The context in which the command is executed governs whether IPv4 or IPv6 prefixes will be auto-generated.

The no form of this command removes all auto-generation configuration under the apply-path context.

Default 

no apply path

bgp-peers

Syntax 
bgp-peers index group reg-exp neighbor reg-exp
no bgp-peers index
Context 
config>filter>match-list>ip-prefix-list>apply-path
config>filter>match-list>ipv6-prefix-list>apply-path
Description 

This command configures auto-generation of IPv4 or IPv6 address prefixes (as required by the context the command is executed within) based on the base router BGP instance configuration.

The no form of this command removes the bgp-peers configuration for auto-generation of address prefixes for the specified index value.

Default 

No embedded filter policies are included in a filter policy.

Parameters 
group
configures a match against base router BGP instance group configuration.

Regex wildcard match (.*) can be used to match against any group.

neighbor
configures a match against base router BGP instance neighbor configuration

Regex wildcard match (.*) can be used to match against any neighbor.

index —
An integer from 1 to 255 enumerating bgp-peers auto-generation configuration within this list.
reg-exp—
regular expression defining a match string to be used to auto generate address prefixes. Matching is performed from the least significant digit. For example a string 10.0 matches all neighbors with addresses starting with 10; like 10.0.x.x or 10.0xx.x.x.

port-list

Syntax 
port-list port-list-name [create]
no port-list port-list-name
Context 
config>filter>match-list
Description 

This command creates a list of TCP/UDP/SCTP port values or ranges for match criteria in IPv4 and IPv6 ACL and CPM filter policies.

The no form of this command deletes the specified list.

Operational notes:

SCTP port match is supported in ACL filter policies only.

A port-list must contain only TCP/UDP/SCTP port values or ranges.

A TCP/UDP/SCTP port match list cannot be deleted if it is referenced by a filter policy.

Please see general description related to match-list usage in filter policies.

Default 

By default no port list is created.

Parameters 
port-list-name—
A string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

port

Syntax 
[no] port port-number
[no] port range start end
Context 
config>filter>match-list>port-list
Description 

This command adds a port or a range of ports to an existing port match list. The no form of this command deletes the specified port or range of ports form the list.

Default 

No port is in the list by default.

Parameters 
port-number—
specifies the port number to add to the list. The port number can be expressed as a decimal integer, as well as in hexadecimal or binary format. Below shows decimal integer only.
Values—
0 to 65535
range start end—
specifies an inclusive port range between two port numbers values. The start of the range and end of the range can be expressed as decimal integers, as well as in hexadecimal or binary format. The following value shows decimal integer only.
Values—
0 to 65535

prefix

Syntax 
[no] prefix ipv6-prefix/prefix-length
Context 
config>filter>match-list>ipv6-prefix-list
Description 

This command adds an IPv6 address prefix to an existing IPv6 address prefix match list.

The no form of this command deletes the specified prefix from the list.

Operational Notes:

To add set of different prefixes, execute the command with all unique prefixes. The prefixes are allowed to overlap IPv6 address space.

An IPv6 prefix addition will be blocked, if resource exhaustion is detected anywhere in the system because of filter policies that use this IPv6 address prefix list.

Default 

No prefixes are in the list by default

Parameters 
ipv6-prefix—
an IPv6 address prefix written as hexadecimal numbers separated by colons with host bits set to 0. One string of zeros can be omitted so 1010::700:0:217A is equivalent to 1010:0:0:0:0:700:0:217A
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D
prefix-length—
length of the entered IPv6 prefix
Values—
1 to 128

prefix

Syntax 
[no] prefix ip-prefix/prefix-length
Context 
config>filter>match-list>ip-prefix-list
Description 

This command adds an IPv4 address prefix to an existing IPv4 address prefix match list.

The no form of this command deletes the specified prefix from the list.

Operational Notes:

To add set of unique prefixes, execute the command with all unique prefixes. The prefixes are allowed to overlap IPv4 address space.

An IPv4 prefix addition will be blocked, if resource exhaustion is detected anywhere in the system because of filter policies that use this IPv4 address prefix list.

Default 

No prefixes are in the list by default.

Parameters 
ip-prefix—
a valid IPv4 address prefix in dotted decimal notation
Values—
0.0.0.0 to 255.255.255.255 (host bit must be 0)
prefix-length—
length of the entered IPv4 prefix
Values—
0 to 32

MAC Filter Entry Commands

action

Syntax 
drop
forward
forward esi esi service-id vpls-service-id
forward sap sap-id
forward sdp sdp-id:vc-id
http-redirect url
rate-limit value
Context 
config>filter>mac-filter>entry
config>filter>mac-filter>entry>action
Description 

The action command (under the config>filter>mac-filter>entry context) sets the context for specific action commands to be performed (under the config>filter>mac-filter>entry>action context) on packets matching this filter entry.

The following commands are available under the config>filter>mac-filter>entry>action context:

  1. drop
    A packet matching the entry will be dropped.
  2. forward
    A packet matching the entry will be forwarded using regular routing.
  3. forward esi service-id
    A packet matching the entry will be forwarded to an ESI identified first appliance in Nuage service chain using EVPN-resolved VXLAN tunnel in the specified VPLS service.
  4. forward sap
    A packet matching the entry will be forwarded using the configured SAP.
  5. forward sdp
    A packet matching the entry will be forwarded using the configured SDP.
  6. http-redirect
    Unsupported
  7. rate-limit
    Enables ACL rate limiting for packets matching the entry of this ACL filter policy. Rate limiters are configured by default with MBS = CBS = 10-ms-of-the-rate and high-prio-only = 0.
Default 

no specific action is configured by default

Parameters 
esi —
specifies a 10-Byte Ethernet Segment Identifier
sap-id —
specifies an existing VPLS Ethernet SAP
sdp-id:vc-id—
specifies an existing VPLS SDP
url —
specifies the HTTP web address that will be sent to the user’s browser
value—
specifies the rate-limit value in Kbits per second. A rate of 0 results in all traffic being dropped. A rate of max results in all traffic being forwarded.
Values—
0 to 2000000000 | max
vpls-service-id —
specifies an existing VPLS service ID or service name

match

Syntax 
match [frame-type {802dot3 | 802dot2-llc | 802dot2-snap | ethernet_II}]
no match
Context 
config>filter>mac-filter>entry
Description 

This command creates the context for entering/editing match criteria for the filter entry and specifies an Ethernet frame type for the entry.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.

The no form of the command removes the match criteria for the entry-id.

Default 

n/a

Parameters 
frame-type keyword
The frame-type keyword configures an Ethernet frame type to be used for the MAC filter match criteria.
Values—
802dot3
Values—
802dot3, 802dot2-llc, 802dot2-snap, ethernet_II
802dot3—
specifies the frame type is Ethernet IEEE 802.3
802dot2-llc—
specifies the frame type is Ethernet IEEE 802.2 LLC
802dot2-snap—
specifies the frame type is Ethernet IEEE 802.2 SNAP
ethernet_II—
specifies the frame type is Ethernet Type II

MAC Filter Match Criteria

dot1p

Syntax 
dot1p dot1p-value [dot1p-mask ]
no dot1p
Context 
config>filter>mac-filter>entry>match
Description 

Configures an IEEE 802.1p value or range to be used as a MAC filter match criterion.

When a frame is missing the 802.1p bits, specifying an dot1p match criterion will fail for the frame and result in a non-match for the MAC filter entry.

The no form of the command removes the criterion from the match entry.

Egress dot1p value matching will only match if the customer payload contains the 802.1p bits. For example, if a packet ingresses on a null encapsulated SAP and the customer packet is IEEE 802.1Q or 802.1p tagged, the 802.1p bits will be present for a match evaluation. On the other hand, if a customer tagged frame is received on a dot1p encapsulated SAP, the tag will be stripped on ingress and there will be no 802.1p bits for a MAC filter match evaluation; in this case, any filter entry with a dot1p match criterion specified will fail.

Default 

no dot1p

Parameters 
dot1p-value—
the IEEE 802.1p value in decimal
Values—
0 to 7
dot1p-mask—
a 3-bit mask that can be configured using the decimal integer, hexadecimal or binary format
Table 48:  dot1p-mask Formats 

Format Style

Format Syntax

Example

Decimal

D

4

Hexadecimal

0xH

0x4

Binary

0bBBB

0b100

To select a range from 4 up to 7 specify dot1p-value of 4 and a dot1p-mask of 0b100 for value and mask.

Values—
7 (decimal)
Values—
1 to 7 (decimal)

dsap

Syntax 
dsap dsap-value [dsap-mask]
no dsap
Context 
config>filter>mac-filter>entry>match
Description 

Configures an Ethernet 802.2 LLC DSAP value or range for a MAC filter match criterion.

This is a one-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

Use the no form of the command to remove the dsap value as the match criterion.

Default 

no dsap

Parameters 
dsap-value—
the 8-bit dsap match criteria value. Can be expressed in decimal integer, hexadecimal or binary format
Values—
0 to 255
dsap-mask—
optional parameter that may be used when specifying a range of dsap values to use as the match criteria

This 8 bit mask can be configured using the decimal integer, hexadecimal or binary formats described in Table 49.

Table 49:  dsap-mask Formats 

Format Style

Format Syntax

Example

Decimal

DDD

240

Hexadecimal

0xHH

0xF0

Binary

0bBBBBBBBB

0b11110000

Values—
255 (exact match)
0x00 to 0xFF
Values—
0 to 255

dst-mac

Syntax 
dst-mac ieee-address [ieee-address-mask]
no dst-mac
Context 
config>filter>mac-filter>entry>match
Description 

Configures a destination MAC address or range to be used as a MAC filter match criterion.

The no form of the command removes the destination mac address as the match criterion.

Default 

no dst-mac

Parameters 
ieee-address—
The MAC address to be used as a match criterion.
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is a hexadecimal digit. Note that both upper and lower case are supported.
ieee-address-mask—
a 48-bit mask to match a range of MAC address values

To configure so that all packets with a destination MAC OUI value of 00:03:FA are subject to a match condition then the entry should be specified as: 00:03:FA:00:00:00 FF:FF:FF:00:00:00

Values—
ff:ff:ff:ff:ff:ff (exact match)
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH
where H is a hexadecimal digit. to 0xFFFFFFFFFFFF
Note that both upper and lower case are supported.

etype

Syntax 
etype 0x0600..0xffff
no etype
Context 
config>filter>mac-filter>entry>match
Description 

Configures an Ethernet type II Ethertype value to be used as a MAC filter match criterion.

The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify the IPv4 packets.

The Ethernet type field is used by the Ethernet version-II frames. IEEE 802.3 Ethernet frames do not use the type field. For IEEE 802.3 frames, use the dsap, ssap or snap-pid fields as match criteria.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

The no form of the command removes the previously entered etype field as the match criteria.

Default 

no etype

Parameters 
0x0600..0xffff—
the Ethernet type II frame Ethertype value to be used as a match criterion expressed in decimal integer or hexadecimal format
Values—
1536 to 65535 or 0x0600 to 0xFFFF

isid

Syntax 
isid value [to higher-value]
no isid
Context 
config>filter>mac-filter>entry>match
Description 

This command configures an ISID value or a range of ISID values to be matched by the mac-filter parent. The pbb-etype value for the related SAP (inherited from the ethernet port configuration) or for the related SDP binding (inherited from SDP configuration) will be used to identify the ISID tag.

The no form of this command removes the ISID match criterion.

Default 

no isid

Parameters 
value—
specifies the ISID value, 24 bits as a decimal integer. When just one present identifies a particular ISID to be used for matching.
Values—
0 to 16777215
to higher-value—
Identifies a range of ISIDs to be used as matching criteria.

inner-tag

Syntax 
inner-tag value [vid-mask]
no inner-tag
Context 
config>filter>mac-filter>entry>match
Description 

This command configures the matching of the second tag that is carried transparently through the service. The inner-tag on ingress is the second tag on the frame if there are no service delimiting tags. Inner tag is the second tag before any service delimiting tags on egress but is dependent in the ingress configuration and may be set to 0 even in cases where additional tags are on the frame. This allows matching VLAN tags for explicit filtering or QoS setting when using default or null encapsulations.

The inner-tag is not applicable in ingress on dot1Q SAPs. The inner-tag may be populated on egress depending on the ingress SAP type.

On QinQ SAPs of null and default that do not strip tags inner-tag will contain the second tag (which is still the second tag carried transparently through the service.) On ingress SAPs that strip any tags, inner-tag will contain 0 even if there are more than 2 tags on the frame.

The optional vid-mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value and vid-mask) = = (tag and vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.

For QoS the VID type cannot be specified on the default QoS policy.

The default vid-mask is set to 4095 for exact match.

Default 

no inner-tag

outer-tag

Syntax 
outer-tag value [vid-mask]
no outer-tag
Context 
config>filter>mac-filter>entry>match
Description 

This command configures the matching of the first tag that is carried transparently through the service. Service delimiting tags are stripped from the frame and outer tag on ingress is the first tag after any service delimiting tags. Outer tag is the first tag before any service delimiting tags on egress. This allows matching VLAN tags for explicit filtering or QoS setting when using default or null encapsulations.

On dot1Q SAPs outer-tag is the only tag that can be matched. On dot1Q SAPs with exact match (sap 2/1/1:50) the outer-tag will be populated with the next tag that is carried transparently through the service or 0 if there is no additional VLAN tags on the frame.

On QinQ SAPs that strip a single service delimiting tag, outer-tag will contain the next tag (which is still the first tag carried transparently through the service.) On SAPs with two service delimiting tags (two tags stripped) outer-tag will contain 0 even if there are more than 2 tags on the frame.

The optional vid-mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value & vid-mask) = = (tag & vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.

For QoS the VID type cannot be specified on the default QoS policy.

The default vid-mask is set to 4095 for exact match.

Default 

no outer-tag

snap-oui

Syntax 
snap-oui {zero | non-zero}
no snap-oui
Context 
config>filter>mac-filter>entry>match
Description 

This command configures an IEEE 802.3 LLC SNAP Ethernet Frame OUI zero or non-zero value to be used as a MAC filter match criterion.

The no form of the command removes the criterion from the match criteria.

Default 

no snap-oui

Parameters 
zero—
specifies to match packets with the three-byte OUI field in the SNAP-ID set to zero
non-zero—
specifies to match packets with the three-byte OUI field in the SNAP-ID not set to zero

snap-pid

Syntax 
snap-pid snap-pid
no snap-pid
Context 
config>filter>mac-filter>entry>match
Description 

Configures an IEEE 802.3 LLC SNAP Ethernet Frame PID value to be used as a MAC filter match criterion.

This is a two-byte protocol id that is part of the IEEE 802.3 LLC SNAP Ethernet Frame that follows the three-byte OUI field.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

The snap-pid match criterion is independent of the OUI field within the SNAP header. Two packets with different three-byte OUI fields but the same PID field will both match the same filter entry based on a snap-pid match criteria.

The no form of the command removes the snap-pid value as the match criteria.

Default 

no snap-pid

Parameters 
snap-pid—
the two-byte snap-pid value to be used as a match criterion. The value can be expressed in decimal integer or hexadecimal format.
Values—
0 to 65535 or 0x0000 to 0xFFFF

src-mac

Syntax 
src-mac ieee-address [ieee-address-mask]
no src-mac
Context 
config>filter>mac-filter>entry>match
Description 

Configures a source MAC address or range to be used as a MAC filter match criterion.

The no form of the command removes the source mac as the match criteria.

Default 

no src-mac

Parameters 
ieee-address—
The 48-bit IEEE mac address to be used as a match criterion.
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is a hexadecimal digit; both upper and lower case are supported.
ieee-address-mask—
a 48-bit mask to match a range of MAC address values.

To configure so that all packets with a source MAC OUI value of 00:03:FA are subject to a match condition then the entry should be specified as: 00:03:FA:00:00:00 FF:FF:FF:00:00:00

Values—
ff:ff:ff:ff:ff:ff (exact match)
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is an hexadecimal digit; both upper and lower case are supported.

ssap

Syntax 
ssap ssap-value [ssap-mask]
no ssap
Context 
config>filter>mac-filter>entry>match
Description 

This command configures an Ethernet 802.2 LLC SSAP value or range for a MAC filter match criterion.

This is a one-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

The no form of the command removes the ssap match criterion.

Default 

no ssap

Parameters 
ssap-value—
the 8-bit ssap match criteria value in decimal, hexadecimal or binary
Values—
0 to 255
ssap-mask—
optional parameter that may be used when specifying a range of ssap values to use as the match criteria

This 8 bit mask and the ssap value can be configured as described in Table 50.

Table 50:  8-bit Mask Syntax 

Format Style

Format Syntax

Example

Decimal

DDD

240

Hexadecimal

0xHH

0xF0

Binary

0bBBBBBBBB

0b11110000

Values—
none
Values—
0 to 255

Policy and Entry Maintenance Commands

copy

Syntax 
copy ip-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
copy ipv6-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
copy mac-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
Context 
config>filter
Description 

This command copies existing filter list entries for a specific filter ID to another filter ID. The copy command is a configuration level maintenance tool used to create new filters using existing filters. It also allows bulk modifications to an existing policy with the use of the overwrite keyword. If overwrite is not specified, an error will occur if the destination policy ID exists.

Default 

n/a

Parameters 
ip-filter—
keyword indicates that the src-filter-id and the dst-filter-id are IPv4 filter IDs
ipv6-filter—
keyword indicates that the src-filter-id and the dst-filter-id are IPv6 filter IDs
mac-filter—
keyword indicates that the src-filter-id and the dst-filter-id are MAC filter IDs
src-filter-id—
identifies the source filter policy from which the copy command will attempt to copy. The filter policy must exist within the context of the preceding keyword (ip-filter, ipv6-filter or mac-filter).
dst-filter-id—
identifies the destination filter policy to which the copy command will attempt to copy. If the overwrite keyword does not follow, the filter policy ID cannot already exist within the system for the filter type the copy command is issued for. If the overwrite keyword is present, the destination policy ID may or may not exist.
overwrite—
the keyword specifies that the destination filter ID may exist. If it does, everything in the existing destination filter ID will be completely overwritten with the contents of the source filter ID. If the destination filter ID exists, either overwrite must be specified or an error message will be returned. If overwrite is specified, the function of copying from source to destination occurs in a ‘break before make’ manner and therefore should be handled with care.

renum

Syntax 
renum old-entry-id new-entry-id
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command renumbers existing MAC or IPv4/IPv6 filter entries to properly sequence filter entries. This may be required in some cases since the OS exits when the first match is found and executes the actions according to the accompanying action command. This requires that entries be sequenced correctly from most to least explicit.

Default 

n/a

Parameters 
old-entry-id—
enter the entry number of an existing entry, as a decimal integer.
Values—
1 to 65535
new-entry-id—
enter the new entry-number to be assigned to the old entry, as a decimal integer.
Values—
1 to 65535

Redirect Policy Commands

destination

Syntax 
destination ip-address [create]
no destination ip-address
Context 
config>filter>redirect-policy
Description 

This command defines a destination in a redirect policy. More than one destination can be configured. Whether a destination IPv4/IPv6 address will receive redirected packets depends on the effective priority value after evaluation.

The most preferred destination is programmed in hardware as action forward next-hop. If all destinations are down (as determined by the supported tests), action forward is programmed in hardware. All destinations within a given policy must be either IPv4 or (exclusive) IPv6. The redirect policy with IPv4 destinations configured can only be used by IPv4 filter policies. The redirect policy with IPv6 destinations configured can only be used by IPv6 filter policies.

Default 

no destination

Parameters 
ip-address—
specifies the IPv4 address (in dotted decimal notation) or IPv6 address to send the redirected traffic to
Values—
IPv4 address:         ip-address: a.b.c.d
IPv6-address:         x:x:x:x:x:x:x:x (eight 16-bit pieces)
                               x:x:x:x:x:x:d.d.d.d
                               x: [0..FFFF]H
                               d: [0..255]D

sticky-dest

Syntax 
sticky-dest no-hold-time-up
sticky-dest hold-time-up
no sticky-dest
Context 
config>filter>redirect-policy
Description 

This command configures sticky destination behavior for redirect policy. When enabled, the active destination is not changed to a new better destination, unless the active destination goes down or manual switch is forced using the tools>perform>filter>redirect-policy>activate-best-dest command.

The hold-time-up parameter allows the operator to delay programming of the PBR to the most-preferred destination for a specified amount of time when the first destination comes up (action forward remains in place). When the first destination comes up, the timer is started and upon the expiry, the current most-preferred destination is selected (which may differ from the one that triggered the timer to start) and programmed as a sticky PBR destination. Changing the value of the timer, while the timer is running takes immediate effect.

The no form of the command disables sticky destination behavior.

Default 

no sticky-dest

Parameters 
hold-time-up—
Initial delay in seconds.
Values—
0 to 65535
where 0 is equivalent to no-hold-time-up

ping-test

Syntax 
[no] ping-test
Context 
config>filter>redirect-policy>dest
Description 

This command configures parameters to perform connectivity ping tests to validate the ability for the destination to receive redirected traffic.

Default 

no ping-test

drop-count

Syntax 
drop-count consecutive-failures [hold-down seconds]
no drop-count
Context 
config>filter>redirect-policy>dest>ping-test
config>filter>redirect-policy>dest>snmp-test
config>filter>redirect-policy>dest>url-test
Description 

This command specifies the number of consecutive requests that must fail for the destination to be declared unreachable and the time to hold destination unreachable before repeating tests.

Default 

drop-count 3 hold-down 0

Parameters 
consecutive-failures—
specifies the number of consecutive ping test failures before declaring the destination down
Values—
1 to 60
hold-down seconds
The amount of time, in seconds, that the system should be held down if any of the test has marked it unreachable.
Values—
0 to 86400

interval

Syntax 
interval seconds
no interval
Context 
config>filter>redirect-policy>dest>ping-test
config>filter>redirect-policy>dest>snmp-test
config>filter>redirect-policy>dest>url-test
Description 

This command specifies the amount of time, in seconds, between consecutive requests sent to the far end host.

Default 

interval 1

Parameters 
seconds—
specifies the amount of time, in seconds, between consecutive requests sent to the far end host
Values—
1 to 60

timeout

Syntax 
timeout seconds
no timeout
Context 
config>filter>redirect-policy>dest>ping-test
config>filter>redirect-policy>dest>snmp-test
config>filter>redirect-policy>dest>url-test
Description 

Specifies the amount of time, in seconds, that is allowed for receiving a response from the far-end host. If a reply is not received within this time the far-end host is considered unresponsive.

Default 

timeout 1

Parameters 
seconds—
specifies the amount of time, in seconds, that is allowed for receiving a response from the far end host
Values—
1 to 60

priority

Syntax 
priority priority
no priority
Context 
config>filter>redirect-policy>dest
Description 

Redirect policies can contain multiple destinations. Each destination is assigned an initial or base priority which describes its relative importance within the policy.

Default 

priority 100

Parameters 
priority—
the priority, expressed as a decimal integer, used to weigh the destination’s relative importance within the policy
Values—
1 to 255

snmp-test

Syntax 
snmp-test test-name
no snmp-test test-name
Context 
config>filter>redirect-policy>dest
Description 

This command enables the context to configure SNMP test parameters.

Default 

n/a

Parameters 
test-name—
specifies the name of the SNMP test. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

oid

Syntax 
oid oid-string community community-string
no oid
Context 
config>filter>redirect-policy>dest>snmp-test
Description 

This command specifies the OID of the object to be fetched from the destination.

Default 

no oid

Parameters 
oid-string—
specifies the object identifier (OID) in the OID field
community community-string
The SNMP v2 community string or the SNMP v3 context name used to conduct this SNMP test.

return-value

Syntax 
return-value return-value type return-type [disable | lower-priority priority | raise-priority priority]
no return-value return-value type return-type
Context 
config>filter>redirect-policy>dest>snmp-test
Description 

This command specifies the criterion to adjust the priority based on the test result. Multiple criteria can be specified with the condition that they are not conflicting or overlap. If the returned value is within the specified range, the priority can be disabled, lowered or raised.

Default 

n/a

Parameters 
return-value—
specifies the SNMP value against which the test result is matched
Values—
A maximum of 256 characters.
type return-type—
specifies the SNMP object type against which the test result is matched
Values—
integer, unsigned, string, ip-address, counter, time-ticks, opaque
disable—
The keyword that specifies that the destination may not be used for the amount of time specified in the hold-time command when the test result matches the criterion.
lower-priority priority
specifies the amount to lower the priority of the destination
Values—
1 to 255
raise-priority priority
specifies the amount to raise the priority of the destination
Values—
1 to 255

unicast-rt-test

Syntax 
unicast-rt-test
no unicast-rt-test
Context 
config>filter>redirect-policy>dest
Description 

This command configures a unicast route test for this destination. A destination is eligible for redirect if a valid unicast route to that destination exists in the routing instance specified by config>filter>redirect-policy>router. The unicast route test is mutually exclusive with other redirect-policy test types.

The test cannot be configured if no router is configured for this redirect policy.

The no form of the command disables the test.

Default 

no unicast-rt-test

url-test

Syntax 
url-test test-name
no url-test test-name
Context 
config>filter>redirect-policy>dest
Description 

The context to enable URL test parameters. IP filters can be used to selectively cache some web sites.

Default 

n/a

Parameters 
test-name
The name of the URL test. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

return-code

Syntax 
return-code return-code-1 [return-code-2] [disable | lower-priority priority | raise-priority priority]
no return-code return-code-1 [return-code-2]
Context 
config>filter>redirect-policy>dest>url-test
Description 

Return codes are returned when the URL test is performed. Values for the specified range are the return codes which can be given back to the system as a result of the test been performed.

For example, error code 401 for HTTP is “page not found.” If, while performing this test, the URL is not reachable, you can lower the priority by 10 points so that other means of reaching this destination are prioritized higher than the older one.

Default 

n/a

Parameters 
return-code-1, return-code-2—
specifies a range of return codes. When the URL test return-code falls within the specified range, the corresponding action is performed.
Values—
return-code-1: 1 to 4294967294
return-code-2: 2 to 4294967295
disable —
specifies that the destination may not be used for the amount of time specified in the hold-time command when the return code falls within the specified range
lower-priority priority
specifies the amount to lower the priority of the destination when the return code falls within the specified range
raise-priority priority
specifies the amount to raise the priority of the destination when the return code falls within the specified range

url

Syntax 
url url-string [http-version version-string]
no url
Context 
config>filter>redirect-policy>dest>url-test
Description 

This command specifies the URL to be probed by the URL test.

Default 

n/a

Parameters 
url-string—
Specify a URL up to 255 characters in length.
http-version version-string
specifies the HTTP version, 80 characters in length

router

Syntax 
router router-instance
router service-name service-name
no router
Context 
config>filter>redirect-policy
Description 

This command enhances VRF support in redirect policies. When a router instance is specified, the configured destination tests are run in the specified router instance, and the PBR action is executed in the specified router instance. If no destination is active or if the hardware does not support PBR action “next-hop router”, action forward will be executed (i.e. routing will be performed in the context of the incoming interface routing instance).

The no form of the command preserves backward-compatibility. Tests always run in the “Base” routing instance context, and the PBR action executes in the routing context of the ingress interface that the filter using this redirect policy is deployed on.

Default 

no router

Parameters 
router-instance—
specifies a router instance in the form of router-name or service-id
Values—
router-name — Base
service-id — an existing Layer 3 service [1 to 2147483647]
service-name
specifies the name of a configured Layer 3 service

shutdown

Syntax 
[no] shutdown
Context 
config>filter>redirect-policy
config>filter>redirect-policy>destination
Description 

Administratively enables/disabled (AdminUp/AdminDown) an entity. Downing an entity does not change, reset or remove any configuration settings or statistics. Many objects must be shutdown before they may be deleted.

The shutdown command administratively downs an entity. Administratively downing an entity changes the operational state of the entity to down.

Unlike other commands and parameters where the default state will not be indicated in the configuration file, shutdown and no shutdown are always indicated in system generated configuration files.

The no form of the command puts an entity into the administratively enabled state.

Default 

no shutdown