IP Router Configuration Command Reference

Command Hierarchies

Router Commands

config
router [router-instance] [create]
— no router [router-instance]
aggregate ip-prefix/ip-prefix-length [summary-only] [as-set] [aggregator as-number:ip-address] [black-hole] [community comm-id] [description description]
aggregate ip-prefix/ip-prefix-length [summary-only] [as-set] [aggregator as-number:ip-address] [community comm-id] [indirect ip-address] [description description]
— no aggregate ip-prefix/ip-prefix-length
autonomous-system autonomous-system
confederation confed-as-num members as-number [as-number...(up to 15 max)]
no confederation [confed-as-num members as-number....(up to 15 max)]
ecmp max-ecmp-routes
— no ecmp
fib-priority {high | standard}
ip-filter-max-size {value | default}
ipv6-filter-max-size {value | default}
[no] ldp-shortcut
mc-maximum-routes number [log-only] [threshold threshold]
static-label-range static-range
sr-labels start-value end end-value
— no sr-labels
mss-adjust-group nat-group-id segment-size segment-size
multicast-info-policy policy-name
description description-string
— origin-validation
[no] rpki-session ip-address
[no] connect-retryseconds
[no] description description-string
[no] local-address ip-address
[no] port port-id
[no] refresh-time seconds hold-time seconds
[no] shutdown
[no] stale-time seconds
static-entry ip-prefix/prefix-length upto prefix-length2 origin-as as-number [valid | invalid]
— no static-entry ip-prefix/prefix-length1-prefix-length2
router-id ip-address
— no router-id
service-prefix {ip-prefix/mask | ip-prefix netmask} [exclusive]
— no service-prefix {ip-prefix/mask | ip-prefix netmask}
application dscp-app-name dscp {dscp-value | dscp-name}
application dot1p-app-name dot1p dot1p-priority
— no application {dscp-app-name | dot1p-app-name}
dscp dscp-name fc fc-name
[no] dscp dscp-name
single-sfm-overload [holdoff-time holdoff-time]
[no] static-route-entry {ip-prefix/prefix-length } [mcast]
[no] black-hole
[no] community comm-id
[no] description description-string
[no] dynamic-bgp
[no] generate-icmp
[no] metric metric-value
[no] preference preference-value
[no] prefix-list name {all | none | any}
[no] shutdown
[no] tag tag-value
[no] indirect ip-address
[no] community comm-id
[no] cpe-check cpe-ip-address
[no] drop-count count
[no] interval seconds
[no] log
[no] padding-size padding-size
[no] description description-string
[no] destination-class dest-index
[no] forwarding-class {be | l2 | af | l1 | h2 | ef | h1 | nc}
[no] priority {low | high}
[no] metric metric-value
[no] preference preference-value
[no] prefix-list prefix-list-name {all | none | any}
[no] shutdown
[no] source-class source-index
[no] tag tag-value
[no] disallow-igp
[no] resolution
[no] resolution-filter {any | disable | filter}
[no] ldp
[no] rsvp-te
[no] lsp lsp-name
[no] sr-isis
[no] sr-ospf
[no] sr-te
[no] lsp lsp-name
[no] next-hop {ip-address | ip-int-name | ipv6 address}
[no] bfd-enable
[no] community comm-id
[no] cpe-check cpe-ip-address
[no] drop-count count
[no] interval seconds
[no] log
[no] padding-size padding-size
[no] description description-string
[no] destination-class dest-index
[no] forwarding-class {be | l2 | af | l1 | h2 | ef | h1 | nc}
[no] priority {low | high}
[no] ldp-sync
[no] metric metric-value
[no] preference preference-value
[no] prefix-list name {all | none | any}
[no] shutdown
[no] source-class [source-index]
[no] tag tag-value
label-route-local [none | all]
label-route-transit [none | all]
lsr-label-route [none | all]
vprn-local [none | vc-only | all]
vprn-transit [none | vc-only | all]
config
router management
— origin-validation
[no] rpki-session ip-address
[no] connect-retryseconds
[no] description description-string
[no] local-address ip-address
[no] port port-id
[no] refresh-time seconds hold-time seconds
[no] shutdown
[no] stale-time seconds

Router BFD commands

config
— router
— bfd
bfd-template name [create]
bfd-template name
transmit-interval transmit-interval
receive-interval receive-interval
echo-receive echo-interval
multiplier multiplier
— no multiplier
[no] type cpm-np

Router L2TP Commands

The router L2TP commands apply only to the 7750 SR and 7450 ESS.

config
router [router-name]
l2tp
calling-number-format ascii-spec
challenge {always}
— no challenge
df-bit-lac {always | never}
— no df-bit-lac
destruct-timeout destruct-timeout
reconnect-timeout seconds
exclude-avps calling-number
group tunnel-group-name [create]
— no group tunnel-group-name
avp-hiding {sensitive | always}
— no avp-hiding
challenge [always]
— no challenge
description description-string
df-bit-lac {always | never | default}
— no df-bit-lac
destruct-timeout destruct-timeout
hello-interval hello-interval
idle-timeout idle-timeout
l2tpv3
cookie-length {4 | 8 | none}
digest-type {md5 | sha1 | none}
nonce-length {length | none}
pw-cap-list {ethernet | ethernet-vlan}
rem-router ip-addr
— no rem-router
lns-group lns-group-id
— no lns-group
load-balance-method {per-session | per-tunnel}
local-address ip-address
local-name host-name
— no local-name
max-retries-estab max-retries
max-retries-not-estab max-retries
password password [hash | hash2]
— no password
ppp
authentication {chap | pap | pref-chap | pref-pap}
authentication-policy auth-policy-name
default-group-interface ip-int-name service-id service-id
keepalive seconds [hold-up-multiplier multiplier]
— no keepalive
mtu mtu-bytes
— no mtu
[no] proxy-lcp
user-db local-user-db-name
— no user-db
session-assign-method {existing-first | weighted | weighted-random}
session-limit session-limit
tunnel tunnel-name [create]
— no tunnel tunnel-name
avp-hiding {never | sensitive | always}
— no avp-hiding
challenge challenge-mode
— no challenge
description description-string
df-bit-lac {always | never | default}
— no df-bit-lac
destruct-timeout destruct-timeout
hello-interval hello-interval
hello-interval infinite
idle-timeout idle-timeout
idle-timeout infinite
load-balance-method {per-session | per-tunnel}
local-address ip-address
local-name host-name
— no local-name
max-retries-estab max-retries
max-retries-not-estab max-retries
password password [hash | hash2]
— no password
peer ip-address
— no peer
preference preference
— no preference
remote-name host-name
session-limit session-limit
[no] shutdown
l2tpv3
cookie-length {4 | 8 | none}
digest-type {md5 | sha1 | none}
nonce-length {length | none}
password password [hash | hash2]
— no password
next-attempt {same-preference-level | next-preference-level}
replace-result-code code [code...(upto 3 max)]
peer-address-change-policy {accept | ignore | reject}
[no] shutdown
configure
— router
— l2tp
add-tunnel never
add-tunnel on reason>[reason...(upto 8 max)]
— no add-tunnel
max-list-length count
max-time minutes
— no max-time
timeout-action action

Router Interface Commands

config
— router [router-name]
admin-group group-name value group-value
— no admin-group group-name
srlg-group group-name value group-value [penalty-weight penalty-weight]
— no srlg-group group-name
[no] interface ip-int-name gmpls-loopback
[no] interface ip-int-name [unnumbered-mpls-tp]
address {ip-address/mask | ip-address netmask} [broadcast all-ones | host-ones] [track-srrp srrp-instance]
— no address
arp-limit limit [log-only] [threshold percent]
— no arp-limit
arp-timeout seconds
bfd transmit-interval [receive receive-interval] [multiplier multiplier] [echo-receive echo-interval [type cpm-np]
— no bfd
sampling {unicast | multicast} type {acl | interface} [direction {ingress-only | egress-only | both}]
— no sampling {unicast | multicast}
cpu-protection policy-id
description description-string
dhcp
description description-string
gi-address ip-address [src-ip-addr]
— no gi-address
[no] option
action {replace | drop | keep}
— no action
circuit-id [ascii-tuple | ifindex | sap-id | vlan-ascii-tuple]
— no circuit-id
remote-id [mac | string string]
[no] pool-name
[no] port-id
[no] service-id
string text
— no string
[no] system-id
python-policy policy-name
server server1 [server2...(up to 8 max)]
— no server
[no] shutdown
[no] trusted
dist-cpu-protection policy-name
egress
filter ip ip-filter-id
filter ipv6 ipv6-filter-id
— no filter [ip ip-filter-id] [ipv6 ipv6-filter-id]
up ip seconds
— no up ip
up ipv6 seconds
— no up ipv6
down ip seconds [init-only]
— no down
down ipv6 seconds [init-only]
— no down ipv6
icmp
[no] mask-reply
redirects [number seconds]
— no redirects
ttl-expired [number seconds]
unreachables [number seconds]
[no] admin-group group-name [group-name...(up to 5 max)]
— no admin-group
[no] srlg-group group-name [group-name...(up to 5 max)]
— no srlg-group
filter ip ip-filter-id
filter ipv6 ipv6-filter-id
— no filter [ip ip-filter-id] [ipv6 ipv6-filter-id]
ip-mtu octets
— no ip-mtu
lag-link-map-profile lnk-map-profile-id
lag-per-link-hash class {1 | 2 | 3} weight [1..1024]
ldp-sync-timer seconds [end-of-lib]
egr-ip-load-balancing {source | destination | inner-ip}
lsr-load-balancing hashing-algorithm
[no] loopback
mac ieee-mac-addr
— no mac
network-domain network-domain-name
[no] ntp-broadcast
port port-name
— no port
[no] ptp-hw-assist
qos-route-lookup [source | destination]
qos network-policy-id [egress-port-redirect-group queue-group-name] [egress-instance instance-id]] [ingress-fp-redirect-group queue-group-name ingress-instance instance-id]
— no qos
secondary {[ip-addr/mask | ip-addr] [netmask]} [broadcast {all-ones | host-ones}] [igp-inhibit]
— no secondary [ip-addr/mask | ip-addr] [netmask]
[no] shutdown
static-arp ip-addr ieee-mac-addr unnumbered
— no static-arp unnumbered
[no] strip-label
tcp-mss mss-value
— no tcp-mss
tos-marking-state {trusted | untrusted}
unnumbered [ip-addr | ip-int-name]
— no unnumbered
[no] urpf-check
mode {strict | loose | strict-no-ecmp}
— no mode
vas-if-type {to-from-access | to-from-network | to-from-both}
[no] template template-name
include-group group-name [pref pref]
— no include-group group-name
[no] exclude-group group-name
[no] srlg-enable
protection-type {link | node}
nh-type {ip | tunnel}
— no nh-type

For router interface VRRP commands, see VRRP Configuration Command Reference.

Router Interface IPv6 Commands

config
router [router-name]
[no] interface ip-int-name
[no] ipv6
address ipv6-address/prefix-length [eui-64]
— no address ipv6-address/prefix-length
bfd transmit-interval [receive receive-interval] [multiplier multiplier] [echo-receive echo-interval [type cpm-np]
— no bfd
[no] dad-disable
icmp6
packet-too-big [number seconds]
param-problem [number seconds]
redirects [number seconds]
— no redirects
time-exceeded [number seconds]
unreachables [number seconds]
link-local-address ipv6-address [preferred]
neighbor ipv6-address [mac-address]
— no neighbor ipv6-address
neighbor-limit limit [log-only] [threshold percent]
proxy-nd-policy policy-name [policy-name...(up to 5 max)]
[no] secure-nd
link-local-modifier modifier
[no] shutdown
stale-time seconds
— no stale-time
tcp-mss mss-value
— no tcp-mss
[no] urpf-check
mode {strict | loose | strict-no-ecmp}
— no mode
[no] urpf-check
mode {strict | loose}
— no mode

Router Advertisement Commands

config
router
[no] dns-options
servers ipv6-address
— no servers
rdnss-lifetime seconds
[no] interface ip-int-name
[no] dns-options
servers ipv6-address
— no servers
rdnss-lifetime {seconds | infinite}
[no] include-dns
mtu mtu-bytes
— no mtu
prefix [ipv6-prefix/prefix-length]
[no] autonomous
[no] on-link
preferred-lifetime {seconds | infinite}
valid-lifetime {seconds | infinite}
reachable-time milliseconds
retransmit-time milliseconds
router-lifetime seconds
[no] shutdown

Command Descriptions

Generic Commands

shutdown

Syntax 
[no] shutdown
Context 
config>router>if
Description 

The shutdown command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command.

The shutdown command administratively disables an entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

Unlike other commands and parameters where the default state is not indicated in the configuration file, shutdown and no shutdown are always indicated in system generated configuration files.

The no form of the command puts an entity into the administratively enabled state.

Default 

no shutdown

description

Syntax 
description description-string
no description
Context 
config>router>if
config>router>if>dhcp
config>router>if>vrrp
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command creates a text description stored in the configuration file for a configuration context.

The no form of the command removes the description string from the context.

Default 

No description is associated with the configuration context.

Parameters 
description-string—
The description character string. Allowed values are any string up to 80 characters long, composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

Router Global Commands

router

Syntax 
router [router-instance] [create]
no router [router-instance]
Context 
config
Description 

This command enables the context to configure router parameters including interfaces, route policies and protocols. This command is also used to create CPM router instances.

For CPM router instances, this command enters or creates a user-created CPM router instance. A CPM router instance is a not a VPRN router instance. VPRN router instances are configured under configure service vprn. CPM router instances are the only type of non-VPRN router instances that can be created by a user, and they have a user-defined name. CPM router instances only use CPM/CFM/CCM ethernet ports as interfaces.

Parameters 
router-instance—
specifies the router name or CPM router instance
Values—

router-instance : router name

router-name

Base | management | cpm-vr-name

cpm-vr-name

[32 characters maximum]

Values—
Base

aggregate

Syntax 
aggregate ip-prefix/ip-prefix-length [summary-only] [as-set] [aggregator as-number:ip-address] [black-hole] [community comm-id] [description description]
aggregate ip-prefix/ip-prefix-length [summary-only] [as-set] [aggregator as-number:ip-address] [community comm-id] [indirect ip-address] [description description]
no aggregate ip-prefix/ip-prefix-length
Context 
config>router
Description 

This command creates an aggregate route.

Use this command to automatically install an aggregate in the routing table when there are one or more component routes. A component route is any route used for forwarding that is a more-specific match of the aggregate.

The use of aggregate routes can reduce the number of routes that need to be advertised to neighbor routers, leading to smaller routing table sizes.

Overlapping aggregate routes may be configured; in this case a route becomes a component of only the one aggregate route with the longest prefix match. For example if one aggregate is configured as 10.0.0.0/16 and another as 10.0.0.0/24, then route 10.0.128/17 would be aggregated into 10.0.0.0/16, and route 10.0.0.128/25 would be aggregated into 10.0.0.0/24. If multiple entries are made with the same prefix and the same mask the previous entry is overwritten.

A standard 4-byte BGP community may be associated with an aggregate route in order to facilitate route policy matching.

By default aggregate routes are not installed in the forwarding table, however there are configuration options that allow an aggregate route to be installed with a black-hole next hop or with an indirect IP address as next hop.

The no form of the command removes the aggregate.

Default 

No aggregate routes are defined.

Parameters 
ip-prefix—
The destination address of the aggregate route in dotted decimal notation.
Values—
The following values apply to the 7750 SR and 7950 XRS:

ipv4-prefix

a.b.c.d (host bits must be 0)

ipv4-prefix-length

0 to 32

ipv6-prefix

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x:

[0 to FFFF]H

d:

[0 to 255]D

ipv6-prefix-length

0 to 128

Values—
The following values apply to the 7450 ESS:

ipv4-prefix

a.b.c.d (host bits must be 0)

ipv4-prefix-length

0 to 32

ip-prefix-length—
The mask associated with the network address expressed as a mask length.
Values—
0 to 32
summary-only—
This optional parameter suppresses advertisement of more specific component routes for the aggregate.

To remove the summary-only option, enter the same aggregate command without the summary-only parameter.

as-set—
This optional parameter is only applicable to BGP and creates an aggregate where the path advertised for this route will be an AS_SET consisting of all elements contained in all paths that are being summarized. Use this feature carefully as it can increase the amount of route churn due to best path changes.
aggregator as-number:ip-address
This optional parameter specifies the BGP aggregator path attribute to the aggregate route. When configuring the aggregator, a two-octet AS number used to form the aggregate route must be entered, followed by the IP address of the BGP system that created the aggregate route.
community comm-id
This configuration option associates a BGP community with the aggregate route. The community can be matched in route policies and is automatically added to BGP routes exported from the aggregate route.
Values—

comm-id

asn:comm-val | well-known-comm

asn

0 to 65535

comm-val

0 to 65535

well-known-comm

no-advertise, no-export, no-export-subconfed

black-hole—
This optional parameter installs the aggregate route, when activated, in the FIB with a black-hole next-hop; where packets matching this route are discarded.
indirect ip-address—
This configuration option specifies that the aggregate route should be installed in the FIB with a next-hop taken from the route used to forward packets to ip-address.
Values—
The following values apply to the 7750 SR and 7950 XRS:

ipv4-prefix

a.b.c.d

ipv6-prefix

x:x:x:x:x:x:x:x

x:x:x:x:x:x:d.d.d.d

x: [0 to FFFF]H

d: [0 to 255]D

Values—
The following values apply to the 7450 ESS:
ipv4-prefix:  a.b.c.d
description description-text
specifies a text description stored in the configuration file for a configuration context

autonomous-system

Syntax 
autonomous-system autonomous-system
no autonomous-system
Context 
config>router
Description 

This command configures the autonomous system (AS) number for the router. A router can only belong to one AS. An AS number is a globally unique number with an AS. This number is used to exchange exterior routing information with neighboring ASs and as an identifier of the AS itself.

If the AS number is changed on a router with an active BGP instance, the new AS number is not used until the BGP instance is restarted either by administratively disabling/enabling (shutdown/no shutdown) the BGP instance or rebooting the system with the new configuration.

Default 

No autonomous system number is defined.

Parameters 
autonomous-system—
The autonomous system number expressed as a decimal integer.
Values—
1 to 4294967295

confederation

Syntax 
confederation confed-as-num members as-number [as-number...up to 15 max]
no confederation [confed-as-num members as-number...up to 15 max]
Context 
config>router
Description 

This command creates confederation autonomous systems within an AS.

This technique is used to reduce the number of IBGP sessions required within an AS. Route reflection is another technique that is commonly deployed to reduce the number of IBGP sessions.

The no form of the command deletes the specified member AS from the confederation.

When no members are specified in the no statement, the entire list is removed and confederation is disabled.

When the last member of the list is removed, confederation is disabled.

Default 

no confederation - no confederations are defined.

Parameters 
confed-as-num—
The confederation AS number expressed as a decimal integer.
Values—
1 to 65535
members member-as-num
The AS number(s) of members that are part of the confederation, expressed as a decimal integer. Up to 15 members per confed-as-num can be configured.
Values—
1 to 65535

ecmp

Syntax 
ecmp max-ecmp-routes
no ecmp
Context 
config>router
Description 

This command enables ECMP and configures the number of routes for path sharing; for example, the value 2 means two equal cost routes will be used for cost sharing.

ECMP can only be used for routes learned with the same preference and same protocol.

When more ECMP routes are available at the best preference than configured in max-ecmp-routes, then the lowest next-hop IP address algorithm is used to select the number of routes configured in max-ecmp-routes.

The no form of the command disables ECMP path sharing. If ECMP is disabled and multiple routes are available at the best preference and equal cost, then the route with the lowest next-hop IP address is used.

Default 

no ecmp

Parameters 
max-ecmp-routes—
The maximum number of equal cost routes allowed on this routing table instance, expressed as a decimal integer. Setting ECMP max-ecmp-routes to 1 yields the same result as entering no ecmp.
Values—
0 to 32

entropy-label

Syntax 
entropy-label
no entropy-label
Context 
config>router
Description 

If entropy-label is configured, the Entropy label and Entropy Label Indicator is inserted on packets for which at least one LSP in the stack for the far-end of the LDP or RSVP tunnel used by an IGP or BGP shortcut has advertised entropy-label-capability. If the tunnel is of type RSVP, then entropy-label must also have been enabled under config>router>mpls or config>router>mpls>lsp.

This configuration will result in other traffic that is forwarded over an LDP or RSVP LSP for which this router is the LER, and for which there is no explicit service endpoint on this router, to have the EL/ELI enabled, subject to the LSP far-end advertising entropy-label-capability. An example of such traffic includes packets arriving on a stitched LDP LSP forwarded over an RSVP LSP.

Default 

no entropy-label

flowspec

Syntax 
flowspec
Context 
config>router
Description 

This command enables the context to configure flowspec-related parameters for the specified routing instance.

Default 

n/a

ip-filter-max-size

Syntax 
ip-filter-max-size {value | default}
Context 
config>router>flowspec
Description 

This command configures the maximum number of flowspec routes or rules that can be embedded into the auto-created embedded filter (fSpec-X). Flowspec filter entries embedded in a filter policy in this routing instance will use filter entries from the range between “embedding offset + 1” and “embedding offset + ip-filter-max-size”.

The sum of the ip-filter-max-size value parameter and the highest offset in any IPv4 filter that embeds IPv4 flowspec rules from this routing instance (excluding filters that embed at offset 65535) must not exceed 65535.exit

The ip-filter-max-size configuration can be adjusted up or down at any time. If the number of IPv4 flowspec rules that are currently installed is M, and the new limit is N, where N<M, then the last set of rules from N to M (by flowspec order) are immediately removed, but are retained in the BGP RIB. If the limit is increased, new rules are programmed only as they are received again in new BGP updates.

Default 

ip-filter-max-size default

Parameters 
value—
The maximum number of flowspec routes or rules that can be embedded into an ingress IP filter policy
Values—
0 — 65535
default—
Keyword to configure the maximum size as 512

ipv6-filter-max-size

Syntax 
ipv6-filter-max-size {value | default}
Context 
config>router>flowspec
Description 

This command configures the maximum number of IPv6 flowspec routes or rules that can be embedded into the auto-created embedded filter (fSpec-X). Flowspec filter entries embedded in a filter policy in this routing instance will use filter entries from the range between “embedding offset + 1” and “embedding offset + ip-filter-max-size”.

The sum of the ip-filter-max-size value parameter and the highest offset in any IPv6 filter that embeds IPv6 flowspec rules from this routing instance (excluding filters that embed at offset 65535) must not exceed 65535.

The ip-filter-max-size configuration can be adjusted up or down at any time. If the number of IPv6 flowspec rules that are currently installed is M, and the new limit is N, where N<M, then the last set of rules from N to M (by flowspec order) are immediately removed, but are retained in the BGP RIB. If the limit is increased, new rules are programmed only as they are received again in new BGP updates.

Default 

ipv6-filter-max-size default

Parameters 
value—
The maximum number of flowspec routes or rules that can be embedded into an ingress IP filter policy
Values—
0 — 65535
default—
Keyword to configure the maximum size as 512

weighted-ecmp

Syntax 
weighted-ecmp
no ecmp
Context 
config>router
Description 

This command enables the weighted load-balancing, or weighted ECMP, over MPLS LSP.

When this command is enabled, packets of IGP, BGP, and static route prefixes resolved to a set of ECMP tunnel next-hops are sprayed proportionally to the weights configured for each MPLS LSP in the ECMP set.

Weighted load-balancing over MPLS LSP is supported in the following forwarding contexts:

IGP prefix resolved to IGP shortcuts in RTM (rsvp-shortcut or advertise-tunnel-link enabled in the IGP instance).

BGP prefix with the BGP next-hop resolved to IGP shortcuts in RTM (rsvp-shortcut or advertise-tunnel-link enabled in the IGP instance).

Static route prefix resolved to an indirect next-hop which itself is resolved to a set of equal-metric MPLS LSPs in TTM. The user can allow automatic selection or specify the names of the equal-metric MPLS LSPs in TTM to be used in the ECMP set.

Static route prefix resolved to an indirect next-hop which itself is resolved to IGP shortcuts in RTM.

BGP prefix with a BGP next-hop resolved to a static route which itself resolves to set of tunnel next-hops towards an indirect next-hop in RTM or TTM.

BGP prefix resolving to another BGP prefix which next-hop is resolved to set of ECMP tunnel next-hops with a static route in RTM or TTM or to IGP shortcuts in RTM.

IGP computes the normalized weight for each prefix tunnel next-hop. IGP updates the route in RTM with the set of tunnel next-hops and normalized weights. RTM downloads the information to IOM for inclusion in the FIB.

If one or more LSPs in the ECMP set of a prefix do not have a weight configured, the regular ECMP spraying for the prefix will be performed.

The weight assigned to an LSP impacts only the forwarding decision, not the routing decision. In other words, it does not change the selection of the set of ECMP tunnel next-hops of a prefix when more next-hops exist than the value of the router ecmp option. Once the set of tunnel next-hops is selected, the LSP weight is used to modulate the amount of packets forwarded over each next-hop. It also does not change the hash routine, but only the spraying of the flows over the tunnel next-hops is modified to reflect the normalized weight of each tunnel next-hop.

The no version of the command resumes regular ECMP spraying of packets of IGP, BGP, and static route prefixes over MPLS LSP.

Default 

no weighted-ecmp

fib-priority

Syntax 
fib-priority {high | standard}
Context 
config>router
Description 

This command specifies the FIB priority for VPRN.

Default 

fib-priority standard

icmp-tunneling

Syntax 
icmp-tunneling
no icmp-tunneling
Context 
config>router
Description 

This command enables the tunneling of ICMP reply packets over MPLS LSP at a LSR node as per RFC 3032.

The LSR part of this feature consists of crafting the reply ICMP packet of type=11- 'time exceeded', with a source address set to a local address of the LSR node, and appending the IP header and leading payload octets of the original datagram. The system skips the lookup of the source address of the sender of the label TTL expiry packet, which becomes the destination address of the ICMP reply packet. Instead, CPM injects the ICMP reply packet in the forward direction of the MPLS LSP the label TTL expiry packet was received from. The TTL of pushed labels should be set to 255.

The source address of the ICMP reply packet is determined as follows. The LSR uses the address of the outgoing interface for the MPLS LSP. With LDP LSP or BGP LSP multiple ECMP next-hops can exist and in such a case the first outgoing interface is selected. If that interface does not have an address of the same family (IPv4 or IPv6) as the ICMP packet, then the system address of the same family is selected. If one is not configured, the packet is dropped.

When the packet is received by the egress LER, it performs a regular user packet lookup in the data path in the GRT context for BGP shortcut, 6PE, and BGP label route prefixes, or in VPRN context for VPRN and 6VPE prefixes. It then forwards it to the destination, which is the sender of the original packet which TTL expired at the LSR.

If the egress LER does not have a route to the destination of the ICMP packet, it drops the packets.

The rate of the tunneled ICMP replies at the LSR can be directly or indirectly controlled by the existing IOM level and CPM levels mechanisms. Specifically, the rate of the incoming UDP traceroute packets received with a label stack can be controlled at ingress IOM using the distributed CPU protection feature. The rate of the ICMP replies by CPM can also be directly controlled by configuring a system wide rate limit for packets ICMP replies to MPLS expired packets which are successfully forwarded to CPM using the command 'configure system security vprn-network-exceptions'. While this command's name refers to VPRN service, this feature rate limits ICMP replies for packets received with any label stack, including VPRN and shortcuts.

The 7450 ESS, 7750 SR, and 7950 XRS implementation supports appending to the ICMP reply of type Time Exceeded the MPLS label stack object defined in RFC 4950. It does not include it in the ICMP reply type of Destination unreachable.

The new MPLS Label Stack object permits an LSR to include label stack information including label value, EXP, and TTL field values, from the encapsulation header of the packet that expired at the LSR node. The ICMP message continues to include the IP header and leading payload octets of the original datagram.

In order to include the MPLS Label Stack object, the SR OS implementation adds support of RFC 4884 which defines extensions for a multi-part ICMPv4/v6 message of type Time Exceeded.

The no form of command disables the tunneling of ICMP reply packets over MPLS LSP at a LSR node.

Default 

no icmp-tunneling

ip-fast-reroute

Syntax 
[no] ip-fast-reroute
Context 
config>router
Description 

This command enables IP Fast-Reroute (FRR) feature on the system.

This feature provides for the use of a Loop-Free Alternate (LFA) backup next-hop for forwarding in-transit and CPM generated IP packets when the primary next-hop is not available. IP FRR is supported on IPv4 and IPv6 OSPF/IS-IS prefixes forwarded in the base router instance to a network IP interface or to an IES SAP interface or spoke interface. It is also supported for VPRN VPN-IPv4 OSPF prefixes and VPN-IPv6 OSPF prefixes forwarded to a VPRN SAP interface or spoke interface.

IP FRR also provides a LFA backup next-hop for the destination prefix of a GRE tunnel used in an SDP or in VPRN auto-bind.

When any of the following events occurs, IGP instructs in the fast path on the XMAs to enable the LFA backup next-hop:

  1. OSPF/IS-IS interface goes operationally down: physical or local admin shutdown.
  2. Timeout of a BFD session to a next-hop when BFD is enabled on the OSPF/IS-IS interface

When the SPF computation determines there is more than one primary next-hop for a prefix, it will not program any LFA next-hop in RTM. Thus, the IP prefix will resolve to the multiple equal-cost primary next-hops that provide the required protection.

The no form of this command disables the IP FRR feature on the system

Default 

no ip-fast-reroute

mc-maximum-routes

Syntax 
mc-maximum-routes number [log-only] [threshold threshold]
no mc-maximum-routes
Context 
config>router
Description 

This command specifies the maximum number of multicast routes that can be held within a VPN routing/forwarding (VRF) context. When this limit is reached, a log and SNMP trap are sent. If the log-only parameter is not specified and the maximum-routes value is set below the existing number of routes in a VRF, then no new joins will be processed.

The no form of the command disables the limit of multicast routes within a VRF context. Issue the no form of the command only when the VPRN instance is shutdown.

Default 

no mc-maximum-routes

Parameters 
number—
specifies the maximum number of routes to be held in a VRF context
Values—
1 to 2147483647
log-only—
specifies that if the maximum limit is reached, only log the event. log-only does not disable the learning of new routes.
threshold threshold
The percentage at which a warning log message and SNMP trap should be sent.
Values—
0 to 100
Values—
10

mpls-labels

Syntax 
mpls-labels
Context 
config>router
Description 

This command creates a context for the configuration of global parameters related to MPLS labels.

Default 

n/a

static-label-range

Syntax 
static-label-range static-range
no static-label-range
Context 
config>router>mpls-labels
Description 

This command configures the range of MPLS static label values shared among static LSP, MPLS-TP LSP, and static service VC label. Once this range is configured, it is reserved and cannot be used by other protocols such as RSVP, LDP, BGP, or Segment Routing to assign a label dynamically.

Default 

static-label-range 18400

Parameters 
static-range—
Size of the static label range in number of labels. The minimum label value in the range is 32. The maximum label value is thus computed as {32+ static-range-1}.
Values—
0 to 131040 for chassis mode C
Values—
0 to 262112 for chassis mode D
Values—
18400

bgp-labels-hold-timer

Syntax 
bgp-labels-hold-timer seconds
[no] bgp-labels-hold-timer
Context 
config>router>mpls-labels
Description 

This command configures the BGP labels hold timer on the ingress router.

Default 

bgp-labels-hold-timer 0

Parameters 
seconds—
specifies the seconds
Values—
0 to 255

sr-labels

Syntax 
sr-labels start start-value end end-value
no sr-labels
Context 
config>router>mpls-labels
Description 

This command configures the range of the Segment Routing Global Block (SRGB). It is a label block which is used for assigning labels to segment routing prefix SIDs originated by this router. This range is carved from the system dynamic label range and is not instantiated by default.

This is a reserved label and once configured it cannot be used by other protocols such as RSVP, LDP, and BGP to assign a label dynamically.

Default 

no sr-labels

Parameters 
start start-value—
start label value in the SRGB
Values—
18432 to 524287
Values—
none
end end-value—
end label value in the SRGB
Values—
18432 to 524287
Values—
None

mss-adjust-group

Syntax 
mss-adjust-group nat-group-id segment-size segment-size
no mss-adjust-group
Context 
config>router
config>service>vprn
Description 

This command associates the MSS adjust group consisting of multiple ISAs with the routing context in which the application requiring TCP MSS adjust resides.

Default 

n/a

Parameters 
nat-group-id—
specifies the NAT group used for TCP MSS adjust
segment-size—
specifies the value to put into the TCP Maximum Segment Size (MSS) option if it is not already present, or if the present value is higher

multicast-info-policy

Syntax 
multicast-info-policy policy-name
no multicast-info-policy
Context 
config>router
Description 

This command configures multicast information policy.

Default 

no multicast-info-policy

Parameters 
policy-name—
specifies the policy name
Values—
32 chars max

network-domains

Syntax 
network-domains
Context 
config>router
Description 

This command opens context for defining network-domains. This command is applicable only in the base routing context.

Default 

n/a

description

Syntax 
[no] description string
Context 
config>router>network-domains>network-domain
Description 

This command creates a text description stored in the configuration file for a configuration context.

The no form of the command removes the description string from the context.

Default 

no description

Parameters 
string—
The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special character (#, $, space, etc.), the entire string must be enclosed within double quotes.

network-domain

Syntax 
network-domain network-domain-name [create]
no network-domain network-domain-name
Context 
config>router>network-domains
Description 

This command creates network-domains that can be associated with individual interfaces and SDPs.

Default 

network-domain “default”

Parameters 
network-domain-name —
Network domain name character string.

rpki-session

Syntax 
rpki-session ip-address
no rpki-session ip-address
Context 
config>router>origin-validation
Description 

This command configures a session with an RPKI local cache server by using the RPKI-Router protocol. It is over these sessions that the router learns dynamic VRP entries expressing valid origin AS and prefix associations. SR OS supports the RPKI-Router protocol over TCP/IPv4 or TCP/IPv6 transport. The router can set up an RPKI-Router session using the base routing table (in-band) or the management router (out-of-band).

Default 

no rpki-session

Parameters 
ip-address —
An IPv4 address or an IPv6 address. If the IPv6 address is link-local then the interface name must be appended to the IPv6 address after a hyphen (-).

connect-retry

Syntax 
connect-retry seconds
no connect-retry
Context 
config>router>origin-validation>rpki-session
Description 

This command configures the time in seconds to wait between one TCP connection attempt that fails and the next attempt. The default (with no connect-retry) is 120 seconds.

Default 

no connect-retry

Parameters 
seconds —
specifies time in seconds
Values—
1 to 65535

description

Syntax 
description description-string
no description
Context 
config>router>origin-validation>rpki-session
Description 

This command configures a description for an RPKI-Router session.

Default 

no description

Parameters 
description-string —
specifies a text string up to 80 characters in length

local-address

Syntax 
local-address ip-address
no local-address
Context 
config>router>origin-validation>rpki-session
Description 

This command configures the local address to use for setting up the TCP connection used by an RPKI-Router session. The default local-address is the outgoing interface IPv4 or IPv6 address. The local-address cannot be changed without first shutting down the session.

Default 

no local-address

Parameters 
ip-address —
specifies an IPv4 address or an IPv6 address

port

Syntax 
port port-id
no port
Context 
config>router>origin-validation>rpki-session
Description 

This command configures the destination port number to use when contacting the cache server. The default port number is 323. The port cannot be changed without first shutting down the session.

Default 

no port

Parameters 
port-id —
specifies a port-id
Values—
0 to 65535

refresh-time

Syntax 
refresh-time seconds1 hold-time seconds2
no refresh-time
Context 
config>router>origin-validation>rpki-session
Description 

This command is used to configure the refresh-time and hold-time intervals that are used for liveness detection of the RPKI-Router session. The refresh-time defaults to 300 seconds and is reset whenever a Reset Query PDU or Serial Query PDU is sent to the cache server. When the timer expires, a new Serial Query PDU is sent with the last known serial number.

The hold-time specifies the length of time in seconds that the session is to be considered UP without any indication that the cache server is alive and reachable. The timer defaults to 600 seconds and must be at least 2x the refresh-time (otherwise the CLI command is not accepted). Reception of any PDU from the cache server resets the hold timer. When the hold-time expires, the session is considered to be DOWN and the stale timer is started.

Default 

no refresh-time

Parameters 
seconds1 —
specifies a time in seconds
Values—
30 to 32767
seconds2 —
specifies a time in seconds
Values—
60 to 65535

shutdown

Syntax 
shutdown
no shutdown
Context 
config>router>origin-validation>rpki-session
Description 

This command administratively disables an RPKI-Router session. The no form of the command enables the RPKI-Router session.

Default 

no shutdown

stale-time

Syntax 
stale-time seconds
no stale-time
Context 
config>router>origin-validation>rpki-session
Description 

This command configures the maximum length of time that prefix origin validation records learned from the cache server remain usable after the RPKI-Router session goes down. The default stale-time is 3600 seconds (1 hour). When the timer expires all remaining stale entries associated with the session are deleted.

Default 

no stale-time

Parameters 
seconds —
specifies a time in seconds
Values—
60 to 3600

static-entry

Syntax 
static-entry ip-prefix/ip-prefix-length upto prefix-length2 origin-as as-number [valid | invalid]
no static-entry ip-prefix/ip-prefix-length upto prefix-length2 origin-as as-number
Context 
config>router>origin-validation
Description 

This command configures a static VRP entry indicating that a particular origin AS is either valid or invalid for a particular IP prefix range. Static VRP entries are stored along with dynamic VRP entries (learned from local cache servers using the RPKI-Router protocol) in the origin validation database of the router. This database is used for determining the origin-validation state of IPv4 and/or IPv6 BGP routes received over sessions with the enable-origin-validation command configured.

Static entries can only be configured under the config>router>origin-validation context of the base router.

Default 

no static entries

Parameters 
ip-prefix/ip-prefix-length —
specifies an IPv4 or IPv6 address with a minimum prefix length value
Values—
60 to 3600
prefix-length2 —
specifies the maximum prefix length
as-number —
specifies as-number
Values—
0 to 4294967295
valid —
specifies a keyword meaning the static entry expresses a valid combination of origin AS and prefix range
invalid —
specifies a keyword meaning the static entry expresses an invalid combination of origin AS and prefix range

router-id

Syntax 
router-id ip-address
no router-id
Context 
config>router
Description 

This command configures the router ID for the router instance.

The router ID is used by both OSPF and BGP routing protocols in this instance of the routing table manager. IS-IS uses the router ID value as its system ID.

When configuring a new router ID, protocols are not automatically restarted with the new router ID. The next time a protocol is initialized, the new router ID is used. This can result in an interim period of time when different protocols use different router IDs.

It is possible to configure an SR OS to operate with an IPv6 only BOF and no IPv4 system interface address. When configured in this manner, the operator must explicitly define IPv4 router IDs for protocols such as OSPF and BGP as there is no mechanism to derive the router ID from an IPv6 system interface address.

To force the new router ID to be used, issue the shutdown and no shutdown commands for each protocol that uses the router ID, or restart the entire router.

The no form of the command to reverts to the default value.

Default 

The system uses the system interface address (which is also the loopback address).

If a system interface address is not configured, use the last 32 bits of the chassis MAC address.

Parameters 
router-id—
The 32 bit router ID expressed in dotted decimal notation or as a decimal value.

service-prefix

Syntax 
service-prefix ip-prefix/mask | ip-prefix netmask [exclusive]
no service-prefix ip-prefix/mask | ip-prefix netmask
Context 
config>router
Description 

This command creates an IP address range reserved for IES or VPLS services.

The purpose of reserving IP addresses using service-prefix is to provide a mechanism to reserve one or more address ranges for services.

When services are defined, the address must be in the range specified as a service prefix. If a service prefix is defined, then IP addresses assigned for services must be within one of the ranges defined in the service-prefix command. If the service-prefix command is not configured, then no limitations exist.

Addresses in the range of a service prefix can be allocated to a network port unless the exclusive parameter is used. Then, the address range is exclusively reserved for services.

When a range that is a superset of a previously defined service prefix is defined, the subset is replaced with the superset definition; for example, if a service prefix exists for 10.10.10.0/24, and a service prefix is configured as 10.10.0.0/16, then 10.10.10.0/24 is replaced by the new 10.10.0.0/16 configuration.

When a range that is a subset of a previously defined service prefix is defined, the subset replaces the existing superset, providing addresses used by services are not affected; for example, if a service prefix exists for 10.10.0.0/16, and a service prefix is configured as 10.10.10.0/24, then the 10.10.0.0/16 entry is removed as long as no services are configured that use 10.10.x.x addresses other than 10.10.10.x.

The no form of the command removes all address reservations. A service prefix cannot be removed while one or more service uses an address or addresses in the range.

Default 

no service-prefix - no IP addresses are reserved for services.

Parameters 
ip-prefix/mask—
The IP address prefix to include in the service prefix allocation in dotted decimal notation.
Values—

ipv4-prefix:

a.b.c.d (host bits must be 0)

ipv4-prefix-length:

0 to 32

ipv6-prefix:

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x:

[0 to FFFF]H

d:

[0 to 255]D

ipv6-prefix-length:

0 to 128

Values—
exclusive
When this option is specified, the addresses configured are exclusively used for services and cannot be assigned to network ports.

sgt-qos

Syntax 
sgt-qos
Context 
config>router
Description 

This command configures DSCP/Dot1p re-marking for self-generated traffic.

Default 

n/a

application

Syntax 
application dscp-app-name dscp {dscp-value |dscp-name}
application dot1p-app-name dot1p dot1p-priority
no application {dscp-app-name | dot1p-app-name}
Context 
config>router>sgt-qos
Description 

This command configures DSCP/Dot1p re-marking for applications.

Parameters 
dscp-app-name —
specifies the DSCP application name
Values—
bgp, cflowd, dhcp, diameter, dns, ftp, ftp, gtp, icmp, igmp, igmp-reporter, l2tp, ldp, mld, msdp, ndis, ntp, ospf, pcep, pim, ptp, radius, rip, rsvp, sflow, snmp, snmp-notification, srrp, ssh, syslog, tacplus, telnet, tftp, traceroute, vrrp
dscp-value—
specifies the DSCP value
Values—
0 to 63
dscp-name—
specifies the DSCP name

none, be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63

dot1p-priority—
specifies the Dot1p priority
Values—
none, 0 to 7
dot1p-app-name—
specifies the Dot1p application name
Values—
arp, isis, pppoe

dscp

Syntax 
dscp dscp-name fc fc-name
no dscp dscp-name
Context 
config>router>sgt-qos
Description 

This command configures DSCP name to FC mapping.

Parameters 
dscp-name—
specifies the DSCP name
Values—
be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63
fc-name—
specifies the forward class name
Values—
be, l2, af, l1, h2, ef, h1, nc

bfd-template

Syntax 
bfd-template name [create]
no bfd-template name
Context 
config>router>bfd
Description 

This command creates or edits a BFD template. A BFD template defines the set of configurable parameters used by a BFD session. These include the transmit and receive timers used for BFD CC packets, the transmit timer interval used when the session is providing a CV function, the multiplier value, the echo-receive interval, and whether the BFD session terminates in the CPM network processor.

Default 

no bfd-template

Parameters 
name—
specifies a text string name for the template up to 32 characters in printable 7-bit ASCII, enclosed in double quotes

transmit-interval

Syntax 
transmit-interval transmit-interval
no transmit-interval
Context 
config>router>bfd>bfd-template
Description 

This command specifies the transmit timer used for BFD packets. If the template is used for a BFD session on an MPLS-TP LSP, then this timer is used for CC packets.

Default 

transmit-interval 100

Parameters 
transmit-interval—
specifies the transmit interval. The minimum interval that can be configured is hardware dependent.
Values—
10 ms to 100,000 ms in 1 ms intervals
Values—
10 ms for CPM3 or higher; 1 second for other hardware

receive-interval

Syntax 
receive-interval receive-interval
no receive-interval
Context 
config>router>bfd>bfd-template
Description 

This command specifies the receive timer used for BFD packets. If the template is used for a BFD session on an MPLS-TP LSP, then this timer is used for CC packets.

Default 

receive-interval 100

Parameters 
receive-interval—
specifies the receive interval. The minimum interval that can be configured is hardware dependent.
Values—
10 ms to 100,000 ms in 1 ms intervals
Values—
10 ms for CPM3 or higher; 1 second for other hardware

echo-receive

Syntax 
echo-receive echo-interval
no echo-receive
Context 
config>router>bfd>bfd-template
Description 

This command sets the minimum echo receive interval, in milliseconds, for a session. This is not used by a BFD session for MPLS-TP.

Default 

echo-receive 100

Parameters 
echo-interval—
specifies the echo receive interval
Values—
100 ms to 100,000 ms in 1 ms increments
Values—
100

multiplier

Syntax 
multiplier multiplier
no multiplier
Context 
config>router>bfd>bfd-template
Description 

This command specifies the detect multiplier used for a BFD session. If a BFD control packet is not received for a period of multiplier x receive-interval, then the session is declared down.

Default 

multiplier 3

Parameters 
multiplier—
specifies the multiplier
Values—
3 to 20, integers
Values—
3

type

Syntax 
[no] type cpm-np
Context 
config>router>bfd>bfd-template
Description 

This command selects the CPM network processor as the local termination point for the BFD session. This is enabled by default.

Default 

no type

single-sfm-overload

Syntax 
single-sfm-overload [holdoff-time holdoff-time]
no single-sfm-overload
Context 
config>router
Description 

This command configures OSPF, OSPFv3 and IS-IS to set overload when the router has fewer than the full set of SFMs functioning, which reduces forwarding capacity. Setting overload enables a router to still participate in exchanging routing information, but routes all traffic away from it.

The conditions to set overload are as follows:

  1. 7750 SR-12/SR-7/SR-c12 and 7450 ESS-12/ESS-7/ESS-6 platforms: protocol sets overload if one of the SF/CPMs fails
  2. 7950 XRS and 7750 SR-12e platforms: protocol sets overload if two SFMs fail

The no form of this command configures the router to not set overload if an SFM fails.

Default 

no single-sfm-overload

Parameters 
holdoff-time —
This parameter specifies the delay between detecting SFM failures and setting overload.
Values—
1to 600 seconds
Values—
0 seconds

static-route-entry

Syntax 
static-route-entry {ip-prefix/prefix-length} [mcast]
Context 
config>router
Description 

This command creates a static route entry for both the network and access routes. A prefix and netmask must be specified.

Once the static route context for the specified prefix and netmask has been created, additional parameters associated with the static route(s) may be specified through the inclusion of additional static route parameter commands

The no form of the command deletes the static route entry. If a static route needs to be removed when multiple static routes exist to the same destination, then as many parameters to uniquely identify the static route must be entered

IPv6 static routes are not supported on the 7450 ESS except in mixed mode.

Default 

No static routes are defined.

Parameters 
ip-prefix/prefix-length—
The destination address of the static route.
Values—
The following values apply to the 7750 SR and 7950 XRS:

ipv4-prefix

a.b.c.d (host bits must be 0)

ipv4-prefix-length

0 to 32

ipv6-prefix

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x

[0 to FFFF]H

d

[0 to 255]D

ipv6-prefix-length

0 to 128

Values—
The following values apply to the 7450 ESS:

ipv4-prefix

a.b.c.d (host bits must be 0)

ipv4-prefix-length

0 to 32

ip-address—
The IP address of the IP interface. The ip-addr portion of the address command specifies the IP host address that will be used by the IP interface within the subnet. This address must be unique within the subnet and specified in dotted decimal notation.
Values—
The following values apply to the 7750 SR and 7950 XRS:

ipv4-address

a.b.c.d (host bits must be 0)

ipv6-address

x:x:x:x:x:x:x:x[-interface]

x:x:x:x:x:x:d.d.d.d[-interface]

x: [0..FFFF]H

d: [0..255]D

interface: 32 characters maximum, mandatory for link local addresses

Values—
The following value applies to the 7450 ESS:

ipv4-address

a.b.c.d (host bits must be 0)

next-hop

Syntax 
next-hop {ip-address | ip-int-name | ipv6 address}
Context 
config>router>static-route-entry
Description 

This command specifies the directly connected next hop IP address or interface used to reach the destination. If the next hop is over an unnumbered interface or a point-to-point interface, the ip-int-name of the unnumbered or point-to-point interface (on this node) can be configured.

If the next hop is over an unnumbered interface in the 7450 ESS router, the ip-int-name of the unnumbered interface (on this node) can be configured.

The configured ip-address can be either on the network side or the access side on this node. The address must be associated with a network directly connected to a network configured on this node.

Default 

no next-hop

Parameters 
ip-address | ip-int-name | ipv6-address—
the IPv4/IPv6 address or interface of the next hop
Values—
The following values apply to the 7750 SR, 7450 ESS, and 7950 XRS:

ip-int-name

32 characters max

ipv4-address

a.b.c.d

ipv6-address

x:x:x:x:x:x:x:x-[interface]

x:x:x:x:x:x:d.d.d.d[-interface]

x: [0..FFFF]H

d: [0..255]D

interface: 32 characters maximum, mandatory for link local addresses

IPv6 static routes are not supported on the 7450 ESS except in mixed mode

indirect

Syntax 
[no] indirect ip-address
Context 
config>router>static-route-entry
Description 

This command specifies that the route is indirect and specifies the next hop IP address used to reach the destination.

The configured ip-address is not directly connected to a network configured on this node. The destination can be reached via multiple paths. The indirect address can only resolved from dynamic routing protocol. Another static route cannot be used to resolve the indirect address.

The ip-address configured here can be either on the network side or the access side and is typically at least one hop away from this node.

Default 

no indirect

Parameters 
ip-address—
The IP address of the IP interface.
Values—

ipv4-address

a.b.c.d

ipv6-address

x:x:x:x:x:x:x:x-[interface]

black-hole

Syntax 
[no] black-hole
Context 
config>router>static-route-entry
Description 

This command specifies that the route is a black hole route. If the destination address on a packet matches this static route, it will be silently discarded.

Default 

no black-hole

bfd-enable

Syntax 
[no] bfd-enable
Context 
config>router>static-route-entry>next-hop
Description 

This command associates the static route state to a BFD session between the local system and the configured nexthop.

The remote end of the BFD session must also be configured to originate or accept the BFD session controlling the static route state.

The no form of this command removes the association of the static route state to that of the BFD session.

Default 

no bfd-enable

community

Syntax 
[no] community comm-id
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
Description 

This configuration option associates a BGP community with the static route. The community can be matched in route policies and is automatically added to BGP routes exported from the static route.

The no form of this command removes the community association.

Default 

no community

Parameters 
comm-id—
Speifies the community identifier.
Values—

comm-id

asn:comm-val, well-known-comm

asn

0 to 65535

comm-val

0 to 65535

well-known-comm

no-advertise, no-export, no-export-subconfed

cpe-check

Syntax 
[no] cpe-check cpe-ip-address
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
Description 

This command enables CPE-check and specifies the IP address of the target CPE device.

This option initiates a background ICMP ping test to the configured target IP address. The IP address can either be an IPv4 address for IPv4 static routes or an IPv6 address for IPv6 static routes. The target-ip-address cannot be in the same subnet as the static route subnet itself to avoid possible circular references. This option is mutually exclusive with BFD support on a given static route.

The no form of this command disables the cpe-check option.

Default 

no cpe-check

Parameters 
cpe-ip-address—
Speifies the IP address of the CPE device.

drop-count

Syntax 
[no] drop-count count
Context 
config>router>static-route-entry>next-hop>cpe-check
config>router>static-route-entry>indirect>cpe-check
Description 

This optional parameter specifies the number of consecutive ping-replies that must be missed to declare the CPE down and to deactivate the associated static route.

Default 

drop-count 3

Parameters 
count—
An integer count value.
Values—
1 to 255

interval

Syntax 
[no] interval seconds
Context 
config>router>static-route-entry>next-hop>cpe-check
config>router>static-route-entry>indirect>cpe-check
Description 

This optional parameter specifies the interval between ICMP pings to the target IP address.

Default 

interval 1

Parameters 
seconds—
An integer interval value.
Values—
1 to 255

padding-size

Syntax 
[no] padding-size padding-size
Context 
config>router>static-route-entry>next-hop>cpe-check
config>router>static-route-entry>indirect>cpe-check
Description 

This optional parameter specifies the amount of padding to add to the ICMP packet in bytes. The parameter is only applicable when the cpe-check option is used with the associated static route.

Default 

padding-size 56

Parameters 
padding-size—
An integer value.
Values—
0 to 16384 bytes

log

Syntax 
[no] log
Context 
config>router>static-route-entry>next-hop>cpe-check
config>router>static-route-entry>indirect>cpe-check
Description 

This optional parameter enables the ability to log transitions between active and in-active based on the CPE connectivity check. Events will be sent to the system log, syslog and SNMP traps.

Default 

no log

description

Syntax 
[no] description description-string
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
config>router>static-route-entry>black-hole
Description 

This command creates a text description stored in the configuration file for a configuration context.

The no form of the command removes the description string from the context

Default 

no description

Parameters 
description-string—
The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

destination-class

Syntax 
[no] destination-class dest-index
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
config>router>static-route-entry>black-hole
Description 

This command configures the policy accounting destination-class index to be used when incrementing accounting statistic for traffic matching the associated static route.

The no form of the command removes the associated destination-class from the associated static route nexthop.

Default 

no destination-class

Parameters 
dest-index—
The destination index integer value.
Values—
1 to 255

dynamic-bgp

Syntax 
[no] dynamic-bgp
Context 
config>router>static-route-entry>black-hole
Description 

This optional command controls the behavior of the associated static route so that if a matching BGP route to the same exact prefix is present in BGP, the static route's nexthop is set to the BGP's nexthop value. If there is no matching active BGP route, the static route's nexthop is set to be a black-hole nexthop.

Default 

no dynamic-bgp

generate-icmp

Syntax 
[no] generate-icmp
Context 
config>router>static-route-entry>black-hole
Description 

This optional command causes the ICMP unreachable messages to be sent when received packets match the associated static route. By default, the ICMP unreachable messages for those types of static routes are not generated.

This command can only be associated with a static route that has a blackhole next-hop

The no form of this command removes the black-hole nexthop from the static route configuration.

Default 

no generate-icmp

forwarding-class

Syntax 
[no] forwarding-class {be | l2 | af | l1 | h2 | ef | h1 | nc}
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
config>router>static-route-entry>next-hop
Description 

This command specifies the enqueuing forwarding class that should be associated with traffic matching the associate static route. If this parameter is not specified, the packet will use the forwarding-class association based on default classification or other QoS Policy associations.

Default 

no forwarding-class

Parameters 
be | l2 | af | l1 | h2 | ef | h1 | nc—
specifies the forwarding class
Values—
be | l2 | af | l1 | h2 | ef | h1 | nc

ldp-sync

Syntax 
[no] ldp-sync
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
config>router>static-route-entry>next-hop
Description 

This command extends the LDP synchronization feature to a static route. When an interface comes back up, it is possible that a preferred static route using the interface as next-hop for a given prefix is enabled before the LDP adjacency to the peer LSR comes up on this interface. In this case, traffic on an SDP that uses the static route for the far-end address would be black-holed until the LDP session comes up and the FECs exchanged.

This option when enabled delays the activation of the static route until the LDP session comes up over the interface and the ldp-sync-timer configured on that interface has expired

Default 

no ldp-sync

metric

Syntax 
[no] metric metric-value
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
Description 

This command specifies the cost metric for the static route, expressed as a decimal integer. This value is used when importing the static route into other protocols such as OSPF. When the metric is configured as 0 then the metric configured in OSPF, default-import-metric, applies. When modifying the metric of an existing static route, the preference will not change unless specified. This value is also used to determine which static route to install in the forwarding table.

If there are multiple static routes with the same preference but different metrics then the lower cost (metric) route will be installed.

The no form of this command returns the metric to the default value

Default 

metric 1

Parameters 
metric-value
specifies the cost metric value
Values—
0 to 65535

preference

Syntax 
[no] preference preference-value
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
config>router>static-route-entry>black-hole
Description 

This command specifies the route preference to be assigned to the associated static route. The lower the preference value the more preferred the route is considered.

Table 6 shows the default route preference based on the route source.

Table 6:   Default Route Preference 

Label

Preference

Configurable

Direct attached

0

No

Static route

5

Yes

OSPF Internal routes

10

Yes

IS-IS level 1 internal

15

Yes

IS-IS level 2 internal

18

Yes

OSPF external

150

Yes

IS-IS level 1 external

160

Yes

IS-IS level 2 external

165

Yes

BGP

170

Yes

The no form of this command returns the returns the associated static route preference to its default value.

Default 

preference 5

Parameters 
preference-value
specifies the route preference value
Values—
1 to 255

prefix-list

Syntax 
[no] prefix-list name {all | none | any}
Context 
config>router>static-route-entry>next-hop
config>router>static-route-entry>indirect
config>router>static-route-entry>black-hole
Description 

This command associates a new constraint to the associated static route such that the static route is only active if any, none, or all of the routes in the prefix list are present and active in the route-table.

Default 

no prefix-list

Parameters 
name
specifies the name of a currently configured prefix-list
all
specifies that the static route condition is met if all prefixes in the prefix-list must be present in the active route-table
none
specifies that the static route condition is met if none of the prefixes in the named prefix-list can be present in the active route-table
any
specifies that the static route condition is met if any prefixes in the prefix-list are present in the active route-table

priority

Syntax 
[no] priority {low | high}
Context 
config>router>static-route-entry>next-hop>forwarding-class
config>router>static-route-entry>indirect>forwarding-class
Description 

This optional command associates an enqueuing priority with the static route. The options are either high or low, with low being the default. This parameter has the ability to affect the likelihood that a packet will be enqueued at SAP ingress in the face of ingress congestion.

Once a packet is enqueued into an ingress buffer, the significance of this parameter is lost.

Default 

priority low

Parameters 
low
Setting the enqueuing parameter for a packet to low decreases the likelihood of enqueuing the packet when the ingress queue is congested. Ingress enqueuing priority only affects ingress SAP queuing. Once the packet is placed in a buffer on the ingress queue, the significance of the enqueuing priority is lost.
high
Setting the enqueuing parameter for a packet to high increases the likelihood of enqueuing the packet when the ingress queue is congested. Ingress enqueuing priority only affects ingress SAP queuing. Once the packet is placed in a buffer on the ingress queue, the significance of the enqueuing priority is lost..

shutdown

Syntax 
[no] shutdown
Context 
config>router>static-route-entry>black-hole
config>router>static-route-entry>indirect
config>router>static-route-entry>next-hop
Description 

This command causes the static route to be placed in an administratively down state and removed from the active route-table

Default 

no shutdown

source-class

Syntax 
[no] source-class source-index
Context 
config>router>static-route-entry>indirect
config>router>static-route-entry>next-hop
Description 

This command configures the policy accounting source-class index to be used when incrementing accounting statistic for traffic matching the associated static route.

If source route policy accounting is enabled and a source-class index is configured, traffic with a source IP address matches the associated static route, the source accounting statistics for the specified class will be incremented.

The no form of the command removes the associated destination-class from the associated static route nexthop.

Default 

no source-class

Parameters 
source-index
specifies an integer value for the accounting source class index
Values—
1 to 255

tag

Syntax 
[no] tag tag-value
Context 
config>router>static-route-entry>indirect
config>router>static-route-entry>next-hop
Description 

This command adds a 32-bit integer tag to the associated static route.

The tag value can be used in route policies to control distribution of the route into other protocols.

Default 

no tag

Parameters 
tag-value
specifies an integer tag value
Values—
32 bit integer

tunnel-next-hop

Syntax 
[no] tunnel-next-hop
Context 
config>router>static-route-entry>indirect
Description 

This command enables the static route's nexthop to be resolved to an indirect tunnel next-hop.

The command within the tunnel-next-hop context controls the resolution to tunnel next-hops in TTM. As such, the user must first configure the prefix with the existing command and the indirect option, and then enter the new command with the indirect option and with the new static-route-entry command.

Default 

no tunnel-next-hop

disallow-igp

Syntax 
[no] disallow-igp
Context 
config>router>static-route-entry>indirect>tunnel-next-hop
Description 

This optional command determines if the associated static route can be resolved via an IGP next-hop in the RTM if no tunnel next-hops are found in TTM.

When configured, the associated static route will not be resolved to an available IGP route in the RTM.

The no form of the command returns the behavior to the default, which does allow for the static route to be resolved via an IGP route in the RTM if no tunnel next-hop can be found in the TTM.

Default 

no disallow-igp

resolution

Syntax 
resolution {any | disabled | filter}
no resolution
Context 
config>router>static-route-entry>indirect>tunnel-next-hop
Description 

This command determines how the associated static route can be resolved to a tunnel next-hop.

Default 

resolution any

Parameters 
any
Allows the associated static route to be resolved to any active entry in the TTM, following the TTM preference order.
disabled
Disables the associated static route to be resolved to any active entry in the TTM. As a result, the static route can only be resolved via IP RTM resolution of the static route's nexthop.
filter
Allows the associated static route to be resolved to active tunnels in the TTM using the resolution-filter restrictions.

resolution-filter

Syntax 
[no] resolution-filter
Context 
config>router>static-route-entry>indirect>tunnel-next-hop
Description 

This command creates the context to specify the tunnel next-hop resolution options.

If one or more tunnel filter criteria are specified, the static route nexthop will be resolved to an available tunnel from one of those LSP sources. The tunnel types will be selected following the TTM preference.

Default 

no resolution-filter

ldp

Syntax 
[no] ldp
Context 
config>router>static-route-entry>indirect>tunnel-next-hop>resolution-filter
Description 

This command enables the use of LDP sourced tunnel entries in the TTM to resolve the associated static route next-hop.

Default 

no ldp

rsvp-te

Syntax 
[no] rsvp-te
Context 
config>router>static-route-entry>indirect>tunnel-next-hop>resolution-filter
Description 

This command enables the use of RSVP-TE sourced tunnel entries in the TTM to resolve the associated static route next-hop.

The rsvp-te value instructs the code to search for the set of lowest metric RSVP-TE LSPs to the address of the indirect next-hop. The LSP metric is provided by MPLS in the tunnel table. The static route treats a set of RSVP-TE LSPs with the same lowest metric as an ECMP set. The user has the option of configuring a list of RSVP-TE LSP names to be used exclusively instead of searching in the tunnel table. In that case, all LSPs must have the same LSP metric in order for the static route to use them as an ECMP set. Otherwise, only the LSPs with the lowest common metric value will be selected.

A P2P auto-lsp that is instantiated via an LSP template can be selected in TTM when resolution is set to any. However, it is not recommended to configure an auto-lsp name explicitly under the rsvp-te node as the auto-generated name can change if the node reboots, which will blackhole the traffic of the static route.

Default 

no rsvp-te

lsp

Syntax 
[no] lsp name
Context 
config>router>static-route-entry>indirect>tunnel-next-hop>resolution-filter>rsvp-te
config>router>static-route-entry>indirect>tunnel-next-hop>resolution-filter>sr-te
Description 

This command restricts the search for a resolving LSP to a specific set of named LSPs. Only those LSPs named in the associated name list will be searched for a match to resolve the associated static route.

Default 

n/a

Parameters 
name
specifies the name of the LSP(s) to be searched for a valid resolving tunnel for the static route's next-hop

sr-ospf

Syntax 
[no] sr-ospf
Context 
config>router>static-route-entry>indirect>tunnel-next-hop>resolution-filter
Description 

This command enables the use of sr-ospf sourced tunnel entries in the TTM to resolve the associated static route next-hop.

Default 

no sr-ospf

sr-isis

Syntax 
[no] sr-isis
Context 
config>router>static-route-entry>indirect>tunnel-next-hop>resolution-filter
Description 

This command enables the use of sr-isis sourced tunnel entries in the TTM to resolve the associated static route next-hop.

Default 

no sr-isis

sr-te

Syntax 
[no] sr-te
Context 
config>router>static-route-entry>indirect>tunnel-next-hop>resolution-filter
Description 

The sr-te value instructs the code to search for the set of lowest metric SR-TE LSPs to the address of the indirect next-hop. The LSP metric is provided by MPLS in the tunnel table. The static route treats a set of SR-TE LSPs with the same lowest metric as an ECMP set. The user has the option of configuring a list of SR-TE LSP names to be used exclusively instead of searching in the tunnel table. In that case, all LSPs must have the same LSP metric in order for the static route to use them as an ECMP set. Otherwise, only the LSPs with the lowest common metric value are selected.

Default 

no sr-te

validate-next-hop

Syntax 
[no] validate-next-hop
Context 
config>router>static-route-entry>next-hop
Description 

This optional command tracks the state of the next-hop in the IPv4 ARP cache or IPv6 Neighbor Cache. When the next-hop is not reachable and is removed from the ARP or Neighbor Cache, the next-hop will no longer be considered valid and the associated static-route state removed from the active route-table.

When the next-hop is reachable again and present in the ARP/Neighbor Cache, the static route will be considered valid and is subject to being placed into the active route-table.

Default 

no validate-next-hop

disallow-igp

Syntax 
disallow-igp
no disallow-igp
Context 
config>router>static-route-entry>tunnel-next-hop
Description 

This command is for indirect static routes using tunnel next-hops. When enabled, the static route will not be activated using IGP next-hops in RTM if no tunnel next-hops are found in TTM.

Default 

no disallow-igp

triggered-policy

Syntax 
triggered-policy
no triggered-policy
Context 
config>router
Description 

This command triggers route policy re-evaluation.

By default, when a change is made to a policy in the config router policy options context and then committed, the change is effective immediately. There may be circumstances when the changes should or must be delayed; for example, if a policy change is implemented that would affect every BGP peer on a router, the consequences could be dramatic. It would be more effective to control changes on a peer-by-peer basis.

If the triggered-policy command is enabled, and a given peer is established, and you want the peer to remain up, in order for a change to a route policy to take effect, a clear command with the soft or soft inbound option must be used; for example, clear router bgp neighbor x.x.x.x soft. This keeps the peer up, and the change made to a route policy is applied only to that peer or group of peers.

Default 

no triggered-policy

ttl-propagate

Syntax 
ttl-propagate
Context 
config>router
Description 

This command enables the context to configure TTL propagation for transit and locally generated packets in the Global Routing Table (GRT) and VPRN routing contexts

Default 

n/a

label-route-local

Syntax 
label-route-local [all | none]
Context 
config>router>ttl-propagate
Description 

This command configures the TTL propagation for locally generated packets which are forwarded over a BGP label route in the Global Routing Table (GRT) context.

For IPv4 and IPv6 packets forwarded using a RFC 3107 label route in the global routing instance, including 6PE, the all value of the command enables TTL propagation from the IP header into all labels in the transport label stack. The none value reverts to the default mode which disables TTL propagation from the IP header to the labels in the transport label stack. This command does not have a no version.

The TTL of the IP packet is always propagated into the RFC 3107 label itself, and this command only controls the propagation into the transport labels, for example, labels of the RSVP or LDP LSP to which the BGP label route resolves and which are pushed on top of the BGP label.

If the BGP peer advertised the implicit-null label value for the BGP label route, the TTL propagation will not follow the configuration described, but will follow the configuration to which the BGP label route resolves:

RSVP LSP shortcut:

  1. configure router mpls shortcut-local-ttl-propagate

LDP LSP shortcut:

  1. configure router ldp shortcut-local-ttl-propagate

This feature does not impact packets forwarded over BGP shortcuts. The ingress LER operates in uniform mode by default and can be changed into pipe mode using the configuration of TTL propagation for RSVP or LDP LSP shortcut listed.

Default 

label-route-local none

Parameters 
none—
The TTL of the IP packet is not propagated into the transport label stack.
all—
The TTL of the IP packet is propagated into all labels of the transport label stack.

label-route-transit

Syntax 
label-route-transit [all | none]
Context 
cconfig>router>ttl-propagate
Description 

This command configures the TTL propagation for transit packets which are forwarded over a BGP label route in the Global Routing Table (GRT) context.

For IPv4 and IPv6 packets forwarded using a RFC 3107 label route in the global routing instance, including 6PE, the all value of the command enables TTL propagation from the IP header into all labels in the transport label stack. The none value reverts to the default mode which disables TTL propagation from the IP header to the labels in the transport label stack. This command does not have a no version.

The TTL of the IP packet is always propagated into the RFC 3107 label itself, and this command only controls the propagation into the transport labels, for example, labels of the RSVP or LDP LSP to which the BGP label route resolves and which are pushed on top of the BGP label.

If the BGP peer advertised the implicit-null label value for the BGP label route, the TTL propagation will not follow the configuration described, but will follow the configuration to which the BGP label route resolves.

RSVP LSP shortcut:

  1. configure router mpls shortcut-transit-ttl-propagate

LDP LSP shortcut:

  1. configure router ldp shortcut-transit-ttl-propagate

This feature does not impact packets forwarded over BGP shortcuts. The ingress LER operates in uniform mode by default and can be changed into pipe mode using the configuration of TTL propagation for the listed RSVP or LDP LSP shortcut.

Default 

label-route-transit none

Parameters 
none—
The TTL of the IP packet is not propagated into the transport label stack.
all—
The TTL of the IP packet is propagated into all labels of the transport label stack.

lsr-label-route

Syntax 
lsr-label-route [all | none]
Context 
config>router>ttl-propagate
Description 

This command configures the TTL propagation for transit packets at a router acting as an LSR for a BGP label route.

When an LSR swaps the BGP label for a ipv4 prefix packet, thus acting as a ABR, ASBR, or data-path Route-Reflector (RR) in the base routing instance, or swaps the BGP label for a vpn-ipv4 or vpn-ipv6 prefix packet, thus acting as an inter-AS Option B VPRN ASBR or VPRN data path Route-Reflector (RR), the all value of this command enables TTL propagation of the decremented TTL of the swapped BGP label into all outgoing LDP or RSVP transport labels.

When an LSR swaps a label or stitches a label, it always writes the decremented TTL value into the outgoing swapped or stitched label. What this feature controls is whether this decremented TTL value is also propagated to the transport label stack pushed on top of the swapped or stitched label.

The none value reverts to the default mode which disables TTL propagation. This changes the existing default behavior which propagates the TTL to the transport label stack. When a customer upgrades, the new default becomes in effect. This command does not have a no version.

This feature also controls the TTL propagation at an LDP-BGP stitching LSR in the LDP to BGP stitching direction. It also controls the TTL propagation in Carrier Supporting Carrier (CsC) VPRN at both the CsC CE and CsC PE.

SR OS does not support ASBR or data path RR functionality for labeled IPv6 routes in the global routing instance (6PE). As such the CLI command of this feature has no impact on prefix packets forwarded in this context.

Default 

lsr-label-route none

Parameters 
none—
The TTL of the swapped label is not propagated into the transport label stack.
all—
The TTL of the swapped label is propagated into all labels of the transport label stack.

vprn-local

Syntax 
vprn-local [all | vc-only | none]
Context 
config>router>ttl-propagate
Description 

This command configures the TTL propagation for locally generated packets which are forwarded over a MPLS LSPs in all VPRN service contexts.

For vpn-ipv4 and vpn-ipv6 packets forwarded in the context of all VPRN services in the system, including 6VPE packets, the all value of the command enables TTL propagation from the IP header into all labels in the stack:

The user can enable the TTL propagation behavior separately for locally generated packets by CPM (vprn-local) and for user and control packets in transit at the node (vprn-transit).

The vc-only value reverts to the default behavior by which the IP TTL is propagated into the VC label but not to the transport labels in the stack. The user can explicitly set the default behavior by configuring the vc-only value. This command does not have a no version.

The value none allows the user to disable the propagation of the IP TTL to all labels in the stack, including the VC label. This is needed for a transparent operation of UDP traceroute in VPRN inter-AS option B such that the ingress and egress ASBR nodes are not traced.

The user can override the global configuration within each VPRN instance using the following commands:

  1. config service vprn ttl-propagate local [inherit | none | vc-only | all]
  2. config service vprn ttl-propagate transit [inherit | none | vc-only | all]

The default behavior for a given VPRN instance is to inherit the global configuration for the same command. The user can explicitly set the default behavior by configuring the inherit value.

When a packet is received in a VPRN context but is looked up in the Global Routing Table (GRT), for example, leaking to GRT is enabled, the behavior of the TTL propagation is governed by the RSVP or LDP shortcut configuration when the matching routing is a LSP shortcut route. It is governed by the BGP label route configuration when the matching route is a RFC 3107 label route or a 6PE route.

When a packet is received on one VPRN instance and is redirected using Policy Based Routing (PBR) to be forwarded in another VPRN instance, the TTL propagation is governed by the configuration of the outgoing VPRN instance.

Default 

vprn-local vc-only

Parameters 
none—
The TTL of the IP packet is not propagated into the VC label or labels in the transport label stack
vc-only—
The TTL of the IP packet is propagated into the VC label and not into the labels in the transport label stack.
all—
The TTL of the IP packet is propagated into the VC label and all labels in the transport label stack.

vprn-transit

Syntax 
vprn-transit [all | vc-only | none]
Context 
config>router>ttl-propagate
Description 

This command configures the TTL propagation for in transit packets which are forwarded over a MPLS LSPs in all VPRN service contexts. For vpn-ipv4 and vpn-ipv6 packets forwarded in the context of all VPRN services in the system, including 6VPE packets, the all value of the command enables TTL propagation from the IP header into all labels in the stack:

The user can enable the TTL propagation behavior separately for locally generated packets by CPM (vprn-local) and for user and control packets in transit at the node (vprn-transit).

The vc-only value reverts to the default behavior by which the IP TTL is propagated into the VC label but not to the transport labels in the stack. The user can explicitly set the default behavior by configuring the vc-only value. This command does not have a no version.

The value none allows the user to disable the propagation of the IP TTL to all labels in the stack, including the VC label. This is needed for a transparent operation of UDP trace-route in VPRN inter-AS option B such that the ingress and egress ASBR nodes are not traced.

The user can override the global configuration within each VPRN service instance using the following commands:

  1. config service vprn ttl-propagate local [inherit | none | vc-only | all]
  2. config service vprn ttl-propagate transit [inherit | none | vc-only | all]

The default behavior for a given VPRN instance is to inherit the global configuration for the same command. The user can explicitly set the default behavior by configuring the inherit value.

When a packet is received in a VPRN context but is looked up in the Global Routing Table (GRT), for example, leaking to GRT is enabled, the behavior of the TTL propagation is governed by the RSVP or LDP shortcut configuration when the matching routing is a LSP shortcut route. It is governed by the BGP label route configuration when the matching route is a RFC 3107 label route or a 6PE route.

When a packet is received on one VPRN instance and is redirected using Policy Based Routing (PBR) to be forwarded in another VPRN instance, the TTL propagation is governed by the configuration of the outgoing VPRN instance

Default 

vprn-transit vc-only

Parameters 
none—
The TTL of the IP packet is not propagated into the VC label or labels in the transport label stack
vc-only—
The TTL of the IP packet is propagated into the VC label and not into the labels in the transport label stack.
all—
The TTL of the IP packet is propagated into the VC label and all labels in the transport label stack.

Router L2TP Commands

Router L2TP commands only apply to the 7750 SR and 7450 ESS.

l2tp

Syntax 
l2tp
Context 
config>router
Description 

This command enables the context to configure L2TP parameters. L2TP extends the PPP model by allowing Layer 2 and PPP endpoints to reside on different devices interconnected by a packet-switched network.

Default 

n/a

calling-number-format

Syntax 
calling-number-format ascii-spec
no calling-number-format
Context 
config>router>l2tp
Description 

This command what string to put in the Calling Number AVP, for L2TP control messages related to a session in this L2TP protocol instance.

Default 

calling-number-format "%S %s"

Parameters 
ascii-spec—
specifies the L2TP calling number AVP
Values—

ascii-spec

char-specification ascii-spec

char-specification

ascii-char | char-origin

ascii-char

a printable ASCII character

char-origin

%origin

origin

S | c | r | s | l

S

system name, the value of TIMETRA-CHASSIS-MIB::tmnxChassisName

c

Agent Circuit Id

r

Agent Remote Id

s

SAP ID, formatted as a character string

l

Logical Line ID

eth-tunnel

Syntax 
eth-tunnel
Context 
config>router>l2tp
Description 

This command enables the context to configure Ethernet tunnel client parameters.

Default 

N/A

reconnect-timeout

Syntax 
reconnect-timeout seconds
no reconnect-timeout
Context 
config>router>l2tp>eth-tunnel
Description 

This command configures the number of seconds that the Ethernet tunnel client of L2TPv3 waits before attempting to re-establish a new session after a session setup fails or a session closes.

The no form of the command returns reconnect-timeout to an infinite timeout value, meaning that reconnection will not be attempted by the local client.

Default 

no reconnect-timeout  (infinite timeout)

Parameters 
seconds—
Specifies the number of seconds before a session reconnection is attempted after a previous session or session setup fails
Values—
10 to 3600

exclude-avps

Syntax 
exclude-avps calling-number
no exclude-avps
Context 
config>router>l2tp
Description 

This command configures the L2TP AVPs to exclude.

Default 

no exclude-avps

l2tpv3

Syntax 
l2tpv3
Context 
config>router>l2tp
config>router>l2tp>group
Description 

This command enables the context to configure L2TPv3 parameters.

Default 

n/a

cookie-length

Syntax 
cookie-length {4 | 8 | none}
no cookie-length
Context 
config>router>l2tp>l2tpv3
config>router>l2tp>group>l2tpv3
Description 

This command configures the length of the optional cookie field.

The no form of the command returns the cookie-length to a default of none.

Default 

no cookie-length

Parameters 
4—
Specifies the cookie length as 4 bytes
8—
Specifies the cookie length as 8 bytes
none—
Specifies that no cookie field should be included

digest-type

Syntax 
digest-type {none | md5 | sha1}
no digest-type
Context 
config>router>l2tp>l2tpv3
config>router>l2tp>group>l2tpv3
Description 

This command configures the hashing algorithm used to calculate the message digest.

The no form of the command returns the digest-type to none.

Default 

no digest-type

Parameters 
none—
Specifies that no digest should be used
md5—
Specifies that the MD5 algorithm should be used
sha1—
Specifies that the SHA1 algorithm should be used

nonce-length

Syntax 
nonce-length {length | none}
no nonce-length
Context 
config>router>l2tp>l2tpv3
config>router>l2tp>group>l2tpv3
Description 

This command configures the length for the local L2TPv3 nonce (random number) value used in the Nonce AVP.

The no form of the command returns the nonce-length to a default of none.

Default 

no nonce-length

Parameters 
length—
Specifies the length of the Nonce AVP value
Values—
16 to 64
none—
Specifies that no Nonce AVP is included

rem-router

Syntax 
rem-router-id ip-addr
no rem-router-id
Context 
config>router>l2tp>group>l2tpv3
Description 

This command configures the IP address that should be used within the Remote Router-ID AVP.

The no form of this command removes the configured IP address.

Default 

no rem-router-id

Parameters 
ip-addr—
Specifies an IP address to be used within the Remote Router-ID AVP

pw-cap-list

Syntax 
pw-cap-list {ethernet | ethernet-vlan}
no pw-cap-list
Context 
config>router>l2tp>group>l2tpv3
Description 

This command configures the allowable pseudowire capability list that is advertised to the far end. An empty list results in both pseudowire capabilities being advertised.

The no form of this command removes the list and advertises both pseudowire capabilities to the far end.

Default 

no pw-cap-list

Parameters 
ethernet—
Specifies that the Ethernet pseudo-wire type is advertised
ethernet-vlan—
Specifies that the Ethernet-VLAN pseudo-wire type is advertised. This parameter is only supported in SR OS Release 14.0 R4 or later.

track-password-change

Syntax 
[no] track-password-change
Context 
config>router>l2tp>group>l2tpv3
Description 

This command enables tracking of password changes, allowing password tunnel passwords to be changed without bringing down active tunnels or sessions. This is only supported with L2TPv3.

The no form of the command disables password change tracking.

Default 

no track-password-change

transport-type

Syntax 
transport-type ip
no transport-type
Context 
config>router>l2tp>l2tpv3
config>router>l2tp>group>l2tpv3
Description 

This command configures the transport type to be used to carry the L2TPv3 tunnel. Currently, only IP transport is supported.

The no form of this command returns the transport-type to the default value.

Default 

no transport-type

Parameters 
ip—
Specifies that IP should be used as the transport type for the L2TPv3 tunnel

next-attempt

Syntax 
next-attempt {same-preference-level | next-preference-level}
no next-attempt
Context 
config>router>l2tp
config>service>vprn>l2tp
Description 

This command enables tunnel selection algorithm based on the tunnel preference level.

Default 

n/a

Parameters 
same-preference-level—
In case that the tunnel-spec selection algorithm evaluates into a tunnel that is currently unavailable (for example tunnel in a blacklist) then the next elected tunnel, if available, will be chosen within the same preference-level as the last attempted tunnel. Only when all tunnels within the same preference level are exhausted, the tunnel selection algorithm will move to the next preference level.

In case that a new session setup request is received while all tunnels on the same preference level are blacklisted, the L2TP session will try to be established on blacklisted tunnels before the tunnel selection moves to the next preference level.

next-preference-level —
In case that the tunnel-spec selection algorithm evaluates into a tunnel that is currently unavailable (for example tunnel in a blacklist) then the selection algorithm will try to select the tunnel from the next preference level, even though the tunnels on the same preference level might be available for selection.
Values—
next-preference-level

replace-result-code

Syntax 
replace-result-code code [code...(upto 3 max)]
no replace-result-code
Context 
config>router>l2tp
config>service>vprn>l2tp
Description 

This command will replace CDN Result-Code 4, 5 and 6 on LNS with the Result Code 2. This is needed for interoperability with some implementation of LAC which only take action based on CDN Result-Code 2, while ignore CDN Result-Code 4, 5 and 6.

Default 

no replace-result-code 

Parameters 
code—
specifies the L2TP Result codes that need to be replaced
Values—
cdn-tmp-no-facilities — CDN Result-Code 4 on LNS will be replaced with the result code 2 before it is sent to LAC.
cdn-prem-no-facilities — CDN Result-Code 5 on LNS will be replaced with the result code 2 before it is sent to LAC.
cdn-inv-dest — CDN Result-Code 6 on LNS will be replaced with the result code 2 before it is sent to LAC.

tunnel-selection-blacklist

Syntax 
tunnel-selection-blacklist
Context 
config>router>l2tp
Description 

This command enables the context to configure L2TP Tunnel Selection Blacklist parameters.

Default 

n/a

add-tunnel

Syntax 
add-tunnel never
add-tunnel on reason [reason...(upto 8 max)]
no add-tunnel
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command will force the tunnel to the blacklist and render it unavailable for new sessions for the duration of preconfigured time. Peers are always forced to the black list in case that they time out (failure to receive response to control packets). In addition to time outs, certain events can be used to trigger placement of the tunnel on the black list.

Default 

add-tunnel never

Parameters 
reason—
specifies the return codes or events that determine which tunnels are added to the blacklist
Table 7:  Return codes 

Return code

Tunnels added to blacklist

cdn-err-code

A tunnel will be forced to the blacklist in case that CDN message with the Result Code 2 (Call disconnected for the reasons indicated in error code) is received.

cdn-inv-dest

A tunnel will be forced to the blacklist in case that CDN message with the Result Codes 6 (Invalid destination) is received.

cdn-tmp-no-facilities

A tunnel will be forced to the blacklist in case that CDN message with the Result Code 4 is received (Call failed due to lack of appropriate facilities being available - temporary condition) is received.

cdn-perm-no-facilities

A tunnel will be forced to the blacklist in case that CDN message with the Result Codes 5 (Call failed due to lack of appropriate facilities being available - permanent condition) is received.

tx-cdn-not-established-in-time

A tunnel will be forced to the blacklist in case that CDN message with the Result Code 10 (Call was not established within time allotted by LAC) is sent from the LAC to the LNS.

stop-ccn-err-code

A tunnel will be forced to the blacklist in case that StopCCN message with the Result Code 2 (General error – Error Code indicates the problem) is sent or received.

stop-ccn-other

A tunnel will be forced to the blacklist in case that StopCCN message with the following Result Codes is received:

(1) General request to clear control connection

(4) Requester is not authorized to establish a control channel

(5) Protocol version not supported

(6) Requester is being shutdown

Or in the case that the StopCCN with the following result codes is transmitted:

(4) Requester is not authorized to establish a control channel.

(5) Protocol version not supported

The receipt of the following Result Codes will NEVER blacklist a tunnel:

(0) Reserved

(3) Control channel already exist

(7) Finite state machine error

(8) Undefined

Transmission of the following Result Codes will NEVER blacklist a tunnel:

(1) General request to clear control connection

(3) Control channel already exist

(6) Requester is being shutdown

(7) Finite state machine error

addr-change-timeout

A timed-out tunnel for which the peer IP address has changed mid-session (from the one that is provided initially during configuration) will be forced to the blacklist. In absence of this configuration option, only the configured peer for the tunnel will be blacklisted, but not the tunnel itself which now has a different peer address than the one initially configured.

never—
When specified, no tunnels will be placed on blacklist under any circumstance. This parameter will available to preserve backward compatibility.

max-list-length

Syntax 
max-list-length unlimited
max-list-length count
no max-list-length
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command configured the maximum length of the peer/tunnel blacklist.

This command specifies how many items (tunnels or peers) can be in the tunnel-selection-blacklist. If a tunnel or peer needs to be added to the tunnel-selection-blacklist and the tunnel-selection-blacklist is full, the system will remove the item (tunnel or peer) from the blacklist that was in this blacklist for the longest time.

Default 

max-list-length unlimited

Parameters 
unlimited—
specifies there is no limit
count—
specifies how many items (tunnels or peers) can be in the tunnel-selection-blacklist
Values—
1 to 65635

max-time

Syntax 
max-time minutes
no max-time
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command configures time for which an entity (peer or a tunnel) are kept in the blacklist.

Default 

max-time 5

Parameters 
minutes—
specifies the maximum time a tunnel or peer may remain in the blacklist
Values—
1 to 60

timeout-action

Syntax 
timeout-action action
no timeout-action
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command defines an action that will be executed on the entity (peer/tunnel) in the blacklist once the entity becomes eligible for selection again.

Default 

timeout-action remove-from-blacklist

Parameters 
action —
specifies the Action to be taken when a tunnel or peer has been in the blacklist for the max-period of time
Values—
remove-from-blacklist — The peer or tunnel in the blacklist will be removed completely from the blacklist and made eligible for the selection process once the max-time expires. In this mode of operation, multiple new sessions can be mapped into the same, newly released tunnel from the blacklist. The first such session will try to setup the tunnel, while the other will be buffered until the tunnel establishment process is completed. In case that the tunnel remains unavailable, it will be placed in the blacklist again. Consequently all new sessions will have be renegotiated over an alternate tunnel.
try-one-session — Once the max-time expired, the peer or tunnel in the blacklist is made available for selection only to a single new session request. Only upon successful tunnel establishment will the incoming new sessions be eligible to be mapped into this tunnel. This behavior will avoid session establishment delays in case that the tunnel just removed from the blacklist is still unavailable.

peer-address-change-policy

Syntax 
peer-address-change-policy {accept | ignore | reject}
Context 
config>router>l2tp
Description 

This command specifies what to do in case the system receives a L2TP response from another address than the one the request was sent to.

Default 

peer-address-change-policy reject

Parameters 
accept—
specifies that this system accepts any source IP address change of received L2TP control messages related to a locally originated tunnel in the state waitReply and rejects any peer address change for other tunnels; in case the new peer IP address is accepted, it is learned and used as destination address in subsequent L2TP messages.
ignore—
specifies that this system ignores any source IP address change of received L2TP control messages, does not learn any new peer IP address and does not change the destination address in subsequent L2TP messages
reject—
specifies that this system rejects any source IP address change of received L2TP control messages and drops those messages

receive-window-size

Syntax 
receive-window-size [4 to 1024]
no receive-window-size
Context 
config>router>l2tp
Description 

This command configures the L2TP receive window size.

Default 

receive-window-size 64

session-limit

Syntax 
session-limit session-limit
no session-limit
Context 
config>router>l2tp
Description 

This command configures the L2TP session limit of this router.

Default 

no session-limit

Parameters 
session-limit—
specifies the session limit
Values—
1 to 131071

group

Syntax 
group tunnel-group-name [create]
no group tunnel-group-name
Context 
config>router>l2tp
Description 

This command configures an L2TP tunnel group.

Default 

n/a

Parameters 
tunnel-group-name—
specifies a name string to identify a L2TP group up to 63 characters in length
create—
mandatory keyword when creating a tunnel group name. The create keyword requirement can be enabled/disabled in the environment>create context.

session-limit

Syntax 
session-limit session-limit
no session-limit
Context 
config>router>l2tp
Description 

This command configures the L2TP session limit for the router. L2TP is connection-oriented. The L2TP Network Server (LNS) and LAC maintain state for each call that is initiated or answered by an LAC. An L2TP session is created between the LAC and LNS when an end-to-end PPP connection is established between a remote system and the LNS. Datagrams related to the PPP connection are sent over the tunnel between the LAC and LNS. There is a one to one relationship between established L2TP sessions and their associated calls.

Default 

no session-limit

Parameters 
session-limit—
specifies the number of sessions allowed
Values—
no session-limit
Values—
1 to 131071

avp-hiding

Syntax 
avp-hiding sensitive | always
no avp-hiding
Context 
config>router>l2tp>group
Description 

This command configures Attribute Value Pair (AVP) hiding. This capability can be used to avoid the passing of sensitive data, such as user passwords, as cleartext in an AVP.

The no form of the command returns the value to never allow AVP hiding.

Default 

no avp-hiding

Parameters 
avp-hiding—
specifies the method to be used for the authentication of the tunnels in this L2TP group
Values—
no avp-hiding
Values—
sensitive — AVP hiding is used only for sensitive information (such as username/password)
always — AVP hiding is always used

challenge

Syntax 
challenge always
no challenge
Context 
config>router>l2tp>group
Description 

This command configures the use of challenge-response authentication.

The no form of the command reverts to the default never value.

Default 

no challenge

Parameters 
always—
specifies that the challenge-response authentication is always used
Values—
no challenge
Values—
always

df-bit-lac

Syntax 
df-bit-lac {always | never}
no df-bit-lac
Context 
config>router>l2tp
config>service>vprn>l2tp
Description 

By default, the LAC df-bit-lac is always set and sends all L2TP packets with the DF bit set to 1. The DF bit is configurable to allow downstream routers to fragment the L2TP packets. The LAC itself will not fragment L2TP packets. L2TP packets that have a larger MTU size than what the LAC egress ports allows are dropped.

Default 

df-bit-lac always

Parameters 
always—
specifies that the LAC will send all L2TP packets with the DF bit set to 1
never—
specifies that the LAC will send all L2TP packets with the DF bit set to 0

df-bit-lac

Syntax 
df-bit-lac {always | never | default}
no df-bit-lac
Context 
config>router/service>vprn>l2tp>group
config>router/service>vprn>l2tp>group>tunnel
Description 

By default, the LAC df-bit-lac is set to default and sends all L2TP packets with the DF bit set to 1. The DF bit is configurable to allow downstream routers to fragment the L2TP packets. The LAC itself will not fragment L2TP packets. L2TP packets that have a larger MTU size than what the LAC egress ports allows are dropped. The configuration of the df-bit can be overridden at different levels: l2tp, tunnel, and group. The configuration at the tunnel level overrides the configuration on both group and l2tp. The configuration at the group level overrides the configuration on l2tp.

Default 

df-bit-lac default

Parameters 
always—
specifies that the LAC will send all L2TP packets with the DF bit set to 1
never—
specifies that the LAC will send all L2TP packets with the DF bit set to 0
default—
Follows the DF-bit configuration specified on upper levels

destruct-timeout

Syntax 
destruct-timeout destruct-timeout
no destruct-timeout
Context 
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command configures the period of time that the data of a disconnected tunnel will persist before being removed.

The no form of the command removes the value from the configuration.

Default 

no destruct-timeout

Parameters 
destruct-timeout—
specifies the automatic removal of dynamic L2TP sessions, in seconds, that are no longer active
Values—
no destruct-timeout
Values—
60 to 86400

hello-interval

Syntax 
hello-interval hello-interval
no hello-interval
Context 
config>router>l2tp>group
Description 

This command configures the time interval between two consecutive tunnel Hello messages. The Hello message is an L2TP control message sent by either peer of a LAC-LNS control connection. This control message is used as a keepalive for the tunnel.

The no form of the command removes the interval from the configuration.

Default 

no hello-interval

Parameters 
hello-interval—
specifies the time interval, in seconds, between two consecutive tunnel Hello messages
Values—
no hello-interval
Values—
60 to 3600

idle-timeout

Syntax 
idle-timeout idle-timeout
no idle-timeout
Context 
config>router>l2tp>group
Description 

This command configures the period of time that an established tunnel with no active sessions will persist before being disconnected.

Enter the no form of the command to maintain a persistent tunnel.

The no form of the command removes the idle timeout from the configuration.

Default 

no idle-timeout

Parameters 
idle-timeout—
specifies the idle timeout value, in seconds until the group is removed
Values—
no idle-timeout
Values—
0 to 3600

lns-group

Syntax 
lns-group lns-group-id
no lns-group
Context 
config>router>l2tp>group
Description 

This command configures the ISA LNS group.

Default 

no lns-group

Parameters 
lns-group-id—
specifies the LNS group ID
Values—
1 to 4

load-balance-method

Syntax 
load-balance-method {per-session | per-tunnel}
no load-balance-method
Context 
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command describes how new sessions are assigned to an L2TP ISA MDA.

Default 

load-balance-method per-session

Parameters 
per-session—
specifies that the lowest granularity for load-balancing is a session; each session can be assigned to a different

ISA MDA.

per-tunnel—
specifies that the lowest granularity for load-balancing is a tunnel; all sessions associated with the same tunnel are assigned to the same ISA MDA; this may be useful or required in certain cases, for example:

MLPPP with multiple links per bundle;

HPol intermediate destination arbiters where the intermediate destination is an L2TP tunnel.

local-address

Syntax 
local-address ip-address
no local-address
Context 
config>router>l2tp>group>tunnel
Description 

This command configures the local address.

Default 

no local-address

Parameters 
ip-address—
specifies the IP address used during L2TP authentication

local-name

Syntax 
local-name host-name
no local-name
Context 
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command creates the local host name used by this system for the tunnels in this L2TP group during the authentication phase of tunnel establishment. It can be used to distinguish tunnels.

The no form of the command removes the name from the configuration.

Default 

no local-name

Parameters 
host-name—
specifies the host name, up to 64 characters in length, that the router will use to identify itself during L2TP authentication
Values—
no local-name

max-retries-estab

Syntax 
max-retries-estab max-retries
no max-retries-estab
Context 
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command configures the number of retries allowed for this L2TP tunnel while it is established, before its control connection goes down.

The no form of the command removes the value from the configuration.

Default 

no max-retries-estab

Parameters 
max-retries—
specifies the maximum number of retries for an established tunnel
Values—
no max-retries-estab
Values—
2 to 7

max-retries-not-estab

Syntax 
max-retries-not-estab max-retries
no max-retries-not-estab
Context 
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command configures the number of retries allowed for this L2TP tunnel while it is not established, before its control connection goes down.

The no form of the command removes the value from the configuration.

Default 

no max-retries-not-estab

Parameters 
max-retries—
specifies the maximum number of retries for non-established tunnels
Values—
no max-retries-not-estab
Values—
2 to 7

password

Syntax 
password password [hash | hash2]
no password
Context 
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command configures the password between L2TP LAC and LNS

The no form of the command removes the password.

Default 

no password

Parameters 
password —
Configures the password used for challenge/response calculation and AVP hiding. The maximum length can be up to 20 characters if unhashed, 32 characters if hashed, 54 characters if the hash2 keyword is specified.
hash—
specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

ppp

Syntax 
ppp
Context 
config>router>l2tp>group
Description 

This command configures PPP for the L2TP tunnel group.

Default 

n/a

authentication

Syntax 
authentication {chap | pap | pref-chap | prep-pap}
Context 
config>router>l2tp>group>ppp
Description 

This command configures the PPP authentication protocol to negotiate authentication.

Default 

authentication pref-chap

Parameters 
chap—
specifies to always use CHAP for authentication
pap—
specifies to always use PAP for authentication
pref-chap—
specifies to use CHAP as the preferred authentication method, and to use PAP if that attempt fails
pref-pap—
specifies to use PAP as the preferred authentication method, and to use CHAP if that attempt fails

authentication-policy

Syntax 
authentication-policy auth-policy-name
no authentication-policy
Context 
config>router>l2tp>group>ppp
Description 

This command configures the authentication policy.

Default 

no authentication-policy

Parameters 
auth-policy-name—
specifies the authentication policy name
Values—
32 chars max

default-group-interface

Syntax 
default-group-interface ip-int-name service-id service-id
no default-group-interface
Context 
config>router>l2tp>group>ppp
Description 

This command configures the default group interface.

Default 

no default-group-interface

Parameters 
ip-int-name—
specifies the interface name
Values—
32 chars max
service-id—
specifies the service ID
Values—
1 to 2147483648
svc-name—
specifies the service name (instead of service ID)
Values—
64 chars max

keepalive

Syntax 
keepalive seconds [hold-up-multiplier multiplier]
no keepalive
Context 
config>router>l2tp>group>ppp
Description 

This command configures the PPP keepalive interval and multiplier.

Default 

keepalive 30 hold-up-multiplier 3

Parameters 
seconds—
specifies in seconds the interval
Values—
10 to 300
multiplier—
specifies the multiplier
Values—
1 to 5

mtu

Syntax 
mtu mtu-bytes
no mtu
Context 
config>router>l2tp>group>ppp
Description 

This command configures the maximum PPP MTU size.

Default 

mtu 1500

Parameters 
mtu-bytes—
specifies, in bytes, the maximum PPP MTU size
Values—
512 to 9212

proxy-authentication

Syntax 
[no] proxy-authentication
Context 
config>router>l2tp>group>ppp
Description 

This command configures the use of the authentication AVPs received from the LAC.

Default 

no proxy-authentication

proxy-lcp

Syntax 
[no] proxy-lcp
Context 
config>router>l2tp>group>ppp
Description 

This command configures the use of the proxy LCP AVPs received from the LAC.

Default 

no proxy-lcp

user-db

Syntax 
user-db local-user-db-name
no user-db
Context 
config>router>l2tp>group>ppp
Description 

This command configures the local user database to use for PPP PAP/CHAP authentication.

Default 

no user-db

Parameters 
local-user-db-name—
specifies the local user database name
Values—
32 chars max

session-assign-method

Syntax 
session-assign-method [existing-first | weighted | weighted-random]
no session-assign-method
Context 
config>router>l2tp>group
Description 

This command specifies how new sessions are assigned to one of the set of suitable tunnels that are available or could be made available.

Default 

existing-first

Parameters 
existing-first—
specifies that all new sessions are placed by preference in the existing tunnels.
weighted—
specifies that the sessions are shared between the available tunnels. If necessary, new tunnels are set up until the maximum number is reached. The distribution aims at an equal ratio of the actual number of sessions to the maximum number of sessions.
weighted-random—
enhances the weighted algorithm such that when there are multiple tunnels with an equal number of sessions (equal weight), LAC randomly selects a tunnel.

session-limit

Syntax 
session-limit session-limit
no session-limit
Context 
config>router>l2tp>group
config>router>l2tp>group>tunnel
Description 

This command configures the session limit. The value controls how many L2TP session will be allowed within a given context (system, group, tunnel).

The no form of the command removes the value from the configuration.

Default 

no session-limit

Parameters 
session-limit—
specifies the allowed number of sessions within the given context
Values—
1 to 131071

Router L2TP Tunnel Commands

Router L2TP tunnel commands only apply to the 7750 SR and 7450 ESS.

tunnel

Syntax 
tunnel tunnel-name [create]
no tunnel tunnel-name
Context 
config>router>l2tp>group
Description 

This command configures an L2TP tunnel. A tunnel exists between a LAC-LNS pair and consists of a Control Connection and zero or more L2TP sessions. The tunnel carries encapsulated PPP datagrams and control messages between the LAC and the L2TP Network Server (LNS).

Default 

n/a

Parameters 
tunnel-name—
specifies a valid string to identify a L2TP up to 32 characters in length
create—
mandatory while creating a new tunnel

auto-establish

Syntax 
[no] auto-establish
Context 
config>router>l2tp>group>tunnel
Description 

This command specifies if this tunnel is to be automatically set up by the system.

Default 

no auto-establish

avp-hiding

Syntax 
avp-hiding {never | sensitive | always}
no avp-hiding
Context 
config>router>l2tp>group>tunnel
Description 

This command configures Attribute Value Pair (AVP) hiding. This capability can be used to avoid the passing of sensitive data, such as user passwords, as cleartext in an AVP.

It is recommended that sensitive information not be sent in clear text.

The no form of the command removes the parameter of the configuration and indicates that the value on group level will be taken.

Default 

no avp-hiding

Parameters 
avp-hiding—
specifies the method to be used for the authentication of the tunnel
Values—
never — AVP hiding is not used.
sensitive — AVP hiding is used only for sensitive information (such as username/password).
always — AVP hiding is always used.

challenge

Syntax 
challenge challenge-mode
no challenge
Context 
config>router>l2tp>group>tunnel
Description 

This command configures the use of challenge-response authentication.

The no form of the command removes the parameter from the configuration and indicates that the value on group level will be taken.

Default 

no challenge

Parameters 
challenge-mode—
specifies when challenge-response is to be used for the authentication of the tunnel
Values—
always — Always allows the use of challenge-response authentication.
never — Never allows the use of challenge-response authentication.

hello-interval

Syntax 
hello-interval hello-interval
hello-interval infinite
no hello-interval
Context 
config>router>l2tp>group>tunnel
Description 

This command configures the number of seconds between sending Hellos for a L2TP tunnel. The no form removes the parameter from the configuration and indicates that the value on group level will be taken.

Default 

no hello-interval

Parameters 
hello-interval—
specifies the time interval, in seconds, between two consecutive tunnel Hello messages
Values—
60 to 3600
infinite—
specifies that no hello messages are sent

idle-timeout

Syntax 
idle-timeout idle-timeout
idle-timeout infinite
no idle-timeout
Context 
config>router>l2tp>group>tunnel
Description 

This command configures the idle timeout to wait before being disconnect. The no form indicates that the parameter will be removed from the configuration and that the value specified on group level will be taken.

Default 

no idle-timeout

Parameters 
idle-timeout—
specifies the idle timeout, in seconds
Values—
0 to 3600
infinite—
specifies that the tunnel will not be closed when idle

peer

Syntax 
peer ip-address
no peer
Context 
config>router>l2tp>group>tunnel
Description 

This command configures the peer address.

The no form of the command removes the IP address from the tunnel configuration.

Default 

no peer

Parameters 
ip-address—
Sets the LNS IP address for the tunnel.

preference

Syntax 
preference preference
no preference
Context 
config>router>l2tp>group>tunnel
Description 

This command configures a preference number that indicates the relative preference assigned to a tunnel when using a weighted session assignment.

The no form of the command removes the preference value from the tunnel configuration.

Default 

no preference

Parameters 
preference—
specifies the tunnel preference number with its group. The value 0 corresponds to the highest preference.
Values—
0 to 16777215

remote-name

Syntax 
remote-name host-name
no remote-name
Context 
config>router>l2tp>group>tunnel
Description 

This command configures a string to be compared to the host name used by the tunnel peer during the authentication phase of tunnel establishment.

Default 

no remote-name

Parameters 
host-name—
specifies a remote host name for the tunnel up to 64 characters in length

tunnel-selection-blacklist

Syntax 
tunnel-selection-blacklist
Context 
config>router>l2tp
Description 

This command enables the context to configure L2TP Tunnel Selection Blacklist parameters.

Default 

n/a

add-tunnel

Syntax 
add-tunnel never
add-tunnel on reason [reason...(upto 8 max)]
no add-tunnel
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command will force the tunnel to the blacklist and render it unavailable for new sessions for the duration of preconfigured time. Peers are always forced to the black list in case that they time out (failure to receive response to control packets). In addition to time outs, certain events can be used to trigger placement of the tunnel on the black list.

Default 

add-tunnel never

Parameters 
reason—
specifies the return codes or events that determine which tunnels are added to the blacklist

cdn-err-code

A tunnel will be forced to the blacklist in case that CDN message with the Result Code 2 (Call disconnected for the reasons indicated in error code) is received.

cdn-inv-dest

A tunnel will be forced to the blacklist in case that CDN message with the Result Codes 6 (Invalid destination) is received.

cdn-tmp-no-facilities

A tunnel will be forced to the blacklist in case that CDN message with the Result Code 4 is received (Call failed due to lack of appropriate facilities being available - temporary condition) is received.

cdn-perm-no-facilities

A tunnel will be forced to the blacklist in case that CDN message with the Result Codes 5 (Call failed due to lack of appropriate facilities being available - permanent condition) is received.

tx-cdn-not-established-in-time

A tunnel will be forced to the blacklist in case that CDN message with the Result Code 10 (Call was not established within time allotted by LAC) is sent from the LAC to the LNS.

stop-ccn-err-code

A tunnel will be forced to the blacklist in case that StopCCN message with the Result Code 2 (General error – Error Code indicates the problem) is sent or received.

stop-ccn-other

A tunnel will be forced to the blacklist in case that StopCCN message with the following Result Codes is received:

(1) General request to clear control connection

(4) Requester is not authorized to establish a control channel

(5) Protocol version not supported

(6) Requester is being shutdown

Or in the case that the StopCCN with the following result codes is transmitted:

(4) Requester is not authorized to establish a control channel.

(5) Protocol version not supported

The receipt of the following Result Codes will NEVER blacklist a tunnel:

(0) Reserved

(3) Control channel already exist

(7) Finite state machine error

(8) Undefined

Transmission of the following Result Codes will NEVER blacklist a tunnel:

(1) General request to clear control connection

(3) Control channel already exist

(6) Requester is being shutdown

(7) Finite state machine error

addr-change-timeout

A timed-out tunnel for which the peer IP address has changed mid-session (from the one that is provided initially during configuration) will be forced to the blacklist. In absence of this configuration option, only the configured peer for the tunnel will be blacklisted, but not the tunnel itself which now has a different peer address than the one initially configured.

never—
When specified, no tunnels will be placed on blacklist under any circumstance. This parameter will available to preserve backward compatibility.

max-list-length

Syntax 
max-list-length unlimited
max-list-length count
no max-list-length
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command configured the maximum length of the peer/tunnel blacklist.

This command specifies how many items (tunnels or peers) can be in the tunnel-selection-blacklist. If a tunnel or peer needs to be added to the tunnel-selection-blacklist and the tunnel-selection-blacklist is full, the system will remove the item (tunnel or peer) from the blacklist that was in this blacklist for the longest time.

Default 

max-list-length unlimited

Parameters 
unlimited—
specifies there is no limit
count—
specifies how many items (tunnels or peers) can be in the tunnel-selection-blacklist
Values—
1 to 65635

max-time

Syntax 
max-time minutes
no max-time
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command configures time for which an entity (peer or a tunnel) are kept in the blacklist.

Default 

max-time 5

Parameters 
minutes—
specifies the maximum time a tunnel or peer may remain in the blacklist
Values—
1 to 60

timeout-action

Syntax 
timeout-action action
no timeout-action
Context 
config>router>l2tp>tunnel-selection-blacklist
config>service>vprn>l2tp>tunnel-selection-blacklist
Description 

This command defines an action that will be executed on the entity (peer/tunnel) in the blacklist once the entity becomes eligible for selection again.

Default 

timeout-action remove-from-blacklist

Parameters 
action —
specifies the Action to be taken when a tunnel or peer has been in the blacklist for the max-period of time
Values—
remove-from-blacklist — The peer or tunnel in the blacklist will be removed completely from the blacklist and made eligible for the selection process once the max-time expires. In this mode of operation, multiple new sessions can be mapped into the same, newly released tunnel from the blacklist. The first such session will try to setup the tunnel, while the other will be buffered until the tunnel establishment process is completed. In case that the tunnel remains unavailable, it will be placed in the blacklist again. Consequently all new sessions will have be renegotiated over an alternate tunnel.
try-one-session — Once the max-time expired, the peer or tunnel in the blacklist is made available for selection only to a single new session request. Only upon successful tunnel establishment will the incoming new sessions be eligible to be mapped into this tunnel. This behavior will avoid session establishment delays in case that the tunnel just removed from the blacklist is still unavailable.

Router Interface Commands

interface

Syntax 
[no] interface ip-int-name [unnumbered-mpls-tp]
[no] interface ip-int-name gmpls-loopback
Context 
config>router
Description 

This command creates a logical IP routing or unnumbered MPLS-TP interface. Once created, attributes like IP address, port, or system can be associated with the IP interface.

Interface names are case-sensitive and must be unique within the group of IP interfaces defined for config router interface and config service ies interface. Interface names must not be in the dotted decimal notation of an IP address.; for example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either the interface names or the IP addresses. Ambiguity can exist if an IP address is used as an IP address and an interface name. Duplicate interface names can exist in different router instances, although this is not recommended because it is confusing.

When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.

Although not a keyword, the ip-int-name “system” is associated with the network entity (such as a specific router), not a specific interface. The system interface is also referred to as the loopback address.

An unnumbered MPLS-TP interface is a special type of interface that is only intended for MPLS-TP LSPs. IP routing protocols are blocked on interfaces of this type. If an interface is configured as unnumbered-mpls-tp, then it can only be associated with an Ethernet port or VLAN, using the port command, then either a unicast, multicast, or broadcast remote MAC address may be configured. Only static ARP is supported.

A GMPLS loopback interface is a special type of loopback interface that is used as the IP interface for a GMPLS IP Control Channel (IPCC). RSVP and LMP packets associated with GMPLS are associated with this loopback interface. All other IP protocols are blocked on this interface. One gmpls-loopback interface is required for each GMPLS peer node.

The no form of the command removes the IP interface and all the associated configurations. The interface must be administratively shut down before issuing the no interface command.

Default 

No interfaces or names are defined within the system.

Parameters 
ip-int-name—
The name of the IP interface. Interface names must be unique within the group of defined IP interfaces for config router interface and config service ies interface commands. An interface name cannot be in the form of an IP address. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
Values—
1 to 32 alphanumeric characters.
If the ip-int-name already exists, the context is changed to maintain that IP interface. If ip-int-name already exists within another service ID or is an IP interface defined within the config router commands, an error will occur and the context will not be changed to that IP interface. If ip-int-name does not exist, the interface is created and the context is changed to that interface for further command processing.
unnumbered-mpls-tp—
specifies that an interface is of type Unnumbered MPLS-TP. An unnumbered MPLS-TP interface is a special type of interface that is only intended for MPLS-TP LSPs. IP routing protocols are blocked on interfaces of this type. If an interface is configured as unnumbered-mpls-tp, then it can only be associated with an Ethernet port or VLAN, using the port command. Either a unicast, multicast or broadcast remote MAC address may be configured using the static-arp command. Only static ARP is supported.
gmpls-loopback—
specifies that the interface is a loopback interface for GMPLS control plane packets

address

Syntax 
address {ip-address/mask | ip-address netmask} [broadcast all-ones | host-ones] [track-srrp srrp-instance]
no address
Context 
config>router>if
Description 

This command assigns an IP address, IP subnet, and broadcast address format to an IP interface. Only one IP address can be associated with an IP interface.

An IP address must be assigned to each IP interface. An IP address and a mask combine to create a local IP prefix. The defined IP prefix must be unique within the context of the routing instance. It cannot overlap with other existing IP prefixes defined as local subnets on other IP interfaces in the same routing context within the router.

The local subnet that the address command defines must not be part of the services address space within the routing context by use of the config router service-prefix command. Once a portion of the address space is allocated as a service prefix, that portion is not available to IP interfaces for network core connectivity.

The IP address for the interface can be entered in either CIDR (Classless Inter-Domain Routing) or traditional dotted decimal notation. Show commands display CIDR notation and are stored in configuration files.

By default, no IP address or subnet association exists on an IP interface until it is explicitly created.

The no form of the command removes the IP address assignment from the IP interface. Interface specific configurations for MPLS are also removed. This will operationally stop any MPLS LSPs that explicitly reference that IP address. When a new IP address is configured, interface specific configurations for MPLS need to be added. IEEE 1588 port based timestamping configured with ptp-hw-assist is also disabled.

Default 

No IP address is assigned to the IP interface.

Parameters 
ip-address—
The IP address of the IP interface. The ip-addr portion of the address command specifies the IP host address that will be used by the IP interface within the subnet. This address must be unique within the subnet and specified in dotted decimal notation.
Values—
1.0.0.0 to 223.255.255.255
/—
The forward slash is a parameter delimiter that separates the ip-addr portion of the IP address from the mask that defines the scope of the local subnet. No spaces are allowed between the ip-addr, the “/” and the mask-length parameter. If a forward slash does not immediately follow the ip-addr, a dotted decimal mask must follow the prefix.
mask-length—
The subnet mask length when the IP prefix is specified in CIDR notation. When the IP prefix is specified in CIDR notation, a forward slash (/) separates the ip-addr from the mask-length parameter. The mask length parameter indicates the number of bits used for the network portion of the IP address; the remainder of the IP address is used to determine the host portion of the IP address. Allowed values are integers in the range 1— 32. A mask length of 32 is reserved for system IP addresses.
Values—
1 to 32
mask—
The subnet mask in dotted decimal notation. When the IP prefix is not specified in CIDR notation, a space separates the ip-addr from a traditional dotted decimal mask. The mask parameter indicates the complete mask that will be used in a logical ‘AND’ function to derive the local subnet of the IP address. A mask of 255.255.255.255 is reserved for system IP addresses.
Values—
128.0.0.0 to 255.255.255.255
netmask—
The subnet mask in dotted decimal notation.
Values—
0.0.0.0 to 255.255.255.255 (network bits all 1 and host bits all 0)
broadcast {all-ones | host-ones}—
The optional broadcast parameter overrides the default broadcast address used by the IP interface when sourcing IP broadcasts on the IP interface. If no broadcast format is specified for the IP address, the default value is host-ones, which indicates a subnet broadcast address. Use this parameter to change the broadcast address to all-ones or revert back to a broadcast address of host-ones.

The all-ones keyword following the broadcast parameter specifies that the broadcast address used by the IP interface for this IP address will be 255.255.255.255, also known as the local broadcast.

The host-ones keyword following the broadcast parameter specifies that the broadcast address used by the IP interface for this IP address will be the subnet broadcast address. This is an IP address that corresponds to the local subnet described by the ip-addr and the mask-length or mask with all the host bits set to binary 1. This is the default broadcast address used by an IP interface.

The broadcast parameter within the address command does not have a negate feature, which is usually used to revert a parameter to the default value. To change the broadcast type to host-ones after being changed to all-ones, the address command must be executed with the broadcast parameter defined.

The broadcast format on an IP interface can be specified when the IP address is assigned or changed.

This parameter does not affect the type of broadcasts that can be received by the IP interface. A host sending either the local broadcast (all-ones) or the valid subnet broadcast address (host-ones) will be received by the IP interface.

Values—
host-ones
Values—
all-ones, host-ones
track-srrp—
specifies the SRRP instance ID that this interface route needs to track

allow-directed-broadcasts

Syntax 
[no] allow-directed-broadcasts
Context 
config>router>if
Description 

This command enables the forwarding of directed broadcasts out of the IP interface.

A directed broadcast is a packet received on a local router interface destined for the subnet broadcast address of another IP interface. The allow-directed-broadcasts command on an IP interface enables or disables the transmission of packets destined to the subnet broadcast address of the egress IP interface.

When enabled, a frame destined to the local subnet on this IP interface is sent as a subnet broadcast out this interface.

Note:

Allowing directed broadcasts is a well-known mechanism used for denial-of-service attacks.

By default, directed broadcasts are not allowed and are discarded at this egress IP interface.

The no form of the command disables directed broadcasts forwarding out of the IP interface.

Default 

no allow-directed-broadcasts — Directed broadcasts are dropped.

arp-limit

Syntax 
arp-limit limit [log-only] [threshold percent]
no arp-limit
Context 
config>router>if
Description 

This command configures the maximum amount of dynamic IPv4 ARP entries that can be learned on an IP interface.

When the number of dynamic ARP entries reaches the configured percentage of this limit, an SNMP trap is sent. When the limit is exceeded, no new entries are learned until an entry expires and traffic to these destinations will be dropped. Entries that have already been learned will be refreshed.

The no form of the command removes the arp-limit.

Default 

90 percent

Parameters 
log-only—
Enables the warning message to be sent at the specified threshold percentage, and also when the limit is exceeded. However, entries above the limit will be learned.
percent—
The threshold value (as a percentage) that triggers a warning message to be sent.
Values—
0 to 100
limit—
The number of entries that can be learned on an IP interface expressed as a decimal integer. If the limit is set to 0, dynamic ARP learning is disabled and no dynamic ARP entries are learned.
Values—
0 to 524288

arp-timeout

Syntax 
arp-timeout seconds
no arp-timeout
Context 
config>router>if
Description 

This command configures the minimum time, in seconds, an ARP entry learned on the IP interface is stored in the ARP table. ARP entries are automatically refreshed when an ARP request or gratuitous ARP is seen from an IP host. Otherwise, the ARP entry is aged from the ARP table. If the arp-timeout value is set to 0 seconds, ARP aging is disabled.

The no form of the command reverts to the default value.

Default 

14400 seconds (4 hours)

Parameters 
seconds—
The minimum number of seconds a learned ARP entry is stored in the ARP table, expressed as a decimal integer. A value of 0 specifies that the timer is inoperative and learned ARP entries will not be aged.
Values—
0 to 65535

bfd

Syntax 
bfd transmit-interval [receive receive-interval] [multiplier multiplier] [echo-receive echo-interval] [type cpm-np]
no bfd
Context 
config>router>if
config>router>if>ipv6
Description 

This command specifies the bi-directional forwarding detection (BFD) parameters for the associated IP interface. If no parameters are defined the default values are used.

The multiplier specifies the number of consecutive BFD messages that must be missed from the peer before the BFD session state is changed to down and the upper level protocols (OSPF, IS-IS, BGP or PIM) is notified of the fault.

The no form of the command removes BFD from the router interface regardless of the IGP/RSVP.

Important notes: On the 7750 SR and 7950 XRS SR OS, the transmit-interval and receive receive-interval values can only be modified to a value less than 100 ms when:

  1. The type cpm-np option is explicitly configured.
  2. The service is shut down (shutdown)
  3. The interval is specified 10 to 100000.
  4. The service is re-enabled (no shutdown)

To remove the type cpm-np option, re-issue the bfd command without specifying the type parameter.

Default 

no bfd

Parameters 
transmit-interval—
Sets the transmit interval, in milliseconds, for the BFD session.
Values—
10 to 100000 (see Important Notes above) The minimum value is 300 msec for central BFD sessions in the 7950 XRS.
Values—
100
receive receive-interval—
Sets the receive interval, in milliseconds, for the BFD session.
Values—
10 to 100000 (see Important Notes above)
Values—
100
multiplier multiplier—
Set the multiplier for the BFD session.
Values—
3 to 20
Values—
3
echo-receive echo-interval—
Sets the minimum echo receive interval, in milliseconds, for the session.
Values—
100 to 100000
Values—
0
type cpm-np—
Selects the CPM network processor as the local termination point for the BFD session for the 7750 SR and 7950 XRS. See Important Notes, above.

cflowd-parameters

Syntax 
cflowd-parameters
no cflowd-parameters
Context 
config>router>if
Description 

This command creates the configuration context to configure cflowd parameters for the associated IP interfaces.

cflowd is used for network planning and traffic engineering, capacity planning, security, application and user profiling, performance monitoring, usage-based billing, and SLA measurement.

At a minimum, the sampling command must be configured within this context in order to enable cflowd sampling, otherwise traffic sampling will not occur.

Default 

no cflowd-parameters

sampling

Syntax 
sampling {unicast | multicast} type {acl | interface} [direction {ingress-only | egress-only | both}]
no sampling {unicast | multicast}
Context 
config>router>if>cflowd-parameters
Description 

This command enables and configures the cflowd sampling behavior to collect traffic flow samples through a router for analysis.

This command can be used to configure the sampling parameters for unicast and multicast traffic separately. If sampling is not configured for either unicast or multicast traffic, then that type of traffic will not be sampled.

If cflowd is enabled without either egress-only or both specified or with the ingress-only keyword specified, then only ingress sampling will be enabled on the associated IP interface.

The no form of the command disables the associated type of traffic sampling on the associated interface.

Default 

no sampling

Parameters 
unicast—
specifies that the sampling command will control the sampling of unicast traffic on the associated interface/SAP
multicast—
specifies that the sampling command will control the sampling of multicast traffic on the associated interface/SAP
type—
specifies whether the traffic sampling is based on an acl match, or all traffic entering or exiting the associated interface
Values—
acl — specifies that the sampled traffic is controlled via an IP traffic filter entry with the action “filter-sample” configured interface — specifies that all traffic entering or exiting the interface is subject to sampling
direction—
specifies the direction to collect traffic flow samples
Values—
ingress-only — Enables ingress sampling only on the associated interface.
egress-only — Enables egress sampling only on the associated interface.
both — Enables both ingress and egress cflowd sampling.

cpu-protection

Syntax 
cpu-protection policy-id
no cpu-protection
Context 
config>router>if
Description 

This command assigns an existing CPU protection policy for the interface. The CPU protection policies are configured in the config>sys>security>cpu-protection>policy cpu-protection-policy-id context.

Default 

cpu-protection 255

Parameters 
policy-id—
specifies an existing CPU protection policy
Values—
1 to 255

dist-cpu-protection

Syntax 
dist-cpu-protection policy-name
no dist-cpu-protection
Context 
config>router>if
Description 

This command assigns a Distributed CPU protection policy for the interface.

Default 

no dist-cpu-protection

enable-ingress-stats

Syntax 
[no] enable-ingress-stats
Context 
config>router>if
config>service>ies >if
config>service>vprn>if
config>service>ies>sub-if>grp-if
config>service>vprn>sub-if>grp-if
Description 

This command enables the collection of ingress interface IP stats. This command is only applicable to IP statistics, and not to uRPF statistics.

If enabled, then the following statistics are collected:

  1. IPv4 offered packets
  2. IPv4 offered octets
  3. IPv6 offered packets
  4. IPv6 offered octets

Octet statistics for IPv4 and IPv6 bytes at IP interfaces include the layer 2 frame overhead.

Default 

no enable-ingress-stats

enable-mac-accounting

Syntax 
[no] enable-mac-accounting
Context 
config>router>if
Description 

This command enables MAC Accounting functionality for the interface.

Default 

no enable-mac-accounting

if-attribute

Syntax 
if-attribute
Context 
config>router>if
Description 

This command adds and removes interface attributes.

Default 

n/a

if-admin-group

Syntax 
[no] if-admin-group group-name [group-name...(upto 5 max)]
Context 
config>router>if
Description 

This command configures interface Admin Group memberships for this interface.

Default 

n/a

if-srlg-group

Syntax 
[no] if-srlg-group group-name [group-name...(upto 5 max)]
Context 
config>router>if
Description 

This command configures interface SRLG Group memberships for this interface

Default 

n/a

local-proxy-arp

Syntax 
[no] local-proxy-arp
Context 
config>router>if
Description 

This command enables local proxy ARP on the interface.

Default 

no local-proxy-arp

ip-mtu

Syntax 
ip-mtu octets
no ip-mtu
Context 
config>router>if
Description 

This command configures the IP maximum transmit unit (packet) for the associated router IP interface.

The configured IP-MTU cannot be larger then the calculated IP MTU based on the port MTU configuration.

The MTU that will be used is:

MINIMUM((Port_MTU - EtherHeaderSize), (Configured ip-mtu))

The no form of the command returns the associated IP interfaces MTU to its default value, which is calculated, based on the port MTU setting. (For Ethernet ports this will typically be 1554.)

Default 

no ip-mtu

Parameters 
octets—
specifies the IP MTU value that should be associated with the IP interface, specified in octets
Values—
512 to 9000

lag-link-map-profile

Syntax 
lag-link-map-profile link-map-profile-id
no lag-link-map-profile
Context 
config>router>if
Description 

This command assigns a preconfigured lag link map profile to a SAP/network interface configured on a LAG or a PW port that exists on a LAG. Once assigned/unassigned, the SAP/network interface egress traffic will be re-hashed over LAG as required by the new configuration.

The no form of this command reverts the SAP/network interface to use per-flow, service or link hash as configured for the service/LAG.

Default 

no lag-link-map-profile

Parameters 
link-map-profile-id—
An integer from 1 to 32 that defines a unique lag link map profile on which the LAG the SAP/network interface exist.

lag-per-link-hash

Syntax 
lag-per-link-hash class {1 | 2 | 3} weight [1..1024]
no per-link-hash
Context 
config>router>if
Description 

This command configures weight and class to this interface to be used on LAG egress when the LAG uses weighted per-link-hash.

The no form of this command restores the default configuration.

Default 

no lag-per-link-hash (equivalent to weight 1 class 1)

ldp-shortcut

Syntax 
[no] ldp-shortcut
Context 
config>router
Description 

This command enables the resolution of IGP routes using LDP LSP across all network interfaces participating in the IS-IS and OSPF routing protocol in the system.

When LDP shortcut is enabled, LDP populates the routing table with next-hop entries corresponding to all prefixes for which it activated an LDP FEC. For a given prefix, two route entries are populated in the system routing table. One route corresponds to the LDP shortcut next-hop and has an owner of LDP. The other route is the regular IP next-hop. The LDP shortcut next-hop always has preference over the regular IP next-hop for forwarding user packets and specified control packets over a given outgoing interface to the route next-hop.

All user and specified control packets for which the longest prefix match in RTM yields the FEC prefix will be forwarded over the LDP LSP.

When an IPv4 packet is received on an ingress network interface, a subscriber IES interface, or a regular IES interface, the lookup of the packet by the ingress IOM, IMMM, or XMA will result in the packet being sent labeled with the label stack corresponding to the NHLFE of the LDP LSP when the preferred RTM entry corresponds to an LDP shortcut.

If the preferred RTM entry corresponds to an IP next-hop, the IPv4 packet is forwarded unlabeled.

When ECMP is enabled and multiple equal-cost next-hops exit for the IGP route, the ingress IOM, IMMM, or XMA will spray the packets for this route based on hashing routine currently supported for IPv4 packets. When the preferred RTM entry corresponds to an LDP shortcut route, spraying will be performed across the multiple next-hops for the LDP FEC. The FEC next-hops can either be direct link LDP neighbors or T-LDP neighbors reachable over RSVP LSPs in the case of LDP-over-RSVP but not both.

When the preferred RTM entry corresponds to a regular IP route, spraying will be performed across regular IP next-hops for the prefix.

The no form of this command disables the resolution of IGP routes using LDP shortcuts.

Default 

no ldp-shortcut

ldp-sync-timer

Syntax 
ldp-sync-timer seconds [end-of-lib]
no ldp-sync-timer
Context 
config>router>if
Description 

This command enables synchronization of an IGP and LDP. When a link is restored after a failure, the IGP sets the link cost to infinity and advertises it. The actual value advertised in OSPF is 0xFFFF (65535). The actual value advertised in IS-IS regular metric is 0x3F (63) and in IS-IS wide-metric is 0xFFFFFE (16777214). This feature is not supported on RIP interfaces.

If an interface belongs to both IS-IS and OSPF, a physical failure will cause both IGPs to advertise an infinite metric and to follow the IGP-LDP synchronization procedures. If only one IGP bounces on this interface or on the system, then only the affected IGP advertises the infinite metric and follows the IGP-LDP synchronization procedures.

Next, an LDP Hello adjacency is brought up with the neighbor. The LDP synchronization timer is started by the IGP when the LDP session to the neighbor is up over the interface. This is to allow time for the label-FEC bindings to be exchanged.

When the LDP synchronization timer expires, the link cost is restored and is readvertised. The IGP will announce a new best next hop and LDP will use it if the label binding for the neighbor’s FEC is available.

If the user changes the cost of an interface, the new value is advertised at the next flooding of link attributes by the IGP. However, if the LDP synchronization timer is still running, the new cost value will only be advertised after the timer expires. The new cost value will also be advertised after the user executes any of the following commands:

  1. tools>perform>router>isis>ldp-sync-exit
  2. tools>perform>router>ospf>ldp-sync-exit
  3. config>router>if>no ldp-sync-timer
  4. config>router>ospf>disable-ldp-sync
  5. router>isis>disable-ldp-sync

If the user changes the value of the LDP synchronization timer parameter, the new value will take effect at the next synchronization event. If the timer is still running, it will continue to use the previous value.

If parallel links exist to the same neighbor, then the bindings and services should remain up as long as there is one interface that is up. However, the user-configured LDP synchronization timer still applies on the interface that failed and was restored. In this case, the router will only consider this interface for forwarding after the IGP readvertises its actual cost value.

The LDP Sync Timer State is not always synchronized across to the standby CPM,; therefore, after an activity switch, the timer state might not be same as it was on the previously active CPM.

If the end-of-lib option is configured, then the system will start the LDP synchronization timer as usual. If the LDP End of LIB Typed Wildcard FEC messages are received for every FEC type negotiated for a given session to an LDP peer for that IGP interface, the ldp-sync-timer is terminated early and the IGP link cost is restored. If the ldp-sync-timer expires before the LDP End of LIB messages are received for every negotiated FEC type, then the system will restore the IGP link cost. The end-of-lib option is disabled by default.

The no form of this command disables IGP-LDP synchronization and deletes the configuration.

Default 

no ldp-sync-timer

Parameters 
seconds—
specifies the time interval for the IGP-LDP synchronization timer
Values—
1 to 1800
end-of-lib—
specifies that the system should terminate the ldp-sync-timer early if the LDP End of LIB Typed Wildcard FEC messages are received for every FEC type negotiated for a given session to an LDP peer for that IGP interface.

load-balancing

Syntax 
load-balancing
Context 
config>router>if
Description 

This command enables the load-balancing context to configure interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.

Default 

n/a

egr-ip-load-balancing

Syntax 
egr-ip-load-balancing {source | destination | inner-ip}
no egr-ip-load-balancing
Context 
config>router>if>load-balancing
Description 

This command specifies whether to include source address or destination address or both in LAG/ECMP hash on IP interfaces. Additionally, when l4-load-balancing is enabled the command applies also to inclusion of source/destination port in the hash inputs.

The no form of this command includes both source and destination parameters.

Default 

no egr-ip-load-balancing

Parameters 
source—
specifies using source address and (if l4-load balancing is enabled) source port in the hash, ignore destination address/port
destination—
specifies using destination address and (if l4-load balancing is enabled) destination port in the hash, ignore source address/port
inner-ip—
specifies use of the inner IP header parameters instead of outer IP header parameters in LAG/ECMP hash for IPv4 encapsulated traffic

lsr-load-balancing

Syntax 
lsr-load-balancing hashing-algorithm
no lsr-load-balancing
Context 
config>router>if>load-balancing
Description 

This command specifies whether the IP header is used in the LAG and ECMP LSR hashing algorithm. This is the per interface setting.

Default 

no lsr-load-balancing

Parameters 
lbl-only—
Only the label is used in the hashing algorithm.
lbl-ip —
The IP header is included in the hashing algorithm.
ip-only—
the IP header is used exclusively in the hashing algorithm
eth-encap-ip—
The hash algorithm parses down the label stack (up to 3 labels supported) and once it hits the bottom, the stack assumes Ethernet II non-tagged header follows. At the expected Ethertype offset location, algorithm checks whether the value present is IPv4/v6 (0x0800 or0x86DD). If the check passes, the hash algorithm checks the first nibble at the expected IP header location for IPv4/IPv6 (0x0100/0x0110). If the secondary check passes, the hash is performed using IP SA/DA fields in the expected IP header; otherwise (any of the check failed) label-stack hash is performed.

spi-load-balancing

Syntax 
[no] spi-load-balancing
Context 
config>router>if>load-balancing
Description 

This command enables use of the SPI in hashing for ESP/AH encrypted IPv4/v6 traffic. This is a per interface setting.

The no form disables the SPI function.

Default 

no spi-load-balancing

teid-load-balancing

Syntax 
[no] teid-load-balancing
Context 
config>router>if>load-balancing
Description 

This command enables inclusion of TEID in hashing for GTP-U/C encapsulates traffic for GTPv1/GTPv2. The no form of this command ignores TEID in hashing.

Default 

no teid-load-balancing

loopback

Syntax 
[no] loopback
Context 
config>router>if
Description 

This command configures the interface as a loopback interface. The vas-if-type and loopback commands are mutually exclusive

Default 

Not enabled

mac

Syntax 
mac ieee-mac-addr
no mac
Context 
config>router>if
Description 

This command assigns a specific MAC address to an IP interface. Only one MAC address can be assigned to an IP interface. When multiple mac commands are entered, the last command overwrites the previous command.

The no form of the command returns the MAC address of the IP interface to the default value.

Default 

IP interface has a system-assigned MAC address.

Parameters 
ieee-mac-addr—
specifies the 48-bit MAC address for the IP interface in the form aa:bb:cc:dd:ee:ff or aa-bb-cc-dd-ee-ff, where aa, bb, cc, dd, ee and ff are hexadecimal numbers. Allowed values are any non-broadcast, non-multicast MAC and non-IEEE reserved MAC addresses.

network-domain

Syntax 
network-domain network-domain-name
no network-domain
Context 
config>router>if
Description 

This command assigns a given interface to a given network-domain. The network-domain is then taken into account during sap-ingress queue allocation for VPLS SAP.

The network-domain association can only be done in a base-routing context. Associating a network domain with an loop-back or system interface will be rejected. Associating a network-domain with an interface that has no physical port specified will be accepted, but will have no effect as long as a corresponding port, or LAG, is defined.

Single interfaces can be associated with multiple network-domains.

Default 

per default “default” network domain is assigned

ntp-broadcast

Syntax 
[no] ntp-broadcast
Context 
config>router>if
Description 

This command enables SNTP broadcasts received on the IP interface. This parameter is only valid when the SNTP broadcast-client global parameter is configured.

The no form of the command disables SNTP broadcast received on the IP interface.

Default 

no ntp-broadcast

port

Syntax 
port port-name
no port
Context 
config>router>if
Description 

This command creates an association with a logical IP interface and a physical port.

An interface can also be associated with the system (loopback address).

The command returns an error if the interface is already associated with another port or the system. In this case, the association must be deleted before the command is re-attempted. The port-id or port-id for Ethernet ports can be in one of the following forms:

Ethernet interfaces

If the card in the slot has MDAs/XMAs, port-id is in the slot_number/MDA or XMA_number/port_number format; for example, 1/1/3 specifies port 3 of the MDA/XMA installed in MDA/XMA slot 1 on the card installed in chassis slot 1.

SONET/SDH interfaces

When the port-id represents a POS interface, the port-id must include the channel-id. The POS interface must be configured as a network port.

The no form of the command deletes the association with the port. The no form of this command can only be performed when the interface is administratively down.

Default 

No port is associated with the IP interface.

Parameters 
port-name—
The physical port identifier to associate with the IP interface.
Values—
The following values apply to the 7750 SR:

port-name

port-id[:encap-val]

encap-val

0

for null

0..4094

for dot1q

0..4094.*

for qinq

port-id

slot/mda/port[.channel]

eth-sat-id

esat-id/slot/port

esat

keyword

id

1 to 20

pxc-id

pxc-id.sub-port

pxc

keyword

id

1 to 64

sub-port

a, b

bundle-id - bundle-type-slot/mda.bundle-num

bundle

keyword

type

ima, fr, ppp

bundle-num

1..336

bpgrp-id

bpgrp-type-bpgrp-num

bpgrp

keyword

type

ima, ppp

bpgrp-num

1 to 2000

aps-id

aps-group-id[.channel]

aps

keyword

group-id

1 to 64

ccag-id

ccag-id.path-id[cc-type]

ccag

keyword

id

1..8

path-id

a, b

cc-type

.sap-net, .net-sap

lag-id

lag-id

lag

keyword

id

1 to 800

port-id

slot/mda/port[.channel]

eth-sat-id

esat-id/slot/port

esat

keyword

id

1 to 20

pxc-id

pxc-id.sub-port

pxc

keyword

id

1 to 64

sub-port

a, b

bundle-id

bundle-type-slot/mda.bundle-num

bundle

keyword

type

ima, ppp

bundle-num

1 to 336

bpgrp-id

bpgrp-type-bpgrp-num

bpgrp

keyword

type

ima, ppp

bpgrp-num

1 to 256

aps-id

aps-group-id[.channel]

aps

keyword

group-id

1 to 16

lag-id

lag-id

lag

keyword

id

1 to 64

port-id

slot/mda/port[.channel]

eth-sat-id

esat-id/slot/port

esat

keyword

id

1 to 20

pxc-id

pxc-id.sub-port

pxc

keyword

id

1 to 64

sub-port

a, b

ccag-id

ccag-id.path-id[cc-type]

ccag

keyword

id

1 to 8

path-id

a, b

cc-type

.sap-net, .net-sap

lag-id

lag-id

lag

keyword

id

1 to 200

gtg-id

gmpls-tun-grp-id

gmpls-tun-grp

keyword

id

1 to 1024

Values—
The following values apply to the 7450 ESS:

port-id

slot/mda/port[.channel]

eth-sat-id

esat-id/slot/port

esat

keyword

id

1 to 20

pxc-id

pxc-id.sub-port

pxc

keyword

id

1 to 64

sub-port

a, b

ccag-id

ccag-id.path-id[cc-type]

ccag

keyword

id

1 to 8

path-id

a, b

cc-type

.sap-net, .net-sap

lag-id

lag-id

lag

keyword

id

1 to 800

gtg-id

gmpls-tun-grp-id

gmpls-tun-grp

keyword

id

1 to 200

proxy-arp-policy

Syntax 
[no] proxy-arp-policy policy-name [policy-name...(up to 5 max)]
Context 
config>router>if
Description 

This command enables and configure proxy ARP on the interface and specifies an existing policy-statement to analyze match and action criteria that controls the flow of routing information to and from a given protocol, set of protocols, or a particular neighbor. The policy-name is configured in the config>router>policy-options context.

Use proxy ARP so the router responds to ARP requests on behalf of another device. Static ARP is used when a router needs to know about a device on an interface that cannot or does not respond to ARP requests. Thus, the router configuration can state that if it has a packet that has a certain IP address to send it to the corresponding ARP address.

Default 

no proxy-arp-policy

Parameters 
policy-name—
The export route policy name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. The specified policy name(s) must already be defined.

ptp-hw-assist

Syntax 
[no] ptp-hw-assist
Context 
config>router>if
Description 

This command configures the 1588 port based timestamping assist function for the interface. Various checks are performed to ensure that this feature can be enabled. If a check fails:

  1. The command is blocked/rejected with an appropriate error message.
  2. If the SAP configuration of the interface is removed, the ptp-hw-assist configuration will be removed.
  3. If the IPv4 address configuration of the interface is removed, the ptp-hw-assist configuration will be removed.

The port will validate the destination IP address on received 1588 messages. If the 1588 messages are sent to a loopback address within the node rather than the address of the interface, then the loopback address must be configured in the configure>system>security>source-address application ptp context.

Default 

no ptp-hw-assist

qos-route-lookup

Syntax 
qos-route-lookup [source | destination]
no qos-route-lookup
Context 
config>router>if
config>router>if>ipv6
Description 

This command enables QoS classification of the ingress IP packets on an interface based on the QoS information associated with routes in the forwarding table.

If the optional destination parameter is specified and the destination address of an incoming IP packet matches a route with QoS information the packet is classified to the fc and priority associated with that route, overriding the fc and priority/profile determined from the sap-ingress or network qos policy associated with the IP interface. If the destination address of the incoming packet matches a route with no QoS information the fc and priority of the packet remain as determined by the sap-ingress or network qos policy.

If the optional source parameter is specified and the source address of an incoming IP packet matches a route with QoS information the packet is classified to the fc and priority associated with that route, overriding the fc and priority/profile determined from the sap-ingress or network qos policy associated with the IP interface. If the source address of the incoming packet matches a route with no QoS information the fc and priority of the packet remain as determined by the sap-ingress or network qos policy.

If neither the optional source or destination parameter is present, then the default is destination address matching.

The functionality enabled by the qos-route-lookup command can be applied to IPv4 packets or IPv6 packets on an interface, depending on whether it is present at the interface context (applies to IPv4) or the interface>ipv6 context (applies to IPv6). Subscriber management group interfaces for the 7750 SR and 7450 ESS also do not support the source QPPB option.

The no form of the command reverts to the default.

Default 

no qos-route-lookup

Parameters 
source—
Enables QoS classification of incoming IP packets based on the source address matching a route with QoS information.
destination—
Enables QoS classification of incoming IP packets based on the destination address matching a route with QoS information.

qos

Syntax 
qos network-policy-id [egress-port-redirect-group queue-group-name] [egress-instance instance-id]] [ingress-fp- redirect-group queue-group-name ingress-instance instance-id]
no qos
Context 
config>router>if
Description 

This command associates a network Quality of Service (QoS) policy with a network IP interface. Only one network QoS policy can be associated with an IP interface at one time. Attempts to associate a second QoS policy return an error.

Associating a network QoS policy with a network interface is useful for the following purposes:

  1. To apply classification rules for determining the forwarding-class and profile of ingress packets on the interface.
  2. To associate ingress packets on the interface with a queue-group instance applied to the ingress context of the interface’s forwarding plane (FP). (This is only applicable to interfaces on IOM3 and later cards.) The referenced ingress queue-group instance may have policers defined in order to rate limit ingress traffic on a per-forwarding class (and forwarding type: unicast vs. multicast) basis.
  3. To perform 802.1p, DSCP, IP precedence and/or MPLS EXP re-marking of egress packets on the interface.
  4. To associate egress packets on the interface with a queue-group instance applied to the egress context of the interface’s port. The referenced egress queue-group instance may have policers and/or queues defined in order to rate limit egress traffic on a per-forwarding class basis.

The no form of the command removes the network QoS policy association from the network IP interface, and the QoS policy reverts to the default.

Default 

no qos

Parameters 
network-policy-id—
An existing network policy ID to associate with the IP interface.
Values—
1 to 65535
egress-port-redirect-group queue-group-name
This optional parameter specifies the egress queue-group used for all egress forwarding-class redirections specified within the network QoS policy ID. The specified queue-group-name must exist as an egress queue group applied to the egress context of the port associated with the IP interface.
egress-instance instance-id
Since multiple instances of the same egress queue-group can be applied to the same port this optional parameter is used to specify which particular instance to associate with this particular network IP interface.
Values—
1 to 16384
ingress-fp- redirect-group queue-group-name
This optional parameter specifies the ingress queue-group used for all ingress forwarding-class redirections specified within the network QoS policy ID. The specified queue-group-name must exist as an ingress queue group applied to the ingress context of the forwarding plane associated with the IP interface.
ingress-instance instance-id
Since multiple instances of the same ingress queue-group can be applied to the same forwarding plane this parameter is required to specify which particular instance to associate with this particular network IP interface.
Values—
1 to 16384

remote-proxy-arp

Syntax 
[no] remote-proxy-arp
Context 
config>router>if
Description 

This command enables remote proxy ARP on the interface.

Default 

no remote-proxy-arp

secondary

Syntax 
secondary {[ip-address/mask | ip-address netmask]} [broadcast {all-ones | host-ones}] [igp-inhibit]
no secondary ip-addr
Context 
config>router>if
Description 

Use this command to assign a secondary IP address to the interface. Up to 16 total primary and secondary IPv4 and IPv6 addresses can be assigned to the interface. Each address can be configured in an IP address, IP subnet or broadcast address format.

Default 

n/a

Parameters 
ip-address—
The IP address of the IP interface. The ip-address portion of the address command specifies the IP host address that will be used by the IP interface within the subnet. This address must be unique within the subnet and specified in dotted decimal notation.
Values—
1.0.0.0 to 223.255.255.255
/—
The forward slash is a parameter delimiter that separates the ip-address portion of the IP address from the mask that defines the scope of the local subnet. No spaces are allowed between the ip-addr, the “/” and the mask-length parameter. If a forward slash does not immediately follow the ip-addr, a dotted decimal mask must follow the prefix.
mask-length—
The subnet mask length when the IP prefix is specified in CIDR notation. When the IP prefix is specified in CIDR notation, a forward slash (/) separates the ip-address from the mask-length parameter. The mask length parameter indicates the number of bits used for the network portion of the IP address; the remainder of the IP address is used to determine the host portion of the IP address. Allowed values are integers in the range 1 to 32. A mask length of 32 is reserved for system IP addresses.
Values—
1 to 32
mask—
The subnet mask in dotted decimal notation. When the IP prefix is not specified in CIDR notation, a space separates the ip-addr from a traditional dotted decimal mask. The mask parameter indicates the complete mask that will be used in a logical ‘AND’ function to derive the local subnet of the IP address. A mask of 255.255.255.255 is reserved for system IP addresses.
Values—
128.0.0.0 to 255.255.255.255
broadcast {all-ones | host-ones}—
The optional broadcast parameter overrides the default broadcast address used by the IP interface when sourcing IP broadcasts on the IP interface. If no broadcast format is specified for the IP address, the default value is host-ones, which indicates a subnet broadcast address. Use this parameter to change the broadcast address to all-ones or revert back to a broadcast address of host-ones.

The all-ones keyword following the broadcast parameter specifies that the broadcast address used by the IP interface for this IP address will be 255.255.255.255, also known as the local broadcast.

The host-ones keyword following the broadcast parameter specifies that the broadcast address used by the IP interface for this IP address will be the subnet broadcast address. This is an IP address that corresponds to the local subnet described by the ip-addr and the mask-length or mask with all the host bits set to binary 1. This is the default broadcast address used by an IP interface.

The broadcast parameter within the address command does not have a negate feature, which is usually used to revert a parameter to the default value. To change the broadcast type to host-ones after being changed to all-ones, the address command must be executed with the broadcast parameter defined.

The broadcast format on an IP interface can be specified when the IP address is assigned or changed.

This parameter does not affect the type of broadcasts that can be received by the IP interface. A host sending either the local broadcast (all-ones) or the valid subnet broadcast address (host-ones) will be received by the IP interface.

igp-inhibit—
The secondary IP address should not be recognized as a local interface by the running IGP.

static-arp

Syntax 
static-arp ip-addr ieee-mac-addr unnumbered
no static-arp unnumbered
Context 
config>router>if
Description 

This command configures a static Address Resolution Protocol (ARP) entry associating an IP address with a MAC address for the core router instance. This static ARP appears in the core routing ARP table. A static ARP can only be configured if it exists on the network attached to the IP interface.

If an entry for a particular IP address already exists and a new MAC address is configured for the IP address, the existing MAC address is replaced by the new MAC address.

The number of static-arp entries that can be configured on a single node is limited to 1000.

Static ARP is used when a router needs to know about a device on an interface that cannot or does not respond to ARP requests. Thus, the router configuration can state that if it has a packet that has a certain IP address to send it to the corresponding ARP address. Use proxy ARP so the router responds to ARP requests on behalf of another device.

The no form of the command removes a static ARP entry.

Default 

No static ARPs are defined.

Parameters 
unnumbered—
specifies the static ARP MAC for an unnumbered interface. Unnumbered interfaces support dynamic ARP. Once this command is configured, it overrides any dynamic ARP.
ieee-mac-addr—
specifies the 48-bit MAC address for the static ARP in the form aa:bb:cc:dd:ee:ff or aa-bb-cc-dd-ee-ff, where aa, bb, cc, dd, ee and ff are hexadecimal numbers. Allowed values are any non-broadcast, non-multicast MAC and non-IEEE reserved MAC addresses.

strip-label

Syntax 
[no] strip-label
Context 
config>router>if
Description 

This command forces packets to be stripped of all (max 5) MPLS labels before the packets are handed over for possible filter (PBR) processing.

If the packets do not have an IP header immediately following the MPLS label stack after the strip, they are discarded. Only MPLS encapsulated IP, IGP shortcuts and VPRN over MPLS packets will be processed. However, IPv4 and IPv6 packets that arrive without any labels are supported on an interface with strip-label enabled.

This command is supported on:

  1. Optical ports for the 7750 SR and 7450 ESS
  2. IOM3-XP cards for the 7750 SR and 7450 ESS
  3. Null/Dot1q encaps
  4. Network ports
  5. IPv4
  6. IPv6

The no form of the command removes the strip-label command.

In order to associate an interface that is configured with the strip-label parameter with a port, the port must be configured as single-fiber for the command to be valid.

Packets that are subject to the strip-label action and are mirrored (using mirrors or lawful interception) will contain the original MPLS labels (and other L2 encapsulation) in the mirrored copy of the packet, as they appeared on the wire, when the mirror-dest type is the default type “ether”. If the mirror-dest type is “ip-only”, then the mirrored copy of the packet will not contain the original L2 encapsulation or the stripped MPLS labels.

Default 

no strip-label

tos-marking-state

Syntax 
tos-marking-state {trusted | untrusted}
no tos-marking-state
Context 
config>router>if
Description 

This command is used on a network IP interface to alter the default trusted state to a non-trusted state. When unset or reverted to the trusted default, the ToS field will not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set, in which case the egress network interface treats all IES and network IP interface as untrusted. When the ingress network IP interface is set to untrusted, all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface. The egress network remarking rules also apply to the ToS field of IP packets routed using IGP shortcuts (tunneled to a remote next-hop). However, the tunnel QoS markings are always derived from the egress network QoS definitions. Egress marking and remarking is based on the internal forwarding class and profile state of the packet once it reaches the egress interface. The forwarding class is derived from ingress classification functions. The profile of a packet is either derived from ingress classification or ingress policing. The default marking state for network IP interfaces is trusted. This is equivalent to declaring no tos-marking-state on the network IP interface. When undefined or set to tos-marking-state trusted, the trusted state of the interface will not be displayed when using show config or show info unless the detail parameter is given. The save config command will not store the default tos-marking-state trusted state for network IP interfaces unless the detail parameter is also specified.

The no form of the command is used to restore the trusted state to a network IP interface. This is equivalent to executing the tos-marking-state trusted command.

Default 

tos-marking-state trusted

Parameters 
trusted—
The default prevents the ToS field to not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set
untrusted—
specifies that all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface.

unnumbered

Syntax 
unnumbered [ip-address | ip-int-name]
no unnumbered
Context 
config>router>if
Description 

This command sets an IP interface as an unnumbered interface and specifies the IP address to be used for the interface.

To conserve IP addresses, unnumbered interfaces can be configured. The address used when generating packets on this interface is the ip-addr parameter configured.

An error message will be generated if an unnumbered interface is configured, and an IP address already exists on this interface.

The no form of the command removes the IP address from the interface, effectively removing the unnumbered property. The interface must be shutdown before no unnumbered is issued to delete the IP address from the interface, or an error message will be generated.

Default 

no unnumbered

Parameters 
ip-addr | ip-int-name—
Optional. The IP address or IP interface name to associate with the unnumbered IP interface in dotted decimal notation. The configured IP address must exist on this node. It is recommended to use the system IP address as it is not associated with a particular interface and is therefore always reachable. The system IP address is the default if no ip-addr or ip-int-name is configured.

qos-route-lookup

Syntax 
qos-route-lookup [source | destination]
no qos-route-lookup
Context 
config>router>if
config>router>if>ipv6
Description 

This command enables QoS classification of the ingress IP packets on an interface based on the QoS information associated with routes in the forwarding table.

If the optional destination parameter is specified and the destination address of an incoming IP packet matches a route with QoS information the packet is classified to the fc and priority associated with that route, overriding the fc and priority/profile determined from the sap-ingress or network qos policy associated with the IP interface. If the destination address of the incoming packet matches a route with no QoS information the fc and priority of the packet remain as determined by the sap-ingress or network qos policy.

If the optional source parameter is specified and the source address of an incoming IP packet matches a route with QoS information the packet is classified to the fc and priority associated with that route, overriding the fc and priority/profile determined from the sap-ingress or network qos policy associated with the IP interface. If the source address of the incoming packet matches a route with no QoS information the fc and priority of the packet remain as determined by the sap-ingress or network qos policy.

If neither the optional source or destination parameter is present, then the default is destination address matching.

The functionality enabled by the qos-route-lookup command can be applied to IPv4 packets or IPv6 packets on an interface, depending on whether it is present at the interface context (applies to IPv4) or the interface>ipv6 context (applies to IPv6). The ability to specify source address based QoS lookup is not supported for IPv6. Subscriber management group interfaces also do not support the source QPPB option.

The no form of the command reverts to the default.

Default 

destination

Parameters 
source—
Enables QoS classification of incoming IP packets based on the source address matching a route with QoS information.
destination—
Enables QoS classification of incoming IP packets based on the destination address matching a route with QoS information.

secure-nd

Syntax 
[no] secure-nd
Context 
config>router>if>ipv6
Description 

This command enables Secure Neighbor Discovery (SeND) on the IPv6 interface.

The no form of the command reverts to the default and disabled SeND.

allow-unsecured-msgs

Syntax 
[no] allow-unsecured-msgs
Context 
config>router>if>ipv6>secure-nd
Description 

This command specifies whether unsecured messages are accepted. When Secure Neighbor Discovery (SeND) is enabled, only secure messages are accepted by default.

The no form of the command disables accepting unsecured messages.

link-local-modifier

Syntax 
link-local-modifier modifier
[no] link-local-modifier
Context 
config>router>if>ipv6>secure-nd
Description 

This command configures the Cryptographically Generated Address (CGA) modifier for link-local addresses.

Parameters 
modifier—
specifies the modifier in 32 hexadecimal nibbles
Values—
0x0 to 0xFFFFFFFF

public-key-min-bits

Syntax 
public-key-min-bits bits
[no] public-key-min-bits
Context 
config>router>if>ipv6>secure-nd
Description 

This command configures the minimum acceptable key length for public keys used in the generation of a Cryptographically Generated Address (CGA).

Parameters 
bits—
specifies the number of bits
Values—
512 to 1024

security-parameter

Syntax 
security-parameter sec
[no] security-parameter
Context 
config>router>if>ipv6>secure-nd
Description 

This command configures the security parameter used in the generation of a Cryptographically Generated Address (CGA).

Parameters 
sec—
specifies the security parameter
Values—
0 to 1

shutdown

Syntax 
[no] shutdown
Context 
config>router>if>ipv6>secure-nd
Description 

This command enables or disables Secure Neighbor Discovery (SeND) on the interface.

stale-time

Syntax 
stale-time seconds
no stale-time
Context 
config>router>ipv6
config>router>if>ipv6
Description 

This command configures the time a neighbor discovery cache entry can remain stale before being removed.

The no form of the command removes the stale-time value.

Default 

no stale-time

Parameters 
seconds—
The allowed stale time (in seconds) before a neighbor discovery cache entry is removed.
Values—
60 to 65535

tcp-mss

Syntax 
tcp-mss mss-value
no tcp-mss
Context 
config>router>if
config>router>if>ipv6
Description 

This command statically sets the TCP maximum segment size (MSS) for TCP connections originated from the associated IP interface to the specified value.

The no form of the command removes the static value and allows the TCP MSS value to be calculated based on the IP MTU value by subtracting the base IP and TCP header lengths from the IP MTU value (tcp_mss = ip_mtu – 40).

Default 

no tcp-mss

Parameters 
mss-value—
The TCP MSS value that should be used in the TCP SYN packet during the three-way handshake negotiation of a TCP connection.

9158 = max-IP_MTU (9198)-40

Values—
536 to 9158 (IPv4) 1220 to 9138 (IPv6)

urpf-check

Syntax 
[no] urpf-check
Context 
config>router>if
config>router>if>ipv6
Description 

This command enables unicast RPF (uRPF) Check on this interface.

The no form of the command disables unicast RPF (uRPF) Check on this interface.

Default 

n/a

vas-if-type

Syntax 
vas-if-type {to-from-access | to-from-network | to-from-both}
no vas-if-type
Context 
config>router>if
Description 

This command configures the type of a Value Added Service (VAS) facing interface. To change the vas-if-type, the shutdown command is required. The vas-if-type and loopback commands are mutually exclusive.

The no form of the command removes the VAS interface type configuration.

Default 

no vas-if-type

Parameters 
to-from-access—
used when two separate (to-from-access and to-from-network) interfaces are used for VAS connectivity. For service chaining, traffic arriving from access interfaces (upstream) is redirected to a PBR target reachable over this interface for upstream VAS processing. Downstream traffic after VAS processing must arrive on this interface, so that the traffic is subject to regular routing but is not subject to AA divert, nor egress subscriber PBR.
to-from-network—
used when two separate (to-from-access and to-from-network) interfaces are used for VAS connectivity. For service chaining, traffic arriving from network interfaces (downstream) is redirected to a PBR target reachable over this interface for downstream VAS processing. Upstream traffic after VAS processing must arrive on this interface, so that regular routing can be applied.
to-from-both—
used when a single interface is used for VAS connectivity (no local-to-local traffic). For service chaining, both traffic arriving from access interfaces and from network interfaces is redirected to a PBR target reachable over this interface for upstream/downstream VAS processing. Traffic after VAS processing must arrive on this interface, so that the traffic is subject to regular routing but is not subject to AA divert, nor to egress subscriber PBR.

mode

Syntax 
mode {strict | loose | strict-no-ecmp}
no mode
Context 
config>router>if>urpf-check
config>router>if>ipv6>urpf-check
Description 

This command specifies the mode of unicast RPF check.

The no form of the command reverts to the default (strict) mode.

Default 

mode strict

Parameters 
strict—
When specified, uRPF checks whether incoming packet has a source address that matches a prefix in the routing table, and whether the interface expects to receive a packet with this source address prefix.
loose—
In loose mode, uRPF checks whether incoming packet has source address with a corresponding prefix in the routing table. However, the loose mode does not check whether the interface expects to receive a packet with a specific source address prefix. This object is valid only when urpf-check is enabled.
strict-no-ecmp—
When a packet is received on an interface in this mode and the SA matches an ECMP route the packet is dropped by uRPF.

if-attribute

Syntax 
if-attribute
Context 
config>router
config>router>if
config>service>ies>if
config>service>vprn>if
Description 

This command creates the context to configure or apply IP interface attributes such as administrative group (admin-group) or Shared Risk Loss Group (SRLG).

Default 

n/a

admin-group

Syntax 
admin-group group-name value group-value
no admin-group group-name
Context 
config>router>if-attribute
Description 

This command defines an administrative group (admin-group) that can be associated with an IP or MPLS interface.

Admin groups, also known as affinity, are used to tag IP and MPLS interfaces that share a specific characteristic with the same identifier. For example, an admin group identifier can represent all links that connect to core routers, or all links that have a bandwidth higher than 10G, or all links that are dedicated to a specific service.

The user first configures locally on each router the name and identifier of each admin group. A maximum of 32 admin groups can be configured per system.

The user then configures the admin group membership of an interface. The user can apply admin groups to a IES, VPRN, network IP, or MPLS interface.

When applied to MPLS interfaces, the interfaces can be included or excluded in the LSP path definition by inferring the admin-group name. CSPF will compute a path that satisfies the admin-group include and exclude constraints.

When applied to IES, VPRN, or network IP interfaces, the interfaces can be included or excluded in the route next-hop selection by inferring the admin-group name in a route next-hop policy template applied to an interface or a set of prefixes.

The following provisioning rules are applied to admin group configuration. The system will reject the creation of an admin-group if it re-uses the same name but with a different group value than an existing group. The system will also reject the creation of an admin-group if it re-uses the same group value but with a different name than an existing group.

Only the admin groups bound to an MPLS interface are advertised area-wide in TE link TLVs and sub-TLVs when the traffic-engineering option is enabled in IS-IS or OSPF. IES and VPRN interfaces do not have their attributes advertised in TE TLVs.

Default 

n/a

Parameters 
group-name—
specifies the name of the group with up to 32 characters. The association of group name and value should be unique within an IP/MPLS domain
value group-value
specifies the integer value associated with the group. The association of group name and value should be unique within an IP/MPLS domain.
Values—
0 to 31

admin-group

Syntax 
admin-group group-name [group-name...(up to 5 max)]
no admin-group group-name [group-name...(up to 5 max)]
no admin-group
Context 
config>router>if>if-attribute
config>service>ies>if>if-attribute
config>service>vprn>if>if-attribute
config>router>mpls>if
Description 

This command configures the admin group membership of an interface. The user can apply admin groups to an IES, VPRN, network IP, or MPLS interface.

Each single operation of the admin-group command allows a maximum of five (5) groups to be specified at a time. However, a maximum of 32 groups can be added to a given interface through multiple operations. Once an admin group is bound to one or more interface, its value cannot be changed until all bindings are removed.

The configured admin-group membership will be applied in all levels/areas the interface is participating in. The same interface cannot have different memberships in different levels/areas.

Only the admin groups bound to an MPLS interface are advertised area-wide in TE link TLVs and sub-TLVs when the traffic-engineering option is enabled in IS-IS or OSPF. IES and VPRN interfaces do not have their attributes advertised in TE TLVs.

The no form of this command deletes one or more of the admin-group memberships of an interface. The user can also delete all memberships of an interface by not specifying a group name.

Default 

n/a

Parameters 
group-name—
specifies the name of the group with up to 32 characters. The association of group name and value should be unique within an IP/MPLS domain.

srlg-group

Syntax 
srlg-group group-name value group-value [penalty-weight penalty-weight]
no srlg-group group-name
Context 
config>router>if-attribute
Description 

This command defines a Shared Risk Link Group (SRLG) which can be associated with an IP or MPLS interface.

SRLG is used to tag IP or MPLS interfaces which share a specific fate with the same identifier. For example, an SRLG group identifier could represent all links which use separate fibers but are carried in the same fiber conduit. If the conduit is accidentally cut, all the fiber links are cut which means all interfaces using these fiber links will fail.

The user first configures locally on each router the name and identifier of each SRLG group. A maximum of 1024 SRLGs can be configured per system.

The user then configures the SRLG membership of an interface. The user can apply SRLGs to an IES, VPRN, network IP, or MPLS interface. A maximum of 64 SRLGs can be applied to a given interface.

When SRLGs are applied to MPLS interfaces, CSPF at an LER will exclude the SRLGs of interfaces used by the LSP primary path when computing the path of the secondary path. CSPF at an LER or LSR will also exclude the SRLGs of the outgoing interface of the primary LSP path in the computation of the path of the FRR backup LSP. This provides path disjointness between the primary path and the secondary path or FRR backup path of an LSP.

When SRLGs applied to IES, VPRN, or network IP interfaces, they are evaluated in the route next-hop selection by adding the srlg-enable option in a route next-hop policy template applied to an interface or a set of prefixes. For instance, the user can enable the SRLG constraint to select a LFA next-hop for a prefix which avoids all interfaces that share fate with the primary next-hop.

The following provisioning rules are applied to SRLG configuration. The system will reject the creation of a SRLG if it re-uses the same name but with a different group value than an existing group. The system will also reject the creation of an SRLG if it re-uses the same group value but with a different name than an existing group.

Only the SRLGs bound to an MPLS interface are advertised area-wide in TE link TLVs and sub-TLVs when the traffic-engineering option is enabled in IS-IS or OSPF. IES and VPRN interfaces do not have their attributes advertised in TE TLVs.

A user may specify a penalty weight (penalty-weight) associated with an SRLG. This controls the likelihood of paths with links sharing SRLG values with a primary path being used by a bypass or detour LSP. The higher the penalty weight, the less desirable it is to use the link with a given SRLG.

Default 

n/a

Parameters 
group-name—
specifies the name of the group, up to 32 characters. The association of group name and value should be unique within an IP/MPLS domain.
value group-value—
specifies the integer value associated with the group. The association of group name and value should be unique within an IP/MPLS domain.
Values—
0 to 4294967295
penalty-weight penalty-weight—
specifies the integer value of the penalty weight that is assigned to the SRLG group
Values—
0 to 65535
Values—
0

srlg-group

Syntax 
srlg-group group-name [group-name...(up to 5 max)]
no srlg-group group-name [group-name...(up to 5 max)]
no srlg-group
Context 
config>router>if>if-attribute
config>service>ies>if>if-attribute
config>service>vprn>if>if-attribute
config>router>mpls>if
Description 

This command configures the SRLG membership of an interface. The user can apply SRLGs to an IES, VPRN, network IP, or MPLS interface.

An interface can belong to up to 64 SRLG groups. However, each single operation of the srlg-group command allows a maximum of five (5) groups to be specified at a time. Once an SRLG group is bound to one or more interface, its value cannot be changed until all bindings are removed.

The configured SRLG membership will be applied in all levels/areas the interface is participating in. The same interface cannot have different memberships in different levels/areas.

Only the SRLGs bound to an MPLS interface are advertised area-wide in TE link TLVs and sub-TLVs when the traffic-engineering option is enabled in IS-IS or OSPF. IES and VPRN interfaces do not have their attributes advertised in TE TLVs.

The no form of this command deletes one or more of the SRLG memberships of an interface. The user can also delete all memberships of an interface by not specifying a group name.

Default 

n/a

Parameters 
group-name—
specifies the name of the group, up to 32 characters. The association of group name and value should be unique within an IP/MPLS domain.

route-next-hop-policy

Syntax 
route-next-hop-policy
Context 
config>router
Description 

This command creates the context to configure route next-hop policies.

Default 

n/a

template

Syntax 
[no] template template-name
Context 
config>router>route-next-hop-policy
Description 

This command creates a template to configure the attributes of a Loop-Free Alternate (LFA) Shortest Path First (SPF) policy. An LFA SPF policy allows the user to apply specific criteria, such as admin group and SRLG constraints, to the selection of an LFA backup next-hop for a subset of prefixes that resolve to a specific primary next-hop.

The user first creates a route next-hop policy template under the global router context and then applies it to a specific OSPF or IS-IS interface in the global routing instance or in a VPRN instance.

A policy template can be used in both IS-IS and OSPF to apply the specific criteria to prefixes protected by LFA. Each instance of IS-IS or OSPF can apply the same policy template to one or more interface.

The commands within the route next-hop policy template use the begin-commit-abort model. The following are the steps to create and modify the template:

To create a template, the user enters the name of the new template directly under the route-next-hop-policy context.

  1. To delete a template that is not in use, the user enters the no form for the template name under the route-next-hop-policy context.
  2. The user enters the editing mode by executing the begin command under the route-next-hop-policy context. The user can then edit and change any number of route next-hop policy templates. However, the parameter value will still be stored temporarily in the template module until the commit is executed under the route-next-hop-policy context. Any temporary parameter changes will be lost if the user enters the abort command before the commit command.
  3. The user is allowed to create or delete a template instantly once in the editing mode without the need to enter the commit command. Furthermore, the abort command, if entered, will have no effect on the prior deletion or creation of a template.

Once the commit command is issued, IS-IS or OSPF will re-evaluate the templates and if there are any net changes, it will schedule a new LFA SPF to re-compute the LFA next-hop for the prefixes associated with these templates.

Default 

n/a

Parameters 
template-name—
specifies the name of the template, up to 32 characters

include-group

Syntax 
include-group group-name [pref pref]
no include-group group-name
Context 
config>router>route-next-hop-policy>template
Description 

This command configures the admin group constraint into the route next-hop policy template.

Each group is entered individually. The include-group statement instructs the LFA SPF selection algorithm to pick uinp a subset of LFA next-hops among the links which belong to one or more of the specified admin groups. A link which does not belong to at least one of the admin-groups is excluded. However, a link can still be selected if it belongs to one of the groups in a include-group statement but also belongs to other groups which are not part of any include-group statement in the route next-hop policy.

The pref option is used to provide a relative preference for the admin group to select. A lower preference value means that LFA SPF will first attempt to select a LFA backup next-hop which is a member of the corresponding admin group. If none is found, then the admin group with the next higher preference value is evaluated. If no preference is configured for a given admin group name, then it is supposed to be the least preferred, i.e., numerically the highest preference value.

When evaluating multiple include-group statements within the same preference, any link which belongs to one or more of the included admin groups can be selected as an LFA next-hop. There is no relative preference based on how many of those included admin groups the link is a member of.

The exclude-group statement simply prunes all links belonging to the specified admin group before making the LFA backup next-hop selection for a prefix.

If the same group name is part of both include and exclude statements, the exclude statement will win. It other words, the exclude statement can be viewed as having an implicit preference value of 0.

The admin-group criteria are applied before running the LFA next-hop selection algorithm.

The no form deletes the admin group constraint from the route next-hop policy template.

Default 

n/a

Parameters 
group-name—
specifies the name of the group, up to 32 characters
pref pref
An integer specifying the relative preference of a group.
Values—
1 to 255
Values—
255

exclude-group

Syntax 
exclude-group group-name
no exclude-group group-name
Context 
config>router>route-next-hop-policy>template
Description 

This command configures the admin group constraint into the route next-hop policy template.

Each group is entered individually. The include-group statement instructs the LFA SPF selection algorithm to pick up a subset of LFA next-hops among the links that belong to one or more of the specified admin groups. A link that does not belong to at least one of the admin-groups is excluded. However, a link can still be selected if it belongs to one of the groups in an include-group statement but also belongs to other groups that are not part of any include-group statement in the route next-hop policy.

The pref option is used to provide a relative preference for the admin group to select. A lower preference value means that LFA SPF will first attempt to select an LFA backup next-hop that is a member of the corresponding admin group. If none is found, then the admin group with the next highest preference value is evaluated. If no preference is configured for a given admin group name, then it is supposed to be the least preferred (i.e., numerically the highest preference value).

When evaluating multiple include-group statements within the same preference, any link that belongs to one or more of the included admin groups can be selected as an LFA next-hop. There is no relative preference based on how many of those included admin groups the link is a member of.

The exclude-group statement simply prunes all links belonging to the specified admin group before making the LFA backup next-hop selection for a prefix.

If the same group name is part of both include and exclude statements, the exclude statement will win. It other words, the exclude statement can be viewed as having an implicit preference value of zero (0).

The admin-group criteria are applied before running the LFA next-hop selection algorithm.

The no form deletes the admin group constraint from the route next-hop policy template.

Default 

n/a

Parameters 
group-name—
specifies the name of the group, up to 32 characters

srlg-enable

Syntax 
[no] srlg-enable
Context 
config>router>route-next-hop-policy>template
Description 

This command configures the SRLG constraint into the route next-hop policy template.

When this command is applied to a prefix, the LFA SPF will attempt to select an LFA next-hop, among the computed ones, which uses an outgoing interface that does not participate in any of the SLRGs of the outgoing interface used by the primary next-hop.

The SRLG criterion is applied before running the LFA next-hop selection algorithm.

The no form deletes the SRLG constraint from the route next-hop policy template.

Default 

no srlg-enable

protection-type

Syntax 
protection-type {link | node}
no protection-type
Context 
config>router>route-next-hop-policy>template
Description 

This command configures the protection type constraint into the route next-hop policy template.

The user can select if link protection or node protection is preferred in the selection of an LFA next-hop for all IP prefixes and LDP FEC prefixes to which a route next-hop policy template is applied. The default in SR OS implementation is node protection. The implementation will fall back to the other type if no LFA next-hop of the preferred type is found.

When the route next-hop policy template is applied to an IP interface, all prefixes using this interface as a primary next-hop will follow the protection type preference specified in the template.

The no form deletes the protection type constraint from the route next-hop policy template.

Default 

protection-type node

Parameters 
{link | node}—
specifies the two possible values for the protection type
Values—
node

nh-type

Syntax 
nh-type {ip | tunnel}
no nh-type
Context 
config>router>route-next-hop-policy>template
Description 

This command configures the next-hop type constraint into the route next-hop policy template.

The user can select if tunnel backup next-hop or IP backup next-hop is preferred. The default in SR OS implementation is to prefer IP next-hop over tunnel next-hop. The implementation will fall back to the other type if no LFA next-hop of the preferred type is found.

When the route next-hop policy template is applied to an IP interface, all prefixes using this interface as a primary next-hop will follow the next-hop type preference specified in the template.

The no form deletes the next-hop type constraint from the route next-hop policy template.

Default 

nh-type ip

Parameters 
{ip | tunnel}—
specifies the two possible values for the next-hop type
Values—
ip

Router Interface Filter Commands

egress

Syntax 
egress
Context 
config>router>if
Description 

This command enables access to the context to configure egress network filter policies for the IP interface. If an egress filter is not defined, no filtering is performed.

Default 

n/a

ingress

Syntax 
ingress
Context 
config>router>if
Description 

This command enables access to the context to configure ingress network filter policies for the IP interface. If an ingress filter is not defined, no filtering is performed.

Default 

n/a

filter

Syntax 
filter ip ip-filter-id
filter ipv6 ipv6-filter-id
no filter [ip ip-filter-ip] [ipv6 ipv6-filter-id]
Context 
config>router>if>ingress
config>router>if>egress
Description 

This command associates an IP filter policy with an IP interface.

Filter policies control packet forwarding and dropping based on IP match criteria.

The ip-filter-id must have been preconfigured before this filter command is executed. If the filter ID does not exist, an error occurs.

Only one filter ID can be specified.

The no form of the command removes the filter policy association with the IP interface.

Default 

No filter is specified.

Parameters 
ip ip-filter-id—
The filter name acts as the ID for the IP filter policy expressed as a decimal integer. The filter policy must already exist within the config>filter>ip context.
Values—
1 to 16384
ipv6 ipv6-filter-id
The filter name acts as the ID for the IPv6 filter policy expressed as a decimal integer. The filter policy must already exist within the config>filter>ipv6 context. This parameter only applies to the 7750 SR and 7950 XRS.
Values—
1 to 65535

Router Interface ICMP Commands

hold-time

Syntax 
hold-time
Context 
config>router>if
config>service>ies>if
config>service>ies>subscriber-interface
config>service>ies>redundant-interface
config>service>vprn>if
config>service>vprn>network-interface
config>service>vprn>subscriber-interface
config>service>vprn>redundant-interface
config>service>vpls>if
Description 

This command creates the CLI context to configure interface level hold-up and hold-down timers for the associated IP interface.

The up timer controls a delay for the associated IPv4 or IPv6 interface so that the system will delay the deactivation of the associated interface for the specified amount of time.

The down timer controls a delay for the associated IPv4 or IPv6 interface so that the system will delay the activation of the associated interface for the specified amount of time

Default 

n/a

up

Syntax 
up ip seconds
no up ip
up ipv6 seconds
no up ipv6
Context 
config>router>if>hold-time
config>service>ies>if>hold-time
config>service>ies>sub-if>hold-time
config>service>ies>red-if>hold-time
config>service>vprn>if>hold-time
config>service>vprn>nw-if>hold-time
config>service>vprn>sub-if>hold-time
config>service>vprn>red-if>hold-time
config>service>vpls>if>hold-time
Description 

This command will cause a delay in the deactivation of the associated IP interface by the specified number of seconds. The delay is invoked whenever the system attempts to bring the associated IP interface down.

The no form of the command removes the command from the active configuration and removes the delay in deactivating the associated IP interface. If the configuration is removed during a delay period, the currently running delay will continue until it expires.

Default 

no up ip

Parameters 
seconds—
The time delay, in seconds, to make the interface operational.
Values—
1 to 1200

down

Syntax 
down ip seconds [init-only]
no up ip
up ipv6 seconds [init-only]
no up ipv6
Context 
config>router>if>hold-time
config>service>ies>if>hold-time
config>service>ies>sub-if>hold-time
config>service>ies>red-if>hold-time
config>service>vprn>if>hold-time
config>service>vprn>nw-if>hold-time
config>service>vprn>sub-if>hold-time
config>service>vprn>red-if>hold-time
config>service>vpls>if>hold-time
Description 

This command will cause a delay in the activation of the associated IP interface by the specified number of seconds. The delay is invoked whenever the system attempts to bring the associated IP interface up, unless the init-only option is configured. If the init-only option is configured, the delay is only applied when the IP interface is first configured or after a system reboot.

The no form of the command removes the command from the active configuration and removes the delay in activating the associated IP interface. If the configuration is removed during a delay period, the currently running delay will continue until it completes.

Default 

no down ip

Parameters 
seconds—
The time delay, in seconds, to make the interface operational.
Values—
1 to 1200
init-only
specifies that the down delay is only applied when the interface is configured or after a reboot
Values—
1 to 1200

icmp

Syntax 
icmp
Context 
config>router>if
Description 

This command enables access to the context to configure Internet Control Message Protocol (ICMP) parameters on a network IP interface. ICMP is a message control and error reporting protocol that also provides information relevant to IP packet processing.

Default 

n/a

mask-reply

Syntax 
[no] mask-reply
Context 
config>router>if>icmp
Description 

This command enables responses to ICMP mask requests on the router interface.

If a local node sends an ICMP mask request to the router interface, the mask-reply command configures the router interface to reply to the request.

The no form of the command disables replies to ICMP mask requests on the router interface.

Default 

mask-reply — Replies to ICMP mask requests.

redirects

Syntax 
redirects [number seconds]
no redirects
Context 
config>router>if>icmp
Description 

This command enables and configures the rate for ICMP redirect messages issued on the router interface.

When routes are not optimal on this router, and another router on the same subnetwork has a better route, the router can issue an ICMP redirect to alert the sending node that a better route is available.

The redirects command enables the generation of ICMP redirects on the router interface. The rate at which ICMP redirects are issued can be controlled with the optional number and time parameters by indicating the maximum number of redirect messages that can be issued on the interface for a given time interval.

By default, generation of ICMP redirect messages is enabled at a maximum rate of 100 per 10 second time interval.

The no form of the command disables the generation of ICMP redirects on the router interface.

Default 

redirects 100 10 — Maximum of 100 redirect messages in 10 seconds.

Parameters 
number—
The maximum number of ICMP redirect messages to send, expressed as a decimal integer. This parameter must be specified with the time parameter.
Values—
10 to 1000
seconds—
The time frame, in seconds, used to limit the number of ICMP redirect messages that can be issued, expressed as a decimal integer.
Values—
1 to 60

ttl-expired

Syntax 
ttl-expired [number seconds]
no ttl-expired
Context 
config>router>if>icmp
Description 

This command configures the rate that Internet Control Message Protocol (ICMP) Time To Live (TTL) expired messages are issued by the IP interface.

By default, generation of ICMP TTL expired messages is enabled at a maximum rate of 100 per 10 second time interval.

The no form of the command disables the generation of TTL expired messages.

Default 

ttl-expired 100 10 — Maximum of 100 TTL expired message in 10 seconds.

Parameters 
number—
The maximum number of ICMP TTL expired messages to send, expressed as a decimal integer. The seconds parameter must also be specified.
Values—
10 to 1000
seconds—
The time frame, in seconds, used to limit the number of ICMP TTL expired messages that can be issued, expressed as a decimal integer.
Values—
1 to 60

unreachables

Syntax 
unreachables [number seconds]
no unreachables
Context 
config>router>if>icmp
Description 

This command enables and configures the rate for ICMP host and network destination unreachable messages issued on the router interface.

The unreachables command enables the generation of ICMP destination unreachables on the router interface. The rate at which ICMP unreachables is issued can be controlled with the optional number and seconds parameters by indicating the maximum number of destination unreachable messages that can be issued on the interface for a given time interval.

By default, generation of ICMP destination unreachables messages is enabled at a maximum rate of 100 per 10 second time interval.

The no form of the command disables the generation of ICMP destination unreachables on the router interface.

Default 

unreachables 100 10 — Maximum of 100 unreachable messages in 10 seconds.

Parameters 
number—
The maximum number of ICMP unreachable messages to send, expressed as a decimal integer. The seconds parameter must also be specified.
Values—
10 to 1000
seconds—
The time frame, in seconds, used to limit the number of ICMP unreachable messages that can be issued, expressed as a decimal integer.

Router Interface IPv6 Commands

ipv6

Syntax 
[no] ipv6
Context 
config>router>if
Description 

This command configures IPv6 for a router interface.

The no form of the command disables IPv6 on the interface.

Default 

not enabled

address

Syntax 
address {ipv6-address/prefix-length} [eui-64]
no address {ipv6-address/prefix-length}
Context 
config>router>if>ipv6
Description 

This command assigns an IPv6 address to the interface.

Default 

none

Parameters 
ipv6-address/prefix-length—
specify the IPv6 address on the interface
Values—

ipv6-address/prefix:

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x [0 to FFFF]H

d [0 to 255]D

prefix-length

1 to 128

eui-64—
When the eui-64 keyword is specified, a complete IPv6 address from the supplied prefix and 64-bit interface identifier is formed. The 64-bit interface identifier is derived from MAC address on Ethernet interfaces. For interfaces without a MAC address, for example POS interfaces, the Base MAC address of the chassis should be used.

dad-disable

Syntax 
[no] dad-disable
Context 
config>router>if>ipv6
Description 

This command disables duplicate address detection (DAD) on a per-interface basis. This prevents the router from performing a DAD check on the interface. All IPv6 addresses of an interface with DAD disabled, immediately enter a preferred state, without checking for uniqueness on the interface. This is useful for interfaces which enter a looped state during troubleshooting and operationally disable themselves when the loop is detected, requiring manual intervention to clear the DAD violation.

The no form of the command turns off dad-disable on the interface.

Default 

not enabled

icmp6

Syntax 
icmp6
Context 
config>router>if>ipv6
Description 

This command enables the context to configure ICMPv6 parameters for the interface.

packet-too-big

Syntax 
packet-too-big [number seconds]
no packet-too-big
Context 
config>router>if>ipv6>icmp6
Description 

This command configures the rate for ICMPv6 packet-too-big messages.

Parameters 
number—
Limits the number of packet-too-big messages issued per the time frame specified in the seconds parameter.
Values—
10 to 1000
seconds—
Determines the time frame, in seconds, that is used to limit the number of packet-too-big messages issued per time frame.
Values—
1 to 60

param-problem

Syntax 
param-problem [number seconds]
no param-problem
Context 
config>router>if>ipv6>icmp6
Description 

This command configures the rate for ICMPv6 param-problem messages.

Parameters 
number—
Limits the number of param-problem messages issued per the time frame specified in the seconds parameter.
Values—
10 to 1000
seconds—
Determines the time frame, in seconds, that is used to limit the number of param-problem messages issued per time frame.
Values—
1 to 60

redirects

Syntax 
redirects [number seconds]
no redirects
Context 
config>router>if>ipv6>icmp6
Description 

This command configures the rate for ICMPv6 redirect messages. When configured, ICMPv6 redirects are generated when routes are not optimal on the router and another router on the same subnetwork has a better route to alert that node that a better route is available.

The no form of the command disables ICMPv6 redirects.

Default 

100 10 (when IPv6 is enabled on the interface)

Parameters 
number—
Limits the number of redirects issued per the time frame specified in seconds parameter.
Values—
10 to 1000
seconds—
determines the time frame, in seconds, that is used to limit the number of redirects issued per time frame
Values—
1 to 60

time-exceeded

Syntax 
time-exceeded [number seconds]
no time-exceeded
Context 
config>router>if>ipv6>icmp6
Description 

This command configures rate for ICMPv6 time-exceeded messages.

Parameters 
number—
Limits the number of time-exceeded messages issued per the time frame specified in seconds parameter.
Values—
10 to 1000
seconds—
Determines the time frame, in seconds, that is used to limit the number of time-exceeded messages issued per time frame.
Values—
1 to 60

unreachables

Syntax 
unreachables [number seconds]
no unreachables
Context 
config>router>if>ipv6>icmp6
Description 

This command configures the rate for ICMPv6 unreachable messages. When enabled, ICMPv6 host and network unreachable messages are generated by this interface.

The no form of the command disables the generation of ICMPv6 host and network unreachable messages by this interface.

Default 

100 10 (when IPv6 is enabled on the interface)

Parameters 
number—
Determines the number destination unreachable ICMPv6 messages to issue in the time frame specified in seconds parameter.
Values—
10 to 1000
seconds—
Sets the time frame, in seconds, to limit the number of destination unreachable ICMPv6 messages issued per time frame.
Values—
1 to 60

link-local-address

Syntax 
link-local-address ipv6-address [preferred]
Context 
config>router>if>ipv6
config>service>ies>if>ipv6
config>service>vprn>if>ipv6
Description 

This command configures the IPv6 link local address.

The no form of the command removes the configured link local address, and the router automatically generates a default link local address.

Removing a manually configured link local address may impact routing protocols or static routes that have a dependency on that address. It is not recommended to remove a link local address when there are active IPv6 subscriber hosts on an IES or VPRN interface.

Parameters 
preferred—
Disables duplicated address detection and sets the address to preferred, even if there is a duplicate address.

local-proxy-nd

Syntax 
[no] local-proxy-nd
Context 
config>router>if>ipv6
Description 

This command enables local proxy neighbor discovery on the interface.

The no form of the command disables local proxy neighbor discovery.

neighbor

Syntax 
neighbor [ipv6-address] [mac-address]
no neighbor [ipv6-address]
Context 
config>router>if>ipv6
Description 

This command configures an IPv6-to-MAC address mapping on the interface. Use this command if a directly attached IPv6 node does not support ICMPv6 neighbor discovery, or for some reason, a static address must be used. This command can only be used on Ethernet media.

The ipv6-address must be on the subnet that was configured from the IPv6 address command or a link-local address.

Parameters 
ipv6-address—
The IPv6 address assigned to a router interface.
Values—

ipv6-address:

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x:

[0 to FFFF]H

d:

[0 to 255]D

mac-address—
specifies the MAC address for the neighbor in the form of xx:xx:xx:xx:xx:xx or xx-xx-xx-xx-xx-xx

neighbor-limit

Syntax 
neighbor-limit limit [log-only] [threshold percent]
no neighbor-limit
Context 
config>router>if>ipv6
Description 

This command configures the maximum amount of dynamic IPv6 neighbor entries that can be learned on an IP interface.

When the number of dynamic neighbor entries reaches the configured percentage of this limit, an SNMP trap is sent. When the limit is exceeded, no new entries are learned until an entry expires and traffic to these destinations will be dropped. Entries that have already been learned will be refreshed.

The no form of the command removes the neighbor-limit.

Default 

90 percent

Parameters 
log-only—
Enables the warning message to be sent at the specified threshold percentage, and also when the limit is exceeded. However, entries above the limit will be learned.
percent —
the threshold value (as a percentage) that triggers a warning message to be sent
Values—
0 to 100
limit —
The number of entries that can be learned on an IP interface expressed as a decimal integer. If the limit is set to 0, dynamic neighbor learning is disabled and no dynamic neighbor entries are learned.
Values—
0 to 102400

proxy-nd-policy

Syntax 
proxy-nd-policy policy-name [policy-name...(up to 5 max)]
no proxy-nd-policy
Context 
config>router>if>ipv6
Description 

This command configure a proxy neighbor discovery policy for the interface.

Parameters 
policy-name—
The neighbor discovery policy name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. The specified policy name(s) must already be defined.

Router Interface DHCP Commands

dhcp

Syntax 
dhcp
Context 
config>router>if
Description 

This command enables the context to configure DHCP parameters.

Default 

n/a

gi-address

Syntax 
gi-address ip-address [src-ip-addr]
no gi-address
Context 
config>router>if>dhcp
Description 

This command configures the gateway interface address for the DHCP relay. The GI address is needed, when the router functions as a DHCP relay, to distinguish between the different subscriber interfaces and potentially between the group interfaces defined.

Default 

no gi-address

Parameters 
ip-address—
specifies the host IP address to be used for DHCP relay packets
src-ip-address—
specifies the source IP address to be used for DHCP relay packets

option

Syntax 
[no] option
Context 
config>router>if>dhcp
Description 

This command enables DHCP Option 82 (Relay Agent Information Option) parameters processing and enters the context for configuring Option 82 sub-options.

The no form of this command returns the system to the default.

Default 

no option

action

Syntax 
action {replace | drop | keep}
no action
Context 
config>router>if>dhcp>option
Description 

This command configures the processing required when the SR-Series router receives a DHCP request that already has a Relay Agent Information Option (Option 82) field in the packet.

The no form of this command returns the system to the default value.

Default 

Per RFC 3046, DHCP Relay Agent Information Option, section 2.1.1, Reforwarded DHCP requests, the default is to keep the existing information intact. The exception to this is if the GI address of the received packet is the same as the ingress address on the router. In that case the packet is dropped and an error is logged.

Parameters 
replace—
In the upstream direction (from the user), the existing Option 82 field is replaced with the Option 82 field from the router. In the downstream direction (towards the user) the Option 82 field is stripped (in accordance with RFC 3046).
drop—
The packet is dropped, and an error is logged.
keep—
The existing information is kept in the packet and the router does not add any additional information. In the downstream direction the Option 82 field is not stripped and is sent on towards the client.

The behavior is slightly different in case of Vendor Specific Options (VSOs). When the keep parameter is specified, the router will insert his own VSO into the Option 82 field. This will only be done when the incoming message has already an Option 82 field.

If no Option 82 field is present, the router will not create the Option 82 field. In this in that case, no VSO will be added to the message.

circuit-id

Syntax 
circuit-id [ascii-tuple | ifindex | sap-id | vlan-ascii-tuple]
no circuit-id
Context 
config>router>if>dhcp>option
Description 

When enabled, the router sends the interface index (If Index) in the circuit-id suboption of the DHCP packet. The If Index of a router interface can be displayed using the command show>router>if>detail. This option specifies data that must be unique to the router that is relaying the circuit.

If disabled, the circuit-id suboption of the DHCP packet will be left empty.

The no form of this command returns the system to the default.

Default 

circuit-id ascii-tuple

Parameters 
ascii-tuple—
specifies that the ASCII-encoded concatenated tuple will be used which consists of the access-node-identifier, service-id, and interface-name, separated by “|”
ifindex—
specifies that the interface index will be used. The If Index of a router interface can be displayed using the command show>router>if>detail.
sap-id—
specifies that the SAP ID will be used
vlan-ascii-tuple—
specifies that the format will include VLAN-id and dot1p bits in addition to what is included in ascii-tuple already. The format is supported on dot1q and qinq ports only. Thus, when the Option 82 bits are stripped, dot1p bits will be copied to the Ethernet header of an outgoing packet.

remote-id

Syntax 
remote-id [mac | string string]
no remote-id
Context 
config>router>if>dhcp>option
Description 

When enabled, the router sends the MAC address of the remote end (typically the DHCP client) in the remote-id suboption of the DHCP packet. This command identifies the host at the other end of the circuit. If disabled, the remote-id suboption of the DHCP packet will be left empty.

The no form of this command returns the system to the default.

Default 

no remote-id

Parameters 
mac—
This keyword specifies the MAC address of the remote end is encoded in the suboption.
string string
specifies the remote-id

vendor-specific-option

Syntax 
[no] vendor-specific-option
Context 
config>router>if>dhcp>option
Description 

This command configures the Nokia vendor specific suboption of the DHCP relay packet.

Default 

n/a

client-mac-address

Syntax 
[no] client-mac-address
Context 
config>router>if>dhcp>option
Description 

This command enables the sending of the MAC address in the Nokia vendor specific suboption of the DHCP relay packet.

The no form of the command disables the sending of the MAC address in the Nokia vendor specific suboption of the DHCP relay packet.

Default 

no client-mac-address

pool-name

Syntax 
[no] pool-name
Context 
config>router>if>dhcp>option>vendor-specific-option
Description 

This command enables the sending of the pool name in the Nokia vendor-specific suboption of the DHCP relay packet.

The no form of the command disables the feature.

Default 

no pool-name

port-id

Syntax 
[no] port-id
Context 
config>router>if>dhcp>option>vendor-specific-option
Description 

This command enables sending of the port-id in the Nokia vendor specific suboption of the DHCP relay packet

The no form of the command disables the sending.

Default 

no port-id

service-id

Syntax 
[no] service-id
Context 
config>router>if>dhcp>option>vendor-specific-option
Description 

This command enables the sending of the service ID in the Nokia vendor specific suboption of the DHCP relay packet.

The no form of the command disables the sending of the service ID in the Nokia vendor specific suboption of the DHCP relay packet.

Default 

no service-id

string

Syntax 
[no] string text
Context 
config>router>if>dhcp>option>vendor-specific-option
Description 

This command specifies the vendor specific suboption string of the DHCP relay packet.

The no form of the command returns the default value.

Default 

no string

Parameters 
text—
The string can be any combination of ASCII characters up to 32 characters in length. If spaces are used in the string, enclose the entire string in quotation marks (“ ”).

system-id

Syntax 
[no] system-id
Context 
config>router>if>dhcp>option>vendor-specific-option
Description 

This command specifies whether the system-id is encoded in the Nokia vendor specific sub-option of Option 82.

Default 

no system-id

relay-plain-bootp

Syntax 
[no] relay-plain-bootp
Context 
config>router>if>dhcp
Description 

This command enables the relaying of plain BOOTP packets.

The no form of the command disables the relaying of plain BOOTP packets.

Default 

no relay-plain-bootp

server

Syntax 
server server1 [server2...(up to 8 max)]
Context 
config>router>if>dhcp
Description 

This command specifies a list of servers where requests will be forwarded. The list of servers can entered as either IP addresses or fully qualified domain names. There must be at least one server specified for DHCP relay to work. If there are multiple servers then the request is forwarded to all of the servers in the list. There can be a maximum of 8 DHCP servers configured.

The flood command is applicable only in the VPLS case. There is a scenario with VPLS where the VPLS node only wants to add Option 82 information to the DHCP request to provider per-subscriber information, but it does not do full DHCP relay. In this case, the server is set to "flood". This means the DHCP request is still a broadcast and is sent through the VPLS domain. A node running at L3 further upstream then can perform the full L3 DHCP relay function.

Default 

no server

Parameters 
server—
specifies the DHCP server IP address

trusted

Syntax 
[no] trusted
Context 
config>router>if>dhcp
Description 

According to RFC 3046, DHCP Relay Agent Information Option, a DHCP request where the GI address is 0.0.0.0 and which contains a Option 82 field in the packet, should be discarded, unless it arrives on a "trusted" circuit.

If trusted mode is enabled on an IP interface, the relay agent (the SR-Series) will modify the request's GI address to be equal to the ingress interface and forward the request.

This behavior only applies when the action in the Relay Agent Information Option is "keep". In the case where the Option 82 field is being replaced by the relay agent (action = "replace"), the original Option 82 information is lost anyway, and there is thus no reason for enabling the trusted option.

The no form of this command returns the system to the default.

Default 

no trusted

python-policy

Syntax 
python-policy name
no python-policy
Context 
config>router>if>dhcp
Description 

This command specifies a python policy. Python policies are configured in the config>python> python-policy name context.

Default 

no python-policy

Parameters 
name—
specifies the name of an existing python script up to 32 characters in length

Router Advertisement Commands

router-advertisement

Syntax 
[no] router-advertisement
Context 
config>router
Description 

This command configures router advertisement properties. By default, it is disabled for all IPv6 enabled interfaces.

The no form of the command disables all IPv6 interface. However, the no interface interface-name command disables a specific interface.

Default 

disabled

dns-options

Syntax 
[no] dns-options
Context 
config>router>router-advert
config>router>router-advert>if
Description 

This command enables the context for configuration of DNS information for Stateless Address Auto-Configuration (SLAAC) hosts.

When specified at the router-advertisement level in the routing context, this command allows configuration of service-wide parameters. These can then be inherited at the interface level by specifying the config>router>router-advert>if>dns-options>include-dns command.

The no form of the command disables configuration of DNS information for Stateless Address Auto-Configuration (SLAAC) hosts.

Default 

disabled

servers

Syntax 
server ipv6-address
no server
Context 
config>router>router-advert>dns-options
config>router>router-advert>if>dns-options
Description 

This command specifies the IPv6 DNS servers to include in the RDNSS option in Router Advertisements. When specified at the router advertisement level this applies to all interfaces that have include-dns enabled, unless the interfaces have more specific dns-options configured.

Default 

n/a

Parameters 
ipv6-address—
Specify the IPv6 address of the DNS server(s), up to 4 max. Specified as eight 16-bit hexadecimal pieces.

include-dns

Syntax 
[no] include-dns
Context 
config>router>router-advert>if>dns-options
Description 

This command enables the Recursive DNS Server (RDNSS) Option in router advertisements. This must be enabled for each interface on which the RDNSS option is required in router advertisement messages.

The no form of the command disables the RDNSS option in router advertisements.

Default 

disabled

rdnss-lifetime

Syntax 
rdnss-lifetime {seconds | infinite}
no rdnss-lifetime
Context 
config>router>router-advert>dns-options
config>router>router-advert>if>dns-options
Description 

This command specifies the maximum time that the RDNSS address may be used for name resolution by the client. The RDNSS Lifetime must be no more than twice MaxRtrAdvLifetime with a maximum of 3600 seconds.

Default 

rdnss-lifetime infinite

Parameters 
infinite—
specifies an infinite RDNSS lifetime
seconds—
specifies the time in seconds
Values—
4 to 3600

interface

Syntax 
[no] interface ip-int-name
Context 
config>router>router-advert
Description 

This command configures router advertisement properties on a specific interface. The interface must already exist in the config>router>if context.

Default 

No interfaces are configured by default.

Parameters 
ip-int-name—
Specify the interface name. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

current-hop-limit

Syntax 
current-hop-limit number
no current-hop-limit
Context 
config>router>router-advert>if
Description 

This command configures the current-hop-limit in the router advertisement messages. It informs the nodes on the subnet about the hop-limit when originating IPv6 packets.

Default 

current-hop-limit 64

Parameters 
number—
specifies the hop limit
Values—
0 to 255. A value of zero means there is an unspecified number of hops.

managed-configuration

Syntax 
[no] managed-configuration
Context 
config>router>router-advert>if
Description 

This command sets the managed address configuration flag. This flag indicates that DHCPv6 is available for address configuration in addition to any address autoconfigured using stateless address autoconfiguration. See RFC 3315, Dynamic Host Configuration Protocol (DHCP) for IPv6.

Default 

no managed-configuration

max-advertisement-interval

Syntax 
[no] max-advertisement-interval seconds
Context 
config>router>router-advert>if
Description 

This command configures the maximum interval between sending router advertisement messages.

Default 

max-advertisement-interval 600

Parameters 
seconds—
specifies the maximum interval in seconds between sending router advertisement messages
Values—
4 to 1800

min-advertisement-interval

Syntax 
[no] min-advertisement-interval seconds
Context 
config>router>router-advert>if
Description 

This command configures the minimum interval between sending ICMPv6 neighbor discovery router advertisement messages.

Default 

min-advertisement-interval 200

Parameters 
seconds—
Specify the minimum interval in seconds between sending ICMPv6 neighbor discovery router advertisement messages.
Values—
3 to 1350

mtu

Syntax 
[no] mtu mtu-bytes
Context 
config>router>router-advert>if
Description 

This command configures the MTU for the nodes to use to send packets on the link.

Default 

no mtu — The MTU option is not sent in the router advertisement messages.

Parameters 
mtu-bytes—
Specify the MTU for the nodes to use to send packets on the link.
Values—
1280 to 9212

other-stateful-configuration

Syntax 
[no] other-stateful-configuration
Context 
config>router>router-advert>if
Description 

This command sets the "Other configuration" flag. This flag indicates that DHCPv6lite is available for autoconfiguration of other (non-address) information such as DNS-related information or information on other servers in the network. See RFC 3736, Stateless Dynamic Host Configuration Protocol (DHCP) for IPv6.

Default 

no other-stateful-configuration

prefix

Syntax 
[no] prefix [ipv6-prefix/prefix-length]
Context 
config>router>router-advert>if
Description 

This command configures an IPv6 prefix in the router advertisement messages. To support multiple IPv6 prefixes, use multiple prefix statements. No prefix is advertised until explicitly configured using prefix statements.

Default 

n/a

Parameters 
ip-prefix—
The IP prefix for prefix list entry in dotted decimal notation.
Values—

ipv4-prefix

a.b.c.d (host bits must be 0)

ipv4-prefix-length

0 to 32

ipv6-prefix

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x:

[0 to FFFF]H

d:

[0 to 255]D

ipv6-prefix-length

0 to 128

prefix-length—
specifies a route must match the most significant bits and have a prefix length
Values—
1 to 128

autonomous

Syntax 
[no] autonomous
Context 
config>router>router-advert>if>prefix
Description 

This command specifies whether the prefix can be used for stateless address autoconfiguration.

Default 

enabled

on-link

Syntax 
[no] on-link
Context 
config>router>router-advert>if>prefix
Description 

This command specifies whether the prefix can be used for onlink determination.

Default 

enabled

preferred-lifetime

Syntax 
[no] preferred-lifetime {seconds | infinite}
Context 
config>router>router-advert>if
Description 

This command configures the remaining length of time in seconds that this prefix will continue to be preferred, such as, time until deprecation. The address generated from a deprecated prefix should not be used as a source address in new communications, but packets received on such an interface are processed as expected.

Default 

604800

Parameters 
seconds—
specifies the remaining length of time in seconds that this prefix will continue to be preferred
infinite—
specifies that the prefix will always be preferred. A value of 4,294,967,295 represents infinity

valid-lifetime

Syntax 
valid-lifetime {seconds | infinite}
Context 
config>router>router-advert>if
Description 

This command specifies the length of time in seconds that the prefix is valid for the purpose of on-link determination. A value of all one bits (0xffffffff) represents infinity.

The address generated from an invalidated prefix should not appear as the destination or source address of a packet.

Default 

2592000

Parameters 
seconds—
specifies the remaining length of time in seconds that this prefix will continue to be valid
infinite—
specifies that the prefix will always be valid. A value of 4,294,967,295 represents infinity

reachable-time

Syntax 
reachable-time milli-seconds
no reachable-time
Context 
config>router>router-advert>if
Description 

This command configures how long this router should be considered reachable by other nodes on the link after receiving a reachability confirmation.

Default 

no reachable-time

Parameters 
milli-seconds—
specifies the length of time the router should be considered reachable
Values—
0 to 3600000

retransmit-time

Syntax 
retransmit-timer milli-seconds
no retransmit-timer
Context 
config>router>router-advert>if
Description 

This command configures the retransmission frequency of neighbor solicitation messages.

Default 

no retransmit-time

Parameters 
milli-seconds—
specifies how often the retransmission should occur
Values—
0 to 1800000

router-lifetime

Syntax 
router-lifetime seconds
no router-lifetime
Context 
config>router>router-advert>if
Description 

This command sets the router lifetime.

Default 

1800

Parameters 
seconds—
The length of time, in seconds, (relative to the time the packet is sent) that the prefix is valid for route determination.
Values—
0, 4 to 9000 seconds. 0 means that the router is not a default router on this link.

use-virtual-mac

Syntax 
[no] use-virtual-mac
Context 
config>router>router-advert>if
Description 

This command enables sending router advertisement messages using the VRRP virtual MAC address, provided that the virtual router is currently the master.

If the virtual router is not the master, no router advertisement messages are sent.

The no form of the command disables sending router advertisement messages.

Default 

no use-virtual-mac