Nokia 7450 ESS, 7750 SR, 7950 XRS, and VSR 16.0.R4
  Legal Disclaimers
  Customer Documentation and Product Support
  Legal Disclaimers
  Customer Documentation and Product Support
Acronyms Reference Guide 16.0.R4
  1. 7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
  Customer Document and Product Support
  1. 7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
  Customer Document and Product Support
Basic System Configuration Guide 16.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Router System Configuration Process
  2. CLI Usage
    2.1. CLI Structure
    2.2. Navigating in the CLI
      2.2.1. CLI Contexts
      2.2.2. Basic CLI Commands
      2.2.3. CLI Environment Commands
      2.2.4. CLI Monitor Commands
    2.3. Getting Help in the CLI
    2.4. The CLI Command Prompt
    2.5. Displaying Configuration Contexts
    2.6. EXEC Files
    2.7. CLI Script Control
    2.8. Entering CLI Commands
      2.8.1. Command Completion
      2.8.2. Unordered and Unnamed Parameters
      2.8.3. Editing Keystrokes
      2.8.4. Absolute Paths
      2.8.5. History
      2.8.6. Entering Numerical Ranges
      2.8.7. Pipe/Match
      2.8.8. Pipe/Count
      2.8.9. Range Operator Support of Regular Expression Match
        2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
      2.8.10. Redirection
    2.9. VI Editor
      2.9.1. Summary of vi Commands
      2.9.2. Using the vi Commands
      2.9.3. EX Commands
    2.10. Configuration Rollback
      2.10.1. Feature Behavior
      2.10.2. Rollback and SNMP
      2.10.3. Rescue Configuration
      2.10.4. Operational Guidelines
    2.11. Transactional Configuration
      2.11.1. Basic Operation
      2.11.2. Transactions and Rollback
      2.11.3. Authorization
    2.12. Basic CLI Command Reference
      2.12.1. Command Hierarchies
        2.12.1.1. Global Commands
        2.12.1.2. Monitor Commands
        2.12.1.3. Environment Commands
        2.12.1.4. Candidate Commands
        2.12.1.5. Rollback Commands
      2.12.2. Command Descriptions
        2.12.2.1. Global Commands
        2.12.2.2. Monitor CLI Commands
        2.12.2.3. CLI Environment Commands
        2.12.2.4. Candidate Commands
        2.12.2.5. Rollback Commands
        2.12.2.6. Show Commands
  3. File System Management
    3.1. The File System
      3.1.1. Compact Flash Devices
      3.1.2. URLs
      3.1.3. Wildcards
    3.2. File Management Tasks
      3.2.1. Modifying File Attributes
      3.2.2. Creating Directories
      3.2.3. Copying Files
      3.2.4. Moving Files
      3.2.5. Deleting Files and Removing Directories
      3.2.6. Displaying Directory and File Information
      3.2.7. Repairing the File System
    3.3. File Command Reference
      3.3.1. Command Hierarchy
        3.3.1.1. File Commands
      3.3.2. Command Descriptions
        3.3.2.1. File System Commands
        3.3.2.2. File Commands
  4. Boot Options
    4.1. System Initialization
      4.1.1. Configuration and Image Loading
        4.1.1.1. Persistence
        4.1.1.2. Lawful Intercept
        4.1.1.3. FIPS-140-2 Mode
        4.1.1.4. System Profiles
    4.2. Initial System Startup Process Flow
    4.3. Configuration Notes
    4.4. Configuring Boot Options File with CLI
      4.4.1. BOF Configuration Overview
      4.4.2. Basic BOF Configuration
      4.4.3. Common Configuration Tasks
        4.4.3.1. Searching for the BOF
        4.4.3.2. Accessing the CLI
          4.4.3.2.1. Console Connection
      4.4.4. Configuring BOF Parameters
    4.5. Service Management Tasks
      4.5.1. System Administration Commands
        4.5.1.1. Viewing the Current Configuration
        4.5.1.2. Modifying and Saving a Configuration
        4.5.1.3. Deleting Bof Parameters
        4.5.1.4. Saving a Configuration to a Different Filename
        4.5.1.5. Rebooting
    4.6. BOF Configuration Command Reference
      4.6.1. Command Hierarchies
        4.6.1.1. Configuration Commands
      4.6.2. Command Descriptions
        4.6.2.1. File Management Commands
        4.6.2.2. BOF Processing Control
        4.6.2.3. Console Port Configuration
        4.6.2.4. Image and Configuration Management
        4.6.2.5. Management Ethernet Configuration
        4.6.2.6. DNS Configuration Commands
    4.7. BOF Show Command Reference
      4.7.1. Command Hierarchies
      4.7.2. Command Descriptions
        4.7.2.1. BOF Show Commands
  5. System Management
    5.1. System Management Parameters
      5.1.1. System Information
        5.1.1.1. System Name
        5.1.1.2. System Contact
        5.1.1.3. System Location
        5.1.1.4. System Coordinates
        5.1.1.5. Naming Objects
        5.1.1.6. Common Language Location Identifier
        5.1.1.7. DNS Security Extensions
      5.1.2. System Time
        5.1.2.1. Time Zones
        5.1.2.2. Network Time Protocol (NTP)
        5.1.2.3. SNTP Time Synchronization
        5.1.2.4. CRON
    5.2. High Availability
      5.2.1. HA Features
        5.2.1.1. Redundancy
          5.2.1.1.1. Software Redundancy
          5.2.1.1.2. Configuration Redundancy
          5.2.1.1.3. Component Redundancy
          5.2.1.1.4. Service Redundancy
          5.2.1.1.5. Accounting Configuration Redundancy
        5.2.1.2. Nonstop Forwarding
        5.2.1.3. Nonstop Routing (NSR)
        5.2.1.4. CPM Switchover
        5.2.1.5. Synchronization
          5.2.1.5.1. Configuration and boot-env Synchronization
          5.2.1.5.2. State Database Synchronization
    5.3. Synchronization and Redundancy
      5.3.1. Active and Standby Designations
      5.3.2. When the Active CPM Goes Offline
      5.3.3. OOB Management Ethernet Port Redundancy
      5.3.4. Persistence
        5.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    5.4. Network Synchronization
      5.4.1. Central Synchronization Sub-System
      5.4.2. 7950 XRS-40 Extension Chassis Central Clocks
      5.4.3. Synchronization Status Messages (SSM)
        5.4.3.1. DS1 Signals
        5.4.3.2. E1 Signals
        5.4.3.3. SONET/SDH Signals
        5.4.3.4. DS3/E3
      5.4.4. Synchronous Ethernet
      5.4.5. Clock Source Quality Level Definitions
      5.4.6. Advanced G.781 Features
      5.4.7. IEEE 1588v2 PTP
        5.4.7.1. PTP Clock Synchronization
        5.4.7.2. Performance Considerations
          5.4.7.2.1. Port-Based Timestamping of PTP Messages
        5.4.7.3. PTP Capabilities
        5.4.7.4. PTP Ordinary Slave Clock For Frequency
        5.4.7.5. PTP Ordinary Master Clock For Frequency
        5.4.7.6. PTP Boundary Clock for Frequency and Time
        5.4.7.7. PTP Clock Redundancy
        5.4.7.8. PTP Time for System Time and OAM Time
        5.4.7.9. PTP within Routing Instances
    5.5. System-Wide ATM Parameters
    5.6. QinQ Network Interface Support
    5.7. Link Layer Discovery Protocol (LLDP)
    5.8. IP Hashing as an LSR
    5.9. Satellites
      5.9.1. Ethernet Satellites
      5.9.2. TDM Satellites
      5.9.3. Software Repositories for Satellites
      5.9.4. Satellite Software Upgrade Overview
      5.9.5. 100GE Client Ports
      5.9.6. Satellite Configuration
        5.9.6.1. Satellite Client Port ID Formats
        5.9.6.2. Local Forwarding
        5.9.6.3. Port Template
        5.9.6.4. 10GE Client Ports
        5.9.6.5. 10GE Uplinks on the 64x10GE+4x100GE Satellite
        5.9.6.6. Satellite Uplink Resiliency
    5.10. Auto-provisioning
      5.10.1. Auto-provisioning limits
      5.10.2. Auto-provisioning Process
      5.10.3. Auto-provisioning DHCP Rules
      5.10.4. Auto-provisioning Failure
    5.11. Administrative Tasks
      5.11.1. Saving Configurations
      5.11.2. Specifying Post-Boot Configuration Files
      5.11.3. Network Timing
      5.11.4. Power Supplies
      5.11.5. Automatic Synchronization
        5.11.5.1. Boot-Env Option
        5.11.5.2. Config Option
      5.11.6. Manual Synchronization
        5.11.6.1. Forcing a Switchover
    5.12. System Router Instances
    5.13. System Configuration Process Overview
    5.14. Configuration Notes
      5.14.1. General
    5.15. Configuring System Management with CLI
      5.15.1. Saving Configurations
      5.15.2. Basic System Configuration
      5.15.3. Common Configuration Tasks
        5.15.3.1. System Information
          5.15.3.1.1. System Information Parameters
          5.15.3.1.2. Coordinates
          5.15.3.1.3. System Time Elements
          5.15.3.1.4. ANCP Enhancements
        5.15.3.2. Configuring Synchronization and Redundancy
          5.15.3.2.1. Configuring Persistence
          5.15.3.2.2. Configuring Synchronization
          5.15.3.2.3. Configuring Manual Synchronization
          5.15.3.2.4. Forcing a Switchover
          5.15.3.2.5. Configuring Synchronization Options
        5.15.3.3. Configuring Multi-Chassis Redundancy for LAG
        5.15.3.4. Configuring Mixed Mode
          5.15.3.4.1. Enabling Mixed Mode on a 7450 System
        5.15.3.5. Configuring Power Supply Parameters
        5.15.3.6. Configuring ATM System Parameters
        5.15.3.7. Configuring Backup Copies
        5.15.3.8. Post-Boot Configuration Extension Files
          5.15.3.8.1. Show Command Output and Console Messages
      5.15.4. System Timing
        5.15.4.1. Edit Mode
        5.15.4.2. Configuring Timing References
        5.15.4.3. Using the Revert Command
        5.15.4.4. Other Editing Commands
        5.15.4.5. Forcing a Specific Reference
      5.15.5. Configuring System Monitoring Thresholds
        5.15.5.1. Creating Events
        5.15.5.2. System Alarm Contact Inputs
      5.15.6. Configuring LLDP
    5.16.  System Command Reference
      5.16.1. Command Hierarchies
        5.16.1.1. Configuration Commands
        5.16.1.2. System Information Commands
        5.16.1.3. Satellite Commands
        5.16.1.4. System Alarm Contact Input Commands
        5.16.1.5. System Threshold Alarm Commands
        5.16.1.6. System Bluetooth Commands
        5.16.1.7. Mixed Mode Configuration Commands
        5.16.1.8. Persistence Commands
        5.16.1.9. PTP Commands
        5.16.1.10. System Time Commands
        5.16.1.11. Cron Commands
        5.16.1.12. Script Control Commands
        5.16.1.13. System Synchronization Commands
        5.16.1.14. System Administration (Admin) Commands
        5.16.1.15. High Availability (Redundancy) Commands
        5.16.1.16. LLDP System Commands
        5.16.1.17. LLDP Ethernet Port Commands
        5.16.1.18. System Router Instance Commands
      5.16.2. System Command Reference
        5.16.2.1. Generic Commands
        5.16.2.2. System Information Commands
        5.16.2.3. System Alarm Contact Input Commands
        5.16.2.4. System Threshold Alarm Commands
        5.16.2.5. System Bluetooth Commands
        5.16.2.6. Mixed Mode Configuration Commands
        5.16.2.7. Persistence Commands
        5.16.2.8. PTP Commands
        5.16.2.9. Date and Time Commands
        5.16.2.10. Network Time Protocol Commands
          5.16.2.10.1. SNTP Commands
          5.16.2.10.2. System Time Commands
        5.16.2.11. Cron Commands
        5.16.2.12. Script Control Commands
        5.16.2.13. System Synchronization Configuration Commands
        5.16.2.14. System Administration Commands
        5.16.2.15. Redundancy Commands
          5.16.2.15.1. Peer Commands
          5.16.2.15.2. Multi-Chassis Endpoint Commands
          5.16.2.15.3. MC-LAG Commands
        5.16.2.16. LLDP System Commands
        5.16.2.17. LLDP Ethernet Port Commands
        5.16.2.18. System Router Instance Commands
    5.17. Show, Clear, Debug, and Tools Command Reference
      5.17.1. Command Hierarchies
        5.17.1.1. Show Commands
        5.17.1.2. Clear Commands
        5.17.1.3. Debug Commands
        5.17.1.4. Tools Commands
      5.17.2. Command Descriptions
        5.17.2.1. Show Commands
        5.17.2.2. Debug Commands
        5.17.2.3. Tools Commands
        5.17.2.4. Clear Commands
  6. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router System Configuration Process
  2. CLI Usage
    2.1. CLI Structure
    2.2. Navigating in the CLI
      2.2.1. CLI Contexts
      2.2.2. Basic CLI Commands
      2.2.3. CLI Environment Commands
      2.2.4. CLI Monitor Commands
    2.3. Getting Help in the CLI
    2.4. The CLI Command Prompt
    2.5. Displaying Configuration Contexts
    2.6. EXEC Files
    2.7. CLI Script Control
    2.8. Entering CLI Commands
      2.8.1. Command Completion
      2.8.2. Unordered and Unnamed Parameters
      2.8.3. Editing Keystrokes
      2.8.4. Absolute Paths
      2.8.5. History
      2.8.6. Entering Numerical Ranges
      2.8.7. Pipe/Match
      2.8.8. Pipe/Count
      2.8.9. Range Operator Support of Regular Expression Match
        2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
      2.8.10. Redirection
    2.9. VI Editor
      2.9.1. Summary of vi Commands
      2.9.2. Using the vi Commands
      2.9.3. EX Commands
    2.10. Configuration Rollback
      2.10.1. Feature Behavior
      2.10.2. Rollback and SNMP
      2.10.3. Rescue Configuration
      2.10.4. Operational Guidelines
    2.11. Transactional Configuration
      2.11.1. Basic Operation
      2.11.2. Transactions and Rollback
      2.11.3. Authorization
    2.12. Basic CLI Command Reference
      2.12.1. Command Hierarchies
        2.12.1.1. Global Commands
        2.12.1.2. Monitor Commands
        2.12.1.3. Environment Commands
        2.12.1.4. Candidate Commands
        2.12.1.5. Rollback Commands
      2.12.2. Command Descriptions
        2.12.2.1. Global Commands
        2.12.2.2. Monitor CLI Commands
        2.12.2.3. CLI Environment Commands
        2.12.2.4. Candidate Commands
        2.12.2.5. Rollback Commands
        2.12.2.6. Show Commands
  3. File System Management
    3.1. The File System
      3.1.1. Compact Flash Devices
      3.1.2. URLs
      3.1.3. Wildcards
    3.2. File Management Tasks
      3.2.1. Modifying File Attributes
      3.2.2. Creating Directories
      3.2.3. Copying Files
      3.2.4. Moving Files
      3.2.5. Deleting Files and Removing Directories
      3.2.6. Displaying Directory and File Information
      3.2.7. Repairing the File System
    3.3. File Command Reference
      3.3.1. Command Hierarchy
        3.3.1.1. File Commands
      3.3.2. Command Descriptions
        3.3.2.1. File System Commands
        3.3.2.2. File Commands
  4. Boot Options
    4.1. System Initialization
      4.1.1. Configuration and Image Loading
        4.1.1.1. Persistence
        4.1.1.2. Lawful Intercept
        4.1.1.3. FIPS-140-2 Mode
        4.1.1.4. System Profiles
    4.2. Initial System Startup Process Flow
    4.3. Configuration Notes
    4.4. Configuring Boot Options File with CLI
      4.4.1. BOF Configuration Overview
      4.4.2. Basic BOF Configuration
      4.4.3. Common Configuration Tasks
        4.4.3.1. Searching for the BOF
        4.4.3.2. Accessing the CLI
          4.4.3.2.1. Console Connection
      4.4.4. Configuring BOF Parameters
    4.5. Service Management Tasks
      4.5.1. System Administration Commands
        4.5.1.1. Viewing the Current Configuration
        4.5.1.2. Modifying and Saving a Configuration
        4.5.1.3. Deleting Bof Parameters
        4.5.1.4. Saving a Configuration to a Different Filename
        4.5.1.5. Rebooting
    4.6. BOF Configuration Command Reference
      4.6.1. Command Hierarchies
        4.6.1.1. Configuration Commands
      4.6.2. Command Descriptions
        4.6.2.1. File Management Commands
        4.6.2.2. BOF Processing Control
        4.6.2.3. Console Port Configuration
        4.6.2.4. Image and Configuration Management
        4.6.2.5. Management Ethernet Configuration
        4.6.2.6. DNS Configuration Commands
    4.7. BOF Show Command Reference
      4.7.1. Command Hierarchies
      4.7.2. Command Descriptions
        4.7.2.1. BOF Show Commands
  5. System Management
    5.1. System Management Parameters
      5.1.1. System Information
        5.1.1.1. System Name
        5.1.1.2. System Contact
        5.1.1.3. System Location
        5.1.1.4. System Coordinates
        5.1.1.5. Naming Objects
        5.1.1.6. Common Language Location Identifier
        5.1.1.7. DNS Security Extensions
      5.1.2. System Time
        5.1.2.1. Time Zones
        5.1.2.2. Network Time Protocol (NTP)
        5.1.2.3. SNTP Time Synchronization
        5.1.2.4. CRON
    5.2. High Availability
      5.2.1. HA Features
        5.2.1.1. Redundancy
          5.2.1.1.1. Software Redundancy
          5.2.1.1.2. Configuration Redundancy
          5.2.1.1.3. Component Redundancy
          5.2.1.1.4. Service Redundancy
          5.2.1.1.5. Accounting Configuration Redundancy
        5.2.1.2. Nonstop Forwarding
        5.2.1.3. Nonstop Routing (NSR)
        5.2.1.4. CPM Switchover
        5.2.1.5. Synchronization
          5.2.1.5.1. Configuration and boot-env Synchronization
          5.2.1.5.2. State Database Synchronization
    5.3. Synchronization and Redundancy
      5.3.1. Active and Standby Designations
      5.3.2. When the Active CPM Goes Offline
      5.3.3. OOB Management Ethernet Port Redundancy
      5.3.4. Persistence
        5.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    5.4. Network Synchronization
      5.4.1. Central Synchronization Sub-System
      5.4.2. 7950 XRS-40 Extension Chassis Central Clocks
      5.4.3. Synchronization Status Messages (SSM)
        5.4.3.1. DS1 Signals
        5.4.3.2. E1 Signals
        5.4.3.3. SONET/SDH Signals
        5.4.3.4. DS3/E3
      5.4.4. Synchronous Ethernet
      5.4.5. Clock Source Quality Level Definitions
      5.4.6. Advanced G.781 Features
      5.4.7. IEEE 1588v2 PTP
        5.4.7.1. PTP Clock Synchronization
        5.4.7.2. Performance Considerations
          5.4.7.2.1. Port-Based Timestamping of PTP Messages
        5.4.7.3. PTP Capabilities
        5.4.7.4. PTP Ordinary Slave Clock For Frequency
        5.4.7.5. PTP Ordinary Master Clock For Frequency
        5.4.7.6. PTP Boundary Clock for Frequency and Time
        5.4.7.7. PTP Clock Redundancy
        5.4.7.8. PTP Time for System Time and OAM Time
        5.4.7.9. PTP within Routing Instances
    5.5. System-Wide ATM Parameters
    5.6. QinQ Network Interface Support
    5.7. Link Layer Discovery Protocol (LLDP)
    5.8. IP Hashing as an LSR
    5.9. Satellites
      5.9.1. Ethernet Satellites
      5.9.2. TDM Satellites
      5.9.3. Software Repositories for Satellites
      5.9.4. Satellite Software Upgrade Overview
      5.9.5. 100GE Client Ports
      5.9.6. Satellite Configuration
        5.9.6.1. Satellite Client Port ID Formats
        5.9.6.2. Local Forwarding
        5.9.6.3. Port Template
        5.9.6.4. 10GE Client Ports
        5.9.6.5. 10GE Uplinks on the 64x10GE+4x100GE Satellite
        5.9.6.6. Satellite Uplink Resiliency
    5.10. Auto-provisioning
      5.10.1. Auto-provisioning limits
      5.10.2. Auto-provisioning Process
      5.10.3. Auto-provisioning DHCP Rules
      5.10.4. Auto-provisioning Failure
    5.11. Administrative Tasks
      5.11.1. Saving Configurations
      5.11.2. Specifying Post-Boot Configuration Files
      5.11.3. Network Timing
      5.11.4. Power Supplies
      5.11.5. Automatic Synchronization
        5.11.5.1. Boot-Env Option
        5.11.5.2. Config Option
      5.11.6. Manual Synchronization
        5.11.6.1. Forcing a Switchover
    5.12. System Router Instances
    5.13. System Configuration Process Overview
    5.14. Configuration Notes
      5.14.1. General
    5.15. Configuring System Management with CLI
      5.15.1. Saving Configurations
      5.15.2. Basic System Configuration
      5.15.3. Common Configuration Tasks
        5.15.3.1. System Information
          5.15.3.1.1. System Information Parameters
          5.15.3.1.2. Coordinates
          5.15.3.1.3. System Time Elements
          5.15.3.1.4. ANCP Enhancements
        5.15.3.2. Configuring Synchronization and Redundancy
          5.15.3.2.1. Configuring Persistence
          5.15.3.2.2. Configuring Synchronization
          5.15.3.2.3. Configuring Manual Synchronization
          5.15.3.2.4. Forcing a Switchover
          5.15.3.2.5. Configuring Synchronization Options
        5.15.3.3. Configuring Multi-Chassis Redundancy for LAG
        5.15.3.4. Configuring Mixed Mode
          5.15.3.4.1. Enabling Mixed Mode on a 7450 System
        5.15.3.5. Configuring Power Supply Parameters
        5.15.3.6. Configuring ATM System Parameters
        5.15.3.7. Configuring Backup Copies
        5.15.3.8. Post-Boot Configuration Extension Files
          5.15.3.8.1. Show Command Output and Console Messages
      5.15.4. System Timing
        5.15.4.1. Edit Mode
        5.15.4.2. Configuring Timing References
        5.15.4.3. Using the Revert Command
        5.15.4.4. Other Editing Commands
        5.15.4.5. Forcing a Specific Reference
      5.15.5. Configuring System Monitoring Thresholds
        5.15.5.1. Creating Events
        5.15.5.2. System Alarm Contact Inputs
      5.15.6. Configuring LLDP
    5.16.  System Command Reference
      5.16.1. Command Hierarchies
        5.16.1.1. Configuration Commands
        5.16.1.2. System Information Commands
        5.16.1.3. Satellite Commands
        5.16.1.4. System Alarm Contact Input Commands
        5.16.1.5. System Threshold Alarm Commands
        5.16.1.6. System Bluetooth Commands
        5.16.1.7. Mixed Mode Configuration Commands
        5.16.1.8. Persistence Commands
        5.16.1.9. PTP Commands
        5.16.1.10. System Time Commands
        5.16.1.11. Cron Commands
        5.16.1.12. Script Control Commands
        5.16.1.13. System Synchronization Commands
        5.16.1.14. System Administration (Admin) Commands
        5.16.1.15. High Availability (Redundancy) Commands
        5.16.1.16. LLDP System Commands
        5.16.1.17. LLDP Ethernet Port Commands
        5.16.1.18. System Router Instance Commands
      5.16.2. System Command Reference
        5.16.2.1. Generic Commands
        5.16.2.2. System Information Commands
        5.16.2.3. System Alarm Contact Input Commands
        5.16.2.4. System Threshold Alarm Commands
        5.16.2.5. System Bluetooth Commands
        5.16.2.6. Mixed Mode Configuration Commands
        5.16.2.7. Persistence Commands
        5.16.2.8. PTP Commands
        5.16.2.9. Date and Time Commands
        5.16.2.10. Network Time Protocol Commands
          5.16.2.10.1. SNTP Commands
          5.16.2.10.2. System Time Commands
        5.16.2.11. Cron Commands
        5.16.2.12. Script Control Commands
        5.16.2.13. System Synchronization Configuration Commands
        5.16.2.14. System Administration Commands
        5.16.2.15. Redundancy Commands
          5.16.2.15.1. Peer Commands
          5.16.2.15.2. Multi-Chassis Endpoint Commands
          5.16.2.15.3. MC-LAG Commands
        5.16.2.16. LLDP System Commands
        5.16.2.17. LLDP Ethernet Port Commands
        5.16.2.18. System Router Instance Commands
    5.17. Show, Clear, Debug, and Tools Command Reference
      5.17.1. Command Hierarchies
        5.17.1.1. Show Commands
        5.17.1.2. Clear Commands
        5.17.1.3. Debug Commands
        5.17.1.4. Tools Commands
      5.17.2. Command Descriptions
        5.17.2.1. Show Commands
        5.17.2.2. Debug Commands
        5.17.2.3. Tools Commands
        5.17.2.4. Clear Commands
  6. Standards and Protocol Support
  Customer Document and Product Support
Gx AVPs Reference Guide 16.0.R4
  1. Gx AVP
    1.1. In This Section
    1.2. AVPs
      1.2.1. Reserved Keywords in the 7750 SR
      1.2.2. Standard Diameter AVPs
      1.2.3. Standard Diameter AVPs (format)
      1.2.4. ALU-Specific AVPs
      1.2.5. ALU-Specific VSAs (format)
      1.2.6. Diameter-Based AVP Applicability
      1.2.7. Gx AVP Applicability
      1.2.8. ALU-Specific AVP Applicability
      1.2.9. Result Codes (Result-Code AVP)
      1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
      1.2.11. Event Triggers (Event-Trigger AVP)
      1.2.12. Termination Causes (Termination-Cause AVP)
  2. Standards and Protocol Support
  Customer Document and Product Support
  1. Gx AVP
    1.1. In This Section
    1.2. AVPs
      1.2.1. Reserved Keywords in the 7750 SR
      1.2.2. Standard Diameter AVPs
      1.2.3. Standard Diameter AVPs (format)
      1.2.4. ALU-Specific AVPs
      1.2.5. ALU-Specific VSAs (format)
      1.2.6. Diameter-Based AVP Applicability
      1.2.7. Gx AVP Applicability
      1.2.8. ALU-Specific AVP Applicability
      1.2.9. Result Codes (Result-Code AVP)
      1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
      1.2.11. Event Triggers (Event-Trigger AVP)
      1.2.12. Termination Causes (Termination-Cause AVP)
  2. Standards and Protocol Support
  Customer Document and Product Support
Gy AVPs Reference Guide 16.0.R4
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. References
  2. Diameter Gy Interface Specification
    2.1. Diameter Gy – Credit-Control-Request (CCR) command
      2.1.1. Diameter Gy – CCR Message Top Level AVPs
      2.1.2. Diameter Gy – CCR Message Grouped AVPs
        2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
        2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
        2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
        2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
        2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
        2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
        2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
    2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
      2.2.1. Diameter Gy – CCA Message Top Level AVPs
      2.2.2. Diameter Gy – CCA message grouped AVPs
        2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
        2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
        2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
        2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
        2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
    2.3. Diameter Gy – Re-Auth-Request (RAR) Command
      2.3.1. Diameter Gy – RAR Message Format
      2.3.2. Diameter Gy – RAR Message Top Level AVPs
    2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
      2.4.1. Diameter Gy – RAA Message Format
      2.4.2. Diameter Gy – RAA Message Top Level AVPs
    2.5. Diameter Gy – Abort-Session-Request (ASR) Command
      2.5.1. Diameter Gy – ASR Message Format
      2.5.2. Diameter Gy – ASR Message Top Level AVPs
    2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
      2.6.1. Diameter Gy – ASA Message Format
      2.6.2. Diameter Gy – ASA Message Top Level AVPs
  3. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. References
  2. Diameter Gy Interface Specification
    2.1. Diameter Gy – Credit-Control-Request (CCR) command
      2.1.1. Diameter Gy – CCR Message Top Level AVPs
      2.1.2. Diameter Gy – CCR Message Grouped AVPs
        2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
        2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
        2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
        2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
        2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
        2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
        2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
    2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
      2.2.1. Diameter Gy – CCA Message Top Level AVPs
      2.2.2. Diameter Gy – CCA message grouped AVPs
        2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
        2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
        2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
        2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
        2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
    2.3. Diameter Gy – Re-Auth-Request (RAR) Command
      2.3.1. Diameter Gy – RAR Message Format
      2.3.2. Diameter Gy – RAR Message Top Level AVPs
    2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
      2.4.1. Diameter Gy – RAA Message Format
      2.4.2. Diameter Gy – RAA Message Top Level AVPs
    2.5. Diameter Gy – Abort-Session-Request (ASR) Command
      2.5.1. Diameter Gy – ASR Message Format
      2.5.2. Diameter Gy – ASR Message Top Level AVPs
    2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
      2.6.1. Diameter Gy – ASA Message Format
      2.6.2. Diameter Gy – ASA Message Top Level AVPs
  3. Standards and Protocol Support
  Customer Document and Product Support
Interface Configuration Guide 16.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Interface Configuration Process
  2. Interfaces
    2.1. Configuration Overview
      2.1.1. Chassis Slots and Cards
      2.1.2. MCMs
      2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
      2.1.4. XMAs/C-XMAs
      2.1.5. Hardware Licensing
      2.1.6. Software License Activation
      2.1.7. Software License Records
      2.1.8. CMAs
      2.1.9. Versatile Service Module (VSM)
      2.1.10. Oversubscribed Ethernet MDAs
        2.1.10.1. Rate Limiting
        2.1.10.2. Packet Classification and Scheduling
      2.1.11. Channelized MDA/CMA Support
        2.1.11.1. Channelized DS-1/E-1 CMA
        2.1.11.2. Channelized DS-3/E-3 CMA
        2.1.11.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        2.1.11.4. Channelized OC-12/STM-4 ASAP MDAs
        2.1.11.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
        2.1.11.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
        2.1.11.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        2.1.11.8. Network Interconnections
    2.2. Digital Diagnostics Monitoring
      2.2.1. SFPs and XFPs
      2.2.2. Statistics Collection
    2.3. Ports
      2.3.1. Port Types
      2.3.2. Port Features
        2.3.2.1. Port State and Operational State
        2.3.2.2. 802.1x Network Access Control
          2.3.2.2.1. 802.1x Modes
          2.3.2.2.2. 802.1x Basics
          2.3.2.2.3. 802.1x Timers
          2.3.2.2.4. 802.1x Tunneling
          2.3.2.2.5. 802.1x Configuration and Limitations
        2.3.2.3. MACsec
          2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
          2.3.2.3.2. MACsec Encryption Mode
          2.3.2.3.3. MACsec Key Management Modes
          2.3.2.3.4. MACsec Terminology
          2.3.2.3.5. MACsec Static CAK
          2.3.2.3.6. SAK Rollover
          2.3.2.3.7. MKA
          2.3.2.3.8.  Pre-shared Key
          2.3.2.3.9. MKA Hello Timer
          2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
          2.3.2.3.11. Key Server
          2.3.2.3.12. SA Limits and Network Design
          2.3.2.3.13. P2P (Switch to Switch) Topology
          2.3.2.3.14. P2MP (Switch to Switch) Topology
          2.3.2.3.15. SA Exhaustion Behavior
          2.3.2.3.16. Clear Tag Mode
          2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
          2.3.2.3.18. EAPoL Destination Address
          2.3.2.3.19. Mirroring Consideration
        2.3.2.4. SONET/SDH Port Attributes
        2.3.2.5. SONET/SDH Path Attributes
        2.3.2.6. Multilink Frame Relay
          2.3.2.6.1. MLFR Bundle Data Plane
          2.3.2.6.2. MLFR Bundle Link Integrity Protocol
        2.3.2.7. FRF.12 End-to-End Fragmentation
          2.3.2.7.1. SAP Fragment Interleaving Option
        2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
        2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
          2.3.2.10.1. Protocol Field (PID)
          2.3.2.10.2. B & E Bits
          2.3.2.10.3. Sequence Number
          2.3.2.10.4. Information Field
          2.3.2.10.5. Padding
          2.3.2.10.6. FCS
          2.3.2.10.7. LCP
          2.3.2.10.8. Link Fragmentation and Interleaving Support
        2.3.2.11. Multi-Class MLPPP
          2.3.2.11.1. QoS in MC-MLPPP
        2.3.2.12. Cisco HDLC
          2.3.2.12.1. SLARP
          2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
          2.3.2.12.3. Timers
        2.3.2.13. Automatic Protection Switching (APS)
          2.3.2.13.1. Single Chassis and Multi-Chassis APS
          2.3.2.13.2. APS Switching Modes
          2.3.2.13.3. APS Channel and SONET Header K Bytes
          2.3.2.13.4. Revertive Switching
          2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
          2.3.2.13.6. Annex B (1+1 Optimized) Operation
          2.3.2.13.7. Protection of Upper Layer Protocols and Services
          2.3.2.13.8. APS User-Initiated Requests
          2.3.2.13.9. APS and SNMP
          2.3.2.13.10. APS Applicability, Restrictions and Interactions
          2.3.2.13.11. Sample APS Applications
        2.3.2.14. Inverse Multiplexing Over ATM (IMA)
          2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
        2.3.2.15. Ethernet Local Management Interface (E-LMI)
        2.3.2.16. Link Layer Discovery Protocol (LLDP)
          2.3.2.16.1. LLDP Protocol Features
        2.3.2.17. Exponential Port Dampening
      2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
    2.4. FP4 Data Path Mapping
    2.5. Port Cross-Connect (PXC)
      2.5.1. PXC Terminology
      2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
        2.5.2.1. Operational State
      2.5.3. PXC Sub-Ports
        2.5.3.1. PXC Sub-Port Operational State
      2.5.4. Port Statistics
        2.5.4.1. Statistics on Physical PXC Ports
      2.5.5. LAG with PXC Ports – PXC LAG
      2.5.6. Basic PXC Provisioning
      2.5.7. QoS
        2.5.7.1. Queue Allocation on PXC Sub-Ports
        2.5.7.2. Pool Allocations on PXC Ports
        2.5.7.3. QoS Summary
      2.5.8. Mirroring and LI on PXC Ports
      2.5.9. Multi-Chassis Redundancy
      2.5.10. Health Monitoring on the PXC Sub-Ports
      2.5.11. Configuration Example
    2.6. Forwarding Path Extensions (FPE)
    2.7. LAG
      2.7.1. LACP
        2.7.1.1. LACP Multiplexing
        2.7.1.2. LACP Tunneling
      2.7.2. Active-Standby LAG Operation
      2.7.3. LAG on Access QoS Consideration
        2.7.3.1. Adapt QoS Modes
        2.7.3.2. Per-fp-ing-queuing
        2.7.3.3. Per-fp-egr-queuing
        2.7.3.4. Per-fp-sap-instance
      2.7.4. LAG and ECMP Hashing
        2.7.4.1. Per Flow Hashing
          2.7.4.1.1. Changing Default Per Flow Hashing Inputs
        2.7.4.2. Per Link Hashing
          2.7.4.2.1. Weighted per-link-hash
        2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
        2.7.4.4. Consistent Per Service Hashing
        2.7.4.5. ESM – LAG Hashing per Vport
          2.7.4.5.1. Background
          2.7.4.5.2. Hashing per Vport
          2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
          2.7.4.5.4. Multicast Consideration
          2.7.4.5.5. VPLS and Capture SAP Considerations
      2.7.5. LAG Hold Down Timers
      2.7.6. BFD over LAG Links
      2.7.7. Mixed Port-Speed LAG Support
        2.7.7.1. LAG Upgrade
      2.7.8. Multi-Chassis LAG
        2.7.8.1. Overview
        2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
    2.8. G.8031 Protected Ethernet Tunnels
    2.9. G.8032 Protected Ethernet Rings
    2.10. Ethernet Port Monitoring
    2.11. 802.3ah OAM
      2.11.1. OAM Events
        2.11.1.1. Link Monitoring
          2.11.1.1.1. Capability Advertising
      2.11.2. Remote Loopback
      2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
        2.11.3.1. 802.3ah Grace Announcement
    2.12. MTU Configuration Guidelines
      2.12.1. Default MTU Values
      2.12.2. Modifying MTU Defaults
      2.12.3. Configuration Example
    2.13. Deploying Preprovisioned Components
    2.14. Setting Fabric Speed
      2.14.1. fabric-speed-a (SFM5/CPM5)
      2.14.2. fabric-speed-b (SFM5/CPM5)
      2.14.3. fabric-speed-c (SFM5/CPM5)
    2.15. Versatile Service Module
      2.15.1. VSM-CCA-XP
    2.16. Configuration Process Overview
    2.17. Configuration Notes
    2.18. Configuring Physical Ports with CLI
      2.18.1. Preprovisioning Guidelines
        2.18.1.1. Predefining Entities
        2.18.1.2. Preprovisioning a Port
        2.18.1.3. Maximizing Bandwidth Use
      2.18.2. Basic Configuration
      2.18.3. Common Configuration Tasks
        2.18.3.1. Configuring Cards and MDAs
          2.18.3.1.1. Configuring MDA Access and Network Pool Parameters
          2.18.3.1.2. Configuring MDA Policies for Named Pools Mode
        2.18.3.2. Configuring Cards, MCMs, and MCAs
          2.18.3.2.1. Configuring Cards and CMAs
        2.18.3.3. Configuring Ports
          2.18.3.3.1. Configuring Port Pool Parameters
          2.18.3.3.2. Changing Hybrid-Buffer-Allocation
          2.18.3.3.3. Changing APS Parameters
          2.18.3.3.4. Configuring Ethernet Port Parameters
          2.18.3.3.5. Configuring SONET/SDH Port Parameters
          2.18.3.3.6. Configuring Channelized Ports
          2.18.3.3.7. Configuring Channelized STM1/OC3 Parameters
          2.18.3.3.8. Configuring ATM SAPs
          2.18.3.3.9. Configuring DWDM Port Parameters
          2.18.3.3.10. Configuring WaveTracker Parameters
          2.18.3.3.11. Configuring OTU Port Parameters
          2.18.3.3.12. Configuring ATM Interface Parameters
          2.18.3.3.13. Configuring Frame Relay Parameters
          2.18.3.3.14. Configuring Multilink PPP Bundles
          2.18.3.3.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
          2.18.3.3.16. Multi-Class MLPPP
          2.18.3.3.17. Configuring Bundle Protection Group Ports
          2.18.3.3.18. Configuring LAG Parameters
          2.18.3.3.19. Configuring G.8031 Protected Ethernet Tunnels
          2.18.3.3.20. Configuring Connectors and Connector Ports
    2.19. Service Management Tasks
      2.19.1. Modifying or Deleting an MDA, MCM, CMA or XMA
      2.19.2. Modifying a Card Type
      2.19.3. Deleting a Card
      2.19.4. Deleting Port Parameters
      2.19.5. Soft IOM Reset
        2.19.5.1. Soft Reset
        2.19.5.2. Deferred MDA Reset
    2.20. Configuration Command Reference
      2.20.1. Command Hierarchies
        2.20.1.1. Card Commands
        2.20.1.2. MCM Commands
        2.20.1.3. MDA Commands
        2.20.1.4. Power Commands
        2.20.1.5. Virtual Scheduler Commands
        2.20.1.6. Forwarding Plane (FP) Commands
        2.20.1.7. Port Configuration Commands
        2.20.1.8. Port XC Commands
        2.20.1.9. Forwarding Path Extension (FPE) Commands
        2.20.1.10. Port APS Commands
        2.20.1.11. Ethernet Commands
          2.20.1.11.1. Ethernet Access and Network Commands
        2.20.1.12.  HSQ Port Configuration Commands
        2.20.1.13. Interface Group Handler Commands
        2.20.1.14. Multilink Bundle Commands
        2.20.1.15. SONET-SDH Commands
        2.20.1.16. TDM Commands
        2.20.1.17. DS3 Commands
        2.20.1.18. E1 Commands
        2.20.1.19. E3 Commands
        2.20.1.20. LAG Commands
        2.20.1.21. MACsec Commands
        2.20.1.22. Ethernet Tunnel Commands
        2.20.1.23. Multi-Chassis Redundancy Commands
      2.20.2. Configuration Command Descriptions
        2.20.2.1. Generic Commands
        2.20.2.2. Card Commands
        2.20.2.3. MCM Commands
        2.20.2.4. MDA (XMA) Commands
        2.20.2.5. MDA/Port QoS Commands
        2.20.2.6. Power Commands
        2.20.2.7. Virtual Scheduler Commands
        2.20.2.8. Forwarding Plane Configuration Commands
        2.20.2.9. MACsec Commands
        2.20.2.10. General Port Commands
        2.20.2.11. Port XC Commands
        2.20.2.12. Forwarding Path Extension (FPE) Commands
        2.20.2.13. APS Commands
        2.20.2.14. Ethernet Port Commands
        2.20.2.15. 802.1x Port Commands
        2.20.2.16. LLDP Port Commands
        2.20.2.17. Network Port Commands
        2.20.2.18. HSQ Port Commands
        2.20.2.19. Interface Group Handler Commands
        2.20.2.20. Multilink-Bundle Port Commands
        2.20.2.21. SONET/SDH Port Commands
        2.20.2.22. SONET/SDH Path Commands
        2.20.2.23. ATM Interface Commands
        2.20.2.24. Frame Relay Commands
        2.20.2.25. TDM Commands
        2.20.2.26. LAG Commands
        2.20.2.27. Eth Tunnel Commands
        2.20.2.28. ETH-CFM Configuration Commands
        2.20.2.29. Multi-Chassis Redundancy Commands
          2.20.2.29.1. MC Endpoint Commands
          2.20.2.29.2. MC LAG Commands
          2.20.2.29.3. Multi-Chassis Ring Commands
        2.20.2.30. Forwarding Plane Tools Commands
    2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
      2.21.1. Command Hierarchies
        2.21.1.1. Show Commands
        2.21.1.2. Monitor Commands
        2.21.1.3. Clear Commands
        2.21.1.4. Debug Commands
        2.21.1.5. Tools Commands
      2.21.2. Command Descriptions
        2.21.2.1. Hardware Show Commands
        2.21.2.2. PEQ Show Commands
        2.21.2.3. APS Show Commands
        2.21.2.4. Port Show Commands
        2.21.2.5. Multilink Bundle Show Commands
        2.21.2.6. LAG Show Commands
        2.21.2.7. Licensing Show Command
        2.21.2.8. MACsec Show Commands
        2.21.2.9. Monitor Commands
        2.21.2.10. Clear Commands
        2.21.2.11. Tools Commands
          2.21.2.11.1. Debug Commands
  3. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Interface Configuration Process
  2. Interfaces
    2.1. Configuration Overview
      2.1.1. Chassis Slots and Cards
      2.1.2. MCMs
      2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
      2.1.4. XMAs/C-XMAs
      2.1.5. Hardware Licensing
      2.1.6. Software License Activation
      2.1.7. Software License Records
      2.1.8. CMAs
      2.1.9. Versatile Service Module (VSM)
      2.1.10. Oversubscribed Ethernet MDAs
        2.1.10.1. Rate Limiting
        2.1.10.2. Packet Classification and Scheduling
      2.1.11. Channelized MDA/CMA Support
        2.1.11.1. Channelized DS-1/E-1 CMA
        2.1.11.2. Channelized DS-3/E-3 CMA
        2.1.11.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        2.1.11.4. Channelized OC-12/STM-4 ASAP MDAs
        2.1.11.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
        2.1.11.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
        2.1.11.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        2.1.11.8. Network Interconnections
    2.2. Digital Diagnostics Monitoring
      2.2.1. SFPs and XFPs
      2.2.2. Statistics Collection
    2.3. Ports
      2.3.1. Port Types
      2.3.2. Port Features
        2.3.2.1. Port State and Operational State
        2.3.2.2. 802.1x Network Access Control
          2.3.2.2.1. 802.1x Modes
          2.3.2.2.2. 802.1x Basics
          2.3.2.2.3. 802.1x Timers
          2.3.2.2.4. 802.1x Tunneling
          2.3.2.2.5. 802.1x Configuration and Limitations
        2.3.2.3. MACsec
          2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
          2.3.2.3.2. MACsec Encryption Mode
          2.3.2.3.3. MACsec Key Management Modes
          2.3.2.3.4. MACsec Terminology
          2.3.2.3.5. MACsec Static CAK
          2.3.2.3.6. SAK Rollover
          2.3.2.3.7. MKA
          2.3.2.3.8.  Pre-shared Key
          2.3.2.3.9. MKA Hello Timer
          2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
          2.3.2.3.11. Key Server
          2.3.2.3.12. SA Limits and Network Design
          2.3.2.3.13. P2P (Switch to Switch) Topology
          2.3.2.3.14. P2MP (Switch to Switch) Topology
          2.3.2.3.15. SA Exhaustion Behavior
          2.3.2.3.16. Clear Tag Mode
          2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
          2.3.2.3.18. EAPoL Destination Address
          2.3.2.3.19. Mirroring Consideration
        2.3.2.4. SONET/SDH Port Attributes
        2.3.2.5. SONET/SDH Path Attributes
        2.3.2.6. Multilink Frame Relay
          2.3.2.6.1. MLFR Bundle Data Plane
          2.3.2.6.2. MLFR Bundle Link Integrity Protocol
        2.3.2.7. FRF.12 End-to-End Fragmentation
          2.3.2.7.1. SAP Fragment Interleaving Option
        2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
        2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
          2.3.2.10.1. Protocol Field (PID)
          2.3.2.10.2. B & E Bits
          2.3.2.10.3. Sequence Number
          2.3.2.10.4. Information Field
          2.3.2.10.5. Padding
          2.3.2.10.6. FCS
          2.3.2.10.7. LCP
          2.3.2.10.8. Link Fragmentation and Interleaving Support
        2.3.2.11. Multi-Class MLPPP
          2.3.2.11.1. QoS in MC-MLPPP
        2.3.2.12. Cisco HDLC
          2.3.2.12.1. SLARP
          2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
          2.3.2.12.3. Timers
        2.3.2.13. Automatic Protection Switching (APS)
          2.3.2.13.1. Single Chassis and Multi-Chassis APS
          2.3.2.13.2. APS Switching Modes
          2.3.2.13.3. APS Channel and SONET Header K Bytes
          2.3.2.13.4. Revertive Switching
          2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
          2.3.2.13.6. Annex B (1+1 Optimized) Operation
          2.3.2.13.7. Protection of Upper Layer Protocols and Services
          2.3.2.13.8. APS User-Initiated Requests
          2.3.2.13.9. APS and SNMP
          2.3.2.13.10. APS Applicability, Restrictions and Interactions
          2.3.2.13.11. Sample APS Applications
        2.3.2.14. Inverse Multiplexing Over ATM (IMA)
          2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
        2.3.2.15. Ethernet Local Management Interface (E-LMI)
        2.3.2.16. Link Layer Discovery Protocol (LLDP)
          2.3.2.16.1. LLDP Protocol Features
        2.3.2.17. Exponential Port Dampening
      2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
    2.4. FP4 Data Path Mapping
    2.5. Port Cross-Connect (PXC)
      2.5.1. PXC Terminology
      2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
        2.5.2.1. Operational State
      2.5.3. PXC Sub-Ports
        2.5.3.1. PXC Sub-Port Operational State
      2.5.4. Port Statistics
        2.5.4.1. Statistics on Physical PXC Ports
      2.5.5. LAG with PXC Ports – PXC LAG
      2.5.6. Basic PXC Provisioning
      2.5.7. QoS
        2.5.7.1. Queue Allocation on PXC Sub-Ports
        2.5.7.2. Pool Allocations on PXC Ports
        2.5.7.3. QoS Summary
      2.5.8. Mirroring and LI on PXC Ports
      2.5.9. Multi-Chassis Redundancy
      2.5.10. Health Monitoring on the PXC Sub-Ports
      2.5.11. Configuration Example
    2.6. Forwarding Path Extensions (FPE)
    2.7. LAG
      2.7.1. LACP
        2.7.1.1. LACP Multiplexing
        2.7.1.2. LACP Tunneling
      2.7.2. Active-Standby LAG Operation
      2.7.3. LAG on Access QoS Consideration
        2.7.3.1. Adapt QoS Modes
        2.7.3.2. Per-fp-ing-queuing
        2.7.3.3. Per-fp-egr-queuing
        2.7.3.4. Per-fp-sap-instance
      2.7.4. LAG and ECMP Hashing
        2.7.4.1. Per Flow Hashing
          2.7.4.1.1. Changing Default Per Flow Hashing Inputs
        2.7.4.2. Per Link Hashing
          2.7.4.2.1. Weighted per-link-hash
        2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
        2.7.4.4. Consistent Per Service Hashing
        2.7.4.5. ESM – LAG Hashing per Vport
          2.7.4.5.1. Background
          2.7.4.5.2. Hashing per Vport
          2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
          2.7.4.5.4. Multicast Consideration
          2.7.4.5.5. VPLS and Capture SAP Considerations
      2.7.5. LAG Hold Down Timers
      2.7.6. BFD over LAG Links
      2.7.7. Mixed Port-Speed LAG Support
        2.7.7.1. LAG Upgrade
      2.7.8. Multi-Chassis LAG
        2.7.8.1. Overview
        2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
    2.8. G.8031 Protected Ethernet Tunnels
    2.9. G.8032 Protected Ethernet Rings
    2.10. Ethernet Port Monitoring
    2.11. 802.3ah OAM
      2.11.1. OAM Events
        2.11.1.1. Link Monitoring
          2.11.1.1.1. Capability Advertising
      2.11.2. Remote Loopback
      2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
        2.11.3.1. 802.3ah Grace Announcement
    2.12. MTU Configuration Guidelines
      2.12.1. Default MTU Values
      2.12.2. Modifying MTU Defaults
      2.12.3. Configuration Example
    2.13. Deploying Preprovisioned Components
    2.14. Setting Fabric Speed
      2.14.1. fabric-speed-a (SFM5/CPM5)
      2.14.2. fabric-speed-b (SFM5/CPM5)
      2.14.3. fabric-speed-c (SFM5/CPM5)
    2.15. Versatile Service Module
      2.15.1. VSM-CCA-XP
    2.16. Configuration Process Overview
    2.17. Configuration Notes
    2.18. Configuring Physical Ports with CLI
      2.18.1. Preprovisioning Guidelines
        2.18.1.1. Predefining Entities
        2.18.1.2. Preprovisioning a Port
        2.18.1.3. Maximizing Bandwidth Use
      2.18.2. Basic Configuration
      2.18.3. Common Configuration Tasks
        2.18.3.1. Configuring Cards and MDAs
          2.18.3.1.1. Configuring MDA Access and Network Pool Parameters
          2.18.3.1.2. Configuring MDA Policies for Named Pools Mode
        2.18.3.2. Configuring Cards, MCMs, and MCAs
          2.18.3.2.1. Configuring Cards and CMAs
        2.18.3.3. Configuring Ports
          2.18.3.3.1. Configuring Port Pool Parameters
          2.18.3.3.2. Changing Hybrid-Buffer-Allocation
          2.18.3.3.3. Changing APS Parameters
          2.18.3.3.4. Configuring Ethernet Port Parameters
          2.18.3.3.5. Configuring SONET/SDH Port Parameters
          2.18.3.3.6. Configuring Channelized Ports
          2.18.3.3.7. Configuring Channelized STM1/OC3 Parameters
          2.18.3.3.8. Configuring ATM SAPs
          2.18.3.3.9. Configuring DWDM Port Parameters
          2.18.3.3.10. Configuring WaveTracker Parameters
          2.18.3.3.11. Configuring OTU Port Parameters
          2.18.3.3.12. Configuring ATM Interface Parameters
          2.18.3.3.13. Configuring Frame Relay Parameters
          2.18.3.3.14. Configuring Multilink PPP Bundles
          2.18.3.3.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
          2.18.3.3.16. Multi-Class MLPPP
          2.18.3.3.17. Configuring Bundle Protection Group Ports
          2.18.3.3.18. Configuring LAG Parameters
          2.18.3.3.19. Configuring G.8031 Protected Ethernet Tunnels
          2.18.3.3.20. Configuring Connectors and Connector Ports
    2.19. Service Management Tasks
      2.19.1. Modifying or Deleting an MDA, MCM, CMA or XMA
      2.19.2. Modifying a Card Type
      2.19.3. Deleting a Card
      2.19.4. Deleting Port Parameters
      2.19.5. Soft IOM Reset
        2.19.5.1. Soft Reset
        2.19.5.2. Deferred MDA Reset
    2.20. Configuration Command Reference
      2.20.1. Command Hierarchies
        2.20.1.1. Card Commands
        2.20.1.2. MCM Commands
        2.20.1.3. MDA Commands
        2.20.1.4. Power Commands
        2.20.1.5. Virtual Scheduler Commands
        2.20.1.6. Forwarding Plane (FP) Commands
        2.20.1.7. Port Configuration Commands
        2.20.1.8. Port XC Commands
        2.20.1.9. Forwarding Path Extension (FPE) Commands
        2.20.1.10. Port APS Commands
        2.20.1.11. Ethernet Commands
          2.20.1.11.1. Ethernet Access and Network Commands
        2.20.1.12.  HSQ Port Configuration Commands
        2.20.1.13. Interface Group Handler Commands
        2.20.1.14. Multilink Bundle Commands
        2.20.1.15. SONET-SDH Commands
        2.20.1.16. TDM Commands
        2.20.1.17. DS3 Commands
        2.20.1.18. E1 Commands
        2.20.1.19. E3 Commands
        2.20.1.20. LAG Commands
        2.20.1.21. MACsec Commands
        2.20.1.22. Ethernet Tunnel Commands
        2.20.1.23. Multi-Chassis Redundancy Commands
      2.20.2. Configuration Command Descriptions
        2.20.2.1. Generic Commands
        2.20.2.2. Card Commands
        2.20.2.3. MCM Commands
        2.20.2.4. MDA (XMA) Commands
        2.20.2.5. MDA/Port QoS Commands
        2.20.2.6. Power Commands
        2.20.2.7. Virtual Scheduler Commands
        2.20.2.8. Forwarding Plane Configuration Commands
        2.20.2.9. MACsec Commands
        2.20.2.10. General Port Commands
        2.20.2.11. Port XC Commands
        2.20.2.12. Forwarding Path Extension (FPE) Commands
        2.20.2.13. APS Commands
        2.20.2.14. Ethernet Port Commands
        2.20.2.15. 802.1x Port Commands
        2.20.2.16. LLDP Port Commands
        2.20.2.17. Network Port Commands
        2.20.2.18. HSQ Port Commands
        2.20.2.19. Interface Group Handler Commands
        2.20.2.20. Multilink-Bundle Port Commands
        2.20.2.21. SONET/SDH Port Commands
        2.20.2.22. SONET/SDH Path Commands
        2.20.2.23. ATM Interface Commands
        2.20.2.24. Frame Relay Commands
        2.20.2.25. TDM Commands
        2.20.2.26. LAG Commands
        2.20.2.27. Eth Tunnel Commands
        2.20.2.28. ETH-CFM Configuration Commands
        2.20.2.29. Multi-Chassis Redundancy Commands
          2.20.2.29.1. MC Endpoint Commands
          2.20.2.29.2. MC LAG Commands
          2.20.2.29.3. Multi-Chassis Ring Commands
        2.20.2.30. Forwarding Plane Tools Commands
    2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
      2.21.1. Command Hierarchies
        2.21.1.1. Show Commands
        2.21.1.2. Monitor Commands
        2.21.1.3. Clear Commands
        2.21.1.4. Debug Commands
        2.21.1.5. Tools Commands
      2.21.2. Command Descriptions
        2.21.2.1. Hardware Show Commands
        2.21.2.2. PEQ Show Commands
        2.21.2.3. APS Show Commands
        2.21.2.4. Port Show Commands
        2.21.2.5. Multilink Bundle Show Commands
        2.21.2.6. LAG Show Commands
        2.21.2.7. Licensing Show Command
        2.21.2.8. MACsec Show Commands
        2.21.2.9. Monitor Commands
        2.21.2.10. Clear Commands
        2.21.2.11. Tools Commands
          2.21.2.11.1. Debug Commands
  3. Standards and Protocol Support
  Customer Document and Product Support
Layer 2 Services and EVPN Guide 16.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 2 Services and EVPN Configuration Process
  2. VLL Services
    2.1. ATM VLL (Apipe) Services
      2.1.1. Apipe For End-to-End ATM Service
      2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
      2.1.3. Traffic Management Support
        2.1.3.1. Ingress Network Classification
        2.1.3.2. Ingress Queuing and Shaping on the IOM
        2.1.3.3. Egress Queuing and Shaping on the IOM
        2.1.3.4. Egress Shaping/Scheduling
    2.2. Circuit Emulation (Cpipe) Services
      2.2.1. Mobile Infrastructure
      2.2.2. Circuit Emulation Modes
      2.2.3. Circuit Emulation Parameters
        2.2.3.1. Circuit Emulation Modes
        2.2.3.2. Absolute Mode Option
        2.2.3.3. Payload Size
        2.2.3.4. Jitter Buffer
        2.2.3.5. CES Circuit Operation
      2.2.4. Services for Transporting CES Circuits
      2.2.5. Network Synchronization Considerations
      2.2.6. Cpipe Payload
    2.3. Ethernet Pipe (Epipe) Services
      2.3.1. Epipe Service Overview
      2.3.2. Epipe Service Pseudowire VLAN Tag Processing
      2.3.3. Epipe Up Operational State Configuration Option
      2.3.4. Epipe with PBB
      2.3.5. Epipe over L2TPv3
      2.3.6. Ethernet Interworking VLL
      2.3.7. VLL CAC
      2.3.8. MC-Ring and VLL
    2.4. Frame Relay VLL (Fpipe) Services
      2.4.1. Frame Relay VLL
      2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
      2.4.3. Traffic Management Support
        2.4.3.1. Frame Relay Traffic Management
        2.4.3.2. Ingress SAP Classification and Marking
        2.4.3.3. Egress Network EXP Marking
        2.4.3.4. Ingress Network Classification
    2.5. IP Interworking VLL (Ipipe) Services
      2.5.1. Ipipe VLL
      2.5.2. IP Interworking VLL Datapath
      2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
        2.5.3.1. VLL Ethernet SAP Processes
          2.5.3.1.1. VLL FR SAP Procedures
          2.5.3.1.2. VLL ATM SAP Procedures
          2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      2.5.4. IPv6 Support on IP Interworking VLL
        2.5.4.1. IPv6 Datapath Operation
        2.5.4.2. IPv6 Stack Capability Signaling
    2.6. Services Configuration for MPLS-TP
      2.6.1. MPLS-TP SDPs
      2.6.2. VLL Spoke SDP Configuration
        2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
      2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
        2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
        2.6.3.2. Lock PW Endpoint Model
        2.6.3.3. PW Redundancy and Lock Instruct and Loopback
        2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
        2.6.3.5. Configuring an Administrative Lock
        2.6.3.6. Configuring a Loopback
      2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
    2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      2.7.1. VCCV BFD Support
      2.7.2. VCCV BFD Encapsulation on a Pseudowire
      2.7.3. BFD Session Operation
      2.7.4. Configuring VCCV BFD
    2.8. Pseudowire Switching
      2.8.1. Pseudowire Switching with Protection
      2.8.2. Pseudowire Switching Behavior
        2.8.2.1. Pseudowire Switching TLV
        2.8.2.2. Pseudowire Switching Point Sub-TLVs
      2.8.3. Static-to-Dynamic Pseudowire Switching
      2.8.4. Ingress VLAN Swapping
        2.8.4.1. Ingress VLAN Translation
      2.8.5. Pseudowire Redundancy
      2.8.6. Dynamic Multi-Segment Pseudowire Routing
        2.8.6.1. Overview
        2.8.6.2. Pseudowire Routing
          2.8.6.2.1. Static Routing
          2.8.6.2.2. Explicit Paths
        2.8.6.3. Configuring VLLs using Dynamic MS-PWs
          2.8.6.3.1. Active/Passive T-PE Selection
          2.8.6.3.2. Automatic Endpoint Configuration
          2.8.6.3.3. Selecting a Path for an MS-PW
          2.8.6.3.4. Pseudowire Templates
        2.8.6.4. Pseudowire Redundancy
        2.8.6.5. VCCV OAM for Dynamic MS-PWs
        2.8.6.6. VCCV-Ping on Dynamic MS-PWs
        2.8.6.7. VCCV-Trace on Dynamic MS-PWs
      2.8.7. Example Dynamic MS-PW Configuration
      2.8.8. VLL Resilience with Two Destination PE Nodes
        2.8.8.1. Master-Slave Operation
          2.8.8.1.1. Interaction with SAP-Specific OAM
          2.8.8.1.2. Local Rules at Slave VLL PE
          2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
      2.8.9. Pseudowire SAPs
      2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
        2.8.10.1. Operational Overview
        2.8.10.2. Detailed Operation
          2.8.10.2.1. Sample Operation of G.8031 BGP-MH
        2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
        2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
        2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
          2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
          2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
          2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
      2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      2.8.12. VLL Resilience for a Switched Pseudowire Path
    2.9. Pseudowire Redundancy Service Models
      2.9.1. Redundant VLL Service Model
      2.9.2. T-LDP Status Notification Handling Rules
        2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
        2.9.2.2. Processing and Merging
    2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      2.10.1. Primary Spoke SDP Fallback to Secondary SAP
      2.10.2. Reversion to Primary Spoke SDP Path
      2.10.3. MC-APS and MC-LAG
        2.10.3.1. Failure Scenario
    2.11. VLL Using G.8031 Protected Ethernet Tunnels
    2.12. MPLS Entropy Label and Hash Label
    2.13. BGP Virtual Private Wire Service (VPWS)
      2.13.1. Single-Homed BGP VPWS
      2.13.2. Dual-Homed BGP VPWS
        2.13.2.1. Single Pseudowire Example
        2.13.2.2. Active/Standby Pseudowire Example
      2.13.3. BGP VPWS Pseudowire Switching
        2.13.3.1. Pseudowire Signaling
        2.13.3.2. BGP-VPWS with Inter-AS Model C
        2.13.3.3. BGP VPWS Configuration Procedure
        2.13.3.4. Use of Pseudowire Template for BGP VPWS
        2.13.3.5. Use of Endpoint for BGP VPWS
    2.14. VLL Service Considerations
      2.14.1. SDPs
        2.14.1.1. SDP Statistics for VPLS and VLL Services
      2.14.2. SAP Encapsulations and Pseudowire Types
        2.14.2.1. PWE3 N-to-1 Cell Mode
        2.14.2.2. PWE3 AAL5 SDU Mode
        2.14.2.3. QoS Policies
        2.14.2.4. Filter Policies
        2.14.2.5. MAC Resources
    2.15. Configuring a VLL Service with CLI
      2.15.1. Common Configuration Tasks
      2.15.2. Configuring VLL Components
        2.15.2.1. Creating an Apipe Service
          2.15.2.1.1. Configuring Basic Apipe SAP Parameters
          2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          2.15.2.1.3. Configuring Apipe SDP Bindings
        2.15.2.2. Creating a Cpipe Service
          2.15.2.2.1. Basic Configuration
          2.15.2.2.2. Configuration Requirements
          2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
        2.15.2.3. Creating an Epipe Service
          2.15.2.3.1. Configuring Epipe SAP Parameters
          2.15.2.3.2. Distributed Epipe SAPs
          2.15.2.3.3. Configuring SDP Bindings
        2.15.2.4. Creating an Fpipe Service
          2.15.2.4.1. Configuring Fpipe SAP Parameters
          2.15.2.4.2. Configuring Fpipe SDP Bindings
        2.15.2.5. Creating an Ipipe Service
          2.15.2.5.1. Configuring Ipipe SAP Parameters
          2.15.2.5.2. Configuring Ipipe SDP Bindings
      2.15.3. Using Spoke-SDP Control Words
      2.15.4. Same-Fate Epipe VLANs Access Protection
      2.15.5. Pseudowire Configuration Notes
      2.15.6. Configuring Two VLL Paths Terminating on T-PE2
      2.15.7. Configuring VLL Resilience
      2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
      2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
        2.15.9.1. Single-Homed BGP VPWS
        2.15.9.2. Dual-Homed BGP VPWS
    2.16. Service Management Tasks
      2.16.1. Modifying Apipe Service Parameters
      2.16.2. Disabling an Apipe Service
      2.16.3. Re-enabling an Apipe Service
      2.16.4. Deleting an Apipe Service
      2.16.5. Modifying a Cpipe Service
      2.16.6. Deleting a Cpipe Service
      2.16.7. Modifying Epipe Service Parameters
      2.16.8. Disabling an Epipe Service
      2.16.9. Re-enabling an Epipe Service
      2.16.10. Deleting an Epipe Service
      2.16.11. Modifying Fpipe Service Parameters
      2.16.12. Disabling an Fpipe Service
      2.16.13. Re-enabling an Fpipe Service
      2.16.14. Deleting an Fpipe Service
      2.16.15. Modifying Ipipe Service Parameters
      2.16.16. Disabling an Ipipe Service
      2.16.17. Re-enabling an Ipipe Service
      2.16.18. Deleting an Ipipe Service
    2.17. VLL Service Configuration Command Reference
      2.17.1. Command Hierarchies
        2.17.1.1. Apipe Service Configuration Commands
          2.17.1.1.1. Apipe Global Commands
          2.17.1.1.2. Apipe SAP Commands
          2.17.1.1.3. Apipe Spoke-SDP Commands
        2.17.1.2. Related Apipe Commands
          2.17.1.2.1. Connection Profile Commands
        2.17.1.3. Cpipe Service Configuration Commands
          2.17.1.3.1. Cpipe Global Commands
          2.17.1.3.2. Cpipe SAP Commands
          2.17.1.3.3. Cpipe Spoke-SDP Commands
        2.17.1.4. Epipe Service Configuration Commands
          2.17.1.4.1. Epipe Global Commands
          2.17.1.4.2. Epipe SAP Configuration Commands
          2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
          2.17.1.4.4. Epipe SAP Template Commands
        2.17.1.5. Fpipe Service Configuration Commands
          2.17.1.5.1. Fpipe Global Commands
          2.17.1.5.2. Fpipe SAP Commands
          2.17.1.5.3. Fpipe Spoke-SDP Commands
        2.17.1.6. Ipipe Service Configuration Commands
          2.17.1.6.1. Ipipe Global Commands
          2.17.1.6.2. Ipipe SAP Commands
          2.17.1.6.3. Ipipe Spoke-SDP Commands
      2.17.2. Command Descriptions
        2.17.2.1. Generic Commands
        2.17.2.2. VLL Global Service Commands
        2.17.2.3. Service Configuration Commands
        2.17.2.4. Service SAP Commands
        2.17.2.5. Service Spoke-SDP Commands
        2.17.2.6. Related Apipe Commands
          2.17.2.6.1. Connection Profile Commands
        2.17.2.7. Epipe Global Commands
        2.17.2.8. Epipe SAP Template Commands
        2.17.2.9. Ipipe Global Commands
        2.17.2.10. Circuit Emulation Commands
        2.17.2.11. ETH-CFM Service Commands
        2.17.2.12. Service Filter and QoS Policy Commands
        2.17.2.13. VLL Frame Relay Commands
        2.17.2.14. ATM Commands
    2.18. VLL Show Command Reference
      2.18.1. Command Hierarchies
        2.18.1.1. Show Commands
        2.18.1.2. Clear Commands
        2.18.1.3. Debug Commands
        2.18.1.4. Tools Commands
      2.18.2. Command Descriptions
        2.18.2.1. VLL Show Commands
        2.18.2.2. VLL Clear Commands
        2.18.2.3. VLL Debug Commands
        2.18.2.4. VLL Tools Commands
  3. Virtual Private LAN Service
    3.1. VPLS Service Overview
      3.1.1. VPLS Packet Walkthrough
    3.2. VPLS Features
      3.2.1. VPLS Enhancements
      3.2.2. VPLS over MPLS
      3.2.3. VPLS Service Pseudowire VLAN Tag Processing
      3.2.4. VPLS MAC Learning and Packet Forwarding
        3.2.4.1. MAC Learning Protection
        3.2.4.2. DEI in IEEE 802.1ad
      3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
      3.2.6. Pseudowire Control Word
      3.2.7. Table Management
        3.2.7.1. Selective MAC Address Learning
          3.2.7.1.1. Example Operational Information
        3.2.7.2. System FDB Size
        3.2.7.3. Per-VPLS Service FDB Size
        3.2.7.4. System FDB Size Alarms
        3.2.7.5. Line Card FDB Size Alarms
        3.2.7.6. Per VPLS FDB Size Alarms
        3.2.7.7. Local and Remote Aging Timers
        3.2.7.8. Disable MAC Aging
        3.2.7.9. Disable MAC Learning
        3.2.7.10. Unknown MAC Discard
        3.2.7.11. VPLS and Rate Limiting
        3.2.7.12. MAC Move
        3.2.7.13. Auto-Learn MAC Protect
          3.2.7.13.1. Operation
      3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      3.2.9. VPLS and Spanning Tree Protocol
        3.2.9.1. Spanning Tree Operating Modes
        3.2.9.2. Multiple Spanning Tree
          3.2.9.2.1. Redundancy Access to VPLS
        3.2.9.3. MSTP for QinQ SAPs
        3.2.9.4. Provider MSTP
          3.2.9.4.1. MSTP General Principles
          3.2.9.4.2. MSTP in the SR-series Platform
        3.2.9.5. Enhancements to the Spanning Tree Protocol
          3.2.9.5.1. L2PT Termination
          3.2.9.5.2. BPDU Translation
          3.2.9.5.3. L2PT and BPDU Translation
      3.2.10. VPLS Redundancy
        3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
        3.2.10.2. Spoke SDP Based Redundant Access
        3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          3.2.10.3.1. Fast Detection of Peer Failure using BFD
          3.2.10.3.2. MC-EP Passive Mode
        3.2.10.4. Support for Single Chassis Endpoint Mechanisms
          3.2.10.4.1. MAC Flush Support in MC-EP
          3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
          3.2.10.4.3. Support for Force Spoke SDP in MC-EP
          3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
        3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
        3.2.10.6. MAC Flush Additions for PBB VPLS
      3.2.11. VPLS Access Redundancy
        3.2.11.1. STP-based Redundant Access to VPLS
        3.2.11.2. Redundant Access to VPLS Without STP
      3.2.12. Object Grouping and State Monitoring
        3.2.12.1. VPLS Applicability — Block on VPLS a Failure
      3.2.13. MAC Flush Message Processing
        3.2.13.1. Dual Homing to a VPLS Service
        3.2.13.2. MC-Ring and VPLS
      3.2.14. ACL Next-Hop for VPLS
      3.2.15. SDP Statistics for VPLS and VLL Services
      3.2.16. BGP Auto-Discovery for LDP VPLS
        3.2.16.1. BGP AD Overview
        3.2.16.2. Information Model
        3.2.16.3. FEC Element for T-LDP Signaling
        3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
        3.2.16.5. SDP Usage
        3.2.16.6. Automatic Creation of SDPs
        3.2.16.7. Manually Provisioned SDP
        3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
        3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        3.2.16.10. Resiliency Schemes
      3.2.17. BGP VPLS
        3.2.17.1. Pseudowire Signaling Details
        3.2.17.2. Supported VPLS Features
      3.2.18. VCCV BFD Support for VPLS Services
      3.2.19. BGP Multi-Homing for VPLS
        3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
        3.2.19.2. Supported Services and Multi-Homing Objects
        3.2.19.3. Blackhole Avoidance
          3.2.19.3.1. MAC Flush to the Core PEs
          3.2.19.3.2. Indicating non-DF status toward the access PE or CE
        3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
      3.2.20. Multicast-Aware VPLS
        3.2.20.1. IGMP Snooping for VPLS
        3.2.20.2. MLD Snooping for VPLS
        3.2.20.3. PIM Snooping for VPLS
          3.2.20.3.1. Plain PIM Snooping
          3.2.20.3.2. PIM Proxy
        3.2.20.4. IPv6 Multicast Forwarding
          3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
          3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
        3.2.20.5. PIM and IGMP/MLD Snooping Interaction
        3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
          3.2.20.6.1. IGMP Snooping Synchronization
          3.2.20.6.2. MLD Snooping Synchronization
          3.2.20.6.3. PIM Snooping for IPv4 Synchronization
        3.2.20.7. VPLS Multicast-Aware High Availability Features
      3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      3.2.22. MPLS Entropy Label and Hash Label
    3.3. Routed VPLS and I-VPLS
      3.3.1. IES or VPRN IP Interface Binding
        3.3.1.1. Assigning a Service Name to a VPLS Service
        3.3.1.2. Service Binding Requirements
        3.3.1.3. Bound Service Name Assignment
        3.3.1.4. Binding a Service Name to an IP Interface
        3.3.1.5. Bound Service Deletion or Service Name Removal
        3.3.1.6. IP Interface Attached VPLS Service Constraints
        3.3.1.7. IP Interface and VPLS Operational State Coordination
      3.3.2. IP Interface MTU and Fragmentation
        3.3.2.1. Unicast IP Routing into a VPLS Service
      3.3.3. ARP and VPLS FDB Interactions
        3.3.3.1. R-VPLS Specific ARP Cache Behavior
      3.3.4. The allow-ip-int-bind VPLS Flag
        3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
        3.3.4.2. LAG Port Membership Constraints
        3.3.4.3. R-VPLS Feature Restrictions
        3.3.4.4. Routed I-VPLS Feature Restrictions
      3.3.5. IPv4 and IPv6 Multicast Routing Support
      3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
      3.3.7. R-VPLS Caveats
        3.3.7.1. VPLS SAP Ingress IP Filter Override
        3.3.7.2. IP Interface Defined Egress QoS Reclassification
        3.3.7.3. Remarking for VPLS and Routed Packets
        3.3.7.4. 7450 Mixed Mode Chassis
        3.3.7.5. IPv4 Multicast Routing
        3.3.7.6. R-VPLS Supported Routing-related Protocols
        3.3.7.7. Spanning Tree and Split Horizon
    3.4. VPLS Service Considerations
      3.4.1. SAP Encapsulations
      3.4.2. VLAN Processing
      3.4.3. Ingress VLAN Swapping
      3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
        3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
        3.4.4.3. MVRP Activation of Service Connectivity
        3.4.4.4. MVRP Control Plane
        3.4.4.5. STP-MVRP Interaction
          3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
          3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
      3.4.5. VPLS E-Tree Services
        3.4.5.1. VPLS E-Tree Services Overview
        3.4.5.2. Leaf-ac and Root-ac SAPs
        3.4.5.3. Leaf-ac and Root-ac SDP Binds
        3.4.5.4. Root-leaf-tag SAPs
        3.4.5.5. Root-leaf-tag SDP Binds
        3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
    3.5. Configuring a VPLS Service with CLI
      3.5.1. Basic Configuration
      3.5.2. Common Configuration Tasks
      3.5.3. Configuring VPLS Components
        3.5.3.1. Creating a VPLS Service
        3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
          3.5.3.2.1. Enabling MAC Move
          3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
        3.5.3.3. Configuring GSMP Parameters
        3.5.3.4. Configuring a VPLS SAP
          3.5.3.4.1. Local VPLS SAPs
          3.5.3.4.2. Distributed VPLS SAPs
          3.5.3.4.3. Configuring SAP-Specific STP Parameters
          3.5.3.4.4. STP SAP Operational States
          3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
          3.5.3.4.6. Configuring MAC Learning Protection
        3.5.3.5. Configuring SAP Subscriber Management Parameters
        3.5.3.6. MSTP Control over Ethernet Tunnels
        3.5.3.7. Configuring SDP Bindings
        3.5.3.8. Configuring Overrides on Service SAPs
          3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
          3.5.3.8.2. Spoke-SDP STP Operational States
          3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
      3.5.4. Configuring VPLS Redundancy
        3.5.4.1. Creating a Management VPLS for SAP Protection
        3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
        3.5.4.3. Configuring Load Balancing with Management VPLS
        3.5.4.4. Configuring Selective MAC Flush
        3.5.4.5. Configuring Multi-Chassis Endpoints
      3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
      3.5.6. Configuring BGP Auto-Discovery
        3.5.6.1. Configuration Steps
        3.5.6.2. LDP Signaling
        3.5.6.3. Pseudowire Template
      3.5.7. Configuring BGP VPLS
        3.5.7.1. Configuring a VPLS Management Interface
      3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      3.5.9. Configuring VPLS E-Tree Services
    3.6. Service Management Tasks
      3.6.1. Modifying VPLS Service Parameters
      3.6.2. Modifying Management VPLS Parameters
      3.6.3. Deleting a Management VPLS
      3.6.4. Disabling a Management VPLS
      3.6.5. Deleting a VPLS Service
      3.6.6. Disabling a VPLS Service
      3.6.7. Re-enabling a VPLS Service
    3.7. VPLS Service Configuration Command Reference
      3.7.1. Command Hierarchies
        3.7.1.1. Global Commands
        3.7.1.2. General Switch Management Protocol (GSMP) Commands
        3.7.1.3. BGP Auto-Discovery Commands
        3.7.1.4. Oper Group Commands
        3.7.1.5. SAP Commands
        3.7.1.6. Template Commands
        3.7.1.7. Mesh SDP Commands
        3.7.1.8. Spoke SDP Commands
        3.7.1.9. Provider Tunnel Commands
        3.7.1.10. Routed VPLS Commands
        3.7.1.11. Multi-Chassis Redundancy Commands
      3.7.2. Command Descriptions
        3.7.2.1. Generic Commands
        3.7.2.2. VPLS Service Commands
        3.7.2.3. General Switch Management Protocol Commands
          3.7.2.3.1. VPLS DHCP Commands
          3.7.2.3.2. VPLS STP Commands
          3.7.2.3.3. VPLS SAP Commands
          3.7.2.3.4. VPLS SAP ATM Commands
        3.7.2.4. ETH-CFM Service Commands
          3.7.2.4.1. VPLS Filter and QoS Policy Commands
          3.7.2.4.2. VPLS Template Commands
          3.7.2.4.3. Provider Tunnel Commands
          3.7.2.4.4. VPLS SDP Commands
          3.7.2.4.5. SAP Subscriber Management Commands
        3.7.2.5. VPLS Multicast Commands
          3.7.2.5.1. VPLS DHCP and Anti-Spoofing Commands
        3.7.2.6. BGP Auto-Discovery Commands
        3.7.2.7. Redundancy Commands
    3.8. VPLS Show, Clear, Debug, and Tools Command Reference
      3.8.1. Command Hierarchies
        3.8.1.1. Show Commands
          3.8.1.1.1. IGMP Show Commands
          3.8.1.1.2. IGMP Snooping Show Commands
          3.8.1.1.3. MLD Snooping Commands
          3.8.1.1.4. Show Multi-Chassis Endpoint Commands
        3.8.1.2. Clear Commands
        3.8.1.3. Debug Commands
        3.8.1.4. Tools Commands
      3.8.2. Command Descriptions
        3.8.2.1. VPLS Show Commands
        3.8.2.2. IGMP Snooping Show Commands
        3.8.2.3. MLD Snooping Show Commands
        3.8.2.4. IGMP Commands
          3.8.2.4.1. Show Multi-Chassis Endpoint Commands
        3.8.2.5. VPLS Clear Commands
        3.8.2.6. VPLS Debug Commands
        3.8.2.7. Tools Commands
  4. IEEE 802.1ah Provider Backbone Bridging
    4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    4.2. PBB Features
      4.2.1. Integrated PBB-VPLS Solution
      4.2.2. PBB Technology
      4.2.3. PBB Mapping to Existing VPLS Configurations
      4.2.4. SAP and SDP Support
        4.2.4.1. PBB B-VPLS
        4.2.4.2. PBB I-VPLS
      4.2.5. PBB Packet Walkthrough
        4.2.5.1. PBB Control Planes
      4.2.6. Shortest Path Bridging MAC Mode (SPBM)
        4.2.6.1. Flooding and Learning Versus Link State
        4.2.6.2. SPB for B-VPLS
        4.2.6.3. Control B-VPLS and User B-VPLS
        4.2.6.4. Shortest Path and Single Tree
        4.2.6.5. Data Path and Forwarding
        4.2.6.6. SPB Ethernet OAM
        4.2.6.7. SPB Levels
      4.2.7. SPBM to Non-SPBM Interworking
        4.2.7.1. Static MACs and Static ISIDs
        4.2.7.2. Epipe Static Configuration
          4.2.7.2.1. I-VPLS Static Config
        4.2.7.3. SPBM ISID Policies
      4.2.8. ISID Policy Control
        4.2.8.1. Static ISID Advertisement
        4.2.8.2. I-VPLS for Unicast Service
      4.2.9. Default Behaviors
      4.2.10. Example Network Configuration
        4.2.10.1. Sample Configuration for Dut-A
          4.2.10.1.1. Show Commands Outputs
          4.2.10.1.2. Debug Commands
          4.2.10.1.3. Tools Commands
          4.2.10.1.4. Clear Commands
      4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
        4.2.12.1. I-VPLS Changes and Related MMRP Behavior
        4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        4.2.12.3. Optimization for Improved Convergence Time
        4.2.12.4. Controlling MRP Scope using MRP Policies
      4.2.13. PBB and BGP-AD
      4.2.14. PBB E-Line Service
        4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
      4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
        4.2.15.1. Solution Overview
        4.2.15.2. Detailed Solution Description
        4.2.15.3. Detailed PBB Emulated LAG Solution Description
        4.2.15.4. Support Service and Solution Combinations
      4.2.16. Periodic MAC Notification
      4.2.17. MAC Flush
        4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
          4.2.17.1.2. PBB Blackholing Issue
          4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
      4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
        4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
      4.2.19. BGP Multi-homing for I-VPLS
      4.2.20. Access Multi-Homing over MPLS for PBB Epipes
      4.2.21. PBB and IGMP/MLD Snooping
      4.2.22. PBB and PIM Snooping
      4.2.23. PBB QoS
        4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
          4.2.23.1.1. Configuration Examples
          4.2.23.1.2. Details Solution Description
      4.2.24. Egress B-SAP per ISID Shaping
        4.2.24.1. B-SAP Egress ISID Shaping Configuration
        4.2.24.2. Provisioning Model
        4.2.24.3. Egress Queue Scheduling
        4.2.24.4. B-SAP per-ISID Shaping Configuration Example
      4.2.25. PBB OAM
        4.2.25.1. Mirroring
        4.2.25.2. OAM Commands
        4.2.25.3. CFM Support
    4.3. Configuration Examples
      4.3.1. PBB using G.8031 Protected Ethernet Tunnels
      4.3.2. MC-LAG Multi-homing for Native PBB
      4.3.3. Access Multi-Homing over MPLS for PBB Epipes
    4.4. PBB Configuration Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Global Commands
        4.4.1.2. SAP Commands
        4.4.1.3. Mesh SDP Commands
        4.4.1.4. Spoke SDP Commands
        4.4.1.5. BGP-MH for I-VPLS Commands
      4.4.2. Command Descriptions
        4.4.2.1. VPLS Service Commands
    4.5. PBB Show, Clear, and Debug Command Reference
      4.5.1. Command Hierarchies
        4.5.1.1. Show Commands
        4.5.1.2. Clear Commands
        4.5.1.3. Debug Commands
      4.5.2. Command Descriptions
        4.5.2.1. PBB Show Commands
        4.5.2.2. PBB Clear Commands
        4.5.2.3. PBB Debug Commands
  5. Ethernet Virtual Private Networks (EVPNs)
    5.1. Overview and EVPN Applications
      5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
      5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
      5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
      5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
      5.1.5. EVPN for MPLS Tunnels in E-LAN Services
      5.1.6. EVPN for MPLS Tunnels in E-Line Services
      5.1.7. EVPN for MPLS Tunnels in E-Tree Services
      5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    5.2. EVPN for VXLAN Tunnels and Cloud Technologies
      5.2.1. VXLAN
        5.2.1.1. VXLAN ECMP and LAG
        5.2.1.2. VXLAN VPLS Tag Handling
        5.2.1.3. VXLAN MTU Considerations
        5.2.1.4. VXLAN QoS
          5.2.1.4.1. Ingress
          5.2.1.4.2. Egress
        5.2.1.5. VXLAN Ping
        5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
        5.2.1.7. IGMP and MLD Snooping on VXLAN
        5.2.1.8. PIM Snooping on VXLAN
        5.2.1.9. Static VXLAN Termination in Epipe Services
        5.2.1.10. Static VXLAN Termination in VPLS/R-VPLS Services
        5.2.1.11. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
      5.2.2. EVPN for Overlay Tunnels
        5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
        5.2.2.2. EVPN for VXLAN in VPLS Services
          5.2.2.2.1. Resiliency and BGP Multi-Homing
          5.2.2.2.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
          5.2.2.2.3. Use of the unknown-mac-route
        5.2.2.3. EVPN for VXLAN in R-VPLS Services
          5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
        5.2.2.4. EVPN-VPWS for VXLAN Tunnels
          5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
      5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
        5.2.3.1. XMPP Interface on the DC GW
        5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
        5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
          5.2.3.3.1. VSD-Domain Type L2-DOMAIN
          5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
          5.2.3.3.3. VSD-Domain Type VRF-GRE
          5.2.3.3.4. VSD-Domain Type VRF-VXLAN
        5.2.3.4. Fully-Dynamic VSD Integration Model
          5.2.3.4.1. Python Script Implementation Details
          5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
      5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
        5.2.4.1. Replicator (AR-R) Procedures
        5.2.4.2. Leaf (AR-L) procedures
        5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
      5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
        5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
        5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    5.3. EVPN for MPLS Tunnels
      5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
      5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
        5.3.2.1. EVPN and VPLS Integration
        5.3.2.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
        5.3.2.3. EVPN Multi-Homing in VPLS Services
          5.3.2.3.1. EVPN All-Active Multi-Homing
          5.3.2.3.2. EVPN Single-Active Multi-Homing
      5.3.3. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
      5.3.4. EVPN-VPWS for MPLS Tunnels
        5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
        5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
        5.3.4.3. PW ports based Ethernet Segments for EVPN-VPWS
      5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
        5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
      5.3.6. PBB-EVPN
        5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
          5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
          5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
          5.3.6.1.3. EVPN Route Type 4 - Ethernet Segment Route
        5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
          5.3.6.2.1. Flood Containment for I-VPLS Services
          5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
          5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
          5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
          5.3.6.2.5. PBB-EVPN ISID-Based CMAC-Flush
          5.3.6.2.6. PBB-EVPN ISID-based Route Targets
      5.3.7. Virtual Ethernet Segments
      5.3.8. Preference-Based and Non-Revertive DF Election
      5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
      5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
        5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
      5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
        5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
      5.3.12. EVPN E-Tree
        5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
        5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
        5.3.12.3. EVPN E-Tree Operation
          5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
          5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
          5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
        5.3.12.4. EVPN E-Tree and EVPN Multi-homing
        5.3.12.5. PBB-EVPN E-Tree Services
      5.3.13. MPLS Entropy Label and Hash Label
      5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
        5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
        5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
    5.4. General EVPN Topics
      5.4.1. ARP/ND Snooping and Proxy Support
        5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
        5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
        5.4.1.3. Procedure to Add the R Flag to a Specified Entry
        5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
      5.4.2. BGP-EVPN MAC-Mobility
      5.4.3. BGP-EVPN MAC-Duplication
      5.4.4. Conditional Static MAC and Protection
      5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
      5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
      5.4.7. Blackhole MAC for EVPN Loop Detection
      5.4.8. CFM Interaction with EVPN Services
      5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
        5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
        5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
        5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
        5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
          5.4.9.4.1. BGP-EVPN Routes on Dual BGP-instance Services with I-ES
          5.4.9.4.2. Single-Active Multi-Homing on I-ES
          5.4.9.4.3. All-Active Multi-Homing on I-ES
      5.4.10. Configuring multi-instance EVPN-VXLAN in the Same VPLS Service
        5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
        5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
      5.4.11. Configuring static VXLAN and EVPN in the Same VPLS Service
      5.4.12. EVPN IP-Prefix Route Interoperability
        5.4.12.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
        5.4.12.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
        5.4.12.3. Interface-less IP-VRF-to-IP-VRF Model
      5.4.13. ARP-ND Host Routes for Extended Layer-2 Data Centers
      5.4.14. BGP and EVPN Route Selection for EVPN Routes
      5.4.15. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      5.4.16. Interaction of EVPN and Other Features
        5.4.16.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
        5.4.16.2. Interaction of PBB-EVPN with Existing VPLS Features
        5.4.16.3. Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
      5.4.17. Routing Policies for BGP EVPN Routes
        5.4.17.1. Routing Policies for BGP EVPN IP Prefixes
    5.5. Configuring an EVPN Service with CLI
      5.5.1. EVPN-VXLAN Configuration Examples
        5.5.1.1. Layer 2 PE Example
        5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
        5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      5.5.2. EVPN-MPLS Configuration Examples
        5.5.2.1. EVPN All-active Multi-homing Example
        5.5.2.2. EVPN Single-active Multi-homing Example
      5.5.3. PBB-EVPN Configuration Examples
        5.5.3.1. PBB-EVPN All-active Multi-homing Example
        5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
    5.6. EVPN Command Reference
      5.6.1. Command Hierarchies
        5.6.1.1. EVPN Configuration Commands
        5.6.1.2. Show Commands
        5.6.1.3. Clear Commands
        5.6.1.4. Debug Commands
        5.6.1.5. Tools Commands
      5.6.2. Command Descriptions
        5.6.2.1. EVPN Configuration Commands
        5.6.2.2. Show Configuration Commands
        5.6.2.3. Clear Commands
        5.6.2.4. Debug Commands
        5.6.2.5. Tools Commands
  6. Pseudowire Ports
    6.1. Overview
    6.2. PW Port Bound to a Physical Port
    6.3. FPE-Based PW Port
      6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
      6.3.2. PXC-Based PW-Port — Building the Cross-Connect
        6.3.2.1. Building the Internal Transport Tunnel
        6.3.2.2. Mapping the External PW to the PW-Port
        6.3.2.3. Terminating the Service on PW-SAP
      6.3.3. FPE-Based PW-port Operational State
      6.3.4. QoS
        6.3.4.1. Preservation of Forwarding Class Across PXC
      6.3.5. Statistics on the FPE based PW-Port
      6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
    6.4. L2oGRE Termination on FPE-Based PW Port
      6.4.1. L2oGRE Packet Format
      6.4.2. GRE Delivery Protocol
      6.4.3. Tracking Payloads and Service Termination Points
        6.4.3.1. Plain L3 termination
        6.4.3.2. Layer 2 Termination
        6.4.3.3. ESM Termination
      6.4.4. Configuration Steps
      6.4.5. Fragmentation and MTU Configuration
      6.4.6. Reassembly
    6.5. Pseudowire Ports Command Reference
      6.5.1. Command Hierarchies
        6.5.1.1. PW-port Configuration Commands
        6.5.1.2. Redundant Interface Commands
        6.5.1.3. Show Commands
      6.5.2. Command Descriptions
        6.5.2.1. PW-port Configuration Commands
        6.5.2.2. SDP Binding Commands
        6.5.2.3. Show Commands
  7. VSR Pseudowire Ports
    7.1. Flex PW Ports
      7.1.1. PW Port List
      7.1.2. Failover Times
      7.1.3. QoS
      7.1.4. PW Port Termination for Various Tunnel Types
        7.1.4.1. MPLS-Based Spoke SDP
          7.1.4.1.1. Provisioning
          7.1.4.1.2. Flex PW-Port Operational State for MPLS Based Spoke SDP
          7.1.4.1.3. Statistics
        7.1.4.2. L2oGRE-Based Spoke SDP
          7.1.4.2.1. Provisioning
          7.1.4.2.2. Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
          7.1.4.2.3. Reassembly
    7.2. VSR Pseudowire Ports Command Reference
      7.2.1. Command Hierarchies
        7.2.1.1. PW Port Configuration Commands
        7.2.1.2. Show Commands
        7.2.1.3. Clear Commands
      7.2.2. Command Descriptions
        7.2.2.1. PW Port Configuration Commands
        7.2.2.2. Show Commands
        7.2.2.3. Clear Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 2 Services and EVPN Configuration Process
  2. VLL Services
    2.1. ATM VLL (Apipe) Services
      2.1.1. Apipe For End-to-End ATM Service
      2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
      2.1.3. Traffic Management Support
        2.1.3.1. Ingress Network Classification
        2.1.3.2. Ingress Queuing and Shaping on the IOM
        2.1.3.3. Egress Queuing and Shaping on the IOM
        2.1.3.4. Egress Shaping/Scheduling
    2.2. Circuit Emulation (Cpipe) Services
      2.2.1. Mobile Infrastructure
      2.2.2. Circuit Emulation Modes
      2.2.3. Circuit Emulation Parameters
        2.2.3.1. Circuit Emulation Modes
        2.2.3.2. Absolute Mode Option
        2.2.3.3. Payload Size
        2.2.3.4. Jitter Buffer
        2.2.3.5. CES Circuit Operation
      2.2.4. Services for Transporting CES Circuits
      2.2.5. Network Synchronization Considerations
      2.2.6. Cpipe Payload
    2.3. Ethernet Pipe (Epipe) Services
      2.3.1. Epipe Service Overview
      2.3.2. Epipe Service Pseudowire VLAN Tag Processing
      2.3.3. Epipe Up Operational State Configuration Option
      2.3.4. Epipe with PBB
      2.3.5. Epipe over L2TPv3
      2.3.6. Ethernet Interworking VLL
      2.3.7. VLL CAC
      2.3.8. MC-Ring and VLL
    2.4. Frame Relay VLL (Fpipe) Services
      2.4.1. Frame Relay VLL
      2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
      2.4.3. Traffic Management Support
        2.4.3.1. Frame Relay Traffic Management
        2.4.3.2. Ingress SAP Classification and Marking
        2.4.3.3. Egress Network EXP Marking
        2.4.3.4. Ingress Network Classification
    2.5. IP Interworking VLL (Ipipe) Services
      2.5.1. Ipipe VLL
      2.5.2. IP Interworking VLL Datapath
      2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
        2.5.3.1. VLL Ethernet SAP Processes
          2.5.3.1.1. VLL FR SAP Procedures
          2.5.3.1.2. VLL ATM SAP Procedures
          2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      2.5.4. IPv6 Support on IP Interworking VLL
        2.5.4.1. IPv6 Datapath Operation
        2.5.4.2. IPv6 Stack Capability Signaling
    2.6. Services Configuration for MPLS-TP
      2.6.1. MPLS-TP SDPs
      2.6.2. VLL Spoke SDP Configuration
        2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
      2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
        2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
        2.6.3.2. Lock PW Endpoint Model
        2.6.3.3. PW Redundancy and Lock Instruct and Loopback
        2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
        2.6.3.5. Configuring an Administrative Lock
        2.6.3.6. Configuring a Loopback
      2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
    2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      2.7.1. VCCV BFD Support
      2.7.2. VCCV BFD Encapsulation on a Pseudowire
      2.7.3. BFD Session Operation
      2.7.4. Configuring VCCV BFD
    2.8. Pseudowire Switching
      2.8.1. Pseudowire Switching with Protection
      2.8.2. Pseudowire Switching Behavior
        2.8.2.1. Pseudowire Switching TLV
        2.8.2.2. Pseudowire Switching Point Sub-TLVs
      2.8.3. Static-to-Dynamic Pseudowire Switching
      2.8.4. Ingress VLAN Swapping
        2.8.4.1. Ingress VLAN Translation
      2.8.5. Pseudowire Redundancy
      2.8.6. Dynamic Multi-Segment Pseudowire Routing
        2.8.6.1. Overview
        2.8.6.2. Pseudowire Routing
          2.8.6.2.1. Static Routing
          2.8.6.2.2. Explicit Paths
        2.8.6.3. Configuring VLLs using Dynamic MS-PWs
          2.8.6.3.1. Active/Passive T-PE Selection
          2.8.6.3.2. Automatic Endpoint Configuration
          2.8.6.3.3. Selecting a Path for an MS-PW
          2.8.6.3.4. Pseudowire Templates
        2.8.6.4. Pseudowire Redundancy
        2.8.6.5. VCCV OAM for Dynamic MS-PWs
        2.8.6.6. VCCV-Ping on Dynamic MS-PWs
        2.8.6.7. VCCV-Trace on Dynamic MS-PWs
      2.8.7. Example Dynamic MS-PW Configuration
      2.8.8. VLL Resilience with Two Destination PE Nodes
        2.8.8.1. Master-Slave Operation
          2.8.8.1.1. Interaction with SAP-Specific OAM
          2.8.8.1.2. Local Rules at Slave VLL PE
          2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
      2.8.9. Pseudowire SAPs
      2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
        2.8.10.1. Operational Overview
        2.8.10.2. Detailed Operation
          2.8.10.2.1. Sample Operation of G.8031 BGP-MH
        2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
        2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
        2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
          2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
          2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
          2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
      2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      2.8.12. VLL Resilience for a Switched Pseudowire Path
    2.9. Pseudowire Redundancy Service Models
      2.9.1. Redundant VLL Service Model
      2.9.2. T-LDP Status Notification Handling Rules
        2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
        2.9.2.2. Processing and Merging
    2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      2.10.1. Primary Spoke SDP Fallback to Secondary SAP
      2.10.2. Reversion to Primary Spoke SDP Path
      2.10.3. MC-APS and MC-LAG
        2.10.3.1. Failure Scenario
    2.11. VLL Using G.8031 Protected Ethernet Tunnels
    2.12. MPLS Entropy Label and Hash Label
    2.13. BGP Virtual Private Wire Service (VPWS)
      2.13.1. Single-Homed BGP VPWS
      2.13.2. Dual-Homed BGP VPWS
        2.13.2.1. Single Pseudowire Example
        2.13.2.2. Active/Standby Pseudowire Example
      2.13.3. BGP VPWS Pseudowire Switching
        2.13.3.1. Pseudowire Signaling
        2.13.3.2. BGP-VPWS with Inter-AS Model C
        2.13.3.3. BGP VPWS Configuration Procedure
        2.13.3.4. Use of Pseudowire Template for BGP VPWS
        2.13.3.5. Use of Endpoint for BGP VPWS
    2.14. VLL Service Considerations
      2.14.1. SDPs
        2.14.1.1. SDP Statistics for VPLS and VLL Services
      2.14.2. SAP Encapsulations and Pseudowire Types
        2.14.2.1. PWE3 N-to-1 Cell Mode
        2.14.2.2. PWE3 AAL5 SDU Mode
        2.14.2.3. QoS Policies
        2.14.2.4. Filter Policies
        2.14.2.5. MAC Resources
    2.15. Configuring a VLL Service with CLI
      2.15.1. Common Configuration Tasks
      2.15.2. Configuring VLL Components
        2.15.2.1. Creating an Apipe Service
          2.15.2.1.1. Configuring Basic Apipe SAP Parameters
          2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          2.15.2.1.3. Configuring Apipe SDP Bindings
        2.15.2.2. Creating a Cpipe Service
          2.15.2.2.1. Basic Configuration
          2.15.2.2.2. Configuration Requirements
          2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
        2.15.2.3. Creating an Epipe Service
          2.15.2.3.1. Configuring Epipe SAP Parameters
          2.15.2.3.2. Distributed Epipe SAPs
          2.15.2.3.3. Configuring SDP Bindings
        2.15.2.4. Creating an Fpipe Service
          2.15.2.4.1. Configuring Fpipe SAP Parameters
          2.15.2.4.2. Configuring Fpipe SDP Bindings
        2.15.2.5. Creating an Ipipe Service
          2.15.2.5.1. Configuring Ipipe SAP Parameters
          2.15.2.5.2. Configuring Ipipe SDP Bindings
      2.15.3. Using Spoke-SDP Control Words
      2.15.4. Same-Fate Epipe VLANs Access Protection
      2.15.5. Pseudowire Configuration Notes
      2.15.6. Configuring Two VLL Paths Terminating on T-PE2
      2.15.7. Configuring VLL Resilience
      2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
      2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
        2.15.9.1. Single-Homed BGP VPWS
        2.15.9.2. Dual-Homed BGP VPWS
    2.16. Service Management Tasks
      2.16.1. Modifying Apipe Service Parameters
      2.16.2. Disabling an Apipe Service
      2.16.3. Re-enabling an Apipe Service
      2.16.4. Deleting an Apipe Service
      2.16.5. Modifying a Cpipe Service
      2.16.6. Deleting a Cpipe Service
      2.16.7. Modifying Epipe Service Parameters
      2.16.8. Disabling an Epipe Service
      2.16.9. Re-enabling an Epipe Service
      2.16.10. Deleting an Epipe Service
      2.16.11. Modifying Fpipe Service Parameters
      2.16.12. Disabling an Fpipe Service
      2.16.13. Re-enabling an Fpipe Service
      2.16.14. Deleting an Fpipe Service
      2.16.15. Modifying Ipipe Service Parameters
      2.16.16. Disabling an Ipipe Service
      2.16.17. Re-enabling an Ipipe Service
      2.16.18. Deleting an Ipipe Service
    2.17. VLL Service Configuration Command Reference
      2.17.1. Command Hierarchies
        2.17.1.1. Apipe Service Configuration Commands
          2.17.1.1.1. Apipe Global Commands
          2.17.1.1.2. Apipe SAP Commands
          2.17.1.1.3. Apipe Spoke-SDP Commands
        2.17.1.2. Related Apipe Commands
          2.17.1.2.1. Connection Profile Commands
        2.17.1.3. Cpipe Service Configuration Commands
          2.17.1.3.1. Cpipe Global Commands
          2.17.1.3.2. Cpipe SAP Commands
          2.17.1.3.3. Cpipe Spoke-SDP Commands
        2.17.1.4. Epipe Service Configuration Commands
          2.17.1.4.1. Epipe Global Commands
          2.17.1.4.2. Epipe SAP Configuration Commands
          2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
          2.17.1.4.4. Epipe SAP Template Commands
        2.17.1.5. Fpipe Service Configuration Commands
          2.17.1.5.1. Fpipe Global Commands
          2.17.1.5.2. Fpipe SAP Commands
          2.17.1.5.3. Fpipe Spoke-SDP Commands
        2.17.1.6. Ipipe Service Configuration Commands
          2.17.1.6.1. Ipipe Global Commands
          2.17.1.6.2. Ipipe SAP Commands
          2.17.1.6.3. Ipipe Spoke-SDP Commands
      2.17.2. Command Descriptions
        2.17.2.1. Generic Commands
        2.17.2.2. VLL Global Service Commands
        2.17.2.3. Service Configuration Commands
        2.17.2.4. Service SAP Commands
        2.17.2.5. Service Spoke-SDP Commands
        2.17.2.6. Related Apipe Commands
          2.17.2.6.1. Connection Profile Commands
        2.17.2.7. Epipe Global Commands
        2.17.2.8. Epipe SAP Template Commands
        2.17.2.9. Ipipe Global Commands
        2.17.2.10. Circuit Emulation Commands
        2.17.2.11. ETH-CFM Service Commands
        2.17.2.12. Service Filter and QoS Policy Commands
        2.17.2.13. VLL Frame Relay Commands
        2.17.2.14. ATM Commands
    2.18. VLL Show Command Reference
      2.18.1. Command Hierarchies
        2.18.1.1. Show Commands
        2.18.1.2. Clear Commands
        2.18.1.3. Debug Commands
        2.18.1.4. Tools Commands
      2.18.2. Command Descriptions
        2.18.2.1. VLL Show Commands
        2.18.2.2. VLL Clear Commands
        2.18.2.3. VLL Debug Commands
        2.18.2.4. VLL Tools Commands
  3. Virtual Private LAN Service
    3.1. VPLS Service Overview
      3.1.1. VPLS Packet Walkthrough
    3.2. VPLS Features
      3.2.1. VPLS Enhancements
      3.2.2. VPLS over MPLS
      3.2.3. VPLS Service Pseudowire VLAN Tag Processing
      3.2.4. VPLS MAC Learning and Packet Forwarding
        3.2.4.1. MAC Learning Protection
        3.2.4.2. DEI in IEEE 802.1ad
      3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
      3.2.6. Pseudowire Control Word
      3.2.7. Table Management
        3.2.7.1. Selective MAC Address Learning
          3.2.7.1.1. Example Operational Information
        3.2.7.2. System FDB Size
        3.2.7.3. Per-VPLS Service FDB Size
        3.2.7.4. System FDB Size Alarms
        3.2.7.5. Line Card FDB Size Alarms
        3.2.7.6. Per VPLS FDB Size Alarms
        3.2.7.7. Local and Remote Aging Timers
        3.2.7.8. Disable MAC Aging
        3.2.7.9. Disable MAC Learning
        3.2.7.10. Unknown MAC Discard
        3.2.7.11. VPLS and Rate Limiting
        3.2.7.12. MAC Move
        3.2.7.13. Auto-Learn MAC Protect
          3.2.7.13.1. Operation
      3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      3.2.9. VPLS and Spanning Tree Protocol
        3.2.9.1. Spanning Tree Operating Modes
        3.2.9.2. Multiple Spanning Tree
          3.2.9.2.1. Redundancy Access to VPLS
        3.2.9.3. MSTP for QinQ SAPs
        3.2.9.4. Provider MSTP
          3.2.9.4.1. MSTP General Principles
          3.2.9.4.2. MSTP in the SR-series Platform
        3.2.9.5. Enhancements to the Spanning Tree Protocol
          3.2.9.5.1. L2PT Termination
          3.2.9.5.2. BPDU Translation
          3.2.9.5.3. L2PT and BPDU Translation
      3.2.10. VPLS Redundancy
        3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
        3.2.10.2. Spoke SDP Based Redundant Access
        3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          3.2.10.3.1. Fast Detection of Peer Failure using BFD
          3.2.10.3.2. MC-EP Passive Mode
        3.2.10.4. Support for Single Chassis Endpoint Mechanisms
          3.2.10.4.1. MAC Flush Support in MC-EP
          3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
          3.2.10.4.3. Support for Force Spoke SDP in MC-EP
          3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
        3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
        3.2.10.6. MAC Flush Additions for PBB VPLS
      3.2.11. VPLS Access Redundancy
        3.2.11.1. STP-based Redundant Access to VPLS
        3.2.11.2. Redundant Access to VPLS Without STP
      3.2.12. Object Grouping and State Monitoring
        3.2.12.1. VPLS Applicability — Block on VPLS a Failure
      3.2.13. MAC Flush Message Processing
        3.2.13.1. Dual Homing to a VPLS Service
        3.2.13.2. MC-Ring and VPLS
      3.2.14. ACL Next-Hop for VPLS
      3.2.15. SDP Statistics for VPLS and VLL Services
      3.2.16. BGP Auto-Discovery for LDP VPLS
        3.2.16.1. BGP AD Overview
        3.2.16.2. Information Model
        3.2.16.3. FEC Element for T-LDP Signaling
        3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
        3.2.16.5. SDP Usage
        3.2.16.6. Automatic Creation of SDPs
        3.2.16.7. Manually Provisioned SDP
        3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
        3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        3.2.16.10. Resiliency Schemes
      3.2.17. BGP VPLS
        3.2.17.1. Pseudowire Signaling Details
        3.2.17.2. Supported VPLS Features
      3.2.18. VCCV BFD Support for VPLS Services
      3.2.19. BGP Multi-Homing for VPLS
        3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
        3.2.19.2. Supported Services and Multi-Homing Objects
        3.2.19.3. Blackhole Avoidance
          3.2.19.3.1. MAC Flush to the Core PEs
          3.2.19.3.2. Indicating non-DF status toward the access PE or CE
        3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
      3.2.20. Multicast-Aware VPLS
        3.2.20.1. IGMP Snooping for VPLS
        3.2.20.2. MLD Snooping for VPLS
        3.2.20.3. PIM Snooping for VPLS
          3.2.20.3.1. Plain PIM Snooping
          3.2.20.3.2. PIM Proxy
        3.2.20.4. IPv6 Multicast Forwarding
          3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
          3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
        3.2.20.5. PIM and IGMP/MLD Snooping Interaction
        3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
          3.2.20.6.1. IGMP Snooping Synchronization
          3.2.20.6.2. MLD Snooping Synchronization
          3.2.20.6.3. PIM Snooping for IPv4 Synchronization
        3.2.20.7. VPLS Multicast-Aware High Availability Features
      3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      3.2.22. MPLS Entropy Label and Hash Label
    3.3. Routed VPLS and I-VPLS
      3.3.1. IES or VPRN IP Interface Binding
        3.3.1.1. Assigning a Service Name to a VPLS Service
        3.3.1.2. Service Binding Requirements
        3.3.1.3. Bound Service Name Assignment
        3.3.1.4. Binding a Service Name to an IP Interface
        3.3.1.5. Bound Service Deletion or Service Name Removal
        3.3.1.6. IP Interface Attached VPLS Service Constraints
        3.3.1.7. IP Interface and VPLS Operational State Coordination
      3.3.2. IP Interface MTU and Fragmentation
        3.3.2.1. Unicast IP Routing into a VPLS Service
      3.3.3. ARP and VPLS FDB Interactions
        3.3.3.1. R-VPLS Specific ARP Cache Behavior
      3.3.4. The allow-ip-int-bind VPLS Flag
        3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
        3.3.4.2. LAG Port Membership Constraints
        3.3.4.3. R-VPLS Feature Restrictions
        3.3.4.4. Routed I-VPLS Feature Restrictions
      3.3.5. IPv4 and IPv6 Multicast Routing Support
      3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
      3.3.7. R-VPLS Caveats
        3.3.7.1. VPLS SAP Ingress IP Filter Override
        3.3.7.2. IP Interface Defined Egress QoS Reclassification
        3.3.7.3. Remarking for VPLS and Routed Packets
        3.3.7.4. 7450 Mixed Mode Chassis
        3.3.7.5. IPv4 Multicast Routing
        3.3.7.6. R-VPLS Supported Routing-related Protocols
        3.3.7.7. Spanning Tree and Split Horizon
    3.4. VPLS Service Considerations
      3.4.1. SAP Encapsulations
      3.4.2. VLAN Processing
      3.4.3. Ingress VLAN Swapping
      3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
        3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
        3.4.4.3. MVRP Activation of Service Connectivity
        3.4.4.4. MVRP Control Plane
        3.4.4.5. STP-MVRP Interaction
          3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
          3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
      3.4.5. VPLS E-Tree Services
        3.4.5.1. VPLS E-Tree Services Overview
        3.4.5.2. Leaf-ac and Root-ac SAPs
        3.4.5.3. Leaf-ac and Root-ac SDP Binds
        3.4.5.4. Root-leaf-tag SAPs
        3.4.5.5. Root-leaf-tag SDP Binds
        3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
    3.5. Configuring a VPLS Service with CLI
      3.5.1. Basic Configuration
      3.5.2. Common Configuration Tasks
      3.5.3. Configuring VPLS Components
        3.5.3.1. Creating a VPLS Service
        3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
          3.5.3.2.1. Enabling MAC Move
          3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
        3.5.3.3. Configuring GSMP Parameters
        3.5.3.4. Configuring a VPLS SAP
          3.5.3.4.1. Local VPLS SAPs
          3.5.3.4.2. Distributed VPLS SAPs
          3.5.3.4.3. Configuring SAP-Specific STP Parameters
          3.5.3.4.4. STP SAP Operational States
          3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
          3.5.3.4.6. Configuring MAC Learning Protection
        3.5.3.5. Configuring SAP Subscriber Management Parameters
        3.5.3.6. MSTP Control over Ethernet Tunnels
        3.5.3.7. Configuring SDP Bindings
        3.5.3.8. Configuring Overrides on Service SAPs
          3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
          3.5.3.8.2. Spoke-SDP STP Operational States
          3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
      3.5.4. Configuring VPLS Redundancy
        3.5.4.1. Creating a Management VPLS for SAP Protection
        3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
        3.5.4.3. Configuring Load Balancing with Management VPLS
        3.5.4.4. Configuring Selective MAC Flush
        3.5.4.5. Configuring Multi-Chassis Endpoints
      3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
      3.5.6. Configuring BGP Auto-Discovery
        3.5.6.1. Configuration Steps
        3.5.6.2. LDP Signaling
        3.5.6.3. Pseudowire Template
      3.5.7. Configuring BGP VPLS
        3.5.7.1. Configuring a VPLS Management Interface
      3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      3.5.9. Configuring VPLS E-Tree Services
    3.6. Service Management Tasks
      3.6.1. Modifying VPLS Service Parameters
      3.6.2. Modifying Management VPLS Parameters
      3.6.3. Deleting a Management VPLS
      3.6.4. Disabling a Management VPLS
      3.6.5. Deleting a VPLS Service
      3.6.6. Disabling a VPLS Service
      3.6.7. Re-enabling a VPLS Service
    3.7. VPLS Service Configuration Command Reference
      3.7.1. Command Hierarchies
        3.7.1.1. Global Commands
        3.7.1.2. General Switch Management Protocol (GSMP) Commands
        3.7.1.3. BGP Auto-Discovery Commands
        3.7.1.4. Oper Group Commands
        3.7.1.5. SAP Commands
        3.7.1.6. Template Commands
        3.7.1.7. Mesh SDP Commands
        3.7.1.8. Spoke SDP Commands
        3.7.1.9. Provider Tunnel Commands
        3.7.1.10. Routed VPLS Commands
        3.7.1.11. Multi-Chassis Redundancy Commands
      3.7.2. Command Descriptions
        3.7.2.1. Generic Commands
        3.7.2.2. VPLS Service Commands
        3.7.2.3. General Switch Management Protocol Commands
          3.7.2.3.1. VPLS DHCP Commands
          3.7.2.3.2. VPLS STP Commands
          3.7.2.3.3. VPLS SAP Commands
          3.7.2.3.4. VPLS SAP ATM Commands
        3.7.2.4. ETH-CFM Service Commands
          3.7.2.4.1. VPLS Filter and QoS Policy Commands
          3.7.2.4.2. VPLS Template Commands
          3.7.2.4.3. Provider Tunnel Commands
          3.7.2.4.4. VPLS SDP Commands
          3.7.2.4.5. SAP Subscriber Management Commands
        3.7.2.5. VPLS Multicast Commands
          3.7.2.5.1. VPLS DHCP and Anti-Spoofing Commands
        3.7.2.6. BGP Auto-Discovery Commands
        3.7.2.7. Redundancy Commands
    3.8. VPLS Show, Clear, Debug, and Tools Command Reference
      3.8.1. Command Hierarchies
        3.8.1.1. Show Commands
          3.8.1.1.1. IGMP Show Commands
          3.8.1.1.2. IGMP Snooping Show Commands
          3.8.1.1.3. MLD Snooping Commands
          3.8.1.1.4. Show Multi-Chassis Endpoint Commands
        3.8.1.2. Clear Commands
        3.8.1.3. Debug Commands
        3.8.1.4. Tools Commands
      3.8.2. Command Descriptions
        3.8.2.1. VPLS Show Commands
        3.8.2.2. IGMP Snooping Show Commands
        3.8.2.3. MLD Snooping Show Commands
        3.8.2.4. IGMP Commands
          3.8.2.4.1. Show Multi-Chassis Endpoint Commands
        3.8.2.5. VPLS Clear Commands
        3.8.2.6. VPLS Debug Commands
        3.8.2.7. Tools Commands
  4. IEEE 802.1ah Provider Backbone Bridging
    4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    4.2. PBB Features
      4.2.1. Integrated PBB-VPLS Solution
      4.2.2. PBB Technology
      4.2.3. PBB Mapping to Existing VPLS Configurations
      4.2.4. SAP and SDP Support
        4.2.4.1. PBB B-VPLS
        4.2.4.2. PBB I-VPLS
      4.2.5. PBB Packet Walkthrough
        4.2.5.1. PBB Control Planes
      4.2.6. Shortest Path Bridging MAC Mode (SPBM)
        4.2.6.1. Flooding and Learning Versus Link State
        4.2.6.2. SPB for B-VPLS
        4.2.6.3. Control B-VPLS and User B-VPLS
        4.2.6.4. Shortest Path and Single Tree
        4.2.6.5. Data Path and Forwarding
        4.2.6.6. SPB Ethernet OAM
        4.2.6.7. SPB Levels
      4.2.7. SPBM to Non-SPBM Interworking
        4.2.7.1. Static MACs and Static ISIDs
        4.2.7.2. Epipe Static Configuration
          4.2.7.2.1. I-VPLS Static Config
        4.2.7.3. SPBM ISID Policies
      4.2.8. ISID Policy Control
        4.2.8.1. Static ISID Advertisement
        4.2.8.2. I-VPLS for Unicast Service
      4.2.9. Default Behaviors
      4.2.10. Example Network Configuration
        4.2.10.1. Sample Configuration for Dut-A
          4.2.10.1.1. Show Commands Outputs
          4.2.10.1.2. Debug Commands
          4.2.10.1.3. Tools Commands
          4.2.10.1.4. Clear Commands
      4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
        4.2.12.1. I-VPLS Changes and Related MMRP Behavior
        4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        4.2.12.3. Optimization for Improved Convergence Time
        4.2.12.4. Controlling MRP Scope using MRP Policies
      4.2.13. PBB and BGP-AD
      4.2.14. PBB E-Line Service
        4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
      4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
        4.2.15.1. Solution Overview
        4.2.15.2. Detailed Solution Description
        4.2.15.3. Detailed PBB Emulated LAG Solution Description
        4.2.15.4. Support Service and Solution Combinations
      4.2.16. Periodic MAC Notification
      4.2.17. MAC Flush
        4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
          4.2.17.1.2. PBB Blackholing Issue
          4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
      4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
        4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
      4.2.19. BGP Multi-homing for I-VPLS
      4.2.20. Access Multi-Homing over MPLS for PBB Epipes
      4.2.21. PBB and IGMP/MLD Snooping
      4.2.22. PBB and PIM Snooping
      4.2.23. PBB QoS
        4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
          4.2.23.1.1. Configuration Examples
          4.2.23.1.2. Details Solution Description
      4.2.24. Egress B-SAP per ISID Shaping
        4.2.24.1. B-SAP Egress ISID Shaping Configuration
        4.2.24.2. Provisioning Model
        4.2.24.3. Egress Queue Scheduling
        4.2.24.4. B-SAP per-ISID Shaping Configuration Example
      4.2.25. PBB OAM
        4.2.25.1. Mirroring
        4.2.25.2. OAM Commands
        4.2.25.3. CFM Support
    4.3. Configuration Examples
      4.3.1. PBB using G.8031 Protected Ethernet Tunnels
      4.3.2. MC-LAG Multi-homing for Native PBB
      4.3.3. Access Multi-Homing over MPLS for PBB Epipes
    4.4. PBB Configuration Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Global Commands
        4.4.1.2. SAP Commands
        4.4.1.3. Mesh SDP Commands
        4.4.1.4. Spoke SDP Commands
        4.4.1.5. BGP-MH for I-VPLS Commands
      4.4.2. Command Descriptions
        4.4.2.1. VPLS Service Commands
    4.5. PBB Show, Clear, and Debug Command Reference
      4.5.1. Command Hierarchies
        4.5.1.1. Show Commands
        4.5.1.2. Clear Commands
        4.5.1.3. Debug Commands
      4.5.2. Command Descriptions
        4.5.2.1. PBB Show Commands
        4.5.2.2. PBB Clear Commands
        4.5.2.3. PBB Debug Commands
  5. Ethernet Virtual Private Networks (EVPNs)
    5.1. Overview and EVPN Applications
      5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
      5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
      5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
      5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
      5.1.5. EVPN for MPLS Tunnels in E-LAN Services
      5.1.6. EVPN for MPLS Tunnels in E-Line Services
      5.1.7. EVPN for MPLS Tunnels in E-Tree Services
      5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    5.2. EVPN for VXLAN Tunnels and Cloud Technologies
      5.2.1. VXLAN
        5.2.1.1. VXLAN ECMP and LAG
        5.2.1.2. VXLAN VPLS Tag Handling
        5.2.1.3. VXLAN MTU Considerations
        5.2.1.4. VXLAN QoS
          5.2.1.4.1. Ingress
          5.2.1.4.2. Egress
        5.2.1.5. VXLAN Ping
        5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
        5.2.1.7. IGMP and MLD Snooping on VXLAN
        5.2.1.8. PIM Snooping on VXLAN
        5.2.1.9. Static VXLAN Termination in Epipe Services
        5.2.1.10. Static VXLAN Termination in VPLS/R-VPLS Services
        5.2.1.11. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
      5.2.2. EVPN for Overlay Tunnels
        5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
        5.2.2.2. EVPN for VXLAN in VPLS Services
          5.2.2.2.1. Resiliency and BGP Multi-Homing
          5.2.2.2.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
          5.2.2.2.3. Use of the unknown-mac-route
        5.2.2.3. EVPN for VXLAN in R-VPLS Services
          5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
        5.2.2.4. EVPN-VPWS for VXLAN Tunnels
          5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
      5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
        5.2.3.1. XMPP Interface on the DC GW
        5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
        5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
          5.2.3.3.1. VSD-Domain Type L2-DOMAIN
          5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
          5.2.3.3.3. VSD-Domain Type VRF-GRE
          5.2.3.3.4. VSD-Domain Type VRF-VXLAN
        5.2.3.4. Fully-Dynamic VSD Integration Model
          5.2.3.4.1. Python Script Implementation Details
          5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
      5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
        5.2.4.1. Replicator (AR-R) Procedures
        5.2.4.2. Leaf (AR-L) procedures
        5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
      5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
        5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
        5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    5.3. EVPN for MPLS Tunnels
      5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
      5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
        5.3.2.1. EVPN and VPLS Integration
        5.3.2.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
        5.3.2.3. EVPN Multi-Homing in VPLS Services
          5.3.2.3.1. EVPN All-Active Multi-Homing
          5.3.2.3.2. EVPN Single-Active Multi-Homing
      5.3.3. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
      5.3.4. EVPN-VPWS for MPLS Tunnels
        5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
        5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
        5.3.4.3. PW ports based Ethernet Segments for EVPN-VPWS
      5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
        5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
      5.3.6. PBB-EVPN
        5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
          5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
          5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
          5.3.6.1.3. EVPN Route Type 4 - Ethernet Segment Route
        5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
          5.3.6.2.1. Flood Containment for I-VPLS Services
          5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
          5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
          5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
          5.3.6.2.5. PBB-EVPN ISID-Based CMAC-Flush
          5.3.6.2.6. PBB-EVPN ISID-based Route Targets
      5.3.7. Virtual Ethernet Segments
      5.3.8. Preference-Based and Non-Revertive DF Election
      5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
      5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
        5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
      5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
        5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
      5.3.12. EVPN E-Tree
        5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
        5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
        5.3.12.3. EVPN E-Tree Operation
          5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
          5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
          5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
        5.3.12.4. EVPN E-Tree and EVPN Multi-homing
        5.3.12.5. PBB-EVPN E-Tree Services
      5.3.13. MPLS Entropy Label and Hash Label
      5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
        5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
        5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
    5.4. General EVPN Topics
      5.4.1. ARP/ND Snooping and Proxy Support
        5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
        5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
        5.4.1.3. Procedure to Add the R Flag to a Specified Entry
        5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
      5.4.2. BGP-EVPN MAC-Mobility
      5.4.3. BGP-EVPN MAC-Duplication
      5.4.4. Conditional Static MAC and Protection
      5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
      5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
      5.4.7. Blackhole MAC for EVPN Loop Detection
      5.4.8. CFM Interaction with EVPN Services
      5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
        5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
        5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
        5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
        5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
          5.4.9.4.1. BGP-EVPN Routes on Dual BGP-instance Services with I-ES
          5.4.9.4.2. Single-Active Multi-Homing on I-ES
          5.4.9.4.3. All-Active Multi-Homing on I-ES
      5.4.10. Configuring multi-instance EVPN-VXLAN in the Same VPLS Service
        5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
        5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
      5.4.11. Configuring static VXLAN and EVPN in the Same VPLS Service
      5.4.12. EVPN IP-Prefix Route Interoperability
        5.4.12.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
        5.4.12.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
        5.4.12.3. Interface-less IP-VRF-to-IP-VRF Model
      5.4.13. ARP-ND Host Routes for Extended Layer-2 Data Centers
      5.4.14. BGP and EVPN Route Selection for EVPN Routes
      5.4.15. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      5.4.16. Interaction of EVPN and Other Features
        5.4.16.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
        5.4.16.2. Interaction of PBB-EVPN with Existing VPLS Features
        5.4.16.3. Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
      5.4.17. Routing Policies for BGP EVPN Routes
        5.4.17.1. Routing Policies for BGP EVPN IP Prefixes
    5.5. Configuring an EVPN Service with CLI
      5.5.1. EVPN-VXLAN Configuration Examples
        5.5.1.1. Layer 2 PE Example
        5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
        5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      5.5.2. EVPN-MPLS Configuration Examples
        5.5.2.1. EVPN All-active Multi-homing Example
        5.5.2.2. EVPN Single-active Multi-homing Example
      5.5.3. PBB-EVPN Configuration Examples
        5.5.3.1. PBB-EVPN All-active Multi-homing Example
        5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
    5.6. EVPN Command Reference
      5.6.1. Command Hierarchies
        5.6.1.1. EVPN Configuration Commands
        5.6.1.2. Show Commands
        5.6.1.3. Clear Commands
        5.6.1.4. Debug Commands
        5.6.1.5. Tools Commands
      5.6.2. Command Descriptions
        5.6.2.1. EVPN Configuration Commands
        5.6.2.2. Show Configuration Commands
        5.6.2.3. Clear Commands
        5.6.2.4. Debug Commands
        5.6.2.5. Tools Commands
  6. Pseudowire Ports
    6.1. Overview
    6.2. PW Port Bound to a Physical Port
    6.3. FPE-Based PW Port
      6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
      6.3.2. PXC-Based PW-Port — Building the Cross-Connect
        6.3.2.1. Building the Internal Transport Tunnel
        6.3.2.2. Mapping the External PW to the PW-Port
        6.3.2.3. Terminating the Service on PW-SAP
      6.3.3. FPE-Based PW-port Operational State
      6.3.4. QoS
        6.3.4.1. Preservation of Forwarding Class Across PXC
      6.3.5. Statistics on the FPE based PW-Port
      6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
    6.4. L2oGRE Termination on FPE-Based PW Port
      6.4.1. L2oGRE Packet Format
      6.4.2. GRE Delivery Protocol
      6.4.3. Tracking Payloads and Service Termination Points
        6.4.3.1. Plain L3 termination
        6.4.3.2. Layer 2 Termination
        6.4.3.3. ESM Termination
      6.4.4. Configuration Steps
      6.4.5. Fragmentation and MTU Configuration
      6.4.6. Reassembly
    6.5. Pseudowire Ports Command Reference
      6.5.1. Command Hierarchies
        6.5.1.1. PW-port Configuration Commands
        6.5.1.2. Redundant Interface Commands
        6.5.1.3. Show Commands
      6.5.2. Command Descriptions
        6.5.2.1. PW-port Configuration Commands
        6.5.2.2. SDP Binding Commands
        6.5.2.3. Show Commands
  7. VSR Pseudowire Ports
    7.1. Flex PW Ports
      7.1.1. PW Port List
      7.1.2. Failover Times
      7.1.3. QoS
      7.1.4. PW Port Termination for Various Tunnel Types
        7.1.4.1. MPLS-Based Spoke SDP
          7.1.4.1.1. Provisioning
          7.1.4.1.2. Flex PW-Port Operational State for MPLS Based Spoke SDP
          7.1.4.1.3. Statistics
        7.1.4.2. L2oGRE-Based Spoke SDP
          7.1.4.2.1. Provisioning
          7.1.4.2.2. Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
          7.1.4.2.3. Reassembly
    7.2. VSR Pseudowire Ports Command Reference
      7.2.1. Command Hierarchies
        7.2.1.1. PW Port Configuration Commands
        7.2.1.2. Show Commands
        7.2.1.3. Clear Commands
      7.2.2. Command Descriptions
        7.2.2.1. PW Port Configuration Commands
        7.2.2.2. Show Commands
        7.2.2.3. Clear Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
Layer 3 Services Guide 16.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 3 Services Configuration Process
  2. Internet Enhanced Service
    2.1. IES Service Overview
    2.2. IES Features
      2.2.1. IP Interfaces
        2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
          2.2.1.1.1. QPPB Applications
          2.2.1.1.2. Inter-AS Coordination of QoS Policies
          2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
        2.2.1.2. QPPB
          2.2.1.2.1. Associating an FC and Priority with a Route
          2.2.1.2.2. Displaying QoS Information Associated with Routes
          2.2.1.2.3. Enabling QPPB on an IP Interface
          2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.2.1.2.5. QPPB and Multiple Paths to a Destination
          2.2.1.2.6. QPPB and Policy-Based Routing
        2.2.1.3. QPPB and GRT Lookup
          2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
        2.2.1.4. Object Grouping and State Monitoring
          2.2.1.4.1. IES IP Interface Applicability
      2.2.2. Subscriber Interfaces
        2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
        2.2.2.2. RADIUS Accounting
      2.2.3. SAPs
        2.2.3.1. Encapsulations
        2.2.3.2. ATM SAP Encapsulations for IES
        2.2.3.3. Pseudowire SAPs
        2.2.3.4. Encapsulation
        2.2.3.5. Pseudowire SAP Configuration
        2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
        2.2.3.7. Shaping and Bandwidth Control
        2.2.3.8. Lag Considerations
        2.2.3.9. Last Mile Packet Size Adjustment
        2.2.3.10. Redundancy with Pseudowire SAPs
        2.2.3.11. Operational Group Support for PW Ports
      2.2.4. Routing Protocols
        2.2.4.1. CPE Connectivity Check
      2.2.5. QoS Policies
      2.2.6. Filter Policies
      2.2.7. MPLS Entropy Label and Hash Label
      2.2.8. Spoke SDPs
      2.2.9. SRRP
        2.2.9.1. SRRP Messaging
        2.2.9.2. SRRP and Multi-Chassis Synchronization
        2.2.9.3. SRRP Instance
          2.2.9.3.1. SRRP Instance MCS Key
          2.2.9.3.2. Containing Service Type and ID
          2.2.9.3.3. Containing Subscriber IP Interface Name
          2.2.9.3.4. Subscriber Subnet Information
          2.2.9.3.5. Containing Group IP Interface Information
          2.2.9.3.6. Remote Redundant IP Interface Mismatch
          2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
          2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
          2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          2.2.9.3.10. Local and Remote Dual Master Detected
        2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
        2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
        2.2.9.7. BFD with SRRP/VRRP
    2.3. Configuring an IES Service with CLI
      2.3.1. Basic Configuration
      2.3.2. Common Configuration Tasks
      2.3.3. Configuring IES Components
        2.3.3.1. Configuring an IES Service
        2.3.3.2. Configuring IES Subscriber Interface Parameters
        2.3.3.3. Configuring IES Interface Parameters
        2.3.3.4. Configuring Spoke-SDP Parameters
        2.3.3.5. Configuring SAP Parameters
        2.3.3.6. Configuring IES SAP ATM Parameters
        2.3.3.7. Configuring VRRP
        2.3.3.8. Configuring IPSec Parameters
        2.3.3.9. IGMP Host Tracking
    2.4. Service Management Tasks
      2.4.1. Modifying IES Service Parameters
      2.4.2. Deleting a Spoke-SDP
      2.4.3. Deleting an IES Service
      2.4.4. Disabling an IES Service
      2.4.5. Re-Enabling an IES Service
    2.5. IES Services Command Reference
      2.5.1. Command Hierarchies
        2.5.1.1. Global Commands
        2.5.1.2. IES Service Interface Commands
        2.5.1.3. Routed VPLS Commands
        2.5.1.4. Redundant Interface Commands
        2.5.1.5. Interface SAP Commands
        2.5.1.6. Interface SAP Tunnel Commands
        2.5.1.7. VRRP Commands
        2.5.1.8. Spoke SDP Commands
        2.5.1.9. Subscriber Interface Commands
          2.5.1.9.1. Group Interface SAP Commands
        2.5.1.10. AARP Interface Commands
      2.5.2. Command Descriptions
        2.5.2.1. Generic Commands
        2.5.2.2. IES Global Commands
        2.5.2.3. IES Interface Commands
        2.5.2.4. Redundant Interface Commands
        2.5.2.5. IES Subscriber Interface Commands
        2.5.2.6. IES Interface DHCP Commands
        2.5.2.7. PPPoE Commands
        2.5.2.8. IES Interface ICMP Commands
        2.5.2.9. IES Interface IPv6 Commands
        2.5.2.10. IES Spoke SDP Commands
        2.5.2.11. IES SAP Commands
        2.5.2.12. SAP Subscriber Management Commands
        2.5.2.13. ETH-CFM Service Commands
        2.5.2.14. IES Filter and QoS Policy Commands
        2.5.2.15. ATM Commands
        2.5.2.16. IES Interface VRRP Commands
        2.5.2.17. IPSec Gateway Commands
        2.5.2.18. AARP Interface Commands
    2.6. IES Show, Clear, and Debug Command Reference
      2.6.1. Command Hierarchies
        2.6.1.1. Show Commands
        2.6.1.2. Clear Commands
        2.6.1.3. Debug Commands
        2.6.1.4. Monitor Commands
      2.6.2. Command Descriptions
        2.6.2.1. IES Show Commands
        2.6.2.2. IES Clear Commands
        2.6.2.3. IES Debug Commands
        2.6.2.4. IES Monitor Commands
  3. Virtual Private Routed Network Service
    3.1. VPRN Service Overview
      3.1.1. Routing Prerequisites
      3.1.2. Core MP-BGP Support
      3.1.3. Route Distinguishers
        3.1.3.1. eiBGP Load Balancing
      3.1.4. Route Reflector
      3.1.5. CE to PE Route Exchange
        3.1.5.1. Route Redistribution
        3.1.5.2. CPE Connectivity Check
      3.1.6. Constrained Route Distribution (RT Constraint)
        3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
        3.1.6.2. Configuring the Route Target Address Family
        3.1.6.3. Originating RT Constraint Routes
        3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
        3.1.6.5. Using RT Constraint Routes
      3.1.7. BGP Fast Reroute in a VPRN
        3.1.7.1. BGP Fast Reroute in a VPRN Configuration
      3.1.8. BGP Best-External in a VPRN Context
    3.2. VPRN Features
      3.2.1. IP Interfaces
        3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
        3.2.1.2. QPPB Applications
        3.2.1.3. Inter-AS Coordination of QoS Policies
        3.2.1.4. Traffic Differentiation Based on Route Characteristics
        3.2.1.5. QPPB
        3.2.1.6. Associating an FC and Priority with a Route
        3.2.1.7. Displaying QoS Information Associated with Routes
        3.2.1.8. Enabling QPPB on an IP interface
        3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
        3.2.1.10. QPPB and Multiple Paths to a Destination
        3.2.1.11. QPPB and Policy-Based Routing
        3.2.1.12. QPPB and GRT Lookup
        3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
        3.2.1.14. Object Grouping and State Monitoring
        3.2.1.15. VPRN IP Interface Applicability
      3.2.2. Subscriber Interfaces
      3.2.3. SAPs
        3.2.3.1. Encapsulations
        3.2.3.2. ATM SAP Encapsulations for VPRN Services
        3.2.3.3. Pseudowire SAPs
      3.2.4. QoS Policies
      3.2.5. Filter Policies
      3.2.6. DSCP Marking
        3.2.6.1. Default DSCP Mapping Table
      3.2.7. Configuration of TTL Propagation for VPRN Routes
      3.2.8. CE to PE Routing Protocols
        3.2.8.1. PE to PE Tunneling Mechanisms
        3.2.8.2. Per VRF Route Limiting
      3.2.9. Spoke SDPs
        3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        3.2.9.2. Spoke SDP Redundancy into IES/VPRN
      3.2.10. IP-VPNs
        3.2.10.1. Using OSPF in IP-VPNs
      3.2.11. IPCP Subnet Negotiation
      3.2.12. Cflowd for IP-VPNs
      3.2.13. Inter-AS VPRNs
      3.2.14. VPRN Label Security at Inter-AS Boundary
        3.2.14.1. Feature Configuration
        3.2.14.2. CPM Behavior
        3.2.14.3. Data Path Forwarding Behavior
      3.2.15. Carrier Supporting Carrier (CSC)
        3.2.15.1. Terminology
        3.2.15.2. CSC Connectivity Models
        3.2.15.3. CSC-PE Configuration and Operation
        3.2.15.4. CSC Interface
        3.2.15.5. QoS
        3.2.15.6. MPLS
        3.2.15.7. CSC VPRN Service Configuration
      3.2.16. Node Management Using VPRN
        3.2.16.1. VPRN Management
        3.2.16.2. AAA Management
      3.2.17. Traffic Leaking to GRT
      3.2.18. Traffic Leaking from VPRN to GRT for IPv6
      3.2.19. RIP Metric Propagation in VPRNs
      3.2.20. NTP Within a VPRN Service
      3.2.21. PTP Within a VPRN Service
      3.2.22. VPN Route Label Allocation
        3.2.22.1. Configuring the Service Label Mode
        3.2.22.2. Restrictions and Usage Notes
      3.2.23. VPRN Support for BGP Flowspec
      3.2.24. MPLS Entropy Label and Hash Label
      3.2.25. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      3.2.26. Route Leaking from the Global Route Table to VPRN Instances
    3.3. QoS on Ingress Bindings
    3.4. Multicast in IP-VPN Applications
      3.4.1. Use of Data MDTs
      3.4.2. Multicast Protocols Supported in the Provider Network
      3.4.3. MVPN Membership Auto-discovery using BGP
      3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
      3.4.5. VRF Route Import Extended Community
      3.4.6. Provider Tunnel Support
        3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
        3.4.6.3. P2MP LDP I-PMSI and S-PMSI
        3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
        3.4.6.5. P2MP LSP S-PMSI
        3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
        3.4.6.7. MVPN Sender-only/Receiver-only
        3.4.6.8. S-PMSI Trigger Thresholds
        3.4.6.9. Migration from Existing Rosen Implementation
        3.4.6.10. Policy-based S-PMSI
          3.4.6.10.1. Supported MPLS Tunnels
          3.4.6.10.2. Supported Multicast Features
          3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
          3.4.6.10.4. Configuration Example
        3.4.6.11. Policy-based Data MDT
      3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      3.4.8. Multicast VPN Extranet
        3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
        3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
        3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
        3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
      3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      3.4.11. IPv6 MVPN Support
      3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      3.4.13. NG-MVPN Core Diversity
        3.4.13.1. NG-MVPN to Loopback Interface
        3.4.13.2. NG-MVPN Core Diversity
        3.4.13.3. Configuration Example
      3.4.14. NG-MVPN Multicast Source Geo-Redundancy
      3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
      3.4.16. Inter-AS MVPN
        3.4.16.1. BGP Connector Attribute
        3.4.16.2. PIM RPF Vector
        3.4.16.3. Inter-AS MVPN Option B
        3.4.16.4. Inter-AS MVPN Option C
        3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
          3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
          3.4.16.5.2. Configuration Example
          3.4.16.5.3. Inter-AS Non-segmented MLDP
          3.4.16.5.4. ECMP
      3.4.17. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
    3.5. FIB Prioritization
    3.6. Configuring a VPRN Service with CLI
      3.6.1. Basic Configuration
      3.6.2. Common Configuration Tasks
      3.6.3. Configuring VPRN Components
        3.6.3.1. Creating a VPRN Service
        3.6.3.2. Configuring Global VPRN Parameters
        3.6.3.3. Configuring VPRN Log Parameters
          3.6.3.3.1. Configuring a Spoke-SDP
        3.6.3.4. Configuring VPRN Protocols - PIM
          3.6.3.4.1. Configuring Router Interfaces
          3.6.3.4.2. Configuring VPRN Protocols - BGP
          3.6.3.4.3. Configuring VPRN Protocols - RIP
          3.6.3.4.4. Configuring VPRN Protocols - OSPF
          3.6.3.4.5. Configuring a VPRN Interface
          3.6.3.4.6. Configuring Overload State on a Single SFM
          3.6.3.4.7. Configuring a VPRN Interface SAP
      3.6.4. Configuring IPSec Parameters
    3.7. Service Management Tasks
      3.7.1. Modifying VPRN Service Parameters
      3.7.2. Deleting a VPRN Service
      3.7.3. Disabling a VPRN Service
      3.7.4. Re-enabling a VPRN Service
    3.8. VPRN Service Configuration Commands
      3.8.1. Command Hierarchies
        3.8.1.1. VPRN Service Configuration Commands
        3.8.1.2. L2TP Commands
        3.8.1.3. DHCP Commands
        3.8.1.4. GSMP Commands
        3.8.1.5. IGMP Commands
        3.8.1.6. IPsec Configuration Commands
        3.8.1.7. Log Commands
        3.8.1.8. Remote Server Commands
        3.8.1.9. VPRN Management Commands
        3.8.1.10. Multicast VPN Commands
        3.8.1.11. Redundant Interface Commands
        3.8.1.12. Router Advertisement Commands
        3.8.1.13. NTP Commands
        3.8.1.14. NAT Commands
        3.8.1.15. Subscriber Interface Commands
          3.8.1.15.1. Group Interface SAP ETH-CFM Commands
        3.8.1.16. Interface Commands
        3.8.1.17. Network Interface Commands
        3.8.1.18. Interface Spoke SDP Commands
        3.8.1.19. Interface VRRP Commands
        3.8.1.20. Interface SAP Commands
        3.8.1.21. Interface SAP Tunnel Commands
        3.8.1.22. Routed VPLS Commands
        3.8.1.23. Oper Group Commands
        3.8.1.24. Network Ingress Commands
        3.8.1.25. BGP Configuration Commands
        3.8.1.26. BGP Group Configuration Commands
        3.8.1.27. BGP Group Neighbor Configuration Commands
        3.8.1.28. IS-IS Configuration Commands
        3.8.1.29. OSPF Configuration Commands
        3.8.1.30. PIM Configuration Commands
        3.8.1.31. MSDP Configuration Commands
        3.8.1.32. MLD Configuration Commands
        3.8.1.33. RIP Configuration Commands
        3.8.1.34. RADIUS Commands
        3.8.1.35. Web Portal Protocol Configuration Commands
        3.8.1.36. AARP Interface Commands
      3.8.2. Command Descriptions
        3.8.2.1. Generic Commands
        3.8.2.2. Global Commands
        3.8.2.3. Router L2TP Commands
          3.8.2.3.1. Router L2TP Tunnel Commands
        3.8.2.4. Router DHCP Configuration Commands
        3.8.2.5. IGMP Commands
        3.8.2.6. IPSec Configuration Commands
        3.8.2.7. Log Commands
        3.8.2.8. Remote Server Commands
        3.8.2.9. VPRN Management Commands
        3.8.2.10. Multicast VPN Commands
        3.8.2.11. Redundant Interface Commands
        3.8.2.12. Router Advertisement Commands
        3.8.2.13. Network Time Protocol Commands
        3.8.2.14. NAT Commands
        3.8.2.15. Subscriber Interface Commands
        3.8.2.16. Interface Commands
        3.8.2.17. Network Interface Commands
        3.8.2.18. Interface DHCP Commands
        3.8.2.19. Interface ICMP Commands
        3.8.2.20. Interface SAP ATM Commands
        3.8.2.21. Interface Anti-Spoofing Commands
        3.8.2.22. Interface SAP Filter and QoS Policy Commands
        3.8.2.23. Interface VRRP Commands
        3.8.2.24. Interface SAP Commands
        3.8.2.25. Routed VPLS Commands
        3.8.2.26. Network Ingress Commands
        3.8.2.27. SAP Subscriber Management Commands
        3.8.2.28. BGP Commands
        3.8.2.29. ETH-CFM Service Commands
        3.8.2.30. IS-IS Commands
        3.8.2.31. OSPF Commands
        3.8.2.32. PIM Commands
        3.8.2.33. PPPoE Commands
        3.8.2.34. MSDP Configuration Commands
        3.8.2.35. MLD Configuration Commands
        3.8.2.36. RIP Commands
        3.8.2.37. SDP Commands
        3.8.2.38. RADIUS Proxy Commands
        3.8.2.39. AARP Interface Commands
    3.9. VPRN Show, Clear, and Debug Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Show Commands
        3.9.1.2. Clear Commands
        3.9.1.3. Debug Commands
      3.9.2. Command Descriptions
        3.9.2.1. VPRN Show Commands
        3.9.2.2. VPRN Clear Commands
        3.9.2.3. VPRN Debug Commands
    3.10. Tools Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Tools Commands
      3.10.2. Command Descriptions
        3.10.2.1. Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 3 Services Configuration Process
  2. Internet Enhanced Service
    2.1. IES Service Overview
    2.2. IES Features
      2.2.1. IP Interfaces
        2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
          2.2.1.1.1. QPPB Applications
          2.2.1.1.2. Inter-AS Coordination of QoS Policies
          2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
        2.2.1.2. QPPB
          2.2.1.2.1. Associating an FC and Priority with a Route
          2.2.1.2.2. Displaying QoS Information Associated with Routes
          2.2.1.2.3. Enabling QPPB on an IP Interface
          2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.2.1.2.5. QPPB and Multiple Paths to a Destination
          2.2.1.2.6. QPPB and Policy-Based Routing
        2.2.1.3. QPPB and GRT Lookup
          2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
        2.2.1.4. Object Grouping and State Monitoring
          2.2.1.4.1. IES IP Interface Applicability
      2.2.2. Subscriber Interfaces
        2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
        2.2.2.2. RADIUS Accounting
      2.2.3. SAPs
        2.2.3.1. Encapsulations
        2.2.3.2. ATM SAP Encapsulations for IES
        2.2.3.3. Pseudowire SAPs
        2.2.3.4. Encapsulation
        2.2.3.5. Pseudowire SAP Configuration
        2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
        2.2.3.7. Shaping and Bandwidth Control
        2.2.3.8. Lag Considerations
        2.2.3.9. Last Mile Packet Size Adjustment
        2.2.3.10. Redundancy with Pseudowire SAPs
        2.2.3.11. Operational Group Support for PW Ports
      2.2.4. Routing Protocols
        2.2.4.1. CPE Connectivity Check
      2.2.5. QoS Policies
      2.2.6. Filter Policies
      2.2.7. MPLS Entropy Label and Hash Label
      2.2.8. Spoke SDPs
      2.2.9. SRRP
        2.2.9.1. SRRP Messaging
        2.2.9.2. SRRP and Multi-Chassis Synchronization
        2.2.9.3. SRRP Instance
          2.2.9.3.1. SRRP Instance MCS Key
          2.2.9.3.2. Containing Service Type and ID
          2.2.9.3.3. Containing Subscriber IP Interface Name
          2.2.9.3.4. Subscriber Subnet Information
          2.2.9.3.5. Containing Group IP Interface Information
          2.2.9.3.6. Remote Redundant IP Interface Mismatch
          2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
          2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
          2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          2.2.9.3.10. Local and Remote Dual Master Detected
        2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
        2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
        2.2.9.7. BFD with SRRP/VRRP
    2.3. Configuring an IES Service with CLI
      2.3.1. Basic Configuration
      2.3.2. Common Configuration Tasks
      2.3.3. Configuring IES Components
        2.3.3.1. Configuring an IES Service
        2.3.3.2. Configuring IES Subscriber Interface Parameters
        2.3.3.3. Configuring IES Interface Parameters
        2.3.3.4. Configuring Spoke-SDP Parameters
        2.3.3.5. Configuring SAP Parameters
        2.3.3.6. Configuring IES SAP ATM Parameters
        2.3.3.7. Configuring VRRP
        2.3.3.8. Configuring IPSec Parameters
        2.3.3.9. IGMP Host Tracking
    2.4. Service Management Tasks
      2.4.1. Modifying IES Service Parameters
      2.4.2. Deleting a Spoke-SDP
      2.4.3. Deleting an IES Service
      2.4.4. Disabling an IES Service
      2.4.5. Re-Enabling an IES Service
    2.5. IES Services Command Reference
      2.5.1. Command Hierarchies
        2.5.1.1. Global Commands
        2.5.1.2. IES Service Interface Commands
        2.5.1.3. Routed VPLS Commands
        2.5.1.4. Redundant Interface Commands
        2.5.1.5. Interface SAP Commands
        2.5.1.6. Interface SAP Tunnel Commands
        2.5.1.7. VRRP Commands
        2.5.1.8. Spoke SDP Commands
        2.5.1.9. Subscriber Interface Commands
          2.5.1.9.1. Group Interface SAP Commands
        2.5.1.10. AARP Interface Commands
      2.5.2. Command Descriptions
        2.5.2.1. Generic Commands
        2.5.2.2. IES Global Commands
        2.5.2.3. IES Interface Commands
        2.5.2.4. Redundant Interface Commands
        2.5.2.5. IES Subscriber Interface Commands
        2.5.2.6. IES Interface DHCP Commands
        2.5.2.7. PPPoE Commands
        2.5.2.8. IES Interface ICMP Commands
        2.5.2.9. IES Interface IPv6 Commands
        2.5.2.10. IES Spoke SDP Commands
        2.5.2.11. IES SAP Commands
        2.5.2.12. SAP Subscriber Management Commands
        2.5.2.13. ETH-CFM Service Commands
        2.5.2.14. IES Filter and QoS Policy Commands
        2.5.2.15. ATM Commands
        2.5.2.16. IES Interface VRRP Commands
        2.5.2.17. IPSec Gateway Commands
        2.5.2.18. AARP Interface Commands
    2.6. IES Show, Clear, and Debug Command Reference
      2.6.1. Command Hierarchies
        2.6.1.1. Show Commands
        2.6.1.2. Clear Commands
        2.6.1.3. Debug Commands
        2.6.1.4. Monitor Commands
      2.6.2. Command Descriptions
        2.6.2.1. IES Show Commands
        2.6.2.2. IES Clear Commands
        2.6.2.3. IES Debug Commands
        2.6.2.4. IES Monitor Commands
  3. Virtual Private Routed Network Service
    3.1. VPRN Service Overview
      3.1.1. Routing Prerequisites
      3.1.2. Core MP-BGP Support
      3.1.3. Route Distinguishers
        3.1.3.1. eiBGP Load Balancing
      3.1.4. Route Reflector
      3.1.5. CE to PE Route Exchange
        3.1.5.1. Route Redistribution
        3.1.5.2. CPE Connectivity Check
      3.1.6. Constrained Route Distribution (RT Constraint)
        3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
        3.1.6.2. Configuring the Route Target Address Family
        3.1.6.3. Originating RT Constraint Routes
        3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
        3.1.6.5. Using RT Constraint Routes
      3.1.7. BGP Fast Reroute in a VPRN
        3.1.7.1. BGP Fast Reroute in a VPRN Configuration
      3.1.8. BGP Best-External in a VPRN Context
    3.2. VPRN Features
      3.2.1. IP Interfaces
        3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
        3.2.1.2. QPPB Applications
        3.2.1.3. Inter-AS Coordination of QoS Policies
        3.2.1.4. Traffic Differentiation Based on Route Characteristics
        3.2.1.5. QPPB
        3.2.1.6. Associating an FC and Priority with a Route
        3.2.1.7. Displaying QoS Information Associated with Routes
        3.2.1.8. Enabling QPPB on an IP interface
        3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
        3.2.1.10. QPPB and Multiple Paths to a Destination
        3.2.1.11. QPPB and Policy-Based Routing
        3.2.1.12. QPPB and GRT Lookup
        3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
        3.2.1.14. Object Grouping and State Monitoring
        3.2.1.15. VPRN IP Interface Applicability
      3.2.2. Subscriber Interfaces
      3.2.3. SAPs
        3.2.3.1. Encapsulations
        3.2.3.2. ATM SAP Encapsulations for VPRN Services
        3.2.3.3. Pseudowire SAPs
      3.2.4. QoS Policies
      3.2.5. Filter Policies
      3.2.6. DSCP Marking
        3.2.6.1. Default DSCP Mapping Table
      3.2.7. Configuration of TTL Propagation for VPRN Routes
      3.2.8. CE to PE Routing Protocols
        3.2.8.1. PE to PE Tunneling Mechanisms
        3.2.8.2. Per VRF Route Limiting
      3.2.9. Spoke SDPs
        3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        3.2.9.2. Spoke SDP Redundancy into IES/VPRN
      3.2.10. IP-VPNs
        3.2.10.1. Using OSPF in IP-VPNs
      3.2.11. IPCP Subnet Negotiation
      3.2.12. Cflowd for IP-VPNs
      3.2.13. Inter-AS VPRNs
      3.2.14. VPRN Label Security at Inter-AS Boundary
        3.2.14.1. Feature Configuration
        3.2.14.2. CPM Behavior
        3.2.14.3. Data Path Forwarding Behavior
      3.2.15. Carrier Supporting Carrier (CSC)
        3.2.15.1. Terminology
        3.2.15.2. CSC Connectivity Models
        3.2.15.3. CSC-PE Configuration and Operation
        3.2.15.4. CSC Interface
        3.2.15.5. QoS
        3.2.15.6. MPLS
        3.2.15.7. CSC VPRN Service Configuration
      3.2.16. Node Management Using VPRN
        3.2.16.1. VPRN Management
        3.2.16.2. AAA Management
      3.2.17. Traffic Leaking to GRT
      3.2.18. Traffic Leaking from VPRN to GRT for IPv6
      3.2.19. RIP Metric Propagation in VPRNs
      3.2.20. NTP Within a VPRN Service
      3.2.21. PTP Within a VPRN Service
      3.2.22. VPN Route Label Allocation
        3.2.22.1. Configuring the Service Label Mode
        3.2.22.2. Restrictions and Usage Notes
      3.2.23. VPRN Support for BGP Flowspec
      3.2.24. MPLS Entropy Label and Hash Label
      3.2.25. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      3.2.26. Route Leaking from the Global Route Table to VPRN Instances
    3.3. QoS on Ingress Bindings
    3.4. Multicast in IP-VPN Applications
      3.4.1. Use of Data MDTs
      3.4.2. Multicast Protocols Supported in the Provider Network
      3.4.3. MVPN Membership Auto-discovery using BGP
      3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
      3.4.5. VRF Route Import Extended Community
      3.4.6. Provider Tunnel Support
        3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
        3.4.6.3. P2MP LDP I-PMSI and S-PMSI
        3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
        3.4.6.5. P2MP LSP S-PMSI
        3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
        3.4.6.7. MVPN Sender-only/Receiver-only
        3.4.6.8. S-PMSI Trigger Thresholds
        3.4.6.9. Migration from Existing Rosen Implementation
        3.4.6.10. Policy-based S-PMSI
          3.4.6.10.1. Supported MPLS Tunnels
          3.4.6.10.2. Supported Multicast Features
          3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
          3.4.6.10.4. Configuration Example
        3.4.6.11. Policy-based Data MDT
      3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      3.4.8. Multicast VPN Extranet
        3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
        3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
        3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
        3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
      3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      3.4.11. IPv6 MVPN Support
      3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      3.4.13. NG-MVPN Core Diversity
        3.4.13.1. NG-MVPN to Loopback Interface
        3.4.13.2. NG-MVPN Core Diversity
        3.4.13.3. Configuration Example
      3.4.14. NG-MVPN Multicast Source Geo-Redundancy
      3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
      3.4.16. Inter-AS MVPN
        3.4.16.1. BGP Connector Attribute
        3.4.16.2. PIM RPF Vector
        3.4.16.3. Inter-AS MVPN Option B
        3.4.16.4. Inter-AS MVPN Option C
        3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
          3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
          3.4.16.5.2. Configuration Example
          3.4.16.5.3. Inter-AS Non-segmented MLDP
          3.4.16.5.4. ECMP
      3.4.17. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
    3.5. FIB Prioritization
    3.6. Configuring a VPRN Service with CLI
      3.6.1. Basic Configuration
      3.6.2. Common Configuration Tasks
      3.6.3. Configuring VPRN Components
        3.6.3.1. Creating a VPRN Service
        3.6.3.2. Configuring Global VPRN Parameters
        3.6.3.3. Configuring VPRN Log Parameters
          3.6.3.3.1. Configuring a Spoke-SDP
        3.6.3.4. Configuring VPRN Protocols - PIM
          3.6.3.4.1. Configuring Router Interfaces
          3.6.3.4.2. Configuring VPRN Protocols - BGP
          3.6.3.4.3. Configuring VPRN Protocols - RIP
          3.6.3.4.4. Configuring VPRN Protocols - OSPF
          3.6.3.4.5. Configuring a VPRN Interface
          3.6.3.4.6. Configuring Overload State on a Single SFM
          3.6.3.4.7. Configuring a VPRN Interface SAP
      3.6.4. Configuring IPSec Parameters
    3.7. Service Management Tasks
      3.7.1. Modifying VPRN Service Parameters
      3.7.2. Deleting a VPRN Service
      3.7.3. Disabling a VPRN Service
      3.7.4. Re-enabling a VPRN Service
    3.8. VPRN Service Configuration Commands
      3.8.1. Command Hierarchies
        3.8.1.1. VPRN Service Configuration Commands
        3.8.1.2. L2TP Commands
        3.8.1.3. DHCP Commands
        3.8.1.4. GSMP Commands
        3.8.1.5. IGMP Commands
        3.8.1.6. IPsec Configuration Commands
        3.8.1.7. Log Commands
        3.8.1.8. Remote Server Commands
        3.8.1.9. VPRN Management Commands
        3.8.1.10. Multicast VPN Commands
        3.8.1.11. Redundant Interface Commands
        3.8.1.12. Router Advertisement Commands
        3.8.1.13. NTP Commands
        3.8.1.14. NAT Commands
        3.8.1.15. Subscriber Interface Commands
          3.8.1.15.1. Group Interface SAP ETH-CFM Commands
        3.8.1.16. Interface Commands
        3.8.1.17. Network Interface Commands
        3.8.1.18. Interface Spoke SDP Commands
        3.8.1.19. Interface VRRP Commands
        3.8.1.20. Interface SAP Commands
        3.8.1.21. Interface SAP Tunnel Commands
        3.8.1.22. Routed VPLS Commands
        3.8.1.23. Oper Group Commands
        3.8.1.24. Network Ingress Commands
        3.8.1.25. BGP Configuration Commands
        3.8.1.26. BGP Group Configuration Commands
        3.8.1.27. BGP Group Neighbor Configuration Commands
        3.8.1.28. IS-IS Configuration Commands
        3.8.1.29. OSPF Configuration Commands
        3.8.1.30. PIM Configuration Commands
        3.8.1.31. MSDP Configuration Commands
        3.8.1.32. MLD Configuration Commands
        3.8.1.33. RIP Configuration Commands
        3.8.1.34. RADIUS Commands
        3.8.1.35. Web Portal Protocol Configuration Commands
        3.8.1.36. AARP Interface Commands
      3.8.2. Command Descriptions
        3.8.2.1. Generic Commands
        3.8.2.2. Global Commands
        3.8.2.3. Router L2TP Commands
          3.8.2.3.1. Router L2TP Tunnel Commands
        3.8.2.4. Router DHCP Configuration Commands
        3.8.2.5. IGMP Commands
        3.8.2.6. IPSec Configuration Commands
        3.8.2.7. Log Commands
        3.8.2.8. Remote Server Commands
        3.8.2.9. VPRN Management Commands
        3.8.2.10. Multicast VPN Commands
        3.8.2.11. Redundant Interface Commands
        3.8.2.12. Router Advertisement Commands
        3.8.2.13. Network Time Protocol Commands
        3.8.2.14. NAT Commands
        3.8.2.15. Subscriber Interface Commands
        3.8.2.16. Interface Commands
        3.8.2.17. Network Interface Commands
        3.8.2.18. Interface DHCP Commands
        3.8.2.19. Interface ICMP Commands
        3.8.2.20. Interface SAP ATM Commands
        3.8.2.21. Interface Anti-Spoofing Commands
        3.8.2.22. Interface SAP Filter and QoS Policy Commands
        3.8.2.23. Interface VRRP Commands
        3.8.2.24. Interface SAP Commands
        3.8.2.25. Routed VPLS Commands
        3.8.2.26. Network Ingress Commands
        3.8.2.27. SAP Subscriber Management Commands
        3.8.2.28. BGP Commands
        3.8.2.29. ETH-CFM Service Commands
        3.8.2.30. IS-IS Commands
        3.8.2.31. OSPF Commands
        3.8.2.32. PIM Commands
        3.8.2.33. PPPoE Commands
        3.8.2.34. MSDP Configuration Commands
        3.8.2.35. MLD Configuration Commands
        3.8.2.36. RIP Commands
        3.8.2.37. SDP Commands
        3.8.2.38. RADIUS Proxy Commands
        3.8.2.39. AARP Interface Commands
    3.9. VPRN Show, Clear, and Debug Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Show Commands
        3.9.1.2. Clear Commands
        3.9.1.3. Debug Commands
      3.9.2. Command Descriptions
        3.9.2.1. VPRN Show Commands
        3.9.2.2. VPRN Clear Commands
        3.9.2.3. VPRN Debug Commands
    3.10. Tools Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Tools Commands
      3.10.2. Command Descriptions
        3.10.2.1. Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
Log Events Tool
  Log Events Tool
  Log Events Tool
MD-CLI User Guide 16.0.R4
  1. Using the MD-CLI
    1.1. MD-CLI Overview
    1.2. Controlling the Management Interface Configuration Mode
      1.2.1. Setting the Management Interface Configuration Mode
        1.2.1.1. Enabling the MD-CLI from the Classic CLI
        1.2.1.2. Switching Between the Classic CLI and MD-CLI Engines
          1.2.1.2.1. Executing Classic CLI Commands from the MD-CLI Engine
          1.2.1.2.2. MD-CLI and Classic CLI Engine Interactions
          1.2.1.2.3. Switching to the Classic CLI Engine
          1.2.1.2.4. Switching to the MD-CLI Engine
    1.3. Navigating in the MD-CLI
      1.3.1. The MD-CLI Command Prompt
      1.3.2. Environment Commands
        1.3.2.1. Customizing Per-Session Environment Settings
        1.3.2.2. Customizing the Session Prompt
          1.3.2.2.1. Customizing the Uncommitted Changes Indicator
          1.3.2.2.2. Customizing the Line Preceding the Command Prompt
          1.3.2.2.3. Customizing the Context Information in the Command Prompt
          1.3.2.2.4. Customizing the Timestamp
        1.3.2.3. Customizing the Progress Indicator
        1.3.2.4. Customizing the more Setting
        1.3.2.5. Customizing the Console Settings
        1.3.2.6. Customizing the Message Level Security Settings
        1.3.2.7. Preventing Changes to Environment Settings
      1.3.3. Using Online Help
        1.3.3.1. Indicators in the Online Help
          1.3.3.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
          1.3.3.1.2. Immutable Elements
          1.3.3.1.3. Optional Indicators in the Online Help
      1.3.4. Operational Root and Global Commands
      1.3.5. Navigating the MD-CLI Hierarchy Levels
      1.3.6. Using the tree Command
        1.3.6.1. Using the Flat Option
        1.3.6.2. Using the Detail Option
      1.3.7. Using Control Characters and Editing Keystrokes on the Command Line
      1.3.8. Using Command Completion
        1.3.8.1. Variable Parameter Completion
          1.3.8.1.1. Completion for Lists with a Default Keyword
          1.3.8.1.2. Completion for Keyword-based Leaf-lists
          1.3.8.1.3. Completion for Boolean Elements
      1.3.9. Displaying Available Commands using Tab
      1.3.10. Modifying the Idle Timeout Value for CLI Sessions
        1.3.10.1. Idle Timeout Interaction with the Classic CLI
      1.3.11. Using Output Modifiers
        1.3.11.1. Using | match Options
          1.3.11.1.1. Using Regular Expressions with | match
        1.3.11.2. Using | count
        1.3.11.3. Using the | no-more Option
        1.3.11.4. Using the File Redirect Option
      1.3.12. Navigating Contexts in the MD-CLI
        1.3.12.1. Entering Contexts
        1.3.12.2. Exiting Contexts
      1.3.13. Executing Commands with a File
        1.3.13.1. Using Commands that Switch Engines in an Executable File
      1.3.14. Displaying Information in the MD-CLI
        1.3.14.1. Using the info Command
          1.3.14.1.1. Displaying Lists
        1.3.14.2. Using the show Command
          1.3.14.2.1. Classic CLI Command Availability
          1.3.14.2.2. Using the show Command in the MD-CLI Engine
        1.3.14.3. Using Output Modifiers
      1.3.15. MD-CLI Admin Tree
    1.4. Configuring in the MD-CLI
      1.4.1. Configuration Workflow
        1.4.1.1. MD-CLI Session Modes
        1.4.1.2. Transactional Configuration Method
        1.4.1.3. Implicit and Explicit Configuration Workflows
          1.4.1.3.1. Using the Implicit Configuration Workflow
          1.4.1.3.2. Using the Explicit Configuration Workflow
          1.4.1.3.3. Transitioning from an Implicit to an Explicit Configuration Workflow
      1.4.2. Candidate Configuration Modes
        1.4.2.1. Multiple Simultaneous Candidate Configurations
        1.4.2.2. Private Configuration Mode
        1.4.2.3. Exclusive Configuration Mode
        1.4.2.4. Global Configuration Mode
        1.4.2.5. Read-Only Configuration Mode
        1.4.2.6. Transitioning Between Candidate Configuration Modes
        1.4.2.7. Exclusive Private Configuration Session
      1.4.3. The MD-CLI Tree Structure
      1.4.4. Modifying the Configuration
      1.4.5. Adding Configuration Elements
        1.4.5.1. Default Values for Key Leafs
        1.4.5.2. Entering Integer Values
        1.4.5.3. Configuring Lists
          1.4.5.3.1. Special Handling for Lists with all Key Leafs
        1.4.5.4. Configuring Leaf-Lists
        1.4.5.5. Configuring Leafs with Units
        1.4.5.6. Flexible Input for MAC and IPv6 Addresses
        1.4.5.7. Input Translation
      1.4.6. Deleting Configuration Elements
        1.4.6.1. Deleting Leafs
        1.4.6.2. Deleting Containers
        1.4.6.3. Deleting List Entries and Lists
          1.4.6.3.1. Deleting Leaf-List Entries and Leaf-Lists
      1.4.7. Copying Configuration Elements
      1.4.8. Committing a Configuration
        1.4.8.1. Viewing the Uncommitted Configuration Changes
          1.4.8.1.1. Using the compare Outputs to Copy and Paste
        1.4.8.2. Discarding Configuration Changes
        1.4.8.3. Validating the Candidate Configuration
        1.4.8.4. Updating the Candidate Configuration
          1.4.8.4.1. Example Update Scenario With Merge Conflicts
          1.4.8.4.2. Example Update Scenario Without Merge Conflicts
        1.4.8.5. Committing the Candidate Configuration
          1.4.8.5.1. Using the commit confirmed Command
      1.4.9. Saving Changes
      1.4.10. Rolling Back a Configuration from a Checkpoint File
      1.4.11. Loading a Configuration File
        1.4.11.1. Using info Outputs in Load Files
      1.4.12. Using Configuration Groups
        1.4.12.1. Creating Configuration Groups
          1.4.12.1.1. Exact Match
          1.4.12.1.2. Regular Expression Match
        1.4.12.2. Applying Configuration Groups
        1.4.12.3. Inheritance Rules
        1.4.12.4. Displaying the Expanded Configuration
        1.4.12.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
        1.4.12.6. Configuration Group Example
      1.4.13. Viewing the Status of the Local Datastores
        1.4.13.1. Unlocking a Locked Datastore
    1.5. Troubleshooting
      1.5.1. Debug commands
      1.5.2. Logging Debug Events in the MD-CLI
    1.6. MD-CLI Advanced Tips and Features
      1.6.1. Discarding Changes in Specific Contexts
  2. Standards and Protocol Support
  Customer Document and Product Support
  1. Using the MD-CLI
    1.1. MD-CLI Overview
    1.2. Controlling the Management Interface Configuration Mode
      1.2.1. Setting the Management Interface Configuration Mode
        1.2.1.1. Enabling the MD-CLI from the Classic CLI
        1.2.1.2. Switching Between the Classic CLI and MD-CLI Engines
          1.2.1.2.1. Executing Classic CLI Commands from the MD-CLI Engine
          1.2.1.2.2. MD-CLI and Classic CLI Engine Interactions
          1.2.1.2.3. Switching to the Classic CLI Engine
          1.2.1.2.4. Switching to the MD-CLI Engine
    1.3. Navigating in the MD-CLI
      1.3.1. The MD-CLI Command Prompt
      1.3.2. Environment Commands
        1.3.2.1. Customizing Per-Session Environment Settings
        1.3.2.2. Customizing the Session Prompt
          1.3.2.2.1. Customizing the Uncommitted Changes Indicator
          1.3.2.2.2. Customizing the Line Preceding the Command Prompt
          1.3.2.2.3. Customizing the Context Information in the Command Prompt
          1.3.2.2.4. Customizing the Timestamp
        1.3.2.3. Customizing the Progress Indicator
        1.3.2.4. Customizing the more Setting
        1.3.2.5. Customizing the Console Settings
        1.3.2.6. Customizing the Message Level Security Settings
        1.3.2.7. Preventing Changes to Environment Settings
      1.3.3. Using Online Help
        1.3.3.1. Indicators in the Online Help
          1.3.3.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
          1.3.3.1.2. Immutable Elements
          1.3.3.1.3. Optional Indicators in the Online Help
      1.3.4. Operational Root and Global Commands
      1.3.5. Navigating the MD-CLI Hierarchy Levels
      1.3.6. Using the tree Command
        1.3.6.1. Using the Flat Option
        1.3.6.2. Using the Detail Option
      1.3.7. Using Control Characters and Editing Keystrokes on the Command Line
      1.3.8. Using Command Completion
        1.3.8.1. Variable Parameter Completion
          1.3.8.1.1. Completion for Lists with a Default Keyword
          1.3.8.1.2. Completion for Keyword-based Leaf-lists
          1.3.8.1.3. Completion for Boolean Elements
      1.3.9. Displaying Available Commands using Tab
      1.3.10. Modifying the Idle Timeout Value for CLI Sessions
        1.3.10.1. Idle Timeout Interaction with the Classic CLI
      1.3.11. Using Output Modifiers
        1.3.11.1. Using | match Options
          1.3.11.1.1. Using Regular Expressions with | match
        1.3.11.2. Using | count
        1.3.11.3. Using the | no-more Option
        1.3.11.4. Using the File Redirect Option
      1.3.12. Navigating Contexts in the MD-CLI
        1.3.12.1. Entering Contexts
        1.3.12.2. Exiting Contexts
      1.3.13. Executing Commands with a File
        1.3.13.1. Using Commands that Switch Engines in an Executable File
      1.3.14. Displaying Information in the MD-CLI
        1.3.14.1. Using the info Command
          1.3.14.1.1. Displaying Lists
        1.3.14.2. Using the show Command
          1.3.14.2.1. Classic CLI Command Availability
          1.3.14.2.2. Using the show Command in the MD-CLI Engine
        1.3.14.3. Using Output Modifiers
      1.3.15. MD-CLI Admin Tree
    1.4. Configuring in the MD-CLI
      1.4.1. Configuration Workflow
        1.4.1.1. MD-CLI Session Modes
        1.4.1.2. Transactional Configuration Method
        1.4.1.3. Implicit and Explicit Configuration Workflows
          1.4.1.3.1. Using the Implicit Configuration Workflow
          1.4.1.3.2. Using the Explicit Configuration Workflow
          1.4.1.3.3. Transitioning from an Implicit to an Explicit Configuration Workflow
      1.4.2. Candidate Configuration Modes
        1.4.2.1. Multiple Simultaneous Candidate Configurations
        1.4.2.2. Private Configuration Mode
        1.4.2.3. Exclusive Configuration Mode
        1.4.2.4. Global Configuration Mode
        1.4.2.5. Read-Only Configuration Mode
        1.4.2.6. Transitioning Between Candidate Configuration Modes
        1.4.2.7. Exclusive Private Configuration Session
      1.4.3. The MD-CLI Tree Structure
      1.4.4. Modifying the Configuration
      1.4.5. Adding Configuration Elements
        1.4.5.1. Default Values for Key Leafs
        1.4.5.2. Entering Integer Values
        1.4.5.3. Configuring Lists
          1.4.5.3.1. Special Handling for Lists with all Key Leafs
        1.4.5.4. Configuring Leaf-Lists
        1.4.5.5. Configuring Leafs with Units
        1.4.5.6. Flexible Input for MAC and IPv6 Addresses
        1.4.5.7. Input Translation
      1.4.6. Deleting Configuration Elements
        1.4.6.1. Deleting Leafs
        1.4.6.2. Deleting Containers
        1.4.6.3. Deleting List Entries and Lists
          1.4.6.3.1. Deleting Leaf-List Entries and Leaf-Lists
      1.4.7. Copying Configuration Elements
      1.4.8. Committing a Configuration
        1.4.8.1. Viewing the Uncommitted Configuration Changes
          1.4.8.1.1. Using the compare Outputs to Copy and Paste
        1.4.8.2. Discarding Configuration Changes
        1.4.8.3. Validating the Candidate Configuration
        1.4.8.4. Updating the Candidate Configuration
          1.4.8.4.1. Example Update Scenario With Merge Conflicts
          1.4.8.4.2. Example Update Scenario Without Merge Conflicts
        1.4.8.5. Committing the Candidate Configuration
          1.4.8.5.1. Using the commit confirmed Command
      1.4.9. Saving Changes
      1.4.10. Rolling Back a Configuration from a Checkpoint File
      1.4.11. Loading a Configuration File
        1.4.11.1. Using info Outputs in Load Files
      1.4.12. Using Configuration Groups
        1.4.12.1. Creating Configuration Groups
          1.4.12.1.1. Exact Match
          1.4.12.1.2. Regular Expression Match
        1.4.12.2. Applying Configuration Groups
        1.4.12.3. Inheritance Rules
        1.4.12.4. Displaying the Expanded Configuration
        1.4.12.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
        1.4.12.6. Configuration Group Example
      1.4.13. Viewing the Status of the Local Datastores
        1.4.13.1. Unlocking a Locked Datastore
    1.5. Troubleshooting
      1.5.1. Debug commands
      1.5.2. Logging Debug Events in the MD-CLI
    1.6. MD-CLI Advanced Tips and Features
      1.6.1. Discarding Changes in Specific Contexts
  2. Standards and Protocol Support
  Customer Document and Product Support
MD-CLI Command Reference, 16.0.R4
  MD-CLI Command Reference 16.0.R4
  MD-CLI Command Reference 16.0.R4
MPLS Guide 16.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia Router Configuration Process
  2. MPLS and RSVP
    2.1. MPLS
      2.1.1. MPLS Label Stack
        2.1.1.1. Label Values
        2.1.1.2. Reserved Label Blocks
      2.1.2. MPLS Entropy Label and Hash Label
        2.1.2.1. Entropy Label Capability for BGP Labeled Routes
        2.1.2.2. Entropy Label for Segment Routed Tunnels
        2.1.2.3. Inserting and Processing the Entropy Label
          2.1.2.3.1. Ingress LER
          2.1.2.3.2. LSR
        2.1.2.4. Egress LER
        2.1.2.5. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        2.1.2.6. Entropy Label on OAM Packets
      2.1.3. Label Switching Routers
        2.1.3.1. LSP Types
      2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
        2.1.4.1. Bootstrapping and Maintaining the BFD Session
        2.1.4.2. LSP BFD Configuration
        2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
        2.1.4.4. BFD Configuration on RSVP-TE LSPs
        2.1.4.5. Determining LSP Availability from LSP BFD
          2.1.4.5.1. Failure-action down
          2.1.4.5.2. Failure-action failover
        2.1.4.6. MPLS/RSVP on Broadcast Interface
      2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
      2.1.6. Manual Bypass LSP
        2.1.6.1. PLR Bypass LSP Selection Rules
        2.1.6.2. FRR Node-Protection (Facility)
      2.1.7. Uniform FRR Failover Time
      2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
        2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
        2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
        2.1.8.3. Measurement of LSP Bandwidth
        2.1.8.4. Passive Monitoring of LSP Bandwidth
        2.1.8.5. Periodic Automatic Bandwidth Adjustment
        2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
        2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
        2.1.8.8. Operational Bandwidth Carryover between Active Paths
    2.2. RSVP
      2.2.1. Using RSVP for MPLS
        2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
        2.2.1.2. Hello Protocol
        2.2.1.3. MD5 Authentication of RSVP Interface
        2.2.1.4. Configuring Authentication using Keychains
      2.2.2. Reservation Styles
        2.2.2.1. RSVP Message Pacing
      2.2.3. RSVP Overhead Refresh Reduction
      2.2.4. RSVP Graceful Restart Helper
      2.2.5. Enhancements to RSVP Control Plane Congestion Control
      2.2.6. RSVP LSP Statistics
      2.2.7. P2MP RSVP-TE LSP Statistics
        2.2.7.1. Configuring RSVP P2MP LSP Egress Statistics
        2.2.7.2. Configuring RSVP P2MP LSP Ingress Statistics
        2.2.7.3. Configuring Implicit Null
      2.2.8. Using Unnumbered Point-to-Point Interface in RSVP
        2.2.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
      2.2.9. MPLS Segment Routing Traffic Statistics
    2.3. MPLS Transport Profile
      2.3.1. MPLS-TP Model
      2.3.2. MPLS-TP Provider Edge and Gateway
        2.3.2.1. VLL Services
        2.3.2.2. Spoke-SDP Termination
      2.3.3. MPLS-TP LSR
      2.3.4. Detailed Descriptions of MPLS-TP
        2.3.4.1. MPLS-TP LSPs
        2.3.4.2. MPLS-TP on Pseudowires
      2.3.5. MPLS-TP Maintenance Identifiers
        2.3.5.1. Generic Associated Channel
        2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
          2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
          2.3.5.2.2. Proactive CC, CV and RDI
          2.3.5.2.3. BFD-based RDI
        2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        2.3.5.4. PW Control Channel Status Request Mechanism
        2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
        2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
        2.3.5.7. MPLS-TP LSP Protection
      2.3.6. Alarm Indication Signal (AIS)
      2.3.7. Configuring MPLS-TP
        2.3.7.1. Configuration Overview
        2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
        2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
        2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        2.3.7.5. Interface Configuration for MPLS-TP
        2.3.7.6. LER Configuration for MPLS-TP
          2.3.7.6.1. LSP and Path Configuration
          2.3.7.6.2. Support for Downstream Mapping Information
          2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
          2.3.7.6.4. Protection templates and Linear Protection Configuration
        2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
      2.3.8. MPLS-TP Show Commands
        2.3.8.1. Static MPLS Labels
        2.3.8.2. MPLS-TP Tunnel Configuration
        2.3.8.3. MPLS-TP Path configuration
        2.3.8.4. MPLS-TP Protection
        2.3.8.5. MPLS TP Node Configuration
        2.3.8.6. MPLS-TP Interfaces
      2.3.9. MPLS-TP Debug Commands
    2.4. Traffic Engineering
      2.4.1. TE Metric (IS-IS and OSPF)
      2.4.2. Admin Group Support on Facility Bypass Backup LSP
        2.4.2.1. Procedures at Head-End Node
        2.4.2.2. Procedures at PLR Node
      2.4.3. Diff-Serv Traffic Engineering
        2.4.3.1. Mapping of Traffic to a Diff-Serv LSP
        2.4.3.2. Admission Control of Classes
          2.4.3.2.1. Maximum Allocation Model
          2.4.3.2.2. Russian Doll Model
        2.4.3.3. RSVP Control Plane Extensions
        2.4.3.4. IGP Extensions
        2.4.3.5. Diff-Serv TE Configuration and Operation
          2.4.3.5.1. RSVP Protocol Level
          2.4.3.5.2. RSVP Interface Level
          2.4.3.5.3. LSP and LSP Path Levels
      2.4.4. Diff-Serv TE LSP Class Type Change under Failure
        2.4.4.1. LSP Primary Path Retry Procedures
        2.4.4.2. Bandwidth Sharing Across Class Types
        2.4.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
        2.4.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
    2.5. Advanced MPLS/RSVP Features
      2.5.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
      2.5.2. LSP Path Change
      2.5.3. Manual LSP Path Switch
      2.5.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      2.5.5. Automatic Creation of RSVP-TE LSP Mesh
        2.5.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
          2.5.5.1.1. Feature Configuration
          2.5.5.1.2. Feature Behavior
          2.5.5.1.3. Multi-Area and Multi-Instance Support
          2.5.5.1.4. Mesh LSP Name Encoding and Statistics
        2.5.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
          2.5.5.2.1. Feature Configuration
          2.5.5.2.2. Feature Behavior
      2.5.6. IGP Shortcut and Forwarding Adjacency
        2.5.6.1. IGP Shortcut Feature Configuration
          2.5.6.1.1. IGP Shortcut Binding Construct
        2.5.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
          2.5.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
          2.5.6.2.2. Application Support
          2.5.6.2.3. Loop-free Alternate (LFA) Protection Support
        2.5.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
          2.5.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
          2.5.6.3.2. Application Support
          2.5.6.3.3. Loop-free Alternate (LFA) Protection Support
        2.5.6.4. Using LSP Relative Metric with IGP Shortcut
        2.5.6.5. ECMP Considerations
        2.5.6.6. Handling of Control Packets
        2.5.6.7. Forwarding Adjacency
        2.5.6.8. LDP Forwarding over IGP Shortcut
        2.5.6.9. Handling of Multicast Packets
      2.5.7. Disabling TTL Propagation in an LSP Shortcut
      2.5.8. RSVP-TE LSP Signaling using LSP Template
      2.5.9. Shared Risk Link Groups
        2.5.9.1. Enabling Disjoint Backup Paths
        2.5.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
        2.5.9.3. Static Configurations of SRLG Memberships
      2.5.10. TE Graceful Shutdown
      2.5.11. Soft Preemption of Diff-Serv RSVP LSP
      2.5.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
      2.5.13. Inter-Area TE LSP (ERO Expansion Method)
        2.5.13.1. Area Border Node FRR Protection for Inter-Area LSP
          2.5.13.1.1. Rerouting of Inter-Area LSP
          2.5.13.1.2. Behavior of MPLS Options in Inter-Area LSP
        2.5.13.2. Inter-Area LSP support of OSPF Virtual Links
        2.5.13.3. Area Border Node FRR Protection for Inter-Area LSP
      2.5.14. Timer-based Reversion for RSVP-TE LSPs
      2.5.15. MPLS Entropy Label
      2.5.16. LSP Tagging and Auto-Bind Using Tag Information
        2.5.16.1. Internal Route Color to LSP Color Matching Algorithm
        2.5.16.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
        2.5.16.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
      2.5.17. Accounting for Dark Bandwidth
    2.6. Point-to-Multipoint (P2MP) RSVP LSP
      2.6.1. Application in Video Broadcast
      2.6.2. P2MP LSP Data Plane
        2.6.2.1. Procedures at Ingress LER Node
        2.6.2.2. Procedures at LSR Node
        2.6.2.3. Procedures at Branch LSR Node
        2.6.2.4. Procedures at Egress LER Node
        2.6.2.5. Procedures at BUD LSR Node
      2.6.3. Ingress Path Management for P2MP LSP Packets
        2.6.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
      2.6.4. RSVP Control Plane in a P2MP LSP
      2.6.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        2.6.5.1. Procedures at Ingress LER Node
        2.6.5.2. Procedures at Egress LER Node
          2.6.5.2.1. Procedures with a Primary Tunnel Interface
    2.7. Segment Routing With Traffic Engineering (SR-TE)
      2.7.1. SR-TE Support
      2.7.2. SR-TE LSP Instantiation
        2.7.2.1. PCC-Initiated and PCC-Controlled LSP
          2.7.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
        2.7.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
      2.7.3. SR-TE LSP Path Computation
        2.7.3.1. Service and Shortcut Application SR-TE Label Stack Check
      2.7.4. SR-TE LSP Protection
      2.7.5. Static Route Resolution using SR-TE LSP
      2.7.6. BGP Shortcuts Using SR-TE LSP
      2.7.7. BGP Label Route Resolution Using SR-TE LSP
      2.7.8. Service Packet Forwarding using SR-TE LSP
      2.7.9. Data Path Support
        2.7.9.1. SR-TE LSP Metric and MTU Settings
        2.7.9.2. Hash Label and Entropy Label Support
      2.7.10. SR-TE Auto-LSP
        2.7.10.1. Feature Configuration
        2.7.10.2. Automatic Creation of an SR-TE Mesh LSP
        2.7.10.3. Automatic Creation of an SR-TE One-Hop LSP
        2.7.10.4. Interaction with PCEP
        2.7.10.5. Forwarding Contexts Supported with SR-TE Auto-LSP
    2.8. MPLS Service Usage
      2.8.1. Service Distribution Paths
    2.9. MPLS/RSVP Configuration Process Overview
    2.10. Configuration Notes
    2.11. Configuring MPLS and RSVP with CLI
      2.11.1. MPLS Configuration Overview
        2.11.1.1. LSPs
        2.11.1.2. Paths
        2.11.1.3. Router Interface
        2.11.1.4. Choosing the Signaling Protocol
      2.11.2. Basic MPLS Configuration
      2.11.3. Common Configuration Tasks
      2.11.4. Configuring MPLS Components
        2.11.4.1. Configuring Global MPLS Parameters
        2.11.4.2. Configuring an MPLS Interface
        2.11.4.3. Configuring MPLS Paths
        2.11.4.4. Configuring an MPLS LSP
        2.11.4.5. Configuring a Static LSP
        2.11.4.6. Configuring Manual Bypass Tunnels
        2.11.4.7. Configuring RSVP Parameters
        2.11.4.8. Configure RSVP Message Pacing Parameters
        2.11.4.9. Configuring Graceful Shutdown
    2.12. MPLS Configuration Management Tasks
      2.12.1. Deleting MPLS
      2.12.2. Modifying MPLS Parameters
      2.12.3. Modifying an MPLS LSP
      2.12.4. Modifying MPLS Path Parameters
      2.12.5. Modifying MPLS Static LSP Parameters
      2.12.6. Deleting an MPLS Interface
    2.13. RSVP Configuration Management Tasks
      2.13.1. Modifying RSVP Parameters
      2.13.2. Modifying RSVP Message Pacing Parameters
      2.13.3. Deleting an Interface from RSVP
    2.14. Configuring and Operating SR-TE
      2.14.1. SR-TE Configuration Prerequisites
      2.14.2. SR-TE LSP Configuration Overview
      2.14.3. Configuring Path Computation and Control for SR-TE LSP
        2.14.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
      2.14.4. Configuring SR-TE LSP Label Stack Size
      2.14.5. Configuring Adjacency SID Parameters
      2.14.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
      2.14.7. Configuring a Mesh of SR-TE Auto-LSPs
    2.15. MPLS/RSVP Configuration Command Reference
      2.15.1. Command Hierarchies
        2.15.1.1. MPLS Commands
        2.15.1.2. MPLS-TP Commands
        2.15.1.3. MPLS-Label Commands
        2.15.1.4. LSP Commands
        2.15.1.5. LSP-BFD Commands
        2.15.1.6. RIB-API Commands
        2.15.1.7. MPLS Path Commands
        2.15.1.8. RSVP Commands
      2.15.2. Command Descriptions
        2.15.2.1. MPLS Commands
          2.15.2.1.1. Generic Commands
          2.15.2.1.2. MPLS Commands
          2.15.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
        2.15.2.2. RSVP Commands
          2.15.2.2.1. Generic Commands
          2.15.2.2.2. RSVP Commands
          2.15.2.2.3. Interface Commands
          2.15.2.2.4. Message Pacing Commands
    2.16. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      2.16.1. Command Hierarchies
        2.16.1.1. Show Commands
        2.16.1.2. Tools Commands
        2.16.1.3. Router Commands
        2.16.1.4. Clear Commands
        2.16.1.5. Debug Commands
      2.16.2. Command Descriptions
        2.16.2.1. Show Commands
        2.16.2.2. Show MPLS-Labels Commands
        2.16.2.3. Show Router BFD session Commands
        2.16.2.4. Show RSVP Commands
        2.16.2.5. Tools Commands
        2.16.2.6. Clear Commands
        2.16.2.7. Debug Commands
  3. GMPLS
    3.1. GMPLS
      3.1.1. Example Applications
        3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
        3.1.1.2. Use Case 2: Multi-Layer Resiliency
    3.2. GMPLS UNI Architecture
      3.2.1. Addressing and End-to-End gLSP Architecture
    3.3. 1830 PSS Identifiers
    3.4. Recovery Reference Models
      3.4.1. End to End Recovery (IP-layer)
      3.4.2. End to End ECMP
      3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      3.4.4. End to End Recovery (GMPLS Layer)
        3.4.4.1. Unprotected gLSP
        3.4.4.2. Full LSP Rerouting
        3.4.4.3. 1: N Protection
        3.4.4.4. Optical Segment Recovery
    3.5. GMPLS Configuration Overview
    3.6. LMP and IPCC Configuration
      3.6.1. Configuration of IP Communication Channels for LMP and RSVP
      3.6.2. Configuring LMP
      3.6.3. Configuring Traffic Engineering Links and Data Bearers
    3.7. Configuring MPLS Paths for GMPLS
    3.8. Configuring RSVP in GMPLS
    3.9. Configuring a GMPLS LSP on the UNI
      3.9.1. gLSP Constraints
    3.10. Bandwidth
    3.11. Shared Risk Link Groups
    3.12. Optical Network Segment Recovery
    3.13. Configuration of End-to-End GMPLS Recovery
    3.14. GMPLS Tunnel Groups
    3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    3.16. Configuration Notes
    3.17. GMPLS Configuration Command Reference
      3.17.1. Command Hierarchies
        3.17.1.1. LMP Commands
        3.17.1.2. GMPLS Commands
        3.17.1.3. GMPLS Tunnel Group Commands
      3.17.2. Command Descriptions
        3.17.2.1. LMP Commands
        3.17.2.2. GMPLS Commands
          3.17.2.2.1. GMPLS Tunnel Group Commands
    3.18. Show, Clear, Debug, and Tools Command Reference
      3.18.1. Command Hierarchies
        3.18.1.1. Show Commands
        3.18.1.2. Clear Commands
        3.18.1.3. Debug Commands
        3.18.1.4. Tools Commands
      3.18.2. Command Descriptions
        3.18.2.1. Show Commands
        3.18.2.2. Clear Commands
        3.18.2.3. Debug Commands
        3.18.2.4. Tools Commands
  4. MPLS Forwarding Policy
    4.1. Introduction
    4.2. Feature Validation and Operation Procedures
      4.2.1. Policy Parameters and Validation Procedure Rules
      4.2.2. Policy Resolution and Operational Procedures
    4.3. Tunnel Table Handling of MPLS Forwarding Policy
    4.4. Data Path Support
      4.4.1. NHG of Resolution Type Indirect
      4.4.2. NHG of Resolution Type Direct
        4.4.2.1. Active Path Determination and Failover in a NHG of Resolution Type Direct
      4.4.3. Spraying of Packets in a MPLS Forwarding Policy
      4.4.4. Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
      4.4.5. Ethertype Setting and TTL Handling in Endpoint Policy
    4.5. Weighted ECMP Enabling and Validation Rules
    4.6. Statistics
      4.6.1. Ingress Statistics
    4.7. Configuring Static Label Routes using MPLS Forwarding Policy
      4.7.1. Steering Flows to an Indirect Next-Hop
      4.7.2. Steering Flows to a Direct Next-Hop
    4.8. SLR Configuration Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. MPLS SLR Forwarding Policy Commands
      4.8.2. Command Descriptions
        4.8.2.1. MPLS SLR Forwarding Policy Commands
    4.9. SLR Show Command Reference
      4.9.1. Command Hierarchies
        4.9.1.1. Show Commands
      4.9.2. Command Descriptions
        4.9.2.1. Show Commands
  5. PCEP
    5.1. Introduction to the Path Computation Element Protocol (PCEP)
      5.1.1. PCC and PCE Configuration
      5.1.2. Base Implementation of Path Computation Elements (PCE)
      5.1.3. PCEP Session Establishment and Maintenance
      5.1.4. PCEP Parameters
        5.1.4.1. Stateful PCE
        5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
        5.1.4.3. LSP Initiation
          5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
          5.1.4.3.2. PCE-Initiated LSPs
          5.1.4.3.3. LSP Instantiation Using PCEP
          5.1.4.3.4. LSP Deletion Using PCEP
          5.1.4.3.5. Dynamic State Handling for PCE Initiated LSPs
          5.1.4.3.6. PCEP Support for RSVP-TE LSP
          5.1.4.3.7. LSP Path Diversity and Bidirectionality Constraints
    5.2. NSP and VSR-NRC PCE Redundancy
      5.2.1. Feature Configuration
      5.2.2. Feature Behavior
        5.2.2.1. NSP Cluster Behavior
        5.2.2.2. VSR-NRC Behavior
        5.2.2.3. PCC Behavior
    5.3. Configuring and Operating RSVP-TE LSP with PCEP
    5.4. PCEP Configuration Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. PCEP Commands
      5.4.2. Command Descriptions
        5.4.2.1. PCEP Commands
    5.5. PCEP Show and Tools Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Show Commands
        5.5.1.2. Tools Commands
      5.5.2. Command Descriptions
        5.5.2.1. Show Commands
        5.5.2.2. Tools Commands
  6. Segment Routing Policies
    6.1. Statically-Configured Segment Routing Policies
    6.2. BGP Signaled Segment Routing Policies
    6.3. Segment Routing Policy Path Selection and Tie-Breaking
    6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
      6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
      6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
  7. Label Distribution Protocol
    7.1. Label Distribution Protocol
      7.1.1. LDP and MPLS
      7.1.2. LDP Architecture
      7.1.3. Subsystem Interrelationships
        7.1.3.1. Memory Manager and LDP
        7.1.3.2. Label Manager
        7.1.3.3. LDP Configuration
        7.1.3.4. Logger
        7.1.3.5. Service Manager
      7.1.4. Execution Flow
        7.1.4.1. Initialization
        7.1.4.2. Session Lifetime
          7.1.4.2.1. Adjacency Establishment
          7.1.4.2.2. Session Establishment
      7.1.5. Label Exchange
        7.1.5.1. Other Reasons for Label Actions
        7.1.5.2. Cleanup
        7.1.5.3. Configuring Implicit Null Label
      7.1.6. Global LDP Filters
        7.1.6.1. Per LDP Peer FEC Import and Export Policies
      7.1.7. Configuring Multiple LDP LSR ID
        7.1.7.1. Advertisement of FEC for Local LSR ID
      7.1.8. LDP FEC Resolution Per Specified Community
        7.1.8.1. Configuration
        7.1.8.2. Operation
      7.1.9. T-LDP hello reduction
      7.1.10. Tracking a T-LDP Peer with BFD
      7.1.11. Link LDP Hello Adjacency Tracking with BFD
      7.1.12. LDP LSP Statistics
      7.1.13. MPLS Entropy Label
      7.1.14. Importing LDP Tunnels to Non-Host Prefixes to TTM
    7.2. TTL Security for BGP and LDP
    7.3. ECMP Support for LDP
      7.3.1. Label Operations
    7.4. Unnumbered Interface Support in LDP
      7.4.1. Feature Configuration
      7.4.2. Operation of LDP over an Unnumbered IP Interface
        7.4.2.1. Link LDP
        7.4.2.2. Targeted LDP
        7.4.2.3. FEC Resolution
    7.5. LDP over RSVP Tunnels
      7.5.1. Signaling and Operation
        7.5.1.1. LDP Label Distribution and FEC Resolution
        7.5.1.2. Default FEC Resolution Procedure
        7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      7.5.2. Rerouting Around Failures
        7.5.2.1. LDP-over-RSVP Tunnel Protection
        7.5.2.2. ABR Protection
    7.6. LDP over RSVP Without Area Boundary
      7.6.1. LDP over RSVP and ECMP
    7.7. Weighted Load Balancing for LDP over RSVP
      7.7.1. Interaction with Class-Based Forwarding
    7.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      7.8.1. Configuration and Operation
      7.8.2. Support of a Class Forwarding Policy with LDP-over-RSVP
      7.8.3. Class Based Forwarding with ECMP
      7.8.4. LER and LSR Operations
    7.9. LDP ECMP Uniform Failover
    7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
      7.10.1. LDP FRR Configuration
        7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
      7.10.2. LDP FRR Procedures
        7.10.2.1. ECMP Considerations
        7.10.2.2. LDP FRR and LDP Shortcut
        7.10.2.3. LDP FRR and LDP-over-RSVP
        7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
      7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
        7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    7.11. LDP FEC to BGP Label Route Stitching
      7.11.1. Configuration
      7.11.2. Detailed LDP FEC Resolution
      7.11.3. Detailed BGP Labeled Route Resolution
      7.11.4. Data Plane Forwarding
    7.12. LDP-SR Stitching for IPv4 prefixes
      7.12.1. LDP-SR Stitching Configuration
      7.12.2. Stitching in the LDP-to-SR Direction
      7.12.3. Stitching in the SR-to-LDP Direction
    7.13. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes
    7.14. Automatic Creation of a Targeted Hello Adjacency and LDP Session
      7.14.1. Feature Configuration
      7.14.2. Feature Behavior
    7.15. Multicast P2MP LDP for GRT
    7.16. LDP P2MP Support
      7.16.1. LDP P2MP Configuration
      7.16.2. LDP P2MP Protocol
      7.16.3. Make Before Break (MBB)
      7.16.4. ECMP Support
      7.16.5. Inter-AS Non-segmented mLDP
        7.16.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
        7.16.5.2. LDP Recursive FEC Process
        7.16.5.3. Supported Recursive Opaque Values
        7.16.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
        7.16.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
          7.16.5.5.1. Leaf and ABR Behavior
          7.16.5.5.2. Intra-AS Support
          7.16.5.5.3. Opaque Type Behavior with Basic FEC Generation
          7.16.5.5.4. Inter-AS Support
        7.16.5.6. Redundancy and Resiliency
        7.16.5.7. ASBR Physical Connection
        7.16.5.8. OAM
        7.16.5.9. ECMP Support
          7.16.5.9.1. ECMP Hash Algorithm
        7.16.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
      7.16.6. Intra-AS Non-segmented mLDP
        7.16.6.1. ABR MoFRR for Intra-AS
        7.16.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
      7.16.7. ASBR MoFRR
        7.16.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
        7.16.7.2. ASBR MoFRR Leaf Behavior
        7.16.7.3. ASBR MoFRR ASBR Behavior
        7.16.7.4. MoFRR Root AS Behavior
        7.16.7.5. Traffic Flow
        7.16.7.6. Failure Detection and Handling
        7.16.7.7. Failure Scenario
        7.16.7.8. ASBR MoFRR Consideration
        7.16.7.9. ASBR MoFRR Opaque Support
      7.16.8. MBB for MoFRR
      7.16.9. Add-path for Route Reflectors
    7.17. Multicast LDP Fast Upstream Switchover
      7.17.1. Feature Configuration
      7.17.2. Feature Behavior
      7.17.3. Uniform Failover from Primary to Backup ILM
    7.18. Multi-Area and Multi-Instance Extensions to LDP
      7.18.1. LDP Shortcut for BGP Next-Hop Resolution
      7.18.2. LDP Shortcut for IGP Routes
        7.18.2.1. LDP Shortcut Configuration
        7.18.2.2. IGP Route Resolution
        7.18.2.3. LDP Shortcut Forwarding Plane
      7.18.3. ECMP Considerations
      7.18.4. Disabling TTL Propagation in an LSP Shortcut
    7.19. LDP Graceful Handling of Resource Exhaustion
      7.19.1. LDP Base Graceful Handling of Resources
    7.20. LDP Enhanced Graceful Handling of Resources
      7.20.1. LSR Overload Notification
      7.20.2. LSR Overload Protection Capability
      7.20.3. Procedures for LSR overload protection
    7.21. LDP-IGP Synchronization
    7.22. MLDP Resolution using Multicast RTM
      7.22.1. Other Considerations for Multicast RTM MLDP Resolution
    7.23. Bidirectional Forwarding Detection for LDP LSPs
      7.23.1. Bootstrapping and Maintaining LSP BFD Sessions
      7.23.2. BFD Configuration on LDP LSPs
    7.24. User Guidelines and Troubleshooting Procedures
      7.24.1. Common Procedures
      7.24.2. Base Resource Handling Procedures
      7.24.3. Enhanced Resource Handling Procedures
    7.25. LDP IPv6 Control and Data Planes
      7.25.1. LDP Operation in an IPv6 Network
      7.25.2. Link LDP
      7.25.3. Targeted LDP
      7.25.4. FEC Resolution
      7.25.5. LDP Session Capabilities
      7.25.6. LDP Adjacency Capabilities
      7.25.7. Address and FEC Distribution
      7.25.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      7.25.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      7.25.10. IGP and Static Route Synchronization with LDP
      7.25.11. BFD Operation
      7.25.12. Services Using SDP with an LDP IPv6 FEC
      7.25.13. Mirror Services and Lawful Intercept
        7.25.13.1. Configuration at mirror source node
        7.25.13.2. Configuration at mirror destination node
      7.25.14. Static Route Resolution to a LDP IPv6 FEC
      7.25.15. IGP Route Resolution to a LDP IPv6 FEC
      7.25.16. OAM Support with LDP IPv6
      7.25.17. LDP IPv6 Interoperability Considerations
        7.25.17.1. Interoperability with Implementations Compliant with RFC 7552
        7.25.17.2. LDP IPv6 32-bit LSR-ID
          7.25.17.2.1. Feature Configuration
          7.25.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
          7.25.17.2.3. Migration Considerations
        7.25.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    7.26. LDP Process Overview
    7.27. Configuring LDP with CLI
      7.27.1. LDP Configuration Overview
      7.27.2. Basic LDP Configuration
      7.27.3. Common Configuration Tasks
        7.27.3.1. Enabling LDP
        7.27.3.2. Configuring FEC Originate Parameters
        7.27.3.3. Configuring Graceful-Restart Helper Parameters
        7.27.3.4. Applying Export and Import Policies
        7.27.3.5. Targeted Session Parameters
        7.27.3.6. Interface Parameters
        7.27.3.7. Session Parameters
        7.27.3.8. LDP Signaling and Services
    7.28. LDP Configuration Management Tasks
      7.28.1. Disabling LDP
      7.28.2. Modifying Targeted Session Parameters
      7.28.3. Modifying Interface Parameters
    7.29. LDP Command Reference
      7.29.1. Command Hierarchies
        7.29.1.1. LDP Commands
      7.29.2. Command Descriptions
        7.29.2.1. Generic Commands
        7.29.2.2. LDP Commands
        7.29.2.3. Interface Parameters Commands
        7.29.2.4. Session Parameters Commands
        7.29.2.5. Targeted Session Commands
        7.29.2.6. TCP Session Parameters Commands
    7.30. Show, Clear, Debug, and Tools Command Reference
      7.30.1. Command Hierarchies
        7.30.1.1. Show Commands
        7.30.1.2. Clear Commands
        7.30.1.3. Debug Commands
        7.30.1.4. Tools Commands
      7.30.2. Command Descriptions
        7.30.2.1. Show LDP Commands
        7.30.2.2. Clear Commands
        7.30.2.3. Debug Commands
        7.30.2.4. Tools Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia Router Configuration Process
  2. MPLS and RSVP
    2.1. MPLS
      2.1.1. MPLS Label Stack
        2.1.1.1. Label Values
        2.1.1.2. Reserved Label Blocks
      2.1.2. MPLS Entropy Label and Hash Label
        2.1.2.1. Entropy Label Capability for BGP Labeled Routes
        2.1.2.2. Entropy Label for Segment Routed Tunnels
        2.1.2.3. Inserting and Processing the Entropy Label
          2.1.2.3.1. Ingress LER
          2.1.2.3.2. LSR
        2.1.2.4. Egress LER
        2.1.2.5. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        2.1.2.6. Entropy Label on OAM Packets
      2.1.3. Label Switching Routers
        2.1.3.1. LSP Types
      2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
        2.1.4.1. Bootstrapping and Maintaining the BFD Session
        2.1.4.2. LSP BFD Configuration
        2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
        2.1.4.4. BFD Configuration on RSVP-TE LSPs
        2.1.4.5. Determining LSP Availability from LSP BFD
          2.1.4.5.1. Failure-action down
          2.1.4.5.2. Failure-action failover
        2.1.4.6. MPLS/RSVP on Broadcast Interface
      2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
      2.1.6. Manual Bypass LSP
        2.1.6.1. PLR Bypass LSP Selection Rules
        2.1.6.2. FRR Node-Protection (Facility)
      2.1.7. Uniform FRR Failover Time
      2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
        2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
        2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
        2.1.8.3. Measurement of LSP Bandwidth
        2.1.8.4. Passive Monitoring of LSP Bandwidth
        2.1.8.5. Periodic Automatic Bandwidth Adjustment
        2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
        2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
        2.1.8.8. Operational Bandwidth Carryover between Active Paths
    2.2. RSVP
      2.2.1. Using RSVP for MPLS
        2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
        2.2.1.2. Hello Protocol
        2.2.1.3. MD5 Authentication of RSVP Interface
        2.2.1.4. Configuring Authentication using Keychains
      2.2.2. Reservation Styles
        2.2.2.1. RSVP Message Pacing
      2.2.3. RSVP Overhead Refresh Reduction
      2.2.4. RSVP Graceful Restart Helper
      2.2.5. Enhancements to RSVP Control Plane Congestion Control
      2.2.6. RSVP LSP Statistics
      2.2.7. P2MP RSVP-TE LSP Statistics
        2.2.7.1. Configuring RSVP P2MP LSP Egress Statistics
        2.2.7.2. Configuring RSVP P2MP LSP Ingress Statistics
        2.2.7.3. Configuring Implicit Null
      2.2.8. Using Unnumbered Point-to-Point Interface in RSVP
        2.2.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
      2.2.9. MPLS Segment Routing Traffic Statistics
    2.3. MPLS Transport Profile
      2.3.1. MPLS-TP Model
      2.3.2. MPLS-TP Provider Edge and Gateway
        2.3.2.1. VLL Services
        2.3.2.2. Spoke-SDP Termination
      2.3.3. MPLS-TP LSR
      2.3.4. Detailed Descriptions of MPLS-TP
        2.3.4.1. MPLS-TP LSPs
        2.3.4.2. MPLS-TP on Pseudowires
      2.3.5. MPLS-TP Maintenance Identifiers
        2.3.5.1. Generic Associated Channel
        2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
          2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
          2.3.5.2.2. Proactive CC, CV and RDI
          2.3.5.2.3. BFD-based RDI
        2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        2.3.5.4. PW Control Channel Status Request Mechanism
        2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
        2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
        2.3.5.7. MPLS-TP LSP Protection
      2.3.6. Alarm Indication Signal (AIS)
      2.3.7. Configuring MPLS-TP
        2.3.7.1. Configuration Overview
        2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
        2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
        2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        2.3.7.5. Interface Configuration for MPLS-TP
        2.3.7.6. LER Configuration for MPLS-TP
          2.3.7.6.1. LSP and Path Configuration
          2.3.7.6.2. Support for Downstream Mapping Information
          2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
          2.3.7.6.4. Protection templates and Linear Protection Configuration
        2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
      2.3.8. MPLS-TP Show Commands
        2.3.8.1. Static MPLS Labels
        2.3.8.2. MPLS-TP Tunnel Configuration
        2.3.8.3. MPLS-TP Path configuration
        2.3.8.4. MPLS-TP Protection
        2.3.8.5. MPLS TP Node Configuration
        2.3.8.6. MPLS-TP Interfaces
      2.3.9. MPLS-TP Debug Commands
    2.4. Traffic Engineering
      2.4.1. TE Metric (IS-IS and OSPF)
      2.4.2. Admin Group Support on Facility Bypass Backup LSP
        2.4.2.1. Procedures at Head-End Node
        2.4.2.2. Procedures at PLR Node
      2.4.3. Diff-Serv Traffic Engineering
        2.4.3.1. Mapping of Traffic to a Diff-Serv LSP
        2.4.3.2. Admission Control of Classes
          2.4.3.2.1. Maximum Allocation Model
          2.4.3.2.2. Russian Doll Model
        2.4.3.3. RSVP Control Plane Extensions
        2.4.3.4. IGP Extensions
        2.4.3.5. Diff-Serv TE Configuration and Operation
          2.4.3.5.1. RSVP Protocol Level
          2.4.3.5.2. RSVP Interface Level
          2.4.3.5.3. LSP and LSP Path Levels
      2.4.4. Diff-Serv TE LSP Class Type Change under Failure
        2.4.4.1. LSP Primary Path Retry Procedures
        2.4.4.2. Bandwidth Sharing Across Class Types
        2.4.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
        2.4.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
    2.5. Advanced MPLS/RSVP Features
      2.5.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
      2.5.2. LSP Path Change
      2.5.3. Manual LSP Path Switch
      2.5.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      2.5.5. Automatic Creation of RSVP-TE LSP Mesh
        2.5.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
          2.5.5.1.1. Feature Configuration
          2.5.5.1.2. Feature Behavior
          2.5.5.1.3. Multi-Area and Multi-Instance Support
          2.5.5.1.4. Mesh LSP Name Encoding and Statistics
        2.5.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
          2.5.5.2.1. Feature Configuration
          2.5.5.2.2. Feature Behavior
      2.5.6. IGP Shortcut and Forwarding Adjacency
        2.5.6.1. IGP Shortcut Feature Configuration
          2.5.6.1.1. IGP Shortcut Binding Construct
        2.5.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
          2.5.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
          2.5.6.2.2. Application Support
          2.5.6.2.3. Loop-free Alternate (LFA) Protection Support
        2.5.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
          2.5.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
          2.5.6.3.2. Application Support
          2.5.6.3.3. Loop-free Alternate (LFA) Protection Support
        2.5.6.4. Using LSP Relative Metric with IGP Shortcut
        2.5.6.5. ECMP Considerations
        2.5.6.6. Handling of Control Packets
        2.5.6.7. Forwarding Adjacency
        2.5.6.8. LDP Forwarding over IGP Shortcut
        2.5.6.9. Handling of Multicast Packets
      2.5.7. Disabling TTL Propagation in an LSP Shortcut
      2.5.8. RSVP-TE LSP Signaling using LSP Template
      2.5.9. Shared Risk Link Groups
        2.5.9.1. Enabling Disjoint Backup Paths
        2.5.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
        2.5.9.3. Static Configurations of SRLG Memberships
      2.5.10. TE Graceful Shutdown
      2.5.11. Soft Preemption of Diff-Serv RSVP LSP
      2.5.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
      2.5.13. Inter-Area TE LSP (ERO Expansion Method)
        2.5.13.1. Area Border Node FRR Protection for Inter-Area LSP
          2.5.13.1.1. Rerouting of Inter-Area LSP
          2.5.13.1.2. Behavior of MPLS Options in Inter-Area LSP
        2.5.13.2. Inter-Area LSP support of OSPF Virtual Links
        2.5.13.3. Area Border Node FRR Protection for Inter-Area LSP
      2.5.14. Timer-based Reversion for RSVP-TE LSPs
      2.5.15. MPLS Entropy Label
      2.5.16. LSP Tagging and Auto-Bind Using Tag Information
        2.5.16.1. Internal Route Color to LSP Color Matching Algorithm
        2.5.16.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
        2.5.16.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
      2.5.17. Accounting for Dark Bandwidth
    2.6. Point-to-Multipoint (P2MP) RSVP LSP
      2.6.1. Application in Video Broadcast
      2.6.2. P2MP LSP Data Plane
        2.6.2.1. Procedures at Ingress LER Node
        2.6.2.2. Procedures at LSR Node
        2.6.2.3. Procedures at Branch LSR Node
        2.6.2.4. Procedures at Egress LER Node
        2.6.2.5. Procedures at BUD LSR Node
      2.6.3. Ingress Path Management for P2MP LSP Packets
        2.6.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
      2.6.4. RSVP Control Plane in a P2MP LSP
      2.6.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        2.6.5.1. Procedures at Ingress LER Node
        2.6.5.2. Procedures at Egress LER Node
          2.6.5.2.1. Procedures with a Primary Tunnel Interface
    2.7. Segment Routing With Traffic Engineering (SR-TE)
      2.7.1. SR-TE Support
      2.7.2. SR-TE LSP Instantiation
        2.7.2.1. PCC-Initiated and PCC-Controlled LSP
          2.7.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
        2.7.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
      2.7.3. SR-TE LSP Path Computation
        2.7.3.1. Service and Shortcut Application SR-TE Label Stack Check
      2.7.4. SR-TE LSP Protection
      2.7.5. Static Route Resolution using SR-TE LSP
      2.7.6. BGP Shortcuts Using SR-TE LSP
      2.7.7. BGP Label Route Resolution Using SR-TE LSP
      2.7.8. Service Packet Forwarding using SR-TE LSP
      2.7.9. Data Path Support
        2.7.9.1. SR-TE LSP Metric and MTU Settings
        2.7.9.2. Hash Label and Entropy Label Support
      2.7.10. SR-TE Auto-LSP
        2.7.10.1. Feature Configuration
        2.7.10.2. Automatic Creation of an SR-TE Mesh LSP
        2.7.10.3. Automatic Creation of an SR-TE One-Hop LSP
        2.7.10.4. Interaction with PCEP
        2.7.10.5. Forwarding Contexts Supported with SR-TE Auto-LSP
    2.8. MPLS Service Usage
      2.8.1. Service Distribution Paths
    2.9. MPLS/RSVP Configuration Process Overview
    2.10. Configuration Notes
    2.11. Configuring MPLS and RSVP with CLI
      2.11.1. MPLS Configuration Overview
        2.11.1.1. LSPs
        2.11.1.2. Paths
        2.11.1.3. Router Interface
        2.11.1.4. Choosing the Signaling Protocol
      2.11.2. Basic MPLS Configuration
      2.11.3. Common Configuration Tasks
      2.11.4. Configuring MPLS Components
        2.11.4.1. Configuring Global MPLS Parameters
        2.11.4.2. Configuring an MPLS Interface
        2.11.4.3. Configuring MPLS Paths
        2.11.4.4. Configuring an MPLS LSP
        2.11.4.5. Configuring a Static LSP
        2.11.4.6. Configuring Manual Bypass Tunnels
        2.11.4.7. Configuring RSVP Parameters
        2.11.4.8. Configure RSVP Message Pacing Parameters
        2.11.4.9. Configuring Graceful Shutdown
    2.12. MPLS Configuration Management Tasks
      2.12.1. Deleting MPLS
      2.12.2. Modifying MPLS Parameters
      2.12.3. Modifying an MPLS LSP
      2.12.4. Modifying MPLS Path Parameters
      2.12.5. Modifying MPLS Static LSP Parameters
      2.12.6. Deleting an MPLS Interface
    2.13. RSVP Configuration Management Tasks
      2.13.1. Modifying RSVP Parameters
      2.13.2. Modifying RSVP Message Pacing Parameters
      2.13.3. Deleting an Interface from RSVP
    2.14. Configuring and Operating SR-TE
      2.14.1. SR-TE Configuration Prerequisites
      2.14.2. SR-TE LSP Configuration Overview
      2.14.3. Configuring Path Computation and Control for SR-TE LSP
        2.14.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
      2.14.4. Configuring SR-TE LSP Label Stack Size
      2.14.5. Configuring Adjacency SID Parameters
      2.14.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
      2.14.7. Configuring a Mesh of SR-TE Auto-LSPs
    2.15. MPLS/RSVP Configuration Command Reference
      2.15.1. Command Hierarchies
        2.15.1.1. MPLS Commands
        2.15.1.2. MPLS-TP Commands
        2.15.1.3. MPLS-Label Commands
        2.15.1.4. LSP Commands
        2.15.1.5. LSP-BFD Commands
        2.15.1.6. RIB-API Commands
        2.15.1.7. MPLS Path Commands
        2.15.1.8. RSVP Commands
      2.15.2. Command Descriptions
        2.15.2.1. MPLS Commands
          2.15.2.1.1. Generic Commands
          2.15.2.1.2. MPLS Commands
          2.15.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
        2.15.2.2. RSVP Commands
          2.15.2.2.1. Generic Commands
          2.15.2.2.2. RSVP Commands
          2.15.2.2.3. Interface Commands
          2.15.2.2.4. Message Pacing Commands
    2.16. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      2.16.1. Command Hierarchies
        2.16.1.1. Show Commands
        2.16.1.2. Tools Commands
        2.16.1.3. Router Commands
        2.16.1.4. Clear Commands
        2.16.1.5. Debug Commands
      2.16.2. Command Descriptions
        2.16.2.1. Show Commands
        2.16.2.2. Show MPLS-Labels Commands
        2.16.2.3. Show Router BFD session Commands
        2.16.2.4. Show RSVP Commands
        2.16.2.5. Tools Commands
        2.16.2.6. Clear Commands
        2.16.2.7. Debug Commands
  3. GMPLS
    3.1. GMPLS
      3.1.1. Example Applications
        3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
        3.1.1.2. Use Case 2: Multi-Layer Resiliency
    3.2. GMPLS UNI Architecture
      3.2.1. Addressing and End-to-End gLSP Architecture
    3.3. 1830 PSS Identifiers
    3.4. Recovery Reference Models
      3.4.1. End to End Recovery (IP-layer)
      3.4.2. End to End ECMP
      3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      3.4.4. End to End Recovery (GMPLS Layer)
        3.4.4.1. Unprotected gLSP
        3.4.4.2. Full LSP Rerouting
        3.4.4.3. 1: N Protection
        3.4.4.4. Optical Segment Recovery
    3.5. GMPLS Configuration Overview
    3.6. LMP and IPCC Configuration
      3.6.1. Configuration of IP Communication Channels for LMP and RSVP
      3.6.2. Configuring LMP
      3.6.3. Configuring Traffic Engineering Links and Data Bearers
    3.7. Configuring MPLS Paths for GMPLS
    3.8. Configuring RSVP in GMPLS
    3.9. Configuring a GMPLS LSP on the UNI
      3.9.1. gLSP Constraints
    3.10. Bandwidth
    3.11. Shared Risk Link Groups
    3.12. Optical Network Segment Recovery
    3.13. Configuration of End-to-End GMPLS Recovery
    3.14. GMPLS Tunnel Groups
    3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    3.16. Configuration Notes
    3.17. GMPLS Configuration Command Reference
      3.17.1. Command Hierarchies
        3.17.1.1. LMP Commands
        3.17.1.2. GMPLS Commands
        3.17.1.3. GMPLS Tunnel Group Commands
      3.17.2. Command Descriptions
        3.17.2.1. LMP Commands
        3.17.2.2. GMPLS Commands
          3.17.2.2.1. GMPLS Tunnel Group Commands
    3.18. Show, Clear, Debug, and Tools Command Reference
      3.18.1. Command Hierarchies
        3.18.1.1. Show Commands
        3.18.1.2. Clear Commands
        3.18.1.3. Debug Commands
        3.18.1.4. Tools Commands
      3.18.2. Command Descriptions
        3.18.2.1. Show Commands
        3.18.2.2. Clear Commands
        3.18.2.3. Debug Commands
        3.18.2.4. Tools Commands
  4. MPLS Forwarding Policy
    4.1. Introduction
    4.2. Feature Validation and Operation Procedures
      4.2.1. Policy Parameters and Validation Procedure Rules
      4.2.2. Policy Resolution and Operational Procedures
    4.3. Tunnel Table Handling of MPLS Forwarding Policy
    4.4. Data Path Support
      4.4.1. NHG of Resolution Type Indirect
      4.4.2. NHG of Resolution Type Direct
        4.4.2.1. Active Path Determination and Failover in a NHG of Resolution Type Direct
      4.4.3. Spraying of Packets in a MPLS Forwarding Policy
      4.4.4. Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
      4.4.5. Ethertype Setting and TTL Handling in Endpoint Policy
    4.5. Weighted ECMP Enabling and Validation Rules
    4.6. Statistics
      4.6.1. Ingress Statistics
    4.7. Configuring Static Label Routes using MPLS Forwarding Policy
      4.7.1. Steering Flows to an Indirect Next-Hop
      4.7.2. Steering Flows to a Direct Next-Hop
    4.8. SLR Configuration Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. MPLS SLR Forwarding Policy Commands
      4.8.2. Command Descriptions
        4.8.2.1. MPLS SLR Forwarding Policy Commands
    4.9. SLR Show Command Reference
      4.9.1. Command Hierarchies
        4.9.1.1. Show Commands
      4.9.2. Command Descriptions
        4.9.2.1. Show Commands
  5. PCEP
    5.1. Introduction to the Path Computation Element Protocol (PCEP)
      5.1.1. PCC and PCE Configuration
      5.1.2. Base Implementation of Path Computation Elements (PCE)
      5.1.3. PCEP Session Establishment and Maintenance
      5.1.4. PCEP Parameters
        5.1.4.1. Stateful PCE
        5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
        5.1.4.3. LSP Initiation
          5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
          5.1.4.3.2. PCE-Initiated LSPs
          5.1.4.3.3. LSP Instantiation Using PCEP
          5.1.4.3.4. LSP Deletion Using PCEP
          5.1.4.3.5. Dynamic State Handling for PCE Initiated LSPs
          5.1.4.3.6. PCEP Support for RSVP-TE LSP
          5.1.4.3.7. LSP Path Diversity and Bidirectionality Constraints
    5.2. NSP and VSR-NRC PCE Redundancy
      5.2.1. Feature Configuration
      5.2.2. Feature Behavior
        5.2.2.1. NSP Cluster Behavior
        5.2.2.2. VSR-NRC Behavior
        5.2.2.3. PCC Behavior
    5.3. Configuring and Operating RSVP-TE LSP with PCEP
    5.4. PCEP Configuration Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. PCEP Commands
      5.4.2. Command Descriptions
        5.4.2.1. PCEP Commands
    5.5. PCEP Show and Tools Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Show Commands
        5.5.1.2. Tools Commands
      5.5.2. Command Descriptions
        5.5.2.1. Show Commands
        5.5.2.2. Tools Commands
  6. Segment Routing Policies
    6.1. Statically-Configured Segment Routing Policies
    6.2. BGP Signaled Segment Routing Policies
    6.3. Segment Routing Policy Path Selection and Tie-Breaking
    6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
      6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
      6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
  7. Label Distribution Protocol
    7.1. Label Distribution Protocol
      7.1.1. LDP and MPLS
      7.1.2. LDP Architecture
      7.1.3. Subsystem Interrelationships
        7.1.3.1. Memory Manager and LDP
        7.1.3.2. Label Manager
        7.1.3.3. LDP Configuration
        7.1.3.4. Logger
        7.1.3.5. Service Manager
      7.1.4. Execution Flow
        7.1.4.1. Initialization
        7.1.4.2. Session Lifetime
          7.1.4.2.1. Adjacency Establishment
          7.1.4.2.2. Session Establishment
      7.1.5. Label Exchange
        7.1.5.1. Other Reasons for Label Actions
        7.1.5.2. Cleanup
        7.1.5.3. Configuring Implicit Null Label
      7.1.6. Global LDP Filters
        7.1.6.1. Per LDP Peer FEC Import and Export Policies
      7.1.7. Configuring Multiple LDP LSR ID
        7.1.7.1. Advertisement of FEC for Local LSR ID
      7.1.8. LDP FEC Resolution Per Specified Community
        7.1.8.1. Configuration
        7.1.8.2. Operation
      7.1.9. T-LDP hello reduction
      7.1.10. Tracking a T-LDP Peer with BFD
      7.1.11. Link LDP Hello Adjacency Tracking with BFD
      7.1.12. LDP LSP Statistics
      7.1.13. MPLS Entropy Label
      7.1.14. Importing LDP Tunnels to Non-Host Prefixes to TTM
    7.2. TTL Security for BGP and LDP
    7.3. ECMP Support for LDP
      7.3.1. Label Operations
    7.4. Unnumbered Interface Support in LDP
      7.4.1. Feature Configuration
      7.4.2. Operation of LDP over an Unnumbered IP Interface
        7.4.2.1. Link LDP
        7.4.2.2. Targeted LDP
        7.4.2.3. FEC Resolution
    7.5. LDP over RSVP Tunnels
      7.5.1. Signaling and Operation
        7.5.1.1. LDP Label Distribution and FEC Resolution
        7.5.1.2. Default FEC Resolution Procedure
        7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      7.5.2. Rerouting Around Failures
        7.5.2.1. LDP-over-RSVP Tunnel Protection
        7.5.2.2. ABR Protection
    7.6. LDP over RSVP Without Area Boundary
      7.6.1. LDP over RSVP and ECMP
    7.7. Weighted Load Balancing for LDP over RSVP
      7.7.1. Interaction with Class-Based Forwarding
    7.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      7.8.1. Configuration and Operation
      7.8.2. Support of a Class Forwarding Policy with LDP-over-RSVP
      7.8.3. Class Based Forwarding with ECMP
      7.8.4. LER and LSR Operations
    7.9. LDP ECMP Uniform Failover
    7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
      7.10.1. LDP FRR Configuration
        7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
      7.10.2. LDP FRR Procedures
        7.10.2.1. ECMP Considerations
        7.10.2.2. LDP FRR and LDP Shortcut
        7.10.2.3. LDP FRR and LDP-over-RSVP
        7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
      7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
        7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    7.11. LDP FEC to BGP Label Route Stitching
      7.11.1. Configuration
      7.11.2. Detailed LDP FEC Resolution
      7.11.3. Detailed BGP Labeled Route Resolution
      7.11.4. Data Plane Forwarding
    7.12. LDP-SR Stitching for IPv4 prefixes
      7.12.1. LDP-SR Stitching Configuration
      7.12.2. Stitching in the LDP-to-SR Direction
      7.12.3. Stitching in the SR-to-LDP Direction
    7.13. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes
    7.14. Automatic Creation of a Targeted Hello Adjacency and LDP Session
      7.14.1. Feature Configuration
      7.14.2. Feature Behavior
    7.15. Multicast P2MP LDP for GRT
    7.16. LDP P2MP Support
      7.16.1. LDP P2MP Configuration
      7.16.2. LDP P2MP Protocol
      7.16.3. Make Before Break (MBB)
      7.16.4. ECMP Support
      7.16.5. Inter-AS Non-segmented mLDP
        7.16.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
        7.16.5.2. LDP Recursive FEC Process
        7.16.5.3. Supported Recursive Opaque Values
        7.16.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
        7.16.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
          7.16.5.5.1. Leaf and ABR Behavior
          7.16.5.5.2. Intra-AS Support
          7.16.5.5.3. Opaque Type Behavior with Basic FEC Generation
          7.16.5.5.4. Inter-AS Support
        7.16.5.6. Redundancy and Resiliency
        7.16.5.7. ASBR Physical Connection
        7.16.5.8. OAM
        7.16.5.9. ECMP Support
          7.16.5.9.1. ECMP Hash Algorithm
        7.16.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
      7.16.6. Intra-AS Non-segmented mLDP
        7.16.6.1. ABR MoFRR for Intra-AS
        7.16.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
      7.16.7. ASBR MoFRR
        7.16.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
        7.16.7.2. ASBR MoFRR Leaf Behavior
        7.16.7.3. ASBR MoFRR ASBR Behavior
        7.16.7.4. MoFRR Root AS Behavior
        7.16.7.5. Traffic Flow
        7.16.7.6. Failure Detection and Handling
        7.16.7.7. Failure Scenario
        7.16.7.8. ASBR MoFRR Consideration
        7.16.7.9. ASBR MoFRR Opaque Support
      7.16.8. MBB for MoFRR
      7.16.9. Add-path for Route Reflectors
    7.17. Multicast LDP Fast Upstream Switchover
      7.17.1. Feature Configuration
      7.17.2. Feature Behavior
      7.17.3. Uniform Failover from Primary to Backup ILM
    7.18. Multi-Area and Multi-Instance Extensions to LDP
      7.18.1. LDP Shortcut for BGP Next-Hop Resolution
      7.18.2. LDP Shortcut for IGP Routes
        7.18.2.1. LDP Shortcut Configuration
        7.18.2.2. IGP Route Resolution
        7.18.2.3. LDP Shortcut Forwarding Plane
      7.18.3. ECMP Considerations
      7.18.4. Disabling TTL Propagation in an LSP Shortcut
    7.19. LDP Graceful Handling of Resource Exhaustion
      7.19.1. LDP Base Graceful Handling of Resources
    7.20. LDP Enhanced Graceful Handling of Resources
      7.20.1. LSR Overload Notification
      7.20.2. LSR Overload Protection Capability
      7.20.3. Procedures for LSR overload protection
    7.21. LDP-IGP Synchronization
    7.22. MLDP Resolution using Multicast RTM
      7.22.1. Other Considerations for Multicast RTM MLDP Resolution
    7.23. Bidirectional Forwarding Detection for LDP LSPs
      7.23.1. Bootstrapping and Maintaining LSP BFD Sessions
      7.23.2. BFD Configuration on LDP LSPs
    7.24. User Guidelines and Troubleshooting Procedures
      7.24.1. Common Procedures
      7.24.2. Base Resource Handling Procedures
      7.24.3. Enhanced Resource Handling Procedures
    7.25. LDP IPv6 Control and Data Planes
      7.25.1. LDP Operation in an IPv6 Network
      7.25.2. Link LDP
      7.25.3. Targeted LDP
      7.25.4. FEC Resolution
      7.25.5. LDP Session Capabilities
      7.25.6. LDP Adjacency Capabilities
      7.25.7. Address and FEC Distribution
      7.25.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      7.25.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      7.25.10. IGP and Static Route Synchronization with LDP
      7.25.11. BFD Operation
      7.25.12. Services Using SDP with an LDP IPv6 FEC
      7.25.13. Mirror Services and Lawful Intercept
        7.25.13.1. Configuration at mirror source node
        7.25.13.2. Configuration at mirror destination node
      7.25.14. Static Route Resolution to a LDP IPv6 FEC
      7.25.15. IGP Route Resolution to a LDP IPv6 FEC
      7.25.16. OAM Support with LDP IPv6
      7.25.17. LDP IPv6 Interoperability Considerations
        7.25.17.1. Interoperability with Implementations Compliant with RFC 7552
        7.25.17.2. LDP IPv6 32-bit LSR-ID
          7.25.17.2.1. Feature Configuration
          7.25.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
          7.25.17.2.3. Migration Considerations
        7.25.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    7.26. LDP Process Overview
    7.27. Configuring LDP with CLI
      7.27.1. LDP Configuration Overview
      7.27.2. Basic LDP Configuration
      7.27.3. Common Configuration Tasks
        7.27.3.1. Enabling LDP
        7.27.3.2. Configuring FEC Originate Parameters
        7.27.3.3. Configuring Graceful-Restart Helper Parameters
        7.27.3.4. Applying Export and Import Policies
        7.27.3.5. Targeted Session Parameters
        7.27.3.6. Interface Parameters
        7.27.3.7. Session Parameters
        7.27.3.8. LDP Signaling and Services
    7.28. LDP Configuration Management Tasks
      7.28.1. Disabling LDP
      7.28.2. Modifying Targeted Session Parameters
      7.28.3. Modifying Interface Parameters
    7.29. LDP Command Reference
      7.29.1. Command Hierarchies
        7.29.1.1. LDP Commands
      7.29.2. Command Descriptions
        7.29.2.1. Generic Commands
        7.29.2.2. LDP Commands
        7.29.2.3. Interface Parameters Commands
        7.29.2.4. Session Parameters Commands
        7.29.2.5. Targeted Session Commands
        7.29.2.6. TCP Session Parameters Commands
    7.30. Show, Clear, Debug, and Tools Command Reference
      7.30.1. Command Hierarchies
        7.30.1.1. Show Commands
        7.30.1.2. Clear Commands
        7.30.1.3. Debug Commands
        7.30.1.4. Tools Commands
      7.30.2. Command Descriptions
        7.30.2.1. Show LDP Commands
        7.30.2.2. Clear Commands
        7.30.2.3. Debug Commands
        7.30.2.4. Tools Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
Multicast Routing Protocols Guide 16.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Multicast Configuration Process
  2. Introduction to Multicast
    2.1. Multicast Overview
    2.2. Multicast Models
      2.2.1. Any-Source Multicast (ASM)
      2.2.2. Source Specific Multicast (SSM)
      2.2.3. Multicast in IP-VPN Networks
  3. IGMP
    3.1. IGMP Overview
      3.1.1. IGMP Versions and Interoperability Requirements
      3.1.2. IGMP Version Transition
      3.1.3. Source-Specific Multicast Groups
      3.1.4. Query Messages
    3.2. Configuring IGMP with CLI
      3.2.1. IGMP Configuration Overview
      3.2.2. Basic IGMP Configuration
      3.2.3. Configuring IGMP Parameters
        3.2.3.1. Enabling IGMP
        3.2.3.2. Configuring an IGMP Interface
        3.2.3.3. Configuring Static Parameters
        3.2.3.4. Configuring SSM Translation
      3.2.4. Disabling IGMP
    3.3. IGMP Configuration Command Reference
      3.3.1. Command Hierarchies
        3.3.1.1. IGMP Configuration Commands
      3.3.2. Command Descriptions
        3.3.2.1. Router IGMP Commands
    3.4. Show, Clear, and Debug Command Reference
      3.4.1. Command Hierarchies
        3.4.1.1. Show Commands
        3.4.1.2. Clear Commands
        3.4.1.3. Debug Commands
      3.4.2. Command Descriptions
        3.4.2.1. Show Commands
        3.4.2.2. Clear Commands
        3.4.2.3. Debug Commands
  4. MLD
    4.1. MLD Overview
      4.1.1. MLDv1
      4.1.2. MLDv2
    4.2. Configuring MLD with CLI
      4.2.1. MLD Configuration Overview
      4.2.2. Basic MLD Configuration
      4.2.3. Configuring MLD Parameters
        4.2.3.1. Enabling MLD
        4.2.3.2. Configuring an MLD Interface
        4.2.3.3. Configuring Static Parameters
        4.2.3.4. Configuring SSM Translation
      4.2.4. Disabling MLD
    4.3. MSDP Configuration Command Reference
      4.3.1. Command Hierarchies
        4.3.1.1. Configuration Commands
      4.3.2. Command Descriptions
        4.3.2.1. MSDP Commands
    4.4. Show, Clear, and Debug Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Show Commands
        4.4.1.2. Clear Commands
      4.4.2. Command Descriptions
        4.4.2.1. Show Commands
        4.4.2.2. Clear Commands
  5. PIM
    5.1. PIM Overview
      5.1.1. PIM-SM Functions
        5.1.1.1. Phase One
        5.1.1.2. Phase Two
        5.1.1.3. Phase Three
      5.1.2. Encapsulating Data Packets in the Register Tunnel
      5.1.3. PIM Bootstrap Router Mechanism
      5.1.4. PIM-SM Routing Policies
      5.1.5. Reverse Path Forwarding Checks
      5.1.6. Anycast RP for PIM-SM
        5.1.6.1. Implementation
      5.1.7. Distributing PIM Joins over Multiple ECMP Paths
      5.1.8. PIM Interface on IES Subscriber Group Interfaces
      5.1.9. Multicast-Only Fast Reroute (MoFRR)
      5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      5.1.11. VRRP Aware PIM
        5.1.11.1. Configuring VRRP Aware PIM
        5.1.11.2. Configuration Recommendations
          5.1.11.2.1. Primary Router Example
          5.1.11.2.2. Secondary Router Example
    5.2. IPv6 PIM models
      5.2.1. PIM-SSM
      5.2.2. PIM ASM
      5.2.3. Embedded RP
    5.3. Configuring PIM with CLI
      5.3.1. PIM Configuration Overview
      5.3.2. Basic PIM Configuration
      5.3.3. Configuring PIM Parameters
        5.3.3.1. Enabling PIM
        5.3.3.2. Configuring PIM Interface Parameters
        5.3.3.3. Configuring PIM Join/Register Policies
        5.3.3.4. Importing PIM Join/Register Policies
        5.3.3.5. Configuring Bootstrap Message Import and Export Policies
      5.3.4. Disabling PIM
    5.4. PIM Configuration Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. Configuration Commands
      5.4.2. Command Descriptions
        5.4.2.1. Router PIM Commands
    5.5. Show, Clear, and Debug Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Show Commands
        5.5.1.2. Clear Commands
        5.5.1.3. Debug Commands
      5.5.2. Command Descriptions
        5.5.2.1. Show Commands
        5.5.2.2. Clear Commands
        5.5.2.3. Debug Commands
  6. MSDP
    6.1. Multicast Source Discovery Protocol
      6.1.1. Anycast RP for MSDP
      6.1.2. MSDP Procedure
        6.1.2.1. MSDP Peering Scenarios
      6.1.3. MSDP Peer Groups
      6.1.4. MSDP Mesh Groups
      6.1.5. MSDP Routing Policies
      6.1.6. Multicast in Virtual Private Networks
        6.1.6.1. Draft Rosen
    6.2. Configuring MSDP with CLI
      6.2.1. Basic MSDP Configuration
      6.2.2. Configuring MSDP Parameters
      6.2.3. Disabling MSDP
    6.3. MSDP Configuration Command Reference
      6.3.1. Command Hierarchies
        6.3.1.1. Configuration Commands
      6.3.2. Command Descriptions
        6.3.2.1. MSDP Commands
    6.4. Show, Clear, and Debug Command Reference
      6.4.1. Command Hierarchies
        6.4.1.1. Show Commands
        6.4.1.2. Clear Commands
        6.4.1.3. Debug Commands
      6.4.2. Command Descriptions
        6.4.2.1. Show Commands
        6.4.2.2. Clear Commands
        6.4.2.3. Debug Commands
  7. MLDP
    7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
    7.2. Inter-AS Non-segmented MLDP
      7.2.1. d-MLDP Inter-AS Trees in GRT
        7.2.1.1. Routing
        7.2.1.2. Join Processing
      7.2.2. ASBR Support of PE Functionality
    7.3. Hashing for Inter-AS
    7.4. Hashing at the ASBR
  8. Multicast Extensions to BGP
    8.1. Multicast Extensions to BGP
      8.1.1. MBGP Multicast Topology Support
        8.1.1.1. Recursive Lookup for BGP Next Hops
  9. MCAC
    9.1. MCAC Overview
      9.1.1. MCAC Bundle Policy Overview
      9.1.2. MCAC Algorithm
        9.1.2.1. Interface-level MCAC details
          9.1.2.1.1. MCAC-interface-policy-level MCAC details
        9.1.2.2. Bundle-level MCAC details
      9.1.3. MCAC on Link Aggregation Group Interfaces
    9.2. Configuring MCAC with CLI
      9.2.1. Basic MCAC Configuration
      9.2.2. Configuring MCAC Parameters
    9.3. MCAC Configuration Command Reference
      9.3.1. Command Hierarchies
        9.3.1.1. MCAC Configuration Commands
        9.3.1.2. MCAC Policy Commands
      9.3.2. Command Descriptions
        9.3.2.1. MCAC Configuration Commands
    9.4. Show, Clear, and Debug Command Reference
      9.4.1. Command Hierarchies
        9.4.1.1. Show Commands
        9.4.1.2. Clear Commands
      9.4.2. Command Descriptions
        9.4.2.1. Show Commands
        9.4.2.2. Clear Commands
  10. GTM
    10.1. GTM Overview
      10.1.1. Using BGP-MVPN Procedures in GTM
        10.1.1.1. Route Distinguishers and Route Targets
        10.1.1.2. UMH-Eligible Routes
        10.1.1.3. BGP Route Types Supported
    10.2. Configuring GTM
      10.2.1. Configuration Recommendations
      10.2.2. Configuring GTM with CLI
    10.3. GTM Configuration Command Reference
      10.3.1. Command Hierarchies
        10.3.1.1. Configuration Commands
      10.3.2. Command Descriptions
        10.3.2.1. GTM Commands
    10.4. Show, Clear, and Debug Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Show Commands
  11. BIER
    11.1. BIER Overview
      11.1.1. BIER Hardware
      11.1.2. BIER ECMP
      11.1.3. BIER Redundancy and Resiliency
      11.1.4. BIER Layers
      11.1.5. Implementation
        11.1.5.1. BIER Sub-domains
        11.1.5.2. BIER Set IDs
        11.1.5.3. BIER Encapsulation
          11.1.5.3.1. BIER MPLS Encapsulation
        11.1.5.4. BIER Forwarding Tables
        11.1.5.5. BIER IS-IS Sub-TLVs
        11.1.5.6. IS-IS BIER Support
        11.1.5.7. IS-IS Multi-topologies
        11.1.5.8. BIER Intra-AS Solution
        11.1.5.9. BIER Forwarding
          11.1.5.9.1. BIER FIB Packet Handling
        11.1.5.10. BIER MVPN
          11.1.5.10.1. BIER MVPN IPv4 and IPv6
          11.1.5.10.2. BIER MVPN Sub-domain
          11.1.5.10.3. BIER Templates
    11.2. BIER Configuration Command Reference
      11.2.1. Command Hierarchies
        11.2.1.1. Configuration Commands
      11.2.2. Command Descriptions
        11.2.2.1. BIER Commands
    11.3. Show, Clear, and Debug Command Reference
      11.3.1. Command Hierarchies
        11.3.1.1. Show Commands
      11.3.2. Command Descriptions
        11.3.2.1. Show Commands
  12. Troubleshooting Tools
    12.1. Mtrace
      12.1.1. Finding the Last Hop Router
      12.1.2. Directing the Response
    12.2. Mstat
    12.3. Mrinfo
    12.4. Troubleshooting Configuration Command Reference
      12.4.1. Command Hierarchies
        12.4.1.1. Operational Commands
      12.4.2. Command Descriptions
        12.4.2.1. Operational Commands
    12.5. Show Command Reference
      12.5.1. Command Hierarchies
        12.5.1.1. Show Commands
      12.5.2. Command Descriptions
        12.5.2.1. Show Commands
  13. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Multicast Configuration Process
  2. Introduction to Multicast
    2.1. Multicast Overview
    2.2. Multicast Models
      2.2.1. Any-Source Multicast (ASM)
      2.2.2. Source Specific Multicast (SSM)
      2.2.3. Multicast in IP-VPN Networks
  3. IGMP
    3.1. IGMP Overview
      3.1.1. IGMP Versions and Interoperability Requirements
      3.1.2. IGMP Version Transition
      3.1.3. Source-Specific Multicast Groups
      3.1.4. Query Messages
    3.2. Configuring IGMP with CLI
      3.2.1. IGMP Configuration Overview
      3.2.2. Basic IGMP Configuration
      3.2.3. Configuring IGMP Parameters
        3.2.3.1. Enabling IGMP
        3.2.3.2. Configuring an IGMP Interface
        3.2.3.3. Configuring Static Parameters
        3.2.3.4. Configuring SSM Translation
      3.2.4. Disabling IGMP
    3.3. IGMP Configuration Command Reference
      3.3.1. Command Hierarchies
        3.3.1.1. IGMP Configuration Commands
      3.3.2. Command Descriptions
        3.3.2.1. Router IGMP Commands
    3.4. Show, Clear, and Debug Command Reference
      3.4.1. Command Hierarchies
        3.4.1.1. Show Commands
        3.4.1.2. Clear Commands
        3.4.1.3. Debug Commands
      3.4.2. Command Descriptions
        3.4.2.1. Show Commands
        3.4.2.2. Clear Commands
        3.4.2.3. Debug Commands
  4. MLD
    4.1. MLD Overview
      4.1.1. MLDv1
      4.1.2. MLDv2
    4.2. Configuring MLD with CLI
      4.2.1. MLD Configuration Overview
      4.2.2. Basic MLD Configuration
      4.2.3. Configuring MLD Parameters
        4.2.3.1. Enabling MLD
        4.2.3.2. Configuring an MLD Interface
        4.2.3.3. Configuring Static Parameters
        4.2.3.4. Configuring SSM Translation
      4.2.4. Disabling MLD
    4.3. MSDP Configuration Command Reference
      4.3.1. Command Hierarchies
        4.3.1.1. Configuration Commands
      4.3.2. Command Descriptions
        4.3.2.1. MSDP Commands
    4.4. Show, Clear, and Debug Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Show Commands
        4.4.1.2. Clear Commands
      4.4.2. Command Descriptions
        4.4.2.1. Show Commands
        4.4.2.2. Clear Commands
  5. PIM
    5.1. PIM Overview
      5.1.1. PIM-SM Functions
        5.1.1.1. Phase One
        5.1.1.2. Phase Two
        5.1.1.3. Phase Three
      5.1.2. Encapsulating Data Packets in the Register Tunnel
      5.1.3. PIM Bootstrap Router Mechanism
      5.1.4. PIM-SM Routing Policies
      5.1.5. Reverse Path Forwarding Checks
      5.1.6. Anycast RP for PIM-SM
        5.1.6.1. Implementation
      5.1.7. Distributing PIM Joins over Multiple ECMP Paths
      5.1.8. PIM Interface on IES Subscriber Group Interfaces
      5.1.9. Multicast-Only Fast Reroute (MoFRR)
      5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      5.1.11. VRRP Aware PIM
        5.1.11.1. Configuring VRRP Aware PIM
        5.1.11.2. Configuration Recommendations
          5.1.11.2.1. Primary Router Example
          5.1.11.2.2. Secondary Router Example
    5.2. IPv6 PIM models
      5.2.1. PIM-SSM
      5.2.2. PIM ASM
      5.2.3. Embedded RP
    5.3. Configuring PIM with CLI
      5.3.1. PIM Configuration Overview
      5.3.2. Basic PIM Configuration
      5.3.3. Configuring PIM Parameters
        5.3.3.1. Enabling PIM
        5.3.3.2. Configuring PIM Interface Parameters
        5.3.3.3. Configuring PIM Join/Register Policies
        5.3.3.4. Importing PIM Join/Register Policies
        5.3.3.5. Configuring Bootstrap Message Import and Export Policies
      5.3.4. Disabling PIM
    5.4. PIM Configuration Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. Configuration Commands
      5.4.2. Command Descriptions
        5.4.2.1. Router PIM Commands
    5.5. Show, Clear, and Debug Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Show Commands
        5.5.1.2. Clear Commands
        5.5.1.3. Debug Commands
      5.5.2. Command Descriptions
        5.5.2.1. Show Commands
        5.5.2.2. Clear Commands
        5.5.2.3. Debug Commands
  6. MSDP
    6.1. Multicast Source Discovery Protocol
      6.1.1. Anycast RP for MSDP
      6.1.2. MSDP Procedure
        6.1.2.1. MSDP Peering Scenarios
      6.1.3. MSDP Peer Groups
      6.1.4. MSDP Mesh Groups
      6.1.5. MSDP Routing Policies
      6.1.6. Multicast in Virtual Private Networks
        6.1.6.1. Draft Rosen
    6.2. Configuring MSDP with CLI
      6.2.1. Basic MSDP Configuration
      6.2.2. Configuring MSDP Parameters
      6.2.3. Disabling MSDP
    6.3. MSDP Configuration Command Reference
      6.3.1. Command Hierarchies
        6.3.1.1. Configuration Commands
      6.3.2. Command Descriptions
        6.3.2.1. MSDP Commands
    6.4. Show, Clear, and Debug Command Reference
      6.4.1. Command Hierarchies
        6.4.1.1. Show Commands
        6.4.1.2. Clear Commands
        6.4.1.3. Debug Commands
      6.4.2. Command Descriptions
        6.4.2.1. Show Commands
        6.4.2.2. Clear Commands
        6.4.2.3. Debug Commands
  7. MLDP
    7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
    7.2. Inter-AS Non-segmented MLDP
      7.2.1. d-MLDP Inter-AS Trees in GRT
        7.2.1.1. Routing
        7.2.1.2. Join Processing
      7.2.2. ASBR Support of PE Functionality
    7.3. Hashing for Inter-AS
    7.4. Hashing at the ASBR
  8. Multicast Extensions to BGP
    8.1. Multicast Extensions to BGP
      8.1.1. MBGP Multicast Topology Support
        8.1.1.1. Recursive Lookup for BGP Next Hops
  9. MCAC
    9.1. MCAC Overview
      9.1.1. MCAC Bundle Policy Overview
      9.1.2. MCAC Algorithm
        9.1.2.1. Interface-level MCAC details
          9.1.2.1.1. MCAC-interface-policy-level MCAC details
        9.1.2.2. Bundle-level MCAC details
      9.1.3. MCAC on Link Aggregation Group Interfaces
    9.2. Configuring MCAC with CLI
      9.2.1. Basic MCAC Configuration
      9.2.2. Configuring MCAC Parameters
    9.3. MCAC Configuration Command Reference
      9.3.1. Command Hierarchies
        9.3.1.1. MCAC Configuration Commands
        9.3.1.2. MCAC Policy Commands
      9.3.2. Command Descriptions
        9.3.2.1. MCAC Configuration Commands
    9.4. Show, Clear, and Debug Command Reference
      9.4.1. Command Hierarchies
        9.4.1.1. Show Commands
        9.4.1.2. Clear Commands
      9.4.2. Command Descriptions
        9.4.2.1. Show Commands
        9.4.2.2. Clear Commands
  10. GTM
    10.1. GTM Overview
      10.1.1. Using BGP-MVPN Procedures in GTM
        10.1.1.1. Route Distinguishers and Route Targets
        10.1.1.2. UMH-Eligible Routes
        10.1.1.3. BGP Route Types Supported
    10.2. Configuring GTM
      10.2.1. Configuration Recommendations
      10.2.2. Configuring GTM with CLI
    10.3. GTM Configuration Command Reference
      10.3.1. Command Hierarchies
        10.3.1.1. Configuration Commands
      10.3.2. Command Descriptions
        10.3.2.1. GTM Commands
    10.4. Show, Clear, and Debug Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Show Commands
  11. BIER
    11.1. BIER Overview
      11.1.1. BIER Hardware
      11.1.2. BIER ECMP
      11.1.3. BIER Redundancy and Resiliency
      11.1.4. BIER Layers
      11.1.5. Implementation
        11.1.5.1. BIER Sub-domains
        11.1.5.2. BIER Set IDs
        11.1.5.3. BIER Encapsulation
          11.1.5.3.1. BIER MPLS Encapsulation
        11.1.5.4. BIER Forwarding Tables
        11.1.5.5. BIER IS-IS Sub-TLVs
        11.1.5.6. IS-IS BIER Support
        11.1.5.7. IS-IS Multi-topologies
        11.1.5.8. BIER Intra-AS Solution
        11.1.5.9. BIER Forwarding
          11.1.5.9.1. BIER FIB Packet Handling
        11.1.5.10. BIER MVPN
          11.1.5.10.1. BIER MVPN IPv4 and IPv6
          11.1.5.10.2. BIER MVPN Sub-domain
          11.1.5.10.3. BIER Templates
    11.2. BIER Configuration Command Reference
      11.2.1. Command Hierarchies
        11.2.1.1. Configuration Commands
      11.2.2. Command Descriptions
        11.2.2.1. BIER Commands
    11.3. Show, Clear, and Debug Command Reference
      11.3.1. Command Hierarchies
        11.3.1.1. Show Commands
      11.3.2. Command Descriptions
        11.3.2.1. Show Commands
  12. Troubleshooting Tools
    12.1. Mtrace
      12.1.1. Finding the Last Hop Router
      12.1.2. Directing the Response
    12.2. Mstat
    12.3. Mrinfo
    12.4. Troubleshooting Configuration Command Reference
      12.4.1. Command Hierarchies
        12.4.1.1. Operational Commands
      12.4.2. Command Descriptions
        12.4.2.1. Operational Commands
    12.5. Show Command Reference
      12.5.1. Command Hierarchies
        12.5.1.1. Show Commands
      12.5.2. Command Descriptions
        12.5.2.1. Show Commands
  13. Standards and Protocol Support
  Customer Document and Product Support
Multiservice Integrated Service Adapter Guide 16.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. ISA Configuration Process
  2. ISA Hardware
    2.1. In This Section
    2.2. MS-ISA2 Overview
    2.3. MS-ISA Overview
    2.4. MS-ISM Overview
    2.5. Application Assurance Hardware Features
      2.5.1. AA System Support
      2.5.2. Host IOM Support for AA on ISAs
  3. Application Assurance
    3.1. Application Assurance (AA) Overview
      3.1.1. Application Assurance: Inline Policy Enforcement
      3.1.2. AA Integration in Subscriber Edge Gateways
      3.1.3. Fixed Residential Broadband Services
        3.1.3.1. Dual-Stack Lite – DS-Lite
        3.1.3.2. 6to4 /6RD
      3.1.4. Wireless LAN Gateway Broadband Services
      3.1.5. Application-Aware Business VPN Services
      3.1.6. Business Mobile Backhaul
      3.1.7. SeGW Firewall Service
    3.2. Application Assurance System Architecture
      3.2.1. AA ISA Resource Configuration
        3.2.1.1. AA ISA Groups
          3.2.1.1.1. AA Group Partitions
          3.2.1.1.2. Bypass Modes
        3.2.1.2. Redundancy
          3.2.1.2.1. No AA ISA Group Redundancy
          3.2.1.2.2. Failure to Fabric
          3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
        3.2.1.3. ISA Load Balancing
        3.2.1.4. Asymmetry Removal
          3.2.1.4.1. Asymmetry Removal Overview
          3.2.1.4.2. Failure Modes
          3.2.1.4.3. AARP Peered Node/Instance Configuration
          3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
          3.2.1.4.5. Multi-Chassis Datapath Shunts
        3.2.1.5. ISA Overload Detection
      3.2.2. AA Packet Processing
        3.2.2.1. Divert of Traffic and Subscribers
          3.2.2.1.1. Services and AA Subscribers
          3.2.2.1.2. Spoke SDPs
          3.2.2.1.3. Transit AA Subscribers
          3.2.2.1.4. AA Subscriber Application Service Definition
        3.2.2.2. Application Identification
          3.2.2.2.1. Application Assurance Identification Components
          3.2.2.2.2. Protocol Signatures
          3.2.2.2.3. Custom Protocols
          3.2.2.2.4. Protocol Shutdown
          3.2.2.2.5. Supported Protocol Signatures
          3.2.2.2.6. Application Groups
          3.2.2.2.7. Charging Groups
          3.2.2.2.8. Applications
          3.2.2.2.9. Application Filters
          3.2.2.2.10. HTTP
          3.2.2.2.11. AA IP Prefix Lists
          3.2.2.2.12. Shallow Flow Inspection
        3.2.2.3. Statistics and Accounting
          3.2.2.3.1. Per-AA Subscriber Special Study
          3.2.2.3.2. System Aspects
          3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
          3.2.2.3.4. AA Partition Traffic Type Statistics
          3.2.2.3.5. Configurable AA Subscriber Statistics Collection
          3.2.2.3.6. AA-Performance Record for ISA Load
          3.2.2.3.7. AA Partition Traffic Type Statistics
          3.2.2.3.8. AA Partition Admit–Deny Statistics
          3.2.2.3.9. RADIUS Accounting AA Records
          3.2.2.3.10. AA GX Based Usage Monitoring
          3.2.2.3.11. Supported AVPs
          3.2.2.3.12. Cflowd AA Records
        3.2.2.4. Application QoS Policy (AQP)
          3.2.2.4.1. AQP Match Criteria
          3.2.2.4.2. AQP Actions
          3.2.2.4.3. Application Assurance Policers
          3.2.2.4.4. Time of Day Policing Adjustments
          3.2.2.4.5. Congestion Override Policing
          3.2.2.4.6. Dynamic Experience Management
          3.2.2.4.7. Application Assurance HTTP Redirect
          3.2.2.4.8. ICAP - Large Scale Category-based URL Filtering
          3.2.2.4.9. Local URL-List Filtering
          3.2.2.4.10. HTTP Header Enrichment
          3.2.2.4.11. HTTP In Browser Notification
        3.2.2.5. Application Assurance Firewall
          3.2.2.5.1. Denial of Service (DoS) Protection
          3.2.2.5.2. TCP Validation
          3.2.2.5.3. Policy Partitioned AA FW
          3.2.2.5.4. Configuring AA FW
          3.2.2.5.5. AA FW Logging
          3.2.2.5.6. SeGW Firewall Protection
      3.2.3. Service Monitoring and Debugging
      3.2.4. CPU Utilization
      3.2.5. CLI Batch: Begin, Commit and Abort Commands
    3.3. Configuring Application Assurance with CLI
      3.3.1. Provisioning AA ISA MDA
      3.3.2. Configuring an AA ISA Group
        3.3.2.1. Configuring Watermark Parameters
      3.3.3. Configuring a Group Policy
        3.3.3.1. Beginning and Committing a Policy Configuration
        3.3.3.2. Aborting a Policy Configuration
        3.3.3.3. Configuring an IP Prefix List
        3.3.3.4. Configuring AA Session Filters
        3.3.3.5. Configuring an Application Group
        3.3.3.6. Configuring an Application
        3.3.3.7. Configuring an Application Filter
        3.3.3.8. Configuring an Application Profile
        3.3.3.9. Configuring Suppressible App-Profile with SRRP
        3.3.3.10. Configuring Application Service Options
        3.3.3.11. Configuring a Policer
        3.3.3.12. Configuring an Application QoS Policy
        3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        3.3.3.14. Configuring an HTTP Error Redirect
        3.3.3.15. Configuring HTTP Header Enrichment
        3.3.3.16. Configuring an HTTP Redirect Policy
        3.3.3.17. Configuring a Captive Redirect HTTP Redirect Policy
          3.3.3.17.1. Captive-Redirect and HTTPS Flows Redirection
        3.3.3.18. Configuring ICAP URL Filtering
        3.3.3.19. Configuring Local URL-List Filtering
        3.3.3.20. Configuring HTTP Notification
      3.3.4. Configuring AA Volume Accounting and Statistics
        3.3.4.1. Configuring Cflowd Collector
        3.3.4.2. Configuring AA Volume, TCP and RTP Performance Reporting
    3.4. Application Assurance Command Reference
      3.4.1. Application Assurance Command Reference
        3.4.1.1. Hardware Commands
        3.4.1.2. Admin Commands
        3.4.1.3. ISA Commands
        3.4.1.4. Application Assurance Commands
          3.4.1.4.1. AA Commands
          3.4.1.4.2. AA Group Commands
        3.4.1.5. AA Interface Commands
        3.4.1.6. Persistence Commands
      3.4.2. Command Descriptions
        3.4.2.1. Generic Commands
        3.4.2.2. Admin Commands
        3.4.2.3. Application Assurance Commands
        3.4.2.4. Group Commands
          3.4.2.4.1. Transit Subscriber Commands
          3.4.2.4.2. Policer Commands
          3.4.2.4.3. Policy Commands
          3.4.2.4.4. Statistics Commands
          3.4.2.4.5. TCP Validation Commands
          3.4.2.4.6. Policy Commands
          3.4.2.4.7. System Persistence Commands
        3.4.2.5. ISA Commands
          3.4.2.5.1. Application Assurance Group Commands
    3.5. Show, Tools, Clear, and Debug Command Reference
      3.5.1. Command Hierarchies
        3.5.1.1. Show Commands
        3.5.1.2. Tools Commands
        3.5.1.3. Clear Commands
        3.5.1.4. Debug Commands
      3.5.2. Command Descriptions
        3.5.2.1. Show Commands
        3.5.2.2. Tools Commands
        3.5.2.3. Clear Commands
        3.5.2.4. Debug Commands
  4. IP Tunnels
    4.1. IP Tunnels Overview
      4.1.1. Tunnel ISAs
        4.1.1.1. Public Tunnel SAPs
        4.1.1.2. Private Tunnel SAPs
        4.1.1.3. IP Interface Configuration
        4.1.1.4. GRE and IP-IP Tunnel Configuration
        4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
        4.1.1.6. TCP MSS Adjustment
      4.1.2. Operational Conditions
        4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
      4.1.3. QoS Interactions
      4.1.4. OAM Interactions
      4.1.5. Redundancy
      4.1.6. Statistics Collection
      4.1.7. Security
        4.1.7.1. GRE Tunnel Multicast Support
        4.1.7.2. IPv6 over IPv4 GRE Tunnel
      4.1.8. IKEv2
        4.1.8.1. IKEv2 Traffic Selector and TS-List
        4.1.8.2. IKEv2 Fragmentation
      4.1.9. SHA2 Support
      4.1.10. IPsec Client Lockout
      4.1.11. IPsec Tunnel CHILD_SA Rekey
      4.1.12. Multiple IKE/ESP Transform Support
    4.2. X.509v3 Certificate Overview
      4.2.1. SR OS X.509v3 Certificate Support
      4.2.2. Local Storage
      4.2.3. CA-Profile
      4.2.4. CA Chain Computation
      4.2.5. Certificate Enrollment
      4.2.6. Certificate Revocation Check
      4.2.7. Certificate/CRL Expiration Warning
      4.2.8. Certificate/CRL/Key Cache
      4.2.9. Auto CRL Update
      4.2.10. IPsec Client Database
    4.3. Using Certificates For IPsec Tunnel Authentication
      4.3.1. IKEv2 Digital Signature Authentication
    4.4. Trust-Anchor Profile
    4.5. Cert-Profile
    4.6. Certificate Management Protocol Version 2 (CMPv2)
    4.7. OCSP
    4.8. Video Wholesale Example
    4.9. Multi-Chassis IPsec Redundancy Overview
      4.9.1. Architecture
      4.9.2. MC-IPsec Mastership Protocol (MIMP)
        4.9.2.1. MIMP Protocol States
        4.9.2.2. Election Logic
        4.9.2.3. Protection Status
        4.9.2.4. Other Details
      4.9.3. Routing
        4.9.3.1. Routing in Public Service
        4.9.3.2. Routing in Private Services
        4.9.3.3. Other Details About Shunting
      4.9.4. MC-IPsec Aware VRRP
      4.9.5. Synchronization
        4.9.5.1. Automatic CHILD_SA Rekey
      4.9.6. Responder Only
    4.10. IPsec Deployment Requirements
    4.11. IKEv2 Remote-Access Tunnel
      4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
      4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
        4.11.3.1. DHCPv4 Address Assignment
        4.11.3.2. DHCPv6 Address Assignment
        4.11.3.3. DHCPv4/v6 Usage Notes
      4.11.4. IPv6 IPsec Support
        4.11.4.1. IPv6 as Payload
        4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
        4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
        4.11.4.5. IPv6 as Encapsulation
    4.12. MLDv2 over IPsec
      4.12.1. MLDv2 over IPsec – Traffic Selector
      4.12.2. MLDv2 over IPsec – Configuration
    4.13. Configuring IPsec with CLI
      4.13.1. Provisioning a Tunnel ISA
      4.13.2. Configuring a Tunnel Group
      4.13.3. Configuring Router Interfaces for IPsec
      4.13.4. Configuring IPsec Parameters
      4.13.5. Configuring IPsec in Services
      4.13.6. Configuring X.509v3 Certificate Parameters
      4.13.7. Configuring MC-IPsec
        4.13.7.1. Configuring MIMP
        4.13.7.2. Configuring Multi-Chassis Synchronization
        4.13.7.3. Configuring Routing for MC-IPsec
      4.13.8. Configuring and Using CMPv2
      4.13.9. Configuring OCSP
      4.13.10. Configuring IKEv2 Remote — Access Tunnel
      4.13.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
    4.14.  IP Tunnel Command Reference
      4.14.1. Command Hierarchies
        4.14.1.1. Configuration Commands
          4.14.1.1.1. Hardware Commands
          4.14.1.1.2. ISA Commands
          4.14.1.1.3. IPsec Commands
        4.14.1.2. Service Configuration Commands
          4.14.1.2.1. IES Commands
          4.14.1.2.2. VPRN Commands
          4.14.1.2.3. IPsec Mastership Election Commands
          4.14.1.2.4. Related Commands
          4.14.1.2.5. CMPv2 Commands
          4.14.1.2.6. Auto-Update Commands
          4.14.1.2.7. Show Commands
          4.14.1.2.8. Debug Commands
          4.14.1.2.9. Tools Commands
          4.14.1.2.10. Clear Commands
          4.14.1.2.11. Admin Commands
      4.14.2. Command Descriptions
        4.14.2.1. Generic Commands
        4.14.2.2. Hardware Commands
        4.14.2.3. ISA Commands
        4.14.2.4. Certificate Profile Commands
        4.14.2.5. Client Database Commands
        4.14.2.6. Internet Key Exchange (IKE) Commands
        4.14.2.7. IPsec Transform Commands
        4.14.2.8. IPsec Static Security Association Commands
        4.14.2.9. Trust Anchor Profile/TS Commands
        4.14.2.10. Tunnel Template Commands
        4.14.2.11. Service Configuration Commands
        4.14.2.12. Interface SAP Tunnel Commands
          4.14.2.12.1. IPsec Gateway Commands
        4.14.2.13. RADIUS Policy Commands
        4.14.2.14. CMPv2 Commands
        4.14.2.15. Auto-Update Command Descriptions
        4.14.2.16. IPsec Mastership Election Commands
        4.14.2.17. Show Commands
        4.14.2.18. Debug Commands
        4.14.2.19. Tools Commands
        4.14.2.20. Clear Commands
        4.14.2.21. Admin Commands
  5. L2TPV3 Tunnels
    5.1. L2TPv3 Overview
    5.2. Control Plane
    5.3. Public SAP
    5.4. Private SAP
  6. Video Services
    6.1. Video Services
      6.1.1. Video Groups
      6.1.2. Video SAP
      6.1.3. Video Interface
      6.1.4. Multicast Information Policies
      6.1.5. Duplicate Stream Protection
      6.1.6. Duplicate Stream Selection
        6.1.6.1. Stream Identification
        6.1.6.2. Initial Sequence Identification
        6.1.6.3. Packet Selection
        6.1.6.4. Clock Recovery
        6.1.6.5. Playout
        6.1.6.6. Loss of Transport
      6.1.7. Video Quality Monitoring
        6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
        6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    6.2. Retransmission and Fast Channel Change
      6.2.1. RET and FCC Overview
        6.2.1.1. Retransmission
        6.2.1.2. Fast Channel Change (FCC)
          6.2.1.2.1. Retransmission Client
          6.2.1.2.2. Retransmission Server
          6.2.1.2.3. Fast Channel Change Server
          6.2.1.2.4. Logging and Accounting for RET and FCC
        6.2.1.3. RET and FCC Server Concurrency
          6.2.1.3.1. Prerequisites and Restrictions
      6.2.2. Separate Timers for FCC and RET
      6.2.3. Peak Bandwidth and Sessions per ISA
    6.3. Ad Insertion
      6.3.1. Local/Zoned Ad Insertion
        6.3.1.1. Transport Stream Ad Splicing
        6.3.1.2. Ad Zones
        6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
    6.4. Configuring Video Service Components with CLI
      6.4.1. Video Services Overview
        6.4.1.1. Configuring an ISA-MS Module
        6.4.1.2. Configuring a Video Group
        6.4.1.3. Configuring a Video SAP and Video Interface in a Service
        6.4.1.4. Basic Multicast Information Policy Configuration
      6.4.2. Sample Configurations
    6.5. Configuring RET/FCC Video Components with CLI
      6.5.1. Configuring RET/FCC Video Features in the CLI
        6.5.1.1. Configuring the RET Client
        6.5.1.2. Configuring the RET Server
        6.5.1.3. Configuring the FCC Server
        6.5.1.4. Logging and Accounting Collection for Video Statistics
    6.6. Configuring ADI Components with CLI
      6.6.1. Configuring ADI in CLI
        6.6.1.1. Configuring the RET Client
        6.6.1.2. Configuring a Video Group
        6.6.1.3. Configuring NTP
        6.6.1.4. Configuring Channel Parameters
        6.6.1.5. Configuring Service Entities
    6.7. Video Services Command Reference
      6.7.1. IP-TV Command Hierarchies
        6.7.1.1. Hardware Commands
        6.7.1.2. Video Group Commands
        6.7.1.3. Video Policy Video Commands
        6.7.1.4. Bundle and Channel Commands
        6.7.1.5. Service Video Interface Commands
          6.7.1.5.1. VPLS Commands
          6.7.1.5.2. IES Commands
          6.7.1.5.3. VPRN Commands
      6.7.2. Command Descriptions
        6.7.2.1. Generic Commands
        6.7.2.2. LNS Group Commands
        6.7.2.3. Video Group Commands
        6.7.2.4. Multicast Info Policy Commands
        6.7.2.5. Video Policy Commands
        6.7.2.6. Bundle and Channel Commands
        6.7.2.7. Service Video Interface Commands
    6.8. Show, Clear, and Debug Command Reference
      6.8.1. Command Hierarchies
        6.8.1.1. Show Commands
        6.8.1.2. Clear Commands
        6.8.1.3. Debug Commands
      6.8.2. Command Descriptions
        6.8.2.1. Show Commands
        6.8.2.2. Clear Commands
        6.8.2.3. Debug Commands
  7. Network Address Translation
    7.1. Terminology
    7.2. Network Address Translation (NAT) Overview
      7.2.1. Principles of NAT
      7.2.2. Application Compatibility
    7.3. Large Scale NAT
      7.3.1. Port Range Blocks
        7.3.1.1. Reserved Ports and Priority Sessions
        7.3.1.2. Preventing Port Block Starvation
          7.3.1.2.1. Dynamic Port Block Starvation in LSN
          7.3.1.2.2. Dynamic Port Block Reservation
      7.3.2. Timeouts
      7.3.3. Watermarks
    7.4. L2-Aware NAT
    7.5. One-to-One (1:1) NAT
      7.5.1. Static 1:1 NAT
        7.5.1.1. Protocol Agnostic Behavior
        7.5.1.2. Modification of Parameters in Static 1:1 NAT
        7.5.1.3. Load Distribution over ISAs in Static 1:1 NAT
        7.5.1.4. NAT-Policy Selection
        7.5.1.5. Mapping Timeout
        7.5.1.6. Logging
        7.5.1.7. Restrictions
      7.5.2. ICMP
    7.6. Deterministic NAT
      7.6.1. Overview
      7.6.2. Supported Deterministic NAT Types
      7.6.3. Number of Subscribers per Outside IP and per Pool
      7.6.4. Referencing a Pool
      7.6.5. Outside Pool Configuration
      7.6.6. Mapping Rules and the map Command in Deterministic LSN44
      7.6.7. Hashing Considerations in Deterministic LSN44
        7.6.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      7.6.8. Sharing of Deterministic NAT Pools
      7.6.9. Simultaneous support of dynamic and deterministic NAT
      7.6.10. Selecting Traffic for NAT
      7.6.11. Inverse Mappings
        7.6.11.1. MIB approach
        7.6.11.2. Off-line Approach to Obtain Deterministic Mappings
      7.6.12. Logging
      7.6.13. Deterministic DS-Lite
        7.6.13.1. Hashing Considerations in DS-Lite
        7.6.13.2. Order of Configuration Steps in Deterministic DS-Lite
    7.7. Destination Based NAT (DNAT)
      7.7.1. Combination of SNAPT and DNAT
      7.7.2. Forwarding Model in DNAT
      7.7.3. DNAT Traffic Selection via NAT Classifier
      7.7.4. Configuring DNAT
        7.7.4.1. DNAT Traffic Selection and Destination IP Address Configuration
        7.7.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    7.8. LSN – Multiple NAT Policies per Inside Routing Context
      7.8.1. Restrictions
      7.8.2. Multiple NAT Policies Per Inside Routing Context
      7.8.3. Routing Approach for NAT Diversion
      7.8.4. Filter-Based Approach
      7.8.5. Multiple NAT Policies with DS-Lite and NAT64
      7.8.6. Default NAT Policy
      7.8.7. Scaling Considerations
      7.8.8. Multiple NAT Policies and SPF Configuration Considerations
        7.8.8.1. Multiple NAT Policies and Forwarding Considerations
      7.8.9. Logging
    7.9. L2-Aware NAT Destination-Based Multiple NAT Policies
      7.9.1. Logging
        7.9.1.1. RADIUS Logging and Nat-Policy Change via CoA
        7.9.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
      7.9.2. Static Port Forwards
      7.9.3. L2-Aware Ping
      7.9.4. UPnP
    7.10. NAT and CoA
      7.10.1. CoA and NAT Policies
      7.10.2. CoA and DNAT
      7.10.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
    7.11. Port Control Protocol (PCP)
    7.12. Universal Plug and Play Internet Gateway Device Service
      7.12.1. Configuring UPnP IGD Service
    7.13. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      7.13.1. PPTP Protocol
        7.13.1.1. Supported Control Messages
        7.13.1.2. GRE Tunnel
      7.13.2. PPTP ALG Operation
      7.13.3. Multiple Sessions Initiated From the Same PPTP Client Node
      7.13.4. Selection of Call IDs in NAT
    7.14. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
    7.15. NAT Logging
      7.15.1. Syslog/SNMP/Local-File Logging
        7.15.1.1. Filtering LSN Events to System Memory
        7.15.1.2. NAT Logging to a Local File
      7.15.2. SNMP Trap Logging
      7.15.3. NAT Syslog
      7.15.4. LSN RADIUS Logging
        7.15.4.1. Periodic RADIUS Logging
          7.15.4.1.1. Message Pacing
        7.15.4.2. RADIUS Logging and L2-Aware NAT
      7.15.5. LSN and L2-Aware NAT Flow Logging
        7.15.5.1. IPFIX Flow Logging
        7.15.5.2. Template Formats
        7.15.5.3. Template Format1 and Format2
        7.15.5.4. Configuration Example
        7.15.5.5. Syslog Flow Logging
          7.15.5.5.1. Sequence Numbers
          7.15.5.5.2. Timestamp
          7.15.5.5.3. Event Aggregation
          7.15.5.5.4. Syslog Transmission Rate Limit and Overload Conditions
    7.16. DS-Lite and NAT64 Fragmentation
      7.16.1. Overview
      7.16.2. IPv6 Fragmentation in DS-Lite
      7.16.3. NAT64
    7.17. DS-lite Reassembly
      7.17.1. Interpreting Fragmentation Statistics
    7.18. Enhanced Statistics in NAT — Histogram
      7.18.1. Configuration
    7.19. NAT Redundancy
      7.19.1. NAT Stateless Dual-Homing
        7.19.1.1. Configuration Considerations
        7.19.1.2. Troubleshooting Commands
      7.19.2. Active-Active ISA Redundancy Model
        7.19.2.1. Start Up Conditions
        7.19.2.2. Recovery
        7.19.2.3. Adding Additional ISAs in the ISA Group
      7.19.3. L2-Aware Bypass
        7.19.3.1. Sharing IP Addresses in L2-Aware NAT
        7.19.3.2. Recovery
        7.19.3.3. Default Bypass During Reboot or MS-ISA Provisioning
        7.19.3.4. Logging
    7.20. ISA Feature Interactions
      7.20.1. MS-ISA Use with Service Mirrors
      7.20.2. LNS, Application Assurance and NAT
      7.20.3. Subscriber Aware Large Scale NAT44
    7.21. Mapping of Address and Port Using Translation (MAP-T)
      7.21.1. MAP-T Rules