Nokia 7210 SAS 20.9.R1 Edition 01
Legal Disclaimers
Customer Documentation and Product Support
Legal Disclaimers
Customer Documentation and Product Support
7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Basic System Configuration Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. Entering CLI Commands
2.7.1. Command Completion
2.7.2. Unordered Parameters
2.7.3. Editing Keystrokes
2.7.4. Absolute Paths
2.7.5. History
2.7.6. Entering Numerical Ranges
2.7.7. Pipe/Match
2.7.8. Redirection
2.8. Basic Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Global CLI Commands
2.8.1.2. Monitor Commands
2.8.1.3. Environment Commands
2.8.1.4. Show Commands
2.8.2. Command Descriptions
2.8.2.1. Global Commands
2.8.2.2. Environment Commands
2.8.2.3. Show Commands
2.8.2.4. Monitor Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. USB Storage Device
3.1.3. URLs
3.1.4. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Removing Files and Deleting Directories
3.2.6. Displaying Directory and File Information
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. Configuration Commands
3.3.2. Configuration Commands
3.3.2.1. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Contents of Factory-shipped 7210 SAS Systems
4.1.2. System Boot Option Modes
4.1.2.1. Auto-init Mode
4.1.2.1.1. Ping Check in Auto-init Mode
4.1.2.2. Manual Mode
4.1.3. Bootstrap Load Process
4.1.4. Boot Options on 7210 SAS Platforms
4.1.4.1. System Boot Options on 7210 SAS-D and 7210 SAS-Dxp Devices
4.1.4.2. System Boot Options on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C Devices
4.1.4.2.1. Storage Locations for Index Files (ndx, sdx) and Images for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
4.2. Configuration File and TiMOS Image Loading
4.2.1. Boot Sequence and Image Loading
4.3. Persistence
4.4. Configuration Guidelines for use of Auto-init and Manual Mode
4.5. Configuration Guidelines for Use of Software Images on the 7210 SAS-D with 128MB
4.6. Resetting the Node to the Factory Default Setting
4.7. Security for Console Port and Ethernet Management Port
4.8. Initial System Startup Process Flow
4.9. Configuration Notes
4.10. Configuring Boot File Options with CLI
4.10.1. BOF Configuration Overview
4.10.2. Basic BOF Configuration
4.10.3. Common Configuration Tasks
4.10.3.1. Searching for the BOF
4.10.3.2. Accessing the CLI
4.10.3.3. Console Connection
4.10.3.4. Procedure to Connect to a Console
4.10.3.5. Location of Console Ports on 7210 SAS Platforms
4.10.3.5.1. 7210 SAS-D Console Port
4.10.3.5.2. 7210 SAS-Dxp Console Port
4.10.3.5.3. 7210 SAS-K 2F1C2T Console Port
4.10.3.5.4. 7210 SAS-K 2F6C4T Console Port
4.10.3.5.5. 7210 SAS-K 3SFP+ 8C Console Port
4.11. Service Management Tasks
4.11.1. System Administration Commands
4.11.1.1. Viewing the Current Configuration
4.11.1.2. Modifying and Saving a Configuration
4.11.1.3. Deleting BOF Parameters
4.11.1.4. Saving a Configuration to a Different Filename
4.11.1.5. Rebooting
4.12. BOF Command Reference
4.12.1. Command Hierarchies
4.12.1.1. Configuration Commands
4.12.1.2. Show Commands
4.12.2. Command Descriptions
4.12.2.1. Configuration Commands
4.12.2.1.1. File Management Commands
4.12.2.1.2. BOF Processing Control Commands
4.12.2.1.3. Console Port Configuration Commands
4.12.2.1.4. Image and Configuration Management Commands
4.12.2.1.5. DNS Configuration Commands
4.12.2.2. Show Commands
5. System Management
5.1. System Management Parameters
5.1.1. System Information
5.1.1.1. System Name
5.1.1.2. System Contact
5.1.1.3. System Location
5.1.1.4. System Coordinates
5.1.1.5. Naming Objects
5.1.1.6. CLLI
5.1.2. System Time
5.1.2.1. Time Zones
5.1.2.2. Network Time Protocol (NTP)
5.1.2.3. SNTP Time Synchronization
5.1.2.4. CRON
5.2. High Availability
5.2.1. HA Features
5.2.1.1. Redundancy
5.2.1.1.1. Component Redundancy
5.3. Temperature Threshold Alarm and Fan Speed
5.4. Network Synchronization
5.4.1. Central Synchronization Subsystem
5.4.2. Synchronization Options Available on 7210 SAS Platforms
5.4.3. Synchronization Status Messages (SSM)
5.4.4. Synchronous Ethernet
5.4.4.1. Clock Source Quality Level Definitions
5.4.5. IEEE 1588v2 PTP
5.4.5.1. PTP Clock Synchronization
5.4.5.2. Performance Considerations
5.4.5.3. PTP Capabilities
5.4.5.4. PTP Ordinary Slave Clock for Frequency
5.4.6. PTP Boundary Clock for Frequency and Time
5.4.7. Configuration Guidelines and Restrictions for PTP
5.4.8. Configuration to Change Reference from SyncE to PTP on 7210 SAS-D ETR
5.5. Link Layer Discovery Protocol (LLDP)
5.6. System Resource Allocation
5.6.1. Allocation of Ingress Internal TCAM resources
5.6.2. Allocation of Egress Internal TCAM Resources
5.6.2.1. System Resource Allocation Examples
5.7. System Configuration Process Overview
5.8. Configuration Notes
5.8.1. General
5.9. Configuring System Management with CLI
5.9.1. System Management
5.9.1.1. Saving Configurations
5.9.2. Basic System Configuration
5.9.3. Common Configuration Tasks
5.9.3.1. System Information
5.9.3.1.1. System Information Parameters
5.9.3.1.2. System Time Elements
5.9.3.2. Configuring Backup Copies
5.9.4. System Administration Parameters
5.9.4.1. Validating the Golden Bootstrap Image
5.9.4.2. Updating the Golden Bootstrap Image
5.9.4.3. Disconnect
5.9.4.4. Set-time
5.9.4.5. Display-config
5.9.4.6. Tech-support
5.9.4.7. Save
5.9.4.8. Reboot
5.9.4.9. Post-Boot Configuration Extension Files
5.9.4.9.1. Show Command Output and Console Messages
5.9.5. System Timing
5.9.5.1. CLI Command Syntax for 7210 SAS Platforms
5.9.5.1.1. CLI Syntax for 7210 SAS-D
5.9.5.1.2. CLI Syntax for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.9.5.2. Entering Edit Mode
5.9.5.3. Configuring Timing References
5.9.5.4. Using the revert Command
5.9.5.5. Other Editing Commands
5.9.5.6. Forcing a Specific Reference
5.9.6. Configuring System Monitoring Thresholds
5.9.6.1. Creating Events
5.9.6.2. Configuring an Alarm Input
5.9.7. Configuring System Resource Profile
5.9.8. Configuring LLDP
5.10. System Command Reference
5.10.1. Command Hierarchies
5.10.1.1. Configuration Commands
5.10.1.1.1. System Information Commands
5.10.1.1.2. System Alarm Commands
5.10.1.1.3. PTP Commands for 7210 SAS-D ETR, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.1.1.4. PTP Commands for 7210 SAS-K 2F1C2T
5.10.1.1.5. System Time Commands
5.10.1.1.6. CRON Commands
5.10.1.1.7. Script Control Commands
5.10.1.1.8. System Port LAG MAC Assignment Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.1.1.9. System Administration Commands
5.10.1.1.10. System Alarm Contact Commands
5.10.1.1.11. System Console Commands
5.10.1.1.12. System Synchronization Commands
5.10.1.1.13. LLDP System Commands
5.10.1.1.14. System Resource-Profile Commands for 7210 SAS-D and 7210 SAS-Dxp
5.10.1.1.15. System Resource-Profile Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.1.1.16. Fan Controller Commands for 7210 SAS-D and 7210 SAS-D ETR Variant with 128MB flash
5.10.1.2. Show Commands
5.10.1.3. Clear Commands
5.10.1.4. Debug Commands
5.10.1.4.1. Fan controller debug command (applicable only to 7210 SAS-D and 7210 SAS-D ETR variant with 128MB flash)
5.10.2. Command Descriptions
5.10.2.1. Configuration Commands
5.10.2.1.1. Generic Commands
5.10.2.1.2. System Information Commands
5.10.2.1.3. System Alarm Commands
5.10.2.1.4. PTP Commands
5.10.2.1.5. Date and Time Commands
5.10.2.1.6. System Synchronization Commands
5.10.2.1.7. System Port LAG MAC Assignment Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.2.1.8. System Administration Commands
5.10.2.1.9. System Alarm Contact Commands
5.10.2.1.10. LLDP System Commands
5.10.2.1.11. LLDP Ethernet Port Commands
5.10.2.1.12. System Resource-Profile Commands
5.10.2.1.13. Fan Controller Commands
5.10.2.2. Show Commands
5.10.2.2.1. System Commands
5.10.2.3. Clear Commands
5.10.2.4. Debug Commands
5.10.2.4.1. Fan Controller debug commands
6. Appendix: 7210 SAS Boot Procedures
6.1. Procedure to Boot Using Auto-init Mode
6.2. Procedures to Boot Using Manual Mode
6.2.1. Procedure to Boot from the Image on Flash in Manual Mode
6.2.2. Procedure to Boot from the Network in Manual Mode Using Uplink Ports
6.2.3. Procedure to Boot from the Network in Manual Mode Using the OOB Ethernet Management Port
6.3. Procedure to Boot When the BOF is Present Locally
6.4. Procedure to Boot in the Satellite Mode
6.5. Procedure to Boot in the Standalone-VC Mode
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. Entering CLI Commands
2.7.1. Command Completion
2.7.2. Unordered Parameters
2.7.3. Editing Keystrokes
2.7.4. Absolute Paths
2.7.5. History
2.7.6. Entering Numerical Ranges
2.7.7. Pipe/Match
2.7.8. Redirection
2.8. Basic Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Global CLI Commands
2.8.1.2. Monitor Commands
2.8.1.3. Environment Commands
2.8.1.4. Show Commands
2.8.2. Command Descriptions
2.8.2.1. Global Commands
2.8.2.2. Environment Commands
2.8.2.3. Show Commands
2.8.2.4. Monitor Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. USB Storage Device
3.1.3. URLs
3.1.4. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Removing Files and Deleting Directories
3.2.6. Displaying Directory and File Information
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. Configuration Commands
3.3.2. Configuration Commands
3.3.2.1. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Contents of Factory-shipped 7210 SAS Systems
4.1.2. System Boot Option Modes
4.1.2.1. Auto-init Mode
4.1.2.1.1. Ping Check in Auto-init Mode
4.1.2.2. Manual Mode
4.1.3. Bootstrap Load Process
4.1.4. Boot Options on 7210 SAS Platforms
4.1.4.1. System Boot Options on 7210 SAS-D and 7210 SAS-Dxp Devices
4.1.4.2. System Boot Options on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C Devices
4.1.4.2.1. Storage Locations for Index Files (ndx, sdx) and Images for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
4.2. Configuration File and TiMOS Image Loading
4.2.1. Boot Sequence and Image Loading
4.3. Persistence
4.4. Configuration Guidelines for use of Auto-init and Manual Mode
4.5. Configuration Guidelines for Use of Software Images on the 7210 SAS-D with 128MB
4.6. Resetting the Node to the Factory Default Setting
4.7. Security for Console Port and Ethernet Management Port
4.8. Initial System Startup Process Flow
4.9. Configuration Notes
4.10. Configuring Boot File Options with CLI
4.10.1. BOF Configuration Overview
4.10.2. Basic BOF Configuration
4.10.3. Common Configuration Tasks
4.10.3.1. Searching for the BOF
4.10.3.2. Accessing the CLI
4.10.3.3. Console Connection
4.10.3.4. Procedure to Connect to a Console
4.10.3.5. Location of Console Ports on 7210 SAS Platforms
4.10.3.5.1. 7210 SAS-D Console Port
4.10.3.5.2. 7210 SAS-Dxp Console Port
4.10.3.5.3. 7210 SAS-K 2F1C2T Console Port
4.10.3.5.4. 7210 SAS-K 2F6C4T Console Port
4.10.3.5.5. 7210 SAS-K 3SFP+ 8C Console Port
4.11. Service Management Tasks
4.11.1. System Administration Commands
4.11.1.1. Viewing the Current Configuration
4.11.1.2. Modifying and Saving a Configuration
4.11.1.3. Deleting BOF Parameters
4.11.1.4. Saving a Configuration to a Different Filename
4.11.1.5. Rebooting
4.12. BOF Command Reference
4.12.1. Command Hierarchies
4.12.1.1. Configuration Commands
4.12.1.2. Show Commands
4.12.2. Command Descriptions
4.12.2.1. Configuration Commands
4.12.2.1.1. File Management Commands
4.12.2.1.2. BOF Processing Control Commands
4.12.2.1.3. Console Port Configuration Commands
4.12.2.1.4. Image and Configuration Management Commands
4.12.2.1.5. DNS Configuration Commands
4.12.2.2. Show Commands
5. System Management
5.1. System Management Parameters
5.1.1. System Information
5.1.1.1. System Name
5.1.1.2. System Contact
5.1.1.3. System Location
5.1.1.4. System Coordinates
5.1.1.5. Naming Objects
5.1.1.6. CLLI
5.1.2. System Time
5.1.2.1. Time Zones
5.1.2.2. Network Time Protocol (NTP)
5.1.2.3. SNTP Time Synchronization
5.1.2.4. CRON
5.2. High Availability
5.2.1. HA Features
5.2.1.1. Redundancy
5.2.1.1.1. Component Redundancy
5.3. Temperature Threshold Alarm and Fan Speed
5.4. Network Synchronization
5.4.1. Central Synchronization Subsystem
5.4.2. Synchronization Options Available on 7210 SAS Platforms
5.4.3. Synchronization Status Messages (SSM)
5.4.4. Synchronous Ethernet
5.4.4.1. Clock Source Quality Level Definitions
5.4.5. IEEE 1588v2 PTP
5.4.5.1. PTP Clock Synchronization
5.4.5.2. Performance Considerations
5.4.5.3. PTP Capabilities
5.4.5.4. PTP Ordinary Slave Clock for Frequency
5.4.6. PTP Boundary Clock for Frequency and Time
5.4.7. Configuration Guidelines and Restrictions for PTP
5.4.8. Configuration to Change Reference from SyncE to PTP on 7210 SAS-D ETR
5.5. Link Layer Discovery Protocol (LLDP)
5.6. System Resource Allocation
5.6.1. Allocation of Ingress Internal TCAM resources
5.6.2. Allocation of Egress Internal TCAM Resources
5.6.2.1. System Resource Allocation Examples
5.7. System Configuration Process Overview
5.8. Configuration Notes
5.8.1. General
5.9. Configuring System Management with CLI
5.9.1. System Management
5.9.1.1. Saving Configurations
5.9.2. Basic System Configuration
5.9.3. Common Configuration Tasks
5.9.3.1. System Information
5.9.3.1.1. System Information Parameters
5.9.3.1.2. System Time Elements
5.9.3.2. Configuring Backup Copies
5.9.4. System Administration Parameters
5.9.4.1. Validating the Golden Bootstrap Image
5.9.4.2. Updating the Golden Bootstrap Image
5.9.4.3. Disconnect
5.9.4.4. Set-time
5.9.4.5. Display-config
5.9.4.6. Tech-support
5.9.4.7. Save
5.9.4.8. Reboot
5.9.4.9. Post-Boot Configuration Extension Files
5.9.4.9.1. Show Command Output and Console Messages
5.9.5. System Timing
5.9.5.1. CLI Command Syntax for 7210 SAS Platforms
5.9.5.1.1. CLI Syntax for 7210 SAS-D
5.9.5.1.2. CLI Syntax for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.9.5.2. Entering Edit Mode
5.9.5.3. Configuring Timing References
5.9.5.4. Using the revert Command
5.9.5.5. Other Editing Commands
5.9.5.6. Forcing a Specific Reference
5.9.6. Configuring System Monitoring Thresholds
5.9.6.1. Creating Events
5.9.6.2. Configuring an Alarm Input
5.9.7. Configuring System Resource Profile
5.9.8. Configuring LLDP
5.10. System Command Reference
5.10.1. Command Hierarchies
5.10.1.1. Configuration Commands
5.10.1.1.1. System Information Commands
5.10.1.1.2. System Alarm Commands
5.10.1.1.3. PTP Commands for 7210 SAS-D ETR, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.1.1.4. PTP Commands for 7210 SAS-K 2F1C2T
5.10.1.1.5. System Time Commands
5.10.1.1.6. CRON Commands
5.10.1.1.7. Script Control Commands
5.10.1.1.8. System Port LAG MAC Assignment Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.1.1.9. System Administration Commands
5.10.1.1.10. System Alarm Contact Commands
5.10.1.1.11. System Console Commands
5.10.1.1.12. System Synchronization Commands
5.10.1.1.13. LLDP System Commands
5.10.1.1.14. System Resource-Profile Commands for 7210 SAS-D and 7210 SAS-Dxp
5.10.1.1.15. System Resource-Profile Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.1.1.16. Fan Controller Commands for 7210 SAS-D and 7210 SAS-D ETR Variant with 128MB flash
5.10.1.2. Show Commands
5.10.1.3. Clear Commands
5.10.1.4. Debug Commands
5.10.1.4.1. Fan controller debug command (applicable only to 7210 SAS-D and 7210 SAS-D ETR variant with 128MB flash)
5.10.2. Command Descriptions
5.10.2.1. Configuration Commands
5.10.2.1.1. Generic Commands
5.10.2.1.2. System Information Commands
5.10.2.1.3. System Alarm Commands
5.10.2.1.4. PTP Commands
5.10.2.1.5. Date and Time Commands
5.10.2.1.6. System Synchronization Commands
5.10.2.1.7. System Port LAG MAC Assignment Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.10.2.1.8. System Administration Commands
5.10.2.1.9. System Alarm Contact Commands
5.10.2.1.10. LLDP System Commands
5.10.2.1.11. LLDP Ethernet Port Commands
5.10.2.1.12. System Resource-Profile Commands
5.10.2.1.13. Fan Controller Commands
5.10.2.2. Show Commands
5.10.2.2.1. System Commands
5.10.2.3. Clear Commands
5.10.2.4. Debug Commands
5.10.2.4.1. Fan Controller debug commands
6. Appendix: 7210 SAS Boot Procedures
6.1. Procedure to Boot Using Auto-init Mode
6.2. Procedures to Boot Using Manual Mode
6.2.1. Procedure to Boot from the Image on Flash in Manual Mode
6.2.2. Procedure to Boot from the Network in Manual Mode Using Uplink Ports
6.2.3. Procedure to Boot from the Network in Manual Mode Using the OOB Ethernet Management Port
6.3. Procedure to Boot When the BOF is Present Locally
6.4. Procedure to Boot in the Satellite Mode
6.5. Procedure to Boot in the Standalone-VC Mode
7. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, R6, R12, Mxp, Sx, S Basic System Configuration Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. Entering CLI Commands
2.7.1. Command Completion
2.7.2. Unordered Parameters
2.7.3. Editing Keystrokes
2.7.4. Absolute Paths
2.7.5. History
2.7.6. Entering Numerical Ranges
2.7.7. Pipe/Match
2.7.8. Redirection
2.8. Configuration Rollback
2.8.1. Feature Behavior
2.8.2. Rescue Configuration
2.8.3. Operational Guidelines
2.8.4. Configuration Guidelines and Restrictions
2.9. Basic Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Basic CLI Commands
2.9.1.2. Show Commands
2.9.1.3. Monitor Commands
2.9.1.4. Environment Commands
2.9.2. Command Descriptions
2.9.2.1. Global Commands
2.9.2.2. CLI Environment Commands
2.9.2.3. Show Commands
2.9.2.4. Monitor CLI Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. USB Storage Device
3.1.3. Storage Locations for Accounting, Logs, Index File, and Images
3.1.4. Configuration Guidelines for Storing the TiMOS, boot.tim, bof.cfg, ndx, sdx, and nvsys.info File
3.1.5. URLs
3.1.6. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Removing Files and Deleting Directories
3.2.6. Displaying Directory and File Information
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. Configuration Commands
3.3.2. Command Descriptions
3.3.2.1. Configuration Commands
3.3.2.1.1. File System Commands
3.3.2.1.2. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Contents of Factory-shipped 7210 SAS Systems
4.1.2. System Boot Option Modes
4.1.2.1. Auto-init Mode
4.1.2.1.1. Ping Check in Auto-init Mode
4.1.2.2. Manual Mode
4.1.3. Bootstrap Load Process
4.1.4. 7210 SAS Boot Options and Procedures
4.1.4.1. System Boot Options on 7210 SAS-M
4.1.4.2. System Boot Options on 7210 SAS-T, 7210 SAS-R6, and 7210 SAS-R12
4.1.4.3. System Boot Options for 7210 SAS-Mxp, 7210 SAS-S 1/10GE, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE
4.1.4.4. System Boot Options for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp in Satellite Mode
4.1.4.5. System Boot Options for 7210 SAS-Mxp, 7210 SAS-S 1/10GE, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE in Standalone Mode
4.2. Configuration File and TiMOS Image Loading
4.2.1. Boot Sequence and Image Loading
4.2.2. BOF Chassis-Role and Host-Type Parameters for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp
4.2.3. Configuration Notes for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp
4.3. Persistence
4.4. Configuration Guidelines for Auto-init and Manual Mode
4.5. Resetting the Node to the Factory Default Setting
4.6. OOB Ethernet Management Port
4.6.1. IPv6 Configuration Guidelines in OOB Node Management
4.7. Security for Console Port and Ethernet Management Port
4.8. Initial System Startup Process Flow
4.9. Configuration Notes
4.10. Configuring Boot File Options with CLI
4.10.1. BOF Configuration Overview
4.10.2. Basic BOF Configuration
4.10.3. Common Configuration Tasks
4.10.3.1. Searching for the BOF
4.10.3.2. Sample Output of BOF Configuration on Bootup for 7210 SAS Platforms
4.10.3.2.1. Sample Output: BOF Configuration on Bootup for 7210 SAS-M, 7210 SAS-Mxp, and 7210 SAS-T
4.10.3.2.2. Sample Output: BOF Configuration on Bootup for 7210 SAS-R6 and 7210 SAS-R12
4.10.3.2.3. Sample Output: BOF Configuration on Bootup for 7210 SAS-Sx/S 1/10GE
4.10.3.3. Accessing the CLI
4.10.3.4. Console Connection
4.10.3.5. Procedure to Connect to a Console
4.10.3.6. Location of Console Ports on 7210 SAS Platforms
4.10.3.6.1. 7210 SAS-M Console Port
4.10.3.6.2. 7210 SAS-T Console Port
4.10.3.6.3. 7210 SAS-R6 Console Port
4.10.3.6.4. 7210 SAS-R12 Console Port
4.10.3.6.5. 7210 SAS-Mxp Console Port
4.10.3.6.6. 7210 SAS-Sx 1/10GE Console Port
4.10.3.6.7. 7210 SAS-S 1/10GE Console Port
4.10.3.6.8. 7210 SAS-Sx 10/100GE Console Port
4.10.3.7. Configuring BOF Parameters
4.10.3.7.1. Sample Output: BOF Configuration for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
4.10.3.7.2. Sample Output: BOF Configuration for 7210 SAS-R6
4.10.3.7.3. Sample Output: BOF Configuration for 7210 SAS-R12
4.10.3.7.4. Sample Output: BOF Configuration for 7210 SAS-Sx/S 1/10GE
4.11. Service Management Tasks
4.11.1. System Administration Commands
4.11.1.1. Viewing the Current Configuration
4.11.1.2. Modifying and Saving a Configuration
4.11.1.3. Deleting BOF Parameters
4.11.1.4. Saving a Configuration to a Different Filename
4.11.1.5. Rebooting
4.12. BOF Command Reference
4.12.1. Command Hierarchies
4.12.1.1. Configuration Commands
4.12.1.2. Show Commands
4.12.2. Command Descriptions
4.12.2.1. Configuration Commands
4.12.2.1.1. File Management Commands
4.12.2.1.2. BOF Processing Control
4.12.2.1.3. Console Port Configuration
4.12.2.1.4. Image and Configuration Management
4.12.2.1.5. DNS Configuration Commands
4.12.2.2. Show Commands
5. Virtual Chassis
5.1. Overview
5.1.1. Node Roles in the VC
5.1.2. Permitted Platform Combinations in a VC
5.2. Provisioning and Booting Up the VC in Standalone Mode
5.2.1. Required BOF Parameters
5.2.2. Manually Configuring Nodes to Boot as CPM-IMM in a VC
5.2.3. Manually Booting a VC IMM-Only Node
5.2.4. Configuring an IMM-Only Node in a VC
5.2.5. Provisioning the Card Type for All Nodes in a VC
5.3. Provisioning Service Entities
5.4. Preprovisioning a VC
5.5. Configuring a System Resource Profile for a VC
5.6. VC Boot Scenarios
5.6.1. First Time Manual Boot of Nodes in the Stack
5.6.2. Subsequent Reboot of the Stack (with Correct BOF Present)
5.7. Replacing and Upgrading a Node in a VC
5.7.1. Replacing a Standby/Active CPM-IMM Node with Another CPM-IMM Node
5.7.2. Replacing an IMM-only Node with Another Node
5.7.3. Replacing the Current Active CPM node with Another Node
5.7.4. Expanding a VC by Adding a New IMM-only Node
5.7.5. Removing a Node from a VC (Standby CPM or IMM)
5.7.6. Adding a New Standby CPM Node Into an Existing VC
5.7.7. Configuration Guidelines for Upgrading, Adding, or Removing a VC Node
5.8. VC Split Scenarios
5.9. Virtual Chassis Command Reference
5.9.1. Command Hierarchies
5.9.1.1. Configuration Commands
5.9.2. Command Descriptions
5.9.2.1. Configuration Commands
5.9.2.1.1. Standalone Virtual Chassis (VC) Commands
6. System Management
6.1. System Management Parameters
6.1.1. System Information
6.1.1.1. System Name
6.1.1.2. System Contact
6.1.1.3. System Location
6.1.1.4. System Coordinates
6.1.1.5. Naming Objects
6.1.1.6. CLLI
6.1.2. System Time
6.1.2.1. Time Zones
6.1.2.2. Network Time Protocol
6.1.2.3. SNTP Time Synchronization
6.1.2.4. CRON
6.2. High Availability
6.2.1. HA Features
6.2.1.1. Redundancy
6.2.1.1.1. Software Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.1.2. Configuration Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.1.3. Component Redundancy
6.2.1.1.4. Remote Power Supply on 7210 SAS-Sx 1/10GE Platforms
6.2.1.1.5. Service Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.1.6. Accounting Configuration Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.2. Nonstop Forwarding and Routing on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.2.1. Nonstop Forwarding on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.2.2. Nonstop Routing on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.3. CPM Switchover on 7210 SAS-R6 and 7210 SAS-R12
6.3. Temperature Threshold Alarm and Fan Speed
6.3.1. Synchronization
6.3.1.1. Configuration and boot-env Synchronization
6.3.1.2. State Database Synchronization
6.4. Synchronization and Redundancy
6.4.1. Active and Standby Designations on 7210 SAS-R6 and 7210 SAS-R12
6.4.2. Active and Standby Designations on 7210 SAS-Sx/S 1/10GE in Standalone-VC Mode
6.4.3. When the Active CPM Goes Offline
6.4.4. Configuration Guidelines for Synchronization of Active and Standby CPM on 7210 SAS-R6 and 7210 SAS-R12
6.5. Network Synchronization
6.5.1. Central Synchronization Subsystem
6.5.2. Synchronization Options Available on 7210 SAS Platforms
6.5.3. Synchronization Status Messages
6.5.4. DS1 Signals
6.5.5. E1 Signals
6.5.6. Synchronous Ethernet
6.5.6.1. Using Synchronous Ethernet Timing for T1/E1 MDA
6.5.6.2. Clock Source Quality Level Definitions
6.5.7. Adaptive Clock Recovery
6.5.8. IEEE 1588v2 PTP
6.5.8.1. PTP Clock Synchronization
6.5.8.2. Performance Considerations
6.5.8.3. PTP End-to-End Transparent Clock
6.5.8.4. PTP Message Transparent Forwarding
6.5.8.5. PTP Capabilities
6.5.8.6. PTP Ordinary Slave Clock for Frequency
6.5.9. PTP Boundary Clock for Frequency and Time
6.5.10. 1PPS and 10MHz Output Interface
6.5.11. Configuration Guidelines and Restrictions for PTP
6.5.12. Configuration to Change Reference from SyncE to PTP on 7210 SAS-M
6.5.13. Configuration Example to Use PTP and SyncE References on 7210 SAS-Mxp, 7210 SAS-R6, 7210 SAS-R12, 7210 SAS-Sx 1/10GE, and 7210 SAS-T
6.6. Management of 1830 VWM
6.6.1. Introduction
6.6.2. Feature Description
6.6.2.1. 1830 CWDM Shelf Layout and Description
6.6.2.2. 1830 DWDM Shelf Layout and Description
6.6.3. 1830 VWM Configuration Guidelines and Restrictions
6.6.3.1. 1830 VWM LED Functionality
6.7. Link Layer Discovery Protocol (LLDP)
6.8. System Resource Allocation
6.8.1. Allocation of Ingress Internal TCAM Resources
6.8.2. Allocation of Egress Internal TCAM Resources
6.8.3. System Resource Allocation Examples
6.8.4. 7210 SAS-R6 and 7210 SAS-R12 Configuration Guidelines for System Resource Profile
6.9. System Configuration Process Overview
6.10. Configuration Notes
6.11. Configuring System Management with CLI
6.11.1. Saving Configurations
6.11.2. Basic System Configuration
6.11.3. Common Configuration Tasks
6.11.3.1. System Information
6.11.3.1.1. System Information Parameters
6.11.3.1.2. Coordinates
6.11.3.1.3. System Time Elements
6.11.3.2. Configuring Backup Copies
6.11.4. System Administration Parameters
6.11.4.1. Validating the Golden Bootstrap Image
6.11.4.2. Updating the Golden Bootstrap Image
6.11.4.3. Disconnect
6.11.4.4. Set-time
6.11.4.5. Display-config
6.11.4.6. Tech-support
6.11.4.7. Save
6.11.4.8. Reboot
6.11.4.9. Post-Boot Configuration Extension Files
6.11.4.9.1. Show Command Output and Console Messages
6.11.5. System Timing
6.11.5.1. CLI command Syntax for 7210 SAS Platforms
6.11.5.1.1. CLI Syntax for the 7210 SAS-M
6.11.5.1.2. CLI Syntax for 7210 SAS-R6 and 7210 SAS-R12
6.11.5.1.3. CLI Syntax for 7210 SAS-T
6.11.5.1.4. CLI Syntax for 7210 SAS-Mxp
6.11.5.1.5. CLI Syntax for 7210 SAS-Sx/S 1/10GE:
6.11.5.2. Entering Edit Mode
6.11.5.3. Configuring Timing References
6.11.5.4. Using the revert Command
6.11.5.5. Other Editing Commands
6.11.5.6. Forcing a Specific Reference
6.11.6. Configuring System Monitoring Thresholds
6.11.6.1. Creating Events
6.11.6.2. System Alarm Contact Inputs
6.11.7. Configuring 1830 VWM
6.11.8. Configuring LLDP
6.12. System Command Reference
6.12.1. Command Hierarchies
6.12.1.1. Configuration Commands
6.12.1.1.1. System Information Commands
6.12.1.1.2. Virtual Chassis (VC) Configuration Commands
6.12.1.2. VWM Shelf Management Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.3. VWM Shelf Management Commands for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
6.12.1.4. System Alarm Commands
6.12.1.5. PTP Commands
6.12.1.6. System Time Commands
6.12.1.7. CRON Commands
6.12.1.8. Script Control Commands
6.12.1.9. System Administration (Admin) Commands
6.12.1.10. High Availability (Redundancy) Commands
6.12.1.11. Configuration Rollback Commands for the 7210 SAS-R6, 7210 SAS-R12, and 7210 SAS-Mxp
6.12.1.12. Multi-chassis LAG Commands
6.12.1.13. System Port LAG MAC Assignment Commands for 7210 SAS-Mxp standalone, 7210 SAS-T, 7210 SAS-Sx 10/100GE standalone, and 7210 SAS-Sx/S 1/10GE: standalone and standalone-VC
6.12.1.14. System Alarm Contact Commands
6.12.1.15. System Synchronization Commands for 7210 SAS-M
6.12.1.16. System Synchronization Commands for 7210 SAS-T
6.12.1.17. System Synchronization Commands for 7210 SAS-Mxp
6.12.1.18. System Synchronization Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.19. System Synchronization Commands for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, and 7210 SAS-Sx 10/100GE
6.12.1.20. LLDP System Commands
6.12.1.21. System Resource-Profile Commands for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
6.12.1.22. System Resource-Profile Router Commands for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE
6.12.1.23. System Resource-Profile Commands for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE
6.12.1.24. System Resource-Profile Commands for 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
6.12.1.25. System Resource-Profile Commands for a Virtual Chassis
6.12.1.26. System Resource-Profile Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.27. System Resource Profile Commands for MAC Authentication
6.12.1.28. Global System Resource Profile Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.29. Global System Resource Profile Commands for a Virtual Chassis
6.12.1.30. Show Commands
6.12.1.31. Clear Commands
6.12.1.32. Debug Commands
6.12.2. Command Descriptions
6.12.2.1. Configuration Commands
6.12.2.1.1. Generic Commands
6.12.2.1.2. System Information Commands
6.12.2.1.3. Virtual Chassis (VC) Configuration Commands
6.12.2.1.4. System Alarm Commands
6.12.2.1.5. PTP Commands
6.12.2.1.6. Date and Time Commands
6.12.2.1.7. System Synchronization Commands
6.12.2.1.8. Generic Commands
6.12.2.1.9. System Administration Commands
6.12.2.1.10. System Alarm Contact Commands
6.12.2.1.11. Redundancy Commands
6.12.2.1.12. System Port LAG MAC Assignment Commands for 7210 SAS-Mxp standalone, 7210 SAS-T, 7210 SAS-Sx 10/100GE standalone, and 7210 SAS-Sx/S 1/10GE: standalone and standalone-VC
6.12.2.1.13. Rollback Commands
6.12.2.1.14. Peer Commands
6.12.2.1.15. MC-LAG Commands
6.12.2.1.16. LLDP System Commands
6.12.2.1.17. LLDP Ethernet Port Commands
6.12.2.1.18. System Resource-Profile Commands
6.12.2.1.19. Global System Resource Profile Commands
6.12.2.2. Show Commands
6.12.2.2.1. System Commands
6.12.2.3. Clear Commands
6.12.2.4. Debug Commands
7. Appendix: 7210 SAS Boot Procedures
7.1. Procedure to Boot Using Auto-init Mode
7.2. Procedures to Boot Using Manual Mode
7.2.1. Procedure to Boot from the Image on Flash in Manual Mode
7.2.2. Procedure to Boot from the Network in Manual Mode Using Uplink Ports
7.2.3. Procedure to Boot from the Network in Manual Mode Using the OOB Ethernet Management Port
7.3. Procedure to Boot When the BOF is Present Locally
7.4. Procedure to Boot in the Satellite Mode
7.5. Procedure to Boot in the Standalone-VC Mode
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. Entering CLI Commands
2.7.1. Command Completion
2.7.2. Unordered Parameters
2.7.3. Editing Keystrokes
2.7.4. Absolute Paths
2.7.5. History
2.7.6. Entering Numerical Ranges
2.7.7. Pipe/Match
2.7.8. Redirection
2.8. Configuration Rollback
2.8.1. Feature Behavior
2.8.2. Rescue Configuration
2.8.3. Operational Guidelines
2.8.4. Configuration Guidelines and Restrictions
2.9. Basic Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Basic CLI Commands
2.9.1.2. Show Commands
2.9.1.3. Monitor Commands
2.9.1.4. Environment Commands
2.9.2. Command Descriptions
2.9.2.1. Global Commands
2.9.2.2. CLI Environment Commands
2.9.2.3. Show Commands
2.9.2.4. Monitor CLI Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. USB Storage Device
3.1.3. Storage Locations for Accounting, Logs, Index File, and Images
3.1.4. Configuration Guidelines for Storing the TiMOS, boot.tim, bof.cfg, ndx, sdx, and nvsys.info File
3.1.5. URLs
3.1.6. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Removing Files and Deleting Directories
3.2.6. Displaying Directory and File Information
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. Configuration Commands
3.3.2. Command Descriptions
3.3.2.1. Configuration Commands
3.3.2.1.1. File System Commands
3.3.2.1.2. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Contents of Factory-shipped 7210 SAS Systems
4.1.2. System Boot Option Modes
4.1.2.1. Auto-init Mode
4.1.2.1.1. Ping Check in Auto-init Mode
4.1.2.2. Manual Mode
4.1.3. Bootstrap Load Process
4.1.4. 7210 SAS Boot Options and Procedures
4.1.4.1. System Boot Options on 7210 SAS-M
4.1.4.2. System Boot Options on 7210 SAS-T, 7210 SAS-R6, and 7210 SAS-R12
4.1.4.3. System Boot Options for 7210 SAS-Mxp, 7210 SAS-S 1/10GE, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE
4.1.4.4. System Boot Options for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp in Satellite Mode
4.1.4.5. System Boot Options for 7210 SAS-Mxp, 7210 SAS-S 1/10GE, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE in Standalone Mode
4.2. Configuration File and TiMOS Image Loading
4.2.1. Boot Sequence and Image Loading
4.2.2. BOF Chassis-Role and Host-Type Parameters for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp
4.2.3. Configuration Notes for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp
4.3. Persistence
4.4. Configuration Guidelines for Auto-init and Manual Mode
4.5. Resetting the Node to the Factory Default Setting
4.6. OOB Ethernet Management Port
4.6.1. IPv6 Configuration Guidelines in OOB Node Management
4.7. Security for Console Port and Ethernet Management Port
4.8. Initial System Startup Process Flow
4.9. Configuration Notes
4.10. Configuring Boot File Options with CLI
4.10.1. BOF Configuration Overview
4.10.2. Basic BOF Configuration
4.10.3. Common Configuration Tasks
4.10.3.1. Searching for the BOF
4.10.3.2. Sample Output of BOF Configuration on Bootup for 7210 SAS Platforms
4.10.3.2.1. Sample Output: BOF Configuration on Bootup for 7210 SAS-M, 7210 SAS-Mxp, and 7210 SAS-T
4.10.3.2.2. Sample Output: BOF Configuration on Bootup for 7210 SAS-R6 and 7210 SAS-R12
4.10.3.2.3. Sample Output: BOF Configuration on Bootup for 7210 SAS-Sx/S 1/10GE
4.10.3.3. Accessing the CLI
4.10.3.4. Console Connection
4.10.3.5. Procedure to Connect to a Console
4.10.3.6. Location of Console Ports on 7210 SAS Platforms
4.10.3.6.1. 7210 SAS-M Console Port
4.10.3.6.2. 7210 SAS-T Console Port
4.10.3.6.3. 7210 SAS-R6 Console Port
4.10.3.6.4. 7210 SAS-R12 Console Port
4.10.3.6.5. 7210 SAS-Mxp Console Port
4.10.3.6.6. 7210 SAS-Sx 1/10GE Console Port
4.10.3.6.7. 7210 SAS-S 1/10GE Console Port
4.10.3.6.8. 7210 SAS-Sx 10/100GE Console Port
4.10.3.7. Configuring BOF Parameters
4.10.3.7.1. Sample Output: BOF Configuration for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
4.10.3.7.2. Sample Output: BOF Configuration for 7210 SAS-R6
4.10.3.7.3. Sample Output: BOF Configuration for 7210 SAS-R12
4.10.3.7.4. Sample Output: BOF Configuration for 7210 SAS-Sx/S 1/10GE
4.11. Service Management Tasks
4.11.1. System Administration Commands
4.11.1.1. Viewing the Current Configuration
4.11.1.2. Modifying and Saving a Configuration
4.11.1.3. Deleting BOF Parameters
4.11.1.4. Saving a Configuration to a Different Filename
4.11.1.5. Rebooting
4.12. BOF Command Reference
4.12.1. Command Hierarchies
4.12.1.1. Configuration Commands
4.12.1.2. Show Commands
4.12.2. Command Descriptions
4.12.2.1. Configuration Commands
4.12.2.1.1. File Management Commands
4.12.2.1.2. BOF Processing Control
4.12.2.1.3. Console Port Configuration
4.12.2.1.4. Image and Configuration Management
4.12.2.1.5. DNS Configuration Commands
4.12.2.2. Show Commands
5. Virtual Chassis
5.1. Overview
5.1.1. Node Roles in the VC
5.1.2. Permitted Platform Combinations in a VC
5.2. Provisioning and Booting Up the VC in Standalone Mode
5.2.1. Required BOF Parameters
5.2.2. Manually Configuring Nodes to Boot as CPM-IMM in a VC
5.2.3. Manually Booting a VC IMM-Only Node
5.2.4. Configuring an IMM-Only Node in a VC
5.2.5. Provisioning the Card Type for All Nodes in a VC
5.3. Provisioning Service Entities
5.4. Preprovisioning a VC
5.5. Configuring a System Resource Profile for a VC
5.6. VC Boot Scenarios
5.6.1. First Time Manual Boot of Nodes in the Stack
5.6.2. Subsequent Reboot of the Stack (with Correct BOF Present)
5.7. Replacing and Upgrading a Node in a VC
5.7.1. Replacing a Standby/Active CPM-IMM Node with Another CPM-IMM Node
5.7.2. Replacing an IMM-only Node with Another Node
5.7.3. Replacing the Current Active CPM node with Another Node
5.7.4. Expanding a VC by Adding a New IMM-only Node
5.7.5. Removing a Node from a VC (Standby CPM or IMM)
5.7.6. Adding a New Standby CPM Node Into an Existing VC
5.7.7. Configuration Guidelines for Upgrading, Adding, or Removing a VC Node
5.8. VC Split Scenarios
5.9. Virtual Chassis Command Reference
5.9.1. Command Hierarchies
5.9.1.1. Configuration Commands
5.9.2. Command Descriptions
5.9.2.1. Configuration Commands
5.9.2.1.1. Standalone Virtual Chassis (VC) Commands
6. System Management
6.1. System Management Parameters
6.1.1. System Information
6.1.1.1. System Name
6.1.1.2. System Contact
6.1.1.3. System Location
6.1.1.4. System Coordinates
6.1.1.5. Naming Objects
6.1.1.6. CLLI
6.1.2. System Time
6.1.2.1. Time Zones
6.1.2.2. Network Time Protocol
6.1.2.3. SNTP Time Synchronization
6.1.2.4. CRON
6.2. High Availability
6.2.1. HA Features
6.2.1.1. Redundancy
6.2.1.1.1. Software Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.1.2. Configuration Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.1.3. Component Redundancy
6.2.1.1.4. Remote Power Supply on 7210 SAS-Sx 1/10GE Platforms
6.2.1.1.5. Service Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.1.6. Accounting Configuration Redundancy on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.2. Nonstop Forwarding and Routing on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.2.1. Nonstop Forwarding on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.2.2. Nonstop Routing on 7210 SAS-R6 and 7210 SAS-R12
6.2.1.3. CPM Switchover on 7210 SAS-R6 and 7210 SAS-R12
6.3. Temperature Threshold Alarm and Fan Speed
6.3.1. Synchronization
6.3.1.1. Configuration and boot-env Synchronization
6.3.1.2. State Database Synchronization
6.4. Synchronization and Redundancy
6.4.1. Active and Standby Designations on 7210 SAS-R6 and 7210 SAS-R12
6.4.2. Active and Standby Designations on 7210 SAS-Sx/S 1/10GE in Standalone-VC Mode
6.4.3. When the Active CPM Goes Offline
6.4.4. Configuration Guidelines for Synchronization of Active and Standby CPM on 7210 SAS-R6 and 7210 SAS-R12
6.5. Network Synchronization
6.5.1. Central Synchronization Subsystem
6.5.2. Synchronization Options Available on 7210 SAS Platforms
6.5.3. Synchronization Status Messages
6.5.4. DS1 Signals
6.5.5. E1 Signals
6.5.6. Synchronous Ethernet
6.5.6.1. Using Synchronous Ethernet Timing for T1/E1 MDA
6.5.6.2. Clock Source Quality Level Definitions
6.5.7. Adaptive Clock Recovery
6.5.8. IEEE 1588v2 PTP
6.5.8.1. PTP Clock Synchronization
6.5.8.2. Performance Considerations
6.5.8.3. PTP End-to-End Transparent Clock
6.5.8.4. PTP Message Transparent Forwarding
6.5.8.5. PTP Capabilities
6.5.8.6. PTP Ordinary Slave Clock for Frequency
6.5.9. PTP Boundary Clock for Frequency and Time
6.5.10. 1PPS and 10MHz Output Interface
6.5.11. Configuration Guidelines and Restrictions for PTP
6.5.12. Configuration to Change Reference from SyncE to PTP on 7210 SAS-M
6.5.13. Configuration Example to Use PTP and SyncE References on 7210 SAS-Mxp, 7210 SAS-R6, 7210 SAS-R12, 7210 SAS-Sx 1/10GE, and 7210 SAS-T
6.6. Management of 1830 VWM
6.6.1. Introduction
6.6.2. Feature Description
6.6.2.1. 1830 CWDM Shelf Layout and Description
6.6.2.2. 1830 DWDM Shelf Layout and Description
6.6.3. 1830 VWM Configuration Guidelines and Restrictions
6.6.3.1. 1830 VWM LED Functionality
6.7. Link Layer Discovery Protocol (LLDP)
6.8. System Resource Allocation
6.8.1. Allocation of Ingress Internal TCAM Resources
6.8.2. Allocation of Egress Internal TCAM Resources
6.8.3. System Resource Allocation Examples
6.8.4. 7210 SAS-R6 and 7210 SAS-R12 Configuration Guidelines for System Resource Profile
6.9. System Configuration Process Overview
6.10. Configuration Notes
6.11. Configuring System Management with CLI
6.11.1. Saving Configurations
6.11.2. Basic System Configuration
6.11.3. Common Configuration Tasks
6.11.3.1. System Information
6.11.3.1.1. System Information Parameters
6.11.3.1.2. Coordinates
6.11.3.1.3. System Time Elements
6.11.3.2. Configuring Backup Copies
6.11.4. System Administration Parameters
6.11.4.1. Validating the Golden Bootstrap Image
6.11.4.2. Updating the Golden Bootstrap Image
6.11.4.3. Disconnect
6.11.4.4. Set-time
6.11.4.5. Display-config
6.11.4.6. Tech-support
6.11.4.7. Save
6.11.4.8. Reboot
6.11.4.9. Post-Boot Configuration Extension Files
6.11.4.9.1. Show Command Output and Console Messages
6.11.5. System Timing
6.11.5.1. CLI command Syntax for 7210 SAS Platforms
6.11.5.1.1. CLI Syntax for the 7210 SAS-M
6.11.5.1.2. CLI Syntax for 7210 SAS-R6 and 7210 SAS-R12
6.11.5.1.3. CLI Syntax for 7210 SAS-T
6.11.5.1.4. CLI Syntax for 7210 SAS-Mxp
6.11.5.1.5. CLI Syntax for 7210 SAS-Sx/S 1/10GE:
6.11.5.2. Entering Edit Mode
6.11.5.3. Configuring Timing References
6.11.5.4. Using the revert Command
6.11.5.5. Other Editing Commands
6.11.5.6. Forcing a Specific Reference
6.11.6. Configuring System Monitoring Thresholds
6.11.6.1. Creating Events
6.11.6.2. System Alarm Contact Inputs
6.11.7. Configuring 1830 VWM
6.11.8. Configuring LLDP
6.12. System Command Reference
6.12.1. Command Hierarchies
6.12.1.1. Configuration Commands
6.12.1.1.1. System Information Commands
6.12.1.1.2. Virtual Chassis (VC) Configuration Commands
6.12.1.2. VWM Shelf Management Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.3. VWM Shelf Management Commands for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
6.12.1.4. System Alarm Commands
6.12.1.5. PTP Commands
6.12.1.6. System Time Commands
6.12.1.7. CRON Commands
6.12.1.8. Script Control Commands
6.12.1.9. System Administration (Admin) Commands
6.12.1.10. High Availability (Redundancy) Commands
6.12.1.11. Configuration Rollback Commands for the 7210 SAS-R6, 7210 SAS-R12, and 7210 SAS-Mxp
6.12.1.12. Multi-chassis LAG Commands
6.12.1.13. System Port LAG MAC Assignment Commands for 7210 SAS-Mxp standalone, 7210 SAS-T, 7210 SAS-Sx 10/100GE standalone, and 7210 SAS-Sx/S 1/10GE: standalone and standalone-VC
6.12.1.14. System Alarm Contact Commands
6.12.1.15. System Synchronization Commands for 7210 SAS-M
6.12.1.16. System Synchronization Commands for 7210 SAS-T
6.12.1.17. System Synchronization Commands for 7210 SAS-Mxp
6.12.1.18. System Synchronization Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.19. System Synchronization Commands for 7210 SAS-Sx 1/10GE, 7210 SAS-S 1/10GE, and 7210 SAS-Sx 10/100GE
6.12.1.20. LLDP System Commands
6.12.1.21. System Resource-Profile Commands for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
6.12.1.22. System Resource-Profile Router Commands for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE
6.12.1.23. System Resource-Profile Commands for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx 1/10GE, and 7210 SAS-Sx 10/100GE
6.12.1.24. System Resource-Profile Commands for 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
6.12.1.25. System Resource-Profile Commands for a Virtual Chassis
6.12.1.26. System Resource-Profile Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.27. System Resource Profile Commands for MAC Authentication
6.12.1.28. Global System Resource Profile Commands for 7210 SAS-R6 and 7210 SAS-R12
6.12.1.29. Global System Resource Profile Commands for a Virtual Chassis
6.12.1.30. Show Commands
6.12.1.31. Clear Commands
6.12.1.32. Debug Commands
6.12.2. Command Descriptions
6.12.2.1. Configuration Commands
6.12.2.1.1. Generic Commands
6.12.2.1.2. System Information Commands
6.12.2.1.3. Virtual Chassis (VC) Configuration Commands
6.12.2.1.4. System Alarm Commands
6.12.2.1.5. PTP Commands
6.12.2.1.6. Date and Time Commands
6.12.2.1.7. System Synchronization Commands
6.12.2.1.8. Generic Commands
6.12.2.1.9. System Administration Commands
6.12.2.1.10. System Alarm Contact Commands
6.12.2.1.11. Redundancy Commands
6.12.2.1.12. System Port LAG MAC Assignment Commands for 7210 SAS-Mxp standalone, 7210 SAS-T, 7210 SAS-Sx 10/100GE standalone, and 7210 SAS-Sx/S 1/10GE: standalone and standalone-VC
6.12.2.1.13. Rollback Commands
6.12.2.1.14. Peer Commands
6.12.2.1.15. MC-LAG Commands
6.12.2.1.16. LLDP System Commands
6.12.2.1.17. LLDP Ethernet Port Commands
6.12.2.1.18. System Resource-Profile Commands
6.12.2.1.19. Global System Resource Profile Commands
6.12.2.2. Show Commands
6.12.2.2.1. System Commands
6.12.2.3. Clear Commands
6.12.2.4. Debug Commands
7. Appendix: 7210 SAS Boot Procedures
7.1. Procedure to Boot Using Auto-init Mode
7.2. Procedures to Boot Using Manual Mode
7.2.1. Procedure to Boot from the Image on Flash in Manual Mode
7.2.2. Procedure to Boot from the Network in Manual Mode Using Uplink Ports
7.2.3. Procedure to Boot from the Network in Manual Mode Using the OOB Ethernet Management Port
7.3. Procedure to Boot When the BOF is Present Locally
7.4. Procedure to Boot in the Satellite Mode
7.5. Procedure to Boot in the Standalone-VC Mode
8. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Interface Configuration Guide 20.9.R1
1. Getting Started
1.1. In This Chapter
1.2. About This Guide
1.2.1. Document Structure and Content
1.3. 7210 SAS Modes of Operation
1.4. 7210 SAS Port Modes
1.5. Interface Configuration Process
2. 7210 SAS Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Cards
2.2. Digital Diagnostics Monitoring
2.2.1. Nokia SFPs and XFPs
2.2.2. Statistics Collection
2.3. Ports
2.3.1. Port Types
2.3.1.1. Port Modes
2.3.1.2. Port Dot1q VLAN Etype on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.3.1.3. Configuration Guidelines for Dot1q-Etype for 7210 SAS-D and 7210 SAS-Dxp
2.3.2. Port Features
2.3.2.1. MACsec
2.3.2.1.1. MACsec 802.1AE Header (SecTAG)
2.3.2.1.2. MACsec Encryption Mode
2.3.2.1.3. MACsec Key Management Modes
2.3.2.1.4. MACsec Terminology
2.3.2.1.5. MACsec Static CAK
2.3.2.1.6. SAK Rollover
2.3.2.1.7. MKA
2.3.2.1.8. PSK
2.3.2.1.9. MKA Hello Timer
2.3.2.1.10. MACsec Capability, Desire, and Encryption Offset
2.3.2.1.11. Key Server
2.3.2.1.12. SA Limits and Network Design
2.3.2.1.13. P2P (Switch-to-Switch) Topology
2.3.2.1.14. P2MP (Switch to Switch) Topology
2.3.2.1.15. SA Exhaustion Behavior
2.3.2.1.16. Clear Tag Mode
2.3.2.1.17. 802.1X Tunneling and Multihop MACsec
2.3.2.1.18. EAPoL Destination Address
2.3.2.1.19. Mirroring Consideration
2.3.3. Ethernet Combo Ports on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.4. Link Layer Discovery Protocol (LLDP)
2.4.1. LLDP Protocol Features
2.4.1.1. LLDP Tunneling for Epipe Service
2.5. Port Loopback for Ethernet Ports
2.5.1. Port Loopback without MAC Swap
2.5.2. Port Loopback with MAC Swap
2.5.3. Per-SAP Loopback with MAC Swap
2.6. LAG
2.6.1. LAG Features
2.6.2. Configuring LAGs
2.6.3. LAG and QoS Policies on 7210 SAS-D and 7210 SAS-Dxp
2.6.4. LAG and QoS Policies on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.6.5. Port Link Damping
2.6.6. LACP
2.6.7. LAG and ECMP Hashing
2.6.7.1. LAG Hashing Algorithm for the 7210 SAS-D
2.6.7.2. LAG Hashing Algorithm for the 7210 SAS-Dxp
2.6.7.3. LAG Hashing Algorithm for the 7210 SAS-K 2F1C2T
2.6.7.4. LAG Hashing Algorithm for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.7.5. Packet Fields Used for Pseudowire Hash-label Generation on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.7.6. LDP ECMP Hashing Algorithm for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.8. Multi-Chassis LAG
2.6.8.1. Overview
2.6.8.2. Point-to-Point Redundant Connection Across Layer 2/3 VPN Network
2.6.8.3. Configuration Guidelines
2.6.8.4. Configuring Multi-Chassis Redundancy
2.6.8.5. MC-LAG Support on 7210 SAS-D and 7210 SAS-K 2F1C2T
2.6.9. G.8032 Protected Ethernet Rings
2.6.9.1. 802.1x Network Access Control
2.6.9.1.1. 802.1x Modes
2.6.9.2. 802.1x Basics
2.6.9.3. 802.1x Timers
2.6.9.4. 802.1x Configuration and Limitations
2.6.9.5. 802.1x Tunneling for Epipe Service
2.7. 802.3ah OAM
2.7.1. OAM Events
2.7.2. Remote Loopback
2.7.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.7.4. MTU Configuration Guidelines
2.7.4.1. Default MTU Values
2.7.4.2. Modifying MTU Defaults on 7210 SAS-D and 7210 SAS-Dxp
2.7.4.3. Modifying MTU Defaults on the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.7.4.4. Configuration Example for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C Using SAPs in the Service
2.7.5. Modifying MTU Defaults on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C when Using SDP in the Service
2.7.6. Deploying Preprovisioned Components
2.8. MAC Authentication
2.8.1. MAC Authentication Basics
2.8.2. MAC Authentication Limitations
2.9. VLAN Authentication
2.9.1. VLAN Authentication Basics
2.9.2. VLAN Authentication Limitations
2.10. Layer 2 Control Protocol Interaction with Authentication Methods
2.11. Configuration Process Overview
2.12. Configuring Physical Ports with CLI
2.13. Preprovisioning Guidelines
2.13.1. Predefining Entities
2.13.2. Preprovisioning a Port
2.14. Basic Configuration
2.15. Common Configuration Tasks
2.15.1. Configuring Ethernet Port Parameters
2.15.1.1. Ethernet Network Port
2.15.1.2. Ethernet Access-Uplink Port
2.15.1.3. Ethernet Access Port
2.15.1.4. Configuring 802.1x Authentication Port Parameters
2.15.1.5. Configuring MAC Authentication Port Parameters
2.15.1.6. Configuring VLAN Authentication Port Parameters
2.15.2. Configuring LAG Parameters
2.16. CRC Error Monitoring
2.17. Service Management Tasks
2.17.1. Modifying a Card Type
2.17.2. Deleting a Card
2.17.3. Deleting Port Parameters
2.18. Card, MDA, and Port Command Reference
2.18.1. Command Hierarchies
2.18.1.1. Configuration Commands
2.18.1.1.1. Hardware Commands
2.18.1.1.2. Port Buffer Pool Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
2.18.1.1.3. Port Configuration Commands
2.18.1.1.4. Port-based Split Horizon Group Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
2.18.1.1.5. Port Commands for Reserving Resources of Ports on 7210 SAS-Dxp
2.18.1.1.6. MACsec Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.1.1.7. Ethernet Commands
2.18.1.1.8. LAG Commands for 7210 SAS-D and 7210 SAS-Dxp
2.18.1.1.9. LAG Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.18.1.1.10. Multi-chassis Redundancy Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.1.1.11. Ethernet Ring Commands
2.18.1.2. Show Commands
2.18.1.2.1. MACsec Show Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.1.3. Monitor Commands
2.18.1.4. Clear Commands
2.18.1.5. Debug Commands
2.18.2. Command Descriptions
2.18.2.1. Configuration Commands
2.18.2.1.1. Generic Commands
2.18.2.1.2. Card Commands
2.18.2.1.3. MDA Commands
2.18.2.1.4. Interface QoS Commands
2.18.2.1.5. General Port Commands
2.18.2.1.6. Port Loopback Commands
2.18.2.1.7. MACsec Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.2.1.8. Ethernet Port Commands
2.18.2.1.9. 802.1x Port Commands
2.18.2.1.10. 802.1x Port MACsec Commands
2.18.2.1.11. LLDP Port Commands
2.18.2.1.12. Access-Uplink Port Commands
2.18.2.1.13. LAG Commands
2.18.2.1.14. Multi-Chassis Redundancy Commands
2.18.2.1.15. Ethernet Ring Commands
2.18.2.2. Show Commands
2.18.2.2.1. Hardware Commands
2.18.2.2.2. Port Show Commands
2.18.2.2.3. LAG Commands
2.18.2.3. Port Monitor Commands
2.18.2.4. MACsec Show Commands
2.18.2.5. Clear Commands
2.18.2.6. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. In This Chapter
1.2. About This Guide
1.2.1. Document Structure and Content
1.3. 7210 SAS Modes of Operation
1.4. 7210 SAS Port Modes
1.5. Interface Configuration Process
2. 7210 SAS Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Cards
2.2. Digital Diagnostics Monitoring
2.2.1. Nokia SFPs and XFPs
2.2.2. Statistics Collection
2.3. Ports
2.3.1. Port Types
2.3.1.1. Port Modes
2.3.1.2. Port Dot1q VLAN Etype on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.3.1.3. Configuration Guidelines for Dot1q-Etype for 7210 SAS-D and 7210 SAS-Dxp
2.3.2. Port Features
2.3.2.1. MACsec
2.3.2.1.1. MACsec 802.1AE Header (SecTAG)
2.3.2.1.2. MACsec Encryption Mode
2.3.2.1.3. MACsec Key Management Modes
2.3.2.1.4. MACsec Terminology
2.3.2.1.5. MACsec Static CAK
2.3.2.1.6. SAK Rollover
2.3.2.1.7. MKA
2.3.2.1.8. PSK
2.3.2.1.9. MKA Hello Timer
2.3.2.1.10. MACsec Capability, Desire, and Encryption Offset
2.3.2.1.11. Key Server
2.3.2.1.12. SA Limits and Network Design
2.3.2.1.13. P2P (Switch-to-Switch) Topology
2.3.2.1.14. P2MP (Switch to Switch) Topology
2.3.2.1.15. SA Exhaustion Behavior
2.3.2.1.16. Clear Tag Mode
2.3.2.1.17. 802.1X Tunneling and Multihop MACsec
2.3.2.1.18. EAPoL Destination Address
2.3.2.1.19. Mirroring Consideration
2.3.3. Ethernet Combo Ports on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.4. Link Layer Discovery Protocol (LLDP)
2.4.1. LLDP Protocol Features
2.4.1.1. LLDP Tunneling for Epipe Service
2.5. Port Loopback for Ethernet Ports
2.5.1. Port Loopback without MAC Swap
2.5.2. Port Loopback with MAC Swap
2.5.3. Per-SAP Loopback with MAC Swap
2.6. LAG
2.6.1. LAG Features
2.6.2. Configuring LAGs
2.6.3. LAG and QoS Policies on 7210 SAS-D and 7210 SAS-Dxp
2.6.4. LAG and QoS Policies on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.6.5. Port Link Damping
2.6.6. LACP
2.6.7. LAG and ECMP Hashing
2.6.7.1. LAG Hashing Algorithm for the 7210 SAS-D
2.6.7.2. LAG Hashing Algorithm for the 7210 SAS-Dxp
2.6.7.3. LAG Hashing Algorithm for the 7210 SAS-K 2F1C2T
2.6.7.4. LAG Hashing Algorithm for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.7.5. Packet Fields Used for Pseudowire Hash-label Generation on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.7.6. LDP ECMP Hashing Algorithm for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.8. Multi-Chassis LAG
2.6.8.1. Overview
2.6.8.2. Point-to-Point Redundant Connection Across Layer 2/3 VPN Network
2.6.8.3. Configuration Guidelines
2.6.8.4. Configuring Multi-Chassis Redundancy
2.6.8.5. MC-LAG Support on 7210 SAS-D and 7210 SAS-K 2F1C2T
2.6.9. G.8032 Protected Ethernet Rings
2.6.9.1. 802.1x Network Access Control
2.6.9.1.1. 802.1x Modes
2.6.9.2. 802.1x Basics
2.6.9.3. 802.1x Timers
2.6.9.4. 802.1x Configuration and Limitations
2.6.9.5. 802.1x Tunneling for Epipe Service
2.7. 802.3ah OAM
2.7.1. OAM Events
2.7.2. Remote Loopback
2.7.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.7.4. MTU Configuration Guidelines
2.7.4.1. Default MTU Values
2.7.4.2. Modifying MTU Defaults on 7210 SAS-D and 7210 SAS-Dxp
2.7.4.3. Modifying MTU Defaults on the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.7.4.4. Configuration Example for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C Using SAPs in the Service
2.7.5. Modifying MTU Defaults on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C when Using SDP in the Service
2.7.6. Deploying Preprovisioned Components
2.8. MAC Authentication
2.8.1. MAC Authentication Basics
2.8.2. MAC Authentication Limitations
2.9. VLAN Authentication
2.9.1. VLAN Authentication Basics
2.9.2. VLAN Authentication Limitations
2.10. Layer 2 Control Protocol Interaction with Authentication Methods
2.11. Configuration Process Overview
2.12. Configuring Physical Ports with CLI
2.13. Preprovisioning Guidelines
2.13.1. Predefining Entities
2.13.2. Preprovisioning a Port
2.14. Basic Configuration
2.15. Common Configuration Tasks
2.15.1. Configuring Ethernet Port Parameters
2.15.1.1. Ethernet Network Port
2.15.1.2. Ethernet Access-Uplink Port
2.15.1.3. Ethernet Access Port
2.15.1.4. Configuring 802.1x Authentication Port Parameters
2.15.1.5. Configuring MAC Authentication Port Parameters
2.15.1.6. Configuring VLAN Authentication Port Parameters
2.15.2. Configuring LAG Parameters
2.16. CRC Error Monitoring
2.17. Service Management Tasks
2.17.1. Modifying a Card Type
2.17.2. Deleting a Card
2.17.3. Deleting Port Parameters
2.18. Card, MDA, and Port Command Reference
2.18.1. Command Hierarchies
2.18.1.1. Configuration Commands
2.18.1.1.1. Hardware Commands
2.18.1.1.2. Port Buffer Pool Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
2.18.1.1.3. Port Configuration Commands
2.18.1.1.4. Port-based Split Horizon Group Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
2.18.1.1.5. Port Commands for Reserving Resources of Ports on 7210 SAS-Dxp
2.18.1.1.6. MACsec Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.1.1.7. Ethernet Commands
2.18.1.1.8. LAG Commands for 7210 SAS-D and 7210 SAS-Dxp
2.18.1.1.9. LAG Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.18.1.1.10. Multi-chassis Redundancy Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.1.1.11. Ethernet Ring Commands
2.18.1.2. Show Commands
2.18.1.2.1. MACsec Show Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.1.3. Monitor Commands
2.18.1.4. Clear Commands
2.18.1.5. Debug Commands
2.18.2. Command Descriptions
2.18.2.1. Configuration Commands
2.18.2.1.1. Generic Commands
2.18.2.1.2. Card Commands
2.18.2.1.3. MDA Commands
2.18.2.1.4. Interface QoS Commands
2.18.2.1.5. General Port Commands
2.18.2.1.6. Port Loopback Commands
2.18.2.1.7. MACsec Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.18.2.1.8. Ethernet Port Commands
2.18.2.1.9. 802.1x Port Commands
2.18.2.1.10. 802.1x Port MACsec Commands
2.18.2.1.11. LLDP Port Commands
2.18.2.1.12. Access-Uplink Port Commands
2.18.2.1.13. LAG Commands
2.18.2.1.14. Multi-Chassis Redundancy Commands
2.18.2.1.15. Ethernet Ring Commands
2.18.2.2. Show Commands
2.18.2.2.1. Hardware Commands
2.18.2.2.2. Port Show Commands
2.18.2.2.3. LAG Commands
2.18.2.3. Port Monitor Commands
2.18.2.4. MACsec Show Commands
2.18.2.5. Clear Commands
2.18.2.6. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, R6, R12, Mxp, Sx, S Interface Configuration Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. 7210 SAS Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Cards
2.2. MDAs
2.2.1. Provisioning of MDAs on the 7210 SAS-M
2.2.1.1. Provisioning Guidelines for MDA used with 7210 SAS-M
2.2.1.2. Provisioning 2 x 10G MDA and 4 x T1/E1 CES MDA on 7210 SAS-M
2.3. Digital Diagnostics Monitoring
2.3.1. Nokia SFPs and XFPs
2.3.2. Statistics Collection
2.4. Ports
2.4.1. Port Types
2.4.1.1. Port Modes
2.4.1.2. Port Dot1q VLAN Etype
2.4.1.3. Configuration Guidelines for Dot1q-etype
2.4.2. Support for Power over Ethernet (PoE) on 7210 SAS-T ETR Variant and 7210 SAS-Mxp ETR Variant
2.4.3. Support for PoE/PoE+ for 7210 SAS-Sx 1/10GE Fiber Variants
2.4.4. Support for PoE/PoE+ for 7210 SAS-Sx 1/10GE Copper PoE Variant
2.4.5. Support for PoE/PoE+ for 7210 SAS-S 1/10GE Copper PoE Variant
2.5. Link Layer Discovery Protocol
2.5.1. LLDP Protocol Features
2.5.2. LLDP Tunneling for Epipe Service
2.5.3. LLDP Media Endpoint Discovery
2.5.3.1. LLDP-MED Reference Model
2.5.3.2. LLDP-MED Network Connectivity Device Functions
2.5.3.3. LLDP-MED Endpoint Device Move Notification
2.5.3.4. Modified Use of TLVs Defined in LLDP
2.6. Port Loopback for Ethernet Ports
2.6.1. Port Loopback Without MAC Swap
2.6.2. Port Loopback with MAC Swap
2.7. LAG
2.7.1. LAG Features
2.7.1.1. Hardware Capabilities
2.7.1.2. Software Capabilities
2.7.1.2.1. Dynamic Cost
2.7.1.2.2. LAG Port Threshold
2.7.2. Configuring LAGs
2.7.3. LAG on Access
2.7.4. LAG and QoS Policies on 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.7.5. LAG and QoS Policies on 7210 SAS-Mxp
2.7.6. LAG and QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
2.7.7. Port Link Damping
2.7.8. LACP
2.7.8.1. Active-Standby LAG Operation without LACP
2.7.8.2. LAG Sub-groups
2.7.9. LAG and ECMP Hashing
2.7.9.1. LAG Hashing for the 7210 SAS-M (Network Mode)
2.7.9.2. LAG Hashing for the 7210 SAS-M (Access-uplink Mode)
2.7.9.3. LAG Hashing for the 7210 SAS-T (Network Mode)
2.7.9.4. LAG Hashing for the 7210 SAS-T (Access-uplink Mode)
2.7.9.5. LAG Hashing for the 7210 SAS-R6 and 7210 SAS-R12
2.7.9.6. LAG Hashing for the 7210 SAS-Mxp
2.7.9.7. LAG Hashing Algorithm for the 7210 SAS-Sx/S 1/10GE and 7210 7210 SAS-Sx 10/100GE in Standalone and Standalone-VC Mode
2.7.9.8. PW Hash-label Generation for 7210 SAS-R6 and 7210 SAS-R12
2.7.9.9. PW Hash-label – Packet Fields Used for PW Hash-label Generation for 7210 SAS-Mxp
2.7.9.10. PW Hash-label – Packet Fields Used for PW Hash-label Generation for 7210 SAS-Sx/S 1/10GE
2.7.9.11. ECMP Hashing for 7210 SAS Devices in Network Mode
2.7.10. Bidirectional Forwarding Detection Over LAG Links
2.7.10.1. Configuration Guidelines and Restrictions for BFD Over LAG Links
2.7.11. Multi-Chassis LAG
2.7.11.1. Overview
2.7.11.2. Point-to-Point Redundant Connection Across Layer 2/3 VPN Network
2.7.11.3. DSLAM Dual Homing in Layer 2 Network
2.7.11.4. Configuration Guidelines
2.7.11.5. Configuring Multi-Chassis Redundancy
2.8. G.8032 Protected Ethernet Rings
2.9. 802.1x Network Access Control
2.9.1. 802.1x Modes
2.9.2. 802.1x Basics
2.9.3. 802.1x Timers
2.9.4. 802.1x Configuration and Limitations
2.9.5. 802.1x Tunneling for Epipe Service
2.9.6. MAC Authentication
2.9.6.1. MAC Authentication Basics
2.9.6.2. MAC Authentication Limitations
2.9.7. VLAN Authentication
2.9.7.1. VLAN Authentication Basics
2.9.7.2. VLAN Authentication Limitations
2.9.8. Layer 2 Control Protocol Interaction with Authentication Methods
2.10. 802.3ah OAM
2.10.1. OAM Events
2.10.2. Remote Loopback
2.10.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11. MTU Configuration Guidelines
2.11.1. Default MTU Values
2.12. Deploying Preprovisioned Components on 7210 SAS
2.12.1. Deploying Preprovisioned Components for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE.
2.12.2. Deploying Preprovisioned Components for 7210 SAS-R6 and 7210 SAS-R12
2.13. Configuration Process Overview
2.14. Configuring Physical Ports with CLI
2.15. Preprovisioning Guidelines
2.15.1. Predefining Entities
2.15.2. Preprovisioning a Port
2.16. Basic Configuration
2.16.1. Configuring Cards and MDAs
2.16.2. Configuration Notes for Provisioning of Cards
2.16.2.1. Configuration Notes for Provisioning of 7210 SAS-R6 IMMv2 (IMM-b) Cards
2.16.2.2. Configuration Notes for Provisioning of 7210 SAS-R6 IMM-c Cards
2.17. Common Configuration Tasks
2.17.1. Configuring Ports
2.17.1.1. Configuring Ethernet Port Parameters
2.17.1.1.1. Ethernet Network Port
2.17.1.1.2. Ethernet Access-uplink Port
2.17.1.1.3. Ethernet Access Port
2.17.1.1.4. Configuring 802.1x Authentication Port Parameters
2.17.1.1.5. Configuring MAC Authentication Port Parameters
2.17.1.1.6. Configuring VLAN Authentication Port Parameters
2.17.1.2. Configuring Channelized Ports
2.17.1.2.1. Configuring a Channelized DS1 Card
2.17.2. Configuring LAG Parameters
2.17.2.1. Configuring BFD Over LAG Links
2.17.3. Configuring Access Egress Queue Overrides
2.17.4. CRC Error Monitoring
2.18. Service Management Tasks
2.18.1. Modifying or Deleting an MDA
2.18.2. Modifying a Card Type
2.18.3. Deleting a Card
2.18.4. Deleting Port Parameters
2.19. Card, MDA, and Port Command Reference
2.19.1. Command Hierarchies
2.19.1.1. Configuration Commands
2.19.1.1.1. Hardware Commands
2.19.1.1.2. MDA Commands
2.19.1.1.3. Port Configuration Commands for PTP Port-based Timestamp
2.19.1.1.4. Port-based Split Horizon Group Configuration Commands
2.19.1.1.5. Port Configuration Commands for DWDM Optics
2.19.1.1.6. Port Loopback Commands
2.19.1.1.7. Port QoS Slope Policy Commands
2.19.1.1.8. Port Ethernet Commands
2.19.1.1.9. TDM Commands
2.19.1.1.10. LAG Commands
2.19.1.1.11. Multi-chassis Redundancy Commands
2.19.1.1.12. Ethernet Ring Commands
2.19.1.2. Show Commands
2.19.1.3. Monitor Commands
2.19.1.4. Clear Commands
2.19.1.5. Debug Commands
2.19.2. Command Descriptions
2.19.2.1. Configuration Commands
2.19.2.1.1. Generic Commands
2.19.2.1.2. Card Commands
2.19.2.1.3. MDA Commands
2.19.2.1.4. Interface QoS Commands
2.19.2.1.5. General Port Commands
2.19.2.1.6. Port Loopback Commands
2.19.2.1.7. Ethernet Port Commands
2.19.2.1.8. 802.1x Port Commands
2.19.2.1.9. LLDP Ethernet Port Commands
2.19.2.1.10. Port Commands
2.19.2.1.11. TDM Commands (Applicable to 7210 SAS-M when using the CES MDA)
2.19.2.1.12. LAG Commands
2.19.2.1.13. Ethernet Ring Commands
2.19.2.1.14. Ethernet Tunnel Commands
2.19.2.1.15. Multi-Chassis Redundancy Commands
2.19.2.2. Show Commands
2.19.2.2.1. Hardware Commands
2.19.2.2.2. Port Show Commands
2.19.2.2.3. LAG Commands
2.19.2.2.4. Port Monitor Commands
2.19.2.3. Clear Commands
2.19.2.4. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. 7210 SAS Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Cards
2.2. MDAs
2.2.1. Provisioning of MDAs on the 7210 SAS-M
2.2.1.1. Provisioning Guidelines for MDA used with 7210 SAS-M
2.2.1.2. Provisioning 2 x 10G MDA and 4 x T1/E1 CES MDA on 7210 SAS-M
2.3. Digital Diagnostics Monitoring
2.3.1. Nokia SFPs and XFPs
2.3.2. Statistics Collection
2.4. Ports
2.4.1. Port Types
2.4.1.1. Port Modes
2.4.1.2. Port Dot1q VLAN Etype
2.4.1.3. Configuration Guidelines for Dot1q-etype
2.4.2. Support for Power over Ethernet (PoE) on 7210 SAS-T ETR Variant and 7210 SAS-Mxp ETR Variant
2.4.3. Support for PoE/PoE+ for 7210 SAS-Sx 1/10GE Fiber Variants
2.4.4. Support for PoE/PoE+ for 7210 SAS-Sx 1/10GE Copper PoE Variant
2.4.5. Support for PoE/PoE+ for 7210 SAS-S 1/10GE Copper PoE Variant
2.5. Link Layer Discovery Protocol
2.5.1. LLDP Protocol Features
2.5.2. LLDP Tunneling for Epipe Service
2.5.3. LLDP Media Endpoint Discovery
2.5.3.1. LLDP-MED Reference Model
2.5.3.2. LLDP-MED Network Connectivity Device Functions
2.5.3.3. LLDP-MED Endpoint Device Move Notification
2.5.3.4. Modified Use of TLVs Defined in LLDP
2.6. Port Loopback for Ethernet Ports
2.6.1. Port Loopback Without MAC Swap
2.6.2. Port Loopback with MAC Swap
2.7. LAG
2.7.1. LAG Features
2.7.1.1. Hardware Capabilities
2.7.1.2. Software Capabilities
2.7.1.2.1. Dynamic Cost
2.7.1.2.2. LAG Port Threshold
2.7.2. Configuring LAGs
2.7.3. LAG on Access
2.7.4. LAG and QoS Policies on 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.7.5. LAG and QoS Policies on 7210 SAS-Mxp
2.7.6. LAG and QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
2.7.7. Port Link Damping
2.7.8. LACP
2.7.8.1. Active-Standby LAG Operation without LACP
2.7.8.2. LAG Sub-groups
2.7.9. LAG and ECMP Hashing
2.7.9.1. LAG Hashing for the 7210 SAS-M (Network Mode)
2.7.9.2. LAG Hashing for the 7210 SAS-M (Access-uplink Mode)
2.7.9.3. LAG Hashing for the 7210 SAS-T (Network Mode)
2.7.9.4. LAG Hashing for the 7210 SAS-T (Access-uplink Mode)
2.7.9.5. LAG Hashing for the 7210 SAS-R6 and 7210 SAS-R12
2.7.9.6. LAG Hashing for the 7210 SAS-Mxp
2.7.9.7. LAG Hashing Algorithm for the 7210 SAS-Sx/S 1/10GE and 7210 7210 SAS-Sx 10/100GE in Standalone and Standalone-VC Mode
2.7.9.8. PW Hash-label Generation for 7210 SAS-R6 and 7210 SAS-R12
2.7.9.9. PW Hash-label – Packet Fields Used for PW Hash-label Generation for 7210 SAS-Mxp
2.7.9.10. PW Hash-label – Packet Fields Used for PW Hash-label Generation for 7210 SAS-Sx/S 1/10GE
2.7.9.11. ECMP Hashing for 7210 SAS Devices in Network Mode
2.7.10. Bidirectional Forwarding Detection Over LAG Links
2.7.10.1. Configuration Guidelines and Restrictions for BFD Over LAG Links
2.7.11. Multi-Chassis LAG
2.7.11.1. Overview
2.7.11.2. Point-to-Point Redundant Connection Across Layer 2/3 VPN Network
2.7.11.3. DSLAM Dual Homing in Layer 2 Network
2.7.11.4. Configuration Guidelines
2.7.11.5. Configuring Multi-Chassis Redundancy
2.8. G.8032 Protected Ethernet Rings
2.9. 802.1x Network Access Control
2.9.1. 802.1x Modes
2.9.2. 802.1x Basics
2.9.3. 802.1x Timers
2.9.4. 802.1x Configuration and Limitations
2.9.5. 802.1x Tunneling for Epipe Service
2.9.6. MAC Authentication
2.9.6.1. MAC Authentication Basics
2.9.6.2. MAC Authentication Limitations
2.9.7. VLAN Authentication
2.9.7.1. VLAN Authentication Basics
2.9.7.2. VLAN Authentication Limitations
2.9.8. Layer 2 Control Protocol Interaction with Authentication Methods
2.10. 802.3ah OAM
2.10.1. OAM Events
2.10.2. Remote Loopback
2.10.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11. MTU Configuration Guidelines
2.11.1. Default MTU Values
2.12. Deploying Preprovisioned Components on 7210 SAS
2.12.1. Deploying Preprovisioned Components for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE.
2.12.2. Deploying Preprovisioned Components for 7210 SAS-R6 and 7210 SAS-R12
2.13. Configuration Process Overview
2.14. Configuring Physical Ports with CLI
2.15. Preprovisioning Guidelines
2.15.1. Predefining Entities
2.15.2. Preprovisioning a Port
2.16. Basic Configuration
2.16.1. Configuring Cards and MDAs
2.16.2. Configuration Notes for Provisioning of Cards
2.16.2.1. Configuration Notes for Provisioning of 7210 SAS-R6 IMMv2 (IMM-b) Cards
2.16.2.2. Configuration Notes for Provisioning of 7210 SAS-R6 IMM-c Cards
2.17. Common Configuration Tasks
2.17.1. Configuring Ports
2.17.1.1. Configuring Ethernet Port Parameters
2.17.1.1.1. Ethernet Network Port
2.17.1.1.2. Ethernet Access-uplink Port
2.17.1.1.3. Ethernet Access Port
2.17.1.1.4. Configuring 802.1x Authentication Port Parameters
2.17.1.1.5. Configuring MAC Authentication Port Parameters
2.17.1.1.6. Configuring VLAN Authentication Port Parameters
2.17.1.2. Configuring Channelized Ports
2.17.1.2.1. Configuring a Channelized DS1 Card
2.17.2. Configuring LAG Parameters
2.17.2.1. Configuring BFD Over LAG Links
2.17.3. Configuring Access Egress Queue Overrides
2.17.4. CRC Error Monitoring
2.18. Service Management Tasks
2.18.1. Modifying or Deleting an MDA
2.18.2. Modifying a Card Type
2.18.3. Deleting a Card
2.18.4. Deleting Port Parameters
2.19. Card, MDA, and Port Command Reference
2.19.1. Command Hierarchies
2.19.1.1. Configuration Commands
2.19.1.1.1. Hardware Commands
2.19.1.1.2. MDA Commands
2.19.1.1.3. Port Configuration Commands for PTP Port-based Timestamp
2.19.1.1.4. Port-based Split Horizon Group Configuration Commands
2.19.1.1.5. Port Configuration Commands for DWDM Optics
2.19.1.1.6. Port Loopback Commands
2.19.1.1.7. Port QoS Slope Policy Commands
2.19.1.1.8. Port Ethernet Commands
2.19.1.1.9. TDM Commands
2.19.1.1.10. LAG Commands
2.19.1.1.11. Multi-chassis Redundancy Commands
2.19.1.1.12. Ethernet Ring Commands
2.19.1.2. Show Commands
2.19.1.3. Monitor Commands
2.19.1.4. Clear Commands
2.19.1.5. Debug Commands
2.19.2. Command Descriptions
2.19.2.1. Configuration Commands
2.19.2.1.1. Generic Commands
2.19.2.1.2. Card Commands
2.19.2.1.3. MDA Commands
2.19.2.1.4. Interface QoS Commands
2.19.2.1.5. General Port Commands
2.19.2.1.6. Port Loopback Commands
2.19.2.1.7. Ethernet Port Commands
2.19.2.1.8. 802.1x Port Commands
2.19.2.1.9. LLDP Ethernet Port Commands
2.19.2.1.10. Port Commands
2.19.2.1.11. TDM Commands (Applicable to 7210 SAS-M when using the CES MDA)
2.19.2.1.12. LAG Commands
2.19.2.1.13. Ethernet Ring Commands
2.19.2.1.14. Ethernet Tunnel Commands
2.19.2.1.15. Multi-Chassis Redundancy Commands
2.19.2.2. Show Commands
2.19.2.2.1. Hardware Commands
2.19.2.2.2. Port Show Commands
2.19.2.2.3. LAG Commands
2.19.2.2.4. Port Monitor Commands
2.19.2.3. Clear Commands
2.19.2.4. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-K 2F6C4T, K 3SFP+ 8C MPLS Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Router Configuration Process
2. MPLS and RSVP
2.1. In This Chapter
2.2. MPLS
2.2.1. MPLS Label Stack
2.2.1.1. Label Values
2.2.2. Label Switching Routers
2.2.2.1. LSP Types
2.3. MPLS Pseudowire Hash Label Support
2.4. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.4.1. Manual Bypass LSP
2.4.1.1. PLR Bypass LSP Selection Rules
2.4.1.2. FRR Node-Protection (Facility)
2.4.1.3. Uniform FRR Failover Time
2.5. RSVP
2.5.1. Using RSVP for MPLS
2.5.1.1. RSVP Traffic Engineering Extensions for MPLS
2.5.1.1.1. Hello Protocol
2.5.1.1.2. MD5 Authentication of RSVP Interface
2.5.2. Reservation Styles
2.5.2.1. RSVP Message Pacing
2.5.3. RSVP Overhead Refresh Reduction
2.5.3.1. Configuring Implicit Null
2.5.4. Using Unnumbered Point-to-Point Interface in RSVP
2.5.4.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.5.5. PCEP Support for RSVP-TE LSPs
2.6. MPLS Traffic Engineering
2.6.1. TE Metric (IS-IS and OSPF)
2.7. Advanced MPLS/RSVP Features
2.7.1. LSP Path Change
2.7.2. Manual LSP Path Switch
2.7.3. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.7.4. Shared Risk Link Groups
2.7.4.1. Enabling Disjoint Backup Paths
2.7.4.2. Static Configurations of SRLG Memberships
2.7.5. TE Graceful Shutdown
2.8. MPLS/RSVP Configuration Process Overview
2.9. Configuration Notes
2.10. Configuring MPLS and RSVP with CLI
2.11. MPLS Configuration Overview
2.11.1. LSPs
2.11.2. Paths
2.11.3. Router Interface
2.11.4. Choosing the Signaling Protocol
2.12. Basic MPLS Configuration
2.13. Common Configuration Tasks
2.13.1. Configuring Global MPLS Parameters
2.13.2. Configuring an MPLS Interface
2.13.3. Configuring MPLS Paths
2.13.4. Configuring an MPLS LSP
2.13.4.1. Configuring a Static LSP
2.13.5. Configuring Manual Bypass Tunnels
2.14. Configuring RSVP Parameters
2.14.1. Configuring RSVP Message Pacing Parameters
2.14.2. Configuring Graceful Shutdown
2.15. MPLS Configuration Management Tasks
2.15.1. Modifying MPLS Parameters
2.15.2. Modifying an MPLS LSP
2.15.3. Modifying MPLS Path Parameters
2.15.4. Modifying MPLS Static LSP Parameters
2.15.5. Deleting an MPLS Interface
2.16. RSVP Configuration Management Tasks
2.16.1. Modifying RSVP Parameters
2.16.2. Modifying RSVP Message Pacing Parameters
2.16.3. Deleting an Interface from RSVP
2.17. MPLS/RSVP Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Configuration Commands
2.17.1.1.1. MPLS Commands
2.17.1.1.2. MPLS LSP Commands
2.17.1.1.3. MPLS Path Commands
2.17.1.1.4. RSVP Commands
2.17.1.2. Show Commands
2.17.1.3. Tools Commands
2.17.1.4. Clear Commands
2.17.1.5. Debug Commands
2.17.2. Command Descriptions
2.17.2.1. MPLS Configuration Commands
2.17.2.1.1. Generic Commands
2.17.2.1.2. MPLS Commands
2.17.2.1.3. MPLS Interface Commands
2.17.2.1.4. LSP Commands
2.17.2.1.5. Primary and Secondary Path Commands
2.17.2.1.6. LSP Path Commands
2.17.2.1.7. Static LSP Commands
2.17.2.2. RSVP Configuration Commands
2.17.2.2.1. Generic Commands
2.17.2.2.2. RSVP Commands
2.17.2.2.3. Interface Commands
2.17.2.2.4. Message Pacing Commands
2.17.2.3. Show Commands
2.17.2.3.1. Show MPLS Commands
2.17.2.3.2. Show RSVP Commands
2.17.2.4. Tools Commands
2.17.2.5. Clear Commands
2.17.2.6. Debug Commands
3. Label Distribution Protocol
3.1. In This Chapter
3.2. Label Distribution Protocol
3.2.1. LDP and MPLS
3.2.2. LDP Architecture
3.2.3. Subsystem Interrelationships
3.2.3.1. Memory Manager and LDP
3.2.3.2. Label Manager
3.2.3.3. LDP Configuration
3.2.3.4. Logger
3.2.3.5. Service Manager
3.2.4. Execution Flow
3.2.4.1. Initialization
3.2.4.2. Session Lifetime
3.2.4.2.1. Adjacency Establishment
3.2.4.2.2. Session Establishment
3.2.5. Label Exchange
3.2.5.1. Other Reasons for Label Actions
3.2.5.2. Cleanup
3.2.5.3. Configuring Implicit Null Label
3.2.5.4. Global LDP Filters
3.2.5.4.1. Per LDP Peer FEC Import and Export Policies
3.2.6. ECMP Support for LDP
3.2.6.1. Label Operations
3.2.7. Unnumbered Interface Support in LDP
3.2.7.1. Feature Configuration
3.2.7.2. Operation of LDP over an Unnumbered IP Interface
3.2.7.2.1. Link LDP
3.2.7.2.2. Targeted LDP
3.2.7.2.3. FEC Resolution
3.2.8. LDP Fast-Reroute for IS-IS and OSPF Prefixes
3.2.8.1. LDP FRR Configuration
3.2.8.1.1. Reducing the Scope of the LFA Calculation by SPF
3.2.8.2. LDP FRR Procedures
3.2.8.2.1. Link LDP Hello Adjacency Tracking with BFD
3.2.8.2.2. LDP FRR and RSVP Shortcut (IGP Shortcut)
3.2.8.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
3.2.8.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
3.2.8.3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.9. Multi-Area and Multi-Instance Extensions to LDP
3.3. LDP Process Overview
3.4. Configuring LDP with CLI
3.5. LDP Configuration Overview
3.6. Basic LDP Configuration
3.7. Common Configuration Tasks
3.7.1. Enabling LDP
3.7.2. Configuring Graceful-Restart Helper Parameters
3.7.3. Applying Export and Import Policies
3.7.4. Targeted Session Parameters
3.7.5. Interface Parameters
3.7.6. Session Parameters
3.7.7. LDP Signaling and Services
3.8. LDP Configuration Management Tasks
3.8.1. Disabling LDP
3.8.2. Modifying Targeted Session Parameters
3.8.3. Modifying Interface Parameters
3.9. LDP Command Reference
3.9.1. Command Hierarchies
3.9.1.1. LDP Commands
3.9.1.2. Show Commands
3.9.1.3. Clear Commands
3.9.1.4. Debug Commands
3.9.1.5. Tools Commands
3.9.2. Command Descriptions
3.9.2.1. Configuration Commands
3.9.2.1.1. Generic Commands
3.9.2.1.2. LDP Global Commands
3.9.2.1.3. Session Parameters Commands
3.9.2.1.4. Targeted Session Commands
3.9.2.2. Show Commands
3.9.2.3. Clear Commands
3.9.2.4. Debug Commands
3.9.2.5. Tools Commands
4. PCEP
4.1. Introduction to PCEP
4.2. Base Implementation of PCE
4.3. PCEP Session Establishment and Maintenance
4.4. PCEP Parameters
4.4.1. PCC Configuration
4.4.2. LSP Initiation
4.4.3. PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
4.5. PCEP Support for RSVP-TE LSPs
4.5.1. RSVP-TE LSP Configuration for a PCC Router
4.5.2. Behavior of the LSP Path Update
4.5.2.1. Path Update with Empty ERO
4.5.3. Behavior of LSP MBB
4.5.3.1. PCC-Controlled LSPs
4.5.3.2. PCE-Computed LSPs
4.5.3.3. PCE-Controlled LSPs
4.5.4. Behavior of Secondary LSP Paths
4.5.5. PCE Path Profile Support
4.6. LSP Path Diversity and Bidirectionality Constraints
4.7. PCEP Configuration Command Reference
4.7.1. Command Hierarchies
4.7.1.1. PCEP Commands
4.7.1.2. Show Commands
4.7.1.3. Tools Commands
4.7.2. Command Descriptions
4.7.2.1. PCEP Commands
4.7.2.2. Show Commands
4.7.2.3. Tools Commands
5. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Router Configuration Process
2. MPLS and RSVP
2.1. In This Chapter
2.2. MPLS
2.2.1. MPLS Label Stack
2.2.1.1. Label Values
2.2.2. Label Switching Routers
2.2.2.1. LSP Types
2.3. MPLS Pseudowire Hash Label Support
2.4. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.4.1. Manual Bypass LSP
2.4.1.1. PLR Bypass LSP Selection Rules
2.4.1.2. FRR Node-Protection (Facility)
2.4.1.3. Uniform FRR Failover Time
2.5. RSVP
2.5.1. Using RSVP for MPLS
2.5.1.1. RSVP Traffic Engineering Extensions for MPLS
2.5.1.1.1. Hello Protocol
2.5.1.1.2. MD5 Authentication of RSVP Interface
2.5.2. Reservation Styles
2.5.2.1. RSVP Message Pacing
2.5.3. RSVP Overhead Refresh Reduction
2.5.3.1. Configuring Implicit Null
2.5.4. Using Unnumbered Point-to-Point Interface in RSVP
2.5.4.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.5.5. PCEP Support for RSVP-TE LSPs
2.6. MPLS Traffic Engineering
2.6.1. TE Metric (IS-IS and OSPF)
2.7. Advanced MPLS/RSVP Features
2.7.1. LSP Path Change
2.7.2. Manual LSP Path Switch
2.7.3. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.7.4. Shared Risk Link Groups
2.7.4.1. Enabling Disjoint Backup Paths
2.7.4.2. Static Configurations of SRLG Memberships
2.7.5. TE Graceful Shutdown
2.8. MPLS/RSVP Configuration Process Overview
2.9. Configuration Notes
2.10. Configuring MPLS and RSVP with CLI
2.11. MPLS Configuration Overview
2.11.1. LSPs
2.11.2. Paths
2.11.3. Router Interface
2.11.4. Choosing the Signaling Protocol
2.12. Basic MPLS Configuration
2.13. Common Configuration Tasks
2.13.1. Configuring Global MPLS Parameters
2.13.2. Configuring an MPLS Interface
2.13.3. Configuring MPLS Paths
2.13.4. Configuring an MPLS LSP
2.13.4.1. Configuring a Static LSP
2.13.5. Configuring Manual Bypass Tunnels
2.14. Configuring RSVP Parameters
2.14.1. Configuring RSVP Message Pacing Parameters
2.14.2. Configuring Graceful Shutdown
2.15. MPLS Configuration Management Tasks
2.15.1. Modifying MPLS Parameters
2.15.2. Modifying an MPLS LSP
2.15.3. Modifying MPLS Path Parameters
2.15.4. Modifying MPLS Static LSP Parameters
2.15.5. Deleting an MPLS Interface
2.16. RSVP Configuration Management Tasks
2.16.1. Modifying RSVP Parameters
2.16.2. Modifying RSVP Message Pacing Parameters
2.16.3. Deleting an Interface from RSVP
2.17. MPLS/RSVP Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Configuration Commands
2.17.1.1.1. MPLS Commands
2.17.1.1.2. MPLS LSP Commands
2.17.1.1.3. MPLS Path Commands
2.17.1.1.4. RSVP Commands
2.17.1.2. Show Commands
2.17.1.3. Tools Commands
2.17.1.4. Clear Commands
2.17.1.5. Debug Commands
2.17.2. Command Descriptions
2.17.2.1. MPLS Configuration Commands
2.17.2.1.1. Generic Commands
2.17.2.1.2. MPLS Commands
2.17.2.1.3. MPLS Interface Commands
2.17.2.1.4. LSP Commands
2.17.2.1.5. Primary and Secondary Path Commands
2.17.2.1.6. LSP Path Commands
2.17.2.1.7. Static LSP Commands
2.17.2.2. RSVP Configuration Commands
2.17.2.2.1. Generic Commands
2.17.2.2.2. RSVP Commands
2.17.2.2.3. Interface Commands
2.17.2.2.4. Message Pacing Commands
2.17.2.3. Show Commands
2.17.2.3.1. Show MPLS Commands
2.17.2.3.2. Show RSVP Commands
2.17.2.4. Tools Commands
2.17.2.5. Clear Commands
2.17.2.6. Debug Commands
3. Label Distribution Protocol
3.1. In This Chapter
3.2. Label Distribution Protocol
3.2.1. LDP and MPLS
3.2.2. LDP Architecture
3.2.3. Subsystem Interrelationships
3.2.3.1. Memory Manager and LDP
3.2.3.2. Label Manager
3.2.3.3. LDP Configuration
3.2.3.4. Logger
3.2.3.5. Service Manager
3.2.4. Execution Flow
3.2.4.1. Initialization
3.2.4.2. Session Lifetime
3.2.4.2.1. Adjacency Establishment
3.2.4.2.2. Session Establishment
3.2.5. Label Exchange
3.2.5.1. Other Reasons for Label Actions
3.2.5.2. Cleanup
3.2.5.3. Configuring Implicit Null Label
3.2.5.4. Global LDP Filters
3.2.5.4.1. Per LDP Peer FEC Import and Export Policies
3.2.6. ECMP Support for LDP
3.2.6.1. Label Operations
3.2.7. Unnumbered Interface Support in LDP
3.2.7.1. Feature Configuration
3.2.7.2. Operation of LDP over an Unnumbered IP Interface
3.2.7.2.1. Link LDP
3.2.7.2.2. Targeted LDP
3.2.7.2.3. FEC Resolution
3.2.8. LDP Fast-Reroute for IS-IS and OSPF Prefixes
3.2.8.1. LDP FRR Configuration
3.2.8.1.1. Reducing the Scope of the LFA Calculation by SPF
3.2.8.2. LDP FRR Procedures
3.2.8.2.1. Link LDP Hello Adjacency Tracking with BFD
3.2.8.2.2. LDP FRR and RSVP Shortcut (IGP Shortcut)
3.2.8.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
3.2.8.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
3.2.8.3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.9. Multi-Area and Multi-Instance Extensions to LDP
3.3. LDP Process Overview
3.4. Configuring LDP with CLI
3.5. LDP Configuration Overview
3.6. Basic LDP Configuration
3.7. Common Configuration Tasks
3.7.1. Enabling LDP
3.7.2. Configuring Graceful-Restart Helper Parameters
3.7.3. Applying Export and Import Policies
3.7.4. Targeted Session Parameters
3.7.5. Interface Parameters
3.7.6. Session Parameters
3.7.7. LDP Signaling and Services
3.8. LDP Configuration Management Tasks
3.8.1. Disabling LDP
3.8.2. Modifying Targeted Session Parameters
3.8.3. Modifying Interface Parameters
3.9. LDP Command Reference
3.9.1. Command Hierarchies
3.9.1.1. LDP Commands
3.9.1.2. Show Commands
3.9.1.3. Clear Commands
3.9.1.4. Debug Commands
3.9.1.5. Tools Commands
3.9.2. Command Descriptions
3.9.2.1. Configuration Commands
3.9.2.1.1. Generic Commands
3.9.2.1.2. LDP Global Commands
3.9.2.1.3. Session Parameters Commands
3.9.2.1.4. Targeted Session Commands
3.9.2.2. Show Commands
3.9.2.3. Clear Commands
3.9.2.4. Debug Commands
3.9.2.5. Tools Commands
4. PCEP
4.1. Introduction to PCEP
4.2. Base Implementation of PCE
4.3. PCEP Session Establishment and Maintenance
4.4. PCEP Parameters
4.4.1. PCC Configuration
4.4.2. LSP Initiation
4.4.3. PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
4.5. PCEP Support for RSVP-TE LSPs
4.5.1. RSVP-TE LSP Configuration for a PCC Router
4.5.2. Behavior of the LSP Path Update
4.5.2.1. Path Update with Empty ERO
4.5.3. Behavior of LSP MBB
4.5.3.1. PCC-Controlled LSPs
4.5.3.2. PCE-Computed LSPs
4.5.3.3. PCE-Controlled LSPs
4.5.4. Behavior of Secondary LSP Paths
4.5.5. PCE Path Profile Support
4.6. LSP Path Diversity and Bidirectionality Constraints
4.7. PCEP Configuration Command Reference
4.7.1. Command Hierarchies
4.7.1.1. PCEP Commands
4.7.1.2. Show Commands
4.7.1.3. Tools Commands
4.7.2. Command Descriptions
4.7.2.1. PCEP Commands
4.7.2.2. Show Commands
4.7.2.3. Tools Commands
5. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, R6, R12, Mxp, Sx, S MPLS Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. MPLS and RSVP
2.1. MPLS
2.1.1. MPLS Label Stack
2.1.1.1. Label Values
2.1.2. Label Switching Routers
2.1.2.1. LSP Types
2.1.2.2. MPLS Fast Re-Route (FRR)
2.1.2.3. Manual Bypass LSP
2.1.2.3.1. PLR Bypass LSP Selection Rules
2.1.2.3.2. FRR Node-Protection (Facility)
2.1.2.3.3. Uniform FRR Failover Time
2.1.3. Configuration Guidelines
2.2. MPLS Pseudowire Hash Label Support
2.3. MPLS Transport Profile (MPLS-TP)
2.3.1. MPLS-TP Model
2.3.2. MPLS-TP Provider Edge and Gateway
2.3.2.1. VLL Services
2.3.3. Detailed Descriptions of MPLS-TP
2.3.3.1. MPLS-TP LSPs
2.3.3.2. MPLS-TP on Pseudowires
2.3.4. MPLS-TP Maintenance Identifiers
2.3.4.1. Generic Associated Channel
2.3.4.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.3.4.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.3.4.2.2. Proactive CC, CV and RDI
2.3.4.2.3. BFD-based RDI
2.3.4.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.3.4.4. Pseudowire Redundancy and Active / Standby Dual Homing
2.3.4.5. MPLS-TP LSP Protection
2.3.5. Configuring MPLS-TP
2.3.5.1. Configuration Overview
2.3.5.2. Node-Wide MPLS-TP Parameter Configuration
2.3.5.3. Node-Wide MPLS-TP Identifier Configuration
2.3.5.4. Static LSP and pseudowire (VC) Label and Tunnel Ranges
2.3.5.5. Interface Configuration for MPLS-TP
2.3.5.6. LER Configuration for MPLS-TP
2.3.5.6.1. LSP and Path Configuration
2.3.5.6.2. Proactive CC/CV (using BFD) Configuration
2.3.5.6.3. Protection templates and Linear Protection Configuration
2.3.5.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.4. RSVP
2.4.1. Using RSVP for MPLS
2.4.1.1. RSVP Traffic Engineering Extensions for MPLS
2.4.1.1.1. Hello Protocol
2.4.1.1.2. MD5 Authentication of RSVP Interface
2.4.2. Reservation Styles
2.4.2.1. RSVP Message Pacing
2.4.3. RSVP Overhead Refresh Reduction
2.4.3.1. Configuring Implicit Null
2.4.4. Using Unnumbered Point-to-Point Interface in RSVP
2.4.4.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.4.5. PCEP Support for RSVP-TE LSPs
2.5. Traffic Engineering
2.5.1. TE Metric (IS-IS and OSPF)
2.5.1.1. Maintenance of TE links and Nodes
2.6. Advanced MPLS/RSVP Features
2.6.1. Shared Risk Link Groups
2.6.1.1. Enabling Disjoint Backup Paths
2.6.1.2. Static Configurations of SRLG Memberships
2.6.2. TE Graceful Shutdown
2.6.3. Inter-Area TE LSP (ERO Expansion Method)
2.6.3.1. Automatic ABR Node Selection for Inter-Area LSP
2.6.3.1.1. Rerouting of Inter-Area LSP
2.6.3.1.2. Behavior of MPLS Options in Inter-Area LSP
2.6.3.2. Inter-Area LSP support of OSPF Virtual Links
2.6.3.3. Area Border Node FRR Protection for Inter-Area LSP
2.7. Point-to-Multipoint (P2MP) LSP
2.7.1. Application in Video Broadcast
2.7.2. P2MP LSP Data Plane
2.7.2.1. Procedures at Ingress LER Node
2.7.2.2. Procedures at LSR Node
2.7.2.3. Procedures at Branch LSR Node
2.7.2.4. Procedures at Egress LER Node
2.7.2.5. Procedures at BUD LSR Node
2.7.3. RSVP Control Plane in a P2MP LSP
2.7.4. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.7.4.1. Procedures at Ingress LER Node
2.7.4.2. Procedures at Egress LER Node
2.7.4.2.1. Procedures with a Primary Tunnel Interface
2.7.5. Configuration Guidelines for RSVP P2MP LSPs
2.8. MPLS/RSVP Configuration Process Overview
2.9. Configuration Notes
2.10. Configuring MPLS and RSVP with CLI
2.11. MPLS Configuration Overview
2.11.1. LSPs
2.11.2. Paths
2.11.3. Router Interface
2.11.4. Choosing the Signaling Protocol
2.12. Basic MPLS Configuration
2.13. Common Configuration Tasks
2.13.1. Configuring Global MPLS Parameters
2.13.2. Configuring an MPLS Interface
2.13.3. Configuring MPLS Paths
2.13.4. Configuring an MPLS LSP
2.13.4.1. Configuring a Static LSP
2.13.5. Configuring Manual Bypass Tunnels
2.14. Configuring RSVP Parameters
2.14.1. Configuring RSVP Message Pacing Parameters
2.14.2. Configuring Graceful Shutdown
2.15. MPLS Configuration Management Tasks
2.15.1. Modifying MPLS Parameters
2.15.2. Modifying an MPLS LSP
2.15.3. Modifying MPLS Path Parameters
2.15.4. Modifying MPLS Static LSP Parameters
2.15.5. Deleting an MPLS Interface
2.16. RSVP Configuration Management Tasks
2.16.1. Modifying RSVP Parameters
2.16.2. Modifying RSVP Message Pacing Parameters
2.16.3. Deleting an Interface from RSVP
2.17. MPLS/RSVP Command Reference
2.17.1. Command Hierarchies
2.17.1.1. MPLS Commands
2.17.1.2. MPLS-TP Commands
2.17.1.3. MPLS LSP Commands
2.17.1.4. MPLS-TP LSP Commands
2.17.1.5. MPLS Path Commands
2.17.1.6. RSVP Commands
2.17.1.7. Show Commands
2.17.1.8. Tools Commands
2.17.1.9. Clear Commands
2.17.1.10. Debug Commands
2.17.2. Command Descriptions
2.17.2.1. MPLS Configuration Commands
2.17.2.1.1. Generic Commands
2.17.2.1.2. MPLS Commands
2.17.2.1.3. MPLS Label Commands
2.17.2.1.4. MPLS Interface Commands
2.17.2.1.5. MPLS-TP Commands
2.17.2.1.6. LSP Commands
2.17.2.1.7. Primary and Secondary Path Commands
2.17.2.1.8. LSP Path Commands
2.17.2.1.9. Static LSP Commands
2.17.2.2. RSVP Configuration Commands
2.17.2.2.1. Generic Commands
2.17.2.2.2. RSVP Commands
2.17.2.2.3. Interface Commands
2.17.2.2.4. Message Pacing Commands
2.17.2.3. Show Commands
2.17.2.3.1. Show MPLS Commands
2.17.2.3.2. Show RSVP Commands
2.17.2.4. Tools Commands
2.17.2.5. Clear Commands
2.17.2.6. Debug Commands
3. Label Distribution Protocol
3.1. Label Distribution Protocol
3.1.1. LDP and MPLS
3.1.2. LDP Architecture
3.1.3. Subsystem Interrelationships
3.1.3.1. Memory Manager and LDP
3.1.3.2. Label Manager
3.1.3.3. LDP Configuration
3.1.3.4. Logger
3.1.3.5. Service Manager
3.1.4. Execution Flow
3.1.4.1. Initialization
3.1.4.2. Session Lifetime
3.1.4.2.1. Session Establishment
3.1.5. Label Exchange
3.1.5.1. Other Reasons for Label Actions
3.1.5.2. Cleanup
3.1.5.3. Configuring Implicit Null Label
3.1.5.4. LDP Filters
3.1.6. ECMP Support for LDP
3.1.6.1. Label Operations
3.1.6.2. LDP LSR ECMP Hashing
3.1.7. Link LDP
3.1.7.1. Targeted LDP
3.1.8. Unnumbered Interface Support in LDP
3.1.8.1. Feature Configuration
3.1.8.2. Operation of LDP over an Unnumbered IP Interface
3.1.8.2.1. Link LDP
3.1.8.2.2. Targeted LDP
3.1.8.2.3. FEC Resolution
3.1.9. LDP over RSVP Tunnels
3.1.9.1. Signaling and Operation
3.1.9.1.1. LDP Label Distribution and FEC Resolution
3.1.9.1.2. Default FEC Resolution Procedure
3.1.9.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
3.1.9.2. Rerouting Around Failures
3.1.9.2.1. LDP-over-RSVP Tunnel Protection
3.1.9.2.2. ABR Protection
3.1.10. T-LDP Session Tracking Using BFD
3.1.10.1. LDP Downstream-on-Demand (DoD)
3.1.10.1.1. Single-Hop LDP DoD Procedures
3.1.11. LDP over RSVP and ECMP
3.1.12. LDP Fast-Reroute for IS-IS and OSPF Prefixes
3.1.12.1. LDP FRR Configuration
3.1.12.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.12.2. LDP FRR Procedures
3.1.12.2.1. Link LDP Hello Adjacency Tracking with BFD
3.1.12.2.2. ECMP Considerations
3.1.13. LDP P2MP Support
3.1.13.1. LDP P2MP Configuration
3.1.13.2. LDP P2MP Protocol
3.1.13.3. Configuration Guidelines for P2MP LSPs
3.1.14. IS-IS and OSPF Support for Loop-Free Alternate Calculation
3.1.14.1. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.1.14.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.1.15. Multi-Area and Multi-Instance Extensions to LDP
3.2. LDP Process Overview
3.3. Configuring LDP with CLI
3.4. LDP Configuration Overview
3.5. Basic LDP Configuration
3.6. Common Configuration Tasks
3.6.1. Enabling LDP
3.6.2. Configuring FEC Originate Parameters
3.6.3. Configuring Graceful-Restart Helper Parameters
3.6.4. Applying Export and Import Policies
3.6.5. Targeted Session Parameters
3.6.6. Interface Parameters
3.6.7. Peer Parameters
3.6.8. LDP Signaling and Services
3.7. LDP Configuration Management Tasks
3.7.1. Disabling LDP
3.7.2. Modifying Targeted Session Parameters
3.7.3. Modifying Interface Parameters
3.8. LDP Command Reference
3.8.1. Command Hierarchies
3.8.1.1. LDP Commands
3.8.1.2. Show Commands
3.8.1.3. Clear Commands
3.8.1.4. Debug Commands
3.8.2. Command Descriptions
3.8.2.1. LDP Configuration Commands
3.8.2.1.1. Generic Commands
3.8.2.1.2. LDP Global Commands
3.8.2.1.3. Session Parameters Commands
3.8.2.1.4. Targeted Session Commands
3.8.2.1.5. TCP Session Parameters Commands
3.8.2.2. Show LDP Commands
3.8.2.3. Clear Commands
3.8.2.4. Debug Commands
4. PCEP
4.1. Introduction to PCEP
4.2. Base Implementation of PCE
4.3. PCEP Session Establishment and Maintenance
4.4. PCEP Parameters
4.4.1. PCC Configuration
4.4.2. LSP Initiation
4.4.3. PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
4.5. PCEP Support for RSVP-TE LSPs
4.5.1. RSVP-TE LSP Configuration for a PCC Router
4.5.2. Behavior of the LSP Path Update
4.5.2.1. Path Update with Empty ERO
4.5.3. Behavior of LSP MBB
4.5.3.1. PCC-Controlled LSPs
4.5.3.2. PCE-Computed LSPs
4.5.3.3. PCE-Controlled LSPs
4.5.4. Behavior of Secondary LSP Paths
4.5.5. PCE Path Profile Support
4.6. LSP Path Diversity and Bidirectionality Constraints
4.7. PCEP Configuration Command Reference
4.7.1. Command Hierarchies
4.7.1.1. PCEP Commands
4.7.1.2. Show Commands
4.7.1.3. Tools Commands
4.7.2. Command Descriptions
4.7.2.1. PCEP Commands
4.7.2.2. Show Commands
4.7.2.3. Tools Commands
5. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. MPLS and RSVP
2.1. MPLS
2.1.1. MPLS Label Stack
2.1.1.1. Label Values
2.1.2. Label Switching Routers
2.1.2.1. LSP Types
2.1.2.2. MPLS Fast Re-Route (FRR)
2.1.2.3. Manual Bypass LSP
2.1.2.3.1. PLR Bypass LSP Selection Rules
2.1.2.3.2. FRR Node-Protection (Facility)
2.1.2.3.3. Uniform FRR Failover Time
2.1.3. Configuration Guidelines
2.2. MPLS Pseudowire Hash Label Support
2.3. MPLS Transport Profile (MPLS-TP)
2.3.1. MPLS-TP Model
2.3.2. MPLS-TP Provider Edge and Gateway
2.3.2.1. VLL Services
2.3.3. Detailed Descriptions of MPLS-TP
2.3.3.1. MPLS-TP LSPs
2.3.3.2. MPLS-TP on Pseudowires
2.3.4. MPLS-TP Maintenance Identifiers
2.3.4.1. Generic Associated Channel
2.3.4.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.3.4.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.3.4.2.2. Proactive CC, CV and RDI
2.3.4.2.3. BFD-based RDI
2.3.4.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.3.4.4. Pseudowire Redundancy and Active / Standby Dual Homing
2.3.4.5. MPLS-TP LSP Protection
2.3.5. Configuring MPLS-TP
2.3.5.1. Configuration Overview
2.3.5.2. Node-Wide MPLS-TP Parameter Configuration
2.3.5.3. Node-Wide MPLS-TP Identifier Configuration
2.3.5.4. Static LSP and pseudowire (VC) Label and Tunnel Ranges
2.3.5.5. Interface Configuration for MPLS-TP
2.3.5.6. LER Configuration for MPLS-TP
2.3.5.6.1. LSP and Path Configuration
2.3.5.6.2. Proactive CC/CV (using BFD) Configuration
2.3.5.6.3. Protection templates and Linear Protection Configuration
2.3.5.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.4. RSVP
2.4.1. Using RSVP for MPLS
2.4.1.1. RSVP Traffic Engineering Extensions for MPLS
2.4.1.1.1. Hello Protocol
2.4.1.1.2. MD5 Authentication of RSVP Interface
2.4.2. Reservation Styles
2.4.2.1. RSVP Message Pacing
2.4.3. RSVP Overhead Refresh Reduction
2.4.3.1. Configuring Implicit Null
2.4.4. Using Unnumbered Point-to-Point Interface in RSVP
2.4.4.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.4.5. PCEP Support for RSVP-TE LSPs
2.5. Traffic Engineering
2.5.1. TE Metric (IS-IS and OSPF)
2.5.1.1. Maintenance of TE links and Nodes
2.6. Advanced MPLS/RSVP Features
2.6.1. Shared Risk Link Groups
2.6.1.1. Enabling Disjoint Backup Paths
2.6.1.2. Static Configurations of SRLG Memberships
2.6.2. TE Graceful Shutdown
2.6.3. Inter-Area TE LSP (ERO Expansion Method)
2.6.3.1. Automatic ABR Node Selection for Inter-Area LSP
2.6.3.1.1. Rerouting of Inter-Area LSP
2.6.3.1.2. Behavior of MPLS Options in Inter-Area LSP
2.6.3.2. Inter-Area LSP support of OSPF Virtual Links
2.6.3.3. Area Border Node FRR Protection for Inter-Area LSP
2.7. Point-to-Multipoint (P2MP) LSP
2.7.1. Application in Video Broadcast
2.7.2. P2MP LSP Data Plane
2.7.2.1. Procedures at Ingress LER Node
2.7.2.2. Procedures at LSR Node
2.7.2.3. Procedures at Branch LSR Node
2.7.2.4. Procedures at Egress LER Node
2.7.2.5. Procedures at BUD LSR Node
2.7.3. RSVP Control Plane in a P2MP LSP
2.7.4. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.7.4.1. Procedures at Ingress LER Node
2.7.4.2. Procedures at Egress LER Node
2.7.4.2.1. Procedures with a Primary Tunnel Interface
2.7.5. Configuration Guidelines for RSVP P2MP LSPs
2.8. MPLS/RSVP Configuration Process Overview
2.9. Configuration Notes
2.10. Configuring MPLS and RSVP with CLI
2.11. MPLS Configuration Overview
2.11.1. LSPs
2.11.2. Paths
2.11.3. Router Interface
2.11.4. Choosing the Signaling Protocol
2.12. Basic MPLS Configuration
2.13. Common Configuration Tasks
2.13.1. Configuring Global MPLS Parameters
2.13.2. Configuring an MPLS Interface
2.13.3. Configuring MPLS Paths
2.13.4. Configuring an MPLS LSP
2.13.4.1. Configuring a Static LSP
2.13.5. Configuring Manual Bypass Tunnels
2.14. Configuring RSVP Parameters
2.14.1. Configuring RSVP Message Pacing Parameters
2.14.2. Configuring Graceful Shutdown
2.15. MPLS Configuration Management Tasks
2.15.1. Modifying MPLS Parameters
2.15.2. Modifying an MPLS LSP
2.15.3. Modifying MPLS Path Parameters
2.15.4. Modifying MPLS Static LSP Parameters
2.15.5. Deleting an MPLS Interface
2.16. RSVP Configuration Management Tasks
2.16.1. Modifying RSVP Parameters
2.16.2. Modifying RSVP Message Pacing Parameters
2.16.3. Deleting an Interface from RSVP
2.17. MPLS/RSVP Command Reference
2.17.1. Command Hierarchies
2.17.1.1. MPLS Commands
2.17.1.2. MPLS-TP Commands
2.17.1.3. MPLS LSP Commands
2.17.1.4. MPLS-TP LSP Commands
2.17.1.5. MPLS Path Commands
2.17.1.6. RSVP Commands
2.17.1.7. Show Commands
2.17.1.8. Tools Commands
2.17.1.9. Clear Commands
2.17.1.10. Debug Commands
2.17.2. Command Descriptions
2.17.2.1. MPLS Configuration Commands
2.17.2.1.1. Generic Commands
2.17.2.1.2. MPLS Commands
2.17.2.1.3. MPLS Label Commands
2.17.2.1.4. MPLS Interface Commands
2.17.2.1.5. MPLS-TP Commands
2.17.2.1.6. LSP Commands
2.17.2.1.7. Primary and Secondary Path Commands
2.17.2.1.8. LSP Path Commands
2.17.2.1.9. Static LSP Commands
2.17.2.2. RSVP Configuration Commands
2.17.2.2.1. Generic Commands
2.17.2.2.2. RSVP Commands
2.17.2.2.3. Interface Commands
2.17.2.2.4. Message Pacing Commands
2.17.2.3. Show Commands
2.17.2.3.1. Show MPLS Commands
2.17.2.3.2. Show RSVP Commands
2.17.2.4. Tools Commands
2.17.2.5. Clear Commands
2.17.2.6. Debug Commands
3. Label Distribution Protocol
3.1. Label Distribution Protocol
3.1.1. LDP and MPLS
3.1.2. LDP Architecture
3.1.3. Subsystem Interrelationships
3.1.3.1. Memory Manager and LDP
3.1.3.2. Label Manager
3.1.3.3. LDP Configuration
3.1.3.4. Logger
3.1.3.5. Service Manager
3.1.4. Execution Flow
3.1.4.1. Initialization
3.1.4.2. Session Lifetime
3.1.4.2.1. Session Establishment
3.1.5. Label Exchange
3.1.5.1. Other Reasons for Label Actions
3.1.5.2. Cleanup
3.1.5.3. Configuring Implicit Null Label
3.1.5.4. LDP Filters
3.1.6. ECMP Support for LDP
3.1.6.1. Label Operations
3.1.6.2. LDP LSR ECMP Hashing
3.1.7. Link LDP
3.1.7.1. Targeted LDP
3.1.8. Unnumbered Interface Support in LDP
3.1.8.1. Feature Configuration
3.1.8.2. Operation of LDP over an Unnumbered IP Interface
3.1.8.2.1. Link LDP
3.1.8.2.2. Targeted LDP
3.1.8.2.3. FEC Resolution
3.1.9. LDP over RSVP Tunnels
3.1.9.1. Signaling and Operation
3.1.9.1.1. LDP Label Distribution and FEC Resolution
3.1.9.1.2. Default FEC Resolution Procedure
3.1.9.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
3.1.9.2. Rerouting Around Failures
3.1.9.2.1. LDP-over-RSVP Tunnel Protection
3.1.9.2.2. ABR Protection
3.1.10. T-LDP Session Tracking Using BFD
3.1.10.1. LDP Downstream-on-Demand (DoD)
3.1.10.1.1. Single-Hop LDP DoD Procedures
3.1.11. LDP over RSVP and ECMP
3.1.12. LDP Fast-Reroute for IS-IS and OSPF Prefixes
3.1.12.1. LDP FRR Configuration
3.1.12.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.12.2. LDP FRR Procedures
3.1.12.2.1. Link LDP Hello Adjacency Tracking with BFD
3.1.12.2.2. ECMP Considerations
3.1.13. LDP P2MP Support
3.1.13.1. LDP P2MP Configuration
3.1.13.2. LDP P2MP Protocol
3.1.13.3. Configuration Guidelines for P2MP LSPs
3.1.14. IS-IS and OSPF Support for Loop-Free Alternate Calculation
3.1.14.1. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.1.14.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.1.15. Multi-Area and Multi-Instance Extensions to LDP
3.2. LDP Process Overview
3.3. Configuring LDP with CLI
3.4. LDP Configuration Overview
3.5. Basic LDP Configuration
3.6. Common Configuration Tasks
3.6.1. Enabling LDP
3.6.2. Configuring FEC Originate Parameters
3.6.3. Configuring Graceful-Restart Helper Parameters
3.6.4. Applying Export and Import Policies
3.6.5. Targeted Session Parameters
3.6.6. Interface Parameters
3.6.7. Peer Parameters
3.6.8. LDP Signaling and Services
3.7. LDP Configuration Management Tasks
3.7.1. Disabling LDP
3.7.2. Modifying Targeted Session Parameters
3.7.3. Modifying Interface Parameters
3.8. LDP Command Reference
3.8.1. Command Hierarchies
3.8.1.1. LDP Commands
3.8.1.2. Show Commands
3.8.1.3. Clear Commands
3.8.1.4. Debug Commands
3.8.2. Command Descriptions
3.8.2.1. LDP Configuration Commands
3.8.2.1.1. Generic Commands
3.8.2.1.2. LDP Global Commands
3.8.2.1.3. Session Parameters Commands
3.8.2.1.4. Targeted Session Commands
3.8.2.1.5. TCP Session Parameters Commands
3.8.2.2. Show LDP Commands
3.8.2.3. Clear Commands
3.8.2.4. Debug Commands
4. PCEP
4.1. Introduction to PCEP
4.2. Base Implementation of PCE
4.3. PCEP Session Establishment and Maintenance
4.4. PCEP Parameters
4.4.1. PCC Configuration
4.4.2. LSP Initiation
4.4.3. PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
4.5. PCEP Support for RSVP-TE LSPs
4.5.1. RSVP-TE LSP Configuration for a PCC Router
4.5.2. Behavior of the LSP Path Update
4.5.2.1. Path Update with Empty ERO
4.5.3. Behavior of LSP MBB
4.5.3.1. PCC-Controlled LSPs
4.5.3.2. PCE-Computed LSPs
4.5.3.3. PCE-Controlled LSPs
4.5.4. Behavior of Secondary LSP Paths
4.5.5. PCE Path Profile Support
4.6. LSP Path Diversity and Bidirectionality Constraints
4.7. PCEP Configuration Command Reference
4.7.1. Command Hierarchies
4.7.1.1. PCEP Commands
4.7.1.2. Show Commands
4.7.1.3. Tools Commands
4.7.2. Command Descriptions
4.7.2.1. PCEP Commands
4.7.2.2. Show Commands
4.7.2.3. Tools Commands
5. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C OAM and Diagnostics Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. OAM Configuration Process
2. Mirror Services
2.1. In This Chapter
2.2. Service Mirroring
2.3. Mirror Implementation
2.3.1. Mirror Sources and Destinations
2.3.1.1. Local and Remote Mirroring
2.3.2. Mirroring Performance
2.3.3. Mirroring Configuration
2.4. Configuration Process Overview
2.5. Configuration Guidelines
2.6. Configuring Service Mirroring with CLI
2.6.1. Mirror Configuration Overview
2.6.1.1. Defining Mirrored Traffic
2.7. Basic Mirroring Configuration
2.7.1. Mirror Classification Rules
2.7.1.1. Port
2.7.1.2. SAP
2.7.1.3. MAC filter
2.7.1.4. IP filter
2.8. Common Configuration Tasks
2.8.1. Configuring a Local Mirror Service
2.8.2. Configuring a Remote Mirror Service
2.9. Service Management Tasks
2.9.1. Modifying a Local Mirrored Service
2.9.2. Deleting a Local Mirrored Service
2.10. Mirror Service Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Configuration Commands
2.10.1.1.1. Mirror Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
2.10.1.1.2. Mirror Configuration Commands for 7210 SAS-K 2F1C2T
2.10.1.1.3. Mirror Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.10.1.2. Show Commands
2.10.1.3. Debug Commands
2.10.2. Command Descriptions
2.10.2.1. Configuration Commands
2.10.2.1.1. Generic Commands
2.10.2.1.2. Mirror Destination Configuration Commands
2.10.2.2. Show Commands
2.10.2.3. Debug Commands
3. OAM and SAA
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.1.1. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.1.2. ECMP Considerations
3.1.1.3. LSP Ping and LSP Trace over Unnumbered IP Interface
3.1.1.4. Downstream Detailed Mapping (DDMAP) TLV
3.1.1.5. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.1.5.1. Responder Node Procedures
3.1.1.5.2. Sender Node Procedures
3.1.2. MPLS OAM Support in Segment Routing
3.1.2.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.2.2. Operating Guidelines on SR-ISIS or SR-OSPF Tunnels
3.1.2.3. Operating Guidelines on SR-ISIS Tunnel Stitched to LDP FEC
3.1.2.4. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel or an SR-OSPF IPv4 Tunnel
3.1.3. SDP Diagnostics
3.1.3.1. SDP Ping
3.1.3.2. SDP MTU Path Discovery
3.1.4. Service Diagnostics
3.1.5. VPLS MAC Diagnostics
3.1.5.1. MAC Ping
3.1.5.2. MAC Trace
3.1.5.3. CPE Ping
3.1.5.4. MAC Populate
3.1.5.5. MAC Purge
3.1.6. VLL Diagnostics
3.1.6.1. VCCV Ping
3.1.6.1.1. VCCV-Ping Application
3.1.6.1.2. VCCV Ping in a Multi-Segment Pseudo-wire
3.1.6.2. Automated VCCV-Trace Capability for MS-Pseudo-wire
3.1.6.2.1. VCCV for Static Pseudo-wire Segments
3.1.6.2.2. Detailed VCCV-Trace Operation
3.1.6.2.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudo-wire
3.2. IP Performance Monitoring
3.2.1. Two-Way Active Measurement Protocol
3.2.1.1. Configuration Notes
3.2.2. Two-Way Active Measurement Protocol Light
3.3. Ethernet Connectivity Fault Management
3.3.1. ETH-CFM Building Blocks
3.3.1.1. Loopback
3.3.1.2. Linktrace
3.3.1.3. Continuity Check (CC)
3.3.1.4. Alarm Indication Signal (ETH-AIS Y.1731)
3.3.1.5. Test (ETH-TST Y.1731)
3.3.1.6. ETH-CFM Configuration Guidelines
3.3.2. Y.1731 Timestamp Capability
3.3.2.1. One-Way Delay Measurement (ETH-1DM Y.1731)
3.3.2.2. Two-Way Delay Measurement (ETH-DMM Y.1731)
3.3.3. ITU-T Y.1731 Ethernet Bandwidth Notification
3.3.4. Port-Based MEPs
3.4. ETH-CFM Statistics
3.5. Synthetic Loss Measurement (ETH-SL)
3.5.1. Configuration Example
3.6. ETH-CFM QoS Considerations
3.6.1. Configuration Guidelines for ETH-CFM/Y.1731
3.7. OAM Mapping
3.7.1. CFM Connectivity Fault Conditions
3.7.2. CFM Fault Propagation Methods
3.7.3. Epipe Services
3.7.3.1. CFM Detected Fault
3.7.3.2. Service Down
3.7.3.3. LLF and CFM Fault Propagation
3.7.3.4. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.7.4. Fault Propagation to access dot1q/QinQ ports with access-uplink ports
3.7.4.1. Configuring Fault propagation
3.7.4.1.1. Configuration Example for fault propagation using oper-group
3.8. Service Assurance Agent Overview
3.8.1. Traceroute Implementation
3.8.2. NTP
3.8.3. Ethernet CFM
3.8.4. Writing SAA Results to Accounting Files
3.8.4.1. Accounting File Management
3.8.4.2. Assigning SAA to an Accounting File ID
3.8.4.3. Continuous Testing
3.8.5. Configuring SAA Test Parameters
3.9. Y.1564 Testhead OAM tool
3.9.1. Prerequisites for using the Testhead Tool
3.9.1.1. Generic Prerequisites for Use of the Y.1564 Testhead OAM Tool (Applicable to all 7210 SAS Platforms)
3.9.2. Service Test Testhead OAM Tool for the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.9.2.1. Ethernet Frame Size Specification
3.9.3. Configuration Guidelines
3.9.4. Configuring Testhead Tool Parameters
3.9.4.1. Allocating CAM Resources for the OAM Testhead Tool on the 7210 SAS-D
3.9.4.2. Loopback Ports on the 7210 SAS-D
3.9.4.3. Configuring the Testhead Profile for the OAM Testhead Tool
3.9.4.4. Starting the Testhead Test and Displaying Results
3.9.5. Configuring Service Test OAM Testhead Tool Parameters
3.9.6. Port Loopback for Ethernet Ports
3.9.7. SAP Loopback for Ethernet SAPs
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Measurement Intervals
3.10.4. Data Structures and Storage
3.10.5. Bin Groups
3.10.6. Relating the Components
3.10.7. Monitoring
3.10.7.1. Accounting Policy Configuration
3.10.7.2. ETH-CFM Configuration
3.10.7.3. Service Configuration
3.10.7.4. OAM-PM Configuration
3.10.7.5. Show and Monitor Commands
3.11. Diagnostics Command Reference
3.11.1. Command Hierarchies
3.11.1.1. OAM Commands
3.11.1.1.1. Base Operational Commands
3.11.1.1.2. Show Commands
3.11.1.1.3. Clear Commands
3.11.1.2. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.1.2.1. OAM-PM Session IP Commands for 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.11.1.2.2. CFM Command for DMM Interop on 7210 SAS-D and 7210 SAS-Dxp
3.11.1.3. SAA Commands
3.11.1.3.1. Show Commands
3.11.1.3.2. Monitor Commands
3.11.1.3.3. Clear Commands for TWAMP for 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, and 7210 SAS-K 2F6C4T
3.11.1.3.4. Clear Commands
3.11.2. Command Descriptions
3.11.2.1. Operational Commands
3.11.2.2. Service Diagnostics
3.11.2.3. VPLS MAC Diagnostics
3.11.2.4. EFM Commands
3.11.2.5. ETH-CFM OAM Commands
3.11.2.6. ETH CFM Configuration Commands
3.11.2.7. Y.1564 Test Profile Commands
3.11.2.7.1. OAM Testhead Commands
3.11.2.8. Y.1564 Service Test Commands
3.11.2.9. OAM Service Test Commands
3.11.2.10. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.2.11. Service Assurance Agent (SAA) Commands
3.11.2.12. OAM SAA Commands
3.11.2.13. LDP Diagnostics Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.11.2.14. LDP Treetrace Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.11.2.15. TWAMP commands
3.11.2.15.1. TWAMP Light Commands
3.11.2.16. Show Commands
3.11.2.17. Monitor Commands
3.11.2.18. Clear Commands
3.12. Tools Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands
3.12.1.1.1. Dump Commands
3.12.1.1.2. Dump Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.12.1.1.3. Perform Commands for 7210 SAS-D
3.12.1.1.4. Perform Commands for 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.12.2. Command Descriptions
3.12.2.1. Configuration Commands
3.12.2.1.1. Generic Commands
3.12.2.1.2. Dump Commands
3.12.2.1.3. Service Commands
3.12.2.1.4. Router Commands
3.12.2.1.5. Perform Commands
3.12.2.2. Tools Dump Command Descriptions for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.12.2.2.1. Dump Router Commands
4. Common CLI Command Descriptions
4.1. In This Chapter
4.1.1. Command Descriptions
4.1.1.1. SAP Syntax
4.1.1.2. Port Syntax
5. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. OAM Configuration Process
2. Mirror Services
2.1. In This Chapter
2.2. Service Mirroring
2.3. Mirror Implementation
2.3.1. Mirror Sources and Destinations
2.3.1.1. Local and Remote Mirroring
2.3.2. Mirroring Performance
2.3.3. Mirroring Configuration
2.4. Configuration Process Overview
2.5. Configuration Guidelines
2.6. Configuring Service Mirroring with CLI
2.6.1. Mirror Configuration Overview
2.6.1.1. Defining Mirrored Traffic
2.7. Basic Mirroring Configuration
2.7.1. Mirror Classification Rules
2.7.1.1. Port
2.7.1.2. SAP
2.7.1.3. MAC filter
2.7.1.4. IP filter
2.8. Common Configuration Tasks
2.8.1. Configuring a Local Mirror Service
2.8.2. Configuring a Remote Mirror Service
2.9. Service Management Tasks
2.9.1. Modifying a Local Mirrored Service
2.9.2. Deleting a Local Mirrored Service
2.10. Mirror Service Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Configuration Commands
2.10.1.1.1. Mirror Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
2.10.1.1.2. Mirror Configuration Commands for 7210 SAS-K 2F1C2T
2.10.1.1.3. Mirror Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.10.1.2. Show Commands
2.10.1.3. Debug Commands
2.10.2. Command Descriptions
2.10.2.1. Configuration Commands
2.10.2.1.1. Generic Commands
2.10.2.1.2. Mirror Destination Configuration Commands
2.10.2.2. Show Commands
2.10.2.3. Debug Commands
3. OAM and SAA
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.1.1. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.1.2. ECMP Considerations
3.1.1.3. LSP Ping and LSP Trace over Unnumbered IP Interface
3.1.1.4. Downstream Detailed Mapping (DDMAP) TLV
3.1.1.5. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.1.5.1. Responder Node Procedures
3.1.1.5.2. Sender Node Procedures
3.1.2. MPLS OAM Support in Segment Routing
3.1.2.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.2.2. Operating Guidelines on SR-ISIS or SR-OSPF Tunnels
3.1.2.3. Operating Guidelines on SR-ISIS Tunnel Stitched to LDP FEC
3.1.2.4. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel or an SR-OSPF IPv4 Tunnel
3.1.3. SDP Diagnostics
3.1.3.1. SDP Ping
3.1.3.2. SDP MTU Path Discovery
3.1.4. Service Diagnostics
3.1.5. VPLS MAC Diagnostics
3.1.5.1. MAC Ping
3.1.5.2. MAC Trace
3.1.5.3. CPE Ping
3.1.5.4. MAC Populate
3.1.5.5. MAC Purge
3.1.6. VLL Diagnostics
3.1.6.1. VCCV Ping
3.1.6.1.1. VCCV-Ping Application
3.1.6.1.2. VCCV Ping in a Multi-Segment Pseudo-wire
3.1.6.2. Automated VCCV-Trace Capability for MS-Pseudo-wire
3.1.6.2.1. VCCV for Static Pseudo-wire Segments
3.1.6.2.2. Detailed VCCV-Trace Operation
3.1.6.2.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudo-wire
3.2. IP Performance Monitoring
3.2.1. Two-Way Active Measurement Protocol
3.2.1.1. Configuration Notes
3.2.2. Two-Way Active Measurement Protocol Light
3.3. Ethernet Connectivity Fault Management
3.3.1. ETH-CFM Building Blocks
3.3.1.1. Loopback
3.3.1.2. Linktrace
3.3.1.3. Continuity Check (CC)
3.3.1.4. Alarm Indication Signal (ETH-AIS Y.1731)
3.3.1.5. Test (ETH-TST Y.1731)
3.3.1.6. ETH-CFM Configuration Guidelines
3.3.2. Y.1731 Timestamp Capability
3.3.2.1. One-Way Delay Measurement (ETH-1DM Y.1731)
3.3.2.2. Two-Way Delay Measurement (ETH-DMM Y.1731)
3.3.3. ITU-T Y.1731 Ethernet Bandwidth Notification
3.3.4. Port-Based MEPs
3.4. ETH-CFM Statistics
3.5. Synthetic Loss Measurement (ETH-SL)
3.5.1. Configuration Example
3.6. ETH-CFM QoS Considerations
3.6.1. Configuration Guidelines for ETH-CFM/Y.1731
3.7. OAM Mapping
3.7.1. CFM Connectivity Fault Conditions
3.7.2. CFM Fault Propagation Methods
3.7.3. Epipe Services
3.7.3.1. CFM Detected Fault
3.7.3.2. Service Down
3.7.3.3. LLF and CFM Fault Propagation
3.7.3.4. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.7.4. Fault Propagation to access dot1q/QinQ ports with access-uplink ports
3.7.4.1. Configuring Fault propagation
3.7.4.1.1. Configuration Example for fault propagation using oper-group
3.8. Service Assurance Agent Overview
3.8.1. Traceroute Implementation
3.8.2. NTP
3.8.3. Ethernet CFM
3.8.4. Writing SAA Results to Accounting Files
3.8.4.1. Accounting File Management
3.8.4.2. Assigning SAA to an Accounting File ID
3.8.4.3. Continuous Testing
3.8.5. Configuring SAA Test Parameters
3.9. Y.1564 Testhead OAM tool
3.9.1. Prerequisites for using the Testhead Tool
3.9.1.1. Generic Prerequisites for Use of the Y.1564 Testhead OAM Tool (Applicable to all 7210 SAS Platforms)
3.9.2. Service Test Testhead OAM Tool for the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.9.2.1. Ethernet Frame Size Specification
3.9.3. Configuration Guidelines
3.9.4. Configuring Testhead Tool Parameters
3.9.4.1. Allocating CAM Resources for the OAM Testhead Tool on the 7210 SAS-D
3.9.4.2. Loopback Ports on the 7210 SAS-D
3.9.4.3. Configuring the Testhead Profile for the OAM Testhead Tool
3.9.4.4. Starting the Testhead Test and Displaying Results
3.9.5. Configuring Service Test OAM Testhead Tool Parameters
3.9.6. Port Loopback for Ethernet Ports
3.9.7. SAP Loopback for Ethernet SAPs
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Measurement Intervals
3.10.4. Data Structures and Storage
3.10.5. Bin Groups
3.10.6. Relating the Components
3.10.7. Monitoring
3.10.7.1. Accounting Policy Configuration
3.10.7.2. ETH-CFM Configuration
3.10.7.3. Service Configuration
3.10.7.4. OAM-PM Configuration
3.10.7.5. Show and Monitor Commands
3.11. Diagnostics Command Reference
3.11.1. Command Hierarchies
3.11.1.1. OAM Commands
3.11.1.1.1. Base Operational Commands
3.11.1.1.2. Show Commands
3.11.1.1.3. Clear Commands
3.11.1.2. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.1.2.1. OAM-PM Session IP Commands for 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.11.1.2.2. CFM Command for DMM Interop on 7210 SAS-D and 7210 SAS-Dxp
3.11.1.3. SAA Commands
3.11.1.3.1. Show Commands
3.11.1.3.2. Monitor Commands
3.11.1.3.3. Clear Commands for TWAMP for 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, and 7210 SAS-K 2F6C4T
3.11.1.3.4. Clear Commands
3.11.2. Command Descriptions
3.11.2.1. Operational Commands
3.11.2.2. Service Diagnostics
3.11.2.3. VPLS MAC Diagnostics
3.11.2.4. EFM Commands
3.11.2.5. ETH-CFM OAM Commands
3.11.2.6. ETH CFM Configuration Commands
3.11.2.7. Y.1564 Test Profile Commands
3.11.2.7.1. OAM Testhead Commands
3.11.2.8. Y.1564 Service Test Commands
3.11.2.9. OAM Service Test Commands
3.11.2.10. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.2.11. Service Assurance Agent (SAA) Commands
3.11.2.12. OAM SAA Commands
3.11.2.13. LDP Diagnostics Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.11.2.14. LDP Treetrace Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.11.2.15. TWAMP commands
3.11.2.15.1. TWAMP Light Commands
3.11.2.16. Show Commands
3.11.2.17. Monitor Commands
3.11.2.18. Clear Commands
3.12. Tools Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands
3.12.1.1.1. Dump Commands
3.12.1.1.2. Dump Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.12.1.1.3. Perform Commands for 7210 SAS-D
3.12.1.1.4. Perform Commands for 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.12.2. Command Descriptions
3.12.2.1. Configuration Commands
3.12.2.1.1. Generic Commands
3.12.2.1.2. Dump Commands
3.12.2.1.3. Service Commands
3.12.2.1.4. Router Commands
3.12.2.1.5. Perform Commands
3.12.2.2. Tools Dump Command Descriptions for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.12.2.2.1. Dump Router Commands
4. Common CLI Command Descriptions
4.1. In This Chapter
4.1.1. Command Descriptions
4.1.1.1. SAP Syntax
4.1.1.2. Port Syntax
5. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, R6, R12, Mxp, Sx, S OAM and Diagnostics Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS Services Configuration Process
2. Mirror Services
2.1. Service Mirroring
2.2. Mirror Implementation
2.2.1. Mirror Source and Destinations
2.2.1.1. Local and Remote Mirroring
2.2.2. Mirroring Performance
2.2.3. Mirroring Configuration
2.3. Configuration Process Overview
2.4. Configuration Notes
2.5. Configuring Service Mirroring with CLI
2.5.1. Mirror Configuration Overview
2.5.1.1. Defining Mirrored Traffic
2.6. Basic Mirroring Configuration
2.6.1. Mirror Classification Rules
2.6.1.1. Port
2.6.1.2. SAP
2.6.1.3. MAC filter
2.6.1.4. IP filter
2.7. Common Configuration Tasks
2.7.1. Configuring a Local Mirror Service
2.7.2. Configuring a Remote Mirror Service
2.8. Service Management Tasks
2.8.1. Modifying a Local Mirrored Service
2.8.2. Deleting a Local Mirrored Service
2.8.3. Modifying a Remote Mirrored Service
2.8.4. Deleting a Remote Mirrored Service
2.9. Mirror Service Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Mirror Configuration Commands for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE in Network Mode
2.9.1.2. Mirror Configuration Commands for 7210 SAS Devices Configured in Access-uplink Mode
2.9.1.3. Mirror Configuration Commands for 7210 SAS-M and 7210 SAS-T in Network Mode, 7210 SAS-Sx/S 1/10GE, 7210 SAS-Sx 10/100GE, 7210 SAS-Mxp, 7210 SAS-R6, and 7210 SAS-R12
2.9.1.4. Show Commands
2.9.1.5. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Configuration Commands
2.9.2.1.1. Generic Commands
2.9.2.1.2. Mirror Destination Configuration Commands
2.9.2.1.3. Mirror Source Configuration Commands
2.9.2.2. Show Commands
3. OAM and SAA
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.1.1. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.1.2. ECMP Considerations
3.1.1.3. LSP Ping and LSP Trace over Unnumbered IP Interface
3.1.1.4. Downstream Detailed Mapping (DDMAP) TLV
3.1.1.5. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.1.5.1. Responder Node Procedures
3.1.1.5.2. Sender Node Procedures
3.1.2. MPLS OAM Support in Segment Routing
3.1.2.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.2.2. Operating Guidelines on SR-ISIS or SR-OSPF Tunnels
3.1.2.3. Operating Guidelines on SR-ISIS Tunnel Stitched to LDP FEC
3.1.2.4. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel or an SR-OSPF IPv4 Tunnel
3.1.3. LSP Ping for RSVP P2MP LSP
3.1.4. LSP Trace for RSVP P2MP LSP
3.1.4.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.5. SDP Diagnostics
3.1.5.1. SDP Ping
3.1.5.2. SDP MTU Path Discovery
3.1.6. Service Diagnostics
3.1.7. VPLS MAC Diagnostics
3.1.7.1. MAC Ping
3.1.7.2. MAC Trace
3.1.7.3. CPE Ping
3.1.7.4. MAC Populate
3.1.7.5. MAC Purge
3.1.8. VLL Diagnostics
3.1.8.1. VCCV Ping
3.1.8.1.1. VCCV-Ping Application
3.1.8.1.2. VCCV-Ping in a Multi-Segment Pseudowire
3.1.8.2. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.8.2.1. VCCV for Static Pseudowire Segments
3.1.8.2.2. Detailed VCCV-Trace Operation
3.1.8.2.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.9. MPLS-TP On-Demand OAM Commands
3.1.9.1. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.9.2. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.10. MPLS-TP Show Commands
3.1.10.1. Static MPLS Labels
3.1.10.2. MPLS-TP Tunnel Configuration
3.1.10.3. MPLS-TP Path configuration.
3.1.10.4. MPLS-TP Protection
3.1.10.5. BFD
3.1.10.6. MPLS TP Node Configuration
3.1.10.7. MPLS-TP Interfaces
3.1.10.8. Services using MPLS-TP PWs
3.1.11. MPLS-TP DEBUG COMMANDS
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.1.1. Configuration Notes
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. Ethernet Connectivity Fault Management
3.3.1. ETH-CFM Building Blocks
3.3.1.1. Loopback
3.3.1.2. Linktrace
3.3.1.3. Continuity Check (CC)
3.3.1.4. Alarm Indication Signal (ETH-AIS Y.1731)
3.3.1.5. Test (ETH-TST Y.1731)
3.3.1.6. ETH-CFM Configuration Guidelines
3.3.2. Y.1731 Time Stamp Capability
3.3.3. ITU-T Y.1731 Ethernet Bandwidth Notification
3.3.3.1. ETH-BN Configuration Guidelines
3.3.4. Port-Based MEPs
3.4. ETH-CFM Statistics
3.5. Synthetic Loss Measurement (ETH-SL)
3.5.1. Configuration Example
3.6. ETH-CFM QoS Considerations
3.6.1. Configuration Guidelines
3.7. OAM Mapping
3.7.1. CFM Connectivity Fault Conditions
3.7.2. CFM Fault Propagation Methods
3.7.3. Epipe Services
3.7.3.1. CFM Detected Fault
3.7.3.2. SAP/SDP-Binding Failure (Including Pseudowire Status)
3.7.3.3. Service Down
3.7.3.4. Interaction with Pseudowire Redundancy
3.7.3.5. LLF and CFM Fault Propagation
3.7.3.6. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.7.4. Fault Propagation to Access Dot1q/QinQ ports in Access-Uplink Mode
3.7.4.1. Configuring Fault Propagation
3.7.4.1.1. Configuration Example for fault propagation using oper-group
3.8. Service Assurance Agent Overview
3.8.1. SAA Two-way Timing
3.8.1.1. Traceroute Implementation
3.8.1.2. NTP
3.8.1.3. Writing SAA Results to Accounting Files
3.8.1.3.1. Accounting File Management
3.8.1.3.2. Assigning SAA to an Accounting File ID
3.8.1.3.3. Continuous Testing
3.8.2. Configuring SAA Test Parameters
3.9. Y.1564 Testhead OAM tool
3.9.1. Prerequisites for Using the Testhead Tool
3.9.1.1. Generic Prerequisites for Use of Testhead Tool (applicable for all 7210 SAS platforms)
3.9.2. Configuration Guidelines
3.9.3. Configuring Testhead Tool Parameters
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Measurement Intervals
3.10.4. Data Structures and Storage
3.10.5. Bin Groups
3.10.6. Relating the Components
3.10.7. Monitoring
3.10.7.1. Accounting Policy Configuration
3.10.7.2. ETH-CFM Configuration
3.10.7.3. Service Configuration
3.10.7.4. OAM-PM Configuration
3.10.7.5. Show and Monitor Commands
3.11. Diagnostics Command Reference
3.11.1. Command Hierarchies
3.11.1.1. OAM Commands
3.11.1.1.1. Base Operational Commands
3.11.1.1.2. Show commands
3.11.1.1.3. Clear commands
3.11.1.2. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.1.2.1. OAM-PM Session IP Commands
3.11.1.2.2. Clear Commands
3.11.1.3. SAA Commands
3.11.1.3.1. Show Commands
3.11.1.3.2. Monitor Commands
3.11.1.3.3. Clear Commands
3.11.2. Command Descriptions
3.11.2.1. OAM and SAA Command Hierarchies
3.11.2.1.1. Operational Commands
3.11.2.1.2. Service Diagnostics
3.11.2.1.3. VPLS MAC Diagnostics
3.11.2.1.4. EFM Commands
3.11.2.1.5. ETH-CFM OAM Commands
3.11.2.1.6. ETH CFM Configuration Commands
3.11.2.1.7. Testhead Commands
3.11.2.1.8. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.2.1.9. Service Assurance Agent (SAA) Commands
3.11.2.1.10. OAM SAA Commands
3.11.2.1.11. LDP Treetrace Commands
3.11.2.1.12. TWAMP commands
3.11.2.1.13. TWAMP Light Commands
3.11.2.1.14. Show Commands
3.11.2.1.15. Monitor Commands
3.11.2.1.16. Clear Commands
3.12. Tools Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands
3.12.1.1.1. Tools Dump Commands
3.12.1.1.2. Tools Perform Commands
3.12.2. Command Descriptions
3.12.2.1. Tools Commands
3.12.2.1.1. Generic Commands
3.12.2.1.2. Dump Commands
3.12.2.1.3. Dump Router Commands
3.12.2.1.4. Dump Service Commands
3.12.2.2. Performance Commands
4. Common CLI Command Descriptions
4.1. In This Chapter
4.2. Common Service Commands
4.2.1. Command Descriptions
4.2.1.1. SAP Syntax
4.2.1.2. Port Syntax
5. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS Services Configuration Process
2. Mirror Services
2.1. Service Mirroring
2.2. Mirror Implementation
2.2.1. Mirror Source and Destinations
2.2.1.1. Local and Remote Mirroring
2.2.2. Mirroring Performance
2.2.3. Mirroring Configuration
2.3. Configuration Process Overview
2.4. Configuration Notes
2.5. Configuring Service Mirroring with CLI
2.5.1. Mirror Configuration Overview
2.5.1.1. Defining Mirrored Traffic
2.6. Basic Mirroring Configuration
2.6.1. Mirror Classification Rules
2.6.1.1. Port
2.6.1.2. SAP
2.6.1.3. MAC filter
2.6.1.4. IP filter
2.7. Common Configuration Tasks
2.7.1. Configuring a Local Mirror Service
2.7.2. Configuring a Remote Mirror Service
2.8. Service Management Tasks
2.8.1. Modifying a Local Mirrored Service
2.8.2. Deleting a Local Mirrored Service
2.8.3. Modifying a Remote Mirrored Service
2.8.4. Deleting a Remote Mirrored Service
2.9. Mirror Service Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Mirror Configuration Commands for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE in Network Mode
2.9.1.2. Mirror Configuration Commands for 7210 SAS Devices Configured in Access-uplink Mode
2.9.1.3. Mirror Configuration Commands for 7210 SAS-M and 7210 SAS-T in Network Mode, 7210 SAS-Sx/S 1/10GE, 7210 SAS-Sx 10/100GE, 7210 SAS-Mxp, 7210 SAS-R6, and 7210 SAS-R12
2.9.1.4. Show Commands
2.9.1.5. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Configuration Commands
2.9.2.1.1. Generic Commands
2.9.2.1.2. Mirror Destination Configuration Commands
2.9.2.1.3. Mirror Source Configuration Commands
2.9.2.2. Show Commands
3. OAM and SAA
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.1.1. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.1.2. ECMP Considerations
3.1.1.3. LSP Ping and LSP Trace over Unnumbered IP Interface
3.1.1.4. Downstream Detailed Mapping (DDMAP) TLV
3.1.1.5. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.1.5.1. Responder Node Procedures
3.1.1.5.2. Sender Node Procedures
3.1.2. MPLS OAM Support in Segment Routing
3.1.2.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.2.2. Operating Guidelines on SR-ISIS or SR-OSPF Tunnels
3.1.2.3. Operating Guidelines on SR-ISIS Tunnel Stitched to LDP FEC
3.1.2.4. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel or an SR-OSPF IPv4 Tunnel
3.1.3. LSP Ping for RSVP P2MP LSP
3.1.4. LSP Trace for RSVP P2MP LSP
3.1.4.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.5. SDP Diagnostics
3.1.5.1. SDP Ping
3.1.5.2. SDP MTU Path Discovery
3.1.6. Service Diagnostics
3.1.7. VPLS MAC Diagnostics
3.1.7.1. MAC Ping
3.1.7.2. MAC Trace
3.1.7.3. CPE Ping
3.1.7.4. MAC Populate
3.1.7.5. MAC Purge
3.1.8. VLL Diagnostics
3.1.8.1. VCCV Ping
3.1.8.1.1. VCCV-Ping Application
3.1.8.1.2. VCCV-Ping in a Multi-Segment Pseudowire
3.1.8.2. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.8.2.1. VCCV for Static Pseudowire Segments
3.1.8.2.2. Detailed VCCV-Trace Operation
3.1.8.2.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.9. MPLS-TP On-Demand OAM Commands
3.1.9.1. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.9.2. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.10. MPLS-TP Show Commands
3.1.10.1. Static MPLS Labels
3.1.10.2. MPLS-TP Tunnel Configuration
3.1.10.3. MPLS-TP Path configuration.
3.1.10.4. MPLS-TP Protection
3.1.10.5. BFD
3.1.10.6. MPLS TP Node Configuration
3.1.10.7. MPLS-TP Interfaces
3.1.10.8. Services using MPLS-TP PWs
3.1.11. MPLS-TP DEBUG COMMANDS
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.1.1. Configuration Notes
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. Ethernet Connectivity Fault Management
3.3.1. ETH-CFM Building Blocks
3.3.1.1. Loopback
3.3.1.2. Linktrace
3.3.1.3. Continuity Check (CC)
3.3.1.4. Alarm Indication Signal (ETH-AIS Y.1731)
3.3.1.5. Test (ETH-TST Y.1731)
3.3.1.6. ETH-CFM Configuration Guidelines
3.3.2. Y.1731 Time Stamp Capability
3.3.3. ITU-T Y.1731 Ethernet Bandwidth Notification
3.3.3.1. ETH-BN Configuration Guidelines
3.3.4. Port-Based MEPs
3.4. ETH-CFM Statistics
3.5. Synthetic Loss Measurement (ETH-SL)
3.5.1. Configuration Example
3.6. ETH-CFM QoS Considerations
3.6.1. Configuration Guidelines
3.7. OAM Mapping
3.7.1. CFM Connectivity Fault Conditions
3.7.2. CFM Fault Propagation Methods
3.7.3. Epipe Services
3.7.3.1. CFM Detected Fault
3.7.3.2. SAP/SDP-Binding Failure (Including Pseudowire Status)
3.7.3.3. Service Down
3.7.3.4. Interaction with Pseudowire Redundancy
3.7.3.5. LLF and CFM Fault Propagation
3.7.3.6. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.7.4. Fault Propagation to Access Dot1q/QinQ ports in Access-Uplink Mode
3.7.4.1. Configuring Fault Propagation
3.7.4.1.1. Configuration Example for fault propagation using oper-group
3.8. Service Assurance Agent Overview
3.8.1. SAA Two-way Timing
3.8.1.1. Traceroute Implementation
3.8.1.2. NTP
3.8.1.3. Writing SAA Results to Accounting Files
3.8.1.3.1. Accounting File Management
3.8.1.3.2. Assigning SAA to an Accounting File ID
3.8.1.3.3. Continuous Testing
3.8.2. Configuring SAA Test Parameters
3.9. Y.1564 Testhead OAM tool
3.9.1. Prerequisites for Using the Testhead Tool
3.9.1.1. Generic Prerequisites for Use of Testhead Tool (applicable for all 7210 SAS platforms)
3.9.2. Configuration Guidelines
3.9.3. Configuring Testhead Tool Parameters
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Measurement Intervals
3.10.4. Data Structures and Storage
3.10.5. Bin Groups
3.10.6. Relating the Components
3.10.7. Monitoring
3.10.7.1. Accounting Policy Configuration
3.10.7.2. ETH-CFM Configuration
3.10.7.3. Service Configuration
3.10.7.4. OAM-PM Configuration
3.10.7.5. Show and Monitor Commands
3.11. Diagnostics Command Reference
3.11.1. Command Hierarchies
3.11.1.1. OAM Commands
3.11.1.1.1. Base Operational Commands
3.11.1.1.2. Show commands
3.11.1.1.3. Clear commands
3.11.1.2. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.1.2.1. OAM-PM Session IP Commands
3.11.1.2.2. Clear Commands
3.11.1.3. SAA Commands
3.11.1.3.1. Show Commands
3.11.1.3.2. Monitor Commands
3.11.1.3.3. Clear Commands
3.11.2. Command Descriptions
3.11.2.1. OAM and SAA Command Hierarchies
3.11.2.1.1. Operational Commands
3.11.2.1.2. Service Diagnostics
3.11.2.1.3. VPLS MAC Diagnostics
3.11.2.1.4. EFM Commands
3.11.2.1.5. ETH-CFM OAM Commands
3.11.2.1.6. ETH CFM Configuration Commands
3.11.2.1.7. Testhead Commands
3.11.2.1.8. OAM Performance Monitoring, Bin Group, and Session Commands
3.11.2.1.9. Service Assurance Agent (SAA) Commands
3.11.2.1.10. OAM SAA Commands
3.11.2.1.11. LDP Treetrace Commands
3.11.2.1.12. TWAMP commands
3.11.2.1.13. TWAMP Light Commands
3.11.2.1.14. Show Commands
3.11.2.1.15. Monitor Commands
3.11.2.1.16. Clear Commands
3.12. Tools Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands
3.12.1.1.1. Tools Dump Commands
3.12.1.1.2. Tools Perform Commands
3.12.2. Command Descriptions
3.12.2.1. Tools Commands
3.12.2.1.1. Generic Commands
3.12.2.1.2. Dump Commands
3.12.2.1.3. Dump Router Commands
3.12.2.1.4. Dump Service Commands
3.12.2.2. Performance Commands
4. Common CLI Command Descriptions
4.1. In This Chapter
4.2. Common Service Commands
4.2.1. Command Descriptions
4.2.1.1. SAP Syntax
4.2.1.2. Port Syntax
5. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-D, Dxp Quality of Service Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-Series Services Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.2. Overview of QoS Policies on 7210 SAS-D and 7210 SAS-Dxp
2.2.1. Summary of Major Functions of QoS Policies
2.3. Network and Service QoS Policies
2.3.1. Network QoS Policies on Access-uplink Ports
2.3.2. Default Network QoS Policy (Egress) for the 7210 SAS-Dxp
2.3.3. Default Network QoS Policy (Ingress)
2.3.4. Network Queue Policies in Access-uplink Mode
2.3.5. Service Ingress QoS Policies
2.3.5.1. Default Service Ingress Policy
2.3.6. Service Ingress Classification
2.3.6.1. Service Ingress Classification
2.3.6.2. Hierarchical Ingress Policing on 7210 SAS-D and 7210 SAS-Dxp
2.4. Access Egress QoS Policies
2.4.1. Default Access Egress Policy
2.5. Meters/Policers
2.5.1. Metering/Policing and Meter Parameters
2.5.1.1. Meter ID
2.5.1.2. Committed Information Rate (Meters)
2.5.1.3. Peak Information Rate (Meters)
2.5.1.4. Adaptation Rule for Meters
2.5.1.4.1. Adaptation Rule for Meters on 7210 SAS-D Devices
2.5.1.4.2. Adaptation Rule for Meters on 7210 SAS-Dxp Devices
2.5.1.5. Committed Burst Size (Meters/Policers)
2.5.1.6. Maximum Burst Size (Meters/Policers)
2.5.1.6.1. Excess Burst Size (Meters/Policers)
2.5.2. Meter Counters
2.5.3. Meter Modes
2.5.3.1. Color-Aware and Color-Blind Policing/Metering
2.5.4. QoS Overrides for Meters/Policers
2.5.4.1. Configuration Guidelines for QoS Override
2.5.4.2. Configuring Meter Override Parameters
2.6. Forwarding Classes
2.6.1. FC-to-Queue ID Map
2.7. Schedulers
2.7.1. Port Scheduler Policies
2.7.2. Scheduler Modes
2.8. CPU Queues
2.8.1. Overview
2.9. Egress Port Rate Limiting
2.10. Queue Management
2.10.1. Queues and Queue Parameters
2.10.1.1. Queue ID
2.10.1.2. Committed Information Rate
2.10.1.3. Peak Information Rate
2.10.1.4. Adaptation Rule for Queues
2.10.1.5. Committed Burst Size (Queue)
2.10.1.6. Maximum Burst Size (Queue)
2.10.1.6.1. Default CBS and MBS for Queues
2.10.1.7. Queue Counters
2.10.2. Buffer Pools
2.10.2.1. Buffer Pools
2.10.2.2. Decommissioning Ports with Per-Port MBS Pool on 7210 SAS-Dxp
2.10.2.2.1. Using Decommission Command for Buffer Allocation on 7210 SAS-Dxp
2.10.2.2.2. Configuration Guidelines for Use of Decommission Commands on 7210 SAS-Dxp
2.10.3. Slope Policies
2.10.4. RED Slopes
2.10.4.1. Operation and Configuration of RED Slopes for 7210 SAS-D
2.10.4.2. Operation and Configuration of RED Slopes for 7210 SAS-Dxp
2.10.4.3. Simplified Overview of RED for 7210 SAS-D and 7210 SAS-Dxp
2.10.4.4. Tuning the Shared Buffer Utilization Calculation on 7210 SAS-D and 7210 SAS-Dxp
2.10.4.5. Slope Policy Parameters for 7210 SAS-D
2.10.4.6. Slope Policy Parameters for 7210 SAS-Dxp
2.11. QoS Policy Entities
2.12. Configuration Notes
3. DEI-based Classification and Marking
3.1. DEI-based Classification
3.2. DEI-based Marking
3.3. Configuration Guidelines
4. Port Level Egress Rate-Limiting
4.1. Overview
4.1.1. Applications
4.1.2. Effect of Port-Level Rate-Limiting on Queue Functionality
4.2. Basic Configurations
4.2.1. Modifying Port Level Egress-Rate Command
4.2.2. Removing Port Level Egress-Rate Command
4.2.2.1. Default Egress-Rate Values
4.3. Port Level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Configuration Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. Frame-Based Accounting
5.1. Overview
5.1.1. Frame-Based Accounting
5.1.2. Effects of Enabling Ingress Frame-Based Accounting on Ingress Meter Functionality
5.1.3. Effects of Enabling Egress Frame-Based Accounting on Access-Uplink Queue Functionality
5.1.4. Accounting and Statistics
5.2. Basic Configurations
5.2.1. Enabling and Disabling Frame-Based Accounting
5.3. Frame-Based Accounting Command Reference
5.3.1. Command Hierarchies
5.3.1.1. Configuration Commands
5.3.1.2. Show Commands
5.3.2. Configuration Descriptions
5.3.2.1. Configuration Commands
5.3.2.2. Show Commands
6. Network QoS Policies
6.1. Overview of Network QoS Policies
6.1.1. Resource Allocation for Network QoS Policy
6.1.1.1. Network QoS Policies Resource Usage Examples
6.1.1.1.1. Example 1
6.1.1.1.2. Example 2
6.1.1.1.3. Example 3
6.1.1.1.4. Example 4
6.1.1.1.5. Example 5
6.1.1.1.6. Example 6
6.1.1.1.7. Example 7
6.1.1.1.8. Example 8
6.1.2. Basic Configuration
6.1.3. Create a Network QoS Policy
6.1.4. Default Network Policy Values
6.1.5. DSCP Marking for CPU-Generated Traffic
6.1.6. Default DSCP Mapping Table
6.2. Service Management Tasks
6.2.1. Deleting QoS Policies
6.2.2. Remove a Policy from the QoS Configuration
6.2.3. Copying and Overwriting Network Policies
6.2.4. Editing QoS Policies
6.3. Network QoS Policy Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
6.3.1.2. Operational Commands
6.3.1.3. Show Commands
6.4. Command Descriptions
6.4.1. Configuration Commands
6.4.1.1. Generic Commands
6.4.1.2. Operational Commands
6.4.1.3. Network QoS Policy Commands
6.4.1.4. Network Ingress QoS Policy Commands
6.4.1.5. Network Egress QoS Policy Commands
6.4.1.6. Network Egress QoS Policy Forwarding Class Commands
6.4.1.7. Show Commands
7. Network Queue QoS Policies
7.1. Overview
7.2. Basic Configurations
7.2.1. Creating a Network Queue QoS Policy
7.2.2. Applying Network Queue Configuration in Access-uplink Mode
7.3. Default Network Queue Policy Values
7.4. Service Management Tasks
7.4.1. Deleting Network Queue QoS Policies
7.4.2. Copying and Overwriting Network Queue QoS Policies
7.4.3. Editing Network Queue QoS Policies
7.5. Network Queue QoS Policy Command Reference
7.5.1. Command Hierarchies
7.5.1.1. Configuration Commands
7.5.1.2. Operational Commands
7.5.1.3. Show Commands
7.6. Command Descriptions
7.6.1. Configuration Commands
7.6.1.1. Generic Commands
7.6.1.2. Operational Commands
7.6.1.3. Network Queue QoS Policy Commands
7.6.1.4. Network Queue QoS Policy Queue Commands
7.6.1.5. Show Commands
8. Service Ingress QoS Policies
8.1. Overview of Service Ingress Policy
8.1.1. Default SAP Ingress Policy
8.1.1.1. SAP Ingress Policy Defaults
8.1.1.2. Use of Index File by SAP QoS Ingress Policy
8.1.1.2.1. Use of the Keyword Multipoint for Default Meter “11”
8.1.1.3. Service Ingress Meter Selection Rules
8.1.1.4. Service Ingress QoS Policy Configuration Considerations
8.1.2. Resource Allocation for Service Ingress QoS Policy Classification Rules
8.1.3. Computation of SAP Ingress Classification and Meter Resources Used per SAP Ingress Policy
8.1.3.1. Determining the Number of Classification Entries
8.1.3.1.1. Rules for a SAP in a VPLS
8.1.3.1.2. Rules for a SAP in a VLL, IES, or VPRN Service with PIM/IP Multicast Disabled
8.1.3.1.3. Rules for a SAP in an IES or VPRN Service with PIM/IP Multicast Enabled
8.1.3.1.4. Calculating the Number of Classification Entries per FC
8.1.3.1.5. Determining the Number of Classification Entries per Policy (TC)
8.1.3.1.6. Determining the Number of Policers/Meters per Policy (TP)
8.1.3.2. Service Ingress QoS Policies Resource Usage Examples
8.1.3.2.1. Example 1
8.1.3.2.2. Example 1a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.3. Example 2
8.1.3.2.4. Example 2a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.5. Example 3
8.1.3.2.6. Example 3a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.7. Example 4
8.1.3.2.8. Example 4a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.9. Example 5
8.2. Basic Configurations
8.2.1. Create Service Ingress QoS Policies
8.2.1.1. Service Ingress QoS Policy
8.2.1.1.1. Service Ingress QoS Meter
8.2.1.1.2. SAP Ingress FC
8.2.1.1.3. Service Ingress IP Match Criteria
8.2.1.1.4. Service Ingress MAC Match Criteria
8.2.1.2. Applying Service Ingress Policies
8.2.1.2.1. Epipe Service
8.2.1.2.2. VPLS
8.2.1.2.3. IES
8.3. Service Management Tasks
8.3.1. Deleting QoS Policies
8.3.1.1. Removing a QoS Policy from Service SAPs
8.3.2. Copying and Overwriting QoS Policies
8.3.3. Remove a Policy from the QoS Configuration
8.3.4. Editing QoS Policies
8.4. Service SAP QoS Policy Command Reference
8.4.1. Service Ingress QoS Policy Commands
8.4.2. Operational Commands
8.4.3. Show Commands
8.5. Command Descriptions
8.5.1. Configuration Commands
8.5.1.1. Generic Commands
8.5.1.2. Operational Commands
8.5.1.2.1. Service Ingress QoS Policy Commands
8.5.1.2.2. Service Ingress QoS Policy Forwarding Class Commands
8.5.1.2.3. Service Ingress QoS Policy Entry Commands
8.5.1.2.4. IP QoS Policy Match Commands
8.5.1.2.5. Service Ingress MAC QoS Policy Match Commands
8.5.1.2.6. Service Meter QoS Policy Commands
8.5.1.3. Show Commands
9. Access Egress QoS Policies
9.1. Overview
9.1.1. Basic Configurations
9.1.1.1. Modifying Access Egress QoS Queues
9.1.1.2. Applying Access Egress QoS Policies
9.1.1.2.1. Ethernet Ports
9.1.1.3. Default Access Egress QoS Policy Values
9.1.1.4. Deleting QoS Policies
9.1.1.5. Removing a Policy from the QoS Configuration
9.2. Access Egress QoS Policy Command Reference
9.2.1. Command Hierarchies
9.2.1.1. Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
9.2.1.2. Show Commands
9.3. Command Descriptions
9.3.1. Configuration Commands
9.3.1.1. Generic Commands
9.3.1.2. Access Egress Queue QoS Policy Commands
10. Port Scheduler Policies
10.1. Configuring Port Scheduler Policies
10.2. Basic Configurations
10.2.1. Creating a QoS Port Scheduler Policy
10.3. Service Management Tasks
10.3.1. Copying and Overwriting Port Scheduler Policies
10.3.2. Editing QoS Policies
10.4. QoS Port Scheduler Policy Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Port Scheduler Policy Configuration Commands
10.4.1.2. Operational Commands
10.4.1.3. Show Commands
10.5. Command Descriptions
10.5.1. Configuration Commands
10.5.1.1. Generic Commands
10.5.1.2. Operational Commands
10.5.1.3. Port Scheduler Policy Commands
10.5.1.4. Show Commands
11. Slope QoS Policies
11.1. Overview of Buffer Pools
11.1.1. Configuration Guidelines for 7210 SAS-D
11.1.2. Configuration Guidelines for 7210 SAS-Dxp
11.2. Basic Configurations
11.2.1. Create a Slope QoS Policy for 7210 SAS-D
11.2.2. Create a Slope QoS Policy for 7210 SAS-Dxp
11.3. Applying Slope Policies
11.3.1. Default Slope Policy Values
11.3.1.1. Default Slope Values for 7210 SAS-D
11.3.1.2. Default Slope Values for 7210 SAS-Dxp
11.4. Deleting QoS Policies
11.4.1. Remove a Policy from the QoS Configuration
11.5. Copying and Overwriting QoS Policies
11.6. Editing QoS Policies
11.7. Slope QoS Policy Command Reference
11.7.1. Command Hierarchies
11.7.1.1. Configuration Commands for 7210 SAS-D
11.7.1.2. Configuration Commands for 7210 SAS-Dxp
11.7.1.3. WRED Commands (Supported Only on 7210 SAS-D)
11.7.1.4. Operational Commands
11.7.1.5. Show Commands
11.8. Command Descriptions
11.8.1. Configuration Commands
11.8.1.1. Generic Commands
11.8.2. Operational Commands
11.8.2.1. Slope Policy QoS Commands
11.8.2.2. Slope Policy QoS Policy Commands
11.8.2.3. RED Slope Commands
11.8.2.4. WRED command for 7210 SAS-D
11.8.3. Show Commands
11.8.3.1. Show Commands
12. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-Series Services Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.2. Overview of QoS Policies on 7210 SAS-D and 7210 SAS-Dxp
2.2.1. Summary of Major Functions of QoS Policies
2.3. Network and Service QoS Policies
2.3.1. Network QoS Policies on Access-uplink Ports
2.3.2. Default Network QoS Policy (Egress) for the 7210 SAS-Dxp
2.3.3. Default Network QoS Policy (Ingress)
2.3.4. Network Queue Policies in Access-uplink Mode
2.3.5. Service Ingress QoS Policies
2.3.5.1. Default Service Ingress Policy
2.3.6. Service Ingress Classification
2.3.6.1. Service Ingress Classification
2.3.6.2. Hierarchical Ingress Policing on 7210 SAS-D and 7210 SAS-Dxp
2.4. Access Egress QoS Policies
2.4.1. Default Access Egress Policy
2.5. Meters/Policers
2.5.1. Metering/Policing and Meter Parameters
2.5.1.1. Meter ID
2.5.1.2. Committed Information Rate (Meters)
2.5.1.3. Peak Information Rate (Meters)
2.5.1.4. Adaptation Rule for Meters
2.5.1.4.1. Adaptation Rule for Meters on 7210 SAS-D Devices
2.5.1.4.2. Adaptation Rule for Meters on 7210 SAS-Dxp Devices
2.5.1.5. Committed Burst Size (Meters/Policers)
2.5.1.6. Maximum Burst Size (Meters/Policers)
2.5.1.6.1. Excess Burst Size (Meters/Policers)
2.5.2. Meter Counters
2.5.3. Meter Modes
2.5.3.1. Color-Aware and Color-Blind Policing/Metering
2.5.4. QoS Overrides for Meters/Policers
2.5.4.1. Configuration Guidelines for QoS Override
2.5.4.2. Configuring Meter Override Parameters
2.6. Forwarding Classes
2.6.1. FC-to-Queue ID Map
2.7. Schedulers
2.7.1. Port Scheduler Policies
2.7.2. Scheduler Modes
2.8. CPU Queues
2.8.1. Overview
2.9. Egress Port Rate Limiting
2.10. Queue Management
2.10.1. Queues and Queue Parameters
2.10.1.1. Queue ID
2.10.1.2. Committed Information Rate
2.10.1.3. Peak Information Rate
2.10.1.4. Adaptation Rule for Queues
2.10.1.5. Committed Burst Size (Queue)
2.10.1.6. Maximum Burst Size (Queue)
2.10.1.6.1. Default CBS and MBS for Queues
2.10.1.7. Queue Counters
2.10.2. Buffer Pools
2.10.2.1. Buffer Pools
2.10.2.2. Decommissioning Ports with Per-Port MBS Pool on 7210 SAS-Dxp
2.10.2.2.1. Using Decommission Command for Buffer Allocation on 7210 SAS-Dxp
2.10.2.2.2. Configuration Guidelines for Use of Decommission Commands on 7210 SAS-Dxp
2.10.3. Slope Policies
2.10.4. RED Slopes
2.10.4.1. Operation and Configuration of RED Slopes for 7210 SAS-D
2.10.4.2. Operation and Configuration of RED Slopes for 7210 SAS-Dxp
2.10.4.3. Simplified Overview of RED for 7210 SAS-D and 7210 SAS-Dxp
2.10.4.4. Tuning the Shared Buffer Utilization Calculation on 7210 SAS-D and 7210 SAS-Dxp
2.10.4.5. Slope Policy Parameters for 7210 SAS-D
2.10.4.6. Slope Policy Parameters for 7210 SAS-Dxp
2.11. QoS Policy Entities
2.12. Configuration Notes
3. DEI-based Classification and Marking
3.1. DEI-based Classification
3.2. DEI-based Marking
3.3. Configuration Guidelines
4. Port Level Egress Rate-Limiting
4.1. Overview
4.1.1. Applications
4.1.2. Effect of Port-Level Rate-Limiting on Queue Functionality
4.2. Basic Configurations
4.2.1. Modifying Port Level Egress-Rate Command
4.2.2. Removing Port Level Egress-Rate Command
4.2.2.1. Default Egress-Rate Values
4.3. Port Level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Configuration Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. Frame-Based Accounting
5.1. Overview
5.1.1. Frame-Based Accounting
5.1.2. Effects of Enabling Ingress Frame-Based Accounting on Ingress Meter Functionality
5.1.3. Effects of Enabling Egress Frame-Based Accounting on Access-Uplink Queue Functionality
5.1.4. Accounting and Statistics
5.2. Basic Configurations
5.2.1. Enabling and Disabling Frame-Based Accounting
5.3. Frame-Based Accounting Command Reference
5.3.1. Command Hierarchies
5.3.1.1. Configuration Commands
5.3.1.2. Show Commands
5.3.2. Configuration Descriptions
5.3.2.1. Configuration Commands
5.3.2.2. Show Commands
6. Network QoS Policies
6.1. Overview of Network QoS Policies
6.1.1. Resource Allocation for Network QoS Policy
6.1.1.1. Network QoS Policies Resource Usage Examples
6.1.1.1.1. Example 1
6.1.1.1.2. Example 2
6.1.1.1.3. Example 3
6.1.1.1.4. Example 4
6.1.1.1.5. Example 5
6.1.1.1.6. Example 6
6.1.1.1.7. Example 7
6.1.1.1.8. Example 8
6.1.2. Basic Configuration
6.1.3. Create a Network QoS Policy
6.1.4. Default Network Policy Values
6.1.5. DSCP Marking for CPU-Generated Traffic
6.1.6. Default DSCP Mapping Table
6.2. Service Management Tasks
6.2.1. Deleting QoS Policies
6.2.2. Remove a Policy from the QoS Configuration
6.2.3. Copying and Overwriting Network Policies
6.2.4. Editing QoS Policies
6.3. Network QoS Policy Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
6.3.1.2. Operational Commands
6.3.1.3. Show Commands
6.4. Command Descriptions
6.4.1. Configuration Commands
6.4.1.1. Generic Commands
6.4.1.2. Operational Commands
6.4.1.3. Network QoS Policy Commands
6.4.1.4. Network Ingress QoS Policy Commands
6.4.1.5. Network Egress QoS Policy Commands
6.4.1.6. Network Egress QoS Policy Forwarding Class Commands
6.4.1.7. Show Commands
7. Network Queue QoS Policies
7.1. Overview
7.2. Basic Configurations
7.2.1. Creating a Network Queue QoS Policy
7.2.2. Applying Network Queue Configuration in Access-uplink Mode
7.3. Default Network Queue Policy Values
7.4. Service Management Tasks
7.4.1. Deleting Network Queue QoS Policies
7.4.2. Copying and Overwriting Network Queue QoS Policies
7.4.3. Editing Network Queue QoS Policies
7.5. Network Queue QoS Policy Command Reference
7.5.1. Command Hierarchies
7.5.1.1. Configuration Commands
7.5.1.2. Operational Commands
7.5.1.3. Show Commands
7.6. Command Descriptions
7.6.1. Configuration Commands
7.6.1.1. Generic Commands
7.6.1.2. Operational Commands
7.6.1.3. Network Queue QoS Policy Commands
7.6.1.4. Network Queue QoS Policy Queue Commands
7.6.1.5. Show Commands
8. Service Ingress QoS Policies
8.1. Overview of Service Ingress Policy
8.1.1. Default SAP Ingress Policy
8.1.1.1. SAP Ingress Policy Defaults
8.1.1.2. Use of Index File by SAP QoS Ingress Policy
8.1.1.2.1. Use of the Keyword Multipoint for Default Meter “11”
8.1.1.3. Service Ingress Meter Selection Rules
8.1.1.4. Service Ingress QoS Policy Configuration Considerations
8.1.2. Resource Allocation for Service Ingress QoS Policy Classification Rules
8.1.3. Computation of SAP Ingress Classification and Meter Resources Used per SAP Ingress Policy
8.1.3.1. Determining the Number of Classification Entries
8.1.3.1.1. Rules for a SAP in a VPLS
8.1.3.1.2. Rules for a SAP in a VLL, IES, or VPRN Service with PIM/IP Multicast Disabled
8.1.3.1.3. Rules for a SAP in an IES or VPRN Service with PIM/IP Multicast Enabled
8.1.3.1.4. Calculating the Number of Classification Entries per FC
8.1.3.1.5. Determining the Number of Classification Entries per Policy (TC)
8.1.3.1.6. Determining the Number of Policers/Meters per Policy (TP)
8.1.3.2. Service Ingress QoS Policies Resource Usage Examples
8.1.3.2.1. Example 1
8.1.3.2.2. Example 1a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.3. Example 2
8.1.3.2.4. Example 2a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.5. Example 3
8.1.3.2.6. Example 3a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.7. Example 4
8.1.3.2.8. Example 4a (Default Multipoint Meter 11 is Not Used)
8.1.3.2.9. Example 5
8.2. Basic Configurations
8.2.1. Create Service Ingress QoS Policies
8.2.1.1. Service Ingress QoS Policy
8.2.1.1.1. Service Ingress QoS Meter
8.2.1.1.2. SAP Ingress FC
8.2.1.1.3. Service Ingress IP Match Criteria
8.2.1.1.4. Service Ingress MAC Match Criteria
8.2.1.2. Applying Service Ingress Policies
8.2.1.2.1. Epipe Service
8.2.1.2.2. VPLS
8.2.1.2.3. IES
8.3. Service Management Tasks
8.3.1. Deleting QoS Policies
8.3.1.1. Removing a QoS Policy from Service SAPs
8.3.2. Copying and Overwriting QoS Policies
8.3.3. Remove a Policy from the QoS Configuration
8.3.4. Editing QoS Policies
8.4. Service SAP QoS Policy Command Reference
8.4.1. Service Ingress QoS Policy Commands
8.4.2. Operational Commands
8.4.3. Show Commands
8.5. Command Descriptions
8.5.1. Configuration Commands
8.5.1.1. Generic Commands
8.5.1.2. Operational Commands
8.5.1.2.1. Service Ingress QoS Policy Commands
8.5.1.2.2. Service Ingress QoS Policy Forwarding Class Commands
8.5.1.2.3. Service Ingress QoS Policy Entry Commands
8.5.1.2.4. IP QoS Policy Match Commands
8.5.1.2.5. Service Ingress MAC QoS Policy Match Commands
8.5.1.2.6. Service Meter QoS Policy Commands
8.5.1.3. Show Commands
9. Access Egress QoS Policies
9.1. Overview
9.1.1. Basic Configurations
9.1.1.1. Modifying Access Egress QoS Queues
9.1.1.2. Applying Access Egress QoS Policies
9.1.1.2.1. Ethernet Ports
9.1.1.3. Default Access Egress QoS Policy Values
9.1.1.4. Deleting QoS Policies
9.1.1.5. Removing a Policy from the QoS Configuration
9.2. Access Egress QoS Policy Command Reference
9.2.1. Command Hierarchies
9.2.1.1. Configuration Commands for 7210 SAS-D and 7210 SAS-Dxp
9.2.1.2. Show Commands
9.3. Command Descriptions
9.3.1. Configuration Commands
9.3.1.1. Generic Commands
9.3.1.2. Access Egress Queue QoS Policy Commands
10. Port Scheduler Policies
10.1. Configuring Port Scheduler Policies
10.2. Basic Configurations
10.2.1. Creating a QoS Port Scheduler Policy
10.3. Service Management Tasks
10.3.1. Copying and Overwriting Port Scheduler Policies
10.3.2. Editing QoS Policies
10.4. QoS Port Scheduler Policy Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Port Scheduler Policy Configuration Commands
10.4.1.2. Operational Commands
10.4.1.3. Show Commands
10.5. Command Descriptions
10.5.1. Configuration Commands
10.5.1.1. Generic Commands
10.5.1.2. Operational Commands
10.5.1.3. Port Scheduler Policy Commands
10.5.1.4. Show Commands
11. Slope QoS Policies
11.1. Overview of Buffer Pools
11.1.1. Configuration Guidelines for 7210 SAS-D
11.1.2. Configuration Guidelines for 7210 SAS-Dxp
11.2. Basic Configurations
11.2.1. Create a Slope QoS Policy for 7210 SAS-D
11.2.2. Create a Slope QoS Policy for 7210 SAS-Dxp
11.3. Applying Slope Policies
11.3.1. Default Slope Policy Values
11.3.1.1. Default Slope Values for 7210 SAS-D
11.3.1.2. Default Slope Values for 7210 SAS-Dxp
11.4. Deleting QoS Policies
11.4.1. Remove a Policy from the QoS Configuration
11.5. Copying and Overwriting QoS Policies
11.6. Editing QoS Policies
11.7. Slope QoS Policy Command Reference
11.7.1. Command Hierarchies
11.7.1.1. Configuration Commands for 7210 SAS-D
11.7.1.2. Configuration Commands for 7210 SAS-Dxp
11.7.1.3. WRED Commands (Supported Only on 7210 SAS-D)
11.7.1.4. Operational Commands
11.7.1.5. Show Commands
11.8. Command Descriptions
11.8.1. Configuration Commands
11.8.1.1. Generic Commands
11.8.2. Operational Commands
11.8.2.1. Slope Policy QoS Commands
11.8.2.2. Slope Policy QoS Policy Commands
11.8.2.3. RED Slope Commands
11.8.2.4. WRED command for 7210 SAS-D
11.8.3. Show Commands
11.8.3.1. Show Commands
12. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Quality of Service Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS QoS Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.1.1. Overview of QoS Policies on 7210 SAS-K 2F1C2T
2.1.2. Overview of QoS Policies on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.2.1. Overview of Network QoS Policy Applied to Access-uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.2.2. Overview of Network QoS Policy Applied to Network and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.3. Summary of Major Functions of QoS Policies
2.2. Network and Service QoS Policies
2.2.1. Network QoS Policies on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Network Ports and Hybrid Ports
2.2.1.1. Ingress Classification Support for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.2.1.2. Egress Marking Support for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.2.2. Network QoS Policies on Access-Uplink Ports
2.2.2.1. Ingress Classification Support for Access-Uplink Ports
2.2.3. Network Queue Policies
2.2.4. Service Ingress QoS Policies
2.2.4.1. Default Service Ingress Policy
2.2.5. Service Ingress Classification
2.2.5.1. Service Ingress Classification
2.2.5.2. Service Ingress Classification — IP and MAC Packet Fields
2.2.6. Service Egress QoS Policies
2.2.6.1. Default Service Egress Policy
2.3. Meters/Policers
2.3.1. Meter/Policers and Policer Parameters
2.3.1.1. Meter ID
2.3.1.2. Committed Information Rate
2.3.1.3. Peak Information Rate
2.3.1.4. Adaptation Rule for Meters
2.3.1.5. Committed Burst Size
2.3.1.6. Maximum Burst Size
2.3.1.7. Meter Counters
2.3.1.8. Meter Modes
2.3.1.9. Meter Platform Support
2.3.2. Ingress Profile Assignment
2.3.3. QoS Override
2.3.3.1. Configuring Meter Override Parameters
2.4. FCs
2.4.1. Forwarding-Class To Queue ID Mapping
2.4.2. FC to Queue ID mapping
2.5. Schedulers
2.6. CPU Queues
2.7. Egress Port Rate Limiting
2.8. Queue Management
2.8.1. Queues and Queue Parameters
2.8.1.1. Queue ID
2.8.1.2. Committed Information Rate
2.8.1.3. Peak Information Rate
2.8.1.4. Adaptation Rule for Queues
2.8.1.5. Committed Burst Size
2.8.1.6. Maximum Burst Size
2.8.1.7. Ingress Profile Assignment
2.8.1.8. Weight and Priority
2.8.1.9. Queue Counters
2.8.1.10. Queue Platform Support
2.8.2. Buffer Pools
2.8.2.1. Ring and Non-Ring Buffer Pool
2.8.2.2. Configuration Guidelines for CBS and MBS
2.8.3. Slope Policies
2.8.4. RED Slopes
2.8.4.1. Operation and Configuration of RED Slopes
2.8.4.2. Simplified Overview of RED
2.8.4.3. Slope Policy Parameters
2.9. Preclassification on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.10. QoS Policy Entities
2.10.1. Summary of QoS Policy Support for Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.11. Configuration Notes
3. DEI-Based Classification and Marking
3.1. DEI-Based Classification and Marking
3.2. DEI-Based Marking
4. Port-Level Egress Rate Limiting
4.1. Overview
4.2. Basic Configurations
4.2.1. Modifying the Port-Level Egress-Rate Command
4.2.2. Removing the Port-Level Egress-Rate Command
4.3. Port Level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Command Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. Frame-Based Accounting
5.1. Overview of Frame-Based Accounting
5.2. Enabling and Disabling Frame-Based Accounting
5.3. Frame-based Accounting Command Reference
5.3.1. Command Hierarchies
5.3.1.1. Configuration Commands
5.3.1.2. Show Commands
5.3.2. Command Descriptions
5.3.2.1. Configuration Commands
5.3.2.2. Show Commands
6. DSCP, dot1p, and MPLS EXP Classification Policies
6.1. Overview
6.1.1. DSCP Classification Policy
6.1.2. dot1p Classification Policy
6.1.3. MPLS EXP Classification Policy
6.2. Configuring Classification Policies
6.3. DSCP, Dot1p, and MPLS EXP Classification Policy Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands for 7210 SAS-K 2F1C2T
6.3.1.2. Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
6.3.1.3. Show Commands
6.3.1.4. Operational Commands
6.3.2. Command Description
6.3.2.1. Configuration Commands
6.3.2.2. Show Commands
7. Network QoS Policies
7.1. Overview of Network QoS Policy on 7210 SAS-K 2F1C2T
7.1.1. Resource Allocation for Network QoS Policy for 7210 SAS-K 2F1C2T
7.2. Basic Configurations for 7210 SAS-K 2F1C2T
7.2.1. Create a Network QoS Policy for Access-Uplink Ports on 7210 SAS-K 2F1C2T
7.2.1.1. Default Network Policy Values for Access-Uplink Ports on 7210 SAS-K 2F1C2T
7.3. Overview of Network QoS Policy on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.3.1. Network QoS Policy for Access-Uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.3.2. Network QoS Policy for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.3.3. Resource Allocation for Network QoS policy for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4. Basic Configurations for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1. Create a Network QoS Policy on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.1. Create a Network QoS Policy for Access-Uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.1.1. Default Network Policy Values for Access-Uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.2. Create a Network QoS Policy for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.3. Default Network Policy Values on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5. DSCP Marking CPU Self-Generated Traffic
7.5.1. QoS for CPU Self-Generated Traffic on Network Interfaces for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5.2. Default DSCP Mapping
7.6. Service Management Tasks
7.6.1. Deleting QoS Policies
7.6.2. Remove a Policy from the QoS Configuration
7.6.3. Copying and Overwriting Network Policies
7.6.4. Editing QoS Policies
7.7. Network QoS Policy Command Reference
7.7.1. Command Hierarchies
7.7.1.1. Configuration Commands for 7210 SAS-K 2F1C2T
7.7.1.2. Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.7.1.3. Self-generated Traffic Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.7.1.4. Operational Commands
7.7.1.5. Show Commands
7.7.2. Command Descriptions
7.7.2.1. Configuration Commands
7.7.2.1.1. Generic Commands
7.7.2.1.2. Operational Commands
7.7.2.1.3. Network QoS Policy Commands
7.7.2.1.4. Network Egress QoS Policy Commands
7.7.2.1.5. Network Ingress QoS Policy Commands
7.7.2.1.6. Network Ingress Queue QoS Policy Commands
7.7.2.1.7. Self-Generated Traffic Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.7.2.2. Show Commands
8. Network Queue QoS Policies
8.1. Overview
8.2. Basic Configurations
8.2.1. Creating a Network Queue QoS Policy
8.2.2. Applying Network Queue Policies
8.2.2.1. Applying Network Queue Configuration to Access-Uplink Ports
8.2.2.2. Applying Network Queue Configuration to Network Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.3. Default Network Queue Policy Values
8.3.1. Default Network Queue Policy for 7210 SAS-K 2F1C2T
8.3.2. Default Network Queue Policy for 7210 SAS-K 2F6C4T
8.3.3. Default Network Queue Policy for 7210 SAS-K 3SFP+ 8C
8.4. Service Management Tasks
8.4.1. Deleting Network Queue QoS Policies
8.4.2. Copying and Overwriting Network Queue QoS Policies
8.4.3. Editing Network Queue QoS Policies
8.5. Network Queue QoS Policy Command Reference
8.5.1. Command Hierarchies
8.5.1.1. Configuration Commands
8.5.1.2. Operational Commands
8.5.1.3. Show Commands
8.5.2. Command Descriptions
8.5.2.1. Configuration Commands
8.5.2.1.1. Generic Commands
8.5.2.1.2. Operational Commands
8.5.2.1.3. Network Queue QoS Policy Commands
8.5.2.1.4. Network Queue QoS Policy Queue Commands
8.5.2.2. Show Commands
9. Service Ingress QoS Policies
9.1. Overview of Service Ingress Policy
9.1.1. Configuration Guidelines for SAP-Ingress Policy
9.1.1.1. Resource Allocation for Service Ingress QoS Classification Policy
9.1.1.2. Resource Allocation for SAP Ingress Meters
9.1.1.3. Default SAP-Ingress Policy
9.1.1.4. Use of Index File by SAP QoS Ingress Policy
9.2. Basic Configurations
9.2.1. Service Ingress QoS Policies
9.2.2. Service Ingress QoS Queues
9.2.3. Service Ingress QoS Meters
9.2.4. SAP Ingress FC Configuration
9.2.5. Service Ingress dot1p and IP DSCP Criteria
9.2.6. Service Ingress IP Match Criteria
9.2.7. Service Ingress MAC Match Criteria
9.2.8. Applying Service Ingress Policies
9.2.8.1. Epipe Service
9.2.8.2. VPLS
9.2.8.3. IES
9.3. Service Management Tasks
9.3.1. Deleting QoS Policies
9.3.1.1. Removing a QoS Policy from Service SAPs
9.3.2. Copying and Overwriting QoS Policies
9.3.3. Removing a Policy from the QoS Configuration
9.3.4. Editing QoS Policies
9.4. Service SAP QoS Policy Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Service Ingress QoS Policy Commands
9.4.1.2. Operational Commands
9.4.1.3. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Configuration Commands
9.4.2.1.1. Generic Commands
9.4.2.2. Operational Commands
9.4.2.2.1. Service Ingress QoS Policy Commands
9.4.2.2.2. Service Ingress QoS Policy Entry Commands
9.4.2.2.3. Service Ingress MAC QoS Policy Match Commands
9.4.2.2.4. SAP Ingress Queue and Meter QoS Policy Commands
9.4.2.3. Show Commands
10. Service Egress QoS Policies
10.1. Overview
10.1.1. Egress SAP FC and Profile Overrides
10.1.2. Configuration Guidelines for Access SAP Egress Policies
10.1.2.1. Basic Configurations
10.1.2.2. Creating an Access SAP Egress Policy
10.1.2.3. Editing QoS Policies
10.2. Service Egress Policy Command Reference
10.2.1. Command Hierarchies
10.2.1.1. Configuration Commands
10.2.1.2. Copy Commands
10.2.1.3. Show Commands
10.2.2. Command Description
10.2.2.1. Configuration Commands
10.2.2.1.1. Generic Commands
10.2.2.1.2. SAP Egress Queue QoS Policy Commands
10.2.2.2. Operational Commands
10.2.2.3. Show Commands
11. Schedulers
11.1. Overview
12. Slope QoS Policies
12.1. Overview of Buffer Pools and Slope Policies
12.2. Basic Configurations
12.2.1. Creating a Slope QoS Policy
12.2.1.1. Default Slope Policy Values for the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
12.3. Applying Slope Policies
12.4. Deleting QoS Policies
12.4.1. Removing a Policy from the QoS Configuration
12.5. Copying and Overwriting QoS Policies
12.6. Editing QoS Policies
12.7. Slope QoS Policy Command Reference
12.7.1. Command Hierarchies
12.7.1.1. Configuration Commands
12.7.1.2. Operational Commands
12.7.1.3. Show Commands
12.7.2. Command Descriptions
12.7.2.1. Configuration Commands
12.7.2.1.1. Generic Commands
12.7.2.1.2. Slope Policy QoS Commands
12.7.2.1.3. Slope Policy QoS Policy Commands
12.7.2.1.4. RED Slope Commands
12.7.2.1.5. Operational Commands
12.7.2.1.6. Show Commands
13. Remark Policies
13.1. Overview of Remark Policies for 7210 SAS-K 2F1C2T
13.1.1. Configuration Guidelines for 7210 SAS-K 2F1C2T
13.2. Overview of Remark Policies for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
13.2.1. Configuration Guidelines for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
13.3. Basic Configurations
13.3.1. Creating a Remark Policy
13.3.2. Editing QoS Policies
13.4. Remark Policy Command Reference
13.4.1. Command Hierarchies
13.4.1.1. Configuration Commands for 7210 SAS-K 2F1C2T
13.4.1.2. Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
13.4.1.3. Operational Commands
13.4.1.4. Show Commands
13.4.2. Command Descriptions
13.4.2.1. Configuration Commands
13.4.2.1.1. Generic Commands
13.4.2.1.2. Remark Policy QoS Commands
13.4.2.1.3. Remark Policy Forwarding Class Commands
13.4.2.2. Operational Commands
13.4.2.3. Show Commands
14. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS QoS Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.1.1. Overview of QoS Policies on 7210 SAS-K 2F1C2T
2.1.2. Overview of QoS Policies on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.2.1. Overview of Network QoS Policy Applied to Access-uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.2.2. Overview of Network QoS Policy Applied to Network and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.3. Summary of Major Functions of QoS Policies
2.2. Network and Service QoS Policies
2.2.1. Network QoS Policies on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Network Ports and Hybrid Ports
2.2.1.1. Ingress Classification Support for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.2.1.2. Egress Marking Support for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.2.2. Network QoS Policies on Access-Uplink Ports
2.2.2.1. Ingress Classification Support for Access-Uplink Ports
2.2.3. Network Queue Policies
2.2.4. Service Ingress QoS Policies
2.2.4.1. Default Service Ingress Policy
2.2.5. Service Ingress Classification
2.2.5.1. Service Ingress Classification
2.2.5.2. Service Ingress Classification — IP and MAC Packet Fields
2.2.6. Service Egress QoS Policies
2.2.6.1. Default Service Egress Policy
2.3. Meters/Policers
2.3.1. Meter/Policers and Policer Parameters
2.3.1.1. Meter ID
2.3.1.2. Committed Information Rate
2.3.1.3. Peak Information Rate
2.3.1.4. Adaptation Rule for Meters
2.3.1.5. Committed Burst Size
2.3.1.6. Maximum Burst Size
2.3.1.7. Meter Counters
2.3.1.8. Meter Modes
2.3.1.9. Meter Platform Support
2.3.2. Ingress Profile Assignment
2.3.3. QoS Override
2.3.3.1. Configuring Meter Override Parameters
2.4. FCs
2.4.1. Forwarding-Class To Queue ID Mapping
2.4.2. FC to Queue ID mapping
2.5. Schedulers
2.6. CPU Queues
2.7. Egress Port Rate Limiting
2.8. Queue Management
2.8.1. Queues and Queue Parameters
2.8.1.1. Queue ID
2.8.1.2. Committed Information Rate
2.8.1.3. Peak Information Rate
2.8.1.4. Adaptation Rule for Queues
2.8.1.5. Committed Burst Size
2.8.1.6. Maximum Burst Size
2.8.1.7. Ingress Profile Assignment
2.8.1.8. Weight and Priority
2.8.1.9. Queue Counters
2.8.1.10. Queue Platform Support
2.8.2. Buffer Pools
2.8.2.1. Ring and Non-Ring Buffer Pool
2.8.2.2. Configuration Guidelines for CBS and MBS
2.8.3. Slope Policies
2.8.4. RED Slopes
2.8.4.1. Operation and Configuration of RED Slopes
2.8.4.2. Simplified Overview of RED
2.8.4.3. Slope Policy Parameters
2.9. Preclassification on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.10. QoS Policy Entities
2.10.1. Summary of QoS Policy Support for Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.11. Configuration Notes
3. DEI-Based Classification and Marking
3.1. DEI-Based Classification and Marking
3.2. DEI-Based Marking
4. Port-Level Egress Rate Limiting
4.1. Overview
4.2. Basic Configurations
4.2.1. Modifying the Port-Level Egress-Rate Command
4.2.2. Removing the Port-Level Egress-Rate Command
4.3. Port Level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Command Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. Frame-Based Accounting
5.1. Overview of Frame-Based Accounting
5.2. Enabling and Disabling Frame-Based Accounting
5.3. Frame-based Accounting Command Reference
5.3.1. Command Hierarchies
5.3.1.1. Configuration Commands
5.3.1.2. Show Commands
5.3.2. Command Descriptions
5.3.2.1. Configuration Commands
5.3.2.2. Show Commands
6. DSCP, dot1p, and MPLS EXP Classification Policies
6.1. Overview
6.1.1. DSCP Classification Policy
6.1.2. dot1p Classification Policy
6.1.3. MPLS EXP Classification Policy
6.2. Configuring Classification Policies
6.3. DSCP, Dot1p, and MPLS EXP Classification Policy Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands for 7210 SAS-K 2F1C2T
6.3.1.2. Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
6.3.1.3. Show Commands
6.3.1.4. Operational Commands
6.3.2. Command Description
6.3.2.1. Configuration Commands
6.3.2.2. Show Commands
7. Network QoS Policies
7.1. Overview of Network QoS Policy on 7210 SAS-K 2F1C2T
7.1.1. Resource Allocation for Network QoS Policy for 7210 SAS-K 2F1C2T
7.2. Basic Configurations for 7210 SAS-K 2F1C2T
7.2.1. Create a Network QoS Policy for Access-Uplink Ports on 7210 SAS-K 2F1C2T
7.2.1.1. Default Network Policy Values for Access-Uplink Ports on 7210 SAS-K 2F1C2T
7.3. Overview of Network QoS Policy on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.3.1. Network QoS Policy for Access-Uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.3.2. Network QoS Policy for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.3.3. Resource Allocation for Network QoS policy for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4. Basic Configurations for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1. Create a Network QoS Policy on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.1. Create a Network QoS Policy for Access-Uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.1.1. Default Network Policy Values for Access-Uplink Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.2. Create a Network QoS Policy for Network Ports and Hybrid Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.4.1.3. Default Network Policy Values on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5. DSCP Marking CPU Self-Generated Traffic
7.5.1. QoS for CPU Self-Generated Traffic on Network Interfaces for the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5.2. Default DSCP Mapping
7.6. Service Management Tasks
7.6.1. Deleting QoS Policies
7.6.2. Remove a Policy from the QoS Configuration
7.6.3. Copying and Overwriting Network Policies
7.6.4. Editing QoS Policies
7.7. Network QoS Policy Command Reference
7.7.1. Command Hierarchies
7.7.1.1. Configuration Commands for 7210 SAS-K 2F1C2T
7.7.1.2. Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.7.1.3. Self-generated Traffic Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.7.1.4. Operational Commands
7.7.1.5. Show Commands
7.7.2. Command Descriptions
7.7.2.1. Configuration Commands
7.7.2.1.1. Generic Commands
7.7.2.1.2. Operational Commands
7.7.2.1.3. Network QoS Policy Commands
7.7.2.1.4. Network Egress QoS Policy Commands
7.7.2.1.5. Network Ingress QoS Policy Commands
7.7.2.1.6. Network Ingress Queue QoS Policy Commands
7.7.2.1.7. Self-Generated Traffic Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.7.2.2. Show Commands
8. Network Queue QoS Policies
8.1. Overview
8.2. Basic Configurations
8.2.1. Creating a Network Queue QoS Policy
8.2.2. Applying Network Queue Policies
8.2.2.1. Applying Network Queue Configuration to Access-Uplink Ports
8.2.2.2. Applying Network Queue Configuration to Network Ports on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.3. Default Network Queue Policy Values
8.3.1. Default Network Queue Policy for 7210 SAS-K 2F1C2T
8.3.2. Default Network Queue Policy for 7210 SAS-K 2F6C4T
8.3.3. Default Network Queue Policy for 7210 SAS-K 3SFP+ 8C
8.4. Service Management Tasks
8.4.1. Deleting Network Queue QoS Policies
8.4.2. Copying and Overwriting Network Queue QoS Policies
8.4.3. Editing Network Queue QoS Policies
8.5. Network Queue QoS Policy Command Reference
8.5.1. Command Hierarchies
8.5.1.1. Configuration Commands
8.5.1.2. Operational Commands
8.5.1.3. Show Commands
8.5.2. Command Descriptions
8.5.2.1. Configuration Commands
8.5.2.1.1. Generic Commands
8.5.2.1.2. Operational Commands
8.5.2.1.3. Network Queue QoS Policy Commands
8.5.2.1.4. Network Queue QoS Policy Queue Commands
8.5.2.2. Show Commands
9. Service Ingress QoS Policies
9.1. Overview of Service Ingress Policy
9.1.1. Configuration Guidelines for SAP-Ingress Policy
9.1.1.1. Resource Allocation for Service Ingress QoS Classification Policy
9.1.1.2. Resource Allocation for SAP Ingress Meters
9.1.1.3. Default SAP-Ingress Policy
9.1.1.4. Use of Index File by SAP QoS Ingress Policy
9.2. Basic Configurations
9.2.1. Service Ingress QoS Policies
9.2.2. Service Ingress QoS Queues
9.2.3. Service Ingress QoS Meters
9.2.4. SAP Ingress FC Configuration
9.2.5. Service Ingress dot1p and IP DSCP Criteria
9.2.6. Service Ingress IP Match Criteria
9.2.7. Service Ingress MAC Match Criteria
9.2.8. Applying Service Ingress Policies
9.2.8.1. Epipe Service
9.2.8.2. VPLS
9.2.8.3. IES
9.3. Service Management Tasks
9.3.1. Deleting QoS Policies
9.3.1.1. Removing a QoS Policy from Service SAPs
9.3.2. Copying and Overwriting QoS Policies
9.3.3. Removing a Policy from the QoS Configuration
9.3.4. Editing QoS Policies
9.4. Service SAP QoS Policy Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Service Ingress QoS Policy Commands
9.4.1.2. Operational Commands
9.4.1.3. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Configuration Commands
9.4.2.1.1. Generic Commands
9.4.2.2. Operational Commands
9.4.2.2.1. Service Ingress QoS Policy Commands
9.4.2.2.2. Service Ingress QoS Policy Entry Commands
9.4.2.2.3. Service Ingress MAC QoS Policy Match Commands
9.4.2.2.4. SAP Ingress Queue and Meter QoS Policy Commands
9.4.2.3. Show Commands
10. Service Egress QoS Policies
10.1. Overview
10.1.1. Egress SAP FC and Profile Overrides
10.1.2. Configuration Guidelines for Access SAP Egress Policies
10.1.2.1. Basic Configurations
10.1.2.2. Creating an Access SAP Egress Policy
10.1.2.3. Editing QoS Policies
10.2. Service Egress Policy Command Reference
10.2.1. Command Hierarchies
10.2.1.1. Configuration Commands
10.2.1.2. Copy Commands
10.2.1.3. Show Commands
10.2.2. Command Description
10.2.2.1. Configuration Commands
10.2.2.1.1. Generic Commands
10.2.2.1.2. SAP Egress Queue QoS Policy Commands
10.2.2.2. Operational Commands
10.2.2.3. Show Commands
11. Schedulers
11.1. Overview
12. Slope QoS Policies
12.1. Overview of Buffer Pools and Slope Policies
12.2. Basic Configurations
12.2.1. Creating a Slope QoS Policy
12.2.1.1. Default Slope Policy Values for the 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
12.3. Applying Slope Policies
12.4. Deleting QoS Policies
12.4.1. Removing a Policy from the QoS Configuration
12.5. Copying and Overwriting QoS Policies
12.6. Editing QoS Policies
12.7. Slope QoS Policy Command Reference
12.7.1. Command Hierarchies
12.7.1.1. Configuration Commands
12.7.1.2. Operational Commands
12.7.1.3. Show Commands
12.7.2. Command Descriptions
12.7.2.1. Configuration Commands
12.7.2.1.1. Generic Commands
12.7.2.1.2. Slope Policy QoS Commands
12.7.2.1.3. Slope Policy QoS Policy Commands
12.7.2.1.4. RED Slope Commands
12.7.2.1.5. Operational Commands
12.7.2.1.6. Show Commands
13. Remark Policies
13.1. Overview of Remark Policies for 7210 SAS-K 2F1C2T
13.1.1. Configuration Guidelines for 7210 SAS-K 2F1C2T
13.2. Overview of Remark Policies for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
13.2.1. Configuration Guidelines for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
13.3. Basic Configurations
13.3.1. Creating a Remark Policy
13.3.2. Editing QoS Policies
13.4. Remark Policy Command Reference
13.4.1. Command Hierarchies
13.4.1.1. Configuration Commands for 7210 SAS-K 2F1C2T
13.4.1.2. Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
13.4.1.3. Operational Commands
13.4.1.4. Show Commands
13.4.2. Command Descriptions
13.4.2.1. Configuration Commands
13.4.2.1.1. Generic Commands
13.4.2.1.2. Remark Policy QoS Commands
13.4.2.1.3. Remark Policy Forwarding Class Commands
13.4.2.2. Operational Commands
13.4.2.3. Show Commands
14. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, Mxp, Sx, S Quality of Service Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-Series Services Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.1.1. Overview of QoS Policies on 7210 SAS-M and 7210 SAS-T in Access-uplink Mode
2.1.2. Overview of QoS Policies on 7210 SAS-M and 7210 SAS-T in Network Mode
2.1.3. Overview of QoS Policies on 7210 SAS-Mxp in Network Mode
2.1.4. Overview of QoS Policies on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.2. Network and Service QoS Policies
2.2.1. Network QoS Policies in Network Mode
2.2.1.1. Network QoS Policy “ip-interface” Type
2.2.1.2. Network QoS Policy “port” Type
2.2.2. Network QoS Policies in Access-uplink Mode
2.2.3. Network Queue QoS Policies
2.2.3.1. Network Queue Policies in Network Mode
2.2.3.2. Network Queue Policies in Access-uplink Mode
2.2.4. Service Ingress QoS Policies
2.2.4.1. CAM-based Classification
2.2.4.2. Table-based Classification
2.2.4.3. Hierarchical Ingress Policing
2.2.5. Service Egress QoS Policies on 7210 SAS-Mxp
2.3. Access Ingress QoS Policies on the 7210 SAS-Mxp
2.4. Access Egress QoS Policies
2.4.1. Access Egress QoS Policies on 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE
2.4.2. Access Egress QoS Policies on 7210 SAS-Mxp
2.4.2.1. Access Egress QoS Policy for SAP-based Queuing Mode on 7210 SAS-Mxp
2.4.2.2. Access Egress QoS Policy for Port-based Queuing Mode on 7210 SAS-Mxp
2.4.3. Queue Overrides for Access Egress QoS Policies on the 7210 SAS-Mxp
2.4.3.1. Configuring Access Egress QoS Policy Queue Override Parameters
2.5. Remark Policies on 7210 SAS-T, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp (Network Mode)
2.5.1. Egress Port Rate Limiting
2.6. Forwarding Classes
2.6.1. Forwarding Class-to-Queue ID Map on 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
2.6.2. Forwarding Class-to-Queue ID Map on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.7. QoS Policy Entities
2.7.1. QoS Policies for Hybrid Ports on 7210 SAS-M and 7210 SAS-T
2.7.2. QoS Policies for Hybrid Ports on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.7.3. QoS Policies for Hybrid Ports on 7210 SAS-Mxp
2.8. Meters/Policers
2.8.1. Meter/Policer Parameters
2.8.1.1. Meter ID
2.8.1.2. Committed Information Rate for Meters
2.8.1.3. Peak Information Rate for Meters
2.8.1.4. Adaptation Rule for Meters
2.8.1.5. Committed Burst Size (for Meter/Policers)
2.8.1.6. Maximum Burst Size (for Meter/Policers)
2.8.1.7. Meter Counters
2.8.1.8. Meter Modes
2.8.2. Color-aware Policing
2.8.3. QoS Overrides for Meters/Policers
2.8.3.1. Configuration Guidelines for QoS Override
2.8.3.2. Configuring Meter Override Parameters
2.9. Queue Management
2.9.1. Queue Parameters
2.9.1.1. Queue ID
2.9.1.2. Committed Information Rate for Queues
2.9.1.3. Peak Information Rate for Queues
2.9.1.4. Adaptation Rule for Queues
2.9.1.5. Committed Burst Size (CBS) and the Maximum Burst Size (MBS) for Queues
2.9.2. Buffer Pools
2.9.2.1. Buffer Pools on 7210 SAS-M and 7210 SAS-T
2.9.2.1.1. Buffer Pool Allocation - Per Port MBS Pool (7210 SAS-M and 7210 SAS-T)
2.9.2.1.2. Buffer Pool Allocation - Per Node MBS Pool (7210 SAS-T)
2.9.2.2. Decommissioning Ports with Per Port MBS Pool
2.9.2.2.1. Using Decommission Command for Buffer Allocation on 7210 SAS-M and 7210 SAS-T Devices
2.9.2.2.2. Configuration Guidelines for Use of Decommission Commands on 7210 SAS-M and 7210 SAS-T Devices
2.9.2.3. Buffer Pools on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.9.2.4. Buffer Pools on 7210 SAS-Mxp
2.9.3. Queue Management Policies for 7210 SAS-Mxp
2.9.3.1. Queue Management Policy Parameters
2.9.4. RED Slopes In Network and Access-uplink Mode
2.9.4.1. Tuning the Shared Buffer Utilization Calculation
2.9.4.2. Slope Policy Parameters
2.9.4.3. Slope Policies for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE Devices
2.9.5. CPU Queues
2.10. Schedulers
2.10.1. Scheduler Modes
2.10.2. Port Scheduler Policies for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx 10/100GE, and 7210 SAS-Sx/S 1/10GE
2.10.3. Schedulers on 7210 SAS-Mxp
2.11. Configuration Notes
3. Discard Eligibility Indicator-based (DEI-based) Classification and Marking
3.1. DEI-based Classification
3.2. DEI-based Marking
3.3. Configuration Guidelines
4. Port Level Egress Rate-Limiting
4.1. Overview
4.1.1. Applications
4.1.2. Effect of Port Level Rate-Limiting on Network Queue Functionality
4.2. Basic Configurations
4.2.1. Modifying Port Level Egress-Rate Command
4.2.2. Removing Port Level Egress-Rate Command
4.2.2.1. Default Egress-Rate Values
4.3. Port Level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Command Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. Frame-based Accounting
5.1. Overview
5.1.1. Frame-based Accounting
5.1.2. Effects of Enabling Ingress Frame-based Accounting on Ingress Meter Functionality
5.1.3. Effects of Enabling Egress Frame-based Accounting on Network Queue Functionality
5.1.4. Accounting and Statistics
5.2. Basic Configurations
5.2.1. Enabling and Disabling Frame-Based Accounting
5.3. Frame-based Accounting Command Reference
5.3.1. Command Hierarchies
5.3.1.1. Configuration Commands
5.3.2. Command Descriptions
5.3.2.1. Configuration Commands
6. Network QoS Policies
6.1. Overview
6.1.1. Overview of Network QoS Policies in Network Mode
6.1.1.1. Overview of Network QoS Policies in Access-uplink Mode
6.2. Network QoS Policy in Network Mode
6.2.1. Network QoS Policy Functionality for the IP-interface Type
6.2.2. Basic Configurations
6.2.3. Create a Network QoS Policy (Type IP-interface) for Network Mode
6.2.3.1. Example for Network QoS Policy of Type IP-interface
6.2.4. Configuring Network QoS Policy (Type Port) for Network Mode
6.2.5. Default Network Policy Values Available in Network Mode
6.2.6. Resource Allocation for Network QoS Policy
6.2.6.1. Network QoS Policies Resource Usage Examples
6.2.6.1.1. Example 1
6.2.6.1.2. Example 2
6.2.6.1.3. Example 3
6.2.6.1.4. Example 4
6.2.6.1.5. Example 5
6.2.6.1.6. Example 6
6.2.6.1.7. Example 7
6.2.6.1.8. Example 8
6.3. Network QoS Policy in Access-uplink Mode
6.3.1. Basic Configurations
6.3.2. Configuring Network Policy for Access-uplink Mode
6.3.3. Default Network Policy Values Available in Access-uplink Mode
6.4. DSCP Marking Self-Generated (CPU) Traffic
6.4.1. QoS for Self-Generated (CPU) Traffic on Network Interfaces for the 7210 SAS-Mxp
6.4.2. Default DSCP Mapping Table
6.5. Service Management Tasks
6.5.1. Deleting QoS Policies
6.5.2. Remove a Policy from the QoS Configuration
6.5.3. Copying and Overwriting Network Policies
6.5.4. Editing QoS Policies
6.6. Network QoS Policy Command Reference
6.6.1. Command Hierarchies
6.6.1.1. Configuration Commands for MPLS EXP Profile Map (7210 SAS platforms operating in Network Mode)
6.6.1.2. Configuration Commands (7210 SAS-M in Network Mode)
6.6.1.3. Configuration Commands (7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE Configured in Network Mode)
6.6.1.4. Configuration Commands (7210 SAS-Mxp)
6.6.1.5. Configuration Commands (Access-uplink Mode)
6.6.1.6. Self-Generated Traffic Commands (7210 SAS-Mxp)
6.6.1.7. Operational Commands (Network Mode or Access-uplink Mode)
6.6.1.8. Show Commands (Network Mode or Access-uplink Mode)
6.6.1.9. Show Commands (7210 SAS-Mxp only)
6.6.2. Command Descriptions
6.6.2.1. Configuration Commands
6.6.2.1.1. Generic Commands
6.6.2.2. Network QoS Policy Commands
6.6.2.3. Network QoS Policy Commands (7210 SAS-M and 7210 SAS-T in Access-uplink Mode)
6.6.2.4. Network Ingress QoS Policy Commands
6.6.2.5. Network Egress QoS Policy Commands
6.6.2.6. Self-Generated Traffic Commands for 7210 SAS-Mxp
6.6.2.7. Operational Commands
6.6.2.8. Show Commands
6.6.2.9. Show Commands (for 7210 SAS-Mxp only)
7. Network Queue QoS Policies
7.1. Overview
7.2. Basic Configurations
7.2.1. Create a Network Queue QoS Policy
7.2.2. Applying Network Queue Policies
7.2.2.1. Applying Network Queue Configuration in Network Mode
7.2.2.2. Applying Network Queue Configuration in Access-uplink Mode
7.3. Default Network Queue Policy Values
7.4. Service Management Tasks
7.4.1. Deleting Network Queue QoS Policies
7.4.2. Copying and Overwriting Network Queue QoS Policies
7.4.3. Editing Network Queue QoS Policies
7.5. Network Queue QoS Policy Command Reference
7.5.1. Command Hierarchies
7.5.1.1. Configuration Commands for 7210 SAS-M and 7210 SAS-T (in Network Mode and Access-uplink Mode)
7.5.1.2. Configuration Commands for 7210 SAS-Mxp
7.5.1.3. Configuration Commands for 7210 SAS-Sx 1/10GE and 7210 SAS-Sx 10/100GE
7.5.1.4. Operational Commands
7.5.1.5. Show Commands
7.5.2. Command Descriptions
7.5.2.1. Configuration Commands
7.5.2.1.1. Generic Commands
7.5.2.2. Network Queue QoS Policy Commands
7.5.2.3. Network Queue QoS Policy Queue Commands
7.5.2.4. Operational Commands
7.5.2.5. Show Commands
8. Service Ingress QoS Policies
8.1. Overview
8.1.1. Default SAP Ingress Policy
8.2. Resource Allocation for SAP Ingress Policy
8.2.1. Use of Index File by SAP QoS Ingress Policy
8.2.2. Use of the Keyword “multipoint” for Default Meter “11”
8.2.3. Service Ingress Meter Selection Rules
8.2.3.1. Default Policy
8.2.3.2. VPLS Service without Meter “11”
8.2.3.3. VPLS Service with Meter “11”
8.2.3.4. Epipe, IES, and VPRN Services without PIM
8.2.3.5. IES and VPRN Services with PIM/multicast and without Meter “11”
8.2.3.6. IES and VPRN Services with PIM/multicast and Meter “11”
8.2.4. Service Ingress Policy Configuration Considerations
8.3. Resource Allocation for Service Ingress QoS Policies Using CAM-based Classification
8.3.1. Resource Configuration Guidelines for Service Ingress QoS Policies Using CAM-based Classification
8.3.2. Computation of Resources Used per SAP Ingress Policy for CAM-based Classification
8.3.2.1. Determining the Number of Classification Entries
8.3.2.1.1. Rules for a SAP in a VPLS
8.3.2.1.2. Rules for a SAP in a VLL, VPRN, or IES Service with PIM Disabled
8.3.2.1.3. Rules for a SAP in an IES or VPRN Service with PIM/multicast Enabled
8.3.2.1.4. Calculating the Number of Classification Entries per FC
8.3.2.1.5. Determining the Number of Classification Entries per Policy (TC)
8.3.2.1.6. Determining the Number of Policers/Meters per Policy (TP)
8.4. Table-based Classification Using Dot1p and IP DSCP for Assigning FC and Profile on SAP Ingress (7210 SAS-Mxp)
8.4.1. IP DSCP and Dot1p Classification Policy Support
8.4.1.1. Default-FC Assignment Rules for SAPs in Layer 3 Services
8.4.2. Precedence Rules for DEI Assignments
8.4.3. Creating an IP DSCP and Dot1p Classification Policy
8.4.4. CAM Resource Usage for IP DSCP and Dot1p Classification Policies (7210 SAS-Mxp)
8.4.4.1. CAM Resource Allocation
8.4.5. Associating a DSCP or Dot1p Classification Policy
8.4.5.1. Associating a Classification Policy with a SAP Ingress QoS Policy
8.4.5.2. Associating a Classification Policy with an Ethernet Port
8.4.6. Assigning and Enabling DSCP and Dot1p Classification Policies to a SAP
8.4.6.1. Assigning and Enabling Policies to Epipe and VPLS SAPs
8.4.6.2. Assigning and Enabling Policies to IES and VPRN Interface SAPs
8.4.6.3. Assigning Policies to RVPLS SAPs
8.4.6.3.1. Create a SAP Ingress Policy and Assign the Policy to an RVPLS SAP
8.4.6.3.2. Table-based Classification per IP Interface for Routed Packets
8.4.6.3.3. Table-based Classification per Port for Bridged Packets
8.5. Service Meter for SAP Ingress (7210 SAS-Mxp)
8.5.1. Default Service Meter Policy
8.5.2. Resource Usage for Service Meters
8.5.2.1. Examples for Service Meters with Computation of Resource Usage
8.6. Calculating Resources Required for Classification
8.6.1. Examples: Calculating Resources Required for CAM-based Classification
8.6.1.1. Example 1
8.6.1.2. Example 1a (Default multipoint meter 11 is not used):
8.6.1.3. Example 2
8.6.1.4. Example 2a (Default multipoint meter "11" is not used):
8.6.1.5. Example 3
8.6.1.6. Example 3a (Default multipoint meter "11" is not used):
8.6.1.7. Example 4
8.6.1.8. Example 4a (Default multipoint meter "11" is not used):
8.6.1.9. Example 5
8.6.1.10. Example 6
8.6.1.11. Example 7
8.6.1.12. Example 8
8.6.1.13. Example 9
8.6.1.14. Example 9a (Default multipoint meter "11" is not used):
8.6.1.15. Example 10
8.6.1.16. Example 11
8.6.2. Examples: Calculating Resources Required for IP DSCP Table-based Classification with CAM-based Policing (7210 SAS-Mxp only)
8.6.2.1. Example 1: Epipe, IES, and VPRN Services using Unicast Traffic Type
8.6.2.2. Example 2: VPLS using Unicast and BUM Meter with IES or VPRN using Multicast
8.6.2.3. Example 3: VPLS Service using Unicast, Broadcast, Multicast, and Unknown-unicast with additional FCs
8.6.2.4. Example 4: Routed VPLS on Access Port using Unicast, Broadcast, Multicast, and Unknown-unicast with additional FCs
8.6.2.5. Example 5: Routed VPLS service on a hybrid port using unicast, broadcast, multicast and unknown-unicast for some FCs
8.6.2.6. Example 6: Routed VPLS on Access Port and Hybrid Port
8.7. Basic Configurations
8.7.1. Create Service Ingress QoS Policies
8.7.1.1. Service Ingress QoS Meter
8.7.1.2. Service Ingress IP Match Criteria
8.7.1.3. Service Ingress MAC Match Criteria
8.7.2. Applying Service Ingress Policies
8.7.2.1. Epipe
8.7.2.2. VPLS
8.7.2.3. VPRN
8.7.2.4. IES
8.8. Service Management Tasks
8.8.1. Deleting QoS Policies
8.8.1.1. Remove a QoS Policy from Service SAPs
8.8.2. Copying and Overwriting QoS Policies
8.8.3. Remove a Policy from the QoS Configuration
8.8.4. Editing QoS Policies
8.9. Service Ingress QoS Policy Command Reference
8.9.1. Command Hierarchy
8.9.1.1. Service Ingress QoS Policy Commands
8.9.1.2. Table-based IP DSCP and Dot1p Classification Policy Commands for SAP Ingress (7210 SAS-Mxp)
8.9.1.3. Service Meter Commands for SAP Ingress (7210 SAS-Mxp only)
8.9.1.4. Operational Commands
8.9.1.5. Show Commands
8.9.2. Command Descriptions
8.9.2.1. Configuration Commands
8.9.2.1.1. Generic Commands
8.9.2.1.2. Service Ingress QoS Policy Commands
8.9.2.1.3. Service Ingress QoS Policy Entry Commands
8.9.2.1.4. Service Ingress QoS Policy Forwarding Class Commands
8.9.2.1.5. IP QoS Policy Match Commands
8.9.2.1.6. Service Ingress MAC QoS Policy Match Commands
8.9.2.1.7. Service Meter QoS Policy Commands
8.9.2.1.8. IP DSCP and Dot1p Classification Policy Commands (for 7210 SAS-Mxp only)
8.9.2.1.9. Service Meter Commands for SAP Ingress (for 7210 SAS-Mxp only)
8.9.2.2. Operational Commands
8.9.2.3. Show Commands
9. Access Egress QoS Policies on 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE
9.1. Overview
9.1.1. Basic Configurations
9.1.1.1. Modifying Access Egress QoS Queues
9.1.1.2. Applying Access Egress QoS Policies
9.1.1.2.1. Ethernet Ports
9.1.1.3. Default Access Egress QoS Policy Values
9.1.1.4. Deleting QoS Policies
9.1.1.5. Removing a Policy from the QoS Configuration
9.2. Access Egress QoS Policy Command Reference
9.2.1. Command Hierarchies
9.2.1.1. Configuration Commands for 7210 SAS-M (Access-uplink Mode)
9.2.1.2. Configuration Commands for7210 SAS-M (Network Mode)
9.2.1.3. Configuration Commands for 7210 SAS-T (Access-uplink Mode)
9.2.1.4. Configuration Commands for 7210 SAS-T,7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE (Network Mode)
9.2.1.5. Operational Commands
9.2.1.6. Show Commands
9.2.2. Configuration Commands
9.2.2.1. Generic Commands
9.2.2.2. Access Egress Queue QoS Policy Commands
9.2.2.3. Operational Commands
9.2.2.4. Show Commands
10. Access Egress QoS Policies for 7210 SAS-Mxp
10.1. Overview
10.1.1. Access Egress QoS Policy for SAP-based Queuing Mode on 7210 SAS-Mxp
10.1.2. Access Egress QoS Policy for Port-based Queuing Mode on 7210 SAS-Mxp
10.1.3. Access Egress QoS Policy Queue Override
10.1.4. Basic Configurations
10.1.4.1. Editing QoS Policies
10.1.4.2. Deleting QoS Policies
10.1.4.3. Removing a Policy from the QoS Configuration
10.2. Access Egress QoS Policy Command Reference
10.2.1. Command Hierarchies
10.2.1.1. Configuration Commands for 7210 SAS-Mxp
10.2.1.2. Show Commands
10.2.2. Command Descriptions
10.2.2.1. Generic Commands
10.2.2.2. Access Egress Queue QoS Policy Commands
10.2.2.3. Show Commands
11. Service Egress Policies for 7210 SAS-Mxp
11.1. Overview
11.1.1. Basic Configurations
11.1.2. Create a SAP Egress Policy
11.1.3. Editing QoS Policies
11.2. Service Egress Policy Command Reference
11.2.1. Command Hierarchies
11.2.1.1. Configuration Commands for 7210 SAS-Mxp
11.2.1.2. Operational Commands
11.2.1.3. Show Commands
11.2.2. Command Descriptions
11.2.2.1. Configuration Commands
11.2.2.1.1. Generic Commands
11.2.2.1.2. SAP Egress Queue QoS Policy Commands
11.2.2.2. Operational Commands
11.2.2.3. Show Commands
12. QoS Port Scheduler Policies for 7210 SAS-M and 7210 SAS-T
12.1. Overview
12.1.1. Configuring Port Scheduler Policies
12.1.2. Basic Configurations
12.1.2.1. Creating a QoS Port Scheduler Policy
12.2. Service Management Tasks
12.2.1. Copying and Overwriting Scheduler Policies
12.2.2. Editing QoS Policies
13. Schedulers on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
13.1. Configuring Scheduler Policies
13.2. QoS Port Scheduler Policy Command Reference
13.2.1. Command Hierarchies
13.2.1.1. Port Scheduler Policy Configuration Commands
13.2.1.2. Operational Commands
13.2.1.3. Show Commands
13.2.2. Command Descriptions
13.2.2.1. Configuration Commands
13.2.2.1.1. Generic Commands
13.2.2.2. Port Scheduler Policy Commands
13.2.2.3. Operational Commands
13.2.2.4. Show Commands
14. Schedulers on 7210 SAS-Mxp
14.1. Overview
14.2. Scheduling with SAP-based Queues on Access Ports
14.3. Scheduling on Network Ports
14.4. Scheduling on Hybrid Port with SAP-based Egress Queues
14.4.1. Port-based Scheduling and Queuing on Access Ports
14.5. Scheduling on Hybrid Port with Port-based SAP Queues
15. Slope QoS Policies
15.1. Overview
15.1.1. Configuration Guidelines
15.1.1.1. For 7210 SAS-M Network Mode
15.1.1.2. For 7210 SAS-M Access-uplink Mode
15.1.1.3. WRED Slope Enhancement
15.1.2. WRED Support on 7210 SAS-T Access-uplink Mode
15.1.3. Basic Configurations
15.1.3.1. Create a Slope QoS Policy
15.1.3.2. Applying Slope Policies
15.1.3.2.1. Ports
15.1.4. Default Slope Policy Values
15.2. Service Management Tasks
15.2.1. Deleting QoS Policies
15.2.1.1. Ports
15.2.1.2. Remove a Policy from the QoS Configuration
15.2.2. Copying and Overwriting QoS Policies
15.2.3. Editing QoS Policies
15.3. Slope QoS Policy Command Reference
15.3.1. Command Hierarchies
15.3.1.1. Configuration Commands
15.3.1.2. WRED Commands
15.3.1.3. Operational Commands
15.3.1.4. Show Commands
15.3.2. Command Descriptions
15.3.2.1. Configuration Commands
15.3.2.1.1. Generic Commands
15.3.2.1.2. Slope Policy QoS Commands
15.3.2.1.3. Slope Policy QoS Policy Commands
15.3.2.1.4. RED Slope Commands
15.3.2.1.5. Slope Policy QoS Policy Commands
15.3.2.2. WRED Commands
15.3.2.3. Operational Commands
15.3.2.4. Show Commands
16. Queue Management Policies
16.1. Overview
16.1.1. Basic Configurations
16.1.2. Service Management Tasks
16.1.2.1. Creating a Queue Management Policy
16.1.2.2. Editing QoS Policies
16.2. Queue Management Policy Command Reference
16.2.1. Command Hierarchies
16.2.1.1. Configuration Commands for 7210 SAS-Mxp
16.2.1.2. Operational Commands
16.2.1.3. Show Commands
16.2.2. Command Descriptions
16.2.2.1. Configuration Commands
16.2.2.1.1. Generic Commands
16.2.2.1.2. Queue Management Policy QoS Commands
16.2.2.1.3. WRED Slope Commands
16.2.2.2. Operational Commands
16.2.2.3. Show Commands
17. Remark Policies
17.1. Overview
17.1.1. Configuration Guidelines
17.1.2. Basic Configurations
17.1.2.1. Creating a Remark Policy
17.1.2.2. Editing QoS Policies
17.2. Remark Policy Command Reference
17.2.1. Command Hierarchies
17.2.1.1. Configuration Commands for 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp in Network Mode
17.2.1.2. Operational Commands
17.2.1.3. Show Commands
17.2.2. Command Descriptions
17.2.2.1. Configuration Commands
17.2.2.1.1. Generic Commands
17.2.2.1.2. Remark Policy QoS Commands
17.2.2.1.3. Remark Policy Forwarding Class Commands
17.2.2.2. Operational Commands
17.2.2.3. Show Commands
18. Access Ingress QoS Policies for 7210 SAS-Mxp
18.1. In This Chapter
18.2. Overview
18.2.1. Resource Allocation for Access Ingress QoS Policies
18.2.1.1. Use of Index File for Access Ingress QoS Policies
18.2.1.2. Calculating the Number of QoS Resources
18.2.1.3. Calculating the Number of Meters or Policers
18.2.1.4. Determining the Number of Resources Allocated to the Policy
18.2.1.5. Example of Access Ingress QoS Policy Resource Calculations
18.2.1.5.1. Example 1
18.2.1.5.2. Example 2
18.2.1.5.3. Example 3
18.2.2. Configuration Guidelines for Using a Port-based Access Ingress QoS Policy
18.2.3. Basic Configurations
18.2.3.1. Editing an Access Ingress QoS Policy Configuration
18.2.3.2. Removing a Policy from the QoS Configuration
18.2.3.3. Deleting Access Ingress QoS Policies
18.3. Access-Ingress QoS Policy Command Reference
18.3.1. Command Hierarchies
18.3.1.1. Access-Ingress QoS Configuration Commands
18.3.2. Command Descriptions
18.3.2.1. Generic Commands
18.3.2.2. Access Ingress QoS Policy Commands
19. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-Series Services Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.1.1. Overview of QoS Policies on 7210 SAS-M and 7210 SAS-T in Access-uplink Mode
2.1.2. Overview of QoS Policies on 7210 SAS-M and 7210 SAS-T in Network Mode
2.1.3. Overview of QoS Policies on 7210 SAS-Mxp in Network Mode
2.1.4. Overview of QoS Policies on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.2. Network and Service QoS Policies
2.2.1. Network QoS Policies in Network Mode
2.2.1.1. Network QoS Policy “ip-interface” Type
2.2.1.2. Network QoS Policy “port” Type
2.2.2. Network QoS Policies in Access-uplink Mode
2.2.3. Network Queue QoS Policies
2.2.3.1. Network Queue Policies in Network Mode
2.2.3.2. Network Queue Policies in Access-uplink Mode
2.2.4. Service Ingress QoS Policies
2.2.4.1. CAM-based Classification
2.2.4.2. Table-based Classification
2.2.4.3. Hierarchical Ingress Policing
2.2.5. Service Egress QoS Policies on 7210 SAS-Mxp
2.3. Access Ingress QoS Policies on the 7210 SAS-Mxp
2.4. Access Egress QoS Policies
2.4.1. Access Egress QoS Policies on 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE
2.4.2. Access Egress QoS Policies on 7210 SAS-Mxp
2.4.2.1. Access Egress QoS Policy for SAP-based Queuing Mode on 7210 SAS-Mxp
2.4.2.2. Access Egress QoS Policy for Port-based Queuing Mode on 7210 SAS-Mxp
2.4.3. Queue Overrides for Access Egress QoS Policies on the 7210 SAS-Mxp
2.4.3.1. Configuring Access Egress QoS Policy Queue Override Parameters
2.5. Remark Policies on 7210 SAS-T, 7210 SAS-S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp (Network Mode)
2.5.1. Egress Port Rate Limiting
2.6. Forwarding Classes
2.6.1. Forwarding Class-to-Queue ID Map on 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Mxp
2.6.2. Forwarding Class-to-Queue ID Map on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.7. QoS Policy Entities
2.7.1. QoS Policies for Hybrid Ports on 7210 SAS-M and 7210 SAS-T
2.7.2. QoS Policies for Hybrid Ports on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.7.3. QoS Policies for Hybrid Ports on 7210 SAS-Mxp
2.8. Meters/Policers
2.8.1. Meter/Policer Parameters
2.8.1.1. Meter ID
2.8.1.2. Committed Information Rate for Meters
2.8.1.3. Peak Information Rate for Meters
2.8.1.4. Adaptation Rule for Meters
2.8.1.5. Committed Burst Size (for Meter/Policers)
2.8.1.6. Maximum Burst Size (for Meter/Policers)
2.8.1.7. Meter Counters
2.8.1.8. Meter Modes
2.8.2. Color-aware Policing
2.8.3. QoS Overrides for Meters/Policers
2.8.3.1. Configuration Guidelines for QoS Override
2.8.3.2. Configuring Meter Override Parameters
2.9. Queue Management
2.9.1. Queue Parameters
2.9.1.1. Queue ID
2.9.1.2. Committed Information Rate for Queues
2.9.1.3. Peak Information Rate for Queues
2.9.1.4. Adaptation Rule for Queues
2.9.1.5. Committed Burst Size (CBS) and the Maximum Burst Size (MBS) for Queues
2.9.2. Buffer Pools
2.9.2.1. Buffer Pools on 7210 SAS-M and 7210 SAS-T
2.9.2.1.1. Buffer Pool Allocation - Per Port MBS Pool (7210 SAS-M and 7210 SAS-T)
2.9.2.1.2. Buffer Pool Allocation - Per Node MBS Pool (7210 SAS-T)
2.9.2.2. Decommissioning Ports with Per Port MBS Pool
2.9.2.2.1. Using Decommission Command for Buffer Allocation on 7210 SAS-M and 7210 SAS-T Devices
2.9.2.2.2. Configuration Guidelines for Use of Decommission Commands on 7210 SAS-M and 7210 SAS-T Devices
2.9.2.3. Buffer Pools on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
2.9.2.4. Buffer Pools on 7210 SAS-Mxp
2.9.3. Queue Management Policies for 7210 SAS-Mxp
2.9.3.1. Queue Management Policy Parameters
2.9.4. RED Slopes In Network and Access-uplink Mode
2.9.4.1. Tuning the Shared Buffer Utilization Calculation
2.9.4.2. Slope Policy Parameters
2.9.4.3. Slope Policies for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE Devices
2.9.5. CPU Queues
2.10. Schedulers
2.10.1. Scheduler Modes
2.10.2. Port Scheduler Policies for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx 10/100GE, and 7210 SAS-Sx/S 1/10GE
2.10.3. Schedulers on 7210 SAS-Mxp
2.11. Configuration Notes
3. Discard Eligibility Indicator-based (DEI-based) Classification and Marking
3.1. DEI-based Classification
3.2. DEI-based Marking
3.3. Configuration Guidelines
4. Port Level Egress Rate-Limiting
4.1. Overview
4.1.1. Applications
4.1.2. Effect of Port Level Rate-Limiting on Network Queue Functionality
4.2. Basic Configurations
4.2.1. Modifying Port Level Egress-Rate Command
4.2.2. Removing Port Level Egress-Rate Command
4.2.2.1. Default Egress-Rate Values
4.3. Port Level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Command Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. Frame-based Accounting
5.1. Overview
5.1.1. Frame-based Accounting
5.1.2. Effects of Enabling Ingress Frame-based Accounting on Ingress Meter Functionality
5.1.3. Effects of Enabling Egress Frame-based Accounting on Network Queue Functionality
5.1.4. Accounting and Statistics
5.2. Basic Configurations
5.2.1. Enabling and Disabling Frame-Based Accounting
5.3. Frame-based Accounting Command Reference
5.3.1. Command Hierarchies
5.3.1.1. Configuration Commands
5.3.2. Command Descriptions
5.3.2.1. Configuration Commands
6. Network QoS Policies
6.1. Overview
6.1.1. Overview of Network QoS Policies in Network Mode
6.1.1.1. Overview of Network QoS Policies in Access-uplink Mode
6.2. Network QoS Policy in Network Mode
6.2.1. Network QoS Policy Functionality for the IP-interface Type
6.2.2. Basic Configurations
6.2.3. Create a Network QoS Policy (Type IP-interface) for Network Mode
6.2.3.1. Example for Network QoS Policy of Type IP-interface
6.2.4. Configuring Network QoS Policy (Type Port) for Network Mode
6.2.5. Default Network Policy Values Available in Network Mode
6.2.6. Resource Allocation for Network QoS Policy
6.2.6.1. Network QoS Policies Resource Usage Examples
6.2.6.1.1. Example 1
6.2.6.1.2. Example 2
6.2.6.1.3. Example 3
6.2.6.1.4. Example 4
6.2.6.1.5. Example 5
6.2.6.1.6. Example 6
6.2.6.1.7. Example 7
6.2.6.1.8. Example 8
6.3. Network QoS Policy in Access-uplink Mode
6.3.1. Basic Configurations
6.3.2. Configuring Network Policy for Access-uplink Mode
6.3.3. Default Network Policy Values Available in Access-uplink Mode
6.4. DSCP Marking Self-Generated (CPU) Traffic
6.4.1. QoS for Self-Generated (CPU) Traffic on Network Interfaces for the 7210 SAS-Mxp
6.4.2. Default DSCP Mapping Table
6.5. Service Management Tasks
6.5.1. Deleting QoS Policies
6.5.2. Remove a Policy from the QoS Configuration
6.5.3. Copying and Overwriting Network Policies
6.5.4. Editing QoS Policies
6.6. Network QoS Policy Command Reference
6.6.1. Command Hierarchies
6.6.1.1. Configuration Commands for MPLS EXP Profile Map (7210 SAS platforms operating in Network Mode)
6.6.1.2. Configuration Commands (7210 SAS-M in Network Mode)
6.6.1.3. Configuration Commands (7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE Configured in Network Mode)
6.6.1.4. Configuration Commands (7210 SAS-Mxp)
6.6.1.5. Configuration Commands (Access-uplink Mode)
6.6.1.6. Self-Generated Traffic Commands (7210 SAS-Mxp)
6.6.1.7. Operational Commands (Network Mode or Access-uplink Mode)
6.6.1.8. Show Commands (Network Mode or Access-uplink Mode)
6.6.1.9. Show Commands (7210 SAS-Mxp only)
6.6.2. Command Descriptions
6.6.2.1. Configuration Commands
6.6.2.1.1. Generic Commands
6.6.2.2. Network QoS Policy Commands
6.6.2.3. Network QoS Policy Commands (7210 SAS-M and 7210 SAS-T in Access-uplink Mode)
6.6.2.4. Network Ingress QoS Policy Commands
6.6.2.5. Network Egress QoS Policy Commands
6.6.2.6. Self-Generated Traffic Commands for 7210 SAS-Mxp
6.6.2.7. Operational Commands
6.6.2.8. Show Commands
6.6.2.9. Show Commands (for 7210 SAS-Mxp only)
7. Network Queue QoS Policies
7.1. Overview
7.2. Basic Configurations
7.2.1. Create a Network Queue QoS Policy
7.2.2. Applying Network Queue Policies
7.2.2.1. Applying Network Queue Configuration in Network Mode
7.2.2.2. Applying Network Queue Configuration in Access-uplink Mode
7.3. Default Network Queue Policy Values
7.4. Service Management Tasks
7.4.1. Deleting Network Queue QoS Policies
7.4.2. Copying and Overwriting Network Queue QoS Policies
7.4.3. Editing Network Queue QoS Policies
7.5. Network Queue QoS Policy Command Reference
7.5.1. Command Hierarchies
7.5.1.1. Configuration Commands for 7210 SAS-M and 7210 SAS-T (in Network Mode and Access-uplink Mode)
7.5.1.2. Configuration Commands for 7210 SAS-Mxp
7.5.1.3. Configuration Commands for 7210 SAS-Sx 1/10GE and 7210 SAS-Sx 10/100GE
7.5.1.4. Operational Commands
7.5.1.5. Show Commands
7.5.2. Command Descriptions
7.5.2.1. Configuration Commands
7.5.2.1.1. Generic Commands
7.5.2.2. Network Queue QoS Policy Commands
7.5.2.3. Network Queue QoS Policy Queue Commands
7.5.2.4. Operational Commands
7.5.2.5. Show Commands
8. Service Ingress QoS Policies
8.1. Overview
8.1.1. Default SAP Ingress Policy
8.2. Resource Allocation for SAP Ingress Policy
8.2.1. Use of Index File by SAP QoS Ingress Policy
8.2.2. Use of the Keyword “multipoint” for Default Meter “11”
8.2.3. Service Ingress Meter Selection Rules
8.2.3.1. Default Policy
8.2.3.2. VPLS Service without Meter “11”
8.2.3.3. VPLS Service with Meter “11”
8.2.3.4. Epipe, IES, and VPRN Services without PIM
8.2.3.5. IES and VPRN Services with PIM/multicast and without Meter “11”
8.2.3.6. IES and VPRN Services with PIM/multicast and Meter “11”
8.2.4. Service Ingress Policy Configuration Considerations
8.3. Resource Allocation for Service Ingress QoS Policies Using CAM-based Classification
8.3.1. Resource Configuration Guidelines for Service Ingress QoS Policies Using CAM-based Classification
8.3.2. Computation of Resources Used per SAP Ingress Policy for CAM-based Classification
8.3.2.1. Determining the Number of Classification Entries
8.3.2.1.1. Rules for a SAP in a VPLS
8.3.2.1.2. Rules for a SAP in a VLL, VPRN, or IES Service with PIM Disabled
8.3.2.1.3. Rules for a SAP in an IES or VPRN Service with PIM/multicast Enabled
8.3.2.1.4. Calculating the Number of Classification Entries per FC
8.3.2.1.5. Determining the Number of Classification Entries per Policy (TC)
8.3.2.1.6. Determining the Number of Policers/Meters per Policy (TP)
8.4. Table-based Classification Using Dot1p and IP DSCP for Assigning FC and Profile on SAP Ingress (7210 SAS-Mxp)
8.4.1. IP DSCP and Dot1p Classification Policy Support
8.4.1.1. Default-FC Assignment Rules for SAPs in Layer 3 Services
8.4.2. Precedence Rules for DEI Assignments
8.4.3. Creating an IP DSCP and Dot1p Classification Policy
8.4.4. CAM Resource Usage for IP DSCP and Dot1p Classification Policies (7210 SAS-Mxp)
8.4.4.1. CAM Resource Allocation
8.4.5. Associating a DSCP or Dot1p Classification Policy
8.4.5.1. Associating a Classification Policy with a SAP Ingress QoS Policy
8.4.5.2. Associating a Classification Policy with an Ethernet Port
8.4.6. Assigning and Enabling DSCP and Dot1p Classification Policies to a SAP
8.4.6.1. Assigning and Enabling Policies to Epipe and VPLS SAPs
8.4.6.2. Assigning and Enabling Policies to IES and VPRN Interface SAPs
8.4.6.3. Assigning Policies to RVPLS SAPs
8.4.6.3.1. Create a SAP Ingress Policy and Assign the Policy to an RVPLS SAP
8.4.6.3.2. Table-based Classification per IP Interface for Routed Packets
8.4.6.3.3. Table-based Classification per Port for Bridged Packets
8.5. Service Meter for SAP Ingress (7210 SAS-Mxp)
8.5.1. Default Service Meter Policy
8.5.2. Resource Usage for Service Meters
8.5.2.1. Examples for Service Meters with Computation of Resource Usage
8.6. Calculating Resources Required for Classification
8.6.1. Examples: Calculating Resources Required for CAM-based Classification
8.6.1.1. Example 1
8.6.1.2. Example 1a (Default multipoint meter 11 is not used):
8.6.1.3. Example 2
8.6.1.4. Example 2a (Default multipoint meter "11" is not used):
8.6.1.5. Example 3
8.6.1.6. Example 3a (Default multipoint meter "11" is not used):
8.6.1.7. Example 4
8.6.1.8. Example 4a (Default multipoint meter "11" is not used):
8.6.1.9. Example 5
8.6.1.10. Example 6
8.6.1.11. Example 7
8.6.1.12. Example 8
8.6.1.13. Example 9
8.6.1.14. Example 9a (Default multipoint meter "11" is not used):
8.6.1.15. Example 10
8.6.1.16. Example 11
8.6.2. Examples: Calculating Resources Required for IP DSCP Table-based Classification with CAM-based Policing (7210 SAS-Mxp only)
8.6.2.1. Example 1: Epipe, IES, and VPRN Services using Unicast Traffic Type
8.6.2.2. Example 2: VPLS using Unicast and BUM Meter with IES or VPRN using Multicast
8.6.2.3. Example 3: VPLS Service using Unicast, Broadcast, Multicast, and Unknown-unicast with additional FCs
8.6.2.4. Example 4: Routed VPLS on Access Port using Unicast, Broadcast, Multicast, and Unknown-unicast with additional FCs
8.6.2.5. Example 5: Routed VPLS service on a hybrid port using unicast, broadcast, multicast and unknown-unicast for some FCs
8.6.2.6. Example 6: Routed VPLS on Access Port and Hybrid Port
8.7. Basic Configurations
8.7.1. Create Service Ingress QoS Policies
8.7.1.1. Service Ingress QoS Meter
8.7.1.2. Service Ingress IP Match Criteria
8.7.1.3. Service Ingress MAC Match Criteria
8.7.2. Applying Service Ingress Policies
8.7.2.1. Epipe
8.7.2.2. VPLS
8.7.2.3. VPRN
8.7.2.4. IES
8.8. Service Management Tasks
8.8.1. Deleting QoS Policies
8.8.1.1. Remove a QoS Policy from Service SAPs
8.8.2. Copying and Overwriting QoS Policies
8.8.3. Remove a Policy from the QoS Configuration
8.8.4. Editing QoS Policies
8.9. Service Ingress QoS Policy Command Reference
8.9.1. Command Hierarchy
8.9.1.1. Service Ingress QoS Policy Commands
8.9.1.2. Table-based IP DSCP and Dot1p Classification Policy Commands for SAP Ingress (7210 SAS-Mxp)
8.9.1.3. Service Meter Commands for SAP Ingress (7210 SAS-Mxp only)
8.9.1.4. Operational Commands
8.9.1.5. Show Commands
8.9.2. Command Descriptions
8.9.2.1. Configuration Commands
8.9.2.1.1. Generic Commands
8.9.2.1.2. Service Ingress QoS Policy Commands
8.9.2.1.3. Service Ingress QoS Policy Entry Commands
8.9.2.1.4. Service Ingress QoS Policy Forwarding Class Commands
8.9.2.1.5. IP QoS Policy Match Commands
8.9.2.1.6. Service Ingress MAC QoS Policy Match Commands
8.9.2.1.7. Service Meter QoS Policy Commands
8.9.2.1.8. IP DSCP and Dot1p Classification Policy Commands (for 7210 SAS-Mxp only)
8.9.2.1.9. Service Meter Commands for SAP Ingress (for 7210 SAS-Mxp only)
8.9.2.2. Operational Commands
8.9.2.3. Show Commands
9. Access Egress QoS Policies on 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE
9.1. Overview
9.1.1. Basic Configurations
9.1.1.1. Modifying Access Egress QoS Queues
9.1.1.2. Applying Access Egress QoS Policies
9.1.1.2.1. Ethernet Ports
9.1.1.3. Default Access Egress QoS Policy Values
9.1.1.4. Deleting QoS Policies
9.1.1.5. Removing a Policy from the QoS Configuration
9.2. Access Egress QoS Policy Command Reference
9.2.1. Command Hierarchies
9.2.1.1. Configuration Commands for 7210 SAS-M (Access-uplink Mode)
9.2.1.2. Configuration Commands for7210 SAS-M (Network Mode)
9.2.1.3. Configuration Commands for 7210 SAS-T (Access-uplink Mode)
9.2.1.4. Configuration Commands for 7210 SAS-T,7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE (Network Mode)
9.2.1.5. Operational Commands
9.2.1.6. Show Commands
9.2.2. Configuration Commands
9.2.2.1. Generic Commands
9.2.2.2. Access Egress Queue QoS Policy Commands
9.2.2.3. Operational Commands
9.2.2.4. Show Commands
10. Access Egress QoS Policies for 7210 SAS-Mxp
10.1. Overview
10.1.1. Access Egress QoS Policy for SAP-based Queuing Mode on 7210 SAS-Mxp
10.1.2. Access Egress QoS Policy for Port-based Queuing Mode on 7210 SAS-Mxp
10.1.3. Access Egress QoS Policy Queue Override
10.1.4. Basic Configurations
10.1.4.1. Editing QoS Policies
10.1.4.2. Deleting QoS Policies
10.1.4.3. Removing a Policy from the QoS Configuration
10.2. Access Egress QoS Policy Command Reference
10.2.1. Command Hierarchies
10.2.1.1. Configuration Commands for 7210 SAS-Mxp
10.2.1.2. Show Commands
10.2.2. Command Descriptions
10.2.2.1. Generic Commands
10.2.2.2. Access Egress Queue QoS Policy Commands
10.2.2.3. Show Commands
11. Service Egress Policies for 7210 SAS-Mxp
11.1. Overview
11.1.1. Basic Configurations
11.1.2. Create a SAP Egress Policy
11.1.3. Editing QoS Policies
11.2. Service Egress Policy Command Reference
11.2.1. Command Hierarchies
11.2.1.1. Configuration Commands for 7210 SAS-Mxp
11.2.1.2. Operational Commands
11.2.1.3. Show Commands
11.2.2. Command Descriptions
11.2.2.1. Configuration Commands
11.2.2.1.1. Generic Commands
11.2.2.1.2. SAP Egress Queue QoS Policy Commands
11.2.2.2. Operational Commands
11.2.2.3. Show Commands
12. QoS Port Scheduler Policies for 7210 SAS-M and 7210 SAS-T
12.1. Overview
12.1.1. Configuring Port Scheduler Policies
12.1.2. Basic Configurations
12.1.2.1. Creating a QoS Port Scheduler Policy
12.2. Service Management Tasks
12.2.1. Copying and Overwriting Scheduler Policies
12.2.2. Editing QoS Policies
13. Schedulers on 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
13.1. Configuring Scheduler Policies
13.2. QoS Port Scheduler Policy Command Reference
13.2.1. Command Hierarchies
13.2.1.1. Port Scheduler Policy Configuration Commands
13.2.1.2. Operational Commands
13.2.1.3. Show Commands
13.2.2. Command Descriptions
13.2.2.1. Configuration Commands
13.2.2.1.1. Generic Commands
13.2.2.2. Port Scheduler Policy Commands
13.2.2.3. Operational Commands
13.2.2.4. Show Commands
14. Schedulers on 7210 SAS-Mxp
14.1. Overview
14.2. Scheduling with SAP-based Queues on Access Ports
14.3. Scheduling on Network Ports
14.4. Scheduling on Hybrid Port with SAP-based Egress Queues
14.4.1. Port-based Scheduling and Queuing on Access Ports
14.5. Scheduling on Hybrid Port with Port-based SAP Queues
15. Slope QoS Policies
15.1. Overview
15.1.1. Configuration Guidelines
15.1.1.1. For 7210 SAS-M Network Mode
15.1.1.2. For 7210 SAS-M Access-uplink Mode
15.1.1.3. WRED Slope Enhancement
15.1.2. WRED Support on 7210 SAS-T Access-uplink Mode
15.1.3. Basic Configurations
15.1.3.1. Create a Slope QoS Policy
15.1.3.2. Applying Slope Policies
15.1.3.2.1. Ports
15.1.4. Default Slope Policy Values
15.2. Service Management Tasks
15.2.1. Deleting QoS Policies
15.2.1.1. Ports
15.2.1.2. Remove a Policy from the QoS Configuration
15.2.2. Copying and Overwriting QoS Policies
15.2.3. Editing QoS Policies
15.3. Slope QoS Policy Command Reference
15.3.1. Command Hierarchies
15.3.1.1. Configuration Commands
15.3.1.2. WRED Commands
15.3.1.3. Operational Commands
15.3.1.4. Show Commands
15.3.2. Command Descriptions
15.3.2.1. Configuration Commands
15.3.2.1.1. Generic Commands
15.3.2.1.2. Slope Policy QoS Commands
15.3.2.1.3. Slope Policy QoS Policy Commands
15.3.2.1.4. RED Slope Commands
15.3.2.1.5. Slope Policy QoS Policy Commands
15.3.2.2. WRED Commands
15.3.2.3. Operational Commands
15.3.2.4. Show Commands
16. Queue Management Policies
16.1. Overview
16.1.1. Basic Configurations
16.1.2. Service Management Tasks
16.1.2.1. Creating a Queue Management Policy
16.1.2.2. Editing QoS Policies
16.2. Queue Management Policy Command Reference
16.2.1. Command Hierarchies
16.2.1.1. Configuration Commands for 7210 SAS-Mxp
16.2.1.2. Operational Commands
16.2.1.3. Show Commands
16.2.2. Command Descriptions
16.2.2.1. Configuration Commands
16.2.2.1.1. Generic Commands
16.2.2.1.2. Queue Management Policy QoS Commands
16.2.2.1.3. WRED Slope Commands
16.2.2.2. Operational Commands
16.2.2.3. Show Commands
17. Remark Policies
17.1. Overview
17.1.1. Configuration Guidelines
17.1.2. Basic Configurations
17.1.2.1. Creating a Remark Policy
17.1.2.2. Editing QoS Policies
17.2. Remark Policy Command Reference
17.2.1. Command Hierarchies
17.2.1.1. Configuration Commands for 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, 7210 SAS-Sx 10/100GE, and 7210 SAS-Mxp in Network Mode
17.2.1.2. Operational Commands
17.2.1.3. Show Commands
17.2.2. Command Descriptions
17.2.2.1. Configuration Commands
17.2.2.1.1. Generic Commands
17.2.2.1.2. Remark Policy QoS Commands
17.2.2.1.3. Remark Policy Forwarding Class Commands
17.2.2.2. Operational Commands
17.2.2.3. Show Commands
18. Access Ingress QoS Policies for 7210 SAS-Mxp
18.1. In This Chapter
18.2. Overview
18.2.1. Resource Allocation for Access Ingress QoS Policies
18.2.1.1. Use of Index File for Access Ingress QoS Policies
18.2.1.2. Calculating the Number of QoS Resources
18.2.1.3. Calculating the Number of Meters or Policers
18.2.1.4. Determining the Number of Resources Allocated to the Policy
18.2.1.5. Example of Access Ingress QoS Policy Resource Calculations
18.2.1.5.1. Example 1
18.2.1.5.2. Example 2
18.2.1.5.3. Example 3
18.2.2. Configuration Guidelines for Using a Port-based Access Ingress QoS Policy
18.2.3. Basic Configurations
18.2.3.1. Editing an Access Ingress QoS Policy Configuration
18.2.3.2. Removing a Policy from the QoS Configuration
18.2.3.3. Deleting Access Ingress QoS Policies
18.3. Access-Ingress QoS Policy Command Reference
18.3.1. Command Hierarchies
18.3.1.1. Access-Ingress QoS Configuration Commands
18.3.2. Command Descriptions
18.3.2.1. Generic Commands
18.3.2.2. Access Ingress QoS Policy Commands
19. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-R6, R12 Quality of Service Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-Series Services Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.2. Overview of QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
2.3. Network and Service QoS Policies
2.3.1. Network QoS Policies
2.3.1.1. Network QoS Policies of the “ip-interface” Type
2.3.1.2. Network QoS Policies of the “port” Type
2.3.2. Network Queue Policies in Network Mode
2.3.3. Service Ingress QoS Policies
2.3.3.1. Table-Based Classification
2.3.3.2. Hierarchical Ingress Policing
2.3.4. Service Egress QoS Policies
2.4. Access Ingress QoS Policies
2.5. Access Egress QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
2.5.1. Access Egress QoS Policies for SAP-Based Queuing Mode
2.5.2. Access Egress QoS Policy for Port-Based Queuing Mode
2.6. Remark Policies
2.6.1. Egress Port Rate Limiting
2.6.2. Forwarding Classes
2.6.2.1. FC-to-Queue ID Map
2.6.3. QoS Policy Entities
2.6.3.1. QoS Policy Entities for Hybrid Ports on 7210 SAS-R6 and 7210 SAS-R12
2.7. Meters/Policers
2.7.1. Meter/Policer Parameters
2.7.1.1. Meter ID
2.7.1.2. Committed Information Rate (Meters)
2.7.1.3. Peak Information Rate (Meters)
2.7.1.4. Adaptation Rule for Meters
2.7.1.5. Committed Burst Size (Meters/Policers)
2.7.1.6. Maximum Burst Size (Meters/Policers)
2.7.1.7. Meter Counters
2.7.1.8. Meter Modes
2.7.2. Color-Aware Policing
2.7.3. QoS Overrides for Meters/Policers
2.8. Queue Management
2.8.1. Queue Parameters
2.8.1.1. Queue ID
2.8.1.2. Committed Information Rate
2.8.1.3. Peak Information Rate
2.8.1.4. Adaptation Rule for Queues
2.8.1.5. Queue Priority and Weight
2.8.1.6. Committed Burst Size and Maximum Burst Size
2.8.2. Buffer Pools
2.8.3. Queue Management Policies
2.8.3.1. Operation and Configuration of WRED Slopes
2.8.3.1.1. Tuning the Shared Buffer Utilization Calculation
2.8.3.2. Queue Management Policy Parameters
2.9. Configuration Guidelines for QoS Overrides
2.9.1. Configuring Meter Override Parameters
2.9.2. Configuring Queue Override Parameters
2.9.3. Configuring Access Egress QoS Policy Queue Overrides on the 7210 SAS-R6 and 7210 SAS-R12
2.10. Schedulers on 7210 SAS-R6 and 7210 SAS-R12
2.11. Configuration Notes
3. DEI-Based Classification and Marking
3.1. DEI-Based Classification
3.2. DEI-Based Marking
3.3. Configuration Guidelines
4. Port-Level Egress Rate Limiting
4.1. Overview
4.1.1. Applications
4.1.2. Effect of Port-Level Rate Limiting on Queue Functionality
4.2. Basic Configurations
4.2.1. Modifying Port-Level Egress-Rate Command
4.2.2. Removing Port-Level Egress-Rate Command
4.2.2.1. Default Egress-Rate Values
4.3. Port-level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Command Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. SAP Egress Aggregate Meter
5.1. Overview
5.1.1. Configuration Notes
5.2. Basic Configurations
5.3. SAP Egress Aggregate Meter Command Reference
6. Frame-Based Accounting
6.1. Overview
6.1.1. Frame-Based Accounting
6.1.2. Effects of Enabling Ingress Frame-Based Accounting on Ingress Meter Functionality
6.1.3. Effects of Egress Frame-Based Accounting on Queue Functionality
6.1.4. Accounting and Statistics
6.2. Basic Configurations
6.2.1. Enabling and Disabling Frame-Based Accounting
6.2.1.1. Default Frame-Based Accounting Values
6.3. Frame-Based Accounting Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands
6.3.1.2. Show Commands
6.3.2. Command Descriptions
6.3.2.1. Configuration Commands
6.3.2.2. Show Commands
7. Network QoS Policies
7.1. Overview
7.2. Network QoS Policy in Network Mode
7.2.1. Network Qos Policy (ip-interface Type) Behavior for MPLS LSPs
7.2.2. DSCP Marking CPU Self-Generated Traffic
7.2.2.1. QoS for Self-Generated (CPU) Traffic on Network Interfaces
7.2.2.2. Default DSCP Mapping Table
7.3. Basic Configurations
7.3.1. Create a Network QoS Policy (ip-interface Type) for Network Mode
7.3.2. Configuring Network QoS Policy (port Type) for Network Mode
7.3.3. Default Network Policy Values Available in Network Mode
7.4. Resource Allocation for Network QoS Policy
7.4.1. Determining Number of Resources and Meters
7.4.1.1. Calculating the Number of QoS Resources
7.4.1.2. Determining the Number of Meters or Policers
7.4.2. Network QoS Policies Resource Usage Examples
7.4.2.1. Example 1
7.4.2.2. Example 2
7.4.2.3. Example 3
7.4.2.4. Example 4
7.4.2.5. Example 5
7.4.2.6. Example 6
7.4.2.7. Example 7
7.4.2.8. Example 8
7.5. Service Management Tasks
7.5.1. Deleting QoS Policies
7.5.2. Remove a Policy from the QoS Configuration
7.5.3. Copying and Overwriting Network Policies
7.5.4. Editing QoS Policies
7.6. Network QoS Policy Command Reference
7.6.1. Command Hierarchies
7.6.1.1. Configuration Commands
7.6.1.2. Self-Generated Traffic Commands
7.6.1.3. Operational Commands
7.6.1.4. Show Commands
7.6.2. Command Descriptions
7.6.2.1. Configuration Commands
7.6.2.1.1. Generic Commands
7.6.2.1.2. Network QoS Policy Commands
7.6.2.1.3. Network Ingress QoS Policy Commands
7.6.2.1.4. Network Egress QoS Policy Commands
7.6.2.2. Self-Generated Traffic Commands
7.6.2.3. Operational Commands
7.6.2.4. Show Commands
8. Network Queue QoS Policies
8.1. Overview
8.1.1. Network Queue Scheduler
8.2. Basic Configurations
8.2.1. Creating a Network Queue QoS Policy
8.2.2. Applying Network Queue Policies
8.2.2.1. Ethernet Ports
8.3. Default Network Queue Policy Values for Network Ports
8.4. Default Network Queue Policy Values for Hybrid Ports
8.5. Service Management Tasks
8.5.1. Deleting QoS Policies
8.5.2. Copying and Overwriting QoS Policies
8.5.3. Editing QoS Policies
8.6. Network Queue QoS Policy Command Reference
8.6.1. Command Hierarchies
8.6.1.1. Configuration Commands
8.6.1.2. Operational Commands
8.6.1.3. Show Commands
8.6.2. Command Descriptions
8.6.2.1. Configuration Commands
8.6.2.1.1. Generic Commands
8.6.2.1.2. Network Queue QoS Policy Commands
8.6.2.2. Operational Commands
8.6.2.3. Show Commands
9. Service Ingress QoS Policies
9.1. Overview
9.1.1. Default SAP-ingress policy
9.1.2. SAP-ingress policy Defaults
9.2. Use of Index File by SAP QoS Ingress Policy
9.2.1. Use of the Keyword “multipoint” for Default Meter 11
9.2.1.1. Example Uses of the Multipoint Meter
9.3. Service Ingress Meter Selection Rules
9.3.1. Default Policy
9.3.2. VPLS Service without Meter 11
9.3.3. VPLS Service with Meter 11
9.3.4. Epipe, IES, and VPRN Services without PIM
9.3.5. IES and VPRN Services with PIM/Multicast and without Meter 11
9.3.6. IES and VPRN Services with PIM/Multicast and Meter 11
9.4. Service Ingress Policy Configuration Considerations
9.5. Resource Allocation for Service Ingress QoS Policies
9.5.1. Resource Configuration Guidelines for Service Ingress QoS Policies Using CAM-based Classification
9.5.2. Computation of Resources Used per SAP-ingress Policy for CAM-based Classification
9.5.2.1. Determining the Number of Classification Entries
9.5.2.1.1. Rules for a SAP in a VPLS
9.5.2.1.2. Rules for a SAP in a VLL, VPRN, or IES Service with PIM Disabled
9.5.2.1.3. Rules for a SAP in an IES or VPRN Service with PIM/multicast Enabled
9.5.2.1.4. Calculating the Number of Classification Entries per FC
9.5.2.1.5. Determining the Number of Classification Entries per Policy (TC)
9.5.2.1.6. Determining the Number of Policers/Meters per Policy (TP)
9.6. Table-based Classification Using Dot1P and IP DSCP for Assigning FC and Profile on SAP Ingress
9.6.1. IP DSCP and Dot1p Classification Policy Support
9.6.1.1. Default-FC Assignment Rules for SAPs in Layer 3 Services (Including RVPLS Services)
9.6.2. Precedence Rules for DEI Assignments
9.6.3. Creating an IP DSCP Classification Policy
9.6.4. CAM Resource Usage for IP DSCP Classification Policies
9.6.4.1. CAM Resource Allocation
9.6.5. Associating a DSCP Classification Policy
9.6.5.1. Associating a Classification Policy with a SAP-Ingress QoS Policy
9.6.5.2. Associating a Classification Policy with an Ethernet Port
9.6.6. Assigning and Enabling DSCP Classification Policies to a SAP
9.6.6.1. Assigning and Enabling Policies to Epipe and VPLS SAPs
9.6.6.2. Assigning and Enabling Policies to IES and VPRN Interface SAPs
9.6.6.3. Assigning Policies to RVPLS SAPs
9.6.6.3.1. Create a SAP-ingress policy and Assign the Policy to an RVPLS SAP
9.6.6.3.2. Table-based Classification per IP Interface for Routed Packets
9.6.6.3.3. Table-based Classification per Port for Bridged Packets
9.7. Calculating Resources Required for Classification
9.7.1. Examples: Calculating Resources Required for CAM-based Classification
9.7.1.1. Example 1
9.7.1.2. Example 1a (Default Multipoint Meter 11 is Not Used)
9.7.1.3. Example 2
9.7.1.4. Example 2a (Default Multipoint Meter 11 is Not Used)
9.7.1.5. Example 3
9.7.1.6. Example 3a (Default Multipoint Meter 11 is Not Used)
9.7.1.7. Example 4
9.7.1.8. Example 4a (Default Multipoint Meter 11 is Not Used)
9.7.1.9. Example 5
9.7.1.10. Example 6
9.7.1.11. Example 7
9.7.1.12. Example 8
9.7.1.13. Example 9
9.7.1.14. Example 9a (Default Multipoint Meter 11 is Not Used)
9.7.1.15. Example 10
9.7.1.16. Example 11
9.7.2. Examples: Calculating Resources Required for IP DSCP Table-based Classification
9.7.2.1. Example 1: Epipe, IES, and VPRN Services Using Unicast Traffic Type
9.7.2.2. Example 2: VPLS Using Unicast and BUM Meter with IES or VPRN Using Multicast
9.7.2.3. Example 3: VPLS Service Using Unicast, Broadcast, Multicast, and Unknown-unicast with Additional FCs
9.7.2.4. Example 4: Routed VPLS on Access Port Using Unicast, Broadcast, Multicast, and Unknown-unicast with Additional FCs
9.7.2.5. Example 5: Routed VPLS Service on a Hybrid Port Using Unicast, Broadcast, Multicast and Unknown-unicast for Some FCs
9.7.2.6. Example 6: Routed VPLS on Access Port and Hybrid Port
9.8. Basic Configurations
9.8.1. Creating Service Ingress QoS Policies
9.8.1.1. Service Ingress QoS Meter
9.8.1.2. Service Ingress IP Match Criteria
9.8.1.3. Service Ingress MAC Match Criteria
9.8.2. Applying Service Ingress Policies
9.8.2.1. Epipe
9.8.2.2. VPLS
9.8.2.3. VPRN
9.8.2.4. IES
9.9. Service Management Tasks
9.9.1. Deleting QoS Policies
9.9.1.1. Removing a QoS Policy from Service SAPs
9.9.2. Copying and Overwriting QoS Policies
9.9.3. Removing a Policy from the QoS Configuration
9.9.4. Editing QoS Policies
9.10. Service SAP QoS Policy Command Reference
9.10.1. Command Hierarchies
9.10.1.1. Service Ingress QoS Policy Commands
9.10.1.2. Table-based IP DSCP and Dot1p Classification Policy Commands for SAP Ingress and Access Port Ingress
9.10.1.3. Operational Commands
9.10.1.4. Show Commands
9.10.2. Command Descriptions
9.10.2.1. Configuration Commands
9.10.2.1.1. Generic Commands
9.10.2.1.2. Service Ingress QoS Policy Commands
9.10.2.1.3. Service Ingress QoS Policy Entry Commands
9.10.2.1.4. Service Ingress QoS Policy Forwarding Class Commands
9.10.2.1.5. IP QoS Policy Match Commands
9.10.2.1.6. Service Ingress MAC QoS Policy Match Commands
9.10.2.1.7. Service Meter QoS Policy Commands
9.10.2.1.8. IP DSCP Classification Policy Commands
9.10.2.2. Operational Commands
9.10.2.3. Show Commands
10. Access Ingress QoS Policies
10.1. Overview
10.1.1. Resource Allocation for Access Ingress QoS Policies
10.1.1.1. Use of Index File for Access Ingress QoS Policies
10.1.1.2. Calculating the Number of QoS Resources
10.1.1.3. Calculating the Number of Meters or Policers
10.1.1.4. Determining the Number of Resources Allocated to the Policy
10.1.1.5. Examples of Access Ingress QoS Policy Resource Calculations
10.1.1.5.1. Example 1
10.1.1.5.2. Example 2
10.1.1.5.3. Example 3
10.1.2. Configuration Guidelines for Using a Port-based Access Ingress QoS Policy
10.1.3. Basic Configurations
10.1.3.1. Editing an Access Ingress QoS Policy Configuration
10.1.3.2. Removing a Policy from the QoS Configuration
10.1.3.3. Deleting Access Ingress QoS Policies
10.2. Access Ingress QoS Policy Command Reference
10.2.1. Command Hierarchies
10.2.1.1. Access-Ingress QoS Configuration Commands
10.2.2. Command Descriptions
10.2.2.1. Generic Commands
10.2.2.2. Access Ingress QoS Policy Commands
11. Access Egress QoS Policies
11.1. Overview
11.1.1. Access Egress QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
11.1.2. Access Egress QoS Policies for SAP-based Queuing Mode on 7210 SAS-R6 and 7210 SAS-R12
11.1.3. Access Egress QoS Policies for Port-based Queuing Mode on 7210 SAS-R6 and 7210 SAS-R12
11.1.4. Access Egress QoS Policy Queue Override
11.2. Basic Configurations
11.2.1. Modifying Access Egress QoS Queues
11.2.2. Applying Access Egress QoS Policies
11.2.2.1. Ethernet Ports
11.2.3. Editing QoS Policies
11.2.4. Deleting QoS Policies
11.2.5. Removing a Policy from the QoS Configuration
11.3. Access Egress QoS Policy Command Reference
11.3.1. Command Hierarchies
11.3.1.1. Configuration Commands
11.3.1.2. Show Commands
11.3.2. Command Descriptions
11.3.2.1. Configuration Commands
11.3.2.1.1. Generic Commands
11.3.2.1.2. Access Egress QoS Policy Commands
11.3.2.1.3. Access Egress Queue QoS Policy Commands
11.3.2.2. Show Commands
12. Service Egress Policies
12.1. Overview
12.1.1. Basic Configurations
12.1.2. Creating a SAP Egress Policy
12.1.3. Editing QoS Policies
12.2. Service Egress Policy Command Reference
12.2.1. Command Hierarchies
12.2.1.1. Configuration Commands
12.2.1.2. Copy Commands
12.2.1.3. Show Commands
12.2.2. Command Descriptions
12.2.2.1. Configuration Commands
12.2.2.1.1. Generic Commands
12.2.2.1.2. SAP Egress Policy Commands
12.2.2.2. Operational Commands
12.2.2.3. Show Commands
13. Schedulers
13.1. Scheduling with SAP-based Queues on Access Ports
13.2. Scheduling on Network Ports
13.3. Scheduling on Hybrid Port with SAP-based Egress Queues
13.3.1. Port-based Scheduling and Queuing on Access Ports
13.4. Scheduling on Hybrid Port with Port-based SAP Queues
14. Queue Management Policies
14.1. Overview
14.2. Basic Configurations
14.2.1. Creating a Queue Management Policy
14.2.2. Editing QoS Policies
14.3. Queue Management Policy Command Reference
14.3.1. Command Hierarchies
14.3.1.1. Configuration Commands
14.3.1.2. Operational Commands
14.3.1.3. Show Commands
14.3.2. Command Descriptions
14.3.2.1. Configuration Commands
14.3.2.1.1. Generic Commands
14.3.2.1.2. Queue Management Policy QoS Commands
14.3.2.1.3. WRED Slope Commands
14.3.2.2. Operational Commands
14.3.2.3. Show Commands
15. Remark Policies
15.1. Overview
15.1.1. Configuration Guidelines
15.2. Basic Configurations
15.2.1. Creating a Remark Policy
15.2.2. Editing QoS Policies
15.3. Remark Policy Command Reference
15.3.1. Command Hierarchies
15.3.1.1. Configuration Commands
15.3.1.2. Operational Commands
15.3.1.3. Show Commands
15.3.2. Command Descriptions
15.3.2.1. Configuration Commands
15.3.2.1.1. Generic Commands
15.3.2.1.2. Remark Policy QoS Commands
15.3.2.1.3. Remark Policy Forwarding Class Commands
15.3.2.2. Operational Commands
15.3.2.3. Show Commands
16. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. Nokia 7210 SAS-Series Services Configuration Process
2. QoS Policies
2.1. QoS Policies Overview
2.2. Overview of QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
2.3. Network and Service QoS Policies
2.3.1. Network QoS Policies
2.3.1.1. Network QoS Policies of the “ip-interface” Type
2.3.1.2. Network QoS Policies of the “port” Type
2.3.2. Network Queue Policies in Network Mode
2.3.3. Service Ingress QoS Policies
2.3.3.1. Table-Based Classification
2.3.3.2. Hierarchical Ingress Policing
2.3.4. Service Egress QoS Policies
2.4. Access Ingress QoS Policies
2.5. Access Egress QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
2.5.1. Access Egress QoS Policies for SAP-Based Queuing Mode
2.5.2. Access Egress QoS Policy for Port-Based Queuing Mode
2.6. Remark Policies
2.6.1. Egress Port Rate Limiting
2.6.2. Forwarding Classes
2.6.2.1. FC-to-Queue ID Map
2.6.3. QoS Policy Entities
2.6.3.1. QoS Policy Entities for Hybrid Ports on 7210 SAS-R6 and 7210 SAS-R12
2.7. Meters/Policers
2.7.1. Meter/Policer Parameters
2.7.1.1. Meter ID
2.7.1.2. Committed Information Rate (Meters)
2.7.1.3. Peak Information Rate (Meters)
2.7.1.4. Adaptation Rule for Meters
2.7.1.5. Committed Burst Size (Meters/Policers)
2.7.1.6. Maximum Burst Size (Meters/Policers)
2.7.1.7. Meter Counters
2.7.1.8. Meter Modes
2.7.2. Color-Aware Policing
2.7.3. QoS Overrides for Meters/Policers
2.8. Queue Management
2.8.1. Queue Parameters
2.8.1.1. Queue ID
2.8.1.2. Committed Information Rate
2.8.1.3. Peak Information Rate
2.8.1.4. Adaptation Rule for Queues
2.8.1.5. Queue Priority and Weight
2.8.1.6. Committed Burst Size and Maximum Burst Size
2.8.2. Buffer Pools
2.8.3. Queue Management Policies
2.8.3.1. Operation and Configuration of WRED Slopes
2.8.3.1.1. Tuning the Shared Buffer Utilization Calculation
2.8.3.2. Queue Management Policy Parameters
2.9. Configuration Guidelines for QoS Overrides
2.9.1. Configuring Meter Override Parameters
2.9.2. Configuring Queue Override Parameters
2.9.3. Configuring Access Egress QoS Policy Queue Overrides on the 7210 SAS-R6 and 7210 SAS-R12
2.10. Schedulers on 7210 SAS-R6 and 7210 SAS-R12
2.11. Configuration Notes
3. DEI-Based Classification and Marking
3.1. DEI-Based Classification
3.2. DEI-Based Marking
3.3. Configuration Guidelines
4. Port-Level Egress Rate Limiting
4.1. Overview
4.1.1. Applications
4.1.2. Effect of Port-Level Rate Limiting on Queue Functionality
4.2. Basic Configurations
4.2.1. Modifying Port-Level Egress-Rate Command
4.2.2. Removing Port-Level Egress-Rate Command
4.2.2.1. Default Egress-Rate Values
4.3. Port-level Egress-Rate Command Reference
4.3.1. Command Hierarchies
4.3.1.1. Configuration Commands
4.3.1.2. Show Commands
4.3.2. Command Descriptions
4.3.2.1. Configuration Commands
4.3.2.2. Show Commands
5. SAP Egress Aggregate Meter
5.1. Overview
5.1.1. Configuration Notes
5.2. Basic Configurations
5.3. SAP Egress Aggregate Meter Command Reference
6. Frame-Based Accounting
6.1. Overview
6.1.1. Frame-Based Accounting
6.1.2. Effects of Enabling Ingress Frame-Based Accounting on Ingress Meter Functionality
6.1.3. Effects of Egress Frame-Based Accounting on Queue Functionality
6.1.4. Accounting and Statistics
6.2. Basic Configurations
6.2.1. Enabling and Disabling Frame-Based Accounting
6.2.1.1. Default Frame-Based Accounting Values
6.3. Frame-Based Accounting Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands
6.3.1.2. Show Commands
6.3.2. Command Descriptions
6.3.2.1. Configuration Commands
6.3.2.2. Show Commands
7. Network QoS Policies
7.1. Overview
7.2. Network QoS Policy in Network Mode
7.2.1. Network Qos Policy (ip-interface Type) Behavior for MPLS LSPs
7.2.2. DSCP Marking CPU Self-Generated Traffic
7.2.2.1. QoS for Self-Generated (CPU) Traffic on Network Interfaces
7.2.2.2. Default DSCP Mapping Table
7.3. Basic Configurations
7.3.1. Create a Network QoS Policy (ip-interface Type) for Network Mode
7.3.2. Configuring Network QoS Policy (port Type) for Network Mode
7.3.3. Default Network Policy Values Available in Network Mode
7.4. Resource Allocation for Network QoS Policy
7.4.1. Determining Number of Resources and Meters
7.4.1.1. Calculating the Number of QoS Resources
7.4.1.2. Determining the Number of Meters or Policers
7.4.2. Network QoS Policies Resource Usage Examples
7.4.2.1. Example 1
7.4.2.2. Example 2
7.4.2.3. Example 3
7.4.2.4. Example 4
7.4.2.5. Example 5
7.4.2.6. Example 6
7.4.2.7. Example 7
7.4.2.8. Example 8
7.5. Service Management Tasks
7.5.1. Deleting QoS Policies
7.5.2. Remove a Policy from the QoS Configuration
7.5.3. Copying and Overwriting Network Policies
7.5.4. Editing QoS Policies
7.6. Network QoS Policy Command Reference
7.6.1. Command Hierarchies
7.6.1.1. Configuration Commands
7.6.1.2. Self-Generated Traffic Commands
7.6.1.3. Operational Commands
7.6.1.4. Show Commands
7.6.2. Command Descriptions
7.6.2.1. Configuration Commands
7.6.2.1.1. Generic Commands
7.6.2.1.2. Network QoS Policy Commands
7.6.2.1.3. Network Ingress QoS Policy Commands
7.6.2.1.4. Network Egress QoS Policy Commands
7.6.2.2. Self-Generated Traffic Commands
7.6.2.3. Operational Commands
7.6.2.4. Show Commands
8. Network Queue QoS Policies
8.1. Overview
8.1.1. Network Queue Scheduler
8.2. Basic Configurations
8.2.1. Creating a Network Queue QoS Policy
8.2.2. Applying Network Queue Policies
8.2.2.1. Ethernet Ports
8.3. Default Network Queue Policy Values for Network Ports
8.4. Default Network Queue Policy Values for Hybrid Ports
8.5. Service Management Tasks
8.5.1. Deleting QoS Policies
8.5.2. Copying and Overwriting QoS Policies
8.5.3. Editing QoS Policies
8.6. Network Queue QoS Policy Command Reference
8.6.1. Command Hierarchies
8.6.1.1. Configuration Commands
8.6.1.2. Operational Commands
8.6.1.3. Show Commands
8.6.2. Command Descriptions
8.6.2.1. Configuration Commands
8.6.2.1.1. Generic Commands
8.6.2.1.2. Network Queue QoS Policy Commands
8.6.2.2. Operational Commands
8.6.2.3. Show Commands
9. Service Ingress QoS Policies
9.1. Overview
9.1.1. Default SAP-ingress policy
9.1.2. SAP-ingress policy Defaults
9.2. Use of Index File by SAP QoS Ingress Policy
9.2.1. Use of the Keyword “multipoint” for Default Meter 11
9.2.1.1. Example Uses of the Multipoint Meter
9.3. Service Ingress Meter Selection Rules
9.3.1. Default Policy
9.3.2. VPLS Service without Meter 11
9.3.3. VPLS Service with Meter 11
9.3.4. Epipe, IES, and VPRN Services without PIM
9.3.5. IES and VPRN Services with PIM/Multicast and without Meter 11
9.3.6. IES and VPRN Services with PIM/Multicast and Meter 11
9.4. Service Ingress Policy Configuration Considerations
9.5. Resource Allocation for Service Ingress QoS Policies
9.5.1. Resource Configuration Guidelines for Service Ingress QoS Policies Using CAM-based Classification
9.5.2. Computation of Resources Used per SAP-ingress Policy for CAM-based Classification
9.5.2.1. Determining the Number of Classification Entries
9.5.2.1.1. Rules for a SAP in a VPLS
9.5.2.1.2. Rules for a SAP in a VLL, VPRN, or IES Service with PIM Disabled
9.5.2.1.3. Rules for a SAP in an IES or VPRN Service with PIM/multicast Enabled
9.5.2.1.4. Calculating the Number of Classification Entries per FC
9.5.2.1.5. Determining the Number of Classification Entries per Policy (TC)
9.5.2.1.6. Determining the Number of Policers/Meters per Policy (TP)
9.6. Table-based Classification Using Dot1P and IP DSCP for Assigning FC and Profile on SAP Ingress
9.6.1. IP DSCP and Dot1p Classification Policy Support
9.6.1.1. Default-FC Assignment Rules for SAPs in Layer 3 Services (Including RVPLS Services)
9.6.2. Precedence Rules for DEI Assignments
9.6.3. Creating an IP DSCP Classification Policy
9.6.4. CAM Resource Usage for IP DSCP Classification Policies
9.6.4.1. CAM Resource Allocation
9.6.5. Associating a DSCP Classification Policy
9.6.5.1. Associating a Classification Policy with a SAP-Ingress QoS Policy
9.6.5.2. Associating a Classification Policy with an Ethernet Port
9.6.6. Assigning and Enabling DSCP Classification Policies to a SAP
9.6.6.1. Assigning and Enabling Policies to Epipe and VPLS SAPs
9.6.6.2. Assigning and Enabling Policies to IES and VPRN Interface SAPs
9.6.6.3. Assigning Policies to RVPLS SAPs
9.6.6.3.1. Create a SAP-ingress policy and Assign the Policy to an RVPLS SAP
9.6.6.3.2. Table-based Classification per IP Interface for Routed Packets
9.6.6.3.3. Table-based Classification per Port for Bridged Packets
9.7. Calculating Resources Required for Classification
9.7.1. Examples: Calculating Resources Required for CAM-based Classification
9.7.1.1. Example 1
9.7.1.2. Example 1a (Default Multipoint Meter 11 is Not Used)
9.7.1.3. Example 2
9.7.1.4. Example 2a (Default Multipoint Meter 11 is Not Used)
9.7.1.5. Example 3
9.7.1.6. Example 3a (Default Multipoint Meter 11 is Not Used)
9.7.1.7. Example 4
9.7.1.8. Example 4a (Default Multipoint Meter 11 is Not Used)
9.7.1.9. Example 5
9.7.1.10. Example 6
9.7.1.11. Example 7
9.7.1.12. Example 8
9.7.1.13. Example 9
9.7.1.14. Example 9a (Default Multipoint Meter 11 is Not Used)
9.7.1.15. Example 10
9.7.1.16. Example 11
9.7.2. Examples: Calculating Resources Required for IP DSCP Table-based Classification
9.7.2.1. Example 1: Epipe, IES, and VPRN Services Using Unicast Traffic Type
9.7.2.2. Example 2: VPLS Using Unicast and BUM Meter with IES or VPRN Using Multicast
9.7.2.3. Example 3: VPLS Service Using Unicast, Broadcast, Multicast, and Unknown-unicast with Additional FCs
9.7.2.4. Example 4: Routed VPLS on Access Port Using Unicast, Broadcast, Multicast, and Unknown-unicast with Additional FCs
9.7.2.5. Example 5: Routed VPLS Service on a Hybrid Port Using Unicast, Broadcast, Multicast and Unknown-unicast for Some FCs
9.7.2.6. Example 6: Routed VPLS on Access Port and Hybrid Port
9.8. Basic Configurations
9.8.1. Creating Service Ingress QoS Policies
9.8.1.1. Service Ingress QoS Meter
9.8.1.2. Service Ingress IP Match Criteria
9.8.1.3. Service Ingress MAC Match Criteria
9.8.2. Applying Service Ingress Policies
9.8.2.1. Epipe
9.8.2.2. VPLS
9.8.2.3. VPRN
9.8.2.4. IES
9.9. Service Management Tasks
9.9.1. Deleting QoS Policies
9.9.1.1. Removing a QoS Policy from Service SAPs
9.9.2. Copying and Overwriting QoS Policies
9.9.3. Removing a Policy from the QoS Configuration
9.9.4. Editing QoS Policies
9.10. Service SAP QoS Policy Command Reference
9.10.1. Command Hierarchies
9.10.1.1. Service Ingress QoS Policy Commands
9.10.1.2. Table-based IP DSCP and Dot1p Classification Policy Commands for SAP Ingress and Access Port Ingress
9.10.1.3. Operational Commands
9.10.1.4. Show Commands
9.10.2. Command Descriptions
9.10.2.1. Configuration Commands
9.10.2.1.1. Generic Commands
9.10.2.1.2. Service Ingress QoS Policy Commands
9.10.2.1.3. Service Ingress QoS Policy Entry Commands
9.10.2.1.4. Service Ingress QoS Policy Forwarding Class Commands
9.10.2.1.5. IP QoS Policy Match Commands
9.10.2.1.6. Service Ingress MAC QoS Policy Match Commands
9.10.2.1.7. Service Meter QoS Policy Commands
9.10.2.1.8. IP DSCP Classification Policy Commands
9.10.2.2. Operational Commands
9.10.2.3. Show Commands
10. Access Ingress QoS Policies
10.1. Overview
10.1.1. Resource Allocation for Access Ingress QoS Policies
10.1.1.1. Use of Index File for Access Ingress QoS Policies
10.1.1.2. Calculating the Number of QoS Resources
10.1.1.3. Calculating the Number of Meters or Policers
10.1.1.4. Determining the Number of Resources Allocated to the Policy
10.1.1.5. Examples of Access Ingress QoS Policy Resource Calculations
10.1.1.5.1. Example 1
10.1.1.5.2. Example 2
10.1.1.5.3. Example 3
10.1.2. Configuration Guidelines for Using a Port-based Access Ingress QoS Policy
10.1.3. Basic Configurations
10.1.3.1. Editing an Access Ingress QoS Policy Configuration
10.1.3.2. Removing a Policy from the QoS Configuration
10.1.3.3. Deleting Access Ingress QoS Policies
10.2. Access Ingress QoS Policy Command Reference
10.2.1. Command Hierarchies
10.2.1.1. Access-Ingress QoS Configuration Commands
10.2.2. Command Descriptions
10.2.2.1. Generic Commands
10.2.2.2. Access Ingress QoS Policy Commands
11. Access Egress QoS Policies
11.1. Overview
11.1.1. Access Egress QoS Policies on 7210 SAS-R6 and 7210 SAS-R12
11.1.2. Access Egress QoS Policies for SAP-based Queuing Mode on 7210 SAS-R6 and 7210 SAS-R12
11.1.3. Access Egress QoS Policies for Port-based Queuing Mode on 7210 SAS-R6 and 7210 SAS-R12
11.1.4. Access Egress QoS Policy Queue Override
11.2. Basic Configurations
11.2.1. Modifying Access Egress QoS Queues
11.2.2. Applying Access Egress QoS Policies
11.2.2.1. Ethernet Ports
11.2.3. Editing QoS Policies
11.2.4. Deleting QoS Policies
11.2.5. Removing a Policy from the QoS Configuration
11.3. Access Egress QoS Policy Command Reference
11.3.1. Command Hierarchies
11.3.1.1. Configuration Commands
11.3.1.2. Show Commands
11.3.2. Command Descriptions
11.3.2.1. Configuration Commands
11.3.2.1.1. Generic Commands
11.3.2.1.2. Access Egress QoS Policy Commands
11.3.2.1.3. Access Egress Queue QoS Policy Commands
11.3.2.2. Show Commands
12. Service Egress Policies
12.1. Overview
12.1.1. Basic Configurations
12.1.2. Creating a SAP Egress Policy
12.1.3. Editing QoS Policies
12.2. Service Egress Policy Command Reference
12.2.1. Command Hierarchies
12.2.1.1. Configuration Commands
12.2.1.2. Copy Commands
12.2.1.3. Show Commands
12.2.2. Command Descriptions
12.2.2.1. Configuration Commands
12.2.2.1.1. Generic Commands
12.2.2.1.2. SAP Egress Policy Commands
12.2.2.2. Operational Commands
12.2.2.3. Show Commands
13. Schedulers
13.1. Scheduling with SAP-based Queues on Access Ports
13.2. Scheduling on Network Ports
13.3. Scheduling on Hybrid Port with SAP-based Egress Queues
13.3.1. Port-based Scheduling and Queuing on Access Ports
13.4. Scheduling on Hybrid Port with Port-based SAP Queues
14. Queue Management Policies
14.1. Overview
14.2. Basic Configurations
14.2.1. Creating a Queue Management Policy
14.2.2. Editing QoS Policies
14.3. Queue Management Policy Command Reference
14.3.1. Command Hierarchies
14.3.1.1. Configuration Commands
14.3.1.2. Operational Commands
14.3.1.3. Show Commands
14.3.2. Command Descriptions
14.3.2.1. Configuration Commands
14.3.2.1.1. Generic Commands
14.3.2.1.2. Queue Management Policy QoS Commands
14.3.2.1.3. WRED Slope Commands
14.3.2.2. Operational Commands
14.3.2.3. Show Commands
15. Remark Policies
15.1. Overview
15.1.1. Configuration Guidelines
15.2. Basic Configurations
15.2.1. Creating a Remark Policy
15.2.2. Editing QoS Policies
15.3. Remark Policy Command Reference
15.3.1. Command Hierarchies
15.3.1.1. Configuration Commands
15.3.1.2. Operational Commands
15.3.1.3. Show Commands
15.3.2. Command Descriptions
15.3.2.1. Configuration Commands
15.3.2.1.1. Generic Commands
15.3.2.1.2. Remark Policy QoS Commands
15.3.2.1.3. Remark Policy Forwarding Class Commands
15.3.2.2. Operational Commands
15.3.2.3. Show Commands
16. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Router Configuration Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS-Series Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.2. System Interface on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.1.3. System Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.4. Unicast Reverse Path Forwarding Check on 7210 SAS-K 3SFP+ 8C
2.1.5. Unnumbered Interfaces
2.1.6. Router ID
2.1.7. Autonomous Systems (AS)
2.1.8. Proxy ARP
2.1.9. Internet Protocol Versions
2.1.9.1. IPv6 Applications for 7210 SAS-D and 7210 SAS-Dxp
2.1.9.2. IPv6 Applications for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.9.3. IPv6 Provider Edge Router over MPLS (6PE)
2.1.9.3.1. 6PE Control Plane Support
2.1.9.3.2. 6PE Data Plane Support
2.1.9.4. DNS
2.1.10. Bidirectional Forwarding Detection for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.10.1. BFD Control Packet
2.1.10.2. Control Packet Format
2.1.10.3. BFD Echo Support
2.1.10.4. BFD Support on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Platforms
2.1.11. DHCP
2.1.11.1. DHCP Principles
2.1.12. DHCP Relay
2.1.13. DHCP Relay Agent Options
2.1.13.1. Option 82
2.1.13.2. Local DHCP Server on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.13.3. DHCP Server Options
2.1.13.4. Trusted and Untrusted
2.1.13.5. DHCP Snooping
2.1.14. IGP-LDP and Static Route-LDP Synchronization on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.2. Process Overview on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.3. Process Overview of 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.4. Configuration Notes
2.4.1. Configuration Guidelines for DHCP Relay and Snooping
2.5. Configuring an IP Router with CLI
2.5.1. Router Configuration Overview of 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.5.1.1. System Interface on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.5.2. Router Configuration Overview on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5.2.1. System Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5.2.2. Network Interface
2.5.3. Basic Configuration
2.5.4. Common Configuration Tasks
2.5.4.1. Configuring a System Name
2.5.4.2. Configuring Interfaces
2.5.4.2.1. Configuring a System Interface
2.5.4.2.2. Configure a Network Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5.4.2.3. Configuring IPv6 Parameters on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.5.4.3. Configuring an Unnumbered Interface
2.5.4.4. Router Advertisement on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.5.4.5. Configuring Proxy ARP
2.5.4.6. ECMP Considerations
2.5.4.6.1. Configuration Notes
2.5.4.7. Deriving the Router ID
2.5.4.8. Configuring an Autonomous System
2.5.4.9. Configuring Option 82 Handling
2.5.4.10. Configuring a Local DHCP Server
2.5.5. Service Management Tasks
2.5.5.1. Changing the System Name
2.5.5.2. Modifying Interface Parameters
2.5.5.3. Deleting a Logical IP Interface
2.6. IP Router Command Reference
2.6.1. Command Hierarchies
2.6.1.1. Configuration Commands
2.6.1.1.1. Router Commands for 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.6.1.1.2. Router Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.1.3. Router Interface Commands for 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.6.1.1.4. Router Interface Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.1.5. Router DHCP Local User Database Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.1.6. Router Interface IPv6 Commands (supported only on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C)
2.6.1.1.7. IPv6 Router Advertisement Commands (supported only on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C)
2.6.1.2. Show Commands
2.6.1.2.1. Router Show Commands
2.6.1.2.2. DHCP Show Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.3. Clear Commands
2.6.1.3.1. Router Clear Commands
2.6.1.3.2. DHCP Clear Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.4. Debug Commands
2.6.2. Command Descriptions
2.6.2.1. Configuration Commands
2.6.2.1.1. Generic Commands
2.6.2.1.2. Router Global Commands
2.6.2.1.3. Router DHCP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.2.1.4. Route Next-hop Policy Commands
2.6.2.1.5. Router Interface Commands
2.6.2.1.6. Router Interface Filter Commands
2.6.2.1.7. Router Interface ICMP Commands
2.6.2.1.8. Interface Attribute Commands
2.6.2.1.9. Router Interface IPv6 Commands
2.6.2.1.10. IPv6 Router Advertisement Commands
2.6.2.2. Show Commands
2.6.2.3. Clear Commands
2.6.2.4. Debug Commands
3. Filter Policies
3.1. Filter Policy Configuration Overview
3.1.1. Service-Based Filtering
3.1.2. Filter Policy Entities
3.1.2.1. Applying Filter Policies
3.1.2.2. ACL on Range SAPs
3.2. Creating and Applying Filter Policies
3.2.1. Packet Matching Criteria
3.2.1.1. DSCP Values
3.2.2. Ordering Filter Entries
3.2.3. Applying Filters
3.2.3.1. Applying a Filter to a SAP
3.2.3.2. Applying a Filter to an IES Interface
3.2.3.3. Applying a Filter to a Network IP Interface
3.3. Configuration Notes
3.3.1. MAC Filters
3.3.2. IP Filters
3.3.3. IPv6 Filters
3.3.3.1. Resource Usage for Ingress Filter Policies for 7210 SAS-D and 7210 SAS-Dxp
3.3.3.2. Resource Usage for Egress Filter Policies (supported only for 7210 SAS-D and 7210 SAS-Dxp)
3.3.4. Ingress Filter Policy Resource Usage: 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.4. Configuring Filter Policies with CLI
3.5. Basic Configuration
3.6. Common Configuration Tasks
3.6.1. Allocating Resources for Filter Policies (Ingress and Egress)
3.6.2. Creating an IP Filter Policy
3.6.2.1. IP Filter Policy
3.6.2.2. IP Filter Entry
3.6.2.3. IP Entry Matching Criteria
3.6.3. Creating an IPv6 Filter Policy (applicable only for 7210 SAS-D and 7210 SAS-Dxp)
3.6.3.1. IPv6 Filter Entry
3.6.4. Creating a MAC Filter Policy
3.6.4.1. MAC Filter Policy
3.6.4.2. MAC Filter Entry
3.6.4.3. MAC Entry Matching Criteria
3.6.4.4. Apply IP and MAC Filter Policies
3.6.4.5. Apply Filter Policies to an IES Interface
3.7. Filter Management Tasks
3.7.1. Renumbering Filter Policy Entries
3.7.2. Modifying an IP Filter Policy
3.7.3. Modifying a MAC Filter Policy
3.7.4. Deleting a Filter Policy
3.7.4.1. From an Ingress SAP
3.7.4.2. From an Egress SAP
3.7.4.3. From the Filter Configuration
3.7.5. Copying Filter Policies
3.8. Filter Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Configuration Commands
3.8.1.1.1. IP Filter Policy Commands
3.8.1.1.2. IPv6 Filter Policy Commands for 7210 SAS-D and 7210 SAS-Dxp
3.8.1.1.3. IPv6 Filter Policy Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.8.1.1.4. MAC Filter Policy Commands for 7210 SAS-D and 7210 SAS-Dxp
3.8.1.1.5. MAC Filter Policy Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.8.1.1.6. Generic Filter Commands
3.8.1.2. Show Commands
3.8.1.3. Clear Commands
3.8.1.4. Monitor Commands
3.8.2. Command Descriptions
3.8.2.1. Configuration Commands
3.8.2.1.1. Generic Commands
3.8.2.1.2. Global Filter Commands
3.8.2.1.3. Filter Policy Commands
3.8.2.1.4. General Filter Entry Commands
3.8.2.1.5. IP Filter Entry Commands
3.8.2.1.6. MAC Filter Entry Commands
3.8.2.1.7. IP Filter Match Criteria Commands
3.8.2.1.8. MAC Filter Match Criteria Commands
3.8.2.1.9. Policy and Entry Maintenance Commands
3.8.2.2. Show Commands
3.8.2.3. Clear Commands
3.8.2.4. Monitor Commands
4. Common CLI Command Descriptions
4.1. In This Chapter
4.2. Common Service Commands
4.2.1. SAP Command
4.2.1.1. SAP Command Description
5. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS-Series Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.2. System Interface on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.1.3. System Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.4. Unicast Reverse Path Forwarding Check on 7210 SAS-K 3SFP+ 8C
2.1.5. Unnumbered Interfaces
2.1.6. Router ID
2.1.7. Autonomous Systems (AS)
2.1.8. Proxy ARP
2.1.9. Internet Protocol Versions
2.1.9.1. IPv6 Applications for 7210 SAS-D and 7210 SAS-Dxp
2.1.9.2. IPv6 Applications for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.9.3. IPv6 Provider Edge Router over MPLS (6PE)
2.1.9.3.1. 6PE Control Plane Support
2.1.9.3.2. 6PE Data Plane Support
2.1.9.4. DNS
2.1.10. Bidirectional Forwarding Detection for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.10.1. BFD Control Packet
2.1.10.2. Control Packet Format
2.1.10.3. BFD Echo Support
2.1.10.4. BFD Support on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Platforms
2.1.11. DHCP
2.1.11.1. DHCP Principles
2.1.12. DHCP Relay
2.1.13. DHCP Relay Agent Options
2.1.13.1. Option 82
2.1.13.2. Local DHCP Server on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.13.3. DHCP Server Options
2.1.13.4. Trusted and Untrusted
2.1.13.5. DHCP Snooping
2.1.14. IGP-LDP and Static Route-LDP Synchronization on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.2. Process Overview on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.3. Process Overview of 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.4. Configuration Notes
2.4.1. Configuration Guidelines for DHCP Relay and Snooping
2.5. Configuring an IP Router with CLI
2.5.1. Router Configuration Overview of 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.5.1.1. System Interface on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.5.2. Router Configuration Overview on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5.2.1. System Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5.2.2. Network Interface
2.5.3. Basic Configuration
2.5.4. Common Configuration Tasks
2.5.4.1. Configuring a System Name
2.5.4.2. Configuring Interfaces
2.5.4.2.1. Configuring a System Interface
2.5.4.2.2. Configure a Network Interface on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5.4.2.3. Configuring IPv6 Parameters on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.5.4.3. Configuring an Unnumbered Interface
2.5.4.4. Router Advertisement on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.5.4.5. Configuring Proxy ARP
2.5.4.6. ECMP Considerations
2.5.4.6.1. Configuration Notes
2.5.4.7. Deriving the Router ID
2.5.4.8. Configuring an Autonomous System
2.5.4.9. Configuring Option 82 Handling
2.5.4.10. Configuring a Local DHCP Server
2.5.5. Service Management Tasks
2.5.5.1. Changing the System Name
2.5.5.2. Modifying Interface Parameters
2.5.5.3. Deleting a Logical IP Interface
2.6. IP Router Command Reference
2.6.1. Command Hierarchies
2.6.1.1. Configuration Commands
2.6.1.1.1. Router Commands for 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.6.1.1.2. Router Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.1.3. Router Interface Commands for 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.6.1.1.4. Router Interface Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.1.5. Router DHCP Local User Database Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.1.6. Router Interface IPv6 Commands (supported only on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C)
2.6.1.1.7. IPv6 Router Advertisement Commands (supported only on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C)
2.6.1.2. Show Commands
2.6.1.2.1. Router Show Commands
2.6.1.2.2. DHCP Show Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.3. Clear Commands
2.6.1.3.1. Router Clear Commands
2.6.1.3.2. DHCP Clear Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1.4. Debug Commands
2.6.2. Command Descriptions
2.6.2.1. Configuration Commands
2.6.2.1.1. Generic Commands
2.6.2.1.2. Router Global Commands
2.6.2.1.3. Router DHCP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.2.1.4. Route Next-hop Policy Commands
2.6.2.1.5. Router Interface Commands
2.6.2.1.6. Router Interface Filter Commands
2.6.2.1.7. Router Interface ICMP Commands
2.6.2.1.8. Interface Attribute Commands
2.6.2.1.9. Router Interface IPv6 Commands
2.6.2.1.10. IPv6 Router Advertisement Commands
2.6.2.2. Show Commands
2.6.2.3. Clear Commands
2.6.2.4. Debug Commands
3. Filter Policies
3.1. Filter Policy Configuration Overview
3.1.1. Service-Based Filtering
3.1.2. Filter Policy Entities
3.1.2.1. Applying Filter Policies
3.1.2.2. ACL on Range SAPs
3.2. Creating and Applying Filter Policies
3.2.1. Packet Matching Criteria
3.2.1.1. DSCP Values
3.2.2. Ordering Filter Entries
3.2.3. Applying Filters
3.2.3.1. Applying a Filter to a SAP
3.2.3.2. Applying a Filter to an IES Interface
3.2.3.3. Applying a Filter to a Network IP Interface
3.3. Configuration Notes
3.3.1. MAC Filters
3.3.2. IP Filters
3.3.3. IPv6 Filters
3.3.3.1. Resource Usage for Ingress Filter Policies for 7210 SAS-D and 7210 SAS-Dxp
3.3.3.2. Resource Usage for Egress Filter Policies (supported only for 7210 SAS-D and 7210 SAS-Dxp)
3.3.4. Ingress Filter Policy Resource Usage: 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.4. Configuring Filter Policies with CLI
3.5. Basic Configuration
3.6. Common Configuration Tasks
3.6.1. Allocating Resources for Filter Policies (Ingress and Egress)
3.6.2. Creating an IP Filter Policy
3.6.2.1. IP Filter Policy
3.6.2.2. IP Filter Entry
3.6.2.3. IP Entry Matching Criteria
3.6.3. Creating an IPv6 Filter Policy (applicable only for 7210 SAS-D and 7210 SAS-Dxp)
3.6.3.1. IPv6 Filter Entry
3.6.4. Creating a MAC Filter Policy
3.6.4.1. MAC Filter Policy
3.6.4.2. MAC Filter Entry
3.6.4.3. MAC Entry Matching Criteria
3.6.4.4. Apply IP and MAC Filter Policies
3.6.4.5. Apply Filter Policies to an IES Interface
3.7. Filter Management Tasks
3.7.1. Renumbering Filter Policy Entries
3.7.2. Modifying an IP Filter Policy
3.7.3. Modifying a MAC Filter Policy
3.7.4. Deleting a Filter Policy
3.7.4.1. From an Ingress SAP
3.7.4.2. From an Egress SAP
3.7.4.3. From the Filter Configuration
3.7.5. Copying Filter Policies
3.8. Filter Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Configuration Commands
3.8.1.1.1. IP Filter Policy Commands
3.8.1.1.2. IPv6 Filter Policy Commands for 7210 SAS-D and 7210 SAS-Dxp
3.8.1.1.3. IPv6 Filter Policy Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.8.1.1.4. MAC Filter Policy Commands for 7210 SAS-D and 7210 SAS-Dxp
3.8.1.1.5. MAC Filter Policy Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.8.1.1.6. Generic Filter Commands
3.8.1.2. Show Commands
3.8.1.3. Clear Commands
3.8.1.4. Monitor Commands
3.8.2. Command Descriptions
3.8.2.1. Configuration Commands
3.8.2.1.1. Generic Commands
3.8.2.1.2. Global Filter Commands
3.8.2.1.3. Filter Policy Commands
3.8.2.1.4. General Filter Entry Commands
3.8.2.1.5. IP Filter Entry Commands
3.8.2.1.6. MAC Filter Entry Commands
3.8.2.1.7. IP Filter Match Criteria Commands
3.8.2.1.8. MAC Filter Match Criteria Commands
3.8.2.1.9. Policy and Entry Maintenance Commands
3.8.2.2. Show Commands
3.8.2.3. Clear Commands
3.8.2.4. Monitor Commands
4. Common CLI Command Descriptions
4.1. In This Chapter
4.2. Common Service Commands
4.2.1. SAP Command
4.2.1.1. SAP Command Description
5. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, R6, R12, Mxp, Sx, S Router Configuration Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Secondary IPv4 Addresses
2.1.1.2. Network Interface
2.1.2. System Interface
2.1.3. Router ID
2.1.4. Autonomous Systems
2.1.5. Proxy ARP
2.1.6. Internet Protocol Versions
2.1.6.1. IPv6 Applications
2.1.6.2. IPv6 Provider Edge Router over MPLS (6PE)
2.1.6.2.1. 6PE Control Plane Support
2.1.6.2.2. 6PE Data Plane Support
2.1.7. Bidirectional Forwarding Detection
2.1.7.1. BFD Control Packet
2.1.7.2. Control Packet Format
2.1.7.3. Echo Support
2.1.7.4. BFD support on 7210 SAS platforms
2.1.8. IGP-LDP and Static Route-LDP Synchronization
2.2. Process Overview
2.3. Configuration Notes
2.4. Configuring an IP Router with CLI
2.4.1. Router Configuration Overview
2.4.1.1. System Interface
2.4.1.2. Network Interface
2.4.2. Basic Configuration
2.4.3. Common Configuration Tasks
2.4.3.1. Configuring a System Name
2.4.3.2. Configuring Interfaces
2.4.3.2.1. Configuring a System Interface
2.4.3.2.2. Configuring IPv6 Parameters
2.4.3.3. Configuring Router Advertisement
2.4.3.4. Configuring Proxy ARP
2.4.3.5. ECMP Considerations
2.4.3.5.1. Configuration Notes
2.4.3.6. Deriving the Router ID
2.4.3.7. Configuring an Autonomous System
2.4.3.8. Configuring Static Routes
2.4.4. Service Management Tasks
2.4.4.1. Changing the System Name
2.4.4.2. Modifying Interface Parameters
2.4.4.3. Deleting a Logical IP Interface
2.5. IP Router Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Configuration Commands
2.5.1.1.1. Router Commands
2.5.1.1.2. Router BFD commands
2.5.1.1.3. Router Interface Commands
2.5.1.1.4. Router Interface IPv6 Commands
2.5.1.1.5. Router Advertisement Commands
2.5.1.2. Show Commands
2.5.1.3. Clear Commands
2.5.1.4. Debug Commands
2.5.2. Command Descriptions
2.5.2.1. Configuration Commands
2.5.2.1.1. Generic Commands
2.5.2.1.2. Router Global Commands
2.5.2.1.3. Router BFD Commands
2.5.2.1.4. Router Interface Commands
2.5.2.1.5. Route Next-hop Policy Commands
2.5.2.1.6. Router Interface Filter Commands
2.5.2.1.7. Router Interface ICMP Commands
2.5.2.1.8. Interface Attribute Commands
2.5.2.1.9. Router Interface IPv6 Commands
2.5.2.1.10. Router Advertisement Commands
2.5.2.2. Show Commands
2.5.2.3. Clear Commands
2.5.2.4. Debug Commands
3. VRRP
3.1. VRRP Overview
3.1.1. VRRP Components
3.1.1.1. Virtual Router
3.1.1.2. IP Address Owner
3.1.1.3. Primary and Secondary IP Addresses
3.1.1.4. Virtual Router Master
3.1.1.5. Virtual Router Backup
3.1.1.6. Owner and Non-Owner VRRP
3.1.2. Configurable Parameters
3.1.2.1. Virtual Router ID (VRID)
3.1.2.2. Priority
3.1.2.3. IP Addresses
3.1.2.4. Message Interval and Master Inheritance
3.1.2.5. Skew Time
3.1.2.6. Master Down Interval
3.1.2.7. Preempt Mode
3.1.2.8. VRRP Message Authentication
3.1.2.8.1. Authentication Type 0 — No Authentication
3.1.2.8.2. Authentication Type 1 — Simple Text Password
3.1.2.8.3. Authentication Failure
3.1.2.9. Authentication Data
3.1.2.10. Virtual MAC Address
3.1.2.11. VRRP Advertisement Message IP Address List Verification
3.1.2.12. IPv6 Virtual Router Instance Operationally Up
3.1.2.13. Policies
3.2. VRRP Priority Control Policies
3.2.1. VRRP Virtual Router Policy Constraints
3.2.2. VRRP Virtual Router Instance Base Priority
3.2.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.2.4. VRRP Priority Control Policy Priority Events
3.2.4.1. Priority Event Hold-Set Timers
3.2.4.2. Port Down Priority Event
3.2.4.3. LAG Degrade Priority Event
3.2.4.4. Host Unreachable Priority Event
3.2.4.5. Route Unknown Priority Event
3.3. VRRP Non-Owner Accessibility
3.3.1. Non-Owner Access Ping Reply
3.3.2. Non-Owner Access Telnet
3.3.3. Non-Owner Access SSH
3.4. VRRP Configuration Process Overview
3.5. Configuration Notes
3.5.1. General
3.6. Configuring VRRP with CLI
3.7. VRRP Configuration Overview
3.7.1. Preconfiguration Requirements
3.8. Basic VRRP Configurations
3.8.1. VRRP Policy
3.8.2. VRRP IES Service Parameters
3.8.3. VRRP Router Interface Parameters
3.9. Common Configuration Tasks
3.9.1. Creating Interface Parameters
3.10. Configuring VRRP Policy Components
3.10.1. Configuring Service VRRP Parameters
3.10.1.1. Non-Owner VRRP Example
3.10.1.2. Owner Service VRRP Example
3.10.2. Configuring Router Interface VRRP Parameters
3.10.2.1. Router Interface VRRP Non-Owner
3.10.2.2. Router Interface VRRP Owner
3.11. VRRP Configuration Management Tasks
3.11.1. Modifying a VRRP Policy
3.11.2. Deleting a VRRP Policy
3.11.3. Modifying Service and Interface VRRP Parameters
3.11.3.1. Modifying Non-Owner Parameters
3.11.3.2. Modifying Owner Parameters
3.11.3.3. Deleting VRRP on an Interface or Service
3.12. VRRP Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands
3.12.1.1.1. VRRP Network Interface Commands
3.12.1.1.2. VRRP IPv6 Interface Commands
3.12.1.1.3. VRRP Priority Control Event Policy Commands
3.12.1.2. Show Commands
3.12.1.3. Monitor Commands
3.12.1.4. Clear Commands
3.12.1.5. Debug Commands
3.12.2. Command Descriptions
3.12.2.1. Configuration Commands
3.12.2.1.1. Interface Configuration Commands
3.12.2.1.2. Priority Policy Commands
3.12.2.1.3. Priority Policy Event Commands
3.12.2.1.4. Priority Policy Port Down Event Commands
3.12.2.1.5. Priority Policy LAG Events Commands
3.12.2.1.6. Priority Policy Host Unreachable Event Commands
3.12.2.1.7. Priority Policy Route Unknown Event Commands
3.12.2.2. Show Commands
3.12.2.3. Monitor Commands
3.12.2.4. Clear Commands
3.12.2.5. Debug Commands
4. Filter Policies
4.1. Filter Policy Configuration Overview
4.1.1. Service and Network IP Interface-Based Filtering
4.1.2. Filter Policy Entities
4.1.2.1. Applying Filter Policies
4.1.2.2. ACL on Range SAPs
4.2. Creating and Applying Policies
4.2.1. Packet Matching Criteria
4.2.1.1. DSCP Values
4.2.2. Ordering Filter Entries
4.2.3. Applying Filters
4.2.3.1. Applying a Filter to a SAP
4.2.3.2. Applying a Filter to a Network IP Interface
4.3. Configuration Notes
4.3.1. MAC Filters
4.3.2. IP Filters
4.3.3. IPv6 Filters
4.3.3.1. Resource Usage for Ingress Filter Policies
4.3.3.2. Resource Usage for Egress Filter Policies
4.4. Configuring Filter Policies with CLI
4.5. Basic Configuration
4.6. Common Configuration Tasks
4.6.1. Allocating Resources for Filter policies (Ingress and Egress)
4.6.2. Creating an IP Filter Policy
4.6.2.1. IP Filter Policy
4.6.2.2. IP Filter Entry
4.6.2.3. IP Entry Matching Criteria
4.6.3. Creating an IPv6 Filter Policy
4.6.3.1. IPv6 Filter Policy
4.6.3.2. IPv6 Filter Entry
4.6.4. Creating a MAC Filter Policy
4.6.4.1. MAC Filter Policy
4.6.4.2. MAC Filter Entry
4.6.4.3. MAC Entry Matching Criteria
4.6.4.4. Apply IP and MAC Filter Policies
4.6.4.5. Apply an IPv6 Filter Policy to VPLS
4.6.5. Applying Filter Policies to a Network IP Interface
4.6.5.1. Applying a Filter Policy to an IP Interface
4.7. Filter Management Tasks
4.7.1. Renumbering Filter Policy Entries
4.7.2. Modifying an IP Filter Policy
4.7.3. Modifying an IPv6 Filter Policy
4.7.4. Modifying a MAC Filter Policy
4.7.5. Detaching/Deleting a Filter Policy
4.7.5.1. From an Ingress SAP
4.7.5.2. From an Egress SAP
4.7.5.3. From a Network Interface
4.7.5.4. From the Filter Configuration
4.7.6. Copying Filter Policies
4.8. Filter Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Configuration Commands
4.8.1.1.1. IP Filter Policy Commands
4.8.1.1.2. IPv6 Filter Policy Commands
4.8.1.1.3. MAC Filter Policy Commands
4.8.1.1.4. Generic Filter Commands
4.8.1.2. Show Commands
4.8.1.3. Clear Commands
4.8.1.4. Monitor Commands
4.8.2. Command Descriptions
4.8.2.1. Configuration Commands
4.8.2.1.1. Generic Commands
4.8.2.1.2. Global Filter Commands
4.8.2.1.3. Filter Policy Commands
4.8.2.1.4. General Filter Entry Commands
4.8.2.1.5. IP Filter Entry Commands
4.8.2.1.6. MAC Filter Entry Commands
4.8.2.1.7. IP Filter Match Criteria
4.8.2.1.8. MAC Filter Match Criteria
4.8.2.1.9. Policy and Entry Maintenance Commands
4.8.2.2. Show Commands
4.8.2.3. Clear Commands
4.8.2.4. Monitor Commands
5. Common CLI Command Descriptions
5.1. In This Chapter
5.1.1. Common Service Commands
5.1.1.1. SAP Syntax
6. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Secondary IPv4 Addresses
2.1.1.2. Network Interface
2.1.2. System Interface
2.1.3. Router ID
2.1.4. Autonomous Systems
2.1.5. Proxy ARP
2.1.6. Internet Protocol Versions
2.1.6.1. IPv6 Applications
2.1.6.2. IPv6 Provider Edge Router over MPLS (6PE)
2.1.6.2.1. 6PE Control Plane Support
2.1.6.2.2. 6PE Data Plane Support
2.1.7. Bidirectional Forwarding Detection
2.1.7.1. BFD Control Packet
2.1.7.2. Control Packet Format
2.1.7.3. Echo Support
2.1.7.4. BFD support on 7210 SAS platforms
2.1.8. IGP-LDP and Static Route-LDP Synchronization
2.2. Process Overview
2.3. Configuration Notes
2.4. Configuring an IP Router with CLI
2.4.1. Router Configuration Overview
2.4.1.1. System Interface
2.4.1.2. Network Interface
2.4.2. Basic Configuration
2.4.3. Common Configuration Tasks
2.4.3.1. Configuring a System Name
2.4.3.2. Configuring Interfaces
2.4.3.2.1. Configuring a System Interface
2.4.3.2.2. Configuring IPv6 Parameters
2.4.3.3. Configuring Router Advertisement
2.4.3.4. Configuring Proxy ARP
2.4.3.5. ECMP Considerations
2.4.3.5.1. Configuration Notes
2.4.3.6. Deriving the Router ID
2.4.3.7. Configuring an Autonomous System
2.4.3.8. Configuring Static Routes
2.4.4. Service Management Tasks
2.4.4.1. Changing the System Name
2.4.4.2. Modifying Interface Parameters
2.4.4.3. Deleting a Logical IP Interface
2.5. IP Router Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Configuration Commands
2.5.1.1.1. Router Commands
2.5.1.1.2. Router BFD commands
2.5.1.1.3. Router Interface Commands
2.5.1.1.4. Router Interface IPv6 Commands
2.5.1.1.5. Router Advertisement Commands
2.5.1.2. Show Commands
2.5.1.3. Clear Commands
2.5.1.4. Debug Commands
2.5.2. Command Descriptions
2.5.2.1. Configuration Commands
2.5.2.1.1. Generic Commands
2.5.2.1.2. Router Global Commands
2.5.2.1.3. Router BFD Commands
2.5.2.1.4. Router Interface Commands
2.5.2.1.5. Route Next-hop Policy Commands
2.5.2.1.6. Router Interface Filter Commands
2.5.2.1.7. Router Interface ICMP Commands
2.5.2.1.8. Interface Attribute Commands
2.5.2.1.9. Router Interface IPv6 Commands
2.5.2.1.10. Router Advertisement Commands
2.5.2.2. Show Commands
2.5.2.3. Clear Commands
2.5.2.4. Debug Commands
3. VRRP
3.1. VRRP Overview
3.1.1. VRRP Components
3.1.1.1. Virtual Router
3.1.1.2. IP Address Owner
3.1.1.3. Primary and Secondary IP Addresses
3.1.1.4. Virtual Router Master
3.1.1.5. Virtual Router Backup
3.1.1.6. Owner and Non-Owner VRRP
3.1.2. Configurable Parameters
3.1.2.1. Virtual Router ID (VRID)
3.1.2.2. Priority
3.1.2.3. IP Addresses
3.1.2.4. Message Interval and Master Inheritance
3.1.2.5. Skew Time
3.1.2.6. Master Down Interval
3.1.2.7. Preempt Mode
3.1.2.8. VRRP Message Authentication
3.1.2.8.1. Authentication Type 0 — No Authentication
3.1.2.8.2. Authentication Type 1 — Simple Text Password
3.1.2.8.3. Authentication Failure
3.1.2.9. Authentication Data
3.1.2.10. Virtual MAC Address
3.1.2.11. VRRP Advertisement Message IP Address List Verification
3.1.2.12. IPv6 Virtual Router Instance Operationally Up
3.1.2.13. Policies
3.2. VRRP Priority Control Policies
3.2.1. VRRP Virtual Router Policy Constraints
3.2.2. VRRP Virtual Router Instance Base Priority
3.2.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.2.4. VRRP Priority Control Policy Priority Events
3.2.4.1. Priority Event Hold-Set Timers
3.2.4.2. Port Down Priority Event
3.2.4.3. LAG Degrade Priority Event
3.2.4.4. Host Unreachable Priority Event
3.2.4.5. Route Unknown Priority Event
3.3. VRRP Non-Owner Accessibility
3.3.1. Non-Owner Access Ping Reply
3.3.2. Non-Owner Access Telnet
3.3.3. Non-Owner Access SSH
3.4. VRRP Configuration Process Overview
3.5. Configuration Notes
3.5.1. General
3.6. Configuring VRRP with CLI
3.7. VRRP Configuration Overview
3.7.1. Preconfiguration Requirements
3.8. Basic VRRP Configurations
3.8.1. VRRP Policy
3.8.2. VRRP IES Service Parameters
3.8.3. VRRP Router Interface Parameters
3.9. Common Configuration Tasks
3.9.1. Creating Interface Parameters
3.10. Configuring VRRP Policy Components
3.10.1. Configuring Service VRRP Parameters
3.10.1.1. Non-Owner VRRP Example
3.10.1.2. Owner Service VRRP Example
3.10.2. Configuring Router Interface VRRP Parameters
3.10.2.1. Router Interface VRRP Non-Owner
3.10.2.2. Router Interface VRRP Owner
3.11. VRRP Configuration Management Tasks
3.11.1. Modifying a VRRP Policy
3.11.2. Deleting a VRRP Policy
3.11.3. Modifying Service and Interface VRRP Parameters
3.11.3.1. Modifying Non-Owner Parameters
3.11.3.2. Modifying Owner Parameters
3.11.3.3. Deleting VRRP on an Interface or Service
3.12. VRRP Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands
3.12.1.1.1. VRRP Network Interface Commands
3.12.1.1.2. VRRP IPv6 Interface Commands
3.12.1.1.3. VRRP Priority Control Event Policy Commands
3.12.1.2. Show Commands
3.12.1.3. Monitor Commands
3.12.1.4. Clear Commands
3.12.1.5. Debug Commands
3.12.2. Command Descriptions
3.12.2.1. Configuration Commands
3.12.2.1.1. Interface Configuration Commands
3.12.2.1.2. Priority Policy Commands
3.12.2.1.3. Priority Policy Event Commands
3.12.2.1.4. Priority Policy Port Down Event Commands
3.12.2.1.5. Priority Policy LAG Events Commands
3.12.2.1.6. Priority Policy Host Unreachable Event Commands
3.12.2.1.7. Priority Policy Route Unknown Event Commands
3.12.2.2. Show Commands
3.12.2.3. Monitor Commands
3.12.2.4. Clear Commands
3.12.2.5. Debug Commands
4. Filter Policies
4.1. Filter Policy Configuration Overview
4.1.1. Service and Network IP Interface-Based Filtering
4.1.2. Filter Policy Entities
4.1.2.1. Applying Filter Policies
4.1.2.2. ACL on Range SAPs
4.2. Creating and Applying Policies
4.2.1. Packet Matching Criteria
4.2.1.1. DSCP Values
4.2.2. Ordering Filter Entries
4.2.3. Applying Filters
4.2.3.1. Applying a Filter to a SAP
4.2.3.2. Applying a Filter to a Network IP Interface
4.3. Configuration Notes
4.3.1. MAC Filters
4.3.2. IP Filters
4.3.3. IPv6 Filters
4.3.3.1. Resource Usage for Ingress Filter Policies
4.3.3.2. Resource Usage for Egress Filter Policies
4.4. Configuring Filter Policies with CLI
4.5. Basic Configuration
4.6. Common Configuration Tasks
4.6.1. Allocating Resources for Filter policies (Ingress and Egress)
4.6.2. Creating an IP Filter Policy
4.6.2.1. IP Filter Policy
4.6.2.2. IP Filter Entry
4.6.2.3. IP Entry Matching Criteria
4.6.3. Creating an IPv6 Filter Policy
4.6.3.1. IPv6 Filter Policy
4.6.3.2. IPv6 Filter Entry
4.6.4. Creating a MAC Filter Policy
4.6.4.1. MAC Filter Policy
4.6.4.2. MAC Filter Entry
4.6.4.3. MAC Entry Matching Criteria
4.6.4.4. Apply IP and MAC Filter Policies
4.6.4.5. Apply an IPv6 Filter Policy to VPLS
4.6.5. Applying Filter Policies to a Network IP Interface
4.6.5.1. Applying a Filter Policy to an IP Interface
4.7. Filter Management Tasks
4.7.1. Renumbering Filter Policy Entries
4.7.2. Modifying an IP Filter Policy
4.7.3. Modifying an IPv6 Filter Policy
4.7.4. Modifying a MAC Filter Policy
4.7.5. Detaching/Deleting a Filter Policy
4.7.5.1. From an Ingress SAP
4.7.5.2. From an Egress SAP
4.7.5.3. From a Network Interface
4.7.5.4. From the Filter Configuration
4.7.6. Copying Filter Policies
4.8. Filter Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Configuration Commands
4.8.1.1.1. IP Filter Policy Commands
4.8.1.1.2. IPv6 Filter Policy Commands
4.8.1.1.3. MAC Filter Policy Commands
4.8.1.1.4. Generic Filter Commands
4.8.1.2. Show Commands
4.8.1.3. Clear Commands
4.8.1.4. Monitor Commands
4.8.2. Command Descriptions
4.8.2.1. Configuration Commands
4.8.2.1.1. Generic Commands
4.8.2.1.2. Global Filter Commands
4.8.2.1.3. Filter Policy Commands
4.8.2.1.4. General Filter Entry Commands
4.8.2.1.5. IP Filter Entry Commands
4.8.2.1.6. MAC Filter Entry Commands
4.8.2.1.7. IP Filter Match Criteria
4.8.2.1.8. MAC Filter Match Criteria
4.8.2.1.9. Policy and Entry Maintenance Commands
4.8.2.2. Show Commands
4.8.2.3. Clear Commands
4.8.2.4. Monitor Commands
5. Common CLI Command Descriptions
5.1. In This Chapter
5.1.1. Common Service Commands
5.1.1.1. SAP Syntax
6. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-D, Dxp, K 2F1C2T Routing Protocols Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. Route Policies
2.1. Configuring Route Policies
2.1.1. Policy Statements
2.1.1.1. Default Action Behavior
2.1.1.2. Denied IP Prefixes
2.1.2. When to Use Route Policies
2.2. Configuration Notes
2.2.1. General
2.3. Configuring Route Policies with CLI
2.4. Route Policy Configuration Overview
2.4.1. When to Create Routing Policies
2.4.2. Default Route Policy Actions
2.4.3. Policy Evaluation
2.5. Basic Configurations
2.6. Configuring Route Policy Components
2.6.1. Beginning the Policy Statement
2.6.2. Creating a Route Policy
2.6.3. Configuring a Default Action
2.6.4. Configuring an Entry
2.7. Route Policy Configuration Management Tasks
2.7.1. Editing Policy Statements and Parameters
2.7.2. Deleting an Entry
2.7.3. Deleting a Policy Statement
2.8. Route Policy Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Route Policy Configuration Commands
2.8.1.2. Show Commands
2.8.2. Command Descriptions
2.8.2.1. Configuration Commands
2.8.2.1.1. Generic Commands
2.8.2.1.2. Route Policy Options
2.8.2.1.3. Route Policy Prefix Commands
2.8.2.1.4. Route Policy Entry Match Commands
2.8.2.1.5. Route Policy Action Commands
2.8.2.2. Show Commands
3. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. Route Policies
2.1. Configuring Route Policies
2.1.1. Policy Statements
2.1.1.1. Default Action Behavior
2.1.1.2. Denied IP Prefixes
2.1.2. When to Use Route Policies
2.2. Configuration Notes
2.2.1. General
2.3. Configuring Route Policies with CLI
2.4. Route Policy Configuration Overview
2.4.1. When to Create Routing Policies
2.4.2. Default Route Policy Actions
2.4.3. Policy Evaluation
2.5. Basic Configurations
2.6. Configuring Route Policy Components
2.6.1. Beginning the Policy Statement
2.6.2. Creating a Route Policy
2.6.3. Configuring a Default Action
2.6.4. Configuring an Entry
2.7. Route Policy Configuration Management Tasks
2.7.1. Editing Policy Statements and Parameters
2.7.2. Deleting an Entry
2.7.3. Deleting a Policy Statement
2.8. Route Policy Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Route Policy Configuration Commands
2.8.1.2. Show Commands
2.8.2. Command Descriptions
2.8.2.1. Configuration Commands
2.8.2.1.1. Generic Commands
2.8.2.1.2. Route Policy Options
2.8.2.1.3. Route Policy Prefix Commands
2.8.2.1.4. Route Policy Entry Match Commands
2.8.2.1.5. Route Policy Action Commands
2.8.2.2. Show Commands
3. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-K 2F6C4T, K 3SFP+ 8C Routing Protocols Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Routing Configuration Process
2. Multicast
2.1. Overview of Multicast
2.1.1. Multicast Models (SSM)
2.1.1.1. SSM
2.2. Multicast Features
2.2.1. IGMP
2.2.1.1. IGMP Versions and Interoperability Requirements
2.2.1.2. IGMP Version Transition
2.2.1.3. SSM Groups
2.2.2. PIM-SM
2.2.2.1. PIM-SM Functions
2.2.2.1.1. Phase One
2.2.2.1.2. Phase Two
2.2.2.1.3. Phase Three
2.2.2.2. Encapsulating Data Packets in the Register Tunnel
2.2.2.3. PIM Bootstrap Router Mechanism
2.2.2.4. PIM-SM Routing Policies
2.2.2.5. Reverse Path Forwarding Checks
2.2.2.5.1. Anycast RP for PIM-SM
2.2.2.6. Distributing PIM Joins over Multiple ECMP Paths
2.2.3. Multicast Debugging Tools
2.2.3.1. Mtrace
2.2.3.1.1. Finding the Last Hop Router
2.2.3.1.2. Directing the Response
2.2.3.2. Mrinfo
2.2.4. Configuration Guidelines for 7210 SAS
2.3. Configuring Multicast Parameters with CLI
2.3.1. Multicast Configuration Overview
2.3.2. Basic Configuration
2.3.3. Common Configuration Tasks
2.3.4. Configuring IGMP Parameters
2.3.4.1. Enabling IGMP
2.3.4.2. Configuring an IGMP Interface
2.3.4.3. Configuring Static Parameters
2.3.4.4. Configuring SSM Translation
2.3.5. Configuring PIM Parameters
2.3.5.1. Enabling PIM
2.3.5.2. Configuring PIM Interface Parameters
2.3.5.3. Importing PIM Join or Register Policies
2.3.6. Disabling IGMP or PIM
2.4. Multicast Command Reference
2.4.1. Command Hierarchies
2.4.1.1. Configuration Commands
2.4.1.2. IGMP Commands
2.4.1.3. PIM Commands
2.4.1.4. Operational Commands
2.4.1.5. Show Commands
2.4.1.6. Clear Commands
2.4.1.7. Debug Commands
2.4.2. Command Descriptions
2.4.2.1. Configuration Commands
2.4.2.1.1. Generic Commands
2.4.2.1.2. Multicast Commands
2.4.2.1.3. Router IGMP Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.4. Router PIM Commands
2.4.2.1.5. Operational Commands
2.4.2.2. Show Commands
2.4.2.2.1. IGMP Commands
2.4.2.3. Show Router PIM Commands
2.4.2.4. Clear Commands
2.4.2.5. Debug Commands
2.4.2.5.1. Debug IGMP Commands
2.4.2.5.2. Debug PIM Commands
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.2. OSPFv3 Authentication
3.1.3. OSPFv3 Graceful Restart Helper
3.1.4. Virtual Links
3.1.5. Neighbors and Adjacencies
3.1.6. Link-State Advertisements
3.1.7. Metrics
3.1.8. Authentication
3.1.9. Multiple OSPF Instances
3.1.9.1. Route Export Policies for OSPF
3.1.9.2. Preventing Route Redistribution Loops
3.1.10. IP Subnets
3.1.11. Preconfiguration Recommendations
3.2. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.2.1. IP FRR/LFA Configuration
3.2.1.1. Reducing the Scope of the LFA Calculation by SPF
3.2.2. ECMP Considerations
3.2.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.2.4. IP FRR and BGP Next-Hop Resolution
3.2.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.2.5.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
3.2.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.3.1. Configuration of Route Next-Hop Policy Template
3.3.1.1. Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
3.3.1.2. Configuring SRLG Group Constraint in Route Next-Hop Policy
3.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.3.1.4. Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
3.3.2. Application of Route Next-Hop Policy Template to an Interface
3.3.3. Excluding Prefixes from LFA SPF
3.3.4. Modification to LFA Next-Hop Selection Algorithm
3.4. Segment Routing in Shortest Path Forwarding
3.4.1. LFA Protection Using Segment Routing Backup Node SID
3.4.1.1. Detailed Operation of LFA Protection Using Backup Node SID
3.4.1.2. Duplicate SID Handling
3.4.1.3. OSPF Control Plane Extensions
3.5. OSPF Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.6.1.1. OSPF Defaults
3.7. Configuring OSPF with CLI
3.8. OSPF Configuration Guidelines
3.9. Basic OSPF Configuration
3.9.1. Configuring the Router ID
3.10. Configuring OSPF Components
3.10.1. Configuring OSPF Parameters
3.10.2. Configuring OSPFv3 Parameters
3.10.3. Configuring an OSPF and OSPFv3 Area
3.10.4. Configuring an OSPF and OSPFv3 Stub Area
3.10.5. Configuring a Not-So-Stubby Area
3.10.6. Configuring a Virtual Link
3.10.7. Configuring an Interface
3.10.8. Configuring Authentication
3.10.9. Assigning a Designated Router
3.10.10. Configuring Route Summaries
3.10.11. Configuring Route Preferences
3.11. OSPF Configuration Management Tasks
3.11.1. Modifying a Router ID
3.11.2. Deleting a Router ID
3.11.3. Modifying OSPF Parameters
3.12. OSPF Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands for OSPF
3.12.1.2. Show Commands
3.12.1.3. Clear Commands
3.12.1.4. Debug Commands
3.12.2. Command Descriptions
3.12.2.1. Configuration Commands
3.12.2.1.1. Generic Commands
3.12.2.1.2. OSPF Global Commands
3.12.2.1.3. OSPF Area Commands
3.12.2.1.4. Interface/Virtual Link Commands
3.12.2.2. Show Commands
3.12.2.3. Clear Commands
3.12.2.4. Debug Commands
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.4. IS-IS PDU Configuration
4.1.5. IS-IS Operations
4.1.6. IS-IS Route Summarization
4.1.7. IS-IS Multi-Topology for IPv6
4.1.8. IS-IS Administrative Tags
4.1.8.1. Setting Route Tags
4.1.8.2. Using Route Tags
4.1.9. Segment Routing in Shortest Path Forwarding
4.1.9.1. Segment Routing Operational Procedures
4.1.9.1.1. Prefix Advertisement and Resolution
4.1.9.1.2. Error and Resource Exhaustion Handling
4.1.9.2. Segment Routing Tunnel Management
4.1.9.2.1. Tunnel MTU Determination
4.1.9.3. Remote LFA with Segment Routing
4.1.9.4. Data Path Support
4.1.9.4.1. Hash Label
4.1.9.5. Control Protocol Changes
4.1.9.5.1. IS-IS Control Protocol Changes
4.1.9.5.2. OSPF Control Protocol Changes
4.1.9.6. BGP Label Route Resolution Using Segment Routing Tunnels
4.1.9.7. Service Packet Forwarding with Segment Routing
4.1.9.8. Mirror Services
4.1.10. IGP-LDP Synchronization
4.2. IS-IS Configuration Process Overview
4.3. Configuration Notes
4.3.1. General
4.4. Configuring IS-IS with CLI
4.5. IS-IS Configuration Overview
4.5.1. Router Levels
4.5.2. Area Address Attributes
4.5.3. Interface Level Capability
4.5.4. Route Leaking
4.6. Basic IS-IS Configuration
4.7. Common Configuration Tasks
4.8. Configuring IS-IS Components
4.8.1. Enabling IS-IS
4.8.2. Modifying Router-Level Parameters
4.8.3. Configuring ISO Area Addresses
4.8.4. Configuring Global IS-IS Parameters
4.8.5. Migration to IS-IS Multi-Topology
4.8.6. Configuring Interface Parameters
4.8.6.1. Example: Configuring a Level 1 Area
4.8.6.2. Example: Modifying a Router’s Level Capability
4.9. IS-IS Configuration Management Tasks
4.9.1. Disabling IS-IS
4.9.2. Removing IS-IS
4.9.3. Modifying Global IS-IS Parameters
4.9.4. Modifying IS-IS Interface Parameters
4.9.5. Configuring Leaking
4.9.6. Redistributing External IS-IS Routers
4.10. IS-IS Command Reference
4.10.1. Command Hierarchies
4.10.1.1. Configuration Commands
4.10.1.2. Global Commands
4.10.1.3. Interface Command
4.10.1.4. Show Commands
4.10.1.5. Clear Commands
4.10.1.6. Debug Commands
4.10.2. Command Descriptions
4.10.2.1. IS-IS Configuration Commands
4.10.2.1.1. Generic Commands
4.10.2.2. Show Commands
4.10.2.3. Clear Commands
4.10.2.4. Debug Commands
5. BGP
5.1. BGP Overview
5.1.1. BGP Communication
5.1.1.1. Message Types
5.1.2. Group Configuration and Peers
5.1.3. Hierarchical Levels
5.1.4. Route Reflection
5.1.5. Fast External Failover
5.1.6. Sending of BGP Communities
5.1.7. ECMP and BGP Route Tunnels
5.1.8. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.1.8.1. VPN-IPv4 and VPN-IPv6 Route Resolution
5.1.9. Route Selection Criteria
5.1.10. BGP Path Attributes
5.1.10.1. NEXT_HOP Attribute
5.1.10.1.1. Next-hop Indirection
5.1.11. BGP Routing Information Base
5.1.11.1. LOC-RIB Features
5.1.11.2. BGP Fast Reroute
5.1.11.2.1. Calculating Backup Paths
5.1.11.2.2. Failure Detection and Switchover to the Backup Path
5.1.12. BGP Add-Path
5.1.12.1. Receiving Multiple Paths per Prefix from a BGP Peer
5.1.12.2. Path Selection with Add-Paths
5.1.12.3. BGP Decision Process with Add-Path
5.1.12.4. Advertising Multiple Paths Using Add-Path
5.1.12.5. Limiting the Number of Paths per Prefix
5.1.13. AIGP Metric
5.1.14. Command Interactions and Dependencies
5.1.14.1. Changing the ASN
5.1.14.2. Changing the Local ASN
5.1.14.3. Changing the Router ID at the Configuration Level
5.1.14.4. Hold Time and Keep Alive Timer Dependencies
5.1.14.5. Import and Export Route Policies
5.1.14.6. Route Damping and Route Policies
5.1.14.7. AS Override
5.1.15. Configuration Guideline for BGP
5.2. BGP Configuration Process Overview
5.3. Configuration Notes
5.3.1. General
5.3.1.1. BGP Defaults
5.3.1.2. BGP MIB Notes
5.4. Configuring BGP with CLI
5.5. BGP Configuration Overview
5.5.1. Preconfiguration Requirements
5.5.2. BGP Hierarchy
5.5.3. Internal and External BGP Configurations
5.6. Basic BGP Configuration
5.7. Common Configuration Tasks
5.7.1. Creating an Autonomous System
5.7.2. Configuring a Router ID
5.7.3. BGP Components
5.7.4. Configuring BGP
5.7.5. Configuring Group Attributes
5.7.6. Configuring Neighbor Attributes
5.7.7. Configuring AIGP
5.8. BGP Configuration Management Tasks
5.8.1. Modifying an ASN
5.8.2. Modifying the BGP Router ID
5.8.3. Modifying the Router-Level Router ID
5.8.4. Deleting a Neighbor
5.8.5. Deleting Groups
5.8.6. Editing BGP Parameters
5.9. BGP Command Reference
5.9.1. Command Hierarchies
5.9.1.1. Configuration Commands
5.9.1.1.1. Global BGP Commands
5.9.1.1.2. Group BGP Commands
5.9.1.1.3. Neighbor BGP Commands
5.9.1.1.4. Other BGP-Related Commands
5.9.1.2. Show Commands
5.9.1.3. Clear Commands
5.9.1.4. Debug Commands
5.9.2. Command Descriptions
5.9.2.1. Configuration Commands
5.9.2.2. Other BGP-Related Commands
5.9.2.3. Show Commands
5.9.2.4. Clear Commands
5.9.2.5. Debug Commands
6. Route Policies
6.1. In This Chapter
6.2. Configuring Route Policies
6.2.1. Policy Statements
6.2.1.1. Default Action Behavior
6.2.1.2. Denied IP Prefixes
6.2.1.3. Controlling Route Flapping
6.3. Regular Expressions
6.3.1. BGP and OSPF Route Policy Support
6.3.1.1. BGP Route Policies
6.3.1.2. Re-advertised Route Policies
6.3.2. When to Use Route Policies
6.4. Route Policy Configuration Process Overview
6.5. Configuration Notes
6.5.1. General
6.6. Configuring Route Policies with CLI
6.7. Route Policy Configuration Overview
6.7.1. When to Create Routing Policies
6.7.2. Default Route Policy Actions
6.7.3. Policy Evaluation
6.7.4. Damping
6.8. Basic Configurations
6.9. Configuring Route Policy Components
6.9.1. Beginning the Policy Statement
6.9.2. Creating a Route Policy
6.9.3. Configuring a Default Action
6.9.4. Configuring an Entry
6.9.5. Configuring Damping
6.9.5.1. Configuring a Prefix List
6.10. Route Policy Configuration Management Tasks
6.10.1. Editing Policy Statements and Parameters
6.10.2. Deleting an Entry
6.10.3. Deleting a Policy Statement
6.10.4. Use of Route Policies for IGMP Filtering
6.11. Route Policy Command Reference
6.11.1. Command Hierarchies
6.11.1.1. Route Policy Configuration Commands
6.11.1.2. Show Commands
6.11.2. Command Descriptions
6.11.2.1. Route Policy Command Reference
6.11.2.1.1. Generic Commands
6.11.2.1.2. Route Policy Options
6.11.2.1.3. Route Policy Damping Commands
6.11.2.1.4. Route Policy Prefix Commands
6.11.2.1.5. Route Policy Entry Match Commands
6.11.2.1.6. Route Policy Action Commands
6.11.2.2. Show Commands
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Routing Configuration Process
2. Multicast
2.1. Overview of Multicast
2.1.1. Multicast Models (SSM)
2.1.1.1. SSM
2.2. Multicast Features
2.2.1. IGMP
2.2.1.1. IGMP Versions and Interoperability Requirements
2.2.1.2. IGMP Version Transition
2.2.1.3. SSM Groups
2.2.2. PIM-SM
2.2.2.1. PIM-SM Functions
2.2.2.1.1. Phase One
2.2.2.1.2. Phase Two
2.2.2.1.3. Phase Three
2.2.2.2. Encapsulating Data Packets in the Register Tunnel
2.2.2.3. PIM Bootstrap Router Mechanism
2.2.2.4. PIM-SM Routing Policies
2.2.2.5. Reverse Path Forwarding Checks
2.2.2.5.1. Anycast RP for PIM-SM
2.2.2.6. Distributing PIM Joins over Multiple ECMP Paths
2.2.3. Multicast Debugging Tools
2.2.3.1. Mtrace
2.2.3.1.1. Finding the Last Hop Router
2.2.3.1.2. Directing the Response
2.2.3.2. Mrinfo
2.2.4. Configuration Guidelines for 7210 SAS
2.3. Configuring Multicast Parameters with CLI
2.3.1. Multicast Configuration Overview
2.3.2. Basic Configuration
2.3.3. Common Configuration Tasks
2.3.4. Configuring IGMP Parameters
2.3.4.1. Enabling IGMP
2.3.4.2. Configuring an IGMP Interface
2.3.4.3. Configuring Static Parameters
2.3.4.4. Configuring SSM Translation
2.3.5. Configuring PIM Parameters
2.3.5.1. Enabling PIM
2.3.5.2. Configuring PIM Interface Parameters
2.3.5.3. Importing PIM Join or Register Policies
2.3.6. Disabling IGMP or PIM
2.4. Multicast Command Reference
2.4.1. Command Hierarchies
2.4.1.1. Configuration Commands
2.4.1.2. IGMP Commands
2.4.1.3. PIM Commands
2.4.1.4. Operational Commands
2.4.1.5. Show Commands
2.4.1.6. Clear Commands
2.4.1.7. Debug Commands
2.4.2. Command Descriptions
2.4.2.1. Configuration Commands
2.4.2.1.1. Generic Commands
2.4.2.1.2. Multicast Commands
2.4.2.1.3. Router IGMP Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.1. Router PIM Commands
2.4.2.1.2. Operational Commands
2.4.2.1.3. Show Commands
2.4.2.1.1. IGMP Commands
2.4.2.2.3. Show Router PIM Commands
2.4.2.3.3. Clear Commands
2.4.2.4.3. Debug Commands
2.4.2.4.1. Debug IGMP Commands
2.4.2.4.2. Debug PIM Commands
2.4.2.1.4. Router PIM Commands
2.4.2.1.5. Operational Commands
2.4.2.2. Show Commands
2.4.2.2.1. IGMP Commands
2.4.2.3. Show Router PIM Commands
2.4.2.4. Clear Commands
2.4.2.5. Debug Commands
2.4.2.5.1. Debug IGMP Commands
2.4.2.5.2. Debug PIM Commands
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.2. OSPFv3 Authentication
3.1.3. OSPFv3 Graceful Restart Helper
3.1.4. Virtual Links
3.1.5. Neighbors and Adjacencies
3.1.6. Link-State Advertisements
3.1.7. Metrics
3.1.8. Authentication
3.1.9. Multiple OSPF Instances
3.1.9.1. Route Export Policies for OSPF
3.1.9.2. Preventing Route Redistribution Loops
3.1.10. IP Subnets
3.1.11. Preconfiguration Recommendations
3.2. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.2.1. IP FRR/LFA Configuration
3.2.1.1. Reducing the Scope of the LFA Calculation by SPF
3.2.2. ECMP Considerations
3.2.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.2.4. IP FRR and BGP Next-Hop Resolution
3.2.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.2.5.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
3.2.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.3.1. Configuration of Route Next-Hop Policy Template
3.3.1.1. Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
3.3.1.2. Configuring SRLG Group Constraint in Route Next-Hop Policy
3.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.3.1.4. Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
3.3.2. Application of Route Next-Hop Policy Template to an Interface
3.3.3. Excluding Prefixes from LFA SPF
3.3.4. Modification to LFA Next-Hop Selection Algorithm
3.4. Segment Routing in Shortest Path Forwarding
3.4.1. LFA Protection Using Segment Routing Backup Node SID
3.4.1.1. Detailed Operation of LFA Protection Using Backup Node SID
3.4.1.2. Duplicate SID Handling
3.4.1.3. OSPF Control Plane Extensions
3.5. OSPF Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.6.1.1. OSPF Defaults
3.7. Configuring OSPF with CLI
3.8. OSPF Configuration Guidelines
3.9. Basic OSPF Configuration
3.9.1. Configuring the Router ID
3.10. Configuring OSPF Components
3.10.1. Configuring OSPF Parameters
3.10.2. Configuring OSPFv3 Parameters
3.10.3. Configuring an OSPF and OSPFv3 Area
3.10.4. Configuring an OSPF and OSPFv3 Stub Area
3.10.5. Configuring a Not-So-Stubby Area
3.10.6. Configuring a Virtual Link
3.10.7. Configuring an Interface
3.10.8. Configuring Authentication
3.10.9. Assigning a Designated Router
3.10.10. Configuring Route Summaries
3.10.11. Configuring Route Preferences
3.11. OSPF Configuration Management Tasks
3.11.1. Modifying a Router ID
3.11.2. Deleting a Router ID
3.11.3. Modifying OSPF Parameters
3.12. OSPF Command Reference
3.12.1. Command Hierarchies
3.12.1.1. Configuration Commands for OSPF
3.12.1.2. Show Commands
3.12.1.3. Clear Commands
3.12.1.4. Debug Commands
3.12.2. Command Descriptions
3.12.2.1. Configuration Commands
3.12.2.1.1. Generic Commands
3.12.2.1.2. OSPF Global Commands
3.12.2.1.3. OSPF Area Commands
3.12.2.1.4. Interface/Virtual Link Commands
3.12.2.2. Show Commands
3.12.2.3. Clear Commands
3.12.2.4. Debug Commands
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.4. IS-IS PDU Configuration
4.1.5. IS-IS Operations
4.1.6. IS-IS Route Summarization
4.1.7. IS-IS Multi-Topology for IPv6
4.1.8. IS-IS Administrative Tags
4.1.8.1. Setting Route Tags
4.1.8.2. Using Route Tags
4.1.9. Segment Routing in Shortest Path Forwarding
4.1.9.1. Segment Routing Operational Procedures
4.1.9.1.1. Prefix Advertisement and Resolution
4.1.9.1.2. Error and Resource Exhaustion Handling
4.1.9.2. Segment Routing Tunnel Management
4.1.9.2.1. Tunnel MTU Determination
4.1.9.3. Remote LFA with Segment Routing
4.1.9.4. Data Path Support
4.1.9.4.1. Hash Label
4.1.9.5. Control Protocol Changes
4.1.9.5.1. IS-IS Control Protocol Changes
4.1.9.5.2. OSPF Control Protocol Changes
4.1.9.6. BGP Label Route Resolution Using Segment Routing Tunnels
4.1.9.7. Service Packet Forwarding with Segment Routing
4.1.9.8. Mirror Services
4.1.10. IGP-LDP Synchronization
4.2. IS-IS Configuration Process Overview
4.3. Configuration Notes
4.3.1. General
4.4. Configuring IS-IS with CLI
4.5. IS-IS Configuration Overview
4.5.1. Router Levels
4.5.2. Area Address Attributes
4.5.3. Interface Level Capability
4.5.4. Route Leaking
4.6. Basic IS-IS Configuration
4.7. Common Configuration Tasks
4.8. Configuring IS-IS Components
4.8.1. Enabling IS-IS
4.8.2. Modifying Router-Level Parameters
4.8.3. Configuring ISO Area Addresses
4.8.4. Configuring Global IS-IS Parameters
4.8.5. Migration to IS-IS Multi-Topology
4.8.6. Configuring Interface Parameters
4.8.6.1. Example: Configuring a Level 1 Area
4.8.6.2. Example: Modifying a Router’s Level Capability
4.9. IS-IS Configuration Management Tasks
4.9.1. Disabling IS-IS
4.9.2. Removing IS-IS
4.9.3. Modifying Global IS-IS Parameters
4.9.4. Modifying IS-IS Interface Parameters
4.9.5. Configuring Leaking
4.9.6. Redistributing External IS-IS Routers
4.10. IS-IS Command Reference
4.10.1. Command Hierarchies
4.10.1.1. Configuration Commands
4.10.1.2. Global Commands
4.10.1.3. Interface Command
4.10.1.4. Show Commands
4.10.1.5. Clear Commands
4.10.1.6. Debug Commands
4.10.2. Command Descriptions
4.10.2.1. IS-IS Configuration Commands
4.10.2.1.1. Generic Commands
4.10.2.2. Show Commands
4.10.2.3. Clear Commands
4.10.2.4. Debug Commands
5. BGP
5.1. BGP Overview
5.1.1. BGP Communication
5.1.1.1. Message Types
5.1.2. Group Configuration and Peers
5.1.3. Hierarchical Levels
5.1.4. Route Reflection
5.1.5. Fast External Failover
5.1.6. Sending of BGP Communities
5.1.7. ECMP and BGP Route Tunnels
5.1.8. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.1.8.1. VPN-IPv4 and VPN-IPv6 Route Resolution
5.1.9. Route Selection Criteria
5.1.10. BGP Path Attributes
5.1.10.1. NEXT_HOP Attribute
5.1.10.1.1. Next-hop Indirection
5.1.11. BGP Routing Information Base
5.1.11.1. LOC-RIB Features
5.1.11.2. BGP Fast Reroute
5.1.11.2.1. Calculating Backup Paths
5.1.11.2.2. Failure Detection and Switchover to the Backup Path
5.1.12. BGP Add-Path
5.1.12.1. Receiving Multiple Paths per Prefix from a BGP Peer
5.1.12.2. Path Selection with Add-Paths
5.1.12.3. BGP Decision Process with Add-Path
5.1.12.4. Advertising Multiple Paths Using Add-Path
5.1.12.5. Limiting the Number of Paths per Prefix
5.1.13. AIGP Metric
5.1.14. Command Interactions and Dependencies
5.1.14.1. Changing the ASN
5.1.14.2. Changing the Local ASN
5.1.14.3. Changing the Router ID at the Configuration Level
5.1.14.4. Hold Time and Keep Alive Timer Dependencies
5.1.14.5. Import and Export Route Policies
5.1.14.6. Route Damping and Route Policies
5.1.14.7. AS Override
5.1.15. Configuration Guideline for BGP
5.2. BGP Configuration Process Overview
5.3. Configuration Notes
5.3.1. General
5.3.1.1. BGP Defaults
5.3.1.2. BGP MIB Notes
5.4. Configuring BGP with CLI
5.5. BGP Configuration Overview
5.5.1. Preconfiguration Requirements
5.5.2. BGP Hierarchy
5.5.3. Internal and External BGP Configurations
5.6. Basic BGP Configuration
5.7. Common Configuration Tasks
5.7.1. Creating an Autonomous System
5.7.2. Configuring a Router ID
5.7.3. BGP Components
5.7.4. Configuring BGP
5.7.5. Configuring Group Attributes
5.7.6. Configuring Neighbor Attributes
5.7.7. Configuring AIGP
5.8. BGP Configuration Management Tasks
5.8.1. Modifying an ASN
5.8.2. Modifying the BGP Router ID
5.8.3. Modifying the Router-Level Router ID
5.8.4. Deleting a Neighbor
5.8.5. Deleting Groups
5.8.6. Editing BGP Parameters
5.9. BGP Command Reference
5.9.1. Command Hierarchies
5.9.1.1. Configuration Commands
5.9.1.1.1. Global BGP Commands
5.9.1.1.2. Group BGP Commands
5.9.1.1.3. Neighbor BGP Commands
5.9.1.1.4. Other BGP-Related Commands
5.9.1.2. Show Commands
5.9.1.3. Clear Commands
5.9.1.4. Debug Commands
5.9.2. Command Descriptions
5.9.2.1. Configuration Commands
5.9.2.2. Other BGP-Related Commands
5.9.2.3. Show Commands
5.9.2.4. Clear Commands
5.9.2.5. Debug Commands
6. Route Policies
6.1. In This Chapter
6.2. Configuring Route Policies
6.2.1. Policy Statements
6.2.1.1. Default Action Behavior
6.2.1.2. Denied IP Prefixes
6.2.1.3. Controlling Route Flapping
6.3. Regular Expressions
6.3.1. BGP and OSPF Route Policy Support
6.3.1.1. BGP Route Policies
6.3.1.2. Re-advertised Route Policies
6.3.2. When to Use Route Policies
6.4. Route Policy Configuration Process Overview
6.5. Configuration Notes
6.5.1. General
6.6. Configuring Route Policies with CLI
6.7. Route Policy Configuration Overview
6.7.1. When to Create Routing Policies
6.7.2. Default Route Policy Actions
6.7.3. Policy Evaluation
6.7.4. Damping
6.8. Basic Configurations
6.9. Configuring Route Policy Components
6.9.1. Beginning the Policy Statement
6.9.2. Creating a Route Policy
6.9.3. Configuring a Default Action
6.9.4. Configuring an Entry
6.9.5. Configuring Damping
6.9.5.1. Configuring a Prefix List
6.10. Route Policy Configuration Management Tasks
6.10.1. Editing Policy Statements and Parameters
6.10.2. Deleting an Entry
6.10.3. Deleting a Policy Statement
6.10.4. Use of Route Policies for IGMP Filtering
6.11. Route Policy Command Reference
6.11.1. Command Hierarchies
6.11.1.1. Route Policy Configuration Commands
6.11.1.2. Show Commands
6.11.2. Command Descriptions
6.11.2.1. Route Policy Command Reference
6.11.2.1.1. Generic Commands
6.11.2.1.2. Route Policy Options
6.11.2.1.3. Route Policy Damping Commands
6.11.2.1.4. Route Policy Prefix Commands
6.11.2.1.5. Route Policy Entry Match Commands
6.11.2.1.6. Route Policy Action Commands
6.11.2.2. Show Commands
7. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, R6, R12, Mxp, Sx, S Routing Protocols Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. Multicast
2.1. In This Chapter
2.2. Overview of Multicast
2.2.1. Multicast Models (SSM)
2.2.1.1. SSM
2.3. Multicast Features
2.3.1. IGMP
2.3.1.1. IGMP Versions and Interoperability Requirements
2.3.1.2. IGMP Version Transition
2.3.1.3. SSM Groups
2.3.2. PIM-SM
2.3.2.1. PIM-SM Functions
2.3.2.1.1. Phase One
2.3.2.1.2. Phase Two
2.3.2.1.3. Phase Three
2.3.2.2. Encapsulating Data Packets in the Register Tunnel
2.3.2.3. PIM Bootstrap Router Mechanism
2.3.2.4. PIM-SM Routing Policies
2.3.2.5. Reverse Path Forwarding Checks
2.3.2.5.1. Anycast RP for PIM-SM
2.3.2.6. Distributing PIM Joins over Multiple ECMP Paths
2.3.3. Dynamic Multicast Signaling over P2MP LDP
2.3.4. Multicast Debugging Tools
2.3.4.1. Mtrace
2.3.4.1.1. Finding the Last Hop Router
2.3.4.1.2. Directing the Response
2.3.4.2. Mrinfo
2.3.5. Configuration Guidelines for 7210 SAS
2.4. Configuring Multicast Parameters with CLI
2.4.1. Multicast Configuration Overview
2.4.2. Basic Configuration
2.4.3. Common Configuration Tasks
2.4.4. Configuring IGMP Parameters
2.4.4.1. Enabling IGMP
2.4.4.2. Configuring an IGMP Interface
2.4.4.3. Configuring Static Parameters
2.4.4.4. Configuring SSM Translation
2.4.5. Configuring PIM Parameters
2.4.5.1. Enabling PIM
2.4.5.2. Configuring PIM Interface Parameters
2.4.5.3. Importing PIM Join or Register Policies
2.4.6. Disabling IGMP or PIM
2.5. Multicast Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Configuration Commands
2.5.1.2. IGMP Commands
2.5.1.3. PIM Commands
2.5.1.4. Operational Commands
2.5.1.5. Show Commands
2.5.1.6. Clear Commands
2.5.1.7. Debug Commands
2.5.2. Command Descriptions
2.5.2.1. Configuration Commands
2.5.2.1.1. Generic Commands
2.5.2.1.2. Multicast Commands
2.5.2.1.3. Router IGMP Commands
2.5.2.1.4. Router PIM Commands
2.5.2.1.5. Operational Commands
2.5.2.2. Show Commands
2.5.2.2.1. IGMP Commands
2.5.2.3. Show Router PIM Commands
2.5.2.4. Clear Commands
2.5.2.5. Debug Commands
2.5.2.5.1. Debug IGMP Commands
2.5.2.5.2. Debug PIM Commands
3. RIP
3.1. RIP Overview
3.1.1. RIP Features
3.1.1.1. RIP Version Types
3.1.1.2. RIPv2 Authentication
3.1.1.3. Metrics
3.1.1.4. Timers
3.1.1.5. Import and Export Policies
3.1.1.6. RIP Packet Format
3.1.1.6.1. RIPv1 Format
3.1.1.6.2. RIPv2 Format
3.1.2. Hierarchical Levels
3.2. RIP Configuration Process Overview
3.3. Configuration Notes
3.3.1. General
3.4. Configuring RIP with CLI
3.5. RIP Configuration Overview
3.5.1. Preconfiguration Requirements
3.5.2. RIP Hierarchy
3.6. Basic RIP Configuration
3.7. Common Configuration Tasks
3.7.1. Configuring Interfaces
3.7.2. Configuring a Route Policy
3.7.3. Configuring RIP Parameters
3.7.4. Configuring Global-Level Parameters
3.7.5. Configuring Group-Level Parameters
3.7.6. Configuring Neighbor-Level Parameters
3.8. RIP Configuration Management Tasks
3.8.1. Modifying RIP Parameters
3.8.2. Deleting a Group
3.8.3. Deleting a Neighbor
3.9. RIP Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Configuration Commands
3.9.1.1.1. Group Commands
3.9.1.1.2. Neighbor Commands
3.9.1.2. Show RIP Commands
3.9.1.3. Clear RIP Commands
3.9.1.4. Debug RIP Commands
3.9.2. Command Descriptions
3.9.2.1. RIP Configuration Commands
3.9.2.1.1. Generic Commands
3.9.2.1.2. RIP Commands
3.9.2.2. Show Commands
3.9.2.3. Clear Commands
3.9.2.4. Debug RIP Commands
4. OSPF
4.1. Configuring OSPF
4.1.1. OSPF Areas
4.1.1.1. Backbone Area
4.1.1.2. Stub Area
4.1.1.3. Not-So-Stubby Area
4.1.1.3.1. OSPF Super Backbone
4.1.1.3.2. Sham Links
4.1.1.3.3. Implementing the OSPF Super Backbone
4.1.1.3.4. Loop Avoidance
4.1.1.3.5. DN-BIT
4.1.1.3.6. Route Tag
4.1.1.3.7. Sham Links
4.1.2. OSPFv3 Authentication
4.1.3. Virtual Links
4.1.4. Neighbors and Adjacencies
4.1.5. Link-State Advertisements
4.1.6. Metrics
4.1.7. Authentication
4.1.8. Multiple OSPF Instances
4.1.8.1. Route Export Policies for OSPF
4.1.8.2. Preventing Route Redistribution Loops
4.1.9. IP Subnets
4.1.10. Preconfiguration Recommendations
4.2. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
4.2.1. LFA Configuration
4.2.1.1. Reducing the Scope of the LFA Calculation by SPF
4.2.2. ECMP Considerations
4.2.3. OSPF and IS-IS Support for Loop-Free Alternate Calculation
4.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
4.3.1. Configuration of Route Next-Hop Policy Template
4.3.1.1. Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
4.3.1.2. Configuring SRLG Group Constraint in Route Next-Hop Policy
4.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
4.3.1.4. Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
4.3.2. Application of Route Next-Hop Policy Template to an Interface
4.3.3. Excluding Prefixes from LFA SPF
4.3.4. Modification to LFA Next-Hop Selection Algorithm
4.4. Segment Routing in Shortest Path Forwarding
4.4.1. LFA Protection Using Segment Routing Backup Node SID
4.4.1.1. Detailed Operation of LFA Protection Using Backup Node SID
4.4.1.2. Duplicate SID Handling
4.4.1.3. OSPF Control Plane Extensions
4.5. OSPF Configuration Process Overview
4.6. Configuration Notes
4.6.1. General
4.6.1.1. OSPF Defaults
4.7. Configuring OSPF with CLI
4.8. OSPF Configuration Guidelines
4.9. Basic OSPF Configuration
4.9.1. Configuring the Router ID
4.10. Configuring OSPF Components
4.10.1. Configuring OSPF Parameters
4.10.2. Configuring an OSPF Area
4.10.3. Configuring a Stub Area
4.10.4. Configuring a Not-So-Stubby Area
4.10.5. Configuring a Virtual Link
4.10.6. Configuring an Interface
4.10.7. Configuring Authentication
4.10.8. Assigning a Designated Router
4.10.9. Configuring Route Summaries
4.10.10. Configuring Route Preferences
4.11. OSPF Configuration Management Tasks
4.11.1. Modifying a Router ID
4.11.2. Deleting a Router ID
4.11.3. Modifying OSPF Parameters
4.12. OSPF Command Reference
4.12.1. Command Hierarchies
4.12.1.1. Configuration Commands for OSPF
4.12.1.2. Configuration Commands for OSPF3
4.12.1.3. Show Commands
4.12.1.4. Clear Commands
4.12.1.5. Debug Commands
4.12.2. Command Descriptions
4.12.2.1. Configuration Commands
4.12.2.1.1. Generic Commands
4.12.2.1.2. OSPF Global Commands
4.12.2.1.3. OSPF Area Commands
4.12.2.1.4. Interface and Virtual Link Commands
4.12.2.2. Show Commands
4.12.2.3. Clear Commands
4.12.2.4. OSPF Debug Commands
5. IS-IS
5.1. Configuring IS-IS
5.1.1. Routing
5.1.2. IS-IS Frequently Used Terms
5.1.3. ISO Network Addressing
5.1.3.1. IS-IS PDU Configuration
5.1.3.2. IS-IS Operations
5.1.4. IS-IS Route Summarization
5.1.5. IS-IS Multi-Topology for IPv6
5.1.6. IS-IS Administrative Tags
5.1.6.1. Setting Route Tags
5.1.6.2. Using Route Tags
5.1.7. Segment Routing in Shortest Path Forwarding
5.1.7.1. Segment Routing Operational Procedures
5.1.7.1.1. Prefix Advertisement and Resolution
5.1.7.1.2. Error and Resource Exhaustion Handling
5.1.7.2. Segment Routing Tunnel Management
5.1.7.2.1. Tunnel MTU Determination
5.1.7.3. Remote LFA with Segment Routing
5.1.7.4. Data Path Support
5.1.7.4.1. Hash Label
5.1.7.5. Control Protocol Changes
5.1.7.5.1. IS-IS Control Protocol Changes
5.1.7.5.2. OSPF Control Protocol Changes
5.1.7.6. BGP Label Route Resolution Using Segment Routing Tunnels
5.1.7.7. Service Packet Forwarding with Segment Routing
5.1.7.8. Mirror Services
5.1.8. IGP-LDP Synchronization
5.2. IS-IS Configuration Process Overview
5.3. Configuration Notes
5.4. Configuring IS-IS with CLI
5.5. IS-IS Configuration Overview
5.5.1. Router Levels
5.5.2. Area Address Attributes
5.5.3. Interface Level Capability
5.5.4. Route Leaking
5.6. Basic IS-IS Configuration
5.7. Common Configuration Tasks
5.8. Configuring IS-IS Components
5.8.1. Enabling IS-IS
5.8.2. Modifying Router-Level Parameters
5.8.3. Configuring ISO Area Addresses
5.8.4. Configuring Global IS-IS Parameters
5.8.5. Configuring Interface Parameters
5.8.5.1. Example: Configuring a Level 1 Area
5.8.5.2. Example: Modifying a Router Level Capability
5.9. IS-IS Configuration Management Tasks
5.9.1. Disabling IS-IS
5.9.2. Removing IS-IS
5.9.3. Modifying Global IS-IS Parameters
5.9.4. Modifying IS-IS Interface Parameters
5.9.5. Configuring Leaking
5.9.6. Redistributing External IS-IS Routers
5.10. IS-IS Command Reference
5.10.1. Command Hierarchies
5.10.1.1. Configuration Commands
5.10.1.2. Global Commands
5.10.1.3. Interface Commands
5.10.1.4. Show Commands
5.10.1.5. Clear Commands
5.10.1.6. Debug Commands
5.10.2. Command Descriptions
5.10.2.1. IS-IS Configuration Commands
5.10.2.1.1. Generic Commands
5.10.2.2. Show Commands
5.10.2.3. Clear Commands
5.10.2.4. Debug Commands
6. BGP
6.1. In This Chapter
6.2. BGP Overview
6.2.1. BGP Communication
6.2.1.1. Message Types
6.2.2. Group Configuration and Peers
6.2.3. Hierarchical Levels
6.2.4. Route Reflection
6.2.5. Fast External Failover
6.2.6. Sending of BGP Communities
6.2.7. ECMP and BGP Route Tunnels
6.2.8. Next-Hop Resolution of BGP Labeled Routes to Tunnels
6.2.8.1. VPN-IPv4 and VPN-IPv6 Route Resolution
6.2.9. Route Selection Criteria
6.2.10. Enabling Best External
6.2.10.1. BGP Decision Process with Best External
6.2.10.2. Advertisement Rules with Best External
6.2.10.3. Displaying Best-External Routes
6.2.11. BGP Path Attributes
6.2.11.1. NEXT_HOP Attribute
6.2.11.1.1. Next-hop Indirection
6.2.12. BGP Routing Information Base (RIB)
6.2.12.1. LOC-RIB Features
6.2.12.2. BGP Fast Reroute
6.2.12.2.1. Calculating Backup Paths
6.2.12.2.2. Failure Detection and Switchover to the Backup Path
6.2.12.3. BGP Fast Reroute in a VPRN
6.2.12.3.1. BGP Fast Reroute in a VPRN Configuration
6.2.13. BGP Add-Path
6.2.13.1. Receiving Multiple Paths per Prefix from a BGP Peer
6.2.13.2. Path Selection with Add-Paths
6.2.13.3. BGP Decision Process with ADD-PATH
6.2.13.4. Advertising Multiple Paths using ADD-PATH
6.2.13.5. Limiting the Number of Paths per Prefix
6.2.14. AIGP Metric
6.2.15. Command Interactions and Dependencies
6.2.15.1. Changing the ASN
6.2.15.2. BGP Advertisement
6.2.15.3. Changing the Local ASN
6.2.15.4. Changing the Router ID at the Configuration Level
6.2.15.5. Hold Time and Keep Alive Timer Dependencies
6.2.15.6. Import and Export Route Policies
6.2.15.7. Route Damping and Route Policies
6.2.15.8. AS Override
6.2.16. Configuration Guideline for BGP
6.3. BGP Configuration Process Overview
6.4. Configuration Notes
6.4.1. General
6.4.1.1. BGP Defaults
6.4.1.2. BGP MIB Notes
6.5. Configuring BGP with CLI
6.6. BGP Configuration Overview
6.6.1. Preconfiguration Requirements
6.6.2. BGP Hierarchy
6.6.3. Internal and External BGP Configurations
6.7. Basic BGP Configuration
6.8. Common Configuration Tasks
6.8.1. Creating an Autonomous System
6.8.2. Configuring a Router ID
6.8.3. BGP Components
6.8.4. Configuring BGP
6.8.5. Configuring Group Attributes
6.8.6. Configuring Neighbor Attributes
6.8.7. Configuring AIGP
6.8.8. BGP Configuration Management Tasks
6.8.8.1. Modifying an ASN
6.8.8.2. Modifying the BGP Router ID
6.8.8.3. Modifying the Router-Level Router ID
6.8.8.4. Deleting a Neighbor
6.8.8.5. Deleting Groups
6.8.8.6. Editing BGP Parameters
6.9. BGP Command Reference
6.9.1. Command Hierarchies
6.9.1.1. Configuration Commands
6.9.1.2. Global BGP Commands
6.9.1.3. Group BGP Commands
6.9.1.4. Neighbor BGP Commands
6.9.1.5. Other BGP-Related Commands
6.9.1.6. Show Commands
6.9.1.7. Clear Commands
6.9.1.8. Debug Commands
6.9.2. Command Descriptions
6.9.2.1. Configuration Commands
6.9.2.2. Other BGP-Related Commands
6.9.2.3. Show Commands
6.9.2.4. Clear Commands
6.9.2.5. Debug Commands
7. Route Policies
7.1. Configuring Route Policies
7.1.1. Policy Statements
7.1.1.1. Default Action Behavior
7.1.1.2. Denied IP Prefixes
7.1.1.3. Controlling Route Flapping
7.2. Regular Expressions
7.2.1. BGP and OSPF Route Policy Support
7.2.1.1. BGP Route Policies
7.2.1.2. Re-advertised Route Policies
7.2.2. When to Use Route Policies
7.3. Route Policy Configuration Process Overview
7.4. Configuration Notes
7.4.1. General
7.5. Configuring Route Policies with CLI
7.6. Route Policy Configuration Overview
7.6.1. When to Create Routing Policies
7.6.2. Default Route Policy Actions
7.6.3. Policy Evaluation
7.6.4. Damping
7.7. Basic Configurations
7.8. Configuring Route Policy Components
7.8.1. Beginning the Policy Statement
7.8.2. Creating a Route Policy
7.8.3. Configuring a Default Action
7.8.4. Configuring an Entry
7.8.5. Configuring Damping
7.8.5.1. Configuring a Prefix List
7.9. Route Policy Configuration Management Tasks
7.9.1. Editing Policy Statements and Parameters
7.9.2. Deleting an Entry
7.9.3. Deleting a Policy Statement
7.10. Use of Route Policies for IGMP Filtering
7.11. Route Policy Command Reference
7.11.1. Command Hierarchies
7.11.1.1. Route Policy Configuration Commands
7.11.1.2. Show Commands
7.11.2. Command Descriptions
7.11.2.1. Generic Commands
7.11.2.2. Route Policy Options
7.11.2.3. Route Policy Damping Commands
7.11.2.4. Route Policy Prefix Commands
7.11.2.5. Route Policy Entry Match Commands
7.11.2.6. Route Policy Action Commands
7.11.2.7. Show Commands
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Router Configuration Process
2. Multicast
2.1. In This Chapter
2.2. Overview of Multicast
2.2.1. Multicast Models (SSM)
2.2.1.1. SSM
2.3. Multicast Features
2.3.1. IGMP
2.3.1.1. IGMP Versions and Interoperability Requirements
2.3.1.2. IGMP Version Transition
2.3.1.3. SSM Groups
2.3.2. PIM-SM
2.3.2.1. PIM-SM Functions
2.3.2.1.1. Phase One
2.3.2.1.2. Phase Two
2.3.2.1.3. Phase Three
2.3.2.2. Encapsulating Data Packets in the Register Tunnel
2.3.2.3. PIM Bootstrap Router Mechanism
2.3.2.4. PIM-SM Routing Policies
2.3.2.5. Reverse Path Forwarding Checks
2.3.2.5.1. Anycast RP for PIM-SM
2.3.2.6. Distributing PIM Joins over Multiple ECMP Paths
2.3.3. Dynamic Multicast Signaling over P2MP LDP
2.3.4. Multicast Debugging Tools
2.3.4.1. Mtrace
2.3.4.1.1. Finding the Last Hop Router
2.3.4.1.2. Directing the Response
2.3.4.2. Mrinfo
2.3.5. Configuration Guidelines for 7210 SAS
2.4. Configuring Multicast Parameters with CLI
2.4.1. Multicast Configuration Overview
2.4.2. Basic Configuration
2.4.3. Common Configuration Tasks
2.4.4. Configuring IGMP Parameters
2.4.4.1. Enabling IGMP
2.4.4.2. Configuring an IGMP Interface
2.4.4.3. Configuring Static Parameters
2.4.4.4. Configuring SSM Translation
2.4.5. Configuring PIM Parameters
2.4.5.1. Enabling PIM
2.4.5.2. Configuring PIM Interface Parameters
2.4.5.3. Importing PIM Join or Register Policies
2.4.6. Disabling IGMP or PIM
2.5. Multicast Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Configuration Commands
2.5.1.2. IGMP Commands
2.5.1.3. PIM Commands
2.5.1.4. Operational Commands
2.5.1.5. Show Commands
2.5.1.6. Clear Commands
2.5.1.7. Debug Commands
2.5.2. Command Descriptions
2.5.2.1. Configuration Commands
2.5.2.1.1. Generic Commands
2.5.2.1.2. Multicast Commands
2.5.2.1.3. Router IGMP Commands
2.5.2.1.4. Router PIM Commands
2.5.2.1.5. Operational Commands
2.5.2.2. Show Commands
2.5.2.2.1. IGMP Commands
2.5.2.3. Show Router PIM Commands
2.5.2.4. Clear Commands
2.5.2.5. Debug Commands
2.5.2.5.1. Debug IGMP Commands
2.5.2.5.2. Debug PIM Commands
3. RIP
3.1. RIP Overview
3.1.1. RIP Features
3.1.1.1. RIP Version Types
3.1.1.2. RIPv2 Authentication
3.1.1.3. Metrics
3.1.1.4. Timers
3.1.1.5. Import and Export Policies
3.1.1.6. RIP Packet Format
3.1.1.6.1. RIPv1 Format
3.1.1.6.2. RIPv2 Format
3.1.2. Hierarchical Levels
3.2. RIP Configuration Process Overview
3.3. Configuration Notes
3.3.1. General
3.4. Configuring RIP with CLI
3.5. RIP Configuration Overview
3.5.1. Preconfiguration Requirements
3.5.2. RIP Hierarchy
3.6. Basic RIP Configuration
3.7. Common Configuration Tasks
3.7.1. Configuring Interfaces
3.7.2. Configuring a Route Policy
3.7.3. Configuring RIP Parameters
3.7.4. Configuring Global-Level Parameters
3.7.5. Configuring Group-Level Parameters
3.7.6. Configuring Neighbor-Level Parameters
3.8. RIP Configuration Management Tasks
3.8.1. Modifying RIP Parameters
3.8.2. Deleting a Group
3.8.3. Deleting a Neighbor
3.9. RIP Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Configuration Commands
3.9.1.1.1. Group Commands
3.9.1.1.2. Neighbor Commands
3.9.1.2. Show RIP Commands
3.9.1.3. Clear RIP Commands
3.9.1.4. Debug RIP Commands
3.9.2. Command Descriptions
3.9.2.1. RIP Configuration Commands
3.9.2.1.1. Generic Commands
3.9.2.1.2. RIP Commands
3.9.2.2. Show Commands
3.9.2.3. Clear Commands
3.9.2.4. Debug RIP Commands
4. OSPF
4.1. Configuring OSPF
4.1.1. OSPF Areas
4.1.1.1. Backbone Area
4.1.1.2. Stub Area
4.1.1.3. Not-So-Stubby Area
4.1.1.3.1. OSPF Super Backbone
4.1.1.3.2. Sham Links
4.1.1.3.3. Implementing the OSPF Super Backbone
4.1.1.3.4. Loop Avoidance
4.1.1.3.5. DN-BIT
4.1.1.3.6. Route Tag
4.1.1.3.7. Sham Links
4.1.2. OSPFv3 Authentication
4.1.3. Virtual Links
4.1.4. Neighbors and Adjacencies
4.1.5. Link-State Advertisements
4.1.6. Metrics
4.1.7. Authentication
4.1.8. Multiple OSPF Instances
4.1.8.1. Route Export Policies for OSPF
4.1.8.2. Preventing Route Redistribution Loops
4.1.9. IP Subnets
4.1.10. Preconfiguration Recommendations
4.2. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
4.2.1. LFA Configuration
4.2.1.1. Reducing the Scope of the LFA Calculation by SPF
4.2.2. ECMP Considerations
4.2.3. OSPF and IS-IS Support for Loop-Free Alternate Calculation
4.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
4.3.1. Configuration of Route Next-Hop Policy Template
4.3.1.1. Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
4.3.1.2. Configuring SRLG Group Constraint in Route Next-Hop Policy
4.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
4.3.1.4. Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
4.3.2. Application of Route Next-Hop Policy Template to an Interface
4.3.3. Excluding Prefixes from LFA SPF
4.3.4. Modification to LFA Next-Hop Selection Algorithm
4.4. Segment Routing in Shortest Path Forwarding
4.4.1. LFA Protection Using Segment Routing Backup Node SID
4.4.1.1. Detailed Operation of LFA Protection Using Backup Node SID
4.4.1.2. Duplicate SID Handling
4.4.1.3. OSPF Control Plane Extensions
4.5. OSPF Configuration Process Overview
4.6. Configuration Notes
4.6.1. General
4.6.1.1. OSPF Defaults
4.7. Configuring OSPF with CLI
4.8. OSPF Configuration Guidelines
4.9. Basic OSPF Configuration
4.9.1. Configuring the Router ID
4.10. Configuring OSPF Components
4.10.1. Configuring OSPF Parameters
4.10.2. Configuring an OSPF Area
4.10.3. Configuring a Stub Area
4.10.4. Configuring a Not-So-Stubby Area
4.10.5. Configuring a Virtual Link
4.10.6. Configuring an Interface
4.10.7. Configuring Authentication
4.10.8. Assigning a Designated Router
4.10.9. Configuring Route Summaries
4.10.10. Configuring Route Preferences
4.11. OSPF Configuration Management Tasks
4.11.1. Modifying a Router ID
4.11.2. Deleting a Router ID
4.11.3. Modifying OSPF Parameters
4.12. OSPF Command Reference
4.12.1. Command Hierarchies
4.12.1.1. Configuration Commands for OSPF
4.12.1.2. Configuration Commands for OSPF3
4.12.1.3. Show Commands
4.12.1.4. Clear Commands
4.12.1.5. Debug Commands
4.12.2. Command Descriptions
4.12.2.1. Configuration Commands
4.12.2.1.1. Generic Commands
4.12.2.1.2. OSPF Global Commands
4.12.2.1.3. OSPF Area Commands
4.12.2.1.4. Interface and Virtual Link Commands
4.12.2.2. Show Commands
4.12.2.3. Clear Commands
4.12.2.4. OSPF Debug Commands
5. IS-IS
5.1. Configuring IS-IS
5.1.1. Routing
5.1.2. IS-IS Frequently Used Terms
5.1.3. ISO Network Addressing
5.1.3.1. IS-IS PDU Configuration
5.1.3.2. IS-IS Operations
5.1.4. IS-IS Route Summarization
5.1.5. IS-IS Multi-Topology for IPv6
5.1.6. IS-IS Administrative Tags
5.1.6.1. Setting Route Tags
5.1.6.2. Using Route Tags
5.1.7. Segment Routing in Shortest Path Forwarding
5.1.7.1. Segment Routing Operational Procedures
5.1.7.1.1. Prefix Advertisement and Resolution
5.1.7.1.2. Error and Resource Exhaustion Handling
5.1.7.2. Segment Routing Tunnel Management
5.1.7.2.1. Tunnel MTU Determination
5.1.7.3. Remote LFA with Segment Routing
5.1.7.4. Data Path Support
5.1.7.4.1. Hash Label
5.1.7.5. Control Protocol Changes
5.1.7.5.1. IS-IS Control Protocol Changes
5.1.7.5.2. OSPF Control Protocol Changes
5.1.7.6. BGP Label Route Resolution Using Segment Routing Tunnels
5.1.7.7. Service Packet Forwarding with Segment Routing
5.1.7.8. Mirror Services
5.1.8. IGP-LDP Synchronization
5.2. IS-IS Configuration Process Overview
5.3. Configuration Notes
5.4. Configuring IS-IS with CLI
5.5. IS-IS Configuration Overview
5.5.1. Router Levels
5.5.2. Area Address Attributes
5.5.3. Interface Level Capability
5.5.4. Route Leaking
5.6. Basic IS-IS Configuration
5.7. Common Configuration Tasks
5.8. Configuring IS-IS Components
5.8.1. Enabling IS-IS
5.8.2. Modifying Router-Level Parameters
5.8.3. Configuring ISO Area Addresses
5.8.4. Configuring Global IS-IS Parameters
5.8.5. Configuring Interface Parameters
5.8.5.1. Example: Configuring a Level 1 Area
5.8.5.2. Example: Modifying a Router Level Capability
5.9. IS-IS Configuration Management Tasks
5.9.1. Disabling IS-IS
5.9.2. Removing IS-IS
5.9.3. Modifying Global IS-IS Parameters
5.9.4. Modifying IS-IS Interface Parameters
5.9.5. Configuring Leaking
5.9.6. Redistributing External IS-IS Routers
5.10. IS-IS Command Reference
5.10.1. Command Hierarchies
5.10.1.1. Configuration Commands
5.10.1.2. Global Commands
5.10.1.3. Interface Commands
5.10.1.4. Show Commands
5.10.1.5. Clear Commands
5.10.1.6. Debug Commands
5.10.2. Command Descriptions
5.10.2.1. IS-IS Configuration Commands
5.10.2.1.1. Generic Commands
5.10.2.2. Show Commands
5.10.2.3. Clear Commands
5.10.2.4. Debug Commands
6. BGP
6.1. In This Chapter
6.2. BGP Overview
6.2.1. BGP Communication
6.2.1.1. Message Types
6.2.2. Group Configuration and Peers
6.2.3. Hierarchical Levels
6.2.4. Route Reflection
6.2.5. Fast External Failover
6.2.6. Sending of BGP Communities
6.2.7. ECMP and BGP Route Tunnels
6.2.8. Next-Hop Resolution of BGP Labeled Routes to Tunnels
6.2.8.1. VPN-IPv4 and VPN-IPv6 Route Resolution
6.2.9. Route Selection Criteria
6.2.10. Enabling Best External
6.2.10.1. BGP Decision Process with Best External
6.2.10.2. Advertisement Rules with Best External
6.2.10.3. Displaying Best-External Routes
6.2.11. BGP Path Attributes
6.2.11.1. NEXT_HOP Attribute
6.2.11.1.1. Next-hop Indirection
6.2.12. BGP Routing Information Base (RIB)
6.2.12.1. LOC-RIB Features
6.2.12.2. BGP Fast Reroute
6.2.12.2.1. Calculating Backup Paths
6.2.12.2.2. Failure Detection and Switchover to the Backup Path
6.2.12.3. BGP Fast Reroute in a VPRN
6.2.12.3.1. BGP Fast Reroute in a VPRN Configuration
6.2.13. BGP Add-Path
6.2.13.1. Receiving Multiple Paths per Prefix from a BGP Peer
6.2.13.2. Path Selection with Add-Paths
6.2.13.3. BGP Decision Process with ADD-PATH
6.2.13.4. Advertising Multiple Paths using ADD-PATH
6.2.13.5. Limiting the Number of Paths per Prefix
6.2.14. AIGP Metric
6.2.15. Command Interactions and Dependencies
6.2.15.1. Changing the ASN
6.2.15.2. BGP Advertisement
6.2.15.3. Changing the Local ASN
6.2.15.4. Changing the Router ID at the Configuration Level
6.2.15.5. Hold Time and Keep Alive Timer Dependencies
6.2.15.6. Import and Export Route Policies
6.2.15.7. Route Damping and Route Policies
6.2.15.8. AS Override
6.2.16. Configuration Guideline for BGP
6.3. BGP Configuration Process Overview
6.4. Configuration Notes
6.4.1. General
6.4.1.1. BGP Defaults
6.4.1.2. BGP MIB Notes
6.5. Configuring BGP with CLI
6.6. BGP Configuration Overview
6.6.1. Preconfiguration Requirements
6.6.2. BGP Hierarchy
6.6.3. Internal and External BGP Configurations
6.7. Basic BGP Configuration
6.8. Common Configuration Tasks
6.8.1. Creating an Autonomous System
6.8.2. Configuring a Router ID
6.8.3. BGP Components
6.8.4. Configuring BGP
6.8.5. Configuring Group Attributes
6.8.6. Configuring Neighbor Attributes
6.8.7. Configuring AIGP
6.8.8. BGP Configuration Management Tasks
6.8.8.1. Modifying an ASN
6.8.8.2. Modifying the BGP Router ID
6.8.8.3. Modifying the Router-Level Router ID
6.8.8.4. Deleting a Neighbor
6.8.8.5. Deleting Groups
6.8.8.6. Editing BGP Parameters
6.9. BGP Command Reference
6.9.1. Command Hierarchies
6.9.1.1. Configuration Commands
6.9.1.2. Global BGP Commands
6.9.1.3. Group BGP Commands
6.9.1.4. Neighbor BGP Commands
6.9.1.5. Other BGP-Related Commands
6.9.1.6. Show Commands
6.9.1.7. Clear Commands
6.9.1.8. Debug Commands
6.9.2. Command Descriptions
6.9.2.1. Configuration Commands
6.9.2.2. Other BGP-Related Commands
6.9.2.3. Show Commands
6.9.2.4. Clear Commands
6.9.2.5. Debug Commands
7. Route Policies
7.1. Configuring Route Policies
7.1.1. Policy Statements
7.1.1.1. Default Action Behavior
7.1.1.2. Denied IP Prefixes
7.1.1.3. Controlling Route Flapping
7.2. Regular Expressions
7.2.1. BGP and OSPF Route Policy Support
7.2.1.1. BGP Route Policies
7.2.1.2. Re-advertised Route Policies
7.2.2. When to Use Route Policies
7.3. Route Policy Configuration Process Overview
7.4. Configuration Notes
7.4.1. General
7.5. Configuring Route Policies with CLI
7.6. Route Policy Configuration Overview
7.6.1. When to Create Routing Policies
7.6.2. Default Route Policy Actions
7.6.3. Policy Evaluation
7.6.4. Damping
7.7. Basic Configurations
7.8. Configuring Route Policy Components
7.8.1. Beginning the Policy Statement
7.8.2. Creating a Route Policy
7.8.3. Configuring a Default Action
7.8.4. Configuring an Entry
7.8.5. Configuring Damping
7.8.5.1. Configuring a Prefix List
7.9. Route Policy Configuration Management Tasks
7.9.1. Editing Policy Statements and Parameters
7.9.2. Deleting an Entry
7.9.3. Deleting a Policy Statement
7.10. Use of Route Policies for IGMP Filtering
7.11. Route Policy Command Reference
7.11.1. Command Hierarchies
7.11.1.1. Route Policy Configuration Commands
7.11.1.2. Show Commands
7.11.2. Command Descriptions
7.11.2.1. Generic Commands
7.11.2.2. Route Policy Options
7.11.2.3. Route Policy Damping Commands
7.11.2.4. Route Policy Prefix Commands
7.11.2.5. Route Policy Entry Match Commands
7.11.2.6. Route Policy Action Commands
7.11.2.7. Show Commands
8. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C Services Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.1.2. Service Types on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.3. Service Policies on 7210 SAS-D and 7210 SAS-Dxp
2.2. Service Policies on 77210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.3. Nokia Service Model on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.4. Nokia Service Model on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5. Service Entities on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.6. Service Entities on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1. Customers
2.7. SAPs on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.8. SAPs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.9. SAP Encapsulation Types and Identifiers
2.9.1. Ethernet Encapsulations Supported on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.9.2. Services and SAP Encapsulations
2.9.3. Default SAPs on a Dot1q Port
2.9.4. Default SAPs on a QinQ Port
2.9.4.1. Configuration Notes for Default QinQ SAPs for Transit Service in a Ring Deployment
2.9.5. SAP Configuration Considerations Applicable for SAPs Configured on Access-uplink Ports
2.9.5.1. Configuration Guidelines for 7210 SAS-D and 7210 SAS-Dxp
2.9.5.2. Configuration Guidelines for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.10. SDPs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.10.1. SDP Binding
2.10.2. Spoke and Mesh SDPs
2.10.3. SDP Using BGP Route Tunnel
2.10.4. SDP Keepalives
2.10.5. SDP Administrative Groups
2.10.6. Mixed-LSP Mode of Operation
2.11. G.8032/Ethernet Ring Protection Switching
2.11.1. Overview of G.8032 Operation
2.11.2. G.8032 — Ethernet Ring Sub-rings
2.11.3. G.8032 — Virtual and Non-virtual Channel
2.11.3.1. G.8032 — Ethernet Ring Sub-ring Using Non-virtual Link
2.11.4. G.8032 — OAM Considerations
2.11.5. G.8032 — QoS Considerations
2.11.6. G.8032 — Service and Solution Combinations
2.11.7. G.8032 — Configuration Guidelines
2.12. Layer 2 Control Processing
2.13. Service Creation Process Overview
2.13.1. Deploying and Provisioning Services
2.13.1.1. Phase 1: Core Network Construction
2.13.1.2. Phase 2: Service Administration
2.13.1.3. Phase 3: Service Provisioning
2.13.2. Configuration Notes
2.13.2.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.15. Basic Configuration
2.16. Common Configuration Tasks
2.16.1. Configuring Customer Accounts
2.16.1.1. Customer Information
2.17. Service Creation Process Overview on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.17.1. Deploying and Provisioning Services on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.17.1.1. Phase 1: Core Network Construction
2.17.1.2. Phase 2: Service Administration
2.17.1.3. Phase 3: Service Provisioning
2.17.2. Configuration Notes
2.17.2.1. General
2.17.3. Configuring Global Service Entities with CLI
2.17.3.1. Service Model Entities
2.17.4. Basic Configuration
2.17.5. Common Configuration Tasks
2.17.5.1. Configuring Customer Accounts
2.17.5.2. Customer Information
2.17.5.3. Configuring an SDP
2.17.5.4. SDP Configuration Tasks
2.17.6. Configuring an SDP
2.17.7. Configuring a Mixed-LSP SDP
2.18. ETH-CFM
2.18.1. Common Actionable Failures
2.18.2. MEP and MIP Support
2.18.2.1. ETH-CFM Support for 7210 SAS-D
2.18.2.2. ETH-CFM Support for 7210 SAS-Dxp
2.18.2.3. ETH-CFM Support for 7210 SAS-K 2F1C2T
2.18.2.4. ETH-CFM Support for 7210 SAS-K 2F6C4T
2.18.2.5. ETH-CFM Support for 7210 SAS-K 3SFP+ 8C
2.18.3. Configuring ETH-CFM Parameters
2.19. Service Management Tasks
2.19.1. Modifying Customer Accounts
2.19.2. Deleting Customers
2.20. Global Services Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Customer Commands
2.20.1.2. Pseudowire (PW) Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.3. Pseudowire (PW) routing Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.4. SDP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.5. SAP Commands for 7210 SAS-D and 7210 SAS-Dxp
2.20.1.6. SAP Commands for 7210 SAS-K 2F1C2T
2.20.1.7. SAP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.8. ETH-CFM Configuration Commands
2.20.1.9. Show Commands
2.20.1.10. Tools Perform Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.2. Command Descriptions
2.20.2.1. Global Service Configuration Commands
2.20.2.1.1. Generic Commands
2.20.2.1.2. Customer Management Commands
2.20.2.1.3. Pseudowire Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.2.1.4. SDP Commands
2.20.2.1.5. SDP Keepalive Commands
2.20.2.1.6. Tools Perform Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.2.2. Show, Clear, Debug, Commands
2.20.2.2.1. Services Show Commands
2.20.2.2.2. ETH-CFM Show Commands
3. VLL Services
3.1. Epipe
3.2. Epipe Service Overview
3.3. Epipe Oper State Decoupling on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.4. Dynamic Multi-Segment Pseudowire Routing
3.4.1. MS-PW Routing — Pseudowire Routing
3.4.1.1. MS-PW Routing — Static Routing
3.4.1.2. MS-PW Routing — Explicit Paths
3.4.2. MS-PW Routing — Configuring VLLs Using Dynamic MS-PWs
3.4.2.1. MS-PW Routing — Active/Passive T-PE Selection
3.4.2.2. MS-PW Routing — Automatic Endpoint Configuration
3.4.2.3. MS-PW Routing — Selecting a Path for an MS-PW
3.4.2.4. MS-PW Routing — Pseudowire Templates
3.4.3. MS-PW Routing — Pseudowire Redundancy
3.4.4. MS-PW Routing — VCCV OAM for Dynamic MS-PWs
3.4.5. MS-PW Routing — VCCV-Ping on Dynamic MS-PWs
3.4.6. MS-PW Routing — VCCV-Trace on Dynamic MS-PWs
3.4.7. MS-PW Routing — Example Dynamic MS-PW Configuration
3.5. PW Redundancy — Master-Slave Operation
3.5.1. PW Redundancy — Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.5.1.1. PW Redundancy — VLL Resilience
3.5.2. VLL Resilience for a Switched Pseudowire Path
3.5.2.1. PW Redundancy — VLL Resilience for a Switched PW Path
3.5.3. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
3.5.4. VLAN Range for SAPs (or Dot1q Range SAPs) in an Epipe Service
3.5.4.1. Processing Behavior for Dot1q Range SAPs in Access-uplink Mode on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
3.5.4.2. VLAN Range SAPs Feature Support and Restrictions
3.5.4.3. Processing Behavior for Dot1q Range SAPs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.5.4.3.1. VLAN Range SAPs Feature Support and Restrictions on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.5.5. Epipe Pseudowire Switching on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.5.5.1. Pseudowire Switching with Protection
3.5.5.2. Pseudowire Switching Behavior
3.5.5.2.1. Pseudowire Switching TLV
3.5.5.3. Pseudowire Redundancy
3.5.6. VLL Service Resilience with Pseudowire on 7210 SAS-K 3SFP+ 8C
3.5.6.1. VLL Resilience with Two Destination PE Nodes
3.5.6.1.1. VLL Resilience — Master-Slave Operation
3.5.6.2. VLL Resilience — Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.5.6.3. VLL Resilience for a Switched Pseudowire Path
3.5.6.4. VLL Resilience — Pseudowire Redundancy Service Models
3.5.6.4.1. Pseudowire Redundancy — Redundant VLL Service Model
3.5.6.4.2. Pseudowire Redundancy — T-LDP Status Notification Handling Rules
3.5.6.5. Processing Endpoint SAP Active/Standby Status Bits
3.5.6.6. Processing and Merging
3.5.7. MPLS Entropy Label and Hash Label
3.6. VLL Service Considerations
3.6.1. SDPs
3.6.2. SAP Encapsulations
3.6.3. QoS Policies
3.6.4. Filter Policies
3.6.5. MAC Resources
3.7. Configuring a VLL Service with CLI
3.7.1. Basic Configurations
3.7.2. Common Configuration Tasks
3.7.2.1. Creating an Epipe Service for 7210 SAS-D
3.7.2.2. Creating an Epipe Service for 7210 SAS-Dxp
3.7.2.3. Creating an Epipe Service with Range SAPs
3.7.2.4. Creating an Epipe Service for 7210 SAS-K 2F1C2T
3.7.2.5. Creating an Epipe Service for 7210 SAS-K 2F1C2T with Range SAPs
3.7.2.5.1. Configuring Epipe SAP Parameters
3.7.2.5.2. Distributed Epipe Service
3.7.2.5.3. Configuring SDP Bindings
3.7.2.5.4. Using Spoke-SDP Control Words
3.7.2.5.5. Configuring Ingress and Egress SAP Parameters
3.7.2.5.6. Configuring VLL Resilience
3.7.2.5.7. Configuring VLL Resilience for a Switched Pseudowire Path
3.7.2.6. Configuring Default QinQ SAPs for Epipe Transit Traffic in a Ring Scenario in Access-uplink Mode
3.7.3. Service Management Tasks
3.7.3.1. Modifying Epipe Service Parameters
3.7.3.2. Disabling an Epipe Service
3.7.3.3. Re-Enabling an Epipe Service
3.7.3.4. Deleting an Epipe Service
3.8. VLL Services Command Reference
3.8.1. Command Hierarchy
3.8.1.1. Epipe Service Configuration Commands
3.8.1.1.1. Epipe Global Commands for 7210 SAS-D
3.8.1.1.2. Epipe Global Commands for 7210 SAS-Dxp
3.8.1.1.3. Epipe Global Commands for 7210 SAS-K 2F1C2T
3.8.1.1.4. Epipe Global Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.8.1.1.5. Epipe SAP Configuration Commands
3.8.1.1.6. Epipe SAP Meter Override Commands
3.8.1.1.7. Epipe SAP Statistics Commands for 7210 SAS-D
3.8.1.1.8. Epipe Spoke-SDP Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.8.1.1.9. Epipe SAP Configuration — QoS and Filter Commands for 7210 SAS-D and 7210 SAS-Dxp
3.8.1.1.10. Epipe SAP Configuration — QoS and Filter Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.8.1.2. Connection Profile Commands
3.8.1.3. Show Commands
3.8.1.4. Clear Commands
3.8.2. Command Descriptions
3.8.2.1. VLL Service Configuration Commands
3.8.2.1.1. Generic Commands
3.8.2.1.2. VLL Global Commands
3.8.2.1.3. VLL SAP Commands
3.8.2.1.4. Connection Profile Commands
3.8.2.1.5. Service QoS and Filter Policy Commands
3.8.2.1.6. Spoke-SDP Commands
4. Ethernet Virtual Private Networks
4.1. EVPN Applications
4.1.1. EVPN for MPLS Tunnels in E-LAN Services
4.2. EVPN for MPLS Tunnels
4.2.1. BGP-EVPN Control Plane for MPLS Tunnels
4.2.1.1. EVPN Route Type 3 — Inclusive Multicast Ethernet Tag Route
4.2.1.2. EVPN Route Type 2 — MAC/IP Advertisement Route
4.2.1.3. EVPN Route Type 1 — Ethernet Auto-Discovery Route
4.2.1.4. EVPN Route Type 4 — ES route
4.2.1.5. BGP Tunnel Encapsulation Extended Community
4.2.2. EVPN for MPLS Tunnels in VPLS Services
4.2.2.1. EVPN and VPLS Integration
4.2.2.2. Auto-Derived RD in Services with Multiple BGP Families
4.2.3. EVPN Multi-Homing in VPLS Services
4.2.4. EVPN All-Active Multi-Homing
4.2.4.1. All-Active Multi-Homing Procedures
4.2.4.1.1. Designated Forwarder Election
4.2.4.1.2. Split-Horizon
4.2.4.1.3. Aliasing
4.2.4.2. All-Active Multi-Homing Service Model
4.2.4.3. ES Discovery and DF Election Procedures
4.2.4.3.1. Step 1 — ES Advertisement and Discovery
4.2.4.3.2. Step 2 — DF Election
4.2.4.3.3. Step 3 — DF and Non-DF Service Behavior
4.2.4.4. Aliasing
4.2.4.5. Network Failures and Convergence for All-Active Multi-Homing
4.2.4.6. Logical Failures on ESs and Blackholes
4.2.4.7. Transient Issues Due to MAC Route Delays
4.2.5. EVPN Single-Active Multi-Homing
4.2.5.1. Single-Active Multi-Homing Service Model
4.2.5.2. ES and DF Election Procedures
4.2.5.3. Backup PE Function
4.2.5.4. Network Failures and Convergence for Single-Active Multi-Homing
4.3. General EVPN Topics
4.3.1. ARP and ND Snooping and Proxy Support
4.3.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh, and Confirm-Messages
4.3.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
4.3.1.3. Procedure to Add the R Flag to a Specified Entry
4.3.2. BGP-EVPN MAC Mobility
4.3.3. BGP-EVPN MAC Duplication
4.3.4. Conditional Static MAC and Protection
4.3.5. BGP and EVPN Route Selection for EVPN Routes
4.3.6. Interaction of EVPN and Other Features
4.3.6.1. Interaction of EVPN-MPLS with Existing VPLS Features
4.3.7. Routing Policies for BGP EVPN Routes
4.4. Configuring an EVPN Service with CLI
4.4.1. EVPN-MPLS Configuration Examples
4.4.1.1. EVPN All-active Multi-homing Example
4.4.1.2. EVPN Single-active Multi-homing Example
4.5. EVPN Command Reference
4.5.1. Command Hierarchies
4.5.1.1. EVPN Configuration Commands
4.5.1.2. EVPN Show Commands
4.5.1.3. EVPN Clear Commands
4.5.1.4. EVPN Tools Commands
4.5.2. Command Descriptions
4.5.2.1. EVPN Configuration Commands
4.5.2.2. EVPN Show Commands
4.5.2.3. EVPN Clear Commands
4.5.2.4. Tools Commands
5. Virtual Private LAN Service
5.1. VPLS Service Overview
5.1.1. VPLS Packet Walk-through for a Local service
5.1.2. VPLS Packet Walk-through for a Distributed service
5.2. VPLS Features
5.2.1. VPLS Enhancements on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.2. VPLS Enhancements on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.3. VPLS over MPLS - supported on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.4. VPLS over SAPs
5.2.5. VPLS MAC Learning and Packet Forwarding
5.2.5.1. IGMP Snooping on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.5.2. IGMP Snooping on 7210 SAS-K 2F6C4Tand 7210 SAS-K 3SFP+ 8C
5.2.5.3. Multicast VLAN Registration (MVR) support
5.2.5.3.1. Configuration Guidelines for MVR
5.2.6. L2 Forwarding Table Management
5.2.6.1. FIB Size on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.6.2. FIB Size on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.6.3. FIB Size Alarms
5.2.6.4. Local Aging Timers on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.6.5. Local and Remote Aging Timers on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.6.6. Disable MAC Aging
5.2.6.7. Disable MAC Learning
5.2.6.8. Unknown MAC Discard
5.2.6.9. VPLS and Rate Limiting
5.2.6.10. MAC Move
5.2.6.11. Split Horizon SAP Groups
5.2.6.11.1. Split Horizon SAP Groups and Split Horizon Spoke-SDP Groups on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.7. VPLS and Spanning Tree Protocol
5.2.7.1. Spanning Tree Operating Modes
5.2.7.2. Multiple Spanning Tree
5.2.7.2.1. Redundancy Access to VPLS
5.2.7.3. MSTP for QinQ SAPs
5.2.7.3.1. MSTP General Principles
5.2.7.3.2. MSTP in the 7210 SAS Platform
5.2.7.4. Enhancements to the Spanning Tree Protocol in MPLS-based VPLS Service (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Only)
5.2.7.4.1. L2PT Termination
5.2.7.4.2. BPDU Translation
5.2.7.4.3. L2PT and BPDU Translation
5.2.8. VPLS Access Redundancy
5.2.8.1. STP-Based Redundant Access to VPLS
5.2.9. VPLS Redundancy on 7210 SAS-K 2F6C4Tand 7210 SAS-K 3SFP+ 8C using MPLS uplinks
5.2.9.1. Spoke-SDP Redundancy on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.9.2. Spoke-SDP Based Redundant Access on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.9.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10. VPLS Access Redundancy When Using MPLS Uplinks on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.1. STP-Based Redundant Access to VPLS Using PWs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.2. Redundant Access to VPLS Without STP and Using MPLS Uplinks on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.3. MAC Flush Message Processing in VPLS Services With MPLS Uplinks on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.4. Dual Homing to a VPLS Service on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.11. VPLS Service Considerations
5.2.11.1. SAP Encapsulations
5.2.11.2. VLAN Processing
5.3. BGP-AD VPLS
5.3.1. BGP-AD and Target LDP (T-LDP) Interaction on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.3.2. BGP-AD VPLS - SDP Usage
5.3.3. BGP-AD VPLS - Automatic Creation of SDPs
5.3.4. BGP-AD VPLS - Manually Provisioned SDP
5.3.5. BGP-AD VPLS - Automatic Instantiation of Pseudowires (SDP Bindings)
5.3.6. BGP-AD VPLS - Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS service
5.3.7. BGP-AD VPLS - Resiliency Schemes
5.4. Routed VPLS
5.4.1. IES or VPRN IP Interface Binding
5.4.2. Assigning a Service Name to a VPLS Service
5.4.3. Service Binding Requirements
5.4.3.1. Bound Service Name Assignment
5.4.3.2. Binding a Service Name to an IP Interface
5.4.3.3. IP Interface Attached VPLS Service Constraints
5.4.3.4. IP Interface and VPLS Operational State Coordination
5.4.3.5. IP Interface MTU and Fragmentation on 7210 SAS-D and 7210 SAS-Dxp
5.4.3.6. IP Interface MTU and Fragmentation on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8CC
5.4.4. ARP and VPLS FIB Interactions
5.4.5. Specific ARP Cache Behavior
5.4.5.1. The allow-ip-int-binding VPLS Flag
5.4.6. SAPs Only Supported on Standard Ethernet Ports
5.4.6.1. LAG Port Membership Constraints
5.4.6.2. VPLS Feature Support and Restrictions
5.4.7. VPLS SAP Ingress IP Filter Override on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.4.7.1. QoS Support for VPLS SAPs and IP interface
5.4.7.2. Routing Related Protocols on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.4.7.3. Spanning Tree and Split Horizon
5.4.8. R-VPLS Support and Caveats
5.5. Epipe Emulation Using Dot1q VLAN Range SAP in VPLS with G.8032
5.5.1. Epipe Emulation using Dot1q VLAN Range SAP in VPLS with G.8032 — Configuration Guidelines and Restrictions
5.6. Configuring a VPLS Service with CLI
5.6.1. Basic Configuration
5.6.2. Common Configuration Tasks
5.6.3. Configuring VPLS Components
5.6.3.1. Creating a VPLS Service
5.6.3.1.1. Enabling MAC Move
5.6.3.1.2. Configuring STP Bridge Parameters in a VPLS
5.6.3.2. Configuring a VPLS SAP
5.6.3.2.1. Local VPLS SAPs
5.6.3.2.2. Distributed VPLS service with SAPs (on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.3.2.3. Configuring Default QinQ SAPs to Pass all Traffic from Access to Access-uplink Port without any Tag Modifications
5.6.3.2.4. Configuring SAP-Specific STP Parameters
5.6.3.2.5. STP SAP Operational States
5.6.3.2.6. Configuring VPLS SAPs with Per-Service Split Horizon
5.6.4. Configuring VPLS Redundancy
5.6.4.1. Creating a Management VPLS for SAP Protection
5.6.4.2. Configuring Load Balancing with Management VPLS
5.6.4.3. Configuring a BGP-Auto-Discovery on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.6.4.4. Configuration Steps
5.6.5. BGP- AD- LDP Signaling
5.6.6. BGP AD- Pseudowire Template
5.6.7. Configuring a VPLS Management Interface
5.6.7.1. Creating a Management VPLS for SAP Protection Using MPLS Uplinks
5.6.7.2. Creating a Management VPLS for Spoke-SDP Protection, using MPLS uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.7.3. Configuring Load Balancing with Management VPLS using MPLS uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.7.4. Configuring Selective MAC Flush, when using MPLS Uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.7.5. Configuring AS Pseudo-wire in VPLS When Using MPLS Uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.7. Service Management Tasks
5.7.1. Modifying VPLS Service Parameters
5.7.2. Modifying Management VPLS Parameters
5.7.3. Deleting a Management VPLS
5.7.4. Disabling a Management VPLS
5.7.5. Deleting a VPLS Service
5.7.6. Disabling a VPLS Service
5.7.7. Re-Enabling a VPLS Service
5.8. VPLS Services Command Reference
5.8.1. Command Hierarchies
5.8.1.1. VPLS Service Configuration Commands
5.8.1.1.1. Global Commands for 7210 SAS-D and 7210 SAS-K 2F1C2T
5.8.1.1.2. Global Commands for 7210 SAS-Dxp
5.8.1.1.3. Global Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.2. VPLS Service xSTP Commands
5.8.1.3. VPLS Service SAP xSTP Commands
5.8.1.4. VPLS Service SAP DHCP Snooping Commands
5.8.1.5. SAP Commands
5.8.1.6. VPLS SAP QoS and Filter Commands for 7210 SAS-D and 7210 SAS-Dxp
5.8.1.7. VPLS SAP QoS and Filter Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.8.1.8. VPLS Service SAP IGMP Snooping and MVR Commands
5.8.1.9. VPLS SAP Meter Override Commands
5.8.1.10. VPLS SAP Statistics Commands for 7210 SAS-D
5.8.1.11. VPLS Mesh SDP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.12. VPLS Spoke-SDP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.13. Routed VPLS Commands for 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.14. Show Commands
5.8.1.15. Clear Commands
5.8.1.16. Debug Commands
5.8.2. Command Descriptions
5.8.2.1. VPLS Service Configuration Commands
5.8.2.1.1. Generic Commands
5.8.2.1.2. DHCP Commands
5.8.2.1.3. VPLS Service Commands
5.8.2.1.4. VPLS STP Commands
5.8.2.1.5. VPLS SAP Commands
5.8.2.1.6. ETH-CFM Service Commands
5.8.2.1.7. IGMP Snooping Commands
5.8.2.2. VPLS Show Commands
5.8.2.2.1. IGMP Snooping Show Commands
5.8.2.3. VPLS Clear Commands
5.8.2.4. VPLS Debug Commands
6. Internet Enhanced Service on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
6.1. IES Service Overview
6.2. IES Features
6.2.1. IP Interfaces
6.2.2. IPv6 Support for IES IP Interfaces Associated with Access-Uplink SAPs (on 7210 SAS-D and 7210 SAS-Dxp)
6.3. SAPs
6.3.1. Encapsulations
6.3.2. CPE Connectivity Check
6.3.3. QoS Policies
6.3.4. CPU QoS for IES interfaces in access-uplink mode
6.3.5. Filter Policies
6.4. Configuring an IES Service with CLI
6.4.1. Basic Configuration
6.4.2. Common Configuration Tasks
6.4.3. Configuring IES Components
6.4.3.1. Configuring an IES Service
6.4.3.2. Configuring IES Interface Parameters
6.4.3.3. Configuring IES SAP Parameters
6.4.3.4. Configuring SAP Parameters
6.4.4. Service Management Tasks
6.4.4.1. Modifying IES Service Parameters
6.4.4.2. Deleting an IES Service
6.4.4.3. Disabling an IES Service
6.4.4.4. Re-Enabling an IES Service
6.5. IES Services Command Reference
6.5.1. Command Hierarchies
6.5.1.1. Global IES Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.2. IES Interface Commands
6.5.1.3. IES Interface Routed VPLS Commands for 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
6.5.1.4. IES Interface SAP Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.5. IES Interface SAP Statistics Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.6. IES Interface SAP QoS and Filter Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.7. IES Interface IPv6 Commands (applicable only to access-uplink SAPs on 7210 SAS-D and 7210 SAS-Dxp)
6.5.1.8. Show Commands
6.5.2. Command Descriptions
6.5.2.1. IES Service Configuration Commands
6.5.2.1.1. Generic Commands
6.5.2.1.2. IES Global Commands
6.5.2.1.3. IES Interface IPv6 Commands
6.5.2.1.4. IES Interface Commands
6.5.2.1.5. IES Interface DHCP Commands
6.5.2.1.6. IES Interface ICMP Commands
6.5.2.1.7. IES Interface SAP Commands
6.5.2.1.8. IES Filter and QoS Commands
6.5.2.1.9. IES Interface SAP Statistics Commands
7. Internet Enhanced Service on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.1. IES Service Overview
7.2. IES Features
7.2.1. IP Interfaces
7.3. SAPs
7.3.1. IPv6 support for IES IP interfaces
7.3.2. Encapsulations
7.3.3. CPE Connectivity Check
7.3.4. QoS Policies
7.3.4.1. CPU QoS for IES Access Interfaces in Network Mode
7.3.5. Filter Policies
7.3.6. VRRP Support for IES IP Interfaces in Network Mode
7.4. Configuring an IES Service with CLI
7.4.1. Basic Configuration
7.4.2. Common Configuration Tasks
7.4.2.1. Configuring IES Components
7.4.2.1.1. Configuring an IES Service
7.4.2.1.2. Configuring IES Interface Parameters
7.4.2.1.3. Configuring IES SAP Parameters
7.4.2.1.4. Configuring VRRP
7.4.3. Service Management Tasks
7.4.3.1. Modifying IES Service Parameters
7.4.3.2. Deleting an IES Service
7.4.3.3. Disabling an IES Service
7.4.3.4. Re-Enabling an IES Service
7.5. IES Services Command Reference for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5.1. Command Hierarchies
7.5.1.1. Global Commands
7.5.1.2. Interface Commands
7.5.1.3. VRRP Commands (applicable only for network mode)
7.5.1.4. Routed VPLS Commands
7.5.1.5. IES SAP Configuration — QoS and Filter Commands
7.5.1.6. Interface IPv6 Commands
7.5.1.7. Show Commands
7.5.2. Command Descriptions
7.5.2.1. IES Service Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5.2.1.1. Generic Commands
7.5.2.1.2. IES Global Commands
7.5.2.1.3. IES Interface Commands
7.5.2.1.4. IES Filter Commands
7.5.2.1.5. IES Interface IPv6 Commands
7.5.2.2. IES Show Commands
8. Virtual Private Network Service on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.1. VPRN Service Overview
8.1.1. Routing Prerequisites
8.1.2. BGP Support
8.1.3. Route Distinguisher
8.1.4. Route Reflector
8.1.5. CE to PE Route Exchange
8.1.5.1. Route Redistribution
8.1.5.2. CPE Connectivity Check
8.2. VPRN Features
8.2.1. IP Interfaces
8.2.2. SAPs
8.2.2.1. IPv6 Support for VPRN IP Interfaces (6VPE) in Network Mode
8.2.2.2. Encapsulations
8.2.2.3. QoS Policies for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.2.2.4. Filter Policies
8.2.2.5. CPU QoS for VPRN interfaces
8.2.3. CE to PE Routing Protocols
8.2.3.1. PE to PE Tunneling Mechanisms
8.2.3.2. Per VRF Route Limiting
8.2.4. Spoke-SDP termination
8.2.4.1. Using OSPF in IP-VPNs
8.2.5. Service Label Mode of a VPRN
8.2.5.1. Inter-AS VPRNs
8.2.5.2. VRRP Support for VPRN IP Interfaces in Network Mode
8.3. Configuring a VPRN Service with CLI
8.3.1. Basic Configuration
8.3.2. Common Configuration Tasks
8.3.3. Configuring VPRN Components
8.3.3.1. Creating a VPRN Service
8.3.3.2. Configuring Global VPRN Parameters
8.3.3.3. Configuring Router Interfaces
8.3.3.4. Configuring VPRN Protocols - BGP
8.3.3.5. Configuring VPRN BGP Group and Neighbor Parameters
8.3.3.6. Configuring a VPRN Interface
8.3.3.7. Configuring a VPRN Interface SAP
8.3.3.8. Configuring VRRP
8.3.3.9. Configuring IPv6 Parameters for VPRN BGP
8.3.3.10. Configuring VPRN IPv6 Neighbor Discovery Parameters
8.3.3.11. Configuring OSPF for VPRN
8.3.4. Service Management Tasks
8.3.4.1. Modifying VPRN Service Parameters
8.3.4.2. Deleting a VPRN Service
8.3.4.3. Disabling a VPRN Service
8.3.4.4. Re-enabling a VPRN Service
8.4. VPRN Services Command Reference for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.4.1. Command Hierarchies
8.4.1.1. VPRN Service Configuration Commands
8.4.1.2. DHCP Server Commands
8.4.1.3. IPoE Commands
8.4.1.4. Interface Commands
8.4.1.5. IPv6 Interface Commands (supported only on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
8.4.1.6. IPv6 Router Advertisement Commands (supported only on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
8.4.1.7. Interface VRRP Commands (for Network Mode Only)
8.4.1.8. Routed VPLS Commands for VPRN Service
8.4.1.9. Interface SAP Commands
8.4.1.10. BGP Configuration Commands
8.4.1.11. OSPF Configuration Commands
8.4.1.12. Show Commands
8.4.1.13. Clear Commands
8.4.1.14. Debug Commands
8.4.2. Command Descriptions
8.4.2.1. VPRN Service Configuration Commands
8.4.2.1.1. Generic Commands
8.4.2.1.2. Global Commands
8.4.2.1.3. Router DHCP Configuration Commands
8.4.2.1.4. IPOE Commands
8.4.2.1.5. SDP Commands
8.4.2.1.6. Interface Commands
8.4.2.1.7. VPRN IPv6 Interface Commands
8.4.2.2. VPRN Interface IPv6 Commands
8.4.2.2.1. BGP Commands
8.4.2.3. OSPF Commands
8.4.2.4. VPRN Show Commands
8.4.2.5. VPRN Clear Commands
8.4.2.6. VPRN Debug Commands
9. Common CLI Command Descriptions
9.1. In This Chapter
9.1.1. Common Service Commands
9.1.1.1. SAP Syntax
10. Appendix: Port-Based Split Horizon
10.1. Overview
10.1.1. Topology
10.2. Configuration Guidelines
10.2.1. Verification
11. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.1.2. Service Types on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.1.3. Service Policies on 7210 SAS-D and 7210 SAS-Dxp
2.2. Service Policies on 77210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.3. Nokia Service Model on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.4. Nokia Service Model on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.5. Service Entities on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.6. Service Entities on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.6.1. Customers
2.7. SAPs on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
2.8. SAPs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.9. SAP Encapsulation Types and Identifiers
2.9.1. Ethernet Encapsulations Supported on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.9.2. Services and SAP Encapsulations
2.9.3. Default SAPs on a Dot1q Port
2.9.4. Default SAPs on a QinQ Port
2.9.4.1. Configuration Notes for Default QinQ SAPs for Transit Service in a Ring Deployment
2.9.5. SAP Configuration Considerations Applicable for SAPs Configured on Access-uplink Ports
2.9.5.1. Configuration Guidelines for 7210 SAS-D and 7210 SAS-Dxp
2.9.5.2. Configuration Guidelines for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
2.10. SDPs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.10.1. SDP Binding
2.10.2. Spoke and Mesh SDPs
2.10.3. SDP Using BGP Route Tunnel
2.10.4. SDP Keepalives
2.10.5. SDP Administrative Groups
2.10.6. Mixed-LSP Mode of Operation
2.11. G.8032/Ethernet Ring Protection Switching
2.11.1. Overview of G.8032 Operation
2.11.2. G.8032 — Ethernet Ring Sub-rings
2.11.3. G.8032 — Virtual and Non-virtual Channel
2.11.3.1. G.8032 — Ethernet Ring Sub-ring Using Non-virtual Link
2.11.4. G.8032 — OAM Considerations
2.11.5. G.8032 — QoS Considerations
2.11.6. G.8032 — Service and Solution Combinations
2.11.7. G.8032 — Configuration Guidelines
2.12. Layer 2 Control Processing
2.13. Service Creation Process Overview
2.13.1. Deploying and Provisioning Services
2.13.1.1. Phase 1: Core Network Construction
2.13.1.2. Phase 2: Service Administration
2.13.1.3. Phase 3: Service Provisioning
2.13.2. Configuration Notes
2.13.2.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.15. Basic Configuration
2.16. Common Configuration Tasks
2.16.1. Configuring Customer Accounts
2.16.1.1. Customer Information
2.17. Service Creation Process Overview on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.17.1. Deploying and Provisioning Services on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.17.1.1. Phase 1: Core Network Construction
2.17.1.2. Phase 2: Service Administration
2.17.1.3. Phase 3: Service Provisioning
2.17.2. Configuration Notes
2.17.2.1. General
2.17.3. Configuring Global Service Entities with CLI
2.17.3.1. Service Model Entities
2.17.4. Basic Configuration
2.17.5. Common Configuration Tasks
2.17.5.1. Configuring Customer Accounts
2.17.5.2. Customer Information
2.17.5.3. Configuring an SDP
2.17.5.4. SDP Configuration Tasks
2.17.6. Configuring an SDP
2.17.7. Configuring a Mixed-LSP SDP
2.18. ETH-CFM
2.18.1. Common Actionable Failures
2.18.2. MEP and MIP Support
2.18.2.1. ETH-CFM Support for 7210 SAS-D
2.18.2.2. ETH-CFM Support for 7210 SAS-Dxp
2.18.2.3. ETH-CFM Support for 7210 SAS-K 2F1C2T
2.18.2.4. ETH-CFM Support for 7210 SAS-K 2F6C4T
2.18.2.5. ETH-CFM Support for 7210 SAS-K 3SFP+ 8C
2.18.3. Configuring ETH-CFM Parameters
2.19. Service Management Tasks
2.19.1. Modifying Customer Accounts
2.19.2. Deleting Customers
2.20. Global Services Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Customer Commands
2.20.1.2. Pseudowire (PW) Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.3. Pseudowire (PW) routing Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.4. SDP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.5. SAP Commands for 7210 SAS-D and 7210 SAS-Dxp
2.20.1.6. SAP Commands for 7210 SAS-K 2F1C2T
2.20.1.7. SAP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.1.8. ETH-CFM Configuration Commands
2.20.1.9. Show Commands
2.20.1.10. Tools Perform Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.2. Command Descriptions
2.20.2.1. Global Service Configuration Commands
2.20.2.1.1. Generic Commands
2.20.2.1.2. Customer Management Commands
2.20.2.1.3. Pseudowire Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.2.1.4. SDP Commands
2.20.2.1.5. SDP Keepalive Commands
2.20.2.1.6. Tools Perform Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
2.20.2.2. Show, Clear, Debug, Commands
2.20.2.2.1. Services Show Commands
2.20.2.2.2. ETH-CFM Show Commands
3. VLL Services
3.1. Epipe
3.2. Epipe Service Overview
3.3. Epipe Oper State Decoupling on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.4. Dynamic Multi-Segment Pseudowire Routing
3.4.1. MS-PW Routing — Pseudowire Routing
3.4.1.1. MS-PW Routing — Static Routing
3.4.1.2. MS-PW Routing — Explicit Paths
3.4.2. MS-PW Routing — Configuring VLLs Using Dynamic MS-PWs
3.4.2.1. MS-PW Routing — Active/Passive T-PE Selection
3.4.2.2. MS-PW Routing — Automatic Endpoint Configuration
3.4.2.3. MS-PW Routing — Selecting a Path for an MS-PW
3.4.2.4. MS-PW Routing — Pseudowire Templates
3.4.3. MS-PW Routing — Pseudowire Redundancy
3.4.4. MS-PW Routing — VCCV OAM for Dynamic MS-PWs
3.4.5. MS-PW Routing — VCCV-Ping on Dynamic MS-PWs
3.4.6. MS-PW Routing — VCCV-Trace on Dynamic MS-PWs
3.4.7. MS-PW Routing — Example Dynamic MS-PW Configuration
3.5. PW Redundancy — Master-Slave Operation
3.5.1. PW Redundancy — Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.5.1.1. PW Redundancy — VLL Resilience
3.5.2. VLL Resilience for a Switched Pseudowire Path
3.5.2.1. PW Redundancy — VLL Resilience for a Switched PW Path
3.5.3. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
3.5.4. VLAN Range for SAPs (or Dot1q Range SAPs) in an Epipe Service
3.5.4.1. Processing Behavior for Dot1q Range SAPs in Access-uplink Mode on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
3.5.4.2. VLAN Range SAPs Feature Support and Restrictions
3.5.4.3. Processing Behavior for Dot1q Range SAPs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.5.4.3.1. VLAN Range SAPs Feature Support and Restrictions on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.5.5. Epipe Pseudowire Switching on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.5.5.1. Pseudowire Switching with Protection
3.5.5.2. Pseudowire Switching Behavior
3.5.5.2.1. Pseudowire Switching TLV
3.5.5.3. Pseudowire Redundancy
3.5.6. VLL Service Resilience with Pseudowire on 7210 SAS-K 3SFP+ 8C
3.5.6.1. VLL Resilience with Two Destination PE Nodes
3.5.6.1.1. VLL Resilience — Master-Slave Operation
3.5.6.2. VLL Resilience — Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.5.6.3. VLL Resilience for a Switched Pseudowire Path
3.5.6.4. VLL Resilience — Pseudowire Redundancy Service Models
3.5.6.4.1. Pseudowire Redundancy — Redundant VLL Service Model
3.5.6.4.2. Pseudowire Redundancy — T-LDP Status Notification Handling Rules
3.5.6.5. Processing Endpoint SAP Active/Standby Status Bits
3.5.6.6. Processing and Merging
3.5.7. MPLS Entropy Label and Hash Label
3.6. VLL Service Considerations
3.6.1. SDPs
3.6.2. SAP Encapsulations
3.6.3. QoS Policies
3.6.4. Filter Policies
3.6.5. MAC Resources
3.7. Configuring a VLL Service with CLI
3.7.1. Basic Configurations
3.7.2. Common Configuration Tasks
3.7.2.1. Creating an Epipe Service for 7210 SAS-D
3.7.2.2. Creating an Epipe Service for 7210 SAS-Dxp
3.7.2.3. Creating an Epipe Service with Range SAPs
3.7.2.4. Creating an Epipe Service for 7210 SAS-K 2F1C2T
3.7.2.5. Creating an Epipe Service for 7210 SAS-K 2F1C2T with Range SAPs
3.7.2.5.1. Configuring Epipe SAP Parameters
3.7.2.5.2. Distributed Epipe Service
3.7.2.5.3. Configuring SDP Bindings
3.7.2.5.4. Using Spoke-SDP Control Words
3.7.2.5.5. Configuring Ingress and Egress SAP Parameters
3.7.2.5.6. Configuring VLL Resilience
3.7.2.5.7. Configuring VLL Resilience for a Switched Pseudowire Path
3.7.2.6. Configuring Default QinQ SAPs for Epipe Transit Traffic in a Ring Scenario in Access-uplink Mode
3.7.3. Service Management Tasks
3.7.3.1. Modifying Epipe Service Parameters
3.7.3.2. Disabling an Epipe Service
3.7.3.3. Re-Enabling an Epipe Service
3.7.3.4. Deleting an Epipe Service
3.8. VLL Services Command Reference
3.8.1. Command Hierarchy
3.8.1.1. Epipe Service Configuration Commands
3.8.1.1.1. Epipe Global Commands for 7210 SAS-D
3.8.1.1.2. Epipe Global Commands for 7210 SAS-Dxp
3.8.1.1.3. Epipe Global Commands for 7210 SAS-K 2F1C2T
3.8.1.1.4. Epipe Global Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.8.1.1.5. Epipe SAP Configuration Commands
3.8.1.1.6. Epipe SAP Meter Override Commands
3.8.1.1.7. Epipe SAP Statistics Commands for 7210 SAS-D
3.8.1.1.8. Epipe Spoke-SDP Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
3.8.1.1.9. Epipe SAP Configuration — QoS and Filter Commands for 7210 SAS-D and 7210 SAS-Dxp
3.8.1.1.10. Epipe SAP Configuration — QoS and Filter Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
3.8.1.2. Connection Profile Commands
3.8.1.3. Show Commands
3.8.1.4. Clear Commands
3.8.2. Command Descriptions
3.8.2.1. VLL Service Configuration Commands
3.8.2.1.1. Generic Commands
3.8.2.1.2. VLL Global Commands
3.8.2.1.3. VLL SAP Commands
3.8.2.1.4. Connection Profile Commands
3.8.2.1.5. Service QoS and Filter Policy Commands
3.8.2.1.6. Spoke-SDP Commands
4. Ethernet Virtual Private Networks
4.1. EVPN Applications
4.1.1. EVPN for MPLS Tunnels in E-LAN Services
4.2. EVPN for MPLS Tunnels
4.2.1. BGP-EVPN Control Plane for MPLS Tunnels
4.2.1.1. EVPN Route Type 3 — Inclusive Multicast Ethernet Tag Route
4.2.1.2. EVPN Route Type 2 — MAC/IP Advertisement Route
4.2.1.3. EVPN Route Type 1 — Ethernet Auto-Discovery Route
4.2.1.4. EVPN Route Type 4 — ES route
4.2.1.5. BGP Tunnel Encapsulation Extended Community
4.2.2. EVPN for MPLS Tunnels in VPLS Services
4.2.2.1. EVPN and VPLS Integration
4.2.2.2. Auto-Derived RD in Services with Multiple BGP Families
4.2.3. EVPN Multi-Homing in VPLS Services
4.2.4. EVPN All-Active Multi-Homing
4.2.4.1. All-Active Multi-Homing Procedures
4.2.4.1.1. Designated Forwarder Election
4.2.4.1.2. Split-Horizon
4.2.4.1.3. Aliasing
4.2.4.2. All-Active Multi-Homing Service Model
4.2.4.3. ES Discovery and DF Election Procedures
4.2.4.3.1. Step 1 — ES Advertisement and Discovery
4.2.4.3.2. Step 2 — DF Election
4.2.4.3.3. Step 3 — DF and Non-DF Service Behavior
4.2.4.4. Aliasing
4.2.4.5. Network Failures and Convergence for All-Active Multi-Homing
4.2.4.6. Logical Failures on ESs and Blackholes
4.2.4.7. Transient Issues Due to MAC Route Delays
4.2.5. EVPN Single-Active Multi-Homing
4.2.5.1. Single-Active Multi-Homing Service Model
4.2.5.2. ES and DF Election Procedures
4.2.5.3. Backup PE Function
4.2.5.4. Network Failures and Convergence for Single-Active Multi-Homing
4.3. General EVPN Topics
4.3.1. ARP and ND Snooping and Proxy Support
4.3.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh, and Confirm-Messages
4.3.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
4.3.1.3. Procedure to Add the R Flag to a Specified Entry
4.3.2. BGP-EVPN MAC Mobility
4.3.3. BGP-EVPN MAC Duplication
4.3.4. Conditional Static MAC and Protection
4.3.5. BGP and EVPN Route Selection for EVPN Routes
4.3.6. Interaction of EVPN and Other Features
4.3.6.1. Interaction of EVPN-MPLS with Existing VPLS Features
4.3.7. Routing Policies for BGP EVPN Routes
4.4. Configuring an EVPN Service with CLI
4.4.1. EVPN-MPLS Configuration Examples
4.4.1.1. EVPN All-active Multi-homing Example
4.4.1.2. EVPN Single-active Multi-homing Example
4.5. EVPN Command Reference
4.5.1. Command Hierarchies
4.5.1.1. EVPN Configuration Commands
4.5.1.2. EVPN Show Commands
4.5.1.3. EVPN Clear Commands
4.5.1.4. EVPN Tools Commands
4.5.2. Command Descriptions
4.5.2.1. EVPN Configuration Commands
4.5.2.2. EVPN Show Commands
4.5.2.3. EVPN Clear Commands
4.5.2.4. Tools Commands
5. Virtual Private LAN Service
5.1. VPLS Service Overview
5.1.1. VPLS Packet Walk-through for a Local service
5.1.2. VPLS Packet Walk-through for a Distributed service
5.2. VPLS Features
5.2.1. VPLS Enhancements on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.2. VPLS Enhancements on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.3. VPLS over MPLS - supported on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.4. VPLS over SAPs
5.2.5. VPLS MAC Learning and Packet Forwarding
5.2.5.1. IGMP Snooping on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.5.2. IGMP Snooping on 7210 SAS-K 2F6C4Tand 7210 SAS-K 3SFP+ 8C
5.2.5.3. Multicast VLAN Registration (MVR) support
5.2.5.3.1. Configuration Guidelines for MVR
5.2.6. L2 Forwarding Table Management
5.2.6.1. FIB Size on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.6.2. FIB Size on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.6.3. FIB Size Alarms
5.2.6.4. Local Aging Timers on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
5.2.6.5. Local and Remote Aging Timers on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.6.6. Disable MAC Aging
5.2.6.7. Disable MAC Learning
5.2.6.8. Unknown MAC Discard
5.2.6.9. VPLS and Rate Limiting
5.2.6.10. MAC Move
5.2.6.11. Split Horizon SAP Groups
5.2.6.11.1. Split Horizon SAP Groups and Split Horizon Spoke-SDP Groups on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.7. VPLS and Spanning Tree Protocol
5.2.7.1. Spanning Tree Operating Modes
5.2.7.2. Multiple Spanning Tree
5.2.7.2.1. Redundancy Access to VPLS
5.2.7.3. MSTP for QinQ SAPs
5.2.7.3.1. MSTP General Principles
5.2.7.3.2. MSTP in the 7210 SAS Platform
5.2.7.4. Enhancements to the Spanning Tree Protocol in MPLS-based VPLS Service (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C Only)
5.2.7.4.1. L2PT Termination
5.2.7.4.2. BPDU Translation
5.2.7.4.3. L2PT and BPDU Translation
5.2.8. VPLS Access Redundancy
5.2.8.1. STP-Based Redundant Access to VPLS
5.2.9. VPLS Redundancy on 7210 SAS-K 2F6C4Tand 7210 SAS-K 3SFP+ 8C using MPLS uplinks
5.2.9.1. Spoke-SDP Redundancy on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.9.2. Spoke-SDP Based Redundant Access on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.9.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10. VPLS Access Redundancy When Using MPLS Uplinks on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.1. STP-Based Redundant Access to VPLS Using PWs on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.2. Redundant Access to VPLS Without STP and Using MPLS Uplinks on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.3. MAC Flush Message Processing in VPLS Services With MPLS Uplinks on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.10.4. Dual Homing to a VPLS Service on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.2.11. VPLS Service Considerations
5.2.11.1. SAP Encapsulations
5.2.11.2. VLAN Processing
5.3. BGP-AD VPLS
5.3.1. BGP-AD and Target LDP (T-LDP) Interaction on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.3.2. BGP-AD VPLS - SDP Usage
5.3.3. BGP-AD VPLS - Automatic Creation of SDPs
5.3.4. BGP-AD VPLS - Manually Provisioned SDP
5.3.5. BGP-AD VPLS - Automatic Instantiation of Pseudowires (SDP Bindings)
5.3.6. BGP-AD VPLS - Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS service
5.3.7. BGP-AD VPLS - Resiliency Schemes
5.4. Routed VPLS
5.4.1. IES or VPRN IP Interface Binding
5.4.2. Assigning a Service Name to a VPLS Service
5.4.3. Service Binding Requirements
5.4.3.1. Bound Service Name Assignment
5.4.3.2. Binding a Service Name to an IP Interface
5.4.3.3. IP Interface Attached VPLS Service Constraints
5.4.3.4. IP Interface and VPLS Operational State Coordination
5.4.3.5. IP Interface MTU and Fragmentation on 7210 SAS-D and 7210 SAS-Dxp
5.4.3.6. IP Interface MTU and Fragmentation on 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8CC
5.4.4. ARP and VPLS FIB Interactions
5.4.5. Specific ARP Cache Behavior
5.4.5.1. The allow-ip-int-binding VPLS Flag
5.4.6. SAPs Only Supported on Standard Ethernet Ports
5.4.6.1. LAG Port Membership Constraints
5.4.6.2. VPLS Feature Support and Restrictions
5.4.7. VPLS SAP Ingress IP Filter Override on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.4.7.1. QoS Support for VPLS SAPs and IP interface
5.4.7.2. Routing Related Protocols on 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.4.7.3. Spanning Tree and Split Horizon
5.4.8. R-VPLS Support and Caveats
5.5. Epipe Emulation Using Dot1q VLAN Range SAP in VPLS with G.8032
5.5.1. Epipe Emulation using Dot1q VLAN Range SAP in VPLS with G.8032 — Configuration Guidelines and Restrictions
5.6. Configuring a VPLS Service with CLI
5.6.1. Basic Configuration
5.6.2. Common Configuration Tasks
5.6.3. Configuring VPLS Components
5.6.3.1. Creating a VPLS Service
5.6.3.1.1. Enabling MAC Move
5.6.3.1.2. Configuring STP Bridge Parameters in a VPLS
5.6.3.2. Configuring a VPLS SAP
5.6.3.2.1. Local VPLS SAPs
5.6.3.2.2. Distributed VPLS service with SAPs (on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.3.2.3. Configuring Default QinQ SAPs to Pass all Traffic from Access to Access-uplink Port without any Tag Modifications
5.6.3.2.4. Configuring SAP-Specific STP Parameters
5.6.3.2.5. STP SAP Operational States
5.6.3.2.6. Configuring VPLS SAPs with Per-Service Split Horizon
5.6.4. Configuring VPLS Redundancy
5.6.4.1. Creating a Management VPLS for SAP Protection
5.6.4.2. Configuring Load Balancing with Management VPLS
5.6.4.3. Configuring a BGP-Auto-Discovery on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.6.4.4. Configuration Steps
5.6.5. BGP- AD- LDP Signaling
5.6.6. BGP AD- Pseudowire Template
5.6.7. Configuring a VPLS Management Interface
5.6.7.1. Creating a Management VPLS for SAP Protection Using MPLS Uplinks
5.6.7.2. Creating a Management VPLS for Spoke-SDP Protection, using MPLS uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.7.3. Configuring Load Balancing with Management VPLS using MPLS uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.7.4. Configuring Selective MAC Flush, when using MPLS Uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.6.7.5. Configuring AS Pseudo-wire in VPLS When Using MPLS Uplinks (7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
5.7. Service Management Tasks
5.7.1. Modifying VPLS Service Parameters
5.7.2. Modifying Management VPLS Parameters
5.7.3. Deleting a Management VPLS
5.7.4. Disabling a Management VPLS
5.7.5. Deleting a VPLS Service
5.7.6. Disabling a VPLS Service
5.7.7. Re-Enabling a VPLS Service
5.8. VPLS Services Command Reference
5.8.1. Command Hierarchies
5.8.1.1. VPLS Service Configuration Commands
5.8.1.1.1. Global Commands for 7210 SAS-D and 7210 SAS-K 2F1C2T
5.8.1.1.2. Global Commands for 7210 SAS-Dxp
5.8.1.1.3. Global Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.2. VPLS Service xSTP Commands
5.8.1.3. VPLS Service SAP xSTP Commands
5.8.1.4. VPLS Service SAP DHCP Snooping Commands
5.8.1.5. SAP Commands
5.8.1.6. VPLS SAP QoS and Filter Commands for 7210 SAS-D and 7210 SAS-Dxp
5.8.1.7. VPLS SAP QoS and Filter Commands for 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
5.8.1.8. VPLS Service SAP IGMP Snooping and MVR Commands
5.8.1.9. VPLS SAP Meter Override Commands
5.8.1.10. VPLS SAP Statistics Commands for 7210 SAS-D
5.8.1.11. VPLS Mesh SDP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.12. VPLS Spoke-SDP Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.13. Routed VPLS Commands for 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
5.8.1.14. Show Commands
5.8.1.15. Clear Commands
5.8.1.16. Debug Commands
5.8.2. Command Descriptions
5.8.2.1. VPLS Service Configuration Commands
5.8.2.1.1. Generic Commands
5.8.2.1.2. DHCP Commands
5.8.2.1.3. VPLS Service Commands
5.8.2.1.4. VPLS STP Commands
5.8.2.1.5. VPLS SAP Commands
5.8.2.1.6. ETH-CFM Service Commands
5.8.2.1.7. IGMP Snooping Commands
5.8.2.2. VPLS Show Commands
5.8.2.2.1. IGMP Snooping Show Commands
5.8.2.3. VPLS Clear Commands
5.8.2.4. VPLS Debug Commands
6. Internet Enhanced Service on 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
6.1. IES Service Overview
6.2. IES Features
6.2.1. IP Interfaces
6.2.2. IPv6 Support for IES IP Interfaces Associated with Access-Uplink SAPs (on 7210 SAS-D and 7210 SAS-Dxp)
6.3. SAPs
6.3.1. Encapsulations
6.3.2. CPE Connectivity Check
6.3.3. QoS Policies
6.3.4. CPU QoS for IES interfaces in access-uplink mode
6.3.5. Filter Policies
6.4. Configuring an IES Service with CLI
6.4.1. Basic Configuration
6.4.2. Common Configuration Tasks
6.4.3. Configuring IES Components
6.4.3.1. Configuring an IES Service
6.4.3.2. Configuring IES Interface Parameters
6.4.3.3. Configuring IES SAP Parameters
6.4.3.4. Configuring SAP Parameters
6.4.4. Service Management Tasks
6.4.4.1. Modifying IES Service Parameters
6.4.4.2. Deleting an IES Service
6.4.4.3. Disabling an IES Service
6.4.4.4. Re-Enabling an IES Service
6.5. IES Services Command Reference
6.5.1. Command Hierarchies
6.5.1.1. Global IES Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.2. IES Interface Commands
6.5.1.3. IES Interface Routed VPLS Commands for 7210 SAS-D, 7210 SAS-Dxp, and 7210 SAS-K 2F1C2T
6.5.1.4. IES Interface SAP Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.5. IES Interface SAP Statistics Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.6. IES Interface SAP QoS and Filter Commands for 7210 SAS-D and 7210 SAS-Dxp
6.5.1.7. IES Interface IPv6 Commands (applicable only to access-uplink SAPs on 7210 SAS-D and 7210 SAS-Dxp)
6.5.1.8. Show Commands
6.5.2. Command Descriptions
6.5.2.1. IES Service Configuration Commands
6.5.2.1.1. Generic Commands
6.5.2.1.2. IES Global Commands
6.5.2.1.3. IES Interface IPv6 Commands
6.5.2.1.4. IES Interface Commands
6.5.2.1.5. IES Interface DHCP Commands
6.5.2.1.6. IES Interface ICMP Commands
6.5.2.1.7. IES Interface SAP Commands
6.5.2.1.8. IES Filter and QoS Commands
6.5.2.1.9. IES Interface SAP Statistics Commands
7. Internet Enhanced Service on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.1. IES Service Overview
7.2. IES Features
7.2.1. IP Interfaces
7.3. SAPs
7.3.1. IPv6 support for IES IP interfaces
7.3.2. Encapsulations
7.3.3. CPE Connectivity Check
7.3.4. QoS Policies
7.3.4.1. CPU QoS for IES Access Interfaces in Network Mode
7.3.5. Filter Policies
7.3.6. VRRP Support for IES IP Interfaces in Network Mode
7.4. Configuring an IES Service with CLI
7.4.1. Basic Configuration
7.4.2. Common Configuration Tasks
7.4.2.1. Configuring IES Components
7.4.2.1.1. Configuring an IES Service
7.4.2.1.2. Configuring IES Interface Parameters
7.4.2.1.3. Configuring IES SAP Parameters
7.4.2.1.4. Configuring VRRP
7.4.3. Service Management Tasks
7.4.3.1. Modifying IES Service Parameters
7.4.3.2. Deleting an IES Service
7.4.3.3. Disabling an IES Service
7.4.3.4. Re-Enabling an IES Service
7.5. IES Services Command Reference for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5.1. Command Hierarchies
7.5.1.1. Global Commands
7.5.1.2. Interface Commands
7.5.1.3. VRRP Commands (applicable only for network mode)
7.5.1.4. Routed VPLS Commands
7.5.1.5. IES SAP Configuration — QoS and Filter Commands
7.5.1.6. Interface IPv6 Commands
7.5.1.7. Show Commands
7.5.2. Command Descriptions
7.5.2.1. IES Service Configuration Commands for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
7.5.2.1.1. Generic Commands
7.5.2.1.2. IES Global Commands
7.5.2.1.3. IES Interface Commands
7.5.2.1.4. IES Filter Commands
7.5.2.1.5. IES Interface IPv6 Commands
7.5.2.2. IES Show Commands
8. Virtual Private Network Service on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.1. VPRN Service Overview
8.1.1. Routing Prerequisites
8.1.2. BGP Support
8.1.3. Route Distinguisher
8.1.4. Route Reflector
8.1.5. CE to PE Route Exchange
8.1.5.1. Route Redistribution
8.1.5.2. CPE Connectivity Check
8.2. VPRN Features
8.2.1. IP Interfaces
8.2.2. SAPs
8.2.2.1. IPv6 Support for VPRN IP Interfaces (6VPE) in Network Mode
8.2.2.2. Encapsulations
8.2.2.3. QoS Policies for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.2.2.4. Filter Policies
8.2.2.5. CPU QoS for VPRN interfaces
8.2.3. CE to PE Routing Protocols
8.2.3.1. PE to PE Tunneling Mechanisms
8.2.3.2. Per VRF Route Limiting
8.2.4. Spoke-SDP termination
8.2.4.1. Using OSPF in IP-VPNs
8.2.5. Service Label Mode of a VPRN
8.2.5.1. Inter-AS VPRNs
8.2.5.2. VRRP Support for VPRN IP Interfaces in Network Mode
8.3. Configuring a VPRN Service with CLI
8.3.1. Basic Configuration
8.3.2. Common Configuration Tasks
8.3.3. Configuring VPRN Components
8.3.3.1. Creating a VPRN Service
8.3.3.2. Configuring Global VPRN Parameters
8.3.3.3. Configuring Router Interfaces
8.3.3.4. Configuring VPRN Protocols - BGP
8.3.3.5. Configuring VPRN BGP Group and Neighbor Parameters
8.3.3.6. Configuring a VPRN Interface
8.3.3.7. Configuring a VPRN Interface SAP
8.3.3.8. Configuring VRRP
8.3.3.9. Configuring IPv6 Parameters for VPRN BGP
8.3.3.10. Configuring VPRN IPv6 Neighbor Discovery Parameters
8.3.3.11. Configuring OSPF for VPRN
8.3.4. Service Management Tasks
8.3.4.1. Modifying VPRN Service Parameters
8.3.4.2. Deleting a VPRN Service
8.3.4.3. Disabling a VPRN Service
8.3.4.4. Re-enabling a VPRN Service
8.4. VPRN Services Command Reference for 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C
8.4.1. Command Hierarchies
8.4.1.1. VPRN Service Configuration Commands
8.4.1.2. DHCP Server Commands
8.4.1.3. IPoE Commands
8.4.1.4. Interface Commands
8.4.1.5. IPv6 Interface Commands (supported only on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
8.4.1.6. IPv6 Router Advertisement Commands (supported only on 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C)
8.4.1.7. Interface VRRP Commands (for Network Mode Only)
8.4.1.8. Routed VPLS Commands for VPRN Service
8.4.1.9. Interface SAP Commands
8.4.1.10. BGP Configuration Commands
8.4.1.11. OSPF Configuration Commands
8.4.1.12. Show Commands
8.4.1.13. Clear Commands
8.4.1.14. Debug Commands
8.4.2. Command Descriptions
8.4.2.1. VPRN Service Configuration Commands
8.4.2.1.1. Generic Commands
8.4.2.1.2. Global Commands
8.4.2.1.3. Router DHCP Configuration Commands
8.4.2.1.4. IPOE Commands
8.4.2.1.5. SDP Commands
8.4.2.1.6. Interface Commands
8.4.2.1.7. VPRN IPv6 Interface Commands
8.4.2.2. VPRN Interface IPv6 Commands
8.4.2.2.1. BGP Commands
8.4.2.3. OSPF Commands
8.4.2.4. VPRN Show Commands
8.4.2.5. VPRN Clear Commands
8.4.2.6. VPRN Debug Commands
9. Common CLI Command Descriptions
9.1. In This Chapter
9.1.1. Common Service Commands
9.1.1.1. SAP Syntax
10. Appendix: Port-Based Split Horizon
10.1. Overview
10.1.1. Topology
10.2. Configuration Guidelines
10.2.1. Verification
11. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, Mxp, Sx, S Services Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. SAPs
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Services and SAP Encapsulations
2.3.2.4. Default SAP on a Dot1q Port
2.3.2.5. Default SAPs on a QinQ Port (Supported Inly on 7210 SAS Devices Configured in Access-uplink Mode)
2.3.2.5.1. Configuration Notes for use of Default QinQ SAPs for Transit Service in a Ring Deployment
2.3.2.6. SAP Configuration Considerations (Applicable for Both Network Mode and Access-uplink Mode)
2.3.2.7. SAP Configuration Notes when Operating 7210 SAS Devices in Network Mode Only
2.3.2.8. QinQ SAP Configuration Restrictions for 7210 SAS Platforms in Network Operating Mode
2.3.2.9. SAP Configuration Notes for 7210 SAS Platforms in Access-uplink Operating Mode
2.3.3. SDPs
2.3.3.1. SDP Binding
2.3.3.2. Spoke and Mesh SDPs
2.3.3.3. SDP Using BGP Route Tunnel
2.3.3.4. SDP Keepalives
2.3.3.5. Mixed-LSP Mode of Operation
2.3.4. SAP and Service Scaling with High SAP Scale Mode on 7210 SAS-Mxp
2.3.4.1. Guidelines for Configuring High SAP Scale Mode
2.3.4.2. Guidelines for Configuring Low SAP Scale Mode
2.3.5. G.8032 Ethernet Ring Protection Switching
2.3.5.1. Overview of G.8032 Operation
2.3.5.2. Ethernet Ring Sub-rings
2.3.5.2.1. Virtual and Non-virtual Channel
2.3.5.2.2. Ethernet Ring Sub-ring Using Non-virtual Link
2.3.5.2.3. Lag Support
2.3.5.3. OAM Considerations
2.3.5.4. QoS Considerations
2.3.5.5. Support Service and Solution Combinations
2.3.5.6. Configuration Guidelines for G.8032
2.4. Service Creation Process Overview
2.5. Deploying and Provisioning Services
2.5.1. Phase 1: Core Network Construction
2.5.2. Phase 2: Service Administration
2.5.3. Phase 3: Service Provisioning
2.6. Configuration Notes
2.6.1. General
2.7. Configuring Global Service Entities with CLI
2.8. Service Model Entities
2.9. Basic Configuration
2.10. Common Configuration Tasks
2.10.1. Configuring Customers Accounts
2.10.1.1. Customer Information
2.10.2. Configuring an SDP
2.10.2.1. SDP Configuration Tasks
2.10.2.2. Configuring an SDP
2.10.2.3. Configuring a Mixed-LSP SDP
2.11. Ethernet Connectivity Fault Management
2.11.1. MA, MEP, MIP, and MD Levels
2.11.1.1. Common Actionable Failures
2.11.1.2. MEP and MIP Support
2.11.2. Configuring ETH-CFM Parameters
2.11.3. Applying ETH-CFM Parameters
2.12. Layer 2 Control Processing
2.13. Service Management Tasks
2.13.1. Modifying Customer Accounts
2.13.2. Deleting Customers
2.13.3. Modifying SDPs
2.13.4. Deleting SDPs
2.14. Global Services Command Reference
2.14.1. Command Hierarchies
2.14.1.1. Global Service Configuration Commands
2.14.1.1.1. Customer Commands
2.14.1.1.2. Pseudowire (PW) Commands
2.14.1.1.3. SDP Commands
2.14.1.1.4. SAP Commands for 7210 SAS Platforms Operating in Network Mode
2.14.1.1.5. SAP Commands for 7210 SAS Platforms Operating in Access-uplink Mode
2.14.1.1.6. ETH-CFM Configuration Commands
2.14.1.2. Show Commands
2.14.1.3. Tools Commands
2.14.2. Command Descriptions
2.14.2.1. Global Service Configuration Commands
2.14.2.1.1. Generic Commands
2.14.2.1.2. Customer Management Commands
2.14.2.1.3. Pseudowire Commands
2.14.2.1.4. SDP Commands
2.14.2.1.5. SDP Keepalive Commands
2.14.2.2. Show Commands
2.14.2.2.1. Show Service Commands
2.14.2.2.2. Show ETH-CFM Commands
2.14.2.3. Tools Commands
2.14.2.3.1. Tools Perform Commands
3. VLL Services
3.1. Circuit Emulation (Cpipe) Services
3.1.1. Cpipe Service Overview
3.1.2. Cpipe Service Modes
3.1.2.1. Unstructured Mode (SAToP)
3.1.2.2. Structured Mode (CESoPSN)
3.1.2.3. TDM Pseudowire Encapsulation
3.1.2.4. Circuit Emulation Parameters and Options
3.1.2.4.1. Unstructured CES
3.1.2.4.2. Structured DS1/E1 CES without CAS
3.1.2.4.3. Structured T1/E1 CES with CAS
3.1.2.4.4. Packet Payload Size
3.1.2.4.5. Jitter Buffer
3.1.2.4.6. RTP Header
3.1.2.4.7. Control Word
3.1.2.4.8. Error Situations
3.2. Epipe Services
3.2.1. Epipe Services Overview
3.2.2. Epipe with PBB
3.2.3. Processing Packets Received with More Than Two Tags on a QinQ SAP in Epipe Service
3.2.3.1. Feature Support, Configuration Notes, and Restrictions
3.2.3.2. Configuration Example of Epipe Services for Processing of Packets Received with More Than Two Tags on a QinQ SAP
3.2.4. Epipe Operational State Decoupling
3.3. Pseudowire Switching
3.3.1. Pseudowire Switching with Protection
3.3.2. Pseudowire Switching Behavior
3.3.2.1. Pseudowire Switching TLV
3.3.2.2. Static-to-Dynamic Pseudowire Switching
3.3.3. Pseudowire Redundancy
3.3.3.1. VLL Resilience with Two Destination PE Nodes
3.3.4. Dynamic Multi-Segment Pseudowire Routing
3.3.4.1. Pseudowire Routing
3.3.4.1.1. Static Routing
3.3.4.1.2. Explicit Paths
3.3.4.2. Configuring VLLs Using Dynamic MS-PW
3.3.4.2.1. Active/Passive T-PE Selection
3.3.4.2.2. Automatic Endpoint Configuration
3.3.4.2.3. Selecting a Path for an MS-PW
3.3.4.2.4. Pseudowire Templates
3.3.4.3. Pseudowire Redundancy
3.3.4.4. VCCV OAM for Dynamic MS-PWs
3.3.4.5. VCCV-Ping on Dynamic MS-PWs
3.3.4.6. VCCV-Trace on Dynamic MS-PWs
3.3.5. Example Dynamic MS-PW Configuration
3.4. Master-Slave Operation
3.4.1. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.4.1.1. VLL Resilience Path
3.4.2. VLL Resilience for a Switched PW Path
3.4.3. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
3.4.4. VLL Resilience for a Switched Pseudowire Path
3.5. Pseudowire Redundancy Service Models
3.5.1. Redundant VLL Service Model
3.5.2. T-LDP Status Notification Handling Rules
3.5.2.1. Processing Endpoint SAP Active/Standby Status Bits
3.5.2.2. Processing and Merging
3.6. Epipe Configuration for MPLS-TP
3.6.1. SDPs
3.6.2. VLL Spoke-SDP Configuration
3.6.3. Credit-Based Algorithm
3.7. VLAN Range for SAPs in an Epipe Service
3.7.1. Processing Behavior for SAPs Using VLAN Ranges in Access-Uplink Mode
3.7.2. VLAN Range SAPs Feature Support and Restrictions
3.7.3. Processing Behavior for SAPs Using VLAN Ranges in Network Operating Mode
3.8. VLL Service Considerations
3.8.1. SDPs
3.8.2. SAP Encapsulations
3.8.3. QoS Policies
3.8.4. Filter Policies
3.8.5. MAC Resources
3.9. Configuring a VLL Service with CLI
3.9.1. Common Configuration Tasks
3.9.2. Configuring VLL Components
3.9.2.1. Creating a Cpipe Service
3.9.2.1.1. Basic Configuration
3.9.2.1.2. Configuration Requirements
3.9.2.1.3. Configuring Cpipe SAPs and Spoke-SDPs
3.9.2.2. Creating an Epipe Service in Network Mode
3.9.2.3. Creating an Epipe Service in Access-uplink Mode
3.9.2.3.1. Configuring Epipe SAP Parameters
3.9.2.4. Creating an Epipe Service for 7210 SAS-M and 7210 SAS-Mxp with Range SAPs
3.9.2.5. Configuring Default QinQ SAPs for Epipe Transit Traffic in a Ring Scenario in Access-uplink Mode
3.9.2.5.1. Configuring SDP Bindings
3.9.3. Using Spoke-SDP Control Words
3.9.4. Configuring VLL Resilience
3.9.5. Configuring VLL Resilience for a Switched Pseudowire Path
3.9.6. Service Management Tasks
3.9.6.1. Modifying a Cpipe Service
3.9.6.2. Deleting a Cpipe Service
3.9.6.3. Modifying Epipe Service Parameters
3.9.6.4. Disabling an Epipe Service
3.9.6.5. Re-Enabling an Epipe Service
3.9.6.6. Deleting an Epipe Service
3.10. VLL Services Command Reference
3.10.1. Command Hierarchies
3.10.1.1. VLL Service Configuration Commands
3.10.1.1.1. Cpipe Service Configuration Commands (for 7210 SAS-M only)
3.10.1.1.2. Epipe Global Commands (for Access-uplink Operating Mode)
3.10.1.1.3. Epipe Global Commands (for Network Operating Mode)
3.10.1.1.4. Epipe SAP Configuration Commands
3.10.1.1.5. Epipe SAP Meter Override Commands
3.10.1.1.6. Epipe SAP Statistics Commands
3.10.1.1.7. Epipe Spoke-SDP Configuration Commands
3.10.1.1.8. Epipe SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Sx/S 1/10GE Devices)
3.10.1.1.9. Epipe SAP QoS and Filter Commands (for 7210 SAS-Mxp)
3.10.1.1.10. Connection Profile Commands
3.10.1.2. Show Commands
3.10.1.3. Clear Commands
3.10.2. Command Descriptions
3.10.2.1. VLL Service Configuration Commands
3.10.2.1.1. Generic Commands
3.10.2.1.2. VLL Global Commands
3.10.2.1.3. VLL SAP Commands
3.10.2.1.4. Service Filter and QoS Policy Commands
3.10.2.1.5. Epipe Service SAP Statistics Commands
3.10.2.1.6. VLL SDP Commands
3.10.2.1.7. CES SAP Commands
3.10.2.1.8. Connection Profile Commands
3.10.2.2. Show Commands
3.10.2.3. Clear Commands
3.10.2.4. Debug Commands
4. Ethernet Virtual Private Networks
4.1. EVPN Applications
4.1.1. EVPN for MPLS Tunnels in E-LAN Services
4.2. EVPN for MPLS Tunnels
4.2.1. BGP-EVPN Control Plane for MPLS Tunnels
4.2.1.1. EVPN Route Type 3 — Inclusive Multicast Ethernet Tag Route
4.2.1.2. EVPN Route Type 2 — MAC/IP Advertisement Route
4.2.1.3. EVPN Route Type 1 — Ethernet Auto-Discovery Route
4.2.1.4. EVPN Route Type 4 — ES route
4.2.1.5. BGP Tunnel Encapsulation Extended Community
4.2.2. EVPN for MPLS Tunnels in VPLS Services
4.2.2.1. EVPN and VPLS Integration
4.2.2.2. Auto-Derived RD in Services with Multiple BGP Families
4.2.3. EVPN Multi-Homing in VPLS Services
4.2.4. EVPN All-Active Multi-Homing
4.2.4.1. All-Active Multi-Homing Procedures
4.2.4.1.1. Designated Forwarder Election
4.2.4.1.2. Split-Horizon
4.2.4.1.3. Aliasing
4.2.4.2. All-Active Multi-Homing Service Model
4.2.4.3. ES Discovery and DF Election Procedures
4.2.4.3.1. Step 1 — ES Advertisement and Discovery
4.2.4.3.2. Step 2 — DF Election
4.2.4.3.3. Step 3 — DF and Non-DF Service Behavior
4.2.4.4. Aliasing
4.2.4.5. Network Failures and Convergence for All-Active Multi-Homing
4.2.4.6. Logical Failures on ESs and Blackholes
4.2.4.7. Transient Issues Due to MAC Route Delays
4.2.5. EVPN Single-Active Multi-Homing
4.2.5.1. Single-Active Multi-Homing Service Model
4.2.5.2. ES and DF Election Procedures
4.2.5.3. Backup PE Function
4.2.5.4. Network Failures and Convergence for Single-Active Multi-Homing
4.3. General EVPN Topics
4.3.1. ARP and ND Snooping and Proxy Support
4.3.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh, and Confirm-Messages
4.3.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
4.3.1.3. Procedure to Add the R Flag to a Specified Entry
4.3.1.4. Configuration Guidelines for Proxy-ARP and Proxy-ND
4.3.1.4.1. Proxy-ARP and Proxy-ND Support for Spoke-SDP Bindings
4.3.2. BGP-EVPN MAC Mobility
4.3.3. BGP-EVPN MAC Duplication
4.3.4. Conditional Static MAC and Protection
4.3.5. BGP and EVPN Route Selection for EVPN Routes
4.3.6. Interaction of EVPN and Other Features
4.3.6.1. Interaction of EVPN-MPLS with Existing VPLS Features
4.3.7. Routing Policies for BGP EVPN Routes
4.4. Configuring an EVPN Service with CLI
4.4.1. EVPN-MPLS Configuration Examples
4.4.1.1. EVPN Single-active Multi-homing Example
4.5. EVPN Command Reference
4.5.1. Command Hierarchies
4.5.1.1. EVPN Configuration Commands
4.5.1.2. EVPN Show Commands
4.5.1.3. EVPN Clear Commands
4.5.1.4. EVPN Tools Commands
4.5.2. Command Descriptions
4.5.2.1. EVPN Configuration Commands
4.5.2.2. EVPN Show Commands
4.5.2.3. EVPN Clear Commands
4.5.2.4. Tools Commands
5. Virtual Private LAN Service
5.1. VPLS Service Overview
5.1.1. VPLS Packet Walk-Through in Network Mode
5.1.2. VPLS Packet Walk-Through in Access-uplink Mode
5.2. VPLS Features
5.2.1. VPLS Enhancements
5.2.2. VPLS over MPLS in Network Operating Mode
5.2.3. VPLS over QinQ Spokes for 7210 SAS Devices Configured in Access-uplink Operating Mode
5.2.4. VPLS MAC Learning and Packet Forwarding
5.2.5. IGMP Snooping in Network Operating Mode and Access-uplink Operating Mode in VPLS Service
5.2.5.1. Configuration Guidelines for IGMP Snooping in VPLS Service
5.2.6. Multicast VLAN Registration (MVR) Support in VPLS Service
5.2.6.1. Configuration Guidelines for MVR in VPLS Services
5.2.7. Layer 2 Forwarding Table Management
5.2.7.1. FIB Size
5.2.7.2. FIB Size Alarms
5.2.7.3. Local and Remote Aging Timers
5.2.7.4. Disable MAC Aging
5.2.7.5. Disable MAC Learning
5.2.7.6. Unknown MAC Discard
5.2.7.7. VPLS and Rate Limiting
5.2.7.8. MAC Move
5.2.7.8.1. Split Horizon SAP Groups and Split Horizon Spoke-SDP Groups
5.2.7.8.2. Configuration Guidelines for Use of Split Horizon Group in a VPLS Service
5.2.8. VPLS and Spanning Tree Protocol
5.2.8.1. Spanning Tree Operating Modes
5.2.8.2. Multiple Spanning Tree
5.2.8.2.1. Redundancy Access to VPLS
5.2.8.3. MSTP for QinQ SAPs
5.2.8.4. Provider MSTP
5.2.8.4.1. MSTP General Principles
5.2.8.4.2. MSTP in the 7210 SAS Platform
5.2.8.5. Enhancements to the Spanning Tree Protocol
5.2.8.5.1. L2PT Termination
5.2.8.5.2. BPDU Translation
5.2.8.5.3. L2PT and BPDU Translation
5.2.9. VPLS Redundancy
5.2.9.1. Spoke-SDP Redundancy for Metro Interconnection
5.2.9.2. Spoke-SDP-Based Redundant Access
5.2.9.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
5.2.10. VPLS Access Redundancy
5.2.10.1. STP-Based Redundant Access to VPLS
5.2.10.2. Redundant Access to VPLS without STP
5.2.11. MAC Flush Message Processing
5.2.11.1. MAC Flush with STP
5.2.11.2. Selective MAC Flush
5.2.11.3. Dual Homing to a VPLS Service
5.2.12. VPLS Service Considerations
5.2.12.1. SAP Encapsulations
5.2.12.2. VLAN Processing
5.3. BGP Auto-Discovery for LDP VPLS
5.3.1. BGP AD Overview
5.3.2. Information Model
5.3.3. FEC Element for T-LDP Signaling
5.3.4. BGP-AD and Target LDP (T-LDP) Interaction
5.3.5. SDP Usage
5.3.6. Automatic Creation of SDPs
5.3.7. Manually Provisioned SDP
5.3.8. Automatic Instantiation of Pseudowires (SDP Bindings)
5.3.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS Service
5.3.10. Resiliency Schemes
5.4. Routed VPLS
5.4.1. IES or VPRN IP Interface Binding
5.4.2. Assigning a Service Name to a VPLS Service
5.4.3. Service Binding Requirements
5.4.3.1. Bound Service Name Assignment
5.4.3.2. Binding a Service Name to an IP Interface
5.4.3.3. IP Interface Attached VPLS Service Constraints
5.4.3.4. IP Interface and VPLS Operational State Coordination
5.4.3.5. IP Interface MTU and Fragmentation
5.4.4. ARP and VPLS FIB Interactions
5.4.5. R-VPLS Specific ARP Cache Behavior
5.4.5.1. The allow-ip-int-binding VPLS Flag
5.4.6. R-VPLS SAP Support on Standard Ethernet Ports
5.4.6.1. LAG Port Membership Constraints
5.4.6.2. VPLS Feature Support and Restrictions
5.4.7. VPLS SAP Ingress IP Filter Override
5.4.7.1. QoS Support for VPLS SAPs and IP Interface in a R-VPLS Service
5.4.7.2. R-VPLS and Routing Protocols Support
5.4.7.3. Spanning Tree and Split Horizon
5.4.8. R-VPLS and IGMPv3 Snooping
5.4.8.1. Configuration Guidelines and Restrictions for IGMP Snooping in R-VPLS
5.4.9. R-VPLS Supported Functionality and Restrictions
5.5. Epipe Emulation Using Dot1q VLAN Range SAP in VPLS with G.8032
5.5.1. Epipe Emulation Configuration Guidelines and Restrictions
5.6. Configuring a VPLS Service with CLI
5.6.1. Basic Configuration
5.6.2. Common Configuration Tasks
5.6.3. Configuring VPLS Components
5.6.3.1. Creating a VPLS Service
5.6.3.1.1. Enabling MAC Move
5.6.3.1.2. Configuring STP Bridge Parameters in a VPLS
5.6.3.2. Configuring a VPLS SAP
5.6.3.2.1. Local VPLS SAPs
5.6.3.2.2. Distributed VPLS SAPs
5.6.3.2.3. Configuring Default QinQ SAPs to Pass all Traffic from Access to Access-uplink Port without any Tag Modifications
5.6.3.2.4. Configuring SAP-Specific STP Parameters
5.6.3.2.5. STP SAP Operational States
5.6.3.2.6. Configuring VPLS SAPs with per Service Split Horizon
5.6.3.3. Configuring SDP Bindings
5.6.3.3.1. Configuring VPLS Spoke-SDPs with Split Horizon
5.6.4. Configuring VPLS Redundancy
5.6.4.1. Creating a Management VPLS for SAP Protection
5.6.4.2. Creating a Management VPLS for Spoke-SDP Protection
5.6.4.3. Configuring Load Balancing with Management VPLS
5.6.4.4. Configuring a BGP-Auto-Discovery
5.6.4.5. Configuring Load Balancing with Management VPLS
5.6.4.6. Configuring Selective MAC Flush
5.6.4.7. Configuring Load Balancing with Management VPLS
5.6.5. Configuring IGMPv3 Snooping in RVPLS
5.6.6. Configuring BGP Auto-Discovery
5.6.6.1. Configuration Steps
5.6.7. Configuring AS Pseudowire in VPLS
5.7. Service Management Tasks
5.7.1. Modifying VPLS Service Parameters
5.7.2. Modifying Management VPLS Parameters
5.7.3. Deleting a Management VPLS
5.7.4. Disabling a Management VPLS
5.7.5. Deleting a VPLS Service
5.7.6. Disabling a VPLS Service
5.7.7. Re-Enabling a VPLS Service
5.8. VPLS Services Command Reference
5.8.1. Command Hierarchies
5.8.1.1. VPLS Service Configuration Commands
5.8.1.1.1. Global Commands
5.8.1.1.2. VPLS Service IP Interface (Host Only) Commands
5.8.1.1.3. VPLS Service xSTP Commands
5.8.1.1.4. VPLS Service SAP DHCP Snooping Commands
5.8.1.1.5. SAP Commands
5.8.1.1.6. VPLS SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Sx/S 1/10GE)
5.8.1.1.7. VPLS SAP QoS and Filter Commands (for 7210 SAS-Mxp)
5.8.1.1.8. VPLS Service and SAP IGMP Snooping and MVR Commands
5.8.1.1.9. VPLS SAP Meter Override Commands
5.8.1.1.10. VPLS Service SAP xSTP Commands
5.8.1.1.11. VPLS SAP Statistics Commands
5.8.1.1.12. Mesh SDP Commands
5.8.1.1.13. Spoke-SDP Commands
5.8.1.1.14. Routed VPLS Commands
5.8.1.2. Show Commands
5.8.1.3. Clear Commands
5.8.1.4. Debug Commands
5.8.2. Command Descriptions
5.8.2.1. VPLS Configuration Commands
5.8.2.1.1. Generic Commands
5.8.2.1.2. VPLS Service Commands
5.8.2.1.3. VPLS Interface Commands
5.8.2.1.4. VPLS STP Commands
5.8.2.1.5. VPLS SAP Commands
5.8.2.1.6. VPLS Service SAP DHCP Snooping Commands
5.8.2.1.7. ETH-CFM Service Commands
5.8.2.1.8. VPLS SAP Statistics Commands
5.8.2.1.9. VPLS Filter and QoS Policy Commands
5.8.2.1.10. VPLS SDP Commands
5.8.2.1.11. SAP IGMP-snooping Commands
5.8.2.1.12. Routed VPLS Commands
5.8.2.2. VPLS Show Commands
5.8.2.2.1. IGMP Snooping Show Commands
5.8.2.3. VPLS Clear Commands
5.8.2.4. VPLS Debug Commands
6. IEEE 802.1ah Provider Backbone Bridging
6.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
6.2. PBB Features
6.2.1. Integrated PBB-VPLS Solution
6.2.2. PBB Technology
6.2.3. PBB Mapping to Existing VPLS Configurations
6.2.4. SAP Support
6.2.4.1. PBB B-VPLS
6.2.4.2. PBB I-VPLS
6.2.5. PBB Packet Walk-Through
6.2.6. PBB ELINE Service
6.2.6.1. PBB Resiliency for PBB Epipe Service
6.2.6.2. PBB Resiliency for B-VPLS
6.2.7. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
6.2.8. PBB QoS
6.2.9. PBB ACL Support
6.2.10. Configuration Guidelines
6.2.11. Configuration Guidelines
6.3. Configuration Examples
6.3.1. PBB ELAN and ELINE
6.3.2. MC-LAG Multi-homing for Native PBB
6.4. PBB Command Reference
6.4.1. Command Hierarchies
6.4.1.1. PBB Service Commands
6.4.1.2. Show Commands
6.4.1.3. Clear Commands
6.4.1.4. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. PBB Service Configuration Commands
6.4.2.2. PBB Show Commands
6.4.2.3. PBB Clear Commands
6.4.2.4. PBB Debug Commands
7. Internet Enhanced Service
7.1. IES Service Overview
7.2. IES Features
7.2.1. IP Interfaces
7.2.1.1. IPv6 Support for IES IP Interfaces (Access-uplink Operating Mode)
7.2.1.2. IPv6 Support for IES IP Interfaces (Network Operating Mode)
7.2.1.3. Encapsulations
7.2.2. Routing Protocols
7.2.2.1. CPE Connectivity Check
7.2.3. QoS Policies
7.2.3.1. CPU QoS for IES Interfaces in Access-Uplink Mode
7.2.3.2. CPU QoS for IES Access Interfaces in Network Mode
7.2.4. Filter Policies
7.2.5. VRRP Support for IES IP Interfaces in Network Operating Mode
7.3. Configuring an IES Service with CLI
7.3.1. Basic Configuration
7.3.2. Common Configuration Tasks
7.3.3. Configuring IES Components
7.3.3.1. Configuring an IES Service
7.3.3.2. Configuring IES Interface Parameters
7.3.3.2.1. Network Mode
7.3.3.2.2. Access-uplink Mode
7.3.3.3. Configuring IES SAP Parameters
7.3.3.4. Configuring VRRP
7.3.4. Service Management Tasks
7.3.4.1. Modifying IES Service Parameters
7.3.4.2. Deleting an IES Service
7.3.4.3. Disabling an IES Service
7.3.4.4. Re-Enabling an IES Service
7.4. IES Services Command Reference
7.4.1. Command Hierarchies
7.4.1.1. IES Configuration Commands
7.4.1.1.1. Global Commands
7.4.1.1.2. Interface Commands (Network Operating Mode)
7.4.1.1.3. Interface Commands (Access-uplink Operating Mode)
7.4.1.1.4. RVPLS Commands (Network Operating Mode)
7.4.1.1.5. RVPLS Commands (Access-uplink Operating Mode)
7.4.1.1.6. Interface SAP Commands (Network and Access-uplink Operating Mode)
7.4.1.1.7. IES SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE)
7.4.1.1.8. IES SAP QoS and Filter Commands (for 7210 SAS-Mxp)
7.4.1.1.9. VRRP Commands
7.4.1.1.10. Interface IPv6 Commands
7.4.1.2. Show Commands
7.4.2. Command Descriptions
7.4.2.1. IES Service Configuration Commands
7.4.2.1.1. Generic Commands
7.4.2.1.2. IES Global Commands
7.4.2.1.3. IES Interface IPv6 Commands
7.4.2.1.4. IES Interface Commands
7.4.2.1.5. IES Interface ICMP Commands
7.4.2.1.6. IES SAP Commands
7.4.2.1.7. IES QoS and Filter Commands
7.4.2.1.8. IES Interface SAP Statistics Commands
7.4.2.2. Show Commands
8. Virtual Private Routed Network Service
8.1. VPRN Service Overview
8.1.1. Routing Prerequisites
8.1.2. BGP Support
8.1.3. Route Distinguishers
8.1.3.1. Route Reflector
8.1.3.2. Customer Edge to Provider Edge Route Exchange
8.1.3.2.1. Route Redistribution
8.1.3.2.2. CPE Connectivity Check
8.1.4. BGP Fast Reroute in a VPRN
8.1.4.1. BGP Fast Reroute in a VPRN Configuration
8.2. VPRN Features
8.2.1. IP Interfaces
8.2.1.1. DHCP and DHCPv6
8.2.1.1.1. DHCP Relay and DHCPv6 Relay
8.2.2. SAPs
8.2.2.1. IPv6 Support for VPRN IP Interfaces
8.2.2.2. Encapsulations
8.2.3. QoS Policies
8.2.4. Filter Policies
8.2.4.1. CPU QoS for VPRN Interfaces
8.2.5. CE to PE Routing Protocols
8.2.5.1. PE to PE Tunneling Mechanisms
8.2.5.2. Per-VRF Route Limiting
8.2.6. Exporting MP-BGP VPN Routes
8.2.6.1. Configuration Guidelines
8.2.7. Spoke-SDPs
8.2.8. Using OSPF in IP-VPNs
8.2.9. Service Label Mode of a VPRN
8.2.10. Multicast in IP-VPN Applications
8.2.10.1. Multicast Protocols Supported in the Provider Network
8.2.10.1.1. MVPN Using BGP Control Plane
8.2.10.1.2. MVPN Membership Auto-discovery using BGP
8.2.10.2. Provider Tunnel Support
8.2.11. Inter-AS VPRNs
8.3. Configuring a VPRN Service with CLI
8.3.1. Basic Configuration
8.3.2. Common Configuration Tasks
8.3.3. Configuring VPRN Components
8.3.3.1. Creating a VPRN Service
8.3.3.2. Configuring Global VPRN Parameters
8.3.3.2.1. Configuring Router Interfaces
8.3.3.2.2. Configuring VPRN Protocols - BGP
8.3.3.2.3. Configuring a VPRN Interface
8.3.3.2.4. Configuring a VPRN Interface SAP
8.3.4. Configuring VPRN Protocols - OSPF
8.3.4.1. VPRN OSPF CLI Syntax
8.3.5. Service Management Tasks
8.3.5.1. Modifying VPRN Service Parameters
8.3.5.2. Deleting a VPRN Service
8.3.5.3. Disabling a VPRN Service
8.3.5.4. Re-enabling a VPRN Service
8.4. VPRN Services Command Reference
8.4.1. Command Hierarchies
8.4.1.1. VPRN Configuration Commands
8.4.1.1.1. VPRN Service Configuration Commands
8.4.1.1.2. Routed VPLS Commands
8.4.1.1.3. IGMP Commands
8.4.1.1.4. Multicast VPN Commands
8.4.1.1.5. Interface Commands
8.4.1.1.6. Interface VRRP Commands
8.4.1.1.7. Interface SAP Commands
8.4.1.1.8. VPRN SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE)
8.4.1.1.9. VPRN SAP QoS and Filter Commands (for 7210 SAS-Mxp)
8.4.1.1.10. BGP Configuration Commands
8.4.1.1.11. Router Advertisement Commands
8.4.1.1.12. OSPF Configuration Commands (IPv4 only)
8.4.1.1.13. PIM Configuration Commands (for 7210 SAS-T (Network Operating Mode) and 7210 SAS-Mxp)
8.4.1.2. Show Commands
8.4.1.3. Clear Commands
8.4.1.4. Debug Commands
8.4.2. Command Descriptions
8.4.2.1. VPRN Service Configuration Commands
8.4.2.1.1. Generic Commands
8.4.2.1.2. Global Commands
8.4.2.1.3. Multicast VPN Commands
8.4.2.1.4. SDP Commands
8.4.2.1.5. Interface Commands
8.4.2.1.6. Router Advertisement Commands
8.4.2.1.7. PIM Commands
8.4.2.1.8. Counter Mode Commands
8.4.2.1.9. BGP Commands
8.4.2.1.10. OSPF Commands
8.4.2.2. Show Commands
8.4.2.3. Clear Commands
8.4.2.4. Debug Commands
9. Common CLI Command Descriptions
9.1. In This Chapter
9.1.1. Common Service Commands
9.1.1.1. SAP Syntax
10. Appendix: Port-Based Split Horizon
10.1. Overview
10.1.1. Topology
10.2. Configuration Guidelines
10.2.1. Verification
11. Appendix: DHCP Management
11.1. DHCP Principles
11.1.1. DHCP Features
11.1.1.1. Using Option 82 Field
11.1.1.2. Trusted and Untrusted
11.1.1.3. DHCP Snooping
11.1.2. Common Configuration Guidelines
11.1.2.1. Configuration Guidelines for DHCP relay and snooping
11.1.2.2. Configuring Option 82 Handling
12. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. SAPs
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Services and SAP Encapsulations
2.3.2.4. Default SAP on a Dot1q Port
2.3.2.5. Default SAPs on a QinQ Port (Supported Inly on 7210 SAS Devices Configured in Access-uplink Mode)
2.3.2.5.1. Configuration Notes for use of Default QinQ SAPs for Transit Service in a Ring Deployment
2.3.2.6. SAP Configuration Considerations (Applicable for Both Network Mode and Access-uplink Mode)
2.3.2.7. SAP Configuration Notes when Operating 7210 SAS Devices in Network Mode Only
2.3.2.8. QinQ SAP Configuration Restrictions for 7210 SAS Platforms in Network Operating Mode
2.3.2.9. SAP Configuration Notes for 7210 SAS Platforms in Access-uplink Operating Mode
2.3.3. SDPs
2.3.3.1. SDP Binding
2.3.3.2. Spoke and Mesh SDPs
2.3.3.3. SDP Using BGP Route Tunnel
2.3.3.4. SDP Keepalives
2.3.3.5. Mixed-LSP Mode of Operation
2.3.4. SAP and Service Scaling with High SAP Scale Mode on 7210 SAS-Mxp
2.3.4.1. Guidelines for Configuring High SAP Scale Mode
2.3.4.2. Guidelines for Configuring Low SAP Scale Mode
2.3.5. G.8032 Ethernet Ring Protection Switching
2.3.5.1. Overview of G.8032 Operation
2.3.5.2. Ethernet Ring Sub-rings
2.3.5.2.1. Virtual and Non-virtual Channel
2.3.5.2.2. Ethernet Ring Sub-ring Using Non-virtual Link
2.3.5.2.3. Lag Support
2.3.5.3. OAM Considerations
2.3.5.4. QoS Considerations
2.3.5.5. Support Service and Solution Combinations
2.3.5.6. Configuration Guidelines for G.8032
2.4. Service Creation Process Overview
2.5. Deploying and Provisioning Services
2.5.1. Phase 1: Core Network Construction
2.5.2. Phase 2: Service Administration
2.5.3. Phase 3: Service Provisioning
2.6. Configuration Notes
2.6.1. General
2.7. Configuring Global Service Entities with CLI
2.8. Service Model Entities
2.9. Basic Configuration
2.10. Common Configuration Tasks
2.10.1. Configuring Customers Accounts
2.10.1.1. Customer Information
2.10.2. Configuring an SDP
2.10.2.1. SDP Configuration Tasks
2.10.2.2. Configuring an SDP
2.10.2.3. Configuring a Mixed-LSP SDP
2.11. Ethernet Connectivity Fault Management
2.11.1. MA, MEP, MIP, and MD Levels
2.11.1.1. Common Actionable Failures
2.11.1.2. MEP and MIP Support
2.11.2. Configuring ETH-CFM Parameters
2.11.3. Applying ETH-CFM Parameters
2.12. Layer 2 Control Processing
2.13. Service Management Tasks
2.13.1. Modifying Customer Accounts
2.13.2. Deleting Customers
2.13.3. Modifying SDPs
2.13.4. Deleting SDPs
2.14. Global Services Command Reference
2.14.1. Command Hierarchies
2.14.1.1. Global Service Configuration Commands
2.14.1.1.1. Customer Commands
2.14.1.1.2. Pseudowire (PW) Commands
2.14.1.1.3. SDP Commands
2.14.1.1.4. SAP Commands for 7210 SAS Platforms Operating in Network Mode
2.14.1.1.5. SAP Commands for 7210 SAS Platforms Operating in Access-uplink Mode
2.14.1.1.6. ETH-CFM Configuration Commands
2.14.1.2. Show Commands
2.14.1.3. Tools Commands
2.14.2. Command Descriptions
2.14.2.1. Global Service Configuration Commands
2.14.2.1.1. Generic Commands
2.14.2.1.2. Customer Management Commands
2.14.2.1.3. Pseudowire Commands
2.14.2.1.4. SDP Commands
2.14.2.1.5. SDP Keepalive Commands
2.14.2.2. Show Commands
2.14.2.2.1. Show Service Commands
2.14.2.2.2. Show ETH-CFM Commands
2.14.2.3. Tools Commands
2.14.2.3.1. Tools Perform Commands
3. VLL Services
3.1. Circuit Emulation (Cpipe) Services
3.1.1. Cpipe Service Overview
3.1.2. Cpipe Service Modes
3.1.2.1. Unstructured Mode (SAToP)
3.1.2.2. Structured Mode (CESoPSN)
3.1.2.3. TDM Pseudowire Encapsulation
3.1.2.4. Circuit Emulation Parameters and Options
3.1.2.4.1. Unstructured CES
3.1.2.4.2. Structured DS1/E1 CES without CAS
3.1.2.4.3. Structured T1/E1 CES with CAS
3.1.2.4.4. Packet Payload Size
3.1.2.4.5. Jitter Buffer
3.1.2.4.6. RTP Header
3.1.2.4.7. Control Word
3.1.2.4.8. Error Situations
3.2. Epipe Services
3.2.1. Epipe Services Overview
3.2.2. Epipe with PBB
3.2.3. Processing Packets Received with More Than Two Tags on a QinQ SAP in Epipe Service
3.2.3.1. Feature Support, Configuration Notes, and Restrictions
3.2.3.2. Configuration Example of Epipe Services for Processing of Packets Received with More Than Two Tags on a QinQ SAP
3.2.4. Epipe Operational State Decoupling
3.3. Pseudowire Switching
3.3.1. Pseudowire Switching with Protection
3.3.2. Pseudowire Switching Behavior
3.3.2.1. Pseudowire Switching TLV
3.3.2.2. Static-to-Dynamic Pseudowire Switching
3.3.3. Pseudowire Redundancy
3.3.3.1. VLL Resilience with Two Destination PE Nodes
3.3.4. Dynamic Multi-Segment Pseudowire Routing
3.3.4.1. Pseudowire Routing
3.3.4.1.1. Static Routing
3.3.4.1.2. Explicit Paths
3.3.4.2. Configuring VLLs Using Dynamic MS-PW
3.3.4.2.1. Active/Passive T-PE Selection
3.3.4.2.2. Automatic Endpoint Configuration
3.3.4.2.3. Selecting a Path for an MS-PW
3.3.4.2.4. Pseudowire Templates
3.3.4.3. Pseudowire Redundancy
3.3.4.4. VCCV OAM for Dynamic MS-PWs
3.3.4.5. VCCV-Ping on Dynamic MS-PWs
3.3.4.6. VCCV-Trace on Dynamic MS-PWs
3.3.5. Example Dynamic MS-PW Configuration
3.4. Master-Slave Operation
3.4.1. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.4.1.1. VLL Resilience Path
3.4.2. VLL Resilience for a Switched PW Path
3.4.3. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
3.4.4. VLL Resilience for a Switched Pseudowire Path
3.5. Pseudowire Redundancy Service Models
3.5.1. Redundant VLL Service Model
3.5.2. T-LDP Status Notification Handling Rules
3.5.2.1. Processing Endpoint SAP Active/Standby Status Bits
3.5.2.2. Processing and Merging
3.6. Epipe Configuration for MPLS-TP
3.6.1. SDPs
3.6.2. VLL Spoke-SDP Configuration
3.6.3. Credit-Based Algorithm
3.7. VLAN Range for SAPs in an Epipe Service
3.7.1. Processing Behavior for SAPs Using VLAN Ranges in Access-Uplink Mode
3.7.2. VLAN Range SAPs Feature Support and Restrictions
3.7.3. Processing Behavior for SAPs Using VLAN Ranges in Network Operating Mode
3.8. VLL Service Considerations
3.8.1. SDPs
3.8.2. SAP Encapsulations
3.8.3. QoS Policies
3.8.4. Filter Policies
3.8.5. MAC Resources
3.9. Configuring a VLL Service with CLI
3.9.1. Common Configuration Tasks
3.9.2. Configuring VLL Components
3.9.2.1. Creating a Cpipe Service
3.9.2.1.1. Basic Configuration
3.9.2.1.2. Configuration Requirements
3.9.2.1.3. Configuring Cpipe SAPs and Spoke-SDPs
3.9.2.2. Creating an Epipe Service in Network Mode
3.9.2.3. Creating an Epipe Service in Access-uplink Mode
3.9.2.3.1. Configuring Epipe SAP Parameters
3.9.2.4. Creating an Epipe Service for 7210 SAS-M and 7210 SAS-Mxp with Range SAPs
3.9.2.5. Configuring Default QinQ SAPs for Epipe Transit Traffic in a Ring Scenario in Access-uplink Mode
3.9.2.5.1. Configuring SDP Bindings
3.9.3. Using Spoke-SDP Control Words
3.9.4. Configuring VLL Resilience
3.9.5. Configuring VLL Resilience for a Switched Pseudowire Path
3.9.6. Service Management Tasks
3.9.6.1. Modifying a Cpipe Service
3.9.6.2. Deleting a Cpipe Service
3.9.6.3. Modifying Epipe Service Parameters
3.9.6.4. Disabling an Epipe Service
3.9.6.5. Re-Enabling an Epipe Service
3.9.6.6. Deleting an Epipe Service
3.10. VLL Services Command Reference
3.10.1. Command Hierarchies
3.10.1.1. VLL Service Configuration Commands
3.10.1.1.1. Cpipe Service Configuration Commands (for 7210 SAS-M only)
3.10.1.1.2. Epipe Global Commands (for Access-uplink Operating Mode)
3.10.1.1.3. Epipe Global Commands (for Network Operating Mode)
3.10.1.1.4. Epipe SAP Configuration Commands
3.10.1.1.5. Epipe SAP Meter Override Commands
3.10.1.1.6. Epipe SAP Statistics Commands
3.10.1.1.7. Epipe Spoke-SDP Configuration Commands
3.10.1.1.8. Epipe SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Sx/S 1/10GE Devices)
3.10.1.1.9. Epipe SAP QoS and Filter Commands (for 7210 SAS-Mxp)
3.10.1.1.10. Connection Profile Commands
3.10.1.2. Show Commands
3.10.1.3. Clear Commands
3.10.2. Command Descriptions
3.10.2.1. VLL Service Configuration Commands
3.10.2.1.1. Generic Commands
3.10.2.1.2. VLL Global Commands
3.10.2.1.3. VLL SAP Commands
3.10.2.1.4. Service Filter and QoS Policy Commands
3.10.2.1.5. Epipe Service SAP Statistics Commands
3.10.2.1.6. VLL SDP Commands
3.10.2.1.7. CES SAP Commands
3.10.2.1.8. Connection Profile Commands
3.10.2.2. Show Commands
3.10.2.3. Clear Commands
3.10.2.4. Debug Commands
4. Ethernet Virtual Private Networks
4.1. EVPN Applications
4.1.1. EVPN for MPLS Tunnels in E-LAN Services
4.2. EVPN for MPLS Tunnels
4.2.1. BGP-EVPN Control Plane for MPLS Tunnels
4.2.1.1. EVPN Route Type 3 — Inclusive Multicast Ethernet Tag Route
4.2.1.2. EVPN Route Type 2 — MAC/IP Advertisement Route
4.2.1.3. EVPN Route Type 1 — Ethernet Auto-Discovery Route
4.2.1.4. EVPN Route Type 4 — ES route
4.2.1.5. BGP Tunnel Encapsulation Extended Community
4.2.2. EVPN for MPLS Tunnels in VPLS Services
4.2.2.1. EVPN and VPLS Integration
4.2.2.2. Auto-Derived RD in Services with Multiple BGP Families
4.2.3. EVPN Multi-Homing in VPLS Services
4.2.4. EVPN All-Active Multi-Homing
4.2.4.1. All-Active Multi-Homing Procedures
4.2.4.1.1. Designated Forwarder Election
4.2.4.1.2. Split-Horizon
4.2.4.1.3. Aliasing
4.2.4.2. All-Active Multi-Homing Service Model
4.2.4.3. ES Discovery and DF Election Procedures
4.2.4.3.1. Step 1 — ES Advertisement and Discovery
4.2.4.3.2. Step 2 — DF Election
4.2.4.3.3. Step 3 — DF and Non-DF Service Behavior
4.2.4.4. Aliasing
4.2.4.5. Network Failures and Convergence for All-Active Multi-Homing
4.2.4.6. Logical Failures on ESs and Blackholes
4.2.4.7. Transient Issues Due to MAC Route Delays
4.2.5. EVPN Single-Active Multi-Homing
4.2.5.1. Single-Active Multi-Homing Service Model
4.2.5.2. ES and DF Election Procedures
4.2.5.3. Backup PE Function
4.2.5.4. Network Failures and Convergence for Single-Active Multi-Homing
4.3. General EVPN Topics
4.3.1. ARP and ND Snooping and Proxy Support
4.3.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh, and Confirm-Messages
4.3.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
4.3.1.3. Procedure to Add the R Flag to a Specified Entry
4.3.1.4. Configuration Guidelines for Proxy-ARP and Proxy-ND
4.3.1.4.1. Proxy-ARP and Proxy-ND Support for Spoke-SDP Bindings
4.3.2. BGP-EVPN MAC Mobility
4.3.3. BGP-EVPN MAC Duplication
4.3.4. Conditional Static MAC and Protection
4.3.5. BGP and EVPN Route Selection for EVPN Routes
4.3.6. Interaction of EVPN and Other Features
4.3.6.1. Interaction of EVPN-MPLS with Existing VPLS Features
4.3.7. Routing Policies for BGP EVPN Routes
4.4. Configuring an EVPN Service with CLI
4.4.1. EVPN-MPLS Configuration Examples
4.4.1.1. EVPN Single-active Multi-homing Example
4.5. EVPN Command Reference
4.5.1. Command Hierarchies
4.5.1.1. EVPN Configuration Commands
4.5.1.2. EVPN Show Commands
4.5.1.3. EVPN Clear Commands
4.5.1.4. EVPN Tools Commands
4.5.2. Command Descriptions
4.5.2.1. EVPN Configuration Commands
4.5.2.2. EVPN Show Commands
4.5.2.3. EVPN Clear Commands
4.5.2.4. Tools Commands
5. Virtual Private LAN Service
5.1. VPLS Service Overview
5.1.1. VPLS Packet Walk-Through in Network Mode
5.1.2. VPLS Packet Walk-Through in Access-uplink Mode
5.2. VPLS Features
5.2.1. VPLS Enhancements
5.2.2. VPLS over MPLS in Network Operating Mode
5.2.3. VPLS over QinQ Spokes for 7210 SAS Devices Configured in Access-uplink Operating Mode
5.2.4. VPLS MAC Learning and Packet Forwarding
5.2.5. IGMP Snooping in Network Operating Mode and Access-uplink Operating Mode in VPLS Service
5.2.5.1. Configuration Guidelines for IGMP Snooping in VPLS Service
5.2.6. Multicast VLAN Registration (MVR) Support in VPLS Service
5.2.6.1. Configuration Guidelines for MVR in VPLS Services
5.2.7. Layer 2 Forwarding Table Management
5.2.7.1. FIB Size
5.2.7.2. FIB Size Alarms
5.2.7.3. Local and Remote Aging Timers
5.2.7.4. Disable MAC Aging
5.2.7.5. Disable MAC Learning
5.2.7.6. Unknown MAC Discard
5.2.7.7. VPLS and Rate Limiting
5.2.7.8. MAC Move
5.2.7.8.1. Split Horizon SAP Groups and Split Horizon Spoke-SDP Groups
5.2.7.8.2. Configuration Guidelines for Use of Split Horizon Group in a VPLS Service
5.2.8. VPLS and Spanning Tree Protocol
5.2.8.1. Spanning Tree Operating Modes
5.2.8.2. Multiple Spanning Tree
5.2.8.2.1. Redundancy Access to VPLS
5.2.8.3. MSTP for QinQ SAPs
5.2.8.4. Provider MSTP
5.2.8.4.1. MSTP General Principles
5.2.8.4.2. MSTP in the 7210 SAS Platform
5.2.8.5. Enhancements to the Spanning Tree Protocol
5.2.8.5.1. L2PT Termination
5.2.8.5.2. BPDU Translation
5.2.8.5.3. L2PT and BPDU Translation
5.2.9. VPLS Redundancy
5.2.9.1. Spoke-SDP Redundancy for Metro Interconnection
5.2.9.2. Spoke-SDP-Based Redundant Access
5.2.9.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
5.2.10. VPLS Access Redundancy
5.2.10.1. STP-Based Redundant Access to VPLS
5.2.10.2. Redundant Access to VPLS without STP
5.2.11. MAC Flush Message Processing
5.2.11.1. MAC Flush with STP
5.2.11.2. Selective MAC Flush
5.2.11.3. Dual Homing to a VPLS Service
5.2.12. VPLS Service Considerations
5.2.12.1. SAP Encapsulations
5.2.12.2. VLAN Processing
5.3. BGP Auto-Discovery for LDP VPLS
5.3.1. BGP AD Overview
5.3.2. Information Model
5.3.3. FEC Element for T-LDP Signaling
5.3.4. BGP-AD and Target LDP (T-LDP) Interaction
5.3.5. SDP Usage
5.3.6. Automatic Creation of SDPs
5.3.7. Manually Provisioned SDP
5.3.8. Automatic Instantiation of Pseudowires (SDP Bindings)
5.3.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS Service
5.3.10. Resiliency Schemes
5.4. Routed VPLS
5.4.1. IES or VPRN IP Interface Binding
5.4.2. Assigning a Service Name to a VPLS Service
5.4.3. Service Binding Requirements
5.4.3.1. Bound Service Name Assignment
5.4.3.2. Binding a Service Name to an IP Interface
5.4.3.3. IP Interface Attached VPLS Service Constraints
5.4.3.4. IP Interface and VPLS Operational State Coordination
5.4.3.5. IP Interface MTU and Fragmentation
5.4.4. ARP and VPLS FIB Interactions
5.4.5. R-VPLS Specific ARP Cache Behavior
5.4.5.1. The allow-ip-int-binding VPLS Flag
5.4.6. R-VPLS SAP Support on Standard Ethernet Ports
5.4.6.1. LAG Port Membership Constraints
5.4.6.2. VPLS Feature Support and Restrictions
5.4.7. VPLS SAP Ingress IP Filter Override
5.4.7.1. QoS Support for VPLS SAPs and IP Interface in a R-VPLS Service
5.4.7.2. R-VPLS and Routing Protocols Support
5.4.7.3. Spanning Tree and Split Horizon
5.4.8. R-VPLS and IGMPv3 Snooping
5.4.8.1. Configuration Guidelines and Restrictions for IGMP Snooping in R-VPLS
5.4.9. R-VPLS Supported Functionality and Restrictions
5.5. Epipe Emulation Using Dot1q VLAN Range SAP in VPLS with G.8032
5.5.1. Epipe Emulation Configuration Guidelines and Restrictions
5.6. Configuring a VPLS Service with CLI
5.6.1. Basic Configuration
5.6.2. Common Configuration Tasks
5.6.3. Configuring VPLS Components
5.6.3.1. Creating a VPLS Service
5.6.3.1.1. Enabling MAC Move
5.6.3.1.2. Configuring STP Bridge Parameters in a VPLS
5.6.3.2. Configuring a VPLS SAP
5.6.3.2.1. Local VPLS SAPs
5.6.3.2.2. Distributed VPLS SAPs
5.6.3.2.3. Configuring Default QinQ SAPs to Pass all Traffic from Access to Access-uplink Port without any Tag Modifications
5.6.3.2.4. Configuring SAP-Specific STP Parameters
5.6.3.2.5. STP SAP Operational States
5.6.3.2.6. Configuring VPLS SAPs with per Service Split Horizon
5.6.3.3. Configuring SDP Bindings
5.6.3.3.1. Configuring VPLS Spoke-SDPs with Split Horizon
5.6.4. Configuring VPLS Redundancy
5.6.4.1. Creating a Management VPLS for SAP Protection
5.6.4.2. Creating a Management VPLS for Spoke-SDP Protection
5.6.4.3. Configuring Load Balancing with Management VPLS
5.6.4.4. Configuring a BGP-Auto-Discovery
5.6.4.5. Configuring Load Balancing with Management VPLS
5.6.4.6. Configuring Selective MAC Flush
5.6.4.7. Configuring Load Balancing with Management VPLS
5.6.5. Configuring IGMPv3 Snooping in RVPLS
5.6.6. Configuring BGP Auto-Discovery
5.6.6.1. Configuration Steps
5.6.7. Configuring AS Pseudowire in VPLS
5.7. Service Management Tasks
5.7.1. Modifying VPLS Service Parameters
5.7.2. Modifying Management VPLS Parameters
5.7.3. Deleting a Management VPLS
5.7.4. Disabling a Management VPLS
5.7.5. Deleting a VPLS Service
5.7.6. Disabling a VPLS Service
5.7.7. Re-Enabling a VPLS Service
5.8. VPLS Services Command Reference
5.8.1. Command Hierarchies
5.8.1.1. VPLS Service Configuration Commands
5.8.1.1.1. Global Commands
5.8.1.1.2. VPLS Service IP Interface (Host Only) Commands
5.8.1.1.3. VPLS Service xSTP Commands
5.8.1.1.4. VPLS Service SAP DHCP Snooping Commands
5.8.1.1.5. SAP Commands
5.8.1.1.6. VPLS SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, and 7210 SAS-Sx/S 1/10GE)
5.8.1.1.7. VPLS SAP QoS and Filter Commands (for 7210 SAS-Mxp)
5.8.1.1.8. VPLS Service and SAP IGMP Snooping and MVR Commands
5.8.1.1.9. VPLS SAP Meter Override Commands
5.8.1.1.10. VPLS Service SAP xSTP Commands
5.8.1.1.11. VPLS SAP Statistics Commands
5.8.1.1.12. Mesh SDP Commands
5.8.1.1.13. Spoke-SDP Commands
5.8.1.1.14. Routed VPLS Commands
5.8.1.2. Show Commands
5.8.1.3. Clear Commands
5.8.1.4. Debug Commands
5.8.2. Command Descriptions
5.8.2.1. VPLS Configuration Commands
5.8.2.1.1. Generic Commands
5.8.2.1.2. VPLS Service Commands
5.8.2.1.3. VPLS Interface Commands
5.8.2.1.4. VPLS STP Commands
5.8.2.1.5. VPLS SAP Commands
5.8.2.1.6. VPLS Service SAP DHCP Snooping Commands
5.8.2.1.7. ETH-CFM Service Commands
5.8.2.1.8. VPLS SAP Statistics Commands
5.8.2.1.9. VPLS Filter and QoS Policy Commands
5.8.2.1.10. VPLS SDP Commands
5.8.2.1.11. SAP IGMP-snooping Commands
5.8.2.1.12. Routed VPLS Commands
5.8.2.2. VPLS Show Commands
5.8.2.2.1. IGMP Snooping Show Commands
5.8.2.3. VPLS Clear Commands
5.8.2.4. VPLS Debug Commands
6. IEEE 802.1ah Provider Backbone Bridging
6.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
6.2. PBB Features
6.2.1. Integrated PBB-VPLS Solution
6.2.2. PBB Technology
6.2.3. PBB Mapping to Existing VPLS Configurations
6.2.4. SAP Support
6.2.4.1. PBB B-VPLS
6.2.4.2. PBB I-VPLS
6.2.5. PBB Packet Walk-Through
6.2.6. PBB ELINE Service
6.2.6.1. PBB Resiliency for PBB Epipe Service
6.2.6.2. PBB Resiliency for B-VPLS
6.2.7. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
6.2.8. PBB QoS
6.2.9. PBB ACL Support
6.2.10. Configuration Guidelines
6.2.11. Configuration Guidelines
6.3. Configuration Examples
6.3.1. PBB ELAN and ELINE
6.3.2. MC-LAG Multi-homing for Native PBB
6.4. PBB Command Reference
6.4.1. Command Hierarchies
6.4.1.1. PBB Service Commands
6.4.1.2. Show Commands
6.4.1.3. Clear Commands
6.4.1.4. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. PBB Service Configuration Commands
6.4.2.2. PBB Show Commands
6.4.2.3. PBB Clear Commands
6.4.2.4. PBB Debug Commands
7. Internet Enhanced Service
7.1. IES Service Overview
7.2. IES Features
7.2.1. IP Interfaces
7.2.1.1. IPv6 Support for IES IP Interfaces (Access-uplink Operating Mode)
7.2.1.2. IPv6 Support for IES IP Interfaces (Network Operating Mode)
7.2.1.3. Encapsulations
7.2.2. Routing Protocols
7.2.2.1. CPE Connectivity Check
7.2.3. QoS Policies
7.2.3.1. CPU QoS for IES Interfaces in Access-Uplink Mode
7.2.3.2. CPU QoS for IES Access Interfaces in Network Mode
7.2.4. Filter Policies
7.2.5. VRRP Support for IES IP Interfaces in Network Operating Mode
7.3. Configuring an IES Service with CLI
7.3.1. Basic Configuration
7.3.2. Common Configuration Tasks
7.3.3. Configuring IES Components
7.3.3.1. Configuring an IES Service
7.3.3.2. Configuring IES Interface Parameters
7.3.3.2.1. Network Mode
7.3.3.2.2. Access-uplink Mode
7.3.3.3. Configuring IES SAP Parameters
7.3.3.4. Configuring VRRP
7.3.4. Service Management Tasks
7.3.4.1. Modifying IES Service Parameters
7.3.4.2. Deleting an IES Service
7.3.4.3. Disabling an IES Service
7.3.4.4. Re-Enabling an IES Service
7.4. IES Services Command Reference
7.4.1. Command Hierarchies
7.4.1.1. IES Configuration Commands
7.4.1.1.1. Global Commands
7.4.1.1.2. Interface Commands (Network Operating Mode)
7.4.1.1.3. Interface Commands (Access-uplink Operating Mode)
7.4.1.1.4. RVPLS Commands (Network Operating Mode)
7.4.1.1.5. RVPLS Commands (Access-uplink Operating Mode)
7.4.1.1.6. Interface SAP Commands (Network and Access-uplink Operating Mode)
7.4.1.1.7. IES SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE)
7.4.1.1.8. IES SAP QoS and Filter Commands (for 7210 SAS-Mxp)
7.4.1.1.9. VRRP Commands
7.4.1.1.10. Interface IPv6 Commands
7.4.1.2. Show Commands
7.4.2. Command Descriptions
7.4.2.1. IES Service Configuration Commands
7.4.2.1.1. Generic Commands
7.4.2.1.2. IES Global Commands
7.4.2.1.3. IES Interface IPv6 Commands
7.4.2.1.4. IES Interface Commands
7.4.2.1.5. IES Interface ICMP Commands
7.4.2.1.6. IES SAP Commands
7.4.2.1.7. IES QoS and Filter Commands
7.4.2.1.8. IES Interface SAP Statistics Commands
7.4.2.2. Show Commands
8. Virtual Private Routed Network Service
8.1. VPRN Service Overview
8.1.1. Routing Prerequisites
8.1.2. BGP Support
8.1.3. Route Distinguishers
8.1.3.1. Route Reflector
8.1.3.2. Customer Edge to Provider Edge Route Exchange
8.1.3.2.1. Route Redistribution
8.1.3.2.2. CPE Connectivity Check
8.1.4. BGP Fast Reroute in a VPRN
8.1.4.1. BGP Fast Reroute in a VPRN Configuration
8.2. VPRN Features
8.2.1. IP Interfaces
8.2.1.1. DHCP and DHCPv6
8.2.1.1.1. DHCP Relay and DHCPv6 Relay
8.2.2. SAPs
8.2.2.1. IPv6 Support for VPRN IP Interfaces
8.2.2.2. Encapsulations
8.2.3. QoS Policies
8.2.4. Filter Policies
8.2.4.1. CPU QoS for VPRN Interfaces
8.2.5. CE to PE Routing Protocols
8.2.5.1. PE to PE Tunneling Mechanisms
8.2.5.2. Per-VRF Route Limiting
8.2.6. Exporting MP-BGP VPN Routes
8.2.6.1. Configuration Guidelines
8.2.7. Spoke-SDPs
8.2.8. Using OSPF in IP-VPNs
8.2.9. Service Label Mode of a VPRN
8.2.10. Multicast in IP-VPN Applications
8.2.10.1. Multicast Protocols Supported in the Provider Network
8.2.10.1.1. MVPN Using BGP Control Plane
8.2.10.1.2. MVPN Membership Auto-discovery using BGP
8.2.10.2. Provider Tunnel Support
8.2.11. Inter-AS VPRNs
8.3. Configuring a VPRN Service with CLI
8.3.1. Basic Configuration
8.3.2. Common Configuration Tasks
8.3.3. Configuring VPRN Components
8.3.3.1. Creating a VPRN Service
8.3.3.2. Configuring Global VPRN Parameters
8.3.3.2.1. Configuring Router Interfaces
8.3.3.2.2. Configuring VPRN Protocols - BGP
8.3.3.2.3. Configuring a VPRN Interface
8.3.3.2.4. Configuring a VPRN Interface SAP
8.3.4. Configuring VPRN Protocols - OSPF
8.3.4.1. VPRN OSPF CLI Syntax
8.3.5. Service Management Tasks
8.3.5.1. Modifying VPRN Service Parameters
8.3.5.2. Deleting a VPRN Service
8.3.5.3. Disabling a VPRN Service
8.3.5.4. Re-enabling a VPRN Service
8.4. VPRN Services Command Reference
8.4.1. Command Hierarchies
8.4.1.1. VPRN Configuration Commands
8.4.1.1.1. VPRN Service Configuration Commands
8.4.1.1.2. Routed VPLS Commands
8.4.1.1.3. IGMP Commands
8.4.1.1.4. Multicast VPN Commands
8.4.1.1.5. Interface Commands
8.4.1.1.6. Interface VRRP Commands
8.4.1.1.7. Interface SAP Commands
8.4.1.1.8. VPRN SAP QoS and Filter Commands (for 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE)
8.4.1.1.9. VPRN SAP QoS and Filter Commands (for 7210 SAS-Mxp)
8.4.1.1.10. BGP Configuration Commands
8.4.1.1.11. Router Advertisement Commands
8.4.1.1.12. OSPF Configuration Commands (IPv4 only)
8.4.1.1.13. PIM Configuration Commands (for 7210 SAS-T (Network Operating Mode) and 7210 SAS-Mxp)
8.4.1.2. Show Commands
8.4.1.3. Clear Commands
8.4.1.4. Debug Commands
8.4.2. Command Descriptions
8.4.2.1. VPRN Service Configuration Commands
8.4.2.1.1. Generic Commands
8.4.2.1.2. Global Commands
8.4.2.1.3. Multicast VPN Commands
8.4.2.1.4. SDP Commands
8.4.2.1.5. Interface Commands
8.4.2.1.6. Router Advertisement Commands
8.4.2.1.7. PIM Commands
8.4.2.1.8. Counter Mode Commands
8.4.2.1.9. BGP Commands
8.4.2.1.10. OSPF Commands
8.4.2.2. Show Commands
8.4.2.3. Clear Commands
8.4.2.4. Debug Commands
9. Common CLI Command Descriptions
9.1. In This Chapter
9.1.1. Common Service Commands
9.1.1.1. SAP Syntax
10. Appendix: Port-Based Split Horizon
10.1. Overview
10.1.1. Topology
10.2. Configuration Guidelines
10.2.1. Verification
11. Appendix: DHCP Management
11.1. DHCP Principles
11.1.1. DHCP Features
11.1.1.1. Using Option 82 Field
11.1.1.2. Trusted and Untrusted
11.1.1.3. DHCP Snooping
11.1.2. Common Configuration Guidelines
11.1.2.1. Configuration Guidelines for DHCP relay and snooping
11.1.2.2. Configuring Option 82 Handling
12. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-R6, R12 Services Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. SAPs
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Services and SAP Encapsulations
2.3.2.4. SAP Configuration Considerations
2.3.3. QinQ SAP Configuration Restrictions for 7210 SAS in Network Mode Only
2.3.4. SDPs
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. Mixed-LSP Mode of Operation
2.3.4.7. G.8032 Ethernet Ring Protection Switching
2.3.5. SAP and Service Scaling with High SAP Scale Mode
2.3.5.1. Guidelines for Configuring High SAP Scale Mode
2.3.5.2. Guidelines for Configuring Low SAP Scale Mode
2.3.6. Overview of G.8032 Operation
2.3.7. Ethernet Ring Sub-rings
2.3.7.1. Virtual and Non-virtual Channel
2.3.7.2. Ethernet Ring Sub-ring Using Non-virtual Link
2.3.8. Support for Hardware-based 100ms CCM Timers for G.8032 MEPs
2.3.8.1. Configuration Guidelines for 7210 SAS-R6 and 7210 SAS-R12
2.3.8.2. LAG Support
2.3.9. OAM Considerations
2.3.10. QoS Considerations
2.3.11. Support Service and Solution Combinations
2.3.12. Configuration Guidelines for G.8032
2.4. Service Creation Process Overview
2.5. Deploying and Provisioning Services
2.5.1. Phase 1: Core Network Construction
2.5.2. Phase 2: Service Administration
2.5.3. Phase 3: Service Provisioning
2.6. Configuration Notes
2.6.1. General
2.7. Configuring Global Service Entities with CLI
2.7.1. Service Model Entities
2.8. Basic Configuration
2.9. Common Configuration Tasks
2.9.1. Configuring Customer Accounts
2.9.1.1. Customer Information
2.9.2. Configuring an SDP
2.9.2.1. SDP Configuration Tasks
2.9.2.2. Configuring an SDP
2.9.2.3. Configuring a Mixed-LSP SDP
2.10. Ethernet Connectivity Fault Management
2.10.1. Common Actionable Failures
2.10.2. MEP and MIP Support
2.10.3. Configuring ETH-CFM Parameters
2.10.4. Applying ETH-CFM Parameters
2.11. Service Management Tasks
2.11.1. Modifying Customer Accounts
2.11.2. Deleting Customers
2.11.3. Modifying SDPs
2.11.4. Deleting SDPs
2.12. Layer 2 Control Processing
2.13. Global Services Command Reference
2.13.1. Command Hierarchies
2.13.1.1. Customer Commands
2.13.1.2. Pseudowire (PW) Commands (Applicable only for 7210 SAS Devices Configured in Network Mode)
2.13.1.3. SAP Commands for 7210 SAS Devices Configured in Access or Network Mode
2.13.1.4. ETH-CFM Configuration Commands
2.13.1.5. Show Commands
2.13.1.6. Tools Perform Commands
2.13.2. Command Descriptions
2.13.2.1. Configuration Commands
2.13.2.1.1. Generic Commands
2.13.2.1.2. Customer Management Commands
2.13.2.1.3. Pseudowire Commands
2.13.2.1.4. SDP Commands
2.13.2.1.5. SDP Keepalive Commands
2.13.2.2. Show Commands
2.13.2.2.1. Service Show Commands
2.13.2.2.2. ETH-CFM Show Commands
2.13.2.3. Tools Perform Commands
3. VLL Services
3.1. Ethernet Pipe (Epipe) Services
3.1.1. Epipe Service Overview
3.1.2. Support for Processing of Packets Received With More Than 2 Tags on a QinQ SAP in Epipe Service (Only on 7210 SAS Devices Configured in Network Mode)
3.1.3. Feature Support, Configuration Notes and Restrictions
3.2. Epipe Oper State Decoupling
3.3. Pseudowire Switching
3.3.1. Pseudowire Switching with Protection
3.3.2. Pseudowire Switching Behavior
3.3.2.1. Pseudowire Switching TLV
3.3.2.2. Static-to-Dynamic Pseudowire Switching
3.3.3. Pseudowire Redundancy
3.3.3.1. VLL Resilience with Two Destination PE Nodes
3.3.4. Dynamic Multi-Segment Pseudowire Routing
3.3.4.1. Overview
3.3.4.2. Pseudowire Routing
3.3.4.2.1. Static Routing
3.3.4.2.2. Explicit Paths
3.3.4.3. Configuring VLLs using Dynamic MS-PWs
3.3.4.3.1. Active/Passive T-PE Selection
3.3.4.3.2. Automatic Endpoint Configuration
3.3.4.3.3. Selecting a Path for an MS-PW
3.3.4.3.4. Pseudowire Templates
3.3.4.4. Pseudowire Redundancy
3.3.4.5. VCCV OAM for Dynamic MS-PWs
3.3.4.6. VCCV-Ping on Dynamic MS-PWs
3.3.4.7. VCCV-Trace on Dynamic MS-PWs
3.3.5. Example Dynamic MS-PW Configuration
3.4. Master-Slave Operation
3.4.1. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.4.1.1. VLL Resilience
3.4.1.2. VLL Resilience for a Switched PW Path
3.4.2. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
3.4.3. VLL Resilience for a Switched Pseudowire Path
3.5. Pseudowire Redundancy Service Models
3.5.1. Redundant VLL Service Model
3.5.2. T-LDP Status Notification Handling Rules
3.5.2.1. Processing Endpoint SAP Active/Standby Status Bits
3.5.2.2. Processing and Merging
3.6. Epipe Configuration for MPLS-TP
3.6.1. SDPs
3.6.2. VLL Spoke-SDP Configuration
3.6.3. Credit Based Algorithm
3.7. VLAN Range for SAPs in an Epipe Service
3.7.1. VLAN Range SAPs Feature Support and Restrictions
3.7.2. Processing Behavior for SAPs Using VLAN Ranges in Network Mode
3.8. VLL Service Considerations
3.8.1. SDPs
3.8.1.1. SAP Encapsulations
3.8.1.2. QoS Policies
3.8.1.3. Filter Policies
3.8.1.4. MAC Resources
3.9. Configuring a VLL Service with CLI
3.9.1. Basic Configurations
3.9.2. Common Configuration Tasks
3.9.3. Configuring VLL Components
3.9.3.1. Creating an Epipe Service
3.9.3.1.1. Configuring Epipe SAP Parameters
3.9.4. Using Spoke-SDP Control Words
3.9.5. Pseudowire Configuration Notes
3.9.6. Configuring VLL Resilience
3.9.7. Configuring VLL Resilience for a Switched Pseudowire Path
3.9.8. Service Management Tasks
3.9.8.1. Modifying Epipe Service Parameters
3.9.8.2. Disabling an Epipe Service
3.9.8.3. Re-Enabling an Epipe Service
3.9.8.4. Deleting an Epipe Service
3.10. VLL Services Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Epipe Service Configuration Commands
3.10.1.1.1. Epipe Global Commands in Network Mode
3.10.1.1.2. Epipe SAP Configuration Commands
3.10.1.1.3. Epipe SAP Meter Override Commands
3.10.1.1.4. Epipe SAP Statistics Commands
3.10.1.1.5. Epipe Spoke-SDP Configuration Commands
3.10.1.1.6. Epipe SAP Filter and QoS Configuration Commands
3.10.1.2. Connection Profile Commands
3.10.1.3. Show Commands
3.10.1.4. Clear Commands
3.10.1.5. Debug Commands
3.10.2. Command Descriptions
3.10.2.1. Configuration Commands
3.10.2.1.1. Generic Commands
3.10.2.1.2. VLL Global Commands
3.10.2.1.3. VLL SAP Commands
3.10.2.1.4. Service Filter and QoS Policy Commands
3.10.2.1.5. VLL SDP Commands
3.10.2.2. Connection Profile Commands
3.10.2.3. Show Commands
3.10.2.4. Clear Commands
3.10.2.5. Debug Commands
4. Virtual Private LAN Service
4.1. VPLS Service Overview
4.1.1. VPLS Packet Walkthrough
4.2. VPLS Features
4.2.1. VPLS Enhancements
4.2.2. VPLS over MPLS
4.2.3. VPLS MAC Learning and Packet Forwarding
4.2.4. Configuration Notes for VPLS Forwarding
4.2.5. IGMP Snooping in VPLS Service
4.2.5.1. Configuration Guidelines for IGMP Snooping in VPLS Service
4.2.6. Multicast VLAN Registration (MVR) Support in VPLS Service
4.2.6.1. Configuration Guidelines for MVR in VPLS Service
4.2.7. Layer 2 Forwarding Table Management
4.2.7.1. FIB Size
4.2.7.2. FIB Size Alarms
4.2.7.3. Local and Remote Aging Timers
4.2.7.4. Disable MAC Aging
4.2.7.5. Disable MAC Learning
4.2.7.6. Unknown MAC Discard
4.2.7.7. VPLS and Rate Limiting
4.2.7.8. MAC Move
4.2.7.8.1. Split Horizon SAP Groups and Split Horizon Spoke-SDP Groups
4.2.7.8.2. Configuration Guidelines for use of Split Horizon Group in a VPLS Service
4.2.8. VPLS and Spanning Tree Protocol
4.2.8.1. Spanning Tree Operating Modes
4.2.8.2. Multiple Spanning Tree
4.2.8.2.1. Configuration notes for Spanning Tree Protocol, L2PT and BPDU translation
4.2.8.3. MSTP for QinQ SAPs
4.2.8.4. Enhancements to the Spanning Tree Protocol
4.2.8.4.1. L2PT Termination
4.2.8.4.2. BPDU Translation
4.2.8.4.3. L2PT and BPDU Translation
4.2.9. VPLS Redundancy
4.2.9.1. Spoke-SDP Redundancy for Metro Interconnection
4.2.9.2. Spoke-SDP-Based Redundant Access
4.2.9.3. Inter-Domain VPLS Resiliency using Multi-Chassis Endpoints
4.2.10. VPLS Access Redundancy
4.2.10.1. STP-Based Redundant Access to VPLS
4.2.10.2. Redundant Access to VPLS without STP
4.2.11. MAC Flush Message Processing
4.2.11.1. MAC Flush with STP
4.2.11.2. Selective MAC Flush
4.2.11.3. Dual Homing to a VPLS Service
4.2.12. VPLS Service Considerations
4.2.12.1. SAP Encapsulations
4.2.12.2. VLAN Processing
4.3. BGP Auto-Discovery for LDP VPLS
4.3.1. BGP AD Overview
4.3.2. Information Model
4.3.3. FEC Element for T-LDP Signaling
4.3.4. BGP-AD and Target LDP (T-LDP) Interaction
4.3.5. SDP Usage
4.3.6. Automatic Creation of SDPs
4.3.7. Manually Provisioned SDP
4.3.8. Automatic Instantiation of Pseudowires (SDP Bindings)
4.3.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS Service
4.3.10. Resiliency Schemes
4.4. Routed VPLS
4.4.1. IES or VPRN IP Interface Binding
4.4.2. Assigning a Service Name to a VPLS Service
4.4.3. Service Binding Requirements
4.4.3.1. Bound Service Name Assignment
4.4.3.2. Binding a Service Name to an IP Interface
4.4.4. Routed VPLS Specific ARP Cache Behavior
4.4.4.1. The allow-ip-int-binding VPLS Flag
4.4.5. Routed VPLS SAPs only Supported on Standard Ethernet Ports
4.4.5.1. LAG Port Membership Constraints
4.4.5.2. VPLS Feature Support and Restrictions
4.4.6. VPLS SAP Ingress IP Filter Override
4.4.6.1. QoS Support for VPLS SAPs and IP Interface in a Routed VPLS Service
4.4.6.2. Routed VPLS Supported Routing Related Protocols
4.4.6.3. Spanning Tree and Split Horizon
4.4.7. Routed VPLS and IGMPv3 Snooping
4.4.7.1. Configuration Guidelines and Restrictions for IGMP Snooping in RVPLS
4.4.8. Routed VPLS Supported Functionality and Restrictions
4.5. Configuring a VPLS Service with CLI
4.5.1. Basic Configuration
4.5.2. Common Configuration Tasks
4.5.3. Configuring VPLS Components
4.5.3.1. Creating a VPLS Service
4.5.3.1.1. Enabling MAC Move
4.5.3.1.2. Configuring STP Bridge Parameters in a VPLS
4.5.3.2. Configuring a VPLS SAP
4.5.3.2.1. Local VPLS SAPs
4.5.3.2.2. Distributed VPLS SAPs
4.5.3.2.3. Configuring SAP-Specific STP Parameters
4.5.3.2.4. STP SAP Operational States
4.5.3.2.5. Configuring VPLS SAPs with per service Split Horizon
4.5.3.3. Configuring SDP Bindings
4.5.3.3.1. Configuring VPLS Spoke SDPs with Split Horizon
4.5.4. Configuring VPLS Redundancy
4.5.4.1. Creating a Management VPLS for SAP Protection
4.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
4.5.4.3. Configuring a BGP-Auto-Discovery
4.5.4.4. Configuring Load Balancing with Management VPLS
4.5.4.5. Configuring Selective MAC Flush
4.5.5. Configuring IGMPv3 Snooping in RVPLS
4.5.6. Configuring BGP Auto-Discovery
4.5.6.1. Configuration Steps
4.5.7. Configuring AS Pseudo-wire in VPLS
4.6. Service Management Tasks
4.6.1. Modifying VPLS Service Parameters
4.6.2. Modifying Management VPLS Parameters
4.6.3. Deleting a Management VPLS
4.6.4. Disabling a Management VPLS
4.6.5. Deleting a VPLS Service
4.6.6. Disabling a VPLS Service
4.6.7. Re-Enabling a VPLS Service
4.7. VPLS Services Command Reference
4.7.1. Command Hierarchies
4.7.1.1. VPLS Configuration Commands
4.7.1.2. VPLS xSTP Commands
4.7.1.3. VPLS SAP DHCP Snooping Commands
4.7.1.4. VPLS SAP Commands
4.7.1.5. VPLS SAP Filter and QoS Commands
4.7.1.6. VPLS SAP IGMP Snooping and MVR Commands
4.7.1.7. VPLS SAP Meter Override Commands
4.7.1.8. VPLS SAP Queue Override Commands
4.7.1.9. VPLS SAP xSTP Commands
4.7.1.10. VPLS SAP Statistics Commands
4.7.1.11. VPLS Mesh SDP Commands
4.7.1.12. VPLS Spoke-SDP Commands
4.7.1.13. Routed VPLS Commands
4.7.1.14. Show Commands
4.7.1.15. Clear Commands
4.7.1.16. Debug Commands
4.7.2. Command Descriptions
4.7.2.1. VPLS Configuration Commands
4.7.2.1.1. Generic Commands
4.7.2.1.2. VPLS Commands
4.7.2.1.3. VPLS STP Commands
4.7.2.1.4. VPLS SAP Commands
4.7.2.1.5. VPLS SAP Statistics Commands
4.7.2.1.6. ETH-CFM Service Commands
4.7.2.1.7. VPLS Filter and QoS Policy Commands
4.7.2.1.8. VPLS SDP Commands
4.7.2.2. Routed VPLS Commands
4.7.2.3. Show Commands
4.7.2.3.1. VPLS Show Commands
4.7.2.3.2. IGMP Snooping Show Commands
4.7.2.4. Clear Commands
4.7.2.5. Debug Commands
5. Internet Enhanced Service
5.1. IES Service Overview
5.2. IES Features
5.2.1. IP Interfaces
5.2.2. IPv6 support for IES IP interfaces (in network mode)
5.3. SAPs
5.3.1. Encapsulations
5.3.1.1. CPE Connectivity Check
5.3.2. QoS Policies
5.3.2.1. CPU QoS for IES Access Interfaces in Network Mode
5.3.3. Filter Policies
5.3.4. VRRP Support for IES IP Interfaces in Network Mode
5.4. Configuring an IES Service with CLI
5.4.1. Basic Configuration
5.4.2. Common Configuration Tasks
5.4.3. Configuring IES Components
5.4.3.1. Configuring an IES Service
5.4.3.2. Configuring IES Interface Parameters
5.4.3.3. Configuring SAP Parameters
5.4.3.4. Configuring VRRP
5.4.4. Service Management Tasks
5.4.4.1. Modifying IES Service Parameters
5.4.4.2. Deleting an IES Service
5.4.4.3. Disabling an IES Service
5.4.4.4. Re-Enabling an IES Service
5.5. IES Services Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Global Commands
5.5.1.2. Interface Commands
5.5.1.3. Interface SAP Commands
5.5.1.4. Interface SAP Filter and QoS Commands
5.5.1.5. VRRP Commands (applicable only for network mode)
5.5.1.6. Routed VPLS Commands
5.5.1.7. Show Commands
5.5.2. Command Descriptions
5.5.2.1. Configuration Commands
5.5.2.1.1. Generic Commands
5.5.2.1.2. IES Global Commands
5.5.2.1.3. IES Interface IPv6 Commands
5.5.2.1.4. IES Interface Commands
5.5.2.1.5. IES Interface ICMP Commands
5.5.2.1.6. IES SAP Commands
5.5.2.1.7. IES Interface Filter and QoS Policy Commands
5.5.2.2. Routed VPLS Commands
5.5.2.3. IES Show Commands
6. Virtual Private Routed Network Service
6.1. VPRN Service Overview
6.1.1. Routing Prerequisites
6.1.2. BGP Support
6.1.3. Route Distinguishers
6.1.3.1. Route Reflector
6.1.3.2. CE to PE Route Exchange
6.1.3.2.1. Route Redistribution
6.1.3.2.2. CPE Connectivity Check
6.1.4. BGP Fast Reroute in a VPRN
6.1.4.1. BGP Fast Reroute in a VPRN Configuration
6.2. VPRN Features
6.2.1. IP Interfaces
6.2.2. IP Interfaces
6.2.3. SAPs
6.2.3.1. IPv6 Support for VPRN IP Interfaces (in Network Mode)
6.2.3.2. Encapsulations
6.2.4. QoS Policies
6.2.5. Filter Policies
6.2.5.1. CPU QoS for VPRN Interfaces
6.2.6. CE to PE Routing Protocols
6.2.6.1. PE to PE Tunneling Mechanisms
6.2.6.2. Per VRF Route Limiting
6.2.7. Exporting MP-BGP VPN Routes
6.2.7.1. Configuration Guidelines
6.2.8. Spoke SDPs
6.2.8.1. T-LDP Status Signaling for Spoke SDPs Terminating on IES/VPRN
6.2.8.2. GR Helper for CE-PE Routing Protocols
6.2.8.3. Spoke-SDP Redundancy into IES/VPRN
6.2.9. Using OSPF in IP-VPNs
6.2.10. Service Label Mode of a VPRN
6.2.11. Multicast in IP-VPN Applications
6.2.11.1. Multicast Protocols Supported in the Provider Network
6.2.11.1.1. MVPN Using BGP Control Plane
6.2.11.1.2. MVPN Membership Auto-discovery using BGP
6.2.11.2. Provider Tunnel Support
6.2.12. Inter-AS VPRNs
6.3. Configuring a VPRN Service with CLI
6.3.1. Basic Configuration
6.3.2. Common Configuration Tasks
6.3.3. Configuring VPRN Components
6.3.3.1. Creating a VPRN Service
6.3.3.2. Configuring Global VPRN Parameters
6.3.3.2.1. Configuring Router Interfaces
6.3.3.2.2. Configuring VPRN Protocols - BGP
6.3.3.2.3. Configuring a VPRN Interface
6.3.3.2.4. Configuring a VPRN Interface SAP
6.3.4. Configuring VPRN Protocols - OSPF
6.3.4.1. VPRN OSPF CLI Syntax
6.3.5. Service Management Tasks
6.3.5.1. Modifying VPRN Service Parameters
6.3.5.2. Deleting a VPRN Service
6.3.5.3. Disabling a VPRN Service
6.3.5.4. Re-enabling a VPRN Service
6.4. VPRN Services Command Reference
6.4.1. Command Hierarchies
6.4.1.1. VPRN Service Configuration Commands
6.4.1.2. Multicast VPN Commands
6.4.1.3. Interface Commands
6.4.1.4. Interface VRRP Commands (IPv4 only - Applicable for network mode only)
6.4.1.5. Interface SAP Commands
6.4.1.6. Interface SAP Filter and QoS Commands
6.4.1.7. Routed VPLS Commands
6.4.1.8. BGP Configuration Commands
6.4.1.9. Router Advertisement Commands
6.4.1.10. OSPF Configuration Commands (IPv4 only)
6.4.1.11. Show Commands
6.4.1.12. Clear Commands
6.4.1.13. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. Configuration Commands
6.4.2.1.1. Generic Commands
6.4.2.1.2. Global Commands
6.4.2.1.3. SDP Commands
6.4.2.1.4. Interface Commands
6.4.2.1.5. Router Advertisement Commands
6.4.2.1.6. Interface Internet Control Message Protocol Commands
6.4.2.1.7. Interface Service Access Point Commands
6.4.2.1.8. Interface Anti-Spoofing Commands
6.4.2.1.9. Interface SAP Filter and QoS Policy Commands
6.4.2.1.10. Routed VPLS Commands
6.4.2.1.11. Interface VRRP Commands
6.4.2.1.12. Counter Mode Commands
6.4.2.1.13. BGP Commands
6.4.2.1.14. OSPF Commands
6.4.2.2. Show Commands
6.4.2.3. Clear Commands
6.4.2.4. Debug Commands
7. Common CLI Command Descriptions
7.1. In This Chapter
7.1.1. Common Service Commands
7.1.1.1. SAP Syntax
8. Appendix: DHCP Management
8.1. DHCP Principles
8.1.1. DHCP Features
8.1.1.1. Using Option 82 Field
8.1.1.2. Trusted and Untrusted
8.1.1.3. DHCP Snooping
8.1.2. Common Configuration Guidelines
8.1.2.1. Configuration Guidelines for DHCP relay and snooping
8.1.2.2. Configuring Option 82 Handling
9. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. SAPs
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Services and SAP Encapsulations
2.3.2.4. SAP Configuration Considerations
2.3.3. QinQ SAP Configuration Restrictions for 7210 SAS in Network Mode Only
2.3.4. SDPs
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. Mixed-LSP Mode of Operation
2.3.4.7. G.8032 Ethernet Ring Protection Switching
2.3.5. SAP and Service Scaling with High SAP Scale Mode
2.3.5.1. Guidelines for Configuring High SAP Scale Mode
2.3.5.2. Guidelines for Configuring Low SAP Scale Mode
2.3.6. Overview of G.8032 Operation
2.3.7. Ethernet Ring Sub-rings
2.3.7.1. Virtual and Non-virtual Channel
2.3.7.2. Ethernet Ring Sub-ring Using Non-virtual Link
2.3.8. Support for Hardware-based 100ms CCM Timers for G.8032 MEPs
2.3.8.1. Configuration Guidelines for 7210 SAS-R6 and 7210 SAS-R12
2.3.8.2. LAG Support
2.3.9. OAM Considerations
2.3.10. QoS Considerations
2.3.11. Support Service and Solution Combinations
2.3.12. Configuration Guidelines for G.8032
2.4. Service Creation Process Overview
2.5. Deploying and Provisioning Services
2.5.1. Phase 1: Core Network Construction
2.5.2. Phase 2: Service Administration
2.5.3. Phase 3: Service Provisioning
2.6. Configuration Notes
2.6.1. General
2.7. Configuring Global Service Entities with CLI
2.7.1. Service Model Entities
2.8. Basic Configuration
2.9. Common Configuration Tasks
2.9.1. Configuring Customer Accounts
2.9.1.1. Customer Information
2.9.2. Configuring an SDP
2.9.2.1. SDP Configuration Tasks
2.9.2.2. Configuring an SDP
2.9.2.3. Configuring a Mixed-LSP SDP
2.10. Ethernet Connectivity Fault Management
2.10.1. Common Actionable Failures
2.10.2. MEP and MIP Support
2.10.3. Configuring ETH-CFM Parameters
2.10.4. Applying ETH-CFM Parameters
2.11. Service Management Tasks
2.11.1. Modifying Customer Accounts
2.11.2. Deleting Customers
2.11.3. Modifying SDPs
2.11.4. Deleting SDPs
2.12. Layer 2 Control Processing
2.13. Global Services Command Reference
2.13.1. Command Hierarchies
2.13.1.1. Customer Commands
2.13.1.2. Pseudowire (PW) Commands (Applicable only for 7210 SAS Devices Configured in Network Mode)
2.13.1.3. SAP Commands for 7210 SAS Devices Configured in Access or Network Mode
2.13.1.4. ETH-CFM Configuration Commands
2.13.1.5. Show Commands
2.13.1.6. Tools Perform Commands
2.13.2. Command Descriptions
2.13.2.1. Configuration Commands
2.13.2.1.1. Generic Commands
2.13.2.1.2. Customer Management Commands
2.13.2.1.3. Pseudowire Commands
2.13.2.1.4. SDP Commands
2.13.2.1.5. SDP Keepalive Commands
2.13.2.2. Show Commands
2.13.2.2.1. Service Show Commands
2.13.2.2.2. ETH-CFM Show Commands
2.13.2.3. Tools Perform Commands
3. VLL Services
3.1. Ethernet Pipe (Epipe) Services
3.1.1. Epipe Service Overview
3.1.2. Support for Processing of Packets Received With More Than 2 Tags on a QinQ SAP in Epipe Service (Only on 7210 SAS Devices Configured in Network Mode)
3.1.3. Feature Support, Configuration Notes and Restrictions
3.2. Epipe Oper State Decoupling
3.3. Pseudowire Switching
3.3.1. Pseudowire Switching with Protection
3.3.2. Pseudowire Switching Behavior
3.3.2.1. Pseudowire Switching TLV
3.3.2.2. Static-to-Dynamic Pseudowire Switching
3.3.3. Pseudowire Redundancy
3.3.3.1. VLL Resilience with Two Destination PE Nodes
3.3.4. Dynamic Multi-Segment Pseudowire Routing
3.3.4.1. Overview
3.3.4.2. Pseudowire Routing
3.3.4.2.1. Static Routing
3.3.4.2.2. Explicit Paths
3.3.4.3. Configuring VLLs using Dynamic MS-PWs
3.3.4.3.1. Active/Passive T-PE Selection
3.3.4.3.2. Automatic Endpoint Configuration
3.3.4.3.3. Selecting a Path for an MS-PW
3.3.4.3.4. Pseudowire Templates
3.3.4.4. Pseudowire Redundancy
3.3.4.5. VCCV OAM for Dynamic MS-PWs
3.3.4.6. VCCV-Ping on Dynamic MS-PWs
3.3.4.7. VCCV-Trace on Dynamic MS-PWs
3.3.5. Example Dynamic MS-PW Configuration
3.4. Master-Slave Operation
3.4.1. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
3.4.1.1. VLL Resilience
3.4.1.2. VLL Resilience for a Switched PW Path
3.4.2. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
3.4.3. VLL Resilience for a Switched Pseudowire Path
3.5. Pseudowire Redundancy Service Models
3.5.1. Redundant VLL Service Model
3.5.2. T-LDP Status Notification Handling Rules
3.5.2.1. Processing Endpoint SAP Active/Standby Status Bits
3.5.2.2. Processing and Merging
3.6. Epipe Configuration for MPLS-TP
3.6.1. SDPs
3.6.2. VLL Spoke-SDP Configuration
3.6.3. Credit Based Algorithm
3.7. VLAN Range for SAPs in an Epipe Service
3.7.1. VLAN Range SAPs Feature Support and Restrictions
3.7.2. Processing Behavior for SAPs Using VLAN Ranges in Network Mode
3.8. VLL Service Considerations
3.8.1. SDPs
3.8.1.1. SAP Encapsulations
3.8.1.2. QoS Policies
3.8.1.3. Filter Policies
3.8.1.4. MAC Resources
3.9. Configuring a VLL Service with CLI
3.9.1. Basic Configurations
3.9.2. Common Configuration Tasks
3.9.3. Configuring VLL Components
3.9.3.1. Creating an Epipe Service
3.9.3.1.1. Configuring Epipe SAP Parameters
3.9.4. Using Spoke-SDP Control Words
3.9.5. Pseudowire Configuration Notes
3.9.6. Configuring VLL Resilience
3.9.7. Configuring VLL Resilience for a Switched Pseudowire Path
3.9.8. Service Management Tasks
3.9.8.1. Modifying Epipe Service Parameters
3.9.8.2. Disabling an Epipe Service
3.9.8.3. Re-Enabling an Epipe Service
3.9.8.4. Deleting an Epipe Service
3.10. VLL Services Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Epipe Service Configuration Commands
3.10.1.1.1. Epipe Global Commands in Network Mode
3.10.1.1.2. Epipe SAP Configuration Commands
3.10.1.1.3. Epipe SAP Meter Override Commands
3.10.1.1.4. Epipe SAP Statistics Commands
3.10.1.1.5. Epipe Spoke-SDP Configuration Commands
3.10.1.1.6. Epipe SAP Filter and QoS Configuration Commands
3.10.1.2. Connection Profile Commands
3.10.1.3. Show Commands
3.10.1.4. Clear Commands
3.10.1.5. Debug Commands
3.10.2. Command Descriptions
3.10.2.1. Configuration Commands
3.10.2.1.1. Generic Commands
3.10.2.1.2. VLL Global Commands
3.10.2.1.3. VLL SAP Commands
3.10.2.1.4. Service Filter and QoS Policy Commands
3.10.2.1.5. VLL SDP Commands
3.10.2.2. Connection Profile Commands
3.10.2.3. Show Commands
3.10.2.4. Clear Commands
3.10.2.5. Debug Commands
4. Virtual Private LAN Service
4.1. VPLS Service Overview
4.1.1. VPLS Packet Walkthrough
4.2. VPLS Features
4.2.1. VPLS Enhancements
4.2.2. VPLS over MPLS
4.2.3. VPLS MAC Learning and Packet Forwarding
4.2.4. Configuration Notes for VPLS Forwarding
4.2.5. IGMP Snooping in VPLS Service
4.2.5.1. Configuration Guidelines for IGMP Snooping in VPLS Service
4.2.6. Multicast VLAN Registration (MVR) Support in VPLS Service
4.2.6.1. Configuration Guidelines for MVR in VPLS Service
4.2.7. Layer 2 Forwarding Table Management
4.2.7.1. FIB Size
4.2.7.2. FIB Size Alarms
4.2.7.3. Local and Remote Aging Timers
4.2.7.4. Disable MAC Aging
4.2.7.5. Disable MAC Learning
4.2.7.6. Unknown MAC Discard
4.2.7.7. VPLS and Rate Limiting
4.2.7.8. MAC Move
4.2.7.8.1. Split Horizon SAP Groups and Split Horizon Spoke-SDP Groups
4.2.7.8.2. Configuration Guidelines for use of Split Horizon Group in a VPLS Service
4.2.8. VPLS and Spanning Tree Protocol
4.2.8.1. Spanning Tree Operating Modes
4.2.8.2. Multiple Spanning Tree
4.2.8.2.1. Configuration notes for Spanning Tree Protocol, L2PT and BPDU translation
4.2.8.3. MSTP for QinQ SAPs
4.2.8.4. Enhancements to the Spanning Tree Protocol
4.2.8.4.1. L2PT Termination
4.2.8.4.2. BPDU Translation
4.2.8.4.3. L2PT and BPDU Translation
4.2.9. VPLS Redundancy
4.2.9.1. Spoke-SDP Redundancy for Metro Interconnection
4.2.9.2. Spoke-SDP-Based Redundant Access
4.2.9.3. Inter-Domain VPLS Resiliency using Multi-Chassis Endpoints
4.2.10. VPLS Access Redundancy
4.2.10.1. STP-Based Redundant Access to VPLS
4.2.10.2. Redundant Access to VPLS without STP
4.2.11. MAC Flush Message Processing
4.2.11.1. MAC Flush with STP
4.2.11.2. Selective MAC Flush
4.2.11.3. Dual Homing to a VPLS Service
4.2.12. VPLS Service Considerations
4.2.12.1. SAP Encapsulations
4.2.12.2. VLAN Processing
4.3. BGP Auto-Discovery for LDP VPLS
4.3.1. BGP AD Overview
4.3.2. Information Model
4.3.3. FEC Element for T-LDP Signaling
4.3.4. BGP-AD and Target LDP (T-LDP) Interaction
4.3.5. SDP Usage
4.3.6. Automatic Creation of SDPs
4.3.7. Manually Provisioned SDP
4.3.8. Automatic Instantiation of Pseudowires (SDP Bindings)
4.3.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS Service
4.3.10. Resiliency Schemes
4.4. Routed VPLS
4.4.1. IES or VPRN IP Interface Binding
4.4.2. Assigning a Service Name to a VPLS Service
4.4.3. Service Binding Requirements
4.4.3.1. Bound Service Name Assignment
4.4.3.2. Binding a Service Name to an IP Interface
4.4.4. Routed VPLS Specific ARP Cache Behavior
4.4.4.1. The allow-ip-int-binding VPLS Flag
4.4.5. Routed VPLS SAPs only Supported on Standard Ethernet Ports
4.4.5.1. LAG Port Membership Constraints
4.4.5.2. VPLS Feature Support and Restrictions
4.4.6. VPLS SAP Ingress IP Filter Override
4.4.6.1. QoS Support for VPLS SAPs and IP Interface in a Routed VPLS Service
4.4.6.2. Routed VPLS Supported Routing Related Protocols
4.4.6.3. Spanning Tree and Split Horizon
4.4.7. Routed VPLS and IGMPv3 Snooping
4.4.7.1. Configuration Guidelines and Restrictions for IGMP Snooping in RVPLS
4.4.8. Routed VPLS Supported Functionality and Restrictions
4.5. Configuring a VPLS Service with CLI
4.5.1. Basic Configuration
4.5.2. Common Configuration Tasks
4.5.3. Configuring VPLS Components
4.5.3.1. Creating a VPLS Service
4.5.3.1.1. Enabling MAC Move
4.5.3.1.2. Configuring STP Bridge Parameters in a VPLS
4.5.3.2. Configuring a VPLS SAP
4.5.3.2.1. Local VPLS SAPs
4.5.3.2.2. Distributed VPLS SAPs
4.5.3.2.3. Configuring SAP-Specific STP Parameters
4.5.3.2.4. STP SAP Operational States
4.5.3.2.5. Configuring VPLS SAPs with per service Split Horizon
4.5.3.3. Configuring SDP Bindings
4.5.3.3.1. Configuring VPLS Spoke SDPs with Split Horizon
4.5.4. Configuring VPLS Redundancy
4.5.4.1. Creating a Management VPLS for SAP Protection
4.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
4.5.4.3. Configuring a BGP-Auto-Discovery
4.5.4.4. Configuring Load Balancing with Management VPLS
4.5.4.5. Configuring Selective MAC Flush
4.5.5. Configuring IGMPv3 Snooping in RVPLS
4.5.6. Configuring BGP Auto-Discovery
4.5.6.1. Configuration Steps
4.5.7. Configuring AS Pseudo-wire in VPLS
4.6. Service Management Tasks
4.6.1. Modifying VPLS Service Parameters
4.6.2. Modifying Management VPLS Parameters
4.6.3. Deleting a Management VPLS
4.6.4. Disabling a Management VPLS
4.6.5. Deleting a VPLS Service
4.6.6. Disabling a VPLS Service
4.6.7. Re-Enabling a VPLS Service
4.7. VPLS Services Command Reference
4.7.1. Command Hierarchies
4.7.1.1. VPLS Configuration Commands
4.7.1.2. VPLS xSTP Commands
4.7.1.3. VPLS SAP DHCP Snooping Commands
4.7.1.4. VPLS SAP Commands
4.7.1.5. VPLS SAP Filter and QoS Commands
4.7.1.6. VPLS SAP IGMP Snooping and MVR Commands
4.7.1.7. VPLS SAP Meter Override Commands
4.7.1.8. VPLS SAP Queue Override Commands
4.7.1.9. VPLS SAP xSTP Commands
4.7.1.10. VPLS SAP Statistics Commands
4.7.1.11. VPLS Mesh SDP Commands
4.7.1.12. VPLS Spoke-SDP Commands
4.7.1.13. Routed VPLS Commands
4.7.1.14. Show Commands
4.7.1.15. Clear Commands
4.7.1.16. Debug Commands
4.7.2. Command Descriptions
4.7.2.1. VPLS Configuration Commands
4.7.2.1.1. Generic Commands
4.7.2.1.2. VPLS Commands
4.7.2.1.3. VPLS STP Commands
4.7.2.1.4. VPLS SAP Commands
4.7.2.1.5. VPLS SAP Statistics Commands
4.7.2.1.6. ETH-CFM Service Commands
4.7.2.1.7. VPLS Filter and QoS Policy Commands
4.7.2.1.8. VPLS SDP Commands
4.7.2.2. Routed VPLS Commands
4.7.2.3. Show Commands
4.7.2.3.1. VPLS Show Commands
4.7.2.3.2. IGMP Snooping Show Commands
4.7.2.4. Clear Commands
4.7.2.5. Debug Commands
5. Internet Enhanced Service
5.1. IES Service Overview
5.2. IES Features
5.2.1. IP Interfaces
5.2.2. IPv6 support for IES IP interfaces (in network mode)
5.3. SAPs
5.3.1. Encapsulations
5.3.1.1. CPE Connectivity Check
5.3.2. QoS Policies
5.3.2.1. CPU QoS for IES Access Interfaces in Network Mode
5.3.3. Filter Policies
5.3.4. VRRP Support for IES IP Interfaces in Network Mode
5.4. Configuring an IES Service with CLI
5.4.1. Basic Configuration
5.4.2. Common Configuration Tasks
5.4.3. Configuring IES Components
5.4.3.1. Configuring an IES Service
5.4.3.2. Configuring IES Interface Parameters
5.4.3.3. Configuring SAP Parameters
5.4.3.4. Configuring VRRP
5.4.4. Service Management Tasks
5.4.4.1. Modifying IES Service Parameters
5.4.4.2. Deleting an IES Service
5.4.4.3. Disabling an IES Service
5.4.4.4. Re-Enabling an IES Service
5.5. IES Services Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Global Commands
5.5.1.2. Interface Commands
5.5.1.3. Interface SAP Commands
5.5.1.4. Interface SAP Filter and QoS Commands
5.5.1.5. VRRP Commands (applicable only for network mode)
5.5.1.6. Routed VPLS Commands
5.5.1.7. Show Commands
5.5.2. Command Descriptions
5.5.2.1. Configuration Commands
5.5.2.1.1. Generic Commands
5.5.2.1.2. IES Global Commands
5.5.2.1.3. IES Interface IPv6 Commands
5.5.2.1.4. IES Interface Commands
5.5.2.1.5. IES Interface ICMP Commands
5.5.2.1.6. IES SAP Commands
5.5.2.1.7. IES Interface Filter and QoS Policy Commands
5.5.2.2. Routed VPLS Commands
5.5.2.3. IES Show Commands
6. Virtual Private Routed Network Service
6.1. VPRN Service Overview
6.1.1. Routing Prerequisites
6.1.2. BGP Support
6.1.3. Route Distinguishers
6.1.3.1. Route Reflector
6.1.3.2. CE to PE Route Exchange
6.1.3.2.1. Route Redistribution
6.1.3.2.2. CPE Connectivity Check
6.1.4. BGP Fast Reroute in a VPRN
6.1.4.1. BGP Fast Reroute in a VPRN Configuration
6.2. VPRN Features
6.2.1. IP Interfaces
6.2.2. IP Interfaces
6.2.3. SAPs
6.2.3.1. IPv6 Support for VPRN IP Interfaces (in Network Mode)
6.2.3.2. Encapsulations
6.2.4. QoS Policies
6.2.5. Filter Policies
6.2.5.1. CPU QoS for VPRN Interfaces
6.2.6. CE to PE Routing Protocols
6.2.6.1. PE to PE Tunneling Mechanisms
6.2.6.2. Per VRF Route Limiting
6.2.7. Exporting MP-BGP VPN Routes
6.2.7.1. Configuration Guidelines
6.2.8. Spoke SDPs
6.2.8.1. T-LDP Status Signaling for Spoke SDPs Terminating on IES/VPRN
6.2.8.2. GR Helper for CE-PE Routing Protocols
6.2.8.3. Spoke-SDP Redundancy into IES/VPRN
6.2.9. Using OSPF in IP-VPNs
6.2.10. Service Label Mode of a VPRN
6.2.11. Multicast in IP-VPN Applications
6.2.11.1. Multicast Protocols Supported in the Provider Network
6.2.11.1.1. MVPN Using BGP Control Plane
6.2.11.1.2. MVPN Membership Auto-discovery using BGP
6.2.11.2. Provider Tunnel Support
6.2.12. Inter-AS VPRNs
6.3. Configuring a VPRN Service with CLI
6.3.1. Basic Configuration
6.3.2. Common Configuration Tasks
6.3.3. Configuring VPRN Components
6.3.3.1. Creating a VPRN Service
6.3.3.2. Configuring Global VPRN Parameters
6.3.3.2.1. Configuring Router Interfaces
6.3.3.2.2. Configuring VPRN Protocols - BGP
6.3.3.2.3. Configuring a VPRN Interface
6.3.3.2.4. Configuring a VPRN Interface SAP
6.3.4. Configuring VPRN Protocols - OSPF
6.3.4.1. VPRN OSPF CLI Syntax
6.3.5. Service Management Tasks
6.3.5.1. Modifying VPRN Service Parameters
6.3.5.2. Deleting a VPRN Service
6.3.5.3. Disabling a VPRN Service
6.3.5.4. Re-enabling a VPRN Service
6.4. VPRN Services Command Reference
6.4.1. Command Hierarchies
6.4.1.1. VPRN Service Configuration Commands
6.4.1.2. Multicast VPN Commands
6.4.1.3. Interface Commands
6.4.1.4. Interface VRRP Commands (IPv4 only - Applicable for network mode only)
6.4.1.5. Interface SAP Commands
6.4.1.6. Interface SAP Filter and QoS Commands
6.4.1.7. Routed VPLS Commands
6.4.1.8. BGP Configuration Commands
6.4.1.9. Router Advertisement Commands
6.4.1.10. OSPF Configuration Commands (IPv4 only)
6.4.1.11. Show Commands
6.4.1.12. Clear Commands
6.4.1.13. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. Configuration Commands
6.4.2.1.1. Generic Commands
6.4.2.1.2. Global Commands
6.4.2.1.3. SDP Commands
6.4.2.1.4. Interface Commands
6.4.2.1.5. Router Advertisement Commands
6.4.2.1.6. Interface Internet Control Message Protocol Commands
6.4.2.1.7. Interface Service Access Point Commands
6.4.2.1.8. Interface Anti-Spoofing Commands
6.4.2.1.9. Interface SAP Filter and QoS Policy Commands
6.4.2.1.10. Routed VPLS Commands
6.4.2.1.11. Interface VRRP Commands
6.4.2.1.12. Counter Mode Commands
6.4.2.1.13. BGP Commands
6.4.2.1.14. OSPF Commands
6.4.2.2. Show Commands
6.4.2.3. Clear Commands
6.4.2.4. Debug Commands
7. Common CLI Command Descriptions
7.1. In This Chapter
7.1.1. Common Service Commands
7.1.1.1. SAP Syntax
8. Appendix: DHCP Management
8.1. DHCP Principles
8.1.1. DHCP Features
8.1.1.1. Using Option 82 Field
8.1.1.2. Trusted and Untrusted
8.1.1.3. DHCP Snooping
8.1.2. Common Configuration Guidelines
8.1.2.1. Configuration Guidelines for DHCP relay and snooping
8.1.2.2. Configuring Option 82 Handling
9. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-D, Dxp, K 2F1C2T, K 2F6C4T, K 3SFP+ 8C System Management Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Management Configuration Process
2. Security
2.1. In This Chapter
2.2. Authentication, Authorization, and Accounting
2.2.1. Authentication
2.2.1.1. Local Authentication
2.2.1.2. RADIUS Authentication
2.2.1.2.1. RADIUS Server Selection
2.2.1.3. TACACS+ Authentication
2.2.2. Authorization
2.2.2.1. Local Authorization
2.2.2.2. RADIUS Authorization
2.2.2.3. TACACS+ Authorization
2.2.3. Accounting
2.2.3.1. RADIUS Accounting
2.2.3.2. TACACS+ Accounting
2.3. Security Controls
2.3.1. When a Server Does Not Respond
2.3.2. Access Request Flow
2.4. Control and Management Traffic Protection
2.4.1. CPM Management Access Filters
2.4.1.1. CPM Protocols and Ports
2.4.2. Management Access Filter
2.4.2.1. MAF Packet Match
2.4.2.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.4.2.3. MAF Policy Action
2.4.2.4. MAF Policy Statistics and Logging
2.5. Centralized CPU Protection
2.6. Vendor-Specific Attributes (VSAS)
2.6.1. User (VSA) Configuration Example
2.7. Other Security Features
2.7.1. Secure Shell (SSH)
2.7.2. MAC Client and Server List
2.7.3. Cipher Client and Server List
2.7.4. Exponential Login Back-off
2.7.5. User Lockout
2.7.6. Encryption
2.7.7. 802.1x Network Access Control
2.7.8. TCP Enhanced Authentication Option
2.7.8.1. Packet Formats
2.7.8.2. Keychain
2.8. Configuration Notes
2.8.1. General
2.9. Configuring Security with CLI
2.9.1. Setting Up Security Attributes
2.9.1.1. Configuring Authentication
2.9.1.2. Configuring Authorization
2.9.1.3. Configuring Accounting
2.9.2. Security Configurations
2.9.3. Security Configuration Procedures
2.9.3.1. Configuring Management Access Filters
2.9.3.2. Configuring Password Management Parameters
2.9.3.3. Configuring Profiles
2.9.3.4. Configuring Users
2.9.3.5. Configuring Keychains
2.9.3.6. Copying and Overwriting Users and Profiles
2.9.3.6.1. User
2.9.3.6.2. Profile
2.9.3.7. Enabling SSH
2.9.4. RADIUS Configurations
2.9.4.1. Configuring RADIUS Authentication
2.9.4.2. Configuring RADIUS Authorization
2.9.4.3. Configuring RADIUS Accounting
2.9.4.4. Configuring 802.1x RADIUS Policies
2.9.5. TACACS+ Configurations
2.9.5.1. Enabling TACACS+ Authentication
2.9.5.2. Configuring TACACS+ Authorization
2.9.5.3. Configuring TACACS+ Accounting
2.9.6. Configuring Login Controls
2.10. Security Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Configuration Commands
2.10.1.1.1. Security Commands
2.10.1.1.2. Management Access Filter Commands
2.10.1.1.3. Security Password Commands
2.10.1.1.4. Profile Commands
2.10.1.1.5. RADIUS Commands
2.10.1.1.6. SSH Commands
2.10.1.1.7. TACPLUS Commands
2.10.1.1.8. User Commands
2.10.1.1.9. User Template Commands
2.10.1.1.10. Dot1x Commands
2.10.1.1.11. Keychain Commands
2.10.1.2. Login Control Commands
2.10.1.3. Show Commands
2.10.1.3.1. Security Commands
2.10.1.3.2. Login Control Commands
2.10.1.4. Clear Commands
2.10.1.5. Debug Commands
2.10.2. Command Descriptions
2.10.2.1. Configuration Commands
2.10.2.1.1. General Security Commands
2.10.2.1.2. Login, Telnet, SSH and FTP Commands
2.10.2.1.3. Management Access Filter Commands
2.10.2.1.4. Password Commands
2.10.2.1.5. Profile Management Commands
2.10.2.1.6. User Management Commands
2.10.2.1.7. RADIUS Client Commands
2.10.2.1.8. TACACS+ Client Commands
2.10.2.1.9. Generic 802.1x Commands
2.10.2.1.10. TCP Enhanced Authentication Commands
2.10.2.2. Show Commands
2.10.2.2.1. Security Commands
2.10.2.2.2. Login Control
2.10.2.3. Debug Commands
3. SNMP
3.1. In This Chapter
3.2. SNMP Overview
3.2.1. SNMP Architecture
3.2.2. Management Information Base
3.2.3. SNMP Protocol Operations
3.2.4. SNMP Versions
3.2.5. Management Information Access Control
3.2.6. User-Based Security Model Community Strings
3.2.7. Views
3.2.8. Access Groups
3.2.9. Users
3.3. Which SNMP Version to Use?
3.4. Configuration Notes
3.4.1. General
3.5. Configuring SNMP with CLI
3.5.1. SNMP Configuration Overview
3.5.1.1. Configuring SNMPv1 and SNMPv2c
3.5.1.2. Configuring SNMPv3
3.5.2. Basic SNMP Security Configuration
3.5.3. Configuring SNMP Components
3.5.3.1. Configuring a Community String
3.5.3.2. Configuring View Options
3.5.3.3. Configuring Access Options
3.5.3.4. Configuring USM Community Options
3.5.3.5. Configuring Other SNMP Parameters
3.6. SNMP Command Reference
3.6.1. Command Hierarchies
3.6.1.1. Configuration Commands
3.6.1.1.1. SNMP System Commands
3.6.1.1.2. SNMP Security Commands
3.6.1.2. Show Commands
3.6.2. Command Descriptions
3.6.2.1. Configuration Commands
3.6.2.1.1. SNMP System Commands
3.6.2.1.2. SNMP Security Commands
3.6.2.2. Show Commands
4. NETCONF
4.1. NETCONF Overview
4.2. NETCONF in SR OS
4.2.1. YANG Data Models
4.2.2. Transport and Sessions
4.2.3. NETCONF Operations
4.2.3.1. <get>
4.2.3.2. <get-config>
4.2.3.3. <edit-config>
4.2.3.4. <copy-config> and <delete-config>
4.2.3.5. <validate>
4.2.4. Datastores and URLs
4.2.5. General NETCONF behavior
4.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
4.2.5.2. Example: Non-Standard Namespace Defined in <rpc> Tag
4.2.5.3. Example: Non-Standard Namespace not Defined in <rpc> Tag
4.2.5.4. Example: Non-Standard Namespace or Prefix not Defined in <rpc> Tag
4.2.5.5. Example: Chunked Frame Mechanism
4.2.5.6. Example: Two Rollback Items with Responses
4.2.5.7. Example: Syntax Error in the Rollback Request
4.2.5.8. Example: Error in Processing the Request
4.2.5.9. Example: Error in Second Item of the Request
4.2.5.10. System Provisioned Configuration Objects
4.3. Establishing a NETCONF Session
4.4. XML Content Layer
4.4.1. <edit-config> with XML Content Layer
4.4.2. <get-config> with XML Content Layer
4.4.2.1. Example: Request That Returns an Error
4.4.2.2. Example: Content Match Node on a List Key
4.4.2.3. Example: Selection Node That Is a Container
4.4.2.4. Example: List Name Node as an Invalid Selection Node
4.4.2.5. Example: Empty Leaf Node as Invalid Selection Node
4.4.2.6. Example: Key Repeated in the Same Instance of the List Node
4.4.2.7. Example: Retrieving the Full Configuration
4.5. XML Content Layer Examples
4.5.1. Example: Checking NETCONF Status
4.5.2. Example: Creating a Basic VPRN Service
4.5.3. Example: Creating a VPRN Service With a SAP
4.6. CLI Content Layer
4.7. CLI Content Layer Examples
4.7.1. Example: Configuration Change
4.7.2. Example: Retrieving Configuration Information
4.7.3. Example: Retrieving Full Configuration Information
4.7.4. Example: <get> Request
4.8. NETCONF Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Configuration Commands
4.8.1.1.1. Netconf System Commands
4.8.1.1.2. Netconf Security Commands
4.8.1.2. Show Commands
4.8.1.3. Configuration Commands
4.8.1.3.1. NETCONF System Commands
4.8.1.3.2. NETCONF Security Commands
4.8.1.4. Show Commands
5. Event and Accounting Logs
5.1. Logging Overview
5.2. Log Destinations
5.2.1. Console
5.2.2. Session
5.2.3. Memory Logs
5.2.4. Log Files
5.2.5. SNMP Trap Group
5.2.6. Syslog
5.3. Event Logs
5.3.1. Event Sources
5.3.2. Event Control
5.3.3. Log Manager and Event Logs
5.3.4. Event Filter Policies
5.3.5. Event Log Entries
5.3.6. Simple Logger Event Throttling
5.3.7. Default System Log
5.4. Accounting Logs
5.4.1. Accounting Records
5.4.2. Accounting Record Names and Collection Periods
5.4.3. Accounting Record Details
5.4.4. Configuration Guidelines
5.4.5. Reporting and Time-Based Accounting
5.5. Configuration Notes
5.6. Configuring Logging with CLI
5.6.1. Log Configuration Overview
5.6.1.1. Log Types
5.6.2. Basic Event Log Configuration
5.6.3. Common Configuration Tasks
5.6.3.1. Configuring an Event Log
5.6.3.2. Configuring a File ID
5.6.3.3. Configuring an Accounting Policy
5.6.3.4. Configuring Event Control
5.6.3.5. Configuring Throttle Rate
5.6.3.6. Configuring a Log Filter
5.6.3.7. Configuring an SNMP Trap Group
5.6.3.8. Configuring SNMP Dying Gasp
5.6.3.8.1. Configuration Guidelines for SNMP Dying Gasp Trap
5.6.3.9. Configuring a Syslog Target
5.6.4. Log Management Tasks
5.6.4.1. Modifying a Log File
5.6.4.2. Deleting a Log File
5.6.4.3. Modifying a File ID
5.6.4.4. Deleting a File ID
5.6.4.5. Modifying a Syslog ID
5.6.4.6. Deleting a Syslog
5.6.4.7. Modifying an SNMP Trap Group
5.6.4.8. Deleting an SNMP Trap Group
5.6.4.9. Modifying a Log Filter
5.6.4.10. Deleting a Log Filter
5.6.4.11. Modifying Event Control Parameters
5.6.4.12. Returning to the Default Event Control Configuration
5.7. Log Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. Event Control Commands
5.7.1.1.2. Accounting Policy Commands
5.7.1.1.3. File ID Commands
5.7.1.1.4. Event Filter Commands
5.7.1.1.5. Log ID Commands
5.7.1.1.6. SNMP Trap Group Commands
5.7.1.1.7. Syslog Commands
5.7.1.2. Show Commands
5.7.1.3. Clear Commands
5.7.1.4. Tools Dump Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Event Control Commands
5.7.2.1.3. Log File Commands
5.7.2.1.4. Log Filter Commands
5.7.2.1.5. Log Filter Entry Commands
5.7.2.1.6. Log Filter Entry Match Commands
5.7.2.1.7. Syslog Commands
5.7.2.1.8. SNMP Trap Group Commands
5.7.2.1.9. Logging Destination Commands
5.7.2.1.10. Accounting Policy Commands
5.7.2.2. Show Commands
5.7.2.3. Clear Commands
6. Facility Alarms
6.1. Facility Alarms Overview
6.2. Facility Alarms vs. Log Events
6.3. Facility Alarm Severities and Alarm LED Behavior
6.4. Facility Alarm Hierarchy
6.5. Facility Alarm List
6.6. Configuring Logging with CLI
6.6.1. Basic Facility Alarm Configuration
6.6.2. Common Configuration Tasks
6.6.2.1. Configuring the Maximum Number of Alarms To Clear
6.7. Facility Alarms Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Facility Alarm Configuration Commands
6.7.1.2. Show Commands
6.7.2. Command Descriptions
6.7.2.1. Configuration Commands
6.7.2.2. Show Commands
7. Appendix: Accounting Record Name Details for 7210 SAS Platforms
7.1. Accounting Record Name Details for 7210 SAS-D
7.2. Accounting Record Name Details for 7210 SAS-Dxp
7.3. Accounting Record Name Details for 7210 SAS-K 2F1C2T
7.4. Accounting Record Name Details for 7210 SAS-K 2F6C4T
7.5. Accounting Record Name Details for 7210 SAS-K 3SFP+ 8C
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Management Configuration Process
2. Security
2.1. In This Chapter
2.2. Authentication, Authorization, and Accounting
2.2.1. Authentication
2.2.1.1. Local Authentication
2.2.1.2. RADIUS Authentication
2.2.1.2.1. RADIUS Server Selection
2.2.1.3. TACACS+ Authentication
2.2.2. Authorization
2.2.2.1. Local Authorization
2.2.2.2. RADIUS Authorization
2.2.2.3. TACACS+ Authorization
2.2.3. Accounting
2.2.3.1. RADIUS Accounting
2.2.3.2. TACACS+ Accounting
2.3. Security Controls
2.3.1. When a Server Does Not Respond
2.3.2. Access Request Flow
2.4. Control and Management Traffic Protection
2.4.1. CPM Management Access Filters
2.4.1.1. CPM Protocols and Ports
2.4.2. Management Access Filter
2.4.2.1. MAF Packet Match
2.4.2.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.4.2.3. MAF Policy Action
2.4.2.4. MAF Policy Statistics and Logging
2.5. Centralized CPU Protection
2.6. Vendor-Specific Attributes (VSAS)
2.6.1. User (VSA) Configuration Example
2.7. Other Security Features
2.7.1. Secure Shell (SSH)
2.7.2. MAC Client and Server List
2.7.3. Cipher Client and Server List
2.7.4. Exponential Login Back-off
2.7.5. User Lockout
2.7.6. Encryption
2.7.7. 802.1x Network Access Control
2.7.8. TCP Enhanced Authentication Option
2.7.8.1. Packet Formats
2.7.8.2. Keychain
2.8. Configuration Notes
2.8.1. General
2.9. Configuring Security with CLI
2.9.1. Setting Up Security Attributes
2.9.1.1. Configuring Authentication
2.9.1.2. Configuring Authorization
2.9.1.3. Configuring Accounting
2.9.2. Security Configurations
2.9.3. Security Configuration Procedures
2.9.3.1. Configuring Management Access Filters
2.9.3.2. Configuring Password Management Parameters
2.9.3.3. Configuring Profiles
2.9.3.4. Configuring Users
2.9.3.5. Configuring Keychains
2.9.3.6. Copying and Overwriting Users and Profiles
2.9.3.6.1. User
2.9.3.6.2. Profile
2.9.3.7. Enabling SSH
2.9.4. RADIUS Configurations
2.9.4.1. Configuring RADIUS Authentication
2.9.4.2. Configuring RADIUS Authorization
2.9.4.3. Configuring RADIUS Accounting
2.9.4.4. Configuring 802.1x RADIUS Policies
2.9.5. TACACS+ Configurations
2.9.5.1. Enabling TACACS+ Authentication
2.9.5.2. Configuring TACACS+ Authorization
2.9.5.3. Configuring TACACS+ Accounting
2.9.6. Configuring Login Controls
2.10. Security Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Configuration Commands
2.10.1.1.1. Security Commands
2.10.1.1.2. Management Access Filter Commands
2.10.1.1.3. Security Password Commands
2.10.1.1.4. Profile Commands
2.10.1.1.5. RADIUS Commands
2.10.1.1.6. SSH Commands
2.10.1.1.7. TACPLUS Commands
2.10.1.1.8. User Commands
2.10.1.1.9. User Template Commands
2.10.1.1.10. Dot1x Commands
2.10.1.1.11. Keychain Commands
2.10.1.2. Login Control Commands
2.10.1.3. Show Commands
2.10.1.3.1. Security Commands
2.10.1.3.2. Login Control Commands
2.10.1.4. Clear Commands
2.10.1.5. Debug Commands
2.10.2. Command Descriptions
2.10.2.1. Configuration Commands
2.10.2.1.1. General Security Commands
2.10.2.1.2. Login, Telnet, SSH and FTP Commands
2.10.2.1.3. Management Access Filter Commands
2.10.2.1.4. Password Commands
2.10.2.1.5. Profile Management Commands
2.10.2.1.6. User Management Commands
2.10.2.1.7. RADIUS Client Commands
2.10.2.1.8. TACACS+ Client Commands
2.10.2.1.9. Generic 802.1x Commands
2.10.2.1.10. TCP Enhanced Authentication Commands
2.10.2.2. Show Commands
2.10.2.2.1. Security Commands
2.10.2.2.2. Login Control
2.10.2.3. Debug Commands
3. SNMP
3.1. In This Chapter
3.2. SNMP Overview
3.2.1. SNMP Architecture
3.2.2. Management Information Base
3.2.3. SNMP Protocol Operations
3.2.4. SNMP Versions
3.2.5. Management Information Access Control
3.2.6. User-Based Security Model Community Strings
3.2.7. Views
3.2.8. Access Groups
3.2.9. Users
3.3. Which SNMP Version to Use?
3.4. Configuration Notes
3.4.1. General
3.5. Configuring SNMP with CLI
3.5.1. SNMP Configuration Overview
3.5.1.1. Configuring SNMPv1 and SNMPv2c
3.5.1.2. Configuring SNMPv3
3.5.2. Basic SNMP Security Configuration
3.5.3. Configuring SNMP Components
3.5.3.1. Configuring a Community String
3.5.3.2. Configuring View Options
3.5.3.3. Configuring Access Options
3.5.3.4. Configuring USM Community Options
3.5.3.5. Configuring Other SNMP Parameters
3.6. SNMP Command Reference
3.6.1. Command Hierarchies
3.6.1.1. Configuration Commands
3.6.1.1.1. SNMP System Commands
3.6.1.1.2. SNMP Security Commands
3.6.1.2. Show Commands
3.6.2. Command Descriptions
3.6.2.1. Configuration Commands
3.6.2.1.1. SNMP System Commands
3.6.2.1.2. SNMP Security Commands
3.6.2.2. Show Commands
4. NETCONF
4.1. NETCONF Overview
4.2. NETCONF in SR OS
4.2.1. YANG Data Models
4.2.2. Transport and Sessions
4.2.3. NETCONF Operations
4.2.3.1. <get>
4.2.3.2. <get-config>
4.2.3.3. <edit-config>
4.2.3.4. <copy-config> and <delete-config>
4.2.3.5. <validate>
4.2.4. Datastores and URLs
4.2.5. General NETCONF behavior
4.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
4.2.5.2. Example: Non-Standard Namespace Defined in <rpc> Tag
4.2.5.3. Example: Non-Standard Namespace not Defined in <rpc> Tag
4.2.5.4. Example: Non-Standard Namespace or Prefix not Defined in <rpc> Tag
4.2.5.5. Example: Chunked Frame Mechanism
4.2.5.6. Example: Two Rollback Items with Responses
4.2.5.7. Example: Syntax Error in the Rollback Request
4.2.5.8. Example: Error in Processing the Request
4.2.5.9. Example: Error in Second Item of the Request
4.2.5.10. System Provisioned Configuration Objects
4.3. Establishing a NETCONF Session
4.4. XML Content Layer
4.4.1. <edit-config> with XML Content Layer
4.4.2. <get-config> with XML Content Layer
4.4.2.1. Example: Request That Returns an Error
4.4.2.2. Example: Content Match Node on a List Key
4.4.2.3. Example: Selection Node That Is a Container
4.4.2.4. Example: List Name Node as an Invalid Selection Node
4.4.2.5. Example: Empty Leaf Node as Invalid Selection Node
4.4.2.6. Example: Key Repeated in the Same Instance of the List Node
4.4.2.7. Example: Retrieving the Full Configuration
4.5. XML Content Layer Examples
4.5.1. Example: Checking NETCONF Status
4.5.2. Example: Creating a Basic VPRN Service
4.5.3. Example: Creating a VPRN Service With a SAP
4.6. CLI Content Layer
4.7. CLI Content Layer Examples
4.7.1. Example: Configuration Change
4.7.2. Example: Retrieving Configuration Information
4.7.3. Example: Retrieving Full Configuration Information
4.7.4. Example: <get> Request
4.8. NETCONF Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Configuration Commands
4.8.1.1.1. Netconf System Commands
4.8.1.1.2. Netconf Security Commands
4.8.1.2. Show Commands
4.8.1.3. Configuration Commands
4.8.1.3.1. NETCONF System Commands
4.8.1.3.2. NETCONF Security Commands
4.8.1.4. Show Commands
5. Event and Accounting Logs
5.1. Logging Overview
5.2. Log Destinations
5.2.1. Console
5.2.2. Session
5.2.3. Memory Logs
5.2.4. Log Files
5.2.5. SNMP Trap Group
5.2.6. Syslog
5.3. Event Logs
5.3.1. Event Sources
5.3.2. Event Control
5.3.3. Log Manager and Event Logs
5.3.4. Event Filter Policies
5.3.5. Event Log Entries
5.3.6. Simple Logger Event Throttling
5.3.7. Default System Log
5.4. Accounting Logs
5.4.1. Accounting Records
5.4.2. Accounting Record Names and Collection Periods
5.4.3. Accounting Record Details
5.4.4. Configuration Guidelines
5.4.5. Reporting and Time-Based Accounting
5.5. Configuration Notes
5.6. Configuring Logging with CLI
5.6.1. Log Configuration Overview
5.6.1.1. Log Types
5.6.2. Basic Event Log Configuration
5.6.3. Common Configuration Tasks
5.6.3.1. Configuring an Event Log
5.6.3.2. Configuring a File ID
5.6.3.3. Configuring an Accounting Policy
5.6.3.4. Configuring Event Control
5.6.3.5. Configuring Throttle Rate
5.6.3.6. Configuring a Log Filter
5.6.3.7. Configuring an SNMP Trap Group
5.6.3.8. Configuring SNMP Dying Gasp
5.6.3.8.1. Configuration Guidelines for SNMP Dying Gasp Trap
5.6.3.9. Configuring a Syslog Target
5.6.4. Log Management Tasks
5.6.4.1. Modifying a Log File
5.6.4.2. Deleting a Log File
5.6.4.3. Modifying a File ID
5.6.4.4. Deleting a File ID
5.6.4.5. Modifying a Syslog ID
5.6.4.6. Deleting a Syslog
5.6.4.7. Modifying an SNMP Trap Group
5.6.4.8. Deleting an SNMP Trap Group
5.6.4.9. Modifying a Log Filter
5.6.4.10. Deleting a Log Filter
5.6.4.11. Modifying Event Control Parameters
5.6.4.12. Returning to the Default Event Control Configuration
5.7. Log Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. Event Control Commands
5.7.1.1.2. Accounting Policy Commands
5.7.1.1.3. File ID Commands
5.7.1.1.4. Event Filter Commands
5.7.1.1.5. Log ID Commands
5.7.1.1.6. SNMP Trap Group Commands
5.7.1.1.7. Syslog Commands
5.7.1.2. Show Commands
5.7.1.3. Clear Commands
5.7.1.4. Tools Dump Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Event Control Commands
5.7.2.1.3. Log File Commands
5.7.2.1.4. Log Filter Commands
5.7.2.1.5. Log Filter Entry Commands
5.7.2.1.6. Log Filter Entry Match Commands
5.7.2.1.7. Syslog Commands
5.7.2.1.8. SNMP Trap Group Commands
5.7.2.1.9. Logging Destination Commands
5.7.2.1.10. Accounting Policy Commands
5.7.2.2. Show Commands
5.7.2.3. Clear Commands
6. Facility Alarms
6.1. Facility Alarms Overview
6.2. Facility Alarms vs. Log Events
6.3. Facility Alarm Severities and Alarm LED Behavior
6.4. Facility Alarm Hierarchy
6.5. Facility Alarm List
6.6. Configuring Logging with CLI
6.6.1. Basic Facility Alarm Configuration
6.6.2. Common Configuration Tasks
6.6.2.1. Configuring the Maximum Number of Alarms To Clear
6.7. Facility Alarms Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Facility Alarm Configuration Commands
6.7.1.2. Show Commands
6.7.2. Command Descriptions
6.7.2.1. Configuration Commands
6.7.2.2. Show Commands
7. Appendix: Accounting Record Name Details for 7210 SAS Platforms
7.1. Accounting Record Name Details for 7210 SAS-D
7.2. Accounting Record Name Details for 7210 SAS-Dxp
7.3. Accounting Record Name Details for 7210 SAS-K 2F1C2T
7.4. Accounting Record Name Details for 7210 SAS-K 2F6C4T
7.5. Accounting Record Name Details for 7210 SAS-K 3SFP+ 8C
8. Standards and Protocol Support
Customer Document and Product Support
7210 SAS-M, T, R6, R12, Mxp, Sx, S System Management Guide 20.9.R1
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Management Configuration Process
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Control and Management Traffic Protection
2.3.1. CPM Management Access Filters
2.3.1.1. CPM Protocols and Ports
2.3.2. Management Access Filter
2.3.2.1. MAF Packet Match
2.3.2.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.3.2.3. MAF Policy Action
2.3.2.4. MAF Policy Statistics and Logging
2.4. CPU Protection Modes
2.4.1. Centralized CPU Protection
2.4.2. DCP
2.4.2.1. DCP Applicability
2.4.2.2. Log Events, Statistics, Status and SNMP Support
2.4.2.3. DCP Policer Resource Management
2.4.2.4. Operational Guidelines
2.5. Vendor-Specific Attributes (VSAs)
2.5.1. Sample User (VSA) Configuration
2.6. Other Security Features
2.6.1. Secure Shell (SSH)
2.6.2. MAC Client and Server List
2.6.3. Cipher Client and Server List
2.6.4. Exponential Login Backoff
2.6.5. User Lockout
2.6.6. Encryption
2.6.7. 802.1x Network Access Control
2.6.8. TCP Enhanced Authentication Option
2.6.8.1. Packet Formats
2.6.8.2. Keychain
2.7. Configuration Notes
2.7.1. General
2.8. Configuring Security with CLI
2.8.1. Setting Up Security Attributes
2.8.1.1. Configuring Authentication
2.8.1.2. Configuring Authorization
2.8.1.3. Configuring Accounting
2.8.2. Security Configurations
2.8.3. Security Configuration Procedures
2.8.3.1. Configuring Management Access Filters
2.8.3.2. Configuring Password Management Parameters
2.8.3.3. Configuring Profiles
2.8.3.4. Configuring Users
2.8.3.5. Configuring Keychains
2.8.3.6. Copying and Overwriting Users and Profiles
2.8.3.6.1. User
2.8.3.6.2. Profile
2.8.3.7. Enabling SSH
2.8.4. RADIUS Configurations
2.8.4.1. Configuring RADIUS Authentication
2.8.4.2. Configuring RADIUS Authorization
2.8.4.3. Configuring RADIUS Accounting
2.8.4.4. Configuring 802.1x RADIUS Policies
2.8.5. TACACS+ Configurations
2.8.5.1. Enabling TACACS+ Authentication
2.8.5.2. Configuring TACACS+ Authorization
2.8.5.3. Configuring TACACS+ Accounting
2.8.6. Configuring Login Controls
2.9. Security Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Configuration Commands
2.9.1.1.1. Security Commands
2.9.1.1.2. Management Access Filter Commands
2.9.1.1.3. Distributed CPU Protection Commands
2.9.1.1.4. Security Password Commands
2.9.1.1.5. Profile Commands
2.9.1.1.6. RADIUS Commands
2.9.1.1.7. SSH Commands
2.9.1.1.8. TACPLUS Commands
2.9.1.1.9. User Commands
2.9.1.1.10. User Template Commands
2.9.1.1.11. Dot1x Commands
2.9.1.1.12. Keychain Commands
2.9.1.1.13. Login Control Commands
2.9.1.2. Show Commands
2.9.1.2.1. Security
2.9.1.2.2. Login Control
2.9.1.3. Clear Commands
2.9.1.4. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Configuration Commands
2.9.2.1.1. General Security Commands
2.9.2.1.2. Login, Telnet, SSH and FTP Commands
2.9.2.1.3. Management Access Filter Commands
2.9.2.1.4. Distributed CPU Protection Commands
2.9.2.1.5. Password Commands
2.9.2.1.6. Profile Management Commands
2.9.2.1.7. User Management Commands
2.9.2.1.8. RADIUS Client Commands
2.9.2.1.9. TACACS+ Client Commands
2.9.2.1.10. Generic 802.1x Commands
2.9.2.1.11. TCP Enhanced Authentication Commands
2.9.2.2. Show Commands
2.9.2.2.1. Security Commands
2.9.2.2.2. Login Control
2.9.2.3. Debug Commands
3. SNMP
3.1. SNMP Overview
3.1.1. SNMP Architecture
3.1.2. Management Information Base
3.1.3. SNMP Protocol Operations
3.1.4. SNMP Versions
3.1.5. Management Information Access Control
3.1.6. User-Based Security Model Community Strings
3.1.7. Views
3.1.8. Access Groups
3.1.9. Users
3.2. Which SNMP Version to Use
3.3. Configuration Notes
3.3.1. General
3.4. Configuring SNMP with CLI
3.4.1. SNMP Configuration Overview
3.4.1.1. Configuring SNMPv1 and SNMPv2c
3.4.1.2. Configuring SNMPv3
3.4.2. Basic SNMP Security Configuration
3.4.3. Configuring SNMP Components
3.4.3.1. Configuring a Community String
3.4.3.2. Configuring View Options
3.4.3.3. Configuring Access Options
3.4.3.4. Configuring USM Community Options
3.4.3.5. Configuring Other SNMP Parameters
3.5. SNMP Command Reference
3.5.1. Command Hierarchies
3.5.1.1. Configuration Commands
3.5.1.1.1. SNMP System Commands
3.5.1.1.2. SNMP Security Commands
3.5.1.2. Show Commands
3.5.2. Command Descriptions
3.5.2.1. Configuration Commands
3.5.2.1.1. SNMP System Commands
3.5.2.1.2. SNMP Security Commands
3.5.2.2. Show Commands
4. NETCONF
4.1. NETCONF Overview
4.2. NETCONF in SR OS
4.2.1. YANG Data Models
4.2.2. Transport and Sessions
4.2.3. NETCONF Operations
4.2.3.1. <get>
4.2.3.2. <get-config>
4.2.3.3. <edit-config>
4.2.3.4. <copy-config> and <delete-config>
4.2.3.5. <validate>
4.2.4. Datastores and URLs
4.2.5. General NETCONF behavior
4.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
4.2.5.2. Example: Non-Standard Namespace Defined in <rpc> Tag
4.2.5.3. Example: Non-Standard Namespace not Defined in <rpc> Tag
4.2.5.4. Example: Non-Standard Namespace or Prefix not Defined in <rpc> Tag
4.2.5.5. Example: Chunked Frame Mechanism
4.2.5.6. Example: Two Rollback Items with Responses
4.2.5.7. Example: Syntax Error in the Rollback Request
4.2.5.8. Example: Error in Processing the Request
4.2.5.9. Example: Error in Second Item of the Request
4.2.5.10. System Provisioned Configuration Objects
4.3. Establishing a NETCONF Session
4.4. XML Content Layer
4.4.1. <edit-config> with XML Content Layer
4.4.2. <get-config> with XML Content Layer
4.4.2.1. Example: Request That Returns an Error
4.4.2.2. Example: Content Match Node on a List Key
4.4.2.3. Example: Selection Node That Is a Container
4.4.2.4. Example: List Name Node as an Invalid Selection Node
4.4.2.5. Example: Empty Leaf Node as Invalid Selection Node
4.4.2.6. Example: Key Repeated in the Same Instance of the List Node
4.4.2.7. Example: Retrieving the Full Configuration
4.5. XML Content Layer Examples
4.5.1. Example: Checking NETCONF Status
4.5.2. Example: Creating a Basic VPRN Service
4.5.3. Example: Creating a VPRN Service With a SAP
4.6. CLI Content Layer
4.7. CLI Content Layer Examples
4.7.1. Example: Configuration Change
4.7.2. Example: Retrieving Configuration Information
4.7.3. Example: Retrieving Full Configuration Information
4.7.4. Example: <get> Request
4.8. NETCONF Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Configuration Commands
4.8.1.1.1. Netconf System Commands
4.8.1.1.2. Netconf Security Commands
4.8.1.1.3. Show commands
4.8.2. Command Descriptions
4.8.2.1. Configuration Commands
4.8.2.2. NETCONF System Commands
4.8.2.3. NETCONF Security Commands
4.8.2.4. Show Command
5. Event and Accounting Logs
5.1. Logging Overview
5.2. Log Destinations
5.2.1. Console
5.2.2. Session
5.2.3. Memory Logs
5.2.4. Log Files
5.2.5. SNMP Trap Group
5.2.6. Syslog
5.3. Event Logs
5.3.1. Event Sources
5.3.2. Event Control
5.3.3. Log Manager and Event Logs
5.3.4. Event Filter Policies
5.3.5. Event Log Entries
5.3.6. Simple Logger Event Throttling
5.3.7. Default System Log
5.4. Accounting Logs
5.4.1. Accounting Records
5.4.2. Configuration Guidelines
5.4.3. Accounting Files
5.4.4. Design Considerations
5.5. Configuration Notes
5.6. Configuring Logging with CLI
5.6.1. Log Configuration Overview
5.6.1.1. Log Types
5.6.2. Basic Event Log Configuration
5.6.3. Common Configuration Tasks
5.6.3.1. Configuring an Event Log
5.6.3.2. Configuring a File ID
5.6.3.3. Configuring an Accounting Policy
5.6.3.4. Configuring Event Control
5.6.3.5. Configuring Throttle Rate
5.6.3.6. Configuring a Log Filter
5.6.3.7. Configuring an SNMP Trap Group
5.6.3.8. Configuring SNMP Dying Gasp
5.6.3.8.1. Configuration Guidelines for SNMP Dying Gasp Trap
5.6.3.9. Configuring a Syslog Target
5.6.4. Log Management Tasks
5.6.4.1. Modifying a Log File
5.6.4.2. Deleting a Log File
5.6.4.3. Modifying a File ID
5.6.4.4. Deleting a File ID
5.6.4.5. Modifying a Syslog ID
5.6.4.6. Deleting a Syslog
5.6.4.7. Modifying an SNMP Trap Group
5.6.4.8. Deleting an SNMP Trap Group
5.6.4.9. Modifying a Log Filter
5.6.4.10. Deleting a Log Filter
5.6.4.11. Modifying Event Control Parameters
5.6.4.12. Returning to the Default Event Control Configuration
5.7. Log Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. Event Control Commands
5.7.1.1.2. Accounting Policy Commands
5.7.1.1.3. File ID Commands
5.7.1.1.4. Event Filter Commands
5.7.1.1.5. Log ID Commands
5.7.1.1.6. SNMP Trap Group Commands
5.7.1.1.7. Syslog Commands
5.7.1.2. Show Commands
5.7.1.3. Clear Commands
5.7.1.4. Tools Dump Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Event Control Commands
5.7.2.1.3. Log File Commands
5.7.2.1.4. Log Filter Commands
5.7.2.1.5. Log Filter Entry Commands
5.7.2.1.6. Log Filter Entry Match Commands
5.7.2.1.7. Syslog Commands
5.7.2.1.8. SNMP Trap Group Commands
5.7.2.1.9. Logging Destination Commands
5.7.2.1.10. Accounting Policy Commands
5.7.2.2. Show Commands
5.7.2.3. Clear Commands
6. Facility Alarms
6.1. Facility Alarms Overview
6.2. Facility Alarms vs. Log Events
6.3. Facility Alarm Severities and Alarm LED Behavior
6.4. Facility Alarm Hierarchy
6.5. Facility Alarm List
6.6. Configuring Logging with CLI
6.6.1. Basic Facility Alarm Configuration
6.6.2. Common Configuration Tasks
6.6.2.1. Configuring the Maximum Number of Alarms to Clear
6.7. Facility Alarms Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Facility Alarm Configuration Commands
6.7.1.2. Show Commands
6.7.2. Command Descriptions
6.7.2.1. Configuration Commands
6.7.2.2. Show Commands
7. Appendix: Accounting Record Name Details for 7210 SAS Platforms
7.1. Accounting Record Name Details for 7210 SAS-M and 7210 SAS-T (Access-uplink or Network Mode)
7.2. Accounting Record Name Details for 7210 SAS-R6 and 7210 SAS-R12
7.3. Accounting Record Name Details for 7210 SAS-Mxp
7.4. Accounting Record Name Details for 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Document Structure and Content
1.2. 7210 SAS Modes of Operation
1.3. 7210 SAS Port Modes
1.4. 7210 SAS System Management Configuration Process
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Control and Management Traffic Protection
2.3.1. CPM Management Access Filters
2.3.1.1. CPM Protocols and Ports
2.3.2. Management Access Filter
2.3.2.1. MAF Packet Match
2.3.2.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.3.2.3. MAF Policy Action
2.3.2.4. MAF Policy Statistics and Logging
2.4. CPU Protection Modes
2.4.1. Centralized CPU Protection
2.4.2. DCP
2.4.2.1. DCP Applicability
2.4.2.2. Log Events, Statistics, Status and SNMP Support
2.4.2.3. DCP Policer Resource Management
2.4.2.4. Operational Guidelines
2.5. Vendor-Specific Attributes (VSAs)
2.5.1. Sample User (VSA) Configuration
2.6. Other Security Features
2.6.1. Secure Shell (SSH)
2.6.2. MAC Client and Server List
2.6.3. Cipher Client and Server List
2.6.4. Exponential Login Backoff
2.6.5. User Lockout
2.6.6. Encryption
2.6.7. 802.1x Network Access Control
2.6.8. TCP Enhanced Authentication Option
2.6.8.1. Packet Formats
2.6.8.2. Keychain
2.7. Configuration Notes
2.7.1. General
2.8. Configuring Security with CLI
2.8.1. Setting Up Security Attributes
2.8.1.1. Configuring Authentication
2.8.1.2. Configuring Authorization
2.8.1.3. Configuring Accounting
2.8.2. Security Configurations
2.8.3. Security Configuration Procedures
2.8.3.1. Configuring Management Access Filters
2.8.3.2. Configuring Password Management Parameters
2.8.3.3. Configuring Profiles
2.8.3.4. Configuring Users
2.8.3.5. Configuring Keychains
2.8.3.6. Copying and Overwriting Users and Profiles
2.8.3.6.1. User
2.8.3.6.2. Profile
2.8.3.7. Enabling SSH
2.8.4. RADIUS Configurations
2.8.4.1. Configuring RADIUS Authentication
2.8.4.2. Configuring RADIUS Authorization
2.8.4.3. Configuring RADIUS Accounting
2.8.4.4. Configuring 802.1x RADIUS Policies
2.8.5. TACACS+ Configurations
2.8.5.1. Enabling TACACS+ Authentication
2.8.5.2. Configuring TACACS+ Authorization
2.8.5.3. Configuring TACACS+ Accounting
2.8.6. Configuring Login Controls
2.9. Security Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Configuration Commands
2.9.1.1.1. Security Commands
2.9.1.1.2. Management Access Filter Commands
2.9.1.1.3. Distributed CPU Protection Commands
2.9.1.1.4. Security Password Commands
2.9.1.1.5. Profile Commands
2.9.1.1.6. RADIUS Commands
2.9.1.1.7. SSH Commands
2.9.1.1.8. TACPLUS Commands
2.9.1.1.9. User Commands
2.9.1.1.10. User Template Commands
2.9.1.1.11. Dot1x Commands
2.9.1.1.12. Keychain Commands
2.9.1.1.13. Login Control Commands
2.9.1.2. Show Commands
2.9.1.2.1. Security
2.9.1.2.2. Login Control
2.9.1.3. Clear Commands
2.9.1.4. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Configuration Commands
2.9.2.1.1. General Security Commands
2.9.2.1.2. Login, Telnet, SSH and FTP Commands
2.9.2.1.3. Management Access Filter Commands
2.9.2.1.4. Distributed CPU Protection Commands
2.9.2.1.5. Password Commands
2.9.2.1.6. Profile Management Commands
2.9.2.1.7. User Management Commands
2.9.2.1.8. RADIUS Client Commands
2.9.2.1.9. TACACS+ Client Commands
2.9.2.1.10. Generic 802.1x Commands
2.9.2.1.11. TCP Enhanced Authentication Commands
2.9.2.2. Show Commands
2.9.2.2.1. Security Commands
2.9.2.2.2. Login Control
2.9.2.3. Debug Commands
3. SNMP
3.1. SNMP Overview
3.1.1. SNMP Architecture
3.1.2. Management Information Base
3.1.3. SNMP Protocol Operations
3.1.4. SNMP Versions
3.1.5. Management Information Access Control
3.1.6. User-Based Security Model Community Strings
3.1.7. Views
3.1.8. Access Groups
3.1.9. Users
3.2. Which SNMP Version to Use
3.3. Configuration Notes
3.3.1. General
3.4. Configuring SNMP with CLI
3.4.1. SNMP Configuration Overview
3.4.1.1. Configuring SNMPv1 and SNMPv2c
3.4.1.2. Configuring SNMPv3
3.4.2. Basic SNMP Security Configuration
3.4.3. Configuring SNMP Components
3.4.3.1. Configuring a Community String
3.4.3.2. Configuring View Options
3.4.3.3. Configuring Access Options
3.4.3.4. Configuring USM Community Options
3.4.3.5. Configuring Other SNMP Parameters
3.5. SNMP Command Reference
3.5.1. Command Hierarchies
3.5.1.1. Configuration Commands
3.5.1.1.1. SNMP System Commands
3.5.1.1.2. SNMP Security Commands
3.5.1.2. Show Commands
3.5.2. Command Descriptions
3.5.2.1. Configuration Commands
3.5.2.1.1. SNMP System Commands
3.5.2.1.2. SNMP Security Commands
3.5.2.2. Show Commands
4. NETCONF
4.1. NETCONF Overview
4.2. NETCONF in SR OS
4.2.1. YANG Data Models
4.2.2. Transport and Sessions
4.2.3. NETCONF Operations
4.2.3.1. <get>
4.2.3.2. <get-config>
4.2.3.3. <edit-config>
4.2.3.4. <copy-config> and <delete-config>
4.2.3.5. <validate>
4.2.4. Datastores and URLs
4.2.5. General NETCONF behavior
4.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
4.2.5.2. Example: Non-Standard Namespace Defined in <rpc> Tag
4.2.5.3. Example: Non-Standard Namespace not Defined in <rpc> Tag
4.2.5.4. Example: Non-Standard Namespace or Prefix not Defined in <rpc> Tag
4.2.5.5. Example: Chunked Frame Mechanism
4.2.5.6. Example: Two Rollback Items with Responses
4.2.5.7. Example: Syntax Error in the Rollback Request
4.2.5.8. Example: Error in Processing the Request
4.2.5.9. Example: Error in Second Item of the Request
4.2.5.10. System Provisioned Configuration Objects
4.3. Establishing a NETCONF Session
4.4. XML Content Layer
4.4.1. <edit-config> with XML Content Layer
4.4.2. <get-config> with XML Content Layer
4.4.2.1. Example: Request That Returns an Error
4.4.2.2. Example: Content Match Node on a List Key
4.4.2.3. Example: Selection Node That Is a Container
4.4.2.4. Example: List Name Node as an Invalid Selection Node
4.4.2.5. Example: Empty Leaf Node as Invalid Selection Node
4.4.2.6. Example: Key Repeated in the Same Instance of the List Node
4.4.2.7. Example: Retrieving the Full Configuration
4.5. XML Content Layer Examples
4.5.1. Example: Checking NETCONF Status
4.5.2. Example: Creating a Basic VPRN Service
4.5.3. Example: Creating a VPRN Service With a SAP
4.6. CLI Content Layer
4.7. CLI Content Layer Examples
4.7.1. Example: Configuration Change
4.7.2. Example: Retrieving Configuration Information
4.7.3. Example: Retrieving Full Configuration Information
4.7.4. Example: <get> Request
4.8. NETCONF Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Configuration Commands
4.8.1.1.1. Netconf System Commands
4.8.1.1.2. Netconf Security Commands
4.8.1.1.3. Show commands
4.8.2. Command Descriptions
4.8.2.1. Configuration Commands
4.8.2.2. NETCONF System Commands
4.8.2.3. NETCONF Security Commands
4.8.2.4. Show Command
5. Event and Accounting Logs
5.1. Logging Overview
5.2. Log Destinations
5.2.1. Console
5.2.2. Session
5.2.3. Memory Logs
5.2.4. Log Files
5.2.5. SNMP Trap Group
5.2.6. Syslog
5.3. Event Logs
5.3.1. Event Sources
5.3.2. Event Control
5.3.3. Log Manager and Event Logs
5.3.4. Event Filter Policies
5.3.5. Event Log Entries
5.3.6. Simple Logger Event Throttling
5.3.7. Default System Log
5.4. Accounting Logs
5.4.1. Accounting Records
5.4.2. Configuration Guidelines
5.4.3. Accounting Files
5.4.4. Design Considerations
5.5. Configuration Notes
5.6. Configuring Logging with CLI
5.6.1. Log Configuration Overview
5.6.1.1. Log Types
5.6.2. Basic Event Log Configuration
5.6.3. Common Configuration Tasks
5.6.3.1. Configuring an Event Log
5.6.3.2. Configuring a File ID
5.6.3.3. Configuring an Accounting Policy
5.6.3.4. Configuring Event Control
5.6.3.5. Configuring Throttle Rate
5.6.3.6. Configuring a Log Filter
5.6.3.7. Configuring an SNMP Trap Group
5.6.3.8. Configuring SNMP Dying Gasp
5.6.3.8.1. Configuration Guidelines for SNMP Dying Gasp Trap
5.6.3.9. Configuring a Syslog Target
5.6.4. Log Management Tasks
5.6.4.1. Modifying a Log File
5.6.4.2. Deleting a Log File
5.6.4.3. Modifying a File ID
5.6.4.4. Deleting a File ID
5.6.4.5. Modifying a Syslog ID
5.6.4.6. Deleting a Syslog
5.6.4.7. Modifying an SNMP Trap Group
5.6.4.8. Deleting an SNMP Trap Group
5.6.4.9. Modifying a Log Filter
5.6.4.10. Deleting a Log Filter
5.6.4.11. Modifying Event Control Parameters
5.6.4.12. Returning to the Default Event Control Configuration
5.7. Log Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. Event Control Commands
5.7.1.1.2. Accounting Policy Commands
5.7.1.1.3. File ID Commands
5.7.1.1.4. Event Filter Commands
5.7.1.1.5. Log ID Commands
5.7.1.1.6. SNMP Trap Group Commands
5.7.1.1.7. Syslog Commands
5.7.1.2. Show Commands
5.7.1.3. Clear Commands
5.7.1.4. Tools Dump Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Event Control Commands
5.7.2.1.3. Log File Commands
5.7.2.1.4. Log Filter Commands
5.7.2.1.5. Log Filter Entry Commands
5.7.2.1.6. Log Filter Entry Match Commands
5.7.2.1.7. Syslog Commands
5.7.2.1.8. SNMP Trap Group Commands
5.7.2.1.9. Logging Destination Commands
5.7.2.1.10. Accounting Policy Commands
5.7.2.2. Show Commands
5.7.2.3. Clear Commands
6. Facility Alarms
6.1. Facility Alarms Overview
6.2. Facility Alarms vs. Log Events
6.3. Facility Alarm Severities and Alarm LED Behavior
6.4. Facility Alarm Hierarchy
6.5. Facility Alarm List
6.6. Configuring Logging with CLI
6.6.1. Basic Facility Alarm Configuration
6.6.2. Common Configuration Tasks
6.6.2.1. Configuring the Maximum Number of Alarms to Clear
6.7. Facility Alarms Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Facility Alarm Configuration Commands
6.7.1.2. Show Commands
6.7.2. Command Descriptions
6.7.2.1. Configuration Commands
6.7.2.2. Show Commands
7. Appendix: Accounting Record Name Details for 7210 SAS Platforms
7.1. Accounting Record Name Details for 7210 SAS-M and 7210 SAS-T (Access-uplink or Network Mode)
7.2. Accounting Record Name Details for 7210 SAS-R6 and 7210 SAS-R12
7.3. Accounting Record Name Details for 7210 SAS-Mxp
7.4. Accounting Record Name Details for 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE
8. Standards and Protocol Support
Customer Document and Product Support
Documentation Suite Overview 20.9.R1
7210 SAS Documentation Overview Quick Reference Card 20.9.R1
7210 SAS Documentation Overview Quick Reference Card 20.9.R1