This chapter provides information about configuring chassis slots, cards, and ports.
Note: This guide uses the term “preprovisioning” in the context of preparing or preconfiguring entities such as chassis slots, line cards (for example, Switch Fabric and Control Plane Module (SF/CPM) and Integrated Media Modules (IMMs)), and media dependent adapters (MDAs), ports, and interfaces, before initialization. These entities can be installed but not enabled. When the entity is in a no shutdown state (administratively enabled), the entity is considered to be provisioned. |
The 7210 SAS-M platform and its variants (7210 SAS-M 24F, 7210 SAS-M 24F 2XFP, 7210 SAS-M 24F 2XFP ETR) provide a fixed port configuration and an additional expansion slot that accepts supported MDAs.
7210 SAS software inherits the concept for CPM, IOM, and MDA from the SR OS to represent the hardware logically. The software creates two (2) logical cards to represent the CPM and IOM; the cards are preprovisioned on bootup. The IOM card, is modeled with two MDAs.
Ports and interfaces can also be preprovisioned.
The 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE and its variants, are platforms with a fixed port configuration, and no expansion slots. 7210 SAS software inherits the concept of CPM, IOM, and MDA from the SR OS to represent the hardware logically. These logical cards are fixed and are not removable. The software creates two (2) logical cards to represent the CPM and IOM; the cards are preprovisioned on bootup. The IOM card is modeled with a single MDA that is a logical entity and represents the fixed ports on the system. The MDA is auto-provisioned on bootup and does not need to be provisioned. Ports and interfaces can also be preprovisioned.
The 7210 SAS-R6 is a chassis-based platforms that has 6 IMM slots that can accept media cards used for service delivery and 2 CPM slots that provide control-plane redundancy. The chassis slots must be provisioned to accept a specific line card and set the relevant configurations before the equipment is actually installed. The preprovisioning ability allows you to plan your configurations as well as monitor and manage your router hardware inventory. Ports and interfaces can also be preprovisioned. When the functionality is needed, the cards can be inserted into the appropriate chassis slots when required.
The 7210 SAS-R12 is a chassis-based platforms that have 12 IMM slots that can accept media cards used for service delivery and 2 CPM slots that provide control-plane redundancy. The chassis slots must be provisioned to accept a specific line card and set the relevant configurations before the equipment is actually installed. The preprovisioning ability allows you to plan your configurations as well as monitor and manage your router hardware inventory. Ports and interfaces can also be preprovisioned. When the functionality is needed, the cards can be inserted into the appropriate chassis slots when required.
The 7210 SAS-M and its variants are platforms which has a set of fixed ports and supports one expansion slot. Software preprovisions the cards on bootup. The expansion slot is represented as a MDA and supported MDAs can be plugged into the expansion slot. The list of MDAs supported on 7210 SAS-M is available in the 7210 SAS release notes.
The following show card sample output lists the cards auto-provisioned on 7210 SAS-M chassis:
The 7210 SAS-T, 7210 SAS-Mxp, and 7210 SAS-Sx/S 1/10GE are platforms which have a set of fixed ports. Software preprovisions the cards on bootup. No expansion slots are supported on these platforms.
The show card command lists the cards auto-provisioned on 7210 SAS-T, 7210 SAS-Mxp, and 7210 SAS-Sx/S 1/10GE chassis.
The following show card sample output lists the cards auto-provisioned on 7210 SAS-T chassis:
The following show card sample output lists the cards auto-provisioned on 7210 SAS-Mxp chassis:
The following show card sample output lists the cards auto-provisioned on 7210 SAS-Sx/S 1/10GE 48-port 1GE variant chassis:
The 7210 SAS-R6 is a chassis based platform with 6 IMM slots and 2 CPM slots. On a chassis based platform the slots must be provisioned. To preprovision a chassis slot, the line card type must be specified. System administrators or network operators can enter card type information for each slot, allowing a range of card types in particular slots. From the range of card types, a card and accompanying MDAs (if any) are specified. When a card is installed in a slot and enabled, the system verifies that the installed card type matches the allowed card type. If the parameters do not match, the card remains offline. A preprovisioned slot can remain empty without conflicting with populated slots. 7210 SAS-R6 supports only CPM and IMMs. It does not support any physical removable MDAs. Software uses logical MDAs internally to represent the ports on the IMMs and the MDA type is auto-provisioned by software when the IMMs are provisioned. Check the latest release notes for a list of supported card types (that is, CPM and IMMs). See the 7210 SAS-R6 Chassis Installation Guide for more information about installation of cards.
The 7210 SAS-R12 is a chassis based platform with 12 IMM slots and 2 CPM slots. On a chassis based platform the slots must be provisioned. To preprovision a chassis slot, the line card type must be specified. System administrators or network operators can enter card type information for each slot, allowing a range of card types in particular slots. From the range of card types, a card and accompanying MDAs (if any) are specified. When a card is installed in a slot and enabled, the system verifies that the installed card type matches the allowed card type. If the parameters do not match, the card remains offline. A preprovisioned slot can remain empty without conflicting with populated slots. 7210 SAS-R12 supports only CPM and IMMs. It does not support any physical removable MDAs. Software uses logical MDAs internally to represent the ports on the IMMs and the MDA type is auto-provisioned by software when the IMMs are provisioned. Please check the latest release notes for a list of supported card types (that is, CPM and IMMs). See 7210 SAS-R12 Chassis Installation Guide for more information about installation of cards.
Note:
|
The following show sample output lists the cards provisioned and equipped in the 7210 SAS-R6 and 7210 SAS-R12 chassis:
The 7210 SAS-R6, 7210 SAS-R12, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE platforms, as described in the previous section, do not support any physical removable MDAs. Software uses the concept of MDA internally (as a logical entity) to represent the ports and the MDA type is either auto-provisioned on bootup or auto-provisioned automatically based on the configured IMM type.
On 7210 SAS-M, as described in the previous section, in addition to the fixed ports, a expansion slot is available. It is represented as a physical MDA and needs to be provisioned. The following section talks about provisioning of MDAs and is applicable only to those platforms where physical MDAs are supported.
A chassis slot and card type must be specified and provisioned before an MDA can be preprovisioned. An MDA is provisioned when a type designated from the allowed MDA types is inserted. A preprovisioned MDA slot can remain empty without conflicting with populated slots. After installed and enabled, the system verifies that the installed MDA type matches the configured parameters. If the parameters do not match, the MDA remains offline. An MDA is provisioned when a type designated from the allowed MDA type is inserted. A preprovisioned MDA slot can remain empty without conflicting with the populated slots.
This section describes MDA provisioning.
For 7210 SAS-M devices currently deployed or new deployments, to insert 2*10 MDA perform the following steps:
In 7210 SAS devices using 2 x 10G MDA, to insert CES MDA perform the following steps:
Note: Insertion and removal of the CES MDA into the chassis at any point of time is only supported if the BOF parameter configuration is set to default. |
Some Nokia SFP and XFP transponders have Digital Diagnostics Monitoring (DDM) capability. With DDM the transceiver module maintains information about its working status in device registers, such as:
The transceiver is also programmed with warning and alarm thresholds for low and high conditions that can generate system events. These thresholds are programmed by the transceiver manufacturer.
There are no CLI commands required for DDM operations, however, the show>port port-id detail command displays DDM information in the Transceiver Digital Diagnostics Monitoring output section.
The Tx and Rx power displayed in the DDM output are average optical power in dBm.
DDM information is populated into the router MIBs, so the DDM data can be retrieved by Network Management using SNMP. Also, RMON threshold monitoring can be configured for the DDM MIB variables to set custom event thresholds if the factory-programmed thresholds are not at the desired levels.
The following are potential uses of the DDM data:
Table 5 describes supported real-time DDM features.
Parameter | User Units | SFP/XFP Units | SFP | XFP |
Temperature | Celsius | C | Supported | Supported |
Supply Voltage | Volts | µV | Supported | Supported |
TX Bias Current | mA | µA | Supported | Supported |
TX Output Power | dBm (converted from mW) | mW | Supported | Supported |
RX Received Optical Power4 | dBm (converted from dBm) (Avg Rx Power or OMA) | mW | Supported | Supported |
AUX1 | parameter dependent (embedded in transceiver) | - | Not supported | Supported |
AUX2 | parameter dependent (embedded in transceiver) | - | Not supported | Supported |
Table 6 describes supported factory-programmed DDM alarms and warnings.
Parameter | SFP/XFP Units | SFP | XFP | Required? |
Temperature - High Alarm - Low Alarm - High Warning - Low Warning | C | Yes | Yes | Yes |
Supply Voltage - High Alarm - Low Alarm - High Warning - Low Warning | µV | Yes | Yes | Yes |
TX Bias Current - High Alarm - Low Alarm - High Warning - Low Warning | µA | Yes | Yes | Yes |
TX Output Power - High Alarm - Low Alarm - High Warning - Low Warning | mW | Yes | Yes | Yes |
RX Optical Power - High Alarm - Low Alarm - High Warning - Low Warning | mW | Yes | Yes | Yes |
AUX1 - High Alarm - Low Alarm - High Warning - Low Warning | parameter dependent (embedded in transceiver) | No | Yes | Yes |
AUX2 - High Alarm - Low Alarm - High Warning - Low Warning | parameter dependent (embedded in transceiver) | No | Yes | Yes |
The availability of the DDM real-time information and warning or alarm status is based on the transceiver. It may or may not indicate if DDM is supported, although some Nokia SFPs support DDM. Non-DDM and DDM-supported SFPs are distinguished by a specific ICS value.
For Nokia SFPs that do not indicate DDM support in the ICS value, DDM data is available although the accuracy of the information has not been validated or verified.
For non-Nokia transceivers, DDM information may be displayed, but Nokia is not responsible for formatting, accuracy, etc.
The DDM information and warnings/alarms are collected at one minute intervals, so the minimum resolution for any DDM events when correlating with other system events is one minute.
Note that in the Transceiver Digital Diagnostic Monitoring section of the show port port-id detail command output:
This section describes 7210 SAS ports.
Table 7 describes the port types supported on the 7210 SAS platforms.
7210 SAS Platform | Fixed Copper Ports (10/100/1000 Base-T) | Ethernet SFP Ports | 10 Gigabit XFP/SFP+ Ports | 100 Gigabit CFP4/QSFP28 Ports | TDM Ports (DS1/E1) |
7210 SAS-M | ✓ | ✓ 1 | ✓ 2 | ||
7210 SAS-M 24F 2XFP | ✓ | ✓ 3 | ✓ 2 | ||
7210 SAS-M 24F 2XFP ETR | ✓ | ✓ 3 | ✓ 2 | ||
7210 SAS-T | ✓ | ✓ | ✓ 3 | ||
7210 SAS-R6 | ✓ 4 | ✓ | ✓ | ||
7210 SAS-R12 | ✓ 4 | ✓ | ✓ 6 | ✓ | |
7210 SAS-Mxp | ✓ | ✓ | ✓ 7 | ||
7210 SAS-Sx/S 1/10GE | ✓ | ✓ | ✓ 7 | ||
7210 SAS-Sx 10/100GE | ✓ 7 | ✓ 7 | ✓ 7 | ✓ |
Notes:
The following support guidelines apply to the port types described in Table 7.
In 7210 SAS devices, port must be configured as either access, access uplink or network. The following paragraphs describe the significance of the different port modes and the support available on different platforms.
Port Mode Platforms | Access | Network | Hybrid | Access-uplink |
7210 SAS-M | Yes | Yes 1 | Yes 2 | Yes 3 |
7210 SAS-T | Yes | Yes 1 | Yes 2 | Yes 3 |
7210 SAS-R6 IMM (IMMv1) and IMM-b (IMMv2) | Yes | Yes | Yes | No |
7210 SAS-R6 IMM-c 100GE (IMM-c 1CFP4 or IMM-c 1QSFP28) | Yes | Yes | No | No |
7210 SAS-R12 IMM-b | Yes | Yes | Yes | No |
7210 SAS-R12 IMM-c 100GE (IMM-c 1CFP4 or IMM-c 1QSFP28) | Yes | Yes | No | No |
7210 SAS-Mxp | Yes | Yes | Yes | No |
7210 SAS-Sx/S 1/10GE | Yes | Yes | Yes | No |
7210 SAS-Sx 10/100GE | Yes | Yes | Yes | No |
Notes:
7210 SAS supports an option to allow the user to use a different dot1q VLAN Ethernet Type (Etype). It allows for interoperability with third-party switches that use some pre-standard (other than 0x8100) dot1q VLAN etype.
The following are the configuration guidelines for Dot1q-etype configured for dot1q encap port:
The 7210 SAS-T ETR unit and 7210 SAS-Mxp ETR unit supports Power over Ethernet (PoE) as per 802.3af and 802.3at standards. It allows these devices to be used to supply power to connected PoE devices, such as telephones, CCTV cameras, and other PoE standard compliant devices.
Note:
|
The following functionalities are available:
Note: PoE on the 7210 SAS-Sx 1/10GE is only supported in standalone mode. |
On the 24-port and 48-port fiber variants of the 7210 SAS-Sx 1/10GE, there are two PoE/PoE+ capable ports, namely, 1/1/1 and 1/1/2, the combo ports. To use PoE/PoE+, these ports must be configured to use the copper interface. The two PoE/PoE+ ports cannot draw more than 60W of power. The ports can be used for either PoE or PoE+ devices or a combination of PoE/PoE+ devices.
Note: PoE on the 7210 SAS-Sx 1/10GE is only supported in standalone mode. |
The 7210 SAS-Sx 1/10GE has two PoE variants:
Both variants support PoE/PoE+ on all the fixed copper ports. For both variants, the ports can draw a maximum of 720 W of power. On the 24-port variant, each port can have up to 15 W of power for PoE or up to 25 W of power for PoE+. On the 48-port variant, each port can have up to 15 W of power for PoE or up to 25 W of power for PoE+, or a combination of PoE and PoE+ ports as long as the total draw across all ports does not exceed 720 W.
Note: PoE on the 7210 SAS-S 1/10GE is only supported in standalone mode. |
The 7210 SAS-S 1/10GE has two PoE variants:
Both variants support PoE/PoE+ on all the fixed copper ports. For both variants, the ports can draw a maximum of 720 W of power. On the 24-port variant, each port can have up to 15 W of power for PoE or up to 25 W of power for PoE+. On the 48-port variant, each port can have up to 15 W of power for PoE or up to 25 W of power for PoE+, or a combination of PoE and PoE+ ports as long as the total draw across all ports does not exceed 720 W.
The IEEE 802.1ab Link Layer Discovery Protocol (LLDP) standard defines protocol and management elements suitable for advertising information to stations attached to the same IEEE 802 LAN. The protocol facilitates the identification of stations connected by IEEE 802 LANs or MANs, their points of interconnection, and access points for management protocols.
The LLDP helps the network operators to discover topology information. This information is used to detect and resolve network problems and inconsistencies in the configuration.
The following list is the information included in the protocol defined by the IEEE 802.1ab standard.
Figure 1 shows the internal architecture for a network node.
To detect and address network problems and inconsistencies in the configuration, the network operators can discover the topology information using LLDP. The Standard-based tools address the complex network scenarios where multiple devices from different vendors are interconnected using Ethernet interfaces.
Figure 2 shows an MPLS network that uses Ethernet interfaces in the core or as an access/handoff interfaces to connect to different kind of Ethernet enabled devices such as service gateway/routers, QinQ switches DSLAMs or customer equipment.
The topology information of the network in Figure 2 can be discovered if, IEEE 802.1ab LLDP is running on each of the Ethernet interfaces in network.
LLDP is an unidirectional protocol that uses the MAC layer to transmit specific information related to the capabilities and status of the local device. Separately from the transmit direction, the LLDP agent can also receive the same kind of information for a remote device which is stored in the related MIBs.
LLDP does not contain a mechanism for soliciting specific information from other LLDP agents, nor does it provide a specific means of confirming the receipt of information. LLDP allows the transmitter and the receiver to be separately enabled, making it possible to configure an implementation so the local LLDP agent can either transmit only or receive only, or can transmit and receive LLDP information.
The information fields in each LLDP frame are contained in a LLDP Data Unit (LLDPDU) as a sequence of variable length information elements, that each include type, length, and value fields (known as TLVs), where:
Each LLDPDU contains four mandatory TLVs and can contain optional TLVs as selected by network management:
The chassis ID and the port ID values are concatenated to form a logical identifier that is used by the recipient to identify the sending LLDP agent/port. Both the chassis ID and port ID values can be defined in a number of convenient forms. When selected however, the chassis ID/port ID value combination remains the same as long as the particular port remains operable.
A non-zero value in the TTL field of the Time To Live TLV tells the receiving LLDP agent how long all information pertaining to this LLDPDU identifier will be valid so that all the associated information can later be automatically discarded by the receiving LLDP agent if the sender fails to update it in a timely manner. A zero value indicates that any information pertaining to this LLDPDU identifier is to be discarded immediately.
Note that a TTL value of zero can be used, for example, to signal that the sending port has initiated a port shutdown procedure. The End Of LLDPDU TLV marks the end of the LLDPDU.
The implementation defaults to setting the port-id field in the LLDP OAMPDU to tx-local. This encodes the port-id field as ifIndex (sub-type 7) of the associated port. This is required to support some releases of SAM. SAM may use the ifIndex value to correctly build the Layer Two Topology Network Map. However, this numerical value is difficult to interpret or readily identify the LLDP peer when reading the CLI or MIB value without SAM. Including the port-desc option as part of the tx-tlv configuration allows an ALU remote peer supporting port-desc preferred display logic to display the value in the port description TLV instead of the port-id field value. This does not change the encoding of the port-id field. That value continues to represent the ifIndex. In some environments, it may be important to select the specific port information that is carried in the port-id field. The operator has the ability to control the encoding of the port-id information and the associated sub-type using the port-id-sub-type option. Three options are supported for the port-idsub-type:
IPv6 (address sub-type 2) and IPv4 (address sub-type 1) LLDP System Management addresses are supported.
Customers who subscribe to Epipe service consider the Epipe as a wire, and run LLDP between their devices which are located at each end of the Epipe. To facilitate this, the 7210 SAS devices support tunneling of LLDP frames that use the nearest bridge destination MAC address.
If enabled using the command tunnel-nearest-bridge-dest-mac, all frames received with the matching LLDP destination mac address are forwarded transparently to the remote end of the Epipe service. To forward these frames transparently, the port on which tunneling is enabled must be configured with NULL SAP and the NULL SAP must be configured in an Epipe service. Tunneling is not supported for any other port encapsulation or other services.
Additionally, before enabling tunneling, admin status for LLDP dest-mac nearest-bridge must be set to disabled or Tx only, using the command admin-status available under configure>port>ethernet>lldp>destmac-nearest-bridge. If admin-status for dest-mac nearest-bridge is set to receive and process nearest-bridge LLDPDUs (that is, if either rx or tx-rx is set) then it overrides the tunnel-nearest-bridge-dest-mac command.
Table 9 describes the behavior for LLDP with different values set in use for admin-status and when tunneling is enabled or disabled.
Nearest-bridge-mac Admin Status | Tunneling Enabled | Tunneling Disabled |
Rx | Process/Peer | Process/Peer |
Tx | Tunnel | Drop |
Rx-Tx | Process/Peer | Process/Peer |
Disabled | Process/Peer | Drop |
Note: Transparent forwarding of LLDP frames can be achieved using the standard defined mechanism when using the either nearest-non-tmpr or the nearest-customer as the destination MAC address in the LLDP frames. Nokia recommends that the customers use these MAC address where possible to conform to standards. This command allows legacy LLDP implementations that do not support these additional destinations MAC addresses to tunnel LLDP frames that use the nearest-bridge destination MAC address. |
Note: This feature is only supported on the 7210 SAS-Sx/S 1/10GE operating in the standalone or standalone-VC mode. |
The IEEE standard 802.1AB is designed to provide a multivendor solution for the discovery of elements on an Ethernet Layer 2 data network. The LLDP standard allows nodes attached to an Ethernet LAN/WAN to advertise functionalities provided by that node to other nodes attached to the same LAN segment. See Link Layer Discovery Protocol for more information about IEEE 802.1AB.
The ANSI/TIA-1057 standard, Link Layer Discovery Protocol for Media Endpoint Devices, provides extensions to IEEE 802.1AB that are specific to media endpoint devices (MEDs), for example, voice phone and video terminal, in an IEEE 802 LAN environment. This standard defines specific usage of the IEEE 802.1AB LLDP base specification and interaction behavior between MEDs and LAN infrastructure elements.
LLDP media endpoint discovery (LLDP-MED) is an extension of LLDP that provides basic provisioning information to connected media endpoint devices. LLDP-MED extends LLDP protocol messages with additional information to support voice over IP (VoIP) applications.
On the 7210 SAS, LLDP-MED supports the exchange of network policy information to provide the VLAN ID, dot1p bits, and IP DSCP value to media endpoint devices such as a VoIP phone.
The following TLVs are supported for LLDP-MED:
LLDP-MED devices are composed of two primary device types: network connectivity devices and endpoint devices.
LLDP-MED network connectivity devices provide access to the IEEE 802 LAN infrastructure for LLDP-MED endpoint devices. An LLDP-MED network connectivity device is a LAN access device based on any of the following technologies:
Endpoint devices are composed of three sub-types, as defined in ANSI/TIA-1057:
Figure 3 shows the LLDP-MED reference model.
Note: Acting as the network connectivity device, the 7210 SAS only supports the configuration of LLDP-MED communication device endpoints (Class III), such as VoIP phone, using the Network Policy TLV. |
To enable LLDP-MED network connectivity device functions, configure the config port ethernet lldp dest-mac lldp-med admin-status command. When this command is configured, the behavior of the node is as follows.
Note: The configure port ethernet lldp admin-status command must be enabled for LLDP-MED TLV processing. The admin-status configuration in the lldp context must not conflict with the admin-status configuration in the lldp-med context. |
When LLDP-MED is enabled on the port, the Network Policy TLV is sent out of the port using the parameters configured for the network policy that is associated with the port.
Note: Refer to the 7210 SAS-M, T, R6, R12, Mxp, Sx, S Basic System Configuration Guide for more information about configuring network policy parameters using commands in the config>system>lldp>lldp-med context. |
The endpoint move detection notification enables VoIP management systems to track the movement of VoIP phones. On the 7210 SAS, the user has the option to generate the lldpXMedTopologyChangeDetected event on detection of movement of the endpoint device. By default, the event is disabled. To enable the event, configure the config>log>event-control lldp generate and config>port>ethernet>lldp> dest-mac>nearest-bridge>notification commands.
LLDP-MED modifies the usage of some LLDP base TLVs for network connectivity devices. Specifically, the 7210 SAS supports the transmission of the MAC/PHY Configuration Status TLV when LLDP-MED is enabled. The transmission of this TLV is enabled using the config>port>ethernet>lldp>dest-mac>lldp-med>tx-tlvs mac-phy-config-status CLI command option.
7210 SAS devices support port loopback for Ethernet ports. There are two flavors of port loopback commands - port loopback without mac-swap and port loopback with mac-swap. Both these commands are helpful for testing the service configuration and measuring performance parameters such as throughput, delay, and jitter on service turn-up. Typically, a third-party external test device is used to inject packets at desired rate into the service at a central office location.
The following sections describe the port loopback functionality.
When the port loopback command is enabled, the system enables PHY/MAC loopback on the specified port. All the packets are sent out the port configured for loopback and received back by the system. On ingress to the system after the loopback, the node processes the packets as per the service configuration for the SAP.
This is recommended for use with only VLL services. This command affects all the services configured on the port, therefore the user is advised to ensure all the configuration guidelines mentioned for this feature in the command description are followed.
Note: Port loopback with mac-swap is not supported on100GE IMM-c cards for the 7210 SAS-R6 and 7210 SAS-R12. |
The 7210 SAS provides port loop back support with MAC swap. When the port loopback command is enabled, the system enables PHY/MAC loopback on the specified port. All the packets are sent out the port configured for loopback and received back by the system. On ingress to the system after the loopback, the node swaps the MAC addresses for the specified SAP and the service. It only processes packets that match the specified source MAC address and destination MAC address, while dropping packets that do not match. It processes these packets as per the service configuration for the SAP.
This is recommended for use with only VPLS and VLL services. This command affects all the services configured on the port, therefore the user is advised to ensure all the configuration guidelines mentioned for this feature in the command description are followed.
Based on the IEEE 802.3ax standard (formerly 802.3ad), Link Aggregation Groups (LAGs) can be configured to increase the bandwidth available between two network devices, depending on the number of links installed. LAG also provides redundancy in the event that one or more links participating in the LAG fail. All physical links in a specific LAG links combine to form one logical interface.
Packet sequencing must be maintained for any specific session. The hashing algorithm deployed by Nokia routers is based on the type of traffic transported to ensure that all traffic in a flow remains in sequence while providing effective load sharing across the links in the LAG.
LAGs must be statically configured or formed dynamically with Link Aggregation Control Protocol (LACP). The optional marker protocol described in IEEE 802.3ax is not implemented. LAGs can be configured on network and access ports.
Note: For details on LAG scale per platform, contact your Nokia technical support representative. |
This section describes hardware and software LAG capabilities.
The LAG load sharing is executed in hardware, which provides line rate forwarding for all port types.
The Nokia solution conforms to the IEEE LAG implementation, including dynamic costing and LAG port threshold features. The dynamic cost and LAG port threshold features can be enabled even if the second node is not a Nokia router.
Dynamic cost can be enabled with the config>lag dynamic-cost command or by the action specified in the config>lag>port-threshold command.
If dynamic cost is enabled and the number of active links is greater than the port threshold value (0-7 or 0-15), depending on chassis-mode and IOM type), then the path cost is dynamically calculated whenever there is a change in the number of active links regardless of the specified port threshold action. If the port-threshold is met and the action is set to dynamic cost, then the path cost is dynamically recalculated regardless of the global dynamic cost configuration.
Enabling dynamic costing causes the physical link metrics used by OSPF to be applied based on the operational or aggregate link bandwidth in the LAG that is available at the time, providing the number of links that are up exceeds the configured LAG port threshold value. If the number of available links falls below the configured threshold, the configured threshold action determines if and at what cost this LAG will be advertised.
For example, assume a single link in OSPF has an associated cost of 100 and the LAG consists of four physical links. The cost associated with the logical link is 25. If one link fails then the cost would automatically be adjusted to 33.
If dynamic cost is not configured then costing is applied based on the total number of links configured. The cost would be calculated at 25. This will remain static provided the number of links that are up exceeds the configured LAG threshold.
The LAG port threshold feature allows configuration of the behavior, when the number of available links in a LAG falls below or is equal to the specified threshold. Two options are available:
The following are guidelines for configuring LAGs.
Figure 4 shows traffic routed between ALA-1 and ALA-2 as a LAG consisting of four ports.
Link Aggregation Groups (LAG) is supported on access ports and access-uplink ports. This is treated the same as LAG on network ports which provides a standard method to aggregate Ethernet links. The difference lies in how QoS is handled.
In the 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE an ingress QoS policy is applied to the aggregate traffic that is received on all the member ports of the LAG. For example, if an ingress policy is configured with a policer of PIR 100 Mbps, for a SAP configured on a LAG with two ports, then the policer limits the traffic received through the two ports to a maximum of 100 Mbps.
In the 7210 SAS-M, 7210 SAS-T, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE an egress QoS policy parameters are applied to all the ports that are members of the LAG (all ports get the full SLA). For example, if an egress policy is configured with a queue shaper rate of PIR 100 Mbps, and applied to an access-uplink or access LAG configured with two port members, then each port would send out 100 Mbps of traffic for a total of 200 Mbps of traffic out of the LAG. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that, a single flow can use the entire SLA. The disadvantage is that, the overall SLA can be exceeded if the flows span multiple ports.
In 7210 SAS-Mxp, a SAP ingress QoS policy or network port ingress QoS policy or network IP interface ingress QoS policy is applied to the aggregate traffic that enters the traffic through all the ports of the system. For example, if an ingress policy is configured with a policer of PIR 100 Mbps, for a SAP configured on a LAG with two ports, then the policer limits the traffic entering the system through the two ports to a maximum of 100 Mbps.
In 7210 SAS-Mxp, SAP egress QoS policy shaper parameters are applied to all the ports that are members of the LAG (all ports get the full SLA). For example, if an SAP egress policy is configured with a shaper of PIR 100 Mbps, each port would get a PIR of 100 Mbps. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that, a single flow can uses the entire SLA. The disadvantage is that the overall SLA can be exceeded if the flows span multiple ports.
In 7210 SAS-Mxp, network port egress QoS policy shaper parameters are applied to all the ports that are members of the LAG (all ports get the full SLA). For example, if an network port egress policy is configured with a shaper of PIR 100 Mbps, each port would get a PIR of 100 Mbps. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that, a single flow can uses the entire SLA. The disadvantage is that the overall SLA can be exceeded if the flows span multiple ports.
In 7210 SAS-Mxp, when operating in port-based queuing mode, the access egress QoS policy is applied to access ports and the policy parameters are applied to all the ports that are members of the LAG (all access ports get the full SLA). For example, if an access egress policy is configured with a shaper of PIR 100 Mbps, each port gets a PIR of 100 Mbps. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that a single flow can use the entire SLA. The disadvantage is that the overall SLA can be exceeded if the flows span multiple ports. Access egress policy override parameters configured for the primary port of the LAG are applied to all the member ports of the LAG.
In 7210 SAS-R6 and 7210 SAS-R12, a SAP ingress QoS policy or network port ingress QoS policy or network IP interface ingress QoS policy is applied to the aggregate traffic that enters through all the ports on a IMM. If the LAG has member ports on different IMMs, then the policy is created for each IMM and is applied to the aggregate traffic that enters through all the ports on a specific IMM. For example, if an ingress policy is configured with a policer of PIR 100 Mbps, for a SAP configured on a LAG with two ports, then the policer limits the traffic entering through the two ports of the IMM to a maximum of 100 Mbps. If the LAG has two ports on 2 different IMMs, then policy is applied each IMM individually, and the policer on each IMM allows a maximum of 100 Mbps for a total of 200 Mbps.
In 7210 SAS-R6 and 7210 SAS-R12, SAP egress QoS policy shaper parameters are applied to all the ports that are members of the LAG (all ports get the full SLA), irrespective of whether they are located on a single IMM or two different IMMs. For example, if an SAP egress policy is configured with a shaper of PIR 100 Mbps, each port would get a PIR of 100 Mbps. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that, a single flow can uses the entire SLA. The disadvantage is that the overall SLA can be exceeded if the flows span multiple ports.
In 7210 SAS-R6 and 7210 SAS-R12, network port egress QoS policy shaper parameters are applied to all the ports that are members of the LAG (all ports get the full SLA), irrespective of whether they are located on a single IMM or two different IMMs. For example, if an network port egress policy is configured with a shaper of PIR 100 Mbps, each port would get a PIR of 100 Mbps. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that, a single flow can uses the entire SLA. The disadvantage is that the overall SLA can be exceeded if the flows span multiple ports.
In 7210 SAS-R6 and 7210 SAS-R12, when operating in port-based queuing mode, the access egress QoS policy is applied to access ports and the policy parameters are applied to all the ports that are members of the LAG (all access ports get the full SLA). For example, if an access egress policy is configured with a shaper of PIR 100 Mbps, each port gets a PIR of 100 Mbps. The advantage of this method over a scheme where the PIR is divided equally among all the member ports of the LAG is that a single flow can use the entire SLA. The disadvantage is that the overall SLA can be exceeded if the flows span multiple ports. Access egress policy override parameters configured for the primary port of the LAG are applied to all the member ports of the LAG.
Hold time controls enable port link damping timers that reduce the number of link transitions reported to upper layer protocols.
The 7210 SAS OS port link damping feature guards against excessive port transitions. Any initial port transition is immediately advertised to upper layer protocols, but any subsequent port transitions are not advertised to upper layer protocols until a configured timer has expired.
An “up” timer controls the dampening timer for link up transitions, and a “down” timer controls the dampening timer for link down transitions.
Generally, link aggregation is used for two purposes: provide an increase in bandwidth and/or provide redundancy. Both aspects are addressed by aggregating several Ethernet links in a single LAG.
Under normal operation, all non-failing links in a specific LAG will become active and traffic is load balanced across all active links. In some circumstances, however, this is not desirable. Instead, it desired that only some of the links are active and the other links be kept in stand-by condition.
LACP enhancements allow active lag-member selection based on particular constrains. The mechanism is based on the IEEE 802.3ax standard so interoperability is ensured.
Active/standby LAG is used to provide redundancy while keeping consistency of QOS enforcement. Some devices do not support LACP and therefore an alternative solution is required.
The active/standby decision for LAG member links is local decision driven by preconfigured selection-criteria. This decision was communicated to remote system using LACP signaling.
As an alternative, the operator can disable the signal transmitted by using power-off option for standby-signaling in the CLI command at the LAG level at the port member level. As a consequence, the transmit laser will be switched off for all LAG members in standby mode. On switch over (active-links failed) the laser will be switched on all LAG members will become active.
Note that this mode of operation cannot detect physical failures on the standby link, which means that the network operator cannot be certain that the standby links are capable to take over in case of active-links failure. This is an inherit limitation of this operational mode.
When LACP goes down on a standby link, a warning message announcing that LACP has expired on the corresponding member port is printed in log 99 on the other end.
The operation where standby ports are powered down is mutually exclusive with LACP and, therefore, is modeled as separate mode of LACP operation of power-off. For this mode, the selection-criteria best-port can be used. This criteria means that it will be always a sub-group with the best-port (the highest priority port) which will be chosen to be used as active sub-group.
It will not be possible to have an active LACP in power-off mode before the correct selection criteria is selected.
LACP is used to make selection of active links predictable and compatible with any vendor equipment. Refer to the IEEE STD 802.3-2002, Section 3, Clause 43.6.1 standard which describes how LACP allows stand-by and active signaling.
The 7210 SAS-M, 7210 SAS-T, 7210 SAS-R6, 7210 SAS-R6, and 7210 SAS-Mxp implementation of LACP supports the following:
Note: Refer to the 7210 SAS-M, T, R6, R12, Mxp, Sx, S Router Configuration Guide for more information about ECMP support for 7210 SAS platforms. |
When a requirement exists to increase the available bandwidth for a logical link that exceeds the physical bandwidth or add redundancy for a physical link, typically one of the methods is applied; equal cost multi-path (ECMP) or Link Aggregation (LAG). A 7210 SAS can deploy both at the same time, meaning, using ECMP of two or more Link Aggregation Groups (LAG) and/or single links.The Nokia implementation supports per flow hashing used to achieve uniform loadspreading and per service hashing designed to provide consistent per service forwarding. Depending on the type of traffic that needs to be distributed into an ECMP and/or a LAG, different variables are used as input to the hashing algorithm.
An option is provided per LAG to select the hashing function to be used for load-balancing flows on the member ports of the LAG. Users can use one of the available options based on the flows they have in their network and select an option that helps improve the load-balancing of flows in their network. The packets fields selected by the hashing function is different for some flows with the two hashing functions and is provided in the following tables.
Table 10 describes the packet fields used for hashing for services configured in network mode on the 7210 SAS-M.
Note: The following notes apply to Table 10.
|
Traffic Type | Hashing Options | Packet Fields Used | ||||||||||||
Hash-1 | Hash-2 | BDA | BSA | CDA | CSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||||||
VPLS Service SAP to SAP | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic (learned) | ✓ | ✓ 1 | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ||||||||||||
MPLS traffic (unlearned) | ✓ | ✓ | ✓ 2 | |||||||||||
✓ | ✓ | ✓ 2 | ||||||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
VPLS Service SAP to SDP | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ||||||||||||
MPLS traffic (unlearned) | ✓ | ✓ | ✓ 2 | |||||||||||
✓ | ✓ | ✓ 2 | ||||||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
VPLS Service SDP to SAP | ||||||||||||||
All traffic (learned) | ✓ | ✓ 3 | ||||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
All traffic (unlearned) | ✓ | ✓ | ✓ 3 | |||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
VPLS Service SDP to SDP | ||||||||||||||
IP traffic (learned) | ✓ | ✓ 3 | ||||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ 3 | |||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ 3 | |||||||||||
✓ | ✓ | ✓ | ✓ 3 | |||||||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ 3 | ||||||||||
✓ | ✓ | ✓ | ✓ 3 | |||||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ 3 | |||||||||||
✓ | ✓ | ✓ | ✓ 3 | |||||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ 3 | ||||||||||
✓ | ✓ | ✓ | ✓ 3 | |||||||||||
Epipe Service SAP to SAP | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic | ✓ | ✓ 1 | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ||||||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Epipe Service SAP to SDP | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ||||||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Epipe Service SDP to SAP | ||||||||||||||
All traffic | ✓ | ✓ 3 | ||||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
MPLS – LSR | ||||||||||||||
All traffic | ✓ | ✓ 1 | ||||||||||||
✓ | ✓ | ✓ 2 | ||||||||||||
PBB VPLS Service B-SAP to B-SAP (PBB BCB traffic) | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
L2 and non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB VPLS Service I-SAP to B-SAP (originating PBB BEB traffic) | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
L2 and non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
PBB VPLS Service B-SAP to I-SAP (terminating PBB BEB traffic) | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
L2 and non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB Epipe Service PBB Epipe I-SAP to B-SAP (originating PBB BEB traffic) | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
PBB Epipe Service PBB Epipe SAP to B-SAP (terminating PBB BEB traffic) | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ||||||||||||
L2 and non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
VPRN Service SAP to SAP SAP to SDP SDP to SAP | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IES service (IPv4) IES SAP to IES SAP | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IES service (IPv4) IES SAP to IPv4 network port interface | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
Network port IPv4 interface IPv4 network interface to IPv4 network interface | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
Network port IPv6 interface IPv6 network interface to IPv6 network interface | ||||||||||||||
— | ✓ | ✓ 4 | ✓ | |||||||||||
✓ | ✓ | ✓ 4 | ✓ |
Notes:
Table 11 describes the packet fields used for hashing for services configured on the 7210 SAS-M in access-uplink mode.
Note: The following notes apply to Table 11.
|
Traffic Type | Packet Fields Used | |||||||||
BDA | BSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||
VPLS Service SAP to SAP | ||||||||||
IP traffic (learned) | ✓ | ✓ | ||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | |||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | |||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||
MPLS traffic (learned) | ✓ 1 | ✓ | ||||||||
MPLS traffic (unlearned) | ✓ | ✓ 2 | ||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | |||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||
Epipe Service SAP to SAP | ||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||
MPLS traffic | ✓ | ✓ 2 | ||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||
IES Service (IPv4) IES SAP to IES SAP | ||||||||||
IPv4 unicast traffic | ✓ | ✓ |
Notes:
Table 12 describes the packet fields used for hashing for services configured on the 7210 SAS-T in network mode.
Note: The following notes apply to Table 12.
|
Traffic Type | Hashing Options | Packet Fields Used | ||||||||||||
Hash-1 | Hash-2 | BDA | BSA | CDA | CSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||||||
VPLS Service SAP to SAP | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic (learned) | ✓ | ✓ 1 | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ✓ | |||||||||||
MPLS traffic (unlearned) | ✓ | ✓ | ✓ 2 | ✓ | ||||||||||
✓ | ✓ | ✓ 2 | ✓ | |||||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
VPLS Service SAP to SDP | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ✓ | |||||||||||
MPLS traffic (unlearned) | ✓ | ✓ | ✓ 2 | ✓ | ||||||||||
✓ | ✓ | ✓ 2 | ✓ | |||||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
VPLS Service SDP to SAP | ||||||||||||||
IP traffic (learned) | ✓ | ✓ 3 | ✓ | ✓ | ||||||||||
— | ||||||||||||||
PBB traffic (learned) | ✓ | ✓ 3 | ||||||||||||
— | ||||||||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ 3 | |||||||||||
— | ||||||||||||||
All traffic (learned) | — | |||||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
All traffic (unlearned) | ✓ | ✓ | ✓ 3 | |||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
VPLS Service SDP to SDP | ||||||||||||||
All traffic (learned) | ✓ | ✓ 3 | ||||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
All traffic (unlearned) | ✓ | ✓ | ✓ 3 | |||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
Epipe Service SAP to SAP | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic | ✓ | ✓ 1 | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ✓ | |||||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Epipe Service SAP to SDP | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
MPLS traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ 2 | ✓ | |||||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
Epipe Service SDP to SAP | ||||||||||||||
IP traffic | ✓ | ✓ 3 | ✓ | ✓ | ||||||||||
— | ||||||||||||||
PBB traffic | ✓ | ✓ 3 | ||||||||||||
— | ||||||||||||||
Non-IP traffic | ✓ | ✓ | ✓ 3 | |||||||||||
— | ||||||||||||||
All traffic | — | |||||||||||||
✓ | ✓ | ✓ 3 | ||||||||||||
MPLS – LSR | ||||||||||||||
All traffic | ✓ | ✓ 1 | ||||||||||||
✓ | ✓ | ✓ 2 | ✓ 5 | |||||||||||
PBB VPLS Service B-SAP to B-SAP (PBB BCB traffic) | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
L2 and non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB VPLS Service I-SAP to B-SAP (originating PBB BEB traffic) | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
L2 and non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
PBB VPLS Service B-SAP to I-SAP (terminating PBB BEB traffic) | ||||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
L2 and non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||
PBB Epipe Service PBB Epipe I-SAP to B-SAP (originating PBB BEB traffic) | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
L2 and non-IP traffic | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
PBB Epipe Service PBB Epipe SAP to B-SAP (terminating PBB BEB traffic) | ||||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ||||||||||||
L2 and non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
VPRN Service SAP to SAP SAP to SDP SDP to SAP | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IES service (IPv4) IES SAP to IES SAP | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
IES service (IPv4) IES SAP to IPv4 network port interface | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
Network port IPv4 interface IPv4 network interface to IPv4 network interface | ||||||||||||||
— | ✓ | ✓ | ✓ | |||||||||||
✓ | ✓ | ✓ | ✓ | |||||||||||
Network port IPv6 interface IPv6 network interface to IPv6 network interface | ||||||||||||||
— | ✓ | ✓ 4 | ✓ | |||||||||||
✓ | ✓ | ✓ 4 | ✓ |
Notes:
Table 13 describes the packet fields used for hashing for services configured on the 7210 SAS-T in access-uplink mode.
Note: The following notes apply to Table 13
|
Traffic Type | Packet Fields Used | |||||||||
BDA | BSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||
VPLS Service SAP to SAP | ||||||||||
IP traffic (learned) | ✓ | ✓ | ||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | |||||||
PBB traffic (learned) | ✓ | ✓ | ||||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||
MPLS traffic (learned) | ✓ 1 | |||||||||
IP MPLS traffic (unlearned) | ✓ | ✓ 2 | ✓ | |||||||
L2 MPLS traffic (unlearned) | ✓ | ✓ 2 | ||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | |||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||
Epipe Service SAP to SAP | ||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||
IP MPLS traffic | ✓ | ✓ 2 | ✓ | |||||||
L2 MPLS traffic | ✓ | ✓ 2 | ||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||
IES Service (IPv4) IES SAP to IES SAP | ||||||||||
IPv4 unicast traffic | ✓ | ✓ |
Notes:
Table 14 describes the packet fields used for hashing for services configured on the 7210 SAS-R6 and 7210 SAS-R12.
Note: The following notes apply to Table 14.
|
Traffic Type | Hashing Options | Packet Fields Used | ||||||||||
Hash-1 | Hash-2 | BDA | BSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||||
VPLS Service SAP to SAP | ||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
MPLS traffic (learned) | ✓ | ✓ 4 | ✓ | |||||||||
✓ | ✓ | ✓ 5 | ||||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
All traffic (unlearned) | See note 1 | |||||||||||
VPLS Service SAP to SDP | ||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
MPLS traffic (learned) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ 5 | ✓ 8 | |||||||||
MPLS traffic (unlearned) | ✓ | ✓ | ✓ 5 | ✓ 8 | ||||||||
✓ | ✓ | ✓ 5 | ✓ 8 | |||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
VPLS Service SDP to SAP | ||||||||||||
IP traffic (learned) | ✓ | ✓ 5 | ✓ | ✓ | ✓ | |||||||
— | ||||||||||||
All traffic, excluding IP traffic (learned) | ✓ | ✓ | ✓ 7 | |||||||||
— | ||||||||||||
All traffic (learned) | — | |||||||||||
✓ | ✓ | ✓ 7 | ||||||||||
All traffic (unlearned) | See note 1 | |||||||||||
VPLS Service SDP to SDP | ||||||||||||
All traffic (learned) | ✓ | ✓ 7 | ||||||||||
✓ | ✓ | ✓ 7 | ||||||||||
All traffic (unlearned) | ✓ | ✓ | ✓ 7 | |||||||||
✓ | ✓ | ✓ 7 | ||||||||||
Epipe Service SAP to SAP | ||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
MPLS traffic | ✓ | ✓ 4 | ✓ | |||||||||
✓ | ✓ | ✓ 5 | ||||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Epipe Service SAP to SDP | ||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
MPLS traffic | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ 5 | ✓ 8 | |||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Epipe Service SDP to SAP | ||||||||||||
IP traffic | ✓ | ✓ 5 | ✓ | ✓ | ✓ | |||||||
— | ||||||||||||
All other traffic | ✓ | ✓ | ✓ 7 | |||||||||
— | ||||||||||||
All traffic | — | |||||||||||
✓ | ✓ | ✓ 7 | ||||||||||
MPLS – LSR | ||||||||||||
All traffic | ✓ | ✓ 4 | ||||||||||
✓ | ✓ | ✓ 2 | ✓ 3 | |||||||||
VPLS (Multicast traffic with IGMP snooping enabled) SAP to SAP SDP to SAP | ||||||||||||
— | See note 6 | |||||||||||
VPRN Service SAP to SAP SAP to SDP SDP to SAP | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IES service (IPv4) IES SAP to IES SAP | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IES service (IPv4) IES SAP to IPv4 network port interface | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
Network port IPv4 interface IPv4 network interface to IPv4 network interface | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
Network port IPv6 interface IPv6 network interface to IPv6 network interface | ||||||||||||
— | ✓ | ✓ 9 | ✓ | |||||||||
✓ | ✓ | ✓ 9 | ✓ |
Notes:
Table 15 describes the packet fields used for hashing for services configured on the 7210 SAS-Mxp.
Note: The following notes apply to Table 15.
|
Traffic Type | Hashing Options | Packet Fields Used | ||||||||||
Hash-1 | Hash-2 | BDA | BSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||||
VPLS and Epipe Services SAP to SAP | ||||||||||||
IP traffic (VPLS learned and Epipe; port-based egress scheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
MPLS traffic (VPLS learned and Epipe; port-based egress scheduling) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ 4 | ||||||||||
Non-IP traffic (VPLS learned and Epipe; port-based egress scheduling) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
All traffic (learned and unlearned; SAP-based egress scheduling) | See note 1 | |||||||||||
All traffic (VPLS unlearned; port-based egress scheduling) | See note 1 | |||||||||||
VPLS Service SAP to SDP | ||||||||||||
IP traffic (learned; SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IP traffic (unlearned; SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
MPLS traffic (learned; SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ 4 | ||||||||||
MPLS traffic (unlearned; SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ 4 | |||||||||
✓ | ✓ | ✓ 4 | ||||||||||
Non-IP traffic (learned; SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Non-IP traffic (unlearned; SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Epipe Service SAP to SDP | ||||||||||||
IP traffic (SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
MPLS traffic (SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ 4 | ||||||||||
Non-IP traffic (SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
VPLS and Epipe Services SDP to SAP | ||||||||||||
All traffic (including VPLS learned and unlearned; SAP-based egress scheduling) | See note 1 | |||||||||||
All traffic (VPLS unlearned; port-based egress scheduling) | See note 1 | |||||||||||
All other traffic (VPLS learned and Epipe; port-based egress scheduling) | ✓ | ✓ 5 | ||||||||||
✓ | ✓ | ✓ 5 | ||||||||||
VPLS Service SDP to SDP | ||||||||||||
All traffic (learned; SAP-based and port-based egress sheduling) | ✓ | ✓ 5 | ||||||||||
✓ | ✓ | ✓ 5 | ||||||||||
All traffic (unlearned; SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ 5 | |||||||||
✓ | ✓ | ✓ 5 | ||||||||||
MPLS – LSR | ||||||||||||
All traffic (SAP-based and port-based egress sheduling) | ✓ | ✓ 5 | ||||||||||
✓ | ✓ | ✓ 2 | ✓ 3 | |||||||||
VPLS (Multicast traffic with IGMP snooping enabled) SAP to SAP SDP to SAP | ||||||||||||
— (SAP-based and port-based egress sheduling) | See note 6 | |||||||||||
VPRN Service SAP to SAP SDP to SAP | ||||||||||||
All traffic (SAP-based egress scheduling) | See note 1 | |||||||||||
All traffic (Port-based egress scheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
VPRN Service SAP to SDP | ||||||||||||
All traffic (SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IES service (IPv4) IES SAP to IES SAP | ||||||||||||
All traffic (SAP-based egress scheduling) | See note 1 | |||||||||||
All traffic (Port-based egress scheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IES service (IPv4) IES SAP to IPv4 network port interface | ||||||||||||
— (SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
Network port IPv4 interface IPv4 network interface to IPv4 network interface | ||||||||||||
— (SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
Network port IPv6 interface IPv6 network interface to IPv6 network interface | ||||||||||||
— (SAP-based and port-based egress sheduling) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ |
Notes:
Table 16 describes the packet fields used for hashing for services configured on the 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE operating in the standalone and standalone-VC modes.
Note: The following terms are use in Table 16.
|
Traffic Type | Hashing Options | Packet Fields Used | ||||||||||
Hash-1 | Hash-2 | BDA | BSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||||
VPLS Service SAP to SAP | ||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
MPLS traffic (learned) | ✓ | ✓ | ✓ 3 | ✓ | ||||||||
✓ | ✓ | ✓ 1 | ✓ 2 | |||||||||
MPLS traffic (unlearned) | ✓ | ✓ | ✓ 1 | ✓ 2 | ||||||||
✓ | ✓ | ✓ 1 | ✓ 2 | |||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Epipe Service SAP to SAP | ||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
MPLS traffic | ✓ | ✓ | ✓ 3 | ✓ | ||||||||
✓ | ✓ | ✓ 1 | ✓ 2 | |||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
VPLS Service SAP to SDP | ||||||||||||
IP traffic (learned) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
PBB traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
MPLS traffic (learned) | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ 1 | ✓ 2 | |||||||||
MPLS traffic (unlearned) | ✓ | ✓ | ✓ 1 | ✓ 2 | ||||||||
✓ | ✓ | ✓ 1 | ✓ 2 | |||||||||
Non-IP traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Non-IP traffic (unlearned) | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
Epipe Service SAP to SDP | ||||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
MPLS traffic | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ 1 | ✓ 2 | |||||||||
Non-IP traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | ✓ | ||||||||
VPLS Service SDP to SAP | ||||||||||||
IP traffic (learned) | ✓ 5 | ✓ 4 | ✓ | ✓ | ✓ | |||||||
— | ||||||||||||
PBB traffic (learned) | ✓ | ✓ | ✓ | ✓ | ||||||||
— | ||||||||||||
Non-IP traffic (learned) | ✓ 6 | ✓ | ✓ | |||||||||
— | ||||||||||||
All traffic (learned) | — | |||||||||||
✓ | ✓ | ✓ 7 | ||||||||||
All traffic (unlearned) | ✓ | ✓ | ✓ 7 | |||||||||
✓ | ✓ | ✓ 7 | ||||||||||
Epipe Service SDP to SAP | ||||||||||||
IP traffic | ✓ 5 | ✓ 4 | ✓ | ✓ | ✓ | |||||||
— | ||||||||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
— | ||||||||||||
Non-IP traffic | ✓ 6 | ✓ | ✓ | |||||||||
— | ||||||||||||
All traffic | — | |||||||||||
✓ | ✓ | ✓ 7 | ||||||||||
VPLS Service SDP to SDP | ||||||||||||
All traffic (learned) | ✓ | ✓ 7 | ||||||||||
✓ | ✓ | ✓ 7 | ||||||||||
All traffic (unlearned) | ✓ | ✓ | ✓ 7 | |||||||||
✓ | ✓ | ✓ 7 | ||||||||||
MPLS – LSR | ||||||||||||
All traffic | ✓ | ✓ 3 | ||||||||||
✓ | ✓ | ✓ 1 | ✓ 8 | |||||||||
VPLS IGMP snooping VPLS (Multicast traffic with IGMP snooping enabled): SAP to SAP SAP to SDP | ||||||||||||
IP multicast traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
L2 multicast traffic | ✓ | ✓ | ✓ | ✓ | ||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
VPLS IGMP snooping VPLS (Multicast traffic with IGMP snooping enabled): SDP to SAP, SDP to SDP | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ||||||||||
VPRN Service SAP to SAP SAP to SDP SDP to SAP | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IES service (IPv4): IES SAP to IES SAP | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
IES service (IPv4): IES SAP to IPv4 network port interface | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
Network port IPv4 interface: IPv4 network interface to IPv4 network interface | ||||||||||||
— | ✓ | ✓ | ✓ | |||||||||
✓ | ✓ | ✓ | ✓ | |||||||||
Network port IPv6 interface: IPv6 network interface to IPv6 network interface | ||||||||||||
— | ✓ | ✓ 9 | ✓ | |||||||||
✓ | ✓ | ✓ 9 | ✓ |
Notes:
Table 17 describes the packet fields used to generate the hash label for different services and traffic types.
Note: The following notes apply to Table 17.
|
Traffic Type | Packet Fields Used | |||||
EtherType | Fixed Label Value | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||
VPLS and Epipe Services SAP to SDP | ||||||
IP traffic | ✓ | ✓ | ||||
PBB traffic | ✓ | |||||
MPLS traffic | ✓ | |||||
Any other traffic | ✓ | ✓ | ✓ | |||
VPLS Service SDP to SDP | ||||||
IP traffic | ✓ | ✓ | ||||
PBB traffic | ✓ | |||||
MPLS traffic | ✓ | |||||
Any other traffic | ✓ | ✓ 1 | ✓ |
Note:
Table 18 describes the packet fields used for different services and different traffic types, to generate the hash-label.
Note: The following notes apply to Table 18.
|
Traffic Type | Packet Fields Used | |||||||||
BDA | BSA | EtherType | Ingress Port-ID | ISID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | ||||||||
VPLS and Epipe Services SAP to SDP | ||||||||||
IP traffic | ✓ | ✓ | ✓ | |||||||
PBB traffic | ✓ | ✓ | ✓ | ✓ | ||||||
MPLS traffic | ✓ | ✓ 1 | ✓ 2 | |||||||
All other traffic | ✓ | ✓ | ✓ | ✓ | ||||||
VPLS Service SDP to SDP | ||||||||||
All traffic | ✓ | ✓ 3 |
Notes:
Table 19 describes the packet fields used for different services and different traffic types, to generate the hash-label.
Note: The following notes apply to table Table 19.
|
Traffic Type | Packet Fields Used | ||||||
EtherType | Ingress Port-ID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | |||||
VPLS and Epipe Services SAP to SDP | |||||||
IP traffic | ✓ | ✓ | ✓ | ||||
PBB traffic | ✓ | ||||||
MPLS traffic | ✓ | ✓ 1 | ✓ 2 | ||||
All other traffic | ✓ | ✓ | ✓ | ✓ | |||
VPLS Service SDP to SDP | |||||||
All traffic | ✓ | ✓ 3 |
Notes:
Table 20 describes the packet fields used for different services and different traffic types, to generate the hash-label.
Traffic Type | Packet Fields Used | ||||||
EtherType | Ingress Port-ID | MPLS Label Stack | Source and Destination | VLAN | |||
MAC | IP | L4 Ports | |||||
Network Port IPv4 Interface | |||||||
IPv4 traffic | ✓ | ✓ | ✓ | ||||
IES Service SAP to SAP | |||||||
IPv4 traffic | ✓ | ✓ | ✓ |
The 7210 SAS-Mxp, 7210 SAS-R6, 7210 SAS-R12, 7210 SAS-T, and 7210 SAS-Sx/S 1/10GE and 7210 SAS-Sx 10/100GE operating in standalone mode support bidirectional forwarding detection (BFD) to monitor individual LAG link members, which speeds up the detection of link failures. When BFD is associated with an Ethernet LAG, BFD sessions are established over each link member; sessions are called micro-BFD (uBFD) sessions. A link is not operational in the associated LAG until the associated micro-BFD session is fully established. The link member is also removed from the operational state in the LAG if the BFD session fails.
If BFD over LAG links is configured before the LAG is active, a link will not become operational in the associated LAG until the associated BFD session is fully established. If a LAG link is already in a forwarding state when BFD over LAG links is enabled, the forwarding state of the LAG link is not influenced until the uBFD session is fully established. A setup timer is started to remove the link from the LAG in the case where the uBFD session is not set up in time. By default, the setup timer value is set to never expire.
When configuring the local and remote IP addresses for BFD over LAG link sessions, the local-ip parameter must match an IP address associated with the IP interface to which this LAG is bound. In addition, the remote-ip parameter must match an IP address on the remote system, and should also be in the same subnet as the local IP address. If the LAG bundle is reassociated with a different IP interface, the local-ip and remote-ip parameters should be modified to match the new IP subnet.
The following guidelines apply for BFD over LAG links.
This section describes the Multi-Chassis LAG (MC-LAG) concept. MC-LAG is an extension of a LAG concept that provides node-level redundancy in addition to link-level redundancy provided by “regular LAG”.
Note: MC-LAG is supported on all 7210 SAS platforms as described in this document, except those operating in access-uplink mode. |
Typically, MC-LAG is deployed in a network-wide scenario and provides redundant connection between different end points. The whole scenario is then built by a combination of different mechanisms (for example, MC-LAG and redundant pseudowire to provide end-to-end (e2e) redundant point-to-point (p2p) connection or dual homing of CPE devices in Layer 2/3 VPNs).
Note: The 7210 SAS platforms configured in access-uplink mode cannot peer with an MC-LAG-enabled node since it does not implement MC-LAG protocol; a 7210 SAS-M or 7210 SAS-T in access-uplink mode cannot provide MC-LAG server functionality. Instead they can be used as MC-LAG clients, with the platforms connected to a head-end node that support MC-LAG server functionality. These platforms connect to the head-end node using LAG. |
MC-LAG is a method of providing redundant Layer 2/3 access connectivity that extends beyond link level protection by allowing two systems to share a common LAG end point.
The CPE/access node is connected with multiple links toward a redundant pair of Layer 2/3 access aggregation nodes such that both link and node level redundancy is provided. By using a multi-chassis LAG protocol, the paired Layer 2/3 aggregation nodes (referred to as the redundant-pair) appear to be a single node that is utilizing LACP toward the access node. The multi-chassis LAG protocol between the redundant-pair ensures a synchronized forwarding plane to and from the CPE/access node. It is used to synchronize the link state information between the redundant-pair nodes and provide correct LACP messaging to the CPE/access node from both redundant-pair nodes.
To ensure SLAs and deterministic forwarding characteristics between the CPE/access and the redundant-pair node, the multi-chassis LAG function provides an active/standby operation toward/from the CPE/access node. LACP is used to manage the available LAG links into active and standby states so that only links from one aggregation node are active at a time to and from the CPE/access node.
MC-LAG has the following characteristics.
Figure 5 and Figure 6 show different combinations of supported MC-LAG attachments. The supported configurations can be divided into the following subgroups:
Figure 5 shows dual homing to remote PE pairs.
Figure 6 shows dual homing to local PE pairs.
The forwarding behavior of the nodes is governed by the following principles. Note that the logical destination (actual forwarding decision) is primarily determined by the service (VPLS or VLL), and the following principle apply only if the destination or source is based on MC-LAG.
Figure 7 shows the connection between two CPE/access nodes across network based on Layer 2/3 VPN pseudo-wires. The connection between a CPE/access node and a pair of access aggregation PE routers is realized by MC-LAG. From the CPE/access node perspective, a redundant pair of access aggregation PE routers acts as a single partner in LACP negotiation. At any point in time, only one of the routers has active links in a specific LAG. The status of LAG links is reflected in the status signaling of pseudowires set between all participating PEs. The combination of active and standby states across LAG links and pseudowires give only one unique path between a pair of MSANs.
Note that the configuration in Figure 7 shows an example configuration of VLL connections based on MC-LAG. Specifically, it shows a VLL connection where the two ends (SAPs) are located on two different redundant-pairs. However, additional configurations are possible, for example:
Figure 8 shows a network configuration where DSLAM is dual homed to a pair of redundant PEs by using MC-LAG. Inside the aggregation network, a redundant-pair of PEs is connecting to VPLS service, which provides a reliable connection to single or pair of Broadband Service Routers (BSRs).
PE-A and PE-B implement MC-LAG toward access. The active node synchronizes the IGMP snooping state with the standby node, allowing the standby node to forward multicast streams to receivers on the access side, if the active node fails.
The following guidelines apply to MC-LAG configurations.
Note: When configuring associated LAG ID parameters, the LAG must be in access mode and LACP must be enabled. |
Use the following syntax to configure multi-chassis redundancy features.
The following is a sample configuration output.
Ethernet ring protection switching provides ITU-T G.8032 specification compliance to achieve resiliency for Ethernet Layer 2 networks. The G.8032 (Eth-ring) specification is built on Ethernet OAM and often referred to as Ring Automatic Protection Switching (R-APS).
Refer to “G.8032 Ethernet Ring Protection Switching” in the 7210 SAS-M, T, Mxp, Sx, S Services Guide and the 7210 SAS-R6, R12 Services Guide.
The 7210 SAS supports network access control of client devices (PCs, STBs, and others) on an Ethernet network in accordance with the IEEE 802.1x standard (Extensible Authentication Protocol (EAP) over a LAN network or EAPOL).
Layer 2 control protocols affect 802.1x authentication behavior differently depending on the protocol in use; see Layer 2 Control Protocol Interaction with Authentication Methods for more information.
The 7210 SAS supports port-based network access control for Ethernet ports only. Every Ethernet port can be configured to operate in one of three different operation modes, controlled by the port-control parameter:
The IEEE 802.1x standard defines three participants in an authentication conversation:
The authentication exchange is carried out between the supplicant and the authentication server, the authenticator acts only as a bridge. The communication between the supplicant and the authenticator is done through the Extended Authentication Protocol (EAP) over LANs (EAPOL). On the back end, the communication between the authenticator and the authentication server is done with the RADIUS protocol. The authenticator is therefore a RADIUS client, and the authentication server a RADIUS server.
Figure 9 shows the 802.1x architecture.
Figure 10 shows the messages involved in the authentication procedure.
The router will initiate the procedure when the Ethernet port becomes operationally up, by sending a special PDU called EAP-Request/ID to the client. The client can also initiate the exchange by sending an EAPOL-start PDU, if it doesn't receive the EAP-Request/ID frame during bootup. The client responds on the EAP-Request/ID with a EAP-Response/ID frame, containing its identity (typically username + password).
After receiving the EAP-Response/ID frame, the router will encapsulate the identity information into a RADIUS AccessRequest packet, and send it off to the configured RADIUS server.
The RADIUS server checks the supplied credentials, and if approved will return an Access Accept message to the router. The router notifies the client with an EAP-Success PDU and puts the port in authorized state.
The 802.1x authentication procedure is controlled by a number of configurable timers and scalars. There are two separate sets, one for the EAPOL message exchange and one for the RADIUS message exchange.
EAPOL timers:
RADIUS timer and scaler:
Figure 11 shows sample EAPOL and RADIUS timers on the 7210 SAS.
The router can also be configured to periodically trigger the authentication procedure automatically. This is controlled by the enable re-authentication and reauth-period parameters. Reauth-period indicates the period in seconds (since the last time that the authorization state was confirmed) before a new authentication procedure is started. The range of reauth-period is 1 to 9000 seconds (the default is 3600 seconds, one hour). Note that the port stays in an authorized state during the re-authentication procedure.
Configuration of 802.1x network access control on the router consists of two parts:
801.x authentication:
Customers who subscribe to Epipe service considers the Epipe as a wire, and run 802.1x between their devices which are located at each end of the Epipe.
Note: This feature only applies to port-based Epipe SAPs because 802.1x runs at port level not VLAN level. Therefore such ports must be configured as null encapsulated SAPs.
When 802.1x tunneling is enabled, the 802.1x messages received at one end of an Epipe are forwarded through the Epipe. When 802.1x tunneling is disabled (by default), 802.1x messages are dropped or processed locally according to the 802.1x configuration (shutdown or no shutdown).
Note that enabling 802.1x tunneling requires the 802.1x mode to be set to force-auth. Enforcement is performed on the CLI level.
Note: MAC authentication is only supported on 7210 SAS-M, 7210 SAS-Mxp, 7210 SAS-R6, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-T. |
The 7210 SAS supports the 802.1x EAP standard for authenticating Ethernet devices before they can access the network. However, if a client device does not support 802.1x EAP, MAC authentication can be used to prevent unauthorized traffic from being transmitted through the 7210 SAS.
Because MAC authentication is a fallback mechanism, the user must first enable 802.1x EAP to use MAC authentication on the 7210 SAS. To authenticate a port using MAC authentication, first configure 802.1x authentication on the 7210 SAS by enabling port-control auto, and then configure mac-auth on the 7210 SAS to enable MAC authentication.
Layer 2 control protocols affect MAC authentication behavior differently depending on the protocol in use; see Layer 2 Control Protocol Interaction with Authentication Methods for more information.
When a port becomes operationally up with MAC authentication enabled, the 7210 SAS (as the authenticator) performs the following steps.
Note: If it is known that the attached equipment does not support EAP, you can configure no mac-auth-wait so that MAC authentication is used as soon as the port is operationally up. |
While the port is unauthenticated, the port will be down to all upper layer protocols or services.
When a MAC address is authenticated, only packets whose source MAC address matches the authenticated MAC address are forwarded when the packets are received on the port, and only packets whose destination MAC address matches the authenticated MAC address are forwarded out of the port.
Broadcast and multicast packets at ingress are sent for source MAC address authentication. Broadcast and multicast packets at egress are forwarded as normal.
Unknown destination packets at ingress are copied to the CPU and MAC authentication is attempted. Unknown destination packets at egress are dropped.
MAC authentication is subject to the following limitations.
Caution: A small amount of traffic loss may occur while MAC reauthentication is in progress. |
Note: VLAN authentication is only supported on 7210 SAS-M, 7210 SAS-Mxp, 7210 SAS-R6, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-T. |
The 7210 SAS supports VLAN authentication, which operates similarly to 802.1x network access control but only uses VLAN-tagged EAPOL frames to trigger the authentication process on a per-VLAN basis, or uses null-tagged EAPOL frames to authenticate and authorize processing of service traffic received in the context of a Dot1q explicit null SAP. See 802.1x Network Access Control for information about 802.1x network access control and authentication.
To authenticate a port using VLAN authentication, you must first configure 802.1x authentication on the 7210 SAS by enabling port-control auto, and then configure vlan-auth on the 7210 SAS to enable VLAN authentication and allow VLAN authentication functionality to supersede that of basic 802.1x authentication.
VLAN authentication and MAC authentication are mutually exclusive. MAC authentication cannot be configured on a port while VLAN authentication is already configured on the same port. See MAC Authentication for information about MAC authentication.
Layer 2 control protocols affect VLAN authentication behavior differently depending on the protocol in use; see Layer 2 Control Protocol Interaction with Authentication Methods for more information.
When a port becomes operationally up with VLAN authentication enabled, the 7210 SAS (as the authenticator) performs the following steps.
While the port is unauthenticated, the port will be down to all upper layer protocols or services.
VLAN authentication is subject to the following limitations.
Table 21 describes the interactions of Layer 2 control protocols with 802.1x authentication, MAC authentication, and VLAN authentication.
Layer 2 Control Protocol | 802.1x Port Authentication Enabled | MAC Authentication Enabled | VLAN Authentication Enabled | |
Dot1q Explicit Null SAP Not Configured | Dot1q Explicit Null SAP Configured | |||
EFM OAM | Allow | Allow | Allow | Allow |
LLDP | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | Allow | Allow |
LACP | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | LAG and LACP are not supported on ports with VLAN authentication enabled | LAG and LACP are not supported on ports with VLAN authentication enabled |
CFM | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | Block if VLAN (SAP) is unauthenticated Allow only if specific VLAN is authenticated | Block if null SAP is unauthenticated Allow if null SAP is authenticated |
xSTP (STP/RSTP/MSTP) | Block if port is unauthenticated Allow if port is authenticated | Block if MAC is unauthenticated Allow if MAC is authenticated | Block if VLAN (SAP) is unauthenticated Allow if VLAN (SAP) is authenticated | Block if null SAP is unauthenticated Allow if null SAP is authenticated |
802.3ah Clause 57 (EFM OAM) defines the Operations, Administration, and Maintenance (OAM) sub-layer, which provides mechanisms useful for monitoring link operation such as remote fault indication and remote loopback control. In general, OAM provides network operators the ability to monitor the health of the network and quickly determine the location of failing links or fault conditions. EFM OAM described in this clause provides data link layer mechanisms that complement applications that may reside in higher layers.
OAM information is conveyed in slow protocol frames called OAM protocol data units (OAMPDUs). OAMPDUs contain the appropriate control and status information used to monitor, test and troubleshoot OAM-enabled links. OAMPDUs traverse a single link, being passed between peer OAM entities, and as such, are not forwarded by MAC clients (like bridges or switches).
The following EFM OAM functions are supported:
EFM OAM defines a set of events that may impact link operation. The following events are supported:
These critical link events are signaled to the remote DTE by the flag field in OAM PDUs.
The 7210 SAS does not generate EFM OAM PDUs with these flags except for the dying gasp flag. However, it supports processing of these flags in EFM OAM PDUs received from the peer.
EFM OAM provides a link-layer frame loopback mode that can be remotely controlled.
To initiate remote loopback, the local EFM OAM client sends a loopback control OAM PDU by enabling the OAM remote-loopback command. After receiving the loopback control OAM PDU, the remote OAM client puts the remote port into local loopback mode.
To exit remote loopback, the local EFM OAM client sends a loopback control OAM PDU by disabling the OAM remote-loopback command. After receiving the loopback control OAM PDU, the remote OAM client puts the port back into normal forwarding mode.
Note that during remote loopback test operation, all frames except EFM OAM PDUs are dropped at the local port for the receive direction, where remote loopback is enabled. If local loopback is enabled, then all frames except EFM OAM PDUs are dropped at the local port for both the receive and transmit directions. This behavior may result in many protocols (such as STP or LAG) resetting their state machines.
The 7210 SAS routers support 802.3ah. Customers who subscribe to Epipe service treat the Epipe as a wire, so they demand the ability to run 802.3ah between their devices which are located at each end of the Epipe.
Note: This feature only applies to port-based Epipe SAPs because 802.3ah runs at the port level, not at the VLAN level. Therefore, such ports must be configured as null encapsulated SAPs. |
When OAM PDU tunneling is enabled, 802.3ah OAM PDUs received at one end of an Epipe are forwarded through the Epipe. 802.3ah can run between devices that are located at each end of the Epipe. When OAM PDU tunneling is disabled (by default), OAM PDUs are dropped or processed locally according to the efm-oam configuration (shutdown or no shutdown).
Note that by enabling 802.3ah for a specific port and enabling OAM PDU tunneling for the same port are mutually exclusive.
The 7210 SAS devices provide the option to configure MTU limitations at many service points. The physical (access and network) port, service, and SDP MTU values must be individually defined.
MTU values must conform to both of the following conditions.
Table 22 describes the default MTU values that are dependent upon the (sub-) port type, mode, and encapsulation.
Port Type | Mode | Encap Type | Default (bytes) |
Ethernet | access | null | 1514 |
Ethernet | access | dot1q | 1518 |
Port mode | access | qinq | 1522 |
Fast Ethernet | network | — | 1514 |
Other Ethernet | network | — | 9212 |
Ethernet | hybrid | — | 9212 |
Notes:
Packet length=1500 (Length of IP packet) +14 (L2 header) +4 (length of SAP tag) =1518. The packet is dropped as packet length is greater than the service MTU configured.
Note: Refer to the 7210 SAS release notes for other restrictions with regards to MTU checking and processing on each of the platforms. |
This section describes the deployment of preprovisioned components on 7210 SAS platforms.
Appropriate MDAs are auto-provisioned on the 7210 SAS-M, 7210 SAS-T, 7210 SAS-Mxp, 7210 SAS-Sx/S 1/10GE, and 7210 SAS-Sx 10/100GE. The user is not required to provision the slots or MDA on these platforms.
When a line card or MDA is installed in a preprovisioned slot, the device detects discrepancies between the preprovisioned card and MDA type configurations and the types actually installed. Error messages display if there are inconsistencies and the card does not initialize.
When the correct preprovisioned cards are installed in the appropriate chassis slot, alarm, status, and performance details display.
The 7210 SAS-R6 has 6 IMM slots and 2 SF/CPM slots, which are not auto-provisioned and need to be provisioned by the user.
The 7210 SAS-R12 has 12 IMM slots and 2 SF/CPM slots, which are not auto-provisioned and need to be provisioned by the user.
Note: IMMv1 (imm-sas-r) cards cannot be installed in the same 7210 SAS-R6 chassis as IMMv2 (imm-sas-r-b) cards or IMM-c (imm-sas-r-c) cards. A mix of IMMv1 and any other type of card is not supported. |
The 7210 SAS-R6 allows the user to preprovision the chassis to accept either IMMv1 or IMMv2/IMM-c cards. By default, without any configuration, the chassis accepts only IMMv1 cards. Use the configure>system>allow-imm-family command to configure the type of card the chassis can accept and reboot the device for the value to take effect. Refer to the 7210 SAS-M, T, R6, R12, Mxp, Sx, S Basic System Configuration Guide for more information about this command.
The 7210 SAS-R12 allows the user to preprovision the chassis to accept either IMMv2 or IMM-c cards. By default, without any configuration, the chassis accepts IMMv2 cards. Use the configure>system>allow-imm-family command to configure the type of card the chassis can accept and reboot the device for the value to take effect. Refer to the 7210 SAS-M, T, R6, R12, Mxp, Sx, S Basic System Configuration Guide for more information about this command.
The 7210 SAS-R12 does not support IMMv1 (imm-sas-r) cards.
Figure 12 shows the process to provision chassis slots (if any), line cards (if any), MDAs (if any), and ports.
Note:
|