Nokia 7705 Service Aggregation Router, Release 23.4.R1
  Legal Disclaimers
  Customer Documentation and Product Support
  Legal Disclaimers
  Customer Documentation and Product Support
7705 SAR Basic System Configuration Guide R23.4.R1
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR System Configuration Process
  CLI Usage
    CLI Structure
    Navigating in the CLI
      CLI Contexts
      CLI Syntax
      CLI Root-Level Commands
      CLI Global Commands
      CLI Environment Commands
      CLI Monitor Commands
    Getting Help in the CLI
    The CLI Command Prompt
    Displaying Configuration Contexts
    EXEC Files
    CLI Script Control
    Entering CLI Commands
      Command Completion
      Unordered Parameters
      Editing Keystrokes
      Absolute Paths
      History
      Entering Numerical Ranges or Lists
      Pipe/Match
      Pipe/Count
      Redirection
    CLI Configuration Rollback
      Rollback Checkpoint and Rescue Files
        Rollback File Backup
      Performing a CLI Configuration Reversion
        Rollback Restrictions
    Transactional Configuration
      Basic Operation
      Transactions and Rollback
      Authorization
    Basic Command Reference
      Command Hierarchies
        CLI Root-Level and Global Commands
        Environment Commands
        Rollback Commands
        Candidate Commands
        Show Commands
      Command Descriptions
        CLI Root-Level and Global Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Show Commands
  File System Management
    The File System
      Compact Flash Device
      URLs
      Wildcards
    Common Configuration Tasks
      Modifying File Attributes
      Creating and Navigating Directories
      Copying Files
      Moving Files
      Deleting Files and Removing Directories
      Displaying Directory and File Information
      Repairing the File System
    File System Command Reference
      Command Hierarchy
        Configuration Commands
      Command Descriptions
        Configuration Commands
  Boot Options
    System Initialization
      Configuration and Image Loading
        Persistence
      Automatic Discovery Protocol
        Self-discovery
        Network Discovery
        Configuration Discovery
        Test and Commit
      FIPS-140-2 Mode
        CSM and Data Path Security Features and Algorithms in FIPS-140-2 Mode
        SSHv2 Approved Algorithms in FIPS-140-2 Mode
    Initial System Startup Process Overview
    Boot Loader File Protection
      Before Upgrading
      Performing the Upgrade
    Accessing the CLI
      Console Connection
      Telnet Connection
        Running Telnet
      SSH Connection
        Running SSH
    Accessing MPT Radios Connected to a 7705 SAR
    Configuration Notes
    Configuring the BOF with the CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Configuring BOF Parameters
    Configuring BOF Encryption
    Configuration File Encryption
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying or Deleting BOF Parameters
        Saving a Configuration
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          File Management Commands
          BOF Processing Control Commands
          Console Port Configuration Commands
          Image and Configuration Management Commands
          CSM Management Configuration Commands
          DNS Configuration Commands
        Show Commands
  System Management
    System Management Parameters
      System Information
        System Name
        System Contact
        System Location
        System Coordinates
        Common Language Location Identifier
        System Identifier
        PoE Power Source
      System Time
        Time Zones
        NTP
        SNTP Time Synchronization
        PTP
        Time-of-Day Measurement (ToD-1pps)
        GNSS
        CRON
    High Availability
      High Availability Features
        Redundancy
          Software Redundancy
          Configuration Redundancy
          Component Redundancy
          Accounting Configuration Redundancy
          Multi-Chassis LAG Redundancy
        Nonstop Routing (NSR)
        In-service Upgrade
        CSM Switchover
        Synchronization
          Configuration and boot-env Synchronization
          State Database Synchronization
    CSM Synchronization and Redundancy
      Active and Standby Designations
      When the Active CSM Goes Offline
      Persistence
      Administrative Tasks
        Saving Configurations
        Specifying Post-Boot Configuration Files
      Automatic Synchronization
        Boot-Env Option
        Config Option
      Manual Synchronization
        Forcing a Switchover
    Node Timing
      External Timing Mode
      Line Timing Mode
      Adaptive Clock Recovery (ACR)
        ACR States
        ACR Statistics
      Differential Clock Recovery (DCR)
        DCR Frequencies
      Serial Clock Transport (DCR Serial)
      Proprietary Clock Recovery (PCR)
      IEEE 1588v2 PTP
        Best Master Clock Algorithm
        PTP Clock Synchronization
        Performance Considerations
        PTP Capabilities
        PTP Ordinary Slave Clock For Frequency
        PTP Ordinary Master Clock For Frequency
        PTP Boundary Clock For Frequency
        PTP Ordinary Slave Clock for Time of Day/Phase Recovery
        PTP Boundary Clock for Time of Day/Phase Recovery
        PTP End-to-End Transparent Clock for Time of Day/Phase Recovery
        PTP Master Clock for Time of Day/Phase Distribution
        PTP Clock Redundancy
        PTP Ethernet Capabilities
        ITU-T G.8275.1 and G.8275.2
          Synchronization Certainty/Uncertainty
        IEC/IEEE 61850-9-3 and C37.238-2017
        PTP Profile Interworking
          Single-clock PTP Profile Interworking
          Multi-clock PTP Profile Interworking
        PTP Statistics
      Synchronous Ethernet
      Synchronization Status Messaging with Quality Level Selection
        Timing Reference Selection Based on Quality Level
          SSM/ESMC QL Transmission
            DS1 Physical Port QL Transmission
            E1 Physical Port QL Transmission
    System Configuration Process Overview
    Configuration Notes
    Configuring System Management with CLI
    System Management Configuration
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
          Coordinates
          System Identifier
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
            Authentication-check
            Authentication-key
            Broadcastclient
            MDA-timestamp
            Multicastclient
            Server
          SNTP
            Broadcast-client
            Server-address
          PTP
          Time-of-Day Measurement (ToD-1pps)
          GNSS
          CRON
      Configuring Script Parameters
      Configuring Synchronization and Redundancy
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
        Configuring Multi-Chassis Redundancy
      Configuring ATM Parameters
      Configuring Backup Copies
      Configuring System Administration Parameters
        Disconnect
        Set-time
        Display-config
        Tech-support
        Save
        Reboot
        Post-Boot Configuration Extension Files
          Show Command Output and Console Messages
      System Timing
        Entering Edit Mode
        Configuring Timing References
        Configuring IEEE 1588v2 PTP
        Configuring QL Values for SSM
        Using the Revert Command
        Other Editing Commands
        Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
          System Information and General Commands
          System Alarm Commands
          Persistence Commands
          System Time Commands
          CRON Commands
          Script Control Commands
          System Synchronization Commands
          System LLDP Commands
          System PTP Commands
        Administration Commands
          System Administration Commands
          High Availability (Redundancy) Commands
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          System Information and General Commands
          System Alarm Commands
          Persistence Commands
          System Time Commands
          CRON Commands
          Script Control Commands
          System Synchronization Configuration Commands
          LLDP System Commands
          System PTP Commands
        Administration Commands
          System Administration Commands
          High Availability (Redundancy) Commands
        Show Commands
        Clear Commands
        Debug Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR System Configuration Process
  CLI Usage
    CLI Structure
    Navigating in the CLI
      CLI Contexts
      CLI Syntax
      CLI Root-Level Commands
      CLI Global Commands
      CLI Environment Commands
      CLI Monitor Commands
    Getting Help in the CLI
    The CLI Command Prompt
    Displaying Configuration Contexts
    EXEC Files
    CLI Script Control
    Entering CLI Commands
      Command Completion
      Unordered Parameters
      Editing Keystrokes
      Absolute Paths
      History
      Entering Numerical Ranges or Lists
      Pipe/Match
      Pipe/Count
      Redirection
    CLI Configuration Rollback
      Rollback Checkpoint and Rescue Files
        Rollback File Backup
      Performing a CLI Configuration Reversion
        Rollback Restrictions
    Transactional Configuration
      Basic Operation
      Transactions and Rollback
      Authorization
    Basic Command Reference
      Command Hierarchies
        CLI Root-Level and Global Commands
        Environment Commands
        Rollback Commands
        Candidate Commands
        Show Commands
      Command Descriptions
        CLI Root-Level and Global Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Show Commands
  File System Management
    The File System
      Compact Flash Device
      URLs
      Wildcards
    Common Configuration Tasks
      Modifying File Attributes
      Creating and Navigating Directories
      Copying Files
      Moving Files
      Deleting Files and Removing Directories
      Displaying Directory and File Information
      Repairing the File System
    File System Command Reference
      Command Hierarchy
        Configuration Commands
      Command Descriptions
        Configuration Commands
  Boot Options
    System Initialization
      Configuration and Image Loading
        Persistence
      Automatic Discovery Protocol
        Self-discovery
        Network Discovery
        Configuration Discovery
        Test and Commit
      FIPS-140-2 Mode
        CSM and Data Path Security Features and Algorithms in FIPS-140-2 Mode
        SSHv2 Approved Algorithms in FIPS-140-2 Mode
    Initial System Startup Process Overview
    Boot Loader File Protection
      Before Upgrading
      Performing the Upgrade
    Accessing the CLI
      Console Connection
      Telnet Connection
        Running Telnet
      SSH Connection
        Running SSH
    Accessing MPT Radios Connected to a 7705 SAR
    Configuration Notes
    Configuring the BOF with the CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Configuring BOF Parameters
    Configuring BOF Encryption
    Configuration File Encryption
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying or Deleting BOF Parameters
        Saving a Configuration
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          File Management Commands
          BOF Processing Control Commands
          Console Port Configuration Commands
          Image and Configuration Management Commands
          CSM Management Configuration Commands
          DNS Configuration Commands
        Show Commands
  System Management
    System Management Parameters
      System Information
        System Name
        System Contact
        System Location
        System Coordinates
        Common Language Location Identifier
        System Identifier
        PoE Power Source
      System Time
        Time Zones
        NTP
        SNTP Time Synchronization
        PTP
        Time-of-Day Measurement (ToD-1pps)
        GNSS
        CRON
    High Availability
      High Availability Features
        Redundancy
          Software Redundancy
          Configuration Redundancy
          Component Redundancy
          Accounting Configuration Redundancy
          Multi-Chassis LAG Redundancy
        Nonstop Routing (NSR)
        In-service Upgrade
        CSM Switchover
        Synchronization
          Configuration and boot-env Synchronization
          State Database Synchronization
    CSM Synchronization and Redundancy
      Active and Standby Designations
      When the Active CSM Goes Offline
      Persistence
      Administrative Tasks
        Saving Configurations
        Specifying Post-Boot Configuration Files
      Automatic Synchronization
        Boot-Env Option
        Config Option
      Manual Synchronization
        Forcing a Switchover
    Node Timing
      External Timing Mode
      Line Timing Mode
      Adaptive Clock Recovery (ACR)
        ACR States
        ACR Statistics
      Differential Clock Recovery (DCR)
        DCR Frequencies
      Serial Clock Transport (DCR Serial)
      Proprietary Clock Recovery (PCR)
      IEEE 1588v2 PTP
        Best Master Clock Algorithm
        PTP Clock Synchronization
        Performance Considerations
        PTP Capabilities
        PTP Ordinary Slave Clock For Frequency
        PTP Ordinary Master Clock For Frequency
        PTP Boundary Clock For Frequency
        PTP Ordinary Slave Clock for Time of Day/Phase Recovery
        PTP Boundary Clock for Time of Day/Phase Recovery
        PTP End-to-End Transparent Clock for Time of Day/Phase Recovery
        PTP Master Clock for Time of Day/Phase Distribution
        PTP Clock Redundancy
        PTP Ethernet Capabilities
        ITU-T G.8275.1 and G.8275.2
          Synchronization Certainty/Uncertainty
        IEC/IEEE 61850-9-3 and C37.238-2017
        PTP Profile Interworking
          Single-clock PTP Profile Interworking
          Multi-clock PTP Profile Interworking
        PTP Statistics
      Synchronous Ethernet
      Synchronization Status Messaging with Quality Level Selection
        Timing Reference Selection Based on Quality Level
          SSM/ESMC QL Transmission
            DS1 Physical Port QL Transmission
            E1 Physical Port QL Transmission
    System Configuration Process Overview
    Configuration Notes
    Configuring System Management with CLI
    System Management Configuration
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
          Coordinates
          System Identifier
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
            Authentication-check
            Authentication-key
            Broadcastclient
            MDA-timestamp
            Multicastclient
            Server
          SNTP
            Broadcast-client
            Server-address
          PTP
          Time-of-Day Measurement (ToD-1pps)
          GNSS
          CRON
      Configuring Script Parameters
      Configuring Synchronization and Redundancy
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
        Configuring Multi-Chassis Redundancy
      Configuring ATM Parameters
      Configuring Backup Copies
      Configuring System Administration Parameters
        Disconnect
        Set-time
        Display-config
        Tech-support
        Save
        Reboot
        Post-Boot Configuration Extension Files
          Show Command Output and Console Messages
      System Timing
        Entering Edit Mode
        Configuring Timing References
        Configuring IEEE 1588v2 PTP
        Configuring QL Values for SSM
        Using the Revert Command
        Other Editing Commands
        Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
          System Information and General Commands
          System Alarm Commands
          Persistence Commands
          System Time Commands
          CRON Commands
          Script Control Commands
          System Synchronization Commands
          System LLDP Commands
          System PTP Commands
        Administration Commands
          System Administration Commands
          High Availability (Redundancy) Commands
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          System Information and General Commands
          System Alarm Commands
          Persistence Commands
          System Time Commands
          CRON Commands
          Script Control Commands
          System Synchronization Configuration Commands
          LLDP System Commands
          System PTP Commands
        Administration Commands
          System Administration Commands
          High Availability (Redundancy) Commands
        Show Commands
        Clear Commands
        Debug Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
7705 SAR Interface Configuration Guide R23.4.R1
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR Interface Configuration Process
  7705 SAR Interfaces
    Configuration Overview
      Configuring the IOM and Card Slot
      Configuring Adapter Cards and Modules
        Provisioning Chassis Slots for Adapter Cards
        Maximum Number of Adapter Cards in a Chassis
        Evolution of Ethernet Adapter Cards, Modules, and Platforms
        Channelized Adapter Card Support
          PPP Over Fractional T1/E1
      Configuring Ports
        Ethernet
          6-port Ethernet 10Gbps Adapter Card
          8-port Gigabit Ethernet Adapter Card
          10-port 1GigE/1-port 10GigE X-Adapter Card
          2-port 10GigE (Ethernet) Adapter Card/Module
          Packet Microwave Adapter Card
          4-port SAR-H Fast Ethernet Module
          6-port SAR-M Ethernet Module
          7705 SAR-A
          7705 SAR-Ax
          7705 SAR-H
          7705 SAR-Hc
          7705 SAR-M
          7705 SAR-Wx
          7705 SAR-X
        TDM
          16-port T1/E1 ASAP Adapter Card
          32-port T1/E1 ASAP Adapter Card
          2-port OC3/STM1 Channelized Adapter Card
          4-port OC3/STM1 / 1-port OC12/STM4 Adapter Card
          4-port DS3/E3 Adapter Card
          8-port Voice & Teleprotection Card
          8-port C37.94 Teleprotection Card
          12-port Serial Data Interface Card
          4-port T1/E1 and RS-232 Combination Module
          7705 SAR-A
          7705 SAR-Hc
          7705 SAR-M
          7705 SAR-X
        GNSS Receiver
        Multilink Bundles
        IMA
        SONET/SDH
        Voice
          6-port E&M Adapter Card
          8-port Voice & Teleprotection Card
          8-port FXO Adapter Card
          6-port FXS Adapter Card
        Microwave Link
        CLI Identifiers for Adapter Cards, Modules and Platforms
        Access, Network, and Hybrid Ports
          Rate Limiting
          Access Ports
            H-QoS for Access Egress Ethernet Ports
          Network Ports
            Aggregate CIR for Unshaped VLANs on Network Egress Ethernet Ports
          Hybrid Ports
      Configuring SCADA Bridges
    Port Features
      Multilink Point-to-Point Protocol
        MLPPP Overview
        Protocol Field (PID)
        B&E Bits
        Sequence Number
        Information Field
        Padding
        FCS
        LCP
        T1/E1 Link Hold Timers
      Multi-Class MLPPP
        QoS in MC-MLPPP
      cHDLC
        SLARP
      Inverse Multiplexing Over ATM (IMA)
      Network Synchronization on Ports and Circuits
        Network Synchronization on T1/E1 and Ethernet Ports
        Network Synchronization on SONET/SDH Ports
        Network Synchronization on DS3/E3 Ports
        Network Synchronization on DS3 CES Circuits
        Network Synchronization on T1/E1 Ports and Circuits
      Node Synchronization From GNSS Receiver Ports
      Flow Control on Ethernet Ports
      Ethernet OAM
        Ethernet OAM Overview
        CRC (Cyclic Redundancy Check) Monitoring
        Remote Loopback
        802.3ah OAMPDU Tunneling and Termination for Epipe Service
        Dying Gasp
      Ethernet Loopbacks
        Line and Internal Ethernet Loopbacks
          MAC Swapping
          Interaction of Ethernet Port Loopback with Other Features
        CFM Loopbacks for OAM on Ethernet Ports
          CFM Loopback Overview
          CFM Loopback Mechanics
      Ethernet Port Down-When-Looped
      Ethernet Ring (Adapter Card and Module)
      MTU Configuration Guidelines
        MTU Configuration Overview
        IP Fragmentation
        Jumbo Frames
          Behavior of Adapter Cards Not Supporting Jumbo Frames on 7705 SAR-8 Shelf V2 and 7705 SAR-18 only
          Jumbo Frame Behavior on the Fixed Platforms
          Multicast Support for Jumbo Frames
          PMC Jumbo Frame Support
        Default Port MTU Values
      LAG
        LAG Overview
        LACP and Active/Standby Operation
        QoS Adaptation for LAG on Access
          Adaptive QoS Examples (Distribute Mode)
        QoS for LAG on Network
        Access Ingress Fabric Shaping
        Hold-down Timers
        Multi-Chassis LAG
        Static LAG (Active/Standby LAG Operation without LACP)
        LAG Support on Mixed-Generation Hardware
          LAG Configuration at SAP Level
          LAG Configuration at Port Level
        BFD Over LAG Links (Micro-BFD)
          Configuration Rules
          Configuration Examples
      LAG and ECMP Hashing
        Per-Flow Hashing
        Per-Service Hashing
        LSR Hashing
          LSR Label-only Hashing
          LSR Label-IP Hashing
          LSR Label-IP Hashing with Layer 4 Header and TEID
          Label Stack Profile Options
          Ingress Port
        Layer 4 Load Balancing
        TEID Hashing for GTP-encapsulated Traffic
        Entropy Labels
        Security Parameter Index (SPI) Load Balancing
      SONET/SDH
        SONET
        SDH
        SONET/SDH Path Support
          SONET/SDH Channelized Port ID
      Automatic Protection Switching
        APS Overview
        SC-APS
        MC-APS
          MC-APS and Inter-Chassis Backup
        K1 and K2 Bytes
          Bidirectional 1+1 APS example
        Revertive Mode
        APS Tools Commands
          Lockout Protection
          Request Switch of Active to Protection
          Request Switch of Active to Working
          Forced Switch from Working to Protection
          Forced Switch from Protection to Working
          Exercise
        APS Failure Codes
          Protection Switching Byte Failure (APS-PSB)
          Channel Mismatch Failure (APS-CM)
          APS Mode Mismatch Failure (APS-MM)
          Far-End Protection Line Failure (APS-FEPL)
      T1/E1 Line Card Redundancy
        T1/E1 LCR Overview
        SC-LCR
        MC-LCR
          MC-LCR and Inter-Chassis Backup
        Revertive Mode
        LCR Tools Commands
          Force Activity from Working Card
          Force Activity from Protection Card
      Deploying Preprovisioned Components
      Microwave Link
        Microwave Link Overview
        Standalone Mode
        Single NE Mode
          Single NE Management
            One Management IP Address
            MPR-e Radio Configuration Management
            MPR-e Radio Alarm Management
            MPR-e Radio Software and Upgrade Management
            MPR-e Radio Configuration Database File Management
            MPR-e Radio Inventory and Microwave Link Performance Statistics
            MPR-e Radio Reset Control
            MPR-e Radio Mute Control
          Microwave Link Fast Fault Detection (FFD)
          1+1 HSB
            1+1 Equipment Protection Switching (EPS)
            1+1 Transmission Protection Switching (TPS)
            1+1 Radio Protection Switching (RPS)
            1+1 HSB Transmit Diversity Antenna (TDA)
            Communication Method Between the Main and Spare MPR-e Radio
          1+1 Switching Operation
        Frequency Synchronization
        RSL History
      Custom Alarms on Ethernet Ports
    802.1x Network Access Control
      802.1x Basics
      802.1x Modes
      802.1x Timers
      802.1x Tunneling
      802.1x Configuration and Limitations
    MAC Authentication
    Link Layer Discovery Protocol (LLDP)
      LLDP Protocol Features
    Surveillance, Control, and Data Acquisition (SCADA) Support
      Multidrop Data Bridge
      PCM Multidrop Bridge
      Redundant Masters
      Squelch Functionality
      Voice Conference Bridge
        VCB Applications
          VCB Mute Output Option
        Gain
      Serial Transport Over Raw Sockets
        Raw Socket Configuration
        Raw Socket Packet Processing
          Raw Socket Processing for UDP Sessions
          Raw Socket Processing for TCP Sessions
        Raw Socket Squelch Functionality
    Configuration Notes
    Configuring Physical Components with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port or SCADA Bridge
      Maximizing Bandwidth Use
      Using Partial Bandwidth
    Basic Configuration
    Common Configuration Tasks
      Configuring Cards and Adapter Cards
        Configuring Cards
        Configuring Adapter Card Network Queue QoS Policies
        Configuring Ring Adapter Card or Module Network and Network Queue QoS Policies
        Configuring Adapter Card Fabric Statistics
        Configuring Adapter Card Fabric Profile
        Configuring Adapter Card Clock Mode
        Configuring Adapter Card Voice Attributes
        Configuring Ring Adapter Card or Module Parameters
        Configuring Auxiliary Alarm Card, Chassis, and Ethernet Port External Alarm Parameters
        Displaying Adapter Card Information
      Configuring Ports
        Configuring APS Port Parameters
        Configuring LCR Parameters
        Configuring a Microwave Link
        Configuring Ethernet Port Parameters
          Configuring an Ethernet Network Port
          Configuring an Ethernet Access Port
          Configuring a Hybrid Ethernet Port
          Configuring 802.1x Authentication Port Parameters
          Configuring MAC Authentication Port Parameters
        Configuring SONET/SDH Port Parameters
          Configuring a SONET/SDH Access Port
          Configuring a SONET/SDH Network Port
            4-port OC3/STM1 Clear Channel Adapter Card
            2-port OC3/STM1 Channelized Adapter Card
          Configuring the SONET/SDH Port group and path Commands
          Configuring SONET/SDH Parameters on an Ethernet XGIG WAN Port
        SONET/SDH Channelized Port Configuration Examples
          OC3 Channelization using SONET and SDH
          Configuring DS1/E1 on a Channelized OC3 Port with STS1 Path
            1. DS1 (SONET Framing, STS1)
              1.1 STS1 with channelized DS3 payload
              1.2 STS1 with VT1.5 payload
            2. E1 (SONET Framing, STS1)
          Configuring DS1/E1 on a Channelized OC3 Port with STM Path
            1. DS1 (SDH Framing, STS1)
              1.1 STS1 with channelized DS3 payload
              1.2 STS1 with VT1.5 payload
            2. E1 (SDH Framing, STS1)
              2.1 STS1 with channelized DS3 payload
              2.2 STS1 with VT2 payload
          Configuring DS1/E1 on a Channelized OC3 Port with STS3 Path
            1. DS1 (SDH Framing, STS3)
              1.1 STS3 / TUG with VT1.5 payload
              1.2 STS3 / TUG with TU3 payload
            2. E1 (SDH Framing, STS3)
          Configuring a SONET/SDH Port with Multiple DS1s in an MLPPP Bundle
            Configuring the Network Port
            Verifying the Configured Network Ports
            Verifying the Available Channelization
        Configuring Voice Ports
        Configuring Codirectional G.703 Ports
        Configuring Teleprotection Ports
        Configuring TDM PPP
        Configuring Channelized Ports
          Verifying the Adapter Card Type
        Configuring Fractional T1/E1 Ports for PPP Encapsulation
        Configuring T1 Line Buildout
        Configuring DS1 or E1 SSM
        Configuring ATM Interface Parameters
          ATM Interface Commands
        Configuring Multilink PPP Bundles
        Configuring MC-MLPPP
        Configuring LAG Parameters
        Configuring Multilink ATM Inverse Multiplexing (IMA) Groups
          Configuring IMA Groups
          Configuration Notes for IMA Groups
          IMA Test Procedure
        Configuring SDI Ports for IPCP Encapsulation
        Configuring TDM and SDI Ports for Frame Relay Encapsulation
        Configuring TDM and SDI Ports for HDLC Encapsulation
        Configuring TDM and SDI Ports for Cisco HDLC Encapsulation
        Configuring GNSS Receiver Port Parameters
        Configuring Serial Ports for Raw Socket Transport
      Configuring SCADA Bridge Parameters
    Service Management Tasks
      Changing a Provisioned Adapter Card Type
      Deleting an Adapter Card
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        Adapter Card Commands
        External Alarm Commands
        APS Port Commands
        T1/E1 LCR Commands
        Microwave Link Commands
        Port Configuration Commands
        Ethernet Commands
        GNSS Commands
        IEEE 802.1x Ethernet Port Commands
        LLDP Ethernet Port Commands
        Ring Virtual Port Ethernet Commands
        Ring MAC Operations Commands
        Multilink Bundle and IMA Group Commands
        Serial Commands
        SONET/SDH Commands
        TDM Commands
        DS1 Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        Voice Commands
        LAG Commands
        SCADA Commands
      Command Descriptions
        Generic Commands
        Card Commands
        Adapter Card Commands
        Interface QoS Commands
        External Alarm Commands
        APS Port Commands
        T1/E1 LCR Commands
        Microwave Link Commands
        General Port Commands
        Ethernet Commands
        GNSS Commands
        IEEE 802.1x Ethernet Port Commands
        LLDP Ethernet Port Commands
        Ring MAC Operations Commands
        Serial Commands
        RS-232, RS-530, V.35, and X.21 Channel Group Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        Network Port Commands
        Multilink Bundle and IMA Group Commands
        ATM Interface Commands
        TDM Commands
        DS1 and E1 Commands
        DS1 and E1 Channel Group Commands
        DS3 and E3 Commands
        Voice Commands
        Voice Channel Group Commands
        LAG Commands
        Frame Relay Commands
        Cisco HDLC Commands
        SCADA Commands
    Show, Monitor, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
          Show APS Commands
          Show Card Commands
          Show External Alarms Commands
          Show T1/E1 LCR Commands
          Show Microwave Link Commands
          Show Port Commands
          Show ATM Port Commands
          Show Port-tree Commands
          Show LAG Commands
          Show Multilink Bundle and IMA Group Commands
          Show ATM IMA Group Commands
          Show SCADA Commands
        Monitor Commands
        Clear Commands
        Debug Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR Interface Configuration Process
  7705 SAR Interfaces
    Configuration Overview
      Configuring the IOM and Card Slot
      Configuring Adapter Cards and Modules
        Provisioning Chassis Slots for Adapter Cards
        Maximum Number of Adapter Cards in a Chassis
        Evolution of Ethernet Adapter Cards, Modules, and Platforms
        Channelized Adapter Card Support
          PPP Over Fractional T1/E1
      Configuring Ports
        Ethernet
          6-port Ethernet 10Gbps Adapter Card
          8-port Gigabit Ethernet Adapter Card
          10-port 1GigE/1-port 10GigE X-Adapter Card
          2-port 10GigE (Ethernet) Adapter Card/Module
          Packet Microwave Adapter Card
          4-port SAR-H Fast Ethernet Module
          6-port SAR-M Ethernet Module
          7705 SAR-A
          7705 SAR-Ax
          7705 SAR-H
          7705 SAR-Hc
          7705 SAR-M
          7705 SAR-Wx
          7705 SAR-X
        TDM
          16-port T1/E1 ASAP Adapter Card
          32-port T1/E1 ASAP Adapter Card
          2-port OC3/STM1 Channelized Adapter Card
          4-port OC3/STM1 / 1-port OC12/STM4 Adapter Card
          4-port DS3/E3 Adapter Card
          8-port Voice & Teleprotection Card
          8-port C37.94 Teleprotection Card
          12-port Serial Data Interface Card
          4-port T1/E1 and RS-232 Combination Module
          7705 SAR-A
          7705 SAR-Hc
          7705 SAR-M
          7705 SAR-X
        GNSS Receiver
        Multilink Bundles
        IMA
        SONET/SDH
        Voice
          6-port E&M Adapter Card
          8-port Voice & Teleprotection Card
          8-port FXO Adapter Card
          6-port FXS Adapter Card
        Microwave Link
        CLI Identifiers for Adapter Cards, Modules and Platforms
        Access, Network, and Hybrid Ports
          Rate Limiting
          Access Ports
            H-QoS for Access Egress Ethernet Ports
          Network Ports
            Aggregate CIR for Unshaped VLANs on Network Egress Ethernet Ports
          Hybrid Ports
      Configuring SCADA Bridges
    Port Features
      Multilink Point-to-Point Protocol
        MLPPP Overview
        Protocol Field (PID)
        B&E Bits
        Sequence Number
        Information Field
        Padding
        FCS
        LCP
        T1/E1 Link Hold Timers
      Multi-Class MLPPP
        QoS in MC-MLPPP
      cHDLC
        SLARP
      Inverse Multiplexing Over ATM (IMA)
      Network Synchronization on Ports and Circuits
        Network Synchronization on T1/E1 and Ethernet Ports
        Network Synchronization on SONET/SDH Ports
        Network Synchronization on DS3/E3 Ports
        Network Synchronization on DS3 CES Circuits
        Network Synchronization on T1/E1 Ports and Circuits
      Node Synchronization From GNSS Receiver Ports
      Flow Control on Ethernet Ports
      Ethernet OAM
        Ethernet OAM Overview
        CRC (Cyclic Redundancy Check) Monitoring
        Remote Loopback
        802.3ah OAMPDU Tunneling and Termination for Epipe Service
        Dying Gasp
      Ethernet Loopbacks
        Line and Internal Ethernet Loopbacks
          MAC Swapping
          Interaction of Ethernet Port Loopback with Other Features
        CFM Loopbacks for OAM on Ethernet Ports
          CFM Loopback Overview
          CFM Loopback Mechanics
      Ethernet Port Down-When-Looped
      Ethernet Ring (Adapter Card and Module)
      MTU Configuration Guidelines
        MTU Configuration Overview
        IP Fragmentation
        Jumbo Frames
          Behavior of Adapter Cards Not Supporting Jumbo Frames on 7705 SAR-8 Shelf V2 and 7705 SAR-18 only
          Jumbo Frame Behavior on the Fixed Platforms
          Multicast Support for Jumbo Frames
          PMC Jumbo Frame Support
        Default Port MTU Values
      LAG
        LAG Overview
        LACP and Active/Standby Operation
        QoS Adaptation for LAG on Access
          Adaptive QoS Examples (Distribute Mode)
        QoS for LAG on Network
        Access Ingress Fabric Shaping
        Hold-down Timers
        Multi-Chassis LAG
        Static LAG (Active/Standby LAG Operation without LACP)
        LAG Support on Mixed-Generation Hardware
          LAG Configuration at SAP Level
          LAG Configuration at Port Level
        BFD Over LAG Links (Micro-BFD)
          Configuration Rules
          Configuration Examples
      LAG and ECMP Hashing
        Per-Flow Hashing
        Per-Service Hashing
        LSR Hashing
          LSR Label-only Hashing
          LSR Label-IP Hashing
          LSR Label-IP Hashing with Layer 4 Header and TEID
          Label Stack Profile Options
          Ingress Port
        Layer 4 Load Balancing
        TEID Hashing for GTP-encapsulated Traffic
        Entropy Labels
        Security Parameter Index (SPI) Load Balancing
      SONET/SDH
        SONET
        SDH
        SONET/SDH Path Support
          SONET/SDH Channelized Port ID
      Automatic Protection Switching
        APS Overview
        SC-APS
        MC-APS
          MC-APS and Inter-Chassis Backup
        K1 and K2 Bytes
          Bidirectional 1+1 APS example
        Revertive Mode
        APS Tools Commands
          Lockout Protection
          Request Switch of Active to Protection
          Request Switch of Active to Working
          Forced Switch from Working to Protection
          Forced Switch from Protection to Working
          Exercise
        APS Failure Codes
          Protection Switching Byte Failure (APS-PSB)
          Channel Mismatch Failure (APS-CM)
          APS Mode Mismatch Failure (APS-MM)
          Far-End Protection Line Failure (APS-FEPL)
      T1/E1 Line Card Redundancy
        T1/E1 LCR Overview
        SC-LCR
        MC-LCR
          MC-LCR and Inter-Chassis Backup
        Revertive Mode
        LCR Tools Commands
          Force Activity from Working Card
          Force Activity from Protection Card
      Deploying Preprovisioned Components
      Microwave Link
        Microwave Link Overview
        Standalone Mode
        Single NE Mode
          Single NE Management
            One Management IP Address
            MPR-e Radio Configuration Management
            MPR-e Radio Alarm Management
            MPR-e Radio Software and Upgrade Management
            MPR-e Radio Configuration Database File Management
            MPR-e Radio Inventory and Microwave Link Performance Statistics
            MPR-e Radio Reset Control
            MPR-e Radio Mute Control
          Microwave Link Fast Fault Detection (FFD)
          1+1 HSB
            1+1 Equipment Protection Switching (EPS)
            1+1 Transmission Protection Switching (TPS)
            1+1 Radio Protection Switching (RPS)
            1+1 HSB Transmit Diversity Antenna (TDA)
            Communication Method Between the Main and Spare MPR-e Radio
          1+1 Switching Operation
        Frequency Synchronization
        RSL History
      Custom Alarms on Ethernet Ports
    802.1x Network Access Control
      802.1x Basics
      802.1x Modes
      802.1x Timers
      802.1x Tunneling
      802.1x Configuration and Limitations
    MAC Authentication
    Link Layer Discovery Protocol (LLDP)
      LLDP Protocol Features
    Surveillance, Control, and Data Acquisition (SCADA) Support
      Multidrop Data Bridge
      PCM Multidrop Bridge
      Redundant Masters
      Squelch Functionality
      Voice Conference Bridge
        VCB Applications
          VCB Mute Output Option
        Gain
      Serial Transport Over Raw Sockets
        Raw Socket Configuration
        Raw Socket Packet Processing
          Raw Socket Processing for UDP Sessions
          Raw Socket Processing for TCP Sessions
        Raw Socket Squelch Functionality
    Configuration Notes
    Configuring Physical Components with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port or SCADA Bridge
      Maximizing Bandwidth Use
      Using Partial Bandwidth
    Basic Configuration
    Common Configuration Tasks
      Configuring Cards and Adapter Cards
        Configuring Cards
        Configuring Adapter Card Network Queue QoS Policies
        Configuring Ring Adapter Card or Module Network and Network Queue QoS Policies
        Configuring Adapter Card Fabric Statistics
        Configuring Adapter Card Fabric Profile
        Configuring Adapter Card Clock Mode
        Configuring Adapter Card Voice Attributes
        Configuring Ring Adapter Card or Module Parameters
        Configuring Auxiliary Alarm Card, Chassis, and Ethernet Port External Alarm Parameters
        Displaying Adapter Card Information
      Configuring Ports
        Configuring APS Port Parameters
        Configuring LCR Parameters
        Configuring a Microwave Link
        Configuring Ethernet Port Parameters
          Configuring an Ethernet Network Port
          Configuring an Ethernet Access Port
          Configuring a Hybrid Ethernet Port
          Configuring 802.1x Authentication Port Parameters
          Configuring MAC Authentication Port Parameters
        Configuring SONET/SDH Port Parameters
          Configuring a SONET/SDH Access Port
          Configuring a SONET/SDH Network Port
            4-port OC3/STM1 Clear Channel Adapter Card
            2-port OC3/STM1 Channelized Adapter Card
          Configuring the SONET/SDH Port group and path Commands
          Configuring SONET/SDH Parameters on an Ethernet XGIG WAN Port
        SONET/SDH Channelized Port Configuration Examples
          OC3 Channelization using SONET and SDH
          Configuring DS1/E1 on a Channelized OC3 Port with STS1 Path
            1. DS1 (SONET Framing, STS1)
              1.1 STS1 with channelized DS3 payload
              1.2 STS1 with VT1.5 payload
            2. E1 (SONET Framing, STS1)
          Configuring DS1/E1 on a Channelized OC3 Port with STM Path
            1. DS1 (SDH Framing, STS1)
              1.1 STS1 with channelized DS3 payload
              1.2 STS1 with VT1.5 payload
            2. E1 (SDH Framing, STS1)
              2.1 STS1 with channelized DS3 payload
              2.2 STS1 with VT2 payload
          Configuring DS1/E1 on a Channelized OC3 Port with STS3 Path
            1. DS1 (SDH Framing, STS3)
              1.1 STS3 / TUG with VT1.5 payload
              1.2 STS3 / TUG with TU3 payload
            2. E1 (SDH Framing, STS3)
          Configuring a SONET/SDH Port with Multiple DS1s in an MLPPP Bundle
            Configuring the Network Port
            Verifying the Configured Network Ports
            Verifying the Available Channelization
        Configuring Voice Ports
        Configuring Codirectional G.703 Ports
        Configuring Teleprotection Ports
        Configuring TDM PPP
        Configuring Channelized Ports
          Verifying the Adapter Card Type
        Configuring Fractional T1/E1 Ports for PPP Encapsulation
        Configuring T1 Line Buildout
        Configuring DS1 or E1 SSM
        Configuring ATM Interface Parameters
          ATM Interface Commands
        Configuring Multilink PPP Bundles
        Configuring MC-MLPPP
        Configuring LAG Parameters
        Configuring Multilink ATM Inverse Multiplexing (IMA) Groups
          Configuring IMA Groups
          Configuration Notes for IMA Groups
          IMA Test Procedure
        Configuring SDI Ports for IPCP Encapsulation
        Configuring TDM and SDI Ports for Frame Relay Encapsulation
        Configuring TDM and SDI Ports for HDLC Encapsulation
        Configuring TDM and SDI Ports for Cisco HDLC Encapsulation
        Configuring GNSS Receiver Port Parameters
        Configuring Serial Ports for Raw Socket Transport
      Configuring SCADA Bridge Parameters
    Service Management Tasks
      Changing a Provisioned Adapter Card Type
      Deleting an Adapter Card
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        Adapter Card Commands
        External Alarm Commands
        APS Port Commands
        T1/E1 LCR Commands
        Microwave Link Commands
        Port Configuration Commands
        Ethernet Commands
        GNSS Commands
        IEEE 802.1x Ethernet Port Commands
        LLDP Ethernet Port Commands
        Ring Virtual Port Ethernet Commands
        Ring MAC Operations Commands
        Multilink Bundle and IMA Group Commands
        Serial Commands
        SONET/SDH Commands
        TDM Commands
        DS1 Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        Voice Commands
        LAG Commands
        SCADA Commands
      Command Descriptions
        Generic Commands
        Card Commands
        Adapter Card Commands
        Interface QoS Commands
        External Alarm Commands
        APS Port Commands
        T1/E1 LCR Commands
        Microwave Link Commands
        General Port Commands
        Ethernet Commands
        GNSS Commands
        IEEE 802.1x Ethernet Port Commands
        LLDP Ethernet Port Commands
        Ring MAC Operations Commands
        Serial Commands
        RS-232, RS-530, V.35, and X.21 Channel Group Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        Network Port Commands
        Multilink Bundle and IMA Group Commands
        ATM Interface Commands
        TDM Commands
        DS1 and E1 Commands
        DS1 and E1 Channel Group Commands
        DS3 and E3 Commands
        Voice Commands
        Voice Channel Group Commands
        LAG Commands
        Frame Relay Commands
        Cisco HDLC Commands
        SCADA Commands
    Show, Monitor, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
          Show APS Commands
          Show Card Commands
          Show External Alarms Commands
          Show T1/E1 LCR Commands
          Show Microwave Link Commands
          Show Port Commands
          Show ATM Port Commands
          Show Port-tree Commands
          Show LAG Commands
          Show Multilink Bundle and IMA Group Commands
          Show ATM IMA Group Commands
          Show SCADA Commands
        Monitor Commands
        Clear Commands
        Debug Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
7705 SAR Log Events Guide R23.4.R1
  Legal notice
  Log Events
    Overview of Log Events
    Log Event Example
  APPLICATION_ASSURANCE
  APS
  ATM
  BFD
  BGP
  CALLTRACE
  CFLOWD
  CHASSIS
  DEBUG
  DHCP
  DHCPS
  DIAMETER
  DYNSVC
  EFM_OAM
  ELMI
  ERING
  ETH_CFM
  ETUN
  FILTER
  FIREWALL
  GMPLS
  GSMP
  IGH
  IGMP
  IGMP_SNOOPING
  IP
  IPSEC
  ISIS
  L2TP
  LAG
  LDAP
  LDP
  LI
  LLDP
  LMP
  LOGGER
  MC_REDUNDANCY
  MCPATH
  MIRROR
  MLD
  MLD_SNOOPING
  MPLS
  MPLS_TP
  MSDP
  MWMGR
  NAT
  NTP
  OAM
  OPEN_FLOW
  OSPF
  PCAP
  PIM
  PIM_SNOOPING
  PORT
  PPP
  PPPOE
  PTP
  RADIUS
  RIP
  RIP_NG
  ROUTE_POLICY
  RPKI
  RSVP
  SATELLITE
  SECURITY
  SFLOW
  SNMP
  STP
  SVCMGR
  SYSTEM
  USER
  VIDEO
  VRRP
  VRTR
  WLAN_GW
  WPP
  Customer Documentation and Product Support
  Legal notice
  Log Events
    Overview of Log Events
    Log Event Example
  APPLICATION_ASSURANCE
  APS
  ATM
  BFD
  BGP
  CALLTRACE
  CFLOWD
  CHASSIS
  DEBUG
  DHCP
  DHCPS
  DIAMETER
  DYNSVC
  EFM_OAM
  ELMI
  ERING
  ETH_CFM
  ETUN
  FILTER
  FIREWALL
  GMPLS
  GSMP
  IGH
  IGMP
  IGMP_SNOOPING
  IP
  IPSEC
  ISIS
  L2TP
  LAG
  LDAP
  LDP
  LI
  LLDP
  LMP
  LOGGER
  MC_REDUNDANCY
  MCPATH
  MIRROR
  MLD
  MLD_SNOOPING
  MPLS
  MPLS_TP
  MSDP
  MWMGR
  NAT
  NTP
  OAM
  OPEN_FLOW
  OSPF
  PCAP
  PIM
  PIM_SNOOPING
  PORT
  PPP
  PPPOE
  PTP
  RADIUS
  RIP
  RIP_NG
  ROUTE_POLICY
  RPKI
  RSVP
  SATELLITE
  SECURITY
  SFLOW
  SNMP
  STP
  SVCMGR
  SYSTEM
  USER
  VIDEO
  VRRP
  VRTR
  WLAN_GW
  WPP
  Customer Documentation and Product Support
7705 SAR MPLS Guide R23.4.R1
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR MPLS Configuration Process
  MPLS and RSVP-TE
    Overview
    MPLS
      Traffic Engineering for MPLS
        TE Metric and IGP Metric
      MPLS Label Stack
        Label Values
      MPLS Entropy Labels
        Overview of Entropy Labels
        Inserting and Processing the Entropy Label
          Ingress LER
          LSR
          Egress LER
        Entropy Label on OAM Packets
        Segment Routing Entropy Label and IPSec, ESPI Hashing, and NGE
        Entropy Label Configuration
      Label Edge and Label Switch Routers
      LSP Types
    RSVP and RSVP-TE
      RSVP-TE Overview
        Using RSVP-TE for MPLS
        RSVP-TE Extensions for MPLS
        Hello Protocol
        Authentication
          Authentication Key
          Authentication Keychains
        Non-Router ID Addresses as Destinations and Hops
      RSVP LSP and LDP FEC Statistics
        Configuring RSVP LSP Statistics at Ingress LER
        Configuring RSVP LSP Statistics at Egress LER
        Configuring LDP FEC Statistics
    RSVP-TE Signaling
      General Attributes of RSVP-TE
        Bidirectional Forwarding Detection
          RSVP-TE over Broadcast Interface with BFD
        Timers
        LSP Resignal Limit
        RSVP-TE Message Pacing
        RSVP-TE Overhead Refresh Reduction
        RSVP-TE Reservation Styles
        Implicit Null Label
        RSVP-TE Entropy Labels
    LSP Redundancy
      Make-Before-Break (MBB) Procedures for LSP and Path Parameter Configuration Changes
      Automatic Creation of RSVP-TE LSPs
      Automatic Creation of RSVP-TE LSP Mesh (Auto-LSP)
        Multi-Area and Multi-Instance Support
        Mesh LSP Name Encoding
      Automatic Creation of an RSVP-TE Single-Hop LSP
      Automatic ABR Selection for Inter-area LSPs
        Rerouting of Inter-area LSPs
        Behavior of MPLS Options in Inter-area LSPs
        Inter-area LSP Support of OSPF Virtual Links
      ABR FRR Protection for Inter-area LSP
    Preference Option for Standby Secondary LSP Paths
    RSVP-TE Fast Reroute (FRR)
      FRR Terminology
      Bypass Resignal Timer
      FRR Behavior
      Dynamic and Manual Bypass LSPs
        Bypass LSP Selection Rules for the PLR
        FRR Node Protection (Facility Backup)
      Admin Group Support on Facility Bypass Backup LSPs
      FRR Over Unnumbered Interfaces
    Shared Risk Link Groups
      SRLGs for Secondary LSP Paths
      SRLGs for FRR LSP Paths
      Disjoint and Non-disjoint Paths
      Enabling Disjoint Backup Paths
    RSVP-TE Graceful Shutdown
    RSVP-TE Support for Unnumbered Interfaces
    PCEP Support for RSVP-TE LSPs
    Segment Routing with Traffic Engineering (SR-TE)
      SR-TE Support
      SR-TE LSP Instantiation
        PCC-initiated and PCC-controlled LSPs
          Guidelines for Using PCC-initiated and PCC-controlled LSPs
        PCC-initiated and PCE-computed/controlled LSP
      SR-TE LSP Path Computation
        Service and Shortcut Application SR-TE Label Stack Check
      SR-TE LSP Paths Using Explicit SIDs
      SR-TE LSP Protection
        Local Protection
        End-to-End Protection
      Seamless BFD for SR-TE LSPs
        Configuration of S-BFD on SR-TE LSPs
        Support for BFD Failure Action with SR-TE LSPs
          SR-TE LSP State Changes and Failure Actions Based on S-BFD
        S-BFD Operational Considerations
      Static Route Resolution Using SR-TE LSPs
      BGP Label Route Resolution Using SR-TE LSPs
      Service Packet Forwarding Using SR-TE LSPs
      Data Path Support
        SR-TE LSP Metric and MTU Settings
      SR-TE Entropy Labels
    Weighted ECMP by RSVP-TE or SR-TE LSPs
      Weighted ECMP for VPRN Services with Auto-bind
      Weighted ECMP for EVPN
      Weighted ECMP for SDPs
    MPLS Service Usage
      Service Destination Points
    MPLS and RSVP-TE Configuration Process Overview
    Configuration Notes
    Configuring MPLS and RSVP-TE with CLI
    MPLS Configuration Overview
      Router Interface
        E-LSP for Differentiated Services
      Paths
      LSPs
      Pseudowires
      Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
      Configuring a Static LSP
        Configuring a Fast-Retry Timer for Static LSPs
      Configuring Manual Bypass Tunnels
      Configuring RSVP-TE Parameters and Interfaces
      Configuring RSVP-TE Message Pacing Parameters
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP-TE Configuration Management Tasks
      Modifying RSVP-TE Parameters
      Modifying RSVP-TE Message Pacing Parameters
      Deleting an Interface from RSVP-TE
    Configuring and Operating SR-TE
      SR-TE Configuration Prerequisites
      SR-TE LSP Configuration Overview
      Configuring Path Computation and Control for SR-TE LSPs
        Configuring Path Profile and Group for PCC-initiated and PCE-computed/controlled LSPs
      Configuring SR-TE LSP Label Stack Size
      Configuring Adjacency SID Parameters
      Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
    MPLS and RSVP-TE Command Reference
      Command Hierarchies
        MPLS Commands
        RSVP-TE Commands
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
      Command Descriptions
        Configuration Commands (MPLS)
          Generic Commands
          MPLS Global Commands
          RSVP LSP Statistics Commands
          Interface Commands
          Interface Label-Map Commands
          LSP and LSP Template Commands
          Primary and Secondary Path Commands
          LSP Path Commands
          Static LSP Commands
        Configuration Commands (RSVP-TE)
          Generic Commands
          RSVP-TE Global Commands
          Interface Commands
          Message Pacing Commands
        Show Commands (MPLS)
        Show Commands (MPLS-Labels)
        Show Commands (Seamless BFD)
        Show Commands (RSVP)
        Clear Commands
        Monitor Commands
        Debug Commands
  PCEP
    Introduction to the Path Computation Element (PCE) Communication Protocol (PCEP)
    Path Computation Fallback for PCC-initiated LSPs
    Base Implementation of Path Computation Elements (PCE)
    PCEP Session Establishment and Maintenance
    PCEP Parameters
      PCC Configuration
      Stateful PCE
      PCEP Extensions in Support of SR-TE LSPs
      LSP Initiation
      PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
    PCEP over TLS
      TLS handshake
      PCEP session over TLS
    PCEP Support for RSVP-TE LSPs
      RSVP-TE LSP Configuration for a PCC Router
      Behavior of the LSP Path Update
        Path Update with Empty ERO
      Behavior of LSP MBB
        PCC-Controlled LSPs
        PCE-Computed LSPs
        PCE-Controlled LSPs
      Behavior of Secondary LSP Paths
      PCE Path Profile Support
    LSP Path Diversity and Bidirectionality Constraints
    NSP and VSR-NRC PCE Redundancy
      Feature Configuration
      NSP Ecosystem Redundancy
        NSP Cluster Redundancy
        VSR-NRC Redundancy
        PCC Behavior
    Configuring RSVP-TE LSPs with PCEP Using the CLI
      PCEP on the PCE Node and the PCC Node
      MPLS on the PCC Node
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
        Show Commands
      Command Descriptions
        PCEP Commands
        Show Commands
  Label Distribution Protocol
    Label Distribution Protocol
      LDP and MPLS
        BFD for T-LDP
      LDP Architecture
      LDP Subsystem Interrelationships
        Memory Manager and LDP
        Label Manager
        LDP Configuration
        Logger
        Service Manager
      Execution Flow
        Initialization
        Session Lifetime
          Adjacency Establishment
          Session Establishment
      Label Exchange
        Implicit Null Label
        Other Reasons for Label Actions
        Cleanup
      LDP Filters
        Per-LDP peer export policies
      LDP FEC Statistics
      Multi-area and Multi-instance Extensions to LDP
      ECMP Support for LDP
        Label Operations
      Graceful Restart Helper
      Graceful Handling of Resource Exhaustion
      LDP Support for Unnumbered Interfaces
      LDP Fast Reroute (FRR)
        ECMP vs FRR
        IGP Shortcuts (RSVP-TE Tunnels)
        LDP FRR Configuration
      LDP-to-Segment Routing Stitching for IPv4 /32 Prefixes (IS-IS)
        Stitching in the LDP-to-SR Direction
        Stitching in the SR-to-LDP Direction
        TTL Propagation and ICMP Tunneling
      LDP FRR Remote LFA and TI-LFA Backup Using an SR Tunnel for IPv4 /32 Prefixes (IS-IS)
        Feature Behavior
      TCP MD5 Authentication
    LDP Point-to-Multipoint Support
      LDP Point-to-Multipoint Configuration
      LDP Point-to-Multipoint Protocol
      Make-Before-Break (MBB)
      ECMP Support
      Inter-AS Non-segmented mLDP
        LDP Recursive FEC Process
          Supported Recursive Opaque Values
          Redundancy and Resiliency
          ASBR Physical Connection
        OAM
        ECMP Support
          ECMP Hash Algorithm
      Intra-AS Non-segmented mLDP
        ABR MoFRR for Intra-AS
        Interaction with an Inter-AS Non-segmented mLDP Solution
    Multicast LDP Fast Upstream Switchover
      mLDP Fast Upstream Switchover Configuration
      mLDP Fast Upstream Switchover Behavior
    LDP IPv6
      Link LDP
      Targeted LDP
      FEC Resolution
      LDP Session Capabilities
      LDP Adjacency Capabilities
      IP Address and FEC Distribution
      IGP and Static Route Synchronization with LDP
      BFD Operation
      Services Using SDP with an LDP IPv6 FEC
      Mirror Services
        Configuration at mirror source node
        Configuration at mirror destination node
      OAM Support with LDP IPv6
      Interoperability
        Interoperability with Implementations Compliant with draft- ietf-mpls-ldp-ipv6
        Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
      Upgrading from IPv4 to IPv6
    LDP Process Overview
    Configuration Notes
    Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring Graceful Restart Helper Parameters
      Applying Import and Export Policies
      Configuring Interface Parameters
      Specifying Targeted Session Parameters
      Specifying Peer Parameters
      Configuring LDP Support for Multicast VPN (MVPN)
      Configuring LDP Support for LDP-to-SR Stitching
      Enabling LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
    LDP Command Reference
      Command Hierarchies
        LDP Commands
        Show Commands
          Show LDP Commands
          Show LDP Bindings Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          LDP Global Commands
          Interface Parameters Commands
          Session Parameters Commands
          Targeted Session Commands
        Show Commands
          Show Router LDP Commands
          Show Router LDP Bindings Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR MPLS Configuration Process
  MPLS and RSVP-TE
    Overview
    MPLS
      Traffic Engineering for MPLS
        TE Metric and IGP Metric
      MPLS Label Stack
        Label Values
      MPLS Entropy Labels
        Overview of Entropy Labels
        Inserting and Processing the Entropy Label
          Ingress LER
          LSR
          Egress LER
        Entropy Label on OAM Packets
        Segment Routing Entropy Label and IPSec, ESPI Hashing, and NGE
        Entropy Label Configuration
      Label Edge and Label Switch Routers
      LSP Types
    RSVP and RSVP-TE
      RSVP-TE Overview
        Using RSVP-TE for MPLS
        RSVP-TE Extensions for MPLS
        Hello Protocol
        Authentication
          Authentication Key
          Authentication Keychains
        Non-Router ID Addresses as Destinations and Hops
      RSVP LSP and LDP FEC Statistics
        Configuring RSVP LSP Statistics at Ingress LER
        Configuring RSVP LSP Statistics at Egress LER
        Configuring LDP FEC Statistics
    RSVP-TE Signaling
      General Attributes of RSVP-TE
        Bidirectional Forwarding Detection
          RSVP-TE over Broadcast Interface with BFD
        Timers
        LSP Resignal Limit
        RSVP-TE Message Pacing
        RSVP-TE Overhead Refresh Reduction
        RSVP-TE Reservation Styles
        Implicit Null Label
        RSVP-TE Entropy Labels
    LSP Redundancy
      Make-Before-Break (MBB) Procedures for LSP and Path Parameter Configuration Changes
      Automatic Creation of RSVP-TE LSPs
      Automatic Creation of RSVP-TE LSP Mesh (Auto-LSP)
        Multi-Area and Multi-Instance Support
        Mesh LSP Name Encoding
      Automatic Creation of an RSVP-TE Single-Hop LSP
      Automatic ABR Selection for Inter-area LSPs
        Rerouting of Inter-area LSPs
        Behavior of MPLS Options in Inter-area LSPs
        Inter-area LSP Support of OSPF Virtual Links
      ABR FRR Protection for Inter-area LSP
    Preference Option for Standby Secondary LSP Paths
    RSVP-TE Fast Reroute (FRR)
      FRR Terminology
      Bypass Resignal Timer
      FRR Behavior
      Dynamic and Manual Bypass LSPs
        Bypass LSP Selection Rules for the PLR
        FRR Node Protection (Facility Backup)
      Admin Group Support on Facility Bypass Backup LSPs
      FRR Over Unnumbered Interfaces
    Shared Risk Link Groups
      SRLGs for Secondary LSP Paths
      SRLGs for FRR LSP Paths
      Disjoint and Non-disjoint Paths
      Enabling Disjoint Backup Paths
    RSVP-TE Graceful Shutdown
    RSVP-TE Support for Unnumbered Interfaces
    PCEP Support for RSVP-TE LSPs
    Segment Routing with Traffic Engineering (SR-TE)
      SR-TE Support
      SR-TE LSP Instantiation
        PCC-initiated and PCC-controlled LSPs
          Guidelines for Using PCC-initiated and PCC-controlled LSPs
        PCC-initiated and PCE-computed/controlled LSP
      SR-TE LSP Path Computation
        Service and Shortcut Application SR-TE Label Stack Check
      SR-TE LSP Paths Using Explicit SIDs
      SR-TE LSP Protection
        Local Protection
        End-to-End Protection
      Seamless BFD for SR-TE LSPs
        Configuration of S-BFD on SR-TE LSPs
        Support for BFD Failure Action with SR-TE LSPs
          SR-TE LSP State Changes and Failure Actions Based on S-BFD
        S-BFD Operational Considerations
      Static Route Resolution Using SR-TE LSPs
      BGP Label Route Resolution Using SR-TE LSPs
      Service Packet Forwarding Using SR-TE LSPs
      Data Path Support
        SR-TE LSP Metric and MTU Settings
      SR-TE Entropy Labels
    Weighted ECMP by RSVP-TE or SR-TE LSPs
      Weighted ECMP for VPRN Services with Auto-bind
      Weighted ECMP for EVPN
      Weighted ECMP for SDPs
    MPLS Service Usage
      Service Destination Points
    MPLS and RSVP-TE Configuration Process Overview
    Configuration Notes
    Configuring MPLS and RSVP-TE with CLI
    MPLS Configuration Overview
      Router Interface
        E-LSP for Differentiated Services
      Paths
      LSPs
      Pseudowires
      Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
      Configuring a Static LSP
        Configuring a Fast-Retry Timer for Static LSPs
      Configuring Manual Bypass Tunnels
      Configuring RSVP-TE Parameters and Interfaces
      Configuring RSVP-TE Message Pacing Parameters
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP-TE Configuration Management Tasks
      Modifying RSVP-TE Parameters
      Modifying RSVP-TE Message Pacing Parameters
      Deleting an Interface from RSVP-TE
    Configuring and Operating SR-TE
      SR-TE Configuration Prerequisites
      SR-TE LSP Configuration Overview
      Configuring Path Computation and Control for SR-TE LSPs
        Configuring Path Profile and Group for PCC-initiated and PCE-computed/controlled LSPs
      Configuring SR-TE LSP Label Stack Size
      Configuring Adjacency SID Parameters
      Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
    MPLS and RSVP-TE Command Reference
      Command Hierarchies
        MPLS Commands
        RSVP-TE Commands
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
      Command Descriptions
        Configuration Commands (MPLS)
          Generic Commands
          MPLS Global Commands
          RSVP LSP Statistics Commands
          Interface Commands
          Interface Label-Map Commands
          LSP and LSP Template Commands
          Primary and Secondary Path Commands
          LSP Path Commands
          Static LSP Commands
        Configuration Commands (RSVP-TE)
          Generic Commands
          RSVP-TE Global Commands
          Interface Commands
          Message Pacing Commands
        Show Commands (MPLS)
        Show Commands (MPLS-Labels)
        Show Commands (Seamless BFD)
        Show Commands (RSVP)
        Clear Commands
        Monitor Commands
        Debug Commands
  PCEP
    Introduction to the Path Computation Element (PCE) Communication Protocol (PCEP)
    Path Computation Fallback for PCC-initiated LSPs
    Base Implementation of Path Computation Elements (PCE)
    PCEP Session Establishment and Maintenance
    PCEP Parameters
      PCC Configuration
      Stateful PCE
      PCEP Extensions in Support of SR-TE LSPs
      LSP Initiation
      PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
    PCEP over TLS
      TLS handshake
      PCEP session over TLS
    PCEP Support for RSVP-TE LSPs
      RSVP-TE LSP Configuration for a PCC Router
      Behavior of the LSP Path Update
        Path Update with Empty ERO
      Behavior of LSP MBB
        PCC-Controlled LSPs
        PCE-Computed LSPs
        PCE-Controlled LSPs
      Behavior of Secondary LSP Paths
      PCE Path Profile Support
    LSP Path Diversity and Bidirectionality Constraints
    NSP and VSR-NRC PCE Redundancy
      Feature Configuration
      NSP Ecosystem Redundancy
        NSP Cluster Redundancy
        VSR-NRC Redundancy
        PCC Behavior
    Configuring RSVP-TE LSPs with PCEP Using the CLI
      PCEP on the PCE Node and the PCC Node
      MPLS on the PCC Node
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
        Show Commands
      Command Descriptions
        PCEP Commands
        Show Commands
  Label Distribution Protocol
    Label Distribution Protocol
      LDP and MPLS
        BFD for T-LDP
      LDP Architecture
      LDP Subsystem Interrelationships
        Memory Manager and LDP
        Label Manager
        LDP Configuration
        Logger
        Service Manager
      Execution Flow
        Initialization
        Session Lifetime
          Adjacency Establishment
          Session Establishment
      Label Exchange
        Implicit Null Label
        Other Reasons for Label Actions
        Cleanup
      LDP Filters
        Per-LDP peer export policies
      LDP FEC Statistics
      Multi-area and Multi-instance Extensions to LDP
      ECMP Support for LDP
        Label Operations
      Graceful Restart Helper
      Graceful Handling of Resource Exhaustion
      LDP Support for Unnumbered Interfaces
      LDP Fast Reroute (FRR)
        ECMP vs FRR
        IGP Shortcuts (RSVP-TE Tunnels)
        LDP FRR Configuration
      LDP-to-Segment Routing Stitching for IPv4 /32 Prefixes (IS-IS)
        Stitching in the LDP-to-SR Direction
        Stitching in the SR-to-LDP Direction
        TTL Propagation and ICMP Tunneling
      LDP FRR Remote LFA and TI-LFA Backup Using an SR Tunnel for IPv4 /32 Prefixes (IS-IS)
        Feature Behavior
      TCP MD5 Authentication
    LDP Point-to-Multipoint Support
      LDP Point-to-Multipoint Configuration
      LDP Point-to-Multipoint Protocol
      Make-Before-Break (MBB)
      ECMP Support
      Inter-AS Non-segmented mLDP
        LDP Recursive FEC Process
          Supported Recursive Opaque Values
          Redundancy and Resiliency
          ASBR Physical Connection
        OAM
        ECMP Support
          ECMP Hash Algorithm
      Intra-AS Non-segmented mLDP
        ABR MoFRR for Intra-AS
        Interaction with an Inter-AS Non-segmented mLDP Solution
    Multicast LDP Fast Upstream Switchover
      mLDP Fast Upstream Switchover Configuration
      mLDP Fast Upstream Switchover Behavior
    LDP IPv6
      Link LDP
      Targeted LDP
      FEC Resolution
      LDP Session Capabilities
      LDP Adjacency Capabilities
      IP Address and FEC Distribution
      IGP and Static Route Synchronization with LDP
      BFD Operation
      Services Using SDP with an LDP IPv6 FEC
      Mirror Services
        Configuration at mirror source node
        Configuration at mirror destination node
      OAM Support with LDP IPv6
      Interoperability
        Interoperability with Implementations Compliant with draft- ietf-mpls-ldp-ipv6
        Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
      Upgrading from IPv4 to IPv6
    LDP Process Overview
    Configuration Notes
    Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring Graceful Restart Helper Parameters
      Applying Import and Export Policies
      Configuring Interface Parameters
      Specifying Targeted Session Parameters
      Specifying Peer Parameters
      Configuring LDP Support for Multicast VPN (MVPN)
      Configuring LDP Support for LDP-to-SR Stitching
      Enabling LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
    LDP Command Reference
      Command Hierarchies
        LDP Commands
        Show Commands
          Show LDP Commands
          Show LDP Bindings Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          LDP Global Commands
          Interface Parameters Commands
          Session Parameters Commands
          Targeted Session Commands
        Show Commands
          Show Router LDP Commands
          Show Router LDP Bindings Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
7705 SAR OAM and Diagnostics Guide R23.4.R1
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR OAM Configuration Process
  OAM and SAA
    OAM Overview
      ICMP and ICMPv6 Diagnostics
        Ping
        Traceroute
      Two-Way Active Measurement Protocol
        7705 SAR Support for TWAMP Server
          Interactions with Ethernet Loopback
          Limitations
        Two-Way Active Measurement Protocol Light (TWAMP Light)
          7705 SAR Support for TWAMP Light Responder
          Interactions with Ethernet Loopback
          Limitations
          TWAMP Light Configuration Example
      LSP Diagnostics
        LSP Ping
        LSP Traceroute
        LSP Ping and LSP Traceroute for BGP Route Tunnels
          TC Handling on BGP Route Tunnels
          BGP Route Tunnel Traceroute
          Traceroute TTL for Self-generated Traffic
        Downstream Detailed Mapping (DDMAP) TLV
          Using The DDMAP TLV in LSP Stitching and LSP Hierarchy
      MPLS OAM Support in Segment Routing
        SR Extensions for LSP Ping and LSP Traceroute
        LSP Ping and LSP Traceroute on SR-ISIS or SR-OSPF Tunnels
        LSP Ping and LSP Traceroute on SR-TE LSPs
        LSP Ping and LSP Trace for BGP IPv4 LSPs
      SDP Diagnostics
        SDP Ping
        SDP MTU Path Discovery
      Service Diagnostics
        Service Ping
      VLL Diagnostics
        VCCV Ping
          VCCV Ping Application
          VCCV Ping in a Multi-Segment Pseudowire
          Automated VCCV Trace Capability for Multi-Segment Pseudowire
          VCCV for Static Pseudowire Segments
          VCCV for MS-PW and Pseudowire Redundancy
          Detailed VCCV Trace Operation
        VCCV Trace
      ITU-T Y.1564 Diagnostics
        ITU-T Y.1564 Functionality
        ITU-T Y.1564 Protocol Interaction
      VPLS MAC Diagnostics
        MAC Ping
        MAC Trace
        CPE Ping
        MAC Populate
        MAC Purge
      Ethernet OAM Capabilities
        Ethernet OAM Overview
          Ethernet OAM Usage Examples
        802.1ag and Y.1731 Functional Comparison
        ETH-CFM Ethernet OAM Tests (802.1ag and Y.1731)
          Hold MEP Up On Failure
          Loopback (ETH-LB)
          Linktrace (ETH-LT)
          Throughput Measurement
          Continuity Check (ETH-CC)
          Remote Defect Indication (ETH-RDI)
          Alarm Indication Signal (ETH-AIS)
          Test Error (ETH-Test)
        ITU-T Y.1731 Performance Monitoring (PM)
          Frame Delay and Delay Variation Measurements (ETH-DM and ETH-DV)
          Y.1731 Delay Measurement (DM)
          Frame Loss Measurement (ETH-LM)
        ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
          Bandwidth Notification Message (BNM)
        CFM OAM QoS
        EFM OAM (802.3ah)
          Unidirectional OAM Operation
          Remote Loopback
          802.3ah OAMPDU Tunneling and Termination for Epipe Services
          Dying Gasp
      Ethernet Loopbacks
        Line and Internal Ethernet Loopbacks
          MAC Swapping
          Interaction of Ethernet Port Loopback with Other Features
        CFM Loopbacks for OAM on Ethernet Ports
          CFM Loopback Mechanics
      OAM Propagation to Attachment Circuits
        ATM Ports
        T1/E1 TDM Ports
        Ethernet Ports
        Pseudowire Status Signaling OAM Propagation
      LDP Status Signaling
        LDP Status via Label Withdrawal
        LDP Status via TLV
      IP Multicast Debugging Tools
        Mtrace
          Finding the Last-Hop Router
          Directing the Response
        Mstat
        Mrinfo
      Microwave Awareness Performance Monitoring Statistics
        G.826 Statistics
        Radio Power Level Statistics
        Adaptive Coding and Modulation Statistics
    Service Assurance Agent Overview
      Traceroute Implementation
      SAA Jitter
      SAA Ethernet CFM Test Support
        Writing SAA Ethernet CFM Test Results to Accounting Files
    Configuring SAA Test Parameters
    Synthetic Loss Measurement (SLM)
      Configuration Example
    OAM timestamping
    OAM and SAA Command Reference
      Command Hierarchies
        Operational Commands
          Operational Commands
          Multicast Commands
        OAM Commands
          ATM Diagnostics
          TWAMP
          TWAMP Light
          Global Downstream Mapping Commands
          LSP Diagnostics
          LDP Diagnostics
          SDP Diagnostics
          Service Diagnostics
          VLL Diagnostics
          Y.1564 Diagnostics
          VPLS Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM Commands
        SAA Commands
          SAA Diagnostics
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        OAM and SAA Commands
          Operational Commands
          Multicast Commands
          ATM Diagnostics
          Service Diagnostics
          EFM Commands
          ETH-CFM Commands
          SAA Commands
          Y.1564 Diagnostics
          TWAMP Commands
          Global Downstream Mapping Commands
          LDP Diagnostics
          OAM SAA Commands
        Show Commands
        Clear Commands
        Debug Commands
  Mirroring
    Mirroring Overview
      Hardware Support
    Mirroring Implementation
      Mirror Sources and Destinations
        Local and Remote Mirroring
      Mirroring Refinements
        Slicing
        MAC Filters
      Mirroring Performance
      Mirroring Configuration
    Packet Capture
      Feature Details
        PCAP File Format
        Limitations
        Hardware Support
        QoS Requirements
    Configuration Notes
    Configuring Mirroring with CLI
      Mirror Configuration Overview
    Basic Mirroring Configuration
      Mirror Classification Rules
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirroring
      Configuring a Remote Mirror Service
      Pseudowire Redundancy for Mirror Services Configuration Example
      MC-LAG Setup with ICB for Mirror Services Configuration Example
      Configuring a PCAP Mirroring Service
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
    Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Show Commands
        Debug Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Mirror Destination Configuration Commands
        Show Commands
        Debug Commands
  Tools
    Tools Command Reference
      Command Hierarchies
        Tools Dump Commands
        Tools Perform Commands
        Tools ADP Commands
      Command Descriptions
        Tools Generic Commands
        Tools Dump Commands
          Dump Commands
          Dump Test-OAM Commands
          Dump Router Commands
        Tools Perform Commands
          Perform Commands
          Perform Router Commands
        Tools ADP Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR OAM Configuration Process
  OAM and SAA
    OAM Overview
      ICMP and ICMPv6 Diagnostics
        Ping
        Traceroute
      Two-Way Active Measurement Protocol
        7705 SAR Support for TWAMP Server
          Interactions with Ethernet Loopback
          Limitations
        Two-Way Active Measurement Protocol Light (TWAMP Light)
          7705 SAR Support for TWAMP Light Responder
          Interactions with Ethernet Loopback
          Limitations
          TWAMP Light Configuration Example
      LSP Diagnostics
        LSP Ping
        LSP Traceroute
        LSP Ping and LSP Traceroute for BGP Route Tunnels
          TC Handling on BGP Route Tunnels
          BGP Route Tunnel Traceroute
          Traceroute TTL for Self-generated Traffic
        Downstream Detailed Mapping (DDMAP) TLV
          Using The DDMAP TLV in LSP Stitching and LSP Hierarchy
      MPLS OAM Support in Segment Routing
        SR Extensions for LSP Ping and LSP Traceroute
        LSP Ping and LSP Traceroute on SR-ISIS or SR-OSPF Tunnels
        LSP Ping and LSP Traceroute on SR-TE LSPs
        LSP Ping and LSP Trace for BGP IPv4 LSPs
      SDP Diagnostics
        SDP Ping
        SDP MTU Path Discovery
      Service Diagnostics
        Service Ping
      VLL Diagnostics
        VCCV Ping
          VCCV Ping Application
          VCCV Ping in a Multi-Segment Pseudowire
          Automated VCCV Trace Capability for Multi-Segment Pseudowire
          VCCV for Static Pseudowire Segments
          VCCV for MS-PW and Pseudowire Redundancy
          Detailed VCCV Trace Operation
        VCCV Trace
      ITU-T Y.1564 Diagnostics
        ITU-T Y.1564 Functionality
        ITU-T Y.1564 Protocol Interaction
      VPLS MAC Diagnostics
        MAC Ping
        MAC Trace
        CPE Ping
        MAC Populate
        MAC Purge
      Ethernet OAM Capabilities
        Ethernet OAM Overview
          Ethernet OAM Usage Examples
        802.1ag and Y.1731 Functional Comparison
        ETH-CFM Ethernet OAM Tests (802.1ag and Y.1731)
          Hold MEP Up On Failure
          Loopback (ETH-LB)
          Linktrace (ETH-LT)
          Throughput Measurement
          Continuity Check (ETH-CC)
          Remote Defect Indication (ETH-RDI)
          Alarm Indication Signal (ETH-AIS)
          Test Error (ETH-Test)
        ITU-T Y.1731 Performance Monitoring (PM)
          Frame Delay and Delay Variation Measurements (ETH-DM and ETH-DV)
          Y.1731 Delay Measurement (DM)
          Frame Loss Measurement (ETH-LM)
        ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
          Bandwidth Notification Message (BNM)
        CFM OAM QoS
        EFM OAM (802.3ah)
          Unidirectional OAM Operation
          Remote Loopback
          802.3ah OAMPDU Tunneling and Termination for Epipe Services
          Dying Gasp
      Ethernet Loopbacks
        Line and Internal Ethernet Loopbacks
          MAC Swapping
          Interaction of Ethernet Port Loopback with Other Features
        CFM Loopbacks for OAM on Ethernet Ports
          CFM Loopback Mechanics
      OAM Propagation to Attachment Circuits
        ATM Ports
        T1/E1 TDM Ports
        Ethernet Ports
        Pseudowire Status Signaling OAM Propagation
      LDP Status Signaling
        LDP Status via Label Withdrawal
        LDP Status via TLV
      IP Multicast Debugging Tools
        Mtrace
          Finding the Last-Hop Router
          Directing the Response
        Mstat
        Mrinfo
      Microwave Awareness Performance Monitoring Statistics
        G.826 Statistics
        Radio Power Level Statistics
        Adaptive Coding and Modulation Statistics
    Service Assurance Agent Overview
      Traceroute Implementation
      SAA Jitter
      SAA Ethernet CFM Test Support
        Writing SAA Ethernet CFM Test Results to Accounting Files
    Configuring SAA Test Parameters
    Synthetic Loss Measurement (SLM)
      Configuration Example
    OAM timestamping
    OAM and SAA Command Reference
      Command Hierarchies
        Operational Commands
          Operational Commands
          Multicast Commands
        OAM Commands
          ATM Diagnostics
          TWAMP
          TWAMP Light
          Global Downstream Mapping Commands
          LSP Diagnostics
          LDP Diagnostics
          SDP Diagnostics
          Service Diagnostics
          VLL Diagnostics
          Y.1564 Diagnostics
          VPLS Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM Commands
        SAA Commands
          SAA Diagnostics
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        OAM and SAA Commands
          Operational Commands
          Multicast Commands
          ATM Diagnostics
          Service Diagnostics
          EFM Commands
          ETH-CFM Commands
          SAA Commands
          Y.1564 Diagnostics
          TWAMP Commands
          Global Downstream Mapping Commands
          LDP Diagnostics
          OAM SAA Commands
        Show Commands
        Clear Commands
        Debug Commands
  Mirroring
    Mirroring Overview
      Hardware Support
    Mirroring Implementation
      Mirror Sources and Destinations
        Local and Remote Mirroring
      Mirroring Refinements
        Slicing
        MAC Filters
      Mirroring Performance
      Mirroring Configuration
    Packet Capture
      Feature Details
        PCAP File Format
        Limitations
        Hardware Support
        QoS Requirements
    Configuration Notes
    Configuring Mirroring with CLI
      Mirror Configuration Overview
    Basic Mirroring Configuration
      Mirror Classification Rules
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirroring
      Configuring a Remote Mirror Service
      Pseudowire Redundancy for Mirror Services Configuration Example
      MC-LAG Setup with ICB for Mirror Services Configuration Example
      Configuring a PCAP Mirroring Service
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
    Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Show Commands
        Debug Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Mirror Destination Configuration Commands
        Show Commands
        Debug Commands
  Tools
    Tools Command Reference
      Command Hierarchies
        Tools Dump Commands
        Tools Perform Commands
        Tools ADP Commands
      Command Descriptions
        Tools Generic Commands
        Tools Dump Commands
          Dump Commands
          Dump Test-OAM Commands
          Dump Router Commands
        Tools Perform Commands
          Perform Commands
          Perform Router Commands
        Tools ADP Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
7705 SAR Quality of Service Guide R23.4.R1
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR QoS Configuration Process
  QoS and QoS Policies
    QoS Overview
      Overview
      Egress and Ingress Traffic Direction
        Ring Traffic
      Forwarding Classes
      Scheduling Modes
      Intelligent Discards
      Buffering
        Buffer Pools
        CBS and MBS Configuration
          Buffer Allocation for Multicast Traffic
        Buffer Unit Allocation and Buffer Chaining
          Advantages of Buffer Chaining
      Per-SAP Aggregate Shapers (H-QoS) On Gen-2 Hardware
        Shaped and Unshaped SAPs
          Per-SAP Aggregate Shaper Support
        H-QoS Example
      Per-VLAN Network Egress Shapers
        Shaped and Unshaped VLANs
        Per-VLAN Shaper Support
         VLAN Shaper Applications
          VLAN Shapers for Dual Uplinks
          VLAN Shapers for Aggregation Site
      Per-Customer Aggregate Shapers (Multiservice Site) on Gen-2 Hardware
        MSS Support
        MSS and LAG Interaction on the 7705 SAR-8 Shelf V2 and 7705 SAR-18
      QoS for Hybrid Ports on Gen-2 Hardware
      QoS for Gen-3 Adapter Cards and Platforms
        6-port SAR-M Ethernet Module
        4-Priority Scheduling Behavior on Gen-3 Hardware
        Gen-3 Hardware and LAG
      QoS on a Ring Adapter Card or Module
        Network and Network Queue QoS Policy Types
        Network QoS and Network Queue Policies on a Ring Adapter Card or Module
        Considerations for Using Ring Adapter Card or Module QoS Policies
      QoS for IPSec Traffic
      QoS for Network Group Encryption Traffic
    Access Ingress
      Access Ingress Traffic Classification
        Traffic Classification Types
          Hierarchy of Classification Rules
          Discard Probability of Classified Traffic
      Access Ingress Queues
      Access Ingress Queuing and Scheduling
        Profiled (Rate-based) Scheduling
        Queue-Type Scheduling
        4-Priority Scheduling
        4-Priority (Gen-3) Scheduling
        16-Priority Scheduling
        Ingress Queuing and Scheduling for BMU Traffic
      Access Ingress Per-SAP Aggregate Shapers (Access Ingress H-QoS)
        Access Ingress Per-SAP Shapers Arbitration
      Ingress Shaping to Fabric (Access and Network)
        BMU Support
          Aggregate Mode BMU Support
          Destination Mode BMU Support
        LAG SAP Support (Access Only)
      Configurable Ingress Shaping to Fabric (Access and Network)
      Fabric Shaping on the Fixed Platforms (Access and Network)
    Fabric Traffic
      Traffic Flow Across the Fabric
    Network Egress
      BMU Traffic at Network Egress
      Network Egress Queuing Aggregation
        Network Egress Per-VLAN Queuing
      Network Egress Scheduling
        Network Egress 4-Priority Scheduling
        Network Egress 4-Priority (Gen-3) Scheduling
        Network Egress 16-Priority Scheduling
      Network Egress Shaping
      Network Egress Shaping for Hybrid Ports
      Network Egress Per-VLAN Shapers
        Network Egress Per-VLAN Shapers Arbitration
      Network Egress Marking and Re-Marking
        Network Egress Marking and Re-Marking on Ethernet ports
    Network Ingress
      Network Ingress Classification
        Network Ingress Tunnel QoS Override
      Network Ingress Queuing
        Network Ingress Queuing for BMU Traffic
      Network Ingress Scheduling
        Network Ingress 4-Priority Scheduling
        Network Ingress 4-Priority (Gen-3) Scheduling
        Network Ingress 16-Priority Scheduling
      Network Ingress Shaping to Fabric
      Configurable Network Ingress Shaping to Fabric
      Network Fabric Shaping on the Fixed Platforms
    Access Egress
      Access Egress Queuing and Scheduling
        BMU Traffic Access Egress Queuing and Scheduling
        ATM Access Egress Queuing and Scheduling
        Ethernet Access Egress Queuing and Scheduling
      Access Egress Per-SAP Aggregate Shapers (Access Egress H-QoS)
        Access Egress Per-SAP Shapers Arbitration
      Access Egress Shaping for Hybrid Ports
      Access Egress for 4-Priority (Gen-3) Scheduling
      Access Egress Marking/Re-Marking
      Packet Byte Offset (PBO)
    QoS Policies Overview
      Overview
      Service Ingress QoS Policies
      Service Egress QoS Policies
      MC-MLPPP SAP Egress QoS Policies
      Network and Network Queue QoS Policies
        Network QoS Policies
          CoS Marking for Self-generated Traffic
          SGT Redirection
        Network Queue QoS Policies
      Network and Service QoS Queue Parameters
        Queue ID
        Committed Information Rate
        Peak Information Rate
        Adaptation Rule
        Committed Burst Size
        Maximum Burst Size
        High-Priority-Only Buffers
        High and Low Enqueuing Thresholds
        Queue Counters
        Queue Type
        Queue Mode
        Rate Limiting
      Slope Policies (WRED and RED)
        WRED MinThreshold and MaxThreshold Computation
        WRED on Bridging Domain (Ring) Queues
        Payload-based WRED
      ATM Traffic Descriptor Profiles
      Fabric Profiles
      Shaper Policies
      QoS Policy Entities
    Configuration Notes
  Network QoS Policies
    Overview
    Basic Configuration
      Configuring a Network QoS Policy
      Creating a Network QoS Policy
      Applying Network QoS Policies
      Default Network QoS Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Copying and Overwriting Network Policies
      Editing QoS Policies
    Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          QoS Policy Network Commands
          Self-generated Traffic Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Network QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Ring QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-generated Traffic Commands
        Operational Commands
        Show Commands
  Network Queue QoS Policies
    Overview
    Basic Configuration
      Configuring a Network Queue QoS Policy
      Creating a Network Queue QoS Policy
      Applying Network Queue QoS Policies
        Adapter Cards
        Network Ports
      Configuring Per-VLAN Network Egress Shapers
      Configuring a CIR for Network Egress Unshaped VLANs
      Default Network Queue QoS Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Network Queue QoS Policy Commands
          Network Queue QoS Policy Forwarding Class Commands
        Operational Commands
        Show Commands
  Service Egress and Ingress QoS Policies
    Overview
    Basic Configuration
      Creating Service Egress and Ingress QoS Policies
        Creating a Service Egress QoS Policy
          Creating a Service Egress QoS Forwarding Class
          Creating a Service Egress QoS Queue
        Creating a Service Ingress QoS Policy
          Creating a Service Ingress Forwarding Class
          Creating a Service Ingress QoS Queue
        Creating an MC-MLPPP SAP Egress QoS Policy
          Creating an MC-MLPPP SAP Egress QoS Forwarding Class
          Creating an MC-MLPPP SAP Egress QoS Queue
      Applying Service Egress and Ingress Policies
        VLL and VPLS Services
        IES and VPRN Services
      Default Service Egress and Ingress Policy Values
        Service Egress Policy Defaults
        Service Ingress Policy Defaults
    Service Management Tasks
      Deleting QoS Policies
        Removing a QoS Policy from a Service SAP
        Removing a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Service Egress and Ingress QoS Policy Command Reference
      Command Hierarchies
        Service Egress QoS Policy Configuration Commands
        Service Ingress QoS Policy Configuration Commands
        MC-MLPPP SAP Egress QoS Policies
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Service Egress QoS Policy Commands
          Service Egress QoS Policy Forwarding Class Commands
          MC-MLPPP SAP Egress QoS Policy Commands
          MC-MLPPP Forwarding Class Commands
          MC-MLPPP Queue Commands
          Service Ingress QoS Policy Commands
          Service Ingress QoS Policy Forwarding Class Commands
          Service Queue QoS Policy Commands
        Operational Commands
        Show Commands
  Slope QoS Policies
    Overview
    Basic Configuration
      Creating a Slope QoS Policy
      Applying Slope Policies
      Default Slope Policy Values
    Service Management Tasks
      Deleting QoS Policies
        Removing a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Slope Policy QoS Commands
          WRED/RED Slope Commands
        Operational Commands
        Show Commands
  ATM QoS Traffic Descriptor Profiles
    ATM Traffic Descriptor Profiles
      ATM Traffic Management
        ATM Service Categories
        ATM Traffic Descriptors and QoS Parameters
        ATM Policing
        Shaping
        ATM Queuing and Scheduling
        Congestion Avoidance
    Basic Configuration
      Creating an ATM Traffic Descriptor Profile QoS Policy
      Applying ATM Traffic Descriptor Profile Policies
        ATM VLL (Apipe) SAPs
      Default ATM Traffic Descriptor Profile Policy Values
    Service Management Tasks
      Removing an ATM Traffic Descriptor Profile from the QoS Configuration
      Copying and Overwriting an ATM Traffic Descriptor Profile
      Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          ATM QoS Policy Commands
        Operational Commands
        Show Commands
  QoS Fabric Profiles
    Basic Configuration
      Creating a QoS Fabric Profile
      Applying a QoS Fabric Profile
      Default Fabric Profile Values
    Service Management Tasks
      Removing a Fabric Profile from the QoS Configuration
      Copying and Overwriting a Fabric Profile
      Editing QoS Policies
    QoS Fabric Profile Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          QoS Fabric Profile Commands
          Fixed Platform Fabric Shaping Commands
        Operational Commands
        Show Commands
  QoS Shapers and Shaper QoS Policies
    Overview of QoS Shapers and Shaper QoS Policies
    Basic Configuration
      Creating a Shaper QoS Policy and Shaper Groups
      Applying a Shaper QoS Policy and Shaper Groups
        Applying a Shaper Policy
        Applying a Shaper Group
        Viewing Shaper Policy Information
      Default Shaper QoS Policy Values
      Configuring per-SAP Aggregate Shapers and an Unshaped SAP Aggregate Shaper (H-QoS)
        Creating 16-Priority Shaped SAPs and Configuring per-SAP Aggregate Shapers
        Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Ingress)
        Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Egress)
      Configuring per-VLAN Shapers and an Unshaped VLAN Shaper
        Configuring Per-VLAN Network Egress Shapers
        Configuring a CIR for Network Egress Unshaped VLANs
    Service Management Tasks
      Removing and Deleting QoS Policies
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Shaper QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Shaper QoS Policy Commands
        Operational Commands
        Show Commands
  Security QoS and Security QoS Policies
    Security QoS and Security QoS Policy Overview
    QoS for Firewall-Extracted Packets to the CSM
    Multi-Chassis Firewall QoS
    Security Queue QoS Policies
      Packet Queuing with DSCP
    Basic Configuration
      Creating a Security Data Queue QoS Policy
      Default Security Queue Policy Parameter Values
    Service Management Tasks
      Deleting QoS Policies
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Security Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Security Queue QoS Policy Commands
        Operational Commands
        Show Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR QoS Configuration Process
  QoS and QoS Policies
    QoS Overview
      Overview
      Egress and Ingress Traffic Direction
        Ring Traffic
      Forwarding Classes
      Scheduling Modes
      Intelligent Discards
      Buffering
        Buffer Pools
        CBS and MBS Configuration
          Buffer Allocation for Multicast Traffic
        Buffer Unit Allocation and Buffer Chaining
          Advantages of Buffer Chaining
      Per-SAP Aggregate Shapers (H-QoS) On Gen-2 Hardware
        Shaped and Unshaped SAPs
          Per-SAP Aggregate Shaper Support
        H-QoS Example
      Per-VLAN Network Egress Shapers
        Shaped and Unshaped VLANs
        Per-VLAN Shaper Support
         VLAN Shaper Applications
          VLAN Shapers for Dual Uplinks
          VLAN Shapers for Aggregation Site
      Per-Customer Aggregate Shapers (Multiservice Site) on Gen-2 Hardware
        MSS Support
        MSS and LAG Interaction on the 7705 SAR-8 Shelf V2 and 7705 SAR-18
      QoS for Hybrid Ports on Gen-2 Hardware
      QoS for Gen-3 Adapter Cards and Platforms
        6-port SAR-M Ethernet Module
        4-Priority Scheduling Behavior on Gen-3 Hardware
        Gen-3 Hardware and LAG
      QoS on a Ring Adapter Card or Module
        Network and Network Queue QoS Policy Types
        Network QoS and Network Queue Policies on a Ring Adapter Card or Module
        Considerations for Using Ring Adapter Card or Module QoS Policies
      QoS for IPSec Traffic
      QoS for Network Group Encryption Traffic
    Access Ingress
      Access Ingress Traffic Classification
        Traffic Classification Types
          Hierarchy of Classification Rules
          Discard Probability of Classified Traffic
      Access Ingress Queues
      Access Ingress Queuing and Scheduling
        Profiled (Rate-based) Scheduling
        Queue-Type Scheduling
        4-Priority Scheduling
        4-Priority (Gen-3) Scheduling
        16-Priority Scheduling
        Ingress Queuing and Scheduling for BMU Traffic
      Access Ingress Per-SAP Aggregate Shapers (Access Ingress H-QoS)
        Access Ingress Per-SAP Shapers Arbitration
      Ingress Shaping to Fabric (Access and Network)
        BMU Support
          Aggregate Mode BMU Support
          Destination Mode BMU Support
        LAG SAP Support (Access Only)
      Configurable Ingress Shaping to Fabric (Access and Network)
      Fabric Shaping on the Fixed Platforms (Access and Network)
    Fabric Traffic
      Traffic Flow Across the Fabric
    Network Egress
      BMU Traffic at Network Egress
      Network Egress Queuing Aggregation
        Network Egress Per-VLAN Queuing
      Network Egress Scheduling
        Network Egress 4-Priority Scheduling
        Network Egress 4-Priority (Gen-3) Scheduling
        Network Egress 16-Priority Scheduling
      Network Egress Shaping
      Network Egress Shaping for Hybrid Ports
      Network Egress Per-VLAN Shapers
        Network Egress Per-VLAN Shapers Arbitration
      Network Egress Marking and Re-Marking
        Network Egress Marking and Re-Marking on Ethernet ports
    Network Ingress
      Network Ingress Classification
        Network Ingress Tunnel QoS Override
      Network Ingress Queuing
        Network Ingress Queuing for BMU Traffic
      Network Ingress Scheduling
        Network Ingress 4-Priority Scheduling
        Network Ingress 4-Priority (Gen-3) Scheduling
        Network Ingress 16-Priority Scheduling
      Network Ingress Shaping to Fabric
      Configurable Network Ingress Shaping to Fabric
      Network Fabric Shaping on the Fixed Platforms
    Access Egress
      Access Egress Queuing and Scheduling
        BMU Traffic Access Egress Queuing and Scheduling
        ATM Access Egress Queuing and Scheduling
        Ethernet Access Egress Queuing and Scheduling
      Access Egress Per-SAP Aggregate Shapers (Access Egress H-QoS)
        Access Egress Per-SAP Shapers Arbitration
      Access Egress Shaping for Hybrid Ports
      Access Egress for 4-Priority (Gen-3) Scheduling
      Access Egress Marking/Re-Marking
      Packet Byte Offset (PBO)
    QoS Policies Overview
      Overview
      Service Ingress QoS Policies
      Service Egress QoS Policies
      MC-MLPPP SAP Egress QoS Policies
      Network and Network Queue QoS Policies
        Network QoS Policies
          CoS Marking for Self-generated Traffic
          SGT Redirection
        Network Queue QoS Policies
      Network and Service QoS Queue Parameters
        Queue ID
        Committed Information Rate
        Peak Information Rate
        Adaptation Rule
        Committed Burst Size
        Maximum Burst Size
        High-Priority-Only Buffers
        High and Low Enqueuing Thresholds
        Queue Counters
        Queue Type
        Queue Mode
        Rate Limiting
      Slope Policies (WRED and RED)
        WRED MinThreshold and MaxThreshold Computation
        WRED on Bridging Domain (Ring) Queues
        Payload-based WRED
      ATM Traffic Descriptor Profiles
      Fabric Profiles
      Shaper Policies
      QoS Policy Entities
    Configuration Notes
  Network QoS Policies
    Overview
    Basic Configuration
      Configuring a Network QoS Policy
      Creating a Network QoS Policy
      Applying Network QoS Policies
      Default Network QoS Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Copying and Overwriting Network Policies
      Editing QoS Policies
    Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          QoS Policy Network Commands
          Self-generated Traffic Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Network QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Ring QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-generated Traffic Commands
        Operational Commands
        Show Commands
  Network Queue QoS Policies
    Overview
    Basic Configuration
      Configuring a Network Queue QoS Policy
      Creating a Network Queue QoS Policy
      Applying Network Queue QoS Policies
        Adapter Cards
        Network Ports
      Configuring Per-VLAN Network Egress Shapers
      Configuring a CIR for Network Egress Unshaped VLANs
      Default Network Queue QoS Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Network Queue QoS Policy Commands
          Network Queue QoS Policy Forwarding Class Commands
        Operational Commands
        Show Commands
  Service Egress and Ingress QoS Policies
    Overview
    Basic Configuration
      Creating Service Egress and Ingress QoS Policies
        Creating a Service Egress QoS Policy
          Creating a Service Egress QoS Forwarding Class
          Creating a Service Egress QoS Queue
        Creating a Service Ingress QoS Policy
          Creating a Service Ingress Forwarding Class
          Creating a Service Ingress QoS Queue
        Creating an MC-MLPPP SAP Egress QoS Policy
          Creating an MC-MLPPP SAP Egress QoS Forwarding Class
          Creating an MC-MLPPP SAP Egress QoS Queue
      Applying Service Egress and Ingress Policies
        VLL and VPLS Services
        IES and VPRN Services
      Default Service Egress and Ingress Policy Values
        Service Egress Policy Defaults
        Service Ingress Policy Defaults
    Service Management Tasks
      Deleting QoS Policies
        Removing a QoS Policy from a Service SAP
        Removing a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Service Egress and Ingress QoS Policy Command Reference
      Command Hierarchies
        Service Egress QoS Policy Configuration Commands
        Service Ingress QoS Policy Configuration Commands
        MC-MLPPP SAP Egress QoS Policies
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Service Egress QoS Policy Commands
          Service Egress QoS Policy Forwarding Class Commands
          MC-MLPPP SAP Egress QoS Policy Commands
          MC-MLPPP Forwarding Class Commands
          MC-MLPPP Queue Commands
          Service Ingress QoS Policy Commands
          Service Ingress QoS Policy Forwarding Class Commands
          Service Queue QoS Policy Commands
        Operational Commands
        Show Commands
  Slope QoS Policies
    Overview
    Basic Configuration
      Creating a Slope QoS Policy
      Applying Slope Policies
      Default Slope Policy Values
    Service Management Tasks
      Deleting QoS Policies
        Removing a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Slope Policy QoS Commands
          WRED/RED Slope Commands
        Operational Commands
        Show Commands
  ATM QoS Traffic Descriptor Profiles
    ATM Traffic Descriptor Profiles
      ATM Traffic Management
        ATM Service Categories
        ATM Traffic Descriptors and QoS Parameters
        ATM Policing
        Shaping
        ATM Queuing and Scheduling
        Congestion Avoidance
    Basic Configuration
      Creating an ATM Traffic Descriptor Profile QoS Policy
      Applying ATM Traffic Descriptor Profile Policies
        ATM VLL (Apipe) SAPs
      Default ATM Traffic Descriptor Profile Policy Values
    Service Management Tasks
      Removing an ATM Traffic Descriptor Profile from the QoS Configuration
      Copying and Overwriting an ATM Traffic Descriptor Profile
      Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          ATM QoS Policy Commands
        Operational Commands
        Show Commands
  QoS Fabric Profiles
    Basic Configuration
      Creating a QoS Fabric Profile
      Applying a QoS Fabric Profile
      Default Fabric Profile Values
    Service Management Tasks
      Removing a Fabric Profile from the QoS Configuration
      Copying and Overwriting a Fabric Profile
      Editing QoS Policies
    QoS Fabric Profile Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          QoS Fabric Profile Commands
          Fixed Platform Fabric Shaping Commands
        Operational Commands
        Show Commands
  QoS Shapers and Shaper QoS Policies
    Overview of QoS Shapers and Shaper QoS Policies
    Basic Configuration
      Creating a Shaper QoS Policy and Shaper Groups
      Applying a Shaper QoS Policy and Shaper Groups
        Applying a Shaper Policy
        Applying a Shaper Group
        Viewing Shaper Policy Information
      Default Shaper QoS Policy Values
      Configuring per-SAP Aggregate Shapers and an Unshaped SAP Aggregate Shaper (H-QoS)
        Creating 16-Priority Shaped SAPs and Configuring per-SAP Aggregate Shapers
        Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Ingress)
        Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Egress)
      Configuring per-VLAN Shapers and an Unshaped VLAN Shaper
        Configuring Per-VLAN Network Egress Shapers
        Configuring a CIR for Network Egress Unshaped VLANs
    Service Management Tasks
      Removing and Deleting QoS Policies
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Shaper QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Shaper QoS Policy Commands
        Operational Commands
        Show Commands
  Security QoS and Security QoS Policies
    Security QoS and Security QoS Policy Overview
    QoS for Firewall-Extracted Packets to the CSM
    Multi-Chassis Firewall QoS
    Security Queue QoS Policies
      Packet Queuing with DSCP
    Basic Configuration
      Creating a Security Data Queue QoS Policy
      Default Security Queue Policy Parameter Values
    Service Management Tasks
      Deleting QoS Policies
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Security Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Security Queue QoS Policy Commands
        Operational Commands
        Show Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
7705 SAR Router Configuration Guide R23.4.R1
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. Technical Support
  2. 7705 SAR Router Configuration Process
  3. IP Router Configuration
    3.1. Configuring IP Router Parameters
      3.1.1. Interfaces
        3.1.1.1. Network Interface
          3.1.1.1.1. Ethernet Ports and Multiple ARP Entries
          3.1.1.1.2. Dynamic ARP and Static MAC entry
          3.1.1.1.3. Configurable ARP Retry Timer
          3.1.1.1.4. Proxy ARP
          3.1.1.1.5. ETH-CFM Support
          3.1.1.1.6. Hold Up and Hold Down Timers for IP Interfaces
        3.1.1.2. System Interface
        3.1.1.3. Unnumbered Interfaces
        3.1.1.4. Creating an IP Address Range
      3.1.2. IP Addresses
      3.1.3. Internet Protocol Versions
        3.1.3.1. IPv6 Address Format
        3.1.3.2. IPv6 Headers
        3.1.3.3. Neighbor Discovery
      3.1.4. Router ID
      3.1.5. Autonomous Systems
      3.1.6. DHCP and DHCPv6
        3.1.6.1. DHCP Relay and DHCPv6 Relay
          3.1.6.1.1. DHCP Relay Agent Options
        3.1.6.2. Local DHCP and DHCPv6 Server
          3.1.6.2.1. DHCP and DHCPv6 Server Options
      3.1.7. ICMP and ICMPv6
      3.1.8. Static Routes, Dynamic Routes, and ECMP
        3.1.8.1. Static Route Resolution Using Tunnels
        3.1.8.2. Enabling ECMP
      3.1.9. IGP-LDP and Static Route-LDP Synchronization
      3.1.10. Bidirectional Forwarding Detection (BFD)
      3.1.11. Seamless BFD
        3.1.11.1. S-BFD Reflector Configuration and Behavior
        3.1.11.2. S-BFD Initiator Global Configuration
        3.1.11.3. S-BFD Session Configuration
      3.1.12. IP Fast Reroute (FRR)
        3.1.12.1. ECMP vs FRR
        3.1.12.2. IGP Shortcuts (RSVP-TE Tunnels)
        3.1.12.3. IP FRR Configuration
    3.2. Configuring Security Parameters
      3.2.1. Hardware Support
      3.2.2. Security Zone Configuration
      3.2.3. Security Session Creation
        3.2.3.1. Directionally Aware Security Behavior
        3.2.3.2. TCP MSS Configuration and Adjustment
      3.2.4. Application Groups
      3.2.5. Host Groups
      3.2.6. Security Policy Policing
      3.2.7. Security Profiles
        3.2.7.1. Profile Timers
        3.2.7.2. Application Assurance Parameters
          3.2.7.2.1. DNS
          3.2.7.2.2. ICMP
          3.2.7.2.3. IP Options
          3.2.7.2.4. Strict TCP
        3.2.7.3. Application Level Gateway
        3.2.7.4. Fragmentation Handling
      3.2.8. Security Policies
      3.2.9. Bypass Policies for a Firewall in a Layer 2 Service
      3.2.10. Security Session Resource Alarms
      3.2.11. Security Logging
      3.2.12. Firewall Debugging
      3.2.13. NAT Security
        3.2.13.1. NAT Zones
        3.2.13.2. Dynamic Source NAT
        3.2.13.3. Local Traffic and NAT
        3.2.13.4. Port Forwarding (Static Destination NAT)
        3.2.13.5. Static One-to-One NAT
          3.2.13.5.1. Static One-to-One NAT and ICMP
          3.2.13.5.2. Static One-to-One NAT and FTP
          3.2.13.5.3. Static One-to-One NAT and Firewall Security
          3.2.13.5.4. Static One-to-one NAT and NPAT
          3.2.13.5.5. Static One-to-One NAT Route Leaking to IGP or BGP
          3.2.13.5.6. PBR and MFC
          3.2.13.5.7. Cflowd and Mirroring
          3.2.13.5.8. Private IP Address Ping, Traceroute, and Packet Forwarding
          3.2.13.5.9. Fragmentation
      3.2.14. Multi-Chassis Firewall
        3.2.14.1. Multi-Chassis Firewall Configuration
        3.2.14.2. Multi-Chassis Firewall Master/Slave Selection and Policy and Session Database Synchronization
        3.2.14.3. Processing New Traffic Signatures and Connections on a Multi-Chassis Firewall
        3.2.14.4. Adding, Modifying, and Deleting a Firewall Security Policy in a Multi-Chassis Firewall
        3.2.14.5. Adding, Modifying, and Deleting a Zone in a Multi-Chassis Firewall
          3.2.14.5.1. Adding a Zone
          3.2.14.5.2. Modifying a Zone
          3.2.14.5.3. Deleting a Zone
        3.2.14.6. Multi-Chassis Firewall Security Logging
        3.2.14.7. MCL Failure
        3.2.14.8. Multi-Chassis NAT
        3.2.14.9. MCL Encryption
    3.3. Using the 7705 SAR as Residential or Business CPE
    3.4. Router Configuration Process Overview
    3.5. Configuration Notes
    3.6. Configuring an IP Router with CLI
    3.7. Router Configuration Overview
      3.7.1. System Interface
      3.7.2. Network Interface
    3.8. Basic Configuration
    3.9. Common Configuration Tasks
      3.9.1. Configuring a System Name
      3.9.2. Configuring Router IPv6 Neighbor Discovery Parameters
      3.9.3. Configuring Interfaces
        3.9.3.1. Configuring a System Interface
        3.9.3.2. Configuring a Network Interface
          3.9.3.2.1. Creating an IPv6 Network Interface
        3.9.3.3. Configuring an Unnumbered Interface
      3.9.4. Configuring IPv6 Parameters
      3.9.5. Configuring Router Advertisement
      3.9.6. Configuring ECMP
      3.9.7. Configuring Static Routes
      3.9.8. Configuring or Deriving a Router ID
      3.9.9. Configuring an Autonomous System
      3.9.10. Configuring ICMP and ICMPv6
      3.9.11. Configuring a DHCP Relay Agent
      3.9.12. Configuring Proxy ARP
      3.9.13. Configuring a Security Zone
      3.9.14. Configuring Security Logging
        3.9.14.1. Rule-Based Security Logging
        3.9.14.2. Zone-Based Security Logging
      3.9.15. Applying an Application Group and a Host Group to a Security Policy
      3.9.16. Configuring an IP Reassembly Profile
    3.10. Service Management Tasks
      3.10.1. Changing the System Name
      3.10.2. Modifying Interface Parameters
      3.10.3. Deleting a Logical IP Interface
    3.11. IP Router Command Reference
      3.11.1. Command Hierarchies
        3.11.1.1. Configuration Commands
          3.11.1.1.1. Router Commands
          3.11.1.1.2. Local DHCP and DHCPv6 Server Commands
          3.11.1.1.3. Router BFD Commands
          3.11.1.1.4. Seamless BFD Reflector Commands
          3.11.1.1.5. Router Interface Commands
          3.11.1.1.6. Router Interface IPv6 Commands
          3.11.1.1.7. Router Advertisement Commands
          3.11.1.1.8. Router Security Zone Configuration Commands
          3.11.1.1.9. Static One-to-One NAT Configuration Commands
          3.11.1.1.10. TWAMP Light Commands
        3.11.1.2. Show Commands
        3.11.1.3. Clear Commands
        3.11.1.4. Debug Commands
      3.11.2. Command Descriptions
        3.11.2.1. Configuration Commands
          3.11.2.1.1. Generic Commands
          3.11.2.1.2. Router Global Commands
          3.11.2.1.3. Local DHCP and DHCPv6 Server Commands
          3.11.2.1.4. Router BFD Commands
          3.11.2.1.5. Seamless BFD Reflector Commands
          3.11.2.1.6. Router Interface Commands
          3.11.2.1.7. Router Interface IPv6 Commands
          3.11.2.1.8. Router Interface DHCP Relay Agent Commands
          3.11.2.1.9. Router Interface Filter Commands
          3.11.2.1.10. Router Interface Encryption Commands
          3.11.2.1.11. Router Interface Hold-Time Commands
          3.11.2.1.12. Router Interface ICMP and ICMPv6 Commands
          3.11.2.1.13. Router Advertisement Commands
          3.11.2.1.14. Router Security Zone Configuration Commands
          3.11.2.1.15. Static One-to-One NAT Router Configuration Commands
          3.11.2.1.16. TWAMP Light Commands
        3.11.2.2. Show Commands
        3.11.2.3. Clear Commands
        3.11.2.4. Debug Commands
  4. VRRP
    4.1. VRRP Overview
    4.2. VRRP Components
      4.2.1. Virtual Router
      4.2.2. IP Address Owner
      4.2.3. Primary Address
      4.2.4. Virtual Router in Master State
      4.2.5. Virtual Router Backup
      4.2.6. Owner and Non-owner VRRP
      4.2.7. Configurable Parameters
        4.2.7.1. VRID
        4.2.7.2. Priority
        4.2.7.3. IP Addresses
        4.2.7.4. Message Interval and Master Inheritance
        4.2.7.5. Master Down Interval
        4.2.7.6. Skew Time
        4.2.7.7. Preempt Mode
        4.2.7.8. VRRP Message Authentication (IPv4 only)
          4.2.7.8.1. Authentication Failure
        4.2.7.9. Virtual MAC Address
        4.2.7.10. BFD-Enable
        4.2.7.11. Initial Delay Timer
        4.2.7.12. VRRP Advertisement Message IP Address List Verification
        4.2.7.13. IPv6 Virtual Router Instance Operationally Up
        4.2.7.14. Policies
    4.3. VRRP Priority Control Policies
      4.3.1. VRRP Policy Constraints
      4.3.2. VRRP Base Priority
      4.3.3. VRRP Priority Control Policy In-use Priority
      4.3.4. VRRP Priority Control Policy Priority Events
        4.3.4.1. Priority Event Hold-set Timers
        4.3.4.2. Port Down Priority Event
        4.3.4.3. LAG Port Down Priority Event
        4.3.4.4. Host Unreachable Priority Event
        4.3.4.5. Route Unknown Priority Event
    4.4. VRRP Non-owner Accessibility
      4.4.1. Non-owner Access Ping Reply
      4.4.2. Non-owner Access Telnet
      4.4.3. Non-owner Access SSH
    4.5. VRRP Configuration Process Overview
    4.6. Configuration Notes
    4.7. Configuring VRRP with CLI
    4.8. VRRP Configuration Overview
      4.8.1. Preconfiguration Requirements
    4.9. Basic VRRP Configurations
      4.9.1. VRRP Policy
      4.9.2. VRRP IES or VPRN Service Parameters
        4.9.2.1. Configuring IES or VPRN VRRP for IPv6
    4.10. Common Configuration Tasks
    4.11. Configuring IES or VPRN VRRP Parameters
      4.11.1. Configuring VRRP on Subnets
      4.11.2. Owner VRRP
      4.11.3. Non-owner VRRP
    4.12. VRRP Management Tasks
      4.12.1. Deleting a VRRP Policy
      4.12.2. Deleting VRRP on a Service
    4.13. VRRP Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VRRP Priority Control Event Policy Commands
        4.13.1.2. VRRP Show Commands
        4.13.1.3. VRRP Monitor Commands
        4.13.1.4. VRRP Clear Commands
        4.13.1.5. VRRP Debug Commands
      4.13.2. Command Descriptions
        4.13.2.1. Configuration Commands
          4.13.2.1.1. VRRP Priority Control Event Policy Commands
          4.13.2.1.2. VRRP Priority Event Commands
        4.13.2.2. VRRP Show Commands
        4.13.2.3. VRRP Monitor Commands
        4.13.2.4. VRRP Clear Commands
        4.13.2.5. VRRP Debug Commands
  5. Filter Policies
    5.1. Configuring Filter Policies
      5.1.1. Overview of Filter Policies
      5.1.2. Network and Service (Access) Interface-based Filtering
      5.1.3. Policy-Based Routing
      5.1.4. Multi-field Classification (MFC)
      5.1.5. VLAN-based Filtering
      5.1.6. Filter Policy Entries
        5.1.6.1. Applying Filter Policies
        5.1.6.2. Packet Matching Criteria
        5.1.6.3. Ordering Filter Entries
      5.1.7. Filter Log Files
    5.2. Configuration Notes
      5.2.1. IP Filters
      5.2.2. IPv6 Filters
      5.2.3. MAC Filters
      5.2.4. VLAN Filters
      5.2.5. Filter Logs
    5.3. Configuring Filter Policies with CLI
    5.4. Basic Configuration
    5.5. Common Configuration Tasks
      5.5.1. Creating an IPv4 or IPv6 Filter Policy
        5.5.1.1. IP Filter Policy
        5.5.1.2. IP Filter Entry
        5.5.1.3. IP Filter Entry Matching Criteria
        5.5.1.4. IP Filter Entry for PBR to a System IP or Loopback Address
      5.5.2. Creating a MAC Filter Policy
        5.5.2.1. MAC Filter Policy
        5.5.2.2. MAC Filter Entry
        5.5.2.3. MAC Entry Matching Criteria
      5.5.3. Creating a VLAN Filter Policy
        5.5.3.1. VLAN Filter Policy
        5.5.3.2. VLAN Filter Entry
        5.5.3.3. VLAN Entry Matching Criteria
      5.5.4. Creating a Bypass Policy for a Firewall in a Layer 2 Service
      5.5.5. Creating an IP Exception Filter Policy
        5.5.5.1. IP Exception Filter Policy
        5.5.5.2. IP Exception Entry Matching Criteria
      5.5.6. Configuring Filter Log Policies
      5.5.7. Configuring a NAT Security Profile
      5.5.8. Configuring a NAT Security Policy
      5.5.9. Applying IP and MAC Filter Policies to a Service
      5.5.10. Applying IP Filter Policies to Network Interfaces
      5.5.11. Applying VLAN Filter Policies to a Ring Port
      5.5.12. Creating a Match List for Filter Policies
    5.6. Filter Management Tasks
      5.6.1. Renumbering Filter Policy Entries
      5.6.2. Modifying an IP Filter Policy
      5.6.3. Modifying a MAC Filter Policy
      5.6.4. Modifying a VLAN Filter Policy
      5.6.5. Removing and Deleting a Filter Policy
        5.6.5.1. Removing a Filter from a Service
        5.6.5.2. Removing a Filter from a Network Interface
        5.6.5.3. Removing a Filter from a Ring Port
        5.6.5.4. Deleting a Filter
    5.7. Filter Command Reference
      5.7.1. Command Hierarchies
        5.7.1.1. Configuration Commands
          5.7.1.1.1. IP Filter Log Configuration Commands
          5.7.1.1.2. IP Filter Policy Configuration Commands
          5.7.1.1.3. IPv6 Filter Policy Configuration Commands
          5.7.1.1.4. MAC Filter Policy Commands
          5.7.1.1.5. VLAN Filter Policy Commands
          5.7.1.1.6. IP Exception Filter Policy Configuration Commands
          5.7.1.1.7. Security Policy Commands
          5.7.1.1.8. Filter Match List Commands
        5.7.1.2. Show Commands
        5.7.1.3. Clear Commands
        5.7.1.4. Monitor Commands
      5.7.2. Command Descriptions
        5.7.2.1. Configuration Commands
          5.7.2.1.1. Generic Commands
          5.7.2.1.2. Filter Log Commands
          5.7.2.1.3. Filter Policy Commands
          5.7.2.1.4. General Filter Entry Commands
          5.7.2.1.5. IP, MAC, VLAN, and IP Exception Filter Entry Commands
          5.7.2.1.6. IP, MAC, and IP Exception Filter Match Criteria Commands
          5.7.2.1.7. Security Policy Commands
          5.7.2.1.8. Match List Configuration Commands
        5.7.2.2. Show Commands
        5.7.2.3. Clear Commands
        5.7.2.4. Monitor Commands
  6. Cflowd
    6.1. Cflowd Overview
      6.1.1. Operation
      6.1.2. Sampling
      6.1.3. Collectors
      6.1.4. Templates
    6.2. Cflowd Configuration Process Overview
    6.3. Configuring Cflowd with CLI
    6.4. Basic Cflowd Configuration
    6.5. Common Configuration Tasks
      6.5.1. Enabling Cflowd
        6.5.1.1. Enabling Cflowd On a SAP
      6.5.2. Configuring Global Cflowd Parameters
      6.5.3. Configuring Cflowd Collector Parameters
      6.5.4. Specifying Cflowd Options on an IP Interface
        6.5.4.1. Interface Configurations
        6.5.4.2. Service Interfaces
    6.6. Cflowd Configuration Management Tasks
      6.6.1. Modifying Global Cflowd Parameters
      6.6.2. Modifying Cflowd Collector Parameters
    6.7. Cflowd Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Configuration Commands
        6.7.1.2. Show Commands
        6.7.1.3. Clear Commands
      6.7.2. Command Descriptions
        6.7.2.1. Generic Commands
        6.7.2.2. Configuration Commands
        6.7.2.3. Show Commands
        6.7.2.4. Clear Commands
  7. Route Policies
    7.1. Configuring Route Policies
      7.1.1. Routing Policy and MPLS
      7.1.2. Policy Statements
        7.1.2.1. Default Action Behavior
        7.1.2.2. Denied IP Prefixes
        7.1.2.3. Controlling Route Flapping
      7.1.3. Regular Expressions
        7.1.3.1. Terms
        7.1.3.2. Operators
      7.1.4. Community Expressions
      7.1.5. BGP and OSPF Route Policy Support
        7.1.5.1. BGP Route Policies
        7.1.5.2. Readvertised Route Policies
        7.1.5.3. Route Policies for BGP Next-Hop Resolution and Peer Tracking
          7.1.5.3.1. BGP Next-Hop Resolution Policy Overview
          7.1.5.3.2. BGP Peer Tracking Policy Overview
          7.1.5.3.3. Route Policy Support for BGP Next-Hop Resolution
          7.1.5.3.4. Route Policy Support for BGP Peer Tracking
      7.1.6. When to Use Route Policies
      7.1.7. Troubleshooting the FIB
    7.2. Route Policy Configuration Process Overview
    7.3. Configuration Notes
    7.4. Configuring Route Policies with CLI
    7.5. Route Policy Configuration Overview
      7.5.1. When to Create Routing Policies
      7.5.2. Default Route Policy Actions
      7.5.3. Policy Evaluation
        7.5.3.1. Damping
    7.6. Basic Route Policy Configuration
    7.7. Configuring Route Policy Components
      7.7.1. Beginning the Policy Statement
      7.7.2. Creating a Route Policy
      7.7.3. Configuring a Default Action
      7.7.4. Configuring an Entry
      7.7.5. Configuring an AS Path (policy-option)
      7.7.6. Configuring a Community List or Expression
      7.7.7. Configuring Damping
      7.7.8. Configuring a Prefix List
      7.7.9. Configuring PIM Join/Register Policies
      7.7.10. Configuring Bootstrap Message Import and Export Policies
      7.7.11. Configuring LDP-to-Segment Routing Stitching Policies
    7.8. Route Policy Configuration Management Tasks
      7.8.1. Editing Policy Statements and Parameters
      7.8.2. Deleting an Entry
      7.8.3. Deleting a Policy Statement
    7.9. Route Policy Command Reference
      7.9.1. Command Hierarchies
        7.9.1.1. Route Policy Configuration Commands
        7.9.1.2. Show Commands
      7.9.2. Command Descriptions
        7.9.2.1. Configuration Commands
          7.9.2.1.1. Generic Commands
          7.9.2.1.2. Route Policy Options
          7.9.2.1.3. Route Policy Damping Commands
          7.9.2.1.4. Route Policy Prefix Commands
          7.9.2.1.5. Route Policy Entry Match Commands
          7.9.2.1.6. Route Policy Action Commands
        7.9.2.2. Show Commands
  8. List of Acronyms
  9. Supported Standards and Protocols
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. Technical Support
  2. 7705 SAR Router Configuration Process
  3. IP Router Configuration
    3.1. Configuring IP Router Parameters
      3.1.1. Interfaces
        3.1.1.1. Network Interface
          3.1.1.1.1. Ethernet Ports and Multiple ARP Entries
          3.1.1.1.2. Dynamic ARP and Static MAC entry
          3.1.1.1.3. Configurable ARP Retry Timer
          3.1.1.1.4. Proxy ARP
          3.1.1.1.5. ETH-CFM Support
          3.1.1.1.6. Hold Up and Hold Down Timers for IP Interfaces
        3.1.1.2. System Interface
        3.1.1.3. Unnumbered Interfaces
        3.1.1.4. Creating an IP Address Range
      3.1.2. IP Addresses
      3.1.3. Internet Protocol Versions
        3.1.3.1. IPv6 Address Format
        3.1.3.2. IPv6 Headers
        3.1.3.3. Neighbor Discovery
      3.1.4. Router ID
      3.1.5. Autonomous Systems
      3.1.6. DHCP and DHCPv6
        3.1.6.1. DHCP Relay and DHCPv6 Relay
          3.1.6.1.1. DHCP Relay Agent Options
        3.1.6.2. Local DHCP and DHCPv6 Server
          3.1.6.2.1. DHCP and DHCPv6 Server Options
      3.1.7. ICMP and ICMPv6
      3.1.8. Static Routes, Dynamic Routes, and ECMP
        3.1.8.1. Static Route Resolution Using Tunnels
        3.1.8.2. Enabling ECMP
      3.1.9. IGP-LDP and Static Route-LDP Synchronization
      3.1.10. Bidirectional Forwarding Detection (BFD)
      3.1.11. Seamless BFD
        3.1.11.1. S-BFD Reflector Configuration and Behavior
        3.1.11.2. S-BFD Initiator Global Configuration
        3.1.11.3. S-BFD Session Configuration
      3.1.12. IP Fast Reroute (FRR)
        3.1.12.1. ECMP vs FRR
        3.1.12.2. IGP Shortcuts (RSVP-TE Tunnels)
        3.1.12.3. IP FRR Configuration
    3.2. Configuring Security Parameters
      3.2.1. Hardware Support
      3.2.2. Security Zone Configuration
      3.2.3. Security Session Creation
        3.2.3.1. Directionally Aware Security Behavior
        3.2.3.2. TCP MSS Configuration and Adjustment
      3.2.4. Application Groups
      3.2.5. Host Groups
      3.2.6. Security Policy Policing
      3.2.7. Security Profiles
        3.2.7.1. Profile Timers
        3.2.7.2. Application Assurance Parameters
          3.2.7.2.1. DNS
          3.2.7.2.2. ICMP
          3.2.7.2.3. IP Options
          3.2.7.2.4. Strict TCP
        3.2.7.3. Application Level Gateway
        3.2.7.4. Fragmentation Handling
      3.2.8. Security Policies
      3.2.9. Bypass Policies for a Firewall in a Layer 2 Service
      3.2.10. Security Session Resource Alarms
      3.2.11. Security Logging
      3.2.12. Firewall Debugging
      3.2.13. NAT Security
        3.2.13.1. NAT Zones
        3.2.13.2. Dynamic Source NAT
        3.2.13.3. Local Traffic and NAT
        3.2.13.4. Port Forwarding (Static Destination NAT)
        3.2.13.5. Static One-to-One NAT
          3.2.13.5.1. Static One-to-One NAT and ICMP
          3.2.13.5.2. Static One-to-One NAT and FTP
          3.2.13.5.3. Static One-to-One NAT and Firewall Security
          3.2.13.5.4. Static One-to-one NAT and NPAT
          3.2.13.5.5. Static One-to-One NAT Route Leaking to IGP or BGP
          3.2.13.5.6. PBR and MFC
          3.2.13.5.7. Cflowd and Mirroring
          3.2.13.5.8. Private IP Address Ping, Traceroute, and Packet Forwarding
          3.2.13.5.9. Fragmentation
      3.2.14. Multi-Chassis Firewall
        3.2.14.1. Multi-Chassis Firewall Configuration
        3.2.14.2. Multi-Chassis Firewall Master/Slave Selection and Policy and Session Database Synchronization
        3.2.14.3. Processing New Traffic Signatures and Connections on a Multi-Chassis Firewall
        3.2.14.4. Adding, Modifying, and Deleting a Firewall Security Policy in a Multi-Chassis Firewall
        3.2.14.5. Adding, Modifying, and Deleting a Zone in a Multi-Chassis Firewall
          3.2.14.5.1. Adding a Zone
          3.2.14.5.2. Modifying a Zone
          3.2.14.5.3. Deleting a Zone
        3.2.14.6. Multi-Chassis Firewall Security Logging
        3.2.14.7. MCL Failure
        3.2.14.8. Multi-Chassis NAT
        3.2.14.9. MCL Encryption
    3.3. Using the 7705 SAR as Residential or Business CPE
    3.4. Router Configuration Process Overview
    3.5. Configuration Notes
    3.6. Configuring an IP Router with CLI
    3.7. Router Configuration Overview
      3.7.1. System Interface
      3.7.2. Network Interface
    3.8. Basic Configuration
    3.9. Common Configuration Tasks
      3.9.1. Configuring a System Name
      3.9.2. Configuring Router IPv6 Neighbor Discovery Parameters
      3.9.3. Configuring Interfaces
        3.9.3.1. Configuring a System Interface
        3.9.3.2. Configuring a Network Interface
          3.9.3.2.1. Creating an IPv6 Network Interface
        3.9.3.3. Configuring an Unnumbered Interface
      3.9.4. Configuring IPv6 Parameters
      3.9.5. Configuring Router Advertisement
      3.9.6. Configuring ECMP
      3.9.7. Configuring Static Routes
      3.9.8. Configuring or Deriving a Router ID
      3.9.9. Configuring an Autonomous System
      3.9.10. Configuring ICMP and ICMPv6
      3.9.11. Configuring a DHCP Relay Agent
      3.9.12. Configuring Proxy ARP
      3.9.13. Configuring a Security Zone
      3.9.14. Configuring Security Logging
        3.9.14.1. Rule-Based Security Logging
        3.9.14.2. Zone-Based Security Logging
      3.9.15. Applying an Application Group and a Host Group to a Security Policy
      3.9.16. Configuring an IP Reassembly Profile
    3.10. Service Management Tasks
      3.10.1. Changing the System Name
      3.10.2. Modifying Interface Parameters
      3.10.3. Deleting a Logical IP Interface
    3.11. IP Router Command Reference
      3.11.1. Command Hierarchies
        3.11.1.1. Configuration Commands
          3.11.1.1.1. Router Commands
          3.11.1.1.2. Local DHCP and DHCPv6 Server Commands
          3.11.1.1.3. Router BFD Commands
          3.11.1.1.4. Seamless BFD Reflector Commands
          3.11.1.1.5. Router Interface Commands
          3.11.1.1.6. Router Interface IPv6 Commands
          3.11.1.1.7. Router Advertisement Commands
          3.11.1.1.8. Router Security Zone Configuration Commands
          3.11.1.1.9. Static One-to-One NAT Configuration Commands
          3.11.1.1.10. TWAMP Light Commands
        3.11.1.2. Show Commands
        3.11.1.3. Clear Commands
        3.11.1.4. Debug Commands
      3.11.2. Command Descriptions
        3.11.2.1. Configuration Commands
          3.11.2.1.1. Generic Commands
          3.11.2.1.2. Router Global Commands
          3.11.2.1.3. Local DHCP and DHCPv6 Server Commands
          3.11.2.1.4. Router BFD Commands
          3.11.2.1.5. Seamless BFD Reflector Commands
          3.11.2.1.6. Router Interface Commands
          3.11.2.1.7. Router Interface IPv6 Commands
          3.11.2.1.8. Router Interface DHCP Relay Agent Commands
          3.11.2.1.9. Router Interface Filter Commands
          3.11.2.1.10. Router Interface Encryption Commands
          3.11.2.1.11. Router Interface Hold-Time Commands
          3.11.2.1.12. Router Interface ICMP and ICMPv6 Commands
          3.11.2.1.13. Router Advertisement Commands
          3.11.2.1.14. Router Security Zone Configuration Commands
          3.11.2.1.15. Static One-to-One NAT Router Configuration Commands
          3.11.2.1.16. TWAMP Light Commands
        3.11.2.2. Show Commands
        3.11.2.3. Clear Commands
        3.11.2.4. Debug Commands
  4. VRRP
    4.1. VRRP Overview
    4.2. VRRP Components
      4.2.1. Virtual Router
      4.2.2. IP Address Owner
      4.2.3. Primary Address
      4.2.4. Virtual Router in Master State
      4.2.5. Virtual Router Backup
      4.2.6. Owner and Non-owner VRRP
      4.2.7. Configurable Parameters
        4.2.7.1. VRID
        4.2.7.2. Priority
        4.2.7.3. IP Addresses
        4.2.7.4. Message Interval and Master Inheritance
        4.2.7.5. Master Down Interval
        4.2.7.6. Skew Time
        4.2.7.7. Preempt Mode
        4.2.7.8. VRRP Message Authentication (IPv4 only)
          4.2.7.8.1. Authentication Failure
        4.2.7.9. Virtual MAC Address
        4.2.7.10. BFD-Enable
        4.2.7.11. Initial Delay Timer
        4.2.7.12. VRRP Advertisement Message IP Address List Verification
        4.2.7.13. IPv6 Virtual Router Instance Operationally Up
        4.2.7.14. Policies
    4.3. VRRP Priority Control Policies
      4.3.1. VRRP Policy Constraints
      4.3.2. VRRP Base Priority
      4.3.3. VRRP Priority Control Policy In-use Priority
      4.3.4. VRRP Priority Control Policy Priority Events
        4.3.4.1. Priority Event Hold-set Timers
        4.3.4.2. Port Down Priority Event
        4.3.4.3. LAG Port Down Priority Event
        4.3.4.4. Host Unreachable Priority Event
        4.3.4.5. Route Unknown Priority Event
    4.4. VRRP Non-owner Accessibility
      4.4.1. Non-owner Access Ping Reply
      4.4.2. Non-owner Access Telnet
      4.4.3. Non-owner Access SSH
    4.5. VRRP Configuration Process Overview
    4.6. Configuration Notes
    4.7. Configuring VRRP with CLI
    4.8. VRRP Configuration Overview
      4.8.1. Preconfiguration Requirements
    4.9. Basic VRRP Configurations
      4.9.1. VRRP Policy
      4.9.2. VRRP IES or VPRN Service Parameters
        4.9.2.1. Configuring IES or VPRN VRRP for IPv6
    4.10. Common Configuration Tasks
    4.11. Configuring IES or VPRN VRRP Parameters
      4.11.1. Configuring VRRP on Subnets
      4.11.2. Owner VRRP
      4.11.3. Non-owner VRRP
    4.12. VRRP Management Tasks
      4.12.1. Deleting a VRRP Policy
      4.12.2. Deleting VRRP on a Service
    4.13. VRRP Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VRRP Priority Control Event Policy Commands
        4.13.1.2. VRRP Show Commands
        4.13.1.3. VRRP Monitor Commands
        4.13.1.4. VRRP Clear Commands
        4.13.1.5. VRRP Debug Commands
      4.13.2. Command Descriptions
        4.13.2.1. Configuration Commands
          4.13.2.1.1. VRRP Priority Control Event Policy Commands
          4.13.2.1.2. VRRP Priority Event Commands
        4.13.2.2. VRRP Show Commands
        4.13.2.3. VRRP Monitor Commands
        4.13.2.4. VRRP Clear Commands
        4.13.2.5. VRRP Debug Commands
  5. Filter Policies
    5.1. Configuring Filter Policies
      5.1.1. Overview of Filter Policies
      5.1.2. Network and Service (Access) Interface-based Filtering
      5.1.3. Policy-Based Routing
      5.1.4. Multi-field Classification (MFC)
      5.1.5. VLAN-based Filtering
      5.1.6. Filter Policy Entries
        5.1.6.1. Applying Filter Policies
        5.1.6.2. Packet Matching Criteria
        5.1.6.3. Ordering Filter Entries
      5.1.7. Filter Log Files
    5.2. Configuration Notes
      5.2.1. IP Filters
      5.2.2. IPv6 Filters
      5.2.3. MAC Filters
      5.2.4. VLAN Filters
      5.2.5. Filter Logs
    5.3. Configuring Filter Policies with CLI
    5.4. Basic Configuration
    5.5. Common Configuration Tasks
      5.5.1. Creating an IPv4 or IPv6 Filter Policy
        5.5.1.1. IP Filter Policy
        5.5.1.2. IP Filter Entry
        5.5.1.3. IP Filter Entry Matching Criteria
        5.5.1.4. IP Filter Entry for PBR to a System IP or Loopback Address
      5.5.2. Creating a MAC Filter Policy
        5.5.2.1. MAC Filter Policy
        5.5.2.2. MAC Filter Entry
        5.5.2.3. MAC Entry Matching Criteria
      5.5.3. Creating a VLAN Filter Policy
        5.5.3.1. VLAN Filter Policy
        5.5.3.2. VLAN Filter Entry
        5.5.3.3. VLAN Entry Matching Criteria
      5.5.4. Creating a Bypass Policy for a Firewall in a Layer 2 Service
      5.5.5. Creating an IP Exception Filter Policy
        5.5.5.1. IP Exception Filter Policy
        5.5.5.2. IP Exception Entry Matching Criteria
      5.5.6. Configuring Filter Log Policies
      5.5.7. Configuring a NAT Security Profile
      5.5.8. Configuring a NAT Security Policy
      5.5.9. Applying IP and MAC Filter Policies to a Service
      5.5.10. Applying IP Filter Policies to Network Interfaces
      5.5.11. Applying VLAN Filter Policies to a Ring Port
      5.5.12. Creating a Match List for Filter Policies
    5.6. Filter Management Tasks
      5.6.1. Renumbering Filter Policy Entries
      5.6.2. Modifying an IP Filter Policy
      5.6.3. Modifying a MAC Filter Policy
      5.6.4. Modifying a VLAN Filter Policy
      5.6.5. Removing and Deleting a Filter Policy
        5.6.5.1. Removing a Filter from a Service
        5.6.5.2. Removing a Filter from a Network Interface
        5.6.5.3. Removing a Filter from a Ring Port
        5.6.5.4. Deleting a Filter
    5.7. Filter Command Reference
      5.7.1. Command Hierarchies
        5.7.1.1. Configuration Commands
          5.7.1.1.1. IP Filter Log Configuration Commands
          5.7.1.1.2. IP Filter Policy Configuration Commands
          5.7.1.1.3. IPv6 Filter Policy Configuration Commands
          5.7.1.1.4. MAC Filter Policy Commands
          5.7.1.1.5. VLAN Filter Policy Commands
          5.7.1.1.6. IP Exception Filter Policy Configuration Commands
          5.7.1.1.7. Security Policy Commands
          5.7.1.1.8. Filter Match List Commands
        5.7.1.2. Show Commands
        5.7.1.3. Clear Commands
        5.7.1.4. Monitor Commands
      5.7.2. Command Descriptions
        5.7.2.1. Configuration Commands
          5.7.2.1.1. Generic Commands
          5.7.2.1.2. Filter Log Commands
          5.7.2.1.3. Filter Policy Commands
          5.7.2.1.4. General Filter Entry Commands
          5.7.2.1.5. IP, MAC, VLAN, and IP Exception Filter Entry Commands
          5.7.2.1.6. IP, MAC, and IP Exception Filter Match Criteria Commands
          5.7.2.1.7. Security Policy Commands
          5.7.2.1.8. Match List Configuration Commands
        5.7.2.2. Show Commands
        5.7.2.3. Clear Commands
        5.7.2.4. Monitor Commands
  6. Cflowd
    6.1. Cflowd Overview
      6.1.1. Operation
      6.1.2. Sampling
      6.1.3. Collectors
      6.1.4. Templates
    6.2. Cflowd Configuration Process Overview
    6.3. Configuring Cflowd with CLI
    6.4. Basic Cflowd Configuration
    6.5. Common Configuration Tasks
      6.5.1. Enabling Cflowd
        6.5.1.1. Enabling Cflowd On a SAP
      6.5.2. Configuring Global Cflowd Parameters
      6.5.3. Configuring Cflowd Collector Parameters
      6.5.4. Specifying Cflowd Options on an IP Interface
        6.5.4.1. Interface Configurations
        6.5.4.2. Service Interfaces
    6.6. Cflowd Configuration Management Tasks
      6.6.1. Modifying Global Cflowd Parameters
      6.6.2. Modifying Cflowd Collector Parameters
    6.7. Cflowd Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Configuration Commands
        6.7.1.2. Show Commands
        6.7.1.3. Clear Commands
      6.7.2. Command Descriptions
        6.7.2.1. Generic Commands
        6.7.2.2. Configuration Commands
        6.7.2.3. Show Commands
        6.7.2.4. Clear Commands
  7. Route Policies
    7.1. Configuring Route Policies
      7.1.1. Routing Policy and MPLS
      7.1.2. Policy Statements
        7.1.2.1. Default Action Behavior
        7.1.2.2. Denied IP Prefixes
        7.1.2.3. Controlling Route Flapping
      7.1.3. Regular Expressions
        7.1.3.1. Terms
        7.1.3.2. Operators
      7.1.4. Community Expressions
      7.1.5. BGP and OSPF Route Policy Support
        7.1.5.1. BGP Route Policies
        7.1.5.2. Readvertised Route Policies
        7.1.5.3. Route Policies for BGP Next-Hop Resolution and Peer Tracking
          7.1.5.3.1. BGP Next-Hop Resolution Policy Overview
          7.1.5.3.2. BGP Peer Tracking Policy Overview
          7.1.5.3.3. Route Policy Support for BGP Next-Hop Resolution
          7.1.5.3.4. Route Policy Support for BGP Peer Tracking
      7.1.6. When to Use Route Policies
      7.1.7. Troubleshooting the FIB
    7.2. Route Policy Configuration Process Overview
    7.3. Configuration Notes
    7.4. Configuring Route Policies with CLI
    7.5. Route Policy Configuration Overview
      7.5.1. When to Create Routing Policies
      7.5.2. Default Route Policy Actions
      7.5.3. Policy Evaluation
        7.5.3.1. Damping
    7.6. Basic Route Policy Configuration
    7.7. Configuring Route Policy Components
      7.7.1. Beginning the Policy Statement
      7.7.2. Creating a Route Policy
      7.7.3. Configuring a Default Action
      7.7.4. Configuring an Entry
      7.7.5. Configuring an AS Path (policy-option)
      7.7.6. Configuring a Community List or Expression
      7.7.7. Configuring Damping
      7.7.8. Configuring a Prefix List
      7.7.9. Configuring PIM Join/Register Policies
      7.7.10. Configuring Bootstrap Message Import and Export Policies
      7.7.11. Configuring LDP-to-Segment Routing Stitching Policies
    7.8. Route Policy Configuration Management Tasks
      7.8.1. Editing Policy Statements and Parameters
      7.8.2. Deleting an Entry
      7.8.3. Deleting a Policy Statement
    7.9. Route Policy Command Reference
      7.9.1. Command Hierarchies
        7.9.1.1. Route Policy Configuration Commands
        7.9.1.2. Show Commands
      7.9.2. Command Descriptions
        7.9.2.1. Configuration Commands
          7.9.2.1.1. Generic Commands
          7.9.2.1.2. Route Policy Options
          7.9.2.1.3. Route Policy Damping Commands
          7.9.2.1.4. Route Policy Prefix Commands
          7.9.2.1.5. Route Policy Entry Match Commands
          7.9.2.1.6. Route Policy Action Commands
        7.9.2.2. Show Commands
  8. List of Acronyms
  9. Supported Standards and Protocols
  Customer Document and Product Support
7705 SAR Routing Protocols Guide R23.4.R1
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. Technical Support
  2. 7705 SAR Routing Configuration Process
  3. IP Multicast
    3.1. Overview of IP Multicast
      3.1.1. Multicast in IP-VPN Networks
      3.1.2. Mobile Backhaul IP Multicast Example
      3.1.3. Multicast Models (ASM and SSM)
        3.1.3.1. Any-Source Multicast (ASM)
        3.1.3.2. Source-Specific Multicast (SSM)
      3.1.4. IGMP Snooping and MLD Snooping For VPLS and Routed VPLS
      3.1.5. Multicast Over Layer 3 Spoke SDP
    3.2. IGMP
      3.2.1. IGMP Overview
      3.2.2. IGMP Versions and Interoperability Requirements
      3.2.3. IGMP Version Transition
      3.2.4. Query Messages
      3.2.5. Source-Specific Multicast Groups (IPv4)
    3.3. MLD
      3.3.1. MLD Overview
      3.3.2. MLDv1
      3.3.3. MLDv2
    3.4. PIM
      3.4.1. PIM-SM Overview
      3.4.2. PIM-SM Functions
        3.4.2.1. Phase One
        3.4.2.2. Phase Two
        3.4.2.3. Phase Three
      3.4.3. Encapsulating Data Packets in the Register Tunnel
      3.4.4. PIM Bootstrap Router Mechanism
      3.4.5. PIM-SM Routing Policies
      3.4.6. Reverse Path Forwarding Checks
      3.4.7. Anycast RP for PIM-SM
        3.4.7.1. Implementation
      3.4.8. Multicast-only Fast Reroute (MoFRR)
      3.4.9. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
    3.5. IPv6 PIM Models
      3.5.1. PIM-SSM
      3.5.2. PIM-ASM
    3.6. IP Multicast Debugging Tools
      3.6.1. Mtrace
        3.6.1.1. Finding the Last-hop Router
        3.6.1.2. Directing the Response
      3.6.2. Mstat
      3.6.3. Mrinfo
    3.7. MSDP
      3.7.1. MSDP and Anycast RP
      3.7.2. MSDP Procedure
        3.7.2.1. MSDP Peering Scenarios
      3.7.3. MSDP Peer Groups
      3.7.4. MSDP Mesh Groups
      3.7.5. MSDP Routing Policies
      3.7.6. Auto-RP (Discovery Mode Only) in Multicast VPN
    3.8. Inter-AS Non-segmented mLDP
      3.8.1. ASBR Support of PE Functionality
    3.9. Hashing for Inter-AS
    3.10. Hashing at the ASBR
    3.11. Unicast and Multicast Address Translation
      3.11.1. Unicast-to-Multicast Address Translation
      3.11.2. Multicast-to-Multicast Address Translation
    3.12. IP Multicast Configuration Process Overview
    3.13. Configuration Notes
      3.13.1. General
    3.14. Configuring IP Multicast Parameters with CLI
    3.15. IP Multicast Configuration Overview
      3.15.1. IGMP and MLD
        3.15.1.1. Static Groups
        3.15.1.2. SSM Translation
      3.15.2. PIM
      3.15.3. Hardware Support
    3.16. Basic IP Multicast Configuration
    3.17. Common Configuration Tasks
      3.17.1. Configuring IGMP and MLD Parameters
        3.17.1.1. Enabling IGMP or MLD
        3.17.1.2. Configuring IGMP and MLD
        3.17.1.3. Configuring IGMP and MLD Interfaces
        3.17.1.4. Configuring IGMP and MLD Interface Static Multicast
        3.17.1.5. Configuring IGMP and MLD SSM Translation
      3.17.2. Configuring PIM Parameters
        3.17.2.1. Enabling PIM
        3.17.2.2. Configuring PIM Interface Parameters
        3.17.2.3. Configuring a Rendezvous Point (RP)
        3.17.2.4. Importing PIM Join or Register Policies
        3.17.2.5. Configuring Multicast Source Discovery Protocol (MSDP) Parameters
    3.18. Service Management Tasks
      3.18.1. Disabling IGMP, MLD, PIM, and MSDP
    3.19. IP Multicast Command Reference
      3.19.1. Command Hierarchies
        3.19.1.1. Configuration Commands
          3.19.1.1.1. IGMP Commands
          3.19.1.1.2. MLD Commands
          3.19.1.1.3. PIM Commands
          3.19.1.1.4. MSDP Commands
        3.19.1.2. Show Commands
        3.19.1.3. Clear Commands
        3.19.1.4. Monitor Commands
        3.19.1.5. Debug Commands
      3.19.2. Command Descriptions
        3.19.2.1. Configuration Commands
          3.19.2.1.1. Generic Commands
          3.19.2.1.2. IGMP Commands
          3.19.2.1.3. MLD Commands
          3.19.2.1.4. PIM Commands
          3.19.2.1.5. MSDP Commands
        3.19.2.2. Show Commands
        3.19.2.3. Clear Commands
        3.19.2.4. Monitor Commands
        3.19.2.5. Debug Commands
          3.19.2.5.1. Debug IGMP Commands
          3.19.2.5.2. Debug MLD Commands
          3.19.2.5.3. Debug PIM Commands
          3.19.2.5.4. Debug MSDP Commands
          3.19.2.5.5. Debug Mtrace Commands
  4. OSPF
    4.1. Overview of OSPF
      4.1.1. OSPF Areas
        4.1.1.1. Backbone Area
        4.1.1.2. Super Backbone Area
          4.1.1.2.1. Sham Link
          4.1.1.2.2. Implementing the OSPF Super Backbone
          4.1.1.2.3. Loop Avoidance
          4.1.1.2.4. DN Bit
          4.1.1.2.5. VPN Route Tag
        4.1.1.3. Area Border Router
        4.1.1.4. Stub Area
        4.1.1.5. Not-So-Stubby Area
      4.1.2. Virtual Links
      4.1.3. Neighbors and Adjacencies
        4.1.3.1. Designated Routers and Backup Designated Routers
      4.1.4. Link-State Advertisements
      4.1.5. Metrics
      4.1.6. Authentication
        4.1.6.1. Authentication Key
        4.1.6.2. Authentication Keychains
      4.1.7. Route Redistribution and Summarization
      4.1.8. OSPF-TE Extensions
      4.1.9. Unnumbered Interfaces
      4.1.10. IP Subnets
      4.1.11. OSPF Instances
      4.1.12. Multi-area Adjacencies
      4.1.13. OSPF Import Policies
    4.2. Bidirectional Forwarding Detection (BFD) for OSPF
    4.3. Graceful Restart Helper
    4.4. LFA Protection Using Segment Routing Backup Node SID
      4.4.1. Configuring LFA Using Backup Node SID
      4.4.2. Detailed Operation of LFA Protection Using Backup Node SID
      4.4.3. Duplicate SID Handling
      4.4.4. OSPF Control Plane Extensions
      4.4.5. Topology-Independent LFA for OSPF
    4.5. LDP and IP Fast Reroute (FRR) for OSPF Prefixes
      4.5.1. LFA Calculations
        4.5.1.1. Selection Algorithm
        4.5.1.2. LFA Configuration
      4.5.2. IGP Shortcuts (RSVP-TE Tunnels)
        4.5.2.1. Selection Algorithm
        4.5.2.2. Forwarding Adjacency
        4.5.2.3. IGP Shortcut Configuration
      4.5.3. LFA SPF Policies
        4.5.3.1. LFA SPF Policy Configuration
    4.6. Preconfiguration Requirements
    4.7. OSPF Configuration Process Overview
    4.8. Configuration Notes
      4.8.1. General
    4.9. Configuring OSPF with CLI
    4.10. OSPF Configuration Guidelines
    4.11. Basic OSPF Configuration
      4.11.1. Configuring the Router ID
      4.11.2. Configuring an OSPF Area
      4.11.3. Configuring an Interface
    4.12. Configuring Other OSPF Components
      4.12.1. Configuring a Stub Area
      4.12.2. Configuring a Not-So-Stubby Area
      4.12.3. Configuring a Virtual Link
      4.12.4. Configuring Authentication
      4.12.5. Assigning a Designated Router
      4.12.6. Configuring Route Summaries
      4.12.7. Configuring Route Preferences
    4.13. OSPF Configuration Management Tasks
      4.13.1. Modifying a Router ID
      4.13.2. Deleting a Router ID
      4.13.3. Modifying OSPF Parameters
    4.14. OSPF Command Reference
      4.14.1. Command Hierarchies
        4.14.1.1. Configuration Commands
        4.14.1.2. Show Commands
        4.14.1.3. Clear Commands
        4.14.1.4. Monitor Commands
        4.14.1.5. Debug Commands
      4.14.2. Command Descriptions
        4.14.2.1. Configuration Commands
          4.14.2.1.1. Generic Commands
          4.14.2.1.2. Global Commands
          4.14.2.1.3. Area Commands
          4.14.2.1.4. Interface/Virtual Link Commands
        4.14.2.2. Show Commands
        4.14.2.3. Clear Commands
        4.14.2.4. Monitor Commands
        4.14.2.5. Debug Commands
  5. IS-IS
    5.1. Overview of IS-IS
      5.1.1. IS-IS Areas (Two-level Hierarchy)
      5.1.2. ISO Network Addressing
      5.1.3. Neighbors and Adjacencies
        5.1.3.1. Designated Routers
        5.1.3.2. IS-IS Packet Types
      5.1.4. Metrics
      5.1.5. Authentication
        5.1.5.1. Authentication Key
        5.1.5.2. Authentication Keychains
      5.1.6. Route Redistribution and Summarization
        5.1.6.1. Route Redistribution
        5.1.6.2. Route Summarization
          5.1.6.2.1. Partial SPF Calculation
      5.1.7. IS-IS-TE Extensions
      5.1.8. Unnumbered Interfaces
      5.1.9. Segment Routing in Shortest Path Forwarding
        5.1.9.1. Configuring Segment Routing in Shortest Path
        5.1.9.2. Segment Routing Operational Procedures
          5.1.9.2.1. Prefix SID Resolution for a Segment Routing Mapping Server
          5.1.9.2.2. Prefix Advertisement and Resolution
          5.1.9.2.3. Error and Resource Exhaustion Handling
        5.1.9.3. Segment Routing Tunnel Management
          5.1.9.3.1. Tunnel MTU Determination
        5.1.9.4. Remote LFA with Segment Routing
        5.1.9.5. Topology-Independent LFA
          5.1.9.5.1. TI-LFA Configuration
          5.1.9.5.2. TI-LFA Link-Protect Operation
          5.1.9.5.3. Data Path Support
        5.1.9.6. Node Protection Support in Remote LFA and TI-LFA
          5.1.9.6.1. Configuring Remote LFA and TI-LFA for Node Protection
          5.1.9.6.2. TI-LFA Node-Protect Operation
          5.1.9.6.3. Remote LFA Node-Protect Operation
          5.1.9.6.4. TI-LFA and Remote LFA Node Protection Feature Interactions and Limitations
        5.1.9.7. IPv6 Segment Routing using MPLS Encapsulation
          5.1.9.7.1. IS-IS MT=0 Extensions
          5.1.9.7.2. Supported Service and Forwarding Contexts
          5.1.9.7.3. Services Using SDP with an SR IPv6 Tunnel
        5.1.9.8. Data Path Support
        5.1.9.9. Control Protocol Changes
          5.1.9.9.1. IS-IS Control Protocol Changes
          5.1.9.9.2. OSPF Control Protocol Changes
        5.1.9.10. BGP Label Route Resolution Using Segment Routing Tunnel
        5.1.9.11. Service Packet Forwarding with Segment Routing
        5.1.9.12. Segment Routing Mapping Server for IPv4 /32 Prefixes (IS-IS)
        5.1.9.13. Mirror Services
      5.1.10. Multi-Instance IS-IS (MI-IS-IS)
      5.1.11. IPv6 Support
    5.2. Bidirectional Forwarding Detection (BFD) for IS-IS
    5.3. LDP and IP Fast Reroute (FRR) for IS-IS Prefixes
      5.3.1. LFA Calculations
        5.3.1.1. Selection Algorithm
        5.3.1.2. LFA Configuration
      5.3.2. IGP Shortcuts (RSVP-TE Tunnels)
        5.3.2.1. Selection Algorithm
        5.3.2.2. Forwarding Adjacency
        5.3.2.3. IGP Shortcut Configuration
      5.3.3. LFA SPF Policies
        5.3.3.1. LFA SPF Policy Configuration
    5.4. IS-IS Configuration Process Overview
    5.5. Configuration Notes
      5.5.1. General
    5.6. Configuring IS-IS with CLI
    5.7. IS-IS Configuration Overview
    5.8. Basic IS-IS Configuration
    5.9. Configuring IS-IS Components
      5.9.1. Enabling IS-IS
      5.9.2. Configuring an IS-IS Instance Level
      5.9.3. Configuring ISO Area Addresses
      5.9.4. Configuring Global IS-IS Parameters
      5.9.5. Configuring Interface Parameters
        5.9.5.1. Example 1: Configuring a Level 1 Area
        5.9.5.2. Example 2: Modifying Router Level Capability
        5.9.5.3. Interface Level Capability
      5.9.6. Configuring Authentication
      5.9.7. Configuring Leaking
      5.9.8. Redistributing External IS-IS Routes
      5.9.9. Configuring IS-IS Support for LDP-to-SR Stitching
      5.9.10. Configuring an SR Mapping Server for IPv4 /32 Prefixes
    5.10. IS-IS Configuration Management Tasks
      5.10.1. Disabling IS-IS
      5.10.2. Removing IS-IS
      5.10.3. Modifying Global IS-IS Parameters
      5.10.4. Modifying IS-IS Interface Parameters
    5.11. IS-IS Command Reference
      5.11.1. Command Hierarchies
        5.11.1.1. Configuration Commands
        5.11.1.2. Show Commands
        5.11.1.3. Clear Commands
        5.11.1.4. Monitor Commands
        5.11.1.5. Debug Commands
      5.11.2. Command Descriptions
        5.11.2.1. Configuration Commands
          5.11.2.1.1. Generic Commands
          5.11.2.1.2. Global Commands
          5.11.2.1.3. Interface Commands
        5.11.2.2. Show Commands
        5.11.2.3. Clear Commands
        5.11.2.4. Monitor Commands
        5.11.2.5. Debug Commands
  6. BGP
    6.1. BGP Overview
      6.1.1. BGP Communication
        6.1.1.1. Static and Dynamic Neighbors
      6.1.2. Message Types
      6.1.3. BGP Path Attributes
        6.1.3.1. Origin Attribute
        6.1.3.2. AS Path Attribute
        6.1.3.3. Next-hop Attribute
        6.1.3.4. MED Attribute
        6.1.3.5. Local Preference Attribute
        6.1.3.6. Route Aggregation Path Attributes
        6.1.3.7. Communities Attribute
        6.1.3.8. Route Reflection Attributes
        6.1.3.9. Multiprotocol BGP Extensions Attributes
        6.1.3.10. 4-Octet AS Attributes
        6.1.3.11. AIGP Metric Attribute
      6.1.4. Multi-Protocol BGP Attributes
      6.1.5. BGPv6
      6.1.6. BGP Add-Paths
        6.1.6.1. Path Selection Mode and Parameters for Multiple Paths to Add-path Peers
        6.1.6.2. Routing Policy for Multiple Paths
        6.1.6.3. BGP Route Advertisement Rules for Multiple Paths
        6.1.6.4. BGP Split Horizon
      6.1.7. Outbound Route Filtering (ORF)
      6.1.8. BGP Route Target Constrained Route Distribution
    6.2. Group Configuration and Peers
      6.2.1. Hierarchical Levels
      6.2.2. Route Reflection
      6.2.3. BGP Peer Groups with Dynamic Neighbors
      6.2.4. Fast External Failover
      6.2.5. BGP Fast Reroute With Prefix-Independent Convergence
        6.2.5.1. BGP FRR Failure Detection and Switchover
      6.2.6. Calculating Backup Paths
      6.2.7. Sending of BGP Communities
      6.2.8. BGP Decision Process
    6.3. BGP Route Tunnels
      6.3.1. Route Reflector Next-Hop-Self for VPN IPv4 Routes over IPv4 Labeled Routes
      6.3.2. Layer 2 Services and BGP Route Tunnel
      6.3.3. BGP Route Tunnel SDP Binding
      6.3.4. BGP Route Tunnel With Multihop EBGP Resolution
      6.3.5. Next-hop Resolution of BGP Labeled Routes to Tunnels
      6.3.6. BGP Next-Hop Resolution and Peer Tracking
      6.3.7. BGP Route Installation in the Route Table
      6.3.8. BGP Link State
        6.3.8.1. Supported BGP-LS Components
    6.4. Command Interactions and Dependencies
      6.4.1. Changing the Autonomous System Number
      6.4.2. Changing the Local AS Number
      6.4.3. Changing the Router ID at the Configuration Level
      6.4.4. Hold Time and Keepalive Timer Dependencies
      6.4.5. Import and Export Route Policies
      6.4.6. AS Override
      6.4.7. TCP MD5 Authentication
      6.4.8. TTL Security
      6.4.9. Advertise-Inactive
      6.4.10. Advertise-Inactive, Add-Paths, and Export Policy Interaction
    6.5. BGP Configuration Process Overview
    6.6. Configuration Notes
      6.6.1. General
      6.6.2. BGP Defaults
      6.6.3. BGP MIB Notes
    6.7. Configuring BGP with CLI
    6.8. BGP Configuration Overview
      6.8.1. Preconfiguration Requirements
      6.8.2. BGP Hierarchy
      6.8.3. Internal and External BGP Configurations
      6.8.4. BGP Route Reflectors
    6.9. Basic BGP Configuration
    6.10. Common Configuration Tasks
      6.10.1. Creating an Autonomous System
      6.10.2. Configuring a Router ID
    6.11. BGP Components
      6.11.1. Configuring BGP
      6.11.2. Configuring Group Attributes
      6.11.3. Configuring Neighbor Attributes
      6.11.4. Configuring BGP Address Families
      6.11.5. Configuring Route Reflection
      6.11.6. Configuring a BGP Peer Group with Dynamic Neighbors
    6.12. BGP Configuration Management Tasks
      6.12.1. Modifying an AS Number
      6.12.2. Modifying the BGP Router ID
      6.12.3. Modifying the Router-Level Router ID
      6.12.4. Deleting a Neighbor
      6.12.5. Deleting Groups
      6.12.6. Editing BGP Parameters
    6.13. BGP Command Reference
      6.13.1. Command Hierarchies
        6.13.1.1. Configuration Commands
          6.13.1.1.1. Global BGP Commands
          6.13.1.1.2. Group BGP Commands
          6.13.1.1.3. Neighbor BGP Commands
          6.13.1.1.4. Other BGP-Related Commands
        6.13.1.2. Show Commands
        6.13.1.3. Clear Commands
        6.13.1.4. Debug Commands
      6.13.2. Command Descriptions
        6.13.2.1. Configuration Commands
          6.13.2.1.1. Configuration Commands
          6.13.2.1.2. Other BGP-Related Commands
        6.13.2.2. Show Commands
        6.13.2.3. Clear Commands
        6.13.2.4. Debug Commands
  7. RIP
    7.1. RIP Overview
      7.1.1. RIP Versions
      7.1.2. RIPv2 Authentication
      7.1.3. Metrics
      7.1.4. Timers
      7.1.5. Import and Export Policies
      7.1.6. RIP Packet Format
      7.1.7. RIP Hierarchical Levels
    7.2. RIP Configuration Process Overview
    7.3. Configuration Notes
    7.4. Configuring RIP with CLI
    7.5. RIP Configuration Overview
      7.5.1. Preconfiguration Requirements
    7.6. Basic RIP Configuration
    7.7. Common Configuration Tasks
      7.7.1. Configuring Interfaces
      7.7.2. Configuring a Route Policy
    7.8. Configuring RIP Parameters
      7.8.1. Configuring Global-Level Parameters
      7.8.2. Configuring Group-Level Parameters
      7.8.3. Configuring Neighbor-Level Parameters
    7.9. RIP Configuration Management Tasks
      7.9.1. Modifying RIP Parameters
      7.9.2. Deleting a RIP Group
      7.9.3. Deleting a RIP Neighbor
    7.10. RIP Command Reference
      7.10.1. Command Hierarchies
        7.10.1.1. Configuration Commands
          7.10.1.1.1. Global RIP Commands
          7.10.1.1.2. Group RIP Commands
          7.10.1.1.3. Neighbor RIP Commands
        7.10.1.2. Show Commands
        7.10.1.3. Clear Commands
        7.10.1.4. Monitor Commands
        7.10.1.5. Debug Commands
      7.10.2. Command Descriptions
        7.10.2.1. Configuration Commands
          7.10.2.1.1. Generic Commands
          7.10.2.1.2. RIP Commands
        7.10.2.2. Show Commands
        7.10.2.3. Clear Commands
        7.10.2.4. Monitor Commands
        7.10.2.5. Debug Commands
  8. List of Acronyms
  9. Supported Standards and Protocols
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. Technical Support
  2. 7705 SAR Routing Configuration Process
  3. IP Multicast
    3.1. Overview of IP Multicast
      3.1.1. Multicast in IP-VPN Networks
      3.1.2. Mobile Backhaul IP Multicast Example
      3.1.3. Multicast Models (ASM and SSM)
        3.1.3.1. Any-Source Multicast (ASM)
        3.1.3.2. Source-Specific Multicast (SSM)
      3.1.4. IGMP Snooping and MLD Snooping For VPLS and Routed VPLS
      3.1.5. Multicast Over Layer 3 Spoke SDP
    3.2. IGMP
      3.2.1. IGMP Overview
      3.2.2. IGMP Versions and Interoperability Requirements
      3.2.3. IGMP Version Transition
      3.2.4. Query Messages
      3.2.5. Source-Specific Multicast Groups (IPv4)
    3.3. MLD
      3.3.1. MLD Overview
      3.3.2. MLDv1
      3.3.3. MLDv2
    3.4. PIM
      3.4.1. PIM-SM Overview
      3.4.2. PIM-SM Functions
        3.4.2.1. Phase One
        3.4.2.2. Phase Two
        3.4.2.3. Phase Three
      3.4.3. Encapsulating Data Packets in the Register Tunnel
      3.4.4. PIM Bootstrap Router Mechanism
      3.4.5. PIM-SM Routing Policies
      3.4.6. Reverse Path Forwarding Checks
      3.4.7. Anycast RP for PIM-SM
        3.4.7.1. Implementation
      3.4.8. Multicast-only Fast Reroute (MoFRR)
      3.4.9. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
    3.5. IPv6 PIM Models
      3.5.1. PIM-SSM
      3.5.2. PIM-ASM
    3.6. IP Multicast Debugging Tools
      3.6.1. Mtrace
        3.6.1.1. Finding the Last-hop Router
        3.6.1.2. Directing the Response
      3.6.2. Mstat
      3.6.3. Mrinfo
    3.7. MSDP
      3.7.1. MSDP and Anycast RP
      3.7.2. MSDP Procedure
        3.7.2.1. MSDP Peering Scenarios
      3.7.3. MSDP Peer Groups
      3.7.4. MSDP Mesh Groups
      3.7.5. MSDP Routing Policies
      3.7.6. Auto-RP (Discovery Mode Only) in Multicast VPN
    3.8. Inter-AS Non-segmented mLDP
      3.8.1. ASBR Support of PE Functionality
    3.9. Hashing for Inter-AS
    3.10. Hashing at the ASBR
    3.11. Unicast and Multicast Address Translation
      3.11.1. Unicast-to-Multicast Address Translation
      3.11.2. Multicast-to-Multicast Address Translation
    3.12. IP Multicast Configuration Process Overview
    3.13. Configuration Notes
      3.13.1. General
    3.14. Configuring IP Multicast Parameters with CLI
    3.15. IP Multicast Configuration Overview
      3.15.1. IGMP and MLD
        3.15.1.1. Static Groups
        3.15.1.2. SSM Translation
      3.15.2. PIM
      3.15.3. Hardware Support
    3.16. Basic IP Multicast Configuration
    3.17. Common Configuration Tasks
      3.17.1. Configuring IGMP and MLD Parameters
        3.17.1.1. Enabling IGMP or MLD
        3.17.1.2. Configuring IGMP and MLD
        3.17.1.3. Configuring IGMP and MLD Interfaces
        3.17.1.4. Configuring IGMP and MLD Interface Static Multicast
        3.17.1.5. Configuring IGMP and MLD SSM Translation
      3.17.2. Configuring PIM Parameters
        3.17.2.1. Enabling PIM
        3.17.2.2. Configuring PIM Interface Parameters
        3.17.2.3. Configuring a Rendezvous Point (RP)
        3.17.2.4. Importing PIM Join or Register Policies
        3.17.2.5. Configuring Multicast Source Discovery Protocol (MSDP) Parameters
    3.18. Service Management Tasks
      3.18.1. Disabling IGMP, MLD, PIM, and MSDP
    3.19. IP Multicast Command Reference
      3.19.1. Command Hierarchies
        3.19.1.1. Configuration Commands
          3.19.1.1.1. IGMP Commands
          3.19.1.1.2. MLD Commands
          3.19.1.1.3. PIM Commands
          3.19.1.1.4. MSDP Commands
        3.19.1.2. Show Commands
        3.19.1.3. Clear Commands
        3.19.1.4. Monitor Commands
        3.19.1.5. Debug Commands
      3.19.2. Command Descriptions
        3.19.2.1. Configuration Commands
          3.19.2.1.1. Generic Commands
          3.19.2.1.2. IGMP Commands
          3.19.2.1.3. MLD Commands
          3.19.2.1.4. PIM Commands
          3.19.2.1.5. MSDP Commands
        3.19.2.2. Show Commands
        3.19.2.3. Clear Commands
        3.19.2.4. Monitor Commands
        3.19.2.5. Debug Commands
          3.19.2.5.1. Debug IGMP Commands
          3.19.2.5.2. Debug MLD Commands
          3.19.2.5.3. Debug PIM Commands
          3.19.2.5.4. Debug MSDP Commands
          3.19.2.5.5. Debug Mtrace Commands
  4. OSPF
    4.1. Overview of OSPF
      4.1.1. OSPF Areas
        4.1.1.1. Backbone Area
        4.1.1.2. Super Backbone Area
          4.1.1.2.1. Sham Link
          4.1.1.2.2. Implementing the OSPF Super Backbone
          4.1.1.2.3. Loop Avoidance
          4.1.1.2.4. DN Bit
          4.1.1.2.5. VPN Route Tag
        4.1.1.3. Area Border Router
        4.1.1.4. Stub Area
        4.1.1.5. Not-So-Stubby Area
      4.1.2. Virtual Links
      4.1.3. Neighbors and Adjacencies
        4.1.3.1. Designated Routers and Backup Designated Routers
      4.1.4. Link-State Advertisements
      4.1.5. Metrics
      4.1.6. Authentication
        4.1.6.1. Authentication Key
        4.1.6.2. Authentication Keychains
      4.1.7. Route Redistribution and Summarization
      4.1.8. OSPF-TE Extensions
      4.1.9. Unnumbered Interfaces
      4.1.10. IP Subnets
      4.1.11. OSPF Instances
      4.1.12. Multi-area Adjacencies
      4.1.13. OSPF Import Policies
    4.2. Bidirectional Forwarding Detection (BFD) for OSPF
    4.3. Graceful Restart Helper
    4.4. LFA Protection Using Segment Routing Backup Node SID
      4.4.1. Configuring LFA Using Backup Node SID
      4.4.2. Detailed Operation of LFA Protection Using Backup Node SID
      4.4.3. Duplicate SID Handling
      4.4.4. OSPF Control Plane Extensions
      4.4.5. Topology-Independent LFA for OSPF
    4.5. LDP and IP Fast Reroute (FRR) for OSPF Prefixes
      4.5.1. LFA Calculations
        4.5.1.1. Selection Algorithm
        4.5.1.2. LFA Configuration
      4.5.2. IGP Shortcuts (RSVP-TE Tunnels)
        4.5.2.1. Selection Algorithm
        4.5.2.2. Forwarding Adjacency
        4.5.2.3. IGP Shortcut Configuration
      4.5.3. LFA SPF Policies
        4.5.3.1. LFA SPF Policy Configuration
    4.6. Preconfiguration Requirements
    4.7. OSPF Configuration Process Overview
    4.8. Configuration Notes
      4.8.1. General
    4.9. Configuring OSPF with CLI
    4.10. OSPF Configuration Guidelines
    4.11. Basic OSPF Configuration
      4.11.1. Configuring the Router ID
      4.11.2. Configuring an OSPF Area
      4.11.3. Configuring an Interface
    4.12. Configuring Other OSPF Components
      4.12.1. Configuring a Stub Area
      4.12.2. Configuring a Not-So-Stubby Area
      4.12.3. Configuring a Virtual Link
      4.12.4. Configuring Authentication
      4.12.5. Assigning a Designated Router
      4.12.6. Configuring Route Summaries
      4.12.7. Configuring Route Preferences
    4.13. OSPF Configuration Management Tasks
      4.13.1. Modifying a Router ID
      4.13.2. Deleting a Router ID
      4.13.3. Modifying OSPF Parameters
    4.14. OSPF Command Reference
      4.14.1. Command Hierarchies
        4.14.1.1. Configuration Commands
        4.14.1.2. Show Commands
        4.14.1.3. Clear Commands
        4.14.1.4. Monitor Commands
        4.14.1.5. Debug Commands
      4.14.2. Command Descriptions
        4.14.2.1. Configuration Commands
          4.14.2.1.1. Generic Commands
          4.14.2.1.2. Global Commands
          4.14.2.1.3. Area Commands
          4.14.2.1.4. Interface/Virtual Link Commands
        4.14.2.2. Show Commands
        4.14.2.3. Clear Commands
        4.14.2.4. Monitor Commands
        4.14.2.5. Debug Commands
  5. IS-IS
    5.1. Overview of IS-IS
      5.1.1. IS-IS Areas (Two-level Hierarchy)
      5.1.2. ISO Network Addressing
      5.1.3. Neighbors and Adjacencies
        5.1.3.1. Designated Routers
        5.1.3.2. IS-IS Packet Types
      5.1.4. Metrics
      5.1.5. Authentication
        5.1.5.1. Authentication Key
        5.1.5.2. Authentication Keychains
      5.1.6. Route Redistribution and Summarization
        5.1.6.1. Route Redistribution
        5.1.6.2. Route Summarization
          5.1.6.2.1. Partial SPF Calculation
      5.1.7. IS-IS-TE Extensions
      5.1.8. Unnumbered Interfaces
      5.1.9. Segment Routing in Shortest Path Forwarding
        5.1.9.1. Configuring Segment Routing in Shortest Path
        5.1.9.2. Segment Routing Operational Procedures
          5.1.9.2.1. Prefix SID Resolution for a Segment Routing Mapping Server
          5.1.9.2.2. Prefix Advertisement and Resolution
          5.1.9.2.3. Error and Resource Exhaustion Handling
        5.1.9.3. Segment Routing Tunnel Management
          5.1.9.3.1. Tunnel MTU Determination
        5.1.9.4. Remote LFA with Segment Routing
        5.1.9.5. Topology-Independent LFA
          5.1.9.5.1. TI-LFA Configuration
          5.1.9.5.2. TI-LFA Link-Protect Operation
          5.1.9.5.3. Data Path Support
        5.1.9.6. Node Protection Support in Remote LFA and TI-LFA
          5.1.9.6.1. Configuring Remote LFA and TI-LFA for Node Protection
          5.1.9.6.2. TI-LFA Node-Protect Operation
          5.1.9.6.3. Remote LFA Node-Protect Operation
          5.1.9.6.4. TI-LFA and Remote LFA Node Protection Feature Interactions and Limitations
        5.1.9.7. IPv6 Segment Routing using MPLS Encapsulation
          5.1.9.7.1. IS-IS MT=0 Extensions
          5.1.9.7.2. Supported Service and Forwarding Contexts
          5.1.9.7.3. Services Using SDP with an SR IPv6 Tunnel
        5.1.9.8. Data Path Support
        5.1.9.9. Control Protocol Changes
          5.1.9.9.1. IS-IS Control Protocol Changes
          5.1.9.9.2. OSPF Control Protocol Changes
        5.1.9.10. BGP Label Route Resolution Using Segment Routing Tunnel
        5.1.9.11. Service Packet Forwarding with Segment Routing
        5.1.9.12. Segment Routing Mapping Server for IPv4 /32 Prefixes (IS-IS)
        5.1.9.13. Mirror Services
      5.1.10. Multi-Instance IS-IS (MI-IS-IS)
      5.1.11. IPv6 Support
    5.2. Bidirectional Forwarding Detection (BFD) for IS-IS
    5.3. LDP and IP Fast Reroute (FRR) for IS-IS Prefixes
      5.3.1. LFA Calculations
        5.3.1.1. Selection Algorithm
        5.3.1.2. LFA Configuration
      5.3.2. IGP Shortcuts (RSVP-TE Tunnels)
        5.3.2.1. Selection Algorithm
        5.3.2.2. Forwarding Adjacency
        5.3.2.3. IGP Shortcut Configuration
      5.3.3. LFA SPF Policies
        5.3.3.1. LFA SPF Policy Configuration
    5.4. IS-IS Configuration Process Overview
    5.5. Configuration Notes
      5.5.1. General
    5.6. Configuring IS-IS with CLI
    5.7. IS-IS Configuration Overview
    5.8. Basic IS-IS Configuration
    5.9. Configuring IS-IS Components
      5.9.1. Enabling IS-IS
      5.9.2. Configuring an IS-IS Instance Level
      5.9.3. Configuring ISO Area Addresses
      5.9.4. Configuring Global IS-IS Parameters
      5.9.5. Configuring Interface Parameters
        5.9.5.1. Example 1: Configuring a Level 1 Area
        5.9.5.2. Example 2: Modifying Router Level Capability
        5.9.5.3. Interface Level Capability
      5.9.6. Configuring Authentication
      5.9.7. Configuring Leaking
      5.9.8. Redistributing External IS-IS Routes
      5.9.9. Configuring IS-IS Support for LDP-to-SR Stitching
      5.9.10. Configuring an SR Mapping Server for IPv4 /32 Prefixes
    5.10. IS-IS Configuration Management Tasks
      5.10.1. Disabling IS-IS
      5.10.2. Removing IS-IS
      5.10.3. Modifying Global IS-IS Parameters
      5.10.4. Modifying IS-IS Interface Parameters
    5.11. IS-IS Command Reference
      5.11.1. Command Hierarchies
        5.11.1.1. Configuration Commands
        5.11.1.2. Show Commands
        5.11.1.3. Clear Commands
        5.11.1.4. Monitor Commands
        5.11.1.5. Debug Commands
      5.11.2. Command Descriptions
        5.11.2.1. Configuration Commands
          5.11.2.1.1. Generic Commands
          5.11.2.1.2. Global Commands
          5.11.2.1.3. Interface Commands
        5.11.2.2. Show Commands
        5.11.2.3. Clear Commands
        5.11.2.4. Monitor Commands
        5.11.2.5. Debug Commands
  6. BGP
    6.1. BGP Overview
      6.1.1. BGP Communication
        6.1.1.1. Static and Dynamic Neighbors
      6.1.2. Message Types
      6.1.3. BGP Path Attributes
        6.1.3.1. Origin Attribute
        6.1.3.2. AS Path Attribute
        6.1.3.3. Next-hop Attribute
        6.1.3.4. MED Attribute
        6.1.3.5. Local Preference Attribute
        6.1.3.6. Route Aggregation Path Attributes
        6.1.3.7. Communities Attribute
        6.1.3.8. Route Reflection Attributes
        6.1.3.9. Multiprotocol BGP Extensions Attributes
        6.1.3.10. 4-Octet AS Attributes
        6.1.3.11. AIGP Metric Attribute
      6.1.4. Multi-Protocol BGP Attributes
      6.1.5. BGPv6
      6.1.6. BGP Add-Paths
        6.1.6.1. Path Selection Mode and Parameters for Multiple Paths to Add-path Peers
        6.1.6.2. Routing Policy for Multiple Paths
        6.1.6.3. BGP Route Advertisement Rules for Multiple Paths
        6.1.6.4. BGP Split Horizon
      6.1.7. Outbound Route Filtering (ORF)
      6.1.8. BGP Route Target Constrained Route Distribution
    6.2. Group Configuration and Peers
      6.2.1. Hierarchical Levels
      6.2.2. Route Reflection
      6.2.3. BGP Peer Groups with Dynamic Neighbors
      6.2.4. Fast External Failover
      6.2.5. BGP Fast Reroute With Prefix-Independent Convergence
        6.2.5.1. BGP FRR Failure Detection and Switchover
      6.2.6. Calculating Backup Paths
      6.2.7. Sending of BGP Communities
      6.2.8. BGP Decision Process
    6.3. BGP Route Tunnels
      6.3.1. Route Reflector Next-Hop-Self for VPN IPv4 Routes over IPv4 Labeled Routes
      6.3.2. Layer 2 Services and BGP Route Tunnel
      6.3.3. BGP Route Tunnel SDP Binding
      6.3.4. BGP Route Tunnel With Multihop EBGP Resolution
      6.3.5. Next-hop Resolution of BGP Labeled Routes to Tunnels
      6.3.6. BGP Next-Hop Resolution and Peer Tracking
      6.3.7. BGP Route Installation in the Route Table
      6.3.8. BGP Link State
        6.3.8.1. Supported BGP-LS Components
    6.4. Command Interactions and Dependencies
      6.4.1. Changing the Autonomous System Number
      6.4.2. Changing the Local AS Number
      6.4.3. Changing the Router ID at the Configuration Level
      6.4.4. Hold Time and Keepalive Timer Dependencies
      6.4.5. Import and Export Route Policies
      6.4.6. AS Override
      6.4.7. TCP MD5 Authentication
      6.4.8. TTL Security
      6.4.9. Advertise-Inactive
      6.4.10. Advertise-Inactive, Add-Paths, and Export Policy Interaction
    6.5. BGP Configuration Process Overview
    6.6. Configuration Notes
      6.6.1. General
      6.6.2. BGP Defaults
      6.6.3. BGP MIB Notes
    6.7. Configuring BGP with CLI
    6.8. BGP Configuration Overview
      6.8.1. Preconfiguration Requirements
      6.8.2. BGP Hierarchy
      6.8.3. Internal and External BGP Configurations
      6.8.4. BGP Route Reflectors
    6.9. Basic BGP Configuration
    6.10. Common Configuration Tasks
      6.10.1. Creating an Autonomous System
      6.10.2. Configuring a Router ID
    6.11. BGP Components
      6.11.1. Configuring BGP
      6.11.2. Configuring Group Attributes
      6.11.3. Configuring Neighbor Attributes
      6.11.4. Configuring BGP Address Families
      6.11.5. Configuring Route Reflection
      6.11.6. Configuring a BGP Peer Group with Dynamic Neighbors
    6.12. BGP Configuration Management Tasks
      6.12.1. Modifying an AS Number
      6.12.2. Modifying the BGP Router ID
      6.12.3. Modifying the Router-Level Router ID
      6.12.4. Deleting a Neighbor
      6.12.5. Deleting Groups
      6.12.6. Editing BGP Parameters
    6.13. BGP Command Reference
      6.13.1. Command Hierarchies
        6.13.1.1. Configuration Commands
          6.13.1.1.1. Global BGP Commands
          6.13.1.1.2. Group BGP Commands
          6.13.1.1.3. Neighbor BGP Commands
          6.13.1.1.4. Other BGP-Related Commands
        6.13.1.2. Show Commands
        6.13.1.3. Clear Commands
        6.13.1.4. Debug Commands
      6.13.2. Command Descriptions
        6.13.2.1. Configuration Commands
          6.13.2.1.1. Configuration Commands
          6.13.2.1.2. Other BGP-Related Commands
        6.13.2.2. Show Commands
        6.13.2.3. Clear Commands
        6.13.2.4. Debug Commands
  7. RIP
    7.1. RIP Overview
      7.1.1. RIP Versions
      7.1.2. RIPv2 Authentication
      7.1.3. Metrics
      7.1.4. Timers
      7.1.5. Import and Export Policies
      7.1.6. RIP Packet Format
      7.1.7. RIP Hierarchical Levels
    7.2. RIP Configuration Process Overview
    7.3. Configuration Notes
    7.4. Configuring RIP with CLI
    7.5. RIP Configuration Overview
      7.5.1. Preconfiguration Requirements
    7.6. Basic RIP Configuration
    7.7. Common Configuration Tasks
      7.7.1. Configuring Interfaces
      7.7.2. Configuring a Route Policy
    7.8. Configuring RIP Parameters
      7.8.1. Configuring Global-Level Parameters
      7.8.2. Configuring Group-Level Parameters
      7.8.3. Configuring Neighbor-Level Parameters
    7.9. RIP Configuration Management Tasks
      7.9.1. Modifying RIP Parameters
      7.9.2. Deleting a RIP Group
      7.9.3. Deleting a RIP Neighbor
    7.10. RIP Command Reference
      7.10.1. Command Hierarchies
        7.10.1.1. Configuration Commands
          7.10.1.1.1. Global RIP Commands
          7.10.1.1.2. Group RIP Commands
          7.10.1.1.3. Neighbor RIP Commands
        7.10.1.2. Show Commands
        7.10.1.3. Clear Commands
        7.10.1.4. Monitor Commands
        7.10.1.5. Debug Commands
      7.10.2. Command Descriptions
        7.10.2.1. Configuration Commands
          7.10.2.1.1. Generic Commands
          7.10.2.1.2. RIP Commands
        7.10.2.2. Show Commands
        7.10.2.3. Clear Commands
        7.10.2.4. Monitor Commands
        7.10.2.5. Debug Commands
  8. List of Acronyms
  9. Supported Standards and Protocols
  Customer Document and Product Support
7705 SAR Services Guide R23.4.R1
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. Technical Support
  2. 7705 SAR Services Configuration Process
  3. Services Overview
    3.1. Introduction to Services on the 7705 SAR
      3.1.1. Overview
      3.1.2. Service Types
      3.1.3. Service Policies
    3.2. Nokia Service Model
    3.3. Service Entities
      3.3.1. Customers
      3.3.2. Service Types
        3.3.2.1. Service Names
      3.3.3. Service Access Points (SAPs)
        3.3.3.1. SAP Encapsulation Types and Identifiers
          3.3.3.1.1. Ethernet Encapsulations
          3.3.3.1.2. SONET/SDH Encapsulations
          3.3.3.1.3. TDM and Serial (TDM) Encapsulations
          3.3.3.1.4. Service Types and SAP Encapsulations—Summary
        3.3.3.2. SAP Configuration Considerations
      3.3.4. Service Destination Points (SDPs)
        3.3.4.1. SDP Binding
        3.3.4.2. Spoke and Mesh SDPs
        3.3.4.3. SDPs and BGP Route Tunnels
        3.3.4.4. SDP Encapsulation Types
          3.3.4.4.1. MPLS Encapsulation
          3.3.4.4.2. GRE Encapsulation
          3.3.4.4.3. IP Encapsulation
        3.3.4.5. Spoke SDP Terminations
        3.3.4.6. SDP Ping
        3.3.4.7. SDP Keepalives
        3.3.4.8. Mixed-LSP SDPs
        3.3.4.9. Multiple Load-balancing LSPs Under a Single SDP
    3.4. High-Speed Download Packet Access Offload
      3.4.1. HSDPA Offload
        3.4.1.1. Failure Detection
    3.5. ETH-CFM (802.1ag and Y.1731)
      3.5.1. 802.1ag and Y.1731 Terminology
        3.5.1.1. MDs, MD Levels, MAs, and MEPs (802.1ag)
        3.5.1.2. MEG Levels, MEGs, and MEPs (Y.1731)
      3.5.2. ETH-CFM Frame Format
        3.5.2.1. ETH-CFM OAMPDU
        3.5.2.2. CFM Frame Processing
          3.5.2.2.1. Processing SAP 0 and SAP 0.* OAM Packets
        3.5.2.3. MEG-ID and ICC-Based Format
      3.5.3. ETH-CFM Functions and Tests
        3.5.3.1. ETH-CFM Ethernet OAM Tests
          3.5.3.1.1. Loopback
          3.5.3.1.2. Linktrace
          3.5.3.1.3. Throughput Measurement
          3.5.3.1.4. Continuity Check
          3.5.3.1.5. Remote Defect Indication
          3.5.3.1.6. Alarm Indication Signal
          3.5.3.1.7. Ethernet Test
      3.5.4. MEP Support (802.1ag and Y.1731)
        3.5.4.1. 802.1ag MEP Support on Ethernet SAPs
        3.5.4.2. 802.1ag and Y.1731 MEP Support on Ethernet Spoke SDPs and Mesh SDPs
        3.5.4.3. Y.1731 MEP Support on Ethernet SAPs
      3.5.5. Priority Mapping (802.1ag and Y.1731)
        3.5.5.1. Priority Mapping for SAP Up MEPs
        3.5.5.2. Priority Mapping for SAP Down MEPs
    3.6. G.8032 Ethernet Ring Protection Switching
      3.6.1. Overview of G.8032 Operation
      3.6.2. Ethernet Ring Sub-Rings
        3.6.2.1. Virtual and Non-Virtual Channel
          3.6.2.1.1. LAG Support
        3.6.2.2. OAM Considerations
        3.6.2.3. Support Service and Solution Combinations
    3.7. QinQ Support
      3.7.1. Overview of QinQ
      3.7.2. QinQ Support with Forced C-Tag Forwarding (VPLS only)
        3.7.2.1. Example 1: General QinQ Implementation
        3.7.2.2. Example 2: QinQ using VPLS with Ethernet SAPs
        3.7.2.3. Example 3: QinQ Using VPLS with ATM SAPs
      3.7.3. QinQ Support on Ethernet Ports
        3.7.3.1. Special QinQ SAP Identifiers
        3.7.3.2. QinQ Dot1p Match Behavior
        3.7.3.3. QinQ Top-Only Mark Option
        3.7.3.4. Maximum Number of VLAN Tags
      3.7.4. QinQ Configuration Overview
    3.8. Raw Socket IP Transport Service
      3.8.1. Remote Host Manual TCP Connection Check
      3.8.2. QoS Requirements for IP Transport
    3.9. Service Creation Overview
    3.10. Port and SAP CLI Identifiers
    3.11. Configuring Global Service Entities with CLI
    3.12. Service Model Entities
    3.13. Basic Configuration
    3.14. Common Configuration Tasks
      3.14.1. Configuring Customer Accounts
      3.14.2. Configuring SDPs
        3.14.2.1. Enabling IP Fragmentation for GRE SDPs
      3.14.3. Configuring Service Names
    3.15. ETH-CFM (802.1ag and Y.1731) Tasks
      3.15.1. Configuring ETH-CFM Parameters (802.1ag and Y.1731)
      3.15.2. Applying ETH-CFM Parameters
    3.16. Service Management Tasks
      3.16.1. Modifying Customer Accounts
      3.16.2. Deleting Customers
      3.16.3. Modifying SDPs
      3.16.4. Deleting SDPs
      3.16.5. Deleting LSP Associations
    3.17. Global Service Command Reference
      3.17.1. Command Hierarchies
        3.17.1.1. Global Service Configuration Commands
          3.17.1.1.1. Customer Commands
          3.17.1.1.2. SDP Commands
          3.17.1.1.3. SAP Commands
          3.17.1.1.4. Ethernet Ring Commands
          3.17.1.1.5. ETH-CFM Commands
        3.17.1.2. Show Commands
        3.17.1.3. Monitor Commands
      3.17.2. Command Descriptions
        3.17.2.1. Global Service Configuration Commands
          3.17.2.1.1. Generic Commands
          3.17.2.1.2. Customer Commands
          3.17.2.1.3. SDP Commands
          3.17.2.1.4. SDP Keepalive Commands
          3.17.2.1.5. Ethernet Ring Commands
        3.17.2.2. Show Commands
        3.17.2.3. Monitor Commands
  4. VLL Services
    4.1. ATM VLL (Apipe) Services
      4.1.1. ATM VLL for End-to-End ATM Service
      4.1.2. ATM Virtual Trunk Over an IP/MPLS Packet-Switched Network
      4.1.3. ATM SAP-to-SAP Service
      4.1.4. ATM Traffic Management Support
        4.1.4.1. Network Ingress Classification
        4.1.4.2. ATM Access Egress Queuing and Shaping
      4.1.5. Control Word
    4.2. Circuit Emulation VLL (Cpipe) Services
      4.2.1. Cpipe Service Overview
      4.2.2. TDM SAP-to-SAP Service
      4.2.3. Cpipe Service Modes
        4.2.3.1. Unstructured Mode (SAToP)
        4.2.3.2. SAToP Serial
          4.2.3.2.1. SAToP Serial Payload Size
          4.2.3.2.2. SAToP Serial Jitter Buffer
        4.2.3.3. SAToP Teleprotection Interface
        4.2.3.4. Structured Mode (CESoPSN)
      4.2.4. TDM PW Encapsulation
      4.2.5. Circuit Emulation Parameters and Options
        4.2.5.1. Unstructured
        4.2.5.2. Structured DS1/E1 CES without CAS
        4.2.5.3. Structured T1/E1 CES with CAS
        4.2.5.4. Packet Payload Size
        4.2.5.5. Jitter Buffer
          4.2.5.5.1. Configuration and Design Considerations
        4.2.5.6. Asymmetric Delay Control
          4.2.5.6.1. ADC for Redundant Paths
          4.2.5.6.2. Active Multipath
        4.2.5.7. Cpipe Network Latency Measurement
        4.2.5.8. RTP Header
        4.2.5.9. Control Word
      4.2.6. Transparent SDH/SONET Over Packet (TSoP)
      4.2.7.  Error Situations
    4.3. Ethernet VLL (Epipe) Services
      4.3.1. Epipe Service Overview
      4.3.2. Ethernet Access Egress Queuing and Scheduling
      4.3.3. Ethernet SAP-to-SAP
      4.3.4. Epipe with ATM SAPs
      4.3.5. MEF 8
        4.3.5.1. Epipe Service Modes
      4.3.6. Ethernet OAM
      4.3.7. Control Word
      4.3.8. MTU
      4.3.9. Raw and Tagged Modes
        4.3.9.1. Raw Mode
        4.3.9.2. Tagged Mode
        4.3.9.3. VLAN Translation
        4.3.9.4. Tagging Rules for Epipe
      4.3.10. IP Filters (Epipe)
      4.3.11. MPLS Entropy Label
      4.3.12. Security Zones and Epipes
    4.4. Frame Relay VLL (Fpipe) Services
      4.4.1. Fpipe Service Overview
      4.4.2. Frame Relay SAP-to-SAP Service
      4.4.3. Frame Relay Traffic Management
        4.4.3.1. Ingress SAP Classification and Marking
      4.4.4. Frame Relay Encapsulation
        4.4.4.1. Frame Relay PW Control Word
      4.4.5. Status Signaling and OAM Propagation
    4.5. HDLC VLL (Hpipe) Services
      4.5.1. Hpipe Service Overview
      4.5.2. HDLC VLL for End-to-End HDLC Service
      4.5.3. HDLC SAP-to-SAP Service
      4.5.4. HDLC Encapsulation
        4.5.4.1. HDLC PW Control Word and Payload Size
      4.5.5. Status Signaling
        4.5.5.1. OAM Propagation
    4.6. IP Interworking VLL (Ipipe) Services
      4.6.1. Ipipe Service Overview
      4.6.2. IP Interworking VLL Datapath
      4.6.3. CE IP Address Discovery and Distribution
        4.6.3.1. Manual IP Configuration
        4.6.3.2. CE IP Address Discovery Using ARP
        4.6.3.3. CE IP Address Discovery for Frame Relay
        4.6.3.4. CE IP Address Discovery for cHDLC
        4.6.3.5. CE IP Address Discovery for PPP/MLPPP
        4.6.3.6. CE IP Address Distribution to Remote PE Nodes
      4.6.4. IP SAP-to-SAP Service
      4.6.5. Hardware Support for Interworking IP PWs
      4.6.6. Control Word
      4.6.7. Termination at Access
        4.6.7.1. PPP and MLPPP Termination
        4.6.7.2. FR Termination
        4.6.7.3. cHDLC Termination
        4.6.7.4. PPP and MLPPP Termination on 2-port OC3/STM1 Channelized Adapter Cards
      4.6.8. Traffic Management
        4.6.8.1. Traffic Management for FR IW SAPs
      4.6.9. Status Signaling
        4.6.9.1. FR LMI
      4.6.10. IP Filters (Ipipe)
    4.7. Pseudowire Switching
      4.7.1. Overview
      4.7.2. Pseudowire Switching with Pseudowire Redundancy
      4.7.3. Pseudowire Switching Behavior
        4.7.3.1. Pseudowire Switching With IP Tunnels
      4.7.4. Pseudowire Switching TLV
    4.8. VLL Service Considerations
      4.8.1. Service Support
      4.8.2. SDPs
        4.8.2.1. SDP Statistics for VLL Services
      4.8.3. SAP Encapsulations and Pseudowire Types
      4.8.4. ATM PWE3 N-to-1 Cell Mode Encapsulation
        4.8.4.1. N-to-1 Cell Mode Encapsulation (N = 1)
          4.8.4.1.1. Deployment Scenario for N = 1 Cell Mode Encapsulation
          4.8.4.1.2. VPI/VCI Translation (N = 1)
          4.8.4.1.3. Cell Concatenation (N = 1)
          4.8.4.1.4. QoS and Traffic Descriptor Profiles (N = 1)
          4.8.4.1.5. OAM (N = 1)
        4.8.4.2. N-to-1 Cell Mode Encapsulation (N > 1)
          4.8.4.2.1. Deployment Scenario for N > 1 Cell Mode Encapsulation
          4.8.4.2.2. PW Optimization (N > 1)
          4.8.4.2.3. Overhead Optimization (N > 1)
          4.8.4.2.4. Cell Concatenation (N > 1)
          4.8.4.2.5. OAM (N > 1)
          4.8.4.2.6. Hardware Support for N > 1 Cell Mode Encapsulation
          4.8.4.2.7. SAP Support for N > 1
      4.8.5. SAP Aggregation Groups
        4.8.5.1. Configuration
          4.8.5.1.1. Sap-aggregation-group Keyword
          4.8.5.1.2. Sap-aggregation-group Group Identifier
          4.8.5.1.3. VPI/VCI Translation for SAP Aggregation Group Members (N>1)
        4.8.5.2. QoS and Traffic Descriptor Profiles (N > 1)
        4.8.5.3. Statistics and Counters
        4.8.5.4. Fault Management
      4.8.6. QoS Policies
      4.8.7. IP Filter Policies
      4.8.8. MTU Settings
        4.8.8.1. Targeted LDP and MTU
      4.8.9. QinQ (VLL Service)
      4.8.10. Pseudowire Control Word
      4.8.11. Pseudowire Redundancy
        4.8.11.1. PW Redundancy Operation
        4.8.11.2. Selecting the Active Spoke SDP for PW Redundancy Configuration
          4.8.11.2.1. Primary and Secondary Spoke SDPs
          4.8.11.2.2. Secondary Spoke SDPs Only
        4.8.11.3. PW Redundancy and Inter-Chassis Backup
        4.8.11.4. AIS Fault Propagation
      4.8.12. Active/Standby Mode for Pseudowire Redundancy (Standby Signaling)
        4.8.12.1. PW Status Signaling Label Withdrawal Option
          4.8.12.1.1. Interoperation with PEs that do not Support the PW Forwarding Standby Bit
          4.8.12.1.2. Multiple Remote PEs Connected to an r-VPLS Instance Via Spoke-SDP Termination
        4.8.12.2. Pseudowire Redundancy on Serial Data Interface Ports
    4.9. Configuring a VLL Service with CLI
    4.10. Common Configuration Tasks
    4.11. Configuring VLL Components
      4.11.1. Creating an Apipe Service
        4.11.1.1. Configuring Apipe SAP Parameters
        4.11.1.2. Configuring Apipe SDP Bindings
        4.11.1.3. Configuring Apipe SAP Aggregation Groups
        4.11.1.4. Configuring Apipe SAPs as Aggregation Group Members
      4.11.2. Creating a Cpipe Service
        4.11.2.1. Configuring Cpipe SAP Parameters
        4.11.2.2. Configuring Cpipe SDP Bindings
      4.11.3. Creating an Epipe Service
        4.11.3.1. Configuring Epipe SAP Parameters
        4.11.3.2. Configuring Epipe with ATM SAP
        4.11.3.3. Configuring Epipe SAP MEF 8 Parameters
        4.11.3.4. Configuring Epipe SAP Microwave Link Parameters for Interworking with TDM2Ethernet
        4.11.3.5. Configuring ATM Encapsulation Under Epipe Service (7705 SAR-M only)
        4.11.3.6. Configuring Epipe Spoke SDP Bindings
        4.11.3.7. Configuring a Security Zone Within an Epipe
      4.11.4. Creating an Fpipe Service
        4.11.4.1. Configuring Fpipe SAP Parameters
        4.11.4.2. Configuring Fpipe SDP Bindings
      4.11.5. Creating an Hpipe Service
        4.11.5.1. Configuring Hpipe SAP Parameters
        4.11.5.2. Configuring Hpipe SDP Bindings
      4.11.6. Creating an Ipipe Service
        4.11.6.1. Configuring Ipipe SAP Parameters
        4.11.6.2. Configuring Ipipe SDP Bindings
      4.11.7. Configuring PW Switching
      4.11.8. Configuring Ingress and Egress SAP Parameters
      4.11.9. Using the Control Word
      4.11.10. Configuring PW Redundancy
        4.11.10.1. Configuring PW Redundancy—Standby Signaling
        4.11.10.2. Configuring PW Redundancy—ICB
    4.12. Service Management Tasks
      4.12.1. Modifying Service Parameters
      4.12.2. Disabling a Service
      4.12.3. Re-enabling a Service
      4.12.4. Deleting a Service
    4.13. VLL Services Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VLL Services Configuration Commands
          4.13.1.1.1. Apipe Service Configuration Commands
          4.13.1.1.2. Apipe Service with SAP Aggregation Configuration Commands
          4.13.1.1.3. Cpipe Service Configuration Commands
          4.13.1.1.4. Epipe Service Configuration Commands
          4.13.1.1.5. Epipe Security Configuration Commands
          4.13.1.1.6. Fpipe Service Configuration Commands
          4.13.1.1.7. Hpipe Service Configuration Commands
          4.13.1.1.8. Ipipe Service Configuration Commands
        4.13.1.2. Show Commands
        4.13.1.3. Clear Commands
      4.13.2. Command Descriptions
        4.13.2.1. VLL Service Configuration Commands
          4.13.2.1.1. Generic Commands
          4.13.2.1.2. VLL Global Commands
          4.13.2.1.3. VLL SAP Commands
          4.13.2.1.4. SAP Aggregation Group Commands
          4.13.2.1.5. SAP cem Commands
          4.13.2.1.6. SAP QoS and IP Filter Policy Commands
          4.13.2.1.7. SAP Microwave Link Commands
          4.13.2.1.8. Service Billing Commands
          4.13.2.1.9. VLL SDP Commands
          4.13.2.1.10. SDP Cell Concatenation Commands
          4.13.2.1.11. ATM Commands
          4.13.2.1.12. Epipe Security Configuration Commands
        4.13.2.2. Show Commands
        4.13.2.3. Clear Commands
  5. VPLS
    5.1. VPLS Overview
      5.1.1. VPLS Packet Walkthrough
      5.1.2. Bridged Mobile Backhaul
      5.1.3. Multi-Tenant Unit (MTU) Termination
    5.2. VPLS Features
      5.2.1. VPLS Enhancements
      5.2.2. Fabric Mode
      5.2.3. Subscriber VLAN
      5.2.4. ATM Encapsulated Residential SAP
      5.2.5. VPLS over MPLS
      5.2.6. VPLS MAC Learning and Packet Forwarding
      5.2.7. Pseudowire Control Word
      5.2.8. Agent Circuit ID Insertion
      5.2.9. MAC Filters
      5.2.10. FDB Table Management
        5.2.10.1. FDB Size
        5.2.10.2. FDB Size Alarms
        5.2.10.3. Local and Remote Aging Timers
          5.2.10.3.1. Disable MAC Aging
          5.2.10.3.2. Disable MAC Learning
        5.2.10.4. Unknown MAC Discard
      5.2.11. VPLS and Rate Limiting Via QoS Policy
      5.2.12. MAC Move
      5.2.13. Split Horizon Groups (SAP and Spoke SDP)
        5.2.13.1. Residential Split Horizon Groups
      5.2.14. Multicast for VPLS and Routed VPLS (IGMP and MLD Snooping)
        5.2.14.1. Application Examples
        5.2.14.2. Group and Addressing Support
          5.2.14.2.1. IPv4 Multicast Support
          5.2.14.2.2. IPv6 Layer 2 Multicast Support and Group Address
        5.2.14.3. IP Multicast in r-VPLS
          5.2.14.3.1. IPv6 Multicast Forwarding Behavior in r-VPLS
        5.2.14.4. Multicast Router Ports
        5.2.14.5. Tagged Access Traffic
        5.2.14.6. Hardware Support
      5.2.15. PIM Snooping for VPLS
        5.2.15.1. Snooping versus Proxy Mode
      5.2.16. MPLS Entropy Label
      5.2.17. Ethernet OAM
      5.2.18. Security Zones and VPLS
    5.3. Routed VPLS
      5.3.1. IES or VPRN IP Interface Binding
        5.3.1.1. Assigning a Service Name to a VPLS Service
        5.3.1.2. Binding a Service Name to an IP Interface
        5.3.1.3. Removing a Bound VPLS Service or Service Name
        5.3.1.4. IP Interface and VPLS Operational State Coordination
      5.3.2. IP Interface MTU and Fragmentation
      5.3.3. ARP/ND and VPLS FIB Interactions
        5.3.3.1. Routed VPLS Specific ARP/ND Cache Behavior
      5.3.4. The allow-ip-int-binding VPLS Flag
        5.3.4.1. VPLS Feature Restrictions (due to allow-ip-int-binding)
      5.3.5. DSCP Marking
      5.3.6. VPLS Ingress IP Filter Override
      5.3.7. Routed VPLS Supported Routing-Related Protocols
    5.4. VPLS and Spanning Tree Protocol
      5.4.1. VPLS Redundancy
        5.4.1.1. Spoke SDP Redundancy for Metro Interconnection
        5.4.1.2. Spoke SDP-Based Redundant Access
      5.4.2. VPLS Access Redundancy
        5.4.2.1. STP-Based Redundant Access to VPLS
      5.4.3. MAC Flush Message Processing
        5.4.3.1. Dual Homing to a VPLS Service
    5.5. ATM PVC Access and Termination on a VPLS Service
    5.6. VPLS Service Considerations
      5.6.1. SAP Encapsulations
      5.6.2. VLAN Processing
        5.6.2.1. Tagging Rules for VPLS
      5.6.3. QinQ (VPLS)
    5.7. Configuration Notes
    5.8. Configuring a VPLS Service with CLI
    5.9. Basic Configuration
    5.10. Common Configuration Tasks
    5.11. Configuring VPLS Components
      5.11.1. Creating a VPLS Service
      5.11.2. Creating a Split Horizon Group
      5.11.3. Enabling MAC Move
      5.11.4. Configuring STP Bridge Parameters in a VPLS
        5.11.4.1. Bridge STP Admin State
        5.11.4.2. Mode
        5.11.4.3. Bridge Priority
        5.11.4.4. Hello Time
        5.11.4.5. Hold Count
    5.12. Configuring a VPLS SAP
      5.12.1. Local VPLS SAPs
      5.12.2. Distributed VPLS SAPs
      5.12.3. Configuring SAP-Specific STP Parameters
        5.12.3.1. SAP STP Administrative State
        5.12.3.2. SAP Virtual Port Number
        5.12.3.3. SAP Priority
        5.12.3.4. SAP Path Cost
        5.12.3.5. SAP Edge Port
        5.12.3.6. SAP Auto Edge
        5.12.3.7. SAP Link Type
      5.12.4. STP SAP Operational States
        5.12.4.1. Operationally Disabled
        5.12.4.2. Operationally Discarding
        5.12.4.3. Operationally Learning
        5.12.4.4. Operationally Forwarding
      5.12.5. Configuring VPLS SAPs with Split Horizon
    5.13. Configuring SDP Bindings
      5.13.1. Configuring Mesh SDP Bindings
      5.13.2. Configuring Spoke SDPs
        5.13.2.1. Configuring Spoke SDP Bindings
        5.13.2.2. Configuring Spoke SDP-Specific STP Parameters
          5.13.2.2.1. Spoke SDP STP Administrative State
          5.13.2.2.2. Spoke SDP Virtual Port Number
          5.13.2.2.3. Spoke SDP Priority
          5.13.2.2.4. Spoke SDP Path Cost
          5.13.2.2.5. Spoke SDP Edge Port
          5.13.2.2.6. Spoke SDP Auto Edge
          5.13.2.2.7. Spoke SDP Link Type
      5.13.3. Configuring VPLS Spoke SDPs with Split Horizon
      5.13.4. Configuring Selective MAC Flush
    5.14. Configuring Routed VPLS
    5.15. Configuring IP Multicast in VPLS
    5.16. Configuring IP Multicast in r-VPLS
    5.17. Configuring Multicast Parameters for VPLS and r-VPLS
    5.18. Configuring a Static Multicast Group
    5.19. Configuring PIM Snooping for VPLS
    5.20. Configuring a Security Zone Within a VPLS
    5.21. Service Management Tasks
      5.21.1. Modifying VPLS Service Parameters
      5.21.2. Modifying Management VPLS Parameters
      5.21.3. Deleting a Management VPLS
      5.21.4. Disabling a Management VPLS
      5.21.5. Deleting a VPLS Service
      5.21.6. Disabling a VPLS Service
      5.21.7. Re-enabling a VPLS Service
    5.22. VPLS Command Reference
      5.22.1. Command Hierarchies
        5.22.1.1. VPLS Service Configuration Commands
          5.22.1.1.1. Global Commands
          5.22.1.1.2. SAP Commands
          5.22.1.1.3. Mesh SDP Commands
          5.22.1.1.4. Spoke SDP Commands
          5.22.1.1.5. Routed VPLS Commands
          5.22.1.1.6. VPLS Security Configuration Commands
        5.22.1.2. Show Commands
        5.22.1.3. Clear Commands
        5.22.1.4. Debug Commands
      5.22.2. Command Descriptions
        5.22.2.1. VPLS Service Configuration Commands
          5.22.2.1.1. Generic Commands
          5.22.2.1.2. VPLS Service Commands
          5.22.2.1.3. VPLS SAP Commands
          5.22.2.1.4. VPLS SAP ATM Commands
          5.22.2.1.5. VPLS IGMP and MLD Snooping Commands
          5.22.2.1.6. VPLS STP Commands
          5.22.2.1.7. VPLS Filter and QoS Policy Commands
          5.22.2.1.8. Service Billing Commands
          5.22.2.1.9. VPLS SAP DHCP Commands
          5.22.2.1.10. VPLS SDP Commands
        5.22.2.2. Routed VPLS Configuration Commands
        5.22.2.3. VPLS Security Configuration Commands
        5.22.2.4. VPLS Show Commands
        5.22.2.5. VPLS Clear Commands
        5.22.2.6. VPLS Debug Commands
  6. Internet Enhanced Service
    6.1. IES for In-band Management
      6.1.1. Setting Up Connections Between the NSP NFM-P and the 7705 SAR
      6.1.2. Encapsulation
      6.1.3. Layer 2 and Layer 3 Traffic Management
      6.1.4. Troubleshooting and Fault Detection Services
      6.1.5. IP ECMP Load Balancing
    6.2. IES for Customer Traffic
      6.2.1. DHCP Relay and DHCPv6 Relay
        6.2.1.1. DHCP Relay
          6.2.1.1.1. DHCP Options
        6.2.1.2. DHCPv6 Relay
          6.2.1.2.1. DHCPv6 Options
      6.2.2. IPCP
      6.2.3. IPSec Support
      6.2.4. Security Zones and IES
      6.2.5. Proxy ARP
      6.2.6. Configurable ARP Retry Timer
      6.2.7. Unnumbered Interfaces
      6.2.8. Troubleshooting and Fault Detection Services
      6.2.9. VRRP on IES Interfaces
      6.2.10. SAPs
        6.2.10.1. Encapsulations
        6.2.10.2. Routing Protocols
        6.2.10.3. QoS Policies
        6.2.10.4. QinQ (IES)
        6.2.10.5. IP Filter Policies on an IES SAP
      6.2.11. Spoke SDP Termination to IES
      6.2.12. Bandwidth Optimization for Low-speed Links
        6.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
      6.2.13. Hold Up and Hold Down Timers for IP Interfaces
    6.3. Configuring IES with CLI
    6.4. Common Configuration Tasks
    6.5. Configuring IES Components
      6.5.1. Creating an IES Service
      6.5.2. Configuring IES Interface Parameters
        6.5.2.1. IES Management Service
        6.5.2.2. IES Service
        6.5.2.3. IES IPv6 Service
      6.5.3. Configuring IES SAP Parameters
        6.5.3.1. IES Management SAP
        6.5.3.2. IES Service SAP
      6.5.4. Configuring IES Spoke SDP Parameters
      6.5.5. Configuring VRRP
      6.5.6. Configuring a Security Zone Within IES
      6.5.7. Configuring Serial Raw Socket Transport Within IES
    6.6. Service Management Tasks
      6.6.1. Modifying IES Service Parameters
      6.6.2. Disabling an IES Service
      6.6.3. Re-enabling an IES Service
      6.6.4. Deleting an IES Service
    6.7. IES Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Configuration Commands
          6.7.1.1.1. IES Management Configuration Commands
          6.7.1.1.2. IES Service Configuration Commands
          6.7.1.1.3. Routed VPLS Commands
          6.7.1.1.4. VRRP Commands
          6.7.1.1.5. IES Security Zone Configuration Commands
          6.7.1.1.6. IES Raw Socket IP Transport Configuration Commands
        6.7.1.2. Show Commands
        6.7.1.3. Clear Commands
        6.7.1.4. Debug Commands
      6.7.2. Command Descriptions
        6.7.2.1. IES Generic Configuration Commands
        6.7.2.2. IES Global Configuration Commands
        6.7.2.3. IES Management Configuration Commands
          6.7.2.3.1. IES Management Interface Commands
          6.7.2.3.2. IES Management SAP Commands
        6.7.2.4. IES Service Configuration Commands
          6.7.2.4.1. IES Service Interface Commands
          6.7.2.4.2. IES Service IPv6 Commands
          6.7.2.4.3. IES Service VRRP Commands
          6.7.2.4.4. IES Service SAP Commands
          6.7.2.4.5. IES Service Spoke SDP Commands
          6.7.2.4.6. Routed VPLS Commands
          6.7.2.4.7. IES Service Security Zone Configuration Commands
          6.7.2.4.8. IES Raw Socket IP Transport Configuration Commands
        6.7.2.5. Show Commands
        6.7.2.6. Clear Commands
        6.7.2.7. Debug Commands
  7. VPRN Services
    7.1. VPRN Service Overview
      7.1.1. Routing Prerequisites
      7.1.2. BGP Support
        7.1.2.1. BGP Fast Reroute with Prefix-Independent Convergence in a VPRN
        7.1.2.2. BGP Next-Hop Resolution and Peer Tracking
      7.1.3. IPSec Support
      7.1.4. Security Zones and VPRN
      7.1.5. Static One-to-One NAT and VPRN
      7.1.6. Unicast and Multicast Address Translation
      7.1.7. Route Distinguishers
        7.1.7.1. PE-to-CE Route Exchange
          7.1.7.1.1. Route Redistribution
          7.1.7.1.2. CPE Connectivity Check
      7.1.8. Route Target Constraint
        7.1.8.1. Configuring the Route Target Address Family
        7.1.8.2. Originating RTC Routes
        7.1.8.3. Receiving and Readvertising RTC Routes
        7.1.8.4. Using RTC Routes
      7.1.9. In-Band Management using a VPRN
    7.2. VPRN Features
      7.2.1. IP Interfaces
        7.2.1.1. Unnumbered Interfaces
        7.2.1.2. DHCP and DHCPv6
          7.2.1.2.1. DHCP Relay and DHCPv6 Relay
          7.2.1.2.2. Local DHCP and DHCPv6 Server
        7.2.1.3. IPCP
        7.2.1.4. Troubleshooting and Fault Detection Services
        7.2.1.5. VRRP on VPRN Interfaces
        7.2.1.6. IP ECMP Load Balancing
        7.2.1.7. Proxy ARP
        7.2.1.8. Configurable ARP Retry Timer
        7.2.1.9. Hold Up and Hold Down Timers for IP Interfaces
      7.2.2. SAPs
        7.2.2.1. Encapsulations
        7.2.2.2. QoS Policies
          7.2.2.2.1. CoS Marking for Self-generated Traffic
        7.2.2.3. QinQ (VPRN)
        7.2.2.4. Filter Policies on a VPRN SAP
      7.2.3. PE-to-CE Routing Protocols
        7.2.3.1. Using OSPF or OSPFv3 in IP VPNs
          7.2.3.1.1. DN Bit
        7.2.3.2. TTL Security
      7.2.4. PE-to-PE Tunneling Mechanisms
      7.2.5. Per-VRF Route Limiting
      7.2.6. RIP Metric Propagation in VPRNs
      7.2.7. Multicast VPN (MVPN)
        7.2.7.1. Multicast in IP-VPN Applications
        7.2.7.2. MVPN Building Blocks
          7.2.7.2.1. PMSI
          7.2.7.2.2. MVPN Using BGP Control Plane
          7.2.7.2.3. Auto-Discovery
          7.2.7.2.4. PE-CE Multicast Protocols and Services
          7.2.7.2.5. PE-PE Transmission of C-Multicast Routing Using BGP
          7.2.7.2.6. PE-PE Multicast Protocols
          7.2.7.2.7. PE-PE Multicast Data Transmission
        7.2.7.3. Provider Tunnel Support
          7.2.7.3.1. Point-to-Multipoint I-PMSI and S-PMSI
          7.2.7.3.2. Point-to-Multipoint LDP I-PMSI and S-PMSI
          7.2.7.3.3. Point-to-Multipoint LSP S-PMSI
          7.2.7.3.4. MVPN Sender-only and Receiver-only
        7.2.7.4. Inter-AS and Intra-AS Solutions
          7.2.7.4.1. 7705 SAR as Source of Non-Segmented Inter-AS or Intra-AS Network
        7.2.7.5. NG-MVPN Non-segmented Inter-AS Solution
          7.2.7.5.1. Non-Segmented Inter-AS VPN Option C Support
          7.2.7.5.2. Configuration Example
          7.2.7.5.3. Inter-AS Non-segmented mLDP
          7.2.7.5.4. ECMP
        7.2.7.6. Mrinfo and Mtrace
        7.2.7.7. Multicast-only Fast Reroute (MoFRR)
        7.2.7.8. mLDP Point-to-Multipoint Support
        7.2.7.9. mLDP Fast Upstream Switchover
        7.2.7.10. Multicast Source Discovery Protocol
      7.2.8. VPRN Auto-binding Tunnels
      7.2.9. Spoke SDPs
      7.2.10. Spoke SDP Termination to VPRN
      7.2.11. IPv6 on Virtual Private Edge Router
      7.2.12. IPv6 over IPv4 LAN-to-LAN IPSec Tunnels
      7.2.13. Bandwidth Optimization for Low-speed Links
        7.2.13.1. OAM Diagnostics Restrictions with Lower IP MTU
      7.2.14. Support for NTP
    7.3. Configuring a VPRN Service with CLI
    7.4. Basic Configuration
    7.5. Common Configuration Tasks
    7.6. Configuring VPRN Components
      7.6.1. Creating a VPRN Service
      7.6.2. Configuring Global VPRN Parameters
      7.6.3. Configuring Router Interfaces
      7.6.4. Configuring Static Route Entries for VPRN
      7.6.5. Configuring BGP for VPRN
        7.6.5.1. Configuring VPRN BGP Group and Neighbor Parameters
        7.6.5.2. Configuring Route Reflection
        7.6.5.3. VPRN BGP CLI Syntax
      7.6.6. Configuring IPv6 Parameters for VPRN BGP
      7.6.7. Configuring VPRN IPv6 Neighbor Discovery Parameters
      7.6.8. Configuring OSPF or OSPFv3 for VPRN
      7.6.9. Configuring RIP for VPRN
      7.6.10. Configuring IGMP for VPRN
      7.6.11. Configuring PIM for VPRN
      7.6.12. Configuring MVPN for VPRN
      7.6.13. Configuring a VPRN Interface
      7.6.14. Configuring a VPRN IPv6 Interface
      7.6.15. Configuring VPRN Interface Routed VPLS IPv6 Parameters
      7.6.16. Configuring VPRN Interface SAP Parameters
      7.6.17. Configuring VPRN Interface SAP IPv6 Parameters
      7.6.18. Configuring VPRN Interface Spoke SDP Parameters
      7.6.19. Configuring VPRN Interface Spoke SDP IPv6 Parameters
      7.6.20. Configuring VRRP
      7.6.21. Configuring a Security Zone Within a VPRN
      7.6.22. Configuring Serial Raw Socket Transport Within VPRN
      7.6.23. Configuring VPRN Router Advertisement
    7.7. Service Management Tasks
      7.7.1. Modifying VPRN Service Parameters
      7.7.2. Deleting a VPRN Service
      7.7.3. Disabling a VPRN Service
      7.7.4. Re-enabling a VPRN Service
    7.8. VPRN Services Command Reference
      7.8.1. Command Hierarchies
        7.8.1.1. Configuration Commands
          7.8.1.1.1. VPRN Service Configuration Commands
          7.8.1.1.2. BGP Commands
          7.8.1.1.3. OSPF Commands
          7.8.1.1.4. OSPFv3 Commands
          7.8.1.1.5. IGMP Commands
          7.8.1.1.6. PIM Commands
          7.8.1.1.7. RIP Commands
          7.8.1.1.8. VPRN Security Zone Configuration Commands
          7.8.1.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.1.1.10. Multicast VPN Commands
          7.8.1.1.11. MSDP Commands
          7.8.1.1.12. Router Advertisement Commands
          7.8.1.1.13. Local DHCP and DHCPv6 Server Commands
          7.8.1.1.14. Interface Commands
          7.8.1.1.15. IPv6 Interface Commands
          7.8.1.1.16. Interface DHCP Commands
          7.8.1.1.17. Interface ICMP Commands
          7.8.1.1.18. Interface SAP IPSec-Tunnel Commands
          7.8.1.1.19. Routed VPLS Commands
          7.8.1.1.20. Interface VRRP Commands
          7.8.1.1.21. VPRN Static One-to-One NAT Configuration Commands
          7.8.1.1.22. TWAMP Light Commands
          7.8.1.1.23. VPRN NTP Commands
        7.8.1.2. Show Commands
        7.8.1.3. Clear Commands
        7.8.1.4. Debug Commands
      7.8.2. Command Descriptions
        7.8.2.1. VPRN Service Configuration Commands
          7.8.2.1.1. Generic Commands
          7.8.2.1.2. Global Commands
          7.8.2.1.3. BGP Commands
          7.8.2.1.4. OSPF and OSPFv3 Commands
          7.8.2.1.5. IGMP Commands
          7.8.2.1.6. PIM Commands
          7.8.2.1.7. RIP Commands
          7.8.2.1.8. VPRN Security Configuration Commands
          7.8.2.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.2.1.10. Multicast VPN Commands
          7.8.2.1.11. MSDP Commands
          7.8.2.1.12. Router Advertisement Commands
          7.8.2.1.13. Local DHCP and DHCPv6 Server Commands
          7.8.2.1.14. Interface Commands
          7.8.2.1.15. IPv6 Interface Commands
          7.8.2.1.16. Interface DHCP Commands
          7.8.2.1.17. Interface ICMP Commands
          7.8.2.1.18. Interface SAP Commands
          7.8.2.1.19. Interface Spoke SDP Commands
          7.8.2.1.20. Routed VPLS Commands
          7.8.2.1.21. Interface VRRP Commands
          7.8.2.1.22. VPRN Static One-to-One NAT Configuration Commands
          7.8.2.1.23. TWAMP Light Commands
          7.8.2.1.24. VPRN NTP Commands
        7.8.2.2. Show Service Commands
        7.8.2.3. Show Router Commands
        7.8.2.4. Clear Service Commands
        7.8.2.5. Debug MSDP Commands
        7.8.2.6. Debug Service Commands
  8. IPSec
    8.1. IPSec Overview
      8.1.1. IPSec Implementation
        8.1.1.1. IPSec Overview
        8.1.1.2. Hardware Support
        8.1.1.3. IPSec Encryption Features
        8.1.1.4. SHA2 Support
        8.1.1.5. IPSec Security Policy, IKE Policy, and IPSec Transform
        8.1.1.6. IKEv2 Fragmentation
        8.1.1.7. Tunnel Group
        8.1.1.8. Tunnel Interfaces and SAPs
          8.1.1.8.1. Public Tunnel SAPs
          8.1.1.8.2. Private Tunnel SAPs
          8.1.1.8.3. IP Interface Configuration
        8.1.1.9. IPSec Tunnel Configuration
        8.1.1.10. IPSec over MPLS with Public Service IES
        8.1.1.11. IPSec Transport Tunnels with Public Service VPRN
        8.1.1.12. GRE-Encapsulated VLLs/VPLS over IPSec VPNs
        8.1.1.13. GRE-Encapsulated VLLs/VPLS over IPSec over MPLS
          8.1.1.13.1. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 Label Routes) Solution 1: Changing BGP Signaling to Loopback Interface
          8.1.1.13.2. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 label Routes) Solution 2: GRE to Local Interface on 7705 SAR
          8.1.1.13.3. VLLs/VPLS over IPSec over MPLS (Using IGP Shortcuts)
      8.1.2. X.509v3 Certificate Overview
        8.1.2.1. X.509v3 Certificate Support on the 7705 SAR
        8.1.2.2. Local Storage
        8.1.2.3. CA Profile
        8.1.2.4. CA Chain Computation
        8.1.2.5. Certificate Enrollment
        8.1.2.6. Certificate Revocation Check
        8.1.2.7. Certificate, CRL, and Key Cache
      8.1.3. Using Certificates For IPSec Tunnel Authentication
      8.1.4. Trust Anchor Profile
      8.1.5. Certificate Profile
      8.1.6. Certificate Management Protocol Version 2 (CMPv2)
      8.1.7. OCSP
      8.1.8. Applications
        8.1.8.1. Metrocell Deployment
        8.1.8.2. Small Business Deployment
      8.1.9. NAT-Traversal for IKEv1/v2 and IPSec
      8.1.10. BFD over IPSec Tunnel
      8.1.11. QoS for IPSec
        8.1.11.1. Network and Access Ingress QoS (Decryption QoS)
          8.1.11.1.1. Network Ingress QoS Tunnel Override
        8.1.11.2. Network and Access Egress QoS (Encryption QoS)
      8.1.12. Fragmentation and IP MTU
        8.1.12.1. Fragmentation Configuration
        8.1.12.2. Reassembly
      8.1.13. Support for Private VPRN Service Features
      8.1.14. Routing in Private Services
      8.1.15. IPSec on the 10-port 1GigE/1-port 10GigE X-Adapter Card
      8.1.16. IPSec Sequence Number
      8.1.17. PBR and MFC
        8.1.17.1. PBR
        8.1.17.2. MFC
      8.1.18. OSPFv3 Packet Authentication with IPv6 IPSec
      8.1.19. Network Security with IPv6 IPSec
      8.1.20. IPSec Over r-VPLS on a Public Service
      8.1.21. Statistics
      8.1.22. Security Support
    8.2. Public Key Infrastructure (PKI)
      8.2.1. CA Role in PKI
      8.2.2. Digital Signature and Certificates
        8.2.2.1. Certificates
          8.2.2.1.1. Vendor Certificate Signature by the Root CA
          8.2.2.1.2. Vendor Certificate Authentication by a Peer
          8.2.2.1.3. Example of PKI Operation
          8.2.2.1.4. Certificate Chain
      8.2.3. Certificate Storage
      8.2.4. CMPv2 Certificate Management
        8.2.4.1. CMPv2 Initial Registration
        8.2.4.2. Key Update
        8.2.4.3. CRL
      8.2.5. OCSP
      8.2.6. Certificate or CRL Expiration Warning
      8.2.7. Automatic CRL Update
    8.3. Best Practices Recommendations
      8.3.1. IPSec Best Practices
    8.4. Configuration Notes
    8.5. Configuring IPSec with CLI
    8.6. Basic Configuration Overview
    8.7. Common Configuration Tasks
      8.7.1. Configuring an IPSec Tunnel Group
      8.7.2. Configuring Router Interfaces for IPSec
      8.7.3. Configuring IPSec Parameters
      8.7.4. Configuring IPSec and IPSec Tunnels in Services
      8.7.5. Configuring IPSec IPv6 Parameters for a VPRN Private Service
      8.7.6. Configuring X.509v3 Certificate Parameters
      8.7.7. Configuring CMPv2
      8.7.8. Configuring OCSP
    8.8. Configuring IPSec over MPLS
      8.8.1. IPSec over BGP 3107 Label Route
        8.8.1.1. Static LAN-to-LAN Tunnel Configuration
        8.8.1.2. Policy Option Configuration
        8.8.1.3. BGP Configuration with BGP 3107 Label Route Advertisement
        8.8.1.4. LDP or RSVP-TE Tunnel Configuration
      8.8.2. IPSec over IGP Shortcut
        8.8.2.1. Static LAN-to-LAN Tunnel Configuration
        8.8.2.2. IGP Shortcut Configuration
        8.8.2.3. RSVP-TE LSP Configuration
    8.9. Service Management Tasks
      8.9.1. Deleting an IPSec IKE Policy or an IPSec Transform
      8.9.2. Deleting a Public-Side IPSec Tunnel SAP and Interface
      8.9.3. Deleting a Private-Side IPSec Tunnel SAP and Interface
      8.9.4. Deleting an IPSec Security Policy
      8.9.5. Deleting an IPSec Tunnel
    8.10. IPSec Command Reference
      8.10.1. Command Hierarchies
        8.10.1.1. IPSec Configuration Commands
          8.10.1.1.1. ISA Tunnel Commands
          8.10.1.1.2. IPSec Commands
          8.10.1.1.3. Service Configuration Commands
          8.10.1.1.4. Service Interface Tunnel Commands
          8.10.1.1.5. Service Static Route Commands
        8.10.1.2. PKI Configuration Commands
          8.10.1.2.1. X.509 and Certificate Commands
          8.10.1.2.2. PKI Infrastructure Commands
          8.10.1.2.3. IPSec PKI Commands
          8.10.1.2.4. Automatic CRL Update Commands
        8.10.1.3. Show Commands
        8.10.1.4. Clear Commands
        8.10.1.5. Debug Commands
      8.10.2. Command Descriptions
        8.10.2.1. IPSec Configuration Commands
          8.10.2.1.1. Generic Commands
          8.10.2.1.2. ISA Tunnel Commands
          8.10.2.1.3. Internet Key Exchange (IKE) and Transform Commands
          8.10.2.1.4. Service Configuration Commands
          8.10.2.1.5. Service Interface Tunnel Commands
        8.10.2.2. PKI Configuration Commands
          8.10.2.2.1. X.509 and Certificate Commands
          8.10.2.2.2. PKI Infrastructure Commands
          8.10.2.2.3. IPSec PKI Commands
          8.10.2.2.4. Automatic CRL Update Commands
        8.10.2.3. Show Commands
        8.10.2.4. Clear Commands
        8.10.2.5. Debug Commands
  9. Network Group Encryption
    9.1. NGE Overview
      9.1.1. NGE Key Groups and Encryption Partitions
      9.1.2. NGE Domains
        9.1.2.1. Private IP/MPLS Network NGE Domain
        9.1.2.2. Private Over Intermediary Network NGE Domain
      9.1.3. Network Services Platform Management
    9.2. Key Groups
      9.2.1. Key Group Algorithms
        9.2.1.1. Encapsulating Security Payload (ESP)
      9.2.2. Security Associations (SAs)
        9.2.2.1. Active Outbound SA
    9.3. Services Encryption
      9.3.1. Services Encryption Overview
      9.3.2. Assigning Key Groups to Services
      9.3.3. Pseudowire Switching for NGE Traffic
      9.3.4. Pseudowire Control Word for NGE Traffic
      9.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
      9.3.6. NGE and RFC 3107
      9.3.7. NGE for NG-MVPN
    9.4. Router Interface Encryption
      9.4.1. Router Interface NGE Domain Concepts
      9.4.2. GRE-MPLS Packets Inside the NGE Domain
      9.4.3. Router Encryption Exceptions using ACLs
      9.4.4. IPSec Packets Crossing an NGE Domain
      9.4.5. Multicast Packets Traversing the NGE Domain
      9.4.6. Assigning Key Groups to Router Interfaces
      9.4.7. Router Interface NGE Firewall Considerations
      9.4.8. NGE and BFD Support
      9.4.9. NGE and ACL Interactions
      9.4.10. Router Interface NGE and ICMP Interactions Over the NGE Domain
      9.4.11. OAM Considerations for Router Interface Encryption
    9.5. Layer 2 Encryption
    9.6. NGE Packet Overhead and MTU Considerations
      9.6.1. GRE Fragmentation for NGE Packets
    9.7. 1588v2 Encryption With NGE
    9.8. QoS for NGE Traffic
      9.8.1. Network Ingress
      9.8.2. Network Egress
    9.9. Statistics
    9.10. Remote Network Monitoring (RMON) Support
    9.11. Configuration Notes
    9.12. Configuring NGE with the CLI
    9.13. Basic NGE Configuration Overview
    9.14. Configuring NGE Components
      9.14.1. Configuring the Global Encryption Label
      9.14.2. Configuring a Key Group
      9.14.3. Assigning a Key Group to an SDP or VPRN Service
      9.14.4. Assigning a Key Group to a Router Interface
      9.14.5. Assigning a Key Group to an Ethernet Port
    9.15. NGE Management Tasks
      9.15.1. Modifying a Key Group
      9.15.2. Removing a Key Group
        9.15.2.1. Removing a Key Group from an SDP or VPRN Service
        9.15.2.2. Removing a Key Group from a Router Interface
        9.15.2.3. Removing a Key Group from an Ethernet Port
      9.15.3. Changing Key Groups
        9.15.3.1. Changing the Key Group for an SDP or VPRN Service
        9.15.3.2. Changing the Key Group for a Router Interface
        9.15.3.3. Changing the Key Group for an Ethernet Port
      9.15.4. Deleting a Key Group from a 7705 SAR
    9.16. NGE Command Reference
      9.16.1. Command Hierarchies
        9.16.1.1. Configuration Commands
          9.16.1.1.1. NGE Commands
          9.16.1.1.2. Services Commands
          9.16.1.1.3. Router Interface Encryption Commands
          9.16.1.1.4. Ethernet Port Encryption Commands
        9.16.1.2. Show Commands
        9.16.1.3. Clear Commands
      9.16.2. Command Descriptions
        9.16.2.1. Configuration Commands
          9.16.2.1.1. Generic Commands
          9.16.2.1.2. Group Encryption Commands
        9.16.2.2. Show Commands
        9.16.2.3. Clear Commands
  10. Ethernet Virtual Private Networks
    10.1. Overview and EVPN Applications
      10.1.1. EVPN for MPLS Tunnels in E-LAN Services
      10.1.2. EVPN for MPLS Tunnels in E-Line Services
    10.2. EVPN for MPLS Tunnels
      10.2.1. BGP-EVPN Control Plane for MPLS Tunnels
        10.2.1.1. EVPN Route Type 2 – MAC/IP Advertisement Route
        10.2.1.2. EVPN Route Type 3 – Inclusive Multicast Ethernet Tag Route
        10.2.1.3. EVPN Route Type 1 – Ethernet Auto-Discovery Route (AD Route)
        10.2.1.4. EVPN Route Type 4 – Ethernet Segment Route (ES Route)
        10.2.1.5. EVPN Route Type 5 – IP Prefix Route
        10.2.1.6. RFC 5512 – BGP Tunnel Encapsulation Extended Community
      10.2.2. EVPN-VPLS for MPLS Tunnels
        10.2.2.1. Overview
        10.2.2.2. EVPN and VPLS Integration
        10.2.2.3. Auto-derived Route Distinguisher (RD) in Services
        10.2.2.4. EVPN Multihoming in VPLS Services
          10.2.2.4.1. EVPN All-Active Multihoming
          10.2.2.4.2. EVPN Single-Active Multihoming
      10.2.3. EVPN-VPWS for MPLS Tunnels
        10.2.3.1. BGP-EVPN Control Plane for EVPN-VPWS
        10.2.3.2. EVPN for MPLS Tunnels in Epipe Services
        10.2.3.3. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
        10.2.3.4. EVPN Multihoming for EVPN-VPWS Services
      10.2.4. EVPN for MPLS Tunnels in r-VPLS Services
        10.2.4.1. Overview
        10.2.4.2. EVPN-MPLS Multihoming and Passive VRRP
      10.2.5. MPLS Entropy Label
      10.2.6. Preference-Based and Non-Revertive Designated Forwarder Election
    10.3. General EVPN Topics
      10.3.1. BGP-EVPN MAC Mobility
      10.3.2. BGP-EVPN MAC Duplication
      10.3.3. Conditional Static MAC and Protection
      10.3.4. Blackhole MAC
      10.3.5. CFM Interaction with EVPN Services
      10.3.6. BGP and EVPN Route Selection for EVPN Routes
      10.3.7. Interaction of EVPN and Other Features
        10.3.7.1. Interaction of EVPN-MPLS with Existing VPLS Features
        10.3.7.2. Routing Policies for BGP-EVPN IP Prefixes
    10.4. Configuring an EVPN Service With CLI
      10.4.1. EVPN All-Active Multihoming Configuration Example
      10.4.2. EVPN Single-Active Multihoming Configuration Example
      10.4.3. EVPN-MPLS r-VPLS Configuration Examples
        10.4.3.1. EVPN-MPLS r-VPLS Without Multihoming
        10.4.3.2. EVPN-MPLS r-VPLS With All-Active Multihoming
          10.4.3.2.1. Passive VRRP
          10.4.3.2.2. Operation
        10.4.3.3. EVPN-MPLS r-VPLS With Single-Active Multihoming
    10.5. EVPN Command Reference
      10.5.1. Command Hierarchies
        10.5.1.1. EVPN Configuration Commands
          10.5.1.1.1. Epipe Commands for EVPN
          10.5.1.1.2. VPLS Commands for EVPN
          10.5.1.1.3. Epipe and VPLS Services Related Commands for EVPN
          10.5.1.1.4. VPRN Interface Commands for EVPN
          10.5.1.1.5. Service System Commands for EVPN
          10.5.1.1.6. Redundancy Commands for EVPN
          10.5.1.1.7. Router BGP Commands for EVPN
        10.5.1.2. Show Commands
      10.5.2. Command Descriptions
        10.5.2.1. EVPN Configuration Commands
          10.5.2.1.1. BGP Commands
          10.5.2.1.2. BGP-EVPN Commands
        10.5.2.2. Routed VPLS EVPN Commands
        10.5.2.3. EVPN Service System Commands
        10.5.2.4. EVPN Redundancy Commands
        10.5.2.5. Show Commands
  11. List of Acronyms
  12. Supported Standards and Protocols
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. Technical Support
  2. 7705 SAR Services Configuration Process
  3. Services Overview
    3.1. Introduction to Services on the 7705 SAR
      3.1.1. Overview
      3.1.2. Service Types
      3.1.3. Service Policies
    3.2. Nokia Service Model
    3.3. Service Entities
      3.3.1. Customers
      3.3.2. Service Types
        3.3.2.1. Service Names
      3.3.3. Service Access Points (SAPs)
        3.3.3.1. SAP Encapsulation Types and Identifiers
          3.3.3.1.1. Ethernet Encapsulations
          3.3.3.1.2. SONET/SDH Encapsulations
          3.3.3.1.3. TDM and Serial (TDM) Encapsulations
          3.3.3.1.4. Service Types and SAP Encapsulations—Summary
        3.3.3.2. SAP Configuration Considerations
      3.3.4. Service Destination Points (SDPs)
        3.3.4.1. SDP Binding
        3.3.4.2. Spoke and Mesh SDPs
        3.3.4.3. SDPs and BGP Route Tunnels
        3.3.4.4. SDP Encapsulation Types
          3.3.4.4.1. MPLS Encapsulation
          3.3.4.4.2. GRE Encapsulation
          3.3.4.4.3. IP Encapsulation
        3.3.4.5. Spoke SDP Terminations
        3.3.4.6. SDP Ping
        3.3.4.7. SDP Keepalives
        3.3.4.8. Mixed-LSP SDPs
        3.3.4.9. Multiple Load-balancing LSPs Under a Single SDP
    3.4. High-Speed Download Packet Access Offload
      3.4.1. HSDPA Offload
        3.4.1.1. Failure Detection
    3.5. ETH-CFM (802.1ag and Y.1731)
      3.5.1. 802.1ag and Y.1731 Terminology
        3.5.1.1. MDs, MD Levels, MAs, and MEPs (802.1ag)
        3.5.1.2. MEG Levels, MEGs, and MEPs (Y.1731)
      3.5.2. ETH-CFM Frame Format
        3.5.2.1. ETH-CFM OAMPDU
        3.5.2.2. CFM Frame Processing
          3.5.2.2.1. Processing SAP 0 and SAP 0.* OAM Packets
        3.5.2.3. MEG-ID and ICC-Based Format
      3.5.3. ETH-CFM Functions and Tests
        3.5.3.1. ETH-CFM Ethernet OAM Tests
          3.5.3.1.1. Loopback
          3.5.3.1.2. Linktrace
          3.5.3.1.3. Throughput Measurement
          3.5.3.1.4. Continuity Check
          3.5.3.1.5. Remote Defect Indication
          3.5.3.1.6. Alarm Indication Signal
          3.5.3.1.7. Ethernet Test
      3.5.4. MEP Support (802.1ag and Y.1731)
        3.5.4.1. 802.1ag MEP Support on Ethernet SAPs
        3.5.4.2. 802.1ag and Y.1731 MEP Support on Ethernet Spoke SDPs and Mesh SDPs
        3.5.4.3. Y.1731 MEP Support on Ethernet SAPs
      3.5.5. Priority Mapping (802.1ag and Y.1731)
        3.5.5.1. Priority Mapping for SAP Up MEPs
        3.5.5.2. Priority Mapping for SAP Down MEPs
    3.6. G.8032 Ethernet Ring Protection Switching
      3.6.1. Overview of G.8032 Operation
      3.6.2. Ethernet Ring Sub-Rings
        3.6.2.1. Virtual and Non-Virtual Channel
          3.6.2.1.1. LAG Support
        3.6.2.2. OAM Considerations
        3.6.2.3. Support Service and Solution Combinations
    3.7. QinQ Support
      3.7.1. Overview of QinQ
      3.7.2. QinQ Support with Forced C-Tag Forwarding (VPLS only)
        3.7.2.1. Example 1: General QinQ Implementation
        3.7.2.2. Example 2: QinQ using VPLS with Ethernet SAPs
        3.7.2.3. Example 3: QinQ Using VPLS with ATM SAPs
      3.7.3. QinQ Support on Ethernet Ports
        3.7.3.1. Special QinQ SAP Identifiers
        3.7.3.2. QinQ Dot1p Match Behavior
        3.7.3.3. QinQ Top-Only Mark Option
        3.7.3.4. Maximum Number of VLAN Tags
      3.7.4. QinQ Configuration Overview
    3.8. Raw Socket IP Transport Service
      3.8.1. Remote Host Manual TCP Connection Check
      3.8.2. QoS Requirements for IP Transport
    3.9. Service Creation Overview
    3.10. Port and SAP CLI Identifiers
    3.11. Configuring Global Service Entities with CLI
    3.12. Service Model Entities
    3.13. Basic Configuration
    3.14. Common Configuration Tasks
      3.14.1. Configuring Customer Accounts
      3.14.2. Configuring SDPs
        3.14.2.1. Enabling IP Fragmentation for GRE SDPs
      3.14.3. Configuring Service Names
    3.15. ETH-CFM (802.1ag and Y.1731) Tasks
      3.15.1. Configuring ETH-CFM Parameters (802.1ag and Y.1731)
      3.15.2. Applying ETH-CFM Parameters
    3.16. Service Management Tasks
      3.16.1. Modifying Customer Accounts
      3.16.2. Deleting Customers
      3.16.3. Modifying SDPs
      3.16.4. Deleting SDPs
      3.16.5. Deleting LSP Associations
    3.17. Global Service Command Reference
      3.17.1. Command Hierarchies
        3.17.1.1. Global Service Configuration Commands
          3.17.1.1.1. Customer Commands
          3.17.1.1.2. SDP Commands
          3.17.1.1.3. SAP Commands
          3.17.1.1.4. Ethernet Ring Commands
          3.17.1.1.5. ETH-CFM Commands
        3.17.1.2. Show Commands
        3.17.1.3. Monitor Commands
      3.17.2. Command Descriptions
        3.17.2.1. Global Service Configuration Commands
          3.17.2.1.1. Generic Commands
          3.17.2.1.2. Customer Commands
          3.17.2.1.3. SDP Commands
          3.17.2.1.4. SDP Keepalive Commands
          3.17.2.1.5. Ethernet Ring Commands
        3.17.2.2. Show Commands
        3.17.2.3. Monitor Commands
  4. VLL Services
    4.1. ATM VLL (Apipe) Services
      4.1.1. ATM VLL for End-to-End ATM Service
      4.1.2. ATM Virtual Trunk Over an IP/MPLS Packet-Switched Network
      4.1.3. ATM SAP-to-SAP Service
      4.1.4. ATM Traffic Management Support
        4.1.4.1. Network Ingress Classification
        4.1.4.2. ATM Access Egress Queuing and Shaping
      4.1.5. Control Word
    4.2. Circuit Emulation VLL (Cpipe) Services
      4.2.1. Cpipe Service Overview
      4.2.2. TDM SAP-to-SAP Service
      4.2.3. Cpipe Service Modes
        4.2.3.1. Unstructured Mode (SAToP)
        4.2.3.2. SAToP Serial
          4.2.3.2.1. SAToP Serial Payload Size
          4.2.3.2.2. SAToP Serial Jitter Buffer
        4.2.3.3. SAToP Teleprotection Interface
        4.2.3.4. Structured Mode (CESoPSN)
      4.2.4. TDM PW Encapsulation
      4.2.5. Circuit Emulation Parameters and Options
        4.2.5.1. Unstructured
        4.2.5.2. Structured DS1/E1 CES without CAS
        4.2.5.3. Structured T1/E1 CES with CAS
        4.2.5.4. Packet Payload Size
        4.2.5.5. Jitter Buffer
          4.2.5.5.1. Configuration and Design Considerations
        4.2.5.6. Asymmetric Delay Control
          4.2.5.6.1. ADC for Redundant Paths
          4.2.5.6.2. Active Multipath
        4.2.5.7. Cpipe Network Latency Measurement
        4.2.5.8. RTP Header
        4.2.5.9. Control Word
      4.2.6. Transparent SDH/SONET Over Packet (TSoP)
      4.2.7.  Error Situations
    4.3. Ethernet VLL (Epipe) Services
      4.3.1. Epipe Service Overview
      4.3.2. Ethernet Access Egress Queuing and Scheduling
      4.3.3. Ethernet SAP-to-SAP
      4.3.4. Epipe with ATM SAPs
      4.3.5. MEF 8
        4.3.5.1. Epipe Service Modes
      4.3.6. Ethernet OAM
      4.3.7. Control Word
      4.3.8. MTU
      4.3.9. Raw and Tagged Modes
        4.3.9.1. Raw Mode
        4.3.9.2. Tagged Mode
        4.3.9.3. VLAN Translation
        4.3.9.4. Tagging Rules for Epipe
      4.3.10. IP Filters (Epipe)
      4.3.11. MPLS Entropy Label
      4.3.12. Security Zones and Epipes
    4.4. Frame Relay VLL (Fpipe) Services
      4.4.1. Fpipe Service Overview
      4.4.2. Frame Relay SAP-to-SAP Service
      4.4.3. Frame Relay Traffic Management
        4.4.3.1. Ingress SAP Classification and Marking
      4.4.4. Frame Relay Encapsulation
        4.4.4.1. Frame Relay PW Control Word
      4.4.5. Status Signaling and OAM Propagation
    4.5. HDLC VLL (Hpipe) Services
      4.5.1. Hpipe Service Overview
      4.5.2. HDLC VLL for End-to-End HDLC Service
      4.5.3. HDLC SAP-to-SAP Service
      4.5.4. HDLC Encapsulation
        4.5.4.1. HDLC PW Control Word and Payload Size
      4.5.5. Status Signaling
        4.5.5.1. OAM Propagation
    4.6. IP Interworking VLL (Ipipe) Services
      4.6.1. Ipipe Service Overview
      4.6.2. IP Interworking VLL Datapath
      4.6.3. CE IP Address Discovery and Distribution
        4.6.3.1. Manual IP Configuration
        4.6.3.2. CE IP Address Discovery Using ARP
        4.6.3.3. CE IP Address Discovery for Frame Relay
        4.6.3.4. CE IP Address Discovery for cHDLC
        4.6.3.5. CE IP Address Discovery for PPP/MLPPP
        4.6.3.6. CE IP Address Distribution to Remote PE Nodes
      4.6.4. IP SAP-to-SAP Service
      4.6.5. Hardware Support for Interworking IP PWs
      4.6.6. Control Word
      4.6.7. Termination at Access
        4.6.7.1. PPP and MLPPP Termination
        4.6.7.2. FR Termination
        4.6.7.3. cHDLC Termination
        4.6.7.4. PPP and MLPPP Termination on 2-port OC3/STM1 Channelized Adapter Cards
      4.6.8. Traffic Management
        4.6.8.1. Traffic Management for FR IW SAPs
      4.6.9. Status Signaling
        4.6.9.1. FR LMI
      4.6.10. IP Filters (Ipipe)
    4.7. Pseudowire Switching
      4.7.1. Overview
      4.7.2. Pseudowire Switching with Pseudowire Redundancy
      4.7.3. Pseudowire Switching Behavior
        4.7.3.1. Pseudowire Switching With IP Tunnels
      4.7.4. Pseudowire Switching TLV
    4.8. VLL Service Considerations
      4.8.1. Service Support
      4.8.2. SDPs
        4.8.2.1. SDP Statistics for VLL Services
      4.8.3. SAP Encapsulations and Pseudowire Types
      4.8.4. ATM PWE3 N-to-1 Cell Mode Encapsulation
        4.8.4.1. N-to-1 Cell Mode Encapsulation (N = 1)
          4.8.4.1.1. Deployment Scenario for N = 1 Cell Mode Encapsulation
          4.8.4.1.2. VPI/VCI Translation (N = 1)
          4.8.4.1.3. Cell Concatenation (N = 1)
          4.8.4.1.4. QoS and Traffic Descriptor Profiles (N = 1)
          4.8.4.1.5. OAM (N = 1)
        4.8.4.2. N-to-1 Cell Mode Encapsulation (N > 1)
          4.8.4.2.1. Deployment Scenario for N > 1 Cell Mode Encapsulation
          4.8.4.2.2. PW Optimization (N > 1)
          4.8.4.2.3. Overhead Optimization (N > 1)
          4.8.4.2.4. Cell Concatenation (N > 1)
          4.8.4.2.5. OAM (N > 1)
          4.8.4.2.6. Hardware Support for N > 1 Cell Mode Encapsulation
          4.8.4.2.7. SAP Support for N > 1
      4.8.5. SAP Aggregation Groups
        4.8.5.1. Configuration
          4.8.5.1.1. Sap-aggregation-group Keyword
          4.8.5.1.2. Sap-aggregation-group Group Identifier
          4.8.5.1.3. VPI/VCI Translation for SAP Aggregation Group Members (N>1)
        4.8.5.2. QoS and Traffic Descriptor Profiles (N > 1)
        4.8.5.3. Statistics and Counters
        4.8.5.4. Fault Management
      4.8.6. QoS Policies
      4.8.7. IP Filter Policies
      4.8.8. MTU Settings
        4.8.8.1. Targeted LDP and MTU
      4.8.9. QinQ (VLL Service)
      4.8.10. Pseudowire Control Word
      4.8.11. Pseudowire Redundancy
        4.8.11.1. PW Redundancy Operation
        4.8.11.2. Selecting the Active Spoke SDP for PW Redundancy Configuration
          4.8.11.2.1. Primary and Secondary Spoke SDPs
          4.8.11.2.2. Secondary Spoke SDPs Only
        4.8.11.3. PW Redundancy and Inter-Chassis Backup
        4.8.11.4. AIS Fault Propagation
      4.8.12. Active/Standby Mode for Pseudowire Redundancy (Standby Signaling)
        4.8.12.1. PW Status Signaling Label Withdrawal Option
          4.8.12.1.1. Interoperation with PEs that do not Support the PW Forwarding Standby Bit
          4.8.12.1.2. Multiple Remote PEs Connected to an r-VPLS Instance Via Spoke-SDP Termination
        4.8.12.2. Pseudowire Redundancy on Serial Data Interface Ports
    4.9. Configuring a VLL Service with CLI
    4.10. Common Configuration Tasks
    4.11. Configuring VLL Components
      4.11.1. Creating an Apipe Service
        4.11.1.1. Configuring Apipe SAP Parameters
        4.11.1.2. Configuring Apipe SDP Bindings
        4.11.1.3. Configuring Apipe SAP Aggregation Groups
        4.11.1.4. Configuring Apipe SAPs as Aggregation Group Members
      4.11.2. Creating a Cpipe Service
        4.11.2.1. Configuring Cpipe SAP Parameters
        4.11.2.2. Configuring Cpipe SDP Bindings
      4.11.3. Creating an Epipe Service
        4.11.3.1. Configuring Epipe SAP Parameters
        4.11.3.2. Configuring Epipe with ATM SAP
        4.11.3.3. Configuring Epipe SAP MEF 8 Parameters
        4.11.3.4. Configuring Epipe SAP Microwave Link Parameters for Interworking with TDM2Ethernet
        4.11.3.5. Configuring ATM Encapsulation Under Epipe Service (7705 SAR-M only)
        4.11.3.6. Configuring Epipe Spoke SDP Bindings
        4.11.3.7. Configuring a Security Zone Within an Epipe
      4.11.4. Creating an Fpipe Service
        4.11.4.1. Configuring Fpipe SAP Parameters
        4.11.4.2. Configuring Fpipe SDP Bindings
      4.11.5. Creating an Hpipe Service
        4.11.5.1. Configuring Hpipe SAP Parameters
        4.11.5.2. Configuring Hpipe SDP Bindings
      4.11.6. Creating an Ipipe Service
        4.11.6.1. Configuring Ipipe SAP Parameters
        4.11.6.2. Configuring Ipipe SDP Bindings
      4.11.7. Configuring PW Switching
      4.11.8. Configuring Ingress and Egress SAP Parameters
      4.11.9. Using the Control Word
      4.11.10. Configuring PW Redundancy
        4.11.10.1. Configuring PW Redundancy—Standby Signaling
        4.11.10.2. Configuring PW Redundancy—ICB
    4.12. Service Management Tasks
      4.12.1. Modifying Service Parameters
      4.12.2. Disabling a Service
      4.12.3. Re-enabling a Service
      4.12.4. Deleting a Service
    4.13. VLL Services Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VLL Services Configuration Commands
          4.13.1.1.1. Apipe Service Configuration Commands
          4.13.1.1.2. Apipe Service with SAP Aggregation Configuration Commands
          4.13.1.1.3. Cpipe Service Configuration Commands
          4.13.1.1.4. Epipe Service Configuration Commands
          4.13.1.1.5. Epipe Security Configuration Commands
          4.13.1.1.6. Fpipe Service Configuration Commands
          4.13.1.1.7. Hpipe Service Configuration Commands
          4.13.1.1.8. Ipipe Service Configuration Commands
        4.13.1.2. Show Commands
        4.13.1.3. Clear Commands
      4.13.2. Command Descriptions
        4.13.2.1. VLL Service Configuration Commands
          4.13.2.1.1. Generic Commands
          4.13.2.1.2. VLL Global Commands
          4.13.2.1.3. VLL SAP Commands
          4.13.2.1.4. SAP Aggregation Group Commands
          4.13.2.1.5. SAP cem Commands
          4.13.2.1.6. SAP QoS and IP Filter Policy Commands
          4.13.2.1.7. SAP Microwave Link Commands
          4.13.2.1.8. Service Billing Commands
          4.13.2.1.9. VLL SDP Commands
          4.13.2.1.10. SDP Cell Concatenation Commands
          4.13.2.1.11. ATM Commands
          4.13.2.1.12. Epipe Security Configuration Commands
        4.13.2.2. Show Commands
        4.13.2.3. Clear Commands
  5. VPLS
    5.1. VPLS Overview
      5.1.1. VPLS Packet Walkthrough
      5.1.2. Bridged Mobile Backhaul
      5.1.3. Multi-Tenant Unit (MTU) Termination
    5.2. VPLS Features
      5.2.1. VPLS Enhancements
      5.2.2. Fabric Mode
      5.2.3. Subscriber VLAN
      5.2.4. ATM Encapsulated Residential SAP
      5.2.5. VPLS over MPLS
      5.2.6. VPLS MAC Learning and Packet Forwarding
      5.2.7. Pseudowire Control Word
      5.2.8. Agent Circuit ID Insertion
      5.2.9. MAC Filters
      5.2.10. FDB Table Management
        5.2.10.1. FDB Size
        5.2.10.2. FDB Size Alarms
        5.2.10.3. Local and Remote Aging Timers
          5.2.10.3.1. Disable MAC Aging
          5.2.10.3.2. Disable MAC Learning
        5.2.10.4. Unknown MAC Discard
      5.2.11. VPLS and Rate Limiting Via QoS Policy
      5.2.12. MAC Move
      5.2.13. Split Horizon Groups (SAP and Spoke SDP)
        5.2.13.1. Residential Split Horizon Groups
      5.2.14. Multicast for VPLS and Routed VPLS (IGMP and MLD Snooping)
        5.2.14.1. Application Examples
        5.2.14.2. Group and Addressing Support
          5.2.14.2.1. IPv4 Multicast Support
          5.2.14.2.2. IPv6 Layer 2 Multicast Support and Group Address
        5.2.14.3. IP Multicast in r-VPLS
          5.2.14.3.1. IPv6 Multicast Forwarding Behavior in r-VPLS
        5.2.14.4. Multicast Router Ports
        5.2.14.5. Tagged Access Traffic
        5.2.14.6. Hardware Support
      5.2.15. PIM Snooping for VPLS
        5.2.15.1. Snooping versus Proxy Mode
      5.2.16. MPLS Entropy Label
      5.2.17. Ethernet OAM
      5.2.18. Security Zones and VPLS
    5.3. Routed VPLS
      5.3.1. IES or VPRN IP Interface Binding
        5.3.1.1. Assigning a Service Name to a VPLS Service
        5.3.1.2. Binding a Service Name to an IP Interface
        5.3.1.3. Removing a Bound VPLS Service or Service Name
        5.3.1.4. IP Interface and VPLS Operational State Coordination
      5.3.2. IP Interface MTU and Fragmentation
      5.3.3. ARP/ND and VPLS FIB Interactions
        5.3.3.1. Routed VPLS Specific ARP/ND Cache Behavior
      5.3.4. The allow-ip-int-binding VPLS Flag
        5.3.4.1. VPLS Feature Restrictions (due to allow-ip-int-binding)
      5.3.5. DSCP Marking
      5.3.6. VPLS Ingress IP Filter Override
      5.3.7. Routed VPLS Supported Routing-Related Protocols
    5.4. VPLS and Spanning Tree Protocol
      5.4.1. VPLS Redundancy
        5.4.1.1. Spoke SDP Redundancy for Metro Interconnection
        5.4.1.2. Spoke SDP-Based Redundant Access
      5.4.2. VPLS Access Redundancy
        5.4.2.1. STP-Based Redundant Access to VPLS
      5.4.3. MAC Flush Message Processing
        5.4.3.1. Dual Homing to a VPLS Service
    5.5. ATM PVC Access and Termination on a VPLS Service
    5.6. VPLS Service Considerations
      5.6.1. SAP Encapsulations
      5.6.2. VLAN Processing
        5.6.2.1. Tagging Rules for VPLS
      5.6.3. QinQ (VPLS)
    5.7. Configuration Notes
    5.8. Configuring a VPLS Service with CLI
    5.9. Basic Configuration
    5.10. Common Configuration Tasks
    5.11. Configuring VPLS Components
      5.11.1. Creating a VPLS Service
      5.11.2. Creating a Split Horizon Group
      5.11.3. Enabling MAC Move
      5.11.4. Configuring STP Bridge Parameters in a VPLS
        5.11.4.1. Bridge STP Admin State
        5.11.4.2. Mode
        5.11.4.3. Bridge Priority
        5.11.4.4. Hello Time
        5.11.4.5. Hold Count
    5.12. Configuring a VPLS SAP
      5.12.1. Local VPLS SAPs
      5.12.2. Distributed VPLS SAPs
      5.12.3. Configuring SAP-Specific STP Parameters
        5.12.3.1. SAP STP Administrative State
        5.12.3.2. SAP Virtual Port Number
        5.12.3.3. SAP Priority
        5.12.3.4. SAP Path Cost
        5.12.3.5. SAP Edge Port
        5.12.3.6. SAP Auto Edge
        5.12.3.7. SAP Link Type
      5.12.4. STP SAP Operational States
        5.12.4.1. Operationally Disabled
        5.12.4.2. Operationally Discarding
        5.12.4.3. Operationally Learning
        5.12.4.4. Operationally Forwarding
      5.12.5. Configuring VPLS SAPs with Split Horizon
    5.13. Configuring SDP Bindings
      5.13.1. Configuring Mesh SDP Bindings
      5.13.2. Configuring Spoke SDPs
        5.13.2.1. Configuring Spoke SDP Bindings
        5.13.2.2. Configuring Spoke SDP-Specific STP Parameters
          5.13.2.2.1. Spoke SDP STP Administrative State
          5.13.2.2.2. Spoke SDP Virtual Port Number
          5.13.2.2.3. Spoke SDP Priority
          5.13.2.2.4. Spoke SDP Path Cost
          5.13.2.2.5. Spoke SDP Edge Port
          5.13.2.2.6. Spoke SDP Auto Edge
          5.13.2.2.7. Spoke SDP Link Type
      5.13.3. Configuring VPLS Spoke SDPs with Split Horizon
      5.13.4. Configuring Selective MAC Flush
    5.14. Configuring Routed VPLS
    5.15. Configuring IP Multicast in VPLS
    5.16. Configuring IP Multicast in r-VPLS
    5.17. Configuring Multicast Parameters for VPLS and r-VPLS
    5.18. Configuring a Static Multicast Group
    5.19. Configuring PIM Snooping for VPLS
    5.20. Configuring a Security Zone Within a VPLS
    5.21. Service Management Tasks
      5.21.1. Modifying VPLS Service Parameters
      5.21.2. Modifying Management VPLS Parameters
      5.21.3. Deleting a Management VPLS
      5.21.4. Disabling a Management VPLS
      5.21.5. Deleting a VPLS Service
      5.21.6. Disabling a VPLS Service
      5.21.7. Re-enabling a VPLS Service
    5.22. VPLS Command Reference
      5.22.1. Command Hierarchies
        5.22.1.1. VPLS Service Configuration Commands
          5.22.1.1.1. Global Commands
          5.22.1.1.2. SAP Commands
          5.22.1.1.3. Mesh SDP Commands
          5.22.1.1.4. Spoke SDP Commands
          5.22.1.1.5. Routed VPLS Commands
          5.22.1.1.6. VPLS Security Configuration Commands
        5.22.1.2. Show Commands
        5.22.1.3. Clear Commands
        5.22.1.4. Debug Commands
      5.22.2. Command Descriptions
        5.22.2.1. VPLS Service Configuration Commands
          5.22.2.1.1. Generic Commands
          5.22.2.1.2. VPLS Service Commands
          5.22.2.1.3. VPLS SAP Commands
          5.22.2.1.4. VPLS SAP ATM Commands
          5.22.2.1.5. VPLS IGMP and MLD Snooping Commands
          5.22.2.1.6. VPLS STP Commands
          5.22.2.1.7. VPLS Filter and QoS Policy Commands
          5.22.2.1.8. Service Billing Commands
          5.22.2.1.9. VPLS SAP DHCP Commands
          5.22.2.1.10. VPLS SDP Commands
        5.22.2.2. Routed VPLS Configuration Commands
        5.22.2.3. VPLS Security Configuration Commands
        5.22.2.4. VPLS Show Commands
        5.22.2.5. VPLS Clear Commands
        5.22.2.6. VPLS Debug Commands
  6. Internet Enhanced Service
    6.1. IES for In-band Management
      6.1.1. Setting Up Connections Between the NSP NFM-P and the 7705 SAR
      6.1.2. Encapsulation
      6.1.3. Layer 2 and Layer 3 Traffic Management
      6.1.4. Troubleshooting and Fault Detection Services
      6.1.5. IP ECMP Load Balancing
    6.2. IES for Customer Traffic
      6.2.1. DHCP Relay and DHCPv6 Relay
        6.2.1.1. DHCP Relay
          6.2.1.1.1. DHCP Options
        6.2.1.2. DHCPv6 Relay
          6.2.1.2.1. DHCPv6 Options
      6.2.2. IPCP
      6.2.3. IPSec Support
      6.2.4. Security Zones and IES
      6.2.5. Proxy ARP
      6.2.6. Configurable ARP Retry Timer
      6.2.7. Unnumbered Interfaces
      6.2.8. Troubleshooting and Fault Detection Services
      6.2.9. VRRP on IES Interfaces
      6.2.10. SAPs
        6.2.10.1. Encapsulations
        6.2.10.2. Routing Protocols
        6.2.10.3. QoS Policies
        6.2.10.4. QinQ (IES)
        6.2.10.5. IP Filter Policies on an IES SAP
      6.2.11. Spoke SDP Termination to IES
      6.2.12. Bandwidth Optimization for Low-speed Links
        6.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
      6.2.13. Hold Up and Hold Down Timers for IP Interfaces
    6.3. Configuring IES with CLI
    6.4. Common Configuration Tasks
    6.5. Configuring IES Components
      6.5.1. Creating an IES Service
      6.5.2. Configuring IES Interface Parameters
        6.5.2.1. IES Management Service
        6.5.2.2. IES Service
        6.5.2.3. IES IPv6 Service
      6.5.3. Configuring IES SAP Parameters
        6.5.3.1. IES Management SAP
        6.5.3.2. IES Service SAP
      6.5.4. Configuring IES Spoke SDP Parameters
      6.5.5. Configuring VRRP
      6.5.6. Configuring a Security Zone Within IES
      6.5.7. Configuring Serial Raw Socket Transport Within IES
    6.6. Service Management Tasks
      6.6.1. Modifying IES Service Parameters
      6.6.2. Disabling an IES Service
      6.6.3. Re-enabling an IES Service
      6.6.4. Deleting an IES Service
    6.7. IES Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Configuration Commands
          6.7.1.1.1. IES Management Configuration Commands
          6.7.1.1.2. IES Service Configuration Commands
          6.7.1.1.3. Routed VPLS Commands
          6.7.1.1.4. VRRP Commands
          6.7.1.1.5. IES Security Zone Configuration Commands
          6.7.1.1.6. IES Raw Socket IP Transport Configuration Commands
        6.7.1.2. Show Commands
        6.7.1.3. Clear Commands
        6.7.1.4. Debug Commands
      6.7.2. Command Descriptions
        6.7.2.1. IES Generic Configuration Commands
        6.7.2.2. IES Global Configuration Commands
        6.7.2.3. IES Management Configuration Commands
          6.7.2.3.1. IES Management Interface Commands
          6.7.2.3.2. IES Management SAP Commands
        6.7.2.4. IES Service Configuration Commands
          6.7.2.4.1. IES Service Interface Commands
          6.7.2.4.2. IES Service IPv6 Commands
          6.7.2.4.3. IES Service VRRP Commands
          6.7.2.4.4. IES Service SAP Commands
          6.7.2.4.5. IES Service Spoke SDP Commands
          6.7.2.4.6. Routed VPLS Commands
          6.7.2.4.7. IES Service Security Zone Configuration Commands
          6.7.2.4.8. IES Raw Socket IP Transport Configuration Commands
        6.7.2.5. Show Commands
        6.7.2.6. Clear Commands
        6.7.2.7. Debug Commands
  7. VPRN Services
    7.1. VPRN Service Overview
      7.1.1. Routing Prerequisites
      7.1.2. BGP Support
        7.1.2.1. BGP Fast Reroute with Prefix-Independent Convergence in a VPRN
        7.1.2.2. BGP Next-Hop Resolution and Peer Tracking
      7.1.3. IPSec Support
      7.1.4. Security Zones and VPRN
      7.1.5. Static One-to-One NAT and VPRN
      7.1.6. Unicast and Multicast Address Translation
      7.1.7. Route Distinguishers
        7.1.7.1. PE-to-CE Route Exchange
          7.1.7.1.1. Route Redistribution
          7.1.7.1.2. CPE Connectivity Check
      7.1.8. Route Target Constraint
        7.1.8.1. Configuring the Route Target Address Family
        7.1.8.2. Originating RTC Routes
        7.1.8.3. Receiving and Readvertising RTC Routes
        7.1.8.4. Using RTC Routes
      7.1.9. In-Band Management using a VPRN
    7.2. VPRN Features
      7.2.1. IP Interfaces
        7.2.1.1. Unnumbered Interfaces
        7.2.1.2. DHCP and DHCPv6
          7.2.1.2.1. DHCP Relay and DHCPv6 Relay
          7.2.1.2.2. Local DHCP and DHCPv6 Server
        7.2.1.3. IPCP
        7.2.1.4. Troubleshooting and Fault Detection Services
        7.2.1.5. VRRP on VPRN Interfaces
        7.2.1.6. IP ECMP Load Balancing
        7.2.1.7. Proxy ARP
        7.2.1.8. Configurable ARP Retry Timer
        7.2.1.9. Hold Up and Hold Down Timers for IP Interfaces
      7.2.2. SAPs
        7.2.2.1. Encapsulations
        7.2.2.2. QoS Policies
          7.2.2.2.1. CoS Marking for Self-generated Traffic
        7.2.2.3. QinQ (VPRN)
        7.2.2.4. Filter Policies on a VPRN SAP
      7.2.3. PE-to-CE Routing Protocols
        7.2.3.1. Using OSPF or OSPFv3 in IP VPNs
          7.2.3.1.1. DN Bit
        7.2.3.2. TTL Security
      7.2.4. PE-to-PE Tunneling Mechanisms
      7.2.5. Per-VRF Route Limiting
      7.2.6. RIP Metric Propagation in VPRNs
      7.2.7. Multicast VPN (MVPN)
        7.2.7.1. Multicast in IP-VPN Applications
        7.2.7.2. MVPN Building Blocks
          7.2.7.2.1. PMSI
          7.2.7.2.2. MVPN Using BGP Control Plane
          7.2.7.2.3. Auto-Discovery
          7.2.7.2.4. PE-CE Multicast Protocols and Services
          7.2.7.2.5. PE-PE Transmission of C-Multicast Routing Using BGP
          7.2.7.2.6. PE-PE Multicast Protocols
          7.2.7.2.7. PE-PE Multicast Data Transmission
        7.2.7.3. Provider Tunnel Support
          7.2.7.3.1. Point-to-Multipoint I-PMSI and S-PMSI
          7.2.7.3.2. Point-to-Multipoint LDP I-PMSI and S-PMSI
          7.2.7.3.3. Point-to-Multipoint LSP S-PMSI
          7.2.7.3.4. MVPN Sender-only and Receiver-only
        7.2.7.4. Inter-AS and Intra-AS Solutions
          7.2.7.4.1. 7705 SAR as Source of Non-Segmented Inter-AS or Intra-AS Network
        7.2.7.5. NG-MVPN Non-segmented Inter-AS Solution
          7.2.7.5.1. Non-Segmented Inter-AS VPN Option C Support
          7.2.7.5.2. Configuration Example
          7.2.7.5.3. Inter-AS Non-segmented mLDP
          7.2.7.5.4. ECMP
        7.2.7.6. Mrinfo and Mtrace
        7.2.7.7. Multicast-only Fast Reroute (MoFRR)
        7.2.7.8. mLDP Point-to-Multipoint Support
        7.2.7.9. mLDP Fast Upstream Switchover
        7.2.7.10. Multicast Source Discovery Protocol
      7.2.8. VPRN Auto-binding Tunnels
      7.2.9. Spoke SDPs
      7.2.10. Spoke SDP Termination to VPRN
      7.2.11. IPv6 on Virtual Private Edge Router
      7.2.12. IPv6 over IPv4 LAN-to-LAN IPSec Tunnels
      7.2.13. Bandwidth Optimization for Low-speed Links
        7.2.13.1. OAM Diagnostics Restrictions with Lower IP MTU
      7.2.14. Support for NTP
    7.3. Configuring a VPRN Service with CLI
    7.4. Basic Configuration
    7.5. Common Configuration Tasks
    7.6. Configuring VPRN Components
      7.6.1. Creating a VPRN Service
      7.6.2. Configuring Global VPRN Parameters
      7.6.3. Configuring Router Interfaces
      7.6.4. Configuring Static Route Entries for VPRN
      7.6.5. Configuring BGP for VPRN
        7.6.5.1. Configuring VPRN BGP Group and Neighbor Parameters
        7.6.5.2. Configuring Route Reflection
        7.6.5.3. VPRN BGP CLI Syntax
      7.6.6. Configuring IPv6 Parameters for VPRN BGP
      7.6.7. Configuring VPRN IPv6 Neighbor Discovery Parameters
      7.6.8. Configuring OSPF or OSPFv3 for VPRN
      7.6.9. Configuring RIP for VPRN
      7.6.10. Configuring IGMP for VPRN
      7.6.11. Configuring PIM for VPRN
      7.6.12. Configuring MVPN for VPRN
      7.6.13. Configuring a VPRN Interface
      7.6.14. Configuring a VPRN IPv6 Interface
      7.6.15. Configuring VPRN Interface Routed VPLS IPv6 Parameters
      7.6.16. Configuring VPRN Interface SAP Parameters
      7.6.17. Configuring VPRN Interface SAP IPv6 Parameters
      7.6.18. Configuring VPRN Interface Spoke SDP Parameters
      7.6.19. Configuring VPRN Interface Spoke SDP IPv6 Parameters
      7.6.20. Configuring VRRP
      7.6.21. Configuring a Security Zone Within a VPRN
      7.6.22. Configuring Serial Raw Socket Transport Within VPRN
      7.6.23. Configuring VPRN Router Advertisement
    7.7. Service Management Tasks
      7.7.1. Modifying VPRN Service Parameters
      7.7.2. Deleting a VPRN Service
      7.7.3. Disabling a VPRN Service
      7.7.4. Re-enabling a VPRN Service
    7.8. VPRN Services Command Reference
      7.8.1. Command Hierarchies
        7.8.1.1. Configuration Commands
          7.8.1.1.1. VPRN Service Configuration Commands
          7.8.1.1.2. BGP Commands
          7.8.1.1.3. OSPF Commands
          7.8.1.1.4. OSPFv3 Commands
          7.8.1.1.5. IGMP Commands
          7.8.1.1.6. PIM Commands
          7.8.1.1.7. RIP Commands
          7.8.1.1.8. VPRN Security Zone Configuration Commands
          7.8.1.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.1.1.10. Multicast VPN Commands
          7.8.1.1.11. MSDP Commands
          7.8.1.1.12. Router Advertisement Commands
          7.8.1.1.13. Local DHCP and DHCPv6 Server Commands
          7.8.1.1.14. Interface Commands
          7.8.1.1.15. IPv6 Interface Commands
          7.8.1.1.16. Interface DHCP Commands
          7.8.1.1.17. Interface ICMP Commands
          7.8.1.1.18. Interface SAP IPSec-Tunnel Commands
          7.8.1.1.19. Routed VPLS Commands
          7.8.1.1.20. Interface VRRP Commands
          7.8.1.1.21. VPRN Static One-to-One NAT Configuration Commands
          7.8.1.1.22. TWAMP Light Commands
          7.8.1.1.23. VPRN NTP Commands
        7.8.1.2. Show Commands
        7.8.1.3. Clear Commands
        7.8.1.4. Debug Commands
      7.8.2. Command Descriptions
        7.8.2.1. VPRN Service Configuration Commands
          7.8.2.1.1. Generic Commands
          7.8.2.1.2. Global Commands
          7.8.2.1.3. BGP Commands
          7.8.2.1.4. OSPF and OSPFv3 Commands
          7.8.2.1.5. IGMP Commands
          7.8.2.1.6. PIM Commands
          7.8.2.1.7. RIP Commands
          7.8.2.1.8. VPRN Security Configuration Commands
          7.8.2.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.2.1.10. Multicast VPN Commands
          7.8.2.1.11. MSDP Commands
          7.8.2.1.12. Router Advertisement Commands
          7.8.2.1.13. Local DHCP and DHCPv6 Server Commands
          7.8.2.1.14. Interface Commands
          7.8.2.1.15. IPv6 Interface Commands
          7.8.2.1.16. Interface DHCP Commands
          7.8.2.1.17. Interface ICMP Commands
          7.8.2.1.18. Interface SAP Commands
          7.8.2.1.19. Interface Spoke SDP Commands
          7.8.2.1.20. Routed VPLS Commands
          7.8.2.1.21. Interface VRRP Commands
          7.8.2.1.22. VPRN Static One-to-One NAT Configuration Commands
          7.8.2.1.23. TWAMP Light Commands
          7.8.2.1.24. VPRN NTP Commands
        7.8.2.2. Show Service Commands
        7.8.2.3. Show Router Commands
        7.8.2.4. Clear Service Commands
        7.8.2.5. Debug MSDP Commands
        7.8.2.6. Debug Service Commands
  8. IPSec
    8.1. IPSec Overview
      8.1.1. IPSec Implementation
        8.1.1.1. IPSec Overview
        8.1.1.2. Hardware Support
        8.1.1.3. IPSec Encryption Features
        8.1.1.4. SHA2 Support
        8.1.1.5. IPSec Security Policy, IKE Policy, and IPSec Transform
        8.1.1.6. IKEv2 Fragmentation
        8.1.1.7. Tunnel Group
        8.1.1.8. Tunnel Interfaces and SAPs
          8.1.1.8.1. Public Tunnel SAPs
          8.1.1.8.2. Private Tunnel SAPs
          8.1.1.8.3. IP Interface Configuration
        8.1.1.9. IPSec Tunnel Configuration
        8.1.1.10. IPSec over MPLS with Public Service IES
        8.1.1.11. IPSec Transport Tunnels with Public Service VPRN
        8.1.1.12. GRE-Encapsulated VLLs/VPLS over IPSec VPNs
        8.1.1.13. GRE-Encapsulated VLLs/VPLS over IPSec over MPLS
          8.1.1.13.1. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 Label Routes) Solution 1: Changing BGP Signaling to Loopback Interface
          8.1.1.13.2. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 label Routes) Solution 2: GRE to Local Interface on 7705 SAR
          8.1.1.13.3. VLLs/VPLS over IPSec over MPLS (Using IGP Shortcuts)
      8.1.2. X.509v3 Certificate Overview
        8.1.2.1. X.509v3 Certificate Support on the 7705 SAR
        8.1.2.2. Local Storage
        8.1.2.3. CA Profile
        8.1.2.4. CA Chain Computation
        8.1.2.5. Certificate Enrollment
        8.1.2.6. Certificate Revocation Check
        8.1.2.7. Certificate, CRL, and Key Cache
      8.1.3. Using Certificates For IPSec Tunnel Authentication
      8.1.4. Trust Anchor Profile
      8.1.5. Certificate Profile
      8.1.6. Certificate Management Protocol Version 2 (CMPv2)
      8.1.7. OCSP
      8.1.8. Applications
        8.1.8.1. Metrocell Deployment
        8.1.8.2. Small Business Deployment
      8.1.9. NAT-Traversal for IKEv1/v2 and IPSec
      8.1.10. BFD over IPSec Tunnel
      8.1.11. QoS for IPSec
        8.1.11.1. Network and Access Ingress QoS (Decryption QoS)
          8.1.11.1.1. Network Ingress QoS Tunnel Override
        8.1.11.2. Network and Access Egress QoS (Encryption QoS)
      8.1.12. Fragmentation and IP MTU
        8.1.12.1. Fragmentation Configuration
        8.1.12.2. Reassembly
      8.1.13. Support for Private VPRN Service Features
      8.1.14. Routing in Private Services
      8.1.15. IPSec on the 10-port 1GigE/1-port 10GigE X-Adapter Card
      8.1.16. IPSec Sequence Number
      8.1.17. PBR and MFC
        8.1.17.1. PBR
        8.1.17.2. MFC
      8.1.18. OSPFv3 Packet Authentication with IPv6 IPSec
      8.1.19. Network Security with IPv6 IPSec
      8.1.20. IPSec Over r-VPLS on a Public Service
      8.1.21. Statistics
      8.1.22. Security Support
    8.2. Public Key Infrastructure (PKI)
      8.2.1. CA Role in PKI
      8.2.2. Digital Signature and Certificates
        8.2.2.1. Certificates
          8.2.2.1.1. Vendor Certificate Signature by the Root CA
          8.2.2.1.2. Vendor Certificate Authentication by a Peer
          8.2.2.1.3. Example of PKI Operation
          8.2.2.1.4. Certificate Chain
      8.2.3. Certificate Storage
      8.2.4. CMPv2 Certificate Management
        8.2.4.1. CMPv2 Initial Registration
        8.2.4.2. Key Update
        8.2.4.3. CRL
      8.2.5. OCSP
      8.2.6. Certificate or CRL Expiration Warning
      8.2.7. Automatic CRL Update
    8.3. Best Practices Recommendations
      8.3.1. IPSec Best Practices
    8.4. Configuration Notes
    8.5. Configuring IPSec with CLI
    8.6. Basic Configuration Overview
    8.7. Common Configuration Tasks
      8.7.1. Configuring an IPSec Tunnel Group
      8.7.2. Configuring Router Interfaces for IPSec
      8.7.3. Configuring IPSec Parameters
      8.7.4. Configuring IPSec and IPSec Tunnels in Services
      8.7.5. Configuring IPSec IPv6 Parameters for a VPRN Private Service
      8.7.6. Configuring X.509v3 Certificate Parameters
      8.7.7. Configuring CMPv2
      8.7.8. Configuring OCSP
    8.8. Configuring IPSec over MPLS
      8.8.1. IPSec over BGP 3107 Label Route
        8.8.1.1. Static LAN-to-LAN Tunnel Configuration
        8.8.1.2. Policy Option Configuration
        8.8.1.3. BGP Configuration with BGP 3107 Label Route Advertisement
        8.8.1.4. LDP or RSVP-TE Tunnel Configuration
      8.8.2. IPSec over IGP Shortcut
        8.8.2.1. Static LAN-to-LAN Tunnel Configuration
        8.8.2.2. IGP Shortcut Configuration
        8.8.2.3. RSVP-TE LSP Configuration
    8.9. Service Management Tasks
      8.9.1. Deleting an IPSec IKE Policy or an IPSec Transform
      8.9.2. Deleting a Public-Side IPSec Tunnel SAP and Interface
      8.9.3. Deleting a Private-Side IPSec Tunnel SAP and Interface
      8.9.4. Deleting an IPSec Security Policy
      8.9.5. Deleting an IPSec Tunnel
    8.10. IPSec Command Reference
      8.10.1. Command Hierarchies
        8.10.1.1. IPSec Configuration Commands
          8.10.1.1.1. ISA Tunnel Commands
          8.10.1.1.2. IPSec Commands
          8.10.1.1.3. Service Configuration Commands
          8.10.1.1.4. Service Interface Tunnel Commands
          8.10.1.1.5. Service Static Route Commands
        8.10.1.2. PKI Configuration Commands
          8.10.1.2.1. X.509 and Certificate Commands
          8.10.1.2.2. PKI Infrastructure Commands
          8.10.1.2.3. IPSec PKI Commands
          8.10.1.2.4. Automatic CRL Update Commands
        8.10.1.3. Show Commands
        8.10.1.4. Clear Commands
        8.10.1.5. Debug Commands
      8.10.2. Command Descriptions
        8.10.2.1. IPSec Configuration Commands
          8.10.2.1.1. Generic Commands
          8.10.2.1.2. ISA Tunnel Commands
          8.10.2.1.3. Internet Key Exchange (IKE) and Transform Commands
          8.10.2.1.4. Service Configuration Commands
          8.10.2.1.5. Service Interface Tunnel Commands
        8.10.2.2. PKI Configuration Commands
          8.10.2.2.1. X.509 and Certificate Commands
          8.10.2.2.2. PKI Infrastructure Commands
          8.10.2.2.3. IPSec PKI Commands
          8.10.2.2.4. Automatic CRL Update Commands
        8.10.2.3. Show Commands
        8.10.2.4. Clear Commands
        8.10.2.5. Debug Commands
  9. Network Group Encryption
    9.1. NGE Overview
      9.1.1. NGE Key Groups and Encryption Partitions
      9.1.2. NGE Domains
        9.1.2.1. Private IP/MPLS Network NGE Domain
        9.1.2.2. Private Over Intermediary Network NGE Domain
      9.1.3. Network Services Platform Management
    9.2. Key Groups
      9.2.1. Key Group Algorithms
        9.2.1.1. Encapsulating Security Payload (ESP)
      9.2.2. Security Associations (SAs)
        9.2.2.1. Active Outbound SA
    9.3. Services Encryption
      9.3.1. Services Encryption Overview
      9.3.2. Assigning Key Groups to Services
      9.3.3. Pseudowire Switching for NGE Traffic
      9.3.4. Pseudowire Control Word for NGE Traffic
      9.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
      9.3.6. NGE and RFC 3107
      9.3.7. NGE for NG-MVPN
    9.4. Router Interface Encryption
      9.4.1. Router Interface NGE Domain Concepts
      9.4.2. GRE-MPLS Packets Inside the NGE Domain
      9.4.3. Router Encryption Exceptions using ACLs
      9.4.4. IPSec Packets Crossing an NGE Domain
      9.4.5. Multicast Packets Traversing the NGE Domain
      9.4.6. Assigning Key Groups to Router Interfaces
      9.4.7. Router Interface NGE Firewall Considerations
      9.4.8. NGE and BFD Support
      9.4.9. NGE and ACL Interactions
      9.4.10. Router Interface NGE and ICMP Interactions Over the NGE Domain
      9.4.11. OAM Considerations for Router Interface Encryption
    9.5. Layer 2 Encryption
    9.6. NGE Packet Overhead and MTU Considerations
      9.6.1. GRE Fragmentation for NGE Packets
    9.7. 1588v2 Encryption With NGE
    9.8. QoS for NGE Traffic
      9.8.1. Network Ingress
      9.8.2. Network Egress
    9.9. Statistics
    9.10. Remote Network Monitoring (RMON) Support
    9.11. Configuration Notes
    9.12. Configuring NGE with the CLI
    9.13. Basic NGE Configuration Overview
    9.14. Configuring NGE Components
      9.14.1. Configuring the Global Encryption Label
      9.14.2. Configuring a Key Group
      9.14.3. Assigning a Key Group to an SDP or VPRN Service
      9.14.4. Assigning a Key Group to a Router Interface
      9.14.5. Assigning a Key Group to an Ethernet Port
    9.15. NGE Management Tasks
      9.15.1. Modifying a Key Group
      9.15.2. Removing a Key Group
        9.15.2.1. Removing a Key Group from an SDP or VPRN Service
        9.15.2.2. Removing a Key Group from a Router Interface
        9.15.2.3. Removing a Key Group from an Ethernet Port
      9.15.3. Changing Key Groups
        9.15.3.1. Changing the Key Group for an SDP or VPRN Service
        9.15.3.2. Changing the Key Group for a Router Interface
        9.15.3.3. Changing the Key Group for an Ethernet Port
      9.15.4. Deleting a Key Group from a 7705 SAR
    9.16. NGE Command Reference
      9.16.1. Command Hierarchies
        9.16.1.1. Configuration Commands
          9.16.1.1.1. NGE Commands
          9.16.1.1.2. Services Commands
          9.16.1.1.3. Router Interface Encryption Commands
          9.16.1.1.4. Ethernet Port Encryption Commands
        9.16.1.2. Show Commands
        9.16.1.3. Clear Commands
      9.16.2. Command Descriptions
        9.16.2.1. Configuration Commands
          9.16.2.1.1. Generic Commands
          9.16.2.1.2. Group Encryption Commands
        9.16.2.2. Show Commands
        9.16.2.3. Clear Commands
  10. Ethernet Virtual Private Networks
    10.1. Overview and EVPN Applications
      10.1.1. EVPN for MPLS Tunnels in E-LAN Services
      10.1.2. EVPN for MPLS Tunnels in E-Line Services
    10.2. EVPN for MPLS Tunnels
      10.2.1. BGP-EVPN Control Plane for MPLS Tunnels
        10.2.1.1. EVPN Route Type 2 – MAC/IP Advertisement Route
        10.2.1.2. EVPN Route Type 3 – Inclusive Multicast Ethernet Tag Route
        10.2.1.3. EVPN Route Type 1 – Ethernet Auto-Discovery Route (AD Route)
        10.2.1.4. EVPN Route Type 4 – Ethernet Segment Route (ES Route)
        10.2.1.5. EVPN Route Type 5 – IP Prefix Route
        10.2.1.6. RFC 5512 – BGP Tunnel Encapsulation Extended Community
      10.2.2. EVPN-VPLS for MPLS Tunnels
        10.2.2.1. Overview
        10.2.2.2. EVPN and VPLS Integration
        10.2.2.3. Auto-derived Route Distinguisher (RD) in Services
        10.2.2.4. EVPN Multihoming in VPLS Services
          10.2.2.4.1. EVPN All-Active Multihoming
          10.2.2.4.2. EVPN Single-Active Multihoming
      10.2.3. EVPN-VPWS for MPLS Tunnels
        10.2.3.1. BGP-EVPN Control Plane for EVPN-VPWS
        10.2.3.2. EVPN for MPLS Tunnels in Epipe Services
        10.2.3.3. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
        10.2.3.4. EVPN Multihoming for EVPN-VPWS Services
      10.2.4. EVPN for MPLS Tunnels in r-VPLS Services
        10.2.4.1. Overview
        10.2.4.2. EVPN-MPLS Multihoming and Passive VRRP
      10.2.5. MPLS Entropy Label
      10.2.6. Preference-Based and Non-Revertive Designated Forwarder Election
    10.3. General EVPN Topics
      10.3.1. BGP-EVPN MAC Mobility
      10.3.2. BGP-EVPN MAC Duplication
      10.3.3. Conditional Static MAC and Protection
      10.3.4. Blackhole MAC
      10.3.5. CFM Interaction with EVPN Services
      10.3.6. BGP and EVPN Route Selection for EVPN Routes
      10.3.7. Interaction of EVPN and Other Features
        10.3.7.1. Interaction of EVPN-MPLS with Existing VPLS Features
        10.3.7.2. Routing Policies for BGP-EVPN IP Prefixes
    10.4. Configuring an EVPN Service With CLI
      10.4.1. EVPN All-Active Multihoming Configuration Example
      10.4.2. EVPN Single-Active Multihoming Configuration Example
      10.4.3. EVPN-MPLS r-VPLS Configuration Examples
        10.4.3.1. EVPN-MPLS r-VPLS Without Multihoming
        10.4.3.2. EVPN-MPLS r-VPLS With All-Active Multihoming
          10.4.3.2.1. Passive VRRP
          10.4.3.2.2. Operation
        10.4.3.3. EVPN-MPLS r-VPLS With Single-Active Multihoming
    10.5. EVPN Command Reference
      10.5.1. Command Hierarchies
        10.5.1.1. EVPN Configuration Commands
          10.5.1.1.1. Epipe Commands for EVPN
          10.5.1.1.2. VPLS Commands for EVPN
          10.5.1.1.3. Epipe and VPLS Services Related Commands for EVPN
          10.5.1.1.4. VPRN Interface Commands for EVPN
          10.5.1.1.5. Service System Commands for EVPN
          10.5.1.1.6. Redundancy Commands for EVPN
          10.5.1.1.7. Router BGP Commands for EVPN
        10.5.1.2. Show Commands
      10.5.2. Command Descriptions
        10.5.2.1. EVPN Configuration Commands
          10.5.2.1.1. BGP Commands
          10.5.2.1.2. BGP-EVPN Commands
        10.5.2.2. Routed VPLS EVPN Commands
        10.5.2.3. EVPN Service System Commands
        10.5.2.4. EVPN Redundancy Commands
        10.5.2.5. Show Commands
  11. List of Acronyms
  12. Supported Standards and Protocols
  Customer Document and Product Support
7705 SAR System Management Guide R23.4.R1
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR System Management Configuration Process
  Security
    Authentication, Authorization, and Accounting
      Authentication
        Local Authentication
          Password Hashing
        RADIUS Authentication
          RADIUS Server Selection
        TACACS+ Authentication
      Authorization
        Local Authorization
        RADIUS Authorization
        TACACS+ Authorization
      Accounting
        RADIUS Accounting
        TACACS+ Accounting
    Security Controls
      When a Server Does Not Respond
      Access Request Flow
    Vendor-Specific Attributes (VSAs)
    Other Security Features
      Secure Shell (SSH)
        SSH PKI Authentication
          User Public Key Generation
        SSH Cipher Lists
        SSH KEX Lists
        SSH Key Re-exchange Without Disabling SSH
          Key Re-exchange Procedure
        SSH MAC Lists
        SSH File Transfer Protocol (SFTP)
      CSM Filters and CSM Security
      Exponential Login Backoff
      Encryption
      802.1x Network Access Control
      TCP Enhanced Authentication and Keychain Authentication
        Keychain Authentication
        Keychain Configuration Guidelines and Behavior
      TLS
        TLS Overview
        TLS Interaction with Applications
          Application Support
        TLS Handshake
        TLS 1.3
        TLS Client Certificate
        TLS Symmetric Key Rollover
        Supported TLS Ciphers
        Certificate Management
          Certificate Profile
          TLS Server Authentication of the Client Certificate CN Field
        Operational Guidelines
          Server Authentication Behavior
          TLS Client Profile and Trust Anchor Behavior and Scale
        Basic TLS Configuration
        Common Configuration Tasks
          Configuring a Client TLS Profile
          Configuring a TLS Client Certificate
          Configuring a TLS Trust Anchor
    Configuration Notes
    Configuring Security with CLI
    Setting Up Security Attributes
      Configuring Authentication
      Configuring Authorization
      Configuring Accounting
    Security Configurations
    Security Configuration Procedures
      Configuring IPv4 or IPv6 Management Access Filters
      Configuring IPv4 or IPv6 CPM (CSM) Filters
      Configuring Password Management Parameters
      Managing IPSec Certificates
      Configuring Profiles
      Configuring Users
      Copying and Overwriting Users and Profiles
        Copying a User
        Copying a Profile
      Configuring SSH
      Configuring SSH Cipher Lists
      Configuring SSH KEX Algorithm Lists
      Configuring SSH MAC Algorithm Lists
      Configuring Login Controls
      Configuring RADIUS Parameters
        Configuring RADIUS Authentication
        Configuring RADIUS Authorization
        Configuring RADIUS Accounting
        Configuring 802.1x RADIUS Policies
      Configuring TACACS+ Parameters
        Enabling TACACS+ Authentication
        Configuring TACACS+ Authorization
        Configuring TACACS+ Accounting
      Configuring Keychains
    Security Command Reference
      Command Hierarchies
        Admin Commands
        Configuration Commands
          Security Configuration Commands
          Management Access Filter Commands
          IPv6 Management Access Filter Commands
          CPM Filter Commands
          IPv6 CPM Filter Commands
          Password Commands
          Profile Commands
          User Commands
          CLI Script Authorization Commands
          RADIUS Commands
          TACACS+ Commands
          802.1x Commands
          SSH Commands
          TLS Commands
          Keychain Authentication Commands
          Login Control Commands
        Show Commands
          Security
          Login Control
        Clear Commands
          Admin
          Authentication
        Monitor Commands
        Debug Commands
      Command Descriptions
        Admin Commands
        Configuration Commands
          Generic Security Commands
          Security Commands
          Management Access Filter Commands
          CPM Filter Commands
          Global Password Commands
          Password Commands
          Profile Management Commands
          User Management Commands
          CLI Script Authorization Commands
          RADIUS Client Commands
          TACACS+ Client Commands
          802.1x Commands
          SSH Commands
          Security TLS Commands
          Keychain Authentication Commands
          Login Control Commands
        Show Commands
          Security Show Commands
          Login Control Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  SNMP
    SNMP Overview
      SNMP Architecture
      Management Information Base
      SNMP Versions
      Management Information Access Control
      User-Based Security Model Community Strings
      Views
      Access Groups
      Users
    SNMP Versions
      SNMPv3 Authentication and Privacy Protocols
    Configuration Notes
    Configuring SNMP with CLI
    SNMP Configuration Overview
      Configuring SNMPv1 and SNMPv2c
      Configuring SNMPv3
    Basic SNMP Security Configuration
    Configuring SNMP Components
      Configuring a Community String
      Configuring View Options
      Configuring Access Options
      Configuring USM Community Options
      Configuring Other SNMP Parameters
    SNMP Command Reference
      Command Hierarchies
        Configuration Commands
          SNMP System Commands
          SNMP Security Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          SNMP System Commands
          SNMP Security Commands
        Show Commands
  Event and Accounting Logs
    Logging Overview
      Log file encryption
      Event Logging
      Accounting Logs
    Log Destinations
      Console
      Session
      Memory Logs
      Log Files
        Event Log Files
        Accounting Log Files
      SNMP Trap Group
      Syslog
    Event Logs
      Event Sources
      Event Control
      Log Manager and Event Logs
      Event Filter Policies
      Event Log Entries
      Simple Logger Event Throttling
      Default System Logs
      Event Handling System
        Configuring Event Handling
          Event Handlers
          Event Triggers
            Debounce
            Variable Passing
          EHS Scripting
          Hardware Support
    Accounting Logs
      Accounting Records
      Accounting Files
      Design Considerations
    Configuration Notes
    Configuring Logging with CLI
    Log Configuration Overview
    Log Type
    Basic Event Log Configuration
    Common Configuration Tasks
      Configuring an Event Log
      Configuring a File ID
      Configuring an Accounting Policy
      Configuring Event Control and Throttle Rate
      Configuring a Log Filter
      Configuring an SNMP Trap Group
      Configuring a Syslog Target
    Log Management Tasks
      Modifying a Log File
      Deleting a Log File
      Modifying a File ID
      Deleting a File ID
      Modifying a Syslog ID
      Deleting a Syslog ID
      Modifying an SNMP Trap Group
      Deleting an SNMP Trap Group
      Modifying a Log Filter
      Deleting a Log Filter
      Modifying Event Control Parameters
      Returning to the Default Event Control Configuration
    Log Command Reference
      Command Hierarchies
        Configuration Commands
          Accounting Policy Commands
          Event Control Commands
          Event Handling Commands
          Event Trigger Commands
          Log file commands
          Log Filter Commands
          Syslog Commands
          Logging Destination Commands
          SNMP Trap Groups Commands
        Show Commands
        Clear Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Accounting Policy Commands
          Event Control Commands
          Event Handling Commands
          Event Trigger Commands
          Log file commands
          Log Filter Commands
          Syslog Commands
          Logging Destination Commands
          SNMP Trap Groups Commands
        Show Commands
        Clear Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
  Legal notice
  Preface
    About This Guide
      Audience
      Technical Support
  7705 SAR System Management Configuration Process
  Security
    Authentication, Authorization, and Accounting
      Authentication
        Local Authentication
          Password Hashing
        RADIUS Authentication
          RADIUS Server Selection
        TACACS+ Authentication
      Authorization
        Local Authorization
        RADIUS Authorization
        TACACS+ Authorization
      Accounting
        RADIUS Accounting
        TACACS+ Accounting
    Security Controls
      When a Server Does Not Respond
      Access Request Flow
    Vendor-Specific Attributes (VSAs)
    Other Security Features
      Secure Shell (SSH)
        SSH PKI Authentication
          User Public Key Generation
        SSH Cipher Lists
        SSH KEX Lists
        SSH Key Re-exchange Without Disabling SSH
          Key Re-exchange Procedure
        SSH MAC Lists
        SSH File Transfer Protocol (SFTP)
      CSM Filters and CSM Security
      Exponential Login Backoff
      Encryption
      802.1x Network Access Control
      TCP Enhanced Authentication and Keychain Authentication
        Keychain Authentication
        Keychain Configuration Guidelines and Behavior
      TLS
        TLS Overview
        TLS Interaction with Applications
          Application Support
        TLS Handshake
        TLS 1.3
        TLS Client Certificate
        TLS Symmetric Key Rollover
        Supported TLS Ciphers
        Certificate Management
          Certificate Profile
          TLS Server Authentication of the Client Certificate CN Field
        Operational Guidelines
          Server Authentication Behavior
          TLS Client Profile and Trust Anchor Behavior and Scale
        Basic TLS Configuration
        Common Configuration Tasks
          Configuring a Client TLS Profile
          Configuring a TLS Client Certificate
          Configuring a TLS Trust Anchor
    Configuration Notes
    Configuring Security with CLI
    Setting Up Security Attributes
      Configuring Authentication
      Configuring Authorization
      Configuring Accounting
    Security Configurations
    Security Configuration Procedures
      Configuring IPv4 or IPv6 Management Access Filters
      Configuring IPv4 or IPv6 CPM (CSM) Filters
      Configuring Password Management Parameters
      Managing IPSec Certificates
      Configuring Profiles
      Configuring Users
      Copying and Overwriting Users and Profiles
        Copying a User
        Copying a Profile
      Configuring SSH
      Configuring SSH Cipher Lists
      Configuring SSH KEX Algorithm Lists
      Configuring SSH MAC Algorithm Lists
      Configuring Login Controls
      Configuring RADIUS Parameters
        Configuring RADIUS Authentication
        Configuring RADIUS Authorization
        Configuring RADIUS Accounting
        Configuring 802.1x RADIUS Policies
      Configuring TACACS+ Parameters
        Enabling TACACS+ Authentication
        Configuring TACACS+ Authorization
        Configuring TACACS+ Accounting
      Configuring Keychains
    Security Command Reference
      Command Hierarchies
        Admin Commands
        Configuration Commands
          Security Configuration Commands
          Management Access Filter Commands
          IPv6 Management Access Filter Commands
          CPM Filter Commands
          IPv6 CPM Filter Commands
          Password Commands
          Profile Commands
          User Commands
          CLI Script Authorization Commands
          RADIUS Commands
          TACACS+ Commands
          802.1x Commands
          SSH Commands
          TLS Commands
          Keychain Authentication Commands
          Login Control Commands
        Show Commands
          Security
          Login Control
        Clear Commands
          Admin
          Authentication
        Monitor Commands
        Debug Commands
      Command Descriptions
        Admin Commands
        Configuration Commands
          Generic Security Commands
          Security Commands
          Management Access Filter Commands
          CPM Filter Commands
          Global Password Commands
          Password Commands
          Profile Management Commands
          User Management Commands
          CLI Script Authorization Commands
          RADIUS Client Commands
          TACACS+ Client Commands
          802.1x Commands
          SSH Commands
          Security TLS Commands
          Keychain Authentication Commands
          Login Control Commands
        Show Commands
          Security Show Commands
          Login Control Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  SNMP
    SNMP Overview
      SNMP Architecture
      Management Information Base
      SNMP Versions
      Management Information Access Control
      User-Based Security Model Community Strings
      Views
      Access Groups
      Users
    SNMP Versions
      SNMPv3 Authentication and Privacy Protocols
    Configuration Notes
    Configuring SNMP with CLI
    SNMP Configuration Overview
      Configuring SNMPv1 and SNMPv2c
      Configuring SNMPv3
    Basic SNMP Security Configuration
    Configuring SNMP Components
      Configuring a Community String
      Configuring View Options
      Configuring Access Options
      Configuring USM Community Options
      Configuring Other SNMP Parameters
    SNMP Command Reference
      Command Hierarchies
        Configuration Commands
          SNMP System Commands
          SNMP Security Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          SNMP System Commands
          SNMP Security Commands
        Show Commands
  Event and Accounting Logs
    Logging Overview
      Log file encryption
      Event Logging
      Accounting Logs
    Log Destinations
      Console
      Session
      Memory Logs
      Log Files
        Event Log Files
        Accounting Log Files
      SNMP Trap Group
      Syslog
    Event Logs
      Event Sources
      Event Control
      Log Manager and Event Logs
      Event Filter Policies
      Event Log Entries
      Simple Logger Event Throttling
      Default System Logs
      Event Handling System
        Configuring Event Handling
          Event Handlers
          Event Triggers
            Debounce
            Variable Passing
          EHS Scripting
          Hardware Support
    Accounting Logs
      Accounting Records
      Accounting Files
      Design Considerations
    Configuration Notes
    Configuring Logging with CLI
    Log Configuration Overview
    Log Type
    Basic Event Log Configuration
    Common Configuration Tasks
      Configuring an Event Log
      Configuring a File ID
      Configuring an Accounting Policy
      Configuring Event Control and Throttle Rate
      Configuring a Log Filter
      Configuring an SNMP Trap Group
      Configuring a Syslog Target
    Log Management Tasks
      Modifying a Log File
      Deleting a Log File
      Modifying a File ID
      Deleting a File ID
      Modifying a Syslog ID
      Deleting a Syslog ID
      Modifying an SNMP Trap Group
      Deleting an SNMP Trap Group
      Modifying a Log Filter
      Deleting a Log Filter
      Modifying Event Control Parameters
      Returning to the Default Event Control Configuration
    Log Command Reference
      Command Hierarchies
        Configuration Commands
          Accounting Policy Commands
          Event Control Commands
          Event Handling Commands
          Event Trigger Commands
          Log file commands
          Log Filter Commands
          Syslog Commands
          Logging Destination Commands
          SNMP Trap Groups Commands
        Show Commands
        Clear Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          Accounting Policy Commands
          Event Control Commands
          Event Handling Commands
          Event Trigger Commands
          Log file commands
          Log Filter Commands
          Syslog Commands
          Logging Destination Commands
          SNMP Trap Groups Commands
        Show Commands
        Clear Commands
  List of Acronyms
  Supported Standards and Protocols
  Customer Documentation and Product Support
7705 SAR Quick Reference Cards, Release 23.4
  7705 SAR Documentation Suite Overview, Release 23.4
  7705 SAR Installation, Provisioning, and Commissioning Checklist, Release 23.4
  7705 SAR Card and Module Support Quick Reference Card, Release 23.4
  7705 SAR Command Line Interface Quick Reference Card
  7705 SAR Documentation Suite Overview, Release 23.4
  7705 SAR Installation, Provisioning, and Commissioning Checklist, Release 23.4
  7705 SAR Card and Module Support Quick Reference Card, Release 23.4
  7705 SAR Command Line Interface Quick Reference Card