Nokia 7705 Service Aggregation Router, Release 23.4.R1
Legal Disclaimers
Customer Documentation and Product Support
Legal Disclaimers
Customer Documentation and Product Support
7705 SAR Basic System Configuration Guide R23.4.R1
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR System Configuration Process
CLI Usage
CLI Structure
Navigating in the CLI
CLI Contexts
CLI Syntax
CLI Root-Level Commands
CLI Global Commands
CLI Environment Commands
CLI Monitor Commands
Getting Help in the CLI
The CLI Command Prompt
Displaying Configuration Contexts
EXEC Files
CLI Script Control
Entering CLI Commands
Command Completion
Unordered Parameters
Editing Keystrokes
Absolute Paths
History
Entering Numerical Ranges or Lists
Pipe/Match
Pipe/Count
Redirection
CLI Configuration Rollback
Rollback Checkpoint and Rescue Files
Rollback File Backup
Performing a CLI Configuration Reversion
Rollback Restrictions
Transactional Configuration
Basic Operation
Transactions and Rollback
Authorization
Basic Command Reference
Command Hierarchies
CLI Root-Level and Global Commands
Environment Commands
Rollback Commands
Candidate Commands
Show Commands
Command Descriptions
CLI Root-Level and Global Commands
Environment Commands
Candidate Commands
Rollback Commands
Show Commands
File System Management
The File System
Compact Flash Device
URLs
Wildcards
Common Configuration Tasks
Modifying File Attributes
Creating and Navigating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Displaying Directory and File Information
Repairing the File System
File System Command Reference
Command Hierarchy
Configuration Commands
Command Descriptions
Configuration Commands
Boot Options
System Initialization
Configuration and Image Loading
Persistence
Automatic Discovery Protocol
Self-discovery
Network Discovery
Configuration Discovery
Test and Commit
FIPS-140-2 Mode
CSM and Data Path Security Features and Algorithms in FIPS-140-2 Mode
SSHv2 Approved Algorithms in FIPS-140-2 Mode
Initial System Startup Process Overview
Boot Loader File Protection
Before Upgrading
Performing the Upgrade
Accessing the CLI
Console Connection
Telnet Connection
Running Telnet
SSH Connection
Running SSH
Accessing MPT Radios Connected to a 7705 SAR
Configuration Notes
Configuring the BOF with the CLI
BOF Configuration Overview
Basic BOF Configuration
Configuring BOF Parameters
Configuring BOF Encryption
Configuration File Encryption
Service Management Tasks
System Administration Commands
Viewing the Current Configuration
Modifying or Deleting BOF Parameters
Saving a Configuration
Saving a Configuration to a Different Filename
Rebooting
BOF Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
File Management Commands
BOF Processing Control Commands
Console Port Configuration Commands
Image and Configuration Management Commands
CSM Management Configuration Commands
DNS Configuration Commands
Show Commands
System Management
System Management Parameters
System Information
System Name
System Contact
System Location
System Coordinates
Common Language Location Identifier
System Identifier
PoE Power Source
System Time
Time Zones
NTP
SNTP Time Synchronization
PTP
Time-of-Day Measurement (ToD-1pps)
GNSS
CRON
High Availability
High Availability Features
Redundancy
Software Redundancy
Configuration Redundancy
Component Redundancy
Accounting Configuration Redundancy
Multi-Chassis LAG Redundancy
Nonstop Routing (NSR)
In-service Upgrade
CSM Switchover
Synchronization
Configuration and boot-env Synchronization
State Database Synchronization
CSM Synchronization and Redundancy
Active and Standby Designations
When the Active CSM Goes Offline
Persistence
Administrative Tasks
Saving Configurations
Specifying Post-Boot Configuration Files
Automatic Synchronization
Boot-Env Option
Config Option
Manual Synchronization
Forcing a Switchover
Node Timing
External Timing Mode
Line Timing Mode
Adaptive Clock Recovery (ACR)
ACR States
ACR Statistics
Differential Clock Recovery (DCR)
DCR Frequencies
Serial Clock Transport (DCR Serial)
Proprietary Clock Recovery (PCR)
IEEE 1588v2 PTP
Best Master Clock Algorithm
PTP Clock Synchronization
Performance Considerations
PTP Capabilities
PTP Ordinary Slave Clock For Frequency
PTP Ordinary Master Clock For Frequency
PTP Boundary Clock For Frequency
PTP Ordinary Slave Clock for Time of Day/Phase Recovery
PTP Boundary Clock for Time of Day/Phase Recovery
PTP End-to-End Transparent Clock for Time of Day/Phase Recovery
PTP Master Clock for Time of Day/Phase Distribution
PTP Clock Redundancy
PTP Ethernet Capabilities
ITU-T G.8275.1 and G.8275.2
Synchronization Certainty/Uncertainty
IEC/IEEE 61850-9-3 and C37.238-2017
PTP Profile Interworking
Single-clock PTP Profile Interworking
Multi-clock PTP Profile Interworking
PTP Statistics
Synchronous Ethernet
Synchronization Status Messaging with Quality Level Selection
Timing Reference Selection Based on Quality Level
SSM/ESMC QL Transmission
DS1 Physical Port QL Transmission
E1 Physical Port QL Transmission
System Configuration Process Overview
Configuration Notes
Configuring System Management with CLI
System Management Configuration
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Identifier
System Time Elements
Zone
Summer Time Conditions
NTP
Authentication-check
Authentication-key
Broadcastclient
MDA-timestamp
Multicastclient
Server
SNTP
Broadcast-client
Server-address
PTP
Time-of-Day Measurement (ToD-1pps)
GNSS
CRON
Configuring Script Parameters
Configuring Synchronization and Redundancy
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy
Configuring ATM Parameters
Configuring Backup Copies
Configuring System Administration Parameters
Disconnect
Set-time
Display-config
Tech-support
Save
Reboot
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Entering Edit Mode
Configuring Timing References
Configuring IEEE 1588v2 PTP
Configuring QL Values for SSM
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
Configuring LLDP
System Command Reference
Command Hierarchies
Configuration Commands
System Information and General Commands
System Alarm Commands
Persistence Commands
System Time Commands
CRON Commands
Script Control Commands
System Synchronization Commands
System LLDP Commands
System PTP Commands
Administration Commands
System Administration Commands
High Availability (Redundancy) Commands
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Configuration Commands
Generic Commands
System Information and General Commands
System Alarm Commands
Persistence Commands
System Time Commands
CRON Commands
Script Control Commands
System Synchronization Configuration Commands
LLDP System Commands
System PTP Commands
Administration Commands
System Administration Commands
High Availability (Redundancy) Commands
Show Commands
Clear Commands
Debug Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR System Configuration Process
CLI Usage
CLI Structure
Navigating in the CLI
CLI Contexts
CLI Syntax
CLI Root-Level Commands
CLI Global Commands
CLI Environment Commands
CLI Monitor Commands
Getting Help in the CLI
The CLI Command Prompt
Displaying Configuration Contexts
EXEC Files
CLI Script Control
Entering CLI Commands
Command Completion
Unordered Parameters
Editing Keystrokes
Absolute Paths
History
Entering Numerical Ranges or Lists
Pipe/Match
Pipe/Count
Redirection
CLI Configuration Rollback
Rollback Checkpoint and Rescue Files
Rollback File Backup
Performing a CLI Configuration Reversion
Rollback Restrictions
Transactional Configuration
Basic Operation
Transactions and Rollback
Authorization
Basic Command Reference
Command Hierarchies
CLI Root-Level and Global Commands
Environment Commands
Rollback Commands
Candidate Commands
Show Commands
Command Descriptions
CLI Root-Level and Global Commands
Environment Commands
Candidate Commands
Rollback Commands
Show Commands
File System Management
The File System
Compact Flash Device
URLs
Wildcards
Common Configuration Tasks
Modifying File Attributes
Creating and Navigating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Displaying Directory and File Information
Repairing the File System
File System Command Reference
Command Hierarchy
Configuration Commands
Command Descriptions
Configuration Commands
Boot Options
System Initialization
Configuration and Image Loading
Persistence
Automatic Discovery Protocol
Self-discovery
Network Discovery
Configuration Discovery
Test and Commit
FIPS-140-2 Mode
CSM and Data Path Security Features and Algorithms in FIPS-140-2 Mode
SSHv2 Approved Algorithms in FIPS-140-2 Mode
Initial System Startup Process Overview
Boot Loader File Protection
Before Upgrading
Performing the Upgrade
Accessing the CLI
Console Connection
Telnet Connection
Running Telnet
SSH Connection
Running SSH
Accessing MPT Radios Connected to a 7705 SAR
Configuration Notes
Configuring the BOF with the CLI
BOF Configuration Overview
Basic BOF Configuration
Configuring BOF Parameters
Configuring BOF Encryption
Configuration File Encryption
Service Management Tasks
System Administration Commands
Viewing the Current Configuration
Modifying or Deleting BOF Parameters
Saving a Configuration
Saving a Configuration to a Different Filename
Rebooting
BOF Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
File Management Commands
BOF Processing Control Commands
Console Port Configuration Commands
Image and Configuration Management Commands
CSM Management Configuration Commands
DNS Configuration Commands
Show Commands
System Management
System Management Parameters
System Information
System Name
System Contact
System Location
System Coordinates
Common Language Location Identifier
System Identifier
PoE Power Source
System Time
Time Zones
NTP
SNTP Time Synchronization
PTP
Time-of-Day Measurement (ToD-1pps)
GNSS
CRON
High Availability
High Availability Features
Redundancy
Software Redundancy
Configuration Redundancy
Component Redundancy
Accounting Configuration Redundancy
Multi-Chassis LAG Redundancy
Nonstop Routing (NSR)
In-service Upgrade
CSM Switchover
Synchronization
Configuration and boot-env Synchronization
State Database Synchronization
CSM Synchronization and Redundancy
Active and Standby Designations
When the Active CSM Goes Offline
Persistence
Administrative Tasks
Saving Configurations
Specifying Post-Boot Configuration Files
Automatic Synchronization
Boot-Env Option
Config Option
Manual Synchronization
Forcing a Switchover
Node Timing
External Timing Mode
Line Timing Mode
Adaptive Clock Recovery (ACR)
ACR States
ACR Statistics
Differential Clock Recovery (DCR)
DCR Frequencies
Serial Clock Transport (DCR Serial)
Proprietary Clock Recovery (PCR)
IEEE 1588v2 PTP
Best Master Clock Algorithm
PTP Clock Synchronization
Performance Considerations
PTP Capabilities
PTP Ordinary Slave Clock For Frequency
PTP Ordinary Master Clock For Frequency
PTP Boundary Clock For Frequency
PTP Ordinary Slave Clock for Time of Day/Phase Recovery
PTP Boundary Clock for Time of Day/Phase Recovery
PTP End-to-End Transparent Clock for Time of Day/Phase Recovery
PTP Master Clock for Time of Day/Phase Distribution
PTP Clock Redundancy
PTP Ethernet Capabilities
ITU-T G.8275.1 and G.8275.2
Synchronization Certainty/Uncertainty
IEC/IEEE 61850-9-3 and C37.238-2017
PTP Profile Interworking
Single-clock PTP Profile Interworking
Multi-clock PTP Profile Interworking
PTP Statistics
Synchronous Ethernet
Synchronization Status Messaging with Quality Level Selection
Timing Reference Selection Based on Quality Level
SSM/ESMC QL Transmission
DS1 Physical Port QL Transmission
E1 Physical Port QL Transmission
System Configuration Process Overview
Configuration Notes
Configuring System Management with CLI
System Management Configuration
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Identifier
System Time Elements
Zone
Summer Time Conditions
NTP
Authentication-check
Authentication-key
Broadcastclient
MDA-timestamp
Multicastclient
Server
SNTP
Broadcast-client
Server-address
PTP
Time-of-Day Measurement (ToD-1pps)
GNSS
CRON
Configuring Script Parameters
Configuring Synchronization and Redundancy
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy
Configuring ATM Parameters
Configuring Backup Copies
Configuring System Administration Parameters
Disconnect
Set-time
Display-config
Tech-support
Save
Reboot
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Entering Edit Mode
Configuring Timing References
Configuring IEEE 1588v2 PTP
Configuring QL Values for SSM
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
Configuring LLDP
System Command Reference
Command Hierarchies
Configuration Commands
System Information and General Commands
System Alarm Commands
Persistence Commands
System Time Commands
CRON Commands
Script Control Commands
System Synchronization Commands
System LLDP Commands
System PTP Commands
Administration Commands
System Administration Commands
High Availability (Redundancy) Commands
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Configuration Commands
Generic Commands
System Information and General Commands
System Alarm Commands
Persistence Commands
System Time Commands
CRON Commands
Script Control Commands
System Synchronization Configuration Commands
LLDP System Commands
System PTP Commands
Administration Commands
System Administration Commands
High Availability (Redundancy) Commands
Show Commands
Clear Commands
Debug Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
7705 SAR Interface Configuration Guide R23.4.R1
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR Interface Configuration Process
7705 SAR Interfaces
Configuration Overview
Configuring the IOM and Card Slot
Configuring Adapter Cards and Modules
Provisioning Chassis Slots for Adapter Cards
Maximum Number of Adapter Cards in a Chassis
Evolution of Ethernet Adapter Cards, Modules, and Platforms
Channelized Adapter Card Support
PPP Over Fractional T1/E1
Configuring Ports
Ethernet
6-port Ethernet 10Gbps Adapter Card
8-port Gigabit Ethernet Adapter Card
10-port 1GigE/1-port 10GigE X-Adapter Card
2-port 10GigE (Ethernet) Adapter Card/Module
Packet Microwave Adapter Card
4-port SAR-H Fast Ethernet Module
6-port SAR-M Ethernet Module
7705 SAR-A
7705 SAR-Ax
7705 SAR-H
7705 SAR-Hc
7705 SAR-M
7705 SAR-Wx
7705 SAR-X
TDM
16-port T1/E1 ASAP Adapter Card
32-port T1/E1 ASAP Adapter Card
2-port OC3/STM1 Channelized Adapter Card
4-port OC3/STM1 / 1-port OC12/STM4 Adapter Card
4-port DS3/E3 Adapter Card
8-port Voice & Teleprotection Card
8-port C37.94 Teleprotection Card
12-port Serial Data Interface Card
4-port T1/E1 and RS-232 Combination Module
7705 SAR-A
7705 SAR-Hc
7705 SAR-M
7705 SAR-X
GNSS Receiver
Multilink Bundles
IMA
SONET/SDH
Voice
6-port E&M Adapter Card
8-port Voice & Teleprotection Card
8-port FXO Adapter Card
6-port FXS Adapter Card
Microwave Link
CLI Identifiers for Adapter Cards, Modules and Platforms
Access, Network, and Hybrid Ports
Rate Limiting
Access Ports
H-QoS for Access Egress Ethernet Ports
Network Ports
Aggregate CIR for Unshaped VLANs on Network Egress Ethernet Ports
Hybrid Ports
Configuring SCADA Bridges
Port Features
Multilink Point-to-Point Protocol
MLPPP Overview
Protocol Field (PID)
B&E Bits
Sequence Number
Information Field
Padding
FCS
LCP
T1/E1 Link Hold Timers
Multi-Class MLPPP
QoS in MC-MLPPP
cHDLC
SLARP
Inverse Multiplexing Over ATM (IMA)
Network Synchronization on Ports and Circuits
Network Synchronization on T1/E1 and Ethernet Ports
Network Synchronization on SONET/SDH Ports
Network Synchronization on DS3/E3 Ports
Network Synchronization on DS3 CES Circuits
Network Synchronization on T1/E1 Ports and Circuits
Node Synchronization From GNSS Receiver Ports
Flow Control on Ethernet Ports
Ethernet OAM
Ethernet OAM Overview
CRC (Cyclic Redundancy Check) Monitoring
Remote Loopback
802.3ah OAMPDU Tunneling and Termination for Epipe Service
Dying Gasp
Ethernet Loopbacks
Line and Internal Ethernet Loopbacks
MAC Swapping
Interaction of Ethernet Port Loopback with Other Features
CFM Loopbacks for OAM on Ethernet Ports
CFM Loopback Overview
CFM Loopback Mechanics
Ethernet Port Down-When-Looped
Ethernet Ring (Adapter Card and Module)
MTU Configuration Guidelines
MTU Configuration Overview
IP Fragmentation
Jumbo Frames
Behavior of Adapter Cards Not Supporting Jumbo Frames on 7705 SAR-8 Shelf V2 and 7705 SAR-18 only
Jumbo Frame Behavior on the Fixed Platforms
Multicast Support for Jumbo Frames
PMC Jumbo Frame Support
Default Port MTU Values
LAG
LAG Overview
LACP and Active/Standby Operation
QoS Adaptation for LAG on Access
Adaptive QoS Examples (Distribute Mode)
QoS for LAG on Network
Access Ingress Fabric Shaping
Hold-down Timers
Multi-Chassis LAG
Static LAG (Active/Standby LAG Operation without LACP)
LAG Support on Mixed-Generation Hardware
LAG Configuration at SAP Level
LAG Configuration at Port Level
BFD Over LAG Links (Micro-BFD)
Configuration Rules
Configuration Examples
LAG and ECMP Hashing
Per-Flow Hashing
Per-Service Hashing
LSR Hashing
LSR Label-only Hashing
LSR Label-IP Hashing
LSR Label-IP Hashing with Layer 4 Header and TEID
Label Stack Profile Options
Ingress Port
Layer 4 Load Balancing
TEID Hashing for GTP-encapsulated Traffic
Entropy Labels
Security Parameter Index (SPI) Load Balancing
SONET/SDH
SONET
SDH
SONET/SDH Path Support
SONET/SDH Channelized Port ID
Automatic Protection Switching
APS Overview
SC-APS
MC-APS
MC-APS and Inter-Chassis Backup
K1 and K2 Bytes
Bidirectional 1+1 APS example
Revertive Mode
APS Tools Commands
Lockout Protection
Request Switch of Active to Protection
Request Switch of Active to Working
Forced Switch from Working to Protection
Forced Switch from Protection to Working
Exercise
APS Failure Codes
Protection Switching Byte Failure (APS-PSB)
Channel Mismatch Failure (APS-CM)
APS Mode Mismatch Failure (APS-MM)
Far-End Protection Line Failure (APS-FEPL)
T1/E1 Line Card Redundancy
T1/E1 LCR Overview
SC-LCR
MC-LCR
MC-LCR and Inter-Chassis Backup
Revertive Mode
LCR Tools Commands
Force Activity from Working Card
Force Activity from Protection Card
Deploying Preprovisioned Components
Microwave Link
Microwave Link Overview
Standalone Mode
Single NE Mode
Single NE Management
One Management IP Address
MPR-e Radio Configuration Management
MPR-e Radio Alarm Management
MPR-e Radio Software and Upgrade Management
MPR-e Radio Configuration Database File Management
MPR-e Radio Inventory and Microwave Link Performance Statistics
MPR-e Radio Reset Control
MPR-e Radio Mute Control
Microwave Link Fast Fault Detection (FFD)
1+1 HSB
1+1 Equipment Protection Switching (EPS)
1+1 Transmission Protection Switching (TPS)
1+1 Radio Protection Switching (RPS)
1+1 HSB Transmit Diversity Antenna (TDA)
Communication Method Between the Main and Spare MPR-e Radio
1+1 Switching Operation
Frequency Synchronization
RSL History
Custom Alarms on Ethernet Ports
802.1x Network Access Control
802.1x Basics
802.1x Modes
802.1x Timers
802.1x Tunneling
802.1x Configuration and Limitations
MAC Authentication
Link Layer Discovery Protocol (LLDP)
LLDP Protocol Features
Surveillance, Control, and Data Acquisition (SCADA) Support
Multidrop Data Bridge
PCM Multidrop Bridge
Redundant Masters
Squelch Functionality
Voice Conference Bridge
VCB Applications
VCB Mute Output Option
Gain
Serial Transport Over Raw Sockets
Raw Socket Configuration
Raw Socket Packet Processing
Raw Socket Processing for UDP Sessions
Raw Socket Processing for TCP Sessions
Raw Socket Squelch Functionality
Configuration Notes
Configuring Physical Components with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port or SCADA Bridge
Maximizing Bandwidth Use
Using Partial Bandwidth
Basic Configuration
Common Configuration Tasks
Configuring Cards and Adapter Cards
Configuring Cards
Configuring Adapter Card Network Queue QoS Policies
Configuring Ring Adapter Card or Module Network and Network Queue QoS Policies
Configuring Adapter Card Fabric Statistics
Configuring Adapter Card Fabric Profile
Configuring Adapter Card Clock Mode
Configuring Adapter Card Voice Attributes
Configuring Ring Adapter Card or Module Parameters
Configuring Auxiliary Alarm Card, Chassis, and Ethernet Port External Alarm Parameters
Displaying Adapter Card Information
Configuring Ports
Configuring APS Port Parameters
Configuring LCR Parameters
Configuring a Microwave Link
Configuring Ethernet Port Parameters
Configuring an Ethernet Network Port
Configuring an Ethernet Access Port
Configuring a Hybrid Ethernet Port
Configuring 802.1x Authentication Port Parameters
Configuring MAC Authentication Port Parameters
Configuring SONET/SDH Port Parameters
Configuring a SONET/SDH Access Port
Configuring a SONET/SDH Network Port
4-port OC3/STM1 Clear Channel Adapter Card
2-port OC3/STM1 Channelized Adapter Card
Configuring the SONET/SDH Port group and path Commands
Configuring SONET/SDH Parameters on an Ethernet XGIG WAN Port
SONET/SDH Channelized Port Configuration Examples
OC3 Channelization using SONET and SDH
Configuring DS1/E1 on a Channelized OC3 Port with STS1 Path
1. DS1 (SONET Framing, STS1)
1.1 STS1 with channelized DS3 payload
1.2 STS1 with VT1.5 payload
2. E1 (SONET Framing, STS1)
Configuring DS1/E1 on a Channelized OC3 Port with STM Path
1. DS1 (SDH Framing, STS1)
1.1 STS1 with channelized DS3 payload
1.2 STS1 with VT1.5 payload
2. E1 (SDH Framing, STS1)
2.1 STS1 with channelized DS3 payload
2.2 STS1 with VT2 payload
Configuring DS1/E1 on a Channelized OC3 Port with STS3 Path
1. DS1 (SDH Framing, STS3)
1.1 STS3 / TUG with VT1.5 payload
1.2 STS3 / TUG with TU3 payload
2. E1 (SDH Framing, STS3)
Configuring a SONET/SDH Port with Multiple DS1s in an MLPPP Bundle
Configuring the Network Port
Verifying the Configured Network Ports
Verifying the Available Channelization
Configuring Voice Ports
Configuring Codirectional G.703 Ports
Configuring Teleprotection Ports
Configuring TDM PPP
Configuring Channelized Ports
Verifying the Adapter Card Type
Configuring Fractional T1/E1 Ports for PPP Encapsulation
Configuring T1 Line Buildout
Configuring DS1 or E1 SSM
Configuring ATM Interface Parameters
ATM Interface Commands
Configuring Multilink PPP Bundles
Configuring MC-MLPPP
Configuring LAG Parameters
Configuring Multilink ATM Inverse Multiplexing (IMA) Groups
Configuring IMA Groups
Configuration Notes for IMA Groups
IMA Test Procedure
Configuring SDI Ports for IPCP Encapsulation
Configuring TDM and SDI Ports for Frame Relay Encapsulation
Configuring TDM and SDI Ports for HDLC Encapsulation
Configuring TDM and SDI Ports for Cisco HDLC Encapsulation
Configuring GNSS Receiver Port Parameters
Configuring Serial Ports for Raw Socket Transport
Configuring SCADA Bridge Parameters
Service Management Tasks
Changing a Provisioned Adapter Card Type
Deleting an Adapter Card
Configuration Command Reference
Command Hierarchies
Card Commands
Adapter Card Commands
External Alarm Commands
APS Port Commands
T1/E1 LCR Commands
Microwave Link Commands
Port Configuration Commands
Ethernet Commands
GNSS Commands
IEEE 802.1x Ethernet Port Commands
LLDP Ethernet Port Commands
Ring Virtual Port Ethernet Commands
Ring MAC Operations Commands
Multilink Bundle and IMA Group Commands
Serial Commands
SONET/SDH Commands
TDM Commands
DS1 Commands
DS3 Commands
E1 Commands
E3 Commands
Voice Commands
LAG Commands
SCADA Commands
Command Descriptions
Generic Commands
Card Commands
Adapter Card Commands
Interface QoS Commands
External Alarm Commands
APS Port Commands
T1/E1 LCR Commands
Microwave Link Commands
General Port Commands
Ethernet Commands
GNSS Commands
IEEE 802.1x Ethernet Port Commands
LLDP Ethernet Port Commands
Ring MAC Operations Commands
Serial Commands
RS-232, RS-530, V.35, and X.21 Channel Group Commands
SONET/SDH Port Commands
SONET/SDH Path Commands
Network Port Commands
Multilink Bundle and IMA Group Commands
ATM Interface Commands
TDM Commands
DS1 and E1 Commands
DS1 and E1 Channel Group Commands
DS3 and E3 Commands
Voice Commands
Voice Channel Group Commands
LAG Commands
Frame Relay Commands
Cisco HDLC Commands
SCADA Commands
Show, Monitor, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Show APS Commands
Show Card Commands
Show External Alarms Commands
Show T1/E1 LCR Commands
Show Microwave Link Commands
Show Port Commands
Show ATM Port Commands
Show Port-tree Commands
Show LAG Commands
Show Multilink Bundle and IMA Group Commands
Show ATM IMA Group Commands
Show SCADA Commands
Monitor Commands
Clear Commands
Debug Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR Interface Configuration Process
7705 SAR Interfaces
Configuration Overview
Configuring the IOM and Card Slot
Configuring Adapter Cards and Modules
Provisioning Chassis Slots for Adapter Cards
Maximum Number of Adapter Cards in a Chassis
Evolution of Ethernet Adapter Cards, Modules, and Platforms
Channelized Adapter Card Support
PPP Over Fractional T1/E1
Configuring Ports
Ethernet
6-port Ethernet 10Gbps Adapter Card
8-port Gigabit Ethernet Adapter Card
10-port 1GigE/1-port 10GigE X-Adapter Card
2-port 10GigE (Ethernet) Adapter Card/Module
Packet Microwave Adapter Card
4-port SAR-H Fast Ethernet Module
6-port SAR-M Ethernet Module
7705 SAR-A
7705 SAR-Ax
7705 SAR-H
7705 SAR-Hc
7705 SAR-M
7705 SAR-Wx
7705 SAR-X
TDM
16-port T1/E1 ASAP Adapter Card
32-port T1/E1 ASAP Adapter Card
2-port OC3/STM1 Channelized Adapter Card
4-port OC3/STM1 / 1-port OC12/STM4 Adapter Card
4-port DS3/E3 Adapter Card
8-port Voice & Teleprotection Card
8-port C37.94 Teleprotection Card
12-port Serial Data Interface Card
4-port T1/E1 and RS-232 Combination Module
7705 SAR-A
7705 SAR-Hc
7705 SAR-M
7705 SAR-X
GNSS Receiver
Multilink Bundles
IMA
SONET/SDH
Voice
6-port E&M Adapter Card
8-port Voice & Teleprotection Card
8-port FXO Adapter Card
6-port FXS Adapter Card
Microwave Link
CLI Identifiers for Adapter Cards, Modules and Platforms
Access, Network, and Hybrid Ports
Rate Limiting
Access Ports
H-QoS for Access Egress Ethernet Ports
Network Ports
Aggregate CIR for Unshaped VLANs on Network Egress Ethernet Ports
Hybrid Ports
Configuring SCADA Bridges
Port Features
Multilink Point-to-Point Protocol
MLPPP Overview
Protocol Field (PID)
B&E Bits
Sequence Number
Information Field
Padding
FCS
LCP
T1/E1 Link Hold Timers
Multi-Class MLPPP
QoS in MC-MLPPP
cHDLC
SLARP
Inverse Multiplexing Over ATM (IMA)
Network Synchronization on Ports and Circuits
Network Synchronization on T1/E1 and Ethernet Ports
Network Synchronization on SONET/SDH Ports
Network Synchronization on DS3/E3 Ports
Network Synchronization on DS3 CES Circuits
Network Synchronization on T1/E1 Ports and Circuits
Node Synchronization From GNSS Receiver Ports
Flow Control on Ethernet Ports
Ethernet OAM
Ethernet OAM Overview
CRC (Cyclic Redundancy Check) Monitoring
Remote Loopback
802.3ah OAMPDU Tunneling and Termination for Epipe Service
Dying Gasp
Ethernet Loopbacks
Line and Internal Ethernet Loopbacks
MAC Swapping
Interaction of Ethernet Port Loopback with Other Features
CFM Loopbacks for OAM on Ethernet Ports
CFM Loopback Overview
CFM Loopback Mechanics
Ethernet Port Down-When-Looped
Ethernet Ring (Adapter Card and Module)
MTU Configuration Guidelines
MTU Configuration Overview
IP Fragmentation
Jumbo Frames
Behavior of Adapter Cards Not Supporting Jumbo Frames on 7705 SAR-8 Shelf V2 and 7705 SAR-18 only
Jumbo Frame Behavior on the Fixed Platforms
Multicast Support for Jumbo Frames
PMC Jumbo Frame Support
Default Port MTU Values
LAG
LAG Overview
LACP and Active/Standby Operation
QoS Adaptation for LAG on Access
Adaptive QoS Examples (Distribute Mode)
QoS for LAG on Network
Access Ingress Fabric Shaping
Hold-down Timers
Multi-Chassis LAG
Static LAG (Active/Standby LAG Operation without LACP)
LAG Support on Mixed-Generation Hardware
LAG Configuration at SAP Level
LAG Configuration at Port Level
BFD Over LAG Links (Micro-BFD)
Configuration Rules
Configuration Examples
LAG and ECMP Hashing
Per-Flow Hashing
Per-Service Hashing
LSR Hashing
LSR Label-only Hashing
LSR Label-IP Hashing
LSR Label-IP Hashing with Layer 4 Header and TEID
Label Stack Profile Options
Ingress Port
Layer 4 Load Balancing
TEID Hashing for GTP-encapsulated Traffic
Entropy Labels
Security Parameter Index (SPI) Load Balancing
SONET/SDH
SONET
SDH
SONET/SDH Path Support
SONET/SDH Channelized Port ID
Automatic Protection Switching
APS Overview
SC-APS
MC-APS
MC-APS and Inter-Chassis Backup
K1 and K2 Bytes
Bidirectional 1+1 APS example
Revertive Mode
APS Tools Commands
Lockout Protection
Request Switch of Active to Protection
Request Switch of Active to Working
Forced Switch from Working to Protection
Forced Switch from Protection to Working
Exercise
APS Failure Codes
Protection Switching Byte Failure (APS-PSB)
Channel Mismatch Failure (APS-CM)
APS Mode Mismatch Failure (APS-MM)
Far-End Protection Line Failure (APS-FEPL)
T1/E1 Line Card Redundancy
T1/E1 LCR Overview
SC-LCR
MC-LCR
MC-LCR and Inter-Chassis Backup
Revertive Mode
LCR Tools Commands
Force Activity from Working Card
Force Activity from Protection Card
Deploying Preprovisioned Components
Microwave Link
Microwave Link Overview
Standalone Mode
Single NE Mode
Single NE Management
One Management IP Address
MPR-e Radio Configuration Management
MPR-e Radio Alarm Management
MPR-e Radio Software and Upgrade Management
MPR-e Radio Configuration Database File Management
MPR-e Radio Inventory and Microwave Link Performance Statistics
MPR-e Radio Reset Control
MPR-e Radio Mute Control
Microwave Link Fast Fault Detection (FFD)
1+1 HSB
1+1 Equipment Protection Switching (EPS)
1+1 Transmission Protection Switching (TPS)
1+1 Radio Protection Switching (RPS)
1+1 HSB Transmit Diversity Antenna (TDA)
Communication Method Between the Main and Spare MPR-e Radio
1+1 Switching Operation
Frequency Synchronization
RSL History
Custom Alarms on Ethernet Ports
802.1x Network Access Control
802.1x Basics
802.1x Modes
802.1x Timers
802.1x Tunneling
802.1x Configuration and Limitations
MAC Authentication
Link Layer Discovery Protocol (LLDP)
LLDP Protocol Features
Surveillance, Control, and Data Acquisition (SCADA) Support
Multidrop Data Bridge
PCM Multidrop Bridge
Redundant Masters
Squelch Functionality
Voice Conference Bridge
VCB Applications
VCB Mute Output Option
Gain
Serial Transport Over Raw Sockets
Raw Socket Configuration
Raw Socket Packet Processing
Raw Socket Processing for UDP Sessions
Raw Socket Processing for TCP Sessions
Raw Socket Squelch Functionality
Configuration Notes
Configuring Physical Components with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port or SCADA Bridge
Maximizing Bandwidth Use
Using Partial Bandwidth
Basic Configuration
Common Configuration Tasks
Configuring Cards and Adapter Cards
Configuring Cards
Configuring Adapter Card Network Queue QoS Policies
Configuring Ring Adapter Card or Module Network and Network Queue QoS Policies
Configuring Adapter Card Fabric Statistics
Configuring Adapter Card Fabric Profile
Configuring Adapter Card Clock Mode
Configuring Adapter Card Voice Attributes
Configuring Ring Adapter Card or Module Parameters
Configuring Auxiliary Alarm Card, Chassis, and Ethernet Port External Alarm Parameters
Displaying Adapter Card Information
Configuring Ports
Configuring APS Port Parameters
Configuring LCR Parameters
Configuring a Microwave Link
Configuring Ethernet Port Parameters
Configuring an Ethernet Network Port
Configuring an Ethernet Access Port
Configuring a Hybrid Ethernet Port
Configuring 802.1x Authentication Port Parameters
Configuring MAC Authentication Port Parameters
Configuring SONET/SDH Port Parameters
Configuring a SONET/SDH Access Port
Configuring a SONET/SDH Network Port
4-port OC3/STM1 Clear Channel Adapter Card
2-port OC3/STM1 Channelized Adapter Card
Configuring the SONET/SDH Port group and path Commands
Configuring SONET/SDH Parameters on an Ethernet XGIG WAN Port
SONET/SDH Channelized Port Configuration Examples
OC3 Channelization using SONET and SDH
Configuring DS1/E1 on a Channelized OC3 Port with STS1 Path
1. DS1 (SONET Framing, STS1)
1.1 STS1 with channelized DS3 payload
1.2 STS1 with VT1.5 payload
2. E1 (SONET Framing, STS1)
Configuring DS1/E1 on a Channelized OC3 Port with STM Path
1. DS1 (SDH Framing, STS1)
1.1 STS1 with channelized DS3 payload
1.2 STS1 with VT1.5 payload
2. E1 (SDH Framing, STS1)
2.1 STS1 with channelized DS3 payload
2.2 STS1 with VT2 payload
Configuring DS1/E1 on a Channelized OC3 Port with STS3 Path
1. DS1 (SDH Framing, STS3)
1.1 STS3 / TUG with VT1.5 payload
1.2 STS3 / TUG with TU3 payload
2. E1 (SDH Framing, STS3)
Configuring a SONET/SDH Port with Multiple DS1s in an MLPPP Bundle
Configuring the Network Port
Verifying the Configured Network Ports
Verifying the Available Channelization
Configuring Voice Ports
Configuring Codirectional G.703 Ports
Configuring Teleprotection Ports
Configuring TDM PPP
Configuring Channelized Ports
Verifying the Adapter Card Type
Configuring Fractional T1/E1 Ports for PPP Encapsulation
Configuring T1 Line Buildout
Configuring DS1 or E1 SSM
Configuring ATM Interface Parameters
ATM Interface Commands
Configuring Multilink PPP Bundles
Configuring MC-MLPPP
Configuring LAG Parameters
Configuring Multilink ATM Inverse Multiplexing (IMA) Groups
Configuring IMA Groups
Configuration Notes for IMA Groups
IMA Test Procedure
Configuring SDI Ports for IPCP Encapsulation
Configuring TDM and SDI Ports for Frame Relay Encapsulation
Configuring TDM and SDI Ports for HDLC Encapsulation
Configuring TDM and SDI Ports for Cisco HDLC Encapsulation
Configuring GNSS Receiver Port Parameters
Configuring Serial Ports for Raw Socket Transport
Configuring SCADA Bridge Parameters
Service Management Tasks
Changing a Provisioned Adapter Card Type
Deleting an Adapter Card
Configuration Command Reference
Command Hierarchies
Card Commands
Adapter Card Commands
External Alarm Commands
APS Port Commands
T1/E1 LCR Commands
Microwave Link Commands
Port Configuration Commands
Ethernet Commands
GNSS Commands
IEEE 802.1x Ethernet Port Commands
LLDP Ethernet Port Commands
Ring Virtual Port Ethernet Commands
Ring MAC Operations Commands
Multilink Bundle and IMA Group Commands
Serial Commands
SONET/SDH Commands
TDM Commands
DS1 Commands
DS3 Commands
E1 Commands
E3 Commands
Voice Commands
LAG Commands
SCADA Commands
Command Descriptions
Generic Commands
Card Commands
Adapter Card Commands
Interface QoS Commands
External Alarm Commands
APS Port Commands
T1/E1 LCR Commands
Microwave Link Commands
General Port Commands
Ethernet Commands
GNSS Commands
IEEE 802.1x Ethernet Port Commands
LLDP Ethernet Port Commands
Ring MAC Operations Commands
Serial Commands
RS-232, RS-530, V.35, and X.21 Channel Group Commands
SONET/SDH Port Commands
SONET/SDH Path Commands
Network Port Commands
Multilink Bundle and IMA Group Commands
ATM Interface Commands
TDM Commands
DS1 and E1 Commands
DS1 and E1 Channel Group Commands
DS3 and E3 Commands
Voice Commands
Voice Channel Group Commands
LAG Commands
Frame Relay Commands
Cisco HDLC Commands
SCADA Commands
Show, Monitor, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Show APS Commands
Show Card Commands
Show External Alarms Commands
Show T1/E1 LCR Commands
Show Microwave Link Commands
Show Port Commands
Show ATM Port Commands
Show Port-tree Commands
Show LAG Commands
Show Multilink Bundle and IMA Group Commands
Show ATM IMA Group Commands
Show SCADA Commands
Monitor Commands
Clear Commands
Debug Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
7705 SAR Log Events Guide R23.4.R1
Legal notice
Log Events
Overview of Log Events
Log Event Example
APPLICATION_ASSURANCE
APS
ATM
BFD
BGP
CALLTRACE
CFLOWD
CHASSIS
DEBUG
DHCP
DHCPS
DIAMETER
DYNSVC
EFM_OAM
ELMI
ERING
ETH_CFM
ETUN
FILTER
FIREWALL
GMPLS
GSMP
IGH
IGMP
IGMP_SNOOPING
IP
IPSEC
ISIS
L2TP
LAG
LDAP
LDP
LI
LLDP
LMP
LOGGER
MC_REDUNDANCY
MCPATH
MIRROR
MLD
MLD_SNOOPING
MPLS
MPLS_TP
MSDP
MWMGR
NAT
NTP
OAM
OPEN_FLOW
OSPF
PCAP
PIM
PIM_SNOOPING
PORT
PPP
PPPOE
PTP
RADIUS
RIP
RIP_NG
ROUTE_POLICY
RPKI
RSVP
SATELLITE
SECURITY
SFLOW
SNMP
STP
SVCMGR
SYSTEM
USER
VIDEO
VRRP
VRTR
WLAN_GW
WPP
Customer Documentation and Product Support
Legal notice
Log Events
Overview of Log Events
Log Event Example
APPLICATION_ASSURANCE
APS
ATM
BFD
BGP
CALLTRACE
CFLOWD
CHASSIS
DEBUG
DHCP
DHCPS
DIAMETER
DYNSVC
EFM_OAM
ELMI
ERING
ETH_CFM
ETUN
FILTER
FIREWALL
GMPLS
GSMP
IGH
IGMP
IGMP_SNOOPING
IP
IPSEC
ISIS
L2TP
LAG
LDAP
LDP
LI
LLDP
LMP
LOGGER
MC_REDUNDANCY
MCPATH
MIRROR
MLD
MLD_SNOOPING
MPLS
MPLS_TP
MSDP
MWMGR
NAT
NTP
OAM
OPEN_FLOW
OSPF
PCAP
PIM
PIM_SNOOPING
PORT
PPP
PPPOE
PTP
RADIUS
RIP
RIP_NG
ROUTE_POLICY
RPKI
RSVP
SATELLITE
SECURITY
SFLOW
SNMP
STP
SVCMGR
SYSTEM
USER
VIDEO
VRRP
VRTR
WLAN_GW
WPP
Customer Documentation and Product Support
7705 SAR MPLS Guide R23.4.R1
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR MPLS Configuration Process
MPLS and RSVP-TE
Overview
MPLS
Traffic Engineering for MPLS
TE Metric and IGP Metric
MPLS Label Stack
Label Values
MPLS Entropy Labels
Overview of Entropy Labels
Inserting and Processing the Entropy Label
Ingress LER
LSR
Egress LER
Entropy Label on OAM Packets
Segment Routing Entropy Label and IPSec, ESPI Hashing, and NGE
Entropy Label Configuration
Label Edge and Label Switch Routers
LSP Types
RSVP and RSVP-TE
RSVP-TE Overview
Using RSVP-TE for MPLS
RSVP-TE Extensions for MPLS
Hello Protocol
Authentication
Authentication Key
Authentication Keychains
Non-Router ID Addresses as Destinations and Hops
RSVP LSP and LDP FEC Statistics
Configuring RSVP LSP Statistics at Ingress LER
Configuring RSVP LSP Statistics at Egress LER
Configuring LDP FEC Statistics
RSVP-TE Signaling
General Attributes of RSVP-TE
Bidirectional Forwarding Detection
RSVP-TE over Broadcast Interface with BFD
Timers
LSP Resignal Limit
RSVP-TE Message Pacing
RSVP-TE Overhead Refresh Reduction
RSVP-TE Reservation Styles
Implicit Null Label
RSVP-TE Entropy Labels
LSP Redundancy
Make-Before-Break (MBB) Procedures for LSP and Path Parameter Configuration Changes
Automatic Creation of RSVP-TE LSPs
Automatic Creation of RSVP-TE LSP Mesh (Auto-LSP)
Multi-Area and Multi-Instance Support
Mesh LSP Name Encoding
Automatic Creation of an RSVP-TE Single-Hop LSP
Automatic ABR Selection for Inter-area LSPs
Rerouting of Inter-area LSPs
Behavior of MPLS Options in Inter-area LSPs
Inter-area LSP Support of OSPF Virtual Links
ABR FRR Protection for Inter-area LSP
Preference Option for Standby Secondary LSP Paths
RSVP-TE Fast Reroute (FRR)
FRR Terminology
Bypass Resignal Timer
FRR Behavior
Dynamic and Manual Bypass LSPs
Bypass LSP Selection Rules for the PLR
FRR Node Protection (Facility Backup)
Admin Group Support on Facility Bypass Backup LSPs
FRR Over Unnumbered Interfaces
Shared Risk Link Groups
SRLGs for Secondary LSP Paths
SRLGs for FRR LSP Paths
Disjoint and Non-disjoint Paths
Enabling Disjoint Backup Paths
RSVP-TE Graceful Shutdown
RSVP-TE Support for Unnumbered Interfaces
PCEP Support for RSVP-TE LSPs
Segment Routing with Traffic Engineering (SR-TE)
SR-TE Support
SR-TE LSP Instantiation
PCC-initiated and PCC-controlled LSPs
Guidelines for Using PCC-initiated and PCC-controlled LSPs
PCC-initiated and PCE-computed/controlled LSP
SR-TE LSP Path Computation
Service and Shortcut Application SR-TE Label Stack Check
SR-TE LSP Paths Using Explicit SIDs
SR-TE LSP Protection
Local Protection
End-to-End Protection
Seamless BFD for SR-TE LSPs
Configuration of S-BFD on SR-TE LSPs
Support for BFD Failure Action with SR-TE LSPs
SR-TE LSP State Changes and Failure Actions Based on S-BFD
S-BFD Operational Considerations
Static Route Resolution Using SR-TE LSPs
BGP Label Route Resolution Using SR-TE LSPs
Service Packet Forwarding Using SR-TE LSPs
Data Path Support
SR-TE LSP Metric and MTU Settings
SR-TE Entropy Labels
Weighted ECMP by RSVP-TE or SR-TE LSPs
Weighted ECMP for VPRN Services with Auto-bind
Weighted ECMP for EVPN
Weighted ECMP for SDPs
MPLS Service Usage
Service Destination Points
MPLS and RSVP-TE Configuration Process Overview
Configuration Notes
Configuring MPLS and RSVP-TE with CLI
MPLS Configuration Overview
Router Interface
E-LSP for Differentiated Services
Paths
LSPs
Pseudowires
Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring a Fast-Retry Timer for Static LSPs
Configuring Manual Bypass Tunnels
Configuring RSVP-TE Parameters and Interfaces
Configuring RSVP-TE Message Pacing Parameters
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP-TE Configuration Management Tasks
Modifying RSVP-TE Parameters
Modifying RSVP-TE Message Pacing Parameters
Deleting an Interface from RSVP-TE
Configuring and Operating SR-TE
SR-TE Configuration Prerequisites
SR-TE LSP Configuration Overview
Configuring Path Computation and Control for SR-TE LSPs
Configuring Path Profile and Group for PCC-initiated and PCE-computed/controlled LSPs
Configuring SR-TE LSP Label Stack Size
Configuring Adjacency SID Parameters
Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
MPLS and RSVP-TE Command Reference
Command Hierarchies
MPLS Commands
RSVP-TE Commands
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Command Descriptions
Configuration Commands (MPLS)
Generic Commands
MPLS Global Commands
RSVP LSP Statistics Commands
Interface Commands
Interface Label-Map Commands
LSP and LSP Template Commands
Primary and Secondary Path Commands
LSP Path Commands
Static LSP Commands
Configuration Commands (RSVP-TE)
Generic Commands
RSVP-TE Global Commands
Interface Commands
Message Pacing Commands
Show Commands (MPLS)
Show Commands (MPLS-Labels)
Show Commands (Seamless BFD)
Show Commands (RSVP)
Clear Commands
Monitor Commands
Debug Commands
PCEP
Introduction to the Path Computation Element (PCE) Communication Protocol (PCEP)
Path Computation Fallback for PCC-initiated LSPs
Base Implementation of Path Computation Elements (PCE)
PCEP Session Establishment and Maintenance
PCEP Parameters
PCC Configuration
Stateful PCE
PCEP Extensions in Support of SR-TE LSPs
LSP Initiation
PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
PCEP over TLS
TLS handshake
PCEP session over TLS
PCEP Support for RSVP-TE LSPs
RSVP-TE LSP Configuration for a PCC Router
Behavior of the LSP Path Update
Path Update with Empty ERO
Behavior of LSP MBB
PCC-Controlled LSPs
PCE-Computed LSPs
PCE-Controlled LSPs
Behavior of Secondary LSP Paths
PCE Path Profile Support
LSP Path Diversity and Bidirectionality Constraints
NSP and VSR-NRC PCE Redundancy
Feature Configuration
NSP Ecosystem Redundancy
NSP Cluster Redundancy
VSR-NRC Redundancy
PCC Behavior
Configuring RSVP-TE LSPs with PCEP Using the CLI
PCEP on the PCE Node and the PCC Node
MPLS on the PCC Node
PCEP Configuration Command Reference
Command Hierarchies
PCEP Commands
Show Commands
Command Descriptions
PCEP Commands
Show Commands
Label Distribution Protocol
Label Distribution Protocol
LDP and MPLS
BFD for T-LDP
LDP Architecture
LDP Subsystem Interrelationships
Memory Manager and LDP
Label Manager
LDP Configuration
Logger
Service Manager
Execution Flow
Initialization
Session Lifetime
Adjacency Establishment
Session Establishment
Label Exchange
Implicit Null Label
Other Reasons for Label Actions
Cleanup
LDP Filters
Per-LDP peer export policies
LDP FEC Statistics
Multi-area and Multi-instance Extensions to LDP
ECMP Support for LDP
Label Operations
Graceful Restart Helper
Graceful Handling of Resource Exhaustion
LDP Support for Unnumbered Interfaces
LDP Fast Reroute (FRR)
ECMP vs FRR
IGP Shortcuts (RSVP-TE Tunnels)
LDP FRR Configuration
LDP-to-Segment Routing Stitching for IPv4 /32 Prefixes (IS-IS)
Stitching in the LDP-to-SR Direction
Stitching in the SR-to-LDP Direction
TTL Propagation and ICMP Tunneling
LDP FRR Remote LFA and TI-LFA Backup Using an SR Tunnel for IPv4 /32 Prefixes (IS-IS)
Feature Behavior
TCP MD5 Authentication
LDP Point-to-Multipoint Support
LDP Point-to-Multipoint Configuration
LDP Point-to-Multipoint Protocol
Make-Before-Break (MBB)
ECMP Support
Inter-AS Non-segmented mLDP
LDP Recursive FEC Process
Supported Recursive Opaque Values
Redundancy and Resiliency
ASBR Physical Connection
OAM
ECMP Support
ECMP Hash Algorithm
Intra-AS Non-segmented mLDP
ABR MoFRR for Intra-AS
Interaction with an Inter-AS Non-segmented mLDP Solution
Multicast LDP Fast Upstream Switchover
mLDP Fast Upstream Switchover Configuration
mLDP Fast Upstream Switchover Behavior
LDP IPv6
Link LDP
Targeted LDP
FEC Resolution
LDP Session Capabilities
LDP Adjacency Capabilities
IP Address and FEC Distribution
IGP and Static Route Synchronization with LDP
BFD Operation
Services Using SDP with an LDP IPv6 FEC
Mirror Services
Configuration at mirror source node
Configuration at mirror destination node
OAM Support with LDP IPv6
Interoperability
Interoperability with Implementations Compliant with draft- ietf-mpls-ldp-ipv6
Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
Upgrading from IPv4 to IPv6
LDP Process Overview
Configuration Notes
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring Graceful Restart Helper Parameters
Applying Import and Export Policies
Configuring Interface Parameters
Specifying Targeted Session Parameters
Specifying Peer Parameters
Configuring LDP Support for Multicast VPN (MVPN)
Configuring LDP Support for LDP-to-SR Stitching
Enabling LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
LDP Command Reference
Command Hierarchies
LDP Commands
Show Commands
Show LDP Commands
Show LDP Bindings Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Configuration Commands
Generic Commands
LDP Global Commands
Interface Parameters Commands
Session Parameters Commands
Targeted Session Commands
Show Commands
Show Router LDP Commands
Show Router LDP Bindings Commands
Clear Commands
Monitor Commands
Debug Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR MPLS Configuration Process
MPLS and RSVP-TE
Overview
MPLS
Traffic Engineering for MPLS
TE Metric and IGP Metric
MPLS Label Stack
Label Values
MPLS Entropy Labels
Overview of Entropy Labels
Inserting and Processing the Entropy Label
Ingress LER
LSR
Egress LER
Entropy Label on OAM Packets
Segment Routing Entropy Label and IPSec, ESPI Hashing, and NGE
Entropy Label Configuration
Label Edge and Label Switch Routers
LSP Types
RSVP and RSVP-TE
RSVP-TE Overview
Using RSVP-TE for MPLS
RSVP-TE Extensions for MPLS
Hello Protocol
Authentication
Authentication Key
Authentication Keychains
Non-Router ID Addresses as Destinations and Hops
RSVP LSP and LDP FEC Statistics
Configuring RSVP LSP Statistics at Ingress LER
Configuring RSVP LSP Statistics at Egress LER
Configuring LDP FEC Statistics
RSVP-TE Signaling
General Attributes of RSVP-TE
Bidirectional Forwarding Detection
RSVP-TE over Broadcast Interface with BFD
Timers
LSP Resignal Limit
RSVP-TE Message Pacing
RSVP-TE Overhead Refresh Reduction
RSVP-TE Reservation Styles
Implicit Null Label
RSVP-TE Entropy Labels
LSP Redundancy
Make-Before-Break (MBB) Procedures for LSP and Path Parameter Configuration Changes
Automatic Creation of RSVP-TE LSPs
Automatic Creation of RSVP-TE LSP Mesh (Auto-LSP)
Multi-Area and Multi-Instance Support
Mesh LSP Name Encoding
Automatic Creation of an RSVP-TE Single-Hop LSP
Automatic ABR Selection for Inter-area LSPs
Rerouting of Inter-area LSPs
Behavior of MPLS Options in Inter-area LSPs
Inter-area LSP Support of OSPF Virtual Links
ABR FRR Protection for Inter-area LSP
Preference Option for Standby Secondary LSP Paths
RSVP-TE Fast Reroute (FRR)
FRR Terminology
Bypass Resignal Timer
FRR Behavior
Dynamic and Manual Bypass LSPs
Bypass LSP Selection Rules for the PLR
FRR Node Protection (Facility Backup)
Admin Group Support on Facility Bypass Backup LSPs
FRR Over Unnumbered Interfaces
Shared Risk Link Groups
SRLGs for Secondary LSP Paths
SRLGs for FRR LSP Paths
Disjoint and Non-disjoint Paths
Enabling Disjoint Backup Paths
RSVP-TE Graceful Shutdown
RSVP-TE Support for Unnumbered Interfaces
PCEP Support for RSVP-TE LSPs
Segment Routing with Traffic Engineering (SR-TE)
SR-TE Support
SR-TE LSP Instantiation
PCC-initiated and PCC-controlled LSPs
Guidelines for Using PCC-initiated and PCC-controlled LSPs
PCC-initiated and PCE-computed/controlled LSP
SR-TE LSP Path Computation
Service and Shortcut Application SR-TE Label Stack Check
SR-TE LSP Paths Using Explicit SIDs
SR-TE LSP Protection
Local Protection
End-to-End Protection
Seamless BFD for SR-TE LSPs
Configuration of S-BFD on SR-TE LSPs
Support for BFD Failure Action with SR-TE LSPs
SR-TE LSP State Changes and Failure Actions Based on S-BFD
S-BFD Operational Considerations
Static Route Resolution Using SR-TE LSPs
BGP Label Route Resolution Using SR-TE LSPs
Service Packet Forwarding Using SR-TE LSPs
Data Path Support
SR-TE LSP Metric and MTU Settings
SR-TE Entropy Labels
Weighted ECMP by RSVP-TE or SR-TE LSPs
Weighted ECMP for VPRN Services with Auto-bind
Weighted ECMP for EVPN
Weighted ECMP for SDPs
MPLS Service Usage
Service Destination Points
MPLS and RSVP-TE Configuration Process Overview
Configuration Notes
Configuring MPLS and RSVP-TE with CLI
MPLS Configuration Overview
Router Interface
E-LSP for Differentiated Services
Paths
LSPs
Pseudowires
Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring a Fast-Retry Timer for Static LSPs
Configuring Manual Bypass Tunnels
Configuring RSVP-TE Parameters and Interfaces
Configuring RSVP-TE Message Pacing Parameters
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP-TE Configuration Management Tasks
Modifying RSVP-TE Parameters
Modifying RSVP-TE Message Pacing Parameters
Deleting an Interface from RSVP-TE
Configuring and Operating SR-TE
SR-TE Configuration Prerequisites
SR-TE LSP Configuration Overview
Configuring Path Computation and Control for SR-TE LSPs
Configuring Path Profile and Group for PCC-initiated and PCE-computed/controlled LSPs
Configuring SR-TE LSP Label Stack Size
Configuring Adjacency SID Parameters
Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
MPLS and RSVP-TE Command Reference
Command Hierarchies
MPLS Commands
RSVP-TE Commands
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Command Descriptions
Configuration Commands (MPLS)
Generic Commands
MPLS Global Commands
RSVP LSP Statistics Commands
Interface Commands
Interface Label-Map Commands
LSP and LSP Template Commands
Primary and Secondary Path Commands
LSP Path Commands
Static LSP Commands
Configuration Commands (RSVP-TE)
Generic Commands
RSVP-TE Global Commands
Interface Commands
Message Pacing Commands
Show Commands (MPLS)
Show Commands (MPLS-Labels)
Show Commands (Seamless BFD)
Show Commands (RSVP)
Clear Commands
Monitor Commands
Debug Commands
PCEP
Introduction to the Path Computation Element (PCE) Communication Protocol (PCEP)
Path Computation Fallback for PCC-initiated LSPs
Base Implementation of Path Computation Elements (PCE)
PCEP Session Establishment and Maintenance
PCEP Parameters
PCC Configuration
Stateful PCE
PCEP Extensions in Support of SR-TE LSPs
LSP Initiation
PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
PCEP over TLS
TLS handshake
PCEP session over TLS
PCEP Support for RSVP-TE LSPs
RSVP-TE LSP Configuration for a PCC Router
Behavior of the LSP Path Update
Path Update with Empty ERO
Behavior of LSP MBB
PCC-Controlled LSPs
PCE-Computed LSPs
PCE-Controlled LSPs
Behavior of Secondary LSP Paths
PCE Path Profile Support
LSP Path Diversity and Bidirectionality Constraints
NSP and VSR-NRC PCE Redundancy
Feature Configuration
NSP Ecosystem Redundancy
NSP Cluster Redundancy
VSR-NRC Redundancy
PCC Behavior
Configuring RSVP-TE LSPs with PCEP Using the CLI
PCEP on the PCE Node and the PCC Node
MPLS on the PCC Node
PCEP Configuration Command Reference
Command Hierarchies
PCEP Commands
Show Commands
Command Descriptions
PCEP Commands
Show Commands
Label Distribution Protocol
Label Distribution Protocol
LDP and MPLS
BFD for T-LDP
LDP Architecture
LDP Subsystem Interrelationships
Memory Manager and LDP
Label Manager
LDP Configuration
Logger
Service Manager
Execution Flow
Initialization
Session Lifetime
Adjacency Establishment
Session Establishment
Label Exchange
Implicit Null Label
Other Reasons for Label Actions
Cleanup
LDP Filters
Per-LDP peer export policies
LDP FEC Statistics
Multi-area and Multi-instance Extensions to LDP
ECMP Support for LDP
Label Operations
Graceful Restart Helper
Graceful Handling of Resource Exhaustion
LDP Support for Unnumbered Interfaces
LDP Fast Reroute (FRR)
ECMP vs FRR
IGP Shortcuts (RSVP-TE Tunnels)
LDP FRR Configuration
LDP-to-Segment Routing Stitching for IPv4 /32 Prefixes (IS-IS)
Stitching in the LDP-to-SR Direction
Stitching in the SR-to-LDP Direction
TTL Propagation and ICMP Tunneling
LDP FRR Remote LFA and TI-LFA Backup Using an SR Tunnel for IPv4 /32 Prefixes (IS-IS)
Feature Behavior
TCP MD5 Authentication
LDP Point-to-Multipoint Support
LDP Point-to-Multipoint Configuration
LDP Point-to-Multipoint Protocol
Make-Before-Break (MBB)
ECMP Support
Inter-AS Non-segmented mLDP
LDP Recursive FEC Process
Supported Recursive Opaque Values
Redundancy and Resiliency
ASBR Physical Connection
OAM
ECMP Support
ECMP Hash Algorithm
Intra-AS Non-segmented mLDP
ABR MoFRR for Intra-AS
Interaction with an Inter-AS Non-segmented mLDP Solution
Multicast LDP Fast Upstream Switchover
mLDP Fast Upstream Switchover Configuration
mLDP Fast Upstream Switchover Behavior
LDP IPv6
Link LDP
Targeted LDP
FEC Resolution
LDP Session Capabilities
LDP Adjacency Capabilities
IP Address and FEC Distribution
IGP and Static Route Synchronization with LDP
BFD Operation
Services Using SDP with an LDP IPv6 FEC
Mirror Services
Configuration at mirror source node
Configuration at mirror destination node
OAM Support with LDP IPv6
Interoperability
Interoperability with Implementations Compliant with draft- ietf-mpls-ldp-ipv6
Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
Upgrading from IPv4 to IPv6
LDP Process Overview
Configuration Notes
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring Graceful Restart Helper Parameters
Applying Import and Export Policies
Configuring Interface Parameters
Specifying Targeted Session Parameters
Specifying Peer Parameters
Configuring LDP Support for Multicast VPN (MVPN)
Configuring LDP Support for LDP-to-SR Stitching
Enabling LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
LDP Command Reference
Command Hierarchies
LDP Commands
Show Commands
Show LDP Commands
Show LDP Bindings Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Configuration Commands
Generic Commands
LDP Global Commands
Interface Parameters Commands
Session Parameters Commands
Targeted Session Commands
Show Commands
Show Router LDP Commands
Show Router LDP Bindings Commands
Clear Commands
Monitor Commands
Debug Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
7705 SAR OAM and Diagnostics Guide R23.4.R1
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR OAM Configuration Process
OAM and SAA
OAM Overview
ICMP and ICMPv6 Diagnostics
Ping
Traceroute
Two-Way Active Measurement Protocol
7705 SAR Support for TWAMP Server
Interactions with Ethernet Loopback
Limitations
Two-Way Active Measurement Protocol Light (TWAMP Light)
7705 SAR Support for TWAMP Light Responder
Interactions with Ethernet Loopback
Limitations
TWAMP Light Configuration Example
LSP Diagnostics
LSP Ping
LSP Traceroute
LSP Ping and LSP Traceroute for BGP Route Tunnels
TC Handling on BGP Route Tunnels
BGP Route Tunnel Traceroute
Traceroute TTL for Self-generated Traffic
Downstream Detailed Mapping (DDMAP) TLV
Using The DDMAP TLV in LSP Stitching and LSP Hierarchy
MPLS OAM Support in Segment Routing
SR Extensions for LSP Ping and LSP Traceroute
LSP Ping and LSP Traceroute on SR-ISIS or SR-OSPF Tunnels
LSP Ping and LSP Traceroute on SR-TE LSPs
LSP Ping and LSP Trace for BGP IPv4 LSPs
SDP Diagnostics
SDP Ping
SDP MTU Path Discovery
Service Diagnostics
Service Ping
VLL Diagnostics
VCCV Ping
VCCV Ping Application
VCCV Ping in a Multi-Segment Pseudowire
Automated VCCV Trace Capability for Multi-Segment Pseudowire
VCCV for Static Pseudowire Segments
VCCV for MS-PW and Pseudowire Redundancy
Detailed VCCV Trace Operation
VCCV Trace
ITU-T Y.1564 Diagnostics
ITU-T Y.1564 Functionality
ITU-T Y.1564 Protocol Interaction
VPLS MAC Diagnostics
MAC Ping
MAC Trace
CPE Ping
MAC Populate
MAC Purge
Ethernet OAM Capabilities
Ethernet OAM Overview
Ethernet OAM Usage Examples
802.1ag and Y.1731 Functional Comparison
ETH-CFM Ethernet OAM Tests (802.1ag and Y.1731)
Hold MEP Up On Failure
Loopback (ETH-LB)
Linktrace (ETH-LT)
Throughput Measurement
Continuity Check (ETH-CC)
Remote Defect Indication (ETH-RDI)
Alarm Indication Signal (ETH-AIS)
Test Error (ETH-Test)
ITU-T Y.1731 Performance Monitoring (PM)
Frame Delay and Delay Variation Measurements (ETH-DM and ETH-DV)
Y.1731 Delay Measurement (DM)
Frame Loss Measurement (ETH-LM)
ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
Bandwidth Notification Message (BNM)
CFM OAM QoS
EFM OAM (802.3ah)
Unidirectional OAM Operation
Remote Loopback
802.3ah OAMPDU Tunneling and Termination for Epipe Services
Dying Gasp
Ethernet Loopbacks
Line and Internal Ethernet Loopbacks
MAC Swapping
Interaction of Ethernet Port Loopback with Other Features
CFM Loopbacks for OAM on Ethernet Ports
CFM Loopback Mechanics
OAM Propagation to Attachment Circuits
ATM Ports
T1/E1 TDM Ports
Ethernet Ports
Pseudowire Status Signaling OAM Propagation
LDP Status Signaling
LDP Status via Label Withdrawal
LDP Status via TLV
IP Multicast Debugging Tools
Mtrace
Finding the Last-Hop Router
Directing the Response
Mstat
Mrinfo
Microwave Awareness Performance Monitoring Statistics
G.826 Statistics
Radio Power Level Statistics
Adaptive Coding and Modulation Statistics
Service Assurance Agent Overview
Traceroute Implementation
SAA Jitter
SAA Ethernet CFM Test Support
Writing SAA Ethernet CFM Test Results to Accounting Files
Configuring SAA Test Parameters
Synthetic Loss Measurement (SLM)
Configuration Example
OAM timestamping
OAM and SAA Command Reference
Command Hierarchies
Operational Commands
Operational Commands
Multicast Commands
OAM Commands
ATM Diagnostics
TWAMP
TWAMP Light
Global Downstream Mapping Commands
LSP Diagnostics
LDP Diagnostics
SDP Diagnostics
Service Diagnostics
VLL Diagnostics
Y.1564 Diagnostics
VPLS Diagnostics
Ethernet in the First Mile (EFM) Commands
ETH-CFM Commands
SAA Commands
SAA Diagnostics
Show Commands
Clear Commands
Debug Commands
Command Descriptions
OAM and SAA Commands
Operational Commands
Multicast Commands
ATM Diagnostics
Service Diagnostics
EFM Commands
ETH-CFM Commands
SAA Commands
Y.1564 Diagnostics
TWAMP Commands
Global Downstream Mapping Commands
LDP Diagnostics
OAM SAA Commands
Show Commands
Clear Commands
Debug Commands
Mirroring
Mirroring Overview
Hardware Support
Mirroring Implementation
Mirror Sources and Destinations
Local and Remote Mirroring
Mirroring Refinements
Slicing
MAC Filters
Mirroring Performance
Mirroring Configuration
Packet Capture
Feature Details
PCAP File Format
Limitations
Hardware Support
QoS Requirements
Configuration Notes
Configuring Mirroring with CLI
Mirror Configuration Overview
Basic Mirroring Configuration
Mirror Classification Rules
Common Configuration Tasks
Configuring a Local Mirror Service
Configuring SDPs for Mirroring
Configuring a Remote Mirror Service
Pseudowire Redundancy for Mirror Services Configuration Example
MC-LAG Setup with ICB for Mirror Services Configuration Example
Configuring a PCAP Mirroring Service
Service Management Tasks
Modifying a Local Mirrored Service
Deleting a Local Mirrored Service
Modifying a Remote Mirrored Service
Deleting a Remote Mirrored Service
Mirror Service Configuration Command Reference
Command Hierarchies
Mirror Configuration Commands
Show Commands
Debug Commands
Command Descriptions
Configuration Commands
Generic Commands
Mirror Destination Configuration Commands
Show Commands
Debug Commands
Tools
Tools Command Reference
Command Hierarchies
Tools Dump Commands
Tools Perform Commands
Tools ADP Commands
Command Descriptions
Tools Generic Commands
Tools Dump Commands
Dump Commands
Dump Test-OAM Commands
Dump Router Commands
Tools Perform Commands
Perform Commands
Perform Router Commands
Tools ADP Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR OAM Configuration Process
OAM and SAA
OAM Overview
ICMP and ICMPv6 Diagnostics
Ping
Traceroute
Two-Way Active Measurement Protocol
7705 SAR Support for TWAMP Server
Interactions with Ethernet Loopback
Limitations
Two-Way Active Measurement Protocol Light (TWAMP Light)
7705 SAR Support for TWAMP Light Responder
Interactions with Ethernet Loopback
Limitations
TWAMP Light Configuration Example
LSP Diagnostics
LSP Ping
LSP Traceroute
LSP Ping and LSP Traceroute for BGP Route Tunnels
TC Handling on BGP Route Tunnels
BGP Route Tunnel Traceroute
Traceroute TTL for Self-generated Traffic
Downstream Detailed Mapping (DDMAP) TLV
Using The DDMAP TLV in LSP Stitching and LSP Hierarchy
MPLS OAM Support in Segment Routing
SR Extensions for LSP Ping and LSP Traceroute
LSP Ping and LSP Traceroute on SR-ISIS or SR-OSPF Tunnels
LSP Ping and LSP Traceroute on SR-TE LSPs
LSP Ping and LSP Trace for BGP IPv4 LSPs
SDP Diagnostics
SDP Ping
SDP MTU Path Discovery
Service Diagnostics
Service Ping
VLL Diagnostics
VCCV Ping
VCCV Ping Application
VCCV Ping in a Multi-Segment Pseudowire
Automated VCCV Trace Capability for Multi-Segment Pseudowire
VCCV for Static Pseudowire Segments
VCCV for MS-PW and Pseudowire Redundancy
Detailed VCCV Trace Operation
VCCV Trace
ITU-T Y.1564 Diagnostics
ITU-T Y.1564 Functionality
ITU-T Y.1564 Protocol Interaction
VPLS MAC Diagnostics
MAC Ping
MAC Trace
CPE Ping
MAC Populate
MAC Purge
Ethernet OAM Capabilities
Ethernet OAM Overview
Ethernet OAM Usage Examples
802.1ag and Y.1731 Functional Comparison
ETH-CFM Ethernet OAM Tests (802.1ag and Y.1731)
Hold MEP Up On Failure
Loopback (ETH-LB)
Linktrace (ETH-LT)
Throughput Measurement
Continuity Check (ETH-CC)
Remote Defect Indication (ETH-RDI)
Alarm Indication Signal (ETH-AIS)
Test Error (ETH-Test)
ITU-T Y.1731 Performance Monitoring (PM)
Frame Delay and Delay Variation Measurements (ETH-DM and ETH-DV)
Y.1731 Delay Measurement (DM)
Frame Loss Measurement (ETH-LM)
ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
Bandwidth Notification Message (BNM)
CFM OAM QoS
EFM OAM (802.3ah)
Unidirectional OAM Operation
Remote Loopback
802.3ah OAMPDU Tunneling and Termination for Epipe Services
Dying Gasp
Ethernet Loopbacks
Line and Internal Ethernet Loopbacks
MAC Swapping
Interaction of Ethernet Port Loopback with Other Features
CFM Loopbacks for OAM on Ethernet Ports
CFM Loopback Mechanics
OAM Propagation to Attachment Circuits
ATM Ports
T1/E1 TDM Ports
Ethernet Ports
Pseudowire Status Signaling OAM Propagation
LDP Status Signaling
LDP Status via Label Withdrawal
LDP Status via TLV
IP Multicast Debugging Tools
Mtrace
Finding the Last-Hop Router
Directing the Response
Mstat
Mrinfo
Microwave Awareness Performance Monitoring Statistics
G.826 Statistics
Radio Power Level Statistics
Adaptive Coding and Modulation Statistics
Service Assurance Agent Overview
Traceroute Implementation
SAA Jitter
SAA Ethernet CFM Test Support
Writing SAA Ethernet CFM Test Results to Accounting Files
Configuring SAA Test Parameters
Synthetic Loss Measurement (SLM)
Configuration Example
OAM timestamping
OAM and SAA Command Reference
Command Hierarchies
Operational Commands
Operational Commands
Multicast Commands
OAM Commands
ATM Diagnostics
TWAMP
TWAMP Light
Global Downstream Mapping Commands
LSP Diagnostics
LDP Diagnostics
SDP Diagnostics
Service Diagnostics
VLL Diagnostics
Y.1564 Diagnostics
VPLS Diagnostics
Ethernet in the First Mile (EFM) Commands
ETH-CFM Commands
SAA Commands
SAA Diagnostics
Show Commands
Clear Commands
Debug Commands
Command Descriptions
OAM and SAA Commands
Operational Commands
Multicast Commands
ATM Diagnostics
Service Diagnostics
EFM Commands
ETH-CFM Commands
SAA Commands
Y.1564 Diagnostics
TWAMP Commands
Global Downstream Mapping Commands
LDP Diagnostics
OAM SAA Commands
Show Commands
Clear Commands
Debug Commands
Mirroring
Mirroring Overview
Hardware Support
Mirroring Implementation
Mirror Sources and Destinations
Local and Remote Mirroring
Mirroring Refinements
Slicing
MAC Filters
Mirroring Performance
Mirroring Configuration
Packet Capture
Feature Details
PCAP File Format
Limitations
Hardware Support
QoS Requirements
Configuration Notes
Configuring Mirroring with CLI
Mirror Configuration Overview
Basic Mirroring Configuration
Mirror Classification Rules
Common Configuration Tasks
Configuring a Local Mirror Service
Configuring SDPs for Mirroring
Configuring a Remote Mirror Service
Pseudowire Redundancy for Mirror Services Configuration Example
MC-LAG Setup with ICB for Mirror Services Configuration Example
Configuring a PCAP Mirroring Service
Service Management Tasks
Modifying a Local Mirrored Service
Deleting a Local Mirrored Service
Modifying a Remote Mirrored Service
Deleting a Remote Mirrored Service
Mirror Service Configuration Command Reference
Command Hierarchies
Mirror Configuration Commands
Show Commands
Debug Commands
Command Descriptions
Configuration Commands
Generic Commands
Mirror Destination Configuration Commands
Show Commands
Debug Commands
Tools
Tools Command Reference
Command Hierarchies
Tools Dump Commands
Tools Perform Commands
Tools ADP Commands
Command Descriptions
Tools Generic Commands
Tools Dump Commands
Dump Commands
Dump Test-OAM Commands
Dump Router Commands
Tools Perform Commands
Perform Commands
Perform Router Commands
Tools ADP Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
7705 SAR Quality of Service Guide R23.4.R1
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR QoS Configuration Process
QoS and QoS Policies
QoS Overview
Overview
Egress and Ingress Traffic Direction
Ring Traffic
Forwarding Classes
Scheduling Modes
Intelligent Discards
Buffering
Buffer Pools
CBS and MBS Configuration
Buffer Allocation for Multicast Traffic
Buffer Unit Allocation and Buffer Chaining
Advantages of Buffer Chaining
Per-SAP Aggregate Shapers (H-QoS) On Gen-2 Hardware
Shaped and Unshaped SAPs
Per-SAP Aggregate Shaper Support
H-QoS Example
Per-VLAN Network Egress Shapers
Shaped and Unshaped VLANs
Per-VLAN Shaper Support
VLAN Shaper Applications
VLAN Shapers for Dual Uplinks
VLAN Shapers for Aggregation Site
Per-Customer Aggregate Shapers (Multiservice Site) on Gen-2 Hardware
MSS Support
MSS and LAG Interaction on the 7705 SAR-8 Shelf V2 and 7705 SAR-18
QoS for Hybrid Ports on Gen-2 Hardware
QoS for Gen-3 Adapter Cards and Platforms
6-port SAR-M Ethernet Module
4-Priority Scheduling Behavior on Gen-3 Hardware
Gen-3 Hardware and LAG
QoS on a Ring Adapter Card or Module
Network and Network Queue QoS Policy Types
Network QoS and Network Queue Policies on a Ring Adapter Card or Module
Considerations for Using Ring Adapter Card or Module QoS Policies
QoS for IPSec Traffic
QoS for Network Group Encryption Traffic
Access Ingress
Access Ingress Traffic Classification
Traffic Classification Types
Hierarchy of Classification Rules
Discard Probability of Classified Traffic
Access Ingress Queues
Access Ingress Queuing and Scheduling
Profiled (Rate-based) Scheduling
Queue-Type Scheduling
4-Priority Scheduling
4-Priority (Gen-3) Scheduling
16-Priority Scheduling
Ingress Queuing and Scheduling for BMU Traffic
Access Ingress Per-SAP Aggregate Shapers (Access Ingress H-QoS)
Access Ingress Per-SAP Shapers Arbitration
Ingress Shaping to Fabric (Access and Network)
BMU Support
Aggregate Mode BMU Support
Destination Mode BMU Support
LAG SAP Support (Access Only)
Configurable Ingress Shaping to Fabric (Access and Network)
Fabric Shaping on the Fixed Platforms (Access and Network)
Fabric Traffic
Traffic Flow Across the Fabric
Network Egress
BMU Traffic at Network Egress
Network Egress Queuing Aggregation
Network Egress Per-VLAN Queuing
Network Egress Scheduling
Network Egress 4-Priority Scheduling
Network Egress 4-Priority (Gen-3) Scheduling
Network Egress 16-Priority Scheduling
Network Egress Shaping
Network Egress Shaping for Hybrid Ports
Network Egress Per-VLAN Shapers
Network Egress Per-VLAN Shapers Arbitration
Network Egress Marking and Re-Marking
Network Egress Marking and Re-Marking on Ethernet ports
Network Ingress
Network Ingress Classification
Network Ingress Tunnel QoS Override
Network Ingress Queuing
Network Ingress Queuing for BMU Traffic
Network Ingress Scheduling
Network Ingress 4-Priority Scheduling
Network Ingress 4-Priority (Gen-3) Scheduling
Network Ingress 16-Priority Scheduling
Network Ingress Shaping to Fabric
Configurable Network Ingress Shaping to Fabric
Network Fabric Shaping on the Fixed Platforms
Access Egress
Access Egress Queuing and Scheduling
BMU Traffic Access Egress Queuing and Scheduling
ATM Access Egress Queuing and Scheduling
Ethernet Access Egress Queuing and Scheduling
Access Egress Per-SAP Aggregate Shapers (Access Egress H-QoS)
Access Egress Per-SAP Shapers Arbitration
Access Egress Shaping for Hybrid Ports
Access Egress for 4-Priority (Gen-3) Scheduling
Access Egress Marking/Re-Marking
Packet Byte Offset (PBO)
QoS Policies Overview
Overview
Service Ingress QoS Policies
Service Egress QoS Policies
MC-MLPPP SAP Egress QoS Policies
Network and Network Queue QoS Policies
Network QoS Policies
CoS Marking for Self-generated Traffic
SGT Redirection
Network Queue QoS Policies
Network and Service QoS Queue Parameters
Queue ID
Committed Information Rate
Peak Information Rate
Adaptation Rule
Committed Burst Size
Maximum Burst Size
High-Priority-Only Buffers
High and Low Enqueuing Thresholds
Queue Counters
Queue Type
Queue Mode
Rate Limiting
Slope Policies (WRED and RED)
WRED MinThreshold and MaxThreshold Computation
WRED on Bridging Domain (Ring) Queues
Payload-based WRED
ATM Traffic Descriptor Profiles
Fabric Profiles
Shaper Policies
QoS Policy Entities
Configuration Notes
Network QoS Policies
Overview
Basic Configuration
Configuring a Network QoS Policy
Creating a Network QoS Policy
Applying Network QoS Policies
Default Network QoS Policy Values
Service Management Tasks
Deleting QoS Policies
Copying and Overwriting Network Policies
Editing QoS Policies
Network QoS Policy Command Reference
Command Hierarchies
Configuration Commands
QoS Policy Network Commands
Self-generated Traffic Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Network QoS Policy Commands
Network Egress QoS Policy Commands
Network Ingress QoS Policy Commands
Network Ring QoS Policy Commands
Network Egress QoS Policy Forwarding Class Commands
Self-generated Traffic Commands
Operational Commands
Show Commands
Network Queue QoS Policies
Overview
Basic Configuration
Configuring a Network Queue QoS Policy
Creating a Network Queue QoS Policy
Applying Network Queue QoS Policies
Adapter Cards
Network Ports
Configuring Per-VLAN Network Egress Shapers
Configuring a CIR for Network Egress Unshaped VLANs
Default Network Queue QoS Policy Values
Service Management Tasks
Deleting QoS Policies
Copying and Overwriting QoS Policies
Editing QoS Policies
Network Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Network Queue QoS Policy Commands
Network Queue QoS Policy Forwarding Class Commands
Operational Commands
Show Commands
Service Egress and Ingress QoS Policies
Overview
Basic Configuration
Creating Service Egress and Ingress QoS Policies
Creating a Service Egress QoS Policy
Creating a Service Egress QoS Forwarding Class
Creating a Service Egress QoS Queue
Creating a Service Ingress QoS Policy
Creating a Service Ingress Forwarding Class
Creating a Service Ingress QoS Queue
Creating an MC-MLPPP SAP Egress QoS Policy
Creating an MC-MLPPP SAP Egress QoS Forwarding Class
Creating an MC-MLPPP SAP Egress QoS Queue
Applying Service Egress and Ingress Policies
VLL and VPLS Services
IES and VPRN Services
Default Service Egress and Ingress Policy Values
Service Egress Policy Defaults
Service Ingress Policy Defaults
Service Management Tasks
Deleting QoS Policies
Removing a QoS Policy from a Service SAP
Removing a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Service Egress and Ingress QoS Policy Command Reference
Command Hierarchies
Service Egress QoS Policy Configuration Commands
Service Ingress QoS Policy Configuration Commands
MC-MLPPP SAP Egress QoS Policies
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Service Egress QoS Policy Commands
Service Egress QoS Policy Forwarding Class Commands
MC-MLPPP SAP Egress QoS Policy Commands
MC-MLPPP Forwarding Class Commands
MC-MLPPP Queue Commands
Service Ingress QoS Policy Commands
Service Ingress QoS Policy Forwarding Class Commands
Service Queue QoS Policy Commands
Operational Commands
Show Commands
Slope QoS Policies
Overview
Basic Configuration
Creating a Slope QoS Policy
Applying Slope Policies
Default Slope Policy Values
Service Management Tasks
Deleting QoS Policies
Removing a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Slope QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Slope Policy QoS Commands
WRED/RED Slope Commands
Operational Commands
Show Commands
ATM QoS Traffic Descriptor Profiles
ATM Traffic Descriptor Profiles
ATM Traffic Management
ATM Service Categories
ATM Traffic Descriptors and QoS Parameters
ATM Policing
Shaping
ATM Queuing and Scheduling
Congestion Avoidance
Basic Configuration
Creating an ATM Traffic Descriptor Profile QoS Policy
Applying ATM Traffic Descriptor Profile Policies
ATM VLL (Apipe) SAPs
Default ATM Traffic Descriptor Profile Policy Values
Service Management Tasks
Removing an ATM Traffic Descriptor Profile from the QoS Configuration
Copying and Overwriting an ATM Traffic Descriptor Profile
Editing QoS Policies
ATM QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
ATM QoS Policy Commands
Operational Commands
Show Commands
QoS Fabric Profiles
Basic Configuration
Creating a QoS Fabric Profile
Applying a QoS Fabric Profile
Default Fabric Profile Values
Service Management Tasks
Removing a Fabric Profile from the QoS Configuration
Copying and Overwriting a Fabric Profile
Editing QoS Policies
QoS Fabric Profile Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
QoS Fabric Profile Commands
Fixed Platform Fabric Shaping Commands
Operational Commands
Show Commands
QoS Shapers and Shaper QoS Policies
Overview of QoS Shapers and Shaper QoS Policies
Basic Configuration
Creating a Shaper QoS Policy and Shaper Groups
Applying a Shaper QoS Policy and Shaper Groups
Applying a Shaper Policy
Applying a Shaper Group
Viewing Shaper Policy Information
Default Shaper QoS Policy Values
Configuring per-SAP Aggregate Shapers and an Unshaped SAP Aggregate Shaper (H-QoS)
Creating 16-Priority Shaped SAPs and Configuring per-SAP Aggregate Shapers
Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Ingress)
Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Egress)
Configuring per-VLAN Shapers and an Unshaped VLAN Shaper
Configuring Per-VLAN Network Egress Shapers
Configuring a CIR for Network Egress Unshaped VLANs
Service Management Tasks
Removing and Deleting QoS Policies
Copying and Overwriting QoS Policies
Editing QoS Policies
Shaper QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Shaper QoS Policy Commands
Operational Commands
Show Commands
Security QoS and Security QoS Policies
Security QoS and Security QoS Policy Overview
QoS for Firewall-Extracted Packets to the CSM
Multi-Chassis Firewall QoS
Security Queue QoS Policies
Packet Queuing with DSCP
Basic Configuration
Creating a Security Data Queue QoS Policy
Default Security Queue Policy Parameter Values
Service Management Tasks
Deleting QoS Policies
Copying and Overwriting QoS Policies
Editing QoS Policies
Security Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Security Queue QoS Policy Commands
Operational Commands
Show Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR QoS Configuration Process
QoS and QoS Policies
QoS Overview
Overview
Egress and Ingress Traffic Direction
Ring Traffic
Forwarding Classes
Scheduling Modes
Intelligent Discards
Buffering
Buffer Pools
CBS and MBS Configuration
Buffer Allocation for Multicast Traffic
Buffer Unit Allocation and Buffer Chaining
Advantages of Buffer Chaining
Per-SAP Aggregate Shapers (H-QoS) On Gen-2 Hardware
Shaped and Unshaped SAPs
Per-SAP Aggregate Shaper Support
H-QoS Example
Per-VLAN Network Egress Shapers
Shaped and Unshaped VLANs
Per-VLAN Shaper Support
VLAN Shaper Applications
VLAN Shapers for Dual Uplinks
VLAN Shapers for Aggregation Site
Per-Customer Aggregate Shapers (Multiservice Site) on Gen-2 Hardware
MSS Support
MSS and LAG Interaction on the 7705 SAR-8 Shelf V2 and 7705 SAR-18
QoS for Hybrid Ports on Gen-2 Hardware
QoS for Gen-3 Adapter Cards and Platforms
6-port SAR-M Ethernet Module
4-Priority Scheduling Behavior on Gen-3 Hardware
Gen-3 Hardware and LAG
QoS on a Ring Adapter Card or Module
Network and Network Queue QoS Policy Types
Network QoS and Network Queue Policies on a Ring Adapter Card or Module
Considerations for Using Ring Adapter Card or Module QoS Policies
QoS for IPSec Traffic
QoS for Network Group Encryption Traffic
Access Ingress
Access Ingress Traffic Classification
Traffic Classification Types
Hierarchy of Classification Rules
Discard Probability of Classified Traffic
Access Ingress Queues
Access Ingress Queuing and Scheduling
Profiled (Rate-based) Scheduling
Queue-Type Scheduling
4-Priority Scheduling
4-Priority (Gen-3) Scheduling
16-Priority Scheduling
Ingress Queuing and Scheduling for BMU Traffic
Access Ingress Per-SAP Aggregate Shapers (Access Ingress H-QoS)
Access Ingress Per-SAP Shapers Arbitration
Ingress Shaping to Fabric (Access and Network)
BMU Support
Aggregate Mode BMU Support
Destination Mode BMU Support
LAG SAP Support (Access Only)
Configurable Ingress Shaping to Fabric (Access and Network)
Fabric Shaping on the Fixed Platforms (Access and Network)
Fabric Traffic
Traffic Flow Across the Fabric
Network Egress
BMU Traffic at Network Egress
Network Egress Queuing Aggregation
Network Egress Per-VLAN Queuing
Network Egress Scheduling
Network Egress 4-Priority Scheduling
Network Egress 4-Priority (Gen-3) Scheduling
Network Egress 16-Priority Scheduling
Network Egress Shaping
Network Egress Shaping for Hybrid Ports
Network Egress Per-VLAN Shapers
Network Egress Per-VLAN Shapers Arbitration
Network Egress Marking and Re-Marking
Network Egress Marking and Re-Marking on Ethernet ports
Network Ingress
Network Ingress Classification
Network Ingress Tunnel QoS Override
Network Ingress Queuing
Network Ingress Queuing for BMU Traffic
Network Ingress Scheduling
Network Ingress 4-Priority Scheduling
Network Ingress 4-Priority (Gen-3) Scheduling
Network Ingress 16-Priority Scheduling
Network Ingress Shaping to Fabric
Configurable Network Ingress Shaping to Fabric
Network Fabric Shaping on the Fixed Platforms
Access Egress
Access Egress Queuing and Scheduling
BMU Traffic Access Egress Queuing and Scheduling
ATM Access Egress Queuing and Scheduling
Ethernet Access Egress Queuing and Scheduling
Access Egress Per-SAP Aggregate Shapers (Access Egress H-QoS)
Access Egress Per-SAP Shapers Arbitration
Access Egress Shaping for Hybrid Ports
Access Egress for 4-Priority (Gen-3) Scheduling
Access Egress Marking/Re-Marking
Packet Byte Offset (PBO)
QoS Policies Overview
Overview
Service Ingress QoS Policies
Service Egress QoS Policies
MC-MLPPP SAP Egress QoS Policies
Network and Network Queue QoS Policies
Network QoS Policies
CoS Marking for Self-generated Traffic
SGT Redirection
Network Queue QoS Policies
Network and Service QoS Queue Parameters
Queue ID
Committed Information Rate
Peak Information Rate
Adaptation Rule
Committed Burst Size
Maximum Burst Size
High-Priority-Only Buffers
High and Low Enqueuing Thresholds
Queue Counters
Queue Type
Queue Mode
Rate Limiting
Slope Policies (WRED and RED)
WRED MinThreshold and MaxThreshold Computation
WRED on Bridging Domain (Ring) Queues
Payload-based WRED
ATM Traffic Descriptor Profiles
Fabric Profiles
Shaper Policies
QoS Policy Entities
Configuration Notes
Network QoS Policies
Overview
Basic Configuration
Configuring a Network QoS Policy
Creating a Network QoS Policy
Applying Network QoS Policies
Default Network QoS Policy Values
Service Management Tasks
Deleting QoS Policies
Copying and Overwriting Network Policies
Editing QoS Policies
Network QoS Policy Command Reference
Command Hierarchies
Configuration Commands
QoS Policy Network Commands
Self-generated Traffic Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Network QoS Policy Commands
Network Egress QoS Policy Commands
Network Ingress QoS Policy Commands
Network Ring QoS Policy Commands
Network Egress QoS Policy Forwarding Class Commands
Self-generated Traffic Commands
Operational Commands
Show Commands
Network Queue QoS Policies
Overview
Basic Configuration
Configuring a Network Queue QoS Policy
Creating a Network Queue QoS Policy
Applying Network Queue QoS Policies
Adapter Cards
Network Ports
Configuring Per-VLAN Network Egress Shapers
Configuring a CIR for Network Egress Unshaped VLANs
Default Network Queue QoS Policy Values
Service Management Tasks
Deleting QoS Policies
Copying and Overwriting QoS Policies
Editing QoS Policies
Network Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Network Queue QoS Policy Commands
Network Queue QoS Policy Forwarding Class Commands
Operational Commands
Show Commands
Service Egress and Ingress QoS Policies
Overview
Basic Configuration
Creating Service Egress and Ingress QoS Policies
Creating a Service Egress QoS Policy
Creating a Service Egress QoS Forwarding Class
Creating a Service Egress QoS Queue
Creating a Service Ingress QoS Policy
Creating a Service Ingress Forwarding Class
Creating a Service Ingress QoS Queue
Creating an MC-MLPPP SAP Egress QoS Policy
Creating an MC-MLPPP SAP Egress QoS Forwarding Class
Creating an MC-MLPPP SAP Egress QoS Queue
Applying Service Egress and Ingress Policies
VLL and VPLS Services
IES and VPRN Services
Default Service Egress and Ingress Policy Values
Service Egress Policy Defaults
Service Ingress Policy Defaults
Service Management Tasks
Deleting QoS Policies
Removing a QoS Policy from a Service SAP
Removing a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Service Egress and Ingress QoS Policy Command Reference
Command Hierarchies
Service Egress QoS Policy Configuration Commands
Service Ingress QoS Policy Configuration Commands
MC-MLPPP SAP Egress QoS Policies
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Service Egress QoS Policy Commands
Service Egress QoS Policy Forwarding Class Commands
MC-MLPPP SAP Egress QoS Policy Commands
MC-MLPPP Forwarding Class Commands
MC-MLPPP Queue Commands
Service Ingress QoS Policy Commands
Service Ingress QoS Policy Forwarding Class Commands
Service Queue QoS Policy Commands
Operational Commands
Show Commands
Slope QoS Policies
Overview
Basic Configuration
Creating a Slope QoS Policy
Applying Slope Policies
Default Slope Policy Values
Service Management Tasks
Deleting QoS Policies
Removing a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Slope QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Slope Policy QoS Commands
WRED/RED Slope Commands
Operational Commands
Show Commands
ATM QoS Traffic Descriptor Profiles
ATM Traffic Descriptor Profiles
ATM Traffic Management
ATM Service Categories
ATM Traffic Descriptors and QoS Parameters
ATM Policing
Shaping
ATM Queuing and Scheduling
Congestion Avoidance
Basic Configuration
Creating an ATM Traffic Descriptor Profile QoS Policy
Applying ATM Traffic Descriptor Profile Policies
ATM VLL (Apipe) SAPs
Default ATM Traffic Descriptor Profile Policy Values
Service Management Tasks
Removing an ATM Traffic Descriptor Profile from the QoS Configuration
Copying and Overwriting an ATM Traffic Descriptor Profile
Editing QoS Policies
ATM QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
ATM QoS Policy Commands
Operational Commands
Show Commands
QoS Fabric Profiles
Basic Configuration
Creating a QoS Fabric Profile
Applying a QoS Fabric Profile
Default Fabric Profile Values
Service Management Tasks
Removing a Fabric Profile from the QoS Configuration
Copying and Overwriting a Fabric Profile
Editing QoS Policies
QoS Fabric Profile Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
QoS Fabric Profile Commands
Fixed Platform Fabric Shaping Commands
Operational Commands
Show Commands
QoS Shapers and Shaper QoS Policies
Overview of QoS Shapers and Shaper QoS Policies
Basic Configuration
Creating a Shaper QoS Policy and Shaper Groups
Applying a Shaper QoS Policy and Shaper Groups
Applying a Shaper Policy
Applying a Shaper Group
Viewing Shaper Policy Information
Default Shaper QoS Policy Values
Configuring per-SAP Aggregate Shapers and an Unshaped SAP Aggregate Shaper (H-QoS)
Creating 16-Priority Shaped SAPs and Configuring per-SAP Aggregate Shapers
Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Ingress)
Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Egress)
Configuring per-VLAN Shapers and an Unshaped VLAN Shaper
Configuring Per-VLAN Network Egress Shapers
Configuring a CIR for Network Egress Unshaped VLANs
Service Management Tasks
Removing and Deleting QoS Policies
Copying and Overwriting QoS Policies
Editing QoS Policies
Shaper QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Shaper QoS Policy Commands
Operational Commands
Show Commands
Security QoS and Security QoS Policies
Security QoS and Security QoS Policy Overview
QoS for Firewall-Extracted Packets to the CSM
Multi-Chassis Firewall QoS
Security Queue QoS Policies
Packet Queuing with DSCP
Basic Configuration
Creating a Security Data Queue QoS Policy
Default Security Queue Policy Parameter Values
Service Management Tasks
Deleting QoS Policies
Copying and Overwriting QoS Policies
Editing QoS Policies
Security Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Security Queue QoS Policy Commands
Operational Commands
Show Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
7705 SAR Router Configuration Guide R23.4.R1
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. Technical Support
2. 7705 SAR Router Configuration Process
3. IP Router Configuration
3.1. Configuring IP Router Parameters
3.1.1. Interfaces
3.1.1.1. Network Interface
3.1.1.1.1. Ethernet Ports and Multiple ARP Entries
3.1.1.1.2. Dynamic ARP and Static MAC entry
3.1.1.1.3. Configurable ARP Retry Timer
3.1.1.1.4. Proxy ARP
3.1.1.1.5. ETH-CFM Support
3.1.1.1.6. Hold Up and Hold Down Timers for IP Interfaces
3.1.1.2. System Interface
3.1.1.3. Unnumbered Interfaces
3.1.1.4. Creating an IP Address Range
3.1.2. IP Addresses
3.1.3. Internet Protocol Versions
3.1.3.1. IPv6 Address Format
3.1.3.2. IPv6 Headers
3.1.3.3. Neighbor Discovery
3.1.4. Router ID
3.1.5. Autonomous Systems
3.1.6. DHCP and DHCPv6
3.1.6.1. DHCP Relay and DHCPv6 Relay
3.1.6.1.1. DHCP Relay Agent Options
3.1.6.2. Local DHCP and DHCPv6 Server
3.1.6.2.1. DHCP and DHCPv6 Server Options
3.1.7. ICMP and ICMPv6
3.1.8. Static Routes, Dynamic Routes, and ECMP
3.1.8.1. Static Route Resolution Using Tunnels
3.1.8.2. Enabling ECMP
3.1.9. IGP-LDP and Static Route-LDP Synchronization
3.1.10. Bidirectional Forwarding Detection (BFD)
3.1.11. Seamless BFD
3.1.11.1. S-BFD Reflector Configuration and Behavior
3.1.11.2. S-BFD Initiator Global Configuration
3.1.11.3. S-BFD Session Configuration
3.1.12. IP Fast Reroute (FRR)
3.1.12.1. ECMP vs FRR
3.1.12.2. IGP Shortcuts (RSVP-TE Tunnels)
3.1.12.3. IP FRR Configuration
3.2. Configuring Security Parameters
3.2.1. Hardware Support
3.2.2. Security Zone Configuration
3.2.3. Security Session Creation
3.2.3.1. Directionally Aware Security Behavior
3.2.3.2. TCP MSS Configuration and Adjustment
3.2.4. Application Groups
3.2.5. Host Groups
3.2.6. Security Policy Policing
3.2.7. Security Profiles
3.2.7.1. Profile Timers
3.2.7.2. Application Assurance Parameters
3.2.7.2.1. DNS
3.2.7.2.2. ICMP
3.2.7.2.3. IP Options
3.2.7.2.4. Strict TCP
3.2.7.3. Application Level Gateway
3.2.7.4. Fragmentation Handling
3.2.8. Security Policies
3.2.9. Bypass Policies for a Firewall in a Layer 2 Service
3.2.10. Security Session Resource Alarms
3.2.11. Security Logging
3.2.12. Firewall Debugging
3.2.13. NAT Security
3.2.13.1. NAT Zones
3.2.13.2. Dynamic Source NAT
3.2.13.3. Local Traffic and NAT
3.2.13.4. Port Forwarding (Static Destination NAT)
3.2.13.5. Static One-to-One NAT
3.2.13.5.1. Static One-to-One NAT and ICMP
3.2.13.5.2. Static One-to-One NAT and FTP
3.2.13.5.3. Static One-to-One NAT and Firewall Security
3.2.13.5.4. Static One-to-one NAT and NPAT
3.2.13.5.5. Static One-to-One NAT Route Leaking to IGP or BGP
3.2.13.5.6. PBR and MFC
3.2.13.5.7. Cflowd and Mirroring
3.2.13.5.8. Private IP Address Ping, Traceroute, and Packet Forwarding
3.2.13.5.9. Fragmentation
3.2.14. Multi-Chassis Firewall
3.2.14.1. Multi-Chassis Firewall Configuration
3.2.14.2. Multi-Chassis Firewall Master/Slave Selection and Policy and Session Database Synchronization
3.2.14.3. Processing New Traffic Signatures and Connections on a Multi-Chassis Firewall
3.2.14.4. Adding, Modifying, and Deleting a Firewall Security Policy in a Multi-Chassis Firewall
3.2.14.5. Adding, Modifying, and Deleting a Zone in a Multi-Chassis Firewall
3.2.14.5.1. Adding a Zone
3.2.14.5.2. Modifying a Zone
3.2.14.5.3. Deleting a Zone
3.2.14.6. Multi-Chassis Firewall Security Logging
3.2.14.7. MCL Failure
3.2.14.8. Multi-Chassis NAT
3.2.14.9. MCL Encryption
3.3. Using the 7705 SAR as Residential or Business CPE
3.4. Router Configuration Process Overview
3.5. Configuration Notes
3.6. Configuring an IP Router with CLI
3.7. Router Configuration Overview
3.7.1. System Interface
3.7.2. Network Interface
3.8. Basic Configuration
3.9. Common Configuration Tasks
3.9.1. Configuring a System Name
3.9.2. Configuring Router IPv6 Neighbor Discovery Parameters
3.9.3. Configuring Interfaces
3.9.3.1. Configuring a System Interface
3.9.3.2. Configuring a Network Interface
3.9.3.2.1. Creating an IPv6 Network Interface
3.9.3.3. Configuring an Unnumbered Interface
3.9.4. Configuring IPv6 Parameters
3.9.5. Configuring Router Advertisement
3.9.6. Configuring ECMP
3.9.7. Configuring Static Routes
3.9.8. Configuring or Deriving a Router ID
3.9.9. Configuring an Autonomous System
3.9.10. Configuring ICMP and ICMPv6
3.9.11. Configuring a DHCP Relay Agent
3.9.12. Configuring Proxy ARP
3.9.13. Configuring a Security Zone
3.9.14. Configuring Security Logging
3.9.14.1. Rule-Based Security Logging
3.9.14.2. Zone-Based Security Logging
3.9.15. Applying an Application Group and a Host Group to a Security Policy
3.9.16. Configuring an IP Reassembly Profile
3.10. Service Management Tasks
3.10.1. Changing the System Name
3.10.2. Modifying Interface Parameters
3.10.3. Deleting a Logical IP Interface
3.11. IP Router Command Reference
3.11.1. Command Hierarchies
3.11.1.1. Configuration Commands
3.11.1.1.1. Router Commands
3.11.1.1.2. Local DHCP and DHCPv6 Server Commands
3.11.1.1.3. Router BFD Commands
3.11.1.1.4. Seamless BFD Reflector Commands
3.11.1.1.5. Router Interface Commands
3.11.1.1.6. Router Interface IPv6 Commands
3.11.1.1.7. Router Advertisement Commands
3.11.1.1.8. Router Security Zone Configuration Commands
3.11.1.1.9. Static One-to-One NAT Configuration Commands
3.11.1.1.10. TWAMP Light Commands
3.11.1.2. Show Commands
3.11.1.3. Clear Commands
3.11.1.4. Debug Commands
3.11.2. Command Descriptions
3.11.2.1. Configuration Commands
3.11.2.1.1. Generic Commands
3.11.2.1.2. Router Global Commands
3.11.2.1.3. Local DHCP and DHCPv6 Server Commands
3.11.2.1.4. Router BFD Commands
3.11.2.1.5. Seamless BFD Reflector Commands
3.11.2.1.6. Router Interface Commands
3.11.2.1.7. Router Interface IPv6 Commands
3.11.2.1.8. Router Interface DHCP Relay Agent Commands
3.11.2.1.9. Router Interface Filter Commands
3.11.2.1.10. Router Interface Encryption Commands
3.11.2.1.11. Router Interface Hold-Time Commands
3.11.2.1.12. Router Interface ICMP and ICMPv6 Commands
3.11.2.1.13. Router Advertisement Commands
3.11.2.1.14. Router Security Zone Configuration Commands
3.11.2.1.15. Static One-to-One NAT Router Configuration Commands
3.11.2.1.16. TWAMP Light Commands
3.11.2.2. Show Commands
3.11.2.3. Clear Commands
3.11.2.4. Debug Commands
4. VRRP
4.1. VRRP Overview
4.2. VRRP Components
4.2.1. Virtual Router
4.2.2. IP Address Owner
4.2.3. Primary Address
4.2.4. Virtual Router in Master State
4.2.5. Virtual Router Backup
4.2.6. Owner and Non-owner VRRP
4.2.7. Configurable Parameters
4.2.7.1. VRID
4.2.7.2. Priority
4.2.7.3. IP Addresses
4.2.7.4. Message Interval and Master Inheritance
4.2.7.5. Master Down Interval
4.2.7.6. Skew Time
4.2.7.7. Preempt Mode
4.2.7.8. VRRP Message Authentication (IPv4 only)
4.2.7.8.1. Authentication Failure
4.2.7.9. Virtual MAC Address
4.2.7.10. BFD-Enable
4.2.7.11. Initial Delay Timer
4.2.7.12. VRRP Advertisement Message IP Address List Verification
4.2.7.13. IPv6 Virtual Router Instance Operationally Up
4.2.7.14. Policies
4.3. VRRP Priority Control Policies
4.3.1. VRRP Policy Constraints
4.3.2. VRRP Base Priority
4.3.3. VRRP Priority Control Policy In-use Priority
4.3.4. VRRP Priority Control Policy Priority Events
4.3.4.1. Priority Event Hold-set Timers
4.3.4.2. Port Down Priority Event
4.3.4.3. LAG Port Down Priority Event
4.3.4.4. Host Unreachable Priority Event
4.3.4.5. Route Unknown Priority Event
4.4. VRRP Non-owner Accessibility
4.4.1. Non-owner Access Ping Reply
4.4.2. Non-owner Access Telnet
4.4.3. Non-owner Access SSH
4.5. VRRP Configuration Process Overview
4.6. Configuration Notes
4.7. Configuring VRRP with CLI
4.8. VRRP Configuration Overview
4.8.1. Preconfiguration Requirements
4.9. Basic VRRP Configurations
4.9.1. VRRP Policy
4.9.2. VRRP IES or VPRN Service Parameters
4.9.2.1. Configuring IES or VPRN VRRP for IPv6
4.10. Common Configuration Tasks
4.11. Configuring IES or VPRN VRRP Parameters
4.11.1. Configuring VRRP on Subnets
4.11.2. Owner VRRP
4.11.3. Non-owner VRRP
4.12. VRRP Management Tasks
4.12.1. Deleting a VRRP Policy
4.12.2. Deleting VRRP on a Service
4.13. VRRP Command Reference
4.13.1. Command Hierarchies
4.13.1.1. VRRP Priority Control Event Policy Commands
4.13.1.2. VRRP Show Commands
4.13.1.3. VRRP Monitor Commands
4.13.1.4. VRRP Clear Commands
4.13.1.5. VRRP Debug Commands
4.13.2. Command Descriptions
4.13.2.1. Configuration Commands
4.13.2.1.1. VRRP Priority Control Event Policy Commands
4.13.2.1.2. VRRP Priority Event Commands
4.13.2.2. VRRP Show Commands
4.13.2.3. VRRP Monitor Commands
4.13.2.4. VRRP Clear Commands
4.13.2.5. VRRP Debug Commands
5. Filter Policies
5.1. Configuring Filter Policies
5.1.1. Overview of Filter Policies
5.1.2. Network and Service (Access) Interface-based Filtering
5.1.3. Policy-Based Routing
5.1.4. Multi-field Classification (MFC)
5.1.5. VLAN-based Filtering
5.1.6. Filter Policy Entries
5.1.6.1. Applying Filter Policies
5.1.6.2. Packet Matching Criteria
5.1.6.3. Ordering Filter Entries
5.1.7. Filter Log Files
5.2. Configuration Notes
5.2.1. IP Filters
5.2.2. IPv6 Filters
5.2.3. MAC Filters
5.2.4. VLAN Filters
5.2.5. Filter Logs
5.3. Configuring Filter Policies with CLI
5.4. Basic Configuration
5.5. Common Configuration Tasks
5.5.1. Creating an IPv4 or IPv6 Filter Policy
5.5.1.1. IP Filter Policy
5.5.1.2. IP Filter Entry
5.5.1.3. IP Filter Entry Matching Criteria
5.5.1.4. IP Filter Entry for PBR to a System IP or Loopback Address
5.5.2. Creating a MAC Filter Policy
5.5.2.1. MAC Filter Policy
5.5.2.2. MAC Filter Entry
5.5.2.3. MAC Entry Matching Criteria
5.5.3. Creating a VLAN Filter Policy
5.5.3.1. VLAN Filter Policy
5.5.3.2. VLAN Filter Entry
5.5.3.3. VLAN Entry Matching Criteria
5.5.4. Creating a Bypass Policy for a Firewall in a Layer 2 Service
5.5.5. Creating an IP Exception Filter Policy
5.5.5.1. IP Exception Filter Policy
5.5.5.2. IP Exception Entry Matching Criteria
5.5.6. Configuring Filter Log Policies
5.5.7. Configuring a NAT Security Profile
5.5.8. Configuring a NAT Security Policy
5.5.9. Applying IP and MAC Filter Policies to a Service
5.5.10. Applying IP Filter Policies to Network Interfaces
5.5.11. Applying VLAN Filter Policies to a Ring Port
5.5.12. Creating a Match List for Filter Policies
5.6. Filter Management Tasks
5.6.1. Renumbering Filter Policy Entries
5.6.2. Modifying an IP Filter Policy
5.6.3. Modifying a MAC Filter Policy
5.6.4. Modifying a VLAN Filter Policy
5.6.5. Removing and Deleting a Filter Policy
5.6.5.1. Removing a Filter from a Service
5.6.5.2. Removing a Filter from a Network Interface
5.6.5.3. Removing a Filter from a Ring Port
5.6.5.4. Deleting a Filter
5.7. Filter Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. IP Filter Log Configuration Commands
5.7.1.1.2. IP Filter Policy Configuration Commands
5.7.1.1.3. IPv6 Filter Policy Configuration Commands
5.7.1.1.4. MAC Filter Policy Commands
5.7.1.1.5. VLAN Filter Policy Commands
5.7.1.1.6. IP Exception Filter Policy Configuration Commands
5.7.1.1.7. Security Policy Commands
5.7.1.1.8. Filter Match List Commands
5.7.1.2. Show Commands
5.7.1.3. Clear Commands
5.7.1.4. Monitor Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Filter Log Commands
5.7.2.1.3. Filter Policy Commands
5.7.2.1.4. General Filter Entry Commands
5.7.2.1.5. IP, MAC, VLAN, and IP Exception Filter Entry Commands
5.7.2.1.6. IP, MAC, and IP Exception Filter Match Criteria Commands
5.7.2.1.7. Security Policy Commands
5.7.2.1.8. Match List Configuration Commands
5.7.2.2. Show Commands
5.7.2.3. Clear Commands
5.7.2.4. Monitor Commands
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.2. Sampling
6.1.3. Collectors
6.1.4. Templates
6.2. Cflowd Configuration Process Overview
6.3. Configuring Cflowd with CLI
6.4. Basic Cflowd Configuration
6.5. Common Configuration Tasks
6.5.1. Enabling Cflowd
6.5.1.1. Enabling Cflowd On a SAP
6.5.2. Configuring Global Cflowd Parameters
6.5.3. Configuring Cflowd Collector Parameters
6.5.4. Specifying Cflowd Options on an IP Interface
6.5.4.1. Interface Configurations
6.5.4.2. Service Interfaces
6.6. Cflowd Configuration Management Tasks
6.6.1. Modifying Global Cflowd Parameters
6.6.2. Modifying Cflowd Collector Parameters
6.7. Cflowd Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Configuration Commands
6.7.1.2. Show Commands
6.7.1.3. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Generic Commands
6.7.2.2. Configuration Commands
6.7.2.3. Show Commands
6.7.2.4. Clear Commands
7. Route Policies
7.1. Configuring Route Policies
7.1.1. Routing Policy and MPLS
7.1.2. Policy Statements
7.1.2.1. Default Action Behavior
7.1.2.2. Denied IP Prefixes
7.1.2.3. Controlling Route Flapping
7.1.3. Regular Expressions
7.1.3.1. Terms
7.1.3.2. Operators
7.1.4. Community Expressions
7.1.5. BGP and OSPF Route Policy Support
7.1.5.1. BGP Route Policies
7.1.5.2. Readvertised Route Policies
7.1.5.3. Route Policies for BGP Next-Hop Resolution and Peer Tracking
7.1.5.3.1. BGP Next-Hop Resolution Policy Overview
7.1.5.3.2. BGP Peer Tracking Policy Overview
7.1.5.3.3. Route Policy Support for BGP Next-Hop Resolution
7.1.5.3.4. Route Policy Support for BGP Peer Tracking
7.1.6. When to Use Route Policies
7.1.7. Troubleshooting the FIB
7.2. Route Policy Configuration Process Overview
7.3. Configuration Notes
7.4. Configuring Route Policies with CLI
7.5. Route Policy Configuration Overview
7.5.1. When to Create Routing Policies
7.5.2. Default Route Policy Actions
7.5.3. Policy Evaluation
7.5.3.1. Damping
7.6. Basic Route Policy Configuration
7.7. Configuring Route Policy Components
7.7.1. Beginning the Policy Statement
7.7.2. Creating a Route Policy
7.7.3. Configuring a Default Action
7.7.4. Configuring an Entry
7.7.5. Configuring an AS Path (policy-option)
7.7.6. Configuring a Community List or Expression
7.7.7. Configuring Damping
7.7.8. Configuring a Prefix List
7.7.9. Configuring PIM Join/Register Policies
7.7.10. Configuring Bootstrap Message Import and Export Policies
7.7.11. Configuring LDP-to-Segment Routing Stitching Policies
7.8. Route Policy Configuration Management Tasks
7.8.1. Editing Policy Statements and Parameters
7.8.2. Deleting an Entry
7.8.3. Deleting a Policy Statement
7.9. Route Policy Command Reference
7.9.1. Command Hierarchies
7.9.1.1. Route Policy Configuration Commands
7.9.1.2. Show Commands
7.9.2. Command Descriptions
7.9.2.1. Configuration Commands
7.9.2.1.1. Generic Commands
7.9.2.1.2. Route Policy Options
7.9.2.1.3. Route Policy Damping Commands
7.9.2.1.4. Route Policy Prefix Commands
7.9.2.1.5. Route Policy Entry Match Commands
7.9.2.1.6. Route Policy Action Commands
7.9.2.2. Show Commands
8. List of Acronyms
9. Supported Standards and Protocols
Customer Document and Product Support
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. Technical Support
2. 7705 SAR Router Configuration Process
3. IP Router Configuration
3.1. Configuring IP Router Parameters
3.1.1. Interfaces
3.1.1.1. Network Interface
3.1.1.1.1. Ethernet Ports and Multiple ARP Entries
3.1.1.1.2. Dynamic ARP and Static MAC entry
3.1.1.1.3. Configurable ARP Retry Timer
3.1.1.1.4. Proxy ARP
3.1.1.1.5. ETH-CFM Support
3.1.1.1.6. Hold Up and Hold Down Timers for IP Interfaces
3.1.1.2. System Interface
3.1.1.3. Unnumbered Interfaces
3.1.1.4. Creating an IP Address Range
3.1.2. IP Addresses
3.1.3. Internet Protocol Versions
3.1.3.1. IPv6 Address Format
3.1.3.2. IPv6 Headers
3.1.3.3. Neighbor Discovery
3.1.4. Router ID
3.1.5. Autonomous Systems
3.1.6. DHCP and DHCPv6
3.1.6.1. DHCP Relay and DHCPv6 Relay
3.1.6.1.1. DHCP Relay Agent Options
3.1.6.2. Local DHCP and DHCPv6 Server
3.1.6.2.1. DHCP and DHCPv6 Server Options
3.1.7. ICMP and ICMPv6
3.1.8. Static Routes, Dynamic Routes, and ECMP
3.1.8.1. Static Route Resolution Using Tunnels
3.1.8.2. Enabling ECMP
3.1.9. IGP-LDP and Static Route-LDP Synchronization
3.1.10. Bidirectional Forwarding Detection (BFD)
3.1.11. Seamless BFD
3.1.11.1. S-BFD Reflector Configuration and Behavior
3.1.11.2. S-BFD Initiator Global Configuration
3.1.11.3. S-BFD Session Configuration
3.1.12. IP Fast Reroute (FRR)
3.1.12.1. ECMP vs FRR
3.1.12.2. IGP Shortcuts (RSVP-TE Tunnels)
3.1.12.3. IP FRR Configuration
3.2. Configuring Security Parameters
3.2.1. Hardware Support
3.2.2. Security Zone Configuration
3.2.3. Security Session Creation
3.2.3.1. Directionally Aware Security Behavior
3.2.3.2. TCP MSS Configuration and Adjustment
3.2.4. Application Groups
3.2.5. Host Groups
3.2.6. Security Policy Policing
3.2.7. Security Profiles
3.2.7.1. Profile Timers
3.2.7.2. Application Assurance Parameters
3.2.7.2.1. DNS
3.2.7.2.2. ICMP
3.2.7.2.3. IP Options
3.2.7.2.4. Strict TCP
3.2.7.3. Application Level Gateway
3.2.7.4. Fragmentation Handling
3.2.8. Security Policies
3.2.9. Bypass Policies for a Firewall in a Layer 2 Service
3.2.10. Security Session Resource Alarms
3.2.11. Security Logging
3.2.12. Firewall Debugging
3.2.13. NAT Security
3.2.13.1. NAT Zones
3.2.13.2. Dynamic Source NAT
3.2.13.3. Local Traffic and NAT
3.2.13.4. Port Forwarding (Static Destination NAT)
3.2.13.5. Static One-to-One NAT
3.2.13.5.1. Static One-to-One NAT and ICMP
3.2.13.5.2. Static One-to-One NAT and FTP
3.2.13.5.3. Static One-to-One NAT and Firewall Security
3.2.13.5.4. Static One-to-one NAT and NPAT
3.2.13.5.5. Static One-to-One NAT Route Leaking to IGP or BGP
3.2.13.5.6. PBR and MFC
3.2.13.5.7. Cflowd and Mirroring
3.2.13.5.8. Private IP Address Ping, Traceroute, and Packet Forwarding
3.2.13.5.9. Fragmentation
3.2.14. Multi-Chassis Firewall
3.2.14.1. Multi-Chassis Firewall Configuration
3.2.14.2. Multi-Chassis Firewall Master/Slave Selection and Policy and Session Database Synchronization
3.2.14.3. Processing New Traffic Signatures and Connections on a Multi-Chassis Firewall
3.2.14.4. Adding, Modifying, and Deleting a Firewall Security Policy in a Multi-Chassis Firewall
3.2.14.5. Adding, Modifying, and Deleting a Zone in a Multi-Chassis Firewall
3.2.14.5.1. Adding a Zone
3.2.14.5.2. Modifying a Zone
3.2.14.5.3. Deleting a Zone
3.2.14.6. Multi-Chassis Firewall Security Logging
3.2.14.7. MCL Failure
3.2.14.8. Multi-Chassis NAT
3.2.14.9. MCL Encryption
3.3. Using the 7705 SAR as Residential or Business CPE
3.4. Router Configuration Process Overview
3.5. Configuration Notes
3.6. Configuring an IP Router with CLI
3.7. Router Configuration Overview
3.7.1. System Interface
3.7.2. Network Interface
3.8. Basic Configuration
3.9. Common Configuration Tasks
3.9.1. Configuring a System Name
3.9.2. Configuring Router IPv6 Neighbor Discovery Parameters
3.9.3. Configuring Interfaces
3.9.3.1. Configuring a System Interface
3.9.3.2. Configuring a Network Interface
3.9.3.2.1. Creating an IPv6 Network Interface
3.9.3.3. Configuring an Unnumbered Interface
3.9.4. Configuring IPv6 Parameters
3.9.5. Configuring Router Advertisement
3.9.6. Configuring ECMP
3.9.7. Configuring Static Routes
3.9.8. Configuring or Deriving a Router ID
3.9.9. Configuring an Autonomous System
3.9.10. Configuring ICMP and ICMPv6
3.9.11. Configuring a DHCP Relay Agent
3.9.12. Configuring Proxy ARP
3.9.13. Configuring a Security Zone
3.9.14. Configuring Security Logging
3.9.14.1. Rule-Based Security Logging
3.9.14.2. Zone-Based Security Logging
3.9.15. Applying an Application Group and a Host Group to a Security Policy
3.9.16. Configuring an IP Reassembly Profile
3.10. Service Management Tasks
3.10.1. Changing the System Name
3.10.2. Modifying Interface Parameters
3.10.3. Deleting a Logical IP Interface
3.11. IP Router Command Reference
3.11.1. Command Hierarchies
3.11.1.1. Configuration Commands
3.11.1.1.1. Router Commands
3.11.1.1.2. Local DHCP and DHCPv6 Server Commands
3.11.1.1.3. Router BFD Commands
3.11.1.1.4. Seamless BFD Reflector Commands
3.11.1.1.5. Router Interface Commands
3.11.1.1.6. Router Interface IPv6 Commands
3.11.1.1.7. Router Advertisement Commands
3.11.1.1.8. Router Security Zone Configuration Commands
3.11.1.1.9. Static One-to-One NAT Configuration Commands
3.11.1.1.10. TWAMP Light Commands
3.11.1.2. Show Commands
3.11.1.3. Clear Commands
3.11.1.4. Debug Commands
3.11.2. Command Descriptions
3.11.2.1. Configuration Commands
3.11.2.1.1. Generic Commands
3.11.2.1.2. Router Global Commands
3.11.2.1.3. Local DHCP and DHCPv6 Server Commands
3.11.2.1.4. Router BFD Commands
3.11.2.1.5. Seamless BFD Reflector Commands
3.11.2.1.6. Router Interface Commands
3.11.2.1.7. Router Interface IPv6 Commands
3.11.2.1.8. Router Interface DHCP Relay Agent Commands
3.11.2.1.9. Router Interface Filter Commands
3.11.2.1.10. Router Interface Encryption Commands
3.11.2.1.11. Router Interface Hold-Time Commands
3.11.2.1.12. Router Interface ICMP and ICMPv6 Commands
3.11.2.1.13. Router Advertisement Commands
3.11.2.1.14. Router Security Zone Configuration Commands
3.11.2.1.15. Static One-to-One NAT Router Configuration Commands
3.11.2.1.16. TWAMP Light Commands
3.11.2.2. Show Commands
3.11.2.3. Clear Commands
3.11.2.4. Debug Commands
4. VRRP
4.1. VRRP Overview
4.2. VRRP Components
4.2.1. Virtual Router
4.2.2. IP Address Owner
4.2.3. Primary Address
4.2.4. Virtual Router in Master State
4.2.5. Virtual Router Backup
4.2.6. Owner and Non-owner VRRP
4.2.7. Configurable Parameters
4.2.7.1. VRID
4.2.7.2. Priority
4.2.7.3. IP Addresses
4.2.7.4. Message Interval and Master Inheritance
4.2.7.5. Master Down Interval
4.2.7.6. Skew Time
4.2.7.7. Preempt Mode
4.2.7.8. VRRP Message Authentication (IPv4 only)
4.2.7.8.1. Authentication Failure
4.2.7.9. Virtual MAC Address
4.2.7.10. BFD-Enable
4.2.7.11. Initial Delay Timer
4.2.7.12. VRRP Advertisement Message IP Address List Verification
4.2.7.13. IPv6 Virtual Router Instance Operationally Up
4.2.7.14. Policies
4.3. VRRP Priority Control Policies
4.3.1. VRRP Policy Constraints
4.3.2. VRRP Base Priority
4.3.3. VRRP Priority Control Policy In-use Priority
4.3.4. VRRP Priority Control Policy Priority Events
4.3.4.1. Priority Event Hold-set Timers
4.3.4.2. Port Down Priority Event
4.3.4.3. LAG Port Down Priority Event
4.3.4.4. Host Unreachable Priority Event
4.3.4.5. Route Unknown Priority Event
4.4. VRRP Non-owner Accessibility
4.4.1. Non-owner Access Ping Reply
4.4.2. Non-owner Access Telnet
4.4.3. Non-owner Access SSH
4.5. VRRP Configuration Process Overview
4.6. Configuration Notes
4.7. Configuring VRRP with CLI
4.8. VRRP Configuration Overview
4.8.1. Preconfiguration Requirements
4.9. Basic VRRP Configurations
4.9.1. VRRP Policy
4.9.2. VRRP IES or VPRN Service Parameters
4.9.2.1. Configuring IES or VPRN VRRP for IPv6
4.10. Common Configuration Tasks
4.11. Configuring IES or VPRN VRRP Parameters
4.11.1. Configuring VRRP on Subnets
4.11.2. Owner VRRP
4.11.3. Non-owner VRRP
4.12. VRRP Management Tasks
4.12.1. Deleting a VRRP Policy
4.12.2. Deleting VRRP on a Service
4.13. VRRP Command Reference
4.13.1. Command Hierarchies
4.13.1.1. VRRP Priority Control Event Policy Commands
4.13.1.2. VRRP Show Commands
4.13.1.3. VRRP Monitor Commands
4.13.1.4. VRRP Clear Commands
4.13.1.5. VRRP Debug Commands
4.13.2. Command Descriptions
4.13.2.1. Configuration Commands
4.13.2.1.1. VRRP Priority Control Event Policy Commands
4.13.2.1.2. VRRP Priority Event Commands
4.13.2.2. VRRP Show Commands
4.13.2.3. VRRP Monitor Commands
4.13.2.4. VRRP Clear Commands
4.13.2.5. VRRP Debug Commands
5. Filter Policies
5.1. Configuring Filter Policies
5.1.1. Overview of Filter Policies
5.1.2. Network and Service (Access) Interface-based Filtering
5.1.3. Policy-Based Routing
5.1.4. Multi-field Classification (MFC)
5.1.5. VLAN-based Filtering
5.1.6. Filter Policy Entries
5.1.6.1. Applying Filter Policies
5.1.6.2. Packet Matching Criteria
5.1.6.3. Ordering Filter Entries
5.1.7. Filter Log Files
5.2. Configuration Notes
5.2.1. IP Filters
5.2.2. IPv6 Filters
5.2.3. MAC Filters
5.2.4. VLAN Filters
5.2.5. Filter Logs
5.3. Configuring Filter Policies with CLI
5.4. Basic Configuration
5.5. Common Configuration Tasks
5.5.1. Creating an IPv4 or IPv6 Filter Policy
5.5.1.1. IP Filter Policy
5.5.1.2. IP Filter Entry
5.5.1.3. IP Filter Entry Matching Criteria
5.5.1.4. IP Filter Entry for PBR to a System IP or Loopback Address
5.5.2. Creating a MAC Filter Policy
5.5.2.1. MAC Filter Policy
5.5.2.2. MAC Filter Entry
5.5.2.3. MAC Entry Matching Criteria
5.5.3. Creating a VLAN Filter Policy
5.5.3.1. VLAN Filter Policy
5.5.3.2. VLAN Filter Entry
5.5.3.3. VLAN Entry Matching Criteria
5.5.4. Creating a Bypass Policy for a Firewall in a Layer 2 Service
5.5.5. Creating an IP Exception Filter Policy
5.5.5.1. IP Exception Filter Policy
5.5.5.2. IP Exception Entry Matching Criteria
5.5.6. Configuring Filter Log Policies
5.5.7. Configuring a NAT Security Profile
5.5.8. Configuring a NAT Security Policy
5.5.9. Applying IP and MAC Filter Policies to a Service
5.5.10. Applying IP Filter Policies to Network Interfaces
5.5.11. Applying VLAN Filter Policies to a Ring Port
5.5.12. Creating a Match List for Filter Policies
5.6. Filter Management Tasks
5.6.1. Renumbering Filter Policy Entries
5.6.2. Modifying an IP Filter Policy
5.6.3. Modifying a MAC Filter Policy
5.6.4. Modifying a VLAN Filter Policy
5.6.5. Removing and Deleting a Filter Policy
5.6.5.1. Removing a Filter from a Service
5.6.5.2. Removing a Filter from a Network Interface
5.6.5.3. Removing a Filter from a Ring Port
5.6.5.4. Deleting a Filter
5.7. Filter Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. IP Filter Log Configuration Commands
5.7.1.1.2. IP Filter Policy Configuration Commands
5.7.1.1.3. IPv6 Filter Policy Configuration Commands
5.7.1.1.4. MAC Filter Policy Commands
5.7.1.1.5. VLAN Filter Policy Commands
5.7.1.1.6. IP Exception Filter Policy Configuration Commands
5.7.1.1.7. Security Policy Commands
5.7.1.1.8. Filter Match List Commands
5.7.1.2. Show Commands
5.7.1.3. Clear Commands
5.7.1.4. Monitor Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Filter Log Commands
5.7.2.1.3. Filter Policy Commands
5.7.2.1.4. General Filter Entry Commands
5.7.2.1.5. IP, MAC, VLAN, and IP Exception Filter Entry Commands
5.7.2.1.6. IP, MAC, and IP Exception Filter Match Criteria Commands
5.7.2.1.7. Security Policy Commands
5.7.2.1.8. Match List Configuration Commands
5.7.2.2. Show Commands
5.7.2.3. Clear Commands
5.7.2.4. Monitor Commands
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.2. Sampling
6.1.3. Collectors
6.1.4. Templates
6.2. Cflowd Configuration Process Overview
6.3. Configuring Cflowd with CLI
6.4. Basic Cflowd Configuration
6.5. Common Configuration Tasks
6.5.1. Enabling Cflowd
6.5.1.1. Enabling Cflowd On a SAP
6.5.2. Configuring Global Cflowd Parameters
6.5.3. Configuring Cflowd Collector Parameters
6.5.4. Specifying Cflowd Options on an IP Interface
6.5.4.1. Interface Configurations
6.5.4.2. Service Interfaces
6.6. Cflowd Configuration Management Tasks
6.6.1. Modifying Global Cflowd Parameters
6.6.2. Modifying Cflowd Collector Parameters
6.7. Cflowd Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Configuration Commands
6.7.1.2. Show Commands
6.7.1.3. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Generic Commands
6.7.2.2. Configuration Commands
6.7.2.3. Show Commands
6.7.2.4. Clear Commands
7. Route Policies
7.1. Configuring Route Policies
7.1.1. Routing Policy and MPLS
7.1.2. Policy Statements
7.1.2.1. Default Action Behavior
7.1.2.2. Denied IP Prefixes
7.1.2.3. Controlling Route Flapping
7.1.3. Regular Expressions
7.1.3.1. Terms
7.1.3.2. Operators
7.1.4. Community Expressions
7.1.5. BGP and OSPF Route Policy Support
7.1.5.1. BGP Route Policies
7.1.5.2. Readvertised Route Policies
7.1.5.3. Route Policies for BGP Next-Hop Resolution and Peer Tracking
7.1.5.3.1. BGP Next-Hop Resolution Policy Overview
7.1.5.3.2. BGP Peer Tracking Policy Overview
7.1.5.3.3. Route Policy Support for BGP Next-Hop Resolution
7.1.5.3.4. Route Policy Support for BGP Peer Tracking
7.1.6. When to Use Route Policies
7.1.7. Troubleshooting the FIB
7.2. Route Policy Configuration Process Overview
7.3. Configuration Notes
7.4. Configuring Route Policies with CLI
7.5. Route Policy Configuration Overview
7.5.1. When to Create Routing Policies
7.5.2. Default Route Policy Actions
7.5.3. Policy Evaluation
7.5.3.1. Damping
7.6. Basic Route Policy Configuration
7.7. Configuring Route Policy Components
7.7.1. Beginning the Policy Statement
7.7.2. Creating a Route Policy
7.7.3. Configuring a Default Action
7.7.4. Configuring an Entry
7.7.5. Configuring an AS Path (policy-option)
7.7.6. Configuring a Community List or Expression
7.7.7. Configuring Damping
7.7.8. Configuring a Prefix List
7.7.9. Configuring PIM Join/Register Policies
7.7.10. Configuring Bootstrap Message Import and Export Policies
7.7.11. Configuring LDP-to-Segment Routing Stitching Policies
7.8. Route Policy Configuration Management Tasks
7.8.1. Editing Policy Statements and Parameters
7.8.2. Deleting an Entry
7.8.3. Deleting a Policy Statement
7.9. Route Policy Command Reference
7.9.1. Command Hierarchies
7.9.1.1. Route Policy Configuration Commands
7.9.1.2. Show Commands
7.9.2. Command Descriptions
7.9.2.1. Configuration Commands
7.9.2.1.1. Generic Commands
7.9.2.1.2. Route Policy Options
7.9.2.1.3. Route Policy Damping Commands
7.9.2.1.4. Route Policy Prefix Commands
7.9.2.1.5. Route Policy Entry Match Commands
7.9.2.1.6. Route Policy Action Commands
7.9.2.2. Show Commands
8. List of Acronyms
9. Supported Standards and Protocols
Customer Document and Product Support
7705 SAR Routing Protocols Guide R23.4.R1
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. Technical Support
2. 7705 SAR Routing Configuration Process
3. IP Multicast
3.1. Overview of IP Multicast
3.1.1. Multicast in IP-VPN Networks
3.1.2. Mobile Backhaul IP Multicast Example
3.1.3. Multicast Models (ASM and SSM)
3.1.3.1. Any-Source Multicast (ASM)
3.1.3.2. Source-Specific Multicast (SSM)
3.1.4. IGMP Snooping and MLD Snooping For VPLS and Routed VPLS
3.1.5. Multicast Over Layer 3 Spoke SDP
3.2. IGMP
3.2.1. IGMP Overview
3.2.2. IGMP Versions and Interoperability Requirements
3.2.3. IGMP Version Transition
3.2.4. Query Messages
3.2.5. Source-Specific Multicast Groups (IPv4)
3.3. MLD
3.3.1. MLD Overview
3.3.2. MLDv1
3.3.3. MLDv2
3.4. PIM
3.4.1. PIM-SM Overview
3.4.2. PIM-SM Functions
3.4.2.1. Phase One
3.4.2.2. Phase Two
3.4.2.3. Phase Three
3.4.3. Encapsulating Data Packets in the Register Tunnel
3.4.4. PIM Bootstrap Router Mechanism
3.4.5. PIM-SM Routing Policies
3.4.6. Reverse Path Forwarding Checks
3.4.7. Anycast RP for PIM-SM
3.4.7.1. Implementation
3.4.8. Multicast-only Fast Reroute (MoFRR)
3.4.9. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.5. IPv6 PIM Models
3.5.1. PIM-SSM
3.5.2. PIM-ASM
3.6. IP Multicast Debugging Tools
3.6.1. Mtrace
3.6.1.1. Finding the Last-hop Router
3.6.1.2. Directing the Response
3.6.2. Mstat
3.6.3. Mrinfo
3.7. MSDP
3.7.1. MSDP and Anycast RP
3.7.2. MSDP Procedure
3.7.2.1. MSDP Peering Scenarios
3.7.3. MSDP Peer Groups
3.7.4. MSDP Mesh Groups
3.7.5. MSDP Routing Policies
3.7.6. Auto-RP (Discovery Mode Only) in Multicast VPN
3.8. Inter-AS Non-segmented mLDP
3.8.1. ASBR Support of PE Functionality
3.9. Hashing for Inter-AS
3.10. Hashing at the ASBR
3.11. Unicast and Multicast Address Translation
3.11.1. Unicast-to-Multicast Address Translation
3.11.2. Multicast-to-Multicast Address Translation
3.12. IP Multicast Configuration Process Overview
3.13. Configuration Notes
3.13.1. General
3.14. Configuring IP Multicast Parameters with CLI
3.15. IP Multicast Configuration Overview
3.15.1. IGMP and MLD
3.15.1.1. Static Groups
3.15.1.2. SSM Translation
3.15.2. PIM
3.15.3. Hardware Support
3.16. Basic IP Multicast Configuration
3.17. Common Configuration Tasks
3.17.1. Configuring IGMP and MLD Parameters
3.17.1.1. Enabling IGMP or MLD
3.17.1.2. Configuring IGMP and MLD
3.17.1.3. Configuring IGMP and MLD Interfaces
3.17.1.4. Configuring IGMP and MLD Interface Static Multicast
3.17.1.5. Configuring IGMP and MLD SSM Translation
3.17.2. Configuring PIM Parameters
3.17.2.1. Enabling PIM
3.17.2.2. Configuring PIM Interface Parameters
3.17.2.3. Configuring a Rendezvous Point (RP)
3.17.2.4. Importing PIM Join or Register Policies
3.17.2.5. Configuring Multicast Source Discovery Protocol (MSDP) Parameters
3.18. Service Management Tasks
3.18.1. Disabling IGMP, MLD, PIM, and MSDP
3.19. IP Multicast Command Reference
3.19.1. Command Hierarchies
3.19.1.1. Configuration Commands
3.19.1.1.1. IGMP Commands
3.19.1.1.2. MLD Commands
3.19.1.1.3. PIM Commands
3.19.1.1.4. MSDP Commands
3.19.1.2. Show Commands
3.19.1.3. Clear Commands
3.19.1.4. Monitor Commands
3.19.1.5. Debug Commands
3.19.2. Command Descriptions
3.19.2.1. Configuration Commands
3.19.2.1.1. Generic Commands
3.19.2.1.2. IGMP Commands
3.19.2.1.3. MLD Commands
3.19.2.1.4. PIM Commands
3.19.2.1.5. MSDP Commands
3.19.2.2. Show Commands
3.19.2.3. Clear Commands
3.19.2.4. Monitor Commands
3.19.2.5. Debug Commands
3.19.2.5.1. Debug IGMP Commands
3.19.2.5.2. Debug MLD Commands
3.19.2.5.3. Debug PIM Commands
3.19.2.5.4. Debug MSDP Commands
3.19.2.5.5. Debug Mtrace Commands
4. OSPF
4.1. Overview of OSPF
4.1.1. OSPF Areas
4.1.1.1. Backbone Area
4.1.1.2. Super Backbone Area
4.1.1.2.1. Sham Link
4.1.1.2.2. Implementing the OSPF Super Backbone
4.1.1.2.3. Loop Avoidance
4.1.1.2.4. DN Bit
4.1.1.2.5. VPN Route Tag
4.1.1.3. Area Border Router
4.1.1.4. Stub Area
4.1.1.5. Not-So-Stubby Area
4.1.2. Virtual Links
4.1.3. Neighbors and Adjacencies
4.1.3.1. Designated Routers and Backup Designated Routers
4.1.4. Link-State Advertisements
4.1.5. Metrics
4.1.6. Authentication
4.1.6.1. Authentication Key
4.1.6.2. Authentication Keychains
4.1.7. Route Redistribution and Summarization
4.1.8. OSPF-TE Extensions
4.1.9. Unnumbered Interfaces
4.1.10. IP Subnets
4.1.11. OSPF Instances
4.1.12. Multi-area Adjacencies
4.1.13. OSPF Import Policies
4.2. Bidirectional Forwarding Detection (BFD) for OSPF
4.3. Graceful Restart Helper
4.4. LFA Protection Using Segment Routing Backup Node SID
4.4.1. Configuring LFA Using Backup Node SID
4.4.2. Detailed Operation of LFA Protection Using Backup Node SID
4.4.3. Duplicate SID Handling
4.4.4. OSPF Control Plane Extensions
4.4.5. Topology-Independent LFA for OSPF
4.5. LDP and IP Fast Reroute (FRR) for OSPF Prefixes
4.5.1. LFA Calculations
4.5.1.1. Selection Algorithm
4.5.1.2. LFA Configuration
4.5.2. IGP Shortcuts (RSVP-TE Tunnels)
4.5.2.1. Selection Algorithm
4.5.2.2. Forwarding Adjacency
4.5.2.3. IGP Shortcut Configuration
4.5.3. LFA SPF Policies
4.5.3.1. LFA SPF Policy Configuration
4.6. Preconfiguration Requirements
4.7. OSPF Configuration Process Overview
4.8. Configuration Notes
4.8.1. General
4.9. Configuring OSPF with CLI
4.10. OSPF Configuration Guidelines
4.11. Basic OSPF Configuration
4.11.1. Configuring the Router ID
4.11.2. Configuring an OSPF Area
4.11.3. Configuring an Interface
4.12. Configuring Other OSPF Components
4.12.1. Configuring a Stub Area
4.12.2. Configuring a Not-So-Stubby Area
4.12.3. Configuring a Virtual Link
4.12.4. Configuring Authentication
4.12.5. Assigning a Designated Router
4.12.6. Configuring Route Summaries
4.12.7. Configuring Route Preferences
4.13. OSPF Configuration Management Tasks
4.13.1. Modifying a Router ID
4.13.2. Deleting a Router ID
4.13.3. Modifying OSPF Parameters
4.14. OSPF Command Reference
4.14.1. Command Hierarchies
4.14.1.1. Configuration Commands
4.14.1.2. Show Commands
4.14.1.3. Clear Commands
4.14.1.4. Monitor Commands
4.14.1.5. Debug Commands
4.14.2. Command Descriptions
4.14.2.1. Configuration Commands
4.14.2.1.1. Generic Commands
4.14.2.1.2. Global Commands
4.14.2.1.3. Area Commands
4.14.2.1.4. Interface/Virtual Link Commands
4.14.2.2. Show Commands
4.14.2.3. Clear Commands
4.14.2.4. Monitor Commands
4.14.2.5. Debug Commands
5. IS-IS
5.1. Overview of IS-IS
5.1.1. IS-IS Areas (Two-level Hierarchy)
5.1.2. ISO Network Addressing
5.1.3. Neighbors and Adjacencies
5.1.3.1. Designated Routers
5.1.3.2. IS-IS Packet Types
5.1.4. Metrics
5.1.5. Authentication
5.1.5.1. Authentication Key
5.1.5.2. Authentication Keychains
5.1.6. Route Redistribution and Summarization
5.1.6.1. Route Redistribution
5.1.6.2. Route Summarization
5.1.6.2.1. Partial SPF Calculation
5.1.7. IS-IS-TE Extensions
5.1.8. Unnumbered Interfaces
5.1.9. Segment Routing in Shortest Path Forwarding
5.1.9.1. Configuring Segment Routing in Shortest Path
5.1.9.2. Segment Routing Operational Procedures
5.1.9.2.1. Prefix SID Resolution for a Segment Routing Mapping Server
5.1.9.2.2. Prefix Advertisement and Resolution
5.1.9.2.3. Error and Resource Exhaustion Handling
5.1.9.3. Segment Routing Tunnel Management
5.1.9.3.1. Tunnel MTU Determination
5.1.9.4. Remote LFA with Segment Routing
5.1.9.5. Topology-Independent LFA
5.1.9.5.1. TI-LFA Configuration
5.1.9.5.2. TI-LFA Link-Protect Operation
5.1.9.5.3. Data Path Support
5.1.9.6. Node Protection Support in Remote LFA and TI-LFA
5.1.9.6.1. Configuring Remote LFA and TI-LFA for Node Protection
5.1.9.6.2. TI-LFA Node-Protect Operation
5.1.9.6.3. Remote LFA Node-Protect Operation
5.1.9.6.4. TI-LFA and Remote LFA Node Protection Feature Interactions and Limitations
5.1.9.7. IPv6 Segment Routing using MPLS Encapsulation
5.1.9.7.1. IS-IS MT=0 Extensions
5.1.9.7.2. Supported Service and Forwarding Contexts
5.1.9.7.3. Services Using SDP with an SR IPv6 Tunnel
5.1.9.8. Data Path Support
5.1.9.9. Control Protocol Changes
5.1.9.9.1. IS-IS Control Protocol Changes
5.1.9.9.2. OSPF Control Protocol Changes
5.1.9.10. BGP Label Route Resolution Using Segment Routing Tunnel
5.1.9.11. Service Packet Forwarding with Segment Routing
5.1.9.12. Segment Routing Mapping Server for IPv4 /32 Prefixes (IS-IS)
5.1.9.13. Mirror Services
5.1.10. Multi-Instance IS-IS (MI-IS-IS)
5.1.11. IPv6 Support
5.2. Bidirectional Forwarding Detection (BFD) for IS-IS
5.3. LDP and IP Fast Reroute (FRR) for IS-IS Prefixes
5.3.1. LFA Calculations
5.3.1.1. Selection Algorithm
5.3.1.2. LFA Configuration
5.3.2. IGP Shortcuts (RSVP-TE Tunnels)
5.3.2.1. Selection Algorithm
5.3.2.2. Forwarding Adjacency
5.3.2.3. IGP Shortcut Configuration
5.3.3. LFA SPF Policies
5.3.3.1. LFA SPF Policy Configuration
5.4. IS-IS Configuration Process Overview
5.5. Configuration Notes
5.5.1. General
5.6. Configuring IS-IS with CLI
5.7. IS-IS Configuration Overview
5.8. Basic IS-IS Configuration
5.9. Configuring IS-IS Components
5.9.1. Enabling IS-IS
5.9.2. Configuring an IS-IS Instance Level
5.9.3. Configuring ISO Area Addresses
5.9.4. Configuring Global IS-IS Parameters
5.9.5. Configuring Interface Parameters
5.9.5.1. Example 1: Configuring a Level 1 Area
5.9.5.2. Example 2: Modifying Router Level Capability
5.9.5.3. Interface Level Capability
5.9.6. Configuring Authentication
5.9.7. Configuring Leaking
5.9.8. Redistributing External IS-IS Routes
5.9.9. Configuring IS-IS Support for LDP-to-SR Stitching
5.9.10. Configuring an SR Mapping Server for IPv4 /32 Prefixes
5.10. IS-IS Configuration Management Tasks
5.10.1. Disabling IS-IS
5.10.2. Removing IS-IS
5.10.3. Modifying Global IS-IS Parameters
5.10.4. Modifying IS-IS Interface Parameters
5.11. IS-IS Command Reference
5.11.1. Command Hierarchies
5.11.1.1. Configuration Commands
5.11.1.2. Show Commands
5.11.1.3. Clear Commands
5.11.1.4. Monitor Commands
5.11.1.5. Debug Commands
5.11.2. Command Descriptions
5.11.2.1. Configuration Commands
5.11.2.1.1. Generic Commands
5.11.2.1.2. Global Commands
5.11.2.1.3. Interface Commands
5.11.2.2. Show Commands
5.11.2.3. Clear Commands
5.11.2.4. Monitor Commands
5.11.2.5. Debug Commands
6. BGP
6.1. BGP Overview
6.1.1. BGP Communication
6.1.1.1. Static and Dynamic Neighbors
6.1.2. Message Types
6.1.3. BGP Path Attributes
6.1.3.1. Origin Attribute
6.1.3.2. AS Path Attribute
6.1.3.3. Next-hop Attribute
6.1.3.4. MED Attribute
6.1.3.5. Local Preference Attribute
6.1.3.6. Route Aggregation Path Attributes
6.1.3.7. Communities Attribute
6.1.3.8. Route Reflection Attributes
6.1.3.9. Multiprotocol BGP Extensions Attributes
6.1.3.10. 4-Octet AS Attributes
6.1.3.11. AIGP Metric Attribute
6.1.4. Multi-Protocol BGP Attributes
6.1.5. BGPv6
6.1.6. BGP Add-Paths
6.1.6.1. Path Selection Mode and Parameters for Multiple Paths to Add-path Peers
6.1.6.2. Routing Policy for Multiple Paths
6.1.6.3. BGP Route Advertisement Rules for Multiple Paths
6.1.6.4. BGP Split Horizon
6.1.7. Outbound Route Filtering (ORF)
6.1.8. BGP Route Target Constrained Route Distribution
6.2. Group Configuration and Peers
6.2.1. Hierarchical Levels
6.2.2. Route Reflection
6.2.3. BGP Peer Groups with Dynamic Neighbors
6.2.4. Fast External Failover
6.2.5. BGP Fast Reroute With Prefix-Independent Convergence
6.2.5.1. BGP FRR Failure Detection and Switchover
6.2.6. Calculating Backup Paths
6.2.7. Sending of BGP Communities
6.2.8. BGP Decision Process
6.3. BGP Route Tunnels
6.3.1. Route Reflector Next-Hop-Self for VPN IPv4 Routes over IPv4 Labeled Routes
6.3.2. Layer 2 Services and BGP Route Tunnel
6.3.3. BGP Route Tunnel SDP Binding
6.3.4. BGP Route Tunnel With Multihop EBGP Resolution
6.3.5. Next-hop Resolution of BGP Labeled Routes to Tunnels
6.3.6. BGP Next-Hop Resolution and Peer Tracking
6.3.7. BGP Route Installation in the Route Table
6.3.8. BGP Link State
6.3.8.1. Supported BGP-LS Components
6.4. Command Interactions and Dependencies
6.4.1. Changing the Autonomous System Number
6.4.2. Changing the Local AS Number
6.4.3. Changing the Router ID at the Configuration Level
6.4.4. Hold Time and Keepalive Timer Dependencies
6.4.5. Import and Export Route Policies
6.4.6. AS Override
6.4.7. TCP MD5 Authentication
6.4.8. TTL Security
6.4.9. Advertise-Inactive
6.4.10. Advertise-Inactive, Add-Paths, and Export Policy Interaction
6.5. BGP Configuration Process Overview
6.6. Configuration Notes
6.6.1. General
6.6.2. BGP Defaults
6.6.3. BGP MIB Notes
6.7. Configuring BGP with CLI
6.8. BGP Configuration Overview
6.8.1. Preconfiguration Requirements
6.8.2. BGP Hierarchy
6.8.3. Internal and External BGP Configurations
6.8.4. BGP Route Reflectors
6.9. Basic BGP Configuration
6.10. Common Configuration Tasks
6.10.1. Creating an Autonomous System
6.10.2. Configuring a Router ID
6.11. BGP Components
6.11.1. Configuring BGP
6.11.2. Configuring Group Attributes
6.11.3. Configuring Neighbor Attributes
6.11.4. Configuring BGP Address Families
6.11.5. Configuring Route Reflection
6.11.6. Configuring a BGP Peer Group with Dynamic Neighbors
6.12. BGP Configuration Management Tasks
6.12.1. Modifying an AS Number
6.12.2. Modifying the BGP Router ID
6.12.3. Modifying the Router-Level Router ID
6.12.4. Deleting a Neighbor
6.12.5. Deleting Groups
6.12.6. Editing BGP Parameters
6.13. BGP Command Reference
6.13.1. Command Hierarchies
6.13.1.1. Configuration Commands
6.13.1.1.1. Global BGP Commands
6.13.1.1.2. Group BGP Commands
6.13.1.1.3. Neighbor BGP Commands
6.13.1.1.4. Other BGP-Related Commands
6.13.1.2. Show Commands
6.13.1.3. Clear Commands
6.13.1.4. Debug Commands
6.13.2. Command Descriptions
6.13.2.1. Configuration Commands
6.13.2.1.1. Configuration Commands
6.13.2.1.2. Other BGP-Related Commands
6.13.2.2. Show Commands
6.13.2.3. Clear Commands
6.13.2.4. Debug Commands
7. RIP
7.1. RIP Overview
7.1.1. RIP Versions
7.1.2. RIPv2 Authentication
7.1.3. Metrics
7.1.4. Timers
7.1.5. Import and Export Policies
7.1.6. RIP Packet Format
7.1.7. RIP Hierarchical Levels
7.2. RIP Configuration Process Overview
7.3. Configuration Notes
7.4. Configuring RIP with CLI
7.5. RIP Configuration Overview
7.5.1. Preconfiguration Requirements
7.6. Basic RIP Configuration
7.7. Common Configuration Tasks
7.7.1. Configuring Interfaces
7.7.2. Configuring a Route Policy
7.8. Configuring RIP Parameters
7.8.1. Configuring Global-Level Parameters
7.8.2. Configuring Group-Level Parameters
7.8.3. Configuring Neighbor-Level Parameters
7.9. RIP Configuration Management Tasks
7.9.1. Modifying RIP Parameters
7.9.2. Deleting a RIP Group
7.9.3. Deleting a RIP Neighbor
7.10. RIP Command Reference
7.10.1. Command Hierarchies
7.10.1.1. Configuration Commands
7.10.1.1.1. Global RIP Commands
7.10.1.1.2. Group RIP Commands
7.10.1.1.3. Neighbor RIP Commands
7.10.1.2. Show Commands
7.10.1.3. Clear Commands
7.10.1.4. Monitor Commands
7.10.1.5. Debug Commands
7.10.2. Command Descriptions
7.10.2.1. Configuration Commands
7.10.2.1.1. Generic Commands
7.10.2.1.2. RIP Commands
7.10.2.2. Show Commands
7.10.2.3. Clear Commands
7.10.2.4. Monitor Commands
7.10.2.5. Debug Commands
8. List of Acronyms
9. Supported Standards and Protocols
Customer Document and Product Support
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. Technical Support
2. 7705 SAR Routing Configuration Process
3. IP Multicast
3.1. Overview of IP Multicast
3.1.1. Multicast in IP-VPN Networks
3.1.2. Mobile Backhaul IP Multicast Example
3.1.3. Multicast Models (ASM and SSM)
3.1.3.1. Any-Source Multicast (ASM)
3.1.3.2. Source-Specific Multicast (SSM)
3.1.4. IGMP Snooping and MLD Snooping For VPLS and Routed VPLS
3.1.5. Multicast Over Layer 3 Spoke SDP
3.2. IGMP
3.2.1. IGMP Overview
3.2.2. IGMP Versions and Interoperability Requirements
3.2.3. IGMP Version Transition
3.2.4. Query Messages
3.2.5. Source-Specific Multicast Groups (IPv4)
3.3. MLD
3.3.1. MLD Overview
3.3.2. MLDv1
3.3.3. MLDv2
3.4. PIM
3.4.1. PIM-SM Overview
3.4.2. PIM-SM Functions
3.4.2.1. Phase One
3.4.2.2. Phase Two
3.4.2.3. Phase Three
3.4.3. Encapsulating Data Packets in the Register Tunnel
3.4.4. PIM Bootstrap Router Mechanism
3.4.5. PIM-SM Routing Policies
3.4.6. Reverse Path Forwarding Checks
3.4.7. Anycast RP for PIM-SM
3.4.7.1. Implementation
3.4.8. Multicast-only Fast Reroute (MoFRR)
3.4.9. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.5. IPv6 PIM Models
3.5.1. PIM-SSM
3.5.2. PIM-ASM
3.6. IP Multicast Debugging Tools
3.6.1. Mtrace
3.6.1.1. Finding the Last-hop Router
3.6.1.2. Directing the Response
3.6.2. Mstat
3.6.3. Mrinfo
3.7. MSDP
3.7.1. MSDP and Anycast RP
3.7.2. MSDP Procedure
3.7.2.1. MSDP Peering Scenarios
3.7.3. MSDP Peer Groups
3.7.4. MSDP Mesh Groups
3.7.5. MSDP Routing Policies
3.7.6. Auto-RP (Discovery Mode Only) in Multicast VPN
3.8. Inter-AS Non-segmented mLDP
3.8.1. ASBR Support of PE Functionality
3.9. Hashing for Inter-AS
3.10. Hashing at the ASBR
3.11. Unicast and Multicast Address Translation
3.11.1. Unicast-to-Multicast Address Translation
3.11.2. Multicast-to-Multicast Address Translation
3.12. IP Multicast Configuration Process Overview
3.13. Configuration Notes
3.13.1. General
3.14. Configuring IP Multicast Parameters with CLI
3.15. IP Multicast Configuration Overview
3.15.1. IGMP and MLD
3.15.1.1. Static Groups
3.15.1.2. SSM Translation
3.15.2. PIM
3.15.3. Hardware Support
3.16. Basic IP Multicast Configuration
3.17. Common Configuration Tasks
3.17.1. Configuring IGMP and MLD Parameters
3.17.1.1. Enabling IGMP or MLD
3.17.1.2. Configuring IGMP and MLD
3.17.1.3. Configuring IGMP and MLD Interfaces
3.17.1.4. Configuring IGMP and MLD Interface Static Multicast
3.17.1.5. Configuring IGMP and MLD SSM Translation
3.17.2. Configuring PIM Parameters
3.17.2.1. Enabling PIM
3.17.2.2. Configuring PIM Interface Parameters
3.17.2.3. Configuring a Rendezvous Point (RP)
3.17.2.4. Importing PIM Join or Register Policies
3.17.2.5. Configuring Multicast Source Discovery Protocol (MSDP) Parameters
3.18. Service Management Tasks
3.18.1. Disabling IGMP, MLD, PIM, and MSDP
3.19. IP Multicast Command Reference
3.19.1. Command Hierarchies
3.19.1.1. Configuration Commands
3.19.1.1.1. IGMP Commands
3.19.1.1.2. MLD Commands
3.19.1.1.3. PIM Commands
3.19.1.1.4. MSDP Commands
3.19.1.2. Show Commands
3.19.1.3. Clear Commands
3.19.1.4. Monitor Commands
3.19.1.5. Debug Commands
3.19.2. Command Descriptions
3.19.2.1. Configuration Commands
3.19.2.1.1. Generic Commands
3.19.2.1.2. IGMP Commands
3.19.2.1.3. MLD Commands
3.19.2.1.4. PIM Commands
3.19.2.1.5. MSDP Commands
3.19.2.2. Show Commands
3.19.2.3. Clear Commands
3.19.2.4. Monitor Commands
3.19.2.5. Debug Commands
3.19.2.5.1. Debug IGMP Commands
3.19.2.5.2. Debug MLD Commands
3.19.2.5.3. Debug PIM Commands
3.19.2.5.4. Debug MSDP Commands
3.19.2.5.5. Debug Mtrace Commands
4. OSPF
4.1. Overview of OSPF
4.1.1. OSPF Areas
4.1.1.1. Backbone Area
4.1.1.2. Super Backbone Area
4.1.1.2.1. Sham Link
4.1.1.2.2. Implementing the OSPF Super Backbone
4.1.1.2.3. Loop Avoidance
4.1.1.2.4. DN Bit
4.1.1.2.5. VPN Route Tag
4.1.1.3. Area Border Router
4.1.1.4. Stub Area
4.1.1.5. Not-So-Stubby Area
4.1.2. Virtual Links
4.1.3. Neighbors and Adjacencies
4.1.3.1. Designated Routers and Backup Designated Routers
4.1.4. Link-State Advertisements
4.1.5. Metrics
4.1.6. Authentication
4.1.6.1. Authentication Key
4.1.6.2. Authentication Keychains
4.1.7. Route Redistribution and Summarization
4.1.8. OSPF-TE Extensions
4.1.9. Unnumbered Interfaces
4.1.10. IP Subnets
4.1.11. OSPF Instances
4.1.12. Multi-area Adjacencies
4.1.13. OSPF Import Policies
4.2. Bidirectional Forwarding Detection (BFD) for OSPF
4.3. Graceful Restart Helper
4.4. LFA Protection Using Segment Routing Backup Node SID
4.4.1. Configuring LFA Using Backup Node SID
4.4.2. Detailed Operation of LFA Protection Using Backup Node SID
4.4.3. Duplicate SID Handling
4.4.4. OSPF Control Plane Extensions
4.4.5. Topology-Independent LFA for OSPF
4.5. LDP and IP Fast Reroute (FRR) for OSPF Prefixes
4.5.1. LFA Calculations
4.5.1.1. Selection Algorithm
4.5.1.2. LFA Configuration
4.5.2. IGP Shortcuts (RSVP-TE Tunnels)
4.5.2.1. Selection Algorithm
4.5.2.2. Forwarding Adjacency
4.5.2.3. IGP Shortcut Configuration
4.5.3. LFA SPF Policies
4.5.3.1. LFA SPF Policy Configuration
4.6. Preconfiguration Requirements
4.7. OSPF Configuration Process Overview
4.8. Configuration Notes
4.8.1. General
4.9. Configuring OSPF with CLI
4.10. OSPF Configuration Guidelines
4.11. Basic OSPF Configuration
4.11.1. Configuring the Router ID
4.11.2. Configuring an OSPF Area
4.11.3. Configuring an Interface
4.12. Configuring Other OSPF Components
4.12.1. Configuring a Stub Area
4.12.2. Configuring a Not-So-Stubby Area
4.12.3. Configuring a Virtual Link
4.12.4. Configuring Authentication
4.12.5. Assigning a Designated Router
4.12.6. Configuring Route Summaries
4.12.7. Configuring Route Preferences
4.13. OSPF Configuration Management Tasks
4.13.1. Modifying a Router ID
4.13.2. Deleting a Router ID
4.13.3. Modifying OSPF Parameters
4.14. OSPF Command Reference
4.14.1. Command Hierarchies
4.14.1.1. Configuration Commands
4.14.1.2. Show Commands
4.14.1.3. Clear Commands
4.14.1.4. Monitor Commands
4.14.1.5. Debug Commands
4.14.2. Command Descriptions
4.14.2.1. Configuration Commands
4.14.2.1.1. Generic Commands
4.14.2.1.2. Global Commands
4.14.2.1.3. Area Commands
4.14.2.1.4. Interface/Virtual Link Commands
4.14.2.2. Show Commands
4.14.2.3. Clear Commands
4.14.2.4. Monitor Commands
4.14.2.5. Debug Commands
5. IS-IS
5.1. Overview of IS-IS
5.1.1. IS-IS Areas (Two-level Hierarchy)
5.1.2. ISO Network Addressing
5.1.3. Neighbors and Adjacencies
5.1.3.1. Designated Routers
5.1.3.2. IS-IS Packet Types
5.1.4. Metrics
5.1.5. Authentication
5.1.5.1. Authentication Key
5.1.5.2. Authentication Keychains
5.1.6. Route Redistribution and Summarization
5.1.6.1. Route Redistribution
5.1.6.2. Route Summarization
5.1.6.2.1. Partial SPF Calculation
5.1.7. IS-IS-TE Extensions
5.1.8. Unnumbered Interfaces
5.1.9. Segment Routing in Shortest Path Forwarding
5.1.9.1. Configuring Segment Routing in Shortest Path
5.1.9.2. Segment Routing Operational Procedures
5.1.9.2.1. Prefix SID Resolution for a Segment Routing Mapping Server
5.1.9.2.2. Prefix Advertisement and Resolution
5.1.9.2.3. Error and Resource Exhaustion Handling
5.1.9.3. Segment Routing Tunnel Management
5.1.9.3.1. Tunnel MTU Determination
5.1.9.4. Remote LFA with Segment Routing
5.1.9.5. Topology-Independent LFA
5.1.9.5.1. TI-LFA Configuration
5.1.9.5.2. TI-LFA Link-Protect Operation
5.1.9.5.3. Data Path Support
5.1.9.6. Node Protection Support in Remote LFA and TI-LFA
5.1.9.6.1. Configuring Remote LFA and TI-LFA for Node Protection
5.1.9.6.2. TI-LFA Node-Protect Operation
5.1.9.6.3. Remote LFA Node-Protect Operation
5.1.9.6.4. TI-LFA and Remote LFA Node Protection Feature Interactions and Limitations
5.1.9.7. IPv6 Segment Routing using MPLS Encapsulation
5.1.9.7.1. IS-IS MT=0 Extensions
5.1.9.7.2. Supported Service and Forwarding Contexts
5.1.9.7.3. Services Using SDP with an SR IPv6 Tunnel
5.1.9.8. Data Path Support
5.1.9.9. Control Protocol Changes
5.1.9.9.1. IS-IS Control Protocol Changes
5.1.9.9.2. OSPF Control Protocol Changes
5.1.9.10. BGP Label Route Resolution Using Segment Routing Tunnel
5.1.9.11. Service Packet Forwarding with Segment Routing
5.1.9.12. Segment Routing Mapping Server for IPv4 /32 Prefixes (IS-IS)
5.1.9.13. Mirror Services
5.1.10. Multi-Instance IS-IS (MI-IS-IS)
5.1.11. IPv6 Support
5.2. Bidirectional Forwarding Detection (BFD) for IS-IS
5.3. LDP and IP Fast Reroute (FRR) for IS-IS Prefixes
5.3.1. LFA Calculations
5.3.1.1. Selection Algorithm
5.3.1.2. LFA Configuration
5.3.2. IGP Shortcuts (RSVP-TE Tunnels)
5.3.2.1. Selection Algorithm
5.3.2.2. Forwarding Adjacency
5.3.2.3. IGP Shortcut Configuration
5.3.3. LFA SPF Policies
5.3.3.1. LFA SPF Policy Configuration
5.4. IS-IS Configuration Process Overview
5.5. Configuration Notes
5.5.1. General
5.6. Configuring IS-IS with CLI
5.7. IS-IS Configuration Overview
5.8. Basic IS-IS Configuration
5.9. Configuring IS-IS Components
5.9.1. Enabling IS-IS
5.9.2. Configuring an IS-IS Instance Level
5.9.3. Configuring ISO Area Addresses
5.9.4. Configuring Global IS-IS Parameters
5.9.5. Configuring Interface Parameters
5.9.5.1. Example 1: Configuring a Level 1 Area
5.9.5.2. Example 2: Modifying Router Level Capability
5.9.5.3. Interface Level Capability
5.9.6. Configuring Authentication
5.9.7. Configuring Leaking
5.9.8. Redistributing External IS-IS Routes
5.9.9. Configuring IS-IS Support for LDP-to-SR Stitching
5.9.10. Configuring an SR Mapping Server for IPv4 /32 Prefixes
5.10. IS-IS Configuration Management Tasks
5.10.1. Disabling IS-IS
5.10.2. Removing IS-IS
5.10.3. Modifying Global IS-IS Parameters
5.10.4. Modifying IS-IS Interface Parameters
5.11. IS-IS Command Reference
5.11.1. Command Hierarchies
5.11.1.1. Configuration Commands
5.11.1.2. Show Commands
5.11.1.3. Clear Commands
5.11.1.4. Monitor Commands
5.11.1.5. Debug Commands
5.11.2. Command Descriptions
5.11.2.1. Configuration Commands
5.11.2.1.1. Generic Commands
5.11.2.1.2. Global Commands
5.11.2.1.3. Interface Commands
5.11.2.2. Show Commands
5.11.2.3. Clear Commands
5.11.2.4. Monitor Commands
5.11.2.5. Debug Commands
6. BGP
6.1. BGP Overview
6.1.1. BGP Communication
6.1.1.1. Static and Dynamic Neighbors
6.1.2. Message Types
6.1.3. BGP Path Attributes
6.1.3.1. Origin Attribute
6.1.3.2. AS Path Attribute
6.1.3.3. Next-hop Attribute
6.1.3.4. MED Attribute
6.1.3.5. Local Preference Attribute
6.1.3.6. Route Aggregation Path Attributes
6.1.3.7. Communities Attribute
6.1.3.8. Route Reflection Attributes
6.1.3.9. Multiprotocol BGP Extensions Attributes
6.1.3.10. 4-Octet AS Attributes
6.1.3.11. AIGP Metric Attribute
6.1.4. Multi-Protocol BGP Attributes
6.1.5. BGPv6
6.1.6. BGP Add-Paths
6.1.6.1. Path Selection Mode and Parameters for Multiple Paths to Add-path Peers
6.1.6.2. Routing Policy for Multiple Paths
6.1.6.3. BGP Route Advertisement Rules for Multiple Paths
6.1.6.4. BGP Split Horizon
6.1.7. Outbound Route Filtering (ORF)
6.1.8. BGP Route Target Constrained Route Distribution
6.2. Group Configuration and Peers
6.2.1. Hierarchical Levels
6.2.2. Route Reflection
6.2.3. BGP Peer Groups with Dynamic Neighbors
6.2.4. Fast External Failover
6.2.5. BGP Fast Reroute With Prefix-Independent Convergence
6.2.5.1. BGP FRR Failure Detection and Switchover
6.2.6. Calculating Backup Paths
6.2.7. Sending of BGP Communities
6.2.8. BGP Decision Process
6.3. BGP Route Tunnels
6.3.1. Route Reflector Next-Hop-Self for VPN IPv4 Routes over IPv4 Labeled Routes
6.3.2. Layer 2 Services and BGP Route Tunnel
6.3.3. BGP Route Tunnel SDP Binding
6.3.4. BGP Route Tunnel With Multihop EBGP Resolution
6.3.5. Next-hop Resolution of BGP Labeled Routes to Tunnels
6.3.6. BGP Next-Hop Resolution and Peer Tracking
6.3.7. BGP Route Installation in the Route Table
6.3.8. BGP Link State
6.3.8.1. Supported BGP-LS Components
6.4. Command Interactions and Dependencies
6.4.1. Changing the Autonomous System Number
6.4.2. Changing the Local AS Number
6.4.3. Changing the Router ID at the Configuration Level
6.4.4. Hold Time and Keepalive Timer Dependencies
6.4.5. Import and Export Route Policies
6.4.6. AS Override
6.4.7. TCP MD5 Authentication
6.4.8. TTL Security
6.4.9. Advertise-Inactive
6.4.10. Advertise-Inactive, Add-Paths, and Export Policy Interaction
6.5. BGP Configuration Process Overview
6.6. Configuration Notes
6.6.1. General
6.6.2. BGP Defaults
6.6.3. BGP MIB Notes
6.7. Configuring BGP with CLI
6.8. BGP Configuration Overview
6.8.1. Preconfiguration Requirements
6.8.2. BGP Hierarchy
6.8.3. Internal and External BGP Configurations
6.8.4. BGP Route Reflectors
6.9. Basic BGP Configuration
6.10. Common Configuration Tasks
6.10.1. Creating an Autonomous System
6.10.2. Configuring a Router ID
6.11. BGP Components
6.11.1. Configuring BGP
6.11.2. Configuring Group Attributes
6.11.3. Configuring Neighbor Attributes
6.11.4. Configuring BGP Address Families
6.11.5. Configuring Route Reflection
6.11.6. Configuring a BGP Peer Group with Dynamic Neighbors
6.12. BGP Configuration Management Tasks
6.12.1. Modifying an AS Number
6.12.2. Modifying the BGP Router ID
6.12.3. Modifying the Router-Level Router ID
6.12.4. Deleting a Neighbor
6.12.5. Deleting Groups
6.12.6. Editing BGP Parameters
6.13. BGP Command Reference
6.13.1. Command Hierarchies
6.13.1.1. Configuration Commands
6.13.1.1.1. Global BGP Commands
6.13.1.1.2. Group BGP Commands
6.13.1.1.3. Neighbor BGP Commands
6.13.1.1.4. Other BGP-Related Commands
6.13.1.2. Show Commands
6.13.1.3. Clear Commands
6.13.1.4. Debug Commands
6.13.2. Command Descriptions
6.13.2.1. Configuration Commands
6.13.2.1.1. Configuration Commands
6.13.2.1.2. Other BGP-Related Commands
6.13.2.2. Show Commands
6.13.2.3. Clear Commands
6.13.2.4. Debug Commands
7. RIP
7.1. RIP Overview
7.1.1. RIP Versions
7.1.2. RIPv2 Authentication
7.1.3. Metrics
7.1.4. Timers
7.1.5. Import and Export Policies
7.1.6. RIP Packet Format
7.1.7. RIP Hierarchical Levels
7.2. RIP Configuration Process Overview
7.3. Configuration Notes
7.4. Configuring RIP with CLI
7.5. RIP Configuration Overview
7.5.1. Preconfiguration Requirements
7.6. Basic RIP Configuration
7.7. Common Configuration Tasks
7.7.1. Configuring Interfaces
7.7.2. Configuring a Route Policy
7.8. Configuring RIP Parameters
7.8.1. Configuring Global-Level Parameters
7.8.2. Configuring Group-Level Parameters
7.8.3. Configuring Neighbor-Level Parameters
7.9. RIP Configuration Management Tasks
7.9.1. Modifying RIP Parameters
7.9.2. Deleting a RIP Group
7.9.3. Deleting a RIP Neighbor
7.10. RIP Command Reference
7.10.1. Command Hierarchies
7.10.1.1. Configuration Commands
7.10.1.1.1. Global RIP Commands
7.10.1.1.2. Group RIP Commands
7.10.1.1.3. Neighbor RIP Commands
7.10.1.2. Show Commands
7.10.1.3. Clear Commands
7.10.1.4. Monitor Commands
7.10.1.5. Debug Commands
7.10.2. Command Descriptions
7.10.2.1. Configuration Commands
7.10.2.1.1. Generic Commands
7.10.2.1.2. RIP Commands
7.10.2.2. Show Commands
7.10.2.3. Clear Commands
7.10.2.4. Monitor Commands
7.10.2.5. Debug Commands
8. List of Acronyms
9. Supported Standards and Protocols
Customer Document and Product Support
7705 SAR Services Guide R23.4.R1
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. Technical Support
2. 7705 SAR Services Configuration Process
3. Services Overview
3.1. Introduction to Services on the 7705 SAR
3.1.1. Overview
3.1.2. Service Types
3.1.3. Service Policies
3.2. Nokia Service Model
3.3. Service Entities
3.3.1. Customers
3.3.2. Service Types
3.3.2.1. Service Names
3.3.3. Service Access Points (SAPs)
3.3.3.1. SAP Encapsulation Types and Identifiers
3.3.3.1.1. Ethernet Encapsulations
3.3.3.1.2. SONET/SDH Encapsulations
3.3.3.1.3. TDM and Serial (TDM) Encapsulations
3.3.3.1.4. Service Types and SAP Encapsulations—Summary
3.3.3.2. SAP Configuration Considerations
3.3.4. Service Destination Points (SDPs)
3.3.4.1. SDP Binding
3.3.4.2. Spoke and Mesh SDPs
3.3.4.3. SDPs and BGP Route Tunnels
3.3.4.4. SDP Encapsulation Types
3.3.4.4.1. MPLS Encapsulation
3.3.4.4.2. GRE Encapsulation
3.3.4.4.3. IP Encapsulation
3.3.4.5. Spoke SDP Terminations
3.3.4.6. SDP Ping
3.3.4.7. SDP Keepalives
3.3.4.8. Mixed-LSP SDPs
3.3.4.9. Multiple Load-balancing LSPs Under a Single SDP
3.4. High-Speed Download Packet Access Offload
3.4.1. HSDPA Offload
3.4.1.1. Failure Detection
3.5. ETH-CFM (802.1ag and Y.1731)
3.5.1. 802.1ag and Y.1731 Terminology
3.5.1.1. MDs, MD Levels, MAs, and MEPs (802.1ag)
3.5.1.2. MEG Levels, MEGs, and MEPs (Y.1731)
3.5.2. ETH-CFM Frame Format
3.5.2.1. ETH-CFM OAMPDU
3.5.2.2. CFM Frame Processing
3.5.2.2.1. Processing SAP 0 and SAP 0.* OAM Packets
3.5.2.3. MEG-ID and ICC-Based Format
3.5.3. ETH-CFM Functions and Tests
3.5.3.1. ETH-CFM Ethernet OAM Tests
3.5.3.1.1. Loopback
3.5.3.1.2. Linktrace
3.5.3.1.3. Throughput Measurement
3.5.3.1.4. Continuity Check
3.5.3.1.5. Remote Defect Indication
3.5.3.1.6. Alarm Indication Signal
3.5.3.1.7. Ethernet Test
3.5.4. MEP Support (802.1ag and Y.1731)
3.5.4.1. 802.1ag MEP Support on Ethernet SAPs
3.5.4.2. 802.1ag and Y.1731 MEP Support on Ethernet Spoke SDPs and Mesh SDPs
3.5.4.3. Y.1731 MEP Support on Ethernet SAPs
3.5.5. Priority Mapping (802.1ag and Y.1731)
3.5.5.1. Priority Mapping for SAP Up MEPs
3.5.5.2. Priority Mapping for SAP Down MEPs
3.6. G.8032 Ethernet Ring Protection Switching
3.6.1. Overview of G.8032 Operation
3.6.2. Ethernet Ring Sub-Rings
3.6.2.1. Virtual and Non-Virtual Channel
3.6.2.1.1. LAG Support
3.6.2.2. OAM Considerations
3.6.2.3. Support Service and Solution Combinations
3.7. QinQ Support
3.7.1. Overview of QinQ
3.7.2. QinQ Support with Forced C-Tag Forwarding (VPLS only)
3.7.2.1. Example 1: General QinQ Implementation
3.7.2.2. Example 2: QinQ using VPLS with Ethernet SAPs
3.7.2.3. Example 3: QinQ Using VPLS with ATM SAPs
3.7.3. QinQ Support on Ethernet Ports
3.7.3.1. Special QinQ SAP Identifiers
3.7.3.2. QinQ Dot1p Match Behavior
3.7.3.3. QinQ Top-Only Mark Option
3.7.3.4. Maximum Number of VLAN Tags
3.7.4. QinQ Configuration Overview
3.8. Raw Socket IP Transport Service
3.8.1. Remote Host Manual TCP Connection Check
3.8.2. QoS Requirements for IP Transport
3.9. Service Creation Overview
3.10. Port and SAP CLI Identifiers
3.11. Configuring Global Service Entities with CLI
3.12. Service Model Entities
3.13. Basic Configuration
3.14. Common Configuration Tasks
3.14.1. Configuring Customer Accounts
3.14.2. Configuring SDPs
3.14.2.1. Enabling IP Fragmentation for GRE SDPs
3.14.3. Configuring Service Names
3.15. ETH-CFM (802.1ag and Y.1731) Tasks
3.15.1. Configuring ETH-CFM Parameters (802.1ag and Y.1731)
3.15.2. Applying ETH-CFM Parameters
3.16. Service Management Tasks
3.16.1. Modifying Customer Accounts
3.16.2. Deleting Customers
3.16.3. Modifying SDPs
3.16.4. Deleting SDPs
3.16.5. Deleting LSP Associations
3.17. Global Service Command Reference
3.17.1. Command Hierarchies
3.17.1.1. Global Service Configuration Commands
3.17.1.1.1. Customer Commands
3.17.1.1.2. SDP Commands
3.17.1.1.3. SAP Commands
3.17.1.1.4. Ethernet Ring Commands
3.17.1.1.5. ETH-CFM Commands
3.17.1.2. Show Commands
3.17.1.3. Monitor Commands
3.17.2. Command Descriptions
3.17.2.1. Global Service Configuration Commands
3.17.2.1.1. Generic Commands
3.17.2.1.2. Customer Commands
3.17.2.1.3. SDP Commands
3.17.2.1.4. SDP Keepalive Commands
3.17.2.1.5. Ethernet Ring Commands
3.17.2.2. Show Commands
3.17.2.3. Monitor Commands
4. VLL Services
4.1. ATM VLL (Apipe) Services
4.1.1. ATM VLL for End-to-End ATM Service
4.1.2. ATM Virtual Trunk Over an IP/MPLS Packet-Switched Network
4.1.3. ATM SAP-to-SAP Service
4.1.4. ATM Traffic Management Support
4.1.4.1. Network Ingress Classification
4.1.4.2. ATM Access Egress Queuing and Shaping
4.1.5. Control Word
4.2. Circuit Emulation VLL (Cpipe) Services
4.2.1. Cpipe Service Overview
4.2.2. TDM SAP-to-SAP Service
4.2.3. Cpipe Service Modes
4.2.3.1. Unstructured Mode (SAToP)
4.2.3.2. SAToP Serial
4.2.3.2.1. SAToP Serial Payload Size
4.2.3.2.2. SAToP Serial Jitter Buffer
4.2.3.3. SAToP Teleprotection Interface
4.2.3.4. Structured Mode (CESoPSN)
4.2.4. TDM PW Encapsulation
4.2.5. Circuit Emulation Parameters and Options
4.2.5.1. Unstructured
4.2.5.2. Structured DS1/E1 CES without CAS
4.2.5.3. Structured T1/E1 CES with CAS
4.2.5.4. Packet Payload Size
4.2.5.5. Jitter Buffer
4.2.5.5.1. Configuration and Design Considerations
4.2.5.6. Asymmetric Delay Control
4.2.5.6.1. ADC for Redundant Paths
4.2.5.6.2. Active Multipath
4.2.5.7. Cpipe Network Latency Measurement
4.2.5.8. RTP Header
4.2.5.9. Control Word
4.2.6. Transparent SDH/SONET Over Packet (TSoP)
4.2.7. Error Situations
4.3. Ethernet VLL (Epipe) Services
4.3.1. Epipe Service Overview
4.3.2. Ethernet Access Egress Queuing and Scheduling
4.3.3. Ethernet SAP-to-SAP
4.3.4. Epipe with ATM SAPs
4.3.5. MEF 8
4.3.5.1. Epipe Service Modes
4.3.6. Ethernet OAM
4.3.7. Control Word
4.3.8. MTU
4.3.9. Raw and Tagged Modes
4.3.9.1. Raw Mode
4.3.9.2. Tagged Mode
4.3.9.3. VLAN Translation
4.3.9.4. Tagging Rules for Epipe
4.3.10. IP Filters (Epipe)
4.3.11. MPLS Entropy Label
4.3.12. Security Zones and Epipes
4.4. Frame Relay VLL (Fpipe) Services
4.4.1. Fpipe Service Overview
4.4.2. Frame Relay SAP-to-SAP Service
4.4.3. Frame Relay Traffic Management
4.4.3.1. Ingress SAP Classification and Marking
4.4.4. Frame Relay Encapsulation
4.4.4.1. Frame Relay PW Control Word
4.4.5. Status Signaling and OAM Propagation
4.5. HDLC VLL (Hpipe) Services
4.5.1. Hpipe Service Overview
4.5.2. HDLC VLL for End-to-End HDLC Service
4.5.3. HDLC SAP-to-SAP Service
4.5.4. HDLC Encapsulation
4.5.4.1. HDLC PW Control Word and Payload Size
4.5.5. Status Signaling
4.5.5.1. OAM Propagation
4.6. IP Interworking VLL (Ipipe) Services
4.6.1. Ipipe Service Overview
4.6.2. IP Interworking VLL Datapath
4.6.3. CE IP Address Discovery and Distribution
4.6.3.1. Manual IP Configuration
4.6.3.2. CE IP Address Discovery Using ARP
4.6.3.3. CE IP Address Discovery for Frame Relay
4.6.3.4. CE IP Address Discovery for cHDLC
4.6.3.5. CE IP Address Discovery for PPP/MLPPP
4.6.3.6. CE IP Address Distribution to Remote PE Nodes
4.6.4. IP SAP-to-SAP Service
4.6.5. Hardware Support for Interworking IP PWs
4.6.6. Control Word
4.6.7. Termination at Access
4.6.7.1. PPP and MLPPP Termination
4.6.7.2. FR Termination
4.6.7.3. cHDLC Termination
4.6.7.4. PPP and MLPPP Termination on 2-port OC3/STM1 Channelized Adapter Cards
4.6.8. Traffic Management
4.6.8.1. Traffic Management for FR IW SAPs
4.6.9. Status Signaling
4.6.9.1. FR LMI
4.6.10. IP Filters (Ipipe)
4.7. Pseudowire Switching
4.7.1. Overview
4.7.2. Pseudowire Switching with Pseudowire Redundancy
4.7.3. Pseudowire Switching Behavior
4.7.3.1. Pseudowire Switching With IP Tunnels
4.7.4. Pseudowire Switching TLV
4.8. VLL Service Considerations
4.8.1. Service Support
4.8.2. SDPs
4.8.2.1. SDP Statistics for VLL Services
4.8.3. SAP Encapsulations and Pseudowire Types
4.8.4. ATM PWE3 N-to-1 Cell Mode Encapsulation
4.8.4.1. N-to-1 Cell Mode Encapsulation (N = 1)
4.8.4.1.1. Deployment Scenario for N = 1 Cell Mode Encapsulation
4.8.4.1.2. VPI/VCI Translation (N = 1)
4.8.4.1.3. Cell Concatenation (N = 1)
4.8.4.1.4. QoS and Traffic Descriptor Profiles (N = 1)
4.8.4.1.5. OAM (N = 1)
4.8.4.2. N-to-1 Cell Mode Encapsulation (N > 1)
4.8.4.2.1. Deployment Scenario for N > 1 Cell Mode Encapsulation
4.8.4.2.2. PW Optimization (N > 1)
4.8.4.2.3. Overhead Optimization (N > 1)
4.8.4.2.4. Cell Concatenation (N > 1)
4.8.4.2.5. OAM (N > 1)
4.8.4.2.6. Hardware Support for N > 1 Cell Mode Encapsulation
4.8.4.2.7. SAP Support for N > 1
4.8.5. SAP Aggregation Groups
4.8.5.1. Configuration
4.8.5.1.1. Sap-aggregation-group Keyword
4.8.5.1.2. Sap-aggregation-group Group Identifier
4.8.5.1.3. VPI/VCI Translation for SAP Aggregation Group Members (N>1)
4.8.5.2. QoS and Traffic Descriptor Profiles (N > 1)
4.8.5.3. Statistics and Counters
4.8.5.4. Fault Management
4.8.6. QoS Policies
4.8.7. IP Filter Policies
4.8.8. MTU Settings
4.8.8.1. Targeted LDP and MTU
4.8.9. QinQ (VLL Service)
4.8.10. Pseudowire Control Word
4.8.11. Pseudowire Redundancy
4.8.11.1. PW Redundancy Operation
4.8.11.2. Selecting the Active Spoke SDP for PW Redundancy Configuration
4.8.11.2.1. Primary and Secondary Spoke SDPs
4.8.11.2.2. Secondary Spoke SDPs Only
4.8.11.3. PW Redundancy and Inter-Chassis Backup
4.8.11.4. AIS Fault Propagation
4.8.12. Active/Standby Mode for Pseudowire Redundancy (Standby Signaling)
4.8.12.1. PW Status Signaling Label Withdrawal Option
4.8.12.1.1. Interoperation with PEs that do not Support the PW Forwarding Standby Bit
4.8.12.1.2. Multiple Remote PEs Connected to an r-VPLS Instance Via Spoke-SDP Termination
4.8.12.2. Pseudowire Redundancy on Serial Data Interface Ports
4.9. Configuring a VLL Service with CLI
4.10. Common Configuration Tasks
4.11. Configuring VLL Components
4.11.1. Creating an Apipe Service
4.11.1.1. Configuring Apipe SAP Parameters
4.11.1.2. Configuring Apipe SDP Bindings
4.11.1.3. Configuring Apipe SAP Aggregation Groups
4.11.1.4. Configuring Apipe SAPs as Aggregation Group Members
4.11.2. Creating a Cpipe Service
4.11.2.1. Configuring Cpipe SAP Parameters
4.11.2.2. Configuring Cpipe SDP Bindings
4.11.3. Creating an Epipe Service
4.11.3.1. Configuring Epipe SAP Parameters
4.11.3.2. Configuring Epipe with ATM SAP
4.11.3.3. Configuring Epipe SAP MEF 8 Parameters
4.11.3.4. Configuring Epipe SAP Microwave Link Parameters for Interworking with TDM2Ethernet
4.11.3.5. Configuring ATM Encapsulation Under Epipe Service (7705 SAR-M only)
4.11.3.6. Configuring Epipe Spoke SDP Bindings
4.11.3.7. Configuring a Security Zone Within an Epipe
4.11.4. Creating an Fpipe Service
4.11.4.1. Configuring Fpipe SAP Parameters
4.11.4.2. Configuring Fpipe SDP Bindings
4.11.5. Creating an Hpipe Service
4.11.5.1. Configuring Hpipe SAP Parameters
4.11.5.2. Configuring Hpipe SDP Bindings
4.11.6. Creating an Ipipe Service
4.11.6.1. Configuring Ipipe SAP Parameters
4.11.6.2. Configuring Ipipe SDP Bindings
4.11.7. Configuring PW Switching
4.11.8. Configuring Ingress and Egress SAP Parameters
4.11.9. Using the Control Word
4.11.10. Configuring PW Redundancy
4.11.10.1. Configuring PW Redundancy—Standby Signaling
4.11.10.2. Configuring PW Redundancy—ICB
4.12. Service Management Tasks
4.12.1. Modifying Service Parameters
4.12.2. Disabling a Service
4.12.3. Re-enabling a Service
4.12.4. Deleting a Service
4.13. VLL Services Command Reference
4.13.1. Command Hierarchies
4.13.1.1. VLL Services Configuration Commands
4.13.1.1.1. Apipe Service Configuration Commands
4.13.1.1.2. Apipe Service with SAP Aggregation Configuration Commands
4.13.1.1.3. Cpipe Service Configuration Commands
4.13.1.1.4. Epipe Service Configuration Commands
4.13.1.1.5. Epipe Security Configuration Commands
4.13.1.1.6. Fpipe Service Configuration Commands
4.13.1.1.7. Hpipe Service Configuration Commands
4.13.1.1.8. Ipipe Service Configuration Commands
4.13.1.2. Show Commands
4.13.1.3. Clear Commands
4.13.2. Command Descriptions
4.13.2.1. VLL Service Configuration Commands
4.13.2.1.1. Generic Commands
4.13.2.1.2. VLL Global Commands
4.13.2.1.3. VLL SAP Commands
4.13.2.1.4. SAP Aggregation Group Commands
4.13.2.1.5. SAP cem Commands
4.13.2.1.6. SAP QoS and IP Filter Policy Commands
4.13.2.1.7. SAP Microwave Link Commands
4.13.2.1.8. Service Billing Commands
4.13.2.1.9. VLL SDP Commands
4.13.2.1.10. SDP Cell Concatenation Commands
4.13.2.1.11. ATM Commands
4.13.2.1.12. Epipe Security Configuration Commands
4.13.2.2. Show Commands
4.13.2.3. Clear Commands
5. VPLS
5.1. VPLS Overview
5.1.1. VPLS Packet Walkthrough
5.1.2. Bridged Mobile Backhaul
5.1.3. Multi-Tenant Unit (MTU) Termination
5.2. VPLS Features
5.2.1. VPLS Enhancements
5.2.2. Fabric Mode
5.2.3. Subscriber VLAN
5.2.4. ATM Encapsulated Residential SAP
5.2.5. VPLS over MPLS
5.2.6. VPLS MAC Learning and Packet Forwarding
5.2.7. Pseudowire Control Word
5.2.8. Agent Circuit ID Insertion
5.2.9. MAC Filters
5.2.10. FDB Table Management
5.2.10.1. FDB Size
5.2.10.2. FDB Size Alarms
5.2.10.3. Local and Remote Aging Timers
5.2.10.3.1. Disable MAC Aging
5.2.10.3.2. Disable MAC Learning
5.2.10.4. Unknown MAC Discard
5.2.11. VPLS and Rate Limiting Via QoS Policy
5.2.12. MAC Move
5.2.13. Split Horizon Groups (SAP and Spoke SDP)
5.2.13.1. Residential Split Horizon Groups
5.2.14. Multicast for VPLS and Routed VPLS (IGMP and MLD Snooping)
5.2.14.1. Application Examples
5.2.14.2. Group and Addressing Support
5.2.14.2.1. IPv4 Multicast Support
5.2.14.2.2. IPv6 Layer 2 Multicast Support and Group Address
5.2.14.3. IP Multicast in r-VPLS
5.2.14.3.1. IPv6 Multicast Forwarding Behavior in r-VPLS
5.2.14.4. Multicast Router Ports
5.2.14.5. Tagged Access Traffic
5.2.14.6. Hardware Support
5.2.15. PIM Snooping for VPLS
5.2.15.1. Snooping versus Proxy Mode
5.2.16. MPLS Entropy Label
5.2.17. Ethernet OAM
5.2.18. Security Zones and VPLS
5.3. Routed VPLS
5.3.1. IES or VPRN IP Interface Binding
5.3.1.1. Assigning a Service Name to a VPLS Service
5.3.1.2. Binding a Service Name to an IP Interface
5.3.1.3. Removing a Bound VPLS Service or Service Name
5.3.1.4. IP Interface and VPLS Operational State Coordination
5.3.2. IP Interface MTU and Fragmentation
5.3.3. ARP/ND and VPLS FIB Interactions
5.3.3.1. Routed VPLS Specific ARP/ND Cache Behavior
5.3.4. The allow-ip-int-binding VPLS Flag
5.3.4.1. VPLS Feature Restrictions (due to allow-ip-int-binding)
5.3.5. DSCP Marking
5.3.6. VPLS Ingress IP Filter Override
5.3.7. Routed VPLS Supported Routing-Related Protocols
5.4. VPLS and Spanning Tree Protocol
5.4.1. VPLS Redundancy
5.4.1.1. Spoke SDP Redundancy for Metro Interconnection
5.4.1.2. Spoke SDP-Based Redundant Access
5.4.2. VPLS Access Redundancy
5.4.2.1. STP-Based Redundant Access to VPLS
5.4.3. MAC Flush Message Processing
5.4.3.1. Dual Homing to a VPLS Service
5.5. ATM PVC Access and Termination on a VPLS Service
5.6. VPLS Service Considerations
5.6.1. SAP Encapsulations
5.6.2. VLAN Processing
5.6.2.1. Tagging Rules for VPLS
5.6.3. QinQ (VPLS)
5.7. Configuration Notes
5.8. Configuring a VPLS Service with CLI
5.9. Basic Configuration
5.10. Common Configuration Tasks
5.11. Configuring VPLS Components
5.11.1. Creating a VPLS Service
5.11.2. Creating a Split Horizon Group
5.11.3. Enabling MAC Move
5.11.4. Configuring STP Bridge Parameters in a VPLS
5.11.4.1. Bridge STP Admin State
5.11.4.2. Mode
5.11.4.3. Bridge Priority
5.11.4.4. Hello Time
5.11.4.5. Hold Count
5.12. Configuring a VPLS SAP
5.12.1. Local VPLS SAPs
5.12.2. Distributed VPLS SAPs
5.12.3. Configuring SAP-Specific STP Parameters
5.12.3.1. SAP STP Administrative State
5.12.3.2. SAP Virtual Port Number
5.12.3.3. SAP Priority
5.12.3.4. SAP Path Cost
5.12.3.5. SAP Edge Port
5.12.3.6. SAP Auto Edge
5.12.3.7. SAP Link Type
5.12.4. STP SAP Operational States
5.12.4.1. Operationally Disabled
5.12.4.2. Operationally Discarding
5.12.4.3. Operationally Learning
5.12.4.4. Operationally Forwarding
5.12.5. Configuring VPLS SAPs with Split Horizon
5.13. Configuring SDP Bindings
5.13.1. Configuring Mesh SDP Bindings
5.13.2. Configuring Spoke SDPs
5.13.2.1. Configuring Spoke SDP Bindings
5.13.2.2. Configuring Spoke SDP-Specific STP Parameters
5.13.2.2.1. Spoke SDP STP Administrative State
5.13.2.2.2. Spoke SDP Virtual Port Number
5.13.2.2.3. Spoke SDP Priority
5.13.2.2.4. Spoke SDP Path Cost
5.13.2.2.5. Spoke SDP Edge Port
5.13.2.2.6. Spoke SDP Auto Edge
5.13.2.2.7. Spoke SDP Link Type
5.13.3. Configuring VPLS Spoke SDPs with Split Horizon
5.13.4. Configuring Selective MAC Flush
5.14. Configuring Routed VPLS
5.15. Configuring IP Multicast in VPLS
5.16. Configuring IP Multicast in r-VPLS
5.17. Configuring Multicast Parameters for VPLS and r-VPLS
5.18. Configuring a Static Multicast Group
5.19. Configuring PIM Snooping for VPLS
5.20. Configuring a Security Zone Within a VPLS
5.21. Service Management Tasks
5.21.1. Modifying VPLS Service Parameters
5.21.2. Modifying Management VPLS Parameters
5.21.3. Deleting a Management VPLS
5.21.4. Disabling a Management VPLS
5.21.5. Deleting a VPLS Service
5.21.6. Disabling a VPLS Service
5.21.7. Re-enabling a VPLS Service
5.22. VPLS Command Reference
5.22.1. Command Hierarchies
5.22.1.1. VPLS Service Configuration Commands
5.22.1.1.1. Global Commands
5.22.1.1.2. SAP Commands
5.22.1.1.3. Mesh SDP Commands
5.22.1.1.4. Spoke SDP Commands
5.22.1.1.5. Routed VPLS Commands
5.22.1.1.6. VPLS Security Configuration Commands
5.22.1.2. Show Commands
5.22.1.3. Clear Commands
5.22.1.4. Debug Commands
5.22.2. Command Descriptions
5.22.2.1. VPLS Service Configuration Commands
5.22.2.1.1. Generic Commands
5.22.2.1.2. VPLS Service Commands
5.22.2.1.3. VPLS SAP Commands
5.22.2.1.4. VPLS SAP ATM Commands
5.22.2.1.5. VPLS IGMP and MLD Snooping Commands
5.22.2.1.6. VPLS STP Commands
5.22.2.1.7. VPLS Filter and QoS Policy Commands
5.22.2.1.8. Service Billing Commands
5.22.2.1.9. VPLS SAP DHCP Commands
5.22.2.1.10. VPLS SDP Commands
5.22.2.2. Routed VPLS Configuration Commands
5.22.2.3. VPLS Security Configuration Commands
5.22.2.4. VPLS Show Commands
5.22.2.5. VPLS Clear Commands
5.22.2.6. VPLS Debug Commands
6. Internet Enhanced Service
6.1. IES for In-band Management
6.1.1. Setting Up Connections Between the NSP NFM-P and the 7705 SAR
6.1.2. Encapsulation
6.1.3. Layer 2 and Layer 3 Traffic Management
6.1.4. Troubleshooting and Fault Detection Services
6.1.5. IP ECMP Load Balancing
6.2. IES for Customer Traffic
6.2.1. DHCP Relay and DHCPv6 Relay
6.2.1.1. DHCP Relay
6.2.1.1.1. DHCP Options
6.2.1.2. DHCPv6 Relay
6.2.1.2.1. DHCPv6 Options
6.2.2. IPCP
6.2.3. IPSec Support
6.2.4. Security Zones and IES
6.2.5. Proxy ARP
6.2.6. Configurable ARP Retry Timer
6.2.7. Unnumbered Interfaces
6.2.8. Troubleshooting and Fault Detection Services
6.2.9. VRRP on IES Interfaces
6.2.10. SAPs
6.2.10.1. Encapsulations
6.2.10.2. Routing Protocols
6.2.10.3. QoS Policies
6.2.10.4. QinQ (IES)
6.2.10.5. IP Filter Policies on an IES SAP
6.2.11. Spoke SDP Termination to IES
6.2.12. Bandwidth Optimization for Low-speed Links
6.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
6.2.13. Hold Up and Hold Down Timers for IP Interfaces
6.3. Configuring IES with CLI
6.4. Common Configuration Tasks
6.5. Configuring IES Components
6.5.1. Creating an IES Service
6.5.2. Configuring IES Interface Parameters
6.5.2.1. IES Management Service
6.5.2.2. IES Service
6.5.2.3. IES IPv6 Service
6.5.3. Configuring IES SAP Parameters
6.5.3.1. IES Management SAP
6.5.3.2. IES Service SAP
6.5.4. Configuring IES Spoke SDP Parameters
6.5.5. Configuring VRRP
6.5.6. Configuring a Security Zone Within IES
6.5.7. Configuring Serial Raw Socket Transport Within IES
6.6. Service Management Tasks
6.6.1. Modifying IES Service Parameters
6.6.2. Disabling an IES Service
6.6.3. Re-enabling an IES Service
6.6.4. Deleting an IES Service
6.7. IES Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Configuration Commands
6.7.1.1.1. IES Management Configuration Commands
6.7.1.1.2. IES Service Configuration Commands
6.7.1.1.3. Routed VPLS Commands
6.7.1.1.4. VRRP Commands
6.7.1.1.5. IES Security Zone Configuration Commands
6.7.1.1.6. IES Raw Socket IP Transport Configuration Commands
6.7.1.2. Show Commands
6.7.1.3. Clear Commands
6.7.1.4. Debug Commands
6.7.2. Command Descriptions
6.7.2.1. IES Generic Configuration Commands
6.7.2.2. IES Global Configuration Commands
6.7.2.3. IES Management Configuration Commands
6.7.2.3.1. IES Management Interface Commands
6.7.2.3.2. IES Management SAP Commands
6.7.2.4. IES Service Configuration Commands
6.7.2.4.1. IES Service Interface Commands
6.7.2.4.2. IES Service IPv6 Commands
6.7.2.4.3. IES Service VRRP Commands
6.7.2.4.4. IES Service SAP Commands
6.7.2.4.5. IES Service Spoke SDP Commands
6.7.2.4.6. Routed VPLS Commands
6.7.2.4.7. IES Service Security Zone Configuration Commands
6.7.2.4.8. IES Raw Socket IP Transport Configuration Commands
6.7.2.5. Show Commands
6.7.2.6. Clear Commands
6.7.2.7. Debug Commands
7. VPRN Services
7.1. VPRN Service Overview
7.1.1. Routing Prerequisites
7.1.2. BGP Support
7.1.2.1. BGP Fast Reroute with Prefix-Independent Convergence in a VPRN
7.1.2.2. BGP Next-Hop Resolution and Peer Tracking
7.1.3. IPSec Support
7.1.4. Security Zones and VPRN
7.1.5. Static One-to-One NAT and VPRN
7.1.6. Unicast and Multicast Address Translation
7.1.7. Route Distinguishers
7.1.7.1. PE-to-CE Route Exchange
7.1.7.1.1. Route Redistribution
7.1.7.1.2. CPE Connectivity Check
7.1.8. Route Target Constraint
7.1.8.1. Configuring the Route Target Address Family
7.1.8.2. Originating RTC Routes
7.1.8.3. Receiving and Readvertising RTC Routes
7.1.8.4. Using RTC Routes
7.1.9. In-Band Management using a VPRN
7.2. VPRN Features
7.2.1. IP Interfaces
7.2.1.1. Unnumbered Interfaces
7.2.1.2. DHCP and DHCPv6
7.2.1.2.1. DHCP Relay and DHCPv6 Relay
7.2.1.2.2. Local DHCP and DHCPv6 Server
7.2.1.3. IPCP
7.2.1.4. Troubleshooting and Fault Detection Services
7.2.1.5. VRRP on VPRN Interfaces
7.2.1.6. IP ECMP Load Balancing
7.2.1.7. Proxy ARP
7.2.1.8. Configurable ARP Retry Timer
7.2.1.9. Hold Up and Hold Down Timers for IP Interfaces
7.2.2. SAPs
7.2.2.1. Encapsulations
7.2.2.2. QoS Policies
7.2.2.2.1. CoS Marking for Self-generated Traffic
7.2.2.3. QinQ (VPRN)
7.2.2.4. Filter Policies on a VPRN SAP
7.2.3. PE-to-CE Routing Protocols
7.2.3.1. Using OSPF or OSPFv3 in IP VPNs
7.2.3.1.1. DN Bit
7.2.3.2. TTL Security
7.2.4. PE-to-PE Tunneling Mechanisms
7.2.5. Per-VRF Route Limiting
7.2.6. RIP Metric Propagation in VPRNs
7.2.7. Multicast VPN (MVPN)
7.2.7.1. Multicast in IP-VPN Applications
7.2.7.2. MVPN Building Blocks
7.2.7.2.1. PMSI
7.2.7.2.2. MVPN Using BGP Control Plane
7.2.7.2.3. Auto-Discovery
7.2.7.2.4. PE-CE Multicast Protocols and Services
7.2.7.2.5. PE-PE Transmission of C-Multicast Routing Using BGP
7.2.7.2.6. PE-PE Multicast Protocols
7.2.7.2.7. PE-PE Multicast Data Transmission
7.2.7.3. Provider Tunnel Support
7.2.7.3.1. Point-to-Multipoint I-PMSI and S-PMSI
7.2.7.3.2. Point-to-Multipoint LDP I-PMSI and S-PMSI
7.2.7.3.3. Point-to-Multipoint LSP S-PMSI
7.2.7.3.4. MVPN Sender-only and Receiver-only
7.2.7.4. Inter-AS and Intra-AS Solutions
7.2.7.4.1. 7705 SAR as Source of Non-Segmented Inter-AS or Intra-AS Network
7.2.7.5. NG-MVPN Non-segmented Inter-AS Solution
7.2.7.5.1. Non-Segmented Inter-AS VPN Option C Support
7.2.7.5.2. Configuration Example
7.2.7.5.3. Inter-AS Non-segmented mLDP
7.2.7.5.4. ECMP
7.2.7.6. Mrinfo and Mtrace
7.2.7.7. Multicast-only Fast Reroute (MoFRR)
7.2.7.8. mLDP Point-to-Multipoint Support
7.2.7.9. mLDP Fast Upstream Switchover
7.2.7.10. Multicast Source Discovery Protocol
7.2.8. VPRN Auto-binding Tunnels
7.2.9. Spoke SDPs
7.2.10. Spoke SDP Termination to VPRN
7.2.11. IPv6 on Virtual Private Edge Router
7.2.12. IPv6 over IPv4 LAN-to-LAN IPSec Tunnels
7.2.13. Bandwidth Optimization for Low-speed Links
7.2.13.1. OAM Diagnostics Restrictions with Lower IP MTU
7.2.14. Support for NTP
7.3. Configuring a VPRN Service with CLI
7.4. Basic Configuration
7.5. Common Configuration Tasks
7.6. Configuring VPRN Components
7.6.1. Creating a VPRN Service
7.6.2. Configuring Global VPRN Parameters
7.6.3. Configuring Router Interfaces
7.6.4. Configuring Static Route Entries for VPRN
7.6.5. Configuring BGP for VPRN
7.6.5.1. Configuring VPRN BGP Group and Neighbor Parameters
7.6.5.2. Configuring Route Reflection
7.6.5.3. VPRN BGP CLI Syntax
7.6.6. Configuring IPv6 Parameters for VPRN BGP
7.6.7. Configuring VPRN IPv6 Neighbor Discovery Parameters
7.6.8. Configuring OSPF or OSPFv3 for VPRN
7.6.9. Configuring RIP for VPRN
7.6.10. Configuring IGMP for VPRN
7.6.11. Configuring PIM for VPRN
7.6.12. Configuring MVPN for VPRN
7.6.13. Configuring a VPRN Interface
7.6.14. Configuring a VPRN IPv6 Interface
7.6.15. Configuring VPRN Interface Routed VPLS IPv6 Parameters
7.6.16. Configuring VPRN Interface SAP Parameters
7.6.17. Configuring VPRN Interface SAP IPv6 Parameters
7.6.18. Configuring VPRN Interface Spoke SDP Parameters
7.6.19. Configuring VPRN Interface Spoke SDP IPv6 Parameters
7.6.20. Configuring VRRP
7.6.21. Configuring a Security Zone Within a VPRN
7.6.22. Configuring Serial Raw Socket Transport Within VPRN
7.6.23. Configuring VPRN Router Advertisement
7.7. Service Management Tasks
7.7.1. Modifying VPRN Service Parameters
7.7.2. Deleting a VPRN Service
7.7.3. Disabling a VPRN Service
7.7.4. Re-enabling a VPRN Service
7.8. VPRN Services Command Reference
7.8.1. Command Hierarchies
7.8.1.1. Configuration Commands
7.8.1.1.1. VPRN Service Configuration Commands
7.8.1.1.2. BGP Commands
7.8.1.1.3. OSPF Commands
7.8.1.1.4. OSPFv3 Commands
7.8.1.1.5. IGMP Commands
7.8.1.1.6. PIM Commands
7.8.1.1.7. RIP Commands
7.8.1.1.8. VPRN Security Zone Configuration Commands
7.8.1.1.9. VPRN Raw Socket IP Transport Configuration Commands
7.8.1.1.10. Multicast VPN Commands
7.8.1.1.11. MSDP Commands
7.8.1.1.12. Router Advertisement Commands
7.8.1.1.13. Local DHCP and DHCPv6 Server Commands
7.8.1.1.14. Interface Commands
7.8.1.1.15. IPv6 Interface Commands
7.8.1.1.16. Interface DHCP Commands
7.8.1.1.17. Interface ICMP Commands
7.8.1.1.18. Interface SAP IPSec-Tunnel Commands
7.8.1.1.19. Routed VPLS Commands
7.8.1.1.20. Interface VRRP Commands
7.8.1.1.21. VPRN Static One-to-One NAT Configuration Commands
7.8.1.1.22. TWAMP Light Commands
7.8.1.1.23. VPRN NTP Commands
7.8.1.2. Show Commands
7.8.1.3. Clear Commands
7.8.1.4. Debug Commands
7.8.2. Command Descriptions
7.8.2.1. VPRN Service Configuration Commands
7.8.2.1.1. Generic Commands
7.8.2.1.2. Global Commands
7.8.2.1.3. BGP Commands
7.8.2.1.4. OSPF and OSPFv3 Commands
7.8.2.1.5. IGMP Commands
7.8.2.1.6. PIM Commands
7.8.2.1.7. RIP Commands
7.8.2.1.8. VPRN Security Configuration Commands
7.8.2.1.9. VPRN Raw Socket IP Transport Configuration Commands
7.8.2.1.10. Multicast VPN Commands
7.8.2.1.11. MSDP Commands
7.8.2.1.12. Router Advertisement Commands
7.8.2.1.13. Local DHCP and DHCPv6 Server Commands
7.8.2.1.14. Interface Commands
7.8.2.1.15. IPv6 Interface Commands
7.8.2.1.16. Interface DHCP Commands
7.8.2.1.17. Interface ICMP Commands
7.8.2.1.18. Interface SAP Commands
7.8.2.1.19. Interface Spoke SDP Commands
7.8.2.1.20. Routed VPLS Commands
7.8.2.1.21. Interface VRRP Commands
7.8.2.1.22. VPRN Static One-to-One NAT Configuration Commands
7.8.2.1.23. TWAMP Light Commands
7.8.2.1.24. VPRN NTP Commands
7.8.2.2. Show Service Commands
7.8.2.3. Show Router Commands
7.8.2.4. Clear Service Commands
7.8.2.5. Debug MSDP Commands
7.8.2.6. Debug Service Commands
8. IPSec
8.1. IPSec Overview
8.1.1. IPSec Implementation
8.1.1.1. IPSec Overview
8.1.1.2. Hardware Support
8.1.1.3. IPSec Encryption Features
8.1.1.4. SHA2 Support
8.1.1.5. IPSec Security Policy, IKE Policy, and IPSec Transform
8.1.1.6. IKEv2 Fragmentation
8.1.1.7. Tunnel Group
8.1.1.8. Tunnel Interfaces and SAPs
8.1.1.8.1. Public Tunnel SAPs
8.1.1.8.2. Private Tunnel SAPs
8.1.1.8.3. IP Interface Configuration
8.1.1.9. IPSec Tunnel Configuration
8.1.1.10. IPSec over MPLS with Public Service IES
8.1.1.11. IPSec Transport Tunnels with Public Service VPRN
8.1.1.12. GRE-Encapsulated VLLs/VPLS over IPSec VPNs
8.1.1.13. GRE-Encapsulated VLLs/VPLS over IPSec over MPLS
8.1.1.13.1. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 Label Routes) Solution 1: Changing BGP Signaling to Loopback Interface
8.1.1.13.2. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 label Routes) Solution 2: GRE to Local Interface on 7705 SAR
8.1.1.13.3. VLLs/VPLS over IPSec over MPLS (Using IGP Shortcuts)
8.1.2. X.509v3 Certificate Overview
8.1.2.1. X.509v3 Certificate Support on the 7705 SAR
8.1.2.2. Local Storage
8.1.2.3. CA Profile
8.1.2.4. CA Chain Computation
8.1.2.5. Certificate Enrollment
8.1.2.6. Certificate Revocation Check
8.1.2.7. Certificate, CRL, and Key Cache
8.1.3. Using Certificates For IPSec Tunnel Authentication
8.1.4. Trust Anchor Profile
8.1.5. Certificate Profile
8.1.6. Certificate Management Protocol Version 2 (CMPv2)
8.1.7. OCSP
8.1.8. Applications
8.1.8.1. Metrocell Deployment
8.1.8.2. Small Business Deployment
8.1.9. NAT-Traversal for IKEv1/v2 and IPSec
8.1.10. BFD over IPSec Tunnel
8.1.11. QoS for IPSec
8.1.11.1. Network and Access Ingress QoS (Decryption QoS)
8.1.11.1.1. Network Ingress QoS Tunnel Override
8.1.11.2. Network and Access Egress QoS (Encryption QoS)
8.1.12. Fragmentation and IP MTU
8.1.12.1. Fragmentation Configuration
8.1.12.2. Reassembly
8.1.13. Support for Private VPRN Service Features
8.1.14. Routing in Private Services
8.1.15. IPSec on the 10-port 1GigE/1-port 10GigE X-Adapter Card
8.1.16. IPSec Sequence Number
8.1.17. PBR and MFC
8.1.17.1. PBR
8.1.17.2. MFC
8.1.18. OSPFv3 Packet Authentication with IPv6 IPSec
8.1.19. Network Security with IPv6 IPSec
8.1.20. IPSec Over r-VPLS on a Public Service
8.1.21. Statistics
8.1.22. Security Support
8.2. Public Key Infrastructure (PKI)
8.2.1. CA Role in PKI
8.2.2. Digital Signature and Certificates
8.2.2.1. Certificates
8.2.2.1.1. Vendor Certificate Signature by the Root CA
8.2.2.1.2. Vendor Certificate Authentication by a Peer
8.2.2.1.3. Example of PKI Operation
8.2.2.1.4. Certificate Chain
8.2.3. Certificate Storage
8.2.4. CMPv2 Certificate Management
8.2.4.1. CMPv2 Initial Registration
8.2.4.2. Key Update
8.2.4.3. CRL
8.2.5. OCSP
8.2.6. Certificate or CRL Expiration Warning
8.2.7. Automatic CRL Update
8.3. Best Practices Recommendations
8.3.1. IPSec Best Practices
8.4. Configuration Notes
8.5. Configuring IPSec with CLI
8.6. Basic Configuration Overview
8.7. Common Configuration Tasks
8.7.1. Configuring an IPSec Tunnel Group
8.7.2. Configuring Router Interfaces for IPSec
8.7.3. Configuring IPSec Parameters
8.7.4. Configuring IPSec and IPSec Tunnels in Services
8.7.5. Configuring IPSec IPv6 Parameters for a VPRN Private Service
8.7.6. Configuring X.509v3 Certificate Parameters
8.7.7. Configuring CMPv2
8.7.8. Configuring OCSP
8.8. Configuring IPSec over MPLS
8.8.1. IPSec over BGP 3107 Label Route
8.8.1.1. Static LAN-to-LAN Tunnel Configuration
8.8.1.2. Policy Option Configuration
8.8.1.3. BGP Configuration with BGP 3107 Label Route Advertisement
8.8.1.4. LDP or RSVP-TE Tunnel Configuration
8.8.2. IPSec over IGP Shortcut
8.8.2.1. Static LAN-to-LAN Tunnel Configuration
8.8.2.2. IGP Shortcut Configuration
8.8.2.3. RSVP-TE LSP Configuration
8.9. Service Management Tasks
8.9.1. Deleting an IPSec IKE Policy or an IPSec Transform
8.9.2. Deleting a Public-Side IPSec Tunnel SAP and Interface
8.9.3. Deleting a Private-Side IPSec Tunnel SAP and Interface
8.9.4. Deleting an IPSec Security Policy
8.9.5. Deleting an IPSec Tunnel
8.10. IPSec Command Reference
8.10.1. Command Hierarchies
8.10.1.1. IPSec Configuration Commands
8.10.1.1.1. ISA Tunnel Commands
8.10.1.1.2. IPSec Commands
8.10.1.1.3. Service Configuration Commands
8.10.1.1.4. Service Interface Tunnel Commands
8.10.1.1.5. Service Static Route Commands
8.10.1.2. PKI Configuration Commands
8.10.1.2.1. X.509 and Certificate Commands
8.10.1.2.2. PKI Infrastructure Commands
8.10.1.2.3. IPSec PKI Commands
8.10.1.2.4. Automatic CRL Update Commands
8.10.1.3. Show Commands
8.10.1.4. Clear Commands
8.10.1.5. Debug Commands
8.10.2. Command Descriptions
8.10.2.1. IPSec Configuration Commands
8.10.2.1.1. Generic Commands
8.10.2.1.2. ISA Tunnel Commands
8.10.2.1.3. Internet Key Exchange (IKE) and Transform Commands
8.10.2.1.4. Service Configuration Commands
8.10.2.1.5. Service Interface Tunnel Commands
8.10.2.2. PKI Configuration Commands
8.10.2.2.1. X.509 and Certificate Commands
8.10.2.2.2. PKI Infrastructure Commands
8.10.2.2.3. IPSec PKI Commands
8.10.2.2.4. Automatic CRL Update Commands
8.10.2.3. Show Commands
8.10.2.4. Clear Commands
8.10.2.5. Debug Commands
9. Network Group Encryption
9.1. NGE Overview
9.1.1. NGE Key Groups and Encryption Partitions
9.1.2. NGE Domains
9.1.2.1. Private IP/MPLS Network NGE Domain
9.1.2.2. Private Over Intermediary Network NGE Domain
9.1.3. Network Services Platform Management
9.2. Key Groups
9.2.1. Key Group Algorithms
9.2.1.1. Encapsulating Security Payload (ESP)
9.2.2. Security Associations (SAs)
9.2.2.1. Active Outbound SA
9.3. Services Encryption
9.3.1. Services Encryption Overview
9.3.2. Assigning Key Groups to Services
9.3.3. Pseudowire Switching for NGE Traffic
9.3.4. Pseudowire Control Word for NGE Traffic
9.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
9.3.6. NGE and RFC 3107
9.3.7. NGE for NG-MVPN
9.4. Router Interface Encryption
9.4.1. Router Interface NGE Domain Concepts
9.4.2. GRE-MPLS Packets Inside the NGE Domain
9.4.3. Router Encryption Exceptions using ACLs
9.4.4. IPSec Packets Crossing an NGE Domain
9.4.5. Multicast Packets Traversing the NGE Domain
9.4.6. Assigning Key Groups to Router Interfaces
9.4.7. Router Interface NGE Firewall Considerations
9.4.8. NGE and BFD Support
9.4.9. NGE and ACL Interactions
9.4.10. Router Interface NGE and ICMP Interactions Over the NGE Domain
9.4.11. OAM Considerations for Router Interface Encryption
9.5. Layer 2 Encryption
9.6. NGE Packet Overhead and MTU Considerations
9.6.1. GRE Fragmentation for NGE Packets
9.7. 1588v2 Encryption With NGE
9.8. QoS for NGE Traffic
9.8.1. Network Ingress
9.8.2. Network Egress
9.9. Statistics
9.10. Remote Network Monitoring (RMON) Support
9.11. Configuration Notes
9.12. Configuring NGE with the CLI
9.13. Basic NGE Configuration Overview
9.14. Configuring NGE Components
9.14.1. Configuring the Global Encryption Label
9.14.2. Configuring a Key Group
9.14.3. Assigning a Key Group to an SDP or VPRN Service
9.14.4. Assigning a Key Group to a Router Interface
9.14.5. Assigning a Key Group to an Ethernet Port
9.15. NGE Management Tasks
9.15.1. Modifying a Key Group
9.15.2. Removing a Key Group
9.15.2.1. Removing a Key Group from an SDP or VPRN Service
9.15.2.2. Removing a Key Group from a Router Interface
9.15.2.3. Removing a Key Group from an Ethernet Port
9.15.3. Changing Key Groups
9.15.3.1. Changing the Key Group for an SDP or VPRN Service
9.15.3.2. Changing the Key Group for a Router Interface
9.15.3.3. Changing the Key Group for an Ethernet Port
9.15.4. Deleting a Key Group from a 7705 SAR
9.16. NGE Command Reference
9.16.1. Command Hierarchies
9.16.1.1. Configuration Commands
9.16.1.1.1. NGE Commands
9.16.1.1.2. Services Commands
9.16.1.1.3. Router Interface Encryption Commands
9.16.1.1.4. Ethernet Port Encryption Commands
9.16.1.2. Show Commands
9.16.1.3. Clear Commands
9.16.2. Command Descriptions
9.16.2.1. Configuration Commands
9.16.2.1.1. Generic Commands
9.16.2.1.2. Group Encryption Commands
9.16.2.2. Show Commands
9.16.2.3. Clear Commands
10. Ethernet Virtual Private Networks
10.1. Overview and EVPN Applications
10.1.1. EVPN for MPLS Tunnels in E-LAN Services
10.1.2. EVPN for MPLS Tunnels in E-Line Services
10.2. EVPN for MPLS Tunnels
10.2.1. BGP-EVPN Control Plane for MPLS Tunnels
10.2.1.1. EVPN Route Type 2 – MAC/IP Advertisement Route
10.2.1.2. EVPN Route Type 3 – Inclusive Multicast Ethernet Tag Route
10.2.1.3. EVPN Route Type 1 – Ethernet Auto-Discovery Route (AD Route)
10.2.1.4. EVPN Route Type 4 – Ethernet Segment Route (ES Route)
10.2.1.5. EVPN Route Type 5 – IP Prefix Route
10.2.1.6. RFC 5512 – BGP Tunnel Encapsulation Extended Community
10.2.2. EVPN-VPLS for MPLS Tunnels
10.2.2.1. Overview
10.2.2.2. EVPN and VPLS Integration
10.2.2.3. Auto-derived Route Distinguisher (RD) in Services
10.2.2.4. EVPN Multihoming in VPLS Services
10.2.2.4.1. EVPN All-Active Multihoming
10.2.2.4.2. EVPN Single-Active Multihoming
10.2.3. EVPN-VPWS for MPLS Tunnels
10.2.3.1. BGP-EVPN Control Plane for EVPN-VPWS
10.2.3.2. EVPN for MPLS Tunnels in Epipe Services
10.2.3.3. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
10.2.3.4. EVPN Multihoming for EVPN-VPWS Services
10.2.4. EVPN for MPLS Tunnels in r-VPLS Services
10.2.4.1. Overview
10.2.4.2. EVPN-MPLS Multihoming and Passive VRRP
10.2.5. MPLS Entropy Label
10.2.6. Preference-Based and Non-Revertive Designated Forwarder Election
10.3. General EVPN Topics
10.3.1. BGP-EVPN MAC Mobility
10.3.2. BGP-EVPN MAC Duplication
10.3.3. Conditional Static MAC and Protection
10.3.4. Blackhole MAC
10.3.5. CFM Interaction with EVPN Services
10.3.6. BGP and EVPN Route Selection for EVPN Routes
10.3.7. Interaction of EVPN and Other Features
10.3.7.1. Interaction of EVPN-MPLS with Existing VPLS Features
10.3.7.2. Routing Policies for BGP-EVPN IP Prefixes
10.4. Configuring an EVPN Service With CLI
10.4.1. EVPN All-Active Multihoming Configuration Example
10.4.2. EVPN Single-Active Multihoming Configuration Example
10.4.3. EVPN-MPLS r-VPLS Configuration Examples
10.4.3.1. EVPN-MPLS r-VPLS Without Multihoming
10.4.3.2. EVPN-MPLS r-VPLS With All-Active Multihoming
10.4.3.2.1. Passive VRRP
10.4.3.2.2. Operation
10.4.3.3. EVPN-MPLS r-VPLS With Single-Active Multihoming
10.5. EVPN Command Reference
10.5.1. Command Hierarchies
10.5.1.1. EVPN Configuration Commands
10.5.1.1.1. Epipe Commands for EVPN
10.5.1.1.2. VPLS Commands for EVPN
10.5.1.1.3. Epipe and VPLS Services Related Commands for EVPN
10.5.1.1.4. VPRN Interface Commands for EVPN
10.5.1.1.5. Service System Commands for EVPN
10.5.1.1.6. Redundancy Commands for EVPN
10.5.1.1.7. Router BGP Commands for EVPN
10.5.1.2. Show Commands
10.5.2. Command Descriptions
10.5.2.1. EVPN Configuration Commands
10.5.2.1.1. BGP Commands
10.5.2.1.2. BGP-EVPN Commands
10.5.2.2. Routed VPLS EVPN Commands
10.5.2.3. EVPN Service System Commands
10.5.2.4. EVPN Redundancy Commands
10.5.2.5. Show Commands
11. List of Acronyms
12. Supported Standards and Protocols
Customer Document and Product Support
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. Technical Support
2. 7705 SAR Services Configuration Process
3. Services Overview
3.1. Introduction to Services on the 7705 SAR
3.1.1. Overview
3.1.2. Service Types
3.1.3. Service Policies
3.2. Nokia Service Model
3.3. Service Entities
3.3.1. Customers
3.3.2. Service Types
3.3.2.1. Service Names
3.3.3. Service Access Points (SAPs)
3.3.3.1. SAP Encapsulation Types and Identifiers
3.3.3.1.1. Ethernet Encapsulations
3.3.3.1.2. SONET/SDH Encapsulations
3.3.3.1.3. TDM and Serial (TDM) Encapsulations
3.3.3.1.4. Service Types and SAP Encapsulations—Summary
3.3.3.2. SAP Configuration Considerations
3.3.4. Service Destination Points (SDPs)
3.3.4.1. SDP Binding
3.3.4.2. Spoke and Mesh SDPs
3.3.4.3. SDPs and BGP Route Tunnels
3.3.4.4. SDP Encapsulation Types
3.3.4.4.1. MPLS Encapsulation
3.3.4.4.2. GRE Encapsulation
3.3.4.4.3. IP Encapsulation
3.3.4.5. Spoke SDP Terminations
3.3.4.6. SDP Ping
3.3.4.7. SDP Keepalives
3.3.4.8. Mixed-LSP SDPs
3.3.4.9. Multiple Load-balancing LSPs Under a Single SDP
3.4. High-Speed Download Packet Access Offload
3.4.1. HSDPA Offload
3.4.1.1. Failure Detection
3.5. ETH-CFM (802.1ag and Y.1731)
3.5.1. 802.1ag and Y.1731 Terminology
3.5.1.1. MDs, MD Levels, MAs, and MEPs (802.1ag)
3.5.1.2. MEG Levels, MEGs, and MEPs (Y.1731)
3.5.2. ETH-CFM Frame Format
3.5.2.1. ETH-CFM OAMPDU
3.5.2.2. CFM Frame Processing
3.5.2.2.1. Processing SAP 0 and SAP 0.* OAM Packets
3.5.2.3. MEG-ID and ICC-Based Format
3.5.3. ETH-CFM Functions and Tests
3.5.3.1. ETH-CFM Ethernet OAM Tests
3.5.3.1.1. Loopback
3.5.3.1.2. Linktrace
3.5.3.1.3. Throughput Measurement
3.5.3.1.4. Continuity Check
3.5.3.1.5. Remote Defect Indication
3.5.3.1.6. Alarm Indication Signal
3.5.3.1.7. Ethernet Test
3.5.4. MEP Support (802.1ag and Y.1731)
3.5.4.1. 802.1ag MEP Support on Ethernet SAPs
3.5.4.2. 802.1ag and Y.1731 MEP Support on Ethernet Spoke SDPs and Mesh SDPs
3.5.4.3. Y.1731 MEP Support on Ethernet SAPs
3.5.5. Priority Mapping (802.1ag and Y.1731)
3.5.5.1. Priority Mapping for SAP Up MEPs
3.5.5.2. Priority Mapping for SAP Down MEPs
3.6. G.8032 Ethernet Ring Protection Switching
3.6.1. Overview of G.8032 Operation
3.6.2. Ethernet Ring Sub-Rings
3.6.2.1. Virtual and Non-Virtual Channel
3.6.2.1.1. LAG Support
3.6.2.2. OAM Considerations
3.6.2.3. Support Service and Solution Combinations
3.7. QinQ Support
3.7.1. Overview of QinQ
3.7.2. QinQ Support with Forced C-Tag Forwarding (VPLS only)
3.7.2.1. Example 1: General QinQ Implementation
3.7.2.2. Example 2: QinQ using VPLS with Ethernet SAPs
3.7.2.3. Example 3: QinQ Using VPLS with ATM SAPs
3.7.3. QinQ Support on Ethernet Ports
3.7.3.1. Special QinQ SAP Identifiers
3.7.3.2. QinQ Dot1p Match Behavior
3.7.3.3. QinQ Top-Only Mark Option
3.7.3.4. Maximum Number of VLAN Tags
3.7.4. QinQ Configuration Overview
3.8. Raw Socket IP Transport Service
3.8.1. Remote Host Manual TCP Connection Check
3.8.2. QoS Requirements for IP Transport
3.9. Service Creation Overview
3.10. Port and SAP CLI Identifiers
3.11. Configuring Global Service Entities with CLI
3.12. Service Model Entities
3.13. Basic Configuration
3.14. Common Configuration Tasks
3.14.1. Configuring Customer Accounts
3.14.2. Configuring SDPs
3.14.2.1. Enabling IP Fragmentation for GRE SDPs
3.14.3. Configuring Service Names
3.15. ETH-CFM (802.1ag and Y.1731) Tasks
3.15.1. Configuring ETH-CFM Parameters (802.1ag and Y.1731)
3.15.2. Applying ETH-CFM Parameters
3.16. Service Management Tasks
3.16.1. Modifying Customer Accounts
3.16.2. Deleting Customers
3.16.3. Modifying SDPs
3.16.4. Deleting SDPs
3.16.5. Deleting LSP Associations
3.17. Global Service Command Reference
3.17.1. Command Hierarchies
3.17.1.1. Global Service Configuration Commands
3.17.1.1.1. Customer Commands
3.17.1.1.2. SDP Commands
3.17.1.1.3. SAP Commands
3.17.1.1.4. Ethernet Ring Commands
3.17.1.1.5. ETH-CFM Commands
3.17.1.2. Show Commands
3.17.1.3. Monitor Commands
3.17.2. Command Descriptions
3.17.2.1. Global Service Configuration Commands
3.17.2.1.1. Generic Commands
3.17.2.1.2. Customer Commands
3.17.2.1.3. SDP Commands
3.17.2.1.4. SDP Keepalive Commands
3.17.2.1.5. Ethernet Ring Commands
3.17.2.2. Show Commands
3.17.2.3. Monitor Commands
4. VLL Services
4.1. ATM VLL (Apipe) Services
4.1.1. ATM VLL for End-to-End ATM Service
4.1.2. ATM Virtual Trunk Over an IP/MPLS Packet-Switched Network
4.1.3. ATM SAP-to-SAP Service
4.1.4. ATM Traffic Management Support
4.1.4.1. Network Ingress Classification
4.1.4.2. ATM Access Egress Queuing and Shaping
4.1.5. Control Word
4.2. Circuit Emulation VLL (Cpipe) Services
4.2.1. Cpipe Service Overview
4.2.2. TDM SAP-to-SAP Service
4.2.3. Cpipe Service Modes
4.2.3.1. Unstructured Mode (SAToP)
4.2.3.2. SAToP Serial
4.2.3.2.1. SAToP Serial Payload Size
4.2.3.2.2. SAToP Serial Jitter Buffer
4.2.3.3. SAToP Teleprotection Interface
4.2.3.4. Structured Mode (CESoPSN)
4.2.4. TDM PW Encapsulation
4.2.5. Circuit Emulation Parameters and Options
4.2.5.1. Unstructured
4.2.5.2. Structured DS1/E1 CES without CAS
4.2.5.3. Structured T1/E1 CES with CAS
4.2.5.4. Packet Payload Size
4.2.5.5. Jitter Buffer
4.2.5.5.1. Configuration and Design Considerations
4.2.5.6. Asymmetric Delay Control
4.2.5.6.1. ADC for Redundant Paths
4.2.5.6.2. Active Multipath
4.2.5.7. Cpipe Network Latency Measurement
4.2.5.8. RTP Header
4.2.5.9. Control Word
4.2.6. Transparent SDH/SONET Over Packet (TSoP)
4.2.7. Error Situations
4.3. Ethernet VLL (Epipe) Services
4.3.1. Epipe Service Overview
4.3.2. Ethernet Access Egress Queuing and Scheduling
4.3.3. Ethernet SAP-to-SAP
4.3.4. Epipe with ATM SAPs
4.3.5. MEF 8
4.3.5.1. Epipe Service Modes
4.3.6. Ethernet OAM
4.3.7. Control Word
4.3.8. MTU
4.3.9. Raw and Tagged Modes
4.3.9.1. Raw Mode
4.3.9.2. Tagged Mode
4.3.9.3. VLAN Translation
4.3.9.4. Tagging Rules for Epipe
4.3.10. IP Filters (Epipe)
4.3.11. MPLS Entropy Label
4.3.12. Security Zones and Epipes
4.4. Frame Relay VLL (Fpipe) Services
4.4.1. Fpipe Service Overview
4.4.2. Frame Relay SAP-to-SAP Service
4.4.3. Frame Relay Traffic Management
4.4.3.1. Ingress SAP Classification and Marking
4.4.4. Frame Relay Encapsulation
4.4.4.1. Frame Relay PW Control Word
4.4.5. Status Signaling and OAM Propagation
4.5. HDLC VLL (Hpipe) Services
4.5.1. Hpipe Service Overview
4.5.2. HDLC VLL for End-to-End HDLC Service
4.5.3. HDLC SAP-to-SAP Service
4.5.4. HDLC Encapsulation
4.5.4.1. HDLC PW Control Word and Payload Size
4.5.5. Status Signaling
4.5.5.1. OAM Propagation
4.6. IP Interworking VLL (Ipipe) Services
4.6.1. Ipipe Service Overview
4.6.2. IP Interworking VLL Datapath
4.6.3. CE IP Address Discovery and Distribution
4.6.3.1. Manual IP Configuration
4.6.3.2. CE IP Address Discovery Using ARP
4.6.3.3. CE IP Address Discovery for Frame Relay
4.6.3.4. CE IP Address Discovery for cHDLC
4.6.3.5. CE IP Address Discovery for PPP/MLPPP
4.6.3.6. CE IP Address Distribution to Remote PE Nodes
4.6.4. IP SAP-to-SAP Service
4.6.5. Hardware Support for Interworking IP PWs
4.6.6. Control Word
4.6.7. Termination at Access
4.6.7.1. PPP and MLPPP Termination
4.6.7.2. FR Termination
4.6.7.3. cHDLC Termination
4.6.7.4. PPP and MLPPP Termination on 2-port OC3/STM1 Channelized Adapter Cards
4.6.8. Traffic Management
4.6.8.1. Traffic Management for FR IW SAPs
4.6.9. Status Signaling
4.6.9.1. FR LMI
4.6.10. IP Filters (Ipipe)
4.7. Pseudowire Switching
4.7.1. Overview
4.7.2. Pseudowire Switching with Pseudowire Redundancy
4.7.3. Pseudowire Switching Behavior
4.7.3.1. Pseudowire Switching With IP Tunnels
4.7.4. Pseudowire Switching TLV
4.8. VLL Service Considerations
4.8.1. Service Support
4.8.2. SDPs
4.8.2.1. SDP Statistics for VLL Services
4.8.3. SAP Encapsulations and Pseudowire Types
4.8.4. ATM PWE3 N-to-1 Cell Mode Encapsulation
4.8.4.1. N-to-1 Cell Mode Encapsulation (N = 1)
4.8.4.1.1. Deployment Scenario for N = 1 Cell Mode Encapsulation
4.8.4.1.2. VPI/VCI Translation (N = 1)
4.8.4.1.3. Cell Concatenation (N = 1)
4.8.4.1.4. QoS and Traffic Descriptor Profiles (N = 1)
4.8.4.1.5. OAM (N = 1)
4.8.4.2. N-to-1 Cell Mode Encapsulation (N > 1)
4.8.4.2.1. Deployment Scenario for N > 1 Cell Mode Encapsulation
4.8.4.2.2. PW Optimization (N > 1)
4.8.4.2.3. Overhead Optimization (N > 1)
4.8.4.2.4. Cell Concatenation (N > 1)
4.8.4.2.5. OAM (N > 1)
4.8.4.2.6. Hardware Support for N > 1 Cell Mode Encapsulation
4.8.4.2.7. SAP Support for N > 1
4.8.5. SAP Aggregation Groups
4.8.5.1. Configuration
4.8.5.1.1. Sap-aggregation-group Keyword
4.8.5.1.2. Sap-aggregation-group Group Identifier
4.8.5.1.3. VPI/VCI Translation for SAP Aggregation Group Members (N>1)
4.8.5.2. QoS and Traffic Descriptor Profiles (N > 1)
4.8.5.3. Statistics and Counters
4.8.5.4. Fault Management
4.8.6. QoS Policies
4.8.7. IP Filter Policies
4.8.8. MTU Settings
4.8.8.1. Targeted LDP and MTU
4.8.9. QinQ (VLL Service)
4.8.10. Pseudowire Control Word
4.8.11. Pseudowire Redundancy
4.8.11.1. PW Redundancy Operation
4.8.11.2. Selecting the Active Spoke SDP for PW Redundancy Configuration
4.8.11.2.1. Primary and Secondary Spoke SDPs
4.8.11.2.2. Secondary Spoke SDPs Only
4.8.11.3. PW Redundancy and Inter-Chassis Backup
4.8.11.4. AIS Fault Propagation
4.8.12. Active/Standby Mode for Pseudowire Redundancy (Standby Signaling)
4.8.12.1. PW Status Signaling Label Withdrawal Option
4.8.12.1.1. Interoperation with PEs that do not Support the PW Forwarding Standby Bit
4.8.12.1.2. Multiple Remote PEs Connected to an r-VPLS Instance Via Spoke-SDP Termination
4.8.12.2. Pseudowire Redundancy on Serial Data Interface Ports
4.9. Configuring a VLL Service with CLI
4.10. Common Configuration Tasks
4.11. Configuring VLL Components
4.11.1. Creating an Apipe Service
4.11.1.1. Configuring Apipe SAP Parameters
4.11.1.2. Configuring Apipe SDP Bindings
4.11.1.3. Configuring Apipe SAP Aggregation Groups
4.11.1.4. Configuring Apipe SAPs as Aggregation Group Members
4.11.2. Creating a Cpipe Service
4.11.2.1. Configuring Cpipe SAP Parameters
4.11.2.2. Configuring Cpipe SDP Bindings
4.11.3. Creating an Epipe Service
4.11.3.1. Configuring Epipe SAP Parameters
4.11.3.2. Configuring Epipe with ATM SAP
4.11.3.3. Configuring Epipe SAP MEF 8 Parameters
4.11.3.4. Configuring Epipe SAP Microwave Link Parameters for Interworking with TDM2Ethernet
4.11.3.5. Configuring ATM Encapsulation Under Epipe Service (7705 SAR-M only)
4.11.3.6. Configuring Epipe Spoke SDP Bindings
4.11.3.7. Configuring a Security Zone Within an Epipe
4.11.4. Creating an Fpipe Service
4.11.4.1. Configuring Fpipe SAP Parameters
4.11.4.2. Configuring Fpipe SDP Bindings
4.11.5. Creating an Hpipe Service
4.11.5.1. Configuring Hpipe SAP Parameters
4.11.5.2. Configuring Hpipe SDP Bindings
4.11.6. Creating an Ipipe Service
4.11.6.1. Configuring Ipipe SAP Parameters
4.11.6.2. Configuring Ipipe SDP Bindings
4.11.7. Configuring PW Switching
4.11.8. Configuring Ingress and Egress SAP Parameters
4.11.9. Using the Control Word
4.11.10. Configuring PW Redundancy
4.11.10.1. Configuring PW Redundancy—Standby Signaling
4.11.10.2. Configuring PW Redundancy—ICB
4.12. Service Management Tasks
4.12.1. Modifying Service Parameters
4.12.2. Disabling a Service
4.12.3. Re-enabling a Service
4.12.4. Deleting a Service
4.13. VLL Services Command Reference
4.13.1. Command Hierarchies
4.13.1.1. VLL Services Configuration Commands
4.13.1.1.1. Apipe Service Configuration Commands
4.13.1.1.2. Apipe Service with SAP Aggregation Configuration Commands
4.13.1.1.3. Cpipe Service Configuration Commands
4.13.1.1.4. Epipe Service Configuration Commands
4.13.1.1.5. Epipe Security Configuration Commands
4.13.1.1.6. Fpipe Service Configuration Commands
4.13.1.1.7. Hpipe Service Configuration Commands
4.13.1.1.8. Ipipe Service Configuration Commands
4.13.1.2. Show Commands
4.13.1.3. Clear Commands
4.13.2. Command Descriptions
4.13.2.1. VLL Service Configuration Commands
4.13.2.1.1. Generic Commands
4.13.2.1.2. VLL Global Commands
4.13.2.1.3. VLL SAP Commands
4.13.2.1.4. SAP Aggregation Group Commands
4.13.2.1.5. SAP cem Commands
4.13.2.1.6. SAP QoS and IP Filter Policy Commands
4.13.2.1.7. SAP Microwave Link Commands
4.13.2.1.8. Service Billing Commands
4.13.2.1.9. VLL SDP Commands
4.13.2.1.10. SDP Cell Concatenation Commands
4.13.2.1.11. ATM Commands
4.13.2.1.12. Epipe Security Configuration Commands
4.13.2.2. Show Commands
4.13.2.3. Clear Commands
5. VPLS
5.1. VPLS Overview
5.1.1. VPLS Packet Walkthrough
5.1.2. Bridged Mobile Backhaul
5.1.3. Multi-Tenant Unit (MTU) Termination
5.2. VPLS Features
5.2.1. VPLS Enhancements
5.2.2. Fabric Mode
5.2.3. Subscriber VLAN
5.2.4. ATM Encapsulated Residential SAP
5.2.5. VPLS over MPLS
5.2.6. VPLS MAC Learning and Packet Forwarding
5.2.7. Pseudowire Control Word
5.2.8. Agent Circuit ID Insertion
5.2.9. MAC Filters
5.2.10. FDB Table Management
5.2.10.1. FDB Size
5.2.10.2. FDB Size Alarms
5.2.10.3. Local and Remote Aging Timers
5.2.10.3.1. Disable MAC Aging
5.2.10.3.2. Disable MAC Learning
5.2.10.4. Unknown MAC Discard
5.2.11. VPLS and Rate Limiting Via QoS Policy
5.2.12. MAC Move
5.2.13. Split Horizon Groups (SAP and Spoke SDP)
5.2.13.1. Residential Split Horizon Groups
5.2.14. Multicast for VPLS and Routed VPLS (IGMP and MLD Snooping)
5.2.14.1. Application Examples
5.2.14.2. Group and Addressing Support
5.2.14.2.1. IPv4 Multicast Support
5.2.14.2.2. IPv6 Layer 2 Multicast Support and Group Address
5.2.14.3. IP Multicast in r-VPLS
5.2.14.3.1. IPv6 Multicast Forwarding Behavior in r-VPLS
5.2.14.4. Multicast Router Ports
5.2.14.5. Tagged Access Traffic
5.2.14.6. Hardware Support
5.2.15. PIM Snooping for VPLS
5.2.15.1. Snooping versus Proxy Mode
5.2.16. MPLS Entropy Label
5.2.17. Ethernet OAM
5.2.18. Security Zones and VPLS
5.3. Routed VPLS
5.3.1. IES or VPRN IP Interface Binding
5.3.1.1. Assigning a Service Name to a VPLS Service
5.3.1.2. Binding a Service Name to an IP Interface
5.3.1.3. Removing a Bound VPLS Service or Service Name
5.3.1.4. IP Interface and VPLS Operational State Coordination
5.3.2. IP Interface MTU and Fragmentation
5.3.3. ARP/ND and VPLS FIB Interactions
5.3.3.1. Routed VPLS Specific ARP/ND Cache Behavior
5.3.4. The allow-ip-int-binding VPLS Flag
5.3.4.1. VPLS Feature Restrictions (due to allow-ip-int-binding)
5.3.5. DSCP Marking
5.3.6. VPLS Ingress IP Filter Override
5.3.7. Routed VPLS Supported Routing-Related Protocols
5.4. VPLS and Spanning Tree Protocol
5.4.1. VPLS Redundancy
5.4.1.1. Spoke SDP Redundancy for Metro Interconnection
5.4.1.2. Spoke SDP-Based Redundant Access
5.4.2. VPLS Access Redundancy
5.4.2.1. STP-Based Redundant Access to VPLS
5.4.3. MAC Flush Message Processing
5.4.3.1. Dual Homing to a VPLS Service
5.5. ATM PVC Access and Termination on a VPLS Service
5.6. VPLS Service Considerations
5.6.1. SAP Encapsulations
5.6.2. VLAN Processing
5.6.2.1. Tagging Rules for VPLS
5.6.3. QinQ (VPLS)
5.7. Configuration Notes
5.8. Configuring a VPLS Service with CLI
5.9. Basic Configuration
5.10. Common Configuration Tasks
5.11. Configuring VPLS Components
5.11.1. Creating a VPLS Service
5.11.2. Creating a Split Horizon Group
5.11.3. Enabling MAC Move
5.11.4. Configuring STP Bridge Parameters in a VPLS
5.11.4.1. Bridge STP Admin State
5.11.4.2. Mode
5.11.4.3. Bridge Priority
5.11.4.4. Hello Time
5.11.4.5. Hold Count
5.12. Configuring a VPLS SAP
5.12.1. Local VPLS SAPs
5.12.2. Distributed VPLS SAPs
5.12.3. Configuring SAP-Specific STP Parameters
5.12.3.1. SAP STP Administrative State
5.12.3.2. SAP Virtual Port Number
5.12.3.3. SAP Priority
5.12.3.4. SAP Path Cost
5.12.3.5. SAP Edge Port
5.12.3.6. SAP Auto Edge
5.12.3.7. SAP Link Type
5.12.4. STP SAP Operational States
5.12.4.1. Operationally Disabled
5.12.4.2. Operationally Discarding
5.12.4.3. Operationally Learning
5.12.4.4. Operationally Forwarding
5.12.5. Configuring VPLS SAPs with Split Horizon
5.13. Configuring SDP Bindings
5.13.1. Configuring Mesh SDP Bindings
5.13.2. Configuring Spoke SDPs
5.13.2.1. Configuring Spoke SDP Bindings
5.13.2.2. Configuring Spoke SDP-Specific STP Parameters
5.13.2.2.1. Spoke SDP STP Administrative State
5.13.2.2.2. Spoke SDP Virtual Port Number
5.13.2.2.3. Spoke SDP Priority
5.13.2.2.4. Spoke SDP Path Cost
5.13.2.2.5. Spoke SDP Edge Port
5.13.2.2.6. Spoke SDP Auto Edge
5.13.2.2.7. Spoke SDP Link Type
5.13.3. Configuring VPLS Spoke SDPs with Split Horizon
5.13.4. Configuring Selective MAC Flush
5.14. Configuring Routed VPLS
5.15. Configuring IP Multicast in VPLS
5.16. Configuring IP Multicast in r-VPLS
5.17. Configuring Multicast Parameters for VPLS and r-VPLS
5.18. Configuring a Static Multicast Group
5.19. Configuring PIM Snooping for VPLS
5.20. Configuring a Security Zone Within a VPLS
5.21. Service Management Tasks
5.21.1. Modifying VPLS Service Parameters
5.21.2. Modifying Management VPLS Parameters
5.21.3. Deleting a Management VPLS
5.21.4. Disabling a Management VPLS
5.21.5. Deleting a VPLS Service
5.21.6. Disabling a VPLS Service
5.21.7. Re-enabling a VPLS Service
5.22. VPLS Command Reference
5.22.1. Command Hierarchies
5.22.1.1. VPLS Service Configuration Commands
5.22.1.1.1. Global Commands
5.22.1.1.2. SAP Commands
5.22.1.1.3. Mesh SDP Commands
5.22.1.1.4. Spoke SDP Commands
5.22.1.1.5. Routed VPLS Commands
5.22.1.1.6. VPLS Security Configuration Commands
5.22.1.2. Show Commands
5.22.1.3. Clear Commands
5.22.1.4. Debug Commands
5.22.2. Command Descriptions
5.22.2.1. VPLS Service Configuration Commands
5.22.2.1.1. Generic Commands
5.22.2.1.2. VPLS Service Commands
5.22.2.1.3. VPLS SAP Commands
5.22.2.1.4. VPLS SAP ATM Commands
5.22.2.1.5. VPLS IGMP and MLD Snooping Commands
5.22.2.1.6. VPLS STP Commands
5.22.2.1.7. VPLS Filter and QoS Policy Commands
5.22.2.1.8. Service Billing Commands
5.22.2.1.9. VPLS SAP DHCP Commands
5.22.2.1.10. VPLS SDP Commands
5.22.2.2. Routed VPLS Configuration Commands
5.22.2.3. VPLS Security Configuration Commands
5.22.2.4. VPLS Show Commands
5.22.2.5. VPLS Clear Commands
5.22.2.6. VPLS Debug Commands
6. Internet Enhanced Service
6.1. IES for In-band Management
6.1.1. Setting Up Connections Between the NSP NFM-P and the 7705 SAR
6.1.2. Encapsulation
6.1.3. Layer 2 and Layer 3 Traffic Management
6.1.4. Troubleshooting and Fault Detection Services
6.1.5. IP ECMP Load Balancing
6.2. IES for Customer Traffic
6.2.1. DHCP Relay and DHCPv6 Relay
6.2.1.1. DHCP Relay
6.2.1.1.1. DHCP Options
6.2.1.2. DHCPv6 Relay
6.2.1.2.1. DHCPv6 Options
6.2.2. IPCP
6.2.3. IPSec Support
6.2.4. Security Zones and IES
6.2.5. Proxy ARP
6.2.6. Configurable ARP Retry Timer
6.2.7. Unnumbered Interfaces
6.2.8. Troubleshooting and Fault Detection Services
6.2.9. VRRP on IES Interfaces
6.2.10. SAPs
6.2.10.1. Encapsulations
6.2.10.2. Routing Protocols
6.2.10.3. QoS Policies
6.2.10.4. QinQ (IES)
6.2.10.5. IP Filter Policies on an IES SAP
6.2.11. Spoke SDP Termination to IES
6.2.12. Bandwidth Optimization for Low-speed Links
6.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
6.2.13. Hold Up and Hold Down Timers for IP Interfaces
6.3. Configuring IES with CLI
6.4. Common Configuration Tasks
6.5. Configuring IES Components
6.5.1. Creating an IES Service
6.5.2. Configuring IES Interface Parameters
6.5.2.1. IES Management Service
6.5.2.2. IES Service
6.5.2.3. IES IPv6 Service
6.5.3. Configuring IES SAP Parameters
6.5.3.1. IES Management SAP
6.5.3.2. IES Service SAP
6.5.4. Configuring IES Spoke SDP Parameters
6.5.5. Configuring VRRP
6.5.6. Configuring a Security Zone Within IES
6.5.7. Configuring Serial Raw Socket Transport Within IES
6.6. Service Management Tasks
6.6.1. Modifying IES Service Parameters
6.6.2. Disabling an IES Service
6.6.3. Re-enabling an IES Service
6.6.4. Deleting an IES Service
6.7. IES Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Configuration Commands
6.7.1.1.1. IES Management Configuration Commands
6.7.1.1.2. IES Service Configuration Commands
6.7.1.1.3. Routed VPLS Commands
6.7.1.1.4. VRRP Commands
6.7.1.1.5. IES Security Zone Configuration Commands
6.7.1.1.6. IES Raw Socket IP Transport Configuration Commands
6.7.1.2. Show Commands
6.7.1.3. Clear Commands
6.7.1.4. Debug Commands
6.7.2. Command Descriptions
6.7.2.1. IES Generic Configuration Commands
6.7.2.2. IES Global Configuration Commands
6.7.2.3. IES Management Configuration Commands
6.7.2.3.1. IES Management Interface Commands
6.7.2.3.2. IES Management SAP Commands
6.7.2.4. IES Service Configuration Commands
6.7.2.4.1. IES Service Interface Commands
6.7.2.4.2. IES Service IPv6 Commands
6.7.2.4.3. IES Service VRRP Commands
6.7.2.4.4. IES Service SAP Commands
6.7.2.4.5. IES Service Spoke SDP Commands
6.7.2.4.6. Routed VPLS Commands
6.7.2.4.7. IES Service Security Zone Configuration Commands
6.7.2.4.8. IES Raw Socket IP Transport Configuration Commands
6.7.2.5. Show Commands
6.7.2.6. Clear Commands
6.7.2.7. Debug Commands
7. VPRN Services
7.1. VPRN Service Overview
7.1.1. Routing Prerequisites
7.1.2. BGP Support
7.1.2.1. BGP Fast Reroute with Prefix-Independent Convergence in a VPRN
7.1.2.2. BGP Next-Hop Resolution and Peer Tracking
7.1.3. IPSec Support
7.1.4. Security Zones and VPRN
7.1.5. Static One-to-One NAT and VPRN
7.1.6. Unicast and Multicast Address Translation
7.1.7. Route Distinguishers
7.1.7.1. PE-to-CE Route Exchange
7.1.7.1.1. Route Redistribution
7.1.7.1.2. CPE Connectivity Check
7.1.8. Route Target Constraint
7.1.8.1. Configuring the Route Target Address Family
7.1.8.2. Originating RTC Routes
7.1.8.3. Receiving and Readvertising RTC Routes
7.1.8.4. Using RTC Routes
7.1.9. In-Band Management using a VPRN
7.2. VPRN Features
7.2.1. IP Interfaces
7.2.1.1. Unnumbered Interfaces
7.2.1.2. DHCP and DHCPv6
7.2.1.2.1. DHCP Relay and DHCPv6 Relay
7.2.1.2.2. Local DHCP and DHCPv6 Server
7.2.1.3. IPCP
7.2.1.4. Troubleshooting and Fault Detection Services
7.2.1.5. VRRP on VPRN Interfaces
7.2.1.6. IP ECMP Load Balancing
7.2.1.7. Proxy ARP
7.2.1.8. Configurable ARP Retry Timer
7.2.1.9. Hold Up and Hold Down Timers for IP Interfaces
7.2.2. SAPs
7.2.2.1. Encapsulations
7.2.2.2. QoS Policies
7.2.2.2.1. CoS Marking for Self-generated Traffic
7.2.2.3. QinQ (VPRN)
7.2.2.4. Filter Policies on a VPRN SAP
7.2.3. PE-to-CE Routing Protocols
7.2.3.1. Using OSPF or OSPFv3 in IP VPNs
7.2.3.1.1. DN Bit
7.2.3.2. TTL Security
7.2.4. PE-to-PE Tunneling Mechanisms
7.2.5. Per-VRF Route Limiting
7.2.6. RIP Metric Propagation in VPRNs
7.2.7. Multicast VPN (MVPN)
7.2.7.1. Multicast in IP-VPN Applications
7.2.7.2. MVPN Building Blocks
7.2.7.2.1. PMSI
7.2.7.2.2. MVPN Using BGP Control Plane
7.2.7.2.3. Auto-Discovery
7.2.7.2.4. PE-CE Multicast Protocols and Services
7.2.7.2.5. PE-PE Transmission of C-Multicast Routing Using BGP
7.2.7.2.6. PE-PE Multicast Protocols
7.2.7.2.7. PE-PE Multicast Data Transmission
7.2.7.3. Provider Tunnel Support
7.2.7.3.1. Point-to-Multipoint I-PMSI and S-PMSI
7.2.7.3.2. Point-to-Multipoint LDP I-PMSI and S-PMSI
7.2.7.3.3. Point-to-Multipoint LSP S-PMSI
7.2.7.3.4. MVPN Sender-only and Receiver-only
7.2.7.4. Inter-AS and Intra-AS Solutions
7.2.7.4.1. 7705 SAR as Source of Non-Segmented Inter-AS or Intra-AS Network
7.2.7.5. NG-MVPN Non-segmented Inter-AS Solution
7.2.7.5.1. Non-Segmented Inter-AS VPN Option C Support
7.2.7.5.2. Configuration Example
7.2.7.5.3. Inter-AS Non-segmented mLDP
7.2.7.5.4. ECMP
7.2.7.6. Mrinfo and Mtrace
7.2.7.7. Multicast-only Fast Reroute (MoFRR)
7.2.7.8. mLDP Point-to-Multipoint Support
7.2.7.9. mLDP Fast Upstream Switchover
7.2.7.10. Multicast Source Discovery Protocol
7.2.8. VPRN Auto-binding Tunnels
7.2.9. Spoke SDPs
7.2.10. Spoke SDP Termination to VPRN
7.2.11. IPv6 on Virtual Private Edge Router
7.2.12. IPv6 over IPv4 LAN-to-LAN IPSec Tunnels
7.2.13. Bandwidth Optimization for Low-speed Links
7.2.13.1. OAM Diagnostics Restrictions with Lower IP MTU
7.2.14. Support for NTP
7.3. Configuring a VPRN Service with CLI
7.4. Basic Configuration
7.5. Common Configuration Tasks
7.6. Configuring VPRN Components
7.6.1. Creating a VPRN Service
7.6.2. Configuring Global VPRN Parameters
7.6.3. Configuring Router Interfaces
7.6.4. Configuring Static Route Entries for VPRN
7.6.5. Configuring BGP for VPRN
7.6.5.1. Configuring VPRN BGP Group and Neighbor Parameters
7.6.5.2. Configuring Route Reflection
7.6.5.3. VPRN BGP CLI Syntax
7.6.6. Configuring IPv6 Parameters for VPRN BGP
7.6.7. Configuring VPRN IPv6 Neighbor Discovery Parameters
7.6.8. Configuring OSPF or OSPFv3 for VPRN
7.6.9. Configuring RIP for VPRN
7.6.10. Configuring IGMP for VPRN
7.6.11. Configuring PIM for VPRN
7.6.12. Configuring MVPN for VPRN
7.6.13. Configuring a VPRN Interface
7.6.14. Configuring a VPRN IPv6 Interface
7.6.15. Configuring VPRN Interface Routed VPLS IPv6 Parameters
7.6.16. Configuring VPRN Interface SAP Parameters
7.6.17. Configuring VPRN Interface SAP IPv6 Parameters
7.6.18. Configuring VPRN Interface Spoke SDP Parameters
7.6.19. Configuring VPRN Interface Spoke SDP IPv6 Parameters
7.6.20. Configuring VRRP
7.6.21. Configuring a Security Zone Within a VPRN
7.6.22. Configuring Serial Raw Socket Transport Within VPRN
7.6.23. Configuring VPRN Router Advertisement
7.7. Service Management Tasks
7.7.1. Modifying VPRN Service Parameters
7.7.2. Deleting a VPRN Service
7.7.3. Disabling a VPRN Service
7.7.4. Re-enabling a VPRN Service
7.8. VPRN Services Command Reference
7.8.1. Command Hierarchies
7.8.1.1. Configuration Commands
7.8.1.1.1. VPRN Service Configuration Commands
7.8.1.1.2. BGP Commands
7.8.1.1.3. OSPF Commands
7.8.1.1.4. OSPFv3 Commands
7.8.1.1.5. IGMP Commands
7.8.1.1.6. PIM Commands
7.8.1.1.7. RIP Commands
7.8.1.1.8. VPRN Security Zone Configuration Commands
7.8.1.1.9. VPRN Raw Socket IP Transport Configuration Commands
7.8.1.1.10. Multicast VPN Commands
7.8.1.1.11. MSDP Commands
7.8.1.1.12. Router Advertisement Commands
7.8.1.1.13. Local DHCP and DHCPv6 Server Commands
7.8.1.1.14. Interface Commands
7.8.1.1.15. IPv6 Interface Commands
7.8.1.1.16. Interface DHCP Commands
7.8.1.1.17. Interface ICMP Commands
7.8.1.1.18. Interface SAP IPSec-Tunnel Commands
7.8.1.1.19. Routed VPLS Commands
7.8.1.1.20. Interface VRRP Commands
7.8.1.1.21. VPRN Static One-to-One NAT Configuration Commands
7.8.1.1.22. TWAMP Light Commands
7.8.1.1.23. VPRN NTP Commands
7.8.1.2. Show Commands
7.8.1.3. Clear Commands
7.8.1.4. Debug Commands
7.8.2. Command Descriptions
7.8.2.1. VPRN Service Configuration Commands
7.8.2.1.1. Generic Commands
7.8.2.1.2. Global Commands
7.8.2.1.3. BGP Commands
7.8.2.1.4. OSPF and OSPFv3 Commands
7.8.2.1.5. IGMP Commands
7.8.2.1.6. PIM Commands
7.8.2.1.7. RIP Commands
7.8.2.1.8. VPRN Security Configuration Commands
7.8.2.1.9. VPRN Raw Socket IP Transport Configuration Commands
7.8.2.1.10. Multicast VPN Commands
7.8.2.1.11. MSDP Commands
7.8.2.1.12. Router Advertisement Commands
7.8.2.1.13. Local DHCP and DHCPv6 Server Commands
7.8.2.1.14. Interface Commands
7.8.2.1.15. IPv6 Interface Commands
7.8.2.1.16. Interface DHCP Commands
7.8.2.1.17. Interface ICMP Commands
7.8.2.1.18. Interface SAP Commands
7.8.2.1.19. Interface Spoke SDP Commands
7.8.2.1.20. Routed VPLS Commands
7.8.2.1.21. Interface VRRP Commands
7.8.2.1.22. VPRN Static One-to-One NAT Configuration Commands
7.8.2.1.23. TWAMP Light Commands
7.8.2.1.24. VPRN NTP Commands
7.8.2.2. Show Service Commands
7.8.2.3. Show Router Commands
7.8.2.4. Clear Service Commands
7.8.2.5. Debug MSDP Commands
7.8.2.6. Debug Service Commands
8. IPSec
8.1. IPSec Overview
8.1.1. IPSec Implementation
8.1.1.1. IPSec Overview
8.1.1.2. Hardware Support
8.1.1.3. IPSec Encryption Features
8.1.1.4. SHA2 Support
8.1.1.5. IPSec Security Policy, IKE Policy, and IPSec Transform
8.1.1.6. IKEv2 Fragmentation
8.1.1.7. Tunnel Group
8.1.1.8. Tunnel Interfaces and SAPs
8.1.1.8.1. Public Tunnel SAPs
8.1.1.8.2. Private Tunnel SAPs
8.1.1.8.3. IP Interface Configuration
8.1.1.9. IPSec Tunnel Configuration
8.1.1.10. IPSec over MPLS with Public Service IES
8.1.1.11. IPSec Transport Tunnels with Public Service VPRN
8.1.1.12. GRE-Encapsulated VLLs/VPLS over IPSec VPNs
8.1.1.13. GRE-Encapsulated VLLs/VPLS over IPSec over MPLS
8.1.1.13.1. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 Label Routes) Solution 1: Changing BGP Signaling to Loopback Interface
8.1.1.13.2. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 label Routes) Solution 2: GRE to Local Interface on 7705 SAR
8.1.1.13.3. VLLs/VPLS over IPSec over MPLS (Using IGP Shortcuts)
8.1.2. X.509v3 Certificate Overview
8.1.2.1. X.509v3 Certificate Support on the 7705 SAR
8.1.2.2. Local Storage
8.1.2.3. CA Profile
8.1.2.4. CA Chain Computation
8.1.2.5. Certificate Enrollment
8.1.2.6. Certificate Revocation Check
8.1.2.7. Certificate, CRL, and Key Cache
8.1.3. Using Certificates For IPSec Tunnel Authentication
8.1.4. Trust Anchor Profile
8.1.5. Certificate Profile
8.1.6. Certificate Management Protocol Version 2 (CMPv2)
8.1.7. OCSP
8.1.8. Applications
8.1.8.1. Metrocell Deployment
8.1.8.2. Small Business Deployment
8.1.9. NAT-Traversal for IKEv1/v2 and IPSec
8.1.10. BFD over IPSec Tunnel
8.1.11. QoS for IPSec
8.1.11.1. Network and Access Ingress QoS (Decryption QoS)
8.1.11.1.1. Network Ingress QoS Tunnel Override
8.1.11.2. Network and Access Egress QoS (Encryption QoS)
8.1.12. Fragmentation and IP MTU
8.1.12.1. Fragmentation Configuration
8.1.12.2. Reassembly
8.1.13. Support for Private VPRN Service Features
8.1.14. Routing in Private Services
8.1.15. IPSec on the 10-port 1GigE/1-port 10GigE X-Adapter Card
8.1.16. IPSec Sequence Number
8.1.17. PBR and MFC
8.1.17.1. PBR
8.1.17.2. MFC
8.1.18. OSPFv3 Packet Authentication with IPv6 IPSec
8.1.19. Network Security with IPv6 IPSec
8.1.20. IPSec Over r-VPLS on a Public Service
8.1.21. Statistics
8.1.22. Security Support
8.2. Public Key Infrastructure (PKI)
8.2.1. CA Role in PKI
8.2.2. Digital Signature and Certificates
8.2.2.1. Certificates
8.2.2.1.1. Vendor Certificate Signature by the Root CA
8.2.2.1.2. Vendor Certificate Authentication by a Peer
8.2.2.1.3. Example of PKI Operation
8.2.2.1.4. Certificate Chain
8.2.3. Certificate Storage
8.2.4. CMPv2 Certificate Management
8.2.4.1. CMPv2 Initial Registration
8.2.4.2. Key Update
8.2.4.3. CRL
8.2.5. OCSP
8.2.6. Certificate or CRL Expiration Warning
8.2.7. Automatic CRL Update
8.3. Best Practices Recommendations
8.3.1. IPSec Best Practices
8.4. Configuration Notes
8.5. Configuring IPSec with CLI
8.6. Basic Configuration Overview
8.7. Common Configuration Tasks
8.7.1. Configuring an IPSec Tunnel Group
8.7.2. Configuring Router Interfaces for IPSec
8.7.3. Configuring IPSec Parameters
8.7.4. Configuring IPSec and IPSec Tunnels in Services
8.7.5. Configuring IPSec IPv6 Parameters for a VPRN Private Service
8.7.6. Configuring X.509v3 Certificate Parameters
8.7.7. Configuring CMPv2
8.7.8. Configuring OCSP
8.8. Configuring IPSec over MPLS
8.8.1. IPSec over BGP 3107 Label Route
8.8.1.1. Static LAN-to-LAN Tunnel Configuration
8.8.1.2. Policy Option Configuration
8.8.1.3. BGP Configuration with BGP 3107 Label Route Advertisement
8.8.1.4. LDP or RSVP-TE Tunnel Configuration
8.8.2. IPSec over IGP Shortcut
8.8.2.1. Static LAN-to-LAN Tunnel Configuration
8.8.2.2. IGP Shortcut Configuration
8.8.2.3. RSVP-TE LSP Configuration
8.9. Service Management Tasks
8.9.1. Deleting an IPSec IKE Policy or an IPSec Transform
8.9.2. Deleting a Public-Side IPSec Tunnel SAP and Interface
8.9.3. Deleting a Private-Side IPSec Tunnel SAP and Interface
8.9.4. Deleting an IPSec Security Policy
8.9.5. Deleting an IPSec Tunnel
8.10. IPSec Command Reference
8.10.1. Command Hierarchies
8.10.1.1. IPSec Configuration Commands
8.10.1.1.1. ISA Tunnel Commands
8.10.1.1.2. IPSec Commands
8.10.1.1.3. Service Configuration Commands
8.10.1.1.4. Service Interface Tunnel Commands
8.10.1.1.5. Service Static Route Commands
8.10.1.2. PKI Configuration Commands
8.10.1.2.1. X.509 and Certificate Commands
8.10.1.2.2. PKI Infrastructure Commands
8.10.1.2.3. IPSec PKI Commands
8.10.1.2.4. Automatic CRL Update Commands
8.10.1.3. Show Commands
8.10.1.4. Clear Commands
8.10.1.5. Debug Commands
8.10.2. Command Descriptions
8.10.2.1. IPSec Configuration Commands
8.10.2.1.1. Generic Commands
8.10.2.1.2. ISA Tunnel Commands
8.10.2.1.3. Internet Key Exchange (IKE) and Transform Commands
8.10.2.1.4. Service Configuration Commands
8.10.2.1.5. Service Interface Tunnel Commands
8.10.2.2. PKI Configuration Commands
8.10.2.2.1. X.509 and Certificate Commands
8.10.2.2.2. PKI Infrastructure Commands
8.10.2.2.3. IPSec PKI Commands
8.10.2.2.4. Automatic CRL Update Commands
8.10.2.3. Show Commands
8.10.2.4. Clear Commands
8.10.2.5. Debug Commands
9. Network Group Encryption
9.1. NGE Overview
9.1.1. NGE Key Groups and Encryption Partitions
9.1.2. NGE Domains
9.1.2.1. Private IP/MPLS Network NGE Domain
9.1.2.2. Private Over Intermediary Network NGE Domain
9.1.3. Network Services Platform Management
9.2. Key Groups
9.2.1. Key Group Algorithms
9.2.1.1. Encapsulating Security Payload (ESP)
9.2.2. Security Associations (SAs)
9.2.2.1. Active Outbound SA
9.3. Services Encryption
9.3.1. Services Encryption Overview
9.3.2. Assigning Key Groups to Services
9.3.3. Pseudowire Switching for NGE Traffic
9.3.4. Pseudowire Control Word for NGE Traffic
9.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
9.3.6. NGE and RFC 3107
9.3.7. NGE for NG-MVPN
9.4. Router Interface Encryption
9.4.1. Router Interface NGE Domain Concepts
9.4.2. GRE-MPLS Packets Inside the NGE Domain
9.4.3. Router Encryption Exceptions using ACLs
9.4.4. IPSec Packets Crossing an NGE Domain
9.4.5. Multicast Packets Traversing the NGE Domain
9.4.6. Assigning Key Groups to Router Interfaces
9.4.7. Router Interface NGE Firewall Considerations
9.4.8. NGE and BFD Support
9.4.9. NGE and ACL Interactions
9.4.10. Router Interface NGE and ICMP Interactions Over the NGE Domain
9.4.11. OAM Considerations for Router Interface Encryption
9.5. Layer 2 Encryption
9.6. NGE Packet Overhead and MTU Considerations
9.6.1. GRE Fragmentation for NGE Packets
9.7. 1588v2 Encryption With NGE
9.8. QoS for NGE Traffic
9.8.1. Network Ingress
9.8.2. Network Egress
9.9. Statistics
9.10. Remote Network Monitoring (RMON) Support
9.11. Configuration Notes
9.12. Configuring NGE with the CLI
9.13. Basic NGE Configuration Overview
9.14. Configuring NGE Components
9.14.1. Configuring the Global Encryption Label
9.14.2. Configuring a Key Group
9.14.3. Assigning a Key Group to an SDP or VPRN Service
9.14.4. Assigning a Key Group to a Router Interface
9.14.5. Assigning a Key Group to an Ethernet Port
9.15. NGE Management Tasks
9.15.1. Modifying a Key Group
9.15.2. Removing a Key Group
9.15.2.1. Removing a Key Group from an SDP or VPRN Service
9.15.2.2. Removing a Key Group from a Router Interface
9.15.2.3. Removing a Key Group from an Ethernet Port
9.15.3. Changing Key Groups
9.15.3.1. Changing the Key Group for an SDP or VPRN Service
9.15.3.2. Changing the Key Group for a Router Interface
9.15.3.3. Changing the Key Group for an Ethernet Port
9.15.4. Deleting a Key Group from a 7705 SAR
9.16. NGE Command Reference
9.16.1. Command Hierarchies
9.16.1.1. Configuration Commands
9.16.1.1.1. NGE Commands
9.16.1.1.2. Services Commands
9.16.1.1.3. Router Interface Encryption Commands
9.16.1.1.4. Ethernet Port Encryption Commands
9.16.1.2. Show Commands
9.16.1.3. Clear Commands
9.16.2. Command Descriptions
9.16.2.1. Configuration Commands
9.16.2.1.1. Generic Commands
9.16.2.1.2. Group Encryption Commands
9.16.2.2. Show Commands
9.16.2.3. Clear Commands
10. Ethernet Virtual Private Networks
10.1. Overview and EVPN Applications
10.1.1. EVPN for MPLS Tunnels in E-LAN Services
10.1.2. EVPN for MPLS Tunnels in E-Line Services
10.2. EVPN for MPLS Tunnels
10.2.1. BGP-EVPN Control Plane for MPLS Tunnels
10.2.1.1. EVPN Route Type 2 – MAC/IP Advertisement Route
10.2.1.2. EVPN Route Type 3 – Inclusive Multicast Ethernet Tag Route
10.2.1.3. EVPN Route Type 1 – Ethernet Auto-Discovery Route (AD Route)
10.2.1.4. EVPN Route Type 4 – Ethernet Segment Route (ES Route)
10.2.1.5. EVPN Route Type 5 – IP Prefix Route
10.2.1.6. RFC 5512 – BGP Tunnel Encapsulation Extended Community
10.2.2. EVPN-VPLS for MPLS Tunnels
10.2.2.1. Overview
10.2.2.2. EVPN and VPLS Integration
10.2.2.3. Auto-derived Route Distinguisher (RD) in Services
10.2.2.4. EVPN Multihoming in VPLS Services
10.2.2.4.1. EVPN All-Active Multihoming
10.2.2.4.2. EVPN Single-Active Multihoming
10.2.3. EVPN-VPWS for MPLS Tunnels
10.2.3.1. BGP-EVPN Control Plane for EVPN-VPWS
10.2.3.2. EVPN for MPLS Tunnels in Epipe Services
10.2.3.3. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
10.2.3.4. EVPN Multihoming for EVPN-VPWS Services
10.2.4. EVPN for MPLS Tunnels in r-VPLS Services
10.2.4.1. Overview
10.2.4.2. EVPN-MPLS Multihoming and Passive VRRP
10.2.5. MPLS Entropy Label
10.2.6. Preference-Based and Non-Revertive Designated Forwarder Election
10.3. General EVPN Topics
10.3.1. BGP-EVPN MAC Mobility
10.3.2. BGP-EVPN MAC Duplication
10.3.3. Conditional Static MAC and Protection
10.3.4. Blackhole MAC
10.3.5. CFM Interaction with EVPN Services
10.3.6. BGP and EVPN Route Selection for EVPN Routes
10.3.7. Interaction of EVPN and Other Features
10.3.7.1. Interaction of EVPN-MPLS with Existing VPLS Features
10.3.7.2. Routing Policies for BGP-EVPN IP Prefixes
10.4. Configuring an EVPN Service With CLI
10.4.1. EVPN All-Active Multihoming Configuration Example
10.4.2. EVPN Single-Active Multihoming Configuration Example
10.4.3. EVPN-MPLS r-VPLS Configuration Examples
10.4.3.1. EVPN-MPLS r-VPLS Without Multihoming
10.4.3.2. EVPN-MPLS r-VPLS With All-Active Multihoming
10.4.3.2.1. Passive VRRP
10.4.3.2.2. Operation
10.4.3.3. EVPN-MPLS r-VPLS With Single-Active Multihoming
10.5. EVPN Command Reference
10.5.1. Command Hierarchies
10.5.1.1. EVPN Configuration Commands
10.5.1.1.1. Epipe Commands for EVPN
10.5.1.1.2. VPLS Commands for EVPN
10.5.1.1.3. Epipe and VPLS Services Related Commands for EVPN
10.5.1.1.4. VPRN Interface Commands for EVPN
10.5.1.1.5. Service System Commands for EVPN
10.5.1.1.6. Redundancy Commands for EVPN
10.5.1.1.7. Router BGP Commands for EVPN
10.5.1.2. Show Commands
10.5.2. Command Descriptions
10.5.2.1. EVPN Configuration Commands
10.5.2.1.1. BGP Commands
10.5.2.1.2. BGP-EVPN Commands
10.5.2.2. Routed VPLS EVPN Commands
10.5.2.3. EVPN Service System Commands
10.5.2.4. EVPN Redundancy Commands
10.5.2.5. Show Commands
11. List of Acronyms
12. Supported Standards and Protocols
Customer Document and Product Support
7705 SAR System Management Guide R23.4.R1
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR System Management Configuration Process
Security
Authentication, Authorization, and Accounting
Authentication
Local Authentication
Password Hashing
RADIUS Authentication
RADIUS Server Selection
TACACS+ Authentication
Authorization
Local Authorization
RADIUS Authorization
TACACS+ Authorization
Accounting
RADIUS Accounting
TACACS+ Accounting
Security Controls
When a Server Does Not Respond
Access Request Flow
Vendor-Specific Attributes (VSAs)
Other Security Features
Secure Shell (SSH)
SSH PKI Authentication
User Public Key Generation
SSH Cipher Lists
SSH KEX Lists
SSH Key Re-exchange Without Disabling SSH
Key Re-exchange Procedure
SSH MAC Lists
SSH File Transfer Protocol (SFTP)
CSM Filters and CSM Security
Exponential Login Backoff
Encryption
802.1x Network Access Control
TCP Enhanced Authentication and Keychain Authentication
Keychain Authentication
Keychain Configuration Guidelines and Behavior
TLS
TLS Overview
TLS Interaction with Applications
Application Support
TLS Handshake
TLS 1.3
TLS Client Certificate
TLS Symmetric Key Rollover
Supported TLS Ciphers
Certificate Management
Certificate Profile
TLS Server Authentication of the Client Certificate CN Field
Operational Guidelines
Server Authentication Behavior
TLS Client Profile and Trust Anchor Behavior and Scale
Basic TLS Configuration
Common Configuration Tasks
Configuring a Client TLS Profile
Configuring a TLS Client Certificate
Configuring a TLS Trust Anchor
Configuration Notes
Configuring Security with CLI
Setting Up Security Attributes
Configuring Authentication
Configuring Authorization
Configuring Accounting
Security Configurations
Security Configuration Procedures
Configuring IPv4 or IPv6 Management Access Filters
Configuring IPv4 or IPv6 CPM (CSM) Filters
Configuring Password Management Parameters
Managing IPSec Certificates
Configuring Profiles
Configuring Users
Copying and Overwriting Users and Profiles
Copying a User
Copying a Profile
Configuring SSH
Configuring SSH Cipher Lists
Configuring SSH KEX Algorithm Lists
Configuring SSH MAC Algorithm Lists
Configuring Login Controls
Configuring RADIUS Parameters
Configuring RADIUS Authentication
Configuring RADIUS Authorization
Configuring RADIUS Accounting
Configuring 802.1x RADIUS Policies
Configuring TACACS+ Parameters
Enabling TACACS+ Authentication
Configuring TACACS+ Authorization
Configuring TACACS+ Accounting
Configuring Keychains
Security Command Reference
Command Hierarchies
Admin Commands
Configuration Commands
Security Configuration Commands
Management Access Filter Commands
IPv6 Management Access Filter Commands
CPM Filter Commands
IPv6 CPM Filter Commands
Password Commands
Profile Commands
User Commands
CLI Script Authorization Commands
RADIUS Commands
TACACS+ Commands
802.1x Commands
SSH Commands
TLS Commands
Keychain Authentication Commands
Login Control Commands
Show Commands
Security
Login Control
Clear Commands
Admin
Authentication
Monitor Commands
Debug Commands
Command Descriptions
Admin Commands
Configuration Commands
Generic Security Commands
Security Commands
Management Access Filter Commands
CPM Filter Commands
Global Password Commands
Password Commands
Profile Management Commands
User Management Commands
CLI Script Authorization Commands
RADIUS Client Commands
TACACS+ Client Commands
802.1x Commands
SSH Commands
Security TLS Commands
Keychain Authentication Commands
Login Control Commands
Show Commands
Security Show Commands
Login Control Show Commands
Clear Commands
Monitor Commands
Debug Commands
SNMP
SNMP Overview
SNMP Architecture
Management Information Base
SNMP Versions
Management Information Access Control
User-Based Security Model Community Strings
Views
Access Groups
Users
SNMP Versions
SNMPv3 Authentication and Privacy Protocols
Configuration Notes
Configuring SNMP with CLI
SNMP Configuration Overview
Configuring SNMPv1 and SNMPv2c
Configuring SNMPv3
Basic SNMP Security Configuration
Configuring SNMP Components
Configuring a Community String
Configuring View Options
Configuring Access Options
Configuring USM Community Options
Configuring Other SNMP Parameters
SNMP Command Reference
Command Hierarchies
Configuration Commands
SNMP System Commands
SNMP Security Commands
Show Commands
Command Descriptions
Configuration Commands
SNMP System Commands
SNMP Security Commands
Show Commands
Event and Accounting Logs
Logging Overview
Log file encryption
Event Logging
Accounting Logs
Log Destinations
Console
Session
Memory Logs
Log Files
Event Log Files
Accounting Log Files
SNMP Trap Group
Syslog
Event Logs
Event Sources
Event Control
Log Manager and Event Logs
Event Filter Policies
Event Log Entries
Simple Logger Event Throttling
Default System Logs
Event Handling System
Configuring Event Handling
Event Handlers
Event Triggers
Debounce
Variable Passing
EHS Scripting
Hardware Support
Accounting Logs
Accounting Records
Accounting Files
Design Considerations
Configuration Notes
Configuring Logging with CLI
Log Configuration Overview
Log Type
Basic Event Log Configuration
Common Configuration Tasks
Configuring an Event Log
Configuring a File ID
Configuring an Accounting Policy
Configuring Event Control and Throttle Rate
Configuring a Log Filter
Configuring an SNMP Trap Group
Configuring a Syslog Target
Log Management Tasks
Modifying a Log File
Deleting a Log File
Modifying a File ID
Deleting a File ID
Modifying a Syslog ID
Deleting a Syslog ID
Modifying an SNMP Trap Group
Deleting an SNMP Trap Group
Modifying a Log Filter
Deleting a Log Filter
Modifying Event Control Parameters
Returning to the Default Event Control Configuration
Log Command Reference
Command Hierarchies
Configuration Commands
Accounting Policy Commands
Event Control Commands
Event Handling Commands
Event Trigger Commands
Log file commands
Log Filter Commands
Syslog Commands
Logging Destination Commands
SNMP Trap Groups Commands
Show Commands
Clear Commands
Command Descriptions
Configuration Commands
Generic Commands
Accounting Policy Commands
Event Control Commands
Event Handling Commands
Event Trigger Commands
Log file commands
Log Filter Commands
Syslog Commands
Logging Destination Commands
SNMP Trap Groups Commands
Show Commands
Clear Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
Legal notice
Preface
About This Guide
Audience
Technical Support
7705 SAR System Management Configuration Process
Security
Authentication, Authorization, and Accounting
Authentication
Local Authentication
Password Hashing
RADIUS Authentication
RADIUS Server Selection
TACACS+ Authentication
Authorization
Local Authorization
RADIUS Authorization
TACACS+ Authorization
Accounting
RADIUS Accounting
TACACS+ Accounting
Security Controls
When a Server Does Not Respond
Access Request Flow
Vendor-Specific Attributes (VSAs)
Other Security Features
Secure Shell (SSH)
SSH PKI Authentication
User Public Key Generation
SSH Cipher Lists
SSH KEX Lists
SSH Key Re-exchange Without Disabling SSH
Key Re-exchange Procedure
SSH MAC Lists
SSH File Transfer Protocol (SFTP)
CSM Filters and CSM Security
Exponential Login Backoff
Encryption
802.1x Network Access Control
TCP Enhanced Authentication and Keychain Authentication
Keychain Authentication
Keychain Configuration Guidelines and Behavior
TLS
TLS Overview
TLS Interaction with Applications
Application Support
TLS Handshake
TLS 1.3
TLS Client Certificate
TLS Symmetric Key Rollover
Supported TLS Ciphers
Certificate Management
Certificate Profile
TLS Server Authentication of the Client Certificate CN Field
Operational Guidelines
Server Authentication Behavior
TLS Client Profile and Trust Anchor Behavior and Scale
Basic TLS Configuration
Common Configuration Tasks
Configuring a Client TLS Profile
Configuring a TLS Client Certificate
Configuring a TLS Trust Anchor
Configuration Notes
Configuring Security with CLI
Setting Up Security Attributes
Configuring Authentication
Configuring Authorization
Configuring Accounting
Security Configurations
Security Configuration Procedures
Configuring IPv4 or IPv6 Management Access Filters
Configuring IPv4 or IPv6 CPM (CSM) Filters
Configuring Password Management Parameters
Managing IPSec Certificates
Configuring Profiles
Configuring Users
Copying and Overwriting Users and Profiles
Copying a User
Copying a Profile
Configuring SSH
Configuring SSH Cipher Lists
Configuring SSH KEX Algorithm Lists
Configuring SSH MAC Algorithm Lists
Configuring Login Controls
Configuring RADIUS Parameters
Configuring RADIUS Authentication
Configuring RADIUS Authorization
Configuring RADIUS Accounting
Configuring 802.1x RADIUS Policies
Configuring TACACS+ Parameters
Enabling TACACS+ Authentication
Configuring TACACS+ Authorization
Configuring TACACS+ Accounting
Configuring Keychains
Security Command Reference
Command Hierarchies
Admin Commands
Configuration Commands
Security Configuration Commands
Management Access Filter Commands
IPv6 Management Access Filter Commands
CPM Filter Commands
IPv6 CPM Filter Commands
Password Commands
Profile Commands
User Commands
CLI Script Authorization Commands
RADIUS Commands
TACACS+ Commands
802.1x Commands
SSH Commands
TLS Commands
Keychain Authentication Commands
Login Control Commands
Show Commands
Security
Login Control
Clear Commands
Admin
Authentication
Monitor Commands
Debug Commands
Command Descriptions
Admin Commands
Configuration Commands
Generic Security Commands
Security Commands
Management Access Filter Commands
CPM Filter Commands
Global Password Commands
Password Commands
Profile Management Commands
User Management Commands
CLI Script Authorization Commands
RADIUS Client Commands
TACACS+ Client Commands
802.1x Commands
SSH Commands
Security TLS Commands
Keychain Authentication Commands
Login Control Commands
Show Commands
Security Show Commands
Login Control Show Commands
Clear Commands
Monitor Commands
Debug Commands
SNMP
SNMP Overview
SNMP Architecture
Management Information Base
SNMP Versions
Management Information Access Control
User-Based Security Model Community Strings
Views
Access Groups
Users
SNMP Versions
SNMPv3 Authentication and Privacy Protocols
Configuration Notes
Configuring SNMP with CLI
SNMP Configuration Overview
Configuring SNMPv1 and SNMPv2c
Configuring SNMPv3
Basic SNMP Security Configuration
Configuring SNMP Components
Configuring a Community String
Configuring View Options
Configuring Access Options
Configuring USM Community Options
Configuring Other SNMP Parameters
SNMP Command Reference
Command Hierarchies
Configuration Commands
SNMP System Commands
SNMP Security Commands
Show Commands
Command Descriptions
Configuration Commands
SNMP System Commands
SNMP Security Commands
Show Commands
Event and Accounting Logs
Logging Overview
Log file encryption
Event Logging
Accounting Logs
Log Destinations
Console
Session
Memory Logs
Log Files
Event Log Files
Accounting Log Files
SNMP Trap Group
Syslog
Event Logs
Event Sources
Event Control
Log Manager and Event Logs
Event Filter Policies
Event Log Entries
Simple Logger Event Throttling
Default System Logs
Event Handling System
Configuring Event Handling
Event Handlers
Event Triggers
Debounce
Variable Passing
EHS Scripting
Hardware Support
Accounting Logs
Accounting Records
Accounting Files
Design Considerations
Configuration Notes
Configuring Logging with CLI
Log Configuration Overview
Log Type
Basic Event Log Configuration
Common Configuration Tasks
Configuring an Event Log
Configuring a File ID
Configuring an Accounting Policy
Configuring Event Control and Throttle Rate
Configuring a Log Filter
Configuring an SNMP Trap Group
Configuring a Syslog Target
Log Management Tasks
Modifying a Log File
Deleting a Log File
Modifying a File ID
Deleting a File ID
Modifying a Syslog ID
Deleting a Syslog ID
Modifying an SNMP Trap Group
Deleting an SNMP Trap Group
Modifying a Log Filter
Deleting a Log Filter
Modifying Event Control Parameters
Returning to the Default Event Control Configuration
Log Command Reference
Command Hierarchies
Configuration Commands
Accounting Policy Commands
Event Control Commands
Event Handling Commands
Event Trigger Commands
Log file commands
Log Filter Commands
Syslog Commands
Logging Destination Commands
SNMP Trap Groups Commands
Show Commands
Clear Commands
Command Descriptions
Configuration Commands
Generic Commands
Accounting Policy Commands
Event Control Commands
Event Handling Commands
Event Trigger Commands
Log file commands
Log Filter Commands
Syslog Commands
Logging Destination Commands
SNMP Trap Groups Commands
Show Commands
Clear Commands
List of Acronyms
Supported Standards and Protocols
Customer Documentation and Product Support
7705 SAR Quick Reference Cards, Release 23.4
7705 SAR Documentation Suite Overview, Release 23.4
7705 SAR Installation, Provisioning, and Commissioning Checklist, Release 23.4
7705 SAR Card and Module Support Quick Reference Card, Release 23.4
7705 SAR Command Line Interface Quick Reference Card
7705 SAR Documentation Suite Overview, Release 23.4
7705 SAR Installation, Provisioning, and Commissioning Checklist, Release 23.4
7705 SAR Card and Module Support Quick Reference Card, Release 23.4
7705 SAR Command Line Interface Quick Reference Card