Nokia 7705 Service Aggregation Router, Release 8.0 R7
  Legal Disclaimers
  Customer Documentation and Product Support
  Legal Disclaimers
  Customer Documentation and Product Support
7705 SAR Configuration Notes, Release 8.0
  Release 8.0 configuration notes
    NG-MVPN Configuration Note
  Release 7.0 configuration notes
    Firewall Configuration Note
  Release 6.2 configuration notes
    Static to Dynamic IPSec Tunnels Configuration Note
    VLL over IPSec over VPLS Configuration Note
  Release 8.0 configuration notes
    NG-MVPN Configuration Note
  Release 7.0 configuration notes
    Firewall Configuration Note
  Release 6.2 configuration notes
    Static to Dynamic IPSec Tunnels Configuration Note
    VLL over IPSec over VPLS Configuration Note
7705 SAR Basic System Configuration Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR System Configuration Process
  3. CLI Usage
    3.1. CLI Structure
    3.2. Navigating in the CLI
      3.2.1. CLI Contexts
      3.2.2. Basic CLI Commands
      3.2.3. CLI Environment Commands
      3.2.4. CLI Monitor Commands
    3.3. Getting Help in the CLI
    3.4. The CLI Command Prompt
    3.5. Displaying Configuration Contexts
    3.6. EXEC Files
    3.7. Entering CLI Commands
      3.7.1. Command Completion
      3.7.2. Unordered Parameters
      3.7.3. Editing Keystrokes
      3.7.4. Absolute Paths
      3.7.5. History
      3.7.6. Entering Numerical Ranges
      3.7.7. Pipe/Match
      3.7.8. Pipe/Count
      3.7.9. Redirection
    3.8. CLI Configuration Rollback
      3.8.1. Rollback Checkpoint and Rescue Files
        3.8.1.1. Rollback File Backup
      3.8.2. Performing a CLI Configuration Reversion
        3.8.2.1. Rollback Restrictions
    3.9. Basic Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Basic CLI Commands
        3.9.1.2. Environment Commands
        3.9.1.3. Monitor Commands
        3.9.1.4. Rollback Commands
        3.9.1.5. Show Commands
      3.9.2. Command Descriptions
        3.9.2.1. Basic CLI Commands
        3.9.2.2. Environment Commands
        3.9.2.3. Monitor CLI Commands
        3.9.2.4. Rollback Commands
        3.9.2.5. Show Commands
  4. File System Management
    4.1. The File System
      4.1.1. Compact Flash Device
      4.1.2. URLs
      4.1.3. Wildcards
    4.2. Common Configuration Tasks
      4.2.1. Modifying File Attributes
      4.2.2. Creating and Navigating Directories
      4.2.3. Copying Files
      4.2.4. Moving Files
      4.2.5. Deleting Files and Removing Directories
      4.2.6. Displaying Directory and File Information
      4.2.7. Repairing the File System
    4.3. File System Command Reference
      4.3.1. Command Hierarchy
        4.3.1.1. Configuration Commands
      4.3.2. Command Descriptions
        4.3.2.1. Configuration Commands
  5. Boot Options
    5.1. System Initialization
      5.1.1. Configuration and Image Loading
        5.1.1.1. Persistence
      5.1.2. Automatic Discovery Protocol
        5.1.2.1. Self-discovery
        5.1.2.2. Network Discovery
        5.1.2.3. Configuration Discovery
        5.1.2.4. Test and Commit
      5.1.3. FIPS-140-2 Mode
        5.1.3.1. CSM and Data Path Security Features and Algorithms in FIPS-140-2 Mode
        5.1.3.2. SSH2 Approved Algorithms in FIPS-140-2 Mode
    5.2. Initial System Startup Process Overview
    5.3. Boot Loader File Protection
      5.3.1. Before Upgrading
      5.3.2. Performing the Upgrade
    5.4. Accessing the CLI
      5.4.1. Console Connection
      5.4.2. Telnet Connection
        5.4.2.1. Running Telnet
      5.4.3. SSH Connection
        5.4.3.1. Running SSH
    5.5. Accessing the Management Port on a 7705 SAR-W
    5.6. Accessing MPT Radios Connected to a 7705 SAR
    5.7. Configuration Notes
      5.7.1. Reference Sources
    5.8. Configuring Boot File Options with the CLI
    5.9. BOF Configuration Overview
    5.10. Basic BOF Configuration
    5.11. Configuring BOF Parameters
    5.12. Service Management Tasks
      5.12.1. System Administration Commands
        5.12.1.1. Viewing the Current Configuration
        5.12.1.2. Modifying or Deleting BOF Parameters
        5.12.1.3. Saving a Configuration
        5.12.1.4. Saving a Configuration to a Different Filename
        5.12.1.5. Rebooting
    5.13. BOF Command Reference
      5.13.1. Command Hierarchies
        5.13.1.1. Configuration Commands
        5.13.1.2. Show Commands
      5.13.2. Command Descriptions
        5.13.2.1. Configuration Commands
          5.13.2.1.1. File Management Commands
          5.13.2.1.2. BOF Processing Control Commands
          5.13.2.1.3. Console Port Configuration Commands
          5.13.2.1.4. Image and Configuration Management Commands
          5.13.2.1.5. CSM Management Configuration Commands
          5.13.2.1.6. DNS Configuration Commands
        5.13.2.2. Show Commands
  6. System Management
    6.1. System Management Parameters
      6.1.1. System Information
        6.1.1.1. System Name
        6.1.1.2. System Contact
        6.1.1.3. System Location
        6.1.1.4. System Coordinates
        6.1.1.5. Common Language Location Identifier
        6.1.1.6. System Identifier
        6.1.1.7. PoE Power Source
      6.1.2. System Time
        6.1.2.1. Time Zones
        6.1.2.2. NTP
        6.1.2.3. SNTP Time Synchronization
        6.1.2.4. PTP
        6.1.2.5. Time-of-Day Measurement (ToD-1pps)
        6.1.2.6. GNSS
        6.1.2.7. CRON
    6.2. High Availability
      6.2.1. High Availability Features
        6.2.1.1. Redundancy
          6.2.1.1.1. Software Redundancy
          6.2.1.1.2. Configuration Redundancy
          6.2.1.1.3. Component Redundancy
          6.2.1.1.4. Accounting Configuration Redundancy
          6.2.1.1.5. Multi-Chassis LAG Redundancy
        6.2.1.2. Nonstop Routing (NSR)
        6.2.1.3. In-service Upgrade
        6.2.1.4. CSM Switchover
        6.2.1.5. Synchronization
          6.2.1.5.1. Configuration and boot-env Synchronization
          6.2.1.5.2. State Database Synchronization
    6.3. CSM Synchronization and Redundancy
      6.3.1. Active and Standby Designations
      6.3.2. When the Active CSM Goes Offline
      6.3.3. Persistence
      6.3.4. Administrative Tasks
        6.3.4.1. Saving Configurations
        6.3.4.2. Specifying Post-Boot Configuration Files
      6.3.5. Automatic Synchronization
        6.3.5.1. Boot-Env Option
        6.3.5.2. Config Option
      6.3.6. Manual Synchronization
        6.3.6.1. Forcing a Switchover
    6.4. Node Timing
      6.4.1. External Timing Mode
      6.4.2. Line Timing Mode
      6.4.3. Adaptive Clock Recovery (ACR)
        6.4.3.1. ACR States
        6.4.3.2. ACR Statistics
      6.4.4. Differential Clock Recovery (DCR)
        6.4.4.1. DCR Frequencies
      6.4.5. Proprietary Clock Recovery (PCR)
      6.4.6. IEEE 1588v2 PTP
        6.4.6.1. PTP Clock Synchronization
        6.4.6.2. Performance Considerations
        6.4.6.3. PTP Capabilities
        6.4.6.4. PTP Ordinary Slave Clock For Frequency
        6.4.6.5. PTP Ordinary Master Clock For Frequency
        6.4.6.6. PTP Boundary Clock For Frequency
        6.4.6.7. PTP Ordinary Slave Clock for Time of Day/Phase Recovery
        6.4.6.8. PTP Boundary Clock for Time of Day/Phase Recovery
        6.4.6.9. PTP End-to-End Transparent Clock for Time of Day/Phase Recovery
        6.4.6.10. PTP Master Clock for Time of Day/Phase Distribution
        6.4.6.11. PTP Clock Redundancy
        6.4.6.12. PTP Ethernet Capabilities
        6.4.6.13. ITU-T G.8275.1
          6.4.6.13.1. Synchronization Certainty/Uncertainty
        6.4.6.14. PTP Statistics
      6.4.7. Network Timing Reference (NTR)
        6.4.7.1. NTR on xDSL Interfaces
        6.4.7.2. NTR on SHDSL Interfaces
      6.4.8. Synchronous Ethernet
      6.4.9. Synchronization Status Messaging with Quality Level Selection
        6.4.9.1. Timing Reference Selection Based on Quality Level
          6.4.9.1.1. SSM/ESMC QL Transmission
    6.5. System Configuration Process Overview
    6.6. Configuration Notes
      6.6.1. Reference Sources
    6.7. Configuring System Management with CLI
    6.8. System Management Configuration
      6.8.1. Saving Configurations
    6.9. Basic System Configuration
    6.10. Common Configuration Tasks
      6.10.1. System Information
        6.10.1.1. System Information Parameters
          6.10.1.1.1. Name
          6.10.1.1.2. Contact
          6.10.1.1.3. Location
          6.10.1.1.4. CLLI Code
          6.10.1.1.5. Coordinates
          6.10.1.1.6. System Identifier
        6.10.1.2. System Time Elements
          6.10.1.2.1. Zone
          6.10.1.2.2. Summer Time Conditions
          6.10.1.2.3. NTP
          6.10.1.2.4. SNTP
          6.10.1.2.5. PTP
          6.10.1.2.6. Time-of-Day Measurement (ToD-1pps)
          6.10.1.2.7. GNSS
          6.10.1.2.8. CRON
      6.10.2. Configuring Synchronization and Redundancy
        6.10.2.1. Configuring Synchronization
        6.10.2.2. Configuring Manual Synchronization
        6.10.2.3. Forcing a Switchover
        6.10.2.4. Configuring Synchronization Options
        6.10.2.5. Configuring Multi-Chassis Redundancy
      6.10.3. Configuring ATM Parameters
      6.10.4. Configuring Backup Copies
      6.10.5. Configuring System Administration Parameters
        6.10.5.1. Disconnect
        6.10.5.2. Set-time
        6.10.5.3. Display-config
        6.10.5.4. Tech-support
        6.10.5.5. Save
        6.10.5.6. Reboot
        6.10.5.7. Post-Boot Configuration Extension Files
          6.10.5.7.1. Show Command Output and Console Messages
      6.10.6. System Timing
        6.10.6.1. Entering Edit Mode
        6.10.6.2. Configuring Timing References
        6.10.6.3. Configuring IEEE 1588v2 PTP
        6.10.6.4. Configuring QL Values for SSM
        6.10.6.5. Using the Revert Command
        6.10.6.6. Other Editing Commands
        6.10.6.7. Forcing a Specific Reference
    6.11. Configuring System Monitoring Thresholds
      6.11.1. Creating Events
    6.12. Configuring LLDP
    6.13. System Command Reference
      6.13.1. Command Hierarchies
        6.13.1.1. Configuration Commands
          6.13.1.1.1. System Information and General Commands
          6.13.1.1.2. System Alarm Commands
          6.13.1.1.3. Persistence Commands
          6.13.1.1.4. System Time Commands
          6.13.1.1.5. CRON Commands
          6.13.1.1.6. System Synchronization Commands
          6.13.1.1.7. System LLDP Commands
          6.13.1.1.8. System PTP Commands
        6.13.1.2. Administration Commands
          6.13.1.2.1. System Administration Commands
          6.13.1.2.2. High Availability (Redundancy) Commands
        6.13.1.3. Show Commands
        6.13.1.4. Debug Commands
        6.13.1.5. Clear Commands
      6.13.2. Command Descriptions
        6.13.2.1. Configuration Commands
          6.13.2.1.1. Generic Commands
          6.13.2.1.2. System Information and General Commands
          6.13.2.1.3. System Alarm Commands
          6.13.2.1.4. Persistence Commands
          6.13.2.1.5. System Time Commands
          6.13.2.1.6. CRON Commands
          6.13.2.1.7. System Synchronization Configuration Commands
          6.13.2.1.8. LLDP System Commands
          6.13.2.1.9. System PTP Commands
        6.13.2.2. Administration Commands
          6.13.2.2.1. System Administration Commands
          6.13.2.2.2. High Availability (Redundancy) Commands
        6.13.2.3. Show Commands
        6.13.2.4. Debug Commands
        6.13.2.5. Clear Commands
  7. List of Acronyms
  8. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR System Configuration Process
  3. CLI Usage
    3.1. CLI Structure
    3.2. Navigating in the CLI
      3.2.1. CLI Contexts
      3.2.2. Basic CLI Commands
      3.2.3. CLI Environment Commands
      3.2.4. CLI Monitor Commands
    3.3. Getting Help in the CLI
    3.4. The CLI Command Prompt
    3.5. Displaying Configuration Contexts
    3.6. EXEC Files
    3.7. Entering CLI Commands
      3.7.1. Command Completion
      3.7.2. Unordered Parameters
      3.7.3. Editing Keystrokes
      3.7.4. Absolute Paths
      3.7.5. History
      3.7.6. Entering Numerical Ranges
      3.7.7. Pipe/Match
      3.7.8. Pipe/Count
      3.7.9. Redirection
    3.8. CLI Configuration Rollback
      3.8.1. Rollback Checkpoint and Rescue Files
        3.8.1.1. Rollback File Backup
      3.8.2. Performing a CLI Configuration Reversion
        3.8.2.1. Rollback Restrictions
    3.9. Basic Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Basic CLI Commands
        3.9.1.2. Environment Commands
        3.9.1.3. Monitor Commands
        3.9.1.4. Rollback Commands
        3.9.1.5. Show Commands
      3.9.2. Command Descriptions
        3.9.2.1. Basic CLI Commands
        3.9.2.2. Environment Commands
        3.9.2.3. Monitor CLI Commands
        3.9.2.4. Rollback Commands
        3.9.2.5. Show Commands
  4. File System Management
    4.1. The File System
      4.1.1. Compact Flash Device
      4.1.2. URLs
      4.1.3. Wildcards
    4.2. Common Configuration Tasks
      4.2.1. Modifying File Attributes
      4.2.2. Creating and Navigating Directories
      4.2.3. Copying Files
      4.2.4. Moving Files
      4.2.5. Deleting Files and Removing Directories
      4.2.6. Displaying Directory and File Information
      4.2.7. Repairing the File System
    4.3. File System Command Reference
      4.3.1. Command Hierarchy
        4.3.1.1. Configuration Commands
      4.3.2. Command Descriptions
        4.3.2.1. Configuration Commands
  5. Boot Options
    5.1. System Initialization
      5.1.1. Configuration and Image Loading
        5.1.1.1. Persistence
      5.1.2. Automatic Discovery Protocol
        5.1.2.1. Self-discovery
        5.1.2.2. Network Discovery
        5.1.2.3. Configuration Discovery
        5.1.2.4. Test and Commit
      5.1.3. FIPS-140-2 Mode
        5.1.3.1. CSM and Data Path Security Features and Algorithms in FIPS-140-2 Mode
        5.1.3.2. SSH2 Approved Algorithms in FIPS-140-2 Mode
    5.2. Initial System Startup Process Overview
    5.3. Boot Loader File Protection
      5.3.1. Before Upgrading
      5.3.2. Performing the Upgrade
    5.4. Accessing the CLI
      5.4.1. Console Connection
      5.4.2. Telnet Connection
        5.4.2.1. Running Telnet
      5.4.3. SSH Connection
        5.4.3.1. Running SSH
    5.5. Accessing the Management Port on a 7705 SAR-W
    5.6. Accessing MPT Radios Connected to a 7705 SAR
    5.7. Configuration Notes
      5.7.1. Reference Sources
    5.8. Configuring Boot File Options with the CLI
    5.9. BOF Configuration Overview
    5.10. Basic BOF Configuration
    5.11. Configuring BOF Parameters
    5.12. Service Management Tasks
      5.12.1. System Administration Commands
        5.12.1.1. Viewing the Current Configuration
        5.12.1.2. Modifying or Deleting BOF Parameters
        5.12.1.3. Saving a Configuration
        5.12.1.4. Saving a Configuration to a Different Filename
        5.12.1.5. Rebooting
    5.13. BOF Command Reference
      5.13.1. Command Hierarchies
        5.13.1.1. Configuration Commands
        5.13.1.2. Show Commands
      5.13.2. Command Descriptions
        5.13.2.1. Configuration Commands
          5.13.2.1.1. File Management Commands
          5.13.2.1.2. BOF Processing Control Commands
          5.13.2.1.3. Console Port Configuration Commands
          5.13.2.1.4. Image and Configuration Management Commands
          5.13.2.1.5. CSM Management Configuration Commands
          5.13.2.1.6. DNS Configuration Commands
        5.13.2.2. Show Commands
  6. System Management
    6.1. System Management Parameters
      6.1.1. System Information
        6.1.1.1. System Name
        6.1.1.2. System Contact
        6.1.1.3. System Location
        6.1.1.4. System Coordinates
        6.1.1.5. Common Language Location Identifier
        6.1.1.6. System Identifier
        6.1.1.7. PoE Power Source
      6.1.2. System Time
        6.1.2.1. Time Zones
        6.1.2.2. NTP
        6.1.2.3. SNTP Time Synchronization
        6.1.2.4. PTP
        6.1.2.5. Time-of-Day Measurement (ToD-1pps)
        6.1.2.6. GNSS
        6.1.2.7. CRON
    6.2. High Availability
      6.2.1. High Availability Features
        6.2.1.1. Redundancy
          6.2.1.1.1. Software Redundancy
          6.2.1.1.2. Configuration Redundancy
          6.2.1.1.3. Component Redundancy
          6.2.1.1.4. Accounting Configuration Redundancy
          6.2.1.1.5. Multi-Chassis LAG Redundancy
        6.2.1.2. Nonstop Routing (NSR)
        6.2.1.3. In-service Upgrade
        6.2.1.4. CSM Switchover
        6.2.1.5. Synchronization
          6.2.1.5.1. Configuration and boot-env Synchronization
          6.2.1.5.2. State Database Synchronization
    6.3. CSM Synchronization and Redundancy
      6.3.1. Active and Standby Designations
      6.3.2. When the Active CSM Goes Offline
      6.3.3. Persistence
      6.3.4. Administrative Tasks
        6.3.4.1. Saving Configurations
        6.3.4.2. Specifying Post-Boot Configuration Files
      6.3.5. Automatic Synchronization
        6.3.5.1. Boot-Env Option
        6.3.5.2. Config Option
      6.3.6. Manual Synchronization
        6.3.6.1. Forcing a Switchover
    6.4. Node Timing
      6.4.1. External Timing Mode
      6.4.2. Line Timing Mode
      6.4.3. Adaptive Clock Recovery (ACR)
        6.4.3.1. ACR States
        6.4.3.2. ACR Statistics
      6.4.4. Differential Clock Recovery (DCR)
        6.4.4.1. DCR Frequencies
      6.4.5. Proprietary Clock Recovery (PCR)
      6.4.6. IEEE 1588v2 PTP
        6.4.6.1. PTP Clock Synchronization
        6.4.6.2. Performance Considerations
        6.4.6.3. PTP Capabilities
        6.4.6.4. PTP Ordinary Slave Clock For Frequency
        6.4.6.5. PTP Ordinary Master Clock For Frequency
        6.4.6.6. PTP Boundary Clock For Frequency
        6.4.6.7. PTP Ordinary Slave Clock for Time of Day/Phase Recovery
        6.4.6.8. PTP Boundary Clock for Time of Day/Phase Recovery
        6.4.6.9. PTP End-to-End Transparent Clock for Time of Day/Phase Recovery
        6.4.6.10. PTP Master Clock for Time of Day/Phase Distribution
        6.4.6.11. PTP Clock Redundancy
        6.4.6.12. PTP Ethernet Capabilities
        6.4.6.13. ITU-T G.8275.1
          6.4.6.13.1. Synchronization Certainty/Uncertainty
        6.4.6.14. PTP Statistics
      6.4.7. Network Timing Reference (NTR)
        6.4.7.1. NTR on xDSL Interfaces
        6.4.7.2. NTR on SHDSL Interfaces
      6.4.8. Synchronous Ethernet
      6.4.9. Synchronization Status Messaging with Quality Level Selection
        6.4.9.1. Timing Reference Selection Based on Quality Level
          6.4.9.1.1. SSM/ESMC QL Transmission
    6.5. System Configuration Process Overview
    6.6. Configuration Notes
      6.6.1. Reference Sources
    6.7. Configuring System Management with CLI
    6.8. System Management Configuration
      6.8.1. Saving Configurations
    6.9. Basic System Configuration
    6.10. Common Configuration Tasks
      6.10.1. System Information
        6.10.1.1. System Information Parameters
          6.10.1.1.1. Name
          6.10.1.1.2. Contact
          6.10.1.1.3. Location
          6.10.1.1.4. CLLI Code
          6.10.1.1.5. Coordinates
          6.10.1.1.6. System Identifier
        6.10.1.2. System Time Elements
          6.10.1.2.1. Zone
          6.10.1.2.2. Summer Time Conditions
          6.10.1.2.3. NTP
          6.10.1.2.4. SNTP
          6.10.1.2.5. PTP
          6.10.1.2.6. Time-of-Day Measurement (ToD-1pps)
          6.10.1.2.7. GNSS
          6.10.1.2.8. CRON
      6.10.2. Configuring Synchronization and Redundancy
        6.10.2.1. Configuring Synchronization
        6.10.2.2. Configuring Manual Synchronization
        6.10.2.3. Forcing a Switchover
        6.10.2.4. Configuring Synchronization Options
        6.10.2.5. Configuring Multi-Chassis Redundancy
      6.10.3. Configuring ATM Parameters
      6.10.4. Configuring Backup Copies
      6.10.5. Configuring System Administration Parameters
        6.10.5.1. Disconnect
        6.10.5.2. Set-time
        6.10.5.3. Display-config
        6.10.5.4. Tech-support
        6.10.5.5. Save
        6.10.5.6. Reboot
        6.10.5.7. Post-Boot Configuration Extension Files
          6.10.5.7.1. Show Command Output and Console Messages
      6.10.6. System Timing
        6.10.6.1. Entering Edit Mode
        6.10.6.2. Configuring Timing References
        6.10.6.3. Configuring IEEE 1588v2 PTP
        6.10.6.4. Configuring QL Values for SSM
        6.10.6.5. Using the Revert Command
        6.10.6.6. Other Editing Commands
        6.10.6.7. Forcing a Specific Reference
    6.11. Configuring System Monitoring Thresholds
      6.11.1. Creating Events
    6.12. Configuring LLDP
    6.13. System Command Reference
      6.13.1. Command Hierarchies
        6.13.1.1. Configuration Commands
          6.13.1.1.1. System Information and General Commands
          6.13.1.1.2. System Alarm Commands
          6.13.1.1.3. Persistence Commands
          6.13.1.1.4. System Time Commands
          6.13.1.1.5. CRON Commands
          6.13.1.1.6. System Synchronization Commands
          6.13.1.1.7. System LLDP Commands
          6.13.1.1.8. System PTP Commands
        6.13.1.2. Administration Commands
          6.13.1.2.1. System Administration Commands
          6.13.1.2.2. High Availability (Redundancy) Commands
        6.13.1.3. Show Commands
        6.13.1.4. Debug Commands
        6.13.1.5. Clear Commands
      6.13.2. Command Descriptions
        6.13.2.1. Configuration Commands
          6.13.2.1.1. Generic Commands
          6.13.2.1.2. System Information and General Commands
          6.13.2.1.3. System Alarm Commands
          6.13.2.1.4. Persistence Commands
          6.13.2.1.5. System Time Commands
          6.13.2.1.6. CRON Commands
          6.13.2.1.7. System Synchronization Configuration Commands
          6.13.2.1.8. LLDP System Commands
          6.13.2.1.9. System PTP Commands
        6.13.2.2. Administration Commands
          6.13.2.2.1. System Administration Commands
          6.13.2.2.2. High Availability (Redundancy) Commands
        6.13.2.3. Show Commands
        6.13.2.4. Debug Commands
        6.13.2.5. Clear Commands
  7. List of Acronyms
  8. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR Interface Configuration Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Interface Configuration Process
  3. 7705 SAR Interfaces
    3.1. Configuration Overview
      3.1.1. Configuring the IOM and Card Slot
      3.1.2. Configuring Adapter Cards and Modules
        3.1.2.1. Provisioning Chassis Slots for Adapter Cards
        3.1.2.2. Maximum Number of Adapter Cards in a Chassis
        3.1.2.3. Evolution of Ethernet Adapter Cards, Modules, and Platforms
        3.1.2.4. Channelized Adapter Card Support
          3.1.2.4.1. PPP Over Fractional T1/E1
      3.1.3. Configuring Ports
        3.1.3.1. Ethernet
          3.1.3.1.1. 6-port Ethernet 10Gbps Adapter Card
          3.1.3.1.2. 8-port Ethernet Adapter Card
          3.1.3.1.3. 8-port Gigabit Ethernet Adapter Card
          3.1.3.1.4. 10-port 1GigE/1-port 10GigE X-Adapter Card
          3.1.3.1.5. 2-port 10GigE (Ethernet) Adapter Card/Module
          3.1.3.1.6. Packet Microwave Adapter Card
          3.1.3.1.7. 4-port SAR-H Fast Ethernet Module
          3.1.3.1.8. 6-port SAR-M Ethernet Module
          3.1.3.1.9. 7705 SAR-A
          3.1.3.1.10. 7705 SAR-Ax
          3.1.3.1.11. 7705 SAR-H
          3.1.3.1.12. 7705 SAR-Hc
          3.1.3.1.13. 7705 SAR-M
          3.1.3.1.14. 7705 SAR-W
          3.1.3.1.15. 7705 SAR-Wx
          3.1.3.1.16. 7705 SAR-X
        3.1.3.2. TDM
          3.1.3.2.1. 16-port T1/E1 ASAP Adapter Card
          3.1.3.2.2. 32-port T1/E1 ASAP Adapter Card
          3.1.3.2.3. 2-port OC3/STM1 Channelized Adapter Card
          3.1.3.2.4. 4-port OC3/STM1 / 1-port OC12/STM4 Adapter Card
          3.1.3.2.5. 4-port DS3/E3 Adapter Card
          3.1.3.2.6. 8-port Voice & Teleprotection Card
          3.1.3.2.7. 12-port Serial Data Interface Card
          3.1.3.2.8. 4-port T1/E1 and RS-232 Combination Module
          3.1.3.2.9. 7705 SAR-A
          3.1.3.2.10. 7705 SAR-Hc
          3.1.3.2.11. 7705 SAR-M
          3.1.3.2.12. 7705 SAR-X
        3.1.3.3. DSL
        3.1.3.4. GNSS Receiver
        3.1.3.5. GPON
        3.1.3.6. Multilink Bundles
        3.1.3.7. IMA
        3.1.3.8. SONET/SDH
        3.1.3.9. Voice
          3.1.3.9.1. 6-port E&M Adapter Card
          3.1.3.9.2. 8-port Voice & Teleprotection Card
          3.1.3.9.3. 8-port FXO Adapter Card
          3.1.3.9.4. 6-port FXS Adapter Card
        3.1.3.10. Microwave Link
        3.1.3.11. CLI Identifiers for Adapter Cards, Modules and Platforms
        3.1.3.12. Access, Network, and Hybrid Ports
          3.1.3.12.1. Rate Limiting
          3.1.3.12.2. Access Ports
          3.1.3.12.3. Network Ports
          3.1.3.12.4. Hybrid Ports
      3.1.4. Configuring SCADA Bridges
    3.2. Port Features
      3.2.1. Multilink Point-to-Point Protocol
        3.2.1.1. MLPPP Overview
        3.2.1.2. Protocol Field (PID)
        3.2.1.3. B&E Bits
        3.2.1.4. Sequence Number
        3.2.1.5. Information Field
        3.2.1.6. Padding
        3.2.1.7. FCS
        3.2.1.8. LCP
        3.2.1.9. T1/E1 Link Hold Timers
      3.2.2. Multi-Class MLPPP
        3.2.2.1. QoS in MC-MLPPP
      3.2.3. cHDLC
        3.2.3.1. SLARP
      3.2.4. Inverse Multiplexing Over ATM (IMA)
      3.2.5. Network Synchronization on Ports and Circuits
        3.2.5.1. Network Synchronization on T1/E1, Ethernet, GPON, and DSL Ports
        3.2.5.2. Network Synchronization on SONET/SDH Ports
        3.2.5.3. Network Synchronization on DS3/E3 Ports
        3.2.5.4. Network Synchronization on DS3 CES Circuits
        3.2.5.5. Network Synchronization on T1/E1 Ports and Circuits
      3.2.6. Node Synchronization From GNSS Receiver Ports
      3.2.7. Flow Control on Ethernet Ports
      3.2.8. Ethernet OAM
        3.2.8.1. Ethernet OAM Overview
        3.2.8.2. CRC (Cyclic Redundancy Check) Monitoring
        3.2.8.3. Remote Loopback
        3.2.8.4. 802.3ah OAMPDU Tunneling and Termination for Epipe Service
        3.2.8.5. Dying Gasp
      3.2.9. Ethernet Loopbacks
        3.2.9.1. Line and Internal Ethernet Loopbacks
          3.2.9.1.1. MAC Swapping
          3.2.9.1.2. Interaction of Ethernet Port Loopback with Other Features
        3.2.9.2. CFM Loopbacks for OAM on Ethernet Ports
          3.2.9.2.1. CFM Loopback Overview
          3.2.9.2.2. CFM Loopback Mechanics
      3.2.10. Ethernet Port Down-When-Looped
      3.2.11. Ethernet Ring (Adapter Card and Module)
      3.2.12. MTU Configuration Guidelines
        3.2.12.1. MTU Configuration Overview
        3.2.12.2. IP Fragmentation
        3.2.12.3. Jumbo Frames
          3.2.12.3.1. Behavior of Adapter Cards Not Supporting Jumbo Frames on 7705 SAR-8 and 7705 SAR-18 only
          3.2.12.3.2. Jumbo Frame Behavior on the Fixed Platforms
          3.2.12.3.3. Multicast Support for Jumbo Frames
          3.2.12.3.4. PMC Jumbo Frame Support
        3.2.12.4. Default Port MTU Values
      3.2.13. LAG
        3.2.13.1. LAG Overview
        3.2.13.2. LACP and Active/Standby Operation
        3.2.13.3. QoS Adaptation for LAG on Access
          3.2.13.3.1. Adaptive QoS Examples (Distribute Mode)
        3.2.13.4. Access Ingress Fabric Shaping
        3.2.13.5. Hold-down Timers
        3.2.13.6. Multi-Chassis LAG
        3.2.13.7. Static LAG (Active/Standby LAG Operation without LACP)
        3.2.13.8. LAG Support on Mixed-Generation Hardware
          3.2.13.8.1. LAG Configuration at SAP Level
          3.2.13.8.2. LAG Configuration at Port Level
      3.2.14. LAG and ECMP Hashing
        3.2.14.1. Per-Flow Hashing
        3.2.14.2. Per-Service Hashing
        3.2.14.3. LSR Hashing
          3.2.14.3.1. LSR Label-only Hashing
          3.2.14.3.2. LSR Label-IP Hashing
          3.2.14.3.3. LSR Label-IP Hashing with Layer 4 Header and TEID
          3.2.14.3.4. Label Stack Profile Options
          3.2.14.3.5. Ingress Port
        3.2.14.4. Layer 4 Load Balancing
        3.2.14.5. TEID Hashing for GTP-encapsulated Traffic
        3.2.14.6. Entropy Labels
      3.2.15. Automatic Protection Switching
        3.2.15.1. APS Overview
        3.2.15.2. SC-APS
        3.2.15.3. MC-APS
          3.2.15.3.1. MC-APS and Inter-Chassis Backup
        3.2.15.4. K1 and K2 Bytes
          3.2.15.4.1. Bidirectional 1+1 APS example
        3.2.15.5. Revertive Mode
        3.2.15.6. APS Tools Commands
          3.2.15.6.1. Lockout Protection
          3.2.15.6.2. Request Switch of Active to Protection
          3.2.15.6.3. Request Switch of Active to Working
          3.2.15.6.4. Forced Switch of Working to Protection
          3.2.15.6.5. Forced Switch of Active to Working
          3.2.15.6.6. Exercise
        3.2.15.7. APS Failure Codes
          3.2.15.7.1. Protection Switching Byte Failure (APS-PSB)
          3.2.15.7.2. Channel Mismatch Failure (APS-CM)
          3.2.15.7.3. APS Mode Mismatch Failure (APS-MM)
          3.2.15.7.4. Far-End Protection Line Failure (APS-FEPL)
      3.2.16. Deploying Preprovisioned Components
      3.2.17. Microwave Link
        3.2.17.1. Microwave Link Overview
        3.2.17.2. Standalone Mode
        3.2.17.3. Single NE Mode
          3.2.17.3.1. Single NE Management
          3.2.17.3.2. Microwave Link Fast Fault Detection (FFD)
          3.2.17.3.3. 1+1 HSB
          3.2.17.3.4. 1+1 Switching Operation
        3.2.17.4. Frequency Synchronization
        3.2.17.5. RSL History
      3.2.18. DSL Bonding
        3.2.18.1. DSL Bonding Overview
        3.2.18.2. ATM Bonding
        3.2.18.3. PTM Bonding
        3.2.18.4. Pairs Within a Bonded Group
        3.2.18.5. Configuration
        3.2.18.6. Layer 3 Protocol Support and Service Provisioning
      3.2.19. Custom Alarms on Ethernet Ports
    3.3. 802.1x Network Access Control
      3.3.1. 802.1x Basics
      3.3.2. 802.1x Modes
      3.3.3. 802.1x Timers
      3.3.4. 802.1x Configuration and Limitations
    3.4. MAC Authentication
    3.5. Link Layer Discovery Protocol (LLDP)
      3.5.1. LLDP Protocol Features
    3.6. Surveillance, Control, and Data Acquisition (SCADA) Support
      3.6.1. Multidrop Data Bridge
      3.6.2. PCM Multidrop Bridge
      3.6.3. Redundant Masters
      3.6.4. Squelch Functionality
      3.6.5. Voice Conference Bridge
        3.6.5.1. VCB Applications
        3.6.5.2. Gain
      3.6.6. Serial Transport Over Raw Sockets
        3.6.6.1. Raw Socket Configuration
        3.6.6.2. Raw Socket Packet Processing
          3.6.6.2.1. Raw Socket Processing for UDP Sessions
          3.6.6.2.2. Raw Socket Processing for TCP Sessions
        3.6.6.3. Raw Socket Squelch Functionality
    3.7. Configuration Notes
      3.7.1. Reference Sources
    3.8. Configuring Physical Components with CLI
    3.9. Preprovisioning Guidelines
      3.9.1. Predefining Entities
      3.9.2. Preprovisioning a Port or SCADA Bridge
      3.9.3. Maximizing Bandwidth Use
      3.9.4. Using Partial Bandwidth
    3.10. Basic Configuration
    3.11. Common Configuration Tasks
      3.11.1. Configuring Cards and Adapter Cards
        3.11.1.1. Configuring Cards
        3.11.1.2. Configuring Adapter Card Network Queue QoS Policies
        3.11.1.3. Configuring Ring Adapter Card or Module Network and Network Queue QoS Policies
        3.11.1.4. Configuring Adapter Card Fabric Statistics
        3.11.1.5. Configuring Adapter Card Fabric Profile
        3.11.1.6. Configuring Adapter Card Clock Mode
        3.11.1.7. Configuring Adapter Card Voice Attributes
        3.11.1.8. Configuring Ring Adapter Card or Module Parameters
        3.11.1.9. Configuring Auxiliary Alarm Card, Chassis, and Ethernet Port External Alarm Parameters
        3.11.1.10. Displaying Adapter Card Information
      3.11.2. Configuring Ports
        3.11.2.1. Configuring APS Port Parameters
        3.11.2.2. Configuring a Microwave Link
        3.11.2.3. Configuring Ethernet Port Parameters
          3.11.2.3.1. Configuring an Ethernet Network Port
          3.11.2.3.2. Configuring an Ethernet Access Port
          3.11.2.3.3. Configuring a Hybrid Ethernet Port
          3.11.2.3.4. Configuring 802.1x Authentication Port Parameters
          3.11.2.3.5. Configuring MAC Authentication Port Parameters
        3.11.2.4. Configuring DSL Port Parameters
          3.11.2.4.1. Configuring a DSL Network Port
          3.11.2.4.2. Configuring a DSL Access Port
        3.11.2.5. Configuring SONET/SDH Port Parameters
          3.11.2.5.1. Configuring a SONET/SDH Access Port
          3.11.2.5.2. Configuring a SONET/SDH Network Port
        3.11.2.6. Configuring Voice Ports
        3.11.2.7. Configuring Teleprotection Ports
        3.11.2.8. Configuring TDM PPP
        3.11.2.9. Configuring Channelized Ports
          3.11.2.9.1. Verifying the Adapter Card Type
        3.11.2.10. Configuring Fractional T1/E1 Ports for PPP Encapsulation
        3.11.2.11. Configuring T1 Line Buildout
        3.11.2.12. Configuring TDM E1 SSM
        3.11.2.13. Configuring ATM Interface Parameters
          3.11.2.13.1. ATM Interface Commands
        3.11.2.14. Configuring Multilink PPP Bundles
        3.11.2.15. Configuring MC-MLPPP
        3.11.2.16. Configuring LAG Parameters
        3.11.2.17. Configuring Multilink ATM Inverse Multiplexing (IMA) Groups
          3.11.2.17.1. Configuring IMA Groups
          3.11.2.17.2. Configuration Notes for IMA Groups
          3.11.2.17.3. IMA Test Procedure
        3.11.2.18. Configuring SDI Ports for IPCP Encapsulation
        3.11.2.19. Configuring TDM and SDI Ports for Frame Relay Encapsulation
        3.11.2.20. Configuring TDM and SDI Ports for HDLC Encapsulation
        3.11.2.21. Configuring TDM and SDI Ports for Cisco HDLC Encapsulation
        3.11.2.22. Configuring GNSS Receiver Port Parameters
        3.11.2.23. Configuring Serial Ports for Raw Socket Transport
      3.11.3. Configuring SCADA Bridge Parameters
    3.12. Service Management Tasks
      3.12.1. Changing a Provisioned Adapter Card Type
      3.12.2. Deleting an Adapter Card
    3.13. Configuration Command Reference
      3.13.1. Command Hierarchies
        3.13.1.1. Card Commands
        3.13.1.2. Adapter Card Commands
        3.13.1.3. External Alarm Commands
        3.13.1.4. APS Port Commands
        3.13.1.5. Microwave Link Commands
        3.13.1.6. Port Configuration Commands
        3.13.1.7. Ethernet Commands
        3.13.1.8. DSL Commands
        3.13.1.9. GPON Commands
        3.13.1.10. GNSS Commands
        3.13.1.11. IEEE 802.1x Ethernet Port Commands
        3.13.1.12. LLDP Ethernet Port Commands
        3.13.1.13. Ring Virtual Port Ethernet Commands
        3.13.1.14. Ring MAC Operations Commands
        3.13.1.15. Multilink Bundle and IMA Group Commands
        3.13.1.16. Serial Commands
        3.13.1.17. SONET/SDH Commands
        3.13.1.18. TDM Commands
        3.13.1.19. DS1 Commands
        3.13.1.20. DS3 Commands
        3.13.1.21. E1 Commands
        3.13.1.22. E3 Commands
        3.13.1.23. Voice Commands
        3.13.1.24. LAG Commands
        3.13.1.25. SCADA Commands
      3.13.2. Command Descriptions
        3.13.2.1. Generic Commands
        3.13.2.2. Card Commands
        3.13.2.3. Adapter Card Commands
        3.13.2.4. Interface QoS Commands
        3.13.2.5. External Alarm Commands
        3.13.2.6. APS Port Commands
        3.13.2.7. Microwave Link Commands
        3.13.2.8. General Port Commands
        3.13.2.9. Ethernet Commands
        3.13.2.10. DSL Commands
        3.13.2.11. GPON Commands
        3.13.2.12. GNSS Commands
        3.13.2.13. IEEE 802.1x Ethernet Port Commands
        3.13.2.14. LLDP Ethernet Port Commands
        3.13.2.15. Ring MAC Operations Commands
        3.13.2.16. Serial Commands
        3.13.2.17. RS-232, V.35, and X.21 Channel Group Commands
        3.13.2.18. SONET/SDH Port Commands
        3.13.2.19. SONET/SDH Path Commands
        3.13.2.20. Network Port Commands
        3.13.2.21. Multilink Bundle and IMA Group Commands
        3.13.2.22. ATM Interface Commands
        3.13.2.23. TDM Commands
        3.13.2.24. DS1 and E1 Commands
        3.13.2.25. DS1 and E1 Channel Group Commands
        3.13.2.26. DS3 and E3 Commands
        3.13.2.27. Voice Commands
        3.13.2.28. Voice Channel Group Commands
        3.13.2.29. LAG Commands
        3.13.2.30. Frame Relay Commands
        3.13.2.31. Cisco HDLC Commands
        3.13.2.32. SCADA Commands
    3.14. Show, Monitor, Clear, and Debug Command Reference
      3.14.1. Command Hierarchies
        3.14.1.1. Show Commands
        3.14.1.2. Monitor Commands
        3.14.1.3. Clear Commands
        3.14.1.4. Debug Commands
      3.14.2. Command Descriptions
        3.14.2.1. Show Commands
          3.14.2.1.1. Show APS Commands
          3.14.2.1.2. Show Card Commands
          3.14.2.1.3. Show External Alarms Commands
          3.14.2.1.4. Show Microwave Link Commands
          3.14.2.1.5. Show Port Commands
          3.14.2.1.6. Show ATM Port Commands
          3.14.2.1.7. Show Port-tree Commands
          3.14.2.1.8. Show LAG Commands
          3.14.2.1.9. Show Multilink Bundle and IMA Group Commands
          3.14.2.1.10. Show ATM IMA Group Commands
          3.14.2.1.11. Show SCADA Commands
        3.14.2.2. Monitor Commands
          3.14.2.2.1. Port Monitor Commands
          3.14.2.2.2. Fabric Profile Statistics Monitor Commands
          3.14.2.2.3. SCADA Monitor Commands
        3.14.2.3. Clear Commands
        3.14.2.4. Debug Commands
  4. List of Acronyms
  5. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Interface Configuration Process
  3. 7705 SAR Interfaces
    3.1. Configuration Overview
      3.1.1. Configuring the IOM and Card Slot
      3.1.2. Configuring Adapter Cards and Modules
        3.1.2.1. Provisioning Chassis Slots for Adapter Cards
        3.1.2.2. Maximum Number of Adapter Cards in a Chassis
        3.1.2.3. Evolution of Ethernet Adapter Cards, Modules, and Platforms
        3.1.2.4. Channelized Adapter Card Support
          3.1.2.4.1. PPP Over Fractional T1/E1
      3.1.3. Configuring Ports
        3.1.3.1. Ethernet
          3.1.3.1.1. 6-port Ethernet 10Gbps Adapter Card
          3.1.3.1.2. 8-port Ethernet Adapter Card
          3.1.3.1.3. 8-port Gigabit Ethernet Adapter Card
          3.1.3.1.4. 10-port 1GigE/1-port 10GigE X-Adapter Card
          3.1.3.1.5. 2-port 10GigE (Ethernet) Adapter Card/Module
          3.1.3.1.6. Packet Microwave Adapter Card
          3.1.3.1.7. 4-port SAR-H Fast Ethernet Module
          3.1.3.1.8. 6-port SAR-M Ethernet Module
          3.1.3.1.9. 7705 SAR-A
          3.1.3.1.10. 7705 SAR-Ax
          3.1.3.1.11. 7705 SAR-H
          3.1.3.1.12. 7705 SAR-Hc
          3.1.3.1.13. 7705 SAR-M
          3.1.3.1.14. 7705 SAR-W
          3.1.3.1.15. 7705 SAR-Wx
          3.1.3.1.16. 7705 SAR-X
        3.1.3.2. TDM
          3.1.3.2.1. 16-port T1/E1 ASAP Adapter Card
          3.1.3.2.2. 32-port T1/E1 ASAP Adapter Card
          3.1.3.2.3. 2-port OC3/STM1 Channelized Adapter Card
          3.1.3.2.4. 4-port OC3/STM1 / 1-port OC12/STM4 Adapter Card
          3.1.3.2.5. 4-port DS3/E3 Adapter Card
          3.1.3.2.6. 8-port Voice & Teleprotection Card
          3.1.3.2.7. 12-port Serial Data Interface Card
          3.1.3.2.8. 4-port T1/E1 and RS-232 Combination Module
          3.1.3.2.9. 7705 SAR-A
          3.1.3.2.10. 7705 SAR-Hc
          3.1.3.2.11. 7705 SAR-M
          3.1.3.2.12. 7705 SAR-X
        3.1.3.3. DSL
        3.1.3.4. GNSS Receiver
        3.1.3.5. GPON
        3.1.3.6. Multilink Bundles
        3.1.3.7. IMA
        3.1.3.8. SONET/SDH
        3.1.3.9. Voice
          3.1.3.9.1. 6-port E&M Adapter Card
          3.1.3.9.2. 8-port Voice & Teleprotection Card
          3.1.3.9.3. 8-port FXO Adapter Card
          3.1.3.9.4. 6-port FXS Adapter Card
        3.1.3.10. Microwave Link
        3.1.3.11. CLI Identifiers for Adapter Cards, Modules and Platforms
        3.1.3.12. Access, Network, and Hybrid Ports
          3.1.3.12.1. Rate Limiting
          3.1.3.12.2. Access Ports
          3.1.3.12.3. Network Ports
          3.1.3.12.4. Hybrid Ports
      3.1.4. Configuring SCADA Bridges
    3.2. Port Features
      3.2.1. Multilink Point-to-Point Protocol
        3.2.1.1. MLPPP Overview
        3.2.1.2. Protocol Field (PID)
        3.2.1.3. B&E Bits
        3.2.1.4. Sequence Number
        3.2.1.5. Information Field
        3.2.1.6. Padding
        3.2.1.7. FCS
        3.2.1.8. LCP
        3.2.1.9. T1/E1 Link Hold Timers
      3.2.2. Multi-Class MLPPP
        3.2.2.1. QoS in MC-MLPPP
      3.2.3. cHDLC
        3.2.3.1. SLARP
      3.2.4. Inverse Multiplexing Over ATM (IMA)
      3.2.5. Network Synchronization on Ports and Circuits
        3.2.5.1. Network Synchronization on T1/E1, Ethernet, GPON, and DSL Ports
        3.2.5.2. Network Synchronization on SONET/SDH Ports
        3.2.5.3. Network Synchronization on DS3/E3 Ports
        3.2.5.4. Network Synchronization on DS3 CES Circuits
        3.2.5.5. Network Synchronization on T1/E1 Ports and Circuits
      3.2.6. Node Synchronization From GNSS Receiver Ports
      3.2.7. Flow Control on Ethernet Ports
      3.2.8. Ethernet OAM
        3.2.8.1. Ethernet OAM Overview
        3.2.8.2. CRC (Cyclic Redundancy Check) Monitoring
        3.2.8.3. Remote Loopback
        3.2.8.4. 802.3ah OAMPDU Tunneling and Termination for Epipe Service
        3.2.8.5. Dying Gasp
      3.2.9. Ethernet Loopbacks
        3.2.9.1. Line and Internal Ethernet Loopbacks
          3.2.9.1.1. MAC Swapping
          3.2.9.1.2. Interaction of Ethernet Port Loopback with Other Features
        3.2.9.2. CFM Loopbacks for OAM on Ethernet Ports
          3.2.9.2.1. CFM Loopback Overview
          3.2.9.2.2. CFM Loopback Mechanics
      3.2.10. Ethernet Port Down-When-Looped
      3.2.11. Ethernet Ring (Adapter Card and Module)
      3.2.12. MTU Configuration Guidelines
        3.2.12.1. MTU Configuration Overview
        3.2.12.2. IP Fragmentation
        3.2.12.3. Jumbo Frames
          3.2.12.3.1. Behavior of Adapter Cards Not Supporting Jumbo Frames on 7705 SAR-8 and 7705 SAR-18 only
          3.2.12.3.2. Jumbo Frame Behavior on the Fixed Platforms
          3.2.12.3.3. Multicast Support for Jumbo Frames
          3.2.12.3.4. PMC Jumbo Frame Support
        3.2.12.4. Default Port MTU Values
      3.2.13. LAG
        3.2.13.1. LAG Overview
        3.2.13.2. LACP and Active/Standby Operation
        3.2.13.3. QoS Adaptation for LAG on Access
          3.2.13.3.1. Adaptive QoS Examples (Distribute Mode)
        3.2.13.4. Access Ingress Fabric Shaping
        3.2.13.5. Hold-down Timers
        3.2.13.6. Multi-Chassis LAG
        3.2.13.7. Static LAG (Active/Standby LAG Operation without LACP)
        3.2.13.8. LAG Support on Mixed-Generation Hardware
          3.2.13.8.1. LAG Configuration at SAP Level
          3.2.13.8.2. LAG Configuration at Port Level
      3.2.14. LAG and ECMP Hashing
        3.2.14.1. Per-Flow Hashing
        3.2.14.2. Per-Service Hashing
        3.2.14.3. LSR Hashing
          3.2.14.3.1. LSR Label-only Hashing
          3.2.14.3.2. LSR Label-IP Hashing
          3.2.14.3.3. LSR Label-IP Hashing with Layer 4 Header and TEID
          3.2.14.3.4. Label Stack Profile Options
          3.2.14.3.5. Ingress Port
        3.2.14.4. Layer 4 Load Balancing
        3.2.14.5. TEID Hashing for GTP-encapsulated Traffic
        3.2.14.6. Entropy Labels
      3.2.15. Automatic Protection Switching
        3.2.15.1. APS Overview
        3.2.15.2. SC-APS
        3.2.15.3. MC-APS
          3.2.15.3.1. MC-APS and Inter-Chassis Backup
        3.2.15.4. K1 and K2 Bytes
          3.2.15.4.1. Bidirectional 1+1 APS example
        3.2.15.5. Revertive Mode
        3.2.15.6. APS Tools Commands
          3.2.15.6.1. Lockout Protection
          3.2.15.6.2. Request Switch of Active to Protection
          3.2.15.6.3. Request Switch of Active to Working
          3.2.15.6.4. Forced Switch of Working to Protection
          3.2.15.6.5. Forced Switch of Active to Working
          3.2.15.6.6. Exercise
        3.2.15.7. APS Failure Codes
          3.2.15.7.1. Protection Switching Byte Failure (APS-PSB)
          3.2.15.7.2. Channel Mismatch Failure (APS-CM)
          3.2.15.7.3. APS Mode Mismatch Failure (APS-MM)
          3.2.15.7.4. Far-End Protection Line Failure (APS-FEPL)
      3.2.16. Deploying Preprovisioned Components
      3.2.17. Microwave Link
        3.2.17.1. Microwave Link Overview
        3.2.17.2. Standalone Mode
        3.2.17.3. Single NE Mode
          3.2.17.3.1. Single NE Management
          3.2.17.3.2. Microwave Link Fast Fault Detection (FFD)
          3.2.17.3.3. 1+1 HSB
          3.2.17.3.4. 1+1 Switching Operation
        3.2.17.4. Frequency Synchronization
        3.2.17.5. RSL History
      3.2.18. DSL Bonding
        3.2.18.1. DSL Bonding Overview
        3.2.18.2. ATM Bonding
        3.2.18.3. PTM Bonding
        3.2.18.4. Pairs Within a Bonded Group
        3.2.18.5. Configuration
        3.2.18.6. Layer 3 Protocol Support and Service Provisioning
      3.2.19. Custom Alarms on Ethernet Ports
    3.3. 802.1x Network Access Control
      3.3.1. 802.1x Basics
      3.3.2. 802.1x Modes
      3.3.3. 802.1x Timers
      3.3.4. 802.1x Configuration and Limitations
    3.4. MAC Authentication
    3.5. Link Layer Discovery Protocol (LLDP)
      3.5.1. LLDP Protocol Features
    3.6. Surveillance, Control, and Data Acquisition (SCADA) Support
      3.6.1. Multidrop Data Bridge
      3.6.2. PCM Multidrop Bridge
      3.6.3. Redundant Masters
      3.6.4. Squelch Functionality
      3.6.5. Voice Conference Bridge
        3.6.5.1. VCB Applications
        3.6.5.2. Gain
      3.6.6. Serial Transport Over Raw Sockets
        3.6.6.1. Raw Socket Configuration
        3.6.6.2. Raw Socket Packet Processing
          3.6.6.2.1. Raw Socket Processing for UDP Sessions
          3.6.6.2.2. Raw Socket Processing for TCP Sessions
        3.6.6.3. Raw Socket Squelch Functionality
    3.7. Configuration Notes
      3.7.1. Reference Sources
    3.8. Configuring Physical Components with CLI
    3.9. Preprovisioning Guidelines
      3.9.1. Predefining Entities
      3.9.2. Preprovisioning a Port or SCADA Bridge
      3.9.3. Maximizing Bandwidth Use
      3.9.4. Using Partial Bandwidth
    3.10. Basic Configuration
    3.11. Common Configuration Tasks
      3.11.1. Configuring Cards and Adapter Cards
        3.11.1.1. Configuring Cards
        3.11.1.2. Configuring Adapter Card Network Queue QoS Policies
        3.11.1.3. Configuring Ring Adapter Card or Module Network and Network Queue QoS Policies
        3.11.1.4. Configuring Adapter Card Fabric Statistics
        3.11.1.5. Configuring Adapter Card Fabric Profile
        3.11.1.6. Configuring Adapter Card Clock Mode
        3.11.1.7. Configuring Adapter Card Voice Attributes
        3.11.1.8. Configuring Ring Adapter Card or Module Parameters
        3.11.1.9. Configuring Auxiliary Alarm Card, Chassis, and Ethernet Port External Alarm Parameters
        3.11.1.10. Displaying Adapter Card Information
      3.11.2. Configuring Ports
        3.11.2.1. Configuring APS Port Parameters
        3.11.2.2. Configuring a Microwave Link
        3.11.2.3. Configuring Ethernet Port Parameters
          3.11.2.3.1. Configuring an Ethernet Network Port
          3.11.2.3.2. Configuring an Ethernet Access Port
          3.11.2.3.3. Configuring a Hybrid Ethernet Port
          3.11.2.3.4. Configuring 802.1x Authentication Port Parameters
          3.11.2.3.5. Configuring MAC Authentication Port Parameters
        3.11.2.4. Configuring DSL Port Parameters
          3.11.2.4.1. Configuring a DSL Network Port
          3.11.2.4.2. Configuring a DSL Access Port
        3.11.2.5. Configuring SONET/SDH Port Parameters
          3.11.2.5.1. Configuring a SONET/SDH Access Port
          3.11.2.5.2. Configuring a SONET/SDH Network Port
        3.11.2.6. Configuring Voice Ports
        3.11.2.7. Configuring Teleprotection Ports
        3.11.2.8. Configuring TDM PPP
        3.11.2.9. Configuring Channelized Ports
          3.11.2.9.1. Verifying the Adapter Card Type
        3.11.2.10. Configuring Fractional T1/E1 Ports for PPP Encapsulation
        3.11.2.11. Configuring T1 Line Buildout
        3.11.2.12. Configuring TDM E1 SSM
        3.11.2.13. Configuring ATM Interface Parameters
          3.11.2.13.1. ATM Interface Commands
        3.11.2.14. Configuring Multilink PPP Bundles
        3.11.2.15. Configuring MC-MLPPP
        3.11.2.16. Configuring LAG Parameters
        3.11.2.17. Configuring Multilink ATM Inverse Multiplexing (IMA) Groups
          3.11.2.17.1. Configuring IMA Groups
          3.11.2.17.2. Configuration Notes for IMA Groups
          3.11.2.17.3. IMA Test Procedure
        3.11.2.18. Configuring SDI Ports for IPCP Encapsulation
        3.11.2.19. Configuring TDM and SDI Ports for Frame Relay Encapsulation
        3.11.2.20. Configuring TDM and SDI Ports for HDLC Encapsulation
        3.11.2.21. Configuring TDM and SDI Ports for Cisco HDLC Encapsulation
        3.11.2.22. Configuring GNSS Receiver Port Parameters
        3.11.2.23. Configuring Serial Ports for Raw Socket Transport
      3.11.3. Configuring SCADA Bridge Parameters
    3.12. Service Management Tasks
      3.12.1. Changing a Provisioned Adapter Card Type
      3.12.2. Deleting an Adapter Card
    3.13. Configuration Command Reference
      3.13.1. Command Hierarchies
        3.13.1.1. Card Commands
        3.13.1.2. Adapter Card Commands
        3.13.1.3. External Alarm Commands
        3.13.1.4. APS Port Commands
        3.13.1.5. Microwave Link Commands
        3.13.1.6. Port Configuration Commands
        3.13.1.7. Ethernet Commands
        3.13.1.8. DSL Commands
        3.13.1.9. GPON Commands
        3.13.1.10. GNSS Commands
        3.13.1.11. IEEE 802.1x Ethernet Port Commands
        3.13.1.12. LLDP Ethernet Port Commands
        3.13.1.13. Ring Virtual Port Ethernet Commands
        3.13.1.14. Ring MAC Operations Commands
        3.13.1.15. Multilink Bundle and IMA Group Commands
        3.13.1.16. Serial Commands
        3.13.1.17. SONET/SDH Commands
        3.13.1.18. TDM Commands
        3.13.1.19. DS1 Commands
        3.13.1.20. DS3 Commands
        3.13.1.21. E1 Commands
        3.13.1.22. E3 Commands
        3.13.1.23. Voice Commands
        3.13.1.24. LAG Commands
        3.13.1.25. SCADA Commands
      3.13.2. Command Descriptions
        3.13.2.1. Generic Commands
        3.13.2.2. Card Commands
        3.13.2.3. Adapter Card Commands
        3.13.2.4. Interface QoS Commands
        3.13.2.5. External Alarm Commands
        3.13.2.6. APS Port Commands
        3.13.2.7. Microwave Link Commands
        3.13.2.8. General Port Commands
        3.13.2.9. Ethernet Commands
        3.13.2.10. DSL Commands
        3.13.2.11. GPON Commands
        3.13.2.12. GNSS Commands
        3.13.2.13. IEEE 802.1x Ethernet Port Commands
        3.13.2.14. LLDP Ethernet Port Commands
        3.13.2.15. Ring MAC Operations Commands
        3.13.2.16. Serial Commands
        3.13.2.17. RS-232, V.35, and X.21 Channel Group Commands
        3.13.2.18. SONET/SDH Port Commands
        3.13.2.19. SONET/SDH Path Commands
        3.13.2.20. Network Port Commands
        3.13.2.21. Multilink Bundle and IMA Group Commands
        3.13.2.22. ATM Interface Commands
        3.13.2.23. TDM Commands
        3.13.2.24. DS1 and E1 Commands
        3.13.2.25. DS1 and E1 Channel Group Commands
        3.13.2.26. DS3 and E3 Commands
        3.13.2.27. Voice Commands
        3.13.2.28. Voice Channel Group Commands
        3.13.2.29. LAG Commands
        3.13.2.30. Frame Relay Commands
        3.13.2.31. Cisco HDLC Commands
        3.13.2.32. SCADA Commands
    3.14. Show, Monitor, Clear, and Debug Command Reference
      3.14.1. Command Hierarchies
        3.14.1.1. Show Commands
        3.14.1.2. Monitor Commands
        3.14.1.3. Clear Commands
        3.14.1.4. Debug Commands
      3.14.2. Command Descriptions
        3.14.2.1. Show Commands
          3.14.2.1.1. Show APS Commands
          3.14.2.1.2. Show Card Commands
          3.14.2.1.3. Show External Alarms Commands
          3.14.2.1.4. Show Microwave Link Commands
          3.14.2.1.5. Show Port Commands
          3.14.2.1.6. Show ATM Port Commands
          3.14.2.1.7. Show Port-tree Commands
          3.14.2.1.8. Show LAG Commands
          3.14.2.1.9. Show Multilink Bundle and IMA Group Commands
          3.14.2.1.10. Show ATM IMA Group Commands
          3.14.2.1.11. Show SCADA Commands
        3.14.2.2. Monitor Commands
          3.14.2.2.1. Port Monitor Commands
          3.14.2.2.2. Fabric Profile Statistics Monitor Commands
          3.14.2.2.3. SCADA Monitor Commands
        3.14.2.3. Clear Commands
        3.14.2.4. Debug Commands
  4. List of Acronyms
  5. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR MPLS Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR MPLS Configuration Process
  3. MPLS and RSVP-TE
    3.1. Overview
    3.2. MPLS
      3.2.1. Traffic Engineering for MPLS
        3.2.1.1. TE Metric and IGP Metric
      3.2.2. MPLS Label Stack
        3.2.2.1. Label Values
      3.2.3. MPLS Entropy Labels
        3.2.3.1. Overview of Entropy Labels
        3.2.3.2. Inserting and Processing the Entropy Label
          3.2.3.2.1. Ingress LER
          3.2.3.2.2. LSR
          3.2.3.2.3. Egress LER
        3.2.3.3. Entropy Label on OAM Packets
        3.2.3.4. Entropy Label Configuration
      3.2.4. Label Edge and Label Switch Routers
      3.2.5. LSP Types
    3.3. RSVP and RSVP-TE
      3.3.1. RSVP-TE Overview
        3.3.1.1. Using RSVP-TE for MPLS
        3.3.1.2. RSVP-TE Extensions for MPLS
        3.3.1.3. Hello Protocol
        3.3.1.4. Authentication
          3.3.1.4.1. Authentication Key
          3.3.1.4.2. Authentication Keychains
        3.3.1.5. Non-Router ID Addresses as Destinations and Hops
    3.4. RSVP-TE Signaling
      3.4.1. General Attributes of RSVP-TE
        3.4.1.1. OAM: BFD
        3.4.1.2. Timers
        3.4.1.3. LSP Resignal Limit
        3.4.1.4. RSVP-TE Message Pacing
        3.4.1.5. RSVP-TE Overhead Refresh Reduction
        3.4.1.6. RSVP-TE Reservation Styles
        3.4.1.7. RSVP-TE Entropy Labels
    3.5. LSP Redundancy
      3.5.1. Make-Before-Break (MBB) Procedures for LSP and Path Parameter Configuration Changes
      3.5.2. Automatic Creation of RSVP-TE LSPs
      3.5.3. Automatic Creation of RSVP-TE LSP Mesh (Auto-LSP)
        3.5.3.1. Multi-Area and Multi-Instance Support
        3.5.3.2. Mesh LSP Name Encoding
      3.5.4. Automatic Creation of an RSVP-TE Single-Hop LSP
      3.5.5. Automatic ABR Selection for Inter-area LSPs
        3.5.5.1. Rerouting of Inter-area LSPs
        3.5.5.2. Behavior of MPLS Options in Inter-area LSPs
        3.5.5.3. Inter-area LSP Support of OSPF Virtual Links
      3.5.6. ABR FRR Protection for Inter-area LSP
    3.6. RSVP-TE Fast Reroute (FRR)
      3.6.1. FRR Terminology
      3.6.2. FRR Behavior
      3.6.3. Dynamic and Manual Bypass LSPs
        3.6.3.1. Bypass LSP Selection Rules for the PLR
        3.6.3.2. FRR Node Protection (Facility Backup)
      3.6.4. Admin Group Support on Facility Bypass Backup LSPs
      3.6.5. FRR Over Unnumbered Interfaces
    3.7. Shared Risk Link Groups
      3.7.1. SRLGs for Secondary LSP Paths
      3.7.2. SRLGs for FRR LSP Paths
      3.7.3. Disjoint and Non-disjoint Paths
      3.7.4. Enabling Disjoint Backup Paths
    3.8. RSVP-TE Graceful Shutdown
    3.9. RSVP-TE Support for Unnumbered Interfaces
    3.10. PCEP Support for RSVP-TE LSPs
    3.11. MPLS Service Usage
      3.11.1. Service Destination Points
    3.12. MPLS and RSVP-TE Configuration Process Overview
    3.13. Configuration Notes
      3.13.1. Reference Sources
    3.14. Configuring MPLS and RSVP-TE with CLI
    3.15. MPLS Configuration Overview
      3.15.1. Router Interface
        3.15.1.1. E-LSP for Differentiated Services
      3.15.2. Paths
      3.15.3. LSPs
      3.15.4. Pseudowires
      3.15.5. Signaling Protocol
    3.16. Basic MPLS Configuration
    3.17. Common Configuration Tasks
      3.17.1. Configuring MPLS Components
      3.17.2. Configuring Global MPLS Parameters
      3.17.3. Configuring an MPLS Interface
      3.17.4. Configuring MPLS Paths
      3.17.5. Configuring an MPLS LSP
      3.17.6. Configuring a Static LSP
        3.17.6.1. Configuring a Fast-Retry Timer for Static LSPs
      3.17.7. Configuring Manual Bypass Tunnels
      3.17.8. Configuring RSVP-TE Parameters and Interfaces
      3.17.9. Configuring RSVP-TE Message Pacing Parameters
    3.18. MPLS Configuration Management Tasks
      3.18.1. Deleting MPLS
      3.18.2. Modifying MPLS Parameters
      3.18.3. Modifying an MPLS LSP
      3.18.4. Modifying MPLS Path Parameters
      3.18.5. Modifying MPLS Static LSP Parameters
      3.18.6. Deleting an MPLS Interface
    3.19. RSVP-TE Configuration Management Tasks
      3.19.1. Modifying RSVP-TE Parameters
      3.19.2. Modifying RSVP-TE Message Pacing Parameters
      3.19.3. Deleting an Interface from RSVP-TE
    3.20. MPLS and RSVP-TE Command Reference
      3.20.1. Command Hierarchies
        3.20.1.1. MPLS Commands
        3.20.1.2. RSVP-TE Commands
        3.20.1.3. Show Commands
        3.20.1.4. Clear Commands
        3.20.1.5. Debug Commands
      3.20.2. Command Descriptions
        3.20.2.1. Configuration Commands (MPLS)
          3.20.2.1.1. Generic Commands
          3.20.2.1.2. MPLS Global Commands
          3.20.2.1.3. Interface Commands
          3.20.2.1.4. Interface Label-Map Commands
          3.20.2.1.5. LSP and LSP Template Commands
          3.20.2.1.6. Primary and Secondary Path Commands
          3.20.2.1.7. LSP Path Commands
          3.20.2.1.8. Static LSP Commands
        3.20.2.2. Configuration Commands (RSVP-TE)
          3.20.2.2.1. Generic Commands
          3.20.2.2.2. RSVP-TE Global Commands
          3.20.2.2.3. Interface Commands
          3.20.2.2.4. Message Pacing Commands
        3.20.2.3. Show Commands (MPLS)
        3.20.2.4. Show Commands (RSVP)
        3.20.2.5. Clear Commands
        3.20.2.6. Debug Commands
  4. PCEP
    4.1. Introduction to the Path Computation Element (PCE) Communication Protocol (PCEP)
    4.2. Base Implementation of Path Computation Elements (PCE)
    4.3. PCEP Session Establishment and Maintenance
    4.4. PCEP Parameters
      4.4.1. PCC Configuration
      4.4.2. Stateful PCE
      4.4.3. LSP Initiation
      4.4.4. PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
    4.5. PCEP Support for RSVP-TE LSPs
      4.5.1. RSVP-TE LSP Configuration for a PCC Router
      4.5.2. Behavior of the LSP Path Update
        4.5.2.1. Path Update with Empty ERO
      4.5.3. Behavior of LSP MBB
        4.5.3.1. PCC-Controlled LSPs
        4.5.3.2. PCE-Computed LSPs
        4.5.3.3. PCE-Controlled LSPs
      4.5.4. Behavior of Secondary LSP Paths
      4.5.5. PCE Path Profile Support
    4.6. LSP Path Diversity and Bidirectionality Constraints
    4.7. Configuring RSVP-TE LSPs with PCEP Using the CLI
      4.7.1. PCEP on the PCE Node and the PCC Node
      4.7.2. MPLS on the PCC Node
    4.8. PCEP Configuration Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. PCEP Commands
        4.8.1.2. Show Commands
      4.8.2. Command Descriptions
        4.8.2.1. PCEP Commands
        4.8.2.2. Show Commands
  5. Label Distribution Protocol
    5.1. Label Distribution Protocol
      5.1.1. LDP and MPLS
        5.1.1.1. BFD for T-LDP
      5.1.2. LDP Architecture
      5.1.3. LDP Subsystem Interrelationships
        5.1.3.1. Memory Manager and LDP
        5.1.3.2. Label Manager
        5.1.3.3. LDP Configuration
        5.1.3.4. Logger
        5.1.3.5. Service Manager
      5.1.4. Execution Flow
        5.1.4.1. Initialization
        5.1.4.2. Session Lifetime
          5.1.4.2.1. Adjacency Establishment
          5.1.4.2.2. Session Establishment
      5.1.5. Label Exchange
        5.1.5.1. Other Reasons for Label Actions
        5.1.5.2. Cleanup
      5.1.6. LDP Filters
      5.1.7. Multi-area and Multi-instance Extensions to LDP
      5.1.8. ECMP Support for LDP
        5.1.8.1. Label Operations
      5.1.9. Graceful Restart Helper
      5.1.10. Graceful Handling of Resource Exhaustion
      5.1.11. LDP Support for Unnumbered Interfaces
      5.1.12. LDP Fast Reroute (FRR)
        5.1.12.1. ECMP vs FRR
        5.1.12.2. IGP Shortcuts (RSVP-TE Tunnels)
        5.1.12.3. LDP FRR Configuration
      5.1.13. TCP MD5 Authentication
    5.2. LDP Point-to-Multipoint Support
      5.2.1. LDP Point-to-Multipoint Configuration
      5.2.2. LDP Point-to-Multipoint Protocol
      5.2.3. Make-Before-Break (MBB)
      5.2.4. ECMP Support
    5.3. Multicast LDP Fast Upstream Switchover
      5.3.1. mLDP Fast Upstream Switchover Configuration
      5.3.2. mLDP Fast Upstream Switchover Behavior
    5.4. LDP Process Overview
    5.5. Configuration Notes
      5.5.1. Reference Sources
    5.6. Configuring LDP with CLI
    5.7. LDP Configuration Overview
    5.8. Basic LDP Configuration
    5.9. Common Configuration Tasks
      5.9.1. Enabling LDP
      5.9.2. Configuring Graceful Restart Helper Parameters
      5.9.3. Applying Import and Export Policies
      5.9.4. Configuring Interface Parameters
      5.9.5. Specifying Targeted Session Parameters
      5.9.6. Specifying Peer Parameters
      5.9.7. Configuring LDP Support for Multicast VPN (MVPN)
      5.9.8. Enabling LDP Signaling and Services
    5.10. LDP Configuration Management Tasks
      5.10.1. Disabling LDP
      5.10.2. Modifying Targeted Session Parameters
      5.10.3. Modifying Interface Parameters
    5.11. LDP Command Reference
      5.11.1. Command Hierarchies
        5.11.1.1. LDP Commands
        5.11.1.2. Show Commands
        5.11.1.3. Clear Commands
        5.11.1.4. Debug Commands
      5.11.2. Command Descriptions
        5.11.2.1. Configuration Commands
          5.11.2.1.1. Generic Commands
          5.11.2.1.2. LDP Global Commands
          5.11.2.1.3. Interface Parameters Commands
          5.11.2.1.4. Targeted Session Commands
          5.11.2.1.5. Peer Parameters Commands
        5.11.2.2. Show Commands
        5.11.2.3. Clear Commands
        5.11.2.4. Debug Commands
  6. List of Acronyms
  7. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR MPLS Configuration Process
  3. MPLS and RSVP-TE
    3.1. Overview
    3.2. MPLS
      3.2.1. Traffic Engineering for MPLS
        3.2.1.1. TE Metric and IGP Metric
      3.2.2. MPLS Label Stack
        3.2.2.1. Label Values
      3.2.3. MPLS Entropy Labels
        3.2.3.1. Overview of Entropy Labels
        3.2.3.2. Inserting and Processing the Entropy Label
          3.2.3.2.1. Ingress LER
          3.2.3.2.2. LSR
          3.2.3.2.3. Egress LER
        3.2.3.3. Entropy Label on OAM Packets
        3.2.3.4. Entropy Label Configuration
      3.2.4. Label Edge and Label Switch Routers
      3.2.5. LSP Types
    3.3. RSVP and RSVP-TE
      3.3.1. RSVP-TE Overview
        3.3.1.1. Using RSVP-TE for MPLS
        3.3.1.2. RSVP-TE Extensions for MPLS
        3.3.1.3. Hello Protocol
        3.3.1.4. Authentication
          3.3.1.4.1. Authentication Key
          3.3.1.4.2. Authentication Keychains
        3.3.1.5. Non-Router ID Addresses as Destinations and Hops
    3.4. RSVP-TE Signaling
      3.4.1. General Attributes of RSVP-TE
        3.4.1.1. OAM: BFD
        3.4.1.2. Timers
        3.4.1.3. LSP Resignal Limit
        3.4.1.4. RSVP-TE Message Pacing
        3.4.1.5. RSVP-TE Overhead Refresh Reduction
        3.4.1.6. RSVP-TE Reservation Styles
        3.4.1.7. RSVP-TE Entropy Labels
    3.5. LSP Redundancy
      3.5.1. Make-Before-Break (MBB) Procedures for LSP and Path Parameter Configuration Changes
      3.5.2. Automatic Creation of RSVP-TE LSPs
      3.5.3. Automatic Creation of RSVP-TE LSP Mesh (Auto-LSP)
        3.5.3.1. Multi-Area and Multi-Instance Support
        3.5.3.2. Mesh LSP Name Encoding
      3.5.4. Automatic Creation of an RSVP-TE Single-Hop LSP
      3.5.5. Automatic ABR Selection for Inter-area LSPs
        3.5.5.1. Rerouting of Inter-area LSPs
        3.5.5.2. Behavior of MPLS Options in Inter-area LSPs
        3.5.5.3. Inter-area LSP Support of OSPF Virtual Links
      3.5.6. ABR FRR Protection for Inter-area LSP
    3.6. RSVP-TE Fast Reroute (FRR)
      3.6.1. FRR Terminology
      3.6.2. FRR Behavior
      3.6.3. Dynamic and Manual Bypass LSPs
        3.6.3.1. Bypass LSP Selection Rules for the PLR
        3.6.3.2. FRR Node Protection (Facility Backup)
      3.6.4. Admin Group Support on Facility Bypass Backup LSPs
      3.6.5. FRR Over Unnumbered Interfaces
    3.7. Shared Risk Link Groups
      3.7.1. SRLGs for Secondary LSP Paths
      3.7.2. SRLGs for FRR LSP Paths
      3.7.3. Disjoint and Non-disjoint Paths
      3.7.4. Enabling Disjoint Backup Paths
    3.8. RSVP-TE Graceful Shutdown
    3.9. RSVP-TE Support for Unnumbered Interfaces
    3.10. PCEP Support for RSVP-TE LSPs
    3.11. MPLS Service Usage
      3.11.1. Service Destination Points
    3.12. MPLS and RSVP-TE Configuration Process Overview
    3.13. Configuration Notes
      3.13.1. Reference Sources
    3.14. Configuring MPLS and RSVP-TE with CLI
    3.15. MPLS Configuration Overview
      3.15.1. Router Interface
        3.15.1.1. E-LSP for Differentiated Services
      3.15.2. Paths
      3.15.3. LSPs
      3.15.4. Pseudowires
      3.15.5. Signaling Protocol
    3.16. Basic MPLS Configuration
    3.17. Common Configuration Tasks
      3.17.1. Configuring MPLS Components
      3.17.2. Configuring Global MPLS Parameters
      3.17.3. Configuring an MPLS Interface
      3.17.4. Configuring MPLS Paths
      3.17.5. Configuring an MPLS LSP
      3.17.6. Configuring a Static LSP
        3.17.6.1. Configuring a Fast-Retry Timer for Static LSPs
      3.17.7. Configuring Manual Bypass Tunnels
      3.17.8. Configuring RSVP-TE Parameters and Interfaces
      3.17.9. Configuring RSVP-TE Message Pacing Parameters
    3.18. MPLS Configuration Management Tasks
      3.18.1. Deleting MPLS
      3.18.2. Modifying MPLS Parameters
      3.18.3. Modifying an MPLS LSP
      3.18.4. Modifying MPLS Path Parameters
      3.18.5. Modifying MPLS Static LSP Parameters
      3.18.6. Deleting an MPLS Interface
    3.19. RSVP-TE Configuration Management Tasks
      3.19.1. Modifying RSVP-TE Parameters
      3.19.2. Modifying RSVP-TE Message Pacing Parameters
      3.19.3. Deleting an Interface from RSVP-TE
    3.20. MPLS and RSVP-TE Command Reference
      3.20.1. Command Hierarchies
        3.20.1.1. MPLS Commands
        3.20.1.2. RSVP-TE Commands
        3.20.1.3. Show Commands
        3.20.1.4. Clear Commands
        3.20.1.5. Debug Commands
      3.20.2. Command Descriptions
        3.20.2.1. Configuration Commands (MPLS)
          3.20.2.1.1. Generic Commands
          3.20.2.1.2. MPLS Global Commands
          3.20.2.1.3. Interface Commands
          3.20.2.1.4. Interface Label-Map Commands
          3.20.2.1.5. LSP and LSP Template Commands
          3.20.2.1.6. Primary and Secondary Path Commands
          3.20.2.1.7. LSP Path Commands
          3.20.2.1.8. Static LSP Commands
        3.20.2.2. Configuration Commands (RSVP-TE)
          3.20.2.2.1. Generic Commands
          3.20.2.2.2. RSVP-TE Global Commands
          3.20.2.2.3. Interface Commands
          3.20.2.2.4. Message Pacing Commands
        3.20.2.3. Show Commands (MPLS)
        3.20.2.4. Show Commands (RSVP)
        3.20.2.5. Clear Commands
        3.20.2.6. Debug Commands
  4. PCEP
    4.1. Introduction to the Path Computation Element (PCE) Communication Protocol (PCEP)
    4.2. Base Implementation of Path Computation Elements (PCE)
    4.3. PCEP Session Establishment and Maintenance
    4.4. PCEP Parameters
      4.4.1. PCC Configuration
      4.4.2. Stateful PCE
      4.4.3. LSP Initiation
      4.4.4. PCC-Initiated and PCE-Computed or PCE-Controlled LSPs
    4.5. PCEP Support for RSVP-TE LSPs
      4.5.1. RSVP-TE LSP Configuration for a PCC Router
      4.5.2. Behavior of the LSP Path Update
        4.5.2.1. Path Update with Empty ERO
      4.5.3. Behavior of LSP MBB
        4.5.3.1. PCC-Controlled LSPs
        4.5.3.2. PCE-Computed LSPs
        4.5.3.3. PCE-Controlled LSPs
      4.5.4. Behavior of Secondary LSP Paths
      4.5.5. PCE Path Profile Support
    4.6. LSP Path Diversity and Bidirectionality Constraints
    4.7. Configuring RSVP-TE LSPs with PCEP Using the CLI
      4.7.1. PCEP on the PCE Node and the PCC Node
      4.7.2. MPLS on the PCC Node
    4.8. PCEP Configuration Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. PCEP Commands
        4.8.1.2. Show Commands
      4.8.2. Command Descriptions
        4.8.2.1. PCEP Commands
        4.8.2.2. Show Commands
  5. Label Distribution Protocol
    5.1. Label Distribution Protocol
      5.1.1. LDP and MPLS
        5.1.1.1. BFD for T-LDP
      5.1.2. LDP Architecture
      5.1.3. LDP Subsystem Interrelationships
        5.1.3.1. Memory Manager and LDP
        5.1.3.2. Label Manager
        5.1.3.3. LDP Configuration
        5.1.3.4. Logger
        5.1.3.5. Service Manager
      5.1.4. Execution Flow
        5.1.4.1. Initialization
        5.1.4.2. Session Lifetime
          5.1.4.2.1. Adjacency Establishment
          5.1.4.2.2. Session Establishment
      5.1.5. Label Exchange
        5.1.5.1. Other Reasons for Label Actions
        5.1.5.2. Cleanup
      5.1.6. LDP Filters
      5.1.7. Multi-area and Multi-instance Extensions to LDP
      5.1.8. ECMP Support for LDP
        5.1.8.1. Label Operations
      5.1.9. Graceful Restart Helper
      5.1.10. Graceful Handling of Resource Exhaustion
      5.1.11. LDP Support for Unnumbered Interfaces
      5.1.12. LDP Fast Reroute (FRR)
        5.1.12.1. ECMP vs FRR
        5.1.12.2. IGP Shortcuts (RSVP-TE Tunnels)
        5.1.12.3. LDP FRR Configuration
      5.1.13. TCP MD5 Authentication
    5.2. LDP Point-to-Multipoint Support
      5.2.1. LDP Point-to-Multipoint Configuration
      5.2.2. LDP Point-to-Multipoint Protocol
      5.2.3. Make-Before-Break (MBB)
      5.2.4. ECMP Support
    5.3. Multicast LDP Fast Upstream Switchover
      5.3.1. mLDP Fast Upstream Switchover Configuration
      5.3.2. mLDP Fast Upstream Switchover Behavior
    5.4. LDP Process Overview
    5.5. Configuration Notes
      5.5.1. Reference Sources
    5.6. Configuring LDP with CLI
    5.7. LDP Configuration Overview
    5.8. Basic LDP Configuration
    5.9. Common Configuration Tasks
      5.9.1. Enabling LDP
      5.9.2. Configuring Graceful Restart Helper Parameters
      5.9.3. Applying Import and Export Policies
      5.9.4. Configuring Interface Parameters
      5.9.5. Specifying Targeted Session Parameters
      5.9.6. Specifying Peer Parameters
      5.9.7. Configuring LDP Support for Multicast VPN (MVPN)
      5.9.8. Enabling LDP Signaling and Services
    5.10. LDP Configuration Management Tasks
      5.10.1. Disabling LDP
      5.10.2. Modifying Targeted Session Parameters
      5.10.3. Modifying Interface Parameters
    5.11. LDP Command Reference
      5.11.1. Command Hierarchies
        5.11.1.1. LDP Commands
        5.11.1.2. Show Commands
        5.11.1.3. Clear Commands
        5.11.1.4. Debug Commands
      5.11.2. Command Descriptions
        5.11.2.1. Configuration Commands
          5.11.2.1.1. Generic Commands
          5.11.2.1.2. LDP Global Commands
          5.11.2.1.3. Interface Parameters Commands
          5.11.2.1.4. Targeted Session Commands
          5.11.2.1.5. Peer Parameters Commands
        5.11.2.2. Show Commands
        5.11.2.3. Clear Commands
        5.11.2.4. Debug Commands
  6. List of Acronyms
  7. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR OAM and Diagnostics Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR OAM Configuration Process
  3. OAM and SAA
    3.1. OAM Overview
      3.1.1. ICMP and ICMPv6 Diagnostics
        3.1.1.1. Ping
        3.1.1.2. Traceroute
      3.1.2. Two-Way Active Measurement Protocol
        3.1.2.1. 7705 SAR Support for TWAMP Server
          3.1.2.1.1. Interactions with Ethernet Loopback
          3.1.2.1.2. Limitations
        3.1.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
          3.1.2.2.1. 7705 SAR Support for TWAMP Light Responder
          3.1.2.2.2. Interactions with Ethernet Loopback
          3.1.2.2.3. Limitations
          3.1.2.2.4. TWAMP Light Configuration Example
      3.1.3. LSP Diagnostics
        3.1.3.1. LSP Ping
        3.1.3.2. LSP Traceroute
        3.1.3.3. LSP Ping and LSP Traceroute for BGP Route Tunnels
          3.1.3.3.1. TC Handling on BGP Route Tunnels
          3.1.3.3.2. BGP Route Tunnel Traceroute
          3.1.3.3.3. Traceroute TTL for Self-generated Traffic
        3.1.3.4. Downstream Detailed Mapping (DDMAP) TLV
          3.1.3.4.1. Using The DDMAP TLV in LSP Stitching and LSP Hierarchy
      3.1.4. SDP Diagnostics
        3.1.4.1. SDP Ping
        3.1.4.2. SDP MTU Path Discovery
      3.1.5. Service Diagnostics
        3.1.5.1. Service Ping
      3.1.6. VLL Diagnostics
        3.1.6.1. VCCV Ping
          3.1.6.1.1. VCCV Ping Application
          3.1.6.1.2. VCCV Ping in a Multi-Segment Pseudowire
          3.1.6.1.3. Automated VCCV Trace Capability for Multi-Segment Pseudowire
          3.1.6.1.4. VCCV for Static Pseudowire Segments
          3.1.6.1.5. VCCV for MS-PW and Pseudowire Redundancy
          3.1.6.1.6. Detailed VCCV Trace Operation
        3.1.6.2. VCCV Trace
      3.1.7. ITU-T Y.1564 Diagnostics
        3.1.7.1. ITU-T Y.1564 Functionality
        3.1.7.2. ITU-T Y.1564 Protocol Interaction
      3.1.8. VPLS MAC Diagnostics
        3.1.8.1. MAC Ping
        3.1.8.2. MAC Trace
        3.1.8.3. CPE Ping
        3.1.8.4. MAC Populate
        3.1.8.5. MAC Purge
      3.1.9. Ethernet OAM Capabilities
        3.1.9.1. Ethernet OAM Overview
          3.1.9.1.1. Ethernet OAM Usage Examples
        3.1.9.2. 802.1ag and Y.1731 Functional Comparison
        3.1.9.3. ETH-CFM Ethernet OAM Tests (802.1ag and Y.1731)
          3.1.9.3.1. Hold MEP Up On Failure
          3.1.9.3.2. Loopback (LB)
          3.1.9.3.3. Linktrace (LT)
          3.1.9.3.4. Throughput Measurement
          3.1.9.3.5. Continuity Check (CC)
          3.1.9.3.6. ETH-RDI
          3.1.9.3.7. ETH-AIS
          3.1.9.3.8. ETH-Test
        3.1.9.4. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
          3.1.9.4.1. Bandwidth Notification Message (BNM)
        3.1.9.5. ITU-T Y.1731 Performance Monitoring (PM)
          3.1.9.5.1. Delay and Delay Variation Measurements (DM and DV)
          3.1.9.5.2. Y.1731 Delay Measurement (DM)
          3.1.9.5.3. Loss Measurement (LM)
        3.1.9.6. CFM OAM QoS
        3.1.9.7. EFM OAM (802.3ah)
          3.1.9.7.1. Unidirectional OAM Operation
          3.1.9.7.2. Remote Loopback
          3.1.9.7.3. 802.3ah OAMPDU Tunneling and Termination for Epipe Services
          3.1.9.7.4. Dying Gasp
      3.1.10. Ethernet Loopbacks
        3.1.10.1. Line and Internal Ethernet Loopbacks
          3.1.10.1.1. MAC Swapping
          3.1.10.1.2. Interaction of Ethernet Port Loopback with Other Features
        3.1.10.2. CFM Loopbacks for OAM on Ethernet Ports
          3.1.10.2.1. CFM Loopback Mechanics
      3.1.11. OAM Propagation to Attachment Circuits
        3.1.11.1. ATM Ports
        3.1.11.2. T1/E1 TDM Ports
        3.1.11.3. Ethernet Ports
        3.1.11.4. Pseudowire Status Signaling OAM Propagation
      3.1.12. LDP Status Signaling
        3.1.12.1. LDP Status via Label Withdrawal
        3.1.12.2. LDP Status via TLV
      3.1.13. IP Multicast Debugging Tools
        3.1.13.1. Mtrace
          3.1.13.1.1. Finding the Last-Hop Router
          3.1.13.1.2. Directing the Response
        3.1.13.2. Mstat
        3.1.13.3. Mrinfo
    3.2. Service Assurance Agent Overview
      3.2.1. Traceroute Implementation
      3.2.2. SAA Jitter
      3.2.3. SAA Ethernet CFM Test Support
        3.2.3.1. Writing SAA Ethernet CFM Test Results to Accounting Files
    3.3. Configuring SAA Test Parameters
    3.4. Synthetic Loss Measurement (SLM)
      3.4.1. Configuration Example
    3.5. OAM Timestamping
    3.6. OAM and SAA Command Reference
      3.6.1. Command Hierarchies
        3.6.1.1. Operational Commands
          3.6.1.1.1. Operational Commands
          3.6.1.1.2. Multicast Commands
        3.6.1.2. OAM Commands
          3.6.1.2.1. ATM Diagnostics
          3.6.1.2.2. TWAMP
          3.6.1.2.3. TWAMP Light
          3.6.1.2.4. Global Downstream Mapping Commands
          3.6.1.2.5. LSP Diagnostics
          3.6.1.2.6. LDP Diagnostics
          3.6.1.2.7. SDP Diagnostics
          3.6.1.2.8. Service Diagnostics
          3.6.1.2.9. VLL Diagnostics
          3.6.1.2.10. Y.1564 Diagnostics
          3.6.1.2.11. VPLS Diagnostics
          3.6.1.2.12. Ethernet in the First Mile (EFM) Commands
          3.6.1.2.13. ETH-CFM Commands
          3.6.1.2.14. DSL Loopback
        3.6.1.3. SAA Commands
          3.6.1.3.1. SAA Diagnostics
        3.6.1.4. Show Commands
        3.6.1.5. Clear Commands
        3.6.1.6. Debug Commands
      3.6.2. Command Descriptions
        3.6.2.1. OAM and SAA Commands
          3.6.2.1.1. Operational Commands
          3.6.2.1.2. Multicast Commands
          3.6.2.1.3. ATM Diagnostics
          3.6.2.1.4. Service Diagnostics
          3.6.2.1.5. EFM Commands
          3.6.2.1.6. ETH-CFM Commands
          3.6.2.1.7. DSL Commands
          3.6.2.1.8. SAA Commands
          3.6.2.1.9. Y.1564 Diagnostics
          3.6.2.1.10. TWAMP Commands
          3.6.2.1.11. Global Downstream Mapping Commands
          3.6.2.1.12. LDP Diagnostics
          3.6.2.1.13. OAM SAA Commands
        3.6.2.2. Show Commands
        3.6.2.3. Clear Commands
        3.6.2.4. Debug Commands
  4. Mirroring
    4.1. Mirroring Overview
      4.1.1. Mirroring Implementation
      4.1.2. Mirror Sources and Destinations
        4.1.2.1. Local and Remote Mirroring
        4.1.2.2. Slicing
      4.1.3. Mirroring Performance
      4.1.4. Mirroring Configuration
    4.2. Configuration Notes
    4.3. Configuring Mirroring with CLI
      4.3.1. Mirror Configuration Overview
    4.4. Basic Mirroring Configuration
      4.4.1. Mirror Classification Rules
    4.5. Common Configuration Tasks
      4.5.1. Configuring a Local Mirror Service
      4.5.2. Configuring SDPs for Mirroring
      4.5.3. Configuring a Remote Mirror Service
      4.5.4. Pseudowire Redundancy for Mirror Services Configuration Example
      4.5.5. MC-LAG Setup with ICB for Mirror Services Configuration Example
    4.6. Service Management Tasks
      4.6.1. Modifying a Local Mirrored Service
      4.6.2. Deleting a Local Mirrored Service
      4.6.3. Modifying a Remote Mirrored Service
      4.6.4. Deleting a Remote Mirrored Service
    4.7. Mirror Service Configuration Command Reference
      4.7.1. Command Hierarchies
        4.7.1.1. Mirror Configuration Commands
        4.7.1.2. Show Commands
        4.7.1.3. Debug Commands
      4.7.2. Command Descriptions
        4.7.2.1. Configuration Commands
          4.7.2.1.1. Generic Commands
          4.7.2.1.2. Mirror Destination Configuration Commands
        4.7.2.2. Show Commands
        4.7.2.3. Debug Commands
  5. Tools
    5.1. Tools Command Reference
      5.1.1. Command Hierarchies
        5.1.1.1. Tools Dump Commands
        5.1.1.2. Tools Perform Commands
        5.1.1.3. Tools ADP Commands
      5.1.2. Command Descriptions
        5.1.2.1. Tools Generic Commands
        5.1.2.2. Tools Dump Commands
          5.1.2.2.1. Dump Commands
          5.1.2.2.2. Dump Test-OAM Commands
          5.1.2.2.3. Dump Router Commands
        5.1.2.3. Tools Perform Commands
          5.1.2.3.1. Perform Commands
          5.1.2.3.2. Perform Router Commands
        5.1.2.4. Tools ADP Commands
  6. List of Acronyms
  7. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR OAM Configuration Process
  3. OAM and SAA
    3.1. OAM Overview
      3.1.1. ICMP and ICMPv6 Diagnostics
        3.1.1.1. Ping
        3.1.1.2. Traceroute
      3.1.2. Two-Way Active Measurement Protocol
        3.1.2.1. 7705 SAR Support for TWAMP Server
          3.1.2.1.1. Interactions with Ethernet Loopback
          3.1.2.1.2. Limitations
        3.1.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
          3.1.2.2.1. 7705 SAR Support for TWAMP Light Responder
          3.1.2.2.2. Interactions with Ethernet Loopback
          3.1.2.2.3. Limitations
          3.1.2.2.4. TWAMP Light Configuration Example
      3.1.3. LSP Diagnostics
        3.1.3.1. LSP Ping
        3.1.3.2. LSP Traceroute
        3.1.3.3. LSP Ping and LSP Traceroute for BGP Route Tunnels
          3.1.3.3.1. TC Handling on BGP Route Tunnels
          3.1.3.3.2. BGP Route Tunnel Traceroute
          3.1.3.3.3. Traceroute TTL for Self-generated Traffic
        3.1.3.4. Downstream Detailed Mapping (DDMAP) TLV
          3.1.3.4.1. Using The DDMAP TLV in LSP Stitching and LSP Hierarchy
      3.1.4. SDP Diagnostics
        3.1.4.1. SDP Ping
        3.1.4.2. SDP MTU Path Discovery
      3.1.5. Service Diagnostics
        3.1.5.1. Service Ping
      3.1.6. VLL Diagnostics
        3.1.6.1. VCCV Ping
          3.1.6.1.1. VCCV Ping Application
          3.1.6.1.2. VCCV Ping in a Multi-Segment Pseudowire
          3.1.6.1.3. Automated VCCV Trace Capability for Multi-Segment Pseudowire
          3.1.6.1.4. VCCV for Static Pseudowire Segments
          3.1.6.1.5. VCCV for MS-PW and Pseudowire Redundancy
          3.1.6.1.6. Detailed VCCV Trace Operation
        3.1.6.2. VCCV Trace
      3.1.7. ITU-T Y.1564 Diagnostics
        3.1.7.1. ITU-T Y.1564 Functionality
        3.1.7.2. ITU-T Y.1564 Protocol Interaction
      3.1.8. VPLS MAC Diagnostics
        3.1.8.1. MAC Ping
        3.1.8.2. MAC Trace
        3.1.8.3. CPE Ping
        3.1.8.4. MAC Populate
        3.1.8.5. MAC Purge
      3.1.9. Ethernet OAM Capabilities
        3.1.9.1. Ethernet OAM Overview
          3.1.9.1.1. Ethernet OAM Usage Examples
        3.1.9.2. 802.1ag and Y.1731 Functional Comparison
        3.1.9.3. ETH-CFM Ethernet OAM Tests (802.1ag and Y.1731)
          3.1.9.3.1. Hold MEP Up On Failure
          3.1.9.3.2. Loopback (LB)
          3.1.9.3.3. Linktrace (LT)
          3.1.9.3.4. Throughput Measurement
          3.1.9.3.5. Continuity Check (CC)
          3.1.9.3.6. ETH-RDI
          3.1.9.3.7. ETH-AIS
          3.1.9.3.8. ETH-Test
        3.1.9.4. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
          3.1.9.4.1. Bandwidth Notification Message (BNM)
        3.1.9.5. ITU-T Y.1731 Performance Monitoring (PM)
          3.1.9.5.1. Delay and Delay Variation Measurements (DM and DV)
          3.1.9.5.2. Y.1731 Delay Measurement (DM)
          3.1.9.5.3. Loss Measurement (LM)
        3.1.9.6. CFM OAM QoS
        3.1.9.7. EFM OAM (802.3ah)
          3.1.9.7.1. Unidirectional OAM Operation
          3.1.9.7.2. Remote Loopback
          3.1.9.7.3. 802.3ah OAMPDU Tunneling and Termination for Epipe Services
          3.1.9.7.4. Dying Gasp
      3.1.10. Ethernet Loopbacks
        3.1.10.1. Line and Internal Ethernet Loopbacks
          3.1.10.1.1. MAC Swapping
          3.1.10.1.2. Interaction of Ethernet Port Loopback with Other Features
        3.1.10.2. CFM Loopbacks for OAM on Ethernet Ports
          3.1.10.2.1. CFM Loopback Mechanics
      3.1.11. OAM Propagation to Attachment Circuits
        3.1.11.1. ATM Ports
        3.1.11.2. T1/E1 TDM Ports
        3.1.11.3. Ethernet Ports
        3.1.11.4. Pseudowire Status Signaling OAM Propagation
      3.1.12. LDP Status Signaling
        3.1.12.1. LDP Status via Label Withdrawal
        3.1.12.2. LDP Status via TLV
      3.1.13. IP Multicast Debugging Tools
        3.1.13.1. Mtrace
          3.1.13.1.1. Finding the Last-Hop Router
          3.1.13.1.2. Directing the Response
        3.1.13.2. Mstat
        3.1.13.3. Mrinfo
    3.2. Service Assurance Agent Overview
      3.2.1. Traceroute Implementation
      3.2.2. SAA Jitter
      3.2.3. SAA Ethernet CFM Test Support
        3.2.3.1. Writing SAA Ethernet CFM Test Results to Accounting Files
    3.3. Configuring SAA Test Parameters
    3.4. Synthetic Loss Measurement (SLM)
      3.4.1. Configuration Example
    3.5. OAM Timestamping
    3.6. OAM and SAA Command Reference
      3.6.1. Command Hierarchies
        3.6.1.1. Operational Commands
          3.6.1.1.1. Operational Commands
          3.6.1.1.2. Multicast Commands
        3.6.1.2. OAM Commands
          3.6.1.2.1. ATM Diagnostics
          3.6.1.2.2. TWAMP
          3.6.1.2.3. TWAMP Light
          3.6.1.2.4. Global Downstream Mapping Commands
          3.6.1.2.5. LSP Diagnostics
          3.6.1.2.6. LDP Diagnostics
          3.6.1.2.7. SDP Diagnostics
          3.6.1.2.8. Service Diagnostics
          3.6.1.2.9. VLL Diagnostics
          3.6.1.2.10. Y.1564 Diagnostics
          3.6.1.2.11. VPLS Diagnostics
          3.6.1.2.12. Ethernet in the First Mile (EFM) Commands
          3.6.1.2.13. ETH-CFM Commands
          3.6.1.2.14. DSL Loopback
        3.6.1.3. SAA Commands
          3.6.1.3.1. SAA Diagnostics
        3.6.1.4. Show Commands
        3.6.1.5. Clear Commands
        3.6.1.6. Debug Commands
      3.6.2. Command Descriptions
        3.6.2.1. OAM and SAA Commands
          3.6.2.1.1. Operational Commands
          3.6.2.1.2. Multicast Commands
          3.6.2.1.3. ATM Diagnostics
          3.6.2.1.4. Service Diagnostics
          3.6.2.1.5. EFM Commands
          3.6.2.1.6. ETH-CFM Commands
          3.6.2.1.7. DSL Commands
          3.6.2.1.8. SAA Commands
          3.6.2.1.9. Y.1564 Diagnostics
          3.6.2.1.10. TWAMP Commands
          3.6.2.1.11. Global Downstream Mapping Commands
          3.6.2.1.12. LDP Diagnostics
          3.6.2.1.13. OAM SAA Commands
        3.6.2.2. Show Commands
        3.6.2.3. Clear Commands
        3.6.2.4. Debug Commands
  4. Mirroring
    4.1. Mirroring Overview
      4.1.1. Mirroring Implementation
      4.1.2. Mirror Sources and Destinations
        4.1.2.1. Local and Remote Mirroring
        4.1.2.2. Slicing
      4.1.3. Mirroring Performance
      4.1.4. Mirroring Configuration
    4.2. Configuration Notes
    4.3. Configuring Mirroring with CLI
      4.3.1. Mirror Configuration Overview
    4.4. Basic Mirroring Configuration
      4.4.1. Mirror Classification Rules
    4.5. Common Configuration Tasks
      4.5.1. Configuring a Local Mirror Service
      4.5.2. Configuring SDPs for Mirroring
      4.5.3. Configuring a Remote Mirror Service
      4.5.4. Pseudowire Redundancy for Mirror Services Configuration Example
      4.5.5. MC-LAG Setup with ICB for Mirror Services Configuration Example
    4.6. Service Management Tasks
      4.6.1. Modifying a Local Mirrored Service
      4.6.2. Deleting a Local Mirrored Service
      4.6.3. Modifying a Remote Mirrored Service
      4.6.4. Deleting a Remote Mirrored Service
    4.7. Mirror Service Configuration Command Reference
      4.7.1. Command Hierarchies
        4.7.1.1. Mirror Configuration Commands
        4.7.1.2. Show Commands
        4.7.1.3. Debug Commands
      4.7.2. Command Descriptions
        4.7.2.1. Configuration Commands
          4.7.2.1.1. Generic Commands
          4.7.2.1.2. Mirror Destination Configuration Commands
        4.7.2.2. Show Commands
        4.7.2.3. Debug Commands
  5. Tools
    5.1. Tools Command Reference
      5.1.1. Command Hierarchies
        5.1.1.1. Tools Dump Commands
        5.1.1.2. Tools Perform Commands
        5.1.1.3. Tools ADP Commands
      5.1.2. Command Descriptions
        5.1.2.1. Tools Generic Commands
        5.1.2.2. Tools Dump Commands
          5.1.2.2.1. Dump Commands
          5.1.2.2.2. Dump Test-OAM Commands
          5.1.2.2.3. Dump Router Commands
        5.1.2.3. Tools Perform Commands
          5.1.2.3.1. Perform Commands
          5.1.2.3.2. Perform Router Commands
        5.1.2.4. Tools ADP Commands
  6. List of Acronyms
  7. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR Quality of Service Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR QoS Configuration Process
  3. QoS and QoS Policies
    3.1. QoS Overview
      3.1.1. Overview
      3.1.2. Egress and Ingress Traffic Direction
        3.1.2.1. Ring Traffic
      3.1.3. Forwarding Classes
      3.1.4. Scheduling Modes
      3.1.5. Intelligent Discards
      3.1.6. Buffering
        3.1.6.1. Buffer Pools
        3.1.6.2. CBS and MBS Configuration
          3.1.6.2.1. Buffer Allocation for Multicast Traffic
        3.1.6.3. Buffer Unit Allocation and Buffer Chaining
          3.1.6.3.1. Advantages of Buffer Chaining
      3.1.7. Per-SAP Aggregate Shapers (H-QoS) On Gen-2 Hardware
        3.1.7.1. Shaped and Unshaped SAPs
          3.1.7.1.1. Per-SAP Aggregate Shaper Support
        3.1.7.2. H-QoS Example
      3.1.8. Per-VLAN Network Egress Shapers
        3.1.8.1. Shaped and Unshaped VLANs
        3.1.8.2. Per-VLAN Shaper Support
        3.1.8.3.  VLAN Shaper Applications
          3.1.8.3.1. VLAN Shapers for Dual Uplinks
          3.1.8.3.2. VLAN Shapers for Aggregation Site
      3.1.9. Per-Customer Aggregate Shapers (Multiservice Site) on Gen-2 Hardware
        3.1.9.1. MSS Support
        3.1.9.2. MSS and LAG Interaction on the 7705 SAR-8 and 7705 SAR-18
      3.1.10. QoS for Hybrid Ports on Gen-2 Hardware
      3.1.11. QoS for Gen-3 Adapter Cards and Platforms
        3.1.11.1. 6-port SAR-M Ethernet Module
        3.1.11.2. 4-Priority Scheduling Behavior on Gen-3 Hardware
        3.1.11.3. Gen-3 Hardware and LAG
      3.1.12. QoS on a Ring Adapter Card or Module
        3.1.12.1. Network and Network Queue QoS Policy Types
        3.1.12.2. Network QoS and Network Queue Policies on a Ring Adapter Card or Module
        3.1.12.3. Considerations for Using Ring Adapter Card or Module QoS Policies
      3.1.13. QoS for IPSec Traffic
      3.1.14. QoS for Network Group Encryption Traffic
    3.2. Access Ingress
      3.2.1. Access Ingress Traffic Classification
        3.2.1.1. Traffic Classification Types
          3.2.1.1.1. Hierarchy of Classification Rules
          3.2.1.1.2. Discard Probability of Classified Traffic
      3.2.2. Access Ingress Queues
      3.2.3. Access Ingress Queuing and Scheduling
        3.2.3.1. Profiled (Rate-based) Scheduling
        3.2.3.2. Queue-Type Scheduling
        3.2.3.3. 4-Priority Scheduling
        3.2.3.4. 4-Priority (Gen-3) Scheduling
        3.2.3.5. 16-Priority Scheduling
        3.2.3.6. Ingress Queuing and Scheduling for BMU Traffic
      3.2.4. Access Ingress Per-SAP Aggregate Shapers (Access Ingress H-QoS)
        3.2.4.1. Access Ingress Per-SAP Shapers Arbitration
      3.2.5. Ingress Shaping to Fabric (Access and Network)
        3.2.5.1. BMU Support
          3.2.5.1.1. Aggregate Mode BMU Support
          3.2.5.1.2. Destination Mode BMU Support
        3.2.5.2. LAG SAP Support (Access Only)
      3.2.6. Configurable Ingress Shaping to Fabric (Access and Network)
      3.2.7. Fabric Shaping on the Fixed Platforms (Access and Network)
    3.3. Fabric Traffic
      3.3.1. Traffic Flow Across the Fabric
    3.4. Network Egress
      3.4.1. BMU Traffic at Network Egress
      3.4.2. Network Egress Queuing Aggregation
        3.4.2.1. Network Egress Per-VLAN Queuing
      3.4.3. Network Egress Scheduling
        3.4.3.1. Network Egress 4-Priority Scheduling
        3.4.3.2. Network Egress 4-Priority (Gen-3) Scheduling
        3.4.3.3. Network Egress Scheduling on 8-port Ethernet Adapter Cards
        3.4.3.4. Network Egress 16-Priority Scheduling
      3.4.4. Network Egress Shaping
      3.4.5. Network Egress Shaping for Hybrid Ports
      3.4.6. Network Egress Per-VLAN Shapers
        3.4.6.1. Network Egress Per-VLAN Shapers Arbitration
      3.4.7. Network Egress Marking and Re-Marking
        3.4.7.1. Network Egress Marking and Re-Marking on Ethernet ports
    3.5. Network Ingress
      3.5.1. Network Ingress Classification
        3.5.1.1. Network Ingress Tunnel QoS Override
      3.5.2. Network Ingress Queuing
        3.5.2.1. Network Ingress Queuing for BMU Traffic
      3.5.3. Network Ingress Scheduling
        3.5.3.1. Network Ingress 4-Priority Scheduling
        3.5.3.2. Network Ingress 4-Priority (Gen-3) Scheduling
        3.5.3.3. Network Ingress Scheduling on 8-port Ethernet Adapter Cards
        3.5.3.4. Network Ingress 16-Priority Scheduling
      3.5.4. Network Ingress Shaping to Fabric
      3.5.5. Configurable Network Ingress Shaping to Fabric
      3.5.6. Network Fabric Shaping on the Fixed Platforms
    3.6. Access Egress
      3.6.1. Access Egress Queuing and Scheduling
        3.6.1.1. BMU Traffic Access Egress Queuing and Scheduling
        3.6.1.2. ATM Access Egress Queuing and Scheduling
        3.6.1.3. Ethernet Access Egress Queuing and Scheduling
      3.6.2. Access Egress Per-SAP Aggregate Shapers (Access Egress H-QoS)
        3.6.2.1. Access Egress Per-SAP Shapers Arbitration
      3.6.3. Access Egress Shaping for Hybrid Ports
      3.6.4. Access Egress for 4-Priority (Gen-3) Scheduling
      3.6.5. Access Egress Marking/Re-Marking
      3.6.6. Packet Byte Offset (PBO)
    3.7. QoS Policies Overview
      3.7.1. Overview
      3.7.2. Service Ingress QoS Policies
      3.7.3. Service Egress QoS Policies
      3.7.4. MC-MLPPP SAP Egress QoS Policies
      3.7.5. Network and Network Queue QoS Policies
        3.7.5.1. Network QoS Policies
          3.7.5.1.1. CoS Marking for Self-generated Traffic
          3.7.5.1.2. SGT Redirection
        3.7.5.2. Network Queue QoS Policies
      3.7.6. Network and Service QoS Queue Parameters
        3.7.6.1. Queue ID
        3.7.6.2. Committed Information Rate
        3.7.6.3. Peak Information Rate
        3.7.6.4. Adaptation Rule
        3.7.6.5. Committed Burst Size
        3.7.6.6. Maximum Burst Size
        3.7.6.7. High-Priority-Only Buffers
        3.7.6.8. High and Low Enqueuing Thresholds
        3.7.6.9. Queue Counters
        3.7.6.10. Queue Type
        3.7.6.11. Rate Limiting
      3.7.7. Slope Policies (WRED and RED)
        3.7.7.1. WRED MinThreshold and MaxThreshold Computation
        3.7.7.2. WRED on Bridging Domain (Ring) Queues
        3.7.7.3. Payload-based WRED
      3.7.8. ATM Traffic Descriptor Profiles
      3.7.9. Fabric Profiles
      3.7.10. Shaper Policies
      3.7.11. QoS Policy Entities
    3.8. Configuration Notes
      3.8.1. Reference Sources
  4. Network QoS Policies
    4.1. Overview
    4.2. Basic Configuration
      4.2.1. Configuring a Network QoS Policy
      4.2.2. Creating a Network QoS Policy
      4.2.3. Applying Network QoS Policies
      4.2.4. Default Network QoS Policy Values
    4.3. Service Management Tasks
      4.3.1. Deleting QoS Policies
      4.3.2. Copying and Overwriting Network Policies
      4.3.3. Editing QoS Policies
    4.4. Network QoS Policy Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Configuration Commands
          4.4.1.1.1. QoS Policy Network Commands
          4.4.1.1.2. Self-generated Traffic Configuration Commands
        4.4.1.2. Operational Commands
        4.4.1.3. Show Commands
      4.4.2. Command Descriptions
        4.4.2.1. Configuration Commands
          4.4.2.1.1. Generic Commands
          4.4.2.1.2. Network QoS Policy Commands
          4.4.2.1.3. Network Egress QoS Policy Commands
          4.4.2.1.4. Network Ingress QoS Policy Commands
          4.4.2.1.5. Network Ring QoS Policy Commands
          4.4.2.1.6. Network Egress QoS Policy Forwarding Class Commands
          4.4.2.1.7. Self-generated Traffic Commands
        4.4.2.2. Operational Commands
        4.4.2.3. Show Commands
  5. Network Queue QoS Policies
    5.1. Overview
    5.2. Basic Configuration
      5.2.1. Configuring a Network Queue QoS Policy
      5.2.2. Creating a Network Queue QoS Policy
      5.2.3. Applying Network Queue QoS Policies
        5.2.3.1. Adapter Cards
        5.2.3.2. Network Ports
      5.2.4. Configuring Per-VLAN Network Egress Shapers
      5.2.5. Configuring a CIR for Network Egress Unshaped VLANs
      5.2.6. Default Network Queue QoS Policy Values
    5.3. Service Management Tasks
      5.3.1. Deleting QoS Policies
      5.3.2. Copying and Overwriting QoS Policies
      5.3.3. Editing QoS Policies
    5.4. Network Queue QoS Policy Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. Configuration Commands
        5.4.1.2. Operational Commands
        5.4.1.3. Show Commands
      5.4.2. Command Descriptions
        5.4.2.1. Configuration Commands
          5.4.2.1.1. Generic Commands
          5.4.2.1.2. Network Queue QoS Policy Commands
          5.4.2.1.3. Network Queue QoS Policy Forwarding Class Commands
        5.4.2.2. Operational Commands
        5.4.2.3. Show Commands
  6. Service Egress and Ingress QoS Policies
    6.1. Overview
    6.2. Basic Configuration
      6.2.1. Creating Service Egress and Ingress QoS Policies
        6.2.1.1. Creating a Service Egress QoS Policy
          6.2.1.1.1. Creating a Service Egress QoS Forwarding Class
          6.2.1.1.2. Creating a Service Egress QoS Queue
        6.2.1.2. Creating a Service Ingress QoS Policy
          6.2.1.2.1. Creating a Service Ingress Forwarding Class
          6.2.1.2.2. Creating a Service Ingress QoS Queue
        6.2.1.3. Creating an MC-MLPPP SAP Egress QoS Policy
          6.2.1.3.1. Creating an MC-MLPPP SAP Egress QoS Forwarding Class
          6.2.1.3.2. Creating an MC-MLPPP SAP Egress QoS Queue
      6.2.2. Applying Service Egress and Ingress Policies
        6.2.2.1. VLL and VPLS Services
        6.2.2.2. IES and VPRN Services
      6.2.3. Default Service Egress and Ingress Policy Values
        6.2.3.1. Service Egress Policy Defaults
        6.2.3.2. Service Ingress Policy Defaults
    6.3. Service Management Tasks
      6.3.1. Deleting QoS Policies
        6.3.1.1. Removing a QoS Policy from a Service SAP
        6.3.1.2. Removing a Policy from the QoS Configuration
      6.3.2. Copying and Overwriting QoS Policies
      6.3.3. Editing QoS Policies
    6.4. Service Egress and Ingress QoS Policy Command Reference
      6.4.1. Command Hierarchies
        6.4.1.1. Service Egress QoS Policy Configuration Commands
        6.4.1.2. Service Ingress QoS Policy Configuration Commands
        6.4.1.3. MC-MLPPP SAP Egress QoS Policies
        6.4.1.4. Operational Commands
        6.4.1.5. Show Commands
      6.4.2. Command Descriptions
        6.4.2.1. Configuration Commands
          6.4.2.1.1. Generic Commands
          6.4.2.1.2. Service Egress QoS Policy Commands
          6.4.2.1.3. Service Egress QoS Policy Forwarding Class Commands
          6.4.2.1.4. MC-MLPPP SAP Egress QoS Policy Commands
          6.4.2.1.5. MC-MLPPP Forwarding Class Commands
          6.4.2.1.6. MC-MLPPP Queue Commands
          6.4.2.1.7. Service Ingress QoS Policy Commands
          6.4.2.1.8. Service Ingress QoS Policy Forwarding Class Commands
          6.4.2.1.9. Service Queue QoS Policy Commands
        6.4.2.2. Operational Commands
        6.4.2.3. Show Commands
  7. Slope QoS Policies
    7.1. Overview
    7.2. Basic Configuration
      7.2.1. Creating a Slope QoS Policy
      7.2.2. Applying Slope Policies
      7.2.3. Default Slope Policy Values
    7.3. Service Management Tasks
      7.3.1. Deleting QoS Policies
        7.3.1.1. Removing a Policy from the QoS Configuration
      7.3.2. Copying and Overwriting QoS Policies
      7.3.3. Editing QoS Policies
    7.4. Slope QoS Policy Command Reference
      7.4.1. Command Hierarchies
        7.4.1.1. Configuration Commands
        7.4.1.2. Operational Commands
        7.4.1.3. Show Commands
      7.4.2. Command Descriptions
        7.4.2.1. Configuration Commands
          7.4.2.1.1. Generic Commands
          7.4.2.1.2. Slope Policy QoS Commands
          7.4.2.1.3. WRED/RED Slope Commands
        7.4.2.2. Operational Commands
        7.4.2.3. Show Commands
  8. ATM QoS Traffic Descriptor Profiles
    8.1. ATM Traffic Descriptor Profiles
      8.1.1. ATM Traffic Management
        8.1.1.1. ATM Service Categories
        8.1.1.2. ATM Traffic Descriptors and QoS Parameters
        8.1.1.3. ATM Policing
        8.1.1.4. Shaping
        8.1.1.5. ATM Queuing and Scheduling
        8.1.1.6. Congestion Avoidance
    8.2. Basic Configuration
      8.2.1. Creating an ATM Traffic Descriptor Profile QoS Policy
      8.2.2. Applying ATM Traffic Descriptor Profile Policies
        8.2.2.1. ATM VLL (Apipe) SAPs
      8.2.3. Default ATM Traffic Descriptor Profile Policy Values
    8.3. Service Management Tasks
      8.3.1. Removing an ATM Traffic Descriptor Profile from the QoS Configuration
      8.3.2. Copying and Overwriting an ATM Traffic Descriptor Profile
      8.3.3. Editing QoS Policies
    8.4. ATM QoS Policy Command Reference
      8.4.1. Command Hierarchies
        8.4.1.1. Configuration Commands
        8.4.1.2. Operational Commands
        8.4.1.3. Show Commands
      8.4.2. Command Descriptions
        8.4.2.1. Configuration Commands
          8.4.2.1.1. Generic Commands
          8.4.2.1.2. ATM QoS Policy Commands
        8.4.2.2. Operational Commands
        8.4.2.3. Show Commands
  9. QoS Fabric Profiles
    9.1. Basic Configuration
      9.1.1. Creating a QoS Fabric Profile
      9.1.2. Applying a QoS Fabric Profile
      9.1.3. Default Fabric Profile Values
    9.2. Service Management Tasks
      9.2.1. Removing a Fabric Profile from the QoS Configuration
      9.2.2. Copying and Overwriting a Fabric Profile
      9.2.3. Editing QoS Policies
    9.3. QoS Fabric Profile Command Reference
      9.3.1. Command Hierarchies
        9.3.1.1. Configuration Commands
        9.3.1.2. Operational Commands
        9.3.1.3. Show Commands
      9.3.2. Command Descriptions
        9.3.2.1. Configuration Commands
          9.3.2.1.1. Generic Commands
          9.3.2.1.2. QoS Fabric Profile Commands
          9.3.2.1.3. Fixed Platform Fabric Shaping Commands
        9.3.2.2. Operational Commands
        9.3.2.3. Show Commands
  10. QoS Shapers and Shaper QoS Policies
    10.1. Overview of QoS Shapers and Shaper QoS Policies
    10.2. Basic Configuration
      10.2.1. Creating a Shaper QoS Policy and Shaper Groups
      10.2.2. Applying a Shaper QoS Policy and Shaper Groups
        10.2.2.1. Applying a Shaper Policy
        10.2.2.2. Applying a Shaper Group
        10.2.2.3. Viewing Shaper Policy Information
      10.2.3. Default Shaper QoS Policy Values
      10.2.4. Configuring per-SAP Aggregate Shapers and an Unshaped SAP Aggregate Shaper (H-QoS)
        10.2.4.1. Creating 16-Priority Shaped SAPs and Configuring per-SAP Aggregate Shapers
        10.2.4.2. Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Ingress)
        10.2.4.3. Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Egress)
      10.2.5. Configuring per-VLAN Shapers and an Unshaped VLAN Shaper
        10.2.5.1. Configuring Per-VLAN Network Egress Shapers
        10.2.5.2. Configuring a CIR for Network Egress Unshaped VLANs
    10.3. Service Management Tasks
      10.3.1. Removing and Deleting QoS Policies
      10.3.2. Copying and Overwriting QoS Policies
      10.3.3. Editing QoS Policies
    10.4. Shaper QoS Policy Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Configuration Commands
        10.4.1.2. Operational Commands
        10.4.1.3. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Configuration Commands
          10.4.2.1.1. Generic Commands
          10.4.2.1.2. Shaper QoS Policy Commands
        10.4.2.2. Operational Commands
        10.4.2.3. Show Commands
  11. Security Queue QoS Policies
    11.1. Overview
      11.1.1. Packet Queuing with DSCP
    11.2. Basic Configuration
      11.2.1. Creating a Security Queue QoS Policy
      11.2.2. Default Security Queue Policy Parameter Values
    11.3. Service Management Tasks
      11.3.1. Deleting QoS Policies
      11.3.2. Copying and Overwriting QoS Policies
      11.3.3. Editing QoS Policies
    11.4. Security Queue QoS Policy Command Reference
      11.4.1. Command Hierarchies
        11.4.1.1. Configuration Commands
        11.4.1.2. Operational Commands
        11.4.1.3. Show Commands
      11.4.2. Command Descriptions
        11.4.2.1. Configuration Commands
          11.4.2.1.1. Security Queue QoS Policy Commands
        11.4.2.2. Operational Commands
        11.4.2.3. Show Commands
  12. List of Acronyms
  13. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR QoS Configuration Process
  3. QoS and QoS Policies
    3.1. QoS Overview
      3.1.1. Overview
      3.1.2. Egress and Ingress Traffic Direction
        3.1.2.1. Ring Traffic
      3.1.3. Forwarding Classes
      3.1.4. Scheduling Modes
      3.1.5. Intelligent Discards
      3.1.6. Buffering
        3.1.6.1. Buffer Pools
        3.1.6.2. CBS and MBS Configuration
          3.1.6.2.1. Buffer Allocation for Multicast Traffic
        3.1.6.3. Buffer Unit Allocation and Buffer Chaining
          3.1.6.3.1. Advantages of Buffer Chaining
      3.1.7. Per-SAP Aggregate Shapers (H-QoS) On Gen-2 Hardware
        3.1.7.1. Shaped and Unshaped SAPs
          3.1.7.1.1. Per-SAP Aggregate Shaper Support
        3.1.7.2. H-QoS Example
      3.1.8. Per-VLAN Network Egress Shapers
        3.1.8.1. Shaped and Unshaped VLANs
        3.1.8.2. Per-VLAN Shaper Support
        3.1.8.3.  VLAN Shaper Applications
          3.1.8.3.1. VLAN Shapers for Dual Uplinks
          3.1.8.3.2. VLAN Shapers for Aggregation Site
      3.1.9. Per-Customer Aggregate Shapers (Multiservice Site) on Gen-2 Hardware
        3.1.9.1. MSS Support
        3.1.9.2. MSS and LAG Interaction on the 7705 SAR-8 and 7705 SAR-18
      3.1.10. QoS for Hybrid Ports on Gen-2 Hardware
      3.1.11. QoS for Gen-3 Adapter Cards and Platforms
        3.1.11.1. 6-port SAR-M Ethernet Module
        3.1.11.2. 4-Priority Scheduling Behavior on Gen-3 Hardware
        3.1.11.3. Gen-3 Hardware and LAG
      3.1.12. QoS on a Ring Adapter Card or Module
        3.1.12.1. Network and Network Queue QoS Policy Types
        3.1.12.2. Network QoS and Network Queue Policies on a Ring Adapter Card or Module
        3.1.12.3. Considerations for Using Ring Adapter Card or Module QoS Policies
      3.1.13. QoS for IPSec Traffic
      3.1.14. QoS for Network Group Encryption Traffic
    3.2. Access Ingress
      3.2.1. Access Ingress Traffic Classification
        3.2.1.1. Traffic Classification Types
          3.2.1.1.1. Hierarchy of Classification Rules
          3.2.1.1.2. Discard Probability of Classified Traffic
      3.2.2. Access Ingress Queues
      3.2.3. Access Ingress Queuing and Scheduling
        3.2.3.1. Profiled (Rate-based) Scheduling
        3.2.3.2. Queue-Type Scheduling
        3.2.3.3. 4-Priority Scheduling
        3.2.3.4. 4-Priority (Gen-3) Scheduling
        3.2.3.5. 16-Priority Scheduling
        3.2.3.6. Ingress Queuing and Scheduling for BMU Traffic
      3.2.4. Access Ingress Per-SAP Aggregate Shapers (Access Ingress H-QoS)
        3.2.4.1. Access Ingress Per-SAP Shapers Arbitration
      3.2.5. Ingress Shaping to Fabric (Access and Network)
        3.2.5.1. BMU Support
          3.2.5.1.1. Aggregate Mode BMU Support
          3.2.5.1.2. Destination Mode BMU Support
        3.2.5.2. LAG SAP Support (Access Only)
      3.2.6. Configurable Ingress Shaping to Fabric (Access and Network)
      3.2.7. Fabric Shaping on the Fixed Platforms (Access and Network)
    3.3. Fabric Traffic
      3.3.1. Traffic Flow Across the Fabric
    3.4. Network Egress
      3.4.1. BMU Traffic at Network Egress
      3.4.2. Network Egress Queuing Aggregation
        3.4.2.1. Network Egress Per-VLAN Queuing
      3.4.3. Network Egress Scheduling
        3.4.3.1. Network Egress 4-Priority Scheduling
        3.4.3.2. Network Egress 4-Priority (Gen-3) Scheduling
        3.4.3.3. Network Egress Scheduling on 8-port Ethernet Adapter Cards
        3.4.3.4. Network Egress 16-Priority Scheduling
      3.4.4. Network Egress Shaping
      3.4.5. Network Egress Shaping for Hybrid Ports
      3.4.6. Network Egress Per-VLAN Shapers
        3.4.6.1. Network Egress Per-VLAN Shapers Arbitration
      3.4.7. Network Egress Marking and Re-Marking
        3.4.7.1. Network Egress Marking and Re-Marking on Ethernet ports
    3.5. Network Ingress
      3.5.1. Network Ingress Classification
        3.5.1.1. Network Ingress Tunnel QoS Override
      3.5.2. Network Ingress Queuing
        3.5.2.1. Network Ingress Queuing for BMU Traffic
      3.5.3. Network Ingress Scheduling
        3.5.3.1. Network Ingress 4-Priority Scheduling
        3.5.3.2. Network Ingress 4-Priority (Gen-3) Scheduling
        3.5.3.3. Network Ingress Scheduling on 8-port Ethernet Adapter Cards
        3.5.3.4. Network Ingress 16-Priority Scheduling
      3.5.4. Network Ingress Shaping to Fabric
      3.5.5. Configurable Network Ingress Shaping to Fabric
      3.5.6. Network Fabric Shaping on the Fixed Platforms
    3.6. Access Egress
      3.6.1. Access Egress Queuing and Scheduling
        3.6.1.1. BMU Traffic Access Egress Queuing and Scheduling
        3.6.1.2. ATM Access Egress Queuing and Scheduling
        3.6.1.3. Ethernet Access Egress Queuing and Scheduling
      3.6.2. Access Egress Per-SAP Aggregate Shapers (Access Egress H-QoS)
        3.6.2.1. Access Egress Per-SAP Shapers Arbitration
      3.6.3. Access Egress Shaping for Hybrid Ports
      3.6.4. Access Egress for 4-Priority (Gen-3) Scheduling
      3.6.5. Access Egress Marking/Re-Marking
      3.6.6. Packet Byte Offset (PBO)
    3.7. QoS Policies Overview
      3.7.1. Overview
      3.7.2. Service Ingress QoS Policies
      3.7.3. Service Egress QoS Policies
      3.7.4. MC-MLPPP SAP Egress QoS Policies
      3.7.5. Network and Network Queue QoS Policies
        3.7.5.1. Network QoS Policies
          3.7.5.1.1. CoS Marking for Self-generated Traffic
          3.7.5.1.2. SGT Redirection
        3.7.5.2. Network Queue QoS Policies
      3.7.6. Network and Service QoS Queue Parameters
        3.7.6.1. Queue ID
        3.7.6.2. Committed Information Rate
        3.7.6.3. Peak Information Rate
        3.7.6.4. Adaptation Rule
        3.7.6.5. Committed Burst Size
        3.7.6.6. Maximum Burst Size
        3.7.6.7. High-Priority-Only Buffers
        3.7.6.8. High and Low Enqueuing Thresholds
        3.7.6.9. Queue Counters
        3.7.6.10. Queue Type
        3.7.6.11. Rate Limiting
      3.7.7. Slope Policies (WRED and RED)
        3.7.7.1. WRED MinThreshold and MaxThreshold Computation
        3.7.7.2. WRED on Bridging Domain (Ring) Queues
        3.7.7.3. Payload-based WRED
      3.7.8. ATM Traffic Descriptor Profiles
      3.7.9. Fabric Profiles
      3.7.10. Shaper Policies
      3.7.11. QoS Policy Entities
    3.8. Configuration Notes
      3.8.1. Reference Sources
  4. Network QoS Policies
    4.1. Overview
    4.2. Basic Configuration
      4.2.1. Configuring a Network QoS Policy
      4.2.2. Creating a Network QoS Policy
      4.2.3. Applying Network QoS Policies
      4.2.4. Default Network QoS Policy Values
    4.3. Service Management Tasks
      4.3.1. Deleting QoS Policies
      4.3.2. Copying and Overwriting Network Policies
      4.3.3. Editing QoS Policies
    4.4. Network QoS Policy Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Configuration Commands
          4.4.1.1.1. QoS Policy Network Commands
          4.4.1.1.2. Self-generated Traffic Configuration Commands
        4.4.1.2. Operational Commands
        4.4.1.3. Show Commands
      4.4.2. Command Descriptions
        4.4.2.1. Configuration Commands
          4.4.2.1.1. Generic Commands
          4.4.2.1.2. Network QoS Policy Commands
          4.4.2.1.3. Network Egress QoS Policy Commands
          4.4.2.1.4. Network Ingress QoS Policy Commands
          4.4.2.1.5. Network Ring QoS Policy Commands
          4.4.2.1.6. Network Egress QoS Policy Forwarding Class Commands
          4.4.2.1.7. Self-generated Traffic Commands
        4.4.2.2. Operational Commands
        4.4.2.3. Show Commands
  5. Network Queue QoS Policies
    5.1. Overview
    5.2. Basic Configuration
      5.2.1. Configuring a Network Queue QoS Policy
      5.2.2. Creating a Network Queue QoS Policy
      5.2.3. Applying Network Queue QoS Policies
        5.2.3.1. Adapter Cards
        5.2.3.2. Network Ports
      5.2.4. Configuring Per-VLAN Network Egress Shapers
      5.2.5. Configuring a CIR for Network Egress Unshaped VLANs
      5.2.6. Default Network Queue QoS Policy Values
    5.3. Service Management Tasks
      5.3.1. Deleting QoS Policies
      5.3.2. Copying and Overwriting QoS Policies
      5.3.3. Editing QoS Policies
    5.4. Network Queue QoS Policy Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. Configuration Commands
        5.4.1.2. Operational Commands
        5.4.1.3. Show Commands
      5.4.2. Command Descriptions
        5.4.2.1. Configuration Commands
          5.4.2.1.1. Generic Commands
          5.4.2.1.2. Network Queue QoS Policy Commands
          5.4.2.1.3. Network Queue QoS Policy Forwarding Class Commands
        5.4.2.2. Operational Commands
        5.4.2.3. Show Commands
  6. Service Egress and Ingress QoS Policies
    6.1. Overview
    6.2. Basic Configuration
      6.2.1. Creating Service Egress and Ingress QoS Policies
        6.2.1.1. Creating a Service Egress QoS Policy
          6.2.1.1.1. Creating a Service Egress QoS Forwarding Class
          6.2.1.1.2. Creating a Service Egress QoS Queue
        6.2.1.2. Creating a Service Ingress QoS Policy
          6.2.1.2.1. Creating a Service Ingress Forwarding Class
          6.2.1.2.2. Creating a Service Ingress QoS Queue
        6.2.1.3. Creating an MC-MLPPP SAP Egress QoS Policy
          6.2.1.3.1. Creating an MC-MLPPP SAP Egress QoS Forwarding Class
          6.2.1.3.2. Creating an MC-MLPPP SAP Egress QoS Queue
      6.2.2. Applying Service Egress and Ingress Policies
        6.2.2.1. VLL and VPLS Services
        6.2.2.2. IES and VPRN Services
      6.2.3. Default Service Egress and Ingress Policy Values
        6.2.3.1. Service Egress Policy Defaults
        6.2.3.2. Service Ingress Policy Defaults
    6.3. Service Management Tasks
      6.3.1. Deleting QoS Policies
        6.3.1.1. Removing a QoS Policy from a Service SAP
        6.3.1.2. Removing a Policy from the QoS Configuration
      6.3.2. Copying and Overwriting QoS Policies
      6.3.3. Editing QoS Policies
    6.4. Service Egress and Ingress QoS Policy Command Reference
      6.4.1. Command Hierarchies
        6.4.1.1. Service Egress QoS Policy Configuration Commands
        6.4.1.2. Service Ingress QoS Policy Configuration Commands
        6.4.1.3. MC-MLPPP SAP Egress QoS Policies
        6.4.1.4. Operational Commands
        6.4.1.5. Show Commands
      6.4.2. Command Descriptions
        6.4.2.1. Configuration Commands
          6.4.2.1.1. Generic Commands
          6.4.2.1.2. Service Egress QoS Policy Commands
          6.4.2.1.3. Service Egress QoS Policy Forwarding Class Commands
          6.4.2.1.4. MC-MLPPP SAP Egress QoS Policy Commands
          6.4.2.1.5. MC-MLPPP Forwarding Class Commands
          6.4.2.1.6. MC-MLPPP Queue Commands
          6.4.2.1.7. Service Ingress QoS Policy Commands
          6.4.2.1.8. Service Ingress QoS Policy Forwarding Class Commands
          6.4.2.1.9. Service Queue QoS Policy Commands
        6.4.2.2. Operational Commands
        6.4.2.3. Show Commands
  7. Slope QoS Policies
    7.1. Overview
    7.2. Basic Configuration
      7.2.1. Creating a Slope QoS Policy
      7.2.2. Applying Slope Policies
      7.2.3. Default Slope Policy Values
    7.3. Service Management Tasks
      7.3.1. Deleting QoS Policies
        7.3.1.1. Removing a Policy from the QoS Configuration
      7.3.2. Copying and Overwriting QoS Policies
      7.3.3. Editing QoS Policies
    7.4. Slope QoS Policy Command Reference
      7.4.1. Command Hierarchies
        7.4.1.1. Configuration Commands
        7.4.1.2. Operational Commands
        7.4.1.3. Show Commands
      7.4.2. Command Descriptions
        7.4.2.1. Configuration Commands
          7.4.2.1.1. Generic Commands
          7.4.2.1.2. Slope Policy QoS Commands
          7.4.2.1.3. WRED/RED Slope Commands
        7.4.2.2. Operational Commands
        7.4.2.3. Show Commands
  8. ATM QoS Traffic Descriptor Profiles
    8.1. ATM Traffic Descriptor Profiles
      8.1.1. ATM Traffic Management
        8.1.1.1. ATM Service Categories
        8.1.1.2. ATM Traffic Descriptors and QoS Parameters
        8.1.1.3. ATM Policing
        8.1.1.4. Shaping
        8.1.1.5. ATM Queuing and Scheduling
        8.1.1.6. Congestion Avoidance
    8.2. Basic Configuration
      8.2.1. Creating an ATM Traffic Descriptor Profile QoS Policy
      8.2.2. Applying ATM Traffic Descriptor Profile Policies
        8.2.2.1. ATM VLL (Apipe) SAPs
      8.2.3. Default ATM Traffic Descriptor Profile Policy Values
    8.3. Service Management Tasks
      8.3.1. Removing an ATM Traffic Descriptor Profile from the QoS Configuration
      8.3.2. Copying and Overwriting an ATM Traffic Descriptor Profile
      8.3.3. Editing QoS Policies
    8.4. ATM QoS Policy Command Reference
      8.4.1. Command Hierarchies
        8.4.1.1. Configuration Commands
        8.4.1.2. Operational Commands
        8.4.1.3. Show Commands
      8.4.2. Command Descriptions
        8.4.2.1. Configuration Commands
          8.4.2.1.1. Generic Commands
          8.4.2.1.2. ATM QoS Policy Commands
        8.4.2.2. Operational Commands
        8.4.2.3. Show Commands
  9. QoS Fabric Profiles
    9.1. Basic Configuration
      9.1.1. Creating a QoS Fabric Profile
      9.1.2. Applying a QoS Fabric Profile
      9.1.3. Default Fabric Profile Values
    9.2. Service Management Tasks
      9.2.1. Removing a Fabric Profile from the QoS Configuration
      9.2.2. Copying and Overwriting a Fabric Profile
      9.2.3. Editing QoS Policies
    9.3. QoS Fabric Profile Command Reference
      9.3.1. Command Hierarchies
        9.3.1.1. Configuration Commands
        9.3.1.2. Operational Commands
        9.3.1.3. Show Commands
      9.3.2. Command Descriptions
        9.3.2.1. Configuration Commands
          9.3.2.1.1. Generic Commands
          9.3.2.1.2. QoS Fabric Profile Commands
          9.3.2.1.3. Fixed Platform Fabric Shaping Commands
        9.3.2.2. Operational Commands
        9.3.2.3. Show Commands
  10. QoS Shapers and Shaper QoS Policies
    10.1. Overview of QoS Shapers and Shaper QoS Policies
    10.2. Basic Configuration
      10.2.1. Creating a Shaper QoS Policy and Shaper Groups
      10.2.2. Applying a Shaper QoS Policy and Shaper Groups
        10.2.2.1. Applying a Shaper Policy
        10.2.2.2. Applying a Shaper Group
        10.2.2.3. Viewing Shaper Policy Information
      10.2.3. Default Shaper QoS Policy Values
      10.2.4. Configuring per-SAP Aggregate Shapers and an Unshaped SAP Aggregate Shaper (H-QoS)
        10.2.4.1. Creating 16-Priority Shaped SAPs and Configuring per-SAP Aggregate Shapers
        10.2.4.2. Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Ingress)
        10.2.4.3. Configuring an Unshaped Aggregate CIR for All 4-Priority Unshaped SAPs (Access Egress)
      10.2.5. Configuring per-VLAN Shapers and an Unshaped VLAN Shaper
        10.2.5.1. Configuring Per-VLAN Network Egress Shapers
        10.2.5.2. Configuring a CIR for Network Egress Unshaped VLANs
    10.3. Service Management Tasks
      10.3.1. Removing and Deleting QoS Policies
      10.3.2. Copying and Overwriting QoS Policies
      10.3.3. Editing QoS Policies
    10.4. Shaper QoS Policy Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Configuration Commands
        10.4.1.2. Operational Commands
        10.4.1.3. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Configuration Commands
          10.4.2.1.1. Generic Commands
          10.4.2.1.2. Shaper QoS Policy Commands
        10.4.2.2. Operational Commands
        10.4.2.3. Show Commands
  11. Security Queue QoS Policies
    11.1. Overview
      11.1.1. Packet Queuing with DSCP
    11.2. Basic Configuration
      11.2.1. Creating a Security Queue QoS Policy
      11.2.2. Default Security Queue Policy Parameter Values
    11.3. Service Management Tasks
      11.3.1. Deleting QoS Policies
      11.3.2. Copying and Overwriting QoS Policies
      11.3.3. Editing QoS Policies
    11.4. Security Queue QoS Policy Command Reference
      11.4.1. Command Hierarchies
        11.4.1.1. Configuration Commands
        11.4.1.2. Operational Commands
        11.4.1.3. Show Commands
      11.4.2. Command Descriptions
        11.4.2.1. Configuration Commands
          11.4.2.1.1. Security Queue QoS Policy Commands
        11.4.2.2. Operational Commands
        11.4.2.3. Show Commands
  12. List of Acronyms
  13. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR Router Configuration Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Router Configuration Process
  3. IP Router Configuration
    3.1. Configuring IP Router Parameters
      3.1.1. Interfaces
        3.1.1.1. Network Interface
          3.1.1.1.1. Ethernet Ports and Multiple ARP Entries
          3.1.1.1.2. Dynamic ARP and Static MAC entry
          3.1.1.1.3. Configurable ARP Retry Timer
          3.1.1.1.4. Proxy ARP
          3.1.1.1.5. ETH-CFM Support
        3.1.1.2. System Interface
        3.1.1.3. Unnumbered Interfaces
        3.1.1.4. Creating an IP Address Range
      3.1.2. IP Addresses
      3.1.3. Internet Protocol Versions
        3.1.3.1. IPv6 Address Format
        3.1.3.2. IPv6 Headers
        3.1.3.3. Neighbor Discovery
      3.1.4. Router ID
      3.1.5. Autonomous Systems
      3.1.6. DHCP and DHCPv6
        3.1.6.1. DHCP Relay and DHCPv6 Relay
          3.1.6.1.1. DHCP Relay Agent Options
        3.1.6.2. Local DHCP and DHCPv6 Server
          3.1.6.2.1. DHCP and DHCPv6 Server Options
      3.1.7. ICMP and ICMPv6
      3.1.8. Static Routes, Dynamic Routes, and ECMP
        3.1.8.1. Enabling ECMP
      3.1.9. IGP-LDP and Static Route-LDP Synchronization
      3.1.10. Bidirectional Forwarding Detection (BFD)
      3.1.11. IP Fast Reroute (FRR)
        3.1.11.1. ECMP vs FRR
        3.1.11.2. IGP Shortcuts (RSVP-TE Tunnels)
        3.1.11.3. IP FRR Configuration
    3.2. Configuring Security Parameters
      3.2.1. Supported Hardware
      3.2.2. Security Zone Configuration
      3.2.3. Security Session Creation
        3.2.3.1. Directionally Aware Security Behavior
        3.2.3.2. TCP MSS Configuration and Adjustment
      3.2.4. Application Groups
      3.2.5. Host Groups
      3.2.6. Security Policy Policing
      3.2.7. Security Profiles
        3.2.7.1. Profile Timers
        3.2.7.2. Application Assurance Parameters
          3.2.7.2.1. DNS
          3.2.7.2.2. ICMP
          3.2.7.2.3. IP Options
          3.2.7.2.4. Strict TCP
        3.2.7.3. Application Level Gateway
        3.2.7.4. Fragmentation Handling
      3.2.8. Security Policies
      3.2.9. Security Session Resource Alarms
      3.2.10. Security Logging
      3.2.11. Firewall Debugging
      3.2.12. NAT Security
        3.2.12.1. NAT Zones
        3.2.12.2. Dynamic Source NAT
        3.2.12.3. Local Traffic and NAT
        3.2.12.4. Port Forwarding (Static Destination NAT)
    3.3. Using the 7705 SAR as Residential or Business CPE
    3.4. Router Configuration Process Overview
    3.5. Configuration Notes
      3.5.1. Reference Sources
    3.6. Configuring an IP Router with CLI
    3.7. Router Configuration Overview
      3.7.1. System Interface
      3.7.2. Network Interface
    3.8. Basic Configuration
    3.9. Common Configuration Tasks
      3.9.1. Configuring a System Name
      3.9.2. Configuring Router IPv6 Neighbor Discovery Parameters
      3.9.3. Configuring Interfaces
        3.9.3.1. Configuring a System Interface
        3.9.3.2. Configuring a Network Interface
          3.9.3.2.1. Creating an IPv6 Network Interface
        3.9.3.3. Configuring an Unnumbered Interface
      3.9.4. Configuring IPv6 Parameters
      3.9.5. Configuring Router Advertisement
      3.9.6. Configuring ECMP
      3.9.7. Configuring Static Routes
      3.9.8. Configuring or Deriving a Router ID
      3.9.9. Configuring an Autonomous System
      3.9.10. Configuring ICMP and ICMPv6
      3.9.11. Configuring a DHCP Relay Agent
      3.9.12. Configuring Proxy ARP
      3.9.13. Configuring a Security Zone
      3.9.14. Configuring Security Logging
        3.9.14.1. Rule-Based Security Logging
        3.9.14.2. Zone-Based Security Logging
      3.9.15. Applying an Application Group and a Host Group to a Security Policy
      3.9.16. Configuring an IP Reassembly Profile
    3.10. Service Management Tasks
      3.10.1. Changing the System Name
      3.10.2. Modifying Interface Parameters
      3.10.3. Deleting a Logical IP Interface
    3.11. IP Router Command Reference
      3.11.1. Command Hierarchies
        3.11.1.1. Configuration Commands
          3.11.1.1.1. Router Commands
          3.11.1.1.2. Local DHCP and DHCPv6 Server Commands
          3.11.1.1.3. Router Interface Commands
          3.11.1.1.4. Router Interface IPv6 Commands
          3.11.1.1.5. Router Advertisement Commands
          3.11.1.1.6. Router Security Zone Configuration Commands
          3.11.1.1.7. TWAMP Light Commands
        3.11.1.2. Show Commands
        3.11.1.3. Clear Commands
        3.11.1.4. Debug Commands
      3.11.2. Command Descriptions
        3.11.2.1. Configuration Commands
          3.11.2.1.1. Generic Commands
          3.11.2.1.2. Router Global Commands
          3.11.2.1.3. Local DHCP and DHCPv6 Server Commands
          3.11.2.1.4. Router Interface Commands
          3.11.2.1.5. Router Interface IPv6 Commands
          3.11.2.1.6. Router Interface DHCP Relay Agent Commands
          3.11.2.1.7. Router Interface Filter Commands
          3.11.2.1.8. Router Interface Encryption Commands
          3.11.2.1.9. Router Interface ICMP and ICMPv6 Commands
          3.11.2.1.10. Router Advertisement Commands
          3.11.2.1.11. Router Security Zone Configuration Commands
          3.11.2.1.12. TWAMP Light Commands
        3.11.2.2. Show Commands
        3.11.2.3. Clear Commands
        3.11.2.4. Debug Commands
  4. VRRP
    4.1. VRRP Overview
    4.2. VRRP Components
      4.2.1. Virtual Router
      4.2.2. IP Address Owner
      4.2.3. Primary Address
      4.2.4. Virtual Router Master
      4.2.5. Virtual Router Backup
      4.2.6. Owner and Non-owner VRRP
      4.2.7. Configurable Parameters
        4.2.7.1. VRID
        4.2.7.2. Priority
        4.2.7.3. IP Addresses
        4.2.7.4. Message Interval and Master Inheritance
        4.2.7.5. Master Down Interval
        4.2.7.6. Skew Time
        4.2.7.7. Preempt Mode
        4.2.7.8. VRRP Message Authentication (IPv4 only)
          4.2.7.8.1. Authentication Failure
        4.2.7.9. Virtual MAC Address
        4.2.7.10. BFD-Enable
        4.2.7.11. Initial Delay Timer
        4.2.7.12. VRRP Advertisement Message IP Address List Verification
        4.2.7.13. IPv6 Virtual Router Instance Operationally Up
        4.2.7.14. Policies
    4.3. VRRP Priority Control Policies
      4.3.1. VRRP Policy Constraints
      4.3.2. VRRP Base Priority
      4.3.3. VRRP Priority Control Policy In-use Priority
      4.3.4. VRRP Priority Control Policy Priority Events
        4.3.4.1. Priority Event Hold-set Timers
        4.3.4.2. Port Down Priority Event
        4.3.4.3. LAG Port Down Priority Event
        4.3.4.4. Host Unreachable Priority Event
        4.3.4.5. Route Unknown Priority Event
    4.4. VRRP Non-owner Accessibility
      4.4.1. Non-owner Access Ping Reply
      4.4.2. Non-owner Access Telnet
      4.4.3. Non-owner Access SSH
    4.5. VRRP Configuration Process Overview
    4.6. Configuration Notes
    4.7. Configuring VRRP with CLI
    4.8. VRRP Configuration Overview
      4.8.1. Preconfiguration Requirements
    4.9. Basic VRRP Configurations
      4.9.1. VRRP Policy
      4.9.2. VRRP IES or VPRN Service Parameters
        4.9.2.1. Configuring IES or VPRN VRRP for IPv6
    4.10. Common Configuration Tasks
    4.11. Configuring IES or VPRN VRRP Parameters
      4.11.1. Configuring VRRP on Subnets
      4.11.2. Owner VRRP
      4.11.3. Non-owner VRRP
    4.12. VRRP Management Tasks
      4.12.1. Deleting a VRRP Policy
      4.12.2. Deleting VRRP on a Service
    4.13. VRRP Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VRRP Priority Control Event Policy Commands
        4.13.1.2. VRRP Show Commands
        4.13.1.3. VRRP Monitor Commands
        4.13.1.4. VRRP Clear Commands
        4.13.1.5. VRRP Debug Commands
      4.13.2. Command Descriptions
        4.13.2.1. Configuration Commands
          4.13.2.1.1. VRRP Priority Control Event Policy Commands
          4.13.2.1.2. VRRP Priority Event Commands
        4.13.2.2. VRRP Show Commands
        4.13.2.3. VRRP Monitor Commands
        4.13.2.4. VRRP Clear Commands
        4.13.2.5. VRRP Debug Commands
  5. Filter Policies
    5.1. Configuring Filter Policies
      5.1.1. Overview of Filter Policies
      5.1.2. Network and Service (Access) Interface-based Filtering
      5.1.3. Policy-Based Routing
      5.1.4. Multi-field Classification (MFC)
      5.1.5. VLAN-based Filtering
      5.1.6. Filter Policy Entries
        5.1.6.1. Applying Filter Policies
        5.1.6.2. Packet Matching Criteria
        5.1.6.3. Ordering Filter Entries
      5.1.7. Filter Log Files
    5.2. Configuration Notes
      5.2.1. IP Filters
      5.2.2. IPv6 Filters
      5.2.3. MAC Filters
      5.2.4. VLAN Filters
      5.2.5. Filter Logs
      5.2.6. Reference Sources
    5.3. Configuring Filter Policies with CLI
    5.4. Basic Configuration
    5.5. Common Configuration Tasks
      5.5.1. Creating an IPv4 or IPv6 Filter Policy
        5.5.1.1. IP Filter Policy
        5.5.1.2. IP Filter Entry
        5.5.1.3. IP Filter Entry Matching Criteria
        5.5.1.4. IP Filter Entry for PBR to a System IP or Loopback Address
      5.5.2. Creating a MAC Filter Policy
        5.5.2.1. MAC Filter Policy
        5.5.2.2. MAC Filter Entry
        5.5.2.3. MAC Entry Matching Criteria
      5.5.3. Creating a VLAN Filter Policy
        5.5.3.1. VLAN Filter Policy
        5.5.3.2. VLAN Filter Entry
        5.5.3.3. VLAN Entry Matching Criteria
      5.5.4. Creating an IP Exception Filter Policy
        5.5.4.1. IP Exception Filter Policy
        5.5.4.2. IP Exception Entry Matching Criteria
      5.5.5. Configuring Filter Log Policies
      5.5.6. Configuring a NAT Security Profile
      5.5.7. Configuring a NAT Security Policy
      5.5.8. Applying IP and MAC Filter Policies to a Service
      5.5.9. Applying IP Filter Policies to Network Interfaces
      5.5.10. Applying VLAN Filter Policies to a Ring Port
    5.6. Filter Management Tasks
      5.6.1. Renumbering Filter Policy Entries
      5.6.2. Modifying an IP Filter Policy
      5.6.3. Modifying a MAC Filter Policy
      5.6.4. Modifying a VLAN Filter Policy
      5.6.5. Removing and Deleting a Filter Policy
        5.6.5.1. Removing a Filter from a Service
        5.6.5.2. Removing a Filter from a Network Interface
        5.6.5.3. Removing a Filter from a Ring Port
        5.6.5.4. Deleting a Filter
    5.7. Filter Command Reference
      5.7.1. Command Hierarchies
        5.7.1.1. Configuration Commands
          5.7.1.1.1. IP Filter Log Configuration Commands
          5.7.1.1.2. IP Filter Policy Configuration Commands
          5.7.1.1.3. IPv6 Filter Policy Configuration Commands
          5.7.1.1.4. MAC Filter Policy Commands
          5.7.1.1.5. VLAN Filter Policy Commands
          5.7.1.1.6. IP Exception Filter Policy Configuration Commands
          5.7.1.1.7. Security Policy Commands
        5.7.1.2. Show Commands
        5.7.1.3. Clear Commands
        5.7.1.4. Monitor Commands
      5.7.2. Command Descriptions
        5.7.2.1. Configuration Commands
          5.7.2.1.1. Generic Commands
          5.7.2.1.2. Filter Log Commands
          5.7.2.1.3. Filter Policy Commands
          5.7.2.1.4. General Filter Entry Commands
          5.7.2.1.5. IP, MAC, VLAN, and IP Exception Filter Entry Commands
          5.7.2.1.6. IP, MAC, and IP Exception Filter Match Criteria Commands
          5.7.2.1.7. Security Policy Commands
        5.7.2.2. Show Commands
        5.7.2.3. Clear Commands
        5.7.2.4. Monitor Commands
  6. Route Policies
    6.1. Configuring Route Policies
      6.1.1. Routing Policy and MPLS
      6.1.2. Policy Statements
        6.1.2.1. Default Action Behavior
        6.1.2.2. Denied IP Prefixes
        6.1.2.3. Controlling Route Flapping
      6.1.3. Regular Expressions
        6.1.3.1. Terms
        6.1.3.2. Operators
      6.1.4. Community Expressions
      6.1.5. BGP and OSPF Route Policy Support
        6.1.5.1. BGP Route Policies
        6.1.5.2. Readvertised Route Policies
      6.1.6. When to Use Route Policies
      6.1.7. Troubleshooting the FIB
    6.2. Route Policy Configuration Process Overview
    6.3. Configuration Notes
      6.3.1. Reference Sources
    6.4. Configuring Route Policies with CLI
    6.5. Route Policy Configuration Overview
      6.5.1. When to Create Routing Policies
      6.5.2. Default Route Policy Actions
      6.5.3. Policy Evaluation
        6.5.3.1. Damping
    6.6. Basic Route Policy Configuration
    6.7. Configuring Route Policy Components
      6.7.1. Beginning the Policy Statement
      6.7.2. Creating a Route Policy
      6.7.3. Configuring a Default Action
      6.7.4. Configuring an Entry
      6.7.5. Configuring an AS Path (policy-option)
      6.7.6. Configuring a Community List or Expression
      6.7.7. Configuring Damping
      6.7.8. Configuring a Prefix List
      6.7.9. Configuring PIM Join/Register Policies
      6.7.10. Configuring Bootstrap Message Import and Export Policies
    6.8. Route Policy Configuration Management Tasks
      6.8.1. Editing Policy Statements and Parameters
      6.8.2. Deleting an Entry
      6.8.3. Deleting a Policy Statement
    6.9. Route Policy Command Reference
      6.9.1. Command Hierarchies
        6.9.1.1. Route Policy Configuration Commands
        6.9.1.2. Show Commands
      6.9.2. Command Descriptions
        6.9.2.1. Configuration Commands
          6.9.2.1.1. Generic Commands
          6.9.2.1.2. Route Policy Options
          6.9.2.1.3. Route Policy Damping Commands
          6.9.2.1.4. Route Policy Prefix Commands
          6.9.2.1.5. Route Policy Entry Match Commands
          6.9.2.1.6. Route Policy Action Commands
        6.9.2.2. Show Commands
  7. List of Acronyms
  8. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Router Configuration Process
  3. IP Router Configuration
    3.1. Configuring IP Router Parameters
      3.1.1. Interfaces
        3.1.1.1. Network Interface
          3.1.1.1.1. Ethernet Ports and Multiple ARP Entries
          3.1.1.1.2. Dynamic ARP and Static MAC entry
          3.1.1.1.3. Configurable ARP Retry Timer
          3.1.1.1.4. Proxy ARP
          3.1.1.1.5. ETH-CFM Support
        3.1.1.2. System Interface
        3.1.1.3. Unnumbered Interfaces
        3.1.1.4. Creating an IP Address Range
      3.1.2. IP Addresses
      3.1.3. Internet Protocol Versions
        3.1.3.1. IPv6 Address Format
        3.1.3.2. IPv6 Headers
        3.1.3.3. Neighbor Discovery
      3.1.4. Router ID
      3.1.5. Autonomous Systems
      3.1.6. DHCP and DHCPv6
        3.1.6.1. DHCP Relay and DHCPv6 Relay
          3.1.6.1.1. DHCP Relay Agent Options
        3.1.6.2. Local DHCP and DHCPv6 Server
          3.1.6.2.1. DHCP and DHCPv6 Server Options
      3.1.7. ICMP and ICMPv6
      3.1.8. Static Routes, Dynamic Routes, and ECMP
        3.1.8.1. Enabling ECMP
      3.1.9. IGP-LDP and Static Route-LDP Synchronization
      3.1.10. Bidirectional Forwarding Detection (BFD)
      3.1.11. IP Fast Reroute (FRR)
        3.1.11.1. ECMP vs FRR
        3.1.11.2. IGP Shortcuts (RSVP-TE Tunnels)
        3.1.11.3. IP FRR Configuration
    3.2. Configuring Security Parameters
      3.2.1. Supported Hardware
      3.2.2. Security Zone Configuration
      3.2.3. Security Session Creation
        3.2.3.1. Directionally Aware Security Behavior
        3.2.3.2. TCP MSS Configuration and Adjustment
      3.2.4. Application Groups
      3.2.5. Host Groups
      3.2.6. Security Policy Policing
      3.2.7. Security Profiles
        3.2.7.1. Profile Timers
        3.2.7.2. Application Assurance Parameters
          3.2.7.2.1. DNS
          3.2.7.2.2. ICMP
          3.2.7.2.3. IP Options
          3.2.7.2.4. Strict TCP
        3.2.7.3. Application Level Gateway
        3.2.7.4. Fragmentation Handling
      3.2.8. Security Policies
      3.2.9. Security Session Resource Alarms
      3.2.10. Security Logging
      3.2.11. Firewall Debugging
      3.2.12. NAT Security
        3.2.12.1. NAT Zones
        3.2.12.2. Dynamic Source NAT
        3.2.12.3. Local Traffic and NAT
        3.2.12.4. Port Forwarding (Static Destination NAT)
    3.3. Using the 7705 SAR as Residential or Business CPE
    3.4. Router Configuration Process Overview
    3.5. Configuration Notes
      3.5.1. Reference Sources
    3.6. Configuring an IP Router with CLI
    3.7. Router Configuration Overview
      3.7.1. System Interface
      3.7.2. Network Interface
    3.8. Basic Configuration
    3.9. Common Configuration Tasks
      3.9.1. Configuring a System Name
      3.9.2. Configuring Router IPv6 Neighbor Discovery Parameters
      3.9.3. Configuring Interfaces
        3.9.3.1. Configuring a System Interface
        3.9.3.2. Configuring a Network Interface
          3.9.3.2.1. Creating an IPv6 Network Interface
        3.9.3.3. Configuring an Unnumbered Interface
      3.9.4. Configuring IPv6 Parameters
      3.9.5. Configuring Router Advertisement
      3.9.6. Configuring ECMP
      3.9.7. Configuring Static Routes
      3.9.8. Configuring or Deriving a Router ID
      3.9.9. Configuring an Autonomous System
      3.9.10. Configuring ICMP and ICMPv6
      3.9.11. Configuring a DHCP Relay Agent
      3.9.12. Configuring Proxy ARP
      3.9.13. Configuring a Security Zone
      3.9.14. Configuring Security Logging
        3.9.14.1. Rule-Based Security Logging
        3.9.14.2. Zone-Based Security Logging
      3.9.15. Applying an Application Group and a Host Group to a Security Policy
      3.9.16. Configuring an IP Reassembly Profile
    3.10. Service Management Tasks
      3.10.1. Changing the System Name
      3.10.2. Modifying Interface Parameters
      3.10.3. Deleting a Logical IP Interface
    3.11. IP Router Command Reference
      3.11.1. Command Hierarchies
        3.11.1.1. Configuration Commands
          3.11.1.1.1. Router Commands
          3.11.1.1.2. Local DHCP and DHCPv6 Server Commands
          3.11.1.1.3. Router Interface Commands
          3.11.1.1.4. Router Interface IPv6 Commands
          3.11.1.1.5. Router Advertisement Commands
          3.11.1.1.6. Router Security Zone Configuration Commands
          3.11.1.1.7. TWAMP Light Commands
        3.11.1.2. Show Commands
        3.11.1.3. Clear Commands
        3.11.1.4. Debug Commands
      3.11.2. Command Descriptions
        3.11.2.1. Configuration Commands
          3.11.2.1.1. Generic Commands
          3.11.2.1.2. Router Global Commands
          3.11.2.1.3. Local DHCP and DHCPv6 Server Commands
          3.11.2.1.4. Router Interface Commands
          3.11.2.1.5. Router Interface IPv6 Commands
          3.11.2.1.6. Router Interface DHCP Relay Agent Commands
          3.11.2.1.7. Router Interface Filter Commands
          3.11.2.1.8. Router Interface Encryption Commands
          3.11.2.1.9. Router Interface ICMP and ICMPv6 Commands
          3.11.2.1.10. Router Advertisement Commands
          3.11.2.1.11. Router Security Zone Configuration Commands
          3.11.2.1.12. TWAMP Light Commands
        3.11.2.2. Show Commands
        3.11.2.3. Clear Commands
        3.11.2.4. Debug Commands
  4. VRRP
    4.1. VRRP Overview
    4.2. VRRP Components
      4.2.1. Virtual Router
      4.2.2. IP Address Owner
      4.2.3. Primary Address
      4.2.4. Virtual Router Master
      4.2.5. Virtual Router Backup
      4.2.6. Owner and Non-owner VRRP
      4.2.7. Configurable Parameters
        4.2.7.1. VRID
        4.2.7.2. Priority
        4.2.7.3. IP Addresses
        4.2.7.4. Message Interval and Master Inheritance
        4.2.7.5. Master Down Interval
        4.2.7.6. Skew Time
        4.2.7.7. Preempt Mode
        4.2.7.8. VRRP Message Authentication (IPv4 only)
          4.2.7.8.1. Authentication Failure
        4.2.7.9. Virtual MAC Address
        4.2.7.10. BFD-Enable
        4.2.7.11. Initial Delay Timer
        4.2.7.12. VRRP Advertisement Message IP Address List Verification
        4.2.7.13. IPv6 Virtual Router Instance Operationally Up
        4.2.7.14. Policies
    4.3. VRRP Priority Control Policies
      4.3.1. VRRP Policy Constraints
      4.3.2. VRRP Base Priority
      4.3.3. VRRP Priority Control Policy In-use Priority
      4.3.4. VRRP Priority Control Policy Priority Events
        4.3.4.1. Priority Event Hold-set Timers
        4.3.4.2. Port Down Priority Event
        4.3.4.3. LAG Port Down Priority Event
        4.3.4.4. Host Unreachable Priority Event
        4.3.4.5. Route Unknown Priority Event
    4.4. VRRP Non-owner Accessibility
      4.4.1. Non-owner Access Ping Reply
      4.4.2. Non-owner Access Telnet
      4.4.3. Non-owner Access SSH
    4.5. VRRP Configuration Process Overview
    4.6. Configuration Notes
    4.7. Configuring VRRP with CLI
    4.8. VRRP Configuration Overview
      4.8.1. Preconfiguration Requirements
    4.9. Basic VRRP Configurations
      4.9.1. VRRP Policy
      4.9.2. VRRP IES or VPRN Service Parameters
        4.9.2.1. Configuring IES or VPRN VRRP for IPv6
    4.10. Common Configuration Tasks
    4.11. Configuring IES or VPRN VRRP Parameters
      4.11.1. Configuring VRRP on Subnets
      4.11.2. Owner VRRP
      4.11.3. Non-owner VRRP
    4.12. VRRP Management Tasks
      4.12.1. Deleting a VRRP Policy
      4.12.2. Deleting VRRP on a Service
    4.13. VRRP Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VRRP Priority Control Event Policy Commands
        4.13.1.2. VRRP Show Commands
        4.13.1.3. VRRP Monitor Commands
        4.13.1.4. VRRP Clear Commands
        4.13.1.5. VRRP Debug Commands
      4.13.2. Command Descriptions
        4.13.2.1. Configuration Commands
          4.13.2.1.1. VRRP Priority Control Event Policy Commands
          4.13.2.1.2. VRRP Priority Event Commands
        4.13.2.2. VRRP Show Commands
        4.13.2.3. VRRP Monitor Commands
        4.13.2.4. VRRP Clear Commands
        4.13.2.5. VRRP Debug Commands
  5. Filter Policies
    5.1. Configuring Filter Policies
      5.1.1. Overview of Filter Policies
      5.1.2. Network and Service (Access) Interface-based Filtering
      5.1.3. Policy-Based Routing
      5.1.4. Multi-field Classification (MFC)
      5.1.5. VLAN-based Filtering
      5.1.6. Filter Policy Entries
        5.1.6.1. Applying Filter Policies
        5.1.6.2. Packet Matching Criteria
        5.1.6.3. Ordering Filter Entries
      5.1.7. Filter Log Files
    5.2. Configuration Notes
      5.2.1. IP Filters
      5.2.2. IPv6 Filters
      5.2.3. MAC Filters
      5.2.4. VLAN Filters
      5.2.5. Filter Logs
      5.2.6. Reference Sources
    5.3. Configuring Filter Policies with CLI
    5.4. Basic Configuration
    5.5. Common Configuration Tasks
      5.5.1. Creating an IPv4 or IPv6 Filter Policy
        5.5.1.1. IP Filter Policy
        5.5.1.2. IP Filter Entry
        5.5.1.3. IP Filter Entry Matching Criteria
        5.5.1.4. IP Filter Entry for PBR to a System IP or Loopback Address
      5.5.2. Creating a MAC Filter Policy
        5.5.2.1. MAC Filter Policy
        5.5.2.2. MAC Filter Entry
        5.5.2.3. MAC Entry Matching Criteria
      5.5.3. Creating a VLAN Filter Policy
        5.5.3.1. VLAN Filter Policy
        5.5.3.2. VLAN Filter Entry
        5.5.3.3. VLAN Entry Matching Criteria
      5.5.4. Creating an IP Exception Filter Policy
        5.5.4.1. IP Exception Filter Policy
        5.5.4.2. IP Exception Entry Matching Criteria
      5.5.5. Configuring Filter Log Policies
      5.5.6. Configuring a NAT Security Profile
      5.5.7. Configuring a NAT Security Policy
      5.5.8. Applying IP and MAC Filter Policies to a Service
      5.5.9. Applying IP Filter Policies to Network Interfaces
      5.5.10. Applying VLAN Filter Policies to a Ring Port
    5.6. Filter Management Tasks
      5.6.1. Renumbering Filter Policy Entries
      5.6.2. Modifying an IP Filter Policy
      5.6.3. Modifying a MAC Filter Policy
      5.6.4. Modifying a VLAN Filter Policy
      5.6.5. Removing and Deleting a Filter Policy
        5.6.5.1. Removing a Filter from a Service
        5.6.5.2. Removing a Filter from a Network Interface
        5.6.5.3. Removing a Filter from a Ring Port
        5.6.5.4. Deleting a Filter
    5.7. Filter Command Reference
      5.7.1. Command Hierarchies
        5.7.1.1. Configuration Commands
          5.7.1.1.1. IP Filter Log Configuration Commands
          5.7.1.1.2. IP Filter Policy Configuration Commands
          5.7.1.1.3. IPv6 Filter Policy Configuration Commands
          5.7.1.1.4. MAC Filter Policy Commands
          5.7.1.1.5. VLAN Filter Policy Commands
          5.7.1.1.6. IP Exception Filter Policy Configuration Commands
          5.7.1.1.7. Security Policy Commands
        5.7.1.2. Show Commands
        5.7.1.3. Clear Commands
        5.7.1.4. Monitor Commands
      5.7.2. Command Descriptions
        5.7.2.1. Configuration Commands
          5.7.2.1.1. Generic Commands
          5.7.2.1.2. Filter Log Commands
          5.7.2.1.3. Filter Policy Commands
          5.7.2.1.4. General Filter Entry Commands
          5.7.2.1.5. IP, MAC, VLAN, and IP Exception Filter Entry Commands
          5.7.2.1.6. IP, MAC, and IP Exception Filter Match Criteria Commands
          5.7.2.1.7. Security Policy Commands
        5.7.2.2. Show Commands
        5.7.2.3. Clear Commands
        5.7.2.4. Monitor Commands
  6. Route Policies
    6.1. Configuring Route Policies
      6.1.1. Routing Policy and MPLS
      6.1.2. Policy Statements
        6.1.2.1. Default Action Behavior
        6.1.2.2. Denied IP Prefixes
        6.1.2.3. Controlling Route Flapping
      6.1.3. Regular Expressions
        6.1.3.1. Terms
        6.1.3.2. Operators
      6.1.4. Community Expressions
      6.1.5. BGP and OSPF Route Policy Support
        6.1.5.1. BGP Route Policies
        6.1.5.2. Readvertised Route Policies
      6.1.6. When to Use Route Policies
      6.1.7. Troubleshooting the FIB
    6.2. Route Policy Configuration Process Overview
    6.3. Configuration Notes
      6.3.1. Reference Sources
    6.4. Configuring Route Policies with CLI
    6.5. Route Policy Configuration Overview
      6.5.1. When to Create Routing Policies
      6.5.2. Default Route Policy Actions
      6.5.3. Policy Evaluation
        6.5.3.1. Damping
    6.6. Basic Route Policy Configuration
    6.7. Configuring Route Policy Components
      6.7.1. Beginning the Policy Statement
      6.7.2. Creating a Route Policy
      6.7.3. Configuring a Default Action
      6.7.4. Configuring an Entry
      6.7.5. Configuring an AS Path (policy-option)
      6.7.6. Configuring a Community List or Expression
      6.7.7. Configuring Damping
      6.7.8. Configuring a Prefix List
      6.7.9. Configuring PIM Join/Register Policies
      6.7.10. Configuring Bootstrap Message Import and Export Policies
    6.8. Route Policy Configuration Management Tasks
      6.8.1. Editing Policy Statements and Parameters
      6.8.2. Deleting an Entry
      6.8.3. Deleting a Policy Statement
    6.9. Route Policy Command Reference
      6.9.1. Command Hierarchies
        6.9.1.1. Route Policy Configuration Commands
        6.9.1.2. Show Commands
      6.9.2. Command Descriptions
        6.9.2.1. Configuration Commands
          6.9.2.1.1. Generic Commands
          6.9.2.1.2. Route Policy Options
          6.9.2.1.3. Route Policy Damping Commands
          6.9.2.1.4. Route Policy Prefix Commands
          6.9.2.1.5. Route Policy Entry Match Commands
          6.9.2.1.6. Route Policy Action Commands
        6.9.2.2. Show Commands
  7. List of Acronyms
  8. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR Routing Protocols Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Routing Configuration Process
  3. IP Multicast
    3.1. Overview of IP Multicast
      3.1.1. Multicast in IP-VPN Networks
      3.1.2. Mobile Backhaul IP Multicast Example
      3.1.3. Multicast Models (ASM and SSM)
        3.1.3.1. Any-Source Multicast (ASM)
        3.1.3.2. Source-Specific Multicast (SSM)
      3.1.4. IGMP Snooping and MLD Snooping For VPLS and Routed VPLS
    3.2. IGMP
      3.2.1. IGMP Overview
      3.2.2. IGMP Versions and Interoperability Requirements
      3.2.3. IGMP Version Transition
      3.2.4. Query Messages
      3.2.5. Source-Specific Multicast Groups (IPv4)
    3.3. MLD
      3.3.1. MLD Overview
      3.3.2. MLDv1
      3.3.3. MLDv2
    3.4. PIM
      3.4.1. PIM-SM Overview
      3.4.2. PIM-SM Functions
        3.4.2.1. Phase One
        3.4.2.2. Phase Two
        3.4.2.3. Phase Three
      3.4.3. Encapsulating Data Packets in the Register Tunnel
      3.4.4. PIM Bootstrap Router Mechanism
      3.4.5. PIM-SM Routing Policies
      3.4.6. Reverse Path Forwarding Checks
      3.4.7. Anycast RP for PIM-SM
        3.4.7.1. Implementation
      3.4.8. Multicast-only Fast Reroute (MoFRR)
      3.4.9. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
    3.5. IPv6 PIM Models
      3.5.1. PIM-SSM
      3.5.2. PIM-ASM
    3.6. IP Multicast Debugging Tools
      3.6.1. Mtrace
        3.6.1.1. Finding the Last-hop Router
        3.6.1.2. Directing the Response
      3.6.2. Mstat
      3.6.3. Mrinfo
    3.7. MSDP
      3.7.1. Anycast RP for MSDP
      3.7.2. MSDP Procedure
        3.7.2.1. MSDP Peering Scenarios
      3.7.3. MSDP Peer Groups
      3.7.4. MSDP Mesh Groups
      3.7.5. MSDP Routing Policies
      3.7.6. Auto-RP (discovery mode only) in Multicast VPN
    3.8. IP Multicast Configuration Process Overview
    3.9. Configuration Notes
      3.9.1. General
      3.9.2. Reference Sources
    3.10. Configuring IP Multicast Parameters with CLI
    3.11. IP Multicast Configuration Overview
      3.11.1. IGMP and MLD
        3.11.1.1. Static Groups
        3.11.1.2. SSM Translation
      3.11.2. PIM
      3.11.3. Hardware Support
    3.12. Basic IP Multicast Configuration
    3.13. Common Configuration Tasks
      3.13.1. Configuring IGMP and MLD Parameters
        3.13.1.1. Enabling IGMP or MLD
        3.13.1.2. Configuring IGMP and MLD
        3.13.1.3. Configuring IGMP and MLD Interfaces
        3.13.1.4. Configuring IGMP and MLD Interface Static Multicast
        3.13.1.5. Configuring IGMP and MLD SSM Translation
      3.13.2. Configuring PIM Parameters
        3.13.2.1. Enabling PIM
        3.13.2.2. Configuring PIM Interface Parameters
        3.13.2.3. Configuring a Rendezvous Point (RP)
        3.13.2.4. Importing PIM Join or Register Policies
        3.13.2.5. Configuring Multicast Source Discovery Protocol (MSDP) Parameters
    3.14. Service Management Tasks
      3.14.1. Disabling IGMP, MLD, PIM, and MSDP
    3.15. IP Multicast Command Reference
      3.15.1. Command Hierarchies
        3.15.1.1. Configuration Commands
          3.15.1.1.1. IGMP Commands
          3.15.1.1.2. MLD Commands
          3.15.1.1.3. PIM Commands
          3.15.1.1.4. MSDP Commands
        3.15.1.2. Show Commands
        3.15.1.3. Clear Commands
        3.15.1.4. Debug Commands
        3.15.1.5. Monitor Commands
      3.15.2. Command Descriptions
        3.15.2.1. Configuration Commands
          3.15.2.1.1. Generic Commands
          3.15.2.1.2. IGMP Commands
          3.15.2.1.3. MLD Commands
          3.15.2.1.4. PIM Commands
          3.15.2.1.5. MSDP Commands
        3.15.2.2. Show Commands
        3.15.2.3. Clear Commands
        3.15.2.4. Debug Commands
          3.15.2.4.1. Debug IGMP Commands
          3.15.2.4.2. Debug MLD Commands
          3.15.2.4.3. Debug PIM Commands
          3.15.2.4.4. Debug Mtrace Commands
        3.15.2.5. Monitor Commands
  4. OSPF
    4.1. Overview of OSPF
      4.1.1. OSPF Areas
        4.1.1.1. Backbone Area
        4.1.1.2. Area Border Router
        4.1.1.3. Stub Area
        4.1.1.4. Not-So-Stubby Area
      4.1.2. Virtual Links
      4.1.3. Neighbors and Adjacencies
        4.1.3.1. Designated Routers and Backup Designated Routers
      4.1.4. Link-State Advertisements
      4.1.5. Metrics
      4.1.6. Authentication
        4.1.6.1. Authentication Key
        4.1.6.2. Authentication Keychains
      4.1.7. Route Redistribution and Summarization
      4.1.8. OSPF-TE Extensions
      4.1.9. Unnumbered Interfaces
      4.1.10. IP Subnets
      4.1.11. OSPF Instances
    4.2. Bidirectional Forwarding Detection (BFD) for OSPF
    4.3. Graceful Restart Helper
    4.4. LDP and IP Fast Reroute (FRR) for OSPF Prefixes
      4.4.1. LFA Calculations
        4.4.1.1. Selection Algorithm
        4.4.1.2. LFA Configuration
      4.4.2. IGP Shortcuts (RSVP-TE Tunnels)
        4.4.2.1. Selection Algorithm
        4.4.2.2. Forwarding Adjacency
        4.4.2.3. IGP Shortcut Configuration
      4.4.3. LFA SPF Policies
        4.4.3.1. LFA SPF Policy Configuration
    4.5. Preconfiguration Requirements
    4.6. OSPF Configuration Process Overview
    4.7. Configuration Notes
      4.7.1. General
      4.7.2. Reference Sources
    4.8. Configuring OSPF with CLI
    4.9. OSPF Configuration Guidelines
    4.10. Basic OSPF Configuration
      4.10.1. Configuring the Router ID
      4.10.2. Configuring an OSPF Area
      4.10.3. Configuring an Interface
    4.11. Configuring Other OSPF Components
      4.11.1. Configuring a Stub Area
      4.11.2. Configuring a Not-So-Stubby Area
      4.11.3. Configuring a Virtual Link
      4.11.4. Configuring Authentication
      4.11.5. Assigning a Designated Router
      4.11.6. Configuring Route Summaries
      4.11.7. Configuring Route Preferences
    4.12. OSPF Configuration Management Tasks
      4.12.1. Modifying a Router ID
      4.12.2. Deleting a Router ID
      4.12.3. Modifying OSPF Parameters
    4.13. OSPF Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. Configuration Commands
        4.13.1.2. Show Commands
        4.13.1.3. Clear Commands
        4.13.1.4. Debug Commands
      4.13.2. Command Descriptions
        4.13.2.1. Configuration Commands
          4.13.2.1.1. Generic Commands
          4.13.2.1.2. Global Commands
          4.13.2.1.3. Area Commands
          4.13.2.1.4. Interface/Virtual Link Commands
        4.13.2.2. Show Commands
        4.13.2.3. Clear Commands
        4.13.2.4. Debug Commands
  5. IS-IS
    5.1. Overview of IS-IS
      5.1.1. IS-IS Areas (Two-level Hierarchy)
      5.1.2. ISO Network Addressing
      5.1.3. Neighbors and Adjacencies
        5.1.3.1. Designated Routers
        5.1.3.2. IS-IS Packet Types
      5.1.4. Metrics
      5.1.5. Authentication
        5.1.5.1. Authentication Key
        5.1.5.2. Authentication Keychains
      5.1.6. Route Redistribution and Summarization
        5.1.6.1. Redistribution
        5.1.6.2. Summarization
      5.1.7. IS-IS-TE Extensions
      5.1.8. Unnumbered Interfaces
      5.1.9. Multi-Instance IS-IS (MI-IS-IS)
      5.1.10. IPv6 Support
    5.2. Bidirectional Forwarding Detection (BFD) for IS-IS
    5.3. LDP and IP Fast Reroute (FRR) for IS-IS Prefixes
      5.3.1. LFA Calculations
        5.3.1.1. Selection Algorithm
        5.3.1.2. LFA Configuration
      5.3.2. IGP Shortcuts (RSVP-TE Tunnels)
        5.3.2.1. Selection Algorithm
        5.3.2.2. Forwarding Adjacency
        5.3.2.3. IGP Shortcut Configuration
      5.3.3. LFA SPF Policies
        5.3.3.1. LFA SPF Policy Configuration
    5.4. IS-IS Configuration Process Overview
    5.5. Configuration Notes
      5.5.1. General
      5.5.2. Reference Sources
    5.6. Configuring IS-IS with CLI
    5.7. IS-IS Configuration Overview
      5.7.1. Router Levels
      5.7.2. Area Addresses
      5.7.3. Interface Level Capability
      5.7.4. Route Leaking
    5.8. Basic IS-IS Configuration
    5.9. Configuring IS-IS Components
      5.9.1. Enabling IS-IS
      5.9.2. Configuring an IS-IS Instance Level
      5.9.3. Configuring ISO Area Addresses
      5.9.4. Configuring Global IS-IS Parameters
      5.9.5. Configuring Interface Parameters
        5.9.5.1. Example 1: Configuring a Level 1 Area
        5.9.5.2. Example 2: Modifying Router Level Capability
      5.9.6. Configuring Authentication
      5.9.7. Configuring Leaking
      5.9.8. Redistributing External IS-IS Routers
    5.10. IS-IS Configuration Management Tasks
      5.10.1. Disabling IS-IS
      5.10.2. Removing IS-IS
      5.10.3. Modifying Global IS-IS Parameters
      5.10.4. Modifying IS-IS Interface Parameters
    5.11. IS-IS Command Reference
      5.11.1. Command Hierarchies
        5.11.1.1. Configuration Commands
        5.11.1.2. Show Commands
        5.11.1.3. Clear Commands
        5.11.1.4. Debug Commands
        5.11.1.5. Monitor Commands
      5.11.2. Command Descriptions
        5.11.2.1. Configuration Commands
          5.11.2.1.1. Generic Commands
          5.11.2.1.2. Global Commands
          5.11.2.1.3. Interface Commands
        5.11.2.2. Show Commands
        5.11.2.3. Clear Commands
        5.11.2.4. Debug Commands
        5.11.2.5. Monitor Commands
  6. BGP
    6.1. BGP Overview
      6.1.1. BGP Communication
      6.1.2. Message Types
      6.1.3. BGPv6
      6.1.4. BGP Add-Path
        6.1.4.1. Path Selection Mode and Parameters for Multiple Paths to Add-path Peers
        6.1.4.2. Routing Policy for Multiple Paths
        6.1.4.3. BGP Route Advertisement Rules for Multiple Paths
        6.1.4.4. BGP Split Horizon
      6.1.5. Outbound Route Filtering (ORF)
      6.1.6. BGP Route Target Constrained Route Distribution
    6.2. Group Configuration and Peers
      6.2.1. Hierarchical Levels
      6.2.2. Route Reflection
      6.2.3. Fast External Failover
      6.2.4. BGP Fast Reroute With Prefix-Independent Convergence
        6.2.4.1. BGP FRR Failure Detection and Switchover
      6.2.5. Sending of BGP Communities
      6.2.6. Route Selection Criteria
    6.3. BGP Route Tunnels
      6.3.1. Route Reflector Next-Hop-Self for VPN IPv4 Routes over IPv4 Labeled Routes
      6.3.2. ECMP and BGP Route Tunnels
      6.3.3. Layer 2 Services and BGP Route Tunnel
      6.3.4. BGP Route Tunnel SDP Binding
      6.3.5. BGP Route Tunnel With Multihop EBGP Resolution
    6.4. Command Interactions and Dependencies
      6.4.1. Changing the Autonomous System Number
      6.4.2. Changing the Local AS Number
      6.4.3. Changing the Router ID at the Configuration Level
      6.4.4. Hold Time and Keepalive Timer Dependencies
      6.4.5. Import and Export Route Policies
      6.4.6. AS Override
      6.4.7. TCP MD5 Authentication
      6.4.8. TTL Security
      6.4.9. Advertise-Inactive, Add-Paths, and Export Policy Interaction
    6.5. BGP Configuration Process Overview
    6.6. Configuration Notes
      6.6.1. General
      6.6.2. BGP Defaults
      6.6.3. BGP MIB Notes
    6.7. Configuring BGP with CLI
    6.8. BGP Configuration Overview
      6.8.1. Preconfiguration Requirements
      6.8.2. BGP Hierarchy
      6.8.3. Internal and External BGP Configurations
      6.8.4. BGP Route Reflectors
    6.9. Basic BGP Configuration
    6.10. Common Configuration Tasks
      6.10.1. Creating an Autonomous System
      6.10.2. Configuring a Router ID
    6.11. BGP Components
      6.11.1. Configuring BGP
      6.11.2. Configuring Group Attributes
      6.11.3. Configuring Neighbor Attributes
      6.11.4. Configuring BGP Address Families
      6.11.5. Configuring Route Reflection
    6.12. BGP Configuration Management Tasks
      6.12.1. Modifying an AS Number
      6.12.2. Modifying the BGP Router ID
      6.12.3. Modifying the Router-Level Router ID
      6.12.4. Deleting a Neighbor
      6.12.5. Deleting Groups
      6.12.6. Editing BGP Parameters
    6.13. BGP Command Reference
      6.13.1. Command Hierarchies
        6.13.1.1. Configuration Commands
          6.13.1.1.1. Global BGP Commands
          6.13.1.1.2. Group BGP Commands
          6.13.1.1.3. Neighbor BGP Commands
          6.13.1.1.4. Other BGP-Related Commands
        6.13.1.2. Show Commands
        6.13.1.3. Clear Commands
        6.13.1.4. Debug Commands
      6.13.2. Command Descriptions
        6.13.2.1. Configuration Commands
          6.13.2.1.1. Configuration Commands
          6.13.2.1.2. Other BGP-Related Commands
        6.13.2.2. Show Commands
        6.13.2.3. Clear Commands
        6.13.2.4. Debug Commands
  7. RIP
    7.1. RIP Overview
      7.1.1. RIP Versions
      7.1.2. RIPv2 Authentication
      7.1.3. Metrics
      7.1.4. Timers
      7.1.5. Import and Export Policies
      7.1.6. RIP Packet Format
      7.1.7. RIP Hierarchical Levels
    7.2. RIP Configuration Process Overview
    7.3. Configuration Notes
    7.4. Configuring RIP with CLI
    7.5. RIP Configuration Overview
      7.5.1. Preconfiguration Requirements
      7.5.2. RIP Hierarchy
    7.6. Basic RIP Configuration
    7.7. Common Configuration Tasks
      7.7.1. Configuring Interfaces
      7.7.2. Configuring a Route Policy
    7.8. Configuring RIP Parameters
      7.8.1. Configuring Global-Level Parameters
      7.8.2. Configuring Group-Level Parameters
      7.8.3. Configuring Neighbor-Level Parameters
    7.9. RIP Configuration Management Tasks
      7.9.1. Modifying RIP Parameters
      7.9.2. Deleting a RIP Group
      7.9.3. Deleting a RIP Neighbor
    7.10. RIP Command Reference
      7.10.1. Command Hierarchies
        7.10.1.1. Configuration Commands
          7.10.1.1.1. Global RIP Commands
          7.10.1.1.2. Group RIP Commands
          7.10.1.1.3. Neighbor RIP Commands
        7.10.1.2. Show Commands
        7.10.1.3. Clear Commands
        7.10.1.4. Debug Commands
      7.10.2. Command Descriptions
        7.10.2.1. Configuration Commands
          7.10.2.1.1. Generic Commands
          7.10.2.1.2. RIP Commands
        7.10.2.2. Show Commands
        7.10.2.3. Clear Commands
        7.10.2.4. Debug Commands
  8. List of Acronyms
  9. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Routing Configuration Process
  3. IP Multicast
    3.1. Overview of IP Multicast
      3.1.1. Multicast in IP-VPN Networks
      3.1.2. Mobile Backhaul IP Multicast Example
      3.1.3. Multicast Models (ASM and SSM)
        3.1.3.1. Any-Source Multicast (ASM)
        3.1.3.2. Source-Specific Multicast (SSM)
      3.1.4. IGMP Snooping and MLD Snooping For VPLS and Routed VPLS
    3.2. IGMP
      3.2.1. IGMP Overview
      3.2.2. IGMP Versions and Interoperability Requirements
      3.2.3. IGMP Version Transition
      3.2.4. Query Messages
      3.2.5. Source-Specific Multicast Groups (IPv4)
    3.3. MLD
      3.3.1. MLD Overview
      3.3.2. MLDv1
      3.3.3. MLDv2
    3.4. PIM
      3.4.1. PIM-SM Overview
      3.4.2. PIM-SM Functions
        3.4.2.1. Phase One
        3.4.2.2. Phase Two
        3.4.2.3. Phase Three
      3.4.3. Encapsulating Data Packets in the Register Tunnel
      3.4.4. PIM Bootstrap Router Mechanism
      3.4.5. PIM-SM Routing Policies
      3.4.6. Reverse Path Forwarding Checks
      3.4.7. Anycast RP for PIM-SM
        3.4.7.1. Implementation
      3.4.8. Multicast-only Fast Reroute (MoFRR)
      3.4.9. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
    3.5. IPv6 PIM Models
      3.5.1. PIM-SSM
      3.5.2. PIM-ASM
    3.6. IP Multicast Debugging Tools
      3.6.1. Mtrace
        3.6.1.1. Finding the Last-hop Router
        3.6.1.2. Directing the Response
      3.6.2. Mstat
      3.6.3. Mrinfo
    3.7. MSDP
      3.7.1. Anycast RP for MSDP
      3.7.2. MSDP Procedure
        3.7.2.1. MSDP Peering Scenarios
      3.7.3. MSDP Peer Groups
      3.7.4. MSDP Mesh Groups
      3.7.5. MSDP Routing Policies
      3.7.6. Auto-RP (discovery mode only) in Multicast VPN
    3.8. IP Multicast Configuration Process Overview
    3.9. Configuration Notes
      3.9.1. General
      3.9.2. Reference Sources
    3.10. Configuring IP Multicast Parameters with CLI
    3.11. IP Multicast Configuration Overview
      3.11.1. IGMP and MLD
        3.11.1.1. Static Groups
        3.11.1.2. SSM Translation
      3.11.2. PIM
      3.11.3. Hardware Support
    3.12. Basic IP Multicast Configuration
    3.13. Common Configuration Tasks
      3.13.1. Configuring IGMP and MLD Parameters
        3.13.1.1. Enabling IGMP or MLD
        3.13.1.2. Configuring IGMP and MLD
        3.13.1.3. Configuring IGMP and MLD Interfaces
        3.13.1.4. Configuring IGMP and MLD Interface Static Multicast
        3.13.1.5. Configuring IGMP and MLD SSM Translation
      3.13.2. Configuring PIM Parameters
        3.13.2.1. Enabling PIM
        3.13.2.2. Configuring PIM Interface Parameters
        3.13.2.3. Configuring a Rendezvous Point (RP)
        3.13.2.4. Importing PIM Join or Register Policies
        3.13.2.5. Configuring Multicast Source Discovery Protocol (MSDP) Parameters
    3.14. Service Management Tasks
      3.14.1. Disabling IGMP, MLD, PIM, and MSDP
    3.15. IP Multicast Command Reference
      3.15.1. Command Hierarchies
        3.15.1.1. Configuration Commands
          3.15.1.1.1. IGMP Commands
          3.15.1.1.2. MLD Commands
          3.15.1.1.3. PIM Commands
          3.15.1.1.4. MSDP Commands
        3.15.1.2. Show Commands
        3.15.1.3. Clear Commands
        3.15.1.4. Debug Commands
        3.15.1.5. Monitor Commands
      3.15.2. Command Descriptions
        3.15.2.1. Configuration Commands
          3.15.2.1.1. Generic Commands
          3.15.2.1.2. IGMP Commands
          3.15.2.1.3. MLD Commands
          3.15.2.1.4. PIM Commands
          3.15.2.1.5. MSDP Commands
        3.15.2.2. Show Commands
        3.15.2.3. Clear Commands
        3.15.2.4. Debug Commands
          3.15.2.4.1. Debug IGMP Commands
          3.15.2.4.2. Debug MLD Commands
          3.15.2.4.3. Debug PIM Commands
          3.15.2.4.4. Debug Mtrace Commands
        3.15.2.5. Monitor Commands
  4. OSPF
    4.1. Overview of OSPF
      4.1.1. OSPF Areas
        4.1.1.1. Backbone Area
        4.1.1.2. Area Border Router
        4.1.1.3. Stub Area
        4.1.1.4. Not-So-Stubby Area
      4.1.2. Virtual Links
      4.1.3. Neighbors and Adjacencies
        4.1.3.1. Designated Routers and Backup Designated Routers
      4.1.4. Link-State Advertisements
      4.1.5. Metrics
      4.1.6. Authentication
        4.1.6.1. Authentication Key
        4.1.6.2. Authentication Keychains
      4.1.7. Route Redistribution and Summarization
      4.1.8. OSPF-TE Extensions
      4.1.9. Unnumbered Interfaces
      4.1.10. IP Subnets
      4.1.11. OSPF Instances
    4.2. Bidirectional Forwarding Detection (BFD) for OSPF
    4.3. Graceful Restart Helper
    4.4. LDP and IP Fast Reroute (FRR) for OSPF Prefixes
      4.4.1. LFA Calculations
        4.4.1.1. Selection Algorithm
        4.4.1.2. LFA Configuration
      4.4.2. IGP Shortcuts (RSVP-TE Tunnels)
        4.4.2.1. Selection Algorithm
        4.4.2.2. Forwarding Adjacency
        4.4.2.3. IGP Shortcut Configuration
      4.4.3. LFA SPF Policies
        4.4.3.1. LFA SPF Policy Configuration
    4.5. Preconfiguration Requirements
    4.6. OSPF Configuration Process Overview
    4.7. Configuration Notes
      4.7.1. General
      4.7.2. Reference Sources
    4.8. Configuring OSPF with CLI
    4.9. OSPF Configuration Guidelines
    4.10. Basic OSPF Configuration
      4.10.1. Configuring the Router ID
      4.10.2. Configuring an OSPF Area
      4.10.3. Configuring an Interface
    4.11. Configuring Other OSPF Components
      4.11.1. Configuring a Stub Area
      4.11.2. Configuring a Not-So-Stubby Area
      4.11.3. Configuring a Virtual Link
      4.11.4. Configuring Authentication
      4.11.5. Assigning a Designated Router
      4.11.6. Configuring Route Summaries
      4.11.7. Configuring Route Preferences
    4.12. OSPF Configuration Management Tasks
      4.12.1. Modifying a Router ID
      4.12.2. Deleting a Router ID
      4.12.3. Modifying OSPF Parameters
    4.13. OSPF Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. Configuration Commands
        4.13.1.2. Show Commands
        4.13.1.3. Clear Commands
        4.13.1.4. Debug Commands
      4.13.2. Command Descriptions
        4.13.2.1. Configuration Commands
          4.13.2.1.1. Generic Commands
          4.13.2.1.2. Global Commands
          4.13.2.1.3. Area Commands
          4.13.2.1.4. Interface/Virtual Link Commands
        4.13.2.2. Show Commands
        4.13.2.3. Clear Commands
        4.13.2.4. Debug Commands
  5. IS-IS
    5.1. Overview of IS-IS
      5.1.1. IS-IS Areas (Two-level Hierarchy)
      5.1.2. ISO Network Addressing
      5.1.3. Neighbors and Adjacencies
        5.1.3.1. Designated Routers
        5.1.3.2. IS-IS Packet Types
      5.1.4. Metrics
      5.1.5. Authentication
        5.1.5.1. Authentication Key
        5.1.5.2. Authentication Keychains
      5.1.6. Route Redistribution and Summarization
        5.1.6.1. Redistribution
        5.1.6.2. Summarization
      5.1.7. IS-IS-TE Extensions
      5.1.8. Unnumbered Interfaces
      5.1.9. Multi-Instance IS-IS (MI-IS-IS)
      5.1.10. IPv6 Support
    5.2. Bidirectional Forwarding Detection (BFD) for IS-IS
    5.3. LDP and IP Fast Reroute (FRR) for IS-IS Prefixes
      5.3.1. LFA Calculations
        5.3.1.1. Selection Algorithm
        5.3.1.2. LFA Configuration
      5.3.2. IGP Shortcuts (RSVP-TE Tunnels)
        5.3.2.1. Selection Algorithm
        5.3.2.2. Forwarding Adjacency
        5.3.2.3. IGP Shortcut Configuration
      5.3.3. LFA SPF Policies
        5.3.3.1. LFA SPF Policy Configuration
    5.4. IS-IS Configuration Process Overview
    5.5. Configuration Notes
      5.5.1. General
      5.5.2. Reference Sources
    5.6. Configuring IS-IS with CLI
    5.7. IS-IS Configuration Overview
      5.7.1. Router Levels
      5.7.2. Area Addresses
      5.7.3. Interface Level Capability
      5.7.4. Route Leaking
    5.8. Basic IS-IS Configuration
    5.9. Configuring IS-IS Components
      5.9.1. Enabling IS-IS
      5.9.2. Configuring an IS-IS Instance Level
      5.9.3. Configuring ISO Area Addresses
      5.9.4. Configuring Global IS-IS Parameters
      5.9.5. Configuring Interface Parameters
        5.9.5.1. Example 1: Configuring a Level 1 Area
        5.9.5.2. Example 2: Modifying Router Level Capability
      5.9.6. Configuring Authentication
      5.9.7. Configuring Leaking
      5.9.8. Redistributing External IS-IS Routers
    5.10. IS-IS Configuration Management Tasks
      5.10.1. Disabling IS-IS
      5.10.2. Removing IS-IS
      5.10.3. Modifying Global IS-IS Parameters
      5.10.4. Modifying IS-IS Interface Parameters
    5.11. IS-IS Command Reference
      5.11.1. Command Hierarchies
        5.11.1.1. Configuration Commands
        5.11.1.2. Show Commands
        5.11.1.3. Clear Commands
        5.11.1.4. Debug Commands
        5.11.1.5. Monitor Commands
      5.11.2. Command Descriptions
        5.11.2.1. Configuration Commands
          5.11.2.1.1. Generic Commands
          5.11.2.1.2. Global Commands
          5.11.2.1.3. Interface Commands
        5.11.2.2. Show Commands
        5.11.2.3. Clear Commands
        5.11.2.4. Debug Commands
        5.11.2.5. Monitor Commands
  6. BGP
    6.1. BGP Overview
      6.1.1. BGP Communication
      6.1.2. Message Types
      6.1.3. BGPv6
      6.1.4. BGP Add-Path
        6.1.4.1. Path Selection Mode and Parameters for Multiple Paths to Add-path Peers
        6.1.4.2. Routing Policy for Multiple Paths
        6.1.4.3. BGP Route Advertisement Rules for Multiple Paths
        6.1.4.4. BGP Split Horizon
      6.1.5. Outbound Route Filtering (ORF)
      6.1.6. BGP Route Target Constrained Route Distribution
    6.2. Group Configuration and Peers
      6.2.1. Hierarchical Levels
      6.2.2. Route Reflection
      6.2.3. Fast External Failover
      6.2.4. BGP Fast Reroute With Prefix-Independent Convergence
        6.2.4.1. BGP FRR Failure Detection and Switchover
      6.2.5. Sending of BGP Communities
      6.2.6. Route Selection Criteria
    6.3. BGP Route Tunnels
      6.3.1. Route Reflector Next-Hop-Self for VPN IPv4 Routes over IPv4 Labeled Routes
      6.3.2. ECMP and BGP Route Tunnels
      6.3.3. Layer 2 Services and BGP Route Tunnel
      6.3.4. BGP Route Tunnel SDP Binding
      6.3.5. BGP Route Tunnel With Multihop EBGP Resolution
    6.4. Command Interactions and Dependencies
      6.4.1. Changing the Autonomous System Number
      6.4.2. Changing the Local AS Number
      6.4.3. Changing the Router ID at the Configuration Level
      6.4.4. Hold Time and Keepalive Timer Dependencies
      6.4.5. Import and Export Route Policies
      6.4.6. AS Override
      6.4.7. TCP MD5 Authentication
      6.4.8. TTL Security
      6.4.9. Advertise-Inactive, Add-Paths, and Export Policy Interaction
    6.5. BGP Configuration Process Overview
    6.6. Configuration Notes
      6.6.1. General
      6.6.2. BGP Defaults
      6.6.3. BGP MIB Notes
    6.7. Configuring BGP with CLI
    6.8. BGP Configuration Overview
      6.8.1. Preconfiguration Requirements
      6.8.2. BGP Hierarchy
      6.8.3. Internal and External BGP Configurations
      6.8.4. BGP Route Reflectors
    6.9. Basic BGP Configuration
    6.10. Common Configuration Tasks
      6.10.1. Creating an Autonomous System
      6.10.2. Configuring a Router ID
    6.11. BGP Components
      6.11.1. Configuring BGP
      6.11.2. Configuring Group Attributes
      6.11.3. Configuring Neighbor Attributes
      6.11.4. Configuring BGP Address Families
      6.11.5. Configuring Route Reflection
    6.12. BGP Configuration Management Tasks
      6.12.1. Modifying an AS Number
      6.12.2. Modifying the BGP Router ID
      6.12.3. Modifying the Router-Level Router ID
      6.12.4. Deleting a Neighbor
      6.12.5. Deleting Groups
      6.12.6. Editing BGP Parameters
    6.13. BGP Command Reference
      6.13.1. Command Hierarchies
        6.13.1.1. Configuration Commands
          6.13.1.1.1. Global BGP Commands
          6.13.1.1.2. Group BGP Commands
          6.13.1.1.3. Neighbor BGP Commands
          6.13.1.1.4. Other BGP-Related Commands
        6.13.1.2. Show Commands
        6.13.1.3. Clear Commands
        6.13.1.4. Debug Commands
      6.13.2. Command Descriptions
        6.13.2.1. Configuration Commands
          6.13.2.1.1. Configuration Commands
          6.13.2.1.2. Other BGP-Related Commands
        6.13.2.2. Show Commands
        6.13.2.3. Clear Commands
        6.13.2.4. Debug Commands
  7. RIP
    7.1. RIP Overview
      7.1.1. RIP Versions
      7.1.2. RIPv2 Authentication
      7.1.3. Metrics
      7.1.4. Timers
      7.1.5. Import and Export Policies
      7.1.6. RIP Packet Format
      7.1.7. RIP Hierarchical Levels
    7.2. RIP Configuration Process Overview
    7.3. Configuration Notes
    7.4. Configuring RIP with CLI
    7.5. RIP Configuration Overview
      7.5.1. Preconfiguration Requirements
      7.5.2. RIP Hierarchy
    7.6. Basic RIP Configuration
    7.7. Common Configuration Tasks
      7.7.1. Configuring Interfaces
      7.7.2. Configuring a Route Policy
    7.8. Configuring RIP Parameters
      7.8.1. Configuring Global-Level Parameters
      7.8.2. Configuring Group-Level Parameters
      7.8.3. Configuring Neighbor-Level Parameters
    7.9. RIP Configuration Management Tasks
      7.9.1. Modifying RIP Parameters
      7.9.2. Deleting a RIP Group
      7.9.3. Deleting a RIP Neighbor
    7.10. RIP Command Reference
      7.10.1. Command Hierarchies
        7.10.1.1. Configuration Commands
          7.10.1.1.1. Global RIP Commands
          7.10.1.1.2. Group RIP Commands
          7.10.1.1.3. Neighbor RIP Commands
        7.10.1.2. Show Commands
        7.10.1.3. Clear Commands
        7.10.1.4. Debug Commands
      7.10.2. Command Descriptions
        7.10.2.1. Configuration Commands
          7.10.2.1.1. Generic Commands
          7.10.2.1.2. RIP Commands
        7.10.2.2. Show Commands
        7.10.2.3. Clear Commands
        7.10.2.4. Debug Commands
  8. List of Acronyms
  9. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR Services Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Services Configuration Process
  3. Services Overview
    3.1. Introduction to Services on the 7705 SAR
      3.1.1. Overview
      3.1.2. Service Types
      3.1.3. Service Policies
    3.2. Nokia Service Model
    3.3. Service Entities
      3.3.1. Customers
      3.3.2. Service Types
        3.3.2.1. Service Names
      3.3.3. Service Access Points (SAPs)
        3.3.3.1. SAP Encapsulation Types and Identifiers
          3.3.3.1.1. Ethernet Encapsulations
          3.3.3.1.2. SONET/SDH Encapsulations
          3.3.3.1.3. TDM and Serial (TDM) Encapsulations
          3.3.3.1.4. Service Types and SAP Encapsulations—Summary
        3.3.3.2. SAP Configuration Considerations
      3.3.4. Service Destination Points (SDPs)
        3.3.4.1. SDP Binding
        3.3.4.2. Spoke and Mesh SDPs
        3.3.4.3. SDPs and BGP Route Tunnels
        3.3.4.4. SDP Encapsulation Types
          3.3.4.4.1. MPLS Encapsulation
          3.3.4.4.2. GRE Encapsulation
          3.3.4.4.3. IP Encapsulation
        3.3.4.5. Spoke SDP Terminations
        3.3.4.6. SDP Ping
        3.3.4.7. SDP Keepalives
    3.4. Mobile Solutions
      3.4.1. HSDPA Offload
        3.4.1.1. Failure Detection
      3.4.2. Pure DSL Backhaul
        3.4.2.1. DSL Channel Bonding
    3.5. ETH-CFM (802.1ag and Y.1731)
      3.5.1. 802.1ag and Y.1731 Terminology
        3.5.1.1. MDs, MD Levels, MAs, and MEPs (802.1ag)
        3.5.1.2. MEG Levels, MEGs, and MEPs (Y.1731)
      3.5.2. ETH-CFM Frame Format
        3.5.2.1. ETH-CFM OAMPDU
        3.5.2.2. CFM Frame Processing
          3.5.2.2.1. Processing SAP 0 and SAP 0.* OAM Packets
        3.5.2.3. MEG-ID and ICC-Based Format
      3.5.3. ETH-CFM Functions and Tests
        3.5.3.1. ETH-CFM Ethernet OAM Tests
          3.5.3.1.1. Loopback (LB)
          3.5.3.1.2. Linktrace (LT)
          3.5.3.1.3. Throughput Measurement
          3.5.3.1.4. Continuity Check (CC)
          3.5.3.1.5. ETH-RDI
          3.5.3.1.6. ETH-AIS
          3.5.3.1.7. ETH-Test
      3.5.4. MEP Support (802.1ag and Y.1731)
        3.5.4.1. 802.1ag MEP Support on Ethernet SAPs
        3.5.4.2. 802.1ag MEP Support on Ethernet Spoke SDPs
        3.5.4.3. Y.1731 MEP Support on Ethernet SAPs
      3.5.5. Priority Mapping (802.1ag and Y.1731)
        3.5.5.1. Priority Mapping for SAP Up MEPs
        3.5.5.2. Priority Mapping for SAP Down MEPs
    3.6. QinQ Support
      3.6.1. Overview of QinQ
      3.6.2. QinQ Support with Forced C-Tag Forwarding (VPLS only)
        3.6.2.1. Example 1: General QinQ Implementation
        3.6.2.2. Example 2: QinQ using VPLS with Ethernet SAPs
        3.6.2.3. Example 3: QinQ Using VPLS with ATM SAPs
      3.6.3. QinQ Support on Ethernet Ports
        3.6.3.1. Special QinQ SAP Identifiers
        3.6.3.2. QinQ Dot1p Match Behavior
        3.6.3.3. QinQ Top-Only Mark Option
        3.6.3.4. Maximum Number of VLAN Tags
      3.6.4. QinQ Configuration Overview
    3.7. Raw Socket IP Transport Service
      3.7.1. Remote Host Manual TCP Connection Check
      3.7.2. QoS Requirements for IP Transport
    3.8. Service Creation Overview
    3.9. Port and SAP CLI Identifiers
      3.9.1. Reference Sources
    3.10. Configuring Global Service Entities with CLI
    3.11. Service Model Entities
    3.12. Basic Configuration
    3.13. Common Configuration Tasks
      3.13.1. Configuring Customer Accounts
      3.13.2. Configuring SDPs
        3.13.2.1. SDP Configuration Considerations
        3.13.2.2. Configuring an SDP
        3.13.2.3. Enabling IP Fragmentation for GRE SDPs
      3.13.3. Configuring Service Names
    3.14. ETH-CFM (802.1ag and Y.1731) Tasks
      3.14.1. Configuring ETH-CFM Parameters (802.1ag and Y.1731)
      3.14.2. Applying ETH-CFM Parameters
    3.15. Service Management Tasks
      3.15.1. Modifying Customer Accounts
      3.15.2. Deleting Customers
      3.15.3. Modifying SDPs
      3.15.4. Deleting SDPs
      3.15.5. Deleting LSP Associations
    3.16. Global Service Command Reference
      3.16.1. Command Hierarchies
        3.16.1.1. Global Service Configuration Commands
          3.16.1.1.1. Customer Commands
          3.16.1.1.2. SDP Commands
          3.16.1.1.3. SAP Commands
          3.16.1.1.4. ETH-CFM Commands
        3.16.1.2. Show Commands
      3.16.2. Command Descriptions
        3.16.2.1. Global Service Configuration Commands
          3.16.2.1.1. Generic Commands
          3.16.2.1.2. Customer Commands
          3.16.2.1.3. SDP Commands
          3.16.2.1.4. SDP Keepalive Commands
        3.16.2.2. Show Commands
  4. VLL Services
    4.1. ATM VLL (Apipe) Services
      4.1.1. ATM VLL for End-to-End ATM Service
      4.1.2. ATM Virtual Trunk Over an IP/MPLS Packet-Switched Network
      4.1.3. ATM SAP-to-SAP Service
      4.1.4. ATM Traffic Management Support
        4.1.4.1. Network Ingress Classification
        4.1.4.2. ATM Access Egress Queuing and Shaping
      4.1.5. Control Word
    4.2. Circuit Emulation VLL (Cpipe) Services
      4.2.1. Cpipe Service Overview
      4.2.2. TDM SAP-to-SAP Service
      4.2.3. Cpipe Service Modes
        4.2.3.1. Unstructured Mode (SAToP)
        4.2.3.2. Structured Mode (CESoPSN)
      4.2.4. TDM PW Encapsulation
      4.2.5. Circuit Emulation Parameters and Options
        4.2.5.1. Unstructured
        4.2.5.2. Structured DS1/E1 CES without CAS
        4.2.5.3. Structured T1/E1 CES with CAS
        4.2.5.4. Packet Payload Size
        4.2.5.5. Jitter Buffer
        4.2.5.6. Asymmetric Delay Control
        4.2.5.7. RTP Header
        4.2.5.8. Control Word
      4.2.6. Transparent SDH/SONET Over Packet (TSoP)
      4.2.7.  Error Situations
    4.3. Ethernet VLL (Epipe) Services
      4.3.1. Epipe Service Overview
      4.3.2. Ethernet Access Egress Queuing and Scheduling
      4.3.3. Ethernet SAP-to-SAP
      4.3.4. MEF 8
        4.3.4.1. Epipe Service Modes
      4.3.5. Ethernet OAM
      4.3.6. Control Word
      4.3.7. MTU
      4.3.8. Raw and Tagged Modes
        4.3.8.1. Raw Mode
        4.3.8.2. Tagged Mode
        4.3.8.3. VLAN Translation
        4.3.8.4. Tagging Rules for Epipe
      4.3.9. IP Filters (Epipe)
      4.3.10. MPLS Entropy Label
    4.4. Frame Relay VLL (Fpipe) Services
      4.4.1. Fpipe Service Overview
      4.4.2. FR SAP-to-SAP Service
      4.4.3. FR Traffic Management
        4.4.3.1. Ingress SAP Classification and Marking
      4.4.4. FR Encapsulation
        4.4.4.1. FR PW Control Word
      4.4.5. Status Signaling and OAM Propagation
    4.5. HDLC VLL (Hpipe) Services
      4.5.1. Hpipe Service Overview
      4.5.2. HDLC VLL for End-to-End HDLC Service
      4.5.3. HDLC SAP-to-SAP Service
      4.5.4. HDLC Encapsulation
        4.5.4.1. HDLC PW Control Word and Payload Size
      4.5.5. Status Signaling
        4.5.5.1. OAM Propagation
    4.6. IP Interworking VLL (Ipipe) Services
      4.6.1. Ipipe Service Overview
      4.6.2. IP Interworking VLL Datapath
      4.6.3. CE IP Address Discovery and Distribution
        4.6.3.1. Manual IP Configuration
        4.6.3.2. CE IP Address Discovery Using ARP
        4.6.3.3. CE IP Address Discovery for Frame Relay
        4.6.3.4. CE IP Address Discovery for cHDLC
        4.6.3.5. CE IP Address Discovery for PPP/MLPPP
        4.6.3.6. CE IP Address Distribution to Remote PE Nodes
      4.6.4. IP SAP-to-SAP Service
      4.6.5. Hardware Support for Interworking IP PWs
      4.6.6. Control Word
      4.6.7. Termination at Access
        4.6.7.1. PPP and MLPPP Termination
        4.6.7.2. FR Termination
        4.6.7.3. cHDLC Termination
        4.6.7.4. PPP and MLPPP Termination on 2-port OC3/STM1 Channelized Adapter Cards
      4.6.8. Traffic Management
        4.6.8.1. Traffic Management for FR IW SAPs
      4.6.9. Status Signaling
        4.6.9.1. FR LMI
      4.6.10. IP Filters (Ipipe)
    4.7. Pseudowire Switching
      4.7.1. Overview
      4.7.2. Pseudowire Switching with Pseudowire Redundancy
      4.7.3. Pseudowire Switching Behavior
        4.7.3.1. Pseudowire Switching With IP Tunnels
      4.7.4. Pseudowire Switching TLV
    4.8. VLL Service Considerations
      4.8.1. Service Support
      4.8.2. SDPs
        4.8.2.1. SDP Statistics for VLL Services
      4.8.3. SAP Encapsulations and Pseudowire Types
      4.8.4. ATM PWE3 N-to-1 Cell Mode Encapsulation
        4.8.4.1. N-to-1 Cell Mode Encapsulation (N = 1)
          4.8.4.1.1. Deployment Scenario for N = 1 Cell Mode Encapsulation
          4.8.4.1.2. VPI/VCI Translation (N = 1)
          4.8.4.1.3. Cell Concatenation (N = 1)
          4.8.4.1.4. QoS and Traffic Descriptor Profiles (N = 1)
          4.8.4.1.5. OAM (N = 1)
        4.8.4.2. N-to-1 Cell Mode Encapsulation (N > 1)
          4.8.4.2.1. Deployment Scenario for N > 1 Cell Mode Encapsulation
          4.8.4.2.2. PW Optimization (N > 1)
          4.8.4.2.3. Overhead Optimization (N > 1)
          4.8.4.2.4. Cell Concatenation (N > 1)
          4.8.4.2.5. OAM (N > 1)
          4.8.4.2.6. Hardware Support for N > 1 Cell Mode Encapsulation
          4.8.4.2.7. SAP Support for N > 1
      4.8.5. SAP Aggregation Groups
        4.8.5.1. Configuration
          4.8.5.1.1. Sap-aggregation-group Keyword
          4.8.5.1.2. Sap-aggregation-group Group Identifier
          4.8.5.1.3. VPI/VCI Translation for SAP Aggregation Group Members (N>1)
        4.8.5.2. QoS and Traffic Descriptor Profiles (N > 1)
        4.8.5.3. Statistics and Counters
        4.8.5.4. Fault Management
      4.8.6. QoS Policies
      4.8.7. IP Filter Policies
      4.8.8. MTU Settings
        4.8.8.1. Targeted LDP and MTU
      4.8.9. QinQ (VLL Service)
      4.8.10. Pseudowire Control Word
      4.8.11. Pseudowire Redundancy
        4.8.11.1. PW Redundancy Operation
        4.8.11.2. Selecting the Active Spoke SDP for PW Redundancy Configuration
          4.8.11.2.1. Primary and Secondary Spoke SDPs
          4.8.11.2.2. Secondary Spoke SDPs Only
        4.8.11.3. PW Redundancy and Inter-Chassis Backup
        4.8.11.4. AIS Fault Propagation
      4.8.12. Active/Standby Mode for Pseudowire Redundancy (Standby Signaling)
        4.8.12.1. PW Status Signaling Label Withdrawal Option
          4.8.12.1.1. Interoperation with PEs that do not Support the PW Forwarding Standby Bit
          4.8.12.1.2. Multiple Remote PEs Connected to an r-VPLS Instance Via Spoke-SDP Termination
        4.8.12.2. Pseudowire Redundancy on Serial Data Interface Ports
    4.9. Configuring a VLL Service with CLI
    4.10. Common Configuration Tasks
    4.11. Configuring VLL Components
      4.11.1. Creating an Apipe Service
        4.11.1.1. Configuring Apipe SAP Parameters
        4.11.1.2. Configuring Apipe SDP Bindings
        4.11.1.3. Configuring Apipe SAP Aggregation Groups
        4.11.1.4. Configuring Apipe SAPs as Aggregation Group Members
      4.11.2. Creating a Cpipe Service
        4.11.2.1. Configuring Cpipe SAP Parameters
        4.11.2.2. Configuring Cpipe SDP Bindings
      4.11.3. Creating an Epipe Service
        4.11.3.1. Configuring Epipe SAP Parameters
        4.11.3.2. Configuring Epipe SAP MEF 8 Parameters
        4.11.3.3. Configuring Epipe SAP Microwave Link Parameters for Interworking with TDM2Ethernet
        4.11.3.4. Configuring ATM Encapsulation Under Epipe Service (7705 SAR-M only)
        4.11.3.5. Configuring Epipe Spoke SDP Bindings
      4.11.4. Creating an Fpipe Service
        4.11.4.1. Configuring Fpipe SAP Parameters
        4.11.4.2. Configuring Fpipe SDP Bindings
      4.11.5. Creating an Hpipe Service
        4.11.5.1. Configuring Hpipe SAP Parameters
        4.11.5.2. Configuring Hpipe SDP Bindings
      4.11.6. Creating an Ipipe Service
        4.11.6.1. Configuring Ipipe SAP Parameters
        4.11.6.2. Configuring Ipipe SDP Bindings
      4.11.7. Configuring PW Switching
      4.11.8. Configuring Ingress and Egress SAP Parameters
      4.11.9. Using the Control Word
      4.11.10. Configuring PW Redundancy
        4.11.10.1. Configuring PW Redundancy—Standby Signaling
        4.11.10.2. Configuring PW Redundancy—ICB
    4.12. Service Management Tasks
      4.12.1. Modifying Service Parameters
      4.12.2. Disabling a Service
      4.12.3. Re-enabling a Service
      4.12.4. Deleting a Service
    4.13. VLL Services Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VLL Services Configuration Commands
          4.13.1.1.1. Apipe Service Configuration Commands
          4.13.1.1.2. Apipe Service with SAP Aggregation Configuration Commands
          4.13.1.1.3. Cpipe Service Configuration Commands
          4.13.1.1.4. Epipe Service Configuration Commands
          4.13.1.1.5. Fpipe Service Configuration Commands
          4.13.1.1.6. Hpipe Service Configuration Commands
          4.13.1.1.7. Ipipe Service Configuration Commands
        4.13.1.2. Show Commands
        4.13.1.3. Clear Commands
      4.13.2. Command Descriptions
        4.13.2.1. VLL Service Configuration Commands
          4.13.2.1.1. Generic Commands
          4.13.2.1.2. VLL Global Commands
          4.13.2.1.3. VLL SAP Commands
          4.13.2.1.4. SAP Aggregation Group Commands
          4.13.2.1.5. SAP cem Commands
          4.13.2.1.6. SAP QoS and IP Filter Policy Commands
          4.13.2.1.7. SAP Microwave Link Commands
          4.13.2.1.8. Service Billing Commands
          4.13.2.1.9. VLL SDP Commands
          4.13.2.1.10. SDP Cell Concatenation Commands
          4.13.2.1.11. ATM Commands
          4.13.2.1.12. ATM OAM Commands
        4.13.2.2. Show Commands
        4.13.2.3. Clear Commands
  5. VPLS
    5.1. VPLS Overview
      5.1.1. VPLS Packet Walkthrough
      5.1.2. Bridged Mobile Backhaul
      5.1.3. Multi-Tenant Unit (MTU) Termination
    5.2. VPLS Features
      5.2.1. VPLS Enhancements
      5.2.2. Fabric Mode
      5.2.3. Subscriber VLAN
      5.2.4. ATM Encapsulated Residential SAP
      5.2.5. VPLS over MPLS
      5.2.6. VPLS MAC Learning and Packet Forwarding
      5.2.7. Pseudowire Control Word
      5.2.8. Agent Circuit ID Insertion
      5.2.9. MAC Filters
      5.2.10. FDB Table Management
        5.2.10.1. FDB Size
        5.2.10.2. FDB Size Alarms
        5.2.10.3. Local and Remote Aging Timers
          5.2.10.3.1. Disable MAC Aging
          5.2.10.3.2. Disable MAC Learning
        5.2.10.4. Unknown MAC Discard
      5.2.11. VPLS and Rate Limiting Via QoS Policy
      5.2.12. MAC Move
      5.2.13. Split Horizon Groups (SAP and Spoke SDP)
        5.2.13.1. Residential Split Horizon Groups
      5.2.14. Multicast for VPLS and Routed VPLS (IGMP and MLD Snooping)
        5.2.14.1. Application Examples
        5.2.14.2. Group and Addressing Support
          5.2.14.2.1. IPv4 Multicast Support
          5.2.14.2.2. IPv6 Layer 2 Multicast Support and Group Address
        5.2.14.3. IP Multicast in r-VPLS
          5.2.14.3.1. IPv6 Multicast Forwarding Behavior in r-VPLS
        5.2.14.4. Multicast Router Ports
        5.2.14.5. Tagged Access Traffic
        5.2.14.6. Hardware Support
      5.2.15. PIM Snooping for VPLS
        5.2.15.1. Snooping versus Proxy Mode
      5.2.16. MPLS Entropy Label
    5.3. Routed VPLS
      5.3.1. IES or VPRN IP Interface Binding
        5.3.1.1. Assigning a Service Name to a VPLS Service
        5.3.1.2. Binding a Service Name to an IP Interface
        5.3.1.3. Removing a Bound VPLS Service or Service Name
        5.3.1.4. IP Interface and VPLS Operational State Coordination
      5.3.2. IP Interface MTU and Fragmentation
      5.3.3. ARP/ND and VPLS FIB Interactions
        5.3.3.1. Routed VPLS Specific ARP/ND Cache Behavior
      5.3.4. The allow-ip-int-binding VPLS Flag
        5.3.4.1. VPLS Feature Restrictions (due to allow-ip-int-binding)
      5.3.5. DSCP Marking
      5.3.6. VPLS Ingress IP Filter Override
      5.3.7. Routed VPLS Supported Routing-Related Protocols
    5.4. VPLS and Spanning Tree Protocol
      5.4.1. VPLS Redundancy
        5.4.1.1. Spoke SDP Redundancy for Metro Interconnection
        5.4.1.2. Spoke SDP-Based Redundant Access
      5.4.2. VPLS Access Redundancy
        5.4.2.1. STP-Based Redundant Access to VPLS
      5.4.3. MAC Flush Message Processing
        5.4.3.1. Dual Homing to a VPLS Service
    5.5. ATM PVC Access and Termination on a VPLS Service
    5.6. VPLS Service Considerations
      5.6.1. SAP Encapsulations
      5.6.2. VLAN Processing
        5.6.2.1. Tagging Rules for VPLS
      5.6.3. QinQ (VPLS)
    5.7. Configuration Notes
      5.7.1. Reference Sources
    5.8. Configuring a VPLS Service with CLI
    5.9. Basic Configuration
    5.10. Common Configuration Tasks
    5.11. Configuring VPLS Components
      5.11.1. Creating a VPLS Service
      5.11.2. Creating a Split Horizon Group
      5.11.3. Enabling MAC Move
      5.11.4. Configuring STP Bridge Parameters in a VPLS
        5.11.4.1. Bridge STP Admin State
        5.11.4.2. Mode
        5.11.4.3. Bridge Priority
        5.11.4.4. Hello Time
        5.11.4.5. Hold Count
    5.12. Configuring a VPLS SAP
      5.12.1. Local VPLS SAPs
      5.12.2. Distributed VPLS SAPs
      5.12.3. Configuring SAP-Specific STP Parameters
        5.12.3.1. SAP STP Administrative State
        5.12.3.2. SAP Virtual Port Number
        5.12.3.3. SAP Priority
        5.12.3.4. SAP Path Cost
        5.12.3.5. SAP Edge Port
        5.12.3.6. SAP Auto Edge
        5.12.3.7. SAP Link Type
      5.12.4. STP SAP Operational States
        5.12.4.1. Operationally Disabled
        5.12.4.2. Operationally Discarding
        5.12.4.3. Operationally Learning
        5.12.4.4. Operationally Forwarding
      5.12.5. Configuring VPLS SAPs with Split Horizon
    5.13. Configuring SDP Bindings
      5.13.1. Configuring Mesh SDP Bindings
      5.13.2. Configuring Spoke SDP
        5.13.2.1. Configuring Spoke SDP Binding
        5.13.2.2. Configuring Spoke SDP-Specific STP Parameters
          5.13.2.2.1. Spoke SDP STP Administrative State
          5.13.2.2.2. Spoke SDP Virtual Port Number
          5.13.2.2.3. Spoke SDP Priority
          5.13.2.2.4. Spoke SDP Path Cost
          5.13.2.2.5. Spoke SDP Edge Port
          5.13.2.2.6. Spoke SDP Auto Edge
          5.13.2.2.7. Spoke SDP Link Type
      5.13.3. Configuring VPLS Spoke SDPs with Split Horizon
      5.13.4. Configuring Selective MAC Flush
    5.14. Configuring Routed VPLS
    5.15. Configuring IP Multicast in VPLS
    5.16. Configuring IP Multicast in r-VPLS
    5.17. Configuring Multicast Parameters for VPLS and r-VPLS
    5.18. Configuring a Static Multicast Group
    5.19. Configuring PIM Snooping for VPLS
    5.20. Service Management Tasks
      5.20.1. Modifying VPLS Service Parameters
      5.20.2. Modifying Management VPLS Parameters
      5.20.3. Deleting a Management VPLS
      5.20.4. Disabling a Management VPLS
      5.20.5. Deleting a VPLS Service
      5.20.6. Disabling a VPLS Service
      5.20.7. Re-enabling a VPLS Service
    5.21. VPLS Command Reference
      5.21.1. Command Hierarchies
        5.21.1.1. VPLS Service Configuration Commands
          5.21.1.1.1. Global Commands
          5.21.1.1.2. SAP Commands
          5.21.1.1.3. Mesh SDP Commands
          5.21.1.1.4. Spoke SDP Commands
          5.21.1.1.5. Routed VPLS Commands
        5.21.1.2. Show Commands
        5.21.1.3. Clear Commands
        5.21.1.4. Debug Commands
      5.21.2. Command Descriptions
        5.21.2.1. VPLS Service Configuration Commands
          5.21.2.1.1. Generic Commands
          5.21.2.1.2. VPLS Service Commands
          5.21.2.1.3. VPLS SAP Commands
          5.21.2.1.4. VPLS SAP ATM Commands
          5.21.2.1.5. VPLS IGMP and MLD Snooping Commands
          5.21.2.1.6. VPLS STP Commands
          5.21.2.1.7. VPLS Filter and QoS Policy Commands
          5.21.2.1.8. Service Billing Commands
          5.21.2.1.9. VPLS SAP DHCP Commands
          5.21.2.1.10. VPLS SDP Commands
        5.21.2.2. Routed VPLS Configuration Commands
        5.21.2.3. VPLS Show Commands
        5.21.2.4. VPLS Clear Commands
        5.21.2.5. VPLS Debug Commands
  6. Internet Enhanced Service
    6.1. IES for In-band Management
      6.1.1. Setting Up Connections Between the NSP NFM-P and the 7705 SAR
      6.1.2. Encapsulation
      6.1.3. Layer 2 and Layer 3 Traffic Management
      6.1.4. Troubleshooting and Fault Detection Services
      6.1.5. IP ECMP Load Balancing
    6.2. IES for Customer Traffic
      6.2.1. DHCP Relay and DHCPv6 Relay
        6.2.1.1. DHCP Relay
          6.2.1.1.1. DHCP Options
        6.2.1.2. DHCPv6 Relay
          6.2.1.2.1. DHCPv6 Options
      6.2.2. IPCP
      6.2.3. IPSec Support
      6.2.4. Security Zones and IES
      6.2.5. Proxy ARP
      6.2.6. Configurable ARP Retry Timer
      6.2.7. Unnumbered Interfaces
      6.2.8. Troubleshooting and Fault Detection Services
      6.2.9. VRRP on IES Interfaces
      6.2.10. SAPs
        6.2.10.1. Encapsulations
        6.2.10.2. Routing Protocols
        6.2.10.3. QoS Policies
        6.2.10.4. QinQ (IES)
        6.2.10.5. IP Filter Policies on an IES SAP
      6.2.11. Spoke SDP Termination to IES
      6.2.12. Bandwidth Optimization for Low-speed Links
        6.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
    6.3. Configuring IES with CLI
    6.4. Common Configuration Tasks
    6.5. Configuring IES Components
      6.5.1. Creating an IES Service
      6.5.2. Configuring Interface Parameters
        6.5.2.1. IES Management Service
        6.5.2.2. IES Service
        6.5.2.3. IES IPv6 Service
      6.5.3. Configuring IES SAP Parameters
        6.5.3.1. IES Management SAP
        6.5.3.2. IES Service SAP
      6.5.4. Configuring IES Spoke SDP Parameters
      6.5.5. Configuring VRRP
      6.5.6. Configuring a Security Zone Within IES
      6.5.7. Configuring Serial Raw Socket Transport Within IES
    6.6. Service Management Tasks
      6.6.1. Modifying IES Service Parameters
      6.6.2. Disabling an IES Service
      6.6.3. Re-enabling an IES Service
      6.6.4. Deleting an IES Service
    6.7. IES Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Configuration Commands
          6.7.1.1.1. IES Management Configuration Commands
          6.7.1.1.2. IES Service Configuration Commands
          6.7.1.1.3. Routed VPLS Commands
          6.7.1.1.4. VRRP Commands
          6.7.1.1.5. IES Security Zone Configuration Commands
          6.7.1.1.6. IES Raw Socket IP Transport Configuration Commands
        6.7.1.2. Show Commands
        6.7.1.3. Clear Commands
        6.7.1.4. Debug Commands
      6.7.2. Command Descriptions
        6.7.2.1. IES Management Configuration Commands
          6.7.2.1.1. Generic Commands
          6.7.2.1.2. IES Global Commands
          6.7.2.1.3. IES Management Interface Commands
          6.7.2.1.4. IES Management SAP Commands
        6.7.2.2. IES Service Configuration Commands
          6.7.2.2.1. IES Service Interface Commands
          6.7.2.2.2. IES Service IPv6 Commands
          6.7.2.2.3. IES Service VRRP Commands
          6.7.2.2.4. IES Service SAP Commands
          6.7.2.2.5. IES Service Spoke SDP Commands
          6.7.2.2.6. Routed VPLS Commands
          6.7.2.2.7. IES Service Security Zone Configuration Commands
          6.7.2.2.8. IES Raw Socket IP Transport Configuration Commands
        6.7.2.3. Show Commands
        6.7.2.4. Clear Commands
        6.7.2.5. Debug Commands
  7. VPRN Services
    7.1. VPRN Service Overview
      7.1.1. Routing Prerequisites
      7.1.2. BGP Support
        7.1.2.1. BGP Fast Reroute with Prefix-Independent Convergence in a VPRN
      7.1.3. IPSec Support
      7.1.4. Security Zones and VPRN
      7.1.5. Route Distinguishers
        7.1.5.1. PE-to-CE Route Exchange
          7.1.5.1.1. Route Redistribution
          7.1.5.1.2. CPE Connectivity Check
      7.1.6. Route Target Constraint
        7.1.6.1. Configuring the Route Target Address Family
        7.1.6.2. Originating RTC Routes
        7.1.6.3. Receiving and Readvertising RTC Routes
        7.1.6.4. Using RTC Routes
      7.1.7. In-Band Management using a VPRN
    7.2. VPRN Features
      7.2.1. IP Interfaces
        7.2.1.1. Unnumbered Interfaces
        7.2.1.2. DHCP and DHCPv6
          7.2.1.2.1. DHCP Relay and DHCPv6 Relay
          7.2.1.2.2. Local DHCP and DHCPv6 Server
        7.2.1.3. IPCP
        7.2.1.4. Troubleshooting and Fault Detection Services
        7.2.1.5. VRRP on VPRN Interfaces
        7.2.1.6. IP ECMP Load Balancing
        7.2.1.7. Proxy ARP
        7.2.1.8. Configurable ARP Retry Timer
      7.2.2. SAPs
        7.2.2.1. Encapsulations
        7.2.2.2. QoS Policies
          7.2.2.2.1. CoS Marking for Self-generated Traffic
        7.2.2.3. QinQ (VPRN)
        7.2.2.4. Filter Policies on a VPRN SAP
      7.2.3. PE-to-CE Routing Protocols
        7.2.3.1. Using OSPF or OSPFv3 in IP VPNs
          7.2.3.1.1. DN Bit
        7.2.3.2. TTL Security
      7.2.4. PE-to-PE Tunneling Mechanisms
      7.2.5. Per-VRF Route Limiting
      7.2.6. RIP Metric Propagation in VPRNs
      7.2.7. Multicast VPN (MVPN)
        7.2.7.1. Multicast in IP-VPN Applications
        7.2.7.2. MVPN Building Blocks
          7.2.7.2.1. PMSI
          7.2.7.2.2. MVPN Using BGP Control Plane
          7.2.7.2.3. Auto-Discovery
          7.2.7.2.4. PE-CE Multicast Protocols and Services
          7.2.7.2.5. PE-PE Transmission of C-Multicast Routing Using BGP
          7.2.7.2.6. PE-PE Multicast Protocols
          7.2.7.2.7. PE-PE Multicast Data Transmission
        7.2.7.3. Provider Tunnel Support
          7.2.7.3.1. Point-to-Multipoint I-PMSI and S-PMSI
          7.2.7.3.2. Point-to-Multipoint LDP I-PMSI and S-PMSI
          7.2.7.3.3. Point-to-Multipoint LSP S-PMSI
          7.2.7.3.4. MVPN Sender-only and Receiver-only
        7.2.7.4. Inter-AS and Intra-AS Solutions
          7.2.7.4.1. 7705 SAR as Source of Non-Segmented Inter-AS or Intra-AS Network
        7.2.7.5. Mrinfo and Mtrace
        7.2.7.6. Multicast-only Fast Reroute (MoFRR)
        7.2.7.7. mLDP Point-to-Multipoint Support
        7.2.7.8. mLDP Fast Upstream Switchover
      7.2.8. Spoke SDPs
      7.2.9. Spoke SDP Termination to VPRN
      7.2.10. IPv6 on Virtual Private Edge Router
      7.2.11. IPv6 over IPv4 LAN-to-LAN IPSec tunnels
      7.2.12. Bandwidth Optimization for Low-speed Links
        7.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
    7.3. Configuring a VPRN Service with CLI
    7.4. Basic Configuration
    7.5. Common Configuration Tasks
    7.6. Configuring VPRN Components
      7.6.1. Creating a VPRN Service
      7.6.2. Configuring Global VPRN Parameters
      7.6.3. Configuring Router Interfaces
      7.6.4. Configuring BGP for VPRN
        7.6.4.1. Configuring VPRN BGP Group and Neighbor Parameters
        7.6.4.2. Configuring Route Reflection
        7.6.4.3. VPRN BGP CLI Syntax
      7.6.5. Configuring IPv6 Parameters for VPRN BGP
      7.6.6. Configuring VPRN IPv6 Neighbor Discovery Parameters
      7.6.7. Configuring OSPF or OSPFv3 for VPRN
      7.6.8. Configuring RIP for VPRN
      7.6.9. Configuring IGMP for VPRN
      7.6.10. Configuring PIM for VPRN
      7.6.11. Configuring MVPN for VPRN
      7.6.12. Configuring a VPRN Interface
      7.6.13. Configuring a VPRN IPv6 Interface
      7.6.14. Configuring VPRN Interface Routed VPLS IPv6 Parameters
      7.6.15. Configuring VPRN Interface SAP Parameters
      7.6.16. Configuring VPRN Interface SAP IPv6 Parameters
      7.6.17. Configuring VPRN Interface Spoke SDP Parameters
      7.6.18. Configuring VPRN Interface Spoke SDP IPv6 Parameters
      7.6.19. Configuring VRRP
      7.6.20. Configuring a Security Zone Within a VPRN
      7.6.21. Configuring Serial Raw Socket Transport Within VPRN
      7.6.22. Configuring VPRN Router Advertisement
    7.7. Service Management Tasks
      7.7.1. Modifying VPRN Service Parameters
      7.7.2. Deleting a VPRN Service
      7.7.3. Disabling a VPRN Service
      7.7.4. Re-enabling a VPRN Service
    7.8. VPRN Services Command Reference
      7.8.1. Command Hierarchies
        7.8.1.1. Configuration Commands
          7.8.1.1.1. VPRN Service Configuration Commands
          7.8.1.1.2. BGP Commands
          7.8.1.1.3. OSPF Commands
          7.8.1.1.4. OSPFv3 Commands
          7.8.1.1.5. IGMP Commands
          7.8.1.1.6. PIM Commands
          7.8.1.1.7. RIP Commands
          7.8.1.1.8. VPRN Security Zone Configuration Commands
          7.8.1.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.1.1.10. Multicast VPN Commands
          7.8.1.1.11. Router Advertisement Commands
          7.8.1.1.12. Local DHCP and DHCPv6 Server Commands
          7.8.1.1.13. Interface Commands
          7.8.1.1.14. IPv6 Interface Commands
          7.8.1.1.15. Interface DHCP Commands
          7.8.1.1.16. Interface ICMP Commands
          7.8.1.1.17. Interface SAP IPSec-Tunnel Commands
          7.8.1.1.18. Routed VPLS Commands
          7.8.1.1.19. Interface VRRP Commands
          7.8.1.1.20. TWAMP Light Commands
        7.8.1.2. Show Commands
        7.8.1.3. Clear Commands
        7.8.1.4. Debug Commands
      7.8.2. Command Descriptions
        7.8.2.1. VPRN Service Configuration Commands
          7.8.2.1.1. Generic Commands
          7.8.2.1.2. Global Commands
          7.8.2.1.3. BGP Commands
          7.8.2.1.4. OSPF and OSPFv3 Commands
          7.8.2.1.5. IGMP Commands
          7.8.2.1.6. PIM Commands
          7.8.2.1.7. RIP Commands
          7.8.2.1.8. VPRN Security Configuration Commands
          7.8.2.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.2.1.10. Multicast VPN Commands
          7.8.2.1.11. Router Advertisement Commands
          7.8.2.1.12. Local DHCP and DHCPv6 Server Commands
          7.8.2.1.13. Interface Commands
          7.8.2.1.14. IPv6 Interface Commands
          7.8.2.1.15. Interface DHCP Commands
          7.8.2.1.16. Interface ICMP Commands
          7.8.2.1.17. Interface SAP Commands
          7.8.2.1.18. Interface Spoke SDP Commands
          7.8.2.1.19. Routed VPLS Commands
          7.8.2.1.20. Interface VRRP Commands
          7.8.2.1.21. TWAMP Light Commands
        7.8.2.2. Show Service Commands
        7.8.2.3. Show Router Commands
        7.8.2.4. Clear Service Commands
        7.8.2.5. Debug Service Commands
  8. IPSec
    8.1. IPSec Overview
      8.1.1. IPSec Implementation
        8.1.1.1. IPSec Overview
        8.1.1.2. Hardware Support
        8.1.1.3. IPSec Encryption Features
        8.1.1.4. SHA2 Support
        8.1.1.5. IPSec Security Policy, IKE Policy, and IPSec Transform
        8.1.1.6. Tunnel Group
        8.1.1.7. Tunnel Interfaces and SAPs
          8.1.1.7.1. Public Tunnel SAPs
          8.1.1.7.2. Private Tunnel SAPs
          8.1.1.7.3. IP Interface Configuration
        8.1.1.8. IPSec Tunnel Configuration
        8.1.1.9. IPSec over MPLS
        8.1.1.10. GRE-Encapsulated VLLs/VPLS over IPSec VPNs
        8.1.1.11. GRE-Encapsulated VLLs/VPLS over IPSec over MPLS
          8.1.1.11.1. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 Label Routes) Solution 1: Changing BGP Signaling to Loopback Interface
          8.1.1.11.2. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 label Routes) Solution 2: GRE to Local Interface on 7705 SAR
          8.1.1.11.3. VLLs/VPLS over IPSec over MPLS (Using IGP Shortcuts)
      8.1.2. X.509v3 Certificate Overview
        8.1.2.1. X.509v3 Certificate Support on the 7705 SAR
        8.1.2.2. Local Storage
        8.1.2.3. CA Profile
        8.1.2.4. CA Chain Computation
        8.1.2.5. Certificate Enrollment
        8.1.2.6. Certificate Revocation Check
        8.1.2.7. Certificate, CRL, and Key Cache
      8.1.3. Using Certificates For IPSec Tunnel Authentication
      8.1.4. Trust Anchor Profile
      8.1.5. Certificate Profile
      8.1.6. Certificate Management Protocol Version 2 (CMPv2)
      8.1.7. OCSP
      8.1.8. Applications
        8.1.8.1. Metrocell Deployment
        8.1.8.2. Small Business Deployment
      8.1.9. NAT-Traversal for IKEv1/v2 and IPSec
      8.1.10. BFD over IPSec Tunnel
      8.1.11. QoS for IPSec
        8.1.11.1. Network and Access Ingress QoS (Decryption QoS)
          8.1.11.1.1. Network Ingress QoS Tunnel Override
        8.1.11.2. Network and Access Egress QoS (Encryption QoS)
      8.1.12. Fragmentation and IP MTU
        8.1.12.1. Fragmentation Configuration
        8.1.12.2. Reassembly
      8.1.13. Support for Private VPRN Service Features
      8.1.14. Routing in Private Services
      8.1.15. IPSec on the 10-port 1GigE/1-port 10GigE X-Adapter Card
      8.1.16. IPSec Sequence Number
      8.1.17. PBR and MFC
        8.1.17.1. PBR
        8.1.17.2. MFC
      8.1.18. OSPFv3 Packet Authentication with IPv6 IPSec
      8.1.19. Statistics
      8.1.20. Security Support
    8.2. Public Key Infrastructure (PKI)
      8.2.1. CA Role in PKI
      8.2.2. Digital Signature and Certificates
        8.2.2.1. Certificates
          8.2.2.1.1. Vendor Certificate Signature by the Root CA
          8.2.2.1.2. Vendor Certificate Authentication by a Peer
          8.2.2.1.3. Example of PKI Operation
          8.2.2.1.4. Certificate Chain
      8.2.3. Certificate Storage
      8.2.4. CMPv2 Certificate Management
        8.2.4.1. CMPv2 Initial Registration
        8.2.4.2. Key Update
        8.2.4.3. CRL
      8.2.5. OCSP
    8.3. Best Practices Recommendations
      8.3.1. IPSec Best Practices
    8.4. Configuration Notes
      8.4.1. Reference Sources
    8.5. Configuring IPSec with CLI
    8.6. Basic Configuration Overview
    8.7. Common Configuration Tasks
      8.7.1. Configuring an IPSec Tunnel Group
      8.7.2. Configuring Router Interfaces for IPSec
      8.7.3. Configuring IPSec Parameters
      8.7.4. Configuring IPSec and IPSec Tunnels in Services
      8.7.5. Configuring IPSec IPv6 Parameters for a VPRN Service
      8.7.6. Configuring X.509v3 Certificate Parameters
      8.7.7. Configuring CMPv2
      8.7.8. Configuring OCSP
    8.8. Configuring IPSec over MPLS
      8.8.1. IPSec over BGP 3107 Label Route
        8.8.1.1. Static LAN-to-LAN Tunnel Configuration
        8.8.1.2. Policy Option Configuration
        8.8.1.3. BGP Configuration with BGP 3107 Label Route Advertisement
        8.8.1.4. LDP or RSVP-TE Tunnel Configuration
      8.8.2. IPSec over IGP Shortcut
        8.8.2.1. Static LAN-to-LAN Tunnel Configuration
        8.8.2.2. IGP Shortcut Configuration
        8.8.2.3. RSVP-TE LSP Configuration
    8.9. Service Management Tasks
      8.9.1. Deleting an IPSec IKE Policy or an IPSec Transform
      8.9.2. Deleting a Public IPSec Tunnel SAP and Interface
      8.9.3. Deleting a Private IPSec Tunnel SAP and Interface
      8.9.4. Deleting an IPSec Security Policy
      8.9.5. Deleting an IPSec Tunnel
    8.10. IPSec Command Reference
      8.10.1. Command Hierarchies
        8.10.1.1. IPSec Configuration Commands
          8.10.1.1.1. ISA Tunnel Commands
          8.10.1.1.2. IPSec Commands
          8.10.1.1.3. Service Configuration Commands
          8.10.1.1.4. Service Interface Tunnel Commands
          8.10.1.1.5. Service Static Route Commands
        8.10.1.2. PKI Configuration Commands
          8.10.1.2.1. X.509 and Certificate Commands
          8.10.1.2.2. PKI Infrastructure Commands
          8.10.1.2.3. IPSec PKI Commands
          8.10.1.2.4. IKE PKI Commands
        8.10.1.3. Show Commands
        8.10.1.4. Clear Commands
        8.10.1.5. Debug Commands
      8.10.2. Command Descriptions
        8.10.2.1. IPSec Configuration Commands
          8.10.2.1.1. Generic Commands
          8.10.2.1.2. ISA Tunnel Commands
          8.10.2.1.3. Internet Key Exchange (IKE) and Transform Commands
          8.10.2.1.4. Service Configuration Commands
          8.10.2.1.5. Service Interface Tunnel Commands
        8.10.2.2. PKI Configuration Commands
          8.10.2.2.1. X.509 and Certificate Commands
          8.10.2.2.2. PKI Infrastructure Commands
          8.10.2.2.3. IPSec PKI Commands
          8.10.2.2.4. IKE PKI Commands
        8.10.2.3. Show Commands
        8.10.2.4. Clear Commands
        8.10.2.5. Debug Commands
  9. Network Group Encryption
    9.1. NGE Overview
      9.1.1. NGE Key Groups and Encryption Partitions
      9.1.2. NGE Domains
        9.1.2.1. Private IP/MPLS Network NGE Domain
        9.1.2.2. Private Over Intermediary Network NGE Domain
      9.1.3. Network Services Platform Management
    9.2. Key Groups
      9.2.1. Key Group Algorithms
        9.2.1.1. Encapsulating Security Payload (ESP)
      9.2.2. Security Associations (SAs)
        9.2.2.1. Active Outbound SA
    9.3. Services Encryption
      9.3.1. Services Encryption Overview
      9.3.2. Assigning Key Groups to Services
      9.3.3. Pseudowire Switching for NGE Traffic
      9.3.4. Pseudowire Control Word for NGE Traffic
      9.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
      9.3.6. NGE and RFC 3107
    9.4. Router Interface Encryption
      9.4.1. Router Interface NGE Domain Concepts
      9.4.2. GRE-MPLS Packets Inside the NGE Domain
      9.4.3. Router Encryption Exceptions using ACLs
      9.4.4. IPSec Packets Crossing an NGE Domain
      9.4.5. Multicast Packets Traversing the NGE Domain
      9.4.6. Assigning Key Groups to Router Interfaces
      9.4.7. Router Interface NGE Firewall Considerations
      9.4.8. NGE and BFD Support
      9.4.9. NGE and ACL Interactions
      9.4.10. Router Interface NGE and ICMP Interactions Over the NGE Domain
      9.4.11. OAM Considerations for Router Interface Encryption
    9.5. Layer 2 Encryption
    9.6. NGE Packet Overhead and MTU Considerations
    9.7. 1588v2 Encryption With NGE
    9.8. QoS for NGE Traffic
      9.8.1. Network Ingress
      9.8.2. Network Egress
    9.9. Statistics
    9.10. Remote Network Monitoring (RMON) Support
    9.11. Configuration Notes
      9.11.1. Reference Sources
    9.12. Configuring NGE with the CLI
    9.13. Basic NGE Configuration Overview
    9.14. Configuring NGE Components
      9.14.1. Configuring the Global Encryption Label
      9.14.2. Configuring a Key Group
      9.14.3. Assigning a Key Group to an SDP or VPRN Service
      9.14.4. Assigning a Key Group to a Router Interface
      9.14.5. Assigning a Key Group to an Ethernet Port
    9.15. NGE Management Tasks
      9.15.1. Modifying a Key Group
      9.15.2. Removing a Key Group
        9.15.2.1. Removing a Key Group from an SDP or VPRN Service
        9.15.2.2. Removing a Key Group from a Router Interface
        9.15.2.3. Removing a Key Group from an Ethernet Port
      9.15.3. Changing Key Groups
        9.15.3.1. Changing the Key Group for an SDP or VPRN Service
        9.15.3.2. Changing the Key Group for a Router Interface
        9.15.3.3. Changing the Key Group for an Ethernet Port
      9.15.4. Deleting a Key Group from a 7705 SAR
    9.16. NGE Command Reference
      9.16.1. Command Hierarchies
        9.16.1.1. Configuration Commands
          9.16.1.1.1. NGE Commands
          9.16.1.1.2. Services Commands
          9.16.1.1.3. Router Interface Encryption Commands
          9.16.1.1.4. Ethernet Port Encryption Commands
        9.16.1.2. Show Commands
        9.16.1.3. Clear Commands
      9.16.2. Command Descriptions
        9.16.2.1. Configuration Commands
          9.16.2.1.1. Generic Commands
          9.16.2.1.2. Group Encryption Commands
        9.16.2.2. Show Commands
        9.16.2.3. Clear Commands
  10. List of Acronyms
  11. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR Services Configuration Process
  3. Services Overview
    3.1. Introduction to Services on the 7705 SAR
      3.1.1. Overview
      3.1.2. Service Types
      3.1.3. Service Policies
    3.2. Nokia Service Model
    3.3. Service Entities
      3.3.1. Customers
      3.3.2. Service Types
        3.3.2.1. Service Names
      3.3.3. Service Access Points (SAPs)
        3.3.3.1. SAP Encapsulation Types and Identifiers
          3.3.3.1.1. Ethernet Encapsulations
          3.3.3.1.2. SONET/SDH Encapsulations
          3.3.3.1.3. TDM and Serial (TDM) Encapsulations
          3.3.3.1.4. Service Types and SAP Encapsulations—Summary
        3.3.3.2. SAP Configuration Considerations
      3.3.4. Service Destination Points (SDPs)
        3.3.4.1. SDP Binding
        3.3.4.2. Spoke and Mesh SDPs
        3.3.4.3. SDPs and BGP Route Tunnels
        3.3.4.4. SDP Encapsulation Types
          3.3.4.4.1. MPLS Encapsulation
          3.3.4.4.2. GRE Encapsulation
          3.3.4.4.3. IP Encapsulation
        3.3.4.5. Spoke SDP Terminations
        3.3.4.6. SDP Ping
        3.3.4.7. SDP Keepalives
    3.4. Mobile Solutions
      3.4.1. HSDPA Offload
        3.4.1.1. Failure Detection
      3.4.2. Pure DSL Backhaul
        3.4.2.1. DSL Channel Bonding
    3.5. ETH-CFM (802.1ag and Y.1731)
      3.5.1. 802.1ag and Y.1731 Terminology
        3.5.1.1. MDs, MD Levels, MAs, and MEPs (802.1ag)
        3.5.1.2. MEG Levels, MEGs, and MEPs (Y.1731)
      3.5.2. ETH-CFM Frame Format
        3.5.2.1. ETH-CFM OAMPDU
        3.5.2.2. CFM Frame Processing
          3.5.2.2.1. Processing SAP 0 and SAP 0.* OAM Packets
        3.5.2.3. MEG-ID and ICC-Based Format
      3.5.3. ETH-CFM Functions and Tests
        3.5.3.1. ETH-CFM Ethernet OAM Tests
          3.5.3.1.1. Loopback (LB)
          3.5.3.1.2. Linktrace (LT)
          3.5.3.1.3. Throughput Measurement
          3.5.3.1.4. Continuity Check (CC)
          3.5.3.1.5. ETH-RDI
          3.5.3.1.6. ETH-AIS
          3.5.3.1.7. ETH-Test
      3.5.4. MEP Support (802.1ag and Y.1731)
        3.5.4.1. 802.1ag MEP Support on Ethernet SAPs
        3.5.4.2. 802.1ag MEP Support on Ethernet Spoke SDPs
        3.5.4.3. Y.1731 MEP Support on Ethernet SAPs
      3.5.5. Priority Mapping (802.1ag and Y.1731)
        3.5.5.1. Priority Mapping for SAP Up MEPs
        3.5.5.2. Priority Mapping for SAP Down MEPs
    3.6. QinQ Support
      3.6.1. Overview of QinQ
      3.6.2. QinQ Support with Forced C-Tag Forwarding (VPLS only)
        3.6.2.1. Example 1: General QinQ Implementation
        3.6.2.2. Example 2: QinQ using VPLS with Ethernet SAPs
        3.6.2.3. Example 3: QinQ Using VPLS with ATM SAPs
      3.6.3. QinQ Support on Ethernet Ports
        3.6.3.1. Special QinQ SAP Identifiers
        3.6.3.2. QinQ Dot1p Match Behavior
        3.6.3.3. QinQ Top-Only Mark Option
        3.6.3.4. Maximum Number of VLAN Tags
      3.6.4. QinQ Configuration Overview
    3.7. Raw Socket IP Transport Service
      3.7.1. Remote Host Manual TCP Connection Check
      3.7.2. QoS Requirements for IP Transport
    3.8. Service Creation Overview
    3.9. Port and SAP CLI Identifiers
      3.9.1. Reference Sources
    3.10. Configuring Global Service Entities with CLI
    3.11. Service Model Entities
    3.12. Basic Configuration
    3.13. Common Configuration Tasks
      3.13.1. Configuring Customer Accounts
      3.13.2. Configuring SDPs
        3.13.2.1. SDP Configuration Considerations
        3.13.2.2. Configuring an SDP
        3.13.2.3. Enabling IP Fragmentation for GRE SDPs
      3.13.3. Configuring Service Names
    3.14. ETH-CFM (802.1ag and Y.1731) Tasks
      3.14.1. Configuring ETH-CFM Parameters (802.1ag and Y.1731)
      3.14.2. Applying ETH-CFM Parameters
    3.15. Service Management Tasks
      3.15.1. Modifying Customer Accounts
      3.15.2. Deleting Customers
      3.15.3. Modifying SDPs
      3.15.4. Deleting SDPs
      3.15.5. Deleting LSP Associations
    3.16. Global Service Command Reference
      3.16.1. Command Hierarchies
        3.16.1.1. Global Service Configuration Commands
          3.16.1.1.1. Customer Commands
          3.16.1.1.2. SDP Commands
          3.16.1.1.3. SAP Commands
          3.16.1.1.4. ETH-CFM Commands
        3.16.1.2. Show Commands
      3.16.2. Command Descriptions
        3.16.2.1. Global Service Configuration Commands
          3.16.2.1.1. Generic Commands
          3.16.2.1.2. Customer Commands
          3.16.2.1.3. SDP Commands
          3.16.2.1.4. SDP Keepalive Commands
        3.16.2.2. Show Commands
  4. VLL Services
    4.1. ATM VLL (Apipe) Services
      4.1.1. ATM VLL for End-to-End ATM Service
      4.1.2. ATM Virtual Trunk Over an IP/MPLS Packet-Switched Network
      4.1.3. ATM SAP-to-SAP Service
      4.1.4. ATM Traffic Management Support
        4.1.4.1. Network Ingress Classification
        4.1.4.2. ATM Access Egress Queuing and Shaping
      4.1.5. Control Word
    4.2. Circuit Emulation VLL (Cpipe) Services
      4.2.1. Cpipe Service Overview
      4.2.2. TDM SAP-to-SAP Service
      4.2.3. Cpipe Service Modes
        4.2.3.1. Unstructured Mode (SAToP)
        4.2.3.2. Structured Mode (CESoPSN)
      4.2.4. TDM PW Encapsulation
      4.2.5. Circuit Emulation Parameters and Options
        4.2.5.1. Unstructured
        4.2.5.2. Structured DS1/E1 CES without CAS
        4.2.5.3. Structured T1/E1 CES with CAS
        4.2.5.4. Packet Payload Size
        4.2.5.5. Jitter Buffer
        4.2.5.6. Asymmetric Delay Control
        4.2.5.7. RTP Header
        4.2.5.8. Control Word
      4.2.6. Transparent SDH/SONET Over Packet (TSoP)
      4.2.7.  Error Situations
    4.3. Ethernet VLL (Epipe) Services
      4.3.1. Epipe Service Overview
      4.3.2. Ethernet Access Egress Queuing and Scheduling
      4.3.3. Ethernet SAP-to-SAP
      4.3.4. MEF 8
        4.3.4.1. Epipe Service Modes
      4.3.5. Ethernet OAM
      4.3.6. Control Word
      4.3.7. MTU
      4.3.8. Raw and Tagged Modes
        4.3.8.1. Raw Mode
        4.3.8.2. Tagged Mode
        4.3.8.3. VLAN Translation
        4.3.8.4. Tagging Rules for Epipe
      4.3.9. IP Filters (Epipe)
      4.3.10. MPLS Entropy Label
    4.4. Frame Relay VLL (Fpipe) Services
      4.4.1. Fpipe Service Overview
      4.4.2. FR SAP-to-SAP Service
      4.4.3. FR Traffic Management
        4.4.3.1. Ingress SAP Classification and Marking
      4.4.4. FR Encapsulation
        4.4.4.1. FR PW Control Word
      4.4.5. Status Signaling and OAM Propagation
    4.5. HDLC VLL (Hpipe) Services
      4.5.1. Hpipe Service Overview
      4.5.2. HDLC VLL for End-to-End HDLC Service
      4.5.3. HDLC SAP-to-SAP Service
      4.5.4. HDLC Encapsulation
        4.5.4.1. HDLC PW Control Word and Payload Size
      4.5.5. Status Signaling
        4.5.5.1. OAM Propagation
    4.6. IP Interworking VLL (Ipipe) Services
      4.6.1. Ipipe Service Overview
      4.6.2. IP Interworking VLL Datapath
      4.6.3. CE IP Address Discovery and Distribution
        4.6.3.1. Manual IP Configuration
        4.6.3.2. CE IP Address Discovery Using ARP
        4.6.3.3. CE IP Address Discovery for Frame Relay
        4.6.3.4. CE IP Address Discovery for cHDLC
        4.6.3.5. CE IP Address Discovery for PPP/MLPPP
        4.6.3.6. CE IP Address Distribution to Remote PE Nodes
      4.6.4. IP SAP-to-SAP Service
      4.6.5. Hardware Support for Interworking IP PWs
      4.6.6. Control Word
      4.6.7. Termination at Access
        4.6.7.1. PPP and MLPPP Termination
        4.6.7.2. FR Termination
        4.6.7.3. cHDLC Termination
        4.6.7.4. PPP and MLPPP Termination on 2-port OC3/STM1 Channelized Adapter Cards
      4.6.8. Traffic Management
        4.6.8.1. Traffic Management for FR IW SAPs
      4.6.9. Status Signaling
        4.6.9.1. FR LMI
      4.6.10. IP Filters (Ipipe)
    4.7. Pseudowire Switching
      4.7.1. Overview
      4.7.2. Pseudowire Switching with Pseudowire Redundancy
      4.7.3. Pseudowire Switching Behavior
        4.7.3.1. Pseudowire Switching With IP Tunnels
      4.7.4. Pseudowire Switching TLV
    4.8. VLL Service Considerations
      4.8.1. Service Support
      4.8.2. SDPs
        4.8.2.1. SDP Statistics for VLL Services
      4.8.3. SAP Encapsulations and Pseudowire Types
      4.8.4. ATM PWE3 N-to-1 Cell Mode Encapsulation
        4.8.4.1. N-to-1 Cell Mode Encapsulation (N = 1)
          4.8.4.1.1. Deployment Scenario for N = 1 Cell Mode Encapsulation
          4.8.4.1.2. VPI/VCI Translation (N = 1)
          4.8.4.1.3. Cell Concatenation (N = 1)
          4.8.4.1.4. QoS and Traffic Descriptor Profiles (N = 1)
          4.8.4.1.5. OAM (N = 1)
        4.8.4.2. N-to-1 Cell Mode Encapsulation (N > 1)
          4.8.4.2.1. Deployment Scenario for N > 1 Cell Mode Encapsulation
          4.8.4.2.2. PW Optimization (N > 1)
          4.8.4.2.3. Overhead Optimization (N > 1)
          4.8.4.2.4. Cell Concatenation (N > 1)
          4.8.4.2.5. OAM (N > 1)
          4.8.4.2.6. Hardware Support for N > 1 Cell Mode Encapsulation
          4.8.4.2.7. SAP Support for N > 1
      4.8.5. SAP Aggregation Groups
        4.8.5.1. Configuration
          4.8.5.1.1. Sap-aggregation-group Keyword
          4.8.5.1.2. Sap-aggregation-group Group Identifier
          4.8.5.1.3. VPI/VCI Translation for SAP Aggregation Group Members (N>1)
        4.8.5.2. QoS and Traffic Descriptor Profiles (N > 1)
        4.8.5.3. Statistics and Counters
        4.8.5.4. Fault Management
      4.8.6. QoS Policies
      4.8.7. IP Filter Policies
      4.8.8. MTU Settings
        4.8.8.1. Targeted LDP and MTU
      4.8.9. QinQ (VLL Service)
      4.8.10. Pseudowire Control Word
      4.8.11. Pseudowire Redundancy
        4.8.11.1. PW Redundancy Operation
        4.8.11.2. Selecting the Active Spoke SDP for PW Redundancy Configuration
          4.8.11.2.1. Primary and Secondary Spoke SDPs
          4.8.11.2.2. Secondary Spoke SDPs Only
        4.8.11.3. PW Redundancy and Inter-Chassis Backup
        4.8.11.4. AIS Fault Propagation
      4.8.12. Active/Standby Mode for Pseudowire Redundancy (Standby Signaling)
        4.8.12.1. PW Status Signaling Label Withdrawal Option
          4.8.12.1.1. Interoperation with PEs that do not Support the PW Forwarding Standby Bit
          4.8.12.1.2. Multiple Remote PEs Connected to an r-VPLS Instance Via Spoke-SDP Termination
        4.8.12.2. Pseudowire Redundancy on Serial Data Interface Ports
    4.9. Configuring a VLL Service with CLI
    4.10. Common Configuration Tasks
    4.11. Configuring VLL Components
      4.11.1. Creating an Apipe Service
        4.11.1.1. Configuring Apipe SAP Parameters
        4.11.1.2. Configuring Apipe SDP Bindings
        4.11.1.3. Configuring Apipe SAP Aggregation Groups
        4.11.1.4. Configuring Apipe SAPs as Aggregation Group Members
      4.11.2. Creating a Cpipe Service
        4.11.2.1. Configuring Cpipe SAP Parameters
        4.11.2.2. Configuring Cpipe SDP Bindings
      4.11.3. Creating an Epipe Service
        4.11.3.1. Configuring Epipe SAP Parameters
        4.11.3.2. Configuring Epipe SAP MEF 8 Parameters
        4.11.3.3. Configuring Epipe SAP Microwave Link Parameters for Interworking with TDM2Ethernet
        4.11.3.4. Configuring ATM Encapsulation Under Epipe Service (7705 SAR-M only)
        4.11.3.5. Configuring Epipe Spoke SDP Bindings
      4.11.4. Creating an Fpipe Service
        4.11.4.1. Configuring Fpipe SAP Parameters
        4.11.4.2. Configuring Fpipe SDP Bindings
      4.11.5. Creating an Hpipe Service
        4.11.5.1. Configuring Hpipe SAP Parameters
        4.11.5.2. Configuring Hpipe SDP Bindings
      4.11.6. Creating an Ipipe Service
        4.11.6.1. Configuring Ipipe SAP Parameters
        4.11.6.2. Configuring Ipipe SDP Bindings
      4.11.7. Configuring PW Switching
      4.11.8. Configuring Ingress and Egress SAP Parameters
      4.11.9. Using the Control Word
      4.11.10. Configuring PW Redundancy
        4.11.10.1. Configuring PW Redundancy—Standby Signaling
        4.11.10.2. Configuring PW Redundancy—ICB
    4.12. Service Management Tasks
      4.12.1. Modifying Service Parameters
      4.12.2. Disabling a Service
      4.12.3. Re-enabling a Service
      4.12.4. Deleting a Service
    4.13. VLL Services Command Reference
      4.13.1. Command Hierarchies
        4.13.1.1. VLL Services Configuration Commands
          4.13.1.1.1. Apipe Service Configuration Commands
          4.13.1.1.2. Apipe Service with SAP Aggregation Configuration Commands
          4.13.1.1.3. Cpipe Service Configuration Commands
          4.13.1.1.4. Epipe Service Configuration Commands
          4.13.1.1.5. Fpipe Service Configuration Commands
          4.13.1.1.6. Hpipe Service Configuration Commands
          4.13.1.1.7. Ipipe Service Configuration Commands
        4.13.1.2. Show Commands
        4.13.1.3. Clear Commands
      4.13.2. Command Descriptions
        4.13.2.1. VLL Service Configuration Commands
          4.13.2.1.1. Generic Commands
          4.13.2.1.2. VLL Global Commands
          4.13.2.1.3. VLL SAP Commands
          4.13.2.1.4. SAP Aggregation Group Commands
          4.13.2.1.5. SAP cem Commands
          4.13.2.1.6. SAP QoS and IP Filter Policy Commands
          4.13.2.1.7. SAP Microwave Link Commands
          4.13.2.1.8. Service Billing Commands
          4.13.2.1.9. VLL SDP Commands
          4.13.2.1.10. SDP Cell Concatenation Commands
          4.13.2.1.11. ATM Commands
          4.13.2.1.12. ATM OAM Commands
        4.13.2.2. Show Commands
        4.13.2.3. Clear Commands
  5. VPLS
    5.1. VPLS Overview
      5.1.1. VPLS Packet Walkthrough
      5.1.2. Bridged Mobile Backhaul
      5.1.3. Multi-Tenant Unit (MTU) Termination
    5.2. VPLS Features
      5.2.1. VPLS Enhancements
      5.2.2. Fabric Mode
      5.2.3. Subscriber VLAN
      5.2.4. ATM Encapsulated Residential SAP
      5.2.5. VPLS over MPLS
      5.2.6. VPLS MAC Learning and Packet Forwarding
      5.2.7. Pseudowire Control Word
      5.2.8. Agent Circuit ID Insertion
      5.2.9. MAC Filters
      5.2.10. FDB Table Management
        5.2.10.1. FDB Size
        5.2.10.2. FDB Size Alarms
        5.2.10.3. Local and Remote Aging Timers
          5.2.10.3.1. Disable MAC Aging
          5.2.10.3.2. Disable MAC Learning
        5.2.10.4. Unknown MAC Discard
      5.2.11. VPLS and Rate Limiting Via QoS Policy
      5.2.12. MAC Move
      5.2.13. Split Horizon Groups (SAP and Spoke SDP)
        5.2.13.1. Residential Split Horizon Groups
      5.2.14. Multicast for VPLS and Routed VPLS (IGMP and MLD Snooping)
        5.2.14.1. Application Examples
        5.2.14.2. Group and Addressing Support
          5.2.14.2.1. IPv4 Multicast Support
          5.2.14.2.2. IPv6 Layer 2 Multicast Support and Group Address
        5.2.14.3. IP Multicast in r-VPLS
          5.2.14.3.1. IPv6 Multicast Forwarding Behavior in r-VPLS
        5.2.14.4. Multicast Router Ports
        5.2.14.5. Tagged Access Traffic
        5.2.14.6. Hardware Support
      5.2.15. PIM Snooping for VPLS
        5.2.15.1. Snooping versus Proxy Mode
      5.2.16. MPLS Entropy Label
    5.3. Routed VPLS
      5.3.1. IES or VPRN IP Interface Binding
        5.3.1.1. Assigning a Service Name to a VPLS Service
        5.3.1.2. Binding a Service Name to an IP Interface
        5.3.1.3. Removing a Bound VPLS Service or Service Name
        5.3.1.4. IP Interface and VPLS Operational State Coordination
      5.3.2. IP Interface MTU and Fragmentation
      5.3.3. ARP/ND and VPLS FIB Interactions
        5.3.3.1. Routed VPLS Specific ARP/ND Cache Behavior
      5.3.4. The allow-ip-int-binding VPLS Flag
        5.3.4.1. VPLS Feature Restrictions (due to allow-ip-int-binding)
      5.3.5. DSCP Marking
      5.3.6. VPLS Ingress IP Filter Override
      5.3.7. Routed VPLS Supported Routing-Related Protocols
    5.4. VPLS and Spanning Tree Protocol
      5.4.1. VPLS Redundancy
        5.4.1.1. Spoke SDP Redundancy for Metro Interconnection
        5.4.1.2. Spoke SDP-Based Redundant Access
      5.4.2. VPLS Access Redundancy
        5.4.2.1. STP-Based Redundant Access to VPLS
      5.4.3. MAC Flush Message Processing
        5.4.3.1. Dual Homing to a VPLS Service
    5.5. ATM PVC Access and Termination on a VPLS Service
    5.6. VPLS Service Considerations
      5.6.1. SAP Encapsulations
      5.6.2. VLAN Processing
        5.6.2.1. Tagging Rules for VPLS
      5.6.3. QinQ (VPLS)
    5.7. Configuration Notes
      5.7.1. Reference Sources
    5.8. Configuring a VPLS Service with CLI
    5.9. Basic Configuration
    5.10. Common Configuration Tasks
    5.11. Configuring VPLS Components
      5.11.1. Creating a VPLS Service
      5.11.2. Creating a Split Horizon Group
      5.11.3. Enabling MAC Move
      5.11.4. Configuring STP Bridge Parameters in a VPLS
        5.11.4.1. Bridge STP Admin State
        5.11.4.2. Mode
        5.11.4.3. Bridge Priority
        5.11.4.4. Hello Time
        5.11.4.5. Hold Count
    5.12. Configuring a VPLS SAP
      5.12.1. Local VPLS SAPs
      5.12.2. Distributed VPLS SAPs
      5.12.3. Configuring SAP-Specific STP Parameters
        5.12.3.1. SAP STP Administrative State
        5.12.3.2. SAP Virtual Port Number
        5.12.3.3. SAP Priority
        5.12.3.4. SAP Path Cost
        5.12.3.5. SAP Edge Port
        5.12.3.6. SAP Auto Edge
        5.12.3.7. SAP Link Type
      5.12.4. STP SAP Operational States
        5.12.4.1. Operationally Disabled
        5.12.4.2. Operationally Discarding
        5.12.4.3. Operationally Learning
        5.12.4.4. Operationally Forwarding
      5.12.5. Configuring VPLS SAPs with Split Horizon
    5.13. Configuring SDP Bindings
      5.13.1. Configuring Mesh SDP Bindings
      5.13.2. Configuring Spoke SDP
        5.13.2.1. Configuring Spoke SDP Binding
        5.13.2.2. Configuring Spoke SDP-Specific STP Parameters
          5.13.2.2.1. Spoke SDP STP Administrative State
          5.13.2.2.2. Spoke SDP Virtual Port Number
          5.13.2.2.3. Spoke SDP Priority
          5.13.2.2.4. Spoke SDP Path Cost
          5.13.2.2.5. Spoke SDP Edge Port
          5.13.2.2.6. Spoke SDP Auto Edge
          5.13.2.2.7. Spoke SDP Link Type
      5.13.3. Configuring VPLS Spoke SDPs with Split Horizon
      5.13.4. Configuring Selective MAC Flush
    5.14. Configuring Routed VPLS
    5.15. Configuring IP Multicast in VPLS
    5.16. Configuring IP Multicast in r-VPLS
    5.17. Configuring Multicast Parameters for VPLS and r-VPLS
    5.18. Configuring a Static Multicast Group
    5.19. Configuring PIM Snooping for VPLS
    5.20. Service Management Tasks
      5.20.1. Modifying VPLS Service Parameters
      5.20.2. Modifying Management VPLS Parameters
      5.20.3. Deleting a Management VPLS
      5.20.4. Disabling a Management VPLS
      5.20.5. Deleting a VPLS Service
      5.20.6. Disabling a VPLS Service
      5.20.7. Re-enabling a VPLS Service
    5.21. VPLS Command Reference
      5.21.1. Command Hierarchies
        5.21.1.1. VPLS Service Configuration Commands
          5.21.1.1.1. Global Commands
          5.21.1.1.2. SAP Commands
          5.21.1.1.3. Mesh SDP Commands
          5.21.1.1.4. Spoke SDP Commands
          5.21.1.1.5. Routed VPLS Commands
        5.21.1.2. Show Commands
        5.21.1.3. Clear Commands
        5.21.1.4. Debug Commands
      5.21.2. Command Descriptions
        5.21.2.1. VPLS Service Configuration Commands
          5.21.2.1.1. Generic Commands
          5.21.2.1.2. VPLS Service Commands
          5.21.2.1.3. VPLS SAP Commands
          5.21.2.1.4. VPLS SAP ATM Commands
          5.21.2.1.5. VPLS IGMP and MLD Snooping Commands
          5.21.2.1.6. VPLS STP Commands
          5.21.2.1.7. VPLS Filter and QoS Policy Commands
          5.21.2.1.8. Service Billing Commands
          5.21.2.1.9. VPLS SAP DHCP Commands
          5.21.2.1.10. VPLS SDP Commands
        5.21.2.2. Routed VPLS Configuration Commands
        5.21.2.3. VPLS Show Commands
        5.21.2.4. VPLS Clear Commands
        5.21.2.5. VPLS Debug Commands
  6. Internet Enhanced Service
    6.1. IES for In-band Management
      6.1.1. Setting Up Connections Between the NSP NFM-P and the 7705 SAR
      6.1.2. Encapsulation
      6.1.3. Layer 2 and Layer 3 Traffic Management
      6.1.4. Troubleshooting and Fault Detection Services
      6.1.5. IP ECMP Load Balancing
    6.2. IES for Customer Traffic
      6.2.1. DHCP Relay and DHCPv6 Relay
        6.2.1.1. DHCP Relay
          6.2.1.1.1. DHCP Options
        6.2.1.2. DHCPv6 Relay
          6.2.1.2.1. DHCPv6 Options
      6.2.2. IPCP
      6.2.3. IPSec Support
      6.2.4. Security Zones and IES
      6.2.5. Proxy ARP
      6.2.6. Configurable ARP Retry Timer
      6.2.7. Unnumbered Interfaces
      6.2.8. Troubleshooting and Fault Detection Services
      6.2.9. VRRP on IES Interfaces
      6.2.10. SAPs
        6.2.10.1. Encapsulations
        6.2.10.2. Routing Protocols
        6.2.10.3. QoS Policies
        6.2.10.4. QinQ (IES)
        6.2.10.5. IP Filter Policies on an IES SAP
      6.2.11. Spoke SDP Termination to IES
      6.2.12. Bandwidth Optimization for Low-speed Links
        6.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
    6.3. Configuring IES with CLI
    6.4. Common Configuration Tasks
    6.5. Configuring IES Components
      6.5.1. Creating an IES Service
      6.5.2. Configuring Interface Parameters
        6.5.2.1. IES Management Service
        6.5.2.2. IES Service
        6.5.2.3. IES IPv6 Service
      6.5.3. Configuring IES SAP Parameters
        6.5.3.1. IES Management SAP
        6.5.3.2. IES Service SAP
      6.5.4. Configuring IES Spoke SDP Parameters
      6.5.5. Configuring VRRP
      6.5.6. Configuring a Security Zone Within IES
      6.5.7. Configuring Serial Raw Socket Transport Within IES
    6.6. Service Management Tasks
      6.6.1. Modifying IES Service Parameters
      6.6.2. Disabling an IES Service
      6.6.3. Re-enabling an IES Service
      6.6.4. Deleting an IES Service
    6.7. IES Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Configuration Commands
          6.7.1.1.1. IES Management Configuration Commands
          6.7.1.1.2. IES Service Configuration Commands
          6.7.1.1.3. Routed VPLS Commands
          6.7.1.1.4. VRRP Commands
          6.7.1.1.5. IES Security Zone Configuration Commands
          6.7.1.1.6. IES Raw Socket IP Transport Configuration Commands
        6.7.1.2. Show Commands
        6.7.1.3. Clear Commands
        6.7.1.4. Debug Commands
      6.7.2. Command Descriptions
        6.7.2.1. IES Management Configuration Commands
          6.7.2.1.1. Generic Commands
          6.7.2.1.2. IES Global Commands
          6.7.2.1.3. IES Management Interface Commands
          6.7.2.1.4. IES Management SAP Commands
        6.7.2.2. IES Service Configuration Commands
          6.7.2.2.1. IES Service Interface Commands
          6.7.2.2.2. IES Service IPv6 Commands
          6.7.2.2.3. IES Service VRRP Commands
          6.7.2.2.4. IES Service SAP Commands
          6.7.2.2.5. IES Service Spoke SDP Commands
          6.7.2.2.6. Routed VPLS Commands
          6.7.2.2.7. IES Service Security Zone Configuration Commands
          6.7.2.2.8. IES Raw Socket IP Transport Configuration Commands
        6.7.2.3. Show Commands
        6.7.2.4. Clear Commands
        6.7.2.5. Debug Commands
  7. VPRN Services
    7.1. VPRN Service Overview
      7.1.1. Routing Prerequisites
      7.1.2. BGP Support
        7.1.2.1. BGP Fast Reroute with Prefix-Independent Convergence in a VPRN
      7.1.3. IPSec Support
      7.1.4. Security Zones and VPRN
      7.1.5. Route Distinguishers
        7.1.5.1. PE-to-CE Route Exchange
          7.1.5.1.1. Route Redistribution
          7.1.5.1.2. CPE Connectivity Check
      7.1.6. Route Target Constraint
        7.1.6.1. Configuring the Route Target Address Family
        7.1.6.2. Originating RTC Routes
        7.1.6.3. Receiving and Readvertising RTC Routes
        7.1.6.4. Using RTC Routes
      7.1.7. In-Band Management using a VPRN
    7.2. VPRN Features
      7.2.1. IP Interfaces
        7.2.1.1. Unnumbered Interfaces
        7.2.1.2. DHCP and DHCPv6
          7.2.1.2.1. DHCP Relay and DHCPv6 Relay
          7.2.1.2.2. Local DHCP and DHCPv6 Server
        7.2.1.3. IPCP
        7.2.1.4. Troubleshooting and Fault Detection Services
        7.2.1.5. VRRP on VPRN Interfaces
        7.2.1.6. IP ECMP Load Balancing
        7.2.1.7. Proxy ARP
        7.2.1.8. Configurable ARP Retry Timer
      7.2.2. SAPs
        7.2.2.1. Encapsulations
        7.2.2.2. QoS Policies
          7.2.2.2.1. CoS Marking for Self-generated Traffic
        7.2.2.3. QinQ (VPRN)
        7.2.2.4. Filter Policies on a VPRN SAP
      7.2.3. PE-to-CE Routing Protocols
        7.2.3.1. Using OSPF or OSPFv3 in IP VPNs
          7.2.3.1.1. DN Bit
        7.2.3.2. TTL Security
      7.2.4. PE-to-PE Tunneling Mechanisms
      7.2.5. Per-VRF Route Limiting
      7.2.6. RIP Metric Propagation in VPRNs
      7.2.7. Multicast VPN (MVPN)
        7.2.7.1. Multicast in IP-VPN Applications
        7.2.7.2. MVPN Building Blocks
          7.2.7.2.1. PMSI
          7.2.7.2.2. MVPN Using BGP Control Plane
          7.2.7.2.3. Auto-Discovery
          7.2.7.2.4. PE-CE Multicast Protocols and Services
          7.2.7.2.5. PE-PE Transmission of C-Multicast Routing Using BGP
          7.2.7.2.6. PE-PE Multicast Protocols
          7.2.7.2.7. PE-PE Multicast Data Transmission
        7.2.7.3. Provider Tunnel Support
          7.2.7.3.1. Point-to-Multipoint I-PMSI and S-PMSI
          7.2.7.3.2. Point-to-Multipoint LDP I-PMSI and S-PMSI
          7.2.7.3.3. Point-to-Multipoint LSP S-PMSI
          7.2.7.3.4. MVPN Sender-only and Receiver-only
        7.2.7.4. Inter-AS and Intra-AS Solutions
          7.2.7.4.1. 7705 SAR as Source of Non-Segmented Inter-AS or Intra-AS Network
        7.2.7.5. Mrinfo and Mtrace
        7.2.7.6. Multicast-only Fast Reroute (MoFRR)
        7.2.7.7. mLDP Point-to-Multipoint Support
        7.2.7.8. mLDP Fast Upstream Switchover
      7.2.8. Spoke SDPs
      7.2.9. Spoke SDP Termination to VPRN
      7.2.10. IPv6 on Virtual Private Edge Router
      7.2.11. IPv6 over IPv4 LAN-to-LAN IPSec tunnels
      7.2.12. Bandwidth Optimization for Low-speed Links
        7.2.12.1. OAM Diagnostics Restrictions with Lower IP MTU
    7.3. Configuring a VPRN Service with CLI
    7.4. Basic Configuration
    7.5. Common Configuration Tasks
    7.6. Configuring VPRN Components
      7.6.1. Creating a VPRN Service
      7.6.2. Configuring Global VPRN Parameters
      7.6.3. Configuring Router Interfaces
      7.6.4. Configuring BGP for VPRN
        7.6.4.1. Configuring VPRN BGP Group and Neighbor Parameters
        7.6.4.2. Configuring Route Reflection
        7.6.4.3. VPRN BGP CLI Syntax
      7.6.5. Configuring IPv6 Parameters for VPRN BGP
      7.6.6. Configuring VPRN IPv6 Neighbor Discovery Parameters
      7.6.7. Configuring OSPF or OSPFv3 for VPRN
      7.6.8. Configuring RIP for VPRN
      7.6.9. Configuring IGMP for VPRN
      7.6.10. Configuring PIM for VPRN
      7.6.11. Configuring MVPN for VPRN
      7.6.12. Configuring a VPRN Interface
      7.6.13. Configuring a VPRN IPv6 Interface
      7.6.14. Configuring VPRN Interface Routed VPLS IPv6 Parameters
      7.6.15. Configuring VPRN Interface SAP Parameters
      7.6.16. Configuring VPRN Interface SAP IPv6 Parameters
      7.6.17. Configuring VPRN Interface Spoke SDP Parameters
      7.6.18. Configuring VPRN Interface Spoke SDP IPv6 Parameters
      7.6.19. Configuring VRRP
      7.6.20. Configuring a Security Zone Within a VPRN
      7.6.21. Configuring Serial Raw Socket Transport Within VPRN
      7.6.22. Configuring VPRN Router Advertisement
    7.7. Service Management Tasks
      7.7.1. Modifying VPRN Service Parameters
      7.7.2. Deleting a VPRN Service
      7.7.3. Disabling a VPRN Service
      7.7.4. Re-enabling a VPRN Service
    7.8. VPRN Services Command Reference
      7.8.1. Command Hierarchies
        7.8.1.1. Configuration Commands
          7.8.1.1.1. VPRN Service Configuration Commands
          7.8.1.1.2. BGP Commands
          7.8.1.1.3. OSPF Commands
          7.8.1.1.4. OSPFv3 Commands
          7.8.1.1.5. IGMP Commands
          7.8.1.1.6. PIM Commands
          7.8.1.1.7. RIP Commands
          7.8.1.1.8. VPRN Security Zone Configuration Commands
          7.8.1.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.1.1.10. Multicast VPN Commands
          7.8.1.1.11. Router Advertisement Commands
          7.8.1.1.12. Local DHCP and DHCPv6 Server Commands
          7.8.1.1.13. Interface Commands
          7.8.1.1.14. IPv6 Interface Commands
          7.8.1.1.15. Interface DHCP Commands
          7.8.1.1.16. Interface ICMP Commands
          7.8.1.1.17. Interface SAP IPSec-Tunnel Commands
          7.8.1.1.18. Routed VPLS Commands
          7.8.1.1.19. Interface VRRP Commands
          7.8.1.1.20. TWAMP Light Commands
        7.8.1.2. Show Commands
        7.8.1.3. Clear Commands
        7.8.1.4. Debug Commands
      7.8.2. Command Descriptions
        7.8.2.1. VPRN Service Configuration Commands
          7.8.2.1.1. Generic Commands
          7.8.2.1.2. Global Commands
          7.8.2.1.3. BGP Commands
          7.8.2.1.4. OSPF and OSPFv3 Commands
          7.8.2.1.5. IGMP Commands
          7.8.2.1.6. PIM Commands
          7.8.2.1.7. RIP Commands
          7.8.2.1.8. VPRN Security Configuration Commands
          7.8.2.1.9. VPRN Raw Socket IP Transport Configuration Commands
          7.8.2.1.10. Multicast VPN Commands
          7.8.2.1.11. Router Advertisement Commands
          7.8.2.1.12. Local DHCP and DHCPv6 Server Commands
          7.8.2.1.13. Interface Commands
          7.8.2.1.14. IPv6 Interface Commands
          7.8.2.1.15. Interface DHCP Commands
          7.8.2.1.16. Interface ICMP Commands
          7.8.2.1.17. Interface SAP Commands
          7.8.2.1.18. Interface Spoke SDP Commands
          7.8.2.1.19. Routed VPLS Commands
          7.8.2.1.20. Interface VRRP Commands
          7.8.2.1.21. TWAMP Light Commands
        7.8.2.2. Show Service Commands
        7.8.2.3. Show Router Commands
        7.8.2.4. Clear Service Commands
        7.8.2.5. Debug Service Commands
  8. IPSec
    8.1. IPSec Overview
      8.1.1. IPSec Implementation
        8.1.1.1. IPSec Overview
        8.1.1.2. Hardware Support
        8.1.1.3. IPSec Encryption Features
        8.1.1.4. SHA2 Support
        8.1.1.5. IPSec Security Policy, IKE Policy, and IPSec Transform
        8.1.1.6. Tunnel Group
        8.1.1.7. Tunnel Interfaces and SAPs
          8.1.1.7.1. Public Tunnel SAPs
          8.1.1.7.2. Private Tunnel SAPs
          8.1.1.7.3. IP Interface Configuration
        8.1.1.8. IPSec Tunnel Configuration
        8.1.1.9. IPSec over MPLS
        8.1.1.10. GRE-Encapsulated VLLs/VPLS over IPSec VPNs
        8.1.1.11. GRE-Encapsulated VLLs/VPLS over IPSec over MPLS
          8.1.1.11.1. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 Label Routes) Solution 1: Changing BGP Signaling to Loopback Interface
          8.1.1.11.2. VLLs/VPLS over IPSec over MPLS (Using BGP 3107 label Routes) Solution 2: GRE to Local Interface on 7705 SAR
          8.1.1.11.3. VLLs/VPLS over IPSec over MPLS (Using IGP Shortcuts)
      8.1.2. X.509v3 Certificate Overview
        8.1.2.1. X.509v3 Certificate Support on the 7705 SAR
        8.1.2.2. Local Storage
        8.1.2.3. CA Profile
        8.1.2.4. CA Chain Computation
        8.1.2.5. Certificate Enrollment
        8.1.2.6. Certificate Revocation Check
        8.1.2.7. Certificate, CRL, and Key Cache
      8.1.3. Using Certificates For IPSec Tunnel Authentication
      8.1.4. Trust Anchor Profile
      8.1.5. Certificate Profile
      8.1.6. Certificate Management Protocol Version 2 (CMPv2)
      8.1.7. OCSP
      8.1.8. Applications
        8.1.8.1. Metrocell Deployment
        8.1.8.2. Small Business Deployment
      8.1.9. NAT-Traversal for IKEv1/v2 and IPSec
      8.1.10. BFD over IPSec Tunnel
      8.1.11. QoS for IPSec
        8.1.11.1. Network and Access Ingress QoS (Decryption QoS)
          8.1.11.1.1. Network Ingress QoS Tunnel Override
        8.1.11.2. Network and Access Egress QoS (Encryption QoS)
      8.1.12. Fragmentation and IP MTU
        8.1.12.1. Fragmentation Configuration
        8.1.12.2. Reassembly
      8.1.13. Support for Private VPRN Service Features
      8.1.14. Routing in Private Services
      8.1.15. IPSec on the 10-port 1GigE/1-port 10GigE X-Adapter Card
      8.1.16. IPSec Sequence Number
      8.1.17. PBR and MFC
        8.1.17.1. PBR
        8.1.17.2. MFC
      8.1.18. OSPFv3 Packet Authentication with IPv6 IPSec
      8.1.19. Statistics
      8.1.20. Security Support
    8.2. Public Key Infrastructure (PKI)
      8.2.1. CA Role in PKI
      8.2.2. Digital Signature and Certificates
        8.2.2.1. Certificates
          8.2.2.1.1. Vendor Certificate Signature by the Root CA
          8.2.2.1.2. Vendor Certificate Authentication by a Peer
          8.2.2.1.3. Example of PKI Operation
          8.2.2.1.4. Certificate Chain
      8.2.3. Certificate Storage
      8.2.4. CMPv2 Certificate Management
        8.2.4.1. CMPv2 Initial Registration
        8.2.4.2. Key Update
        8.2.4.3. CRL
      8.2.5. OCSP
    8.3. Best Practices Recommendations
      8.3.1. IPSec Best Practices
    8.4. Configuration Notes
      8.4.1. Reference Sources
    8.5. Configuring IPSec with CLI
    8.6. Basic Configuration Overview
    8.7. Common Configuration Tasks
      8.7.1. Configuring an IPSec Tunnel Group
      8.7.2. Configuring Router Interfaces for IPSec
      8.7.3. Configuring IPSec Parameters
      8.7.4. Configuring IPSec and IPSec Tunnels in Services
      8.7.5. Configuring IPSec IPv6 Parameters for a VPRN Service
      8.7.6. Configuring X.509v3 Certificate Parameters
      8.7.7. Configuring CMPv2
      8.7.8. Configuring OCSP
    8.8. Configuring IPSec over MPLS
      8.8.1. IPSec over BGP 3107 Label Route
        8.8.1.1. Static LAN-to-LAN Tunnel Configuration
        8.8.1.2. Policy Option Configuration
        8.8.1.3. BGP Configuration with BGP 3107 Label Route Advertisement
        8.8.1.4. LDP or RSVP-TE Tunnel Configuration
      8.8.2. IPSec over IGP Shortcut
        8.8.2.1. Static LAN-to-LAN Tunnel Configuration
        8.8.2.2. IGP Shortcut Configuration
        8.8.2.3. RSVP-TE LSP Configuration
    8.9. Service Management Tasks
      8.9.1. Deleting an IPSec IKE Policy or an IPSec Transform
      8.9.2. Deleting a Public IPSec Tunnel SAP and Interface
      8.9.3. Deleting a Private IPSec Tunnel SAP and Interface
      8.9.4. Deleting an IPSec Security Policy
      8.9.5. Deleting an IPSec Tunnel
    8.10. IPSec Command Reference
      8.10.1. Command Hierarchies
        8.10.1.1. IPSec Configuration Commands
          8.10.1.1.1. ISA Tunnel Commands
          8.10.1.1.2. IPSec Commands
          8.10.1.1.3. Service Configuration Commands
          8.10.1.1.4. Service Interface Tunnel Commands
          8.10.1.1.5. Service Static Route Commands
        8.10.1.2. PKI Configuration Commands
          8.10.1.2.1. X.509 and Certificate Commands
          8.10.1.2.2. PKI Infrastructure Commands
          8.10.1.2.3. IPSec PKI Commands
          8.10.1.2.4. IKE PKI Commands
        8.10.1.3. Show Commands
        8.10.1.4. Clear Commands
        8.10.1.5. Debug Commands
      8.10.2. Command Descriptions
        8.10.2.1. IPSec Configuration Commands
          8.10.2.1.1. Generic Commands
          8.10.2.1.2. ISA Tunnel Commands
          8.10.2.1.3. Internet Key Exchange (IKE) and Transform Commands
          8.10.2.1.4. Service Configuration Commands
          8.10.2.1.5. Service Interface Tunnel Commands
        8.10.2.2. PKI Configuration Commands
          8.10.2.2.1. X.509 and Certificate Commands
          8.10.2.2.2. PKI Infrastructure Commands
          8.10.2.2.3. IPSec PKI Commands
          8.10.2.2.4. IKE PKI Commands
        8.10.2.3. Show Commands
        8.10.2.4. Clear Commands
        8.10.2.5. Debug Commands
  9. Network Group Encryption
    9.1. NGE Overview
      9.1.1. NGE Key Groups and Encryption Partitions
      9.1.2. NGE Domains
        9.1.2.1. Private IP/MPLS Network NGE Domain
        9.1.2.2. Private Over Intermediary Network NGE Domain
      9.1.3. Network Services Platform Management
    9.2. Key Groups
      9.2.1. Key Group Algorithms
        9.2.1.1. Encapsulating Security Payload (ESP)
      9.2.2. Security Associations (SAs)
        9.2.2.1. Active Outbound SA
    9.3. Services Encryption
      9.3.1. Services Encryption Overview
      9.3.2. Assigning Key Groups to Services
      9.3.3. Pseudowire Switching for NGE Traffic
      9.3.4. Pseudowire Control Word for NGE Traffic
      9.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
      9.3.6. NGE and RFC 3107
    9.4. Router Interface Encryption
      9.4.1. Router Interface NGE Domain Concepts
      9.4.2. GRE-MPLS Packets Inside the NGE Domain
      9.4.3. Router Encryption Exceptions using ACLs
      9.4.4. IPSec Packets Crossing an NGE Domain
      9.4.5. Multicast Packets Traversing the NGE Domain
      9.4.6. Assigning Key Groups to Router Interfaces
      9.4.7. Router Interface NGE Firewall Considerations
      9.4.8. NGE and BFD Support
      9.4.9. NGE and ACL Interactions
      9.4.10. Router Interface NGE and ICMP Interactions Over the NGE Domain
      9.4.11. OAM Considerations for Router Interface Encryption
    9.5. Layer 2 Encryption
    9.6. NGE Packet Overhead and MTU Considerations
    9.7. 1588v2 Encryption With NGE
    9.8. QoS for NGE Traffic
      9.8.1. Network Ingress
      9.8.2. Network Egress
    9.9. Statistics
    9.10. Remote Network Monitoring (RMON) Support
    9.11. Configuration Notes
      9.11.1. Reference Sources
    9.12. Configuring NGE with the CLI
    9.13. Basic NGE Configuration Overview
    9.14. Configuring NGE Components
      9.14.1. Configuring the Global Encryption Label
      9.14.2. Configuring a Key Group
      9.14.3. Assigning a Key Group to an SDP or VPRN Service
      9.14.4. Assigning a Key Group to a Router Interface
      9.14.5. Assigning a Key Group to an Ethernet Port
    9.15. NGE Management Tasks
      9.15.1. Modifying a Key Group
      9.15.2. Removing a Key Group
        9.15.2.1. Removing a Key Group from an SDP or VPRN Service
        9.15.2.2. Removing a Key Group from a Router Interface
        9.15.2.3. Removing a Key Group from an Ethernet Port
      9.15.3. Changing Key Groups
        9.15.3.1. Changing the Key Group for an SDP or VPRN Service
        9.15.3.2. Changing the Key Group for a Router Interface
        9.15.3.3. Changing the Key Group for an Ethernet Port
      9.15.4. Deleting a Key Group from a 7705 SAR
    9.16. NGE Command Reference
      9.16.1. Command Hierarchies
        9.16.1.1. Configuration Commands
          9.16.1.1.1. NGE Commands
          9.16.1.1.2. Services Commands
          9.16.1.1.3. Router Interface Encryption Commands
          9.16.1.1.4. Ethernet Port Encryption Commands
        9.16.1.2. Show Commands
        9.16.1.3. Clear Commands
      9.16.2. Command Descriptions
        9.16.2.1. Configuration Commands
          9.16.2.1.1. Generic Commands
          9.16.2.1.2. Group Encryption Commands
        9.16.2.2. Show Commands
        9.16.2.3. Clear Commands
  10. List of Acronyms
  11. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR System Management Guide R8.0.R7
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR System Management Configuration Process
  3. Security
    3.1. Authentication, Authorization, and Accounting
      3.1.1. Authentication
        3.1.1.1. Local Authentication
        3.1.1.2. RADIUS Authentication
          3.1.1.2.1. RADIUS Server Selection
        3.1.1.3. TACACS+ Authentication
      3.1.2. Authorization
        3.1.2.1. Local Authorization
        3.1.2.2. RADIUS Authorization
        3.1.2.3. TACACS+ Authorization
      3.1.3. Accounting
        3.1.3.1. RADIUS Accounting
        3.1.3.2. TACACS+ Accounting
    3.2. Security Controls
      3.2.1. When a Server Does Not Respond
      3.2.2. Access Request Flow
    3.3. Vendor-Specific Attributes (VSAs)
    3.4. Other Security Features
      3.4.1. Secure Shell (SSH)
        3.4.1.1. SSH File Transfer Protocol (SFTP)
      3.4.2. CSM Filters and CSM Security
      3.4.3. Exponential Login Backoff
      3.4.4. Encryption
      3.4.5. 802.1x Network Access Control
      3.4.6. TCP Enhanced Authentication and Keychain Authentication
        3.4.6.1. Keychain Authentication
        3.4.6.2. Keychain Configuration Guidelines and Behavior
    3.5. Configuration Notes
      3.5.1. Reference Sources
    3.6. Configuring Security with CLI
    3.7. Setting Up Security Attributes
      3.7.1. Configuring Authentication
      3.7.2. Configuring Authorization
      3.7.3. Configuring Accounting
    3.8. Security Configurations
    3.9. Security Configuration Procedures
      3.9.1. Configuring IPv4 or IPv6 Management Access Filters
      3.9.2. Configuring IPv4 or IPv6 CPM (CSM) Filters
      3.9.3. Configuring Password Management Parameters
      3.9.4. IPSec Certificate Parameters
      3.9.5. Configuring Profiles
      3.9.6. Configuring Users
      3.9.7. Copying and Overwriting Users and Profiles
        3.9.7.1. Copying a User
        3.9.7.2. Copying a Profile
      3.9.8. Configuring SSH
      3.9.9. Configuring SSH Ciphers
      3.9.10. Configuring Login Controls
      3.9.11. RADIUS Configurations
        3.9.11.1. Configuring RADIUS Authentication
        3.9.11.2. Configuring RADIUS Authorization
        3.9.11.3. Configuring RADIUS Accounting
        3.9.11.4. Configuring 802.1x RADIUS Policies
      3.9.12. TACACS+ Configurations
        3.9.12.1. Enabling TACACS+ Authentication
        3.9.12.2. Configuring TACACS+ Authorization
        3.9.12.3. Configuring TACACS+ Accounting
      3.9.13. Configuring Keychains
    3.10. Security Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Configuration Commands
          3.10.1.1.1. Security Configuration Commands
          3.10.1.1.2. Management Access Filter Commands
          3.10.1.1.3. IPv6 Management Access Filter Commands
          3.10.1.1.4. CPM Filter Commands
          3.10.1.1.5. IPv6 CPM Filter Commands
          3.10.1.1.6. Password Commands
          3.10.1.1.7. Profile Commands
          3.10.1.1.8. User Commands
          3.10.1.1.9. RADIUS Commands
          3.10.1.1.10. TACACS+ Commands
          3.10.1.1.11. 802.1x Commands
          3.10.1.1.12. SSH Commands
          3.10.1.1.13. Keychain Authentication Commands
        3.10.1.2. Login Control Commands
        3.10.1.3. Show Commands
          3.10.1.3.1. Security
          3.10.1.3.2. Login Control
        3.10.1.4. Clear Commands
          3.10.1.4.1. Admin
          3.10.1.4.2. Authentication
        3.10.1.5. Debug Commands
      3.10.2. Command Descriptions
        3.10.2.1. Configuration Commands
          3.10.2.1.1. Generic Security Commands
          3.10.2.1.2. Security Commands
          3.10.2.1.3. Management Access Filter Commands
          3.10.2.1.4. CPM Filter Commands
          3.10.2.1.5. Global Password Commands
          3.10.2.1.6. Password Commands
          3.10.2.1.7. Profile Management Commands
          3.10.2.1.8. User Management Commands
          3.10.2.1.9. RADIUS Client Commands
          3.10.2.1.10. TACACS+ Client Commands
          3.10.2.1.11. 802.1x Commands
          3.10.2.1.12. SSH Commands
          3.10.2.1.13. Keychain Authentication Commands
          3.10.2.1.14. Login Control Commands
        3.10.2.2. Show Commands
          3.10.2.2.1. Security Show Commands
          3.10.2.2.2. Login Control Show Commands
        3.10.2.3. Clear Commands
        3.10.2.4. Debug Commands
  4. SNMP
    4.1. SNMP Overview
      4.1.1. SNMP Architecture
      4.1.2. Management Information Base
      4.1.3. SNMP Versions
      4.1.4. Management Information Access Control
      4.1.5. User-Based Security Model Community Strings
      4.1.6. Views
      4.1.7. Access Groups
      4.1.8. Users
    4.2. SNMP Versions
    4.3. Configuration Notes
      4.3.1. Reference Sources
    4.4. Configuring SNMP with CLI
    4.5. SNMP Configuration Overview
      4.5.1. Configuring SNMPv1 and SNMPv2c
      4.5.2. Configuring SNMPv3
    4.6. Basic SNMP Security Configuration
    4.7. Configuring SNMP Components
      4.7.1. Configuring a Community String
      4.7.2. Configuring View Options
      4.7.3. Configuring Access Options
      4.7.4. Configuring USM Community Options
      4.7.5. Configuring Other SNMP Parameters
    4.8. SNMP Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. Configuration Commands
          4.8.1.1.1. SNMP System Commands
          4.8.1.1.2. SNMP Security Commands
        4.8.1.2. Show Commands
      4.8.2. Command Descriptions
        4.8.2.1. Configuration Commands
          4.8.2.1.1. SNMP System Commands
          4.8.2.1.2. SNMP Security Commands
        4.8.2.2. Show Commands
  5. Event and Accounting Logs
    5.1. Logging Overview
      5.1.1. Event Logging
      5.1.2. Accounting Logs
    5.2. Log Destinations
      5.2.1. Console
      5.2.2. Session
      5.2.3. Memory Logs
      5.2.4. Log Files
        5.2.4.1. Event Log Files
        5.2.4.2. Accounting Log Files
      5.2.5. SNMP Trap Group
      5.2.6. Syslog
    5.3. Event Logs
      5.3.1. Event Sources
      5.3.2. Event Control
      5.3.3. Log Manager and Event Logs
      5.3.4. Event Filter Policies
      5.3.5. Event Log Entries
      5.3.6. Simple Logger Event Throttling
      5.3.7. Default System Logs
    5.4. Accounting Logs
      5.4.1. Accounting Records
      5.4.2. Accounting Files
      5.4.3. Design Considerations
    5.5. Configuration Notes
      5.5.1. Reference Sources
    5.6. Configuring Logging with CLI
    5.7. Log Configuration Overview
    5.8. Log Type
    5.9. Basic Event Log Configuration
    5.10. Common Configuration Tasks
      5.10.1. Configuring an Event Log
      5.10.2. Configuring a File ID
      5.10.3. Configuring an Accounting Policy
      5.10.4. Configuring Event Control
      5.10.5. Configuring Throttle Rate
      5.10.6. Configuring a Log Filter
      5.10.7. Configuring an SNMP Trap Group
      5.10.8. Configuring a Syslog Target
    5.11. Log Management Tasks
      5.11.1. Modifying a Log File
      5.11.2. Deleting a Log File
      5.11.3. Modifying a File ID
      5.11.4. Deleting a File ID
      5.11.5. Modifying a Syslog ID
      5.11.6. Deleting a Syslog ID
      5.11.7. Modifying an SNMP Trap Group
      5.11.8. Deleting an SNMP Trap Group
      5.11.9. Modifying a Log Filter
      5.11.10. Deleting a Log Filter
      5.11.11. Modifying Event Control Parameters
      5.11.12. Returning to the Default Event Control Configuration
    5.12. Log Command Reference
      5.12.1. Command Hierarchies
        5.12.1.1. Configuration Commands
          5.12.1.1.1. Accounting Policy Commands
          5.12.1.1.2. Event Control Commands
          5.12.1.1.3. Log File Commands
          5.12.1.1.4. Log Filter Commands
          5.12.1.1.5. Syslog Commands
          5.12.1.1.6. Logging Destination Commands
          5.12.1.1.7. SNMP Trap Groups Commands
        5.12.1.2. Show Commands
        5.12.1.3. Clear Commands
      5.12.2. Command Descriptions
        5.12.2.1. Configuration Commands
          5.12.2.1.1. Generic Commands
          5.12.2.1.2. Accounting Policy Commands
          5.12.2.1.3. Event Control Commands
          5.12.2.1.4. Log File Commands
          5.12.2.1.5. Log Filter Commands
          5.12.2.1.6. Syslog Commands
          5.12.2.1.7. Logging Destination Commands
          5.12.2.1.8. SNMP Trap Groups Commands
        5.12.2.2. Show Commands
        5.12.2.3. Clear Commands
  6. List of Acronyms
  7. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. List of Technical Publications
      1.1.3. Technical Support
  2. 7705 SAR System Management Configuration Process
  3. Security
    3.1. Authentication, Authorization, and Accounting
      3.1.1. Authentication
        3.1.1.1. Local Authentication
        3.1.1.2. RADIUS Authentication
          3.1.1.2.1. RADIUS Server Selection
        3.1.1.3. TACACS+ Authentication
      3.1.2. Authorization
        3.1.2.1. Local Authorization
        3.1.2.2. RADIUS Authorization
        3.1.2.3. TACACS+ Authorization
      3.1.3. Accounting
        3.1.3.1. RADIUS Accounting
        3.1.3.2. TACACS+ Accounting
    3.2. Security Controls
      3.2.1. When a Server Does Not Respond
      3.2.2. Access Request Flow
    3.3. Vendor-Specific Attributes (VSAs)
    3.4. Other Security Features
      3.4.1. Secure Shell (SSH)
        3.4.1.1. SSH File Transfer Protocol (SFTP)
      3.4.2. CSM Filters and CSM Security
      3.4.3. Exponential Login Backoff
      3.4.4. Encryption
      3.4.5. 802.1x Network Access Control
      3.4.6. TCP Enhanced Authentication and Keychain Authentication
        3.4.6.1. Keychain Authentication
        3.4.6.2. Keychain Configuration Guidelines and Behavior
    3.5. Configuration Notes
      3.5.1. Reference Sources
    3.6. Configuring Security with CLI
    3.7. Setting Up Security Attributes
      3.7.1. Configuring Authentication
      3.7.2. Configuring Authorization
      3.7.3. Configuring Accounting
    3.8. Security Configurations
    3.9. Security Configuration Procedures
      3.9.1. Configuring IPv4 or IPv6 Management Access Filters
      3.9.2. Configuring IPv4 or IPv6 CPM (CSM) Filters
      3.9.3. Configuring Password Management Parameters
      3.9.4. IPSec Certificate Parameters
      3.9.5. Configuring Profiles
      3.9.6. Configuring Users
      3.9.7. Copying and Overwriting Users and Profiles
        3.9.7.1. Copying a User
        3.9.7.2. Copying a Profile
      3.9.8. Configuring SSH
      3.9.9. Configuring SSH Ciphers
      3.9.10. Configuring Login Controls
      3.9.11. RADIUS Configurations
        3.9.11.1. Configuring RADIUS Authentication
        3.9.11.2. Configuring RADIUS Authorization
        3.9.11.3. Configuring RADIUS Accounting
        3.9.11.4. Configuring 802.1x RADIUS Policies
      3.9.12. TACACS+ Configurations
        3.9.12.1. Enabling TACACS+ Authentication
        3.9.12.2. Configuring TACACS+ Authorization
        3.9.12.3. Configuring TACACS+ Accounting
      3.9.13. Configuring Keychains
    3.10. Security Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Configuration Commands
          3.10.1.1.1. Security Configuration Commands
          3.10.1.1.2. Management Access Filter Commands
          3.10.1.1.3. IPv6 Management Access Filter Commands
          3.10.1.1.4. CPM Filter Commands
          3.10.1.1.5. IPv6 CPM Filter Commands
          3.10.1.1.6. Password Commands
          3.10.1.1.7. Profile Commands
          3.10.1.1.8. User Commands
          3.10.1.1.9. RADIUS Commands
          3.10.1.1.10. TACACS+ Commands
          3.10.1.1.11. 802.1x Commands
          3.10.1.1.12. SSH Commands
          3.10.1.1.13. Keychain Authentication Commands
        3.10.1.2. Login Control Commands
        3.10.1.3. Show Commands
          3.10.1.3.1. Security
          3.10.1.3.2. Login Control
        3.10.1.4. Clear Commands
          3.10.1.4.1. Admin
          3.10.1.4.2. Authentication
        3.10.1.5. Debug Commands
      3.10.2. Command Descriptions
        3.10.2.1. Configuration Commands
          3.10.2.1.1. Generic Security Commands
          3.10.2.1.2. Security Commands
          3.10.2.1.3. Management Access Filter Commands
          3.10.2.1.4. CPM Filter Commands
          3.10.2.1.5. Global Password Commands
          3.10.2.1.6. Password Commands
          3.10.2.1.7. Profile Management Commands
          3.10.2.1.8. User Management Commands
          3.10.2.1.9. RADIUS Client Commands
          3.10.2.1.10. TACACS+ Client Commands
          3.10.2.1.11. 802.1x Commands
          3.10.2.1.12. SSH Commands
          3.10.2.1.13. Keychain Authentication Commands
          3.10.2.1.14. Login Control Commands
        3.10.2.2. Show Commands
          3.10.2.2.1. Security Show Commands
          3.10.2.2.2. Login Control Show Commands
        3.10.2.3. Clear Commands
        3.10.2.4. Debug Commands
  4. SNMP
    4.1. SNMP Overview
      4.1.1. SNMP Architecture
      4.1.2. Management Information Base
      4.1.3. SNMP Versions
      4.1.4. Management Information Access Control
      4.1.5. User-Based Security Model Community Strings
      4.1.6. Views
      4.1.7. Access Groups
      4.1.8. Users
    4.2. SNMP Versions
    4.3. Configuration Notes
      4.3.1. Reference Sources
    4.4. Configuring SNMP with CLI
    4.5. SNMP Configuration Overview
      4.5.1. Configuring SNMPv1 and SNMPv2c
      4.5.2. Configuring SNMPv3
    4.6. Basic SNMP Security Configuration
    4.7. Configuring SNMP Components
      4.7.1. Configuring a Community String
      4.7.2. Configuring View Options
      4.7.3. Configuring Access Options
      4.7.4. Configuring USM Community Options
      4.7.5. Configuring Other SNMP Parameters
    4.8. SNMP Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. Configuration Commands
          4.8.1.1.1. SNMP System Commands
          4.8.1.1.2. SNMP Security Commands
        4.8.1.2. Show Commands
      4.8.2. Command Descriptions
        4.8.2.1. Configuration Commands
          4.8.2.1.1. SNMP System Commands
          4.8.2.1.2. SNMP Security Commands
        4.8.2.2. Show Commands
  5. Event and Accounting Logs
    5.1. Logging Overview
      5.1.1. Event Logging
      5.1.2. Accounting Logs
    5.2. Log Destinations
      5.2.1. Console
      5.2.2. Session
      5.2.3. Memory Logs
      5.2.4. Log Files
        5.2.4.1. Event Log Files
        5.2.4.2. Accounting Log Files
      5.2.5. SNMP Trap Group
      5.2.6. Syslog
    5.3. Event Logs
      5.3.1. Event Sources
      5.3.2. Event Control
      5.3.3. Log Manager and Event Logs
      5.3.4. Event Filter Policies
      5.3.5. Event Log Entries
      5.3.6. Simple Logger Event Throttling
      5.3.7. Default System Logs
    5.4. Accounting Logs
      5.4.1. Accounting Records
      5.4.2. Accounting Files
      5.4.3. Design Considerations
    5.5. Configuration Notes
      5.5.1. Reference Sources
    5.6. Configuring Logging with CLI
    5.7. Log Configuration Overview
    5.8. Log Type
    5.9. Basic Event Log Configuration
    5.10. Common Configuration Tasks
      5.10.1. Configuring an Event Log
      5.10.2. Configuring a File ID
      5.10.3. Configuring an Accounting Policy
      5.10.4. Configuring Event Control
      5.10.5. Configuring Throttle Rate
      5.10.6. Configuring a Log Filter
      5.10.7. Configuring an SNMP Trap Group
      5.10.8. Configuring a Syslog Target
    5.11. Log Management Tasks
      5.11.1. Modifying a Log File
      5.11.2. Deleting a Log File
      5.11.3. Modifying a File ID
      5.11.4. Deleting a File ID
      5.11.5. Modifying a Syslog ID
      5.11.6. Deleting a Syslog ID
      5.11.7. Modifying an SNMP Trap Group
      5.11.8. Deleting an SNMP Trap Group
      5.11.9. Modifying a Log Filter
      5.11.10. Deleting a Log Filter
      5.11.11. Modifying Event Control Parameters
      5.11.12. Returning to the Default Event Control Configuration
    5.12. Log Command Reference
      5.12.1. Command Hierarchies
        5.12.1.1. Configuration Commands
          5.12.1.1.1. Accounting Policy Commands
          5.12.1.1.2. Event Control Commands
          5.12.1.1.3. Log File Commands
          5.12.1.1.4. Log Filter Commands
          5.12.1.1.5. Syslog Commands
          5.12.1.1.6. Logging Destination Commands
          5.12.1.1.7. SNMP Trap Groups Commands
        5.12.1.2. Show Commands
        5.12.1.3. Clear Commands
      5.12.2. Command Descriptions
        5.12.2.1. Configuration Commands
          5.12.2.1.1. Generic Commands
          5.12.2.1.2. Accounting Policy Commands
          5.12.2.1.3. Event Control Commands
          5.12.2.1.4. Log File Commands
          5.12.2.1.5. Log Filter Commands
          5.12.2.1.6. Syslog Commands
          5.12.2.1.7. Logging Destination Commands
          5.12.2.1.8. SNMP Trap Groups Commands
        5.12.2.2. Show Commands
        5.12.2.3. Clear Commands
  6. List of Acronyms
  7. Standards and Protocol Support
  Customer Document and Product Support
7705 SAR Quick Reference Cards, Release 8.0
  7705 SAR Installation, Provisioning, and Commissioning Checklist, Release 8.0
  7705 SAR Card and Module Support Quick Reference Card, Release 8.0
  7705 SAR Command Line Interface Quick Reference Card
  7705 SAR Installation, Provisioning, and Commissioning Checklist, Release 8.0
  7705 SAR Card and Module Support Quick Reference Card, Release 8.0
  7705 SAR Command Line Interface Quick Reference Card