Alcatel-Lucent 7450 ESS, 7750 SR, and 7950 XRS Release 14.0.R1
  Legal Disclaimers
  Customer Documentation and Product Support
  Legal Disclaimers
  Customer Documentation and Product Support
Acronym Reference Guide R14.0.R1
  7750 SR, 7450 ESS, and 7950 XRS Acronyms
  Customer Documentation and Product Support
  7750 SR, 7450 ESS, and 7950 XRS Acronyms
  Customer Documentation and Product Support
Basic System Configuration Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
    In This Chapter
    Router System Configuration Process
  CLI Usage
    In This Chapter
    CLI Structure
    Navigating in the CLI
      CLI Contexts
      Basic CLI Commands
      CLI Environment Commands
      CLI Monitor Commands
    Getting Help in the CLI
    The CLI Command Prompt
    Displaying Configuration Contexts
    EXEC Files
    CLI Script Control
    Entering CLI Commands
      Command Completion
      Unordered and Unnamed Parameters
      Editing Keystrokes
      Absolute Paths
      History
      Entering Numerical Ranges
      Pipe/Match
      Pipe/Count
      Redirection
    VI Editor
      Summary of vi Commands
      Using the vi Commands
      EX Commands
    Configuration Rollback
      Feature Behavior
      Rollback and SNMP
      Rescue Configuration
      Operational Guidelines
    Transactional Configuration
      Basic Operation
      Transactions and Rollback
      Authorization
    Basic CLI Command Reference
      Command Hierarchies
        Basic CLI Commands
        Monitor Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
      Command Descriptions
        Global Commands
        CLI Environment Commands
        Monitor CLI Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
        Show Commands
  File System Management
    In This Chapter
    The File System
      Compact Flash Devices
      URLs
      Wildcards
    File Management Tasks
      Modifying File Attributes
      Creating Directories
      Copying Files
      Moving Files
      Deleting Files and Removing Directories
      Displaying Directory and File Information
      Repairing the File System
    File Command Reference
      Command Hierarchy
        File Commands
      Command Descriptions
        File System Commands
        File Commands
  Boot Options
    In This Chapter
    System Initialization
      Configuration and Image Loading
        Persistence
        Lawful Intercept
        FIPS-140-2 Mode
    Initial System Startup Process Flow
    Configuration Notes
    Configuring Boot Options File with CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Common Configuration Tasks
      Searching for the BOF
      Accessing the CLI
        Console Connection
    Configuring BOF Parameters
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying and Saving a Configuration
        Deleting BOF Parameters
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Configuration Command Reference
      Command Hierarchies
         Configuration Commands
      Command Descriptions
        File Management Commands
        BOF Processing Control
        Console Port Configuration
        Image and Configuration Management
        Management Ethernet Configuration
        DNS Configuration Commands
    BOF Show Command Reference
      Command Hierarchies
      Command Descriptions
        BOF Show Commands
  System Management
    In This Chapter
    System Management Parameters
      System Information
        System Name
        System Contact
        System Location
        System Coordinates
        Naming Objects
        Common Language Location Identifier
        DNS Security Extensions
      System Time
        Time Zones
        Network Time Protocol (NTP)
        SNTP Time Synchronization
        CRON
    High Availability
      HA Features
        Redundancy
          Software Redundancy
          Configuration Redundancy
          Component Redundancy
          Service Redundancy
          Accounting Configuration Redundancy
        Nonstop Forwarding
        Nonstop Routing (NSR)
        CPM Switchover
        Synchronization
          Configuration and boot-env Synchronization
          State Database Synchronization
    Synchronization and Redundancy
      Active and Standby Designations
      When the Active CPM Goes Offline
      OOB Management Ethernet Port Redundancy
      Persistence
        Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    Network Synchronization
      Central Synchronization Sub-System
      7950 XRS-40 Extension Chassis Central Clocks
      Synchronization Status Messages (SSM)
        DS1 Signals
        E1 Signals
        SONET/SDH Signals
        DS3/E3
      Synchronous Ethernet
      Clock Source Quality Level Definitions
      IEEE 1588v2 PTP
        PTP Clock Synchronization
        Performance Considerations
          Port-Based Timestamping of PTP Messages
        PTP Capabilities
        PTP Ordinary Slave Clock For Frequency
        PTP Ordinary Master Clock For Frequency
        PTP Boundary Clock for Frequency and Time
        PTP Clock Redundancy
        PTP Time for System Time and OAM Time
        PTP within Routing Instances
    System-Wide ATM Parameters
    Link Layer Discovery Protocol (LLDP)
    IP Hashing as an LSR
    Ethernet Satellites
      Software Repositories for Satellites
      Satellite Configuration
        Satellite Client Port Association
    Software Repositories
    Administrative Tasks
      Configuring the Chassis Mode
      Saving Configurations
      Specifying Post-Boot Configuration Files
      Network Timing
      Power Supplies
      Automatic Synchronization
        Boot-Env Option
        Config Option
      Manual Synchronization
        Forcing a Switchover
    System Configuration Process Overview
    Configuration Notes
      General
    Configuring System Management with CLI
    System Management
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
        Coordinates
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
          Broadcastclient
          SNTP
          CRON
        ANCP Enhancements
      Configuring Synchronization and Redundancy
        Configuring Persistence
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
      Configuring Multi-Chassis Redundancy for LAG
      Configuring Mixed Mode
        Enabling Mixed Mode on a 7450 System
      Configuring Power Supply Parameters
      Configuring ATM System Parameters
      Configuring Backup Copies
      Post-Boot Configuration Extension Files
        Show Command Output and Console Messages
    System Timing
      Edit Mode
      Configuring Timing References
      Using the Revert Command
      Other Editing Commands
      Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
      System Alarm Contact Inputs
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        System Time Commands
        Cron Commands
        Script Control Commands
        System Administration (Admin) Commands
        System Synchronization Commands
        High Availability (Redundancy) Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
      System Command Reference
        Generic Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Date and Time Commands
        Network Time Protocol Commands
          SNTP Commands
          CRON Commands
          Script Control Commands
          System Time Commands
        System Synchronization Configuration Commands
        System Administration Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        Redundancy Commands
          Peer Commands
          Multi-Chassis Endpoint Commands
          MC-LAG Commands
          Multi-Chassis Ring Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
    In This Chapter
    Router System Configuration Process
  CLI Usage
    In This Chapter
    CLI Structure
    Navigating in the CLI
      CLI Contexts
      Basic CLI Commands
      CLI Environment Commands
      CLI Monitor Commands
    Getting Help in the CLI
    The CLI Command Prompt
    Displaying Configuration Contexts
    EXEC Files
    CLI Script Control
    Entering CLI Commands
      Command Completion
      Unordered and Unnamed Parameters
      Editing Keystrokes
      Absolute Paths
      History
      Entering Numerical Ranges
      Pipe/Match
      Pipe/Count
      Redirection
    VI Editor
      Summary of vi Commands
      Using the vi Commands
      EX Commands
    Configuration Rollback
      Feature Behavior
      Rollback and SNMP
      Rescue Configuration
      Operational Guidelines
    Transactional Configuration
      Basic Operation
      Transactions and Rollback
      Authorization
    Basic CLI Command Reference
      Command Hierarchies
        Basic CLI Commands
        Monitor Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
      Command Descriptions
        Global Commands
        CLI Environment Commands
        Monitor CLI Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
        Show Commands
  File System Management
    In This Chapter
    The File System
      Compact Flash Devices
      URLs
      Wildcards
    File Management Tasks
      Modifying File Attributes
      Creating Directories
      Copying Files
      Moving Files
      Deleting Files and Removing Directories
      Displaying Directory and File Information
      Repairing the File System
    File Command Reference
      Command Hierarchy
        File Commands
      Command Descriptions
        File System Commands
        File Commands
  Boot Options
    In This Chapter
    System Initialization
      Configuration and Image Loading
        Persistence
        Lawful Intercept
        FIPS-140-2 Mode
    Initial System Startup Process Flow
    Configuration Notes
    Configuring Boot Options File with CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Common Configuration Tasks
      Searching for the BOF
      Accessing the CLI
        Console Connection
    Configuring BOF Parameters
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying and Saving a Configuration
        Deleting BOF Parameters
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Configuration Command Reference
      Command Hierarchies
         Configuration Commands
      Command Descriptions
        File Management Commands
        BOF Processing Control
        Console Port Configuration
        Image and Configuration Management
        Management Ethernet Configuration
        DNS Configuration Commands
    BOF Show Command Reference
      Command Hierarchies
      Command Descriptions
        BOF Show Commands
  System Management
    In This Chapter
    System Management Parameters
      System Information
        System Name
        System Contact
        System Location
        System Coordinates
        Naming Objects
        Common Language Location Identifier
        DNS Security Extensions
      System Time
        Time Zones
        Network Time Protocol (NTP)
        SNTP Time Synchronization
        CRON
    High Availability
      HA Features
        Redundancy
          Software Redundancy
          Configuration Redundancy
          Component Redundancy
          Service Redundancy
          Accounting Configuration Redundancy
        Nonstop Forwarding
        Nonstop Routing (NSR)
        CPM Switchover
        Synchronization
          Configuration and boot-env Synchronization
          State Database Synchronization
    Synchronization and Redundancy
      Active and Standby Designations
      When the Active CPM Goes Offline
      OOB Management Ethernet Port Redundancy
      Persistence
        Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    Network Synchronization
      Central Synchronization Sub-System
      7950 XRS-40 Extension Chassis Central Clocks
      Synchronization Status Messages (SSM)
        DS1 Signals
        E1 Signals
        SONET/SDH Signals
        DS3/E3
      Synchronous Ethernet
      Clock Source Quality Level Definitions
      IEEE 1588v2 PTP
        PTP Clock Synchronization
        Performance Considerations
          Port-Based Timestamping of PTP Messages
        PTP Capabilities
        PTP Ordinary Slave Clock For Frequency
        PTP Ordinary Master Clock For Frequency
        PTP Boundary Clock for Frequency and Time
        PTP Clock Redundancy
        PTP Time for System Time and OAM Time
        PTP within Routing Instances
    System-Wide ATM Parameters
    Link Layer Discovery Protocol (LLDP)
    IP Hashing as an LSR
    Ethernet Satellites
      Software Repositories for Satellites
      Satellite Configuration
        Satellite Client Port Association
    Software Repositories
    Administrative Tasks
      Configuring the Chassis Mode
      Saving Configurations
      Specifying Post-Boot Configuration Files
      Network Timing
      Power Supplies
      Automatic Synchronization
        Boot-Env Option
        Config Option
      Manual Synchronization
        Forcing a Switchover
    System Configuration Process Overview
    Configuration Notes
      General
    Configuring System Management with CLI
    System Management
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
        Coordinates
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
          Broadcastclient
          SNTP
          CRON
        ANCP Enhancements
      Configuring Synchronization and Redundancy
        Configuring Persistence
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
      Configuring Multi-Chassis Redundancy for LAG
      Configuring Mixed Mode
        Enabling Mixed Mode on a 7450 System
      Configuring Power Supply Parameters
      Configuring ATM System Parameters
      Configuring Backup Copies
      Post-Boot Configuration Extension Files
        Show Command Output and Console Messages
    System Timing
      Edit Mode
      Configuring Timing References
      Using the Revert Command
      Other Editing Commands
      Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
      System Alarm Contact Inputs
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        System Time Commands
        Cron Commands
        Script Control Commands
        System Administration (Admin) Commands
        System Synchronization Commands
        High Availability (Redundancy) Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
      System Command Reference
        Generic Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Date and Time Commands
        Network Time Protocol Commands
          SNTP Commands
          CRON Commands
          Script Control Commands
          System Time Commands
        System Synchronization Configuration Commands
        System Administration Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        Redundancy Commands
          Peer Commands
          Multi-Chassis Endpoint Commands
          MC-LAG Commands
          Multi-Chassis Ring Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Gx AVPs Reference Guide R14.0.R1
  Gx AVP
    In This Section
    AVPs
      Reserved Keywords in the 7750 SR
      Standard Diameter AVPs
      Standard Diameter AVPs (format)
      ALU-Specific AVPs
      ALU-Specific VSAs (format)
      Diameter-Based AVP Applicability
      Gx AVP Applicability
      ALU-Specific AVP Applicability
      Result Codes (Result-Code AVP)
      Rule Failure Codes (Rule-Failure-Code AVP)
      Event Triggers (Event-Trigger AVP)
      Termination Causes (Termination-Cause AVP)
  Standards and Protocol Support
  Customer Documentation and Product Support
  Gx AVP
    In This Section
    AVPs
      Reserved Keywords in the 7750 SR
      Standard Diameter AVPs
      Standard Diameter AVPs (format)
      ALU-Specific AVPs
      ALU-Specific VSAs (format)
      Diameter-Based AVP Applicability
      Gx AVP Applicability
      ALU-Specific AVP Applicability
      Result Codes (Result-Code AVP)
      Rule Failure Codes (Rule-Failure-Code AVP)
      Event Triggers (Event-Trigger AVP)
      Termination Causes (Termination-Cause AVP)
  Standards and Protocol Support
  Customer Documentation and Product Support
Interface Configuration Guide R14.0.R1
   Getting Started
    About This Guide
    Interface Configuration Process
   Interfaces
    In This Chapter
    Configuration Overview
      Chassis Slots and Cards
      MCMs
      MDAs
      XMAs/C-XMAs
      CMAs
      Versatile Service Module (VSM)
      Oversubscribed Ethernet MDAs
        Rate Limiting
        Packet Classification and Scheduling
      Channelized MDA/CMA Support
        Channelized DS-1/E-1 CMA
        Channelized DS-3/E-3 CMA
        Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        Channelized OC-12/STM-4 ASAP MDAs
        Channelized DS-3/E-3 ASAP MDA (4-Port)
        Channelized DS-3/E-3 ASAP MDA (12-Port)
        Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        Network Interconnections
    Digital Diagnostics Monitoring
      Alcatel-Lucent SFPs and XFPs
      Statistics Collection
    Ports
      Port Types
      Port Features
        Port State and Operational State
        802.1x Network Access Control
          802.1x Modes
          802.1x Basics
          802.1x Timers
          802.1x Tunneling
          802.1x Configuration and Limitations
        SONET/SDH Port Attributes
        SONET/SDH Path Attributes
        Multilink Frame Relay
          MLFR Bundle Data Plane
          MLFR Bundle Link Integrity Protocol
        FRF.12 End-to-End Fragmentation
          SAP Fragment Interleaving Option
        FRF.12 UNI/NNI Link Fragmentation
        MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        Multilink Point-to-Point Protocol (MLPPP)
          Protocol Field (PID)
          B & E Bits
          Sequence Number
          Information Field
          Padding
          FCS
          LCP
          Link Fragmentation and Interleaving Support
        Multi-Class MLPPP
          QoS in MC-MLPPP
        Cisco HDLC
          SLARP
          SONET/SDH Scrambling and C2-Byte
          Timers
        Automatic Protection Switching (APS)
          Single Chassis and Multi-Chassis APS
          APS Switching Modes
          APS Channel and SONET Header K Bytes
          Revertive Switching
          Bidirectional 1+1 Switchover Operation Example
          Annex B (1+1 Optimized) Operation
          Protection of Upper Layer Protocols and Services
          APS User-Initiated Requests
          APS and SNMP
          APS Applicability, Restrictions and Interactions
          Sample APS Applications
        Inverse Multiplexing Over ATM (IMA)
          Inverse Multiplexing over ATM (IMA) Features
        Ethernet Local Management Interface (E-LMI)
        Link Layer Discovery Protocol (LLDP)
          LLDP Protocol Features
      Per Port Aggregate Egress Queue Statistics Monitoring
    Port Cross-Connect (PXC)
      PXC Terminology
      Caveats
      PXC - Physical Port in Cross-Connect (Loopback) Mode
        Operational State
      PXC Sub-Ports
        PXC Sub-Port Operational State
      Port Statistics
        Statistics on Physical PXC Ports
      LAG with PXC Ports – PXC LAG
      Basic PXC Provisioning
      QoS
        Queue Allocation on PXC Sub-Ports
        Pool Allocations on PXC Ports
        QoS Summary
      Mirroring and LI on PXC Ports
      Multi-Chassis Redundancy
      Health Monitoring on the PXC Sub-Ports
      Configuration Example
    LAG
      LACP
        LACP Multiplexing
      Active-Standby LAG Operation
      LAG on Access QoS Consideration
        Adapt QoS Modes
        Per-fp-ing-queuing
        Per-fp-egr-queuing
        Per-fp-sap-instance
      LAG and ECMP Hashing
        Per Flow Hashing
          Changing Default Per Flow Hashing Inputs
        Per Link Hashing
          Weighted per-link-hash
        Explicit Per Link Hash Using LAG Link Mapping Profiles
        Consistent Per Service Hashing
        ESM – LAG Hashing per Vport
          Background
          Hashing per Vport
          Link Placement
          Multicast Consideration
          VPLS and Capture SAP Considerations
          LSR Default Hash Routine— Label-Only Hash Option
          LSR Label-IP Hash Option Enabled
          LSR IP-Only Hash Option Enabled
      LAG Hold Down Timers
      BFD over LAG Links
      Mixed Port-Speed LAG Support
        LAG Upgrade
      Multi-Chassis LAG
        Overview
        MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        DSLAM Dual Homing in Layer 2/3 TPSDA Model
    G.8031 Protected Ethernet Tunnels
    G.8032 Protected Ethernet Rings
    Ethernet Port Monitoring
    802.3ah OAM
      OAM Events
        Link Monitoring
          Capability Advertising
      Remote Loopback
      802.3ah OAM PDU Tunneling for Epipe Service
        802.3ah Grace Announcement
    MTU Configuration Guidelines
      Default MTU Values
      Modifying MTU Defaults
      Configuration Example
    Deploying Preprovisioned Components
    Configuring SFM5-12e Fabric Speed
      fabric-speed-a
      fabric-speed-b
    Configuration Process Overview
    Configuration Notes
     Configuring Physical Ports with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port
      Maximizing Bandwidth Use
    Basic Configuration
    Common Configuration Tasks
    Configuring Cards and MDAs
    Configuring Cards, MCMs and MDAs
      Configuring Cards and CMAs
      Configuring Forwarding Plane Parameters
      Configuring MDA Access and Network Pool Parameters
      Configuring MDA Policies for Named Pools Mode
    Configuring Ports
      Configuring Port Pool Parameters
      Changing Hybrid-Buffer-Allocation
      Configuring APS Parameters
      Configuring Ethernet Port Parameters
        Ethernet Network Port
        Ethernet Access Port
        Configuring 802.1x Authentication Port Parameters
      Configuring SONET/SDH Port Parameters
        SONET/SDH Network Port
        SONET/SDH Access Port
      Configuring Channelized Ports
        Verify the MDA Type
        Configuring a Channelized DS3 Port
        Configuring a Channelized OC-12-SFP Port
        Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
        Configuring Cisco HDLC on a Channelized Port
      Configuring Channelized STM1/OC3 Parameters
        Configuring Cpipe Port Parameters
          Configuring a DS1 Port
      Configuring ATM SAPs
        ATM SAP in an IES Service
        ATM SAP in an Epipe Service
      Configuring DWDM Port Parameters
      Configuring WaveTracker Parameters
      Configuring OTU Port Parameters
      Configuring ATM Interface Parameters
        PLCP/Direct Mapping
        ATM Interface Configurations
      Configuring Frame Relay Parameters
        SONET/SDH Interfaces
      Configuring Multilink PPP Bundles
      Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
        IMA Bundles
      Multi-Class MLPPP
        IMA Test Procedure
      Configuring Bundle Protection Group Ports
        Configuring a Channelized DS1 Card
      Configuring LAG Parameters
        Configuring BFD on LAG Links
      Configuring G.8031 Protected Ethernet Tunnels
    Service Management Tasks
      Modifying or Deleting an MDA, MCM, CMA or XMA
      Modifying a Card Type
      Deleting a Card
      Deleting Port Parameters
      Soft IOM Reset
        Soft Reset
        Deferred MDA Reset
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        MCM Commands
        MDA Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane (FP) Commands
        Port Configuration Commands
        Port XC Commands
        Port APS Commands
        Ethernet Commands
        Interface Group Handler Commands
        Multilink Bundle Commands
        SONET-SDH Commands
        TDM Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        LAG Commands
        Ethernet Tunnel Commands
        Multi-Chassis Redundancy Commands
      Configuration Command Descriptions
        Generic Commands
        Card Commands
        Power Commands
        Virtual Scheduler Commands
        MCM Commands
        MDA (XMA) Commands
        MDA/Port QoS Commands
        General Port Commands
        Port XC Commands
        APS Commands
        Ethernet Port Commands
        802.1x Port Commands
        LLDP Port Commands
        Network Port Commands
        Interface Group Handler Commands
        Multilink-Bundle Port Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        ATM Interface Commands
        Frame Relay Commands
        TDM Commands
        LAG Commands
        Eth Tunnel Commands
        ETH-CFM Configuration Commands
        Multi-Chassis Redundancy Commands
          MC Endpoint Commands
          MC LAG Commands
          Multi-Chassis Ring Commands
        Forwarding Plane Configuration Commands
        Forwarding Plane Tools Commands
    Show, Monitor, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Hardware Show Commands
        PEQ Show Commands
        APS Show Commands
        Port Show Commands
        Multilink Bundle Show Commands
        LAG Show Commands
        Monitor Commands
        Clear Commands
        Tools Commands
          Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
   Getting Started
    About This Guide
    Interface Configuration Process
   Interfaces
    In This Chapter
    Configuration Overview
      Chassis Slots and Cards
      MCMs
      MDAs
      XMAs/C-XMAs
      CMAs
      Versatile Service Module (VSM)
      Oversubscribed Ethernet MDAs
        Rate Limiting
        Packet Classification and Scheduling
      Channelized MDA/CMA Support
        Channelized DS-1/E-1 CMA
        Channelized DS-3/E-3 CMA
        Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        Channelized OC-12/STM-4 ASAP MDAs
        Channelized DS-3/E-3 ASAP MDA (4-Port)
        Channelized DS-3/E-3 ASAP MDA (12-Port)
        Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        Network Interconnections
    Digital Diagnostics Monitoring
      Alcatel-Lucent SFPs and XFPs
      Statistics Collection
    Ports
      Port Types
      Port Features
        Port State and Operational State
        802.1x Network Access Control
          802.1x Modes
          802.1x Basics
          802.1x Timers
          802.1x Tunneling
          802.1x Configuration and Limitations
        SONET/SDH Port Attributes
        SONET/SDH Path Attributes
        Multilink Frame Relay
          MLFR Bundle Data Plane
          MLFR Bundle Link Integrity Protocol
        FRF.12 End-to-End Fragmentation
          SAP Fragment Interleaving Option
        FRF.12 UNI/NNI Link Fragmentation
        MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        Multilink Point-to-Point Protocol (MLPPP)
          Protocol Field (PID)
          B & E Bits
          Sequence Number
          Information Field
          Padding
          FCS
          LCP
          Link Fragmentation and Interleaving Support
        Multi-Class MLPPP
          QoS in MC-MLPPP
        Cisco HDLC
          SLARP
          SONET/SDH Scrambling and C2-Byte
          Timers
        Automatic Protection Switching (APS)
          Single Chassis and Multi-Chassis APS
          APS Switching Modes
          APS Channel and SONET Header K Bytes
          Revertive Switching
          Bidirectional 1+1 Switchover Operation Example
          Annex B (1+1 Optimized) Operation
          Protection of Upper Layer Protocols and Services
          APS User-Initiated Requests
          APS and SNMP
          APS Applicability, Restrictions and Interactions
          Sample APS Applications
        Inverse Multiplexing Over ATM (IMA)
          Inverse Multiplexing over ATM (IMA) Features
        Ethernet Local Management Interface (E-LMI)
        Link Layer Discovery Protocol (LLDP)
          LLDP Protocol Features
      Per Port Aggregate Egress Queue Statistics Monitoring
    Port Cross-Connect (PXC)
      PXC Terminology
      Caveats
      PXC - Physical Port in Cross-Connect (Loopback) Mode
        Operational State
      PXC Sub-Ports
        PXC Sub-Port Operational State
      Port Statistics
        Statistics on Physical PXC Ports
      LAG with PXC Ports – PXC LAG
      Basic PXC Provisioning
      QoS
        Queue Allocation on PXC Sub-Ports
        Pool Allocations on PXC Ports
        QoS Summary
      Mirroring and LI on PXC Ports
      Multi-Chassis Redundancy
      Health Monitoring on the PXC Sub-Ports
      Configuration Example
    LAG
      LACP
        LACP Multiplexing
      Active-Standby LAG Operation
      LAG on Access QoS Consideration
        Adapt QoS Modes
        Per-fp-ing-queuing
        Per-fp-egr-queuing
        Per-fp-sap-instance
      LAG and ECMP Hashing
        Per Flow Hashing
          Changing Default Per Flow Hashing Inputs
        Per Link Hashing
          Weighted per-link-hash
        Explicit Per Link Hash Using LAG Link Mapping Profiles
        Consistent Per Service Hashing
        ESM – LAG Hashing per Vport
          Background
          Hashing per Vport
          Link Placement
          Multicast Consideration
          VPLS and Capture SAP Considerations
          LSR Default Hash Routine— Label-Only Hash Option
          LSR Label-IP Hash Option Enabled
          LSR IP-Only Hash Option Enabled
      LAG Hold Down Timers
      BFD over LAG Links
      Mixed Port-Speed LAG Support
        LAG Upgrade
      Multi-Chassis LAG
        Overview
        MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        DSLAM Dual Homing in Layer 2/3 TPSDA Model
    G.8031 Protected Ethernet Tunnels
    G.8032 Protected Ethernet Rings
    Ethernet Port Monitoring
    802.3ah OAM
      OAM Events
        Link Monitoring
          Capability Advertising
      Remote Loopback
      802.3ah OAM PDU Tunneling for Epipe Service
        802.3ah Grace Announcement
    MTU Configuration Guidelines
      Default MTU Values
      Modifying MTU Defaults
      Configuration Example
    Deploying Preprovisioned Components
    Configuring SFM5-12e Fabric Speed
      fabric-speed-a
      fabric-speed-b
    Configuration Process Overview
    Configuration Notes
     Configuring Physical Ports with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port
      Maximizing Bandwidth Use
    Basic Configuration
    Common Configuration Tasks
    Configuring Cards and MDAs
    Configuring Cards, MCMs and MDAs
      Configuring Cards and CMAs
      Configuring Forwarding Plane Parameters
      Configuring MDA Access and Network Pool Parameters
      Configuring MDA Policies for Named Pools Mode
    Configuring Ports
      Configuring Port Pool Parameters
      Changing Hybrid-Buffer-Allocation
      Configuring APS Parameters
      Configuring Ethernet Port Parameters
        Ethernet Network Port
        Ethernet Access Port
        Configuring 802.1x Authentication Port Parameters
      Configuring SONET/SDH Port Parameters
        SONET/SDH Network Port
        SONET/SDH Access Port
      Configuring Channelized Ports
        Verify the MDA Type
        Configuring a Channelized DS3 Port
        Configuring a Channelized OC-12-SFP Port
        Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
        Configuring Cisco HDLC on a Channelized Port
      Configuring Channelized STM1/OC3 Parameters
        Configuring Cpipe Port Parameters
          Configuring a DS1 Port
      Configuring ATM SAPs
        ATM SAP in an IES Service
        ATM SAP in an Epipe Service
      Configuring DWDM Port Parameters
      Configuring WaveTracker Parameters
      Configuring OTU Port Parameters
      Configuring ATM Interface Parameters
        PLCP/Direct Mapping
        ATM Interface Configurations
      Configuring Frame Relay Parameters
        SONET/SDH Interfaces
      Configuring Multilink PPP Bundles
      Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
        IMA Bundles
      Multi-Class MLPPP
        IMA Test Procedure
      Configuring Bundle Protection Group Ports
        Configuring a Channelized DS1 Card
      Configuring LAG Parameters
        Configuring BFD on LAG Links
      Configuring G.8031 Protected Ethernet Tunnels
    Service Management Tasks
      Modifying or Deleting an MDA, MCM, CMA or XMA
      Modifying a Card Type
      Deleting a Card
      Deleting Port Parameters
      Soft IOM Reset
        Soft Reset
        Deferred MDA Reset
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        MCM Commands
        MDA Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane (FP) Commands
        Port Configuration Commands
        Port XC Commands
        Port APS Commands
        Ethernet Commands
        Interface Group Handler Commands
        Multilink Bundle Commands
        SONET-SDH Commands
        TDM Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        LAG Commands
        Ethernet Tunnel Commands
        Multi-Chassis Redundancy Commands
      Configuration Command Descriptions
        Generic Commands
        Card Commands
        Power Commands
        Virtual Scheduler Commands
        MCM Commands
        MDA (XMA) Commands
        MDA/Port QoS Commands
        General Port Commands
        Port XC Commands
        APS Commands
        Ethernet Port Commands
        802.1x Port Commands
        LLDP Port Commands
        Network Port Commands
        Interface Group Handler Commands
        Multilink-Bundle Port Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        ATM Interface Commands
        Frame Relay Commands
        TDM Commands
        LAG Commands
        Eth Tunnel Commands
        ETH-CFM Configuration Commands
        Multi-Chassis Redundancy Commands
          MC Endpoint Commands
          MC LAG Commands
          Multi-Chassis Ring Commands
        Forwarding Plane Configuration Commands
        Forwarding Plane Tools Commands
    Show, Monitor, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Hardware Show Commands
        PEQ Show Commands
        APS Show Commands
        Port Show Commands
        Multilink Bundle Show Commands
        LAG Show Commands
        Monitor Commands
        Clear Commands
        Tools Commands
          Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Layer 2 Services and EVPN Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
   VLL Services
    In This Chapter
    ATM VLL (Apipe) Services
      ATM VLL For End-to-End ATM Service
      ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
      Traffic Management Support
        Ingress Network Classification
        Ingress Queuing and Shaping on the IOM
        Egress Queuing and Shaping on the IOM
        Egress Shaping/Scheduling
    Circuit Emulation Services (Cpipe)
      Mobile Infrastructure
      Circuit Emulation Modes
      Circuit Emulation Parameters
        Circuit Emulation Modes
        Absolute Mode Option
        Payload Size
        Jitter Buffer
        CES Circuit Operation
      Services for Transporting CES Circuits
      Network Synchronization Considerations
      Cpipe Payload
    Ethernet Pipe (Epipe) Services
      Epipe Service Overview
      Epipe Service Pseudowire VLAN Tag Processing
      Epipe Up Operational State Configuration Option
      Epipe with PBB
      Epipe over L2TPv3
      Ethernet Interworking VLL
      VLL CAC
      MC-Ring and VLL
    Frame Relay VLL (Fpipe) Services
      Frame Relay VLL
      Frame Relay-to-ATM Interworking (FRF.5) VLL
      Traffic Management Support
        Frame Relay Traffic Management
        Ingress SAP Classification and Marking
        Egress Network EXP Marking
        Ingress Network Classification
    IP Interworking VLL (Ipipe) Services
      Ipipe VLL
      IP Interworking VLL Datapath
      Extension to IP VLL for Discovery of Ethernet CE IP Address
        VLL Ethernet SAP Procedures
          VLL FR SAP Procedures
          VLL ATM SAP Procedures
          VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      IPv6 Support on IP Interworking VLL
        IPv6 Datapath Operation
        IPv6 Stack Capability Signaling
    Services Configuration for MPLS-TP
      MPLS-TP SDPs
      VLL Spoke SDP Configuration
        Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
      Configuring MPLS-TP Lock Instruct and Loopback
        MPLS-TP PW Lock Instruct and Loopback Overview
        Lock PW End-Point Model
        PW Redundancy and Lock Instruct and Loopback
        Configuring a Test SAP for an MPLS-TP PW
        Configuring an Administrative Lock
        Configuring a Loopback
    VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      VCCV BVD Support
      VCCV BFD Encapsulation on a Pseudowire
      BFD Session Operation
      Configuring VCCV BFD
    Pseudowire Switching
      Pseudowire Switching with Protection
      Pseudowire Switching Behavior
      Static-to-Dynamic Pseudowire Switching
      Ingress VLAN Swapping
        Ingress VLAN Translation
      Pseudowire Redundancy
      Dynamic Multi-Segment Pseudowire Routing
        Overview
        Pseudowire Routing
          Static Routing
          Explicit Paths
        Configuring VLLs using Dynamic MS-PWs
          Active/Passive T-PE Selection
          Automatic Endpoint Configuration
          Selecting a Path for an MS-PW
          Pseudowire Templates
        Pseudowire Redundancy
        VCCV OAM for Dynamic MS-PWs
        VCCV-Ping on Dynamic MS-PWs
        VCCV-Trace on Dynamic MS-PWs
      Example Dynamic MS-PW Configuration
      VLL Resilience with Two Destination PE Nodes
        Master-Slave Operation
          Interaction with SAP-Specific OAM
          Local Rules at Slave VLL PE
          Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          VLL Resilience for a Switched Pseudowire Path
      Pseudowire SAPs
      Epipe Using BGP-MH Site Support for Ethernet Tunnels
        Operational Overview
        Detailed Operation
          Sample Operation of G.8031 BGP-MH
        BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
        BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        PW Redundancy for BGP MH Site Support for Ethernet Tunnels
        T-LDP Status Notification Handling Rules of BGP-MH Epipes
          Rules for Processing Endpoint SAP Active/Standby Status Bits
          Rules for Processing, Merging Local, and Received Endpoint Operational Status
          Operation for BGP MH Site Support for Ethernet Tunnels
      Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      VLL Resilience for a Switched Pseudowire Path
    Pseudowire Redundancy Service Models
      Redundant VLL Service Model
      T-LDP Status Notification Handling Rules
        Processing Endpoint SAP Active/Standby Status Bits
        Processing and Merging
    High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      Primary Spoke-SDP Fallback to Secondary SAP
      Reversion to Primary Spoke SDP Path
      MC-APS and MC-LAG
        Failure Scenarios
    VLL Using G.8031 Protected Ethernet Tunnels
    MPLS Entropy Label and Hash Label
    BGP Virtual Private Wire Service (VPWS)
      Single-Homed BGP VPWS
      Dual-Homed BGP VPWS
      BGP VPWS Pseudowire Switching
        Pseudowire Signaling
        BGP VPWS Configuration Procedure
        Use of Pseudowire Template for BGP VPWS
        Use of Endpoint for BGP VPWS
    VLL Service Considerations
      SDPs
        SDP Statistics for VPLS and VLL Services
      SAP Encapsulations and Pseudowire Types
        PWE3 N-to-1 Cell Mode
        PWE3 AAL5 SDU Mode
        QoS Policies
        Filter Policies
        MAC Resources
     Configuring a VLL Service with CLI
      Basic Configurations
      Common Configuration Tasks
      Configuring VLL Components
        Creating an Apipe Service
          Configuring Basic Apipe SAP Parameters
          Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          Configuring Apipe SDP Bindings
        Creating a Cpipe Service
          Basic Configuration
          Configuration Requirements
          Configuring Cpipe SAPs and Spoke SDPs
        Creating an Epipe Service
          Configuring Epipe SAP Parameters
          Distributed Epipe SAPs
          Configuring SDP Bindings
        Creating an Fpipe Service
          Configuring Fpipe SAP Parameters
          Configuring Fpipe SDP Bindings
        Creating an Ipipe Service
          Configuring Ipipe SAP Parameters
          Configuring Ipipe SDP Bindings
      Using Spoke SDP Control Words
      Same Fate Epipe VLANs Access Protection
      Pseudowire Configuration Notes
      Configuring Two VLL Paths Terminating on T-PE2
      Configuring VLL Resilience
      Configuring VLL Resilience for a Switched Pseudowire Path
      Configuring BGP Virtual Private Wire Service (VPWS)
        Single-Homed BGP VPWS
        Dual-Homed BGP VPWS
      Service Management Tasks
        Modifying Apipe Service Parameters
        Disabling an Apipe Service
        Re-Enabling an Apipe Service
        Deleting an Apipe Service
        Modifying a Cpipe Service
        Deleting a Cpipe Service
        Modifying Epipe Service Parameters
        Disabling an Epipe Service
        Re-Enabling an Epipe Service
        Deleting an Epipe Service
        Modifying Fpipe Service Parameters
        Disabling an Fpipe Service
        Re-enabling an Fpipe Service
        Deleting an Fpipe Service
        Modifying Ipipe Service Parameters
        Disabling an Ipipe Service
        Re-enabling an Ipipe Service
        Deleting an Ipipe Service
     VLL Service Configuration Command Reference
      Command Hierarchies
        Apipe Service Configuration Commands
        Related Apipe Commands
          Connection Profile Commands
        Cpipe Service Configuration Commands
        Epipe Service Configuration Commands
          Epipe Global Commands
          Epipe SAP Configuration Commands
          Epipe Spoke SDP Configuration Commands
          Template Commands
        Fpipe Service Configuration Commands
        Ipipe Service Configuration Commands
      Command Descriptions
        Generic Commands
        Service Commands
        VLL Global Commands
        VLL SAP Commands
        Circuit Emulation Commands
        ETH-CFM Service Commands
        Service Filter and QoS Policy Commands
        VLL Frame Relay Commands
        VLL SDP Commands
        ATM Commands
        OAM Commands
        Cpipe Commands
        VLL SAP Commands
        CPipe SDP Commands
        Epipe SAP Template Commands
     VLL Show Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VLL Show Commands
        VLL Clear Commands
        VLL Debug Commands
        VLL Tools Commands
   Virtual Private LAN Service
    In This Chapter
    VPLS Service Overview
      VPLS Packet Walkthrough
    VPLS Features
      VPLS Enhancements
      VPLS over MPLS
      VPLS Service Pseudowire VLAN Tag Processing
      VPLS MAC Learning and Packet Forwarding
        MAC Learning Protection
        DEI in IEEE 802.1ad
      VPLS Using G.8031 Protected Ethernet Tunnels
      Pseudowire Control Word
      Table Management
        FIB Size
        FIB Size Alarms
        Local and Remote Aging Timers
        Disable MAC Aging
        Disable MAC Learning
        Unknown MAC Discard
        VPLS and Rate Limiting
        MAC Move
        Auto-Learn MAC Protect
          Operation
      Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      VPLS and Spanning Tree Protocol
        Spanning Tree Operating Modes
        Multiple Spanning Tree
          Redundancy Access to VPLS
        MSTP for QinQ SAPs
        Provider MSTP
          MSTP General Principles
          MSTP in the SR-Series Platform
        Enhancements to the Spanning Tree Protocol
          L2PT Termination
          BPDU Translation
          L2PT and BPDU Translation
      Egress Multicast Groups
        Egress Multicast Group Provisioning
          Required Common SAP Parameters
          SAP Egress QoS Policy
          Efficient Multicast Egress SAP Chaining
          Mirroring and Efficient Multicast Replication
          IOM or XCM Chain Management
          IOM Mode B Capability
      VPLS Redundancy
        Spoke SDP Redundancy for Metro Interconnection
        Spoke SDP Based Redundant Access
        Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          Fast Detection of Peer Failure using BFD
          MC-EP Passive Mode
        Support for Single Chassis Endpoint Mechanisms
          MAC Flush Support in MC-EP
          Block-on-Mesh-Failure Support in MC-EP Scenario
          Support for Force Spoke SDP in MC-EP
          Revertive Behavior for Primary Pseudowire(s) in a MC-EP
        Using B-VPLS for Increased Scalability and Reduced Convergence Times
        MAC Flush Additions for PBB VPLS
      VPLS Access Redundancy
        STP-Based Redundant Access to VPLS
        Redundant Access to VPLS Without STP
      Object Grouping and State Monitoring
         VPLS Applicability — Block on VPLS a Failure
      MAC Flush Message Processing
        Dual Homing to a VPLS Service
        MC-Ring and VPLS
      ACL Next-Hop for VPLS
      SDP Statistics for VPLS and VLL Services
      BGP Auto-Discovery for LDP VPLS
        BGP AD Overview
        Information Model
        FEC Element for T-LDP Signaling
        BGP-AD and Target LDP (T-LDP) Interaction
        SDP Usage
        Automatic Creation of SDPs
        Manually Provisioned SDP
        Automatic Instantiation of Pseudowires (SDP Bindings)
        Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        Resiliency Schemes
      BGP VPLS
        Pseudowire Signaling Details
        Supported VPLS Features
      VCCV BFD Support for VPLS Services
      BGP Multi-Homing for VPLS
        Information Model and Required Extensions to L2VPN NLRI
        Supported Services and Multi-Homing Objects
        Blackhole Avoidance
          MAC Flush to the Core PEs
          Indicating non-DF status towards the access PE or CE
        BGP Multi-Homing for VPLS Inter-Domain Resiliency
      Multicast-Aware VPLS
        IGMP Snooping for VPLS
        MLD Snooping for VPLS
        PIM Snooping for VPLS
          Plain PIM Snooping
          PIM Proxy
        MAC-Based IPv6 Multicast Forwarding
        PIM and IGMP/MLD Snooping Interaction
        Multi-Chassis Synchronization for Layer 2 Snooping States
          IGMP Snooping Synchronization
          MLD Snooping Synchronization
          PIM Snooping for IPv4 Synchronization
        VPLS Multicast-Aware High Availability Features
      RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      MPLS Entropy Label and Hash Label
    Routed VPLS and I-VPLS
      IES or VPRN IP Interface Binding
        Assigning a Service Name to a VPLS Service
        Service Binding Requirements
        Bound Service Name Assignment
        Binding a Service Name to an IP Interface
        Bound Service Deletion or Service Name Removal
        IP Interface Attached VPLS Service Constraints
        IP Interface and VPLS Operational State Coordination
      IP Interface MTU and Fragmentation
        Unicast IP Routing into a VPLS Service
      ARP and VPLS FIB Interactions
        Routed VPLS Specific ARP Cache Behavior
      The allow-ip-int-bind VPLS Flag
        Routed VPLS SAPs Only Supported on Standard Ethernet Ports
        Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
        Network Ports Restricted to FP2-Based Systems or IOMs
        LAG Port Membership Constraints
        Routed VPLS Feature Restrictions
        Routed I-VPLS Feature Restrictions
      IES IP Interface VPLS Binding and Chassis Mode Interaction
      VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
      Route Leaking Between Routing Contexts
        Ingress LAG and FP1 to Routed VPLS Discards
      IPv4 and IPv6 Multicast Routing Support
      BGP Auto Discovery (BGP-AD) for Routed VPLS Support
      Routed VPLS Caveats
        VPLS SAP Ingress IP Filter Override
        IP Interface Defined Egress QoS Reclassification
        Remarking for VPLS and Routed Packets
        7450 Mixed Mode Chassis
        IPv4 Multicast Routing
        Routed VPLS Supported Routing Related Protocols
        Spanning Tree and Split Horizon
    VPLS Service Considerations
      SAP Encapsulations
      VLAN Processing
      Ingress VLAN Swapping
      Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        Configure the MVRP Infrastructure using an M-VPLS Context
        Instantiate Related VLAN FIBs and Trunks in MVRP Scope
        MVRP Activation of Service Connectivity
        MVRP Control Plane
        STP-MVRP Interaction
          Interaction Between MVRP and Instantiated SAP Status
          Using Temporary Flooding to Optimize Failover Times
      VPLS E-Tree Services
        VPLS E-Tree Services Overview
        Leaf-ac and Root-ac SAPs
        Leaf-ac and Root-ac SDP Binds
        Root-leaf-tag SAPs
        Root-leaf-tag SDP Binds
        Interaction between VPLS E-Tree Services and Other Features
     Configuring a VPLS Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPLS Components
        Configuring Egress Multicast Groups
        Creating a VPLS Service
        Enabling Multiple MAC Registration Protocol (MMRP)
          Enabling MAC Move
          Configuring STP Bridge Parameters in a VPLS
        Configuring GSMP Parameters
        Configuring a VPLS SAP
          Local VPLS SAPs
          Distributed VPLS SAPs
          Configuring SAP-Specific STP Parameters
          STP SAP Operational States
          Configuring VPLS SAPs with Split Horizon
          Configuring MAC Learning Protection
        Applying an Egress Multicast Group to a VPLS Service SAP
        Configuring SAP Subscriber Management Parameters
        MSTP Control over Ethernet Tunnels
        Configuring SDP Bindings
        Configuring Overrides on Service SAPs
          Configuring Spoke SDP Specific STP Parameters
          Spoke SDP STP Operational States
          Configuring VPLS Spoke SDPs with Split Horizon
      Configuring VPLS Redundancy
        Creating a Management VPLS for SAP Protection
        Creating a Management VPLS for Spoke SDP Protection
        Configuring Load Balancing with Management VPLS
        Configuring Selective MAC Flush
        Configuring Multi-Chassis Endpoints
      ATM/Frame Relay PVC Access and Termination on a VPLS Service
      Configuring BGP Auto-Discovery
        Configuration Steps
        LDP Signaling
        Pseudowire Template
      Configuring BGP VPLS
        Configuring a VPLS Management Interface
      Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      Configuring VPLS E-Tree Services
    Service Management Tasks
      Modifying VPLS Service Parameters
      Modifying Management VPLS Parameters
      Deleting a Management VPLS
      Disabling a Management VPLS
      Deleting a VPLS Service
      Disabling a VPLS Service
      Re-Enabling a VPLS Service
     VPLS Service Configuration Command Reference
      Command Hierarchies
        Global Commands
        Oper Group Commands
        SAP Commands
        Template Commands
        Mesh SDP Commands
        Spoke SDP Commands
        Provider Tunnel Commands
        Egress Multicast Group Commands
        Routed VPLS Commands
        Multi-Chassis Redundancy Commands
      Command Descriptions
        Generic Commands
        VPLS Service Commands
        VPLS Interface Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        ETH-CFM Service Commands
          VPLS SAP ATM Commands
          VPLS Filter and QoS Policy Commands
          VPLS Template Commands
          Provider Tunnel Commands
          VPLS SDP Commands
          SAP Subscriber Management Commands
        VPLS Multicast Commands
          VPLS DHCP and Anti-Spoofing Commands
        Egress Multicast Group Commands
        BGP Auto-Discovery Commands
        Redundancy Commands
     VPLS Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
          Show Multi-Chassis Endpoint Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VPLS Show Commands
        IGMP Snooping Show Commands
        IGMP Commands
          Show Multi-Chassis Endpoint Commands
        VPLS Clear Commands
        VPLS Debug Commands
   IEEE 802.1ah Provider Backbone Bridging
    In This Chapter
    IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    PBB Features
      Integrated PBB-VPLS Solution
      PBB Technology
      PBB Mapping to Existing VPLS Configurations
      SAP and SDP Support
        PBB B-VPLS
        PBB I-VPLS
      PBB Packet Walkthrough
        PBB Control Planes
      Shortest Path Bridging MAC Mode (SPBM)
        Flooding and Learning Versus Link State
        SPB for B-VPLS
        Control B-VPLS and User B-VPLS
        Shortest Path and Single Tree
        Data Path and Forwarding
        SPB Ethernet OAM
        SPB Levels
      SPBM to Non-SPBM Interworking
        Static MACs and Static ISIDs
        Epipe Static Configuration
          I-VPLS Static Config
        SPBM ISID Policies
      ISID Policy Control
        Static ISID Advertisement
        I-VPLS for Unicast Service
      Default Behaviors
      Example Network Configuration
        Sample Configuration for Dut-A
          Show Commands Outputs
          Debug Commands
          Tools Commands
          Clear Commands
      IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      MMRP Support Over B-VPLS SAPs and SDPs
        I-VPLS Changes and Related MMRP Behavior
        Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        Optimization for Improved Convergence Time
        Controlling MRP Scope using MRP Policies
      PBB and BGP-AD
      PBB ELINE Service
        Non-Redundant PBB Epipe Spoke Termination
      PBB Using G.8031-Protected Ethernet Tunnels
        Solution Overview
        Detailed Solution Description
        Detailed PBB Emulated LAG Solution Description
        Support Service and Solution Combinations
      Periodic MAC Notification
      MAC Flush
        PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          Porting existing VPLS LDP MAC Flush in PBB VPLS
          PBB Blackholing Issue
          LDP MAC Flush Solution for PBB Blackholing
      Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        Solution Description for I-VPLS Over Native PBB Core
        Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          Dual-Homing into PBB Epipe - Local Switching Use Case
      BGP Multi-homing for I-VPLS
      Access Multi-Homing over MPLS for PBB Epipes
      PBB and IGMP/MLD Snooping
      PBB QoS
        Transparency of Customer QoS Indication through PBB Backbone
          Configuration Examples
          Details Solution Description
      Egress B-SAP per ISID Shaping
        B-SAP Egress ISID Shaping Configuration
        Provisioning Model
        Egress Queue Scheduling
        B-SAP per-ISID Shaping Configuration Example
      PBB OAM
        Mirroring
        OAM Commands
        CFM Support
    Configuration Examples
      PBB using G.8031 Protected Ethernet Tunnels
      MC-LAG Multihoming for Native PBB
      Access Multi-Homing over MPLS for PBB Epipes
     PBB Configuration Command Reference
      Command Hierarchies
        Global Commands
        SAP Commands
        Mesh SDP Commands
        Spoke SDP Commands
        BGP-MH for I-VPLS Commands
      Command Descriptions
        VPLS Service Commands
     PBB Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         PBB Show Commands
        PBB Clear Commands
        PBB Debug Commands
   Ethernet Virtual Private Networks (EVPNs)
    In This Chapter
    Overview
    EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
    EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
    EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
    EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
    EVPN for MPLS Tunnels in ELAN Services
    EVPN for MPLS Tunnels in ELINE Services
    EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    VXLAN
      VXLAN ECMP and LAG
      VXLAN VPLS Tag Handling
      VXLAN MTU Considerations
      VXLAN QoS
        Ingress
        Egress
      VXLAN Ping
      IGMP-Snooping on VXLAN
    BGP-EVPN Control Plane for VXLAN Overlay Tunnels
    EVPN for VXLAN in VPLS Services
      Resiliency and BGP Multi-Homing
      Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
      Use of the unknown-mac-route
    EVPN for VXLAN in R-VPLS Services
    EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
    EVPN for VXLAN in EVPN Tunnel R-VPLS Services
    DC GW integration with the Nuage Virtual Services Directory (VSD)
      XMPP Interface on the DC GW
      Overview of the Static-Dynamic VSD Integration Model
        Step 1
        Step 2
        Step 3
        Step 4
        Step 5
      VSD-Domains and Association to Static-Dynamic Services
        VSD-Domain Type L2-DOMAIN
        VSD-Domain Type L2-DOMAIN-IRB
        VSD-Domain Type VRF-GRE
        VSD-Domain Type VRF-VXLAN
    Fully-Dynamic VSD Integration Model
      Step 1
      Step 2
      Step 3
      Step 4
      Step 5
      Python Script Implementation Details
      Provisioning Filters using the VSD Fully Dynamic Model
    BGP-EVPN Control Plane for MPLS Tunnels
    EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
      EVPN and VPLS Integration
      Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
      EVPN Multi-Homing in VPLS Services
      EVPN All-Active Multi-Homing
      All-Active Multi-Homing Service Model
      ES Discovery and DF Election Procedures
      Aliasing
      Network Failures and Convergence for All-Active Multi-Homing
        Logical Failures on Ethernet Segments and Black-Holes
        Transient Issues Due to MAC Route Delays
      EVPN Single-Active Multi-Homing
        Single-Active Multi-Homing Service Model
        ES and DF Election Procedures
        Backup PE Function
        Network Failures and Convergence for Single-Active Multi-Homing
          Logical Failures on Ethernet Segments and Black-Holes
    BGP-EVPN Control Plane for EVPN-VPWS
    EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
      Using A/S PW and MC-LAG with EVPN-VPWS Epipes
    EVPN for MPLS Tunnels in Routed VPLS Services
    P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
    BGP-EVPN Control Plane for PBB-EVPN
      EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
      EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
      EVPN Route Type 4 - Ethernet Segment Route
    PBB-EVPN for I-VPLS and PBB Epipe Services
      Flood Containment for I-VPLS Services
      PBB-EVPN and PBB-VPLS Integration
      PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
        System BMAC Assignment in PBB-EVPN
        PBB-EVPN all-active multi-homing service model
          Network failures and convergence for all-active multi-homing
        PBB-EVPN Single-Active Multi-Homing Service Model
          Network Failures and Convergence for Single-Active Multihoming
        PBB-Epipes and EVPN Multi-Homing
        PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
    ARP/ND Snooping and Proxy Support
      Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
      Proxy-ND and the Router Flag in Neighbor Advertisement messages
        Procedure to Add the R Flag to a Specified Entry
    BGP-EVPN MAC-Mobility
    BGP-EVPN MAC-Duplication
    Conditional Static MAC and Protection
    Auto-Learn MAC Protect and Restricting Protected Source MACs
    Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
    CFM Interaction with EVPN Services
    DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
      Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
      Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    BGP and EVPN Route Selection for EVPN Routes
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
    Interaction of PBB-EVPN with Existing VPLS Features
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
    Routing Policies for BGP EVPN IP Prefixes
    MPLS Entropy Label and Hash Label
    Configuring an EVPN Service with CLI
      EVPN-VXLAN Configuration Examples
        Layer 2 PE Example
        EVPN for VXLAN in R-VPLS Services Example
        EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      EVPN-MPLS Configuration Examples
        EVPN All-active Multi-homing Example
        EVPN Single-active Multi-homing Example
      PBB-EVPN Configuration Examples
        PBB-EVPN All-active Multi-homing Example
        PBB-EVPN Single-active Multi-homing Example
    EVPN Command Reference
      Command Hierarchies
        EVPN Configuration Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        EVPN Configuration Commands
        Show Configuration Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
   VLL Services
    In This Chapter
    ATM VLL (Apipe) Services
      ATM VLL For End-to-End ATM Service
      ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
      Traffic Management Support
        Ingress Network Classification
        Ingress Queuing and Shaping on the IOM
        Egress Queuing and Shaping on the IOM
        Egress Shaping/Scheduling
    Circuit Emulation Services (Cpipe)
      Mobile Infrastructure
      Circuit Emulation Modes
      Circuit Emulation Parameters
        Circuit Emulation Modes
        Absolute Mode Option
        Payload Size
        Jitter Buffer
        CES Circuit Operation
      Services for Transporting CES Circuits
      Network Synchronization Considerations
      Cpipe Payload
    Ethernet Pipe (Epipe) Services
      Epipe Service Overview
      Epipe Service Pseudowire VLAN Tag Processing
      Epipe Up Operational State Configuration Option
      Epipe with PBB
      Epipe over L2TPv3
      Ethernet Interworking VLL
      VLL CAC
      MC-Ring and VLL
    Frame Relay VLL (Fpipe) Services
      Frame Relay VLL
      Frame Relay-to-ATM Interworking (FRF.5) VLL
      Traffic Management Support
        Frame Relay Traffic Management
        Ingress SAP Classification and Marking
        Egress Network EXP Marking
        Ingress Network Classification
    IP Interworking VLL (Ipipe) Services
      Ipipe VLL
      IP Interworking VLL Datapath
      Extension to IP VLL for Discovery of Ethernet CE IP Address
        VLL Ethernet SAP Procedures
          VLL FR SAP Procedures
          VLL ATM SAP Procedures
          VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      IPv6 Support on IP Interworking VLL
        IPv6 Datapath Operation
        IPv6 Stack Capability Signaling
    Services Configuration for MPLS-TP
      MPLS-TP SDPs
      VLL Spoke SDP Configuration
        Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
      Configuring MPLS-TP Lock Instruct and Loopback
        MPLS-TP PW Lock Instruct and Loopback Overview
        Lock PW End-Point Model
        PW Redundancy and Lock Instruct and Loopback
        Configuring a Test SAP for an MPLS-TP PW
        Configuring an Administrative Lock
        Configuring a Loopback
    VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      VCCV BVD Support
      VCCV BFD Encapsulation on a Pseudowire
      BFD Session Operation
      Configuring VCCV BFD
    Pseudowire Switching
      Pseudowire Switching with Protection
      Pseudowire Switching Behavior
      Static-to-Dynamic Pseudowire Switching
      Ingress VLAN Swapping
        Ingress VLAN Translation
      Pseudowire Redundancy
      Dynamic Multi-Segment Pseudowire Routing
        Overview
        Pseudowire Routing
          Static Routing
          Explicit Paths
        Configuring VLLs using Dynamic MS-PWs
          Active/Passive T-PE Selection
          Automatic Endpoint Configuration
          Selecting a Path for an MS-PW
          Pseudowire Templates
        Pseudowire Redundancy
        VCCV OAM for Dynamic MS-PWs
        VCCV-Ping on Dynamic MS-PWs
        VCCV-Trace on Dynamic MS-PWs
      Example Dynamic MS-PW Configuration
      VLL Resilience with Two Destination PE Nodes
        Master-Slave Operation
          Interaction with SAP-Specific OAM
          Local Rules at Slave VLL PE
          Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          VLL Resilience for a Switched Pseudowire Path
      Pseudowire SAPs
      Epipe Using BGP-MH Site Support for Ethernet Tunnels
        Operational Overview
        Detailed Operation
          Sample Operation of G.8031 BGP-MH
        BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
        BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        PW Redundancy for BGP MH Site Support for Ethernet Tunnels
        T-LDP Status Notification Handling Rules of BGP-MH Epipes
          Rules for Processing Endpoint SAP Active/Standby Status Bits
          Rules for Processing, Merging Local, and Received Endpoint Operational Status
          Operation for BGP MH Site Support for Ethernet Tunnels
      Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      VLL Resilience for a Switched Pseudowire Path
    Pseudowire Redundancy Service Models
      Redundant VLL Service Model
      T-LDP Status Notification Handling Rules
        Processing Endpoint SAP Active/Standby Status Bits
        Processing and Merging
    High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      Primary Spoke-SDP Fallback to Secondary SAP
      Reversion to Primary Spoke SDP Path
      MC-APS and MC-LAG
        Failure Scenarios
    VLL Using G.8031 Protected Ethernet Tunnels
    MPLS Entropy Label and Hash Label
    BGP Virtual Private Wire Service (VPWS)
      Single-Homed BGP VPWS
      Dual-Homed BGP VPWS
      BGP VPWS Pseudowire Switching
        Pseudowire Signaling
        BGP VPWS Configuration Procedure
        Use of Pseudowire Template for BGP VPWS
        Use of Endpoint for BGP VPWS
    VLL Service Considerations
      SDPs
        SDP Statistics for VPLS and VLL Services
      SAP Encapsulations and Pseudowire Types
        PWE3 N-to-1 Cell Mode
        PWE3 AAL5 SDU Mode
        QoS Policies
        Filter Policies
        MAC Resources
     Configuring a VLL Service with CLI
      Basic Configurations
      Common Configuration Tasks
      Configuring VLL Components
        Creating an Apipe Service
          Configuring Basic Apipe SAP Parameters
          Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          Configuring Apipe SDP Bindings
        Creating a Cpipe Service
          Basic Configuration
          Configuration Requirements
          Configuring Cpipe SAPs and Spoke SDPs
        Creating an Epipe Service
          Configuring Epipe SAP Parameters
          Distributed Epipe SAPs
          Configuring SDP Bindings
        Creating an Fpipe Service
          Configuring Fpipe SAP Parameters
          Configuring Fpipe SDP Bindings
        Creating an Ipipe Service
          Configuring Ipipe SAP Parameters
          Configuring Ipipe SDP Bindings
      Using Spoke SDP Control Words
      Same Fate Epipe VLANs Access Protection
      Pseudowire Configuration Notes
      Configuring Two VLL Paths Terminating on T-PE2
      Configuring VLL Resilience
      Configuring VLL Resilience for a Switched Pseudowire Path
      Configuring BGP Virtual Private Wire Service (VPWS)
        Single-Homed BGP VPWS
        Dual-Homed BGP VPWS
      Service Management Tasks
        Modifying Apipe Service Parameters
        Disabling an Apipe Service
        Re-Enabling an Apipe Service
        Deleting an Apipe Service
        Modifying a Cpipe Service
        Deleting a Cpipe Service
        Modifying Epipe Service Parameters
        Disabling an Epipe Service
        Re-Enabling an Epipe Service
        Deleting an Epipe Service
        Modifying Fpipe Service Parameters
        Disabling an Fpipe Service
        Re-enabling an Fpipe Service
        Deleting an Fpipe Service
        Modifying Ipipe Service Parameters
        Disabling an Ipipe Service
        Re-enabling an Ipipe Service
        Deleting an Ipipe Service
     VLL Service Configuration Command Reference
      Command Hierarchies
        Apipe Service Configuration Commands
        Related Apipe Commands
          Connection Profile Commands
        Cpipe Service Configuration Commands
        Epipe Service Configuration Commands
          Epipe Global Commands
          Epipe SAP Configuration Commands
          Epipe Spoke SDP Configuration Commands
          Template Commands
        Fpipe Service Configuration Commands
        Ipipe Service Configuration Commands
      Command Descriptions
        Generic Commands
        Service Commands
        VLL Global Commands
        VLL SAP Commands
        Circuit Emulation Commands
        ETH-CFM Service Commands
        Service Filter and QoS Policy Commands
        VLL Frame Relay Commands
        VLL SDP Commands
        ATM Commands
        OAM Commands
        Cpipe Commands
        VLL SAP Commands
        CPipe SDP Commands
        Epipe SAP Template Commands
     VLL Show Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VLL Show Commands
        VLL Clear Commands
        VLL Debug Commands
        VLL Tools Commands
   Virtual Private LAN Service
    In This Chapter
    VPLS Service Overview
      VPLS Packet Walkthrough
    VPLS Features
      VPLS Enhancements
      VPLS over MPLS
      VPLS Service Pseudowire VLAN Tag Processing
      VPLS MAC Learning and Packet Forwarding
        MAC Learning Protection
        DEI in IEEE 802.1ad
      VPLS Using G.8031 Protected Ethernet Tunnels
      Pseudowire Control Word
      Table Management
        FIB Size
        FIB Size Alarms
        Local and Remote Aging Timers
        Disable MAC Aging
        Disable MAC Learning
        Unknown MAC Discard
        VPLS and Rate Limiting
        MAC Move
        Auto-Learn MAC Protect
          Operation
      Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      VPLS and Spanning Tree Protocol
        Spanning Tree Operating Modes
        Multiple Spanning Tree
          Redundancy Access to VPLS
        MSTP for QinQ SAPs
        Provider MSTP
          MSTP General Principles
          MSTP in the SR-Series Platform
        Enhancements to the Spanning Tree Protocol
          L2PT Termination
          BPDU Translation
          L2PT and BPDU Translation
      Egress Multicast Groups
        Egress Multicast Group Provisioning
          Required Common SAP Parameters
          SAP Egress QoS Policy
          Efficient Multicast Egress SAP Chaining
          Mirroring and Efficient Multicast Replication
          IOM or XCM Chain Management
          IOM Mode B Capability
      VPLS Redundancy
        Spoke SDP Redundancy for Metro Interconnection
        Spoke SDP Based Redundant Access
        Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          Fast Detection of Peer Failure using BFD
          MC-EP Passive Mode
        Support for Single Chassis Endpoint Mechanisms
          MAC Flush Support in MC-EP
          Block-on-Mesh-Failure Support in MC-EP Scenario
          Support for Force Spoke SDP in MC-EP
          Revertive Behavior for Primary Pseudowire(s) in a MC-EP
        Using B-VPLS for Increased Scalability and Reduced Convergence Times
        MAC Flush Additions for PBB VPLS
      VPLS Access Redundancy
        STP-Based Redundant Access to VPLS
        Redundant Access to VPLS Without STP
      Object Grouping and State Monitoring
         VPLS Applicability — Block on VPLS a Failure
      MAC Flush Message Processing
        Dual Homing to a VPLS Service
        MC-Ring and VPLS
      ACL Next-Hop for VPLS
      SDP Statistics for VPLS and VLL Services
      BGP Auto-Discovery for LDP VPLS
        BGP AD Overview
        Information Model
        FEC Element for T-LDP Signaling
        BGP-AD and Target LDP (T-LDP) Interaction
        SDP Usage
        Automatic Creation of SDPs
        Manually Provisioned SDP
        Automatic Instantiation of Pseudowires (SDP Bindings)
        Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        Resiliency Schemes
      BGP VPLS
        Pseudowire Signaling Details
        Supported VPLS Features
      VCCV BFD Support for VPLS Services
      BGP Multi-Homing for VPLS
        Information Model and Required Extensions to L2VPN NLRI
        Supported Services and Multi-Homing Objects
        Blackhole Avoidance
          MAC Flush to the Core PEs
          Indicating non-DF status towards the access PE or CE
        BGP Multi-Homing for VPLS Inter-Domain Resiliency
      Multicast-Aware VPLS
        IGMP Snooping for VPLS
        MLD Snooping for VPLS
        PIM Snooping for VPLS
          Plain PIM Snooping
          PIM Proxy
        MAC-Based IPv6 Multicast Forwarding
        PIM and IGMP/MLD Snooping Interaction
        Multi-Chassis Synchronization for Layer 2 Snooping States
          IGMP Snooping Synchronization
          MLD Snooping Synchronization
          PIM Snooping for IPv4 Synchronization
        VPLS Multicast-Aware High Availability Features
      RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      MPLS Entropy Label and Hash Label
    Routed VPLS and I-VPLS
      IES or VPRN IP Interface Binding
        Assigning a Service Name to a VPLS Service
        Service Binding Requirements
        Bound Service Name Assignment
        Binding a Service Name to an IP Interface
        Bound Service Deletion or Service Name Removal
        IP Interface Attached VPLS Service Constraints
        IP Interface and VPLS Operational State Coordination
      IP Interface MTU and Fragmentation
        Unicast IP Routing into a VPLS Service
      ARP and VPLS FIB Interactions
        Routed VPLS Specific ARP Cache Behavior
      The allow-ip-int-bind VPLS Flag
        Routed VPLS SAPs Only Supported on Standard Ethernet Ports
        Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
        Network Ports Restricted to FP2-Based Systems or IOMs
        LAG Port Membership Constraints
        Routed VPLS Feature Restrictions
        Routed I-VPLS Feature Restrictions
      IES IP Interface VPLS Binding and Chassis Mode Interaction
      VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
      Route Leaking Between Routing Contexts
        Ingress LAG and FP1 to Routed VPLS Discards
      IPv4 and IPv6 Multicast Routing Support
      BGP Auto Discovery (BGP-AD) for Routed VPLS Support
      Routed VPLS Caveats
        VPLS SAP Ingress IP Filter Override
        IP Interface Defined Egress QoS Reclassification
        Remarking for VPLS and Routed Packets
        7450 Mixed Mode Chassis
        IPv4 Multicast Routing
        Routed VPLS Supported Routing Related Protocols
        Spanning Tree and Split Horizon
    VPLS Service Considerations
      SAP Encapsulations
      VLAN Processing
      Ingress VLAN Swapping
      Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        Configure the MVRP Infrastructure using an M-VPLS Context
        Instantiate Related VLAN FIBs and Trunks in MVRP Scope
        MVRP Activation of Service Connectivity
        MVRP Control Plane
        STP-MVRP Interaction
          Interaction Between MVRP and Instantiated SAP Status
          Using Temporary Flooding to Optimize Failover Times
      VPLS E-Tree Services
        VPLS E-Tree Services Overview
        Leaf-ac and Root-ac SAPs
        Leaf-ac and Root-ac SDP Binds
        Root-leaf-tag SAPs
        Root-leaf-tag SDP Binds
        Interaction between VPLS E-Tree Services and Other Features
     Configuring a VPLS Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPLS Components
        Configuring Egress Multicast Groups
        Creating a VPLS Service
        Enabling Multiple MAC Registration Protocol (MMRP)
          Enabling MAC Move
          Configuring STP Bridge Parameters in a VPLS
        Configuring GSMP Parameters
        Configuring a VPLS SAP
          Local VPLS SAPs
          Distributed VPLS SAPs
          Configuring SAP-Specific STP Parameters
          STP SAP Operational States
          Configuring VPLS SAPs with Split Horizon
          Configuring MAC Learning Protection
        Applying an Egress Multicast Group to a VPLS Service SAP
        Configuring SAP Subscriber Management Parameters
        MSTP Control over Ethernet Tunnels
        Configuring SDP Bindings
        Configuring Overrides on Service SAPs
          Configuring Spoke SDP Specific STP Parameters
          Spoke SDP STP Operational States
          Configuring VPLS Spoke SDPs with Split Horizon
      Configuring VPLS Redundancy
        Creating a Management VPLS for SAP Protection
        Creating a Management VPLS for Spoke SDP Protection
        Configuring Load Balancing with Management VPLS
        Configuring Selective MAC Flush
        Configuring Multi-Chassis Endpoints
      ATM/Frame Relay PVC Access and Termination on a VPLS Service
      Configuring BGP Auto-Discovery
        Configuration Steps
        LDP Signaling
        Pseudowire Template
      Configuring BGP VPLS
        Configuring a VPLS Management Interface
      Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      Configuring VPLS E-Tree Services
    Service Management Tasks
      Modifying VPLS Service Parameters
      Modifying Management VPLS Parameters
      Deleting a Management VPLS
      Disabling a Management VPLS
      Deleting a VPLS Service
      Disabling a VPLS Service
      Re-Enabling a VPLS Service
     VPLS Service Configuration Command Reference
      Command Hierarchies
        Global Commands
        Oper Group Commands
        SAP Commands
        Template Commands
        Mesh SDP Commands
        Spoke SDP Commands
        Provider Tunnel Commands
        Egress Multicast Group Commands
        Routed VPLS Commands
        Multi-Chassis Redundancy Commands
      Command Descriptions
        Generic Commands
        VPLS Service Commands
        VPLS Interface Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        ETH-CFM Service Commands
          VPLS SAP ATM Commands
          VPLS Filter and QoS Policy Commands
          VPLS Template Commands
          Provider Tunnel Commands
          VPLS SDP Commands
          SAP Subscriber Management Commands
        VPLS Multicast Commands
          VPLS DHCP and Anti-Spoofing Commands
        Egress Multicast Group Commands
        BGP Auto-Discovery Commands
        Redundancy Commands
     VPLS Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
          Show Multi-Chassis Endpoint Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VPLS Show Commands
        IGMP Snooping Show Commands
        IGMP Commands
          Show Multi-Chassis Endpoint Commands
        VPLS Clear Commands
        VPLS Debug Commands
   IEEE 802.1ah Provider Backbone Bridging
    In This Chapter
    IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    PBB Features
      Integrated PBB-VPLS Solution
      PBB Technology
      PBB Mapping to Existing VPLS Configurations
      SAP and SDP Support
        PBB B-VPLS
        PBB I-VPLS
      PBB Packet Walkthrough
        PBB Control Planes
      Shortest Path Bridging MAC Mode (SPBM)
        Flooding and Learning Versus Link State
        SPB for B-VPLS
        Control B-VPLS and User B-VPLS
        Shortest Path and Single Tree
        Data Path and Forwarding
        SPB Ethernet OAM
        SPB Levels
      SPBM to Non-SPBM Interworking
        Static MACs and Static ISIDs
        Epipe Static Configuration
          I-VPLS Static Config
        SPBM ISID Policies
      ISID Policy Control
        Static ISID Advertisement
        I-VPLS for Unicast Service
      Default Behaviors
      Example Network Configuration
        Sample Configuration for Dut-A
          Show Commands Outputs
          Debug Commands
          Tools Commands
          Clear Commands
      IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      MMRP Support Over B-VPLS SAPs and SDPs
        I-VPLS Changes and Related MMRP Behavior
        Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        Optimization for Improved Convergence Time
        Controlling MRP Scope using MRP Policies
      PBB and BGP-AD
      PBB ELINE Service
        Non-Redundant PBB Epipe Spoke Termination
      PBB Using G.8031-Protected Ethernet Tunnels
        Solution Overview
        Detailed Solution Description
        Detailed PBB Emulated LAG Solution Description
        Support Service and Solution Combinations
      Periodic MAC Notification
      MAC Flush
        PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          Porting existing VPLS LDP MAC Flush in PBB VPLS
          PBB Blackholing Issue
          LDP MAC Flush Solution for PBB Blackholing
      Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        Solution Description for I-VPLS Over Native PBB Core
        Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          Dual-Homing into PBB Epipe - Local Switching Use Case
      BGP Multi-homing for I-VPLS
      Access Multi-Homing over MPLS for PBB Epipes
      PBB and IGMP/MLD Snooping
      PBB QoS
        Transparency of Customer QoS Indication through PBB Backbone
          Configuration Examples
          Details Solution Description
      Egress B-SAP per ISID Shaping
        B-SAP Egress ISID Shaping Configuration
        Provisioning Model
        Egress Queue Scheduling
        B-SAP per-ISID Shaping Configuration Example
      PBB OAM
        Mirroring
        OAM Commands
        CFM Support
    Configuration Examples
      PBB using G.8031 Protected Ethernet Tunnels
      MC-LAG Multihoming for Native PBB
      Access Multi-Homing over MPLS for PBB Epipes
     PBB Configuration Command Reference
      Command Hierarchies
        Global Commands
        SAP Commands
        Mesh SDP Commands
        Spoke SDP Commands
        BGP-MH for I-VPLS Commands
      Command Descriptions
        VPLS Service Commands
     PBB Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         PBB Show Commands
        PBB Clear Commands
        PBB Debug Commands
   Ethernet Virtual Private Networks (EVPNs)
    In This Chapter
    Overview
    EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
    EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
    EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
    EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
    EVPN for MPLS Tunnels in ELAN Services
    EVPN for MPLS Tunnels in ELINE Services
    EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    VXLAN
      VXLAN ECMP and LAG
      VXLAN VPLS Tag Handling
      VXLAN MTU Considerations
      VXLAN QoS
        Ingress
        Egress
      VXLAN Ping
      IGMP-Snooping on VXLAN
    BGP-EVPN Control Plane for VXLAN Overlay Tunnels
    EVPN for VXLAN in VPLS Services
      Resiliency and BGP Multi-Homing
      Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
      Use of the unknown-mac-route
    EVPN for VXLAN in R-VPLS Services
    EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
    EVPN for VXLAN in EVPN Tunnel R-VPLS Services
    DC GW integration with the Nuage Virtual Services Directory (VSD)
      XMPP Interface on the DC GW
      Overview of the Static-Dynamic VSD Integration Model
        Step 1
        Step 2
        Step 3
        Step 4
        Step 5
      VSD-Domains and Association to Static-Dynamic Services
        VSD-Domain Type L2-DOMAIN
        VSD-Domain Type L2-DOMAIN-IRB
        VSD-Domain Type VRF-GRE
        VSD-Domain Type VRF-VXLAN
    Fully-Dynamic VSD Integration Model
      Step 1
      Step 2
      Step 3
      Step 4
      Step 5
      Python Script Implementation Details
      Provisioning Filters using the VSD Fully Dynamic Model
    BGP-EVPN Control Plane for MPLS Tunnels
    EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
      EVPN and VPLS Integration
      Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
      EVPN Multi-Homing in VPLS Services
      EVPN All-Active Multi-Homing
      All-Active Multi-Homing Service Model
      ES Discovery and DF Election Procedures
      Aliasing
      Network Failures and Convergence for All-Active Multi-Homing
        Logical Failures on Ethernet Segments and Black-Holes
        Transient Issues Due to MAC Route Delays
      EVPN Single-Active Multi-Homing
        Single-Active Multi-Homing Service Model
        ES and DF Election Procedures
        Backup PE Function
        Network Failures and Convergence for Single-Active Multi-Homing
          Logical Failures on Ethernet Segments and Black-Holes
    BGP-EVPN Control Plane for EVPN-VPWS
    EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
      Using A/S PW and MC-LAG with EVPN-VPWS Epipes
    EVPN for MPLS Tunnels in Routed VPLS Services
    P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
    BGP-EVPN Control Plane for PBB-EVPN
      EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
      EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
      EVPN Route Type 4 - Ethernet Segment Route
    PBB-EVPN for I-VPLS and PBB Epipe Services
      Flood Containment for I-VPLS Services
      PBB-EVPN and PBB-VPLS Integration
      PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
        System BMAC Assignment in PBB-EVPN
        PBB-EVPN all-active multi-homing service model
          Network failures and convergence for all-active multi-homing
        PBB-EVPN Single-Active Multi-Homing Service Model
          Network Failures and Convergence for Single-Active Multihoming
        PBB-Epipes and EVPN Multi-Homing
        PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
    ARP/ND Snooping and Proxy Support
      Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
      Proxy-ND and the Router Flag in Neighbor Advertisement messages
        Procedure to Add the R Flag to a Specified Entry
    BGP-EVPN MAC-Mobility
    BGP-EVPN MAC-Duplication
    Conditional Static MAC and Protection
    Auto-Learn MAC Protect and Restricting Protected Source MACs
    Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
    CFM Interaction with EVPN Services
    DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
      Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
      Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    BGP and EVPN Route Selection for EVPN Routes
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
    Interaction of PBB-EVPN with Existing VPLS Features
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
    Routing Policies for BGP EVPN IP Prefixes
    MPLS Entropy Label and Hash Label
    Configuring an EVPN Service with CLI
      EVPN-VXLAN Configuration Examples
        Layer 2 PE Example
        EVPN for VXLAN in R-VPLS Services Example
        EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      EVPN-MPLS Configuration Examples
        EVPN All-active Multi-homing Example
        EVPN Single-active Multi-homing Example
      PBB-EVPN Configuration Examples
        PBB-EVPN All-active Multi-homing Example
        PBB-EVPN Single-active Multi-homing Example
    EVPN Command Reference
      Command Hierarchies
        EVPN Configuration Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        EVPN Configuration Commands
        Show Configuration Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Layer 3 Services Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
   Internet Enhanced Service
    In This Chapter
    IES Service Overview
    IES Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
          QPPB Applications
          Inter-AS Coordination of QoS Policies
          Traffic Differentiation Based on Route Characteristics
        QPPB
          Associating an FC and Priority with a Route
          Displaying QoS Information Associated with Routes
          Enabling QPPB on an IP Interface
          QPPB When Next-Hops are Resolved by QPPB Routes
          QPPB and Multiple Paths to a Destination
          QPPB and Policy-Based Routing
        QPPB and GRT Lookup
          QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
          IES IP Interface Applicability
      Subscriber Interfaces
        IPv6 Enhanced Subscriber Management (ESM)
        RADIUS Accounting
      SAPs
        Encapsulations
        ATM SAP Encapsulations for IES
        Pseudowire SAPs
        Encapsulation
        Pseudowire SAP Configuration
        QoS for Pseudowire Ports and Pseudowire SAPs
        Shaping and Bandwidth Control
        Lag Considerations
        Last Mile Packet Size Adjustment
        Redundancy with Pseudowire SAPs
        Operational Group Support for PW Ports
      Routing Protocols
        CPE Connectivity Check
      QoS Policies
      Filter Policies
      MPLS Entropy Label and Hash Label
      Spoke SDPs
      SRRP
        SRRP Messaging
        SRRP and Multi-Chassis Synchronization
        SRRP Instance
          SRRP Instance MCS Key
          Containing Service Type and ID
          Containing Subscriber IP Interface Name
          Subscriber Subnet Information
          Containing Group IP Interface Information
          Remote Redundant IP Interface Mismatch
          Remote Sending Redundant IP Interface Unavailable
          Remote SRRP Advertisement SAP Non-existent
          Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          Local and Remote Dual Master Detected
        Subscriber Subnet Owned IP Address Connectivity
        Subscriber Subnet SRRP Gateway IP Address Connectivity
        Receive SRRP Advertisement SAP and Anti-Spoof
        BFD with SRRP/VRRP
    Configuring an IES Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring IES Components
        Configuring an IES Service
        Configuring IES Subscriber Interface Parameters
        Configuring IES Interface Parameters
        Configuring Spoke-SDP Parameters
        Configuring SAP Parameters
        Configuring IES SAP ATM Parameters
        Configuring VRRP
        Configuring IPSec Parameters
        IGMP Host Tracking
      Service Management Tasks
        Modifying IES Service Parameters
        Deleting a Spoke-SDP
        Deleting an IES Service
        Disabling an IES Service
        Re-Enabling an IES Service
     IES Services Command Reference
      Command Hierarchies
        IES Service Configuration Commands
          Global Commands
          Interface Commands
        Routed VPLS Commands
        Redundant Interface Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        VRRP Commands
        Spoke SDP Commands
        Subscriber Interface Commands
          Group Interface SAP Commands
        Threat Managment Service Interface Commands
      Command Descriptions
        Generic Commands
        IES Global Commands
          Redundant Interface Commands
          IES Subscriber Interface Commands
        IES Interface Commands
          IES Interface DHCP Commands
          PPPoE Commands
        ETH-CFM Service Commands
        IES Filter and QoS Policy Commands
          ATM Commands
          IES Interface VRRP Commands
          IPSec Gateway Commands
          Threat Management Service Interface Commands
    IES Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Monitor Commands
      Command Descriptions
         IES Show Commands
        IES Clear Commands
        IES Debug Commands
        IES Monitor Commands
   Virtual Private Routed Network Service
    In This Chapter
    VPRN Service Overview
      Routing Prerequisites
      Core MP-BGP Support
      Route Distinguishers
        eiBGP Load Balancing
      Route Reflector
      CE to PE Route Exchange
        Route Redistribution
        CPE Connectivity Check
      Constrained Route Distribution (RT Constraint)
        Constrained VPN Route Distribution Based on Route Targets
        Configuring the Route Target Address Family
        Originating RT Constraint Routes
        Receiving and Re-Advertising RT Constraint Routes
        Using RT Constraint Routes
      BGP Fast Reroute in a VPRN
        BGP Fast Reroute in a VPRN Configuration
      BGP Best-External in a VPRN Context
    VPRN Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
        QPPB Applications
        Inter-AS Coordination of QoS Policies
        Traffic Differentiation Based on Route Characteristics
        QPPB
        Associating an FC and Priority with a Route
        Displaying QoS Information Associated with Routes
        Enabling QPPB on an IP interface
        QPPB When Next-Hops are Resolved by QPPB Routes
        QPPB and Multiple Paths to a Destination
        QPPB and Policy-Based Routing
        QPPB and GRT Lookup
        QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
        VPRN IP Interface Applicability
      Subscriber Interfaces
      SAPs
        Encapsulations
        ATM SAP Encapsulations for VPRN Services
        Pseudowire SAPs
      QoS Policies
      Filter Policies
      DSCP Marking
        Default DSCP Mapping Table
      Configuration of TTL Propagation for VPRN Routes
      CE to PE Routing Protocols
        PE to PE Tunneling Mechanisms
        Per VRF Route Limiting
      Spoke SDPs
        T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        Spoke SDP Redundancy into IES/VPRN
      IP-VPNs
        Using OSPF in IP-VPNs
      IPCP Subnet Negotiation
      Cflowd for IP-VPNs
      Inter-AS VPRNs
      Carrier Supporting Carrier (CsC)
        Terminology
        CSC Connectivity Models
        CSC-PE Configuration and Operation
        CSC Interface
        QoS
        MPLS
        CSC VPRN Service Configuration
      Traffic Leaking to GRT
      Traffic Leaking from VPRN to GRT for IPv6
      RIP Metric Propagation in VPRNs
      NTP Within a VPRN Service
      PTP Within a VPRN Service
      VPN Route Label Allocation
        Configuring the Service Label Mode
        Restrictions and Usage Notes
      VPRN Support for BGP Flowspec
      MPLS Entropy Label and Hash Label
    QoS on Ingress Bindings
    Multicast in IP-VPN Applications
      Use of Data MDTs
      Multicast Protocols Supported in the Provider Network
      MVPN Membership Auto-discovery using BGP
      MVPN (Rosen) Membership Auto-Discovery using BGP MDT-SAFI
      PE-PE Transmission of C-Multicast Routing using BGP
      VRF Route Import Extended Community
      Provider Tunnel Support
        Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        P2MP RSVP-TE I-PMSI and S-PMSI
        P2MP LDP I-PMSI and S-PMSI
        Wildcard (C-*, C-*) P2MP LSP S-PMSI
        P2MP LSP S-PMSI
        Dynamic Multicast Signaling over P2MP LDP in VRF
        MVPN Sender-only/Receiver-only
        S-PMSI Trigger Thresholds
        Migration from Existing Rosen Implementation
      MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      Multicast VPN Extranet
        Multicast Extranet for Rosen MVPN for PIM SSM
        Multicast Extranet for NG-MVPN for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM SSM
        Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM ASM
      Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      Multicast Auto RP Discovery
      IPv6 MVPN Support
      Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      NG-MVPN Multicast Source Geo-Redundancy
      Multicast Core Diversity for Rosen MDT SAFI MVPNs
      Inter-AS MVPN
        BGP Connector Attribute
        PIM RPF Vector
        Inter-AS MVPN Option B
        Inter-AS MVPN Option C
    VPRN Off-Ramp
      DDoS Off-Ramping Through Flowspec
    FIB Prioritization
    Configuring a VPRN Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPRN Components
        Creating a VPRN Service
        Configuring Global VPRN Parameters
        Configuring VPRN Log Parameters
          Configuring a Spoke-SDP
        Configuring VPRN Protocols - PIM
          Configuring Router Interfaces
          Configuring VPRN Protocols - BGP
          Configuring VPRN Protocols - RIP
          Configuring VPRN Protocols - OSPF
          Configuring TMS Parameters
          Configuring a VPRN Interface
          Configuring Overload State on a Single SFM
          Configuring a VPRN Interface SAP
      Configuring IPSec Parameters
      Service Management Tasks
        Modifying VPRN Service Parameters
        Deleting a VPRN Service
        Disabling a VPRN Service
        Re-enabling a VPRN Service
    VPRN Service Configuration Commands
      Command Hierarchies
        VPRN Service Configuration Commands
        L2TP Commands
        DHCP Commands
        GSMP Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        NTP Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface Spoke SDP Commands
        Interface VRRP Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        Routed VPLS Commands
        Oper Group Commands
        Network Ingress Commands
        BGP Configuration Commands
        IS-IS Configuration Commands
        OSPF Configuration Commands
        PIM Configuration Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Configuration Commands
        Threat Management Service Interface Commands
        RADIUS Commands
        Web Portal Protocol Configuration Commands
      Command Descriptions
        Generic Commands
        Global Commands
        IGMP Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router DHCP Configuration Commands
        Log Commands
        Multicast VPN Commands
        Network Time Protocol Commands
        Redundant Interface Commands
        SDP Commands
        Interface Commands
          Interface DHCP Commands
          Interface ICMP Commands
          Interface ICMP Commands
        Router Advertisement Commands
          NAT Commands
          Subscriber Interface Commands
          PPPoE Commands
          Interface ICMP Commands
          Interface SAP Commands
          Interface SAP ATM Commands
          Interface Anti-Spoofing Commands
          Interface SAP Filter and QoS Policy Commands
          Routed VPLS Commands
        ETH-CFM Service Commands
        SAP Subscriber Management Commands
        Interface VRRP Commands
        PIM Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        Network Interface Commands
        Network Ingress Commands
        BGP Commands
        IS-IS Commands
        OSPF Commands
        RIP Commands
        IPSec Configuration Commands
          Threat Management Service Interface Commands
          RADIUS Proxy Commands
     VPRN Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        VPRN Show Commands
        VPRN Clear Commands
        VPRN Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
   Internet Enhanced Service
    In This Chapter
    IES Service Overview
    IES Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
          QPPB Applications
          Inter-AS Coordination of QoS Policies
          Traffic Differentiation Based on Route Characteristics
        QPPB
          Associating an FC and Priority with a Route
          Displaying QoS Information Associated with Routes
          Enabling QPPB on an IP Interface
          QPPB When Next-Hops are Resolved by QPPB Routes
          QPPB and Multiple Paths to a Destination
          QPPB and Policy-Based Routing
        QPPB and GRT Lookup
          QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
          IES IP Interface Applicability
      Subscriber Interfaces
        IPv6 Enhanced Subscriber Management (ESM)
        RADIUS Accounting
      SAPs
        Encapsulations
        ATM SAP Encapsulations for IES
        Pseudowire SAPs
        Encapsulation
        Pseudowire SAP Configuration
        QoS for Pseudowire Ports and Pseudowire SAPs
        Shaping and Bandwidth Control
        Lag Considerations
        Last Mile Packet Size Adjustment
        Redundancy with Pseudowire SAPs
        Operational Group Support for PW Ports
      Routing Protocols
        CPE Connectivity Check
      QoS Policies
      Filter Policies
      MPLS Entropy Label and Hash Label
      Spoke SDPs
      SRRP
        SRRP Messaging
        SRRP and Multi-Chassis Synchronization
        SRRP Instance
          SRRP Instance MCS Key
          Containing Service Type and ID
          Containing Subscriber IP Interface Name
          Subscriber Subnet Information
          Containing Group IP Interface Information
          Remote Redundant IP Interface Mismatch
          Remote Sending Redundant IP Interface Unavailable
          Remote SRRP Advertisement SAP Non-existent
          Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          Local and Remote Dual Master Detected
        Subscriber Subnet Owned IP Address Connectivity
        Subscriber Subnet SRRP Gateway IP Address Connectivity
        Receive SRRP Advertisement SAP and Anti-Spoof
        BFD with SRRP/VRRP
    Configuring an IES Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring IES Components
        Configuring an IES Service
        Configuring IES Subscriber Interface Parameters
        Configuring IES Interface Parameters
        Configuring Spoke-SDP Parameters
        Configuring SAP Parameters
        Configuring IES SAP ATM Parameters
        Configuring VRRP
        Configuring IPSec Parameters
        IGMP Host Tracking
      Service Management Tasks
        Modifying IES Service Parameters
        Deleting a Spoke-SDP
        Deleting an IES Service
        Disabling an IES Service
        Re-Enabling an IES Service
     IES Services Command Reference
      Command Hierarchies
        IES Service Configuration Commands
          Global Commands
          Interface Commands
        Routed VPLS Commands
        Redundant Interface Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        VRRP Commands
        Spoke SDP Commands
        Subscriber Interface Commands
          Group Interface SAP Commands
        Threat Managment Service Interface Commands
      Command Descriptions
        Generic Commands
        IES Global Commands
          Redundant Interface Commands
          IES Subscriber Interface Commands
        IES Interface Commands
          IES Interface DHCP Commands
          PPPoE Commands
        ETH-CFM Service Commands
        IES Filter and QoS Policy Commands
          ATM Commands
          IES Interface VRRP Commands
          IPSec Gateway Commands
          Threat Management Service Interface Commands
    IES Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Monitor Commands
      Command Descriptions
         IES Show Commands
        IES Clear Commands
        IES Debug Commands
        IES Monitor Commands
   Virtual Private Routed Network Service
    In This Chapter
    VPRN Service Overview
      Routing Prerequisites
      Core MP-BGP Support
      Route Distinguishers
        eiBGP Load Balancing
      Route Reflector
      CE to PE Route Exchange
        Route Redistribution
        CPE Connectivity Check
      Constrained Route Distribution (RT Constraint)
        Constrained VPN Route Distribution Based on Route Targets
        Configuring the Route Target Address Family
        Originating RT Constraint Routes
        Receiving and Re-Advertising RT Constraint Routes
        Using RT Constraint Routes
      BGP Fast Reroute in a VPRN
        BGP Fast Reroute in a VPRN Configuration
      BGP Best-External in a VPRN Context
    VPRN Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
        QPPB Applications
        Inter-AS Coordination of QoS Policies
        Traffic Differentiation Based on Route Characteristics
        QPPB
        Associating an FC and Priority with a Route
        Displaying QoS Information Associated with Routes
        Enabling QPPB on an IP interface
        QPPB When Next-Hops are Resolved by QPPB Routes
        QPPB and Multiple Paths to a Destination
        QPPB and Policy-Based Routing
        QPPB and GRT Lookup
        QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
        VPRN IP Interface Applicability
      Subscriber Interfaces
      SAPs
        Encapsulations
        ATM SAP Encapsulations for VPRN Services
        Pseudowire SAPs
      QoS Policies
      Filter Policies
      DSCP Marking
        Default DSCP Mapping Table
      Configuration of TTL Propagation for VPRN Routes
      CE to PE Routing Protocols
        PE to PE Tunneling Mechanisms
        Per VRF Route Limiting
      Spoke SDPs
        T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        Spoke SDP Redundancy into IES/VPRN
      IP-VPNs
        Using OSPF in IP-VPNs
      IPCP Subnet Negotiation
      Cflowd for IP-VPNs
      Inter-AS VPRNs
      Carrier Supporting Carrier (CsC)
        Terminology
        CSC Connectivity Models
        CSC-PE Configuration and Operation
        CSC Interface
        QoS
        MPLS
        CSC VPRN Service Configuration
      Traffic Leaking to GRT
      Traffic Leaking from VPRN to GRT for IPv6
      RIP Metric Propagation in VPRNs
      NTP Within a VPRN Service
      PTP Within a VPRN Service
      VPN Route Label Allocation
        Configuring the Service Label Mode
        Restrictions and Usage Notes
      VPRN Support for BGP Flowspec
      MPLS Entropy Label and Hash Label
    QoS on Ingress Bindings
    Multicast in IP-VPN Applications
      Use of Data MDTs
      Multicast Protocols Supported in the Provider Network
      MVPN Membership Auto-discovery using BGP
      MVPN (Rosen) Membership Auto-Discovery using BGP MDT-SAFI
      PE-PE Transmission of C-Multicast Routing using BGP
      VRF Route Import Extended Community
      Provider Tunnel Support
        Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        P2MP RSVP-TE I-PMSI and S-PMSI
        P2MP LDP I-PMSI and S-PMSI
        Wildcard (C-*, C-*) P2MP LSP S-PMSI
        P2MP LSP S-PMSI
        Dynamic Multicast Signaling over P2MP LDP in VRF
        MVPN Sender-only/Receiver-only
        S-PMSI Trigger Thresholds
        Migration from Existing Rosen Implementation
      MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      Multicast VPN Extranet
        Multicast Extranet for Rosen MVPN for PIM SSM
        Multicast Extranet for NG-MVPN for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM SSM
        Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM ASM
      Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      Multicast Auto RP Discovery
      IPv6 MVPN Support
      Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      NG-MVPN Multicast Source Geo-Redundancy
      Multicast Core Diversity for Rosen MDT SAFI MVPNs
      Inter-AS MVPN
        BGP Connector Attribute
        PIM RPF Vector
        Inter-AS MVPN Option B
        Inter-AS MVPN Option C
    VPRN Off-Ramp
      DDoS Off-Ramping Through Flowspec
    FIB Prioritization
    Configuring a VPRN Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPRN Components
        Creating a VPRN Service
        Configuring Global VPRN Parameters
        Configuring VPRN Log Parameters
          Configuring a Spoke-SDP
        Configuring VPRN Protocols - PIM
          Configuring Router Interfaces
          Configuring VPRN Protocols - BGP
          Configuring VPRN Protocols - RIP
          Configuring VPRN Protocols - OSPF
          Configuring TMS Parameters
          Configuring a VPRN Interface
          Configuring Overload State on a Single SFM
          Configuring a VPRN Interface SAP
      Configuring IPSec Parameters
      Service Management Tasks
        Modifying VPRN Service Parameters
        Deleting a VPRN Service
        Disabling a VPRN Service
        Re-enabling a VPRN Service
    VPRN Service Configuration Commands
      Command Hierarchies
        VPRN Service Configuration Commands
        L2TP Commands
        DHCP Commands
        GSMP Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        NTP Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface Spoke SDP Commands
        Interface VRRP Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        Routed VPLS Commands
        Oper Group Commands
        Network Ingress Commands
        BGP Configuration Commands
        IS-IS Configuration Commands
        OSPF Configuration Commands
        PIM Configuration Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Configuration Commands
        Threat Management Service Interface Commands
        RADIUS Commands
        Web Portal Protocol Configuration Commands
      Command Descriptions
        Generic Commands
        Global Commands
        IGMP Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router DHCP Configuration Commands
        Log Commands
        Multicast VPN Commands
        Network Time Protocol Commands
        Redundant Interface Commands
        SDP Commands
        Interface Commands
          Interface DHCP Commands
          Interface ICMP Commands
          Interface ICMP Commands
        Router Advertisement Commands
          NAT Commands
          Subscriber Interface Commands
          PPPoE Commands
          Interface ICMP Commands
          Interface SAP Commands
          Interface SAP ATM Commands
          Interface Anti-Spoofing Commands
          Interface SAP Filter and QoS Policy Commands
          Routed VPLS Commands
        ETH-CFM Service Commands
        SAP Subscriber Management Commands
        Interface VRRP Commands
        PIM Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        Network Interface Commands
        Network Ingress Commands
        BGP Commands
        IS-IS Commands
        OSPF Commands
        RIP Commands
        IPSec Configuration Commands
          Threat Management Service Interface Commands
          RADIUS Proxy Commands
     VPRN Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        VPRN Show Commands
        VPRN Clear Commands
        VPRN Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
MPLS Guide R14.0.R1
  Getting Started
    About This Guide
    Alcatel-Lucent Router Configuration Process
   MPLS and RSVP
    In This Chapter
    MPLS
      MPLS Label Stack
        Label Values
      MPLS Entropy Label and Hash Label
        Inserting and Processing the Entropy Label
          Ingress LER
          LSR
        Egress LER
        Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        Entropy Label on OAM Packets
      Label Switching Routers
        LSP Types
      Bidirectional Forwarding Detection for MPLS LSPs
        Bootstrapping the BFD Session
        LSP BFD Configuration
        Enabling and Implementing Limits for LSP BFD on a Node
        BFD Configuration on RSVP-TE LSPs
        MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
        Manual Bypass LSP
          PLR Bypass LSP Selection Rules
          FRR Node-Protection (Facility)
        Uniform FRR Failover Time
        MPLS/RSVP on Broadcast Interface
        Automatic Bandwidth Allocation for RSVP LSPs
          Enabling and Disabling Auto-Bandwidth Allocation on an LSP
          Autobandwidth on LSPs with Secondary or Secondary Standby Paths
          Measurement of LSP Bandwidth
          Passive Monitoring of LSP Bandwidth
          Periodic Automatic Bandwidth Adjustment
          Overflow-Triggered Auto-Bandwidth Adjustment
          Manually-Triggered Auto-Bandwidth Adjustment
    RSVP
      Using RSVP for MPLS
        RSVP Traffic Engineering Extensions for MPLS
        Hello Protocol
        MD5 Authentication of RSVP Interface
        Configuring Authentication using Keychains
      Reservation Styles
        RSVP Message Pacing
      RSVP Overhead Refresh Reduction
      RSVP Graceful Restart Helper
      Enhancements to RSVP control plane congestion control
      RSVP LSP Statistics
      P2MP RSVP-TE LSP Statistics
        Configuring RSVP P2MP LSP Egress Statistics
        Configuring RSVP P2MP LSP Ingress Statistics
        Configuring Implicit Null
      Using Unnumbered Point-to-Point Interface in RSVP
        Operation of RSVP FRR Facility Backup over Unnumbered Interface
    MPLS Transport Profile
      MPLS-TP Model
      MPLS-TP Provider Edge and Gateway
        VLL Services
        Spoke-SDP Termination
      MPLS-TP LSR
      Detailed Descriptions of MPLS-TP
        MPLS-TP LSPs
        MPLS-TP on Pseudowires
      MPLS-TP Maintenance Identifiers
        Generic Associated Channel
        MPLS-TP Operations, Administration and Maintenance (OAM)
          On-Demand Connectivity Verification (CV) using LSP-Ping
          Proactive CC, CV and RDI
          BFD-based RDI
        PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        PW Control Channel Status Request Mechanism
        Pseudowire Redundancy and Active / Standby Dual Homing
        Lock Instruct and Loopback for MPLS-TP Pseudowires
        MPLS-TP LSP Protection
      Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
      Alarm Indication Signal (AIS)
      Configuring MPLS-TP
        Configuration Overview
        Node-Wide MPLS-TP Parameter Configuration
        Node-Wide MPLS-TP Identifier Configuration
        Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        Interface Configuration for MPLS-TP
        LER Configuration for MPLS-TP
          LSP and Path Configuration
          Support for Downstream Mapping Information
          Proactive CC/CV (using BFD) Configuration
          Protection templates and Linear Protection Configuration
        Intermediate LSR Configuration for MPLS-TP LSPs
      MPLS-TP Show Commands
        Static MPLS Labels
        MPLS-TP Tunnel Configuration
        MPLS-TP Path configuration
        MPLS-TP Protection
        MPLS TP Node Configuration
        MPLS-TP Interfaces
      MPLS-TP Debug Commands
    Traffic Engineering
      TE Metric (IS-IS and OSPF)
      Admin Group Support on Facility Bypass Backup LSP
        Procedures at Head-End Node
        Procedures at PLR Node
      Diff-Serv Traffic Engineering
        Mapping of Traffic to a Diff-Serv LSP
        Admission Control of Classes
          Maximum Allocation Model
          Russian Doll Model
        RSVP Control Plane Extensions
        IGP Extensions
        Diff-Serv TE Configuration and Operation
          RSVP Protocol Level
          RSVP Interface Level
          LSP and LSP Path Levels
      Diff-Serv TE LSP Class Type Change under Failure
        LSP Primary Path Retry Procedures
        Bandwidth Sharing Across Class Types
        Downgrading the CT of Bandwidth Sharing LSP Paths
        Upgrading the CT of Bandwidth Sharing LSP Paths
    Advanced MPLS/RSVP Features
      Extending RSVP LSP to use Loopback Interfaces Other Than router-id
      LSP Path Change
      Manual LSP Path Switch
      Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      Automatic Creation of RSVP-TE LSP Mesh
      RSVP-TE LSP Shortcut for IGP Resolution
        Using LSP Relative Metric with IGP Shortcut
        ECMP Considerations
        Handling of Control Packets
        Forwarding Adjacency
        LDP Forwarding over IGP Shortcut
        Handling of Multicast Packets
          Disabling TTL Propagation in an LSP Shortcut
      RSVP-TE LSP Signaling using LSP Template
      Shared Risk Link Groups
        Enabling Disjoint Backup Paths
        SRLG Penalty Weights for Detour and Bypass LSPs
        Static Configurations of SRLG Memberships
      TE Graceful Shutdown
      Soft Preemption of Diff-Serv RSVP LSP
      Least-Fill Bandwidth Rule in CSPF ECMP Selection
      Inter-Area TE LSP (ERO Expansion Method)
        Area Border Node FRR Protection for Inter-Area LSP
          Rerouting of Inter-Area LSP
          Behavior of MPLS Options in Inter-Area LSP
        Inter-Area LSP support of OSPF Virtual Links
        Area Border Node FRR Protection for Inter-Area LSP
      Automatic Creation of a RSVP Mesh LSP
        Feature Configuration
        Feature Behavior
        Multi-Area and Multi-Instance Support
        Mesh LSP Name Encoding and Statistics
      Timer-based Reversion for RSVP-TE LSPs
      Automatic Creation of an RSVP One-Hop LSP
        Feature Configuration
        Feature Behavior
      MPLS Entropy Label
    Point-to-Multipoint (P2MP) RSVP LSP
      Application in Video Broadcast
      P2MP LSP Data Plane
        Procedures at Ingress LER Node
        Procedures at LSR Node
        Procedures at Branch LSR Node
        Procedures at Egress LER Node
        Procedures at BUD LSR Node
      Ingress Path Management for P2MP LSP Packets
        Ingress P2MP Path Management on XCM/IOM-3/IMMs
        Ingress P2MP Path Management on IOM-2
      RSVP Control Plane in a P2MP LSP
      Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        Procedures at Ingress LER Node
        Procedures at Egress LER Node
          Procedures with a Primary Tunnel Interface
    Segment Routing With Traffic Engineering (SR-TE)
      Configuring and Operating SR-TE
        SR-TE LSP Configuration Overview
        SR-TE LSP Instantiation
          PCC-Initiated and PCC-Controlled LSP
          PCC-Initiated and PCE-Computed/Controlled LSP
        SR-TE LSP Path Computation
        SR-TE LSP Protection
        Data Path Support
          SR-TE LSP Metric and MTU Settings
          Hash Label Support
        Static Route Resolution using SR-TE LSP
        BGP Shortcut using SR-TE LSP
        BGP Label Route Resolution using SR-TE LSP
        Service Packet Forwarding using SR-TE LSP
    MPLS Service Usage
      Service Distribution Paths
    MPLS/RSVP Configuration Process Overview
    Configuration Notes
     Configuring MPLS and RSVP with CLI
    MPLS Configuration Overview
      LSPs
      Paths
      Router Interface
      Choosing the Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
        Configuring a Static LSP
      Configuring Manual Bypass Tunnels
    Configuring RSVP Parameters
      Configuring RSVP Message Pacing Parameters
      Configuring Graceful Shutdown
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP Configuration Management Tasks
      Modifying RSVP Parameters
      Modifying RSVP Message Pacing Parameters
      Deleting an Interface from RSVP
     MPLS/RSVP Configuration Command Reference
      Command Hierarchies
        MPLS Commands
        MPLS-TP Commands
        LSP Commands
        lsp-bfd Commands
        MPLS Path Commands
        RSVP Commands
      Command Descriptions
         MPLS Commands
          Generic Commands
          MPLS Commands
          Point-to-Multipoint MPLS (P2MP) Commands
        RSVP Commands
          Generic Commands
          RSVP Commands
          Interface Commands
     MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Router Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Show Router BFD session Commands
        Show RSVP Commands
        Tools Commands
        Clear Commands
        Debug Commands
   GMPLS
    In This Chapter
    GMPLS
      Example Applications
        Use Case 1: Dynamic Connection Setup with Constraints
        Use Case 2: Multi-Layer Resiliency
    GMPLS UNI Architecture
      Addressing and End-to-End gLSP Architecture
    1830 PSS Identifiers
    Recovery Reference Models
      End to End Recovery (IP-layer)
      End to End ECMP
      End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      End to End Recovery (GMPLS Layer)
        Unprotected gLSP
        Full LSP Rerouting
        1: N Protection
        Optical Segment Recovery
     Configuring GMPLS with CLI
    GMPLS Configuration Overview
    LMP and IPCC Configuration
      Configuration of IP Communication Channels for LMP and RSVP
      Configuring LMP
      Configuring Traffic Engineering Links and Data Bearers
    Configuring MPLS Paths for GMPLS
    Configuring RSVP in GMPLS
    Configuring a GMPLS LSP on the UNI
      gLSP Constraints
    Bandwidth
    Shared Risk Link Groups
    Optical Network Segment Recovery
    Configuration of End-to-End GMPLS Recovery
    GMPLS Tunnel Groups
    Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    Configuration Notes
     GMPLS Configuration Command Reference
      Command Hierarchies
        LMP Commands
        GMPLS Commands
        GMPLS Tunnel Group Commands
      Command Descriptions
        LMP Commands
        GMPLS Commands
          GMPLS Tunnel Group Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  PCEP
    In This Chapter
    Introduction to the Path Computation Element Protocol (PCEP)
      PCC and PCE Configuration
      Base Implementation of Path Computation Elements (PCE)
      PCEP Session Establishment and Maintenance
      PCEP Parameters
        Stateful PCE
        PCEP Extensions in Support of SR-TE LSPs
        LSP Initiation
          PCC-Initiated and PCE-Computed/Controlled LSPs
          LSP Path Diversity and Bi-Directionality Constraints
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
      Command Descriptions
        PCEP Commands
   Label Distribution Protocol
    In This Chapter
    Label Distribution Protocol
      LDP and MPLS
      LDP Architecture
      Subsystem Interrelationships
        Memory Manager and LDP
        Label Manager
        LDP Configuration
        Logger
        Service Manager
      Execution Flow
        Initialization
        Session Lifetime
          Adjacency Establishment
          Session Establishment
      Label Exchange
        Other Reasons for Label Actions
        Cleanup
        Configuring Implicit Null Label
      Global LDP Filters
        Per LDP Peer FEC Import and Export Policies
      Configuring Multiple LDP LSR ID
      T-LDP hello reduction
      Tracking a T-LDP Peer with BFD
      Link LDP Hello Adjacency Tracking with BFD
      LDP LSP Statistics
    TTL Security for BGP and LDP
    ECMP Support for LDP
      Label Operations
    Unnumbered Interface Support in LDP
      Feature Configuration
      Operation of LDP over an Unnumbered IP Interface
        Link LDP
        Targeted LDP
        FEC Resolution
    LDP over RSVP Tunnels
      Signaling and Operation
        LDP Label Distribution and FEC Resolution
        Default FEC Resolution Procedure
        FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      Rerouting Around Failures
        LDP-over-RSVP Tunnel Protection
        ABR Protection
    LDP over RSVP Without Area Boundary
      LDP over RSVP and ECMP
    Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      Configuration and Operation
    LDP ECMP Uniform Failover
    LDP Fast-Reroute for IS-IS and OSPF Prefixes
      LDP FRR Configuration
        Reducing the Scope of the LFA Calculation by SPF
      LDP FRR Procedures
        ECMP Considerations
        LDP FRR and LDP Shortcut
        LDP FRR and LDP-over-RSVP
        LDP FRR and RSVP Shortcut (IGP Shortcut)
      IS-IS and OSPF Support for Loop-Free Alternate Calculation
        Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    mLDP Fast Upstream Switchover
    LDP FEC to BGP Label Route Stitching
      Configuration
      Detailed LDP FEC Resolution
      Detailed BGP Labeled Route Resolution
      Data Plane Forwarding
    LDP-SR Stitching for IPv4 prefixes (IS-IS)
      LDP-SR Stitching Configuration
      Stitching in the LDP-to-SR Direction
      Stitching in the SR-to-LDP Direction
    LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
    Automatic Creation of a Targeted Hello Adjacency and LDP Session
      Feature Configuration
      Feature Behavior
    Multicast P2MP LDP for GRT
    LDP P2MP Support
      LDP P2MP Configuration
      LDP P2MP Protocol
      Make Before Break (MBB)
      ECMP Support
    Multicast LDP Fast Upstream Switchover
      Feature Configuration
      Feature Behavior
      Uniform Failover from Primary to Backup ILM
    Multi-Area and Multi-Instance Extensions to LDP
      LDP Shortcut for BGP Next-Hop Resolution
      LDP Shortcut for IGP Routes
        LDP Shortcut Configuration
        IGP Route Resolution
        LDP Shortcut Forwarding Plane
      ECMP Considerations
      Disabling TTL Propagation in an LSP Shortcut
    LDP Graceful Handling of Resource Exhaustion
      LDP Base Graceful Handling of Resources
    LDP Enhanced Graceful Handling of Resources
      LSR Overload Notification
      LSR Overload Protection Capability
      Procedures for LSR overload protection
    User Guidelines and Troubleshooting Procedures
      Common Procedures
      Base Resource Handling Procedures
      Enhanced Resource Handling Procedures
    LDP IPv6 Control and Data Planes
      LDP Operation in an IPv6 Network
      Link LDP
      Targeted LDP
      FEC Resolution
      LDP Session Capabilities
      LDP Adjacency Capabilities
      Address and FEC Distribution
      Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      IGP and Static Route Synchronization with LDP
      BFD Operation
      Services Using SDP with an LDP IPv6 FEC
      Mirror Services and Lawful Intercept
        Configuration at mirror source node
        Configuration at mirror destination node
      Static Route Resolution to a LDP IPv6 FEC
      IGP Route Resolution to a LDP IPv6 FEC
      OAM Support with LDP IPv6
      LDP IPv6 Interoperability Considerations
        Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
        Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    LDP Process Overview
    LDP-IGP Synchronization
     Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring FEC Originate Parameters
      Configuring Graceful-Restart Helper Parameters
      Applying Export and Import Policies
      Targeted Session Parameters
      Interface Parameters
      Session Parameters
      LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
     LDP Command Reference
      Command Hierarchies
        LDP Commands
      Command Descriptions
        Generic Commands
        Interface Parameters Commands
        Session Parameters Commands
        Targeted Session Commands
        TCP Session Parameters Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show LDP Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer documentation and product support
  Getting Started
    About This Guide
    Alcatel-Lucent Router Configuration Process
   MPLS and RSVP
    In This Chapter
    MPLS
      MPLS Label Stack
        Label Values
      MPLS Entropy Label and Hash Label
        Inserting and Processing the Entropy Label
          Ingress LER
          LSR
        Egress LER
        Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        Entropy Label on OAM Packets
      Label Switching Routers
        LSP Types
      Bidirectional Forwarding Detection for MPLS LSPs
        Bootstrapping the BFD Session
        LSP BFD Configuration
        Enabling and Implementing Limits for LSP BFD on a Node
        BFD Configuration on RSVP-TE LSPs
        MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
        Manual Bypass LSP
          PLR Bypass LSP Selection Rules
          FRR Node-Protection (Facility)
        Uniform FRR Failover Time
        MPLS/RSVP on Broadcast Interface
        Automatic Bandwidth Allocation for RSVP LSPs
          Enabling and Disabling Auto-Bandwidth Allocation on an LSP
          Autobandwidth on LSPs with Secondary or Secondary Standby Paths
          Measurement of LSP Bandwidth
          Passive Monitoring of LSP Bandwidth
          Periodic Automatic Bandwidth Adjustment
          Overflow-Triggered Auto-Bandwidth Adjustment
          Manually-Triggered Auto-Bandwidth Adjustment
    RSVP
      Using RSVP for MPLS
        RSVP Traffic Engineering Extensions for MPLS
        Hello Protocol
        MD5 Authentication of RSVP Interface
        Configuring Authentication using Keychains
      Reservation Styles
        RSVP Message Pacing
      RSVP Overhead Refresh Reduction
      RSVP Graceful Restart Helper
      Enhancements to RSVP control plane congestion control
      RSVP LSP Statistics
      P2MP RSVP-TE LSP Statistics
        Configuring RSVP P2MP LSP Egress Statistics
        Configuring RSVP P2MP LSP Ingress Statistics
        Configuring Implicit Null
      Using Unnumbered Point-to-Point Interface in RSVP
        Operation of RSVP FRR Facility Backup over Unnumbered Interface
    MPLS Transport Profile
      MPLS-TP Model
      MPLS-TP Provider Edge and Gateway
        VLL Services
        Spoke-SDP Termination
      MPLS-TP LSR
      Detailed Descriptions of MPLS-TP
        MPLS-TP LSPs
        MPLS-TP on Pseudowires
      MPLS-TP Maintenance Identifiers
        Generic Associated Channel
        MPLS-TP Operations, Administration and Maintenance (OAM)
          On-Demand Connectivity Verification (CV) using LSP-Ping
          Proactive CC, CV and RDI
          BFD-based RDI
        PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        PW Control Channel Status Request Mechanism
        Pseudowire Redundancy and Active / Standby Dual Homing
        Lock Instruct and Loopback for MPLS-TP Pseudowires
        MPLS-TP LSP Protection
      Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
      Alarm Indication Signal (AIS)
      Configuring MPLS-TP
        Configuration Overview
        Node-Wide MPLS-TP Parameter Configuration
        Node-Wide MPLS-TP Identifier Configuration
        Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        Interface Configuration for MPLS-TP
        LER Configuration for MPLS-TP
          LSP and Path Configuration
          Support for Downstream Mapping Information
          Proactive CC/CV (using BFD) Configuration
          Protection templates and Linear Protection Configuration
        Intermediate LSR Configuration for MPLS-TP LSPs
      MPLS-TP Show Commands
        Static MPLS Labels
        MPLS-TP Tunnel Configuration
        MPLS-TP Path configuration
        MPLS-TP Protection
        MPLS TP Node Configuration
        MPLS-TP Interfaces
      MPLS-TP Debug Commands
    Traffic Engineering
      TE Metric (IS-IS and OSPF)
      Admin Group Support on Facility Bypass Backup LSP
        Procedures at Head-End Node
        Procedures at PLR Node
      Diff-Serv Traffic Engineering
        Mapping of Traffic to a Diff-Serv LSP
        Admission Control of Classes
          Maximum Allocation Model
          Russian Doll Model
        RSVP Control Plane Extensions
        IGP Extensions
        Diff-Serv TE Configuration and Operation
          RSVP Protocol Level
          RSVP Interface Level
          LSP and LSP Path Levels
      Diff-Serv TE LSP Class Type Change under Failure
        LSP Primary Path Retry Procedures
        Bandwidth Sharing Across Class Types
        Downgrading the CT of Bandwidth Sharing LSP Paths
        Upgrading the CT of Bandwidth Sharing LSP Paths
    Advanced MPLS/RSVP Features
      Extending RSVP LSP to use Loopback Interfaces Other Than router-id
      LSP Path Change
      Manual LSP Path Switch
      Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      Automatic Creation of RSVP-TE LSP Mesh
      RSVP-TE LSP Shortcut for IGP Resolution
        Using LSP Relative Metric with IGP Shortcut
        ECMP Considerations
        Handling of Control Packets
        Forwarding Adjacency
        LDP Forwarding over IGP Shortcut
        Handling of Multicast Packets
          Disabling TTL Propagation in an LSP Shortcut
      RSVP-TE LSP Signaling using LSP Template
      Shared Risk Link Groups
        Enabling Disjoint Backup Paths
        SRLG Penalty Weights for Detour and Bypass LSPs
        Static Configurations of SRLG Memberships
      TE Graceful Shutdown
      Soft Preemption of Diff-Serv RSVP LSP
      Least-Fill Bandwidth Rule in CSPF ECMP Selection
      Inter-Area TE LSP (ERO Expansion Method)
        Area Border Node FRR Protection for Inter-Area LSP
          Rerouting of Inter-Area LSP
          Behavior of MPLS Options in Inter-Area LSP
        Inter-Area LSP support of OSPF Virtual Links
        Area Border Node FRR Protection for Inter-Area LSP
      Automatic Creation of a RSVP Mesh LSP
        Feature Configuration
        Feature Behavior
        Multi-Area and Multi-Instance Support
        Mesh LSP Name Encoding and Statistics
      Timer-based Reversion for RSVP-TE LSPs
      Automatic Creation of an RSVP One-Hop LSP
        Feature Configuration
        Feature Behavior
      MPLS Entropy Label
    Point-to-Multipoint (P2MP) RSVP LSP
      Application in Video Broadcast
      P2MP LSP Data Plane
        Procedures at Ingress LER Node
        Procedures at LSR Node
        Procedures at Branch LSR Node
        Procedures at Egress LER Node
        Procedures at BUD LSR Node
      Ingress Path Management for P2MP LSP Packets
        Ingress P2MP Path Management on XCM/IOM-3/IMMs
        Ingress P2MP Path Management on IOM-2
      RSVP Control Plane in a P2MP LSP
      Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        Procedures at Ingress LER Node
        Procedures at Egress LER Node
          Procedures with a Primary Tunnel Interface
    Segment Routing With Traffic Engineering (SR-TE)
      Configuring and Operating SR-TE
        SR-TE LSP Configuration Overview
        SR-TE LSP Instantiation
          PCC-Initiated and PCC-Controlled LSP
          PCC-Initiated and PCE-Computed/Controlled LSP
        SR-TE LSP Path Computation
        SR-TE LSP Protection
        Data Path Support
          SR-TE LSP Metric and MTU Settings
          Hash Label Support
        Static Route Resolution using SR-TE LSP
        BGP Shortcut using SR-TE LSP
        BGP Label Route Resolution using SR-TE LSP
        Service Packet Forwarding using SR-TE LSP
    MPLS Service Usage
      Service Distribution Paths
    MPLS/RSVP Configuration Process Overview
    Configuration Notes
     Configuring MPLS and RSVP with CLI
    MPLS Configuration Overview
      LSPs
      Paths
      Router Interface
      Choosing the Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
        Configuring a Static LSP
      Configuring Manual Bypass Tunnels
    Configuring RSVP Parameters
      Configuring RSVP Message Pacing Parameters
      Configuring Graceful Shutdown
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP Configuration Management Tasks
      Modifying RSVP Parameters
      Modifying RSVP Message Pacing Parameters
      Deleting an Interface from RSVP
     MPLS/RSVP Configuration Command Reference
      Command Hierarchies
        MPLS Commands
        MPLS-TP Commands
        LSP Commands
        lsp-bfd Commands
        MPLS Path Commands
        RSVP Commands
      Command Descriptions
         MPLS Commands
          Generic Commands
          MPLS Commands
          Point-to-Multipoint MPLS (P2MP) Commands
        RSVP Commands
          Generic Commands
          RSVP Commands
          Interface Commands
     MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Router Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Show Router BFD session Commands
        Show RSVP Commands
        Tools Commands
        Clear Commands
        Debug Commands
   GMPLS
    In This Chapter
    GMPLS
      Example Applications
        Use Case 1: Dynamic Connection Setup with Constraints
        Use Case 2: Multi-Layer Resiliency
    GMPLS UNI Architecture
      Addressing and End-to-End gLSP Architecture
    1830 PSS Identifiers
    Recovery Reference Models
      End to End Recovery (IP-layer)
      End to End ECMP
      End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      End to End Recovery (GMPLS Layer)
        Unprotected gLSP
        Full LSP Rerouting
        1: N Protection
        Optical Segment Recovery
     Configuring GMPLS with CLI
    GMPLS Configuration Overview
    LMP and IPCC Configuration
      Configuration of IP Communication Channels for LMP and RSVP
      Configuring LMP
      Configuring Traffic Engineering Links and Data Bearers
    Configuring MPLS Paths for GMPLS
    Configuring RSVP in GMPLS
    Configuring a GMPLS LSP on the UNI
      gLSP Constraints
    Bandwidth
    Shared Risk Link Groups
    Optical Network Segment Recovery
    Configuration of End-to-End GMPLS Recovery
    GMPLS Tunnel Groups
    Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    Configuration Notes
     GMPLS Configuration Command Reference
      Command Hierarchies
        LMP Commands
        GMPLS Commands
        GMPLS Tunnel Group Commands
      Command Descriptions
        LMP Commands
        GMPLS Commands
          GMPLS Tunnel Group Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  PCEP
    In This Chapter
    Introduction to the Path Computation Element Protocol (PCEP)
      PCC and PCE Configuration
      Base Implementation of Path Computation Elements (PCE)
      PCEP Session Establishment and Maintenance
      PCEP Parameters
        Stateful PCE
        PCEP Extensions in Support of SR-TE LSPs
        LSP Initiation
          PCC-Initiated and PCE-Computed/Controlled LSPs
          LSP Path Diversity and Bi-Directionality Constraints
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
      Command Descriptions
        PCEP Commands
   Label Distribution Protocol
    In This Chapter
    Label Distribution Protocol
      LDP and MPLS
      LDP Architecture
      Subsystem Interrelationships
        Memory Manager and LDP
        Label Manager
        LDP Configuration
        Logger
        Service Manager
      Execution Flow
        Initialization
        Session Lifetime
          Adjacency Establishment
          Session Establishment
      Label Exchange
        Other Reasons for Label Actions
        Cleanup
        Configuring Implicit Null Label
      Global LDP Filters
        Per LDP Peer FEC Import and Export Policies
      Configuring Multiple LDP LSR ID
      T-LDP hello reduction
      Tracking a T-LDP Peer with BFD
      Link LDP Hello Adjacency Tracking with BFD
      LDP LSP Statistics
    TTL Security for BGP and LDP
    ECMP Support for LDP
      Label Operations
    Unnumbered Interface Support in LDP
      Feature Configuration
      Operation of LDP over an Unnumbered IP Interface
        Link LDP
        Targeted LDP
        FEC Resolution
    LDP over RSVP Tunnels
      Signaling and Operation
        LDP Label Distribution and FEC Resolution
        Default FEC Resolution Procedure
        FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      Rerouting Around Failures
        LDP-over-RSVP Tunnel Protection
        ABR Protection
    LDP over RSVP Without Area Boundary
      LDP over RSVP and ECMP
    Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      Configuration and Operation
    LDP ECMP Uniform Failover
    LDP Fast-Reroute for IS-IS and OSPF Prefixes
      LDP FRR Configuration
        Reducing the Scope of the LFA Calculation by SPF
      LDP FRR Procedures
        ECMP Considerations
        LDP FRR and LDP Shortcut
        LDP FRR and LDP-over-RSVP
        LDP FRR and RSVP Shortcut (IGP Shortcut)
      IS-IS and OSPF Support for Loop-Free Alternate Calculation
        Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    mLDP Fast Upstream Switchover
    LDP FEC to BGP Label Route Stitching
      Configuration
      Detailed LDP FEC Resolution
      Detailed BGP Labeled Route Resolution
      Data Plane Forwarding
    LDP-SR Stitching for IPv4 prefixes (IS-IS)
      LDP-SR Stitching Configuration
      Stitching in the LDP-to-SR Direction
      Stitching in the SR-to-LDP Direction
    LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
    Automatic Creation of a Targeted Hello Adjacency and LDP Session
      Feature Configuration
      Feature Behavior
    Multicast P2MP LDP for GRT
    LDP P2MP Support
      LDP P2MP Configuration
      LDP P2MP Protocol
      Make Before Break (MBB)
      ECMP Support
    Multicast LDP Fast Upstream Switchover
      Feature Configuration
      Feature Behavior
      Uniform Failover from Primary to Backup ILM
    Multi-Area and Multi-Instance Extensions to LDP
      LDP Shortcut for BGP Next-Hop Resolution
      LDP Shortcut for IGP Routes
        LDP Shortcut Configuration
        IGP Route Resolution
        LDP Shortcut Forwarding Plane
      ECMP Considerations
      Disabling TTL Propagation in an LSP Shortcut
    LDP Graceful Handling of Resource Exhaustion
      LDP Base Graceful Handling of Resources
    LDP Enhanced Graceful Handling of Resources
      LSR Overload Notification
      LSR Overload Protection Capability
      Procedures for LSR overload protection
    User Guidelines and Troubleshooting Procedures
      Common Procedures
      Base Resource Handling Procedures
      Enhanced Resource Handling Procedures
    LDP IPv6 Control and Data Planes
      LDP Operation in an IPv6 Network
      Link LDP
      Targeted LDP
      FEC Resolution
      LDP Session Capabilities
      LDP Adjacency Capabilities
      Address and FEC Distribution
      Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      IGP and Static Route Synchronization with LDP
      BFD Operation
      Services Using SDP with an LDP IPv6 FEC
      Mirror Services and Lawful Intercept
        Configuration at mirror source node
        Configuration at mirror destination node
      Static Route Resolution to a LDP IPv6 FEC
      IGP Route Resolution to a LDP IPv6 FEC
      OAM Support with LDP IPv6
      LDP IPv6 Interoperability Considerations
        Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
        Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    LDP Process Overview
    LDP-IGP Synchronization
     Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring FEC Originate Parameters
      Configuring Graceful-Restart Helper Parameters
      Applying Export and Import Policies
      Targeted Session Parameters
      Interface Parameters
      Session Parameters
      LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
     LDP Command Reference
      Command Hierarchies
        LDP Commands
      Command Descriptions
        Generic Commands
        Interface Parameters Commands
        Session Parameters Commands
        Targeted Session Commands
        TCP Session Parameters Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show LDP Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer documentation and product support
Multicast Routing Protocols Guide R14.0.R1
  Getting Started
    About This Guide
    Multicast Configuration Process
  Introduction to Multicast
    In This Chapter
    Multicast Overview
    Multicast Models
      Any-Source Multicast (ASM)
      Source Specific Multicast (SSM)
      Multicast in IP-VPN Networks
  IGMP
    In This Chapter
    IGMP Overview
      IGMP Versions and Interoperability Requirements
      IGMP Version Transition
      Source-Specific Multicast Groups
      Query Messages
     Configuring IGMP with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling IGMP
    IGMP Configuration Command Reference
      Command Hierarchies
        IGMP Configuration Commands
      Command Descriptions
        Router IGMP Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLD
    In This Chapter
    MLD Overview
      MLDv1
      MLDv2
     Configuring MLD with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling MLD
    MLD Configuration Command Reference
      Command Hierarchies
        MLD Configuration Commands
      Command Descriptions
        MLD Commands
        Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Clear Commands
      Command Descriptions
        Clear Commands
  PIM
    In This Chapter
    PIM Overview
      PIM-SM Functions
        Phase One
        Phase Two
        Phase Three
      Encapsulating Data Packets in the Register Tunnel
      PIM Bootstrap Router Mechanism
      PIM-SM Routing Policies
      Reverse Path Forwarding Checks
      Anycast RP for PIM-SM
        Implementation
      Distributing PIM Joins over Multiple ECMP Paths
      PIM Interface on IES Subscriber Group Interfaces
      Multicast Only Fast Reroute (MoFRR)
    IPv6 PIM models
      PIM SSM
      PIM ASM
      Embedded RP
     Configuring PIM with CLI
      PIM Configuration Overview
      Basic PIM Configuration
      Configuring PIM Parameters
        Enabling PIM
        Configuring PIM Interface Parameters
        Importing PIM Join/Register Policies
      Disabling PIM
    PIM Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Router PIM Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MSDP
    In This Chapter
    Multicast Source Discovery Protocol
      Anycast RP for MSDP
      MSDP Procedure
        MSDP Peering Scenarios
      MSDP Peer Groups
      MSDP Mesh Groups
      MSDP Routing Policies
      Auto-RP (discovery mode only) in Multicast VPN
      Multicast in Virtual Private Networks
        Draft Rosen
     Configuring MSDP with CLI
      Basic MSDP Configuration
      Configuring MSDP Parameters
      Disabling MSDP
    MSDP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        MSDP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLDP
    In This Chapter
    Dynamic Multicast Signaling over P2MP in GRT Instance
  Multicast Extensions to BGP
    In This Chapter
    Multicast Extensions to BGP
      MBGP Multicast Topology Support
        Recursive Lookup for BGP Next Hops
  MCAC
    In This Chapter
    MCAC Overview
      MCAC Bundle Policy Overview
      MCAC Algorithm
        Interface-level MCAC details
          MCAC-interface-policy-level MCAC details
        Bundle-level MCAC details
      MCAC on Link Aggregation Group Interfaces
     Configuring MCAC with CLI
      Basic MCAC Configuration
      Configuring MCAC Parameters
    MCAC Configuration Command Reference
      Command Hierarchies
        MCAC Configuration Commands
        MCAC Policy Commands
      Command Descriptions
        MCAC Configuration Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          Show MCAC Commands
  Troubleshooting Tools
    In This Chapter
    Mtrace
      Finding the Last Hop Router
      Directing the Response
    Mstat
    Mrinfo
    Troubleshooting Configuration Command Reference
      Command Hierarchies
        Operational Commands
      Command Descriptions
        Operational Commands
    Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer documentation and product support
  Getting Started
    About This Guide
    Multicast Configuration Process
  Introduction to Multicast
    In This Chapter
    Multicast Overview
    Multicast Models
      Any-Source Multicast (ASM)
      Source Specific Multicast (SSM)
      Multicast in IP-VPN Networks
  IGMP
    In This Chapter
    IGMP Overview
      IGMP Versions and Interoperability Requirements
      IGMP Version Transition
      Source-Specific Multicast Groups
      Query Messages
     Configuring IGMP with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling IGMP
    IGMP Configuration Command Reference
      Command Hierarchies
        IGMP Configuration Commands
      Command Descriptions
        Router IGMP Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLD
    In This Chapter
    MLD Overview
      MLDv1
      MLDv2
     Configuring MLD with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling MLD
    MLD Configuration Command Reference
      Command Hierarchies
        MLD Configuration Commands
      Command Descriptions
        MLD Commands
        Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Clear Commands
      Command Descriptions
        Clear Commands
  PIM
    In This Chapter
    PIM Overview
      PIM-SM Functions
        Phase One
        Phase Two
        Phase Three
      Encapsulating Data Packets in the Register Tunnel
      PIM Bootstrap Router Mechanism
      PIM-SM Routing Policies
      Reverse Path Forwarding Checks
      Anycast RP for PIM-SM
        Implementation
      Distributing PIM Joins over Multiple ECMP Paths
      PIM Interface on IES Subscriber Group Interfaces
      Multicast Only Fast Reroute (MoFRR)
    IPv6 PIM models
      PIM SSM
      PIM ASM
      Embedded RP
     Configuring PIM with CLI
      PIM Configuration Overview
      Basic PIM Configuration
      Configuring PIM Parameters
        Enabling PIM
        Configuring PIM Interface Parameters
        Importing PIM Join/Register Policies
      Disabling PIM
    PIM Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Router PIM Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MSDP
    In This Chapter
    Multicast Source Discovery Protocol
      Anycast RP for MSDP
      MSDP Procedure
        MSDP Peering Scenarios
      MSDP Peer Groups
      MSDP Mesh Groups
      MSDP Routing Policies
      Auto-RP (discovery mode only) in Multicast VPN
      Multicast in Virtual Private Networks
        Draft Rosen
     Configuring MSDP with CLI
      Basic MSDP Configuration
      Configuring MSDP Parameters
      Disabling MSDP
    MSDP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        MSDP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLDP
    In This Chapter
    Dynamic Multicast Signaling over P2MP in GRT Instance
  Multicast Extensions to BGP
    In This Chapter
    Multicast Extensions to BGP
      MBGP Multicast Topology Support
        Recursive Lookup for BGP Next Hops
  MCAC
    In This Chapter
    MCAC Overview
      MCAC Bundle Policy Overview
      MCAC Algorithm
        Interface-level MCAC details
          MCAC-interface-policy-level MCAC details
        Bundle-level MCAC details
      MCAC on Link Aggregation Group Interfaces
     Configuring MCAC with CLI
      Basic MCAC Configuration
      Configuring MCAC Parameters
    MCAC Configuration Command Reference
      Command Hierarchies
        MCAC Configuration Commands
        MCAC Policy Commands
      Command Descriptions
        MCAC Configuration Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          Show MCAC Commands
  Troubleshooting Tools
    In This Chapter
    Mtrace
      Finding the Last Hop Router
      Directing the Response
    Mstat
    Mrinfo
    Troubleshooting Configuration Command Reference
      Command Hierarchies
        Operational Commands
      Command Descriptions
        Operational Commands
    Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer documentation and product support
Multiservice Integrated Service Adapter Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
  ISA Hardware
    In This Section
    MS-ISA2 Overview
    MS-ISA Overview
    MS-ISM Overview
    Application Assurance Hardware Features
      AA System Support
      Host IOM Support for AA on ISAs
  Application Assurance
    In This Section
    Application Assurance (AA) Overview
      Application Assurance: Inline Policy Enforcement
      AA Integration in Subscriber Edge Gateways
      Fixed Residential Broadband Services
        Dual-Stack Lite – DS-Lite
        6to4 /6RD
      Wireless LAN Gateway Broadband Services
      Application-Aware Business VPN Services
      SeGW Firewall Service
    Application Assurance System Architecture
      AA ISA Resource Configuration
        AA ISA Groups
          AA ISA Groups
          AA Group Partitions
          Bypass Modes
        Redundancy
          No AA ISA Group Redundancy
          Failure to Fabric
          N+1 AA ISA Card Warm Redundancy
        ISA Load Balancing
        Asymmetry Removal
          Asymmetry Removal Overview
          Failure Modes
          AARP Peered Node/Instance Configuration
          Multi-Chassis Control Link (MC-CTL)
          Multi-Chassis Datapath Shunts
        ISA Overload Detection
      AA Packet Processing
        Divert of Traffic and Subscribers
          Services and AA Subscribers
          Spoke SDPs
          Transit AA Subs
          AA Subscriber Application Service Definition
        Application Identification
          Application Assurance Identification Components
          Protocol Signatures
          Custom Protocols
          Protocol Shutdown
          Supported Protocol Signatures
          Application Groups
          Charging Groups
          Applications
          Application Filters
          HTTP
          AA IP Prefix Lists
        Statistics and Accounting
          Per-AA-Subscriber Special Study
          System Aspects
          Application Assurance XML Volume Statistics and Accounting
          AA Partition Traffic Type Statistics
          Configurable AA-Subscriber Statistics Collection
          AA-Performance Record for ISA Load
          AA Partition Traffic Type Statistics
          AA Partition Admit–Deny Statistics
          RADIUS Accounting AA Records
          AA GX Based Usage Monitoring
          Supported AVPs
          Cflowd AA Records
        Application QoS Policy (AQP)
          AQP Match Criteria
          AQP Actions
          Application Assurance Policers
          Time of Day Policing Adjustments
          Application Assurance HTTP Redirect
          ICAP - Large Scale Category based URL Filtering
          Local URL-List Filtering
          HTTP Header Enrichment
          HTTP In Browser Notification
        Application Assurance Firewall
          SeGW Firewall Protection
      Service Monitoring and Debugging
      CPU Utilization
      CLI Batch: Begin, Commit and Abort Commands
    Configuring Application Assurance with CLI
      Provisioning AA ISA MDA
       Configuring an AA ISA Group
        Configuring Watermark Parameters
      Configuring a Group Policy
        Beginning and Committing a Policy Configuration
        Aborting a Policy Configuration
        Configuring an IP Prefix List
        Configuring AA Session Filters
        Configuring an Application Group
        Configuring an Application
        Configuring an Application Filter
        Configuring an Application Profile
        Configuring Suppressible App-Profile with SRRP
        Configuring Application Service Options
        Configuring a Policer
        Configuring an Application QoS Policy
        Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        Configuring an HTTP Error Redirect
        Configuring HTTP Header Enrichment
        Configuring an HTTP Redirect Policy
        Configuring a Captive Redirect HTTP Redirect Policy
          Captive-Redirect and HTTPS Flows Redirection
        Configuring ICAP URL Filtering
        Configuring Local URL-List Filtering
        Configuring HTTP Notification
      Configuring AA Volume Accounting and Statistics
        Configuring Cflowd Collector
        Configuring AA Volume, TCP and RTP Performance Reporting
    Application Assurance Command Reference
       Application Assurance Command Reference
        Hardware Commands
        Admin Commands
        ISA Commands
        Application Assurance Commands
          AA Commands
          AA Group Commands
        Persistence Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
          Admin Commands
        Application Assurance Commands
        Group Commands
          Transit Subscriber Commands
          Policer Commands
          Policy Commands
          Statistics Commands
          Policy Commands
          System Persistence Commands
        ISA Commands
          Application Assurance Group Commands
    Show, Tools, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  IP Tunnels
    In This Section
    IP Tunnels Overview
      Tunnel ISAs
        Public Tunnel SAPs
        Private Tunnel SAPs
        IP Interface Configuration
        GRE and IP-IP Tunnel Configuration
        IP Fragmentation and Reassembly for IP Tunnels
      Operational Conditions
      QoS Interactions
      OAM Interactions
      Redundancy
      Statistics Collection
      Security
        GRE Tunnel Multicast Support
        IPv6 over IPv4 GRE Tunnel
      IKEv2
        IKEv2 Traffic Selector and TS-List
      SHA2 Support
      IPSec Client Lockout
    X.509v3 Certificate Overview
      SROS X.509v3 Certificate Support
      Local Storage
      CA-Profile
      CA Chain Computation
      Certificate Enrollment
      Certificate Revocation Check
      Certificate/CRL Expiration Warning
      Certificate/CRL/Key Cache
      Auto CRL Update
    Using Certificates For IPSec Tunnel Authentication
    Trust-Anchor-Profile
    Cert-Profile
      Cert-Profile/trust-anchor-profile versus cert/trust-anchor
    Certificate Management Protocol Version 2 (CMPv2)
    OCSP
    Video Wholesale Example
    Multi-Chassis IPSec Redundancy Overview
      Architecture
      MC-IPSec Mastership Protocol (MIMP)
        MIMP Protocol States
        Election Logic
        Protection Status
        Other Details
      Routing
        Routing in Public Service
        Routing in Private Services
        Other Details About Shunting
      MC-IPSec Aware VRRP
      Synchronization
        Automatic CHILD_SA Rekey
      Responder Only
    IPSec Deployment Requirements
    IKEv2 Remote-Access Tunnel
      IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        IKEv2 Remote-Access Tunnel – EAP Authentication
      IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      IKEv2 Remote-Access Tunnel – Address Assignment
        DHCPv4 Address Assignment
        DHCPv6 Address Assignment
        DHCPv4/v6 Usage Notes
      IPv6 IPSec Support
        IPv6 as Payload
        IPv6 as Payload: Static LAN-to-LAN Tunnel
        IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        IPv6 as Payload: Remote-Access Tunnel
        IPv6 as Encapsulation
    Configuring IPSec with CLI
      Provisioning a Tunnel ISA
      Configuring a Tunnel Group
      Configuring Router Interfaces for IPSec
      Configuring IPSec Parameters
      Configuring IPSec in Services
      Configuring X.509v3 Certificate Parameters
      Configuring MC-IPSec
        Configuring MIMP
        Configuring Multi-Chassis Synchronization
        Configuring Routing for MC-IPSec
      Configuring and Using CMPv2
      Configuring OCSP
      Configuring IKEv2 Remote-Access Tunnel
      Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
    IP Tunnel Command Reference
      Command Hierarchies
        Configuration Commands
          Hardware Commands
          ISA Commands
          IPSec Commands
        Service Configuration Commands
          IES Commands
          VPRN Commands
          IPSec Mastership Election Commands
          Related Commands
          CMPv2 Commands
          Auto-Update Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        ISA Commands
        Certificate Profile Commands
        Internet Key Exchange (IKE) Commands
        IPSec Configuration Commands
        Interface SAP Tunnel Commands
          IPSec Gateway Commands
        IPSec Mastership Election Commands
        IPSec RADIUS Commands
        CMPv2 Commands
        Auto-Update Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Video Services
    In This Section
    Video Services
      Video Groups
      Video SAP
      Video Interface
      Multicast Information Policies
      Duplicate Stream Protection
      Duplicate Stream Selection
        Stream Identification
        Initial Sequence Identification
        Packet Selection
        Clock Recovery
        Playout
        Loss of Transport
      Video Quality Monitoring
        VoIP/Video/Teleconferencing Performance Measurements
        Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    Retransmission and Fast Channel Change
      RET and FCC Overview
        Retransmission
        Fast Channel Change (FCC)
          Retransmission Client
          Retransmission Server
          Fast Channel Change Server
          Logging and Accounting for RET and FCC
        RET and FCC Server Concurrency
          Prerequisites and Restrictions
      Multi-Service ISA Support in the IOM-3 for Video Services
        Prioritization Mechanism for RET vs. FCC
        RET Features
          Statistics ALU SQM MIB Additions
          RET Server Multicast Tuning Parameters
        FCC Features
          FCC Hybrid Mode Support
    Ad Insertion
      Local/Zoned Ad Insertion
        Transport Stream Ad Splicing
        Ad Zones
        Local/Zoned ADI Prerequisites and Restrictions
    Configuring Video Service Components with CLI
      Video Services Overview
        Configuring an ISA-MS Module
        Configuring a Video Group
        Configuring a Video SAP and Video Interface in a Service
        Basic Multicast Information Policy Configuration
      Sample Configurations
    Configuring RET/FCC Video Components with CLI
      Configuring RET/FCC Video Features in the CLI
        Configuring the RET Client
        Configuring the RET Server
        Configuring the FCC Server
        Logging and Accounting Collection for Video Statistics
    Configuring ADI Components with CLI
      Configuring ADI in CLI
        Configuring the RET Client
        Configuring a Video Group
        Configuring NTP
        Configuring Channel Parameters
        Configuring Service Entities
    Video Services Command Reference
      IP-TV Command Hierarchies
        Hardware Commands
        Video Group Commands
        Video Policy Video Commands
        Bundle and Channel Commands
        Service Video Interface Commands
          VPLS Commands
          IES Commands
          VPRN Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        LNS Group Commands
        Video Group Commands
        Multicast Info Policy Commands
        Video Policy Commands
        Bundle and Channel Commands
        Service Video Interface Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  Network Address Translation
    In This Chapter
    Terminology
    Network Address Translation (NAT) Overview
      Principles of NAT
      Application Compatibility
    Large Scale NAT
      Port Range Blocks
        Reserved Ports and Priority Sessions
        Preventing Port Block Starvation
          Dynamic Port Block Starvation in LSN
          Dynamic Port Block Reservation
      Timeouts
      Watermarks
    L2-Aware NAT
    One-to-One (1:1) NAT
      Static 1:1 NAT
        Protocol Agnostic Behavior
        Modification of Parameters in Static 1:1 NAT
        Load Distribution over ISAs in Static 1:1 NAT
        NAT-Policy Selection
        Mapping Timeout
        Logging
        Restrictions
      ICMP
    Deterministic NAT
      Overview
      Supported Deterministic NAT Flavors
      Number of Subscribers per Outside IP and per Pool
      Referencing a Pool
      Outside Pool Configuration
      Mapping Rules and the map Command in Deterministic LSN44
      Hashing Considerations in Deterministic LSN44
        Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      Sharing of Deterministic NAT Pools
      Simultaneous support of dynamic and deterministic NAT
      Selecting Traffic for NAT
      Inverse Mappings
        MIB approach
        Off-line Approach to Obtain Deterministic Mappings
      Logging
      Deterministic DS-Lite
        Hashing Considerations in DS-Lite
        Order of Configuration Steps in Deterministic DS-Lite
    Destination Based NAT (DNAT)
      Combination of SNAPT and DNAT
      Forwarding Model in DNAT
      DNAT Traffic Selection via NAT Classifier
      Configuring DNAT
        DNAT Traffic Selection and Destination IP Address Configuration
        Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    NAT – Multiple NAT Policies per Inside Routing Context
      Restrictions
      Multiple NAT Policies Per Inside Routing Context
      Routing Approach for NAT Diversion
      Filter-Based Approach
      Multiple NAT Policies with DS-Lite and NAT64
      Default NAT Policy
      Scaling Considerations
      Multiple NAT Policies and SPF Configuration Considerations
        Multiple NAT Policies and Forwarding Considerations
      Logging
    L2-Aware NAT Destination-Based Multiple NAT Policies
      Logging
        RADIUS Logging and Nat-Policy Change via CoA
        Delay Between the NAT Resource Allocation and Logging During CoA
      Static Port Forwards
      UPnP
    Port Control Protocol (PCP)
    Universal Plug and Play Internet Gateway Device Service
      Configuring UPnP IGD Service
    NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      PPTP Protocol
        Supported Control Messages
        GRE Tunnel
      PPTP ALG Operation
      Multiple Sessions Initiated From the Same PPTP Client Node
      Selection of Call IDs in NAT
    NAT Logging
      Syslog/SNMP/Local-File Logging
        Filtering LSN Events to System Memory
        NAT Logging to a Local File
      SNMP Trap Logging
      NAT Syslog
      LSN RADIUS Logging
        RADIUS Logging and L2-Aware NAT
      LSN and L2-Aware NAT Flow Logging
        Large Scale NAT44 Flow Logging Configuration Example
    DS-Lite and NAT64 Fragmentation
      Overview
      IPv6 Fragmentation in DS-Lite
      NAT64
    Enhanced Statistics in NAT — Histogram
      Configuration
    NAT Stateless Dual-Homing
      Configuration Considerations
      Troubleshooting Commands
    NAT ISA (Intra-Chassis) Redundancy
      Active-Active ISA Redundancy Model
      Start-up Conditions
      Recovery
      Adding Additional ISAs in the ISA Group
    ISA Feature Interactions
      MS-ISA Use with Service Mirrors
      LNS, Application Assurance and NAT
      Subscriber Aware Large Scale NAT44
    Configuring NAT
      ISA Redundancy
      NAT Layer 2-Aware Configurations
      Large Scale NAT Configuration
      NAT Configuration Examples
    Network Address Translation Command Reference
      Command Hierarchies
        ISA Configuration Commands
        NAT Service Configuration Commands
          IPFIX Commands
          UPnP Commands
          ISA RADIUS Policy Commands
          VPRN Commands
        NAT Subscriber Management Commands
          NAT Subscriber Management BRG Commands
        NAT Router Configuration Commands
        NAT DNAT Commands
        NAT Admin Configuration Commands
        TCP MSS Adjustment Commands
        Tools Commands
        Show Commands
        Clear Commands
        Tools Commands
        Filter Commands
      Command Descriptions
        Generic Commands
        ISA Configuration Commands
        NAT Configuration Commands
        NAT Service Configuration Commands
        IPFlow Information Export Protocol Commands
        AAA Policy Commands
        NAT Subscriber Management Commands
        NAT Subscriber Management BRG Commands
        NAT DNAT Commands
        NAT Show Commands
        NAT Clear Commands
        NAT Tools Commands
        NAT Filter Commands
  TCP MSS Adjustment
    In This Section
    Overview
    TCP MSS Adjustment for ESM Hosts
    TCP MSS Adjustment for NAT Services
    TCC MSS Adjustment Commands
      Command Hierarchy
        TCC MSS Adjustment Command Descriptions
  L2TP Network Server
    In This Chapter
    Subscriber agg-rate-limit on LNS
    LNS Reassembly
      Overview
      Reassembly Function
      Load Sharing Between the ISAs
      Inter-chassis ISA Redundancy
    MLPPPoE, MLPPP(oE)oA with LFI on LNS
      Terminology
      LNS MLPPPoX
      MLPPP Encapsulation
      MLPPPoX Negotiation
      Enabling MLPPPoX
      Link Fragmentation and Interleaving (LFI)
        MLPPPoX Fragmentation, MRRU and MRU Considerations
      LFI Functionality Implemented in LNS
        Last Mile QoS Awareness in the LNS
        BBB-ISA Processing
        LNS-LAC Link
        AN-RG Link
        Home Link
        Optimum Fragment Size Calculation by LNS
          Encapsulation Based Fragment Size
          Fragment size Based on the Max Transmission Delay
          Selection of the Optimum Fragment Length
      Upstream Traffic Considerations
      Multiple Links MLPPPoX With No Interleaving
      MLPPPoX Session Support
      Session Load Balancing Across Multiple BB-ISAs
      BB-ISA Hashing Considerations
      Last Mile Rate and Encapsulation Parameters
      Link Failure Detection
      CoA Support
      Accounting
      Filters and Mirroring
      PTA Considerations
      QoS Considerations
        Dual-Pass
        Traffic Prioritization in LFI
        Shaping Based on the Last Mile Wire Rates
        Downstream Bandwidth Management on Egress Port
      Sub/Sla-Profile Considerations
      Example of MLPPPoX Session Setup Flow
      Other Considerations
    Configuration Notes
    L2TP Network Server Command Reference
      Command Hierarchies
        ISA Commands
        MLPPP on LNS Commands
      Command Descriptions
        Generic Commands
        LNS Commands
        Network Address Translation (NAT) Commands
        MLPPP on LNS Commands
  Threat Management Service
    In This Section
    TMS Service Introduction
    Configuration Guidelines and Example
      TMS Image Location
      Configuration Example For TMS Interfaces on the SR OS
      Dynamic Control of IP Filter Entries
    Threat Management Service Command Reference
      Command Hierarchies
        Card Commands
        MDA Commands
        TMS Commands
        Policy Commands
      Command Descriptions
        Generic Commands
        Card Commands
        MDA Commands
        Threat Management Service Interface Commands
        Policy Commands
    TMS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        TMS-Related Show Commands
        Clear Commands
        Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
  ISA Hardware
    In This Section
    MS-ISA2 Overview
    MS-ISA Overview
    MS-ISM Overview
    Application Assurance Hardware Features
      AA System Support
      Host IOM Support for AA on ISAs
  Application Assurance
    In This Section
    Application Assurance (AA) Overview
      Application Assurance: Inline Policy Enforcement
      AA Integration in Subscriber Edge Gateways
      Fixed Residential Broadband Services
        Dual-Stack Lite – DS-Lite
        6to4 /6RD
      Wireless LAN Gateway Broadband Services
      Application-Aware Business VPN Services
      SeGW Firewall Service
    Application Assurance System Architecture
      AA ISA Resource Configuration
        AA ISA Groups
          AA ISA Groups
          AA Group Partitions
          Bypass Modes
        Redundancy
          No AA ISA Group Redundancy
          Failure to Fabric
          N+1 AA ISA Card Warm Redundancy
        ISA Load Balancing
        Asymmetry Removal
          Asymmetry Removal Overview
          Failure Modes
          AARP Peered Node/Instance Configuration
          Multi-Chassis Control Link (MC-CTL)
          Multi-Chassis Datapath Shunts
        ISA Overload Detection
      AA Packet Processing
        Divert of Traffic and Subscribers
          Services and AA Subscribers
          Spoke SDPs
          Transit AA Subs
          AA Subscriber Application Service Definition
        Application Identification
          Application Assurance Identification Components
          Protocol Signatures
          Custom Protocols
          Protocol Shutdown
          Supported Protocol Signatures
          Application Groups
          Charging Groups
          Applications
          Application Filters
          HTTP
          AA IP Prefix Lists
        Statistics and Accounting
          Per-AA-Subscriber Special Study
          System Aspects
          Application Assurance XML Volume Statistics and Accounting
          AA Partition Traffic Type Statistics
          Configurable AA-Subscriber Statistics Collection
          AA-Performance Record for ISA Load
          AA Partition Traffic Type Statistics
          AA Partition Admit–Deny Statistics
          RADIUS Accounting AA Records
          AA GX Based Usage Monitoring
          Supported AVPs
          Cflowd AA Records
        Application QoS Policy (AQP)
          AQP Match Criteria
          AQP Actions
          Application Assurance Policers
          Time of Day Policing Adjustments
          Application Assurance HTTP Redirect
          ICAP - Large Scale Category based URL Filtering
          Local URL-List Filtering
          HTTP Header Enrichment
          HTTP In Browser Notification
        Application Assurance Firewall
          SeGW Firewall Protection
      Service Monitoring and Debugging
      CPU Utilization
      CLI Batch: Begin, Commit and Abort Commands
    Configuring Application Assurance with CLI
      Provisioning AA ISA MDA
       Configuring an AA ISA Group
        Configuring Watermark Parameters
      Configuring a Group Policy
        Beginning and Committing a Policy Configuration
        Aborting a Policy Configuration
        Configuring an IP Prefix List
        Configuring AA Session Filters
        Configuring an Application Group
        Configuring an Application
        Configuring an Application Filter
        Configuring an Application Profile
        Configuring Suppressible App-Profile with SRRP
        Configuring Application Service Options
        Configuring a Policer
        Configuring an Application QoS Policy
        Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        Configuring an HTTP Error Redirect
        Configuring HTTP Header Enrichment
        Configuring an HTTP Redirect Policy
        Configuring a Captive Redirect HTTP Redirect Policy
          Captive-Redirect and HTTPS Flows Redirection
        Configuring ICAP URL Filtering
        Configuring Local URL-List Filtering
        Configuring HTTP Notification
      Configuring AA Volume Accounting and Statistics
        Configuring Cflowd Collector
        Configuring AA Volume, TCP and RTP Performance Reporting
    Application Assurance Command Reference
       Application Assurance Command Reference
        Hardware Commands
        Admin Commands
        ISA Commands
        Application Assurance Commands
          AA Commands
          AA Group Commands
        Persistence Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
          Admin Commands
        Application Assurance Commands
        Group Commands
          Transit Subscriber Commands
          Policer Commands
          Policy Commands
          Statistics Commands
          Policy Commands
          System Persistence Commands
        ISA Commands
          Application Assurance Group Commands
    Show, Tools, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  IP Tunnels
    In This Section
    IP Tunnels Overview
      Tunnel ISAs
        Public Tunnel SAPs
        Private Tunnel SAPs
        IP Interface Configuration
        GRE and IP-IP Tunnel Configuration
        IP Fragmentation and Reassembly for IP Tunnels
      Operational Conditions
      QoS Interactions
      OAM Interactions
      Redundancy
      Statistics Collection
      Security
        GRE Tunnel Multicast Support
        IPv6 over IPv4 GRE Tunnel
      IKEv2
        IKEv2 Traffic Selector and TS-List
      SHA2 Support
      IPSec Client Lockout
    X.509v3 Certificate Overview
      SROS X.509v3 Certificate Support
      Local Storage
      CA-Profile
      CA Chain Computation
      Certificate Enrollment
      Certificate Revocation Check
      Certificate/CRL Expiration Warning
      Certificate/CRL/Key Cache
      Auto CRL Update
    Using Certificates For IPSec Tunnel Authentication
    Trust-Anchor-Profile
    Cert-Profile
      Cert-Profile/trust-anchor-profile versus cert/trust-anchor
    Certificate Management Protocol Version 2 (CMPv2)
    OCSP
    Video Wholesale Example
    Multi-Chassis IPSec Redundancy Overview
      Architecture
      MC-IPSec Mastership Protocol (MIMP)
        MIMP Protocol States
        Election Logic
        Protection Status
        Other Details
      Routing
        Routing in Public Service
        Routing in Private Services
        Other Details About Shunting
      MC-IPSec Aware VRRP
      Synchronization
        Automatic CHILD_SA Rekey
      Responder Only
    IPSec Deployment Requirements
    IKEv2 Remote-Access Tunnel
      IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        IKEv2 Remote-Access Tunnel – EAP Authentication
      IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      IKEv2 Remote-Access Tunnel – Address Assignment
        DHCPv4 Address Assignment
        DHCPv6 Address Assignment
        DHCPv4/v6 Usage Notes
      IPv6 IPSec Support
        IPv6 as Payload
        IPv6 as Payload: Static LAN-to-LAN Tunnel
        IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        IPv6 as Payload: Remote-Access Tunnel
        IPv6 as Encapsulation
    Configuring IPSec with CLI
      Provisioning a Tunnel ISA
      Configuring a Tunnel Group
      Configuring Router Interfaces for IPSec
      Configuring IPSec Parameters
      Configuring IPSec in Services
      Configuring X.509v3 Certificate Parameters
      Configuring MC-IPSec
        Configuring MIMP
        Configuring Multi-Chassis Synchronization
        Configuring Routing for MC-IPSec
      Configuring and Using CMPv2
      Configuring OCSP
      Configuring IKEv2 Remote-Access Tunnel
      Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
    IP Tunnel Command Reference
      Command Hierarchies
        Configuration Commands
          Hardware Commands
          ISA Commands
          IPSec Commands
        Service Configuration Commands
          IES Commands
          VPRN Commands
          IPSec Mastership Election Commands
          Related Commands
          CMPv2 Commands
          Auto-Update Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        ISA Commands
        Certificate Profile Commands
        Internet Key Exchange (IKE) Commands
        IPSec Configuration Commands
        Interface SAP Tunnel Commands
          IPSec Gateway Commands
        IPSec Mastership Election Commands
        IPSec RADIUS Commands
        CMPv2 Commands
        Auto-Update Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Video Services
    In This Section
    Video Services
      Video Groups
      Video SAP
      Video Interface
      Multicast Information Policies
      Duplicate Stream Protection
      Duplicate Stream Selection
        Stream Identification
        Initial Sequence Identification
        Packet Selection
        Clock Recovery
        Playout
        Loss of Transport
      Video Quality Monitoring
        VoIP/Video/Teleconferencing Performance Measurements
        Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    Retransmission and Fast Channel Change
      RET and FCC Overview
        Retransmission
        Fast Channel Change (FCC)
          Retransmission Client
          Retransmission Server
          Fast Channel Change Server
          Logging and Accounting for RET and FCC
        RET and FCC Server Concurrency
          Prerequisites and Restrictions
      Multi-Service ISA Support in the IOM-3 for Video Services
        Prioritization Mechanism for RET vs. FCC
        RET Features
          Statistics ALU SQM MIB Additions
          RET Server Multicast Tuning Parameters
        FCC Features
          FCC Hybrid Mode Support
    Ad Insertion
      Local/Zoned Ad Insertion
        Transport Stream Ad Splicing
        Ad Zones
        Local/Zoned ADI Prerequisites and Restrictions
    Configuring Video Service Components with CLI
      Video Services Overview
        Configuring an ISA-MS Module
        Configuring a Video Group
        Configuring a Video SAP and Video Interface in a Service
        Basic Multicast Information Policy Configuration
      Sample Configurations
    Configuring RET/FCC Video Components with CLI
      Configuring RET/FCC Video Features in the CLI
        Configuring the RET Client
        Configuring the RET Server
        Configuring the FCC Server
        Logging and Accounting Collection for Video Statistics
    Configuring ADI Components with CLI
      Configuring ADI in CLI
        Configuring the RET Client
        Configuring a Video Group
        Configuring NTP
        Configuring Channel Parameters
        Configuring Service Entities
    Video Services Command Reference
      IP-TV Command Hierarchies
        Hardware Commands
        Video Group Commands
        Video Policy Video Commands
        Bundle and Channel Commands
        Service Video Interface Commands
          VPLS Commands
          IES Commands
          VPRN Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        LNS Group Commands
        Video Group Commands
        Multicast Info Policy Commands
        Video Policy Commands
        Bundle and Channel Commands
        Service Video Interface Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  Network Address Translation
    In This Chapter
    Terminology
    Network Address Translation (NAT) Overview
      Principles of NAT
      Application Compatibility
    Large Scale NAT
      Port Range Blocks
        Reserved Ports and Priority Sessions
        Preventing Port Block Starvation
          Dynamic Port Block Starvation in LSN
          Dynamic Port Block Reservation
      Timeouts
      Watermarks
    L2-Aware NAT
    One-to-One (1:1) NAT
      Static 1:1 NAT
        Protocol Agnostic Behavior
        Modification of Parameters in Static 1:1 NAT
        Load Distribution over ISAs in Static 1:1 NAT
        NAT-Policy Selection
        Mapping Timeout
        Logging
        Restrictions
      ICMP
    Deterministic NAT
      Overview
      Supported Deterministic NAT Flavors
      Number of Subscribers per Outside IP and per Pool
      Referencing a Pool
      Outside Pool Configuration
      Mapping Rules and the map Command in Deterministic LSN44
      Hashing Considerations in Deterministic LSN44
        Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      Sharing of Deterministic NAT Pools
      Simultaneous support of dynamic and deterministic NAT
      Selecting Traffic for NAT
      Inverse Mappings
        MIB approach
        Off-line Approach to Obtain Deterministic Mappings
      Logging
      Deterministic DS-Lite
        Hashing Considerations in DS-Lite
        Order of Configuration Steps in Deterministic DS-Lite
    Destination Based NAT (DNAT)
      Combination of SNAPT and DNAT
      Forwarding Model in DNAT
      DNAT Traffic Selection via NAT Classifier
      Configuring DNAT
        DNAT Traffic Selection and Destination IP Address Configuration
        Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    NAT – Multiple NAT Policies per Inside Routing Context
      Restrictions
      Multiple NAT Policies Per Inside Routing Context
      Routing Approach for NAT Diversion
      Filter-Based Approach
      Multiple NAT Policies with DS-Lite and NAT64
      Default NAT Policy
      Scaling Considerations
      Multiple NAT Policies and SPF Configuration Considerations
        Multiple NAT Policies and Forwarding Considerations
      Logging
    L2-Aware NAT Destination-Based Multiple NAT Policies
      Logging
        RADIUS Logging and Nat-Policy Change via CoA
        Delay Between the NAT Resource Allocation and Logging During CoA
      Static Port Forwards
      UPnP
    Port Control Protocol (PCP)
    Universal Plug and Play Internet Gateway Device Service
      Configuring UPnP IGD Service
    NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      PPTP Protocol
        Supported Control Messages
        GRE Tunnel
      PPTP ALG Operation
      Multiple Sessions Initiated From the Same PPTP Client Node
      Selection of Call IDs in NAT
    NAT Logging
      Syslog/SNMP/Local-File Logging
        Filtering LSN Events to System Memory
        NAT Logging to a Local File
      SNMP Trap Logging
      NAT Syslog
      LSN RADIUS Logging
        RADIUS Logging and L2-Aware NAT
      LSN and L2-Aware NAT Flow Logging
        Large Scale NAT44 Flow Logging Configuration Example
    DS-Lite and NAT64 Fragmentation
      Overview
      IPv6 Fragmentation in DS-Lite
      NAT64
    Enhanced Statistics in NAT — Histogram
      Configuration
    NAT Stateless Dual-Homing
      Configuration Considerations
      Troubleshooting Commands
    NAT ISA (Intra-Chassis) Redundancy
      Active-Active ISA Redundancy Model
      Start-up Conditions
      Recovery
      Adding Additional ISAs in the ISA Group
    ISA Feature Interactions
      MS-ISA Use with Service Mirrors
      LNS, Application Assurance and NAT
      Subscriber Aware Large Scale NAT44
    Configuring NAT
      ISA Redundancy
      NAT Layer 2-Aware Configurations
      Large Scale NAT Configuration
      NAT Configuration Examples
    Network Address Translation Command Reference
      Command Hierarchies
        ISA Configuration Commands
        NAT Service Configuration Commands
          IPFIX Commands
          UPnP Commands
          ISA RADIUS Policy Commands
          VPRN Commands
        NAT Subscriber Management Commands
          NAT Subscriber Management BRG Commands
        NAT Router Configuration Commands
        NAT DNAT Commands
        NAT Admin Configuration Commands
        TCP MSS Adjustment Commands
        Tools Commands
        Show Commands
        Clear Commands
        Tools Commands
        Filter Commands
      Command Descriptions
        Generic Commands
        ISA Configuration Commands
        NAT Configuration Commands
        NAT Service Configuration Commands
        IPFlow Information Export Protocol Commands
        AAA Policy Commands
        NAT Subscriber Management Commands
        NAT Subscriber Management BRG Commands
        NAT DNAT Commands
        NAT Show Commands
        NAT Clear Commands
        NAT Tools Commands
        NAT Filter Commands
  TCP MSS Adjustment
    In This Section
    Overview
    TCP MSS Adjustment for ESM Hosts
    TCP MSS Adjustment for NAT Services
    TCC MSS Adjustment Commands
      Command Hierarchy
        TCC MSS Adjustment Command Descriptions
  L2TP Network Server
    In This Chapter
    Subscriber agg-rate-limit on LNS
    LNS Reassembly
      Overview
      Reassembly Function
      Load Sharing Between the ISAs
      Inter-chassis ISA Redundancy
    MLPPPoE, MLPPP(oE)oA with LFI on LNS
      Terminology
      LNS MLPPPoX
      MLPPP Encapsulation
      MLPPPoX Negotiation
      Enabling MLPPPoX
      Link Fragmentation and Interleaving (LFI)
        MLPPPoX Fragmentation, MRRU and MRU Considerations
      LFI Functionality Implemented in LNS
        Last Mile QoS Awareness in the LNS
        BBB-ISA Processing
        LNS-LAC Link
        AN-RG Link
        Home Link
        Optimum Fragment Size Calculation by LNS
          Encapsulation Based Fragment Size
          Fragment size Based on the Max Transmission Delay
          Selection of the Optimum Fragment Length
      Upstream Traffic Considerations
      Multiple Links MLPPPoX With No Interleaving
      MLPPPoX Session Support
      Session Load Balancing Across Multiple BB-ISAs
      BB-ISA Hashing Considerations
      Last Mile Rate and Encapsulation Parameters
      Link Failure Detection
      CoA Support
      Accounting
      Filters and Mirroring
      PTA Considerations
      QoS Considerations
        Dual-Pass
        Traffic Prioritization in LFI
        Shaping Based on the Last Mile Wire Rates
        Downstream Bandwidth Management on Egress Port
      Sub/Sla-Profile Considerations
      Example of MLPPPoX Session Setup Flow
      Other Considerations
    Configuration Notes
    L2TP Network Server Command Reference
      Command Hierarchies
        ISA Commands
        MLPPP on LNS Commands
      Command Descriptions
        Generic Commands
        LNS Commands
        Network Address Translation (NAT) Commands
        MLPPP on LNS Commands
  Threat Management Service
    In This Section
    TMS Service Introduction
    Configuration Guidelines and Example
      TMS Image Location
      Configuration Example For TMS Interfaces on the SR OS
      Dynamic Control of IP Filter Entries
    Threat Management Service Command Reference
      Command Hierarchies
        Card Commands
        MDA Commands
        TMS Commands
        Policy Commands
      Command Descriptions
        Generic Commands
        Card Commands
        MDA Commands
        Threat Management Service Interface Commands
        Policy Commands
    TMS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        TMS-Related Show Commands
        Clear Commands
        Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
OAM and Diagnostics Guide R14.0.R1
   Getting Started
    About This Guide
    Router Configuration Process
  Mirror Services
    In This Chapter
    Service Mirroring
    Mirror Implementation
      Mirror Source and Destinations
        Local and Remote Mirroring
        Slicing
      Mirroring Performance
      Mirroring Configuration
      ATM Mirroring
      IP Mirroring
        Remote IP Mirroring
        Local IP Mirroring
        Port-ID Enabled PPP Mirroring
    Mirrored Traffic Transport using MPLS-TP SDPs
    Subscriber Mirroring
    Lawful Intercept
      LI Activation Through RADIUS
      Routable Lawful Intercept Encapsulation
    Pseudowire Redundant Mirror Services
      Redundant Mirror Source Notes
    Carrier Grade NAT – Lawful Intercept
    Configuration Process Overview
    Configuration Notes
    Configuring Service Mirroring with CLI
      Mirror Configuration Overview
        Defining Mirrored Traffic
      Lawful Intercept Configuration Overview
        Saving LI Data
        Regulating LI Access
          LI User Access
          LI Source Configuration
        Configurable Filter Lock for Lawful Intercept
        LI MAC Filter Configuration
        LI Logging
    Basic Mirroring Configuration
      Mirror Classification Rules
        Port
        SAP
        MAC filter
        IP filter
        Ingress label
        Subscriber
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirrors and LI
      Configuring a Remote Mirror Service
      Configuring an ATM Mirror Service
      Configuring Lawful Intercept Parameters
      Pseudowire Redundancy for Mirror Services Configuration Example
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
     Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Lawful Intercept Commands
      Command Descriptions
        Generic Commands
        Mirror Destination Configuration Commands
        Lawful Intercept Commands
          Other LI Configuration Commands
     Mirror Service Show and Debug Command Reference
      Command Hierarchies
        Show Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Debug Commands
   OAM, SAA, and OAM-PM
    In This Chapter
    OAM Overview
      LSP Diagnostics: LSP Ping and Trace
      LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      ECMP Considerations
      lsp-ping and lsp-trace over Unnumbered IP Interface
      Downstream Detailed Mapping (DDMAP) TLV
      Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        Responder Node Procedures
        Sender Node Procedures
      LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      LDP ECMP Tree Building
      Periodic Path Exercising
      LSP Ping for RSVP P2MP LSP (P2MP)
      LSP Trace for RSVP P2MP LSP
        LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      Tunneling of ICMP Reply Packets over MPLS LSP
      QoS Handling of Tunneled ICMP Reply Packets
      Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      SDP Diagnostics
      SDP Ping
      SDP MTU Path Discovery
      Service Diagnostics
      VPLS MAC Diagnostics
      MAC Ping
      MAC Trace
      CPE Ping
      CPE Ping for PBB Epipe
        Hardware Support
      MAC Populate
      MAC Purge
      VLL Diagnostics
      VCCV Ping
        VCCV-Ping Application
        VCCV Ping in a Multi-Segment Pseudowire
      Automated VCCV-Trace Capability for MS-Pseudowire
        VCCV for Static Pseudowire Segments
        Detailed VCCV-Trace Operation
        Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          Sending a VCCV Echo Request
          Receiving an VCCV Echo Request
          Receiving an VCCV Echo Reply
      IGMP Snooping Diagnostics
      MFIB Ping
      ATM Diagnostics
      MPLS-TP On-Demand OAM Commands
      MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      MPLS-TP LSPs: LSP-Ping/LSP Trace
      VxLAN Ping Supporting EVPN for VxLAN
      Show Commands
      BFD
    IP Performance Monitoring (IP PM)
      Two-Way Active Measurement Protocol (TWAMP)
      Two-Way Active Measurement Protocol Light (TWAMP Light)
    Ethernet Connectivity Fault Management (ETH-CFM)
      ETH-CFM Building Blocks
      Loopback
      Loopback Multicast
      Linktrace
      Continuity Check (CC)
      CC Remote Peer Auto-Discovery
      CCM Grace Period
      CCM Hold Timers
      Alarm Indication Signal (ETH-AIS Y.1731)
      Client Signal Fail (ETH-CSF Y.1731)
      Test (ETH-TST Y.1731)
      One-Way Delay Measurement (ETH-1DM Y.1731)
      Two-Way Delay Measurement (ETH-DMM Y.1731)
      Synthetic Loss Measurement (ETH-SLM Y.1731)
        Configuration Example
      Frame Loss Measurement (ETH-LMM Y.1731)
    ETH-CFM Statistics
    ETH-CFM Packet Debug
    ETH-CFM CoS Considerations
    OAM Mapping
      CFM Connectivity Fault Conditions
      CFM Fault Propagation Methods
      Epipe Services
      CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Interaction with Pseudowire Redundancy
      Ipipe Services
        CFM Detected Fault
        SAP/SDP-binding Failure (Including Pseudowire Status)
        Service Administratively Shutdown
        Interaction with Pseudowire Redundancy
      VPLS Service
        CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Pseudowire Redundancy and Spanning Tree Protocol
      IES and VPRN Services
      Pseudowire Switching
      LLF and CFM Fault Propagation
      802.3ah EFM OAM Mapping and Interaction with Service Manager
    Service Assurance Agent (SAA)
    OAM Performance Monitoring (OAM-PM)
      Session
      Standard PM Packets
      Detectable Transmit Errors
      Measurement Intervals
      Data Structures and Storage
      Bin Groups
      Relating the Components
      IP Performance Monitoring
        Accounting Policy Configuration
        Service Configuration
        OAM-PM Configuration
      Ethernet Performance Monitoring
        Accounting Policy Configuration
        ETH-CFM Configuration
        Service Configuration
        Ethernet OAM-PM Configuration
      OAM-PM Event Monitoring
    Traceroute with ICMP Tunneling In Common Applications
      BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      VPRN Inter-AS Option B
      VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    Diagnostics Command Reference
      Command Hierarchies
        OAM Commands
          Base Operational Commands
          ATM Diagnostics
          IGMP Snooping
          LDP Diagnostics
          LSP Diagnostics
          SDP Diagnostics
          Common Service Diagnostics
          VLL Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM OAM Commands
        SAA Commands
        OAM Performance Monitoring and Binning Commands
        IP Performance Monitoring Commands
          TWAMP
          TWAMP Light
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         OAM and SAA Commands
          Generic Commands
          OAM Commands
          ATM Diagnostics
          Service Diagnostics
          VPLS MAC Diagnostics
          IGMP Snooping Diagnostics
          EFM Commands
          ETH-CFM OAM Commands
          Service Assurance Agent (SAA) Commands
          OAM SAA Commands
          OAM Performance Monitoring and Binning Commands
          LDP Treetrace Commands
          TWAMP Commands
          TWAMP Light Commands
        Show Commands
          OAM Performance Monitoring and Binning Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
   Getting Started
    About This Guide
    Router Configuration Process
  Mirror Services
    In This Chapter
    Service Mirroring
    Mirror Implementation
      Mirror Source and Destinations
        Local and Remote Mirroring
        Slicing
      Mirroring Performance
      Mirroring Configuration
      ATM Mirroring
      IP Mirroring
        Remote IP Mirroring
        Local IP Mirroring
        Port-ID Enabled PPP Mirroring
    Mirrored Traffic Transport using MPLS-TP SDPs
    Subscriber Mirroring
    Lawful Intercept
      LI Activation Through RADIUS
      Routable Lawful Intercept Encapsulation
    Pseudowire Redundant Mirror Services
      Redundant Mirror Source Notes
    Carrier Grade NAT – Lawful Intercept
    Configuration Process Overview
    Configuration Notes
    Configuring Service Mirroring with CLI
      Mirror Configuration Overview
        Defining Mirrored Traffic
      Lawful Intercept Configuration Overview
        Saving LI Data
        Regulating LI Access
          LI User Access
          LI Source Configuration
        Configurable Filter Lock for Lawful Intercept
        LI MAC Filter Configuration
        LI Logging
    Basic Mirroring Configuration
      Mirror Classification Rules
        Port
        SAP
        MAC filter
        IP filter
        Ingress label
        Subscriber
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirrors and LI
      Configuring a Remote Mirror Service
      Configuring an ATM Mirror Service
      Configuring Lawful Intercept Parameters
      Pseudowire Redundancy for Mirror Services Configuration Example
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
     Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Lawful Intercept Commands
      Command Descriptions
        Generic Commands
        Mirror Destination Configuration Commands
        Lawful Intercept Commands
          Other LI Configuration Commands
     Mirror Service Show and Debug Command Reference
      Command Hierarchies
        Show Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Debug Commands
   OAM, SAA, and OAM-PM
    In This Chapter
    OAM Overview
      LSP Diagnostics: LSP Ping and Trace
      LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      ECMP Considerations
      lsp-ping and lsp-trace over Unnumbered IP Interface
      Downstream Detailed Mapping (DDMAP) TLV
      Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        Responder Node Procedures
        Sender Node Procedures
      LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      LDP ECMP Tree Building
      Periodic Path Exercising
      LSP Ping for RSVP P2MP LSP (P2MP)
      LSP Trace for RSVP P2MP LSP
        LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      Tunneling of ICMP Reply Packets over MPLS LSP
      QoS Handling of Tunneled ICMP Reply Packets
      Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      SDP Diagnostics
      SDP Ping
      SDP MTU Path Discovery
      Service Diagnostics
      VPLS MAC Diagnostics
      MAC Ping
      MAC Trace
      CPE Ping
      CPE Ping for PBB Epipe
        Hardware Support
      MAC Populate
      MAC Purge
      VLL Diagnostics
      VCCV Ping
        VCCV-Ping Application
        VCCV Ping in a Multi-Segment Pseudowire
      Automated VCCV-Trace Capability for MS-Pseudowire
        VCCV for Static Pseudowire Segments
        Detailed VCCV-Trace Operation
        Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          Sending a VCCV Echo Request
          Receiving an VCCV Echo Request
          Receiving an VCCV Echo Reply
      IGMP Snooping Diagnostics
      MFIB Ping
      ATM Diagnostics
      MPLS-TP On-Demand OAM Commands
      MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      MPLS-TP LSPs: LSP-Ping/LSP Trace
      VxLAN Ping Supporting EVPN for VxLAN
      Show Commands
      BFD
    IP Performance Monitoring (IP PM)
      Two-Way Active Measurement Protocol (TWAMP)
      Two-Way Active Measurement Protocol Light (TWAMP Light)
    Ethernet Connectivity Fault Management (ETH-CFM)
      ETH-CFM Building Blocks
      Loopback
      Loopback Multicast
      Linktrace
      Continuity Check (CC)
      CC Remote Peer Auto-Discovery
      CCM Grace Period
      CCM Hold Timers
      Alarm Indication Signal (ETH-AIS Y.1731)
      Client Signal Fail (ETH-CSF Y.1731)
      Test (ETH-TST Y.1731)
      One-Way Delay Measurement (ETH-1DM Y.1731)
      Two-Way Delay Measurement (ETH-DMM Y.1731)
      Synthetic Loss Measurement (ETH-SLM Y.1731)
        Configuration Example
      Frame Loss Measurement (ETH-LMM Y.1731)
    ETH-CFM Statistics
    ETH-CFM Packet Debug
    ETH-CFM CoS Considerations
    OAM Mapping
      CFM Connectivity Fault Conditions
      CFM Fault Propagation Methods
      Epipe Services
      CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Interaction with Pseudowire Redundancy
      Ipipe Services
        CFM Detected Fault
        SAP/SDP-binding Failure (Including Pseudowire Status)
        Service Administratively Shutdown
        Interaction with Pseudowire Redundancy
      VPLS Service
        CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Pseudowire Redundancy and Spanning Tree Protocol
      IES and VPRN Services
      Pseudowire Switching
      LLF and CFM Fault Propagation
      802.3ah EFM OAM Mapping and Interaction with Service Manager
    Service Assurance Agent (SAA)
    OAM Performance Monitoring (OAM-PM)
      Session
      Standard PM Packets
      Detectable Transmit Errors
      Measurement Intervals
      Data Structures and Storage
      Bin Groups
      Relating the Components
      IP Performance Monitoring
        Accounting Policy Configuration
        Service Configuration
        OAM-PM Configuration
      Ethernet Performance Monitoring
        Accounting Policy Configuration
        ETH-CFM Configuration
        Service Configuration
        Ethernet OAM-PM Configuration
      OAM-PM Event Monitoring
    Traceroute with ICMP Tunneling In Common Applications
      BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      VPRN Inter-AS Option B
      VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    Diagnostics Command Reference
      Command Hierarchies
        OAM Commands
          Base Operational Commands
          ATM Diagnostics
          IGMP Snooping
          LDP Diagnostics
          LSP Diagnostics
          SDP Diagnostics
          Common Service Diagnostics
          VLL Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM OAM Commands
        SAA Commands
        OAM Performance Monitoring and Binning Commands
        IP Performance Monitoring Commands
          TWAMP
          TWAMP Light
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         OAM and SAA Commands
          Generic Commands
          OAM Commands
          ATM Diagnostics
          Service Diagnostics
          VPLS MAC Diagnostics
          IGMP Snooping Diagnostics
          EFM Commands
          ETH-CFM OAM Commands
          Service Assurance Agent (SAA) Commands
          OAM SAA Commands
          OAM Performance Monitoring and Binning Commands
          LDP Treetrace Commands
          TWAMP Commands
          TWAMP Light Commands
        Show Commands
          OAM Performance Monitoring and Binning Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Quality of Service Guide R14.0.R1
   Getting Started
    About This Guide
    Alcatel-Lucent SR-Series Router Services Configuration Process
   QoS Policies
    In This Chapter
    QoS Overview
      Forwarding Classes
        High Priority Classes
        Assured Classes
        Best-Effort Classes
    Queue Parameters
      Queue ID
      Unicast or Multipoint Queue
      Queue Hardware Scheduler
      Committed Information Rate
      Peak Information Rate
      Adaptation Rule
      Committed Burst Size
      Maximum Burst Size
      High Priority Only Buffers
      Hi-Low Priority Only Buffers
      WRED Per Queue
        Native Queue Mode
        Pool per Queue Mode
      Packet Markings
      Queue Counters
      Queue-Types
      Color Aware Profiling
    QoS Policies
      Service versus Network QoS
      QoS Policy Entities
      Network QoS Policies
      Network Queue QoS Policies
      Service Ingress QoS Policies
        FC Mapping Based on EXP Bits at VLL/VPLS SAP
        Egress Forwarding Class Override
      Service Egress QoS Policies
      Named Pool Policies
      Slope Policies
        RED Slopes
        Tuning the Shared Buffer Utilization Calculation
        Slope Policy Parameters
      Scheduler Policies
        Virtual Hierarchical Scheduling
        Tiers
          Single Tier Scheduling
          Hierarchical Scheduler Policies
          Hierarchical Virtual Schedulers
        Scheduler Policies Applied to Applications
        Scheduler Policies Applied to SAPs
        Customer Service Level Agreement (SLA)
        Scheduler Policies Applied to Multi-Service Sites
      Shared Queues
      ATM Traffic Descriptor Profiles
      Configuration Notes
   Network QoS Policies
    In This Section
    Overview
      Network Ingress Tunnel QoS Override
        For Tunnel Terminated IP Routing Decisions
          Normal QoS Operation
          Network Ingress IP Match Criteria
          Network Ingress IPv6 Match Criteria
          Tunnel Termination QoS Override Operation
          Enabling and Disabling Tunnel Termination QoS Override
        QoS for Self-Generated (CPU) Traffic on Network Interfaces
          Default DSCP Mapping Table
    Basic Configurations
      Create a Network QoS Policy
      Applying Network Policies
      Default Network Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting Network Policies
      Editing QoS Policies
     Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          Multi-Class Frame-Relay Profile Commands
        Self-Generated Traffic Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Multi-Link Frame Relay Commands
          Network QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-Generated Traffic Commands
        Show Commands
   Network Queue QoS Policies
    In This Section
    Overview
      Network Queue Parent Scheduler
    Basic Configurations
      Create a Network Queue QoS Policy
      Applying Network Queue Policies
        XMAs and MDAs
        Ethernet Ports
        SONET/SDH Ports
    Default Network Queue Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Network Queue QoS Policy Commands
        Show Commands
   Service Egress and Ingress QoS Policies
    In This Section
    Overview
    Basic Configurations
    Service Egress QoS Policy
      Service Egress QoS Queue
      Percent-Rate Support
      Dynamic MBS for Egress Queue Group Queues
        Queue Length as a Delay Value
      Egress SAP Forwarding Class and Forwarding Profile Overrides
      Egress Criteria Classification Directly to Policer
      Dot1p Egress Remarking
        DEI Egress Remarking
          DEI in IEEE 802.1ad
          DEI in IEEE 802.1ah
          IEEE 802.1ad Use Case
          IEEE 802.1ah Use Case
      DSCP/Prec Egress Remarking
      Queue Depth Monitoring
    Service Ingress QoS Policy
      Service Ingress QoS Queue
      Percent-Rate Support
      Service Ingress Forwarding Class (FC)
      Service Ingress IP Match Criteria
      Service Ingress IPv6 Match Criteria
      Service Ingress MAC Match Criteria
        VLAN ID Matching
      Ingress Criteria Classification Directly to Policer
      Virtual Network Identifier (VNI) Classification
      FC Mapping Based on EXP Bits
    Service Management Tasks
      Applying Service Ingress and Egress Policies
        Epipe
        IES
        VPLS
        VPRN
      Editing QoS Policies
      Copying and Overwriting QoS Policies
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
     Service SAP QoS Policy Command Reference
      Command Hierarchies
        Service Ingress QoS Policy Commands
        Service Egress QoS Policy Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Service Ingress QoS Policy Commands
          Service Ingress QoS Policy Forwarding Class Commands
          Service Ingress QoS Policy Entry Commands
          IP QoS Policy Match Commands
          Service Ingress MAC QoS Policy Match Commands
          Service Egress QoS Policy Forwarding Class Commands
          Service Queue QoS Policy Commands
        Show Commands
   Queue Sharing and Redirection
    In This Section
    Queue Sharing and Redirection
      Supported Platforms
      Queue Group Applications
      Access SAP Queue Group Applications
      Ingress Access Port Queue Group Hardware Queue Allocation
      Network Port Queue Groups for IP Interfaces
      Pseudowire Shaping for Layer 2 and Layer 3 Services
      QoS on Ingress Bindings
      Queue Group Templates and Port Queue Groups
      Queue Group Templates
      Port Queue Groups
        Percent-Rate Support
      Forwarding Plane Queue Groups
      Redirection Models
      Access SAP Forwarding Class Based Redirection
      Ingress and Egress SAP Forwarding Class Redirection Association Rules
        Policy Based Provisioning Model
        SAP-Based Provisioning Model
      Access Queue Group Statistics
        Port Queue Groups
        Forwarding Plane Queue Groups
      Network IP Interface Forwarding Class-Based Redirection
      Egress Network Forwarding Class Redirection Association Rules
      Egress Network IP Interface Statistics
      Separate Ingress IPv4 and IPv6 Statistics
      Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Ingress Packet Classification
      Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Egress Marking of PW Packet Header
        Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
      Ingress Per SAP Statistics with Ingress Queue Groups
      Ingress and Egress PW Statistics
      Queue Group Behavior on LAG
      Queue Group Queue Instantiation Per Link
      Per Link Queue Group Queue Parameters
      Adding a Queue Group to an Existing LAG
      Removing a Queue Group from a LAG
      Adding a Port to a LAG
    Basic Configurations
      Configuring an Ingress Queue Group Template
      Configuring Egress Queue Group Template
      Applying Ingress Queue Group to SAP Ingress Policy
      Applying Egress Queue Group to SAP Egress Policy
      SAP-based Egress Queue Re-direction
      Configuring Queue Group on Ethernet Access Ingress Port
      Configuring Overrides
      Configuring Queue Group on Ethernet Access Egress Port
      Configuring Queue Group for Network Egress Traffic on Port
      Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      Specifying QoS Policies on Service SAPs
    QoS Queue Group Template Command Reference
      Command Hierarchies
        Configuring Egress Queue Group Templates
        Configuring Ingress Queue Group Templates
        Show Commands
        Monitor Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Queue Group Commands
        Show Commands
        Monitor Commands
   QoS Scheduler Policies
    In This Section
    Overview
      Scheduler Policies
      Egress Port-Based Schedulers
        Service/Subscriber or Multi-service Site Egress Port Bandwidth Allocation
        Service or Subscriber or Multi-service site Scheduler Child to Port Scheduler Parent
          Direct Service or Subscriber or Multi-service site Queue Association to Port Scheduler Parents
        Frame and Packet-Based Bandwidth Allocation
        Queue Parental Association Scope
        Service or Subscriber or Multi-service Site-Level Scheduler Parental Association Scope
        Network Queue Parent Scheduler
        Foster Parent Behavior for Orphaned Queues and Schedulers
        Congestion Monitoring on Egress Port Scheduler
          Scalability, Performance, and Operation
          Restrictions
      Frame-Based Accounting
        Operational Modifications
        Existing Egress Port Based Virtual Scheduling
        Queue Behavior Modifications for Frame Based Accounting
        Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      Virtual Scheduling Unused Bandwidth Distribution
        Default Unused Bandwidth Distribution
        Limit Unused Bandwidth
      Configuring Port Scheduler Policies
        Port Scheduler Structure
        Special Orphan Queue and Scheduler Behavior
        Packet to Frame Bandwidth Conversion
        Aggregate Rate Limits for Directly Attached Queues
        SAP Egress QoS Policy Queue Parenting
        Network Queue QoS Policy Queue Parenting
        Egress Port Scheduler Overrides
        Applying a Port Scheduler Policy to a Virtual Port
        Applying Aggregate Rate Limit to a VPORT
        Applying a Scheduler Policy to a VPORT
        Weighted Scheduler Group in a Port Scheduler Policy
      Basic Configurations
        Create a QoS Scheduler Policy
        Applying Scheduler Policies
          Customer
          Epipe
          IES
          VPLS
          VPRN
        Creating a QoS Port Scheduler Policy
      Configuring Port Parent Parameters
        Within-CIR Priority Level Parameters
        Above-CIR Priority Level Parameters
      Configuring Distributed LAG Rate
    Service Management Tasks
      Deleting QoS Policies
        Removing a QoS Policy from a Customer Multi-Service Site
        Removing a QoS Policy from SAP(s)
        Removing a Policy from the QoS Configuration
      Copying and Overwriting Scheduler Policies
      Editing QoS Policies
     QoS Scheduler Policy Command Reference
      Command Hierarchies
        Scheduler Policy Configuration Commands
        Port Scheduler Policy Configuration Commands
        Operational Commands
        Show Commands
        Clear Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
        Scheduler Policy Commands
        Port Scheduler Policy Commands
        Show Commands
        Clear Commands
   Slope QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create a Slope QoS Policy
        Applying Slope Policies
          Ports
          MDA (FP1)
          FP (FP2 and higher based hardware)
      Default Slope Policy Values
      Deleting QoS Policies
        Ports
        MDA (FP1)
        FP (FP2 and higher based hardware)
        Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
     Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Slope Policy QoS Commands
          Slope Policy QoS Policy Commands
          RED Slope Commands
        Show Commands
  Shared-Queue QoS Policies
    In This Section
    Overview
      Multipoint Shared Queuing
        Ingress Queuing Modes of Operation
        Ingress Service Queuing
          Ingress Shared Queuing
          Ingress Multipoint Shared Queuing
      Basic Configurations
      Modifying the Default Shared-Queue Policy
        Applying Shared-Queue Policies
          Epipe Services
          IES Services
          VPLS Services
          VPRN Services
      Default Shared Queue Policy Values
     Shared-Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Shared Queue QoS Commands
        Show Commands
  Advanced QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create an Advanced QoS Policy
        Applying Advanced Policies
          Queue Group
          SAP Ingress
          SAP Egress
      Default Advanced Policy Values
      Deleting QoS Policies
        Queue Group
        SAP Ingress
        SAP Egress
      Copying and Overwriting Advanced Policies
      Editing Advanced Policies
    Advanced QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Operational Commands
          Advanced Policy QoS Commands
        Show Commands
   QoS ATM Traffic Descriptor Profiles
    In This Section
    Overview
      ATM Traffic Descriptor Profiles
        ATM Traffic Management
        QoS Model for ATM-Based Services
        ATM Service Categories
        ATM Traffic Descriptors and QoS Parameters
        Policing
        Shaping
        ATM Queuing and Scheduling
        Congestion Avoidance
      Basic Configurations
        Create an ATM-TD-Profile QoS Policy
        Applying ATM-TD-Profile Policies
          ATM VLL (Apipe) SAPs
          Epipe SAPs
          IES SAPs
          Ipipe SAPs
          VPRN SAPs
          VPLS SAPs
      Default ATM-TD-Profile Policy Values
    Service Management Tasks
      Removing a Profile from the QoS Configuration
      Copying and Overwriting Profile
      Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Operational Commands
          ATM QoS Policy Commands
          Show Commands
   Named Pools
    In This Section
    Overview
      Named Pool Mode for IOM3-XP Card
      Basic Configuration
        Create a Named Pool QoS Policy
        Named pool Configuration Procedure
        Allocation Steps
    Named Pools QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Named Pool Policy Creation
          Service Ingress and Egress QoS Policy Commands
        Shared Queue QoS Commands
        Network Queue QoS Policy Commands
        Show Commands
          Named Pool Show Commands
   High Scale Ethernet MDA Capabilities
    In This Section
    HSMDA QoS Model
      Queue Scaling
      Port-Based Scheduling
      Dual Pass Queuing
      Egress Intermediate Destination Secondary Shapers
      Packet and Octet Counting
      Above CIR Discard with PIR Bypass
        HSMDA Ingress Queue Policing Mode
      HSMDA Buffer Utilization Controls
        HSMDA Buffer Pools
        Identifying Queue Groups as Provisioned or System
        Provisioned and System Port Class Pools
        Aggregate Pools for Type and Class Separation
        Use of Aggregate Control Buffer Pools
        HSMDA Buffer Pool Policy
          Default HSMDA Buffer Pool Policy
        Port Class Pool Sizing
        HSMDA Available Buffer Register Operation
      HSMDA Queue Congestion and Buffer Utilization Controls
        Maximum HSMDA Queue Depth
        Control Plane HSMDA RED Slope Policy Management
        HSMDA Slope Policy MBS Parameter
        HSMDA Slope Policy Slope Parameters
        HSMDA Slope Shutdown Behavior
        Ingress Packet Mapping to HSMDA RED Slope
        Egress Packet Mapping to HSMDA RED Slope
        HSMDA Queue Congestion or Pool Congestion Discard Stats
      Egress Queue CIR Based Dot1P Remarking
    SAP Ingress and SAP Egress QoS Policies
      SAP Ingress QoS Policy
      SAP Egress QoS Policy
    Subscriber Queuing Differences
    HSMDA Features
      HSMDA LAG
      Billing
      Resource Management
      HSMDA Queue Groups
        Scheduling Classes
        Scheduling Class Weighted Groups
        Scheduler Strict Priority Levels
        Strict Priority Level PIR
        Scheduler Maximum Rate
        HSMDA Scheduler Policy Overrides
        Orphan Queues
        Default HSMDA Scheduling Policy
      Basic HSMDA Configurations
        HSMDA Pool Policies
        HSMDA Scheduler Policies
        HSMDA Slope Policies
        Egress Queue Group
        Configuring HSMDA Queue Group Overrides
      Applying HSMDA Policies
     HSMDA Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          HSMDA Pool QoS Policy Commands
          HSMDA Scheduler QoS Policy Commands
          HSMDA Slope QoS Policy Commands
          HSMDA WRR QoS Policy Commands
          Show QoS HSMDA Commands
   QoS in MC-MLPPP
    In This Section
    Overview
      Ingress MLPPP Class Reassembly
      Configuring MC-MLPPP QoS Parameters
    Basic Configurations
      Configuring MC-MLPPP
    QoS in MLFR and FRF.12 Fragmentation
      QoS in MLFR
      QoS in FRF.12 End-to-End Fragmentation
     MLPPP Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Configuration Commands
          MC-MLPPP Commands
   Class Fair Hierarchical Policing (CFHP)
    In This Section
    Introduction
    Parent Policer Priority and Unfair Sensitive Discard Thresholds
    CFHP Ingress and Egress Use Cases
    Post-CFHP Queuing and Scheduling
      Ingress CFHP Queuing
      Egress CFHP Queuing
        Policer to Local Queue Mapping
      Egress Subscriber CFHP Queuing
        Subscriber Destination String Queue Group Identification
      SAP Default Destination String
    CFHP Policer Control Policy
      Policer Control Policy Root Arbiter
      Tier 1 and Tier 2 Explicit Arbiters
      Explicit Arbiter Rate Limits
      CFHP with Child Policer Exceed PIR Enabled
    CFHP Child Policer Definition and Creation
    Policer Enabled SAP QoS Policy Applicability
    Child Policer Parent Association
    Profile Capped Policers
    Policer Interaction with Initial Profile, Discard Eligibility, and Ingress Priority
      Ingress ‘Undefined’ Initial Profile
      Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      Egress Explicit Profile Reclassification
      Preserving Out of Profile State at Egress Policer
      Egress Policer CIR Packet Handling without Profile Capped Mode
      Egress Policer CIR Packet Handling with Profile Capped Mode
      Forwarding Traffic Exceeding PIR in Egress Policers
      Ingress Child Policer Stat-Mode
      Egress Child Policer Stat-Mode
    Profile Preferred Mode Root Policers
    Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      Command Hierarchies
        Class Fair Hierarchical Policing Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
  Frequently Used QoS Terms
    In This Chapter
    Above CIR Distribution
    Available Bandwidth
    CBS
    CIR
    CIR Level
    CIR Weight
    Child
    Level
    MBS
    MCR
    Offered Load
    Orphan
    Parent
    Queue
    Rate
    Root (Scheduler)
    Scheduler Policy
    Tier
    Virtual Scheduler
    Weight
    Within CIR Distribution
  Standards and Protocol Support
  Customer Documentation and Product Support
   Getting Started
    About This Guide
    Alcatel-Lucent SR-Series Router Services Configuration Process
   QoS Policies
    In This Chapter
    QoS Overview
      Forwarding Classes
        High Priority Classes
        Assured Classes
        Best-Effort Classes
    Queue Parameters
      Queue ID
      Unicast or Multipoint Queue
      Queue Hardware Scheduler
      Committed Information Rate
      Peak Information Rate
      Adaptation Rule
      Committed Burst Size
      Maximum Burst Size
      High Priority Only Buffers
      Hi-Low Priority Only Buffers
      WRED Per Queue
        Native Queue Mode
        Pool per Queue Mode
      Packet Markings
      Queue Counters
      Queue-Types
      Color Aware Profiling
    QoS Policies
      Service versus Network QoS
      QoS Policy Entities
      Network QoS Policies
      Network Queue QoS Policies
      Service Ingress QoS Policies
        FC Mapping Based on EXP Bits at VLL/VPLS SAP
        Egress Forwarding Class Override
      Service Egress QoS Policies
      Named Pool Policies
      Slope Policies
        RED Slopes
        Tuning the Shared Buffer Utilization Calculation
        Slope Policy Parameters
      Scheduler Policies
        Virtual Hierarchical Scheduling
        Tiers
          Single Tier Scheduling
          Hierarchical Scheduler Policies
          Hierarchical Virtual Schedulers
        Scheduler Policies Applied to Applications
        Scheduler Policies Applied to SAPs
        Customer Service Level Agreement (SLA)
        Scheduler Policies Applied to Multi-Service Sites
      Shared Queues
      ATM Traffic Descriptor Profiles
      Configuration Notes
   Network QoS Policies
    In This Section
    Overview
      Network Ingress Tunnel QoS Override
        For Tunnel Terminated IP Routing Decisions
          Normal QoS Operation
          Network Ingress IP Match Criteria
          Network Ingress IPv6 Match Criteria
          Tunnel Termination QoS Override Operation
          Enabling and Disabling Tunnel Termination QoS Override
        QoS for Self-Generated (CPU) Traffic on Network Interfaces
          Default DSCP Mapping Table
    Basic Configurations
      Create a Network QoS Policy
      Applying Network Policies
      Default Network Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting Network Policies
      Editing QoS Policies
     Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          Multi-Class Frame-Relay Profile Commands
        Self-Generated Traffic Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Multi-Link Frame Relay Commands
          Network QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-Generated Traffic Commands
        Show Commands
   Network Queue QoS Policies
    In This Section
    Overview
      Network Queue Parent Scheduler
    Basic Configurations
      Create a Network Queue QoS Policy
      Applying Network Queue Policies
        XMAs and MDAs
        Ethernet Ports
        SONET/SDH Ports
    Default Network Queue Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Network Queue QoS Policy Commands
        Show Commands
   Service Egress and Ingress QoS Policies
    In This Section
    Overview
    Basic Configurations
    Service Egress QoS Policy
      Service Egress QoS Queue
      Percent-Rate Support
      Dynamic MBS for Egress Queue Group Queues
        Queue Length as a Delay Value
      Egress SAP Forwarding Class and Forwarding Profile Overrides
      Egress Criteria Classification Directly to Policer
      Dot1p Egress Remarking
        DEI Egress Remarking
          DEI in IEEE 802.1ad
          DEI in IEEE 802.1ah
          IEEE 802.1ad Use Case
          IEEE 802.1ah Use Case
      DSCP/Prec Egress Remarking
      Queue Depth Monitoring
    Service Ingress QoS Policy
      Service Ingress QoS Queue
      Percent-Rate Support
      Service Ingress Forwarding Class (FC)
      Service Ingress IP Match Criteria
      Service Ingress IPv6 Match Criteria
      Service Ingress MAC Match Criteria
        VLAN ID Matching
      Ingress Criteria Classification Directly to Policer
      Virtual Network Identifier (VNI) Classification
      FC Mapping Based on EXP Bits
    Service Management Tasks
      Applying Service Ingress and Egress Policies
        Epipe
        IES
        VPLS
        VPRN
      Editing QoS Policies
      Copying and Overwriting QoS Policies
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
     Service SAP QoS Policy Command Reference
      Command Hierarchies
        Service Ingress QoS Policy Commands
        Service Egress QoS Policy Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Service Ingress QoS Policy Commands
          Service Ingress QoS Policy Forwarding Class Commands
          Service Ingress QoS Policy Entry Commands
          IP QoS Policy Match Commands
          Service Ingress MAC QoS Policy Match Commands
          Service Egress QoS Policy Forwarding Class Commands
          Service Queue QoS Policy Commands
        Show Commands
   Queue Sharing and Redirection
    In This Section
    Queue Sharing and Redirection
      Supported Platforms
      Queue Group Applications
      Access SAP Queue Group Applications
      Ingress Access Port Queue Group Hardware Queue Allocation
      Network Port Queue Groups for IP Interfaces
      Pseudowire Shaping for Layer 2 and Layer 3 Services
      QoS on Ingress Bindings
      Queue Group Templates and Port Queue Groups
      Queue Group Templates
      Port Queue Groups
        Percent-Rate Support
      Forwarding Plane Queue Groups
      Redirection Models
      Access SAP Forwarding Class Based Redirection
      Ingress and Egress SAP Forwarding Class Redirection Association Rules
        Policy Based Provisioning Model
        SAP-Based Provisioning Model
      Access Queue Group Statistics
        Port Queue Groups
        Forwarding Plane Queue Groups
      Network IP Interface Forwarding Class-Based Redirection
      Egress Network Forwarding Class Redirection Association Rules
      Egress Network IP Interface Statistics
      Separate Ingress IPv4 and IPv6 Statistics
      Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Ingress Packet Classification
      Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Egress Marking of PW Packet Header
        Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
      Ingress Per SAP Statistics with Ingress Queue Groups
      Ingress and Egress PW Statistics
      Queue Group Behavior on LAG
      Queue Group Queue Instantiation Per Link
      Per Link Queue Group Queue Parameters
      Adding a Queue Group to an Existing LAG
      Removing a Queue Group from a LAG
      Adding a Port to a LAG
    Basic Configurations
      Configuring an Ingress Queue Group Template
      Configuring Egress Queue Group Template
      Applying Ingress Queue Group to SAP Ingress Policy
      Applying Egress Queue Group to SAP Egress Policy
      SAP-based Egress Queue Re-direction
      Configuring Queue Group on Ethernet Access Ingress Port
      Configuring Overrides
      Configuring Queue Group on Ethernet Access Egress Port
      Configuring Queue Group for Network Egress Traffic on Port
      Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      Specifying QoS Policies on Service SAPs
    QoS Queue Group Template Command Reference
      Command Hierarchies
        Configuring Egress Queue Group Templates
        Configuring Ingress Queue Group Templates
        Show Commands
        Monitor Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Queue Group Commands
        Show Commands
        Monitor Commands
   QoS Scheduler Policies
    In This Section
    Overview
      Scheduler Policies
      Egress Port-Based Schedulers
        Service/Subscriber or Multi-service Site Egress Port Bandwidth Allocation
        Service or Subscriber or Multi-service site Scheduler Child to Port Scheduler Parent
          Direct Service or Subscriber or Multi-service site Queue Association to Port Scheduler Parents
        Frame and Packet-Based Bandwidth Allocation
        Queue Parental Association Scope
        Service or Subscriber or Multi-service Site-Level Scheduler Parental Association Scope
        Network Queue Parent Scheduler
        Foster Parent Behavior for Orphaned Queues and Schedulers
        Congestion Monitoring on Egress Port Scheduler
          Scalability, Performance, and Operation
          Restrictions
      Frame-Based Accounting
        Operational Modifications
        Existing Egress Port Based Virtual Scheduling
        Queue Behavior Modifications for Frame Based Accounting
        Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      Virtual Scheduling Unused Bandwidth Distribution
        Default Unused Bandwidth Distribution
        Limit Unused Bandwidth
      Configuring Port Scheduler Policies
        Port Scheduler Structure
        Special Orphan Queue and Scheduler Behavior
        Packet to Frame Bandwidth Conversion
        Aggregate Rate Limits for Directly Attached Queues
        SAP Egress QoS Policy Queue Parenting
        Network Queue QoS Policy Queue Parenting
        Egress Port Scheduler Overrides
        Applying a Port Scheduler Policy to a Virtual Port
        Applying Aggregate Rate Limit to a VPORT
        Applying a Scheduler Policy to a VPORT
        Weighted Scheduler Group in a Port Scheduler Policy
      Basic Configurations
        Create a QoS Scheduler Policy
        Applying Scheduler Policies
          Customer
          Epipe
          IES
          VPLS
          VPRN
        Creating a QoS Port Scheduler Policy
      Configuring Port Parent Parameters
        Within-CIR Priority Level Parameters
        Above-CIR Priority Level Parameters
      Configuring Distributed LAG Rate
    Service Management Tasks
      Deleting QoS Policies
        Removing a QoS Policy from a Customer Multi-Service Site
        Removing a QoS Policy from SAP(s)
        Removing a Policy from the QoS Configuration
      Copying and Overwriting Scheduler Policies
      Editing QoS Policies
     QoS Scheduler Policy Command Reference
      Command Hierarchies
        Scheduler Policy Configuration Commands
        Port Scheduler Policy Configuration Commands
        Operational Commands
        Show Commands
        Clear Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
        Scheduler Policy Commands
        Port Scheduler Policy Commands
        Show Commands
        Clear Commands
   Slope QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create a Slope QoS Policy
        Applying Slope Policies
          Ports
          MDA (FP1)
          FP (FP2 and higher based hardware)
      Default Slope Policy Values
      Deleting QoS Policies
        Ports
        MDA (FP1)
        FP (FP2 and higher based hardware)
        Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
     Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Slope Policy QoS Commands
          Slope Policy QoS Policy Commands
          RED Slope Commands
        Show Commands
  Shared-Queue QoS Policies
    In This Section
    Overview
      Multipoint Shared Queuing
        Ingress Queuing Modes of Operation
        Ingress Service Queuing
          Ingress Shared Queuing
          Ingress Multipoint Shared Queuing
      Basic Configurations
      Modifying the Default Shared-Queue Policy
        Applying Shared-Queue Policies
          Epipe Services
          IES Services
          VPLS Services
          VPRN Services
      Default Shared Queue Policy Values
     Shared-Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Shared Queue QoS Commands
        Show Commands
  Advanced QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create an Advanced QoS Policy
        Applying Advanced Policies
          Queue Group
          SAP Ingress
          SAP Egress
      Default Advanced Policy Values
      Deleting QoS Policies
        Queue Group
        SAP Ingress
        SAP Egress
      Copying and Overwriting Advanced Policies
      Editing Advanced Policies
    Advanced QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Operational Commands
          Advanced Policy QoS Commands
        Show Commands
   QoS ATM Traffic Descriptor Profiles
    In This Section
    Overview
      ATM Traffic Descriptor Profiles
        ATM Traffic Management
        QoS Model for ATM-Based Services
        ATM Service Categories
        ATM Traffic Descriptors and QoS Parameters
        Policing
        Shaping
        ATM Queuing and Scheduling
        Congestion Avoidance
      Basic Configurations
        Create an ATM-TD-Profile QoS Policy
        Applying ATM-TD-Profile Policies
          ATM VLL (Apipe) SAPs
          Epipe SAPs
          IES SAPs
          Ipipe SAPs
          VPRN SAPs
          VPLS SAPs
      Default ATM-TD-Profile Policy Values
    Service Management Tasks
      Removing a Profile from the QoS Configuration
      Copying and Overwriting Profile
      Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Operational Commands
          ATM QoS Policy Commands
          Show Commands
   Named Pools
    In This Section
    Overview
      Named Pool Mode for IOM3-XP Card
      Basic Configuration
        Create a Named Pool QoS Policy
        Named pool Configuration Procedure
        Allocation Steps
    Named Pools QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Named Pool Policy Creation
          Service Ingress and Egress QoS Policy Commands
        Shared Queue QoS Commands
        Network Queue QoS Policy Commands
        Show Commands
          Named Pool Show Commands
   High Scale Ethernet MDA Capabilities
    In This Section
    HSMDA QoS Model
      Queue Scaling
      Port-Based Scheduling
      Dual Pass Queuing
      Egress Intermediate Destination Secondary Shapers
      Packet and Octet Counting
      Above CIR Discard with PIR Bypass
        HSMDA Ingress Queue Policing Mode
      HSMDA Buffer Utilization Controls
        HSMDA Buffer Pools
        Identifying Queue Groups as Provisioned or System
        Provisioned and System Port Class Pools
        Aggregate Pools for Type and Class Separation
        Use of Aggregate Control Buffer Pools
        HSMDA Buffer Pool Policy
          Default HSMDA Buffer Pool Policy
        Port Class Pool Sizing
        HSMDA Available Buffer Register Operation
      HSMDA Queue Congestion and Buffer Utilization Controls
        Maximum HSMDA Queue Depth
        Control Plane HSMDA RED Slope Policy Management
        HSMDA Slope Policy MBS Parameter
        HSMDA Slope Policy Slope Parameters
        HSMDA Slope Shutdown Behavior
        Ingress Packet Mapping to HSMDA RED Slope
        Egress Packet Mapping to HSMDA RED Slope
        HSMDA Queue Congestion or Pool Congestion Discard Stats
      Egress Queue CIR Based Dot1P Remarking
    SAP Ingress and SAP Egress QoS Policies
      SAP Ingress QoS Policy
      SAP Egress QoS Policy
    Subscriber Queuing Differences
    HSMDA Features
      HSMDA LAG
      Billing
      Resource Management
      HSMDA Queue Groups
        Scheduling Classes
        Scheduling Class Weighted Groups
        Scheduler Strict Priority Levels
        Strict Priority Level PIR
        Scheduler Maximum Rate
        HSMDA Scheduler Policy Overrides
        Orphan Queues
        Default HSMDA Scheduling Policy
      Basic HSMDA Configurations
        HSMDA Pool Policies
        HSMDA Scheduler Policies
        HSMDA Slope Policies
        Egress Queue Group
        Configuring HSMDA Queue Group Overrides
      Applying HSMDA Policies
     HSMDA Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          HSMDA Pool QoS Policy Commands
          HSMDA Scheduler QoS Policy Commands
          HSMDA Slope QoS Policy Commands
          HSMDA WRR QoS Policy Commands
          Show QoS HSMDA Commands
   QoS in MC-MLPPP
    In This Section
    Overview
      Ingress MLPPP Class Reassembly
      Configuring MC-MLPPP QoS Parameters
    Basic Configurations
      Configuring MC-MLPPP
    QoS in MLFR and FRF.12 Fragmentation
      QoS in MLFR
      QoS in FRF.12 End-to-End Fragmentation
     MLPPP Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Configuration Commands
          MC-MLPPP Commands
   Class Fair Hierarchical Policing (CFHP)
    In This Section
    Introduction
    Parent Policer Priority and Unfair Sensitive Discard Thresholds
    CFHP Ingress and Egress Use Cases
    Post-CFHP Queuing and Scheduling
      Ingress CFHP Queuing
      Egress CFHP Queuing
        Policer to Local Queue Mapping
      Egress Subscriber CFHP Queuing
        Subscriber Destination String Queue Group Identification
      SAP Default Destination String
    CFHP Policer Control Policy
      Policer Control Policy Root Arbiter
      Tier 1 and Tier 2 Explicit Arbiters
      Explicit Arbiter Rate Limits
      CFHP with Child Policer Exceed PIR Enabled
    CFHP Child Policer Definition and Creation
    Policer Enabled SAP QoS Policy Applicability
    Child Policer Parent Association
    Profile Capped Policers
    Policer Interaction with Initial Profile, Discard Eligibility, and Ingress Priority
      Ingress ‘Undefined’ Initial Profile
      Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      Egress Explicit Profile Reclassification
      Preserving Out of Profile State at Egress Policer
      Egress Policer CIR Packet Handling without Profile Capped Mode
      Egress Policer CIR Packet Handling with Profile Capped Mode
      Forwarding Traffic Exceeding PIR in Egress Policers
      Ingress Child Policer Stat-Mode
      Egress Child Policer Stat-Mode
    Profile Preferred Mode Root Policers
    Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      Command Hierarchies
        Class Fair Hierarchical Policing Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
  Frequently Used QoS Terms
    In This Chapter
    Above CIR Distribution
    Available Bandwidth
    CBS
    CIR
    CIR Level
    CIR Weight
    Child
    Level
    MBS
    MCR
    Offered Load
    Orphan
    Parent
    Queue
    Rate
    Root (Scheduler)
    Scheduler Policy
    Tier
    Virtual Scheduler
    Weight
    Within CIR Distribution
  Standards and Protocol Support
  Customer Documentation and Product Support
RADIUS Attributes Reference Guide R14.0.R1
  RADIUS Attributes Reference
    About this Guide
      Audience
    RADIUS Authentication Attributes
      Subscriber Host Identification
      Wholesale-Retail — Local Access Mode
      Wholesale-Retail — L2TP Tunneled Access Mode
      Business Service Access
      Accounting On-Line Charging
      IP and IPv6 Filters
        IP Filter Attribute Details
      Subscriber Host Creation
      Subscriber Services
      WLAN Gateway
      Virtual Residential Gateway
      Dynamic Data Services
      Lawful Intercept
      IPSEC
      Application Assurance
      CLI User Authentication and Authorization
      AAA Route Downloader
    RADIUS Accounting Attributes
      Enhanced Subscriber Management (ESM) Accounting
      Distributed Subscriber Management (DSM) Accounting
      Subscriber Service Accounting
      Large Scale NAT (LSN) Accounting
      L2TP Tunnel Accounting
      Application Assurance (AA) Accounting
      Dynamic Data Service accounting
      CLI User Access Accounting
      Accounting Terminate Causes
      Accounting Triggered Reason VSA Values
    RADIUS CoA and Disconnect Message Attributes
      Subscriber Host Identification Attributes
      WLAN-GW migrant users Identification Attributes
      Distributed Subscriber Management (DSM) UE Identification Attributes
      IPSec Tunnel Identification Attributes
      Dynamic Data Services Identification Attributes
      Overview of CoA Attributes
      [101] Error-Cause Attribute Values
  Standards and Protocol Support
  Customer Documentation and Product Support
  RADIUS Attributes Reference
    About this Guide
      Audience
    RADIUS Authentication Attributes
      Subscriber Host Identification
      Wholesale-Retail — Local Access Mode
      Wholesale-Retail — L2TP Tunneled Access Mode
      Business Service Access
      Accounting On-Line Charging
      IP and IPv6 Filters
        IP Filter Attribute Details
      Subscriber Host Creation
      Subscriber Services
      WLAN Gateway
      Virtual Residential Gateway
      Dynamic Data Services
      Lawful Intercept
      IPSEC
      Application Assurance
      CLI User Authentication and Authorization
      AAA Route Downloader
    RADIUS Accounting Attributes
      Enhanced Subscriber Management (ESM) Accounting
      Distributed Subscriber Management (DSM) Accounting
      Subscriber Service Accounting
      Large Scale NAT (LSN) Accounting
      L2TP Tunnel Accounting
      Application Assurance (AA) Accounting
      Dynamic Data Service accounting
      CLI User Access Accounting
      Accounting Terminate Causes
      Accounting Triggered Reason VSA Values
    RADIUS CoA and Disconnect Message Attributes
      Subscriber Host Identification Attributes
      WLAN-GW migrant users Identification Attributes
      Distributed Subscriber Management (DSM) UE Identification Attributes
      IPSec Tunnel Identification Attributes
      Dynamic Data Services Identification Attributes
      Overview of CoA Attributes
      [101] Error-Cause Attribute Values
  Standards and Protocol Support
  Customer Documentation and Product Support
Router Configuration Guide R14.0.R1
  Getting Started
    About This Guide
    In This Chapter
    Router Configuration Process
   IP Router Configuration
    In This Chapter
    Configuring IP Router Parameters
      Interfaces
        Network Interface
        Network Domains
        System Interface
        Unicast Reverse Path Forwarding Check (uRPF)
        Creating an IP Address Range
        QoS Policy Propagation Using BGP (QPPB)
          QPPB Applications
          Inter-AS Coordination of QoS Policies
          Traffic Differentiation Based on Route Characteristics
        QPPB
          Associating an FC and Priority with a Route
          Displaying QoS Information Associated with Routes
          Enabling QPPB on an IP interface
          QPPB When Next-Hops are Resolved by QPPB Routes
    &nbs