Note:
The command trees in this section are limited to those commands specific to Triple Play services. For the full command trees for a specific service type refer to the appropriate section in the Services Overview Guide. |
The following commands are supported by the 7750 SR only:
This command administratively disables an entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics.
The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.
Services are created in the administratively down (shutdown) state. When a no shutdown command is entered, the service becomes administratively up and then tries to enter the operationally up state. Default administrative states for services and service entities is described below in Special Cases.
The no form of this command places the entity into an administratively enabled state.
This command creates a text description stored in the configuration file for a configuration context.
The description command associates a text string with a configuration context to help identify the content in the configuration file.
The no form of this command removes the string from the configuration.
No description associated with the configuration context.
This command creates or edits a Virtual Private LAN Services (VPLS) instance.
The vpls command is used to create or maintain a VPLS service. If the service-id does not exist, a context for the service is created. If the service-id exists, the context for editing the service is entered.
A VPLS service connects multiple customer sites together acting like a zero-hop, layer 2 switched domain. A VPLS is always a logical full mesh.
When a service is created, the create keyword must be specified if the create command is enabled in the environment context.
When a service is created, the customer keyword and customer-id must be specified and associates the service with a customer. The customer-id must already exist having been created using the customer command in the service context. Once a service has been created with a customer association, it is not possible to edit the customer association. The service must be deleted and recreated with a new customer association.
To create a management VPLS, the m-vpls keyword must be specified. See section Hierarchical VPLS Redundancy for an introduction to the concept of management VPLS.
Once a service is created, the use of the customer customer-id is optional for navigating into the service configuration context. Attempting to edit a service with the incorrect customer-id specified will result in an error.
More than one VPLS service may be created for a single customer ID.
By default, no VPLS instances exist until they are explicitly created.
The no form of this command deletes the VPLS service instance with the specified service-id. The service cannot be deleted until all SAPs and SDPs defined within the service ID have been shutdown and deleted, and the service has been shutdown.
This command configures an optional service name, up to 64 characters in length, which adds a name identifier to a given service to then use that service name in configuration references as well as display and use service names in show commands throughout the system. This helps the service provider/administrator to identify and manage services within the 7750 SR and 7450 ESS platforms.
All services are required to assign a service ID to initially create a service. However, either the service ID or the service name can be used o identify and reference a given service once it is initially created.
This command creates or edits an IES service instance.
The ies command is used to create or maintain an Internet Ethernet Service (IES). If the service-id does not exist, a context for the service is created. If the service-id exists, the context for editing the service is entered.
IES services allow the creation of customer facing IP interfaces in the same routing instance used for service network core routing connectivity. IES services require that the IP addressing scheme used by the subscriber must be unique between it and other addressing schemes used by the provider and potentially the entire Internet.
While IES is part of the routing domain, the usable IP address space may be limited. This allows a portion of the service provider address space to be set aside for service IP provisioning, becoming administered by a separate but subordinate address authority. This feature is defined using the config router service-prefix command.
IP interfaces defined within the context of an IES service ID must have a SAP created as the access point to the subscriber network. This allows a combination of bridging and IP routing for redundancy purposes.
When a service is created, the customer keyword and customer-id must be specified and associates the service with a customer. The customer-id must already exist having been created using the customer command in the service context. Once a service has been created with a customer association, it is not possible to edit the customer association. The service must be deleted and recreated with a new customer association.
Once a service is created, the use of the customer customer-id is optional for navigating into the service configuration context. Attempting to edit a service with the incorrect customer-id specified will result in an error.
Multiple IES services are created to separate customer owned IP interfaces. More than one IES service may be created for a single customer ID. More than one IP interface may be created within a single IES service ID. All IP interfaces created within an IES service ID belongs to the same customer.
By default, no IES service instances exist until they are explicitly created.
The no form of this command deletes the IES service instance with the specified service-id. The service cannot be deleted until all the IP interfaces defined within the service ID have been shutdown and deleted.
This command creates or edits a Virtual Private Routed Network (VPRN) service instance.
If the service-id does not exist, a context for the service is created. If the service-id exists, the context for editing the service is entered.
VPRN services allow the creation of customer-facing IP interfaces in the same routing instance used for service network core routing connectivity. VPRN services require that the IP addressing scheme used by the subscriber must be unique between it and other addressing schemes used by the provider and potentially the entire Internet.
IP interfaces defined within the context of an VPRN service ID must have a SAP created as the access point to the subscriber network.
When a service is created, the customer keyword and customer-id must be specified and associates the service with a customer. The customer-id must already exist having been created using the customer command in the service context. When a service is created with a customer association, it is not possible to edit the customer association. The service must be deleted and re-created with a new customer association.
When a service is created, the use of the customer customer-id is optional to navigate into the service configuration context. If attempting to edit a service with the incorrect customer-id results in an error.
Multiple VPRN services are created to separate customer-owned IP interfaces. More than one VPRN service can be created for a single customer ID. More than one IP interface can be created within a single VPRN service ID. All IP interfaces created within an VPRN service ID belongs to the same customer.
The no form of the command deletes the VPRN service instance with the specified service-id. The service cannot be deleted until all the IP interfaces and all routing protocol configurations defined within the service ID have been shutdown and deleted.
None — No VPRN service instances exist until they are explicitly created.
service-id: | 1 — 2147483648 |
svc-name: | 64 characters maximum |
This command creates a Service Access Point (SAP) within a service. A SAP is a combination of port and encapsulation parameters which identifies the service access point on the interface and within the router. Each SAP must be unique.
All SAPs must be explicitly created. If no SAPs are created within a service or on an IP interface, a SAP will not exist on that object.
Enter an existing SAP without the create keyword to edit SAP parameters. The SAP is owned by the service in which it was created.
A SAP can only be associated with a single service. A SAP can only be defined on a port that has been configured as an access port using the config interface port-type port-id mode access command. Channelized TDM ports are always access ports.
If a port is shutdown, all SAPs on that port become operationally down. When a service is shutdown, SAPs for the service are not displayed as operationally down although all traffic traversing the service will be discarded. The operational state of a SAP is relative to the operational state of the port on which the SAP is defined.
The no form of this command deletes the SAP with the specified port. When a SAP is deleted, all configuration parameters for the SAP will also be deleted.
No SAPs are defined.
If the card in the slot has Media Dependent Adapters (MDAs) installed, the port-id must be in the slot_number/MDA_number/port_number format. For example 6/2/3 specifies port 3 on MDA 2 in slot 6.
The port-id must reference a valid port type. When the port-id parameter represents SONET/SDH and TDM channels the port ID must include the channel ID. A period “.” separates the physical port from the channel-id. The port must be configured as an access port.
If the SONET/SDH port is configured as clear-channel then only the port is specified.
This command disables MAC address aging across a VPLS service or on a VPLS service SAP or spoke SDP.
Like in a Layer 2 switch, learned MACs can be aged out if no packets are sourced from the MAC address for a period of time (the aging time). In each VPLS service instance, there are independent aging timers for local learned MAC and remote learned MAC entries in the VPLS forwarding database (FDB). The disable-aging command turns off aging for local and remote learned MAC addresses.
When no disable-aging is specified for a VPLS, it is possible to disable aging for specific SAPs and/or spoke SDPs by entering the disable-aging command at the appropriate level.
When the disable-aging command is entered at the VPLS level, the disable-aging state of individual SAPs or SDPs will be ignored.
The no form of this command enables aging on the VPLS service.
no disable-aging
This command enables learning of new MAC addresses in the VPLS forwarding database (FDB) for the service instance, SAP instance or spoke SDP instance.
When disable-learning is enabled, new source MAC addresses will not be entered in the VPLS service forwarding database. This is true for both local and remote MAC addresses.
When no disable-learning is specified for a VPLS on a 7450 ESS, it is possible to disable learning for specific SAPs and/or spoke SDPs by entering the disable-learning command at the appropriate level.
When disabled, new source MAC addresses will be learned and entered into the VPLS forwarding database. When the no disable-learning command is entered on VPLS level on a 7450 ESS, the disable-learning state of individual SAPs or spoke SDPs will be ignored.
This parameter is mainly used in conjunction with the discard-unknown command.
The no form of this command enables learning of MAC addresses meaning that normal MAC learning is enabled.
no disable-learning
By default, packets with unknown destination MAC addresses are flooded. If discard-unknown is enabled at the VPLS level, packets with unknown destination MAC address will be dropped instead (even when configured FIB size limits for VPLS or SAP are not yet reached).
The no form of this command allows flooding of packets with unknown destination MAC addresses in the VPLS.
no discard-unknown
This command specifies the value to send logs and traps when the threshold is reached.
95
This command specifies the value to send logs and traps when the threshold is reached.
90
This command specifies the maximum number of MAC entries in the forwarding database (FDB) for the VPLS instance on this node.
The fdb-table-size specifies the maximum number of forwarding database entries for both learned and static MAC addresses for the VPLS instance.
The no form of this command returns the maximum FDB table size to default.
250 — Forwarding table of 250 MAC entries.
The following values apply only to the 7750 SR:
Specifies the aging time for locally learned MAC addresses in the forwarding database (FDB) for the Virtual Private LAN Service (VPLS) instance.
In a VPLS service, MAC addresses are associated with a Service Access Point (SAP) or with a Service Distribution Point (SDP). MACs associated with a SAP are classified as local MACs, and MACs associated with an SDP are remote MACs.
Like in a Layer 2 switch, learned MACs can be aged out if no packets are sourced from the MAC address for a period of time (the aging time). In each VPLS service instance, there are independent aging timers for local learned MAC and remote learned MAC entries in the FDB. The local-age timer specifies the aging time for local learned MAC addresses.
The no form of this command returns the local aging timer to the default value.
local age 300 — Local MACs aged after 300 seconds.
Specifies the aging time for remotely learned MAC addresses in the forwarding database (FDB) for the Virtual Private LAN Service (VPLS) instance.
In a VPLS service, MAC addresses are associated with a Service Access Point (SAP) or with a Service Distribution Point (SDP). MACs associated with a SAP are classified as local MACs, and MACs associated with an SDP are remote MACs.
Like in a layer 2 switch, learned MACs can be aged out if no packets are sourced from the MAC address for a period of time (the aging time). In each VPLS service instance, there are independent aging timers for local learned MAC and remote learned MAC entries in the FDB. The remote-age timer specifies the aging time for remote learned MAC addresses. To reduce the amount of signaling required between switches configure this timer larger than the local-age timer.
The no form of this command returns the remote aging timer to the default value.
remote age 900 — Remote MACs aged after 900 seconds.
This command configures the service payload (Maximum Transmission Unit – MTU), in bytes, for the service. This MTU value overrides the service-type default MTU.
The service-mtu defines the payload capabilities of the service. It is used by the system to validate the SAP and SDP binding’s operational state within the service.
The service MTU and a SAP’s service delineation encapsulation overhead (i.e., 4 bytes for a Dot1q tag) is used to derive the required MTU of the physical port or channel on which the SAP was created. If the required payload is larger than the port or channel MTU, then the SAP will be placed in an inoperative state. If the required MTU is equal to or less than the port or channel MTU, the SAP will be able to transition to the operative state.
When binding an SDP to a service, the service MTU is compared to the path MTU associated with the SDP. The path MTU can be administratively defined in the context of the SDP. The default or administrative path MTU can be dynamically reduced due to the MTU capabilities discovered by the tunneling mechanism of the SDP or the egress interface MTU capabilities based on the next hop in the tunnel path. If the service MTU is larger than the path MTU, the SDP binding for the service will be placed in an inoperative state. If the service MTU is equal to or less than the path MTU, then the SDP binding will be placed in an operational state.
In the event that a service MTU, port or channel MTU, or path MTU is dynamically or administratively modified, then all associated SAP and SDP binding operational states are automatically re-evaluated.
The no form of this command returns the default service-mtu for the indicated service type to the default value.
VPLS: 1514
The following table displays MTU values for specific VC types.
VC-Type | Example Service MTU | Advertised MTU |
Ethernet | 1514 | 1500 |
Ethernet (with preserved dot1q) | 1518 | 1504 |
VPLS | 1514 | 1500 |
VPLS (with preserved dot1q) | 1518 | 1504 |
VLAN (dot1p transparent to MTU value) | 1514 | 1500 |
VLAN (QinQ with preserved bottom Qtag) | 1518 | 1504 |
This command creates a new split horizon group for the VPLS instance. Traffic arriving on a SAP or spoke SDP within this split horizon group will not be copied to other SAPs or spoke SDPs in the same split horizon group.
A split horizon group must be created before SAPs and spoke SDPs can be assigned to the group.
The split horizon group is defined within the context of a single VPLS. The same group-name can be re-used in different VPLS instances.
Up to 30 split horizon groups can be defined per VPLS instance.
The no form of the command removes the group name from the configuration.
A split horizon group is by default not created as a residential-group.
This command creates a Service Access Point (SAP) within a service. A SAP is a combination of port and encapsulation parameters which identifies the service access point on the interface and within the 7450 ESS or 7750 SR. Each SAP must be unique. All SAPs must be explicitly created. If no SAPs are created within a service or on an IP interface, a SAP will not exist on that object.
Enter an existing SAP without the create keyword to edit SAP parameters. The SAP is owned by the service in which it was created.
A SAP can only be associated with a single service. A SAP can only be defined on a port that has been configured as an access port using the config interface port-type port-id mode access command. Channelized TDM ports are always access ports (TDM applies to the 7750 SR only).
If a port is shutdown, all SAPs on that port become operationally down. When a service is shutdown, SAPs for the service are not displayed as operationally down although all traffic traversing the service will be discarded. The operational state of a SAP is relative to the operational state of the port on which the SAP is defined.
The no form of this command deletes the SAP with the specified port. When a SAP is deleted, all configuration parameters for the SAP will also be deleted. For Internet Ethernet Service (IES), the IP interface must be shutdown before the SAP on that interface may be removed.
No SAPs are defined.
A default SAP has the following format: port-id:*. This type of SAP is supported only on Ethernet MDAs and its creation is allowed only in the scope of Layer 2 services (Epipe and VPLS). This type of SAP is mutually exclusive with a SAP defined by explicit null encapsulation (for example, 1/1/1:0).
If the card in the slot has Media Dependent Adapters (MDAs) installed, the port-id must be in the slot_number/MDA_number/port_number [.channel] format. For example 6/2/3 specifies port 3 on MDA 2 in slot 6.
The port-id must reference a valid port type. When the port-id parameter represents SONET/SDH and TDM channels, the port ID must include the channel ID. A period “.” separates the physical port from the channel-id. The port must be configured as an access port.
If the SONET/SDH port is configured as clear-channel then only the port is specified.
This command creates the accounting policy context that can be applied to a SAP or SDP.
An accounting policy must be defined before it can be associated with a SAP or SDP.
If the policy-id does not exist, an error message is generated.
A maximum of one accounting policy can be associated with a SAP or SDP at one time. Accounting policies are configured in the config>log context.
The no form of this command removes the accounting policy association from the SAP or SDP, and the accounting policy reverts to the default.
Default accounting policy.
This command enables accounting and statistical data collection for either the SAP or SDP, network port, or IP interface. When applying accounting policies the data, by default, is collected in the appropriate records and written to the designated billing file.
When the no collect-stats command is issued the statistics are still accumulated by the IOM cards. However, the CPU will not obtain the results and write them to the billing file. If a subsequent collect-stats command is issued then the counters written to the billing file include all the traffic while the no collect-stats command was in effect.
collect-stats
This command enables cflowd to collect traffic flow samples through a router for analysis and applies to the 7750 SR only.
cflowd is used for network planning and traffic engineering, capacity planning, security, application and user profiling, performance monitoring, usage-based billing, and SLA measurement. When cflowd is enabled at the interface level, all packets forwarded by the interface are subjected to analysis according to the cflowd configuration.
no cflowd
This command indicates whether or not the mac-move agent, when enabled using config>service>vpls>mac-move or config>service>epipe>mac-move, will limit the MAC re-learn (move) rate on this SAP.
SAPs and spoke SDPs are blockable
Enabling this command will disable re-learning of MAC addresses on other SAPs within the VPLS. The MAC address will remain attached to a given SAP for the duration of its age-timer.
The age of the MAC address entry in the FIB is set by the age timer. If mac-aging is disabled on a given VPLS service, any MAC address learned on a SAP/SDP with mac-pinning enabled will remain in the FIB on this SAP/SDP forever.
Every event that would otherwise result in re-learning will be logged (MAC address, original-SAP, new-SAP).
Note:
MAC addresses learned during DHCP address assignment (DHCP snooping enabled) are not impacted by this command. MAC-pinning for such addresses is implicit. |
When a SAP or spoke SDP is part of a Residential Split Horizon Group (RSHG), MAC pinning is activated at creation of the SAP. Otherwise MAC pinning is not enabled by default.
This command enters the context for configuring VLAN ranges to be managed by a management VPLS. The list indicates, for each SAP, the ranges of associated VLANs that will be affected when the SAP changes state.
This command is only valid when the VPLS in which it is entered was created as a management VPLS.
This command configures a range of VLANs on an access port that are to be managed by an existing management VPLS.
This command is only valid when the VPLS in which it is entered was created as a management VPLS, and when the SAP in which it was entered was created on an Ethernet port with encapsulation type of dot1q or qinq, or on a SONET/SDH port with encapsulation type of bcp-dot1q.
To modify the range of VLANs, first the new range should be entered and afterwards the old range removed.
None
This is a capture SAP level command and applies to the 7750 SR only. This command is important in PPPoE deployments with MSAPs. PPPoE operation requires that the MAC address learned by the client at the very beginning of the session negotiation phase remains unchanged for the lifetime of the session (RFC 2516). This command will ensure that the virtual MAC address used during the PPPoE session negotiation phase on the capture SAP is the same virtual MAC address that is used by the SRRP on the group-interface on which the session is established. Therefore, it is mandated that the SRRP instance (and implicitly the group-interface) where the session belongs to is known in advance. If the group-interface name for the session is returned by the RADIUS, it must be ensured that this group-interface is the one on which the tracked SRRP instance is configured. PPPoE sessions on the same capture SAP cannot be shared across multiple group-interfaces, but instead they all must belong to a single group-interface that is known in advance.
The same restrictions will apply to IPoE clients in MC Redundancy scenario if they are to be supported concurrently on the same capture SAP as PPPoE.
The supported capture SAP syntax is this:
sap <port-id>:X.* capture-sap
The capture SAP syntax that is NOT supported is this:
sap <port-id>:*.* capture-sap
None
Note:
The commands described in this section apply only to the 7750 SR. |
This command enables access to the context to configure ATM-related attributes. This command can only be used when a given context (for example, a channel or SAP) supports ATM functionality such as:
If ATM functionality is not supported for a given context, the command returns an error.
This command enables the context to configure egress ATM attributes for the SAP.
This command specifies the data encapsulation for an ATM PVCC delimited SAP. The definition references RFC 2684, Multiprotocol Encapsulation over ATM AAL5, and to the ATM Forum LAN Emulation specification.
Ingress traffic that does not match the configured encapsulation will be dropped.
The encapsulation is driven by the services for which the SAP is configured.
For IES and VPRN service SAPs, the default is aal5snap-routed.
This command enables the context to configure ingress ATM attributes for the SAP.
This command assigns an ATM traffic descriptor profile to a given context (for example, a SAP).
When configured under the ingress context, the specified traffic descriptor profile defines the traffic contract in the forward direction.
When configured under the egress context, the specified traffic descriptor profile defines the traffic contract in the backward direction.
The no form of the command reverts the traffic descriptor to the default traffic descriptor profile.
The default traffic descriptor (trafficDescProfileId. = 1) is associated with newly created PVCC-delimited SAPs.
This command enables the context to configure OAM functionality for a PVCC delimiting a SAP.
The ATM-capable MDAs support F5 end-to-end OAM functionality (AIS, RDI, loopback):
This command configures AIS/RDI fault management on a PVCC. Fault management allows PVCC termination to monitor and report the status of their connection by propagating fault information through the network and by driving PVCC’s operational status.
When alarm-cells functionality is enabled, PVCC’s operational status is affected when a PVCC goes into AIS or RDI state because of an AIS/RDI processing (i.e. assuming nothing else affects PVCC’s operational status, PVCC goes DOWN, when it enters a fault state and comes back UP, when it exits that fault state) and RDI cells are generated when PVCC is operationally DOWN. No OAM-specific SNMP trap is raised whenever an endpoint enters/exits an AIS or RDI state; however, if as result of an OAM state change, the PVCC changes operational status; then a trap is expected from an entity the PVCC is associated with (for example a SAP).
The no command disables alarm-cells functionality for a PVCC. When alarm-cells functionality is disabled, PVCC’s operational status is no longer affected by PVCC’s OAM state changes due to AIS/RDI processing and RDI cells are not generated as result of PVCC going into an AIS or RDI state; however, PVCC’s OAM status will record OAM faults as described above.
Note:
When alarm-cells is disabled, a PVCC will change operational status to UP, if it was DOWN because of the alarm-cell processing. |
Enabled for PVCCs delimiting VPLS SAPs
This command defines which subscriber authentication policy must be applied when a DHCP message is received on the interface. The authentication policies must already be defined. The policy will only be applied when DHCP snooping is enabled on the SAP on Layer 2 interfaces.
This command specifies whether this port is allowed to become an STP root port. It corresponds to the restrictedRole parameter in 802.1Q. If set, it can cause lack of spanning tree connectivity.
no root-guard
Subscriber management commands are also described in the Triple Play Services Command Reference section.
This command enables the context to configure subscriber management parameters for this SAP.
no sub-sla-mgmt
This command specifies a default SLA profile for this SAP. The SLA profile must be defined prior to associating the profile with a SAP in the config>subscr-mgmt>sla-profile context.
An SLA profile is a named group of QoS parameters used to define per service QoS for all subscriber hosts common to the same subscriber within a provider service offering. A single SLA profile may define the QoS parameters for multiple subscriber hosts. SLA profiles are maintained in two locations, the subscriber identification policy and the subscriber profile templates. After a subscriber host is associated with an SLA profile name, either the subscriber identification policy used to identify the subscriber or the subscriber profile associated with the subscriber host must contain an SLA profile with that name. If both the subscriber identification policy and the subscriber profile contain the SLA profile name, the SLA profile in the subscriber profile is used.
The no form of the command removes the default SLA profile from the SAP configuration.
no def-sla-profile
This command specifies a default subscriber profile for this SAP. The subscriber profile must be defined prior to associating the profile with a SAP in the config>subscr-mgmt>sub-profile context.
A subscriber profile defines the aggregate QoS for all hosts within a subscriber context. This is done through the definition of the egress and ingress scheduler policies that govern the aggregate SLA for subscriber using the subscriber profile. Subscriber profiles also allow for specific SLA profile definitions when the default definitions from the subscriber identification policy must be overridden.
The no form of the command removes the default SLA profile from the SAP configuration.
This command associates a subscriber identification policy to this SAP. The subscriber identification policy must be defined prior to associating the profile with a SAP in the config>subscr-mgmt>sub-ident-policy context.
Subscribers are managed by the system through the use of subscriber identification strings. A subscriber identification string uniquely identifies a subscriber. For static hosts, the subscriber identification string is explicitly defined with each static subscriber host.
For dynamic hosts, the subscriber identification string must be derived from the DHCP ACK message sent to the subscriber host. The default value for the string is the content of Option 82 CIRCUIT-ID and REMOTE-ID fields interpreted as an octet string. As an option, the DHCP ACK message may be processed by a subscriber identification policy which has the capability to parse the message into an alternative ASCII or octet string value.
When multiple hosts on the same port are associated with the same subscriber identification string they are considered to be host members of the same subscriber.
The no form of the command removes the default subscriber identification policy from the SAP configuration.
no sub-ident-policy
For VPLS SAPs with arp-reply-agent enabled with the optional sub-ident parameter, the static subscriber host’s sub-ident-string is used to determine whether an ARP request received on the SAP is sourced from a host belonging to the same subscriber as the destination host. When both the destination and source hosts from the ARP request are known on the SAP and the subscriber identifications do not match, the ARP request may be forwarded to the rest of the destinations.
If the static subscriber host’s sub-ident string is not defined, the host is not considered to belong to the same subscriber as another host on the SAP.
If source or destination host is unknown, the hosts are not considered to belong to the same subscriber. (ARP messages from unknown hosts are subject to anti-spoof filtering rules applied at the SAP.)
If sub-ident is not enabled on the SAP arp-reply-agent, subscriber identification matching is not performed on ARP requests received on the SAP. ARP requests are never forwarded back to the same SAP or within the receiving SAP’s Split Horizon Group.
This command enables profiled traffic only for this SAP. The profiled traffic refers to single subscriber traffic on a dedicated SAP (in the VLAN-per-subscriber model). When enabled, subscriber queues are instantiated through the QOS policy defined in the sla-profile and the associated SAP queues are deleted. This can increase subscriber scaling by reducing the number of queues instantiated per subscriber (in the VLAN-per-subscriber model). In order for this to be achieved, any configured multi-sub-sap limit must be removed (leaving the default of 1).
The no form of the command disables the command.
This command configures non-subscriber traffic profiles. It is used in conjunction with the profiled-traffic-only on single subscriber SAPs and creates a subscriber host which is used to forward non-IP traffic through the single subscriber SAP without the need for SAP queues.
The no form of the command removes the profiles and disables the feature.
This command only applies to the 7750 SR.
For SAPs with arp-reply-agent enabled with the optional sub-ident parameter, the static subscriber host’s sub-ident-string is used to determine whether an ARP request received on the SAP is sourced from a host belonging to the same subscriber as the destination host. When both the destination and source hosts from the ARP request are known on the SAP and the subscriber identifications do not match, the ARP request may be forwarded to the rest of the destinations.
If the static subscriber host’s sub-ident string is not defined, the host is not considered to belong to the same subscriber as another host on the SAP.
If source or destination host is unknown, the hosts are not considered to belong to the same subscriber. (ARP messages from unknown hosts are subject to anti-spoof filtering rules applied at the SAP.)
If sub-ident is not enabled on the SAP arp-reply-agent, subscriber identification matching is not performed on ARP requests received on the SAP.
ARP requests are never forwarded back to the same SAP or within the receiving SAP’s Split Horizon Group.
This command enables profiled traffic only for this SAP. The profiled traffic refers to single subscriber traffic on a dedicated SAP (in the VLAN-per-subscriber model). When enabled, subscriber queues are instantiated through the QOS policy defined in the sla-profile and the associated SAP queues are deleted. This can increase subscriber scaling by reducing the number of queues instantiated per subscriber (in the VLAN-per-subscriber model). In order for this to be achieved, any configured multi-sub-sap limit must be removed (leaving the default of 1).
The no form of the command disables the command.
This command only applies to the 7750 SR.
This command enables fast leave.
When IGMP fast leave processing is enabled, the 7450 ESS or 7750 SR will immediately remove a SAP or SDP from the IP multicast group when it detects an IGMP 'leave' on that SAP or SDP. Fast leave processing allows the switch to remove a SAP or SDP that sends a 'leave' from the forwarding table without first sending out group-specific queries to the SAP or SDP, and thus speeds up the process of changing channels ('zapping').
Fast leave should only be enabled when there is a single receiver present on the SAP or SDP.
When fast leave is enabled, the configured last-member-query-interval value is ignored.
no fast-leave
This command configures the VPLS from which multicast traffic is copied upon receipt of an IGMP join request.
IGMP snooping must be enabled on the MVR VPLS.
no from-vpls
This command adds a static multicast group either as a (*, g) or as one or more (s,g) records. When a static IGMP group is added, multicast data for that (*,g) or (s,g) is forwarded to the specific SAP or SDP without receiving any membership report from a host.
none
Identifies filter policy of multicast groups to be applied to this MVR VPLS. The sources of the multicast traffic must be a member of the MVR VPLS
The no form of the command removes the MVR policy association from the VPLS.
no import policy is specified.
This command enables the Internet Group Management Protocol (IGMP) snooping context.
none
This command configures MLD snooping parameters.
This command specifies the import routing policy to be used for IGMP packets to be used on this SAP or SDP. Only a single policy can be imported on a single SAP at any time.
The no form of the command removes the policy association from the SAP or SDP.
no import (No import policy is specified)
This command configures the maximum response time used in group-specific queries sent in response to 'leave' messages, and is also the amount of time between 2 consecutive group-specific queries. This value may be tuned to modify the leave latency of the network. A reduced value results in reduced time to detect the loss of the last member of a group.
The configured last-member-query-interval is ignored when fast-leave is enabled on the SAP or SDP.
10
This command defines the maximum number of multicast groups that can be joined on this SAP or SDP. If the 7450 ESS or 7750 SR receives an IGMP join message that would exceed the configured number of groups, the request is ignored.
no max-num-groups
This command configures multicast CAC policy and constraints for this interface.
none
This command configures the multicast CAC policy name.
This command configures the bandwidth for the interface's multicast CAC policy traffic. When disabled (no unconstrained-bw) there will be no checking of bandwidth constraints on the interface level. When enabled and a policy is defined, enforcement is performed. The allocated bandwidth for optional channels should not exceed the unconstrained-bw minus the mandatory-bw and the mandatory channels have to stay below the specified value for the mandatory-bw. After this interface check, the bundle checks are performed.
If the bandwidth value is 0, no mandatory channels are allowed. If bandwidth is not configured, then all mandatory and optional channels are allowed.
If the value of mandatory-bw is equal to the value of bandwidth, then all the unconstrained bandwidth on a given interface is allocated to mandatory channels configured through multicast CAC policy on that interface and no optional groups (channels) are allowed.
The value of mandatory-bw should always be less than or equal to that of bandwidth, An attempt to set the value of mandatory-bw greater than that of bandwidth, will result in inconsistent value error.
This command specifies whether a multicast router is attached behind this SAP or SDP.
Configuring a SAP as an mrouter-port will have a double effect. Firstly, all multicast traffic received on another SAP or SDP will be copied to this SAP or SDP. Secondly, IGMP reports generated by the system as a result of someone joining or leaving a multicast group, will be sent to this SAP or SDP.
If two multicast routers exist in the network, one of them will become the active querier. While the other multicast router (non-querier) stops sending IGMP queries, it should still receive reports to keep its multicast trees up to date. To support this, the mrouter-port should be enabled on all SAPs or SDPs connecting to a multicast router.
Note:
The IGMP version to be used for the reports (v1, v2 or v3) can only be determined after an initial query has been received. Until such time no reports are sent on the SAP or spoke SDP, even if mrouter-port is enabled. |
If the send-queries command is enabled on this SAP or spoke SDP, the mrouter-port parameter can not be set.
no mrouter-port
This command enables the context to configure Multicast VPLS Registration (MVR) parameters.
If the send-queries command is enabled, this parameter specifies the interval between two consecutive general queries sent by the system on this SAP or SDP.
The configured query-interval must be greater than the configured query-response-interval.
If send-queries is not enabled on this SAP or SDP, the configured query-interval value is ignored.
125
This command configures the IP source address used in IGMP or MLD queries.
If the send-queries command is enabled, this parameter specifies the maximum response time advertised in IGMPv2/v3 queries.
The configured query-response-interval must be smaller than the configured query-interval.
If send-queries is not enabled on this SAP or SDP, the configured query-response-interval value is ignored.
10
This parameters specifies the source IP address used when generating IGMP reports. According the IGMPv3 standard, a zero source address is allowed in sending IGMP reports. However, for interoperability with some multicast routers, the source IP address of IGMP group reports can be configured using this command.
0.0.0.0
If the send-queries command is enabled, this parameter allows tuning for the expected packet loss on a SAP or SDP. The robust-count variable allows tuning for the expected packet loss on a subnet and is comparable to a retry count. If this SAP or SDP is expected to be 'lossy', this parameter may be increased. IGMP snooping on this SAP or SDP is robust to (robust-count-1) packet losses.
If send-queries is not enabled, this parameter will be ignored.
2
This command specifies whether to send IGMP general query messages on the SAP or SDP.
If mrouter-port is enabled on this SAP or spoke SDP, the send-queries command parameter can not be set.
no send-queries
This command adds a static (s,g) entry to allow multicast traffic for the corresponding multicast group from that specific source. For the same multicast group, more than one source can be specified.
Static (s,g) entries can not be entered when a starg is already created.
Use the no form of the command to remove the source from the configuration.
none
This command adds a static (*,g) entry to allow multicast traffic for the corresponding multicast group from any source. This command can only be enabled if no existing source addresses for this group are specified.
Use the no form of the command to remove the starg entry from the configuration.
no starg
This command enables access to the context to configure static group addresses. Static group addresses can be configured on a SAP or SDP. When present either as a (*, g) or a (s,g) entry, multicast packets matching the configuration will be forwarded even if no join message was registered for the specific group.
none
In some situations, the multicast traffic should not be copied from the MVR VPLS to the SAP on which the IGMP message was received (standard MVR behavior) but to another SAP.
This command configures the SAP to which the multicast data needs to be copied.
no to-sap
This command enables anti-spoof filtering and optionally changes the anti-spoof matching type for the SAP.
The type of anti-spoof filtering defines what information in the incoming packet is used to generate the criteria to lookup an entry in the anti-spoof filter table. The type parameter (ip, mac, ip-mac) defines the anti-spoof filter type enforced by the SAP when anti-spoof filtering is enabled.
The no form of the command disables anti-spoof filtering on the SAP.
no anti-spoof
This command enables the context to configure ARP host parameters.
This command is used to configure the Diameter NASREQ application policy to use for authentication.
This command configures the maximum number of ARP hosts.
The no form of the command returns the value to the default.
1
Note:
The operational maximum value may be smaller due to equipped hardware dependencies. |
This command configures the minimum authentication interval.
The no form of the command returns the value to the default.
15
This command enables a special ARP response mechanism in the system for ARP requests destined to static or dynamic hosts associated with the SAP. The system responds to each ARP request using the hosts MAC address as the both the source MAC address in the Ethernet header and the target hardware address in the ARP header.
ARP replies and requests received on a SAP with arp-reply-agent enabled will be evaluated by the system against the anti-spoof filter entries associated with the ingress SAP (if the SAP has anti-spoof filtering enabled). ARPs from unknown hosts on the SAP will be discarded when anti-spoof filtering is enabled.
The ARP reply agent only responds if the ARP request enters an interface (SAP, spoke-SDP or mesh-SDP) associated with the VPLS instance of the SAP.
A received ARP request that is not in the ARP reply agent table is flooded to all forwarding interfaces of the VPLS capable of broadcast except the ingress interface while honoring split-horizon constraints.
Static hosts can be defined on the SAP using the host command. Dynamic hosts are enabled on the system by enabling the lease-populate command in the SAP’s dhcp context. In the event that both a static host and a dynamic host share the same IP and MAC address, the VPLS ARP reply agent will retain the host information until both the static and dynamic information are removed. In the event that both a static and dynamic host share the same IP address, but different MAC addresses, the VPLS ARP reply agent is populated with the static host information.
The arp-reply-agent command will fail if an existing static host on the SAP does not have both MAC and IP addresses specified. Once the ARP reply agent is enabled, creating a static host on the SAP without both an IP address and MAC address will fail.
The ARP-reply-agent may only be enabled on SAPs supporting Ethernet encapsulation.
The no form of the command disables ARP-reply-agent functions for static and dynamic hosts on the SAP.
not enabled
Hosts are identified by their subscriber information. For DHCP subscriber hosts, the subscriber hosts, the subscriber information is configured using the optional subscriber parameter string.
When arp-reply-agent is enabled with sub-ident:
This command enables the inclusion of the calling-station-id attribute in RADIUS authentication requests and RADIUS accounting messages. This command only applies to the 7750 SR.
no calling-station-id
This command associates this IPv6 host to the specified IPv4 host through the learned MAC address. A learned MAC from the IPv6 host will be associated with the IPv4 host and vice versa. This command only applies to the 7750 SR.
none
This command specifies the name of the RIP policy up to 32 characters in length.
The no form of the command removes the policy name from the static-host configuration.
This command only applies to the 7750 SR.
none
This command enables the context to configure IGMP host tracking parameters and only applies to the 7750 SR.
This command enables the IGMP router alert check option.
The no form of the command disables the router alert check.
This command only applies to the 7750 SR.
This command configures the time that the system continues to track inactive hosts.
The no form of the command removes the values from the configuration.
This command only applies to the 7750 SR.
no expiry-time
This command specifies the import routing policy to be used for IGMP packets to be used on this SAP or SDP. Only a single policy can be imported on a single SAP at any time.
The no form of the command removes the policy association from the SAP or SDP.
This command only applies to the 7750 SR.
no import (No import policy is specified)
This command configures the maximum number of multicast groups allowed to be tracked.
The no form of the command removes the values from the configuration.
This command only applies to the 7750 SR.
no max-num-groups
This command configures the maximum number of multicast sources allowed to be tracked per group.
The no form of the command removes the value from the configuration.
This command only applies to the 7750 SR.
This command configures the maximum number of group sources for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources will not be allowed. When this object has a value of 0, there is no limit to the number of group sources.
The no form of the command removes the value from the configuration.
This command only applies to the 7750 SR.
no max-num-grp-sources
This command enables the context to configure egress Quality of Service (QoS) policies and filter policies.
If no QoS policy is defined, the system default QoS policy is used for egress processing. If no egress filter is defined, no filtering is performed.
This command enables the context to configure ingress Quality of Service (QoS) policies and filter policies.
If no QoS policy is defined, the system default sap-ingress QoS policy is used for ingress processing. If no ingress filter is defined, no filtering is performed.
This command associates an IP filter policy or MAC filter policy with an ingress or egress Service Access Point (SAP) or IP interface.
Filter policies control the forwarding and dropping of packets based on IP or MAC matching criteria. There are two types of filter policies: IP and MAC. Only one type may be applied to a SAP at a time.
The filter command is used to associate a filter policy with a specified filter ID with an ingress or egress SAP. The filter ID must already be defined before the filter command is executed. If the filter policy does not exist, the operation will fail and an error message returned.
In general, filters applied to SAPs (ingress or egress) apply to all packets on the SAP. One exception is non-IP packets are not applied to IP match criteria, so the default action in the filter policy applies to these packets.
The no form of this command removes any configured filter ID association with the SAP or IP interface. The filter ID itself is not removed from the system unless the scope of the created filter is set to local. To avoid deletion of the filter ID and only break the association with the service object, use scope command within the filter definition to change the scope to local or global. The default scope of a filter is local.
This command is used to control an HQoS aggregate rate limit. It is used in conjunction with the following parameter commands: rate, limit-unused-bandwidth, and queue-frame-based-accounting.
This command defines the enforced aggregate rate for all queues associated with the agg-rate context. A rate must be specified for the agg-rate context to be considered to be active on the context’s object (SAP, subscriber, VPORT etc.).
This command is used to enable (or disable) aggregate rate overrun protection on the agg-rate context.
This command is used to enabled (or disable) frame based accounting on all queues associated with the agg-rate context. Only supported on Ethernet ports. Not supported on HSMDA Ethernet ports.
This command associates an IP filter policy with an ingress or egress Service Access Point (SAP). Filter policies control the forwarding and dropping of packets based on the matching criteria. MAC filters are only allowed on Epipe and Virtual Private LAN Service (VPLS) SAPs.
The filter command is used to associate a filter policy with a specified filter ID with an ingress or egress SAP. The filter policy must already be defined before the filter command is executed. If the filter policy does not exist, the operation will fail and an error message returned.
In general, filters applied to SAPs (ingress or egress) apply to all packets on the SAP. One exception is non-IP packets are not applied to the match criteria, so the default action in the filter policy applies to these packets.
The no form of this command removes any configured filter ID association with the SAP. The filter ID itself is not removed from the system unless the scope of the created filter is set to local. To avoid deletion of the filter ID and only break the association with the service object, use scope command within the filter definition to change the scope to local or global. The default scope of a filter is local.
When enabled (the encapsulation type of the access port where this SAP is defined as qinq), the qinq-mark-top-only command specifies which P-bits to mark during packet egress. When disabled, both set of P-bits are marked. When the enabled, only the P-bits in the top Q-tag are marked. This command only applies to the 7750 SR.
no qinq-mark-top-only
This command places a VPLS Ethernet SAP into an egress multicast group. The SAP must comply with the egress multicast group’s common requirements for member SAPs. If the SAP does not comply, the command will fail and the SAP will not be a member of the group. Common requirements for an egress multicast group are listed below:
Once a SAP is a member of an egress multicast group, the following rules apply:
Once a SAP is included in an egress multicast group, it is then eligible for efficient multicast replication if the egress forwarding plane performing replication for the SAP is capable. If the SAP is defined as a Link Aggregation Group (LAG) SAP, it is possible that some links in the LAG are on forwarding planes that support efficient multicast replication while others are not. The fact that some or all the forwarding planes associated with the SAP cannot perform efficient multicast replication does not affect the ability to place the SAP into an egress multicast group.
A SAP may be a member of one and only one egress multicast group. If the multicast-group command is executed with another egress multicast group name, the system will attempt to move the SAP to the specified group. If the SAP is not placed into the new group, the SAP will remain a member of the previous egress multicast group. Moving a SAP into an egress multicast group may cause a momentary gap in replications to the SAP destination while the move is being processed.
The no form of the command removes the SAP from any egress multicast group in which it may currently have membership. The SAP will be removed from all efficient multicast replication chains and normal replication will apply to the SAP. A momentary gap in replications to the SAP destination while it is being moved is possible. If the SAP is not currently a member in an egress multicast group, the command has no effect.
no multicast-group
This command associates a Quality of Service (QoS) policy with an ingress or egress Service Access Point (SAP) or IP interface.
QoS ingress and egress policies are important for the enforcement of SLA agreements. The policy ID must be defined prior to associating the policy with a SAP or IP interface. If the policy-id does not exist, an error will be returned.
The qos command is used to associate both ingress and egress QoS policies. The qos command only allows ingress policies to be associated on SAP or IP interface ingress and egress policies on SAP or IP interface egress. Attempts to associate a QoS policy of the wrong type returns an error.
Only one ingress and one egress QoS policy can be associated with a SAP or IP interface at one time. Attempts to associate a second QoS policy of a given type will return an error.
By default, no specific QoS policy is associated with the SAP or IP interface for ingress or egress, so the default QoS policy is used.
The no form of this command removes the QoS policy association from the SAP or IP interface, and the QoS policy reverts to the default.
This command enables the context to configure override values for the specified SAP egress QoS queue. These values override the corresponding ones specified in the associated SAP egress QoS policy.
This command specifies the ID of the queue whose parameters are to be overridden.
This command can be used to override specific attributes of the specified queue’s adaptation rule parameters. The adaptation rule controls the method used by the system to derive the operational CIR and PIR settings when the queue is provisioned in hardware. For the CIR and PIR parameters individually, the system attempts to find the best operational rate depending on the defined constraint.
The no form of the command removes any explicitly defined constraints used to derive the operational CIR and PIR created by the application of the policy. When a specific adaptation-rule is removed, the default constraints for rate and cir apply.
no adaptation-rule
This command configures the average frame overhead to define the average percentage that the offered load to a queue will expand during the frame encapsulation process before sending traffic on-the-wire. While the avg-frame-overhead value may be defined on any queue, it is only used by the system for queues that egress a SONET or SDH port or channel. Queues operating on egress Ethernet ports automatically calculate the frame encapsulation overhead based on a 20 byte per packet rule (8 bytes for preamble and 12 bytes for Inter-Frame Gap).
When calculating the frame encapsulation overhead for port scheduling purposes, the system determines the following values:
For egress Ethernet queues, the frame encapsulation overhead is calculated by multiplying the number of offered-packets for the queue by 20 bytes. If a queue was offered 50 packets then the frame encapsulation overhead would be 50 x 20 or 1000 octets.
As a special case, when a queue or associated intermediate scheduler is configured with a CIR-weight equal to 0, the system automatically sets the queue’s frame based within-cir offered-load to 0, preventing it from receiving bandwidth during the port scheduler’s within-cir pass.
Port scheduler operation using frame transformed rates — The port scheduler uses the frame based rates to figure the maximum rates that each queue may receive during the within-cir and above-cir bandwidth allocation passes. During the within-cir pass, a queue may receive up to its frame based within-cir offered-load. The maximum it may receive during the above-cir pass is the difference between the frame based within-pir offered load and the amount of actual bandwidth allocated during the within-cir pass.
SAP and subscriber SLA-profile average frame overhead override — The average frame overhead parameter on a sap-egress may be overridden at an individual egress queue basis. On each SAP and within the sla-profile policy used by subscribers an avg-frame-overhead command may be defined under the queue-override context for each queue. When overridden, the queue instance will use its local value for the average frame overhead instead of the sap-egress defined overhead.
The no form of this command restores the average frame overhead parameter for the queue to the default value of 0 percent. When set to 0, the system uses the packet based queue statistics for calculating port scheduler priority bandwidth allocation. If the no avg-frame-overhead command is executed in a queue-override queue id context, the avg-frame-overhead setting for the queue within the sap-egress QoS policy takes effect.
0
This command can be used to override specific attributes of the specified queue’s CBS parameters.
It is permissible, and possibly desirable, to oversubscribe the total CBS reserved buffers for a given access port egress buffer pool. Oversubscription may be desirable due to the potential large number of service queues and the economy of statistical multiplexing the individual queue’s CBS settings into the defined reserved total.
When oversubscribing the reserved total, it is possible for a queue depth to be lower than its CBS setting and still not receive a buffer from the buffer pool for an ingress frame. As more queues are using their CBS buffers and the total in use exceeds the defined reserved total, essentially the buffers are being removed from the shared portion of the pool without the shared in use average and total counts being decremented. This can affect the operation of the high and low priority RED slopes on the pool, causing them to miscalculate when to start randomly drop packets.
The no form of this command returns the CBS size to the default value.
no cbs
This command can be used to override specific attributes of the specified queue’s high-prio-only parameters. The high-prio-only command configures the percentage of buffer space for the queue, used exclusively by high priority packets.
The priority of a packet can only be set in the SAP ingress QoS policy and is only applicable on the ingress queues for a SAP. The high-prio-only parameter is used to override the default value derived from the network-queue command.
The defined high-prio-only value cannot be greater than the MBS size of the queue. Attempting to change the MBS to a value smaller than the high priority reserve will generate an error and fail execution. Attempting to set the high-prio-only value larger than the current MBS size will also result in an error and fail execution.
The no form of this command restores the default high priority reserved size.
This command can be used to override specific attributes of the specified queue’s MBS parameters. The MBS is a mechanism to override the default maximum size for the queue.
The sum of the MBS for all queues on an egress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packets RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
The no form of this command returns the MBS size assigned to the queue.
default
This command can be used to override specific attributes of the specified queue’s Peak Information Rate (PIR) and the Committed Information Rate (CIR) parameters.
The PIR defines the maximum rate that the queue can transmit packets out an egress interface (for SAP egress queues). Defining a PIR does not necessarily guarantee that the queue can transmit at the intended rate. The actual rate sustained by the queue can be limited by oversubscription factors or available egress bandwidth.
The CIR defines the rate at which the system prioritizes the queue over other queues competing for the same bandwidth. In-profile, then out-of-profile, packets are preferentially queued by the system at egress and at subsequent next hop nodes where the packet can traverse. To be properly handled throughout the network, the packets must be marked accordingly for profiling at each hop.
The CIR can be used by the queue’s parent commands cir-level and cir-weight parameters to define the amount of bandwidth considered to be committed for the child queue during bandwidth allocation by the parent scheduler.
The rate command can be executed at any time, altering the PIR and CIR rates for all queues created through the association of the SAP egress QoS policy with the queue-id.
The no form of the command returns all queues created with the queue-id by association with the QoS policy to the default PIR and CIR parameters (max, 0).
rate max cir 0 — The max default specifies the amount of bandwidth in kilobits per second (thousand bits per second). The max value is mutually exclusive to the pir-rate value.
The actual PIR rate is dependent on the queue’s adaptation-rule parameters and the actual hardware where the queue is provisioned.
This command applies an existing scheduler policy to an ingress or egress scheduler used by SAP queues associated with this multi-service customer site. The schedulers defined in the scheduler policy can only be created once the customer site has been appropriately assigned to a chassis port, channel or slot. Scheduler policies are defined in the config>qos>scheduler-policy scheduler-policy-name context.
The no form of this command removes the configured ingress or egress scheduler policy from the multi-service customer site. When the policy is removed, the schedulers created due to the policy are removed also making them unavailable for the ingress SAP queues associated with the customer site. Queues that lose their parent scheduler association are deemed to be orphaned and are no longer subject to a virtual scheduler. The SAPs that have ingress queues reliant on the removed schedulers enter into an operational state depicting the orphaned status of one or more queues. When the no scheduler-policy command is executed, the customer site ingress or egress node will not contain an applied scheduler policy.
This command enables blocking (bring the spoke SDP to an operationally down state) after all configured mesh SDPs are in operationally down state. This event is signaled to corresponding T-LDP peer by withdrawing service label (status-bit-signaling non-capable peer) or by setting “PW not forwarding” status bit in T-LDP message (status-bit-signaling capable peer).
disabled
This command specifies the maximum number of FDB entries for both learned and static MAC addresses for this SAP or spoke SDP.
When the configured limit has been reached, and discard-unknown-source has been enabled for this SAP or spoke SDP (see the discard-unknown-source command), packets with unknown source MAC addresses will be discarded.
The no form of the command restores the global MAC learning limitations for the SAP or spoke SDP.
no max-nbr-mac-addr
This command associates the SAP with a customer-site-name. If the specified customer-site-name does not exist in the context of the service customer ID an error occurs and the command will not execute. If customer-site-name exists, the current and future defined queues on the SAP (ingress and egress) will attempt to use the scheduler hierarchies created within customer-site-name as parent schedulers.
This command is mutually exclusive with the SAP ingress and egress scheduler-policy commands. If a scheduler-policy has been applied to either the ingress or egress nodes on the SAP, the multi-service-site command will fail without executing. The locally applied scheduler policies must be removed prior to executing the multi-service-site command.
The no form of the command removes the SAP from any multi-service customer site the SAP belongs to. Removing the site can cause existing or future queues to enter an orphaned state.
None
This command specifies the service id of the retailer IES/VPRN service to which the static IPv6 host belongs. A corresponding retailer subscriber interface must exist in the specified service.
no retail-svc-id
This command creates a static subscriber host for the SAP. Static subscriber hosts may be used by the system for various purposes. Applications within the system that make use of static host entries include anti-spoof, ARP reply agent and source MAC population into the VPLS forwarding database.
Multiple static hosts may be defined on the SAP. Each host is identified by either a source IP address, a source MAC address or both a source IP and source MAC address. Every static host definition must have at least one address defined, IP or MAC.
Static hosts can exist on the SAP even with anti-spoof and ARP reply agent features disabled. When enabled, each feature has different requirements for static hosts.
Use the no form of the command to remove a static entry from the system. The specified ip-address and mac-address must match the host’s exact IP and MAC addresses as defined when it was created. When a static host is removed from the SAP, the corresponding anti-spoof filter entry and/or FDB entry is also removed.
Every static host definition must have at least one address defined, IP or MAC.
This command configures managed routes and only applies to the 7750 SR.
This command assigns managed-route to a given subscriber-host. As a consequence, a static-route pointing subscriber-host ip address as a next hop will be installed in FIB. Up to 16 managed routes per subscriber-host can be configured.
The no form of the command removes the respective route. Per default, there are no managed-routes configured.
This command only applies to the 7750 SR.
Note:
A maximum of 16 managed routes can be associated to a static host. IPv4 hosts can only have IPv4 managed routes and IPv6 hosts can only have IPv6 managed routes. |
This command specifies the ANCP string associated to this SAP host.
This command specifies an application profile name.
This command specifies to which intermediate destination (for example a DSLAM) this host belongs.
This command configures managed routes and only applies to the 7750 SR.
This command assigns managed-route to a given subscriber-host. As a consequence, a static-route pointing subscriber-host ip address as a next hop will be installed in FIB. Up to 16 managed routes per subscriber-host can be configured.
The no form of the command removes the respective route. Per default, there are no managed-routes configured.
This command only applies to the 7750 SR.
Note:
A maximum of 16 managed routes can be associated to a static host. IPv4 hosts can only have IPv4 managed routes and IPv6 hosts can only have IPv6 managed routes. |
This command specifies an existing SLA profile name to be associated with the static subscriber host. The SLA profile is configured in the config>subscr-mgmt>sla-profile context.
This command specifies an existing subscriber profile name to be associated with the static subscriber host.
This command specifies an existing subscriber identification profile to be associated with the static subscriber host.
This command enables using the SAP ID as subscriber id.
This command enables the context to configure common parameters for IPv6 static hosts and only applies to the 7750 SR.
This command configures additional methods by which the BNG will learn the subscriber host MAC and only applies to the 7750 SR.
This command enables learning of MAC addresses from data packets.
The no form of the command disables learning of MAC addresses from data packets.
This command only applies to the 7750 SR.
no data-triggered
This command controls how the SAP will learn the IPv6 static host MAC address. Enabling this command indicates that this particular SAP will only have one subscriber and will only have one MAC address for all hosts. With this parameter enabled, the subscriber’s NS and RS source MAC address is used to automatically populate the subscriber MAC address. To allow this auto-populate behavior, the subscriber’s NS and RS source IP must be of type link local address. This command only applies to the 7750 SR.
no single-mac
This command creates a remote static MAC entry in the Virtual Private LAN Service (VPLS) forwarding database (FDB) associated with the Service Distribution Point (SDP).
In a VPLS service, MAC addresses are associated with a Service Access Point (SAP) or with a Service Distribution Point (SDP). MACs associated with a SAP are classified as local MACs, and MACs associated with an SDP are remote MACs.
Remote static MAC entries create a permanent MAC address to SDP association in the forwarding database for the VPLS instance so that MAC address will not be learned on the edge device.
Note:
Static MAC definitions on one edge device are not propagated to other edge devices participating in the VPLS instance, that is, each edge device has an independent forwarding database for the VPLS. |
Only one static MAC entry (local or remote) can be defined per MAC address per VPLS instance.
By default, no static MAC address entries are defined for the SDP.
The no form of this command deletes the static MAC entry with the specified MAC address associated with the SDP from the VPLS forwarding database.
This command binds a VPLS service to an existing Service Distribution Point (SDP).
Mesh SDPs bound to a service are logically treated like a single bridge “port” for flooded traffic where flooded traffic received on any mesh SDP on the service is replicated to other “ports” (spoke SDPs and SAPs) and not transmitted on any mesh SDPs.
Note:
This command creates a binding between a service and an SDP. The SDP has an operational state which determines the operational state of the SDP within the service. For example, if the SDP is administratively or operationally down, the SDP for the service will be down. |
The SDP must already be defined in the config>service>sdp context in order to associate the SDP with an Epipe or VPLS service. If the sdp sdp-id is not already configured, an error message is generated. If the sdp-id does exist, a binding between that sdp-id and the service is created.
SDPs must be explicitly associated and bound to a service. If an SDP is not bound to a service, no far-end router devices can participate in the service.
The no form of this command removes the SDP binding from the service. The SDP configuration is not affected; only the binding of the SDP to a service. Once removed, no packets are forwarded to the far-end router.
No sdp-id is bound to a service.
VC types are derived according to IETF draft-martini-l2circuit-trans-mpls.
The VC type value for Ethernet is 0x0005.
The VC type value for an Ethernet VLAN is 0x0004.
This command binds a service to an existing Service Distribution Point (SDP).
A spoke SDP is treated like the equivalent of a traditional bridge “port” where flooded traffic received on the spoke SDP is replicated on all other “ports” (other spoke and mesh SDPs or SAPs) and not transmitted on the port it was received.
The SDP has an operational state which determines the operational state of the SDP within the service. For example, if the SDP is administratively or operationally down, the SDP for the service will be down.
The SDP must already be defined in the config>service>sdp context in order to associate an SDP with a VPLS service. If the sdp sdp-id is not already configured, an error message is generated. If the sdp-id does exist, a binding between that sdp-id and the service is created.
SDPs must be explicitly associated and bound to a service. If an SDP is not bound to a service, no far-end 7450 ESS or 7750 SR devices can participate in the service.
The no form of this command removes the SDP binding from the service. The SDP configuration is not affected; only the binding of the SDP to a service. Once removed, no packets are forwarded to the far-end router.
No sdp-id is bound to a service.
VC types are derived according to IETF draft-martini-l2circuit-trans-mpls.
The VC type value for Ethernet is 0x0005.
The VC type value for an Ethernet VLAN is 0x0004.
This command binds a service to an existing Service Distribution Point (SDP).
A spoke SDP is treated like the equivalent of a traditional bridge “port” where flooded traffic received on the spoke SDP is replicated on all other “ports” (other spoke and mesh SDPs or SAPs) and not transmitted on the port it was received.
The SDP has an operational state which determines the operational state of the SDP within the service. For example, if the SDP is administratively or operationally down, the SDP for the service will be down.
The SDP must already be defined in the config>service>sdp context in order to associate an SDP with an IES service. If the sdp sdp-id is not already configured, an error message is generated. If the sdp-id does exist, a binding between that sdp-id and the service is created.
SDPs must be explicitly associated and bound to a service. If an SDP is not bound to a service, no far-end devices can participate in the service.
The no form of this command removes the SDP binding from the service. The SDP configuration is not affected; only the binding of the SDP to a service. Once removed, no packets are forwarded to the far-end router. The spoke SDP must be shut down first before it can be deleted from the configuration.
This command only applies to the 7750 SR.
No sdp-id is bound to a service.
This command configures the egress SDP context.
This command configures the ingress SDP context.
This command configures the egress VC label.
This command configures the ingress VC label.
This command specifies an explicit dot1q value used when encapsulating to the SDP far end. When signaling is enabled between the near and far end, the configured dot1q tag can be overridden by a received TLV specifying the dot1q value expected by the far end. This signaled value must be stored as the remote signaled dot1q value for the binding. The provisioned local dot1q tag must be stored as the administrative dot1q value for the binding.
When the dot1q tag is not defined, the default value of zero is stored as the administrative dot1q value. Setting the value to zero is equivalent to not specifying the value.
The no form of this command disables the command
no vlan-vc-tag
This command configures the average frame overhead to define the average percentage that the offered load to a queue will expand during the frame encapsulation process before sending traffic on-the-wire. While the avg-frame-overhead value may be defined on any queue, it is only used by the system for queues that egress a SONET or SDH port or channel. Queues operating on egress Ethernet ports automatically calculate the frame encapsulation overhead based on a 20 byte per packet rule (8 bytes for preamble and 12 bytes for Inter-Frame Gap).
When calculating the frame encapsulation overhead for port scheduling purposes, the system determines the following values:
For egress Ethernet queues, the frame encapsulation overhead is calculated by multiplying the number of offered-packets for the queue by 20 bytes. If a queue was offered 50 packets then the frame encapsulation overhead would be 50 x 20 or 1000 octets.
As a special case, when a queue or associated intermediate scheduler is configured with a CIR-weight equal to 0, the system automatically sets the queues frame based within-cir offered-load to 0, preventing it from receiving bandwidth during the port schedulers within-cir pass.
Port scheduler operation using frame transformed rates — The port scheduler uses the frame based rates to figure the maximum rates that each queue may receive during the within-cir and above-cir bandwidth allocation passes. During the within-cir pass, a queue may receive up to its frame based within-cir offered-load. The maximum it may receive during the above-cir pass is the difference between the frame based within-pir offered load and the amount of actual bandwidth allocated during the within-cir pass.
SAP and subscriber SLA-profile average frame overhead override — The average frame overhead parameter on a sap-egress may be overridden at an individual egress queue basis. On each SAP and within the sla-profile policy used by subscribers an avg-frame-overhead command may be defined under the queue-override context for each queue. When overridden, the queue instance will use its local value for the average frame overhead instead of the sap-egress defined overhead.
The no form of this command restores the average frame overhead parameter for the queue to the default value of 0 percent. When set to 0, the system uses the packet based queue statistics for calculating port scheduler priority bandwidth allocation. If the no avg-frame-overhead command is executed in a queue-override queue id context, the avg-frame-overhead setting for the queue within the sap-egress QoS policy takes effect.
0
This command enables the context to configure override values for the specified SAP egress or ingress QoS queue. These values override the corresponding ones specified in the associated SAP egress or ingress QoS policy.
This command specifies the ID of the queue whose parameters are to be overridden.
This command can be used to override specific attributes of the specified queue’s adaptation rule parameters. The adaptation rule controls the method used by the system to derive the operational CIR and PIR settings when the queue is provisioned in hardware. For the CIR and PIR parameters individually, the system attempts to find the best operational rate depending on the defined constraint.
The no form of the command removes any explicitly defined constraints used to derive the operational CIR and PIR created by the application of the policy. When a specific adaptation-rule is removed, the default constraints for rate and cir apply.
no adaptation-rule
This command can be used to override specific attributes of the specified queue’s CBS parameters.
It is permissible, and possibly desirable, to oversubscribe the total CBS reserved buffers for a given access port egress buffer pool. Oversubscription may be desirable due to the potential large number of service queues and the economy of statistical multiplexing the individual queue’s CBS settings into the defined reserved total.
When oversubscribing the reserved total, it is possible for a queue depth to be lower than its CBS setting and still not receive a buffer from the buffer pool for an ingress frame. As more queues are using their CBS buffers and the total in use exceeds the defined reserved total, essentially the buffers are being removed from the shared portion of the pool without the shared in use average and total counts being decremented. This can affect the operation of the high and low priority RED slopes on the pool, causing them to miscalculate when to start randomly drop packets.
The no form of this command returns the CBS size to the default value.
no cbs
This command can be used to override specific attributes of the specified queue’s high-prio-only parameters. The high-prio-only command configures the percentage of buffer space for the queue, used exclusively by high priority packets.
The priority of a packet can only be set in the SAP ingress QoS policy and is only applicable on the ingress queues for a SAP. The high-prio-only parameter is used to override the default value derived from the network-queue command.
The defined high-prio-only value cannot be greater than the MBS size of the queue. Attempting to change the MBS to a value smaller than the high priority reserve will generate an error and fail execution. Attempting to set the high-prio-only value larger than the current MBS size will also result in an error and fail execution.
The no form of this command restores the default high priority reserved size.
This command can be used to override specific attributes of the specified queue’s MBS parameters. The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. Once the queue has exceeded the amount of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packets RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
The defined high-prio-only value cannot be greater than the MBS size of the queue. Attempting to change the MBS to a value smaller than the high priority reserve will generate an error and fail execution. Attempting to set the high-prio-only value larger than the current MBS size will also result in an error and fail execution.
The no form of this command returns the MBS size assigned to the queue to the default value.
default
This command can be used to override specific attributes of the specified queue’s Peak Information Rate (PIR) and the Committed Information Rate (CIR) parameters.
The PIR defines the maximum rate that the queue can transmit packets out an egress interface (for SAP egress queues). Defining a PIR does not necessarily guarantee that the queue can transmit at the intended rate. The actual rate sustained by the queue can be limited by oversubscription factors or available egress bandwidth.
The CIR defines the rate at which the system prioritizes the queue over other queues competing for the same bandwidth. In-profile, then out-of-profile packets are preferentially queued by the system at egress and at subsequent next hop nodes where the packet can traverse. To be properly handled throughout the network, the packets must be marked accordingly for profiling at each hop.
The CIR can be used by the queue’s parent commands cir-level and cir-weight parameters to define the amount of bandwidth considered to be committed for the child queue during bandwidth allocation by the parent scheduler.
The rate command can be executed at anytime, altering the PIR and CIR rates for all queues created through the association of the SAP egress QoS policy with the queue-id.
The no form of the command returns all queues created with the queue-id by association with the QoS policy to the default PIR and CIR parameters (max, 0).
rate max cir 0 — The max default specifies the amount of bandwidth in kilobits per second (thousand bits per second). The max value is mutually exclusive to the pir-rate value.
The actual PIR rate is dependent on the queue’s adaptation-rule parameters and the actual hardware where the queue is provisioned.
This command specifies the set of attributes whose values have been overridden via management on this virtual scheduler. Clearing a given flag will return the corresponding overridden attribute to the value defined on the SAP's ingress scheduler policy.
This command can be used to override specific attributes of the specified scheduler name.
A scheduler defines a bandwidth control that limits each child (other schedulers and queues) associated with the scheduler. Scheduler objects are created within the hierarchical tiers of the policy. It is assumed that each scheduler created will have queues or other schedulers defined as child associations. The scheduler can be a child (take bandwidth from a scheduler in a higher tier, except for schedulers created in tier 1). A total of 32 schedulers can be created within a single scheduler policy with no restriction on the distribution between the tiers.
Each scheduler must have a unique name within the context of the scheduler policy; however the same name can be reused in multiple scheduler policies. If scheduler-name already exists within the policy tier level (regardless of the inclusion of the keyword create), the context changes to that scheduler name for the purpose of editing the scheduler parameters. Modifications made to an existing scheduler are executed on all instantiated schedulers created through association with the policy of the edited scheduler. This can cause queues or schedulers to become orphaned (invalid parent association) and adversely affect the ability of the system to enforce service level agreements (SLAs).
If the scheduler-name exists within the policy on a different tier (regardless of the inclusion of the keyword create), an error occurs and the current CLI context will not change.
If the scheduler-name does not exist in this or another tier within the scheduler policy, it is assumed that an attempt is being made to create a scheduler of that name. The success of the command execution is dependent on the following:
When the maximum number of schedulers has been exceeded on the policy, a configuration error occurs and the command will not execute, nor will the CLI context change.
If the provided scheduler-name is invalid according to the criteria below, a name syntax error will occur, the command will not execute, and the CLI context will not change.
This command can be used to override specific attributes of the specified scheduler rate. The rate command defines the maximum bandwidth that the scheduler can offer its child queues or schedulers. The maximum rate is limited to the amount of bandwidth the scheduler can receive from its parent scheduler. If the scheduler has no parent, the maximum rate is assumed to be the amount available to the scheduler. When a parent is associated with the scheduler, the CIR parameter provides the amount of bandwidth to be considered during the parent scheduler’s ‘within CIR’ distribution phase.
The actual operating rate of the scheduler is limited by bandwidth constraints other then its maximum rate. The scheduler’s parent scheduler may not have the available bandwidth to meet the scheduler’s needs or the bandwidth available to the parent scheduler could be allocated to other child schedulers or child queues on the parent based on higher priority. The children of the scheduler may not need the maximum rate available to the scheduler due to insufficient offered load or limits to their own maximum rates.
When a scheduler is defined without specifying a rate, the default rate is max. If the scheduler is a root scheduler (no parent defined), the default maximum rate must be changed to an explicit value. Without this explicit value, the scheduler will assume that an infinite amount of bandwidth is available and allow all child queues and schedulers to operate at their maximum rates.
The no form of this command returns all queues created with this queue-id by association with the QoS policy to the default PIR and CIR parameters.
To calculate the actual PIR rate, the rate described by the queue’s rate is multiplied by the pir-rate.
The SAP ingress context for PIR is independent of the defined forwarding class (fc) for the queue. The default pir and definable range is identical for each class. The PIR in effect for a queue defines the maximum rate at which the queue will be allowed to forward packets in a given second, thus shaping the queue’s output.
The PIR parameter for SAP ingress queues do not have a negate (no) function. To return the queue’s PIR rate to the default value, that value must be specified as the PIR value.
To calculate the actual CIR rate, the rate described by the rate pir pir-rate is multiplied by the cir cir-rate. If the cir is set to max, then the CIR rate is set to infinity.
The SAP ingress context for CIR is dependent on the defined forwarding class (fc) for the queue. The default CIR and definable range is different for each class. The CIR in effect for a queue defines both its profile (in or out) marking level as well as the relative importance compared to other queues for scheduling purposes during congestion periods.
This command specifies which Dot1Q tag position Dot1P bits in a QinQ encapsulated packet should be used to evaluate Dot1P QoS classification.
The match-qinq-dot1p command allows the top or bottom PBits to be used when evaluating the applied sap-ingress QoS policy’s Dot1P entries. The top and bottom keywords specify which position should be evaluated for QinQ encapsulated packets.
The no form of the command restores the default dot1p evaluation behavior for the SAP.
By default, the bottom-most service delineating Dot1Q tag’s Dot1P bits are used. Table 7 defines the default behavior for Dot1P evaluation when the match-qinq-dot1p command is not executed.
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN-ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | TopQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
QinQ / QinQ | TopQ BottomQ | BottomQ PBits |
no match-qinq-dot1p (no filtering based on p-bits)
(top or bottom must be specified to override the default QinQ dot1p behavior)
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN-ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | TopQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
QinQ / QinQ | TopQ BottomQ | TopQ PBits |
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN-ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | BottomQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | BottomQ PBits |
QinQ / QinQ | TopQ BottomQ | BottomQ PBits |
When this command is enabled, packets received on a SAP or on a spoke SDP with an unknown source MAC address will be dropped only if the maximum number of MAC addresses for that SAP or spoke SDP (see max-nbr-mac-addr) has been reached. If max-nbr-mac-addr has not been set for the SAP or spoke SDP, enabling discard-unknown-source has no effect.
When disabled, the packets are forwarded based on the destination MAC addresses.
The no form of this command causes packets with an unknown source MAC addresses to be forwarded by destination MAC addresses in VPLS.
no discard-unknown
qtag1: | 0 — 4094 |
qtag2: | *, 0 — 4094 |
Port Type | Encap-Type | Allowed Values | Comments |
Ethernet | Null | 0 | The SAP is identified by the port. |
Ethernet | Dot1q | 0 - 4094 | The SAP is identified by the 802.1Q tag on the port. Note that a 0 qtag1 value also accepts untagged packets on the dot1q port. |
Ethernet | QinQ | qtag1: 0 - 4094 qtag2: 0 - 4094 | The SAP is identified by two 802.1Q tags on the port. Note that a 0 qtag1 value also accepts untagged packets on the dot1q port. |
SONET/SDH | IPCP | - | The SAP is identified by the channel. No BCP is deployed and all traffic is IP. |
SONET/SDH TDM | BCP-Null | 0 | The SAP is identified with a single service on the channel. Tags are assumed to be part of the customer packet and not a service delimiter. |
SONET/SDH TDM | BCP-Dot1q | 0 - 4094 | The SAP is identified by the 802.1Q tag on the channel. |
SONET/SDH TDM | Frame Relay | 16 — 991 | The SAP is identified by the data link connection identifier (DLCI). |
SONET/SDH ATM | ATM | vpi (NNI) 0 — 4095 vpi (UNI) 0 — 255 vci 1, 2, 5 — 65535 | The SAP is identified by the PVC identifier (vpi/vci). |
This command enables the translation of BPDUs to a given format, meaning that all BPDUs transmitted on a given SAP or spoke SDP will have a specified format.
The no form of this command reverts to the default setting.
no bpdu-translation
Note:
The correct VLAN tag is included in the payload (depending on encapsulation value of outgoing SAP). |
This commands enables L2PT termination on a given SAP or spoke SDP. L2PT termination will be supported only for STP BPDUs. PDUs of other protocols will be discarded.
This feature can be enabled only if STP is disabled in the context of the given VPLS service.
no l2pt-termination
This command configures the value used by each end of a tunnel to identify the VC. If this command is not configured, then the service ID value is used as the VC-ID.
This VC-ID is used instead of a label to identify a virtual circuit.The VC-ID is significant between peer routers on the same hierarchical level. The value of a VC-ID is conceptually independent from the value of the label or any other datalink specific information of the VC.
The no form of this command disables the VC-ID.
none
This command enables the context to configure MAC move attributes. A sustained high re-learn rate can be a sign of a loop somewhere in the VPLS topology. Typically, STP detects loops in the topology, but for those networks that do not run STP, the mac-move feature is an alternative way to protect your network against loops.
When enabled in a VPLS, mac-move monitors the re-learn rate of each MAC. If the rate exceeds the configured maximum allowed limit, it disables the SAP where the source MAC was last seen. The SAP can be disabled permanently (until a shutdown/no shutdown command is executed) or for a length of time that grows linearly with the number of times the given SAP was disabled. You have the option of marking a SAP as non-blockable in the config>service>vpls>sap>limit-mac-move or config>service>vpls>spoke-sdp>limit-mac-move contexts. This means that when the re-learn rate has exceeded the limit, another (blockable) SAP will be disabled instead.
The mac-move command enables the feature at the service level for SAPs and spoke SDPs, as only those objects can be blocked by this feature. Mesh SDPs are never blocked, but their re-learn rates (sap-to-mesh/spoke-to-mesh or vice versa) are still measured.
The operation of this feature is the same on the SAP and spoke SDP. For example, if a MAC address moves from SAP to SAP, from SAP to spoke SDP, or between spoke SDPs, one will be blocked to prevent thrashing. If the MAC address moves between a SAP and mesh SDP or spoke SDP and mesh SDP combinations, the respective SAP or spoke SDP will be blocked.
The re-learn rate is computed as the number of times a MAC moves in a 5 second interval. Therefore, the fastest a loop can be detected and broken is 5 seconds.
The no form of this command disables MAC move.
not enabled
This command indicates whether or not this MAC is protected. When enabled, the agent will protect the MAC from being learned or re-learned on a SAP that has restricted learning enabled.
disabled
This command specifies the 48-bit IEEE 802.3 MAC address.
This command specifies the number of bits to be considered when performing MAC learning (MAC source) and MAC switching (MAC destination). Specifically, this value identifies how many bits, starting from the beginning of the MAC address are used. For example, if the mask-value of 28 is used, MAC learning will only do a lookup for the first 28 bits of the source MAC address when comparing with existing FIB entries. Then, it will install the first 28 bits in the FIB while zeroing out the last 20 bits of the MAC address. When performing switching in the reverse direction, only the first 28 bits of the destination MAC address will be used to perform a FIB lookup to determine the next hop.
The no form of this command switches back to full MAC lookup.
This command enables the context to configure the default gateway information when using Dual Homing in L2-TPSDA. The IP and MAC address of the default gateway used for subscribers on an L2 MC-Ring are configured in this context. After a ring heals or fails, the system will send out a gratuitous ARP on an active ring SAP in order to attract traffic from subscribers on the ring with connectivity to that SAP.
This command relates to a system configured for Dual Homing in L2-TPSDA. It defines the IP address used when the system sends out a gratuitous ARP on an active SAP after a ring heals or fails in order to attract traffic from subscribers on the ring with connectivity to that SAP.
no ip
This command relates to a system configured for Dual Homing in L2-TPSDA. It defines the MAC address used when the system sends out a gratuitous ARP on an active SAP after a ring heals or fails in order to attract traffic from subscribers on the ring with connectivity to that SAP.
no mac
This objects indicates the maximum rate at which MAC's can be re-learned in the VPLS service, before the SAP where the moving MAC was last seen is automatically disabled in order to protect the system against undetected loops or duplicate MAC's.
The rate is computed as the maximum number of re-learns allowed in a 5 second interval. For example, the default rate of 10 relearns per second corresponds to 50 relearns in a 5 second period.
The no form of the command reverts to the default value.
2 (when mac-move is enabled)
This objects indicates the time in seconds to wait before a SAP that has been disabled after exceeding the maximum relearn rate is re-enabled.
A zero value indicates that the SAP will not be automatically re-enabled after being disabled. If, after the SAP is re-enabled it is disabled again, the retry timeout is increased with the provisioned retry timeout in order to avoid thrashing. For example, when retry-timeout is set to 15, it increments (15,30,45,60...).
The no form of the command reverts to the default value.
10 (when mac-move is enabled)
This command specifies the multicast FIB high watermark. When the percentage filling level of the multicast FIB exceeds the configured value, a trap is generated and/or a log entry is added.
This command specifies the multicast FIB low watermark. When the percentage filling level of the Multicast FIB drops below the configured value, the corresponding trap is cleared and/or a log entry is added.
This command specifies the maximum number of (s,g) entries in the multicast forwarding database (MFIB) for this VPLS instance.
The mfib-table-size parameter specifies the maximum number of multicast database entries for both learned and static multicast addresses for the VPLS instance.
When a table-size limit is set on the mfib of a service which is lower than the current number of dynamic entries present in the mfib then the number of entries remains above the limit.
The no form of this command removes the configured maximum MFIB table size.
none
This command enables sending out “flush-all-from-ME” messages to all LDP peers included in affected VPLS, in the event of physical port failures or “oper-down” events of individual SAPs. This feature provides an LDP-based mechanism for recovering a physical link failure in a dual-homed connection to a VPLS service. This method provides an alternative to RSTP solutions where dual homing redundancy and recovery, in the case of link failure, is resolved by RSTP running between a PE router and CE devices.
This feature cannot be enabled on management VPLS.
no send-flush-on-failure
This command enables the context to configure DHCP parameters.
This command configures the gateway interface address for the DHCP relay. A subscriber interface can include multiple group interfaces with multiple SAPs. The GI address is needed, when the router functions as a DHCP relay, to distinguish between the different subscriber interfaces and potentially between the group interfaces defined.
By default, the GI address used in the relayed DHCP packet is the primary IP address of a normal IES interface. Specifying the GI address allows the user to choose a secondary address. For group interfaces a GI address must be specified under the group interface dhcp context or subscriber-interface dhcp context in order for DHCP to function.
no gi-address
This command enables and disables dynamic host DHCPv4 lease state management for SAPs.
For VPLS, DHCP snooping must be explicitly enabled (using the snoop command) at all points where DHCP messages requiring snooping enter the VPLS instance (both from the DHCP server and from the subscribers). Lease state information is extracted from snooped DHCP ACK messages to populate lease state table entries for the SAP.
The optional number-of-entries parameter defines the number lease state table entries allowed.
If number-of-entries is omitted, only a single entry is allowed. Once the maximum number of entries has been reached, subsequent lease state entries are not allowed and subsequent DHCP ACK messages are discarded.
The retained lease state information representing dynamic hosts may be used to:
no lease-populate
Note:
The operational maximum value may be smaller due to equipped hardware dependencies. |
This command enables Option 82 circuit ID on relayed DHCP packet matching.
For Routed CO, the group interface DHCP relay process is stateful. When packets are relayed to the server the virtual router ID, transaction ID, SAP ID, and client hardware MAC address of the relayed packet are tracked. When get a response back from the server the virtual router ID, transaction ID, and client HW MAC address must be matched to determine the SAP on which to send the packet out. In some cases, the virtual router ID, transaction ID, and client HW MAC address are not guaranteed to be unique.
When the match-circuit-id command is enabled this part of the key is used to guarantee correctness in our lookup. This is really only needed when dealing with an IP aware DSLAM that proxies the client HW mac address.
no match-circuit-id
This command enables DHCP Option 82 (Relay Agent Information Option) parameters processing and enters the context for configuring Option 82 sub-options.
The no form of this command returns the system to the default.
no option
This command configures the Relay Agent Information Option (Option 82) processing.
The no form of this command returns the system to the default value.
The default is to keep the existing information intact.
When enabled, the router sends an ASCII-encoded tuple in the circuit-id sub-option of the DHCP packet. This ASCII-tuple consists of the access-node-identifier, service-id, and SAP-ID, separated by “|”.
If disabled, the circuit-id sub-option of the DHCP packet will be left empty.
The no form of this command returns the system to the default.
circuit-id
When enabled, the router sends an ASCII-encoded tuple in the circuit-id sub-option of the DHCP packet. This ASCII-tuple consists of the access-node-identifier, service-id, and SAP-ID, separated by “|”.
If disabled, the circuit-id sub-option of the DHCP packet will be left empty.
The no form of this command returns the system to the default.
circuit-id
This command specifies what information goes into the remote-id sub-option in the DHCP Relay packet.
If disabled, the remote-id sub-option of the DHCP packet will be left empty.
The no form of this command returns the system to the default.
remote-id
This command enables DHCP snooping of DHCP messages on the SAP or SDP. Enabling DHCP snooping on interfaces (SAPs and SDP bindings) is required where DHCP messages important to lease state table population are received, or where Option 82 information is to be inserted. This includes interfaces that are in the path to receive messages from either DHCP servers or from subscribers.
Use the no form of the command to disable DHCP snooping on the specified VPLS SAP or SDP binding.
no snoop
This command specifies a list of servers where requests will be forwarded. The list of servers can be entered as either IP addresses or fully qualified domain names. There must be at least one server specified for DHCP relay to work. If there are multiple servers then the request is forwarded to all of the servers in the list.
There can be a maximum of 8 DHCP servers configured.
no server
According to RFC 3046, DHCP Relay Agent Information Option, a DHCP request where the giaddr is 0.0.0.0 and which contains a Option 82 field in the packet, should be discarded, unless it arrives on a “trusted” circuit. If trusted mode is enabled on an IP interface, the Relay Agent (the router) will modify the request's giaddr to be equal to the ingress interface and forward the request.
Note:
This behavior only applies when the action in the Relay Agent Information Option is “keep”. In the case where the option 82 field is being replaced by the Relay Agent (action = “replace”), the original Option 82 information is lost anyway, and there is thus no reason for enabling the trusted option. |
The no form of this command returns the system to the default.
not enabled
This command creates an egress multicast group (EMG) context. An EMG is created as an object used to group VPLS SAPs that are allowed to participate in efficient multicast replication (EMR). EMR is a method to increase the performance of egress multipoint forwarding by sacrificing some destination-based features. Eliminating the requirement to perform unique features for each destination allows the egress forwarding plane to chain together multiple destinations into a batch replication process. In order to perform this batch replication function, similar characteristics are required on each SAP within the EMG.
Only SAPs defined on Ethernet access ports are allowed into an egress-multicast-group.
In order to understand the purpose of an egress-multicast-group, an understanding of the system’s use of flooding lists is required. A flooding list is maintained at the egress forwarding plane to define a set of destinations to which a packet must be replicated. Multipoint services make use of flooding lists to enable forwarding a single packet to many destinations. Examples of multipoint services that use flooding lists are VPLS, IGMP snooping and IP multicast routing. Currently, the egress forwarding plane will only use efficient multicast replication for VPLS and IGMP snooping flooding lists.
In VPLS services, a unique flooding list is created for each VPLS context. The flooding list is used when a packet has a broadcast, multicast or unknown destination MAC address. From a system perspective, proper VPLS handling requires that a broadcast, multicast or unknown destined packet be sent to all destinations that are in the forwarding state. The ingress forwarding plane ensures the packet gets to all egress forwarding planes that include a destination in the VPLS context. It is the egress forwarding plane’s job to replicate the packet to the subset of the destinations that are reached through its interfaces and each of these destinations are included in the VPLS context’s flooding list.
For IGMP snooping, a unique flooding list is created for each IP multicast (s,g) record. This (s,g) record is associated with an ingress VPLS context and may be associated with VPLS destinations in the source VPLS instance or other VPLS instances (in the case of MVR). Again, the ingress forwarding plane ensures that an ingress IP multicast packet matching the (s,g) record gets to all egress forwarding planes that have a VPLS destination associated with the (s,g) record. The egress forwarding plane uses the flooding list owned by the (s,g) record to replicate the packet to all VPLS destinations in the flooding list. The IGMP Snooping function identifies which VPLS destinations should be associated with the (s,g) record.
With normal multicast replication, the egress forwarding plane examines which features are enabled for each destination. This includes ACL filtering, mirroring, encapsulation and queuing. The resources used to perform this per destination multicast processing are very expensive to the egress forwarding plane when high replication bandwidth is required. If destinations with similar egress functions can be grouped together, the egress forwarding plane can process them in a more efficient manner and maximize replication bandwidth.
The egress-multicast-group object is designed to allow the identification of SAPs with similar egress characteristics. When a SAP is successfully provisioned into an egress-multicast-group, the system is ensured that it may be batched together with other SAPs in the same group at the egress forwarding plane for efficient multicast replication. A SAP that does not meet the common requirements is not allowed into the egress-multicast-group.
At the forwarding plane level, a VPLS flooding list is categorized into chainable and non-chainable destinations. Currently, the only chainable destinations are SAPs within an egress-multicast-group. The chainable destinations are further separated by egress-multicast-group association. Chains are then created following the rules below:
Further subcategories are created for an IGMP (s,g) flooding list. A Layer 2 (s,g) record is created in a specific VPLS instance (the instance the (s,g) flow ingresses). SAPs within that VPLS context that join the (s,g) record are considered native SAPs within the flooding list. SAPs that join the (s,g) flooding list through the multicast VPLS registration process (MVR) from another VPLS context using the from-vpls command are considered alien SAPs. The distinction between native and alien in the list is maintained to allow the forwarding plane to enforce or suspend split-horizon-group (SHG) squelching. When the source of the (s,g) matching packet is in the same SHG as a native SAP, the packet must not be replicated to that SAP. For a SAP in another VPLS context, the source SHG of the packet has no meaning and the forwarding plane must disregard SHG matching between the native source of the packet and the alien destination. Because the SHG squelch decision is done for the whole chain based on the first SAP in the chain, all SAPs in the chain must be all native or all alien SAPs. Chains for IGMP (s,g) flooding lists are created using the following rules:
When a packet associated with a flooding list is received by the egress forwarding plane, it processes the packet by evaluating each destination on the list sequentially in a replication context. If the current entry being processed in the list is a non-chained destination, the forwarding plane processes the packet for that destination and then moves on to process other packets currently in the forwarding plane before returning to process the next destination in the list. If the current entry being processed is a chained destination, the forwarding plane remains in the replication context until it has forwarded to each entry in that chain. Once the replication context finishes with the last entry in the chain, it moves on to process other packets waiting for egress processing before returning to the replication context. Processing continues in this manner until the packet has been forwarded to all destinations in the list.
Batch chain processing of a chain of SAPs improves replication efficiency by bypassing the functions that perform egress mirroring decisions on SAPs within the chain and making a single ACL filtering decision for the whole chain. Each destination in the chain may have a unique egress QoS policy and per destination queuing is still performed for each destination in the chain. Also, while each SAP in the chain must be on access ports with the same encap-type, if the encap-type is dot1q, each SAP may have a unique dot1q tag.
One caveat to each SAP having a unique egress QoS policy in the chain is that only the Dot1P marking decisions for the first SAP in the list is enforced. If the first SAP’s QoS policy forwarding class action states that the packet should not be remarked, none of the replicated packets in the chain will have the dot1P bits remarked. If the first SAP’s QoS policy forwarding class action states that the packet should be remarked with a specific dot1P value, all the replicated packets for the remaining SAPs in the chain will have the same dot1P marking.
While the system supports 32 egress multicast groups, a single group would usually suffice. An instance where multiple groups would be needed is when all the SAPs requiring efficient multicast replication cannot share the same common requirements. In this case, an egress multicast group would be created for each set of common requirements. An egress multicast group may contain SAPs from many different VPLS instances. It should be understood that an egress multicast group is not equivalent to an egress forwarding plane flooding list. An egress multicast group only identifies which SAPs may participate in efficient multicast replication. As stated above, entries in a flooding list are populated due to VPLS destination creation or IGMP snooping events.
The no form of the command removes a specific egress multicast group. Deleting an egress multicast group will only succeed when the group has no SAP members. To remove SAP members, use the no multicast-group group-name command under each SAP’s egress context.
Note:
Efficient multicast replication will only be performed on IOMs that support chassis mode b If an IOM does not support mode b operation, egress-multicast-group membership is ignored on that IOM’s egress forwarding planes. The chassis need not be placed into mode b for efficient multicast replication to be performed on the capable IOMs. |
This command defines an ASCII string associated with egress-multicast-group-name.
The no form of the command removes an existing description string from egress-multicast-group.
none
This command defines the maximum length of an egress forwarding plane efficient multicast replication chain for an egress-multicast-group. Varying the maximum length of chains created for an egress multicast group has the effect of efficient multicast batched chain replication on other packets flowing through the egress forwarding plane. While replicating for the SAPs within a replication chain, other packets are waiting for the forwarding plane to finish. As the chain length increases, forwarding latency for the other waiting packets may increase. When the chain length decreases, a loss of efficiency in the replication process will be observed.
The no form of the command restores the default value of 10 to the dest-chain-limit parameter for the egress-multicast-group.
no dest-chain-limit
The destinations per pass parameter can be modified at any time. Be aware that when changing the maximum chain length, the system will rebuild the chains according to the new limit. When this happens, it is possible that packets will not be replicated to a destination while it is being reorganized in the flooding lists’ chains. Only the chains associated with the egress-multicast-group context the command is executed in will be affected by changing the parameter.
It is expected that the optimal replication chain length will be between 10 and 16. Since so many variables affect efficient multicast (i.e. ingress packet rate, number of chains, size of replicated packets), only proper testing in the environment that replication will be performed will identify the best dest-chain-limit value for each Egress Multicast Group.
Setting the destinations per pass parameter to a value of 0 has the effect of removing from all egress forwarding planes all chains with members from the egress-multicast-group. Replication to each destination SAP from the group is performed using the normal method (non-efficient replication). The value 0 is not considered a normal value for dest-chain-limit and is provided for debugging purposes only. Setting the value to 0 is persistent between reboots of the system.
Setting the destinations per pass parameter to a value of 1 has the effect of placing each egress-multicast-group member SAP into a chain with a single SAP. The value 1 is not considered a normal value for the dest-chain-limit and is provided for debugging purposes only. Setting the value to 1 is persistent between reboots of the system.
This command configures the common SAP parameter requirements. The SAP common requirements are used to evaluate each SAP for group membership. If a SAP does not meet the specified requirements, the SAP is not allowed into the egress-multicast-group. Once a SAP is a member of the group, attempting to change the parameters on the SAP will fail.
This command identifies the type of filter and actual filter ID that must be provisioned on the SAP prior to the SAP being made a member of the egress-multicast-group. If the SAP does not have the specified filter applied, the SAP cannot be provisioned into the group. It is important that the egress filter applied to each SAP within the egress-multicast-group be the same since the batch replication process on an efficient multicast replication chain will apply the first SAP’s ACL decision to all other SAPs on the chain.
Once the SAP is made a member of the egress-multicast-group, the SAP’s egress filter cannot be changed on the SAP.
Changing the egress-filter parameters within the sap-common-requirements node automatically changes the egress filter applied to each member SAP. If the filter cannot be changed on the SAP due to resource constraints, the modification will fail.
The specified egress-filter does not contain an entry that is defined as an egress mirror-source. Once the filter is associated with the egress-multicast-group, attempting to define one of its entries as an egress mirror source will fail.
The no form of the command removes the egress-filter from each member SAP. The no egress-filter command specifies that an egress filter (IP, IPv6 or MAC) is not applied to a new member SAP within the egress-multicast-group (IPv6 applies to the 7750 SR).
no filter. The egress filter ID must be defined with the associated ip or mac keyword. If an egress-filter is not specified or the no egress-filter command is executed in the sap-common-requirements node, a new member SAP does not have an egress IP or MAC filter defined.
This command specifies the encapsulation type that must exist on the SAP’s access port to allow the SAP membership within the egress-multicast-group. The config>port>ethernet>access>encap-type command is used to define the encapsulation type for the Ethernet port. The allowed encapsulation type values are dot1q and null. If the SAP does not exist on a port with the specified encap-type, it will not be allowed into the egress-multicast-group.
If at least one SAP is currently a member of the efficient-multicast-group, the encap-type cannot be changed within the sap-common-requirements node. If the efficient-multicast-group does not contain any member SAPs, the encap-type may be changed at anytime.
There is no interaction between an efficient-multicast-group and the corresponding access ports associated with its members since all SAPs must be deleted from a port before its encap-type can be changed. When the SAPs are deleted from the port, they are also automatically deleted from the efficient-multicast-group.
The no form of the command returns the egress-multicast-group required encapsulation type for SAPs to dot1q. If the current encap-type is set to null, the command cannot be executed when SAPs exist within the egress-multicast-group.
dot1q — For an egress-multicast-group.
null — If member SAPs are on a null encapsulated access port.
This command specifies the dot1q EtherType that must exist on the SAP’s access port to allow the SAP membership within the egress-multicast-group. The config>port>ethernet>access>dot1q-etype command is used to define the EtherType used when encapsulating a packet with a dot1q tag on the Ethernet port. Any valid EtherType is allowed on the port.
If the current encap-type for the egress-multicast-group is set to null, the dot1q-etype EtherType is ignored when evaluating SAP membership in the group. If the encap-type is set to dot1q (the default), a member SAP’s access port must be configured with the same dot1q-etype EtherType as the egress-multicast-group.
If at least one SAP is currently a member of the efficient-multicast-group, the dot1q-etype value cannot be changed within the sap-common-requirements node. If the efficient-multicast-group does not contain any member SAPs, the dot1q-etype value may be changed at anytime.
If an access port currently has SAPs associated with it that are defined within an egress-multicast-group and the port is currently set to encap-type dot1q, the dot1q-etype value defined on the port cannot be changed.
The no form of the command returns the egress-multicast-group dot1q EtherType to the default value of 0x8100. If the current encap-type is set to a value other then 0x8100, the command cannot be executed when SAPs exist within the egress-multicast-group.
The default dot1q-etype is 0x8100 for an egress-multicast-group.
This command specifies the Ethertype used for QinQ encapsulation.
no qinq-etype
This command configures the fixed tag value used for QinQ encapsulation.
no qinq-fixed-tag-value
This command creates a logical IP routing interface for a Virtual Private Routed Network (VPRN). Once created, attributes like an IP address and service access point (SAP) can be associated with the IP interface.
The interface command, under the context of services, is used to create and maintain IP routing interfaces within VPRN service IDs. The interface command can be executed in the context of an VPRN service ID. The IP interface created is associated with the service core network routing instance and default routing table. The typical use for IP interfaces created in this manner is for subscriber Internet access.
Interface names are case sensitive and must be unique within the group of defined IP interfaces defined for config router interface and config service vprn interface. Interface names must not be in the dotted decimal notation of an IP address. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either interface names or the IP addresses. Use unique IP address values and IP address names to maintain clarity. It could be unclear to the user if the same IP address and IP address name values are used. Although not recommended, duplicate interface names can exist in different router instances.
The available IP address space for local subnets and routes is controlled with the config router service-prefix command. The service-prefix command administers the allowed subnets that can be defined on service IP interfaces. It also controls the prefixes that may be learned or statically defined with the service IP interface as the egress interface. This allows segmenting the IP address space into config router and config service domains.
When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.
By default, there are no default IP interface names defined within the system. All VPRN IP interfaces must be explicitly defined. Interfaces are created in an enabled state.
The no form of this command removes IP the interface and all the associated configuration. The interface must be administratively shutdown before issuing the no interface command.
For VPRN services, the IP interface must be shutdown before the SAP on that interface may be removed. VPRN services do not have the shutdown command in the SAP CLI context. VPRN service SAPs rely on the interface status to enable and disable them.
If ip-int-name already exists within the service ID, the context will be changed to maintain that IP interface. If ip-int-name already exists within another service ID or is an IP interface defined within the config router commands, an error will occur and context will not be changed to that IP interface. If ip-int-name does not exist, the interface is created and context is changed to that interface for further command processing.
This command assigns an IP address, IP subnet, and broadcast address format to an IES IP router interface. Only one IP address can be associated with an IP interface.
An IP address must be assigned to each IES IP interface. An IP address and a mask are used together to create a local IP prefix. The defined IP prefix must be unique within the context of the routing instance. It cannot overlap with other existing IP prefixes defined as local subnets on other IP interfaces in the same routing context within the router.
The local subnet that the address command defines must be part of the services’ address space within the routing context using the config router service-prefix command. The default is to disallow the complete address space to services. Once a portion of the address space is allocated as a service prefix, that portion can be made unavailable for IP interfaces defined within the config router interface CLI context for network core connectivity with the exclude option in the config router service-prefix command.
The IP address for the interface can be entered in either CIDR (Classless Inter-Domain Routing) or traditional dotted decimal notation. The show commands display CIDR notation and is stored in configuration files.
By default, no IP address or subnet association exists on an IP interface until it is explicitly created.
Use the no form of this command to remove the IP address assignment from the IP interface. When the no address command is entered, the interface becomes operationally down.
Address | Admin State | Oper State |
No address | up | down |
No address | down | down |
1.1.1.1 | up | up |
1.1.1.1 | down | down |
The operational state is a read-only variable and the only controlling variables are the address and admin states. The address and admin states are independent and can be set independently. If an interface is in an adminstratively up state and an address is assigned, it becomes operationally up and the protocol interfaces and the MPLS LSPs associated with that IP interface will be reinitialized.
Note:
A mask length of 32 is reserved for loopback addresses (includes system addresses). |
Note:
A mask of 255.255.255.255 is reserved for system IP addresses. |
The broadcast format on an IP interface can be specified when the IP address is assigned or changed.
This parameter does not affect the type of broadcasts that can be received by the IP interface. A host sending either the local broadcast (all-ones) or the valid subnet broadcast address (host-ones) will be received by the IP interface.
The broadcast parameter within the address command does not have a negate feature, which is usually used to revert a parameter to the default value. To change the broadcast type to host-ones after being changed to all-ones, the address command must be executed with the broadcast parameter defined.
This command enables the forwarding of directed broadcasts out of the IP interface.
A directed broadcast is a packet received on a local router interface destined for the subnet broadcast address on another IP interface. The allow-directed-broadcasts command on an IP interface enables or disables the transmission of packets destined to the subnet broadcast address of the egress IP interface.
When enabled, a frame destined to the local subnet on this IP interface will be sent as a subnet broadcast out this interface. Care should be exercised when allowing directed broadcasts as it is a well-known mechanism used for denial-of-service attacks.
When disabled, directed broadcast packets discarded at this egress IP interface will be counted in the normal discard counters for the egress SAP.
By default, directed broadcasts are not allowed and will be discarded at this egress IP interface.
The no form of this command disables the forwarding of directed broadcasts out of the IP interface.
no allow-directed-broadcasts — Directed broadcasts are dropped
This command specifies that the associated interface is a loopback interface that has no associated physical interface. As a result, the associated IES/VPRN interface cannot be bound to a SAP.
Note:
You can configure an IES interface as a loopback interface by issuing the loopback command instead of the sap sap-id command. The loopback flag cannot be set on an interface where a SAP is already defined and a SAP cannot be defined on a loopback interface. |
None
This command assigns a specific MAC address to an IES IP interface.
The no form of the command returns the MAC address of the IP interface to the default value.
The physical MAC address associated with the Ethernet interface that the SAP is configured on (the default MAC address assigned to the interface, assigned by the system).
This command creates a Service Access Point (SAP) within a service. A SAP is a combination of port and encapsulation parameters which identifies the service access point on the interface and within the router. Each SAP must be unique.
All SAPs must be explicitly created. If no SAPs are created within a service or on an IP interface, a SAP will not exist on that object.
Enter an existing SAP without the create keyword to edit SAP parameters. The SAP is owned by the service in which it was created.
A SAP can only be associated with a single service. A SAP can only be defined on a port that has been configured as an access port using the config interface port-type port-id mode access command.
If a port is shutdown, all SAPs on that port become operationally down. When a service is shutdown, SAPs for the service are not displayed as operationally down although all traffic traversing the service will be discarded. The operational state of a SAP is relative to the operational state of the port on which the SAP is defined.
Note:
You can configure an IES interface as a loopback interface by issuing the loopback command instead of the sap sap-id command. The loopback flag cannot be set on an interface where a SAP is already defined and a SAP cannot be defined on a loopback interface. |
The no form of this command deletes the SAP with the specified port. When a SAP is deleted, all configuration parameters for the SAP will also be deleted. For IES, the IP interface must be shutdown before the SAP on that interface may be removed.
No SAPs are defined.
This command assigns a secondary IP address/IP subnet/broadcast address format to the interface.
none
Note:
A mask of 255.255.255.255 is reserved for system IP addresses. |
The broadcast format on an IP interface can be specified when the IP address is assigned or changed.
This parameter does not affect the type of broadcasts that can be received by the IP interface. A host sending either the local broadcast (all-ones) or the valid subnet broadcast address (host-ones) will be received by the IP interface. (Default: host-ones)
This command is used to change the default trusted state to a non-trusted state. When unset or reverted to the trusted default, the ToS field will not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set, in which case the egress network interface treats all IES and network IP interfaces as untrusted.
When the ingress interface is set to untrusted, all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface. The egress network remarking rules also apply to the ToS field of IP packets routed using IGP shortcuts (tunneled to a remote next-hop). However, the tunnel QoS markings are always derived from the egress network QoS definitions.
Egress marking and remarking is based on the internal forwarding class and profile state of the packet once it reaches the egress interface. The forwarding class is derived from ingress classification functions. The profile of a packet is either derived from ingress classification or ingress policing.
The default marking state for network IP interfaces is trusted. This is equivalent to declaring no tos-marking-state on the network IP interface. When undefined or set to tos-marking-state trusted, the trusted state of the interface will not be displayed when using show config or show info unless the detail parameter is given. The save config command will not store the default tos-marking-state trusted state for network IP interfaces unless the detail parameter is also specified.
The no tos-marking-state command is used to restore the trusted state to a network IP interface. This is equivalent to executing the tos-marking-state trusted command.
trusted
This command will configure the subscriber interface address along with additional parameters related to multi-chassis redundancy. This command only applies to the 7750 SR.
none
Note:
A mask of 255.255.255.255 is reserved for system IP addresses. |
Routing policy can be applied towards the state attribute in order to customize the advertisement of the route. Only one SRRP instance can be tracked per subscriber interface route. Tracked SRRP instance can be part of the Fate Sharing Group. This command can be enabled at any time.
This command will configure the IPv6 Link Local address that will be used as a virtual SRRP IPv6 address by the Master SRRP node. This address will be sent in the Router Advertisements initiated by the Master SRRP node. Clients will use this address as IPv6 default-gateway. Both SRRP nodes, Master and Backup, must be configured with the same Link Local address. This command only applies to the 7750 SR.
none
x:x:x:x:x:x:x:x:x:x:x:x:x:x:d.d.d.d |
where: |
x - [0..FF] |
d - [0..255] |
This command will configure the association between the SRRP instance in a Fate Sharing Group and the operational-group that contains messaging SAPs. A state transition of a messaging SAP within an operational-group will trigger calculation of the priority for all SRRP instances that are associated with that operational-group. This command only applies to the 7750 SR.
none
This command will configure an epipe or a (messaging) SAP to be the member of the oper-group.
Epipe:
The epipe status can be monitored by the SRRP messaging SAP. The messaging SAP will transition into the DOWN state if the epipe is either DOWN or has a STANDBY status. In order for the messaging SAP to assume the DOWN state, both RX and TX side of the PW must be shut. In other words, a PW in standby mode also must have the local TX disabled by the virtue of the ‘slave’ flag (standby-signaling-slave command under the spoke-sdp hierarchy). Without the TX disabled, the SAP monitoring the PW would not transition in the down state. The messaging SAP will be in the UP state if the epipe is in the UP state (Active status).
(SRRP messaging) SAP:
The state of the messaging SAPs will be monitored by SRRP instances in a Fate Sharing Group. A state change of any of the messaging SAPs defined under the group-interface and within the oper-group will trigger recalculation of SRRP priority.
This command only applies to the 7750 SR.
none
This command will enable SRRP state tracking by managed (IPv4 only) and subscriber-routes. Managed and subscriber-routes that are installed in the Route Table Manager (RTM) would be modified by the source (SRRP would update the route’s state attribute - srrp-master, srrp-non-master) and this would trigger policy reevaluation with the corresponding action. This command only applies to the 7750 SR.
none
This is a capture SAP level command and applies only to the 7750 SR. This command is important in PPPoE deployments with MSAPs. PPPoE operation requires that the MAC address learned by the client at the very beginning of the session negotiation phase remains unchanged for the lifetime of the session (RFC 2516). This command will ensure that the virtual MAC address used during the PPPoE session negotiation phase on the capture SAP is the same virtual MAC address that is used by the SRRP on the group-interface on which the session is established. Therefore, it is mandated that the SRRP instance (and implicitly the group-interface) where the session belongs to is known in advance. If the group-interface name for the session is returned by the RADIUS, it must be ensured that this group-interface is the one on which the tracked SRRP instance is configured. PPPoE sessions on the same capture SAP cannot be shared across multiple group-interfaces, but instead they all must belong to a single group-interface that is known in advance.
The same restrictions will apply to IPoE clients in MC Redundancy scenario if they are to be supported concurrently on the same capture SAP as PPPoE.
The supported capture SAP syntax is this:
sap <port-id>:X.* capture-sap
The capture SAP syntax that is NOT supported is this:
sap <port-id>:*.* capture-sap
Note:
This command only applies to the 7750 SR. |
none
This command creates a Subscriber Router Redundancy Protocol (SRRP) instance on a group IP interface. An SRRP instance manages all subscriber subnets within the group interfaces subscriber IP interface or other subscriber IP interfaces that are associated through a wholesale/retail relationship. Only one unique SRRP instance can be configured per group interface.
The no form of the command removes an SRRP instance from a group IP interface. Once removed, the group interface ignores ARP requests for the SRRP gateway IP addresses that may exist on subscriber subnets associated with the group IP interface. Then the group interface stops routing using the redundant IP interface associated with the group IP interface and will stop routing with the SRRP gateway MAC address. Ingress packets destined to the SRRP gateway MAC will also be silently discarded. This is the same behavior as a group IP interface that is disabled (shutdown).
This command only applies to the 7750 SR.
no srrp
This commands assigns a bi-directional forwarding (BFD) session providing heart-beat mechanism for the given VRRP/SRRP instance. There can be only one BFD session assigned to any given VRRP/SRRP instance, but there can be multiple SRRP/VRRP sessions using the same BFD session.
BFD control the state of the associated interface. By enabling BFD on a given protocol interface, the state of the protocol interface is tied to the state of the BFD session between the local node and the remote node. The parameters used for the BFD are set via the BFD command under the IP interface.
The no form of this command removes BFD from the configuration.
This command only applies to the 7750 SR.
none
This command overrides the default SRRP gateway MAC address used by the SRRP instance. Unless specified, the system uses the same base MAC address for all SRRP instances with the last octet overridden by the lower 8 bits of the SRRP instance ID. The same SRRP gateway MAC address should be in-use by both the local and remote routers participating in the same SRRP context.
One reason to change the default SRRP gateway MAC address is if two SRRP instances sharing the same broadcast domain are using the same SRRP gateway MAC. The system will use the SRRP instance ID to separate the SRRP messages (by ignoring the messages that does not match the local instance ID), but a unique SRRP gateway MAC is essential to separate the routed packets for each gateway IP address.
The no form of the command removes the explicit SRRP gateway MAC address from the SRRP instance. The SRRP gateway MAC address can only be changed or removed when the SRRP instance is shutdown.
This command only applies to the 7750 SR.
This command defines the interval between SRRP advertisement messages sent when operating in the master state. The interval is also the basis for setting the master-down timer used to determine when the master is no longer sending. The system uses three times the keep-alive interval to set the timer. Every time an SRRP advertisement is seen that is better then the local priority, the timer is reset. If the timer expires, the SRRP instance assumes that a master does not exist and initiates the attempt to become master.
When in backup state, the SRRP instance takes the keep-alive interval of the master as represented in the masters SRRP advertisement message. Once in master state, the SRRP instance uses its own configured keep-alive interval. The keep-alive-interval may be changed at anytime, but will have no effect until the SRRP instance is in the master state.
The no form of the command restores the default interval.
This command only applies to the 7750 SR.
This command defines a specific SAP for SRRP in-band messaging. A message-path SAP must be defined prior to activating the SRRP instance. The defined SAP must exist on the SRRP instances group IP interface for the command to succeed and cannot currently be associated with any dynamic or static subscriber hosts. Once a group IP interface SAP has been defined as the transmission path for SRRP Advertisement messages, it cannot be administratively shutdown, will not support static or dynamic subscriber hosts and cannot be removed from the group IP interface.
The SRRP instance message-path command may be executed at anytime on the SRRP instance. Changing the message SAP will fail if a dynamic or static subscriber host is associated with the new SAP. Once successfully changed, the SRRP instance will immediately disable anti-spoof on the SAP and start sending SRRP Advertisement messages if the SRRP instance is activated.
Changing the current SRRP message SAP on an active pair of routers should be done in the following manner:
Shutting down the backup SRRP instance prevents the SRRP instances from becoming master due to temporarily using differing message path SAPs.
If an MCS peering is operational between the redundant nodes and the SRRP instance has been associated with the peering, the designated message path SAP will be sent from each member.
The no form of the command can only be executed when the SRRP instance is shutdown. Executing no message-path allows the existing SAP to be used for subscriber management functions. A new message-path SAP must be defined prior to activating the SRRP instance.
This command only applies to the 7750 SR.
This command is applicable to PPPoE only deployments in which there are multiple subnets under the subscriber interface. In such case, if the switchover occurs, it will be sufficient to send a single Gratuitous ARP on every VLAN to update the Layer 2 forwarding path in the access aggregation network. This single gratuitous ARP will contain the IP address of the first GW address found under the subscriber interface address. This command only applies to the 7750 SR.
This command will configure the IPv6 subscriber interface address along with additional parameters related to multi-chassis redundancy. This command only applies to the 7750 SR.
none
Note:
A mask of 255.255.255.255 is reserved for system IP addresses. |
Master = srrp-master
Any other = srrp-non-master
Routing policy can be applied towards the state attribute in order to customize the advertisement of the route. Only one SRRP instance can be tracked per subscriber interface route. Tracked SRRP instance can be part of the Fate Sharing Group. This command can be enabled at any time.
msec | [100…5000] msec |
This command associates one or more VRRP policies with the SRRP instance. A VRRP policy is a collection of connectivity and verification tests used to manipulate the in-use priorities of VRRP and SRRP instances. A VRRP policy can test the link state of ports, ping IP hosts, discover the existence of routes in the routing table or the ability to reach L2 hosts. When one or more of these tests fail, the VRRP policy has the option of decrementing or setting an explicit value for the in-use priority of an SRRP instance.
More than one VRRP policy may be associated with an SRRP instance. When more than one VRRP policy is associated with an SRRP instance the delta decrement of the in-use priority is cumulative unless one or more test fail that have explicit priority values. When one or more explicit tests fail, the lowest priority value event takes effect for the SRRP instance. When the highest delta-in-use-limit is used to manage the lowest delta derived in-use priority for the SRRP instance.
VRRP policy associations may be added and removed at anytime. A maximum of two VRRP policies can be associated with a single SRRP instance.
The no form of the command removes the association with vrrp-policy-id from the SRRP instance.
This command only applies to the 7750 SR.
When preempt is enabled, a newly initiated SRRP instance can overrides an existing Master SRRP instance if its priority value is higher than the priority of the current Master.
If preempt is disabled, an SRRP instance only becomes Master if the master down timer expires before an SRRP advertisement message is received from the adjacent SRRP enabled node.
This command only applies to the 7750 SR.
preempt
This command overrides the default base priority for the SRRP instance. The SRRP instance priority is advertised by the SRRP instance to its neighbor router and is compared to the priority received from the neighbor router. The router with the best (highest) priority enters the master state while the other router enters the backup state. If the priority of each router is the same, the router with the lowest source IP address in the SRRP advertisement message assumes the master state.
The base priority of an SRRP instance can be managed by VRRP policies. A VRRP policy defines a set of connectivity or verification tests which, when they fail, may lower an SRRP instances base priority (creating an in-use priority for the instance). Every time an SRRP instances in-use priority changes when in master state, it sends an SRRP advertisement message with the new priority. If the dynamic priority drops to zero or receives an SRRP Advertisement message with a better priority, the SRRP instance transitions to the becoming backup state.
When the priority command is not specified, or the no priority command is executed, the system uses a default base priority of 100. The priority command may be executed at anytime.
The no form of the command restores the default base priority to the SRRP instance. If a VRRP policy is associated with the SRRP instance, it will use the default base priority as the basis for any modifications to the SRRP instances in-use priority.
This command only applies to the 7750 SR.
This command, when enabled, disables dynamic learning of ARP entries. Instead, the ARP table is populated with dynamic entries from the DHCP Lease State Table (enabled with lease-populate), and optionally with static entries entered with the host command.
Enabling the arp-populate command will remove any dynamic ARP entries learned on this interface from the ARP cache.
The arp-populate command will fail if an existing static ARP entry exists for this interface.
The arp-populate command will fail if an existing static subscriber host on the SAP does not have both MAC and IP addresses specified.
Once arp-populate is enabled, creating a static subscriber host on the SAP without both an IP address and MAC address will fail.
When arp-populate is enabled, the system will not send out ARP requests for hosts that are not in the ARP cache. Only statically configured and DHCP learned hosts are reachable through an IP interface with arp-populate enabled. The arp-populate command can only be enabled on IES and VPRN interfaces supporting Ethernet encapsulation.
Use the no form of the command to disable ARP cache population functions for static and dynamic hosts on the interface. All static and dynamic host information for this interface will be removed from the system’s ARP cache.
not enabled
This command configures the minimum time in seconds an ARP entry learned on the IP interface will be stored in the ARP table. ARP entries are automatically refreshed when an ARP request or gratuitous ARP is seen from an IP host, otherwise, the ARP entry is aged from the ARP table. If arp-timeout is set to a value of zero seconds, ARP aging is disabled.
When the arp-populate and lease-populate commands are enabled on an IES interface, the ARP table entries will no longer be dynamically learned, but instead by snooping DHCP ACK message from a DHCP server. In this case the configured arp-timeout value has no effect.
The default value for arp-timeout is 14400 seconds (4 hours).
The no form of this command restores arp-timeout to the default value.
14400 seconds
This command enables subscriber host connectivity verification for all hosts on this interface. This tool will periodically scan all known hosts (from dhcp-state) and perform UC ARP requests. The subscriber host connectivity verification will maintain state (connected vs. not-connected) for all hosts.
no host-connectivity-verify
Note:
There are up to 16 possible subnets on a given interface, therefore the subscriber host connectivity verification tool will use always an address of the subnet to which the given host is pertaining. In case of group-interfaces, one of the parent subscriber interface subnets (depending on host's address) will be used. |
Note:
A zero value can be used by the SNMP agent to disable host-connectivity-verification. |
This command enables the context to configure Internet Control Message Protocol (ICMP) parameters on a service.
This command specifies the maximum size of IP packets on this group-interface. Packets larger than this will be fragmented.
The ip-mtu applies to all IPoE host types (DHCP, ARP, static). For PPP/L2TP sessions, the ip-mtu is not taken into account for the mtu negotiation; the ppp-mtu in the ppp-policy should be used instead.
The no form of the command removes the octets value from the configuration.
This command only applies to the 7750 SR.
none
This command controls the export of retail subnets and prefixes to the wholesale forwarding service. When this attribute is configured, subnets and prefixes configured on the retail subscriber interface will no longer be exported to the associated wholesale VPRN and will remain private to the retail VPRN. This is useful in a PPPoE business service context as it allows retail services to use overlapping IP address spaces even if these services are associated with the same wholesale service. PPPoE sessions are actually terminated in the retail service although their traffic transits on a SAP belonging to the wholesale service.
Configuring private retail subnets is not supported for IPoEv4 host management (DHCPv4, IPv4 static-host and ARP-host). If PPPoE sessions need to coexist with IPoEv4 hosts, then this attribute should not be configured on the retail subscriber interface.
This command will fail if the subscriber interface is not associated with a wholesale service.
If the retail VPRN is of the type hub, this attribute is mandatory. In this case, private retail subnets will be enabled by default and it will not be possible to deconfigure it.
This command only applies to the 7750 SR.
This command can be configured only for subscriber interfaces that do not have an IPv4 address explicitly configured and is therefore operationally in a DOWN state. By configuring this command, the subscriber interface will borrow the IPv4 address from the referenced interface (directly or indirectly via IP address) that must be operationally UP and located in the same routing instance as the subscriber interface. This will allow the subscriber interface to becomes operationally UP and consequently allow forwarding of the subscriber traffic.
Such interface is referred as unnumbered interface, since it does not have explicitly configured a unique IP address. Subscriber-hosts under the unnumbered subscriber interface are installed in the fib as /32 hosts.
Without this command the subscriber interface is operationally DOWN and subscriber-host instantiation is not possible.
This command is mutually exclusive with the allow-unmatched-subnets command under the same CLI hierarchy.
The operation of IPv6 host is not affected by this command.
This command only applies to the 7750 SR.
no unnumbered
This command enables the context to enable IPv6 IPoE bridged mode and only applies to the 7750 SR.
This command enters the context to enable IPv6 IPoE bridged mode.
The no form of the command disables the IPv6 IPoE bridged mode.
This command only applies to the 7750 SR.
This command enables host to have two WAN addresses, one from DHCP IA_NA and one from SLAAC assignment.
no allow-multiple-wan-addresses
This command enables the context to configure neighbor discovery parameters.
This command allows the router to populate the neighbor discovery table through snooping subscribers’ duplicate address detection messages.
no dad-snooping
This command configures the maximum number of neighbors learned.
This command configures IPv6 router advertisements for this interface.
This command configures the hop-limit advertised for this interface.
64
This command enables the context to configure IPv6 DNS options for SLAAC hosts
This command specifies to include the Recursive DNS Server (RDNSS) Option as defined in RFC 6106 in IPv6 Router Advertisements for DNS name resolution of IPv6 SLAAC hosts
no include-dns
Specify the maximum time in seconds that the RDNSS address may be used for name resolution.
rdnss-lifetime 3600
This command configures the multicast router advertisements on this interface, either IP or MAC.
This command sets or resets managed address configuration flag for this group-interface.
This command specifies the maximum time allowed between sending unsolicited router advertisements from this interface.
This command specifies the minimum time allowed between sending unsolicited router advertisements from this interface.
This command specifies the value to be placed in link MTU options sent by the router on this interface.
This command sets and resets the other-stateful-configuration flag for this group-interface.
This command enables the context to configure prefix options for this group-interface.
This command enables or disables the option that determines whether or not the prefix can be used for stateless address autoconfiguration.
This command specifies whether the prefix will be assigned to an interface on the specified link.
This command specifies the remaining time for this prefix to be preferred, thus time until deprecation.
3600 seconds
This command configures the value to be placed in the reachable time field in router advertisement messages sent from this interface.
0
This command configures the value to be placed in the retransmit timer field in router advertisements sent from this interface.
0
This command configures the value to be placed in the router lifetime field of router advertisements sent from this interface.
4500
This command enables the context to configure parameters used for router-solicit based authentication.
This command specifies the time before an inactive host is removed.
no interactive-timer
This command specify the minimum interval between two consecutive authentication attempts from the same host.
no min-auth-interval
This command enables the use of the local-user-database for authentication.
no user-db
This command enables or disables SLAAC triggered host creation.
no shutdown
This command enables local proxy ARP. When local proxy ARP is enabled on an IP interface, the system responds to all ARP requests for IP addresses belonging to the subnet with its own MAC address, and thus will become the forwarding point for all traffic between hosts in that subnet.
When local-proxy-arp is enabled, ICMP redirects on the ports associated with the service are automatically blocked.
no local-proxy-arp
This command enables responses to Internet Control Message Protocol (ICMP) mask requests on the router interface.
If a local node sends an ICMP mask request to the router interface, the mask-reply command configures the router interface to reply to the request.
By default, the router instance will reply to mask requests.
The no form of this command disables replies to ICMP mask requests on the router interface.
mask-reply
This command configures a proxy ARP policy for the interface.
The no form of this command disables the proxy ARP capability.
no proxy-arp-policy
The specified name(s) must already be defined.
This command configures the rate for Internet Control Message Protocol (ICMP) redirect messages issued on the router interface.
When routes are not optimal on this router and another router on the same subnetwork has a better route, the router can issue an ICMP redirect to alert the sending node that a better route is available.
The redirects command enables the generation of ICMP redirects on the router interface. The rate at which ICMP redirects is issued can be controlled with the optional number and seconds parameters by indicating the maximum number of redirect messages that can be issued on the interface for a given time interval.
By default, generation of ICMP redirect messages is enabled at a maximum rate of 100 per 10 second time interval. (Default: redirects 100 10)
The no form of this command disables the generation of icmp redirects on the router interface.
redirects 100 10 — Maximum of 100 redirect messages in 10 seconds.
This command enables remote proxy ARP on the interface.
Remote proxy ARP is similar to proxy ARP. It allows the router to answer an ARP request on an interface for a subnet that is not provisioned on that interface. This allows the router to forward to the other subnet on behalf of the requester. To distinguish remote proxy ARP from local proxy ARP, local proxy ARP performs a similar function but only when the requested IP is on the receiving interface.
no remote-proxy-arp
This command configures a static address resolution protocol (ARP) entry associating a subscriber IP address with a MAC address for the core router instance. This static ARP will appear in the core routing ARP table. A static ARP can only be configured if it exists on the network attached to the IP interface.
If an entry for a particular IP address already exists and a new MAC address is configured for the IP address, the existing MAC address will be replaced with the new MAC address.
The no form of this command removes a static ARP entry.
none
This command configures the rate Internet Control Message Protocol. (ICMP) TTL expired messages are issued by the IP interface. By default, generation of ICMP TTL expired messages is enabled at a maximum rate of 100 per 10 second time interval.
The no form of this command disables the limiting the rate of TTL expired messages on the router interface.
ttl-expired 100 10
This command configures the rate for ICMP host and network destination unreachable messages issued on the router interface.
The unreachables command enables the generation of ICMP destination unreachables on the router interface. The rate at which ICMP unreachables is issued can be controlled with the optional number and seconds parameters by indicating the maximum number of destination unreachable messages which can be issued on the interface for a given time interval. By default, generation of ICMP destination unreachables messages is enabled at a maximum rate of 100 per 10 second time interval.
The no form of this command disables the generation of icmp destination unreachables on the router interface.
unreachables 100 10
This command enables the context to configure IPv6 for an interface.
This command assigns an IPv6 address to the IES interface.
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x [0 — FFFF]H | |
d [0 — 255]D | |
prefix-length | 1 — 128 |
Configure last resort IPv6 DNS addresses that can be used for name resolution by IPoEv6 hosts (IA_NA, IA_PD and SLAAC) and PPPoEv6 hosts (IA_NA, IA_PD and SLAAC).
no default-dns
This command assigns an IPv6 address/subnet to the subscriber interface.
Note:
SRRP is not supported for IPv6 subscriber interface. |
none
This command allows address assignments for IPoEv6 and PPPoEv6 hosts in cases where the subscriber host assigned IPv6 address or prefix falls outside of the subscriber-prefix range explicitly configured for the subscriber interface (config>service>vprn/ies>sub-if>ipv6> or the subscriber-prefix is not configured at all.
SLAAC hosts will be installed in the FIB as /64 entries, the length of the installed DHCP-PD prefix will be dictated by the prefix-length and the DHCP-NA host will be installed as /128 entries.
IPv4 subscriber hosts are unaffected by this command.
no allow-unmatching-prefixes
This command assists IP-only static hosts to resolve their default gateway and MAC. By default, the BNG anti-spoof filter drops packets from unknown hosts. The auto-reply features first allow hosts to resolve their default gateway and afterwards allow them to forward traffic. Using the data traffic, the BNG can utilize the data-trigger mechanism to learn the host’s MAC and populate the full IP+MAC static host entry. This command only applies to the 7750 SR.
no auto-reply
This command enables auto-reply for neighbor solicitation.
The no form of the command disables auto-reply.
This command enables auto-reply router solicitation.
The no form of the command disables router-solicitation.
This command configures the subscriber interface level setting for delegated prefix length. The delegated prefix length for a subscriber- interface can be either set to a fixed value that is explicitly configured under the subscriber interface CLI hierarchy or a variable value that can be obtained from various sources. This command can be changed only when no IPv6 prefixes are configured under the subscriber-interface context.
no delegated-prefix-length This means that the delegated prefix length is 64.
This command specifies aggregate off-link subscriber prefixes associated with this subscriber interface. Individual prefixes are specified under the prefix context list aggregate routes in which the next-hop is indirect via the subscriber interface.
This command allows a list of prefixes (using the prefix command multiple times) to be routed to hosts associated with this subscriber interface. Each prefix will be represented in the associated FIB with a reference to the subscriber interface. Prefixes are defined as being for prefix delegation (pd) or use on a WAN interface or host (wan-host).
This command enables the context to configure DHCPv6 relay parameters for the IES interface.
The no form of the command disables DHCP6 relay.
This command specifies the maximum number of DHCPv6 lease states allocated by the DHCPv6 relay function, allowed on this interface.
Optionally, by specifying “route-populate” parameter, system could:
These routes could be redistributed into IGP/BGP by using route-policy, following protocol types that could be used in “from protocol”:
The no form of the command disables dynamic host lease state management.
no lease-populate
This command enables neighbor resolution with DHCPv6 relay.
The no form of the command disables neighbor resolution.
This command enables the sending of remote ID option in the DHCPv6 relay packet.
The client DHCP Unique Identifier (DUID) is used as the remote ID.
This command enables the context to configure DHCPv6 relay information options.
The no form of the command disables DHCPv6 relay information options.
This command enables the sending of interface ID options in the DHCPv6 relay packet.
The no form of the command disables the sending of interface ID options in the DHCPv6 relay packet
The no form of the command disables the sending of remote ID option in the DHCPv6 relay packet.
This command configures ICMPv6 parameters for the interface.
This command specifies whether “packet-too-big” ICMP messages should be sent. When enabled, ICMPv6 “packet-too-big” messages are generated by this interface.
The no form of the command disables the sending of ICMPv6 “packet-too-big” messages.
100 10
This command specifies whether “parameter-problem” ICMP messages should be sent. When enabled', “parameter-problem” ICMP messages are generated by this interface.
The no form of the command disables the sending of “parameter-problem” ICMP messages.
100 10
This command configures ICMPv6 redirect messages. When enabled, ICMPv6 redirects are generated when routes are not optimal on this router and another router on the same subnetwork has a better route in order to alert that node that a better route is available.
When disabled, ICMPv6 redirects are not generated.
100 10
This command specifies whether “time-exceeded” ICMP messages should be sent. When enabled, ICMPv6 “time-exceeded” messages are generated by this interface.
When disabled, ICMPv6 “time-exceeded” messages are not sent.
100 10
This command specifies that ICMPv6 host and network unreachable messages are generated by this interface.
When disabled, ICMPv6 host and network unreachable messages are not sent.
100 10
frame specified by the seconds parameter.
When this command is enabled, the interface will reply to neighbor solicitation requests when both the hosts are on the same subnet. In this case, ICMP redirects will be disabled. When this command is disabled, the interface will not reply to neighbor solicitation requests if both the hosts are on the same subnet.
disabled
This command configures IPv6-to-MAC address mapping on the IES interface.
This command configures a proxy neighbor discovery policy for the interface. This policy determines networks and sources for which proxy ND will be attempted, when local proxy neighbor discovery is enabled.
The no form of this command reverts to the default value.
no proxy-nd-policy
The specified name(s) must already be defined.
Note:
The command outputs in this section are examples only; actual displays may differ depending on supported functionality and user configuration |
Display services using the range of egress labels.
If only the mandatory egress-label1 parameter is specified, only services using the specified label are displayed.
If both egress-label1 and egress-label2 parameters are specified, the services using the range of labels X where egress-label1 <= X <= egress-label2 are displayed.
Use the show router ldp bindings command to display dynamic labels.
Show Service Egress Command Output
The following table describes show service egress label output fields.
Label | Description |
Svc Id | The ID that identifies a service. |
Sdp Id | The ID that identifies an SDP. |
Type | Indicates whether the SDP binding is a spoke or a mesh. |
I. Lbl | The VC label used by the far-end device to send packets to this device in this service by the SDP. |
E. Lbl | The VC label used by this device to send packets to the far-end device in this service by the SDP. |
Number of bindings found | The total number of SDP bindings that exist within the specified egress label range. |
This command displays global FDB usage information.
Show FDB-Info Command Output
The following table describes show FDB-Info command output.
Label | Description |
Service ID | The ID that identifies a service. |
Mac Move | Indicates the administrative state of the MAC movement feature associated with the service. |
Mac Move Rate | The maximum rate at which MACs can be re-learned in this service, before the SAP where the moving MAC was last seen is automatically disabled in order to protect the system against undetected loops or duplicate MACs. The rate is computed as the maximum number of re-learns allowed in a 5 second interval: for example, the default rate of 10 re-learns per second corresponds to 50 re-learns in a 5 second period. |
Mac Move Timeout | Indicates the time in seconds to wait before a SAP that has been disabled after exceeding the maximum re-learn rate is re-enabled. A value of zero indicates that the SAP will not be automatically re-enabled after being disabled. If after the SAP is re-enabled it is disabled again, the effective retry timeout is doubled in order to avoid thrashing. |
Table Size | The maximum number of learned and static entries allowed in the FDB. |
Total Count | The current number of entries (both learned and static) in the FDB. |
Learned Count | The current number of learned entries in the FDB. |
Static Count | The current number of static entries in the FDB. |
Remote Age | The number of seconds used to age out FDB entries learned on an SDP. These entries correspond to MAC addresses learned on remote SAPs. |
Local Age | The number of seconds used to age out FDB entries learned on local SAPs. |
High WaterMark | The utilization of the FDB table of this service at which a ‘table full’ alarm is raised by the agent. |
Low WaterMark | The utilization of the FDB table of this service at which a ‘table empty’ alarm is raised by the agent. |
Mac Learning | Specifies whether the MAC learning process is enabled in this service. |
Discard Unknown | Specifies whether frames received with an unknown destination MAC are discarded in this service. |
MAC Aging | Specifies whether the MAC aging process is enabled in this service. |
MAC Pinning | Specifies whether MAC Pinning is enabled in this service. |
Relearn Only | When enabled, indicates that either the FDB table of this service is full or that the maximum system-wide number of MACs supported by the agent has been reached, and thus MAC learning is temporary disabled, and only MAC re-learns can take place. |
Total Service FDBs | The current number of service FDBs configured on this node. |
Total FDB Size | The sum of configured FDBs. |
Total FDB Entries In Use | The total number of entries (both learned and static) in use. |
Displays the FDB entry for a given MAC address.
Show FDB-MAC Command Output
The following table describes the show FDB MAC command output fields:
Label | Description |
Service ID | The value that identifies a specific service. |
MAC | The specified MAC address |
Source-Identifier | The location where the MAC is defined. |
Type | Static FDB entries created by management. |
Learned Dynamic entries created by the learning process. | |
OAM Entries created by the OAM process. |
Display services using the range of ingress labels.
If only the mandatory ingress-label1 parameter is specified, only services using the specified label are displayed.
If both ingress-label1 and ingress-label2 parameters are specified, the services using the range of labels X where ingress-label1 <= X <= ingress-label2 are displayed.
Use the show router vprn-service-id ldp bindings command to display dynamic labels.
Show Service Ingress Label
The following table describes show service ingress label output fields:
Label | Description |
Svc ID | The value that identifies a specific service. |
SDP Id | The SDP identifier. |
Type | Indicates whether the SDP is a spoke or a mesh. |
I.Lbl | The ingress label used by the far-end device to send packets to this device in this service by the SDP. |
E.Lbl | The egress label used by this device to send packets to the far-end device in this service by the SDP. |
Number of Bindings Found | The number of SDP bindings within the label range specified. |
Displays SAP information.
If no optional parameters are specified, the command displays a summary of all defined SAPs.
The optional parameters restrict output to only SAPs matching the specified properties.
Show Service SAP
The following table describes show service SAP output fields:
Label | Description |
Port ID | The ID of the access port where the SAP is defined. |
Svc ID | The service identifier. |
SapMTU | The SAP MTU value. |
I.QoS | The SAP ingress QoS policy number specified on the ingress SAP. |
I.MAC/IP | The MAC or IP filter policy ID applied to the ingress SAP. |
E.QoS | The SAP egress QoS policy number specified on the egress SAP. |
E.Mac/IP | The MAC or IP filter policy ID applied to the egress SAP |
A.Pol | The accounting policy ID assigned to the SAP. |
Adm | The administrative state of the SAP. |
Opr | The operational state of the SAP. |
The following example applies to the 7450 ESS:
Displays information for the SDPs associated with the service.
If no optional parameters are specified, a summary of all associated SDPs is displayed.
Show Service-ID SDP
The following table describes show service-id SDP output fields:
Label | Description |
Sdp Id | The SDP identifier. |
Type | Indicates whether the SDP is a spoke or a mesh. |
Split Horizon Group | Name of the split horizon group that the SAP belongs. |
VC Type | Displays the VC type: ether, vlan, or vpls. |
VC Tag | Displays the explicit dot1Q value used when encapsulating to the SDP far end. |
I. Lbl | The VC label used by the far-end device to send packets to this device in this service by the SDP. |
Admin Path MTU | The operating path MTU of the SDP is equal to the admin path MTU (when one is set) or the dynamically computed tunnel MTU, when no admin path MTU is set (the default case.) |
Oper Path MTU | The actual largest service frame size (in octets) that can be transmitted through this SDP to the far-end router, without requiring the packet to be fragmented. |
Far End | Specifies the IP address of the remote end of the GRE or MPLS tunnel defined by this SDP. |
Delivery | Specifies the type of delivery used by the SDP: GRE or MPLS. |
Admin State | The administrative state of this SDP. |
Oper State | The current status of the KeepAlive protocol. |
Ingress Label | The label used by the far-end device to send packets to this device in this service by this SDP. |
Egress Label | The label used by this device to send packets to the far-end device in this service by the SDP. |
Last Changed | The date and time of the most recent change to the SDP. |
Signaling | Specifies the signaling protocol used to obtain the ingress and egress labels used in frames transmitted and received on this SDP. |
Admin State | The administrative state of the keepalive process. |
Oper State | The operational state of the keepalive process. |
Hello Time | Specifies how often the SDP echo request messages are transmitted. |
Max Drop Count | Specifies the maximum number of consecutive SDP echo request messages that can be unacknowledged before the keepalive protocol reports a fault. |
Hello Msg Len | Specifies the length of the transmitted SDP echo request messages. |
Hold Down Time | Specifies the amount of time to wait before the keepalive operating status is eligible to enter the alive state. |
I. Fwd. Pkts. | Specifies the number of forwarded ingress packets. |
I. Dro. Pkts | Specifies the number of dropped ingress packets. |
E. Fwd. Pkts. | Specifies the number of forwarded egress packets. |
E. Fwd. Octets | Specifies the number of forwarded egress octets. |
Associated LSP List | When the SDP type is MPLS, a list of LSPs used to reach the far-end router displays. All the LSPs in the list must terminate at the IP address specified in the far end field. If the SDP type is GRE, then the following message displays: SDP delivery mechanism is not MPLS |
Display services using SDP or far-end address options.
Show Service SDP Using X
The following table describes sdp-using output fields.
Label | Description |
Svc ID | The value identifying a service. |
Spd ID | The SPD identifier. |
Type | Type of SDP: Spoke or Mesh. |
Far End | The far-end address of the SDP. |
Oper State | The operational state of the service. |
Ingress Label | The label used by the far-end device to send packets to this device in this service by this SDP. |
Egress Label | The label used by this device to send packets to the far-end device in this service by this SDP. |
This command displays the services matching certain usage properties.
If no optional parameters are specified, all services defined on the system are displayed.
Show Service Service-Using
The following table describes show service-using output fields:
Label | Description |
Service Id | The value that identifies a service. |
Type | Specifies the service type configured for the service ID. |
Adm | The administrative state of the service. |
Opr | The operational state of the service. |
CustomerID | The value that identifies a specific customer. |
Last Mgmt Change | The date and time of the most recent management-initiated change to this service. |
This command displays active subscriber information.
This command displays active subscriber credit control information.
This command displays active subscriber filter information.
This command displays active subscriber hierarchy information. To display an IPoE/PPP session, the group of hosts within the session is visually indented. Additional information related to the session is also shown. For PPPoE, the circuit ID and remote ID if used is shown. For IPoE, the key used to group the session is shown (for example, the circuit ID). The command also display PD host which are modeled as a managed route. The PD managed route is directly underneath and points to the host that it is using as the next hop. The PD managed route forwarding status is also shown, where (N) indicates that the route is not forwarding.
This command displays active subscriber host tracking information.
This command displays active subscriber host tracking groups information.
This command displays active subscriber IGMP information.
This command specifies the pcc-rule.
This command displays active subscriber information for a subscriber.
Enables the context to display information for a particular service-id.
Displays detailed information for all aspects of the service.
Show All Service-ID Output
The following table describes the show all service-id command output fields:
Label | Description |
Service Id | The value that identifies a service. |
VPN Id | The number that identifies the VPN. |
Service Type | Specifies the type of service. |
SDP Id | The SDP identifier. |
Description | Text string describing general information about the service. |
Customer Id | The customer identifier. |
Last Mgmt Change | The date and time of the most recent management-initiated change to this customer. |
SAP Count | The number of SAPs specified for this service. |
SDP Bind Count | The number of SDPs bound to this service. |
Split Horizon Group | Name of the split horizon group for this service. |
Description | Text string describing the split horizon group. |
Last Changed | The date and time of the most recent management-initiated change to this split horizon group. |
SDP Id | The SDP identifier. |
Type | Indicates whether this Service SDP binding is a spoke or a mesh. |
Admin Path MTU | The desired largest service frame size (in octets) that can be transmitted through this SDP to the far-end router, without requiring the packet to be fragmented. |
Oper Path MTU | The actual largest service frame size (in octets) that can be transmitted through this SDP to the far-end router, without requiring the packet to be fragmented. |
Delivery | Specifies the type of delivery used by the SDP: GRE or MPLS. |
Admin State | The administrative state of this SDP. |
Oper State | The operational status of the KeepAlive protocol. |
Ingress Label | The label used by the far-end device to send packets to this device in this service by this SDP. |
Egress Label | The label used by this device to send packets to the far-end device in this service by this SDP. |
Ingress Filter | The ID of the ingress filter policy. |
Egress Filter | The ID of the egress filter policy. |
Far End | Specifies the IP address of the remote end of the GRE or MPLS tunnel defined by this SDP. |
Last Changed | The date and time of the most recent change to this customer. |
Signaling | Specifies the signaling protocol used to obtain the ingress and egress labels used in frames transmitted and received on this SDP. |
Admin State | Specifies the operating status of the SDP. |
Oper State | The operational state of the SDP. |
Hello Time | Specifies how often the SDP echo request messages are transmitted on this SDP. |
Hello Msg Len | Specifies the length of the SDP echo request messages transmitted on this SDP. |
Max Drop Count | Specifies the maximum number of consecutive SDP echo request messages that can be unacknowledged before the keepalive protocol reports a fault. |
Hold Down Time | Specifies the amount of time to wait before the keepalive operating status is eligible to enter the alive state. |
SDP Delivery Mechanism | When the SDP type is MPLS, a list of LSPs used to reach the far-end router displays. All the LSPs in the list must terminate at the IP address specified in the Far End field. If the SDP type is GRE, then the following message displays: SDP Delivery Mechanism is not MPLS |
Number of SDPs | The total number SDPs applied to this service ID. |
Service Access Points | |
Service Id | The value that identifies a service. |
Port Id | The ID of the access port where this SAP is defined. |
Description | Generic information about the SAP. |
Encap Value | The value of the label used to identify this SAP on the access port. |
Admin State | The desired state of the SAP. |
Oper State | The operating state of the SAP. |
Last Changed | The date and time of the last change. |
Admin MTU | The desired largest service frame size (in octets) that can be transmitted through this SDP to the far-end router, without requiring the packet to be fragmented. |
Oper MTU | The actual largest service frame size (in octets) that can be transmitted through this SDP to the far-end router, without requiring the packet to be fragmented. |
Ingress qos-policy | The SAP ingress QoS policy ID. |
Egress qos-policy | The SAP egress QoS policy ID. |
Ingress Filter-Id | The SAP ingress filter policy ID. |
Egress Filter-Id | The SAP egress filter policy ID. |
Multi Svc Site | Indicates the multi-service site in which the SAP is a member. |
Ingress sched-policy | Indicates the ingress QoS scheduler for the SAP. |
Egress sched-policy | Indicates the egress QoS scheduler for the SAP. |
Acct. Pol | Indicates the accounting policy applied to the SAP. |
Collect Stats | Specifies whether accounting statistics are collected on the SAP. |
Dropped | The number of packets or octets dropped. |
Offered Hi Priority | The number of high priority packets, as determined by the SAP ingress QoS policy. |
Offered Low Priority | The number of low priority packets, as determined by the SAP ingress QoS policy. |
Forwarded In Profile | The number of in-profile packets or octets (rate below CIR) forwarded. |
Forwarded Out Profile | The number of out-of-profile packets or octets (rate above CIR) forwarded. |
Dropped In Profile | The number of in-profile packets or octets discarded. |
Dropped Out Profile | The number of out-of-profile packets or octets discarded. |
Forwarded In Profile | The number of in-profile packets or octets (rate below CIR) forwarded. |
Forwarded Out Profile | The number of out-of-profile packets or octets (rate above CIR) forwarded. |
Ingress Queue 1 | The index of the ingress QoS queue of this SAP. |
High priority offered | The packets or octets count of the high priority traffic for the SAP. |
High priority dropped | The number of high priority traffic packets/octets dropped. |
Low priority offered | The packets or octets count of the low priority traffic. |
Low priority dropped | The number of low priority traffic packets/octets dropped. |
In profile forwarded | The number of in-profile packets or octets (rate below CIR) forwarded. |
Out profile forwarded | The number of out-of-profile octets (rate above CIR) forwarded. |
Egress Queue 1 | The index of the egress QoS queue of the SAP. |
In profile forwarded | The number of in-profile packets or octets (rate below CIR) forwarded. |
In profile dropped | The number of in-profile packets or octets dropped for the SAP. |
Out profile forwarded | The number of out-of-profile packets or octets (rate above CIR) forwarded. |
Out profile dropped | The number of out-of-profile packets or octets discarded. |
State | Specifies whether DHCP relay is enabled on this SAP. |
Info Option | Specifies whether Option 82 processing is enabled on this SAP. |
Action | Specifies the Option 82 processing on this SAP or interface: keep, replace or drop. |
Circuit ID | Specifies whether the If index is inserted in Circuit ID sub-option of Option 82. |
Remote ID | Specifies whether the far-end MAC address is inserted in remote ID sub-option of Option 82 |
Managed by Service | Specifies the service-id of the management VPLS managing this SAP. |
Managed by SAP | Specifies the sap-id inside the management VPLS managing this SAP. |
Prune state | Specifies the STP state inherited from the management VPLS. |
Managed by Service | Specifies the service-id of the management VPLS managing this spoke SDP. |
Managed by Spoke | Specifies the sap-id inside the management VPLS managing this spoke SDP. |
Prune state | Specifies the STP state inherited from the management VPLS. |
Displays the ARP table for the IES instance.
Show Service-ID ARP
The following table describes show service-id ARP output fields.
Label | Description |
Service ID | The value identifying the service. |
MAC | The specified MAC address |
Source-Identifier | The location the MAC is defined. |
Type | Static FDB entries created by management. |
Learned Dynamic entries created by the learning process. | |
OAM Entries created by the OAM process. | |
Age | The time lapsed since the service was enabled. |
Interface | The interface applied to the service. |
Port | The port where the SAP is applied. |
This command displays ARP host related information.
This command displays basic information about the service ID including service type, description, SAPs and SDPs.
Show Service-ID Base
The following table describes show service-id base output fields:
Label | Description |
Service Id | The service identifier. |
Vpn Id | Specifies the VPN ID assigned to the service. |
Service Type | The type of service. |
Description | Generic information about the service. |
Customer Id | The customer identifier. |
Last Mgmt Change | The date and time of the most recent management-initiated change to this customer. |
Adm | The administrative state of the service. |
Oper | The operating state of the service. |
Mtu | The largest frame size (in octets) that the service can handle. |
Def. Mesh VC Id | This object is only valid in services that accept mesh SDP bindings. It is used to validate the VC ID portion of each mesh SDP binding defined in the service. |
SAP Count | The number of SAPs defined on the service. |
SDP Bind Count | The number of SDPs bound to the service. |
Identifier | Specifies the service access (SAP) and destination (SDP) points. |
Type | Specifies the signaling protocol used to obtain the ingress and egress labels used in frames transmitted and received on the SDP. |
AdmMTU | Specifies the desired largest service frame size (in octets) that can be transmitted through this SDP to the far-end ESR, without requiring the packet to be fragmented. |
OprMTU | Specifies the actual largest service frame size (in octets) that can be transmitted through this SDP to the far-end ESR, without requiring the packet to be fragmented. |
Opr | The operational state of the SDP. |
This command displays FDB entry for a given MAC address.
This command displays static hosts configured on this service.
Displays the labels being used by the service.
Show Service-ID Labels
The following table describes show service-id labels output fields:
Label | Description |
Svc Id | The service identifier. |
Sdp Id | The SDP identifier. |
Type | Indicates whether the SDP is a spoke or a mesh. |
I. Lbl | The VC label used by the far-end device to send packets to this device in this service by the SDP. |
E. Lbl | The VC label used by this device to send packets to the far-end device in this service by the SDP. |
This command displays the multicast FIB on the VPLS service.
Show Output
The following table describes the command output fields:
Label | Description |
Source Address | IPv4 unicast source address. |
Group Address | IPv4 multicast group address. |
SAP/SDP ID | Indicates the SAP/SDP to which the corresponding multicast stream will be forwarded/blocked. |
Forwarding/Blocking | Indicates whether the corresponding multicast stream will be blocked/forwarded. |
Number of Entries | Number of entries in the MFIB. |
Forwarded Packets | Indicates the number of multicast packets forwarded for the corresponding source/group. |
Svc ID | Indicates the service to which the corresponding multicast stream will forwarded/blocked. Local means that the multicast stream will be forwarded/blocked to a SAP or SDP local to the service. |
The following is an example for the 7450 ESS:
The following is an example for the 7750 SR:
This command displays MLD snooping information.
This command displays detailed information about MLD snooping.
This command displays basic MLD snooping information.
This command displays all multicast routers.
This command displays multicast VPLS registration information.
This command displays MLD snooping information related to a specific SAP.
This command displays proxy-reporting database entries.
This command displays information about the current querier.
This command displays MLD snooping static group membership data.
This command displays MLD snooping statistics.
This command displays the MSTP specific configuration data. This command is only valid on a management VPLS.
This command displays information for the SAPs associated with the service.
If no optional parameters are specified, a summary of all associated SAPs is displayed.
Show Service-ID SAP
The following table describes show service SAP fields:
Label | Description |
Service Id | The service identifier. |
SAP | The SAP and qtag. |
Encap | The encapsulation type of the SAP. |
Ethertype | Specifies an Ethernet type II Ethertype value. |
Admin State | The administrative state of the SAP. |
Oper State | The operational state of the SAP. |
Flags | Specifies the conditions that affect the operating status of this SAP. |
Last Status Change | Specifies the time of the most recent operating status change to this SAP |
Last Mgmt Change | Specifies the time of the most recent management-initiated change to this SAP. |
Admin MTU | The desired largest service frame size (in octets) that can be transmitted through the SAP to the far-end router, without requiring the packet to be fragmented. |
Oper MTU | The actual largest service frame size (in octets) that can be transmitted through the SAP to the far-end router, without requiring the packet to be fragmented. |
Ingress qos-policy | The ingress QoS policy ID assigned to the SAP. |
Egress qos-policy | The egress QoS policy ID assigned to the SAP. |
Ingress Filter-Id | The ingress filter policy ID assigned to the SAP. |
Egress Filter-Id | The egress filter policy ID assigned to the SAP. |
Acct. Pol | The accounting policy ID assigned to the SAP. |
Collect Stats | Specifies whether collect stats is enabled. |
Dropped | The number of packets and octets dropped due to SAP state, ingress MAC or IP filter, same segment discard, bad checksum, etc. |
Off. HiPrio | The number of high priority packets and octets, as determined by the SAP ingress QoS policy, offered by the Pchip to the Qchip. |
Off. LowPrio | The number of low priority packets and octets, as determined by the SAP ingress QoS policy, offered by the Pchip to the Qchip. |
Off. Uncolor | The number of uncolored packets and octets, as determined by the SAP ingress QoS policy, offered by the Pchip to the Qchip. |
Dro. HiPrio | The number of high priority packets and octets, as determined by the SAP ingress QoS policy, dropped by the Qchip due to: MBS exceeded, buffer pool limit exceeded, etc. |
Dro. LowPrio | The number of low priority packets and octets, as determined by the SAP ingress QoS policy, dropped by the Qchip due to: MBS exceeded, buffer pool limit exceeded, etc. |
Dro. InProf | The number of in-profile packets and octets discarded by the egress Qchip due to MBS exceeded, buffer pool limit exceeded, etc. |
Dro. OutProf | The number of out-of-profile packets and octets discarded by the egress Qchip due to MBS exceeded, buffer pool limit exceeded, etc. |
For. InProf | The number of in-profile packets and octets (rate below CIR) forwarded by the egress Qchip. |
For. OutProf | The number of out-of-profile packets and octets (rate above CIR) forwarded by the egress Qchip. |
Displays information for the SDPs associated with the service.
If no optional parameters are specified, a summary of all associated SDPs is displayed.
Show Service-ID SDP
The following table describes show service-id SDP output fields:
Label | Description |
Sdp Id | The SDP identifier. |
Type | Indicates whether the SDP is a spoke or a mesh. |
Split Horizon Group | Name of the split horizon group that the SAP belongs to. |
VC Type | Displays the VC type: ether, vlan, or vpls. |
VC Tag | Displays the explicit dot1Q value used when encapsulating to the SDP far end. |
I. Lbl | The VC label used by the far-end device to send packets to this device in this service by the SDP. |
Admin Path MTU | The operating path MTU of the SDP is equal to the admin path MTU (when one is set) or the dynamically computed tunnel MTU, when no admin path MTU is set (the default case.) |
Oper Path MTU | The actual largest service frame size (in octets) that can be transmitted through this SDP to the far-end router, without requiring the packet to be fragmented. |
Far End | Specifies the IP address of the remote end of the GRE or MPLS tunnel defined by this SDP. |
Delivery | Specifies the type of delivery used by the SDP: GRE or MPLS. |
Admin State | The administrative state of this SDP. |
Oper State | The current status of the SDP. |
Ingress Label | The label used by the far-end device to send packets to this device in this service by this SDP. |
This enables the command to display GSMP information.
This command display GSMP neighbor information.
Show Service-ID GSMP Neighbors Group
The following table describes show service-id gsmp neighbors group output fields:
Label | Description |
Group | Displays the group name. |
Neighbor | Displays the neighbor IP address. |
AdminState | Displays the administrative state of the neighbor. |
Sessions | Displays the number of sessions (open TCP connections) for each configured neighbor. |
These commands show the configured neighbors per service, regardless that there exists an open TCP connection with this neighbor. The admin state is shown because for a neighbor to be admin enabled, the service, gsmp node, group node and the neighbor node in this service must all be in 'no shutdown' state. Session gives the number of session (open TCP connections) for each configured neighbor.
This command displays GSMP sessions information.
Show Service-ID GSMP sessions
The following table describes service ID GSMP sessions output fields:
Label | Description |
Port | Displays the port ID number. |
Ngbr-IpAddr | Displays the neighbor IP address. |
Gsmp-Group | Displays the GSMP group ID. |
State | The GSMP state of this TCP connection. |
Peer Instance | Together with the peer port and peer name output, displays a unique GSMP ID for each end of the GSMP connection. |
Peer Port | Together with the peer instance and peer name output, displays a unique GSMP ID for each end of the GSMP connection. |
Peer Name | Together with the peer port and peer instance output, displays a unique GSMP ID for each end of the GSMP connection. |
timeouts | Displays the number of successive timeouts for this session. |
Peer Timer | Displays the GSMP keepalive timer. |
Capabilities | Displays the ANCP capabilities negotiated for this session. |
Conf Capabilities | Displays the ANCP capabilities configured for this session. |
Priority Marking | Displays the priority marking configured for this session. |
Local Addr | Displays the IP address used by the box's side of the TCP connection. |
Conf. Local Addr. | Displays the configured IP address used by the box's side of the TCP connection. |
Sender Instance | The instance sent to the neighbor in this session. |
Sender Port | The port sent to the neighbor in this session. |
Sender Name | The name sent to the neighbor in this session. |
Max. Timeouts | The maximum number of successive timeouts configured for this session. |
Sender Timer | Indicates the timeout value that will be announced towards the neighbor. The neighbor uses this timeout value while waiting for an acknowledgment from this system. |
This show command gives information about the open TCP connections with DSLAMs.
Note:
The association command gives an overview of each ANCP string received from this session. |
This command displays service interface information.
This command displays service retailer information.
This command displays service wholesaler information.
Wholesaler information can also be displayed in the lease-state context.
This command displays service split horizon groups.
This command displays Display static hosts configured on this service.
Displays information for the spanning tree protocol instance for the service.
Show Service-ID STP Output
The following table describes show service-id STP output fields:
Label | Description |
RSTP Admin State | Indicates the administrative state of the Rapid Spanning Tree Protocol instance associated with this service. |
Core Connectivity | Indicates the connectivity status to the core. |
RSTP Oper State | Indicates the operational state of the Rapid Spanning Tree Protocol instance associated with this service. This field is applicable only when STP is enabled on the router. |
Bridge-id | Specifies the MAC address used to identify this bridge in the network. |
Hold Time | Specifies the interval length during which no more than two Configuration BPDUs shall be transmitted by this bridge. |
Bridge fwd delay | Specifies how fast a bridge changes its state when moving toward the forwarding state. |
Bridge Hello time | Specifies the amount of time between the transmission of Configuration BPDUs. |
Bridge max age | Specifies the maximum age of spanning tree protocol information learned from the network on any port before it is discarded. This is the actual value that this bridge is currently using. |
Bridge priority | Defines the priority of the spanning tree protocol instance associated with this service. |
Topology change | Specifies whether a topology change is currently in progress. |
Last Top. change | Specifies the time (in hundredths of a second) since the last time a topology change was detected by the Spanning Tree Protocol instance associated with this service. |
Top. change count | Specifies the total number of topology changes detected by the Spanning Tree Protocol instance associated with this service since the management entity was last reset or initialized. |
The following is an example for the 7450 ESS:
This command enables the context to show session authentication information.
This command displays session authentication statistics for this service.
This command displays subscriber host information.
Show Service-ID subscriber hosts
The following table describes show service-id subscriber hosts output fields:
Label | Description |
Sap | Displays the SAP ID number. |
IP Address | Displays the IP address. |
MAC Address | Displays the MAC address |
Origin Subscriber | The ID of the originating subscriber. |
Redirection filter id | Displays the Redirection Filter ID number. |
Status: active/inactive | Displays the status of one-time HTTP redirection. |
Filter-id-source | Displays source of the HTTP filter. |
This command displays SDP information.
If no optional parameters are specified, a summary SDP output for all SDPs is displayed.
This command displays selective subscriber information using specific options.
This command enables the context to show multi-chassis redundancy information.
This command displays multi-chassis redundancy information.
This command displays the IPsec multi-chassis states. Optionally, only the states of the specified tunnel-groups will be displayed.
This command displays multi-chassis ring information.
Show mc-ring peer ip-address ring Output
The following table describes mc-ring peer ip-address ring output fields.
Label | Description |
Sync Tag | Displays the synchronization tag that was used while synchronizing this port with the multi-chassis peer. |
Oper State | noPeer The peer has no corresponding ring configured. |
connected The inband control connection with the peer is operational. | |
broken The inband control connection with the peer has timed out. | |
conflict The inband control connection with the peer has timed out but the physical connection is still OK; the failure of the inband signaling connection is caused by a misconfiguration. For example, a conflict between the configuration of this system and its peer, or a misconfiguration on one of the ring access node systems. | |
Oper State (Cont) | testingRing The inband control connection with the peer is being set up. Waiting for result. |
waitingForPeer Verifying if this ring is configured on the peer. | |
configErr The ring is administratively up, but a configuration error prevents it from operating properly. | |
halfBroken The inband control connection indicates that the ring is broken in one direction (towards the peer). | |
localBroken The inband control connection with the peer is known to be broken due to local failure or local administrative action. | |
shutdown The ring is shutdown. | |
Failure Reason | Displays the failure reason. |
No. of MC Ring entries | Displays the number of MC ring entries. |
show redundancy multi-chassis ring peer statistics Output
The following table describes multi-chassis ring peer output fields
Label | Description |
Message | Displays the message type. |
Received | Indicates the number of valid MC-Ring signaling messages received from the peer. |
Transmitted | Indicates the number of valid MC-Ring signaling messages transmitted from the peer. |
MCS ID Request | Displays the number of valid MCS ID requests were received from the peer. |
MCS ID Response | Displays the number of valid MCS ID responses were received from the peer. |
Ring Exists Request | Displays the number of valid 'ring exists' requests were received from the peer. |
Ring Exists Response | Displays the number of valid ring exists' responses were received from the peer. |
Keepalive | Displays the number of valid MC-Ring control packets of type 'keepalive' were received from the peer. |
Label | Description |
Oper State | Displays the state of the connection verification (both local and remote). |
notProvisioned Connection verification is not provisioned. | |
configErr Connection verification is provisioned but a configuration error prevents it from operating properly. | |
notTested Connection verification is administratively disabled or is not possible in the current situation. | |
testing Connection Verification is active, but no results are yet available. | |
connected The ring node is reachable. | |
Oper State (Cont) | disconnected Connection verification has timed out. |
In Use | Displays “True” if the ring node is referenced on an e-pipe or as an inter-dest-id on a static host or dynamic lease. |
Label | Description |
Rx | Displays the number of MC-ring signaling packets were received by this system. |
Rx Too Short | Displays the number of MC-ring signaling packets were received by this system that were too short. |
Rx Wrong Authentication | Displays the number of MC-ring signaling packets were received by this system with invalid authentication. |
Rx Invalid TLV | Displays the number of MC-ring signaling packets were received by this system with invalid TLV. |
Rx Incomplete | Displays the number of MC-ring signaling packets were received by this system that were incomplete. |
Rx Unknown Type | Displays the number of MC-ring signaling packets were received by this system that were of unknown type. |
Rx Unknown Peer | Displays the number of MC-ring signaling packets were received by this system that were related to an unknown peer. |
Rx Unknown Ring | Displays the number of MC-ring signaling packets were received by this system that were related to an unknown ring. |
Rx Unknown Ring Node | Displays the number of MC-ring signaling packets were received by this system that were related to an unknown ring node. |
Tx | Displays the number of MC-ring signaling packets were transmitted by this system. |
Tx No Buffer | Displays the number of MC-ring signaling packets could not be transmitted by this system due to a lack of packet buffers. |
Tx Transmission Failed | Displays the number of MC-ring signaling packets could not be transmitted by this system due to a transmission failure. |
Tx Unknown Destination | Displays the number of MC-ring unknown destination signaling packets were transmitted by this system. |
Missed Configuration Events | Displays the number of missed configuration events on this system. |
Missed BFD Events | Displays the number of missed BFD events on this system. |
This command displays DHCP lease state information.
Note:
The wholesaler service-id parameter is applicable only in the VPRN context (VPRN is supported by the 7750 SR only). |
This command displays DHCP6 lease state information.
Note:
The wholesaler service-id parameter is applicable only in the VPRN context. |
This command displays DHCP relay statistics.
This command displays DHCP configuration summary information.
The following example is for the 7750 SR:
This command displays statistics for DHCP relay and DHCP snooping. If no IP address or interface name is specified, then all configured interfaces are displayed. If an IP address or interface name is specified, then only data regarding the specified interface is displayed.
Show DHCP Statistics Output
The following table describes the output fields for DHCP statistics.
Label | Description |
Received Packets | The number of packets received from the DHCP clients. |
Transmitted Packets | The number of packets transmitted to the DHCP clients. |
Received Malformed Packets | The number of malformed packets received from the DHCP clients. |
Received Untrusted Packets | The number of untrusted packets received from the DHCP clients. |
Client Packets Discarded | The number of packets received from the DHCP clients that were discarded. |
Client Packets Relayed | The number of packets received from the DHCP clients that were forwarded. |
Client Packets Snooped | The number of packets received from the DHCP clients that were snooped. |
Server Packets Discarded | The number of packets received from the DHCP server that were discarded. |
Server Packets Relayed | The number of packets received from the DHCP server that were forwarded. |
Server Packets Snooped | The number of packets received from the DHCP server that were snooped. |
Client packets proxied (RADIUS) | The number of packets that were generated from RADIUS data and not relayed from a server |
Client packets proxied (Lease-Split) | Indicates the total number of client packets proxied by the DHCP relay agent based on data received from a RADIUS server |
DHCP RELEASEs spoofed | Indicates the total number of DHCP release messages spoofed by the DHCP relay agent to the DHCP server. |
DHCP FORCERENEWs spoofed | The number of DHCP force-renew packets sent to DHCP clients. |
Display the status of the DHCP Relay and DHCP Snooping functions on each interface.
Show DHCP Summary Output
The following table describes the output fields for DHCP summary.
Label | Description |
Interface Name | Name of the router interface. |
ARP Populate | Indicates whether ARP populate is enabled. |
Used/Provided | Indicates the number of used and provided DHCP leases. |
Info Option | Indicates whether Option 82 processing is enabled on the interface. |
Admin State | Indicates the administrative state. |
This command enables the context to display IGMP snooping information.
Displays detailed information for all aspects of IGMP snooping on the VPLS service.
Show All Service-ID
The following table describes the show all service-id command output fields:
Label | Description |
Admin State | The administrative state of the IGMP instance. |
Querier | Displays the address of the IGMP querier on the IP subnet to which the interface is attached. |
Sap/Sdp Id | Displays the SAP and SDP IDs of the service ID. |
Oper State | Displays the operational state of the SAP and SDP IDs of the service ID. |
Mrtr Port | Specifies there the port is a multicast router port. |
Send Queries | Specifies whether the send-queries command is enabled or disabled. |
Max Num Groups | Specifies the maximum number of multicast groups that can be joined on this SAP or SDP. |
MVR From VPLS | Specifies MVR from VPLS. |
Num Groups | Specifies the actual number of multicast groups that can be joined on this SAP or SDP. |
The following example applies to the 7750 SR:
The following example applies to the 7450 ESS:
Displays all multicast routers.
Show igmp-snooping mrouters
The following table describes the show igmp-snooping mrouters output fields:
Label | Description |
MRouter | Specifies the multicast router port. |
Sap/Sdp Id | Specifies the SAP and SDP ID multicast router ports. |
Up Time | Displays the length of time the mrouter has been up. |
Expires | Displays the amount of time left before the query interval expires. |
Version | Displays the configured version of IGMP running on this interface. |
Displays Multicast VPLS Registration (MVR) information.
Show igmp-snooping mvr
The following table describes the show igmp-snooping mvr output fields:
Label | Description |
IGMP Snooping Admin State | Displays the IGMP snooping administrative state. |
MVR Admin State | Displays the MVR administrative state. |
MVR Policy | Displays the MVR policy name. |
Svc ID | Displays the service ID. |
Sap/SDP | Displays the SAP/SDP ID. |
Oper State | Displays the operational state. |
From VPLS | Displays the originating VPLS name. |
Num Local Groups | Displays the number of local groups. |
This command displays information on the IGMP snooping port database for the VPLS service.
The following example applies to the 7450 ESS:
The following example applies to the 7750 SR:
Displays information on the IGMP snooping proxy reporting database for the VPLS service.
Displays information on the IGMP snooping queriers for the VPLS service.
Displays information on static IGMP snooping source groups for the VPLS service.
Displays IGMP snooping statistics for the VPLS service.
This command displays multicast balance information.
This command shows multicast path management related information.
This command displays multicast path management bandwidth policy information.
This command displays multicast path management channel related information.
This command displays multicast path management reporting destination information and applies only to the 7750 SR.
This command displays multicast path management MDA related information.
This command displays IGMP group information.
This command displays IGMP group-interface information.
This command displays IGMP hosts information.
This command displays IGMP interface information.
This command displays IGMP mcast reporting statistics and only applies to the 7750 SR.
This command displays SSM translate configuration information.
This command displays IGMP static group/source configuration information.
This command displays IGMP statistics information.
This command displays IGMP status information.
This command displays IGMP tunnel-interface information.
This command clears the identification for a specific service.
This command clears ARP host data.
This command enters the context to clear session authentication information.
This command clears Managed SAP (MSAP) information.
This command can remove an MSAP with active subscribers still associated with the MSAP. You can specify the idle-only parameter to clear only MSAPs in an idle state; MSAPs with active subscribers will not be cleared.
dot1q | [port-id | lag-id]:qtag1 |
qinq | [port-id | lag-id]:qtag1.qtag2 |
qtag1 | 0 — 4094 |
qtag2 | 0 — 4094 |
This command clears Managed SAPs created by the Managed SAP policy.
This command clears session authentication statistics for this service.
This command clears the statistics for a service.
This command clears the statistics for a particular subscriber.
This command clears FDB entries for the service.
sdp-id[:vc-id] | sdp-id | 1 — 17407 |
vc-id | 1 — 4294967295 | |
sdp-id:vc-id | sdp-id | 1 — 17407 |
vc-id | 1 — 4294967295 |
Clears and resets the mesh SDP bindings for the service.
Clears and resets the spoke SDP bindings for the service.
Clears SAP statistics for a SAP.
Clears keepalive statistics associated with the SDP ID.
Clears all traffic queue counters associated with the service ID.
Clears statistics for the SAP bound to the service.
Clears statistics for the spoke SDP bound to the service.
Clears all spanning tree statistics for the service ID.
RSTP automatically falls back to STP mode when it receives an STP BPDU. The clear detected-protocols command forces the system to revert to the default RSTP mode on the SAP or spoke SDP.
Clears DHCP lease state information for this service.
Clears DHCP statistics for this service.
Clears the information on the IGMP snooping port database for the VPLS service.
Clears the information on the IGMP snooping queriers for the VPLS service.
Clears IGMP snooping statistics for the VPLS service.
Enter the context to clear multicast FIB info for the VPLS service.
Clears multicast FIB statistics for the VPLS service.
This command enables the context to clear MLD snooping-related data.
This command clears MLD snooping port-db group data.
This command clears MLD snooping querier information.
This command clears MLD snooping statistics.
This command clears all or specific ARP entries. The scope of ARP cache entries cleared depends on the command line option(s) specified.
This command enables the context to clear and reset DHCP entities.
Clears DHCP statistics.
This command debugs multicast path management reporting destinations and applies only to the 7750 SR.
This command sets mcast reporting dest debug filtering options and applies only to the 7750 SR.
This command enables and ARP host debugging.
The no form of the command disables ARP host debugging
This command enables and configures MLD-snooping debugging.
The no form of the command disables MLD-snooping debugging
This command enables and configures the MLD tracing detail level.
The no form of the command disables the MLD tracing detail level.
This command shows MLD packets for the specified MAC address.
The no form of the command disables the MAC debugging.
This command enables and configures the MLD tracing mode.
The no form of the command disables the configures the MLD tracing mode.
This command shows MLD packets for a specific SAP.
The no form of the command disables the debugging for the SAP.
This command shows MLD packets for a specific SDP.
The no form of the command disables the debugging for the SDP.
This command provides MSAP-related statistics for the chassis and tracks the number of sticky MSAPs. The statistics include the total number of MSAPs, sticky MSAPs, and idle MSAPs. When a subscriber disconnects from a sticky MSAP, it transitions to an idle MSAP. The idle MSAP transitions back to a sticky MSAP when the subscriber reconnects. A large number of idle MSAPs during peak network hours indicate that an idle MSAP cleanup is required. The total MSAP statistic counts both the total number of traditional MSAPs (non-sticky) and total number of sticky MSAPs. Idle MSAPs are counted towards the total number of sticky MSAPs.