Nokia 7450 ESS, 7750 SR, 7950 XRS, and VSR R16.0.R1
Legal Disclaimers
Customer Documentation and Product Support
Legal Disclaimers
Customer Documentation and Product Support
Acronyms Reference Guide R16.0.R1
1. 7750 SR, 7450 ESS, and 7950 XRS Acronyms
Customer Document and Product Support
1. 7750 SR, 7450 ESS, and 7950 XRS Acronyms
Customer Document and Product Support
Basic System Configuration Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Router System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. CLI Script Control
2.8. Entering CLI Commands
2.8.1. Command Completion
2.8.2. Unordered and Unnamed Parameters
2.8.3. Editing Keystrokes
2.8.4. Absolute Paths
2.8.5. History
2.8.6. Entering Numerical Ranges
2.8.7. Pipe/Match
2.8.8. Pipe/Count
2.8.9. Range Operator Support of Regular Expression Match
2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
2.8.10. Redirection
2.9. VI Editor
2.9.1. Summary of vi Commands
2.9.2. Using the vi Commands
2.9.3. EX Commands
2.10. Configuration Rollback
2.10.1. Feature Behavior
2.10.2. Rollback and SNMP
2.10.3. Rescue Configuration
2.10.4. Operational Guidelines
2.11. Transactional Configuration
2.11.1. Basic Operation
2.11.2. Transactions and Rollback
2.11.3. Authorization
2.12. Basic CLI Command Reference
2.12.1. Command Hierarchies
2.12.1.1. Global Commands
2.12.1.2. Monitor Commands
2.12.1.3. Environment Commands
2.12.1.4. Candidate Commands
2.12.1.5. Rollback Commands
2.12.1.6. Management Infrastructure Control Commands
2.12.2. Command Descriptions
2.12.2.1. Global Commands
2.12.2.2. Monitor CLI Commands
2.12.2.3. CLI Environment Commands
2.12.2.4. Candidate Commands
2.12.2.5. Rollback Commands
2.12.2.6. Management Infrastructure Control Commands
2.12.2.7. Show Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. URLs
3.1.3. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Deleting Files and Removing Directories
3.2.6. Displaying Directory and File Information
3.2.7. Repairing the File System
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. File Commands
3.3.2. Command Descriptions
3.3.2.1. File System Commands
3.3.2.2. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Configuration and Image Loading
4.1.1.1. Persistence
4.1.1.2. Lawful Intercept
4.1.1.3. FIPS-140-2 Mode
4.1.1.4. System Profiles
4.2. Initial System Startup Process Flow
4.3. Configuration Notes
4.4. Configuring Boot Options File with CLI
4.4.1. BOF Configuration Overview
4.4.2. Basic BOF Configuration
4.4.3. Common Configuration Tasks
4.4.3.1. Searching for the BOF
4.4.3.2. Accessing the CLI
4.4.3.2.1. Console Connection
4.4.4. Configuring BOF Parameters
4.5. Service Management Tasks
4.5.1. System Administration Commands
4.5.1.1. Viewing the Current Configuration
4.5.1.2. Modifying and Saving a Configuration
4.5.1.3. Deleting Bof Parameters
4.5.1.4. Saving a Configuration to a Different Filename
4.5.1.5. Rebooting
4.6. BOF Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. Configuration Commands
4.6.2. Command Descriptions
4.6.2.1. File Management Commands
4.6.2.2. BOF Processing Control
4.6.2.3. Console Port Configuration
4.6.2.4. Image and Configuration Management
4.6.2.5. Management Ethernet Configuration
4.6.2.6. DNS Configuration Commands
4.7. BOF Show Command Reference
4.7.1. Command Hierarchies
4.7.2. Command Descriptions
4.7.2.1. BOF Show Commands
5. System Management
5.1. System Management Parameters
5.1.1. System Information
5.1.1.1. System Name
5.1.1.2. System Contact
5.1.1.3. System Location
5.1.1.4. System Coordinates
5.1.1.5. Naming Objects
5.1.1.6. Common Language Location Identifier
5.1.1.7. DNS Security Extensions
5.1.2. System Time
5.1.2.1. Time Zones
5.1.2.2. Network Time Protocol (NTP)
5.1.2.3. SNTP Time Synchronization
5.1.2.4. CRON
5.2. High Availability
5.2.1. HA Features
5.2.1.1. Redundancy
5.2.1.1.1. Software Redundancy
5.2.1.1.2. Configuration Redundancy
5.2.1.1.3. Component Redundancy
5.2.1.1.4. Service Redundancy
5.2.1.1.5. Accounting Configuration Redundancy
5.2.1.2. Nonstop Forwarding
5.2.1.3. Nonstop Routing (NSR)
5.2.1.4. CPM Switchover
5.2.1.5. Synchronization
5.2.1.5.1. Configuration and boot-env Synchronization
5.2.1.5.2. State Database Synchronization
5.3. Synchronization and Redundancy
5.3.1. Active and Standby Designations
5.3.2. When the Active CPM Goes Offline
5.3.3. OOB Management Ethernet Port Redundancy
5.3.4. Persistence
5.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
5.4. Network Synchronization
5.4.1. Central Synchronization Sub-System
5.4.2. 7950 XRS-40 Extension Chassis Central Clocks
5.4.3. Synchronization Status Messages (SSM)
5.4.3.1. DS1 Signals
5.4.3.2. E1 Signals
5.4.3.3. SONET/SDH Signals
5.4.3.4. DS3/E3
5.4.4. Synchronous Ethernet
5.4.5. Clock Source Quality Level Definitions
5.4.6. Advanced G.781 Features
5.4.7. IEEE 1588v2 PTP
5.4.7.1. PTP Clock Synchronization
5.4.7.2. Performance Considerations
5.4.7.2.1. Port-Based Timestamping of PTP Messages
5.4.7.3. PTP Capabilities
5.4.7.4. PTP Ordinary Slave Clock For Frequency
5.4.7.5. PTP Ordinary Master Clock For Frequency
5.4.7.6. PTP Boundary Clock for Frequency and Time
5.4.7.7. PTP Clock Redundancy
5.4.7.8. PTP Time for System Time and OAM Time
5.4.7.9. PTP within Routing Instances
5.5. System-Wide ATM Parameters
5.6. QinQ Network Interface Support
5.7. Link Layer Discovery Protocol (LLDP)
5.8. IP Hashing as an LSR
5.9. Satellites
5.9.1. Ethernet Satellites
5.9.2. TDM Satellites
5.9.3. Software Repositories for Satellites
5.9.4. Satellite Software Upgrade Overview
5.9.5. Satellite Configuration
5.9.5.1. Satellite Client Port ID Formats
5.9.5.2. Local Forwarding
5.9.5.3. Port Template
5.9.5.4. 10GE Client Ports
5.9.5.5. 10GE Uplinks on the 64x10GE+4x100GE Satellite
5.10. Auto-provisioning
5.10.1. Auto-provisioning limits
5.10.2. Auto-provisioning Process
5.10.3. Auto-provisioning DHCP Rules
5.10.4. Auto-provisioning Failure
5.11. Administrative Tasks
5.11.1. Saving Configurations
5.11.2. Specifying Post-Boot Configuration Files
5.11.3. Network Timing
5.11.4. Power Supplies
5.11.5. Automatic Synchronization
5.11.5.1. Boot-Env Option
5.11.5.2. Config Option
5.11.6. Manual Synchronization
5.11.6.1. Forcing a Switchover
5.12. System Router Instances
5.13. System Configuration Process Overview
5.14. Configuration Notes
5.14.1. General
5.15. Configuring System Management with CLI
5.15.1. Saving Configurations
5.15.2. Basic System Configuration
5.15.3. Common Configuration Tasks
5.15.3.1. System Information
5.15.3.1.1. System Information Parameters
5.15.3.1.2. Coordinates
5.15.3.1.3. System Time Elements
5.15.3.1.4. ANCP Enhancements
5.15.3.2. Configuring Synchronization and Redundancy
5.15.3.2.1. Configuring Persistence
5.15.3.2.2. Configuring Synchronization
5.15.3.2.3. Configuring Manual Synchronization
5.15.3.2.4. Forcing a Switchover
5.15.3.2.5. Configuring Synchronization Options
5.15.3.3. Configuring Multi-Chassis Redundancy for LAG
5.15.3.4. Configuring Mixed Mode
5.15.3.4.1. Enabling Mixed Mode on a 7450 System
5.15.3.5. Configuring Power Supply Parameters
5.15.3.6. Configuring ATM System Parameters
5.15.3.7. Configuring Backup Copies
5.15.3.8. Post-Boot Configuration Extension Files
5.15.3.8.1. Show Command Output and Console Messages
5.15.4. System Timing
5.15.4.1. Edit Mode
5.15.4.2. Configuring Timing References
5.15.4.3. Using the Revert Command
5.15.4.4. Other Editing Commands
5.15.4.5. Forcing a Specific Reference
5.15.5. Configuring System Monitoring Thresholds
5.15.5.1. Creating Events
5.15.5.2. System Alarm Contact Inputs
5.15.6. Configuring LLDP
5.16. System Command Reference
5.16.1. Command Hierarchies
5.16.1.1. Configuration Commands
5.16.1.2. System Information Commands
5.16.1.3. System Alarm Contact Input Commands
5.16.1.4. System Threshold Alarm Commands
5.16.1.5. System Bluetooth Commands
5.16.1.6. Mixed Mode Configuration Commands
5.16.1.7. Persistence Commands
5.16.1.8. PTP Commands
5.16.1.9. System Time Commands
5.16.1.10. Cron Commands
5.16.1.11. Script Control Commands
5.16.1.12. System Synchronization Commands
5.16.1.13. System Administration (Admin) Commands
5.16.1.14. High Availability (Redundancy) Commands
5.16.1.15. LLDP System Commands
5.16.1.16. LLDP Ethernet Port Commands
5.16.1.17. System Router Instance Commands
5.16.2. System Command Reference
5.16.2.1. Generic Commands
5.16.2.2. System Information Commands
5.16.2.3. System Alarm Contact Input Commands
5.16.2.4. System Threshold Alarm Commands
5.16.2.5. System Bluetooth Commands
5.16.2.6. Mixed Mode Configuration Commands
5.16.2.7. Persistence Commands
5.16.2.8. PTP Commands
5.16.2.9. Date and Time Commands
5.16.2.10. Network Time Protocol Commands
5.16.2.10.1. SNTP Commands
5.16.2.10.2. System Time Commands
5.16.2.11. Cron Commands
5.16.2.12. Script Control Commands
5.16.2.13. System Synchronization Configuration Commands
5.16.2.14. System Administration Commands
5.16.2.15. Redundancy Commands
5.16.2.15.1. Peer Commands
5.16.2.15.2. Multi-Chassis Endpoint Commands
5.16.2.15.3. MC-LAG Commands
5.16.2.16. LLDP System Commands
5.16.2.17. LLDP Ethernet Port Commands
5.16.2.18. System Router Instance Commands
5.17. Show, Clear, Debug, and Tools Command Reference
5.17.1. Command Hierarchies
5.17.1.1. Show Commands
5.17.1.2. Clear Commands
5.17.1.3. Debug Commands
5.17.1.4. Tools Commands
5.17.2. Command Descriptions
5.17.2.1. Show Commands
5.17.2.2. Debug Commands
5.17.2.3. Tools Commands
5.17.2.4. Clear Commands
6. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. CLI Script Control
2.8. Entering CLI Commands
2.8.1. Command Completion
2.8.2. Unordered and Unnamed Parameters
2.8.3. Editing Keystrokes
2.8.4. Absolute Paths
2.8.5. History
2.8.6. Entering Numerical Ranges
2.8.7. Pipe/Match
2.8.8. Pipe/Count
2.8.9. Range Operator Support of Regular Expression Match
2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
2.8.10. Redirection
2.9. VI Editor
2.9.1. Summary of vi Commands
2.9.2. Using the vi Commands
2.9.3. EX Commands
2.10. Configuration Rollback
2.10.1. Feature Behavior
2.10.2. Rollback and SNMP
2.10.3. Rescue Configuration
2.10.4. Operational Guidelines
2.11. Transactional Configuration
2.11.1. Basic Operation
2.11.2. Transactions and Rollback
2.11.3. Authorization
2.12. Basic CLI Command Reference
2.12.1. Command Hierarchies
2.12.1.1. Global Commands
2.12.1.2. Monitor Commands
2.12.1.3. Environment Commands
2.12.1.4. Candidate Commands
2.12.1.5. Rollback Commands
2.12.1.6. Management Infrastructure Control Commands
2.12.2. Command Descriptions
2.12.2.1. Global Commands
2.12.2.2. Monitor CLI Commands
2.12.2.3. CLI Environment Commands
2.12.2.4. Candidate Commands
2.12.2.5. Rollback Commands
2.12.2.6. Management Infrastructure Control Commands
2.12.2.7. Show Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. URLs
3.1.3. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Deleting Files and Removing Directories
3.2.6. Displaying Directory and File Information
3.2.7. Repairing the File System
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. File Commands
3.3.2. Command Descriptions
3.3.2.1. File System Commands
3.3.2.2. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Configuration and Image Loading
4.1.1.1. Persistence
4.1.1.2. Lawful Intercept
4.1.1.3. FIPS-140-2 Mode
4.1.1.4. System Profiles
4.2. Initial System Startup Process Flow
4.3. Configuration Notes
4.4. Configuring Boot Options File with CLI
4.4.1. BOF Configuration Overview
4.4.2. Basic BOF Configuration
4.4.3. Common Configuration Tasks
4.4.3.1. Searching for the BOF
4.4.3.2. Accessing the CLI
4.4.3.2.1. Console Connection
4.4.4. Configuring BOF Parameters
4.5. Service Management Tasks
4.5.1. System Administration Commands
4.5.1.1. Viewing the Current Configuration
4.5.1.2. Modifying and Saving a Configuration
4.5.1.3. Deleting Bof Parameters
4.5.1.4. Saving a Configuration to a Different Filename
4.5.1.5. Rebooting
4.6. BOF Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. Configuration Commands
4.6.2. Command Descriptions
4.6.2.1. File Management Commands
4.6.2.2. BOF Processing Control
4.6.2.3. Console Port Configuration
4.6.2.4. Image and Configuration Management
4.6.2.5. Management Ethernet Configuration
4.6.2.6. DNS Configuration Commands
4.7. BOF Show Command Reference
4.7.1. Command Hierarchies
4.7.2. Command Descriptions
4.7.2.1. BOF Show Commands
5. System Management
5.1. System Management Parameters
5.1.1. System Information
5.1.1.1. System Name
5.1.1.2. System Contact
5.1.1.3. System Location
5.1.1.4. System Coordinates
5.1.1.5. Naming Objects
5.1.1.6. Common Language Location Identifier
5.1.1.7. DNS Security Extensions
5.1.2. System Time
5.1.2.1. Time Zones
5.1.2.2. Network Time Protocol (NTP)
5.1.2.3. SNTP Time Synchronization
5.1.2.4. CRON
5.2. High Availability
5.2.1. HA Features
5.2.1.1. Redundancy
5.2.1.1.1. Software Redundancy
5.2.1.1.2. Configuration Redundancy
5.2.1.1.3. Component Redundancy
5.2.1.1.4. Service Redundancy
5.2.1.1.5. Accounting Configuration Redundancy
5.2.1.2. Nonstop Forwarding
5.2.1.3. Nonstop Routing (NSR)
5.2.1.4. CPM Switchover
5.2.1.5. Synchronization
5.2.1.5.1. Configuration and boot-env Synchronization
5.2.1.5.2. State Database Synchronization
5.3. Synchronization and Redundancy
5.3.1. Active and Standby Designations
5.3.2. When the Active CPM Goes Offline
5.3.3. OOB Management Ethernet Port Redundancy
5.3.4. Persistence
5.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
5.4. Network Synchronization
5.4.1. Central Synchronization Sub-System
5.4.2. 7950 XRS-40 Extension Chassis Central Clocks
5.4.3. Synchronization Status Messages (SSM)
5.4.3.1. DS1 Signals
5.4.3.2. E1 Signals
5.4.3.3. SONET/SDH Signals
5.4.3.4. DS3/E3
5.4.4. Synchronous Ethernet
5.4.5. Clock Source Quality Level Definitions
5.4.6. Advanced G.781 Features
5.4.7. IEEE 1588v2 PTP
5.4.7.1. PTP Clock Synchronization
5.4.7.2. Performance Considerations
5.4.7.2.1. Port-Based Timestamping of PTP Messages
5.4.7.3. PTP Capabilities
5.4.7.4. PTP Ordinary Slave Clock For Frequency
5.4.7.5. PTP Ordinary Master Clock For Frequency
5.4.7.6. PTP Boundary Clock for Frequency and Time
5.4.7.7. PTP Clock Redundancy
5.4.7.8. PTP Time for System Time and OAM Time
5.4.7.9. PTP within Routing Instances
5.5. System-Wide ATM Parameters
5.6. QinQ Network Interface Support
5.7. Link Layer Discovery Protocol (LLDP)
5.8. IP Hashing as an LSR
5.9. Satellites
5.9.1. Ethernet Satellites
5.9.2. TDM Satellites
5.9.3. Software Repositories for Satellites
5.9.4. Satellite Software Upgrade Overview
5.9.5. Satellite Configuration
5.9.5.1. Satellite Client Port ID Formats
5.9.5.2. Local Forwarding
5.9.5.3. Port Template
5.9.5.4. 10GE Client Ports
5.9.5.5. 10GE Uplinks on the 64x10GE+4x100GE Satellite
5.10. Auto-provisioning
5.10.1. Auto-provisioning limits
5.10.2. Auto-provisioning Process
5.10.3. Auto-provisioning DHCP Rules
5.10.4. Auto-provisioning Failure
5.11. Administrative Tasks
5.11.1. Saving Configurations
5.11.2. Specifying Post-Boot Configuration Files
5.11.3. Network Timing
5.11.4. Power Supplies
5.11.5. Automatic Synchronization
5.11.5.1. Boot-Env Option
5.11.5.2. Config Option
5.11.6. Manual Synchronization
5.11.6.1. Forcing a Switchover
5.12. System Router Instances
5.13. System Configuration Process Overview
5.14. Configuration Notes
5.14.1. General
5.15. Configuring System Management with CLI
5.15.1. Saving Configurations
5.15.2. Basic System Configuration
5.15.3. Common Configuration Tasks
5.15.3.1. System Information
5.15.3.1.1. System Information Parameters
5.15.3.1.2. Coordinates
5.15.3.1.3. System Time Elements
5.15.3.1.4. ANCP Enhancements
5.15.3.2. Configuring Synchronization and Redundancy
5.15.3.2.1. Configuring Persistence
5.15.3.2.2. Configuring Synchronization
5.15.3.2.3. Configuring Manual Synchronization
5.15.3.2.4. Forcing a Switchover
5.15.3.2.5. Configuring Synchronization Options
5.15.3.3. Configuring Multi-Chassis Redundancy for LAG
5.15.3.4. Configuring Mixed Mode
5.15.3.4.1. Enabling Mixed Mode on a 7450 System
5.15.3.5. Configuring Power Supply Parameters
5.15.3.6. Configuring ATM System Parameters
5.15.3.7. Configuring Backup Copies
5.15.3.8. Post-Boot Configuration Extension Files
5.15.3.8.1. Show Command Output and Console Messages
5.15.4. System Timing
5.15.4.1. Edit Mode
5.15.4.2. Configuring Timing References
5.15.4.3. Using the Revert Command
5.15.4.4. Other Editing Commands
5.15.4.5. Forcing a Specific Reference
5.15.5. Configuring System Monitoring Thresholds
5.15.5.1. Creating Events
5.15.5.2. System Alarm Contact Inputs
5.15.6. Configuring LLDP
5.16. System Command Reference
5.16.1. Command Hierarchies
5.16.1.1. Configuration Commands
5.16.1.2. System Information Commands
5.16.1.3. System Alarm Contact Input Commands
5.16.1.4. System Threshold Alarm Commands
5.16.1.5. System Bluetooth Commands
5.16.1.6. Mixed Mode Configuration Commands
5.16.1.7. Persistence Commands
5.16.1.8. PTP Commands
5.16.1.9. System Time Commands
5.16.1.10. Cron Commands
5.16.1.11. Script Control Commands
5.16.1.12. System Synchronization Commands
5.16.1.13. System Administration (Admin) Commands
5.16.1.14. High Availability (Redundancy) Commands
5.16.1.15. LLDP System Commands
5.16.1.16. LLDP Ethernet Port Commands
5.16.1.17. System Router Instance Commands
5.16.2. System Command Reference
5.16.2.1. Generic Commands
5.16.2.2. System Information Commands
5.16.2.3. System Alarm Contact Input Commands
5.16.2.4. System Threshold Alarm Commands
5.16.2.5. System Bluetooth Commands
5.16.2.6. Mixed Mode Configuration Commands
5.16.2.7. Persistence Commands
5.16.2.8. PTP Commands
5.16.2.9. Date and Time Commands
5.16.2.10. Network Time Protocol Commands
5.16.2.10.1. SNTP Commands
5.16.2.10.2. System Time Commands
5.16.2.11. Cron Commands
5.16.2.12. Script Control Commands
5.16.2.13. System Synchronization Configuration Commands
5.16.2.14. System Administration Commands
5.16.2.15. Redundancy Commands
5.16.2.15.1. Peer Commands
5.16.2.15.2. Multi-Chassis Endpoint Commands
5.16.2.15.3. MC-LAG Commands
5.16.2.16. LLDP System Commands
5.16.2.17. LLDP Ethernet Port Commands
5.16.2.18. System Router Instance Commands
5.17. Show, Clear, Debug, and Tools Command Reference
5.17.1. Command Hierarchies
5.17.1.1. Show Commands
5.17.1.2. Clear Commands
5.17.1.3. Debug Commands
5.17.1.4. Tools Commands
5.17.2. Command Descriptions
5.17.2.1. Show Commands
5.17.2.2. Debug Commands
5.17.2.3. Tools Commands
5.17.2.4. Clear Commands
6. Standards and Protocol Support
Customer Document and Product Support
Gx AVPs Reference Guide R16.0.R1
1. Gx AVP
1.1. In This Section
1.2. AVPs
1.2.1. Reserved Keywords in the 7750 SR
1.2.2. Standard Diameter AVPs
1.2.3. Standard Diameter AVPs (format)
1.2.4. ALU-Specific AVPs
1.2.5. ALU-Specific VSAs (format)
1.2.6. Diameter-Based AVP Applicability
1.2.7. Gx AVP Applicability
1.2.8. ALU-Specific AVP Applicability
1.2.9. Result Codes (Result-Code AVP)
1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
1.2.11. Event Triggers (Event-Trigger AVP)
1.2.12. Termination Causes (Termination-Cause AVP)
2. Standards and Protocol Support
Customer Document and Product Support
1. Gx AVP
1.1. In This Section
1.2. AVPs
1.2.1. Reserved Keywords in the 7750 SR
1.2.2. Standard Diameter AVPs
1.2.3. Standard Diameter AVPs (format)
1.2.4. ALU-Specific AVPs
1.2.5. ALU-Specific VSAs (format)
1.2.6. Diameter-Based AVP Applicability
1.2.7. Gx AVP Applicability
1.2.8. ALU-Specific AVP Applicability
1.2.9. Result Codes (Result-Code AVP)
1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
1.2.11. Event Triggers (Event-Trigger AVP)
1.2.12. Termination Causes (Termination-Cause AVP)
2. Standards and Protocol Support
Customer Document and Product Support
Gy AVPs Reference Guide R16.0.R1
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. References
2. Diameter Gy Interface Specification
2.1. Diameter Gy – Credit-Control-Request (CCR) command
2.1.1. Diameter Gy – CCR Message Top Level AVPs
2.1.2. Diameter Gy – CCR Message Grouped AVPs
2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
2.2.1. Diameter Gy – CCA Message Top Level AVPs
2.2.2. Diameter Gy – CCA message grouped AVPs
2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
2.3. Diameter Gy – Re-Auth-Request (RAR) Command
2.3.1. Diameter Gy – RAR Message Format
2.3.2. Diameter Gy – RAR Message Top Level AVPs
2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
2.4.1. Diameter Gy – RAA Message Format
2.4.2. Diameter Gy – RAA Message Top Level AVPs
2.5. Diameter Gy – Abort-Session-Request (ASR) Command
2.5.1. Diameter Gy – ASR Message Format
2.5.2. Diameter Gy – ASR Message Top Level AVPs
2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
2.6.1. Diameter Gy – ASA Message Format
2.6.2. Diameter Gy – ASA Message Top Level AVPs
3. Standards and Protocol Support
Customer Document and Product Support
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. References
2. Diameter Gy Interface Specification
2.1. Diameter Gy – Credit-Control-Request (CCR) command
2.1.1. Diameter Gy – CCR Message Top Level AVPs
2.1.2. Diameter Gy – CCR Message Grouped AVPs
2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
2.2.1. Diameter Gy – CCA Message Top Level AVPs
2.2.2. Diameter Gy – CCA message grouped AVPs
2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
2.3. Diameter Gy – Re-Auth-Request (RAR) Command
2.3.1. Diameter Gy – RAR Message Format
2.3.2. Diameter Gy – RAR Message Top Level AVPs
2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
2.4.1. Diameter Gy – RAA Message Format
2.4.2. Diameter Gy – RAA Message Top Level AVPs
2.5. Diameter Gy – Abort-Session-Request (ASR) Command
2.5.1. Diameter Gy – ASR Message Format
2.5.2. Diameter Gy – ASR Message Top Level AVPs
2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
2.6.1. Diameter Gy – ASA Message Format
2.6.2. Diameter Gy – ASA Message Top Level AVPs
3. Standards and Protocol Support
Customer Document and Product Support
Interface Configuration Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Interface Configuration Process
2. Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Cards
2.1.2. MCMs
2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
2.1.4. XMAs/C-XMAs
2.1.5. Hardware Licensing
2.1.6. CMAs
2.1.7. Versatile Service Module (VSM)
2.1.8. Oversubscribed Ethernet MDAs
2.1.8.1. Rate Limiting
2.1.8.2. Packet Classification and Scheduling
2.1.9. Channelized MDA/CMA Support
2.1.9.1. Channelized DS-1/E-1 CMA
2.1.9.2. Channelized DS-3/E-3 CMA
2.1.9.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
2.1.9.4. Channelized OC-12/STM-4 ASAP MDAs
2.1.9.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
2.1.9.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
2.1.9.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
2.1.9.8. Network Interconnections
2.2. Digital Diagnostics Monitoring
2.2.1. SFPs and XFPs
2.2.2. Statistics Collection
2.3. Ports
2.3.1. Port Types
2.3.2. Port Features
2.3.2.1. Port State and Operational State
2.3.2.2. 802.1x Network Access Control
2.3.2.2.1. 802.1x Modes
2.3.2.2.2. 802.1x Basics
2.3.2.2.3. 802.1x Timers
2.3.2.2.4. 802.1x Tunneling
2.3.2.2.5. 802.1x Configuration and Limitations
2.3.2.3. MACsec
2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
2.3.2.3.2. MACsec encryption mode
2.3.2.3.3. MACsec Key management modes
2.3.2.3.4. MACsec Terminology
2.3.2.3.5. MACsec Static CAK
2.3.2.3.6. SAK Rollover
2.3.2.3.7. MKA
2.3.2.3.8. Pre-shared Key
2.3.2.3.9. MKA Hello Timer
2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
2.3.2.3.11. Key Server
2.3.2.3.12. SA Limits and Network Design
2.3.2.3.13. P2P (Switch to Switch) Topology
2.3.2.3.14. P2MP (Switch to Switch) Topology
2.3.2.3.15. SA Exhaustion Behavior
2.3.2.3.16. Clear Tag Mode
2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
2.3.2.3.18. EAPoL Destination Address
2.3.2.3.19. Mirroring Consideration
2.3.2.4. SONET/SDH Port Attributes
2.3.2.5. SONET/SDH Path Attributes
2.3.2.6. Multilink Frame Relay
2.3.2.6.1. MLFR Bundle Data Plane
2.3.2.6.2. MLFR Bundle Link Integrity Protocol
2.3.2.7. FRF.12 End-to-End Fragmentation
2.3.2.7.1. SAP Fragment Interleaving Option
2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
2.3.2.10.1. Protocol Field (PID)
2.3.2.10.2. B & E Bits
2.3.2.10.3. Sequence Number
2.3.2.10.4. Information Field
2.3.2.10.5. Padding
2.3.2.10.6. FCS
2.3.2.10.7. LCP
2.3.2.10.8. Link Fragmentation and Interleaving Support
2.3.2.11. Multi-Class MLPPP
2.3.2.11.1. QoS in MC-MLPPP
2.3.2.12. Cisco HDLC
2.3.2.12.1. SLARP
2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
2.3.2.12.3. Timers
2.3.2.13. Automatic Protection Switching (APS)
2.3.2.13.1. Single Chassis and Multi-Chassis APS
2.3.2.13.2. APS Switching Modes
2.3.2.13.3. APS Channel and SONET Header K Bytes
2.3.2.13.4. Revertive Switching
2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
2.3.2.13.6. Annex B (1+1 Optimized) Operation
2.3.2.13.7. Protection of Upper Layer Protocols and Services
2.3.2.13.8. APS User-Initiated Requests
2.3.2.13.9. APS and SNMP
2.3.2.13.10. APS Applicability, Restrictions and Interactions
2.3.2.13.11. Sample APS Applications
2.3.2.14. Inverse Multiplexing Over ATM (IMA)
2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
2.3.2.15. Ethernet Local Management Interface (E-LMI)
2.3.2.16. Link Layer Discovery Protocol (LLDP)
2.3.2.16.1. LLDP Protocol Features
2.3.2.17. Exponential Port Dampening
2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
2.4. FP4 Data Path Mapping
2.5. Port Cross-Connect (PXC)
2.5.1. PXC Terminology
2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
2.5.2.1. Operational State
2.5.3. PXC Sub-Ports
2.5.3.1. PXC Sub-Port Operational State
2.5.4. Port Statistics
2.5.4.1. Statistics on Physical PXC Ports
2.5.5. LAG with PXC Ports – PXC LAG
2.5.6. Basic PXC Provisioning
2.5.7. QoS
2.5.7.1. Queue Allocation on PXC Sub-Ports
2.5.7.2. Pool Allocations on PXC Ports
2.5.7.3. QoS Summary
2.5.8. Mirroring and LI on PXC Ports
2.5.9. Multi-Chassis Redundancy
2.5.10. Health Monitoring on the PXC Sub-Ports
2.5.11. Configuration Example
2.6. Forwarding Path Extensions (FPE)
2.7. LAG
2.7.1. LACP
2.7.1.1. LACP Multiplexing
2.7.1.2. LACP Tunneling
2.7.2. Active-Standby LAG Operation
2.7.3. LAG on Access QoS Consideration
2.7.3.1. Adapt QoS Modes
2.7.3.2. Per-fp-ing-queuing
2.7.3.3. Per-fp-egr-queuing
2.7.3.4. Per-fp-sap-instance
2.7.4. LAG and ECMP Hashing
2.7.4.1. Per Flow Hashing
2.7.4.1.1. Changing Default Per Flow Hashing Inputs
2.7.4.2. Per Link Hashing
2.7.4.2.1. Weighted per-link-hash
2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
2.7.4.4. Consistent Per Service Hashing
2.7.4.5. ESM – LAG Hashing per Vport
2.7.4.5.1. Background
2.7.4.5.2. Hashing per Vport
2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
2.7.4.5.4. Multicast Consideration
2.7.4.5.5. VPLS and Capture SAP Considerations
2.7.5. LAG Hold Down Timers
2.7.6. BFD over LAG Links
2.7.7. Mixed Port-Speed LAG Support
2.7.7.1. LAG Upgrade
2.7.8. Multi-Chassis LAG
2.7.8.1. Overview
2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
2.8. G.8031 Protected Ethernet Tunnels
2.9. G.8032 Protected Ethernet Rings
2.10. Ethernet Port Monitoring
2.11. 802.3ah OAM
2.11.1. OAM Events
2.11.1.1. Link Monitoring
2.11.1.1.1. Capability Advertising
2.11.2. Remote Loopback
2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11.3.1. 802.3ah Grace Announcement
2.12. MTU Configuration Guidelines
2.12.1. Default MTU Values
2.12.2. Modifying MTU Defaults
2.12.3. Configuration Example
2.13. Deploying Preprovisioned Components
2.14. Setting Fabric Speed
2.14.1. fabric-speed-a (SFM5/CPM5)
2.14.2. fabric-speed-b (SFM5/CPM5)
2.14.3. fabric-speed-c (SFM5/CPM5)
2.15. Versatile Service Module
2.15.1. VSM-CCA-XP
2.16. Configuration Process Overview
2.17. Configuration Notes
2.18. Configuring Physical Ports with CLI
2.18.1. Preprovisioning Guidelines
2.18.1.1. Predefining Entities
2.18.1.2. Preprovisioning a Port
2.18.1.3. Maximizing Bandwidth Use
2.18.2. Basic Configuration
2.18.3. Common Configuration Tasks
2.18.3.1. Configuring Cards and MDAs
2.18.3.1.1. Configuring MDA Access and Network Pool Parameters
2.18.3.1.2. Configuring MDA Policies for Named Pools Mode
2.18.3.2. Configuring Cards, MCMs, and MCAs
2.18.3.2.1. Configuring Cards and CMAs
2.18.3.3. Configuring Ports
2.18.3.3.1. Configuring Port Pool Parameters
2.18.3.3.2. Changing Hybrid-Buffer-Allocation
2.18.3.3.3. Changing APS Parameters
2.18.3.3.4. Configuring Ethernet Port Parameters
2.18.3.3.5. Configuring SONET/SDH Port Parameters
2.18.3.3.6. Configuring Channelized Ports
2.18.3.3.7. Configuring Channelized STM1/OC3 Parameters
2.18.3.3.8. Configuring ATM SAPs
2.18.3.3.9. Configuring DWDM Port Parameters
2.18.3.3.10. Configuring WaveTracker Parameters
2.18.3.3.11. Configuring OTU Port Parameters
2.18.3.3.12. Configuring ATM Interface Parameters
2.18.3.3.13. Configuring Frame Relay Parameters
2.18.3.3.14. Configuring Multilink PPP Bundles
2.18.3.3.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
2.18.3.3.16. Multi-Class MLPPP
2.18.3.3.17. Configuring Bundle Protection Group Ports
2.18.3.3.18. Configuring LAG Parameters
2.18.3.3.19. Configuring G.8031 Protected Ethernet Tunnels
2.18.3.3.20. Configuring Connectors and Connector Ports
2.19. Service Management Tasks
2.19.1. Modifying or Deleting an MDA, MCM, CMA or XMA
2.19.2. Modifying a Card Type
2.19.3. Deleting a Card
2.19.4. Deleting Port Parameters
2.19.5. Soft IOM Reset
2.19.5.1. Soft Reset
2.19.5.2. Deferred MDA Reset
2.20. Configuration Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Card Commands
2.20.1.2. MCM Commands
2.20.1.3. MDA Commands
2.20.1.4. Power Commands
2.20.1.5. Virtual Scheduler Commands
2.20.1.6. Forwarding Plane (FP) Commands
2.20.1.7. Port Configuration Commands
2.20.1.8. Port XC Commands
2.20.1.9. Forwarding Path Extension (FPE) Commands
2.20.1.10. Port APS Commands
2.20.1.11. Ethernet Commands
2.20.1.11.1. Ethernet Access and Network Commands
2.20.1.12. Interface Group Handler Commands
2.20.1.13. Multilink Bundle Commands
2.20.1.14. SONET-SDH Commands
2.20.1.15. TDM Commands
2.20.1.16. DS3 Commands
2.20.1.17. E1 Commands
2.20.1.18. E3 Commands
2.20.1.19. LAG Commands
2.20.1.20. MACsec Commands
2.20.1.21. Ethernet Tunnel Commands
2.20.1.22. Multi-Chassis Redundancy Commands
2.20.2. Configuration Command Descriptions
2.20.2.1. Generic Commands
2.20.2.2. Card Commands
2.20.2.3. MCM Commands
2.20.2.4. MDA (XMA) Commands
2.20.2.5. MDA/Port QoS Commands
2.20.2.6. Power Commands
2.20.2.7. Virtual Scheduler Commands
2.20.2.8. Forwarding Plane Configuration Commands
2.20.2.9. MACsec Commands
2.20.2.10. General Port Commands
2.20.2.11. Port XC Commands
2.20.2.12. Forwarding Path Extension (FPE) Commands
2.20.2.13. APS Commands
2.20.2.14. Ethernet Port Commands
2.20.2.15. 802.1x Port Commands
2.20.2.16. LLDP Port Commands
2.20.2.17. Network Port Commands
2.20.2.18. Interface Group Handler Commands
2.20.2.19. Multilink-Bundle Port Commands
2.20.2.20. SONET/SDH Port Commands
2.20.2.21. SONET/SDH Path Commands
2.20.2.22. ATM Interface Commands
2.20.2.23. Frame Relay Commands
2.20.2.24. TDM Commands
2.20.2.25. LAG Commands
2.20.2.26. Eth Tunnel Commands
2.20.2.27. ETH-CFM Configuration Commands
2.20.2.28. Multi-Chassis Redundancy Commands
2.20.2.28.1. MC Endpoint Commands
2.20.2.28.2. MC LAG Commands
2.20.2.28.3. Multi-Chassis Ring Commands
2.20.2.29. Forwarding Plane Tools Commands
2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
2.21.1. Command Hierarchies
2.21.1.1. Show Commands
2.21.1.2. Monitor Commands
2.21.1.3. Clear Commands
2.21.1.4. Debug Commands
2.21.1.5. Tools Commands
2.21.2. Command Descriptions
2.21.2.1. Hardware Show Commands
2.21.2.2. PEQ Show Commands
2.21.2.3. APS Show Commands
2.21.2.4. Port Show Commands
2.21.2.5. Multilink Bundle Show Commands
2.21.2.6. LAG Show Commands
2.21.2.7. Licensing Show Command
2.21.2.8. MACsec Show Commands
2.21.2.9. Monitor Commands
2.21.2.10. Clear Commands
2.21.2.11. Tools Commands
2.21.2.11.1. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Interface Configuration Process
2. Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Cards
2.1.2. MCMs
2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
2.1.4. XMAs/C-XMAs
2.1.5. Hardware Licensing
2.1.6. CMAs
2.1.7. Versatile Service Module (VSM)
2.1.8. Oversubscribed Ethernet MDAs
2.1.8.1. Rate Limiting
2.1.8.2. Packet Classification and Scheduling
2.1.9. Channelized MDA/CMA Support
2.1.9.1. Channelized DS-1/E-1 CMA
2.1.9.2. Channelized DS-3/E-3 CMA
2.1.9.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
2.1.9.4. Channelized OC-12/STM-4 ASAP MDAs
2.1.9.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
2.1.9.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
2.1.9.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
2.1.9.8. Network Interconnections
2.2. Digital Diagnostics Monitoring
2.2.1. SFPs and XFPs
2.2.2. Statistics Collection
2.3. Ports
2.3.1. Port Types
2.3.2. Port Features
2.3.2.1. Port State and Operational State
2.3.2.2. 802.1x Network Access Control
2.3.2.2.1. 802.1x Modes
2.3.2.2.2. 802.1x Basics
2.3.2.2.3. 802.1x Timers
2.3.2.2.4. 802.1x Tunneling
2.3.2.2.5. 802.1x Configuration and Limitations
2.3.2.3. MACsec
2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
2.3.2.3.2. MACsec encryption mode
2.3.2.3.3. MACsec Key management modes
2.3.2.3.4. MACsec Terminology
2.3.2.3.5. MACsec Static CAK
2.3.2.3.6. SAK Rollover
2.3.2.3.7. MKA
2.3.2.3.8. Pre-shared Key
2.3.2.3.9. MKA Hello Timer
2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
2.3.2.3.11. Key Server
2.3.2.3.12. SA Limits and Network Design
2.3.2.3.13. P2P (Switch to Switch) Topology
2.3.2.3.14. P2MP (Switch to Switch) Topology
2.3.2.3.15. SA Exhaustion Behavior
2.3.2.3.16. Clear Tag Mode
2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
2.3.2.3.18. EAPoL Destination Address
2.3.2.3.19. Mirroring Consideration
2.3.2.4. SONET/SDH Port Attributes
2.3.2.5. SONET/SDH Path Attributes
2.3.2.6. Multilink Frame Relay
2.3.2.6.1. MLFR Bundle Data Plane
2.3.2.6.2. MLFR Bundle Link Integrity Protocol
2.3.2.7. FRF.12 End-to-End Fragmentation
2.3.2.7.1. SAP Fragment Interleaving Option
2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
2.3.2.10.1. Protocol Field (PID)
2.3.2.10.2. B & E Bits
2.3.2.10.3. Sequence Number
2.3.2.10.4. Information Field
2.3.2.10.5. Padding
2.3.2.10.6. FCS
2.3.2.10.7. LCP
2.3.2.10.8. Link Fragmentation and Interleaving Support
2.3.2.11. Multi-Class MLPPP
2.3.2.11.1. QoS in MC-MLPPP
2.3.2.12. Cisco HDLC
2.3.2.12.1. SLARP
2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
2.3.2.12.3. Timers
2.3.2.13. Automatic Protection Switching (APS)
2.3.2.13.1. Single Chassis and Multi-Chassis APS
2.3.2.13.2. APS Switching Modes
2.3.2.13.3. APS Channel and SONET Header K Bytes
2.3.2.13.4. Revertive Switching
2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
2.3.2.13.6. Annex B (1+1 Optimized) Operation
2.3.2.13.7. Protection of Upper Layer Protocols and Services
2.3.2.13.8. APS User-Initiated Requests
2.3.2.13.9. APS and SNMP
2.3.2.13.10. APS Applicability, Restrictions and Interactions
2.3.2.13.11. Sample APS Applications
2.3.2.14. Inverse Multiplexing Over ATM (IMA)
2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
2.3.2.15. Ethernet Local Management Interface (E-LMI)
2.3.2.16. Link Layer Discovery Protocol (LLDP)
2.3.2.16.1. LLDP Protocol Features
2.3.2.17. Exponential Port Dampening
2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
2.4. FP4 Data Path Mapping
2.5. Port Cross-Connect (PXC)
2.5.1. PXC Terminology
2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
2.5.2.1. Operational State
2.5.3. PXC Sub-Ports
2.5.3.1. PXC Sub-Port Operational State
2.5.4. Port Statistics
2.5.4.1. Statistics on Physical PXC Ports
2.5.5. LAG with PXC Ports – PXC LAG
2.5.6. Basic PXC Provisioning
2.5.7. QoS
2.5.7.1. Queue Allocation on PXC Sub-Ports
2.5.7.2. Pool Allocations on PXC Ports
2.5.7.3. QoS Summary
2.5.8. Mirroring and LI on PXC Ports
2.5.9. Multi-Chassis Redundancy
2.5.10. Health Monitoring on the PXC Sub-Ports
2.5.11. Configuration Example
2.6. Forwarding Path Extensions (FPE)
2.7. LAG
2.7.1. LACP
2.7.1.1. LACP Multiplexing
2.7.1.2. LACP Tunneling
2.7.2. Active-Standby LAG Operation
2.7.3. LAG on Access QoS Consideration
2.7.3.1. Adapt QoS Modes
2.7.3.2. Per-fp-ing-queuing
2.7.3.3. Per-fp-egr-queuing
2.7.3.4. Per-fp-sap-instance
2.7.4. LAG and ECMP Hashing
2.7.4.1. Per Flow Hashing
2.7.4.1.1. Changing Default Per Flow Hashing Inputs
2.7.4.2. Per Link Hashing
2.7.4.2.1. Weighted per-link-hash
2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
2.7.4.4. Consistent Per Service Hashing
2.7.4.5. ESM – LAG Hashing per Vport
2.7.4.5.1. Background
2.7.4.5.2. Hashing per Vport
2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
2.7.4.5.4. Multicast Consideration
2.7.4.5.5. VPLS and Capture SAP Considerations
2.7.5. LAG Hold Down Timers
2.7.6. BFD over LAG Links
2.7.7. Mixed Port-Speed LAG Support
2.7.7.1. LAG Upgrade
2.7.8. Multi-Chassis LAG
2.7.8.1. Overview
2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
2.8. G.8031 Protected Ethernet Tunnels
2.9. G.8032 Protected Ethernet Rings
2.10. Ethernet Port Monitoring
2.11. 802.3ah OAM
2.11.1. OAM Events
2.11.1.1. Link Monitoring
2.11.1.1.1. Capability Advertising
2.11.2. Remote Loopback
2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11.3.1. 802.3ah Grace Announcement
2.12. MTU Configuration Guidelines
2.12.1. Default MTU Values
2.12.2. Modifying MTU Defaults
2.12.3. Configuration Example
2.13. Deploying Preprovisioned Components
2.14. Setting Fabric Speed
2.14.1. fabric-speed-a (SFM5/CPM5)
2.14.2. fabric-speed-b (SFM5/CPM5)
2.14.3. fabric-speed-c (SFM5/CPM5)
2.15. Versatile Service Module
2.15.1. VSM-CCA-XP
2.16. Configuration Process Overview
2.17. Configuration Notes
2.18. Configuring Physical Ports with CLI
2.18.1. Preprovisioning Guidelines
2.18.1.1. Predefining Entities
2.18.1.2. Preprovisioning a Port
2.18.1.3. Maximizing Bandwidth Use
2.18.2. Basic Configuration
2.18.3. Common Configuration Tasks
2.18.3.1. Configuring Cards and MDAs
2.18.3.1.1. Configuring MDA Access and Network Pool Parameters
2.18.3.1.2. Configuring MDA Policies for Named Pools Mode
2.18.3.2. Configuring Cards, MCMs, and MCAs
2.18.3.2.1. Configuring Cards and CMAs
2.18.3.3. Configuring Ports
2.18.3.3.1. Configuring Port Pool Parameters
2.18.3.3.2. Changing Hybrid-Buffer-Allocation
2.18.3.3.3. Changing APS Parameters
2.18.3.3.4. Configuring Ethernet Port Parameters
2.18.3.3.5. Configuring SONET/SDH Port Parameters
2.18.3.3.6. Configuring Channelized Ports
2.18.3.3.7. Configuring Channelized STM1/OC3 Parameters
2.18.3.3.8. Configuring ATM SAPs
2.18.3.3.9. Configuring DWDM Port Parameters
2.18.3.3.10. Configuring WaveTracker Parameters
2.18.3.3.11. Configuring OTU Port Parameters
2.18.3.3.12. Configuring ATM Interface Parameters
2.18.3.3.13. Configuring Frame Relay Parameters
2.18.3.3.14. Configuring Multilink PPP Bundles
2.18.3.3.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
2.18.3.3.16. Multi-Class MLPPP
2.18.3.3.17. Configuring Bundle Protection Group Ports
2.18.3.3.18. Configuring LAG Parameters
2.18.3.3.19. Configuring G.8031 Protected Ethernet Tunnels
2.18.3.3.20. Configuring Connectors and Connector Ports
2.19. Service Management Tasks
2.19.1. Modifying or Deleting an MDA, MCM, CMA or XMA
2.19.2. Modifying a Card Type
2.19.3. Deleting a Card
2.19.4. Deleting Port Parameters
2.19.5. Soft IOM Reset
2.19.5.1. Soft Reset
2.19.5.2. Deferred MDA Reset
2.20. Configuration Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Card Commands
2.20.1.2. MCM Commands
2.20.1.3. MDA Commands
2.20.1.4. Power Commands
2.20.1.5. Virtual Scheduler Commands
2.20.1.6. Forwarding Plane (FP) Commands
2.20.1.7. Port Configuration Commands
2.20.1.8. Port XC Commands
2.20.1.9. Forwarding Path Extension (FPE) Commands
2.20.1.10. Port APS Commands
2.20.1.11. Ethernet Commands
2.20.1.11.1. Ethernet Access and Network Commands
2.20.1.12. Interface Group Handler Commands
2.20.1.13. Multilink Bundle Commands
2.20.1.14. SONET-SDH Commands
2.20.1.15. TDM Commands
2.20.1.16. DS3 Commands
2.20.1.17. E1 Commands
2.20.1.18. E3 Commands
2.20.1.19. LAG Commands
2.20.1.20. MACsec Commands
2.20.1.21. Ethernet Tunnel Commands
2.20.1.22. Multi-Chassis Redundancy Commands
2.20.2. Configuration Command Descriptions
2.20.2.1. Generic Commands
2.20.2.2. Card Commands
2.20.2.3. MCM Commands
2.20.2.4. MDA (XMA) Commands
2.20.2.5. MDA/Port QoS Commands
2.20.2.6. Power Commands
2.20.2.7. Virtual Scheduler Commands
2.20.2.8. Forwarding Plane Configuration Commands
2.20.2.9. MACsec Commands
2.20.2.10. General Port Commands
2.20.2.11. Port XC Commands
2.20.2.12. Forwarding Path Extension (FPE) Commands
2.20.2.13. APS Commands
2.20.2.14. Ethernet Port Commands
2.20.2.15. 802.1x Port Commands
2.20.2.16. LLDP Port Commands
2.20.2.17. Network Port Commands
2.20.2.18. Interface Group Handler Commands
2.20.2.19. Multilink-Bundle Port Commands
2.20.2.20. SONET/SDH Port Commands
2.20.2.21. SONET/SDH Path Commands
2.20.2.22. ATM Interface Commands
2.20.2.23. Frame Relay Commands
2.20.2.24. TDM Commands
2.20.2.25. LAG Commands
2.20.2.26. Eth Tunnel Commands
2.20.2.27. ETH-CFM Configuration Commands
2.20.2.28. Multi-Chassis Redundancy Commands
2.20.2.28.1. MC Endpoint Commands
2.20.2.28.2. MC LAG Commands
2.20.2.28.3. Multi-Chassis Ring Commands
2.20.2.29. Forwarding Plane Tools Commands
2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
2.21.1. Command Hierarchies
2.21.1.1. Show Commands
2.21.1.2. Monitor Commands
2.21.1.3. Clear Commands
2.21.1.4. Debug Commands
2.21.1.5. Tools Commands
2.21.2. Command Descriptions
2.21.2.1. Hardware Show Commands
2.21.2.2. PEQ Show Commands
2.21.2.3. APS Show Commands
2.21.2.4. Port Show Commands
2.21.2.5. Multilink Bundle Show Commands
2.21.2.6. LAG Show Commands
2.21.2.7. Licensing Show Command
2.21.2.8. MACsec Show Commands
2.21.2.9. Monitor Commands
2.21.2.10. Clear Commands
2.21.2.11. Tools Commands
2.21.2.11.1. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
Layer 2 Services and EVPN Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Layer 2 Services and EVPN Configuration Process
2. VLL Services
2.1. ATM VLL (Apipe) Services
2.1.1. Apipe For End-to-End ATM Service
2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
2.1.3. Traffic Management Support
2.1.3.1. Ingress Network Classification
2.1.3.2. Ingress Queuing and Shaping on the IOM
2.1.3.3. Egress Queuing and Shaping on the IOM
2.1.3.4. Egress Shaping/Scheduling
2.2. Circuit Emulation (Cpipe) Services
2.2.1. Mobile Infrastructure
2.2.2. Circuit Emulation Modes
2.2.3. Circuit Emulation Parameters
2.2.3.1. Circuit Emulation Modes
2.2.3.2. Absolute Mode Option
2.2.3.3. Payload Size
2.2.3.4. Jitter Buffer
2.2.3.5. CES Circuit Operation
2.2.4. Services for Transporting CES Circuits
2.2.5. Network Synchronization Considerations
2.2.6. Cpipe Payload
2.3. Ethernet Pipe (Epipe) Services
2.3.1. Epipe Service Overview
2.3.2. Epipe Service Pseudowire VLAN Tag Processing
2.3.3. Epipe Up Operational State Configuration Option
2.3.4. Epipe with PBB
2.3.5. Epipe over L2TPv3
2.3.6. Ethernet Interworking VLL
2.3.7. VLL CAC
2.3.8. MC-Ring and VLL
2.4. Frame Relay VLL (Fpipe) Services
2.4.1. Frame Relay VLL
2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
2.4.3. Traffic Management Support
2.4.3.1. Frame Relay Traffic Management
2.4.3.2. Ingress SAP Classification and Marking
2.4.3.3. Egress Network EXP Marking
2.4.3.4. Ingress Network Classification
2.5. IP Interworking VLL (Ipipe) Services
2.5.1. Ipipe VLL
2.5.2. IP Interworking VLL Datapath
2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
2.5.3.1. VLL Ethernet SAP Processes
2.5.3.1.1. VLL FR SAP Procedures
2.5.3.1.2. VLL ATM SAP Procedures
2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
2.5.4. IPv6 Support on IP Interworking VLL
2.5.4.1. IPv6 Datapath Operation
2.5.4.2. IPv6 Stack Capability Signaling
2.6. Services Configuration for MPLS-TP
2.6.1. MPLS-TP SDPs
2.6.2. VLL Spoke SDP Configuration
2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
2.6.3.2. Lock PW Endpoint Model
2.6.3.3. PW Redundancy and Lock Instruct and Loopback
2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
2.6.3.5. Configuring an Administrative Lock
2.6.3.6. Configuring a Loopback
2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
2.7.1. VCCV BFD Support
2.7.2. VCCV BFD Encapsulation on a Pseudowire
2.7.3. BFD Session Operation
2.7.4. Configuring VCCV BFD
2.8. Pseudowire Switching
2.8.1. Pseudowire Switching with Protection
2.8.2. Pseudowire Switching Behavior
2.8.2.1. Pseudowire Switching TLV
2.8.2.2. Pseudowire Switching Point Sub-TLVs
2.8.3. Static-to-Dynamic Pseudowire Switching
2.8.4. Ingress VLAN Swapping
2.8.4.1. Ingress VLAN Translation
2.8.5. Pseudowire Redundancy
2.8.6. Dynamic Multi-Segment Pseudowire Routing
2.8.6.1. Overview
2.8.6.2. Pseudowire Routing
2.8.6.2.1. Static Routing
2.8.6.2.2. Explicit Paths
2.8.6.3. Configuring VLLs using Dynamic MS-PWs
2.8.6.3.1. Active/Passive T-PE Selection
2.8.6.3.2. Automatic Endpoint Configuration
2.8.6.3.3. Selecting a Path for an MS-PW
2.8.6.3.4. Pseudowire Templates
2.8.6.4. Pseudowire Redundancy
2.8.6.5. VCCV OAM for Dynamic MS-PWs
2.8.6.6. VCCV-Ping on Dynamic MS-PWs
2.8.6.7. VCCV-Trace on Dynamic MS-PWs
2.8.7. Example Dynamic MS-PW Configuration
2.8.8. VLL Resilience with Two Destination PE Nodes
2.8.8.1. Master-Slave Operation
2.8.8.1.1. Interaction with SAP-Specific OAM
2.8.8.1.2. Local Rules at Slave VLL PE
2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
2.8.9. Pseudowire SAPs
2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
2.8.10.1. Operational Overview
2.8.10.2. Detailed Operation
2.8.10.2.1. Sample Operation of G.8031 BGP-MH
2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
2.8.12. VLL Resilience for a Switched Pseudowire Path
2.9. Pseudowire Redundancy Service Models
2.9.1. Redundant VLL Service Model
2.9.2. T-LDP Status Notification Handling Rules
2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
2.9.2.2. Processing and Merging
2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
2.10.1. Primary Spoke SDP Fallback to Secondary SAP
2.10.2. Reversion to Primary Spoke SDP Path
2.10.3. MC-APS and MC-LAG
2.10.3.1. Failure Scenario
2.11. VLL Using G.8031 Protected Ethernet Tunnels
2.12. MPLS Entropy Label and Hash Label
2.13. BGP Virtual Private Wire Service (VPWS)
2.13.1. Single-Homed BGP VPWS
2.13.2. Dual-Homed BGP VPWS
2.13.2.1. Single Pseudowire Example
2.13.2.2. Active/Standby Pseudowire Example
2.13.3. BGP VPWS Pseudowire Switching
2.13.3.1. Pseudowire Signaling
2.13.3.2. BGP-VPWS with Inter-AS Model C
2.13.3.3. BGP VPWS Configuration Procedure
2.13.3.4. Use of Pseudowire Template for BGP VPWS
2.13.3.5. Use of Endpoint for BGP VPWS
2.14. VLL Service Considerations
2.14.1. SDPs
2.14.1.1. SDP Statistics for VPLS and VLL Services
2.14.2. SAP Encapsulations and Pseudowire Types
2.14.2.1. PWE3 N-to-1 Cell Mode
2.14.2.2. PWE3 AAL5 SDU Mode
2.14.2.3. QoS Policies
2.14.2.4. Filter Policies
2.14.2.5. MAC Resources
2.15. Configuring a VLL Service with CLI
2.15.1. Common Configuration Tasks
2.15.2. Configuring VLL Components
2.15.2.1. Creating an Apipe Service
2.15.2.1.1. Configuring Basic Apipe SAP Parameters
2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
2.15.2.1.3. Configuring Apipe SDP Bindings
2.15.2.2. Creating a Cpipe Service
2.15.2.2.1. Basic Configuration
2.15.2.2.2. Configuration Requirements
2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
2.15.2.3. Creating an Epipe Service
2.15.2.3.1. Configuring Epipe SAP Parameters
2.15.2.3.2. Distributed Epipe SAPs
2.15.2.3.3. Configuring SDP Bindings
2.15.2.4. Creating an Fpipe Service
2.15.2.4.1. Configuring Fpipe SAP Parameters
2.15.2.4.2. Configuring Fpipe SDP Bindings
2.15.2.5. Creating an Ipipe Service
2.15.2.5.1. Configuring Ipipe SAP Parameters
2.15.2.5.2. Configuring Ipipe SDP Bindings
2.15.3. Using Spoke-SDP Control Words
2.15.4. Same-Fate Epipe VLANs Access Protection
2.15.5. Pseudowire Configuration Notes
2.15.6. Configuring Two VLL Paths Terminating on T-PE2
2.15.7. Configuring VLL Resilience
2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
2.15.9.1. Single-Homed BGP VPWS
2.15.9.2. Dual-Homed BGP VPWS
2.16. Service Management Tasks
2.16.1. Modifying Apipe Service Parameters
2.16.2. Disabling an Apipe Service
2.16.3. Re-enabling an Apipe Service
2.16.4. Deleting an Apipe Service
2.16.5. Modifying a Cpipe Service
2.16.6. Deleting a Cpipe Service
2.16.7. Modifying Epipe Service Parameters
2.16.8. Disabling an Epipe Service
2.16.9. Re-enabling an Epipe Service
2.16.10. Deleting an Epipe Service
2.16.11. Modifying Fpipe Service Parameters
2.16.12. Disabling an Fpipe Service
2.16.13. Re-enabling an Fpipe Service
2.16.14. Deleting an Fpipe Service
2.16.15. Modifying Ipipe Service Parameters
2.16.16. Disabling an Ipipe Service
2.16.17. Re-enabling an Ipipe Service
2.16.18. Deleting an Ipipe Service
2.17. VLL Service Configuration Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Apipe Service Configuration Commands
2.17.1.1.1. Apipe Global Commands
2.17.1.1.2. Apipe SAP Commands
2.17.1.1.3. Apipe Spoke-SDP Commands
2.17.1.2. Related Apipe Commands
2.17.1.2.1. Connection Profile Commands
2.17.1.3. Cpipe Service Configuration Commands
2.17.1.3.1. Cpipe Global Commands
2.17.1.3.2. Cpipe SAP Commands
2.17.1.3.3. Cpipe Spoke-SDP Commands
2.17.1.4. Epipe Service Configuration Commands
2.17.1.4.1. Epipe Global Commands
2.17.1.4.2. Epipe SAP Configuration Commands
2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
2.17.1.4.4. Epipe SAP Template Commands
2.17.1.5. Fpipe Service Configuration Commands
2.17.1.5.1. Fpipe Global Commands
2.17.1.5.2. Fpipe SAP Commands
2.17.1.5.3. Fpipe Spoke-SDP Commands
2.17.1.6. Ipipe Service Configuration Commands
2.17.1.6.1. Ipipe Global Commands
2.17.1.6.2. Ipipe SAP Commands
2.17.1.6.3. Ipipe Spoke-SDP Commands
2.17.2. Command Descriptions
2.17.2.1. Generic Commands
2.17.2.2. VLL Global Service Commands
2.17.2.3. Service Configuration Commands
2.17.2.4. Service SAP Commands
2.17.2.5. Service Spoke-SDP Commands
2.17.2.6. Related Apipe Commands
2.17.2.6.1. Connection Profile Commands
2.17.2.7. Epipe Global Commands
2.17.2.8. Epipe SAP Template Commands
2.17.2.9. Ipipe Global Commands
2.17.2.10. Circuit Emulation Commands
2.17.2.11. ETH-CFM Service Commands
2.17.2.12. Service Filter and QoS Policy Commands
2.17.2.13. VLL Frame Relay Commands
2.17.2.14. ATM Commands
2.18. VLL Show Command Reference
2.18.1. Command Hierarchies
2.18.1.1. Show Commands
2.18.1.2. Clear Commands
2.18.1.3. Debug Commands
2.18.1.4. Tools Commands
2.18.2. Command Descriptions
2.18.2.1. VLL Show Commands
2.18.2.2. VLL Clear Commands
2.18.2.3. VLL Debug Commands
2.18.2.4. VLL Tools Commands
3. Virtual Private LAN Service
3.1. VPLS Service Overview
3.1.1. VPLS Packet Walkthrough
3.2. VPLS Features
3.2.1. VPLS Enhancements
3.2.2. VPLS over MPLS
3.2.3. VPLS Service Pseudowire VLAN Tag Processing
3.2.4. VPLS MAC Learning and Packet Forwarding
3.2.4.1. MAC Learning Protection
3.2.4.2. DEI in IEEE 802.1ad
3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
3.2.6. Pseudowire Control Word
3.2.7. Table Management
3.2.7.1. Selective MAC Address Learning
3.2.7.1.1. Example Operational Information
3.2.7.2. System FDB Size
3.2.7.3. Per-VPLS Service FDB Size
3.2.7.4. System FDB Size Alarms
3.2.7.5. Line Card FDB Size Alarms
3.2.7.6. Per VPLS FDB Size Alarms
3.2.7.7. Local and Remote Aging Timers
3.2.7.8. Disable MAC Aging
3.2.7.9. Disable MAC Learning
3.2.7.10. Unknown MAC Discard
3.2.7.11. VPLS and Rate Limiting
3.2.7.12. MAC Move
3.2.7.13. Auto-Learn MAC Protect
3.2.7.13.1. Operation
3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
3.2.9. VPLS and Spanning Tree Protocol
3.2.9.1. Spanning Tree Operating Modes
3.2.9.2. Multiple Spanning Tree
3.2.9.2.1. Redundancy Access to VPLS
3.2.9.3. MSTP for QinQ SAPs
3.2.9.4. Provider MSTP
3.2.9.4.1. MSTP General Principles
3.2.9.4.2. MSTP in the SR-series Platform
3.2.9.5. Enhancements to the Spanning Tree Protocol
3.2.9.5.1. L2PT Termination
3.2.9.5.2. BPDU Translation
3.2.9.5.3. L2PT and BPDU Translation
3.2.10. VPLS Redundancy
3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
3.2.10.2. Spoke SDP Based Redundant Access
3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
3.2.10.3.1. Fast Detection of Peer Failure using BFD
3.2.10.3.2. MC-EP Passive Mode
3.2.10.4. Support for Single Chassis Endpoint Mechanisms
3.2.10.4.1. MAC Flush Support in MC-EP
3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
3.2.10.4.3. Support for Force Spoke SDP in MC-EP
3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
3.2.10.6. MAC Flush Additions for PBB VPLS
3.2.11. VPLS Access Redundancy
3.2.11.1. STP-based Redundant Access to VPLS
3.2.11.2. Redundant Access to VPLS Without STP
3.2.12. Object Grouping and State Monitoring
3.2.12.1. VPLS Applicability — Block on VPLS a Failure
3.2.13. MAC Flush Message Processing
3.2.13.1. Dual Homing to a VPLS Service
3.2.13.2. MC-Ring and VPLS
3.2.14. ACL Next-Hop for VPLS
3.2.15. SDP Statistics for VPLS and VLL Services
3.2.16. BGP Auto-Discovery for LDP VPLS
3.2.16.1. BGP AD Overview
3.2.16.2. Information Model
3.2.16.3. FEC Element for T-LDP Signaling
3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
3.2.16.5. SDP Usage
3.2.16.6. Automatic Creation of SDPs
3.2.16.7. Manually Provisioned SDP
3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
3.2.16.10. Resiliency Schemes
3.2.17. BGP VPLS
3.2.17.1. Pseudowire Signaling Details
3.2.17.2. Supported VPLS Features
3.2.18. VCCV BFD Support for VPLS Services
3.2.19. BGP Multi-Homing for VPLS
3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
3.2.19.2. Supported Services and Multi-Homing Objects
3.2.19.3. Blackhole Avoidance
3.2.19.3.1. MAC Flush to the Core PEs
3.2.19.3.2. Indicating non-DF status toward the access PE or CE
3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
3.2.20. Multicast-Aware VPLS
3.2.20.1. IGMP Snooping for VPLS
3.2.20.2. MLD Snooping for VPLS
3.2.20.3. PIM Snooping for VPLS
3.2.20.3.1. Plain PIM Snooping
3.2.20.3.2. PIM Proxy
3.2.20.4. IPv6 Multicast Forwarding
3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
3.2.20.5. PIM and IGMP/MLD Snooping Interaction
3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
3.2.20.6.1. IGMP Snooping Synchronization
3.2.20.6.2. MLD Snooping Synchronization
3.2.20.6.3. PIM Snooping for IPv4 Synchronization
3.2.20.7. VPLS Multicast-Aware High Availability Features
3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
3.2.22. MPLS Entropy Label and Hash Label
3.3. Routed VPLS and I-VPLS
3.3.1. IES or VPRN IP Interface Binding
3.3.1.1. Assigning a Service Name to a VPLS Service
3.3.1.2. Service Binding Requirements
3.3.1.3. Bound Service Name Assignment
3.3.1.4. Binding a Service Name to an IP Interface
3.3.1.5. Bound Service Deletion or Service Name Removal
3.3.1.6. IP Interface Attached VPLS Service Constraints
3.3.1.7. IP Interface and VPLS Operational State Coordination
3.3.2. IP Interface MTU and Fragmentation
3.3.2.1. Unicast IP Routing into a VPLS Service
3.3.3. ARP and VPLS FDB Interactions
3.3.3.1. R-VPLS Specific ARP Cache Behavior
3.3.4. The allow-ip-int-bind VPLS Flag
3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
3.3.4.2. LAG Port Membership Constraints
3.3.4.3. R-VPLS Feature Restrictions
3.3.4.4. Routed I-VPLS Feature Restrictions
3.3.5. IPv4 and IPv6 Multicast Routing Support
3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
3.3.7. R-VPLS Caveats
3.3.7.1. VPLS SAP Ingress IP Filter Override
3.3.7.2. IP Interface Defined Egress QoS Reclassification
3.3.7.3. Remarking for VPLS and Routed Packets
3.3.7.4. 7450 Mixed Mode Chassis
3.3.7.5. IPv4 Multicast Routing
3.3.7.6. R-VPLS Supported Routing-related Protocols
3.3.7.7. Spanning Tree and Split Horizon
3.4. VPLS Service Considerations
3.4.1. SAP Encapsulations
3.4.2. VLAN Processing
3.4.3. Ingress VLAN Swapping
3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
3.4.4.3. MVRP Activation of Service Connectivity
3.4.4.4. MVRP Control Plane
3.4.4.5. STP-MVRP Interaction
3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
3.4.5. VPLS E-Tree Services
3.4.5.1. VPLS E-Tree Services Overview
3.4.5.2. Leaf-ac and Root-ac SAPs
3.4.5.3. Leaf-ac and Root-ac SDP Binds
3.4.5.4. Root-leaf-tag SAPs
3.4.5.5. Root-leaf-tag SDP Binds
3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
3.5. Configuring a VPLS Service with CLI
3.5.1. Basic Configuration
3.5.2. Common Configuration Tasks
3.5.3. Configuring VPLS Components
3.5.3.1. Creating a VPLS Service
3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
3.5.3.2.1. Enabling MAC Move
3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
3.5.3.3. Configuring GSMP Parameters
3.5.3.4. Configuring a VPLS SAP
3.5.3.4.1. Local VPLS SAPs
3.5.3.4.2. Distributed VPLS SAPs
3.5.3.4.3. Configuring SAP-Specific STP Parameters
3.5.3.4.4. STP SAP Operational States
3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
3.5.3.4.6. Configuring MAC Learning Protection
3.5.3.5. Configuring SAP Subscriber Management Parameters
3.5.3.6. MSTP Control over Ethernet Tunnels
3.5.3.7. Configuring SDP Bindings
3.5.3.8. Configuring Overrides on Service SAPs
3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
3.5.3.8.2. Spoke-SDP STP Operational States
3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
3.5.4. Configuring VPLS Redundancy
3.5.4.1. Creating a Management VPLS for SAP Protection
3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
3.5.4.3. Configuring Load Balancing with Management VPLS
3.5.4.4. Configuring Selective MAC Flush
3.5.4.5. Configuring Multi-Chassis Endpoints
3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
3.5.6. Configuring BGP Auto-Discovery
3.5.6.1. Configuration Steps
3.5.6.2. LDP Signaling
3.5.6.3. Pseudowire Template
3.5.7. Configuring BGP VPLS
3.5.7.1. Configuring a VPLS Management Interface
3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
3.5.9. Configuring VPLS E-Tree Services
3.6. Service Management Tasks
3.6.1. Modifying VPLS Service Parameters
3.6.2. Modifying Management VPLS Parameters
3.6.3. Deleting a Management VPLS
3.6.4. Disabling a Management VPLS
3.6.5. Deleting a VPLS Service
3.6.6. Disabling a VPLS Service
3.6.7. Re-enabling a VPLS Service
3.7. VPLS Service Configuration Command Reference
3.7.1. Command Hierarchies
3.7.1.1. Global Commands
3.7.1.2. Oper Group Commands
3.7.1.3. SAP Commands
3.7.1.4. Template Commands
3.7.1.5. Mesh SDP Commands
3.7.1.6. Spoke SDP Commands
3.7.1.7. Provider Tunnel Commands
3.7.1.8. Routed VPLS Commands
3.7.1.9. Multi-Chassis Redundancy Commands
3.7.2. Command Descriptions
3.7.2.1. Generic Commands
3.7.2.2. VPLS Service Commands
3.7.2.3. VPLS Interface Commands
3.7.2.4. General Switch Management Protocol Commands
3.7.2.4.1. VPLS DHCP Commands
3.7.2.4.2. VPLS STP Commands
3.7.2.4.3. VPLS SAP Commands
3.7.2.5. ETH-CFM Service Commands
3.7.2.5.1. VPLS SAP ATM Commands
3.7.2.5.2. VPLS Filter and QoS Policy Commands
3.7.2.5.3. VPLS Template Commands
3.7.2.5.4. Provider Tunnel Commands
3.7.2.5.5. VPLS SDP Commands
3.7.2.5.6. SAP Subscriber Management Commands
3.7.2.6. VPLS Multicast Commands
3.7.2.6.1. VPLS DHCP and Anti-Spoofing Commands
3.7.2.7. BGP Auto-Discovery Commands
3.7.2.8. Redundancy Commands
3.8. VPLS Show, Clear, Debug, and Tools Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Show Commands
3.8.1.1.1. Show Multi-Chassis Endpoint Commands
3.8.1.2. Clear Commands
3.8.1.3. Debug Commands
3.8.1.4. Tools Commands
3.8.2. Command Descriptions
3.8.2.1. VPLS Show Commands
3.8.2.2. IGMP Snooping Show Commands
3.8.2.3. IGMP Commands
3.8.2.3.1. Show Multi-Chassis Endpoint Commands
3.8.2.4. VPLS Clear Commands
3.8.2.5. VPLS Debug Commands
4. IEEE 802.1ah Provider Backbone Bridging
4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
4.2. PBB Features
4.2.1. Integrated PBB-VPLS Solution
4.2.2. PBB Technology
4.2.3. PBB Mapping to Existing VPLS Configurations
4.2.4. SAP and SDP Support
4.2.4.1. PBB B-VPLS
4.2.4.2. PBB I-VPLS
4.2.5. PBB Packet Walkthrough
4.2.5.1. PBB Control Planes
4.2.6. Shortest Path Bridging MAC Mode (SPBM)
4.2.6.1. Flooding and Learning Versus Link State
4.2.6.2. SPB for B-VPLS
4.2.6.3. Control B-VPLS and User B-VPLS
4.2.6.4. Shortest Path and Single Tree
4.2.6.5. Data Path and Forwarding
4.2.6.6. SPB Ethernet OAM
4.2.6.7. SPB Levels
4.2.7. SPBM to Non-SPBM Interworking
4.2.7.1. Static MACs and Static ISIDs
4.2.7.2. Epipe Static Configuration
4.2.7.2.1. I-VPLS Static Config
4.2.7.3. SPBM ISID Policies
4.2.8. ISID Policy Control
4.2.8.1. Static ISID Advertisement
4.2.8.2. I-VPLS for Unicast Service
4.2.9. Default Behaviors
4.2.10. Example Network Configuration
4.2.10.1. Sample Configuration for Dut-A
4.2.10.1.1. Show Commands Outputs
4.2.10.1.2. Debug Commands
4.2.10.1.3. Tools Commands
4.2.10.1.4. Clear Commands
4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
4.2.12.1. I-VPLS Changes and Related MMRP Behavior
4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
4.2.12.3. Optimization for Improved Convergence Time
4.2.12.4. Controlling MRP Scope using MRP Policies
4.2.13. PBB and BGP-AD
4.2.14. PBB E-Line Service
4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
4.2.15.1. Solution Overview
4.2.15.2. Detailed Solution Description
4.2.15.3. Detailed PBB Emulated LAG Solution Description
4.2.15.4. Support Service and Solution Combinations
4.2.16. Periodic MAC Notification
4.2.17. MAC Flush
4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
4.2.17.1.2. PBB Blackholing Issue
4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
4.2.19. BGP Multi-homing for I-VPLS
4.2.20. Access Multi-Homing over MPLS for PBB Epipes
4.2.21. PBB and IGMP/MLD Snooping
4.2.22. PBB and PIM Snooping
4.2.23. PBB QoS
4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
4.2.23.1.1. Configuration Examples
4.2.23.1.2. Details Solution Description
4.2.24. Egress B-SAP per ISID Shaping
4.2.24.1. B-SAP Egress ISID Shaping Configuration
4.2.24.2. Provisioning Model
4.2.24.3. Egress Queue Scheduling
4.2.24.4. B-SAP per-ISID Shaping Configuration Example
4.2.25. PBB OAM
4.2.25.1. Mirroring
4.2.25.2. OAM Commands
4.2.25.3. CFM Support
4.3. Configuration Examples
4.3.1. PBB using G.8031 Protected Ethernet Tunnels
4.3.2. MC-LAG Multi-homing for Native PBB
4.3.3. Access Multi-Homing over MPLS for PBB Epipes
4.4. PBB Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Global Commands
4.4.1.2. SAP Commands
4.4.1.3. Mesh SDP Commands
4.4.1.4. Spoke SDP Commands
4.4.1.5. BGP-MH for I-VPLS Commands
4.4.2. Command Descriptions
4.4.2.1. VPLS Service Commands
4.5. PBB Show, Clear, and Debug Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Debug Commands
4.5.2. Command Descriptions
4.5.2.1. PBB Show Commands
4.5.2.2. PBB Clear Commands
4.5.2.3. PBB Debug Commands
5. Ethernet Virtual Private Networks (EVPNs)
5.1. Overview and EVPN Applications
5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
5.1.5. EVPN for MPLS Tunnels in E-LAN Services
5.1.6. EVPN for MPLS Tunnels in E-Line Services
5.1.7. EVPN for MPLS Tunnels in E-Tree Services
5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
5.2. EVPN for VXLAN Tunnels and Cloud Technologies
5.2.1. Introduction to VXLAN
5.2.1.1. VXLAN ECMP and LAG
5.2.1.2. VXLAN VPLS Tag Handling
5.2.1.3. VXLAN MTU Considerations
5.2.1.4. VXLAN QoS
5.2.1.4.1. Ingress
5.2.1.4.2. Egress
5.2.1.5. VXLAN Ping
5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
5.2.1.7. IGMP and MLD Snooping on VXLAN
5.2.1.8. PIM Snooping on VXLAN
5.2.1.9. Static VXLAN Termination in Epipe Services
5.2.1.10. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
5.2.2. EVPN for Overlay Tunnels
5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
5.2.2.2. EVPN for VXLAN in VPLS Services
5.2.2.2.1. Resiliency and BGP Multi-Homing
5.2.2.2.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
5.2.2.2.3. Use of the unknown-mac-route
5.2.2.3. EVPN for VXLAN in R-VPLS Services
5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.2.4. EVPN-VPWS for VXLAN Tunnels
5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
5.2.3.1. XMPP Interface on the DC GW
5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
5.2.3.3.1. VSD-Domain Type L2-DOMAIN
5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
5.2.3.3.3. VSD-Domain Type VRF-GRE
5.2.3.3.4. VSD-Domain Type VRF-VXLAN
5.2.3.4. Fully-Dynamic VSD Integration Model
5.2.3.4.1. Python Script Implementation Details
5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
5.2.4.1. Replicator (AR-R) Procedures
5.2.4.2. Leaf (AR-L) procedures
5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
5.3. EVPN for MPLS Tunnels
5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
5.3.2.1. EVPN and VPLS Integration
5.3.2.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
5.3.2.3. EVPN Multi-Homing in VPLS Services
5.3.2.3.1. EVPN All-Active Multi-Homing
5.3.2.3.2. EVPN Single-Active Multi-Homing
5.3.3. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
5.3.4. EVPN-VPWS for MPLS Tunnels
5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
5.3.6. PBB-EVPN
5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
5.3.6.1.3. EVPN Route Type 4 - Ethernet Segment Route
5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
5.3.6.2.1. Flood Containment for I-VPLS Services
5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
5.3.6.2.5. PBB-EVPN ISID-Based CMAC-Flush
5.3.6.2.6. PBB-EVPN ISID-based Route Targets
5.3.7. Virtual Ethernet Segments
5.3.8. Preference-Based and Non-Revertive DF Election
5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
5.3.12. EVPN E-Tree
5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
5.3.12.3. EVPN E-Tree Operation
5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
5.3.12.4. EVPN E-Tree and EVPN Multi-homing
5.3.12.5. PBB-EVPN E-Tree Services
5.3.13. MPLS Entropy Label and Hash Label
5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
5.4. General EVPN Topics
5.4.1. ARP/ND Snooping and Proxy Support
5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
5.4.1.3. Procedure to Add the R Flag to a Specified Entry
5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
5.4.2. BGP-EVPN MAC-Mobility
5.4.3. BGP-EVPN MAC-Duplication
5.4.4. Conditional Static MAC and Protection
5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
5.4.7. Blackhole MAC for EVPN Loop Detection
5.4.8. CFM Interaction with EVPN Services
5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
5.4.9.4.1. BGP-EVPN Routes on Dual BGP-instance Services with I-ES
5.4.9.4.2. Single-Active Multi-Homing on I-ES
5.4.9.4.3. All-Active Multi-Homing on I-ES
5.4.10. Configuring multi-instance EVPN-VXLAN in the Same VPLS Service
5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
5.4.11. EVPN IP-Prefix Route Interoperability
5.4.11.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
5.4.11.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
5.4.11.3. Interface-less IP-VRF-to-IP-VRF Model
5.4.12. ARP-ND Host Routes for Extended Layer-2 Data Centers
5.4.13. BGP and EVPN Route Selection for EVPN Routes
5.4.14. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.4.15. Interaction of EVPN and Other Features
5.4.15.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
5.4.15.2. Interaction of PBB-EVPN with Existing VPLS Features
5.4.15.3. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
5.4.15.4. Routing Policies for BGP EVPN IP Prefixes
5.5. Configuring an EVPN Service with CLI
5.5.1. EVPN-VXLAN Configuration Examples
5.5.1.1. Layer 2 PE Example
5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
5.5.2. EVPN-MPLS Configuration Examples
5.5.2.1. EVPN All-active Multi-homing Example
5.5.2.2. EVPN Single-active Multi-homing Example
5.5.3. PBB-EVPN Configuration Examples
5.5.3.1. PBB-EVPN All-active Multi-homing Example
5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
5.6. EVPN Command Reference
5.6.1. Command Hierarchies
5.6.1.1. EVPN Configuration Commands
5.6.1.2. Show Commands
5.6.1.3. Clear Commands
5.6.1.4. Debug Commands
5.6.1.5. Tools Commands
5.6.2. Command Descriptions
5.6.2.1. EVPN Configuration Commands
5.6.2.2. Show Configuration Commands
5.6.2.3. Clear Commands
5.6.2.4. Debug Commands
5.6.2.5. Tools Commands
6. Pseudowire Ports
6.1. Overview
6.2. PW Port Bound to a Physical Port
6.3. FPE-Based PW Port
6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
6.3.2. PXC-Based PW-Port — Building the Cross-Connect
6.3.2.1. Building the Internal Transport Tunnel
6.3.2.2. Mapping the External PW to the PW-Port
6.3.2.3. Terminating the Service on PW-SAP
6.3.3. FPE-Based PW-port Operational State
6.3.4. QoS
6.3.4.1. Preservation of Forwarding Class Across PXC
6.3.5. Statistics on the FPE based PW-Port
6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
6.4. L2oGRE Termination on FPE-Based PW Port
6.4.1. L2oGRE Packet Format
6.4.2. GRE Delivery Protocol
6.4.3. Tracking Payloads and Service Termination Points
6.4.3.1. Plain L3 termination
6.4.3.2. Layer 2 Termination
6.4.3.3. ESM Termination
6.4.4. Configuration Steps
6.4.5. Fragmentation and MTU Configuration
6.4.6. Reassembly
6.5. Pseudowire Ports Command Reference
6.5.1. Command Hierarchies
6.5.1.1. PW-port Configuration Commands
6.5.1.2. Redundant Interface Commands
6.5.1.3. Show Commands
6.5.2. Command Descriptions
6.5.2.1. PW-port Configuration Commands
6.5.2.2. SDP Binding Commands
6.5.2.3. Show Commands
7. VSR Pseudowire Ports
7.1. Flex SW Ports
7.1.1. PW Port List
7.1.2. Failover Times
7.1.3. QoS
7.1.4. PW Port Termination for Various Tunnel Types
7.1.4.1. MPLS-Based Spoke SDP
7.1.4.1.1. Flex PW-Port Operational State for MPLS Based Spoke SDP
7.1.4.1.2. Statistics
7.1.4.1.3. Provisioning
7.2. VSR Pseudowire Ports Command Reference
7.2.1. Command Hierarchies
7.2.1.1. PW Port Configuration Commands
7.2.1.2. Show Commands
7.2.1.3. Clear Commands
7.2.2. Command Descriptions
7.2.2.1. PW Port Configuration Commands
7.2.2.2. Show Commands
7.2.2.3. Clear Commands
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Layer 2 Services and EVPN Configuration Process
2. VLL Services
2.1. ATM VLL (Apipe) Services
2.1.1. Apipe For End-to-End ATM Service
2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
2.1.3. Traffic Management Support
2.1.3.1. Ingress Network Classification
2.1.3.2. Ingress Queuing and Shaping on the IOM
2.1.3.3. Egress Queuing and Shaping on the IOM
2.1.3.4. Egress Shaping/Scheduling
2.2. Circuit Emulation (Cpipe) Services
2.2.1. Mobile Infrastructure
2.2.2. Circuit Emulation Modes
2.2.3. Circuit Emulation Parameters
2.2.3.1. Circuit Emulation Modes
2.2.3.2. Absolute Mode Option
2.2.3.3. Payload Size
2.2.3.4. Jitter Buffer
2.2.3.5. CES Circuit Operation
2.2.4. Services for Transporting CES Circuits
2.2.5. Network Synchronization Considerations
2.2.6. Cpipe Payload
2.3. Ethernet Pipe (Epipe) Services
2.3.1. Epipe Service Overview
2.3.2. Epipe Service Pseudowire VLAN Tag Processing
2.3.3. Epipe Up Operational State Configuration Option
2.3.4. Epipe with PBB
2.3.5. Epipe over L2TPv3
2.3.6. Ethernet Interworking VLL
2.3.7. VLL CAC
2.3.8. MC-Ring and VLL
2.4. Frame Relay VLL (Fpipe) Services
2.4.1. Frame Relay VLL
2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
2.4.3. Traffic Management Support
2.4.3.1. Frame Relay Traffic Management
2.4.3.2. Ingress SAP Classification and Marking
2.4.3.3. Egress Network EXP Marking
2.4.3.4. Ingress Network Classification
2.5. IP Interworking VLL (Ipipe) Services
2.5.1. Ipipe VLL
2.5.2. IP Interworking VLL Datapath
2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
2.5.3.1. VLL Ethernet SAP Processes
2.5.3.1.1. VLL FR SAP Procedures
2.5.3.1.2. VLL ATM SAP Procedures
2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
2.5.4. IPv6 Support on IP Interworking VLL
2.5.4.1. IPv6 Datapath Operation
2.5.4.2. IPv6 Stack Capability Signaling
2.6. Services Configuration for MPLS-TP
2.6.1. MPLS-TP SDPs
2.6.2. VLL Spoke SDP Configuration
2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
2.6.3.2. Lock PW Endpoint Model
2.6.3.3. PW Redundancy and Lock Instruct and Loopback
2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
2.6.3.5. Configuring an Administrative Lock
2.6.3.6. Configuring a Loopback
2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
2.7.1. VCCV BFD Support
2.7.2. VCCV BFD Encapsulation on a Pseudowire
2.7.3. BFD Session Operation
2.7.4. Configuring VCCV BFD
2.8. Pseudowire Switching
2.8.1. Pseudowire Switching with Protection
2.8.2. Pseudowire Switching Behavior
2.8.2.1. Pseudowire Switching TLV
2.8.2.2. Pseudowire Switching Point Sub-TLVs
2.8.3. Static-to-Dynamic Pseudowire Switching
2.8.4. Ingress VLAN Swapping
2.8.4.1. Ingress VLAN Translation
2.8.5. Pseudowire Redundancy
2.8.6. Dynamic Multi-Segment Pseudowire Routing
2.8.6.1. Overview
2.8.6.2. Pseudowire Routing
2.8.6.2.1. Static Routing
2.8.6.2.2. Explicit Paths
2.8.6.3. Configuring VLLs using Dynamic MS-PWs
2.8.6.3.1. Active/Passive T-PE Selection
2.8.6.3.2. Automatic Endpoint Configuration
2.8.6.3.3. Selecting a Path for an MS-PW
2.8.6.3.4. Pseudowire Templates
2.8.6.4. Pseudowire Redundancy
2.8.6.5. VCCV OAM for Dynamic MS-PWs
2.8.6.6. VCCV-Ping on Dynamic MS-PWs
2.8.6.7. VCCV-Trace on Dynamic MS-PWs
2.8.7. Example Dynamic MS-PW Configuration
2.8.8. VLL Resilience with Two Destination PE Nodes
2.8.8.1. Master-Slave Operation
2.8.8.1.1. Interaction with SAP-Specific OAM
2.8.8.1.2. Local Rules at Slave VLL PE
2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
2.8.9. Pseudowire SAPs
2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
2.8.10.1. Operational Overview
2.8.10.2. Detailed Operation
2.8.10.2.1. Sample Operation of G.8031 BGP-MH
2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
2.8.12. VLL Resilience for a Switched Pseudowire Path
2.9. Pseudowire Redundancy Service Models
2.9.1. Redundant VLL Service Model
2.9.2. T-LDP Status Notification Handling Rules
2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
2.9.2.2. Processing and Merging
2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
2.10.1. Primary Spoke SDP Fallback to Secondary SAP
2.10.2. Reversion to Primary Spoke SDP Path
2.10.3. MC-APS and MC-LAG
2.10.3.1. Failure Scenario
2.11. VLL Using G.8031 Protected Ethernet Tunnels
2.12. MPLS Entropy Label and Hash Label
2.13. BGP Virtual Private Wire Service (VPWS)
2.13.1. Single-Homed BGP VPWS
2.13.2. Dual-Homed BGP VPWS
2.13.2.1. Single Pseudowire Example
2.13.2.2. Active/Standby Pseudowire Example
2.13.3. BGP VPWS Pseudowire Switching
2.13.3.1. Pseudowire Signaling
2.13.3.2. BGP-VPWS with Inter-AS Model C
2.13.3.3. BGP VPWS Configuration Procedure
2.13.3.4. Use of Pseudowire Template for BGP VPWS
2.13.3.5. Use of Endpoint for BGP VPWS
2.14. VLL Service Considerations
2.14.1. SDPs
2.14.1.1. SDP Statistics for VPLS and VLL Services
2.14.2. SAP Encapsulations and Pseudowire Types
2.14.2.1. PWE3 N-to-1 Cell Mode
2.14.2.2. PWE3 AAL5 SDU Mode
2.14.2.3. QoS Policies
2.14.2.4. Filter Policies
2.14.2.5. MAC Resources
2.15. Configuring a VLL Service with CLI
2.15.1. Common Configuration Tasks
2.15.2. Configuring VLL Components
2.15.2.1. Creating an Apipe Service
2.15.2.1.1. Configuring Basic Apipe SAP Parameters
2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
2.15.2.1.3. Configuring Apipe SDP Bindings
2.15.2.2. Creating a Cpipe Service
2.15.2.2.1. Basic Configuration
2.15.2.2.2. Configuration Requirements
2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
2.15.2.3. Creating an Epipe Service
2.15.2.3.1. Configuring Epipe SAP Parameters
2.15.2.3.2. Distributed Epipe SAPs
2.15.2.3.3. Configuring SDP Bindings
2.15.2.4. Creating an Fpipe Service
2.15.2.4.1. Configuring Fpipe SAP Parameters
2.15.2.4.2. Configuring Fpipe SDP Bindings
2.15.2.5. Creating an Ipipe Service
2.15.2.5.1. Configuring Ipipe SAP Parameters
2.15.2.5.2. Configuring Ipipe SDP Bindings
2.15.3. Using Spoke-SDP Control Words
2.15.4. Same-Fate Epipe VLANs Access Protection
2.15.5. Pseudowire Configuration Notes
2.15.6. Configuring Two VLL Paths Terminating on T-PE2
2.15.7. Configuring VLL Resilience
2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
2.15.9.1. Single-Homed BGP VPWS
2.15.9.2. Dual-Homed BGP VPWS
2.16. Service Management Tasks
2.16.1. Modifying Apipe Service Parameters
2.16.2. Disabling an Apipe Service
2.16.3. Re-enabling an Apipe Service
2.16.4. Deleting an Apipe Service
2.16.5. Modifying a Cpipe Service
2.16.6. Deleting a Cpipe Service
2.16.7. Modifying Epipe Service Parameters
2.16.8. Disabling an Epipe Service
2.16.9. Re-enabling an Epipe Service
2.16.10. Deleting an Epipe Service
2.16.11. Modifying Fpipe Service Parameters
2.16.12. Disabling an Fpipe Service
2.16.13. Re-enabling an Fpipe Service
2.16.14. Deleting an Fpipe Service
2.16.15. Modifying Ipipe Service Parameters
2.16.16. Disabling an Ipipe Service
2.16.17. Re-enabling an Ipipe Service
2.16.18. Deleting an Ipipe Service
2.17. VLL Service Configuration Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Apipe Service Configuration Commands
2.17.1.1.1. Apipe Global Commands
2.17.1.1.2. Apipe SAP Commands
2.17.1.1.3. Apipe Spoke-SDP Commands
2.17.1.2. Related Apipe Commands
2.17.1.2.1. Connection Profile Commands
2.17.1.3. Cpipe Service Configuration Commands
2.17.1.3.1. Cpipe Global Commands
2.17.1.3.2. Cpipe SAP Commands
2.17.1.3.3. Cpipe Spoke-SDP Commands
2.17.1.4. Epipe Service Configuration Commands
2.17.1.4.1. Epipe Global Commands
2.17.1.4.2. Epipe SAP Configuration Commands
2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
2.17.1.4.4. Epipe SAP Template Commands
2.17.1.5. Fpipe Service Configuration Commands
2.17.1.5.1. Fpipe Global Commands
2.17.1.5.2. Fpipe SAP Commands
2.17.1.5.3. Fpipe Spoke-SDP Commands
2.17.1.6. Ipipe Service Configuration Commands
2.17.1.6.1. Ipipe Global Commands
2.17.1.6.2. Ipipe SAP Commands
2.17.1.6.3. Ipipe Spoke-SDP Commands
2.17.2. Command Descriptions
2.17.2.1. Generic Commands
2.17.2.2. VLL Global Service Commands
2.17.2.3. Service Configuration Commands
2.17.2.4. Service SAP Commands
2.17.2.5. Service Spoke-SDP Commands
2.17.2.6. Related Apipe Commands
2.17.2.6.1. Connection Profile Commands
2.17.2.7. Epipe Global Commands
2.17.2.8. Epipe SAP Template Commands
2.17.2.9. Ipipe Global Commands
2.17.2.10. Circuit Emulation Commands
2.17.2.11. ETH-CFM Service Commands
2.17.2.12. Service Filter and QoS Policy Commands
2.17.2.13. VLL Frame Relay Commands
2.17.2.14. ATM Commands
2.18. VLL Show Command Reference
2.18.1. Command Hierarchies
2.18.1.1. Show Commands
2.18.1.2. Clear Commands
2.18.1.3. Debug Commands
2.18.1.4. Tools Commands
2.18.2. Command Descriptions
2.18.2.1. VLL Show Commands
2.18.2.2. VLL Clear Commands
2.18.2.3. VLL Debug Commands
2.18.2.4. VLL Tools Commands
3. Virtual Private LAN Service
3.1. VPLS Service Overview
3.1.1. VPLS Packet Walkthrough
3.2. VPLS Features
3.2.1. VPLS Enhancements
3.2.2. VPLS over MPLS
3.2.3. VPLS Service Pseudowire VLAN Tag Processing
3.2.4. VPLS MAC Learning and Packet Forwarding
3.2.4.1. MAC Learning Protection
3.2.4.2. DEI in IEEE 802.1ad
3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
3.2.6. Pseudowire Control Word
3.2.7. Table Management
3.2.7.1. Selective MAC Address Learning
3.2.7.1.1. Example Operational Information
3.2.7.2. System FDB Size
3.2.7.3. Per-VPLS Service FDB Size
3.2.7.4. System FDB Size Alarms
3.2.7.5. Line Card FDB Size Alarms
3.2.7.6. Per VPLS FDB Size Alarms
3.2.7.7. Local and Remote Aging Timers
3.2.7.8. Disable MAC Aging
3.2.7.9. Disable MAC Learning
3.2.7.10. Unknown MAC Discard
3.2.7.11. VPLS and Rate Limiting
3.2.7.12. MAC Move
3.2.7.13. Auto-Learn MAC Protect
3.2.7.13.1. Operation
3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
3.2.9. VPLS and Spanning Tree Protocol
3.2.9.1. Spanning Tree Operating Modes
3.2.9.2. Multiple Spanning Tree
3.2.9.2.1. Redundancy Access to VPLS
3.2.9.3. MSTP for QinQ SAPs
3.2.9.4. Provider MSTP
3.2.9.4.1. MSTP General Principles
3.2.9.4.2. MSTP in the SR-series Platform
3.2.9.5. Enhancements to the Spanning Tree Protocol
3.2.9.5.1. L2PT Termination
3.2.9.5.2. BPDU Translation
3.2.9.5.3. L2PT and BPDU Translation
3.2.10. VPLS Redundancy
3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
3.2.10.2. Spoke SDP Based Redundant Access
3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
3.2.10.3.1. Fast Detection of Peer Failure using BFD
3.2.10.3.2. MC-EP Passive Mode
3.2.10.4. Support for Single Chassis Endpoint Mechanisms
3.2.10.4.1. MAC Flush Support in MC-EP
3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
3.2.10.4.3. Support for Force Spoke SDP in MC-EP
3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
3.2.10.6. MAC Flush Additions for PBB VPLS
3.2.11. VPLS Access Redundancy
3.2.11.1. STP-based Redundant Access to VPLS
3.2.11.2. Redundant Access to VPLS Without STP
3.2.12. Object Grouping and State Monitoring
3.2.12.1. VPLS Applicability — Block on VPLS a Failure
3.2.13. MAC Flush Message Processing
3.2.13.1. Dual Homing to a VPLS Service
3.2.13.2. MC-Ring and VPLS
3.2.14. ACL Next-Hop for VPLS
3.2.15. SDP Statistics for VPLS and VLL Services
3.2.16. BGP Auto-Discovery for LDP VPLS
3.2.16.1. BGP AD Overview
3.2.16.2. Information Model
3.2.16.3. FEC Element for T-LDP Signaling
3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
3.2.16.5. SDP Usage
3.2.16.6. Automatic Creation of SDPs
3.2.16.7. Manually Provisioned SDP
3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
3.2.16.10. Resiliency Schemes
3.2.17. BGP VPLS
3.2.17.1. Pseudowire Signaling Details
3.2.17.2. Supported VPLS Features
3.2.18. VCCV BFD Support for VPLS Services
3.2.19. BGP Multi-Homing for VPLS
3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
3.2.19.2. Supported Services and Multi-Homing Objects
3.2.19.3. Blackhole Avoidance
3.2.19.3.1. MAC Flush to the Core PEs
3.2.19.3.2. Indicating non-DF status toward the access PE or CE
3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
3.2.20. Multicast-Aware VPLS
3.2.20.1. IGMP Snooping for VPLS
3.2.20.2. MLD Snooping for VPLS
3.2.20.3. PIM Snooping for VPLS
3.2.20.3.1. Plain PIM Snooping
3.2.20.3.2. PIM Proxy
3.2.20.4. IPv6 Multicast Forwarding
3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
3.2.20.5. PIM and IGMP/MLD Snooping Interaction
3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
3.2.20.6.1. IGMP Snooping Synchronization
3.2.20.6.2. MLD Snooping Synchronization
3.2.20.6.3. PIM Snooping for IPv4 Synchronization
3.2.20.7. VPLS Multicast-Aware High Availability Features
3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
3.2.22. MPLS Entropy Label and Hash Label
3.3. Routed VPLS and I-VPLS
3.3.1. IES or VPRN IP Interface Binding
3.3.1.1. Assigning a Service Name to a VPLS Service
3.3.1.2. Service Binding Requirements
3.3.1.3. Bound Service Name Assignment
3.3.1.4. Binding a Service Name to an IP Interface
3.3.1.5. Bound Service Deletion or Service Name Removal
3.3.1.6. IP Interface Attached VPLS Service Constraints
3.3.1.7. IP Interface and VPLS Operational State Coordination
3.3.2. IP Interface MTU and Fragmentation
3.3.2.1. Unicast IP Routing into a VPLS Service
3.3.3. ARP and VPLS FDB Interactions
3.3.3.1. R-VPLS Specific ARP Cache Behavior
3.3.4. The allow-ip-int-bind VPLS Flag
3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
3.3.4.2. LAG Port Membership Constraints
3.3.4.3. R-VPLS Feature Restrictions
3.3.4.4. Routed I-VPLS Feature Restrictions
3.3.5. IPv4 and IPv6 Multicast Routing Support
3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
3.3.7. R-VPLS Caveats
3.3.7.1. VPLS SAP Ingress IP Filter Override
3.3.7.2. IP Interface Defined Egress QoS Reclassification
3.3.7.3. Remarking for VPLS and Routed Packets
3.3.7.4. 7450 Mixed Mode Chassis
3.3.7.5. IPv4 Multicast Routing
3.3.7.6. R-VPLS Supported Routing-related Protocols
3.3.7.7. Spanning Tree and Split Horizon
3.4. VPLS Service Considerations
3.4.1. SAP Encapsulations
3.4.2. VLAN Processing
3.4.3. Ingress VLAN Swapping
3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
3.4.4.3. MVRP Activation of Service Connectivity
3.4.4.4. MVRP Control Plane
3.4.4.5. STP-MVRP Interaction
3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
3.4.5. VPLS E-Tree Services
3.4.5.1. VPLS E-Tree Services Overview
3.4.5.2. Leaf-ac and Root-ac SAPs
3.4.5.3. Leaf-ac and Root-ac SDP Binds
3.4.5.4. Root-leaf-tag SAPs
3.4.5.5. Root-leaf-tag SDP Binds
3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
3.5. Configuring a VPLS Service with CLI
3.5.1. Basic Configuration
3.5.2. Common Configuration Tasks
3.5.3. Configuring VPLS Components
3.5.3.1. Creating a VPLS Service
3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
3.5.3.2.1. Enabling MAC Move
3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
3.5.3.3. Configuring GSMP Parameters
3.5.3.4. Configuring a VPLS SAP
3.5.3.4.1. Local VPLS SAPs
3.5.3.4.2. Distributed VPLS SAPs
3.5.3.4.3. Configuring SAP-Specific STP Parameters
3.5.3.4.4. STP SAP Operational States
3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
3.5.3.4.6. Configuring MAC Learning Protection
3.5.3.5. Configuring SAP Subscriber Management Parameters
3.5.3.6. MSTP Control over Ethernet Tunnels
3.5.3.7. Configuring SDP Bindings
3.5.3.8. Configuring Overrides on Service SAPs
3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
3.5.3.8.2. Spoke-SDP STP Operational States
3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
3.5.4. Configuring VPLS Redundancy
3.5.4.1. Creating a Management VPLS for SAP Protection
3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
3.5.4.3. Configuring Load Balancing with Management VPLS
3.5.4.4. Configuring Selective MAC Flush
3.5.4.5. Configuring Multi-Chassis Endpoints
3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
3.5.6. Configuring BGP Auto-Discovery
3.5.6.1. Configuration Steps
3.5.6.2. LDP Signaling
3.5.6.3. Pseudowire Template
3.5.7. Configuring BGP VPLS
3.5.7.1. Configuring a VPLS Management Interface
3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
3.5.9. Configuring VPLS E-Tree Services
3.6. Service Management Tasks
3.6.1. Modifying VPLS Service Parameters
3.6.2. Modifying Management VPLS Parameters
3.6.3. Deleting a Management VPLS
3.6.4. Disabling a Management VPLS
3.6.5. Deleting a VPLS Service
3.6.6. Disabling a VPLS Service
3.6.7. Re-enabling a VPLS Service
3.7. VPLS Service Configuration Command Reference
3.7.1. Command Hierarchies
3.7.1.1. Global Commands
3.7.1.2. Oper Group Commands
3.7.1.3. SAP Commands
3.7.1.4. Template Commands
3.7.1.5. Mesh SDP Commands
3.7.1.6. Spoke SDP Commands
3.7.1.7. Provider Tunnel Commands
3.7.1.8. Routed VPLS Commands
3.7.1.9. Multi-Chassis Redundancy Commands
3.7.2. Command Descriptions
3.7.2.1. Generic Commands
3.7.2.2. VPLS Service Commands
3.7.2.3. VPLS Interface Commands
3.7.2.4. General Switch Management Protocol Commands
3.7.2.4.1. VPLS DHCP Commands
3.7.2.4.2. VPLS STP Commands
3.7.2.4.3. VPLS SAP Commands
3.7.2.5. ETH-CFM Service Commands
3.7.2.5.1. VPLS SAP ATM Commands
3.7.2.5.2. VPLS Filter and QoS Policy Commands
3.7.2.5.3. VPLS Template Commands
3.7.2.5.4. Provider Tunnel Commands
3.7.2.5.5. VPLS SDP Commands
3.7.2.5.6. SAP Subscriber Management Commands
3.7.2.6. VPLS Multicast Commands
3.7.2.6.1. VPLS DHCP and Anti-Spoofing Commands
3.7.2.7. BGP Auto-Discovery Commands
3.7.2.8. Redundancy Commands
3.8. VPLS Show, Clear, Debug, and Tools Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Show Commands
3.8.1.1.1. Show Multi-Chassis Endpoint Commands
3.8.1.2. Clear Commands
3.8.1.3. Debug Commands
3.8.1.4. Tools Commands
3.8.2. Command Descriptions
3.8.2.1. VPLS Show Commands
3.8.2.2. IGMP Snooping Show Commands
3.8.2.3. IGMP Commands
3.8.2.3.1. Show Multi-Chassis Endpoint Commands
3.8.2.4. VPLS Clear Commands
3.8.2.5. VPLS Debug Commands
4. IEEE 802.1ah Provider Backbone Bridging
4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
4.2. PBB Features
4.2.1. Integrated PBB-VPLS Solution
4.2.2. PBB Technology
4.2.3. PBB Mapping to Existing VPLS Configurations
4.2.4. SAP and SDP Support
4.2.4.1. PBB B-VPLS
4.2.4.2. PBB I-VPLS
4.2.5. PBB Packet Walkthrough
4.2.5.1. PBB Control Planes
4.2.6. Shortest Path Bridging MAC Mode (SPBM)
4.2.6.1. Flooding and Learning Versus Link State
4.2.6.2. SPB for B-VPLS
4.2.6.3. Control B-VPLS and User B-VPLS
4.2.6.4. Shortest Path and Single Tree
4.2.6.5. Data Path and Forwarding
4.2.6.6. SPB Ethernet OAM
4.2.6.7. SPB Levels
4.2.7. SPBM to Non-SPBM Interworking
4.2.7.1. Static MACs and Static ISIDs
4.2.7.2. Epipe Static Configuration
4.2.7.2.1. I-VPLS Static Config
4.2.7.3. SPBM ISID Policies
4.2.8. ISID Policy Control
4.2.8.1. Static ISID Advertisement
4.2.8.2. I-VPLS for Unicast Service
4.2.9. Default Behaviors
4.2.10. Example Network Configuration
4.2.10.1. Sample Configuration for Dut-A
4.2.10.1.1. Show Commands Outputs
4.2.10.1.2. Debug Commands
4.2.10.1.3. Tools Commands
4.2.10.1.4. Clear Commands
4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
4.2.12.1. I-VPLS Changes and Related MMRP Behavior
4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
4.2.12.3. Optimization for Improved Convergence Time
4.2.12.4. Controlling MRP Scope using MRP Policies
4.2.13. PBB and BGP-AD
4.2.14. PBB E-Line Service
4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
4.2.15.1. Solution Overview
4.2.15.2. Detailed Solution Description
4.2.15.3. Detailed PBB Emulated LAG Solution Description
4.2.15.4. Support Service and Solution Combinations
4.2.16. Periodic MAC Notification
4.2.17. MAC Flush
4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
4.2.17.1.2. PBB Blackholing Issue
4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
4.2.19. BGP Multi-homing for I-VPLS
4.2.20. Access Multi-Homing over MPLS for PBB Epipes
4.2.21. PBB and IGMP/MLD Snooping
4.2.22. PBB and PIM Snooping
4.2.23. PBB QoS
4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
4.2.23.1.1. Configuration Examples
4.2.23.1.2. Details Solution Description
4.2.24. Egress B-SAP per ISID Shaping
4.2.24.1. B-SAP Egress ISID Shaping Configuration
4.2.24.2. Provisioning Model
4.2.24.3. Egress Queue Scheduling
4.2.24.4. B-SAP per-ISID Shaping Configuration Example
4.2.25. PBB OAM
4.2.25.1. Mirroring
4.2.25.2. OAM Commands
4.2.25.3. CFM Support
4.3. Configuration Examples
4.3.1. PBB using G.8031 Protected Ethernet Tunnels
4.3.2. MC-LAG Multi-homing for Native PBB
4.3.3. Access Multi-Homing over MPLS for PBB Epipes
4.4. PBB Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Global Commands
4.4.1.2. SAP Commands
4.4.1.3. Mesh SDP Commands
4.4.1.4. Spoke SDP Commands
4.4.1.5. BGP-MH for I-VPLS Commands
4.4.2. Command Descriptions
4.4.2.1. VPLS Service Commands
4.5. PBB Show, Clear, and Debug Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Debug Commands
4.5.2. Command Descriptions
4.5.2.1. PBB Show Commands
4.5.2.2. PBB Clear Commands
4.5.2.3. PBB Debug Commands
5. Ethernet Virtual Private Networks (EVPNs)
5.1. Overview and EVPN Applications
5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
5.1.5. EVPN for MPLS Tunnels in E-LAN Services
5.1.6. EVPN for MPLS Tunnels in E-Line Services
5.1.7. EVPN for MPLS Tunnels in E-Tree Services
5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
5.2. EVPN for VXLAN Tunnels and Cloud Technologies
5.2.1. Introduction to VXLAN
5.2.1.1. VXLAN ECMP and LAG
5.2.1.2. VXLAN VPLS Tag Handling
5.2.1.3. VXLAN MTU Considerations
5.2.1.4. VXLAN QoS
5.2.1.4.1. Ingress
5.2.1.4.2. Egress
5.2.1.5. VXLAN Ping
5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
5.2.1.7. IGMP and MLD Snooping on VXLAN
5.2.1.8. PIM Snooping on VXLAN
5.2.1.9. Static VXLAN Termination in Epipe Services
5.2.1.10. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
5.2.2. EVPN for Overlay Tunnels
5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
5.2.2.2. EVPN for VXLAN in VPLS Services
5.2.2.2.1. Resiliency and BGP Multi-Homing
5.2.2.2.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
5.2.2.2.3. Use of the unknown-mac-route
5.2.2.3. EVPN for VXLAN in R-VPLS Services
5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.2.4. EVPN-VPWS for VXLAN Tunnels
5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
5.2.3.1. XMPP Interface on the DC GW
5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
5.2.3.3.1. VSD-Domain Type L2-DOMAIN
5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
5.2.3.3.3. VSD-Domain Type VRF-GRE
5.2.3.3.4. VSD-Domain Type VRF-VXLAN
5.2.3.4. Fully-Dynamic VSD Integration Model
5.2.3.4.1. Python Script Implementation Details
5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
5.2.4.1. Replicator (AR-R) Procedures
5.2.4.2. Leaf (AR-L) procedures
5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
5.3. EVPN for MPLS Tunnels
5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
5.3.2.1. EVPN and VPLS Integration
5.3.2.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
5.3.2.3. EVPN Multi-Homing in VPLS Services
5.3.2.3.1. EVPN All-Active Multi-Homing
5.3.2.3.2. EVPN Single-Active Multi-Homing
5.3.3. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
5.3.4. EVPN-VPWS for MPLS Tunnels
5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
5.3.6. PBB-EVPN
5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
5.3.6.1.3. EVPN Route Type 4 - Ethernet Segment Route
5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
5.3.6.2.1. Flood Containment for I-VPLS Services
5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
5.3.6.2.5. PBB-EVPN ISID-Based CMAC-Flush
5.3.6.2.6. PBB-EVPN ISID-based Route Targets
5.3.7. Virtual Ethernet Segments
5.3.8. Preference-Based and Non-Revertive DF Election
5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
5.3.12. EVPN E-Tree
5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
5.3.12.3. EVPN E-Tree Operation
5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
5.3.12.4. EVPN E-Tree and EVPN Multi-homing
5.3.12.5. PBB-EVPN E-Tree Services
5.3.13. MPLS Entropy Label and Hash Label
5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
5.4. General EVPN Topics
5.4.1. ARP/ND Snooping and Proxy Support
5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
5.4.1.3. Procedure to Add the R Flag to a Specified Entry
5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
5.4.2. BGP-EVPN MAC-Mobility
5.4.3. BGP-EVPN MAC-Duplication
5.4.4. Conditional Static MAC and Protection
5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
5.4.7. Blackhole MAC for EVPN Loop Detection
5.4.8. CFM Interaction with EVPN Services
5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
5.4.9.4.1. BGP-EVPN Routes on Dual BGP-instance Services with I-ES
5.4.9.4.2. Single-Active Multi-Homing on I-ES
5.4.9.4.3. All-Active Multi-Homing on I-ES
5.4.10. Configuring multi-instance EVPN-VXLAN in the Same VPLS Service
5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
5.4.11. EVPN IP-Prefix Route Interoperability
5.4.11.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
5.4.11.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
5.4.11.3. Interface-less IP-VRF-to-IP-VRF Model
5.4.12. ARP-ND Host Routes for Extended Layer-2 Data Centers
5.4.13. BGP and EVPN Route Selection for EVPN Routes
5.4.14. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.4.15. Interaction of EVPN and Other Features
5.4.15.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
5.4.15.2. Interaction of PBB-EVPN with Existing VPLS Features
5.4.15.3. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
5.4.15.4. Routing Policies for BGP EVPN IP Prefixes
5.5. Configuring an EVPN Service with CLI
5.5.1. EVPN-VXLAN Configuration Examples
5.5.1.1. Layer 2 PE Example
5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
5.5.2. EVPN-MPLS Configuration Examples
5.5.2.1. EVPN All-active Multi-homing Example
5.5.2.2. EVPN Single-active Multi-homing Example
5.5.3. PBB-EVPN Configuration Examples
5.5.3.1. PBB-EVPN All-active Multi-homing Example
5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
5.6. EVPN Command Reference
5.6.1. Command Hierarchies
5.6.1.1. EVPN Configuration Commands
5.6.1.2. Show Commands
5.6.1.3. Clear Commands
5.6.1.4. Debug Commands
5.6.1.5. Tools Commands
5.6.2. Command Descriptions
5.6.2.1. EVPN Configuration Commands
5.6.2.2. Show Configuration Commands
5.6.2.3. Clear Commands
5.6.2.4. Debug Commands
5.6.2.5. Tools Commands
6. Pseudowire Ports
6.1. Overview
6.2. PW Port Bound to a Physical Port
6.3. FPE-Based PW Port
6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
6.3.2. PXC-Based PW-Port — Building the Cross-Connect
6.3.2.1. Building the Internal Transport Tunnel
6.3.2.2. Mapping the External PW to the PW-Port
6.3.2.3. Terminating the Service on PW-SAP
6.3.3. FPE-Based PW-port Operational State
6.3.4. QoS
6.3.4.1. Preservation of Forwarding Class Across PXC
6.3.5. Statistics on the FPE based PW-Port
6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
6.4. L2oGRE Termination on FPE-Based PW Port
6.4.1. L2oGRE Packet Format
6.4.2. GRE Delivery Protocol
6.4.3. Tracking Payloads and Service Termination Points
6.4.3.1. Plain L3 termination
6.4.3.2. Layer 2 Termination
6.4.3.3. ESM Termination
6.4.4. Configuration Steps
6.4.5. Fragmentation and MTU Configuration
6.4.6. Reassembly
6.5. Pseudowire Ports Command Reference
6.5.1. Command Hierarchies
6.5.1.1. PW-port Configuration Commands
6.5.1.2. Redundant Interface Commands
6.5.1.3. Show Commands
6.5.2. Command Descriptions
6.5.2.1. PW-port Configuration Commands
6.5.2.2. SDP Binding Commands
6.5.2.3. Show Commands
7. VSR Pseudowire Ports
7.1. Flex SW Ports
7.1.1. PW Port List
7.1.2. Failover Times
7.1.3. QoS
7.1.4. PW Port Termination for Various Tunnel Types
7.1.4.1. MPLS-Based Spoke SDP
7.1.4.1.1. Flex PW-Port Operational State for MPLS Based Spoke SDP
7.1.4.1.2. Statistics
7.1.4.1.3. Provisioning
7.2. VSR Pseudowire Ports Command Reference
7.2.1. Command Hierarchies
7.2.1.1. PW Port Configuration Commands
7.2.1.2. Show Commands
7.2.1.3. Clear Commands
7.2.2. Command Descriptions
7.2.2.1. PW Port Configuration Commands
7.2.2.2. Show Commands
7.2.2.3. Clear Commands
8. Standards and Protocol Support
Customer Document and Product Support
Layer 3 Services Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Layer 3 Services Configuration Process
2. Internet Enhanced Service
2.1. IES Service Overview
2.2. IES Features
2.2.1. IP Interfaces
2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
2.2.1.1.1. QPPB Applications
2.2.1.1.2. Inter-AS Coordination of QoS Policies
2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
2.2.1.2. QPPB
2.2.1.2.1. Associating an FC and Priority with a Route
2.2.1.2.2. Displaying QoS Information Associated with Routes
2.2.1.2.3. Enabling QPPB on an IP Interface
2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.2.1.2.5. QPPB and Multiple Paths to a Destination
2.2.1.2.6. QPPB and Policy-Based Routing
2.2.1.3. QPPB and GRT Lookup
2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
2.2.1.4. Object Grouping and State Monitoring
2.2.1.4.1. IES IP Interface Applicability
2.2.2. Subscriber Interfaces
2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
2.2.2.2. RADIUS Accounting
2.2.3. SAPs
2.2.3.1. Encapsulations
2.2.3.2. ATM SAP Encapsulations for IES
2.2.3.3. Pseudowire SAPs
2.2.3.4. Encapsulation
2.2.3.5. Pseudowire SAP Configuration
2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
2.2.3.7. Shaping and Bandwidth Control
2.2.3.8. Lag Considerations
2.2.3.9. Last Mile Packet Size Adjustment
2.2.3.10. Redundancy with Pseudowire SAPs
2.2.3.11. Operational Group Support for PW Ports
2.2.4. Routing Protocols
2.2.4.1. CPE Connectivity Check
2.2.5. QoS Policies
2.2.6. Filter Policies
2.2.7. MPLS Entropy Label and Hash Label
2.2.8. Spoke SDPs
2.2.9. SRRP
2.2.9.1. SRRP Messaging
2.2.9.2. SRRP and Multi-Chassis Synchronization
2.2.9.3. SRRP Instance
2.2.9.3.1. SRRP Instance MCS Key
2.2.9.3.2. Containing Service Type and ID
2.2.9.3.3. Containing Subscriber IP Interface Name
2.2.9.3.4. Subscriber Subnet Information
2.2.9.3.5. Containing Group IP Interface Information
2.2.9.3.6. Remote Redundant IP Interface Mismatch
2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
2.2.9.3.10. Local and Remote Dual Master Detected
2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
2.2.9.7. BFD with SRRP/VRRP
2.3. Configuring an IES Service with CLI
2.3.1. Basic Configuration
2.3.2. Common Configuration Tasks
2.3.3. Configuring IES Components
2.3.3.1. Configuring an IES Service
2.3.3.2. Configuring IES Subscriber Interface Parameters
2.3.3.3. Configuring IES Interface Parameters
2.3.3.4. Configuring Spoke-SDP Parameters
2.3.3.5. Configuring SAP Parameters
2.3.3.6. Configuring IES SAP ATM Parameters
2.3.3.7. Configuring VRRP
2.3.3.8. Configuring IPSec Parameters
2.3.3.9. IGMP Host Tracking
2.4. Service Management Tasks
2.4.1. Modifying IES Service Parameters
2.4.2. Deleting a Spoke-SDP
2.4.3. Deleting an IES Service
2.4.4. Disabling an IES Service
2.4.5. Re-Enabling an IES Service
2.5. IES Services Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Global Commands
2.5.1.2. IES Service Interface Commands
2.5.1.3. Routed VPLS Commands
2.5.1.4. Redundant Interface Commands
2.5.1.5. Interface SAP Commands
2.5.1.6. Interface SAP Tunnel Commands
2.5.1.7. VRRP Commands
2.5.1.8. Spoke SDP Commands
2.5.1.9. Subscriber Interface Commands
2.5.1.9.1. Group Interface SAP Commands
2.5.1.10. AARP Interface Commands
2.5.2. Command Descriptions
2.5.2.1. Generic Commands
2.5.2.2. IES Global Commands
2.5.2.3. IES Interface Commands
2.5.2.4. Redundant Interface Commands
2.5.2.5. IES Subscriber Interface Commands
2.5.2.6. IES Interface DHCP Commands
2.5.2.7. PPPoE Commands
2.5.2.8. IES Interface ICMP Commands
2.5.2.9. IES Interface IPv6 Commands
2.5.2.10. IES Spoke SDP Commands
2.5.2.11. IES SAP Commands
2.5.2.12. SAP Subscriber Management Commands
2.5.2.13. ETH-CFM Service Commands
2.5.2.14. IES Filter and QoS Policy Commands
2.5.2.15. ATM Commands
2.5.2.16. IES Interface VRRP Commands
2.5.2.17. IPSec Gateway Commands
2.5.2.18. AARP Interface Commands
2.6. IES Show, Clear, and Debug Command Reference
2.6.1. Command Hierarchies
2.6.1.1. Show Commands
2.6.1.2. Clear Commands
2.6.1.3. Debug Commands
2.6.1.4. Monitor Commands
2.6.2. Command Descriptions
2.6.2.1. IES Show Commands
2.6.2.2. IES Clear Commands
2.6.2.3. IES Debug Commands
2.6.2.4. IES Monitor Commands
3. Virtual Private Routed Network Service
3.1. VPRN Service Overview
3.1.1. Routing Prerequisites
3.1.2. Core MP-BGP Support
3.1.3. Route Distinguishers
3.1.3.1. eiBGP Load Balancing
3.1.4. Route Reflector
3.1.5. CE to PE Route Exchange
3.1.5.1. Route Redistribution
3.1.5.2. CPE Connectivity Check
3.1.6. Constrained Route Distribution (RT Constraint)
3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
3.1.6.2. Configuring the Route Target Address Family
3.1.6.3. Originating RT Constraint Routes
3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
3.1.6.5. Using RT Constraint Routes
3.1.7. BGP Fast Reroute in a VPRN
3.1.7.1. BGP Fast Reroute in a VPRN Configuration
3.1.8. BGP Best-External in a VPRN Context
3.2. VPRN Features
3.2.1. IP Interfaces
3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
3.2.1.2. QPPB Applications
3.2.1.3. Inter-AS Coordination of QoS Policies
3.2.1.4. Traffic Differentiation Based on Route Characteristics
3.2.1.5. QPPB
3.2.1.6. Associating an FC and Priority with a Route
3.2.1.7. Displaying QoS Information Associated with Routes
3.2.1.8. Enabling QPPB on an IP interface
3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
3.2.1.10. QPPB and Multiple Paths to a Destination
3.2.1.11. QPPB and Policy-Based Routing
3.2.1.12. QPPB and GRT Lookup
3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
3.2.1.14. Object Grouping and State Monitoring
3.2.1.15. VPRN IP Interface Applicability
3.2.2. Subscriber Interfaces
3.2.3. SAPs
3.2.3.1. Encapsulations
3.2.3.2. ATM SAP Encapsulations for VPRN Services
3.2.3.3. Pseudowire SAPs
3.2.4. QoS Policies
3.2.5. Filter Policies
3.2.6. DSCP Marking
3.2.6.1. Default DSCP Mapping Table
3.2.7. Configuration of TTL Propagation for VPRN Routes
3.2.8. CE to PE Routing Protocols
3.2.8.1. PE to PE Tunneling Mechanisms
3.2.8.2. Per VRF Route Limiting
3.2.9. Spoke SDPs
3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
3.2.9.2. Spoke SDP Redundancy into IES/VPRN
3.2.10. IP-VPNs
3.2.10.1. Using OSPF in IP-VPNs
3.2.11. IPCP Subnet Negotiation
3.2.12. Cflowd for IP-VPNs
3.2.13. Inter-AS VPRNs
3.2.14. Carrier Supporting Carrier (CsC)
3.2.14.1. Terminology
3.2.14.2. CSC Connectivity Models
3.2.14.3. CSC-PE Configuration and Operation
3.2.14.4. CSC Interface
3.2.14.5. QoS
3.2.14.6. MPLS
3.2.14.7. CSC VPRN Service Configuration
3.2.15. Traffic Leaking to GRT
3.2.16. Traffic Leaking from VPRN to GRT for IPv6
3.2.17. RIP Metric Propagation in VPRNs
3.2.18. NTP Within a VPRN Service
3.2.19. PTP Within a VPRN Service
3.2.20. VPN Route Label Allocation
3.2.20.1. Configuring the Service Label Mode
3.2.20.2. Restrictions and Usage Notes
3.2.21. VPRN Support for BGP Flowspec
3.2.22. MPLS Entropy Label and Hash Label
3.2.23. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
3.3. QoS on Ingress Bindings
3.4. Multicast in IP-VPN Applications
3.4.1. Use of Data MDTs
3.4.2. Multicast Protocols Supported in the Provider Network
3.4.3. MVPN Membership Auto-discovery using BGP
3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
3.4.5. VRF Route Import Extended Community
3.4.6. Provider Tunnel Support
3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
3.4.6.3. P2MP LDP I-PMSI and S-PMSI
3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
3.4.6.5. P2MP LSP S-PMSI
3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
3.4.6.7. MVPN Sender-only/Receiver-only
3.4.6.8. S-PMSI Trigger Thresholds
3.4.6.9. Migration from Existing Rosen Implementation
3.4.6.10. Policy-based S-PMSI
3.4.6.10.1. Supported MPLS Tunnels
3.4.6.10.2. Supported Multicast Features
3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
3.4.6.10.4. Configuration Example
3.4.6.11. Policy-based Data MDT
3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
3.4.8. Multicast VPN Extranet
3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.4.11. IPv6 MVPN Support
3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
3.4.13. NG-MVPN Core Diversity
3.4.13.1. NG-MVPN to Loopback Interface
3.4.13.2. NG-MVPN Core Diversity
3.4.13.3. Configuration Example
3.4.14. NG-MVPN Multicast Source Geo-Redundancy
3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
3.4.16. Inter-AS MVPN
3.4.16.1. BGP Connector Attribute
3.4.16.2. PIM RPF Vector
3.4.16.3. Inter-AS MVPN Option B
3.4.16.4. Inter-AS MVPN Option C
3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
3.4.16.5.2. Configuration Example
3.4.16.5.3. Inter-AS Non-segmented MLDP
3.4.16.5.4. ECMP
3.4.17. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
3.5. FIB Prioritization
3.6. Configuring a VPRN Service with CLI
3.6.1. Basic Configuration
3.6.2. Common Configuration Tasks
3.6.3. Configuring VPRN Components
3.6.3.1. Creating a VPRN Service
3.6.3.2. Configuring Global VPRN Parameters
3.6.3.3. Configuring VPRN Log Parameters
3.6.3.3.1. Configuring a Spoke-SDP
3.6.3.4. Configuring VPRN Protocols - PIM
3.6.3.4.1. Configuring Router Interfaces
3.6.3.4.2. Configuring VPRN Protocols - BGP
3.6.3.4.3. Configuring VPRN Protocols - RIP
3.6.3.4.4. Configuring VPRN Protocols - OSPF
3.6.3.4.5. Configuring a VPRN Interface
3.6.3.4.6. Configuring Overload State on a Single SFM
3.6.3.4.7. Configuring a VPRN Interface SAP
3.6.4. Configuring IPSec Parameters
3.7. Service Management Tasks
3.7.1. Modifying VPRN Service Parameters
3.7.2. Deleting a VPRN Service
3.7.3. Disabling a VPRN Service
3.7.4. Re-enabling a VPRN Service
3.8. VPRN Service Configuration Commands
3.8.1. Command Hierarchies
3.8.1.1. VPRN Service Configuration Commands
3.8.1.2. L2TP Commands
3.8.1.3. DHCP Commands
3.8.1.4. GSMP Commands
3.8.1.5. IGMP Commands
3.8.1.6. IPSec Configuration Commands
3.8.1.7. Log Commands
3.8.1.8. Multicast VPN Commands
3.8.1.9. Redundant Interface Commands
3.8.1.10. Router Advertisement Commands
3.8.1.11. NTP Commands
3.8.1.12. NAT Commands
3.8.1.13. Subscriber Interface Commands
3.8.1.13.1. Group Interface SAP ETH-CFM Commands
3.8.1.14. Interface Commands
3.8.1.15. Network Interface Commands
3.8.1.16. Interface Spoke SDP Commands
3.8.1.17. Interface VRRP Commands
3.8.1.18. Interface SAP Commands
3.8.1.19. Interface SAP Tunnel Commands
3.8.1.20. Routed VPLS Commands
3.8.1.21. Oper Group Commands
3.8.1.22. Network Ingress Commands
3.8.1.23. BGP Configuration Commands
3.8.1.24. BGP Group Configuration Commands
3.8.1.25. BGP Group Neighbor Configuration Commands
3.8.1.26. IS-IS Configuration Commands
3.8.1.27. OSPF Configuration Commands
3.8.1.28. PIM Configuration Commands
3.8.1.29. MSDP Configuration Commands
3.8.1.30. MLD Configuration Commands
3.8.1.31. RIP Configuration Commands
3.8.1.32. RADIUS Commands
3.8.1.33. Web Portal Protocol Configuration Commands
3.8.1.34. AARP Interface Commands
3.8.2. Command Descriptions
3.8.2.1. Generic Commands
3.8.2.2. Global Commands
3.8.2.3. Router L2TP Commands
3.8.2.3.1. Router L2TP Tunnel Commands
3.8.2.4. Router DHCP Configuration Commands
3.8.2.5. IGMP Commands
3.8.2.6. IPSec Configuration Commands
3.8.2.7. Log Commands
3.8.2.8. Multicast VPN Commands
3.8.2.9. Redundant Interface Commands
3.8.2.10. Router Advertisement Commands
3.8.2.11. Network Time Protocol Commands
3.8.2.12. NAT Commands
3.8.2.13. Subscriber Interface Commands
3.8.2.14. Interface Commands
3.8.2.15. Network Interface Commands
3.8.2.16. Interface DHCP Commands
3.8.2.17. Interface ICMP Commands
3.8.2.18. Interface SAP ATM Commands
3.8.2.19. Interface Anti-Spoofing Commands
3.8.2.20. Interface SAP Filter and QoS Policy Commands
3.8.2.21. Interface VRRP Commands
3.8.2.22. Interface SAP Commands
3.8.2.23. Routed VPLS Commands
3.8.2.24. Network Ingress Commands
3.8.2.25. SAP Subscriber Management Commands
3.8.2.26. BGP Commands
3.8.2.27. ETH-CFM Service Commands
3.8.2.28. IS-IS Commands
3.8.2.29. OSPF Commands
3.8.2.30. PIM Commands
3.8.2.31. PPPoE Commands
3.8.2.32. MSDP Configuration Commands
3.8.2.33. MLD Configuration Commands
3.8.2.34. RIP Commands
3.8.2.35. SDP Commands
3.8.2.36. RADIUS Proxy Commands
3.8.2.37. AARP Interface Commands
3.9. VPRN Show, Clear, and Debug Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Show Commands
3.9.1.2. Clear Commands
3.9.1.3. Debug Commands
3.9.2. Command Descriptions
3.9.2.1. VPRN Show Commands
3.9.2.2. VPRN Clear Commands
3.9.2.3. VPRN Debug Commands
3.10. Tools Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Tools Commands
3.10.2. Command Descriptions
3.10.2.1. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Layer 3 Services Configuration Process
2. Internet Enhanced Service
2.1. IES Service Overview
2.2. IES Features
2.2.1. IP Interfaces
2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
2.2.1.1.1. QPPB Applications
2.2.1.1.2. Inter-AS Coordination of QoS Policies
2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
2.2.1.2. QPPB
2.2.1.2.1. Associating an FC and Priority with a Route
2.2.1.2.2. Displaying QoS Information Associated with Routes
2.2.1.2.3. Enabling QPPB on an IP Interface
2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.2.1.2.5. QPPB and Multiple Paths to a Destination
2.2.1.2.6. QPPB and Policy-Based Routing
2.2.1.3. QPPB and GRT Lookup
2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
2.2.1.4. Object Grouping and State Monitoring
2.2.1.4.1. IES IP Interface Applicability
2.2.2. Subscriber Interfaces
2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
2.2.2.2. RADIUS Accounting
2.2.3. SAPs
2.2.3.1. Encapsulations
2.2.3.2. ATM SAP Encapsulations for IES
2.2.3.3. Pseudowire SAPs
2.2.3.4. Encapsulation
2.2.3.5. Pseudowire SAP Configuration
2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
2.2.3.7. Shaping and Bandwidth Control
2.2.3.8. Lag Considerations
2.2.3.9. Last Mile Packet Size Adjustment
2.2.3.10. Redundancy with Pseudowire SAPs
2.2.3.11. Operational Group Support for PW Ports
2.2.4. Routing Protocols
2.2.4.1. CPE Connectivity Check
2.2.5. QoS Policies
2.2.6. Filter Policies
2.2.7. MPLS Entropy Label and Hash Label
2.2.8. Spoke SDPs
2.2.9. SRRP
2.2.9.1. SRRP Messaging
2.2.9.2. SRRP and Multi-Chassis Synchronization
2.2.9.3. SRRP Instance
2.2.9.3.1. SRRP Instance MCS Key
2.2.9.3.2. Containing Service Type and ID
2.2.9.3.3. Containing Subscriber IP Interface Name
2.2.9.3.4. Subscriber Subnet Information
2.2.9.3.5. Containing Group IP Interface Information
2.2.9.3.6. Remote Redundant IP Interface Mismatch
2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
2.2.9.3.10. Local and Remote Dual Master Detected
2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
2.2.9.7. BFD with SRRP/VRRP
2.3. Configuring an IES Service with CLI
2.3.1. Basic Configuration
2.3.2. Common Configuration Tasks
2.3.3. Configuring IES Components
2.3.3.1. Configuring an IES Service
2.3.3.2. Configuring IES Subscriber Interface Parameters
2.3.3.3. Configuring IES Interface Parameters
2.3.3.4. Configuring Spoke-SDP Parameters
2.3.3.5. Configuring SAP Parameters
2.3.3.6. Configuring IES SAP ATM Parameters
2.3.3.7. Configuring VRRP
2.3.3.8. Configuring IPSec Parameters
2.3.3.9. IGMP Host Tracking
2.4. Service Management Tasks
2.4.1. Modifying IES Service Parameters
2.4.2. Deleting a Spoke-SDP
2.4.3. Deleting an IES Service
2.4.4. Disabling an IES Service
2.4.5. Re-Enabling an IES Service
2.5. IES Services Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Global Commands
2.5.1.2. IES Service Interface Commands
2.5.1.3. Routed VPLS Commands
2.5.1.4. Redundant Interface Commands
2.5.1.5. Interface SAP Commands
2.5.1.6. Interface SAP Tunnel Commands
2.5.1.7. VRRP Commands
2.5.1.8. Spoke SDP Commands
2.5.1.9. Subscriber Interface Commands
2.5.1.9.1. Group Interface SAP Commands
2.5.1.10. AARP Interface Commands
2.5.2. Command Descriptions
2.5.2.1. Generic Commands
2.5.2.2. IES Global Commands
2.5.2.3. IES Interface Commands
2.5.2.4. Redundant Interface Commands
2.5.2.5. IES Subscriber Interface Commands
2.5.2.6. IES Interface DHCP Commands
2.5.2.7. PPPoE Commands
2.5.2.8. IES Interface ICMP Commands
2.5.2.9. IES Interface IPv6 Commands
2.5.2.10. IES Spoke SDP Commands
2.5.2.11. IES SAP Commands
2.5.2.12. SAP Subscriber Management Commands
2.5.2.13. ETH-CFM Service Commands
2.5.2.14. IES Filter and QoS Policy Commands
2.5.2.15. ATM Commands
2.5.2.16. IES Interface VRRP Commands
2.5.2.17. IPSec Gateway Commands
2.5.2.18. AARP Interface Commands
2.6. IES Show, Clear, and Debug Command Reference
2.6.1. Command Hierarchies
2.6.1.1. Show Commands
2.6.1.2. Clear Commands
2.6.1.3. Debug Commands
2.6.1.4. Monitor Commands
2.6.2. Command Descriptions
2.6.2.1. IES Show Commands
2.6.2.2. IES Clear Commands
2.6.2.3. IES Debug Commands
2.6.2.4. IES Monitor Commands
3. Virtual Private Routed Network Service
3.1. VPRN Service Overview
3.1.1. Routing Prerequisites
3.1.2. Core MP-BGP Support
3.1.3. Route Distinguishers
3.1.3.1. eiBGP Load Balancing
3.1.4. Route Reflector
3.1.5. CE to PE Route Exchange
3.1.5.1. Route Redistribution
3.1.5.2. CPE Connectivity Check
3.1.6. Constrained Route Distribution (RT Constraint)
3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
3.1.6.2. Configuring the Route Target Address Family
3.1.6.3. Originating RT Constraint Routes
3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
3.1.6.5. Using RT Constraint Routes
3.1.7. BGP Fast Reroute in a VPRN
3.1.7.1. BGP Fast Reroute in a VPRN Configuration
3.1.8. BGP Best-External in a VPRN Context
3.2. VPRN Features
3.2.1. IP Interfaces
3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
3.2.1.2. QPPB Applications
3.2.1.3. Inter-AS Coordination of QoS Policies
3.2.1.4. Traffic Differentiation Based on Route Characteristics
3.2.1.5. QPPB
3.2.1.6. Associating an FC and Priority with a Route
3.2.1.7. Displaying QoS Information Associated with Routes
3.2.1.8. Enabling QPPB on an IP interface
3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
3.2.1.10. QPPB and Multiple Paths to a Destination
3.2.1.11. QPPB and Policy-Based Routing
3.2.1.12. QPPB and GRT Lookup
3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
3.2.1.14. Object Grouping and State Monitoring
3.2.1.15. VPRN IP Interface Applicability
3.2.2. Subscriber Interfaces
3.2.3. SAPs
3.2.3.1. Encapsulations
3.2.3.2. ATM SAP Encapsulations for VPRN Services
3.2.3.3. Pseudowire SAPs
3.2.4. QoS Policies
3.2.5. Filter Policies
3.2.6. DSCP Marking
3.2.6.1. Default DSCP Mapping Table
3.2.7. Configuration of TTL Propagation for VPRN Routes
3.2.8. CE to PE Routing Protocols
3.2.8.1. PE to PE Tunneling Mechanisms
3.2.8.2. Per VRF Route Limiting
3.2.9. Spoke SDPs
3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
3.2.9.2. Spoke SDP Redundancy into IES/VPRN
3.2.10. IP-VPNs
3.2.10.1. Using OSPF in IP-VPNs
3.2.11. IPCP Subnet Negotiation
3.2.12. Cflowd for IP-VPNs
3.2.13. Inter-AS VPRNs
3.2.14. Carrier Supporting Carrier (CsC)
3.2.14.1. Terminology
3.2.14.2. CSC Connectivity Models
3.2.14.3. CSC-PE Configuration and Operation
3.2.14.4. CSC Interface
3.2.14.5. QoS
3.2.14.6. MPLS
3.2.14.7. CSC VPRN Service Configuration
3.2.15. Traffic Leaking to GRT
3.2.16. Traffic Leaking from VPRN to GRT for IPv6
3.2.17. RIP Metric Propagation in VPRNs
3.2.18. NTP Within a VPRN Service
3.2.19. PTP Within a VPRN Service
3.2.20. VPN Route Label Allocation
3.2.20.1. Configuring the Service Label Mode
3.2.20.2. Restrictions and Usage Notes
3.2.21. VPRN Support for BGP Flowspec
3.2.22. MPLS Entropy Label and Hash Label
3.2.23. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
3.3. QoS on Ingress Bindings
3.4. Multicast in IP-VPN Applications
3.4.1. Use of Data MDTs
3.4.2. Multicast Protocols Supported in the Provider Network
3.4.3. MVPN Membership Auto-discovery using BGP
3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
3.4.5. VRF Route Import Extended Community
3.4.6. Provider Tunnel Support
3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
3.4.6.3. P2MP LDP I-PMSI and S-PMSI
3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
3.4.6.5. P2MP LSP S-PMSI
3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
3.4.6.7. MVPN Sender-only/Receiver-only
3.4.6.8. S-PMSI Trigger Thresholds
3.4.6.9. Migration from Existing Rosen Implementation
3.4.6.10. Policy-based S-PMSI
3.4.6.10.1. Supported MPLS Tunnels
3.4.6.10.2. Supported Multicast Features
3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
3.4.6.10.4. Configuration Example
3.4.6.11. Policy-based Data MDT
3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
3.4.8. Multicast VPN Extranet
3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.4.11. IPv6 MVPN Support
3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
3.4.13. NG-MVPN Core Diversity
3.4.13.1. NG-MVPN to Loopback Interface
3.4.13.2. NG-MVPN Core Diversity
3.4.13.3. Configuration Example
3.4.14. NG-MVPN Multicast Source Geo-Redundancy
3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
3.4.16. Inter-AS MVPN
3.4.16.1. BGP Connector Attribute
3.4.16.2. PIM RPF Vector
3.4.16.3. Inter-AS MVPN Option B
3.4.16.4. Inter-AS MVPN Option C
3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
3.4.16.5.2. Configuration Example
3.4.16.5.3. Inter-AS Non-segmented MLDP
3.4.16.5.4. ECMP
3.4.17. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
3.5. FIB Prioritization
3.6. Configuring a VPRN Service with CLI
3.6.1. Basic Configuration
3.6.2. Common Configuration Tasks
3.6.3. Configuring VPRN Components
3.6.3.1. Creating a VPRN Service
3.6.3.2. Configuring Global VPRN Parameters
3.6.3.3. Configuring VPRN Log Parameters
3.6.3.3.1. Configuring a Spoke-SDP
3.6.3.4. Configuring VPRN Protocols - PIM
3.6.3.4.1. Configuring Router Interfaces
3.6.3.4.2. Configuring VPRN Protocols - BGP
3.6.3.4.3. Configuring VPRN Protocols - RIP
3.6.3.4.4. Configuring VPRN Protocols - OSPF
3.6.3.4.5. Configuring a VPRN Interface
3.6.3.4.6. Configuring Overload State on a Single SFM
3.6.3.4.7. Configuring a VPRN Interface SAP
3.6.4. Configuring IPSec Parameters
3.7. Service Management Tasks
3.7.1. Modifying VPRN Service Parameters
3.7.2. Deleting a VPRN Service
3.7.3. Disabling a VPRN Service
3.7.4. Re-enabling a VPRN Service
3.8. VPRN Service Configuration Commands
3.8.1. Command Hierarchies
3.8.1.1. VPRN Service Configuration Commands
3.8.1.2. L2TP Commands
3.8.1.3. DHCP Commands
3.8.1.4. GSMP Commands
3.8.1.5. IGMP Commands
3.8.1.6. IPSec Configuration Commands
3.8.1.7. Log Commands
3.8.1.8. Multicast VPN Commands
3.8.1.9. Redundant Interface Commands
3.8.1.10. Router Advertisement Commands
3.8.1.11. NTP Commands
3.8.1.12. NAT Commands
3.8.1.13. Subscriber Interface Commands
3.8.1.13.1. Group Interface SAP ETH-CFM Commands
3.8.1.14. Interface Commands
3.8.1.15. Network Interface Commands
3.8.1.16. Interface Spoke SDP Commands
3.8.1.17. Interface VRRP Commands
3.8.1.18. Interface SAP Commands
3.8.1.19. Interface SAP Tunnel Commands
3.8.1.20. Routed VPLS Commands
3.8.1.21. Oper Group Commands
3.8.1.22. Network Ingress Commands
3.8.1.23. BGP Configuration Commands
3.8.1.24. BGP Group Configuration Commands
3.8.1.25. BGP Group Neighbor Configuration Commands
3.8.1.26. IS-IS Configuration Commands
3.8.1.27. OSPF Configuration Commands
3.8.1.28. PIM Configuration Commands
3.8.1.29. MSDP Configuration Commands
3.8.1.30. MLD Configuration Commands
3.8.1.31. RIP Configuration Commands
3.8.1.32. RADIUS Commands
3.8.1.33. Web Portal Protocol Configuration Commands
3.8.1.34. AARP Interface Commands
3.8.2. Command Descriptions
3.8.2.1. Generic Commands
3.8.2.2. Global Commands
3.8.2.3. Router L2TP Commands
3.8.2.3.1. Router L2TP Tunnel Commands
3.8.2.4. Router DHCP Configuration Commands
3.8.2.5. IGMP Commands
3.8.2.6. IPSec Configuration Commands
3.8.2.7. Log Commands
3.8.2.8. Multicast VPN Commands
3.8.2.9. Redundant Interface Commands
3.8.2.10. Router Advertisement Commands
3.8.2.11. Network Time Protocol Commands
3.8.2.12. NAT Commands
3.8.2.13. Subscriber Interface Commands
3.8.2.14. Interface Commands
3.8.2.15. Network Interface Commands
3.8.2.16. Interface DHCP Commands
3.8.2.17. Interface ICMP Commands
3.8.2.18. Interface SAP ATM Commands
3.8.2.19. Interface Anti-Spoofing Commands
3.8.2.20. Interface SAP Filter and QoS Policy Commands
3.8.2.21. Interface VRRP Commands
3.8.2.22. Interface SAP Commands
3.8.2.23. Routed VPLS Commands
3.8.2.24. Network Ingress Commands
3.8.2.25. SAP Subscriber Management Commands
3.8.2.26. BGP Commands
3.8.2.27. ETH-CFM Service Commands
3.8.2.28. IS-IS Commands
3.8.2.29. OSPF Commands
3.8.2.30. PIM Commands
3.8.2.31. PPPoE Commands
3.8.2.32. MSDP Configuration Commands
3.8.2.33. MLD Configuration Commands
3.8.2.34. RIP Commands
3.8.2.35. SDP Commands
3.8.2.36. RADIUS Proxy Commands
3.8.2.37. AARP Interface Commands
3.9. VPRN Show, Clear, and Debug Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Show Commands
3.9.1.2. Clear Commands
3.9.1.3. Debug Commands
3.9.2. Command Descriptions
3.9.2.1. VPRN Show Commands
3.9.2.2. VPRN Clear Commands
3.9.2.3. VPRN Debug Commands
3.10. Tools Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Tools Commands
3.10.2. Command Descriptions
3.10.2.1. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
Log Events Guide R16.0.R1
1. Log Events
1.1. In This Chapter
1.2. Log Events
1.3. Sample Log Event
2. SR Log Events
2.1. ADP
2.1.1. tmnxDiscoveryCellularReq
2.1.2. tmnxDiscoveryEndNotify
2.2. APPLICATION_ASSURANCE
2.2.1. tmnxBsxAarpInstOperStateChanged
2.2.2. tmnxBsxAarpInstStateChanged
2.2.3. tmnxBsxAaSubPolResExceeded
2.2.4. tmnxBsxAaSubPolResExceededClear
2.2.5. tmnxBsxAaSubscriberAcctDataLoss
2.2.6. tmnxBsxAaSubscribersUnassigned
2.2.7. tmnxBsxCertProfileOperStateChngd
2.2.8. tmnxBsxDatapathCpuUsage
2.2.9. tmnxBsxDatapathCpuUsageClear
2.2.10. tmnxBsxDnsIpCacheFull
2.2.11. tmnxBsxDnsIpCacheFullClear
2.2.12. tmnxBsxHttpUrlParamLimitExceeded
2.2.13. tmnxBsxIsaAaGrpBitRate
2.2.14. tmnxBsxIsaAaGrpBitRateClear
2.2.15. tmnxBsxIsaAaGrpCapCostThres
2.2.16. tmnxBsxIsaAaGrpCapCostThresClear
2.2.17. tmnxBsxIsaAaGrpFailureClearV2
2.2.18. tmnxBsxIsaAaGrpFailureV2
2.2.19. tmnxBsxIsaAaGrpFlowFull
2.2.20. tmnxBsxIsaAaGrpFlowFullClear
2.2.21. tmnxBsxIsaAaGrpFlowSetup
2.2.22. tmnxBsxIsaAaGrpFlowSetupClear
2.2.23. tmnxBsxIsaAaGrpFmSbWaSBufOvld
2.2.24. tmnxBsxIsaAaGrpFmSbWaSBufOvldClr
2.2.25. tmnxBsxIsaAaGrpNonRedundantV2
2.2.26. tmnxBsxIsaAaGrpOvrldCutthru
2.2.27. tmnxBsxIsaAaGrpOvrldCutthruClr
2.2.28. tmnxBsxIsaAaGrpPacketRate
2.2.29. tmnxBsxIsaAaGrpPacketRateClear
2.2.30. tmnxBsxIsaAaGrpSwitchover
2.2.31. tmnxBsxIsaAaGrpToSbWaSBufOvld
2.2.32. tmnxBsxIsaAaGrpToSbWaSBufOvldClr
2.2.33. tmnxBsxIsaAaSubLoadBalance
2.2.34. tmnxBsxIsaAaTimFileProcFailure
2.2.35. tmnxBsxMobileSubModifyFailure
2.2.36. tmnxBsxRadApFailure
2.2.37. tmnxBsxRadApIntrmUpdateSkipped
2.2.38. tmnxBsxRadApServOperStateChange
2.2.39. tmnxBsxStatFtrEnTcaThreshCrClear
2.2.40. tmnxBsxStatFtrEnTcaThreshCrossed
2.2.41. tmnxBsxStatFtrTcaThreshCrClear
2.2.42. tmnxBsxStatFtrTcaThreshCrossed
2.2.43. tmnxBsxStatPolcrTcaThreshCrClear
2.2.44. tmnxBsxStatPolcrTcaThreshCrossed
2.2.45. tmnxBsxStatTcaThreshCrossed
2.2.46. tmnxBsxStatTcaThreshCrossedClear
2.2.47. tmnxBsxSubModifyFailure
2.2.48. tmnxBsxSubQuarantined
2.2.49. tmnxBsxSubQuarantinedClear
2.2.50. tmnxBsxTcpValTcaCrossed
2.2.51. tmnxBsxTcpValTcaCrossedClear
2.2.52. tmnxBsxTransIpPolAaSubCreated
2.2.53. tmnxBsxTransIpPolAaSubDeleted
2.2.54. tmnxBsxTransIpPolDhcpAddWarning
2.2.55. tmnxBsxTransIpPolDhcpDelWarning
2.2.56. tmnxBsxTransIpPolDiamGxError
2.2.57. tmnxBsxTransIpPolRadCoAAudit
2.2.58. tmnxBsxTransIpPolRadCoAError
2.2.59. tmnxBsxTransIpPolRadDiscError
2.2.60. tmnxBsxTransitIpPersistenceWarn
2.2.61. tmnxBsxUrlFilterOperStateChange
2.2.62. tmnxBsxUrlListFailure
2.2.63. tmnxBsxUrlListUpdate
2.3. APS
2.3.1. apsEventChannelMismatch
2.3.2. apsEventFEPLF
2.3.3. apsEventModeMismatch
2.3.4. apsEventPSBF
2.3.5. apsEventSwitchover
2.3.6. tApsChannelMismatchClear
2.3.7. tApsChanTxLaisStateChange
2.3.8. tApsFEPLFClear
2.3.9. tApsLocalSwitchCommandClear
2.3.10. tApsLocalSwitchCommandSet
2.3.11. tApsMcApsCtlLinkStateChange
2.3.12. tApsModeMismatchClear
2.3.13. tApsPrimaryChannelChange
2.3.14. tApsPSBFClear
2.3.15. tApsRemoteSwitchCommandClear
2.3.16. tApsRemoteSwitchCommandSet
2.4. ATM
2.4.1. atmIfcStatusChange
2.4.2. atmIlmiPeerVclStatusChange
2.4.3. atmIlmiPeerVplStatusChange
2.4.4. atmVclStatusChange
2.4.5. atmVplStatusChange
2.4.6. atmVtlStatusChange
2.4.7. tAtmEpOutOfPeerVpiOrVciRange
2.4.8. tAtmIlmiLinkStatusChange
2.4.9. tAtmMaxPeerVccsExceeded
2.4.10. tAtmMaxPeerVpcsExceeded
2.4.11. tAtmPlcpSubLayerClear
2.4.12. tAtmPlcpSubLayerDown
2.4.13. tAtmTcSubLayerClear
2.4.14. tAtmTcSubLayerDown
2.5. AUTO_PROV
2.5.1. autoNodeProv
2.6. BFD
2.6.1. tmnxBfdOnLspSessDeleted
2.6.2. tmnxBfdOnLspSessDown
2.6.3. tmnxBfdOnLspSessNoCpmNpResources
2.6.4. tmnxBfdOnLspSessNoTailResources
2.6.5. tmnxBfdOnLspSessProtChange
2.6.6. tmnxBfdOnLspSessUp
2.7. BGP
2.7.1. bgpBackwardTransNotification
2.7.2. bgpCfgViol
2.7.3. bgpConnMgrTerminated
2.7.4. bgpConnNoKA
2.7.5. bgpConnNoOpenRcvd
2.7.6. bgpEstablishedNotification
2.7.7. bgpInterfaceDown
2.7.8. bgpNoMemoryPeer
2.7.9. bgpPeerNotFound
2.7.10. bgpRejectConnBadLocAddr
2.7.11. bgpRemoteEndClosedConn
2.7.12. bgpTerminated
2.7.13. bgpVariableRangeViolation
2.7.14. receiveNotification
2.7.15. sendNotification
2.7.16. tBgp4PathAttrDiscarded
2.7.17. tBgp4PathAttrInvalid
2.7.18. tBgp4RouteInvalid
2.7.19. tBgp4UpdateInvalid
2.7.20. tBgp4WithdrawnRtFromUpdateError
2.7.21. tBgpFibResourceFailPeer
2.7.22. tBgpFlowspecUnsupportdComAction
2.7.23. tBgpGeneral
2.7.24. tBgpInstanceDynamicPeerLmtReachd
2.7.25. tBgpMaxNgPfxLmt
2.7.26. tBgpMaxNgPfxLmtThresholdReached
2.7.27. tBgpNgBackwardTransition
2.7.28. tBgpNgEstablished
2.7.29. tBgpPeerGRStatusChange
2.7.30. tBgpPeerNgHoldTimeInconsistent
2.7.31. tBgpPGDynamicPeerLmtReached
2.7.32. tBgpReceivedInvalidNlri
2.8. CALLTRACE
2.8.1. calltraceDebugEvent
2.8.2. tmnxCallTraceLocSizeLimitReached
2.8.3. tmnxCallTraceMaxFilesNumReached
2.9. CFLOWD
2.9.1. tmnxCflowdCreateFailure
2.9.2. tmnxCflowdFlowCreateFailure
2.9.3. tmnxCflowdPacketTxFailure
2.9.4. tmnxCflowdStateChange
2.10. CHASSIS
2.10.1. CpmIcPortSFFStatusDDMCorrupt
2.10.2. CpmIcPortSFFStatusFailure
2.10.3. CpmIcPortSFFStatusReadError
2.10.4. CpmIcPortSFFStatusUnsupported
2.10.5. SfmIcPortSFFStatusDDMCorrupt
2.10.6. SfmIcPortSFFStatusFailure
2.10.7. SfmIcPortSFFStatusReadError
2.10.8. SfmIcPortSFFStatusUnsupported
2.10.9. tIPsecIsaMemHighWatermark
2.10.10. tIPsecIsaMemLowWatermark
2.10.11. tIPsecIsaMemMax
2.10.12. tmnxAlarmInputVoltageFailure
2.10.13. tmnxBluetoothModuleConnectionChg
2.10.14. tmnxCardResMacFdbHighUsgClr
2.10.15. tmnxCardResMacFdbHighUsgSet
2.10.16. tmnxChassisHiBwMcastAlarm
2.10.17. tmnxChassisNotificationClear
2.10.18. tmnxChassisUpgradeComplete
2.10.19. tmnxChassisUpgradeInProgress
2.10.20. tmnxCpmALocalIcPortAvail
2.10.21. tmnxCpmANoLocalIcPort
2.10.22. tmnxCpmBLocalIcPortAvail
2.10.23. tmnxCpmBNoLocalIcPort
2.10.24. tmnxCpmCardSyncFileNotPresent
2.10.25. tmnxCpmIcPortDDMClear
2.10.26. tmnxCpmIcPortDDMFailure
2.10.27. tmnxCpmIcPortDown
2.10.28. tmnxCpmIcPortSFFInserted
2.10.29. tmnxCpmIcPortSFFRemoved
2.10.30. tmnxCpmIcPortUp
2.10.31. tmnxCpmMemSizeMismatch
2.10.32. tmnxCpmMemSizeMismatchClear
2.10.33. tmnxDcpCardFpEventOvrflw
2.10.34. tmnxDcpCardFpEventOvrflwClr
2.10.35. tmnxDcpCardSapEventOvrflw
2.10.36. tmnxDcpCardSapEventOvrflwClr
2.10.37. tmnxDcpCardVrtrIfEventOvrflw
2.10.38. tmnxDcpCardVrtrIfEventOvrflwClr
2.10.39. tmnxDcpFpDynPoolUsageHiAlmClear
2.10.40. tmnxDcpFpDynPoolUsageHiAlmRaise
2.10.41. tmnxEnvTempTooHigh
2.10.42. tmnxEqBpEpromFail
2.10.43. tmnxEqBpEpromFailClear
2.10.44. tmnxEqBpEpromWarning
2.10.45. tmnxEqBpEpromWarningClear
2.10.46. tmnxEqCardChipIfCellEvent
2.10.47. tmnxEqCardChipIfDownEvent
2.10.48. tmnxEqCardFailure
2.10.49. tmnxEqCardFirmwareUpgraded
2.10.50. tmnxEqCardInserted
2.10.51. tmnxEqCardPChipCamEvent
2.10.52. tmnxEqCardPChipError
2.10.53. tmnxEqCardPChipMemoryEvent
2.10.54. tmnxEqCardQChipBufMemoryEvent
2.10.55. tmnxEqCardQChipIntMemoryEvent
2.10.56. tmnxEqCardQChipStatsMemoryEvent
2.10.57. tmnxEqCardRemoved
2.10.58. tmnxEqCardSoftResetAlarm
2.10.59. tmnxEqCardTChipParityEvent
2.10.60. tmnxEqDataPathFailureProtImpact
2.10.61. tmnxEqFlashDataLoss
2.10.62. tmnxEqFlashDiskFull
2.10.63. tmnxEqHwEnhancedCapability
2.10.64. tmnxEqLowSwitchFabricCap
2.10.65. tmnxEqLowSwitchFabricCapClear
2.10.66. tmnxEqMdaCfgNotCompatible
2.10.67. tmnxEqMdaIngrXplError
2.10.68. tmnxEqMdaSyncENotCompatible
2.10.69. tmnxEqMdaXplError
2.10.70. tmnxEqMgmtEthRedStandbyClear
2.10.71. tmnxEqMgmtEthRedStandbyRaise
2.10.72. tmnxEqPhysChassisFanFailure
2.10.73. tmnxEqPhysChassisFanFailureClear
2.10.74. tmnxEqPhysChassPowerSupAcFail
2.10.75. tmnxEqPhysChassPowerSupAcFailClr
2.10.76. tmnxEqPhysChassPowerSupDcFail
2.10.77. tmnxEqPhysChassPowerSupDcFailClr
2.10.78. tmnxEqPhysChassPowerSupInFail
2.10.79. tmnxEqPhysChassPowerSupInFailClr
2.10.80. tmnxEqPhysChassPowerSupOutFail
2.10.81. tmnxEqPhysChassPowerSupOutFailCl
2.10.82. tmnxEqPhysChassPowerSupOvrTmp
2.10.83. tmnxEqPhysChassPowerSupOvrTmpClr
2.10.84. tmnxEqPowerCapacityExceeded
2.10.85. tmnxEqPowerCapacityExceededClear
2.10.86. tmnxEqPowerLostCapacity
2.10.87. tmnxEqPowerLostCapacityClear
2.10.88. tmnxEqPowerOverloadState
2.10.89. tmnxEqPowerOverloadStateClear
2.10.90. tmnxEqPowerSafetyAlertClear
2.10.91. tmnxEqPowerSafetyAlertThreshold
2.10.92. tmnxEqPowerSafetyLevelClear
2.10.93. tmnxEqPowerSafetyLevelThreshold
2.10.94. tmnxEqPowerSupplyInserted
2.10.95. tmnxEqPowerSupplyRemoved
2.10.96. tmnxEqProvPowerCapacityAlm
2.10.97. tmnxEqProvPowerCapacityAlmClr
2.10.98. tmnxEqSyncIfTimingBITS2Alarm
2.10.99. tmnxEqSyncIfTimingBITS2AlarmClr
2.10.100. tmnxEqSyncIfTimingBITS2Quality
2.10.101. tmnxEqSyncIfTimingBITSAlarm
2.10.102. tmnxEqSyncIfTimingBITSAlarmClear
2.10.103. tmnxEqSyncIfTimingBITSOutRefChg
2.10.104. tmnxEqSyncIfTimingBITSQuality
2.10.105. tmnxEqSyncIfTimingHoldover
2.10.106. tmnxEqSyncIfTimingHoldoverClear
2.10.107. tmnxEqSyncIfTimingPTPAlarm
2.10.108. tmnxEqSyncIfTimingPTPAlarmClr
2.10.109. tmnxEqSyncIfTimingPTPQuality
2.10.110. tmnxEqSyncIfTimingRef1Alarm
2.10.111. tmnxEqSyncIfTimingRef1AlarmClear
2.10.112. tmnxEqSyncIfTimingRef1Quality
2.10.113. tmnxEqSyncIfTimingRef2Alarm
2.10.114. tmnxEqSyncIfTimingRef2AlarmClear
2.10.115. tmnxEqSyncIfTimingRef2Quality
2.10.116. tmnxEqSyncIfTimingRefSwitch
2.10.117. tmnxEqSyncIfTimingSystemQuality
2.10.118. tmnxEqWrongCard
2.10.119. tmnxExtStandbyCpmReboot
2.10.120. tmnxExtStandbyCpmRebootFail
2.10.121. tmnxGnssAcquiredFix
2.10.122. tmnxGnssAcquiringFix
2.10.123. tmnxInterChassisCommsDown
2.10.124. tmnxInterChassisCommsUp
2.10.125. tmnxIomEventOverflow
2.10.126. tmnxIomEventOverflowClr
2.10.127. tmnxIomResExhausted
2.10.128. tmnxIomResHighLimitReached
2.10.129. tmnxIomResStateClr
2.10.130. tmnxIPMacCpmFilterNearFull
2.10.131. tmnxIPMacCpmFilterNearFullClear
2.10.132. tmnxIPMacCpmFilterOverload
2.10.133. tmnxIPMacCpmFilterOverloadClear
2.10.134. tmnxIPMacFilterEgrNearFull
2.10.135. tmnxIPMacFilterEgrNearFullClear
2.10.136. tmnxIPMacFilterEgrOverload
2.10.137. tmnxIPMacFilterEgrOverloadClear
2.10.138. tmnxIPMacFilterIngNearFull
2.10.139. tmnxIPMacFilterIngNearFullClear
2.10.140. tmnxIPMacFilterIngOverload
2.10.141. tmnxIPMacFilterIngOverloadClear
2.10.142. tmnxIPMacQosIngOverload
2.10.143. tmnxIPMacQosIngOverloadClear
2.10.144. tmnxIPQosEgrOverload
2.10.145. tmnxIPQosEgrOverloadClear
2.10.146. tmnxIPsecIsaGrpActiveIsaChgd
2.10.147. tmnxIPsecIsaGrpTnlHighWMark
2.10.148. tmnxIPsecIsaGrpTnlLowWMark
2.10.149. tmnxIPsecIsaGrpTnlMax
2.10.150. tmnxIPsecIsaGrpUnableToSwitch
2.10.151. tmnxIPv6CpmFilterNearFull
2.10.152. tmnxIPv6CpmFilterNearFullClear
2.10.153. tmnxIPv6CpmFilterOverload
2.10.154. tmnxIPv6CpmFilterOverloadClear
2.10.155. tmnxIPv6FilterEgrNearFull
2.10.156. tmnxIPv6FilterEgrNearFullClear
2.10.157. tmnxIPv6FilterEgrOverload
2.10.158. tmnxIPv6FilterEgrOverloadClear
2.10.159. tmnxIPv6FilterIngNearFull
2.10.160. tmnxIPv6FilterIngNearFullClear
2.10.161. tmnxIPv6FilterIngOverload
2.10.162. tmnxIPv6FilterIngOverloadClear
2.10.163. tmnxIPv6QosEgrOverload
2.10.164. tmnxIPv6QosEgrOverloadClear
2.10.165. tmnxIPv6QosIngOverload
2.10.166. tmnxIPv6QosIngOverloadClear
2.10.167. tmnxMDAIsaTunnelGroupChange
2.10.168. tmnxPeBootloaderVersionMismatch
2.10.169. tmnxPeBootromVersionMismatch
2.10.170. tmnxPeFirmwareVersionWarning
2.10.171. tmnxPeFPGAVersionMismatch
2.10.172. tmnxPeSoftwareLoadFailed
2.10.173. tmnxPeSoftwareVersionMismatch
2.10.174. tmnxPhysChassisFilterDoorClosed
2.10.175. tmnxPhysChassisFilterDoorOpen
2.10.176. tmnxPhysChassisPCMInputFeed
2.10.177. tmnxPhysChassisPCMInputFeedClr
2.10.178. tmnxPhysChassisPMInputFeed
2.10.179. tmnxPhysChassisPMInputFeedClr
2.10.180. tmnxPhysChassisPMOutFail
2.10.181. tmnxPhysChassisPMOutFailClr
2.10.182. tmnxPhysChassisPMOverTemp
2.10.183. tmnxPhysChassisPMOverTempClr
2.10.184. tmnxPhysChassPwrSupInputFeed
2.10.185. tmnxPhysChassPwrSupInputFeedClr
2.10.186. tmnxPhysChassPwrSupPemACRect
2.10.187. tmnxPhysChassPwrSupPemACRectClr
2.10.188. tmnxPhysChassPwrSupWrgFanDir
2.10.189. tmnxPhysChassPwrSupWrgFanDirClr
2.10.190. tmnxPlcyAcctStatsEventOvrflw
2.10.191. tmnxPlcyAcctStatsEventOvrflwClr
2.10.192. tmnxPlcyAcctStatsPoolExcResource
2.10.193. tmnxPlcyAcctStatsPoolLowResource
2.10.194. tmnxPowerShelfCommsDown
2.10.195. tmnxPowerShelfCommsUp
2.10.196. tmnxPowerShelfInputPwrModeSwitch
2.10.197. tmnxPowerShelfOutputStatusSwitch
2.10.198. tmnxRedPrimaryCPMFail
2.10.199. tmnxSasAlarminput1StateChanged
2.10.200. tmnxSasAlarminput2StateChanged
2.10.201. tmnxSasAlarminput3StateChanged
2.10.202. tmnxSasAlarminput4StateChanged
2.10.203. tmnxSfmIcPortDDMClear
2.10.204. tmnxSfmIcPortDDMFailure
2.10.205. tmnxSfmIcPortDegraded
2.10.206. tmnxSfmIcPortDegradedClear
2.10.207. tmnxSfmIcPortDown
2.10.208. tmnxSfmIcPortSFFInserted
2.10.209. tmnxSfmIcPortSFFRemoved
2.10.210. tmnxSfmIcPortUp
2.10.211. tmnxSyncIfTimBITS2048khzUnsup
2.10.212. tmnxSyncIfTimBITS2048khzUnsupClr
2.11. DEBUG
2.11.1. traceEvent
2.12. DHCP
2.12.1. sapDHCPLeaseEntriesExceeded
2.12.2. sapDHCPLseStateMobilityError
2.12.3. sapDHCPLseStateOverride
2.12.4. sapDHCPLseStatePopulateErr
2.12.5. sapDHCPProxyServerError
2.12.6. sapDHCPSuspiciousPcktRcvd
2.12.7. sapStatHost6DynMacConflict
2.12.8. sapStaticHostDynMacConflict
2.12.9. sdpBindDHCPLeaseEntriesExceeded
2.12.10. sdpBindDHCPLseStateMobilityErr
2.12.11. sdpBindDHCPLseStateOverride
2.12.12. sdpBindDHCPLseStatePopulateErr
2.12.13. sdpBindDHCPProxyServerError
2.12.14. sdpBindDHCPSuspiciousPcktRcvd
2.12.15. svcDHCPLseStateRestoreProblem
2.12.16. svcDHCPMiscellaneousProblem
2.12.17. tmnxVRtrDHCP6AssignedIllegSubnet
2.12.18. tmnxVRtrDHCP6ClientMacUnresolved
2.12.19. tmnxVRtrDHCP6IllegalClientAddr
2.12.20. tmnxVRtrDHCP6LseStateOverride
2.12.21. tmnxVRtrDHCP6RelayLseStExceeded
2.12.22. tmnxVRtrDHCP6RelayReplyStripUni
2.12.23. tmnxVRtrDHCP6ServerLseStExceeded
2.12.24. tmnxVRtrDHCPIfLseStatesExceeded
2.12.25. tmnxVRtrDHCPSuspiciousPcktRcvd
2.13. DHCPS
2.13.1. tmnxDhcpsAddrAllocationFailure
2.13.2. tmnxDhcpsFoLeaseUpdateFailed
2.13.3. tmnxDhcpsFoStateChange
2.13.4. tmnxDhcpsLeaseOfferedExpired
2.13.5. tmnxDhcpsPacketDropped
2.13.6. tmnxDhcpsPoolFoLeaseUpdateFailed
2.13.7. tmnxDhcpsPoolFoStateChange
2.13.8. tmnxDhcpSvrDeclineStaticAddr
2.13.9. tmnxDhcpSvrHostConflict
2.13.10. tmnxDhcpSvrIntLseConflict
2.13.11. tmnxDhcpSvrLeaseCreate
2.13.12. tmnxDhcpSvrLeaseDefaultTimers
2.13.13. tmnxDhcpSvrLeaseDelete
2.13.14. tmnxDhcpSvrLeaseModify
2.13.15. tmnxDhcpSvrLeaseNotOwner
2.13.16. tmnxDhcpSvrMaxLeasesReached
2.13.17. tmnxDhcpSvrMsgTooLong
2.13.18. tmnxDhcpSvrNoContFreeBlocks
2.13.19. tmnxDhcpSvrNoSubnetFixAddr
2.13.20. tmnxDhcpSvrPfxThDepletedV6
2.13.21. tmnxDhcpSvrPfxThTooLowV6
2.13.22. tmnxDhcpSvrPlThDepletedV6
2.13.23. tmnxDhcpSvrPlThTooLowV6
2.13.24. tmnxDhcpSvrPoolDepleted
2.13.25. tmnxDhcpSvrPoolMinFreeExc
2.13.26. tmnxDhcpSvrPoolUnknown
2.13.27. tmnxDhcpSvrSubnetDepleted
2.13.28. tmnxDhcpSvrSubnetMinFreeExc
2.13.29. tmnxDhcpSvrUserDbUnknown
2.13.30. tmnxLudbDhcpGroupIfTooLong
2.13.31. tmnxLudbPppoeGroupIfTooLong
2.14. DIAMETER
2.14.1. tmnxDiamAppSessionFailure
2.14.2. tmnxDiamMessageDropped
2.14.3. tmnxDiamPolicyPeerStateChange
2.14.4. tmnxDiamPpPrxMcLocStateChanged
2.14.5. tmnxDiamSessionEvent
2.15. DYNSVC
2.15.1. tmnxDynSvcSapFailed
2.16. EFM_OAM
2.16.1. dot3OamNonThresholdEvent
2.16.2. dot3OamThresholdEvent
2.16.3. tmnxDot3OamLoopCleared
2.16.4. tmnxDot3OamLoopDetected
2.16.5. tmnxDot3OamNonThresholdEventClr
2.16.6. tmnxDot3OamPeerChanged
2.16.7. tmnxDot3OamSdThresholdEvent
2.16.8. tmnxDot3OamThresholdEventClr
2.17. ELMI
2.17.1. tmnxElmiEVCStatusChangeEvent
2.17.2. tmnxElmiIfStatusChangeEvent
2.18. ERING
2.18.1. tmnxEthRingApsPrvsnClearAlarm
2.18.2. tmnxEthRingApsPrvsnRaiseAlarm
2.18.3. tmnxEthRingPathFwdStateChange
2.19. ETH_CFM
2.19.1. dot1agCfmFaultAlarm
2.19.2. tmnxDot1agCfmMepAisStateChanged
2.19.3. tmnxDot1agCfmMepCsfStateChanged
2.19.4. tmnxDot1agCfmMepDMTestComplete
2.19.5. tmnxDot1agCfmMepEthTestComplete
2.19.6. tmnxDot1agCfmMepFcltyFaultClear
2.19.7. tmnxDot1agCfmMepFcltyFaultRaise
2.19.8. tmnxDot1agCfmMepLbmTestComplete
2.19.9. tmnxDot1agCfmMepLtmTestComplete
2.19.10. tmnxDot1agCfmMepSLMTestComplete
2.19.11. tmnxDot1agCfmMipEvaluation
2.20. ETH_TUNNEL
2.20.1. tmnxEthTunnelApsCfgClearAlarm
2.20.2. tmnxEthTunnelApsCfgRaiseAlarm
2.20.3. tmnxEthTunnelApsNoRspClearAlarm
2.20.4. tmnxEthTunnelApsNoRspRaiseAlarm
2.20.5. tmnxEthTunnelApsPrvsnClearAlarm
2.20.6. tmnxEthTunnelApsPrvsnRaiseAlarm
2.20.7. tmnxEthTunnelApsSwitchoverAlarm
2.21. FILTER
2.21.1. tFilterApplyPathProblem
2.21.2. tFilterBgpFlowSpecProblem
2.21.3. tFilterEmbeddingOperStateChange
2.21.4. tFilterEmbedFlowspecOperStateChg
2.21.5. tFilterEmbedOpenflowOperStateChg
2.21.6. tFilterEmbedVsdOperStateChg
2.21.7. tFilterOpenflowRequestRejected
2.21.8. tFilterRadSharedFltrAlarmClear
2.21.9. tFilterRadSharedFltrAlarmRaised
2.21.10. tFilterRPActiveDestChangeEvent
2.21.11. tFilterSubInsFltrEntryDropped
2.21.12. tFilterSubInsSpaceAlarmCleared
2.21.13. tFilterSubInsSpaceAlarmRaised
2.21.14. tIPFilterPBRPacketsDrop
2.22. GMPLS
2.22.1. vRtrGmplsLspPathStateChange
2.23. GSMP
2.23.1. tmnxAncpEgrRateMonitorEvent
2.23.2. tmnxAncpEgrRateMonitorEventL
2.23.3. tmnxAncpIngRateMonitorEvent
2.23.4. tmnxAncpIngRateMonitorEventL
2.23.5. tmnxAncpSesRejected
2.23.6. tmnxAncpShcvDisabledEvent
2.23.7. tmnxAncpShcvDisabledEventL
2.23.8. tmnxAncpStringRejected
2.24. IGH
2.24.1. tmnxIfGroupHandlerProtoOprChange
2.24.2. tmnxIfGroupHdlrMbrProtoOprChange
2.25. IGMP
2.25.1. vRtrIgmpGrpIfSapCModeRxQueryMism
2.25.2. vRtrIgmpGrpIfSapMaxGrpsLimExceed
2.25.3. vRtrIgmpGrpIfSapMaxGrpSrcLimExcd
2.25.4. vRtrIgmpGrpIfSapMaxSrcsLimExceed
2.25.5. vRtrIgmpGrpIfSapMcacPlcyDropped
2.25.6. vRtrIgmpGrpIfSapRxQueryVerMism
2.25.7. vRtrIgmpHostCModeRxQueryMismatch
2.25.8. vRtrIgmpHostInstantiationFail
2.25.9. vRtrIgmpHostMaxGrpsLimitExceeded
2.25.10. vRtrIgmpHostMaxGrpSrcsLimitExcd
2.25.11. vRtrIgmpHostMaxSrcsLimitExceeded
2.25.12. vRtrIgmpHostMcacPlcyDropped
2.25.13. vRtrIgmpHostQryIntervalConflict
2.25.14. vRtrIgmpHostRxQueryVerMismatch
2.25.15. vRtrIgmpIfCModeRxQueryMismatch
2.25.16. vRtrIgmpIfRxQueryVerMismatch
2.25.17. vRtrIgmpMaxGrpsLimitExceeded
2.25.18. vRtrIgmpMaxGrpSrcsLimitExceeded
2.25.19. vRtrIgmpMaxSrcsLimitExceeded
2.25.20. vRtrIgmpMcacPlcyDropped
2.25.21. vRtrIgmpNotifyNumOfIPsecIfHighWm
2.25.22. vRtrIgmpNotifyNumOfIPsecIfLowWm
2.25.23. vRtrIgmpNotifyNumOfIPsecIfMaxRch
2.26. IGMP_SNOOPING
2.26.1. eMplsIgmpSnpgMfibFailure
2.26.2. sapIgmpSnpgGrpLimitExceeded
2.26.3. sapIgmpSnpgGrpSrcLimitExceeded
2.26.4. sapIgmpSnpgMcacPlcyDropped
2.26.5. sapIgmpSnpgMcsFailure
2.26.6. sapIgmpSnpgSrcLimitExceeded
2.26.7. sdpBndIgmpSnpgGrpLimitExceeded
2.26.8. sdpBndIgmpSnpgGrpSrcLimitExceed
2.26.9. sdpBndIgmpSnpgMcacPlcyDropped
2.26.10. sdpBndIgmpSnpgSrcLimitExceeded
2.27. IP
2.27.1. clearRTMError
2.27.2. fibAddFailed
2.27.3. ipAnyDuplicateAddress
2.27.4. ipArpBadInterface
2.27.5. ipArpDuplicateIpAddress
2.27.6. ipArpDuplicateMacAddress
2.27.7. ipArpInfoOverwritten
2.27.8. ipDuplicateAddress
2.27.9. ipEtherBroadcast
2.27.10. qosNetworkPolicyMallocFailed
2.28. IPSEC
2.28.1. tIPsecBfdIntfSessStateChgd
2.28.2. tIPsecRadAcctPlcyFailure
2.28.3. tIPsecRUSAFailToAddRoute
2.28.4. tIPsecRuTnlEncapIpMtuTooSmall
2.28.5. tIPsecRUTnlFailToCreate
2.28.6. tIPsecRUTnlRemoved
2.28.7. tIPSecTrustAnchorPrfOprChg
2.28.8. tIPsecTunnelEncapIpMtuTooSmall
2.28.9. tmnxIPsecGWOperStateChange
2.28.10. tmnxIPsecTunnelOperStateChange
2.28.11. tmnxSecNotifCmptedCertChnChngd
2.28.12. tmnxSecNotifCmptedCertHashChngd
2.28.13. tmnxSecNotifSendChnNotInCmptChn
2.29. ISIS
2.29.1. tmnxIsisAdjacencyChange
2.29.2. tmnxIsisAdjBfdSessionSetupFail
2.29.3. tmnxIsisAdjRestartStatusChange
2.29.4. tmnxIsisAreaMismatch
2.29.5. tmnxIsisAuthFail
2.29.6. tmnxIsisAutTypeFail
2.29.7. tmnxIsisCircIdExhausted
2.29.8. tmnxIsisCircMtuTooLow
2.29.9. tmnxIsisCorruptedLSPDetected
2.29.10. tmnxIsisDatabaseOverload
2.29.11. tmnxIsisExportLimitReached
2.29.12. tmnxIsisExportLimitWarning
2.29.13. tmnxIsisFailureDisabled
2.29.14. tmnxIsisIDLenMismatch
2.29.15. tmnxIsisLdpSyncExit
2.29.16. tmnxIsisLdpSyncTimerStarted
2.29.17. tmnxIsisLSPPurge
2.29.18. tmnxIsisLSPTooLargeToPropagate
2.29.19. tmnxIsisManualAddressDrops
2.29.20. tmnxIsisMaxAreaAddrsMismatch
2.29.21. tmnxIsisMaxSeqExceedAttempt
2.29.22. tmnxIsisOrigLSPBufSizeMismatch
2.29.23. tmnxIsisOwnLSPPurge
2.29.24. tmnxIsisPfxLimitOverloadWarning
2.29.25. tmnxIsisProtoSuppMismatch
2.29.26. tmnxIsisRejectedAdjacency
2.29.27. tmnxIsisRejectedAdjacencySet
2.29.28. tmnxIsisRejectedAdjacencySid
2.29.29. tmnxIsisRoutesExpLmtDropped
2.29.30. tmnxIsisSequenceNumberSkip
2.29.31. tmnxIsisSidError
2.29.32. tmnxIsisSidNotInLabelRange
2.29.33. tmnxIsisSpbEctFidCfgChg
2.29.34. tmnxIsisSpbNbrMultAdjExists
2.29.35. tmnxIsisSpbNbrMultAdjExistsClear
2.29.36. tmnxIsisSrgbBadLabelRange
2.29.37. tmnxIsisVersionSkew
2.29.38. vRtrIsisSpbNbrMultAdjExists
2.29.39. vRtrIsisSpbNbrMultAdjExistsClear
2.29.40. vRtrSpbEctFidCfgChg
2.30. L2TP
2.30.1. tmnxL2tpApFailure
2.30.2. tmnxL2tpIsaMdaVRtrStateChange
2.30.3. tmnxL2tpLnsPppNcpFailure
2.30.4. tmnxL2tpLnsSePppSessionFailure
2.30.5. tmnxL2tpPeerUnreachable
2.30.6. tmnxL2tpTunnelBlacklisted
2.30.7. tmnxL2tpTunnelSelBlacklistFull
2.31. LAG
2.31.1. DynamicCostOff
2.31.2. DynamicCostOn
2.31.3. LagPortAddFailed
2.31.4. LagPortAddFailureCleared
2.31.5. LagStateEvent
2.31.6. LagSubGroupSelected
2.31.7. tLagMemberStateEvent
2.31.8. tmnxLagBfdMemStateChanged
2.32. LDAP
2.32.1. tmnxLdapOperStateChange
2.32.2. tmnxLdapServerOperStateChange
2.33. LDP
2.33.1. vRtrLdpGroupIdMismatch
2.33.2. vRtrLdpNgAddrFecCommMismatch
2.33.3. vRtrLdpNgIfStateChange
2.33.4. vRtrLdpNgInetIfStateChange
2.33.5. vRtrLdpNgIpv4InstStateChange
2.33.6. vRtrLdpNgIpv6InstStateChange
2.33.7. vRtrLdpNgResourceExhaustion
2.33.8. vRtrLdpNgSessionStateChange
2.33.9. vRtrLdpNgSessMaxFecLimitReached
2.33.10. vRtrLdpNgSessMaxFecThresChanged
2.33.11. vRtrLdpNgTargPeerStateChange
2.33.12. vRtrLdpStateChange
2.34. LI
2.34.1. cli_config_io
2.34.2. cli_unauth_config_io
2.34.3. cli_unauth_user_io
2.34.4. cli_user_io
2.34.5. cli_user_login
2.34.6. cli_user_login_failed
2.34.7. cli_user_login_max_attempts
2.34.8. cli_user_logout
2.34.9. destinationDisabled
2.34.10. destinationEnabled
2.34.11. ftp_user_login
2.34.12. ftp_user_login_failed
2.34.13. ftp_user_login_max_attempts
2.34.14. ftp_user_logout
2.34.15. grpc_user_login
2.34.16. grpc_user_login_failed
2.34.17. grpc_user_login_max_attempts
2.34.18. grpc_user_logout
2.34.19. host_snmp_attempts
2.34.20. radiusFailed
2.34.21. sbiBootLiConfig
2.34.22. snmp_user_set
2.34.23. sourceDisabled
2.34.24. sourceEnabled
2.34.25. sourceSapChange
2.34.26. sourceSubscriberChange
2.34.27. ssh_user_login
2.34.28. ssh_user_login_failed
2.34.29. ssh_user_login_max_attempts
2.34.30. ssh_user_logout
2.34.31. ssiSaveConfigFailed
2.34.32. ssiSaveConfigSucceeded
2.34.33. ssiSyncConfigFailed
2.34.34. ssiSyncConfigOK
2.34.35. tMirrorDestinationChangeReject
2.34.36. tMirrorFilterAssignToItfWarn
2.34.37. tMirrorFilterAssignToSapWarn
2.34.38. tMirrorFilterAssignToSdpWarn
2.34.39. tMirrorLiNat64SubOperStateCh
2.34.40. tMirrorLiNatL2awSubOperStateCh
2.34.41. tMirrorLiNatLsnSubOperStateCh
2.34.42. tMirrorLiX2Alarm
2.34.43. tMirrorSourceFilterAssignReject
2.34.44. tMirrorSourceFilterAssignWarn
2.34.45. tMirrorSourceFilterOverruled
2.34.46. tMirrorSourceIPFltrChangeReject
2.34.47. tMirrorSourceIPv6FltrChangeRej
2.34.48. tMirrorSourceLiFilterChanged
2.34.49. tMirrorSourceLiSubProblem
2.34.50. tMirrorSourceMacFltrChangeReject
2.34.51. tmnxClear
2.34.52. tmnxConfigCreate
2.34.53. tmnxConfigDelete
2.34.54. tmnxConfigModify
2.34.55. tmnxStateChange
2.35. LLDP
2.35.1. lldpRemTablesChange
2.36. LMP
2.36.1. tmnxLmpVRtrControlChannelState
2.36.2. tmnxLmpVRtrDbLinkPropMismatch
2.36.3. tmnxLmpVRtrDbLinkPropMismatchClr
2.36.4. tmnxLmpVRtrTeLinkPropMismatch
2.36.5. tmnxLmpVRtrTeLinkPropMismatchClr
2.36.6. tmnxLmpVRtrTeLinkState
2.37. LOGGER
2.37.1. STARTED
2.37.2. tmnxClear
2.37.3. tmnxLogAccountingDataLoss
2.37.4. tmnxLogAdminLocFailed
2.37.5. tmnxLogBackupLocFailed
2.37.6. tmnxLogEventOverrun
2.37.7. tmnxLogEventThrottled
2.37.8. tmnxLogFileDeleted
2.37.9. tmnxLogFileRollover
2.37.10. tmnxLogOnlyEventOverrun
2.37.11. tmnxLogOnlyEventThrottled
2.37.12. tmnxLogSpaceContention
2.37.13. tmnxLogTraceError
2.37.14. tmnxStdEventsReplayed
2.37.15. tmnxSysLogTargetProblem
2.37.16. tmnxTestEvent
2.38. MACSEC
2.38.1. tmnxMacsecConfiguredPortCA
2.38.2. tmnxMacsecDisabledPort
2.38.3. tmnxMacsecEnabledPort
2.38.4. tmnxMacsecMaxPeerLimitExceeded
2.38.5. tmnxMacsecUnconfiguredPortCA
2.38.6. tmnxMkaPskRollover
2.38.7. tmnxMkaSessionEstablished
2.39. MC_REDUNDANCY
2.39.1. srrpPacketDiscarded
2.39.2. tMcPeerIPsecTnlGrpMasterStateChg
2.39.3. tMcPeerIPsecTnlGrpProtStatusChg
2.39.4. tmnxMCEPSessionPsvModeDisabled
2.39.5. tmnxMCEPSessionPsvModeEnabled
2.39.6. tmnxMcLagInfoLagChanged
2.39.7. tmnxMcOmcrClientNumEntriesHigh
2.39.8. tmnxMcOmcrStatFailedChanged
2.39.9. tmnxMcPeerEPBfdSessionClose
2.39.10. tmnxMcPeerEPBfdSessionDown
2.39.11. tmnxMcPeerEPBfdSessionOpen
2.39.12. tmnxMcPeerEPBfdSessionUp
2.39.13. tmnxMcPeerEPOperDown
2.39.14. tmnxMcPeerEPOperUp
2.39.15. tmnxMcPeerRingsOperStateChanged
2.39.16. tmnxMcPeerSyncStatusChanged
2.39.17. tmnxMcRedundancyMismatchDetected
2.39.18. tmnxMcRedundancyMismatchResolved
2.39.19. tmnxMcRedundancyPeerStateChanged
2.39.20. tmnxMcRingInbCtrlOperStateChgd
2.39.21. tmnxMcRingNodeLocOperStateChgd
2.39.22. tmnxMcRingOperStateChanged
2.39.23. tmnxMcSyncClientAlarmCleared
2.39.24. tmnxMcSyncClientAlarmRaised
2.39.25. tmnxMcSyncClockSkewCleared
2.39.26. tmnxMcSyncClockSkewRaised
2.39.27. tmnxSrrpBecameBackup
2.39.28. tmnxSrrpBfdIntfSessStateChgd
2.39.29. tmnxSrrpDualMaster
2.39.30. tmnxSrrpDuplicateSubIfAddress
2.39.31. tmnxSrrpInstanceIdMismatch
2.39.32. tmnxSrrpOperDownInvalidMac
2.39.33. tmnxSrrpOperDownInvalidMacClear
2.39.34. tmnxSrrpRedIfMismatch
2.39.35. tmnxSrrpSapMismatch
2.39.36. tmnxSrrpSapTagMismatch
2.39.37. tmnxSrrpSubnetMismatch
2.39.38. tmnxSrrpSubnetMismatchCleared
2.39.39. tmnxSrrpSystemIpNotSet
2.39.40. tmnxSrrpTrapNewMaster
2.40. MCPATH
2.40.1. tmnxMcPathAvailBwLimitReached
2.40.2. tmnxMcPathAvailBwValWithinRange
2.40.3. tmnxMcPathSrcGrpBlkHole
2.40.4. tmnxMcPathSrcGrpBlkHoleClear
2.41. MIRROR
2.41.1. destinationDisabled
2.41.2. destinationEnabled
2.41.3. sourceDisabled
2.41.4. sourceEnabled
2.41.5. sourceIpFilterChange
2.41.6. sourceMacFilterChange
2.41.7. sourceSapChange
2.41.8. sourceSubscriberChange
2.41.9. tMirrorSourceIpv6FilterChange
2.42. MLD
2.42.1. vRtrMldGrpIfSapCModeRxQueryMism
2.42.2. vRtrMldGrpIfSapMaxGrpsLimExceed
2.42.3. vRtrMldGrpIfSapMaxGrpSrcLimExcd
2.42.4. vRtrMldGrpIfSapMaxSrcsLimExceed
2.42.5. vRtrMldGrpIfSapMcacPlcyDropped
2.42.6. vRtrMldGrpIfSapRxQueryVerMism
2.42.7. vRtrMldHostCModeRxQueryMismatch
2.42.8. vRtrMldHostInstantiationFail
2.42.9. vRtrMldHostMaxGrpsLimitExceeded
2.42.10. vRtrMldHostMaxGrpSrcsLimitExcd
2.42.11. vRtrMldHostMaxSrcsLimitExceeded
2.42.12. vRtrMldHostMcacPlcyDropped
2.42.13. vRtrMldHostQryIntervalConflict
2.42.14. vRtrMldHostRxQueryVerMismatch
2.42.15. vRtrMldIfCModeRxQueryMismatch
2.42.16. vRtrMldIfRxQueryVerMismatch
2.42.17. vRtrMldMaxGrpsLimitExceeded
2.42.18. vRtrMldMaxGrpSrcsLimitExceeded
2.42.19. vRtrMldMaxSrcsLimitExceeded
2.42.20. vRtrMldMcacPlcyDropped
2.43. MLD_SNOOPING
2.43.1. sapMldSnpgGrpLimitExceeded
2.43.2. sapMldSnpgMcsFailure
2.43.3. sdpBndMldSnpgGrpLimitExceeded
2.44. MPLS
2.44.1. mplsTunnelDown
2.44.2. mplsTunnelReoptimized
2.44.3. mplsTunnelRerouted
2.44.4. mplsTunnelUp
2.44.5. mplsXCDown
2.44.6. mplsXCUp
2.44.7. vRtrMplsIfStateChange
2.44.8. vRtrMplsLspActivePathChanged
2.44.9. vRtrMplsLspDown
2.44.10. vRtrMplsLspPathDown
2.44.11. vRtrMplsLspPathLstFillReoptElig
2.44.12. vRtrMplsLspPathMbbStatusEvent
2.44.13. vRtrMplsLspPathRerouted
2.44.14. vRtrMplsLspPathResignaled
2.44.15. vRtrMplsLspPathSoftPreempted
2.44.16. vRtrMplsLspPathUp
2.44.17. vRtrMplsLspSwitchStbyFailure
2.44.18. vRtrMplsLspUp
2.44.19. vRtrMplsNodeInIgpOverload
2.44.20. vRtrMplsP2mpInstanceDown
2.44.21. vRtrMplsP2mpInstanceResignaled
2.44.22. vRtrMplsP2mpInstanceUp
2.44.23. vRtrMplsResignalTimerExpired
2.44.24. vRtrMplsS2lSubLspDown
2.44.25. vRtrMplsS2lSubLspRerouted
2.44.26. vRtrMplsS2lSubLspResignaled
2.44.27. vRtrMplsS2lSubLspUp
2.44.28. vRtrMplsStateChange
2.44.29. vRtrMplsXCBundleChange
2.45. MPLS_TP
2.45.1. vRtrMplsTpLspActivePathChange
2.45.2. vRtrMplsTpLspActivePathUp
2.45.3. vRtrMplsTpLspPtTypeMismatchAlarm
2.45.4. vRtrMplsTpLspPtTypeMismatchClear
2.45.5. vRtrMplsTpLspRevertMismatchAlarm
2.45.6. vRtrMplsTpLspRevertMismatchClear
2.46. MSDP
2.46.1. msdpBackwardTransition
2.46.2. msdpEstablished
2.46.3. tmnxMsdpNgActSrcLimExcd
2.46.4. tmnxMsdpNgGroupSrcActMsgsExcd
2.46.5. tmnxMsdpNgPeerActSrcLimExcd
2.46.6. tmnxMsdpNgRPFFailure
2.46.7. tmnxMsdpNgSourceSrcActMsgsExcd
2.47. NAT
2.47.1. tmnxNatDetMapOperStateChanged
2.47.2. tmnxNatDetPlcyChanged
2.47.3. tmnxNatDetPlcyOperStateChanged
2.47.4. tmnxNatFwd2EntryAdded
2.47.5. tmnxNatFwd2OperStateChanged
2.47.6. tmnxNatInAddrPrefixBlksFree
2.47.7. tmnxNatIsaGrpIsDegraded
2.47.8. tmnxNatIsaGrpOperStateChanged
2.47.9. tmnxNatIsaMemberSessionUsageHigh
2.47.10. tmnxNatL2AwSubIcmpPortUsageHigh
2.47.11. tmnxNatL2AwSubSessionUsageHigh
2.47.12. tmnxNatL2AwSubTcpPortUsageHigh
2.47.13. tmnxNatL2AwSubUdpPortUsageHigh
2.47.14. tmnxNatLsnSubBlksFree
2.47.15. tmnxNatLsnSubIcmpPortUsgHigh
2.47.16. tmnxNatLsnSubSessionUsgHigh
2.47.17. tmnxNatLsnSubTcpPortUsgHigh
2.47.18. tmnxNatLsnSubUdpPortUsgHigh
2.47.19. tmnxNatMapRuleChange
2.47.20. tmnxNatMaxNbrSubsOrHostsExceeded
2.47.21. tmnxNatMdaActive
2.47.22. tmnxNatMdaDetectsLoadSharingErr
2.47.23. tmnxNatNbrSubsOrHostsBelowThrsh
2.47.24. tmnxNatPcpSrvStateChanged
2.47.25. tmnxNatPlAddrFree
2.47.26. tmnxNatPlBlockAllocationL2Aw
2.47.27. tmnxNatPlBlockAllocationLsn
2.47.28. tmnxNatPlL2AwBlockUsageHigh
2.47.29. tmnxNatPlLsnMemberBlockUsageHigh
2.47.30. tmnxNatPlLsnRedActiveChanged
2.47.31. tmnxNatResourceProblemCause
2.47.32. tmnxNatResourceProblemDetected
2.47.33. tmnxNatVrtrOutDnatOnlyRoutesHigh
2.48. NTP
2.48.1. tmnxNtpAuthMismatch
2.48.2. tmnxNtpNoServersAvail
2.48.3. tmnxNtpOperChange
2.48.4. tmnxNtpServerChange
2.48.5. tmnxNtpServersAvail
2.49. OAM
2.49.1. svcIdInvalid
2.49.2. svcIdWrongType
2.49.3. tmnxAncpLoopbackTestCompleted
2.49.4. tmnxAncpLoopbackTestCompletedL
2.49.5. tmnxOamLdpTtraceAutoDiscState
2.49.6. tmnxOamLdpTtraceFecDisStatus
2.49.7. tmnxOamLdpTtraceFecPFailUpdate
2.49.8. tmnxOamLdpTtraceFecProbeState
2.49.9. tmnxOamPingProbeFailedV3
2.49.10. tmnxOamPingTestCompletedV3
2.49.11. tmnxOamPingTestFailedV3
2.49.12. tmnxOamPmThrClear
2.49.13. tmnxOamPmThrRaise
2.49.14. tmnxOamSaaThreshold
2.49.15. tmnxOamTrPathChange
2.49.16. tmnxOamTrTestCompleted
2.49.17. tmnxOamTrTestFailed
2.49.18. tmnxTwampSrvInactivityTimeout
2.49.19. tmnxTwampSrvMaxConnsExceeded
2.49.20. tmnxTwampSrvMaxSessExceeded
2.49.21. tmnxTwampSrvPfxMaxConnsExceeded
2.49.22. tmnxTwampSrvPfxMaxSessExceeded
2.50. OPEN_FLOW
2.50.1. tmnxOFFlowEntryInsertFailed
2.51. OSPF
2.51.1. tmnxOspfAdjBfdSessionSetupFail
2.51.2. tmnxOspfAreaMaxAgeLsa
2.51.3. tmnxOspfAreaOriginateLsa
2.51.4. tmnxOspfAsMaxAgeLsa
2.51.5. tmnxOspfAsOriginateLsa
2.51.6. tmnxOspfExportLimitReached
2.51.7. tmnxOspfExportLimitWarning
2.51.8. tmnxOspfFailureDisabled
2.51.9. tmnxOspfLsdbApproachingOverflow
2.51.10. tmnxOspfLsdbOverflow
2.51.11. tmnxOspfNgIfAuthFailure
2.51.12. tmnxOspfNgIfConfigError
2.51.13. tmnxOspfNgIfRxBadPacket
2.51.14. tmnxOspfNgIfStateChange
2.51.15. tmnxOspfNgIfTxRetransmit
2.51.16. tmnxOspfNgLdpSyncExit
2.51.17. tmnxOspfNgLdpSyncTimerStarted
2.51.18. tmnxOspfNgLinkMaxAgeLsa
2.51.19. tmnxOspfNgLinkOriginateLsa
2.51.20. tmnxOspfNgNbrRestartHlprStsChg
2.51.21. tmnxOspfNgNbrStateChange
2.51.22. tmnxOspfNssaTranslatorStatusChg
2.51.23. tmnxOspfOverloadEntered
2.51.24. tmnxOspfOverloadExited
2.51.25. tmnxOspfOverloadWarning
2.51.26. tmnxOspfRejectedAdjacencySet
2.51.27. tmnxOspfRejectedAdjacencySid
2.51.28. tmnxOspfRestartStatusChange
2.51.29. tmnxOspfRoutesExpLmtDropped
2.51.30. tmnxOspfShamIfAuthFailure
2.51.31. tmnxOspfShamIfConfigError
2.51.32. tmnxOspfShamIfRxBadPacket
2.51.33. tmnxOspfShamIfStateChange
2.51.34. tmnxOspfShamIfTxRetransmit
2.51.35. tmnxOspfShamNbrRestartHlprStsChg
2.51.36. tmnxOspfShamNbrStateChange
2.51.37. tmnxOspfSpfRunsRestarted
2.51.38. tmnxOspfSpfRunsStopped
2.51.39. tmnxOspfSrgbBadLabelRange
2.51.40. tmnxOspfSrSidError
2.51.41. tmnxOspfSrSidNotInLabelRange
2.51.42. tmnxOspfVirtIfAuthFailure
2.51.43. tmnxOspfVirtIfConfigError
2.51.44. tmnxOspfVirtIfRxBadPacket
2.51.45. tmnxOspfVirtIfStateChange
2.51.46. tmnxOspfVirtIfTxRetransmit
2.51.47. tmnxOspfVirtNbrRestartHlprStsChg
2.51.48. tmnxOspfVirtNbrStateChange
2.52. PCAP
2.52.1. tmnxPcapBufferFull
2.52.2. tmnxPcapBufferReadWriteFailure
2.52.3. tmnxPcapFileError
2.52.4. tmnxPcapSoftwareFailure
2.53. PIM
2.53.1. vRtrPimNgBSRStateChange
2.53.2. vRtrPimNgDataMtReused
2.53.3. vRtrPimNgGrpInSSMRange
2.53.4. vRtrPimNgHelloDropped
2.53.5. vRtrPimNgIfNeighborLoss
2.53.6. vRtrPimNgIfNeighborUp
2.53.7. vRtrPimNgInvalidIPmsiTunnel
2.53.8. vRtrPimNgInvalidJoinPrune
2.53.9. vRtrPimNgInvalidRegister
2.53.10. vRtrPimNgMaxGraftRetry
2.53.11. vRtrPimNgMaxGrpsLimitExceeded
2.53.12. vRtrPimNgMcacPlcyDropped
2.53.13. vRtrPimNgMDTLimitExceeded
2.53.14. vRtrPimNgReplicationLmtExceeded
2.53.15. vRtrPimNgSGLimitExceeded
2.54. PIM_SNOOPING
2.54.1. tmnxPimSnpgIfNeighborLoss
2.54.2. tmnxPimSnpgIfNeighborUp
2.54.3. tmnxPimSnpgSGLimitExceeded
2.54.4. tmnxPimSnpgSnoopModeChanged
2.55. PORT
2.55.1. SFPStatusBlocked
2.55.2. SFPStatusCulprit
2.55.3. SFPStatusDDMCorrupt
2.55.4. SFPStatusFailure
2.55.5. SFPStatusOperational
2.55.6. SFPStatusReadError
2.55.7. SFPStatusUnsupported
2.55.8. tmnxBundleMemberMlfrLoopback
2.55.9. tmnxCellularBearerCreated
2.55.10. tmnxCellularBearerDeleted
2.55.11. tmnxCellularBearerModified
2.55.12. tmnxDS1E1LoopbackStarted
2.55.13. tmnxDS1E1LoopbackStopped
2.55.14. tmnxDS3E3LoopbackStarted
2.55.15. tmnxDS3E3LoopbackStopped
2.55.16. tmnxDSXClockSyncStateChange
2.55.17. tmnxEqCohOptPortAlarm
2.55.18. tmnxEqDigitalDiagMonitorClear
2.55.19. tmnxEqDigitalDiagMonitorFailure
2.55.20. tmnxEqPortBndlBadEndPtDiscr
2.55.21. tmnxEqPortBndlRedDiffExceeded
2.55.22. tmnxEqPortBndlYellowDiffExceeded
2.55.23. tmnxEqPortDS1Alarm
2.55.24. tmnxEqPortDS1AlarmClear
2.55.25. tmnxEqPortDS3Alarm
2.55.26. tmnxEqPortDS3AlarmClear
2.55.27. tmnxEqPortDuplexCfgNotCompatible
2.55.28. tmnxEqPortError
2.55.29. tmnxEqPortEtherAlarm
2.55.30. tmnxEqPortEtherAlarmClear
2.55.31. tmnxEqPortEtherCrcAlarm
2.55.32. tmnxEqPortEtherCrcAlarmClear
2.55.33. tmnxEqPortEtherEgressRateChange
2.55.34. tmnxEqPortEtherInternalAlarm
2.55.35. tmnxEqPortEtherInternalAlarmClr
2.55.36. tmnxEqPortEtherLoopCleared
2.55.37. tmnxEqPortEtherLoopDetected
2.55.38. tmnxEqPortEtherSymMonAlarm
2.55.39. tmnxEqPortEtherSymMonAlarmClear
2.55.40. tmnxEqPortIngressRateCfgNotCompatible
2.55.41. tmnxEqPortSFPInserted
2.55.42. tmnxEqPortSFPRemoved
2.55.43. tmnxEqPortSonetAlarm
2.55.44. tmnxEqPortSonetAlarmClear
2.55.45. tmnxEqPortSonetPathAlarm
2.55.46. tmnxEqPortSonetPathAlarmClear
2.55.47. tmnxEqPortSpeedCfgNotCompatible
2.55.48. tmnxEqPortWaveTrackerAlarm
2.55.49. tmnxEqSonetClockSrcNotCompatible
2.55.50. tmnxEqSonetFramingNotCompatible
2.55.51. tmnxEqSonetSfThreshNotCompatible
2.55.52. tmnxOtuIfAlarmNotification
2.55.53. tmnxPortUnsupportedFunction
2.55.54. tmnxResvCbsPoolThreshAmber
2.55.55. tmnxResvCbsPoolThreshGreen
2.55.56. tmnxResvCbsPoolThreshRed
2.55.57. tmnxRS232ControlLeadSignalChg
2.55.58. tmnxRS232SquelchResetIssued
2.55.59. tmnxRS232SquelchStatusChange
2.55.60. tmnxSonetSDHLoopbackStarted
2.55.61. tmnxSonetSDHLoopbackStopped
2.55.62. tPortAccEgrQGrpHostMatchFailure
2.55.63. tPortEgrVPortHostMatchFailure
2.56. PPP
2.56.1. ipcpPeerOnDifferentSubnet
2.56.2. ipcpPeerRejectedOurIp
2.56.3. ipcpPeerSuggestedDifferentIp
2.56.4. ipcpRemoteIpUnknown
2.56.5. ipcpSameLocalAndRemoteIp
2.56.6. ipv6cpPeerOnDifferentSubnet
2.56.7. ipv6cpPeerRejectedOurIntId
2.56.8. ipv6cpPeerSuggestedDiffIntId
2.56.9. ipv6cpRemoteIntIdUnknown
2.56.10. ipv6cpSameLocalAndRemoteIntId
2.56.11. tmnxPppCpDown
2.56.12. tmnxPppCpUp
2.56.13. tmnxPppKeepaliveFailure
2.56.14. tmnxPppLoopback
2.56.15. tmnxPppLoopbackClear
2.56.16. tmnxPppLqmFailure
2.56.17. tmnxPppNcpDown
2.56.18. tmnxPppNcpUp
2.57. PPPOE
2.57.1. tmnxMlpppBundleIndicatorsChange
2.57.2. tmnxPppoeLacSteeringActive
2.57.3. tmnxPppoeLacSteeringFailed
2.57.4. tmnxPppoeLacSteeringStopped
2.57.5. tmnxPppoeNcpFailure
2.57.6. tmnxPppoeSessionFailure
2.58. PPPOE_CLNT
2.58.1. tmnxPppoeClientEchoTimeout
2.58.2. tmnxPppoeClientNcpFailure
2.58.3. tmnxPppoeClientSetupFailure
2.59. PTP
2.59.1. tmnxPtpCardNotSupported
2.59.2. tmnxPtpCardNotSupportedClear
2.59.3. tmnxPtpClockRecoveryStateChange
2.59.4. tmnxPtpDynamicChange
2.59.5. tmnxPtpMasterClockChangedEvent
2.59.6. tmnxPtpOutOfResources
2.59.7. tmnxPtpOutOfResourcesClear
2.59.8. tmnxPtpPortNoTimestamping
2.60. RADIUS
2.60.1. tmnxRadAcctOnOngoing
2.60.2. tmnxRadRouteDownloadFailed
2.60.3. tmnxRadSrvPlcySrvOperStateCh
2.61. RIP
2.61.1. ripPacketDiscarded
2.61.2. vRtrRipAuthTypeFailure
2.61.3. vRtrRipAuthTypeMismatch
2.61.4. vRtrRipInstanceExpLmtReached
2.61.5. vRtrRipInstanceExpLmtWarning
2.61.6. vRtrRipInstanceRestarted
2.61.7. vRtrRipInstanceRtsExpLmtDropped
2.61.8. vRtrRipInstanceShuttingDown
2.61.9. vRtrRipPeerBfdDown
2.62. RIP_NG
2.62.1. tmnxRipNgAuthFailure
2.62.2. tmnxRipNgAuthTypeMismatch
2.62.3. tmnxRipNgIfUcastAddrNotUsed
2.62.4. tmnxRipNgInstExpLmtReached
2.62.5. tmnxRipNgInstExpLmtWarning
2.62.6. tmnxRipNgInstRestarted
2.62.7. tmnxRipNgInstRtsExpLmtDropped
2.62.8. tmnxRipNgInstShuttingDown
2.62.9. tmnxRipNgPacketDiscarded
2.62.10. tmnxRipNgPeerBfdDown
2.63. ROUTE_POLICY
2.63.1. trigPolicyPrevEval
2.64. RPKI
2.64.1. tmnxRpkiNotifySession
2.64.2. tmnxRpkiStaleTimerExpiry
2.65. RSVP
2.65.1. vRtrRsvpIfNbrStateDown
2.65.2. vRtrRsvpIfNbrStateUp
2.65.3. vRtrRsvpIfStateChange
2.65.4. vRtrRsvpPEFailOverPriToStdBy
2.65.5. vRtrRsvpPEFailOverStdByToPri
2.65.6. vRtrRsvpStateChange
2.66. SATELLITE
2.66.1. tmnxSatelliteCommsDown
2.66.2. tmnxSatelliteCommsUp
2.66.3. tmnxSatelliteFailure
2.66.4. tmnxSatelliteFailureClear
2.66.5. tmnxSatelliteOperStateChange
2.66.6. tmnxSatLocalForwardSapStateChg
2.66.7. tmnxSatLocalForwardStateChg
2.66.8. tmnxSatSyncIfTimHoldover
2.66.9. tmnxSatSyncIfTimHoldoverClear
2.66.10. tmnxSatSyncIfTimRef1Alarm
2.66.11. tmnxSatSyncIfTimRef1AlarmClear
2.66.12. tmnxSatSyncIfTimRef1Quality
2.66.13. tmnxSatSyncIfTimRef2Alarm
2.66.14. tmnxSatSyncIfTimRef2AlarmClear
2.66.15. tmnxSatSyncIfTimRef2Quality
2.66.16. tmnxSatSyncIfTimRefSwitch
2.66.17. tmnxSatSyncIfTimSystemQuality
2.67. SECURITY
2.67.1. cli_user_login
2.67.2. cli_user_login_failed
2.67.3. cli_user_login_max_attempts
2.67.4. cli_user_logout
2.67.5. enable_admin
2.67.6. ftp_transfer_failed
2.67.7. ftp_transfer_successful
2.67.8. ftp_user_login
2.67.9. ftp_user_login_failed
2.67.10. ftp_user_login_max_attempts
2.67.11. ftp_user_logout
2.67.12. grpc_user_login
2.67.13. grpc_user_login_failed
2.67.14. grpc_user_login_max_attempts
2.67.15. grpc_user_logout
2.67.16. host_snmp_attempts
2.67.17. mafEntryMatch
2.67.18. netconf_user_login
2.67.19. netconf_user_login_failed
2.67.20. netconf_user_login_max_attempts
2.67.21. netconf_user_logout
2.67.22. radiusInetServerOperStatusChange
2.67.23. radiusOperStatusChange
2.67.24. radiusSystemIpAddrNotSet
2.67.25. radiusUserProfileInvalid
2.67.26. sapDcpDynamicConform
2.67.27. sapDcpDynamicEnforceAlloc
2.67.28. sapDcpDynamicEnforceFreed
2.67.29. sapDcpDynamicExcd
2.67.30. sapDcpDynamicHoldDownEnd
2.67.31. sapDcpDynamicHoldDownStart
2.67.32. sapDcpLocMonExcd
2.67.33. sapDcpLocMonExcdAllDynAlloc
2.67.34. sapDcpLocMonExcdAllDynFreed
2.67.35. sapDcpLocMonExcdDynResource
2.67.36. sapDcpStaticConform
2.67.37. sapDcpStaticExcd
2.67.38. sapDcpStaticHoldDownEnd
2.67.39. sapDcpStaticHoldDownStart
2.67.40. SSH_server_preserve_key_fail
2.67.41. ssh_user_login
2.67.42. ssh_user_login_failed
2.67.43. ssh_user_login_max_attempts
2.67.44. ssh_user_logout
2.67.45. sysDNSSecFailedAuthentication
2.67.46. tacplusInetSrvrOperStatusChange
2.67.47. tacplusOperStatusChange
2.67.48. tmnxAppPkiCertVerificationFailed
2.67.49. tmnxCAProfileStateChange
2.67.50. tmnxCAProfUpDueToRevokeChkCrlOpt
2.67.51. tmnxCliGroupSessionLimitExceeded
2.67.52. tmnxConfigCreate
2.67.53. tmnxConfigDelete
2.67.54. tmnxConfigModify
2.67.55. tmnxCpmProtDefPolModified
2.67.56. tmnxCpmProtExcdSapEcm
2.67.57. tmnxCpmProtExcdSapIp
2.67.58. tmnxCpmProtExcdSdpBind
2.67.59. tmnxCpmProtExcdSdpBindEcm
2.67.60. tmnxCpmProtExcdSdpBindIp
2.67.61. tmnxCpmProtViolIf
2.67.62. tmnxCpmProtViolIfOutProf
2.67.63. tmnxCpmProtViolMac
2.67.64. tmnxCpmProtViolPort
2.67.65. tmnxCpmProtViolPortAgg
2.67.66. tmnxCpmProtViolSap
2.67.67. tmnxCpmProtViolSapOutProf
2.67.68. tmnxCpmProtViolSdpBind
2.67.69. tmnxCpmProtViolSdpBindOutProf
2.67.70. tmnxCpmProtViolVdoSvcClient
2.67.71. tmnxCpmProtViolVdoVrtrClient
2.67.72. tmnxDcpCardFpEventOvrflw
2.67.73. tmnxDcpCardFpEventOvrflwClr
2.67.74. tmnxDcpCardSapEventOvrflw
2.67.75. tmnxDcpCardSapEventOvrflwClr
2.67.76. tmnxDcpCardVrtrIfEventOvrflw
2.67.77. tmnxDcpCardVrtrIfEventOvrflwClr
2.67.78. tmnxDcpFpDynPoolUsageHiAlmClear
2.67.79. tmnxDcpFpDynPoolUsageHiAlmRaise
2.67.80. tmnxKeyChainAuthFailure
2.67.81. tmnxMD5AuthFailure
2.67.82. tmnxPkiCAProfActnStatusChg
2.67.83. tmnxPkiCAProfCrlUpdAllUrlsFail
2.67.84. tmnxPkiCAProfCrlUpdateStart
2.67.85. tmnxPkiCAProfCrlUpdateSuccess
2.67.86. tmnxPkiCAProfCrlUpdateUrlFail
2.67.87. tmnxPkiCAProfCrlUpdLargPreUpdTm
2.67.88. tmnxPkiCAProfCrlUpdNoNxtUpdTime
2.67.89. tmnxPkiCAProfRevokeChkWarning
2.67.90. tmnxPkiCertAfterExpWarning
2.67.91. tmnxPkiCertBeforeExpWarning
2.67.92. tmnxPkiCertExpWarningCleared
2.67.93. tmnxPkiCertNotYetValid
2.67.94. tmnxPkiCertVerificationFailed
2.67.95. tmnxPkiCRLAfterExpWarning
2.67.96. tmnxPkiCRLBeforeExpWarning
2.67.97. tmnxPkiCRLExpWarningCleared
2.67.98. tmnxPkiCRLNotYetValid
2.67.99. tmnxPkiFileReadFailed
2.67.100. tmnxPkiFileWriteFailed
2.67.101. tmnxSecComputeCertChainFailure
2.67.102. tmnxSecNotifFileReloaded
2.67.103. tmnxSecNotifKeyChainExpired
2.67.104. tmnxSecPwdHistoryFileLoadFailed
2.67.105. tmnxSecPwdHistoryFileWriteFailed
2.67.106. tmnxStateChange
2.67.107. tmnxSysLicenseActivated
2.67.108. tmnxSysLicenseExpiresSoon
2.67.109. tmnxSysLicenseInvalid
2.67.110. tmnxSysLicenseValid
2.67.111. tmnxUsrProfSessionLimitExceeded
2.67.112. user_disconnect
2.67.113. vRtrIfDcpDynamicConform
2.67.114. vRtrIfDcpDynamicEnforceAlloc
2.67.115. vRtrIfDcpDynamicEnforceFreed
2.67.116. vRtrIfDcpDynamicExcd
2.67.117. vRtrIfDcpDynamicHoldDownEnd
2.67.118. vRtrIfDcpDynamicHoldDownStart
2.67.119. vRtrIfDcpLocMonExcd
2.67.120. vRtrIfDcpLocMonExcdAllDynAlloc
2.67.121. vRtrIfDcpLocMonExcdAllDynFreed
2.67.122. vRtrIfDcpLocMonExcdDynResource
2.67.123. vRtrIfDcpStaticConform
2.67.124. vRtrIfDcpStaticExcd
2.67.125. vRtrIfDcpStaticHoldDownEnd
2.67.126. vRtrIfDcpStaticHoldDownStart
2.68. SFLOW
2.68.1. tmnxSflowCpEntrySampling
2.68.2. tmnxSflowPacketTxFailure
2.69. SNMP
2.69.1. authenticationFailure
2.69.2. coldStart
2.69.3. fallingAlarm
2.69.4. linkDown
2.69.5. linkUp
2.69.6. risingAlarm
2.69.7. snmpdError
2.69.8. warmStart
2.70. STP
2.70.1. higherPriorityBridge
2.70.2. newRootBridge
2.70.3. newRootSap
2.70.4. newRootVcpState
2.70.5. pipActiveProtocolChange
2.70.6. receivedTCN
2.70.7. sapActiveProtocolChange
2.70.8. sapEncapDot1d
2.70.9. sapEncapPVST
2.70.10. tmnxNewCistRegionalRootBridge
2.70.11. tmnxNewMstiRegionalRootBridge
2.70.12. tmnxPipStpExcepCondStateChng
2.70.13. tmnxSapStpExcepCondStateChng
2.70.14. tmnxSdpBndStpExcepCondStateChng
2.70.15. tmnxStpMeshNotInMstRegion
2.70.16. tmnxStpRootGuardViolation
2.70.17. tmnxSvcNewRootSdpBind
2.70.18. tmnxSvcSdpActiveProtocolChange
2.70.19. tmnxSvcSdpBindEncapDot1d
2.70.20. tmnxSvcSdpBindEncapPVST
2.70.21. tmnxSvcSdpBindRcvdHigherBriPrio
2.70.22. tmnxSvcSdpBindRcvdTCN
2.70.23. tmnxSvcTopoChgSdpBindMajorState
2.70.24. tmnxSvcTopoChgSdpBindState
2.70.25. topologyChangePipMajorState
2.70.26. topologyChangePipState
2.70.27. topologyChangeSapMajorState
2.70.28. topologyChangeSapState
2.70.29. topologyChangeVcpState
2.70.30. unacknowledgedTCN
2.70.31. vcpActiveProtocolChange
2.71. SVCMGR
2.71.1. aluIpTransportStateChanged
2.71.2. dynamicSdpBindConfigChanged
2.71.3. dynamicSdpBindCreationFailed
2.71.4. dynamicSdpConfigChanged
2.71.5. dynamicSdpCreationFailed
2.71.6. hostConnectivityLost
2.71.7. hostConnectivityRestored
2.71.8. iesIfStatusChanged
2.71.9. msapCreationFailure
2.71.10. msapStateChanged
2.71.11. sapAtmPppNcpFailure
2.71.12. sapAtmPppSessionFailure
2.71.13. sapCemPacketDefectAlarm
2.71.14. sapCemPacketDefectAlarmClear
2.71.15. sapEthLoopbackStarted
2.71.16. sapEthLoopbackStopped
2.71.17. sapHostBGPPeeringSetupFailed
2.71.18. sapHostRipListenerSetupFailed
2.71.19. sapIfIgnorePortStateStart
2.71.20. sapIfIgnorePortStateStop
2.71.21. sapIpipeCeIpAddrChange
2.71.22. sapPortStateChangeProcessed
2.71.23. sapReceivedProtSrcMac
2.71.24. sapStatusChanged
2.71.25. sapTlsDataSapInstStatusChgd
2.71.26. sapTlsMacAddrLimitAlarmCleared
2.71.27. sapTlsMacAddrLimitAlarmRaised
2.71.28. sapTlsMacMoveExceeded
2.71.29. sapTlsMacMoveExceedNonBlock
2.71.30. sapTunnelEncapIpMtuTooSmall
2.71.31. sapTunnelStateChange
2.71.32. sdpBandwidthOverbooked
2.71.33. sdpBindEthLoopbackStarted
2.71.34. sdpBindEthLoopbackStopped
2.71.35. sdpBindInsufficientBandwidth
2.71.36. sdpBindIpipeCeIpAddressChange
2.71.37. sdpBindPwLocalStatusBitsChanged
2.71.38. sdpBindPwPeerFaultAddrChanged
2.71.39. sdpBindPwPeerStatusBitsChanged
2.71.40. sdpBindReceivedProtSrcMac
2.71.41. sdpBindSdpStateChangeProcessed
2.71.42. sdpBindStatusChanged
2.71.43. sdpBindTlsMacMoveExceeded
2.71.44. sdpBindTlsMacMoveExceedNonBlock
2.71.45. sdpControlPwActiveStateChg
2.71.46. sdpEgrIfsNetDomInconsCntChanged
2.71.47. sdpKeepAliveLateReply
2.71.48. sdpKeepAliveProbeFailure
2.71.49. sdpKeepAliveStarted
2.71.50. sdpKeepAliveStopped
2.71.51. sdpPbbActvPwWithNonActvCtrlPwChg
2.71.52. sdpStatusChanged
2.71.53. sdpTlsMacAddrLimitAlarmCleared
2.71.54. sdpTlsMacAddrLimitAlarmRaised
2.71.55. svcArpHostOverride
2.71.56. svcArpHostPopulateErr
2.71.57. svcBgpEvpnBHDupMacAddrsDetected
2.71.58. svcBgpEvpnDupMacAddrsCleared
2.71.59. svcBgpEvpnDupMacAddrsDetected
2.71.60. svcBindSysHiUsageAlarmCleared
2.71.61. svcBindSysHiUsageAlarmRaised
2.71.62. svcEndPointMacLimitAlarmCleared
2.71.63. svcEndPointMacLimitAlarmRaised
2.71.64. svcEpipePbbOperStatusChanged
2.71.65. svcEPMCEPConfigMismatch
2.71.66. svcEPMCEPConfigMismatchResolved
2.71.67. svcEPMCEPPassiveModeActive
2.71.68. svcEPMCEPPassiveModePassive
2.71.69. svcEvpnEtreeBumLabelSysHiUsgClr
2.71.70. svcEvpnEtreeBumLabelSysHiUsgSet
2.71.71. svcEvpnMHEsEviDFStateChgd
2.71.72. svcEvpnMHEsIsidDFStateChgd
2.71.73. svcEvpnMHStandbyStatusChg
2.71.74. svcEvpnMplsMacMoveExceedNonBlock
2.71.75. svcEvpnMplsTEPEgrBndSvcHiUsgClr
2.71.76. svcEvpnMplsTEPEgrBndSvcHiUsgSet
2.71.77. svcEvpnMplsTEPEgrBndSysHiUsgClr
2.71.78. svcEvpnMplsTEPEgrBndSysHiUsgSet
2.71.79. svcEvpnMplsTEPHiUsageCleared
2.71.80. svcEvpnMplsTEPHiUsageRaised
2.71.81. svcEvpnRcvdProtSrcMac
2.71.82. svcFdbMimDestTblFullAlrm
2.71.83. svcFdbMimDestTblFullAlrmCleared
2.71.84. svcMSPwRetryExpiredNotif
2.71.85. svcMSPwRtMisconfig
2.71.86. svcOperGrpOperStatusChanged
2.71.87. svcPersistencyProblem
2.71.88. svcRestoreHostProblem
2.71.89. svcSiteMinDnTimerStateChg
2.71.90. svcStatusChanged
2.71.91. svcSysEvpnESDfPrefOperValChange
2.71.92. svcTlsEvpnTunnNHopHiUsgAlarmClr
2.71.93. svcTlsEvpnTunnNHopHiUsgAlarmSet
2.71.94. svcTlsFdbTableFullAlarmCleared
2.71.95. svcTlsFdbTableFullAlarmRaised
2.71.96. svcTlsGroupOperStatusChanged
2.71.97. svcTlsMacPinningViolation
2.71.98. svcTlsMfibTableFullAlarmCleared
2.71.99. svcTlsMfibTableFullAlarmRaised
2.71.100. svcTlsMrpAttrRegistrationFailed
2.71.101. svcTlsMrpAttrTblFullAlarmCleared
2.71.102. svcTlsMrpAttrTblFullAlarmRaised
2.71.103. svcTlsProxyArpDupClear
2.71.104. svcTlsProxyArpDupDetect
2.71.105. svcTlsProxyArpSvcHiUsgClr
2.71.106. svcTlsProxyArpSvcHiUsgSet
2.71.107. svcTlsProxyArpSysHiUsgClr
2.71.108. svcTlsProxyArpSysHiUsgSet
2.71.109. svcTlsProxyNdDupClear
2.71.110. svcTlsProxyNdDupDetect
2.71.111. svcTlsProxyNdSvcHiUsgClr
2.71.112. svcTlsProxyNdSvcHiUsgSet
2.71.113. svcTlsProxyNdSysHiUsgClr
2.71.114. svcTlsProxyNdSysHiUsgSet
2.71.115. svcTlsSiteDesigFwdrChg
2.71.116. svcTlsVTEPEgrVniSvcHiUsgAlarmClr
2.71.117. svcTlsVTEPEgrVniSvcHiUsgAlarmSet
2.71.118. svcTlsVTEPEgrVniSysHiUsgAlarmClr
2.71.119. svcTlsVTEPEgrVniSysHiUsgAlarmSet
2.71.120. svcTlsVTEPHiUsageAlarmCleared
2.71.121. svcTlsVTEPHiUsageAlarmRaised
2.71.122. svcTlsVxInstReplicatorChgd
2.71.123. svcVllSiteDesigFwdrChg
2.71.124. svcVxlanEvpnMplsDestSysHiUsgClr
2.71.125. svcVxlanEvpnMplsDestSysHiUsgSet
2.71.126. tmnxEndPointTxActiveChanged
2.71.127. tmnxIpTunnelOperRemIpChg
2.71.128. tmnxIpTunnelOperStateChange
2.71.129. tmnxSapStpExcepCondStateChng
2.71.130. tmnxStpRootGuardViolation
2.71.131. tmnxSubAcctPlcyFailure
2.71.132. tmnxSubAcctPlcyRadSerOperStatChg
2.71.133. tmnxSubAuthPlcyRadSerOperStatChg
2.71.134. tmnxSubBrgCreated
2.71.135. tmnxSubBrgCvInitFailed
2.71.136. tmnxSubBrgDeleted
2.71.137. tmnxSubBrgRadiusAuthError
2.71.138. tmnxSubBrgRadiusCoaError
2.71.139. tmnxSubBrgRadiusProxyAuthError
2.71.140. tmnxSubBrgRadiusUpdateIpoeSeFail
2.71.141. tmnxSubBrgSessionLimitReached
2.71.142. tmnxSubDhcpOverloadDetected
2.71.143. tmnxSubHostInconsistentAtmTdOvr
2.71.144. tmnxSubHostInfoConflict
2.71.145. tmnxSubHostLcktLimitReached
2.71.146. tmnxSubHostLcktSapLimitReached
2.71.147. tmnxSubIpoeInvalidCidRidChange
2.71.148. tmnxSubIpoeInvalidSessionKey
2.71.149. tmnxSubIpoeMigrHostDeleted
2.71.150. tmnxSubIpoePersistenceRecovery
2.71.151. tmnxSubIpoeSessionBrgNotAuth
2.71.152. tmnxSubIpoeSessionLimitReached
2.71.153. tmnxSubMcsRelatedProblem
2.71.154. tmnxSubMngdHostCreationFail
2.71.155. tmnxSubMngdHostOverride
2.71.156. tmnxSubPlBndFailed
2.71.157. tmnxSubRadiusCoaNatFwdFailed
2.71.158. tmnxSubRadSapCoAError
2.71.159. tmnxSubRadSapDisconnectError
2.71.160. tmnxSubRadSapSubAuthError
2.71.161. tmnxSubRadSdpBndCoAError
2.71.162. tmnxSubRadSdpBndDisconnectError
2.71.163. tmnxSubRadSdpBndSubAuthError
2.71.164. tmnxSubscriberCreated
2.71.165. tmnxSubscriberDeleted
2.71.166. tmnxSubscriberRenamed
2.71.167. tmnxSubSlaacOverride
2.71.168. tmnxSubSlaacSetupFailure
2.71.169. tmnxSubStatsResourceLimitReached
2.71.170. tmnxSubSysChassMemoryUsageHi
2.71.171. tmnxSubUserCategoryError
2.71.172. tmnxSubUserCategoryOutOfCredit
2.71.173. tmnxSubUserCategoryRefreshCredit
2.71.174. tmnxSubVSubnetHostsDeleted
2.71.175. tmnxSvcSysFdbTableHighUsgClr
2.71.176. tmnxSvcSysFdbTableHighUsgSet
2.72. SYSTEM
2.72.1. persistenceRestoreProblem
2.72.2. persistencyClosedAlarmCleared
2.72.3. persistencyClosedAlarmRaised
2.72.4. persistencyEventReport
2.72.5. persistencyFileSysThresCleared
2.72.6. persistencyFileSysThresRaised
2.72.7. sbiBootConfig
2.72.8. sbiBootConfigFailFileError
2.72.9. sbiBootConfigOKFileError
2.72.10. sbiBootSnmpd
2.72.11. schedActionFailure
2.72.12. smScriptAbort
2.72.13. smScriptException
2.72.14. smScriptResult
2.72.15. sntpTimeDiffExceedsThreshold
2.72.16. socket_bind_failed
2.72.17. socket_conn_accept_failed
2.72.18. ssiSaveConfigFailed
2.72.19. ssiSaveConfigSucceeded
2.72.20. ssiSyncBootEnvFailed
2.72.21. ssiSyncBootEnvOK
2.72.22. ssiSyncCertFailed
2.72.23. ssiSyncCertOK
2.72.24. ssiSyncConfigFailed
2.72.25. ssiSyncConfigOK
2.72.26. ssiSyncRollbackFailed
2.72.27. ssiSyncRollbackOK
2.72.28. stiDateAndTimeChanged
2.72.29. tmnxConfigConflict
2.72.30. tmnxConfigCreate
2.72.31. tmnxConfigDelete
2.72.32. tmnxConfigModify
2.72.33. tmnxEhsDroppedByMinDelay
2.72.34. tmnxEhsHandlerInvoked
2.72.35. tmnxFtpClientFailure
2.72.36. tmnxModuleMallocFailed
2.72.37. tmnxRedCpmActive
2.72.38. tmnxRedSingleCpm
2.72.39. tmnxRedStandbyReady
2.72.40. tmnxRedStandbySyncing
2.72.41. tmnxRedStandbySyncLost
2.72.42. tmnxRedSwitchover
2.72.43. tmnxSmLaunchStartFailed
2.72.44. tmnxSnmpdStateChange
2.72.45. tmnxSntpOperChange
2.72.46. tmnxSssiMismatch
2.72.47. tmnxStateChange
2.72.48. tmnxSysAppStats24HrsAvailable
2.72.49. tmnxSysAppStatsWeekAvailable
2.72.50. tmnxSysBaseMacAddressNotSet
2.72.51. tmnxSysExecFinished
2.72.52. tmnxSysExecStarted
2.72.53. tmnxSysNvsysFileError
2.72.54. tmnxSysRollbackDeleteStarted
2.72.55. tmnxSysRollbackFileDeleteStatus
2.72.56. tmnxSysRollbackSaveStarted
2.72.57. tmnxSysRollbackSaveStatusChange
2.72.58. tmnxSysRollbackStarted
2.72.59. tmnxSysRollbackStatusChange
2.72.60. tmnxSysVsdServerAvailable
2.72.61. tmnxSysVsdServerUnavailable
2.72.62. tmnxSysXmppServerFunctional
2.72.63. tmnxSysXmppServerNotFunctional
2.72.64. tmnxTrapDropped
2.73. USER
2.73.1. cli_config_io
2.73.2. cli_unauth_config_io
2.73.3. cli_unauth_user_io
2.73.4. cli_user_io
2.73.5. cli_user_login
2.73.6. cli_user_login_failed
2.73.7. cli_user_login_max_attempts
2.73.8. cli_user_logout
2.73.9. ftp_user_login
2.73.10. ftp_user_login_failed
2.73.11. ftp_user_login_max_attempts
2.73.12. ftp_user_logout
2.73.13. grpc_config_io
2.73.14. grpc_unauth_config_io
2.73.15. grpc_unauth_user_io
2.73.16. grpc_user_io
2.73.17. grpc_user_login
2.73.18. grpc_user_login_failed
2.73.19. grpc_user_login_max_attempts
2.73.20. grpc_user_logout
2.73.21. md_cli_config_io
2.73.22. md_cli_unauth_config_io
2.73.23. md_cli_unauth_user_io
2.73.24. md_cli_user_io
2.73.25. netconf_config_io
2.73.26. netconf_unauth_config_io
2.73.27. netconf_unauth_user_io
2.73.28. netconf_user_io
2.73.29. netconf_user_login
2.73.30. netconf_user_login_failed
2.73.31. netconf_user_login_max_attempts
2.73.32. netconf_user_logout
2.73.33. snmp_user_set
2.74. VIDEO
2.74.1. tmnxVdoAdSpliceAbort
2.74.2. tmnxVdoClientSessionsLmtCleared
2.74.3. tmnxVdoClientSessionsLmtExceeded
2.74.4. tmnxVdoDuplicateSsrcId
2.74.5. tmnxVdoGrpSrcAnlyzrErrState
2.74.6. tmnxVdoGrpSrcAnlyzrStClear
2.74.7. tmnxVdoMdaFccBwLimitCleared
2.74.8. tmnxVdoMdaFccBwLimitExceeded
2.74.9. tmnxVdoMdaFccRetTotBwLmtCleared
2.74.10. tmnxVdoMdaFccRetTotBwLmtExceeded
2.74.11. tmnxVdoMdaFccRetTotSeLmtCleared
2.74.12. tmnxVdoMdaFccRetTotSeLmtExceeded
2.74.13. tmnxVdoMdaFccSesLimitCleared
2.74.14. tmnxVdoMdaFccSesLimitExceeded
2.74.15. tmnxVdoMdaRetBwLimitCleared
2.74.16. tmnxVdoMdaRetBwLimitExceeded
2.74.17. tmnxVdoMdaRetSesLimitCleared
2.74.18. tmnxVdoMdaRetSesLimitExceeded
2.74.19. tmnxVdoMdaSessionsLimitCleared
2.74.20. tmnxVdoMdaSessionsLimitExceeded
2.74.21. tmnxVdoMdaSGLimitCleared
2.74.22. tmnxVdoMdaSGLimitExceeded
2.75. VRRP
2.75.1. tmnxVrrpBecameBackup
2.75.2. tmnxVrrpBfdIntfSessStateChgd
2.75.3. tmnxVrrpIPListMismatch
2.75.4. tmnxVrrpIPListMismatchClear
2.75.5. tmnxVrrpMultipleOwners
2.75.6. tmnxVrrpOperDownInvalidMac
2.75.7. tmnxVrrpOperDownInvalidMacClear
2.75.8. tVrrpBecameBackup
2.75.9. tVrrpIPListMismatch
2.75.10. tVrrpIPListMismatchClear
2.75.11. tVrrpMultipleOwners
2.75.12. tVrrpOperDownInvalidMac
2.75.13. tVrrpOperDownInvalidMacClear
2.75.14. tVrrpPacketDiscarded
2.75.15. tVrrpRouterAdvNotActivated
2.75.16. tVrrpRouterAdvNotActivatedClear
2.75.17. tVrrpTrapNewMaster
2.75.18. vrrpPacketDiscarded
2.75.19. vrrpTrapAuthFailure
2.75.20. vrrpTrapNewMaster
2.75.21. vrrpTrapProtoError
2.76. VRTR
2.76.1. tmnxVRtrArpLmt
2.76.2. tmnxVRtrArpThresholdExceeded
2.76.3. tmnxVRtrBfdExtNoCpmNpResources
2.76.4. tmnxVRtrBfdMaxSessionOnSlot
2.76.5. tmnxVRtrBfdPortTypeNotSupported
2.76.6. tmnxVRtrBfdSessExtDeleted
2.76.7. tmnxVRtrBfdSessExtDown
2.76.8. tmnxVRtrBfdSessExtProtChange
2.76.9. tmnxVRtrBfdSessExtUp
2.76.10. tmnxVRtrDnsFault
2.76.11. tmnxVRtrFibOccupancyThreshold
2.76.12. tmnxVRtrGrtExportLimitReached
2.76.13. tmnxVRtrGrtRoutesExpLimitDropped
2.76.14. tmnxVRtrGrtV6ExportLimitReached
2.76.15. tmnxVRtrGrtV6RoutesExpLimDropped
2.76.16. tmnxVRtrHighRouteCleared
2.76.17. tmnxVRtrHighRouteTCA
2.76.18. tmnxVRtrIfIgnorePortState
2.76.19. tmnxVRtrIfLdpSyncTimerStart
2.76.20. tmnxVRtrIfLdpSyncTimerStop
2.76.21. tmnxVRtrInetAddressAttachFailed
2.76.22. tmnxVRtrIPv6HighRouteCleared
2.76.23. tmnxVRtrIPv6HighRouteTCA
2.76.24. tmnxVRtrIPv6MidRouteTCA
2.76.25. tmnxVRtrIpv6NbrLmt
2.76.26. tmnxVRtrIpv6NbrThresholdExceeded
2.76.27. tmnxVRtrMacAcctLimitCleared
2.76.28. tmnxVRtrMacAcctLimitReached
2.76.29. tmnxVRtrManagedRouteAddFailed
2.76.30. tmnxVRtrMaxArpEntriesCleared
2.76.31. tmnxVRtrMaxArpEntriesTCA
2.76.32. tmnxVRtrMaxRoutes
2.76.33. tmnxVRtrMcastMaxRoutesCleared
2.76.34. tmnxVRtrMcastMaxRoutesTCA
2.76.35. tmnxVRtrMcastMidRouteTCA
2.76.36. tmnxVRtrMidRouteTCA
2.76.37. tmnxVRtrNgBfdNoCpmNpResources
2.76.38. tmnxVRtrNgBfdSessDeleted
2.76.39. tmnxVRtrNgBfdSessDown
2.76.40. tmnxVRtrNgBfdSessProtChange
2.76.41. tmnxVRtrNgBfdSessUp
2.76.42. tmnxVRtrNHRvplsARPExhaust
2.76.43. tmnxVRtrNHRvplsARPHighUsage
2.76.44. tmnxVRtrNHRvplsARPHighUsageClr
2.76.45. tmnxVRtrPdnAddrMismatch
2.76.46. tmnxVRtrPdnAddrMismatchCleared
2.76.47. tmnxVRtrSingleSfmOverloadStateCh
2.76.48. tmnxVRtrStaticRouteCPEStatus
2.76.49. tmnxVRtrStaticRouteStatusChanged
2.77. WLAN_GW
2.77.1. tmnxWlanGwBdCreated
2.77.2. tmnxWlanGwBdDeleted
2.77.3. tmnxWlanGwDsmGtpTunnelSetupFail
2.77.4. tmnxWlanGwGrpMemberUsageHigh
2.77.5. tmnxWlanGwGrpOperStateChanged
2.77.6. tmnxWlanGwGtpMessageDropped
2.77.7. tmnxWlanGwIomActive
2.77.8. tmnxWlanGwMgwConnected
2.77.9. tmnxWlanGwMgwRestarted
2.77.10. tmnxWlanGwMgwStateChanged
2.77.11. tmnxWlanGwNumMgwHi
2.77.12. tmnxWlanGwQosRadiusGtpMismatch
2.77.13. tmnxWlanGwResrcProblemCause
2.77.14. tmnxWlanGwResrcProblemDetected
2.77.15. tmnxWlanGwSubIfPmAddNewPlFailed
2.77.16. tmnxWlanGwSubIfPmCrIntObjFailed
2.77.17. tmnxWlanGwSubIfPmLsQryRtryFailed
2.77.18. tmnxWlanGwSubIfPmNewPlReqFailed
2.77.19. tmnxWlanGwSubIfPmPoolPartialUse
2.77.20. tmnxWlanGwSubIfPmPoolTimeout
2.77.21. tmnxWlanGwSubIfPmPoolUsageLow
2.77.22. tmnxWlanGwSubIfPmStartD6cFailed
2.77.23. tmnxWlanGwSubIfRedActiveChanged
2.77.24. tmnxWlanGwTuQosProblem
2.77.25. tmnxWlanGwUeCreationFail
2.77.26. tmnxWlanGwUeReplacement
2.78. WPP
2.78.1. tmnxWppHostAuthenticationFailed
2.78.2. tmnxWppPortalGroupStatChanged
2.78.3. tmnxWppPortalStatChanged
2.78.4. tmnxWppPortalUnreachable
Customer Document and Product Support
Log Events Tool
1. Log Events
1.1. In This Chapter
1.2. Log Events
1.3. Sample Log Event
2. SR Log Events
2.1. ADP
2.1.1. tmnxDiscoveryCellularReq
2.1.2. tmnxDiscoveryEndNotify
2.2. APPLICATION_ASSURANCE
2.2.1. tmnxBsxAarpInstOperStateChanged
2.2.2. tmnxBsxAarpInstStateChanged
2.2.3. tmnxBsxAaSubPolResExceeded
2.2.4. tmnxBsxAaSubPolResExceededClear
2.2.5. tmnxBsxAaSubscriberAcctDataLoss
2.2.6. tmnxBsxAaSubscribersUnassigned
2.2.7. tmnxBsxCertProfileOperStateChngd
2.2.8. tmnxBsxDatapathCpuUsage
2.2.9. tmnxBsxDatapathCpuUsageClear
2.2.10. tmnxBsxDnsIpCacheFull
2.2.11. tmnxBsxDnsIpCacheFullClear
2.2.12. tmnxBsxHttpUrlParamLimitExceeded
2.2.13. tmnxBsxIsaAaGrpBitRate
2.2.14. tmnxBsxIsaAaGrpBitRateClear
2.2.15. tmnxBsxIsaAaGrpCapCostThres
2.2.16. tmnxBsxIsaAaGrpCapCostThresClear
2.2.17. tmnxBsxIsaAaGrpFailureClearV2
2.2.18. tmnxBsxIsaAaGrpFailureV2
2.2.19. tmnxBsxIsaAaGrpFlowFull
2.2.20. tmnxBsxIsaAaGrpFlowFullClear
2.2.21. tmnxBsxIsaAaGrpFlowSetup
2.2.22. tmnxBsxIsaAaGrpFlowSetupClear
2.2.23. tmnxBsxIsaAaGrpFmSbWaSBufOvld
2.2.24. tmnxBsxIsaAaGrpFmSbWaSBufOvldClr
2.2.25. tmnxBsxIsaAaGrpNonRedundantV2
2.2.26. tmnxBsxIsaAaGrpOvrldCutthru
2.2.27. tmnxBsxIsaAaGrpOvrldCutthruClr
2.2.28. tmnxBsxIsaAaGrpPacketRate
2.2.29. tmnxBsxIsaAaGrpPacketRateClear
2.2.30. tmnxBsxIsaAaGrpSwitchover
2.2.31. tmnxBsxIsaAaGrpToSbWaSBufOvld
2.2.32. tmnxBsxIsaAaGrpToSbWaSBufOvldClr
2.2.33. tmnxBsxIsaAaSubLoadBalance
2.2.34. tmnxBsxIsaAaTimFileProcFailure
2.2.35. tmnxBsxMobileSubModifyFailure
2.2.36. tmnxBsxRadApFailure
2.2.37. tmnxBsxRadApIntrmUpdateSkipped
2.2.38. tmnxBsxRadApServOperStateChange
2.2.39. tmnxBsxStatFtrEnTcaThreshCrClear
2.2.40. tmnxBsxStatFtrEnTcaThreshCrossed
2.2.41. tmnxBsxStatFtrTcaThreshCrClear
2.2.42. tmnxBsxStatFtrTcaThreshCrossed
2.2.43. tmnxBsxStatPolcrTcaThreshCrClear
2.2.44. tmnxBsxStatPolcrTcaThreshCrossed
2.2.45. tmnxBsxStatTcaThreshCrossed
2.2.46. tmnxBsxStatTcaThreshCrossedClear
2.2.47. tmnxBsxSubModifyFailure
2.2.48. tmnxBsxSubQuarantined
2.2.49. tmnxBsxSubQuarantinedClear
2.2.50. tmnxBsxTcpValTcaCrossed
2.2.51. tmnxBsxTcpValTcaCrossedClear
2.2.52. tmnxBsxTransIpPolAaSubCreated
2.2.53. tmnxBsxTransIpPolAaSubDeleted
2.2.54. tmnxBsxTransIpPolDhcpAddWarning
2.2.55. tmnxBsxTransIpPolDhcpDelWarning
2.2.56. tmnxBsxTransIpPolDiamGxError
2.2.57. tmnxBsxTransIpPolRadCoAAudit
2.2.58. tmnxBsxTransIpPolRadCoAError
2.2.59. tmnxBsxTransIpPolRadDiscError
2.2.60. tmnxBsxTransitIpPersistenceWarn
2.2.61. tmnxBsxUrlFilterOperStateChange
2.2.62. tmnxBsxUrlListFailure
2.2.63. tmnxBsxUrlListUpdate
2.3. APS
2.3.1. apsEventChannelMismatch
2.3.2. apsEventFEPLF
2.3.3. apsEventModeMismatch
2.3.4. apsEventPSBF
2.3.5. apsEventSwitchover
2.3.6. tApsChannelMismatchClear
2.3.7. tApsChanTxLaisStateChange
2.3.8. tApsFEPLFClear
2.3.9. tApsLocalSwitchCommandClear
2.3.10. tApsLocalSwitchCommandSet
2.3.11. tApsMcApsCtlLinkStateChange
2.3.12. tApsModeMismatchClear
2.3.13. tApsPrimaryChannelChange
2.3.14. tApsPSBFClear
2.3.15. tApsRemoteSwitchCommandClear
2.3.16. tApsRemoteSwitchCommandSet
2.4. ATM
2.4.1. atmIfcStatusChange
2.4.2. atmIlmiPeerVclStatusChange
2.4.3. atmIlmiPeerVplStatusChange
2.4.4. atmVclStatusChange
2.4.5. atmVplStatusChange
2.4.6. atmVtlStatusChange
2.4.7. tAtmEpOutOfPeerVpiOrVciRange
2.4.8. tAtmIlmiLinkStatusChange
2.4.9. tAtmMaxPeerVccsExceeded
2.4.10. tAtmMaxPeerVpcsExceeded
2.4.11. tAtmPlcpSubLayerClear
2.4.12. tAtmPlcpSubLayerDown
2.4.13. tAtmTcSubLayerClear
2.4.14. tAtmTcSubLayerDown
2.5. AUTO_PROV
2.5.1. autoNodeProv
2.6. BFD
2.6.1. tmnxBfdOnLspSessDeleted
2.6.2. tmnxBfdOnLspSessDown
2.6.3. tmnxBfdOnLspSessNoCpmNpResources
2.6.4. tmnxBfdOnLspSessNoTailResources
2.6.5. tmnxBfdOnLspSessProtChange
2.6.6. tmnxBfdOnLspSessUp
2.7. BGP
2.7.1. bgpBackwardTransNotification
2.7.2. bgpCfgViol
2.7.3. bgpConnMgrTerminated
2.7.4. bgpConnNoKA
2.7.5. bgpConnNoOpenRcvd
2.7.6. bgpEstablishedNotification
2.7.7. bgpInterfaceDown
2.7.8. bgpNoMemoryPeer
2.7.9. bgpPeerNotFound
2.7.10. bgpRejectConnBadLocAddr
2.7.11. bgpRemoteEndClosedConn
2.7.12. bgpTerminated
2.7.13. bgpVariableRangeViolation
2.7.14. receiveNotification
2.7.15. sendNotification
2.7.16. tBgp4PathAttrDiscarded
2.7.17. tBgp4PathAttrInvalid
2.7.18. tBgp4RouteInvalid
2.7.19. tBgp4UpdateInvalid
2.7.20. tBgp4WithdrawnRtFromUpdateError
2.7.21. tBgpFibResourceFailPeer
2.7.22. tBgpFlowspecUnsupportdComAction
2.7.23. tBgpGeneral
2.7.24. tBgpInstanceDynamicPeerLmtReachd
2.7.25. tBgpMaxNgPfxLmt
2.7.26. tBgpMaxNgPfxLmtThresholdReached
2.7.27. tBgpNgBackwardTransition
2.7.28. tBgpNgEstablished
2.7.29. tBgpPeerGRStatusChange
2.7.30. tBgpPeerNgHoldTimeInconsistent
2.7.31. tBgpPGDynamicPeerLmtReached
2.7.32. tBgpReceivedInvalidNlri
2.8. CALLTRACE
2.8.1. calltraceDebugEvent
2.8.2. tmnxCallTraceLocSizeLimitReached
2.8.3. tmnxCallTraceMaxFilesNumReached
2.9. CFLOWD
2.9.1. tmnxCflowdCreateFailure
2.9.2. tmnxCflowdFlowCreateFailure
2.9.3. tmnxCflowdPacketTxFailure
2.9.4. tmnxCflowdStateChange
2.10. CHASSIS
2.10.1. CpmIcPortSFFStatusDDMCorrupt
2.10.2. CpmIcPortSFFStatusFailure
2.10.3. CpmIcPortSFFStatusReadError
2.10.4. CpmIcPortSFFStatusUnsupported
2.10.5. SfmIcPortSFFStatusDDMCorrupt
2.10.6. SfmIcPortSFFStatusFailure
2.10.7. SfmIcPortSFFStatusReadError
2.10.8. SfmIcPortSFFStatusUnsupported
2.10.9. tIPsecIsaMemHighWatermark
2.10.10. tIPsecIsaMemLowWatermark
2.10.11. tIPsecIsaMemMax
2.10.12. tmnxAlarmInputVoltageFailure
2.10.13. tmnxBluetoothModuleConnectionChg
2.10.14. tmnxCardResMacFdbHighUsgClr
2.10.15. tmnxCardResMacFdbHighUsgSet
2.10.16. tmnxChassisHiBwMcastAlarm
2.10.17. tmnxChassisNotificationClear
2.10.18. tmnxChassisUpgradeComplete
2.10.19. tmnxChassisUpgradeInProgress
2.10.20. tmnxCpmALocalIcPortAvail
2.10.21. tmnxCpmANoLocalIcPort
2.10.22. tmnxCpmBLocalIcPortAvail
2.10.23. tmnxCpmBNoLocalIcPort
2.10.24. tmnxCpmCardSyncFileNotPresent
2.10.25. tmnxCpmIcPortDDMClear
2.10.26. tmnxCpmIcPortDDMFailure
2.10.27. tmnxCpmIcPortDown
2.10.28. tmnxCpmIcPortSFFInserted
2.10.29. tmnxCpmIcPortSFFRemoved
2.10.30. tmnxCpmIcPortUp
2.10.31. tmnxCpmMemSizeMismatch
2.10.32. tmnxCpmMemSizeMismatchClear
2.10.33. tmnxDcpCardFpEventOvrflw
2.10.34. tmnxDcpCardFpEventOvrflwClr
2.10.35. tmnxDcpCardSapEventOvrflw
2.10.36. tmnxDcpCardSapEventOvrflwClr
2.10.37. tmnxDcpCardVrtrIfEventOvrflw
2.10.38. tmnxDcpCardVrtrIfEventOvrflwClr
2.10.39. tmnxDcpFpDynPoolUsageHiAlmClear
2.10.40. tmnxDcpFpDynPoolUsageHiAlmRaise
2.10.41. tmnxEnvTempTooHigh
2.10.42. tmnxEqBpEpromFail
2.10.43. tmnxEqBpEpromFailClear
2.10.44. tmnxEqBpEpromWarning
2.10.45. tmnxEqBpEpromWarningClear
2.10.46. tmnxEqCardChipIfCellEvent
2.10.47. tmnxEqCardChipIfDownEvent
2.10.48. tmnxEqCardFailure
2.10.49. tmnxEqCardFirmwareUpgraded
2.10.50. tmnxEqCardInserted
2.10.51. tmnxEqCardPChipCamEvent
2.10.52. tmnxEqCardPChipError
2.10.53. tmnxEqCardPChipMemoryEvent
2.10.54. tmnxEqCardQChipBufMemoryEvent
2.10.55. tmnxEqCardQChipIntMemoryEvent
2.10.56. tmnxEqCardQChipStatsMemoryEvent
2.10.57. tmnxEqCardRemoved
2.10.58. tmnxEqCardSoftResetAlarm
2.10.59. tmnxEqCardTChipParityEvent
2.10.60. tmnxEqDataPathFailureProtImpact
2.10.61. tmnxEqFlashDataLoss
2.10.62. tmnxEqFlashDiskFull
2.10.63. tmnxEqHwEnhancedCapability
2.10.64. tmnxEqLowSwitchFabricCap
2.10.65. tmnxEqLowSwitchFabricCapClear
2.10.66. tmnxEqMdaCfgNotCompatible
2.10.67. tmnxEqMdaIngrXplError
2.10.68. tmnxEqMdaSyncENotCompatible
2.10.69. tmnxEqMdaXplError
2.10.70. tmnxEqMgmtEthRedStandbyClear
2.10.71. tmnxEqMgmtEthRedStandbyRaise
2.10.72. tmnxEqPhysChassisFanFailure
2.10.73. tmnxEqPhysChassisFanFailureClear
2.10.74. tmnxEqPhysChassPowerSupAcFail
2.10.75. tmnxEqPhysChassPowerSupAcFailClr
2.10.76. tmnxEqPhysChassPowerSupDcFail
2.10.77. tmnxEqPhysChassPowerSupDcFailClr
2.10.78. tmnxEqPhysChassPowerSupInFail
2.10.79. tmnxEqPhysChassPowerSupInFailClr
2.10.80. tmnxEqPhysChassPowerSupOutFail
2.10.81. tmnxEqPhysChassPowerSupOutFailCl
2.10.82. tmnxEqPhysChassPowerSupOvrTmp
2.10.83. tmnxEqPhysChassPowerSupOvrTmpClr
2.10.84. tmnxEqPowerCapacityExceeded
2.10.85. tmnxEqPowerCapacityExceededClear
2.10.86. tmnxEqPowerLostCapacity
2.10.87. tmnxEqPowerLostCapacityClear
2.10.88. tmnxEqPowerOverloadState
2.10.89. tmnxEqPowerOverloadStateClear
2.10.90. tmnxEqPowerSafetyAlertClear
2.10.91. tmnxEqPowerSafetyAlertThreshold
2.10.92. tmnxEqPowerSafetyLevelClear
2.10.93. tmnxEqPowerSafetyLevelThreshold
2.10.94. tmnxEqPowerSupplyInserted
2.10.95. tmnxEqPowerSupplyRemoved
2.10.96. tmnxEqProvPowerCapacityAlm
2.10.97. tmnxEqProvPowerCapacityAlmClr
2.10.98. tmnxEqSyncIfTimingBITS2Alarm
2.10.99. tmnxEqSyncIfTimingBITS2AlarmClr
2.10.100. tmnxEqSyncIfTimingBITS2Quality
2.10.101. tmnxEqSyncIfTimingBITSAlarm
2.10.102. tmnxEqSyncIfTimingBITSAlarmClear
2.10.103. tmnxEqSyncIfTimingBITSOutRefChg
2.10.104. tmnxEqSyncIfTimingBITSQuality
2.10.105. tmnxEqSyncIfTimingHoldover
2.10.106. tmnxEqSyncIfTimingHoldoverClear
2.10.107. tmnxEqSyncIfTimingPTPAlarm
2.10.108. tmnxEqSyncIfTimingPTPAlarmClr
2.10.109. tmnxEqSyncIfTimingPTPQuality
2.10.110. tmnxEqSyncIfTimingRef1Alarm
2.10.111. tmnxEqSyncIfTimingRef1AlarmClear
2.10.112. tmnxEqSyncIfTimingRef1Quality
2.10.113. tmnxEqSyncIfTimingRef2Alarm
2.10.114. tmnxEqSyncIfTimingRef2AlarmClear
2.10.115. tmnxEqSyncIfTimingRef2Quality
2.10.116. tmnxEqSyncIfTimingRefSwitch
2.10.117. tmnxEqSyncIfTimingSystemQuality
2.10.118. tmnxEqWrongCard
2.10.119. tmnxExtStandbyCpmReboot
2.10.120. tmnxExtStandbyCpmRebootFail
2.10.121. tmnxGnssAcquiredFix
2.10.122. tmnxGnssAcquiringFix
2.10.123. tmnxInterChassisCommsDown
2.10.124. tmnxInterChassisCommsUp
2.10.125. tmnxIomEventOverflow
2.10.126. tmnxIomEventOverflowClr
2.10.127. tmnxIomResExhausted
2.10.128. tmnxIomResHighLimitReached
2.10.129. tmnxIomResStateClr
2.10.130. tmnxIPMacCpmFilterNearFull
2.10.131. tmnxIPMacCpmFilterNearFullClear
2.10.132. tmnxIPMacCpmFilterOverload
2.10.133. tmnxIPMacCpmFilterOverloadClear
2.10.134. tmnxIPMacFilterEgrNearFull
2.10.135. tmnxIPMacFilterEgrNearFullClear
2.10.136. tmnxIPMacFilterEgrOverload
2.10.137. tmnxIPMacFilterEgrOverloadClear
2.10.138. tmnxIPMacFilterIngNearFull
2.10.139. tmnxIPMacFilterIngNearFullClear
2.10.140. tmnxIPMacFilterIngOverload
2.10.141. tmnxIPMacFilterIngOverloadClear
2.10.142. tmnxIPMacQosIngOverload
2.10.143. tmnxIPMacQosIngOverloadClear
2.10.144. tmnxIPQosEgrOverload
2.10.145. tmnxIPQosEgrOverloadClear
2.10.146. tmnxIPsecIsaGrpActiveIsaChgd
2.10.147. tmnxIPsecIsaGrpTnlHighWMark
2.10.148. tmnxIPsecIsaGrpTnlLowWMark
2.10.149. tmnxIPsecIsaGrpTnlMax
2.10.150. tmnxIPsecIsaGrpUnableToSwitch
2.10.151. tmnxIPv6CpmFilterNearFull
2.10.152. tmnxIPv6CpmFilterNearFullClear
2.10.153. tmnxIPv6CpmFilterOverload
2.10.154. tmnxIPv6CpmFilterOverloadClear
2.10.155. tmnxIPv6FilterEgrNearFull
2.10.156. tmnxIPv6FilterEgrNearFullClear
2.10.157. tmnxIPv6FilterEgrOverload
2.10.158. tmnxIPv6FilterEgrOverloadClear
2.10.159. tmnxIPv6FilterIngNearFull
2.10.160. tmnxIPv6FilterIngNearFullClear
2.10.161. tmnxIPv6FilterIngOverload
2.10.162. tmnxIPv6FilterIngOverloadClear
2.10.163. tmnxIPv6QosEgrOverload
2.10.164. tmnxIPv6QosEgrOverloadClear
2.10.165. tmnxIPv6QosIngOverload
2.10.166. tmnxIPv6QosIngOverloadClear
2.10.167. tmnxMDAIsaTunnelGroupChange
2.10.168. tmnxPeBootloaderVersionMismatch
2.10.169. tmnxPeBootromVersionMismatch
2.10.170. tmnxPeFirmwareVersionWarning
2.10.171. tmnxPeFPGAVersionMismatch
2.10.172. tmnxPeSoftwareLoadFailed
2.10.173. tmnxPeSoftwareVersionMismatch
2.10.174. tmnxPhysChassisFilterDoorClosed
2.10.175. tmnxPhysChassisFilterDoorOpen
2.10.176. tmnxPhysChassisPCMInputFeed
2.10.177. tmnxPhysChassisPCMInputFeedClr
2.10.178. tmnxPhysChassisPMInputFeed
2.10.179. tmnxPhysChassisPMInputFeedClr
2.10.180. tmnxPhysChassisPMOutFail
2.10.181. tmnxPhysChassisPMOutFailClr
2.10.182. tmnxPhysChassisPMOverTemp
2.10.183. tmnxPhysChassisPMOverTempClr
2.10.184. tmnxPhysChassPwrSupInputFeed
2.10.185. tmnxPhysChassPwrSupInputFeedClr
2.10.186. tmnxPhysChassPwrSupPemACRect
2.10.187. tmnxPhysChassPwrSupPemACRectClr
2.10.188. tmnxPhysChassPwrSupWrgFanDir
2.10.189. tmnxPhysChassPwrSupWrgFanDirClr
2.10.190. tmnxPlcyAcctStatsEventOvrflw
2.10.191. tmnxPlcyAcctStatsEventOvrflwClr
2.10.192. tmnxPlcyAcctStatsPoolExcResource
2.10.193. tmnxPlcyAcctStatsPoolLowResource
2.10.194. tmnxPowerShelfCommsDown
2.10.195. tmnxPowerShelfCommsUp
2.10.196. tmnxPowerShelfInputPwrModeSwitch
2.10.197. tmnxPowerShelfOutputStatusSwitch
2.10.198. tmnxRedPrimaryCPMFail
2.10.199. tmnxSasAlarminput1StateChanged
2.10.200. tmnxSasAlarminput2StateChanged
2.10.201. tmnxSasAlarminput3StateChanged
2.10.202. tmnxSasAlarminput4StateChanged
2.10.203. tmnxSfmIcPortDDMClear
2.10.204. tmnxSfmIcPortDDMFailure
2.10.205. tmnxSfmIcPortDegraded
2.10.206. tmnxSfmIcPortDegradedClear
2.10.207. tmnxSfmIcPortDown
2.10.208. tmnxSfmIcPortSFFInserted
2.10.209. tmnxSfmIcPortSFFRemoved
2.10.210. tmnxSfmIcPortUp
2.10.211. tmnxSyncIfTimBITS2048khzUnsup
2.10.212. tmnxSyncIfTimBITS2048khzUnsupClr
2.11. DEBUG
2.11.1. traceEvent
2.12. DHCP
2.12.1. sapDHCPLeaseEntriesExceeded
2.12.2. sapDHCPLseStateMobilityError
2.12.3. sapDHCPLseStateOverride
2.12.4. sapDHCPLseStatePopulateErr
2.12.5. sapDHCPProxyServerError
2.12.6. sapDHCPSuspiciousPcktRcvd
2.12.7. sapStatHost6DynMacConflict
2.12.8. sapStaticHostDynMacConflict
2.12.9. sdpBindDHCPLeaseEntriesExceeded
2.12.10. sdpBindDHCPLseStateMobilityErr
2.12.11. sdpBindDHCPLseStateOverride
2.12.12. sdpBindDHCPLseStatePopulateErr
2.12.13. sdpBindDHCPProxyServerError
2.12.14. sdpBindDHCPSuspiciousPcktRcvd
2.12.15. svcDHCPLseStateRestoreProblem
2.12.16. svcDHCPMiscellaneousProblem
2.12.17. tmnxVRtrDHCP6AssignedIllegSubnet
2.12.18. tmnxVRtrDHCP6ClientMacUnresolved
2.12.19. tmnxVRtrDHCP6IllegalClientAddr
2.12.20. tmnxVRtrDHCP6LseStateOverride
2.12.21. tmnxVRtrDHCP6RelayLseStExceeded
2.12.22. tmnxVRtrDHCP6RelayReplyStripUni
2.12.23. tmnxVRtrDHCP6ServerLseStExceeded
2.12.24. tmnxVRtrDHCPIfLseStatesExceeded
2.12.25. tmnxVRtrDHCPSuspiciousPcktRcvd
2.13. DHCPS
2.13.1. tmnxDhcpsAddrAllocationFailure
2.13.2. tmnxDhcpsFoLeaseUpdateFailed
2.13.3. tmnxDhcpsFoStateChange
2.13.4. tmnxDhcpsLeaseOfferedExpired
2.13.5. tmnxDhcpsPacketDropped
2.13.6. tmnxDhcpsPoolFoLeaseUpdateFailed
2.13.7. tmnxDhcpsPoolFoStateChange
2.13.8. tmnxDhcpSvrDeclineStaticAddr
2.13.9. tmnxDhcpSvrHostConflict
2.13.10. tmnxDhcpSvrIntLseConflict
2.13.11. tmnxDhcpSvrLeaseCreate
2.13.12. tmnxDhcpSvrLeaseDefaultTimers
2.13.13. tmnxDhcpSvrLeaseDelete
2.13.14. tmnxDhcpSvrLeaseModify
2.13.15. tmnxDhcpSvrLeaseNotOwner
2.13.16. tmnxDhcpSvrMaxLeasesReached
2.13.17. tmnxDhcpSvrMsgTooLong
2.13.18. tmnxDhcpSvrNoContFreeBlocks
2.13.19. tmnxDhcpSvrNoSubnetFixAddr
2.13.20. tmnxDhcpSvrPfxThDepletedV6
2.13.21. tmnxDhcpSvrPfxThTooLowV6
2.13.22. tmnxDhcpSvrPlThDepletedV6
2.13.23. tmnxDhcpSvrPlThTooLowV6
2.13.24. tmnxDhcpSvrPoolDepleted
2.13.25. tmnxDhcpSvrPoolMinFreeExc
2.13.26. tmnxDhcpSvrPoolUnknown
2.13.27. tmnxDhcpSvrSubnetDepleted
2.13.28. tmnxDhcpSvrSubnetMinFreeExc
2.13.29. tmnxDhcpSvrUserDbUnknown
2.13.30. tmnxLudbDhcpGroupIfTooLong
2.13.31. tmnxLudbPppoeGroupIfTooLong
2.14. DIAMETER
2.14.1. tmnxDiamAppSessionFailure
2.14.2. tmnxDiamMessageDropped
2.14.3. tmnxDiamPolicyPeerStateChange
2.14.4. tmnxDiamPpPrxMcLocStateChanged
2.14.5. tmnxDiamSessionEvent
2.15. DYNSVC
2.15.1. tmnxDynSvcSapFailed
2.16. EFM_OAM
2.16.1. dot3OamNonThresholdEvent
2.16.2. dot3OamThresholdEvent
2.16.3. tmnxDot3OamLoopCleared
2.16.4. tmnxDot3OamLoopDetected
2.16.5. tmnxDot3OamNonThresholdEventClr
2.16.6. tmnxDot3OamPeerChanged
2.16.7. tmnxDot3OamSdThresholdEvent
2.16.8. tmnxDot3OamThresholdEventClr
2.17. ELMI
2.17.1. tmnxElmiEVCStatusChangeEvent
2.17.2. tmnxElmiIfStatusChangeEvent
2.18. ERING
2.18.1. tmnxEthRingApsPrvsnClearAlarm
2.18.2. tmnxEthRingApsPrvsnRaiseAlarm
2.18.3. tmnxEthRingPathFwdStateChange
2.19. ETH_CFM
2.19.1. dot1agCfmFaultAlarm
2.19.2. tmnxDot1agCfmMepAisStateChanged
2.19.3. tmnxDot1agCfmMepCsfStateChanged
2.19.4. tmnxDot1agCfmMepDMTestComplete
2.19.5. tmnxDot1agCfmMepEthTestComplete
2.19.6. tmnxDot1agCfmMepFcltyFaultClear
2.19.7. tmnxDot1agCfmMepFcltyFaultRaise
2.19.8. tmnxDot1agCfmMepLbmTestComplete
2.19.9. tmnxDot1agCfmMepLtmTestComplete
2.19.10. tmnxDot1agCfmMepSLMTestComplete
2.19.11. tmnxDot1agCfmMipEvaluation
2.20. ETH_TUNNEL
2.20.1. tmnxEthTunnelApsCfgClearAlarm
2.20.2. tmnxEthTunnelApsCfgRaiseAlarm
2.20.3. tmnxEthTunnelApsNoRspClearAlarm
2.20.4. tmnxEthTunnelApsNoRspRaiseAlarm
2.20.5. tmnxEthTunnelApsPrvsnClearAlarm
2.20.6. tmnxEthTunnelApsPrvsnRaiseAlarm
2.20.7. tmnxEthTunnelApsSwitchoverAlarm
2.21. FILTER
2.21.1. tFilterApplyPathProblem
2.21.2. tFilterBgpFlowSpecProblem
2.21.3. tFilterEmbeddingOperStateChange
2.21.4. tFilterEmbedFlowspecOperStateChg
2.21.5. tFilterEmbedOpenflowOperStateChg
2.21.6. tFilterEmbedVsdOperStateChg
2.21.7. tFilterOpenflowRequestRejected
2.21.8. tFilterRadSharedFltrAlarmClear
2.21.9. tFilterRadSharedFltrAlarmRaised
2.21.10. tFilterRPActiveDestChangeEvent
2.21.11. tFilterSubInsFltrEntryDropped
2.21.12. tFilterSubInsSpaceAlarmCleared
2.21.13. tFilterSubInsSpaceAlarmRaised
2.21.14. tIPFilterPBRPacketsDrop
2.22. GMPLS
2.22.1. vRtrGmplsLspPathStateChange
2.23. GSMP
2.23.1. tmnxAncpEgrRateMonitorEvent
2.23.2. tmnxAncpEgrRateMonitorEventL
2.23.3. tmnxAncpIngRateMonitorEvent
2.23.4. tmnxAncpIngRateMonitorEventL
2.23.5. tmnxAncpSesRejected
2.23.6. tmnxAncpShcvDisabledEvent
2.23.7. tmnxAncpShcvDisabledEventL
2.23.8. tmnxAncpStringRejected
2.24. IGH
2.24.1. tmnxIfGroupHandlerProtoOprChange
2.24.2. tmnxIfGroupHdlrMbrProtoOprChange
2.25. IGMP
2.25.1. vRtrIgmpGrpIfSapCModeRxQueryMism
2.25.2. vRtrIgmpGrpIfSapMaxGrpsLimExceed
2.25.3. vRtrIgmpGrpIfSapMaxGrpSrcLimExcd
2.25.4. vRtrIgmpGrpIfSapMaxSrcsLimExceed
2.25.5. vRtrIgmpGrpIfSapMcacPlcyDropped
2.25.6. vRtrIgmpGrpIfSapRxQueryVerMism
2.25.7. vRtrIgmpHostCModeRxQueryMismatch
2.25.8. vRtrIgmpHostInstantiationFail
2.25.9. vRtrIgmpHostMaxGrpsLimitExceeded
2.25.10. vRtrIgmpHostMaxGrpSrcsLimitExcd
2.25.11. vRtrIgmpHostMaxSrcsLimitExceeded
2.25.12. vRtrIgmpHostMcacPlcyDropped
2.25.13. vRtrIgmpHostQryIntervalConflict
2.25.14. vRtrIgmpHostRxQueryVerMismatch
2.25.15. vRtrIgmpIfCModeRxQueryMismatch
2.25.16. vRtrIgmpIfRxQueryVerMismatch
2.25.17. vRtrIgmpMaxGrpsLimitExceeded
2.25.18. vRtrIgmpMaxGrpSrcsLimitExceeded
2.25.19. vRtrIgmpMaxSrcsLimitExceeded
2.25.20. vRtrIgmpMcacPlcyDropped
2.25.21. vRtrIgmpNotifyNumOfIPsecIfHighWm
2.25.22. vRtrIgmpNotifyNumOfIPsecIfLowWm
2.25.23. vRtrIgmpNotifyNumOfIPsecIfMaxRch
2.26. IGMP_SNOOPING
2.26.1. eMplsIgmpSnpgMfibFailure
2.26.2. sapIgmpSnpgGrpLimitExceeded
2.26.3. sapIgmpSnpgGrpSrcLimitExceeded
2.26.4. sapIgmpSnpgMcacPlcyDropped
2.26.5. sapIgmpSnpgMcsFailure
2.26.6. sapIgmpSnpgSrcLimitExceeded
2.26.7. sdpBndIgmpSnpgGrpLimitExceeded
2.26.8. sdpBndIgmpSnpgGrpSrcLimitExceed
2.26.9. sdpBndIgmpSnpgMcacPlcyDropped
2.26.10. sdpBndIgmpSnpgSrcLimitExceeded
2.27. IP
2.27.1. clearRTMError
2.27.2. fibAddFailed
2.27.3. ipAnyDuplicateAddress
2.27.4. ipArpBadInterface
2.27.5. ipArpDuplicateIpAddress
2.27.6. ipArpDuplicateMacAddress
2.27.7. ipArpInfoOverwritten
2.27.8. ipDuplicateAddress
2.27.9. ipEtherBroadcast
2.27.10. qosNetworkPolicyMallocFailed
2.28. IPSEC
2.28.1. tIPsecBfdIntfSessStateChgd
2.28.2. tIPsecRadAcctPlcyFailure
2.28.3. tIPsecRUSAFailToAddRoute
2.28.4. tIPsecRuTnlEncapIpMtuTooSmall
2.28.5. tIPsecRUTnlFailToCreate
2.28.6. tIPsecRUTnlRemoved
2.28.7. tIPSecTrustAnchorPrfOprChg
2.28.8. tIPsecTunnelEncapIpMtuTooSmall
2.28.9. tmnxIPsecGWOperStateChange
2.28.10. tmnxIPsecTunnelOperStateChange
2.28.11. tmnxSecNotifCmptedCertChnChngd
2.28.12. tmnxSecNotifCmptedCertHashChngd
2.28.13. tmnxSecNotifSendChnNotInCmptChn
2.29. ISIS
2.29.1. tmnxIsisAdjacencyChange
2.29.2. tmnxIsisAdjBfdSessionSetupFail
2.29.3. tmnxIsisAdjRestartStatusChange
2.29.4. tmnxIsisAreaMismatch
2.29.5. tmnxIsisAuthFail
2.29.6. tmnxIsisAutTypeFail
2.29.7. tmnxIsisCircIdExhausted
2.29.8. tmnxIsisCircMtuTooLow
2.29.9. tmnxIsisCorruptedLSPDetected
2.29.10. tmnxIsisDatabaseOverload
2.29.11. tmnxIsisExportLimitReached
2.29.12. tmnxIsisExportLimitWarning
2.29.13. tmnxIsisFailureDisabled
2.29.14. tmnxIsisIDLenMismatch
2.29.15. tmnxIsisLdpSyncExit
2.29.16. tmnxIsisLdpSyncTimerStarted
2.29.17. tmnxIsisLSPPurge
2.29.18. tmnxIsisLSPTooLargeToPropagate
2.29.19. tmnxIsisManualAddressDrops
2.29.20. tmnxIsisMaxAreaAddrsMismatch
2.29.21. tmnxIsisMaxSeqExceedAttempt
2.29.22. tmnxIsisOrigLSPBufSizeMismatch
2.29.23. tmnxIsisOwnLSPPurge
2.29.24. tmnxIsisPfxLimitOverloadWarning
2.29.25. tmnxIsisProtoSuppMismatch
2.29.26. tmnxIsisRejectedAdjacency
2.29.27. tmnxIsisRejectedAdjacencySet
2.29.28. tmnxIsisRejectedAdjacencySid
2.29.29. tmnxIsisRoutesExpLmtDropped
2.29.30. tmnxIsisSequenceNumberSkip
2.29.31. tmnxIsisSidError
2.29.32. tmnxIsisSidNotInLabelRange
2.29.33. tmnxIsisSpbEctFidCfgChg
2.29.34. tmnxIsisSpbNbrMultAdjExists
2.29.35. tmnxIsisSpbNbrMultAdjExistsClear
2.29.36. tmnxIsisSrgbBadLabelRange
2.29.37. tmnxIsisVersionSkew
2.29.38. vRtrIsisSpbNbrMultAdjExists
2.29.39. vRtrIsisSpbNbrMultAdjExistsClear
2.29.40. vRtrSpbEctFidCfgChg
2.30. L2TP
2.30.1. tmnxL2tpApFailure
2.30.2. tmnxL2tpIsaMdaVRtrStateChange
2.30.3. tmnxL2tpLnsPppNcpFailure
2.30.4. tmnxL2tpLnsSePppSessionFailure
2.30.5. tmnxL2tpPeerUnreachable
2.30.6. tmnxL2tpTunnelBlacklisted
2.30.7. tmnxL2tpTunnelSelBlacklistFull
2.31. LAG
2.31.1. DynamicCostOff
2.31.2. DynamicCostOn
2.31.3. LagPortAddFailed
2.31.4. LagPortAddFailureCleared
2.31.5. LagStateEvent
2.31.6. LagSubGroupSelected
2.31.7. tLagMemberStateEvent
2.31.8. tmnxLagBfdMemStateChanged
2.32. LDAP
2.32.1. tmnxLdapOperStateChange
2.32.2. tmnxLdapServerOperStateChange
2.33. LDP
2.33.1. vRtrLdpGroupIdMismatch
2.33.2. vRtrLdpNgAddrFecCommMismatch
2.33.3. vRtrLdpNgIfStateChange
2.33.4. vRtrLdpNgInetIfStateChange
2.33.5. vRtrLdpNgIpv4InstStateChange
2.33.6. vRtrLdpNgIpv6InstStateChange
2.33.7. vRtrLdpNgResourceExhaustion
2.33.8. vRtrLdpNgSessionStateChange
2.33.9. vRtrLdpNgSessMaxFecLimitReached
2.33.10. vRtrLdpNgSessMaxFecThresChanged
2.33.11. vRtrLdpNgTargPeerStateChange
2.33.12. vRtrLdpStateChange
2.34. LI
2.34.1. cli_config_io
2.34.2. cli_unauth_config_io
2.34.3. cli_unauth_user_io
2.34.4. cli_user_io
2.34.5. cli_user_login
2.34.6. cli_user_login_failed
2.34.7. cli_user_login_max_attempts
2.34.8. cli_user_logout
2.34.9. destinationDisabled
2.34.10. destinationEnabled
2.34.11. ftp_user_login
2.34.12. ftp_user_login_failed
2.34.13. ftp_user_login_max_attempts
2.34.14. ftp_user_logout
2.34.15. grpc_user_login
2.34.16. grpc_user_login_failed
2.34.17. grpc_user_login_max_attempts
2.34.18. grpc_user_logout
2.34.19. host_snmp_attempts
2.34.20. radiusFailed
2.34.21. sbiBootLiConfig
2.34.22. snmp_user_set
2.34.23. sourceDisabled
2.34.24. sourceEnabled
2.34.25. sourceSapChange
2.34.26. sourceSubscriberChange
2.34.27. ssh_user_login
2.34.28. ssh_user_login_failed
2.34.29. ssh_user_login_max_attempts
2.34.30. ssh_user_logout
2.34.31. ssiSaveConfigFailed
2.34.32. ssiSaveConfigSucceeded
2.34.33. ssiSyncConfigFailed
2.34.34. ssiSyncConfigOK
2.34.35. tMirrorDestinationChangeReject
2.34.36. tMirrorFilterAssignToItfWarn
2.34.37. tMirrorFilterAssignToSapWarn
2.34.38. tMirrorFilterAssignToSdpWarn
2.34.39. tMirrorLiNat64SubOperStateCh
2.34.40. tMirrorLiNatL2awSubOperStateCh
2.34.41. tMirrorLiNatLsnSubOperStateCh
2.34.42. tMirrorLiX2Alarm
2.34.43. tMirrorSourceFilterAssignReject
2.34.44. tMirrorSourceFilterAssignWarn
2.34.45. tMirrorSourceFilterOverruled
2.34.46. tMirrorSourceIPFltrChangeReject
2.34.47. tMirrorSourceIPv6FltrChangeRej
2.34.48. tMirrorSourceLiFilterChanged
2.34.49. tMirrorSourceLiSubProblem
2.34.50. tMirrorSourceMacFltrChangeReject
2.34.51. tmnxClear
2.34.52. tmnxConfigCreate
2.34.53. tmnxConfigDelete
2.34.54. tmnxConfigModify
2.34.55. tmnxStateChange
2.35. LLDP
2.35.1. lldpRemTablesChange
2.36. LMP
2.36.1. tmnxLmpVRtrControlChannelState
2.36.2. tmnxLmpVRtrDbLinkPropMismatch
2.36.3. tmnxLmpVRtrDbLinkPropMismatchClr
2.36.4. tmnxLmpVRtrTeLinkPropMismatch
2.36.5. tmnxLmpVRtrTeLinkPropMismatchClr
2.36.6. tmnxLmpVRtrTeLinkState
2.37. LOGGER
2.37.1. STARTED
2.37.2. tmnxClear
2.37.3. tmnxLogAccountingDataLoss
2.37.4. tmnxLogAdminLocFailed
2.37.5. tmnxLogBackupLocFailed
2.37.6. tmnxLogEventOverrun
2.37.7. tmnxLogEventThrottled
2.37.8. tmnxLogFileDeleted
2.37.9. tmnxLogFileRollover
2.37.10. tmnxLogOnlyEventOverrun
2.37.11. tmnxLogOnlyEventThrottled
2.37.12. tmnxLogSpaceContention
2.37.13. tmnxLogTraceError
2.37.14. tmnxStdEventsReplayed
2.37.15. tmnxSysLogTargetProblem
2.37.16. tmnxTestEvent
2.38. MACSEC
2.38.1. tmnxMacsecConfiguredPortCA
2.38.2. tmnxMacsecDisabledPort
2.38.3. tmnxMacsecEnabledPort
2.38.4. tmnxMacsecMaxPeerLimitExceeded
2.38.5. tmnxMacsecUnconfiguredPortCA
2.38.6. tmnxMkaPskRollover
2.38.7. tmnxMkaSessionEstablished
2.39. MC_REDUNDANCY
2.39.1. srrpPacketDiscarded
2.39.2. tMcPeerIPsecTnlGrpMasterStateChg
2.39.3. tMcPeerIPsecTnlGrpProtStatusChg
2.39.4. tmnxMCEPSessionPsvModeDisabled
2.39.5. tmnxMCEPSessionPsvModeEnabled
2.39.6. tmnxMcLagInfoLagChanged
2.39.7. tmnxMcOmcrClientNumEntriesHigh
2.39.8. tmnxMcOmcrStatFailedChanged
2.39.9. tmnxMcPeerEPBfdSessionClose
2.39.10. tmnxMcPeerEPBfdSessionDown
2.39.11. tmnxMcPeerEPBfdSessionOpen
2.39.12. tmnxMcPeerEPBfdSessionUp
2.39.13. tmnxMcPeerEPOperDown
2.39.14. tmnxMcPeerEPOperUp
2.39.15. tmnxMcPeerRingsOperStateChanged
2.39.16. tmnxMcPeerSyncStatusChanged
2.39.17. tmnxMcRedundancyMismatchDetected
2.39.18. tmnxMcRedundancyMismatchResolved
2.39.19. tmnxMcRedundancyPeerStateChanged
2.39.20. tmnxMcRingInbCtrlOperStateChgd
2.39.21. tmnxMcRingNodeLocOperStateChgd
2.39.22. tmnxMcRingOperStateChanged
2.39.23. tmnxMcSyncClientAlarmCleared
2.39.24. tmnxMcSyncClientAlarmRaised
2.39.25. tmnxMcSyncClockSkewCleared
2.39.26. tmnxMcSyncClockSkewRaised
2.39.27. tmnxSrrpBecameBackup
2.39.28. tmnxSrrpBfdIntfSessStateChgd
2.39.29. tmnxSrrpDualMaster
2.39.30. tmnxSrrpDuplicateSubIfAddress
2.39.31. tmnxSrrpInstanceIdMismatch
2.39.32. tmnxSrrpOperDownInvalidMac
2.39.33. tmnxSrrpOperDownInvalidMacClear
2.39.34. tmnxSrrpRedIfMismatch
2.39.35. tmnxSrrpSapMismatch
2.39.36. tmnxSrrpSapTagMismatch
2.39.37. tmnxSrrpSubnetMismatch
2.39.38. tmnxSrrpSubnetMismatchCleared
2.39.39. tmnxSrrpSystemIpNotSet
2.39.40. tmnxSrrpTrapNewMaster
2.40. MCPATH
2.40.1. tmnxMcPathAvailBwLimitReached
2.40.2. tmnxMcPathAvailBwValWithinRange
2.40.3. tmnxMcPathSrcGrpBlkHole
2.40.4. tmnxMcPathSrcGrpBlkHoleClear
2.41. MIRROR
2.41.1. destinationDisabled
2.41.2. destinationEnabled
2.41.3. sourceDisabled
2.41.4. sourceEnabled
2.41.5. sourceIpFilterChange
2.41.6. sourceMacFilterChange
2.41.7. sourceSapChange
2.41.8. sourceSubscriberChange
2.41.9. tMirrorSourceIpv6FilterChange
2.42. MLD
2.42.1. vRtrMldGrpIfSapCModeRxQueryMism
2.42.2. vRtrMldGrpIfSapMaxGrpsLimExceed
2.42.3. vRtrMldGrpIfSapMaxGrpSrcLimExcd
2.42.4. vRtrMldGrpIfSapMaxSrcsLimExceed
2.42.5. vRtrMldGrpIfSapMcacPlcyDropped
2.42.6. vRtrMldGrpIfSapRxQueryVerMism
2.42.7. vRtrMldHostCModeRxQueryMismatch
2.42.8. vRtrMldHostInstantiationFail
2.42.9. vRtrMldHostMaxGrpsLimitExceeded
2.42.10. vRtrMldHostMaxGrpSrcsLimitExcd
2.42.11. vRtrMldHostMaxSrcsLimitExceeded
2.42.12. vRtrMldHostMcacPlcyDropped
2.42.13. vRtrMldHostQryIntervalConflict
2.42.14. vRtrMldHostRxQueryVerMismatch
2.42.15. vRtrMldIfCModeRxQueryMismatch
2.42.16. vRtrMldIfRxQueryVerMismatch
2.42.17. vRtrMldMaxGrpsLimitExceeded
2.42.18. vRtrMldMaxGrpSrcsLimitExceeded
2.42.19. vRtrMldMaxSrcsLimitExceeded
2.42.20. vRtrMldMcacPlcyDropped
2.43. MLD_SNOOPING
2.43.1. sapMldSnpgGrpLimitExceeded
2.43.2. sapMldSnpgMcsFailure
2.43.3. sdpBndMldSnpgGrpLimitExceeded
2.44. MPLS
2.44.1. mplsTunnelDown
2.44.2. mplsTunnelReoptimized
2.44.3. mplsTunnelRerouted
2.44.4. mplsTunnelUp
2.44.5. mplsXCDown
2.44.6. mplsXCUp
2.44.7. vRtrMplsIfStateChange
2.44.8. vRtrMplsLspActivePathChanged
2.44.9. vRtrMplsLspDown
2.44.10. vRtrMplsLspPathDown
2.44.11. vRtrMplsLspPathLstFillReoptElig
2.44.12. vRtrMplsLspPathMbbStatusEvent
2.44.13. vRtrMplsLspPathRerouted
2.44.14. vRtrMplsLspPathResignaled
2.44.15. vRtrMplsLspPathSoftPreempted
2.44.16. vRtrMplsLspPathUp
2.44.17. vRtrMplsLspSwitchStbyFailure
2.44.18. vRtrMplsLspUp
2.44.19. vRtrMplsNodeInIgpOverload
2.44.20. vRtrMplsP2mpInstanceDown
2.44.21. vRtrMplsP2mpInstanceResignaled
2.44.22. vRtrMplsP2mpInstanceUp
2.44.23. vRtrMplsResignalTimerExpired
2.44.24. vRtrMplsS2lSubLspDown
2.44.25. vRtrMplsS2lSubLspRerouted
2.44.26. vRtrMplsS2lSubLspResignaled
2.44.27. vRtrMplsS2lSubLspUp
2.44.28. vRtrMplsStateChange
2.44.29. vRtrMplsXCBundleChange
2.45. MPLS_TP
2.45.1. vRtrMplsTpLspActivePathChange
2.45.2. vRtrMplsTpLspActivePathUp
2.45.3. vRtrMplsTpLspPtTypeMismatchAlarm
2.45.4. vRtrMplsTpLspPtTypeMismatchClear
2.45.5. vRtrMplsTpLspRevertMismatchAlarm
2.45.6. vRtrMplsTpLspRevertMismatchClear
2.46. MSDP
2.46.1. msdpBackwardTransition
2.46.2. msdpEstablished
2.46.3. tmnxMsdpNgActSrcLimExcd
2.46.4. tmnxMsdpNgGroupSrcActMsgsExcd
2.46.5. tmnxMsdpNgPeerActSrcLimExcd
2.46.6. tmnxMsdpNgRPFFailure
2.46.7. tmnxMsdpNgSourceSrcActMsgsExcd
2.47. NAT
2.47.1. tmnxNatDetMapOperStateChanged
2.47.2. tmnxNatDetPlcyChanged
2.47.3. tmnxNatDetPlcyOperStateChanged
2.47.4. tmnxNatFwd2EntryAdded
2.47.5. tmnxNatFwd2OperStateChanged
2.47.6. tmnxNatInAddrPrefixBlksFree
2.47.7. tmnxNatIsaGrpIsDegraded
2.47.8. tmnxNatIsaGrpOperStateChanged
2.47.9. tmnxNatIsaMemberSessionUsageHigh
2.47.10. tmnxNatL2AwSubIcmpPortUsageHigh
2.47.11. tmnxNatL2AwSubSessionUsageHigh
2.47.12. tmnxNatL2AwSubTcpPortUsageHigh
2.47.13. tmnxNatL2AwSubUdpPortUsageHigh
2.47.14. tmnxNatLsnSubBlksFree
2.47.15. tmnxNatLsnSubIcmpPortUsgHigh
2.47.16. tmnxNatLsnSubSessionUsgHigh
2.47.17. tmnxNatLsnSubTcpPortUsgHigh
2.47.18. tmnxNatLsnSubUdpPortUsgHigh
2.47.19. tmnxNatMapRuleChange
2.47.20. tmnxNatMaxNbrSubsOrHostsExceeded
2.47.21. tmnxNatMdaActive
2.47.22. tmnxNatMdaDetectsLoadSharingErr
2.47.23. tmnxNatNbrSubsOrHostsBelowThrsh
2.47.24. tmnxNatPcpSrvStateChanged
2.47.25. tmnxNatPlAddrFree
2.47.26. tmnxNatPlBlockAllocationL2Aw
2.47.27. tmnxNatPlBlockAllocationLsn
2.47.28. tmnxNatPlL2AwBlockUsageHigh
2.47.29. tmnxNatPlLsnMemberBlockUsageHigh
2.47.30. tmnxNatPlLsnRedActiveChanged
2.47.31. tmnxNatResourceProblemCause
2.47.32. tmnxNatResourceProblemDetected
2.47.33. tmnxNatVrtrOutDnatOnlyRoutesHigh
2.48. NTP
2.48.1. tmnxNtpAuthMismatch
2.48.2. tmnxNtpNoServersAvail
2.48.3. tmnxNtpOperChange
2.48.4. tmnxNtpServerChange
2.48.5. tmnxNtpServersAvail
2.49. OAM
2.49.1. svcIdInvalid
2.49.2. svcIdWrongType
2.49.3. tmnxAncpLoopbackTestCompleted
2.49.4. tmnxAncpLoopbackTestCompletedL
2.49.5. tmnxOamLdpTtraceAutoDiscState
2.49.6. tmnxOamLdpTtraceFecDisStatus
2.49.7. tmnxOamLdpTtraceFecPFailUpdate
2.49.8. tmnxOamLdpTtraceFecProbeState
2.49.9. tmnxOamPingProbeFailedV3
2.49.10. tmnxOamPingTestCompletedV3
2.49.11. tmnxOamPingTestFailedV3
2.49.12. tmnxOamPmThrClear
2.49.13. tmnxOamPmThrRaise
2.49.14. tmnxOamSaaThreshold
2.49.15. tmnxOamTrPathChange
2.49.16. tmnxOamTrTestCompleted
2.49.17. tmnxOamTrTestFailed
2.49.18. tmnxTwampSrvInactivityTimeout
2.49.19. tmnxTwampSrvMaxConnsExceeded
2.49.20. tmnxTwampSrvMaxSessExceeded
2.49.21. tmnxTwampSrvPfxMaxConnsExceeded
2.49.22. tmnxTwampSrvPfxMaxSessExceeded
2.50. OPEN_FLOW
2.50.1. tmnxOFFlowEntryInsertFailed
2.51. OSPF
2.51.1. tmnxOspfAdjBfdSessionSetupFail
2.51.2. tmnxOspfAreaMaxAgeLsa
2.51.3. tmnxOspfAreaOriginateLsa
2.51.4. tmnxOspfAsMaxAgeLsa
2.51.5. tmnxOspfAsOriginateLsa
2.51.6. tmnxOspfExportLimitReached
2.51.7. tmnxOspfExportLimitWarning
2.51.8. tmnxOspfFailureDisabled
2.51.9. tmnxOspfLsdbApproachingOverflow
2.51.10. tmnxOspfLsdbOverflow
2.51.11. tmnxOspfNgIfAuthFailure
2.51.12. tmnxOspfNgIfConfigError
2.51.13. tmnxOspfNgIfRxBadPacket
2.51.14. tmnxOspfNgIfStateChange
2.51.15. tmnxOspfNgIfTxRetransmit
2.51.16. tmnxOspfNgLdpSyncExit
2.51.17. tmnxOspfNgLdpSyncTimerStarted
2.51.18. tmnxOspfNgLinkMaxAgeLsa
2.51.19. tmnxOspfNgLinkOriginateLsa
2.51.20. tmnxOspfNgNbrRestartHlprStsChg
2.51.21. tmnxOspfNgNbrStateChange
2.51.22. tmnxOspfNssaTranslatorStatusChg
2.51.23. tmnxOspfOverloadEntered
2.51.24. tmnxOspfOverloadExited
2.51.25. tmnxOspfOverloadWarning
2.51.26. tmnxOspfRejectedAdjacencySet
2.51.27. tmnxOspfRejectedAdjacencySid
2.51.28. tmnxOspfRestartStatusChange
2.51.29. tmnxOspfRoutesExpLmtDropped
2.51.30. tmnxOspfShamIfAuthFailure
2.51.31. tmnxOspfShamIfConfigError
2.51.32. tmnxOspfShamIfRxBadPacket
2.51.33. tmnxOspfShamIfStateChange
2.51.34. tmnxOspfShamIfTxRetransmit
2.51.35. tmnxOspfShamNbrRestartHlprStsChg
2.51.36. tmnxOspfShamNbrStateChange
2.51.37. tmnxOspfSpfRunsRestarted
2.51.38. tmnxOspfSpfRunsStopped
2.51.39. tmnxOspfSrgbBadLabelRange
2.51.40. tmnxOspfSrSidError
2.51.41. tmnxOspfSrSidNotInLabelRange
2.51.42. tmnxOspfVirtIfAuthFailure
2.51.43. tmnxOspfVirtIfConfigError
2.51.44. tmnxOspfVirtIfRxBadPacket
2.51.45. tmnxOspfVirtIfStateChange
2.51.46. tmnxOspfVirtIfTxRetransmit
2.51.47. tmnxOspfVirtNbrRestartHlprStsChg
2.51.48. tmnxOspfVirtNbrStateChange
2.52. PCAP
2.52.1. tmnxPcapBufferFull
2.52.2. tmnxPcapBufferReadWriteFailure
2.52.3. tmnxPcapFileError
2.52.4. tmnxPcapSoftwareFailure
2.53. PIM
2.53.1. vRtrPimNgBSRStateChange
2.53.2. vRtrPimNgDataMtReused
2.53.3. vRtrPimNgGrpInSSMRange
2.53.4. vRtrPimNgHelloDropped
2.53.5. vRtrPimNgIfNeighborLoss
2.53.6. vRtrPimNgIfNeighborUp
2.53.7. vRtrPimNgInvalidIPmsiTunnel
2.53.8. vRtrPimNgInvalidJoinPrune
2.53.9. vRtrPimNgInvalidRegister
2.53.10. vRtrPimNgMaxGraftRetry
2.53.11. vRtrPimNgMaxGrpsLimitExceeded
2.53.12. vRtrPimNgMcacPlcyDropped
2.53.13. vRtrPimNgMDTLimitExceeded
2.53.14. vRtrPimNgReplicationLmtExceeded
2.53.15. vRtrPimNgSGLimitExceeded
2.54. PIM_SNOOPING
2.54.1. tmnxPimSnpgIfNeighborLoss
2.54.2. tmnxPimSnpgIfNeighborUp
2.54.3. tmnxPimSnpgSGLimitExceeded
2.54.4. tmnxPimSnpgSnoopModeChanged
2.55. PORT
2.55.1. SFPStatusBlocked
2.55.2. SFPStatusCulprit
2.55.3. SFPStatusDDMCorrupt
2.55.4. SFPStatusFailure
2.55.5. SFPStatusOperational
2.55.6. SFPStatusReadError
2.55.7. SFPStatusUnsupported
2.55.8. tmnxBundleMemberMlfrLoopback
2.55.9. tmnxCellularBearerCreated
2.55.10. tmnxCellularBearerDeleted
2.55.11. tmnxCellularBearerModified
2.55.12. tmnxDS1E1LoopbackStarted
2.55.13. tmnxDS1E1LoopbackStopped
2.55.14. tmnxDS3E3LoopbackStarted
2.55.15. tmnxDS3E3LoopbackStopped
2.55.16. tmnxDSXClockSyncStateChange
2.55.17. tmnxEqCohOptPortAlarm
2.55.18. tmnxEqDigitalDiagMonitorClear
2.55.19. tmnxEqDigitalDiagMonitorFailure
2.55.20. tmnxEqPortBndlBadEndPtDiscr
2.55.21. tmnxEqPortBndlRedDiffExceeded
2.55.22. tmnxEqPortBndlYellowDiffExceeded
2.55.23. tmnxEqPortDS1Alarm
2.55.24. tmnxEqPortDS1AlarmClear
2.55.25. tmnxEqPortDS3Alarm
2.55.26. tmnxEqPortDS3AlarmClear
2.55.27. tmnxEqPortDuplexCfgNotCompatible
2.55.28. tmnxEqPortError
2.55.29. tmnxEqPortEtherAlarm
2.55.30. tmnxEqPortEtherAlarmClear
2.55.31. tmnxEqPortEtherCrcAlarm
2.55.32. tmnxEqPortEtherCrcAlarmClear
2.55.33. tmnxEqPortEtherEgressRateChange
2.55.34. tmnxEqPortEtherInternalAlarm
2.55.35. tmnxEqPortEtherInternalAlarmClr
2.55.36. tmnxEqPortEtherLoopCleared
2.55.37. tmnxEqPortEtherLoopDetected
2.55.38. tmnxEqPortEtherSymMonAlarm
2.55.39. tmnxEqPortEtherSymMonAlarmClear
2.55.40. tmnxEqPortIngressRateCfgNotCompatible
2.55.41. tmnxEqPortSFPInserted
2.55.42. tmnxEqPortSFPRemoved
2.55.43. tmnxEqPortSonetAlarm
2.55.44. tmnxEqPortSonetAlarmClear
2.55.45. tmnxEqPortSonetPathAlarm
2.55.46. tmnxEqPortSonetPathAlarmClear
2.55.47. tmnxEqPortSpeedCfgNotCompatible
2.55.48. tmnxEqPortWaveTrackerAlarm
2.55.49. tmnxEqSonetClockSrcNotCompatible
2.55.50. tmnxEqSonetFramingNotCompatible
2.55.51. tmnxEqSonetSfThreshNotCompatible
2.55.52. tmnxOtuIfAlarmNotification
2.55.53. tmnxPortUnsupportedFunction
2.55.54. tmnxResvCbsPoolThreshAmber
2.55.55. tmnxResvCbsPoolThreshGreen
2.55.56. tmnxResvCbsPoolThreshRed
2.55.57. tmnxRS232ControlLeadSignalChg
2.55.58. tmnxRS232SquelchResetIssued
2.55.59. tmnxRS232SquelchStatusChange
2.55.60. tmnxSonetSDHLoopbackStarted
2.55.61. tmnxSonetSDHLoopbackStopped
2.55.62. tPortAccEgrQGrpHostMatchFailure
2.55.63. tPortEgrVPortHostMatchFailure
2.56. PPP
2.56.1. ipcpPeerOnDifferentSubnet
2.56.2. ipcpPeerRejectedOurIp
2.56.3. ipcpPeerSuggestedDifferentIp
2.56.4. ipcpRemoteIpUnknown
2.56.5. ipcpSameLocalAndRemoteIp
2.56.6. ipv6cpPeerOnDifferentSubnet
2.56.7. ipv6cpPeerRejectedOurIntId
2.56.8. ipv6cpPeerSuggestedDiffIntId
2.56.9. ipv6cpRemoteIntIdUnknown
2.56.10. ipv6cpSameLocalAndRemoteIntId
2.56.11. tmnxPppCpDown
2.56.12. tmnxPppCpUp
2.56.13. tmnxPppKeepaliveFailure
2.56.14. tmnxPppLoopback
2.56.15. tmnxPppLoopbackClear
2.56.16. tmnxPppLqmFailure
2.56.17. tmnxPppNcpDown
2.56.18. tmnxPppNcpUp
2.57. PPPOE
2.57.1. tmnxMlpppBundleIndicatorsChange
2.57.2. tmnxPppoeLacSteeringActive
2.57.3. tmnxPppoeLacSteeringFailed
2.57.4. tmnxPppoeLacSteeringStopped
2.57.5. tmnxPppoeNcpFailure
2.57.6. tmnxPppoeSessionFailure
2.58. PPPOE_CLNT
2.58.1. tmnxPppoeClientEchoTimeout
2.58.2. tmnxPppoeClientNcpFailure
2.58.3. tmnxPppoeClientSetupFailure
2.59. PTP
2.59.1. tmnxPtpCardNotSupported
2.59.2. tmnxPtpCardNotSupportedClear
2.59.3. tmnxPtpClockRecoveryStateChange
2.59.4. tmnxPtpDynamicChange
2.59.5. tmnxPtpMasterClockChangedEvent
2.59.6. tmnxPtpOutOfResources
2.59.7. tmnxPtpOutOfResourcesClear
2.59.8. tmnxPtpPortNoTimestamping
2.60. RADIUS
2.60.1. tmnxRadAcctOnOngoing
2.60.2. tmnxRadRouteDownloadFailed
2.60.3. tmnxRadSrvPlcySrvOperStateCh
2.61. RIP
2.61.1. ripPacketDiscarded
2.61.2. vRtrRipAuthTypeFailure
2.61.3. vRtrRipAuthTypeMismatch
2.61.4. vRtrRipInstanceExpLmtReached
2.61.5. vRtrRipInstanceExpLmtWarning
2.61.6. vRtrRipInstanceRestarted
2.61.7. vRtrRipInstanceRtsExpLmtDropped
2.61.8. vRtrRipInstanceShuttingDown
2.61.9. vRtrRipPeerBfdDown
2.62. RIP_NG
2.62.1. tmnxRipNgAuthFailure
2.62.2. tmnxRipNgAuthTypeMismatch
2.62.3. tmnxRipNgIfUcastAddrNotUsed
2.62.4. tmnxRipNgInstExpLmtReached
2.62.5. tmnxRipNgInstExpLmtWarning
2.62.6. tmnxRipNgInstRestarted
2.62.7. tmnxRipNgInstRtsExpLmtDropped
2.62.8. tmnxRipNgInstShuttingDown
2.62.9. tmnxRipNgPacketDiscarded
2.62.10. tmnxRipNgPeerBfdDown
2.63. ROUTE_POLICY
2.63.1. trigPolicyPrevEval
2.64. RPKI
2.64.1. tmnxRpkiNotifySession
2.64.2. tmnxRpkiStaleTimerExpiry
2.65. RSVP
2.65.1. vRtrRsvpIfNbrStateDown
2.65.2. vRtrRsvpIfNbrStateUp
2.65.3. vRtrRsvpIfStateChange
2.65.4. vRtrRsvpPEFailOverPriToStdBy
2.65.5. vRtrRsvpPEFailOverStdByToPri
2.65.6. vRtrRsvpStateChange
2.66. SATELLITE
2.66.1. tmnxSatelliteCommsDown
2.66.2. tmnxSatelliteCommsUp
2.66.3. tmnxSatelliteFailure
2.66.4. tmnxSatelliteFailureClear
2.66.5. tmnxSatelliteOperStateChange
2.66.6. tmnxSatLocalForwardSapStateChg
2.66.7. tmnxSatLocalForwardStateChg
2.66.8. tmnxSatSyncIfTimHoldover
2.66.9. tmnxSatSyncIfTimHoldoverClear
2.66.10. tmnxSatSyncIfTimRef1Alarm
2.66.11. tmnxSatSyncIfTimRef1AlarmClear
2.66.12. tmnxSatSyncIfTimRef1Quality
2.66.13. tmnxSatSyncIfTimRef2Alarm
2.66.14. tmnxSatSyncIfTimRef2AlarmClear
2.66.15. tmnxSatSyncIfTimRef2Quality
2.66.16. tmnxSatSyncIfTimRefSwitch
2.66.17. tmnxSatSyncIfTimSystemQuality
2.67. SECURITY
2.67.1. cli_user_login
2.67.2. cli_user_login_failed
2.67.3. cli_user_login_max_attempts
2.67.4. cli_user_logout
2.67.5. enable_admin
2.67.6. ftp_transfer_failed
2.67.7. ftp_transfer_successful
2.67.8. ftp_user_login
2.67.9. ftp_user_login_failed
2.67.10. ftp_user_login_max_attempts
2.67.11. ftp_user_logout
2.67.12. grpc_user_login
2.67.13. grpc_user_login_failed
2.67.14. grpc_user_login_max_attempts
2.67.15. grpc_user_logout
2.67.16. host_snmp_attempts
2.67.17. mafEntryMatch
2.67.18. netconf_user_login
2.67.19. netconf_user_login_failed
2.67.20. netconf_user_login_max_attempts
2.67.21. netconf_user_logout
2.67.22. radiusInetServerOperStatusChange
2.67.23. radiusOperStatusChange
2.67.24. radiusSystemIpAddrNotSet
2.67.25. radiusUserProfileInvalid
2.67.26. sapDcpDynamicConform
2.67.27. sapDcpDynamicEnforceAlloc
2.67.28. sapDcpDynamicEnforceFreed
2.67.29. sapDcpDynamicExcd
2.67.30. sapDcpDynamicHoldDownEnd
2.67.31. sapDcpDynamicHoldDownStart
2.67.32. sapDcpLocMonExcd
2.67.33. sapDcpLocMonExcdAllDynAlloc
2.67.34. sapDcpLocMonExcdAllDynFreed
2.67.35. sapDcpLocMonExcdDynResource
2.67.36. sapDcpStaticConform
2.67.37. sapDcpStaticExcd
2.67.38. sapDcpStaticHoldDownEnd
2.67.39. sapDcpStaticHoldDownStart
2.67.40. SSH_server_preserve_key_fail
2.67.41. ssh_user_login
2.67.42. ssh_user_login_failed
2.67.43. ssh_user_login_max_attempts
2.67.44. ssh_user_logout
2.67.45. sysDNSSecFailedAuthentication
2.67.46. tacplusInetSrvrOperStatusChange
2.67.47. tacplusOperStatusChange
2.67.48. tmnxAppPkiCertVerificationFailed
2.67.49. tmnxCAProfileStateChange
2.67.50. tmnxCAProfUpDueToRevokeChkCrlOpt
2.67.51. tmnxCliGroupSessionLimitExceeded
2.67.52. tmnxConfigCreate
2.67.53. tmnxConfigDelete
2.67.54. tmnxConfigModify
2.67.55. tmnxCpmProtDefPolModified
2.67.56. tmnxCpmProtExcdSapEcm
2.67.57. tmnxCpmProtExcdSapIp
2.67.58. tmnxCpmProtExcdSdpBind
2.67.59. tmnxCpmProtExcdSdpBindEcm
2.67.60. tmnxCpmProtExcdSdpBindIp
2.67.61. tmnxCpmProtViolIf
2.67.62. tmnxCpmProtViolIfOutProf
2.67.63. tmnxCpmProtViolMac
2.67.64. tmnxCpmProtViolPort
2.67.65. tmnxCpmProtViolPortAgg
2.67.66. tmnxCpmProtViolSap
2.67.67. tmnxCpmProtViolSapOutProf
2.67.68. tmnxCpmProtViolSdpBind
2.67.69. tmnxCpmProtViolSdpBindOutProf
2.67.70. tmnxCpmProtViolVdoSvcClient
2.67.71. tmnxCpmProtViolVdoVrtrClient
2.67.72. tmnxDcpCardFpEventOvrflw
2.67.73. tmnxDcpCardFpEventOvrflwClr
2.67.74. tmnxDcpCardSapEventOvrflw
2.67.75. tmnxDcpCardSapEventOvrflwClr
2.67.76. tmnxDcpCardVrtrIfEventOvrflw
2.67.77. tmnxDcpCardVrtrIfEventOvrflwClr
2.67.78. tmnxDcpFpDynPoolUsageHiAlmClear
2.67.79. tmnxDcpFpDynPoolUsageHiAlmRaise
2.67.80. tmnxKeyChainAuthFailure
2.67.81. tmnxMD5AuthFailure
2.67.82. tmnxPkiCAProfActnStatusChg
2.67.83. tmnxPkiCAProfCrlUpdAllUrlsFail
2.67.84. tmnxPkiCAProfCrlUpdateStart
2.67.85. tmnxPkiCAProfCrlUpdateSuccess
2.67.86. tmnxPkiCAProfCrlUpdateUrlFail
2.67.87. tmnxPkiCAProfCrlUpdLargPreUpdTm
2.67.88. tmnxPkiCAProfCrlUpdNoNxtUpdTime
2.67.89. tmnxPkiCAProfRevokeChkWarning
2.67.90. tmnxPkiCertAfterExpWarning
2.67.91. tmnxPkiCertBeforeExpWarning
2.67.92. tmnxPkiCertExpWarningCleared
2.67.93. tmnxPkiCertNotYetValid
2.67.94. tmnxPkiCertVerificationFailed
2.67.95. tmnxPkiCRLAfterExpWarning
2.67.96. tmnxPkiCRLBeforeExpWarning
2.67.97. tmnxPkiCRLExpWarningCleared
2.67.98. tmnxPkiCRLNotYetValid
2.67.99. tmnxPkiFileReadFailed
2.67.100. tmnxPkiFileWriteFailed
2.67.101. tmnxSecComputeCertChainFailure
2.67.102. tmnxSecNotifFileReloaded
2.67.103. tmnxSecNotifKeyChainExpired
2.67.104. tmnxSecPwdHistoryFileLoadFailed
2.67.105. tmnxSecPwdHistoryFileWriteFailed
2.67.106. tmnxStateChange
2.67.107. tmnxSysLicenseActivated
2.67.108. tmnxSysLicenseExpiresSoon
2.67.109. tmnxSysLicenseInvalid
2.67.110. tmnxSysLicenseValid
2.67.111. tmnxUsrProfSessionLimitExceeded
2.67.112. user_disconnect
2.67.113. vRtrIfDcpDynamicConform
2.67.114. vRtrIfDcpDynamicEnforceAlloc
2.67.115. vRtrIfDcpDynamicEnforceFreed
2.67.116. vRtrIfDcpDynamicExcd
2.67.117. vRtrIfDcpDynamicHoldDownEnd
2.67.118. vRtrIfDcpDynamicHoldDownStart
2.67.119. vRtrIfDcpLocMonExcd
2.67.120. vRtrIfDcpLocMonExcdAllDynAlloc
2.67.121. vRtrIfDcpLocMonExcdAllDynFreed
2.67.122. vRtrIfDcpLocMonExcdDynResource
2.67.123. vRtrIfDcpStaticConform
2.67.124. vRtrIfDcpStaticExcd
2.67.125. vRtrIfDcpStaticHoldDownEnd
2.67.126. vRtrIfDcpStaticHoldDownStart
2.68. SFLOW
2.68.1. tmnxSflowCpEntrySampling
2.68.2. tmnxSflowPacketTxFailure
2.69. SNMP
2.69.1. authenticationFailure
2.69.2. coldStart
2.69.3. fallingAlarm
2.69.4. linkDown
2.69.5. linkUp
2.69.6. risingAlarm
2.69.7. snmpdError
2.69.8. warmStart
2.70. STP
2.70.1. higherPriorityBridge
2.70.2. newRootBridge
2.70.3. newRootSap
2.70.4. newRootVcpState
2.70.5. pipActiveProtocolChange
2.70.6. receivedTCN
2.70.7. sapActiveProtocolChange
2.70.8. sapEncapDot1d
2.70.9. sapEncapPVST
2.70.10. tmnxNewCistRegionalRootBridge
2.70.11. tmnxNewMstiRegionalRootBridge
2.70.12. tmnxPipStpExcepCondStateChng
2.70.13. tmnxSapStpExcepCondStateChng
2.70.14. tmnxSdpBndStpExcepCondStateChng
2.70.15. tmnxStpMeshNotInMstRegion
2.70.16. tmnxStpRootGuardViolation
2.70.17. tmnxSvcNewRootSdpBind
2.70.18. tmnxSvcSdpActiveProtocolChange
2.70.19. tmnxSvcSdpBindEncapDot1d
2.70.20. tmnxSvcSdpBindEncapPVST
2.70.21. tmnxSvcSdpBindRcvdHigherBriPrio
2.70.22. tmnxSvcSdpBindRcvdTCN
2.70.23. tmnxSvcTopoChgSdpBindMajorState
2.70.24. tmnxSvcTopoChgSdpBindState
2.70.25. topologyChangePipMajorState
2.70.26. topologyChangePipState
2.70.27. topologyChangeSapMajorState
2.70.28. topologyChangeSapState
2.70.29. topologyChangeVcpState
2.70.30. unacknowledgedTCN
2.70.31. vcpActiveProtocolChange
2.71. SVCMGR
2.71.1. aluIpTransportStateChanged
2.71.2. dynamicSdpBindConfigChanged
2.71.3. dynamicSdpBindCreationFailed
2.71.4. dynamicSdpConfigChanged
2.71.5. dynamicSdpCreationFailed
2.71.6. hostConnectivityLost
2.71.7. hostConnectivityRestored
2.71.8. iesIfStatusChanged
2.71.9. msapCreationFailure
2.71.10. msapStateChanged
2.71.11. sapAtmPppNcpFailure
2.71.12. sapAtmPppSessionFailure
2.71.13. sapCemPacketDefectAlarm
2.71.14. sapCemPacketDefectAlarmClear
2.71.15. sapEthLoopbackStarted
2.71.16. sapEthLoopbackStopped
2.71.17. sapHostBGPPeeringSetupFailed
2.71.18. sapHostRipListenerSetupFailed
2.71.19. sapIfIgnorePortStateStart
2.71.20. sapIfIgnorePortStateStop
2.71.21. sapIpipeCeIpAddrChange
2.71.22. sapPortStateChangeProcessed
2.71.23. sapReceivedProtSrcMac
2.71.24. sapStatusChanged
2.71.25. sapTlsDataSapInstStatusChgd
2.71.26. sapTlsMacAddrLimitAlarmCleared
2.71.27. sapTlsMacAddrLimitAlarmRaised
2.71.28. sapTlsMacMoveExceeded
2.71.29. sapTlsMacMoveExceedNonBlock
2.71.30. sapTunnelEncapIpMtuTooSmall
2.71.31. sapTunnelStateChange
2.71.32. sdpBandwidthOverbooked
2.71.33. sdpBindEthLoopbackStarted
2.71.34. sdpBindEthLoopbackStopped
2.71.35. sdpBindInsufficientBandwidth
2.71.36. sdpBindIpipeCeIpAddressChange
2.71.37. sdpBindPwLocalStatusBitsChanged
2.71.38. sdpBindPwPeerFaultAddrChanged
2.71.39. sdpBindPwPeerStatusBitsChanged
2.71.40. sdpBindReceivedProtSrcMac
2.71.41. sdpBindSdpStateChangeProcessed
2.71.42. sdpBindStatusChanged
2.71.43. sdpBindTlsMacMoveExceeded
2.71.44. sdpBindTlsMacMoveExceedNonBlock
2.71.45. sdpControlPwActiveStateChg
2.71.46. sdpEgrIfsNetDomInconsCntChanged
2.71.47. sdpKeepAliveLateReply
2.71.48. sdpKeepAliveProbeFailure
2.71.49. sdpKeepAliveStarted
2.71.50. sdpKeepAliveStopped
2.71.51. sdpPbbActvPwWithNonActvCtrlPwChg
2.71.52. sdpStatusChanged
2.71.53. sdpTlsMacAddrLimitAlarmCleared
2.71.54. sdpTlsMacAddrLimitAlarmRaised
2.71.55. svcArpHostOverride
2.71.56. svcArpHostPopulateErr
2.71.57. svcBgpEvpnBHDupMacAddrsDetected
2.71.58. svcBgpEvpnDupMacAddrsCleared
2.71.59. svcBgpEvpnDupMacAddrsDetected
2.71.60. svcBindSysHiUsageAlarmCleared
2.71.61. svcBindSysHiUsageAlarmRaised
2.71.62. svcEndPointMacLimitAlarmCleared
2.71.63. svcEndPointMacLimitAlarmRaised
2.71.64. svcEpipePbbOperStatusChanged
2.71.65. svcEPMCEPConfigMismatch
2.71.66. svcEPMCEPConfigMismatchResolved
2.71.67. svcEPMCEPPassiveModeActive
2.71.68. svcEPMCEPPassiveModePassive
2.71.69. svcEvpnEtreeBumLabelSysHiUsgClr
2.71.70. svcEvpnEtreeBumLabelSysHiUsgSet
2.71.71. svcEvpnMHEsEviDFStateChgd
2.71.72. svcEvpnMHEsIsidDFStateChgd
2.71.73. svcEvpnMHStandbyStatusChg
2.71.74. svcEvpnMplsMacMoveExceedNonBlock
2.71.75. svcEvpnMplsTEPEgrBndSvcHiUsgClr
2.71.76. svcEvpnMplsTEPEgrBndSvcHiUsgSet
2.71.77. svcEvpnMplsTEPEgrBndSysHiUsgClr
2.71.78. svcEvpnMplsTEPEgrBndSysHiUsgSet
2.71.79. svcEvpnMplsTEPHiUsageCleared
2.71.80. svcEvpnMplsTEPHiUsageRaised
2.71.81. svcEvpnRcvdProtSrcMac
2.71.82. svcFdbMimDestTblFullAlrm
2.71.83. svcFdbMimDestTblFullAlrmCleared
2.71.84. svcMSPwRetryExpiredNotif
2.71.85. svcMSPwRtMisconfig
2.71.86. svcOperGrpOperStatusChanged
2.71.87. svcPersistencyProblem
2.71.88. svcRestoreHostProblem
2.71.89. svcSiteMinDnTimerStateChg
2.71.90. svcStatusChanged
2.71.91. svcSysEvpnESDfPrefOperValChange
2.71.92. svcTlsEvpnTunnNHopHiUsgAlarmClr
2.71.93. svcTlsEvpnTunnNHopHiUsgAlarmSet
2.71.94. svcTlsFdbTableFullAlarmCleared
2.71.95. svcTlsFdbTableFullAlarmRaised
2.71.96. svcTlsGroupOperStatusChanged
2.71.97. svcTlsMacPinningViolation
2.71.98. svcTlsMfibTableFullAlarmCleared
2.71.99. svcTlsMfibTableFullAlarmRaised
2.71.100. svcTlsMrpAttrRegistrationFailed
2.71.101. svcTlsMrpAttrTblFullAlarmCleared
2.71.102. svcTlsMrpAttrTblFullAlarmRaised
2.71.103. svcTlsProxyArpDupClear
2.71.104. svcTlsProxyArpDupDetect
2.71.105. svcTlsProxyArpSvcHiUsgClr
2.71.106. svcTlsProxyArpSvcHiUsgSet
2.71.107. svcTlsProxyArpSysHiUsgClr
2.71.108. svcTlsProxyArpSysHiUsgSet
2.71.109. svcTlsProxyNdDupClear
2.71.110. svcTlsProxyNdDupDetect
2.71.111. svcTlsProxyNdSvcHiUsgClr
2.71.112. svcTlsProxyNdSvcHiUsgSet
2.71.113. svcTlsProxyNdSysHiUsgClr
2.71.114. svcTlsProxyNdSysHiUsgSet
2.71.115. svcTlsSiteDesigFwdrChg
2.71.116. svcTlsVTEPEgrVniSvcHiUsgAlarmClr
2.71.117. svcTlsVTEPEgrVniSvcHiUsgAlarmSet
2.71.118. svcTlsVTEPEgrVniSysHiUsgAlarmClr
2.71.119. svcTlsVTEPEgrVniSysHiUsgAlarmSet
2.71.120. svcTlsVTEPHiUsageAlarmCleared
2.71.121. svcTlsVTEPHiUsageAlarmRaised
2.71.122. svcTlsVxInstReplicatorChgd
2.71.123. svcVllSiteDesigFwdrChg
2.71.124. svcVxlanEvpnMplsDestSysHiUsgClr
2.71.125. svcVxlanEvpnMplsDestSysHiUsgSet
2.71.126. tmnxEndPointTxActiveChanged
2.71.127. tmnxIpTunnelOperRemIpChg
2.71.128. tmnxIpTunnelOperStateChange
2.71.129. tmnxSapStpExcepCondStateChng
2.71.130. tmnxStpRootGuardViolation
2.71.131. tmnxSubAcctPlcyFailure
2.71.132. tmnxSubAcctPlcyRadSerOperStatChg
2.71.133. tmnxSubAuthPlcyRadSerOperStatChg
2.71.134. tmnxSubBrgCreated
2.71.135. tmnxSubBrgCvInitFailed
2.71.136. tmnxSubBrgDeleted
2.71.137. tmnxSubBrgRadiusAuthError
2.71.138. tmnxSubBrgRadiusCoaError
2.71.139. tmnxSubBrgRadiusProxyAuthError
2.71.140. tmnxSubBrgRadiusUpdateIpoeSeFail
2.71.141. tmnxSubBrgSessionLimitReached
2.71.142. tmnxSubDhcpOverloadDetected
2.71.143. tmnxSubHostInconsistentAtmTdOvr
2.71.144. tmnxSubHostInfoConflict
2.71.145. tmnxSubHostLcktLimitReached
2.71.146. tmnxSubHostLcktSapLimitReached
2.71.147. tmnxSubIpoeInvalidCidRidChange
2.71.148. tmnxSubIpoeInvalidSessionKey
2.71.149. tmnxSubIpoeMigrHostDeleted
2.71.150. tmnxSubIpoePersistenceRecovery
2.71.151. tmnxSubIpoeSessionBrgNotAuth
2.71.152. tmnxSubIpoeSessionLimitReached
2.71.153. tmnxSubMcsRelatedProblem
2.71.154. tmnxSubMngdHostCreationFail
2.71.155. tmnxSubMngdHostOverride
2.71.156. tmnxSubPlBndFailed
2.71.157. tmnxSubRadiusCoaNatFwdFailed
2.71.158. tmnxSubRadSapCoAError
2.71.159. tmnxSubRadSapDisconnectError
2.71.160. tmnxSubRadSapSubAuthError
2.71.161. tmnxSubRadSdpBndCoAError
2.71.162. tmnxSubRadSdpBndDisconnectError
2.71.163. tmnxSubRadSdpBndSubAuthError
2.71.164. tmnxSubscriberCreated
2.71.165. tmnxSubscriberDeleted
2.71.166. tmnxSubscriberRenamed
2.71.167. tmnxSubSlaacOverride
2.71.168. tmnxSubSlaacSetupFailure
2.71.169. tmnxSubStatsResourceLimitReached
2.71.170. tmnxSubSysChassMemoryUsageHi
2.71.171. tmnxSubUserCategoryError
2.71.172. tmnxSubUserCategoryOutOfCredit
2.71.173. tmnxSubUserCategoryRefreshCredit
2.71.174. tmnxSubVSubnetHostsDeleted
2.71.175. tmnxSvcSysFdbTableHighUsgClr
2.71.176. tmnxSvcSysFdbTableHighUsgSet
2.72. SYSTEM
2.72.1. persistenceRestoreProblem
2.72.2. persistencyClosedAlarmCleared
2.72.3. persistencyClosedAlarmRaised
2.72.4. persistencyEventReport
2.72.5. persistencyFileSysThresCleared
2.72.6. persistencyFileSysThresRaised
2.72.7. sbiBootConfig
2.72.8. sbiBootConfigFailFileError
2.72.9. sbiBootConfigOKFileError
2.72.10. sbiBootSnmpd
2.72.11. schedActionFailure
2.72.12. smScriptAbort
2.72.13. smScriptException
2.72.14. smScriptResult
2.72.15. sntpTimeDiffExceedsThreshold
2.72.16. socket_bind_failed
2.72.17. socket_conn_accept_failed
2.72.18. ssiSaveConfigFailed
2.72.19. ssiSaveConfigSucceeded
2.72.20. ssiSyncBootEnvFailed
2.72.21. ssiSyncBootEnvOK
2.72.22. ssiSyncCertFailed
2.72.23. ssiSyncCertOK
2.72.24. ssiSyncConfigFailed
2.72.25. ssiSyncConfigOK
2.72.26. ssiSyncRollbackFailed
2.72.27. ssiSyncRollbackOK
2.72.28. stiDateAndTimeChanged
2.72.29. tmnxConfigConflict
2.72.30. tmnxConfigCreate
2.72.31. tmnxConfigDelete
2.72.32. tmnxConfigModify
2.72.33. tmnxEhsDroppedByMinDelay
2.72.34. tmnxEhsHandlerInvoked
2.72.35. tmnxFtpClientFailure
2.72.36. tmnxModuleMallocFailed
2.72.37. tmnxRedCpmActive
2.72.38. tmnxRedSingleCpm
2.72.39. tmnxRedStandbyReady
2.72.40. tmnxRedStandbySyncing
2.72.41. tmnxRedStandbySyncLost
2.72.42. tmnxRedSwitchover
2.72.43. tmnxSmLaunchStartFailed
2.72.44. tmnxSnmpdStateChange
2.72.45. tmnxSntpOperChange
2.72.46. tmnxSssiMismatch
2.72.47. tmnxStateChange
2.72.48. tmnxSysAppStats24HrsAvailable
2.72.49. tmnxSysAppStatsWeekAvailable
2.72.50. tmnxSysBaseMacAddressNotSet
2.72.51. tmnxSysExecFinished
2.72.52. tmnxSysExecStarted
2.72.53. tmnxSysNvsysFileError
2.72.54. tmnxSysRollbackDeleteStarted
2.72.55. tmnxSysRollbackFileDeleteStatus
2.72.56. tmnxSysRollbackSaveStarted
2.72.57. tmnxSysRollbackSaveStatusChange
2.72.58. tmnxSysRollbackStarted
2.72.59. tmnxSysRollbackStatusChange
2.72.60. tmnxSysVsdServerAvailable
2.72.61. tmnxSysVsdServerUnavailable
2.72.62. tmnxSysXmppServerFunctional
2.72.63. tmnxSysXmppServerNotFunctional
2.72.64. tmnxTrapDropped
2.73. USER
2.73.1. cli_config_io
2.73.2. cli_unauth_config_io
2.73.3. cli_unauth_user_io
2.73.4. cli_user_io
2.73.5. cli_user_login
2.73.6. cli_user_login_failed
2.73.7. cli_user_login_max_attempts
2.73.8. cli_user_logout
2.73.9. ftp_user_login
2.73.10. ftp_user_login_failed
2.73.11. ftp_user_login_max_attempts
2.73.12. ftp_user_logout
2.73.13. grpc_config_io
2.73.14. grpc_unauth_config_io
2.73.15. grpc_unauth_user_io
2.73.16. grpc_user_io
2.73.17. grpc_user_login
2.73.18. grpc_user_login_failed
2.73.19. grpc_user_login_max_attempts
2.73.20. grpc_user_logout
2.73.21. md_cli_config_io
2.73.22. md_cli_unauth_config_io
2.73.23. md_cli_unauth_user_io
2.73.24. md_cli_user_io
2.73.25. netconf_config_io
2.73.26. netconf_unauth_config_io
2.73.27. netconf_unauth_user_io
2.73.28. netconf_user_io
2.73.29. netconf_user_login
2.73.30. netconf_user_login_failed
2.73.31. netconf_user_login_max_attempts
2.73.32. netconf_user_logout
2.73.33. snmp_user_set
2.74. VIDEO
2.74.1. tmnxVdoAdSpliceAbort
2.74.2. tmnxVdoClientSessionsLmtCleared
2.74.3. tmnxVdoClientSessionsLmtExceeded
2.74.4. tmnxVdoDuplicateSsrcId
2.74.5. tmnxVdoGrpSrcAnlyzrErrState
2.74.6. tmnxVdoGrpSrcAnlyzrStClear
2.74.7. tmnxVdoMdaFccBwLimitCleared
2.74.8. tmnxVdoMdaFccBwLimitExceeded
2.74.9. tmnxVdoMdaFccRetTotBwLmtCleared
2.74.10. tmnxVdoMdaFccRetTotBwLmtExceeded
2.74.11. tmnxVdoMdaFccRetTotSeLmtCleared
2.74.12. tmnxVdoMdaFccRetTotSeLmtExceeded
2.74.13. tmnxVdoMdaFccSesLimitCleared
2.74.14. tmnxVdoMdaFccSesLimitExceeded
2.74.15. tmnxVdoMdaRetBwLimitCleared
2.74.16. tmnxVdoMdaRetBwLimitExceeded
2.74.17. tmnxVdoMdaRetSesLimitCleared
2.74.18. tmnxVdoMdaRetSesLimitExceeded
2.74.19. tmnxVdoMdaSessionsLimitCleared
2.74.20. tmnxVdoMdaSessionsLimitExceeded
2.74.21. tmnxVdoMdaSGLimitCleared
2.74.22. tmnxVdoMdaSGLimitExceeded
2.75. VRRP
2.75.1. tmnxVrrpBecameBackup
2.75.2. tmnxVrrpBfdIntfSessStateChgd
2.75.3. tmnxVrrpIPListMismatch
2.75.4. tmnxVrrpIPListMismatchClear
2.75.5. tmnxVrrpMultipleOwners
2.75.6. tmnxVrrpOperDownInvalidMac
2.75.7. tmnxVrrpOperDownInvalidMacClear
2.75.8. tVrrpBecameBackup
2.75.9. tVrrpIPListMismatch
2.75.10. tVrrpIPListMismatchClear
2.75.11. tVrrpMultipleOwners
2.75.12. tVrrpOperDownInvalidMac
2.75.13. tVrrpOperDownInvalidMacClear
2.75.14. tVrrpPacketDiscarded
2.75.15. tVrrpRouterAdvNotActivated
2.75.16. tVrrpRouterAdvNotActivatedClear
2.75.17. tVrrpTrapNewMaster
2.75.18. vrrpPacketDiscarded
2.75.19. vrrpTrapAuthFailure
2.75.20. vrrpTrapNewMaster
2.75.21. vrrpTrapProtoError
2.76. VRTR
2.76.1. tmnxVRtrArpLmt
2.76.2. tmnxVRtrArpThresholdExceeded
2.76.3. tmnxVRtrBfdExtNoCpmNpResources
2.76.4. tmnxVRtrBfdMaxSessionOnSlot
2.76.5. tmnxVRtrBfdPortTypeNotSupported
2.76.6. tmnxVRtrBfdSessExtDeleted
2.76.7. tmnxVRtrBfdSessExtDown
2.76.8. tmnxVRtrBfdSessExtProtChange
2.76.9. tmnxVRtrBfdSessExtUp
2.76.10. tmnxVRtrDnsFault
2.76.11. tmnxVRtrFibOccupancyThreshold
2.76.12. tmnxVRtrGrtExportLimitReached
2.76.13. tmnxVRtrGrtRoutesExpLimitDropped
2.76.14. tmnxVRtrGrtV6ExportLimitReached
2.76.15. tmnxVRtrGrtV6RoutesExpLimDropped
2.76.16. tmnxVRtrHighRouteCleared
2.76.17. tmnxVRtrHighRouteTCA
2.76.18. tmnxVRtrIfIgnorePortState
2.76.19. tmnxVRtrIfLdpSyncTimerStart
2.76.20. tmnxVRtrIfLdpSyncTimerStop
2.76.21. tmnxVRtrInetAddressAttachFailed
2.76.22. tmnxVRtrIPv6HighRouteCleared
2.76.23. tmnxVRtrIPv6HighRouteTCA
2.76.24. tmnxVRtrIPv6MidRouteTCA
2.76.25. tmnxVRtrIpv6NbrLmt
2.76.26. tmnxVRtrIpv6NbrThresholdExceeded
2.76.27. tmnxVRtrMacAcctLimitCleared
2.76.28. tmnxVRtrMacAcctLimitReached
2.76.29. tmnxVRtrManagedRouteAddFailed
2.76.30. tmnxVRtrMaxArpEntriesCleared
2.76.31. tmnxVRtrMaxArpEntriesTCA
2.76.32. tmnxVRtrMaxRoutes
2.76.33. tmnxVRtrMcastMaxRoutesCleared
2.76.34. tmnxVRtrMcastMaxRoutesTCA
2.76.35. tmnxVRtrMcastMidRouteTCA
2.76.36. tmnxVRtrMidRouteTCA
2.76.37. tmnxVRtrNgBfdNoCpmNpResources
2.76.38. tmnxVRtrNgBfdSessDeleted
2.76.39. tmnxVRtrNgBfdSessDown
2.76.40. tmnxVRtrNgBfdSessProtChange
2.76.41. tmnxVRtrNgBfdSessUp
2.76.42. tmnxVRtrNHRvplsARPExhaust
2.76.43. tmnxVRtrNHRvplsARPHighUsage
2.76.44. tmnxVRtrNHRvplsARPHighUsageClr
2.76.45. tmnxVRtrPdnAddrMismatch
2.76.46. tmnxVRtrPdnAddrMismatchCleared
2.76.47. tmnxVRtrSingleSfmOverloadStateCh
2.76.48. tmnxVRtrStaticRouteCPEStatus
2.76.49. tmnxVRtrStaticRouteStatusChanged
2.77. WLAN_GW
2.77.1. tmnxWlanGwBdCreated
2.77.2. tmnxWlanGwBdDeleted
2.77.3. tmnxWlanGwDsmGtpTunnelSetupFail
2.77.4. tmnxWlanGwGrpMemberUsageHigh
2.77.5. tmnxWlanGwGrpOperStateChanged
2.77.6. tmnxWlanGwGtpMessageDropped
2.77.7. tmnxWlanGwIomActive
2.77.8. tmnxWlanGwMgwConnected
2.77.9. tmnxWlanGwMgwRestarted
2.77.10. tmnxWlanGwMgwStateChanged
2.77.11. tmnxWlanGwNumMgwHi
2.77.12. tmnxWlanGwQosRadiusGtpMismatch
2.77.13. tmnxWlanGwResrcProblemCause
2.77.14. tmnxWlanGwResrcProblemDetected
2.77.15. tmnxWlanGwSubIfPmAddNewPlFailed
2.77.16. tmnxWlanGwSubIfPmCrIntObjFailed
2.77.17. tmnxWlanGwSubIfPmLsQryRtryFailed
2.77.18. tmnxWlanGwSubIfPmNewPlReqFailed
2.77.19. tmnxWlanGwSubIfPmPoolPartialUse
2.77.20. tmnxWlanGwSubIfPmPoolTimeout
2.77.21. tmnxWlanGwSubIfPmPoolUsageLow
2.77.22. tmnxWlanGwSubIfPmStartD6cFailed
2.77.23. tmnxWlanGwSubIfRedActiveChanged
2.77.24. tmnxWlanGwTuQosProblem
2.77.25. tmnxWlanGwUeCreationFail
2.77.26. tmnxWlanGwUeReplacement
2.78. WPP
2.78.1. tmnxWppHostAuthenticationFailed
2.78.2. tmnxWppPortalGroupStatChanged
2.78.3. tmnxWppPortalStatChanged
2.78.4. tmnxWppPortalUnreachable
Customer Document and Product Support
Log Events Tool
MD-CLI User Guide R16.0.R1
1. Using the MD-CLI
1.1. MD-CLI Overview
1.2. Controlling the Management Interface Configuration Mode
1.2.1. Setting the Management Interface Configuration Mode
1.2.1.1. Enabling the MD-CLI from the Classic CLI
1.2.1.2. Switching Between the Classic CLI and MD-CLI Engines
1.2.1.2.1. Executing Classic CLI Commands from the MD-CLI Engine
1.2.1.2.2. MD-CLI and Classic CLI Engine Interactions
1.2.1.2.3. Switching to the Classic CLI Engine
1.2.1.2.4. Switching to the MD-CLI Engine
1.3. Navigating in the MD-CLI
1.3.1. The MD-CLI Command Prompt
1.3.2. Environment Commands
1.3.2.1. Customizing Per-Session Environment Settings
1.3.2.2. Customizing the Session Prompt
1.3.2.2.1. Customizing the Uncommitted Changes Indicator
1.3.2.2.2. Customizing the Line Preceding the Command Prompt
1.3.2.2.3. Customizing the Context Information in the Command Prompt
1.3.2.2.4. Customizing the Timestamp
1.3.2.3. Customizing the Progress Indicator
1.3.2.4. Customizing the more Setting
1.3.2.5. Customizing the Console Settings
1.3.2.6. Customizing the Message Level Security Settings
1.3.2.7. Preventing Changes to Environment Settings
1.3.3. Using Online Help
1.3.3.1. Indicators in the Online Help
1.3.3.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
1.3.3.1.2. Immutable Elements
1.3.3.1.3. Optional Indicators in the Online Help
1.3.4. Operational Root and Global Commands
1.3.5. Navigating the MD-CLI Hierarchy Levels
1.3.6. Using the tree Command
1.3.6.1. Using the Flat Option
1.3.6.2. Using the Detail Option
1.3.7. Using Control Characters and Editing Keystrokes on the Command Line
1.3.8. Using Command Completion
1.3.8.1. Variable Parameter Completion
1.3.8.1.1. Completion for Lists with a Default Keyword
1.3.8.1.2. Completion for Keyword-based Leaf-lists
1.3.8.1.3. Completion for Boolean Elements
1.3.9. Displaying Available Commands using Tab
1.3.10. Modifying the Idle Timeout Value for CLI Sessions
1.3.10.1. Idle Timeout Interaction with the Classic CLI
1.3.11. Using Output Modifiers
1.3.11.1. Using | match Options
1.3.11.1.1. Using Regular Expressions with | match
1.3.11.2. Using | count
1.3.11.3. Using the | no-more Option
1.3.12. Navigating Contexts in the MD-CLI
1.3.12.1. Entering Contexts
1.3.12.2. Exiting Contexts
1.3.13. Executing Commands with a File
1.3.13.1. Using Commands that Switch Engines in an Executable File
1.3.14. Displaying Information in the MD-CLI
1.3.14.1. Using the info Command
1.3.14.1.1. Displaying Lists
1.3.14.2. Using the show Command
1.3.14.2.1. Classic CLI Command Availability
1.3.14.2.2. Using the show Command in the MD-CLI Engine
1.3.14.3. Using Output Modifiers
1.3.15. MD-CLI Admin Tree
1.4. Configuring in the MD-CLI
1.4.1. Operational and Configuration MD-CLI Session Modes
1.4.1.1. Global Candidate Configuration Mode
1.4.1.2. Exclusive Candidate Configuration Mode
1.4.1.3. Read-Only Candidate Configuration Mode
1.4.2. Entering and Exiting a Configuration Mode in the MD-CLI
1.4.2.1. Transitioning Between Configuration Modes
1.4.3. Transactional Method Overview
1.4.3.1. Configuration Workflow
1.4.4. The MD-CLI Tree Structure
1.4.5. Adding Configuration Statements
1.4.5.1. Default Values for Key Leafs
1.4.5.2. Entering Integer Values
1.4.5.3. Configuring Lists
1.4.5.3.1. Special Handling for Lists with all Key Leafs
1.4.5.4. Configuring Leaf-Lists
1.4.5.5. Configuring Leafs with Units
1.4.5.6. Flexible Input for MAC and IPv6 Addresses
1.4.6. Deleting Configuration Statements
1.4.6.1. Deleting Leafs
1.4.6.2. Deleting Containers
1.4.6.3. Deleting List Entries and Lists
1.4.6.3.1. Deleting Leaf-List Entries and Leaf-Lists
1.4.7. Copying Configuration Statements
1.4.8. Committing a Configuration
1.4.8.1. Viewing the Uncommitted Configuration Changes
1.4.8.1.1. Using the compare Outputs to Copy and Paste
1.4.8.2. Discarding Configuration Changes
1.4.8.3. Validating the Candidate Configuration
1.4.8.4. Committing the Candidate Configuration
1.4.8.4.1. Issuing a Commit Operation from Global or Exclusive Configuration Mode
1.4.8.4.2. Using the commit confirmed Command
1.4.9. Saving Changes
1.4.10. Rolling Back a Configuration from a Checkpoint File
1.4.11. Loading a Configuration File
1.4.11.1. Using info Outputs in Load Files
1.4.12. Using Configuration Groups
1.4.12.1. Creating Configuration Groups
1.4.12.1.1. Exact Match
1.4.12.1.2. Regular Expression Match
1.4.12.2. Applying Configuration Groups
1.4.12.3. Inheritance Rules
1.4.12.4. Displaying the Expanded Configuration
1.4.12.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
1.4.12.6. Configuration Group Example
1.4.13. Viewing the Status of the Local Datastores
1.4.13.1. Unlocking a Locked Datastore
1.5. Troubleshooting
1.5.1. Debug commands
1.5.2. Logging Debug Events in the MD-CLI
1.6. MD-CLI Advanced Tips and Features
1.6.1. Discarding Changes in Specific Contexts
2. Standards and Protocol Support
Customer Document and Product Support
1. Using the MD-CLI
1.1. MD-CLI Overview
1.2. Controlling the Management Interface Configuration Mode
1.2.1. Setting the Management Interface Configuration Mode
1.2.1.1. Enabling the MD-CLI from the Classic CLI
1.2.1.2. Switching Between the Classic CLI and MD-CLI Engines
1.2.1.2.1. Executing Classic CLI Commands from the MD-CLI Engine
1.2.1.2.2. MD-CLI and Classic CLI Engine Interactions
1.2.1.2.3. Switching to the Classic CLI Engine
1.2.1.2.4. Switching to the MD-CLI Engine
1.3. Navigating in the MD-CLI
1.3.1. The MD-CLI Command Prompt
1.3.2. Environment Commands
1.3.2.1. Customizing Per-Session Environment Settings
1.3.2.2. Customizing the Session Prompt
1.3.2.2.1. Customizing the Uncommitted Changes Indicator
1.3.2.2.2. Customizing the Line Preceding the Command Prompt
1.3.2.2.3. Customizing the Context Information in the Command Prompt
1.3.2.2.4. Customizing the Timestamp
1.3.2.3. Customizing the Progress Indicator
1.3.2.4. Customizing the more Setting
1.3.2.5. Customizing the Console Settings
1.3.2.6. Customizing the Message Level Security Settings
1.3.2.7. Preventing Changes to Environment Settings
1.3.3. Using Online Help
1.3.3.1. Indicators in the Online Help
1.3.3.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
1.3.3.1.2. Immutable Elements
1.3.3.1.3. Optional Indicators in the Online Help
1.3.4. Operational Root and Global Commands
1.3.5. Navigating the MD-CLI Hierarchy Levels
1.3.6. Using the tree Command
1.3.6.1. Using the Flat Option
1.3.6.2. Using the Detail Option
1.3.7. Using Control Characters and Editing Keystrokes on the Command Line
1.3.8. Using Command Completion
1.3.8.1. Variable Parameter Completion
1.3.8.1.1. Completion for Lists with a Default Keyword
1.3.8.1.2. Completion for Keyword-based Leaf-lists
1.3.8.1.3. Completion for Boolean Elements
1.3.9. Displaying Available Commands using Tab
1.3.10. Modifying the Idle Timeout Value for CLI Sessions
1.3.10.1. Idle Timeout Interaction with the Classic CLI
1.3.11. Using Output Modifiers
1.3.11.1. Using | match Options
1.3.11.1.1. Using Regular Expressions with | match
1.3.11.2. Using | count
1.3.11.3. Using the | no-more Option
1.3.12. Navigating Contexts in the MD-CLI
1.3.12.1. Entering Contexts
1.3.12.2. Exiting Contexts
1.3.13. Executing Commands with a File
1.3.13.1. Using Commands that Switch Engines in an Executable File
1.3.14. Displaying Information in the MD-CLI
1.3.14.1. Using the info Command
1.3.14.1.1. Displaying Lists
1.3.14.2. Using the show Command
1.3.14.2.1. Classic CLI Command Availability
1.3.14.2.2. Using the show Command in the MD-CLI Engine
1.3.14.3. Using Output Modifiers
1.3.15. MD-CLI Admin Tree
1.4. Configuring in the MD-CLI
1.4.1. Operational and Configuration MD-CLI Session Modes
1.4.1.1. Global Candidate Configuration Mode
1.4.1.2. Exclusive Candidate Configuration Mode
1.4.1.3. Read-Only Candidate Configuration Mode
1.4.2. Entering and Exiting a Configuration Mode in the MD-CLI
1.4.2.1. Transitioning Between Configuration Modes
1.4.3. Transactional Method Overview
1.4.3.1. Configuration Workflow
1.4.4. The MD-CLI Tree Structure
1.4.5. Adding Configuration Statements
1.4.5.1. Default Values for Key Leafs
1.4.5.2. Entering Integer Values
1.4.5.3. Configuring Lists
1.4.5.3.1. Special Handling for Lists with all Key Leafs
1.4.5.4. Configuring Leaf-Lists
1.4.5.5. Configuring Leafs with Units
1.4.5.6. Flexible Input for MAC and IPv6 Addresses
1.4.6. Deleting Configuration Statements
1.4.6.1. Deleting Leafs
1.4.6.2. Deleting Containers
1.4.6.3. Deleting List Entries and Lists
1.4.6.3.1. Deleting Leaf-List Entries and Leaf-Lists
1.4.7. Copying Configuration Statements
1.4.8. Committing a Configuration
1.4.8.1. Viewing the Uncommitted Configuration Changes
1.4.8.1.1. Using the compare Outputs to Copy and Paste
1.4.8.2. Discarding Configuration Changes
1.4.8.3. Validating the Candidate Configuration
1.4.8.4. Committing the Candidate Configuration
1.4.8.4.1. Issuing a Commit Operation from Global or Exclusive Configuration Mode
1.4.8.4.2. Using the commit confirmed Command
1.4.9. Saving Changes
1.4.10. Rolling Back a Configuration from a Checkpoint File
1.4.11. Loading a Configuration File
1.4.11.1. Using info Outputs in Load Files
1.4.12. Using Configuration Groups
1.4.12.1. Creating Configuration Groups
1.4.12.1.1. Exact Match
1.4.12.1.2. Regular Expression Match
1.4.12.2. Applying Configuration Groups
1.4.12.3. Inheritance Rules
1.4.12.4. Displaying the Expanded Configuration
1.4.12.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
1.4.12.6. Configuration Group Example
1.4.13. Viewing the Status of the Local Datastores
1.4.13.1. Unlocking a Locked Datastore
1.5. Troubleshooting
1.5.1. Debug commands
1.5.2. Logging Debug Events in the MD-CLI
1.6. MD-CLI Advanced Tips and Features
1.6.1. Discarding Changes in Specific Contexts
2. Standards and Protocol Support
Customer Document and Product Support
MD-CLI Command Reference, R16.0.R1
7450 ESS, 7750 SR, and 7950 XRS MD-CLI Command Reference R16.0.R1
7450 ESS, 7750 SR, and 7950 XRS MD-CLI Command Reference R16.0.R1
MPLS Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Nokia Router Configuration Process
2. MPLS and RSVP
2.1. MPLS
2.1.1. MPLS Label Stack
2.1.1.1. Label Values
2.1.1.2. Reserved Label Blocks
2.1.2. MPLS Entropy Label and Hash Label
2.1.2.1. Entropy Label Capability for BGP Labeled Routes
2.1.2.2. Entropy Label for Segment Routed Tunnels
2.1.2.3. Inserting and Processing the Entropy Label
2.1.2.3.1. Ingress LER
2.1.2.3.2. LSR
2.1.2.4. Egress LER
2.1.2.5. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
2.1.2.6. Entropy Label on OAM Packets
2.1.3. Label Switching Routers
2.1.3.1. LSP Types
2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
2.1.4.1. Bootstrapping and Maintaining the BFD Session
2.1.4.2. LSP BFD Configuration
2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
2.1.4.4. BFD Configuration on RSVP-TE LSPs
2.1.4.5. Determining LSP Availability from LSP BFD
2.1.4.5.1. Failure-action down
2.1.4.5.2. Failure-action failover
2.1.4.6. MPLS/RSVP on Broadcast Interface
2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.1.6. Manual Bypass LSP
2.1.6.1. PLR Bypass LSP Selection Rules
2.1.6.2. FRR Node-Protection (Facility)
2.1.7. Uniform FRR Failover Time
2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
2.1.8.3. Measurement of LSP Bandwidth
2.1.8.4. Passive Monitoring of LSP Bandwidth
2.1.8.5. Periodic Automatic Bandwidth Adjustment
2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
2.2. RSVP
2.2.1. Using RSVP for MPLS
2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
2.2.1.2. Hello Protocol
2.2.1.3. MD5 Authentication of RSVP Interface
2.2.1.4. Configuring Authentication using Keychains
2.2.2. Reservation Styles
2.2.2.1. RSVP Message Pacing
2.2.3. RSVP Overhead Refresh Reduction
2.2.4. RSVP Graceful Restart Helper
2.2.5. Enhancements to RSVP Control Plane Congestion Control
2.2.6. RSVP LSP Statistics
2.2.7. P2MP RSVP-TE LSP Statistics
2.2.7.1. Configuring RSVP P2MP LSP Egress Statistics
2.2.7.2. Configuring RSVP P2MP LSP Ingress Statistics
2.2.7.3. Configuring Implicit Null
2.2.8. Using Unnumbered Point-to-Point Interface in RSVP
2.2.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.2.9. MPLS Segment Routing Traffic Statistics
2.3. MPLS Transport Profile
2.3.1. MPLS-TP Model
2.3.2. MPLS-TP Provider Edge and Gateway
2.3.2.1. VLL Services
2.3.2.2. Spoke-SDP Termination
2.3.3. MPLS-TP LSR
2.3.4. Detailed Descriptions of MPLS-TP
2.3.4.1. MPLS-TP LSPs
2.3.4.2. MPLS-TP on Pseudowires
2.3.5. MPLS-TP Maintenance Identifiers
2.3.5.1. Generic Associated Channel
2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.3.5.2.2. Proactive CC, CV and RDI
2.3.5.2.3. BFD-based RDI
2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.3.5.4. PW Control Channel Status Request Mechanism
2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
2.3.5.7. MPLS-TP LSP Protection
2.3.6. Alarm Indication Signal (AIS)
2.3.7. Configuring MPLS-TP
2.3.7.1. Configuration Overview
2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
2.3.7.5. Interface Configuration for MPLS-TP
2.3.7.6. LER Configuration for MPLS-TP
2.3.7.6.1. LSP and Path Configuration
2.3.7.6.2. Support for Downstream Mapping Information
2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
2.3.7.6.4. Protection templates and Linear Protection Configuration
2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.3.8. MPLS-TP Show Commands
2.3.8.1. Static MPLS Labels
2.3.8.2. MPLS-TP Tunnel Configuration
2.3.8.3. MPLS-TP Path configuration
2.3.8.4. MPLS-TP Protection
2.3.8.5. MPLS TP Node Configuration
2.3.8.6. MPLS-TP Interfaces
2.3.9. MPLS-TP Debug Commands
2.4. Traffic Engineering
2.4.1. TE Metric (IS-IS and OSPF)
2.4.2. Admin Group Support on Facility Bypass Backup LSP
2.4.2.1. Procedures at Head-End Node
2.4.2.2. Procedures at PLR Node
2.4.3. Diff-Serv Traffic Engineering
2.4.3.1. Mapping of Traffic to a Diff-Serv LSP
2.4.3.2. Admission Control of Classes
2.4.3.2.1. Maximum Allocation Model
2.4.3.2.2. Russian Doll Model
2.4.3.3. RSVP Control Plane Extensions
2.4.3.4. IGP Extensions
2.4.3.5. Diff-Serv TE Configuration and Operation
2.4.3.5.1. RSVP Protocol Level
2.4.3.5.2. RSVP Interface Level
2.4.3.5.3. LSP and LSP Path Levels
2.4.4. Diff-Serv TE LSP Class Type Change under Failure
2.4.4.1. LSP Primary Path Retry Procedures
2.4.4.2. Bandwidth Sharing Across Class Types
2.4.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
2.4.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
2.5. Advanced MPLS/RSVP Features
2.5.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
2.5.2. LSP Path Change
2.5.3. Manual LSP Path Switch
2.5.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.5.5. Automatic Creation of RSVP-TE LSP Mesh
2.5.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
2.5.5.1.1. Feature Configuration
2.5.5.1.2. Feature Behavior
2.5.5.1.3. Multi-Area and Multi-Instance Support
2.5.5.1.4. Mesh LSP Name Encoding and Statistics
2.5.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
2.5.5.2.1. Feature Configuration
2.5.5.2.2. Feature Behavior
2.5.6. IGP Shortcut and Forwarding Adjacency
2.5.6.1. IGP Shortcut Feature Configuration
2.5.6.1.1. IGP Shortcut Binding Construct
2.5.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
2.5.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
2.5.6.2.2. Application Support
2.5.6.2.3. Loop-free Alternate (LFA) Protection Support
2.5.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
2.5.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
2.5.6.3.2. Application Support
2.5.6.3.3. Loop-free Alternate (LFA) Protection Support
2.5.6.4. Using LSP Relative Metric with IGP Shortcut
2.5.6.5. ECMP Considerations
2.5.6.6. Handling of Control Packets
2.5.6.7. Forwarding Adjacency
2.5.6.8. LDP Forwarding over IGP Shortcut
2.5.6.9. Handling of Multicast Packets
2.5.7. Disabling TTL Propagation in an LSP Shortcut
2.5.8. RSVP-TE LSP Signaling using LSP Template
2.5.9. Shared Risk Link Groups
2.5.9.1. Enabling Disjoint Backup Paths
2.5.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
2.5.9.3. Static Configurations of SRLG Memberships
2.5.10. TE Graceful Shutdown
2.5.11. Soft Preemption of Diff-Serv RSVP LSP
2.5.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
2.5.13. Inter-Area TE LSP (ERO Expansion Method)
2.5.13.1. Area Border Node FRR Protection for Inter-Area LSP
2.5.13.1.1. Rerouting of Inter-Area LSP
2.5.13.1.2. Behavior of MPLS Options in Inter-Area LSP
2.5.13.2. Inter-Area LSP support of OSPF Virtual Links
2.5.13.3. Area Border Node FRR Protection for Inter-Area LSP
2.5.14. Timer-based Reversion for RSVP-TE LSPs
2.5.15. MPLS Entropy Label
2.5.16. LSP Tagging and Auto-Bind Using Tag Information
2.5.16.1. Internal Route Color to LSP Color Matching Algorithm
2.5.16.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
2.5.16.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
2.5.17. Accounting for Dark Bandwidth
2.6. Point-to-Multipoint (P2MP) RSVP LSP
2.6.1. Application in Video Broadcast
2.6.2. P2MP LSP Data Plane
2.6.2.1. Procedures at Ingress LER Node
2.6.2.2. Procedures at LSR Node
2.6.2.3. Procedures at Branch LSR Node
2.6.2.4. Procedures at Egress LER Node
2.6.2.5. Procedures at BUD LSR Node
2.6.3. Ingress Path Management for P2MP LSP Packets
2.6.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
2.6.4. RSVP Control Plane in a P2MP LSP
2.6.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.6.5.1. Procedures at Ingress LER Node
2.6.5.2. Procedures at Egress LER Node
2.6.5.2.1. Procedures with a Primary Tunnel Interface
2.7. Segment Routing With Traffic Engineering (SR-TE)
2.7.1. SR-TE Support
2.7.2. SR-TE LSP Instantiation
2.7.2.1. PCC-Initiated and PCC-Controlled LSP
2.7.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
2.7.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
2.7.3. SR-TE LSP Path Computation
2.7.3.1. Service and Shortcut Application SR-TE Label Stack Check
2.7.4. SR-TE LSP Protection
2.7.5. Static Route Resolution using SR-TE LSP
2.7.6. BGP Shortcuts Using SR-TE LSP
2.7.7. BGP Label Route Resolution Using SR-TE LSP
2.7.8. Service Packet Forwarding using SR-TE LSP
2.7.9. Data Path Support
2.7.9.1. SR-TE LSP Metric and MTU Settings
2.7.9.2. Hash Label and Entropy Label Support
2.7.10. SR-TE Auto-LSP
2.7.10.1. Feature Configuration
2.7.10.2. Automatic Creation of an SR-TE Mesh LSP
2.7.10.3. Automatic Creation of an SR-TE One-Hop LSP
2.7.10.4. Interaction with PCEP
2.7.10.5. Forwarding Contexts Supported with SR-TE Auto-LSP
2.8. MPLS Service Usage
2.8.1. Service Distribution Paths
2.9. MPLS/RSVP Configuration Process Overview
2.10. Configuration Notes
2.11. Configuring MPLS and RSVP with CLI
2.11.1. MPLS Configuration Overview
2.11.1.1. LSPs
2.11.1.2. Paths
2.11.1.3. Router Interface
2.11.1.4. Choosing the Signaling Protocol
2.11.2. Basic MPLS Configuration
2.11.3. Common Configuration Tasks
2.11.4. Configuring MPLS Components
2.11.4.1. Configuring Global MPLS Parameters
2.11.4.2. Configuring an MPLS Interface
2.11.4.3. Configuring MPLS Paths
2.11.4.4. Configuring an MPLS LSP
2.11.4.5. Configuring a Static LSP
2.11.4.6. Configuring Manual Bypass Tunnels
2.11.4.7. Configuring RSVP Parameters
2.11.4.8. Configure RSVP Message Pacing Parameters
2.11.4.9. Configuring Graceful Shutdown
2.12. MPLS Configuration Management Tasks
2.12.1. Deleting MPLS
2.12.2. Modifying MPLS Parameters
2.12.3. Modifying an MPLS LSP
2.12.4. Modifying MPLS Path Parameters
2.12.5. Modifying MPLS Static LSP Parameters
2.12.6. Deleting an MPLS Interface
2.13. RSVP Configuration Management Tasks
2.13.1. Modifying RSVP Parameters
2.13.2. Modifying RSVP Message Pacing Parameters
2.13.3. Deleting an Interface from RSVP
2.14. Configuring and Operating SR-TE
2.14.1. SR-TE Configuration Prerequisites
2.14.2. SR-TE LSP Configuration Overview
2.14.3. Configuring Path Computation and Control for SR-TE LSP
2.14.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
2.14.4. Configuring SR-TE LSP Label Stack Size
2.14.5. Configuring Adjacency SID Parameters
2.14.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
2.14.7. Configuring a Mesh of SR-TE Auto-LSPs
2.15. MPLS/RSVP Configuration Command Reference
2.15.1. Command Hierarchies
2.15.1.1. MPLS Commands
2.15.1.2. MPLS-TP Commands
2.15.1.3. MPLS-Label Commands
2.15.1.4. LSP Commands
2.15.1.5. LSP-BFD Commands
2.15.1.6. MPLS Path Commands
2.15.1.7. RSVP Commands
2.15.2. Command Descriptions
2.15.2.1. MPLS Commands
2.15.2.1.1. Generic Commands
2.15.2.1.2. MPLS Commands
2.15.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
2.15.2.2. RSVP Commands
2.15.2.2.1. Generic Commands
2.15.2.2.2. RSVP Commands
2.15.2.2.3. Interface Commands
2.15.2.2.4. Message Pacing Commands
2.16. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
2.16.1. Command Hierarchies
2.16.1.1. Show Commands
2.16.1.2. Tools Commands
2.16.1.3. Router Commands
2.16.1.4. Clear Commands
2.16.1.5. Debug Commands
2.16.2. Command Descriptions
2.16.2.1. Show Commands
2.16.2.2. Show Router BFD session Commands
2.16.2.3. Show MPLS-Labels Commands
2.16.2.4. Show RSVP Commands
2.16.2.5. Tools Commands
2.16.2.6. Clear Commands
2.16.2.7. Debug Commands
3. GMPLS
3.1. GMPLS
3.1.1. Example Applications
3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
3.1.1.2. Use Case 2: Multi-Layer Resiliency
3.2. GMPLS UNI Architecture
3.2.1. Addressing and End-to-End gLSP Architecture
3.3. 1830 PSS Identifiers
3.4. Recovery Reference Models
3.4.1. End to End Recovery (IP-layer)
3.4.2. End to End ECMP
3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
3.4.4. End to End Recovery (GMPLS Layer)
3.4.4.1. Unprotected gLSP
3.4.4.2. Full LSP Rerouting
3.4.4.3. 1: N Protection
3.4.4.4. Optical Segment Recovery
3.5. GMPLS Configuration Overview
3.6. LMP and IPCC Configuration
3.6.1. Configuration of IP Communication Channels for LMP and RSVP
3.6.2. Configuring LMP
3.6.3. Configuring Traffic Engineering Links and Data Bearers
3.7. Configuring MPLS Paths for GMPLS
3.8. Configuring RSVP in GMPLS
3.9. Configuring a GMPLS LSP on the UNI
3.9.1. gLSP Constraints
3.10. Bandwidth
3.11. Shared Risk Link Groups
3.12. Optical Network Segment Recovery
3.13. Configuration of End-to-End GMPLS Recovery
3.14. GMPLS Tunnel Groups
3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
3.16. Configuration Notes
3.17. GMPLS Configuration Command Reference
3.17.1. Command Hierarchies
3.17.1.1. LMP Commands
3.17.1.2. GMPLS Commands
3.17.1.3. GMPLS Tunnel Group Commands
3.17.2. Command Descriptions
3.17.2.1. LMP Commands
3.17.2.2. GMPLS Commands
3.17.2.2.1. GMPLS Tunnel Group Commands
3.18. Show, Clear, Debug, and Tools Command Reference
3.18.1. Command Hierarchies
3.18.1.1. Show Commands
3.18.1.2. Clear Commands
3.18.1.3. Debug Commands
3.18.1.4. Tools Commands
3.18.2. Command Descriptions
3.18.2.1. Show Commands
3.18.2.2. Clear Commands
3.18.2.3. Debug Commands
3.18.2.4. Tools Commands
4. MPLS Forwarding Policy
4.1. Introduction
4.2. Feature Validation and Operation Procedures
4.2.1. Policy Parameters and Validation Procedure Rules
4.2.2. Policy Resolution and Operational Procedures
4.3. Data Path Support
4.3.1. MPLS Forwarding Policy Data Path Model
4.3.2. Spraying of Packets over the Next-hops of a NHG
4.3.3. Outgoing Packet Ethertype Setting and TTL Handling in Label-binding Policy
4.4. Statistics
4.4.1. Ingress Statistics
4.5. Configuring Static Label Routes using MPLS Forwarding Policy
4.5.1. Steering Flows to an Indirect Next-Hop
4.5.2. Steering Flows to a Direct Next-Hop
4.6. SLR Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. MPLS SLR Forwarding Policy Commands
4.6.2. Command Descriptions
4.6.2.1. MPLS SLR Forwarding Policy Commands
4.7. SLR Show Command Reference
4.7.1. Command Hierarchies
4.7.1.1. Show Commands
4.7.2. Command Descriptions
4.7.2.1. Show Commands
5. PCEP
5.1. Introduction to the Path Computation Element Protocol (PCEP)
5.1.1. PCC and PCE Configuration
5.1.2. Base Implementation of Path Computation Elements (PCE)
5.1.3. PCEP Session Establishment and Maintenance
5.1.4. PCEP Parameters
5.1.4.1. Stateful PCE
5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
5.1.4.3. LSP Initiation
5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
5.1.4.3.2. PCEP Support for RSVP-TE LSP
5.1.4.3.3. LSP Path Diversity and Bidirectionality Constraints
5.2. Configuring and Operating RSVP-TE LSP with PCEP
5.3. PCEP Configuration Command Reference
5.3.1. Command Hierarchies
5.3.1.1. PCEP Commands
5.3.2. Command Descriptions
5.3.2.1. PCEP Commands
6. Segment Routing Policies
6.1. Statically-Configured Segment Routing Policies
6.2. BGP Signaled Segment Routing Policies
6.3. Segment Routing Policy Path Selection and Tie-Breaking
6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
7. Label Distribution Protocol
7.1. Label Distribution Protocol
7.1.1. LDP and MPLS
7.1.2. LDP Architecture
7.1.3. Subsystem Interrelationships
7.1.3.1. Memory Manager and LDP
7.1.3.2. Label Manager
7.1.3.3. LDP Configuration
7.1.3.4. Logger
7.1.3.5. Service Manager
7.1.4. Execution Flow
7.1.4.1. Initialization
7.1.4.2. Session Lifetime
7.1.4.2.1. Adjacency Establishment
7.1.4.2.2. Session Establishment
7.1.5. Label Exchange
7.1.5.1. Other Reasons for Label Actions
7.1.5.2. Cleanup
7.1.5.3. Configuring Implicit Null Label
7.1.6. Global LDP Filters
7.1.6.1. Per LDP Peer FEC Import and Export Policies
7.1.7. Configuring Multiple LDP LSR ID
7.1.7.1. Advertisement of FEC for Local LSR ID
7.1.8. LDP FEC Resolution Per Specified Community
7.1.8.1. Configuration
7.1.8.2. Operation
7.1.9. T-LDP hello reduction
7.1.10. Tracking a T-LDP Peer with BFD
7.1.11. Link LDP Hello Adjacency Tracking with BFD
7.1.12. LDP LSP Statistics
7.1.13. MPLS Entropy Label
7.1.14. Importing LDP Tunnels to Non-Host Prefixes to TTM
7.2. TTL Security for BGP and LDP
7.3. ECMP Support for LDP
7.3.1. Label Operations
7.4. Unnumbered Interface Support in LDP
7.4.1. Feature Configuration
7.4.2. Operation of LDP over an Unnumbered IP Interface
7.4.2.1. Link LDP
7.4.2.2. Targeted LDP
7.4.2.3. FEC Resolution
7.5. LDP over RSVP Tunnels
7.5.1. Signaling and Operation
7.5.1.1. LDP Label Distribution and FEC Resolution
7.5.1.2. Default FEC Resolution Procedure
7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
7.5.2. Rerouting Around Failures
7.5.2.1. LDP-over-RSVP Tunnel Protection
7.5.2.2. ABR Protection
7.6. LDP over RSVP Without Area Boundary
7.6.1. LDP over RSVP and ECMP
7.7. Weighted Load Balancing for LDP over RSVP
7.7.1. Interaction with Class-Based Forwarding
7.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
7.8.1. Configuration and Operation
7.8.2. Support of a Class Forwarding Policy with LDP-over-RSVP
7.9. LDP ECMP Uniform Failover
7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
7.10.1. LDP FRR Configuration
7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
7.10.2. LDP FRR Procedures
7.10.2.1. ECMP Considerations
7.10.2.2. LDP FRR and LDP Shortcut
7.10.2.3. LDP FRR and LDP-over-RSVP
7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
7.11. LDP FEC to BGP Label Route Stitching
7.11.1. Configuration
7.11.2. Detailed LDP FEC Resolution
7.11.3. Detailed BGP Labeled Route Resolution
7.11.4. Data Plane Forwarding
7.12. LDP-SR Stitching for IPv4 prefixes
7.12.1. LDP-SR Stitching Configuration
7.12.2. Stitching in the LDP-to-SR Direction
7.12.3. Stitching in the SR-to-LDP Direction
7.13. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes
7.14. Automatic Creation of a Targeted Hello Adjacency and LDP Session
7.14.1. Feature Configuration
7.14.2. Feature Behavior
7.15. Multicast P2MP LDP for GRT
7.16. LDP P2MP Support
7.16.1. LDP P2MP Configuration
7.16.2. LDP P2MP Protocol
7.16.3. Make Before Break (MBB)
7.16.4. ECMP Support
7.16.5. Inter-AS Non-segmented mLDP
7.16.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
7.16.5.2. LDP Recursive FEC Process
7.16.5.3. Supported Recursive Opaque Values
7.16.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
7.16.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
7.16.5.5.1. Leaf and ABR Behavior
7.16.5.5.2. Intra-AS Support
7.16.5.5.3. Opaque Type Behavior with Basic FEC Generation
7.16.5.5.4. Inter-AS Support
7.16.5.6. Redundancy and Resiliency
7.16.5.7. ASBR Physical Connection
7.16.5.8. OAM
7.16.5.9. ECMP Support
7.16.5.9.1. ECMP Hash Algorithm
7.16.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
7.16.6. Intra-AS Non-segmented mLDP
7.16.6.1. ABR MoFRR for Intra-AS
7.16.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
7.16.7. ASBR MoFRR
7.16.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
7.16.7.2. ASBR MoFRR Leaf Behavior
7.16.7.3. ASBR MoFRR ASBR Behavior
7.16.7.4. MoFRR Root AS Behavior
7.16.7.5. Traffic Flow
7.16.7.6. Failure Detection and Handling
7.16.7.7. Failure Scenario
7.16.7.8. ASBR MoFRR Consideration
7.16.7.9. ASBR MoFRR Opaque Support
7.16.8. MBB for MoFRR
7.16.9. Add-path for Route Reflectors
7.17. Multicast LDP Fast Upstream Switchover
7.17.1. Feature Configuration
7.17.2. Feature Behavior
7.17.3. Uniform Failover from Primary to Backup ILM
7.18. Multi-Area and Multi-Instance Extensions to LDP
7.18.1. LDP Shortcut for BGP Next-Hop Resolution
7.18.2. LDP Shortcut for IGP Routes
7.18.2.1. LDP Shortcut Configuration
7.18.2.2. IGP Route Resolution
7.18.2.3. LDP Shortcut Forwarding Plane
7.18.3. ECMP Considerations
7.18.4. Disabling TTL Propagation in an LSP Shortcut
7.19. LDP Graceful Handling of Resource Exhaustion
7.19.1. LDP Base Graceful Handling of Resources
7.20. LDP Enhanced Graceful Handling of Resources
7.20.1. LSR Overload Notification
7.20.2. LSR Overload Protection Capability
7.20.3. Procedures for LSR overload protection
7.21. LDP-IGP Synchronization
7.22. MLDP Resolution using Multicast RTM
7.22.1. Other Considerations for Multicast RTM MLDP Resolution
7.23. Bidirectional Forwarding Detection for LDP LSPs
7.23.1. Bootstrapping and Maintaining LSP BFD Sessions
7.23.2. BFD Configuration on LDP LSPs
7.24. User Guidelines and Troubleshooting Procedures
7.24.1. Common Procedures
7.24.2. Base Resource Handling Procedures
7.24.3. Enhanced Resource Handling Procedures
7.25. LDP IPv6 Control and Data Planes
7.25.1. LDP Operation in an IPv6 Network
7.25.2. Link LDP
7.25.3. Targeted LDP
7.25.4. FEC Resolution
7.25.5. LDP Session Capabilities
7.25.6. LDP Adjacency Capabilities
7.25.7. Address and FEC Distribution
7.25.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
7.25.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
7.25.10. IGP and Static Route Synchronization with LDP
7.25.11. BFD Operation
7.25.12. Services Using SDP with an LDP IPv6 FEC
7.25.13. Mirror Services and Lawful Intercept
7.25.13.1. Configuration at mirror source node
7.25.13.2. Configuration at mirror destination node
7.25.14. Static Route Resolution to a LDP IPv6 FEC
7.25.15. IGP Route Resolution to a LDP IPv6 FEC
7.25.16. OAM Support with LDP IPv6
7.25.17. LDP IPv6 Interoperability Considerations
7.25.17.1. Interoperability with Implementations Compliant with RFC 7552
7.25.17.2. LDP IPv6 32-bit LSR-ID
7.25.17.2.1. Feature Configuration
7.25.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
7.25.17.2.3. Migration Considerations
7.25.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
7.26. LDP Process Overview
7.27. Configuring LDP with CLI
7.27.1. LDP Configuration Overview
7.27.2. Basic LDP Configuration
7.27.3. Common Configuration Tasks
7.27.3.1. Enabling LDP
7.27.3.2. Configuring FEC Originate Parameters
7.27.3.3. Configuring Graceful-Restart Helper Parameters
7.27.3.4. Applying Export and Import Policies
7.27.3.5. Targeted Session Parameters
7.27.3.6. Interface Parameters
7.27.3.7. Session Parameters
7.27.3.8. LDP Signaling and Services
7.28. LDP Configuration Management Tasks
7.28.1. Disabling LDP
7.28.2. Modifying Targeted Session Parameters
7.28.3. Modifying Interface Parameters
7.29. LDP Command Reference
7.29.1. Command Hierarchies
7.29.1.1. LDP Commands
7.29.2. Command Descriptions
7.29.2.1. Generic Commands
7.29.2.2. LDP Commands
7.29.2.3. Interface Parameters Commands
7.29.2.4. Session Parameters Commands
7.29.2.5. Targeted Session Commands
7.29.2.6. TCP Session Parameters Commands
7.30. Show, Clear, Debug, and Tools Command Reference
7.30.1. Command Hierarchies
7.30.1.1. Show Commands
7.30.1.2. Clear Commands
7.30.1.3. Debug Commands
7.30.1.4. Tools Commands
7.30.2. Command Descriptions
7.30.2.1. Show LDP Commands
7.30.2.2. Clear Commands
7.30.2.3. Debug Commands
7.30.2.4. Tools Commands
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Nokia Router Configuration Process
2. MPLS and RSVP
2.1. MPLS
2.1.1. MPLS Label Stack
2.1.1.1. Label Values
2.1.1.2. Reserved Label Blocks
2.1.2. MPLS Entropy Label and Hash Label
2.1.2.1. Entropy Label Capability for BGP Labeled Routes
2.1.2.2. Entropy Label for Segment Routed Tunnels
2.1.2.3. Inserting and Processing the Entropy Label
2.1.2.3.1. Ingress LER
2.1.2.3.2. LSR
2.1.2.4. Egress LER
2.1.2.5. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
2.1.2.6. Entropy Label on OAM Packets
2.1.3. Label Switching Routers
2.1.3.1. LSP Types
2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
2.1.4.1. Bootstrapping and Maintaining the BFD Session
2.1.4.2. LSP BFD Configuration
2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
2.1.4.4. BFD Configuration on RSVP-TE LSPs
2.1.4.5. Determining LSP Availability from LSP BFD
2.1.4.5.1. Failure-action down
2.1.4.5.2. Failure-action failover
2.1.4.6. MPLS/RSVP on Broadcast Interface
2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.1.6. Manual Bypass LSP
2.1.6.1. PLR Bypass LSP Selection Rules
2.1.6.2. FRR Node-Protection (Facility)
2.1.7. Uniform FRR Failover Time
2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
2.1.8.3. Measurement of LSP Bandwidth
2.1.8.4. Passive Monitoring of LSP Bandwidth
2.1.8.5. Periodic Automatic Bandwidth Adjustment
2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
2.2. RSVP
2.2.1. Using RSVP for MPLS
2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
2.2.1.2. Hello Protocol
2.2.1.3. MD5 Authentication of RSVP Interface
2.2.1.4. Configuring Authentication using Keychains
2.2.2. Reservation Styles
2.2.2.1. RSVP Message Pacing
2.2.3. RSVP Overhead Refresh Reduction
2.2.4. RSVP Graceful Restart Helper
2.2.5. Enhancements to RSVP Control Plane Congestion Control
2.2.6. RSVP LSP Statistics
2.2.7. P2MP RSVP-TE LSP Statistics
2.2.7.1. Configuring RSVP P2MP LSP Egress Statistics
2.2.7.2. Configuring RSVP P2MP LSP Ingress Statistics
2.2.7.3. Configuring Implicit Null
2.2.8. Using Unnumbered Point-to-Point Interface in RSVP
2.2.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.2.9. MPLS Segment Routing Traffic Statistics
2.3. MPLS Transport Profile
2.3.1. MPLS-TP Model
2.3.2. MPLS-TP Provider Edge and Gateway
2.3.2.1. VLL Services
2.3.2.2. Spoke-SDP Termination
2.3.3. MPLS-TP LSR
2.3.4. Detailed Descriptions of MPLS-TP
2.3.4.1. MPLS-TP LSPs
2.3.4.2. MPLS-TP on Pseudowires
2.3.5. MPLS-TP Maintenance Identifiers
2.3.5.1. Generic Associated Channel
2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.3.5.2.2. Proactive CC, CV and RDI
2.3.5.2.3. BFD-based RDI
2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.3.5.4. PW Control Channel Status Request Mechanism
2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
2.3.5.7. MPLS-TP LSP Protection
2.3.6. Alarm Indication Signal (AIS)
2.3.7. Configuring MPLS-TP
2.3.7.1. Configuration Overview
2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
2.3.7.5. Interface Configuration for MPLS-TP
2.3.7.6. LER Configuration for MPLS-TP
2.3.7.6.1. LSP and Path Configuration
2.3.7.6.2. Support for Downstream Mapping Information
2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
2.3.7.6.4. Protection templates and Linear Protection Configuration
2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.3.8. MPLS-TP Show Commands
2.3.8.1. Static MPLS Labels
2.3.8.2. MPLS-TP Tunnel Configuration
2.3.8.3. MPLS-TP Path configuration
2.3.8.4. MPLS-TP Protection
2.3.8.5. MPLS TP Node Configuration
2.3.8.6. MPLS-TP Interfaces
2.3.9. MPLS-TP Debug Commands
2.4. Traffic Engineering
2.4.1. TE Metric (IS-IS and OSPF)
2.4.2. Admin Group Support on Facility Bypass Backup LSP
2.4.2.1. Procedures at Head-End Node
2.4.2.2. Procedures at PLR Node
2.4.3. Diff-Serv Traffic Engineering
2.4.3.1. Mapping of Traffic to a Diff-Serv LSP
2.4.3.2. Admission Control of Classes
2.4.3.2.1. Maximum Allocation Model
2.4.3.2.2. Russian Doll Model
2.4.3.3. RSVP Control Plane Extensions
2.4.3.4. IGP Extensions
2.4.3.5. Diff-Serv TE Configuration and Operation
2.4.3.5.1. RSVP Protocol Level
2.4.3.5.2. RSVP Interface Level
2.4.3.5.3. LSP and LSP Path Levels
2.4.4. Diff-Serv TE LSP Class Type Change under Failure
2.4.4.1. LSP Primary Path Retry Procedures
2.4.4.2. Bandwidth Sharing Across Class Types
2.4.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
2.4.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
2.5. Advanced MPLS/RSVP Features
2.5.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
2.5.2. LSP Path Change
2.5.3. Manual LSP Path Switch
2.5.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.5.5. Automatic Creation of RSVP-TE LSP Mesh
2.5.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
2.5.5.1.1. Feature Configuration
2.5.5.1.2. Feature Behavior
2.5.5.1.3. Multi-Area and Multi-Instance Support
2.5.5.1.4. Mesh LSP Name Encoding and Statistics
2.5.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
2.5.5.2.1. Feature Configuration
2.5.5.2.2. Feature Behavior
2.5.6. IGP Shortcut and Forwarding Adjacency
2.5.6.1. IGP Shortcut Feature Configuration
2.5.6.1.1. IGP Shortcut Binding Construct
2.5.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
2.5.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
2.5.6.2.2. Application Support
2.5.6.2.3. Loop-free Alternate (LFA) Protection Support
2.5.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
2.5.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
2.5.6.3.2. Application Support
2.5.6.3.3. Loop-free Alternate (LFA) Protection Support
2.5.6.4. Using LSP Relative Metric with IGP Shortcut
2.5.6.5. ECMP Considerations
2.5.6.6. Handling of Control Packets
2.5.6.7. Forwarding Adjacency
2.5.6.8. LDP Forwarding over IGP Shortcut
2.5.6.9. Handling of Multicast Packets
2.5.7. Disabling TTL Propagation in an LSP Shortcut
2.5.8. RSVP-TE LSP Signaling using LSP Template
2.5.9. Shared Risk Link Groups
2.5.9.1. Enabling Disjoint Backup Paths
2.5.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
2.5.9.3. Static Configurations of SRLG Memberships
2.5.10. TE Graceful Shutdown
2.5.11. Soft Preemption of Diff-Serv RSVP LSP
2.5.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
2.5.13. Inter-Area TE LSP (ERO Expansion Method)
2.5.13.1. Area Border Node FRR Protection for Inter-Area LSP
2.5.13.1.1. Rerouting of Inter-Area LSP
2.5.13.1.2. Behavior of MPLS Options in Inter-Area LSP
2.5.13.2. Inter-Area LSP support of OSPF Virtual Links
2.5.13.3. Area Border Node FRR Protection for Inter-Area LSP
2.5.14. Timer-based Reversion for RSVP-TE LSPs
2.5.15. MPLS Entropy Label
2.5.16. LSP Tagging and Auto-Bind Using Tag Information
2.5.16.1. Internal Route Color to LSP Color Matching Algorithm
2.5.16.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
2.5.16.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
2.5.17. Accounting for Dark Bandwidth
2.6. Point-to-Multipoint (P2MP) RSVP LSP
2.6.1. Application in Video Broadcast
2.6.2. P2MP LSP Data Plane
2.6.2.1. Procedures at Ingress LER Node
2.6.2.2. Procedures at LSR Node
2.6.2.3. Procedures at Branch LSR Node
2.6.2.4. Procedures at Egress LER Node
2.6.2.5. Procedures at BUD LSR Node
2.6.3. Ingress Path Management for P2MP LSP Packets
2.6.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
2.6.4. RSVP Control Plane in a P2MP LSP
2.6.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.6.5.1. Procedures at Ingress LER Node
2.6.5.2. Procedures at Egress LER Node
2.6.5.2.1. Procedures with a Primary Tunnel Interface
2.7. Segment Routing With Traffic Engineering (SR-TE)
2.7.1. SR-TE Support
2.7.2. SR-TE LSP Instantiation
2.7.2.1. PCC-Initiated and PCC-Controlled LSP
2.7.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
2.7.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
2.7.3. SR-TE LSP Path Computation
2.7.3.1. Service and Shortcut Application SR-TE Label Stack Check
2.7.4. SR-TE LSP Protection
2.7.5. Static Route Resolution using SR-TE LSP
2.7.6. BGP Shortcuts Using SR-TE LSP
2.7.7. BGP Label Route Resolution Using SR-TE LSP
2.7.8. Service Packet Forwarding using SR-TE LSP
2.7.9. Data Path Support
2.7.9.1. SR-TE LSP Metric and MTU Settings
2.7.9.2. Hash Label and Entropy Label Support
2.7.10. SR-TE Auto-LSP
2.7.10.1. Feature Configuration
2.7.10.2. Automatic Creation of an SR-TE Mesh LSP
2.7.10.3. Automatic Creation of an SR-TE One-Hop LSP
2.7.10.4. Interaction with PCEP
2.7.10.5. Forwarding Contexts Supported with SR-TE Auto-LSP
2.8. MPLS Service Usage
2.8.1. Service Distribution Paths
2.9. MPLS/RSVP Configuration Process Overview
2.10. Configuration Notes
2.11. Configuring MPLS and RSVP with CLI
2.11.1. MPLS Configuration Overview
2.11.1.1. LSPs
2.11.1.2. Paths
2.11.1.3. Router Interface
2.11.1.4. Choosing the Signaling Protocol
2.11.2. Basic MPLS Configuration
2.11.3. Common Configuration Tasks
2.11.4. Configuring MPLS Components
2.11.4.1. Configuring Global MPLS Parameters
2.11.4.2. Configuring an MPLS Interface
2.11.4.3. Configuring MPLS Paths
2.11.4.4. Configuring an MPLS LSP
2.11.4.5. Configuring a Static LSP
2.11.4.6. Configuring Manual Bypass Tunnels
2.11.4.7. Configuring RSVP Parameters
2.11.4.8. Configure RSVP Message Pacing Parameters
2.11.4.9. Configuring Graceful Shutdown
2.12. MPLS Configuration Management Tasks
2.12.1. Deleting MPLS
2.12.2. Modifying MPLS Parameters
2.12.3. Modifying an MPLS LSP
2.12.4. Modifying MPLS Path Parameters
2.12.5. Modifying MPLS Static LSP Parameters
2.12.6. Deleting an MPLS Interface
2.13. RSVP Configuration Management Tasks
2.13.1. Modifying RSVP Parameters
2.13.2. Modifying RSVP Message Pacing Parameters
2.13.3. Deleting an Interface from RSVP
2.14. Configuring and Operating SR-TE
2.14.1. SR-TE Configuration Prerequisites
2.14.2. SR-TE LSP Configuration Overview
2.14.3. Configuring Path Computation and Control for SR-TE LSP
2.14.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
2.14.4. Configuring SR-TE LSP Label Stack Size
2.14.5. Configuring Adjacency SID Parameters
2.14.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
2.14.7. Configuring a Mesh of SR-TE Auto-LSPs
2.15. MPLS/RSVP Configuration Command Reference
2.15.1. Command Hierarchies
2.15.1.1. MPLS Commands
2.15.1.2. MPLS-TP Commands
2.15.1.3. MPLS-Label Commands
2.15.1.4. LSP Commands
2.15.1.5. LSP-BFD Commands
2.15.1.6. MPLS Path Commands
2.15.1.7. RSVP Commands
2.15.2. Command Descriptions
2.15.2.1. MPLS Commands
2.15.2.1.1. Generic Commands
2.15.2.1.2. MPLS Commands
2.15.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
2.15.2.2. RSVP Commands
2.15.2.2.1. Generic Commands
2.15.2.2.2. RSVP Commands
2.15.2.2.3. Interface Commands
2.15.2.2.4. Message Pacing Commands
2.16. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
2.16.1. Command Hierarchies
2.16.1.1. Show Commands
2.16.1.2. Tools Commands
2.16.1.3. Router Commands
2.16.1.4. Clear Commands
2.16.1.5. Debug Commands
2.16.2. Command Descriptions
2.16.2.1. Show Commands
2.16.2.2. Show Router BFD session Commands
2.16.2.3. Show MPLS-Labels Commands
2.16.2.4. Show RSVP Commands
2.16.2.5. Tools Commands
2.16.2.6. Clear Commands
2.16.2.7. Debug Commands
3. GMPLS
3.1. GMPLS
3.1.1. Example Applications
3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
3.1.1.2. Use Case 2: Multi-Layer Resiliency
3.2. GMPLS UNI Architecture
3.2.1. Addressing and End-to-End gLSP Architecture
3.3. 1830 PSS Identifiers
3.4. Recovery Reference Models
3.4.1. End to End Recovery (IP-layer)
3.4.2. End to End ECMP
3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
3.4.4. End to End Recovery (GMPLS Layer)
3.4.4.1. Unprotected gLSP
3.4.4.2. Full LSP Rerouting
3.4.4.3. 1: N Protection
3.4.4.4. Optical Segment Recovery
3.5. GMPLS Configuration Overview
3.6. LMP and IPCC Configuration
3.6.1. Configuration of IP Communication Channels for LMP and RSVP
3.6.2. Configuring LMP
3.6.3. Configuring Traffic Engineering Links and Data Bearers
3.7. Configuring MPLS Paths for GMPLS
3.8. Configuring RSVP in GMPLS
3.9. Configuring a GMPLS LSP on the UNI
3.9.1. gLSP Constraints
3.10. Bandwidth
3.11. Shared Risk Link Groups
3.12. Optical Network Segment Recovery
3.13. Configuration of End-to-End GMPLS Recovery
3.14. GMPLS Tunnel Groups
3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
3.16. Configuration Notes
3.17. GMPLS Configuration Command Reference
3.17.1. Command Hierarchies
3.17.1.1. LMP Commands
3.17.1.2. GMPLS Commands
3.17.1.3. GMPLS Tunnel Group Commands
3.17.2. Command Descriptions
3.17.2.1. LMP Commands
3.17.2.2. GMPLS Commands
3.17.2.2.1. GMPLS Tunnel Group Commands
3.18. Show, Clear, Debug, and Tools Command Reference
3.18.1. Command Hierarchies
3.18.1.1. Show Commands
3.18.1.2. Clear Commands
3.18.1.3. Debug Commands
3.18.1.4. Tools Commands
3.18.2. Command Descriptions
3.18.2.1. Show Commands
3.18.2.2. Clear Commands
3.18.2.3. Debug Commands
3.18.2.4. Tools Commands
4. MPLS Forwarding Policy
4.1. Introduction
4.2. Feature Validation and Operation Procedures
4.2.1. Policy Parameters and Validation Procedure Rules
4.2.2. Policy Resolution and Operational Procedures
4.3. Data Path Support
4.3.1. MPLS Forwarding Policy Data Path Model
4.3.2. Spraying of Packets over the Next-hops of a NHG
4.3.3. Outgoing Packet Ethertype Setting and TTL Handling in Label-binding Policy
4.4. Statistics
4.4.1. Ingress Statistics
4.5. Configuring Static Label Routes using MPLS Forwarding Policy
4.5.1. Steering Flows to an Indirect Next-Hop
4.5.2. Steering Flows to a Direct Next-Hop
4.6. SLR Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. MPLS SLR Forwarding Policy Commands
4.6.2. Command Descriptions
4.6.2.1. MPLS SLR Forwarding Policy Commands
4.7. SLR Show Command Reference
4.7.1. Command Hierarchies
4.7.1.1. Show Commands
4.7.2. Command Descriptions
4.7.2.1. Show Commands
5. PCEP
5.1. Introduction to the Path Computation Element Protocol (PCEP)
5.1.1. PCC and PCE Configuration
5.1.2. Base Implementation of Path Computation Elements (PCE)
5.1.3. PCEP Session Establishment and Maintenance
5.1.4. PCEP Parameters
5.1.4.1. Stateful PCE
5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
5.1.4.3. LSP Initiation
5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
5.1.4.3.2. PCEP Support for RSVP-TE LSP
5.1.4.3.3. LSP Path Diversity and Bidirectionality Constraints
5.2. Configuring and Operating RSVP-TE LSP with PCEP
5.3. PCEP Configuration Command Reference
5.3.1. Command Hierarchies
5.3.1.1. PCEP Commands
5.3.2. Command Descriptions
5.3.2.1. PCEP Commands
6. Segment Routing Policies
6.1. Statically-Configured Segment Routing Policies
6.2. BGP Signaled Segment Routing Policies
6.3. Segment Routing Policy Path Selection and Tie-Breaking
6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
7. Label Distribution Protocol
7.1. Label Distribution Protocol
7.1.1. LDP and MPLS
7.1.2. LDP Architecture
7.1.3. Subsystem Interrelationships
7.1.3.1. Memory Manager and LDP
7.1.3.2. Label Manager
7.1.3.3. LDP Configuration
7.1.3.4. Logger
7.1.3.5. Service Manager
7.1.4. Execution Flow
7.1.4.1. Initialization
7.1.4.2. Session Lifetime
7.1.4.2.1. Adjacency Establishment
7.1.4.2.2. Session Establishment
7.1.5. Label Exchange
7.1.5.1. Other Reasons for Label Actions
7.1.5.2. Cleanup
7.1.5.3. Configuring Implicit Null Label
7.1.6. Global LDP Filters
7.1.6.1. Per LDP Peer FEC Import and Export Policies
7.1.7. Configuring Multiple LDP LSR ID
7.1.7.1. Advertisement of FEC for Local LSR ID
7.1.8. LDP FEC Resolution Per Specified Community
7.1.8.1. Configuration
7.1.8.2. Operation
7.1.9. T-LDP hello reduction
7.1.10. Tracking a T-LDP Peer with BFD
7.1.11. Link LDP Hello Adjacency Tracking with BFD
7.1.12. LDP LSP Statistics
7.1.13. MPLS Entropy Label
7.1.14. Importing LDP Tunnels to Non-Host Prefixes to TTM
7.2. TTL Security for BGP and LDP
7.3. ECMP Support for LDP
7.3.1. Label Operations
7.4. Unnumbered Interface Support in LDP
7.4.1. Feature Configuration
7.4.2. Operation of LDP over an Unnumbered IP Interface
7.4.2.1. Link LDP
7.4.2.2. Targeted LDP
7.4.2.3. FEC Resolution
7.5. LDP over RSVP Tunnels
7.5.1. Signaling and Operation
7.5.1.1. LDP Label Distribution and FEC Resolution
7.5.1.2. Default FEC Resolution Procedure
7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
7.5.2. Rerouting Around Failures
7.5.2.1. LDP-over-RSVP Tunnel Protection
7.5.2.2. ABR Protection
7.6. LDP over RSVP Without Area Boundary
7.6.1. LDP over RSVP and ECMP
7.7. Weighted Load Balancing for LDP over RSVP
7.7.1. Interaction with Class-Based Forwarding
7.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
7.8.1. Configuration and Operation
7.8.2. Support of a Class Forwarding Policy with LDP-over-RSVP
7.9. LDP ECMP Uniform Failover
7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
7.10.1. LDP FRR Configuration
7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
7.10.2. LDP FRR Procedures
7.10.2.1. ECMP Considerations
7.10.2.2. LDP FRR and LDP Shortcut
7.10.2.3. LDP FRR and LDP-over-RSVP
7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
7.11. LDP FEC to BGP Label Route Stitching
7.11.1. Configuration
7.11.2. Detailed LDP FEC Resolution
7.11.3. Detailed BGP Labeled Route Resolution
7.11.4. Data Plane Forwarding
7.12. LDP-SR Stitching for IPv4 prefixes
7.12.1. LDP-SR Stitching Configuration
7.12.2. Stitching in the LDP-to-SR Direction
7.12.3. Stitching in the SR-to-LDP Direction
7.13. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes
7.14. Automatic Creation of a Targeted Hello Adjacency and LDP Session
7.14.1. Feature Configuration
7.14.2. Feature Behavior
7.15. Multicast P2MP LDP for GRT
7.16. LDP P2MP Support
7.16.1. LDP P2MP Configuration
7.16.2. LDP P2MP Protocol
7.16.3. Make Before Break (MBB)
7.16.4. ECMP Support
7.16.5. Inter-AS Non-segmented mLDP
7.16.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
7.16.5.2. LDP Recursive FEC Process
7.16.5.3. Supported Recursive Opaque Values
7.16.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
7.16.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
7.16.5.5.1. Leaf and ABR Behavior
7.16.5.5.2. Intra-AS Support
7.16.5.5.3. Opaque Type Behavior with Basic FEC Generation
7.16.5.5.4. Inter-AS Support
7.16.5.6. Redundancy and Resiliency
7.16.5.7. ASBR Physical Connection
7.16.5.8. OAM
7.16.5.9. ECMP Support
7.16.5.9.1. ECMP Hash Algorithm
7.16.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
7.16.6. Intra-AS Non-segmented mLDP
7.16.6.1. ABR MoFRR for Intra-AS
7.16.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
7.16.7. ASBR MoFRR
7.16.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
7.16.7.2. ASBR MoFRR Leaf Behavior
7.16.7.3. ASBR MoFRR ASBR Behavior
7.16.7.4. MoFRR Root AS Behavior
7.16.7.5. Traffic Flow
7.16.7.6. Failure Detection and Handling
7.16.7.7. Failure Scenario
7.16.7.8. ASBR MoFRR Consideration
7.16.7.9. ASBR MoFRR Opaque Support
7.16.8. MBB for MoFRR
7.16.9. Add-path for Route Reflectors
7.17. Multicast LDP Fast Upstream Switchover
7.17.1. Feature Configuration
7.17.2. Feature Behavior
7.17.3. Uniform Failover from Primary to Backup ILM
7.18. Multi-Area and Multi-Instance Extensions to LDP
7.18.1. LDP Shortcut for BGP Next-Hop Resolution
7.18.2. LDP Shortcut for IGP Routes
7.18.2.1. LDP Shortcut Configuration
7.18.2.2. IGP Route Resolution
7.18.2.3. LDP Shortcut Forwarding Plane
7.18.3. ECMP Considerations
7.18.4. Disabling TTL Propagation in an LSP Shortcut
7.19. LDP Graceful Handling of Resource Exhaustion
7.19.1. LDP Base Graceful Handling of Resources
7.20. LDP Enhanced Graceful Handling of Resources
7.20.1. LSR Overload Notification
7.20.2. LSR Overload Protection Capability
7.20.3. Procedures for LSR overload protection
7.21. LDP-IGP Synchronization
7.22. MLDP Resolution using Multicast RTM
7.22.1. Other Considerations for Multicast RTM MLDP Resolution
7.23. Bidirectional Forwarding Detection for LDP LSPs
7.23.1. Bootstrapping and Maintaining LSP BFD Sessions
7.23.2. BFD Configuration on LDP LSPs
7.24. User Guidelines and Troubleshooting Procedures
7.24.1. Common Procedures
7.24.2. Base Resource Handling Procedures
7.24.3. Enhanced Resource Handling Procedures
7.25. LDP IPv6 Control and Data Planes
7.25.1. LDP Operation in an IPv6 Network
7.25.2. Link LDP
7.25.3. Targeted LDP
7.25.4. FEC Resolution
7.25.5. LDP Session Capabilities
7.25.6. LDP Adjacency Capabilities
7.25.7. Address and FEC Distribution
7.25.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
7.25.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
7.25.10. IGP and Static Route Synchronization with LDP
7.25.11. BFD Operation
7.25.12. Services Using SDP with an LDP IPv6 FEC
7.25.13. Mirror Services and Lawful Intercept
7.25.13.1. Configuration at mirror source node
7.25.13.2. Configuration at mirror destination node
7.25.14. Static Route Resolution to a LDP IPv6 FEC
7.25.15. IGP Route Resolution to a LDP IPv6 FEC
7.25.16. OAM Support with LDP IPv6
7.25.17. LDP IPv6 Interoperability Considerations
7.25.17.1. Interoperability with Implementations Compliant with RFC 7552
7.25.17.2. LDP IPv6 32-bit LSR-ID
7.25.17.2.1. Feature Configuration
7.25.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
7.25.17.2.3. Migration Considerations
7.25.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
7.26. LDP Process Overview
7.27. Configuring LDP with CLI
7.27.1. LDP Configuration Overview
7.27.2. Basic LDP Configuration
7.27.3. Common Configuration Tasks
7.27.3.1. Enabling LDP
7.27.3.2. Configuring FEC Originate Parameters
7.27.3.3. Configuring Graceful-Restart Helper Parameters
7.27.3.4. Applying Export and Import Policies
7.27.3.5. Targeted Session Parameters
7.27.3.6. Interface Parameters
7.27.3.7. Session Parameters
7.27.3.8. LDP Signaling and Services
7.28. LDP Configuration Management Tasks
7.28.1. Disabling LDP
7.28.2. Modifying Targeted Session Parameters
7.28.3. Modifying Interface Parameters
7.29. LDP Command Reference
7.29.1. Command Hierarchies
7.29.1.1. LDP Commands
7.29.2. Command Descriptions
7.29.2.1. Generic Commands
7.29.2.2. LDP Commands
7.29.2.3. Interface Parameters Commands
7.29.2.4. Session Parameters Commands
7.29.2.5. Targeted Session Commands
7.29.2.6. TCP Session Parameters Commands
7.30. Show, Clear, Debug, and Tools Command Reference
7.30.1. Command Hierarchies
7.30.1.1. Show Commands
7.30.1.2. Clear Commands
7.30.1.3. Debug Commands
7.30.1.4. Tools Commands
7.30.2. Command Descriptions
7.30.2.1. Show LDP Commands
7.30.2.2. Clear Commands
7.30.2.3. Debug Commands
7.30.2.4. Tools Commands
8. Standards and Protocol Support
Customer Document and Product Support
Multicast Routing Protocols Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. Multicast Overview
2.2. Multicast Models
2.2.1. Any-Source Multicast (ASM)
2.2.2. Source Specific Multicast (SSM)
2.2.3. Multicast in IP-VPN Networks
3. IGMP
3.1. IGMP Overview
3.1.1. IGMP Versions and Interoperability Requirements
3.1.2. IGMP Version Transition
3.1.3. Source-Specific Multicast Groups
3.1.4. Query Messages
3.2. Configuring IGMP with CLI
3.2.1. IGMP Configuration Overview
3.2.2. Basic IGMP Configuration
3.2.3. Configuring IGMP Parameters
3.2.3.1. Enabling IGMP
3.2.3.2. Configuring an IGMP Interface
3.2.3.3. Configuring Static Parameters
3.2.3.4. Configuring SSM Translation
3.2.4. Disabling IGMP
3.3. IGMP Configuration Command Reference
3.3.1. Command Hierarchies
3.3.1.1. IGMP Configuration Commands
3.3.2. Command Descriptions
3.3.2.1. Router IGMP Commands
3.4. Show, Clear, and Debug Command Reference
3.4.1. Command Hierarchies
3.4.1.1. Show Commands
3.4.1.2. Clear Commands
3.4.1.3. Debug Commands
3.4.2. Command Descriptions
3.4.2.1. Show Commands
3.4.2.2. Clear Commands
3.4.2.3. Debug Commands
4. MLD
4.1. MLD Overview
4.1.1. MLDv1
4.1.2. MLDv2
4.2. Configuring MLD with CLI
4.2.1. MLD Configuration Overview
4.2.2. Basic MLD Configuration
4.2.3. Configuring MLD Parameters
4.2.3.1. Enabling MLD
4.2.3.2. Configuring an MLD Interface
4.2.3.3. Configuring Static Parameters
4.2.3.4. Configuring SSM Translation
4.2.4. Disabling MLD
4.3. MLD Configuration Command Reference
4.3.1. Command Hierarchies
4.3.1.1. MLD Configuration Commands
4.3.2. Command Descriptions
4.3.2.1. MLD Commands
4.3.2.2. Generic Commands
4.4. Show, Clear, and Debug Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Show Commands
4.4.1.2. Clear Commands
4.4.1.3. Debug Commands
4.4.2. Command Descriptions
4.4.2.1. Show Commands
4.4.2.2. Clear Commands
5. PIM
5.1. PIM Overview
5.1.1. PIM-SM Functions
5.1.1.1. Phase One
5.1.1.2. Phase Two
5.1.1.3. Phase Three
5.1.2. Encapsulating Data Packets in the Register Tunnel
5.1.3. PIM Bootstrap Router Mechanism
5.1.4. PIM-SM Routing Policies
5.1.5. Reverse Path Forwarding Checks
5.1.6. Anycast RP for PIM-SM
5.1.6.1. Implementation
5.1.7. Distributing PIM Joins over Multiple ECMP Paths
5.1.8. PIM Interface on IES Subscriber Group Interfaces
5.1.9. Multicast-Only Fast Reroute (MoFRR)
5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.1.11. VRRP Aware PIM
5.1.11.1. Configuring VRRP Aware PIM
5.1.11.2. Configuration Recommendations
5.1.11.2.1. Primary Router Example
5.1.11.2.2. Secondary Router Example
5.2. IPv6 PIM models
5.2.1. PIM-SSM
5.2.2. PIM ASM
5.2.3. Embedded RP
5.3. Configuring PIM with CLI
5.3.1. PIM Configuration Overview
5.3.2. Basic PIM Configuration
5.3.3. Configuring PIM Parameters
5.3.3.1. Enabling PIM
5.3.3.2. Configuring PIM Interface Parameters
5.3.3.3. Configuring PIM Join/Register Policies
5.3.3.4. Importing PIM Join/Register Policies
5.3.3.5. Configuring Bootstrap Message Import and Export Policies
5.3.4. Disabling PIM
5.4. PIM Configuration Command Reference
5.4.1. Command Hierarchies
5.4.1.1. Configuration Commands
5.4.2. Command Descriptions
5.4.2.1. Router PIM Commands
5.5. Show, Clear, and Debug Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Show Commands
5.5.1.2. Clear Commands
5.5.1.3. Debug Commands
5.5.2. Command Descriptions
5.5.2.1. Show Commands
5.5.2.2. Clear Commands
5.5.2.3. Debug Commands
6. MSDP
6.1. Multicast Source Discovery Protocol
6.1.1. Anycast RP for MSDP
6.1.2. MSDP Procedure
6.1.2.1. MSDP Peering Scenarios
6.1.3. MSDP Peer Groups
6.1.4. MSDP Mesh Groups
6.1.5. MSDP Routing Policies
6.1.6. Multicast in Virtual Private Networks
6.1.6.1. Draft Rosen
6.2. Configuring MSDP with CLI
6.2.1. Basic MSDP Configuration
6.2.2. Configuring MSDP Parameters
6.2.3. Disabling MSDP
6.3. MSDP Configuration Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands
6.3.2. Command Descriptions
6.3.2.1. MSDP Commands
6.4. Show, Clear, and Debug Command Reference
6.4.1. Command Hierarchies
6.4.1.1. Show Commands
6.4.1.2. Clear Commands
6.4.1.3. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. Show Commands
6.4.2.2. Clear Commands
6.4.2.3. Debug Commands
7. MLDP
7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
7.2. Inter-AS Non-segmented MLDP
7.2.1. d-MLDP Inter-AS Trees in GRT
7.2.1.1. Routing
7.2.1.2. Join Processing
7.2.2. ASBR Support of PE Functionality
7.3. Hashing for Inter-AS
7.4. Hashing at the ASBR
8. Multicast Extensions to BGP
8.1. Multicast Extensions to BGP
8.1.1. MBGP Multicast Topology Support
8.1.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. MCAC Overview
9.1.1. MCAC Bundle Policy Overview
9.1.2. MCAC Algorithm
9.1.2.1. Interface-level MCAC details
9.1.2.1.1. MCAC-interface-policy-level MCAC details
9.1.2.2. Bundle-level MCAC details
9.1.3. MCAC on Link Aggregation Group Interfaces
9.2. Configuring MCAC with CLI
9.2.1. Basic MCAC Configuration
9.2.2. Configuring MCAC Parameters
9.3. MCAC Configuration Command Reference
9.3.1. Command Hierarchies
9.3.1.1. MCAC Configuration Commands
9.3.1.2. MCAC Policy Commands
9.3.2. Command Descriptions
9.3.2.1. MCAC Configuration Commands
9.4. Show, Clear, and Debug Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Show Commands
9.4.2.1.1. Show MCAC Commands
10. GTM
10.1. GTM Overview
10.1.1. Using BGP-MVPN Procedures in GTM
10.1.1.1. Route Distinguishers and Route Targets
10.1.1.2. UMH-Eligible Routes
10.1.1.3. BGP Route Types Supported
10.2. Configuring GTM
10.2.1. Configuration Recommendations
10.2.2. Configuring GTM with CLI
10.3. GTM Configuration Command Reference
10.3.1. Command Hierarchies
10.3.1.1. Configuration Commands
10.3.2. Command Descriptions
10.3.2.1. GTM Commands
10.4. Show, Clear, and Debug Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Show Commands
11. Troubleshooting Tools
11.1. Mtrace
11.1.1. Finding the Last Hop Router
11.1.2. Directing the Response
11.2. Mstat
11.3. Mrinfo
11.4. Troubleshooting Configuration Command Reference
11.4.1. Command Hierarchies
11.4.1.1. Operational Commands
11.4.2. Command Descriptions
11.4.2.1. Operational Commands
11.5. Show Command Reference
11.5.1. Command Hierarchies
11.5.1.1. Show Commands
11.5.2. Command Descriptions
11.5.2.1. Show Commands
12. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. Multicast Overview
2.2. Multicast Models
2.2.1. Any-Source Multicast (ASM)
2.2.2. Source Specific Multicast (SSM)
2.2.3. Multicast in IP-VPN Networks
3. IGMP
3.1. IGMP Overview
3.1.1. IGMP Versions and Interoperability Requirements
3.1.2. IGMP Version Transition
3.1.3. Source-Specific Multicast Groups
3.1.4. Query Messages
3.2. Configuring IGMP with CLI
3.2.1. IGMP Configuration Overview
3.2.2. Basic IGMP Configuration
3.2.3. Configuring IGMP Parameters
3.2.3.1. Enabling IGMP
3.2.3.2. Configuring an IGMP Interface
3.2.3.3. Configuring Static Parameters
3.2.3.4. Configuring SSM Translation
3.2.4. Disabling IGMP
3.3. IGMP Configuration Command Reference
3.3.1. Command Hierarchies
3.3.1.1. IGMP Configuration Commands
3.3.2. Command Descriptions
3.3.2.1. Router IGMP Commands
3.4. Show, Clear, and Debug Command Reference
3.4.1. Command Hierarchies
3.4.1.1. Show Commands
3.4.1.2. Clear Commands
3.4.1.3. Debug Commands
3.4.2. Command Descriptions
3.4.2.1. Show Commands
3.4.2.2. Clear Commands
3.4.2.3. Debug Commands
4. MLD
4.1. MLD Overview
4.1.1. MLDv1
4.1.2. MLDv2
4.2. Configuring MLD with CLI
4.2.1. MLD Configuration Overview
4.2.2. Basic MLD Configuration
4.2.3. Configuring MLD Parameters
4.2.3.1. Enabling MLD
4.2.3.2. Configuring an MLD Interface
4.2.3.3. Configuring Static Parameters
4.2.3.4. Configuring SSM Translation
4.2.4. Disabling MLD
4.3. MLD Configuration Command Reference
4.3.1. Command Hierarchies
4.3.1.1. MLD Configuration Commands
4.3.2. Command Descriptions
4.3.2.1. MLD Commands
4.3.2.2. Generic Commands
4.4. Show, Clear, and Debug Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Show Commands
4.4.1.2. Clear Commands
4.4.1.3. Debug Commands
4.4.2. Command Descriptions
4.4.2.1. Show Commands
4.4.2.2. Clear Commands
5. PIM
5.1. PIM Overview
5.1.1. PIM-SM Functions
5.1.1.1. Phase One
5.1.1.2. Phase Two
5.1.1.3. Phase Three
5.1.2. Encapsulating Data Packets in the Register Tunnel
5.1.3. PIM Bootstrap Router Mechanism
5.1.4. PIM-SM Routing Policies
5.1.5. Reverse Path Forwarding Checks
5.1.6. Anycast RP for PIM-SM
5.1.6.1. Implementation
5.1.7. Distributing PIM Joins over Multiple ECMP Paths
5.1.8. PIM Interface on IES Subscriber Group Interfaces
5.1.9. Multicast-Only Fast Reroute (MoFRR)
5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.1.11. VRRP Aware PIM
5.1.11.1. Configuring VRRP Aware PIM
5.1.11.2. Configuration Recommendations
5.1.11.2.1. Primary Router Example
5.1.11.2.2. Secondary Router Example
5.2. IPv6 PIM models
5.2.1. PIM-SSM
5.2.2. PIM ASM
5.2.3. Embedded RP
5.3. Configuring PIM with CLI
5.3.1. PIM Configuration Overview
5.3.2. Basic PIM Configuration
5.3.3. Configuring PIM Parameters
5.3.3.1. Enabling PIM
5.3.3.2. Configuring PIM Interface Parameters
5.3.3.3. Configuring PIM Join/Register Policies
5.3.3.4. Importing PIM Join/Register Policies
5.3.3.5. Configuring Bootstrap Message Import and Export Policies
5.3.4. Disabling PIM
5.4. PIM Configuration Command Reference
5.4.1. Command Hierarchies
5.4.1.1. Configuration Commands
5.4.2. Command Descriptions
5.4.2.1. Router PIM Commands
5.5. Show, Clear, and Debug Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Show Commands
5.5.1.2. Clear Commands
5.5.1.3. Debug Commands
5.5.2. Command Descriptions
5.5.2.1. Show Commands
5.5.2.2. Clear Commands
5.5.2.3. Debug Commands
6. MSDP
6.1. Multicast Source Discovery Protocol
6.1.1. Anycast RP for MSDP
6.1.2. MSDP Procedure
6.1.2.1. MSDP Peering Scenarios
6.1.3. MSDP Peer Groups
6.1.4. MSDP Mesh Groups
6.1.5. MSDP Routing Policies
6.1.6. Multicast in Virtual Private Networks
6.1.6.1. Draft Rosen
6.2. Configuring MSDP with CLI
6.2.1. Basic MSDP Configuration
6.2.2. Configuring MSDP Parameters
6.2.3. Disabling MSDP
6.3. MSDP Configuration Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands
6.3.2. Command Descriptions
6.3.2.1. MSDP Commands
6.4. Show, Clear, and Debug Command Reference
6.4.1. Command Hierarchies
6.4.1.1. Show Commands
6.4.1.2. Clear Commands
6.4.1.3. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. Show Commands
6.4.2.2. Clear Commands
6.4.2.3. Debug Commands
7. MLDP
7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
7.2. Inter-AS Non-segmented MLDP
7.2.1. d-MLDP Inter-AS Trees in GRT
7.2.1.1. Routing
7.2.1.2. Join Processing
7.2.2. ASBR Support of PE Functionality
7.3. Hashing for Inter-AS
7.4. Hashing at the ASBR
8. Multicast Extensions to BGP
8.1. Multicast Extensions to BGP
8.1.1. MBGP Multicast Topology Support
8.1.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. MCAC Overview
9.1.1. MCAC Bundle Policy Overview
9.1.2. MCAC Algorithm
9.1.2.1. Interface-level MCAC details
9.1.2.1.1. MCAC-interface-policy-level MCAC details
9.1.2.2. Bundle-level MCAC details
9.1.3. MCAC on Link Aggregation Group Interfaces
9.2. Configuring MCAC with CLI
9.2.1. Basic MCAC Configuration
9.2.2. Configuring MCAC Parameters
9.3. MCAC Configuration Command Reference
9.3.1. Command Hierarchies
9.3.1.1. MCAC Configuration Commands
9.3.1.2. MCAC Policy Commands
9.3.2. Command Descriptions
9.3.2.1. MCAC Configuration Commands
9.4. Show, Clear, and Debug Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Show Commands
9.4.2.1.1. Show MCAC Commands
10. GTM
10.1. GTM Overview
10.1.1. Using BGP-MVPN Procedures in GTM
10.1.1.1. Route Distinguishers and Route Targets
10.1.1.2. UMH-Eligible Routes
10.1.1.3. BGP Route Types Supported
10.2. Configuring GTM
10.2.1. Configuration Recommendations
10.2.2. Configuring GTM with CLI
10.3. GTM Configuration Command Reference
10.3.1. Command Hierarchies
10.3.1.1. Configuration Commands
10.3.2. Command Descriptions
10.3.2.1. GTM Commands
10.4. Show, Clear, and Debug Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Show Commands
11. Troubleshooting Tools
11.1. Mtrace
11.1.1. Finding the Last Hop Router
11.1.2. Directing the Response
11.2. Mstat
11.3. Mrinfo
11.4. Troubleshooting Configuration Command Reference
11.4.1. Command Hierarchies
11.4.1.1. Operational Commands
11.4.2. Command Descriptions
11.4.2.1. Operational Commands
11.5. Show Command Reference
11.5.1. Command Hierarchies
11.5.1.1. Show Commands
11.5.2. Command Descriptions
11.5.2.1. Show Commands
12. Standards and Protocol Support
Customer Document and Product Support
Multiservice Integrated Service Adapter Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. ISA Configuration Process
2. ISA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISA Overview
2.4. MS-ISM Overview
2.5. Application Assurance Hardware Features
2.5.1. AA System Support
2.5.2. Host IOM Support for AA on ISAs
3. Application Assurance
3.1. Application Assurance (AA) Overview
3.1.1. Application Assurance: Inline Policy Enforcement
3.1.2. AA Integration in Subscriber Edge Gateways
3.1.3. Fixed Residential Broadband Services
3.1.3.1. Dual-Stack Lite – DS-Lite
3.1.3.2. 6to4 /6RD
3.1.4. Wireless LAN Gateway Broadband Services
3.1.5. Application-Aware Business VPN Services
3.1.6. Business Mobile Backhaul
3.1.7. SeGW Firewall Service
3.2. Application Assurance System Architecture
3.2.1. AA ISA Resource Configuration
3.2.1.1. AA ISA Groups
3.2.1.1.1. AA Group Partitions
3.2.1.1.2. Bypass Modes
3.2.1.2. Redundancy
3.2.1.2.1. No AA ISA Group Redundancy
3.2.1.2.2. Failure to Fabric
3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
3.2.1.3. ISA Load Balancing
3.2.1.4. Asymmetry Removal
3.2.1.4.1. Asymmetry Removal Overview
3.2.1.4.2. Failure Modes
3.2.1.4.3. AARP Peered Node/Instance Configuration
3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.2.1.4.5. Multi-Chassis Datapath Shunts
3.2.1.5. ISA Overload Detection
3.2.2. AA Packet Processing
3.2.2.1. Divert of Traffic and Subscribers
3.2.2.1.1. Services and AA Subscribers
3.2.2.1.2. Spoke SDPs
3.2.2.1.3. Transit AA Subscribers
3.2.2.1.4. AA Subscriber Application Service Definition
3.2.2.2. Application Identification
3.2.2.2.1. Application Assurance Identification Components
3.2.2.2.2. Protocol Signatures
3.2.2.2.3. Custom Protocols
3.2.2.2.4. Protocol Shutdown
3.2.2.2.5. Supported Protocol Signatures
3.2.2.2.6. Application Groups
3.2.2.2.7. Charging Groups
3.2.2.2.8. Applications
3.2.2.2.9. Application Filters
3.2.2.2.10. HTTP
3.2.2.2.11. AA IP Prefix Lists
3.2.2.3. Statistics and Accounting
3.2.2.3.1. Per-AA Subscriber Special Study
3.2.2.3.2. System Aspects
3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.2.2.3.4. AA Partition Traffic Type Statistics
3.2.2.3.5. Configurable AA Subscriber Statistics Collection
3.2.2.3.6. AA-Performance Record for ISA Load
3.2.2.3.7. AA Partition Traffic Type Statistics
3.2.2.3.8. AA Partition Admit–Deny Statistics
3.2.2.3.9. RADIUS Accounting AA Records
3.2.2.3.10. AA GX Based Usage Monitoring
3.2.2.3.11. Supported AVPs
3.2.2.3.12. Cflowd AA Records
3.2.2.4. Application QoS Policy (AQP)
3.2.2.4.1. AQP Match Criteria
3.2.2.4.2. AQP Actions
3.2.2.4.3. Application Assurance Policers
3.2.2.4.4. Time of Day Policing Adjustments
3.2.2.4.5. Congestion Override Policing
3.2.2.4.6. Dynamic Experience Management
3.2.2.4.7. Application Assurance HTTP Redirect
3.2.2.4.8. ICAP - Large Scale Category-based URL Filtering
3.2.2.4.9. Local URL-List Filtering
3.2.2.4.10. HTTP Header Enrichment
3.2.2.4.11. HTTP In Browser Notification
3.2.2.5. Application Assurance Firewall
3.2.2.5.1. Denial of Service (DoS) Protection
3.2.2.5.2. TCP Validation
3.2.2.5.3. Policy Partitioned AA FW
3.2.2.5.4. Configuring AA FW
3.2.2.5.5. AA FW Logging
3.2.2.5.6. SeGW Firewall Protection
3.2.3. Service Monitoring and Debugging
3.2.4. CPU Utilization
3.2.5. CLI Batch: Begin, Commit and Abort Commands
3.3. Configuring Application Assurance with CLI
3.3.1. Provisioning AA ISA MDA
3.3.2. Configuring an AA ISA Group
3.3.2.1. Configuring Watermark Parameters
3.3.3. Configuring a Group Policy
3.3.3.1. Beginning and Committing a Policy Configuration
3.3.3.2. Aborting a Policy Configuration
3.3.3.3. Configuring an IP Prefix List
3.3.3.4. Configuring AA Session Filters
3.3.3.5. Configuring an Application Group
3.3.3.6. Configuring an Application
3.3.3.7. Configuring an Application Filter
3.3.3.8. Configuring an Application Profile
3.3.3.9. Configuring Suppressible App-Profile with SRRP
3.3.3.10. Configuring Application Service Options
3.3.3.11. Configuring a Policer
3.3.3.12. Configuring an Application QoS Policy
3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
3.3.3.14. Configuring an HTTP Error Redirect
3.3.3.15. Configuring HTTP Header Enrichment
3.3.3.16. Configuring an HTTP Redirect Policy
3.3.3.17. Configuring a Captive Redirect HTTP Redirect Policy
3.3.3.17.1. Captive-Redirect and HTTPS Flows Redirection
3.3.3.18. Configuring ICAP URL Filtering
3.3.3.19. Configuring Local URL-List Filtering
3.3.3.20. Configuring HTTP Notification
3.3.4. Configuring AA Volume Accounting and Statistics
3.3.4.1. Configuring Cflowd Collector
3.3.4.2. Configuring AA Volume, TCP and RTP Performance Reporting
3.4. Application Assurance Command Reference
3.4.1. Application Assurance Command Reference
3.4.1.1. Hardware Commands
3.4.1.2. Admin Commands
3.4.1.3. ISA Commands
3.4.1.4. Application Assurance Commands
3.4.1.4.1. AA Commands
3.4.1.4.2. AA Group Commands
3.4.1.5. AA Interface Commands
3.4.1.6. Persistence Commands
3.4.2. Command Descriptions
3.4.2.1. Generic Commands
3.4.2.2. Admin Commands
3.4.2.3. Application Assurance Commands
3.4.2.4. Group Commands
3.4.2.4.1. Transit Subscriber Commands
3.4.2.4.2. Policer Commands
3.4.2.4.3. Policy Commands
3.4.2.4.4. Statistics Commands
3.4.2.4.5. TCP Validation Commands
3.4.2.4.6. Policy Commands
3.4.2.4.7. System Persistence Commands
3.4.2.5. ISA Commands
3.4.2.5.1. Application Assurance Group Commands
3.5. Show, Tools, Clear, and Debug Command Reference
3.5.1. Command Hierarchies
3.5.1.1. Show Commands
3.5.1.2. Tools Commands
3.5.1.3. Clear Commands
3.5.1.4. Debug Commands
3.5.2. Command Descriptions
3.5.2.1. Show Commands
3.5.2.2. Tools Commands
3.5.2.3. Clear Commands
3.5.2.4. Debug Commands
4. IP Tunnels
4.1. IP Tunnels Overview
4.1.1. Tunnel ISAs
4.1.1.1. Public Tunnel SAPs
4.1.1.2. Private Tunnel SAPs
4.1.1.3. IP Interface Configuration
4.1.1.4. GRE and IP-IP Tunnel Configuration
4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.1.1.6. TCP MSS Adjustment
4.1.2. Operational Conditions
4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
4.1.3. QoS Interactions
4.1.4. OAM Interactions
4.1.5. Redundancy
4.1.6. Statistics Collection
4.1.7. Security
4.1.7.1. GRE Tunnel Multicast Support
4.1.7.2. IPv6 over IPv4 GRE Tunnel
4.1.8. IKEv2
4.1.8.1. IKEv2 Traffic Selector and TS-List
4.1.8.2. IKEv2 Fragmentation
4.1.9. SHA2 Support
4.1.10. IPsec Client Lockout
4.1.11. IPsec Tunnel CHILD_SA Rekey
4.1.12. Multiple IKE/ESP Transform Support
4.2. X.509v3 Certificate Overview
4.2.1. SR OS X.509v3 Certificate Support
4.2.2. Local Storage
4.2.3. CA-Profile
4.2.4. CA Chain Computation
4.2.5. Certificate Enrollment
4.2.6. Certificate Revocation Check
4.2.7. Certificate/CRL Expiration Warning
4.2.8. Certificate/CRL/Key Cache
4.2.9. Auto CRL Update
4.2.10. IPsec Client Database
4.3. Using Certificates For IPsec Tunnel Authentication
4.4. Trust-Anchor-Profile
4.5. Cert-Profile
4.5.1. Cert-Profile/trust-anchor-profile versus cert/trust-anchor
4.6. Certificate Management Protocol Version 2 (CMPv2)
4.7. OCSP
4.8. Video Wholesale Example
4.9. Multi-Chassis IPsec Redundancy Overview
4.9.1. Architecture
4.9.2. MC-IPsec Mastership Protocol (MIMP)
4.9.2.1. MIMP Protocol States
4.9.2.2. Election Logic
4.9.2.3. Protection Status
4.9.2.4. Other Details
4.9.3. Routing
4.9.3.1. Routing in Public Service
4.9.3.2. Routing in Private Services
4.9.3.3. Other Details About Shunting
4.9.4. MC-IPsec Aware VRRP
4.9.5. Synchronization
4.9.5.1. Automatic CHILD_SA Rekey
4.9.6. Responder Only
4.10. IPsec Deployment Requirements
4.11. IKEv2 Remote-Access Tunnel
4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.11.3.1. DHCPv4 Address Assignment
4.11.3.2. DHCPv6 Address Assignment
4.11.3.3. DHCPv4/v6 Usage Notes
4.11.4. IPv6 IPsec Support
4.11.4.1. IPv6 as Payload
4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
4.11.4.5. IPv6 as Encapsulation
4.12. MLDv2 over IPsec
4.12.1. MLDv2 over IPsec – Traffic Selector
4.12.2. MLDv2 over IPsec – Configuration
4.13. Configuring IPsec with CLI
4.13.1. Provisioning a Tunnel ISA
4.13.2. Configuring a Tunnel Group
4.13.3. Configuring Router Interfaces for IPsec
4.13.4. Configuring IPsec Parameters
4.13.5. Configuring IPsec in Services
4.13.6. Configuring X.509v3 Certificate Parameters
4.13.7. Configuring MC-IPsec
4.13.7.1. Configuring MIMP
4.13.7.2. Configuring Multi-Chassis Synchronization
4.13.7.3. Configuring Routing for MC-IPsec
4.13.8. Configuring and Using CMPv2
4.13.9. Configuring OCSP
4.13.10. Configuring IKEv2 Remote — Access Tunnel
4.13.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
4.14. IP Tunnel Command Reference
4.14.1. Command Hierarchies
4.14.1.1. Configuration Commands
4.14.1.1.1. Hardware Commands
4.14.1.1.2. ISA Commands
4.14.1.1.3. IPsec Commands
4.14.1.2. Service Configuration Commands
4.14.1.2.1. IES Commands
4.14.1.2.2. VPRN Commands
4.14.1.2.3. IPsec Mastership Election Commands
4.14.1.2.4. Related Commands
4.14.1.2.5. CMPv2 Commands
4.14.1.2.6. Auto-Update Commands
4.14.1.2.7. Show Commands
4.14.1.2.8. Debug Commands
4.14.1.2.9. Tools Commands
4.14.1.2.10. Clear Commands
4.14.1.2.11. Admin Commands
4.14.2. Command Descriptions
4.14.2.1. Generic Commands
4.14.2.2. Hardware Commands
4.14.2.3. ISA Commands
4.14.2.4. Certificate Profile Commands
4.14.2.5. Client Database Commands
4.14.2.6. Internet Key Exchange (IKE) Commands
4.14.2.7. IPsec Transform Commands
4.14.2.8. IPsec Static Security Association Commands
4.14.2.9. Trust Anchor Profile/TS Commands
4.14.2.10. Tunnel Template Commands
4.14.2.11. Service Configuration Commands
4.14.2.12. Interface SAP Tunnel Commands
4.14.2.12.1. IPsec Gateway Commands
4.14.2.13. RADIUS Policy Commands
4.14.2.14. CMPv2 Commands
4.14.2.15. Auto-Update Command Descriptions
4.14.2.16. IPsec Mastership Election Commands
4.14.2.17. Show Commands
4.14.2.18. Debug Commands
4.14.2.19. Tools Commands
4.14.2.20. Clear Commands
4.14.2.21. Admin Commands
5. L2TPV3 Tunnels
5.1. L2TPv3 Overview
5.2. Control Plane
5.3. Public SAP
5.4. Private SAP
6. Video Services
6.1. Video Services
6.1.1. Video Groups
6.1.2. Video SAP
6.1.3. Video Interface
6.1.4. Multicast Information Policies
6.1.5. Duplicate Stream Protection
6.1.6. Duplicate Stream Selection
6.1.6.1. Stream Identification
6.1.6.2. Initial Sequence Identification
6.1.6.3. Packet Selection
6.1.6.4. Clock Recovery
6.1.6.5. Playout
6.1.6.6. Loss of Transport
6.1.7. Video Quality Monitoring
6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.2. Retransmission and Fast Channel Change
6.2.1. RET and FCC Overview
6.2.1.1. Retransmission
6.2.1.2. Fast Channel Change (FCC)
6.2.1.2.1. Retransmission Client
6.2.1.2.2. Retransmission Server
6.2.1.2.3. Fast Channel Change Server
6.2.1.2.4. Logging and Accounting for RET and FCC
6.2.1.3. RET and FCC Server Concurrency
6.2.1.3.1. Prerequisites and Restrictions
6.2.2. Separate Timers for FCC and RET
6.2.3. Peak Bandwidth and Sessions per ISA
6.3. Ad Insertion
6.3.1. Local/Zoned Ad Insertion
6.3.1.1. Transport Stream Ad Splicing
6.3.1.2. Ad Zones
6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
6.4. Configuring Video Service Components with CLI
6.4.1. Video Services Overview
6.4.1.1. Configuring an ISA-MS Module
6.4.1.2. Configuring a Video Group
6.4.1.3. Configuring a Video SAP and Video Interface in a Service
6.4.1.4. Basic Multicast Information Policy Configuration
6.4.2. Sample Configurations
6.5. Configuring RET/FCC Video Components with CLI
6.5.1. Configuring RET/FCC Video Features in the CLI
6.5.1.1. Configuring the RET Client
6.5.1.2. Configuring the RET Server
6.5.1.3. Configuring the FCC Server
6.5.1.4. Logging and Accounting Collection for Video Statistics
6.6. Configuring ADI Components with CLI
6.6.1. Configuring ADI in CLI
6.6.1.1. Configuring the RET Client
6.6.1.2. Configuring a Video Group
6.6.1.3. Configuring NTP
6.6.1.4. Configuring Channel Parameters
6.6.1.5. Configuring Service Entities
6.7. Video Services Command Reference
6.7.1. IP-TV Command Hierarchies
6.7.1.1. Hardware Commands
6.7.1.2. Video Group Commands
6.7.1.3. Video Policy Video Commands
6.7.1.4. Bundle and Channel Commands
6.7.1.5. Service Video Interface Commands
6.7.1.5.1. VPLS Commands
6.7.1.5.2. IES Commands
6.7.1.5.3. VPRN Commands
6.7.2. Command Descriptions
6.7.2.1. Generic Commands
6.7.2.2. LNS Group Commands
6.7.2.3. Video Group Commands
6.7.2.4. Multicast Info Policy Commands
6.7.2.5. Video Policy Commands
6.7.2.6. Bundle and Channel Commands
6.7.2.7. Service Video Interface Commands
6.8. Show, Clear, and Debug Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Show Commands
6.8.1.2. Clear Commands
6.8.1.3. Debug Commands
6.8.2. Command Descriptions
6.8.2.1. Show Commands
6.8.2.2. Clear Commands
6.8.2.3. Debug Commands
7. Network Address Translation
7.1. Terminology
7.2. Network Address Translation (NAT) Overview
7.2.1. Principles of NAT
7.2.2. Application Compatibility
7.3. Large Scale NAT
7.3.1. Port Range Blocks
7.3.1.1. Reserved Ports and Priority Sessions
7.3.1.2. Preventing Port Block Starvation
7.3.1.2.1. Dynamic Port Block Starvation in LSN
7.3.1.2.2. Dynamic Port Block Reservation
7.3.2. Timeouts
7.3.3. Watermarks
7.4. L2-Aware NAT
7.5. One-to-One (1:1) NAT
7.5.1. Static 1:1 NAT
7.5.1.1. Protocol Agnostic Behavior
7.5.1.2. Modification of Parameters in Static 1:1 NAT
7.5.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.5.1.4. NAT-Policy Selection
7.5.1.5. Mapping Timeout
7.5.1.6. Logging
7.5.1.7. Restrictions
7.5.2. ICMP
7.6. Deterministic NAT
7.6.1. Overview
7.6.2. Supported Deterministic NAT Types
7.6.3. Number of Subscribers per Outside IP and per Pool
7.6.4. Referencing a Pool
7.6.5. Outside Pool Configuration
7.6.6. Mapping Rules and the map Command in Deterministic LSN44
7.6.7. Hashing Considerations in Deterministic LSN44
7.6.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.6.8. Sharing of Deterministic NAT Pools
7.6.9. Simultaneous support of dynamic and deterministic NAT
7.6.10. Selecting Traffic for NAT
7.6.11. Inverse Mappings
7.6.11.1. MIB approach
7.6.11.2. Off-line Approach to Obtain Deterministic Mappings
7.6.12. Logging
7.6.13. Deterministic DS-Lite
7.6.13.1. Hashing Considerations in DS-Lite
7.6.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.7. Destination Based NAT (DNAT)
7.7.1. Combination of SNAPT and DNAT
7.7.2. Forwarding Model in DNAT
7.7.3. DNAT Traffic Selection via NAT Classifier
7.7.4. Configuring DNAT
7.7.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.7.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.8. LSN – Multiple NAT Policies per Inside Routing Context
7.8.1. Restrictions
7.8.2. Multiple NAT Policies Per Inside Routing Context
7.8.3. Routing Approach for NAT Diversion
7.8.4. Filter-Based Approach
7.8.5. Multiple NAT Policies with DS-Lite and NAT64
7.8.6. Default NAT Policy
7.8.7. Scaling Considerations
7.8.8. Multiple NAT Policies and SPF Configuration Considerations
7.8.8.1. Multiple NAT Policies and Forwarding Considerations
7.8.9. Logging
7.9. L2-Aware NAT Destination-Based Multiple NAT Policies
7.9.1. Logging
7.9.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.9.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.9.2. Static Port Forwards
7.9.3. L2-Aware Ping
7.9.4. UPnP
7.10. NAT and CoA
7.10.1. CoA and NAT Policies
7.10.2. CoA and DNAT
7.10.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.11. Port Control Protocol (PCP)
7.12. Universal Plug and Play Internet Gateway Device Service
7.12.1. Configuring UPnP IGD Service
7.13. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.13.1. PPTP Protocol
7.13.1.1. Supported Control Messages
7.13.1.2. GRE Tunnel
7.13.2. PPTP ALG Operation
7.13.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.13.4. Selection of Call IDs in NAT
7.14. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.15. NAT Logging
7.15.1. Syslog/SNMP/Local-File Logging
7.15.1.1. Filtering LSN Events to System Memory
7.15.1.2. NAT Logging to a Local File
7.15.2. SNMP Trap Logging
7.15.3. NAT Syslog
7.15.4. LSN RADIUS Logging
7.15.4.1. Periodic RADIUS Logging
7.15.4.1.1. Message Pacing
7.15.4.2. RADIUS Logging and L2-Aware NAT
7.15.5. LSN and L2-Aware NAT Flow Logging
7.15.5.1. IPFIX Flow Logging
7.15.5.2. Template Formats
7.15.5.3. Template Format1 and Format2
7.15.5.4. Configuration Example
7.15.5.5. Syslog Flow Logging
7.15.5.5.1. Sequence Numbers
7.15.5.5.2. Timestamp
7.15.5.5.3. Event Aggregation
7.15.5.5.4. Syslog Transmission Rate Limit and Overload Conditions
7.16. DS-Lite and NAT64 Fragmentation
7.16.1. Overview
7.16.2. IPv6 Fragmentation in DS-Lite
7.16.3. NAT64
7.17. DS-lite Reassembly
7.17.1. Interpreting Fragmentation Statistics
7.18. Enhanced Statistics in NAT — Histogram
7.18.1. Configuration
7.19. NAT Redundancy
7.19.1. NAT Stateless Dual-Homing
7.19.1.1. Configuration Considerations
7.19.1.2. Troubleshooting Commands
7.19.2. Active-Active ISA Redundancy Model
7.19.2.1. Start Up Conditions
7.19.2.2. Recovery
7.19.2.3. Adding Additional ISAs in the ISA Group
7.19.3. L2-Aware Bypass
7.19.3.1. Sharing IP Addresses in L2-Aware NAT
7.19.3.2. Recovery
7.19.3.3. Default Bypass During Reboot or MS-ISA Provisioning
7.19.3.4. Logging
7.20. ISA Feature Interactions
7.20.1. MS-ISA Use with Service Mirrors
7.20.2. LNS, Application Assurance and NAT
7.20.3. Subscriber Aware Large Scale NAT44
7.21. Mapping of Address and Port Using Translation (MAP-T)
7.21.1. MAP-T Rules
7.21.2. A+P Mapping Algorithm
7.21.3. Routing Considerations
7.21.4. Forwarding Considerations in the BR
7.21.4.1. IPv6 Addresses
7.21.4.2. 1:1 Translations and IPv4 Prefix Translations
7.21.4.3. Hub-And-Spoke Topology
7.21.4.4. Rule Prefix Overlap
7.21.5. BMR Rules Implementation Example
7.21.6. ICMP
7.21.7. Fragmentation
7.21.7.1. Fragmentation in the Downstream Direction
7.21.7.2. Fragmentation in the Upstream Direction
7.21.7.3. Fragmentation Statistics
7.21.8. Maximum Segment Size (MSS) Adjust
7.21.9. Statistics Collection
7.21.10. Logging
7.21.11. Licensing
7.21.12. Configuration
7.21.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.21.13. Inter-Chassis Redundancy
7.22. Configuring NAT
7.22.1. ISA Redundancy
7.22.2. NAT Layer 2-Aware Configurations
7.22.3. Large Scale NAT Configuration
7.22.4. NAT Configuration Examples
7.23. Configuring VSR-NAT
7.23.1. VSR-NAT Licensing
7.23.2. Statistics Collection For LSN Bindings
7.23.3. Statistics Collection For LSN Bandwidth
7.23.4. Statistics Collection and HA
7.23.5. VSR-NAT Show Command Examples
7.24. Network Address Translation Command Reference
7.24.1. Command Hierarchies
7.24.1.1. ISA Configuration Commands
7.24.1.2. NAT Service Configuration Commands
7.24.1.2.1. NAT Outside Commands
7.24.1.2.2. IPFIX Commands
7.24.1.2.3. UPnP Commands
7.24.1.2.4. ISA RADIUS Policy Commands
7.24.1.2.5. NAT Syslog Commands
7.24.1.2.6. VPRN Commands
7.24.1.3. NAT Subscriber Management Commands
7.24.1.3.1. NAT Subscriber Management BRG Commands
7.24.1.4. NAT Router Configuration Commands
7.24.1.5. NAT DNAT Commands
7.24.1.6. NAT Admin Configuration Commands
7.24.1.7. NAT MAP Domain Configuration Commands
7.24.1.8. TCP MSS Adjustment Commands
7.24.1.9. NAT MAP-T Configuration Commands
7.24.1.10. Residential Firewall Subscriber Management Commands
7.24.1.11. Residential Firewall Domain Commands
7.24.1.12. Residential Firewall Commands
7.24.1.13. Tools Commands
7.24.1.14. Show Commands
7.24.1.15. Clear Commands
7.24.1.16. Tools Commands
7.24.1.17. Filter Commands
7.24.2. Command Descriptions
7.24.2.1. Generic Commands
7.24.2.2. ISA Configuration Commands
7.24.2.3. NAT Configuration Commands
7.24.2.4. NAT Service Configuration Commands
7.24.2.5. NAT Outside Epipe Commands
7.24.2.6. IPFlow Information Export Protocol Commands
7.24.2.7. AAA Policy Commands
7.24.2.8. NAT Syslog Commands
7.24.2.9. NAT Subscriber Management Commands
7.24.2.10. NAT Subscriber Management BRG Commands
7.24.2.11. NAT DNAT Commands
7.24.2.12. NAT MAP-T Commands
7.24.2.13. NAT Filter Commands
7.24.2.14. Residential Firewall Commands
7.24.2.15. NAT Show Commands
7.24.2.16. MAP-T Show Commands
7.24.2.17. NAT Clear Commands
7.24.2.18. MAP-T Clear Commands
7.24.2.19. NAT Tools Commands
8. Residential Firewall
8.1. Residential Firewall Overview
8.1.1. Supported Protocols and Extension Headers
8.1.1.1. Unknown Protocols
8.1.1.2. TCP and UDP
8.1.1.3. ICMPv6
8.1.2. Application Layer Gateway
8.1.3. Additional Filtering Control
8.1.4. TCP MSS Adjustment
8.1.5. Static Port Forwards and DMZ
8.2. Residential Firewall Provisioning
8.2.1. Domains and Addressing
9. TCP MSS Adjustment
9.1. Overview
9.2. TCP MSS Adjustment for ESM Hosts
9.3. TCP MSS Adjustment for NAT Services
9.4. TCC MSS Adjustment Commands
9.4.1. Command Hierarchy
9.4.1.1. TCC MSS Adjustment Command Descriptions
10. L2TP Network Server
10.1. Subscriber agg-rate-limit on LNS
10.2. LNS Reassembly
10.2.1. Overview
10.2.2. Reassembly Function
10.2.3. Load Sharing Between the ISAs
10.2.4. Inter-chassis ISA Redundancy
10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
10.3.1. Terminology
10.3.2. LNS MLPPPoX
10.3.3. MLPPP Encapsulation
10.3.4. MLPPPoX Negotiation
10.3.5. Enabling MLPPPoX
10.3.6. Link Fragmentation and Interleaving (LFI)
10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
10.3.7. LFI Functionality Implemented in LNS
10.3.7.1. Last Mile QoS Awareness in the LNS
10.3.7.2. BB-ISA Processing
10.3.7.3. LNS-LAC Link
10.3.7.4. AN-RG Link
10.3.7.5. Home Link
10.3.7.6. Optimum Fragment Size Calculation by LNS
10.3.7.6.1. Encapsulation Based Fragment Size
10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
10.3.7.6.3. Selection of the Optimum Fragment Length
10.3.8. Upstream Traffic Considerations
10.3.9. Multiple Links MLPPPoX With No Interleaving
10.3.10. MLPPPoX Session Support
10.3.11. Session Load Balancing Across Multiple BB-ISAs
10.3.12. BB-ISA Hashing Considerations
10.3.13. Last Mile Rate and Encapsulation Parameters
10.3.14. Link Failure Detection
10.3.15. CoA Support
10.3.16. Accounting
10.3.17. Filters and Mirroring
10.3.18. PTA Considerations
10.3.19. QoS Considerations
10.3.19.1. Dual-Pass
10.3.19.2. Traffic Prioritization in LFI
10.3.19.3. Shaping Based on the Last Mile Wire Rates
10.3.19.4. Downstream Bandwidth Management on Egress Port
10.3.20. Sub/Sla-Profile Considerations
10.3.21. Example of MLPPPoX Session Setup Flow
10.3.22. Other Considerations
10.4. Configuration Notes
10.5. L2TP Network Server Command Reference
10.5.1. Command Hierarchies
10.5.1.1. ISA Commands
10.5.1.2. MLPPP on LNS Commands
10.5.2. Command Descriptions
10.5.2.1. Generic Commands
10.5.2.2. LNS Commands
10.5.2.3. Network Address Translation (NAT) Commands
10.5.2.4. MLPPP on LNS Commands
11. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. ISA Configuration Process
2. ISA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISA Overview
2.4. MS-ISM Overview
2.5. Application Assurance Hardware Features
2.5.1. AA System Support
2.5.2. Host IOM Support for AA on ISAs
3. Application Assurance
3.1. Application Assurance (AA) Overview
3.1.1. Application Assurance: Inline Policy Enforcement
3.1.2. AA Integration in Subscriber Edge Gateways
3.1.3. Fixed Residential Broadband Services
3.1.3.1. Dual-Stack Lite – DS-Lite
3.1.3.2. 6to4 /6RD
3.1.4. Wireless LAN Gateway Broadband Services
3.1.5. Application-Aware Business VPN Services
3.1.6. Business Mobile Backhaul
3.1.7. SeGW Firewall Service
3.2. Application Assurance System Architecture
3.2.1. AA ISA Resource Configuration
3.2.1.1. AA ISA Groups
3.2.1.1.1. AA Group Partitions
3.2.1.1.2. Bypass Modes
3.2.1.2. Redundancy
3.2.1.2.1. No AA ISA Group Redundancy
3.2.1.2.2. Failure to Fabric
3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
3.2.1.3. ISA Load Balancing
3.2.1.4. Asymmetry Removal
3.2.1.4.1. Asymmetry Removal Overview
3.2.1.4.2. Failure Modes
3.2.1.4.3. AARP Peered Node/Instance Configuration
3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.2.1.4.5. Multi-Chassis Datapath Shunts
3.2.1.5. ISA Overload Detection
3.2.2. AA Packet Processing
3.2.2.1. Divert of Traffic and Subscribers
3.2.2.1.1. Services and AA Subscribers
3.2.2.1.2. Spoke SDPs
3.2.2.1.3. Transit AA Subscribers
3.2.2.1.4. AA Subscriber Application Service Definition
3.2.2.2. Application Identification
3.2.2.2.1. Application Assurance Identification Components
3.2.2.2.2. Protocol Signatures
3.2.2.2.3. Custom Protocols
3.2.2.2.4. Protocol Shutdown
3.2.2.2.5. Supported Protocol Signatures
3.2.2.2.6. Application Groups
3.2.2.2.7. Charging Groups
3.2.2.2.8. Applications
3.2.2.2.9. Application Filters
3.2.2.2.10. HTTP
3.2.2.2.11. AA IP Prefix Lists
3.2.2.3. Statistics and Accounting
3.2.2.3.1. Per-AA Subscriber Special Study
3.2.2.3.2. System Aspects
3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.2.2.3.4. AA Partition Traffic Type Statistics
3.2.2.3.5. Configurable AA Subscriber Statistics Collection
3.2.2.3.6. AA-Performance Record for ISA Load
3.2.2.3.7. AA Partition Traffic Type Statistics
3.2.2.3.8. AA Partition Admit–Deny Statistics
3.2.2.3.9. RADIUS Accounting AA Records
3.2.2.3.10. AA GX Based Usage Monitoring
3.2.2.3.11. Supported AVPs
3.2.2.3.12. Cflowd AA Records
3.2.2.4. Application QoS Policy (AQP)
3.2.2.4.1. AQP Match Criteria
3.2.2.4.2. AQP Actions
3.2.2.4.3. Application Assurance Policers
3.2.2.4.4. Time of Day Policing Adjustments
3.2.2.4.5. Congestion Override Policing
3.2.2.4.6. Dynamic Experience Management
3.2.2.4.7. Application Assurance HTTP Redirect
3.2.2.4.8. ICAP - Large Scale Category-based URL Filtering
3.2.2.4.9. Local URL-List Filtering
3.2.2.4.10. HTTP Header Enrichment
3.2.2.4.11. HTTP In Browser Notification
3.2.2.5. Application Assurance Firewall
3.2.2.5.1. Denial of Service (DoS) Protection
3.2.2.5.2. TCP Validation
3.2.2.5.3. Policy Partitioned AA FW
3.2.2.5.4. Configuring AA FW
3.2.2.5.5. AA FW Logging
3.2.2.5.6. SeGW Firewall Protection
3.2.3. Service Monitoring and Debugging
3.2.4. CPU Utilization
3.2.5. CLI Batch: Begin, Commit and Abort Commands
3.3. Configuring Application Assurance with CLI
3.3.1. Provisioning AA ISA MDA
3.3.2. Configuring an AA ISA Group
3.3.2.1. Configuring Watermark Parameters
3.3.3. Configuring a Group Policy
3.3.3.1. Beginning and Committing a Policy Configuration
3.3.3.2. Aborting a Policy Configuration
3.3.3.3. Configuring an IP Prefix List
3.3.3.4. Configuring AA Session Filters
3.3.3.5. Configuring an Application Group
3.3.3.6. Configuring an Application
3.3.3.7. Configuring an Application Filter
3.3.3.8. Configuring an Application Profile
3.3.3.9. Configuring Suppressible App-Profile with SRRP
3.3.3.10. Configuring Application Service Options
3.3.3.11. Configuring a Policer
3.3.3.12. Configuring an Application QoS Policy
3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
3.3.3.14. Configuring an HTTP Error Redirect
3.3.3.15. Configuring HTTP Header Enrichment
3.3.3.16. Configuring an HTTP Redirect Policy
3.3.3.17. Configuring a Captive Redirect HTTP Redirect Policy
3.3.3.17.1. Captive-Redirect and HTTPS Flows Redirection
3.3.3.18. Configuring ICAP URL Filtering
3.3.3.19. Configuring Local URL-List Filtering
3.3.3.20. Configuring HTTP Notification
3.3.4. Configuring AA Volume Accounting and Statistics
3.3.4.1. Configuring Cflowd Collector
3.3.4.2. Configuring AA Volume, TCP and RTP Performance Reporting
3.4. Application Assurance Command Reference
3.4.1. Application Assurance Command Reference
3.4.1.1. Hardware Commands
3.4.1.2. Admin Commands
3.4.1.3. ISA Commands
3.4.1.4. Application Assurance Commands
3.4.1.4.1. AA Commands
3.4.1.4.2. AA Group Commands
3.4.1.5. AA Interface Commands
3.4.1.6. Persistence Commands
3.4.2. Command Descriptions
3.4.2.1. Generic Commands
3.4.2.2. Admin Commands
3.4.2.3. Application Assurance Commands
3.4.2.4. Group Commands
3.4.2.4.1. Transit Subscriber Commands
3.4.2.4.2. Policer Commands
3.4.2.4.3. Policy Commands
3.4.2.4.4. Statistics Commands
3.4.2.4.5. TCP Validation Commands
3.4.2.4.6. Policy Commands
3.4.2.4.7. System Persistence Commands
3.4.2.5. ISA Commands
3.4.2.5.1. Application Assurance Group Commands
3.5. Show, Tools, Clear, and Debug Command Reference
3.5.1. Command Hierarchies
3.5.1.1. Show Commands
3.5.1.2. Tools Commands
3.5.1.3. Clear Commands
3.5.1.4. Debug Commands
3.5.2. Command Descriptions
3.5.2.1. Show Commands
3.5.2.2. Tools Commands
3.5.2.3. Clear Commands
3.5.2.4. Debug Commands
4. IP Tunnels
4.1. IP Tunnels Overview
4.1.1. Tunnel ISAs
4.1.1.1. Public Tunnel SAPs
4.1.1.2. Private Tunnel SAPs
4.1.1.3. IP Interface Configuration
4.1.1.4. GRE and IP-IP Tunnel Configuration
4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.1.1.6. TCP MSS Adjustment
4.1.2. Operational Conditions
4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
4.1.3. QoS Interactions
4.1.4. OAM Interactions
4.1.5. Redundancy
4.1.6. Statistics Collection
4.1.7. Security
4.1.7.1. GRE Tunnel Multicast Support
4.1.7.2. IPv6 over IPv4 GRE Tunnel
4.1.8. IKEv2
4.1.8.1. IKEv2 Traffic Selector and TS-List
4.1.8.2. IKEv2 Fragmentation
4.1.9. SHA2 Support
4.1.10. IPsec Client Lockout
4.1.11. IPsec Tunnel CHILD_SA Rekey
4.1.12. Multiple IKE/ESP Transform Support
4.2. X.509v3 Certificate Overview
4.2.1. SR OS X.509v3 Certificate Support
4.2.2. Local Storage
4.2.3. CA-Profile
4.2.4. CA Chain Computation
4.2.5. Certificate Enrollment
4.2.6. Certificate Revocation Check
4.2.7. Certificate/CRL Expiration Warning
4.2.8. Certificate/CRL/Key Cache
4.2.9. Auto CRL Update
4.2.10. IPsec Client Database
4.3. Using Certificates For IPsec Tunnel Authentication
4.4. Trust-Anchor-Profile
4.5. Cert-Profile
4.5.1. Cert-Profile/trust-anchor-profile versus cert/trust-anchor
4.6. Certificate Management Protocol Version 2 (CMPv2)
4.7. OCSP
4.8. Video Wholesale Example
4.9. Multi-Chassis IPsec Redundancy Overview
4.9.1. Architecture
4.9.2. MC-IPsec Mastership Protocol (MIMP)
4.9.2.1. MIMP Protocol States
4.9.2.2. Election Logic
4.9.2.3. Protection Status
4.9.2.4. Other Details
4.9.3. Routing
4.9.3.1. Routing in Public Service
4.9.3.2. Routing in Private Services
4.9.3.3. Other Details About Shunting
4.9.4. MC-IPsec Aware VRRP
4.9.5. Synchronization
4.9.5.1. Automatic CHILD_SA Rekey
4.9.6. Responder Only
4.10. IPsec Deployment Requirements
4.11. IKEv2 Remote-Access Tunnel
4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.11.3.1. DHCPv4 Address Assignment
4.11.3.2. DHCPv6 Address Assignment
4.11.3.3. DHCPv4/v6 Usage Notes
4.11.4. IPv6 IPsec Support
4.11.4.1. IPv6 as Payload
4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
4.11.4.5. IPv6 as Encapsulation
4.12. MLDv2 over IPsec
4.12.1. MLDv2 over IPsec – Traffic Selector
4.12.2. MLDv2 over IPsec – Configuration
4.13. Configuring IPsec with CLI
4.13.1. Provisioning a Tunnel ISA
4.13.2. Configuring a Tunnel Group
4.13.3. Configuring Router Interfaces for IPsec
4.13.4. Configuring IPsec Parameters
4.13.5. Configuring IPsec in Services
4.13.6. Configuring X.509v3 Certificate Parameters
4.13.7. Configuring MC-IPsec
4.13.7.1. Configuring MIMP
4.13.7.2. Configuring Multi-Chassis Synchronization
4.13.7.3. Configuring Routing for MC-IPsec
4.13.8. Configuring and Using CMPv2
4.13.9. Configuring OCSP
4.13.10. Configuring IKEv2 Remote — Access Tunnel
4.13.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
4.14. IP Tunnel Command Reference
4.14.1. Command Hierarchies
4.14.1.1. Configuration Commands
4.14.1.1.1. Hardware Commands
4.14.1.1.2. ISA Commands
4.14.1.1.3. IPsec Commands
4.14.1.2. Service Configuration Commands
4.14.1.2.1. IES Commands
4.14.1.2.2. VPRN Commands
4.14.1.2.3. IPsec Mastership Election Commands
4.14.1.2.4. Related Commands
4.14.1.2.5. CMPv2 Commands
4.14.1.2.6. Auto-Update Commands
4.14.1.2.7. Show Commands
4.14.1.2.8. Debug Commands
4.14.1.2.9. Tools Commands
4.14.1.2.10. Clear Commands
4.14.1.2.11. Admin Commands
4.14.2. Command Descriptions
4.14.2.1. Generic Commands
4.14.2.2. Hardware Commands
4.14.2.3. ISA Commands
4.14.2.4. Certificate Profile Commands
4.14.2.5. Client Database Commands
4.14.2.6. Internet Key Exchange (IKE) Commands
4.14.2.7. IPsec Transform Commands
4.14.2.8. IPsec Static Security Association Commands
4.14.2.9. Trust Anchor Profile/TS Commands
4.14.2.10. Tunnel Template Commands
4.14.2.11. Service Configuration Commands
4.14.2.12. Interface SAP Tunnel Commands
4.14.2.12.1. IPsec Gateway Commands
4.14.2.13. RADIUS Policy Commands
4.14.2.14. CMPv2 Commands
4.14.2.15. Auto-Update Command Descriptions
4.14.2.16. IPsec Mastership Election Commands
4.14.2.17. Show Commands
4.14.2.18. Debug Commands
4.14.2.19. Tools Commands
4.14.2.20. Clear Commands
4.14.2.21. Admin Commands
5. L2TPV3 Tunnels
5.1. L2TPv3 Overview
5.2. Control Plane
5.3. Public SAP
5.4. Private SAP
6. Video Services
6.1. Video Services
6.1.1. Video Groups
6.1.2. Video SAP
6.1.3. Video Interface
6.1.4. Multicast Information Policies
6.1.5. Duplicate Stream Protection
6.1.6. Duplicate Stream Selection
6.1.6.1. Stream Identification
6.1.6.2. Initial Sequence Identification
6.1.6.3. Packet Selection
6.1.6.4. Clock Recovery
6.1.6.5. Playout
6.1.6.6. Loss of Transport
6.1.7. Video Quality Monitoring
6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.2. Retransmission and Fast Channel Change
6.2.1. RET and FCC Overview
6.2.1.1. Retransmission
6.2.1.2. Fast Channel Change (FCC)
6.2.1.2.1. Retransmission Client
6.2.1.2.2. Retransmission Server
6.2.1.2.3. Fast Channel Change Server
6.2.1.2.4. Logging and Accounting for RET and FCC
6.2.1.3. RET and FCC Server Concurrency
6.2.1.3.1. Prerequisites and Restrictions
6.2.2. Separate Timers for FCC and RET
6.2.3. Peak Bandwidth and Sessions per ISA
6.3. Ad Insertion
6.3.1. Local/Zoned Ad Insertion
6.3.1.1. Transport Stream Ad Splicing
6.3.1.2. Ad Zones
6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
6.4. Configuring Video Service Components with CLI
6.4.1. Video Services Overview
6.4.1.1. Configuring an ISA-MS Module
6.4.1.2. Configuring a Video Group
6.4.1.3. Configuring a Video SAP and Video Interface in a Service
6.4.1.4. Basic Multicast Information Policy Configuration
6.4.2. Sample Configurations
6.5. Configuring RET/FCC Video Components with CLI
6.5.1. Configuring RET/FCC Video Features in the CLI
6.5.1.1. Configuring the RET Client
6.5.1.2. Configuring the RET Server
6.5.1.3. Configuring the FCC Server
6.5.1.4. Logging and Accounting Collection for Video Statistics
6.6. Configuring ADI Components with CLI
6.6.1. Configuring ADI in CLI
6.6.1.1. Configuring the RET Client
6.6.1.2. Configuring a Video Group
6.6.1.3. Configuring NTP
6.6.1.4. Configuring Channel Parameters
6.6.1.5. Configuring Service Entities
6.7. Video Services Command Reference
6.7.1. IP-TV Command Hierarchies
6.7.1.1. Hardware Commands
6.7.1.2. Video Group Commands
6.7.1.3. Video Policy Video Commands
6.7.1.4. Bundle and Channel Commands
6.7.1.5. Service Video Interface Commands
6.7.1.5.1. VPLS Commands
6.7.1.5.2. IES Commands
6.7.1.5.3. VPRN Commands
6.7.2. Command Descriptions
6.7.2.1. Generic Commands
6.7.2.2. LNS Group Commands
6.7.2.3. Video Group Commands
6.7.2.4. Multicast Info Policy Commands
6.7.2.5. Video Policy Commands
6.7.2.6. Bundle and Channel Commands
6.7.2.7. Service Video Interface Commands
6.8. Show, Clear, and Debug Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Show Commands
6.8.1.2. Clear Commands
6.8.1.3. Debug Commands
6.8.2. Command Descriptions
6.8.2.1. Show Commands
6.8.2.2. Clear Commands
6.8.2.3. Debug Commands
7. Network Address Translation
7.1. Terminology
7.2. Network Address Translation (NAT) Overview
7.2.1. Principles of NAT
7.2.2. Application Compatibility
7.3. Large Scale NAT
7.3.1. Port Range Blocks
7.3.1.1. Reserved Ports and Priority Sessions
7.3.1.2. Preventing Port Block Starvation
7.3.1.2.1. Dynamic Port Block Starvation in LSN
7.3.1.2.2. Dynamic Port Block Reservation
7.3.2. Timeouts
7.3.3. Watermarks
7.4. L2-Aware NAT
7.5. One-to-One (1:1) NAT
7.5.1. Static 1:1 NAT
7.5.1.1. Protocol Agnostic Behavior
7.5.1.2. Modification of Parameters in Static 1:1 NAT
7.5.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.5.1.4. NAT-Policy Selection
7.5.1.5. Mapping Timeout
7.5.1.6. Logging
7.5.1.7. Restrictions
7.5.2. ICMP
7.6. Deterministic NAT
7.6.1. Overview
7.6.2. Supported Deterministic NAT Types
7.6.3. Number of Subscribers per Outside IP and per Pool
7.6.4. Referencing a Pool
7.6.5. Outside Pool Configuration
7.6.6. Mapping Rules and the map Command in Deterministic LSN44
7.6.7. Hashing Considerations in Deterministic LSN44
7.6.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.6.8. Sharing of Deterministic NAT Pools
7.6.9. Simultaneous support of dynamic and deterministic NAT
7.6.10. Selecting Traffic for NAT
7.6.11. Inverse Mappings
7.6.11.1. MIB approach
7.6.11.2. Off-line Approach to Obtain Deterministic Mappings
7.6.12. Logging
7.6.13. Deterministic DS-Lite
7.6.13.1. Hashing Considerations in DS-Lite
7.6.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.7. Destination Based NAT (DNAT)
7.7.1. Combination of SNAPT and DNAT
7.7.2. Forwarding Model in DNAT
7.7.3. DNAT Traffic Selection via NAT Classifier
7.7.4. Configuring DNAT
7.7.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.7.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.8. LSN – Multiple NAT Policies per Inside Routing Context
7.8.1. Restrictions
7.8.2. Multiple NAT Policies Per Inside Routing Context
7.8.3. Routing Approach for NAT Diversion
7.8.4. Filter-Based Approach
7.8.5. Multiple NAT Policies with DS-Lite and NAT64
7.8.6. Default NAT Policy
7.8.7. Scaling Considerations
7.8.8. Multiple NAT Policies and SPF Configuration Considerations
7.8.8.1. Multiple NAT Policies and Forwarding Considerations
7.8.9. Logging
7.9. L2-Aware NAT Destination-Based Multiple NAT Policies
7.9.1. Logging
7.9.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.9.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.9.2. Static Port Forwards
7.9.3. L2-Aware Ping
7.9.4. UPnP
7.10. NAT and CoA
7.10.1. CoA and NAT Policies
7.10.2. CoA and DNAT
7.10.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.11. Port Control Protocol (PCP)
7.12. Universal Plug and Play Internet Gateway Device Service
7.12.1. Configuring UPnP IGD Service
7.13. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.13.1. PPTP Protocol
7.13.1.1. Supported Control Messages
7.13.1.2. GRE Tunnel
7.13.2. PPTP ALG Operation
7.13.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.13.4. Selection of Call IDs in NAT
7.14. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.15. NAT Logging
7.15.1. Syslog/SNMP/Local-File Logging
7.15.1.1. Filtering LSN Events to System Memory
7.15.1.2. NAT Logging to a Local File
7.15.2. SNMP Trap Logging
7.15.3. NAT Syslog
7.15.4. LSN RADIUS Logging
7.15.4.1. Periodic RADIUS Logging
7.15.4.1.1. Message Pacing
7.15.4.2. RADIUS Logging and L2-Aware NAT
7.15.5. LSN and L2-Aware NAT Flow Logging
7.15.5.1. IPFIX Flow Logging
7.15.5.2. Template Formats
7.15.5.3. Template Format1 and Format2
7.15.5.4. Configuration Example
7.15.5.5. Syslog Flow Logging
7.15.5.5.1. Sequence Numbers
7.15.5.5.2. Timestamp
7.15.5.5.3. Event Aggregation
7.15.5.5.4. Syslog Transmission Rate Limit and Overload Conditions
7.16. DS-Lite and NAT64 Fragmentation
7.16.1. Overview
7.16.2. IPv6 Fragmentation in DS-Lite
7.16.3. NAT64
7.17. DS-lite Reassembly
7.17.1. Interpreting Fragmentation Statistics
7.18. Enhanced Statistics in NAT — Histogram
7.18.1. Configuration
7.19. NAT Redundancy
7.19.1. NAT Stateless Dual-Homing
7.19.1.1. Configuration Considerations
7.19.1.2. Troubleshooting Commands
7.19.2. Active-Active ISA Redundancy Model
7.19.2.1. Start Up Conditions
7.19.2.2. Recovery
7.19.2.3. Adding Additional ISAs in the ISA Group
7.19.3. L2-Aware Bypass
7.19.3.1. Sharing IP Addresses in L2-Aware NAT
7.19.3.2. Recovery
7.19.3.3. Default Bypass During Reboot or MS-ISA Provisioning
7.19.3.4. Logging
7.20. ISA Feature Interactions
7.20.1. MS-ISA Use with Service Mirrors
7.20.2. LNS, Application Assurance and NAT
7.20.3. Subscriber Aware Large Scale NAT44
7.21. Mapping of Address and Port Using Translation (MAP-T)
7.21.1. MAP-T Rules
7.21.2. A+P Mapping Algorithm
7.21.3. Routing Considerations
7.21.4. Forwarding Considerations in the BR
7.21.4.1. IPv6 Addresses
7.21.4.2. 1:1 Translations and IPv4 Prefix Translations
7.21.4.3. Hub-And-Spoke Topology
7.21.4.4. Rule Prefix Overlap
7.21.5. BMR Rules Implementation Example
7.21.6. ICMP
7.21.7. Fragmentation
7.21.7.1. Fragmentation in the Downstream Direction
7.21.7.2. Fragmentation in the Upstream Direction
7.21.7.3. Fragmentation Statistics
7.21.8. Maximum Segment Size (MSS) Adjust
7.21.9. Statistics Collection
7.21.10. Logging
7.21.11. Licensing
7.21.12. Configuration
7.21.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.21.13. Inter-Chassis Redundancy
7.22. Configuring NAT
7.22.1. ISA Redundancy
7.22.2. NAT Layer 2-Aware Configurations
7.22.3. Large Scale NAT Configuration
7.22.4. NAT Configuration Examples
7.23. Configuring VSR-NAT
7.23.1. VSR-NAT Licensing
7.23.2. Statistics Collection For LSN Bindings
7.23.3. Statistics Collection For LSN Bandwidth
7.23.4. Statistics Collection and HA
7.23.5. VSR-NAT Show Command Examples
7.24. Network Address Translation Command Reference
7.24.1. Command Hierarchies
7.24.1.1. ISA Configuration Commands
7.24.1.2. NAT Service Configuration Commands
7.24.1.2.1. NAT Outside Commands
7.24.1.2.2. IPFIX Commands
7.24.1.2.3. UPnP Commands
7.24.1.2.4. ISA RADIUS Policy Commands
7.24.1.2.5. NAT Syslog Commands
7.24.1.2.6. VPRN Commands
7.24.1.3. NAT Subscriber Management Commands
7.24.1.3.1. NAT Subscriber Management BRG Commands
7.24.1.4. NAT Router Configuration Commands
7.24.1.5. NAT DNAT Commands
7.24.1.6. NAT Admin Configuration Commands
7.24.1.7. NAT MAP Domain Configuration Commands
7.24.1.8. TCP MSS Adjustment Commands
7.24.1.9. NAT MAP-T Configuration Commands
7.24.1.10. Residential Firewall Subscriber Management Commands
7.24.1.11. Residential Firewall Domain Commands
7.24.1.12. Residential Firewall Commands
7.24.1.13. Tools Commands
7.24.1.14. Show Commands
7.24.1.15. Clear Commands
7.24.1.16. Tools Commands
7.24.1.17. Filter Commands
7.24.2. Command Descriptions
7.24.2.1. Generic Commands
7.24.2.2. ISA Configuration Commands
7.24.2.3. NAT Configuration Commands
7.24.2.4. NAT Service Configuration Commands
7.24.2.5. NAT Outside Epipe Commands
7.24.2.6. IPFlow Information Export Protocol Commands
7.24.2.7. AAA Policy Commands
7.24.2.8. NAT Syslog Commands
7.24.2.9. NAT Subscriber Management Commands
7.24.2.10. NAT Subscriber Management BRG Commands
7.24.2.11. NAT DNAT Commands
7.24.2.12. NAT MAP-T Commands
7.24.2.13. NAT Filter Commands
7.24.2.14. Residential Firewall Commands
7.24.2.15. NAT Show Commands
7.24.2.16. MAP-T Show Commands
7.24.2.17. NAT Clear Commands
7.24.2.18. MAP-T Clear Commands
7.24.2.19. NAT Tools Commands
8. Residential Firewall
8.1. Residential Firewall Overview
8.1.1. Supported Protocols and Extension Headers
8.1.1.1. Unknown Protocols
8.1.1.2. TCP and UDP
8.1.1.3. ICMPv6
8.1.2. Application Layer Gateway
8.1.3. Additional Filtering Control
8.1.4. TCP MSS Adjustment
8.1.5. Static Port Forwards and DMZ
8.2. Residential Firewall Provisioning
8.2.1. Domains and Addressing
9. TCP MSS Adjustment
9.1. Overview
9.2. TCP MSS Adjustment for ESM Hosts
9.3. TCP MSS Adjustment for NAT Services
9.4. TCC MSS Adjustment Commands
9.4.1. Command Hierarchy
9.4.1.1. TCC MSS Adjustment Command Descriptions
10. L2TP Network Server
10.1. Subscriber agg-rate-limit on LNS
10.2. LNS Reassembly
10.2.1. Overview
10.2.2. Reassembly Function
10.2.3. Load Sharing Between the ISAs
10.2.4. Inter-chassis ISA Redundancy
10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
10.3.1. Terminology
10.3.2. LNS MLPPPoX
10.3.3. MLPPP Encapsulation
10.3.4. MLPPPoX Negotiation
10.3.5. Enabling MLPPPoX
10.3.6. Link Fragmentation and Interleaving (LFI)
10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
10.3.7. LFI Functionality Implemented in LNS
10.3.7.1. Last Mile QoS Awareness in the LNS
10.3.7.2. BB-ISA Processing
10.3.7.3. LNS-LAC Link
10.3.7.4. AN-RG Link
10.3.7.5. Home Link
10.3.7.6. Optimum Fragment Size Calculation by LNS
10.3.7.6.1. Encapsulation Based Fragment Size
10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
10.3.7.6.3. Selection of the Optimum Fragment Length
10.3.8. Upstream Traffic Considerations
10.3.9. Multiple Links MLPPPoX With No Interleaving
10.3.10. MLPPPoX Session Support
10.3.11. Session Load Balancing Across Multiple BB-ISAs
10.3.12. BB-ISA Hashing Considerations
10.3.13. Last Mile Rate and Encapsulation Parameters
10.3.14. Link Failure Detection
10.3.15. CoA Support
10.3.16. Accounting
10.3.17. Filters and Mirroring
10.3.18. PTA Considerations
10.3.19. QoS Considerations
10.3.19.1. Dual-Pass
10.3.19.2. Traffic Prioritization in LFI
10.3.19.3. Shaping Based on the Last Mile Wire Rates
10.3.19.4. Downstream Bandwidth Management on Egress Port
10.3.20. Sub/Sla-Profile Considerations
10.3.21. Example of MLPPPoX Session Setup Flow
10.3.22. Other Considerations
10.4. Configuration Notes
10.5. L2TP Network Server Command Reference
10.5.1. Command Hierarchies
10.5.1.1. ISA Commands
10.5.1.2. MLPPP on LNS Commands
10.5.2. Command Descriptions
10.5.2.1. Generic Commands
10.5.2.2. LNS Commands
10.5.2.3. Network Address Translation (NAT) Commands
10.5.2.4. MLPPP on LNS Commands
11. Standards and Protocol Support
Customer Document and Product Support
OAM and Diagnostics Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. Service Mirroring
2.2. Mirror Implementation
2.2.1. Mirror Source and Destinations
2.2.1.1. Local and Remote Mirroring
2.2.1.2. Slicing
2.2.2. Mirroring Performance
2.2.3. Mirroring Configuration
2.2.4. ATM Mirroring
2.2.5. IP Mirroring
2.2.5.1. Remote IP Mirroring
2.2.5.2. Local IP Mirroring
2.2.5.3. Port-ID Enabled PPP Mirroring
2.3. Mirrored Traffic Transport using MPLS-TP SDPs
2.4. Subscriber Mirroring
2.5. Packet Capture
2.6. Lawful Intercept
2.6.1. LI Activation Through RADIUS
2.6.2. Routable Lawful Intercept Encapsulation
2.7. Pseudowire Redundant Mirror Services
2.7.1. Redundant Mirror Source Notes
2.8. Lawful Intercept and NAT
2.8.1. Carrier Grade NAT
2.8.2. L2-Aware NAT
2.9. Configuration Process Overview
2.10. Configuration Notes
2.11. Configuring Service Mirroring with CLI
2.11.1. Mirror Configuration Overview
2.11.1.1. Defining Mirrored Traffic
2.11.2. Lawful Intercept Configuration Overview
2.11.2.1. Saving LI Data
2.11.2.2. Regulating LI Access
2.11.2.2.1. LI User Access
2.11.2.2.2. LI Source Configuration
2.11.2.3. Configurable Filter Lock for Lawful Intercept
2.11.2.4. LI MAC Filter Configuration
2.11.2.5. LI Logging
2.11.3. Basic Mirroring Configuration
2.11.3.1. Mirror Classification Rules
2.11.3.1.1. Port
2.11.3.1.2. SAP
2.11.3.1.3. MAC Filter
2.11.3.1.4. IP Filter
2.11.3.1.5. Ingress Label
2.11.3.1.6. Subscriber
2.11.4. Common Configuration Tasks
2.11.4.1. Configuring a Local Mirror Service
2.11.4.2. Configuring SDPs for Mirrors and LI
2.11.4.3. Configuring a Remote Mirror Service
2.11.4.4. Configuring an ATM Mirror Service
2.11.4.5. Configuring Lawful Intercept Parameters
2.11.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
2.12. Service Management Tasks
2.12.1. Modifying a Local Mirrored Service
2.12.2. Deleting a Local Mirrored Service
2.12.3. Modifying a Remote Mirrored Service
2.12.4. Deleting a Remote Mirrored Service
2.13. Mirror Service Configuration Command Reference
2.13.1. Command Hierarchies
2.13.1.1. Mirror Configuration Commands
2.13.1.2. IP Mirror Interface Commands
2.13.1.3. Lawful Intercept Commands
2.13.2. Command Descriptions
2.13.2.1. Generic Commands
2.13.2.2. Mirror Destination Configuration Commands
2.13.2.3. IP Mirror Interface Commands
2.13.2.4. Lawful Intercept Commands
2.13.2.4.1. Other LI Configuration Commands
2.14. Mirror Service Show and Debug Command Reference
2.14.1. Command Hierarchies
2.14.1.1. Show Commands
2.14.1.2. Clear Commands
2.14.1.3. Debug Commands
2.14.2. Command Descriptions
2.14.2.1. Show Commands
2.14.2.2. Clear Commands
2.14.2.3. Debug Commands
3. OAM, SAA, and OAM-PM
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.3. ECMP Considerations
3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.1.5. Downstream Detailed Mapping (DDMAP) TLV
3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.6.1. Responder Node Procedures
3.1.6.2. Sender Node Procedures
3.1.7. MPLS OAM Support in Segment Routing
3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
3.1.7.3. Operation on SR-TE LSP
3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
3.1.8. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.1.9. LDP ECMP Tree Building
3.1.10. Periodic Path Exercising
3.1.11. LSP Ping for RSVP P2MP LSP (P2MP)
3.1.12. LSP Trace for RSVP P2MP LSP
3.1.12.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.13. Tunneling of ICMP Reply Packets over MPLS LSP
3.1.14. QoS Handling of Tunneled ICMP Reply Packets
3.1.15. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.1.16. SDP Diagnostics
3.1.17. SDP Ping
3.1.18. SDP MTU Path Discovery
3.1.19. Service Diagnostics
3.1.20. VPLS MAC Diagnostics
3.1.21. MAC Ping
3.1.22. MAC Trace
3.1.23. CPE Ping
3.1.24. CPE Ping for PBB Epipe
3.1.24.1. Hardware Support
3.1.25. MAC Populate
3.1.26. MAC Purge
3.1.27. VLL Diagnostics
3.1.28. VCCV Ping
3.1.28.1. VCCV-Ping Application
3.1.28.2. VCCV Ping in a Multi-Segment Pseudowire
3.1.29. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.29.1. VCCV for Static Pseudowire Segments
3.1.29.2. Detailed VCCV-Trace Operation
3.1.29.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.29.3.1. Sending a VCCV Echo Request
3.1.29.3.2. Receiving an VCCV Echo Request
3.1.29.3.3. Receiving an VCCV Echo Reply
3.1.30. IGMP Snooping Diagnostics
3.1.31. MFIB Ping
3.1.32. ATM Diagnostics
3.1.33. MPLS-TP On-Demand OAM Commands
3.1.34. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.34.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.1.35. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.36. VxLAN Ping Supporting EVPN for VxLAN
3.1.37. Show Commands
3.1.38. BFD
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. Ethernet Connectivity Fault Management (ETH-CFM)
3.3.1. ETH-CFM Building Blocks
3.3.2. Loopback
3.3.3. Loopback Multicast
3.3.4. Linktrace
3.3.5. Continuity Check (CC)
3.3.6. CC Remote Peer Auto-Discovery
3.3.7. ETH-CFM Grace Overview
3.3.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
3.3.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
3.3.8. CCM Hold Timers
3.3.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
3.3.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
3.3.11. ITU-T Y.1731 Test (ETH-TST)
3.3.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
3.3.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
3.3.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
3.3.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
3.3.15.1. ETH-LMM Single SAP Counter
3.3.15.2. ETH-LMM Per Forwarding Class Counter
3.3.15.3. Interaction Between Single and Per FC Counters
3.3.16. ETH-CFM Destination Options
3.3.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
3.4. ETH-CFM Statistics
3.5. ETH-CFM Packet Debug
3.6. ETH-CFM CoS Considerations
3.7. OAM Mapping
3.7.1. CFM Connectivity Fault Conditions
3.7.2. CFM Fault Propagation Methods
3.7.3. Epipe Services
3.7.4. CFM Detected Fault
3.7.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.7.4.2. Service Down
3.7.4.3. Interaction with Pseudowire Redundancy
3.7.5. Ipipe Services
3.7.5.1. CFM Detected Fault
3.7.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
3.7.5.3. Service Administratively Shutdown
3.7.5.4. Interaction with Pseudowire Redundancy
3.7.6. VPLS Service
3.7.6.1. CFM Detected Fault
3.7.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.7.6.3. Service Down
3.7.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.7.7. IES and VPRN Services
3.7.8. Pseudowire Switching
3.7.9. LLF and CFM Fault Propagation
3.7.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.8. Service Assurance Agent (SAA)
3.9. OAM Performance Monitoring (OAM-PM)
3.9.1. Session
3.9.2. Standard PM Packets
3.9.3. Detectable Transmit Errors
3.9.4. Measurement Intervals
3.9.5. Data Structures and Storage
3.9.6. Bin Groups
3.9.7. Relating the Components
3.9.8. IP Performance Monitoring
3.9.8.1. Accounting Policy Configuration
3.9.8.2. Service Configuration
3.9.8.3. OAM-PM Configuration
3.9.9. Ethernet Performance Monitoring
3.9.9.1. Accounting Policy Configuration
3.9.9.2. ETH-CFM Configuration
3.9.9.3. Service Configuration
3.9.9.4. Ethernet OAM-PM Configuration
3.9.10. OAM-PM Event Monitoring
3.10. Traceroute with ICMP Tunneling In Common Applications
3.10.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.10.2. VPRN Inter-AS Option B
3.10.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.11. Diagnostics Command Reference
3.11.1. Command Hierarchies
3.11.1.1. OAM Commands
3.11.1.1.1. Base Operational Commands
3.11.1.1.2. ATM Diagnostics
3.11.1.1.3. IGMP Snooping
3.11.1.1.4. LDP Diagnostics
3.11.1.1.5. LSP Diagnostics
3.11.1.1.6. SDP Diagnostics
3.11.1.1.7. Common Service Diagnostics
3.11.1.1.8. VLL Diagnostics
3.11.1.1.9. Ethernet in the First Mile (EFM) Commands
3.11.1.1.10. ETH-CFM OAM Commands
3.11.1.2. SAA Commands
3.11.1.3. OAM Performance Monitoring and Binning Commands
3.11.1.4. IP Performance Monitoring Commands
3.11.1.4.1. TWAMP
3.11.1.4.2. TWAMP Light
3.11.1.5. Show Commands
3.11.1.6. Clear Commands
3.11.1.7. Monitor Commands
3.11.1.8. Debug Commands
3.11.1.9. Tools Commands
3.11.2. Command Descriptions
3.11.2.1. OAM and SAA Commands
3.11.2.1.1. Generic Commands
3.11.2.1.2. OAM Commands
3.11.2.1.3. ATM Diagnostics
3.11.2.1.4. Service Diagnostics
3.11.2.1.5. VPLS MAC Diagnostics
3.11.2.1.6. IGMP Snooping Diagnostics
3.11.2.1.7. EFM Commands
3.11.2.1.8. ETH-CFM OAM Commands
3.11.2.1.9. Service Assurance Agent (SAA) Commands
3.11.2.1.10. OAM SAA Commands
3.11.2.1.11. OAM Performance Monitoring and Binning Commands
3.11.2.1.12. LDP Treetrace Commands
3.11.2.1.13. TWAMP Commands
3.11.2.1.14. TWAMP Light Commands
3.11.2.2. Show Commands
3.11.2.2.1. OAM Performance Monitoring and Binning Show Commands
3.11.2.3. Clear Commands
3.11.2.4. Monitor Commands
3.11.2.5. Debug Commands
3.11.2.6. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. Service Mirroring
2.2. Mirror Implementation
2.2.1. Mirror Source and Destinations
2.2.1.1. Local and Remote Mirroring
2.2.1.2. Slicing
2.2.2. Mirroring Performance
2.2.3. Mirroring Configuration
2.2.4. ATM Mirroring
2.2.5. IP Mirroring
2.2.5.1. Remote IP Mirroring
2.2.5.2. Local IP Mirroring
2.2.5.3. Port-ID Enabled PPP Mirroring
2.3. Mirrored Traffic Transport using MPLS-TP SDPs
2.4. Subscriber Mirroring
2.5. Packet Capture
2.6. Lawful Intercept
2.6.1. LI Activation Through RADIUS
2.6.2. Routable Lawful Intercept Encapsulation
2.7. Pseudowire Redundant Mirror Services
2.7.1. Redundant Mirror Source Notes
2.8. Lawful Intercept and NAT
2.8.1. Carrier Grade NAT
2.8.2. L2-Aware NAT
2.9. Configuration Process Overview
2.10. Configuration Notes
2.11. Configuring Service Mirroring with CLI
2.11.1. Mirror Configuration Overview
2.11.1.1. Defining Mirrored Traffic
2.11.2. Lawful Intercept Configuration Overview
2.11.2.1. Saving LI Data
2.11.2.2. Regulating LI Access
2.11.2.2.1. LI User Access
2.11.2.2.2. LI Source Configuration
2.11.2.3. Configurable Filter Lock for Lawful Intercept
2.11.2.4. LI MAC Filter Configuration
2.11.2.5. LI Logging
2.11.3. Basic Mirroring Configuration
2.11.3.1. Mirror Classification Rules
2.11.3.1.1. Port
2.11.3.1.2. SAP
2.11.3.1.3. MAC Filter
2.11.3.1.4. IP Filter
2.11.3.1.5. Ingress Label
2.11.3.1.6. Subscriber
2.11.4. Common Configuration Tasks
2.11.4.1. Configuring a Local Mirror Service
2.11.4.2. Configuring SDPs for Mirrors and LI
2.11.4.3. Configuring a Remote Mirror Service
2.11.4.4. Configuring an ATM Mirror Service
2.11.4.5. Configuring Lawful Intercept Parameters
2.11.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
2.12. Service Management Tasks
2.12.1. Modifying a Local Mirrored Service
2.12.2. Deleting a Local Mirrored Service
2.12.3. Modifying a Remote Mirrored Service
2.12.4. Deleting a Remote Mirrored Service
2.13. Mirror Service Configuration Command Reference
2.13.1. Command Hierarchies
2.13.1.1. Mirror Configuration Commands
2.13.1.2. IP Mirror Interface Commands
2.13.1.3. Lawful Intercept Commands
2.13.2. Command Descriptions
2.13.2.1. Generic Commands
2.13.2.2. Mirror Destination Configuration Commands
2.13.2.3. IP Mirror Interface Commands
2.13.2.4. Lawful Intercept Commands
2.13.2.4.1. Other LI Configuration Commands
2.14. Mirror Service Show and Debug Command Reference
2.14.1. Command Hierarchies
2.14.1.1. Show Commands
2.14.1.2. Clear Commands
2.14.1.3. Debug Commands
2.14.2. Command Descriptions
2.14.2.1. Show Commands
2.14.2.2. Clear Commands
2.14.2.3. Debug Commands
3. OAM, SAA, and OAM-PM
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.3. ECMP Considerations
3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.1.5. Downstream Detailed Mapping (DDMAP) TLV
3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.6.1. Responder Node Procedures
3.1.6.2. Sender Node Procedures
3.1.7. MPLS OAM Support in Segment Routing
3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
3.1.7.3. Operation on SR-TE LSP
3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
3.1.8. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.1.9. LDP ECMP Tree Building
3.1.10. Periodic Path Exercising
3.1.11. LSP Ping for RSVP P2MP LSP (P2MP)
3.1.12. LSP Trace for RSVP P2MP LSP
3.1.12.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.13. Tunneling of ICMP Reply Packets over MPLS LSP
3.1.14. QoS Handling of Tunneled ICMP Reply Packets
3.1.15. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.1.16. SDP Diagnostics
3.1.17. SDP Ping
3.1.18. SDP MTU Path Discovery
3.1.19. Service Diagnostics
3.1.20. VPLS MAC Diagnostics
3.1.21. MAC Ping
3.1.22. MAC Trace
3.1.23. CPE Ping
3.1.24. CPE Ping for PBB Epipe
3.1.24.1. Hardware Support
3.1.25. MAC Populate
3.1.26. MAC Purge
3.1.27. VLL Diagnostics
3.1.28. VCCV Ping
3.1.28.1. VCCV-Ping Application
3.1.28.2. VCCV Ping in a Multi-Segment Pseudowire
3.1.29. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.29.1. VCCV for Static Pseudowire Segments
3.1.29.2. Detailed VCCV-Trace Operation
3.1.29.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.29.3.1. Sending a VCCV Echo Request
3.1.29.3.2. Receiving an VCCV Echo Request
3.1.29.3.3. Receiving an VCCV Echo Reply
3.1.30. IGMP Snooping Diagnostics
3.1.31. MFIB Ping
3.1.32. ATM Diagnostics
3.1.33. MPLS-TP On-Demand OAM Commands
3.1.34. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.34.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.1.35. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.36. VxLAN Ping Supporting EVPN for VxLAN
3.1.37. Show Commands
3.1.38. BFD
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. Ethernet Connectivity Fault Management (ETH-CFM)
3.3.1. ETH-CFM Building Blocks
3.3.2. Loopback
3.3.3. Loopback Multicast
3.3.4. Linktrace
3.3.5. Continuity Check (CC)
3.3.6. CC Remote Peer Auto-Discovery
3.3.7. ETH-CFM Grace Overview
3.3.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
3.3.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
3.3.8. CCM Hold Timers
3.3.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
3.3.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
3.3.11. ITU-T Y.1731 Test (ETH-TST)
3.3.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
3.3.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
3.3.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
3.3.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
3.3.15.1. ETH-LMM Single SAP Counter
3.3.15.2. ETH-LMM Per Forwarding Class Counter
3.3.15.3. Interaction Between Single and Per FC Counters
3.3.16. ETH-CFM Destination Options
3.3.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
3.4. ETH-CFM Statistics
3.5. ETH-CFM Packet Debug
3.6. ETH-CFM CoS Considerations
3.7. OAM Mapping
3.7.1. CFM Connectivity Fault Conditions
3.7.2. CFM Fault Propagation Methods
3.7.3. Epipe Services
3.7.4. CFM Detected Fault
3.7.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.7.4.2. Service Down
3.7.4.3. Interaction with Pseudowire Redundancy
3.7.5. Ipipe Services
3.7.5.1. CFM Detected Fault
3.7.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
3.7.5.3. Service Administratively Shutdown
3.7.5.4. Interaction with Pseudowire Redundancy
3.7.6. VPLS Service
3.7.6.1. CFM Detected Fault
3.7.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.7.6.3. Service Down
3.7.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.7.7. IES and VPRN Services
3.7.8. Pseudowire Switching
3.7.9. LLF and CFM Fault Propagation
3.7.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.8. Service Assurance Agent (SAA)
3.9. OAM Performance Monitoring (OAM-PM)
3.9.1. Session
3.9.2. Standard PM Packets
3.9.3. Detectable Transmit Errors
3.9.4. Measurement Intervals
3.9.5. Data Structures and Storage
3.9.6. Bin Groups
3.9.7. Relating the Components
3.9.8. IP Performance Monitoring
3.9.8.1. Accounting Policy Configuration
3.9.8.2. Service Configuration
3.9.8.3. OAM-PM Configuration
3.9.9. Ethernet Performance Monitoring
3.9.9.1. Accounting Policy Configuration
3.9.9.2. ETH-CFM Configuration
3.9.9.3. Service Configuration
3.9.9.4. Ethernet OAM-PM Configuration
3.9.10. OAM-PM Event Monitoring
3.10. Traceroute with ICMP Tunneling In Common Applications
3.10.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.10.2. VPRN Inter-AS Option B
3.10.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.11. Diagnostics Command Reference
3.11.1. Command Hierarchies
3.11.1.1. OAM Commands
3.11.1.1.1. Base Operational Commands
3.11.1.1.2. ATM Diagnostics
3.11.1.1.3. IGMP Snooping
3.11.1.1.4. LDP Diagnostics
3.11.1.1.5. LSP Diagnostics
3.11.1.1.6. SDP Diagnostics
3.11.1.1.7. Common Service Diagnostics
3.11.1.1.8. VLL Diagnostics
3.11.1.1.9. Ethernet in the First Mile (EFM) Commands
3.11.1.1.10. ETH-CFM OAM Commands
3.11.1.2. SAA Commands
3.11.1.3. OAM Performance Monitoring and Binning Commands
3.11.1.4. IP Performance Monitoring Commands
3.11.1.4.1. TWAMP
3.11.1.4.2. TWAMP Light
3.11.1.5. Show Commands
3.11.1.6. Clear Commands
3.11.1.7. Monitor Commands
3.11.1.8. Debug Commands
3.11.1.9. Tools Commands
3.11.2. Command Descriptions
3.11.2.1. OAM and SAA Commands
3.11.2.1.1. Generic Commands
3.11.2.1.2. OAM Commands
3.11.2.1.3. ATM Diagnostics
3.11.2.1.4. Service Diagnostics
3.11.2.1.5. VPLS MAC Diagnostics
3.11.2.1.6. IGMP Snooping Diagnostics
3.11.2.1.7. EFM Commands
3.11.2.1.8. ETH-CFM OAM Commands
3.11.2.1.9. Service Assurance Agent (SAA) Commands
3.11.2.1.10. OAM SAA Commands
3.11.2.1.11. OAM Performance Monitoring and Binning Commands
3.11.2.1.12. LDP Treetrace Commands
3.11.2.1.13. TWAMP Commands
3.11.2.1.14. TWAMP Light Commands
3.11.2.2. Show Commands
3.11.2.2.1. OAM Performance Monitoring and Binning Show Commands
3.11.2.3. Clear Commands
3.11.2.4. Monitor Commands
3.11.2.5. Debug Commands
3.11.2.6. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
Quality of Service Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2. QoS Policies
2.1. QoS Overview
2.2. Forwarding Classes
2.2.1. High-Priority Classes
2.2.2. Assured Classes
2.2.3. Best-Effort Classes
2.3. Queue Parameters
2.3.1. Queue ID
2.3.2. Unicast or Multipoint Queue
2.3.3. Queue Hardware Scheduler
2.3.4. Committed Information Rate
2.3.5. Peak Information Rate
2.3.6. Adaptation Rule
2.3.7. Committed Burst Size
2.3.8. Maximum Burst Size
2.3.9. Queue Drop Tails
2.3.10. WRED Per Queue
2.3.10.1. Native Queue Mode
2.3.10.2. Pool Per Queue Mode
2.3.11. Packet Markings
2.3.12. Queue Counters
2.3.13. Queue Types
2.3.14. Color Aware Profiling
2.4. QoS Policies Overview
2.4.1. Service versus Network QoS
2.4.2. QoS Policy Entities
2.4.3. Network QoS Policies
2.4.4. Network Queue QoS Policies
2.4.5. Service Ingress QoS Policies
2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.4.5.2. Egress Forwarding Class Override
2.4.6. Service Egress QoS Policies
2.4.7. Named Pool Policies
2.4.8. Slope Policies
2.4.8.1. RED Slopes
2.4.8.2. Tuning the SBAU Calculation
2.4.8.3. Slope Policy Parameters
2.4.9. Scheduler Policies
2.4.9.1. Virtual Hierarchical Scheduling
2.4.9.2. Single-Tier Scheduling
2.4.9.3. Hierarchical Scheduler Policies
2.4.9.3.1. Hierarchical Virtual Schedulers
2.4.9.4. Tiers
2.4.9.5. Scheduler Policies Applied to Applications
2.4.9.6. Scheduler Policies Applied to SAPs
2.4.9.7. Scheduler Policies Applied to Customer SLAs
2.4.9.8. Scheduler Policies Applied to Multiservice Sites
2.4.10. ATM Traffic Descriptor Profiles
2.4.11. Configuration Notes
3. Network QoS Policies
3.1. Network QoS Policies Overview
3.1.1. Storing Match-Criteria Entries
3.1.1.1. FP4-based Cards
3.2. Network Ingress
3.2.1. Network Ingress Tunnel QoS Override
3.2.2. Network Ingress IP Match Criteria
3.2.3. Network Ingress IPv6 Match Criteria
3.3. Network Egress
3.3.1. Egress Packet Reclassification Based on IP precedence DSCP
3.3.2. Network Egress IP Match Criteria
3.3.3. Network Egress IPv6 Match Criteria
3.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
3.4.1. Default DSCP Mapping Table
3.5. Basic Configurations
3.5.1. Creating a Network QoS Policy
3.5.2. Applying Network QoS Policies
3.5.3. Default Network QoS Policy Values
3.6. Service Management Tasks
3.6.1. Deleting QoS Policies
3.6.2. Removing a Policy from the QoS Configuration
3.6.3. Copying and Overwriting Network Policies
3.6.4. Editing QoS Policies
3.7. Network QoS Policy Command Reference
3.7.1. Command Hierarchies
3.7.1.1. Configuration Commands
3.7.1.1.1. Multi-Class Frame Relay Profile Commands
3.7.1.1.2. Network QoS Policy Commands
3.7.1.1.3. Model-Driven Automatic ID Commands
3.7.1.2. Self-Generated Traffic Commands
3.7.1.3. Operational Commands
3.7.1.4. Show Commands
3.7.1.5. Debug Commands
3.7.2. Command Descriptions
3.7.2.1. Configuration Commands
3.7.2.1.1. Generic Commands
3.7.2.1.2. Multi-Class Frame Relay Profile Commands
3.7.2.1.3. Network QoS Policy Commands
3.7.2.1.4. Model-Driven Automatic ID Commands
3.7.2.2. Self-Generated Traffic Commands
3.7.2.3. Operational Commands
3.7.2.4. Show Commands
4. Network Queue QoS Policies
4.1. Overview
4.2. Network Queue Parent Scheduler
4.3. Basic Configurations
4.3.1. Creating a Network Queue QoS Policy
4.3.2. Applying Network Queue QoS Policies
4.3.2.1. XMAs and MDAs
4.3.2.2. Ethernet Ports
4.3.2.3. SONET/SDH Ports
4.3.3. Default Network Queue Policy Values
4.4. Service Management Tasks
4.4.1. Deleting QoS Policies
4.4.2. Removing a Policy from the QoS Configuration
4.4.3. Copying and Overwriting QoS Policies
4.4.4. Editing QoS Policies
4.5. Network Queue QoS Policy Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Configuration Commands
4.5.1.2. Operational Commands
4.5.1.3. Show Commands
4.5.2. Command Descriptions
4.5.2.1. Configuration Commands
4.5.2.1.1. Generic Commands
4.5.2.1.2. Network Queue QoS Policy Commands
4.5.2.2. Operational Commands
4.5.2.3. Show Commands
5. Service Ingress and Egress QoS Policies
5.1. Overview
5.2. Basic Configurations
5.3. Service Ingress QoS Policy
5.3.1. Service Ingress QoS Queue
5.3.2. Percent-Rate Support
5.3.3. Ingress Forwarding Class (FC)
5.3.4. Ingress IP Match Criteria
5.3.5. Ingress IPv6 Match Criteria
5.3.6. Ingress MAC Match Criteria
5.3.6.1. VLAN ID Matching
5.3.7. Ingress Criteria Classification Directly to Policer
5.3.8. Virtual Network Identifier (VNI) Classification
5.3.9. FC Mapping Based on EXP Bits
5.3.10. Storing Match Criteria Entries
5.3.10.1. FP4-based Cards
5.4. Service Egress QoS Policy
5.4.1. Service Egress QoS Queue
5.4.2. Percent-Rate Support
5.4.3. Dynamic MBS for Egress Queue Group Queues
5.4.3.1. Queue Length as a Delay Value
5.4.4. Egress SAP FC and FP Overrides
5.4.5. Egress Criteria Classification Directly to Policer
5.4.6. Storing Match Criteria Entries
5.4.6.1. FP4-based Cards
5.4.7. Dot1p Egress Remarking
5.4.7.1. DEI Egress Remarking
5.4.7.1.1. DEI in IEEE 802.1ad
5.4.7.1.2. DEI in IEEE 802.1ah
5.4.7.1.3. IEEE 802.1ad Use Case
5.4.7.1.4. IEEE 802.1ah Use Case
5.4.8. DSCP and IP Precedence Egress Remarking
5.4.9. Queue Depth Monitoring
5.5. Service Management Tasks
5.5.1. Applying Service Ingress and Egress Policies
5.5.1.1. Epipe
5.5.1.2. IES
5.5.1.3. VPLS
5.5.1.4. VPRN
5.5.2. Editing QoS Policies
5.5.3. Copying and Overwriting QoS Policies
5.5.4. Deleting QoS Policies
5.5.5. Removing a Policy from the QoS Configuration
5.6. Service Ingress and Egress QoS Policy Command Reference
5.6.1. Command Hierarchies
5.6.1.1. Service Ingress QoS Policy Commands
5.6.1.2. Service Egress QoS Policy Commands
5.6.1.3. Model-Driven Automatic ID Commands
5.6.1.4. Operational Commands
5.6.1.5. Show Commands
5.6.1.6. Debug Commands
5.6.2. Command Descriptions
5.6.2.1. Configuration Commands
5.6.2.1.1. Generic Commands
5.6.2.2. Operational Commands
5.6.2.2.1. Service Ingress QoS Policy Commands
5.6.2.2.2. Service Egress QoS Policy Forwarding Class Commands
5.6.2.3. Show Commands
5.6.2.4. Debug Commands
6. Queue Sharing and Redirection
6.1. Queue Sharing and Redirection
6.1.1. Supported Platforms
6.2. Queue Group Applications
6.2.1. Access SAP Queue Group Applications
6.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
6.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
6.2.2. Network Port Queue Groups for IP Interfaces
6.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
6.2.4. QoS on Ingress Bindings
6.2.5. VXLAN VNI Queue Group Redirection
6.2.5.1. Queue Group Redirect List
6.2.5.2. Queue Group Redirect List Example
6.3. Queue Group Templates
6.4. Port Queue Groups
6.4.1. Percent-Rate Support
6.5. Forwarding Plane Queue Groups
6.6. Redirection Models
6.7. Access SAP Forwarding Class-Based Redirection
6.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
6.7.1.1. Policy Based Provisioning Model
6.7.1.2. SAP-Based Provisioning Model
6.7.2. Access Queue Group Statistics
6.7.2.1. Port Queue Groups
6.7.2.2. Forwarding Plane Queue Groups
6.8. Network IP Interface Forwarding Class-Based Redirection
6.8.1. Egress Network Forwarding Class Redirection Association Rules
6.8.2. Egress Network IP Interface Statistics
6.9. PW Shaping
6.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.9.1.1. Feature Configuration
6.9.1.2. Provisioning Model
6.9.1.3. Ingress Packet Classification
6.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
6.9.2.1. Feature Configuration
6.9.2.2. Provisioning Model
6.9.2.3. Egress Marking of PW Packet Header
6.9.2.4. Ingress and Egress PW Statistics
6.10. Queue Group Behavior on LAG
6.10.1. Queue Group Queue Instantiation Per Link
6.10.2. Per-Link Queue Group Queue Parameters
6.10.3. Adding a Queue Group to an Existing LAG
6.10.4. Adding a Port to a LAG
6.10.5. Removing a Queue Group from a LAG
6.11. Basic Configurations
6.11.1. Configuring an Ingress Queue Group Template
6.11.2. Configuring Egress Queue Group Template
6.11.3. Applying Ingress Queue Group to SAP Ingress Policy
6.11.4. Applying Egress Queue Group to SAP Egress Policy
6.11.5. Configuring SAP-based Egress Queue Redirection
6.11.6. Configuring Queue Group on Ethernet Access Ingress Port
6.11.7. Configuring Overrides
6.11.8. Configuring Queue Group on Ethernet Access Egress Port
6.11.9. Configuring Queue Group for Network Egress Traffic on Port
6.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
6.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
6.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.11.13. Specifying QoS Policies on Service SAPs
6.12. QoS Queue Group Template Command Reference
6.12.1. Command Hierarchies
6.12.1.1. Configuring Ingress Queue Group Templates
6.12.1.2. Configuring Egress Queue Group Templates
6.12.1.3. Configuring VXLAN VNI Queue Group Redirection
6.12.1.4. Show Commands
6.12.1.5. Monitor Commands
6.12.2. Command Descriptions
6.12.2.1. Configuration Commands
6.12.2.1.1. Generic Commands
6.12.2.1.2. Queue Group Commands
6.12.2.2. Show Commands
6.12.2.3. Monitor Commands
7. Scheduler QoS Policies
7.1. Scheduler Policies
7.1.1. Egress Port-Based Schedulers
7.1.1.1. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
7.1.1.2. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
7.1.1.2.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
7.1.1.3. Frame and Packet-Based Bandwidth Allocation
7.1.1.4. Parental Association Scope
7.1.1.5. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
7.1.1.6. Network Queue Parent Scheduler
7.1.1.7. Foster Parent Behavior for Orphaned Queues and Schedulers
7.1.1.8. Congestion Monitoring on Egress Port Scheduler
7.1.1.8.1. Scalability, Performance, and Operation
7.1.1.8.2. Restrictions
7.1.2. Frame-Based Accounting
7.1.2.1. Operational Modifications
7.1.2.2. Existing Egress Port-Based Virtual Scheduling
7.1.2.3. Behavior Modifications for Frame-Based Accounting
7.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
7.1.3. Virtual Scheduling Unused Bandwidth Distribution
7.1.3.1. Default Unused Bandwidth Distribution
7.1.3.2. Limit Unused Bandwidth
7.1.4. Configuring Port Scheduler Policies
7.1.4.1. Port Scheduler Structure
7.1.4.2. Special Orphan Queue and Scheduler Behavior
7.1.4.3. Packet to Frame Bandwidth Conversion
7.1.4.4. Aggregate Rate Limits for Directly Attached Queues
7.1.4.5. SAP Egress QoS Policy Queue Parenting
7.1.4.6. Network Queue QoS Policy Queue Parenting
7.1.4.7. Egress Port Scheduler Overrides
7.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
7.1.4.9. Applying Aggregate Rate Limit to a Vport
7.1.4.10. Applying a Scheduler Policy to a Vport
7.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
7.2. Basic Configurations
7.2.1. Creating a QoS Scheduler Policy
7.2.2. Applying Scheduler Policies
7.2.2.1. Customer
7.2.2.2. Epipe
7.2.2.3. IES
7.2.2.4. VPLS
7.2.2.5. VPRN
7.2.3. Creating a QoS Port Scheduler Policy
7.2.4. Configuring Port Parent Parameters
7.2.4.1. Within-CIR Priority Level Parameters
7.2.4.2. Above-CIR Priority Level Parameters
7.2.5. Configuring Distributed LAG Rate
7.3. Service Management Tasks
7.3.1. Deleting QoS Policies
7.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
7.3.1.2. Removing a QoS Policy from SAP(s)
7.3.1.3. Removing a Policy from the QoS Configuration
7.3.2. Copying and Overwriting Scheduler Policies
7.3.3. Editing QoS Policies
7.4. QoS Scheduler Policy Command Reference
7.4.1. Command Hierarchies
7.4.1.1. Scheduler Policy Configuration Commands
7.4.1.2. Port Scheduler Policy Configuration Commands
7.4.1.3. Operational Commands
7.4.1.4. Show Commands
7.4.1.5. Clear Commands
7.4.2. Command Descriptions
7.4.2.1. Configuration Commands
7.4.2.1.1. Generic Commands
7.4.2.2. Operational Commands
7.4.2.3. Scheduler Policy Commands
7.4.2.4. Port Scheduler Policy Commands
7.4.2.5. Show Commands
7.4.2.6. Clear Commands
8. Slope QoS Policies
8.1. Overview
8.2. Basic Configurations
8.2.1. Creating a Slope QoS Policy
8.2.2. Applying Slope Policies
8.2.2.1. Ports
8.2.2.2. FP
8.2.3. Default Slope Policy Values
8.3. Service Management Tasks
8.3.1. Deleting QoS Policies
8.3.1.1. Ports
8.3.1.2. FP
8.3.1.3. Removing a Policy from the QoS Configuration
8.3.2. Copying and Overwriting QoS Policies
8.3.3. Editing QoS Policies
8.4. Slope QoS Policy Command Reference
8.4.1. Command Hierarchies
8.4.1.1. Configuration Commands
8.4.1.2. Operational Commands
8.4.1.3. Show Commands
8.4.2. Command Descriptions
8.4.2.1. Configuration Commands
8.4.2.1.1. Generic Commands
8.4.2.2. Operational Commands
8.4.2.2.1. Slope Policy QoS Commands
8.4.2.2.2. Slope Policy QoS Policy Commands
8.4.2.2.3. RED Slope Commands
8.4.2.3. Show Commands
9. Shared-Queue QoS Policies
9.1. Overview
9.2. Multipoint Shared Queuing
9.2.1. Ingress Queuing Modes of Operation
9.2.2. Ingress Service Queuing
9.2.2.1. Ingress Shared Queuing
9.2.2.2. Ingress Multipoint Shared Queuing
9.3. Basic Configurations
9.3.1. Modifying the Default Shared-Queue Policy
9.3.1.1. Applying Shared-Queue Policies
9.3.1.1.1. Epipe Services
9.3.1.1.2. IES Services
9.3.1.1.3. VPLS Services
9.3.1.1.4. VPRN Services
9.3.2. Default Shared Queue Policy Values
9.4. Shared-Queue QoS Policy Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Configuration Commands
9.4.1.2. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Configuration Commands
9.4.2.1.1. Generic Commands
9.4.2.1.2. Shared Queue QoS Commands
9.4.2.2. Show Commands
10. Advanced QoS Policies
10.1. Overview
10.2. Basic Configurations
10.2.1. Creating an Advanced QoS Policy
10.2.2. Applying Advanced Policies
10.2.2.1. Queue Group
10.2.2.2. SAP Ingress
10.2.2.3. SAP Egress
10.2.3. Default Advanced Policy Values
10.3. Service Management Tasks
10.3.1. Deleting QoS Policies
10.3.1.1. Queue Group
10.3.1.2. SAP Ingress
10.3.1.3. SAP Egress
10.3.2. Copying and Overwriting Advanced Policies
10.3.3. Editing Advanced Policies
10.4. Advanced QoS Policy Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Configuration Commands
10.4.1.2. Operational Commands
10.4.1.3. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Configuration Commands
10.4.2.1.1. Generic Commands
10.4.2.2. Operational Commands
10.4.2.2.1. Advanced Policy QoS Commands
10.4.2.3. Show Commands
11. QoS ATM Traffic Descriptor Profiles
11.1. ATM Traffic Management
11.2. QoS Model for ATM-Based Services
11.3. ATM Service Categories
11.4. ATM Traffic Descriptors and QoS Parameters
11.5. Policing
11.6. Shaping
11.7. ATM Queuing and Scheduling
11.8. Congestion Avoidance
11.9. Basic Configurations
11.9.1. Creating an ATM-TD-Profile QoS Policy
11.9.2. Applying ATM-TD-Profile Policies
11.9.2.1. ATM VLL (Apipe) SAPs
11.9.2.2. Epipe SAPs
11.9.2.3. IES SAPs
11.9.2.4. Ipipe SAPs
11.9.2.5. VPRN SAPs
11.9.2.6. VPLS SAPs
11.9.3. Default ATM-TD-Profile Policy Values
11.10. Service Management Tasks
11.10.1. Removing a Profile from the QoS Configuration
11.10.2. Copying and Overwriting Profiles
11.10.3. Editing QoS Policies
11.11. ATM QoS Policy Command Reference
11.11.1. Command Hierarchies
11.11.1.1. Configuration Commands
11.11.1.2. Operational Commands
11.11.1.3. Show Commands
11.11.2. Command Descriptions
11.11.2.1. Configuration Commands
11.11.2.1.1. Generic Commands
11.11.2.1.2. Operational Commands
11.11.2.1.3. ATM QoS Policy Commands
11.11.2.1.4. Show Commands
12. Named Pools
12.1. Overview
12.2. Named Pool Mode for IOM3-XP Card
12.3. Basic Configurations
12.3.1. Creating a Named Pool QoS Policy
12.3.1.1. Named Pool Configuration Procedure
12.3.2. Allocation Steps
12.4. Named Pools QoS Policy Command Reference
12.4.1. Command Hierarchies
12.4.1.1. Configuration Commands
12.4.1.2. Show Commands
12.4.2. Command Descriptions
12.4.2.1. Configuration Commands
12.4.2.1.1. Generic Commands
12.4.2.2. Named Pool Policy Creation
12.4.2.3. Show Commands
12.4.2.3.1. Named Pool Show Commands
13. High Scale Ethernet MDA Capabilities
13.1. HSMDA QoS Model
13.1.1. Queue Scaling
13.1.2. Port-Based Scheduling
13.1.3. Dual Pass Queuing
13.1.4. Egress Intermediate Destination Secondary Shapers
13.1.5. Packet and Octet Counting
13.1.6. Above-CIR Discard with PIR Bypass
13.1.6.1. HSMDA Ingress Queue Policing Mode
13.1.7. HSMDA Buffer Utilization Controls
13.1.7.1. HSMDA Buffer Pools
13.1.7.2. Identifying Queue Groups as Provisioned or System
13.1.7.3. Provisioned and System Port Class Pools
13.1.7.4. Aggregate Pools for Type and Class Separation
13.1.7.5. Use of Aggregate Control Buffer Pools
13.1.7.6. HSMDA Buffer Pool Policy
13.1.7.6.1. Default HSMDA Buffer Pool Policy
13.1.7.7. Port Class Pool Sizing
13.1.7.8. HSMDA Available Buffer Register Operation
13.1.8. HSMDA Queue Congestion and Buffer Utilization Controls
13.1.8.1. Maximum HSMDA Queue Depth
13.1.8.2. Control Plane HSMDA RED Slope Policy Management
13.1.8.3. HSMDA Slope Policy MBS Parameter
13.1.8.4. HSMDA Slope Policy Slope Parameters
13.1.8.5. HSMDA Slope Shutdown Behavior
13.1.8.6. Ingress Packet Mapping to HSMDA RED Slope
13.1.8.7. Egress Packet Mapping to HSMDA RED Slope
13.1.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
13.1.9. Egress Queue CIR-Based Dot1p Remarking
13.2. SAP Ingress and SAP Egress QoS Policies
13.2.1. SAP Ingress QoS Policy
13.2.2. SAP Egress QoS Policy
13.3. Subscriber Queuing Differences
13.4. Basic HSMDA Configurations
13.4.1. HSMDA Pool Policies
13.4.2. HSMDA Scheduler Policies
13.4.3. HSMDA Slope Policies
13.4.4. Egress Queue Group
13.4.5. Configuring HSMDA Queue Group Overrides
13.5. Applying HSMDA Policies
13.6. HSMDA Features
13.6.1. HSMDA LAG
13.6.2. Billing
13.6.3. Resource Management
13.6.4. HSMDA Queue Groups
13.6.4.1. Scheduling Classes
13.6.4.2. Scheduling Class Weighted Groups
13.6.4.3. Scheduler Strict Priority Levels
13.6.4.4. Strict Priority Level PIR
13.6.4.5. Scheduler Maximum Rate
13.6.4.6. HSMDA Scheduler Policy Overrides
13.6.4.7. Orphan Queues
13.6.4.8. Default HSMDA Scheduling Policy
13.7. HSMDA Command Reference
13.7.1. Command Hierarchies
13.7.1.1. Show Commands
13.7.2. Command Descriptions
13.7.2.1. Configuration Commands
13.7.2.1.1. Generic Commands
13.7.2.1.2. HSMDA Pool QoS Policy Commands
13.7.2.1.3. HSMDA Scheduler QoS Policy Commands
13.7.2.1.4. HSMDA Slope QoS Policy Commands
13.7.2.1.5. HSMDA WRR QoS Policy Commands
13.7.2.1.6. Show QoS HSMDA Commands
14. QoS in MC-MLPPP
14.1. Overview
14.2. Ingress MLPPP Class Reassembly
14.3. Basic Configurations
14.3.1. Configuring MC-MLPPP
14.3.2. Configuring MC-MLPPP QoS Parameters
14.4. QoS in MLFR and FRF.12 Fragmentation
14.4.1. QoS in MLFR
14.4.2. QoS in FRF.12 End-to-End Fragmentation
14.5. MLPPP Command Reference
14.5.1. Command Hierarchies
14.5.1.1. Configuration Commands
14.5.2. Command Descriptions
14.5.2.1. Configuration Commands
14.5.2.1.1. MC-MLPPP Commands
15. Class Fair Hierarchical Policing (CFHP)
15.1. Overview
15.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
15.3. CFHP Ingress and Egress Use Cases
15.4. Post-CFHP Queuing and Scheduling
15.4.1. Ingress CFHP Queuing
15.4.2. Egress CFHP Queuing
15.4.2.1. Policer to Local Queue Mapping
15.4.3. Egress Subscriber CFHP Queuing
15.4.3.1. Subscriber Destination String Queue Group Identification
15.4.4. SAP Default Destination String
15.5. CFHP Policer Control Policy
15.5.1. Policer Control Policy Root Arbiter
15.5.2. Tier 1 and Tier 2 Explicit Arbiters
15.5.3. Explicit Arbiter Rate Limits
15.5.4. CFHP with Child Policer Exceed PIR Enabled
15.6. CFHP Child Policer Definition and Creation
15.7. Policer Enabled SAP QoS Policy Applicability
15.8. Child Policer Parent Association
15.9. Profile-Capped Policers
15.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
15.10.1. Ingress ‘Undefined’ Initial Profile
15.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
15.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
15.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
15.10.5. Egress Explicit Profile Reclassification
15.10.6. Preserving Out of Profile State at Egress Policer
15.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
15.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
15.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
15.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
15.10.11. Ingress Child Policer Stat-Mode
15.10.12. Egress Child Policer Stat-Mode
15.11. Profile-Preferred Mode Root Policers
15.12. Child Policer Hierarchical QoS Parenting
15.13. Class Fair Hierarchical Policing (CFHP) Policy Command Reference
15.13.1. Command Hierarchies
15.13.1.1. Class Fair Hierarchical Policing Commands
15.13.1.2. Operational Commands
15.13.1.3. Show Commands
15.13.2. Command Descriptions
15.13.2.1. Configuration Commands
15.13.2.1.1. Generic Commands
15.13.2.1.2. Class Fair Hierarchical Policing Commands
15.13.2.1.3. Operational Commands
15.13.2.1.4. Show Commands
16. Frequently Used QoS Terms
16.1. Overview
16.2. Above-CIR Distribution
16.3. Available Bandwidth
16.4. CBS
16.5. CIR
16.6. CIR Level
16.7. CIR Weight
16.8. Child
16.9. Level
16.10. MBS
16.11. Offered Load
16.12. Orphan
16.13. Parent
16.14. Queue
16.15. Rate
16.16. Root (Scheduler)
16.17. Scheduler Policy
16.18. Tier
16.19. Virtual Scheduler
16.20. Weight
16.21. Within-CIR Distribution
17. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2. QoS Policies
2.1. QoS Overview
2.2. Forwarding Classes
2.2.1. High-Priority Classes
2.2.2. Assured Classes
2.2.3. Best-Effort Classes
2.3. Queue Parameters
2.3.1. Queue ID
2.3.2. Unicast or Multipoint Queue
2.3.3. Queue Hardware Scheduler
2.3.4. Committed Information Rate
2.3.5. Peak Information Rate
2.3.6. Adaptation Rule
2.3.7. Committed Burst Size
2.3.8. Maximum Burst Size
2.3.9. Queue Drop Tails
2.3.10. WRED Per Queue
2.3.10.1. Native Queue Mode
2.3.10.2. Pool Per Queue Mode
2.3.11. Packet Markings
2.3.12. Queue Counters
2.3.13. Queue Types
2.3.14. Color Aware Profiling
2.4. QoS Policies Overview
2.4.1. Service versus Network QoS
2.4.2. QoS Policy Entities
2.4.3. Network QoS Policies
2.4.4. Network Queue QoS Policies
2.4.5. Service Ingress QoS Policies
2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.4.5.2. Egress Forwarding Class Override
2.4.6. Service Egress QoS Policies
2.4.7. Named Pool Policies
2.4.8. Slope Policies
2.4.8.1. RED Slopes
2.4.8.2. Tuning the SBAU Calculation
2.4.8.3. Slope Policy Parameters
2.4.9. Scheduler Policies
2.4.9.1. Virtual Hierarchical Scheduling
2.4.9.2. Single-Tier Scheduling
2.4.9.3. Hierarchical Scheduler Policies
2.4.9.3.1. Hierarchical Virtual Schedulers
2.4.9.4. Tiers
2.4.9.5. Scheduler Policies Applied to Applications
2.4.9.6. Scheduler Policies Applied to SAPs
2.4.9.7. Scheduler Policies Applied to Customer SLAs
2.4.9.8. Scheduler Policies Applied to Multiservice Sites
2.4.10. ATM Traffic Descriptor Profiles
2.4.11. Configuration Notes
3. Network QoS Policies
3.1. Network QoS Policies Overview
3.1.1. Storing Match-Criteria Entries
3.1.1.1. FP4-based Cards
3.2. Network Ingress
3.2.1. Network Ingress Tunnel QoS Override
3.2.2. Network Ingress IP Match Criteria
3.2.3. Network Ingress IPv6 Match Criteria
3.3. Network Egress
3.3.1. Egress Packet Reclassification Based on IP precedence DSCP
3.3.2. Network Egress IP Match Criteria
3.3.3. Network Egress IPv6 Match Criteria
3.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
3.4.1. Default DSCP Mapping Table
3.5. Basic Configurations
3.5.1. Creating a Network QoS Policy
3.5.2. Applying Network QoS Policies
3.5.3. Default Network QoS Policy Values
3.6. Service Management Tasks
3.6.1. Deleting QoS Policies
3.6.2. Removing a Policy from the QoS Configuration
3.6.3. Copying and Overwriting Network Policies
3.6.4. Editing QoS Policies
3.7. Network QoS Policy Command Reference
3.7.1. Command Hierarchies
3.7.1.1. Configuration Commands
3.7.1.1.1. Multi-Class Frame Relay Profile Commands
3.7.1.1.2. Network QoS Policy Commands
3.7.1.1.3. Model-Driven Automatic ID Commands
3.7.1.2. Self-Generated Traffic Commands
3.7.1.3. Operational Commands
3.7.1.4. Show Commands
3.7.1.5. Debug Commands
3.7.2. Command Descriptions
3.7.2.1. Configuration Commands
3.7.2.1.1. Generic Commands
3.7.2.1.2. Multi-Class Frame Relay Profile Commands
3.7.2.1.3. Network QoS Policy Commands
3.7.2.1.4. Model-Driven Automatic ID Commands
3.7.2.2. Self-Generated Traffic Commands
3.7.2.3. Operational Commands
3.7.2.4. Show Commands
4. Network Queue QoS Policies
4.1. Overview
4.2. Network Queue Parent Scheduler
4.3. Basic Configurations
4.3.1. Creating a Network Queue QoS Policy
4.3.2. Applying Network Queue QoS Policies
4.3.2.1. XMAs and MDAs
4.3.2.2. Ethernet Ports
4.3.2.3. SONET/SDH Ports
4.3.3. Default Network Queue Policy Values
4.4. Service Management Tasks
4.4.1. Deleting QoS Policies
4.4.2. Removing a Policy from the QoS Configuration
4.4.3. Copying and Overwriting QoS Policies
4.4.4. Editing QoS Policies
4.5. Network Queue QoS Policy Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Configuration Commands
4.5.1.2. Operational Commands
4.5.1.3. Show Commands
4.5.2. Command Descriptions
4.5.2.1. Configuration Commands
4.5.2.1.1. Generic Commands
4.5.2.1.2. Network Queue QoS Policy Commands
4.5.2.2. Operational Commands
4.5.2.3. Show Commands
5. Service Ingress and Egress QoS Policies
5.1. Overview
5.2. Basic Configurations
5.3. Service Ingress QoS Policy
5.3.1. Service Ingress QoS Queue
5.3.2. Percent-Rate Support
5.3.3. Ingress Forwarding Class (FC)
5.3.4. Ingress IP Match Criteria
5.3.5. Ingress IPv6 Match Criteria
5.3.6. Ingress MAC Match Criteria
5.3.6.1. VLAN ID Matching
5.3.7. Ingress Criteria Classification Directly to Policer
5.3.8. Virtual Network Identifier (VNI) Classification
5.3.9. FC Mapping Based on EXP Bits
5.3.10. Storing Match Criteria Entries
5.3.10.1. FP4-based Cards
5.4. Service Egress QoS Policy
5.4.1. Service Egress QoS Queue
5.4.2. Percent-Rate Support
5.4.3. Dynamic MBS for Egress Queue Group Queues
5.4.3.1. Queue Length as a Delay Value
5.4.4. Egress SAP FC and FP Overrides
5.4.5. Egress Criteria Classification Directly to Policer
5.4.6. Storing Match Criteria Entries
5.4.6.1. FP4-based Cards
5.4.7. Dot1p Egress Remarking
5.4.7.1. DEI Egress Remarking
5.4.7.1.1. DEI in IEEE 802.1ad
5.4.7.1.2. DEI in IEEE 802.1ah
5.4.7.1.3. IEEE 802.1ad Use Case
5.4.7.1.4. IEEE 802.1ah Use Case
5.4.8. DSCP and IP Precedence Egress Remarking
5.4.9. Queue Depth Monitoring
5.5. Service Management Tasks
5.5.1. Applying Service Ingress and Egress Policies
5.5.1.1. Epipe
5.5.1.2. IES
5.5.1.3. VPLS
5.5.1.4. VPRN
5.5.2. Editing QoS Policies
5.5.3. Copying and Overwriting QoS Policies
5.5.4. Deleting QoS Policies
5.5.5. Removing a Policy from the QoS Configuration
5.6. Service Ingress and Egress QoS Policy Command Reference
5.6.1. Command Hierarchies
5.6.1.1. Service Ingress QoS Policy Commands
5.6.1.2. Service Egress QoS Policy Commands
5.6.1.3. Model-Driven Automatic ID Commands
5.6.1.4. Operational Commands
5.6.1.5. Show Commands
5.6.1.6. Debug Commands
5.6.2. Command Descriptions
5.6.2.1. Configuration Commands
5.6.2.1.1. Generic Commands
5.6.2.2. Operational Commands
5.6.2.2.1. Service Ingress QoS Policy Commands
5.6.2.2.2. Service Egress QoS Policy Forwarding Class Commands
5.6.2.3. Show Commands
5.6.2.4. Debug Commands
6. Queue Sharing and Redirection
6.1. Queue Sharing and Redirection
6.1.1. Supported Platforms
6.2. Queue Group Applications
6.2.1. Access SAP Queue Group Applications
6.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
6.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
6.2.2. Network Port Queue Groups for IP Interfaces
6.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
6.2.4. QoS on Ingress Bindings
6.2.5. VXLAN VNI Queue Group Redirection
6.2.5.1. Queue Group Redirect List
6.2.5.2. Queue Group Redirect List Example
6.3. Queue Group Templates
6.4. Port Queue Groups
6.4.1. Percent-Rate Support
6.5. Forwarding Plane Queue Groups
6.6. Redirection Models
6.7. Access SAP Forwarding Class-Based Redirection
6.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
6.7.1.1. Policy Based Provisioning Model
6.7.1.2. SAP-Based Provisioning Model
6.7.2. Access Queue Group Statistics
6.7.2.1. Port Queue Groups
6.7.2.2. Forwarding Plane Queue Groups
6.8. Network IP Interface Forwarding Class-Based Redirection
6.8.1. Egress Network Forwarding Class Redirection Association Rules
6.8.2. Egress Network IP Interface Statistics
6.9. PW Shaping
6.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.9.1.1. Feature Configuration
6.9.1.2. Provisioning Model
6.9.1.3. Ingress Packet Classification
6.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
6.9.2.1. Feature Configuration
6.9.2.2. Provisioning Model
6.9.2.3. Egress Marking of PW Packet Header
6.9.2.4. Ingress and Egress PW Statistics
6.10. Queue Group Behavior on LAG
6.10.1. Queue Group Queue Instantiation Per Link
6.10.2. Per-Link Queue Group Queue Parameters
6.10.3. Adding a Queue Group to an Existing LAG
6.10.4. Adding a Port to a LAG
6.10.5. Removing a Queue Group from a LAG
6.11. Basic Configurations
6.11.1. Configuring an Ingress Queue Group Template
6.11.2. Configuring Egress Queue Group Template
6.11.3. Applying Ingress Queue Group to SAP Ingress Policy
6.11.4. Applying Egress Queue Group to SAP Egress Policy
6.11.5. Configuring SAP-based Egress Queue Redirection
6.11.6. Configuring Queue Group on Ethernet Access Ingress Port
6.11.7. Configuring Overrides
6.11.8. Configuring Queue Group on Ethernet Access Egress Port
6.11.9. Configuring Queue Group for Network Egress Traffic on Port
6.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
6.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
6.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.11.13. Specifying QoS Policies on Service SAPs
6.12. QoS Queue Group Template Command Reference
6.12.1. Command Hierarchies
6.12.1.1. Configuring Ingress Queue Group Templates
6.12.1.2. Configuring Egress Queue Group Templates
6.12.1.3. Configuring VXLAN VNI Queue Group Redirection
6.12.1.4. Show Commands
6.12.1.5. Monitor Commands
6.12.2. Command Descriptions
6.12.2.1. Configuration Commands
6.12.2.1.1. Generic Commands
6.12.2.1.2. Queue Group Commands
6.12.2.2. Show Commands
6.12.2.3. Monitor Commands
7. Scheduler QoS Policies
7.1. Scheduler Policies
7.1.1. Egress Port-Based Schedulers
7.1.1.1. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
7.1.1.2. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
7.1.1.2.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
7.1.1.3. Frame and Packet-Based Bandwidth Allocation
7.1.1.4. Parental Association Scope
7.1.1.5. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
7.1.1.6. Network Queue Parent Scheduler
7.1.1.7. Foster Parent Behavior for Orphaned Queues and Schedulers
7.1.1.8. Congestion Monitoring on Egress Port Scheduler
7.1.1.8.1. Scalability, Performance, and Operation
7.1.1.8.2. Restrictions
7.1.2. Frame-Based Accounting
7.1.2.1. Operational Modifications
7.1.2.2. Existing Egress Port-Based Virtual Scheduling
7.1.2.3. Behavior Modifications for Frame-Based Accounting
7.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
7.1.3. Virtual Scheduling Unused Bandwidth Distribution
7.1.3.1. Default Unused Bandwidth Distribution
7.1.3.2. Limit Unused Bandwidth
7.1.4. Configuring Port Scheduler Policies
7.1.4.1. Port Scheduler Structure
7.1.4.2. Special Orphan Queue and Scheduler Behavior
7.1.4.3. Packet to Frame Bandwidth Conversion
7.1.4.4. Aggregate Rate Limits for Directly Attached Queues
7.1.4.5. SAP Egress QoS Policy Queue Parenting
7.1.4.6. Network Queue QoS Policy Queue Parenting
7.1.4.7. Egress Port Scheduler Overrides
7.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
7.1.4.9. Applying Aggregate Rate Limit to a Vport
7.1.4.10. Applying a Scheduler Policy to a Vport
7.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
7.2. Basic Configurations
7.2.1. Creating a QoS Scheduler Policy
7.2.2. Applying Scheduler Policies
7.2.2.1. Customer
7.2.2.2. Epipe
7.2.2.3. IES
7.2.2.4. VPLS
7.2.2.5. VPRN
7.2.3. Creating a QoS Port Scheduler Policy
7.2.4. Configuring Port Parent Parameters
7.2.4.1. Within-CIR Priority Level Parameters
7.2.4.2. Above-CIR Priority Level Parameters
7.2.5. Configuring Distributed LAG Rate
7.3. Service Management Tasks
7.3.1. Deleting QoS Policies
7.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
7.3.1.2. Removing a QoS Policy from SAP(s)
7.3.1.3. Removing a Policy from the QoS Configuration
7.3.2. Copying and Overwriting Scheduler Policies
7.3.3. Editing QoS Policies
7.4. QoS Scheduler Policy Command Reference
7.4.1. Command Hierarchies
7.4.1.1. Scheduler Policy Configuration Commands
7.4.1.2. Port Scheduler Policy Configuration Commands
7.4.1.3. Operational Commands
7.4.1.4. Show Commands
7.4.1.5. Clear Commands
7.4.2. Command Descriptions
7.4.2.1. Configuration Commands
7.4.2.1.1. Generic Commands
7.4.2.2. Operational Commands
7.4.2.3. Scheduler Policy Commands
7.4.2.4. Port Scheduler Policy Commands
7.4.2.5. Show Commands
7.4.2.6. Clear Commands
8. Slope QoS Policies
8.1. Overview
8.2. Basic Configurations
8.2.1. Creating a Slope QoS Policy
8.2.2. Applying Slope Policies
8.2.2.1. Ports
8.2.2.2. FP
8.2.3. Default Slope Policy Values
8.3. Service Management Tasks
8.3.1. Deleting QoS Policies
8.3.1.1. Ports
8.3.1.2. FP
8.3.1.3. Removing a Policy from the QoS Configuration
8.3.2. Copying and Overwriting QoS Policies
8.3.3. Editing QoS Policies
8.4. Slope QoS Policy Command Reference
8.4.1. Command Hierarchies
8.4.1.1. Configuration Commands
8.4.1.2. Operational Commands
8.4.1.3. Show Commands
8.4.2. Command Descriptions
8.4.2.1. Configuration Commands
8.4.2.1.1. Generic Commands
8.4.2.2. Operational Commands
8.4.2.2.1. Slope Policy QoS Commands
8.4.2.2.2. Slope Policy QoS Policy Commands
8.4.2.2.3. RED Slope Commands
8.4.2.3. Show Commands
9. Shared-Queue QoS Policies
9.1. Overview
9.2. Multipoint Shared Queuing
9.2.1. Ingress Queuing Modes of Operation
9.2.2. Ingress Service Queuing
9.2.2.1. Ingress Shared Queuing
9.2.2.2. Ingress Multipoint Shared Queuing
9.3. Basic Configurations
9.3.1. Modifying the Default Shared-Queue Policy
9.3.1.1. Applying Shared-Queue Policies
9.3.1.1.1. Epipe Services
9.3.1.1.2. IES Services
9.3.1.1.3. VPLS Services
9.3.1.1.4. VPRN Services
9.3.2. Default Shared Queue Policy Values
9.4. Shared-Queue QoS Policy Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Configuration Commands
9.4.1.2. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Configuration Commands
9.4.2.1.1. Generic Commands
9.4.2.1.2. Shared Queue QoS Commands
9.4.2.2. Show Commands
10. Advanced QoS Policies
10.1. Overview
10.2. Basic Configurations
10.2.1. Creating an Advanced QoS Policy
10.2.2. Applying Advanced Policies
10.2.2.1. Queue Group
10.2.2.2. SAP Ingress
10.2.2.3. SAP Egress
10.2.3. Default Advanced Policy Values
10.3. Service Management Tasks
10.3.1. Deleting QoS Policies
10.3.1.1. Queue Group
10.3.1.2. SAP Ingress
10.3.1.3. SAP Egress
10.3.2. Copying and Overwriting Advanced Policies
10.3.3. Editing Advanced Policies
10.4. Advanced QoS Policy Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Configuration Commands
10.4.1.2. Operational Commands
10.4.1.3. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Configuration Commands
10.4.2.1.1. Generic Commands
10.4.2.2. Operational Commands
10.4.2.2.1. Advanced Policy QoS Commands
10.4.2.3. Show Commands
11. QoS ATM Traffic Descriptor Profiles
11.1. ATM Traffic Management
11.2. QoS Model for ATM-Based Services
11.3. ATM Service Categories
11.4. ATM Traffic Descriptors and QoS Parameters
11.5. Policing
11.6. Shaping
11.7. ATM Queuing and Scheduling
11.8. Congestion Avoidance
11.9. Basic Configurations
11.9.1. Creating an ATM-TD-Profile QoS Policy
11.9.2. Applying ATM-TD-Profile Policies
11.9.2.1. ATM VLL (Apipe) SAPs
11.9.2.2. Epipe SAPs
11.9.2.3. IES SAPs
11.9.2.4. Ipipe SAPs
11.9.2.5. VPRN SAPs
11.9.2.6. VPLS SAPs
11.9.3. Default ATM-TD-Profile Policy Values
11.10. Service Management Tasks
11.10.1. Removing a Profile from the QoS Configuration
11.10.2. Copying and Overwriting Profiles
11.10.3. Editing QoS Policies
11.11. ATM QoS Policy Command Reference
11.11.1. Command Hierarchies
11.11.1.1. Configuration Commands
11.11.1.2. Operational Commands
11.11.1.3. Show Commands
11.11.2. Command Descriptions
11.11.2.1. Configuration Commands
11.11.2.1.1. Generic Commands
11.11.2.1.2. Operational Commands
11.11.2.1.3. ATM QoS Policy Commands
11.11.2.1.4. Show Commands
12. Named Pools
12.1. Overview
12.2. Named Pool Mode for IOM3-XP Card
12.3. Basic Configurations
12.3.1. Creating a Named Pool QoS Policy
12.3.1.1. Named Pool Configuration Procedure
12.3.2. Allocation Steps
12.4. Named Pools QoS Policy Command Reference
12.4.1. Command Hierarchies
12.4.1.1. Configuration Commands
12.4.1.2. Show Commands
12.4.2. Command Descriptions
12.4.2.1. Configuration Commands
12.4.2.1.1. Generic Commands
12.4.2.2. Named Pool Policy Creation
12.4.2.3. Show Commands
12.4.2.3.1. Named Pool Show Commands
13. High Scale Ethernet MDA Capabilities
13.1. HSMDA QoS Model
13.1.1. Queue Scaling
13.1.2. Port-Based Scheduling
13.1.3. Dual Pass Queuing
13.1.4. Egress Intermediate Destination Secondary Shapers
13.1.5. Packet and Octet Counting
13.1.6. Above-CIR Discard with PIR Bypass
13.1.6.1. HSMDA Ingress Queue Policing Mode
13.1.7. HSMDA Buffer Utilization Controls
13.1.7.1. HSMDA Buffer Pools
13.1.7.2. Identifying Queue Groups as Provisioned or System
13.1.7.3. Provisioned and System Port Class Pools
13.1.7.4. Aggregate Pools for Type and Class Separation
13.1.7.5. Use of Aggregate Control Buffer Pools
13.1.7.6. HSMDA Buffer Pool Policy
13.1.7.6.1. Default HSMDA Buffer Pool Policy
13.1.7.7. Port Class Pool Sizing
13.1.7.8. HSMDA Available Buffer Register Operation
13.1.8. HSMDA Queue Congestion and Buffer Utilization Controls
13.1.8.1. Maximum HSMDA Queue Depth
13.1.8.2. Control Plane HSMDA RED Slope Policy Management
13.1.8.3. HSMDA Slope Policy MBS Parameter
13.1.8.4. HSMDA Slope Policy Slope Parameters
13.1.8.5. HSMDA Slope Shutdown Behavior
13.1.8.6. Ingress Packet Mapping to HSMDA RED Slope
13.1.8.7. Egress Packet Mapping to HSMDA RED Slope
13.1.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
13.1.9. Egress Queue CIR-Based Dot1p Remarking
13.2. SAP Ingress and SAP Egress QoS Policies
13.2.1. SAP Ingress QoS Policy
13.2.2. SAP Egress QoS Policy
13.3. Subscriber Queuing Differences
13.4. Basic HSMDA Configurations
13.4.1. HSMDA Pool Policies
13.4.2. HSMDA Scheduler Policies
13.4.3. HSMDA Slope Policies
13.4.4. Egress Queue Group
13.4.5. Configuring HSMDA Queue Group Overrides
13.5. Applying HSMDA Policies
13.6. HSMDA Features
13.6.1. HSMDA LAG
13.6.2. Billing
13.6.3. Resource Management
13.6.4. HSMDA Queue Groups
13.6.4.1. Scheduling Classes
13.6.4.2. Scheduling Class Weighted Groups
13.6.4.3. Scheduler Strict Priority Levels
13.6.4.4. Strict Priority Level PIR
13.6.4.5. Scheduler Maximum Rate
13.6.4.6. HSMDA Scheduler Policy Overrides
13.6.4.7. Orphan Queues
13.6.4.8. Default HSMDA Scheduling Policy
13.7. HSMDA Command Reference
13.7.1. Command Hierarchies
13.7.1.1. Show Commands
13.7.2. Command Descriptions
13.7.2.1. Configuration Commands
13.7.2.1.1. Generic Commands
13.7.2.1.2. HSMDA Pool QoS Policy Commands
13.7.2.1.3. HSMDA Scheduler QoS Policy Commands
13.7.2.1.4. HSMDA Slope QoS Policy Commands
13.7.2.1.5. HSMDA WRR QoS Policy Commands
13.7.2.1.6. Show QoS HSMDA Commands
14. QoS in MC-MLPPP
14.1. Overview
14.2. Ingress MLPPP Class Reassembly
14.3. Basic Configurations
14.3.1. Configuring MC-MLPPP
14.3.2. Configuring MC-MLPPP QoS Parameters
14.4. QoS in MLFR and FRF.12 Fragmentation
14.4.1. QoS in MLFR
14.4.2. QoS in FRF.12 End-to-End Fragmentation
14.5. MLPPP Command Reference
14.5.1. Command Hierarchies
14.5.1.1. Configuration Commands
14.5.2. Command Descriptions
14.5.2.1. Configuration Commands
14.5.2.1.1. MC-MLPPP Commands
15. Class Fair Hierarchical Policing (CFHP)
15.1. Overview
15.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
15.3. CFHP Ingress and Egress Use Cases
15.4. Post-CFHP Queuing and Scheduling
15.4.1. Ingress CFHP Queuing
15.4.2. Egress CFHP Queuing
15.4.2.1. Policer to Local Queue Mapping
15.4.3. Egress Subscriber CFHP Queuing
15.4.3.1. Subscriber Destination String Queue Group Identification
15.4.4. SAP Default Destination String
15.5. CFHP Policer Control Policy
15.5.1. Policer Control Policy Root Arbiter
15.5.2. Tier 1 and Tier 2 Explicit Arbiters
15.5.3. Explicit Arbiter Rate Limits
15.5.4. CFHP with Child Policer Exceed PIR Enabled
15.6. CFHP Child Policer Definition and Creation
15.7. Policer Enabled SAP QoS Policy Applicability
15.8. Child Policer Parent Association
15.9. Profile-Capped Policers
15.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
15.10.1. Ingress ‘Undefined’ Initial Profile
15.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
15.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
15.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
15.10.5. Egress Explicit Profile Reclassification
15.10.6. Preserving Out of Profile State at Egress Policer
15.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
15.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
15.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
15.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
15.10.11. Ingress Child Policer Stat-Mode
15.10.12. Egress Child Policer Stat-Mode
15.11. Profile-Preferred Mode Root Policers
15.12. Child Policer Hierarchical QoS Parenting
15.13. Class Fair Hierarchical Policing (CFHP) Policy Command Reference
15.13.1. Command Hierarchies
15.13.1.1. Class Fair Hierarchical Policing Commands
15.13.1.2. Operational Commands
15.13.1.3. Show Commands
15.13.2. Command Descriptions
15.13.2.1. Configuration Commands
15.13.2.1.1. Generic Commands
15.13.2.1.2. Class Fair Hierarchical Policing Commands
15.13.2.1.3. Operational Commands
15.13.2.1.4. Show Commands
16. Frequently Used QoS Terms
16.1. Overview
16.2. Above-CIR Distribution
16.3. Available Bandwidth
16.4. CBS
16.5. CIR
16.6. CIR Level
16.7. CIR Weight
16.8. Child
16.9. Level
16.10. MBS
16.11. Offered Load
16.12. Orphan
16.13. Parent
16.14. Queue
16.15. Rate
16.16. Root (Scheduler)
16.17. Scheduler Policy
16.18. Tier
16.19. Virtual Scheduler
16.20. Weight
16.21. Within-CIR Distribution
17. Standards and Protocol Support
Customer Document and Product Support
Quick Reference Card, R16.0.R1
7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview, R16.0.R1
7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview, R16.0.R1
RADIUS Attributes Reference Guide R16.0.R1
1. RADIUS Attributes Reference
1.1. About this Guide
1.2. RADIUS Authentication Attributes
1.2.1. Subscriber Host Identification
1.2.1.1. [87] NAS-Port-Id Attribute Details
1.2.1.2. [26.6527.126] Alc-Subscriber-QoS-Override Attribute Details
1.2.1.3. [26.6527.238] Alc-Remove-Override Attribute Details
1.2.2. Wholesale-Retail — Local Access Mode
1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
1.2.4. Business Service Access
1.2.5. Accounting On-Line Charging
1.2.6. IP and IPv6 Filters
1.2.6.1. IP Filter Attribute Details
1.2.7. Subscriber Host Creation
1.2.8. Subscriber Services
1.2.9. GTP Uplink
1.2.10. WLAN Gateway
1.2.11. Virtual Residential Gateway
1.2.11.1. [241.26.6527.39] Alc-Static-Port-Forward Attribute Details
1.2.12. Bonding
1.2.13. Dynamic Data Services
1.2.14. Lawful Intercept
1.2.15. IPSec
1.2.16. Application Assurance
1.2.17. CLI User Authentication and Authorization
1.2.18. AAA Route Downloader
1.3. RADIUS Accounting Attributes
1.3.1. Enhanced Subscriber Management (ESM) Accounting
1.3.2. Distributed Subscriber Management (DSM) Accounting
1.3.3. Subscriber Service Accounting
1.3.4. Large Scale NAT (LSN) Accounting
1.3.5. L2TP Tunnel Accounting
1.3.6. Application Assurance (AA) Accounting
1.3.7. Dynamic Data Service accounting
1.3.8. CLI User Access Accounting
1.3.9. Accounting Terminate Causes
1.3.10. Accounting Triggered Reason VSA Values
1.4. RADIUS CoA and Disconnect Message Attributes
1.4.1. Subscriber Host Identification Attributes
1.4.2. WLAN-GW migrant users Identification Attributes
1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
1.4.4. IPSec Tunnel Identification Attributes
1.4.5. Dynamic Data Services Identification Attributes
1.4.6. Overview of CoA Attributes
1.4.7. [101] Error-Cause Attribute Values
2. Standards and Protocol Support
Customer Document and Product Support
1. RADIUS Attributes Reference
1.1. About this Guide
1.2. RADIUS Authentication Attributes
1.2.1. Subscriber Host Identification
1.2.1.1. [87] NAS-Port-Id Attribute Details
1.2.1.2. [26.6527.126] Alc-Subscriber-QoS-Override Attribute Details
1.2.1.3. [26.6527.238] Alc-Remove-Override Attribute Details
1.2.2. Wholesale-Retail — Local Access Mode
1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
1.2.4. Business Service Access
1.2.5. Accounting On-Line Charging
1.2.6. IP and IPv6 Filters
1.2.6.1. IP Filter Attribute Details
1.2.7. Subscriber Host Creation
1.2.8. Subscriber Services
1.2.9. GTP Uplink
1.2.10. WLAN Gateway
1.2.11. Virtual Residential Gateway
1.2.11.1. [241.26.6527.39] Alc-Static-Port-Forward Attribute Details
1.2.12. Bonding
1.2.13. Dynamic Data Services
1.2.14. Lawful Intercept
1.2.15. IPSec
1.2.16. Application Assurance
1.2.17. CLI User Authentication and Authorization
1.2.18. AAA Route Downloader
1.3. RADIUS Accounting Attributes
1.3.1. Enhanced Subscriber Management (ESM) Accounting
1.3.2. Distributed Subscriber Management (DSM) Accounting
1.3.3. Subscriber Service Accounting
1.3.4. Large Scale NAT (LSN) Accounting
1.3.5. L2TP Tunnel Accounting
1.3.6. Application Assurance (AA) Accounting
1.3.7. Dynamic Data Service accounting
1.3.8. CLI User Access Accounting
1.3.9. Accounting Terminate Causes
1.3.10. Accounting Triggered Reason VSA Values
1.4. RADIUS CoA and Disconnect Message Attributes
1.4.1. Subscriber Host Identification Attributes
1.4.2. WLAN-GW migrant users Identification Attributes
1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
1.4.4. IPSec Tunnel Identification Attributes
1.4.5. Dynamic Data Services Identification Attributes
1.4.6. Overview of CoA Attributes
1.4.7. [101] Error-Cause Attribute Values
2. Standards and Protocol Support
Customer Document and Product Support
Router Configuration Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface
2.1.1.2. Network Domains
2.1.1.3. System Interface
2.1.1.4. Unicast Reverse Path Forwarding Check (uRPF)
2.1.1.5. Creating an IP Address Range
2.1.1.6. QoS Policy Propagation Using BGP (QPPB)
2.1.1.6.1. QPPB Applications
2.1.1.6.2. Inter-AS Coordination of QoS Policies
2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
2.1.1.7. QPPB
2.1.1.7.1. Associating an FC and Priority with a Route
2.1.1.7.2. Displaying QoS Information Associated with Routes
2.1.1.7.3. Enabling QPPB on an IP interface
2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.1.1.7.5. QPPB and Multiple Paths to a Destination
2.1.1.7.6. QPPB and Policy-Based Routing
2.1.1.8. QPPB and GRT Lookup
2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.1.2. Router ID
2.1.3. Autonomous Systems (AS)
2.1.4. Confederations
2.1.5. Proxy ARP
2.1.6. Exporting an Inactive BGP Route from a VPRN
2.1.7. DHCP Relay
2.1.8. Internet Protocol Versions
2.1.8.1. IPv6 Address Format
2.1.8.2. IPv6 Applications
2.1.8.3. DNS
2.1.8.4. Secure Neighbor Discovery (SeND)
2.1.8.5. SeND Persistent CGAs
2.1.8.5.1. Persistent RSA Key Pair
2.1.8.5.2. Persistent CGA Modifier
2.1.8.5.3. Making non-persistent CGAs persistent
2.1.8.5.4. Booting from a saved configuration file
2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.1.8.6.1. 6PE Control Plane Support
2.1.8.6.2. 6PE Data Plane Support
2.1.9. Static Route Resolution Using Tunnels
2.1.9.1. Static Route ECMP Support
2.2. Weighted Load Balancing over MPLS LSP
2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.2.1.1. Feature Configuration
2.2.1.2. Feature Behavior
2.2.1.3. ECMP Considerations
2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.2.1.4.1. Feature Configuration
2.2.1.4.2. Feature Behavior
2.2.2. Weighted Load Balancing for 6PE
2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
2.3.1. Feature Configuration
2.3.2. Feature Behavior
2.3.3. Feature Limitations
2.3.4. Data Path Support
2.3.5. Example Configuration and Default CBF Set Election
2.4. Bidirectional Forwarding Detection
2.4.1. BFD Control Packet
2.4.2. Control Packet Format
2.4.3. BFD for RSVP-TE
2.4.4. Echo Support
2.4.5. BFD Support for BGP
2.4.6. Centralized BFD
2.4.6.1. IES Over Spoke SDP
2.4.6.2. BFD Over LAG and VSM Interfaces
2.4.6.3. LSP BFD and VCCV BFD
2.4.7. Aggregate Next Hop
2.4.8. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.4.8.1. Invalidate Next-Hop Based on IPV4 ARP
2.4.8.2. Invalidate Next-Hop Based on Neighbor Cache State
2.4.9. LDP Shortcut for IGP Route Resolution
2.4.9.1. IGP Route Resolution
2.4.9.2. LDP-IGP Synchronization
2.4.9.3. LDP Shortcut Forwarding Plane
2.4.9.4. ECMP Considerations
2.4.9.5. Handling of Control Packets
2.4.9.6. Handling of Multicast Packets
2.4.9.7. Interaction with BGP Route Resolution to an LDP FEC
2.4.9.8. Interaction with Static Route Resolution to an LDP FEC
2.4.9.9. LDP Control Plane
2.5. Weighted Load-Balancing over Interface Next-hops
2.6. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
2.6.1. Feature Configuration
2.6.2. MPLS-over-GRE and IP-over-GRE Termination Function
2.6.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
2.6.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
2.6.5. LER and LSR Hashing Support
2.7. GRE Tunnel Overview
2.7.1. Sample GRE Tunnel Configurations
2.8. Router Interface Encryption with NGE
2.8.1. NGE Domains
2.8.1.1. Private IP/MPLS Network NGE Domain
2.8.1.2. Private Over Intermediary Network NGE Domain
2.8.2. Router Interface NGE Domain Concepts
2.8.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
2.8.4. EVPN-VXLAN Tunnels and Services
2.8.5. Router Encryption Exceptions using ACLs
2.8.6. IPSec Packets Crossing an NGE Domain
2.8.7. Multicast Packets Traversing the NGE Domain
2.8.8. Assigning Key Groups to Router Interfaces
2.8.9. NGE and BFD Support
2.8.10. NGE and ACL Interactions
2.8.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
2.8.12. 1588v2 Encryption With NGE
2.9. Process Overview
2.10. Configuration Notes
2.11. Configuring an IP Router with CLI
2.11.1. Router Configuration Overview
2.11.1.1. System Interface
2.11.1.2. Network Interface
2.11.2. Basic Configuration
2.11.3. Common Configuration Tasks
2.11.3.1. Configuring a System Name
2.11.3.2. Configuring Interfaces
2.11.3.2.1. Configuring a System Interface
2.11.3.2.2. Configuring a Network Interface
2.11.3.2.3. Assigning a Key Group to a Router Interface
2.11.3.2.4. Configuring IPv6 Parameters
2.11.3.2.5. Configuring IPv6 Over IPv4 Parameters
2.11.3.2.6. Tunnel Ingress Node
2.11.3.2.7. Tunnel Egress Node
2.11.3.2.8. Router Advertisement
2.11.3.2.9. Configuring IPv6 Parameters
2.11.3.2.10. Configuring Proxy ARP
2.11.3.2.11. Creating an IP Address Range
2.11.3.3. Deriving the Router ID
2.11.3.4. Configuring a Confederation
2.11.3.5. Configuring an Autonomous System
2.11.3.6. Configuring Overload State on a Single SFM
2.12. Service Management Tasks
2.12.1. Changing the System Name
2.12.2. Modifying Interface Parameters
2.12.3. Removing a Key Group from a Router Interface
2.12.4. Changing the Key Group for a Router Interface
2.12.5. Deleting a Logical IP Interface
2.13. IP Router Configuration Command Reference
2.13.1. Command Hierarchies
2.13.1.1. Router Commands
2.13.1.2. Router BFD Commands
2.13.1.3. Router L2TP Commands
2.13.1.4. Router Interface Commands
2.13.1.5. Router Interface IPv6 Commands
2.13.1.6. Router Advertisement Commands
2.13.2. Command Descriptions
2.13.2.1. Generic Commands
2.13.2.2. Router Global Commands
2.13.2.3. Router L2TP Commands
2.13.2.3.1. Router L2TP Tunnel Commands
2.13.2.4. Router Interface Commands
2.13.2.4.1. Router Interface Filter Commands
2.13.2.4.2. Router Interface ICMP Commands
2.13.2.4.3. Router Interface IPv6 Commands
2.13.2.4.4. Router Interface DHCP Commands
2.13.2.5. Router Interface Encryption Commands
2.13.2.6. Router Advertisement Commands
2.14. Show, Clear, and Debug Command Reference
2.14.1. Command Hierarchies
2.14.1.1. Show Commands
2.14.1.2. Clear Commands
2.14.1.3. Debug Commands
2.14.1.4. Tools Commands
2.14.2. Command Descriptions
2.14.2.1. Show Commands
2.14.2.1.1. L2TP Show Commands
2.14.2.2. Clear Commands
2.14.2.3. Debug Commands
2.14.2.4. Tools Commands
3. VRRP
3.1. VRRP Overview
3.2. VRRP Components
3.2.1. Virtual Router
3.2.2. IP Address Owner
3.2.3. Primary and Secondary IP Addresses
3.2.4. Virtual Router Master
3.2.5. Virtual Router Backup
3.2.6. Owner and Non-Owner VRRP
3.2.7. Configurable Parameters
3.2.7.1. Virtual Router ID (VRID)
3.2.7.2. Priority
3.2.7.3. IP Addresses
3.2.7.4. Message Interval and Master Inheritance
3.2.7.5. Skew Time
3.2.7.6. Master Down Interval
3.2.7.7. Preempt Mode
3.2.7.8. VRRP Message Authentication
3.2.7.8.1. Authentication Type 0 – No Authentication
3.2.7.8.2. Authentication Type 1 – Simple Text Password
3.2.7.8.3. Authentication Failure
3.2.7.9. Authentication Data
3.2.7.10. Virtual MAC Address
3.2.7.11. VRRP Advertisement Message IP Address List Verification
3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.2.7.13. IPv6 Virtual Router Instance Operationally Up
3.2.7.14. Policies
3.3. VRRP Priority Control Policies
3.3.1. VRRP Virtual Router Policy Constraints
3.3.2. VRRP Virtual Router Instance Base Priority
3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.3.4. VRRP Priority Control Policy Priority Events
3.3.4.1. Priority Event Hold-Set Timers
3.3.4.2. Port Down Priority Event
3.3.4.3. LAG Degrade Priority Event
3.3.4.4. Host Unreachable Priority Event
3.3.4.5. Route Unknown Priority Event
3.4. VRRP Non-Owner Accessibility
3.4.1. Non-Owner Access Ping Reply
3.4.2. Non-Owner Access Telnet
3.4.3. Non-Owner Access SSH
3.5. VRRP Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.7. Configuring VRRP with CLI
3.7.1. VRRP Configuration Overview
3.7.1.1. Preconfiguration Requirements
3.7.2. Basic VRRP Configurations
3.7.2.1. VRRP Policy
3.7.2.2. VRRP IES Service Parameters
3.7.2.2.1. Configure VRRP for IPv6
3.7.2.3. VRRP Router Interface Parameters
3.7.3. Common Configuration Tasks
3.7.3.1. Creating Interface Parameters
3.7.4. Configuring VRRP Policy Components
3.7.4.1. Configuring Service VRRP Parameters
3.7.4.1.1. Non-Owner VRRP Example
3.7.4.1.2. Owner Service VRRP
3.7.4.2. Configuring Router Interface VRRP Parameters
3.7.4.2.1. Router Interface VRRP Non-Owner
3.7.4.2.2. Router Interface VRRP Owner
3.8. VRRP Configuration Management Tasks
3.8.1. Modifying a VRRP Policy
3.8.1.1. Deleting a VRRP Policy
3.8.2. Modifying Service and Interface VRRP Parameters
3.8.2.1. Modifying Non-Owner Parameters
3.8.2.2. Modifying Owner Parameters
3.8.2.3. Deleting VRRP from an Interface or Service
3.9. VRRP Configuration Command Reference
3.9.1. Command Hierarchies
3.9.1.1. IPv4 Interface VRRP Commands
3.9.1.2. Router Interface Commands
3.9.1.3. IPv6 Interface VRRP Commands
3.9.1.4. Priority Control Event Policy Commands
3.9.2. Command Descriptions
3.9.2.1. Interface Configuration Commands
3.9.2.2. Priority Policy Commands
3.9.2.3. Priority Policy Event Commands
3.9.2.4. Priority Policy Port Down Event Commands
3.9.2.5. Priority Policy LAG Events Commands
3.9.2.6. Priority Policy Host Unreachable Event Commands
3.9.2.7. Priority Policy Route Unknown Event Commands
3.10. Show, Monitor, Clear, and Debug Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Show Commands
3.10.1.2. Monitor Commands
3.10.1.3. Clear Commands
3.10.1.4. Debug Commands
3.10.2. Command Descriptions
3.10.2.1. Show Commands
3.10.2.2. Monitor Commands
3.10.2.3. Clear Commands
3.10.2.4. Debug Commands
4. Filter Policies
4.1. ACL Filter Policy Overview
4.1.1. Filter Policy Basics
4.1.1.1. Filter Policy Packet Match Criteria
4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.1.1.3. MAC Filter Policy Entry Match Criteria
4.1.1.4. IP Exception Filters
4.1.1.5. Filter Policy Actions
4.1.1.6. Viewing Filter Policy Actions
4.1.1.7. Filter Policy Statistics
4.1.1.8. Filter Policy Logging
4.1.1.9. Filter Policy cflowd Sampling
4.1.1.10. Filter Policy Management
4.1.1.10.1. Modifying Existing Filter Policy
4.1.1.10.2. Filter Policy Copy and Renumbering
4.1.1.11. Storing Filter Entries
4.1.1.11.1. FP4-based Cards
4.1.2. Filter Policy Advanced Topics
4.1.2.1. Match List for Filter Policies
4.1.2.1.1. Apply-Path — Auto-Generation of Prefix List Entries
4.1.2.2. Embedded Filters
4.1.2.3. System-level IPv4/IPv6 Line Card Filter Policy
4.1.2.4. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.1.2.5. Extended Action for Performing Two Actions at a Time
4.1.2.6. Advanced VPRN Redirection
4.1.2.7. Destination MAC Rewrite When Deploying Policy-Based Forwarding
4.1.2.8. Network-port VPRN Filter Policy
4.1.2.9. ISID MAC Filters
4.1.2.10. VID MAC Filters
4.1.2.10.1. Arbitrary Bit Matching of VID Filters
4.1.2.10.2. Port Group Configuration Example
4.1.2.11. IP Exception Filters
4.1.2.12. Redirect Policies
4.1.2.12.1. Router Instance Support for Redirect Policies
4.1.2.13. HTTP-redirect (Captive Portal)
4.1.2.13.1. Traffic Flow
4.1.2.14. Filter Policies and Dynamic Policy-Driven Interfaces
4.1.2.15. Filter Policy-based ESM Service Chaining
4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
4.2. Configuring Filter Policies with CLI
4.2.1. Common Configuration Tasks
4.2.1.1. Creating an IPv4 Filter Policy
4.2.1.1.1. IPv4 Filter Entry
4.2.1.2. Creating an IPv6 Filter Policy
4.2.1.3. Creating a MAC Filter Policy
4.2.1.3.1. MAC Filter Policy
4.2.1.3.2. MAC ISID Filter Policy
4.2.1.3.3. MAC VID Filter Policy
4.2.1.3.4. MAC Filter Entry
4.2.1.4. Creating an IP Exception Filter Policy
4.2.1.4.1. IP Exception Filter Policy
4.2.1.4.2. IP Exception Entry Matching Criteria
4.2.1.5. Creating a Match List for Filter Policies
4.2.1.6. Applying Filter Policies
4.2.1.6.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
4.2.1.6.2. Applying IPv4/IPv6 Filter Policies to a Network Port
4.2.1.7. Creating a Redirect Policy
4.2.1.8. Configuring Filter-Based GRE Tunneling
4.3. Filter Management Tasks
4.3.1. Renumbering Filter Policy Entries
4.3.2. Modifying a Filter Policy
4.3.3. Deleting a Filter Policy
4.3.4. Modifying a Redirect Policy
4.3.5. Deleting a Redirect Policy
4.3.6. Copying Filter Policies
4.4. Filter Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. IPv4 Filter Policy Commands
4.4.1.2. IPv6 Filter Policy Commands
4.4.1.3. MAC Filter Commands
4.4.1.4. GRE Tunnel Template Configuration Commands
4.4.1.5. IP Exception Filter Policy Configuration Commands
4.4.1.6. System Filter Policy Commands
4.4.1.7. Redirect Policy Configuration Commands
4.4.1.8. Match Filter List Commands
4.4.1.9. Log Filter Commands
4.4.1.10. Copy Filter Commands
4.4.1.11. Model-Driven Automatic ID Commands
4.4.2. Command Descriptions
4.4.2.1. Generic Commands
4.4.2.2. Global Filter Commands
4.4.2.3. Filter Log Commands
4.4.2.4. ACL Filter Policy Commands
4.4.2.5. General Filter Entry Commands
4.4.2.6. IP (v4/v6) and IP Exception Filter Entry Commands
4.4.2.7. Match List Configuration Commands
4.4.2.8. MAC Filter Entry Commands
4.4.2.9. MAC Filter Match Criteria
4.4.2.10. IP Exception Filter Policy Commands
4.4.2.11. GRE Tunnel Template Configuration Commands
4.4.2.12. Policy and Entry Maintenance Commands
4.4.2.13. Redirect Policy Commands
4.4.2.14. Model-Driven Automatic ID Commands
4.5. Show, Clear, Monitor, and Debug Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Monitor Commands
4.5.1.4. Debug Commands
4.5.1.5. Tools Commands
4.5.2. Command Descriptions
4.5.2.1. Show Commands
4.5.2.2. Clear Commands
4.5.2.3. Monitor Commands
4.5.2.4. Debug Commands
5. Hybrid OpenFlow Switch
5.1. In This Chapter
5.2. Hybrid OpenFlow Switching
5.2.1. Redundant Controllers and Multiple Switch Instances
5.2.2. GRT-only and Multi-Service H-OFS Modes of Operations
5.2.2.1. Port and VLAN ID Match in Flow Table Entries
5.2.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.2.4. Hybrid OpenFlow Switch Statistics
5.2.5. OpenFlow Switch Auxiliary Channels
5.2.6. Hybrid OpenFlow Switch Traffic Steering Details
5.2.6.1. SR OS H-OFS Logical Port
5.2.6.2. SR OS H-OFS Port and VLAN Encoding
5.2.6.3. Redirect to IP next-hop
5.2.6.4. Redirect to GRT Instance or VRF Instance
5.2.6.5. Redirect to Next-hop and VRF/GRT Instance
5.2.6.6. Redirect to ESI (L2)
5.2.6.7. Redirect to ESI (L3)
5.2.6.8. Redirect to ESI IP VAS-Interface Router
5.2.6.9. Redirect to LSP
5.2.6.10. Redirect to NAT
5.2.6.11. Redirect to SAP
5.2.6.12. Redirect to SDP
5.2.6.13. Redirect to a Specific LSP Used by a VPRN Service
5.2.6.14. Forward Action
5.2.6.15. Drop Action
5.2.6.16. Default No-match Action
5.2.6.17. Programming of DSCP Remark Action
5.3. Configuration Notes
5.4. OpenFlow Command Reference
5.4.1. Command Hierarchies
5.4.1.1. OpenFlow Commands
5.4.1.2. Show Commands
5.4.1.3. Tools Commands
5.4.2. Command Descriptions
5.4.2.1. Generic Commands
5.4.2.2. Show Commands
5.4.2.3. Debug Commands
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.1.1. Version 8
6.1.1.2. Version 9
6.1.1.3. Version 10
6.1.2. Cflowd Filter Matching
6.2. Cflowd Configuration Process Overview
6.3. Configuration Notes
6.4. Configuring Cflowd with CLI
6.4.1. Cflowd Configuration Overview
6.4.1.1. Traffic Sampling
6.4.1.2. Collectors
6.4.1.2.1. Aggregation
6.4.2. Basic Cflowd Configuration
6.4.3. Common Configuration Tasks
6.4.3.1. Global Cflowd Components
6.4.3.2. Enabling Cflowd
6.4.3.3. Configuring Global Cflowd Parameters
6.4.3.4. Configuring Cflowd Collectors
6.4.3.4.1. Version 9 and Version 10 Templates
6.4.3.5. Specifying Cflowd Options on an IP Interface
6.4.3.5.1. Interface Configurations
6.4.3.5.2. Service Interfaces
6.4.3.6. Specifying Sampling Options in Filter Entries
6.4.3.6.1. Filter Configurations
6.4.3.6.2. Dependencies
6.5. Cflowd Configuration Management Tasks
6.5.1. Modifying Global Cflowd Components
6.5.2. Modifying Cflowd Collector Parameters
6.6. Cflowd Configuration Command Reference
6.6.1. Command Hierarchies
6.6.2. Command Descriptions
6.6.2.1. Global Commands
6.7. Show, Tools, and Clear Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.1.2. Tools Commands
6.7.1.3. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
6.7.2.2. Tools Commands
6.7.2.3. Clear Commands
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface
2.1.1.2. Network Domains
2.1.1.3. System Interface
2.1.1.4. Unicast Reverse Path Forwarding Check (uRPF)
2.1.1.5. Creating an IP Address Range
2.1.1.6. QoS Policy Propagation Using BGP (QPPB)
2.1.1.6.1. QPPB Applications
2.1.1.6.2. Inter-AS Coordination of QoS Policies
2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
2.1.1.7. QPPB
2.1.1.7.1. Associating an FC and Priority with a Route
2.1.1.7.2. Displaying QoS Information Associated with Routes
2.1.1.7.3. Enabling QPPB on an IP interface
2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.1.1.7.5. QPPB and Multiple Paths to a Destination
2.1.1.7.6. QPPB and Policy-Based Routing
2.1.1.8. QPPB and GRT Lookup
2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.1.2. Router ID
2.1.3. Autonomous Systems (AS)
2.1.4. Confederations
2.1.5. Proxy ARP
2.1.6. Exporting an Inactive BGP Route from a VPRN
2.1.7. DHCP Relay
2.1.8. Internet Protocol Versions
2.1.8.1. IPv6 Address Format
2.1.8.2. IPv6 Applications
2.1.8.3. DNS
2.1.8.4. Secure Neighbor Discovery (SeND)
2.1.8.5. SeND Persistent CGAs
2.1.8.5.1. Persistent RSA Key Pair
2.1.8.5.2. Persistent CGA Modifier
2.1.8.5.3. Making non-persistent CGAs persistent
2.1.8.5.4. Booting from a saved configuration file
2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.1.8.6.1. 6PE Control Plane Support
2.1.8.6.2. 6PE Data Plane Support
2.1.9. Static Route Resolution Using Tunnels
2.1.9.1. Static Route ECMP Support
2.2. Weighted Load Balancing over MPLS LSP
2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.2.1.1. Feature Configuration
2.2.1.2. Feature Behavior
2.2.1.3. ECMP Considerations
2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.2.1.4.1. Feature Configuration
2.2.1.4.2. Feature Behavior
2.2.2. Weighted Load Balancing for 6PE
2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
2.3.1. Feature Configuration
2.3.2. Feature Behavior
2.3.3. Feature Limitations
2.3.4. Data Path Support
2.3.5. Example Configuration and Default CBF Set Election
2.4. Bidirectional Forwarding Detection
2.4.1. BFD Control Packet
2.4.2. Control Packet Format
2.4.3. BFD for RSVP-TE
2.4.4. Echo Support
2.4.5. BFD Support for BGP
2.4.6. Centralized BFD
2.4.6.1. IES Over Spoke SDP
2.4.6.2. BFD Over LAG and VSM Interfaces
2.4.6.3. LSP BFD and VCCV BFD
2.4.7. Aggregate Next Hop
2.4.8. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.4.8.1. Invalidate Next-Hop Based on IPV4 ARP
2.4.8.2. Invalidate Next-Hop Based on Neighbor Cache State
2.4.9. LDP Shortcut for IGP Route Resolution
2.4.9.1. IGP Route Resolution
2.4.9.2. LDP-IGP Synchronization
2.4.9.3. LDP Shortcut Forwarding Plane
2.4.9.4. ECMP Considerations
2.4.9.5. Handling of Control Packets
2.4.9.6. Handling of Multicast Packets
2.4.9.7. Interaction with BGP Route Resolution to an LDP FEC
2.4.9.8. Interaction with Static Route Resolution to an LDP FEC
2.4.9.9. LDP Control Plane
2.5. Weighted Load-Balancing over Interface Next-hops
2.6. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
2.6.1. Feature Configuration
2.6.2. MPLS-over-GRE and IP-over-GRE Termination Function
2.6.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
2.6.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
2.6.5. LER and LSR Hashing Support
2.7. GRE Tunnel Overview
2.7.1. Sample GRE Tunnel Configurations
2.8. Router Interface Encryption with NGE
2.8.1. NGE Domains
2.8.1.1. Private IP/MPLS Network NGE Domain
2.8.1.2. Private Over Intermediary Network NGE Domain
2.8.2. Router Interface NGE Domain Concepts
2.8.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
2.8.4. EVPN-VXLAN Tunnels and Services
2.8.5. Router Encryption Exceptions using ACLs
2.8.6. IPSec Packets Crossing an NGE Domain
2.8.7. Multicast Packets Traversing the NGE Domain
2.8.8. Assigning Key Groups to Router Interfaces
2.8.9. NGE and BFD Support
2.8.10. NGE and ACL Interactions
2.8.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
2.8.12. 1588v2 Encryption With NGE
2.9. Process Overview
2.10. Configuration Notes
2.11. Configuring an IP Router with CLI
2.11.1. Router Configuration Overview
2.11.1.1. System Interface
2.11.1.2. Network Interface
2.11.2. Basic Configuration
2.11.3. Common Configuration Tasks
2.11.3.1. Configuring a System Name
2.11.3.2. Configuring Interfaces
2.11.3.2.1. Configuring a System Interface
2.11.3.2.2. Configuring a Network Interface
2.11.3.2.3. Assigning a Key Group to a Router Interface
2.11.3.2.4. Configuring IPv6 Parameters
2.11.3.2.5. Configuring IPv6 Over IPv4 Parameters
2.11.3.2.6. Tunnel Ingress Node
2.11.3.2.7. Tunnel Egress Node
2.11.3.2.8. Router Advertisement
2.11.3.2.9. Configuring IPv6 Parameters
2.11.3.2.10. Configuring Proxy ARP
2.11.3.2.11. Creating an IP Address Range
2.11.3.3. Deriving the Router ID
2.11.3.4. Configuring a Confederation
2.11.3.5. Configuring an Autonomous System
2.11.3.6. Configuring Overload State on a Single SFM
2.12. Service Management Tasks
2.12.1. Changing the System Name
2.12.2. Modifying Interface Parameters
2.12.3. Removing a Key Group from a Router Interface
2.12.4. Changing the Key Group for a Router Interface
2.12.5. Deleting a Logical IP Interface
2.13. IP Router Configuration Command Reference
2.13.1. Command Hierarchies
2.13.1.1. Router Commands
2.13.1.2. Router BFD Commands
2.13.1.3. Router L2TP Commands
2.13.1.4. Router Interface Commands
2.13.1.5. Router Interface IPv6 Commands
2.13.1.6. Router Advertisement Commands
2.13.2. Command Descriptions
2.13.2.1. Generic Commands
2.13.2.2. Router Global Commands
2.13.2.3. Router L2TP Commands
2.13.2.3.1. Router L2TP Tunnel Commands
2.13.2.4. Router Interface Commands
2.13.2.4.1. Router Interface Filter Commands
2.13.2.4.2. Router Interface ICMP Commands
2.13.2.4.3. Router Interface IPv6 Commands
2.13.2.4.4. Router Interface DHCP Commands
2.13.2.5. Router Interface Encryption Commands
2.13.2.6. Router Advertisement Commands
2.14. Show, Clear, and Debug Command Reference
2.14.1. Command Hierarchies
2.14.1.1. Show Commands
2.14.1.2. Clear Commands
2.14.1.3. Debug Commands
2.14.1.4. Tools Commands
2.14.2. Command Descriptions
2.14.2.1. Show Commands
2.14.2.1.1. L2TP Show Commands
2.14.2.2. Clear Commands
2.14.2.3. Debug Commands
2.14.2.4. Tools Commands
3. VRRP
3.1. VRRP Overview
3.2. VRRP Components
3.2.1. Virtual Router
3.2.2. IP Address Owner
3.2.3. Primary and Secondary IP Addresses
3.2.4. Virtual Router Master
3.2.5. Virtual Router Backup
3.2.6. Owner and Non-Owner VRRP
3.2.7. Configurable Parameters
3.2.7.1. Virtual Router ID (VRID)
3.2.7.2. Priority
3.2.7.3. IP Addresses
3.2.7.4. Message Interval and Master Inheritance
3.2.7.5. Skew Time
3.2.7.6. Master Down Interval
3.2.7.7. Preempt Mode
3.2.7.8. VRRP Message Authentication
3.2.7.8.1. Authentication Type 0 – No Authentication
3.2.7.8.2. Authentication Type 1 – Simple Text Password
3.2.7.8.3. Authentication Failure
3.2.7.9. Authentication Data
3.2.7.10. Virtual MAC Address
3.2.7.11. VRRP Advertisement Message IP Address List Verification
3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.2.7.13. IPv6 Virtual Router Instance Operationally Up
3.2.7.14. Policies
3.3. VRRP Priority Control Policies
3.3.1. VRRP Virtual Router Policy Constraints
3.3.2. VRRP Virtual Router Instance Base Priority
3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.3.4. VRRP Priority Control Policy Priority Events
3.3.4.1. Priority Event Hold-Set Timers
3.3.4.2. Port Down Priority Event
3.3.4.3. LAG Degrade Priority Event
3.3.4.4. Host Unreachable Priority Event
3.3.4.5. Route Unknown Priority Event
3.4. VRRP Non-Owner Accessibility
3.4.1. Non-Owner Access Ping Reply
3.4.2. Non-Owner Access Telnet
3.4.3. Non-Owner Access SSH
3.5. VRRP Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.7. Configuring VRRP with CLI
3.7.1. VRRP Configuration Overview
3.7.1.1. Preconfiguration Requirements
3.7.2. Basic VRRP Configurations
3.7.2.1. VRRP Policy
3.7.2.2. VRRP IES Service Parameters
3.7.2.2.1. Configure VRRP for IPv6
3.7.2.3. VRRP Router Interface Parameters
3.7.3. Common Configuration Tasks
3.7.3.1. Creating Interface Parameters
3.7.4. Configuring VRRP Policy Components
3.7.4.1. Configuring Service VRRP Parameters
3.7.4.1.1. Non-Owner VRRP Example
3.7.4.1.2. Owner Service VRRP
3.7.4.2. Configuring Router Interface VRRP Parameters
3.7.4.2.1. Router Interface VRRP Non-Owner
3.7.4.2.2. Router Interface VRRP Owner
3.8. VRRP Configuration Management Tasks
3.8.1. Modifying a VRRP Policy
3.8.1.1. Deleting a VRRP Policy
3.8.2. Modifying Service and Interface VRRP Parameters
3.8.2.1. Modifying Non-Owner Parameters
3.8.2.2. Modifying Owner Parameters
3.8.2.3. Deleting VRRP from an Interface or Service
3.9. VRRP Configuration Command Reference
3.9.1. Command Hierarchies
3.9.1.1. IPv4 Interface VRRP Commands
3.9.1.2. Router Interface Commands
3.9.1.3. IPv6 Interface VRRP Commands
3.9.1.4. Priority Control Event Policy Commands
3.9.2. Command Descriptions
3.9.2.1. Interface Configuration Commands
3.9.2.2. Priority Policy Commands
3.9.2.3. Priority Policy Event Commands
3.9.2.4. Priority Policy Port Down Event Commands
3.9.2.5. Priority Policy LAG Events Commands
3.9.2.6. Priority Policy Host Unreachable Event Commands
3.9.2.7. Priority Policy Route Unknown Event Commands
3.10. Show, Monitor, Clear, and Debug Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Show Commands
3.10.1.2. Monitor Commands
3.10.1.3. Clear Commands
3.10.1.4. Debug Commands
3.10.2. Command Descriptions
3.10.2.1. Show Commands
3.10.2.2. Monitor Commands
3.10.2.3. Clear Commands
3.10.2.4. Debug Commands
4. Filter Policies
4.1. ACL Filter Policy Overview
4.1.1. Filter Policy Basics
4.1.1.1. Filter Policy Packet Match Criteria
4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.1.1.3. MAC Filter Policy Entry Match Criteria
4.1.1.4. IP Exception Filters
4.1.1.5. Filter Policy Actions
4.1.1.6. Viewing Filter Policy Actions
4.1.1.7. Filter Policy Statistics
4.1.1.8. Filter Policy Logging
4.1.1.9. Filter Policy cflowd Sampling
4.1.1.10. Filter Policy Management
4.1.1.10.1. Modifying Existing Filter Policy
4.1.1.10.2. Filter Policy Copy and Renumbering
4.1.1.11. Storing Filter Entries
4.1.1.11.1. FP4-based Cards
4.1.2. Filter Policy Advanced Topics
4.1.2.1. Match List for Filter Policies
4.1.2.1.1. Apply-Path — Auto-Generation of Prefix List Entries
4.1.2.2. Embedded Filters
4.1.2.3. System-level IPv4/IPv6 Line Card Filter Policy
4.1.2.4. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.1.2.5. Extended Action for Performing Two Actions at a Time
4.1.2.6. Advanced VPRN Redirection
4.1.2.7. Destination MAC Rewrite When Deploying Policy-Based Forwarding
4.1.2.8. Network-port VPRN Filter Policy
4.1.2.9. ISID MAC Filters
4.1.2.10. VID MAC Filters
4.1.2.10.1. Arbitrary Bit Matching of VID Filters
4.1.2.10.2. Port Group Configuration Example
4.1.2.11. IP Exception Filters
4.1.2.12. Redirect Policies
4.1.2.12.1. Router Instance Support for Redirect Policies
4.1.2.13. HTTP-redirect (Captive Portal)
4.1.2.13.1. Traffic Flow
4.1.2.14. Filter Policies and Dynamic Policy-Driven Interfaces
4.1.2.15. Filter Policy-based ESM Service Chaining
4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
4.2. Configuring Filter Policies with CLI
4.2.1. Common Configuration Tasks
4.2.1.1. Creating an IPv4 Filter Policy
4.2.1.1.1. IPv4 Filter Entry
4.2.1.2. Creating an IPv6 Filter Policy
4.2.1.3. Creating a MAC Filter Policy
4.2.1.3.1. MAC Filter Policy
4.2.1.3.2. MAC ISID Filter Policy
4.2.1.3.3. MAC VID Filter Policy
4.2.1.3.4. MAC Filter Entry
4.2.1.4. Creating an IP Exception Filter Policy
4.2.1.4.1. IP Exception Filter Policy
4.2.1.4.2. IP Exception Entry Matching Criteria
4.2.1.5. Creating a Match List for Filter Policies
4.2.1.6. Applying Filter Policies
4.2.1.6.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
4.2.1.6.2. Applying IPv4/IPv6 Filter Policies to a Network Port
4.2.1.7. Creating a Redirect Policy
4.2.1.8. Configuring Filter-Based GRE Tunneling
4.3. Filter Management Tasks
4.3.1. Renumbering Filter Policy Entries
4.3.2. Modifying a Filter Policy
4.3.3. Deleting a Filter Policy
4.3.4. Modifying a Redirect Policy
4.3.5. Deleting a Redirect Policy
4.3.6. Copying Filter Policies
4.4. Filter Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. IPv4 Filter Policy Commands
4.4.1.2. IPv6 Filter Policy Commands
4.4.1.3. MAC Filter Commands
4.4.1.4. GRE Tunnel Template Configuration Commands
4.4.1.5. IP Exception Filter Policy Configuration Commands
4.4.1.6. System Filter Policy Commands
4.4.1.7. Redirect Policy Configuration Commands
4.4.1.8. Match Filter List Commands
4.4.1.9. Log Filter Commands
4.4.1.10. Copy Filter Commands
4.4.1.11. Model-Driven Automatic ID Commands
4.4.2. Command Descriptions
4.4.2.1. Generic Commands
4.4.2.2. Global Filter Commands
4.4.2.3. Filter Log Commands
4.4.2.4. ACL Filter Policy Commands
4.4.2.5. General Filter Entry Commands
4.4.2.6. IP (v4/v6) and IP Exception Filter Entry Commands
4.4.2.7. Match List Configuration Commands
4.4.2.8. MAC Filter Entry Commands
4.4.2.9. MAC Filter Match Criteria
4.4.2.10. IP Exception Filter Policy Commands
4.4.2.11. GRE Tunnel Template Configuration Commands
4.4.2.12. Policy and Entry Maintenance Commands
4.4.2.13. Redirect Policy Commands
4.4.2.14. Model-Driven Automatic ID Commands
4.5. Show, Clear, Monitor, and Debug Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Monitor Commands
4.5.1.4. Debug Commands
4.5.1.5. Tools Commands
4.5.2. Command Descriptions
4.5.2.1. Show Commands
4.5.2.2. Clear Commands
4.5.2.3. Monitor Commands
4.5.2.4. Debug Commands
5. Hybrid OpenFlow Switch
5.1. In This Chapter
5.2. Hybrid OpenFlow Switching
5.2.1. Redundant Controllers and Multiple Switch Instances
5.2.2. GRT-only and Multi-Service H-OFS Modes of Operations
5.2.2.1. Port and VLAN ID Match in Flow Table Entries
5.2.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.2.4. Hybrid OpenFlow Switch Statistics
5.2.5. OpenFlow Switch Auxiliary Channels
5.2.6. Hybrid OpenFlow Switch Traffic Steering Details
5.2.6.1. SR OS H-OFS Logical Port
5.2.6.2. SR OS H-OFS Port and VLAN Encoding
5.2.6.3. Redirect to IP next-hop
5.2.6.4. Redirect to GRT Instance or VRF Instance
5.2.6.5. Redirect to Next-hop and VRF/GRT Instance
5.2.6.6. Redirect to ESI (L2)
5.2.6.7. Redirect to ESI (L3)
5.2.6.8. Redirect to ESI IP VAS-Interface Router
5.2.6.9. Redirect to LSP
5.2.6.10. Redirect to NAT
5.2.6.11. Redirect to SAP
5.2.6.12. Redirect to SDP
5.2.6.13. Redirect to a Specific LSP Used by a VPRN Service
5.2.6.14. Forward Action
5.2.6.15. Drop Action
5.2.6.16. Default No-match Action
5.2.6.17. Programming of DSCP Remark Action
5.3. Configuration Notes
5.4. OpenFlow Command Reference
5.4.1. Command Hierarchies
5.4.1.1. OpenFlow Commands
5.4.1.2. Show Commands
5.4.1.3. Tools Commands
5.4.2. Command Descriptions
5.4.2.1. Generic Commands
5.4.2.2. Show Commands
5.4.2.3. Debug Commands
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.1.1. Version 8
6.1.1.2. Version 9
6.1.1.3. Version 10
6.1.2. Cflowd Filter Matching
6.2. Cflowd Configuration Process Overview
6.3. Configuration Notes
6.4. Configuring Cflowd with CLI
6.4.1. Cflowd Configuration Overview
6.4.1.1. Traffic Sampling
6.4.1.2. Collectors
6.4.1.2.1. Aggregation
6.4.2. Basic Cflowd Configuration
6.4.3. Common Configuration Tasks
6.4.3.1. Global Cflowd Components
6.4.3.2. Enabling Cflowd
6.4.3.3. Configuring Global Cflowd Parameters
6.4.3.4. Configuring Cflowd Collectors
6.4.3.4.1. Version 9 and Version 10 Templates
6.4.3.5. Specifying Cflowd Options on an IP Interface
6.4.3.5.1. Interface Configurations
6.4.3.5.2. Service Interfaces
6.4.3.6. Specifying Sampling Options in Filter Entries
6.4.3.6.1. Filter Configurations
6.4.3.6.2. Dependencies
6.5. Cflowd Configuration Management Tasks
6.5.1. Modifying Global Cflowd Components
6.5.2. Modifying Cflowd Collector Parameters
6.6. Cflowd Configuration Command Reference
6.6.1. Command Hierarchies
6.6.2. Command Descriptions
6.6.2.1. Global Commands
6.7. Show, Tools, and Clear Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.1.2. Tools Commands
6.7.1.3. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
6.7.2.2. Tools Commands
6.7.2.3. Clear Commands
7. Standards and Protocol Support
Customer Document and Product Support
Services Overview Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.1.2.1. Multipoint Shared Queuing
2.1.2.1.1. Ingress Queuing Modes of Operation
2.1.2.1.2. Ingress Service Queuing
2.1.2.1.3. Ingress Shared Queuing
2.1.2.1.4. Ingress Multipoint Shared Queuing
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. Service Access Points (SAPs)
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Default SAP on a Dot1q Port
2.3.2.4. QinQ SAPs
2.3.2.5. Services and SAP Encapsulations
2.3.2.6. SAP Configuration Considerations
2.3.2.7. G.8032 Protected Ethernet Rings
2.3.2.8. SAP Bandwidth CAC
2.3.2.8.1. CAC Enforcement
2.3.3. Connection Profile VLAN SAPs
2.3.3.1. Using connection-profile-vlan in Dot1q Ports
2.3.3.2. Using connection-profile-vlan in QinQ Ports
2.3.4. Service Distribution Points
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. SDP Selection Rules
2.3.4.7. Class-Based Forwarding
2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.3.5. SAP and MPLS Binding Loopback with MAC Swap
2.3.6. Promiscuous ETH-LBM Mode of Operation
2.4. Multi-Service Sites
2.5. G.8031 Protected Ethernet Tunnels
2.5.1. OAM Considerations
2.5.2. QoS Considerations
2.5.3. Mirroring and Lawful Intercept Considerations
2.5.4. Support Service and Solution Combinations
2.5.5. LAG Emulation using Ethernet Tunnels
2.6. G.8032 Ethernet Ring Protection Switching
2.6.1. Overview of G.8032 Operation
2.6.2. Ethernet Ring Sub-Rings
2.6.2.1. Virtual and Non-Virtual Channel
2.6.2.2. LAG Support
2.6.3. OAM Considerations
2.6.4. Support Service and Solution Combinations
2.7. Internal Objects Created for L2TP and NAT
2.8. Ethernet Unnumbered Interfaces
2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
2.10. Network Group Encryption (NGE)
2.10.1. NGE Overview
2.10.1.1. NGE Key Groups and Encryption Partitions
2.10.1.2. Network Services Platform Management
2.10.2. Key Groups
2.10.2.1. Key Group Algorithms
2.10.2.1.1. Encapsulating Security Payload
2.10.2.2. Security Associations
2.10.2.2.1. Active Outbound SA
2.10.3. Services Encryption
2.10.3.1. Services Encryption Overview
2.10.3.2. Assigning Key Groups to Services
2.10.3.3. Pseudowire Switching for NGE Traffic
2.10.3.4. Pseudowire Control Word for NGE Traffic
2.10.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
2.10.3.6. NGE and RFC 3107
2.10.4. NGE Packet Overhead and MTU Considerations
2.10.5. Statistics
2.10.6. Remote Network Monitoring Support
2.10.7. Configuration Notes
2.11. Service Creation Process Overview
2.12. Deploying and Provisioning Services
2.12.1. Phase 1: Core Network Construction
2.12.2. Phase 2: Service Administration
2.12.3. Phase 3: Service Provisioning
2.13. Configuration Notes
2.13.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.14.2. Basic Configurations
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring Customers
2.14.3.1.1. Customer Information
2.14.3.1.2. Configuring Multi-Service-Sites
2.14.3.2. Configuring an SDP
2.14.3.2.1. SDP Configuration Tasks
2.14.3.2.2. Configuring an SDP
2.14.3.2.3. Configuring a Mixed-LSP SDP
2.15. Ethernet Connectivity Fault Management (ETH-CFM)
2.15.1. Facility MEPs
2.15.1.1. Common Actionable Failures
2.15.1.2. General Detection, Processing and Reaction
2.15.1.3. Port-Based MEP
2.15.1.4. LAG Based MEP
2.15.1.5. Tunnel Based MEP
2.15.1.6. Router Interface MEP
2.15.1.7. Hardware Support
2.15.2. ETH-CFM and MC-LAG
2.15.2.1. ETH-CFM and MC-LAG Default Behavior
2.15.2.2. Linking ETH-CFM to MC-LAG State
2.15.3. ETH-CFM Features
2.15.3.1. CCM Hold Timers
2.15.3.2. CCM Interval
2.15.4. Configuring ETH-CFM Parameters
2.16. Configuring NGE with CLI
2.16.1. Basic NGE Configuration Overview
2.16.2. Configuring NGE Components
2.16.2.1. Configuring the Global Encryption Label
2.16.2.2. Configuring a Key Group
2.16.2.3. Assigning a Key Group to an SDP or VPRN Service
2.17. Global Service Entity Management Tasks
2.17.1. Modifying Customer Accounts
2.17.2. Deleting Customers
2.17.3. Modifying SDPs
2.17.4. Deleting SDPs
2.18. NGE Management Tasks
2.18.1. Modifying a Key Group
2.18.2. Removing a Key Group
2.18.2.1. Removing a Key Group from an SDP or VPRN Service
2.18.3. Changing Key Groups
2.18.3.1. Changing the Key Group for an SDP or VPRN Service
2.18.4. Deleting a Key Group from an NGE Node
2.19. Global Services Configuration Command Reference
2.19.1. Command Hierarchies
2.19.1.1. Customer Commands
2.19.1.2. MRP Commands
2.19.1.3. Service System Commands
2.19.1.4. Oper Group Commands
2.19.1.5. Pseudowire (PW) Commands
2.19.1.5.1. PW Port Commands
2.19.1.6. SDP Commands
2.19.1.7. SAP Commands
2.19.1.8. Ethernet Ring Commands
2.19.1.9. ETH CFM Configuration Commands
2.19.1.10. ETH Tunnel Commands
2.19.1.11. Connection Profile VLAN Commands
2.19.1.12. Network Group Encryption (NGE) Commands
2.19.1.13. NGE Services Commands
2.19.1.14. Model-Driven Automatic ID Commands
2.19.2. Command Descriptions
2.19.2.1. Generic Commands
2.19.2.2. Customer Management Commands
2.19.2.3. MRP Commands
2.19.2.4. Service System Commands
2.19.2.5. Oper Group Commands
2.19.2.6. Pseudowire (PW) Commands
2.19.2.6.1. PW Port Commands
2.19.2.7. SDP Commands
2.19.2.8. Ethernet Ring Commands
2.19.2.9. ETH CFM Configuration Commands
2.19.2.10. Port and LAG ETH CFM Commands
2.19.2.11. ETH-Tunnel Commands
2.19.2.12. Connection Profile VLAN Commands
2.19.2.13. Network Group Encryption (NGE) Commands
2.19.2.14. NGE Services Commands
2.19.2.15. Model-Driven Automatic ID Commands
2.20. Show, Clear, and Tools Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Show Commands
2.20.1.1.1. ETH-CFM Show Commands
2.20.1.1.2. PW-Port Show Commands
2.20.1.1.3. NGE Show Commands
2.20.1.2. Clear Commands
2.20.1.3. Tools Perform Commands
2.20.1.4. Tools Dump Commands
2.20.2. Command Descriptions
2.20.2.1. Service Commands
2.20.2.2. Connection Profile VLAN Commands
2.20.2.3. ETH-CFM Show Commands
2.20.2.4. PW-Port Show Commands
2.20.2.5. NGE Show Commands
2.20.2.6. Clear Commands
2.20.2.7. Tools Perform Commands
2.20.2.8. Tools Dump Commands
3. Common CLI Command Descriptions
3.1. In This Chapter
3.1.1. Common Service Commands
3.1.1.1. SAP Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.1.2.1. Multipoint Shared Queuing
2.1.2.1.1. Ingress Queuing Modes of Operation
2.1.2.1.2. Ingress Service Queuing
2.1.2.1.3. Ingress Shared Queuing
2.1.2.1.4. Ingress Multipoint Shared Queuing
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. Service Access Points (SAPs)
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Default SAP on a Dot1q Port
2.3.2.4. QinQ SAPs
2.3.2.5. Services and SAP Encapsulations
2.3.2.6. SAP Configuration Considerations
2.3.2.7. G.8032 Protected Ethernet Rings
2.3.2.8. SAP Bandwidth CAC
2.3.2.8.1. CAC Enforcement
2.3.3. Connection Profile VLAN SAPs
2.3.3.1. Using connection-profile-vlan in Dot1q Ports
2.3.3.2. Using connection-profile-vlan in QinQ Ports
2.3.4. Service Distribution Points
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. SDP Selection Rules
2.3.4.7. Class-Based Forwarding
2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.3.5. SAP and MPLS Binding Loopback with MAC Swap
2.3.6. Promiscuous ETH-LBM Mode of Operation
2.4. Multi-Service Sites
2.5. G.8031 Protected Ethernet Tunnels
2.5.1. OAM Considerations
2.5.2. QoS Considerations
2.5.3. Mirroring and Lawful Intercept Considerations
2.5.4. Support Service and Solution Combinations
2.5.5. LAG Emulation using Ethernet Tunnels
2.6. G.8032 Ethernet Ring Protection Switching
2.6.1. Overview of G.8032 Operation
2.6.2. Ethernet Ring Sub-Rings
2.6.2.1. Virtual and Non-Virtual Channel
2.6.2.2. LAG Support
2.6.3. OAM Considerations
2.6.4. Support Service and Solution Combinations
2.7. Internal Objects Created for L2TP and NAT
2.8. Ethernet Unnumbered Interfaces
2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
2.10. Network Group Encryption (NGE)
2.10.1. NGE Overview
2.10.1.1. NGE Key Groups and Encryption Partitions
2.10.1.2. Network Services Platform Management
2.10.2. Key Groups
2.10.2.1. Key Group Algorithms
2.10.2.1.1. Encapsulating Security Payload
2.10.2.2. Security Associations
2.10.2.2.1. Active Outbound SA
2.10.3. Services Encryption
2.10.3.1. Services Encryption Overview
2.10.3.2. Assigning Key Groups to Services
2.10.3.3. Pseudowire Switching for NGE Traffic
2.10.3.4. Pseudowire Control Word for NGE Traffic
2.10.3.5. VPRN Layer 3 Spoke-SDP Encryption and MP-BGP-based VPRN Encryption Interaction
2.10.3.6. NGE and RFC 3107
2.10.4. NGE Packet Overhead and MTU Considerations
2.10.5. Statistics
2.10.6. Remote Network Monitoring Support
2.10.7. Configuration Notes
2.11. Service Creation Process Overview
2.12. Deploying and Provisioning Services
2.12.1. Phase 1: Core Network Construction
2.12.2. Phase 2: Service Administration
2.12.3. Phase 3: Service Provisioning
2.13. Configuration Notes
2.13.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.14.2. Basic Configurations
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring Customers
2.14.3.1.1. Customer Information
2.14.3.1.2. Configuring Multi-Service-Sites
2.14.3.2. Configuring an SDP
2.14.3.2.1. SDP Configuration Tasks
2.14.3.2.2. Configuring an SDP
2.14.3.2.3. Configuring a Mixed-LSP SDP
2.15. Ethernet Connectivity Fault Management (ETH-CFM)
2.15.1. Facility MEPs
2.15.1.1. Common Actionable Failures
2.15.1.2. General Detection, Processing and Reaction
2.15.1.3. Port-Based MEP
2.15.1.4. LAG Based MEP
2.15.1.5. Tunnel Based MEP
2.15.1.6. Router Interface MEP
2.15.1.7. Hardware Support
2.15.2. ETH-CFM and MC-LAG
2.15.2.1. ETH-CFM and MC-LAG Default Behavior
2.15.2.2. Linking ETH-CFM to MC-LAG State
2.15.3. ETH-CFM Features
2.15.3.1. CCM Hold Timers
2.15.3.2. CCM Interval
2.15.4. Configuring ETH-CFM Parameters
2.16. Configuring NGE with CLI
2.16.1. Basic NGE Configuration Overview
2.16.2. Configuring NGE Components
2.16.2.1. Configuring the Global Encryption Label
2.16.2.2. Configuring a Key Group
2.16.2.3. Assigning a Key Group to an SDP or VPRN Service
2.17. Global Service Entity Management Tasks
2.17.1. Modifying Customer Accounts
2.17.2. Deleting Customers
2.17.3. Modifying SDPs
2.17.4. Deleting SDPs
2.18. NGE Management Tasks
2.18.1. Modifying a Key Group
2.18.2. Removing a Key Group
2.18.2.1. Removing a Key Group from an SDP or VPRN Service
2.18.3. Changing Key Groups
2.18.3.1. Changing the Key Group for an SDP or VPRN Service
2.18.4. Deleting a Key Group from an NGE Node
2.19. Global Services Configuration Command Reference
2.19.1. Command Hierarchies
2.19.1.1. Customer Commands
2.19.1.2. MRP Commands
2.19.1.3. Service System Commands
2.19.1.4. Oper Group Commands
2.19.1.5. Pseudowire (PW) Commands
2.19.1.5.1. PW Port Commands
2.19.1.6. SDP Commands
2.19.1.7. SAP Commands
2.19.1.8. Ethernet Ring Commands
2.19.1.9. ETH CFM Configuration Commands
2.19.1.10. ETH Tunnel Commands
2.19.1.11. Connection Profile VLAN Commands
2.19.1.12. Network Group Encryption (NGE) Commands
2.19.1.13. NGE Services Commands
2.19.1.14. Model-Driven Automatic ID Commands
2.19.2. Command Descriptions
2.19.2.1. Generic Commands
2.19.2.2. Customer Management Commands
2.19.2.3. MRP Commands
2.19.2.4. Service System Commands
2.19.2.5. Oper Group Commands
2.19.2.6. Pseudowire (PW) Commands
2.19.2.6.1. PW Port Commands
2.19.2.7. SDP Commands
2.19.2.8. Ethernet Ring Commands
2.19.2.9. ETH CFM Configuration Commands
2.19.2.10. Port and LAG ETH CFM Commands
2.19.2.11. ETH-Tunnel Commands
2.19.2.12. Connection Profile VLAN Commands
2.19.2.13. Network Group Encryption (NGE) Commands
2.19.2.14. NGE Services Commands
2.19.2.15. Model-Driven Automatic ID Commands
2.20. Show, Clear, and Tools Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Show Commands
2.20.1.1.1. ETH-CFM Show Commands
2.20.1.1.2. PW-Port Show Commands
2.20.1.1.3. NGE Show Commands
2.20.1.2. Clear Commands
2.20.1.3. Tools Perform Commands
2.20.1.4. Tools Dump Commands
2.20.2. Command Descriptions
2.20.2.1. Service Commands
2.20.2.2. Connection Profile VLAN Commands
2.20.2.3. ETH-CFM Show Commands
2.20.2.4. PW-Port Show Commands
2.20.2.5. NGE Show Commands
2.20.2.6. Clear Commands
2.20.2.7. Tools Perform Commands
2.20.2.8. Tools Dump Commands
3. Common CLI Command Descriptions
3.1. In This Chapter
3.1.1. Common Service Commands
3.1.1.1. SAP Commands
4. Standards and Protocol Support
Customer Document and Product Support
System Management Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.1.4. LDAP Authentication
2.1.1.4.1. LDAP Authentication Process
2.1.1.4.2. Authentication Order
2.1.1.4.3. LDAP Authentication via Password
2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.1.1.4.5. TLS Behavior and LDAP
2.1.1.4.6. LDAP Health Check
2.1.1.4.7. LDAP Redundancy and TLS
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.2.3.1. Examples
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Centralized CPU Protection
2.3.1. CPU Protection Extensions for ETH-CFM
2.3.2. ETH-CFM Ingress Squelching
2.4. Distributed CPU Protection (DCP)
2.4.1. Applicability of Distributed CPU Protection
2.4.2. Log Events, Statistics, Status and SNMP support
2.4.3. DCP Policer Resource Management
2.4.4. Operational Guidelines and Tips
2.5. Classification-Based Priority for Extracted Protocol Traffic
2.6. Vendor-Specific Attributes (VSAs)
2.7. Other Security Features
2.7.1. Secure Shell (SSH)
2.7.2. SSH PKI Authentication
2.7.2.1. Key Generation
2.7.3. HMAC strengthening (SHA-224/256/384/512)
2.7.4. MAC Client and Server List
2.7.5. Regenerate the ssh-key without disabling SSH
2.7.5.1. Key re-exchange procedure
2.7.6. Per Peer CPM Queuing
2.7.7. CPM Filters and Traffic Management
2.7.8. TTL Security for BGP and LDP
2.7.9. Exponential Login Backoff
2.7.10. User Lockout
2.7.11. CLI Login Scripts
2.7.12. 802.1x Network Access Control
2.7.13. TCP Enhanced Authentication Option
2.7.13.1. Packet Formats
2.7.13.2. Keychain
2.7.14. gRPC Authentication
2.8. Configuration Notes
2.8.1. General
2.9. Configuring Security with CLI
2.9.1. Security Configurations
2.9.2. Security Configuration Procedures
2.9.2.1. Configuring Management Access Filters
2.9.2.2. Configuring IP CPM Filters Policy
2.9.2.3. Configuring MAC CPM Filters
2.9.2.4. Configuring IPv6 CPM Filters
2.9.2.5. Configuring CPM Queues
2.9.2.6. IPSec Certificates Parameters
2.9.2.7. Configuring Profiles
2.9.2.7.1. Parameters
2.9.2.7.2. Wildcards
2.9.2.7.3. CLI Resource Management
2.9.2.8. Configuring Users
2.9.2.9. Configuring Keychains
2.9.2.10. Copying and Overwriting Users and Profiles
2.9.2.10.1. User
2.9.2.10.2. Profile
2.9.3. RADIUS Configurations
2.9.3.1. Configuring RADIUS Authentication
2.9.3.2. Configuring RADIUS Authorization
2.9.3.3. Configuring RADIUS Accounting
2.9.4. Configuring 802.1x RADIUS Policies
2.9.5. TACACS+ Configurations
2.9.5.1. Enabling TACACS+ Authentication
2.9.5.2. Configuring TACACS+ Authorization
2.9.5.3. Configuring TACACS+ Accounting
2.9.5.4. Enabling SSH
2.9.6. LDAP Configurations
2.9.6.1. Configuring LDAP Authentication
2.9.6.2. Configuring Redundant Servers
2.9.6.3. Enabling SSH
2.9.7. Configuring Login Controls
2.10. Security Configuration Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Security Commands
2.10.1.1.1. LLDP Commands
2.10.1.1.2. Management Access Filter Commands
2.10.1.1.3. CLI Script Authorization Commands
2.10.1.1.4. CPM Filter Commands
2.10.1.1.5. CPM Queue Commands
2.10.1.1.6. CPU Protection Commands
2.10.1.1.7. Distributed CPU Protection Commands
2.10.1.1.8. Extracted Protocol Traffic Priority Commands
2.10.1.1.9. Security Password Commands
2.10.1.1.10. Public Key Infrastructure (PKI) Commands
2.10.1.1.11. Profile Commands
2.10.1.1.12. CLI Session Commands
2.10.1.1.13. RADIUS Commands
2.10.1.1.14. SSH Commands
2.10.1.1.15. TACACS+ Client Commands
2.10.1.1.16. LDAP Commands
2.10.1.1.17. User Management Commands
2.10.1.1.18. User Template Commands
2.10.1.1.19. Dot1x Commands
2.10.1.1.20. Keychain Commands
2.10.1.1.21. TTL Security Commands
2.10.1.1.22. gRPC Commands
2.10.1.2. Login Control Commands
2.10.2. Command Descriptions
2.10.2.1. General Security Commands
2.10.2.2. Security Commands
2.10.2.3. LLDP Commands
2.10.2.4. Management Access Filter Commands
2.10.2.5. CLI Script Authorization Commands
2.10.2.6. CPM Filter Commands
2.10.2.7. CPM Queue Commands
2.10.2.8. CPU Protection Commands
2.10.2.9. Distributed CPU Protection Commands
2.10.2.10. Extracted Protocol Traffic Priority Commands
2.10.2.11. Security Password Commands
2.10.2.12. Public Key Infrastructure (PKI) Commands
2.10.2.13. Profile Commands
2.10.2.14. CLI Session Commands
2.10.2.15. RADIUS Commands
2.10.2.16. SSH Commands
2.10.2.17. TACACS+ Client Commands
2.10.2.18. LDAP Client Commands
2.10.2.19. User Management Commands
2.10.2.20. Dot1x Commands
2.10.2.21. Keychain Authentication
2.10.2.22. TTL Security Commands
2.10.2.23. gRPC Commands
2.10.2.24. Login Control Commands
2.11. Security Show, Clear, Debug, Tools, and Admin Command Reference
2.11.1. Command Hierarchies
2.11.1.1. Show Commands
2.11.1.1.1. System Security
2.11.1.1.2. Login Control
2.11.1.2. Clear Commands
2.11.1.3. Debug Commands
2.11.1.4. Tools Commands
2.11.1.5. Admin Commands
2.11.2. Command Descriptions
2.11.2.1. Show Commands
2.11.2.1.1. System Commands
2.11.2.1.2. Security Commands
2.11.2.1.3. Login Control
2.11.2.2. Clear Commands
2.11.2.2.1. CPU Protection Commands
2.11.2.3. Debug Commands
2.11.2.4. Tools Commands
2.11.2.5. Admin Commands
3. Classic and Model-Driven Management Interfaces
3.1. Model-Driven Management Interfaces
3.1.1. Prerequisites for Using Model-Driven Management Interfaces
3.2. YANG Data Models
3.2.1. SR OS YANG Data Models
3.2.2. OpenConfig YANG Data Models
3.3. Management Interface Configuration Mode
3.3.1. Loose References to IDs
3.3.2. Transitioning Between Modes
3.4. Configuring the CLI Engine
4. SNMP
4.1. SNMP Overview
4.1.1. SNMP Architecture
4.1.2. Management Information Base
4.1.3. SNMP Protocol Operations
4.1.4. SNMP Versions
4.1.5. Management Information Access Control
4.1.6. User-Based Security Model Community Strings
4.1.7. Views
4.1.8. Access Groups
4.1.9. Users
4.1.10. Per-VPRN Logs and SNMP Access
4.1.11. Per-SNMP Community Source IP Address Validation
4.2. SNMP Versions
4.3. Configuration Notes
4.3.1. General
4.4. Configuring SNMP with CLI
4.4.1. SNMP Configuration Overview
4.4.1.1. Configuring SNMPv1 and SNMPv2c
4.4.1.2. Configuring SNMPv3
4.4.2. Basic SNMP Security Configuration
4.4.3. Configuring SNMP Components
4.4.3.1. Configuring a Community String
4.4.3.2. Configuring View Options
4.4.3.3. Configuring Access Options
4.4.3.4. Configuring USM Community Options
4.4.3.5. Configuring Other SNMP Parameters
4.5. SNMP Configuration Command Reference
4.5.1. Command Hierarchies
4.5.1.1. SNMP System Commands
4.5.1.2. SNMP Security Commands
4.5.2. Command Descriptions
4.5.2.1. SNMP System Commands
4.5.2.2. SNMP Security Commands
4.6. SNMP Show Command Reference
4.6.1. Command Hierarchies
4.6.1.1. Show Commands
4.6.2. Command Descriptions
4.6.2.1. Show Commands
5. NETCONF
5.1. NETCONF Overview
5.2. NETCONF in SR OS
5.2.1. Transport and Sessions
5.2.2. Datastores and URLs
5.2.3. NETCONF Operations and Capabilities
5.2.3.1. <get>
5.2.3.2. <get-config>
5.2.3.3. <edit-config>
5.2.3.4. <copy-config> and <delete-config>
5.2.3.5. <lock>
5.2.3.6. <unlock>
5.2.3.7. <commit>
5.2.3.8. <discard-changes>
5.2.3.9. <validate>
5.2.4. Data Model, Datastore and Operation Combinations
5.2.5. General NETCONF Behavior
5.2.5.1. System-Provisioned Configuration (SPC) Objects
5.3. Establishing a NETCONF Session
5.4. XML Content Layer
5.4.1. <get> with XML Content Layer
5.4.2. <edit-config> with XML Content Layer
5.4.3. <get-config> with XML Content Layer
5.5. XML Content Layer Examples
5.6. CLI Content Layer
5.7. CLI Content Layer Examples
5.8. NETCONF Notifications
5.9. NETCONF Configuration Command Reference
5.9.1. Command Hierarchies
5.9.1.1. NETCONF System Commands
5.9.1.2. NETCONF Security Commands
5.9.2. Configuration Commands
5.9.2.1. NETCONF System Commands
5.9.2.2. NETCONF Security Commands
5.10. NETCONF Show and Debug Command Reference
5.10.1. Command Hierarchies
5.10.1.1. Show Commands
5.10.1.2. Debug Commands
5.10.2. Command Descriptions
5.10.2.1. Show Commands
5.10.2.1.1. System Commands
5.10.3. Debug Commands
5.10.3.1. NETCONF Debug Commands
5.11. NETCONF Admin Command Reference
5.11.1. Command Hierarchies
5.11.1.1. Admin Commands
5.11.2. Command Descriptions
5.11.2.1. Admin Commands
6. Event and Accounting Logs
6.1. Logging Overview
6.2. Log Destinations
6.2.1. Console
6.2.2. Session
6.2.3. CLI Logs
6.2.4. Memory Logs
6.2.5. Log Files
6.2.6. SNMP Trap Group
6.2.7. Syslog
6.2.8. NETCONF
6.3. Event Logs
6.3.1. Event Sources
6.3.2. Event Control
6.3.3. Log Manager and Event Logs
6.3.4. Event Filter Policies
6.3.5. Event Log Entries
6.3.6. Simple Logger Event Throttling
6.3.7. Default System Log
6.3.8. Event Handling System
6.4. Customizing Syslog Messages Using Python
6.4.1. Python Engine for Syslog
6.4.1.1. Python Syslog APIs
6.4.1.2. Timestamp Format Manipulation
6.4.2. Python Processing Efficiency
6.4.3. Python Backpressure
6.4.4. Event Selection for Python Processing
6.4.5. Modifying a Log File
6.4.6. Deleting a Log File
6.4.7. Modifying a File ID
6.4.8. Modifying a Syslog ID
6.4.9. Modifying an SNMP Trap Group
6.4.10. Deleting an SNMP Trap Group
6.4.11. Modifying a Log Filter
6.4.12. Modifying Event Control Parameters
6.4.13. Returning to the Default Event Control Configuration
6.5. Accounting Logs
6.5.1. Accounting Records
6.5.2. Accounting Files
6.5.3. Design Considerations
6.5.4. Reporting and Time-Based Accounting
6.5.5. Overhead Reduction in Accounting: Custom Record
6.5.5.1. User Configurable Records
6.5.5.2. Changed Statistics Only
6.5.5.3. Configurable Accounting Records
6.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
6.5.5.3.2. RADIUS Accounting in Networks Using ESM
6.5.5.4. Significant Change Only Reporting
6.5.6. Immediate Completion of Records
6.5.6.1. Record Completion for XML Accounting
6.5.7. AA Accounting per Forwarding Class
6.6. Configuration Notes
6.7. Configuring Logging with CLI
6.7.1. Log Configuration Overview
6.7.2. Log Types
6.7.3. Basic Log Configuration
6.7.4. Common Configuration Tasks
6.7.4.1. Configuring an Event Log
6.7.4.2. Configuring a File ID
6.7.4.3. Configuring an Accounting Policy
6.7.4.4. Configuring Event Control
6.7.4.5. Configuring a Log Filter
6.7.4.6. Configuring an SNMP Trap Group
6.7.4.6.1. Setting the Replay Parameter
6.7.4.6.2. Shutdown In-Band Port
6.7.4.6.3. No Shutdown Port
6.7.4.7. Configuring a Syslog Target
6.7.4.7.1. Configuring an Accounting Custom Record
6.8. Log Configuration Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Log Configuration Commands
6.8.1.2. Accounting Policy Commands
6.8.1.3. Custom Record Commands
6.8.1.4. File ID Commands
6.8.1.5. Event Filter Commands
6.8.1.6. Event Handling System (EHS) Commands
6.8.1.7. Event Trigger Commands
6.8.1.8. Log ID Commands
6.8.1.9. SNMP Trap Group Commands
6.8.1.10. Syslog Commands
6.8.2. Command Descriptions
6.8.2.1. Generic Commands
6.8.2.2. Log Configuration Commands
6.8.2.3. Accounting Policy Commands
6.8.2.3.1. Accounting Policy Custom Record Commands
6.8.2.4. File ID Commands
6.8.2.5. Event Filter Commands
6.8.2.6. Event Handling System (EHS) Commands
6.8.2.7. Event Trigger Commands
6.8.2.8. Log ID Commands
6.8.2.9. SNMP Trap Groups
6.8.2.10. Syslog Commands
6.9. Log Command Reference
6.9.1. Command Hierarchies
6.9.1.1. Show Commands
6.9.1.2. Clear Command
6.9.1.3. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. Show Commands
6.9.2.2. Clear Commands
6.9.2.3. Tools Commands
7. sFlow
7.1. sFlow Overview
7.2. sFlow Features
7.2.1. sFlow Counter Polling Architecture
7.2.2. sFlow Support on Logical Ethernet Ports
7.2.3. sFlow SAP Counter Map
7.2.4. sFlow Record Formats
7.3. sFlow Command Reference
7.3.1. Command Hierarchies
7.3.1.1. System Commands
7.3.1.2. Show Commands
7.4. sFlow Configuration Command Descriptions
7.4.1. Command Descriptions
7.4.1.1. System Commands
7.5. sFlow Show Command Descriptions
7.5.1. Command Descriptions
7.5.1.1. Show Commands
8. gRPC
8.1. Security Aspects
8.1.1. TLS-Based Encryption
8.1.2. Authentication
8.2. gNMI Service
8.2.1. gNMI Service Definitions
8.2.1.1. Capability Discovery
8.2.1.2. Get/Set RPC
8.2.1.3. Subscribe RPC
8.2.1.3.1. ON-CHANGE Subscription Mode
8.2.1.4. Schema Paths
8.2.2. gNMI Service Use Cases
8.2.2.1. Telemetry
8.2.2.1.1. Telemetry Examples
8.2.2.2. NE Configuration Management
8.3. gRPC Command Reference
8.3.1. Command Hierarchies
8.3.1.1. System Commands
8.3.1.2. QoS Commands
8.4. Telemetry Configuration Command Descriptions
8.4.1. Command Descriptions
8.4.1.1. System Commands
8.4.1.2. QoS Commands
8.5. gRPC Show, Admin Command Reference
8.5.1. Command Hierarchies
8.5.1.1. Show Commands
8.5.1.2. Tools Commands
8.5.1.3. Admin Commands
8.5.2. Command Descriptions
8.5.2.1. Show Commands
8.5.2.2. Tools Commands
8.5.2.3. Admin Commands
9. TLS
9.1. TLS Overview
9.2. TLS Server Interaction with Applications
9.2.1. TLS Application Support
9.3. TLS Handshake
9.4. TLS Client Certificate
9.5. TLS Symmetric Key Rollover
9.6. Supported TLS Ciphers
9.7. SR OS Certificate Management
9.7.1. Certificate Profile
9.7.2. TLS Server Authentication of the Client Certificate CN Field
9.7.3. CN Regexp Format
9.8. Operational Guidelines
9.8.1. Server Authentication Behavior
9.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
9.9. LDAP Redundancy and TLS
9.10. Basic TLS Configuration
9.11. Common Configuration Tasks
9.11.1. Configuring a Server TLS Profile
9.11.2. Configuring a Client TLS Profile
9.11.3. Configuring a TLS Client or TLS Server Certificate
9.11.4. Configuring a TLS Trust Anchor
9.12. TLS Command Reference
9.12.1. Command Hierarchies
9.12.1.1. Security TLS Commands
9.12.1.2. LDAP TLS Profile Commands
9.12.1.3. Admin Commands
9.12.2. Command Descriptions
9.12.2.1. Security TLS Commands
9.12.2.2. LDAP TLS Profile Commands
9.12.2.3. Admin Commands
9.13. TLS Show Command Reference
9.13.1. Command Hierarchies
9.13.1.1. Show Commands
9.13.2. Command Descriptions
9.13.2.1. Show Commands
10. Facility Alarms
10.1. Facility Alarms Overview
10.2. Facility Alarms vs. Log Events
10.3. Facility Alarm Severities and Alarm LED Behavior
10.4. Facility Alarm Hierarchy
10.5. Facility Alarm List
10.6. Configuring Logging with CLI
10.6.1. Basic Facility Alarm Configuration
10.6.2. Common Configuration Tasks
10.6.2.1. Configuring the Maximum Number of Alarms to Clear
10.7. Facility Alarms Configuration Command Reference
10.7.1. Command Hierarchies
10.7.1.1. Facility Alarm Configuration Commands
10.7.2. Command Descriptions
10.7.2.1. Generic Commands
10.8. Facility Alarms Show Command Reference
10.8.1. Command Hierarchies
10.8.1.1. Show Commands
10.8.2. Command Descriptions
10.8.2.1. Show Commands
11. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.1.4. LDAP Authentication
2.1.1.4.1. LDAP Authentication Process
2.1.1.4.2. Authentication Order
2.1.1.4.3. LDAP Authentication via Password
2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.1.1.4.5. TLS Behavior and LDAP
2.1.1.4.6. LDAP Health Check
2.1.1.4.7. LDAP Redundancy and TLS
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.2.3.1. Examples
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Centralized CPU Protection
2.3.1. CPU Protection Extensions for ETH-CFM
2.3.2. ETH-CFM Ingress Squelching
2.4. Distributed CPU Protection (DCP)
2.4.1. Applicability of Distributed CPU Protection
2.4.2. Log Events, Statistics, Status and SNMP support
2.4.3. DCP Policer Resource Management
2.4.4. Operational Guidelines and Tips
2.5. Classification-Based Priority for Extracted Protocol Traffic
2.6. Vendor-Specific Attributes (VSAs)
2.7. Other Security Features
2.7.1. Secure Shell (SSH)
2.7.2. SSH PKI Authentication
2.7.2.1. Key Generation
2.7.3. HMAC strengthening (SHA-224/256/384/512)
2.7.4. MAC Client and Server List
2.7.5. Regenerate the ssh-key without disabling SSH
2.7.5.1. Key re-exchange procedure
2.7.6. Per Peer CPM Queuing
2.7.7. CPM Filters and Traffic Management
2.7.8. TTL Security for BGP and LDP
2.7.9. Exponential Login Backoff
2.7.10. User Lockout
2.7.11. CLI Login Scripts
2.7.12. 802.1x Network Access Control
2.7.13. TCP Enhanced Authentication Option
2.7.13.1. Packet Formats
2.7.13.2. Keychain
2.7.14. gRPC Authentication
2.8. Configuration Notes
2.8.1. General
2.9. Configuring Security with CLI
2.9.1. Security Configurations
2.9.2. Security Configuration Procedures
2.9.2.1. Configuring Management Access Filters
2.9.2.2. Configuring IP CPM Filters Policy
2.9.2.3. Configuring MAC CPM Filters
2.9.2.4. Configuring IPv6 CPM Filters
2.9.2.5. Configuring CPM Queues
2.9.2.6. IPSec Certificates Parameters
2.9.2.7. Configuring Profiles
2.9.2.7.1. Parameters
2.9.2.7.2. Wildcards
2.9.2.7.3. CLI Resource Management
2.9.2.8. Configuring Users
2.9.2.9. Configuring Keychains
2.9.2.10. Copying and Overwriting Users and Profiles
2.9.2.10.1. User
2.9.2.10.2. Profile
2.9.3. RADIUS Configurations
2.9.3.1. Configuring RADIUS Authentication
2.9.3.2. Configuring RADIUS Authorization
2.9.3.3. Configuring RADIUS Accounting
2.9.4. Configuring 802.1x RADIUS Policies
2.9.5. TACACS+ Configurations
2.9.5.1. Enabling TACACS+ Authentication
2.9.5.2. Configuring TACACS+ Authorization
2.9.5.3. Configuring TACACS+ Accounting
2.9.5.4. Enabling SSH
2.9.6. LDAP Configurations
2.9.6.1. Configuring LDAP Authentication
2.9.6.2. Configuring Redundant Servers
2.9.6.3. Enabling SSH
2.9.7. Configuring Login Controls
2.10. Security Configuration Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Security Commands
2.10.1.1.1. LLDP Commands
2.10.1.1.2. Management Access Filter Commands
2.10.1.1.3. CLI Script Authorization Commands
2.10.1.1.4. CPM Filter Commands
2.10.1.1.5. CPM Queue Commands
2.10.1.1.6. CPU Protection Commands
2.10.1.1.7. Distributed CPU Protection Commands
2.10.1.1.8. Extracted Protocol Traffic Priority Commands
2.10.1.1.9. Security Password Commands
2.10.1.1.10. Public Key Infrastructure (PKI) Commands
2.10.1.1.11. Profile Commands
2.10.1.1.12. CLI Session Commands
2.10.1.1.13. RADIUS Commands
2.10.1.1.14. SSH Commands
2.10.1.1.15. TACACS+ Client Commands
2.10.1.1.16. LDAP Commands
2.10.1.1.17. User Management Commands
2.10.1.1.18. User Template Commands
2.10.1.1.19. Dot1x Commands
2.10.1.1.20. Keychain Commands
2.10.1.1.21. TTL Security Commands
2.10.1.1.22. gRPC Commands
2.10.1.2. Login Control Commands
2.10.2. Command Descriptions
2.10.2.1. General Security Commands
2.10.2.2. Security Commands
2.10.2.3. LLDP Commands
2.10.2.4. Management Access Filter Commands
2.10.2.5. CLI Script Authorization Commands
2.10.2.6. CPM Filter Commands
2.10.2.7. CPM Queue Commands
2.10.2.8. CPU Protection Commands
2.10.2.9. Distributed CPU Protection Commands
2.10.2.10. Extracted Protocol Traffic Priority Commands
2.10.2.11. Security Password Commands
2.10.2.12. Public Key Infrastructure (PKI) Commands
2.10.2.13. Profile Commands
2.10.2.14. CLI Session Commands
2.10.2.15. RADIUS Commands
2.10.2.16. SSH Commands
2.10.2.17. TACACS+ Client Commands
2.10.2.18. LDAP Client Commands
2.10.2.19. User Management Commands
2.10.2.20. Dot1x Commands
2.10.2.21. Keychain Authentication
2.10.2.22. TTL Security Commands
2.10.2.23. gRPC Commands
2.10.2.24. Login Control Commands
2.11. Security Show, Clear, Debug, Tools, and Admin Command Reference
2.11.1. Command Hierarchies
2.11.1.1. Show Commands
2.11.1.1.1. System Security
2.11.1.1.2. Login Control
2.11.1.2. Clear Commands
2.11.1.3. Debug Commands
2.11.1.4. Tools Commands
2.11.1.5. Admin Commands
2.11.2. Command Descriptions
2.11.2.1. Show Commands
2.11.2.1.1. System Commands
2.11.2.1.2. Security Commands
2.11.2.1.3. Login Control
2.11.2.2. Clear Commands
2.11.2.2.1. CPU Protection Commands
2.11.2.3. Debug Commands
2.11.2.4. Tools Commands
2.11.2.5. Admin Commands
3. Classic and Model-Driven Management Interfaces
3.1. Model-Driven Management Interfaces
3.1.1. Prerequisites for Using Model-Driven Management Interfaces
3.2. YANG Data Models
3.2.1. SR OS YANG Data Models
3.2.2. OpenConfig YANG Data Models
3.3. Management Interface Configuration Mode
3.3.1. Loose References to IDs
3.3.2. Transitioning Between Modes
3.4. Configuring the CLI Engine
4. SNMP
4.1. SNMP Overview
4.1.1. SNMP Architecture
4.1.2. Management Information Base
4.1.3. SNMP Protocol Operations
4.1.4. SNMP Versions
4.1.5. Management Information Access Control
4.1.6. User-Based Security Model Community Strings
4.1.7. Views
4.1.8. Access Groups
4.1.9. Users
4.1.10. Per-VPRN Logs and SNMP Access
4.1.11. Per-SNMP Community Source IP Address Validation
4.2. SNMP Versions
4.3. Configuration Notes
4.3.1. General
4.4. Configuring SNMP with CLI
4.4.1. SNMP Configuration Overview
4.4.1.1. Configuring SNMPv1 and SNMPv2c
4.4.1.2. Configuring SNMPv3
4.4.2. Basic SNMP Security Configuration
4.4.3. Configuring SNMP Components
4.4.3.1. Configuring a Community String
4.4.3.2. Configuring View Options
4.4.3.3. Configuring Access Options
4.4.3.4. Configuring USM Community Options
4.4.3.5. Configuring Other SNMP Parameters
4.5. SNMP Configuration Command Reference
4.5.1. Command Hierarchies
4.5.1.1. SNMP System Commands
4.5.1.2. SNMP Security Commands
4.5.2. Command Descriptions
4.5.2.1. SNMP System Commands
4.5.2.2. SNMP Security Commands
4.6. SNMP Show Command Reference
4.6.1. Command Hierarchies
4.6.1.1. Show Commands
4.6.2. Command Descriptions
4.6.2.1. Show Commands
5. NETCONF
5.1. NETCONF Overview
5.2. NETCONF in SR OS
5.2.1. Transport and Sessions
5.2.2. Datastores and URLs
5.2.3. NETCONF Operations and Capabilities
5.2.3.1. <get>
5.2.3.2. <get-config>
5.2.3.3. <edit-config>
5.2.3.4. <copy-config> and <delete-config>
5.2.3.5. <lock>
5.2.3.6. <unlock>
5.2.3.7. <commit>
5.2.3.8. <discard-changes>
5.2.3.9. <validate>
5.2.4. Data Model, Datastore and Operation Combinations
5.2.5. General NETCONF Behavior
5.2.5.1. System-Provisioned Configuration (SPC) Objects
5.3. Establishing a NETCONF Session
5.4. XML Content Layer
5.4.1. <get> with XML Content Layer
5.4.2. <edit-config> with XML Content Layer
5.4.3. <get-config> with XML Content Layer
5.5. XML Content Layer Examples
5.6. CLI Content Layer
5.7. CLI Content Layer Examples
5.8. NETCONF Notifications
5.9. NETCONF Configuration Command Reference
5.9.1. Command Hierarchies
5.9.1.1. NETCONF System Commands
5.9.1.2. NETCONF Security Commands
5.9.2. Configuration Commands
5.9.2.1. NETCONF System Commands
5.9.2.2. NETCONF Security Commands
5.10. NETCONF Show and Debug Command Reference
5.10.1. Command Hierarchies
5.10.1.1. Show Commands
5.10.1.2. Debug Commands
5.10.2. Command Descriptions
5.10.2.1. Show Commands
5.10.2.1.1. System Commands
5.10.3. Debug Commands
5.10.3.1. NETCONF Debug Commands
5.11. NETCONF Admin Command Reference
5.11.1. Command Hierarchies
5.11.1.1. Admin Commands
5.11.2. Command Descriptions
5.11.2.1. Admin Commands
6. Event and Accounting Logs
6.1. Logging Overview
6.2. Log Destinations
6.2.1. Console
6.2.2. Session
6.2.3. CLI Logs
6.2.4. Memory Logs
6.2.5. Log Files
6.2.6. SNMP Trap Group
6.2.7. Syslog
6.2.8. NETCONF
6.3. Event Logs
6.3.1. Event Sources
6.3.2. Event Control
6.3.3. Log Manager and Event Logs
6.3.4. Event Filter Policies
6.3.5. Event Log Entries
6.3.6. Simple Logger Event Throttling
6.3.7. Default System Log
6.3.8. Event Handling System
6.4. Customizing Syslog Messages Using Python
6.4.1. Python Engine for Syslog
6.4.1.1. Python Syslog APIs
6.4.1.2. Timestamp Format Manipulation
6.4.2. Python Processing Efficiency
6.4.3. Python Backpressure
6.4.4. Event Selection for Python Processing
6.4.5. Modifying a Log File
6.4.6. Deleting a Log File
6.4.7. Modifying a File ID
6.4.8. Modifying a Syslog ID
6.4.9. Modifying an SNMP Trap Group
6.4.10. Deleting an SNMP Trap Group
6.4.11. Modifying a Log Filter
6.4.12. Modifying Event Control Parameters
6.4.13. Returning to the Default Event Control Configuration
6.5. Accounting Logs
6.5.1. Accounting Records
6.5.2. Accounting Files
6.5.3. Design Considerations
6.5.4. Reporting and Time-Based Accounting
6.5.5. Overhead Reduction in Accounting: Custom Record
6.5.5.1. User Configurable Records
6.5.5.2. Changed Statistics Only
6.5.5.3. Configurable Accounting Records
6.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
6.5.5.3.2. RADIUS Accounting in Networks Using ESM
6.5.5.4. Significant Change Only Reporting
6.5.6. Immediate Completion of Records
6.5.6.1. Record Completion for XML Accounting
6.5.7. AA Accounting per Forwarding Class
6.6. Configuration Notes
6.7. Configuring Logging with CLI
6.7.1. Log Configuration Overview
6.7.2. Log Types
6.7.3. Basic Log Configuration
6.7.4. Common Configuration Tasks
6.7.4.1. Configuring an Event Log
6.7.4.2. Configuring a File ID
6.7.4.3. Configuring an Accounting Policy
6.7.4.4. Configuring Event Control
6.7.4.5. Configuring a Log Filter
6.7.4.6. Configuring an SNMP Trap Group
6.7.4.6.1. Setting the Replay Parameter
6.7.4.6.2. Shutdown In-Band Port
6.7.4.6.3. No Shutdown Port
6.7.4.7. Configuring a Syslog Target
6.7.4.7.1. Configuring an Accounting Custom Record
6.8. Log Configuration Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Log Configuration Commands
6.8.1.2. Accounting Policy Commands
6.8.1.3. Custom Record Commands
6.8.1.4. File ID Commands
6.8.1.5. Event Filter Commands
6.8.1.6. Event Handling System (EHS) Commands
6.8.1.7. Event Trigger Commands
6.8.1.8. Log ID Commands
6.8.1.9. SNMP Trap Group Commands
6.8.1.10. Syslog Commands
6.8.2. Command Descriptions
6.8.2.1. Generic Commands
6.8.2.2. Log Configuration Commands
6.8.2.3. Accounting Policy Commands
6.8.2.3.1. Accounting Policy Custom Record Commands
6.8.2.4. File ID Commands
6.8.2.5. Event Filter Commands
6.8.2.6. Event Handling System (EHS) Commands
6.8.2.7. Event Trigger Commands
6.8.2.8. Log ID Commands
6.8.2.9. SNMP Trap Groups
6.8.2.10. Syslog Commands
6.9. Log Command Reference
6.9.1. Command Hierarchies
6.9.1.1. Show Commands
6.9.1.2. Clear Command
6.9.1.3. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. Show Commands
6.9.2.2. Clear Commands
6.9.2.3. Tools Commands
7. sFlow
7.1. sFlow Overview
7.2. sFlow Features
7.2.1. sFlow Counter Polling Architecture
7.2.2. sFlow Support on Logical Ethernet Ports
7.2.3. sFlow SAP Counter Map
7.2.4. sFlow Record Formats
7.3. sFlow Command Reference
7.3.1. Command Hierarchies
7.3.1.1. System Commands
7.3.1.2. Show Commands
7.4. sFlow Configuration Command Descriptions
7.4.1. Command Descriptions
7.4.1.1. System Commands
7.5. sFlow Show Command Descriptions
7.5.1. Command Descriptions
7.5.1.1. Show Commands
8. gRPC
8.1. Security Aspects
8.1.1. TLS-Based Encryption
8.1.2. Authentication
8.2. gNMI Service
8.2.1. gNMI Service Definitions
8.2.1.1. Capability Discovery
8.2.1.2. Get/Set RPC
8.2.1.3. Subscribe RPC
8.2.1.3.1. ON-CHANGE Subscription Mode
8.2.1.4. Schema Paths
8.2.2. gNMI Service Use Cases
8.2.2.1. Telemetry
8.2.2.1.1. Telemetry Examples
8.2.2.2. NE Configuration Management
8.3. gRPC Command Reference
8.3.1. Command Hierarchies
8.3.1.1. System Commands
8.3.1.2. QoS Commands
8.4. Telemetry Configuration Command Descriptions
8.4.1. Command Descriptions
8.4.1.1. System Commands
8.4.1.2. QoS Commands
8.5. gRPC Show, Admin Command Reference
8.5.1. Command Hierarchies
8.5.1.1. Show Commands
8.5.1.2. Tools Commands
8.5.1.3. Admin Commands
8.5.2. Command Descriptions
8.5.2.1. Show Commands
8.5.2.2. Tools Commands
8.5.2.3. Admin Commands
9. TLS
9.1. TLS Overview
9.2. TLS Server Interaction with Applications
9.2.1. TLS Application Support
9.3. TLS Handshake
9.4. TLS Client Certificate
9.5. TLS Symmetric Key Rollover
9.6. Supported TLS Ciphers
9.7. SR OS Certificate Management
9.7.1. Certificate Profile
9.7.2. TLS Server Authentication of the Client Certificate CN Field
9.7.3. CN Regexp Format
9.8. Operational Guidelines
9.8.1. Server Authentication Behavior
9.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
9.9. LDAP Redundancy and TLS
9.10. Basic TLS Configuration
9.11. Common Configuration Tasks
9.11.1. Configuring a Server TLS Profile
9.11.2. Configuring a Client TLS Profile
9.11.3. Configuring a TLS Client or TLS Server Certificate
9.11.4. Configuring a TLS Trust Anchor
9.12. TLS Command Reference
9.12.1. Command Hierarchies
9.12.1.1. Security TLS Commands
9.12.1.2. LDAP TLS Profile Commands
9.12.1.3. Admin Commands
9.12.2. Command Descriptions
9.12.2.1. Security TLS Commands
9.12.2.2. LDAP TLS Profile Commands
9.12.2.3. Admin Commands
9.13. TLS Show Command Reference
9.13.1. Command Hierarchies
9.13.1.1. Show Commands
9.13.2. Command Descriptions
9.13.2.1. Show Commands
10. Facility Alarms
10.1. Facility Alarms Overview
10.2. Facility Alarms vs. Log Events
10.3. Facility Alarm Severities and Alarm LED Behavior
10.4. Facility Alarm Hierarchy
10.5. Facility Alarm List
10.6. Configuring Logging with CLI
10.6.1. Basic Facility Alarm Configuration
10.6.2. Common Configuration Tasks
10.6.2.1. Configuring the Maximum Number of Alarms to Clear
10.7. Facility Alarms Configuration Command Reference
10.7.1. Command Hierarchies
10.7.1.1. Facility Alarm Configuration Commands
10.7.2. Command Descriptions
10.7.2.1. Generic Commands
10.8. Facility Alarms Show Command Reference
10.8.1. Command Hierarchies
10.8.1.1. Show Commands
10.8.2. Command Descriptions
10.8.2.1. Show Commands
11. Standards and Protocol Support
Customer Document and Product Support
Triple Play Service Delivery Architecture R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2. Introduction to Triple Play
2.1. Nokia’s Triple Play Service Delivery Architecture
2.1.1. Introduction to Triple Play
2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.1.3. Architectural Foundations
2.1.4. Optimizing Triple Play Service Infrastructures
2.1.4.1. Distributed Service Edges
2.1.4.2. Service Differentiation, QoS Enablement
2.1.4.3. Virtual MAC Subnetting for VPLS
2.2. Services
2.2.1. Service Types
2.2.2. Service Policies
2.3. Nokia Service Model
2.3.1. Introduction
2.3.2. Service Entities
2.3.3. Customers
2.3.4. Service Access Points (SAPs)
2.3.4.1. SAP Encapsulation Types and Identifiers
2.3.4.2. Ethernet Encapsulations
2.3.4.3. SAP Considerations
2.3.5. Service Distribution Points (SDPs)
2.3.5.1. SDP Binding
2.3.5.2. Spoke and Mesh SDPs
2.3.5.3. SDP Encapsulation Types
2.3.5.3.1. GRE
2.3.5.3.2. MPLS
2.3.5.4. SDP Keepalives
2.4. Epipe Service Overview
2.5. VPLS Service Overview
2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.5.1.1. Residential Split Horizon Groups
2.6. IES Service Overview
2.6.1. IP Interface
2.7. VPRN Service Overview
2.8. Deploying and Provisioning Services
2.8.1. Phase 1: Core Network Construction
2.8.2. Phase 2: Service Administration
2.8.3. Phase 3: Service Provisioning
2.9. Configuration Notes
2.9.1. General
2.10. Configuring Triple Play Services with CLI
2.10.1. Configuring VPLS Residential Split Horizon Groups
2.10.1.1. Configuring Static Hosts
2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
2.10.1.1.4. Configuring Static Hosts on an IES SAP
2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
2.11. Triple Play Services Command Reference
2.11.1. Command Hierarchies
2.11.1.1. IES/VPRN Triple Play Commands
2.11.1.2. VPLS Triple Play Commands
2.11.1.3. Show Commands
2.11.1.4. Clear Commands
2.11.1.5. Debug Commands
2.11.1.6. Tools Commands
2.11.2. Command Descriptions
2.11.2.1. Global Commands
2.11.2.2. IES/VPRN Service Commands
2.11.2.2.1. VPLS Triple Play Commands
2.11.2.2.2. Service DHCP and Anti-Spoof Filtering Commands
2.11.2.2.3. Interface IPv6 Commands
2.11.2.3. Show Commands
2.11.2.3.1. IGMP Snooping Show Commands
2.11.2.4. Clear Commands
2.11.2.5. Debug Commands
2.11.2.6. Tools Commands
3. DHCP Management
3.1. DHCP Principles
3.2. DHCP Features
3.2.1. DHCP Relay
3.2.2. DHCPv4 Relay Proxy
3.2.3. Subscriber Identification Using Option 82 Field
3.2.3.1. Trusted and Untrusted
3.2.4. DHCP Snooping
3.2.5. DHCP Lease State Table
3.2.6. DHCP and Layer 3 Aggregation
3.2.6.1. DHCPv4 Snooping
3.2.6.2. DHCPv6 Snooping
3.2.7. Local DHCP Servers
3.2.7.1. Overview
3.2.7.2. Local DHCP Server Support
3.2.8. DHCPv6
3.2.8.1. DHCPv6 Relay Agent
3.2.8.2. DHCPv6 Prefix Options
3.2.8.3. Neighbor Resolution via DHCPv6 Relay
3.2.8.4. DHCPv6 Lease Persistency
3.2.8.5. Local Proxy Neighbor Discovery
3.2.8.6. IPv6oE Hosts Behind Bridged CPEs
3.2.8.7. IPv6 Link-Address Based Pool Selection
3.2.8.8. IPv6 Address/Prefix Stickiness
3.2.8.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.2.8.10. Host Connectivity Checks for IPv6
3.2.9. Lease Query
3.2.10. DHCPv6 to Server Option
3.2.11. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.2.12. DHCP Caching
3.2.13. Flexible Creation of DHCPv4/6 Host Parameters
3.2.14. Python DTC Variables and API
3.2.14.1. DTC Debugging Facility
3.2.15. Virtual Subnet for DHCPv4 Hosts
3.2.16. Address Reservation for Sticky Leases
3.3. Proxy DHCP Server
3.3.1. Local DHCP Servers
3.3.1.1. Terminology
3.3.1.2. Overview
3.3.1.3. DHCP Lease Synchronization
3.3.1.4. Intercommunication Link Failure Detection
3.3.1.5. DHCP Server Failover States
3.3.1.6. Lease Time Synchronization
3.3.1.7. Maximum Client Lead Time (MCLT)
3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.3.1.9. Fast-Switchover of IP Address/Prefix Delegation
3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.4. Local Address Assignment
3.4.1. Stateless Address Auto-Configuration
3.5. Configuring DHCP with CLI
3.5.1. Enabling DHCP Snooping
3.5.2. Configuring Local User Database Parameters
3.5.3. Configuring Option 82 Handling
3.5.4. Enabling DHCP Relay
3.6. Triple Play DHCP Command Reference
3.6.1. Command Hierarchies
3.6.1.1. System DHCP Commands
3.6.1.2. DHCP Filter Commands
3.6.1.3. Router DHCP Local User Database Commands
3.6.1.4. Local User Database Commands
3.6.1.4.1. IPoE Commands
3.6.1.4.2. PPP Commands
3.6.1.5. Service DHCP Commands
3.6.1.5.1. IES DHCP Commands
3.6.1.5.2. VPLS DHCP Commands
3.6.1.5.3. VPRN DHCP Commands
3.6.1.5.4. IES/VPRN IPv6-DHCP6 Commands
3.6.1.5.5. Anti-Spoof Filtering Commands
3.6.1.6. Show Commands
3.6.1.7. Tools Commands
3.6.1.8. Clear Commands
3.6.1.9. Debug Commands
3.6.2. Command Descriptions
3.6.2.1. Triple Play DHCP Configuration Commands
3.6.2.1.1. Global Commands
3.6.2.1.2. System DHCP Commands
3.6.2.1.3. DHCP Filter Commands
3.6.2.1.4. Local User Database Commands
3.6.2.1.5. Router DHCP Commands
3.6.2.1.6. DHCP Service Commands
3.6.2.1.7. Show Commands
3.6.2.1.8. Tools Commands
3.6.2.1.9. Clear Commands
3.6.2.1.10. Debug Commands
4. SLAAC
4.1. Stateless Address Auto-configuration (SLAAC) Management
4.2. SLAAC Principles
4.3. Configuration Overview
4.4. Router-Solicit Trigger
4.5. SLAAC Address Assignment
4.6. Static SLAAC Prefix Assignment
4.7. Dynamic SLAAC Prefix Assignment
4.8. SLAAC Prefix Replacement
5. Point-to-Point Protocol over Ethernet Management
5.1. PPPoE
5.1.1. PPPoE Authentication and Authorization
5.1.1.1. General Flow
5.1.1.2. RADIUS
5.1.1.3. Local User Database Directly Assigned to PPPoE Node
5.1.1.4. Subscriber per PPPoE Session Index
5.1.1.5. Local DHCP Server with Local User Database
5.1.2. Multiple Sessions Per MAC Address
5.1.3. PPP Session Re-establishment
5.1.4. Private Retail Subnets
5.1.5. IPCP Subnet Negotiation
5.1.5.1. Numbered WAN Support for Layer 3 RGs
5.1.6. IES as Retail Service for PPPoE Host
5.1.7. Unnumbered PPPoX
5.1.8. Selective Backhaul of PPPoE Traffic using an Epipe Service
5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.2.1. Terminology
5.2.2. LNS MLPPPoX
5.2.3. MLPPP Encapsulation
5.2.4. MLPPPoX Negotiation
5.2.5. Enabling MLPPPoX
5.2.6. Link Fragmentation and Interleaving (LFI)
5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.2.7. LFI Functionality Implemented in LNS
5.2.7.1. Last Mile QoS Awareness in the LNS
5.2.7.2. BB-ISA Processing
5.2.7.3. LNS-LAC Link
5.2.7.4. AN-RG Link
5.2.7.5. Home Link
5.2.7.6. Optimum Fragment Size Calculation by LNS
5.2.7.6.1. Encapsulation Based Fragment Size
5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
5.2.7.6.3. Selection of the Optimum Fragment Length
5.2.8. Upstream Traffic Considerations
5.2.9. Multiple Links MLPPPoX With No Interleaving
5.2.10. MLPPPoX Session Support
5.2.11. Session Load Balancing Across Multiple BB-ISAs
5.2.12. BB-ISA Hashing Considerations
5.2.13. Last Mile Rate and Encapsulation Parameters
5.2.14. Link Failure Detection
5.2.15. CoA Support
5.2.16. Accounting
5.2.17. Filters and Mirroring
5.2.18. PTA Considerations
5.2.19. QoS Considerations
5.2.19.1. Dual-Pass
5.2.19.2. Traffic Prioritization in LFI
5.2.19.3. Shaping Based on the Last Mile Wire Rates
5.2.19.4. Downstream Bandwidth Management on Egress Port
5.2.20. Sub/Sla-Profile Considerations
5.2.21. Example of MLPPPoX Session Setup Flow
5.2.22. Other Considerations
5.3. Configuration Notes
5.4. PPP Command Reference
5.4.1. Command Hierarchies
5.4.1.1. PPPoE Policy Configuration Commands
5.4.1.2. PPPoE Service Commands
5.4.1.3. PPPoE Local User Database Commands
5.4.1.4. MLPPP on LNS Commands
5.4.1.5. Show Commands
5.4.2. Command Descriptions
5.4.2.1. Generic Commands
5.4.2.1.1. Subscriber Management Commands
5.4.2.1.2. MLPPP on LNS Commands
5.4.2.1.3. PPP/PPPoE Service Commands
5.4.2.1.4. RADIUS Attribute Commands
5.4.2.2. Service Commands
5.4.2.3. Show Commands
5.4.2.4. Clear Commands
5.4.2.5. Debug Commands
6. Layer 2 Tunneling Protocol (L2TP)
6.1. Terminology
6.2. L2TP
6.2.1. LAC DF Bit
6.2.2. Handling L2TP Tunnel/Session Initialization Failures
6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.2.2. Peer Blacklist
6.2.2.3. Tunnel Blacklists
6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.2.4. Tunnel Selection Mechanism
6.2.2.5. Tunnel Probing
6.2.2.6. Controlling the Size of Blacklist
6.2.2.7. Displaying the Content of a Blacklist
6.2.2.8. Generating Trap when the Blacklist is Full
6.2.2.9. Premature Removal of Blacklisted Entries
6.2.2.10. Manual Purging of Entities within the Blacklist
6.2.3. CDN Result Code Overwrite
6.2.4. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. Traffic Steering on L2TP LAC
6.4.1. Steering Activation and Deactivation
6.4.2. Steering States
6.4.3. Configuring Traffic Steering on L2TP LAC
6.5. L2TP Tunnel RADIUS Accounting
6.5.1. Accounting Packets List
6.5.2. RADIUS Attributes Value Considerations
6.6. MLPPP on the LNS Side
6.7. LNS Reassembly
6.8. LNS Subscriber Policers
6.8.1. Policer Support
6.9. L2TP Command Reference
6.9.1. Command Hierarchies
6.9.1.1. L2TP Configuration Commands
6.9.1.2. Steering Profile Commands
6.9.1.3. L2TP Tunnel RADIUS Accounting Commands
6.9.1.4. Show Commands
6.9.1.5. Clear Commands
6.9.1.6. Debug Commands
6.9.1.7. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. L2TP Configuration Commands
6.9.2.1.1. Global Commands
6.9.2.1.2. L2TP Commands
6.9.2.2. Steering Profile Commands
6.9.2.3. L2TP Tunnel RADIUS Accounting Commands
6.9.2.4. Show Commands
6.9.2.5. Debug Commands
7. Triple Play Security
7.1. Triple Play Security Features
7.1.1. Anti-Spoofing Filters
7.1.1.1. Anti-spoofing Filter Types
7.1.1.2. Filtering Packets
7.1.2. Layer 2 Triple Play Security Features
7.1.2.1. MAC Pinning
7.1.2.2. MAC Protection
7.1.2.3. DoS Protection
7.1.2.3.1. Subscriber Aggregation Network
7.1.2.3.2. Network Control Filtering
7.1.2.4. VPLS Redirect Policy
7.1.3. ARP Handling
7.1.3.1. ARP Reply Agent
7.1.3.2. Dynamic ARP Table Population
7.1.3.3. Local Proxy ARP
7.1.4. Web Portal Redirect
7.2. Configuring Triple Play Security with CLI
7.2.1. Common Configuration Tasks
7.2.1.1. Configuring Anti-Spoofing Filters
7.2.1.2. Configuring Triple Play Security features
7.2.1.2.1. Configuring MAC Pinning
7.2.1.2.2. Configuring MAC Protection
7.2.1.2.3. Configuring VPLS Redirect Policy
7.2.1.3. Configuring ARP Handling
7.2.1.3.1. Configuring Proxy ARP
7.2.1.3.2. Configuring Local Proxy ARP
7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
7.2.1.3.4. Configuring Remote Proxy ARP
7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
7.2.1.3.6. Configuring CPU Protection
7.2.1.4. Configuring Web Portal Redirect
7.3. Triple Play Security Command Reference
7.3.1. Command Hierarchies
7.3.1.1. Anti-Spoofing Commands
7.3.1.2. Layer 2 Security Commands
7.3.1.3. ARP Handling Commands
7.3.1.4. Tools Commands
7.3.2. Command Descriptions
7.3.2.1. Triple Play Security Configuration Commands
7.3.2.1.1. Triple Play Anti-Spoofing Commands
7.3.2.1.2. Triple Play Layer 2 Security Commands
7.3.2.1.3. ARP Handling Commands
7.3.2.2. Show Commands
7.3.2.3. Tools Commands
8. Triple Play Multicast
8.1. Introduction to Multicast
8.2. Multicast in the Broadband Service Router
8.2.1. Internet Group Management Protocol
8.2.1.1. IGMP Versions and Interoperability Requirements
8.2.1.2. IGMP Version Transition
8.2.2. Multicast Listener Discovery
8.2.2.1. MLD Versions and Interoperability Requirements
8.2.2.2. Source Specific Multicast Groups
8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
8.3. Multicast in the BSA
8.3.1. IGMP Snooping
8.3.1.1. IGMP/MLD Message Processing
8.3.1.2. IGMP Message Processing
8.3.1.3. MLD Message Processing
8.3.1.4. IGMP/MLD Filtering
8.3.2. Multicast VPLS Registration (MVR)
8.3.3. Layer 3 Multicast Load Balancing
8.3.4. IGMP State Reporter
8.3.4.1. IGMP Data Records
8.3.4.2. Transport Mechanism
8.3.4.3. HA Compliance
8.3.4.4. QoS Awareness
8.3.4.5. IGMP Reporting Caveats
8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
8.4.1. Multicast Over IPoE
8.4.1.1. Per SAP Replication Mode
8.4.1.1.1. Per SAP Queue
8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.4.1.2. Per Subscriber Host Replication Mode
8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.4.2. Multicast Over PPPoE
8.4.3. IGMP Flooding Containment
8.4.4. IGMP/MLD Timers
8.4.5. IGMP/MLD Query Intervals
8.4.6. HQoS Adjustment
8.4.6.1. Host Tracking (HT) Considerations
8.4.6.2. HQoS Adjust Per Vport
8.4.6.2.1. Multi-Chassis Redundancy
8.4.6.2.2. Scalability Considerations
8.4.7. Redirection
8.4.8. Hierarchical Multicast CAC (H-MCAC)
8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
8.4.9. Determining MCAC Policy in Effect
8.4.10. Multicast Filtering
8.4.11. Joining the Multicast Tree
8.4.12. Wholesale/Retail Requirements
8.4.13. QoS Considerations
8.4.14. Redundancy Considerations
8.4.14.1. Redirection Considerations
8.4.15. Query Intervals for Multicast
8.4.15.1. ESM Host-based Queries
8.4.15.2. Group Interface-based Queries
8.5. Configuring Triple Play Multicast Services with CLI
8.5.1. Configuring IGMP Snooping in the BSA
8.5.1.1. Enabling IGMP Snooping in a VPLS Service
8.5.1.2. IGMPv3 Multicast Routers
8.5.1.3. With IGMPv1/2 Multicast Routers
8.5.1.4. Modifying IGMP Snooping Parameters
8.5.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
8.5.2. Configuring Static Multicast Groups on a SAP or SDP
8.5.2.1. Enabling IGMP Group Membership Report Filtering
8.5.2.1.1. Enabling IGMP Traffic Filtering
8.5.3. Configuring Multicast VPLS Registration (MVR)
8.5.4. Configuring IGMP, MLD, and PIM in the BSR
8.5.4.1. Enabling IGMP
8.5.4.2. Configuring IGMP Interface Parameters
8.5.4.3. Configuring Static Parameters
8.5.4.4. Configuring SSM Translation
8.5.4.5. Enabling MLD
8.5.4.6. Configuring MLD Interface Parameters
8.5.4.7. Configuring Static Parameters
8.5.4.8. Configuring SSM Translation
8.5.4.9. Configuring PIM
8.5.4.9.1. Enabling PIM
8.5.4.9.2. Configuring PIM Interface Parameters
8.5.4.9.3. Importing PIM Join/Register Policies
8.5.4.9.4. Configuring PIM Join/Register Policies
8.5.4.10. Configuring Bootstrap Message Import and Export Policies
8.6. Triple Play Multicast Command Reference
8.6.1. Command Hierarchies
8.6.1.1. Multicast Management Commands
8.6.1.2. Multicast Info Policy Bundle Commands
8.6.1.3. Multicast Service Commands
8.6.1.4. Ingress Multicast Path Management Commands
8.6.1.5. Multicast Redirection
8.6.1.6. Multicast Query Timer Commands
8.6.1.7. Show Commands
8.6.1.8. Debug Commands
8.6.2. Command Descriptions
8.6.2.1. Multicast Management Configuration Commands
8.6.2.1.1. Generic Commands
8.6.2.1.2. Multicast Management Commands
8.6.2.1.3. Bandwidth Policy Commands
8.6.2.1.4. Multicast Info Policy Commands
8.6.2.1.5. Service Commands
8.6.2.1.6. VPLS Multicast Commands
8.6.2.1.7. Chassis Level Commands
8.6.2.1.8. Multicast Redirection Commands
8.6.2.1.9. Multicast Query Timer Commands
8.6.2.1.10. Forwarding Plane Commands
8.6.2.2. Show Commands
8.6.2.3. Debug Commands
9. Triple Play Enhanced Subscriber Management
9.1. Uniform RADIUS Server Configuration
9.1.1. RADIUS Server Configuration
9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
9.1.1.2. Legacy RADIUS Server Configuration
9.2. RADIUS Authentication of Subscriber Sessions
9.2.1. RADIUS Authentication Extensions
9.2.1.1. Triple Play Network with RADIUS Authentication
9.2.2. RADIUS Authorization Extensions
9.2.2.1. Calling-Station-ID
9.2.2.2. Subscriber Session Timeout
9.2.2.2.1. Domain Name in Authentication
9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.2.2.4. SHCV Policy
9.2.3. radius-server-policy Retry Attempt Overview
9.2.4. AAA RADIUS Server Operation Status
9.2.5. AAA RADIUS Accounting Server Stickiness
9.2.6. AAA RADIUS Authentication Fallback Action
9.2.7. AAA Test User Account
9.2.8. Troubleshooting the RADIUS Server
9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.2.9.1. Provisioning IP Configuration of the Host
9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
9.2.9.3. Change of Authorization and Disconnect-Request
9.2.9.3.1. Change of Authorization using the Tools Command
9.2.9.4. RADIUS-Based Accounting
9.2.9.5. RADIUS Accounting Terminating Cause
9.2.9.6. Accounting Modes Of Operation
9.2.9.7. Per Session Accounting
9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
9.2.9.9. No Host-Accounting
9.2.9.10. Host-Accounting Enabled
9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.2.9.12. Accounting Interim Update Message Interval
9.2.9.13. CoA Triggered Accounting Interim Update
9.2.9.14. Class Attribute
9.2.9.15. User Name
9.2.9.16. Accounting-On and Accounting Off
9.2.9.17. RADIUS Accounting Message Buffering
9.2.9.18. Multiple Accounting Policies
9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.3. Enhanced Subscriber Management Overview
9.3.1. Enhanced Subscriber Management Basics
9.3.1.1. Standard and Enhanced Subscriber Management
9.3.1.1.1. Subscriber Management Definitions
9.3.1.1.2. Subscriber Identification Policy
9.3.1.1.3. Subscriber Identification String
9.3.1.1.4. Subscriber Profile
9.3.1.1.5. SLA Profile
9.3.1.1.6. Explicit Subscriber Profile Mapping
9.3.2. ESM for IPv6
9.3.2.1. Models
9.3.2.1.1. PPPoE Host
9.3.2.1.2. PPPoE RG
9.3.2.1.3. IPoE Host/RG
9.3.2.2. Setup
9.3.2.3. 64-bit and 128-bit WAN Mode
9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
9.3.2.4. Behavior
9.3.2.4.1. Dual Stack
9.3.2.4.2. Router Advertisements (RA)
9.3.2.4.3. CoA and Disconnect-Request
9.3.2.5. Delegated-Prefix-Length
9.3.2.5.1. Order of Preference for DPL
9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
9.3.2.6. DHCPv6 Relay Agent
9.3.2.6.1. Configuring a DHCPv6 Relay Agent
9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
9.3.2.8. DHCPv6 Local Server
9.3.3. Dynamic Subscriber Host Processing
9.3.3.1. Dynamic Tables
9.3.3.1.1. Active Subscriber Table
9.3.3.1.2. SLA Profile Instance Table
9.3.3.1.3. Subscriber Host Table
9.3.3.1.4. DHCP Lease State Table
9.3.4. Enhanced Subscriber Management Entities
9.3.4.1. Instantiating a New Host
9.3.4.2. Packet Processing for an Existing Host
9.3.5. ESM Host Lockout
9.3.5.1. Functionality
9.3.6. ANCP and GSMP
9.3.6.1. ANCP
9.3.6.1.1. Static ANCP Management
9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.3.6.1.3. ANCP String
9.3.6.1.4. ANCP Persistency Support
9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.3.6.3. DHCP Release Messages
9.3.6.3.1. DHCP Release
9.3.6.4. DHCP Client Mobility
9.3.6.5. DHCP Lease Control
9.3.7. Using Scripts for Dynamic Recognition of Subscribers
9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.3.7.3. Determining the Subscriber Profile
9.3.7.4. Determining the SLA Profile
9.3.7.4.1. SLA Profile Instance Sharing
9.3.7.4.2. SLA-Based Egress QoS Marking
9.3.8. Auto-Sub ID
9.3.8.1. Sub-id Identifiers
9.3.8.2. Dual Stack Hosts
9.3.8.3. Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
9.3.8.4. PPPoA/PPPoEoA Considerations
9.3.8.5. Deployment Considerations
9.3.8.6. Caveats
9.3.9. Limiting Subscribers and Hosts on a SAP
9.3.10. Static Subscriber Hosts
9.3.11. QoS for Subscribers and Hosts
9.3.11.1. QoS Parameters in Different Profiles
9.3.11.2. QoS Policy Overrides
9.3.12. ESM Subscriber Hierarchical Traffic Control
9.3.12.1. Subscriber HQoS
9.3.12.2. Subscriber CFHP
9.3.12.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.3.12.3.1. Broadband Network Gateway Application
9.3.12.3.2. Queue Determination and Scheduling
9.3.12.3.3. Weighted Scheduler Group
9.3.12.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.3.12.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.3.12.3.6. Vport Determination and Evaluation
9.3.12.3.7. Applying Aggregate Rate Limit to a Vport
9.3.12.3.8. Applying a Scheduler Policy to a Vport
9.3.12.3.9. Signaling of Last Mile Encapsulation Type
9.3.12.3.10. Configuration Example
9.3.13. Subscriber Volume Statistics
9.3.13.1. IP (Layer 3) Volume Accounting
9.3.13.2. Separate IPv4 and IPv6 Counters
9.3.14. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.3.14.1. IP Filter Attribute Format Details
9.3.14.2. Checking Filter Policy Details
9.3.15. ESM PPPoA/PPPoEoA
9.3.15.1. PPPoA
9.3.15.2. PPPoEoA
9.3.15.3. Hardware Support
9.3.15.4. Termination Points
9.3.15.5. PPPoA Encapsulation
9.3.15.5.1. PPPoEoA Encapsulation
9.3.15.6. Encapsulation Summary
9.3.15.7. Concurrent Support for Different Service Types on the Same Port
9.3.15.8. Restrictions in Scaled ATM MDA Mode
9.3.15.9. QoS Implementation
9.3.15.10. Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
9.3.15.11. Per VP Shaping
9.3.15.12. ATM/IOM QoS Integration
9.3.15.12.1. Intermediate Node Rate Limit/Shaper
9.3.15.12.2. Provisioning Aspects
9.3.15.12.3. HQoS Combinations
9.3.15.12.4. ATM Rate Adjustment
9.3.15.13. Subscriber Instantiation Use Cases
9.3.15.14. Authentication
9.3.15.15. LUDB Access via Capture SAP
9.3.15.16. Encapsulation Autosensing
9.3.15.17. SAP Autoprovisioning
9.3.15.18. PPP Nodes and ppp-policy
9.3.15.19. MTU Considerations
9.3.15.19.1. PPP(oE) Session Antispoofing
9.3.16. Multi-Chassis Synchronization
9.3.16.1. Overview
9.3.16.1.1. Loss of Synchronization and Reconciliation
9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
9.3.17.1. SRRP Messaging
9.3.17.2. SRRP and Multi-Chassis Synchronization
9.3.17.3. SRRP Instance
9.3.17.3.1. SRRP Instance MCS Key
9.3.17.3.2. Containing Service Type and ID
9.3.17.3.3. Containing Subscriber IP Interface Name
9.3.17.3.4. Subscriber Subnet Information
9.3.17.3.5. Containing Group IP Interface Information
9.3.17.3.6. Remote Redundant IP Interface Mismatch
9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.3.17.3.10. Local and Remote Dual Master Detected
9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.3.18. PPPoE MC Redundancy
9.3.18.1. SRRP Considerations for PPPoE
9.3.18.1.1. SRRP Fact-Checks
9.3.18.2. State Synchronization
9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.3.18.3. Traffic Control and Redundant Interface
9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
9.3.18.3.2. Subnet Assignment and Advertisement - Option ‘B’
9.3.18.4. MSAP Considerations
9.3.18.5. Unnumbered Interface Support
9.3.18.6. Compatibility with MC-LAG
9.3.18.7. IPv6 Support
9.3.18.8. Considerations with Local DHCP Server
9.3.18.9. Redundant Interface Considerations
9.3.19. Routed Central Office (CO)
9.3.19.1. Layer 3 Subscriber Interfaces
9.3.19.1.1. DHCP Interactions
9.3.19.1.2. Routed CO for IES Service
9.3.19.1.3. Routed CO for VPRN Service
9.3.19.2. Wholesale Retail Routed CO
9.3.19.2.1. Wholesale Retail Model
9.3.19.2.2. Configuration and Applicability
9.3.19.2.3. Hub-and-Spoke Forwarding
9.3.19.3. Routed Subscriber Hosts
9.3.19.3.1. Static Configured IPv4 Managed Route
9.3.19.3.2. Static Configured IPv6 Managed Route
9.3.19.3.3. Dynamic BGP Peering
9.3.19.3.4. RIP Listener
9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.3.19.3.6. GRT Lookup and Routed CO in a VPRN
9.3.20. Dual Homing
9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.3.20.2. Steady-State Operation of Dual-homed Ring
9.3.20.3. Broken-Ring Operation and the Transition to this State
9.3.20.4. Transition from Broken to Closed Ring State
9.3.20.5. Provisioning Aspects and Error Cases
9.3.20.6. Dual Homing to Two BSR Nodes
9.3.20.7. MC Services
9.3.20.8. Routed CO Dual Homing
9.3.20.8.1. Redundant Interfaces
9.3.20.8.2. SRRP in Dual Homing
9.3.20.8.3. Synchronization
9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.3.20.9. SRRP and Multi-Chassis Synchronization
9.3.20.10. Dual Homing and ANCP
9.3.21. SRRP Enhancement
9.3.21.1. SRRP Fate Sharing
9.3.21.2. Fate Sharing Algorithm
9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.3.21.3.2. Managed Routes
9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.3.21.3.4. Activating SRRP State Tracking
9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.3.21.5. Group Monitor
9.3.22. Subscriber Override
9.3.23. Dual Stack Lite
9.3.23.1. IP-in-IP
9.3.23.2. Configuring Dual Stack Lite
9.3.23.3. L2TP over IPv6
9.3.24. Call Trace
9.4. L2TP Tunnel RADIUS Accounting
9.4.1. Accounting Packets List
9.4.2. RADIUS Attributes Value Considerations
9.4.3. Other Optional RADIUS Attributes
9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.4.5. MLPPP on the LNS Side
9.5. RADIUS Route Download
9.6. Managed SAP (MSAP)
9.6.1. MSAP QoS Configuration
9.6.2. Sticky MSAP
9.6.3. ESM Identification Process
9.6.3.1. SAP-ID ESM Identifier
9.6.3.2. DSLAM-ID
9.6.4. Default-Subscriber
9.6.5. Multicast Management
9.6.6. Subscriber Mirroring
9.7. Volume and Time Based Accounting
9.7.1. Metering
9.7.1.1. Categories Map and Categories
9.7.1.2. Quota Consumption
9.7.1.3. Minimum Credit Control Quota Values
9.7.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.7.2. Credit Negotiation Mechanisms
9.7.3. Action on Credit Exhaustion
9.7.4. Action on Error-Conditions
9.7.5. Applicability of Volume and Time Based Accounting
9.8. Subscriber Host Idle Timeout
9.9. Web Authentication Protocol (WPP)
9.9.1. WPP Configurations
9.9.2. WPP Triggered Host Creation
9.9.2.1. LUDB Support For WPP
9.9.3. WPP Multi-Chassis Redundancy Support
9.9.4. WPP Portal Group
9.10. One-time HTTP Redirection Overview
9.11. ESM over MPLS Pseudowires
9.11.1. Encapsulation
9.11.2. ESM and PW Ports
9.11.2.1. ESM on PW-Port Bound to a Physical Port
9.11.2.1.1. QoS Support
9.11.2.1.2. BNG Redundancy with ESM over Pseudowire
9.11.2.2. ESM on PXC-Based PW-Ports
9.12. Logical Link Identifier (LLID)
9.13. PADI Authentication Policy for Managed SAP (MSAP)
9.14. Open Authentication Model for DHCP and PPPoE Hosts
9.14.1. Terminology
9.14.2. LUDB and RADIUS Access Models
9.14.3. No Authentication
9.14.4. LUDB Only Access
9.14.5. LUDB Access via DHCPv4 Server
9.14.6. RADIUS Only Access
9.14.7. Consecutive Access to LUDB and RADIUS
9.14.8. RADIUS Fallback
9.15. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.15.1. Terminology
9.15.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
9.15.3. Default Gateway in IPv4 Flexible Addressing
9.15.4. IPv4 Subnet Sharing
9.15.5. IPv4 Subnet Mask Auto-Generation
9.15.6. Local-proxy-arp and arp-populate
9.15.7. Gi-address Configuration Consideration
9.15.8. PPPoE Considerations
9.15.9. IPoEv6 Considerations
9.15.10. General Configuration Guidelines for Flexible IP Address Assignment
9.15.11. Caveats
9.16. uRPF for Subscriber Management
9.17. IPoE Sessions
9.17.1. Enabling IPoE Sessions
9.17.2. IPoE Session Authentication
9.17.3. IPoE Session Accounting
9.17.4. IPoE Session Mid-Session Changes
9.17.5. IPoE Session Termination
9.17.6. Limiting the Number of IPoE sessions
9.17.7. SAP Session Index
9.17.8. Resiliency
9.17.9. Notes
9.17.10. Configuration Steps
9.17.11. IPoE Session Migration
9.17.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.18. Data-triggered Subscriber Management
9.18.1. Provisioning Data-triggered ESM
9.18.2. Authentication and Host Creation
9.18.3. DoS Protection
9.18.4. DHCP Promotion
9.18.5. Data-Triggered SLAAC Hosts
9.18.6. Stateful Multi-Chassis Redundancy (MCS)
9.18.7. Stateless Multi-Chassis Redundancy
9.18.7.1. MSAP Support
9.19. RADIUS Subscriber Services
9.19.1. Subscriber Service Building Blocks
9.19.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.19.1.2. RADIUS Python Interface
9.19.1.3. Python Script
9.19.1.3.1. Python Script Example
9.19.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.19.2. Subscriber Services RADIUS VSAs
9.19.3. Subscriber Service RADIUS Accounting
9.19.4. Accounting-Only Subscriber Service
9.19.5. QoS Override-based Subscriber Service
9.19.6. PCC Rule-based Subscriber Services
9.19.6.1. PCC Rule Actions
9.19.6.2. PCC Rule Instantiation
9.19.6.3. PCC Rules in a Subscriber Service
9.19.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.19.6.5. PCC Rules on HSMDAv2
9.19.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
9.19.6.6. PCC Rule-based Subscriber Service Activation Failures
9.19.7. Combined Subscriber Services
9.19.8. Subscriber Services Python API
9.19.8.1. Common Subscriber Services Python API
9.19.8.2. Subscriber Service QoS Override Python API
9.19.8.3. Subscriber Service PCC Rules Python API
9.19.9. Operational Commands
9.19.9.1. Show Commands
9.19.9.2. Debug Commands
9.19.9.3. Resource Monitoring
9.20. Residential Gateway Replacement
9.21. ESM Troubleshooting Show Command
9.22. Subscriber Accumulated Statistics
9.23. Hybrid Access
9.23.1. BNG-based HAG
9.23.2. PGW-based HAG
9.24. Connection Bonding
9.24.1. Setup
9.24.2. Downstream Load-Balancing
9.24.3. QoS
9.24.4. Multicast
9.25. Configuring Enhanced Subscriber Management with CLI
9.25.1. Configuring RADIUS Authentication of DHCP Sessions
9.25.2. TCP MSS adjustment for ESM Hosts
9.25.3. Configuring Enhanced Subscriber Management
9.25.3.1. Basic Configurations
9.25.3.2. Subscriber Interface Configuration
9.25.3.3. Configuring Enhanced Subscriber Management Entities
9.25.3.3.1. Configuring a Subscriber Identification Policy
9.25.3.3.2. Configuring a Subscriber Profile
9.25.3.3.3. Configuring an SLA Profile
9.25.3.3.4. Configuring Explicit Mapping Entries
9.25.3.4. Routed CO with Basic Subscriber Management Features
9.25.3.5. Applying the Profiles and Policies
9.25.3.5.1. SLA Profile
9.25.4. Configuring Dual Homing
9.25.4.1. SHCV Policies
9.25.4.2. SHCV Policy
9.25.4.3. Subscriber Identification Policy
9.25.4.4. Subscriber Profile
9.26. Subscriber Management Command Reference
9.26.1. Command Hierarchies
9.26.1.1. ANCP Commands
9.26.1.2. Authentication Policy Commands
9.26.1.3. BGP Peering Policy Commands
9.26.1.4. Call Trace Commands
9.26.1.5. Category Map and Credit Control Policy Commands
9.26.1.6. Diameter Policy Commands
9.26.1.6.1. AAA Diameter Peer Policy Commands
9.26.1.7. Explicit Subscriber Mapping Commands
9.26.1.8. Filter Commands
9.26.1.9. GSMP Configuration Commands
9.26.1.10. Host Lockout Commands
9.26.1.11. Host Tracking Policy Commands
9.26.1.12. IGMP Policy Commands
9.26.1.13. Multi-Chassis Redundancy Commands
9.26.1.14. PIM Policy Commands
9.26.1.15. RADIUS Accounting Policy Commands
9.26.1.16. RADIUS Route Download Commands
9.26.1.17. Subscriber Management Diameter Application Policy Commands
9.26.1.18. Router Advertisement Commands
9.26.1.19. SLA Profile Commands
9.26.1.20. Subscriber Identification Policy Commands
9.26.1.21. Auto-Generated Subscriber Identification Key Commands
9.26.1.22. Auto-Generated Subscriber Identification Key Service Commands
9.26.1.23. Subscriber MCAC Policy Commands
9.26.1.24. Subscriber Profile Commands
9.26.1.25. IPoE Session Policy Commands
9.26.1.26. SHCV Policy Commands
9.26.1.27. Subscriber Management Service Commands
9.26.1.27.1. VPLS Subscriber Management Configuration Commands
9.26.1.27.2. Managed SAP Policy Commands
9.26.1.27.3. VPRN Subscriber Interface Commands
9.26.1.27.4. VPRN Group Interface Commands
9.26.1.27.5. IES Subscriber Management Configuration Commands
9.26.1.27.6. IES Subscriber Interface Commands
9.26.1.27.7. IES Group Interface Commands
9.26.1.27.8. Service Subscriber Interface, Group Interface IPoE Command
9.26.1.27.9. RIP Commands
9.26.1.27.10. VPort Commands
9.26.1.27.11. Redundant Interface Commands
9.26.1.27.12. Wireless Portal Protocol (WPP) Commands
9.26.1.27.13. Multiple PPPoE Session QoS Commands
9.26.1.27.14. Multicast Listener Discovery (MLD) Commands
9.26.1.28. Show Commands
9.26.1.29. Monitor Commands
9.26.1.30. Clear Commands
9.26.1.31. Debug Commands
9.26.1.32. Tools Commands
9.26.2. Triple Play Subscriber Management Configuration Commands
9.26.2.1. Triple Play Subscriber Management Configuration Commands
9.26.2.1.1. Generic Commands
9.26.2.1.2. ANCP Commands
9.26.2.1.3. Authentication Policy Commands
9.26.2.1.4. BGP Peering Policy Commands
9.26.2.1.5. Call Trace Commands
9.26.2.1.6. Category Map Commands
9.26.2.1.7. Diameter Commands
9.26.2.1.8. Explicit Subscriber Mapping Commands
9.26.2.1.9. GSMP Configuration Commands
9.26.2.1.10. Host Lockout Commands
9.26.2.1.11. IGMP Policy Commands
9.26.2.1.12. Managed SAP Policy Commands
9.26.2.1.13. Multicast Listener Discovery (MLD) Commands
9.26.2.1.14. Multi-Chassis Redundancy Commands
9.26.2.1.15. PIM Policy Commands
9.26.2.1.16. RADIUS Accounting Policy Commands
9.26.2.1.17. RADIUS Route Download Commands
9.26.2.1.18. Redundant Interface Commands
9.26.2.1.19. RIP Commands
9.26.2.1.20. Router Advertisement Policy Commands
9.26.2.1.21. SLA Profile Commands
9.26.2.1.22. Subscriber Identification Policy Commands
9.26.2.1.23. Subscriber Profile Commands
9.26.2.1.24. Subscriber Management Service Commands
9.26.2.1.25. Subscriber Management Service Commands
9.26.2.1.1.1. Vport Commands
9.26.2.1.2.1. IPoE Session Commands
9.26.2.1.3.1. SHCV Policy Commands
9.26.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.6.1. IPv6 Commands
9.26.2.1.25.1. Show Commands
9.26.2.2.25.1. Clear Commands
9.26.2.3.25.1. Tools Commands
9.26.2.4.25.1. Debug Commands
9.26.2.5.25.1. Monitor Commands
9.26.2.1.1. Vport Commands
9.26.2.1.2. IPoE Session Commands
9.26.2.1.3. SHCV Policy Commands
9.26.2.1.4. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.5. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.6. IPv6 Commands
9.26.2.1.25. Show Commands
9.26.2.2.25. Clear Commands
9.26.2.3.25. Tools Commands
9.26.2.4.25. Debug Commands
9.26.2.5.25. Monitor Commands
9.26.2.1.1.1. Vport Commands
9.26.2.1.2.1. IPoE Session Commands
9.26.2.1.3.1. SHCV Policy Commands
9.26.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.6.1. IPv6 Commands
9.26.2.1.25.1. Show Commands
9.26.2.2.25.1. Clear Commands
9.26.2.3.25.1. Tools Commands
9.26.2.4.25.1. Debug Commands
9.26.2.5.25.1. Monitor Commands
9.26.2.1.26. Vport Commands
9.26.2.1.27. IPoE Session Commands
9.26.2.1.28. SHCV Policy Commands
9.26.2.1.29. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.30. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.31. IPv6 Commands
9.26.2.2. Show Commands
9.26.2.3. Clear Commands
9.26.2.4. Tools Commands
9.26.2.5. Debug Commands
9.26.2.6. Monitor Commands
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. Overview
10.1.1. Terminology and Abbreviations
10.1.2. Restrictions
10.2. Deploying Oversubscribed Multi-Chassis Redundancy
10.2.1. Resource Exhaustion Notification and Simultaneous Failures
10.2.2. Resource Monitoring
10.2.3. Warm-Standby Mode Of Operation
10.2.4. IPoE vs PPPoE
10.2.5. Persistency
10.2.6. Routing and Redundant Interface in OMCR
10.2.7. Revertive Behavior
10.2.8. Service Restoration Times
10.2.9. Processing of the SRRP Flaps
10.2.10. Accounting
10.2.11. Configuration Guidelines
10.2.12. Troubleshooting Commands
10.3. OMCR Command Reference
10.3.1. Command Hierarchies
10.3.2. OMCR Configuration Commands
10.3.2.1. OMCR Configuration Commands
11. WIFI Aggregation and Offload
11.1. WIFI Aggregation and Offload Overview
11.2. Layer 2 over Soft-GRE Tunnels
11.2.1. Encapsulation
11.2.2. Data Path
11.2.3. MDA-based Redundancy
11.3. Tunnel Level Egress QoS
11.3.1. QoS Overrides
11.3.2. Operational Commands
11.4. Authentication
11.4.1. EAP-Based Authentication
11.4.1.1. RADIUS Proxy
11.4.1.1.1. RADIUS Proxy — Server Load-Balancing
11.4.1.1.2. RADIUS Proxy — Cache Lookup
11.4.1.1.3. RADIUS Proxy — Accounting
11.4.2. Portal Authentication
11.5. Address Assignment
11.6. WIFI Mobility Anchor
11.7. Wholesale
11.8. CGN on WLAN-GW
11.9. Lawful Intercept on WLAN-GW
11.10. WLAN Location Enhancements
11.10.1. Triggered Interim Accounting-Updates
11.10.2. Mobility Triggered Interim Updates with Counters
11.10.3. Operational Support
11.11. 3G/4G Interworking
11.11.1. Signaling Call Flow
11.11.1.1. GTP Setup with EAP Authentication
11.11.2. Location Notification in S2a
11.11.2.1. WLAN Location over S2a
11.11.2.2. Cellular Location over S2a
11.11.2.3. Cellular Location over Gn Interface
11.11.2.4. Operational Support
11.12. Migrant User Support
11.12.1. Migrant User Support with Portal-Authentication
11.12.1.1. DHCP
11.12.1.2. Authentication and Forwarding
11.12.2. Migrant User Support with EAP Authentication
11.12.3. Data Triggered Subscriber Creation
11.13. Distributed Subscriber Management (DSM)
11.13.1. DHCP
11.13.2. Authentication and Accounting
11.13.2.1. DSM Data-Plane
11.13.3. IP Filtering
11.13.3.1. Policing
11.13.3.2. Lawful Intercept (LI)
11.13.3.3. Data-Triggered UE Creation
11.13.4. Idle-Timeout and Session-Timeout Management
11.13.5. Operational Commands
11.13.6. Pool Manager
11.13.7. DHCPv6 and SLAAC
11.14. Call Trace
11.15. Distributed RADIUS Proxy
11.15.1. Enhanced Subscriber Management
11.15.2. Distributed Subscriber Management
11.15.3. VLAN Awareness
11.15.4. Operational Commands
11.16. WLAN-GW 1:1 Active-Backup Redundancy
11.16.1. DHCP Server Redundancy
11.16.2. Subscriber Creation after Switchover
11.17. WLAN-GW Triggered Stateless Redundancy (N:1)
11.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
11.19. IPv6-only Access
11.19.1. IPv6 GRE Tunnels
11.19.2. IPv6 Client-Side RADIUS Proxy
11.19.3. Dual-Stack UEs over WLAN-GW
11.19.3.1. SLAAC Prefix Assignment
11.19.3.2. DHCPv6 IA_NA Assignment
11.19.3.3. Migrant User Support
11.19.3.4. Accounting
11.20. Layer 2 Wholesale
11.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
11.22. Soft-L2TPv3 Tunnels
11.23. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
11.23.1. Processing on the V-GW
11.23.2. Processing on H-GW
11.23.3. Idle Timeout Handling
11.23.4. Distributed RADIUS Proxy for Closed SSID
11.23.5. H-GW Redundancy
11.24. ISA Operational Commands and Key Performance Indicators
11.24.1. ISA Resources
11.24.2. ISA Load
11.24.3. Packet Statistics
11.25. WiFi Command Reference
11.25.1. Command Hierarchies
11.25.1.1. WLAN-GW Commands
11.25.1.2. ISA Commands
11.25.1.3. WLAN-GW Service Commands
11.25.1.4. Subscriber Management vRGW (BRG Profile) Commands
11.25.1.5. Data Plane Related Commands
11.25.1.6. RADIUS Server and Proxy Commands
11.25.1.7. LUDB Matching for RADIUS Proxy Cache
11.25.1.8. Port Policy Commands
11.25.1.9. WIFI Aggregation and Offload – Migrant User Support Commands
11.25.1.10. Show Commands
11.25.1.11. Debug Commands
11.25.1.12. Tools Commands
11.25.1.13. Clear Commands
11.25.2. WIFI Aggregation and Offload Commands
11.25.2.1. WIFI Aggregation and Offload Commands
11.25.2.1.1. Generic Commands
11.25.2.1.2. WLAN-GW Commands
11.25.2.1.3. ISA Commands
11.25.2.1.4. RADIUS Server Policy Commands
11.25.2.2. CLI Command Description for RADIUS Server
11.25.2.3. CLI Command Description for RADIUS Proxy Server
11.25.2.4. LUDB Matching of RADIUS Proxy Cache Commands
11.25.2.5. WLAN-GW-Group Commands
11.25.2.6. Port Policy Commands
11.25.2.7. WLAN-GW Group Interface Commands
11.25.2.8. Migrant User Support Commands
11.25.2.8.1. Show Commands
11.25.2.8.2. Debug Commands
11.25.2.8.3. Tools Commands
11.25.2.8.4. Clear Commands
12. GTP
12.1. In This Chapter
12.2. GTP Uplink
12.2.1. Identification Attributes
12.2.2. P-GW/GGSN Selection
12.2.3. Configuration
12.2.4. QoS Support
12.2.5. GTP Session Hold
12.2.6. Selective Breakout
12.2.7. IPoE Support
12.2.8. PPPoE Support
12.3. GTP Access
12.3.1. GTP Termination
12.3.1.1. Multiple APNs
12.3.2. GTP Session Setup
12.3.2.1. Supported IP Stacks
12.3.3. QoS
12.3.4. Multicast
12.4. GTP Peering
12.5. Operational Commands
12.5.1. show router wlan-gw mobile-gateway
12.5.2. show router 300 wlan-gw mgw-address-cache
12.5.3. show subscriber-mgmt wlan-gw gtp-session detail
12.5.4. show subscriber-mgmt wlan-gw mgw-profile "default"
12.5.5. show subscriber-mgmt gtp statistics
12.6. GTP Command Reference
12.6.1. Command Hierarchies
12.6.1.1. GTP Commands
12.6.1.2. GTP Service Commands
12.6.1.3. GTP Show Commands
12.6.1.4. GTP Clear Commands
12.6.1.5. GTP Debug Commands
12.6.2. GTP Command Descriptions
12.6.2.1. GTP Commands
12.6.2.1.1. Generic Commands
12.6.2.1.2. GTP Commands
12.6.2.1.3. GTP Show Commands
12.6.2.1.4. GTP Clear Commands
12.6.2.1.5. GTP Debug Commands
13. Virtual Residential Gateway
13.1. Overview
13.1.1. Access Modes
13.1.2. Home Context on the vRGW
13.1.2.1. Implicit Home Authentication
13.1.2.2. Explicit Home Authentication
13.1.2.3. Change of Configuration
13.1.2.4. Home Lifetime
13.1.3. Device Context on the vRGW
13.1.4. Dynamic Configuration Changes
13.1.5. Per-Home Pool Management and L2-Aware NAT
13.1.5.1. Sticky IP Addresses
13.1.5.2. Managed Static IPv4 Addresses
13.1.5.3. DMZ
13.1.6. IPv6
13.1.7. QoS and Filter Support
13.1.8. Data-Triggered Authentication
13.1.9. Per-Host NAT Port Ranges
13.1.10. Inter-Chassis Redundancy
13.1.10.1. Pool State Synchronization
13.1.10.2. Regular Group Interfaces
13.1.10.3. WLAN-GW Group Interfaces
13.1.11. BRG and vRG Caveats
13.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
13.1.13. PPPoE Client
13.1.13.1. PPPoE Client Setup
13.1.13.2. PPPoE Client Failure
13.1.13.3. LCP Keepalive
13.1.13.4. MRU/MTU
13.1.14. SLAAC Prefix Replacement
13.2. Home LAN Extension
13.2.1. Overview
13.2.2. Authentication and Authorization
13.2.3. Data Plane Tables
13.2.4. BGP EVPN VPLS
13.2.5. Assistive Address Resolution
13.2.6. MAC Address Translation
13.2.7. Configuring HLE
13.3. AP Agnostic Access for Multiple Dwelling Units
13.3.1. Overview
13.3.2. Bridge Domain and BRG Identification
13.3.3. ARP Handling
13.3.4. Mobility
13.4.
13.4.1. Command Hierarchies
13.4.1.1. Subscriber Management BRG Profile Commands
13.4.1.2. Subscriber Management Commands
13.4.1.3. Service Commands
13.4.1.4. Router HLE Commands
13.4.1.5. Subscriber Management HLE Commands
13.4.1.6. Service Commands
13.4.1.7. Show Commands
13.4.1.8. Debug Commands
13.4.1.9. Clear Commands
13.4.1.10. Tools Commands
13.4.2. Command Descriptions
13.4.2.1. Generic Commands
13.4.2.2. vRGW Commands
13.4.2.3. Subscriber Management Commands
13.4.2.4. Service Commands
13.4.2.5. Router Home LAN Extension Commands
13.4.2.6. Subscriber Management Commands
13.4.2.7. Service Commands
13.4.2.8. Show Commands
13.4.2.9. Debug Commands
13.4.2.10. Clear Commands
13.4.2.11. Tools Commands
14. Service Chaining for ESM Hosts with L2-Aware NAT
14.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
14.1.1. Terminology
14.2. VAS Filters on the ISA
14.2.1. Matching
14.2.2. Forwarding
14.2.3. NSH Insertion
14.2.4. Configuration
14.3. EVPN Route Updates and Tracking
14.3.1. NVE Bridging to SF
14.3.2. NVE Routing to SF
14.4. Data Path on the Subscriber Edge
14.4.1. Upstream Traffic (Access to Network)
14.4.2. Downstream Traffic — From Network
14.5. Data Path on NVE
14.6. Service Chaining for ESM Hosts with L2-Aware NAT
14.6.1. Command Hierarchies
14.6.1.1. ISA Service Chaining Commands
14.6.1.2. Show Commands
14.6.2. Command Descriptions
14.6.2.1. Generic Commands
14.6.2.2. Service Chaining Commands
14.6.2.3. Show Commands
15. Dynamic Data Services
15.1. Introduction to Dynamic Data Services
15.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
15.3. Data-Triggered Dynamic Data Services
15.3.1. Data Trigger
15.3.2. Dynamic Services Data Trigger Capture SAP
15.3.3. RADIUS Authentication
15.3.4. Local Authentication
15.3.5. Data-Triggered Dynamic Service Provisioning
15.3.6. Control Plane Protection
15.3.7. Debugging
15.4. RADIUS Triggered Dynamic Data Services Command Reference
15.4.1. Command Hierarchies
15.4.1.1. RADIUS Triggered Dynamic Data Services Commands
15.4.1.2. Basic System Command
15.4.1.3. Show Commands
15.4.1.4. Clear Commands
15.4.1.5. Debug Commands
15.4.1.6. Tools Commands
15.4.2. RADIUS Triggered Dynamic Data Services Commands
15.4.2.1. Configuration Commands
15.4.2.2. Basic System Command
15.4.2.3. Show Commands
15.4.2.4. Clear Commands
15.4.2.5. Debug Commands
15.4.2.6. Tools Commands
16. Diameter and Diameter Applications
16.1. Restrictions
16.2. Terminology
16.3. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
16.3.1. Diameter Gy Out Of Credit Actions
16.3.1.1. Graceful Service Termination
16.3.2. Extended Failure Handling (EFH)
16.3.2.1. Extended Failure Handling Example Call Flow
16.3.2.2. Extended Failure Handling Triggers
16.3.2.3. Assigning Interim Credit
16.3.2.4. Enabling Extended Failure Handling
16.3.2.5. Configuration Example 1 - Single Volume Interim Credit Value
16.3.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
16.3.2.7. Monitoring the Extended Failure Handling State
16.3.2.8. Additional Call Flow Examples
16.3.2.8.1. User Disconnects While EFH is Active
16.3.2.8.2. The Maximum Number of Attempts is Reached
16.3.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
16.4. Policy Management via Gx Interface
16.4.1. Gx Protocol
16.4.2. Policy Assignment Models
16.4.3. IP-CAN Session – Gx Session Identification
16.4.3.1. User Identification in PCRF
16.4.3.2. NAS-Port-Id as Subscription-Id
16.4.4. Gx Interface and ESM Subscriber Instantiation
16.4.4.1. Gx and Dual-Stack Hosts
16.4.4.2. Gx and PPPoEv6-DHCP
16.4.5. Gx Fallback Function
16.4.6. Gx CCR-I Replays
16.4.7. Gx CCR-t Replays
16.4.7.1. RAR and CCR-t Replay
16.4.7.2. CCR-t Replay And Multi-Chassis Redundancy
16.4.7.3. CCR-t Replay And High Availability
16.4.8. Automatic Updates for IP Address Allocation/De-allocation
16.4.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
16.4.10. Gx, ESM and AA
16.4.10.1. ESM Subscriber-Host vs AA Subscriber
16.4.10.2. AA Subscriber State
16.4.11. Policy Management via Gx
16.4.12. Gx-Based Overrides
16.4.12.1. Instantiation of Gx Overrides
16.4.12.2. HTTP Redirect Override
16.4.12.3. Removal of Overrides
16.4.12.4. Examples of Gx Overrides
16.4.13. PCC Rules
16.4.13.1. PCC Rule Concept
16.4.13.2. PCC Rule Instantiation
16.4.13.3. Base QoS-Policy and Base Filter
16.4.13.4. Generic Policy Sharing and Rule Sharing
16.4.13.5. PCC Rule Name and PCC Rule Removal
16.4.13.6. Gx Rule Ordering
16.4.13.7. PCC Rule Override
16.4.13.8. Aggregation of IP-Criterion
16.4.13.9. Combining IPv4 and IPv6 Entries within the Rule
16.4.13.10. Gx Rules with Multiple Actions and Action Sharing
16.4.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
16.4.13.12. RADIUS and Gx Interaction
16.4.13.13. Bulk Changes via CLI while Gx Rules are Active
16.4.13.14. PCC Rule Direction
16.4.13.15. Action
16.4.13.16. Rate-Limiting Action (Ingress, Egress)
16.4.13.16.1. Dynamic Policers and Queue Mappings
16.4.13.16.2. Dynamic Policer Rates and Accounting Statistics
16.4.13.17. Forwarding-Class Change (Ingress, Egress)
16.4.13.18. QoS Forward (Ingress and Egress)
16.4.13.19. Next-Hop Redirect (Ingress)
16.4.13.20. HTTP Redirect (Ingress)
16.4.13.21. Filter Forward/Drop (Ingress and Egress)
16.4.13.22. Service Gating Function
16.4.13.23. PCC Rule Provisioning Example
16.4.13.24. Operational Aspects
16.4.13.25. PCC Rules and Capacity Planning
16.4.13.26. PCC Rule Scaling Example
16.4.14. NAS Filter Inserts
16.4.14.1. Examples of NAS Entry Inserts
16.4.15. Error Handing and Rule Failure Reporting in ESM
16.4.15.1. AVP Decoding Failure in Gx
16.4.15.2. ESM Rule-Installation Failure
16.4.15.3. Failure Reporting in AA
16.4.15.4. Summary of Failure Reporting
16.4.16. Usage-Monitoring and Reporting
16.4.16.1. ESM Usage-Monitoring - What is Being Monitored
16.4.16.2. AA Usage-Monitoring – What is Being Monitored
16.4.16.3. Requesting Usage-Monitoring in ESM
16.4.16.4. Reporting Accumulated Usage
16.4.16.5. Disabling Usage-Monitoring
16.4.16.6. Usage-Monitoring for PCC Rules
16.4.16.7. Session Termination
16.4.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
16.4.16.9. Usage-Monitoring Examples
16.4.17. Event Triggers
16.4.18. Subscriber Verification
16.4.19. Subscriber Termination
16.4.20. Mobility Support in WiFi
16.4.20.1. Redundancy
16.4.21. Persistency and Origin-State-ID AVP
16.4.22. Overload Protection
16.5. Diameter NASREQ Application
16.5.1. Sample Configuration Steps
16.6. Diameter Redundancy
16.6.1. Diameter Peer Level Redundancy
16.6.2. Diameter Multi-Chassis Redundancy
16.6.2.1. Diameter Proxy Model General Operational Principles
16.6.2.2. Diameter Proxy Activity Selection
16.6.2.3. Synchronization and MCS
16.6.2.4. Retransmissions
16.6.2.5. Retransmissions and the T-bit
16.6.2.6. Diameter Proxy Role
16.6.2.7. Diameter Proxy and CC-Request-Number AVP
16.6.2.8. Stateless Diameter Proxy
16.6.2.9. Switchover Scenarios
16.6.2.10. Log/Trap Generation Caused by Diameter Proxy State Change
16.6.2.11. Switchover Update Event (CCR-u)
16.6.2.12. Isolated Chassis
16.6.2.13. Diameter Identities
16.6.2.14. High Availability
16.6.3. Gx Specific Behavior
16.7. Diameter Debugging
17. Python Script Support for ESM
17.1. Python Script Support for ESM
17.2. Python in SR OS Overview
17.2.1. Python Policy – GTPv1-C API
17.2.2. Python Policy – GTPv2-C API
17.2.3. Python Changes
17.3. Python Support in sub-ident-policy
17.3.1. Configuration
17.3.2. Operator Debugging
17.3.3. Python Scripts
17.3.4. Sample Python Scripts
17.3.4.1. Example
17.3.4.2. Example
17.3.4.3. Example
17.3.5. Limitations
17.4. RADIUS Script Policy Overview
17.4.1. Python RADIUS API
17.4.2. Sample Script
17.5. Python Policy Overview
17.5.1. Python Policy – RADIUS API
17.5.2. Python Policy – DHCPv4 API
17.5.3. Python Policy – DHCPv6 API
17.5.4. Python Policy – Diameter API
17.5.5. Python Policy – DHCP Transaction Cache API
17.5.6. Python for PPPoE API
17.5.7. Python API for PPP Packet
17.5.8. Python API for PPP PAP
17.5.9. Python API for PPP CHAP
17.5.10. Python ESM API
17.5.11. Python Cache Support
17.5.12. Applying a Python Policy
17.5.13. Python Script Protection
17.6. Tips and Tricks
17.7. Python Command Reference
17.7.1. Command Hierarchies
17.7.1.1. Python Policy Commands
17.7.1.2. Python Script Commands
17.7.1.3. Services Commands
17.7.1.4. Show Commands
17.7.1.5. Tools Commands
17.7.1.6. Debug Commands
17.7.1.7. Clear Commands
17.7.2. Command Descriptions
17.7.2.1. Python Configuration Commands
17.7.2.1.1. Global Commands
17.7.2.1.2. Python Policy Commands
17.7.2.1.3. Python Script Commands
17.7.2.1.4. Services Commands
17.7.2.1.5. Tools Commands
17.7.2.2. Show Commands
17.7.2.3. Debug Commands
17.7.2.4. Clear Commands
17.8. Python RADIUS Command Reference
17.8.1. Command Hierarchies
17.8.2. Command Descriptions
17.8.2.1. Generic Commands
17.8.2.2. Script Commands
18. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2. Introduction to Triple Play
2.1. Nokia’s Triple Play Service Delivery Architecture
2.1.1. Introduction to Triple Play
2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.1.3. Architectural Foundations
2.1.4. Optimizing Triple Play Service Infrastructures
2.1.4.1. Distributed Service Edges
2.1.4.2. Service Differentiation, QoS Enablement
2.1.4.3. Virtual MAC Subnetting for VPLS
2.2. Services
2.2.1. Service Types
2.2.2. Service Policies
2.3. Nokia Service Model
2.3.1. Introduction
2.3.2. Service Entities
2.3.3. Customers
2.3.4. Service Access Points (SAPs)
2.3.4.1. SAP Encapsulation Types and Identifiers
2.3.4.2. Ethernet Encapsulations
2.3.4.3. SAP Considerations
2.3.5. Service Distribution Points (SDPs)
2.3.5.1. SDP Binding
2.3.5.2. Spoke and Mesh SDPs
2.3.5.3. SDP Encapsulation Types
2.3.5.3.1. GRE
2.3.5.3.2. MPLS
2.3.5.4. SDP Keepalives
2.4. Epipe Service Overview
2.5. VPLS Service Overview
2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.5.1.1. Residential Split Horizon Groups
2.6. IES Service Overview
2.6.1. IP Interface
2.7. VPRN Service Overview
2.8. Deploying and Provisioning Services
2.8.1. Phase 1: Core Network Construction
2.8.2. Phase 2: Service Administration
2.8.3. Phase 3: Service Provisioning
2.9. Configuration Notes
2.9.1. General
2.10. Configuring Triple Play Services with CLI
2.10.1. Configuring VPLS Residential Split Horizon Groups
2.10.1.1. Configuring Static Hosts
2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
2.10.1.1.4. Configuring Static Hosts on an IES SAP
2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
2.11. Triple Play Services Command Reference
2.11.1. Command Hierarchies
2.11.1.1. IES/VPRN Triple Play Commands
2.11.1.2. VPLS Triple Play Commands
2.11.1.3. Show Commands
2.11.1.4. Clear Commands
2.11.1.5. Debug Commands
2.11.1.6. Tools Commands
2.11.2. Command Descriptions
2.11.2.1. Global Commands
2.11.2.2. IES/VPRN Service Commands
2.11.2.2.1. VPLS Triple Play Commands
2.11.2.2.2. Service DHCP and Anti-Spoof Filtering Commands
2.11.2.2.3. Interface IPv6 Commands
2.11.2.3. Show Commands
2.11.2.3.1. IGMP Snooping Show Commands
2.11.2.4. Clear Commands
2.11.2.5. Debug Commands
2.11.2.6. Tools Commands
3. DHCP Management
3.1. DHCP Principles
3.2. DHCP Features
3.2.1. DHCP Relay
3.2.2. DHCPv4 Relay Proxy
3.2.3. Subscriber Identification Using Option 82 Field
3.2.3.1. Trusted and Untrusted
3.2.4. DHCP Snooping
3.2.5. DHCP Lease State Table
3.2.6. DHCP and Layer 3 Aggregation
3.2.6.1. DHCPv4 Snooping
3.2.6.2. DHCPv6 Snooping
3.2.7. Local DHCP Servers
3.2.7.1. Overview
3.2.7.2. Local DHCP Server Support
3.2.8. DHCPv6
3.2.8.1. DHCPv6 Relay Agent
3.2.8.2. DHCPv6 Prefix Options
3.2.8.3. Neighbor Resolution via DHCPv6 Relay
3.2.8.4. DHCPv6 Lease Persistency
3.2.8.5. Local Proxy Neighbor Discovery
3.2.8.6. IPv6oE Hosts Behind Bridged CPEs
3.2.8.7. IPv6 Link-Address Based Pool Selection
3.2.8.8. IPv6 Address/Prefix Stickiness
3.2.8.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.2.8.10. Host Connectivity Checks for IPv6
3.2.9. Lease Query
3.2.10. DHCPv6 to Server Option
3.2.11. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.2.12. DHCP Caching
3.2.13. Flexible Creation of DHCPv4/6 Host Parameters
3.2.14. Python DTC Variables and API
3.2.14.1. DTC Debugging Facility
3.2.15. Virtual Subnet for DHCPv4 Hosts
3.2.16. Address Reservation for Sticky Leases
3.3. Proxy DHCP Server
3.3.1. Local DHCP Servers
3.3.1.1. Terminology
3.3.1.2. Overview
3.3.1.3. DHCP Lease Synchronization
3.3.1.4. Intercommunication Link Failure Detection
3.3.1.5. DHCP Server Failover States
3.3.1.6. Lease Time Synchronization
3.3.1.7. Maximum Client Lead Time (MCLT)
3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.3.1.9. Fast-Switchover of IP Address/Prefix Delegation
3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.4. Local Address Assignment
3.4.1. Stateless Address Auto-Configuration
3.5. Configuring DHCP with CLI
3.5.1. Enabling DHCP Snooping
3.5.2. Configuring Local User Database Parameters
3.5.3. Configuring Option 82 Handling
3.5.4. Enabling DHCP Relay
3.6. Triple Play DHCP Command Reference
3.6.1. Command Hierarchies
3.6.1.1. System DHCP Commands
3.6.1.2. DHCP Filter Commands
3.6.1.3. Router DHCP Local User Database Commands
3.6.1.4. Local User Database Commands
3.6.1.4.1. IPoE Commands
3.6.1.4.2. PPP Commands
3.6.1.5. Service DHCP Commands
3.6.1.5.1. IES DHCP Commands
3.6.1.5.2. VPLS DHCP Commands
3.6.1.5.3. VPRN DHCP Commands
3.6.1.5.4. IES/VPRN IPv6-DHCP6 Commands
3.6.1.5.5. Anti-Spoof Filtering Commands
3.6.1.6. Show Commands
3.6.1.7. Tools Commands
3.6.1.8. Clear Commands
3.6.1.9. Debug Commands
3.6.2. Command Descriptions
3.6.2.1. Triple Play DHCP Configuration Commands
3.6.2.1.1. Global Commands
3.6.2.1.2. System DHCP Commands
3.6.2.1.3. DHCP Filter Commands
3.6.2.1.4. Local User Database Commands
3.6.2.1.5. Router DHCP Commands
3.6.2.1.6. DHCP Service Commands
3.6.2.1.7. Show Commands
3.6.2.1.8. Tools Commands
3.6.2.1.9. Clear Commands
3.6.2.1.10. Debug Commands
4. SLAAC
4.1. Stateless Address Auto-configuration (SLAAC) Management
4.2. SLAAC Principles
4.3. Configuration Overview
4.4. Router-Solicit Trigger
4.5. SLAAC Address Assignment
4.6. Static SLAAC Prefix Assignment
4.7. Dynamic SLAAC Prefix Assignment
4.8. SLAAC Prefix Replacement
5. Point-to-Point Protocol over Ethernet Management
5.1. PPPoE
5.1.1. PPPoE Authentication and Authorization
5.1.1.1. General Flow
5.1.1.2. RADIUS
5.1.1.3. Local User Database Directly Assigned to PPPoE Node
5.1.1.4. Subscriber per PPPoE Session Index
5.1.1.5. Local DHCP Server with Local User Database
5.1.2. Multiple Sessions Per MAC Address
5.1.3. PPP Session Re-establishment
5.1.4. Private Retail Subnets
5.1.5. IPCP Subnet Negotiation
5.1.5.1. Numbered WAN Support for Layer 3 RGs
5.1.6. IES as Retail Service for PPPoE Host
5.1.7. Unnumbered PPPoX
5.1.8. Selective Backhaul of PPPoE Traffic using an Epipe Service
5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.2.1. Terminology
5.2.2. LNS MLPPPoX
5.2.3. MLPPP Encapsulation
5.2.4. MLPPPoX Negotiation
5.2.5. Enabling MLPPPoX
5.2.6. Link Fragmentation and Interleaving (LFI)
5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.2.7. LFI Functionality Implemented in LNS
5.2.7.1. Last Mile QoS Awareness in the LNS
5.2.7.2. BB-ISA Processing
5.2.7.3. LNS-LAC Link
5.2.7.4. AN-RG Link
5.2.7.5. Home Link
5.2.7.6. Optimum Fragment Size Calculation by LNS
5.2.7.6.1. Encapsulation Based Fragment Size
5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
5.2.7.6.3. Selection of the Optimum Fragment Length
5.2.8. Upstream Traffic Considerations
5.2.9. Multiple Links MLPPPoX With No Interleaving
5.2.10. MLPPPoX Session Support
5.2.11. Session Load Balancing Across Multiple BB-ISAs
5.2.12. BB-ISA Hashing Considerations
5.2.13. Last Mile Rate and Encapsulation Parameters
5.2.14. Link Failure Detection
5.2.15. CoA Support
5.2.16. Accounting
5.2.17. Filters and Mirroring
5.2.18. PTA Considerations
5.2.19. QoS Considerations
5.2.19.1. Dual-Pass
5.2.19.2. Traffic Prioritization in LFI
5.2.19.3. Shaping Based on the Last Mile Wire Rates
5.2.19.4. Downstream Bandwidth Management on Egress Port
5.2.20. Sub/Sla-Profile Considerations
5.2.21. Example of MLPPPoX Session Setup Flow
5.2.22. Other Considerations
5.3. Configuration Notes
5.4. PPP Command Reference
5.4.1. Command Hierarchies
5.4.1.1. PPPoE Policy Configuration Commands
5.4.1.2. PPPoE Service Commands
5.4.1.3. PPPoE Local User Database Commands
5.4.1.4. MLPPP on LNS Commands
5.4.1.5. Show Commands
5.4.2. Command Descriptions
5.4.2.1. Generic Commands
5.4.2.1.1. Subscriber Management Commands
5.4.2.1.2. MLPPP on LNS Commands
5.4.2.1.3. PPP/PPPoE Service Commands
5.4.2.1.4. RADIUS Attribute Commands
5.4.2.2. Service Commands
5.4.2.3. Show Commands
5.4.2.4. Clear Commands
5.4.2.5. Debug Commands
6. Layer 2 Tunneling Protocol (L2TP)
6.1. Terminology
6.2. L2TP
6.2.1. LAC DF Bit
6.2.2. Handling L2TP Tunnel/Session Initialization Failures
6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.2.2. Peer Blacklist
6.2.2.3. Tunnel Blacklists
6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.2.4. Tunnel Selection Mechanism
6.2.2.5. Tunnel Probing
6.2.2.6. Controlling the Size of Blacklist
6.2.2.7. Displaying the Content of a Blacklist
6.2.2.8. Generating Trap when the Blacklist is Full
6.2.2.9. Premature Removal of Blacklisted Entries
6.2.2.10. Manual Purging of Entities within the Blacklist
6.2.3. CDN Result Code Overwrite
6.2.4. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. Traffic Steering on L2TP LAC
6.4.1. Steering Activation and Deactivation
6.4.2. Steering States
6.4.3. Configuring Traffic Steering on L2TP LAC
6.5. L2TP Tunnel RADIUS Accounting
6.5.1. Accounting Packets List
6.5.2. RADIUS Attributes Value Considerations
6.6. MLPPP on the LNS Side
6.7. LNS Reassembly
6.8. LNS Subscriber Policers
6.8.1. Policer Support
6.9. L2TP Command Reference
6.9.1. Command Hierarchies
6.9.1.1. L2TP Configuration Commands
6.9.1.2. Steering Profile Commands
6.9.1.3. L2TP Tunnel RADIUS Accounting Commands
6.9.1.4. Show Commands
6.9.1.5. Clear Commands
6.9.1.6. Debug Commands
6.9.1.7. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. L2TP Configuration Commands
6.9.2.1.1. Global Commands
6.9.2.1.2. L2TP Commands
6.9.2.2. Steering Profile Commands
6.9.2.3. L2TP Tunnel RADIUS Accounting Commands
6.9.2.4. Show Commands
6.9.2.5. Debug Commands
7. Triple Play Security
7.1. Triple Play Security Features
7.1.1. Anti-Spoofing Filters
7.1.1.1. Anti-spoofing Filter Types
7.1.1.2. Filtering Packets
7.1.2. Layer 2 Triple Play Security Features
7.1.2.1. MAC Pinning
7.1.2.2. MAC Protection
7.1.2.3. DoS Protection
7.1.2.3.1. Subscriber Aggregation Network
7.1.2.3.2. Network Control Filtering
7.1.2.4. VPLS Redirect Policy
7.1.3. ARP Handling
7.1.3.1. ARP Reply Agent
7.1.3.2. Dynamic ARP Table Population
7.1.3.3. Local Proxy ARP
7.1.4. Web Portal Redirect
7.2. Configuring Triple Play Security with CLI
7.2.1. Common Configuration Tasks
7.2.1.1. Configuring Anti-Spoofing Filters
7.2.1.2. Configuring Triple Play Security features
7.2.1.2.1. Configuring MAC Pinning
7.2.1.2.2. Configuring MAC Protection
7.2.1.2.3. Configuring VPLS Redirect Policy
7.2.1.3. Configuring ARP Handling
7.2.1.3.1. Configuring Proxy ARP
7.2.1.3.2. Configuring Local Proxy ARP
7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
7.2.1.3.4. Configuring Remote Proxy ARP
7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
7.2.1.3.6. Configuring CPU Protection
7.2.1.4. Configuring Web Portal Redirect
7.3. Triple Play Security Command Reference
7.3.1. Command Hierarchies
7.3.1.1. Anti-Spoofing Commands
7.3.1.2. Layer 2 Security Commands
7.3.1.3. ARP Handling Commands
7.3.1.4. Tools Commands
7.3.2. Command Descriptions
7.3.2.1. Triple Play Security Configuration Commands
7.3.2.1.1. Triple Play Anti-Spoofing Commands
7.3.2.1.2. Triple Play Layer 2 Security Commands
7.3.2.1.3. ARP Handling Commands
7.3.2.2. Show Commands
7.3.2.3. Tools Commands
8. Triple Play Multicast
8.1. Introduction to Multicast
8.2. Multicast in the Broadband Service Router
8.2.1. Internet Group Management Protocol
8.2.1.1. IGMP Versions and Interoperability Requirements
8.2.1.2. IGMP Version Transition
8.2.2. Multicast Listener Discovery
8.2.2.1. MLD Versions and Interoperability Requirements
8.2.2.2. Source Specific Multicast Groups
8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
8.3. Multicast in the BSA
8.3.1. IGMP Snooping
8.3.1.1. IGMP/MLD Message Processing
8.3.1.2. IGMP Message Processing
8.3.1.3. MLD Message Processing
8.3.1.4. IGMP/MLD Filtering
8.3.2. Multicast VPLS Registration (MVR)
8.3.3. Layer 3 Multicast Load Balancing
8.3.4. IGMP State Reporter
8.3.4.1. IGMP Data Records
8.3.4.2. Transport Mechanism
8.3.4.3. HA Compliance
8.3.4.4. QoS Awareness
8.3.4.5. IGMP Reporting Caveats
8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
8.4.1. Multicast Over IPoE
8.4.1.1. Per SAP Replication Mode
8.4.1.1.1. Per SAP Queue
8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.4.1.2. Per Subscriber Host Replication Mode
8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.4.2. Multicast Over PPPoE
8.4.3. IGMP Flooding Containment
8.4.4. IGMP/MLD Timers
8.4.5. IGMP/MLD Query Intervals
8.4.6. HQoS Adjustment
8.4.6.1. Host Tracking (HT) Considerations
8.4.6.2. HQoS Adjust Per Vport
8.4.6.2.1. Multi-Chassis Redundancy
8.4.6.2.2. Scalability Considerations
8.4.7. Redirection
8.4.8. Hierarchical Multicast CAC (H-MCAC)
8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
8.4.9. Determining MCAC Policy in Effect
8.4.10. Multicast Filtering
8.4.11. Joining the Multicast Tree
8.4.12. Wholesale/Retail Requirements
8.4.13. QoS Considerations
8.4.14. Redundancy Considerations
8.4.14.1. Redirection Considerations
8.4.15. Query Intervals for Multicast
8.4.15.1. ESM Host-based Queries
8.4.15.2. Group Interface-based Queries
8.5. Configuring Triple Play Multicast Services with CLI
8.5.1. Configuring IGMP Snooping in the BSA
8.5.1.1. Enabling IGMP Snooping in a VPLS Service
8.5.1.2. IGMPv3 Multicast Routers
8.5.1.3. With IGMPv1/2 Multicast Routers
8.5.1.4. Modifying IGMP Snooping Parameters
8.5.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
8.5.2. Configuring Static Multicast Groups on a SAP or SDP
8.5.2.1. Enabling IGMP Group Membership Report Filtering
8.5.2.1.1. Enabling IGMP Traffic Filtering
8.5.3. Configuring Multicast VPLS Registration (MVR)
8.5.4. Configuring IGMP, MLD, and PIM in the BSR
8.5.4.1. Enabling IGMP
8.5.4.2. Configuring IGMP Interface Parameters
8.5.4.3. Configuring Static Parameters
8.5.4.4. Configuring SSM Translation
8.5.4.5. Enabling MLD
8.5.4.6. Configuring MLD Interface Parameters
8.5.4.7. Configuring Static Parameters
8.5.4.8. Configuring SSM Translation
8.5.4.9. Configuring PIM
8.5.4.9.1. Enabling PIM
8.5.4.9.2. Configuring PIM Interface Parameters
8.5.4.9.3. Importing PIM Join/Register Policies
8.5.4.9.4. Configuring PIM Join/Register Policies
8.5.4.10. Configuring Bootstrap Message Import and Export Policies
8.6. Triple Play Multicast Command Reference
8.6.1. Command Hierarchies
8.6.1.1. Multicast Management Commands
8.6.1.2. Multicast Info Policy Bundle Commands
8.6.1.3. Multicast Service Commands
8.6.1.4. Ingress Multicast Path Management Commands
8.6.1.5. Multicast Redirection
8.6.1.6. Multicast Query Timer Commands
8.6.1.7. Show Commands
8.6.1.8. Debug Commands
8.6.2. Command Descriptions
8.6.2.1. Multicast Management Configuration Commands
8.6.2.1.1. Generic Commands
8.6.2.1.2. Multicast Management Commands
8.6.2.1.3. Bandwidth Policy Commands
8.6.2.1.4. Multicast Info Policy Commands
8.6.2.1.5. Service Commands
8.6.2.1.6. VPLS Multicast Commands
8.6.2.1.7. Chassis Level Commands
8.6.2.1.8. Multicast Redirection Commands
8.6.2.1.9. Multicast Query Timer Commands
8.6.2.1.10. Forwarding Plane Commands
8.6.2.2. Show Commands
8.6.2.3. Debug Commands
9. Triple Play Enhanced Subscriber Management
9.1. Uniform RADIUS Server Configuration
9.1.1. RADIUS Server Configuration
9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
9.1.1.2. Legacy RADIUS Server Configuration
9.2. RADIUS Authentication of Subscriber Sessions
9.2.1. RADIUS Authentication Extensions
9.2.1.1. Triple Play Network with RADIUS Authentication
9.2.2. RADIUS Authorization Extensions
9.2.2.1. Calling-Station-ID
9.2.2.2. Subscriber Session Timeout
9.2.2.2.1. Domain Name in Authentication
9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.2.2.4. SHCV Policy
9.2.3. radius-server-policy Retry Attempt Overview
9.2.4. AAA RADIUS Server Operation Status
9.2.5. AAA RADIUS Accounting Server Stickiness
9.2.6. AAA RADIUS Authentication Fallback Action
9.2.7. AAA Test User Account
9.2.8. Troubleshooting the RADIUS Server
9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.2.9.1. Provisioning IP Configuration of the Host
9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
9.2.9.3. Change of Authorization and Disconnect-Request
9.2.9.3.1. Change of Authorization using the Tools Command
9.2.9.4. RADIUS-Based Accounting
9.2.9.5. RADIUS Accounting Terminating Cause
9.2.9.6. Accounting Modes Of Operation
9.2.9.7. Per Session Accounting
9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
9.2.9.9. No Host-Accounting
9.2.9.10. Host-Accounting Enabled
9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.2.9.12. Accounting Interim Update Message Interval
9.2.9.13. CoA Triggered Accounting Interim Update
9.2.9.14. Class Attribute
9.2.9.15. User Name
9.2.9.16. Accounting-On and Accounting Off
9.2.9.17. RADIUS Accounting Message Buffering
9.2.9.18. Multiple Accounting Policies
9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.3. Enhanced Subscriber Management Overview
9.3.1. Enhanced Subscriber Management Basics
9.3.1.1. Standard and Enhanced Subscriber Management
9.3.1.1.1. Subscriber Management Definitions
9.3.1.1.2. Subscriber Identification Policy
9.3.1.1.3. Subscriber Identification String
9.3.1.1.4. Subscriber Profile
9.3.1.1.5. SLA Profile
9.3.1.1.6. Explicit Subscriber Profile Mapping
9.3.2. ESM for IPv6
9.3.2.1. Models
9.3.2.1.1. PPPoE Host
9.3.2.1.2. PPPoE RG
9.3.2.1.3. IPoE Host/RG
9.3.2.2. Setup
9.3.2.3. 64-bit and 128-bit WAN Mode
9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
9.3.2.4. Behavior
9.3.2.4.1. Dual Stack
9.3.2.4.2. Router Advertisements (RA)
9.3.2.4.3. CoA and Disconnect-Request
9.3.2.5. Delegated-Prefix-Length
9.3.2.5.1. Order of Preference for DPL
9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
9.3.2.6. DHCPv6 Relay Agent
9.3.2.6.1. Configuring a DHCPv6 Relay Agent
9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
9.3.2.8. DHCPv6 Local Server
9.3.3. Dynamic Subscriber Host Processing
9.3.3.1. Dynamic Tables
9.3.3.1.1. Active Subscriber Table
9.3.3.1.2. SLA Profile Instance Table
9.3.3.1.3. Subscriber Host Table
9.3.3.1.4. DHCP Lease State Table
9.3.4. Enhanced Subscriber Management Entities
9.3.4.1. Instantiating a New Host
9.3.4.2. Packet Processing for an Existing Host
9.3.5. ESM Host Lockout
9.3.5.1. Functionality
9.3.6. ANCP and GSMP
9.3.6.1. ANCP
9.3.6.1.1. Static ANCP Management
9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.3.6.1.3. ANCP String
9.3.6.1.4. ANCP Persistency Support
9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.3.6.3. DHCP Release Messages
9.3.6.3.1. DHCP Release
9.3.6.4. DHCP Client Mobility
9.3.6.5. DHCP Lease Control
9.3.7. Using Scripts for Dynamic Recognition of Subscribers
9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.3.7.3. Determining the Subscriber Profile
9.3.7.4. Determining the SLA Profile
9.3.7.4.1. SLA Profile Instance Sharing
9.3.7.4.2. SLA-Based Egress QoS Marking
9.3.8. Auto-Sub ID
9.3.8.1. Sub-id Identifiers
9.3.8.2. Dual Stack Hosts
9.3.8.3. Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
9.3.8.4. PPPoA/PPPoEoA Considerations
9.3.8.5. Deployment Considerations
9.3.8.6. Caveats
9.3.9. Limiting Subscribers and Hosts on a SAP
9.3.10. Static Subscriber Hosts
9.3.11. QoS for Subscribers and Hosts
9.3.11.1. QoS Parameters in Different Profiles
9.3.11.2. QoS Policy Overrides
9.3.12. ESM Subscriber Hierarchical Traffic Control
9.3.12.1. Subscriber HQoS
9.3.12.2. Subscriber CFHP
9.3.12.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.3.12.3.1. Broadband Network Gateway Application
9.3.12.3.2. Queue Determination and Scheduling
9.3.12.3.3. Weighted Scheduler Group
9.3.12.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.3.12.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.3.12.3.6. Vport Determination and Evaluation
9.3.12.3.7. Applying Aggregate Rate Limit to a Vport
9.3.12.3.8. Applying a Scheduler Policy to a Vport
9.3.12.3.9. Signaling of Last Mile Encapsulation Type
9.3.12.3.10. Configuration Example
9.3.13. Subscriber Volume Statistics
9.3.13.1. IP (Layer 3) Volume Accounting
9.3.13.2. Separate IPv4 and IPv6 Counters
9.3.14. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.3.14.1. IP Filter Attribute Format Details
9.3.14.2. Checking Filter Policy Details
9.3.15. ESM PPPoA/PPPoEoA
9.3.15.1. PPPoA
9.3.15.2. PPPoEoA
9.3.15.3. Hardware Support
9.3.15.4. Termination Points
9.3.15.5. PPPoA Encapsulation
9.3.15.5.1. PPPoEoA Encapsulation
9.3.15.6. Encapsulation Summary
9.3.15.7. Concurrent Support for Different Service Types on the Same Port
9.3.15.8. Restrictions in Scaled ATM MDA Mode
9.3.15.9. QoS Implementation
9.3.15.10. Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
9.3.15.11. Per VP Shaping
9.3.15.12. ATM/IOM QoS Integration
9.3.15.12.1. Intermediate Node Rate Limit/Shaper
9.3.15.12.2. Provisioning Aspects
9.3.15.12.3. HQoS Combinations
9.3.15.12.4. ATM Rate Adjustment
9.3.15.13. Subscriber Instantiation Use Cases
9.3.15.14. Authentication
9.3.15.15. LUDB Access via Capture SAP
9.3.15.16. Encapsulation Autosensing
9.3.15.17. SAP Autoprovisioning
9.3.15.18. PPP Nodes and ppp-policy
9.3.15.19. MTU Considerations
9.3.15.19.1. PPP(oE) Session Antispoofing
9.3.16. Multi-Chassis Synchronization
9.3.16.1. Overview
9.3.16.1.1. Loss of Synchronization and Reconciliation
9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
9.3.17.1. SRRP Messaging
9.3.17.2. SRRP and Multi-Chassis Synchronization
9.3.17.3. SRRP Instance
9.3.17.3.1. SRRP Instance MCS Key
9.3.17.3.2. Containing Service Type and ID
9.3.17.3.3. Containing Subscriber IP Interface Name
9.3.17.3.4. Subscriber Subnet Information
9.3.17.3.5. Containing Group IP Interface Information
9.3.17.3.6. Remote Redundant IP Interface Mismatch
9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.3.17.3.10. Local and Remote Dual Master Detected
9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.3.18. PPPoE MC Redundancy
9.3.18.1. SRRP Considerations for PPPoE
9.3.18.1.1. SRRP Fact-Checks
9.3.18.2. State Synchronization
9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.3.18.3. Traffic Control and Redundant Interface
9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
9.3.18.3.2. Subnet Assignment and Advertisement - Option ‘B’
9.3.18.4. MSAP Considerations
9.3.18.5. Unnumbered Interface Support
9.3.18.6. Compatibility with MC-LAG
9.3.18.7. IPv6 Support
9.3.18.8. Considerations with Local DHCP Server
9.3.18.9. Redundant Interface Considerations
9.3.19. Routed Central Office (CO)
9.3.19.1. Layer 3 Subscriber Interfaces
9.3.19.1.1. DHCP Interactions
9.3.19.1.2. Routed CO for IES Service
9.3.19.1.3. Routed CO for VPRN Service
9.3.19.2. Wholesale Retail Routed CO
9.3.19.2.1. Wholesale Retail Model
9.3.19.2.2. Configuration and Applicability
9.3.19.2.3. Hub-and-Spoke Forwarding
9.3.19.3. Routed Subscriber Hosts
9.3.19.3.1. Static Configured IPv4 Managed Route
9.3.19.3.2. Static Configured IPv6 Managed Route
9.3.19.3.3. Dynamic BGP Peering
9.3.19.3.4. RIP Listener
9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.3.19.3.6. GRT Lookup and Routed CO in a VPRN
9.3.20. Dual Homing
9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.3.20.2. Steady-State Operation of Dual-homed Ring
9.3.20.3. Broken-Ring Operation and the Transition to this State
9.3.20.4. Transition from Broken to Closed Ring State
9.3.20.5. Provisioning Aspects and Error Cases
9.3.20.6. Dual Homing to Two BSR Nodes
9.3.20.7. MC Services
9.3.20.8. Routed CO Dual Homing
9.3.20.8.1. Redundant Interfaces
9.3.20.8.2. SRRP in Dual Homing
9.3.20.8.3. Synchronization
9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.3.20.9. SRRP and Multi-Chassis Synchronization
9.3.20.10. Dual Homing and ANCP
9.3.21. SRRP Enhancement
9.3.21.1. SRRP Fate Sharing
9.3.21.2. Fate Sharing Algorithm
9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.3.21.3.2. Managed Routes
9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.3.21.3.4. Activating SRRP State Tracking
9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.3.21.5. Group Monitor
9.3.22. Subscriber Override
9.3.23. Dual Stack Lite
9.3.23.1. IP-in-IP
9.3.23.2. Configuring Dual Stack Lite
9.3.23.3. L2TP over IPv6
9.3.24. Call Trace
9.4. L2TP Tunnel RADIUS Accounting
9.4.1. Accounting Packets List
9.4.2. RADIUS Attributes Value Considerations
9.4.3. Other Optional RADIUS Attributes
9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.4.5. MLPPP on the LNS Side
9.5. RADIUS Route Download
9.6. Managed SAP (MSAP)
9.6.1. MSAP QoS Configuration
9.6.2. Sticky MSAP
9.6.3. ESM Identification Process
9.6.3.1. SAP-ID ESM Identifier
9.6.3.2. DSLAM-ID
9.6.4. Default-Subscriber
9.6.5. Multicast Management
9.6.6. Subscriber Mirroring
9.7. Volume and Time Based Accounting
9.7.1. Metering
9.7.1.1. Categories Map and Categories
9.7.1.2. Quota Consumption
9.7.1.3. Minimum Credit Control Quota Values
9.7.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.7.2. Credit Negotiation Mechanisms
9.7.3. Action on Credit Exhaustion
9.7.4. Action on Error-Conditions
9.7.5. Applicability of Volume and Time Based Accounting
9.8. Subscriber Host Idle Timeout
9.9. Web Authentication Protocol (WPP)
9.9.1. WPP Configurations
9.9.2. WPP Triggered Host Creation
9.9.2.1. LUDB Support For WPP
9.9.3. WPP Multi-Chassis Redundancy Support
9.9.4. WPP Portal Group
9.10. One-time HTTP Redirection Overview
9.11. ESM over MPLS Pseudowires
9.11.1. Encapsulation
9.11.2. ESM and PW Ports
9.11.2.1. ESM on PW-Port Bound to a Physical Port
9.11.2.1.1. QoS Support
9.11.2.1.2. BNG Redundancy with ESM over Pseudowire
9.11.2.2. ESM on PXC-Based PW-Ports
9.12. Logical Link Identifier (LLID)
9.13. PADI Authentication Policy for Managed SAP (MSAP)
9.14. Open Authentication Model for DHCP and PPPoE Hosts
9.14.1. Terminology
9.14.2. LUDB and RADIUS Access Models
9.14.3. No Authentication
9.14.4. LUDB Only Access
9.14.5. LUDB Access via DHCPv4 Server
9.14.6. RADIUS Only Access
9.14.7. Consecutive Access to LUDB and RADIUS
9.14.8. RADIUS Fallback
9.15. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.15.1. Terminology
9.15.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
9.15.3. Default Gateway in IPv4 Flexible Addressing
9.15.4. IPv4 Subnet Sharing
9.15.5. IPv4 Subnet Mask Auto-Generation
9.15.6. Local-proxy-arp and arp-populate
9.15.7. Gi-address Configuration Consideration
9.15.8. PPPoE Considerations
9.15.9. IPoEv6 Considerations
9.15.10. General Configuration Guidelines for Flexible IP Address Assignment
9.15.11. Caveats
9.16. uRPF for Subscriber Management
9.17. IPoE Sessions
9.17.1. Enabling IPoE Sessions
9.17.2. IPoE Session Authentication
9.17.3. IPoE Session Accounting
9.17.4. IPoE Session Mid-Session Changes
9.17.5. IPoE Session Termination
9.17.6. Limiting the Number of IPoE sessions
9.17.7. SAP Session Index
9.17.8. Resiliency
9.17.9. Notes
9.17.10. Configuration Steps
9.17.11. IPoE Session Migration
9.17.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.18. Data-triggered Subscriber Management
9.18.1. Provisioning Data-triggered ESM
9.18.2. Authentication and Host Creation
9.18.3. DoS Protection
9.18.4. DHCP Promotion
9.18.5. Data-Triggered SLAAC Hosts
9.18.6. Stateful Multi-Chassis Redundancy (MCS)
9.18.7. Stateless Multi-Chassis Redundancy
9.18.7.1. MSAP Support
9.19. RADIUS Subscriber Services
9.19.1. Subscriber Service Building Blocks
9.19.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.19.1.2. RADIUS Python Interface
9.19.1.3. Python Script
9.19.1.3.1. Python Script Example
9.19.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.19.2. Subscriber Services RADIUS VSAs
9.19.3. Subscriber Service RADIUS Accounting
9.19.4. Accounting-Only Subscriber Service
9.19.5. QoS Override-based Subscriber Service
9.19.6. PCC Rule-based Subscriber Services
9.19.6.1. PCC Rule Actions
9.19.6.2. PCC Rule Instantiation
9.19.6.3. PCC Rules in a Subscriber Service
9.19.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.19.6.5. PCC Rules on HSMDAv2
9.19.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
9.19.6.6. PCC Rule-based Subscriber Service Activation Failures
9.19.7. Combined Subscriber Services
9.19.8. Subscriber Services Python API
9.19.8.1. Common Subscriber Services Python API
9.19.8.2. Subscriber Service QoS Override Python API
9.19.8.3. Subscriber Service PCC Rules Python API
9.19.9. Operational Commands
9.19.9.1. Show Commands
9.19.9.2. Debug Commands
9.19.9.3. Resource Monitoring
9.20. Residential Gateway Replacement
9.21. ESM Troubleshooting Show Command
9.22. Subscriber Accumulated Statistics
9.23. Hybrid Access
9.23.1. BNG-based HAG
9.23.2. PGW-based HAG
9.24. Connection Bonding
9.24.1. Setup
9.24.2. Downstream Load-Balancing
9.24.3. QoS
9.24.4. Multicast
9.25. Configuring Enhanced Subscriber Management with CLI
9.25.1. Configuring RADIUS Authentication of DHCP Sessions
9.25.2. TCP MSS adjustment for ESM Hosts
9.25.3. Configuring Enhanced Subscriber Management
9.25.3.1. Basic Configurations
9.25.3.2. Subscriber Interface Configuration
9.25.3.3. Configuring Enhanced Subscriber Management Entities
9.25.3.3.1. Configuring a Subscriber Identification Policy
9.25.3.3.2. Configuring a Subscriber Profile
9.25.3.3.3. Configuring an SLA Profile
9.25.3.3.4. Configuring Explicit Mapping Entries
9.25.3.4. Routed CO with Basic Subscriber Management Features
9.25.3.5. Applying the Profiles and Policies
9.25.3.5.1. SLA Profile
9.25.4. Configuring Dual Homing
9.25.4.1. SHCV Policies
9.25.4.2. SHCV Policy
9.25.4.3. Subscriber Identification Policy
9.25.4.4. Subscriber Profile
9.26. Subscriber Management Command Reference
9.26.1. Command Hierarchies
9.26.1.1. ANCP Commands
9.26.1.2. Authentication Policy Commands
9.26.1.3. BGP Peering Policy Commands
9.26.1.4. Call Trace Commands
9.26.1.5. Category Map and Credit Control Policy Commands
9.26.1.6. Diameter Policy Commands
9.26.1.6.1. AAA Diameter Peer Policy Commands
9.26.1.7. Explicit Subscriber Mapping Commands
9.26.1.8. Filter Commands
9.26.1.9. GSMP Configuration Commands
9.26.1.10. Host Lockout Commands
9.26.1.11. Host Tracking Policy Commands
9.26.1.12. IGMP Policy Commands
9.26.1.13. Multi-Chassis Redundancy Commands
9.26.1.14. PIM Policy Commands
9.26.1.15. RADIUS Accounting Policy Commands
9.26.1.16. RADIUS Route Download Commands
9.26.1.17. Subscriber Management Diameter Application Policy Commands
9.26.1.18. Router Advertisement Commands
9.26.1.19. SLA Profile Commands
9.26.1.20. Subscriber Identification Policy Commands
9.26.1.21. Auto-Generated Subscriber Identification Key Commands
9.26.1.22. Auto-Generated Subscriber Identification Key Service Commands
9.26.1.23. Subscriber MCAC Policy Commands
9.26.1.24. Subscriber Profile Commands
9.26.1.25. IPoE Session Policy Commands
9.26.1.26. SHCV Policy Commands
9.26.1.27. Subscriber Management Service Commands
9.26.1.27.1. VPLS Subscriber Management Configuration Commands
9.26.1.27.2. Managed SAP Policy Commands
9.26.1.27.3. VPRN Subscriber Interface Commands
9.26.1.27.4. VPRN Group Interface Commands
9.26.1.27.5. IES Subscriber Management Configuration Commands
9.26.1.27.6. IES Subscriber Interface Commands
9.26.1.27.7. IES Group Interface Commands
9.26.1.27.8. Service Subscriber Interface, Group Interface IPoE Command
9.26.1.27.9. RIP Commands
9.26.1.27.10. VPort Commands
9.26.1.27.11. Redundant Interface Commands
9.26.1.27.12. Wireless Portal Protocol (WPP) Commands
9.26.1.27.13. Multiple PPPoE Session QoS Commands
9.26.1.27.14. Multicast Listener Discovery (MLD) Commands
9.26.1.28. Show Commands
9.26.1.29. Monitor Commands
9.26.1.30. Clear Commands
9.26.1.31. Debug Commands
9.26.1.32. Tools Commands
9.26.2. Triple Play Subscriber Management Configuration Commands
9.26.2.1. Triple Play Subscriber Management Configuration Commands
9.26.2.1.1. Generic Commands
9.26.2.1.2. ANCP Commands
9.26.2.1.3. Authentication Policy Commands
9.26.2.1.4. BGP Peering Policy Commands
9.26.2.1.5. Call Trace Commands
9.26.2.1.6. Category Map Commands
9.26.2.1.7. Diameter Commands
9.26.2.1.8. Explicit Subscriber Mapping Commands
9.26.2.1.9. GSMP Configuration Commands
9.26.2.1.10. Host Lockout Commands
9.26.2.1.11. IGMP Policy Commands
9.26.2.1.12. Managed SAP Policy Commands
9.26.2.1.13. Multicast Listener Discovery (MLD) Commands
9.26.2.1.14. Multi-Chassis Redundancy Commands
9.26.2.1.15. PIM Policy Commands
9.26.2.1.16. RADIUS Accounting Policy Commands
9.26.2.1.17. RADIUS Route Download Commands
9.26.2.1.18. Redundant Interface Commands
9.26.2.1.19. RIP Commands
9.26.2.1.20. Router Advertisement Policy Commands
9.26.2.1.21. SLA Profile Commands
9.26.2.1.22. Subscriber Identification Policy Commands
9.26.2.1.23. Subscriber Profile Commands
9.26.2.1.24. Subscriber Management Service Commands
9.26.2.1.25. Subscriber Management Service Commands
9.26.2.1.1.1. Vport Commands
9.26.2.1.2.1. IPoE Session Commands
9.26.2.1.3.1. SHCV Policy Commands
9.26.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.6.1. IPv6 Commands
9.26.2.1.25.1. Show Commands
9.26.2.2.25.1. Clear Commands
9.26.2.3.25.1. Tools Commands
9.26.2.4.25.1. Debug Commands
9.26.2.5.25.1. Monitor Commands
9.26.2.1.1. Vport Commands
9.26.2.1.2. IPoE Session Commands
9.26.2.1.3. SHCV Policy Commands
9.26.2.1.4. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.5. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.6. IPv6 Commands
9.26.2.1.25. Show Commands
9.26.2.2.25. Clear Commands
9.26.2.3.25. Tools Commands
9.26.2.4.25. Debug Commands
9.26.2.5.25. Monitor Commands
9.26.2.1.1.1. Vport Commands
9.26.2.1.2.1. IPoE Session Commands
9.26.2.1.3.1. SHCV Policy Commands
9.26.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.6.1. IPv6 Commands
9.26.2.1.25.1. Show Commands
9.26.2.2.25.1. Clear Commands
9.26.2.3.25.1. Tools Commands
9.26.2.4.25.1. Debug Commands
9.26.2.5.25.1. Monitor Commands
9.26.2.1.26. Vport Commands
9.26.2.1.27. IPoE Session Commands
9.26.2.1.28. SHCV Policy Commands
9.26.2.1.29. Service DHCP and Anti-Spoof Filtering Commands
9.26.2.1.30. Auto-Generated Subscriber Identification Key Commands
9.26.2.1.31. IPv6 Commands
9.26.2.2. Show Commands
9.26.2.3. Clear Commands
9.26.2.4. Tools Commands
9.26.2.5. Debug Commands
9.26.2.6. Monitor Commands
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. Overview
10.1.1. Terminology and Abbreviations
10.1.2. Restrictions
10.2. Deploying Oversubscribed Multi-Chassis Redundancy
10.2.1. Resource Exhaustion Notification and Simultaneous Failures
10.2.2. Resource Monitoring
10.2.3. Warm-Standby Mode Of Operation
10.2.4. IPoE vs PPPoE
10.2.5. Persistency
10.2.6. Routing and Redundant Interface in OMCR
10.2.7. Revertive Behavior
10.2.8. Service Restoration Times
10.2.9. Processing of the SRRP Flaps
10.2.10. Accounting
10.2.11. Configuration Guidelines
10.2.12. Troubleshooting Commands
10.3. OMCR Command Reference
10.3.1. Command Hierarchies
10.3.2. OMCR Configuration Commands
10.3.2.1. OMCR Configuration Commands
11. WIFI Aggregation and Offload
11.1. WIFI Aggregation and Offload Overview
11.2. Layer 2 over Soft-GRE Tunnels
11.2.1. Encapsulation
11.2.2. Data Path
11.2.3. MDA-based Redundancy
11.3. Tunnel Level Egress QoS
11.3.1. QoS Overrides
11.3.2. Operational Commands
11.4. Authentication
11.4.1. EAP-Based Authentication
11.4.1.1. RADIUS Proxy
11.4.1.1.1. RADIUS Proxy — Server Load-Balancing
11.4.1.1.2. RADIUS Proxy — Cache Lookup
11.4.1.1.3. RADIUS Proxy — Accounting
11.4.2. Portal Authentication
11.5. Address Assignment
11.6. WIFI Mobility Anchor
11.7. Wholesale
11.8. CGN on WLAN-GW
11.9. Lawful Intercept on WLAN-GW
11.10. WLAN Location Enhancements
11.10.1. Triggered Interim Accounting-Updates
11.10.2. Mobility Triggered Interim Updates with Counters
11.10.3. Operational Support
11.11. 3G/4G Interworking
11.11.1. Signaling Call Flow
11.11.1.1. GTP Setup with EAP Authentication
11.11.2. Location Notification in S2a
11.11.2.1. WLAN Location over S2a
11.11.2.2. Cellular Location over S2a
11.11.2.3. Cellular Location over Gn Interface
11.11.2.4. Operational Support
11.12. Migrant User Support
11.12.1. Migrant User Support with Portal-Authentication
11.12.1.1. DHCP
11.12.1.2. Authentication and Forwarding
11.12.2. Migrant User Support with EAP Authentication
11.12.3. Data Triggered Subscriber Creation
11.13. Distributed Subscriber Management (DSM)
11.13.1. DHCP
11.13.2. Authentication and Accounting
11.13.2.1. DSM Data-Plane
11.13.3. IP Filtering
11.13.3.1. Policing
11.13.3.2. Lawful Intercept (LI)
11.13.3.3. Data-Triggered UE Creation
11.13.4. Idle-Timeout and Session-Timeout Management
11.13.5. Operational Commands
11.13.6. Pool Manager
11.13.7. DHCPv6 and SLAAC
11.14. Call Trace
11.15. Distributed RADIUS Proxy
11.15.1. Enhanced Subscriber Management
11.15.2. Distributed Subscriber Management
11.15.3. VLAN Awareness
11.15.4. Operational Commands
11.16. WLAN-GW 1:1 Active-Backup Redundancy
11.16.1. DHCP Server Redundancy
11.16.2. Subscriber Creation after Switchover
11.17. WLAN-GW Triggered Stateless Redundancy (N:1)
11.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
11.19. IPv6-only Access
11.19.1. IPv6 GRE Tunnels
11.19.2. IPv6 Client-Side RADIUS Proxy
11.19.3. Dual-Stack UEs over WLAN-GW
11.19.3.1. SLAAC Prefix Assignment
11.19.3.2. DHCPv6 IA_NA Assignment
11.19.3.3. Migrant User Support
11.19.3.4. Accounting
11.20. Layer 2 Wholesale
11.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
11.22. Soft-L2TPv3 Tunnels
11.23. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
11.23.1. Processing on the V-GW
11.23.2. Processing on H-GW
11.23.3. Idle Timeout Handling
11.23.4. Distributed RADIUS Proxy for Closed SSID
11.23.5. H-GW Redundancy
11.24. ISA Operational Commands and Key Performance Indicators
11.24.1. ISA Resources
11.24.2. ISA Load
11.24.3. Packet Statistics
11.25. WiFi Command Reference
11.25.1. Command Hierarchies
11.25.1.1. WLAN-GW Commands
11.25.1.2. ISA Commands
11.25.1.3. WLAN-GW Service Commands
11.25.1.4. Subscriber Management vRGW (BRG Profile) Commands
11.25.1.5. Data Plane Related Commands
11.25.1.6. RADIUS Server and Proxy Commands
11.25.1.7. LUDB Matching for RADIUS Proxy Cache
11.25.1.8. Port Policy Commands
11.25.1.9. WIFI Aggregation and Offload – Migrant User Support Commands
11.25.1.10. Show Commands
11.25.1.11. Debug Commands
11.25.1.12. Tools Commands
11.25.1.13. Clear Commands
11.25.2. WIFI Aggregation and Offload Commands
11.25.2.1. WIFI Aggregation and Offload Commands
11.25.2.1.1. Generic Commands
11.25.2.1.2. WLAN-GW Commands
11.25.2.1.3. ISA Commands
11.25.2.1.4. RADIUS Server Policy Commands
11.25.2.2. CLI Command Description for RADIUS Server
11.25.2.3. CLI Command Description for RADIUS Proxy Server
11.25.2.4. LUDB Matching of RADIUS Proxy Cache Commands
11.25.2.5. WLAN-GW-Group Commands
11.25.2.6. Port Policy Commands
11.25.2.7. WLAN-GW Group Interface Commands
11.25.2.8. Migrant User Support Commands
11.25.2.8.1. Show Commands
11.25.2.8.2. Debug Commands
11.25.2.8.3. Tools Commands
11.25.2.8.4. Clear Commands
12. GTP
12.1. In This Chapter
12.2. GTP Uplink
12.2.1. Identification Attributes
12.2.2. P-GW/GGSN Selection
12.2.3. Configuration
12.2.4. QoS Support
12.2.5. GTP Session Hold
12.2.6. Selective Breakout
12.2.7. IPoE Support
12.2.8. PPPoE Support
12.3. GTP Access
12.3.1. GTP Termination
12.3.1.1. Multiple APNs
12.3.2. GTP Session Setup
12.3.2.1. Supported IP Stacks
12.3.3. QoS
12.3.4. Multicast
12.4. GTP Peering
12.5. Operational Commands
12.5.1. show router wlan-gw mobile-gateway
12.5.2. show router 300 wlan-gw mgw-address-cache
12.5.3. show subscriber-mgmt wlan-gw gtp-session detail
12.5.4. show subscriber-mgmt wlan-gw mgw-profile "default"
12.5.5. show subscriber-mgmt gtp statistics
12.6. GTP Command Reference
12.6.1. Command Hierarchies
12.6.1.1. GTP Commands
12.6.1.2. GTP Service Commands
12.6.1.3. GTP Show Commands
12.6.1.4. GTP Clear Commands
12.6.1.5. GTP Debug Commands
12.6.2. GTP Command Descriptions
12.6.2.1. GTP Commands
12.6.2.1.1. Generic Commands
12.6.2.1.2. GTP Commands
12.6.2.1.3. GTP Show Commands
12.6.2.1.4. GTP Clear Commands
12.6.2.1.5. GTP Debug Commands
13. Virtual Residential Gateway
13.1. Overview
13.1.1. Access Modes
13.1.2. Home Context on the vRGW
13.1.2.1. Implicit Home Authentication
13.1.2.2. Explicit Home Authentication
13.1.2.3. Change of Configuration
13.1.2.4. Home Lifetime
13.1.3. Device Context on the vRGW
13.1.4. Dynamic Configuration Changes
13.1.5. Per-Home Pool Management and L2-Aware NAT
13.1.5.1. Sticky IP Addresses
13.1.5.2. Managed Static IPv4 Addresses
13.1.5.3. DMZ
13.1.6. IPv6
13.1.7. QoS and Filter Support
13.1.8. Data-Triggered Authentication
13.1.9. Per-Host NAT Port Ranges
13.1.10. Inter-Chassis Redundancy
13.1.10.1. Pool State Synchronization
13.1.10.2. Regular Group Interfaces
13.1.10.3. WLAN-GW Group Interfaces
13.1.11. BRG and vRG Caveats
13.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
13.1.13. PPPoE Client
13.1.13.1. PPPoE Client Setup
13.1.13.2. PPPoE Client Failure
13.1.13.3. LCP Keepalive
13.1.13.4. MRU/MTU
13.1.14. SLAAC Prefix Replacement
13.2. Home LAN Extension
13.2.1. Overview
13.2.2. Authentication and Authorization
13.2.3. Data Plane Tables
13.2.4. BGP EVPN VPLS
13.2.5. Assistive Address Resolution
13.2.6. MAC Address Translation
13.2.7. Configuring HLE
13.3. AP Agnostic Access for Multiple Dwelling Units
13.3.1. Overview
13.3.2. Bridge Domain and BRG Identification
13.3.3. ARP Handling
13.3.4. Mobility
13.4.
13.4.1. Command Hierarchies
13.4.1.1. Subscriber Management BRG Profile Commands
13.4.1.2. Subscriber Management Commands
13.4.1.3. Service Commands
13.4.1.4. Router HLE Commands
13.4.1.5. Subscriber Management HLE Commands
13.4.1.6. Service Commands
13.4.1.7. Show Commands
13.4.1.8. Debug Commands
13.4.1.9. Clear Commands
13.4.1.10. Tools Commands
13.4.2. Command Descriptions
13.4.2.1. Generic Commands
13.4.2.2. vRGW Commands
13.4.2.3. Subscriber Management Commands
13.4.2.4. Service Commands
13.4.2.5. Router Home LAN Extension Commands
13.4.2.6. Subscriber Management Commands
13.4.2.7. Service Commands
13.4.2.8. Show Commands
13.4.2.9. Debug Commands
13.4.2.10. Clear Commands
13.4.2.11. Tools Commands
14. Service Chaining for ESM Hosts with L2-Aware NAT
14.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
14.1.1. Terminology
14.2. VAS Filters on the ISA
14.2.1. Matching
14.2.2. Forwarding
14.2.3. NSH Insertion
14.2.4. Configuration
14.3. EVPN Route Updates and Tracking
14.3.1. NVE Bridging to SF
14.3.2. NVE Routing to SF
14.4. Data Path on the Subscriber Edge
14.4.1. Upstream Traffic (Access to Network)
14.4.2. Downstream Traffic — From Network
14.5. Data Path on NVE
14.6. Service Chaining for ESM Hosts with L2-Aware NAT
14.6.1. Command Hierarchies
14.6.1.1. ISA Service Chaining Commands
14.6.1.2. Show Commands
14.6.2. Command Descriptions
14.6.2.1. Generic Commands
14.6.2.2. Service Chaining Commands
14.6.2.3. Show Commands
15. Dynamic Data Services
15.1. Introduction to Dynamic Data Services
15.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
15.3. Data-Triggered Dynamic Data Services
15.3.1. Data Trigger
15.3.2. Dynamic Services Data Trigger Capture SAP
15.3.3. RADIUS Authentication
15.3.4. Local Authentication
15.3.5. Data-Triggered Dynamic Service Provisioning
15.3.6. Control Plane Protection
15.3.7. Debugging
15.4. RADIUS Triggered Dynamic Data Services Command Reference
15.4.1. Command Hierarchies
15.4.1.1. RADIUS Triggered Dynamic Data Services Commands
15.4.1.2. Basic System Command
15.4.1.3. Show Commands
15.4.1.4. Clear Commands
15.4.1.5. Debug Commands
15.4.1.6. Tools Commands
15.4.2. RADIUS Triggered Dynamic Data Services Commands
15.4.2.1. Configuration Commands
15.4.2.2. Basic System Command
15.4.2.3. Show Commands
15.4.2.4. Clear Commands
15.4.2.5. Debug Commands
15.4.2.6. Tools Commands
16. Diameter and Diameter Applications
16.1. Restrictions
16.2. Terminology
16.3. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
16.3.1. Diameter Gy Out Of Credit Actions
16.3.1.1. Graceful Service Termination
16.3.2. Extended Failure Handling (EFH)
16.3.2.1. Extended Failure Handling Example Call Flow
16.3.2.2. Extended Failure Handling Triggers
16.3.2.3. Assigning Interim Credit
16.3.2.4. Enabling Extended Failure Handling
16.3.2.5. Configuration Example 1 - Single Volume Interim Credit Value
16.3.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
16.3.2.7. Monitoring the Extended Failure Handling State
16.3.2.8. Additional Call Flow Examples
16.3.2.8.1. User Disconnects While EFH is Active
16.3.2.8.2. The Maximum Number of Attempts is Reached
16.3.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
16.4. Policy Management via Gx Interface
16.4.1. Gx Protocol
16.4.2. Policy Assignment Models
16.4.3. IP-CAN Session – Gx Session Identification
16.4.3.1. User Identification in PCRF
16.4.3.2. NAS-Port-Id as Subscription-Id
16.4.4. Gx Interface and ESM Subscriber Instantiation
16.4.4.1. Gx and Dual-Stack Hosts
16.4.4.2. Gx and PPPoEv6-DHCP
16.4.5. Gx Fallback Function
16.4.6. Gx CCR-I Replays
16.4.7. Gx CCR-t Replays
16.4.7.1. RAR and CCR-t Replay
16.4.7.2. CCR-t Replay And Multi-Chassis Redundancy
16.4.7.3. CCR-t Replay And High Availability
16.4.8. Automatic Updates for IP Address Allocation/De-allocation
16.4.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
16.4.10. Gx, ESM and AA
16.4.10.1. ESM Subscriber-Host vs AA Subscriber
16.4.10.2. AA Subscriber State
16.4.11. Policy Management via Gx
16.4.12. Gx-Based Overrides
16.4.12.1. Instantiation of Gx Overrides
16.4.12.2. HTTP Redirect Override
16.4.12.3. Removal of Overrides
16.4.12.4. Examples of Gx Overrides
16.4.13. PCC Rules
16.4.13.1. PCC Rule Concept
16.4.13.2. PCC Rule Instantiation
16.4.13.3. Base QoS-Policy and Base Filter
16.4.13.4. Generic Policy Sharing and Rule Sharing
16.4.13.5. PCC Rule Name and PCC Rule Removal
16.4.13.6. Gx Rule Ordering
16.4.13.7. PCC Rule Override
16.4.13.8. Aggregation of IP-Criterion
16.4.13.9. Combining IPv4 and IPv6 Entries within the Rule
16.4.13.10. Gx Rules with Multiple Actions and Action Sharing
16.4.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
16.4.13.12. RADIUS and Gx Interaction
16.4.13.13. Bulk Changes via CLI while Gx Rules are Active
16.4.13.14. PCC Rule Direction
16.4.13.15. Action
16.4.13.16. Rate-Limiting Action (Ingress, Egress)
16.4.13.16.1. Dynamic Policers and Queue Mappings
16.4.13.16.2. Dynamic Policer Rates and Accounting Statistics
16.4.13.17. Forwarding-Class Change (Ingress, Egress)
16.4.13.18. QoS Forward (Ingress and Egress)
16.4.13.19. Next-Hop Redirect (Ingress)
16.4.13.20. HTTP Redirect (Ingress)
16.4.13.21. Filter Forward/Drop (Ingress and Egress)
16.4.13.22. Service Gating Function
16.4.13.23. PCC Rule Provisioning Example
16.4.13.24. Operational Aspects
16.4.13.25. PCC Rules and Capacity Planning
16.4.13.26. PCC Rule Scaling Example
16.4.14. NAS Filter Inserts
16.4.14.1. Examples of NAS Entry Inserts
16.4.15. Error Handing and Rule Failure Reporting in ESM
16.4.15.1. AVP Decoding Failure in Gx
16.4.15.2. ESM Rule-Installation Failure
16.4.15.3. Failure Reporting in AA
16.4.15.4. Summary of Failure Reporting
16.4.16. Usage-Monitoring and Reporting
16.4.16.1. ESM Usage-Monitoring - What is Being Monitored
16.4.16.2. AA Usage-Monitoring – What is Being Monitored
16.4.16.3. Requesting Usage-Monitoring in ESM
16.4.16.4. Reporting Accumulated Usage
16.4.16.5. Disabling Usage-Monitoring
16.4.16.6. Usage-Monitoring for PCC Rules
16.4.16.7. Session Termination
16.4.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
16.4.16.9. Usage-Monitoring Examples
16.4.17. Event Triggers
16.4.18. Subscriber Verification
16.4.19. Subscriber Termination
16.4.20. Mobility Support in WiFi
16.4.20.1. Redundancy
16.4.21. Persistency and Origin-State-ID AVP
16.4.22. Overload Protection
16.5. Diameter NASREQ Application
16.5.1. Sample Configuration Steps
16.6. Diameter Redundancy
16.6.1. Diameter Peer Level Redundancy
16.6.2. Diameter Multi-Chassis Redundancy
16.6.2.1. Diameter Proxy Model General Operational Principles
16.6.2.2. Diameter Proxy Activity Selection
16.6.2.3. Synchronization and MCS
16.6.2.4. Retransmissions
16.6.2.5. Retransmissions and the T-bit
16.6.2.6. Diameter Proxy Role
16.6.2.7. Diameter Proxy and CC-Request-Number AVP
16.6.2.8. Stateless Diameter Proxy
16.6.2.9. Switchover Scenarios
16.6.2.10. Log/Trap Generation Caused by Diameter Proxy State Change
16.6.2.11. Switchover Update Event (CCR-u)
16.6.2.12. Isolated Chassis
16.6.2.13. Diameter Identities
16.6.2.14. High Availability
16.6.3. Gx Specific Behavior
16.7. Diameter Debugging
17. Python Script Support for ESM
17.1. Python Script Support for ESM
17.2. Python in SR OS Overview
17.2.1. Python Policy – GTPv1-C API
17.2.2. Python Policy – GTPv2-C API
17.2.3. Python Changes
17.3. Python Support in sub-ident-policy
17.3.1. Configuration
17.3.2. Operator Debugging
17.3.3. Python Scripts
17.3.4. Sample Python Scripts
17.3.4.1. Example
17.3.4.2. Example
17.3.4.3. Example
17.3.5. Limitations
17.4. RADIUS Script Policy Overview
17.4.1. Python RADIUS API
17.4.2. Sample Script
17.5. Python Policy Overview
17.5.1. Python Policy – RADIUS API
17.5.2. Python Policy – DHCPv4 API
17.5.3. Python Policy – DHCPv6 API
17.5.4. Python Policy – Diameter API
17.5.5. Python Policy – DHCP Transaction Cache API
17.5.6. Python for PPPoE API
17.5.7. Python API for PPP Packet
17.5.8. Python API for PPP PAP
17.5.9. Python API for PPP CHAP
17.5.10. Python ESM API
17.5.11. Python Cache Support
17.5.12. Applying a Python Policy
17.5.13. Python Script Protection
17.6. Tips and Tricks
17.7. Python Command Reference
17.7.1. Command Hierarchies
17.7.1.1. Python Policy Commands
17.7.1.2. Python Script Commands
17.7.1.3. Services Commands
17.7.1.4. Show Commands
17.7.1.5. Tools Commands
17.7.1.6. Debug Commands
17.7.1.7. Clear Commands
17.7.2. Command Descriptions
17.7.2.1. Python Configuration Commands
17.7.2.1.1. Global Commands
17.7.2.1.2. Python Policy Commands
17.7.2.1.3. Python Script Commands
17.7.2.1.4. Services Commands
17.7.2.1.5. Tools Commands
17.7.2.2. Show Commands
17.7.2.3. Debug Commands
17.7.2.4. Clear Commands
17.8. Python RADIUS Command Reference
17.8.1. Command Hierarchies
17.8.2. Command Descriptions
17.8.2.1. Generic Commands
17.8.2.2. Script Commands
18. Standards and Protocol Support
Customer Document and Product Support
Unicast Routing Protocols Guide R16.0.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. RIP Overview
2.1.1. RIP Features
2.1.1.1. RIP Version Types
2.1.1.2. RIPv2 Authentication
2.1.1.3. RIP Packet Format
2.1.1.3.1. RIPv1 Format
2.1.1.3.2. RIPv2 Format
2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
2.2. RIPng
2.2.1. RIPng Protocol
2.3. Common Attributes
2.3.1. Metrics
2.3.2. Timers
2.3.3. Import and Export Policies
2.3.4. Hierarchical Levels
2.4. RIP Configuration Process Overview
2.5. Configuration Notes
2.5.1. General
2.6. Configuring RIP with CLI
2.6.1. RIP and RIPng Configuration Overview
2.6.1.1. Preconfiguration Requirements
2.6.1.2. RIP Hierarchy
2.6.2. Basic RIP Configuration
2.6.3. Common Configuration Tasks
2.6.3.1. Configuring Interfaces
2.6.3.2. Configuring a Route Policy
2.6.3.3. Configuring RIP Parameters
2.6.3.4. Configuring Global-Level Parameters
2.6.3.5. Configuring Group-Level Parameters
2.6.3.6. Configuring Neighbor-Level Parameters
2.7. RIP Configuration Management Tasks
2.7.1. Modifying RIP Parameters
2.7.2. Deleting a Group
2.7.3. Deleting a Neighbor
2.8. RIP Configuration Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Configuration Commands
2.8.1.1.1. Group Commands
2.8.1.1.2. Neighbor Commands
2.8.1.2. RIPng Configuration Commands
2.8.1.2.1. Group Commands
2.8.1.2.2. Neighbor Commands
2.8.2. Command Descriptions
2.8.2.1. Generic Commands
2.8.2.2. RIP Commands
2.9. Show, Clear, and Debug Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.2. Clear Commands
2.9.1.3. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.2. Clear Commands
2.9.2.3. Debug RIP Commands
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.1.3.7. Sham Links
3.1.2. OSPFv3 Authentication
3.1.2.1. OSPFv3 Graceful Restart Helper
3.1.3. Virtual Links
3.1.4. Neighbors and Adjacencies
3.1.4.1. Broadcast and Point-to-Point Networks
3.1.4.2. Non-Broadcast Multi-Access (NBMA) Networks
3.1.5. Link-State Advertisements
3.1.6. Metrics
3.1.7. Authentication
3.1.8. IP Subnets
3.1.9. Preconfiguration Recommendations
3.1.10. Multiple OSPF Instances
3.1.10.1. Route Export Policies for OSPF
3.1.10.2. Preventing Route Redistribution Loops
3.1.11. Multi-Address Support for OSPFv3
3.1.12. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.1.12.1. IP FRR Configuration
3.1.12.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.12.2. ECMP Considerations
3.1.12.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.1.12.4. IP FRR and BGP Next-Hop Resolution
3.1.12.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.1.12.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.1.12.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.1. Configuring a Route Next-Hop Policy Template
3.2.1.1. Configuring Affinity or Admin Group Constraints
3.2.1.2. Configuring SRLG Group Constraints
3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.2.1.4. Configuring Protection Type and Next-Hop Type Preferences
3.2.2. Application of Route Next-Hop Policy Template to an Interface
3.2.3. Excluding Prefixes from LFA SPF
3.2.4. Modification to LFA Next-Hop Selection Algorithm
3.3. LFA Protection using Segment Routing Backup Node SID
3.3.1. Configuring LFA using Backup Node SID
3.3.2. Detailed Operation of LFA Protection using Backup Node SID
3.3.3. Duplicate SID Handling
3.3.4. OSPF Control Plane Extensions
3.4. Segment Routing in Shortest Path Forwarding
3.4.1. Entropy Label for OSPF Segment Routing
3.5. Segment Routing Mapping Server
3.5.1. Segment Routing Mapping Server Prefix SID Resolution
3.6. SPF LSA Filtering
3.7. FIB Prioritization
3.8. Extended LSA Support in OSPFv3
3.9. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
3.10. OSPF Configuration Process Overview
3.11. Configuration Notes
3.11.1. General
3.11.1.1. OSPF Defaults
3.12. Configuring OSPF with CLI
3.12.1. OSPF Configuration Guidelines
3.12.2. Basic OSPF Configurations
3.12.2.1. Configuring the Router ID
3.12.3. Configuring OSPF Components
3.12.3.1. Configuring OSPF Parameters
3.12.3.2. Configuring OSPF3 Parameters
3.12.3.3. Configuring an OSPF or OSPF3 Area
3.12.3.4. Configuring a Stub Area
3.12.3.5. Configuring a Not-So-Stubby Area
3.12.3.6. Configuring a Virtual Link
3.12.3.7. Configuring an Interface
3.12.3.8. Configuring Authentication
3.12.3.8.1. Overview
3.12.3.8.2. Configuring Authentication Keys and Algorithms
3.12.3.8.3. Configuring Authentication using Keychains
3.12.3.9. Assigning a Designated Router
3.12.3.10. Configuring Route Summaries
3.12.3.11. Configuring Route Preferences
3.13. OSPF Configuration Management Tasks
3.13.1. Modifying a Router ID
3.13.2. Deleting a Router ID
3.13.3. Modifying OSPF Parameters
3.14. OSPF Configuration Command Reference
3.14.1. Command Hierarchies
3.14.1.1. Configuration Commands
3.14.2. Command Descriptions
3.14.2.1. Generic Commands
3.14.2.2. OSPF Global Commands
3.14.2.3. OSPF Area Commands
3.14.2.4. Interface/Virtual Link Commands
3.15. Show, Clear, and Debug Command Reference
3.15.1. Command Hierarchies
3.15.1.1. Show Commands
3.15.1.2. Clear Commands
3.15.1.3. Debug Commands
3.15.1.4. Tools Commands
3.15.2. Command Descriptions
3.15.2.1. Show Commands
3.15.2.2. Clear Commands
3.15.2.3. Debug Commands
3.15.2.4. Tools Commands
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.3.1. IS-IS PDU Configuration
4.1.3.2. IS-IS Operations
4.1.4. IS-IS Route Summarization
4.1.4.1. Partial SPF Calculation
4.1.5. IS-IS MT-Topology Support
4.1.5.1. Native IPv6 Support
4.1.6. IS-IS Administrative Tags
4.1.6.1. Setting Route Tags
4.1.6.2. Using Route Tags
4.1.6.3. Unnumbered Interface Support
4.1.7. Segment Routing in Shortest Path Forwarding
4.1.7.1. Entropy Label for IS-IS Segment Routing
4.1.7.2. Configuring Segment Routing in Shortest Path
4.1.7.3. Segment Routing Operational Procedures
4.1.7.3.1. Prefix Advertisement and Resolution
4.1.7.3.2. Error and Resource Exhaustion Handling
4.1.7.4. Segment Routing Tunnel Management
4.1.7.4.1. Tunnel MTU Determination
4.1.7.5. Segment Routing Local Block
4.1.7.5.1. Bundling Adjacencies in Adjacency Sets
4.1.7.6. Remote LFA with Segment Routing
4.1.7.7. Topology Independent LFA
4.1.7.7.1. TI-LFA Configuration
4.1.7.7.2. TI-LFA Link-Protect Operation
4.1.7.7.3. Data Path Support
4.1.7.8. IPv6 Segment Routing using MPLS Encapsulation
4.1.7.8.1. IS-IS MT=0 Extensions
4.1.7.8.2. Service and Forwarding Contexts Supported
4.1.7.8.3. Services Using SDP with a SR IPv6 Tunnel
4.1.7.9. Data Path Support
4.1.7.9.1. Hash Label and Entropy Label Support
4.1.7.10. Control Protocol Changes
4.1.7.10.1. IS-IS Control Protocol Changes
4.1.7.10.2. OSPF Control Protocol Changes
4.1.7.11. BGP Shortcut Using Segment Routing Tunnel
4.1.7.12. BGP Label Route Resolution Using Segment Routing Tunnel
4.1.7.13. Service Packet Forwarding with Segment Routing
4.1.7.14. Mirror Services and Lawful Intercept
4.1.8. Segment Routing Mapping Server Function for IPv4 Prefixes
4.1.8.1. Segment Routing Mapping Server
4.1.8.2. Prefix SID Resolution for Segment Routing Mapping Server
4.2. FIB Prioritization
4.3. IS-IS Configuration Process Overview
4.4. Configuration Notes
4.4.1. General
4.5. Configuring IS-IS with CLI
4.5.1. IS-IS Configuration Overview
4.5.1.1. Router Levels
4.5.1.2. Area Address Attributes
4.5.1.3. Interface Level Capacity
4.5.1.4. Route Leaking
4.5.2. Basic IS-IS Configuration
4.5.3. Common Configuration Tasks
4.5.4. Configuring IS-IS Components
4.5.4.1. Enabling IS-IS
4.5.4.2. Modifying Router-Level Parameters
4.5.4.3. Configuring ISO Area Addresses
4.5.4.4. Configuring Global IS-IS Parameters
4.5.4.5. Migration to IS-IS Multi-Topology
4.5.4.6. Configuring Interface Parameters
4.5.4.6.1. Example: Configuring a Level 1 Area
4.5.4.6.2. Example: Modifying a Router’s Level Capability
4.5.4.7. Configuring IS-IS Link Groups
4.6. IS-IS Configuration Management Tasks
4.6.1. Disabling IS-IS
4.6.2. Removing IS-IS
4.6.3. Modifying Global IS-IS Parameters
4.6.4. Modifying IS-IS Interface Parameters
4.6.5. Configuring Authentication using Keychains
4.6.6. Configuring Leaking
4.6.7. Redistributing External IS-IS Routers
4.6.8. Specifying MAC Addresses for All IS-IS Routers
4.7. IS-IS Configuration Command Reference
4.7.1. Command Hierarchies
4.7.1.1. Configuration Commands
4.7.2. Command Descriptions
4.7.2.1. Generic Commands
4.7.2.2. IS-IS Commands
4.8. Show, Clear, and Debug Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Show Commands
4.8.1.2. Clear Commands
4.8.1.3. Debug Commands
4.8.2. Command Descriptions
4.8.2.1. Show Commands
4.8.2.2. Clear Commands
4.8.2.3. Debug Commands
5. BGP
5.1. BGP Overview
5.2. BGP Sessions
5.2.1. BGP Session States
5.2.2. Detecting BGP Session Failures
5.2.2.1. Peer Tracking
5.2.2.2. Bidirectional Forwarding Detection (BFD)
5.2.2.3. Fast External Failover
5.2.3. High Availability BGP Sessions
5.2.3.1. BGP Graceful Restart
5.2.3.2. BGP Long-Lived Graceful Restart
5.2.3.2.1. LLGR Operations
5.2.3.2.2. Receiving Routes with LLGR_STALE Community
5.2.4. BGP Session Security
5.2.4.1. TCP MD5 Authentication
5.2.4.2. TTL Security Mechanism
5.2.5. BGP Address Family Support for Different Session Types
5.2.6. BGP Groups
5.3. BGP Design Concepts
5.3.1. Route Reflection
5.3.2. BGP Confederations
5.4. BGP Messages
5.4.1. Open Message
5.4.1.1. Changing the Autonomous System Number
5.4.1.2. Changing a Confederation Number
5.4.1.3. BGP Advertisement
5.4.2. Update Message
5.4.3. Keepalive Message
5.4.4. Notification Message
5.4.4.1. UPDATE Message Error Handling
5.4.5. Route Refresh Message
5.5. BGP Path Attributes
5.5.1. Origin
5.5.2. AS Path
5.5.2.1. AS Override
5.5.2.2. Using Local AS for ASN Migration
5.5.2.3. 4-Octet Autonomous System Numbers
5.5.3. Next-Hop
5.5.3.1. Unlabeled IPv4 Unicast Routes
5.5.3.2. Unlabeled IPv6 Unicast Routes
5.5.3.3. VPN-IPv4 Routes
5.5.3.4. VPN-IPv6 Routes
5.5.3.5. Label-IPv4 Routes
5.5.3.6. Label-IPv6 Routes
5.5.3.7. Next-Hop Resolution
5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.5.3.8. Next-Hop Tracking
5.5.3.9. Next-Hop Indirection
5.5.4. MED
5.5.4.1. Deterministic MED
5.5.5. Local Preference
5.5.6. Route Aggregation Path Attributes
5.5.7. Community Attributes
5.5.7.1. Standard Communities
5.5.7.2. Extended Communities
5.5.7.3. Large Communities
5.5.8. Route Reflection Attributes
5.5.9. Multi-Protocol BGP Attributes
5.5.10. 4-Octet AS Attributes
5.5.11. AIGP Metric
5.6. BGP Routing Information Base (RIB)
5.6.1. RIB-IN Features
5.6.1.1. BGP Import Policies
5.6.2. LOC-RIB Features
5.6.2.1. BGP Decision Process
5.6.2.1.1. Always Compare MED
5.6.2.1.2. Ignore Next-Hop Metric
5.6.2.2. BGP Route Installation in the Route Table
5.6.2.3. Weighted ECMP for BGP Routes
5.6.2.4. BGP Route Installation in the Tunnel Table
5.6.2.5. BGP Fast Reroute
5.6.2.5.1. Calculating Backup Paths
5.6.2.5.2. Failure Detection and Switchover to the Backup Path
5.6.2.6. QoS Policy Propagation via BGP (QPPB)
5.6.2.7. BGP Policy Accounting
5.6.2.8. Route Flap Damping (RFD)
5.6.3. RIB-OUT Features
5.6.3.1. BGP Export Policies
5.6.3.2. Outbound Route Filtering (ORF)
5.6.3.3. RT Constrained Route Distribution
5.6.3.4. Min Route Advertisement Interval (MRAI)
5.6.3.5. Advertise-Inactive
5.6.3.6. Best-External
5.6.3.7. Add-Paths
5.6.3.7.1. Path Selection with Add-Paths
5.6.3.8. Split-Horizon
5.7. BGP Monitoring Protocol
5.8. BGP Applications
5.8.1. BGP Flow-Spec
5.8.1.1. Validating Received FlowSpec Routes
5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.2. Configuration of TTL Propagation for BGP Label Routes
5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.3. BGP Prefix Origin Validation
5.8.4. BGP Route Leaking
5.8.5. BGP Optimal Route Reflection
5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.8.7. BGP-LS
5.8.7.1. Supported BGP-LS components
5.9. BGP Configuration Process Overview
5.10. Configuration Notes
5.10.1. General
5.10.1.1. BGP Defaults
5.10.1.2. BGP MIB Notes
5.11. Configuring BGP with CLI
5.11.1. Configuration Overview
5.11.1.1. Preconfiguration Requirements
5.11.1.2. BGP Hierarchy
5.11.1.3. Internal and External BGP Configuration
5.11.2. Basic BGP Configuration
5.11.3. Common Configuration Tasks
5.11.3.1. Creating an Autonomous System
5.11.3.2. Configuring a Router ID
5.11.3.3. BGP Confederations
5.11.3.4. BGP Router Reflectors
5.11.3.5. BGP Components
5.11.3.5.1. Configuring Group Attributes
5.11.3.5.2. Configuring Neighbor Attributes
5.11.3.5.3. Configuring Route Reflection
5.11.3.5.4. Configuring a Confederation
5.12. BGP Configuration Management Tasks
5.12.1. Modifying an AS Number
5.12.2. Modifying a Confederation Number
5.12.3. Modifying the BGP Router ID
5.12.4. Modifying the Router-Level Router ID
5.12.5. Deleting a Neighbor
5.12.6. Deleting Groups
5.13. BGP Command Reference
5.13.1. Command Hierarchies
5.13.1.1. Global BGP Commands
5.13.1.2. Group BGP Commands
5.13.1.3. Neighbor BGP Commands
5.13.1.4. BGP BMP Commands
5.13.1.5. Other BGP-Related Commands
5.13.2. Command Descriptions
5.13.2.1. Generic Commands
5.13.2.2. BGP Commands
5.13.2.3. BGP BMP Commands
5.13.2.4. Other BGP-Related Commands
5.14. Show, Clear, and Debug Command Reference
5.14.1. Command Hierarchies
5.14.1.1. Show Commands
5.14.1.2. Clear Commands
5.14.1.3. Debug Commands
5.14.2. Command Descriptions
5.14.2.1. Show Commands
5.14.2.2. Clear Commands
5.14.2.3. Debug Commands
6. Route Policies
6.1. Configuring Route Policies
6.1.1. Policy Statements
6.1.1.1. Policy Statement Chaining and Logical Expressions
6.1.1.2. Routing Policy Subroutines
6.1.1.3. Policy Evaluation Command
6.1.1.4. Exclusive Editing for Policy Configuration
6.1.1.5. Default Action Behavior
6.1.1.6. Denied IP Unicast Prefixes
6.1.1.7. Controlling Route Flapping
6.1.2. Regular Expressions
6.1.3. BGP and OSPF Route Policy Support
6.1.3.1. BGP Route Policies
6.1.3.2. Re-advertised Route Policies
6.1.3.3. Triggered Policies
6.1.3.4. Set MED to IGP Cost using Route Policies
6.1.3.5. BGP Policy Subroutines
6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.1.4. Routing Policy Parameterization
6.1.5. When to Use Route Policies
6.2. Route Policy Configuration Process Overview
6.3. Configuration Notes
6.3.1. General
6.4. Configuring Route Policies with CLI
6.4.1. Route Policy Configuration Overview
6.4.1.1. When to Create Routing Policies
6.4.1.2. Default Route Policy Actions
6.4.1.3. Policy Evaluation
6.4.1.4. Damping
6.4.2. Basic Configurations
6.4.3. Configuring Route Policy Components
6.4.3.1. Beginning the Policy Statement
6.4.3.2. Creating a Route Policy
6.4.3.3. Configuring a Default Action
6.4.3.4. Configuring an Entry
6.4.3.5. Configuring a Community List
6.4.3.6. Configuring Damping
6.4.3.7. Configuring a Prefix List
6.5. Route Policy Configuration Management Tasks
6.5.1. Editing Policy Statements and Parameters
6.5.2. Deleting an Entry
6.5.3. Deleting a Policy Statement
6.6. Route Policy Command Reference
6.6.1. Command Hierarchies
6.6.1.1. Route Policy Configuration Commands
6.6.1.2. Segment Routing Commands
6.6.2. Command Descriptions
6.6.2.1. Generic Commands
6.6.2.2. Segment Routing
6.6.2.3. Route Policy Options
6.6.2.4. Route Policy Damping Commands
6.6.2.5. Route Policy Prefix Commands
6.6.2.6. Route Policy Entry Match Commands
6.6.2.7. Route Policy Action Commands
6.7. Show, Clear, and Debug Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. RIP Overview
2.1.1. RIP Features
2.1.1.1. RIP Version Types
2.1.1.2. RIPv2 Authentication
2.1.1.3. RIP Packet Format
2.1.1.3.1. RIPv1 Format
2.1.1.3.2. RIPv2 Format
2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
2.2. RIPng
2.2.1. RIPng Protocol
2.3. Common Attributes
2.3.1. Metrics
2.3.2. Timers
2.3.3. Import and Export Policies
2.3.4. Hierarchical Levels
2.4. RIP Configuration Process Overview
2.5. Configuration Notes
2.5.1. General
2.6. Configuring RIP with CLI
2.6.1. RIP and RIPng Configuration Overview
2.6.1.1. Preconfiguration Requirements
2.6.1.2. RIP Hierarchy
2.6.2. Basic RIP Configuration
2.6.3. Common Configuration Tasks
2.6.3.1. Configuring Interfaces
2.6.3.2. Configuring a Route Policy
2.6.3.3. Configuring RIP Parameters
2.6.3.4. Configuring Global-Level Parameters
2.6.3.5. Configuring Group-Level Parameters
2.6.3.6. Configuring Neighbor-Level Parameters
2.7. RIP Configuration Management Tasks
2.7.1. Modifying RIP Parameters
2.7.2. Deleting a Group
2.7.3. Deleting a Neighbor
2.8. RIP Configuration Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Configuration Commands
2.8.1.1.1. Group Commands
2.8.1.1.2. Neighbor Commands
2.8.1.2. RIPng Configuration Commands
2.8.1.2.1. Group Commands
2.8.1.2.2. Neighbor Commands
2.8.2. Command Descriptions
2.8.2.1. Generic Commands
2.8.2.2. RIP Commands
2.9. Show, Clear, and Debug Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.2. Clear Commands
2.9.1.3. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.2. Clear Commands
2.9.2.3. Debug RIP Commands
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.1.3.7. Sham Links
3.1.2. OSPFv3 Authentication
3.1.2.1. OSPFv3 Graceful Restart Helper
3.1.3. Virtual Links
3.1.4. Neighbors and Adjacencies
3.1.4.1. Broadcast and Point-to-Point Networks
3.1.4.2. Non-Broadcast Multi-Access (NBMA) Networks
3.1.5. Link-State Advertisements
3.1.6. Metrics
3.1.7. Authentication
3.1.8. IP Subnets
3.1.9. Preconfiguration Recommendations
3.1.10. Multiple OSPF Instances
3.1.10.1. Route Export Policies for OSPF
3.1.10.2. Preventing Route Redistribution Loops
3.1.11. Multi-Address Support for OSPFv3
3.1.12. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.1.12.1. IP FRR Configuration
3.1.12.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.12.2. ECMP Considerations
3.1.12.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.1.12.4. IP FRR and BGP Next-Hop Resolution
3.1.12.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.1.12.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.1.12.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.1. Configuring a Route Next-Hop Policy Template
3.2.1.1. Configuring Affinity or Admin Group Constraints
3.2.1.2. Configuring SRLG Group Constraints
3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.2.1.4. Configuring Protection Type and Next-Hop Type Preferences
3.2.2. Application of Route Next-Hop Policy Template to an Interface
3.2.3. Excluding Prefixes from LFA SPF
3.2.4. Modification to LFA Next-Hop Selection Algorithm
3.3. LFA Protection using Segment Routing Backup Node SID
3.3.1. Configuring LFA using Backup Node SID
3.3.2. Detailed Operation of LFA Protection using Backup Node SID
3.3.3. Duplicate SID Handling
3.3.4. OSPF Control Plane Extensions
3.4. Segment Routing in Shortest Path Forwarding
3.4.1. Entropy Label for OSPF Segment Routing
3.5. Segment Routing Mapping Server
3.5.1. Segment Routing Mapping Server Prefix SID Resolution
3.6. SPF LSA Filtering
3.7. FIB Prioritization
3.8. Extended LSA Support in OSPFv3
3.9. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
3.10. OSPF Configuration Process Overview
3.11. Configuration Notes
3.11.1. General
3.11.1.1. OSPF Defaults
3.12. Configuring OSPF with CLI
3.12.1. OSPF Configuration Guidelines
3.12.2. Basic OSPF Configurations
3.12.2.1. Configuring the Router ID
3.12.3. Configuring OSPF Components
3.12.3.1. Configuring OSPF Parameters
3.12.3.2. Configuring OSPF3 Parameters
3.12.3.3. Configuring an OSPF or OSPF3 Area
3.12.3.4. Configuring a Stub Area
3.12.3.5. Configuring a Not-So-Stubby Area
3.12.3.6. Configuring a Virtual Link
3.12.3.7. Configuring an Interface
3.12.3.8. Configuring Authentication
3.12.3.8.1. Overview
3.12.3.8.2. Configuring Authentication Keys and Algorithms
3.12.3.8.3. Configuring Authentication using Keychains
3.12.3.9. Assigning a Designated Router
3.12.3.10. Configuring Route Summaries
3.12.3.11. Configuring Route Preferences
3.13. OSPF Configuration Management Tasks
3.13.1. Modifying a Router ID
3.13.2. Deleting a Router ID
3.13.3. Modifying OSPF Parameters
3.14. OSPF Configuration Command Reference
3.14.1. Command Hierarchies
3.14.1.1. Configuration Commands
3.14.2. Command Descriptions
3.14.2.1. Generic Commands
3.14.2.2. OSPF Global Commands
3.14.2.3. OSPF Area Commands
3.14.2.4. Interface/Virtual Link Commands
3.15. Show, Clear, and Debug Command Reference
3.15.1. Command Hierarchies
3.15.1.1. Show Commands
3.15.1.2. Clear Commands
3.15.1.3. Debug Commands
3.15.1.4. Tools Commands
3.15.2. Command Descriptions
3.15.2.1. Show Commands
3.15.2.2. Clear Commands
3.15.2.3. Debug Commands
3.15.2.4. Tools Commands
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.3.1. IS-IS PDU Configuration
4.1.3.2. IS-IS Operations
4.1.4. IS-IS Route Summarization
4.1.4.1. Partial SPF Calculation
4.1.5. IS-IS MT-Topology Support
4.1.5.1. Native IPv6 Support
4.1.6. IS-IS Administrative Tags
4.1.6.1. Setting Route Tags
4.1.6.2. Using Route Tags
4.1.6.3. Unnumbered Interface Support
4.1.7. Segment Routing in Shortest Path Forwarding
4.1.7.1. Entropy Label for IS-IS Segment Routing
4.1.7.2. Configuring Segment Routing in Shortest Path
4.1.7.3. Segment Routing Operational Procedures
4.1.7.3.1. Prefix Advertisement and Resolution
4.1.7.3.2. Error and Resource Exhaustion Handling
4.1.7.4. Segment Routing Tunnel Management
4.1.7.4.1. Tunnel MTU Determination
4.1.7.5. Segment Routing Local Block
4.1.7.5.1. Bundling Adjacencies in Adjacency Sets
4.1.7.6. Remote LFA with Segment Routing
4.1.7.7. Topology Independent LFA
4.1.7.7.1. TI-LFA Configuration
4.1.7.7.2. TI-LFA Link-Protect Operation
4.1.7.7.3. Data Path Support
4.1.7.8. IPv6 Segment Routing using MPLS Encapsulation
4.1.7.8.1. IS-IS MT=0 Extensions
4.1.7.8.2. Service and Forwarding Contexts Supported
4.1.7.8.3. Services Using SDP with a SR IPv6 Tunnel
4.1.7.9. Data Path Support
4.1.7.9.1. Hash Label and Entropy Label Support
4.1.7.10. Control Protocol Changes
4.1.7.10.1. IS-IS Control Protocol Changes
4.1.7.10.2. OSPF Control Protocol Changes
4.1.7.11. BGP Shortcut Using Segment Routing Tunnel
4.1.7.12. BGP Label Route Resolution Using Segment Routing Tunnel
4.1.7.13. Service Packet Forwarding with Segment Routing
4.1.7.14. Mirror Services and Lawful Intercept
4.1.8. Segment Routing Mapping Server Function for IPv4 Prefixes
4.1.8.1. Segment Routing Mapping Server
4.1.8.2. Prefix SID Resolution for Segment Routing Mapping Server
4.2. FIB Prioritization
4.3. IS-IS Configuration Process Overview
4.4. Configuration Notes
4.4.1. General
4.5. Configuring IS-IS with CLI
4.5.1. IS-IS Configuration Overview
4.5.1.1. Router Levels
4.5.1.2. Area Address Attributes
4.5.1.3. Interface Level Capacity
4.5.1.4. Route Leaking
4.5.2. Basic IS-IS Configuration
4.5.3. Common Configuration Tasks
4.5.4. Configuring IS-IS Components
4.5.4.1. Enabling IS-IS
4.5.4.2. Modifying Router-Level Parameters
4.5.4.3. Configuring ISO Area Addresses
4.5.4.4. Configuring Global IS-IS Parameters
4.5.4.5. Migration to IS-IS Multi-Topology
4.5.4.6. Configuring Interface Parameters
4.5.4.6.1. Example: Configuring a Level 1 Area
4.5.4.6.2. Example: Modifying a Router’s Level Capability
4.5.4.7. Configuring IS-IS Link Groups
4.6. IS-IS Configuration Management Tasks
4.6.1. Disabling IS-IS
4.6.2. Removing IS-IS
4.6.3. Modifying Global IS-IS Parameters
4.6.4. Modifying IS-IS Interface Parameters
4.6.5. Configuring Authentication using Keychains
4.6.6. Configuring Leaking
4.6.7. Redistributing External IS-IS Routers
4.6.8. Specifying MAC Addresses for All IS-IS Routers
4.7. IS-IS Configuration Command Reference
4.7.1. Command Hierarchies
4.7.1.1. Configuration Commands
4.7.2. Command Descriptions
4.7.2.1. Generic Commands
4.7.2.2. IS-IS Commands
4.8. Show, Clear, and Debug Command Reference
4.8.1. Command Hierarchies
4.8.1.1. Show Commands
4.8.1.2. Clear Commands
4.8.1.3. Debug Commands
4.8.2. Command Descriptions
4.8.2.1. Show Commands
4.8.2.2. Clear Commands
4.8.2.3. Debug Commands
5. BGP
5.1. BGP Overview
5.2. BGP Sessions
5.2.1. BGP Session States
5.2.2. Detecting BGP Session Failures
5.2.2.1. Peer Tracking
5.2.2.2. Bidirectional Forwarding Detection (BFD)
5.2.2.3. Fast External Failover
5.2.3. High Availability BGP Sessions
5.2.3.1. BGP Graceful Restart
5.2.3.2. BGP Long-Lived Graceful Restart
5.2.3.2.1. LLGR Operations
5.2.3.2.2. Receiving Routes with LLGR_STALE Community
5.2.4. BGP Session Security
5.2.4.1. TCP MD5 Authentication
5.2.4.2. TTL Security Mechanism
5.2.5. BGP Address Family Support for Different Session Types
5.2.6. BGP Groups
5.3. BGP Design Concepts
5.3.1. Route Reflection
5.3.2. BGP Confederations
5.4. BGP Messages
5.4.1. Open Message
5.4.1.1. Changing the Autonomous System Number
5.4.1.2. Changing a Confederation Number
5.4.1.3. BGP Advertisement
5.4.2. Update Message
5.4.3. Keepalive Message
5.4.4. Notification Message
5.4.4.1. UPDATE Message Error Handling
5.4.5. Route Refresh Message
5.5. BGP Path Attributes
5.5.1. Origin
5.5.2. AS Path
5.5.2.1. AS Override
5.5.2.2. Using Local AS for ASN Migration
5.5.2.3. 4-Octet Autonomous System Numbers
5.5.3. Next-Hop
5.5.3.1. Unlabeled IPv4 Unicast Routes
5.5.3.2. Unlabeled IPv6 Unicast Routes
5.5.3.3. VPN-IPv4 Routes
5.5.3.4. VPN-IPv6 Routes
5.5.3.5. Label-IPv4 Routes
5.5.3.6. Label-IPv6 Routes
5.5.3.7. Next-Hop Resolution
5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.5.3.8. Next-Hop Tracking
5.5.3.9. Next-Hop Indirection
5.5.4. MED
5.5.4.1. Deterministic MED
5.5.5. Local Preference
5.5.6. Route Aggregation Path Attributes
5.5.7. Community Attributes
5.5.7.1. Standard Communities
5.5.7.2. Extended Communities
5.5.7.3. Large Communities
5.5.8. Route Reflection Attributes
5.5.9. Multi-Protocol BGP Attributes
5.5.10. 4-Octet AS Attributes
5.5.11. AIGP Metric
5.6. BGP Routing Information Base (RIB)
5.6.1. RIB-IN Features
5.6.1.1. BGP Import Policies
5.6.2. LOC-RIB Features
5.6.2.1. BGP Decision Process
5.6.2.1.1. Always Compare MED
5.6.2.1.2. Ignore Next-Hop Metric
5.6.2.2. BGP Route Installation in the Route Table
5.6.2.3. Weighted ECMP for BGP Routes
5.6.2.4. BGP Route Installation in the Tunnel Table
5.6.2.5. BGP Fast Reroute
5.6.2.5.1. Calculating Backup Paths
5.6.2.5.2. Failure Detection and Switchover to the Backup Path
5.6.2.6. QoS Policy Propagation via BGP (QPPB)
5.6.2.7. BGP Policy Accounting
5.6.2.8. Route Flap Damping (RFD)
5.6.3. RIB-OUT Features
5.6.3.1. BGP Export Policies
5.6.3.2. Outbound Route Filtering (ORF)
5.6.3.3. RT Constrained Route Distribution
5.6.3.4. Min Route Advertisement Interval (MRAI)
5.6.3.5. Advertise-Inactive
5.6.3.6. Best-External
5.6.3.7. Add-Paths
5.6.3.7.1. Path Selection with Add-Paths
5.6.3.8. Split-Horizon
5.7. BGP Monitoring Protocol
5.8. BGP Applications
5.8.1. BGP Flow-Spec
5.8.1.1. Validating Received FlowSpec Routes
5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.2. Configuration of TTL Propagation for BGP Label Routes
5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.3. BGP Prefix Origin Validation
5.8.4. BGP Route Leaking
5.8.5. BGP Optimal Route Reflection
5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.8.7. BGP-LS
5.8.7.1. Supported BGP-LS components
5.9. BGP Configuration Process Overview
5.10. Configuration Notes
5.10.1. General
5.10.1.1. BGP Defaults
5.10.1.2. BGP MIB Notes
5.11. Configuring BGP with CLI
5.11.1. Configuration Overview
5.11.1.1. Preconfiguration Requirements
5.11.1.2. BGP Hierarchy
5.11.1.3. Internal and External BGP Configuration
5.11.2. Basic BGP Configuration
5.11.3. Common Configuration Tasks
5.11.3.1. Creating an Autonomous System
5.11.3.2. Configuring a Router ID
5.11.3.3. BGP Confederations
5.11.3.4. BGP Router Reflectors
5.11.3.5. BGP Components
5.11.3.5.1. Configuring Group Attributes
5.11.3.5.2. Configuring Neighbor Attributes
5.11.3.5.3. Configuring Route Reflection
5.11.3.5.4. Configuring a Confederation
5.12. BGP Configuration Management Tasks
5.12.1. Modifying an AS Number
5.12.2. Modifying a Confederation Number
5.12.3. Modifying the BGP Router ID
5.12.4. Modifying the Router-Level Router ID
5.12.5. Deleting a Neighbor
5.12.6. Deleting Groups
5.13. BGP Command Reference
5.13.1. Command Hierarchies
5.13.1.1. Global BGP Commands
5.13.1.2. Group BGP Commands
5.13.1.3. Neighbor BGP Commands
5.13.1.4. BGP BMP Commands
5.13.1.5. Other BGP-Related Commands
5.13.2. Command Descriptions
5.13.2.1. Generic Commands
5.13.2.2. BGP Commands
5.13.2.3. BGP BMP Commands
5.13.2.4. Other BGP-Related Commands
5.14. Show, Clear, and Debug Command Reference
5.14.1. Command Hierarchies
5.14.1.1. Show Commands
5.14.1.2. Clear Commands
5.14.1.3. Debug Commands
5.14.2. Command Descriptions
5.14.2.1. Show Commands
5.14.2.2. Clear Commands
5.14.2.3. Debug Commands
6. Route Policies
6.1. Configuring Route Policies
6.1.1. Policy Statements
6.1.1.1. Policy Statement Chaining and Logical Expressions
6.1.1.2. Routing Policy Subroutines
6.1.1.3. Policy Evaluation Command
6.1.1.4. Exclusive Editing for Policy Configuration
6.1.1.5. Default Action Behavior
6.1.1.6. Denied IP Unicast Prefixes
6.1.1.7. Controlling Route Flapping
6.1.2. Regular Expressions
6.1.3. BGP and OSPF Route Policy Support
6.1.3.1. BGP Route Policies
6.1.3.2. Re-advertised Route Policies
6.1.3.3. Triggered Policies
6.1.3.4. Set MED to IGP Cost using Route Policies
6.1.3.5. BGP Policy Subroutines
6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.1.4. Routing Policy Parameterization
6.1.5. When to Use Route Policies
6.2. Route Policy Configuration Process Overview
6.3. Configuration Notes
6.3.1. General
6.4. Configuring Route Policies with CLI
6.4.1. Route Policy Configuration Overview
6.4.1.1. When to Create Routing Policies
6.4.1.2. Default Route Policy Actions
6.4.1.3. Policy Evaluation
6.4.1.4. Damping
6.4.2. Basic Configurations
6.4.3. Configuring Route Policy Components
6.4.3.1. Beginning the Policy Statement
6.4.3.2. Creating a Route Policy
6.4.3.3. Configuring a Default Action
6.4.3.4. Configuring an Entry
6.4.3.5. Configuring a Community List
6.4.3.6. Configuring Damping
6.4.3.7. Configuring a Prefix List
6.5. Route Policy Configuration Management Tasks
6.5.1. Editing Policy Statements and Parameters
6.5.2. Deleting an Entry
6.5.3. Deleting a Policy Statement
6.6. Route Policy Command Reference
6.6.1. Command Hierarchies
6.6.1.1. Route Policy Configuration Commands
6.6.1.2. Segment Routing Commands
6.6.2. Command Descriptions
6.6.2.1. Generic Commands
6.6.2.2. Segment Routing
6.6.2.3. Route Policy Options
6.6.2.4. Route Policy Damping Commands
6.6.2.5. Route Policy Prefix Commands
6.6.2.6. Route Policy Entry Match Commands
6.6.2.7. Route Policy Action Commands
6.7. Show, Clear, and Debug Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
7. Standards and Protocol Support
Customer Document and Product Support
VSR Quick Reference Card, R16.0.R1
VSR Documentation Suite Overview, R16.0.R1
VSR Documentation Suite Overview, R16.0.R1