This command configures ingress counter parameters for this custom record.
The no form of this command reverts to the default.
This command configures ingress counter parameters for this custom record.
The no form of this command reverts all ingress counters to their default value.
i-counters
This command defines the iSID value to be used in the test PBB header.
The no form of this command reverts to the default value.
i-sid 0
This command configures the IA-NA for the DHCPv6 client.
This command defines the type of IBGP multipath to use when adding BGP routes to the route table if the route resolving the BGP nexthop offers multiple next-hops.
The no form of this command disables the IBGP multipath load balancing feature.
This command enables IBGP multipath load balancing when adding BGP routes to the route table if the route resolving the BGP nexthop offers multiple nexthops.
The no form of this command disables the IBGP multipath load balancing feature.
no ibgp-multipath
This command enables the context to configure Internet Control Message Protocol (ICMP) parameters on a service.
This command enables the context to configure IPv4 Internet Control Message Protocol (ICMP) parameters.
icmp
This command enables access to the context to configure Internet Control Message Protocol (ICMP) parameters on a network IP interface. ICMP is a message control and error reporting protocol that also provides information relevant to IP packet processing.
This command enables ICMP debugging.
This command includes the extracted IPv4 ICMP packets for ip-src-monitoring. IPv4 ICMP packets will be subject to the per-source-rate of CPU protection policies.
no icmp
The no form of the command removes the criterion from the match entry.
This command configures the ICMP code match condition.
The no form of this command reverts to the default.
This command configures matching on ICMP code field in the ICMP header of an IP packet as an IP filter match criterion.
![]() | Note: An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. |
The behavior of the icmp-code value is dependent on the configured icmp-type value, thus a configuration with only an icmp-code value specified will have no effect. To match on the icmp-code, an associated icmp-type must also be specified.
The no form of this command removes the criterion from the match entry.
no icmp-code
This command configures an ICMP traceroute test.
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D | |
interface | up to 32 characters. This is mandatory for link local addresses. | |
dns-name | up to 128 characters |
ipv4-address: | a.b.c.d (host bits must be 0) | |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
router-name: | Base, management, cmp-vr-name, vpls-management |
vprn-svc-id: | 1 to 2147483647 |
cpm-vr-name: | Up to 32 characters |
The router-instance parameter is preferred for specifying the router or service.
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
This command configures the timeout applied to an ICMP query session.
icmp-query min 1
This command configures an ICMP traceroute test.
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D | |
dns-name | up to 63 characters |
router-name: | Base, management, vpls-management |
vprn-svc-id: | 1 to 2147483647 |
The parameter router-instance is preferred for specifying the router or service.
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
This command enables the tunneling of ICMP reply packets over MPLS LSP at a LSR node as per RFC 3032.
The LSR part of this feature consists of crafting the reply ICMP packet of type=11- 'time exceeded', with a source address set to a local address of the LSR node, and appending the IP header and leading payload octets of the original datagram. The system skips the lookup of the source address of the sender of the label TTL expiry packet, which becomes the destination address of the ICMP reply packet. Instead, CPM injects the ICMP reply packet in the forward direction of the MPLS LSP the label TTL expiry packet was received from. The TTL of pushed labels should be set to 255.
The source address of the ICMP reply packet is determined as follows. The LSR uses the address of the outgoing interface for the MPLS LSP. With LDP LSP or BGP LSP multiple ECMP next-hops can exist and in such a case the first outgoing interface is selected. If that interface does not have an address of the same family (IPv4 or IPv6) as the ICMP packet, then the system address of the same family is selected. If one is not configured, the packet is dropped.
When the packet is received by the egress LER, it performs a regular user packet lookup in the data path in the GRT context for BGP shortcut, 6PE, and BGP label route prefixes, or in VPRN context for VPRN and 6VPE prefixes. It then forwards it to the destination, which is the sender of the original packet which TTL expired at the LSR.
If the egress LER does not have a route to the destination of the ICMP packet, it drops the packets.
The rate of the tunneled ICMP replies at the LSR can be directly or indirectly controlled by the existing IOM level and CPM levels mechanisms. Specifically, the rate of the incoming UDP traceroute packets received with a label stack can be controlled at ingress IOM using the distributed CPU protection feature. The rate of the ICMP replies by CPM can also be directly controlled by configuring a system wide rate limit for packets ICMP replies to MPLS expired packets which are successfully forwarded to CPM using the command 'configure system security vprn-network-exceptions'. While this command's name refers to VPRN service, this feature rate limits ICMP replies for packets received with any label stack, including VPRN and shortcuts.
The 7450 ESS, 7750 SR, and 7950 XRS implementation supports appending to the ICMP reply of type Time Exceeded the MPLS label stack object defined in RFC 4950. It does not include it in the ICMP reply type of Destination unreachable.
The new MPLS Label Stack object permits an LSR to include label stack information including label value, EXP, and TTL field values, from the encapsulation header of the packet that expired at the LSR node. The ICMP message continues to include the IP header and leading payload octets of the original datagram.
In order to include the MPLS Label Stack object, SROS implementation adds support of RFC 4884 which defines extensions for a multi-part ICMPv4/v6 message of type Time Exceeded.
The no form of command disables the tunneling of ICMP reply packets over MPLS LSP at a LSR node.
no icmp-tunneling
The no form of the command removes the criterion from the match entry.
This command configures the ICMP type match condition.
The no form of this command reverts to the default.
This command configures matching on the ICMP or ICMPv6 type field in the ICMP or ICMPv6 header of an IPv4 or IPv6 packet as a network QoS match criterion.
An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly, an entry containing "icmp-type 0" match criterion, may match non-initial fragments when the Layer 4 header is not present in a packet fragment and other match criteria are also met.
The no form of the command removes the criterion from the match entry.
no icmp-type
This command configures matching on ICMP type field in the ICMP header of an IP packet as an IP filter match criterion.
![]() | Note: An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. |
The no form of this command removes the criterion from the match entry.
no icmp-type
This command configures ICMPv6 parameters for the interface.
This command enables the context to configure ICMPv6 parameters for the interface.
This command enables ICMPv6 debugging.
This command enables the ICMPv6 packet generation configuration context.
This command enables the ICMPv6 packet generation configuration context.
This command configures the timeout interval for ICMPv6 query mappings.
The no form of the command reverts the timeout interval to the default of 1 minute.
icmp6-query min 1
This command enables debugging for the specified service ID.
The no form of this command disables the debugging.
This command debugs commands for a specific service.
The no form of the command disables debugging.
This command displays statistics for a specific service, specified by the service-id, at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the service-id. The subsequent statistical information listed for each interval is displayed as a delta to the previous display. When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
This command allows the operator to include the sender-id TLV information that was specified under the config>eth>system>sender-id configuration for service MEPs and MIPs. When this option is present under the maintenance association, the specific MPs in the association includes the sender-id TLV information in ETH-CFM PDUs. MEPs include the sender-id TLV for CCM (not sub second CCM enabled MEPs), LBM/LBR, and LTM/LTR. MIPs includes this value in the LBR and LTR PDUs.
![]() | Note: LBR functions reflect all TLVs received in the LBM unchanged including the SenderID TLV. Transmission of the Management Domain and Management Address fields are not supported in this TLV. |
This command enables the inclusion of the Sender ID TLV information specified under the config>eth>system>sender-id command for installed MEPs and MIPs. The inclusion of the Sender ID TLV is based on the configured value. The Sender ID TLV is supported for ETH-CC, ETH-LB, and ETH-LB PDUs.
Note: LBR functions reflect back all TLVs received in the LBM, unchanged, including the Sender ID TLV. Transmission of the Management Domain and Management Address fields are not supported in this TLV.
The no form of this command disables the inclusion of the Sender ID TLV.
id-permission defer (config>eth-cfm>default-domain>bridge-identifier)
no id-permission (config>eth-cfm>domain>association>bridge)
This command specifies identification strings for the subscriber. This is useful when the server is centralized with Enhanced Subscriber Management (ESM) in a lower level in the network. These strings are parsed by a downstream Python script or they can be used literally if the strings-from-option option in the config>subscr-mgmt>sub-ident-policy context is set to this option number. In this case, the option number may be set to any allowed number (between 224 and 254 is suggested, as these are not dedicated to specific purposes). If the option number is not given, a default value of 254 is used. For PPPoE only, if the local user database is attached to the PPPoE node under the group interface and not to a local DHCP server, the strings are used internally so the option number is not used.
The no form of this command returns to the default.
This command defines the identifier for the MLFR bundle. The no form of this command resets the value to null.
null
This command defines the identifier for a frame-relay link when used in an MLFR bundle.
The no form of this command resets the value to null.
no identifier
This command defines an identifier string to be used to advertise the Bluetooth module during pairing operations.
If there is no identifier specified by the user, the default is derived from the platform type, the CPM slot, and the serial number of the chassis.
For example, a device with a platform field of 7750, SR-12 chassis, and a CPM serial number of NS23456 would have a Bluetooth identifier of "7750-SR-12-CPM-A-NS23456." for the CPM in slot A.
The no form of the command resets the identifier back to the default.
This command specifies a match criteria that uses the peer’s identification initiator (IDi) as the input, only one IDi criteria can be configured for a given client entry. This command supports the following matching methods:
The no form of this command reverts to the default.
no idi
This command enables the Identification Initiator (IDi) type in the IPsec client matching process.
The no form of this command disables the IDi matching process.
no idi
This command configures the value that the HDLC TDM DS-0, E-1, E-3, DS-1, or DS-3 interface transmits during idle cycles. For ATM ports/channels/channel-groups, the configuration does not apply and only the no form is accepted.
The no form of this command reverts the idle cycle flag to the default value.
flags (0x7E)
no flags (ATM)
This command when applied will filter out new incoming ANCP messages while the subscriber DSL-line-state is idle. The command takes effect at the time that it is applied. Existing subscribers already in idle state are not purged from the database.
The no form of this command reverts to the default.
This command when applied will filter out new subscriber’s ANCP messages from subscriber with “DSL-line-state” IDLE.
no idle-filter
This command when applied will filter out new subscriber’s ANCP messages from subscriber with “DSL-line-state” IDLE.
no idle-filter
This command defines the data pattern to be transmitted when the circuit emulation service is not operational or temporarily experiences under-run conditions. This command is only valid for cesopsn and cesopsn-cas circuit emulation services. It is blocked with a warning for unstructured (satop) circuit emulation services.
idle-payload-fill all-ones
This command defines the signaling pattern to be transmitted when the circuit emulation service is not operational or temporarily experiences under-run conditions. This command is only valid for cesopsn-cas circuit emulation services. It is blocked with a warning for unstructured (satop) and basic cesopsn circuit emulation services.
idle-signal-fill all-ones
This command configures the amount of time, in seconds, that the connection must remain idle before TCP keepalive probes are sent.
idle-time 600
This command configures the period of time that an established tunnel with no active sessions persists before being disconnected.
Enter the no form of this command to maintain a persistent tunnel.
The no form of this command removes the idle timeout from the configuration.
no idle-timeout
This command defines the idle-timeout value.
The no form of this command reverts to the default.
This command specifies idle-timeout behavior for DSM UEs and UEs undergoing (ISA-based) portal authentication. This knob only specifies the desired action, idle-timeout is activated by RADIUS on a per-UE basis.
The no form of this command resets the idle-timeout to its default
idle-timeout action remove
This command configures the idle timeout for console, Telnet, SSH, and FTP sessions before the session is terminated by the system.
By default, each idle console, Telnet, SSH, or FTP session times out after 30 minutes of inactivity.
The no form of this command reverts to the default value.
idle-timeout 30
This command defines the action to be executed when the idle-timeout is reached. The action is performed for all hosts associated with the sla-profile instance.
The no form of this command reverts to the default.
idle-timeout-action terminate
![]() | Note: Host connectivity verification must be enabled on the group-interface where the host is connected. |
If the check is successful, the hosts are not disconnected and the idle-timeout timer is reset.
If the check fails, the hosts are deleted, similar as for idle-timeout-action terminate.
This command creates or edits an IES service instance.
The ies command creates or maintains an Internet Ethernet Service (IES). If the service-id does not exist, a context for the service is created. If the service-id exists, the context for editing the service is entered.
IES services allow the creation of customer facing IP interfaces in the same routing instance used for service network core routing connectivity. IES services require that the IP addressing scheme used by the subscriber must be unique between it and other addressing schemes used by the provider and potentially the entire Internet.
While IES is part of the routing domain, the usable IP address space may be limited. This allows a portion of the service provider address space to be set aside for service IP provisioning, becoming administered by a separate but subordinate address authority. This feature is defined using the config router service-prefix command.
IP interfaces defined within the context of an IES service ID must have a SAP created as the access point to the subscriber network. This allows a combination of bridging and IP routing for redundancy purposes.
When a service is created, the customer keyword and customer-id must be specified and associates the service with a customer. The customer-id must already exist having been created using the customer command in the service context. Once a service has been created with a customer association, it is not possible to edit the customer association. The service must be deleted and recreated with a new customer association.
Once a service is created, the use of the customer customer-id is optional for navigating into the service configuration context. Attempting to edit a service with the incorrect customer-id specified results in an error.
Multiple IES services are created to separate customer owned IP interfaces. More than one IES service may be created for a single customer ID. More than one IP interface may be created within a single IES service ID. All IP interfaces created within an IES service ID belongs to the same customer.
By default, no IES service instances exist until they are explicitly created.
The no form of this command deletes the IES service instance with the specified service-id. The service cannot be deleted until all the IP interfaces defined within the service ID have been shut down and deleted.
All services are required to assign a service ID to initially create a service. However, either the service ID or the service name can be used to identify and reference a given service once it is initially created.
If a name is not specified at creation time, then SR OS assigns a string version of the service-id as the name.
Service names may not begin with an integer (0 to 9).
This command configures which IES service interfaces' flow data is being sent to this collector.
The no form of the command removes the values from the configuration.
This command enables the context to configure managed SAP IES and VPRN properties. VPRN services are supported on the 7750 SR only.
This command creates the context to configure or apply IP interface attributes such as administrative group (admin-group) or Shared Risk Loss Group (SRLG).
This command configures the MPLS-TP interface number for the MPLS interface. This is a 32-bit unsigned integer that is node-wide unique.
The if-num-validation command is used to enable or disable validation of the if-num in LSP Trace packet against the locally configured if-num for the interface over which the LSP Trace packet was received at the egress LER. This is because some third-party implementations may not perform interface validation for unnumbered MPLS-TP interfaces and instead set the if-num in the DSMAP TLV to 0. If the value is enable, the node performs the validation of the ingress and egress if-nums received in the LSP echo request messages that ingress on this MPLS-interface. It validates that the message arrives on the interface as identified by the ingress if-num, and is forwarded on the interface as identified by the egress if-num.
If the value is disable, no validation is performed for the ingress and egress if-nums received in the LSP echo request messages that ingress on this MPLS-interface.
if-num-validation enable
This command assigns an existing MCAC interface policy to this MSAP policy.
The no form of this command removes the MCAC interface policy association.
This command assigns existing MCAC interface policy to this interface. MCAC interface policy is not supported with MLD-snooping, therefore executing the command in the mld-snooping contexts will return an error.
The no form of this command removes the MCAC interface policy association.
no if-policy
This command assigns existing an MCAC interface policy to this interface.
The no form of this command removes the MCAC interface policy association.
no if-policy
This command assigns an existing MCAC interface policy to the interface.
The no form removes the MCAC interface policy association.
no if-policy
This command creates an MCAC interface policy and enables the context to configure parameters for the policy.
The no form of this command deletes the MCAC interface policy.
This command specifies the sending of average inter-frame delay variation for a specified direction.
The no form of this command deletes the specified average direction.
![]() | Note: All directions can be specified if all directions are important for reporting. However, only enable those directions that are required. |
This command sets mcast reporting dest debug filtering options and applies only to the 7750 SR.
This command specifies whether IGMP protocol information should be synchronized with the multi-chassis peer.
no igmp
This command enters the context to configure IGMP parameters.
The no form of this command disables IGMP.
no igmp
This command enables the Internet Group Management Protocol (IGMP) context. When the context is created, the IGMP protocol is enabled.
The Internet Group Management Protocol (IGMP) is used by IPv4 systems (hosts and routers) to report their IP multicast group memberships to neighboring multicast routers. An IP multicast router can be a member of one or more multicast groups, in which case it performs both the “multicast router part” of the protocol which collects the membership information needed by its multicast routing protocol, and the “group member part” of the protocol which informs itself and other neighboring multicast routers of its memberships.
The no form of the command disables the IGMP instance. To start or suspend execution of IGMP without affecting the configuration, use the no shutdown command.
This command includes the extracted IPv4 IGMP packets for ip-src-monitoring. IPv4 IGMP packets will be subject to the per-source-rate of CPU protection policies.
no igmp
This command enables the context to configure IGMP host tracking parameters.
This command enables the context to configure IGMP host tracking parameters.
This command enters the context to configure IGMP host tracking parameters.
This command enters the context to configure IGMP host tracking parameters.
This command enters the context to configure IGMP host tracking parameters.
This command configures an IGMP policy.
The no form of this command reverts to the default value.
This command will enable IGMP processing per subscriber host. Without this command IGMP states will not be maintained per subscriber hosts. The referenced policy is defined under the configure>subscr-mgmt context and can be only applied via the sub-profile.
The referenced policy contains entries such as:
The no form of this command reverts to the default.
This command enables the Internet Group Management Protocol (IGMP) snooping context.
This command enables the context to configure Internet Group Management Protocol (IGMP) snooping parameters.
This command specifies whether IGMP snooping information should be synchronized with the multi-chassis peer.
no igmp-snooping
This command enables the Internet Group Management Protocol (IGMP) snooping context.
This command configures IGMP snooping attributes for I-VPLS.
This command enables and configures IGMP-snooping debugging.
This command enables the Internet Group Management Protocol (IGMP) snooping context.
none
This command configures IS-IS to ignore the attached bit on received Level 1 LSPs to disable installation of default routes.
This command configures IS-IS to ignore the attached bit on received Level 1 LSPs to disable installation of default routes.
This command specifies the L2TP AVPs that should be ignored in L2TP session control.
The no form of this command reverts to the default.
This command enables the default route when performing a uRPF check.
The no form of this command disables the default route.
This command configures the uRPF check (if enabled) to ignore default routes for purposes of determining the validity of incoming packets. By default, default routes are considered eligible.
When this command is enabled for a subscriber host, the do-not-fragment (DF) bit in the IPv4 header for frames egressing the subscriber interface is ignored, the frames are fragmented according the applicable egress MTU. The DF bit is reset for frames that are fragmented.
This command applies to PPPoE PTA and L2TP LNS frames only. It is not applicable for L2TP LAC frames.
This command enables the ignore-df-bit flag that ignores the do-not-fragment (DF) bit for frames egressing the WLAN-GW group interface and fragments the frame according to the applicable egress MTU. The DF bit is reset for the frames that are fragmented.
The no form of this command causes the router to fragment a packet larger than the MTU if the DF bit is set to 0 and drops the packet if the DF bit is set to 1.
no ignore-df-bit
When the ignore-efm-state command is configured, any failure in the protocol state machine (discovery, configuration, timeout, loops, and so on) does not impact the state of the port. There is only be a protocol warning message on the port. If this optional command is not configured, the port state is affected by any existing EFM-OAM protocol fault condition.
no ignore-efm-state
This command specifies that for this VPRN instance, ISIS will ignore LSP packets with errors. When enabled, IS-IS LSP errors will be ignored and the associated record will not be purged.
This command enables ISIS to ignore the ATT bit and therefore suppress the installation of default routes.
The no form of this command specifies that ISIS will not ignore LSP errors.
This command sets the filter entry action to ignore-match, as a result this filter entry is ignored and not programmed in hardware.
With this flag enabled, the remote IP address or prefix can be taken over immediately upon entering the PARTNER-DOWN state of the intercommunication link, without having to wait for the Maximum Client Lead Time (MCLT) to expire. By setting this flag, the lease times of the existing DHCP clients, while the intercommunication link is in the PARTNER-DOWN state, will still be reduced to the MCLT over time and all new lease times are set to MCLT. This behavior remains the same as originally intended for MCLT.
Some deployments require that the remote IP address/prefix range starts delegating new IP addresses and prefixes upon the failure of the intercommunication link, without waiting for the intercommunication link to transition from the COMM-INT state into the PARTNER-DOWN state and the MCLT to expire while in PARTNER-DOWN state.
This can be achieved by enabling the ignore-mclt-on-takeover flag and by configuring the partner-down-delay to 0.
Enabling this functionality must be exercised with caution. One needs to keep in mind that the partner-down-delay and MCLT timers were originally introduced to prevent IP address duplication in cases where DHCP redundant nodes transition out-of-sync due to the failure of intercommunication link. These timers (partner-down-delay and MCLT) would ensure that during their duration, the new IP addresses and prefixes are delegated only from one node, the one with local IP address-range/prefix. This causes the new IP address delegation to be delayed and the service is impacted.
If it can be assured that the intercommunication link is always available, then the DHCP nodes would stay in sync and the two timers would not be needed. Therefore, it is important that in this mode of operation, the intercommunication link is well protected by providing multiple paths between the two DHCP nodes. The only event that should cause intercommunication link to fail is the entire nodal failure. This failure is acceptable since in this case only one DHCP node is available to provide new IP addresses and prefixes.
The no form of this command reverts to the default.
This command specifies that IS-IS ignores links with narrow metrics when wide-metrics support has been enabled.
The no form of this command specifies that IS-IS does not ignore these links.
This command specifies that IS-IS will ignore links with narrow metrics when wide-metrics support has been enabled.
The no form of this command specifies that IS-IS will not ignore these links.
This command instructs BGP to disregard the resolved distance to the BGP next-hop in its decision process for selecting the best route to a destination. When configured in the config>router>bgp>best-path-selection context, this command applies to the comparison of two BGP routes with the same NLRI learned from base router BGP peers. When configured in the config>service>vprn context, this command applies to the comparison of two BGP-VPN routes for the same IP prefix imported into the VPRN from the base router BGP instance. When configured in the config>service>vprn>bgp>best-path-selection context, this command applies to the comparison of two BGP routes for the same IP prefix learned from VPRN BGP peers.
The no form of this command (no ignore-nh-metric) restores the default behavior whereby BGP factors distance to the next-hop into its decision process.
no ignore-nh-metric
This command enables the ability to ignore the operationally down status for service oper state calculation. An Epipe service does not transition to Oper State: Down when a SAP fails and when this optional command is configured under that specific SAP. Only a single SAP in an Epipe may have this optional command included. The command can be used in Epipes with or without EVPN enabled.
The no form of this command disables whether a service ignores the operationally down state of the SAP.
no ignore-oper-down
This command enables the Rapid Commit Option for DHCP6.
The no form of this command disables the Rapid Commit Option.
When the ignore-router-id command is present, and the current best path to a destination was learned from EBGP peer X with BGP identifier x and a new path is received from EBGP peer Y with BGP identifier y, the best path remains unchanged if the new path is equivalent to the current best path up to the BGP identifier comparison – even if y is less than x.
The no form of this command restores the default behavior of selecting the route with the lowest BGP identifier (y) as best.
no ignore-router-id
When this command is enabled, the node ignores the standby-bit received from the TLDP peers for the specific spoke-SDP and performs internal tasks without taking it into account.
This command is present at the endpoint level and the spoke-SDP level. If the spoke-SDP is part of the explicit-endpoint, this setting cannot be changed at the spoke-SDP level. The existing spoke-SDP will become part of the explicit-endpoint only if the setting is not conflicting. The newly created spoke-SDP, which is a part of the specified explicit-endpoint, will inherit this setting from the endpoint configuration.
no ignore-standby-signaling
This command specifies if the IPv4 Type-of-Service (ToS) is ignored and the IPv6 traffic class bits set to zero.
If this command is disabled, the system copies the IPv4 ToS into the IPv6 traffic class.
disabled
This command specifies whether the IPv4 ToS is ignored and the IPv6 traffic class bits set to zero.
When disabled, the system copies the IPv4 ToS into the IPv6 traffic class.
The no form of the command recognizes the IPv4 ToS.
disabled
This command enables the use of a specific RSVP LSP by IS-IS and OSPF routing protocols as a shortcut or as a forwarding adjacency for resolving IGP routes.
When the igp-shortcut or the advertise-tunnel-link option is enabled at the IGP instance level, all RSVP LSPs originating on this node are eligible by default as long as the destination address of the LSP, as configured in config>router>mpls>lsp>to, corresponds to a router-id of a remote node.
The lfa-protect option allows an LSP to be included in both the main SPF and the Loop-Free Alternate (LFA) SPF. For a given prefix, the LSP can be used either as a primary next-hop or as an LFA next-hop, but not both. If the main SPF computation selected a tunneled primary next-hop for a prefix, the LFA SPF will not select an LFA next-hop for this prefix and the protection of this prefix will rely on the RSVP LSP FRR protection. If the main SPF computation selected a direct primary next-hop, then the LFA SPF will select an LFA next-hop for this prefix but will prefer a direct LFA next-hop over a tunneled LFA next-hop.
The lfa-only option allows an LSP to be included in the LFA SPF only such that the introduction of IGP shortcuts does not impact the main SPF decision. For a given prefix, the main SPF always selects a direct primary next-hop. The LFA SPF will select a an LFA next-hop for this prefix but will prefer a direct LFA next-hop over a tunneled LFA next-hop.
When the relative-metric option is enabled, IGP will apply the shortest IGP cost between the endpoints of the LSP plus the value of the offset (instead of the LSP operational metric) when computing the cost of a prefix which is resolved to the LSP. The offset value is optional and it defaults to zero. The minimum net cost for a prefix is one (1) after applying the offset. The TTM continues the show the LSP operational metric as provided by MPLS. In other words, applications such as LDP-over-RSVP (when IGP shortcut is disabled) and BGP and static route shortcuts will continue to use the LSP operational metric.
The relative-metric option is mutually exclusive with the lfa-protect or the lfa-only options. In other words, an LSP with the relative-metric option enabled cannot be included in the LFA SPF and vice-versa when the igp-shortcut option is enabled in the IGP.
Finally, the relative-metric option is ignored when forwarding adjacency is enabled in IS-IS or OSPF. In this case, IGP advertises the LSP as a point-to-point unnumbered link along with the LSP operational metric as returned by MPLS and capped to maximum link metric allowed in that IGP. Both the main SPF and the LFA SPFs will use the local IGP database to resolve the routes.
The no form of this command disables the use of a specific RSVP LSP by IS-IS and OSPF routing protocols as a shortcut or a forwarding adjacency for resolving IGP routes.
igp-shortcut. All RSVP LSPs originating on this node are eligible by default as long as the destination address of the LSP corresponds to a router-id of a remote node.
This command enables the use of an RSVP-TE or SR-TE shortcut for resolving IGP routes by OSPF or IS-IS routing protocols.
This command instructs IGP to include RSVP LSPs and SR-TE LSPs originating on this node and terminating on the router ID of a remote node as direct links with a metric equal to the metric provided by MPLS.
During the IP reach calculation to determine the reachability of nodes and prefixes, LSPs are overlaid and the LSP metric is used to determine the subset of paths that are equal lowest cost to reach a node or a prefix. If the user enabled the relative-metric option for this LSP, IGP will apply the shortest IGP cost between the endpoints of the LSP plus the value of the offset, instead of the LSP operational metric, when computing the cost of a prefix that is resolved to the LSP.
When a prefix is resolved to a tunnel next-hop, the packet is sent labeled with the label stack corresponding to the NHLFE of the RSVP-TE or SR-TE LSP, as well as the explicit-null IPv6 label at the bottom of the stack in the case of an IPv6 prefix. Any network event causing one or more IGP shortcuts to go down will trigger a full SPF computation, which may result in installing a new route over an updated set of tunnel next-hops and IP next-hops.
When igp-shortcut is enabled at the IGP instance level, all RSVP-TE and SR-TE LSPs originating on this node are eligible by default as long as the destination address of the LSP, as configured in config>router>mpls>lsp>to, corresponds to a router ID of a remote node. LSPs with a destination corresponding to an interface address or any other loopback interface address of a remote node are automatically not considered by IGP. The user can, however, exclude a specific RSVP-TE or SR-TE LSP from being used as a shortcut for resolving IGP routes by entering the config>router>mpls>lsp>no igp-shortcut command.
The SPF in IGP only uses RSVP LSPs as forwarding adjacencies, IGP shortcuts, or as endpoints for LDP-over-RSVP. These applications of RSVP LSPs are mutually exclusive at the IGP instance level. If two or more options are enabled in the same IGP instance, then forwarding adjacency takes precedence over the shortcut application, which takes precedence over the LDP-over-RSVP application.
The SPF in IGP uses SR-TE LSPs as IGP shortcuts only.
When ECMP is enabled on the system and multiple equal-cost paths exist for a prefix, the following selection criteria are used to pick up the set of tunnel and IP next-hops to program in the data path.
![]() | Note: Although ECMP is not performed across both the IP and tunnel next-hops, the tunnel endpoint may lie in one of the shortest IGP paths for that prefix. In that case, the tunnel next-hop is always selected as long as the prefix cost using the tunnel is equal or lower than the IGP cost. |
When both RSVP-TE and SR-TE IGP shortcuts are available, the IP reach calculation, in the unicast routing table, will first follow the above ECMP tunnel and IP next-hop selection rules when resolving a prefix over IGP shortcuts. After the set of ECMP tunnel and IP next-hops have been selected, the preference of tunnel type is then applied based on the user setting of the resolution of the family of the prefix. If the user enabled resolution of the prefix family to both RSVP-TE and SR-TE tunnel types, the TTM tunnel preference value is used to select one type for the prefix. In other words, an RSVP-TE LSP type is preferred to an SR-TE LSP type on a per-prefix basis.
The ingress IOM sprays the packets for this prefix over the set of tunnel next-hops and IP next-hops based on the hashing routine currently supported for IPv4 packets.
This feature provides IGP with the capability to populate the multicast RTM with the prefix IP next-hop when both the igp-shortcut and the multicast-import options are enabled in IGP. The unicast RTM can still make use of the tunnel next-hop for the same prefix. This change is made possible with the enhancement by which SPF keeps track of both the direct first hop and the tunneled first hop of a node which is added to the Dijkstra tree.
This command enables the use of an RSVP-TE or SR-TE shortcut for resolving IGP routes by OSPF or IS-IS routing protocols.
This command instructs IGP to include RSVP LSPs and SR-TE LSPs originating on this node and terminating on the router ID of a remote node as direct links with a metric equal to the metric provided by MPLS.
During the IP reach calculation to determine the reachability of nodes and prefixes, LSPs are overlaid and the LSP metric is used to determine the subset of paths that are equal lowest cost to reach a node or a prefix. If the user enabled the relative-metric option for this LSP, IGP will apply the shortest IGP cost between the endpoints of the LSP plus the value of the offset, instead of the LSP operational metric, when computing the cost of a prefix that is resolved to the LSP.
When a prefix is resolved to a tunnel next hop, the packet is sent labeled with the label stack corresponding to the NHLFE of the RSVP-TE or SR-TE LSP, as well as the explicit-null IPv6 label at the bottom of the stack in the case of an IPv6 prefix. Any network event causing one or more IGP shortcuts to go down will trigger a full SPF computation, which may result in installing a new route over an updated set of tunnel next-hops and IP next-hops.
When igp-shortcut is enabled at the IGP instance level, all RSVP-TE and SR-TE LSPs originating on this node are eligible by default as long as the destination address of the LSP, as configured in config>router>mpls>lsp>to, corresponds to a router ID of a remote node. LSPs with a destination corresponding to an interface address or any other loopback interface address of a remote node are automatically not considered by IGP. The user can, however, exclude a specific RSVP-TE or SR-TE LSP from being used as a shortcut for resolving IGP routes by entering the config>router>mpls>lsp>no igp-shortcut command.
The SPF in IGP only uses RSVP LSPs as forwarding adjacencies, IGP shortcuts, or as endpoints for LDP-over-RSVP. These applications of RSVP LSPs are mutually exclusive at the IGP instance level. If two or more options are enabled in the same IGP instance, then forwarding adjacency takes precedence over the shortcut application, which takes precedence over the LDP-over-RSVP application.
The SPF in IGP uses SR-TE LSPs as IGP shortcuts only.
When ECMP is enabled on the system and multiple equal-cost paths exist for a prefix, the following selection criteria are used to pick up the set of tunnel and IP next-hops to program in the data path.
![]() | Note: Although ECMP is not performed across both the IP and tunnel next-hops, the tunnel endpoint may lie in one of the shortest IGP paths for that prefix. In that case, the tunnel next hop is always selected as long as the prefix cost using the tunnel is equal or lower than the IGP cost. |
When both RSVP-TE and SR-TE IGP shortcuts are available, the IP reach calculation, in the unicast routing table, will first follow the above ECMP tunnel and IP next hop selection rules when resolving a prefix over IGP shortcuts. After the set of ECMP tunnel and IP next-hops have been selected, the preference of tunnel type is then applied based on the user setting of the resolution of the family of the prefix. If the user enabled resolution of the prefix family to both RSVP-TE and SR-TE tunnel types, the TTM tunnel preference value is used to select one type for the prefix. In other words, the RSVP-TE LSP type is preferred to an SR-TE LSP type on a per-prefix basis.
The ingress IOM sprays the packets for this prefix over the set of tunnel next-hops and IP next-hops based on the hashing routine currently supported for IPv4 packets.
This feature provides IGP with the capability to populate the multicast RTM with the prefix IP next hop when both the igp-shortcut and the multicast-import options are enabled in IGP. The unicast RTM can still make use of the tunnel next hop for the same prefix. This change is made possible with the enhancement by which SPF keeps track of both the direct first hop and the tunneled first hop of a node which is added to the Dijkstra tree.
This command enables IS-IS multi-instance (MI) as described in draft-ietf-isis-mi-02. Multiple instances allow instance-specific adjacencies to be formed that support multiple network topologies on the same physical interfaces. Each instance has an LSDB, and each PDU contains a TLV identifying the instance and the topology to which the PDU belongs.
The iid-tlv-enable (based on draft-ietf-isis-mi-02) and standard-multi-instance (based on draft-ginsberg-isis-mi-bis-01) commands cannot be configured in the same instance, because the MAC addresses and PDUs in each standard are incompatible.
no iid-tlv-enable
This command enables IS-IS multi-instance (MI) as described in draft-ietf-isis-mi-02. Multiple instances allows the formation of instance-specific adjacencies that support multiple network topologies on the same physical interfaces. Each instance has an LSDB, and each PDU contains a TLV that identifies the instance and the topology to which the PDU belongs.
The iid-tlv-enable (based on draft-ietf-isis-mi-02) and standard-multi-instance (based on draft-ginsberg-isis-mi-bis-01) commands cannot be configured in the same instance, because the MAC addresses and PDUs in each standard are incompatible.
The no form of this command disables IS-IS MI.
This command specifies the IKE authentication algorithm for the IKE transform
ike-auth-algorithm sha1
This command specifies the IKE encryption algorithm to be used in the IKE transform instance.
ike-encryption-algorithm aes128
This command specifies one of either two modes of operation. IKE version 1 can support main mode and aggressive mode. The difference lies in the number of messages used to establish the session.
The no form of this command reverts to the default.
no ike-mode
This command enables the context to configure an IKE policy.
The no form of this command
This command configures IKE policy for the gateway.
The no form of this command removes the IKE policy ID from the configuration.
This command specifies the PRF algorithm to use for IKE security association.
![]() | Note: If an authenticated encryption algorithm like AES-GCM is used for IKE encryption algorithm, same-as-auth cannot be used for ike-prf-algorithm. |
ike-prf-algorithm same-as-auth
This command specifies the IKE transform to be used in the IKE policy. Up to four IKE transforms can be specified. If multiple IDs are specified, the system selects an IKE transform based on the peer's proposal. If the system is a tunnel initiator, it uses the configured IKE transform to generate the SA payload.
no ike-transform
This commands creates a new or enters an existing IKE transform instance. The IKE transform include following configuration for IKE SA:
The ike-transform-id is referenced in the ike-policy configuration.
This command sets the IKE version (1 or 2) that the ike-policy will use.
ike-version 1
This command specifies the system, when deleting an IKEv1 phase 1 SA for which it was the responder, to send a delete notification to the peer. This command only applies when the configured ike-version 1. This command is ignored with IKE version 2.
The no form of this command reverts to the default.
ikev1-ph1-responder-delete-notify
This command enables IKEv2 protocol level fragmentation (RFC 7383). The specified MTU is the maximum size of IKEv2 packet.
no ikev2-fragment
This command creates an ILMI link PVCC by default on VPI/VCI 0/16. Deleting an ILMI link deletes the PVCC. ILMI is supported only on ATM interfaces on SONET/SDH paths.
vpi | 0 to 4095 (NNI) |
0 to 255 (UNI) | |
vci | 1, 2, 5 to 65535 |
This command enables debugging for ATM ILMI.
The no form of this command turns off ILMI and debugging.
The following output is an example of ATM ILMI information
This command enables the context to configure parameters for an Inverse Multiplexing over ATM (IMA) group. An IMA group is a collection of physical links bundled together and assigned to an ATM interface. IMA enables a high-speed channel that is composed of ATM cells to be transported as a number of lower-speed circuits. Then they are reassembled as the original high-speed ATM channel. This command is only valid for IMA bundles.
This command enables the inclusion of the IMEI in AA protocols as signaled in the incoming GTP setup message.
The no form of this command disables the inclusion of the attribute.
This command enables the inclusion of the IMEI AVP, as signaled in the incoming GTP setup message.
The no form of this command disables the inclusion of the AVP.
This command enables the use of the implicit null label. Use this command to signal the implicit null option for all LDP FECs for which this node is the egress LER.
The no form of this command disables the signaling of the implicit null label.
no implicit-null-label
This command enables the use of the implicit null label.
Signaling the IMPLICIT NULL label value for all RSVP LSPs can be enabled for which this node is the egress LER. RSVP must be shutdown before being able to change this configuration option.
The egress LER does not signal the implicit null label value on P2MP RSVP LSPs. However, the Penultimate Hop Popping (PHP) node can honor a Resv message with the label value set to the implicit null.
The no form of this command disables the signaling of the implicit null label.
no implicit-null-label
This command enables the use of the implicit null label over a specific RSVP interface.
All LSPs for which this node is the egress LER and for which the path message is received from the previous hop node over this RSVP interface will signal the implicit null label. This means that if the egress LER is also the merge-point (MP) node, then the incoming interface for the path refresh message over the bypass dictates if the packet will use the implicit null label or not. The same for a 1-to-1 detour LSP.
The user must shut down the RSVP interface before being able to change the implicit null configuration option.
The no form of this command returns the RSVP interface to use the RSVP level configuration value.
no implicit-null-label
This command configures an MLD import policy.
The LUDB allows a list of up to 14 MLD import policies per host. The MLD policy also allows the configuration of an additional import policy, providing a total of 15 MLD import policies per host. The import policy inside the MLD policy is always applied last, which determines if the list is a black list or a white list. To configure an MLD white list, the import policies in the LUDB should all be allowed or forward entries and the import policy in the MLD policy should have a default action to deny all. To configure a black list, the import policies inside the LUDB should drop entries and the MLD policy import policy default action should be to forward all. The 15 import policies can be configured to be a mixed white and black list. Since it is difficult to control the order of the import policies within the LUDB, it is recommended to provision the import policy inside the MLD policy first for deterministic behavior.
The no form of this command removes the specified import policy.
This command specifies the import routing policy to be used for IGMP packets to be used on this SAP or SDP. Only a single policy can be imported on a SAP at any time.
The no form of this command removes the policy association from the SAP or SDP.
no import
This command specifies the import policies to be used to control routes advertised to BGP neighbors. Route policies are configured in the config>router>policy-options context. When multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied.
The no form of this command removes all route policy names from the import list.
no import — BGP accepts all routes from configured BGP neighbors. Import policies can be used to limit or modify the routes accepted and their corresponding parameters and metrics.
This command specifies the import policy to filter IGMP packets.
The no form of this command reverts to the default value.
This command specifies the import routing policy to be used for IGMP packets to be used on this SAP or SDP. Only a single policy can be imported on a single SAP at any time.
The no form of this command removes the policy association from the SAP or SDP.
This command specifies the import routing policy to be used for IGMP packets to be used on this SAP or SDP. Only a single policy can be imported on a single SAP at any time.
The no form of this command removes the policy association from the SAP or SDP.
This command specifies the import routing policy to be used. Only a single policy can be imported at a time.
The no form of this command removes the policy association.
This command specifies the import routing policy to be used for IGMP packets to be used on this SAP or SDP. Only a single policy can be imported on a single SAP at any time.
The no form of this command removes the policy association from the SAP or SDP.
This command associates an import policy to filter IGMP packets.
The no form of this command removes the values from the configuration.
no import
This command specifies the import routing policy to be used for IGMP packets to be used on this SAP. Only a single policy can be imported on a single SAP at any time.
The no form of this command removes the policy association from the SAP.
no import — No import policy is specified.
This command is used to specify route policies that control the handling of inbound routes received from certain peers. Route policies are configured in the config>router>policy-options context.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in a peer-group) or neighbor level (only applies to the specified peer). The most specific level is used
The import command can reference up to 15 objects, where each object is either a policy logical expression or the name of a single policy. The objects are evaluated in the specified order to determine the modifications of each route and the final action to accept or reject the route.
Only one of the 15 objects referenced by the import command can be a policy logical expression consisting of policy names (enclosed in square brackets) and logical operators (AND, OR, NOT). The first of the 15 objects has a maximum length of 255 characters while the remaining 14 objects have a maximum length of 64 characters each.
When multiple import commands are issued, the last command entered overrides the previous command.
When an import policy is not specified, BGP routes are accepted by default.
The no form of this command removes the policy association.
no import
This command imports a policy to filter IGMP packets.
The no form of this command removes the policy association from the IGMP instance.
no import — No import policy specified.
The specified name(s) must already be defined.
This command associates an import policy to filter IGMP packets.
The no form of this command removes the values from the configuration.
no import
This command applies one or more (up to five) route polices as IS-IS import policies.
When a prefix received in an IS-IS LSP is accepted by an entry in an IS-IS import policy, it is installed in the routing table, if it is the most preferred route to the destination.
When a prefix received in an IS-IS LSP is rejected by an entry in an IS-IS import policy, it is not installed in the routing table, even if it has the lowest preference value among all the routes to that destination.
The flooding of LSPs is unaffected by IS-IS import policy actions.
The no form of this command removes all policies from the configuration.
no import
This command specifies the import route policy to be used for determining which membership reports are accepted by the router. Route policies are configured in the config>router>policy-options context.
When an import policy is not specified, all the MLD reports are accepted.
The no form of this command removes the policy association from the MLD instance.
no import
This command specifies the policies to import source active state from Multicast Source Discovery Protocol (MSDP) into source active list.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple import commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
If you configure an import policy at the global level, each individual peer inherits the global policy.
If you configure an import policy at the group level, each individual peer in a group inherits the group’s policy.
If you configure an import policy at the peer level, then policy only applies to the peer where it is configured.
The no form of this command removes all policies from the configuration.
no import
This command specifies communities to be accepted from peers.
target:{ip-address:comm-val | 2byte-asnumber:ext-comm-val | 4byte-asnumber:comm-val} | ||
ip-address: | a.b.c.d | |
comm-val: | 0 to 65535 | |
2byte-asnumber: | 1 to 65535 | |
4byte-asnumber | 0 to 4294967295 |
This command configures ABR import policies to filter OSPFv2 Type 3 Summary-LSAs or OSPFv3 Inter-Area-Prefix-LSA between areas, to only permit the specified routes from being imported into an area.
This command cannot be used in OSPF area 0.
The no form of this command reverts to the default value.
no import
If an OSPF route has the lowest preference value among all routes to a destination it is installed in the routing table.
This command specifies the import route policy to be used for determining which routes are accepted from peers. Route policies are configured in the config>router>policy-options context. When an import policy is not specified, BGP routes are accepted by default.
The no form of this command removes the policy association from the IGMP instance.
no import join-policy
no import register-policy
This command configures import route policies to determine routes that will be accepted from RIP neighbors. If no import policy is specified, RIP accepts all routes from configured RIP neighbors. Import policies can be used to limit or modify the routes accepted and their corresponding parameters and metrics.
If multiple policy names are specified, the policies are evaluated in the order that they are specified. The first policy that matches is applied. If multiple import commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of this command removes all policies from the configuration.
no import
This command configures import route policies to determine which label bindings (FECs) are accepted from LDP neighbors. Policies are configured in the config>router>policy-options context.
If no import policy is specified, LDP accepts all label bindings from configured LDP neighbors. Import policies can be used to limit or modify the routes accepted and their corresponding parameters and metrics.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple import commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of this command removes all policies from the configuration.
no import
The specified name(s) must already be defined.
This command applies the referenced IGMP policy (filter) to an interface subscriber or a group-interface. An IGMP filter is also known as a black/white list and it is defined under the config>router>policy-options.
When redirection is applied, only the import policy from the subscriber will be in effect. The import policy under the group interface is applicable only for IGMP states received directly on the SAP (AN in IGMP proxy mode).
The no form of the command removes the policy association from the IGMP instance.
no import
This command specifies the import route policy to determine which membership reports are accepted by the router. Route policies are configured in the config>router>policy-options context.
When an import policy is not specified, all the MLD reports are accepted.
The no form of this command removes the policy association from the MLD instance.
no import
This command specifies the policies to import source active state from Multicast Source Discovery Protocol (MSDP) into source active list.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple import commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
If an import policy is configured at the global level, each individual peer inherits the global policy.
If an import policy is configured at the group level, each individual peer in a group inherits the group’s policy.
If an import policy is configured at the peer level, then policy only applies to the peer where it is configured.
The no form of the command applies no import policies and all source active messages are allowed.
no import
This command specifies the import route policy to be used. Route policies are configured in the config>router>policy-options context.
When an import policy is not specified, BGP routes are accepted by default. Up to five import policy names can be specified.
The no form of this command removes the policy association from the instance.
no import
This command specifies the import routing policy to be used for IGMP packets. Only a single policy can be imported at a time.
The no form of the command removes the policy association.
no import
This command converts an input file (key/certificate/CRL) to a system format file. The following list summarizes the formats supported by this command:
![]() | Note: If there are multiple objects with the same type in the input file, only the first object is extracted and converted. |
url-string | <local-url> up to 99 characters |
local-url | <cflash-id>/<file-path> |
cflash-id | cf1:|cf2:|cf3: |
This command specifies route policies that control the handling of inbound routes received from certain peers. Route policies are configured in the config>router>policy-options context.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific level is used.
The import command can reference up to 15 objects, where each object is either a policy logical expression or the name of a single policy. The objects are evaluated in the specified order to determine the modifications of each route and the final action to accept or reject the route.
Only one of the 15 objects referenced by the import command is allowed to be a policy logical expression consisting of policy names (enclosed in square brackets) and logical operators (AND, OR, NOT). The first of the 15 objects has a maximum length of 255 characters; the remaining 14 objects have a maximum length of 64 characters each.
When multiple import commands are issued, the last command entered overrides the previous command.
When an import policy is not specified, BGP routes are accepted by default.
The no form of this command removes the policy association.
no import
This command specifies up to five route polices as IS-IS import policies.
When a prefix received in an IS-IS LSP is accepted by an entry in an IS-IS import policy, it is installed in the routing table, if it is the most preferred route to the destination.
When a prefix received in an IS-IS LSP is rejected by an entry in an IS-IS import policy, it is not installed in the routing table, even if it has the lowest preference value among all the routes to that destination.
The flooding of LSPs is unaffected by IS-IS import policy actions.
The no form of this command removes all policies from the configuration.
no import
This command applies one or more (up to 5) route polices as OSPF import policies. When a prefix received in an OSPF LSA is accepted by an entry in an OSPF import policy, it is installed in the routing table if it is the most preferred route to the destination. When a prefix received in an OSPF LSA is rejected by an entry in an OSPF import policy, it is not installed in the routing table, even if it has the lowest preference value among all the routes to that destination. The flooding of LSAs is unaffected by OSPF import policy actions. The no form of this command removes all policies from the configuration.
no import
This command configures ABR import policies to filter OSPFv2 Type 3 Summary-LSAs or OSPFv3 Inter-Area-Prefix-LSA between areas, in order to only permit the specified routes from being imported into an area.
This command cannot be used in OSPF area 0.
The no form of this command reverts to the default value.
no import
This command configures import route policies to determine which routes are accepted from RIP neighbors. If no import policy is specified, RIP accepts all routes from configured RIP neighbors. Import policies can be used to limit or modify the routes accepted and their corresponding parameters and metrics.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple import commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of the command removes all policies from the configuration.
no import
The specified names must already be defined.
This command associates policies to control the leaking of GRT routes into the associated VPRN.
The GRT route must have first been leaked by a leak-export policy defined under the config>router context. Then the route must match a route entry in the specified import-grt policy with an accept action. Refer to the IP Router Configuration Command Reference section in the 7750 SR Extensible Routing System Virtualized Service Router.
The no form of this command removes route leaking policy associations and disables the leaking of GRT routes into the local VPRN.
This command configures an import policy for mLDP FECs arriving on the node. This command does not work for self-generated mLDP FECs. The action of the policy will accept or reject the FEC. If the FEC is rejected, it will be kept but is not resolved.
The no form of this command removes all policies from the configuration.
no import-mcast-policy
This command enters the import-pmsi-routes context.
For option B, the leafs or ABR/ASBR that are not directly connected to the root have no visibility of the root. As such, for LDP to build the recursive FEC it needs to cache the MVPN PMSI AD routes, this command gives the user the ability to manually enable caching of MVPN PMSI AD routes internally in LDP for EVPN or MVPN inter-as or mvpn_no_export_community intra-as.
This command configures the import FEC prefix policy to determine which prefixes received from this LDP peer are imported and installed by LDP on this node. If resolved these FEC prefixes are then re-distributed to other LDP and T-LDP peers. A FEC prefix that is filtered out (deny) will not be imported. A FEC prefix that is filtered in (accept) will be imported.
If no import policy is specified, the node will import all prefixes received from this LDP/T-LDP peer. This policy is applied in addition to the global LDP policy and targeted session policy.
Policies are configured in the config>router>policy-options context. A maximum of five policy names can be specified. Peer address has to be the peer LSR-ID address.
The no form of the command removes the policy from the configuration.
no import-prefixes - no import route policy is specified
This command configures the import route policy to determine which FEC prefix label bindings are accepted from targeted LDP neighbors into this node. A label binding that is filtered out (deny) will not be imported. A route that is filtered in (accept) will be imported.
If no import policy is specified, this node session will accept all bindings from configured targeted LDP neighbors. This policy is applied in addition to the global LDP policy.
Policies are configured in the config>router>policy-options context. A maximum of five policy names can be specified.
The no form of this command removes the policy from the configuration.
This command controls the import, in the tunnel table, of LDP tunnels to non-host prefixes. This command is only intended for importing tunnels; it cannot be used for preventing the import of any specific prefix and only non-host prefixes will be considered when evaluating this policy in this context. The LDP tunnels to these non-host prefixes must be created before they can be imported.
This command does not affect the automatic import of LDP tunnels to host prefixes.
The no version of this command removes all of the import policies and, by consequence, any tunnels to non-host prefixes from the tunnel table. If a non-host prefix tunnel is currently being used for forwarding, disabling this command may be service-impacting.
no import-tunnel-table
The specified policy names must already be defined.
This command specifies the allowed format of imported certificates or keys in the cf3:/system-pki directory.
imported-format any
This command enables improved assert procedure on the PIM inclusive provider tunnel.
The no form of this command disables improved assert procedure.
enabled
This command enables improved assert processing on this interface. The PIM assert process establishes a forwarder for a LAN and requires interaction between the control and forwarding planes.
The assert process is started when data is received on an outgoing interface. This could impact performance if data is continuously received on an outgoing interface.
When enabled, the PIM assert process is done entirely on the control-plane with no interaction between the control and forwarding plane.
improved-assert
This command enables improved assert processing. The PIM assert process establishes a forwarder for a LAN and requires interaction between the control and forwarding planes. The assert process is started when data is received on an outgoing interface meaning that duplicate traffic is forwarded to the LAN until the forwarder is negotiated among the routers.
When the improved-assert command is enabled, the PIM assert process is done entirely in the control plane. The advantages are that it eliminates duplicate traffic forwarding to the LAN. It also improves performance since it removes the required interaction between the control and data planes.
![]() | Note: improved-assert is still fully interoperable with the RFC 4601, Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised) and RFC 2362, Protocol Independent Multicast-Sparse Mode (PIM-SM), implementations. However, there may be conformance tests that may fail if the tests expect control-data plane interaction in determining the assert winner. Disabling the improved-assert command when performing conformance tests is recommended. |
improved-assert
This command restricts debugging to only data related to the specified IMSI. This command can be repeated multiple times, where only data for any of the specified IMSIs is debugged.
The no form of this command removes the filter for the specified IMSI. If the last IMSI filter is removed, all data is debugged again, but may be restricted by other filters.
This command configures a TCA for the counter capturing hits due to the GTP IMSI-APN filter.
This command specifies the context for configuring IMSI and APN filtering.
The gtpc-inspection command must be enabled before using this command.
This command applies only to the GTP packets that contain IMSI or APN information elements (IEs).
None - No APN or IMSI filtering is performed.
This command enables the context to configure control path parameters.
The no form of this command reverts to the default.
This command configures the label mapping associated with a forward path or reverse path of an MPLS-TP transit path to be configured.
The incoming label, outgoing label and outgoing interface must be configured, using the in-label, out-label and out-link parameters. If the out-link refers to a numbered IP interface, the user may optionally configure the next-hop parameter and the system will determine the interface to use to reach the configured next-hop, but will check that the user-entered value for the out-link corresponds to the link returned by the system. If they do not correspond, then the path will not come up.
no in-label
This command configures the incoming label for the reverse path or the working path or the protect path of an MPLS-TP LSP. MPLS-TP LSPs are bidirectional, and so an incoming label value must be specified for each path.
no in-label
This command includes the in-plus profile octets discarded count.
The no form of this command excludes the in-plus profile octets discarded count.
no in-plus-profile-octets-discarded-count
This command includes the in-plus profile octets forwarded count.
The no form of this command excludes the in-plus profile octets forwarded count.
no in-plus-profile-octets-forwarded-count
This command includes the in-plus profile octets offered count.
The no form of this command excludes the in-plus profile octets offered count.
no in-plus-profile-octets-offered-count
This command includes the in-plus profile packets discarded count.
The no form of this command excludes the in-plus profile packets discarded count.
no in-plus-profile-packets-discarded-count
This command includes the in-plus profile packets forwarded count.
The no form of this command excludes the in-plus profile packets forwarded count.
no in-plus-profile-packets-forwarded-count
This command includes the in-plus profile packets offered count.
The no form of this command excludes the in-plus profile packets offered count.
no in-plus-profile-packets-offered-count
This command includes the in-profile octets discarded count.
For queues with stat-mode v4-v6, this command includes the IPv4 octets discarded count instead.
The no form of this command excludes the in-profile octets discarded count.
This command includes the in-profile octets discarded count.
The no form of this command excludes the in-profile octets discarded count.
no in-profile-octets-discarded-count
This command includes the in-profile octets discarded count.
The no form of this command excludes the in-profile octets discarded count.
no in-profile-octets-discarded-count
This command includes the in-profile octets forwarded count. For queues with stat-mode v4-v6, this command includes the IPv4 octets forwarded count instead.
The no form of this command excludes the in-profile octets forwarded count.
This command includes the in-profile octets forwarded count.
The no form of this command excludes the in-profile octets forwarded count.
no in-profile-octets-forwarded-count
This command includes the in profile octets forwarded count.
The no form of this command excludes the in profile octets forwarded count.
no in-profile-octets-forwarded-count
This command includes the in profile octets offered count.
The no form of this command excludes the in-profile octets offered count.
no in-profile-octets-offered-count
This command includes the in-profile octets offered count.
The no form of this command excludes the in-profile octets offered count.
no in-profile-octets-offered-count
This command includes the in-profile packets discarded count.
For queues with stat-mode v4-v6, this command includes the IPv4 packets discarded count instead.
The no form of this command excludes the in-profile packets discarded count.
This command includes the in-profile packets discarded count.
The no form of this command excludes the in-profile packets discarded count.
no in-profile-packets-discarded-count
This command includes the in-profile packets discarded count.
The no form of this command excludes the in-profile packets discarded count.
no in-profile-packets-discarded-count
This command includes the in-profile packets forwarded count.
For queues with stat-mode v4-v6, this command includes the IPv4 packets forwarded count instead.
The no form of this command excludes the in-profile packets forwarded count.
This command includes the in-profile packets forwarded count.
The no form of this command excludes the in-profile packets forwarded count.
no in-profile-packets-forwarded-count
This command includes the in profile packets forwarded count.
The no form of this command excludes the in profile packets forwarded count.
no in-profile-packets-forwarded-count
This command includes the in profile packets offered count.
The no form of this command excludes the in profile packets offered count.
no in-profile-packets-offered-count
This command includes the in-profile packets offered count.
The no form of this command excludes the in-profile packets offered count.
no in-profile-packets-offered-count
This command is used in a SAP ingress QoS policy to define an explicit in-profile remark action for a forwarding class or subclass. While the SAP ingress QoS policy may be applied to any SAP, the remarking functions are only enforced when the SAP is associated with an IP or subscriber interface (in an IES or VPRN). When the policy is applied to a Layer 2 SAP (i.e., Epipe or VPLS), the remarking definitions are silently ignored.
In the case where the policy is applied to a Layer 3 SAP, the in-profile remarking definition will be applied to packets that have been classified to the forwarding class or subclass. It is possible for a packet to match a classification command that maps the packet to a particular forwarding class or subclass, only to have a more explicit (higher priority match) override the association. Only the highest priority match forwarding class or subclass association will drive the in-profile marking.
The in-remark command is only applicable to ingress IP routed packets that are considered in-profile. The profile of a SAP ingress packet is affected by either the explicit in-profile/out-of-profile definitions or the ingress policing function applied to the packet. Table 68 shows the effect of the in-remark command on received SAP ingress packets. Within the in-profile IP packet’s ToS field, either the six DSCP bits or the three precedence bits are remarked.
SAP Ingress Packet State | in-remark Command Effect |
Non-Routed, Policed In-Profile | No Effect (non-routed packet) |
Non-Routed, Policed Out-of-Profile | No Effect (non-routed packet) |
Non-Routed, Explicit In-Profile | No Effect (non-routed packet) |
Non-Routed, Explicit Out-of-Profile | No Effect (non-routed packet) |
IP Routed, Policed In-Profile | in-remark value applied to IP header ToS field |
IP Routed, Policed Out-of-Profile | No Effect (out-of-profile packet) |
IP Routed, Explicit In-Profile | in-remark value applied to IP header ToS field |
IP Routed, Explicit Out-of-Profile | No Effect (out-of-profile packet) |
The no form of this command disables ingress remarking of in-profile packets classified to the forwarding class or subclass.
The dscp-name parameter is a 6-bit value. It must be one of the predefined DSCP names defined on the system.
This command specifies the length of time, in seconds, that must elapse without a packet matching a flow before the flow is considered inactive.
The no form of this command resets the inactive flow timeout back to the default of 15 seconds.
Existing flows do not inherit the new inactive-flow-timeout value if this parameter is changed while cflowd is active. The inactive-flow-timeout value for a flow is set when the flow is first created in the active cache table and does not change dynamically.
inactive-flow-timeout 15
This command enables auto removal of inactive transit subscribers. Periodically AA removes any inactive auto-created subscriber where an inactive sub is defined as having no active flows in the last period.
The no form of this command disables the auto removal of inactive transit subscribers.
This command configures the inactivity time out for all TWAMP-control connections. If no TWAMP control message is exchanged over the TCP connection for this duration of time the connection is closed and all in-progress tests are terminated.
The no form of this command returns the value to the default.
inactivity-timeout 900
This command configures the length of time to maintain stale state on the session reflector. Stale state is test data that has not been refreshed or updated by newly arriving probes for that specific test in a predetermined length of time. Any single reflector can maintain up state for a maximum of 12000 tests. If the maximum value is exceeded, the session reflector lacks memory to allocate to new tests.
The no form of this command returns the value to the default.
inactivity-timeout 100
This command specifies the time before an inactive host is removed.
The no form of this command reverts to the default.
The time the responder keeps a test active. Should the time between packets exceed this values within a test the responder will mark the previous test as complete. It will treat any new packets from a peer with the same test-id, source-mac and MEP-ID as a new test responding with the sequence number one.
The no form of the command reverts the timeout to the default value.
inactivity-timer 100
This command, when the inband-collector-export-only command is enabled, allows only collectors that are reachable through inband interfaces and enables a higher flow export rate.
The no form of this command, the default, re-enables the use of the out-of-band management Ethernet port.
This command configures the maximum number of concurrent inbound FTP sessions.
This value is the combined total of inbound and outbound sessions.
The no form of this command reverts to the default value.
inbound-max-sessions 3
This parameter limits the number of inbound Telnet and SSH sessions. A maximum of 30 telnet and ssh connections can be established to the router. The local serial port cannot be disabled.
Telnet and SSH maximum sessions can also use the combined total of both inbound sessions (SSH+Telnet). While it is acceptable to continue to internally limit the combined total of SSH and Telnet sessions to N, either SSH or Telnet sessions can use the inbound maximum sessions, if so required by the Operator.
The no form of this command reverts to the default value.
inbound-max-sessions 5
The IP address configured by the user in the incl-mcast-orig-ip command is encoded in the originating-ip field of EVPN Inclusive Multicast Routes with tunnel type Ingress Replication (value 6), mLDP (2), and Composite IR and mLDP (130).
The configured address does not need to be reachable in the base router or have an interface in the base router. The originating-ip address is used solely for BGP route-key selection.
The originating-ip is never changed for Inclusive Multicast Routes with tunnel type AR (Assisted Replication, value 10).
The no version of the command withdraws the affected Inclusive Multicast Routes and re-advertises it with the default system-ip address in the originating-ip field.
incl-mcast-orig-ip 1
This command specifies the admin groups to be included when an LSP is set up. Up to five groups per operation can be specified, up to 32 maximum. The include statement instructs the CSPF algorithm to pick TE links among the links which belong to one or more of the specified admin groups. A link that does not belong to at least one of the specified admin groups is excluded and thus pruned from the TE database before the CSPF computation. However, a link can still be selected if it belongs to one of the groups in a include statement but also belongs to other groups which are not part of any include statement in the LSP or primary/secondary path configuration. In other words, the include statements implements the “include-any” behavior.
The config>router>mpls>lsp>primary-p2mp-instance>include command is not supported on the 7450 ESS.
The no form of this command deletes the specified groups in the specified context.
no include
This command enables the context to specify the optional fields to include in the NAT syslog messages.
This configures an admin tag to be included when matching a route against an LSP.
Up to eight inclusion statements are supported per policy.
The no form of this command removes the admin tag from the include statement.
This command enables the context to configure administrative groups to include in the flexible algorithm topology graph. Administrative groups are attributes associated with a link and are generally referred to as link colors.
Flexible algorithms provide the possibility to restrict inclusion into the topology graph to links that have a pre-defined combination of associated administrative groups. The include-all command requires that all configured administrative groups must be present in a link before the link can be included in the topology graph.
This command enables the context to configure administrative groups to include in the flexible algorithm topology graph. Administrative groups are attributes associated with a link and are generally referred to as link colors.
Flexible algorithms provide the possibility to restrict inclusion into the topology graph to links that have a pre-defined combination of associated administrative groups. The include-any command requires that one of the configured administrative groups must be present on a link before the link can be included in the topology graph.
This command enables the context to configure AVPs and their format to be included in Diameter Gx, Gy, or NASREQ application messages. For full description each AVP, refer to the 7750 SR and VSR RADIUS Attributes Reference Guide.
AVP name:
This command specifies to include the Recursive DNS Server (RDNSS) Option as defined in RFC 6106 in IPv6 router advertisements for DNS name resolution of IPv6 SLAAC hosts.
The no form of this command returns the command to the default setting.
This command specifies to include the Recursive DNS Server (RDNSS) Option as defined in RFC 6106 in IPv6 Router Advertisements for DNS name resolution of IPv6 SLAAC hosts.
The no form of this command reverts to the default.
This command enables the Recursive DNS Server (RDNSS) Option in router advertisements. This must be enabled for each interface on which the RDNSS option is required in router advertisement messages.
The no form of this command disables the RDNSS option in router advertisements.
no include-dns
This command enables the Recursive DNS Server (RDNSS) Option in router advertisements. This must be enabled for each interface on which the RDNSS option is required in router advertisement messages.
The no form of this command disables the RDNSS option in router advertisements.
include-dns
This command configures the admin group constraint into the route next-hop policy template.
Each group is entered individually. The include-group statement instructs the LFA SPF selection algorithm to pick up a subset of LFA next-hops among the links which belong to one or more of the specified admin groups. A link which does not belong to at least one of the admin-groups is excluded. However, a link can still be selected if it belongs to one of the groups in a include-group statement but also belongs to other groups which are not part of any include-group statement in the route next-hop policy.
The pref option is used to provide a relative preference for the admin group to select. A lower preference value means that LFA SPF will first attempt to select a LFA backup next-hop which is a member of the corresponding admin group. If none is found, then the admin group with the next higher preference value is evaluated. If no preference is configured for a given admin group name, then it is supposed to be the least preferred, that is, numerically the highest preference value.
When evaluating multiple include-group statements within the same preference, any link which belongs to one or more of the included admin groups can be selected as an LFA next-hop. There is no relative preference based on how many of those included admin groups the link is a member of.
The exclude-group statement simply prunes all links belonging to the specified admin group before making the LFA backup next-hop selection for a prefix.
If the same group name is part of both include and exclude statements, the exclude statement will win. It other words, the exclude statement can be viewed as having an implicit preference value of 0.
The admin-group criteria are applied before running the LFA next-hop selection algorithm.
The no form deletes the admin group constraint from the route next-hop policy template.
This command includes either the first two (1 and 2) queues or the first three (1, 2, and 3) queues into the HSMDA WRR scheduling loop policy. This command defines how many queues are members of the scheduling loop.
The no form of this command removes the explicit queues from the HSMDA WRR policy.
This command enables the context to specify the RADIUS parameters that the system should include into RADIUS authentication-request messages.
The no form of this command disables the RADIUS attributes to be included in the policy.
This command enables the context to specify the RADIUS parameters that the system should include in RADIUS authentication-request messages.
The no form of this command reverts to the default values.
This command enables the context to specify the RADIUS parameters that the system should include into RADIUS authentication-request messages.
This command allows the operator to optionally include router information at the top of each accounting file generated for a given accounting policy.
When the no form of this command is selected, optional router information is not include at the top of the file.
no include-system-info
This context allows configuration of which protocols are included for ip-src-monitoring. This is system-wide configuration that applies to cpu protection globally.
This command enables the context to configure the use of a P2MP LSP as the default tree for forwarding Broadcast, Unknown unicast, and Multicast (BUM) packets of a VPLS or B-VPLS instance. The P2MP LSP is referred to, in this case, as the Inclusive Provider Multicast Service Interface (I-PMSI).
When enabled, this feature relies on BGP Auto-Discovery (BGP-AD), BGP-VPLS or BGP-EVPN to discover the PE nodes participating in a specified VPLS/B-VPLS instance. In the case of BGP-AD or BGP-VPLS, the BGP route contains the information required to signal both point-to-point (P2P) PWs used to forward unicast known Ethernet frames, and the RSVP or mLDP P2MP LSP used to forward the BUM frames. In the case of BGP-EVPN, the EVPN IMET route contains the information to set up the mLDP P2MP LSP and may also contain the information that enables the remote leaf-only nodes to setup an EVPN destination to the sending PE.
![]() | Note: The provider-tunnel for a specified service must be configured with an owner protocol (BGP-AD, BGP-VPLS or BGP-EVPN); only one owner must be configured. Use the owner {bgp-ad|bgp-vpls|bgp-evpn-mpls} command to configure an owner. |
With an mLDP I-PMSI, each leaf node will initiate the signaling of the mLDP P2MP LSP upstream using the P2MP FEC information in the I-PMSI tunnel information discovered through the BGP.
If IGMP or PIM snooping are configured on the VPLS/B-VPLS instance, multicast packets matching an L2 multicast Forwarding Information Base (FIB) record will also be forwarded over the P2MP LSP.
Use the mldp command to enable the use of an LDP P2MP LSP as the I-PMSI for forwarding Ethernet BUM and IP multicast packets in a VPLS instance:
config>service>vpls [b-vpls]>provider-tunnel>inclusive>mldp
When a no shutdown is performed under the context of the inclusive node and the expiration of a delay timer, BUM packets will be forwarded over an automatically signaled mLDP P2MP LSP.
Use the root-and-leaf command to configure the node to operate as both root and leaf in the VPLS instance:
config>service>vpls [b-vpls]>provider-tunnel>inclusive>root-and-leaf
The node behaves as a leaf-only node by default. For the I-PMSI of type mLDP, the leaf-only node will join I-PMSI rooted at other nodes it discovered but will not include a PMSI Tunnel Attribute in BGP route update messages. This way a leaf-only node will forward packets to other nodes in the VPLS/B-VPLS using the point-to-point spoke-SDPs in the case of BGP-AD or BGP-VPLS, or using EVPN destinations in the case of BGP-EVPN.
![]() | Note: Either BGP-AD/VPLS or BGP-EVPN must be enabled in the VPLS/B-VPLS instance otherwise the execution of the no shutdown command under the context of the inclusive node will fail and the I-PMSI will not come up. |
If the P2MP LSP instance goes down, the VPLS/B-VPLS immediately reverts the forwarding of BUM packets to the P2P PWs or EVPN destinations (in the case of BGP-EVPN). Performing a shutdown under the context of the inclusive node will allow the user to restore BUM packet forwarding over the P2P PWs or EVPN destinations.
This feature is supported with VPLS and B-VPLS; it is not supported with I-VPLS. Although Routed VPLS is supported, routed traffic cannot be sent over the I-PMSI tree.
This command creates the context to configure the use of a P2MP LSP as the default tree for forwarding Broadcast, Unicast unknown, and Multicast (BUM) packets of a VPLS or B-VPLSs instance. The P2MP LSP is referred to, in this case, as the Inclusive Provider Multicast Service Interface (I-PMSI).
When enabled, this feature relies on BGP Auto-Discovery (BGP-AD) or BGP-VPLS to discover the PE nodes participating in a specified VPLS/B-VPLS instance. The AD route contains the information required to signal both the point-to-point (P2P) PWs used for forwarding unicast known Ethernet frames and the RSVP or mLDP P2MP LSP used to forward the BUM frames.
The root node signals the RSVP P2MP LSP based on an LSP template associated with the I-PMSI at configuration time. The leaf node will join automatically the P2MP LSP, which matches the I-PMSI tunnel information discovered via BGP.
With a mLDP I-PMSI, each leaf node will initiate the signaling of the mLDP P2MP LSP upstream using the P2MP FEC information in the I-PMSI tunnel information discovered via BGP-AD.
If IGMP or PIM snooping are configured on the VPLS instance, multicast packets matching an L2 multicast Forwarding Information Base (FIB) record will also be forwarded over the P2MP LSP.
The user enables the use of an RSVP P2MP LSP as the I-PMSI for forwarding Ethernet BUM and IP multicast packets in a VPLS/B-VPLS instance using the following commands:
config>service>vpls [b-vpls]>provider-tunnel>inclusive>rsvp>lsp-template p2mp-lsp-template-name
The user enables the use of an LDP P2MP LSP as the I-PMSI for forwarding Ethernet BUM and IP multicast packets in a VPLS instance using the following command:
config>service>vpls [b-vpls]>provider-tunnel>inclusive>mldp
After the user performs a no shutdown under the context of the inclusive node and the expiration of a delay timer, BUM packets will be forwarded over an automatically signaled mLDP P2MP LSP or over an automatically signaled instance of the RSVP P2MP LSP specified in the LSP template.
The user can specify if the node is both root and leaf in the VPLS instance:
config>service>vpls [b-vpls]>provider-tunnel>inclusive>root-and-leaf
The root-and-leaf command is required otherwise this node will behave as a leaf-only node by default. When the node is leaf only for the I-PMSI of type P2MP RSVP LSP, no PMSI Tunnel Attribute is included in BGP-AD route update messages and therefore no RSVP P2MP LSP is signaled but the node can join RSVP P2MP LSP rooted at other PE nodes participating in this VPLS/B-VPLS service. The user must still configure a LSP template even if the node is a leaf only. For the I-PMSI of type mLDP, the leaf-only node will join I-PMSI rooted at other nodes it discovered but will not include a PMSI Tunnel Attribute in BGP-AD route update messages. This way a leaf-only node will forward packets to other nodes in the VPLS/B-VPLS using the point-to-point spoke-SDPs.
BGP-AD must have been enabled in this VPLS/B-VPLS instance or the execution of the no shutdown command under the context of the inclusive node is failed and the I-PMSI will not come up.
Any change to the parameters of the I-PMSI, such as disabling the P2MP LSP type or changing the LSP template requires that the inclusive node be first shutdown. The LSP template is configured in MPLS.
If the P2MP LSP instance goes down, VPLS/B-VPLS immediately reverts the forwarding of BUM packets to the P2P PWs. The user can however restore at any time the forwarding of BUM packets over the P2P PWs by performing a shutdown under the context of the inclusive node.
This feature is supported with VPLS, H-VPLS, and B-VPLS. It is not supported with I-VPLS and Routed VPLS.
This command enters the context for specifying inclusive provider tunnels.
This command enables the context for specifying inclusive provider tunnels parameters.
This command configures the incoming replication SID for this P2MP SR tree replication segment entry.
The no form of this command removes the incoming replication SID.
This command sets the delay before an incremental SPF calculation is performed when LSA types 3, 4, 5, or 7 are received. This allows multiple updates to be processed in the same SPF calculation. Type 1 or type 2 LSAs are considered a topology change and will always trigger a full SPF calculation.
The no form of this command resets the timer value back to the default value.
![]() | Note: The timer granularity is 10 ms if the value is less than 500 ms, and 100 ms if the value is ≥ 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
incremental-spf-wait 1000
This command creates an index entry containing authentication data for a dynamic service SAP. Up to 32 indexes can be created per user name entry, representing up to 32 dynamic service SAPs that can be instantiated with a single dynamic service data trigger. One of the dynamic service SAPs must be the data trigger SAP.
The no form of this command removes the index entry from the user name entry in the local authentication database configuration.
This command specifies that the route is indirect and specifies the next hop IP address used to reach the destination.
The configured ip-address is not directly connected to a network configured on this node. The destination can be reached via multiple paths. The indirect address can only be resolved from dynamic routing protocol. Another static route cannot be used to resolve the indirect address.
The ip-address configured here can be either on the network side or the access side and is typically at least one hop away from this node.
no indirect
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x-[interface] |
This command specifies that the route is indirect and specifies the next hop IP address used to reach the destination.
The configured ip-address is not directly connected to a network configured on this node. The destination can be reached via multiple paths. The indirect address can only be resolved from dynamic routing protocol. Another static route cannot be used to resolve the indirect address.
The ip-address configured here can be either on the network side or the access side and is typically at least one hop away from this node.
no indirect
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x-[interface] |
This command configures the Intercepting Network Element (INE).
The no form of this command reverts to the default.
This command displays the running configuration for the configuration context where it is entered and all branches below that context level. It can be used in any branch under configure, but not with configure itself.
By default, the command only enters the configuration parameters that vary from the default values.
The detail keyword causes all configuration parameters to be displayed. The include-dynamic objective keyword includes configuration parameters from dynamic sources such as VSD or dynamic data services Python scripts. These dynamic configuration parameters are not saved in the configuration file.
Example:
This command displays debug information for NETCONF sessions.
The following is an example of debug information for NETCONF sessions.
The context allows the operator to set different flags in the Information OAM PDU. The flags can be used to notify the peer that a local signal failure threshold has been exceeded within the configured window. This is useful when the local node supports the link monitoring function, but the remote peer does not support this capability. Information OAM PDUs are sent on the interval where the Event Notification OAM PDU is typically only sent on the initial sf-threshold crossing event. It is strongly suggested one of the Information OAM PDU Flag fields used to continually communicate current monitor state to the peer.
Interactions: The signal failure threshold will trigger these actions.
This command increases or decreases the active bandwidth associated with the ingress port that affects the amount of ingress buffer space managed by the port. Changing a port’s active bandwidth using the ing-percentage-of-rate command is an effective means of artificially lowering the buffers managed by one ingress port and giving them to other ingress ports on the same MDA.
The ing-percentage-of-rate command accepts a percentage value that increases or decreases the active bandwidth based on the defined percentage. A value of 50% causes the active bandwidth to be reduced by 50%. A value of 150% causes the active bandwidth to be increased by 50%. Values from 1 to 1000 percent are supported.
A value of 100 (the default value) is equivalent to executing the no ing-percentage-of-rate command and restores the ingress active rate to the normal value.
The no form of this command removes any artificial increase or decrease of the ingress active bandwidth used for ingress buffer space allocation to the port. The no ing-percentage-of-rate command sets the ingress rate percentage to 100%.
This command configures the sharing of the ingress buffers allocated to a hybrid port among the access and network contexts. By default, it is split equally between network and access.
The no form of this command reverts to the default values for the ingress access and network weights.
This command enables access to the ingress fp CLI context.
This command enables the context to configure ingress ANCP policy parameters.
This command enables the context to configure ingress policies for Managed SAPs (MSAPs).
This command enables the context to configure ingress parameters for the SLA profile.
This command enables the context to configure ingress network filter parameters for the interface.
This command enables the context to configure ingress SAP Quality of Service (QoS) policies and filter policies.
If no SAP ingress QoS policy is defined, the system default sap-ingress QoS policy is used for ingress processing. If no ingress filter is defined, no filtering is performed.
This command enables the context to configure ingress Quality of Service (QoS) policies and filter policies.
If no QoS policy is defined, the system default sap-ingress QoS policy is used for ingress processing. If no ingress filter is defined, no filtering is performed.
This command configures ingress ATM attributes for the SAP.
This command enables the context to configure ingress buffer pool parameters which define the percentage of the pool buffers that are used for CBS calculations and specify the slope policy that is configured in the config>qos>slope-policy context.
On the MDA level, access ingress pools are only allocated on channelized MDAs.
This command configures Ethernet access ingress port parameters.
This command enables the context to configure the ingress QoS profile for the MLFR bundle.
This command enables the context to configure ingress MLPPP QoS profile parameters for the multilink bundle.
This command enables the context to configure ingress traffic attributes for the ILMI link.
This command configures ingress ATM attributes for the SAP.
This command enables the context to configure ingress SAP Quality of Service (QoS) policies.
If no sap-ingress QoS policy is defined, the system default sap-ingress QoS policy is used for ingress processing.
This command configures the ingress SDP context.
This command enables the context to configure ingress SAP Quality of Service (QoS) policies and filter policies.
This command enters the context to configure network ingress parameters for the VPLS VXLAN service.
This command enters the context to configure ingress ATM attributes for the SAP.
This command enters the ingress context for a spoke SDP.
The ingress node in this context under the vpls binding is used to define the routed IPv4 and IPv6 optional filter overrides.
This command enters context to configure ingress parameters for network interfaces.
This command configures ingress ATM attributes for the SAP.
This command enters the context to configure network ingress parameters for the VPRN service.
This command enters the ingress context for a spoke SDP.
This command enters context to configure ingress parameters for network interfaces.
This command enters the context to configure ingress SAP Quality of Service (QoS) policies and filter policies.
If no sap-ingress QoS policy is defined, the system default sap-ingress QoS policy is used for ingress processing. If no ingress filter is defined, no filtering is performed.
The ingress node in this context under the vpls binding is used to define the routed IPv4 and IPv6 optional filter overrides.
This command enables the context to configure ingress parameters.
This command enables the context for MDA-level IOM Quality of Service (QoS) configuration.
This command enables the context to configure in parameters for the service’s video SAP.
This command enables the context to configure spoke SDP ingress parameters.
This command is used to enter the CLI node that creates or edits policy entries that specify the DiffServ code points-to-forwarding class mapping for all IP packets and define the MPLS EXP bits-to-forwarding class mapping for all labeled packets.
When premarked IP or MPLS packets ingress on a network port, they get a Per Hop Behavior (that is, the QoS treatment through the router, based on the mapping defined under the current node).
This command enables the context to create ingress queue group templates. Ingress queue group templates can be applied to ingress ports to create an ingress queue group of the same name.
An ingress template must be created for a group-name prior to creating a queue group with the same name on an ingress port.
This command enables access to the context to configure ingress network filter policies for the IP interface. If an ingress filter is not defined, no filtering is performed.
This command enables the context to configure the ingress node associate an existing scheduler policy name with the customer site. The ingress node is an entity to associate commands that complement the association.
This command enables the context to configure spoke SDP binding ingress filter parameters.
This command configures ingress parameters for the PW port.
This command allows the user to configure an ingress buffer allocation percentage per forwarding plane from 20.00% to 80.00%. Ingress buffer allocation applies to user-accessible buffers (total buffers less those reserved for system use).
The ingress buffer allocation percentage determines how much of the user-accessible buffers will be available for ingress purposes. The remaining buffers will be available for egress purposes.
This command is supported on all 50G FP2-based and 100G/200G FP3-based hardware. It is not supported on other FP2 or FP3-based hardware, nor on FP4-based hardware.
The no form of this command reverts the ingress buffer allocation to the default value.
ingress-buffer-allocation 50.00
This command configures the ingress counter map for sFlow. The map must be configured so sFlow agent understands how to interpret data collected against SAP queues and policers. Multiple queues/policers can be mapped to the same traffic-type using separate line entries.
The no form of this command deletes a SAP policy queue/policer from the map.
This command enables the context to configure the ingress IP filter parameters.
The no form of this command reverts to the default.
ingress-ip-filter-entries
This command enables the context to configure the ingress IPv6 filter parameters.
The no form of this command reverts to the default.
ingress-ipv6-filter-entries
This command enables ingress mirroring based on MPLS labels with the following limitations.
The ingress label mirror source overrides all other mirror source definitions. The MPLS frame is mirrored to the mirror destination as it is received on the ingress network port. The router MPLS label space is global for the system. A specific label is mirrored to a mirror destination regardless of the ingress interface. In addition to mirroring known labels, debug also allows pre-provisioning label values which are yet to be known by the system. Be aware that debug mirroring requires provisioning of static label values while labels distributed by label distribution protocols are dynamic in nature. Therefore, when label values change due to network changes, labels provisioned in debug mirroring must be changed or deleted manually.
By default, no ingress MPLS frames are mirrored. The ingress-label command must be executed to start mirroring on a specific MPLS label.
If the label does not exist on any ingress network ports, no packets are mirrored for that label. An error will not occur. Once the label exists on a network port, ingress mirroring begins for that label.
This command enables ingress MPLS frame mirroring based on the top-of-stack MPLS label. Up to eight labels can be defined simultaneously.
The ingress-label command is used to mirror ingressing MPLS frames with specific MPLS labels to a specific mirror destination. The ingress label must be at the top of the label stack and can only be mirrored to a single mirror destination. If the same label is defined with multiple mirror destinations, an error is generated and the original mirror destination remains.
The ingress-label mirror source overrides all other mirror source definitions. The MPLS frame is mirrored to the mirror destination as it is received on the ingress network port. The router MPLS label space is global for the system. A specific label is mirrored to the mirror destination regardless of the ingress interface.
By default, no ingress MPLS frames are mirrored. The ingress-label command must be executed to start mirroring on a specific MPLS label.
The no ingress-label command removes all label mirroring for the mirror source. To stop mirroring on specific labels, use the no ingress-label label form of this command. Multiple labels may be given in a single no ingress-label command.
If the label does not exist on any ingress network ports, no packets are mirrored for that label. An error will not occur. Once the label exists on a network port, ingress mirroring commences for that label.
This command configures the percentage of the total number of queues on the FP on which the policy is applied that are allocated to ingress, with the remainder allocated to egress. The ingress and egress buffer pool sizes are not affected by the queue allocation.
The allocation is performed in sets of 8192 queues, with a minimum of 8192 queues at ingress and 8192 queues at egress. If the percentage configured results in the queue allocation not being a multiple of 8192, the number of queues at ingress is rounded down to the next 8192 boundary, and consequently the number of queues at egress is rounded up to the next 8192 boundary, both while respecting the minimum at ingress and egress.
If the FP resources policy being applied to any FP and the updated allocation is not achievable with the current ingress or egress queue consumption on any of the related FPs, then the command fails.
The configuration of ingress-percent-of-total command, including removing this parameter to return to its default configuration, causes the router to immediately reset the associated cards, XIOMs, and MDAs, except on the 7750 SR-1 where the configuration must be saved, and the router rebooted, immediately after committing the configuration transaction.
The no form of this command reverts the percentage of ingress queues, and consequently egress queues, to their default allocation.
ingress-percent-of-total 50.00
.This command specifies the ingress policer applied to all UEs corresponding to default vlan-range (such as group-interface) or the specified vlan-range. The policer can be created in the config>subscr-mgmt>isa-policer context. The ingress policer can be overridden per UE from RADIUS via access-accept or COA.
The no form of this command reverts to the default.
This command enables the context to configure SAP ingress QOS policy for the HSMDA ingress queue.
This command configures the maximum amount of ingress bandwidth that this port can receive with the configured sub-rate using packet-based accounting.
The no form of this command returns the value to the default.
no ingress-rate
This command enables and disables the advertisement of the Inclusive Multicast Ethernet Tag route (IMET route) with tunnel-type Ingress-Replication in the PMSI Tunnel Attribute, or with the tunnel-type Composite Point-to-Multipoint and Ingress-Replication (P2MP+IR) in the root-and-leaf nodes. The following must be considered:
ingress-repl-inc-mcast-advertisement
This command allows the user to configure the system so that a separate label is sent for BUM (Broadcast, Unknown unicast and Multicast) traffic in a specified service. By default (no ingress-replication-bum-label), the same label is used for unicast and flooded BUM packets when for-warding traffic to remote PEs.
When saving labels, this might cause transient traffic duplication for all-active multi-homing. By enabling ingress-replication-bum-label, the system will advertise two labels per EVPN VPLS instance, one for unicast and one for BUM traffic. The ingress PE will use the BUM label for flooded traffic to the advertising egress PE, so that the egress PE can determine if the unicast traffic has been flooded by the ingress PE. Depending on the scale required in the network, the user may choose between saving label space or avoiding transient packet duplication sent to an all-active multi-homed CE for certain macs.
no ingress-replication-bum-label
This command provides the context for the user to enable ingress-statistics on an MPLS-TP LSP.
This command provides the context for the user to enter the LSP names for the purpose of enabling ingress data path statistics at the terminating node of the LSP, for example, egress LER.
This command configures ingress statistics in an MPLS forwarding policy.
The ingress statistics are associated with a binding label, that is the ILM of the forwarding policy, and provides aggregate packet and byte counters for packets matching the binding label.
The no form of this command removes the statistics from the MPLS forwarding policy.
This command enters the context to configure the ingress statistics for IGP SIDs.
This command administratively enables the collection of ingress traffic statistics for all segment routing policies. The statistics provide counts for the number of incoming packets and bytes corresponding to each (color, endpoint) combination.
If there are any SR-MPLS interfaces on an FP2 or older line-cards, an attempt to enable this command will fail.
The no form of this command disables ingress stats collection for all segment routing policies.
no ingress-statistics
This command enables the allocation of statistical indexes to BGP-LU route entries that are programmed on ingress data paths. For effective operation, a prefix must be advertised with a label per prefix for ILM statistics.
The no form of this command disables the allocation of statistical indexes to BGP-LU route entries.
no ingress-statistics
This command enables the context to configure ingress MDA XPL interface error parameters.
This command enables debugging for LDP Init packets.
The no form of the command disables the debugging output.
This command configures a VRRP initialization delay timer.
no init-delay
This command configures a VRRP initialization delay timer.
no init-delay
This command configures a VRRP initialization delay timer.
no init-delay
This command configures a VRRP initialization delay timer.
no init-delay
This command determines the scheme used to select the initial drop priority of extracted control plane traffic. The initial drop priority of extracted packets can be either low or high priority. The drop priority of the extracted packets can be subsequently altered by mechanisms such as CPU protection. High-priority traffic receives preferential treatment in control plane congestion situations over low-priority traffic.
init-extract-prio-mode uniform
For network interfaces, the QoS classification profile result selects the drop priority (in = high priority, out = low priority) for extracted control traffic, and the default QoS classification maps different DSCP and EXP values to different in/out profile states.
For access interfaces, the QoS classification priority result typically selects the drop priority for extracted control traffic. The default access QoS classification (default-priority) maps all traffic to low. If the queues in the access QoS policy are configured as profile-mode queues (rather than the default priority-mode) extracted traffic will use the QoS classification profile value configured against the associated FC (rather than the priority result) to select the drop priority.
Layer 2 extracted control traffic (ARP or ETH-CFM) and protocols that cannot always be QoS-classified, such as IS-IS, are initialized as low drop priority in order to protect Layer 2 protocol traffic on uniform interfaces (which would typically be subject to centralized CPU protection). Alternately, DCP can be used (by configuring a non-zero rate with exceed-action of low-priority for the all-unspecified protocol) to mark some of this traffic as high priority.
This command specifies the initial app-profile for the hosts created on the group-interface. This initial app-profile is replaced after hosts pass web portal authentication.
The no form of this command reverts to the default.
no initial-app-profile
This hold time applies to BRG instances that are created without any hosts; for example, triggered due to proxy authentication. During this initial hold-time the BRG is not deleted and no connectivity-verification is started. When this timer expires, connectivity verification is started. If connectivity verification is disabled and no hosts are associated with the BRG upon expiry, the regular hold time is started and the BRG instance will be removed.
This command allows an operator to have fast BRG removal (no connectivity-verification and no hold-time) but still use BRG proxy authentication. Without an initial hold time the BRG would be removed immediately after creation.
This command does not apply to BRG instances that are created through host setup.
The no form of this command reverts to the default.
initial-hold-time min 5
This command configures the time to hold on to a BRG immediately after the system detected its presence. The hold time does not apply in case this system removes the BRG context upon an explicit request.
initial-hold-time 300
This command configures the lease time for a user which is migrant (unauthenticated).
initial-lease-time min 10
This command specifies the signaled preferred lifetime in DHCPv6 or SLAAC after full authentication (DSM and/or ESM).
The no form of this command reverts to the default.
initial-preferred-lifetime min 5
This command request initial certificate from CA by using CMPv2 initial registration procedure.
The ca parameter specifies a CA-profile which includes CMP server information.
The key-to-certify is an imported key file to be certified by the CA.
The protection-key is an imported key file used to for message protection if protection-alg is signature.
The request is authenticated either of following methods:
Optionally, the system could also send a certificate or a chain of certificates in extraCerts field. Certificate is specified by the “cert” parameter, it must include the public key of the key used for message protection.
Sending a chain is enabled by specify the send-chain parameter.
subject-dn specifies the subject of the requesting certificate.
save-as specifies full path name of saving the result certificate.
In some cases, CA may not return certificate immediately, due to reason like request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command could be used to poll the status of the request. If key-list is not configured in the corresponding ca-profile, then the system will use the existing password to authenticate the CMPv2 packets from server if it is in password protection.
This command configures BGP to send UPDATE messages announcing reachability information to a peer or set of peers immediately after the sessions come up (become established) with these peers.
The default behavior, provided by the no form of this command, is to wait for min-route-advertisement time after each session is established before sending the first set of UPDATE messages.
This command configures BGP to send UPDATE messages announcing reachability information to a peer or set of peers immediately after the sessions become established with these peers.
The no form of this command waits for min-route-advertisement time after each session is established before sending the first set of UPDATE messages.
This command specifies the initial sla-profile for the hosts created on the group-interface. This initial sla-profile is replaced after hosts pass web portal authentication.
The no form of this command reverts to the default.
This command specifies the initial sla-profile for the hosts created on the group-interface. This initial sla-profile is replaced after hosts pass the web portal authentication.
no initial-sla-profile
This command specifies the initial sub-profile for the hosts created on the group-interface. This initial sub-profile is replaced after hosts pass web portal authentication.
The no form of this command reverts to the default.
no initial-sub-profile
This command specifies the signaled preferred lifetime in DHCPv6 or SLAAC during a migrant phase.
The no form of this command reverts to the default.
initial-valid-lifetime min 5
This command configures a free-form initiation message for a type 0 TLV to be sent to the BMP monitoring station. The message is transmitted when a BMP monitoring station establishes a connection to the device. Information can be provided to the BMP station system administrator (for example, a contact phone number). The initiation message includes a type 1 TLV containing the SNMP sysDescr value specified in RFC 1213, Management Information Base for Network Management of TCP/IP-based internets: MIB-II, and a type 2 TLV containing the SNMP sysName value also from RFC 1213. The string in the initiation-message is UTF-8 encoded.
The no form of this command removes initiation message from the configuration and causes a free-form message to be included in the type 0 information TLV and the corresponding tlv-length is made 0.
This command configures the matching of the second tag that is carried transparently through the service. The inner tag on ingress is the second tag on the frame if there are no service delimiting tags. The inner tag is the second tag before any service delimiting tags on egress but is dependent in the ingress configuration and may be set to 0 even in cases where additional tags are on the frame. This allows matching VLAN tags for explicit filtering or QoS setting when using default or null encapsulations.
The inner tag is not applicable in ingress on dot1Q SAPs. The inner tag may be populated on egress depending on the ingress SAP type.
On QinQ SAPs of null and default that do not strip tags, the inner-tag will contain the second tag (which is still the second tag carried transparently through the service.) On ingress SAPs that strip any tags, the inner tag will contain 0 even if there are more than two tags on the frame.
The optional vid_mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value and vid-mask) = = (tag and vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.
For QoS, the VID type cannot be specified on the default QoS policy.
The default vid-mask is set to 4095 for exact match.
This command configures the matching of the second tag that is carried transparently through the service. The inner-tag on ingress is the second tag on the frame if there are no service delimiting tags. Inner tag is the second tag before any service delimiting tags on egress but is dependent in the ingress configuration and may be set to 0 even in cases where additional tags are on the frame. This allows matching VLAN tags for explicit filtering or QoS setting when using default or null encapsulations.
The inner-tag is not applicable in ingress on dot1Q SAPs. The inner-tag may be populated on egress depending on the ingress SAP type.
On QinQ SAPs of null and default that do not strip tags inner-tag will contain the second tag (which is still the second tag carried transparently through the service.) On ingress SAPs that strip any tags, inner-tag will contain 0 even if there are more than 2 tags on the frame.
The optional vid-mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value and vid-mask) = = (tag and vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.
For QoS the VID type cannot be specified on the default QoS policy.
The default vid-mask is set to 4095 for exact match.
no inner-tag
This command provides a context to enable or disable the external BITS timing reference inputs to the central clock of the router. In redundant systems with BITS ports, there are two possible BITS-in interfaces, one for each CPM or CCM.
This command inserts the contents of the temporary buffer (populated by a previous copy or delete command) into the candidate configuration. The contents are inserted by default after the current edit point. Optional parameters allow the insertion after some other point of the candidate. The contents of the temporary buffer are deleted when the operator exits candidate edit mode.
Insertions are context-aware. The temporary buffer always stores the CLI context (such as the current CLI branch) for each line deleted or copied. If the lines to be inserted are supported at the context of the insertion point then the lines are simply inserted into the configuration. If the lines to be inserted are not supported at the context of the insertion point, then the context at the insertion point is first closed using multiple exit statements, the context of the lines to be inserted is built (added) into the candidate at the insertion point, then the lines themselves are added, the context of the inserted lines is closed using exit statements and finally the context from the original insertion point is built again leaving the context at the same point as it was before the insertion.
line, offset, first, edit-point, last | ||
line | absolute line number | |
offset | relative line number to current edit point. Prefixed with '+' or '-' | |
first | keyword - first line | |
edit-point | keyword - current edit point | |
last | keyword - last line that is not 'exit' |
This command specifies if the system always inserts an IPv6 fragment header, to indicate that the sender allows fragmentation.
The no form of the command does not allow the system to insert an IPv6 fragment header.
disabled
This command specifies whether the NAT64 node will insert IPv6 fragment header to IPv6 packets for which the DF bit is not set in the corresponding IPv4 packet, and is not already a fragment.
The no form of the command disables the insertion.
disabled
This command enables the context to configure NSH parameters in the steered traffic.
The no form of this command removes insert NSA parameters from the configuration.
This command specifies that the metadata to be inserted in NSH (with MD-Type set to 1) must contain a subscriber identifier that is derived from the subscriber string that comes from the AAA server (in Alc-Subsc-Id-Str VSA). The subscriber string is truncated after the first 16 bytes, and therefore, the first 16 bytes should be unique. The insert-subscriber-id and insert-subscriber-id commands are mutually exclusive.
The no form of this command reverts to the default.
This command enables the inclusion of the NAT inside service ID attributes.
The no form of the command excludes NAT inside service ID attributes.
no inside-service-id
When the best BGP route for an IPv4 or IPv6 prefix is matched by a policy entry or policy default action with this command, BGP attempts to find and install a pre-programmed backup path for the prefix in order to provide BGP fast reroute protection.
The install-backup-path command overrides and has no dependency on commands such as the BGP instance backup-path command or the VPRN-level enable-bgp-vpn-backup command, which enable BGP fast reroute for an entire address family. The install-backup-path command provides more precise control over which IP prefixes are supported with pre-programmed backup paths.
If, within a VPRN, the best path for an IP prefix is provided by a VPRN BGP route, the backup path can be provided by another VPRN BGP route or an imported VPN-IP route. If, within a VPRN, the best path for an IP prefix is provided by an imported VPN-IP route, the backup path can be provided by another VPN-IP route.
The install-backup-path command is supported only in BGP import policies and VRF import policies and has no effect on policy types other than BGP import policies and VRF import policies. The install-backup-path command applies only to the following types of matched routes: IPv4, IPv6, label-IPv4, label-IPv6, VPN-IPv4, and VPN-IPv6.
no install-backup-path
This command enables the context to configure dynamic services script debugging for a specific instance.
This command enables/disables the generation of script debugging for a specific instance
Monitor statistics for a VRRP instance.
The following output is an example of VRRP instance information.
The following output is an example of VRRP instance information for the 7750 SR and 7950 XRS.
This command configures the candidate path instance for the P2MP SR tree as primary or secondary, and the instance identifier.
The no form of this command removes the candidate path instance.
This command configures the instance ID for the P2MP SR tree replication segment entry.
The ID is a unique identifier for the P2MP LSP on the root. The combination of root ID, tree ID, and instance ID uniquely identifies a P2MP LSP throughout the network.
The no form of this command removes the instance.
This command enters the context to configure the instance entries of the candidate path.
Multiple path instances can exist in a candidate path for the P2MP SR tree. Each path instance is a P2MP LSP and has an instance ID. Path instances can be used for global optimization of the active candidate path.
This command enables PIM to send an instant prune echo when the router starts the prune pending timer for a group on the interface. All downstream routers will see the prune message immediately, and can send a join override if they are interested in receiving the group. Configuring instant-prune-echo is recommended on broadcast interfaces with more than one PIM neighbor to optimize multicast convergence.
The no form of this command disables instant Prune Echo on the PIM interface.
no instant-prune-echo
This command enables PIM to send an instant prune echo when the router starts the prune pending timer for a group on the interface. All downstream routers will see the prune message immediately, and can send a join override if they are interested in receiving the group. Configuring instant-prune-echo is recommended on broadcast interfaces with more than one PIM neighbor to optimize multicast convergence.
The no form of this command disables instant Prune Echo on the PIM interface.
no instant-prune-echo
This command configures an intermediate destination identifier applicable to ESM PW SAPs.
The no form of the command removes the intermediate destination identifier from the configuration.
no int-dest-id
This command configures an intermediate destination identifier applicable to ESM PW SAPs.
This command enables the context to configure inter-chassis redundancy parameters.
This command specifies the intermediate destination identifier which is encoded in the identification strings.
The no form of this command returns to the default.
This command specifies to which intermediate destination (for example a DSLAM) this host belongs.
The no form of this command reverts to the default.
This command enables mobility within different VLANs of the same range. When enabled, mobility between different VLANs in a single vlan-range is allowed for the configured mobility triggers.
The no form of this command disables mobility between VLANs.
This command enables RADIUS interactive authentication for the system. Enabling interactive-authentication forces RADIUS to fall into challenge/response mode.
no interactive-authentication
This configuration instructs the SROS to send no username nor password in the TACACS+ start message, and to display the server_msg in the GETUSER and GETPASS response from the TACACS+ server. Interactive authentication can be used to support a One Time Password scheme (such as an S/Key). An example flow (such as with a telnet connection) is as follows:
When interactive-authentication is disabled the SROS will send the username and password in the tacplus start message. An example flow (e.g. with a telnet connection) is as follows:
When interactive-authentication is enabled, tacplus must be the first method specified in the authentication-order configuration.
no interactive-authentication
This command enables RADIUS interactive authentication for the system. Enabling interactive-authentication forces RADIUS to fall into challenge/response mode.
no interactive-authentication
This configuration instructs the SROS to send no username nor password in the TACACS+ start message, and to display the server_msg in the GETUSER and GETPASS response from the TACACS+ server. Interactive authentication can be used to support a One Time Password scheme (e.g. S/Key). An example flow (e.g. with a telnet connection) is as follows:
When interactive-authentication is disabled the SROS sends the username and password in the tacplus start message. An example flow (e.g. with a telnet connection) is as follows:
When interactive-authentication is enabled, tacplus must be the first method specified in the authentication-order configuration.
no interactive-authentication
This command configures the intercept-id that is inserted into the packet header for all mirrored packets of the associated li-source entry. This intercept-id can be used (for example by a downstream LI gateway) to identify the particular LI session to which the packet belongs.
For nat mirroring (a nat li-source entry type), when the mirror service is not configured with any routable encap (for example, no ip-udp-shim or ip-gre configured under config>mirror>mirror-dest>encap), the presence of a configured intercept-id against an li-source (nat) entry will cause the insertion of the intercept-id after a configurable mac-da, mac-sa and etype (configured under li-source>nat>ethernet-header), at the front of each packet mirrored for that particular li-source entry. If there is no intercept-id configured (for a nat entry using a mirror service without routable encap), then a configurable mac-da and mac-sa are added to the front of the packets (but no intercept-id). In both cases a non-configurable etype is also added immediately before the mirrored customer packet. Note that routable encapsulation configured in the mirror-dest takes precedence over the ethernet-header configuration in the li-source nat entries. If routable encapsulation is configured, then the ethernet-header config is ignored and no mac header is added to the packet (the encap is determined by the mirror-dest in this case).
For all types of li-source entries (filter, nat, sap, subscriber), when the mirror service is configured with ip-udp-shim routable encap, an intercept-id field (as part of the routable encap) is always present in the mirrored packets. If there is no intercept ID configured for an li-source entry, then the default value will be inserted. When the mirror service is configured with ip-gre routable encap, no intercept-id is inserted and none should be specified against the li-source entries.
The no form of this command removes the value from the configuration.
no intercept-id (an id of 0, or no id)
This command configures the intercept-id inserted in the packet header for all mirrored packets of the associated li-source. When the mirror service is configured with the ip-udp-shim routable encapsulation, the intercept-id field (as part of the routable encap) is always present in the mirrored packets. The intercept ID can be used by the LIG to identify a particular LI session to which the packet belongs.
This command links the G.8032 sub-ring to a ring instance or to a VPLS instance. The ring instance must be a complete ring with two paths but may itself be a sub-ring or a major ring (declared by its configuration on another node).
When the interconnection is to another node, the sub-ring may have a virtual link or a non-virtual-link.
The no form of this command removes the interconnect node.
no interconnect
This command specifies the interface where IPoE sessions are terminated.
The no version of this command disables the parameter.
This command configures the interface where PPP sessions are terminated.
The no form of this command reverts to the default.
This command enables the context to configure interface parameters.
This command creates a logical IP routing interface. Once created, attributes like an IP address and service access point (SAP) can be associated with the IP interface.
The interface command, under the context of services, is used to create and maintain IP routing interfaces within service IDs. The interface command can be executed in the context of a service ID. The IP interface created is associated with the service core network routing instance and default routing table. The typical use for IP interfaces created in this manner is for subscriber Internet access. An IP address cannot be assigned to an IES interface. Multiple SAPs can be assigned to a single group interface.
Interface names are case sensitive and must be unique within the group of defined IP interfaces defined for config>router>interface, config>service>ies>interface and config>service>vprn>interface (that is, the network core router instance). Interface names must not be in the dotted decimal notation of an IP address. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either interface names or the IP addresses. Use unique IP address values and IP address names to maintain clarity. It could be unclear to the user if the same IP address and IP address name values are used. Although not recommended, duplicate interface names can exist in different router instances.
The available IP address space for local subnets and routes is controlled with the config router service-prefix command. The service-prefix command administers the allowed subnets that can be defined on IP interfaces. It also controls the prefixes that may be learned or statically defined with the IP interface as the egress interface. This allows segmenting the IP address space into config router and config service domains.
When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.
By default, there are no default IP interface names defined within the system. All IP interfaces must be explicitly defined. Interfaces are created in an enabled state.
The no form of this command removes IP the interface and all the associated configuration. The interface must be administratively shut down before issuing the no interface command.
The IP interface must be shut down before the SAP on that interface may be removed. IES and VPRN services do not have the shutdown command in the SAP CLI context. The service SAPs rely on the interface status to enable and disable them.
If ip-int-name already exists within the service ID, the context will be changed to maintain that IP interface. If ip-int-name already exists within another service ID or is an IP interface defined within the config router commands, an error will occur and context will not be changed to that IP interface. If ip-int-name does not exist, the interface is created and context is changed to that interface for further command processing.
This command enables the context to configure an IGMP interface. The interface is a local identifier of the network interface on which reception of the specified multicast address is to be enabled or disabled.
The no form of the command deletes the IGMP interface. The shutdown command in the config>router>igmp>interface context can be used to disable an interface without removing the configuration for the interface.
no interface
If the IP interface name does not exist or does not have an IP address configured an error message will be returned.
If the IP interface exists in a different area it will be moved to this area.
This command enables the context to configure an Multicast Listener Discovery (MLD) interface. The interface is a local identifier of the network interface on which reception of the specified multicast address is to be enabled or disabled.
The no form of this command deletes the MLD interface. The shutdown command in the config>router>mld>interface context can be used to disable an interface without removing the configuration for the interface.
no interface — No interfaces are defined.
If the IP interface name does not exist or does not have an IP address configured an error message will be returned.
If the IP interface exists in a different area it will be moved to this area.
This command activates GTP termination on the specified interface.
The no form of this command disables GTP termination on the specified interface, if there are no active sessions associated with the interface.
This command specifies the name of the IP interface used for the inband control connection.
If an interface name is not configured, the ring cannot become operational.
The no form of this command reverts to the default.
This command configures the IP interface the RADIUS-proxy server will bind to. One RADIUS-proxy server could bind to multiple interfaces.
This command configures the interface from which PFCP messages are sent and on which PFCP messages are received.
The no form of this command removes the interface.
no interface
This command creates a logical IP routing interface for a VPLS service. Once created, attributes such as IP address and service access points (SAP) can be associated with the IP interface.
The interface command, under the context of services, is used to create and maintain IP routing interfaces within the VPLS service IDs. The IP interface created is associated with the VPLS management routing instance. This instance does not support routing.
Interface names are case-sensitive and must be unique within the group of defined IP interfaces defined for the network core router instance. Interface names in the dotted decimal notation of an IP address are not allowed. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either interface names or the IP addresses. Use unique IP address values and IP address names to maintain clarity. Duplicate interface names can exist in different router instances.
Enter a new name to create a logical router interface. When an existing interface name is entered, the user enters the router interface context for editing and configuration.
By default, no default IP interface names are defined within the system. All VPLS IP interfaces must be explicitly defined in an enabled state.
The no form of this command removes the IP interface and the entire associated configuration. The interface must be administratively shutdown before issuing the no interface command.
For VPLS services, the IP interface must be shutdown before the SAP on that interface is removed.
For VPLS service, ping and traceroute are the only applications supported.
An interface name:
If ip-int-name already exists within the service ID, the context changes to maintain that IP interface. If ip-int-name already exists within another service ID, an error occurs and the context does not change to that IP interface. If ip-int-name does not exist, the interface is created and the context is changed to that interface for further command processing.
This command enables debugging for IGMP interfaces.
The no form of this command disables the IGMP interface debugging for the specifies interface name or IP address.
This command enters the context to configure interface parameters.
This command creates the context to configure an IS-IS interface.
When an area is defined, the interfaces belong to that area. Interfaces cannot belong to separate areas.
When the interface is a POS channel, the OSI Network Layer Control Protocol (OSINLCP) is enabled when the interface is created and removed when the interface is deleted.
The no form of this command removes IS-IS from the interface.
The shutdown command in the config>router>isis>if context administratively disables IS-IS on the interface without affecting the IS-IS configuration.
no interface — No IS-IS interfaces are defined.
This command enters the context to configure an Multicast Listener Discovery (MLD) interface. The interface is a local identifier of the network interface on which reception of the specified multicast address is to be enabled or disabled.
The no form of this command deletes the MLD interface. The shutdown command in the config>router>mld>if context can be used to disable an interface without removing the configuration for the interface.
no interface
If the IP interface name does not exist or does not have an IP address configured an error message will be returned.
If the IP interface exists in a different area it will be moved to this area.
This command creates a context to configure an OSPF interface.
The no form of this command deletes the OSPF interface configuration for this interface. The shutdown command in the config>router>ospf>if context can be used to disable an interface without removing the configuration for the interface.
no interface
If the IP interface name does not exist or does not have an IP address configured an error message will be returned.
If the IP interface exists in a different area it will be moved to this area.
This command enables PIM on an interface and enables the context to configure interface-specific parameters. By default interfaces are activated in PIM based on the apply-to command, and do not have to be configured on an individual basis unless the default values must be changed.
The no form of this command deletes the PIM interface configuration for this interface. If the apply-to command parameter is configured, then the no interface form must be saved in the configuration to avoid automatic (re)creation after the next apply-to is executed as part of a reboot.
The shutdown command can be used to disable an interface without removing the configuration for the interface.
Interfaces are activated in PIM based on the apply-to command.
This command configures router advertisement properties on a specific interface. The interface must already exist in the config>router>if context.
No interfaces are configured by default.
This command enables LDP on the specified IP interface.
The no form of the command deletes the LDP interface and all configuration information associated with the LDP interface.
The LDP interface must be disabled using the shutdown command before it can be deleted.
The user can configure different parameters for IPv4 and IPv6 LDP interfaces by entering ipv4 or ipv6 as the next command.
The following are some of the key points for this keyword:
Use this command for debugging an LDP interface.
This command allows the operator to manually enter the SRLG membership information for any link in the network, including links on this node, into the user SRLG database.
An interface can be associated with up to five SRLG groups for each execution of this command. The operator can associate an interface with up to 64 SRLG groups by executing the command multiple times.
CSPF will not use entered SRLG membership if an interface is not validated as part of a router ID in the routing table.
The no form of this command deletes a specific interface entry in this user SRLG database. The group-name must already exist in the config>router>if-attribute>srlg-group context.
This command specifies MPLS protocol support on an IP interface. No MPLS commands are executed on an IP interface where MPLS is not enabled. An MPLS interface must be explicitly enabled (no shutdown).
The no form of this command deletes all MPLS commands such as label-map which are defined under the interface. The MPLS interface must be shutdown first in order to delete the interface definition. If the interface is not shutdown, the no interface ip-int-name command does nothing except issue a warning message on the console indicating that the interface is administratively up.
shutdown
This command enables RSVP protocol support on an IP interface. No RSVP commands are executed on an IP interface where RSVP is not enabled.
The no form of this command deletes all RSVP commands such as hello-interval and subscription, which are defined for the interface. The RSVP interface must be shutdown it can be deleted. If the interface is not shut down, the no interface ip-int-name command does nothing except issue a warning message on the console indicating that the interface is administratively up.
shutdown
This command enables debugging for PIM interface information.
The no form of this command disables PIM interface debugging.
This command creates a PIM interface.
Interface names are case-sensitive and must be unique within the group of defined IP interfaces defined for config>router>interface, config>service>ies>interface, and config>service>ies>subscriber-interface>group-interface. Interface names must not be in the dotted decimal notation of an IP address. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either the interface names or the IP addresses. Ambiguity can exist if an IP address is used as an IP address and an interface name. Duplicate interface names can exist in different router instances, although this is not recommended because it may be confusing.
By default, no interfaces or names are defined within PIM.
The no form of this command removes the IP interface and all the associated configurations.
If the ip-int-name already exists, the context is changed to maintain that IP interface. If ip-int-name does not exist, the interface is created and the context is changed to that interface for further command processing.
This command creates a logical IP routing or unnumbered MPLS-TP interface. Once created, attributes like IP address, port, or system can be associated with the IP interface.
Interface names are case-sensitive and must be unique within the group of IP interfaces defined for config router interface and config service ies interface. Interface names must not be in the dotted decimal notation of an IP address.; for example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either the interface names or the IP addresses. Ambiguity can exist if an IP address is used as an IP address and an interface name. Duplicate interface names can exist in different router instances, although this is not recommended because it is confusing.
When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.
Although not a keyword, the ip-int-name “system” is associated with the network entity (such as a specific router), not a specific interface. The system interface is also referred to as the loopback address.
An unnumbered MPLS-TP interface is a special type of interface that is only intended for MPLS-TP LSPs. IP routing protocols are blocked on interfaces of this type. If an interface is configured as unnumbered-mpls-tp, then it can only be associated with an Ethernet port or VLAN, using the port command, then either a unicast, multicast, or broadcast remote MAC address may be configured. Only static ARP is supported.
A GMPLS loopback interface is a special type of loopback interface that is used as the IP interface for a GMPLS IP Control Channel (IPCC). RSVP and LMP packets associated with GMPLS are associated with this loopback interface. All other IP protocols are blocked on this interface. One gmpls-loopback interface is required for each GMPLS peer node.
The control-tunnel parameter creates a loopback interface representing a GRE tunnel. One IP tunnel can be created in this interface.
Only the primary IPv4 interface address and only one IP tunnel per interface are allowed. Multiple tunnels can be configured using up to four controlTunnel loopback interfaces. A static route can take the new controlTunnel interface as a next hop.
The no form of this command removes the IP interface and all the associated configurations. The interface must be administratively shut down before issuing the no interface command.
This command configures router advertisement properties on a specific interface. The interface must already exist in the config>router>if context.
This command associates an interface.
The no form of this command reverts to the default value.
This command displays the router IP interface table sorted by interface index.
ipv4-address | a.b.c.d (host bits must be 0) |
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x: [0 to FFFF]H | |
d: [0 to 255]D |
This command displays statistics for MPLS interfaces at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the MPLS interface(s). The subsequent statistical information listed for each interval is displayed as a delta to the previous display. When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
The following output is an example of MPLS interface information.
This command displays statistics for OSPF interfaces at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the OSPF interface(s). The subsequent statistical information listed for each interval is displayed as a delta to the previous display.
When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
The following output is an example of OSPF interface information.
This command displays statistics for RSVP interfaces at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the RSVP interface(s). The subsequent statistical information listed for each interval is displayed as a delta to the previous display. When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
This command creates the context to configure an IS-IS interface.
When an area is defined, the interfaces belong to that area. Interfaces cannot belong to separate areas.
When the interface is a POS channel, the OSINLCP is enabled when the interface is created and removed when the interface is deleted.
The no form of this command removes IS-IS from the interface.
The shutdown command in the config>router>isis>interface context administratively disables IS-IS on the interface without affecting the IS-IS configuration.
This command enables debugging for IS-IS interface.
The no form of the command disables debugging.
This command creates a context to configure an OSPF interface.
By default, interfaces are not activated in any interior gateway protocol, such as OSPF, unless explicitly configured.
The no form of this command deletes the OSPF interface configuration for this interface. The shutdown command in the config>router>ospf>interface context can be used to disable an interface without removing the configuration for the interface.
no interface
If the IP interface name does not exist or does not have an IP address configured an error message will be returned.
If the IP interface exists in a different area it will be moved to this area.
This command enables debugging for an OSPF and OSPF3 interface.
This command specifies the router interface, specified either by name or address, as a filter criterion.
The no form of this command removes the criterion from the configuration.
no interface
This command disables cflowd sampling for packets matching this filter entry, for the IP interface set to cflowd interface mode. This allows the option to not sample specific types of traffic when interface sampling is enabled.
If the cflowd is either not enabled or set to cflowd acl mode, this command is ignored.
The no form of this command enables sampling.
no interface-disable-sample
This command creates an interface group handler that can be associated with a number of independent IP links. The purpose of the group is to operationally disable all interfaces in a common group if the number of active links drops below the minimum interface threshold.
The no form of this command deletes the interface group handler. All members must be removed before the IGH can be deleted.
This command enables the sending of interface ID options in the DHCPv6 relay packet.
The no form of this command disables the sending of interface ID options in the DHCPv6 relay packet.
This command enables the sending of interface ID options in the DHCPv6 relay packet.
The no form of this command disables the sending of interface ID options in the DHCPv6 relay packet.
This command enables the behavior where unique /64 prefix is allocated per interface-id, and all clients having the same interface-id get an address allocated out of this /64 prefix for DHCP6. This is relevant for bridged clients behind the same local-loop (and same SAP), where sharing the same prefix allows communication between bridged clients behind the same local-loop to stay local. For SLAAC based assignment, downstream neighbor-discovery is automatically enabled to resolve the assigned address.
The no form of this command reverts to the default.
This command enables the context allowing the administrator to specify which interface’s flow data should be exported to the associated collector.
Table 69 describes the cflowd export filter precedence.
Family Filter | Router Filter | Interface Filter | Export to Collector |
0 | 0 | 0 | export all |
0 | 0 | 1 | export if matched interface only |
0 | 1 | 0 | export if matched router only |
0 | 1 | 1 | export if router match *OR* interface match |
1 | 0 | 0 | not exported due to family exclusion filter |
1 | 0 | 1 | not exported due to family exclusion filter |
1 | 1 | 0 | not exported due to family exclusion filter |
1 | 1 | 1 | not exported due to family exclusion filter |
This command enables the context to configure LDP interfaces and parameters applied to LDP interfaces. The user can configure different default parameters for IPv4 and IPv6 LDP interfaces by entering ipv4 or ipv6 as the next command.
This command enables and disables the generation of AIS PDUs based on the associated endpoint state.
This command enables the AIS function to consider the operational state of the entity on which it is configured. With this command, ETH-AIS on DOWN MEPs are triggered and cleared based on the operational status of the entity on which it is configured. If CCM is also enabled, then transmission of the AIS PDU is based on either the non-operational state of the entity or on any CCM defect condition. AIS generation ceases if both the operational state is UP and the CCM has no defect conditions. If the MEP is not CCM-enabled then the operational state of the entity is the only consideration, assuming this command is present for the MEP. By default, AIS is not generated or stopped based on the state of the entity on which the DOWN MEP is configured.
The no form of this command disables the AIS function to consider the operational state of the entity on which it is configured.
no interface-support-enabled
This command enables the AIS function to consider the operational state of the entity on which it is configured. With this command, ETH-AIS on DOWN MEPs will be triggered and cleared based on the operational status of the entity on which it is configured. If CCM is also enabled then transmission of the AIS PDU will be based on either the non-operational state of the entity or on any CCM defect condition. AIS generation will cease if BOTH operational state is UP and CCM has no defect conditions. If the MEP is not CCM enabled then the operational state of the entity is the only consideration assuming this command is present for the MEP.
no interface-support-enable (AIS will not be generated or stopped based on the state of the entity on which the DOWN MEP is configured).
This command enables the AIS function to consider the operational state of the entity on which it is configured. With this command, ETH-AIS on DOWN MEPs will be triggered and cleared based on the operational status of the entity on which it is configured. If CCM is also enabled then transmission of the AIS PDU will be based on either the non-operational state of the entity or on ANY CCM defect condition. AIS generation will cease if BOTH operational state is UP and CCM has no defect conditions. If the MEP is not CCM enabled then the operational state of the entity is the only consideration assuming this command is present for the MEP.
The no form of this command means that AIS will not be generated or stopped based on the state of the entity on which the DOWN MEP is configured.
no interface-support-enable
This command specifies the interface applicable for communications to the peer. If the interface type does not match the given context in an uplink context, the peer setup will fail.
The no form of this command reverts to the default value.
interface-type s2a
This command configures the IS-IS interface type as either broadcast or point-to-point.
Use this command to set the interface type of an Ethernet link to point-to-point to avoid having to carry the designated IS-IS overhead if the link is used as a point-to-point.
If the interface type is not known at the time the interface is added to IS-IS and subsequently the IP interface is bound (or moved) to a different interface type, then this command must be entered manually.
The no form of this command reverts to the default value.
point-to-point — For IP interfaces on SONET channels.
broadcast — For IP interfaces on Ethernet or unknown type physical interfaces.
This command configures the interface type to be one of broadcast, point-to-point, or non-broadcast.
Use this command to set the interface type of an Ethernet link to point-to-point to avoid having to carry the broadcast adjacency maintenance overhead if the Ethernet link provided the link is used as a point-to-point.
If the interface type is not known at the time the interface is added to OSPF and subsequently the IP interface is bound (or moved) to a different interface type, this command must be entered manually.
The no form of this command reverts to the default value.
point-to-point — If the physical interface is SONET.
broadcast — If the physical interface is Ethernet or unknown.
This command configures the Building Integrated Timing Source (BITS) timing reference.
The no form of the command reverts to the default configuration.
interface-type ds1 esf
This command configures the IS-IS interface type as either broadcast or point-to-point.
Use this command to set the interface type of an Ethernet link to point-to-point to avoid having to carry the designated IS-IS overhead if the link is used as a point-to-point.
If the interface type is not known at the time the interface is added to IS-IS and subsequently the IP interface is bound (or moved) to a different interface type, then this command must be entered manually.
The no form of this command reverts to the default value.
interface-type point-to-point — For IP interfaces on SONET channels.
interface-type broadcast — For IP interfaces on Ethernet or unknown type physical interfaces.
This command configures the interface type to be one of broadcast, point-to-point, or non-broadcast.
Use this command to set the interface type of an Ethernet link to point-to-point to avoid having to carry the broadcast adjacency maintenance overhead of the Ethernet link provided the link is used as point-to-point.
If the interface type is not known at the time the interface is added to OSPF and subsequently the IP interface is bound (or moved) to a different interface type, this command must be entered manually.
The no form of this command returns the setting to the default value.
interface-type point-to-point (if the physical interface is SONET)
interface-type broadcast (if the physical interface is Ethernet or unknown)
This command enables the context to configure interim credit parameters for Extended Failure Handling (EFH).
This command enables the inclusion of counters with a hold-down time option in mobility-triggered interim-updates. When enabled, to disable the inclusion of counters, interim updates must be disabled and then re-enabled without the include-counters keyword. By default, the hold-down time is not imposed.
The no form of this command disables generation of flash interim accounting updates to RADIUS when change in location of the UE is detected.
no interim-update
This command configures the interim update interval.
The no form of this command reverts to the default.
no interim-update-interval
This command is applicable only to LNS. Interleaving is supported only on MLPPPoX bundles that contain a single member link. If more than one link is present in the MLPPPoX bundle, interleaving is automatically disabled and a TRAP/log (tmnxMlpppBundleIndicatorsChange) is generated.
The minimum supported rate of the link on which interleaving is performed is 1 kb/s.
If configured at this level, interleaving is enabled on all tunnels within the group, unless it is explicitly disable per tunnel.
The no form of this command reverts to the default.
This command configures the user of link fragmentation and interleaving and is applicable only to LNS. Interleaving is supported only on MLPPPoX bundles that contain a single member link. If more than one link is present in the MLPPPoX bundle, interleaving is automatically disabled and a TRAP/log (tmnxMlpppBundleIndicatorsChange) is generated.
The minimum supported rate of the link on which interleaving is performed is 1 kb/s.
Interleaving configured on this level overwrites the configuration option under the group hierarchy. If the no form of this command is configured for interleaving at this level, the interleaving configuration inherits the configuration option configured under the L2TP group.
The no form of this command reverts to the default.
This command is applicable only to LNS. Interleaving is supported only on MLPPPoX bundles that contain a single member link. If more than one link is present in the MLPPPoX bundle, interleaving will be automatically disabled and a TRAP/log (tmnxMlpppBundleIndicatorsChange ) will be generated.
The minimum supported rate of the link on which interleaving is performed is 1 kb/s.
Interleaving configured on this level overwrites the configuration option under the group hierarchy. If the no form of the command is configured for interleaving at this level, the interleaving configuration will inherit the configuration option configured under the l2tp group.
no interleave
This command enables interleaving of high priority frames and low priority frame fragments within a FR SAP using FRF.12 end-to-end fragmentation.
When this option is enabled, only frames of the FR SAP non-expedited forwarding class queues are subject to fragmentation. The frames of the FR SAP expedited queues are interleaved, with no fragmentation header, among the fragmented frames. In effect, this provides a behavior like in MLPPP Link Fragment Interleaving (LFI).
When this option is disabled, frames of all the FR SAP forwarding class queues are subject to fragmentation. The fragmentation header is however not included when the frame size is smaller than the user configured fragmentation size. In this mode, the SAP transmits all fragments of a frame before sending the next full or fragmented frame.
The receive direction of the FR SAP supports both modes of operation concurrently, with and without fragment interleaving.
The no form of this command restores the default mode of operation.
no interleave
This command enables interleaving of high priority frames and low priority frame fragments within a FR SAP using FRF.12 end-to-end fragmentation.
When this option is enabled, only frames of the FR SAP non-expedited forwarding class queues are subject to fragmentation. The frames of the FR SAP expedited queues are interleaved, with no fragmentation header, among the fragmented frames. In effect, this provides a behavior like in MLPPP Link Fragment Interleaving (LFI).
When this option is disabled, frames of all the FR SAP forwarding class queues are subject to fragmentation. The fragmentation header is however not included when the frame size is smaller than the user configured fragmentation size. In this mode, the SAP transmits all fragments of a frame before sending the next full or fragmented frame.
The receive direction of the FR SAP supports both modes of operation concurrently, with and without fragment interleaving.
The no form of this command restores the default mode of operation.
no interleave
This command enables interleaving of high priority frames and low-priority frame fragments within a FR SAP using FRF.12 end-to-end fragmentation.
When this option is enabled, only frames of the FR SAP non expedited forwarding class queues are subject to fragmentation. The frames of the FR SAP expedited queues are interleaved, with no fragmentation header, among the fragmented frames. In effect, this provides a behavior like in MLPPP Link Fragment Interleaving (LFI).
When this option is disabled, frames of all the FR SAP forwarding class queues are subject to fragmentation. The fragmentation header is however not included when the frame size is smaller than the user configured fragmentation size. In this mode, the SAP transmits all fragments of a frame before sending the next full or fragmented frame.
The receive direction of the FR SAP supports both modes of operation concurrently, with and without fragment interleaving.
The no form of this command restores the default mode of operation.
no interleave
This command enables interleaving of high priority frames and low-priority frame fragments within a FR SAP using FRF.12 end-to-end fragmentation.
When this option is enabled, only frames of the FR SAP non expedited forwarding class queues are subject to fragmentation. The frames of the FR SAP expedited queues are interleaved, with no fragmentation header, among the fragmented frames. In effect, this provides a behavior like in MLPPP Link Fragment Interleaving (LFI).
When this option is disabled, frames of all the FR SAP forwarding class queues are subject to fragmentation. The fragmentation header is however not included when the frame size is smaller than the user configured fragmentation size. In this mode, the SAP transmits all fragments of a frame before sending the next full or fragmented frame.
The receive direction of the FR SAP supports both modes of operation concurrently, with and without fragment interleaving.
The no form of this command restores the default mode of operation.
no interleave
This command enables Link Fragmentation and Interleaving on the multilink bundle.
The no form of this command disables Link Fragmentation and Interleaving on the multilink bundle.
This command will return IPv4 address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
no internal-ip4-address
This command will return IPv4 DNS server address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
no internal-ip4-dns
This command will return IPv4 netmask from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
no internal-ip4-netmask
This command will return IPv6 address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
no internal-ip6-address
This command will return IPv6 DNS server address from source (RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
no internal-ip6-dns
This command enables the server to hold up the lease of local IPsec clients.
The no form of this command disables the ability of the server to hold up the lease of local IPsec clients.
This command specifies the internal scheduler (tier 0) weight mode for all ingress queues on a LAG on the card on which it is applied.
internal-scheduler-weight-mode default
This command specifies the internal scheduler (tier 0) weight mode for the queues on a LAG on which the advanced configuration policy is applied.
internal-scheduler-weight-mode default
This command specifies whether to use inter-site shared C-trees or not. Optional parameters allow enabling additional inter-site shared functionality. Not specifying an optional parameter when executing the command disables that parameter.
n/a
This command specifies the interval at which CCR-T messages for Diameter Gx or Gy sessions that belong to the Diameter application policy are replayed, until a valid CCA-t response is received or until the configured max-lifetime period expires.
The no form of this command resets the interval to the default setting.
interval 3600
This command specifies the polling interval of the ring-node connectivity verification of this ring node.
The no form of this command reverts to the default.
interval 5
This command specifies the time interval which all known sources should be verified. The actual rate is dependent on the number of known hosts and intervals.
The no form of this command reverts to the default.
interval 30 minutes
This command specifies the intervals at which the test account will send its access requests to probe the RADIUS servers.
interval 3
This command configures the interval between successive, successful heartbeats.
interval 60
This command specifies the transmission interval of AIS messages in seconds.
The no form of this command reverts to the default values.
This command specifies the polling interval of the ring-node connectivity verification of this ring node.
interval 5
This command controls the frequency of subsequent MAC notification messages.
This command specifies the transmission interval of AIS messages in seconds.
This command controls the frequency of subsequent MAC notification messages.
By default, this command inherits the chassis level configuration from config>service>mac-notification.
This command specifies the transmission interval of AIS messages in seconds.
This optional parameter specifies the interval between ICMP pings to the target IP address.
interval 1
This command configures the interval at which LSP Self Ping packets are periodically sent on a candidate path of an RSVP LSP. This value is used for all LSPs that have LSP Self Ping enabled.
The no form of this command reverts to the default value.
interval 1
This command configures the minimum interval in between notification messages. It can be set to one-time or a value in minutes from 1 to 1440.
The no form of this command removes the interval from the http-notification policy.
interval one-time
This command configures the maximum interval during which messages can be sent.
This command configures the frequency of the LDP ECMP OAM path discovery. Every interval, the node sends LSP trace messages to attempt to discover the entire ECMP path tree for a given destination FEC.
The no form of this command removes the value from the configuration.
no interval
This command configures the packet transmit interval used when the interface is operational and possibly transitioning from up to down, but not down to up, because of the ping-template function.
The no form of this command reverts to the default value.
interval 60
This command configures the frequency of the LSP Ping messages used in the path probing phase to probe the paths of all LDP FECs discovered by the LDP tree trace path discovery.
The no form of this command resets the interval to its default value.
no interval
This command configures the number of seconds to override the default request message send interval and defines the minimum amount of time that must expire before the next message request is sent.
The no form of this command reverts to the default value.
interval 1
This command defines the message period or probe spacing for the transmission of the DMM or LMM frame.
The no form of this command sets the interval to the default. If an LMM test is in no shutdown state, it always has timing parameters, whether default or operator configured.
This command defines the message period, or probe spacing, for transmitting a TWAMP Light frame.
The no form of this command sets the interval to the default value.
interval 1000
This command defines the message period, or probe spacing, to transmit a DM frame.
The no form of this command sets the interval to the default value.
This command specifies the amount of time, in seconds, between consecutive requests sent to the far end host.
interval 1
This optional parameter specifies the interval between ICMP pings to the target IP address.
interval 1
This command configures the number of seconds between host unreachable priority event ICMP echo request messages directed to the host IP address.
The no form of the command reverts to the default value.
interval 1
This command specifies the interval between runs of an event.
no interval
This command configures the amount of time, in seconds, between successive TCP keepalive probes sent by the router.
interval 15
This command defines the number of completed measurement intervals per session to be stored in volatile system memory. The entire block of memory is allocated for the measurement interval when the test is active (no shutdown) to ensure memory is available. The numbers are increasing from 1 to the configured value + 1. The active pm data is stored in the interval number 1 and older runs are stored, in order, to the upper most number with the oldest rolling off when the number of completed measurement intervals exceeds the configured value+1. As new test measurement intervals complete for the session, the stored intervals are renumbered to maintain the described order. Use caution when setting this value. There must be a balance between completed runs stored in volatile memory and the use of the write-to-flash function of the accounting policy.
The 5-mins and 15-mins measurement intervals share the same (1 to 96) retention pool. In the event that both intervals are required, the sum total of both intervals cannot exceed 96. The 1-hour and 1-day measurement intervals utilize their own ranges.
If this command is omitted when configuring the measurement interval, the default value is used.
The no form of the command reverts to the default.
intervals-stored 1
This command specifies the interworking function that should be applied for packets that ingress or egress SAPs that are part of an Apipe service.
Interworking must be configured before adding a Frame-Relay SAP to an Apipe service. Interworking is applicable only when the two endpoints (that is, the two SAPs or the SAP and the spoke SDP) are of different types. Also, there are limitations on the combinations of SAP type, vc-type, and interworking values as shown in Table 70.
SAP Type | Allowed VC-Type Value | Allowed Interworking Value |
ATM VC | atm-vcc, atm-sdu | — |
fr-dlci | ||
FR DLCI | fr-dlci | — |
atm-sdu | frf-5 |
This command causes all data bits to be inverted, to guarantee ones density. Typically used with AMI line encoding.
no invert-data
This command designates the specified IOM as a WLAN-GW IOM. Each WLAN-GW IOM must be provisioned with two ISA-BB modules on a hardware chassis and with an ISA-BB module in the first MDA slot in the VSR.
The no form of this command removes the IOM from the configuration.
This command reports MPLS debug events originating from the XMA.
The no form of the command disables the debugging.
This command relates to a system configured for Dual Homing in L2-TPSDA. It defines the IP address used when the system sends out a gratuitous ARP on an active SAP after a ring heals or fails in order to attract traffic from subscribers on the ring with connectivity to that SAP.
The no form of this command reverts to the default.
no ip
This command associates an existing IP filter policy with the template.
This command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic).
This command associates an existing IP filter policy with the template.
This command associates an existing IP filter policy with the template.
This command displays ARP host events for a particular IP address.
This command displays Subscriber Host Connectivity Verification (SHCV) events for a particular IP address.
This command configures the /32 IP address for a static transit aa-sub.
The no form of this command deletes the ip address assigned to the static transit aa-sub from the configuration.
ipv6-address/prefix: | ipv6-address x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x [0 to FFFF]H | |
d [0 to 255]D | |
prefix-length /32 to /64 |
This command configures the source IPv4 address and destination IPv4 address to use in the IPv4 header part of the routable LI encapsulation.
This command enables the context to configure the IP-specific source and destination information, the priority, and the IP test tools on the launch point.
This command activates an IPv4 system filter policy. Once activated, all IPv4 ACL filter policies that chain to the system filter (config>filter>ip-filter>chain-to-system-filter) will automatically execute system filter policy rules first.
The no form of the command deactivates the system filter policy.
This command enables IP filter monitoring. The statistical information for the specified IP filter entry displays at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the specified IP filter. The subsequent statistical information listed for each interval is displayed as a delta to the previous display.
When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
The following output is an example of filter IP information.
This command configures debugging for IP.
This command displays monitor command statistics for IP filter entries.
This command monitors statistics for the MAF IP filter entry.
This command configures system-wide IP router parameters.
This command configures back-up IPv4 or IPv6 destination address for the sFlow agent to send sFlow datagrams to. Optionally a destination port can also be configured (by default port 6343 is used).
The no form of this command deletes backup sFlow receiver destination.
a.b.c.d | (IPv4) |
x:x:x:x:x:x:x:x | (IPv6) |
[x:x:x:x:x:x:x:x] | (IPv6) |
x - [0 to FFFF]H |
This command configures primary IPv4 or IPv6 destination address for the sFlow agent to send sFlow datagrams to. Optionally a destination port can also be configured (by default port 6343 is used).
The no form of this command deletes primary sFlow receiver destination.
a.b.c.d | (IPv4) |
x:x:x:x:x:x:x:x | (IPv6) |
[x:x:x:x:x:x:x:x] | (IPv6) |
x - [0..FFFF]H |
This command configures debugging on IP address 1.
This command configures debugging on IP address 2.
This command configures the IP address of the RADIUS server. Two RADIUS servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
no ip-address
This command enables the context to configure EVPN routes to be advertised to a BGP EVPN peer participating in service chaining.
This command enables matching on UEs in an IP-assigned state, meaning that the UE already has an IP assigned but it is not yet authorized. This usually only applies when auth-on-dhcp is not configured.
The no form of this command disables matching on UEs in an IP-assigned state, unless all state matching is disabled.
no ip-assigned
This command enables matching on UEs in an IP-assigned and authorized state, meaning that the UE already has an IP assigned and is authorized, but is not yet promoted to a final state such as ESM or DSM. This applies to UEs authenticated by distributed RADIUS proxy without auth-on-dhcp configured. UEs move to this state upon DHCP completion and continue to a more final state (such as DSM, ESM, or portal) upon receiving the first data packet.
The no form of this command disables matching on UEs in an IP-assigned and authorized state, unless all state matching is disabled.
no ip-assigned-authorized
This command configures the dns-ip-cache cache parameters.
This command includes the ip-can-type.
The no form of this command reverts to the default.
IP criteria-based SAP ingress or egress policies are used to select the appropriate ingress or egress queue or policer and corresponding forwarding class and packet profile for matched traffic.
This command is used to enter the context to create or edit policy entries that specify IP criteria such as IP quintuple lookup or DiffServ code point.
The software implementation will exit on the first match found and execute the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly from most to least explicit.
The no form of this command deletes all the entries specified under this node. When IP criteria entries are removed from a SAP ingress or egress policy, the IP criteria is removed from all services where that policy is applied.
IP criteria-based network ingress and egress policies are used to select the appropriate ingress or egress queue or policer, and the corresponding forwarding class and packet profile for matched traffic. This command is used to enter the context to create or edit policy entries that specify IP criteria such as IP quintuple lookup or DSCP.
The 7750 SROS implementation will exit on the first match found and execute the actions in accordance with the accompanying action command. Entries must be sequenced correctly from most to least explicit.
The ingress classification only applies to the outer IP header of non-tunneled traffic. The only exception is for traffic received on a Draft Rosen tunnel, for which only classification on the outer IP header is supported.
Attempting to apply a network QoS policy containing an ip-criteria statement to any object except a network IP interface will result in an error.
The no form of this command deletes all entries specified under this node. When IP criteria entries are removed from a network policy, the IP criteria are removed from all network interfaces to which that policy is applied.
This command configures the IP exception filter for the secured interface. All ingress traffic matching by the specified filter bypasses IPsec processing.
The no form of this command removes the policy from the configuration.
no ip-exception
This command creates a configuration context for the specified IPv4 exception filter.
The no form of the command deletes the IPv4 exception filter.
This command associates an IP exception filter policy with an NGE-enabled router interface to allow packets matching the exception criteria to transit the NGE domain as clear text.
When an exception filter is added for inbound traffic, packets matching the criteria in the IP exception filter policy are allowed to be received in clear text even if an inbound key group is configured. If no inbound key group is configured, then associated inbound IP exception filter policies will be ignored.
When an exception filter is added for outbound traffic, packets matching the criteria in the IP exception filter policy are not encrypted when sent out of the router interface even if an outbound key group is configured. If no outbound key group is configured, then associated outbound IP exception filter policies will be ignored.
The no form of this command removes the IP exception filter policy from the specified direction.
no ip-exception direction inbound
no ip-exception direction outbound
This command enables IP Fast-Reroute (FRR) feature on the system.
This feature provides for the use of a Loop-Free Alternate (LFA) backup next-hop for forwarding in-transit and CPM generated IP packets when the primary next-hop is not available. IP FRR is supported on IPv4 and IPv6 OSPF/IS-IS prefixes forwarded in the base router instance to a network IP interface or to an IES SAP interface or spoke interface. It is also supported for VPRN VPN-IPv4 OSPF prefixes and VPN-IPv6 OSPF prefixes forwarded to a VPRN SAP interface or spoke interface.
IP FRR also provides a LFA backup next-hop for the destination prefix of a GRE tunnel used in an SDP or in VPRN auto-bind.
When any of the following events occurs, IGP instructs in the fast path on the XMAs to enable the LFA backup next-hop:
When the SPF computation determines there is more than one primary next-hop for a prefix, it will not program any LFA next-hop in RTM. Therefore, the IP prefix will resolve to the multiple equal-cost primary next-hops that provide the required protection.
The no form of this command disables the IP FRR feature on the system
no ip-fast-reroute
This command configures an egress or ingress IP filter.
The no form of this command reverts to the default.
This command enables mirroring of packets that match specific entries in an existing IP filter.
The ip-filter command directs packets which match the defined list of entry IDs to be mirrored to the mirror destination referenced by the mirror-dest-service-id of the mirror-source.
The IP filter must already exist in order for the command to execute. Filters are configured in the config>filter context. If the IP filter does not exist, an error will occur. If the filter exists but has not been associated with a SAP or IP interface, an error is not generated but mirroring will not be enabled (there are no packets to mirror). Once the IP filter is defined to a SAP or IP interface, mirroring is enabled.
If the IP filter is defined as ingress, only ingress packets are mirrored. Ingress mirrored packets are mirrored to the mirror destination prior to any ingress packet modifications.
If the IP filter is defined as egress, only egress packets are mirrored. Egress mirrored packets are mirrored to the mirror destination after all egress packet modifications.
An entry-id within an IP filter can only be mirrored to a single mirror destination. If the same entry-id is defined multiple times, an error occurs and only the first mirror-source definition is in effect.
By default, no packets matching any IP filters are mirrored. Mirroring of IP filter entries must be explicitly defined.
The no ip-filter command, without the entry keyword, removes mirroring on all entry-id’s within the ip-filter-id.
When the no command is executed with the entry keyword and one or more entry-id’s, mirroring of that list of entry-id’s is terminated within the ip-filter-id. If an entry-id is listed that does not exist, an error will occur and the command will not execute. If an entry-id is listed that is not currently being mirrored, no error will occur for that entry-id and the command will execute normally.
If an entry-id does not exist within the IP filter, an error occurs and the command will not execute.
If the filter’s entry-id is renumbered within the IP filter definition, the old entry-id is removed but the new entry-id must be manually added to the configuration to include the new (renumbered) entry’s criteria.
This command configures to which normal IPv4 address filters the entry reservation is applied.
This command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic).
The no form of this command removes the IPv4 filter ID from the configuration.
filter-id: | 1 to 65535 |
filter-name: | up to 64 characters (filter-name is an alias for input only. The filter-name gets replaced with an id automatically by SROS in the configuration). |
This command specifies the IP filter(s) into which the entries from the specified li-ip-filter are to be inserted. The li-ip-filter and ip-filter must already exist before the association is made. If the normal IP filter is deleted then the association is also removed (and not re-created if the IP filter comes into existence in the future).
The no form of this command removes the IP filter name from the configuration.
This command enables lawful interception (LI) of packets that match specific entries in an existing IP filter.
The ip-filter command directs packets which match the defined list of entry IDs to be intercepted to the destination referenced by the mirror-dest-service-id of the mirror-source.
The IP filter must already exist in order for the command to execute. Filters are configured in the config>filter context. If the IP filter does not exist, an error occurs. If the filter exists but has not been associated with a SAP or IP interface, an error is not generated but mirroring will not be enabled (there are no packets to mirror). Once the IP filter is defined to a SAP, IP interface or subscriber, mirroring is enabled.
If the IP filter is defined as ingress, only ingress packets are intercepted. Ingress packets are sent to the destination prior to any ingress packet modifications.
If the IP filter is defined as egress, only egress packets are intercepted. Egress packets are sent to the destination after all egress packet modifications.
An entry-id within an IP filter can only be intercepted to a single destination. If the same entry-id is defined multiple times, an error occurs and only the first definition is in effect.
By default, no packets matching any IP filters are intercepted. Interception of IP filter entries must be explicitly defined.
When the no command is executed with the entry keyword and one or more entry-id’s, interception of that list of entry-id’s is terminated within the ip-filter-id. If an entry-id is listed that does not exist, an error will occur and the command will not execute. If an entry-id is listed that is not currently being intercepted, no error will occur for that entry-id and the command will execute normally.
If an entry-id does not exist within the IP filter, an error occurs and the command will not execute.
If the filter’s entry-id is renumbered within the IP filter definition, the old entry-id is removed but the new entry-id must be manually added to the configuration to include the new (renumbered) entry’s criteria.
This command enables mirroring of packets that match specific entries in an existing IP filter.
The ip-filter command directs packets which match the defined list of entry IDs to be mirrored to the mirror destination referenced by the mirror-dest-service-id of the mirror-source.
The IP filter must already exist in order for the command to execute. Filters are configured in the config>filter context. If the IP filter does not exist, an error will occur. If the filter exists but has not been associated with a SAP or IP interface, an error is not generated but mirroring will not be enabled (there are no packets to mirror). Once the IP filter is defined to a SAP or IP interface, mirroring is enabled.
If the IP filter is defined as ingress, only ingress packets are mirrored. Ingress mirrored packets are mirrored to the mirror destination prior to any ingress packet modifications.
If the IP filter is defined as egress, only egress packets are mirrored. Egress mirrored packets are mirrored to the mirror destination after all egress packet modifications.
An entry-id within an IP filter can only be mirrored to a single mirror destination. If the same entry-id is defined multiple times, an error occurs and only the first mirror-source definition is in effect.
By default, no packets matching any IP filters are mirrored. Mirroring of IP filter entries must be explicitly defined.
The no ip-filter command, without the entry keyword, removes mirroring on all entry-id’s within the ip-filter-id.
When the no command is executed with the entry keyword and one or more entry-id’s, mirroring of that list of entry-id’s is terminated within the ip-filter-id. If an entry-id is listed that does not exist, an error will occur and the command will not execute. If an entry-id is listed that is not currently being mirrored, no error will occur for that entry-id and the command will execute normally.
If an entry-id does not exist within the IP filter, an error occurs and the command will not execute.
If the filter’s entry-id is renumbered within the IP filter definition, the old entry-id is removed but the new entry-id must be manually added to the configuration to include the new (renumbered) entry’s criteria.
This command creates a configuration context for the specified IPv4 filter policy.
The no form of the command deletes the IPv4 filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.
none
To create a filter, you must assign a filter ID, however, after it is created, either the filter ID or filter name can be used to identify and reference a filter.
If a name is not specified at creation time, then SR OS assigns a string version of the filter-id as the name.
Filter names may not begin with an integer (0 to 9).
This command enables the context to configure management access IP filter parameters.
This command enables the context to configure CPM IP filter parameters.
This command copies an existing filter entry for a specific filter ID to another filter ID. The command is a configuration level maintenance tool used to create new entries using an existing filter policy. If overwrite is not specified, an error will occur if the destination filter entry exists.
This command configures the maximum number of FlowSpec routes or rules that can be embedded into an ingress IP filter policy for a specified routing instance. FlowSpec filter entries embedded in a filter policy in this routing instance will use filter entries from the range between the embedding offset and “offset + ip-filter-max-size – 1”.
The sum of the ip-filter-max-size value parameter and the highest offset in any IPv4 filter that embeds IPv4 FlowSpec rules from this routing instance (excluding filters that embed at offset 262143) must not exceed 262143.
The ip-filter-max-size configuration can be adjusted up or down at any time. If the number of IPv4 FlowSpec rules that are currently installed is M, and the new limit is N, where N<M, then the last set of rules from N to M (by FlowSpec order) are immediately removed, but are retained in the BGP RIB. If the limit is increased, new rules are programmed only as they are received again in new BGP updates.
ip-filter-max-size default
This command configures the maximum number of FlowSpec routes or rules that can be embedded into the auto-created embedded filter (fSpec-X). FlowSpec filter entries embedded in a filter policy in this routing instance will use filter entries from the range between “embedding offset + 1” and “embedding offset + ip-filter-max-size”.
The sum of the ip-filter-max-size value parameter and the highest offset in any IPv4 filter that embeds IPv4 FlowSpec rules from this routing instance (excluding filters that embed at offset 262143) must not exceed 262143.
The ip-filter-max-size configuration can be adjusted up or down at any time. If the number of IPv4 FlowSpec rules that are currently installed is M, and the new limit is N, where N<M, then the last set of rules from N to M (by FlowSpec order) are immediately removed, but are retained in the BGP RIB. If the limit is increased, new rules are programmed only as they are received again in new BGP updates.
ip-filter-max-size 512
This command configures an IP filter in which the reservation is done through name.
The no form of this command removes the IP filter name.
This command associates an IP filter with a specified LI IP filter through its name.
The no form of this command removes the IP filter name.
This command configures downstream IPv6 fragmentation behavior in DS-Lite and NAT64. IPv6 fragmentation is performed in the ISA. IPv4 fragmentation is not affected by this command. If desired, downstream IPv4 packet can be fragmented in the carrier IOM before the packet reaches ISA (and the NAT function). The IPv4 fragmentation in the downstream direction can be set by the config>router/vprn>nat>outside>mtu command.
DS-Lite IPv6 Fragmentation in Downstream Direction (IPv4 to IPv6)
In case that the length of the received IPv4 packet is larger than the configured tunnel-mtu value while fragmentation is allowed, the resulting IPv6 packet will be fragmented (IPv4 is tunneled within IPv6). The maximum size of the of the fragmented IPv6 packet will be 48bytes larger than the configured tunnel-mtu value. This is due to the size of the tunneling IPv6 header: 40bytes basic IPv6 header + 8 bytes of extended fragmentation IPv6 header.
In case that fragmentation is not allowed while the IPv4 packet size is larger than configured tunnel-mtu size, the IPv4 packet will be dropped and an ICMPv4 Datagram Too Big message will be generated towards the source. The advertised mtu size in that ICMP message will be set to configured tunnel-mtu value.
NAT64 IPv6 Fragmentation in Downstream Direction (IPv4to IPv6)
In contrast to DS-Lite, NAT64 transport is not based on tunneling. Instead, IP headers are translated between IPv4 and IPv6. Consequently, NAT64 fragmentation operates based on the ipv6-mtu, as opposed to tunnel-mtu in DS-Lite which represents the size of the tunnel payload (IPv4 packet).
In case that the length of the translated IPv6 packet exceeds the size of the configured ipv6-mtu value while fragmentation is allowed, the resulting IPv6 packet will be fragmented. The maximum size of the of the fragmented IPv6 packet will be the configured ipv6-mtu value.
In case that fragmentation is not allowed while the translated IPv6 packet size is larger than configured ipv6-mtu size, the IPv4 packet (that is supposed to be translated into IPv6) will be dropped and an ICMPv4 Datagram Too Big message will be generated towards the source. The advertised mtu size in that ICMP message will be set to the ipv6-mtu value minus 28bytes. The 28bytes comes from the size of the IPv6 overhead of the translated packet (20bytes difference between the IP header sizes 40bytes in IPv6 vs 20bytes in IPv4; 8 bytes for extended IPv6 fragmentation header).
disabled
than what is set by the mtu value (tunnel-mtu or ipv6-mtu) the IPv4 packet will be dropped and ICPMv4 Datagram Too Big messages will be sent back to the source.
This command enables broadcast UDP packets received on the associated interface to be redirected to the specified gateway address and then forwarded on to the gateway.
The no form of this command removes the gateway address from the interface configuration and stops the UDP broadcast redirect function.
This command enables broadcast UDP packets received on the associated interface to be redirected to the specified gateway address and then forwarded on to the gateway.
The no form of this command removes the gateway address from the interface configuration and stops the UDP broadcast redirect function.
This command enables broadcast UDP packets received on the associated interface to be redirected to the specified gateway address and then forwarded on to the gateway.
The no form of this command removes the gateway address from the interface configuration and stops the UDP broadcast redirect function.
This command configures IP mirror information.
This command is used for remote mirroring, where the mirror source is a separate system then the mirror destination. The mirror source can only be of IP type and is only supported for the following services: IES, VPRN, VPLS and Ipipe. The mirror destination on a remote system will configure an interface on a VPRN as ip-mirror-interface. This interface only supports spoke sdp termination. The IP mirror interface requires PBR to determine the next outgoing interface for the mirror packet to be delivered to.
The no form of this command removes the interface name from the configuration.
This command specifies the maximum size of IP packets on this group interface. Packets larger than this are fragmented.
The ip-mtu applies to all IPoE host types (dhcp, arp, static). For PPP/L2TP sessions, the ip-mtu is not considered for the MTU negotiation. The ppp-mtu in the ppp-policy should be used instead.
The no form of this command reverts to the default.
This command specifies the maximum size of IP packets on this group interface. Packets larger than this are fragmented.
The ip-mtu applies to all IPoE host types (dhcp, arp, static). For PPP/L2TP sessions, the ip-mtu is not considered for the MTU negotiation. The ppp-mtu in the ppp-policy should be used instead.
The no form of this command reverts to the default.
This command configures the IP maximum transmit unit (packet) for this interface.
The no form of this command returns the default value. By default (for Ethernet network interface) if no ip-mtu is configured it is (1568 - 14) = 1554.
no ip-mtu
This command configures the IP maximum transmit unit (packet) for this interface.
Because this connects a Layer 2 to a Layer 3 service, this parameter can be adjusted under the IES interface.
The MTU that is advertised from the IES size is:
MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))
By default (for Ethernet network interface) if no ip-mtu is configured it is (1568 - 14) = 1554.
The no form of this command returns the default value.
no ip-mtu
This command configures the IP maximum transmit unit (packet) for this interface.
Because this connects a Layer 2 to a Layer 3 service, this parameter can be adjusted under the IES interface.
The MTU that is advertised from the IES size is:
MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))
By default (for the Ethernet network interface), if no ip-mtu is configured it is (1568 - 14) equals 1554.
The ip-mtu command instructs the MS-ISA to perform IP packet fragmentation, prior to IPsec encryption and encapsulation, based on the configured MTU value. In particular:
If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is clear (due to the presence of the clear-df-bit command or because the original DF value was 0) then the MS-ISA fragments the payload packet as efficiently as possible (i.e. it creates the minimum number of fragments each less than or equal to the configured MTU size); in each created fragment the DF bit shall be 0.
If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is set (because the original DF value was 1 and the tunnel has no clear-df-bit in its configuration) then the MS-ISA discards the payload packet without sending an ICMP type 3/code 4 message back to the packet’s source address.
The effective MTU for packets entering a tunnel is the minimum of the private tunnel SAP interface IP MTU value (used by the IOM) and the tunnel IP MTU value (configured using the above command and used by the MS-ISA). To fragment IP packets larger than X bytes with DF set, rather than discarding them, the tunnel IP MTU should be set to X and the private tunnel SAP interface IP MTU should be set to a value larger than X.
The no ip-mtu command, corresponding to the default behavior, disables fragmentation of IP packets by the MS-ISA; all IP packets, regardless of size or DF bit setting, are allowed into the tunnel.
no ip-mtu
This command specifies the maximum size of frames on this group-interface. Packets larger than this will get fragmented.
The no form of this command removes this functionality.
This command configures the maximum size of outgoing IP packets on this group interface. Packets larger than this are fragmented.
The no form of this command removes the configuration.
no ip-mtu
This command configures the IP maximum transmit unit (packet) for this interface.
The no form of this command returns the default value.
no ip-mtu
By default (for Ethernet network interface) if no ip-mtu is configured it is (1568 - 14) = 1554.
This command configures the IP maximum transmit unit (packet) for the associated router IP interface.
The configured IP-MTU cannot be larger than the calculated IP MTU based on the port MTU configuration.
The MTU that is advertised from the IES size is:
MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))
The no form of this command returns the associated IP interfaces MTU to its default value, which is calculated based on the port MTU setting. For Ethernet ports this will typically be 1554.
no ip-mtu
This command configures the IP maximum transmit unit (packet) for this interface.
The no form of this command returns the default value. By default (for Ethernet network interface) if no ip-mtu is configured it is (1568 - 14) = 1554.
no ip-mtu
This command configures the IP maximum transmit unit (packet) for the associated router IP interface.
The configured IP-MTU cannot be larger than the calculated IP MTU based on the port MTU configuration.
The MTU that is advertised from the IES size is:
MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))
The no form of this command returns the associated IP interfaces MTU to its default value, which is calculated based on the port MTU setting. For Ethernet ports this will typically be 1554.
no ip-mtu
This command configures the AA interface IP MTU.
no ip-mtu
This command configures the template IP MTU.
no ip-mtu
This command configures the IP-MTU size that is used to transport flow synchronization records between the ISAs. Multiple flow synchronization events can be packed into a single frame up to the IP-MTU size.
ip-mtu 1500
This command configures the IP maximum transmit unit (packet) for the associated router IP interface.
The operational IP MTU that is used for the interface is determined based on both the configured IP MTU and the port MTU of the port bound to this interface.
The MTU that is used is:
no ip-mtu
This command configures the IP option match condition.
The no form of this command reverts to the default.
This command configures matching packets with a specific IP option or a range of IP options in the first option of the IP header as an IP filter match criterion.
The option-type octet contains 3 fields:
1 bit copied flag (copy options in all fragments)
2 bits option class
5 bits option number
The no form of the command removes the match criterion.
no ip-option
The decimal value entered for the match should be a combined value of the eight bit option type field and not just the option number. Therefore, to match on IP packets that contain the Router Alert option (option number = 20), enter the option type of 148 (10010100).
This 8 bit mask can be configured using the following formats:
Format Style | Format Syntax | Example |
Decimal | DDD | 20 |
Hexadecimal | 0xHH | 0x14 |
Binary | 0bBBBBBBBB | 0b0010100 |
This command configures matching packets with a specific IP option or a range of IP options in the IP header as an IP filter match criterion.
The option-type octet contains 3 fields:
The no form of this command removes the match criterion.
no ip-option
The decimal value entered for the match should be a combined value of the eight bit option type field and not just the option number. Thus to match on IP packets that contain the Router Alert option (option number =20), enter the option type of 148 (10010100).
This 8 bit mask can be configured using the formats described in Table 72:
Format Style | Format Syntax | Example |
Decimal | DDD | 20 |
Hexadecimal | 0xHH | 0x14 |
Binary | 0bBBBBBBBB | 0b0010100 |
This command specifies the source IPv4/IPv6 address/prefix of the data trigger packet as the host identification.
The no form of this command reverts to the default.
This command configures an IP prefix list.
This command creates a list of IPv4 prefixes for match criteria in QoS policies.
An IP prefix list must contain only IPv4 address prefixes created using the prefix command and cannot be deleted if it is referenced by a QoS policy.
The no form of this command deletes the specified list.
This command creates a list of IPv4 prefixes for match criteria in IPv4 ACL and CPM filter policies.
The no form of this command deletes the specified list.
Operational Notes:
An ip-prefix-list must contain only IPv4 address prefixes.
An IPv4 prefix match list cannot be deleted if it is referenced by a filter policy.
See general description related to match-list usage in filter policies.
This command configures the IP protocol to use in the application definition.
The no form of this command restores the default (removes IP protocol number from application criteria defined by this app-filter entry).
no ip-protocol-num
The no form the command removes the protocol from the match criteria.
This command configures the IP protocol to use in the application definition.
The no form of this command restores the default (removes IP protocol number from application criteria defined by this app-filter entry).
no ip-protocol-num
The no form the command removes the protocol from the match criteria.
This command configures debugging on an IP protocol number.
This command enables and disables the advertisement of IP prefixes in EVPN. If enabled, any active route in the R-VPLS VPRN route table will be advertised in EVPN using the VPLS BGP configuration. The interface host addresses are not advertised in EVPN unless the ip-route-advertisement incl-host command is enabled.
no ip-route-advertisement
This command configures the source IPv4 address to use in the IPv4 header part of the routable LI encapsulation.
This command configures the value to put in the IP header’s TTL field for GTP control messages.
The no form of this command reverts to the default value.
ip-ttl 255
This command is used to configure an IP-GRE or IP-IP tunnel and associate it with a private tunnel SAP within an IES or VPRN service.
The no form of this command deletes the specified IP/GRE or IP-IP tunnel from the configuration. The tunnel must be administratively shutdown before issuing the no ip-tunnel command.
no-ip tunnel name
This command enables the context to configure parameters for an IP tunnel on a control-channel loopback interface. The default encapsulation is IP/GRE. The local end tunnel IP address will be configured using the interface primary IP address.
The ip-tunnel command can only be configured on control-channel loopback interfaces.
This command enables access to the IPCP context within the interface configuration. Within this context, IPCP extensions can be configured to define such things as the remote IP address and DNS IP address to be signaled via IPCP on the associated PPP interface. This command is only applicable if the associated SAP or port is a PPP or MLPPP interface.
This command creates allows access to the IPCP context within the interface configuration. Within this context, IPCP extensions can be configured to define such things as the remote IP address and DNS IP address to be signaled via IPCP on the associated PPP interface.
This command is only applicable if the associated SAP/port is a PPP/MLPPP interface.
This command configures the IPCP subnet negotiation using PPP IPCP Subnet-Mask option (0x90) if requested by the client. The subnet can be obtained from RADIUS (Framed-IP-Netmask attribute) or local user database. The subnet is installed as a managed route of the PPP session. This requires the anti-spoof type on the SAP to be configured to nh-mac.
By default, an IPCP Config Request with IPCP Subnet-Mask option (0x90) is rejected.
The no form of this command reverts to the default value.
no ipcp-subnet-negotiation
This command enables subnet negotiation using PPP IPCP Subnet-Mask option (0x90) if requested by the client. The subnet can be obtained from RADIUS (Framed-IP-Netmask attribute) or local user database. The subnet is installed as a managed route of the PPP session. This requires the anti-spoof type on the SAP to be configured to nh-mac.
By default, an IPCP Config Request with IPCP Subnet-Mask option (0x90) is rejected.
This command enables the context to configure IPFIX parameters.
This command configures the IP flow information export policy.
The no form of the command removes the IP flow information export policy.
no ipfix-export-policy
This command creates an IPFIX export policy with a set of transport parameters that will be used to transmit IPFIX records generated by an application within 7750 SR node to an external collector node. This policy name can be referenced from each application within 7750 SR that requires flow logging.
none
This command configures an IP-Pipe service.
To create a service, you must assign a service ID; however, after it is created, either the service ID or the service name can be used to identify and reference a service.
If a name is not specified at creation time, then SR OS assigns a string version of the service-id as the name.
This command enables the context to configure IPoE host parameters.
This command enables the context to set up call trace debugging for IP over Ethernet (IPoE) sessions.
This command enables the context to configure DHCP IPoE host parameters.
This command specifies the type of RADIUS accounting session ID to use for IPoE subscriber correlation.
host
The no form of this command removes the maximum number of IPoE sessions limit.
This command enables IPv6 IPoE bridged mode.
The no form of this command disables the IPv6 IPoE bridged mode.
This command enables the context to configure IPoE host linking.
This command enables the context to configure IPoE session parameters.
This command configures an IPoE session policy. The policies are referenced from subscriber interfaces, group interfaces and capture SAPs. Multiple IPoE session policies can be configured.
The no form of this command removes the policy name from the configuration.
This command specifies the IPoE session policy applicable for this group interface or capture SAP.
On WLAN GW group interfaces, it is not possible to change this value.
The no form of this command reverts to the default.
no ipoe-session-policy ipoe-session-policy default on WLAN GW group interfaces
This command enables certain fields to become the base for auto-generation of the default sub-id name. The sub-id name is auto generated if there is not a more specific method available. Such more specific methods would be a default sub-id name as a sap-id, a preconfigured static string or explicit mappings based on RADIUS/LUDB returned strings.
In case that a more specific sub-id name generation method is not available and the auto-id keyword is defined under the def-sub-id hierarchy, the sub-id name is generated by concatenating fields defined in this command separated by a “|” character.
The maximum sub-id name length is 32 characters while the concatenation of subscriber identification fields can easily exceed 32 characters. Subscriber host instantiation fails if the sub-id name is based on subscriber identification fields whose concatenated length exceeds 32 characters. Failing the host creation rather than truncating sub-id name on a 32 character boundary prevents collision of sub-ids (subscriber name duplication).
If the more specific sub-id name generation method is not available and the auto-id keyword is not defined under the def-sub-id hierarchy, the sub-id name is a random 10 character encoded string based on the fields defined under this command.
There is only one set of identification fields allowed per host type (IPoE or PPP) per chassis.
The no form of this command reverts to the default.
ipoe-sub-id-key mac sap-id
![]() | Note: If circuit-id contains any non-printable ASCII characters, the entire circuit-id string is formatted in hex in the sub-id name output. Otherwise all characters in circuit-id is converted to ASCII. ASCII printable characters contain bytes in range 0x20 to 0x7E. |
![]() | Note: If remote-id contains any non-printable ASCII characters, the entire remote-id string is formatted in hex in the sub-id name output. Otherwise all characters in remote-id is converted to ASCII. ASCII printable characters contain bytes in range 0x20 to 0x7E. |
This command enables multi-chassis synchronization of IPsec states on system level.
no ipsec
This command enables the context to configure Internet Protocol Security (IPsec) parameters. IPsec is a structure of open standards to ensure private, secure communications over Internet Protocol (IP) networks by using cryptographic security services.
This command enables the context to configure IPsec policies on a VSR.
This command causes the associated header to be defined as an IPsec header template and enters the context to define the IPsec parameters. This same context can be used for IPv4 and IPv6 packets.
This command specifies the lifetime of the Phase 2 IKE key.
The no form of this command reverts to the default, which is 3600 seconds.
no ipsec-lifetime
This command specifies the CHILD_SA. If the inherit parameter is specified, then the system uses the IPsec lifetime configuration in the corresponding IKE policy configured in the same IPsec gateway or IPsec tunnel.
ipsec-lifetime inherit
With this command configured, system will only act as IKE responder except for the automatic CHILD_SA re-key upon MC-IPsec switchover.
no ipsec-responder-only
This command enables the context to create an ipsec-transform policy. IPsec transforms policies can be shared. A change to the ipsec-transform is allowed at any time. The change will not impact tunnels that have been established until they are renegotiated. If the change is required immediately the tunnel must be cleared (reset) for force renegotiation.
IPsec transform policy assignments to a tunnel require the tunnel to be shutdown.
The no form of this command removes the ID from the configuration.
This command creates a static route in a VPRN service context that points to the global routing context (base router). This is primarily used to allow traffic that ingress through a VPRN service to be routed out of the global routing context.
This next-hop type cannot be used in conjunction with any other next-hop types.
no ipsec-tunnel
This command enables the context of a static IPsec tunnel. If the private-service-name is not specified, then the private service is the same as service where the secured interface is.
The no form of this command removes the IPsec tunnel name from the configuration.
This command enables the context to configure IPv4 parameters.
ipv4
This command sets ECMP multipath parameters that apply only to the (unlabeled) IPv4 unicast address family. These settings override the values set by the maximum-paths command.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
To qualify as a multipath, a non-best route must meet the following criteria (some criteria are controlled by this command):
The no form of this command removes IPv4-specific overrides.
no ipv4
This command enables the context to configure LDP interfaces and parameters applied to an IPv4 LDP interface.
This command enables the context to configure IPv4 LDP parameters applied to the interface.
This command enables the context to configure parameters applied to targeted sessions to all IPv4 LDP peers.
This command enables the context to configure IPv4 local address assignment parameters for the IPsec gateway.
This command causes the associated header to be defined as an IPv4 header template and enables the context to define the IPv4 parameters.
This command filters IPv4 flow data from being sent to the associated collector.
The no form of this command removes the filter, allowing IPv4 flow data to be sent to the associated collector.
no ipv4
This command enables the context to configure GRE tunnel template IPv4 parameters.
This command enters the context to autoconfigure the IPv4 DHCP client.
This command configures the IPv4 NEIP for this profile.
The no form of this command removes the IPv4 address association for this profile.
no ipv4
This command configures the add-paths capability for unlabeled IPv4 unicast routes. By default, add-paths is not enabled for unlabeled IPv4 unicast routes.
The maximum number of unlabeled unicast paths per IPv4 prefix to send is the configured send limit, which is a mandatory parameter. The capability to receive multiple unlabeled IPv4 unicast paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command the receive capability is enabled by default.
The no form of this command disables add-paths support for unlabeled IPv4 unicast routes, causing sessions established using add-paths for unlabeled IPv4 unicast to go down and come back up without the add-paths capability.
no ipv4
This command sets ECMP multipath parameters that apply only to the (unlabeled) IPv4 unicast address family. These settings override the values set by the maximum-paths command.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
The no form of this command removes IPv4-specific overrides.
no ipv4
This command enables matching on UEs with the specified IPv4 address.
The no form of this command disables matching on the IPv4 address.
no ipv4-address
This command allows a static value to be assigned to an IPv4 adjacency SID in IS-IS segment routing.
The label option specifies that the value is assigned to an MPLS label.
The no form of this command removes the adjacency SID.
This command configures the maximum number of IPv4 ARP hosts per SLA profile instance or per subscriber.
![]() | Note: |
This command limits the number of IPv4 DHCP hosts per SLA profile instance or per subscriber.
![]() | Note: The operational maximum value may be smaller due to equipped hardware dependencies. |
This command configures the value of the IPv4-MTU PCO sent in S11 GTP messages. This is the MTU a device should honor when sending data toward the SGW/PGW. For IPv6, this value is signaled in the RA message and which can be configured in the grp-if> ipv6>rtr-adv>mtu context.
The no form of this command resets the signaled IPv4 MTU to the default.
ipv4-mtu 1400
This command enables support for the IPv4 topology (MT3) within the associate IS-IS instance.
The no form of this command disables support for the IPv4 topology (MT3) within the associated IS-IS instance.
no ipv4-multicast
This command enables support for the IPv4 topology (MT3) within the associate IS-IS instance.
The no form of this command disables support for the IPv4 topology (MT3) within the associated IS-IS instance.
no ipv4-multicast
This command disables PIM snooping for IPv4 multicast traffic within a VPLS service.
The no form of this command enables PIM snooping for IPv4 multicast traffic within a VPLS service. To fully remove PIM snooping from a VPLS service it is necessary to issue the no pim-snooping command.
no ipv4-multicast-disable
This command administratively disables/enables ISIS operation for IPv4.
no ipv4-multicast-disable
This command administratively disables/enables PIM operation for IPv4.
no ipv4-multicast-disable
no ipv4-multicast-disable
This command disables IS-IS IPv4 multicast routing for the interface.
The no form of this command enables IS-IS IPv4 multicast routing for the interface.
This command configures IS-IS interface metric for IPv4 multicast for the VPRN instance.
The no form of this command removes the metric from the configuration.
This command configures the IS-IS interface metric for IPv4 multicast.
The no form of this command removes the metric from the configuration.
This command sets the offset value for the IPv4 multicast address family. If the number of operational links drops below the oper-members threshold, the configured offset is applied to the interface metric for the IPv4 multicast topology
The no form of this command reverts the offset value to 0.
no ipv4-multicast-metric-offset
This command sets the offset value for the IPv4 multicast address family. If the number of operational links drops below the oper-members threshold, the configured offset is applied to the interface metric for the IPv4 multicast topology.
The no form of this command reverts the offset value to 0.
no ipv4-multicast-metric-offset
The multicast RTM is used for Reverse Path Forwarding checks. This command controls which IS-IS topology is used to populate the IPv4 multicast RTM.
The no ipv4-multicast-routing form of this command results in none of the IS-IS routes being populated in the IPv4 multicast RTM and would be used if multicast is configured to use the unicast RTM for the RPF check.
ipv4-multicast-routing native
The multicast RTM is used for Reverse Path Forwarding checks. This command controls which IS-IS topology is used to populate the IPv4 multicast RTM.
The no form of this command results in none of the IS-IS routes being populated in the IPv4 multicast RTM and would be used if multicast is configured to use the unicast RTM for the RPF check.
ipv4-multicast-routing native
This command assigns a node SID index or label value to the prefix representing the primary address of an IPv4 network interface of type loopback. Only a single node SID can be assigned to an interface. The secondary address of an IPv4 interface cannot be assigned a node SID index and does not inherit the SID of the primary IPv4 address.
The command fails if the network interface is not of type loopback or if the interface is defined in an IES or a VPRN context. Also, assigning the same SID index or label value to the same interface in two different IGP instances is not allowed within the same node.
The value of the label or index SID is taken from the range configured for this IGP instance. When using the global mode of operation, a new segment routing module checks that the same index or label value cannot be assigned to more than one loopback interface address. When using the per-instance mode of operation, this check is not required since the index and thus label ranges of the various IGP instance are not allowed to overlap.
The clear-n-flag option allows the user to clear the N-flag (node-sid flag) in an IS-IS prefix SID sub-TLV originated for the IPv4 prefix of a loopback interface on the system.
By default, the prefix SID sub-TLV for the prefix of a loopback interface is tagged as a node SID, meaning that it belongs to this node only. However, when the user wants to configure and advertise an anycast SID using the same loopback interface prefix on multiple nodes, you must clear the N-flag to assure interoperability with third party implementations, which may perform a strict check on the receiving end and drop duplicate prefix SID sub-TLVs when the N-flag is set.
The SR OS implementation is relaxed on the receiving end and accepts duplicate prefix SIDs with the N-flag set or cleared. SR OS will resolve to the closest owner, or owners if ECMP is configured, of the prefix SID according to its cost.
no ipv4-node-sid
![]() | Note: The operational maximum value may be smaller due to equipped hardware dependencies. |
This command configures an IPv4 MAP rule prefix.
This command enables debugging for IPv4 prefix RPKI packets.
The no form of this command disables debugging for IPv4 prefix RPKI packets.
This command specifies whether this IS-IS instance supports IPv4.
The no form of this command disables IPv4 on the IS-IS instance.
ipv4-routing
This command specifies whether this IS-IS instance supports IPv4.
The no form of this command disables IPv4 on the IS-IS instance.
ipv4-routing
This command configures the IPv4 address of the default secondary DNS server for the subscribers using this interface. Subscribers that cannot obtain an IPv4 DNS server address by other means, can use this for DNS name resolution.
The ipv4-address value can only be set to a nonzero value if the value of VPRN type is set to subscriber-split-horizon.
The no form of this command reverts to the default.
This command specifies the IPv4 source address used for transport protocol.
The no form of this command uses the default source address which typically is the address of the egress interface.
no ipv4-source-address
This command configures the IPv4 source address from which the UDP streams containing syslog flow records are sourced.
The no form of the command removes the IPv4 address from the configuration.
This command sets the offset value for the IPv4 unicast address family. If the number of operational links drops below the oper-members threshold, the configured offset is applied to the interface metric.
The no form of this command reverts the offset value to 0.
no ipv4-unicast-metric-offset
This command sets the offset value for the IPv4 unicast address family. If the number of operational links drops below the oper-members threshold, the configured offset is applied to the interface metric.
The no form of this command reverts the offset value to 0.
no ipv4-unicast-metric-offset
This command enables the context to configure IPv6 parameters for the interface.
This command associates an existing IPv6 filter policy with the template.
This command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic).
This command associates an existing IP filter policy with the template.
This command associates an existing IP filter policy with the template.
This command sets ECMP multipath parameters that apply only to the (unlabeled) IPv6 unicast address family. These settings override the values set by the maximum-paths command.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
To qualify as a multipath, a non-best route must meet the following criteria (some criteria are controlled by this command):
The no form of this command removes IPv6-specific overrides.
no ipv6
This command enables context to configure list of redundant IPv6 source prefixes for preferred source selection.
This command enables access to the context to configure the rendezvous point (RP) of a PIM IPv6 protocol instance.
A Nokia IPv6 PIM router acting as an RP must respond to an IPv6 PIM register message specifying an SSM multicast group address by sending to the first hop router stop register message(s). It does not build an (S, G) shortest path tree toward the first hop router. An SSM multicast group address can be either from the SSM default range or from a multicast group address range that was explicitly configured for SSM.
ipv6 RP enabled when IPv6 PIM is enabled.
This command enables the context to configure IPv6 LDP parameters applied to the interface.
This command is not supported on the 7450 ESS.
This command enables the context to configure LDP interfaces and parameters applied to an IPv6 LDP interface.
This command is not supported on the 7450 ESS.
This command enables the context to configure parameters applied to targeted sessions to all IPv6 LDP peers.
This command is not supported on the 7450 ESS.
This command enables the context to configure IPv6 local address assignment parameters for the IPsec gateway.
This command enables the context to configure IPv6 parameters.
This command causes the associated header to be defined as an IPv6 header template and enters the context to define the IPv6 parameters.
This command filters IPv6 flow data from being sent to the associated collector.
The no form of this command removes the filter, allowing IPv6 flow data to be sent to the associated collector.
no ipv6
This command activates an IPv6 system filter policy. Once activated, all IPv6 ACL filter policies that chain to the system filter (config>filter>ipv6-filter>chain-to-system-filter) will automatically execute system filter policy rules first.
The no form of the command deactivates the system filter policy.
This command enables IPv6 filter monitoring. The statistical information for the specified IPv6 filter entry displays at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the specified IPv6 filter. The subsequent statistical information listed for each interval is displayed as a delta to the previous display.
When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
The following output is an example of filter IPv6 information.
This command enters the context to configure the IPv6 interface of the router.
ipv6
This command configures IPv6 for a router interface.
The no form of this command disables IPv6 on the interface.
no ipv6
This command enters the context to autoconfigure the IPv6 DHCP client.
This command displays monitor command statistics for IPv6 filter entries.
This command monitors statistics for the MAF IPv6 filter entry.
This command configures the IPv6 NEIP for this profile.
The no form of this command removes the IPv6 address association for this profile.
no ipv6
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x: [0..FFFF]H | |
d: [0..255]D |
This command configures the add-paths capability for unlabeled IPv6 unicast routes. By default, add-paths is not enabled for unlabeled IPv6 unicast routes.
The maximum number of unlabeled unicast paths per IPv6 prefix to send is the configured send limit, which is a mandatory parameter. The capability to receive multiple unlabeled IPv6 unicast paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command the receive capability is enabled by default.
The no form of this command disables add-paths support for unlabeled IPv6 unicast routes, causing sessions established using add-paths for unlabeled IPv6 unicast to go down and come back up without the add-paths capability.
no ipv6
This command sets ECMP multipath parameters that apply only to the (unlabeled) IPv6 unicast address family. These settings override the values set by the maximum-paths command.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
The no form of this command removes IPv6-specific overrides.
no ipv6
This command enables the advertisement of IPv6 TE in the IS-IS instance. When this command is enabled, traffic engineering behavior with IPv6 TE links is enabled. This IS-IS instance automatically begins advertising the new RFC 6119 IPv6 and TE TLVs and sub-TLVs.
The no form of this command disables IPv6 TE in this ISIS instance.
no ipv6
This command configures static DHCPv6 IA-NA address for the host. This address is delegated to the client as /128 via DHCPv6 proxy function within the router. This IP address must not be part of any DHCP pool within internal DHCP server.
The no form of this command removes the IPv6 address from the host configuration.
ipv6-address: | ipv6-prefix x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x [0 to FFFF]H | |
d [0 to 255]D |
This command enables the generation of the ipv6-address RADIUS attribute.
The no form of this command disables the generation of the ipv6-address RADIUS attribute.
This attribute defines if the ipv6 address of the UE is present during authentication if the datatrigger packet is IPv6.
no ipv6-address
If an active IA_NA lease exists, this attribute defines if the IA_NA address of the UE is present in accounting.
no ipv6-address
This command configures a transit IP policy IPv6 address prefix length.
no ipv6-address-prefix-length
This command allows a static value to be assigned to an IPv6 adjacency SID in IS-IS segment routing.
The label option specifies that the value is assigned to an MPLS label.
The no form of this command removes the adjacency SID.
IPv6 criteria-based SAP egress or ingress policies are used to select the appropriate ingress or egress queue or policer and corresponding forwarding class and packet profile for matched traffic.
This command is used to enter the node to create or edit policy entries that specify IPv6 criteria such as IP quintuple lookup or DiffServ code point.
The OS implementation will exit on the first match found and execute the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly from most to least explicit.
The no form of this command deletes all the entries specified under this node. When ipv6-criteria entries are removed from a SAP ingress policy, the ipv6-criteria is removed from all services where that policy is applied.
IPv6 criteria-based network ingress and egress policies are used to select the appropriate ingress or egress queue or policer, and the corresponding forwarding class and packet profile for matched traffic. This command is used to enter the context to create or edit policy entries that specify IPv6 criteria such as IP quintuple lookup or DSCP.
The 7750 SROS implementation will exit on the first match found and execute the actions in accordance with the accompanying action command. Entries must be sequenced correctly from most to least explicit.
The ingress classification only applies to the outer IPv6 header of non-tunneled traffic.
Attempting to apply a network QoS policy containing an ipv6-criteria statement to any object except a network IP interface will result in an error.
The no form of this command deletes all entries specified under this node. When IP criteria entries are removed from a network policy, the IPv6 criteria are removed from all network interfaces to which that policy is applied.
This command configures static DHCPv6 IA-PD prefix for the host. This prefix can be further delegated by the host itself to its clients. The prefix length is restricted to 48 to 64 bits. This prefix must not be part of any DHCP pool within internal DHCP server.
ipv6-address: | ipv6-prefix x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x [0 to FFFF]H | |
d [0 to 255]D | |
prefix-length | 48 to 64 |
This command allows configuration of delegated prefix length via local user database.
The no form of this command reverts to the default.
This command configures the pool name that is used in DHCPv6 server for DHCPv6 IA-PD prefix selection.
The no form of this command removes the pool name from the configuration.
This command defines the maximum number of IPv6 extension headers parsed in the line cards. The system parses up to six extension headers when ipv6-eh max is configured.
When the ipv6-eh limited command is configured, the system does not parse IPv6 extension headers and provides consistent ipv6-filter matches for the next-header value found in the IPv6 packet header. LAG and ECMP hashing of IPv6 packets with extension headers is limited to Layer 3 IP addresses. Layer 4 ports, TEID, and SPI values are not available for hashing. MLD snooping on Layer 2 services is also not supported in this mode.
The no form of this command reverts to the default value.
ipv6-eh max
This command enables debugging for IPv6 error events.
The no form of this command disables debugging for IPv6 error events
This command configures the IPv6 filter exception for an IPsec-secured IPv6 interface. When an IPv6 filter exception is added, clear text packets that match the exception criteria in the IPv6 filter exception policy can ingress the interface, even when IPsec is enabled on that interface.
The no form of this command removes the IPv6 filter exception.
no ipv6-exception
This command creates a configuration context for the specified IPv6 exception filter.
The no form of the command deletes the IPv6 exception filter.
This command configures an egress or ingress IPv6 filter.
The no form of this command reverts to the default.
This command enables mirroring of packets that match specific entries in an existing IPv6 filter.
The ipv6-filter command directs packets which match the defined list of entry IDs to be mirrored to the mirror destination referenced by the mirror-dest-service-id of the mirror-source.
The IPv6 filter must already exist in order for the command to execute. Filters are configured in the config>filter context. If the IPv6 filter does not exist, an error will occur. If the filter exists but has not been associated with a SAP or IPv6 interface, an error is not generated but mirroring will not be enabled (there are no packets to mirror). Once the IPv6 filter is defined to a SAP or IPv6 interface, mirroring is enabled.
If the IPv6 filter is defined as ingress, only ingress packets are mirrored. Ingress mirrored packets are mirrored to the mirror destination prior to any ingress packet modifications.
If the IPv6 filter is defined as egress, only egress packets are mirrored. Egress mirrored packets are mirrored to the mirror destination after all egress packet modifications.
An entry-id within an IPv6 filter can only be mirrored to a single mirror destination. If the same entry-id is defined multiple times, an error occurs and only the first mirror-source definition is in effect.
By default, no packets matching any IPv6 filters are mirrored. Mirroring of IPv6 filter entries must be explicitly defined.
The no ipv6-filter command, without the entry keyword, removes mirroring on all entry-id’s within the ip-filter-id.
When the no form of this command is executed with the entry keyword and one or more entry-id’s, mirroring that entry-id list is terminated within the ip-filter-id. If an entry-id is listed that does not exist, an error will occur and the command will not execute. If an entry-id is listed that is not currently being mirrored, no error will occur for that entry-id and the command will execute normally.
If an entry-id does not exist within the IP filter, an error occurs and the command will not execute.
If the filter’s entry-id is renumbered within the IP filter definition, the old entry-id is removed but the new entry-id must be manually added to the configuration to include the new (renumbered) entry’s criteria.
This command configures to which normal IPv6 address filters the entry reservation is applied.
This command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic).
The no form of this command removes the IPv6 filter ID from the configuration.
filter-id: | 1 to 65535 |
filter-name: | up to 64 characters (filter-name is an alias for input only. The filter-name gets replaced with an id automatically by SROS in the configuration). |
This command specifies the IP filter(s) into which the entries from the specified li-ipv6-filter are to be inserted. The li-ipv6-filter and ipv6-filter must already exist before the association is made. If the normal IPv6 filter is deleted then the association is also removed (and not re-created if the IPv6 filter comes into existence in the future).
The no form of this command removes the IPv6 filter ID from the configuration.
This command enables lawful interception (LI) of packets that match specific entries in an existing IPv6 filter.
The ipv6-filter command directs packets which match the defined list of entry IDs to be intercepted to the destination referenced by the mirror-dest-service-id of the mirror-source.
The IPv6 filter must already exist in order for the command to execute. Filters are configured in the config>filter context. If the IPv6 filter does not exist, an error will occur. If the filter exists but has not been associated with a SAP or IPv6 interface, an error is not generated but mirroring will not be enabled (there are no packets to mirror). Once the IPv6 filter is defined to a SAP, IPv6 interface or subscriber, mirroring is enabled (subscriber mirroring applies only to the 7750 SR).
If the IPv6 filter is defined as ingress, only ingress packets are intercepted. Ingress packets are sent to the destination prior to any ingress packet modifications.
If the IPv6 filter is defined as egress, only egress packets are intercepted. Egress packets are sent to the destination after all egress packet modifications.
An entry-id within an IPv6 filter can only be intercepted to a single destination. If the same entry-id is defined multiple times, an error occurs and only the first definition is in effect.
By default, no packets matching any IPv6 filters are intercepted. Interception of IPv6 filter entries must be explicitly defined.
When the no command is executed with the entry keyword and one or more entry-id’s, interception of that list of entry-id’s is terminated within the ipv6-filter-id. If an entry-id is listed that does not exist, an error will occur and the command will not execute. If an entry-id is listed that is not currently being intercepted, no error will occur for that entry-id and the command will execute normally.
If an entry-id does not exist within the IPv6 filter, an error occurs and the command will not execute.
If the filter’s entry-id is renumbered within the IPv6 filter definition, the old entry-id is removed but the new entry-id must be manually added to the configuration to include the new (renumbered) entry’s criteria.
This command creates a configuration context for the specified IPv6 filter policy.
The no form of the command deletes the IPv6 filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.
To create a filter, you must assign a filter ID, however, after it is created, either the filter ID or filter name can be used to identify and reference a filter.
If a name is not specified at creation time, then SR OS assigns a string version of the filter-id as the name.
Filter names may not begin with an integer (0 to 9).
This command enables the context to configure management access IPv6 filter parameters. This command only applies to the 7750 SR and 7950 XRS.
This command enables the context to configure CPM IPv6 filter parameters. This command applies only to the 7750 SR and 7950 XRS.
This command copies an existing filter entry for a specific filter ID to another filter ID. The command is a configuration level maintenance tool used to create new entries using an existing filter policy. If overwrite is not specified, an error will occur if the destination filter entry exists.
This command configures the maximum number of IPv6 FlowSpec routes or rules that can be embedded into an ingress IPv6 filter policy for a specified routing instance. Flowspec filter entries embedded in a filter policy in this routing instance will use filter entries from the range between the embedding offset and “offset + ip-filter-max-size – 1”.
The sum of the ip-filter-max-size value parameter and the highest offset in any IPv6 filter that embeds IPv6 FlowSpec rules from this routing instance (excluding filters that embed at offset 262143) must not exceed 262143.
The ip-filter-max-size configuration can be adjusted up or down at any time. If the number of IPv6 FlowSpec rules that are currently installed is M, and the new limit is N, where N<M, then the last set of rules from N to M (by FlowSpec order) are immediately removed, but are retained in the BGP RIB. If the limit is increased, new rules are programmed only as they are received again in new BGP updates.
ipv6-filter-max-size default
This command configures the maximum number of IPv6 FlowSpec routes or rules that can be embedded into the auto-created embedded filter (fSpec-X). FlowSpec filter entries embedded in a filter policy in this routing instance will use filter entries from the range between “embedding offset + 1” and “embedding offset + ip-filter-max-size”.
The sum of the ipv6-filter-max-size value parameter and the highest offset in any IPv6 filter that embeds IPv6 FlowSpec rules from this routing instance (excluding filters that embed at offset 262143) must not exceed 262143.
The ipv6-filter-max-size configuration can be adjusted up or down at any time. If the number of IPv6 FlowSpec rules that are currently installed is M, and the new limit is N, where N<M, then the last set of rules from N to M (by FlowSpec order) are immediately removed, but are retained in the BGP RIB. If the limit is increased, new rules are programmed only as they are received again in new BGP updates.
ipv6-filter-max-size 512
This command configures an IPv6 filter in which the reservation is done through name.
The no form of this command removes the IPv6 filter name.
This command associates an IPv6 filter with a specified LI IPv6 filter through its name.
The no form of this command removes the IPv6 filter name.
This command causes the associated header to be defined as an IPv6 fragment header template.
This command enables the context to configure lease times for DHCPv6.
This command sets the size of the IPv6 downstream packet in NAT64. This packet is translated from IPv4.
The no form of the command reverts to the default.
ipv6-mtu 1520
This command enables support for the IPv6 topology (MT4) within the associate IS-IS instance.
The no form of this command disables support for the IPv6 topology (MT4) within the associated IS-IS instance.
no ipv6-multicast
This command disables PIM snooping for IPv6 multicast traffic within a VPLS service.
The no form of this command enables PIM snooping for IPv6 multicast traffic within a VPLS service. To fully remove PIM snooping from a VPLS service it is necessary to issue the no pim-snooping command.
ipv6-multicast-disable
This command administratively disables/enables PIM operation for IPv6.
ipv6-multicast-disable (config>service>vprn>pim)
no ipv6-multicast-disable (config>service>vprn>pim>if)
ipv6-multicast-disable
This command disables IS-IS IPv6 multicast routing for the interface.
The no form of this command enables IS-IS IPv6 multicast routing for the interface.
This command configures the IS-IS interface metric for IPv6 multicast.
The no form of this command removes the metric from the configuration.
no ipv6-multicast-metric
This command sets the offset value for the IPv6 multicast address family. If the number of operational links drops below the oper-members threshold, the configured offset is applied to the interface metric for the IPv6 multicast topology.
The no form of this command reverts the offset value to 0.
no ipv6-multicast-metric-offset
The multicast RTM is used for Reverse Path Forwarding checks. This command controls which IS-IS topology is used to populate the IPv6 multicast RTM.
The no form of this command results in none of the IS-IS routes being populated in the IPv4 multicast RTM and would be used if multicast is configured to use the unicast RTM for the RPF check.
ipv6-multicast-routing native
This command assigns a node SID index or label value to the prefix representing the primary address of an IPv6 network interface of type loopback. Only a single node SID can be assigned to an IPv6 interface. When an IPv6 interface has multiple global addresses, the primary address is always the first one in the list, as displayed by the interface info command.
The command fails if the network interface is not of loopback type or if the interface is defined in an IES or a VPRN context. Assigning the same SID index/label value to the same interface in two different IGP instances is not allowed within the same node.
The value of the label or index SID is taken from the range configured for this IGP instance. When using the global mode of operation, a new segment routing module checks that the same index or label value cannot be assigned to more than one loopback interface address. When using the per-instance mode of operation, this check is not required since the index and thus label ranges of the various IGP instance are not allowed to overlap.
The clear-n-flag option allows the user to clear the N-flag (node-sid flag) in an IS-IS prefix SID sub-TLV originated for the IPv6 prefix of a loopback interface on the system.
By default, the prefix SID sub-TLV for the prefix of a loopback interface is tagged as a node SID, meaning that it belongs to this node only. However, when the user wants to configure and advertise an anycast SID using the same loopback interface prefix on multiple nodes, you must clear the N-flag to assure interoperability with third-party implementations, which may perform a strict check on the receiving end and drop duplicate prefix SID sub-TLVs when the N-flag is set.
The SR OS implementation is relaxed on the receiving end and accepts duplicate prefix SIDs with the N-flag set or cleared. SR OS will resolve to the closest owner, or owners if ECMP is configured, of the prefix SID according to its cost.
no ipv6-node-sid
![]() | Note: |
![]() | Note: Prefix delegation hosts that are modeled as a managed route do not count against this limit. |
![]() | Note: |
![]() | Note: Prefix delegation hosts that are modeled as a managed route do not count against this limit. |
![]() | Note: The operational maximum value may be smaller due to equipped hardware dependencies |
![]() | Note: Prefix delegation hosts that are modeled as a managed route do not count against this limit. |
![]() | Note: The operational maximum value may be smaller due to equipped hardware dependencies. |
This command enables debugging for IPv6 prefix RPKI packets.
The no form of this command disables debugging for IPv6 prefix RPKI packets.
This command creates a list of IPv6 prefixes for match criteria in QoS policies. An ipv6-prefix-list must contain only IPv6 address prefixes created using the prefix command and cannot be deleted if it is referenced by a QoS policy.
The no form of this command deletes the specified list.
This command creates a list of IPv6 prefixes for match criteria in ACL and CPM IPv6 filter policies.
The no form of this command deletes the specified list.
Operational Notes:
An ipv6-prefix-list must contain only IPv6 address prefixes.
An ipv6-prefix-list cannot be deleted if it is referenced by a filter policy.
See general description related to match-list usage in filter policies.
This command enables IPv6 routing.
The no form of this command disables support for IS-IS IPv6 TLVs for IPv6 routing.
no ipv6-routing
This command enables IPv6 routing.
The no form of this command disables support for IS-IS IPv6 TLVs for IPv6 routing.
no ipv6-routing
This command configures static IPv6 SLAAC prefix (PIO) for the host. The host will assign an IPv6 address to itself based on this prefix. The prefix length is 64 bits.
The no form of this command removes the static IPv6 SLAAC prefix (PIO) for the host from the configuration.
no ipv6-slaac-prefix
ipv6-prefix/prefix-length : ipv6-prefix x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | |
x [0 to FFFF]H | |
d [0 to 255]D | |
prefix-length | 64 |
This command configures the IPv6 SLAAC prefix pool of this host.
The no form of this command reverts to the default.
This command configures IPv6 source address that the SR OS node will use for its peering connection.
The no form of this command removes the IPv6 source address from the configuration.
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x - [0 to FFFF]H | |
d - [0 to 255]D |
This command configures IPv6 source address that the SR OS node will use for its peering connection.
The no form of this command removes the IPv6 source address from the configuration.
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x - [0 to FFFF]H | |
d - [0 to 255]D |
This command configures the source address of an IPv6 RADIUS packet.
When no ipv6-source-address is configured, the system IPv6 address (inband RADIUS server connection) or Boot Option File (BOF) IPv6 address (outband RADIUS server connection) must be configured in order for the RADIUS client to work with an IPv6 RADIUS server.
This address is also used in the NAS-IPv6-Address attribute.
The no form of this command reverts to the default value.
This command configures the IPv6 address of the default secondary DNS server for the subscribers using this interface. Subscribers that cannot obtain an IPv6 DNS server address by other means, can use this for DNS name resolution.
The ipv6-address value can only be set to a nonzero value if the value of VPRN type is set to subscriber-split-horizon.
The no form of this command reverts to the default.
This command specifies the IPv6 source address used for transport protocol.
The no form of this command uses the default source address which typically is the address of egress interface.
no ipv6-source-address
This command specifies the value used for TCP-MSS-adjust in the IPv6 upstream direction for DSM. The downstream direction for both IPv4 and IPv6 are both configured under the group-interface. The upstream direction for IPv4 NAT hosts is configured under the NAT policy.
The defined segment size is inserted in a TCP SYN message if there is no existing MSS option or the value in the MSS option is bigger than the configured value.
The no form of this command disables upstream TCP MSS adjust for IPv6 DSM.
no ipv6-tcp-mss-adjust
This command configures the IPv6 TE Router ID. The IPv6 TE Router ID, when configured, uniquely identifies the router as being IPv6 TE capable to other routers in an IGP TE domain.
IS-IS advertises this information using the IPv6 TE Router ID TLV.
If this command is not configured, the IPv6 TE Router ID will use the global unicast address of the system interface by default. The user can specify the system interface using this command to achieve the same result. If a different interface is specified, the preferred primary global unicast address of that interface is used instead
The no form of this command reverts the IPv6 TE Router ID to the default value.
This command enables multi-topology TLVs.
The no form of this command disables multi-topology TLVs.
This command enables multi-topology TLVs.
The no form of this command disables multi-topology TLVs.
no ipv6-unicast
This command disables IS-IS IPv6 unicast routing for the interface.
By default IPv6 unicast on all interfaces is enabled. However, IPv6 unicast routing on IS-IS is in effect when the config>router>isis>ipv6-routing mt command is configured.
The no form of this command enables IS-IS IPv6 unicast routing for the interface.
This command configures IS-IS interface metric for IPv6 unicast.
The no form of this command removes the metric from the configuration.
This command configures the IS-IS interface metric for IPv6 unicast.
The no form of this command removes the metric from the configuration.
no ipv6-unicast-metric
This command sets the offset value for the IPv6 unicast address family. If the number of operational links drops below the oper-members threshold, the configured offset is applied to the interface metric for the IPv6 topology.
The no form of this command reverts the offset value to 0.
no ipv6-unicast-metric-offset
This command sets the offset value for the IPv6 unicast address family. If the number of operational links drops below the oper-members threshold, the configured offset is applied to the interface metric for the IPv6 topology.
The no form of this command reverts the offset value to 0.
no ipv6-unicast-metric-offset
This command configures the pool name that is used in the DHCPv6 server for DHCPv6 IA-PA address selection.
The no form of this command removes the pool name from the configuration.
![]() | Note: |
![]() | Note: |
![]() | Note: |
![]() | Note: |
![]() | Note: The operational maximum value may be smaller due to equipped hardware dependencies |
This command enables the context to configure Integrated Services Adapter (ISA) parameters.
This command configures an ISA application assurance group for WLAN gateway DSM subscribers.
This command configures AA ISA group as a mirror source for this mirror service. Traffic is mirrored after AA processing takes place on AA ISAs of the group, therefore, any packets dropped as part of that AA processing are not mirrored.
This command specifies by how much an AA ISA is oversubscribed when linked to a WLAN-GW group. A factor of 1 indicates that each AA ISA is linked to a single WLAN-GW ISA, while a factor of 10 indicates that each AA ISA is linked to up to 10 WLAN-GW ISAs. The factor must be an integer but poses an oversubscription limit, not an exact ratio. For example, for 2 AA ISAs and 5 WLAN-GW ISAs, a factor of 3 or higher is valid. Additional standby ISAs can be added until the oversubscription limit is reached.
The no form of this command resets the configuration to the default value.
isa-aa-oversubscription-factor 1
This command configures the ISA-AA capacity cost high threshold.
The no form of this command reverts the threshold to the default value.
isa-capacity-cost-high-threshold 4294967295
This command configures the ISA-AA capacity cost low threshold.
The no form of this command reverts the threshold to the default value.
isa-capacity-cost-low-threshold 0
This command enables the system to collect statistics used to derive ISA CPU data plane usage. When enabled, this command impacts the ISA performance.
This command enables the context to configure ISA filter parameters.
This command configures the ISA group to enable cut-through of traffic if an overload event occurs, triggered when the IOM weighted average queues depth exceeds the wa-shared-high-wmark. In this ISA state, packets are cut-through from application analysis but retain subscriber context with default subscriber policy applied.
The no form of this command disables cut-through processing on overload.
no isa-overload-cut-through
This command creates the context to configure an ISA policer. When creating a policer for the first time, both the create and type parameters are required.
The no form of this command reverts to the default.
This command creates a policy template related to transport of accounting messages from the BB-ISA card to the accounting server. It also defines accounting attributes that will be included in accounting messages. The policy template will be instantiated once it is applied to the BB-ISA cards in the nat-group.
The no form of the command removes the policy name from the configuration.
none
This command enables the context to configure ISA service chaining parameters.
The no form of this command disables ISA service chaining parameters.
This command enables the context to configure ISA-based service chaining for subscribers with L2-Aware NAT.
This command specifies the lifetime of the IKE SA.
isakmp-lifetime 86400
This command configures the ISID ranges for which the PE is primary, or uses the lowest preference algorithm.
![]() | Note: Multiple individual ISID values and ranges are allowed. |
The following service-carving manual algorithms are supported for DF election:
This command configures an ISID value or a range of ISID values to be matched by the mac-filter parent. The pbb-etype value for the related SAP (inherited from the ethernet port configuration) or for the related SDP binding (inherited from SDP configuration) will be used to identify the ISID tag.
The no form of this command removes the ISID match criterion.
no isid
This command configures an ISID value or a range of ISID values to be matched by the mrp-policy parent when looking at the related MMRP attributes (Group B-MACs). The pbb-etype value for the related SAP (inherited from the ethernet port configuration) or for the related SDP binding (inherited from SDP configuration) will be used to identify the ISID tag.
Multiple ISID statements are allowed under a match node. The following rules govern the usage of multiple ISID statements:
The no form of the command can be used in two ways:
no isid removes all the previous statements under one match node.
no isid value | from value to higher-value removes a specific ISID value or range. It must match a previously used positive statement: for example if the command isid 16 to 100 was used using no isid 16 to 50 will not work but no isid 16 to 100 will be successful.
no isid
This command configures ISID policies for individual ISIDs or ISID ranges in a B-VPLS using SPBM. The ISIDs may belong to I-VPLS services or may be static-isids defined on this node. Multiple entry statements are allowed under a isid-policy. ISIDs that are declared as static do not require and isid-policy unless the ISIDs are not to be advertised.
isid-policy allows finer control of ISID multicast but is not typically required for SPBM operation. Use of ISID policies can cause additional flooding of multicast traffic.
This command creates a range of ISIDs associated with a specified route-target that is advertised with BMAC-ISID and IMET-ISID routes for the ISID. The route-target can be explicitly configured or automatically assigned by the system if the auto-rt option is configured. Auto routes assignment is based on RFC 7623 as follows:
<2-byte-as-number>:<4-byte-value>, where 4-byte-value = 0x30+ISID
The no form of the command deletes the isid-range and its association with the route-target.
The no form is the default action, which advertises the BMAC-ISID and IMET-ISID routes with the B-VPLS configured route-target.
no isid-range
This command enables the context for the configuration of isid-range to route-target associations.
This command creates the context to configure the Intermediate-System-to-Intermediate-System (IS-IS) protocol instance in the VPRN.
The IS-IS protocol instance is enabled with the no shutdown command in the config>service>vprn>isis context. Alternatively, the IS-IS protocol instance is disabled with the shutdown command in the config>service>vprn>isis context.
IS-IS instances are shutdown when created, so that all parameters can be configured prior to the instance being enabled.
The no form of this command disables the ISIS protocol instance from the given VPRN service.
0
This command monitors commands for the ISIS instance.
This command creates the context to configure the Intermediate-System-to-Intermediate-System (IS-IS) protocol instance.
The IS-IS protocol instance is enabled with the no shutdown command in the config>router>isis context. Alternatively, the IS-IS protocol instance is disabled with the shutdown command in the config>router>isis context.
IS-IS instances are shutdown when created, so that all parameters can be configured prior to the instance being enabled.
The no form of this command deletes the IS-IS protocol instance. Deleting the protocol instance removes all configuration parameters for this IS-IS instance.
This command enables the context to debug IS-IS protocol entities.
Sample output for the command is shown below.