This command specifies the range of indexes used by SROS to automatically assign an index to ETH-CFM associations that are created in model-driven interfaces without an index explicitly specified by the user or client.
An association created with an explicitly-specified index cannot use an index in this range. In classic CLI and SNMP, the ID range cannot be changed while objects exist inside the previous or new range. In MD interfaces, the range can be changed, which causes any previously existing objects in the previous ID range to be deleted and re-created using a new ID in the new range.
The no form of this command removes the range values.
See the md-auto-id command for further details.
This command specifies the MAC address to match.
The no form of this command reverts to the default.
This command assigns a specific MAC address to a VPRN IP interface.
The no form of this command returns the MAC address of the IP interface to the default value.
The physical MAC address associated with the Ethernet interface on which the SAP is configured.
This command shows PPP packets for the specified MAC address.
This command specifies the 48-bit IEEE 802.3 MAC address.
The no form of the command reverts to the default.
none
This command assigns a specific MAC address to an IES IP interface.
For Routed Central Office (CO), a group interface has no IP address explicitly configured but inherits an address from the parent subscriber interface when needed. For example, a MAC will respond to an ARP request when an ARP is requested for one of the IPs associated with the subscriber interface through the group interface.
The no form of this command returns the MAC address of the IP interface to the default value.
The physical MAC address associated with the Ethernet interface that the SAP is configured on (the default MAC address assigned to the interface, assigned by the system).
This command relates to a system configured for Dual Homing in L2-TPSDA. It defines the MAC address used when the system sends out a gratuitous ARP on an active SAP after a ring heals or fails in order to attract traffic from subscribers on the ring with connectivity to that SAP.
The no form of this command reverts to the default.
no mac
This command assigns a specific MAC address to an Ethernet port, Link Aggregation Group (LAG), Ethernet tunnel, or BCP-enabled port or sub-port.
Only one MAC address can be assigned to a port. When multiple mac commands are entered, the last command overwrites the previous command. When the command is issued while the port is operational, IP will issue an ARP, if appropriate, and BPDUs are sent with the new MAC address.
The no form of this command returns the MAC address to the default value.
A default MAC address is assigned by the system from the chassis MAC address pool.
This command assigns a specific MAC address to an Ethernet port, Link Aggregation Group (LAG), Ethernet tunnel, or BCP-enabled port or sub-port.
Only one MAC address can be assigned to a port. When multiple mac commands are entered, the last command overwrites the previous command. When the command is issued while the port is operational, IP will issue an ARP, if appropriate, and BPDUs are sent with the new MAC address.
The no form of this command returns the MAC address to the default value.
no mac
This command configures the proxy ARP or ND MAC address information.
The no form of the command deletes the MAC address.
This command assigns a conditional static MAC address entry to an SPBM B-VPLS SAP/spoke-SDP allowing external MACs for single and multi-homed operation.
For the 7450 ESS or 7750 SR, this command also assigns a conditional static MAC address entry to an EVPN VPLS SAP/spoke-SDP.
Static MACs are used for PBB Epipe and I-VPLS services that may terminate external to SPBM. If this is configured under a Control B-VPLS the interface referenced will not use IS-IS for this neighbor. This may also be configured under a User B-VPLS where the corresponding interface is not supported under the Control B-VPLS.
This command assigns a specific MAC address to an Ipipe SAP.
The no form of this command returns the MAC address of the SAP to the default value.
The physical MAC address associated with the Ethernet interface where the SAP is configured.
This command associates an existing MAC filter policy with the template.
This command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic).
This command associates an existing IP filter policy with the template.
This command adds a protected MAC address entry.
The no form of this command removes the protected MAC address entry.
This command assigns a specific MAC address to a VPLS IP interface.
For Routed Central Office (CO), a group interface has no IP address explicitly configured but inherits an address from the parent subscriber interface when needed. For example, a MAC will respond to an ARP request when an ARP is requested for one of the IPs associated with the subscriber interface through the group interface.
The no form of this command returns the MAC address of the IP interface to the default value.
mac
This command associates an existing IP filter policy with the template.
This command displays ARP host events for a particular MAC address.
This command shows IGMP packets for the specified MAC address.
The no form of this command disables the MAC debugging.
This command shows MLD packets for the specified MAC address.
The no form of this command disables the MAC debugging.
This command displays Subscriber Host Connectivity Verification (SHCV) events for a particular MAC address.
This command assigns a specific MAC address to an IES IP interface.
The no form of this command returns the MAC address of the IP interface to the default value.
The physical MAC address associated with the Ethernet interface that the SAP is configured on (the default MAC address assigned to the interface, assigned by the system).
This command assigns a specific MAC address to an IES IP interface.
The no form of this command returns the MAC address of the IP interface to the default value.
The physical MAC address associated with the Ethernet interface that the SAP is configured on (the default MAC address assigned to the interface, assigned by the system).
This command monitors the counters associated with the specified entry of the specified MAC filter policy.
This command enables MAC filter monitoring. The statistical information for the specified MAC filter entry displays at the configured interval until the configured count is reached.
The first screen displays the current statistics related to the specified MAC filter. The subsequent statistical information listed for each interval is displayed as a delta to the previous display. When the keyword rate is specified, the rate-per-second for each statistic is displayed instead of the delta.
Monitor commands are similar to show commands but only statistical information displays. Monitor commands display the selected statistics according to the configured number of times at the interval specified.
The following output is an example of filter mac information.
This command assigns a specific MAC address to an IP interface. Only one MAC address can be assigned to an IP interface. When multiple mac commands are entered, the last command overwrites the previous command.
The no form of this command returns the MAC address of the IP interface to the default value.
no mac
This command sets an explicit MAC address used by the virtual router instance overriding the VRRP default derived from the VRID.
Changing the default MAC address is useful when an existing HSRP or other non-VRRP default MAC is in use by the IP hosts using the virtual router IP address. Many hosts do not monitor unessential ARPs and continue to use the cached non-VRRP MAC address after the virtual router becomes master of the host’s gateway address.
The mac command sets the MAC address used in ARP responses when the virtual router instance is master. Routing of IP packets with mac-address as the destination MAC is also enabled. The mac setting must be the same for all virtual routers participating as a virtual router or indeterminate connectivity by the attached IP hosts will result. All VRRP advertisement messages are transmitted with mac-address as the source MAC.
The command can be configured in both non-owner and owner vrrp nodal contexts.
The mac command can be executed at any time and takes effect immediately. When the virtual router MAC on a master virtual router instance changes, a gratuitous ARP is immediately sent with a VRRP advertisement message. If the virtual router instance is disabled or operating as backup, the gratuitous ARP and VRRP advertisement message is not sent.
The no form of the command restores the default VRRP MAC address to the virtual router instance.
no mac — The virtual router instance uses the default VRRP MAC address derived from the VRID.
This command displays monitor command statistics for MAC filter entries.
This command monitors statistics for the MAF MAC filter entry.
This command allows the user to configure SSH MAC algorithms for SR OS as an SSH server or an SSH client.
The no form of this command removes the specified mac index.
no mac index
index | mac-name |
200 | hmac-sha2-512 |
210 | hmac-sha2-256 |
215 | hmac-sha1 |
220 | hmac-sha1-96 |
225 | hmac-md5 |
230 | hmac-ripemd160 |
235 | hmac-ripemd160-openssh-com |
240 | hmac-md5-96 |
This command enables the generation of the client MAC address RADIUS attribute.
The no form of this command disables the generation of the client MAC address RADIUS attribute.
This command enables matching on UEs with the specified MAC address.
The no form of this command disables matching on the MAC address.
no mac-address
This command specifies the MAC address of the MEP.
The no form of this command reverts the MAC address of the MEP back to that of the port (if the MEP is on a SAP) or the bridge (if the MEP is on a spoke SDP).
This command specifies the MAC address of the MEP.
The no form of this command reverts to the MAC address of the MEP back to the default, that of the port, since this is SAP based.
no mac-address
This command specifies the MAC address of the MEP.
The no form of this command reverts the MAC address of the MEP back to that of the port (if the MEP is on a SAP) or the bridge (if the MEP is on a spoke).
This command specifies the MAC address of the MEP.
The no form of this command reverts the MAC address of the MEP back to that of the port (if the MEP is on a SAP) or the bridge (if the MEP is on a spoke).
This command assigns a specific MAC address to an IP interface.
The no form of this command returns the MAC address of the IP interface to the default value.
The physical MAC address associated with the Ethernet interface that the SAP is configured on.
This command enables the generation of the client MAC address RADIUS attribute.
no mac-address
This command configures the MAC address for the associated satellite chassis. This MAC address is used to validate the identity of an satellite that attempts to associate with the local host.
The no form of the command deletes the MAC address for the associated satellite.
The mac-advertisement command enables the advertisement in BGP of the learned macs on SAPs and SDP bindings. When the mac-advertisement is disabled, the local macs will be withdrawn in BGP.
mac-advertisement
The mac-criteria based SAP ingress policies are used to select the appropriate ingress queue and corresponding forwarding class for matched traffic.
This command is used to enter the node to create or edit policy entries that specify MAC criteria.
Router implementation will exit on the first match found and execute the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly from most to least explicit.
The no form of this command deletes all the entries specified under this node. When mac-criteria entries are removed from a SAP ingress policy, the mac-criteria is removed from all services where that policy is applied.
This command specifies whether subscriber traffic egressing a LAG SAP has its egress LAG link selected by a function of the MAC destination address instead of the subscriber ID.
This command is only meaningful if subscriber management is enabled and can be configured for a VPLS service.
The no form of this command reverts to the default.
This command specifies whether subscriber traffic egressing a LAG SAP has its egress LAG link selected by a function of the MAC destination address instead of the subscriber ID.
The no form of this command reverts to the default setting.
This command enables the context to configure the BGP EVPN MAC duplication parameters.
This command enables mirroring of packets that match specific entries in an existing MAC filter.
The mac-filter command directs packets which match the defined list of entry IDs to be mirrored to the mirror destination referenced by the mirror-dest-service-id of the mirror-source.
The MAC filter must already exist in order for the command to execute. Filters are configured in the config>filter context. If the MAC filter does not exist, an error will occur. If the filter exists but has not been associated with a SAP or IP interface, an error is not be generated but mirroring will not be enabled (there are no packets to mirror). Once the filter is defined to a SAP or MAC interface, mirroring is enabled.
If the MAC filter is defined as ingress, only ingress packets are mirrored. Ingress mirrored packets are mirrored to the mirror destination prior to any ingress packet modifications.
If the MAC filter is defined as egress, only egress packets are mirrored. Egress mirrored packets are mirrored to the mirror destination after all egress packet modifications.
An entry-id within a MAC filter can only be mirrored to a single mirror destination. If the same entry-id is defined multiple times, an error occurs and only the first mirror-source definition is in effect.
By default, no packets matching any MAC filters are mirrored. Mirroring of MAC filter entries must be explicitly defined.
The no mac-filter command, without the entry keyword, removes mirroring on all entry-id’s within the mac-filter-id.
When the no command is executed with the entry keyword and one or more entry-id’s, mirroring of that list of entry-id’s is terminated within the mac-filter-id. If an entry-id is listed that does not exist, an error will occur and the command will not execute. If an entry-id is listed that is not currently being mirrored, no error will occur for that entry-id and the command will execute normally.
Each entry-id must exist within the mac-filter-id. If the entry-id is renumbered within the MAC filter definition, the old entry-id is removed from the list and the new entry-id will need to be manually added to the list if mirroring is still desired.
If no entry-id entries are specified in the command, mirroring will not occur for that MAC filter ID. The command will have no effect.
This command configures to which normal MAC filters the entry reservation is applied.
This command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic).
filter-id: | 1 to 65535 |
filter-name: | up to 64 characters (filter-name is an alias for input only. The filter-name gets replaced with an id automatically by SROS in the configuration). |
Specifies the MAC filter(s) into which the entries from the specified li-mac-filter are to be inserted. The li-mac-filter and mac-filter must already exist before the association is made. If the normal MAC filter is deleted then the association is also removed (and not re-created if the MAC filter comes into existence in the future).
The no form of this command removes the MAC filter ID from the configuration.
This command enables lawful interception (LI) of packets that match specific entries in an existing MAC filter. Multiple entries can be created using unique entry-id numbers within the filter. The router implementation exits the filter on the first match found and executes the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly from most to least explicit.
An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword will be considered incomplete and hence will be rendered inactive.
An entry-id within an MAC filter can only be intercepted to a single destination. If the same entry-id is defined multiple times, an error occurs and only the first definition is in effect.
The no form of this command removes the specified entry from the IP or MAC filter. Entries removed from the IP or MAC filter are immediately removed from all services or network ports where that filter is applied.
This command enables mirroring of packets that match specific entries in an existing MAC filter.
The mac-filter command directs packets which match the defined list of entry IDs to be mirrored to the mirror destination referenced by the mirror-dest-service-id of the mirror-source.
The MAC filter must already exist in order for the command to execute. Filters are configured in the config>filter context. If the MAC filter does not exist, an error will occur. If the filter exists but has not been associated with a SAP or IP interface, an error is not be generated but mirroring will not be enabled (there are no packets to mirror). Once the filter is defined to a SAP or MAC interface, mirroring is enabled.
If the MAC filter is defined as ingress, only ingress packets are mirrored. Ingress mirrored packets are mirrored to the mirror destination prior to any ingress packet modifications.
If the MAC filter is defined as egress, only egress packets are mirrored. Egress mirrored packets are mirrored to the mirror destination after all egress packet modifications.
An entry-id within a MAC filter can only be mirrored to a single mirror destination. If the same entry-id is defined multiple times, an error occurs and only the first mirror-source definition is in effect.
By default, no packets matching any MAC filters are mirrored. Mirroring of MAC filter entries must be explicitly defined.
The no mac-filter command, without the entry keyword, removes mirroring on all entry-id’s within the mac-filter-id.
When the no command is executed with the entry keyword and one or more entry-id’s, mirroring of that list of entry-id’s is terminated within the mac-filter-id. If an entry-id is listed that does not exist, an error will occur and the command will not execute. If an entry-id is listed that is not currently being mirrored, no error will occur for that entry-id and the command will execute normally.
Each entry-id must exist within the mac-filter-id. If the entry-id is renumbered within the MAC filter definition, the old entry-id is removed from the list and the new entry-id will need to be manually added to the list if mirroring is still desired.
If no entry-id entries are specified in the command, mirroring will not occur for that MAC filter ID. The command will have no effect.
This command, creates a configuration context for the specified MAC filter policy.
The no form of the command deletes the MAC filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.
To create a filter, you must assign a filter ID, however, after it is created, either the filter ID or filter name can be used to identify and reference a filter.
If a name is not specified at creation time, then SR OS assigns a string version of the filter-id as the name.
Filter names may not begin with an integer (0 to 9).
This command configures a management access MAC-filter.
This command enables the context to configure CPM MAC-filter parameters.
This command copies an existing filter entry for a specific filter ID to another filter ID. The copy command is a configuration level maintenance tool used to create new entries using an existing filter policy. If overwrite is not specified, an error will occur if the destination filter entry exists.
This command configures a MAC filter in which the reservation is done through name.
The no form of this command removes the MAC filter name.
This command associates a MAC filter with a specified LI MAC filter through its name.
The no form of this command removes the MAC filter name.
This command specifies the format of MAC address used for matching incoming DHCP DISCOVER against the RADIUS proxy cache.
The no form of this command reverts to the default.
mac-format "aa:"
mac-format: (only when match is equal to mac) | |
like ab: for 00:0c:f1:99:85:b8 | |
or XY- for 00-0C-F1-99-85-B8 | |
or mmmm. for 0002.03aa.abff | |
or xx for 000cf19985b8 |
This command configures the format of the MAC address when reported in Gx, Gy, or NASREQ application message AVPs such as Calling-Station-Id or User-Name.
The no form of this command resets the command to the default setting.
mac-format ab
This command configures how the MAC address is represented by the RADIUS proxy server.
no mac-format "aa:"
mac-format | like ab: for 00:0c:f1:99:85:b8 |
or XY- for 00-0C-F1-99-85-B8 | |
or mmmm. for 0002.03aa.abff | |
or xx for 000cf19985b8 |
This command configures additional methods by which the BNG learns the subscriber host MAC.
This command associates this IPv6 host to the specified IPv4 host through the learned MAC address. A learned MAC from the IPv6 host is associated with the IPv4 host and vice versa.
The no form of this command removes the IP address from the configuration.
This command creates a list of MAC addresses that can be pointed at from the service for a specified IP. The list may contain up to 10 MAC addresses; an empty list is also allowed.
The MAC list allows on-the-fly changes, but a change in the list deletes the proxy entries for all the IPs using that list.
The no form of the command deletes the entire MAC-list. Deleting a MAC list is only possible if it is not referenced in the configuration.
This command associates a previously created MAC list to a dynamic IP. The MAC list is created using the config>service>proxy-arp-nd>mac-list command.
The no form of the command deletes the association of the MAC list and the dynamic IP.
This command configures a MAC list name. The MAC list is composed of a list of MAC addresses and masks, which along with Auto-Learn Mac Protect (ALMP) can be used to exclude certain MACs from being protected in a given object. This is typically used on SAPs and spoke SDPs configured with ALMP where certain MACs must be able to move to other objects (for example, VRRP virtual MACs).
The no form of this command removes the MAC list name.
This command enters the context to configure MAC move attributes. A sustained high re-learn rate can be a sign of a loop somewhere in the VPLS topology. Typically, STP detects loops in the topology, but for those networks that do not run STP, the mac-move feature is an alternative way to protect your network against loops.
When enabled in a VPLS, mac-move monitors the re-learn rate of each MAC. If the rate exceeds the configured maximum allowed limit, it disables the SAP where the source MAC was last seen. The SAP can be disabled permanently (until a shutdown/no shutdown command is executed) or for a length of time that grows linearly with the number of times the specified SAP was disabled. You have the option of marking a SAP as non-blockable in the config>service>vpls>sap>limit-mac-move or config>service>vpls>spoke-sdp>limit-mac-move contexts. This means that when the re-learn rate has exceeded the limit, another (blockable) SAP will be disabled instead.
The mac-move command enables the feature at the service level for SAPs and spoke-SDPs, as only those objects can be blocked by this feature. Mesh SDPs are never blocked, but their re-learn rates (sap-to-mesh/spoke-to-mesh or vice versa) are still measured.
The operation of this feature is the same on the SAP and spoke-SDP. For example, if a MAC address moves from SAP to SAP, from SAP to spoke-SDP, or between spoke-SDPs, one will be blocked to prevent thrashing. If the MAC address moves between a SAP and mesh SDP or spoke-SDP and mesh SDP combinations, the respective SAP or spoke-SDP will be blocked.
mac-move will disable a VPLS port when the number of relearns detected has reached the number of relearns needed to reach the move-frequency in the 5-second interval. For example, when the move-frequency is configured to 1 (relearn per second) mac-move will disable one of the VPLS ports when 5 relearns were detected during the 5-second interval because then the average move-frequency of 1 relearn per second has been reached. This can already occur in the first second if the real relearn rate is 5 relearns per second or higher.
The no form of this command disables MAC move.
When a sap is instantiated using vpls-sap-template, if the MAC move feature is enabled at VPLS level, the command mac-move-level indicates whether the sap should be populated as primary-port, secondary-port or tertiary-port in the instantiated VPLS.
no mac-move-level; SAP is populated as a tertiary-port
This command configures the MAC name for the MAC address. It associates an ASCII name with an IEEE MAC to improve the PBB Epipe configuration. It can also change the dest-BMAC in one place instead of 1000s of Epipe.
This command controls the settings for the MAC notification message.
The mac-notification message must be generated under the following events:
The MAC notification is not sent for the following events:
This command controls the settings for the MAC notification message.
The mac-notification message must be generated under the following events:
The MAC notification is not sent for the following events:
This command determines the existence of an egress SAP binding of a given MAC within a VPLS service.
A mac-ping packet is sent via the data plane.
A mac-ping is forwarded along the flooding domain if no MAC address bindings exist. If MAC address bindings exist, then the packet is forwarded along those paths, provided they are active. A response is generated only when there is an egress SAP binding for that MAC address or if the MAC address is a “local” OAM MAC address associated with the device’s control plan.
A mac-ping reply can be sent using the data plane or the control plane. The return-control option specifies the reply be sent using the control plane. If return-control is not specified, the request is sent using the data plane.
A mac-ping with data plane reply can only be initiated on nodes that can have an egress MAC address binding. A node without a FDB and without any SAPs cannot have an egress MAC address binding, so it is not a node where replies in the data plane are trapped and sent up to the control plane.
A control plane request is responded to via a control plane reply only.
By default, MAC OAM requests are sent with the system or chassis MAC address as the source MAC. The source option allows overriding of the default source MAC for the request with a specific MAC address.
When a source ieee-address value is specified and the source MAC address is locally registered within a split horizon group (SHG), then this SHG membership is used as if the packet originated from this SHG. In all other cases, SHG 0 (zero) is used. If the mac-trace is originated from a non-zero SHG, such packets do not go out to the same SHG.
If the interval is set to 1 second where the timeout value is set to 10 seconds, then the maximum time between message requests is 10 seconds and the minimum is 1 second. This depends upon the receipt of a message reply corresponding to the outstanding message request.
This command disables re-learning of MAC addresses on other SAPs within the VPLS. The MAC address will remain attached to a given SAP for duration of its age-timer.
The age of the MAC address entry in the FDB is set by the age timer. If mac-aging is disabled on a given VPLS service, any MAC address learned on a SAP or SDP with mac-pinning enabled will remain in the FDB on this SAP or SDP forever.
Every event that would otherwise result in re-learning is logged (MAC address; original-SAP; new-SAP).
The no form of the command enables re-learning of MAC addresses.
![]() | Note: MAC addresses learned during DHCP address assignment (DHCP snooping enabled) are not impacted by this command. MAC-pinning for such addresses is implicit. |
no mac-pinning — When a SAP or spoke SDP is part of a Residential Split Horizon Group (RSHG), MAC pinning is activated at creation of the SAP. Otherwise MAC pinning is not enabled by default.
Enabling this command will disable re-learning of MAC addresses on other SAPs within the service. The MAC address will remain attached to a given SAP for duration of its age-timer.
The age of the MAC address entry in the FDB is set by the age timer. If mac-aging is disabled on a given VPLS service, any MAC address learned on a SAP or SDP with mac-pinning enabled will remain in the FDB on this SAP or SDP forever. Every event that would otherwise result in re-learning will be logged (MAC address; original-SAP; new-SAP).
![]() | Note: For 7750 SR and 7450 ESS, MAC addresses learned during DHCP address assignment (DHCP snooping enabled) are not impacted by this command. MAC-pinning for such addresses is implicit. |
When a SAP or spoke SDP is part of a Residential Split Horizon Group (RSHG), MAC pinning is activated at creation of the SAP. Otherwise MAC pinning is not enabled by default.
This command configures MAC address policy groups.
The no form of this command removes the MAC address policy group configuration.
This command populates the FDB with an OAM-type MAC entry indicating the node is the egress node for the MAC address and optionally floods the OAM MAC association throughout the service. The mac-populate command installs an OAM MAC into the service FDB indicating the device is the egress node for a MAC address. The MAC address can be bound to a SAP (the target-sap) or can be associated with the control plane in that any data destined to the MAC address is forwarded to the control plane (CPM). As a result, if the service on the node has neither a FDB nor an egress SAP, then it is not allowed to initiate a mac-populate.
The MAC address that is populated in the FDBs in the provider network is given a type OAM, so that it can be treated distinctly from regular dynamically learned or statically configured MACs. Note that OAM MAC addresses are operational MAC addresses and are not saved in the device configuration. An exec file can be used to define OAM MACs after system initialization.
The force option in mac-populate forces the MAC in the table to be type OAM in the case it already exists as a dynamic, static or an OAM induced learned MAC with some other type binding.
An OAM-type MAC cannot be overwritten by dynamic learning and allows customer packets with the MAC to either ingress or egress the network while still using the OAM MAC entry.
The flood option causes each upstream node to learn the MAC (that is, populate the local FDB with an OAM MAC entry) and to flood the request along the data plane using the flooding domain. The flooded mac-populate request is sent via the data plane.
An age can be provided to age an OAM MAC using a specific interval. By default, OAM MAC addresses are not aged and can be removed with a mac-purge or with an FDB clear operation.
When split horizon group (SHG) is configured, the flooding domain depends on which SHG the packet originates from. The target-sap sap-id value dictates the originating SHG information.
When the target-sap sap-id value is not specified the MAC is bound to the CPM or CFM. The originating SHG is 0 (zero). When the target-sap sap-id value is specified, the originating SHG is the SHG of the target-sap.
:null | port-id | bundle-id | bpgrp-id | lag-id | aps-id | ||
dot1q | port-id | bundle-id | bpgrp-id | lag-id | aps-id | pw-id:[qtag1|cp-conn-prof-id] | ||
qinq | port-id | bundle-id | bpgrp-id | lag-id | pw-id:[qtag1 cp-conn-prof-id].[qtag2 | cp-conn-prof-id] | ||
cp | keyword | ||
conn-prof-id | 1 to 8000 | ||
atm | port-id | aps-id [:vpi/vci | vpi | vpi1.vpi2 | cp.conn-prof-id] | ||
cp | keyword | ||
conn-prof-id | 1 to 8000 | ||
frame | port-id | aps-id:dlci | ||
cisco-hdlc | slot/mda/port.channel | ||
cem | slot/mda/port.channel | ||
ima-grp | bundle-id [:vpi/vci | vpi | vpi1.vpi2 | cp.conn-prof-id] | ||
cp | keyword | ||
conn-prof-id | 1 to 8000 | ||
port-id | slot/mda/port[.channel] esat-id/slot/port pxc-id.sub-port | ||
bundle-id | bundle-type-slot/mda.-bundle-num | ||
bundle | keyword | ||
type | ima | fr | ppp | ||
bundle-num | 1 to 336 | ||
bpgrp-id | bpgrp-type-bpgrp-num | ||
bgrp | keyword | ||
type | ima | ppp | ||
bgrp-num | 1 to 2000 | ||
aps-id | aps-group-id[.channel] | ||
aps | keyword | ||
group-id | 1 to 128 | ||
ccag-id | ccag-id.path-id[cc-type]:cc-id | ||
ccag | keyword | ||
id | 1 to 8 | ||
path-id | a | b | ||
cc-type | .sap-net | .net-sap | ||
cc-id | 1 to 4094 | ||
eth-tunnel | eth-tunnel-id[:eth-tun-sap-id] | ||
id | 1 to 1024 | ||
eth-tun-sap-id | 0 to 4094 | ||
lag-id | lag-id | ||
lag | keyword | ||
id | 1 to 800 | ||
pw-id | pw-id | ||
pw | keyword | ||
id | 1 to 10239 | ||
qtag1 | * | 0 to 4094 | ||
qtag2 | * | null | 0 to 4094 | ||
vpi | 0 to 4095 (NNI) | ||
0 to 255 (UNI) | |||
vci | 1 | 2 | 5 to 65535 | ||
dlci | 16 to 1022 | ||
tunnel-id | tunnel-id.private | public:tag | ||
tunnel | keyword | ||
id | 1 to 16 | ||
tag | 0 to 4094 |
This command configures the unique MAC prefix per ISA and per outside service for all NAT group configured for service-chaining.
The no form of this command removes the MAC prefix from the configuration.
This command indicates if this MAC is protected on the MAC protect list. When enabled, the agent will protect the MAC from being learned or re-learned on a SAP, spoke SDP or mesh SDP that has restricted learning enabled. The MAC protect list is used in conjunction with restrict-protected-src, restrict-unprotected-dst and auto-learn-mac-protect.
The no form of the command reverts to the default.
none
This command removes an OAM-type MAC entry from the FDB and optionally floods the OAM MAC removal throughout the service. A mac-purge can be sent via the forwarding path or via the control plane.
When sending the MAC purge using the data plane, the TTL in the VC label is set to 1.
A MAC address is purged only if it is marked as OAM. A mac-purge request is an HVPLS OAM packet, with the following fields. The Reply Flags is set to 0 (since no reply is expected), the Reply Mode and Reserved fields are set to 0. The Ethernet header has source set to the (system) MAC address, the destination set to the broadcast MAC address. There is a VPN TLV in the FEC Stack TLV to identify the service domain.
If the register option is provided, the R bit in the Address Delete flags is turned on.
The flood option causes each upstream node to be sent the OAM MAC delete request and to flood the request along the data plane using the flooding domain. The flooded mac-purge request is sent via the data plane.
The register option reserves the MAC for OAM testing where it is no longer an active MAC in the FDB for forwarding, but it is retained in the FDB as a registered OAM MAC. Registering an OAM MAC prevents relearns for the MAC based on customer packets. Relearning a registered MAC can only be done through a mac-populate request. The originating SHG is always 0 (zero).
This command specifies the interval between ARP requests sent on this Ipipe SAP. When the SAP is first enabled, an ARP request will be sent to the attached CE device and the received MAC address will be used in addressing unicast traffic to the CE. Although this MAC address will not expire while the Ipipe SAP is enabled and operational, it is verified by sending periodic ARP requests at the specified interval.
The no form of this command restores mac-refresh to the default value.
mac-refresh 14400
This command specifies the number of bits to be considered when performing MAC learning (MAC source) and MAC switching (MAC destination). Specifically, this value identifies how many bits, starting from the beginning of the MAC address are used. For example, if the mask-value of 28 is used, MAC learning only performs a lookup for the first 28 bits of the source MAC address when comparing with existing FDB entries. Then, it installs the first 28 bits in the FDB while zeroing out the last 20 bits of the MAC address. When performing switching in the reverse direction, only the first 28 bits of the destination MAC address are used to perform a FDB lookup to determine the next hop.
The no form of this command switches back to full MAC lookup.
mac-subnet-length 48
This command displays the hop-by-hop path for a destination MAC address within a VPLS.
The MAC traceroute operation is modeled after the IP traceroute utility which uses ICMP echo request and reply packets with increasing TTL values to determine the hop-by-hop route to a destination IP. The MAC traceroute command uses Nokia OAM packets with increasing TTL values to determine the hop-by-hop route to a destination MAC.
In a MAC traceroute, the originating device creates a MAC ping echo request packet for the MAC to be tested with increasing values of the TTL. The echo request packet is sent via the data plane and awaits a TTL exceeded response or the echo reply packet from the device with the destination MAC. The devices that reply to the echo request packets with the TTL exceeded and the echo reply are displayed.
When a source ieee-address value is specified and the source MAC address is locally registered within a split horizon group (SHG), then this SHG membership is used as if the packet originated from this SHG. In all other cases, SHG 0 (zero) is used. Note that if the mac-ping is originated from a non-zero SHG, such packets do not go out to the same SHG.
This variant of the command is only supported in the classic configuration-mode (configure system management-interface configuration-mode classic).
service-id: | 1 to 2147483647 |
svc-name: | up to 64 characters |
If the interval is set to 1 second, and the timeout value is set to 10 seconds, then the maximum time between message requests is 10 seconds and the minimum is 1 second. This depends upon the receipt of a message reply corresponding to the outstanding message request.
This command enables MAC address translation for HLE services.
The no form of this command disables MAC address translation for HLE services.
This command enables the context for MACsec configuration. The MACsec MKA profile can be configured under this command.
This command configures MACsec under this port.
macsec-encrypt
This command allows loopback detection to be enabled and disabled for MLPPP bundles. It is disabled by default. When the magic number option is disabled, the magic number option will not be requested when a member is trying to bring up the LCP layer on a member link; if the remote peer requests this option, it will be rejected. When transmitting echo-requests a magic number of 0 is used. When responding to echo-requests a magic number of 0 is sent.
The magic number option is sent to the remote peer during protocol negotiation. If this option is rejected by the remote peer, the router will bring the link up but will be unable to detect loopbacks since the router will always send a magic number of 0 in the echo messages. If this option is accepted by the remote peer, the router will send echo messages with randomly generated magic-numbers. If the SR receives a config-req with the same magic number that was sent out, the router will calculate a new magic number to use and send out another config-request. If the router is persistently seeing the randomly generated magic number in the received config-req, the router will declare a loopback.
The no form of this command disables the loopback detection.
no magic-number
This command configures the maximum number of retries the LSP primary path should be retried with the LSP Diff-Serv main Class Type (CT).
When an unmapped LSP primary path goes into retry, it uses the main CT until the number of retries reaches the value of the new main-ct-retry-limit parameter. If the path did not come up, it must start using the backup CT at that point in time. By default, this parameter is set to infinite value. The new main-ct-retry-limit parameter has no effect on an LSP primary path which retries due to a failure event.
An unmapped LSP primary path is a path which has never received a Resv in response to the first Path message sent. This can occur when performing a “shut/no-shut” on the LSP or LSP primary path or when the node reboots. An unmapped LSP primary path goes into retry if the retry timer expired or the head-end node received a PathErr message before the retry timer expired.
If the user entered a value of the main-ct-retry-limit parameter that is greater than the value of the LSP retry-limit, the number of retries will still stop when the LSP primary path reaches the value of the LSP retry-limit. In other words, the meaning of the LSP retry-limit parameter is not changed and always represents the upper bound on the number of retries. The unmapped LSP primary path behavior applies to both CSPF and non-CSPF LSPs.
The no form of this command sets the parameter to the default value of zero (0) which means the LSP primary path will retry forever.
no main-ct-retry-limit
This command sets or resets managed address configuration flag for this group-interface. This flag indicates that DHCPv6 is available for address configuration in addition to any address auto-configured using stateless address auto-configuration. See RFC 3315 for additional details.
The no form of this command reverts to the default.
no managed-configuration
This command enables the context to configure managed route parameters.
This command enables the context to configure VLAN ranges to be managed by a management VPLS. The list indicates, for each SAP, the ranges of associated VLANs that are affected when the SAP changes state.
This command is only valid when the VPLS in which it is entered was created as a management VPLS.
This command enters the context to configure VLAN ranges to be managed by a management VPLS. The list indicates, for each SAP, the ranges of associated VLANs that will be affected when the SAP changes state. This managed-vlan-list is not used when STP mode is MSTP in which case the vlan-range is taken from the config>service>vpls>stp>msti configuration.
This command is only valid when the VPLS in which it is entered was created as a management VPLS.
This command enters the node management configuration within VPRN.
This command enables the context to allow access to management servers.
This command enables the context to monitor management-access filters. These filters are configured in the config>system>security>mgmt-access-filter context.
This command creates the context to edit management access filters and to reset match criteria.
Management access filters control all traffic in and out of the CPM. They can be used to restrict management of the router by other nodes outside either specific (sub)networks or through designated ports.
Management filters, as opposed to other traffic filters, are enforced by system software.
The no form of this command removes management access filters from the configuration.
This command enables the context to configure management interface parameters.
This command enables the context for choosing a management interface for hash configuration. The management interfaces are classic-cli, md-cli, netconf, or grpc.
The no form of this command removes the manager configuration.
The no form of this command removes the configured IP address or FQDN of the configured manager.
The no form of this command reverts the destination TCP port for the manager to the default gRPC port (57400).
This command enables the context to manually configure the service-carving algorithm, that is, configure the EVIs or ISIDs for which the PE is DF.
This command configures Security Association (SA) for manual keying. When enabled, the command specifies whether this SA entry is created manually, by the user, or dynamically by the IPsec sub-system.
This command is applicable to prefixes in deterministic NAT (LSN44 and DS-Lite) and static 1:1 NAT (LSN44). In deterministic NAT, its purpose is to split the number of subscribers within the configured prefix over available sequence of outside IP addresses. In static 1:1 NAT, its purpose it to statically map source IPv4 address of an LSN44 subscriber to a configured IPv4 address on the public side.
In deterministic NAT, there are several rules guiding the usage of the map statement:
To modify map statements in classic CLI, the corresponding prefix must be in a shutdown mode.
In classic CLI, map statements can be configured automatically by the system, as soon as the prefix is enabled (no shutdown state) or they can be configured manually by the operator while the prefix is disabled.
In MD-CLI, the map statement must be configured by the operator, but the tools perform nat deterministic calculate-maps command can be used to produce system-generated maps. The calculate-maps command outputs a set of system-generated map statements. The map parameters can then be copied and pasted into an MD-CLI candidate configuration by the operator.
The following is an example of the map statement for the LSN44 case:
Since each outside IP address can accommodate only 128 hosts, the subscribers (IPv4 addresses in LSN44) from the 10.0.0.0/24 prefix will be split and mapped into two outside IP addresses
10.0.0.0 – 10.0.0.127 (10.0.0.0/25) - 192.168.0.1
10.0.0.128 – 10.0.0.255 (10.0.0.128/25) - 192.168.0.2
The first IP address range will be mapped to the ‘to’ address in the map statement => 192.168.0.1. The second IP address range will be mapped into the next consecutive IP address in the pool assuming that this IP address is free. In this case this consecutive address (192.168.0,2) would not be shown in the map statement.
For Deterministic DS-Lite, the example would be:
There are 256 DS-Lite subscribers within the 2001:db8::/56 prefix. Each subscriber will be a /64 IPv6 prefix as dictated by the subscriber-prefix-length command.
Since each outside IP address can accommodate only 128 hosts, the subscribers from the 2001:db8::/56 prefix will be split and mapped into two outside IP addresses
2001:db8:: – 2001:db8:0:7F:: (2001:db8::/57) - 192.168.0.1
2001:db8:0:80:: – 2001:db8:0:FF::(2001:db8:0:FF::/57) - 192.168.0.2
The first IP prefix range will be mapped to the ‘to’ address in the map statement => 192.168.0.1. The second IP prefix range will be mapped into the next consecutive IP address in the pool assuming that this IP address is free. In this case this consecutive address (192.168.0,2) would not be shown in the map statement.
By default in classic CLI only, the system will automatically divide the prefix and create the map statements when the prefix command is enabled (no shutdown). However, this automatic map provisioning can be overruled by manual configuration in classic CLI, and must be provided in MD-CLI..
This command enables/disables support for the map opcode.
no map
This command creates a MAP domain template, which is used to define MAP rules and parameters specific to the MAP domain. A MAP domain represents a set of CEs that share the same default gateway (BR's IPv6 prefix - DMR rule) and a set of basic MAP rules (BMRs). As a bordering node between the IPv6 and IPv4 realm, the BR performs stateless IPv4 and IPv6 translation based on MAP rules.
A MAP domain can be instantiated within a routing context by referencing an existing MAP domain template in the context.
This command instantiates a MAP-T domain within a routing context, assuming that the MAP-T domain template is administratively enabled (no shutdown). When the MAP-T is instantiated, the forwarding for the MAP-T domain is enabled and its routes can be exported in routing protocols.
Multiple MAP-T domains can be instantiated within a routing context.
Interactions:
The referenced MAP domain is defined under the config>service>nat hierarchy.
This command configures the ATM cell mapping for DS-3 channels. The mapping value specifies the cell mapping that is to be used on this ATM interface.
mapping direct
This command specifies the maximum number of UPnP mapping per subscriber.
The no form of the command reverts to the default.
mapping-limit 256
This command provides a CLI context for configuring MAP rules.
This command configures the context for the Segment Routing mapping server feature in an IS-IS instance.
The no form of this command deletes all node SID entries in the IS-IS instance.
This command configures the context for the Segment Routing mapping server feature in an OSPF instance.
The mapping server feature allows the configuration and advertisement in OSPF of the node SID index for OSPF prefixes of routers which are in the LDP domain. This is performed in the router acting as a mapping server and using a prefix-SID sub-TLV within the Extended Prefix Range TLV in OSPF.
The no form of this command deletes all node SID entries in the OSPF instance.
This command remaps the forwarding class and profile state of an egress policed packet that is to be mapped to another forwarding class and profile, where the profile state is that of the resulting profile after the packet has been processed by the egress policer.
The new forwarding class is used to select the egress queue on which the post-policer traffic is placed. The new profile is used to determine the congestion control handling in that queue, specifically the drop tail or slope that is applied to the traffic.
The maps-to command parameters can be overwritten by reissuing the command with a different FC or profile.
The traffic remarking is based on the marking configured for the forwarding class and profile of the traffic after being policed but before it is remapped.
This command enables a watermark notification. If the watermark is set, it generates a notification when the corresponding resource consumption goes above the high percentage. No additional notifications are sent until resource consumption goes under the low watermark, upon which, a notification is sent indicating the high watermark is no longer hit.
The no form of this command disables the watermark notification.
This command configures the IPoE mask.
The no form of this command removes the mask parameters from the configuration.
This string can only contain printable ASCII characters. The “*” character is a wildcard that matches any substring. If a "\" character is masked, use the escape key so it becomes "\\".
This string can only contain printable ASCII characters. The “*” character is a wildcard that matches any substring. If a "\" character is masked, use the escape key so it becomes "\\".
The mask value and the mask type, along with the oid-value configured in the view command, determines the access of each sub-identifier of an object identifier (MIB subtree) in the view.
Each bit in the mask corresponds to a sub-identifier position. For example, the most significant bit for the first sub-identifier, the next most significant bit for the second sub-identifier, and so on. If the bit position on the sub-identifier is available, it can be included or excluded.
For example, the MIB subtree that represents MIB-II is 1.3.6.1.2.1. The mask that catches all MIB-II would be 0xfc or 0b11111100.
Only a single mask may be configured per view and OID value combination. If more than one entry is configured, each subsequent entry overwrites the previous entry.
The no form of this command removes the mask from the configuration.
The mask can be entered either:
![]() | Note: If the number of bits in the bit mask is less than the number of sub-identifiers in the MIB subtree, then the mask is extended with ones until the mask length matches the number of sub-identifiers in the MIB subtree. |
This command enables responses to Internet Control Message Protocol (ICMP) mask requests on the router interface.
If a local node sends an ICMP mask request to the router interface, the mask-reply command configures the router interface to reply to the request.
By default, the router instance replies to mask requests.
The no form of this command disables replies to ICMP mask requests on the router interface.
mask-reply — Specifies to reply to ICMP mask requests.
This command enables responses to ICMP mask requests on the router interface. If a local node sends an ICMP mask request to the router interface, the router interface replies to the request.
By default, the router instance replies to mask requests.
The no form of this command disables replies to ICMP mask requests on the router interface.
mask-reply
This command enables responses to ICMP mask requests on the router interface.
If a local node sends an ICMP mask request to the router interface, the mask-reply command configures the router interface to reply to the request.
The no form of this command disables replies to ICMP mask requests on the router interface.
mask-reply — Replies to ICMP mask requests.
This command allows the master instance to dictate the master down timer (non-owner context only).
no master-int-inherit
This command allows the master instance to dictate the master down timer (non-owner context only).
no master-int-inherit
This command allows the master instance to dictate the master down timer (non-owner context only).
no master-int-inherit
This command enables the virtual router instance to inherit the master VRRP router’s advertisement interval timer which is used by backup routers to calculate the master down timer.
The master-int-inherit command is only available in the non-owner nodal context and is used to allow the current virtual router instance master to dictate the master down timer for all backup virtual routers. The master-int-inherit command has no effect when the virtual router instance is operating as master.
If master-int-inherit is not enabled, the locally configured message-interval must match the master’s VRRP advertisement message advertisement interval field value or the message is discarded.
The no form of the command restores the default operating condition which requires the locally configured message-interval to match the received VRRP advertisement message advertisement interval field value.
no master-int-inherit — The virtual router instance does not inherit the master VRRP router’s advertisement interval timer and uses the locally configured message interval.
This command is used to restrict the local port to never enter the slave state. Use the command to ensure that the 7750 SR never draws synchronization from the attached external device.
This parameter is only effective when the profile is set to g8275dot1-2014.
![]() | Note: The ITU-T G.8275.1 (07/2014) recommendation used the term notSlave for this functionality; however, the IEEE has added this capability into the next edition of the 1588 standard using the term masterOnly. These are equivalent. |
master-only true
This command configures the AARP mode of operation with the peer instance. The modes affect the AARP state machine behavior according to the desired behavior. Minimize-switchover will change AARP state based on Master ISA failure, and be non-revertive in that when the priority ISA returns a switch does not occur, which is optimal for AA flow identification. Inter-chassis efficiency mode considers both priority (revertive) and the endpoint status of the AARP instance and will switch activity in case of EP failure in order to avoid sending all the traffic over the ICL. The priority-based-balance mode will be revertive after a priority master returns to service, but excludes EP status. The master-selection-mode configuration must match on both peer AARP instances, or the AARP operational status will stay down.
master-selection-mode minimize-switchovers
This command specifies in what DHCPv6 option to retrieve the value to be used as lookup key in the RADIUS proxy cache.
The no form of this command reverts to the default.
match mac
This command enables the context to configure the match criterion for a VAS filter entry.
This command configures the match criteria for this IP filter entry.
The no form of this command reverts to the default.
This command creates a match context for this entry. The protocol value specifies which Layer-4 protocol the packet should match.
The no form of this command removes the match context of this entry.
match protocol any
This command creates the context for entering/editing match criteria for the mrp-policy entry. When the match criteria have been satisfied the action associated with the match criteria is executed. In the current implementation just one match criteria (ISID based) is possible in the entry associated with the mrp-policy. Only one match statement can be entered per entry.
The no form of this command removes the match criteria for the entry-id.
This command configures match conditions for the dynamic neighbors.
This command creates context to enter/edit match criteria for a filter entry. When the match criteria is satisfied, the action associated with the entry is executed.
If more than one match parameter (within one match statement) is specified, then all the criteria must be satisfied (AND functional) before the action associated with the match is executed.
Use the match command to display a list of the valid applications.
Match context can consist of multiple match parameters (application, event-number, severity, subject), but multiple match statements cannot be entered per entry.
The no form of this command removes the match criteria for the entry-id.
no match
This command enables the context to configure flow match rules for this AQP entry. A flow matches this AQP entry only if it matches all the match rules defined (logical and of all rules). If no match rule is specified, the entry will match all flows.
This command enables the context to configure session conditions for this entry.
This command enables the context to configure transit prefix policy entry match criteria.
This command configures debugging for traffic match criteria.
This command configures an IP protocol to be used as a nat-classifier match criterion. When the match criteria have been satisfied the action associated with the match criteria is executed.
The no form of the command removes the match criteria for the entry-id.
match protocol udp
This command enables the context to configure match criteria for the filter entry and specifies an Ethernet frame type for the entry.
If more than one match criteria (within one match statement) are configured then all criteria must be satisfied (and function) for a match to occur.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of this command removes the match criteria for the entry.
This command enables context to enter match criteria for LI IPv4 filter and optionally allows specifying protocol value to match on.
If more than one match criterion are configured then all criteria must be satisfied for a match to occur (logical “AND”). Multiple criteria must be configured within a single match context for a given entry.
The no form of this command removes the match criteria for the entry.
Protocol | Protocol ID | Description |
icmp | 1 | Internet Control Message |
igmp | 2 | Internet Group Management |
ip | 4 | IP in IP (encapsulation) |
tcp | 6 | Transmission Control |
egp | 8 | Exterior Gateway Protocol |
igp | 9 | Any private interior gateway (used by Cisco for IGRP) |
udp | 17 | User Datagram |
rdp | 27 | Reliable Data Protocol |
ipv6 | 41 | IPv6 |
ipv6-route | 43 | Routing Header for IPv6 |
ipv6-frag | 44 | Fragment Header for IPv6 |
idrp | 45 | Inter-Domain Routing Protocol |
rsvp | 46 | Reservation Protocol |
gre | 47 | General Routing Encapsulation |
ipv6-icmp | 58 | ICMP for IPv6 |
ipv6-no-nxt | 59 | No Next Header for IPv6 |
ipv6-opts | 60 | Destination Options for IPv6 |
iso-ip | 80 | ISO Internet Protocol |
eigrp | 88 | EIGRP |
ospf-igp | 89 | OSPFIGP |
ether-ip | 97 | Ethernet-within-IP Encapsulation |
encap | 98 | Encapsulation Header |
pnni | 102 | PNNI over IP |
pim | 103 | Protocol Independent Multicast |
vrrp | 112 | Virtual Router Redundancy Protocol |
l2tp | 115 | Layer Two Tunneling Protocol |
stp | 118 | Spanning Tree Protocol |
ptp | 123 | Performance Transparency Protocol |
isis | 124 | ISIS over IPv4 |
crtp | 126 | Combat Radio Transport Protocol |
crudp | 127 | Combat Radio User Datagram |
This command enables context to enter match criteria for LI IPv6 filter and optionally allows specifying IPv6 next-header value to match on.
If more than one match criterion are configured then all criteria must be satisfied for a match to occur (logical “AND”). Multiple criteria must be configured within a single match context for a given entry.
The no form removes the match criteria for the entry.
This command creates a context to configure match criteria for SAP QoS policy match criteria. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criteria (within one match statement) are configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context can consist of multiple match criteria, but multiple match statements cannot be entered per entry.
It is possible that a SAP policy includes the dscp map command, the dot1p map command, and an IP match criteria. When multiple matches occur for the traffic, the order of precedence is used to arrive at the final action. The order of precedence is as follows:
The no form of this command removes the match criteria for the entry-id.
The protocol type such as TCP / UDP / OSPF is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), UDP(17)
Table 83 lists the IP protocols and their respective IDs and descriptions.
Protocol | Protocol ID | Description |
icmp | 1 | Internet Control Message |
igmp | 2 | Internet Group Management |
ip | 4 | IP in IP (encapsulation) |
tcp | 6 | Transmission Control |
egp | 8 | Exterior Gateway Protocol |
igp | 9 | Any private interior gateway (used by Cisco for their IGRP) |
udp | 17 | User Datagram |
rdp | 27 | Reliable Data Protocol |
ipv6 | 41 | IPv6 |
ipv6-route | 43 | Routing Header for IPv6 |
ipv6-frag | 44 | Fragment Header for IPv6 |
idrp | 45 | Inter-Domain Routing Protocol |
rsvp | 46 | Reservation Protocol |
gre | 47 | General Routing Encapsulation |
ipv6-icmp | 58 | ICMP for IPv6 |
ipv6-no-nxt | 59 | No Next Header for IPv6 |
ipv6-opts | 60 | Destination Options for IPv6 |
iso-ip | 80 | ISO Internet Protocol |
eigrp | 88 | EIGRP |
ospf-igp | 89 | OSPFIGP |
ether-ip | 97 | Ethernet-within-IP Encapsulation |
encap | 98 | Encapsulation Header |
pnni | 102 | PNNI over IP |
pim | 103 | Protocol Independent Multicast |
vrrp | 112 | Virtual Router Redundancy Protocol |
l2tp | 115 | Layer Two Tunneling Protocol |
stp | 118 | Schedule Transfer Protocol |
ptp | 123 | Performance Transparency Protocol |
isis | 124 | ISIS over IPv4 |
crtp | 126 | Combat Radio Transport Protocol |
crudp | 127 | Combat Radio User Datagram |
This command creates a context to configure match criteria for ingress SAP QoS policy match IPv6 criteria. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criteria (within one match statement) are configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context can consist of multiple match criteria, but multiple match statements cannot be entered per entry.
It is possible that a SAP ingress policy includes the dscp map command, the dot1p map command, and an IPv6 match criteria. When multiple matches occur for the traffic, the order of precedence is used to arrive at the final action. The order of precedence is as follows:
The no form of this command removes the match criteria for the entry-id.
On the 7750 SR and 7950 XRS, the protocol type such as TCP / UDP / OSPF is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), UDP(17).
This command creates a context for entering/editing match MAC criteria for ingress SAP QoS policy match criteria. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criteria (within one match statement) are configured, all criteria must be satisfied (AND function) before the action associated with the match will be executed.
A match context can consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of this command removes the match criteria for the entry-id.
This command creates a context to configure match criteria for a network QoS policy. When the match criteria have been satisfied, the action associated with it is executed.
If more than one match criteria (within one match statement) are configured, then all criteria must be satisfied before the associated action with the match is executed.
A match context can consist of multiple match criteria, but multiple match statements cannot be entered per entry.
A network QoS policy can include the DSCP map command, the dot1p map command (ingress only), the prec map command (egress only), and an IP match criteria. When multiple matches occur for the traffic, the order of precedence is used to arrive at the final action. The order of precedence is as follows:
The no form of this command removes the match criteria for the entry identifier.
The protocol type is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), and UDP(17).
Protocol | Protocol ID | Description |
icmp | 1 | Internet Control Message |
igmp | 2 | Internet Group Management |
ip | 4 | IP in IP (encapsulation) |
tcp | 6 | Transmission Control |
egp | 8 | Exterior Gateway Protocol |
igp | 9 | Any private interior gateway (used by Cisco for their IGRP) |
udp | 17 | User Datagram |
rdp | 27 | Reliable Data Protocol |
ipv6 | 41 | IPv6 |
ipv6-route | 43 | Routing Header for IPv6 |
ipv6-frag | 44 | Fragment Header for IPv6 |
idrp | 45 | Inter-Domain Routing Protocol |
rsvp | 46 | Reservation Protocol |
gre | 47 | General Routing Encapsulation |
ipv6-icmp | 58 | ICMP for IPv6 |
ipv6-no-nxt | 59 | No Next Header for IPv6 |
ipv6-opts | 60 | Destination Options for IPv6 |
iso-ip | 80 | ISO Internet Protocol |
eigrp | 88 | EIGRP |
ospf-igp | 89 | OSPFIGP |
ether-ip | 97 | Ethernet-within-IP Encapsulation |
encap | 98 | Encapsulation Header |
pnni | 102 | PNNI over IP |
pim | 103 | Protocol Independent Multicast |
vrrp | 112 | Virtual Router Redundancy Protocol |
l2tp | 115 | Layer Two Tunneling Protocol |
stp | 118 | Schedule Transfer Protocol |
ptp | 123 | Performance Transparency Protocol |
isis | 124 | ISIS over IPv4 |
crtp | 126 | Combat Radio Transport Protocol |
crudp | 127 | Combat Radio User Datagram |
This command creates a context to configure match criteria for a network QoS policy match IPv6 criteria. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criteria (within one match statement) are configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context can consist of multiple match criteria, but multiple match statements cannot be entered per entry.
A network policy can include the DSCP map command, the dot1p map command (ingress only), the prec map command (egress only), and an IPv6 match criteria. When multiple matches occur for the traffic, the order of precedence is used to arrive at the final action. The order of precedence is as follows:
The no form of this command removes the match criteria for the entry identifier.
The protocol type is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), and UDP(17).
This command configures the value of the field in the ingress or egress packet which, when matched, will cause the packet to be redirected to the specified queue group instance. The field-value is dependent on the setting of the type and therefore must be a valid VXLAN VNI.
A maximum of 16 match statements are supported in a queue group redirect list.
The no form of this command removes the match statement from the redirect list.
This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied the action associated with the match criteria is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry. More precisely, the command can be entered multiple times but this only results in modifying the protocol-id. and does not affect the underlying match criteria configuration.
The no form of the command removes all the match criteria from the filter entry and sets the protocol-id of the match command to none (keyword). As per above, match protocol none is however not equivalent to no match.
match protocol none
Protocol | Protocol ID | Description |
icmp | 1 | Internet Control Message |
igmp | 2 | Internet Group Management |
ip | 4 | IP in IP (encapsulation) |
tcp | 6 | Transmission Control |
egp | 8 | Exterior Gateway Protocol |
igp | 9 | Any private interior gateway (used by Cisco for IGRP) |
udp | 17 | User Datagram |
rdp | 27 | Reliable Data Protocol |
ipv6 | 41 | IPv6 |
ipv6-route | 43 | Routing Header for IPv6 |
ipv6-frag | 44 | Fragment Header for IPv6 |
idrp | 45 | Inter-Domain Routing Protocol |
rsvp | 46 | Reservation Protocol |
gre | 47 | General Routing Encapsulation |
ipv6-icmp | 58 | ICMP for IPv6 |
ipv6-no-nxt | 59 | No Next Header for IPv6 |
ipv6-opts | 60 | Destination Options for IPv6 |
iso-ip | 80 | ISO Internet Protocol |
eigrp | 88 | EIGRP |
ospf-igp | 89 | OSPFIGP |
ether-ip | 97 | Ethernet-within-IP Encapsulation |
encap | 98 | Encapsulation Header |
pnni | 102 | PNNI over IP |
pim | 103 | Protocol Independent Multicast |
vrrp | 112 | Virtual Router Redundancy Protocol |
l2tp | 115 | Layer Two Tunneling Protocol |
stp | 118 | Spanning Tree Protocol |
ptp | 123 | Performance Transparency Protocol |
isis | 124 | ISIS over IPv4 |
crtp | 126 | Combat Radio Transport Protocol |
crudp | 127 | Combat Radio User Datagram |
sctp | 132 | Stream Control Transmission Protocol |
This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be created per entry. More precisely, the protocol command can be entered multiple times but this only results in modifying the protocol-id. Matching on more than one protocol can be achieved using the protocol-list match criteria in an IP filter policy.
The no form of the command removes all the match criteria from the filter entry and sets the protocol-id of the match command to none. However, match protocol none is not equivalent to no match.
match protocol none
Protocol | Protocol ID | Description |
icmp | 1 | Internet Control Message |
igmp | 2 | Internet Group Management |
ip | 4 | IP in IP (encapsulation) |
tcp | 6 | Transmission Control |
egp | 8 | Exterior Gateway Protocol |
igp | 9 | Any private interior gateway (used by Cisco for IGRP) |
udp | 17 | User Datagram |
rdp | 27 | Reliable Data Protocol |
ipv6 | 41 | IPv6 |
ipv6-route | 43 | Routing Header for IPv6 |
ipv6-frag | 44 | Fragment Header for IPv6 |
idrp | 45 | Inter-Domain Routing Protocol |
rsvp | 46 | Reservation Protocol |
gre | 47 | General Routing Encapsulation |
ipv6-icmp | 58 | ICMP for IPv6 |
ipv6-no-nxt | 59 | No Next Header for IPv6 |
ipv6-opts | 60 | Destination Options for IPv6 |
iso-ip | 80 | ISO Internet Protocol |
eigrp | 88 | EIGRP |
ospf-igp | 89 | OSPFIGP |
ether-ip | 97 | Ethernet-within-IP Encapsulation |
encap | 98 | Encapsulation Header |
pnni | 102 | PNNI over IP |
pim | 103 | Protocol Independent Multicast |
vrrp | 112 | Virtual Router Redundancy Protocol |
l2tp | 115 | Layer Two Tunneling Protocol |
stp | 118 | Spanning Tree Protocol |
ptp | 123 | Performance Transparency Protocol |
isis | 124 | ISIS over IPv4 |
crtp | 126 | Combat Radio Transport Protocol |
crudp | 127 | Combat Radio User Datagram |
sctp | 132 | Stream Control Transmission Protocol |
This command enables the context to enter match criteria for the IPv6 filter exception. When the match criteria have been satisfied, the action associated with the match criteria is executed.
The no form of the command removes all the match criteria from the IPv6 filter exception.
Protocol | Protocol number | Description |
icmp | 1 | Internet Control Message |
igmp | 2 | Internet Group Management |
ip | 4 | IP in IP (encapsulation) |
tcp | 6 | Transmission Control |
egp | 8 | Exterior Gateway Protocol |
igp | 9 | Any private interior gateway (used by Cisco for IGRP) |
udp | 17 | User Datagram |
rdp | 27 | Reliable Data Protocol |
ipv6 | 41 | IPv6 |
idrp | 45 | Inter-Domain Routing Protocol |
rsvp | 46 | Reservation Protocol |
gre | 47 | General Routing Encapsulation |
ipv6- | 58 | for IPv6 |
ipv6-no-nxt | 59 | No Next Header for IPv6 |
iso-ip | 80 | ISO Internet Protocol |
eigrp | 88 | EIGRP |
ospf-igp | 89 | OSPFIGP |
ether-ip | 97 | Ethernet-within-IP Encapsulation |
encap | 98 | Encapsulation Header |
pnni | 102 | PNNI over IP |
pim | 103 | Protocol Independent Multicast |
vrrp | 112 | Virtual Router Redundancy Protocol |
l2tp | 115 | Layer Two Tunneling Protocol |
stp | 118 | Spanning Tree Protocol |
ptp | 123 | Performance Transparency Protocol |
isis | 124 | ISIS over IPv4 |
crtp | 126 | Combat Radio Transport Protocol |
crudp | 127 | Combat Radio User Datagram |
sctp | 132 | Stream Control Transmission Protocol |
This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be created per entry. More precisely, the next-header command can be entered multiple times, but this only results in modifying the protocol-id. Matching on more than one protocol can be achieved using the next-header-list match criteria.
The no form of the command removes all the match criteria from the filter entry and sets the protocol-id of the match command to none. However, match next-header none is not equivalent to no match.
match next-header none
Default Value: none (keyword)
This command creates the context for entering/editing match criteria for the filter entry and specifies an Ethernet frame type for the entry.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
This command creates context to enter/edit match criteria for a filter entry. When the match criteria is satisfied, the action associated with the entry is executed.
If more than one match parameter (within one match statement) is specified, then all the criteria must be satisfied (AND functional) before the action associated with the match is executed.
Use the application command to display a list of the valid applications.
Match context can consist of multiple match parameters (application, event-number, severity, subject), but multiple match statements cannot be entered per entry.
The no form of this command removes the match criteria for the entry-id.
This command configures math criteria for this MAC filter entry.
This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied the action associated with the match criteria is executed. If more than one match criteria (within one match statement) are configured then all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of this command removes the match criteria for the entry-id.
Protocol | Protocol ID | Description |
icmp | 1 | Internet Control Message |
igmp | 2 | Internet Group Management |
ip | 4 | IP in IP (encapsulation) |
tcp | 6 | Transmission Control |
egp | 8 | Exterior Gateway Protocol |
igp | 9 | any private interior gateway (used by Cisco for their IGRP) |
udp | 17 | User Datagram |
rdp | 27 | Reliable Data Protocol |
ipv6 | 41 | IPv6 |
ipv6-route | 43 | Routing Header for IPv6 |
ipv6-frag | 44 | Fragment Header for IPv6 |
idrp | 45 | Inter-Domain Routing Protocol |
rsvp | 46 | Reservation Protocol |
gre | 47 | General Routing Encapsulation |
ipv6-icmp | 58 | ICMP for IPv6 |
ipv6-no-nxt | 59 | No Next Header for IPv6 |
ipv6-opts | 60 | Destination Options for IPv6 |
iso-ip | 80 | ISO Internet Protocol |
eigrp | 88 | EIGRP |
ospf-igp | 89 | OSPFIGP |
ether-ip | 97 | Ethernet-within-IP Encapsulation |
encap | 98 | Encapsulation Header |
pnni | 102 | PNNI over IP |
pim | 103 | Protocol Independent Multicast |
vrrp | 112 | Virtual Router Redundancy Protocol |
l2tp | 115 | Layer Two Tunneling Protocol |
stp | 118 | Spanning Tree Protocol |
ptp | 123 | Performance Transparency Protocol |
isis | 124 | ISIS over IPv4 |
crtp | 126 | Combat Radio Transport Protocol |
crudp | 127 | Combat Radio User Datagram |
This command specifies match criteria for the IP filter entry. This command applies only the 775 SR and 7950 XRS.
The no form of this command removes the match criteria for the entry-id.
The protocol type such as TCP / UDP / OSPF is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), UDP(17).
next-header: | 1 to 42, 45 to 49, 52 to 59, 61 to 255 protocol numbers accepted in DHB |
keywords: | none, crtp, crudp, egp, eigrp, encap, ether-ip, gre, icmp, drp, igmp, igp, ip, ipv6, ipv6-icmp, ipv6-no-nxt, isis, iso-ip, l2tp, spf-igp, pim, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp |
* — udp/tcp wildcard |
This command configures a command or subtree commands in subordinate command levels are specified.
Because the OS exits when the first match is found, subordinate levels cannot be modified with subsequent action commands. More specific action commands should be entered with a lower entry number or in a profile that is evaluated prior to this profile.
All commands below the hierarchy level of the matched command are denied.
The no form of this command removes a match condition.
This command configures match conditions for the dynamic neighbors.
This command enables Option 82 circuit ID on relayed DHCP packet matching. For routed CO, the group interface DHCP relay process is stateful. When packets are relayed to the server the virtual router ID, transaction ID, SAP ID, and client hardware MAC address of the relayed packet are tracked.
When a response is received from the server the virtual router ID, transaction ID, and client hardware MAC address must be matched to determine the SAP on which to send the packet out. In some cases, the virtual router ID, transaction ID, and client hardware MAC address are not guaranteed to be unique.
When the match-circuit-id command is enabled this as part of the key is used to guarantee correctness in our lookup. This is only needed when dealing with an IP aware DSLAM that proxies the client hardware MAC address.
The no form of this command disables Option 82 circuit ID on relayed DHCP packet matching.
This command specifies the type of matching done to identify a host. There are different match-types for PPPoE or IPoE hosts of which a maximum of four can be specified.
The no form of this command reverts to the default.
![]() | Note: The format of remote-id in IPv6 is different that the format of remote-id in IPv4; IPv6 remote-id contains enterprise-id filed that is also honored in matching. |
circuit-id — Specifies to use the circuit ID to match against.
derived-id — Specifies the value extracted by Python script during processing of DHCP Discover/Solicit/Request/Renew/Rebind Messages (client to server bound messages). The value is stored in the DHCP Transaction Cache (DTC) in a variable named alc.dtc.derivedId. This value has a lifespan of a DHCP transaction (a single pair of messages exchanged between the client and the server, for example DHCP Discover and DHCP Offer).
dual-stack-remote-id — Specifies the enterprise-id in IPv6 remote-id is stripped off before LUDB matching is performed. Processing of IPv4 remote-id remains unchanged. This will allow a single host entry in LUDB for dual-stack host where host identification is performed based on the Remote-id field.
encap-tag-separate-range — Specifies the match encapsulation inner and outer tag in two separate ranges.
encap-tag-range — Specifies to match tag ranges for inner and outer tags.
ip — Specifies the source IPv4/IPv6 address of a data-trigger packet.
mac — Specifies to use the MAC address to match against.
option-60 — Specifies to use Option60 to match against.
remote-id — Specifies to use the remote ID to match against.
sap-id — Specifies the SAP ID on which DHCPv4 packet are received. The sap-id is inserted as ALU VSO (82,9,4) by the DHCPv4 relay in router. This is enabled via configuration under the vendor-specific-option CLI hierarchy of the DHCPv4 relay. Since the dhcp-relay configuration is enabled under the group-interface CLI hierarchy, the group-interface and the service-id must be known before the sap-id can be used for LUDB match.
service-id — Specifies the service-id of the ingress SAP for DHCPv4 packets. The service-id is inserted as ALU VSO (82,9,3) by the DHCPv4 relay in router. This is enabled via configuration under the vendor-specific-option CLI hierarchy of the DHCPv4 relay.
string — Specifies the custom string configured under the vendor-specific-option CLI hierarchy of the DHCPv4 relay. The string is inserted as ALU VSO (82,9,5) by the DHCPv4 relay in router. Since the dhcp-relay configuration is enabled under the group-interface CLI hierarchy, the group-interface and the service-id must be known before the string can be used for LUDB match.
system-id — Specifies the system-id of the node name configured under the system>name CLI hierarchy. The system-id is inserted as ALU VSO (82,9,1) by the DHCPv4 relay in router. This is enabled via configuration under the vendor-specific-option CLI hierarchy of the DHCPv4 relay. Since the dhcp-relay configuration is enabled under the group-interface CLI hierarchy, the group-interface and the service-id must be known before the system-id can be used for LUDB match.
This command enables the match list context on a client database. The match list defines the match input used during IPsec’s tunnel setup. If there are multiple inputs configured in the match list, then they all must have matches before the system considers a client entry is a match.
This command is used to enter the context to create or edit match lists used in QoS policies.
This command enables the configuration context for match lists to be used in filter policies (IOM/FP and CPM).
This command enables checking the IKE peer's ID matches the peer's certificate when performing certificate authentication.
no match-peer-id-to-cert
This command specifies which dot1Q tag position dot1P bits in a QinQ encapsulated packet should be used to evaluate dot1P QoS classification.
The match-qinq-dot1p command allows the top or bottom PBits to be used when evaluating the applied sap-ingress QoS policy’s dot1P entries. The top and bottom keywords specify which position should be evaluated for QinQ encapsulated packets.
By default, the bottom-most service delineating dot1Q tag’s dot1P bits are used. Table 89 defines the default behavior for dot1P evaluation when the match-qinq-dot1p command is not executed.
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN-ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | TopQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ/TopQ | TopQ | TopQ PBits |
QinQ/TopQ | TopQ BottomQ | TopQ PBits |
QinQ/TopQ | TopQ BottomQ | BottomQ PBits |
The no form of this command restores the default dot1p evaluation behavior for the SAP.
no match-qinq-dot1p (no filtering based on p-bits)
(top or bottom must be specified to override the default QinQ dot1p behavior)
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN-ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | TopQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ/TopQ | TopQ | TopQ PBits |
QinQ/TopQ | TopQ BottomQ | TopQ PBits |
QinQ/QinQ | TopQ BottomQ | TopQ PBits |
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN-ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | BottomQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ/TopQ | TopQ | TopQ PBits |
QinQ/TopQ | TopQ BottomQ | BottomQ PBits |
QinQ/QinQ | TopQ BottomQ | BottomQ PBits |
This command specifies which Dot1Q tag position Dot1P bits in a QinQ encapsulated packet should be used to evaluate Dot1P QoS classification.
The match-qinq-dot1p command allows the top or bottom PBits to be used when evaluating the applied sap-ingress QoS policy’s Dot1P entries. The top and bottom keywords specify which position should be evaluated for QinQ encapsulated packets.
The setting also applies to classification based on the DE indicator bit.
The no form of this command reverts the dot1p and de bits matching to the default tag.
By default, the bottom most service delineating Dot1Q tags Dot1P bits are used. Table 92 defines the default behavior for Dot1P evaluation.
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | TopQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
QinQ / QinQ | TopQ BottomQ | BottomQ PBits |
no match-qinq-dot1p (no filtering based on p-bits)
(top or bottom must be specified to override the default QinQ dot1p behavior)
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | TopQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
QinQ / QinQ | TopQ BottomQ | TopQ PBits |
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
Null | None | None |
Null | Dot1P (VLAN ID 0) | Dot1P PBits |
Null | Dot1Q | Dot1Q PBits |
Null | TopQ BottomQ | TopQ PBits |
Null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | None (Default SAP) | None |
Dot1Q | Dot1P (Default SAP VLAN ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
QinQ / QinQ | TopQ BottomQ | BottomQ PBits |
Egress SAP Type | Ingress Packet Preserved Dot1P State | Marked (or Remarked) PBits |
Null | No preserved Dot1P bits | None |
Null | Preserved Dot1P bits | Preserved tag PBits remarked using dot1p-value |
Dot1Q | No preserved Dot1P bits | New PBits marked using dot1p-value |
Dot1Q | Preserved Dot1P bits | Preserved tag PBits remarked using dot1p-value |
TopQ | No preserved Dot1P bits | TopQ PBits marked using dot1p-value |
TopQ | Preserved Dot1P bits (used as TopQ and BottomQ PBits) | TopQ PBits marked using dot1p-value, BottomQ PBits preserved |
QinQ | No preserved Dot1P bits | TopQ PBits and BottomQ PBits marked using dot1p-value |
QinQ | Preserved Dot1P bits (used as TopQ and BottomQ PBits) | TopQ PBits and BottomQ PBits marked using dot1p-value |
The QinQ and TopQ SAP PBit/DEI bit marking follows the default behavior defined in the preceding table when qinq-mark-top-only is not specified.
The dot1p dot1p-value command must be configured without the qinq-mark-top-only parameter to remove the TopQ PBits only marking restriction.
A QinQ-encapsulated Ethernet port can have two different sap types:
For a TopQ SAP type, only the outer (top) tag is explicitly specified. For example, sap 1/1/1:10.*
For QinQ SAP type, both inner (bottom) and outer (top) tags are explicitly specified. For example, sap 1/1/1:10.100.
This command specifies which Dot1Q tag position Dot1P bits in a QinQ encapsulated packet should be used to evaluate Dot1P QoS classification.
The match-qinq-dot1p command allows the top or bottom PBits to be used when evaluating the applied sap-ingress QoS policy’s Dot1P entries. The top and bottom keywords specify which position should be evaluated for QinQ encapsulated packets.
The no form of this command restores the default dot1p evaluation behavior for the SAP.
By default, the bottom most service delineating Dot1Q tags Dot1P bits are used. Table 96 defines the default behavior for Dot1P evaluation when the match-qinq-dot1p command is not executed.
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
null | none | none |
null | Dot1P (VLAN-ID 0) | Dot1P PBits |
null | — | Dot1Q PBits |
null | TopQ BottomQ | TopQ PBits |
null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | none (Default SAP) | none |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
QinQ / QinQ | TopQ BottomQ | BottomQ PBits |
no match-qinq-dot1p - No filtering based on p-bits.
top or bottom must be specified to override the default QinQ dot1p behavior.
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
null | none | none |
null | Dot1P (VLAN-ID 0) | Dot1P PBits |
null | Dot1Q | Dot1Q PBits |
null | TopQ BottomQ | TopQ PBits |
null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | none (Default SAP) | none |
Dot1Q | Dot1P (Default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | TopQ PBits |
Port / SAP Type | Existing Packet Tags | PBits Used for Match |
null | none | none |
null | Dot1P (VLAN-ID 0) | Dot1P PBits |
null | Dot1Q | Dot1Q PBits |
null | TopQ BottomQ | BottomQ PBits |
null | TopQ (No BottomQ) | TopQ PBits |
Dot1Q | none (default SAP) | none |
Dot1Q | Dot1P (default SAP VLAN-ID 0) | Dot1P PBits |
Dot1Q | Dot1Q | Dot1Q PBits |
QinQ / TopQ | TopQ | TopQ PBits |
QinQ / TopQ | TopQ BottomQ | BottomQ PBits |
QinQ / QinQ | TopQ BottomQ | BottomQ PBits |
Egress SAP Type | Ingress Packet Preserved Dot1P State | Marked (or Remarked) PBits |
null | no preserved Dot1P bits | none |
null | preserved Dot1P bits | preserved tag PBits remarked using dot1p-value |
Dot1Q | no preserved Dot1P bits | new PBits marked using dot1p-value |
Dot1Q | preserved Dot1P bits | preserved tag PBits remarked using dot1p-value |
TopQ | no preserved Dot1P bits | TopQ PBits marked using dot1p-value |
TopQ | preserved Dot1P bits (used as TopQ and BottomQ PBits) | TopQ PBits marked using dot1p-value, BottomQ PBits preserved |
QinQ | no preserved Dot1P bits | TopQ PBits and BottomQ PBits marked using dot1p-value |
QinQ | preserved Dot1P bits (used as TopQ and BottomQ PBits) | TopQ PBits and BottomQ PBits marked using dot1p-value |
The dot1p dot1p-value command must be configured without the qinq-mark-top-only parameter to remove the TopQ PBits only marking restriction.
This command enables the context to configure RADIUS proxy cache match parameters.
This command configures the session limit of this policy. The session limit is the maximum number of sessions allowed for a subscriber associated with this policy.
max 65535
This command specifies the maximum amount of time the router will continue to forward traffic over a link after the micro-BFD sessions has transitioned to a Down state because it received an ADMIN-DOWN state from the far-end. This timer provide the administrator the configured amount of time to disable or de-provision the micro-BFD session on the local node before forwarding is halted over the associated link(s).
The no form of this command removes the time interval from the configuration.
max-admin-down-time 0
This command specifies the maximum time allowed between sending unsolicited router advertisements from this interface.
The no form of this command reverts to the default.
max-advertisement 1800
This command configures the maximum interval between sending router advertisement messages.
max-advertisement-interval 600
This command configures the maximum interval between sending router advertisement messages.
max-advertisement-interval 600
This command indicates how many hops a BPDU can traverse the network starting from the root bridge. The message age field in a BPDU transmitted by the root bridge is initialized to 0. Each other bridge will take the message_age value from BPDUs received on their root port and increment this value by 1. The message_age therefore reflects the distance from the root bridge. BPDUs with a message age exceeding max-age are ignored.
STP uses the max-age value configured in the root bridge. This value is propagated to the other bridges via the BPDUs.
The no form of this command returns the max age to the default value.
max-age 20
This command configures the maximum number of attempts made to establish a new Diameter Gy session with the Online Charging Server (OCS) when Extended Failure Handling (EFH) is active.
A new attempt is made when the volume or time interim credit of a rating group is consumed or when the validity time expires for a rating group.
When the maximum number of attempts is reached, the user session associated with the Diameter session is terminated (the corresponding subscriber hosts are deleted from the system).
The no form of this command resets the value to the default value.
max-attempts 10
This command configures the maximum number of times that the router will send an access request RADIUS message to the RADIUS server. If a reply is not received from the RADIUS server after the specified number attempts, the 802.1x authentication procedure is considered to have failed.
The no form of this command returns the value to the default.
max-auth-req 2
Sets the exceed, low, high, or highplus Random Early Detection (RED) slope position for the shared buffer average utilization value where the packet discard probability rises directly to one. The percent parameter is expressed as a percentage of the shared buffer size.
The no form of this command restores the max-avg value to the default setting. If the current start-avg setting is larger than the default, an error will occur and the max-avg setting will not be changed to the default.
max-avg 100 - Highplus slope default is 100% buffer utilization before discard probability is 1.
max-avg 90 — High slope default is 90% buffer utilization before discard probability is 1.
max-avg 75 — Low slope default is 75% buffer utilization before discard probability is 1.
max-avg 55 — Exceed slope default is 55% buffer utilization before discard probability is 1.
This command specifies the number of links used to determine the maximum configurable bandwidth that is allowed to be used for this IMA group.
The maximum bandwidth is computed as:
Maximum Configurable ATM Bandwidth (MCAB) =
(number-links) * (M-1)/M * (2048/2049) * primary member link speed
Where: | M is the IMA frame size (128) |
Primary member link speed is either E-1 — 1920 kb/s or DS-1 — 1539 kb/s. E-1 speed is used for a group with no members. |
The total ATM bandwidth of services over shaped VCs cannot exceed the MCAB value as result of adding more services or removing member links.
The no form of this command resets the max-bandwidth to its default value.
max-bandwidth 8
This command configures the maximum bandwidth that auto-bandwidth allocation is allowed to request for an LSP.
The LSP maximum applies whether the bandwidth adjustment is triggered by normal adjust-interval expiry, the overflow limit having been reached, or manual request.
The no form of this command reverts to the default value.
The max-bandwidth must be greater than the min-bandwidth.
max-bandwidth 100000
This command specifies the maximum number of RSVP messages that are sent in the specified period under normal operating conditions.
max-burst 650
This command allows the user to set a maximum number of LSP primary path associations with each manual or dynamic bypass LSP that is created in the system.
By default, a Point of Local Repair (PLR) node will associate a maximum of 1000 primary LSP paths with a given bypass before using the next available manual bypass or signaling a new dynamic bypass.
Note that a new bypass LSP may need to be signaled if the constraint of a given primary LSP path is not met by an existing bypass LSP even if the max-bypass-associations for this bypass LSP has not been reached.
The no form of this command re-instates the default value of this parameter.
no max-bypass-associations
This command enables the configuration of the maximum number of Points of Local Repair (PLRs) per RSVP-TE bypass LSP.
A PLR summarizes the constraints applied to the computation of the path of the bypass LSP. It consists of the avoid link/node constraint, and potentially other TE constraints such as exclude SRLG, that are needed to protect against the failure of the primary path of the RSVP-TE LSP that is associated with this bypass LSP.
Additional PLRs with the same avoid link/node constraint are associated with the same bypass to minimize the number of bypass LSPs created. This command controls the maximum number of such PLRs.
Because MPLS saves only the PLR constraints of the first LSP that triggered the dynamic bypass creation, subsequent LSPs for the same avoid link/node and with the non-strict bypass SRLG disjointness enabled may be associated with the same bypass. This is even in cases where there exists a bypass LSP path that strictly satisfies the SRLG constraint.
When the maximum PLRs per bypass is configured with a value of 1, MPLS triggers the signaling of a new dynamic bypass LSP for each new PLR and saves each PLR constraint separately with its own bypass. As a result, when MPLS re-optimizes a bypass LSP it guarantees that SRLG disjointness of that PLR are checked and enforced.
The no form of this command returns the command to its default value.
max-bypass-plr-associations 16
This command enables the configuration of the maximum number of ATM cells to accumulate into an MPLS packet. The remote peer will also signal the maximum number of concatenated cells it is willing to accept in an MPLS packet. When the lesser of (the configured value and the signaled value) number of cells is reached, the MPLS packet is queued for transmission onto the pseudowire. It is ensured that the MPLS packet MTU conforms to the configured service MTU.
The no form of this command sets max-cells to the value ‘1’ indicating that no concatenation will be performed.
This command configures the maximum number of cleared alarms that the system will store and display.
max-cleared 500
This command is used to configure the maximum number of script run history status entries to keep.
max-completed 1
This command configures the maximum number of control connections by clients with an IP address in a specific prefix. A new control connection is rejected if accepting it would cause either the prefix limit defined by this command or the server limit (max-conn-server) to be exceeded.
The no form of this command returns the value to the default.
max-conn-prefix 32
This command configures the maximum number of TWAMP control connections from all TWAMP clients. A new control connection is rejected if accepting it would cause either this limit or a prefix limit (max-conn-prefix) to be exceeded.
The no form of this command returns the value to the default.
max-conn-server 32
This configures the maximum data size for sFlow UDP datagrams sent to the collector.
To restore default configuration, execute max-data-size 1400.
max-data-size 1400
This command configures the inband control path maximum debounce time.
The no form of this command reverts to the default.
max-debounce-time 10
This command is used to limit how fast a child queue or policer can ‘give up’ bandwidth that it has been allotted from the virtual scheduler in a single iteration. If the child’s new offered rate has decreased by more than the maximum decrement limit, the system ignores the new offered rate and instead uses the old offered rate less the maximum decrement limit.
A possible reason to define a maximum decrement limit is to allow a child queue or policer to hold on to a portion of bandwidth that has been distributed by the parent virtual scheduler in case the child’s offered rate fluctuates in an erratic manor. The max-decrement limit has a dampening effect to changes in the offered rate.
A side effect of using a maximum decrement limit is that unused bandwidth allocated to the child queue or policer will not be given to another child as quickly. This may result in an underrun of the virtual scheduler’s aggregate rate.
The max-decrement limit has no effect on any increase in a child’s offered rate. If the rate increase is above the change sensitivity, the new offered rate is immediately used.
If the max-decrement command is used with a percent-based value, the decrement limit will be a function of the configured PIR value on the policer or queue. In this case, care should be taken that the child is either configured with an explicit PIR rate (other than max) or the child’s administrative PIR is defined using the percent-rate command with the local parameter enabled if an explicit value is not desired. When a maximum PIR is in use on the child, the system attempts to interpret the maximum child forwarding rate. This rate could be very large if the child is associated with multiple ingress or egress ports.
Except for the overall cap on the offered input into the virtual scheduler, the child’s administrative PIR has no effect on the calculated sensitivity if an explicit rate is specified.
If the child’s administrative PIR is modified while a percent based max-decrement is in effect, the system automatically uses the new relative maximum decrement limit value the next time the child’s offered rate is determined.
When the max-decrement command is not specified or removed, the virtual scheduler does not limit a decreasing offered rate to a specific limit.
The no form of this command is used to remove any currently configured maximum decrement limit for all child policers and queues associated with the policy.
This command enables the configuration of the maximum amount of time to wait while performing ATM cell concatenation into an MPLS packet before transmitting the MPLS packet. This places an upper bound on the amount of delay introduced by the concatenation process. When this amount of time is reached from when the first ATM cell for this MPLS packet was received, the MPLS packet is queued for transmission onto the pseudowire.
The no form of this command resets max-delay to its default value.
This command defines the ending queue depth point for a slope relative to the maximum depth of the queue-mbs value of the HSMDA slope policy. At the point the slope ends, it has risen from the starting queue depth value with a discard probability of zero. At max-depth, the slope will have risen to the discard probability defined by max-depth at which point the slope rises directly to a discard probability of 100%.
If the queue depth has reached the point defined by max-depth, all packets associated with the slope will be discarded.
The defined percent-of-queue-depth for max-depth is defined as a percentage of the queue-mbs value. The value defined as the maximum depth must be greater than or equal to the current percentage value for start-depth. If the defined value is less than start-depth, the max-depth command will fail with no change to the current value. If the start-depth value is greater than the desired max-depth value, first change start-depth to a value equal to or less than the desired max-depth.
The no form of this command restores the default ending point percentage value for the slope. The low and high slopes have different default values. If the default value is less than the current start-depth value, the no max-depth command will fail.
This command specifies the maximum length of mapping descriptions made by the PCP servers using this PCP policy.
max-description-size 64
This command configures the number of consecutive SDP keepalive failed request attempts or remote replies that can be missed after which the SDP is operationally downed. If the max-drop-count consecutive keepalive request messages cannot be sent or no replies are received, the SDP-ID will be brought operationally down by the keepalive SDP monitoring.
The no form of this command reverts the max-drop-count count value to the default settings.
max-drop-count 3
This command sets the maximum number of ECMP routes that LDP may use to resolve the next hop for a FEC.
![]() | Note: The system-wide maximum number of ECMP routes is limited by the config>router>ecmp command. This command, under the LDP context, simply allows LDP to use more than 32 routes, if they are available in RTM or TTM. When configured, the actual number of ECMP routes used by LDP is therefore min[config>router>ecmp, config>router>ldp>max-ecmp-routes]. |
The no form of this command reverts to the default value.
max-ecmp-routes 32
This command configures the maximum number of Python cache entries that can be stored in the cache of this Python policy.
If the limit has been reached, a Python exception will be thrown when requested to store another data structure.
The no form of this command reverts to the default.
max-entries 128000
This command configures the number of entries in the buffer.
max-entries 500
This command configures the maximum allowed lifetime for each entry of the Python cache of this Python policy.
When adding data to the Python cache the lifetime of the given object must always be specified. If the specified lifetime is bigger than the configured value, then the value of the max-entry-lifetime will be used instead of the lifetime that was specified.
The no form of this command reverts to the default.
max-entry-lifetime days 1
This command configures the maximum number of consecutive MPLS echo requests that do not receive a reply before the trace operation fails for a TTL.
The no form of this command reverts to the default value.
max-fail 5
This command configures the maximum number of files call trace can create.
max-files-number 200
This command is applicable only to LNS. It determines the maximum fragment delay caused by the transmission that will be imposed on a link.
Fragmentation can be used to interleave high priority packet in-between low priority fragments on a MLPPPoX session with a single link or on a MLPPPoX session with multiple links to better load balance traffic over multiple member links.
no max-fragment-delay
This command configures the maximum number of groups for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of groups, the groups that are already accepted are not deleted. Only new groups will not be allowed.
The no form of this command removes the value.
This command specifies the maximum number of groups for which MLD can have local receiver information based on received MLD reports on this interface. When this configuration is changed dynamically to a value lower than the currently accepted number of groups, the groups that are already accepted are not deleted. Only new groups will not be allowed.
0 (no limit to the number of groups)
This command configures the maximum number of groups for which PIM can have downstream state based on received PIM Joins on this interface. This does not include IGMP local receivers on the interface. When this configuration is changed dynamically to a value lower than the currently accepted number of groups, the groups that are already accepted are not deleted. Only new groups will not be allowed. When this object has a value of 0, there is no limit to the number of groups.
This command specifies the maximum number of groups for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than the currently accepted number of groups, the groups that are already accepted are not deleted. Only new groups will not be allowed. This command is applicable for IPv4 and IPv6.
The no form of the command sets no limit to the number of groups.
no max-groups
This command specifies the maximum number of groups for which MLD can have local receiver information based on received MLD reports on this interface. When this configuration is changed dynamically to a value lower than the currently accepted number of groups, the groups that are already accepted are not deleted. New groups are not allowed.
The no form of this command reverts to the default value.
max-groups 0 (no limit to the number of groups)
This command specifies the maximum number of groups for which PIM can have local receiver information based on received PIM reports on this interface. When this configuration is changed dynamically to a value lower than the currently accepted number of groups, the groups that are already accepted are not deleted. Only new groups will not be allowed. This command is applicable for IPv4 and IPv6.
The no form of this command sets no limit to the number of groups.
no max-groups
This command configures the maximum number of group sources for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources will not be allowed.
The no form of this command reverts to the default.
max-grp-sources 0
This command configures the maximum number of group sources for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources will not be allowed.
The no form of the command reverts to the default.
no max-grp-sources
This command configures the maximum number of group sources for which MLD can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources will not be allowed.
The no form of this command reverts to the default.
max-grp-sources 0 (no limit to the number of sources)
This command configures the maximum number of GTP sessions to be held while their UE is disconnected.
The no form of this command reverts to the default.
max-held-sessions 2000
This command enables the system to keep records of CHILD-SA keys for the corresponding ipsec-gw or ipsec-tunnel. There is a system wide limit of maximum number of IPsec tunnels that save keys. If the number of tunnel exceeds that limit, the system will not save keys for the new tunnels. Check with Nokia support for details of the limitation.
This command is ignored if the config>ipsec>no show-ipsec-keys command is configured.
The no form of this command prevents the system from keeping records.
no max-history-esp-key-records
This command enables system to keep records of IKE-SA keys for the corresponding ipsec-gw or ipsec-tunnel.
This command is ignored if the config>ipsec>no show-ipsec-keys command is configured. There is a system wide limit of maximum number of IPsec tunnels that save keys. If the number of tunnel exceeds that limit, the system will not save keys for the new tunnels. Check with Nokia support for details of the limitation.
The no form of this command prevents the system from keeping records.
no max-history-ike-key-records
After the subscriber requests a fast channel change using RTCP, the video ISA bursts the video content as unicast to the subscriber. When the unicasted content has caught up to the multicast, the video ISA sends a notification message using RTCP to the subscriber to switch over to multicast with an IGMP request. When the notification message from the video ISA is sent, the max-igmp-latency timer starts. The video ISA continues to send unicast video until the max-igmp-latency expires or until the subscriber, using RTCP, informs the video ISA of the exact sequence number to stop (whichever occurs first). The max-igmp-latency is the maximum delay that the multicast router takes to respond and deliver the multicast upon the subscriber IGMP request.
This command specifies the maximum number of HLE BDs for this group interface.
The no form of this command disables HLE for the group interface.
This command configures the maximum lease time.
The no form of this command reverts to the default.
max-lease-time days 10
days | 0 to 3650 |
hours | 0 to 23 |
minutes | 0 to 59 |
seconds | 0 to 59 |
This command specifies the maximum period of time that CCR-T messages for Diameter Gx or Gy sessions that belong to the Diameter application policy are replayed.
The no form of this command resets the maximum lifetime to the default value setting.
max-lifetime 24
This command is applicable only to LNS. It determines the maximum number of links that can be put in a bundle.
Any attempt of a session to join a bundle that is above the max-link limit will be rejected.
If interleaving is configured, it is recommended that max-links be set to 1 or a version of the command is used (no max-links). Both have the same effect.
The configuration under the tunnel hierarchy will override the configuration under the group hierarchy.
The no form of this command limits the number of links in the bundle to 1.
no max-links
This command specifies the number of tunnels or peers that can be in the tunnel-selection-blacklist. If a tunnel or peer needs to be added to the blacklist and the blacklist is full, the system removes the item (tunnel or peer) from the blacklist that was in this blacklist for the longest time.
The no form of this command reverts to the default.
max-list-length unlimited
When a client enters lockout, authentication and ESM host creation is suppressed. A lightweight context maintains the lockout state and the timeouts for the client in lockout. This command allows the number of lockout contexts to be configured per SAP. If the number of existing contexts reaches the configured count, incoming hosts that fail authentication or creation are not subject to lockout, and are retried as normal.
The no form of this command reverts to the default value.
max-lockout-hosts 100
This command specifies the maximum number of allowed MAC addresses on the access side of HLE.
The no form of this command reverts to the default.
max-mac 20
This command specifies the maximum number of allowed MAC in the bridge domain.
The no form of this command reverts to the default.
max-mac 20
This command specifies the maximum number of allowed VM MAC addresses on the access side of HLE.
The no form of this command reverts to the default.
max-mac 20
This command configures the maximum rx message size that can be received.
The no form of this command reverts to the default.
max-msg-size 512
This command specifies the maximum number of FDB entries for both learned and static MAC addresses for this SAP, spoke-SDP, endpoint, or VXLAN instance.
When the configured limit is reached, and discard-unknown-source is enabled for this SAP, spoke-SDP, or static VXLAN instance (see config>service>vpls>sap discard-unknown-source or config>service>vpls>spoke-sdp discard-unknown-source), then packets with unknown source MAC addresses are discarded.
The no form of the command restores the global MAC learning limitations for the SAP or spoke-SDP, or VXLAN instance.
no max-nbr-mac-addr
This command specifies the maximum number of FDB entries for both learned and static MAC addresses for this SAP or spoke SDP.
When the configured limit has been reached, and discard-unknown-source has been enabled for this SAP or spoke SDP (see config>service>vpls>sap discard-unknown-source or config>service>vpls>spoke-sdp discard-unknown-source), packets with unknown source MAC addresses will be discarded.
The no form of the command restores the global MAC learning limitations for the SAP or spoke SDP.
no max-nbr-mac-addr
This command configures the maximum number of lease states installed by the DHCPv6 server function allowed on this interface.
The no form of this command returns the value to the default.
max-nbr-of-leases 8000
This command defines the maximum number of multicast groups that can be joined on this SAP or SDP. If the node receives an IGMP join message that would exceed the configured number of groups, the request is ignored.
The no form of this command reverts to the default value.
no max-num-groups
This command configures the maximum number of multicast groups allowed to be tracked.
The no form of this command disables the check.
no max-num-groups
This command configures the maximum number of multicast groups.
The no form of this command reverts to the default value.
This command configures the maximum number of multicast groups allowed to be tracked.
The no form of this command removes the values from the configuration.
no max-num-groups
This command configures the maximum number of multicast groups allowed to be tracked.
The no form of this command removes the values from the configuration.
This command configures the maximum number of multicast groups that can be joined on an MSAP or SDP. If the router receives an IGMP join message that would exceed the configured number of groups, the request is ignored.
This command defines the maximum number of multicast groups that can be joined. If the router receives a join message that would exceed the configured number of groups, the request is ignored.
The no form of this command reverts to the default.
This command configures the maximum number of multicast groups allowed to be tracked.
The no form of this command removes the values from the configuration.
This command configures the maximum number of multicast groups allowed to be tracked.
The no form of this command removes the values from the configuration.
no max-num-groups
This command configures the maximum groups for PIM snooping.
This command defines the maximum number of multicast groups that can be joined. If the router receives an IGMP join message that would exceed the configured number of groups, the request is ignored.
no max-num-groups
This command configures the maximum number of group sources for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources will not be allowed. When this object has a value of 0, there is no limit to the number of group sources.
The no form of this command removes the value from the configuration.
This command configures the maximum number of group sources for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources will not be allowed. When this object has a value of 0, there is no limit to the number of group sources.
The no form of this command removes the value from the configuration.
This command configures the maximum number of group sources for which MLD can have local receiver information based on received MLD reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources are not allowed. When this object has a value of 0, there is no limit to the number of group sources.
The no form of this command removes the value from the configuration.
This command configures the maximum number of group sources for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of group sources, the group sources that are already accepted are not deleted. Only new group sources are not allowed. When this object has a value of 0, there is no limit to the number of group sources.
The no form of this command removes the value from the configuration.
This command defines the maximum number of multicast SGs that can be joined on this SAP or SDP. If the node receives an IGMP join message that would exceed the configured number of SGs, the request is ignored.
The no form of this command disables the check.
no max-num-grp-sources
This command configures the max number of multicast (S,G)s allowed to be tracked.
The no form of this command disables the check.
no max-num-grp-sources
This command configures the maximum number of multicast sources.
The no form of this command disables the command.
This command configures the maximum number of multicast sources allowed to be tracked per group.
The no form of this command removes the value from the configuration.
This command configures the maximum number of multicast sources allowed per group.
The no form of this command removes the value from the configuration.
This command configures the maximum number of multicast sources allowed to be tracked per group.
The no form of this command removes the value from the configuration.
The no form of this command removes the value from the configuration.
This command configures the maximum number of multicast sources allowed to be tracked per group.
The no form of this command removes the value from the configuration.
This command enables matching only on tunnels that have, at most, the specified number of UEs connected.
max-num-ue 4294967295
This command configures the maximum number of ECMP paths the path discovery attempts to discover for each run every interval minute.
The no form of this command resets the time out to its default value.
no max-path
This command configures a TCA for the counter capturing drops due to the GTP filter maximum payload length. A maximum payload length drop TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating a maximum payload length drop TCA.
none
This command specifies the maximum allowed GTP payload size.
The no form of this command removes this GTP message length filter.
no max-payload-length
This command configures the max peer allowed under this MACsec instance.
![]() | Note: The peer establishment is a race condition and first come first serve. On any security zone, only 32 peers can be supported. See SA Exhaustion Behavior for more details. |
The no form of this command returns the value to the default.
no max-peer
The no form of this command removes the configuration.
This command defines the slopes maximum probability point where the slope ends and the discard probability rises directly to 100%. Together with the max-depth command, the max-prob value defines the end of the slope.
The defined percent-of-discard-probability for max-prob is defined as a percentage of a 100% discard probability. If a value of 75% is defined, near the end of the slope close to 75% of the packets will be discarded. At the end of the slope, the discard probability rises to 100% and all packets are discarded.
Sets the exceed, low, high, or highplus Random Early Detection (RED) slope position for the maximum non-one packet discard probability value before the packet discard probability rises directly to one. The percent parameter is expressed as a percentage of packet discard probability where always discard is a probability of 1. A max-prob value of 80 represents 80% of 1, or a packet discard probability of 0.8.
The no form of this command restores the max-prob value to the default setting.
max-prob 80
This command configures the maximum queue size for each MLPPP class queue for this profile.
This command configures the maximum size for each Frame Relay scheduling class queue for this profile.
max-queue-size 10 — class 0
max-queue-size 50 — class 1
max-queue-size 150 — class 2
max-queue-size 750 — class 3
The max-rate command defines the parent policer’s PIR leaky bucket’s decrement rate. A parent policer is created for each time the policer-control-policy is applied to either a SAP or subscriber instance. Packets that are not discarded by the child policers associated with the SAP or subscriber instance are evaluated against the parent policer’s PIR leaky bucket.
For each packet, the bucket is first decremented by the correct amount based on the decrement rate to derive the current bucket depth. The current depth is then compared to one of two discard thresholds associated with the packet. The first discard threshold (discard-unfair) is applied if the FIR (Fair Information Rate) leaky bucket in the packet’s child policer is in the confirming state. The second discard threshold (discard-all) is applied if the child policer's FIR leaky bucket is in the exceed state. Only one of the two thresholds is applied per packet. If the current depth of the parent policer PIR bucket is less than the threshold value, the parent PIR bucket is in the conform state for that particular packet. If the depth is equal to or greater than the applied threshold, the bucket is in the violate state for the packet.
If the result is “conform,” the bucket depth is increased by the size of the packet (plus or minus the per-packet-offset setting in the child policer) and the packet is not discarded by the parent policer. If the result is “violate,” the bucket depth is not increased and the packet is discarded by the parent policer. When the parent policer discards a packet, any bucket depth increases (PIR, CIR and FIR) in the parent policer caused by the packet are canceled. This prevents packets that are discarded by the parent policer from consuming the child policers PIR, CIR and FIR bandwidth.
The policer-control-policy root max-rate setting may be overridden on each SAP or sub-profile where the policy is applied.
The no form of this command reverts to the default.
max-rate max
This command defines the parent policer’s PIR leaky bucket’s decrement rate. A parent policer is created for each time the policer-control-policy is applied to either a SAP or subscriber instance. Packets that are not discarded by the child policers associated with the SAP or subscriber instance are evaluated against the parent policer’s PIR leaky bucket.
For each packet, the bucket is first decremented by the correct amount based on the decrement rate to derive the current bucket depth. The current depth is then compared to one of two discard thresholds associated with the packet. The first discard threshold (discard-unfair) is applied if the FIR (Fair Information Rate) leaky bucket in the packet’s child policer is in the confirming state. The second discard threshold (discard-all) is applied if the child policer's FIR leaky bucket is in the exceed state. Only one of the two thresholds is applied per packet. If the current depth of the parent policer PIR bucket is less than the threshold value, the parent PIR bucket is in the conform state for that particular packet. If the depth is equal to or greater than the applied threshold, the bucket is in the violate state for the packet.
If the result is “conform,” the bucket depth is increased by the size of the packet (plus or minus the per-packet-offset setting in the child policer) and the packet is not discarded by the parent policer. If the result is “violate,” the bucket depth is not increased and the packet is discarded by the parent policer. When the parent policer discards a packet, any bucket depth increases (PIR, CIR and FIR) in the parent policer caused by the packet are canceled. This prevents packets that are discarded by the parent policer from consuming the child policers PIR, CIR and FIR bandwidth.
The policer-control-policy root max-rate setting may be overridden on each SAP or sub-profile where the policy is applied.
The no form of this command returns the policer-control-policy’s parent policer maximum rate to max.
max-rate max
This command overrides the max-rate parameter found in the port-scheduler-policy associated with the port. When a max-rate is defined at the port or channel level, the port scheduler policies max-rate parameter is ignored.
The egress-scheduler-override max-rate command supports a parameter that allows the override command to restore the default of not having a rate limit on the port scheduler. This is helpful when the port scheduler policy has an explicit maximum rate defined and it is desirable to remove this limit at the port instance.
The no form of this command removes the maximum rate override from the egress port or channels port scheduler context. Once removed, the max-rate parameter from the port scheduler policy associated with the port or channel will be used by the local scheduler context.
This command overrides the max-rate parameters configured in the hsmda-scheduler-policy associated with the egress port or ingress MDA. When a max-rate is defined at the override level, the HSMDA scheduler policy’s max-rate parameter is ignored.
The hsmda-scheduler-override max-rate command supports a max parameter that allows the override command to restore the default of not having a rate limit on the port scheduler. This is helpful when the HSMDA scheduler policy has an explicit maximum rate defined and it is desirable to remove this limit at the port instance.
The no form of this command removes the maximum rate override from the egress port or the ingress MDA scheduler context. Once removed, the max-rate parameter from the HSMDA scheduler policy associated with the port or MDA will be used by the local scheduler context.
This command overrides the max-rate configured in the HS scheduler policy applied to the port egress.
The no form of this command removes the max-rate override from the port egress configuration.
This command, within the SAP ingress and egress contexts, overrides the root arbiter parent policer max-rate that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy max-rate parameter have no effect on the SAP’s parent policer until the override is removed using the no max-rate command within the SAP.
The no form of this command returns the policer-control-policy’s parent policer maximum rate to max.
This command, within the SAP ingress and egress contexts, overrides the root arbiter parent policer max-rate that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy max-rate parameter have no effect on the SAP’s parent policer until the override is removed using the no max-rate command within the SAP.
The no form of this command removes an explicit rate value from the aggregate rate therefore returning it to its default value.
This command, within the SAP ingress and egress contexts, overrides the root arbiter parent policer max-rate that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy max-rate parameter have no effect on the SAP’s parent policer until the override is removed using the no max-rate command within the SAP.
This command, within the SAP ingress and egress contexts, overrides the root arbiter parent policer max-rate that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy max-rate parameter have no effect on the SAP’s parent policer until the override is removed using the no max-rate command within the SAP.
The no form of this command returns the policer-control-policy’s parent policer maximum rate to max.
The max-rate command defines the parent policer’s PIR leaky bucket’s decrement rate. A parent policer is created for each time the policer-control-policy is applied to either a SAP or subscriber instance for the 7450 ESS and 7750 SR, or multiservice site instance for the 7950 XRS. Packets that are not discarded by the child policers associated with the SAP or subscriber or multiservice site instances are evaluated against the parent policer’s PIR leaky bucket.
For each packet, the bucket is first decremented by the correct amount based on the decrement rate to derive the current bucket depth. The current depth is then compared to one of two discard thresholds associated with the packet. The first discard threshold (discard-unfair) is applied if the FIR (Fair Information Rate) leaky bucket in the packet’s child policer is in the confirming state. The second discard threshold (discard-all) is applied if the child policer's FIR leaky bucket is in the exceed state. Only one of the two thresholds is applied per packet. If the current depth of the parent policer PIR bucket is less than the threshold value, the parent PIR bucket is in the conform state for that particular packet. If the depth is equal to or greater than the applied threshold, the bucket is in the violate state for the packet.
If the result is “conform,” the bucket depth is increased by the size of the packet (plus or minus the per-packet-offset setting in the child policer) and the packet is not discarded by the parent policer. If the result is “violate,” the bucket depth is not increased and the packet is discarded by the parent policer. When the parent policer discards a packet, any bucket depth increases (PIR, CIR and FIR) in the parent policer caused by the packet are canceled. This prevents packets that are discarded by the parent policer from consuming the child policers PIR, CIR, and FIR bandwidth.
The policer-control-policy root max-rate setting may be overridden on each SAP or sub-profile where the policy is applied.
The no form of this command returns the policer-control-policy’s parent policer maximum rate to max.
This command defines an explicit maximum frame-based bandwidth limit for the HSMDA scheduler policy scheduler. If a max-rate is defined that is smaller than the port rate, the port will be rate limited to the expressed megabits-per-second value. This command should be used with caution if the policy may be applied on ingress for an HSMDA as the total port ingress rate will be limited to the defined maximum rate.
This command can be executed at any time for any non-default existing HSMDA scheduler policy. When a new maximum rate is given for a policy, the system evaluates all instances of the policy to see if the configured rate is smaller than the available port bandwidth. If the rate is smaller and the maximum rate is not currently overridden on the scheduler instance, the scheduler instance is updated with the new maximum rate value.
The maximum rate value defined in the policy can be overridden on each scheduler instance. If the maximum rate is explicitly defined as an override on a port or ingress HSMDA, the policy’s max-rate value has no effect.
The no form of this command removes an explicit rate value from the HSMDA scheduler policy. When removed, all instances of the scheduler policy on egress ports or ingress HSMDAs are allowed to run at the available line rate unless the instance has a max-rate override in place.
This command defines an explicit maximum frame-based bandwidth limit for the HS scheduler policy scheduler context. If a maximum rate is defined that is smaller than the port rate, the port is rate-limited to the configured megabits per second value. This command can be executed at any time for any non-default existing HS scheduler policy.
The no form of the command removes an explicit rate value from the HS scheduler policy. After the explicit rate value is removed, all instances of the scheduler policy on HSQ egress ports are allowed to run at the available line rate unless the instance has a max rate override in place.
This command defines an explicit maximum frame-based bandwidth limit for the port scheduler policies scheduler context. By default, when a scheduler policy is associated with a port or channel, the instance of the scheduler on the port automatically limits the bandwidth to the lesser of port or channel line rate and a possible egress-rate value (for Ethernet ports). If a max-rate is defined that is smaller than the port or channel rate, the expressed kilobits per second value is used instead. The max-rate command is another way to sub-rate the port or channel. This command can be used on channels only on the 7450 ESS and 7750 SR.
The max-rate command may be executed at any time for an existing port-scheduler-policy. When a new max-rate is given for a policy, the system evaluates all instances of the policy to see if the configured rate is smaller than the available port or channel bandwidth. If the rate is smaller and the maximum rate is not currently overridden on the scheduler instance, the scheduler instance is updated with the new maximum rate value.
The max-rate value defined in the policy may be overridden on each scheduler instance. If the maximum rate is explicitly defined as an override on a port or channel, the policies max-rate value has no effect.
The no form of this command removes an explicit rate value from the port scheduler policy. When removed, all instances of the scheduler policy on egress ports or channel are allowed to run at the available line rate unless the instance has a max-rate override in place.
This command configures the number of retries allowed for this L2TP tunnel while it is established, before its control connection goes down.
The no form of this command removes the value from the configuration.
no max-retries-estab
This command configures the number of retries allowed for this L2TP tunnel while it is not established, before its control connection goes down.
The no form of this command removes the value from the configuration.
no max-retries-not-estab
This command determines the upper limits for total number of routes to be received and accepted by the system. The total number is inclusive of both IPv4 and IPv6 addresses and no differentiation is needed across protocols. It includes the sum of both. Once this limit is reached, the download process stops sending new access-requests until the next download-interval expires.
The no form of this command reverts to the default value.
max-routes 200000
This command limits the duration of the received ETH-ED expected defect window to the lower value of either the received value from the peer or this parameter.
The no form of this command removes the limitation, and any valid defect window value received from a peer MEP in the ETH-ED PDU will be used.
no max-rx-defect-window
This command limits the duration of the received ETH-ED expected defect window to the lower value of either the received value from the peer or this parameter.
The no form of this command removes the limitation, and any valid defect window value received from a peer MEP in the ETH-ED PDU will be used.
no max-rx-defect-window
This command limits the duration of the received ETH-ED expected defect window to the lower value of either the received value from the peer or this parameter.
The no form of this command removes the limitation, and any valid defect window value received from a peer MEP in the ETH-ED PDU will be used.
no max-rx-defect-window
This command limits the duration of the received ETH-ED expected defect window to the lower value of either the received value from the peer or this parameter.
The no form of this command removes the limitation, and any valid defect window value received from a peer MEP in the ETH-ED PDU will be used.
no max-rx-defect-window
This command limits the duration of the received ETH-ED expected defect window to the lower value of either the received value from the peer or this parameter.
The no form of this command removes the limitation, and any valid defect window value received from a peer MEP in the ETH-ED PDU will be used.
no max-rx-defect-window
This command limits the duration of the received ETH-ED expected defect window to the lower value of either the received value from the peer or this parameter.
The no form of this command removes the limitation, and any valid defect window value received from a peer MEP in the ETH-ED PDU will be used.
no max-rx-defect-window
This command configures the maximum number of concurrent TWAMP-Test sessions by clients with an IP address in a specific prefix. A new test session (described by a Request-TW-Session message) is rejected if accepting it would cause either the limit defined by this command or the server limit (max-sess-server) to be exceeded.
The no form of this command returns the value to the default.
max-sess-prefix 32
This command configures the maximum number of concurrent TWAMP-Test sessions across all allowed clients. A new test session (described by a Request-TW-Session message) is rejected if accepting it would cause either the limit defined by this command or a prefix limit (max-sess-prefix) to be exceeded.
The no form of this command returns the value to the default.
max-sess-server 32
This command configures the per-client maximum number of sessions.
The no form of the command reverts to the default value.
max-sessions 256
This command configures the maximum number of PPPoE sessions with the same Agent Circuit ID that can be active on the same SAP or MSAP. The limit is enforced in the discovery phase, prior to PAP or CHAP authentication and is based on the Agent Circuit ID sub-option that is present in the vendor-specific PPPoE access loop identification tag added in PADI and PADR messages by a PPPoE intermediate agent.
When the optional allow-sessions-without-cid keyword is specified, PPPoE sessions without an Agent Circuit ID can be established. The configured sessions limit does not apply to these sessions.
By default, there is no limit for the number of PPPoE sessions with the same Agent Circuit ID that are active on the same SAP or MSAP. Sessions without Agent Circuit ID can be established.
The no form of this command reverts to the default value.
no max-sessions-per-cid
This command sets the maximum PPP sessions that can be opened for a given MAC address.
To enable IPv4 address allocation using the internal DHCPv4 client for multiple PPPoE sessions on a single SAP and having the same MAC address and circuit-ID, the optional CLI parameter allow-same-circuit-id-for-dhcp should be added. The SR OS local DHCP server detects the additional vendor-specific options inserted by the internal DHCPv4 client and use an extended unique key for lease allocation.
The no form of this command reverts to the default value.
This command specifies the maximum amount of time the router will forward traffic over a link that has transitioned from Standby to Active, before the micro-BFD session must be fully established (Up state).
The no form of this command returns the timer value to the default (0) which indicates that forwarding will not start until the BFD session is established.
max-setup-time infinite
This command configures the size for the specified flow table. The OpenFlow switch instance must be shutdown to modify this parameter.
The no form of this command restores the default size.
max-size 1000
This command specifies the maximum number of sources for which IGMP can have local receiver information based on received IGMP reports on this interface. When this configuration is changed dynamically to a value lower than currently accepted number of sources, the sources that are already accepted are not deleted. Only new sources will not be allowed.
This command configures the maximum number of group sources for this group-interface.
This command configures the maximum number of group sources for this interface.
The no form of this command reverts to the default.
no max-sources
This command configures the maximum number of labels which the ingress LER can push for a given SR-TE LSP.
This command is used to allow room to insert additional transport, service, and other labels when packets are forwarded in a given context.
The max-sr-labels label-stack-size value should reflect the desired maximum label stack of the primary path of the SR-TE LSP.
The value in additional-frr-labels labels should reflect additional labels inserted by remote LFA for the backup next-hop of the SR-TE LSP.
The sum of both label values represents the worst case transport of SR label stack size for this SR-TE LSP and is populated by MPLS in the TTM such that services and shortcut applications can check it to decide if a service can be bound or a route can be resolved to this SR-TE LSP.
The maximum label stack supported by the router is always signaled by PCC in the PCEP Open object as part of the as SR-PCE-CAPABILITY TLV. It is referred to as the Maximum Stack Depth (MSD).
In addition, the per-LSP value for the max-sr-labels option, if configured, is signaled by PCC to PCE in the Segment-ID (SID) Depth value in a METRIC object for both a PCE computed LSP and a PCE controlled LSP. PCE will compute and provide the full explicit path with TE-links specified. If there is no path with the number of hops lower than the MSD value, or the Segment-ID (SID) Depth value if signaled, a reply with no path will be returned to PCC.
For a PCC controlled LSP, if the label stack returned by the TE-DB’s hop-to-label translation exceeds the per LSP maximum SR label stack size, the LSP is brought down.
The no form of this command reverts to the default value.
max-sr-labels 6 additional-frr-labels 1
This command configures the maximum number of PCE-initiated SR-TE LSPs that can be created by the router.
The no form of the command sets this value to the default.
max-srte-pce-init-lsps 8191
This command enables accounting and statistical data collection. When applying accounting policies the data, by default, is collected in the appropriate records and written to the designated billing file.
The config>router>mpls>ingr-stats>p2mp-template-lsp>max-stats command is supported on the 7750 SR, 7950 XRS, and with VPLS only on the 7450 ESS.
When the no max-stats command is issued the statistics are still accumulated by the forwarding engine. However, the CPU will not obtain the results and write them to the billing file. If a subsequent max-stats command is issued then the counters written to the billing file include all the traffic while the no max-stats command was in effect.
max-stats
This command configures the maximum suppression parameter for the route damping profile.
This value indicates the maximum time, expressed in minutes, that a route can remain suppressed.
The no form of this command removes the maximum suppression parameter from the damping profile.
no max-suppress
This command includes the maximum throughput as measured in the octet count. This command only applies to the 7750 SR.
The no form of this command excludes the maximum throughput octet count.
This command includes the maximum throughput as measured in the packet count. This command only applies to the 7750 SR.
The no form of this command excludes the maximum throughput packet count.
This command enables the collection of max-throughput statistics.
The no form of this command disables the collection.
no max-throughput-stats
This command includes the timestamp of the maximum throughput. This command only applies to the 7750 SR.
The no form of this command excludes the timestamp.
This command configures time for which an entity (peer or a tunnel) are kept in the blacklist.
The no form of this command reverts to the default.
max-time 5
This command configures the maximum number of hops the path discovery traces in the path of each FEC to be discovered.
The no form of this command resets the time out to its default value.
no max-ttl
This command specifies the time interval before the packet starts transmitting towards the destination. When an IGMP event is encoded and ready to be transported, a buffer for the packet is allocated (if not already existent). The events are written into this buffer. Along with the initial buffer creation, a timer is started. The trigger for the transmission of the packet is either the TX buffer being filled up to 1400 B, or the timer expiry, whichever comes first.
The no form of this command reverts to the default.
This command enables aggregation of flow log messages within a syslog frame. It introduces a delay during which logs are collected in each BB-ISA so they can be sent in a single syslog message to conserve system resources and network bandwidth.
When aggregation is enabled, generation of a syslog frame carrying multiple flow logs is triggered by one of the two events (whichever occurs first):
The no form of the command reverts to the default.
max-tx-delay 3
This command configures the allowed range for the VE-id value: locally configured and received in a NLRI. Configuration of a VE-id higher than the value specified in this command is not allowed.
Also upon reception of a higher VE-id in an NLRI imported in this VPLS instance (RT is the configured import RT) the following action must be taken:
The no form of this command sets the max-ve-id to un-configured. The BGP VPLS status should be administratively down for “no max-ve-id” to be used.
The max-ve-id value can be changed without shutting down bgp-vpls if the newly provisioned value does not conflict with the already configured local VE-ID. If the value of the local-VE-ID is higher than the new max-ve-id value the command is rejected. The operator needs to decrease first the VE-ID before running the command.
The actions taken for other max-ve-id values are as follows:
If the max-ve-id has increased a BGP route refresh is sent to the VPLS community to get the routes which might have been rejected earlier due to max-ve-id check. A max-ve-id value needs to be provisioned for BGP VPLS to be in “no shutdown” state.
no max-ve-id
This command configures the maximum amount of time that BGP waits until it starts advertising IPv4-unicast or IPv6-unicast routes to its BGP peers. For IPv4-unicast routes, seconds is measured from the time when the first peer that supports the IPv4-unicast address family comes up. For IPv6-unicast routes seconds is measured from the time when the first peer that negotiates the IPv6-unicast address family comes up.
The time limit configured by this command should allow sufficient time for all important peers to re-establish their sessions with the restarting router and advertise their complete set of IPv4-unicast or IPv6-unicast routes (followed by the applicable End of RIB marker).
The no form of this command implements the default value, which is three times the value of the min-wait-to-advertise time limit.
no max-wait-to-advertise
This command configures the maximum amount of time that BGP waits until it starts advertising IPv4-unicast or IPv6-unicast routes to its BGP peers. For IPv4-unicast routes, the time limit value is measured from the time when the first peer that supports the IPv4-unicast address family comes up. For IPv6-unicast routes the time limit value is measured from the time when the first peer that negotiates the IPv6-unicast address family comes up.
The time limit configured by this command should allow sufficient time for all important peers to re-establish their sessions with the restarting router and advertise their complete set of IPv4-unicast or IPv6-unicast routes (followed by the applicable End of RIB marker).
The no form of this command implements the default value, which is three times the value of the min-wait-to-advertise time-limit.
no max-wait-to-advertise
This command defines the maximum depth of certificate chain verification. This number is applied system wide.
The no form of this command reverts to the default.
maximum-cert-chain-depth 7
The maximum-client-lead-time (MCLT) is the maximum time that a DHCP server can extend client’s lease time beyond the lease time currently known by the DHCP partner node. In dual-homed environment, the initial lease time for all DHCP clients is by default restricted to MCLT. Consecutive DHCP renews can extend the lease time beyond the MCLT.
The MCLT is a safeguard against IP address/prefix duplication in cases of a lease synchronization failure when local-remote failover model is deployed.
Once the intercommunication link failure between the redundant DHCP servers is detected, the DHCP IP address range configured as remote will not be allowed to start delegating new leases until the MCLT + partner-down-delay intervals expire. This is to ensure that the new lease that was delegated from the local IP address-range/prefix on one node but was never synchronized due to the intercommunication link failure, will expire before the same IP address/prefix is allocated from the remote IP address-range/prefix on the other node.
However, the already existing (and synchronized) lease times can be renewed from the remote IP address range at any time, regardless of the state of the intercommunication link (operational or failed).
Lease synchronization failure can be caused either by a node failure, or a failure of the link over which the DHCP leases are synchronized (intercommunication link). Synchronization failure detection can take up to 3 seconds.
During the failure, the DHCP lease time for the new clients is restricted to MCLT while for the existing clients the lease time will over time (by consecutive DHCP renews) be gradually reduced to the MCLT.
The no form of this command reverts to the default.
maximum-client-lead-time min 10
hrs hours | 1 to 23 |
min minutes | 1 to 59 |
sec seconds | 1 to 59 |
This command configures the maximum number of declined addresses allowed.
The no form of the reverts to the default.
maximum-declined 64
This command specifies the maximum number of remote IPv6 routes that can be held within a VPN routing/ forwarding (VRF) context. The local, host, static and aggregate routes are not counted.
The VPRN service ID must be in a shutdown state in order to modify maximum-routes command parameters.
If the log-only parameter is not specified and the maximum-routes value is set below the existing number of routes in a VRF, then the offending RIP peer (if applicable) is brought down (but the VPRN instance remains up). BGP peering will remain up but the exceeding BGP routes will not be added to the VRF.
The maximum route threshold can dynamically change to increase the number of supported routes even when the maximum has already been reached. Protocols will resubmit their routes which were initially rejected.
The no form of this command disables any limit on the number of routes within a VRF context. Issue the no form of this command only when the VPRN instance is shutdown.
0 or disabled — The threshold will not be raised.
This command specifies the maximum number of RSVP P2MP or LDP P2MP S-PMSI tunnels for the mVPN. When the limit is reached, no more RSVP P2MP S-PMSI or LDP P2MP S-PMSI is created and traffic over the data-threshold will stay on I-PMSI.
10
This command specifies the maximum number of RSVP P2MP or LDP P2MP S-PMSI tunnels for the GTM. When the limit is reached, no more RSVP P2MP S-PMSI or LDP P2MP S-P MSI tunnels are created and traffic over the data-threshold will stay on I-PMSI.
The no form of this command reverts to the default values.
maximum-p2mp-spmsi 10
This command sets ECMP multi-path parameters that apply to all address families for that BGP multi-path. For some address families it is possible to override these settings on a per address family basis.
When multi-path is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
To qualify as a multi-path, a non-best route must meet the following criteria (some criteria are controlled by this command):
The no form of this command disables BGP multi-path.
no maximum-paths
This command sets ECMP multipath parameters that apply to all address families for that BGP multipath. For some address families it is possible to override these settings on a per address family basis.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
The no form of this command disables BGP multipath.
no maximum-paths
This command configures the local maximum recovery time.
The no form of this command returns the default value.
no maximum-recovery-time (which equals a value of 120 seconds)
This command specifies the maximum number of remote routes that can be held within a VPN routing/ forwarding (VRF) context. The local, host, static and aggregate routes are not counted.
The VPRN service ID must be in a shutdown state in order to modify maximum-routes command parameters.
If the log-only parameter is not specified and the maximum-routes value is set below the existing number of routes in a VRF, then the offending RIP peer (if applicable) is brought down (but the VPRN instance remains up). BGP peering will remain up but the exceeding BGP routes will not be added to the VRF.
The maximum route threshold can dynamically change to increase the number of supported routes even when the maximum has already been reached. Protocols will resubmit their routes which were initially rejected.
The no form of this command disables any limit on the number of routes within a VRF context. Issue the no form of this command only when the VPRN instance is shutdown.
0 or disabled — The threshold will not be raised.
This command enables the context to configure a manual override of the Maximum Segment Depths (MSD) that is announced by the router.
This command enables the context to configure a manual override of the Maximum Segment Depths (MSD) that is announced by the router.
This command debugs the state of the most recent invocation of the make-before-break (MBB) functionality.
The no form of the command disables the debugging.
This command implements a new option in the CSPF path computation during a Make-Before-Break (MBB) procedure of an RSVP LSP.
When MPLS performs an MBB for the primary or secondary path of a P2P LSP, or the S2L path of a P2MP LSP, and the new mbb-prefer-current-hops option is enabled in MPLS context, CSPF will select a path, among equal-cost candidate paths, with the most overlapping links with the current path. Normally, CSPF selects the path randomly.
The procedures of the new MBB CSPF path selection apply to LSP without the least-fill option enabled. If the least-fill rule results in a different path, the LSP path will be moved though. Users can still favor stability over least-fill condition by applying a larger value to the parameter least-fill-min-thd under the MPLS context such that a path will only be moved when the difference of the least-available bandwidth becomes significant enough between the most used links in the equal cost paths. If that difference is not significant enough, CSPF will select the path with the most overlapping links instead of selecting a path randomly.
The procedures when the new mbb-prefer-current-hops option is enabled apply to all MBB types. Thus, it applies to the auto-bandwidth MBB, the configuration change MBB, the soft preemption MBB, the TE graceful shutdown MBB, the delayed retry MBB (for SRLG secondary LSP path), the path change MBB, the timer resignal MBB, and the manual resignal MBB.
During the FRR global revertive MBB, CSPF selects a random link among the ones available between the PLR node and the Merge Point node, including the failed link if it has restored in the meantime. These links cannot be checked for overlap with the current path.
The TE graceful shutdown MBB will still avoid the link or node that is in maintenance and the soft preemption MBB will still avoid the link that is overbooked.
For an inter-area LSP, this feature applies to the subset of the path from the ingress LER to the exit ABR.
The procedures of this feature are not applied to a zero bandwidth CSPP LSP, including an auto-bandwidth CSPF LSP while its operational bandwidth is zero, and to a non-CSPF LSP.
This command configures the override for the default Maximum Buffer Size (MBS) for each individual path’s queue. The queues MBS threshold defines the point at which all packets destined for the queue are discarded based on queue depth. The defined threshold also provides context for the queues drop-tail parameter.
The mbs percent-of-pool parameter is defined as a percentage of the total pool size. The system allows the sum of all MBS values to equal more than 100% allowing for oversubscription of the pool.
For the primary-path and secondary-path queues, the mbs percent is applied to a single queue for each path.
The no form of this command is used to restore the path queues default MBS value.
Primary: | 7 |
Secondary: | 40 |
This command configures the maximum size for the queue.
The sum of the MBS for all queues on an egress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer is available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
The no form of this command returns the MBS size to the size as configured in the QoS policy.
The Maximum Burst Size (MBS) command configures the explicit definition of the maximum number of buffers allowed for a specific queue.
The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. Once the queue has exceeded the number of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The sap-ingress context for mbs provides a mechanism for overriding the default maximum size for the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer is available when needed or that the packet’s RED slope does not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
The no form of this command returns the MBS size to the size as configured in the QoS policy.
This command configures the MBS for the QoS policer.
This command overrides definition of the maximum number of buffers allowed for a specific queue. The value is given in bytes or kilobytes and overrides the default value for the context.
The no form of this command returns the queue to its default MBS size.
This command overrides specific attributes of the specified queue’s MBS parameters. The MBS is a mechanism to override the default maximum size for the queue.
The sum of the MBS for all queues on an egress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer is available when needed or that the packets RED slope is not forced the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
If the CBS value is larger than the MBS value, an error will occur, preventing the MBS change.
The no form of this command returns the MBS size assigned to the queue.
mbs default
This command overrides specific attributes of the specified queue’s MBS parameters. The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. Once the queue has exceeded the amount of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS is not guaranteed that a buffer will be available when needed or that the packets RED slope will not force the discard of the packet. Setting correct CBS parameters and controlling CBS over-subscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
The no form of this command returns the MBS assigned to the queue to the default value.
mbs default
This command specifies the maximum burst-size value of this policer.
The no form of this command reverts to its default.
mbs 0
This command configures the policer’s PIR leaky bucket’s high priority violate threshold. The high-prio-only command is applied to the MBS value to derive the bucket’s low priority violate threshold. For ingress, trusted in-profile packets and untrusted high priority packets use the policer’s high priority violate threshold while trusted out-of-profile and untrusted low priority packets use the policer’s low priority violate threshold. At egress, in-profile packets use the policer’s high priority violate threshold and out-of-profile packets use the policer’s low priority violate threshold.
The PIR bucket’s violate threshold represent the maximum burst tolerance allowed by the policer. If the policer’s offered rate is equal to or less than the policer’s defined rate, the PIR bucket depth hovers around the 0 depth with spikes up to the maximum packet size in the offered load. If the offered rate increases beyond the metering rate, the amount of data allowed above the rate is capped by the threshold. The low priority violate threshold provides a smaller burst size for the lower priority traffic associated with the policer. Since all lower priority traffic is discarded at the lower burst tolerance size, the remaining burst tolerance defined by high-prio-only is available for the higher priority traffic.
The policer’s mbs size defined in the QoS policy may be overridden on an sla-profile or SAP where the policy is applied.
The no form of this command reverts the policer to its default MBS size.
This command configures the maximum buffer space override.
The Maximum Burst Size (MBS) command specifies the default maximum buffer size for the template queue. The value is given in kilobytes.
The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. Once the queue has exceeded the amount of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The queue-group or network egress QoS context for mbs provides a mechanism for overriding the default maximum size for the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packets RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
This command applies to egress queue group queues as the queue-delay is only supported on egress queues. This command the queue-delay command are mutually exclusive.
The no form of this command returns the MBS size assigned to the queue to the value.
mbs default
This command, within the SAP ingress and egress policer-overrides contexts, is used to override the sap-ingress and sap-egress QoS policy configured mbs parameter for the specified policer-id.
The no form of this command is used to restore the policer’s mbs setting to the policy defined value.
no mbs
This command overrides specific attributes of the specified queue’s MBS parameters. A queue uses its MBS value to determine whether it has exhausted all of its buffers while enqueuing packets. Once the queue has exceeded the number of buffers allowed by the MBS, all packets are discarded until packets have been drained from the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope associated with a packet. A queue that has not exceeded its MBS is not guaranteed to have buffer available when needed or that the packet’s RED slope will not force the discard of the packet. Setting correct CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
The no form of this command returns the MBS assigned to the queue to the default value.
mbs default
This command, within the SAP ingress and egress policer-overrides contexts, is used to override the sap-ingress and sap-egress QoS policy configured mbs parameter for the specified policer-id.
The no form of this command restores the policer’s mbs setting to the policy defined value.
no mbs
This command, within the SAP ingress and egress policer-overrides contexts, is used to override the sap-ingress and sap-egress QoS policy configured mbs parameter for the specified policer-id.
The no form of this command restores the policer’s mbs setting to the policy defined value.
no mbs
This command overrides specific attributes of the specified queue’s MBS parameters. The MBS is a mechanism to override the default maximum size for the queue.
The sum of the MBS for all queues on an egress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS is not guaranteed that a buffer will be available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
If the CBS value is larger than the MBS value, an error will occur, preventing the MBS change.
The no form of this command returns the MBS assigned to the queue.
mbs default
This command can be used to override specific attributes of the specified queue’s MBS parameters. The MBS is a mechanism to override the default maximum size for the queue.
The sum of the MBS for all queues on an egress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
If the CBS value is larger than the MBS value, an error will occur, preventing the MBS change.
The no form of this command returns the MBS size assigned to the queue.
mbs default
This command, within the SAP ingress and egress policer-overrides contexts, is used to override the sap-ingress and sap-egress QoS policy configured mbs parameter for the specified policer-id.
The no form of this command restores the policer’s mbs setting to the policy defined value.
no mbs
This command can be used to override specific attributes of the specified queue’s MBS parameters. The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. Once the queue has exceeded the amount of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard to queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
If the CBS value is larger than the MBS value, an error will occur, preventing the MBS change.
The no form of this command returns the MBS size assigned to the queue to the value.
mbs default
This command provides a mechanism to configure the maximum burst size for the policer. It is recommended that MBS is configured larger than twice the MTU for the traffic handled by the policer to allow for some burstiness of the traffic. MBS is configurable for single-bucket, dual-bucket bandwidth and flow setup rate policers only.
The no form of this command resets the MBS value to its default.
no mbs
This command is used to configure the policer’s PIR leaky bucket’s high-priority violate threshold. The high-prio-only command is applied to the MBS value to derive the bucket’s low-priority violate threshold. For ingress, trusted in-profile packets and untrusted high-priority packets use the policer’s high-priority violate threshold while trusted out-of-profile and untrusted low-priority packets use the policer's low-priority violate threshold. At egress, inplus-profile, and in-profile packets use the policer’s high-priority violate threshold and out-of-profile packets use the policer's low-priority violate threshold. Exceed-profile packets are discarded unless enable-exceed-pir is configured, in which case they are forwarded.
The PIR bucket’s violate threshold represents the maximum burst tolerance allowed by the policer. If the policer's offered rate is equal to or less than the policer's defined rate, the PIR bucket depth hovers around the 0 depth with spikes up to the maximum packet size in the offered load. If the offered rate increases beyond the metering rate, the amount of data allowed above the rate is capped by the threshold. The low-priority violate threshold provides a smaller burst size for the lower priority traffic associated with the policer. Since all lower priority traffic is discarded at the lower burst tolerance size, the remaining burst tolerance defined by high-prio-only is available for the higher priority traffic.
The policer’s MBS size defined in the QoS policy may be overridden on an SLA profile or SAP where the policy is applied.
The no form of this command returns the queue to its default MBS size.
By default, the MBS is 16 Mbytes when PIR equals max or is greater than or equal to the FP capacity (this overrides an explicit configured MBS value); otherwise, 10 ms volume of traffic for a configured non-zero/non-max PIR capped to 3968 kbytes, with a minimum of 256 bytes.
This command configures the maximum number of buffers allowed for a specific queue. The value is given in bytes or kilobytes and overrides the default value for the context.
The no form of this command returns the policer to its default MBS.
no mbs
The Maximum Burst Size (mbs) command specifies the relative amount of the buffer pool space for the maximum buffers for a specific HSMDA queue.
The MBS value is used by a queue to determine whether it has exhausted its total allowed buffers while enqueuing packets. When the queue has exceeded its maximum number of buffers, all packets are discarded until the queue transmits a packet. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard against queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of the network queues.
The no form of the command returns the MBS size for the queue to the default for the forwarding class.
This command specifies the relative amount of buffer pool space for the maximum buffers for a specific ingress network FP forwarding class queue or egress network port forwarding class queue. The value is entered as a percentage.
The MBS value is used by a queue to determine whether it has exhausted its total allowed buffers while enqueuing packets. When the queue has exceeded its maximum amount of buffers, all packets are discarded until the queue transmits a packet. A queue that has not exceeded its MBS is not guaranteed to have a buffer available when needed or that the packet’s RED slope will not force the discard of the packet. In order to safeguard against queue starvation (when a queue does not receive its fair share of buffers), set proper CBS parameters and control CBS oversubscription. Another safeguard is to properly set the RED slope parameters for the needs of the network queues.
The MBS can sometimes be smaller than the CBS. This will result in a portion of the CBS for the queue to be unused and should be avoided.
The no form of this command returns the MBS for the queue to the default for the forwarding class.
The mbs value is used to calculate the queue’s MBS size based on the total amount buffer space allocated for the buffer pool on the egress network port or channel. This buffer pool size will dynamically fluctuate based on the port or channels egress pool size setting.
The total MBS settings for all network egress queues on the port or channel based on the total percentages can exceed 100 percent. Some over-subscription can be desirable to allow exceptionally busy forwarding classes more access to buffer space. The proper use of CBS settings will ensure that oversubscribing MBS settings will not starve other queues of buffers when needed.
The mbs value is used to calculate the queue’s MBS size based on the total amount buffer space allocated for the network ingress buffer pool on the FP. This buffer pool will dynamically fluctuate based on the sum of all ingress pool sizes for all network ports and channels on the FP.
The total MBS settings for all network egress queues on the port or channel based on the total percentages can exceed 100 percent. Some over-subscription can be desirable to allow exceptionally busy forwarding classes more access to buffer space. The proper use of CBS settings will ensure that oversubscribing MBS settings will not starve other queues of buffers when needed.
This command specifies the default maximum buffer size for the template queue in bytes or kilobytes.
The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. When the queue has exceeded the amount of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The port>ethernet>access>ingress>queue-group and port>ethernet>access>egress>queue-group contexts for mbs provides a mechanism for overriding the default maximum size for the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope that a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard against queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
When configured on an egress queue group queue, this command and the queue-delay command are mutually exclusive. In order to change between the mbs and queue-delay parameters, the current parameter must be removed before adding the new parameter; that is, changing from mbs to queue-delay requires a no mbs before the queue-delay is configured and changing from queue-delay to mbs requires a no queue-delay before the mbs is configured. If queue-delay is configured for an egress queue group queue, it is not possible to override the MBS for that queue.
For policers, this command is used to configure the policer’s PIR leaky bucket’s high-priority violate threshold. The high-prio-only command is applied to the MBS value to derive the bucket’s low-priority violate threshold.
At ingress, trusted in-profile packets and untrusted high-priority packets use the policer’s high-priority violate threshold while trusted out-of-profile and untrusted low-priority packets use the policer's low-priority violate threshold.
At egress, inplus-profile and in-profile packets use the policer’s high-priority violate threshold and out-of-profile packets use the policer's low-priority violate threshold. Exceed-profile packets are discarded unless enable-exceed-pir is configured, in which case they are forwarded.
The PIR bucket’s violate threshold represents the maximum burst tolerance allowed by the policer. If the policer's offered rate is equal to or less than the policer's defined rate, the PIR bucket depth hovers around the 0 depth with spikes up to the maximum packet size in the offered load. If the offered rate increases beyond the metering rate, the amount of data allowed above the rate is capped by the threshold. The low-priority violate threshold provides a smaller burst size for the lower priority traffic associated with the policer. Since all lower priority traffic is discarded at the lower burst tolerance size, the remaining burst tolerance defined by high-prio-only is available for the higher priority traffic.
The policer’s mbs size defined in the QoS policy may be overridden on an SLA profile or SAP where the policy is applied.
The no form of this command returns the MBS size assigned to the queue to the value.
default
This command specifies the default maximum buffer size for the template queue in bytes or kilobytes.
The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. When the queue has exceeded the amount of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The port>ethernet>access>ingress>queue-group and port>ethernet>access>egress>queue-group contexts for mbs provides a mechanism for overriding the default maximum size for the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope that a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard against queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
When configured on an egress queue group queue, this command and the queue-delay command are mutually exclusive. In order to change between the mbs and queue-delay parameters, the current parameter must be removed before adding the new parameter; that is, changing from mbs to queue-delay requires a no mbs before the queue-delay is configured and changing from queue-delay to mbs requires a no queue-delay before the mbs is configured. If queue-delay is configured for an egress queue group queue, it is not possible to override the MBS for that queue.
For policers, this command is used to configure the policer’s PIR leaky bucket’s high-priority violate threshold. The high-prio-only command is applied to the MBS value to derive the bucket’s low-priority violate threshold.
At ingress, trusted in-profile packets and untrusted high-priority packets use the policer’s high-priority violate threshold while trusted out-of-profile and untrusted low-priority packets use the policer's low-priority violate threshold.
At egress, inplus-profile and in-profile packets use the policer’s high-priority violate threshold and out-of-profile packets use the policer's low-priority violate threshold. Exceed-profile packets are discarded unless enable-exceed-pir is configured, in which case they are forwarded.
The PIR bucket’s violate threshold represents the maximum burst tolerance allowed by the policer. If the policer's offered rate is equal to or less than the policer's defined rate, the PIR bucket depth hovers around the 0 depth with spikes up to the maximum packet size in the offered load. If the offered rate increases beyond the metering rate, the amount of data allowed above the rate is capped by the threshold. The low-priority violate threshold provides a smaller burst size for the lower priority traffic associated with the policer. Since all lower priority traffic is discarded at the lower burst tolerance size, the remaining burst tolerance defined by high-prio-only is available for the higher priority traffic.
The policer’s mbs size defined in the QoS policy may be overridden on an SLA profile or SAP where the policy is applied.
The no form of this command returns the MBS size assigned to the queue to the value.
default
This command specifies the default maximum buffer size for the template queue in bytes or kilobytes.
The MBS value is used by a queue to determine whether it has exhausted all of its buffers while enqueuing packets. When the queue has exceeded the amount of buffers allowed by MBS, all packets are discarded until packets have been drained from the queue.
The port>ethernet>access>ingress>queue-group and port>ethernet>access>egress>queue-group contexts for mbs provides a mechanism for overriding the default maximum size for the queue.
The sum of the MBS for all queues on an ingress access port can oversubscribe the total amount of buffering available. When congestion occurs and buffers become scarce, access to buffers is controlled by the RED slope that a packet is associated with. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed or that the packet’s RED slope will not force the discard of the packet. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard against queue starvation (when a queue does not receive its fair share of buffers). Another is properly setting the RED slope parameters for the needs of services on this port or channel.
When configured on an egress queue group queue, this command and the queue-delay command are mutually exclusive. In order to change between the mbs and queue-delay parameters, the current parameter must be removed before adding the new parameter; that is, changing from mbs to queue-delay requires a no mbs before the queue-delay is configured and changing from queue-delay to mbs requires a no queue-delay before the mbs is configured. If queue-delay is configured for an egress queue group queue, it is not possible to override the MBS for that queue.
For policers, this command is used to configure the policer’s PIR leaky bucket’s high-priority violate threshold. The high-prio-only command is applied to the MBS value to derive the bucket’s low-priority violate threshold.
At ingress, trusted in-profile packets and untrusted high-priority packets use the policer’s high-priority violate threshold while trusted out-of-profile and untrusted low-priority packets use the policer's low-priority violate threshold.
At egress, inplus-profile and in-profile packets use the policer’s high-priority violate threshold and out-of-profile packets use the policer's low-priority violate threshold. Exceed-profile packets are discarded unless enable-exceed-pir is configured, in which case they are forwarded.
The PIR bucket’s violate threshold represents the maximum burst tolerance allowed by the policer. If the policer's offered rate is equal to or less than the policer's defined rate, the PIR bucket depth hovers around the 0 depth with spikes up to the maximum packet size in the offered load. If the offered rate increases beyond the metering rate, the amount of data allowed above the rate is capped by the threshold. The low-priority violate threshold provides a smaller burst size for the lower priority traffic associated with the policer. Since all lower priority traffic is discarded at the lower burst tolerance size, the remaining burst tolerance defined by high-prio-only is available for the higher priority traffic.
The policer’s mbs size defined in the QoS policy may be overridden on an SLA profile or SAP where the policy is applied.
The no form of this command returns the MBS size assigned to the queue to the value.
default
This command specifies the relative amount of the buffer pool space for the maximum buffers for a specific ingress shared queue.
The MBS value is used by a queue to determine whether it has exhausted its total allowed buffers while enqueuing packets. When the queue has exceeded its maximum amount of buffers, all packets are discarded until the queue transmits a packet. A queue that has not exceeded its MBS size is not guaranteed that a buffer will be available when needed. Setting proper CBS parameters and controlling CBS oversubscription is one major safeguard against queue starvation (when a queue does not receive its fair share of buffers).
The MBS size can sometimes be smaller than the CBS. This will result in a portion of the CBS for the queue to be unused and should be avoided.
The queue MBS defaults are listed in Table 100.
Queue | Default MBS |
1 | 50 |
2 | 50 |
3 | 50 |
4 | 25 |
5 | 50 |
6 | 50 |
7 | 25 |
8 | 25 |
9 | 50 |
10 | 50 |
11 | 50 |
12 | 25 |
13 | 50 |
14 | 50 |
15 | 25 |
16 | 25 |
This command specifies the maximum queue depth to which a queue can grow.
The mbs-contribution command is used to configure the policy-based burst tolerance for a parent policer instance created when the policy is applied to a SAP or subscriber context. The system uses the parent policer’s min-thresh-separation value, the priority level’s mbs-contribution value and the number of child policers currently attached to the priority level to derive the priority level’s shared-portion and fair-portion of burst tolerance within the local priority level. The shared-portion and fair-portions for each priority level are then used by the system to calculate each priority level’s discard-unfair threshold and discard-all threshold.
The value for a priority level’s mbs-contribution within the policer-control-policy may be overridden on the SAP or subscriber sub-profile where the policy is applied in order to allow fine tuning of the discard-unfair and discard-all thresholds relevant to the needs of the local child policers on the object.
Accumulative Nature of Burst Tolerance for a Parent Policer Priority Level
When defining mbs-contribution, the specified size may only be a portion of the burst tolerance associated with the priority level. The packets associated with the priority level share the burst tolerance of lower within the parent policer. As the parent policer PIR bucket depth increases during congestion, the lower priority packets eventually experience discard based on each priority’s discard-unfair and discard-all thresholds. Assuming congestion continues once all the lower priority packets have been prevented from consuming bucket depth, the burst tolerance for the priority level is consumed by its own packets and any packets associated with higher priorities.
The Effect of Fair and Unfair Child Policer Traffic at a Parent Policer Priority Level
The system continually monitors the offered rate of each child policer on each parent policer priority level and detects when the policer is in a congested state (the aggregate offered load is greater than the decrement rate defined on the parent policer). As previously stated, the result of congestion is that the parent policer's bucket depth will increase until it eventually hovers around either a discard-unfair or discard-all threshold belonging to one of the priority levels. This threshold is the point where enough packets are being discarded that the increment rate and decrement rate begin to even out. If only a single child policer is associated to the priority level, the discard-unfair threshold is not used since fairness is only applicable when multiple child policers are competing at the same priority level.
When multiple child policers are sharing the congested priority level, the system uses the offered rates and the parenting parameters of each child to determine the fair rate per child when the parent policer is unable to meet the bandwidth needs of each child. The fair rate represents the number of bandwidth that each child at the priority level should receive relative to the other children at the same level according to the policer control policy instance managing the child policers. This fair rate is applied as the decrement rate for each child's FIR bucket. Changing a child’s FIR rate does not modify the number of packets forwarded by the parent policer for the child’s priority level. It simply modifies the forwarded ratio between the children on that priority level. Since each child FIR bucket has some level of burst tolerance before marking its packets as unfair, the current parent policer bucket depth may at times rise above the discard-unfair threshold. The mbs-contribution value provides a means to define how much separation is provided between the priority level’s discard-unfair and discard-all threshold to allow the parent policer to absorb some of the FIR burst before reaching the priority’s discard-all threshold.
This level of fair aggregate burst tolerance is based on the decrement rate of the parent policer’s PIR bucket while the individual fair bursts making up the aggregate are based on each child’s FIR decrement rate. The aggregate fair rate of the priority level is managed by the system with consideration of the current rate of traffic in higher priority levels. In essence, the system ensures that for each iteration of the child FIR rate calculation, the sum of the child FIR decrement rates plus the sum of the higher priority traffic increment rates equals the parent policers decrement rate. This means that dynamic numbers of higher priority traffic can be ignored when sizing a lower priority’s fair aggregate burst tolerance. Consider the following:
FIR Rate | FIR MBS | |
Child 1 | 4 Mb/s | 10 kbytes |
Child 2 | 3 Mb/s | 10 kbytes |
Child 3 | 1 Mb/s | 10 kbytes |
The 12 Mb/s of the higher priority traffic and the 8 Mb/s of fair traffic equal the 20 Mb/s decrement rate of the parent policer.
It is clear that the higher priority traffic is consuming 12 Mb/s of the parent policer’s decrement rate, leaving 8 Mb/s of decrement rate for the lower priority’s fair traffic.
If all three children burst simultaneously (unlikely), they will consume 30 kbytes above 8 Mb/s. This is the same as the remaining decrement rate after the higher priority traffic.
Parent Policer Total Burst Tolerance and Downstream Buffering
The highest in-use priority level’s discard-all threshold is the total burst tolerance of the parent policer. In some cases the parent policer represents downstream bandwidth capacity and the max-rate of the parent policer is set to prevent overrunning the downstream bandwidth. The burst tolerance of the parent policer defines how much more traffic may be sent beyond the downstream scheduling capacity. In the worst case scenario, when the downstream buffering is insufficient to handle the total possible burst from the parent policer, downstream discards based on lack of buffering may occur. However, in all likelihood, this is not the case.
In most cases, lower priority traffic in the policer is responsible for the greater part of congestion above the parent policer rate. Since this traffic is discarded with a lower threshold, this lowers the effective burst tolerance even while the highest priority traffic is present.
Configuring a Priority Level's MBS Contribution Value
In the most conservative case, a priority level’s mbs-contribution value may be set to be greater than the sum of child policer’s mbs and one max-size-frame per child policer. This ensures that even in the absolute worst case where all the lower priority levels are simultaneously bursting to the maximum capacity of each child, enough burst tolerance for the priority’s children will exist if they also burst to their maximum capacity.
Since simply adding up all the child policer’s PIR MBS values may result in large overall burst tolerances that are not ever likely to be needed, you should consider some level of burst oversubscription when configuring the mbs-contribution value for each priority level. The number of oversubscription should be determined based on the needs of each priority level.
Using the Fixed Keyword to Create Deterministic Parent Policer Discard Thresholds
In the default behavior, the system ignores the mbs-contribution values for a priority level on a subscriber or SAP parent policer when a child policer is not currently associated with the level. This prevents additional burst tolerance from being added to higher priority traffic within the parent policer.
This does cause fluctuations in the defined threshold values when child policers are added or removed from a parent policer instance. If this behavior is undesirable, the fixed keyword may be used which causes the mbs-contribution value to always be included in the calculation of parent policer’s discard thresholds. The defined mbs-contribution value may be overridden on a subscriber sla-profile or on a SAP instance, but the fixed nature of the contribution cannot be overridden.
If the defined mbs-contribution value for the priority level is zero, the priority level will have no effect on the parent policer’s defined discard thresholds. A packet associated with the priority level will use the next lower priority level’s discard-unfair and discard-all thresholds.
The no mbs-contribution command returns the policy’s priority level’s MBS contribution to the default value. When changed, the thresholds for the priority level and all higher priority levels for all instances of the parent policer is recalculated.
The kilobytes keyword is optional and is mutually exclusive with the bytes keyword. Size is interpreted as specifying the size of min-thresh-separation in kilobytes.
This command configures the policy-based burst tolerance for a parent policer instance created when the policy is applied to a SAP or subscriber context. The system uses the parent policer’s min-thresh-separation value, the priority level’s mbs-contribution value and the number of child policers currently attached to the priority level to derive the priority level’s shared-portion and fair-portion of burst tolerance within the local priority level. The shared-portion and fair-portions for each priority level are then used by the system to calculate each priority level’s discard-unfair threshold and discard-all threshold.
The value for a priority level’s mbs-contribution within the policer-control-policy may be overridden on the SAP or subscriber sub-profile where the policy is applied in order to allow fine tuning of the discard-unfair and discard-all thresholds relevant to the needs of the local child policers on the object.
Accumulative Nature of Burst Tolerance for a Parent Policer Priority Level
When defining mbs-contribution, the specified size may only be a portion of the burst tolerance associated with the priority level. The packets associated with the priority level share the burst tolerance of lower within the parent policer. As the parent policer PIR bucket depth increases during congestion, the lower priority packets eventually experience discard based on each priority’s discard-unfair and discard-all thresholds. Assuming congestion continues once all the lower priority packets have been prevented from consuming bucket depth, the burst tolerance for the priority level will be consumed by its own packets and any packets associated with higher priorities.
The Effect of Fair and Unfair Child Policer Traffic at a Parent Policer Priority Level
The system continually monitors the offered rate of each child policer on each parent policer priority level and detects when the policer is in a congested state (the aggregate offered load is greater than the decrement rate defined on the parent policer). As previously stated, the result of congestion is that the parent policer's bucket depth will increase until it eventually hovers around either a discard-unfair or discard-all threshold belonging to one of the priority levels. This threshold is the point where enough packets are being discarded that the increment rate and decrement rate begin to even out. If only a single child policer is associated to the priority level, the discard-unfair threshold is not used since fairness is only applicable when multiple child policers are competing at the same priority level.
When multiple child policers are sharing the congested priority level, the system uses the offered rates and the parenting parameters of each child to determine the fair rate per child when the parent policer is unable to meet the bandwidth needs of each child. The fair rate represents the amount of bandwidth that each child at the priority level should receive relative to the other children at the same level according to the policer control policy instance managing the child policers. This fair rate is applied as the decrement rate for each child’s FIR bucket. Changing a child’s FIR rate does not modify the amount of packets forwarded by the parent policer for the child’s priority level. It simply modifies the forwarded ratio between the children on that priority level. Since each child FIR bucket has some level of burst tolerance before marking its packets as unfair, the current parent policer bucket depth may at times rise above the discard-unfair threshold. The mbs-contribution value provides a means to define how much separation is provided between the priority level’s discard-unfair and discard-all threshold to allow the parent policer to absorb some amount of FIR burst before reaching the priority’s discard-all threshold.
This level of fair aggregate burst tolerance is based on the decrement rate of the parent policer’s PIR bucket while the individual fair bursts making up the aggregate are based on each child’s FIR decrement rate. The aggregate fair rate of the priority level is managed by the system with consideration of the current rate of traffic in higher priority levels. In essence, the system ensures that for each iteration of the child FIR rate calculation, the sum of the child FIR decrement rates plus the sum of the higher priority traffic increment rates equals the parent policers decrement rate. This means that dynamic amounts of higher priority traffic can be ignored when sizing a lower priority’s fair aggregate burst tolerance. Consider the following:
FIR Rate | FIR MBS | |
Child 1 | 4 Mb/s | 10 kbytes |
Child 2 | 3 Mb/s | 10 kbytes |
Child 3 | 1 Mb/s | 10 kbytes |
The 12 Mb/s of the higher priority traffic and the 8 Mb/s of fair traffic equal the 20 Mb/s decrement rate of the parent policer.
It is clear that the higher priority traffic is consuming 12 Mb/s of the parent policer’s decrement rate, leaving 8 Mb/s of decrement rate for the lower priority’s fair traffic.
If all three children burst simultaneously (unlikely), they will consume 30 kbytes above 8 Mb/s. This is the same as the remaining decrement rate after the higher priority traffic.
Parent Policer Total Burst Tolerance and Downstream Buffering
The highest in-use priority level’s discard-all threshold is the total burst tolerance of the parent policer. In some cases the parent policer represents downstream bandwidth capacity and the max-rate of the parent policer is set to prevent overrunning the downstream bandwidth. The burst tolerance of the parent policer defines how much more traffic may be sent beyond the downstream scheduling capacity. In the worst case scenario, when the downstream buffering is insufficient to handle the total possible burst from the parent policer, downstream discards based on lack of buffering may occur. However, in all likelihood, this is not the case.
In most cases, lower priority traffic in the policer will be responsible for the greater part of congestion above the parent policer rate. Since this traffic is discarded with a lower threshold, this lowers the effective burst tolerance even while the highest priority traffic is present.
Configuring a Priority Level's MBS Contribution Value
In the most conservative case, a priority level’s mbs-contribution value may be set to be greater than the sum of child policer’s MBS and one max-size-frame per child policer. This ensures that even in the absolute worst case where all the lower priority levels are simultaneously bursting to the maximum capacity of each child, enough burst tolerance for the priority’s children will exist if they also burst to their maximum capacity.
Since simply adding up all the child policer’s PIR MBS values may result in large overall burst tolerances that are not ever likely to be needed, you should consider some level of burst oversubscription when configuring the mbs-contribution value for each priority level. The amount of oversubscription should be determined based on the needs of each priority level.
Using the Fixed Keyword to Create Deterministic Parent Policer Discard Thresholds
In the default behavior, the system ignores the mbs-contribution values for a priority level on a subscriber or SAP parent policer when a child policer is not currently associated with the level. This prevents additional burst tolerance from being added to higher priority traffic within the parent policer.
This does cause fluctuations in the defined threshold values when child policers are added or removed from a parent policer instance. If this behavior is undesirable, the fixed keyword may be used which causes the mbs-contribution value to always be included in the calculation of parent policer’s discard thresholds. The defined mbs-contribution value may be overridden on a subscriber SLA profile or on a SAP instance, but the fixed nature of the contribution cannot be overridden.
If the defined mbs-contribution value for the priority level is zero, the priority level will have no effect on the parent policer’s defined discard thresholds. A packet associated with the priority level will use the next lower priority level’s discard-unfair and discard-all thresholds.
The no form of this command reverts to the policy’s priority level’s MBS contribution to the default value. When changed, the thresholds for the priority level and all higher priority levels for all instances of the parent policer are recalculated.
no mbs-contribution
The kilobytes keyword is optional and is mutually exclusive with the bytes keyword. When specified, size is interpreted as specifying the size of min-thresh-separation in kilobytes.
The mbs-contribution override command within the SAP ingress and egress contexts is used to override a parent policer’s priority level’s mbs-contribution parameter that is defined within the policer-control-policy applied to the SAP. This override allow the priority level’s burst tolerance to be tuned based on the needs of the SAP’s child policers attached to the priority level.
When the override is defined, modifications to the policer-control-policy priority level’s mbs-contribution parameter have no effect on the SAP’s parent policer priority level until the override is removed using the no mbs-contribution command within the SAP.
The no form of this command removes the override and allows the mbs-contribution setting from the policer-control-policy to control the parent policer’s priority level’s burst tolerance.
no mbs-contribution
The mbs-contribution override command within the SAP ingress and egress contexts is used to override a parent policer’s priority level’s mbs-contribution parameter that is defined within the policer-control-policy applied to the SAP. This override allow the priority level’s burst tolerance to be tuned based on the needs of the SAP’s child policers attached to the priority level.
When the override is defined, modifications to the policer-control-policy priority level’s mbs-contribution parameter have no effect on the SAP’s parent policer priority level until the override is removed using the no mbs-contribution command within the SAP.
The no form of this command removes the override and allows the mbs-contribution setting from the policer-control-policy to control the parent policer’s priority level’s burst tolerance.
no mbs-contribution
The mbs-contribution override command within the SAP ingress and egress contexts is used to override a parent policer’s priority level’s mbs-contribution parameter that is defined within the policer-control-policy applied to the SAP. This override allow the priority level’s burst tolerance to be tuned based on the needs of the SAP’s child policers attached to the priority level.
When the override is defined, modifications to the policer-control-policy priority level’s mbs-contribution parameter have no effect on the SAP’s parent policer priority level until the override is removed using the no mbs-contribution command within the SAP.
The no form of this command removes the override and allows the mbs-contribution setting from the policer-control-policy to control the parent policer’s priority level’s burst tolerance.
no mbs-contribution
The mbs-contribution override command within the SAP ingress and egress contexts is used to override a parent policer’s priority level’s mbs-contribution parameter that is defined within the policer-control-policy applied to the SAP. This override allow the priority level’s burst tolerance to be tuned based on the needs of the SAP’s child policers attached to the priority level.
When the override is defined, modifications to the policer-control-policy priority level’s mbs-contribution parameter have no effect on the SAP’s parent policer priority level until the override is removed using the no mbs-contribution command within the SAP.
The no form of this command removes the override and allows the mbs-contribution setting from the policer-control-policy to control the parent policer’s priority level’s burst tolerance.
no mbs-contribution
The mbs-contribution command is used to configure the policy-based burst tolerance for a parent policer instance created when the policy is applied to a SAP, or a subscriber context for the 7450 ESS and 7750 SR, or a 7950 XRS multiservice site. The system uses the parent policer’s min-thresh-separation value, the priority level’s mbs-contribution value, and the number of child policers currently attached to the priority level to derive the priority level’s shared-portion and fair-portion of burst tolerance within the local priority level. The shared-portion and fair-portions for each priority level are then used by the system to calculate each priority level’s discard-unfair threshold and discard-all threshold. The mbs-contribution is the minimum separation between two adjacent active discard-all thresholds.
The value for a priority level’s mbs-contribution within the policer-control-policy may be overridden on the SAP, or subscriber sub-profile (applies to the 7450 ESS and 7750 SR) or multiservice site (for 7950 XRS) where the policy is applied in order to allow fine tuning of the discard-unfair and discard-all thresholds relevant to the needs of the local child policers on the object.
Accumulative Nature of Burst Tolerance for a Parent Policer Priority Level
When defining mbs-contribution, the specified size may only be a portion of the burst tolerance associated with the priority level. The packets associated with the priority level share the burst tolerance of lower within the parent policer. As the parent policer PIR bucket depth increases during congestion, the lower priority packets eventually experience discard based on each priority’s discard-unfair and discard-all thresholds. Assuming congestion continues when all the lower priority packets have been prevented from consuming bucket depth, the burst tolerance for the priority level will be consumed by its own packets and any packets associated with higher priorities.
The Effect of Fair and Unfair Child Policer Traffic at a Parent Policer Priority Level
The system continually monitors the offered rate of each child policer on each parent policer priority level and detects when the policer is in a congested state (the aggregate offered load is greater than the decrement rate defined on the parent policer). As previously stated, the result of congestion is that the parent policer's bucket depth will increase until it eventually hovers around either a discard-unfair or discard-all threshold belonging to one of the priority levels. This threshold is the point where enough packets are being discarded that the increment rate and decrement rate begin to even out. If only a single child policer is associated with the priority level, the discard-unfair threshold is not used since fairness is only applicable when multiple child policers are competing at the same priority level.
When multiple child policers are sharing the congested priority level, the system uses the offered rates and the parenting parameters of each child to determine the fair rate per child when the parent policer is unable to meet the bandwidth needs of each child. The fair rate represents the amount of bandwidth that each child at the priority level should receive relative to the other children at the same level according to the policer control policy instance managing the child policers. This fair rate is applied as the decrement rate for each child's FIR bucket. Changing a child’s FIR rate does not modify the number of packets forwarded by the parent policer for the child’s priority level. It just modifies the forwarded ratio between the children on that priority level. Since each child FIR bucket has some level of burst tolerance before marking its packets as unfair, the current parent policer bucket depth may at times rise above the discard-unfair threshold. The mbs-contribution value provides a means to define how much separation is provided between the priority level’s discard-unfair and discard-all threshold to allow the parent policer to absorb some amount of FIR burst before reaching the priority’s discard-all threshold.
This level of fair aggregate burst tolerance is based on the decrement rate of the parent policer’s PIR bucket while the individual fair bursts making up the aggregate are based on each child’s FIR decrement rate. The aggregate fair rate of the priority level is managed by the system with consideration of the current rate of traffic in higher priority levels. In essence, the system ensures that for each iteration of the child FIR rate calculation, the sum of the child FIR decrement rates plus the sum of the higher priority traffic increment rates equals the parent policers decrement rate. This means that dynamic amounts of higher priority traffic can be ignored when sizing a lower priority’s fair aggregate burst tolerance. Consider the following:
FIR Rate | FIR MBS | |
Child 1 | 4 Mb/s | 10 kbytes |
Child 2 | 3 Mb/s | 10 kbytes |
Child 3 | 1 Mb/s | 10 kbytes |
The 12 Mb/s of the higher priority traffic and the 8 Mb/s of fair traffic equal the 20 Mb/s decrement rate of the parent policer.
It is clear that the higher priority traffic is consuming 12 Mb/s of the parent policer’s decrement rate, leaving 8 Mb/s of decrement rate for the lower priority’s fair traffic.
If all three children burst simultaneously (unlikely), they will consume 30 kbytes above 8 Mb/s. This is the same as the remaining decrement rate after the higher priority traffic.
Parent Policer Total Burst Tolerance and Downstream Buffering
The highest in-use priority level’s discard-all threshold is the total burst tolerance of the parent policer. In some cases, the parent policer represents downstream bandwidth capacity and the max-rate of the parent policer is set to prevent overrunning the downstream bandwidth. The burst tolerance of the parent policer defines how much more traffic may be sent beyond the downstream scheduling capacity. In the worst-case scenario, when the downstream buffering is insufficient to handle the total possible burst from the parent policer, downstream discards based on lack of buffering may occur. However, in all likelihood, this is not the case.
In most cases, lower priority traffic in the policer will be responsible for the greater part of congestion above the parent policer rate. Since this traffic is discarded with a lower threshold, this lowers the effective burst tolerance even while the highest priority traffic is present.
Configuring a Priority Level's MBS Contribution Value
In the most conservative case, a priority level’s mbs-contribution value may be set to be greater than the sum of child policer’s mbs and one max-size-frame per child policer. This ensures that even in the absolute worst case where all the lower priority levels are simultaneously bursting to the maximum capacity of each child, enough burst tolerance for the priority’s children will exist if they also burst to their maximum capacity.
Since simply adding up all the child policer’s PIR MBS values may result in large overall burst tolerances that are not ever likely to be needed, consider some level of burst oversubscription when configuring the mbs-contribution value for each priority level. The amount of oversubscription should be determined based on the needs of each priority level.
Using the Fixed Keyword to Create Deterministic Parent Policer Discard Thresholds
In the default behavior, the system ignores the mbs-contribution values for a priority level on a subscriber for 7450 ESS and 7750 SR, or a multiservice site for 7950 XRS, or SAP parent policer when a child policer is not currently associated with the level. This prevents additional burst tolerance from being added to higher priority traffic within the parent policer.
This does cause fluctuations in the defined threshold values when child policers are added or removed from a parent policer instance. If this behavior is undesirable, the fixed keyword may be used that causes the mbs-contribution value to always be included in the calculation of parent policer’s discard thresholds. The defined mbs-contribution value may be overridden on a subscriber sla-profile for the 7450 ESS and 7750 SR, or on a multiservice site for the 7950 XRS, or on a SAP instance, but the fixed nature of the contribution cannot be overridden.
If the defined mbs-contribution value for the priority level is zero, the priority level will have no effect on the parent policer’s defined discard thresholds. A packet associated with the priority level will use the next lower priority level’s discard-unfair and discard-all thresholds.
The no form of this command returns the policy’s priority level’s MBS contribution to the default value. When changed, the thresholds for the priority level and all higher priority levels for all instances of the parent policer will be recalculated.
This command configures the maximum bytes to be transmitted before a key re-exchange is initiated by the server.
The no form of this command reverts to the default value.
mbytes 1024
This command enables the context to configure the level and its associated bandwidth for a bundle or a logical interface.
This command enters the context to configure multicast CAC constraints.
This command enables the context to configure multicast CAC constraints.
This command enables the context to configure the level and its associated bandwidth for a bundle or a logical interface.
This command enables multicast balancing of traffic over ECMP links considering multicast bandwidth. When enabled, every multicast stream that needs to be forwarded over an ECMP link is evaluated for the total multicast utilization currently using the ECMP interface in question.
![]() | Note: A given interface can be shared between multiple (partially overlapping) ECMP sets. This is taken into consideration and a complete balance is attempted. |
ECMP load balancing helps to avoid loss of unicast traffic over ECMP links as it loads balance over ECMP links and if multicast is not balanced then it is possible that a given link does not have enough bandwidth to pass its allotted unicast traffic portion.
To achieve a proper balance, multicast groups and their bandwidth should be configured in the config mcast-management context.
If the bandwidth is not configured, then the default value applies, and for ECMP load balancing, the net effect is that the balance achieved reflects a balance of the number of multicast groups traversing over the ECMP link. The bandwidth used in this policy is the configured value, not the actual bandwidth.
If mc-ecmp-balance is enabled, a redistribution may be triggered whenever an interface is added to an ECMP link.
If mc-ecmp-balance is enabled, a period re-balance may be configured that re-optimizes the distribution as some multicast streams may have been removed from the ECMP link.
If mc-ecmp-balance is enabled, then a threshold (ecmp-opt-threshold) can be configured to avoid moving multicast streams where interruption should be avoided.
The ecmp-opt-threshold defines the preference level threshold where multicast ECMP path management can dynamically optimize channels based on topology or bandwidth events. If the channels preference is equal to or less than the ecmp-opt-threshold, ECMP can move the channel between ECMP paths when bandwidth distribution events happen. Channels with a preference level higher than the threshold are not moved during these events.
Changing the ecmp-opt-threshold causes all channels ECMP optimization eligibility to be reevaluated.
The no form of this command removes the re-balancing capability from the configuration.
mc-ecmp-balance
This command enables multicast balancing of traffic over ECMP links based on the number of (S, G) distributed over each link. When enabled, each new multicast stream that needs to be forwarded over an ECMP link is compared to the count of (S, G) already using each link, so that the link with the fewest (S, G) is chosen.
This command cannot be used together with the mc-ecmp-hashing-enabled command.
The no form of this command disables multicast ECMP balancing.
This command enables multicast balancing of traffic over ECMP links based on the number of (S, G) distributed over each link. When enabled, each new multicast stream that needs to be forwarded over an ECMP link is compared to the count of (S, G) already using each link, so that the link with the fewest (S, G) is chosen.
This command cannot be used together with the mc-ecmp-hashing-enabled command.
The no form of this command disables multicast ECMP balancing.
This command defines a hold period that applies after an interface has been added to the ECMP link. It is also used periodically to rebalance if channels have been removed from the ECMP link.
If the ECMP interface has not changed in the hold period and if no multicast streams have been removed, then no action is taken when the timer triggers.
This parameter should be used to avoid excessive changes to the multicast distribution.
A rebalance will not occur to multicast streams that have a priority greater than the configured ecmp-opt-threshold.
The no form of this command removes the minutes value from the configuration.
This command configures the hold time for multicast balancing over ECMP links.
This command enables hash-based multicast balancing of traffic over ECMP links and causes PIM joins to be distributed over the multiple ECMP paths based on a hash of S and G (and possibly next-hop IP address). When a link in the ECMP set is removed, the multicast flows that were using that link are redistributed over the remaining ECMP links using the same hash algorithm. When a link is added to the ECMP set new joins may be allocated to the new link based on the hash algorithm, but existing multicast flows using the other ECMP links stay on those links until they are pruned.
Hash-based multicast balancing is supported for both IPv4 and IPv6.
This command cannot be used together with the mc-ecmp-balance command. Using this command and the lag-usage-optimization command on mixed port speed LAGs is not recommended, because some groups may be forwarded incorrectly.
The no form of this command disables the hash-based multicast balancing of traffic over ECMP links.
The no form of this command means that the use of multiple ECMP paths if enabled at the config>router or config>service>vprn context is controlled by the existing implementation and CLI commands mc-ecmp-balance.
no mc-ecmp-hashing-enabled
This command enables hash-based multicast balancing of traffic over ECMP links and causes PIM joins to be distributed over the multiple ECMP paths based on a hash of S and G (and possibly next-hop IP address). When a link in the ECMP set is removed, the multicast flows that were using that link are redistributed over the remaining ECMP links using the same hash algorithm. When a link is added to the ECMP set new joins may be allocated to the new link based on the hash algorithm, but existing multicast flows using the other ECMP links stay on those links until they are pruned.
Hash-based multicast balancing is supported for both IPv4 and IPv6.
This command cannot be used together with the mc-ecmp-balance command. Using this command and the lag-usage-optimization command on mixed port speed LAGs is not recommended, because some groups may be forwarded incorrectly.
The no form of this command disables the hash-based multicast balancing of traffic over ECMP links.
no mc-ecmp-hashing-enabled
This command specifies that the endpoint is multi-chassis. This value should be the same on both MC-EP peers for the pseudowires that must be part of the same group.
The no form of this command removes the endpoint from the MC-EP. Single chassis behavior applies.
no mc-endpoint
This command specifies that the endpoint is multi-chassis. This value should be the same on both MC-EP peers for the pseudowires that must be part of the same group.
The no form of this command removes the endpoint from the MC-EP. Single chassis behavior applies.
no mc-endpoint
This command specifies the identifier associated with the multi-chassis endpoint. This value should be the same on both MC-EP peers for the pseudowires that must be part of the same group.
The no form of this command removes the endpoint from the MC-EP. Single chassis behavior applies.
no mc-endpoint
This command enables enhanced egress multicast load balancing behavior for Layer 3 multicast. When enabled, the router will spray the multicast traffic using as hash inputs from the packet based on lsr-load-balancing, l4-load-balancing and system-ip-load-balancing configurations. That is, an ingress LER or IP PE will spray traffic based on the IP hash criteria: SA/DA + optional Layer 4 port + optional system IP egress LER or LSR - will spray traffic based on label or IP hash criteria outlined above or both based on configuration of lsr-load-balancing, l4-load-balancing, and system-ip-load-balancing.
The no form of the command preserves the default behavior for per flow hashing of multicast traffic.
no mc-enh-load-balancing
This command adds multi-chassis endpoint object.
The no form of this command removes the multi-chassis endpoint object.
no mc-ep-peer
This command creates a profile for the user to configure the egress QoS parameters of an MLFR bundle or an FRF.12 UNI/NNI link. A maximum of 128 egress QoS profiles may be created on the system.
The no form of this command deletes the profile.
This command creates a profile for the user to configure the ingress QoS parameters of a Multi-Link Frame Relay (MLFR) bundle. A maximum of 128 ingress QoS profiles may be created on the system.
The no form of this command deletes the profile.
This command sets the rate at which the Fast Channel Change (FCC) server will send unicast data to the FCC client during the handover to the multicast stream.
The no form of the command returns the parameter to the default value.
mc-handover 25
HD: | 0 to 100 |
SD and PIP: | 0 to 600 |
This command enables the context to configure multi-chassis peer parameters.
This command configures an instance of a multi-chassis IPsec tunnel-group Priority Event used to override the base priority value of a VRRP virtual router instance depending on the operational state of the event.
This command enables the context to configure multi-chassis LAG operations and related parameters.
The no form of this command administratively disables multi-chassis LAG. The mc-lag command can only be issued only when MC LAG is shutdown.
This command enables the context to configure multi-chassis LAG operations and related parameters.
The no form of this command administratively disables multi-chassis LAG. MC-LAG can be issued only when mc-lag is shutdown.
no mc-lag
This command enables the context under which the MC-LAG specific ETH-CFM redundancy parameters are to be configured
This command specifies the maximum number of multicast routes that can be held in the form of this command in a VPN routing or forwarding (VRF) context. When this limit is reached, a log and SNMP trap are sent. If the log-only parameter is not specified and the maximum-routes value is set below the existing number of routes in a VRF, then no new joins are processed.
The no form of this command disables the limit of multicast routes within a VRF context. Issue the no form of this command only when the VPRN instance is shutdown.
no mc-maximum-routes
This command specifies the maximum number of multicast routes that can be held within a VPN routing/forwarding (VRF) context. When this limit is reached, a log and SNMP trap are sent. If the log-only parameter is not specified and the maximum-routes value is set below the existing number of routes in a VRF, then no new joins will be processed.
The no form of this command disables the limit of multicast routes within a VRF context. Issue the no form of this command only when the VPRN instance is shutdown.
no mc-maximum-routes
This command enables the context to configure the multi-chassis ring parameters.
The no form of this command reverts to the default.
mc-ring
This command enables the context to configure the multi-chassis ring parameters.
no mc-ring
This command enables the context to configure multicast CAC policy parameters and constraints for this interface.
This command enables the context to configure multicast CAC parameters.
This command configures multicast CAC policy and constraints for this interface.
This command configures multicast CAC policy and constraints for this interface.
This command enables the context to configure multicast CAC parameters.
This command configures the primary and secondary multicast plane capacities used when the full complement of possible switch fabrics in the system is not up (at least one possible switch fabric is not provisioned or is down). The rates are defined as a percentage of the total multicast plane capacity which is configured using the total-capacity command.
The no form of this command reverts to the default values.
mcast-capacity 87.50 secondary 87.50
This command filters multicast IPv4 flow data from being sent to the associated collector.
The no form of this command removes the filter, allowing multicast IPv4 flow data to be sent to the associated collector.
no mcast-ipv4
This command filters multicast IPv6 flow data from being sent to the associated collector.
The no form of this command removes the filter, allowing multicast IPv6 flow data to be sent to the associated collector.
no mcast-ipv6
This command specifies the forwarding scope used for IPv6 multicast traffic when PIM snooping for IPv6 is enabled.
By default, the scope is mac-based; IPv6 snooped multicast traffic is forwarded is based on the low-order 32 bits of the destination IPv6 address.
When the scope is configured as sg-based, the IPv6 snooped multicast traffic is forwarded based on both its full source (if specified in the join) and destination IPv6 address. SG-based forwarding is only supported on FP3- (or higher) based line cards.
PIM snooping for IPv6 must be disabled to change the forwarding mode within a VPLS service between mac-based and sg-based.
mcast-ipv6-snooping-scope mac-based
This command enables the context to configure multicast management parameters. The mcast-management CLI node contains the bandwidth-policy and multicast-info-policy definitions. The bandwidth-policy is used to manage the ingress multicast paths into the switch fabric. The multicast-info-policy defines how each multicast channel is handled by the system. The policy may be used by the ingress multicast bandwidth manager, the ECMP path manager and the egress multicast CAC manager.
The mcast-management node always exists and contains the default bandwidth-policy and the default multicast-info-policy. Enter the mcast-management node when editing, deleting or creating a bandwidth policy or multicast info policy. The default bandwidth policy and multicast-info-policy cannot be edited or deleted.
A chassis-level node within multicast-management is used to control the switch fabric multicast planes replication limits. The switch fabric multicast planes are the individual multicast spatial replication contexts available in the system.
This CLI node contains the forwarding plane settings for ingress multicast path management. Enter the node to configure the bandwidth-policy and the administrative state of ingress multicast path management.
This command configures the ingress multicast path management buffer pool. The pool is used by the primary and secondary path queues through which all ingress managed multicast traffic must flow. The parameters may be used to configure the size of the pool relative to the total ingress buffer space, the amount of reserved CBS buffers within the pool and the slope policy used to manage early congestion detection functions in the shared portion of the pool.
Care should be taken when managing the buffer pool space as changes to the systems buffer pool behavior can have negative effects on multicast and unicast forwarding.
Sizing the Pool
The percent-of-total command defines how much of the total ingress buffer pool space for the MDA is dedicated for multicast channels managed by the bandwidth policy. Since multicast typically has a higher scheduling priority through the switch fabric, the buffer pool does not need to be large. By default, the system reserves 10% of the buffers on the ingress side of the MDA once multicast path management is enabled.
Reserved CBS Portion of the Pool
The multicast pool is divided into two portions; reserved and shared. The reserved portion is used by the multicast path queues until they cross there individual CBS thresholds. Since the CBS thresholds are configured as percentages and the percentages can oversubscribe the reserved portion of the pool, it is possible for some of the queues CBS buffer allocation to be met by the shared portion of the pool. By default, 50% of the pool is defined as reserved. This may be changed using the resv-cbs percentage parameter.
Shared Portion WRED Slopes
The shared portion of the buffer pool is used by queues that have crossed over their CBS thresholds. Since the total MBS values for the multicast path queues may oversubscribe the pool size, a buffer congestion control mechanism is supported within the pool in the form of two WRED slopes. The slope-policy parameter defines how the slopes are configured and whether they are activated. Each packet entering a path queue is defined as high or low priority within the queue based on the channel’s preference value relative to the cong-priority-threshold command. When getting a shared buffer of a high priority packet, the high WRED slope is used. Low priority packets use the low WRED slope.
The no form of this command returns the managed multicast path pool to its default settings.
This command enables the context to configure mcast reporting.
This command creates a multicast reporting destination hierarchy in CLI under which parameters defining this destination can be specified. The destination refers to an external node that collects and analyze IGMP events.
The multicast reporting destination is associated with a name that each subscriber can reference to send the IGMP related events.
It can be also referenced in the host tracking policy in case that IGMP events are related to the host tracking feature.
The no form of this command removes the destination name from the configuration.
This command debugs multicast path management reporting destinations and applies only to the 7750 SR.
This command references the multicast reporting destination to which IGMP related events are exported.
The multicast reporting destination is referenced with the subscriber itself or within the Host-Tracking-Policy.
The no form of this command reverts to the default value.
This command enables ASBR MoFRR.
When ASBR MoFRR is enabled, the local leaf will perform MoFRR for multiple ASBRs; for example, if there are two ASBRs, the local leaf will select one ASBR as the primary and another ASBR as the backup.
The no form of the command disables ASBR MoFRR.
If the mcast-upstream-frr command is enabled, disabling ASBR MoFRR will only allow IGP MoFRR in the local AS; for example, a single ASBR will be selected and two separate, disjointed paths will be selected as the primary and backup LSPs from the local leaf to ASBR.
If the mcast-upstream-frr command is disabled, disabling ASBR MoFRR will disable MoFRR entirely.
no mcast-upstream-asbr-frr
This command enables the mLDP fast upstream switchover feature.
When this command is enabled and LDP is resolving a mLDP FEC received from a downstream LSR, it checks if an ECMP next-hop or a LFA next-hop exist to the root LSR node. If LDP finds one, it programs a primary ILM on the interface corresponding to the primary next-hop and a backup ILM on the interface corresponding to the ECMP or LFA next-hop. LDP then sends the corresponding labels to both upstream LSR nodes. In normal operation, the primary ILM accepts packets while the backup ILM drops them. If the interface or the upstream LSR of the primary ILM goes down causing the LDP session to go down, the backup ILM will then start accepting packets.
In order to make use of the ECMP next-hop, the user must configure the ecmp value in the system to at least 2 using the following command:
config>router>ecmp
In order to make use of the LFA next-hop, the user must enable LFA using the following commands:
config>router>isis>loopfree-alternates
config>router>ospf>loopfree-alternates
Enabling IP FRR or LDP FRR features is not strictly required since LDP only needs to know where the alternate next-hop to the root LSR is to be able to send the Label Mapping message to program the backup ILM at the initial signaling of the tree. Thus enabling the LFA option is sufficient. If however, unicast IP and LDP prefixes need to be protected, then these features and the mLDP fast upstream switchover can be enabled concurrently.
The mLDP FRR fast switchover relies on the fast detection of loss of **LDP session** to the upstream peer to which the primary ILM label had been advertised. We strongly recommended to perform the following:
The no form of this command disables the fast upstream switchover for mLDP FECs.
no mcast-upstream-frr
This command configures the add-paths capability for multicast IPv4 VPN routes. By default, add-paths is not enabled for multicast IPv4 VPN routes.
The maximum number of multicast paths per IPv4 VPN prefix to send is the configured send-limit, which is a mandatory parameter. The capability to receive multiple multicast paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command, receive capability is enabled by default. The none option disables the receive capability.
The no form of this command disables add-paths support for multicast IPv4 VPN routes, causing sessions established using add-paths for multicast IPv4 VPN to go down and come back up without the add-paths capability.
no mcast-vpn-ipv4
This command configures the add-paths capability for multicast IPv6 VPN routes. By default, add-paths is not enabled for multicast IPv6 VPN routes.
The maximum number of multicast paths per IPv6 VPN prefix to send is the configured send-limit, which is a mandatory parameter. The capability to receive multiple multicast paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command, receive capability is enabled by default. The none option disables the receive capability.
The no form of this command disables add-paths support for multicast IPv6 VPN routes, causing sessions established using add-paths for multicast IPv6 VPN to go down and come back up without the add-paths capability.
no mcast-vpn-ipv6
This command configures a matching condition for the IMSI (MCC-MNC) prefix.
If no MCC-MNC prefix is specified, the entry will match GTP packets that have an IMSI IE containing any value.
This command enables the context to configure the default gateway information when using Dual Homing in L2-TPSDA. The IP and MAC address of the default gateway used for subscribers on an L2 MC-Ring are configured in this context. After a ring heals or fails, the system sends out a gratuitous ARP on an active ring SAP in order to attract traffic from subscribers on the ring with connectivity to that SAP.
This command enables or disables debugging for PIM snooping multi-chassis synchronization.
This command enables debugging for IGMP multicast servers (MCS).
The no form of the command disables the IGMP interface debugging for the specifies interface name.
This command specifies the interval at which usage counters of the subscriber is synchronized. The minutes value is mutually exclusive with the use-update-interval keyword.
The no form of the command reverts to the default value.
no mcs-interval
This command specifies the MCS peer’s address and sync-tag for syncing the cached entries of the python-policy. The sync-tag must be match on both chassis.
The no form of this command reverts to the default.
This command configures the IP address and the synchronization tag for the multi-chassis synchronization (MCS) peer.
This command is applicable only to legacy implementations of Diameter base in SR OS.
The no form of this command reverts to the default.
ipv4-address: | a.b.c.d |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x - [0 to FFFF]H | |
d - [0 to 255]D |
This command creates a new directory in a file system.
Directories can only be created one level at a time.
local-url | [cflash-id/][file-path] up to 200 characters, including cflash-id directory length up to 99 each |
remote-url | [{ftp:// | tftp://}login:pswd@remote-locn/][file-path] |
up to 247 characters | |
directory length up to 99 characters each | |
remote-locn | [hostname | ipv4-address | [ipv6-address]] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - up to 32 characters, for link local addresses 255 | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command automatically assigns numerical index values for ma-index and md-index in model-driven management interfaces.
Classic management interfaces use a numerical index as the primary key for ETH-CFM domains and associations. In model-driven interfaces, domains and associations use string names as keys. The domain and association can optionally be created without having to explicitly select and specify a numerical index in model-driven interfaces. In this case, SROS assigns an index using the configured index range.
This command automatically assigns numerical ID values for QoS policies in model-driven (MD) management interfaces.
Classic management interfaces use a numerical policy ID as the primary key for sap-ingress, sap-egress, and network QoS policies. In model-driven interfaces, SAP and network policies use string names as keys. The SAP and network policies can optionally be created in MD interfaces without having to explicitly select and specify a numerical policy ID. In this case, SR OS assigns an ID using the configured ID range.
This command automatically assigns numerical ID values for filter policies in model-driven management interfaces.
Classic management interfaces use a numerical filter ID as the primary key for IP filters, IPv6 filters, and MAC filters. In model-driven interfaces, IP, IPv6, and MAC filters use string names as keys. The filters can optionally be created in MD interfaces without having to explicitly select and specify a numerical filter ID. In this case, SR OS assigns an ID using the configured ID range.
This command automatically assigns numerical ID values for services, customers, and PW templates in model-driven (MD) management interfaces.
Classic management interfaces use a numerical service ID, customer ID, and PW template ID as the primary key for services, customers, and PW templates. In model-driven interfaces, services, customers, and PW templates use string names as keys. The services, customers, and PW templates can optionally be created in MD interfaces without having to explicitly select and specify a numerical ID. In this case, SR OS assigns an ID using the configured ID range.
This command enters the context to configure MD-CLI capabilities.
This command enables the context to configure hash-control for the MD-CLI interface.
This command specifies the range of indexes used by SROS to automatically assign an index to ETH-CFM domains that are created in model-driven interfaces without an index explicitly specified by the user or client.
A domain created with an explicitly-specified index cannot use an index in this range. In classic CLI and SNMP, the ID range cannot be changed while objects exist inside the previous or new range. In MD interfaces, the range can be changed, which causes any previously existing objects in the previous ID range to be deleted and re-created using a new ID in the new range.
The no form of this command removes the range values.
See the md-auto-id command for further details.
This command enables an ISA for WLAN-GW functionality.
The no form of this command removes the ISA from the WLAN-GW configuration.
This mandatory command enables access to a card’s MDA CLI context to configure MDAs.
Configures an MDA-s in one of the slots of an XIOM.
This command specifies an MFIB-allowed MDA destination for an SDP binding configured in the system.
slot/mda | slot: 1 to 10 |
mda: 1, 2 | |
slot/xiom/mda | slot: 1 to 10 |
xiom: “x1” or “x2” | |
mda: 1, 2 |
This command specifies the MDA ID of the MS-ISA as the member of tunnel-group with multi-active enabled. Up to 16 MDA could be configured under the same tunnel-group.
This command configures an ISA LNS group MDA.
The no form of the command removes the MDA ID from the LNS group configuration.
mda-id: | slot/mda |
slot: 1 to 10 | |
mda: 1, 2 |
![]() | Note: Available parameter values may differ by platform. |
This command specifies an MFIB-allowed media adapter destination for an SDP binding configured in the system.
This mandatory command provisions a specific MDA type to the device configuration for the slot. The MDA can be preprovisioned but an MDA must be provisioned before ports can be configured. Ports can be configured once the MDA is properly provisioned.
A maximum of two MDAs can be provisioned on an IOM or XCM. To modify an MDA slot, shut down all port associations.
XMAs are provisioned using MDA commands. A medium severity alarm is generated if an MDA is inserted that does not match the MDA type configured for the slot. This alarm is cleared when the correct MDA is inserted or the configuration is modified. A high severity alarm is raised when an administratively enabled MDA is removed from the chassis. This alarm is cleared if the either the correct MDA type is inserted or the configuration is modified. A low severity trap is issued if an MDA is removed that is administratively disabled.
An MDA can only be provisioned in a slot if the MDA type is allowed in the MDA slot. An error message is generated when an MDA is provisioned in a slot where it is not allowed.
Some MDA hardware can support two different firmware loads. One load includes the base Ethernet functionality, including 10G WAN mode, but does not include 1588 port-based timestamping. The second load includes the base Ethernet functionality and 1588 port-based timestamping, but does not include 10G WAN mode. These are identified as two MDA types that are the same, except for a “-ptp” suffix to indicate the second loadset; for example, x40-10gb-sfp and x40-10gb-sfp-ptp. A hard reset of the MDA occurs when switching between the two provisioned types.
A medium severity alarm is generated if an MDA is inserted that does not match the MDA type configured for the slot. This alarm is cleared when the correct MDA is inserted or the configuration is modified.
A high severity alarm is raised when an administratively enabled MDA is removed from the chassis. This alarm is cleared if the either the correct MDA type is inserted or the configuration is modified. A low severity trap is issued if an MDA is removed that is administratively disabled.
An alarm is raised if partial or complete MDA failure is detected. The alarm is cleared when the error condition ceases.
All parameters in the MDA context remain and if non-default values are required then their configuration remains as it is on all existing MDAs.
New generations of XMAs include variants controlled through hardware and software licensing. For these XMAs, the license level must be provisioned in addition to the MDA type. An XMA cannot become operational unless the provisioned license level matches the license level of the XMA installed into the slot. The set of license levels varies by MDA type.
The provisioned level controls aspects related to connector provisioning and the consumption of hardware egress queues and egress policers. Changes to the provisioned license level may be blocked if configuration that would not be permitted with the new target license level exists.
If the license level is not specified, the level is set to the highest license level for that XMA.
The no form of this command deletes the MDA from the configuration. The MDA must be administratively shut down before it can be deleted from the configuration.
This command provisions or de-provisions an MDA to or from the device configuration for the slot.
This command adds an MDA-s to the device configuration for the slot. The MDA-s type can be preprovisioned, which means that the MDA-s does not have to be installed in the chassis.
An MDA-s must be provisioned before a connector or a port can be configured.
An MDA-s can only be provisioned in a slot that is vacant. No other MDA-s can be provisioned (configured) for that particular slot. To reconfigure a slot position, use the no form of this command to remove the current information.
An MDA-s can only be provisioned in a slot if the MDA-s type is allowed in the slot. An error message is generated if an attempt is made to provision an MDA-s type that is not allowed.
If an MDA-s is inserted that does not match the configured MDA-s type for the slot, then a log event and a facility alarm are raised. The alarm is cleared when the correct MDA-s type is installed or the configuration is modified.
A log event and a facility alarm are raised if an administratively enabled MDA-s is removed from the chassis. The alarm is cleared when the correct MDA-s type is installed or the configuration is modified. A log event is issued when a MDA-s is removed that is administratively disabled.
The no form of this command removes the MDA-s from the configuration.
no mdl
This command enables the transmission of an MDL message on a DS-3/E-3 over channelized interface.
The no form of this command disables transmission of the specified message or all messages.
no mdl-transmit
This command creates a multi-stream MDT that could match many (C-S,C-G)s into a single data MDT.
This command allows restricting MVPN instance per PE node to a specific role. By default, MVPN instance on a given PE node assumes the role of being a sender as well as receiver. This creates a mesh of MDT/PMSI across all PE nodes from this PE.
This command provides an option to configure either a sender-only or receiver-only mode per PE node. Restricting the role of a PE node prevents creating full mesh of MDT/PMSI across all PE nodes that are participating in MVPN instance.
auto-rp-discovery cannot be enabled together with mdt-type sender-only or mdt-type receiver-only, or wildcard-spmsi configurations.
The no version of this command restores the default (sender-receiver).
mdt-type sender-receiver
This command establishes the parameters of the individual measurement intervals utilized by the session. Multiple measurement intervals may be specified within the session. A maximum of three different measurement intervals may be configured under each session.
The no form of this command deletes the specified measurement interval.
This command enables advertising the Multi-Exit Discriminator (MED) and assigns the value used for the path attribute for the MED advertised to BGP peers if the MED is not already set.
The specified value can be overridden by any value set with a route policy.
The no form of this command used at the global level reverts to default where the MED is not advertised.
This command enables advertising the Multi-Exit Discriminator (MED) and assigns the value used for the path attribute for the MED advertised to BGP peers if the MED is not already set.
The specified value can be overridden by any value set via a route policy.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific value is used.
The no form of this command used at the global level reverts to default where the MED is not advertised.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no med-out
This command enables advertising the Multi-Exit Discriminator (MED) and assigns the value used for the path attribute for the MED advertised to BGP peers if the MED is not already set.
The specified value can be overridden by any value set via a route policy.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific value is used.
The no form of this command used at the global level reverts to default where the MED is not advertised.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no med-out
This command includes the medium duration flow count in the AA subscriber's custom record. This command only applies to the 7750 SR.
The no form of this command excludes the medium duration flow count.
no medium-duration-flow-count
This command binds the specified port with the associate Interface Group Handler. Up to eight member commands can be issued to add multiple ports to the associated IGH. The member must be a port or channel on a SONET or POS MDA. It must be a physical port or channel in network mode, and not bound to any router interfaces. A port or channel cannot be a member of more than one IGH at the same time. MLPPP bundles and their members cannot be IGH members.
The no form of this command removes the specified port ID from the associated IGH.
This command binds a channel group to a multilink bundle. For IMA and MLFR groups, this command binds a channel group filling up the entire DS-1 or E-1. For MLPPP groups, fractional (n x ds0) DS1 or E1 links are also allowed. However, fractional DS1 links and fractional E1 links may not be combined in the same multilink bundle. If a channel with a different number of timeslots than the primary-link member is added to the bundle, a warning will be provided.
The no form of this command removes the specified channel group from the multilink bundle.
port-id | slot/mda/port.channel | ||
eth-sat-id | esat-id/slot/port | ||
esat | keyword | ||
id | 1 to 20 | ||
pxc-id | pxc-id.sub-port | ||
pxc | keyword | ||
id | 1 to 64 | ||
sub-port | a, b |
This command associates a port with the path defined under the Ethernet tunnel. If the operator wants to replace an existing member port or control tag, the whole path needs to be shutdown first. The alternate path will be activated as a result keeping traffic interruption to a minimum. Then the whole path must be deleted, the alternate path precedence modified to primary before re-creating the new path.
The following port-level configuration needs to be the same across the two member ports of an Ethernet tunnel:
The Ethernet tunnel will inherit the configuration from the first member port for these parameters. Additional member port that is added must have the same configuration.
The operator is allowed to update these port parameters only if the port is the sole member of an Ethernet tunnel. This means that in the example below, the operator needs to remove port 1/1/4 and port 1/1/5 before being allowed to modify 1/1/1 for the above parameters.
The no form of this command is used just to indicate that a member is not configured. The procedure described above, based on the no path command must be used to un-configure/change the member port assigned to the path.
no member
This command allows the adding of discrete VPI/VCI values to an ATM connection profile for assignment to an ATM SAP of an Apipe VLL of vc-type atm-cell.
Up to a maximum of 16 discrete VPI/VCI values can be configured in a connection profile. The user can modify the content of a profile which triggers a re-evaluation of all the ATM SAPs which are currently using the profile.
The no form of this command deletes the member from the configuration.
This command adds or removes a member ISID or a range of contiguous ISID members to an encap-group. The user can add or remove members to the encap-group one at a time or as a range of contiguous values using the member command. However, when the qos-per-member option is enabled, members must be added or removed one at a time.
The no form of this command removes the single or range of ISID values from the encap-group.
This command adds or removes a links to the associated link-group. The interface name should already exist before it is added to a link-group.
The no form of this command removes the specified interface from the associated link-group.
This command configures a member of a GMPLS tunnel group. A member of a GMPLS tunnel group is a GMPLS LSP. All members of a tunnel group must have the same bandwidth. Up to 16 members may be configured for each GMPLS tunnel group.
The no form of this command removes the member.
no member
member default
This command adds or removes a link to the associated link-group. The interface name should already exist before it is added to a link-group.
The no form of this command removes the specified interface from the associated link-group.
The member-threshold is the number of member GMPLS LSPs that must be operationally up before the GMPLS tunnel group is considered operationally up. If that number is not reached, then the GMPLS tunnel group is taken operationally down.
A member of a GMPLS tunnel group may be treated as down for one of the following reasons. These reason codes are recorded in the tmnxGmplsTunGrpMemberTable in the MIB:
The no form of this command resets the member threshold to 0.
member-threshold 0
The no version of this command deletes route policy community members.
This command configures the amount of memory (in gigabytes) that is allocated to the ESA-VM instance.
The no form of this command removes the memory allocation. To modify the memory allocation, first invoke the no memory command.
This command configures the thresholds for raising the memory alarm. The low threshold value must be configured with a smaller value than the high threshold.
The no form of this command reverts to the default values.
The memory thresholds are based on monitoring the TIMETRA-SYSTEM-MIB sgiMemoryUsed object. This object contains the amount of memory currently used by the system. The severity level is Alarm. The absolute sample type method is used.
The no form of this command removes the configured memory threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units in bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units in bytes.
The threshold value represents units in bytes.
The memory thresholds are based on monitoring MemoryUsed object. This object contains the amount of memory currently used by the system. The severity level is Alarm.
The absolute sample type method is used.
The no form of this command removes the configured compact flash threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units in bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units in bytes.
This command provisions an 802.1ag maintenance endpoint (MEP).
The no form of this command reverts to the default values.
This command provisions the maintenance endpoint (MEP).
The no form of this command reverts to the default values.
This command provisions the maintenance endpoint (MEP).
The no form of this command reverts to the default values.
This command configures the ETH-CFM maintenance endpoint (MEP). A MEP created at the VPLS service level vpls>eth-cfm creates a virtual MEP.
The no version of the command will remove the MEP.
down — Sends ETH-CFM messages away from the MAC relay entity
up — Sends ETH-CFM messages toward the MAC relay entity
This command configures the ETH-CFM maintenance endpoint (MEP).
down — Sends ETH-CFM messages away from the MAC relay entity.
up — Sends ETH-CFM messages towards the MAC relay entity.
This command configures the ETH-CFM maintenance endpoint (MEP).
This command creates or edits an MPLS-TP maintenance entity group (MEG) endpoint (MEP) on and MPLS-TP path. MEPs represent the termination point for OAM flowing on the path, as well as linear protection for the LSP. Only one MEP can be configured at each end of the path.
The following commands are applicable to a MEP on an MPLS-TP working or protect path: oam-template, bfd-enable, and shutdown. In addition, a protection-template may be configured on a protect path.
The no form of this command removes a MEP from an MPLS-TP path.
This command specifies the MEP from which to debug the CFM PDUs.
The no form of this command removes the MEP parameters.
This command provisions an 802.1ag maintenance endpoint (MEP).
The no form of the command deletes the MEP.
This command assigns an interface to a mesh group. Mesh groups limit the amount of flooding that occurs when a new or changed LSP is advertised throughout an area.
All routers in a mesh group should be fully meshed. When LSPs need to be flooded, only a single copy is received rather than a copy per neighbor.
To create a mesh group, configure the same mesh group value for each interface that is part of the mesh group. All routers must have the same mesh group value configured for all interfaces that are part of the mesh group.
To prevent an interface from flooding LSPs, the optional blocked parameter can be specified. Configure mesh groups carefully. It is easy to create isolated islands that do not receive updates as (other) links fail.
The no form of this command removes the interface from the mesh group.
no mesh-group — The interface does not belong to a mesh group.
This command assigns an interface to a mesh group. Mesh groups limit the amount of flooding that occurs when a new or changed LSP is advertised throughout an area.
All routers in a mesh group should be fully meshed. When LSPs need to be flooded, only a single copy is received rather than a copy per neighbor.
To create a mesh group, configure the same mesh group value for each interface that is part of the mesh group. All routers must have the same mesh group value configured for all interfaces that are part of the mesh group.
To prevent an interface from flooding LSPs, the optional blocked parameter can be specified. Configure mesh groups carefully to avoid creating isolated islands that do not receive updates as (other) links fail.
The no form of this command removes the interface from the mesh group.
This command binds a VPLS service to an existing Service Distribution Point (SDP).
Mesh SDPs bound to a service are logically treated like a single bridge “port” for flooded traffic where flooded traffic received on any mesh SDP on the service is replicated to other “ports” (spoke SDPs and SAPs) and not transmitted on any mesh SDPs.
![]() | Note: This command creates a binding between a service and an SDP. The SDP has an operational state which determines the operational state of the SDP within the service. For example, if the SDP is administratively or operationally down, the SDP for the service is down. |
The SDP must already be defined in the config>service>sdp context in order to associate the SDP with an Epipe or VPLS service. If the sdp sdp-id is not already configured, an error message is generated. If the sdp-id does exist, a binding between that sdp-id and the service is created.
SDPs must be explicitly associated and bound to a service. If an SDP is not bound to a service, no far-end router devices can participate in the service.
The no form of this command removes the SDP binding from the service. The SDP configuration is not affected; only the binding of the SDP to a service. Once removed, no packets are forwarded to the far-end router.
No sdp-id is bound to a service.
VC types are derived according to IETF draft-martini-l2circuit-trans-mpls.
The VC type value for Ethernet is 0x0005.
The VC type value for an Ethernet VLAN is 0x0004.
![]() | Note: The system expects a symmetrical configuration with its peer, specifically it expects to remove the same number of VLAN tags from received traffic as it adds to transmitted traffic. As some of the related configuration parameters are local and not communicated in the signaling plane, an asymmetrical behavior cannot always be detected and so cannot be blocked. Consequently, protocol extractions will not necessarily function for asymmetrical configurations as they would with a symmetrical configurations resulting in an unexpected operation. |
This command enables applications to all mesh SDPs.
The no form of reverts the default.
no mesh-sdp-binding
This command adds system messages as a match criterion.
The no form of this command removes messages as a match criterion.
This command adds system messages as a match criterion.
The no form of this command removes messages as a match criterion.
This command configures the maximum number of ICMPv6 messages that can be sent during the configured interval.
This command configures a message digest key when MD5 authentication is enabled on the interface, virtual-link or sham-link. Multiple message digest keys can be configured.
This command is not valid in the OSPF3 context.
The no form of this command removes the message digest key identified by the key-id.
No message digest keys are defined.
This is useful when a user must configure the parameter, but, for security purposes, the actual unencrypted key value is not provided.
This command configures a message digest key when MD5 authentication is enabled on the interface. Multiple message digest keys can be configured.
The no form of this command removes the message digest key identified by the key-id.
By default, no message keys are defined.
This is useful when a user must configure the parameter, but, for security purposes, the actual unencrypted key value is not provided.
This command configures the duration of the fast transmission period.
no message-fast-tx
This command configures the number of LLDPDUs to send during the fast transmission period.
no message-fast-tx-init
This command sets the advertisement timer and indirectly sets the master down timer on the virtual router instance. The message-interval setting must be the same for all virtual routers participating as a virtual router. Any VRRP advertisement message received with an Advertisement Interval field different than the virtual router instance configured message-interval value will be silently discarded.
The message-interval command is available in both non-owner and owner vrrp virtual-router-id nodal contexts. If the message-interval command is not executed, the default message interval of 1 second will be used.
The no form of this command restores the default message interval value of 1 second to the virtual router instance.
message-interval 1
This command sets the advertisement timer and indirectly sets the master down timer on the virtual router instance. The message-interval setting must be the same for all virtual routers participating as a virtual router. Any VRRP advertisement message received with an Advertisement Interval field different than the virtual router instance configured message-interval value will be silently discarded.
The message-interval command is available in both non-owner and owner vrrp virtual-router-id nodal contexts. If the message-interval command is not executed, the default message interval of 1 second will be used.
The no form of this command restores the default message interval value of 1 second to the virtual router instance.
This command sets the advertisement timer and indirectly sets the master down timer on the virtual router instance. The message-interval setting must be the same for all virtual routers participating as a virtual router. Any VRRP advertisement message received with an Advertisement Interval field different than the virtual router instance configured message-interval value will be silently discarded.
The message-interval command is available in both non-owner and owner vrrp virtual-router-id nodal contexts. If the message-interval command is not executed, the default message interval of 1 second will be used.
The no form of this command restores the default message interval value of 1 second to the virtual router instance.
This command configures the administrative advertisement message timer used by the master virtual router instance to send VRRP advertisement messages and to derive the master down timer as backup.
For an owner virtual router instance, the administrative advertisement timer directly sets the operational advertisement timer and indirectly sets the master down timer for the virtual router instance.
Non-owner virtual router instances usage of the message-interval setting is dependent on the state of the virtual router (master or backup) and the state of the master-int-inherit parameter.
VRRP advertisements messages that are fragmented, or contain IP options (IPv4), or contain extension headers (IPv6) require a longer message interval to be configured.
The in-use value of the message interval is used to derive the master down timer to be used when the virtual router is operating in backup mode based on the following formula:
(3x (in-use message interval) + skew time)
The skew time portion is used to slow down virtual routers with relatively low priority values when competing in the master election process.
The command is available in both non-owner and owner vrrp nodal contexts.
By default, a message-interval of 1 second is used.
The no form of the command reverts to the default value.
message-interval 1 — Advertisement timer set to 1 second.
This command configures the SDP monitoring keepalive request message length transmitted.
The no form of this command reverts the message-length octets value to the default setting.
This command defines a specific SAP for SRRP in-band messaging. A message-path SAP must be defined prior to activating the SRRP instance. The defined SAP must exist on the SRRP instances group IP interface for the command to succeed and cannot currently be associated with any dynamic or static subscriber hosts. Once a group IP interface SAP has been defined as the transmission path for SRRP Advertisement messages, it cannot be administratively shutdown, will not support static or dynamic subscriber hosts and cannot be removed from the group IP interface.
The SRRP instance message-path command may be executed at any time on the SRRP instance. Changing the message SAP fails if a dynamic or static subscriber host is associated with the new SAP. Once successfully changed, the SRRP instance immediately disables anti-spoof on the SAP and starts sending SRRP Advertisement messages, if the SRRP instance is activated.
Changing the current SRRP message SAP on an active pair of routers should be done in the following manner:
Shutting down the backup SRRP instance prevents the SRRP instances from becoming master due to temporarily using differing message path SAPs.
If an MCS peering is operational between the redundant nodes and the SRRP instance has been associated with the peering, the designated message path SAP is sent from each member.
The no form of this command can only be executed when the SRRP instance is shutdown. Executing no message-path allows the existing SAP to be used for subscriber management functions. A new message-path SAP must be defined prior to activating the SRRP instance.
This command configures the retry-count and response-timeout for GTP messages.
The no form of this command reverts to the default values.
message-retransmit timeout 5 retry-count 3
This command configures the message severity level.
This command sets the maximum number of routes per RIP update message.
The no form of this command resets the maximum number of routes back to the default of 25.
no message-size
This command configures the maximum number of routes per RIP update message.
The no form of the command reverts to the default value.
message-size 25
This command configures the maximum time that the LIC must reply to an X1 message. If the timer expires, the session is released.
This command specifies the message type match criteria for AVP value matching. Only specified diameter application messages are used for AVP value matching. This is a mandatory criteria in an avp-match id command.
This command does not restrict the debug output to the specified messages.
This command restricts the debug output to the specified message types.
When specified within a diameter peer policy, it overrides the message type configuration at the debug>diam level for messages received and sent on that diameter peer policy.
The no form of this command removes the message type from the debug configuration.
This command configures a TCA for the counter capturing hits due to the GTP filter message type.
This command specifies the context for configuration of GTP message-type filtering. If no message-type is specified within a filter, then all GTP message types are allowed.
This command configures a TCA for the counter capturing hits due to the GTPv2 message type filter.
This command specifies the context for the configuration of GTP-v2 message-type filtering. If no message-type-gtpv2 is specified within a filter, then all GTP message types are allowed, except for the messages that are dropped by GTP-C inspection because they violate the expected GTP protocol for the deployment interface (for example, roaming deployment).
The gtpc-inspection command must be enabled before configuring message-type-gtpv2 filtering.
This command displays specific information (for example, message type, source, and destination) regarding LDP messages sent to and received from LDP peers.
The no form of the command disables debugging output for LDP messages.
This command enables the context to configure opaque metadata to be inserted in NSH in the steered traffic if the forward action indicates NSH insertion.
This configures metric for this SPB interface SAP/spoke-sdp. This command is valid only for interfaces on control B-VPLS.
This command configures the IS-IS interface metric for IPv4 unicast.
This command specifies the cost metric for the static route, expressed as a decimal integer. This value is used when importing the static route into other protocols such as OSPF. When the metric is configured as 0 then the metric configured in OSPF, default-import-metric, applies. When modifying the metric of an existing static route, the preference will not change unless specified. This value is also used to determine which static route to install in the forwarding table.
If there are multiple static routes with the same preference but different metrics then the lower cost (metric) route will be installed.
The no form of this command returns the metric to the default value
metric 1
This command configures the metric used for the level on the interface.
In order to calculate the lowest cost to reach a given destination, each configured level on each interface must have a cost. The costs for each level on an interface may be different.
If the metric is not configured, the default of 10 is used unless reference bandwidth is configured.
The no form of this command reverts to the default value.
no metric
This command configures an explicit route cost metric for the OSPF interface that overrides the metrics calculated based on the speed of the underlying link.
The no form of this command deletes the manually configured interface metric, so the interface uses the computed metric based on the reference-bandwidth command setting and the speed of the underlying link.
no metric
This command allows the user to override the LSP operational metric with a constant administrative value that will not change regardless of the actual path the LSP is using over its lifetime.
The LSP operational metric will match the metric the active path of this LSP is using at any given time. For a CSPF LSP, this metric represents the cumulative IGP metric of all the links the active path is using. If CSPF for this LSP is configured to use the TE metric, the LSP operational metric is set to the maximum value. For a non-CSPF LSP, the operational metric is the shortest IGP cost to the destination of the LSP.
The LSP operational metric is used by some applications to select an LSP among a set of LSPs that are destined to the same egress router. The LSP with the lowest operational metric will be selected. If more than one LSP with the same lowest LSP metric exists, the LSP with the lowest tunnel index will be selected. The configuration of a constant metric by the user will make sure the LSP always maintains its preference in this selection regardless of the path it is using at any given time. Applications that use the LSP operational metric include LDP-over-RSVP, VPRN auto-bind, and IGP, BGP and static route shortcuts.
The no form of this command disables the administrative LSP metric and reverts to the default setting in which the metric value will represent the LSP metric returned by MPLS. The same behavior is obtained if the user entered a metric of value zero (0).
no metric. The LSP operational metric defaults to the metric returned by MPLS.
This command configures the metric of an MPLS forwarding policy.
The metric parameter is supported with the endpoint policy only and is inherited by the routes which resolve their next hop to this policy.
The no form of this command removes the metric parameter from the MPLS forwarding policy.
This command specifies the cost metric for the static route, expressed as a decimal integer. This value is used when importing the static route into other protocols such as OSPF. When the metric is configured as 0 then the metric configured in OSPF, default-import-metric, applies. When modifying the metric of an existing static route, the preference will not change unless specified. This value is also used to determine which static route to install in the forwarding table.
If there are multiple static routes with the same preference but different metrics then the lower cost (metric) route will be installed.
The no form of this command returns the metric to the default value
metric 1
This command specifies the metric to be used within the tunnel table manager for decision making purposes. When multiple SDPs going to the same destination exist, this value is used as a tie-breaker by tunnel table manager users such as MP-BGP to select the route with the lower value.
This command configures the metric used for the level on the interface.
In order to calculate the lowest cost to reach a given destination, each configured level on each interface must have a cost. The costs for each level on an interface may be different.
If the metric is not configured, the default of 10 is used unless reference bandwidth is configured.
The no form of this command reverts to the default value.
metric 10
This command configures an explicit route cost metric for the OSPF interface that overrides the metrics calculated based on the speed of the underlying link.
The no form of this command deletes the manually configured interface metric, so the interface uses the computed metric based on the reference-bandwidth command setting and the speed of the underlying link.
no metric
This command matches BGP routes based on local preference (the value in the MULTI_EXIT_DISC attribute).
If no comparison qualifiers are present (equal, or-higher, or-lower), then equal is the implied default.
A non-BGP route does not match a policy entry if it contains the metric command. In addition, a BGP route without a MED attribute also does not match a policy entry if it contains a metric command.
no metric
In a BGP import or export policy, this command assigns a MED value to routes matched by the policy statement entry. The MED value may be set to a fixed value (overriding the received value), set to the routing table cost of the route used to resolve the next hop of the BGP route, or modified by adding or subtracting a fixed value offset.
The no form of this command removes the MED attribute from the matched routes.
no metric
This command sets the metric added to routes that were received from a RIP neighbor.
The no form of this command reverts the metric value back to the default.
no metric-in
This command configures the metric added to routes received from a RIP neighbor.
When applying an export policy to a RIP configuration, the policy overrides the metric values determined through calculations involving the metric-in and metric-out values.
The no form of the command reverts to the default value.
metric-in 1
This command sets the metric added to routes that were exported into RIP and advertised to RIP neighbors.
The no form of this command removes the command from the config and resets the metric-in value back to the default.
no metric-out
This command configures the metric assigned to routes exported into RIP and advertised to RIP neighbors.
When applying an export policy to a RIP configuration, the policy overrides the metric values determined through calculations involving the metric-in and metric-out values.
The no form of the command reverts to the default value.
metric-out 1
This command specifies the link metric type to use in the RSVP-TE LSP or SR-TE LSP path computation by either the local CSPF or the PCE.
The no form of this command returns the metric to its default value.
metric-type igp
This command configures the type of metric for the flexible algorithm. The topology graph assumes that all links are configured with the correct metric type.
For example, if the flexible algorithm definition instructs the use of te-metric keyword, it is assumed that all links have te-metric configured. Links without the te-metric configuration are excluded from the flexible algorithm topology graph.
The no form of this command removes the configured metric type and sets it to its default value (that is, igp).
no metric-type
This command enters the context to configure MFIB-allowed MDA destinations.
The allowed-mda-destinations node and the corresponding mda command are used on spoke and mesh SDP bindings to provide a list of MDA destinations in the chassis that are allowed as destinations for multicast streams represented by [*,g] and [s,g] multicast flooding records on the VPLS service. The MDA list only applies to IP multicast forwarding when IGMP snooping is enabled on the VPLS service. The MDA list has no effect on normal VPLS flooding such as broadcast, L2 multicast, unknown destinations or non-snooped IP multicast.
At the IGMP snooping level, a spoke or mesh SDP binding is included in the flooding domain for an IP multicast stream when it has either been defined as a multicast router port, received a IGMP query through the binding or has been associated with the multicast stream through an IGMP request by a host over the binding. Due to the dynamic nature of the way that a spoke or mesh SDP binding is associated with one or more egress network IP interfaces, the system treats the binding as appearing on all network ports. This causes all possible network destinations in the switch fabric to be included in the multicast streams flooding domain. The MDA destination list provides a simple mechanism that narrows the IP multicast switch fabric destinations for the spoke or mesh SDP binding.
If no MDAs are defined within the allowed-mda-destinations node, the system operates normally and will forward IP multicast flooded packets associated with the spoke or mesh SDP binding to all switch fabric taps containing network IP interfaces.
The MDA inclusion list should include all MDAs that the SDP binding may attempt to forward through. A simple way to ensure that an MDA that is not included in the list is not being used by the binding is to define the SDP the binding is associated with as MPLS and use an RSVP-TE LSP with a strict egress hop. The MDA associated with the IP interface defined as the strict egress hop should be present in the inclusion list. If the inclusion list does not currently contain the MDA that the binding is forwarding through, the multicast packets will not reach the destination represented by the binding.
By default, the MDA inclusion list is empty.
If an MDA is removed from the list, the MDA is automatically removed from the flooding domain of any snooped IP multicast streams associated with a destination on the MDA unless the MDA was the last MDA on the inclusion list. Once the inclusion list is empty, all MDAs are eligible for snooped IP multicast flooding for streams associated with the SDP binding.
This command enables the context to configure MFIB-allowed XMA or MDA destinations.
The allowed-mda-destinations node and the corresponding mda command are used on spoke and mesh SDP bindings to provide a list of XMA or MDA destinations in the chassis that are allowed as destinations for multicast streams represented by [*,g] and [s,g] multicast flooding records on the VPLS service. The XMA or MDA list only applies to IP multicast forwarding when IGMP snooping is enabled on the VPLS service. The XMA or MDA list has no effect on normal VPLS flooding such as broadcast, Layer 2 multicast, unknown destinations or non-snooped IP multicast.
At the IGMP snooping level, a spoke or mesh SDP binding is included in the flooding domain for an IP multicast stream when it has either been defined as a multicast router port, received a IGMP query through the binding or has been associated with the multicast stream through an IGMP request by a host over the binding. Due to the dynamic nature of the way that a spoke or mesh SDP binding is associated with one or more egress network IP interfaces, the system treats the binding as appearing on all network ports. This causes all possible network destinations in the switch fabric to be included in the multicast streams flooding domain. The XMA or MDA destination list provides a simple mechanism that narrows the IP multicast switch fabric destinations for the spoke or mesh SDP binding.
If no XMAs or MDAs are defined within the allowed-mda-destinations node, the system operates normally and will forward IP multicast flooded packets associated with the spoke or mesh SDP binding to all switch fabric taps containing network IP interfaces.
The XMA or MDA inclusion list should include all XMAs or MDAs that the SDP binding may attempt to forward through. A simple way to ensure that an XMA or MDA that is not included in the list is not being used by the binding is to define the SDP the binding is associated with as MPLS and use an RSVP-TE LSP with a strict egress hop. The XMA or MDA associated with the IP interface defined as the strict egress hop should be present in the inclusion list.
If the inclusion list does not currently contain the XMA or MDA that the binding is forwarding through, the multicast packets will not reach the destination represented by the binding. By default, the XMA or MDA inclusion list is empty.
If an XMA or MDA is removed from the list, the XMA or MDA is automatically removed from the flooding domain of any snooped IP multicast streams associated with a destination on the XMA or MDA unless the XMA or MDA was the last XMA or MDA on the inclusion list. Once the inclusion list is empty, all XMAs or MDAs are eligible for snooped IP multicast flooding for streams associated with the SDP binding.
This command determines the list of SAPs which egress a certain IP multicast stream (identified by source unicast and destination multicast IP addresses) within a VPLS service. An MFIB ping packet is always sent via the data plane.
An MFIB ping is forwarded across the VPLS following the MFIB. If an entry for the specified source unicast and destination multicast IP addresses exist in the MFIB for that VPLS, then the packet is forwarded along those paths, provided they are active. A response is generated only when there is an egress SAP binding for the specified IP multicast stream.
An MFIB ping reply can be sent using the data plane or the control plane. The return-control option configures the reply to be sent using the control plane. If return-control is not specified, the reply is sent using the data plane.
If the octet size specified is less than the minimum packet, the minimum sized packet necessary to send the request is used.
The message interval value must be expired before the next message request is sent.
Upon the expiration of the message time out, the requesting router assumes that the message response is not received. A request timeout message is displayed by the CLI for each message request sent that expires. Any response received after the request times out is silently discarded.
If the interval is set to 1 second where the timeout value is set to 10 seconds, then the maximum time between message requests is 10 seconds and the minimum is 1 second. This depends upon the receipt of a message reply corresponding to the outstanding message request.
The following output displays multicast FIB connectivity test information
This command specifies the multicast FIB high watermark. When the percentage filling level of the multicast FIB exceeds the configured value, a trap is generated and a log entry is added.
The no form of this command reverts to the default.
mfib-table-high-wmark 95
This command specifies the multicast FIB low watermark. When the percentage filling level of the multicast FIB drops below the configured value, the corresponding trap is cleared and a log entry is added.
The no form of this command reverts to the default.
mfib-table-low-wmark
This command specifies the maximum number of (s,g) entries in the multicast forwarding database (MFIB) for this VPLS instance.
The mfib-table-size parameter specifies the maximum number of multicast database entries for both learned and static multicast addresses for the VPLS instance. When a table-size limit is set on the mfib of a service which is lower than the current number of dynamic entries present in the mfib then the number of entries remains above the limit.
The no form of this command removes the configured maximum MFIB table size.
no mfib-table-size
If the management Ethernet port on the active CPM goes down, this command allows the active CPM to be configured to use the management Ethernet port of the standby CPM.
The revert option allows the administrator to control when to revert back to the management Ethernet port of the primary CPM once it comes up again.
The no form of the command disables redundancy, so that connectivity to the active CPM is lost if its Ethernet port goes down.
This feature is not supported on the 7750 SR-a, 7750-e, and the VSR platforms.
no mgmt-ethernet
This command configures multihoming mode.
mh-mode access
In services with two VXLAN instances, only one of the two instances can be configured as network.
This command defines the MIP method of creation. MIP creation mode and other factors are part of the MIP creation authority (association or default-domain) logic. The MIP creation algorithm may result in multiple potential MIPs. Only the lowest-level valid MIP is installed. The static creation mode is the exception to the single MIP installation rule.
Under the association context, the level level parameter is not supported as part of this command. The level is derived from the level configuration of the domain.
The no form of this command is only available under the association context, and reverts the current mode of creation to the default none. In order to transition to and from the static mode of operation, the active mhf-creation mode must be none.
mhf-creation none
This command defines the MIP method of creation. MIP creation mode and other factors are part of the MIP creation authority (association or default-domain) logic. The MIP creation algorithm may result in multiple potential MIPs. Only the lowest-level valid MIP is installed. The static creation mode is the exception to the single MIP installation rule.
Under the association context, the level level parameter is not supported as part of this command. The level is derived from the level configuration of the domain.
The no form of this command is only available under the association context, and reverts the current mode of creation to the default none. In order to transition to and from the static mode of operation, the active mhf-creation mode must be none.
mhf-creation defer (config>eth-cfm>default-domain>bridge-identifier)
This command enables, in the IGP instance, the micro-loop avoidance feature to prevent micro-loops from using Segment Routing (SR) loop-free tunnels for packets that are forwarded over SR IS-IS node SIDs.
IGP then performs the following procedures:
The no form of this command disables the micro-loop avoidance feature.
no micro-loop-avoidance
This command enables the context to configure mid-pool tier parameters for an HS pool policy. Parameters allow for allocating the percentage of the root pool size, defining a mid-tier pool’s root-pool parent, specifying the port bandwidth oversubscription factor, or specifying a slope policy for the specific mid-tier pool.
The no form of the command reverts the parent root pool association to root-pool 1, reverts to the default allocation-percentage value, the default port-bw-oversub-factor, and default slope-policy to the specified mid-pool.
This command enables the context to configure HS pool policy parameters. Within the mid-tier context, mid-pools can be associated with a root pool, sized as a percentage of the root pool, have an HS slope policy applied, or be configured with a port bandwidth oversubscription factor parameter used to influence the port-class pool sizes associated with the mid-tier pool.
This command enables matching on tunnels with migrant UEs.
The no form of this command disables matching on migrant UEs, unless UE state matching is disabled altogether.
no migrant
This command specifies the minimum time allowed between sending unsolicited router advertisements.
The no form of this command reverts to the default.
min-advertisement 900
This command configures the minimum interval between sending ICMPv6 neighbor discovery router advertisement messages.
min-advertisement-interval 200
This command configures the minimum interval between sending ICMPv6 neighbor discovery router advertisement messages.
min-advertisement-interval 200
This command configures the minimum authentication interval.
The no form of this command reverts to the default.
min-auth-interval 15
This command specify the minimum interval between two consecutive authentication attempts from the same host.
The no form of this command reverts to the default.
Re-authentication for IPoE sessions enable dynamic policy changes.
This command configures the maximum frequency of re-authentications by specifying a minimum interval between two non-forced authentications for the same IPoE session.
Re-authentications are, by default, disabled and can be enabled by configuring a min-auth-interval.
Setting the min-auth-interval to zero seconds always re-authenticates on each trigger packet.
The no form of this command reverts to the default behavior.
min-auth-interval infinite
This command configures the minimum bandwidth that auto-bandwidth allocation is allowed to request for an LSP.
The LSP minimum applies whether the bandwidth adjustment is triggered by normal adjust-timer expiry or manual request.
The no form of this command reverts to the default value.
min-bandwidth 0
no min-delay
This command configures the minimum transmitted frame length.
This command configures the minimum lease time.
The no form of this command reverts to the default.
min-lease-time min 10
days | 0 to 3650 |
hours | 0 to 23 |
minutes | 0 to 59 |
seconds | 0 to 59 |
This command enables matching only on tunnels that have at least the specified number of UEs connected.
The no form of this command disables matching on a minimum number of UEs.
no min-num-ue
This command configures the minimum interval, in seconds, at which a prefix can be advertised to a peer.
The no form of this command reverts to default values.
min-route-advertisement 30
This command configures the minimum interval, in seconds, at which a prefix can be advertised to a peer.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific value is used.
The no form of this command reverts to default values.
min-route-advertisement 30
This command configures the minimum interval, in seconds, between successive updates of a prefix towards a peer.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group), or neighbor level (only applies to specified peer). The most specific value is used.
The no form of this command used at the global level reverts to default.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
The rapid-update command can be used to override the peer-level min-route-advertisement time and applies the minimum setting (0 seconds) to routes belonging to address families specified by the rapid-update command; routes of other address families continue to be advertised according to the session-level MRAI setting.
The rapid-update and rapid-withdrawal commands may result in the routes being sent before the peer-level MRAI timer expires.
min-route-advertisement 30
The min-thresh-separation command defines the minimum required separation between each in-use discard threshold maintained for each parent policer context associated with the policer-control-policy. The min-thresh-separation value may be overridden on each SAP or sub-profile to which the policy is applied.
The system uses the default or specified min-thresh-separation value in order to determine the minimum separation required between each of the of the parent policer discard thresholds. The system enforces the minimum separation based on the following behavior in two ways. The first is determining the size of the shared-portion for each priority level (when the mbs-contribution command’s optional fixed keyword is not specified):
The second function the system uses the min-thresh-separation value for is determining the value per priority level for the fair-portion:
When the mbs-contribution command’s optional fixed keyword is defined for a priority level within the policy, the system will treat the defined mbs-contribution value as an explicit definition of the priority level’s MBS. While the system will continue to track child policer associations with the parent policer priority levels, the association counters will have no effect. Instead the following rules is used to determine a fixed priority level’s shared-portion and fair-portion:
min-thresh-separation value
mbs-contribution value less min-thresh-separation value
Each time the min-thresh-separation value is modified, the thresholds for all instances of the parent policer created through association with this policer-control-policy are reevaluated.
Determining the Correct Value for the Minimum Threshold Separation Value
The minimum value for min-thresh-separation should be set equal to the maximum size packet that is handled by the parent policer. This ensures that when a lower priority packet is incrementing the bucket, the size of the increment will not cause the bucket's depth to equal or exceed a higher priority threshold. It also ensures that an unfair packet within a priority level cannot cause the PIR bucket to increment to the discard-all threshold within the priority.
When evaluating maximum packet size, each child policer’s per-packet-offset setting should be taken into consideration. If the maximum size packet is 1518 bytes and a per-packet-offset parameter is configured to add 20 bytes per packet, min-thresh-separation should be set to 1538 due to the fact that the parent policer will increment its PIR bucket using the extra 20 bytes.
In most circumstances, a value larger than the maximum packet size is not necessary. Management of priority level aggregate burst tolerance is intended to be implemented using the priority level mbs-contribution command. Setting a value larger than the maximum packet size will not adversely affect the policer performance, but it may increase the aggregate burst tolerance for each priority level.
![]() | Note: A priority level’s shared-portion of the parent policer’s PIR bucket depth is only necessary to provide some separation between a lower priority’s discard-all threshold and this priority’s discard-unfair threshold. It is expected that the burst tolerance for the unfair packets is relatively minimal since the child policers feeding the parent policer priority level all have some amount of fair burst before entering into an FIR exceed or unfair state. The fair burst amount for a priority level is defined using the mbs-contribution command. |
The no form of this command returns the policy’s min-thresh-separation value to the default value.
The kilobytes keyword is optional and is mutually exclusive with the bytes keyword. When specified, size is interpreted as specifying the size of min-thresh-separation in kilobytes.
This command defines the minimum required separation between each in-use discard threshold maintained for each parent policer context associated with the policer-control-policy. The min-thresh-separation value may be overridden on each SAP or sub-profile to which the policy is applied.
The system uses the default or specified min-thresh-separation value in order to determine the minimum separation required between each of the of the parent policer discard thresholds. The system enforces the minimum separation based on the following behavior in two ways. The first is determining the size of the shared-portion for each priority level (when the mbs-contribution command’s optional fixed keyword is not specified):
The second function the system uses the min-thresh-separation value for is determining the value per priority level for the fair-portion:
When the mbs-contribution command’s optional fixed keyword is defined for a priority level within the policy, the system will treat the defined mbs-contribution value as an explicit definition of the priority level’s MBS. While the system will continue to track child policer associations with the parent policer priority levels, the association counters will have no effect. Instead the following rules will be used to determine a fixed priority level’s shared-portion and fair-portion:
Each time the min-thresh-separation value is modified, the thresholds for all instances of the parent policer created through association with this policer-control-policy are reevaluated except for parent policer instances that currently have a min-thresh-separation override.
Determining the Correct Value for the Minimum Threshold Separation Value
The minimum value for min-thresh-separation should be set equal to the maximum size packet that will be handled by the parent policer. This ensures that when a lower priority packet is incrementing the bucket, the size of the increment will not cause the bucket's depth to equal or exceed a higher priority threshold. It also ensures that an unfair packet within a priority level cannot cause the PIR bucket to increment to the discard-all threshold within the priority.
When evaluating maximum packet size, each child policer’s per-packet-offset setting should be taken into consideration. If the maximum size packet is 1518 bytes and a per-packet-offset parameter is configured to add 20 bytes per packet, min-thresh-separation should be set to 1538 due to the fact that the parent policer will increment its PIR bucket using the extra 20 bytes.
In most circumstances, a value larger than the maximum packet size is not necessary. Management of priority level aggregate burst tolerance is intended to be implemented using the priority level mbs-contribution command. Setting a value larger than the maximum packet size will not adversely affect the policer performance, but it may increase the aggregate burst tolerance for each priority level.
One thing to note is that a priority level’s shared-portion of the parent policer’s PIR bucket depth is only necessary to provide some separation between a lower priority’s discard-all threshold and this priority’s discard-unfair threshold. It is expected that the burst tolerance for the unfair packets is relatively minimal since the child policers feeding the parent policer priority level all have some amount of fair burst before entering into an FIR exceed or unfair state. The fair burst amount for a priority level is defined using the mbs-contribution command.
The no form of this command returns the policy’s min-thresh-separation value to the default value. This has no effect on instances of the parent policer where min-thresh-separation is overridden unless the override is removed.
no min-thresh-separation
The kilobytes keyword is optional and is mutually exclusive with the bytes keyword. When specified, size is interpreted as specifying the size of min-thresh-separation in kilobytes.
This command, within the SAP ingress and egress contexts, is used to override the root arbiter’s parent policer min-thresh-separation parameter that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy min-thresh-separation parameter have no effect on the SAP’s parent policer until the override is removed using the no min-thresh-separation command within the SAP.
The no form of this command removes the override and allows the min-thresh-separation setting from the policer-control-policy to control the root arbiter’s parent policer’s minimum discard threshold separation size.
no min-thresh-separation
This command within the SAP ingress and egress contexts is used to override the root arbiter’s parent policer min-thresh-separation parameter that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy min-thresh-separation parameter have no effect on the SAP’s parent policer until the override is removed using the no min-thresh-separation command within the SAP.
The no form of this command removes the override and allows the min-thresh-separation setting from the policer-control-policy to control the root arbiter’s parent policer’s minimum discard threshold separation size.
no min-thresh-separation
This command within the SAP ingress and egress contexts is used to override the root arbiter’s parent policer min-thresh-separation parameter that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy min-thresh-separation parameter have no effect on the SAP’s parent policer until the override is removed using the no min-thresh-separation command within the SAP.
The no form of this command removes the override and allows the min-thresh-separation setting from the policer-control-policy to control the root arbiter’s parent policer’s minimum discard threshold separation size.
no min-thresh-separation
This command within the SAP ingress and egress contexts is used to override the root arbiter’s parent policer min-thresh-separation parameter that is defined within the policer-control-policy applied to the SAP.
When the override is defined, modifications to the policer-control-policy min-thresh-separation parameter have no effect on the SAP’s parent policer until the override is removed using the no min-thresh-separation command within the SAP.
The no form of this command removes the override and allows the min-thresh-separation setting from the policer-control-policy to control the root arbiter’s parent policer’s minimum discard threshold separation size.
no min-thresh-separation
The min-thresh-separation command defines the minimum required separation between each in-use discard threshold maintained for each parent policer context associated with the policer-control-policy. The min-thresh-separation value may be overridden on each SAP or sub-profile to which the policy is applied.
The system uses the default or specified min-thresh-separation value in order to determine the minimum separation required between each of the of the parent policer discard thresholds. The system enforces the minimum separation based on the following behavior in two ways. The first is determining the size of the shared-portion for each priority level (when the mbs-contribution command’s optional fixed keyword is not specified):
The second function the system uses the min-thresh-separation value for is determining the value per priority level for the fair-portion:
When the mbs-contribution command’s optional fixed keyword is defined for a priority level within the policy, the system will treat the defined mbs-contribution value as an explicit definition of the priority level’s MBS. While the system will continue to track child policer associations with the parent policer priority levels, the association counters will have no effect. Instead, the following rules will be used to determine a fixed priority level’s shared-portion and fair-portion:
Each time the min-thresh-separation value is modified, the thresholds for all instances of the parent policer created through association with this policer-control-policy are reevaluated.
Determining the Correct Value for the Minimum Threshold Separation Value
The minimum value for min-thresh-separation should be set equal to the maximum size packet that will be handled by the parent policer. This ensures that when a lower priority packet is incrementing the bucket, the size of the increment will not cause the bucket's depth to equal or exceed a higher priority threshold. It also ensures that an unfair packet within a priority level cannot cause the PIR bucket to increment to the discard-all threshold within the priority.
When evaluating maximum packet size, each child policer’s per-packet-offset setting should be taken into consideration. If the maximum size packet is 1518 bytes and a per-packet-offset parameter is configured to add 20 bytes per packet, min-thresh-separation should be set to 1538 due to the fact that the parent policer will increment its PIR bucket using the extra 20 bytes.
In most circumstances, a value larger than the maximum packet size is not necessary. Management of priority level aggregate burst tolerance is intended to be implemented using the priority level mbs-contribution command. Setting a value larger than the maximum packet size will not adversely affect the policer performance, but it may increase the aggregate burst tolerance for each priority level.
![]() | Note: A priority level’s shared-portion of the parent policer’s PIR bucket depth is only necessary to provide some separation between a lower priority’s discard-all threshold and this priority’s discard-unfair threshold. It is expected that the burst tolerance for the unfair packets is relatively minimal since the child policers feeding the parent policer priority level all have some amount of fair burst before entering into an FIR exceed or unfair state. The fair burst amount for a priority level is defined using the mbs-contribution command. |
The no form of this command returns the policy’s min-thresh-separation value to the default value.
This command sets the minimum allowable virtual path identifier (VPI) value that can be used on the ATM interface for a VPC.
This command configures the minimum amount of time that BGP waits, after the first session establishment following a restart of the BGP instance, until it can start advertising IPv4-unicast and IPv6-unicast routes to its BGP peers, to allow time for re-convergence.
The time limit configured by this command should allow sufficient time for all important peers to re-establish their sessions with the restarting router.
The no form of this command implements the default time limit of 0 seconds, which disables all forms of delayed route advertisement. In other words, it causes IPv4-unicast and IPv6-unicast routes to be re-advertised as soon as possible after BGP instance restart.
no min-wait-to-advertise
This command configures the minimum amount of time that BGP waits, after the first session establishment following a restart of the BGP instance, until it can start advertising IPv4-unicast and IPv6-unicast routes to its BGP peers, to allow time for re-convergence.
The time limit configured by this command should allow sufficient time for all important peers to re-establish their sessions with the restarting router.
The no form of this command implements the default time limit of 0 seconds, which disables all forms of delayed route advertisement. In other words, it causes IPv4-unicast and IPv6-unicast routes to be re-advertised as soon as possible after BGP instance restart.
no min-wait-to-advertise
This command configures a percentage-based or number-based threshold which represents the minimal available percentage or number of the prefix with a configured length in the provisioned prefix. The system sends out a warning if the actual percentage or number is lower than the configured threshold.
For example:
With the above configuration, the system sends a warning when the number of available /64 in prefix 2001:0:0:ffe0::/50 is less than 3.
The no form of this command removes the command parameters from the configuration.
Configure the minimum required age of a password before it can be changed again.
minimum-age min 10
![]() | Note: This command applies to local users. |
This command configures the minimum number of characters required to be different in the new password from a previous password.
The no form of this command reverts to default value.
minimum-change 5
![]() | Note: This command applies to local users. |
Force the use of at least this many different character classes
The no form of this command resets to default.
no minimum-classes
This command specifies the desired minimum number of free addresses in this pool.
The no form of this command reverts to the default.
minimum-free 1
This command configures the minimum number of free addresses in this subnet. If the actual number of free addresses in this subnet falls below this configured minimum, a notification is generated.
The no form of the reverts to the default.
minimum-free 1
This command creates a threshold for a given prefix length on the pool level. Up to 128 thresholds could be created. For example, with minimum-free prefix-length 64, then the usage of /64 prefix in the pool is counted.
There are two types of thresholds that could be defined at the pool level:
Configuring this command also enables the system stats collection for configure prefix length, which could be displayed with the show router router-id dhcp6 local-dhcp-server dhcp6-server-name pool-threshold-stats command.
The no form of this command removes the prefix-length from the configuration.
This command configures the scale parameters for the ISA group. When min-isa-generation is configured as 1, the group and per-ISA limits are the MS-ISA scale.
If there is a mix of ISA 1s and 2s, the min-isa-generation must be left as 1.
When min-isa-gen is configured as 2, the per-isa resource limits shown in the show isa application-assurance-group 1 load-balance output will increase to show ISA2 limits.
minimum-isa-generation 1
This command configures the minimum number of characters required for locally administered passwords, HMAC-MD5-96, HMAC-SHA-96, and des-keys configured in the system security section.
If multiple minimum-length commands are entered each command overwrites the previous entered command.
The no form of this command reverts to default value.
minimum-length 6
This command enables the context to configure minimum-lifetime of Python cache information.
This command sets the minimum number of links that must be active for the bundle to be active.
If the number of active links drops below the configured minimum then the multilink bundle will transition to an operationally down state.
The no form of this command removes the minimum link limit.
minimum-links 1
This command specifies the minute to schedule a command. Multiple minutes of the hour can be specified. When multiple minutes are configured, each of them will cause the schedule to occur. If a minute is configured, but no hour or day is configured, the event will not execute. If a minute is configured without configuring the month, weekday, day-of-month, and minute, the event will not execute.
The no form of this command removes the specified minute from the configuration.
no minute
This command configures the maximum time, in minutes, before a key re-exchange is initiated by the server.
The no form of this command reverts to the default value.
minutes 60
This command allows Maintenance Intermediate Points (MIPs). The creation rules of the MIP are dependent on the mhf-creation configuration for the MA.
The no form of this command removes the MIP creation request.
no mip
This command allows Maintenance Intermediate Points (MIPs). The creation rules of the MIP are dependent on the mhf-creation configuration for the MA.
The no form of this command removes the MIP creation request.
no mip
This command allows Maintenance Intermediate Points (MIPs). The creation rules of the MIP are dependent on the mhf-creation configuration for the MA. This MIP option is only available for default and static mhf-creation methods.
This command creates a context for maintenance entity group intermediate point (MIP) parameters for the forward path and the reverse path of an MPLS-TP LSP at an LSR.
This command specifies the MIP from which to debug the CFM PDUs.
The no form of this command removes the MIP parameters.
This command allows the operator to set the priority of the Linktrace Response Message (ETH-LTR) from a MIP for this association.
7
This command allows the operator to set the priority of the Linktrace Response Message (ETH-LTR) from a MIP for this association.
This command configures the minimum information rate (MIR) scheduling parameter for each MLPPP class queue for this profile.
This command configures the minimum information rate scheduling parameter for each Frame Relay scheduling class queue for this profile.
90% for all classes
This command creates a context to set up a service that is intended for packet mirroring. It is configured as a service to allow mirrored packets to be directed locally (within the same router) or remotely, over the core of the network and have a far-end decode mirror encapsulation.
The mirror destination service is comprised of destination parameters that define where the mirrored packets are to be sent. It also specifies whether the defined service-id will receive mirrored packets from far-end router over the network core.
The mirror destination service IDs are persistent between boots of the router and are included in the configuration saves. The local sources of mirrored packets for the service ID are defined within the debug mirror mirror-source command that references the same service-id. Up to 255 mirror destination service IDs can be created within a single system.
The mirror-dest command creates or edits a service ID for mirroring purposes. If the service-id does not exist within the context of all defined services, the mirror destination service is created and the context of the CLI is changed to that service ID. If the service-id exists within the context of defined mirror destination services, the CLI context is changed for editing parameters on that service ID. If the service-id exists within the context of another service type, an error message is returned and CLI context is not changed from the current context.
LI source configuration is saved using the li>save command.
The no form of this command removes a mirror destination from the system. The mirror source or li-source associations with the mirror destination service-id do not need to be removed or shutdown first. The mirror destination service-id must be shutdown before the service ID can be removed. When the service ID is removed, all mirror-source or li-source commands that have the service ID defined will also be removed from the system.
If particular a service ID already exists for a service, then the same value cannot be used to create a mirror destination service ID with the same value. For example:
If an Epipe service ID 11 exists, then a mirror destination service ID 11 cannot be created. If a VPLS service ID 12 exists, then a mirror destination service ID 12 cannot be created.
If an IES service ID 13 exists, then a mirror destination service ID 13 cannot be created.
service-id: | 1 to 2147483647 |
svc-name: | 64 characters maximum |
To create a service, you must assign a service ID; however, after it is created, either the service ID or the service name can be used to identify and reference a service.
If a name is not specified at creation time, then SR OS assigns a string version of the service-id as the name.
Service names may not begin with an integer (0 to 9).
This command configures a range of service IDs reserved for RADIUS-triggered mirror destination. The range can be expanded or reduced in real time. The range cannot conflict with other service IDs.
The no form of this command removes the service IDs reserved for LI mirror destination services.
This command creates a template used by RADIUS-triggered mirror destinations. RADIUS provides the IP destination (and other optional attributes) for the mirror destination and the mirror template provides the remaining mirror destination attributes for mirroring packets remotely over the core of an IP network.
The system supports up to eight mirror destination templates and allows a mirror destination to be swapped in real time. Only new LI sources will use the new attribute of the mirror destination template. Existing LI sources remain unchanged and continue to use the attribute of the previous mirror destination template.
The no form of this command removes a mirror destination template from the system.
This command enables or disables the use of a RADIUS triggered mirror destination template to be used by new LI sources.
This command configures an application-based policy mirroring service that uses this AA ISA group’s AQP entry as a mirror source. When configured, AQP entry becomes a mirror source for IP packets seen by the AA (the mirrored packet is an IP packet analyzed by AA and does not include encapsulations present on the incoming interfaces).
no mirror-source
This command configures debugging on a mirror source.
This command configures mirror source parameters for a mirrored service.
The mirror-source command is used to enable mirroring of packets specified by the association of the mirror-source to sources of packets defined within the context of the mirror-dest-service-id. The mirror destination service must already exist within the system.
A mirrored packet cannot be mirrored to multiple destinations. If a packet matches multiple mirror source entries (for example, a SAP on one mirror-source and a port on another mirror-source), then the packet is mirrored to a single mirror-dest-service-id based on the following precedence:
The precedence is structured so the most specific match criteria has precedence over a less specific match. For example, if a mirror-source defines a port and a SAP on that port, then a packet arriving on the SAP will be mirrored using the SAP mirror (and not mirrored using the Port mirror) because the SAP is more specific than the port.
The no form of this command deletes all related source commands within the context of the mirror-source service-id. The command does not remove the service ID from the system.
service-id: | 1 to 2147483647 |
svc-name: | 64 characters maximum |
This command configures mirror source parameters for a mirrored service.
The mirror-source command is used to enable mirroring of packets specified by the association of the mirror-source to sources of packets defined within the context of the mirror-dest-service-id. The mirror destination service must already exist within the system.
A mirrored packet cannot be mirrored to multiple destinations. If a packet matches multiple mirror source entries (for example, a SAP on one mirror-source and a port on another mirror-source), then the packet is mirrored to a single mirror-dest-service-id based on the following precedence:
The precedence is structured so the most specific match criteria has precedence over a less specific match. For example, if a mirror-source defines a port and a SAP on that port, then a packet arriving on the SAP will be mirrored using the SAP mirror (and not mirrored using the Port mirror) because the SAP is more specific than the port.
The mirror-source configuration is not saved when a configuration is saved. A mirror-source manually configured within an ASCII configuration file will not be preserved if that file is overwritten by a save command. Define the mirror-source within a file associated with a config exec command to make a mirror-source persistent between system reboots.
By default, all mirror destination service IDs have a mirror-source associated with them. The mirror-source is not technically created with this command. Instead the service ID provides a contextual node for storing the current mirroring sources for the associated mirror destination service ID. The mirror-source is created for the mirror service when the operator enters the debug>mirror-source svcId for the first time. If the operator enters li>li-source svcId for the first time, an LI source is created for the mirror service. The mirror-source is also automatically removed when the mirror destination service ID is deleted from the system.
The no form of this command deletes all related source commands within the context of the mirror-source service-id. The command does not remove the service ID from the system.
This command enables debugging for IGMP miscellaneous information.
The no form of the command disables the debugging.
The following is shows debugged IGMP miscellaneous information
This command enables and disables debugging for GMPLS Misc events.
This command debugs miscellaneous events.
The no form of the command disables the debugging.
This command enables debugging for mtrace and mtrace2 miscellaneous.
This command enables debugging for IS-IS misc.
The no form of the command disables debugging.
This command allows the user to configure the consequent action to a pm-tti mismatch.
The no form of this command reverts to the default value.
n/a, the received traffic is passed through.
This command allows the user to configure the consequent action to a psi-payload type mismatch.
This command allows the user to configure the consequent action to a sm-tti mismatch.
n/a
This command configures a TCA for the counter capturing drops due to the GTP filter missing mandatory IE check. A missing-mandatory-ie drop TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating a missing-mandatory-ie TCA.
This command enables the use by an SDP of the mixed-LSP mode of operation. This command indicates to the service manager that it must allow a primary LSP type and a backup LSP type in the same SDP configuration. For example, the lsp and ldp commands are allowed concurrently in the SDP configuration. The user can configure one or two types of LSPs under the same SDP. Without this command, these commands are mutually exclusive.
The user can configure an RSVP LSP as a primary LSP type with an LDP LSP as a backup type. The user can also configure a BGP RFC 3107 BGP LSP as a backup LSP type.
If the user configures an LDP LSP as a primary LSP type, then the backup LSP type must be an RFC 3107 BGP labeled route.
At any given time, the service manager programs only one type of LSP in the linecard that will activate it to forward service packets according to the following priority order:
In the case of the RSVP/LDP SDP, the service manager will program the NHLFE(s) for the active LSP type preferring the RSVP LSP type over the LDP LSP type. If no RSVP LSP is configured or all configured RSVP LSPs go down, the service manager will re-program the card with the LDP LSP if available. If not, the SDP goes operationally down.
When a higher priority type LSP becomes available, the service manager reverts back to this LSP at the expiry of the sdp-revert-time timer or the failure of the currently active LSP, whichever comes first. The service manager then re-programs the card accordingly. If the infinite value is configured, then the SDP reverts to the highest priority type LSP only if the currently active LSP failed.
![]() | Note: LDP uses a tunnel down damp timer which is set to three seconds by default. When the LDP LSP fails, the SDP will revert to the RSVP LSP type after the expiry of this timer. For an immediate switchover, this timer must be set to zero. Use the config>router>ldp>tunnel-down-damp-time command. |
If the user changes the value of the sdp-revert-time timer, it will take effect only at the next use of the timer. Any timer which is outstanding at the time of the change will be restarted with the new value.
If class based forwarding is enabled for this SDP, the forwarding of the packets over the RSVP LSPs will be based on the FC of the packet as in current implementation. When the SDP activates the LDP LSP type, then packets are forwarded over the LDP ECMP paths using the regular hash routine.
In the case of the LDP/BGP SDP, the service manager will prefer the LDP LSP type over the BGP LSP type. The service manager will re-program the card with the BGP LSP if available otherwise it brings down the SDP operationally.
Also note the following difference in behavior of the LDP/BGP SDP compared to that of an RSVP/LDP SDP. For a given /32 prefix, only a single route will exist in the routing table: the IGP route or the BGP route. Thus, either the LDP FEC or the BGP label route is active at any given time. The impact of this is that the tunnel table needs to be re-programmed each time a route is deactivated and the other is activated. Furthermore, the SDP revert-time cannot be used since there is no situation where both LSP types are active for the same /32 prefix.
The no form of this command disables the mixed-LSP mode of operation. The user first has to remove one of the LSP types from the SDP configuration or the command will fail.
no mixed-lsp-mode
This command specifies the MKA hello interval.
The no form of this command disables the MKA hello interval.
mka-hello-interval 2
This command specifies the key server priority used by the MACsec Key Agreement (MKA) protocol to select the key server when MACsec is enabled using static connectivity association key (CAK) security mode.
The no form of this command disables the mka-key-server-priority.
mka-key-server-priority 16
This command specifies whether MLD protocol information should be synchronized with the multi-chassis peer.
no mld
This command enters the context to configure Multicast Listener Discovery (MLD) parameters.
The no form of this command disables MLD.
no mld
This command enables the context to configure Multicast Listener Discovery (MLD) parameters.
The no form of the command disables MLD.
no mld
This command enables the context to configure an MLD import policy.
This command enables the context to create an MLD policy.
The no form of this command reverts to the default.
This command enables Multicast Listener Discovery (MLD) processing per subscriber host.
The no form of this command reverts to the default.
no mld-policy
This command is not supported. It is not blocked for backwards-compatibility reasons but has no effect on the system if configured.
no mld-snooping
This command enables and configures MLD-snooping debugging.
The no form of this command disables MLD-snooping debugging.
This command enables the MLD snooping context.
This command configures MLD snooping attributes for I-VPLS.
This command enables the context to configure the parameters of an LDP P2MP LSP used for forwarding Broadcast, Unicast unknown and Multicast (BUM) packets of a VPLS or B-VPLS instance.
This command enables use of P2MP mLDP LSP as inclusive or selective PMSI tunnels.
For multi-stream S-PMSI, either LDP or RSVP-TE must first be configured before multi-stream policy can be configured.
no mldp
This command enables the context to configure a Multi-link Frame Relay (MLFR) bundle.
This command enables the context to configure multi-link PPP bundle attributes.
This command creates a profile for the user to configure the egress QoS parameters of a multiclass MLPPP bundle.
A maximum of 128 egress QoS profiles can be created on the system.
The no form of this command deletes the profile.
This command creates a profile for the user to configure the ingress QoS parameters of a multiclass MLPPP bundle.
A maximum of 128 ingress QoS profiles can be created on the system.
The no form of this command deletes the profile.
This command configures parameters specific to a Mobility Management Entity (MME) peer.
This command configures MMRP parameters.
This command enables ingress Multicast Path Management (IMPM) from monitoring PIM and IGMP.
The no form of this command disables the IMPM monitoring.
This command filters debug events and only shows events related to the MAC address specified.
The no form of this command removes the debug filter.
This command enables the context to configure mobility parameters.
This command enables the administrative state to send mobility-triggered accounting interim updates.
The no form of this command disables sending the mobility-triggered accounting updates.
This command enters the configuration context of mobility-triggered-accounting in wlan-gw context under router or VPRN service.
This command debugs the DHCP tracing detail level.
This command specifies PPP packet debug mode.
The no form of this command disables debugging.
This command configures the ATM MDA into a mode with the increased VC scale (16k VCs, as opposed to 8K VCs). ESM is supported only in 16K VCs mode. In 16K VCs mode, there is only one queue allocated to each VC in the ATM MDA. In 8K VCs mode, there are two queues allocated per VC.
The 16K VC mode is supported only on the 4-port oc-3/12c/STM-1/4c ATM MDA.
Changing the ATM MDA mode requires a reset of the MDA. A warning is issued asking for the confirmation before the command is executed.
mode max8k-vc
This command specifies the mode of unicast RPF check.
The no form of this command reverts to the default (strict) mode.
mode strict
This command configures the mode of Unicast RPF (uRPF) check.
The no form of this command reverts to the default.
mode strict
mode basic
This command configures the mode used to compensate for chromatic dispersion.
This command configures the Ethernet LMI mode.
This command configures an Ethernet port, TDM channel, or SONET/SDH path (sub-port) for access, network or hybrid mode operation.
An access port or channel is used for customer facing traffic on which services are configured. A Service Access Point (SAP) can only be configured on an access port or channel. When a port is configured for access mode, the appropriate encap-type must be specified to distinguish the services on the port or SONET path. Once an Ethernet port, a TDM channel or a SONET path has been configured for access mode, multiple services can be configured on the Ethernet port, a TDM channel or SONET path. Note that ATM, Frame Relay, and cHDLC port parameters can only be configured in the access mode.
A network port or channel participates in the service provider transport or infrastructure network when a network mode is selected. When the network option is configured, the encap-type cannot be configured for the port/channel.
When network mode is selected on a SONET/SDH path, the appropriate control protocols are activated when the need arises. For example, configuring an IP interface on the SONET path activates IPCP while the removal of the IP interface causes the IPCP to be removed. The same applies for MPLS, MPLSCP, and OSICP. When configuring a SONET/SDH port, the mode command must be entered in the channel context or an error message is generated.
A hybrid Ethernet port allows the combination of network and access modes of operation on a per-VLAN basis and must be configured as either dot1q or QinQ encapsulation.
When the hybrid port is configured to the dot1q encapsulation, the user configures a SAP inside a service simply by providing the SAP ID which must include the port-id value of the hybrid mode port and an unused VLAN tag value. The format is <port-id>:qtag1. A SAP of format <port-id>:* also supported.
The user configures a network IP interface under config>router>if>port by providing the port name which consists of the port-id of the hybrid mode port and an unused VLAN tag value. The format is <port-id>:qtag1. The user must explicitly enter a valid value for qtag1. The <port-id>:* value is not supported on a network IP interface. The 4096 VLAN tag space on the port is shared among VLAN SAPs and VLAN network IP interfaces.
When the hybrid port is configured to QinQ encapsulation, the user configures a SAP inside a service simply by providing the SAP ID which must include the port-id value of the hybrid mode port and the outer and inner VLAN tag values. The format is <port-id>:qtag1.qtag2. A SAP of format <port-id>: qtag1.* is also supported. The outer VLAN tag value must not have been used to create an IP network interface on this port. In addition, the qtag1.qtag2 value combination must not have been used by another SAP on this port.
The user configures a network IP interface under config>router>if>port by providing the port name which consists of the port-id of the hybrid mode port and a VLAN tag value. The format is <port-id>:qtag1.*. An outer VLAN tag qtag2 of * creates an IP network interface. In addition, the qtag1.qtag2 value combination must not have been used on another SAP or IP network interface on this port.
The no form of this command restores the default.
This command configures the mode of OAM operation for this Ethernet port. These two modes differ in that active mode causes the port to continually send out efm-oam info PDUs while passive mode waits for the peer to initiate the negotiation process. A passive mode port cannot initiate monitoring activities (such as loopback) with the peer.
mode active
This command configures the DCE/DTE mode of the Frame Relay interface.
This command sets the Frame Relay interface into the DCE, DTE, or Bidirectional mode of LMI operation. The DTE mode causes the router to send status inquiries over the interface. The DCE mode causes the router to respond to status inquiries. In bidirectional mode, the router performs both DTE and DCE operation over the FR interface. The bidirectional mode applies to the ANSI and ITU LMI types only.
This feature is used when two routers are connected back-to-back, running frame relay encapsulation.
mode dte
This command configures the service-carving mode. This determines how the DF is elected for a specified Ethernet-Segment and service.
mode auto
This command sets the PIM snooping mode to proxy or plain snooping.
This command specifies the version of Spanning Tree Protocol the bridge is currently running.
See section Spanning Tree Operating Modes for more information about these modes.
The no form of this command returns the STP variant to the default.
mode rstp
This command configures the ARP host tracing mode.
This command enables and configures the IGMP tracing mode.
The no form of this command disables the configures the IGMP tracing mode.
This command enables and configures the MLD tracing mode.
The no form of this command disables the configures the MLD tracing mode.
This command configures groups of peers in a full mesh topology to limit excessive flooding of source-active messages to neighboring peers.
Multicast Source Discovery Protocol (MSDP) peers can be configured grouped in a full-mesh topology that prevents excessive flooding of source-active messages to neighboring peers.
In a meshed configuration, all members of the group must have a peer connection with every other mesh group member. If this rule is not adhered to, then unpredictable results may occur.
mode standard
This command configures the mode of operation of this NAT address pool.
The mode value is only relevant while the value of pool type is equal to largeScale; while the value of pool type is equal to l2Aware, the mode of operation is always NAPT.
mode auto
This command configures the DHCP tracing mode.
The no form of the command disables debugging.
This command sets the operating mode of the GMPLS tunnel group.
In load-sharing mode, traffic is load-shared across the member GMPLS LSPs of the tunnel group. The same hashing algorithm is used as for LAG (see the "LAG and ECMP hashing" chapter of the 7450 ESS, 7750 SR, 7950 XRS, and VSR Interface Configuration Guide). If load-sharing is configured, then all of the GMPLS LSPs must terminate on the same far-end node. All of the ports used by GMPLS LSPs must be equivalent in that they must have the same named QoS policy, bandwidth, and so on Once more than one gLSP is associated with a tunnel group, the QoS policy / scheduler policy cannot be changed for any of the ports. All GMPLS LSPs must be unprotected end-to-end. Segment protection is allowed for GMPLS LSPs associated in a load sharing mode tunnel group.
In active-standby mode, only one member gLSP can be associated with the tunnel group.
The no form of this command removes the member.
mode load-sharing
This command is used to either untunnel GTP-U traffic received on UDP port number 2152, or apply GTP filtering/firewall rules as specified under this GTP CLI context.
mode filtering
This command specifies the mode of operation of this NAT address pool.
The no form of the command reverts to the default.
auto
This command configures groups of peers in a full mesh topology to limit excessive flooding of source-active messages to neighboring peers.
Multicast Source Discovery Protocol (MSDP) peers can be configured grouped in a full-mesh topology that prevents excessive flooding of source-active messages to neighboring peers.
In a meshed configuration, all members of the group must have a peer connection with every other mesh group member. If this rule is not adhered to, then unpredictable results may occur.
mode standard
This command specifies the mode of unicast RPF check.
The no form of this command reverts to the default (strict) mode.
mode strict
This command configures the APS group for 1+1 Optimized operation as described in Annex B of ITU.T G.841. Note that Annex B operates in non-revertive bi-directional switching mode only as defined in G.841.
This command enables the context to configure ingress and egress percentage of rate parameters. This command only applies to physical ports (for example, it will not work on APS or similar logical ports). The percentage of rate commands are used to define a percentage value that affects the amount of buffers used by ingress and egress port managed buffer space. Enter the modify-buffer-allocation-rate context when editing the port’s percentage of rate commands.
This command enters the context to define Bluetooth parameters for the specific CPM slot.
This command enables debugging for PIM multicast fast failover (MoFRR).
The no form of this command disables MoFRR debugging.
This command enables congestion monitoring on an Egress Port Scheduler (EPS) that is applied to a physical port or to a Vport.
Congestion monitoring must be further configured under the port-scheduler CLI hierarchy. Once the congestion monitoring is in effect, the offered rate (incoming traffic) is compared to the configured port-scheduler congestion threshold. The results of these measurements are stored as the number of samples representing the number of times the offered rates exceeded the configured congestion threshold since the last clearing of the stats. Therefore, the results represent the number of times that the port-scheduler that is applied to a port/Vport was congested since the last reset of the stats (via a clear command).
The no form of this command disables congestion monitoring.
no mon-port-sch
This command specifies an IPv4 route (prefix/length) per subscriber-interface to be monitored in the FDB to determine liveness of the subscriber-interface (and consequently all associated group-interfaces of type wlangw) on a peer WLAN-GW. This route is the one that is advertised in routing by the peer WLAN-GW when the subscriber-interface and WLAN-GW group are operationally up.
This command configures the monitoring route based on which the NAT multi-chassis switchover is triggered. Monitoring route of a NAT pool on the local node must match the export route of a corresponding NAT pool on the peering node. Presence of the monitoring route in the routing table is an indication that the peering NAT pool is active (since it is advertising its export route). The disappearance of the monitoring route from the routing table is an indication that the peering pool has failed and consequently the nodal switchover is triggered, the local pool becomes active and its export route is consequently advertised. The export route can be advertised only from:
no monitor
Syntax:
ip-prefix/length: | ip-prefix | a.b.c.d |
ip-prefix-length | 0 to 32 |
This command enables the context to configure monitor parameters.
The no form of this command disables BGP BMP monitoring.
This command enables the monitoring of aggregate egress queue statistics on the port. All queues on the port are monitored, including SAP egress, network egress, subscriber egress, and egress queue group queues, as well as system queues that can be used, for example, to send port-related protocol packets (LACP, EFM, and so on). The aggregate in-profile, out-of-profile, and total statistics are provided for both forwarded and dropped packets and octets.
Monitoring of aggregate statistics is supported on PXC sub-ports but not on a PXC physical port. It is also not supported on satellite ports or ports on an HSMDA.
The no form of this command disables aggregate egress queue statistics monitoring on the specified port.
This command enables the collection and display of auto-bandwidth measurements, but prevents any automatic bandwidth adjustments from taking place.
The no form of this command disables the collection and display of auto-bandwidth measurements.
This command enables queue depth monitoring for the specified queue. This command and the dynamic-mbs command are mutually exclusive on the related queue group queue.
The no form of this command removes queue depth monitoring for the specified queue.
This command enables queue depth monitoring for the specified queue.
The no form of this command removes queue depth monitoring for the specified queue.
This command enables queue depth monitoring for the specified queue.
The no form of this command removes queue depth monitoring for the specified queue.
This command enables queue depth monitoring for the specified queue.
The no form of this command removes queue depth monitoring for the specified queue.
This command will configure the association between the SRRP instance in a Fate Sharing Group and the operational-group that contains messaging SAPs. A state transition of a messaging SAP within an operational-group will trigger calculation of the priority for all SRRP instances that are associated with that operational-group.
The no form of this command reverts to the default.
This command, supported on access LAG only, specifies the operational group to monitor. The state of the operational group affects the state of this LAG. When the operational group is inactive, the state of the LAG goes down and the LAG uses the configured lag>standby-signaling mechanism (lacp or power-off) to signal the CE that the LAG is not available.
no monitor-oper-group
This command specifies the operational group to be monitored by the object under which it is configured. The oper-group name must be already configured under the config>service context before its name is referenced in this command.
The no form of this command removes the association.
This command specifies the operational group to be monitored by the object under which it is configured. The oper-group name must be already configured under the config>service context before its name is referenced in this command.
The no form of this command removes the association.
This command configures the monitoring operational group name, up to 32 characters in length, associated with this PW-port entry.
This command specifies the operational group to be monitored by the object under which it is configured. The oper-group name must be already configured under the config>service context before its name is referenced in this command.
The no form of this command removes the association from the configuration.
no monitor-oper-group
This command specifies the operational group to be monitored by the object under which it is configured. The oper-group name must be already configured under the config>service context before its name is referenced in this command.
The no form of this command removes the association from the configuration.
no monitor-oper-group
This command configures PIM to monitor the state of an operational group to provide a redundancy mechanism. PIM monitors the operational group and changes its DR priority to the specified value when the status of the operational group is up. This enables the router to become the PIM DR only when the operational group is up. If the operational group status changes to down, PIM changes its DR priority to the default or the value configured with priority under config>service>vprn>pim>if. The oper-group group-name must already be configured under the config>service context before its name is referenced in this command. Two operational groups are supported per PIM interface.
The no form of this command removes the operational group from the configuration.
This command enables monitoring of the objects, such as SAPs, BFD sessions, or VRRP sessions for the purpose of adjusting the overall health of the node in a redundant inter- chassis NAT system. A state change of the objects in the oper-group influences the health of a NAT node in a redundant configuration.
The no form of this command reverts to the default.
no monitor-oper-group
This command configures PIM to monitor the state of an operational group to provide a redundancy mechanism. PIM monitors the operational group and changes its DR priority to the specified value when the status of the operational group is up. This enables the router to become the PIM DR only when the operational group is up. If the operational group status changes to down, PIM changes its DR priority to the default or the value configured with priority under config>router>pim>if. The oper-group group-name must already be configured under the config>service context before its name is referenced in this command. Two operational groups are supported per PIM interface.
The no form of this command removes the operational group from the configuration.
This command specifies the operational group to be monitored by the object under which it is configured. The oper-group name must be already configured under the config>service context before its name is referenced in this command.
The no form of the command removes the association from the configuration.
no monitor-oper-group
This command enables monitoring of the ports to adjust the overall health of the node in a redundant inter-chassis NAT system. A state change of a monitored port influences the health of a NAT node in a redundant configuration.
The no form of this command reverts to the default.
no monitor-port
This command defines the congestion monitoring threshold for the desired monitoring entity under the port-scheduler for per aggregate port-scheduler rate, per individual level, and per group that is aggregating multiple levels.
The congestion threshold is specified in percentages of the configured PIR rate for the entity for which congestion monitoring is desired. For example, if the configured PIR rate for level 1 is 100,000 kb/s, and the monitoring threshold is set to 90%, then an event where the offered rate is >90,000 kb/s will be recorded. This event is shown as part of the cumulative count of congestion threshold exceeds since the last clearing of the counters.
The no form of this command removes the congestion monitoring threshold.
no monitor-threshold
This command specifies the month when the event should be executed. Multiple months can be specified. When multiple months are configured, each of them will cause the schedule to trigger. If a month is configured without configuring the month, weekday, day-of-month, and minute, the event will not execute.
The no form of this command removes the specified month from the configuration.
no month
This command enables per-screen CLI output, meaning that the output is displayed on a screen-by- screen basis. The terminal screen length can be modified with the terminal command.
The following prompt appears at the end of each screen of paginated output:
The no form of the command displays the output all at once. If the output length is longer than one screen, the entire output will be displayed, which may scroll the screen.
more
This command configures pagination of the output text.
The no form of this command reverts to the default value.
more
This command defines if the MF flag should be set in the associated IPv4 header.
The no form of this command reverts to the default value.
more-fragments 0
This command creates the message of the day displayed after a successful console login. Only one message can be configured.
The no form of this command removes the message.
no motd
Some special characters can be used to format the message text. The \n character can be used to create multi-line messages. A \n in the message moves to the beginning of the next line by sending ASCII/UTF-8 chars 0xA (LF) and 0xD (CR) to the client terminal. An \r in the message sends the ASCII/UTF-8 char 0xD (CR) to the client terminal.
This command moves a local file, system file, or a directory. If the target already exists, the command fails and an error message displays.
The following prompt appears if the destination file already exists:
“Overwrite destination file (y/n)?”
local-url | [cflash-id/][file-path] up to 200 characters, including cflash-id directory length up to 99 each |
remote-url | [{ftp:// | tftp:// | http:// | https://}login:pswd@remote-locn/][file-path] |
up to 247 characters | |
directory length up to 99 characters each | |
remote-locn | [hostname | ipv4-address | [ipv6-address]] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - up to 32 characters, for link local addresses 255 | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
local-url | [cflash-id/][file-path] up to 200 characters, including cflash-id directory length up to 99 each |
remote-url | [{ftp:// | tftp://}login:pswd@remote-locn/][file-path] |
up to 247 characters | |
directory length up to 99 characters each | |
remote-locn | [hostname | ipv4-address | [ipv6-address]] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - up to 32 characters, for link local addresses 255 | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
The file move force command moves the specified file(s) without displaying a user prompt message. This command also automatically accepts HTTP redirects unless overridden by the no-redirect parameter.
This command indicates the maximum rate at which MACs can be re-learned in the VPLS service, before the SAP where the moving MAC was last seen is automatically disabled in order to protect the system against undetected loops or duplicate MACs.
The no form of this command reverts to the default value.
move-frequency 2 (when mac-move is enabled). For example, 10 relearns in a 5 second period.
As a result of enabling this command, route refresh messages are no longer needed, or issued when VPN route policy changes are made; RIB-IN will retain all MP-BGP routes.
The no form of this command is used to disable this feature.
no mp-bgp-keep
This command configures the maximum time a P2MP transit/bud node must wait before switching over to the new path if the new node does not send MBB TLV to inform of the availability of data plane.
The no form of this command reverts to the default value.
no mp-mbb-time (which equals a value of 3 seconds)
The no form of this command removes the MPLS instance from the service.
This command enables the context to configure MPLS parameters. MPLS is not enabled by default and must be explicitly enabled (no shutdown). The shutdown command administratively disables MPLS.
The no form of this command deletes this MPLS protocol instance; this will remove all configuration parameters for this MPLS instance.
MPLS must be shutdown before the MPLS instance can be deleted. All SDP bindings to LSPs must be removed before the MPLS instance can be deleted.
If MPLS is not shutdown, when the no mpls command is executed, a warning message on the console displays indicating that MPLS is still administratively up.
This command enables the context to configure MPLS parameters related to the RIB-API gRPC service.
This command enables and configures debugging for MPLS.
This command causes the associated header to be defined as an MPLS label header template and enables the context to define the MPLS parameters.
This command enables the context to configure MPLS-specific source and destination, LSP type and tunnel information, the priority, and the MPLS DM test configuration on the launch point.
This command filters MPLS flow data from being sent to the associated collector.
The no form of this command removes the filter, allowing MPLS flow data to be sent to the associated collector.
no mpls
This commands monitors commands for the MPLS instance.
This command enables the context to configure system-wide MPLS parameters.
This command enables the context to configure global MPLS delay measurement parameters.
This command specifies which format of the downstream mapping TLV to use in all LSP trace packets and LDP tree trace packets originated on this node. The Downstream Mapping (DSMAP) TLV is the original format in RFC 4379 (obsoleted by RFC 8029) and is the default value. The new Downstream Detailed Mapping (DDMAP) TLV is the new enhanced format specified in RFC 6424 and RFC 8029.
This command applies to LSP trace of an RSVP P2P LSP, a MPLS-TP LSP, or LDP unicast FEC, and to LDP tree trace of a unicast LDP FEC. It does not apply to LSP trace of an RSVP P2MP LSP which always uses the DDMAP TLV.
The global DSMAP/DDMAP setting impacts the behavior of both OAM LSP trace packets and SAA test packets of type lsp-trace and is used by the sender node when one of the following events occurs:
A consequence of the rules above is that a change to the value of mpls-echo-request-downstream-map option does not affect the value inserted in the downstream mapping TLV of existing tests.
Following are the details of the processing of the new DDMAP TLV:
In addition to performing the same features as the DSMAP TLV, the new DDMAP TLV addresses the following scenarios:
To properly check a target FEC which is stitched to another FEC (stitching FEC) of the same or a different type, or which is tunneled over another FEC (tunneling FEC), it is necessary for the responding nodes to provide details about the FEC manipulation back to the sender node. This is achieved via the use of the new FEC stack change sub-TLV in the Downstream Detailed Mapping TLV (DDMAP) defined in RFC 6424.
When the user configures the use of the DDMAP TLV on a trace for an LSP that does not undergo stitching or tunneling operation in the network, the procedures at the sender and responder nodes are the same as in the case of the DSMAP TLV.
This feature however introduces changes to the target FEC stack validation procedures at the sender and responder nodes in the case of LSP stitching and LSP hierarchy. These changes pertain to the processing of the new FEC stack change sub-TLV in the new DDMAP TLV and the new return code of value 15 Label switched with FEC change.
The no form of this command reverts to the default behavior of using the DSMAP TLV in a LSP trace packet and LDP tree trace packet.
mpls-echo-request-downstream-map dsmap
The following output is an example of mpls-echo-request-downstream-map information.
The mpls-fwd-policy value instructs BGP to use the MPLS forwarding policy to determine the address of the BGP next hop.
This command enables setting MPLS forwarding policy for the auto bind tunnel
The mpls-fwd-policy value instructs BGP to use the MPLS forwarding policy tunnel type to resolve the next hop of BGP VPN-IPv4 and VPN-IPv6 prefixes.
This command enables the use of the MPLS forwarding policy to resolve the indirect next hops of statically-configured routes.
no mpls-fwd-policy
This command selects MPLS forwarding policy to be used for next-hop resolution.
This command configures the MPLS label value this is associated with a segment.
The no form of this command removes the label value.
no mpls-label
This command creates a context for the configuration of global parameters related to MPLS labels.
This command configures the format of the timestamp used by for lsp-ping, lsp-trace, p2mp-lsp-ping and p2mp-lsp-trace, vccv-ping, vccv-trace, and lsp-trace.
If rfc4379 is selected, then the timestamp is in seconds and microseconds since 1900, otherwise it is in seconds and microseconds since 1970.
Changing this system-wide setting does not affect tests that are currently in progress, but SAAs starts to use the new timestamp when they are restarted. When an SROS receives an echo request, it replies with the locally configured timestamp format, and does not try to match the timestamp format of the incoming echo request message.
mpls-time-stamp-format unix
Generic MPLS-TP parameters and MPLS-TP transit paths are configured under this context. If a user configures no mpls, normally the entire mpls configuration is deleted. However, in the case of mpls-tp, a check is made that there is no other mpls-tp configuration (e.g., services or LSPs using mpls-tp on the node). The mpls-tp context cannot be deleted if MPLS-TP LSPs or SDPs exist on the system.
A shutdown of mpls-tp will bring down all MPLS-TP LSPs on the system.
no mpls-tp
This command enables the context for a section layer MEP for MPLS-TP on an MPLS interface.
This command enables the context to configure an MPLS TP LSP and its attributes to be tested.
This command enables debugging for PIM MRIB.
The no form of this command disables debugging for PIM MRIB.
This command is used to print relevant multicast information from the target multicast router. Information displayed includes adjacency information, protocol, metrics, thresholds, and flags from the target multicast route.
Label | Description |
General flags | |
version | Indicates software version on queried router. |
prune | Indicates that router understands pruning. |
genid | Indicates that router sends generation IDs. |
mtrace | Indicates that the router handles mtrace requests. |
Neighbors flags | |
1 | Metric |
0 | Threshold (multicast time-to-live) |
pim | PIM enabled on interface. |
down | Operational status of interface. |
disabled | Administrative status of interface. |
leaf | No downstream neighbors on interface. |
querier | Interface is IGMP querier. |
tunnel | Neighbor reached via tunnel. |
This command specifies whether a multicast router is attached behind this SAP, SDP, or routed VPLS IP interface.
Configuring these objects as an mrouter-port will have a double effect. Firstly, all multicast traffic received on another SAP, SDP, or routed VPLS IP interface will be copied to this SAP, SDP, or routed VPLS IP interface. Secondly, IGMP/MLD reports generated by the system as a result of a router joining or leaving a multicast group, will be sent to this SAP, SDP, or routed VPLS IP interface.
If two multicast routers exist in the network, one of them will become the active querier. While the other multicast router (non-querier) stops sending IGMP queries, it should still receive reports to keep its multicast trees up-to-date. To support this, the mrouter-port should be enabled on all SAPs, SDPs, or routed VPLS IP interfaces connecting to a multicast router.
![]() | Note: The IGMP version to be used for the reports (v1, v2, or v3) can only be determined after an initial query has been received. Until such time, no reports are sent on the SAP, spoke-SDP, or routed VPLS IP interface, even if mrouter-port is enabled. |
If the send-queries command is enabled on this SAP or spoke-SDP, the mrouter-port parameter cannot be set.
When PIM-snooping is enabled within a VPLS service, all IP multicast traffic and PIM messages will be sent to any SAP or SDP binding configured with an IGMP-snooping mrouter port. This occurs even without IGMP-snooping enabled, but is not supported in a BGP-VPLS or M-VPLS service.
The no form of this command reverts to the default.
no mrouter-port
This command enables all VXLAN binds to be mrouter ports, indicating that a multicast router is attached behind each VXLAN binding. Configuring these objects as an mrouter-port has two effects. Firstly, all multicast traffic received on another object is copied to each VXLAN binding. Secondly, IGMP reports generated by the system as a result of a router joining or leaving a multicast group is sent to all VXLAN bindings. When PIM snooping for IPv4 is enabled within a VPLS service, all IP multicast traffic and PIM for IPv4 messages are sent to all VXLAN bindings configured with an igmp-snooping mrouter-port. This occurs even without igmp-snooping enabled.
no mrouter-port
This command enables all VXLAN binds to be mrouter ports, indicating that a multicast router is attached behind each VXLAN binding. Configuring these objects as an mrouter-port has two effects. Firstly, all multicast traffic received on another object is copied to each VXLAN binding. Secondly, MLD reports generated by the system as a result of a router joining or leaving a multicast group is sent to all VXLAN bindings.
no mrouter-port
This command specifies whether a multicast router is attached behind this SAP or spoke-SDP.
Configuring a SAP or spoke-SDP as an mrouter-port will have a double effect. Firstly, all multicast traffic received on another SAP or spoke-SDP will be copied to this SAP or spoke-SDP. Secondly, IGMP or MLD reports generated by the system as a result of someone joining or leaving a multicast group, will be sent to this SAP or SDP.
If two multicast routers exist in the local area network, one of them will become the active querier. The other multicast router (non-querier) stops sending IGMP or MLD queries, but it should still receive reports to keep its multicast trees up to date. To support this, the mrouter-port should be enabled on all SAPs or spoke-SDPs connecting to a multicast router.
The IGMP version to be used for the reports (v1, v2 or v3) or MLD version (v1 or v2) can only be determined after an initial query has been received. Until such time no reports are sent on the SAP, even if mrouter-port is enabled.
If the send-queries command is enabled on this SAP or spoke-SDP, the mrouter-port parameter cannot be set.
no mrouter-port
This command configures Multiple Registration Protocol (MRP) parameters. MRP is valid only under B-VPLS.
This command configures a Multi-service Route Processor (MRP).
This command enables and configures MRP debugging.
This command enables the context for a MRP policy. The mrp-policy specifies either a forward or a drop action for the Group B-MAC attributes associated with the ISIDs specified in the match criteria. The mrp-policy can be applied to multiple BVPLS services as long as the scope of the policy is template.
Any changes made to the existing policy, using any of the sub-commands, will be applied immediately to all services where this policy is applied. For this reason, when many changes are required on a mrp-policy, Nokia recommends that the policy be copied to a work area. That work-in-progress policy can be modified until complete and then written over the original mrp-policy. Use the config mrp-policy copy command to maintain policies in this manner.
The no form of this command deletes the mrp-policy. An MRP policy cannot be deleted until it is removed from all the SAPs or SDPs where it is applied.
no mrp-policy
This command instructs MMRP to use the mrp-policy specified in the command to control which Group B-MAC attributes will be declared and registered on the egress SAP/Mesh-SDP/Spoke-SDP. The Group B-MACs will be derived from the ISIDs using the procedure used in the PBB solution. The Group MAC is standard OUI with the last 24 bits being the ISID value. If the policy-name refers to a non-existing mrp-policy the command should return error. Changes to a mrp-policy are allowed and applied to the SAP/SDPs under which the policy is referenced.
no mrp-policy
This command enables debugging of the MRP PDUs that are received or transmitted.
The no form of this command disables debugging of MRP PDUs.
This command specifies the maximum received reconstructed unit (MRRU), similar to a maximum transmission unit (MTU), but applies only to MLPPP multilink bundles. The MRRU is the maximum frame size that can be reconstructed from multilink fragments. This command is only valid for MLPPP bundles.
The no form of this command resets the MRRU to the default.
mrru 1524
This command defines which Maximum Receive Unit (MRU) value is signaled by the PPPoE client.
The no form of this command reverts to the default.
mru 1492
This command enables debugging for specific PPP MSAPs.
The no form of this command disables debugging.
This command enable PPP debug for the specified managed SAP.
Multiple msap filters could be specified in the same debug command.
The no form of this command disables debugging.
This command configures MSAP authentication defaults.
This command configures a managed SAP policy. Managed SAPs allow the use of policies and a SAP template for the creation of a SAP.
The no form of this command removes the MSAP policy from the configuration.
This command enables a Multicast Source Discovery Protocol (MSDP) instance. When an MSDP instance is created, the protocol is enabled. To start or suspend execution of the MSDP protocol without affecting the configuration, use the [no] shutdown command.
For the MSDP protocol to function, at least one peer must be configured.
When MSDP is configured and started, an appropriate event message should be generated.
When the no form of this command is executed, all sessions must be terminated and an appropriate event message should be generated.
When all peering sessions are terminated, an event message per peer is not required.
The no form of this command deletes the MSDP protocol instance, removing all associated configuration parameters.
no msdp
This command enables debugging for Multicast Source Discovery Protocol (MSDP).
The no form of the command disables MSDP debugging.
This command enables a Multicast Source Discovery Protocol (MSDP) instance. When an MSDP instance is created, the protocol is enabled. To start or suspend execution of the MSDP protocol without affecting the configuration, use the [no] shutdown command.
For the MSDP protocol to function, at least one peer must be configured.
When MSDP is configured and started an appropriate event message should be generated.
When the no form of the command is executed, all sessions must be terminated and an appropriate event message should be generated.
When all peering sessions are terminated, an event message per peer is not required.
The no form of the command deletes the MSDP protocol instance, removing all associated configuration parameters.
no msdp
This command enables debugging for PIM messaging.
The no form of this command disables debugging for PIM messaging.
This command enables RSVP message pacing in which the specified number of RSVP messages, specified in the max-burst command, are sent in a configured interval, specified in the period command. A count is kept of the messages that were dropped because the output queue for the interface used for message pacing was full.
no msg-pacing
This command enables the inclusion of the MSISDN in AAA protocols as signaled in the incoming GTP setup message.
The no form of this command disables the inclusion of the attribute.
This command associates the MSS adjust group consisting of multiple ISAs with the routing context in which the application requiring TCP MSS adjust resides.
This command creates the context to configure MST instance (MSTI) related parameters. Up to 16 instances will be supported by MSTP. The instance 0 is mandatory by protocol and therefore, it cannot be created by the CLI. The software will maintain this instance automatically.
This command specifies the number of hops in the region before BPDU is discarded and the information held for the port is aged out. The root bridge of the instance sends a BPDU (or M-record) with remaining-hop-count set to configured <max-hops>. When a bridge receives the BPDU (or M-record), it decrements the received remaining-hop-count by 1 and propagates it in BPDU (or M-record) it generates.
The no form of this command sets the hops-count to its default value.
mst-max-hops 20
This command defines an MST region name. Two bridges are considered as a part of the same MST region as soon as their configuration of the MST region name, the MST-revision and VLAN-to-instance assignment is identical.
The no form of this command removes region-name from the configuration.
no mst-name
This commands specifies path-cost within a specified instance, expressing probability that a specified port will be put into the forwarding state in case a loop occurs (the highest value expresses lowest priority).
The no form of this command sets port-priority to its default value.
The path-cost is proportional to link speed.
This commands specifies the port priority within a specified instance, expressing probability that a specified port will be put into the forwarding state if a loop occurs.
The no form of this command sets port-priority to its default value.
mst-port-priority 128
This command specifies the bridge priority for this specific Multiple Spanning Tree Instance for this service. The bridge-priority value reflects likelihood that the switch will be chosen as the regional root switch (65535 represents the least likely). It is used as the highest 4 bits of the Bridge ID included in the MSTP BPDUs generated by this bridge.
The priority can only take on values that are multiples of 4096 (4k). If a value is specified that is not a multiple of 4K, then the value will be replaced by the closest multiple of 4K, which is lower than the value entered.
The no form of this command sets the bridge-priority to its default value.
This command defines the MST configuration revision number. Two bridges are considered as a part of the same MST region as soon as their configuration of MST-region name, MST-revision and VLAN-to-instance assignment is identical.
The no form of this command returns MST configuration revision to its default value.
mst-revision 0
This command traces a multicast path from a source to a receiver and displays multicast packet rate and loss information.
router-name: | Base |
service-id: | 1 to 2147483647 |
Label | Description |
hop | The number of hops from the source to the listed router. |
router name | The number of the router for this hop or “?” when not reverse DNS translated. |
address | The address of the router for this hop. |
protocol | The protocol used. |
ttl | The forward TTL threshold. TTL that a packet is required to have before it is forwarded over the outgoing interface. |
forwarding code | Forwarding information/error code for this hop. |
For each interface between two nodes a line is printed, following the same layout as other routers with an implementation derived from mrouted. Consider the following:
This command traces a multicast path from a source to a receiver and displays multicast packet rate and loss information.
router-name: | Base |
service-id: | 1 to 2147483647 |
Label | Description |
hop | Number of hops from the source to the listed router. |
router name | Name of the router for this hop or “?” when not reverse DNS translated. |
address | Address of the router for this hop. |
protocol | Protocol used. |
ttl | Forward TTL threshold. TTL that a packet is required to have before it will be forwarded over the outgoing interface. |
forwarding code | Forwarding information/error code for this hop. |
For each interface between two nodes a line is printed, following the same layout as other routers with an implementation derived from mrouted. Consider the following:
This command specifies the multi-topology for this sub-domain.
The no form of this command removes the multi-topology from this sub-domain.
This command traces a multicast path from a source to a receiver.
router-name: | “Base” |
service-id: | 1 to 2147483647 |
Label | Description |
hop | The number of hops from the source to the listed router. |
router name | The name of the router for this hop. If a DNS name query is not successful a “?” displays |
address | The address of the router for this hop |
protocol | The protocol used |
ttl | The forward TTL threshold. TTL that a packet is required to have before it will be forwarded over the outgoing interface. |
forwarding code | The forwarding information/error code for this hop |
This command configures debugging for mtrace.
This command traces a multicast path from a source to a receiver.
This command traces a multicast path from a source to a receiver.
router-name: | “Base” |
service-id: | 1 to 2147483647 |
Label | Description |
hop | The number of hops from the source to the listed router |
router name | The name of the router for this hop. If a DNS name query is not successful a “?” displays. |
address | The address of the router for this hop |
protocol | The protocol used |
ttl | The forward TTL threshold. TTL that a packet is required to have before it will be forwarded over the outgoing interface. |
forwarding code | The forwarding information/error code for this hop |
This command configures debugging for mtrace2.
This command configures the maximum PPP MTU size.
mtu 1500
This command specifies the value to be placed in link MTU options sent by the router on this interface.
The no form of this command reverts to the default.
no mtu — The MTU option is not sent in the router advertisement messages.
This command defines which Maximum Transmission Unit (MTU) is applied, by default, for packets egressing the PPP link. If a lower MRU is sent during PPP link establishment, the MRU value is used.
The no form of this command reverts to the default.
mtu 1492
This command configures the maximum payload MTU size for an Ethernet port, PPP-enabled port or sub-port and Frame Relay-enabled port or subport. The Ethernet port level MTU parameter indirectly defines the largest physical packet the port can transmit or the far-end Ethernet port can receive. Packets that cannot be fragmented at egress and exceed the MTU are discarded.
The value specified for the MTU includes the destination MAC address, source MAC address, the Ethertype or Length field and the complete Ethernet payload. The MTU value does not include the preamble, start of frame delimiter or the trailing CRC.
PoS channels use the MTU to define the largest PPP payload a PoS frame may contain. A significant difference between SONET/SDH PoS channel and Ethernet physical MTU values the overhead considered part of the framing method and the overhead considered to be part of the application using the frame. In Ethernet, the preamble, start of frame delimiter and the CRC are considered part of the framing overhead and not part of the frame payload. For a PoS channel, the HDLC framing overhead is not included in the physical MTU; only the PPP and PPP payload are included. If the port mode or encapsulation type is changed, the MTU assumes the default values of the new mode or encapsulation type.
The no form of this command restores the default values.
The default MTU value depends on the (sub-)port type, mode and encapsulation and are listed in Table 106:
Type | Mode | Encap Type | Default (Bytes) |
10/100, Gig, or 10GigE | Access | null | 1514 |
10/100, Gig, or 10GigE | Access | dot1q | 1518 |
10/100, Gig, or 10GigE | Access | q-in-q | 1522 |
SONET/SDH or TDM | Access | mpls | 1506 |
SONET/SDH or TDM | Access | bcp-null | 1518 |
SONET/SDH or TDM | Access | bcp-dot1q | 1522 |
SONET/SDH or TDM | Access | ipcp | 1502 |
SONET/SDH or TDM | Access | frame-relay | 1578 |
ATM, SONET/SDH or TDM | Access | atm | 1524 |
10/100 or 100FX Ethernet | Network | null | 1514 |
10/100 or 100FX Ethernet | Network | dot1q | 1518 |
SONET/SDH | Network | ppp-auto | 1524 |
512 to 9212 | config>port>ethernet |
512 to 9800 | config>port>ethernet (for FP4-based connector ports) |
512 to 9208 | config>port>sonet-sdh>path |
512 to 9208 | config>port>tdm>ds1>channel-group |
512 to 9208 | config>port>tdm>ds3 |
512 to 9208 | config>port>tdm>e1>channel-group |
512 to 9208 | config>port>tdm>e3 |
This command configures the OSPF packet size used on this interface. If this parameter is not configured, OSPF derives the MTU value from the MTU configured (default or explicitly) in the following contexts:
no mtu
This command configures the Maximum Transmission Unit (MTU) for downstream traffic flowing through this router (as outside NAT router). The system fragments IP datagrams exceeding the MTU.
The no form of the command reverts to the default.
no mtu
This command configures the MTU for downstream traffic flowing through this router (as outside NAT router). The system fragments IP datagrams exceeding the MTU.
no mtu
This command sets the MTU size of the UDP packet containing IPFIX records destined for the collector node. Multiple records will be stuffed into a single IP packet until stuffing an additional data record would exceed MTU or the internal timer of 250 ms expires.
mtu 1500
The command defines the MTU, the maximum size of the IP frame that can be transmitted. The size of the frame includes the syslog message and the IP header. This is an IP-MTU value.
When aggregation is enabled (the max-tx-delay command), generation of a syslog frame carrying multiple flow logs is triggered by one of the two events (whichever occurs first):
mtu 1500
This command configures the IPv6 MTU in a MAP domain. The configured MTU applies to traffic in the downstream direction, towards the CE. The configured MTU value must be lower than the MTU of the outgoing port for the traffic, which includes L2 overhead.
mtu 8686
This command configures the OSPF packet size used on this interface. If this parameter is not configured OSPF derives the MTU value from the MTU configured (default or explicitly) in the following contexts:
If this parameter is configured, the smaller value between the value configured here and the MTU configured (default or explicitly) in an above-mentioned context is used.
To determine the actual packet size, add 14 bytes for an Ethernet packet and 18 bytes for a tagged Ethernet packet to the size of the OSPF (IP) packet MTU configured in this command.
The no form of this command reverts to the default derived from the MTU configured in the config>port context.
no mtu
This commands subtracts the specified value from the MVPN MTU to allow a BIER header to be added without exceeding the network MTU.
no mtu-over-head
This command enables access from multiple APs into a per-tenant BD and the associated vRGW (BRG) instance.
The no form of this command disables access from multiple APs and limits access from a single AP into per tenant bridge domain (BD) and the associated vRGW (BRG) instance.
This command enables configuring multiple active MS-ISA in the tunnel-group. IPsec traffic will be load balanced to configured active MS-ISAs.
Operational notes:
no multi-active
This command enables the context to configure multi-chassis parameters.
This command specifies the minimum lifetime for a cache entry to be synchronized with the MCS peer.
The no form of this command reverts to the default.
This command configures the multi-homing mode for the Ethernet-Segment as single-active or all-active multi-homing, as defined in RFC7432.
By default, the use of esi-label is enabled for all-active and single-active as defined in RFC7432 (for single-active multi-homing, the esi-label is used to avoid transient loops).
When single-active no-esi-label is specified, the system will not allocate a label for the esi and hence advertise esi label 0 to peers. Even if the esi is configured to not send the esi-label, upon reception of an esi-label from a peer, the PE will always send traffic to that peer using the received esi-label.
no multi-homing
This command enables OSPF multi-instance RFC 6549, OSPFv2 Multi-Instance Extensions, support in the BASE router. This support is enabled per instance and allows flexibility when migrating a particular instance from classic OSPFv2 to a multi-instance OSPFv2.
The no form of the command reverts to the default.
no multi-instance
This command configures ECMP multipath parameters to apply to address families that support BGP multipath.
This command configures ECMP multipath parameters to apply to address families that support BGP multipath.
This command creates a new customer site or edits an existing customer site with the customer-site-name parameter. A customer site is an anchor point to create an ingress and egress virtual scheduler hierarchy. When a site is created, it must be assigned to a chassis slot or port. When scheduler policies are defined for ingress and egress, the scheduler names contained in each policy are created according to the parameters defined in the policy. Multi-service customer sites exist for the sole purpose of creating a virtual scheduler hierarchy and making it available to queues on multiple Service Access Points (SAPs).
The scheduler policy association with the customer site normally prevents the scheduler policy from being deleted until after the scheduler policy is removed from the customer site. The multi-service-site object generates a log message indicating that the association was deleted due to scheduler policy removal.
When the multi-service customer site is created, an ingress and egress scheduler policy association does not exist. This does not prevent the site from being assigned to a chassis slot or prevent service SAP assignment. After the site has been created, the ingress and egress scheduler policy associations can be assigned or removed at any time.
The no form of this command removes the value from the configuration.
n/a — Each customer site must be explicitly created.
If the customer-site-name does not exist, it is assumed that an attempt is being made to create a site of that name in the customer ID context. The success of the command execution depends on the following:
The maximum number of customer sites defined for the chassis slot has not been met.
The customer-site-name is valid.
The create keyword is included in the command line syntax (if the system requires it).
When the maximum number of customer sites has been exceeded a configuration error occurs, the command will not execute and the CLI context will not change.
If the customer-site-name is invalid, a syntax error occurs, the command will not execute and the CLI context will not change.
This command associates the SAP with a customer-site-name. If the specified customer-site-name does not exist in the context of the service customer ID an error occurs and the command is not executed. If customer-site-name exists, the current and future defined queues on the SAP (ingress and egress) attempts to use the scheduler hierarchies created within customer-site-name as parent schedulers.
This command is mutually exclusive with the SAP ingress and egress scheduler policy commands. If a scheduler policy has been applied to either the ingress or egress nodes on the SAP, the multi-service-site command fails without executing. The locally applied scheduler policies must be removed prior to executing the multi-service-site command.
The no form of this command removes the SAP from any multi-service customer site the SAP belongs to. Removing the site can cause existing or future policers and queues to enter an orphaned state.
This command creates a new customer site or edits an existing customer site with the customer-site-name parameter. A customer site is an anchor point to create an ingress and egress virtual scheduler hierarchy. When a site is created, it must be assigned to a chassis slot or port on the 7750 SR. When scheduler policies are defined for ingress and egress, the scheduler names contained in each policy are created according to the parameters defined in the policy. Multi-service customer sites exist for the sole purpose of creating a virtual scheduler hierarchy and making it available to queues on multiple Service Access Points (SAPs).
The scheduler policy association with the customer site normally prevents the scheduler policy from being deleted until after the scheduler policy is removed from the customer site. The multi-service-site object will generate a log message indicating that the association was deleted due to scheduler policy removal.
When the multi-service customer site is created, an ingress and egress scheduler policy association does not exist. This does not prevent the site from being assigned to a chassis slot or prevent service SAP assignment. After the site has been created, the ingress and egress scheduler policy associations can be assigned or removed at any time.
If the customer-site-name does not exist, it is assumed that an attempt is being made to create a site of that name in the customer ID context. The success of the command execution depends on the following:
When the maximum number of customer sites has been exceeded a configuration error occurs; the command will not execute and the CLI context will not change.
If the customer-site-name is invalid, a syntax error occurs; the command will not execute and the CLI context will not change.
This command associates the SAP with a customer-site-name. If the specified customer-site-name does not exist in the context of the service customer ID an error occurs and the command will not execute. If customer-site-name exists, the current and future defined queues on the SAP (ingress and egress) will attempt to use the scheduler hierarchies created within customer-site-name as parent schedulers.
The no form of this command removes the SAP from any multi-service customer site the SAP belongs to. Removing the site can cause existing or future queues to enter an orphaned state.
This command creates a new customer site or edits an existing customer site with the customer-site-name parameter. A customer site is an anchor point to create an ingress and egress virtual scheduler hierarchy. When a site is created, it must be assigned to a chassis slot or port. When scheduler policies are defined for ingress and egress, the scheduler names contained in each policy are created according to the parameters defined in the policy. Multi-service customer sites exist for the sole purpose of creating a virtual scheduler hierarchy and making it available to queues on multiple Service Access Points (SAPs).
The scheduler policy association with the customer site normally prevents the scheduler policy from being deleted until after the scheduler policy is removed from the customer site. The multi-service-site object will generate a log message indicating that the association was deleted due to scheduler policy removal.
When the multi-service customer site is created, an ingress and egress scheduler policy association does not exist. This does not prevent the site from being assigned to a chassis slot or prevent service SAP assignment. After the site has been created, the ingress and egress scheduler policy associations can be assigned or removed at any time.
If the customer-site-name does not exist, it is assumed that an attempt is being made to create a site of that name in the customer ID context. The success of the command execution depends on the following:
When the maximum number of customer sites has been exceeded a configuration error occurs; the command will not execute and the CLI context will not change.
If the customer-site-name is invalid, a syntax error occurs; the command will not execute and the CLI context will not change.
This command enables the inclusion of the multi-session-id attributes.
The no form of the command excludes the multi-session-id attributes.
no multi-session-id
This command defines the maximum number of subscribers (dynamic + static) that can be simultaneously active on an MSAP.
If the limit is reached, a new host is denied access and the corresponding DHCP ACK is dropped.
The no form of this command reverts back to the default setting.
multi-sub-sap 1
![]() | Note: The operational maximum value may be smaller due to equipped hardware dependencies. |
This command defines the maximum number of subscribers (dynamic and static) that can be simultaneously active on this SAP.
If the limit is reached, a new host is denied access and the corresponding DHCP ACK is dropped.
The no form of this command reverts back to the default setting.
This command enables IS-IS multi-topology support.
no multi-topology
This command enables IS-IS multi-topology support.
no multi-topology
This command enables terminating multiple types of tunnels.
The no form of this command disables terminating multiple types of tunnels.
no multi-tunnel-type
This command enables the context to configure multicast in a bonding environment.
This command configures NTP the node to transmit multicast packets on the CPM/CCM MGMT port. Broadcast and multicast messages can easily be spoofed; authentication is strongly recommended.
The no form of this command removes the multicast address from the configuration.
This command configures the option to enable Multicast-Only Fast Reroute (MoFRR) functionality for IPv4 PIM-SSM interfaces in the global routing table instance.
The no form of this command disables MoFRR for IPv4 PIM-SSM interfaces.
no multicast-fast-failover
This command enables ISIS to submit routes into the multicast Route Table Manager (RTM).
The no form of this command disables the submission of routes into the multicast RTM.
no multicast-import
This command enables the submission of routes into the multicast Route Table Manager (RTM) by OSPF.
The no form of this command disables the submission of routes into the multicast RTM.
no multicast-import
This command enables the submission of routes into the multicast Route Table Manager (RTM) by IS-IS.
The no form of this command disables the submission of routes into the multicast RTM.
no multicast-import
This command enables the submission of routes into the multicast Route Table Manager (RTM) by OSPF.
The no form of this command disables the submission of routes into the multicast RTM.
no multicast-import
This command configures a multicast information policy. Multicast information policies are used to manage parameters associated with Layer 2 and Layer 3 multicast records. Multiple features use the configured information within the policy. The multicast ingress path manager uses the policy to decide the inactive and active state behavior for each multicast record using the ingress paths to the switch fabric. The system’s multicast ECMP join decisions are influenced by the channel information contained within the policy.
Multicast Bundles:
A multicast information policy consists of one or multiple named bundles. Multicast streams are mapped to a bundle based on matching the destination address of the multicast stream to configured channel ranges defined within the bundles. Each policy has a bundle named ‘default’ that is used when a destination address does not fall within any of the configured channel ranges.
Each bundle has a set of default parameters used as the starting point for multicast channels matching the bundle. The default parameters may be overridden by optional exception parameters defined under each channel range. Further optional parameter overrides are possible under explicit source address contexts within each channel range.
Default Multicast Information Policy
A multicast information policy always exists with the name ‘default’ and cannot be edited or deleted. The following parameters are contained in the default multicast information policy:
Policy Description: | Default policy, cannot be edited or deleted. |
Bundle: | default |
Bundle Description: | Default Bundle, cannot be edited or deleted. |
Congestion-Priority-Threshold: | 4 |
ECMP-Optimization-Limit-Threshold: | 7 |
Bundle Defaults: | |
Administrative Bandwidth: | 0 (undefined) |
Preference: | 0 |
CAC-Type: | Optional |
Bandwidth Activity: | Dynamic with no black-hole rate |
Explicit Ingress SF Path: | None (undefined) |
Configured Channel Ranges: | None |
The default multicast information policy is applied to all VPLS and VPRN services and all routing contexts until an explicitly defined multicast information policy has been mapped.
Explicit Multicast Information Policy Associations
Each VPLS service and each routing context (including VPRN routing contexts) supports an explicit association with an pre-existing multicast information policy. The policy may need to be unique per service or routing context since that each context has its own multicast address space. The same multicast channels may be and most likely be used for completely different multicast streams and applications in each forwarding context.
Interaction with Ingress Multicast Path Management
When ingress multicast path management is enabled on an MDA, the system automatically creates a bandwidth manager context that manages the multicast path bandwidth into the switch fabric used by the ingress ports on the MDA. As routing or snooping protocols generate Layer 2 or Layer 3 multicast FIB records that are populated on the MDA’s forwarding plane, they are processed though the multicast information policy that is associated with the service or routing context associated with the record. The policy returns the following information for the record to be used by the ingress bandwidth manager:
Interaction with Multicast ECMP Optimization
The multicast information policy is used by the multicast ECMP optimization function to derive each channels administrative bandwidth. The ECMP function tallies all bandwidth information for channels joined and attempts to equalize the load between the various paths to the sender. The multicast information policy returns the following information to the ECMP path manager:
multicast-info-policy “default”
This command overrides the default multicast information policy on a service or routing context. When the policy association is changed, all multicast channels in the service or routing context must be reevaluated.
If a multicast information policy is not explicitly associated with the service or routing context, the default multicast information policy is used when ingress multicast path management is enabled.
While a multicast information policy is associated with a service or routing context, the policy cannot be deleted from the system.
The no form of the command removes an explicit multicast information policy from the service or routing context and restores the default multicast information policy.
This command configures the additional amount of time that the system waits before removing a multicast state that was synchronized in an Ethernet Segment via Multicast Join or Leave Synch routes. This value represents a delta corresponding to the time it takes for a BGP advertisement to propagate to ES peers.
The node triggering the route computes the maximum response time as the product of the locally configured values, Last Member Query Count and Last Member Query Interval (this value is taken from the config>service>vpls>sap>igmp-snooping>last-member-query-interval or config>service>vpls>spoke-sdp>igmp-snooping>last-member-query-interval commands depending on the Ethernet Segment being used), and adds the delta value to the Maximum Response Time. Increasing the Maximum Response Time by this value can help minimize the churn of removing and recreating the state on the node.
The maximum response time value should be configured consistently in all ES peers. For example, in a scenario where a maximum response time of five seconds is advertised by PE-A and there is a delay of four seconds in the BGP propagation to PE-B, the timer could already expire on PE-A while PE-B is still in LMQ time and can still receive joins (which would recreate state in A after a join synch route from B). To minimize this situation, adding an extra delta timer on PE-A, reduces the potential churn of PE-A removing and recreating the state.
multicast-leave-sync-propagation 5
This command specifies the RSVP or static LSP in this SDP to use to forward VPLS multicast and broadcast packets. The LSP name must exist and must have been associated with this SDP using the command config>service>sdp>lsp. In the absence of an explicit configuration by the user, the default LSP is used.
no multicast-lsp — traffic mapped to default-lsp name
This command is used to enable efficient multicast replication over a spoke SDP. Multicast traffic is copied to only a subset of network interfaces that may be used as egress for a spoke SDP. A network domain is defined by associating multiple interfaces to a logical group that may participate in multicast replication for a spoke SDP.
The no form of command disables efficient multicast replication to a network domain for a spoke SDP and traffic is replicated to all forwarding complexes.
no multicast-network-domain
Within a sap-ingress QoS policy forwarding class context, the multicast-policer command is used to map packets that match the forwarding class and are considered multicast in nature to the specified policer-id. The specified policer-id must already exist within the sap-ingress QoS policy. While the system is determining the forwarding class of a packet, it is also looking up its forwarding destination based on the ingress service type and the service instance forwarding records. Two basic types of services support multicast packets: routed services (IES and VPRN) and L2 multipoint services (VPLS, I-VPLS, and B-VPLS). For the routed service types, a multicast packet is destined to an IPv4 or IPv6 multicast address. For the L2 multipoint services, a multicast packet is a packet destined to a multicast MAC address (multicast bit set in the destination MAC address but not the ff:ff:ff:ff:ff:ff broadcast address). The VPLS services also support two other multipoint forwarding types (broadcast and unknown), which are considered separate from the multicast forwarding type.
If ingress forwarding logic has resolved a packet to the multicast forwarding type within the forwarding class, it will be mapped to either an ingress multipoint queue (using the multicast queue-id or multicast queue-id group ingress-queue-group commands) or an ingress policer (multicast-policer policer-id). The multicast and multicast-policer commands within the forwarding class context are mutually exclusive. By default, the multicast forwarding type is mapped to the SAP ingress default multipoint queue. If the multicast-policer policer-id command is executed, any previous policer mapping or queue mapping for the multicast forwarding type within the forwarding class is overridden if the policer mapping is successful.
A policer defined within the sap-ingress policy is not actually created on an ingress SAP or a subscriber using an sla-profile where the policy is applied until at least one forwarding type (unicast, broadcast, unknown, or multicast) from one of the forwarding classes is mapped to the policer. If insufficient policer resources exist to create the policer for a SAP or subscriber or multiservice site, or ingress policing is not supported on the port associated with the SAP or subscriber or multiservice site, the initial forwarding class forwarding type mapping will fail.
The multicast-policer command is ignored for instances of the policer applied to SAPs subscribers or multiservice site where broadcast packets are not supported.
When the multicast forwarding type within a forwarding class is mapped to a policer, the multicast packets classified to the subclasses within the forwarding class are also mapped to the policer.
The no form of this command is used to restore the mapping of the multicast forwarding type within the forwarding class to the default multipoint queue. If all forwarding class forwarding types had been removed from the default multipoint queue, the queue will not exist on the SAPs subscribers or multiservice site associated with the QoS policy, and the no multicast-policer command will cause the system to attempt to create the default multipoint queue on each object. If the system cannot create the queue on each instance, the no multicast-policer command will fail and the multicast forwarding type within the forwarding class will continue its mapping to the existing policer-id. If the no multicast-policer command results in a policer without any current mappings, the policer will be removed from the SAPs and subscribers associated with the QoS policy. All statistics associated with the policer on each SAP and subscriber will be lost.
This command overrides the default multicast forwarding type queue mapping for fc fc-name. The specified queue-id must exist within the policy as a multipoint queue before the mapping can be made. When the forwarding class mapping is executed, all multicast traffic on a SAP using this policy is forwarded using the queue-id.
The multicast forwarding type includes the unknown unicast forwarding type and the broadcast forwarding type unless each is explicitly defined to a different multipoint queue. When the unknown and broadcast forwarding types are left as default, they will track the defined queue for the multicast forwarding type.
The no form of this command sets the multicast forwarding type queue-id back to the default queue for the forwarding class. If the broadcast and unknown forwarding types were not explicitly defined to a multipoint queue, they will also be set back to the default multipoint queue (queue 11).
This command overrides the default multicast forwarding type queue mapping for fc fc-name. The specified queue-id must exist within the policy as a multipoint queue before the mapping can be made. When the forwarding class mapping is executed, all multicast traffic using this policy is forwarded using the queue-id.
The multicast forwarding type includes the unknown unicast forwarding type and the broadcast forwarding type, unless each is explicitly defined to a different multipoint queue. When the unknown and broadcast forwarding types are left as default, they will track the defined queue for the multicast forwarding type.
The no form of this command sets the multicast forwarding type queue-id back to the default queue for the forwarding class. If the broadcast and unknown forwarding types were not explicitly defined to a multipoint queue, they will also be set back to the default multipoint queue (queue 11).
Resource Utilization
When a multipoint queue is created and at least one forwarding class is mapped to the queue using the multipoint-queue command, a single ingress multipoint hardware queue is created per instance of the applied network-queue policy, using the queue-policy command at the ingress network FP level. Multipoint queues are not created at egress and the multipoint queues defined in the network-queue policy are ignored when the policy is applied to an egress port.
This command configures the multicast forwarding type queue mapping for fc fc-name. The specified queue-id must exist within the policy as a multipoint queue before the mapping can be made. When the forwarding class mapping is executed, all multicast traffic on a SAP using this policy is forwarded using the queue-id.
The multicast forwarding type includes the unknown unicast forwarding type and the broadcast forwarding type unless each is explicitly defined to a different multipoint queue. When the unknown and broadcast forwarding types are left as default, they will track the defined queue for the multicast forwarding type.
The no form of this command sets the multicast forwarding type queue-id back to the default queue for the forwarding class. If the broadcast and unknown forwarding types were not explicitly defined to a multipoint queue, they will also be set back to the default multipoint queue (queue 11).
This command configures the interface where to redirect IGMP multicast traffic to.
This command enables a redirection under a filtering policy. The filtering policy in this case becomes a redirection policy and it is defined under the router>policy-option hierarchy.
After the redirection policy is applied to the subscriber, all IGMP messages will be processed per subscriber host before they get redirected to the referenced interface (and possibly service). However, multicast traffic will not be replicated directly per subscriber host but instead it will be forwarded on the interface that is referenced in the redirection policy. The redirected interface must have IGMP enabled.
Currently all traffic is redirected and there is no ability to selectively redirect multicast traffic based on match conditions (such as, multicast-groups, source IP address of IGMP messages). Multicast redirection is supported between VPRN services and also between interfaces within the Global Routing Context. Multicast redirection is not supported between the VPRN services and the Global Routing Context. Multicast redirection is supported in the wholesale/retail VPRN context.
![]() | Note: Redirecting from a VPRN instance to the GRT is not supported. Redirecting from a VPRN to a different VPRN is supported and redirecting from an IES to another IES is also supported. |
no multicast-redirection
This command configures the way subnet matching is done for incoming data packets on this interface. An IP multicast sender is an user entity to be authenticated in a receiving host.
This command configures how traffic from directly-attached multicast sources should be treated on broadcast interfaces. It can also be used to treat all traffic received on an interface as traffic coming from a directly-attached multicast source. This is particularly useful if a multicast source is connected to a point-to-point or unnumbered interface.
The no form of this command reverts to the default value.
multicast-senders auto
This command adds a multicast service association to the video interface. This parameter is not required on the video interface when the service carries both unicast and multicast traffic.
When multicast and unicast are carried in separate service instances, the operator can set this parameter on the unicast video interface to form an association with the multicast service when replies need to be sent in the multicast service instance.
When multicast and unicast are carried in separate services when a downstream device (such as a DSLAM) can perform a service cross connect between the services and performs multicast replication.
The no form of the command removes the multicast service association.
none
service-id: | 1 to 2147483647 |
svc-name: | 64 characters maximum |
This command enables Multicast-Only Fast Reroute (MoFRR) functionality for IPv6 PIM-SSM interfaces in the global routing table instance.
The no form of this command disables MoFRR for IPv6 PIM-SSM interfaces.
no multicast6-fast-failover
This command configures the node to receive multicast NTP messages on the CPM MGMT port. If multicastclient is not configured, received NTP multicast traffic will be ignored. Use the show command to view the state of the configuration.
The no construct of this message removes the multicast client for the specified interface from the configuration.
This command enables multi-class MLPPP as defined by RFC 2686, The Multi-Class Extension to Multi-Link PPP, on a MLPPP bundle (including MLPPP bundle protection groups) with 2, 3 or 4 classes. For multiclass MLPPP bundles with a non-zero count, the class index takes valid values from 0 to one less than the maximum number of classes inclusive. For example a 4-class MLPPP bundle has 4 classes with indexes 0, 1, 2, and 3. A bundle must be shutdown with no links for this value to be changed.
Entries are created and deleted by the system depending on the number of classes being used by a given MLPPP bundle.
The no form of this command disables multi-class MLPPP.
multiclass 4
This command configures the time to live (TTL) value entered in the IP header of packets sent to an EBGP peer multiple hops away.
This parameter is meaningful only when configuring EBGP peers. It is ignored if set for an IBGP peer.
The no form of this command is used to convey to the BGP instance that the EBGP peers are directly connected.
The no form of this command reverts to default values.
multihop 1 (EBGP peers are directly connected)
multihop 64 (IBGP)
This command configures the time to live (TTL) value entered in the IP header of packets sent to an EBGP peer multiple hops away.
This parameter is meaningful only when configuring EBGP peers. It is ignored if set for an IBGP peer.
The no form of this command is used to convey to the BGP instance that the EBGP peers are directly connected.
The no form of this command reverts to default values.
multihop 1 (EBGP peers are directly connected)
multihop 64 (IBGP)
This command configures the time to live (TTL) value entered in the IP header of packets sent to an EBGP peer multiple hops away.
The no form of this command is used to convey to the BGP instance that the EBGP peers are directly connected.
The no form of this command used at the global level reverts to default.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
multihop 1 — EBGP peers are directly connected.
multihop 64 — IBGP
This command creates the context to configure bundle properties for this bundle port.
This command specifies that a BGP neighbor or the set of BGP neighbors in a peer group should be part of a selective multipath set. Selective multipaths are only supported by the ipv4, label-ipv4, ipv6, and label-ipv6 address families.
If no candidate multipath route for an IP prefix came from a multipath-eligible peer then multipaths are selected without further constraints.
If the best route for an IP prefix is received from a neighbor marked as multipath-eligible, then other routes for the same prefix are not eligible to be used as multipaths unless they also came from peers marked as multipath-eligible.
If the best route for an IP prefix did not come from a multipath-eligible peer but there is at least one candidate multipath route for the same prefix from a multipath-eligible peer then multipath is not used.
The no form of this command marks a neighbor or group as non-multipath eligible. The effect of this depends on whether other neighbors and groups are marked as multipath eligible.
no multipath-eligible
This command specifies that a BGP neighbor or the set of BGP neighbors in a peer group should be part of a selective multipath set. Selective multipaths are only supported by the ipv4, label-ipv4, ipv6, and label-ipv6 address families.
If no candidate multipath route for an IP prefix came from a multipath-eligible peer then multipaths are selected without further constraints.
If the best route for an IP prefix is received from a neighbor marked as multipath-eligible, then other routes for the same prefix are not eligible to be used as multipaths unless they also came from peers marked as multipath-eligible.
If the best route for an IP prefix did not come from a multipath-eligible peer but there is at least one candidate multipath route for the same prefix from a multipath-eligible peer then multipath is not used.
The no form of this command marks a neighbor or group as non-multipath eligible. The effect of this depends on whether other neighbors and groups are marked as multipath eligible.
no multipath-eligible
This command configures the multiple-option match condition.
The no form of this command reverts to the default.
This command configures matching packets that contain one or more than one option fields in the IP header as an IP filter match criterion.
The no form of the command removes the checking of the number of option fields in the IP header as a match criterion.
no multiple-option
This command configures matching packets that contain more than one option fields in the IP header as an IP filter match criterion.
The no form of this command removes the checking of the number of option fields in the IP header as a match criterion.
no multiple-option
This command specifies the detect multiplier used for a micro-BFD session over the associated LAG links. If a BFD control packet is not received for a period of multiplier X receive-interval then the session is declared down.
The no form of this command removes multiplier from the configuration.
multiplier 3
This command configures the multiplier used for timing out the CSF.
This command configures the multiplication factor applied to the receive time that is used to clear the CSF condition.
The no form of this command disables the multiplier used for timing out CSF.
multiplier 3.5
This command specifies the detect multiplier for a BFD session. If a BFD control packet is not received for a period of multiplier x receive-interval (the parameter value of the receive-interval command), the session is declared down.
The no form of this command reverts to the default value.
multiplier 3
This command configures the sample-multiplier and adjust-multiplier applicable to one particular LSP.
The sample-multiplier configures the number of collection intervals between measurements of the number of bytes that have been transmitted on the LSP. The byte counts include the layer 2 encapsulation of MPLS packets and represent traffic of all forwarding classes and priorities (in-profile vs, out-of-profile) belonging to the LSP. The router calculates the average data rate in each sample interval. The maximum of this average data rate over multiple sample intervals is the measured bandwidth input to the auto-bandwidth adjustment algorithms.
The adjust-multiplier is the number of collection intervals between periodic evaluations by the ingress LER about whether to adjust the LSP bandwidth. The router keeps track of the maximum average data rate of each LSP since the last reset of the adjust-count.
The adjust-multiplier is not allowed to be set to a value less than the sample-multiplier. It is recommended that the adjust-multiplier be a multiple of the sample-multiplier.
The no form of this command instructs the system to take the value from the auto-bandwidth-multipliers command.
no multipliers
This command creates a multi-stream S-PMSI policy. Having multiple multi-stream S-PMSIs per MVPN creates a link list, in which the first match (lowest index) will be chosen for a multicast stream. The number of configured multi-stream S-PMSIs cannot exceed the configured maximum S-PMSI for a given MVPN.
This command enters the context to configure MVPN-related parameters for the IP VPN.
This command specifies that the SR OS is to cache inter-as MVPN PMSI AD routes for option B.
This command is not enabled if the user is using an older config file.
no mvpn
This command enables and disables the context to configure MVPN-related parameters.
This command configures the add-paths capability for multicast VPN IPv4 routes. By default, add-paths is not enabled for multicast VPN IPv4 routes.
The maximum number of multicast VPN paths per IPv4 prefix to send is the configured send-limit, which is a mandatory parameter. The capability to receive multiple multicast paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command, receive capability is enabled by default. The none option disables the receive capability.
The no form of this command disables add-paths support for multicast VPN IPv4 routes, causing sessions established using add-paths for multicast VPN IPv4 to go down and come back up without the add-paths capability.
no mvpn-ipv4
This command configures the add-paths capability for multicast VPN IPv6 routes. By default, add-paths is not enabled for multicast VPN IPv6 routes.
The maximum number of multicast VPN paths per IPv6 prefix to send is the configured send-limit, which is a mandatory parameter. The capability to receive multiple multicast VPN paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command, receive capability is enabled by default. The none option disables the receive capability.
The no form of this command disables add-paths support for multicast VPN IPv6 routes, causing sessions established using add-paths for multicast VPN IPv6 to go down and come back up without the add-paths capability.
no mvpn-ipv6
This command specifies that the SR OS is to cache intra-as MVPN PMSI AD routes for option B.
This command is enabled if the user is using an older config file.
no mvpn-no-export
This command enables debugging for the PIM MVPN route cache.
The no form of this command disables debugging for the PIM MVPN route cache.
This command allows match on ng-MVPN BGP route type when the policy is used for VRF-import/VRF-export/BGP global export policy. The policy will only be applied to multicast routes.
The no form of this command disables mvpn-type in the policy evaluation.
no mvpn-type
When enabled, the type/subtype in advertised routes is encoded as 0x010b.
The no form of this command (the default) encodes the type/subtype as 0x010a (to preserve backwards compatibility).
no mvpn-vrf-import-subtype-new
This command enables the context to configure Multicast VPLS Registration (MVR) parameters.
This object consolidates the MVRP attributes. MVRP is only supported initially in the management VPLS so the object is not supported under BVPLS, IVPLS or regular VPLS not marked with the m-vpls tag.
This command enables MVRP control in the VPLS instances instantiated using the templates for the specified vpls-group. That means the flooding FDB will be created empty and will be populated with endpoints whenever MVRP receives a declaration and a registration on a specific endpoint. Also the VLAN ID associated by the control VPLS with the instantiated VPLS will be declared on service activation by MVRP on all virtual MVRP ports in the control VPLS. Service activation takes place when at least one other SAP is provisioned and brought up under the data VPLS. This is usually a customer facing SAP or a SAP leading outside of the MVRP controlled domain.
The no form of this command disallows MVRP control over this VPLS. The VPLS will be created with a regular FDB and will become as a result active upon creation time. Command change is allowed only when the related vpls-group is in shutdown state.
no mvrp-control