Nokia 7450 ESS, 7750 SR, 7950 XRS, and VSR 20.7.R1
  Legal Disclaimers
  Customer Documentation and Product Support
  Legal Disclaimers
  Customer Documentation and Product Support
Acronyms Reference Guide 20.7.R1
  1. 7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
  Customer Document and Product Support
  1. 7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
  Customer Document and Product Support
Basic System Configuration Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Router System Configuration Process
  2. CLI Usage
    2.1. CLI Structure
    2.2. Navigating in the CLI
      2.2.1. CLI Contexts
      2.2.2. Basic CLI Commands
      2.2.3. CLI Environment Commands
      2.2.4. CLI Monitor Commands
    2.3. Getting Help in the CLI
    2.4. The CLI Command Prompt
    2.5. Displaying Configuration Contexts
    2.6. EXEC Files
    2.7. CLI Script Control
    2.8. Entering CLI Commands
      2.8.1. Command Completion
      2.8.2. Unordered and Unnamed Parameters
      2.8.3. Editing Keystrokes
      2.8.4. Absolute Paths
      2.8.5. History
      2.8.6. Entering Numerical Ranges
      2.8.7. Pipe/Match
      2.8.8. Pipe/Count
      2.8.9. Range Operator Support of Regular Expression Match
        2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
      2.8.10. Redirection
    2.9. VI Editor
      2.9.1. Summary of vi Commands
      2.9.2. Using the vi Commands
      2.9.3. EX Commands
    2.10. Configuration Rollback
      2.10.1. Feature Behavior
      2.10.2. Rollback and SNMP
      2.10.3. Rescue Configuration
      2.10.4. Operational Guidelines
    2.11. Transactional Configuration
      2.11.1. Basic Operation
      2.11.2. Transactions and Rollback
      2.11.3. Authorization
    2.12. Basic CLI Command Reference
      2.12.1. Command Hierarchies
        2.12.1.1. Global Commands
        2.12.1.2. Monitor Commands
        2.12.1.3. Environment Commands
        2.12.1.4. Candidate Commands
        2.12.1.5. Rollback Commands
      2.12.2. Command Descriptions
        2.12.2.1. Global Commands
        2.12.2.2. Monitor CLI Commands
        2.12.2.3. CLI Environment Commands
        2.12.2.4. Candidate Commands
        2.12.2.5. Rollback Commands
        2.12.2.6. Show Commands
  3. File System Management
    3.1. The File System
      3.1.1. Compact Flash Devices
      3.1.2. URLs
      3.1.3. Wildcards
    3.2. File Management Tasks
      3.2.1. Modifying File Attributes
      3.2.2. Creating Directories
      3.2.3. Copying Files
      3.2.4. Moving Files
      3.2.5. Deleting Files and Removing Directories
      3.2.6. Displaying Directory and File Information
      3.2.7. Repairing the File System
    3.3. File Command Reference
      3.3.1. Command Hierarchy
        3.3.1.1. File Commands
      3.3.2. Command Descriptions
        3.3.2.1. File System Commands
        3.3.2.2. File Commands
  4. Boot Options
    4.1. System Initialization
      4.1.1. Configuration and Image Loading
        4.1.1.1. Persistence
        4.1.1.2. Lawful Intercept
        4.1.1.3. FIPS-140-2 Mode
        4.1.1.4. System Profiles
    4.2. Initial System Startup Process Flow
    4.3. Configuration Notes
    4.4. Configuring Boot Options File with CLI
      4.4.1. BOF Configuration Overview
      4.4.2. Basic BOF Configuration
      4.4.3. Common Configuration Tasks
        4.4.3.1. Searching for the BOF
        4.4.3.2. Accessing the CLI
          4.4.3.2.1. Console Connection
      4.4.4. Configuring BOF Parameters
        4.4.4.1. Autoconfigure
          4.4.4.1.1. Autoconfigure Restrictions
          4.4.4.1.2. DHCP Discovery of MAC Addresses
          4.4.4.1.3. IPv6 DUID
          4.4.4.1.4. IPv6 DHCP RAs
    4.5. Service Management Tasks
      4.5.1. System Administration Commands
        4.5.1.1. Viewing the Current Configuration
        4.5.1.2. Modifying and Saving a Configuration
        4.5.1.3. Deleting Bof Parameters
        4.5.1.4. Saving a Configuration to a Different Filename
        4.5.1.5. Rebooting
    4.6. BOF Configuration Command Reference
      4.6.1. Command Hierarchies
        4.6.1.1. Configuration Commands
      4.6.2. Command Descriptions
        4.6.2.1. File Management Commands
        4.6.2.2. BOF Processing Control
        4.6.2.3. Console Port Configuration
        4.6.2.4. Image and Configuration Management
        4.6.2.5. Management Ethernet Configuration
        4.6.2.6. DNS Configuration Commands
    4.7. BOF Show Command Reference
      4.7.1. Command Hierarchies
      4.7.2. Command Descriptions
        4.7.2.1. BOF Show Commands
  5. Debug Commands
  6. Zero Touch Provisioning
    6.1. ZTP Overview
      6.1.1. Network Requirements
      6.1.2. Network Support
    6.2. ZTP Processes
      6.2.1. Auto-boot Process
      6.2.2. Auto-provisioning Process
    6.3. DHCP Support for ZTP
      6.3.1. DHCP Server Offer Options 66, 67, and 43
        6.3.1.1. Nokia-specific TLV
      6.3.2. Supported DHCP Client Options for ZTP
      6.3.3. Supported DHCP Server Options for ZTP
      6.3.4. DHCP Discovery and Solicitation
        6.3.4.1. DHCP Discovery (IPv4 and IPv6)
          6.3.4.1.1. DHCP Discovery Options 61 and 77
          6.3.4.1.2. DHCP Discovery Option 1 DUID (IPv6)
        6.3.4.2. DHCP Solicitation (IPv6)
      6.3.5. IPv4 and IPv6 DHCP Support
        6.3.5.1. IPv4 Route Installation Details
        6.3.5.2. IPv6 DHCP/RA Details
        6.3.5.3. ZTP and DHCP Timeouts
    6.4. ZTP Procedure Details
      6.4.1. Node Bootup
        6.4.1.1. Reinitiating ZTP During Normal Node Bootup
      6.4.2. BOF
        6.4.2.1. SD Card and Compact Flash Support
      6.4.3. Auto-boot Process
        6.4.3.1. Options and Option Modification
        6.4.3.2. CLI Access
        6.4.3.3. Interrupting Auto-boot
      6.4.4. Auto-provisioning Process
        6.4.4.1. VLAN Discovery
          6.4.4.1.1. VLAN Discovery Option
        6.4.4.2. Auto-provisioning Procedure
        6.4.4.3. Out-of-band Management Versus In-band Management
          6.4.4.3.1. Supported In-band Management Ports
      6.4.5. Provisioning Files
        6.4.5.1. Provisioning File Download
        6.4.5.2. Provisioning File Resolution Using DNS
        6.4.5.3. File Download and Redundancy
        6.4.5.4. Sample Provisioning File
        6.4.5.5. Proxy Support
      6.4.6. Logs and Events
    6.5. ZTP Command Reference
      6.5.1. Command Hierarchies
        6.5.1.1. Configuration Commands
      6.5.2. Configuration Commands
        6.5.2.1. ZTP BOF Commands
        6.5.2.2. ZTP Tools Commands
  7. Tools Commands
  8. System Management
    8.1. System Management Parameters
      8.1.1. System Information
        8.1.1.1. System Name
        8.1.1.2. System Contact
        8.1.1.3. System Location
        8.1.1.4. System Coordinates
        8.1.1.5. Naming Objects
        8.1.1.6. Common Language Location Identifier
        8.1.1.7. DNS Security Extensions
      8.1.2. System Time
        8.1.2.1. Time Zones
        8.1.2.2. Network Time Protocol (NTP)
        8.1.2.3. SNTP Time Synchronization
        8.1.2.4. CRON
    8.2. High Availability
      8.2.1. HA Features
        8.2.1.1. Redundancy
          8.2.1.1.1. Software Redundancy
          8.2.1.1.2. Configuration Redundancy
          8.2.1.1.3. Component Redundancy
          8.2.1.1.4. Service Redundancy
          8.2.1.1.5. Accounting Configuration Redundancy
        8.2.1.2. Nonstop Forwarding
        8.2.1.3. Nonstop Routing (NSR)
        8.2.1.4. CPM Switchover
        8.2.1.5. Synchronization
          8.2.1.5.1. Configuration and boot-env Synchronization
          8.2.1.5.2. State Database Synchronization
    8.3. Synchronization and Redundancy
      8.3.1. Active and Standby Designations
      8.3.2. When the Active CPM Goes Offline
      8.3.3. OOB Management Ethernet Port Redundancy
      8.3.4. Persistence
        8.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    8.4. Network Synchronization
      8.4.1. Central Synchronization Sub-System
      8.4.2. 7950 XRS-40 Extension Chassis Central Clocks
      8.4.3. Synchronization Status Messages (SSM)
        8.4.3.1. DS1 Signals
        8.4.3.2. E1 Signals
        8.4.3.3. SONET/SDH Signals
        8.4.3.4. DS3/E3
      8.4.4. Synchronous Ethernet
      8.4.5. Clock Source Quality Level Definitions
      8.4.6. Advanced G.781 Features
      8.4.7. IEEE 1588v2 PTP
        8.4.7.1. PTP Clock Synchronization
        8.4.7.2. Performance Considerations
          8.4.7.2.1. Port-Based Timestamping of PTP Messages
        8.4.7.3. PTP Capabilities
        8.4.7.4. PTP Ordinary Slave Clock For Frequency
        8.4.7.5. PTP Ordinary Master Clock For Frequency
        8.4.7.6. PTP Boundary Clock for Frequency and Time
        8.4.7.7. PTP Clock Redundancy
        8.4.7.8. PTP Time for System Time and OAM Time
        8.4.7.9. PTP within Routing Instances
    8.5. System-Wide ATM Parameters
    8.6. QinQ Network Interface Support
    8.7. Link Layer Discovery Protocol (LLDP)
    8.8. IP Hashing as an LSR
    8.9. Satellites
      8.9.1. Ethernet Satellites
      8.9.2. TDM Satellites
      8.9.3. Software Repositories for Satellites
      8.9.4. Satellite Software Upgrade Overview
      8.9.5. Satellite Configuration
        8.9.5.1. Satellite Client Port ID Formats
        8.9.5.2. Local Forwarding
        8.9.5.3. Port Template
        8.9.5.4. 10GE Client Ports
        8.9.5.5. 100GE Client Ports
        8.9.5.6. 10GE Uplinks on the 64x10GE+4x100GE Satellite
        8.9.5.7. Satellite Uplink Resiliency
    8.10. Auto-Provisioning
      8.10.1. Auto-provisioning limits
      8.10.2. Auto-provisioning Process
      8.10.3. Auto-provisioning DHCP Rules
      8.10.4. Auto-provisioning Failure
    8.11. Administrative Tasks
      8.11.1. Saving Configurations
      8.11.2. Specifying Post-Boot Configuration Files
      8.11.3. Network Timing
      8.11.4. Power Supplies
      8.11.5. Automatic Synchronization
        8.11.5.1. Boot-Env Option
        8.11.5.2. Config Option
      8.11.6. Manual Synchronization
        8.11.6.1. Forcing a Switchover
    8.12. System Router Instances
    8.13. System Configuration Process Overview
    8.14. Configuration Notes
      8.14.1. General
    8.15. Configuring System Management with CLI
      8.15.1. Saving Configurations
      8.15.2. Basic System Configuration
      8.15.3. Common Configuration Tasks
        8.15.3.1. System Information
          8.15.3.1.1. System Information Parameters
          8.15.3.1.2. Coordinates
          8.15.3.1.3. System Time Elements
          8.15.3.1.4. ANCP Enhancements
        8.15.3.2. Configuring Synchronization and Redundancy
          8.15.3.2.1. Configuring Persistence
          8.15.3.2.2. Configuring Synchronization
          8.15.3.2.3. Configuring Manual Synchronization
          8.15.3.2.4. Forcing a Switchover
          8.15.3.2.5. Configuring Synchronization Options
        8.15.3.3. Configuring Multi-Chassis Redundancy for LAG
        8.15.3.4. Configuring Power Supply Parameters
        8.15.3.5. Configuring ATM System Parameters
        8.15.3.6. Configuring Backup Copies
        8.15.3.7. Post-Boot Configuration Extension Files
          8.15.3.7.1. Show Command Output and Console Messages
      8.15.4. System Timing
        8.15.4.1. Edit Mode
        8.15.4.2. Configuring Timing References
        8.15.4.3. Using the Revert Command
        8.15.4.4. Other Editing Commands
        8.15.4.5. Forcing a Specific Reference
      8.15.5. Configuring System Monitoring Thresholds
        8.15.5.1. Creating Events
        8.15.5.2. System Alarm Contact Inputs
      8.15.6. Configuring LLDP
    8.16. System Command Reference
      8.16.1. Command Hierarchies
        8.16.1.1. Configuration Commands
        8.16.1.2. System Information Commands
        8.16.1.3. Satellite Commands
        8.16.1.4. System Alarm Contact Input Commands
        8.16.1.5. System Threshold Alarm Commands
        8.16.1.6. System Bluetooth Commands
        8.16.1.7. Persistence Commands
        8.16.1.8. PTP Commands
        8.16.1.9. System Time Commands
        8.16.1.10. Cron Commands
        8.16.1.11. Script Control Commands
        8.16.1.12. System Synchronization Commands
        8.16.1.13. System Administration (Admin) Commands
        8.16.1.14. High Availability (Redundancy) Commands
        8.16.1.15. LLDP System Commands
        8.16.1.16. LLDP Ethernet Port Commands
        8.16.1.17. System Router Instance Commands
      8.16.2. System Command Reference
        8.16.2.1. Generic Commands
        8.16.2.2. System Information Commands
        8.16.2.3. System Alarm Contact Input Commands
        8.16.2.4. System Threshold Alarm Commands
        8.16.2.5. System Bluetooth Commands
        8.16.2.6. Persistence Commands
        8.16.2.7. PTP Commands
        8.16.2.8. Date and Time Commands
        8.16.2.9. Network Time Protocol Commands
          8.16.2.9.1. SNTP Commands
          8.16.2.9.2. System Time Commands
        8.16.2.10. Cron Commands
        8.16.2.11. Script Control Commands
        8.16.2.12. System Synchronization Configuration Commands
        8.16.2.13. System Administration Commands
        8.16.2.14. Redundancy Commands
          8.16.2.14.1. Peer Commands
          8.16.2.14.2. Multi-Chassis Endpoint Commands
          8.16.2.14.3. MC-LAG Commands
        8.16.2.15. LLDP System Commands
        8.16.2.16. LLDP Ethernet Port Commands
        8.16.2.17. System Router Instance Commands
    8.17. Show, Clear, Debug, and Tools Command Reference
      8.17.1. Command Hierarchies
        8.17.1.1. Show Commands
        8.17.1.2. Clear Commands
        8.17.1.3. Debug Commands
        8.17.1.4. Tools Commands
      8.17.2. Command Descriptions
        8.17.2.1. Show Commands
        8.17.2.2. Debug Commands
        8.17.2.3. Tools Commands
        8.17.2.4. Clear Commands
  9. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router System Configuration Process
  2. CLI Usage
    2.1. CLI Structure
    2.2. Navigating in the CLI
      2.2.1. CLI Contexts
      2.2.2. Basic CLI Commands
      2.2.3. CLI Environment Commands
      2.2.4. CLI Monitor Commands
    2.3. Getting Help in the CLI
    2.4. The CLI Command Prompt
    2.5. Displaying Configuration Contexts
    2.6. EXEC Files
    2.7. CLI Script Control
    2.8. Entering CLI Commands
      2.8.1. Command Completion
      2.8.2. Unordered and Unnamed Parameters
      2.8.3. Editing Keystrokes
      2.8.4. Absolute Paths
      2.8.5. History
      2.8.6. Entering Numerical Ranges
      2.8.7. Pipe/Match
      2.8.8. Pipe/Count
      2.8.9. Range Operator Support of Regular Expression Match
        2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
      2.8.10. Redirection
    2.9. VI Editor
      2.9.1. Summary of vi Commands
      2.9.2. Using the vi Commands
      2.9.3. EX Commands
    2.10. Configuration Rollback
      2.10.1. Feature Behavior
      2.10.2. Rollback and SNMP
      2.10.3. Rescue Configuration
      2.10.4. Operational Guidelines
    2.11. Transactional Configuration
      2.11.1. Basic Operation
      2.11.2. Transactions and Rollback
      2.11.3. Authorization
    2.12. Basic CLI Command Reference
      2.12.1. Command Hierarchies
        2.12.1.1. Global Commands
        2.12.1.2. Monitor Commands
        2.12.1.3. Environment Commands
        2.12.1.4. Candidate Commands
        2.12.1.5. Rollback Commands
      2.12.2. Command Descriptions
        2.12.2.1. Global Commands
        2.12.2.2. Monitor CLI Commands
        2.12.2.3. CLI Environment Commands
        2.12.2.4. Candidate Commands
        2.12.2.5. Rollback Commands
        2.12.2.6. Show Commands
  3. File System Management
    3.1. The File System
      3.1.1. Compact Flash Devices
      3.1.2. URLs
      3.1.3. Wildcards
    3.2. File Management Tasks
      3.2.1. Modifying File Attributes
      3.2.2. Creating Directories
      3.2.3. Copying Files
      3.2.4. Moving Files
      3.2.5. Deleting Files and Removing Directories
      3.2.6. Displaying Directory and File Information
      3.2.7. Repairing the File System
    3.3. File Command Reference
      3.3.1. Command Hierarchy
        3.3.1.1. File Commands
      3.3.2. Command Descriptions
        3.3.2.1. File System Commands
        3.3.2.2. File Commands
  4. Boot Options
    4.1. System Initialization
      4.1.1. Configuration and Image Loading
        4.1.1.1. Persistence
        4.1.1.2. Lawful Intercept
        4.1.1.3. FIPS-140-2 Mode
        4.1.1.4. System Profiles
    4.2. Initial System Startup Process Flow
    4.3. Configuration Notes
    4.4. Configuring Boot Options File with CLI
      4.4.1. BOF Configuration Overview
      4.4.2. Basic BOF Configuration
      4.4.3. Common Configuration Tasks
        4.4.3.1. Searching for the BOF
        4.4.3.2. Accessing the CLI
          4.4.3.2.1. Console Connection
      4.4.4. Configuring BOF Parameters
        4.4.4.1. Autoconfigure
          4.4.4.1.1. Autoconfigure Restrictions
          4.4.4.1.2. DHCP Discovery of MAC Addresses
          4.4.4.1.3. IPv6 DUID
          4.4.4.1.4. IPv6 DHCP RAs
    4.5. Service Management Tasks
      4.5.1. System Administration Commands
        4.5.1.1. Viewing the Current Configuration
        4.5.1.2. Modifying and Saving a Configuration
        4.5.1.3. Deleting Bof Parameters
        4.5.1.4. Saving a Configuration to a Different Filename
        4.5.1.5. Rebooting
    4.6. BOF Configuration Command Reference
      4.6.1. Command Hierarchies
        4.6.1.1. Configuration Commands
      4.6.2. Command Descriptions
        4.6.2.1. File Management Commands
        4.6.2.2. BOF Processing Control
        4.6.2.3. Console Port Configuration
        4.6.2.4. Image and Configuration Management
        4.6.2.5. Management Ethernet Configuration
        4.6.2.6. DNS Configuration Commands
    4.7. BOF Show Command Reference
      4.7.1. Command Hierarchies
      4.7.2. Command Descriptions
        4.7.2.1. BOF Show Commands
  5. Debug Commands
  6. Zero Touch Provisioning
    6.1. ZTP Overview
      6.1.1. Network Requirements
      6.1.2. Network Support
    6.2. ZTP Processes
      6.2.1. Auto-boot Process
      6.2.2. Auto-provisioning Process
    6.3. DHCP Support for ZTP
      6.3.1. DHCP Server Offer Options 66, 67, and 43
        6.3.1.1. Nokia-specific TLV
      6.3.2. Supported DHCP Client Options for ZTP
      6.3.3. Supported DHCP Server Options for ZTP
      6.3.4. DHCP Discovery and Solicitation
        6.3.4.1. DHCP Discovery (IPv4 and IPv6)
          6.3.4.1.1. DHCP Discovery Options 61 and 77
          6.3.4.1.2. DHCP Discovery Option 1 DUID (IPv6)
        6.3.4.2. DHCP Solicitation (IPv6)
      6.3.5. IPv4 and IPv6 DHCP Support
        6.3.5.1. IPv4 Route Installation Details
        6.3.5.2. IPv6 DHCP/RA Details
        6.3.5.3. ZTP and DHCP Timeouts
    6.4. ZTP Procedure Details
      6.4.1. Node Bootup
        6.4.1.1. Reinitiating ZTP During Normal Node Bootup
      6.4.2. BOF
        6.4.2.1. SD Card and Compact Flash Support
      6.4.3. Auto-boot Process
        6.4.3.1. Options and Option Modification
        6.4.3.2. CLI Access
        6.4.3.3. Interrupting Auto-boot
      6.4.4. Auto-provisioning Process
        6.4.4.1. VLAN Discovery
          6.4.4.1.1. VLAN Discovery Option
        6.4.4.2. Auto-provisioning Procedure
        6.4.4.3. Out-of-band Management Versus In-band Management
          6.4.4.3.1. Supported In-band Management Ports
      6.4.5. Provisioning Files
        6.4.5.1. Provisioning File Download
        6.4.5.2. Provisioning File Resolution Using DNS
        6.4.5.3. File Download and Redundancy
        6.4.5.4. Sample Provisioning File
        6.4.5.5. Proxy Support
      6.4.6. Logs and Events
    6.5. ZTP Command Reference
      6.5.1. Command Hierarchies
        6.5.1.1. Configuration Commands
      6.5.2. Configuration Commands
        6.5.2.1. ZTP BOF Commands
        6.5.2.2. ZTP Tools Commands
  7. Tools Commands
  8. System Management
    8.1. System Management Parameters
      8.1.1. System Information
        8.1.1.1. System Name
        8.1.1.2. System Contact
        8.1.1.3. System Location
        8.1.1.4. System Coordinates
        8.1.1.5. Naming Objects
        8.1.1.6. Common Language Location Identifier
        8.1.1.7. DNS Security Extensions
      8.1.2. System Time
        8.1.2.1. Time Zones
        8.1.2.2. Network Time Protocol (NTP)
        8.1.2.3. SNTP Time Synchronization
        8.1.2.4. CRON
    8.2. High Availability
      8.2.1. HA Features
        8.2.1.1. Redundancy
          8.2.1.1.1. Software Redundancy
          8.2.1.1.2. Configuration Redundancy
          8.2.1.1.3. Component Redundancy
          8.2.1.1.4. Service Redundancy
          8.2.1.1.5. Accounting Configuration Redundancy
        8.2.1.2. Nonstop Forwarding
        8.2.1.3. Nonstop Routing (NSR)
        8.2.1.4. CPM Switchover
        8.2.1.5. Synchronization
          8.2.1.5.1. Configuration and boot-env Synchronization
          8.2.1.5.2. State Database Synchronization
    8.3. Synchronization and Redundancy
      8.3.1. Active and Standby Designations
      8.3.2. When the Active CPM Goes Offline
      8.3.3. OOB Management Ethernet Port Redundancy
      8.3.4. Persistence
        8.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    8.4. Network Synchronization
      8.4.1. Central Synchronization Sub-System
      8.4.2. 7950 XRS-40 Extension Chassis Central Clocks
      8.4.3. Synchronization Status Messages (SSM)
        8.4.3.1. DS1 Signals
        8.4.3.2. E1 Signals
        8.4.3.3. SONET/SDH Signals
        8.4.3.4. DS3/E3
      8.4.4. Synchronous Ethernet
      8.4.5. Clock Source Quality Level Definitions
      8.4.6. Advanced G.781 Features
      8.4.7. IEEE 1588v2 PTP
        8.4.7.1. PTP Clock Synchronization
        8.4.7.2. Performance Considerations
          8.4.7.2.1. Port-Based Timestamping of PTP Messages
        8.4.7.3. PTP Capabilities
        8.4.7.4. PTP Ordinary Slave Clock For Frequency
        8.4.7.5. PTP Ordinary Master Clock For Frequency
        8.4.7.6. PTP Boundary Clock for Frequency and Time
        8.4.7.7. PTP Clock Redundancy
        8.4.7.8. PTP Time for System Time and OAM Time
        8.4.7.9. PTP within Routing Instances
    8.5. System-Wide ATM Parameters
    8.6. QinQ Network Interface Support
    8.7. Link Layer Discovery Protocol (LLDP)
    8.8. IP Hashing as an LSR
    8.9. Satellites
      8.9.1. Ethernet Satellites
      8.9.2. TDM Satellites
      8.9.3. Software Repositories for Satellites
      8.9.4. Satellite Software Upgrade Overview
      8.9.5. Satellite Configuration
        8.9.5.1. Satellite Client Port ID Formats
        8.9.5.2. Local Forwarding
        8.9.5.3. Port Template
        8.9.5.4. 10GE Client Ports
        8.9.5.5. 100GE Client Ports
        8.9.5.6. 10GE Uplinks on the 64x10GE+4x100GE Satellite
        8.9.5.7. Satellite Uplink Resiliency
    8.10. Auto-Provisioning
      8.10.1. Auto-provisioning limits
      8.10.2. Auto-provisioning Process
      8.10.3. Auto-provisioning DHCP Rules
      8.10.4. Auto-provisioning Failure
    8.11. Administrative Tasks
      8.11.1. Saving Configurations
      8.11.2. Specifying Post-Boot Configuration Files
      8.11.3. Network Timing
      8.11.4. Power Supplies
      8.11.5. Automatic Synchronization
        8.11.5.1. Boot-Env Option
        8.11.5.2. Config Option
      8.11.6. Manual Synchronization
        8.11.6.1. Forcing a Switchover
    8.12. System Router Instances
    8.13. System Configuration Process Overview
    8.14. Configuration Notes
      8.14.1. General
    8.15. Configuring System Management with CLI
      8.15.1. Saving Configurations
      8.15.2. Basic System Configuration
      8.15.3. Common Configuration Tasks
        8.15.3.1. System Information
          8.15.3.1.1. System Information Parameters
          8.15.3.1.2. Coordinates
          8.15.3.1.3. System Time Elements
          8.15.3.1.4. ANCP Enhancements
        8.15.3.2. Configuring Synchronization and Redundancy
          8.15.3.2.1. Configuring Persistence
          8.15.3.2.2. Configuring Synchronization
          8.15.3.2.3. Configuring Manual Synchronization
          8.15.3.2.4. Forcing a Switchover
          8.15.3.2.5. Configuring Synchronization Options
        8.15.3.3. Configuring Multi-Chassis Redundancy for LAG
        8.15.3.4. Configuring Power Supply Parameters
        8.15.3.5. Configuring ATM System Parameters
        8.15.3.6. Configuring Backup Copies
        8.15.3.7. Post-Boot Configuration Extension Files
          8.15.3.7.1. Show Command Output and Console Messages
      8.15.4. System Timing
        8.15.4.1. Edit Mode
        8.15.4.2. Configuring Timing References
        8.15.4.3. Using the Revert Command
        8.15.4.4. Other Editing Commands
        8.15.4.5. Forcing a Specific Reference
      8.15.5. Configuring System Monitoring Thresholds
        8.15.5.1. Creating Events
        8.15.5.2. System Alarm Contact Inputs
      8.15.6. Configuring LLDP
    8.16. System Command Reference
      8.16.1. Command Hierarchies
        8.16.1.1. Configuration Commands
        8.16.1.2. System Information Commands
        8.16.1.3. Satellite Commands
        8.16.1.4. System Alarm Contact Input Commands
        8.16.1.5. System Threshold Alarm Commands
        8.16.1.6. System Bluetooth Commands
        8.16.1.7. Persistence Commands
        8.16.1.8. PTP Commands
        8.16.1.9. System Time Commands
        8.16.1.10. Cron Commands
        8.16.1.11. Script Control Commands
        8.16.1.12. System Synchronization Commands
        8.16.1.13. System Administration (Admin) Commands
        8.16.1.14. High Availability (Redundancy) Commands
        8.16.1.15. LLDP System Commands
        8.16.1.16. LLDP Ethernet Port Commands
        8.16.1.17. System Router Instance Commands
      8.16.2. System Command Reference
        8.16.2.1. Generic Commands
        8.16.2.2. System Information Commands
        8.16.2.3. System Alarm Contact Input Commands
        8.16.2.4. System Threshold Alarm Commands
        8.16.2.5. System Bluetooth Commands
        8.16.2.6. Persistence Commands
        8.16.2.7. PTP Commands
        8.16.2.8. Date and Time Commands
        8.16.2.9. Network Time Protocol Commands
          8.16.2.9.1. SNTP Commands
          8.16.2.9.2. System Time Commands
        8.16.2.10. Cron Commands
        8.16.2.11. Script Control Commands
        8.16.2.12. System Synchronization Configuration Commands
        8.16.2.13. System Administration Commands
        8.16.2.14. Redundancy Commands
          8.16.2.14.1. Peer Commands
          8.16.2.14.2. Multi-Chassis Endpoint Commands
          8.16.2.14.3. MC-LAG Commands
        8.16.2.15. LLDP System Commands
        8.16.2.16. LLDP Ethernet Port Commands
        8.16.2.17. System Router Instance Commands
    8.17. Show, Clear, Debug, and Tools Command Reference
      8.17.1. Command Hierarchies
        8.17.1.1. Show Commands
        8.17.1.2. Clear Commands
        8.17.1.3. Debug Commands
        8.17.1.4. Tools Commands
      8.17.2. Command Descriptions
        8.17.2.1. Show Commands
        8.17.2.2. Debug Commands
        8.17.2.3. Tools Commands
        8.17.2.4. Clear Commands
  9. Standards and Protocol Support
  Customer Document and Product Support
Gx AVPs Reference Guide R20.7.R1
  1. Gx AVP
    1.1. In This Section
    1.2. AVPs
      1.2.1. Reserved Keywords in the 7750 SR
      1.2.2. Standard Diameter AVPs
      1.2.3. Standard Diameter AVPs (format)
      1.2.4. NOKIA-Specific AVPs
      1.2.5. NOKIA-Specific AVPs (format)
      1.2.6. Diameter-Based AVP Applicability
      1.2.7. Gx AVP Applicability
      1.2.8. NOKIA-Specific AVP Applicability
      1.2.9. Result Codes (Result-Code AVP)
      1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
      1.2.11. Event Triggers (Event-Trigger AVP)
      1.2.12. Termination Causes (Termination-Cause AVP)
  2. Standards and Protocol Support
  Customer Document and Product Support
  1. Gx AVP
    1.1. In This Section
    1.2. AVPs
      1.2.1. Reserved Keywords in the 7750 SR
      1.2.2. Standard Diameter AVPs
      1.2.3. Standard Diameter AVPs (format)
      1.2.4. NOKIA-Specific AVPs
      1.2.5. NOKIA-Specific AVPs (format)
      1.2.6. Diameter-Based AVP Applicability
      1.2.7. Gx AVP Applicability
      1.2.8. NOKIA-Specific AVP Applicability
      1.2.9. Result Codes (Result-Code AVP)
      1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
      1.2.11. Event Triggers (Event-Trigger AVP)
      1.2.12. Termination Causes (Termination-Cause AVP)
  2. Standards and Protocol Support
  Customer Document and Product Support
Gy AVPs Reference Guide R20.7.R1
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. References
  2. Diameter Gy Interface Specification
    2.1. Diameter Gy – Credit-Control-Request (CCR) command
      2.1.1. Diameter Gy – CCR Message Top Level AVPs
      2.1.2. Diameter Gy – CCR Message Grouped AVPs
        2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
        2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
        2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
        2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
        2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
        2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
        2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
    2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
      2.2.1. Diameter Gy – CCA Message Top Level AVPs
      2.2.2. Diameter Gy – CCA message grouped AVPs
        2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
        2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
        2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
        2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
        2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
    2.3. Diameter Gy – Re-Auth-Request (RAR) Command
      2.3.1. Diameter Gy – RAR Message Format
      2.3.2. Diameter Gy – RAR Message Top Level AVPs
    2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
      2.4.1. Diameter Gy – RAA Message Format
      2.4.2. Diameter Gy – RAA Message Top Level AVPs
    2.5. Diameter Gy – Abort-Session-Request (ASR) Command
      2.5.1. Diameter Gy – ASR Message Format
      2.5.2. Diameter Gy – ASR Message Top Level AVPs
    2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
      2.6.1. Diameter Gy – ASA Message Format
      2.6.2. Diameter Gy – ASA Message Top Level AVPs
  3. Standards and Protocol Support
  Customer Document and Product Support
  1. Preface
    1.1. About This Guide
      1.1.1. Audience
      1.1.2. References
  2. Diameter Gy Interface Specification
    2.1. Diameter Gy – Credit-Control-Request (CCR) command
      2.1.1. Diameter Gy – CCR Message Top Level AVPs
      2.1.2. Diameter Gy – CCR Message Grouped AVPs
        2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
        2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
        2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
        2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
        2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
        2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
        2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
    2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
      2.2.1. Diameter Gy – CCA Message Top Level AVPs
      2.2.2. Diameter Gy – CCA message grouped AVPs
        2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
        2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
        2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
        2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
        2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
    2.3. Diameter Gy – Re-Auth-Request (RAR) Command
      2.3.1. Diameter Gy – RAR Message Format
      2.3.2. Diameter Gy – RAR Message Top Level AVPs
    2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
      2.4.1. Diameter Gy – RAA Message Format
      2.4.2. Diameter Gy – RAA Message Top Level AVPs
    2.5. Diameter Gy – Abort-Session-Request (ASR) Command
      2.5.1. Diameter Gy – ASR Message Format
      2.5.2. Diameter Gy – ASR Message Top Level AVPs
    2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
      2.6.1. Diameter Gy – ASA Message Format
      2.6.2. Diameter Gy – ASA Message Top Level AVPs
  3. Standards and Protocol Support
  Customer Document and Product Support
Interface Configuration Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Interface Configuration Process
  2. Interfaces
    2.1. Configuration Overview
      2.1.1. Chassis Slots and Card Slots
      2.1.2. XIOM Modules
      2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP, MDA-e, and MDA-s Modules
      2.1.4. XMAs/C-XMAs
      2.1.5. Hardware Licensing
      2.1.6. Software License Activation
      2.1.7. Software License Records
      2.1.8. Versatile Service Module (VSM)
      2.1.9. Oversubscribed Ethernet MDAs
        2.1.9.1. Rate Limiting
        2.1.9.2. Packet Classification and Scheduling
      2.1.10. Channelized MDA Support
        2.1.10.1. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        2.1.10.2. Channelized OC-12/STM-4 ASAP MDAs
        2.1.10.3. Channelized DS-3/E-3 ASAP MDA (4-Port)
        2.1.10.4. Channelized DS-3/E-3 ASAP MDA (12-Port)
        2.1.10.5. Channelized OC-3/STM-1 Circuit Emulation Services (CES) MDA
        2.1.10.6. Network Interconnections
    2.2. Digital Diagnostics Monitoring
      2.2.1. SFPs and XFPs
      2.2.2. Statistics Collection
    2.3. Ports
      2.3.1. Port Types
      2.3.2. Port Features
        2.3.2.1. Port State and Operational State
        2.3.2.2. 802.1x Network Access Control
          2.3.2.2.1. 802.1x Modes
          2.3.2.2.2. 802.1x Basics
          2.3.2.2.3. 802.1x Timers
          2.3.2.2.4. 802.1x Tunneling
          2.3.2.2.5. 802.1x Configuration and Limitations
        2.3.2.3. MACsec
          2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
          2.3.2.3.2. MACsec Encryption Mode
          2.3.2.3.3. MACsec Key Management Modes
          2.3.2.3.4. MACsec Terminology
          2.3.2.3.5. MACsec Static CAK
          2.3.2.3.6. SAK Rollover
          2.3.2.3.7. MKA
          2.3.2.3.8.  Pre-shared Key
          2.3.2.3.9. MKA Hello Timer
          2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
          2.3.2.3.11. Key Server
          2.3.2.3.12. SA Limits and Network Design
          2.3.2.3.13. P2P (Switch to Switch) Topology
          2.3.2.3.14. P2MP (Switch to Switch) Topology
          2.3.2.3.15. SA Exhaustion Behavior
          2.3.2.3.16. Clear Tag Mode
          2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
          2.3.2.3.18. EAPoL Destination Address
          2.3.2.3.19. Mirroring Consideration
        2.3.2.4. SONET/SDH Port Attributes
        2.3.2.5. SONET/SDH Path Attributes
        2.3.2.6. Multilink Frame Relay
          2.3.2.6.1. MLFR Bundle Data Plane
          2.3.2.6.2. MLFR Bundle Link Integrity Protocol
        2.3.2.7. FRF.12 End-to-End Fragmentation
          2.3.2.7.1. SAP Fragment Interleaving Option
        2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
        2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
          2.3.2.10.1. Protocol Field (PID)
          2.3.2.10.2. B & E Bits
          2.3.2.10.3. Sequence Number
          2.3.2.10.4. Information Field
          2.3.2.10.5. Padding
          2.3.2.10.6. FCS
          2.3.2.10.7. LCP
          2.3.2.10.8. Link Fragmentation and Interleaving Support
        2.3.2.11. Multi-Class MLPPP
          2.3.2.11.1. QoS in MC-MLPPP
        2.3.2.12. Cisco HDLC
          2.3.2.12.1. SLARP
          2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
          2.3.2.12.3. Timers
        2.3.2.13. Automatic Protection Switching (APS)
          2.3.2.13.1. Single Chassis and Multi-Chassis APS
          2.3.2.13.2. APS Switching Modes
          2.3.2.13.3. APS Channel and SONET Header K Bytes
          2.3.2.13.4. Revertive Switching
          2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
          2.3.2.13.6. Annex B (1+1 Optimized) Operation
          2.3.2.13.7. Protection of Upper Layer Protocols and Services
          2.3.2.13.8. APS User-Initiated Requests
          2.3.2.13.9. APS and SNMP
          2.3.2.13.10. APS Applicability, Restrictions and Interactions
          2.3.2.13.11. Sample APS Applications
        2.3.2.14. Inverse Multiplexing Over ATM (IMA)
          2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
        2.3.2.15. Ethernet Local Management Interface (E-LMI)
        2.3.2.16. Link Layer Discovery Protocol (LLDP)
          2.3.2.16.1. LLDP Protocol Features
        2.3.2.17. Exponential Port Dampening
      2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
    2.4. FP4 Data Path Mapping
    2.5. Port Cross-Connect (PXC)
      2.5.1. PXC Terminology
      2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
        2.5.2.1. Operational State
      2.5.3. PXC Sub-Ports
        2.5.3.1. PXC Sub-Port Operational State
      2.5.4. Port Statistics
        2.5.4.1. Statistics on Physical PXC Ports
      2.5.5. LAG with PXC Ports – PXC LAG
      2.5.6. Basic PXC Provisioning
      2.5.7. QoS
        2.5.7.1. Queue Allocation on PXC Sub-Ports
        2.5.7.2. Pool Allocations on PXC Ports
        2.5.7.3. QoS Summary
      2.5.8. Mirroring and LI on PXC Ports
      2.5.9. Multi-Chassis Redundancy
      2.5.10. Health Monitoring on the PXC Sub-Ports
      2.5.11. Configuration Example
    2.6. Forwarding Path Extensions (FPE)
    2.7. LAG
      2.7.1. LACP
        2.7.1.1. LACP Multiplexing
        2.7.1.2. LACP Tunneling
      2.7.2. Active-Standby LAG Operation
      2.7.3. LAG on Access QoS Consideration
        2.7.3.1. Adapt QoS Modes
        2.7.3.2. Per-fp-ing-queuing
        2.7.3.3. Per-fp-egr-queuing
        2.7.3.4. Per-fp-sap-instance
      2.7.4. LAG and ECMP Hashing
        2.7.4.1. Per Flow Hashing
          2.7.4.1.1. Changing Default Per Flow Hashing Inputs
        2.7.4.2. Per Link Hashing
          2.7.4.2.1. Weighted per-link-hash
        2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
        2.7.4.4. Consistent Per Service Hashing
        2.7.4.5. ESM – LAG Hashing per Vport
          2.7.4.5.1. Background
          2.7.4.5.2. Hashing per Vport
          2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
          2.7.4.5.4. Multicast Consideration
          2.7.4.5.5. VPLS and Capture SAP Considerations
      2.7.5. LAG Hold Down Timers
      2.7.6. BFD over LAG Links
      2.7.7. LAG Port Weight Speed
      2.7.8. LAG Port Hash-Weight
        2.7.8.1. Configurable Hash Weight to Control Flow Distribution
        2.7.8.2. Mixed-speed LAGs
      2.7.9. Multi-Chassis LAG
        2.7.9.1. Overview
        2.7.9.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        2.7.9.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        2.7.9.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
      2.7.10. LAG IGP Cost
    2.8. G.8031 Protected Ethernet Tunnels
    2.9. G.8032 Protected Ethernet Rings
    2.10. Ethernet Port Monitoring
    2.11. 802.3ah OAM
      2.11.1. OAM Events
        2.11.1.1. Link Monitoring
          2.11.1.1.1. Capability Advertising
      2.11.2. Remote Loopback
      2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
        2.11.3.1. 802.3ah Grace Announcement
    2.12. MTU Configuration Guidelines
      2.12.1. Default MTU Values
      2.12.2. Modifying MTU Defaults
      2.12.3. Configuration Example
    2.13. Deploying Preprovisioned Components
    2.14. Setting Fabric Speed
      2.14.1. 7750 SR-7/12/12e and 7450 ESS-7/12
      2.14.2. 7950 XRS-20/20e
    2.15. Versatile Service Module
      2.15.1. VSM-CCA-XP
    2.16. Configuration Process Overview
    2.17. Configuration Notes
    2.18. Configuring Physical Ports with CLI
      2.18.1. Preprovisioning Guidelines
        2.18.1.1. Predefining Entities
        2.18.1.2. Preprovisioning a Port
        2.18.1.3. Maximizing Bandwidth Use
      2.18.2. Basic Configuration
      2.18.3. Common Configuration Tasks
        2.18.3.1. Configuring Cards and MDAs
          2.18.3.1.1. Configuring FP Network Pool Parameters
        2.18.3.2. Configuring Ports
          2.18.3.2.1. Configuring Port Pool Parameters
          2.18.3.2.2. Changing Hybrid-Buffer-Allocation
          2.18.3.2.3. Changing APS Parameters
          2.18.3.2.4. Configuring Ethernet Port Parameters
          2.18.3.2.5. Configuring SONET/SDH Port Parameters
          2.18.3.2.6. Configuring Channelized Ports
          2.18.3.2.7. Configuring Channelized STM1/OC3 Parameters
          2.18.3.2.8. Configuring ATM SAPs
          2.18.3.2.9. Configuring DWDM Port Parameters
          2.18.3.2.10. Configuring WaveTracker Parameters
          2.18.3.2.11. Configuring OTU Port Parameters
          2.18.3.2.12. Configuring ATM Interface Parameters
          2.18.3.2.13. Configuring Frame Relay Parameters
          2.18.3.2.14. Configuring Multilink PPP Bundles
          2.18.3.2.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
          2.18.3.2.16. Multi-Class MLPPP
          2.18.3.2.17. Configuring Bundle Protection Group Ports
          2.18.3.2.18. Configuring LAG Parameters
          2.18.3.2.19. Configuring G.8031 Protected Ethernet Tunnels
          2.18.3.2.20. Configuring Connectors and Connector Ports
    2.19. Service Management Tasks
      2.19.1. Modifying or Deleting an MDA or XMA
      2.19.2. Modifying a Card Type
      2.19.3. Deleting a Card
      2.19.4. Deleting Port Parameters
      2.19.5. Soft IOM Reset
        2.19.5.1. Soft Reset
        2.19.5.2. Deferred MDA Reset
    2.20. Configuration Command Reference
      2.20.1. Command Hierarchies
        2.20.1.1. Card Commands
        2.20.1.2. MDA Commands
        2.20.1.3. XIOM Commands
        2.20.1.4. Power Commands
        2.20.1.5. Virtual Scheduler Commands
        2.20.1.6. Forwarding Plane (FP) Commands
        2.20.1.7. Port Configuration Commands
        2.20.1.8. Port XC Commands
        2.20.1.9. Forwarding Path Extension (FPE) Commands
        2.20.1.10. Port APS Commands
        2.20.1.11. Ethernet Commands
          2.20.1.11.1. Ethernet Access and Network Commands
        2.20.1.12.  HSQ Port Configuration Commands
        2.20.1.13. Interface Group Handler Commands
        2.20.1.14. Multilink Bundle Commands
        2.20.1.15. SONET-SDH Commands
        2.20.1.16. TDM Commands
        2.20.1.17. DS1 Commands
        2.20.1.18. DS3 Commands
        2.20.1.19. E1 Commands
        2.20.1.20. E3 Commands
        2.20.1.21. LAG Commands
        2.20.1.22. MACsec Commands
        2.20.1.23. Ethernet Tunnel Commands
        2.20.1.24. Multi-Chassis Redundancy Commands
        2.20.1.25. Switch Fabric Commands
      2.20.2. Configuration Command Descriptions
        2.20.2.1. Generic Commands
        2.20.2.2. Card Commands
        2.20.2.3. MDA (XMA) Commands
        2.20.2.4. MDA/Port QoS Commands
        2.20.2.5. XIOM Commands
        2.20.2.6. Power Commands
        2.20.2.7. Virtual Scheduler Commands
        2.20.2.8. Forwarding Plane Configuration Commands
        2.20.2.9. MACsec Commands
        2.20.2.10. General Port Commands
        2.20.2.11. Port XC Commands
        2.20.2.12. Forwarding Path Extension (FPE) Commands
        2.20.2.13. APS Commands
        2.20.2.14. Ethernet Port Commands
        2.20.2.15. 802.1x Port Commands
        2.20.2.16. LLDP Port Commands
        2.20.2.17. Network Port Commands
        2.20.2.18. HSQ Port Commands
        2.20.2.19. Interface Group Handler Commands
        2.20.2.20. Multilink-Bundle Port Commands
        2.20.2.21. SONET/SDH Port Commands
        2.20.2.22. SONET/SDH Path Commands
        2.20.2.23. ATM Interface Commands
        2.20.2.24. Frame Relay Commands
        2.20.2.25. TDM Commands
        2.20.2.26. LAG Commands
        2.20.2.27. Eth Tunnel Commands
        2.20.2.28. ETH-CFM Configuration Commands
        2.20.2.29. Multi-Chassis Redundancy Commands
          2.20.2.29.1. MC Endpoint Commands
          2.20.2.29.2. MC LAG Commands
          2.20.2.29.3. Multi-Chassis Ring Commands
        2.20.2.30. Switch Fabric Commands
        2.20.2.31. Forwarding Plane Tools Commands
    2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
      2.21.1. Command Hierarchies
        2.21.1.1. Show Commands
        2.21.1.2. Monitor Commands
        2.21.1.3. Clear Commands
        2.21.1.4. Debug Commands
        2.21.1.5. Tools Commands
      2.21.2. Command Descriptions
        2.21.2.1. Hardware Show Commands
        2.21.2.2. APS Show Commands
        2.21.2.3. Port Show Commands
        2.21.2.4. Multilink Bundle Show Commands
        2.21.2.5. LAG Show Commands
        2.21.2.6. Licensing Show Command
        2.21.2.7. MACsec Show Commands
        2.21.2.8. Monitor Commands
        2.21.2.9. Clear Commands
        2.21.2.10. Tools Commands
        2.21.2.11. Debug Commands
  3. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Interface Configuration Process
  2. Interfaces
    2.1. Configuration Overview
      2.1.1. Chassis Slots and Card Slots
      2.1.2. XIOM Modules
      2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP, MDA-e, and MDA-s Modules
      2.1.4. XMAs/C-XMAs
      2.1.5. Hardware Licensing
      2.1.6. Software License Activation
      2.1.7. Software License Records
      2.1.8. Versatile Service Module (VSM)
      2.1.9. Oversubscribed Ethernet MDAs
        2.1.9.1. Rate Limiting
        2.1.9.2. Packet Classification and Scheduling
      2.1.10. Channelized MDA Support
        2.1.10.1. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        2.1.10.2. Channelized OC-12/STM-4 ASAP MDAs
        2.1.10.3. Channelized DS-3/E-3 ASAP MDA (4-Port)
        2.1.10.4. Channelized DS-3/E-3 ASAP MDA (12-Port)
        2.1.10.5. Channelized OC-3/STM-1 Circuit Emulation Services (CES) MDA
        2.1.10.6. Network Interconnections
    2.2. Digital Diagnostics Monitoring
      2.2.1. SFPs and XFPs
      2.2.2. Statistics Collection
    2.3. Ports
      2.3.1. Port Types
      2.3.2. Port Features
        2.3.2.1. Port State and Operational State
        2.3.2.2. 802.1x Network Access Control
          2.3.2.2.1. 802.1x Modes
          2.3.2.2.2. 802.1x Basics
          2.3.2.2.3. 802.1x Timers
          2.3.2.2.4. 802.1x Tunneling
          2.3.2.2.5. 802.1x Configuration and Limitations
        2.3.2.3. MACsec
          2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
          2.3.2.3.2. MACsec Encryption Mode
          2.3.2.3.3. MACsec Key Management Modes
          2.3.2.3.4. MACsec Terminology
          2.3.2.3.5. MACsec Static CAK
          2.3.2.3.6. SAK Rollover
          2.3.2.3.7. MKA
          2.3.2.3.8.  Pre-shared Key
          2.3.2.3.9. MKA Hello Timer
          2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
          2.3.2.3.11. Key Server
          2.3.2.3.12. SA Limits and Network Design
          2.3.2.3.13. P2P (Switch to Switch) Topology
          2.3.2.3.14. P2MP (Switch to Switch) Topology
          2.3.2.3.15. SA Exhaustion Behavior
          2.3.2.3.16. Clear Tag Mode
          2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
          2.3.2.3.18. EAPoL Destination Address
          2.3.2.3.19. Mirroring Consideration
        2.3.2.4. SONET/SDH Port Attributes
        2.3.2.5. SONET/SDH Path Attributes
        2.3.2.6. Multilink Frame Relay
          2.3.2.6.1. MLFR Bundle Data Plane
          2.3.2.6.2. MLFR Bundle Link Integrity Protocol
        2.3.2.7. FRF.12 End-to-End Fragmentation
          2.3.2.7.1. SAP Fragment Interleaving Option
        2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
        2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
          2.3.2.10.1. Protocol Field (PID)
          2.3.2.10.2. B & E Bits
          2.3.2.10.3. Sequence Number
          2.3.2.10.4. Information Field
          2.3.2.10.5. Padding
          2.3.2.10.6. FCS
          2.3.2.10.7. LCP
          2.3.2.10.8. Link Fragmentation and Interleaving Support
        2.3.2.11. Multi-Class MLPPP
          2.3.2.11.1. QoS in MC-MLPPP
        2.3.2.12. Cisco HDLC
          2.3.2.12.1. SLARP
          2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
          2.3.2.12.3. Timers
        2.3.2.13. Automatic Protection Switching (APS)
          2.3.2.13.1. Single Chassis and Multi-Chassis APS
          2.3.2.13.2. APS Switching Modes
          2.3.2.13.3. APS Channel and SONET Header K Bytes
          2.3.2.13.4. Revertive Switching
          2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
          2.3.2.13.6. Annex B (1+1 Optimized) Operation
          2.3.2.13.7. Protection of Upper Layer Protocols and Services
          2.3.2.13.8. APS User-Initiated Requests
          2.3.2.13.9. APS and SNMP
          2.3.2.13.10. APS Applicability, Restrictions and Interactions
          2.3.2.13.11. Sample APS Applications
        2.3.2.14. Inverse Multiplexing Over ATM (IMA)
          2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
        2.3.2.15. Ethernet Local Management Interface (E-LMI)
        2.3.2.16. Link Layer Discovery Protocol (LLDP)
          2.3.2.16.1. LLDP Protocol Features
        2.3.2.17. Exponential Port Dampening
      2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
    2.4. FP4 Data Path Mapping
    2.5. Port Cross-Connect (PXC)
      2.5.1. PXC Terminology
      2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
        2.5.2.1. Operational State
      2.5.3. PXC Sub-Ports
        2.5.3.1. PXC Sub-Port Operational State
      2.5.4. Port Statistics
        2.5.4.1. Statistics on Physical PXC Ports
      2.5.5. LAG with PXC Ports – PXC LAG
      2.5.6. Basic PXC Provisioning
      2.5.7. QoS
        2.5.7.1. Queue Allocation on PXC Sub-Ports
        2.5.7.2. Pool Allocations on PXC Ports
        2.5.7.3. QoS Summary
      2.5.8. Mirroring and LI on PXC Ports
      2.5.9. Multi-Chassis Redundancy
      2.5.10. Health Monitoring on the PXC Sub-Ports
      2.5.11. Configuration Example
    2.6. Forwarding Path Extensions (FPE)
    2.7. LAG
      2.7.1. LACP
        2.7.1.1. LACP Multiplexing
        2.7.1.2. LACP Tunneling
      2.7.2. Active-Standby LAG Operation
      2.7.3. LAG on Access QoS Consideration
        2.7.3.1. Adapt QoS Modes
        2.7.3.2. Per-fp-ing-queuing
        2.7.3.3. Per-fp-egr-queuing
        2.7.3.4. Per-fp-sap-instance
      2.7.4. LAG and ECMP Hashing
        2.7.4.1. Per Flow Hashing
          2.7.4.1.1. Changing Default Per Flow Hashing Inputs
        2.7.4.2. Per Link Hashing
          2.7.4.2.1. Weighted per-link-hash
        2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
        2.7.4.4. Consistent Per Service Hashing
        2.7.4.5. ESM – LAG Hashing per Vport
          2.7.4.5.1. Background
          2.7.4.5.2. Hashing per Vport
          2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
          2.7.4.5.4. Multicast Consideration
          2.7.4.5.5. VPLS and Capture SAP Considerations
      2.7.5. LAG Hold Down Timers
      2.7.6. BFD over LAG Links
      2.7.7. LAG Port Weight Speed
      2.7.8. LAG Port Hash-Weight
        2.7.8.1. Configurable Hash Weight to Control Flow Distribution
        2.7.8.2. Mixed-speed LAGs
      2.7.9. Multi-Chassis LAG
        2.7.9.1. Overview
        2.7.9.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        2.7.9.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        2.7.9.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
      2.7.10. LAG IGP Cost
    2.8. G.8031 Protected Ethernet Tunnels
    2.9. G.8032 Protected Ethernet Rings
    2.10. Ethernet Port Monitoring
    2.11. 802.3ah OAM
      2.11.1. OAM Events
        2.11.1.1. Link Monitoring
          2.11.1.1.1. Capability Advertising
      2.11.2. Remote Loopback
      2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
        2.11.3.1. 802.3ah Grace Announcement
    2.12. MTU Configuration Guidelines
      2.12.1. Default MTU Values
      2.12.2. Modifying MTU Defaults
      2.12.3. Configuration Example
    2.13. Deploying Preprovisioned Components
    2.14. Setting Fabric Speed
      2.14.1. 7750 SR-7/12/12e and 7450 ESS-7/12
      2.14.2. 7950 XRS-20/20e
    2.15. Versatile Service Module
      2.15.1. VSM-CCA-XP
    2.16. Configuration Process Overview
    2.17. Configuration Notes
    2.18. Configuring Physical Ports with CLI
      2.18.1. Preprovisioning Guidelines
        2.18.1.1. Predefining Entities
        2.18.1.2. Preprovisioning a Port
        2.18.1.3. Maximizing Bandwidth Use
      2.18.2. Basic Configuration
      2.18.3. Common Configuration Tasks
        2.18.3.1. Configuring Cards and MDAs
          2.18.3.1.1. Configuring FP Network Pool Parameters
        2.18.3.2. Configuring Ports
          2.18.3.2.1. Configuring Port Pool Parameters
          2.18.3.2.2. Changing Hybrid-Buffer-Allocation
          2.18.3.2.3. Changing APS Parameters
          2.18.3.2.4. Configuring Ethernet Port Parameters
          2.18.3.2.5. Configuring SONET/SDH Port Parameters
          2.18.3.2.6. Configuring Channelized Ports
          2.18.3.2.7. Configuring Channelized STM1/OC3 Parameters
          2.18.3.2.8. Configuring ATM SAPs
          2.18.3.2.9. Configuring DWDM Port Parameters
          2.18.3.2.10. Configuring WaveTracker Parameters
          2.18.3.2.11. Configuring OTU Port Parameters
          2.18.3.2.12. Configuring ATM Interface Parameters
          2.18.3.2.13. Configuring Frame Relay Parameters
          2.18.3.2.14. Configuring Multilink PPP Bundles
          2.18.3.2.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
          2.18.3.2.16. Multi-Class MLPPP
          2.18.3.2.17. Configuring Bundle Protection Group Ports
          2.18.3.2.18. Configuring LAG Parameters
          2.18.3.2.19. Configuring G.8031 Protected Ethernet Tunnels
          2.18.3.2.20. Configuring Connectors and Connector Ports
    2.19. Service Management Tasks
      2.19.1. Modifying or Deleting an MDA or XMA
      2.19.2. Modifying a Card Type
      2.19.3. Deleting a Card
      2.19.4. Deleting Port Parameters
      2.19.5. Soft IOM Reset
        2.19.5.1. Soft Reset
        2.19.5.2. Deferred MDA Reset
    2.20. Configuration Command Reference
      2.20.1. Command Hierarchies
        2.20.1.1. Card Commands
        2.20.1.2. MDA Commands
        2.20.1.3. XIOM Commands
        2.20.1.4. Power Commands
        2.20.1.5. Virtual Scheduler Commands
        2.20.1.6. Forwarding Plane (FP) Commands
        2.20.1.7. Port Configuration Commands
        2.20.1.8. Port XC Commands
        2.20.1.9. Forwarding Path Extension (FPE) Commands
        2.20.1.10. Port APS Commands
        2.20.1.11. Ethernet Commands
          2.20.1.11.1. Ethernet Access and Network Commands
        2.20.1.12.  HSQ Port Configuration Commands
        2.20.1.13. Interface Group Handler Commands
        2.20.1.14. Multilink Bundle Commands
        2.20.1.15. SONET-SDH Commands
        2.20.1.16. TDM Commands
        2.20.1.17. DS1 Commands
        2.20.1.18. DS3 Commands
        2.20.1.19. E1 Commands
        2.20.1.20. E3 Commands
        2.20.1.21. LAG Commands
        2.20.1.22. MACsec Commands
        2.20.1.23. Ethernet Tunnel Commands
        2.20.1.24. Multi-Chassis Redundancy Commands
        2.20.1.25. Switch Fabric Commands
      2.20.2. Configuration Command Descriptions
        2.20.2.1. Generic Commands
        2.20.2.2. Card Commands
        2.20.2.3. MDA (XMA) Commands
        2.20.2.4. MDA/Port QoS Commands
        2.20.2.5. XIOM Commands
        2.20.2.6. Power Commands
        2.20.2.7. Virtual Scheduler Commands
        2.20.2.8. Forwarding Plane Configuration Commands
        2.20.2.9. MACsec Commands
        2.20.2.10. General Port Commands
        2.20.2.11. Port XC Commands
        2.20.2.12. Forwarding Path Extension (FPE) Commands
        2.20.2.13. APS Commands
        2.20.2.14. Ethernet Port Commands
        2.20.2.15. 802.1x Port Commands
        2.20.2.16. LLDP Port Commands
        2.20.2.17. Network Port Commands
        2.20.2.18. HSQ Port Commands
        2.20.2.19. Interface Group Handler Commands
        2.20.2.20. Multilink-Bundle Port Commands
        2.20.2.21. SONET/SDH Port Commands
        2.20.2.22. SONET/SDH Path Commands
        2.20.2.23. ATM Interface Commands
        2.20.2.24. Frame Relay Commands
        2.20.2.25. TDM Commands
        2.20.2.26. LAG Commands
        2.20.2.27. Eth Tunnel Commands
        2.20.2.28. ETH-CFM Configuration Commands
        2.20.2.29. Multi-Chassis Redundancy Commands
          2.20.2.29.1. MC Endpoint Commands
          2.20.2.29.2. MC LAG Commands
          2.20.2.29.3. Multi-Chassis Ring Commands
        2.20.2.30. Switch Fabric Commands
        2.20.2.31. Forwarding Plane Tools Commands
    2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
      2.21.1. Command Hierarchies
        2.21.1.1. Show Commands
        2.21.1.2. Monitor Commands
        2.21.1.3. Clear Commands
        2.21.1.4. Debug Commands
        2.21.1.5. Tools Commands
      2.21.2. Command Descriptions
        2.21.2.1. Hardware Show Commands
        2.21.2.2. APS Show Commands
        2.21.2.3. Port Show Commands
        2.21.2.4. Multilink Bundle Show Commands
        2.21.2.5. LAG Show Commands
        2.21.2.6. Licensing Show Command
        2.21.2.7. MACsec Show Commands
        2.21.2.8. Monitor Commands
        2.21.2.9. Clear Commands
        2.21.2.10. Tools Commands
        2.21.2.11. Debug Commands
  3. Standards and Protocol Support
  Customer Document and Product Support
Layer 2 Services and EVPN Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 2 Services and EVPN Configuration Process
  2. VLL Services
    2.1. ATM VLL Services
      2.1.1. Apipe For End-to-End ATM Service
      2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
      2.1.3. Traffic Management Support
        2.1.3.1. Ingress Network Classification
        2.1.3.2. Ingress Queuing and Shaping on the IOM
        2.1.3.3. Egress Queuing and Shaping on the IOM
        2.1.3.4. Egress Shaping/Scheduling
    2.2. Circuit Emulation Services
      2.2.1. Mobile Infrastructure
      2.2.2. Circuit Emulation Modes
      2.2.3. Circuit Emulation Parameters
        2.2.3.1. Circuit Emulation Modes
        2.2.3.2. Absolute Mode Option
        2.2.3.3. Payload Size
        2.2.3.4. Jitter Buffer
        2.2.3.5. CES Circuit Operation
      2.2.4. Services for Transporting CES Circuits
      2.2.5. Network Synchronization Considerations
      2.2.6. Cpipe Payload
    2.3. Ethernet Pipe Services
      2.3.1. Epipe Service Overview
      2.3.2. Epipe Service Pseudowire VLAN Tag Processing
      2.3.3. Epipe Up Operational State Configuration Option
      2.3.4. Epipe with PBB
      2.3.5. Epipe over L2TPv3
      2.3.6. Ethernet Interworking VLL
      2.3.7. VLL CAC
      2.3.8. MC-Ring and VLL
    2.4. Frame Relay VLL Services
      2.4.1. Frame Relay VLL
      2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
      2.4.3. Traffic Management Support
        2.4.3.1. Frame Relay Traffic Management
        2.4.3.2. Ingress SAP Classification and Marking
        2.4.3.3. Egress Network EXP Marking
        2.4.3.4. Ingress Network Classification
    2.5. IP Interworking VLL Services
      2.5.1. Ipipe VLL
      2.5.2. IP Interworking VLL Datapath
      2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
        2.5.3.1. VLL Ethernet SAP Processes
          2.5.3.1.1. VLL FR SAP Procedures
          2.5.3.1.2. VLL ATM SAP Procedures
          2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      2.5.4. IPv6 Support on IP Interworking VLL
        2.5.4.1. IPv6 Datapath Operation
        2.5.4.2. IPv6 Stack Capability Signaling
    2.6. Services Configuration for MPLS-TP
      2.6.1. MPLS-TP SDPs
      2.6.2. VLL Spoke SDP Configuration
        2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
      2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
        2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
        2.6.3.2. Lock PW Endpoint Model
        2.6.3.3. PW Redundancy and Lock Instruct and Loopback
        2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
        2.6.3.5. Configuring an Administrative Lock
        2.6.3.6. Configuring a Loopback
      2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
    2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      2.7.1. VCCV BFD Support
      2.7.2. VCCV BFD Encapsulation on a Pseudowire
      2.7.3. BFD Session Operation
      2.7.4. Configuring VCCV BFD
    2.8. Pseudowire Switching
      2.8.1. Pseudowire Switching with Protection
      2.8.2. Pseudowire Switching Behavior
        2.8.2.1. Pseudowire Switching TLV
        2.8.2.2. Pseudowire Switching Point Sub-TLVs
      2.8.3. Static-to-Dynamic Pseudowire Switching
      2.8.4. Ingress VLAN Swapping
        2.8.4.1. Ingress VLAN Translation
      2.8.5. Pseudowire Redundancy
      2.8.6. Dynamic Multi-Segment Pseudowire Routing
        2.8.6.1. Overview
        2.8.6.2. Pseudowire Routing
          2.8.6.2.1. Static Routing
          2.8.6.2.2. Explicit Paths
        2.8.6.3. Configuring VLLs using Dynamic MS-PWs
          2.8.6.3.1. Active/Passive T-PE Selection
          2.8.6.3.2. Automatic Endpoint Configuration
          2.8.6.3.3. Selecting a Path for an MS-PW
          2.8.6.3.4. Pseudowire Templates
        2.8.6.4. Pseudowire Redundancy
        2.8.6.5. VCCV OAM for Dynamic MS-PWs
        2.8.6.6. VCCV-Ping on Dynamic MS-PWs
        2.8.6.7. VCCV-Trace on Dynamic MS-PWs
      2.8.7. Example Dynamic MS-PW Configuration
      2.8.8. VLL Resilience with Two Destination PE Nodes
        2.8.8.1. Master-Slave Operation
          2.8.8.1.1. Interaction with SAP-Specific OAM
          2.8.8.1.2. Local Rules at Slave VLL PE
          2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
      2.8.9. Pseudowire SAPs
      2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
        2.8.10.1. Operational Overview
        2.8.10.2. Detailed Operation
          2.8.10.2.1. Sample Operation of G.8031 BGP-MH
        2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
        2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
        2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
          2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
          2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
          2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
      2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      2.8.12. VLL Resilience for a Switched Pseudowire Path
    2.9. Pseudowire Redundancy Service Models
      2.9.1. Redundant VLL Service Model
      2.9.2. T-LDP Status Notification Handling Rules
        2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
        2.9.2.2. Processing and Merging
    2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      2.10.1. Primary Spoke SDP Fallback to Secondary SAP
      2.10.2. Reversion to Primary Spoke SDP Path
      2.10.3. MC-APS and MC-LAG
        2.10.3.1. Failure Scenario
    2.11. VLL Using G.8031 Protected Ethernet Tunnels
    2.12. MPLS Entropy Label and Hash Label
    2.13. BGP Virtual Private Wire Service (VPWS)
      2.13.1. Single-Homed BGP VPWS
      2.13.2. Dual-Homed BGP VPWS
        2.13.2.1. Single Pseudowire Example
        2.13.2.2. Active/Standby Pseudowire Example
      2.13.3. BGP VPWS Pseudowire Switching
        2.13.3.1. Pseudowire Signaling
        2.13.3.2. BGP-VPWS with Inter-AS Model C
        2.13.3.3. BGP VPWS Configuration Procedure
        2.13.3.4. Use of Pseudowire Template for BGP VPWS
        2.13.3.5. Use of Endpoint for BGP VPWS
    2.14. VLL Service Considerations
      2.14.1. SDPs
        2.14.1.1. SDP Statistics for VPLS and VLL Services
      2.14.2. SAP Encapsulations and Pseudowire Types
        2.14.2.1. PWE3 N-to-1 Cell Mode
        2.14.2.2. PWE3 AAL5 SDU Mode
        2.14.2.3. QoS Policies
        2.14.2.4. Filter Policies
        2.14.2.5. MAC Resources
    2.15. Configuring a VLL Service with CLI
      2.15.1. Common Configuration Tasks
      2.15.2. Configuring VLL Components
        2.15.2.1. Creating an Apipe Service
          2.15.2.1.1. Configuring Basic Apipe SAP Parameters
          2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          2.15.2.1.3. Configuring Apipe SDP Bindings
        2.15.2.2. Creating a Cpipe Service
          2.15.2.2.1. Basic Configuration
          2.15.2.2.2. Configuration Requirements
          2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
        2.15.2.3. Creating an Epipe Service
          2.15.2.3.1. Configuring Epipe SAP Parameters
          2.15.2.3.2. Distributed Epipe SAPs
          2.15.2.3.3. Configuring SDP Bindings
        2.15.2.4. Creating an Fpipe Service
          2.15.2.4.1. Configuring Fpipe SAP Parameters
          2.15.2.4.2. Configuring Fpipe SDP Bindings
        2.15.2.5. Creating an Ipipe Service
          2.15.2.5.1. Configuring Ipipe SAP Parameters
          2.15.2.5.2. Configuring Ipipe SDP Bindings
      2.15.3. Using Spoke-SDP Control Words
      2.15.4. Same-Fate Epipe VLANs Access Protection
      2.15.5. Pseudowire Configuration Notes
      2.15.6. Configuring Two VLL Paths Terminating on T-PE2
      2.15.7. Configuring VLL Resilience
      2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
      2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
        2.15.9.1. Single-Homed BGP VPWS
        2.15.9.2. Dual-Homed BGP VPWS
    2.16. Service Management Tasks
      2.16.1. Modifying Apipe Service Parameters
      2.16.2. Disabling an Apipe Service
      2.16.3. Re-enabling an Apipe Service
      2.16.4. Deleting an Apipe Service
      2.16.5. Modifying a Cpipe Service
      2.16.6. Deleting a Cpipe Service
      2.16.7. Modifying Epipe Service Parameters
      2.16.8. Disabling an Epipe Service
      2.16.9. Re-enabling an Epipe Service
      2.16.10. Deleting an Epipe Service
      2.16.11. Modifying Fpipe Service Parameters
      2.16.12. Disabling an Fpipe Service
      2.16.13. Re-enabling an Fpipe Service
      2.16.14. Deleting an Fpipe Service
      2.16.15. Modifying Ipipe Service Parameters
      2.16.16. Disabling an Ipipe Service
      2.16.17. Re-enabling an Ipipe Service
      2.16.18. Deleting an Ipipe Service
    2.17. VLL Service Configuration Command Reference
      2.17.1. Command Hierarchies
        2.17.1.1. Apipe Service Configuration Commands
          2.17.1.1.1. Apipe Global Commands
          2.17.1.1.2. Apipe SAP Commands
          2.17.1.1.3. Apipe Spoke-SDP Commands
        2.17.1.2. Related Apipe Commands
          2.17.1.2.1. Connection Profile Commands
        2.17.1.3. Cpipe Service Configuration Commands
          2.17.1.3.1. Cpipe Global Commands
          2.17.1.3.2. Cpipe SAP Commands
          2.17.1.3.3. Cpipe Spoke-SDP Commands
        2.17.1.4. Epipe Service Configuration Commands
          2.17.1.4.1. Epipe Global Commands
          2.17.1.4.2. Epipe SAP Configuration Commands
          2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
          2.17.1.4.4. Epipe SAP Template Commands
        2.17.1.5. Fpipe Service Configuration Commands
          2.17.1.5.1. Fpipe Global Commands
          2.17.1.5.2. Fpipe SAP Commands
          2.17.1.5.3. Fpipe Spoke-SDP Commands
        2.17.1.6. Ipipe Service Configuration Commands
          2.17.1.6.1. Ipipe Global Commands
          2.17.1.6.2. Ipipe SAP Commands
          2.17.1.6.3. Ipipe Spoke-SDP Commands
      2.17.2. Command Descriptions
        2.17.2.1. Generic Commands
        2.17.2.2. VLL Global Service Commands
        2.17.2.3. Service Configuration Commands
        2.17.2.4. Service SAP Commands
        2.17.2.5. Service Spoke-SDP Commands
        2.17.2.6. Related Apipe Commands
          2.17.2.6.1. Connection Profile Commands
        2.17.2.7. Epipe Global Commands
        2.17.2.8. Epipe SAP Template Commands
        2.17.2.9. Ipipe Global Commands
        2.17.2.10. Circuit Emulation Commands
        2.17.2.11. ETH-CFM Service Commands
        2.17.2.12. Service Filter and QoS Policy Commands
        2.17.2.13. VLL Frame Relay Commands
        2.17.2.14. ATM Commands
    2.18. VLL Show Command Reference
      2.18.1. Command Hierarchies
        2.18.1.1. Show Commands
        2.18.1.2. Clear Commands
        2.18.1.3. Debug Commands
        2.18.1.4. Tools Commands
      2.18.2. Command Descriptions
        2.18.2.1. VLL Show Commands
        2.18.2.2. VLL Clear Commands
        2.18.2.3. VLL Debug Commands
        2.18.2.4. VLL Tools Commands
  3. Virtual Private LAN Service
    3.1. VPLS Service Overview
      3.1.1. VPLS Packet Walkthrough
    3.2. VPLS Features
      3.2.1. VPLS Enhancements
      3.2.2. VPLS over MPLS
      3.2.3. VPLS Service Pseudowire VLAN Tag Processing
      3.2.4. VPLS MAC Learning and Packet Forwarding
        3.2.4.1. MAC Learning Protection
        3.2.4.2. DEI in IEEE 802.1ad
      3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
      3.2.6. Pseudowire Control Word
      3.2.7. Table Management
        3.2.7.1. Selective MAC Address Learning
          3.2.7.1.1. Example Operational Information
        3.2.7.2. System FDB Size
        3.2.7.3. Per-VPLS Service FDB Size
        3.2.7.4. System FDB Size Alarms
        3.2.7.5. Line Card FDB Size Alarms
        3.2.7.6. Per VPLS FDB Size Alarms
        3.2.7.7. Local and Remote Aging Timers
        3.2.7.8. Disable MAC Aging
        3.2.7.9. Disable MAC Learning
        3.2.7.10. Unknown MAC Discard
        3.2.7.11. VPLS and Rate Limiting
        3.2.7.12. MAC Move
        3.2.7.13. Auto-Learn MAC Protect
          3.2.7.13.1. Operation
      3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      3.2.9. VPLS and Spanning Tree Protocol
        3.2.9.1. Spanning Tree Operating Modes
        3.2.9.2. Multiple Spanning Tree
          3.2.9.2.1. Redundancy Access to VPLS
        3.2.9.3. MSTP for QinQ SAPs
        3.2.9.4. Provider MSTP
          3.2.9.4.1. MSTP General Principles
          3.2.9.4.2. MSTP in the SR-series Platform
        3.2.9.5. Enhancements to the Spanning Tree Protocol
          3.2.9.5.1. L2PT Termination
          3.2.9.5.2. BPDU Translation
          3.2.9.5.3. L2PT and BPDU Translation
      3.2.10. VPLS Redundancy
        3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
        3.2.10.2. Spoke SDP Based Redundant Access
        3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          3.2.10.3.1. Fast Detection of Peer Failure using BFD
          3.2.10.3.2. MC-EP Passive Mode
        3.2.10.4. Support for Single Chassis Endpoint Mechanisms
          3.2.10.4.1. MAC Flush Support in MC-EP
          3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
          3.2.10.4.3. Support for Force Spoke SDP in MC-EP
          3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
        3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
        3.2.10.6. MAC Flush Additions for PBB VPLS
      3.2.11. VPLS Access Redundancy
        3.2.11.1. STP-based Redundant Access to VPLS
        3.2.11.2. Redundant Access to VPLS Without STP
      3.2.12. Object Grouping and State Monitoring
        3.2.12.1. VPLS Applicability — Block on VPLS a Failure
      3.2.13. MAC Flush Message Processing
        3.2.13.1. Dual Homing to a VPLS Service
        3.2.13.2. MC-Ring and VPLS
      3.2.14. ACL Next-Hop for VPLS
      3.2.15. SDP Statistics for VPLS and VLL Services
      3.2.16. BGP Auto-Discovery for LDP VPLS
        3.2.16.1. BGP AD Overview
        3.2.16.2. Information Model
        3.2.16.3. FEC Element for T-LDP Signaling
        3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
        3.2.16.5. SDP Usage
        3.2.16.6. Automatic Creation of SDPs
        3.2.16.7. Manually Provisioned SDP
        3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
        3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        3.2.16.10. Resiliency Schemes
      3.2.17. BGP VPLS
        3.2.17.1. Pseudowire Signaling Details
        3.2.17.2. Supported VPLS Features
      3.2.18. VCCV BFD Support for VPLS Services
      3.2.19. BGP Multi-Homing for VPLS
        3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
        3.2.19.2. Supported Services and Multi-Homing Objects
        3.2.19.3. Blackhole Avoidance
          3.2.19.3.1. MAC Flush to the Core PEs
          3.2.19.3.2. Indicating non-DF status toward the access PE or CE
        3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
      3.2.20. Multicast-Aware VPLS
        3.2.20.1. IGMP Snooping for VPLS
        3.2.20.2. MLD Snooping for VPLS
        3.2.20.3. PIM Snooping for VPLS
          3.2.20.3.1. Plain PIM Snooping
          3.2.20.3.2. PIM Proxy
        3.2.20.4. IPv6 Multicast Forwarding
          3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
          3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
        3.2.20.5. PIM and IGMP/MLD Snooping Interaction
        3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
          3.2.20.6.1. IGMP Snooping Synchronization
          3.2.20.6.2. MLD Snooping Synchronization
          3.2.20.6.3. PIM Snooping for IPv4 Synchronization
        3.2.20.7. VPLS Multicast-Aware High Availability Features
      3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      3.2.22. MPLS Entropy Label and Hash Label
    3.3. Routed VPLS and I-VPLS
      3.3.1. IES or VPRN IP Interface Binding
        3.3.1.1. Assigning a Service Name to a VPLS Service
        3.3.1.2. Service Binding Requirements
        3.3.1.3. Bound Service Name Assignment
        3.3.1.4. Binding a Service Name to an IP Interface
        3.3.1.5. Bound Service Deletion or Service Name Removal
        3.3.1.6. IP Interface Attached VPLS Service Constraints
        3.3.1.7. IP Interface and VPLS Operational State Coordination
      3.3.2. IP Interface MTU and Fragmentation
        3.3.2.1. Unicast IP Routing into a VPLS Service
      3.3.3. ARP and VPLS FDB Interactions
        3.3.3.1. R-VPLS Specific ARP Cache Behavior
      3.3.4. The allow-ip-int-bind VPLS Flag
        3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
        3.3.4.2. LAG Port Membership Constraints
        3.3.4.3. R-VPLS Feature Restrictions
        3.3.4.4. Routed I-VPLS Feature Restrictions
      3.3.5. IPv4 and IPv6 Multicast Routing Support
      3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
      3.3.7. R-VPLS Caveats
        3.3.7.1. VPLS SAP Ingress IP Filter Override
        3.3.7.2. IP Interface Defined Egress QoS Reclassification
        3.3.7.3. Remarking for VPLS and Routed Packets
        3.3.7.4. IPv4 Multicast Routing
        3.3.7.5. R-VPLS Supported Routing-related Protocols
        3.3.7.6. Spanning Tree and Split Horizon
    3.4. VPLS Service Considerations
      3.4.1. SAP Encapsulations
      3.4.2. VLAN Processing
      3.4.3. Ingress VLAN Swapping
      3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
        3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
        3.4.4.3. MVRP Activation of Service Connectivity
        3.4.4.4. MVRP Control Plane
        3.4.4.5. STP-MVRP Interaction
          3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
          3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
      3.4.5. VPLS E-Tree Services
        3.4.5.1. VPLS E-Tree Services Overview
        3.4.5.2. Leaf-ac and Root-ac SAPs
        3.4.5.3. Leaf-ac and Root-ac SDP Binds
        3.4.5.4. Root-leaf-tag SAPs
        3.4.5.5. Root-leaf-tag SDP Binds
        3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
    3.5. Configuring a VPLS Service with CLI
      3.5.1. Basic Configuration
      3.5.2. Common Configuration Tasks
      3.5.3. Configuring VPLS Components
        3.5.3.1. Creating a VPLS Service
        3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
          3.5.3.2.1. Enabling MAC Move
          3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
        3.5.3.3. Configuring GSMP Parameters
        3.5.3.4. Configuring a VPLS SAP
          3.5.3.4.1. Local VPLS SAPs
          3.5.3.4.2. Distributed VPLS SAPs
          3.5.3.4.3. Configuring SAP-Specific STP Parameters
          3.5.3.4.4. STP SAP Operational States
          3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
          3.5.3.4.6. Configuring MAC Learning Protection
        3.5.3.5. Configuring SAP Subscriber Management Parameters
        3.5.3.6. MSTP Control over Ethernet Tunnels
        3.5.3.7. Configuring SDP Bindings
        3.5.3.8. Configuring Overrides on Service SAPs
          3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
          3.5.3.8.2. Spoke-SDP STP Operational States
          3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
      3.5.4. Configuring VPLS Redundancy
        3.5.4.1. Creating a Management VPLS for SAP Protection
        3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
        3.5.4.3. Configuring Load Balancing with Management VPLS
        3.5.4.4. Configuring Selective MAC Flush
        3.5.4.5. Configuring Multi-Chassis Endpoints
      3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
      3.5.6. Configuring BGP Auto-Discovery
        3.5.6.1. Configuration Steps
        3.5.6.2. LDP Signaling
        3.5.6.3. Pseudowire Template
      3.5.7. Configuring BGP VPLS
        3.5.7.1. Configuring a VPLS Management Interface
      3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      3.5.9. Configuring VPLS E-Tree Services
    3.6. Service Management Tasks
      3.6.1. Modifying VPLS Service Parameters
      3.6.2. Modifying Management VPLS Parameters
      3.6.3. Deleting a Management VPLS
      3.6.4. Disabling a Management VPLS
      3.6.5. Deleting a VPLS Service
      3.6.6. Disabling a VPLS Service
      3.6.7. Re-enabling a VPLS Service
    3.7. VPLS Service Configuration Command Reference
      3.7.1. Command Hierarchies
        3.7.1.1. Global Commands
        3.7.1.2. General Switch Management Protocol (GSMP) Commands
        3.7.1.3. BGP Auto-Discovery Commands
        3.7.1.4. Oper Group Commands
        3.7.1.5. SAP Commands
        3.7.1.6. Template Commands
        3.7.1.7. Mesh SDP Commands
        3.7.1.8. Spoke-SDP Commands
        3.7.1.9. Provider Tunnel Commands
        3.7.1.10. Multi-Chassis Redundancy Commands
      3.7.2. Command Descriptions
        3.7.2.1. Generic Commands
        3.7.2.2. VPLS Service Commands
        3.7.2.3. General Switch Management Protocol Commands
          3.7.2.3.1. VPLS DHCP Commands
          3.7.2.3.2. VPLS STP Commands
          3.7.2.3.3. VPLS SAP Commands
          3.7.2.3.4. VPLS SAP ATM Commands
        3.7.2.4. BGP Auto-Discovery Commands
        3.7.2.5. ETH-CFM Service Commands
          3.7.2.5.1. VPLS Filter and QoS Policy Commands
          3.7.2.5.2. VPLS Template Commands
          3.7.2.5.3. Provider Tunnel Commands
          3.7.2.5.4. VPLS SDP Commands
          3.7.2.5.5. SAP Subscriber Management Commands
        3.7.2.6. VPLS Multicast Commands
          3.7.2.6.1. VPLS DHCP and Anti-Spoofing Commands
        3.7.2.7. Redundancy Commands
    3.8. VPLS Show, Clear, Debug, and Tools Command Reference
      3.8.1. Command Hierarchies
        3.8.1.1. Show Commands
          3.8.1.1.1. IGMP Show Commands
          3.8.1.1.2. IGMP Snooping Show Commands
          3.8.1.1.3. MLD Snooping Commands
          3.8.1.1.4. Show Multi-Chassis Endpoint Commands
        3.8.1.2. Clear Commands
        3.8.1.3. Debug Commands
        3.8.1.4. Tools Commands
      3.8.2. Command Descriptions
        3.8.2.1. VPLS Show Commands
        3.8.2.2. IGMP Snooping Show Commands
        3.8.2.3. MLD Snooping Show Commands
        3.8.2.4. IGMP Commands
          3.8.2.4.1. Show Multi-Chassis Endpoint Commands
        3.8.2.5. VPLS Clear Commands
        3.8.2.6. VPLS Debug Commands
        3.8.2.7. Tools Commands
  4. IEEE 802.1ah Provider Backbone Bridging
    4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    4.2. PBB Features
      4.2.1. Integrated PBB-VPLS Solution
      4.2.2. PBB Technology
      4.2.3. PBB Mapping to Existing VPLS Configurations
      4.2.4. SAP and SDP Support
        4.2.4.1. PBB B-VPLS
        4.2.4.2. PBB I-VPLS
      4.2.5. PBB Packet Walkthrough
        4.2.5.1. PBB Control Planes
      4.2.6. Shortest Path Bridging MAC Mode (SPBM)
        4.2.6.1. Flooding and Learning Versus Link State
        4.2.6.2. SPB for B-VPLS
        4.2.6.3. Control B-VPLS and User B-VPLS
        4.2.6.4. Shortest Path and Single Tree
        4.2.6.5. Data Path and Forwarding
        4.2.6.6. SPB Ethernet OAM
        4.2.6.7. SPB Levels
      4.2.7. SPBM to Non-SPBM Interworking
        4.2.7.1. Static MACs and Static ISIDs
        4.2.7.2. Epipe Static Configuration
          4.2.7.2.1. I-VPLS Static Config
        4.2.7.3. SPBM ISID Policies
      4.2.8. ISID Policy Control
        4.2.8.1. Static ISID Advertisement
        4.2.8.2. I-VPLS for Unicast Service
      4.2.9. Default Behaviors
      4.2.10. Example Network Configuration
        4.2.10.1. Sample Configuration for Dut-A
          4.2.10.1.1. Show Commands Outputs
          4.2.10.1.2. Debug Commands
          4.2.10.1.3. Tools Commands
          4.2.10.1.4. Clear Commands
      4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
        4.2.12.1. I-VPLS Changes and Related MMRP Behavior
        4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        4.2.12.3. Optimization for Improved Convergence Time
        4.2.12.4. Controlling MRP Scope using MRP Policies
      4.2.13. PBB and BGP-AD
      4.2.14. PBB E-Line Service
        4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
      4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
        4.2.15.1. Solution Overview
        4.2.15.2. Detailed Solution Description
        4.2.15.3. Detailed PBB Emulated LAG Solution Description
        4.2.15.4. Support Service and Solution Combinations
      4.2.16. Periodic MAC Notification
      4.2.17. MAC Flush
        4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
          4.2.17.1.2. PBB Blackholing Issue
          4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
      4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
        4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
      4.2.19. BGP Multi-homing for I-VPLS
      4.2.20. Access Multi-Homing over MPLS for PBB Epipes
      4.2.21. PBB and IGMP/MLD Snooping
      4.2.22. PBB and PIM Snooping
      4.2.23. PBB QoS
        4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
          4.2.23.1.1. Configuration Examples
          4.2.23.1.2. Details Solution Description
      4.2.24. Egress B-SAP per ISID Shaping
        4.2.24.1. B-SAP Egress ISID Shaping Configuration
        4.2.24.2. Provisioning Model
        4.2.24.3. Egress Queue Scheduling
        4.2.24.4. B-SAP per-ISID Shaping Configuration Example
      4.2.25. PBB OAM
        4.2.25.1. Mirroring
        4.2.25.2. OAM Commands
        4.2.25.3. CFM Support
    4.3. Configuration Examples
      4.3.1. PBB using G.8031 Protected Ethernet Tunnels
      4.3.2. MC-LAG Multi-homing for Native PBB
      4.3.3. Access Multi-Homing over MPLS for PBB Epipes
    4.4. PBB Configuration Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Global Commands
        4.4.1.2. SAP Commands
        4.4.1.3. Mesh SDP Commands
        4.4.1.4. Spoke SDP Commands
        4.4.1.5. BGP-MH for I-VPLS Commands
      4.4.2. Command Descriptions
        4.4.2.1. Global Commands
        4.4.2.2. SAP Commands
        4.4.2.3. BGP-MH for I-VPLS Commands
    4.5. PBB Show, Clear, and Debug Command Reference
      4.5.1. Command Hierarchies
        4.5.1.1. Show Commands
        4.5.1.2. Clear Commands
        4.5.1.3. Debug Commands
      4.5.2. Command Descriptions
        4.5.2.1. PBB Show Commands
        4.5.2.2. PBB Clear Commands
        4.5.2.3. PBB Debug Commands
  5. Ethernet Virtual Private Networks (EVPNs)
    5.1. Overview and EVPN Applications
      5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
      5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
      5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
      5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
      5.1.5. EVPN for MPLS Tunnels in E-LAN Services
      5.1.6. EVPN for MPLS Tunnels in E-Line Services
      5.1.7. EVPN for MPLS Tunnels in E-Tree Services
      5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    5.2. EVPN for VXLAN Tunnels and Cloud Technologies
      5.2.1. VXLAN
        5.2.1.1. VXLAN ECMP and LAG
        5.2.1.2. VXLAN VPLS Tag Handling
        5.2.1.3. VXLAN MTU Considerations
        5.2.1.4. VXLAN QoS
          5.2.1.4.1. Ingress
          5.2.1.4.2. Egress
        5.2.1.5. VXLAN Ping
        5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
        5.2.1.7. IGMP and MLD Snooping on VXLAN
        5.2.1.8. PIM Snooping on VXLAN
        5.2.1.9. Static VXLAN Termination in Epipe Services
        5.2.1.10. Static VXLAN Termination in VPLS/R-VPLS Services
        5.2.1.11. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
      5.2.2. EVPN for Overlay Tunnels
        5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
        5.2.2.2. EVPN for VXLAN in VPLS Services
          5.2.2.2.1. Resiliency and BGP Multi-Homing
          5.2.2.2.2. Use of BGP-EVPN, BGP-AD, and Sites in the Same VPLS Service
          5.2.2.2.3. Use of the unknown-mac-route
        5.2.2.3. EVPN for VXLAN in R-VPLS Services
          5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
        5.2.2.4. EVPN-VPWS for VXLAN Tunnels
          5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
      5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
        5.2.3.1. XMPP Interface on the DC GW
        5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
        5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
          5.2.3.3.1. VSD-Domain Type L2-DOMAIN
          5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
          5.2.3.3.3. VSD-Domain Type VRF-GRE
          5.2.3.3.4. VSD-Domain Type VRF-VXLAN
        5.2.3.4. Fully-Dynamic VSD Integration Model
          5.2.3.4.1. Python Script Implementation Details
          5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
      5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
        5.2.4.1. Replicator (AR-R) Procedures
        5.2.4.2. Leaf (AR-L) procedures
        5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
      5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI
        5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
        5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
      5.2.6. EVPN VXLAN Multihoming
        5.2.6.1. Local Bias for EVPN VXLAN Multihoming
        5.2.6.2. Known Limitations for Local Bias
        5.2.6.3. Non-system IPv4 and IPv6 VXLAN Termination for EVPN VXLAN Multihoming
    5.3. EVPN for MPLS Tunnels
      5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
      5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
        5.3.2.1. EVPN and VPLS Integration
        5.3.2.2. EVPN Single-Active Multi-Homing and BGP-VPLS Integration
        5.3.2.3. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
        5.3.2.4. EVPN Multi-Homing in VPLS Services
          5.3.2.4.1. EVPN All-Active Multi-Homing
          5.3.2.4.2. EVPN Single-Active Multi-Homing
      5.3.3. P2MP mLDP Tunnels for BUM Traffic in EVPN-MPLS Services
      5.3.4. EVPN-VPWS for MPLS Tunnels
        5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
        5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
        5.3.4.3. PW Ports-based ESs for EVPN-VPWS
      5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
        5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
      5.3.6. PBB-EVPN
        5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
          5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
          5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or B-MAC Routes)
          5.3.6.1.3. EVPN Route Type 4 - ES Route
        5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
          5.3.6.2.1. Flood Containment for I-VPLS Services
          5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
          5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
          5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
          5.3.6.2.5. PBB-EVPN ISID-Based C-MAC Flush
          5.3.6.2.6. PBB-EVPN ISID-based Route Targets
      5.3.7. Virtual Ethernet Segments
      5.3.8. Preference-Based and Non-Revertive DF Election
      5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
      5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
        5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
      5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
        5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
      5.3.12. EVPN E-Tree
        5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
        5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
        5.3.12.3. EVPN E-Tree Operation
          5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
          5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
          5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
        5.3.12.4. EVPN E-Tree and EVPN Multi-homing
        5.3.12.5. PBB-EVPN E-Tree Services
      5.3.13. MPLS Entropy Label and Hash Label
      5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
        5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
        5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
      5.3.15. ECMP for EVPN-MPLS Destinations
      5.3.16. IPv6 tunnel resolution for EVPN MPLS Services
      5.3.17. EVPN Multi-Homing Support for MPLS Tunnels Resolved to Non-system IPv4/IPv6 Addresses
    5.4. General EVPN Topics
      5.4.1. ARP/ND Snooping and Proxy Support
        5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
        5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
        5.4.1.3. Procedure to Add the R Flag to a Specified Entry
        5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
      5.4.2. BGP-EVPN MAC-Mobility
      5.4.3. BGP-EVPN MAC-Duplication
      5.4.4. Conditional Static MAC and Protection
      5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
      5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
      5.4.7. Blackhole MAC for EVPN Loop Detection
      5.4.8. CFM Interaction with EVPN Services
      5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS/R-VPLS Service
        5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
        5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
        5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
        5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
          5.4.9.4.1. BGP-EVPN Routes on Dual BGP-Instance Services with I-ES
          5.4.9.4.2. Single-Active Multi-Homing on I-ES
          5.4.9.4.3. All-Active Multi-Homing on I-ES
      5.4.10. Configuring Multi-Instance EVPN-VXLAN in the Same VPLS/R-VPLS Service
        5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
        5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
        5.4.10.3. Interconnect Ethernet-Segment Solution for Dual BGP EVPN VXLAN Instance Services
      5.4.11. Configuring Static VXLAN and EVPN in the Same VPLS/R-VPLS Service
      5.4.12. EVPN IP-Prefix Route Interoperability
        5.4.12.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
        5.4.12.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
        5.4.12.3. Interface-less IP-VRF-to-IP-VRF Model
      5.4.13. ARP-ND Host Routes for Extended Layer 2 Data Centers
      5.4.14. EVPN Host Mobility Procedures within the Same R-VPLS Service
        5.4.14.1. EVPN Host Mobility Configuration
          5.4.14.1.1. Host Mobility Case 1
          5.4.14.1.2. Host Mobility Case 2
          5.4.14.1.3. Host Mobility Case 3
      5.4.15. BGP and EVPN Route Selection for EVPN Routes
      5.4.16. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      5.4.17. Oper-Groups Interaction with EVPN Services
        5.4.17.1. LAG-Based Link Loss Forwarding for EVPN-VPWS Services
        5.4.17.2. Core Isolation Blackhole Avoidance
        5.4.17.3. LAG Standby Signaling to the CE on Non-DF EVPN PEs (Single-Active)
      5.4.18. EVPN Layer-3 Optimized Inter-Subnet Multicast (OISM)
        5.4.18.1. Introduction and Terminology
        5.4.18.2. OISM Forwarding Plane
        5.4.18.3. OISM Control Plane
        5.4.18.4. EVPN OISM and Multi-Homing
        5.4.18.5. EVPN OISM Configuration Guidelines
        5.4.18.6. Use of mLDP in OISM
        5.4.18.7. Example of mLDP in OISM
      5.4.19. Interaction of EVPN and Other Features
        5.4.19.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
        5.4.19.2. Interaction of PBB-EVPN with Existing VPLS Features
        5.4.19.3. Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
      5.4.20. Routing Policies for BGP EVPN Routes
        5.4.20.1. Routing Policies for BGP EVPN IP Prefixes
    5.5. Configuring an EVPN Service with CLI
      5.5.1. EVPN-VXLAN Configuration Examples
        5.5.1.1. Layer 2 PE Example
        5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
        5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      5.5.2. EVPN-MPLS Configuration Examples
        5.5.2.1. EVPN All-active Multi-homing Example
        5.5.2.2. EVPN Single-active Multi-homing Example
      5.5.3. PBB-EVPN Configuration Examples
        5.5.3.1. PBB-EVPN All-active Multi-homing Example
        5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
    5.6. EVPN Command Reference
      5.6.1. Command Hierarchies
        5.6.1.1. EVPN Configuration Commands
          5.6.1.1.1. Epipe Commands
          5.6.1.1.2. VPLS Commands
          5.6.1.1.3. IES/VPRN Commands
          5.6.1.1.4. System Commands
        5.6.1.2. Show Commands
        5.6.1.3. Clear Commands
        5.6.1.4. Debug Commands
        5.6.1.5. Tools Commands
      5.6.2. Command Descriptions
        5.6.2.1. EVPN Configuration Commands
        5.6.2.2. Show Configuration Commands
        5.6.2.3. Clear Commands
        5.6.2.4. Debug Commands
        5.6.2.5. Tools Commands
  6. Pseudowire Ports
    6.1. Overview
    6.2. PW Port Bound to a Physical Port
    6.3. FPE-Based PW Port
      6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
      6.3.2. PXC-Based PW-Port — Building the Cross-Connect
        6.3.2.1. Building the Internal Transport Tunnel
        6.3.2.2. Mapping the External PW to the PW-Port
        6.3.2.3. Terminating the Service on PW-SAP
      6.3.3. FPE-Based PW-port Operational State
      6.3.4. QoS
        6.3.4.1. Preservation of Forwarding Class Across PXC
      6.3.5. Statistics on the FPE based PW-Port
      6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
    6.4. MSS and PW Ports
      6.4.1. Configuration Examples
      6.4.2. Concurrent Scheduling QoS Mechanisms on a PW Port
      6.4.3. Show Command Examples
    6.5. L2oGRE Termination on FPE-Based PW Port
      6.5.1. L2oGRE Packet Format
      6.5.2. GRE Delivery Protocol
      6.5.3. Tracking Payloads and Service Termination Points
        6.5.3.1. Plain L3 termination
        6.5.3.2. Layer 2 Termination
        6.5.3.3. ESM Termination
      6.5.4. Configuration Steps
      6.5.5. Fragmentation and MTU Configuration
      6.5.6. Reassembly
    6.6. Pseudowire Ports Command Reference
      6.6.1. Command Hierarchies
        6.6.1.1. PW Port Configuration Commands
        6.6.1.2. Redundant Interface Commands
        6.6.1.3. Show Commands
      6.6.2. Command Descriptions
        6.6.2.1. PW Port Configuration Commands
        6.6.2.2. SDP Binding Commands
        6.6.2.3. Show Commands
  7. VSR Pseudowire Ports
    7.1. Flex PW Ports
      7.1.1. PW Port List
      7.1.2. Failover Times
      7.1.3. QoS
      7.1.4. PW Port Termination for Various Tunnel Types
        7.1.4.1. MPLS-Based Spoke SDP
          7.1.4.1.1. Provisioning
          7.1.4.1.2. Flex PW-Port Operational State for MPLS Based Spoke SDP
          7.1.4.1.3. Statistics
        7.1.4.2. L2oGRE-Based Spoke SDP
          7.1.4.2.1. Provisioning
          7.1.4.2.2. Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
          7.1.4.2.3. Reassembly
    7.2. VSR Pseudowire Ports Command Reference
      7.2.1. Command Hierarchies
        7.2.1.1. PW Port Configuration Commands
        7.2.1.2. Show Commands
        7.2.1.3. Clear Commands
      7.2.2. Command Descriptions
        7.2.2.1. PW Port Configuration Commands
        7.2.2.2. Show Commands
        7.2.2.3. Clear Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 2 Services and EVPN Configuration Process
  2. VLL Services
    2.1. ATM VLL Services
      2.1.1. Apipe For End-to-End ATM Service
      2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
      2.1.3. Traffic Management Support
        2.1.3.1. Ingress Network Classification
        2.1.3.2. Ingress Queuing and Shaping on the IOM
        2.1.3.3. Egress Queuing and Shaping on the IOM
        2.1.3.4. Egress Shaping/Scheduling
    2.2. Circuit Emulation Services
      2.2.1. Mobile Infrastructure
      2.2.2. Circuit Emulation Modes
      2.2.3. Circuit Emulation Parameters
        2.2.3.1. Circuit Emulation Modes
        2.2.3.2. Absolute Mode Option
        2.2.3.3. Payload Size
        2.2.3.4. Jitter Buffer
        2.2.3.5. CES Circuit Operation
      2.2.4. Services for Transporting CES Circuits
      2.2.5. Network Synchronization Considerations
      2.2.6. Cpipe Payload
    2.3. Ethernet Pipe Services
      2.3.1. Epipe Service Overview
      2.3.2. Epipe Service Pseudowire VLAN Tag Processing
      2.3.3. Epipe Up Operational State Configuration Option
      2.3.4. Epipe with PBB
      2.3.5. Epipe over L2TPv3
      2.3.6. Ethernet Interworking VLL
      2.3.7. VLL CAC
      2.3.8. MC-Ring and VLL
    2.4. Frame Relay VLL Services
      2.4.1. Frame Relay VLL
      2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
      2.4.3. Traffic Management Support
        2.4.3.1. Frame Relay Traffic Management
        2.4.3.2. Ingress SAP Classification and Marking
        2.4.3.3. Egress Network EXP Marking
        2.4.3.4. Ingress Network Classification
    2.5. IP Interworking VLL Services
      2.5.1. Ipipe VLL
      2.5.2. IP Interworking VLL Datapath
      2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
        2.5.3.1. VLL Ethernet SAP Processes
          2.5.3.1.1. VLL FR SAP Procedures
          2.5.3.1.2. VLL ATM SAP Procedures
          2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      2.5.4. IPv6 Support on IP Interworking VLL
        2.5.4.1. IPv6 Datapath Operation
        2.5.4.2. IPv6 Stack Capability Signaling
    2.6. Services Configuration for MPLS-TP
      2.6.1. MPLS-TP SDPs
      2.6.2. VLL Spoke SDP Configuration
        2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
      2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
        2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
        2.6.3.2. Lock PW Endpoint Model
        2.6.3.3. PW Redundancy and Lock Instruct and Loopback
        2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
        2.6.3.5. Configuring an Administrative Lock
        2.6.3.6. Configuring a Loopback
      2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
    2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      2.7.1. VCCV BFD Support
      2.7.2. VCCV BFD Encapsulation on a Pseudowire
      2.7.3. BFD Session Operation
      2.7.4. Configuring VCCV BFD
    2.8. Pseudowire Switching
      2.8.1. Pseudowire Switching with Protection
      2.8.2. Pseudowire Switching Behavior
        2.8.2.1. Pseudowire Switching TLV
        2.8.2.2. Pseudowire Switching Point Sub-TLVs
      2.8.3. Static-to-Dynamic Pseudowire Switching
      2.8.4. Ingress VLAN Swapping
        2.8.4.1. Ingress VLAN Translation
      2.8.5. Pseudowire Redundancy
      2.8.6. Dynamic Multi-Segment Pseudowire Routing
        2.8.6.1. Overview
        2.8.6.2. Pseudowire Routing
          2.8.6.2.1. Static Routing
          2.8.6.2.2. Explicit Paths
        2.8.6.3. Configuring VLLs using Dynamic MS-PWs
          2.8.6.3.1. Active/Passive T-PE Selection
          2.8.6.3.2. Automatic Endpoint Configuration
          2.8.6.3.3. Selecting a Path for an MS-PW
          2.8.6.3.4. Pseudowire Templates
        2.8.6.4. Pseudowire Redundancy
        2.8.6.5. VCCV OAM for Dynamic MS-PWs
        2.8.6.6. VCCV-Ping on Dynamic MS-PWs
        2.8.6.7. VCCV-Trace on Dynamic MS-PWs
      2.8.7. Example Dynamic MS-PW Configuration
      2.8.8. VLL Resilience with Two Destination PE Nodes
        2.8.8.1. Master-Slave Operation
          2.8.8.1.1. Interaction with SAP-Specific OAM
          2.8.8.1.2. Local Rules at Slave VLL PE
          2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
      2.8.9. Pseudowire SAPs
      2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
        2.8.10.1. Operational Overview
        2.8.10.2. Detailed Operation
          2.8.10.2.1. Sample Operation of G.8031 BGP-MH
        2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
        2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
        2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
          2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
          2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
          2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
      2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      2.8.12. VLL Resilience for a Switched Pseudowire Path
    2.9. Pseudowire Redundancy Service Models
      2.9.1. Redundant VLL Service Model
      2.9.2. T-LDP Status Notification Handling Rules
        2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
        2.9.2.2. Processing and Merging
    2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      2.10.1. Primary Spoke SDP Fallback to Secondary SAP
      2.10.2. Reversion to Primary Spoke SDP Path
      2.10.3. MC-APS and MC-LAG
        2.10.3.1. Failure Scenario
    2.11. VLL Using G.8031 Protected Ethernet Tunnels
    2.12. MPLS Entropy Label and Hash Label
    2.13. BGP Virtual Private Wire Service (VPWS)
      2.13.1. Single-Homed BGP VPWS
      2.13.2. Dual-Homed BGP VPWS
        2.13.2.1. Single Pseudowire Example
        2.13.2.2. Active/Standby Pseudowire Example
      2.13.3. BGP VPWS Pseudowire Switching
        2.13.3.1. Pseudowire Signaling
        2.13.3.2. BGP-VPWS with Inter-AS Model C
        2.13.3.3. BGP VPWS Configuration Procedure
        2.13.3.4. Use of Pseudowire Template for BGP VPWS
        2.13.3.5. Use of Endpoint for BGP VPWS
    2.14. VLL Service Considerations
      2.14.1. SDPs
        2.14.1.1. SDP Statistics for VPLS and VLL Services
      2.14.2. SAP Encapsulations and Pseudowire Types
        2.14.2.1. PWE3 N-to-1 Cell Mode
        2.14.2.2. PWE3 AAL5 SDU Mode
        2.14.2.3. QoS Policies
        2.14.2.4. Filter Policies
        2.14.2.5. MAC Resources
    2.15. Configuring a VLL Service with CLI
      2.15.1. Common Configuration Tasks
      2.15.2. Configuring VLL Components
        2.15.2.1. Creating an Apipe Service
          2.15.2.1.1. Configuring Basic Apipe SAP Parameters
          2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          2.15.2.1.3. Configuring Apipe SDP Bindings
        2.15.2.2. Creating a Cpipe Service
          2.15.2.2.1. Basic Configuration
          2.15.2.2.2. Configuration Requirements
          2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
        2.15.2.3. Creating an Epipe Service
          2.15.2.3.1. Configuring Epipe SAP Parameters
          2.15.2.3.2. Distributed Epipe SAPs
          2.15.2.3.3. Configuring SDP Bindings
        2.15.2.4. Creating an Fpipe Service
          2.15.2.4.1. Configuring Fpipe SAP Parameters
          2.15.2.4.2. Configuring Fpipe SDP Bindings
        2.15.2.5. Creating an Ipipe Service
          2.15.2.5.1. Configuring Ipipe SAP Parameters
          2.15.2.5.2. Configuring Ipipe SDP Bindings
      2.15.3. Using Spoke-SDP Control Words
      2.15.4. Same-Fate Epipe VLANs Access Protection
      2.15.5. Pseudowire Configuration Notes
      2.15.6. Configuring Two VLL Paths Terminating on T-PE2
      2.15.7. Configuring VLL Resilience
      2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
      2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
        2.15.9.1. Single-Homed BGP VPWS
        2.15.9.2. Dual-Homed BGP VPWS
    2.16. Service Management Tasks
      2.16.1. Modifying Apipe Service Parameters
      2.16.2. Disabling an Apipe Service
      2.16.3. Re-enabling an Apipe Service
      2.16.4. Deleting an Apipe Service
      2.16.5. Modifying a Cpipe Service
      2.16.6. Deleting a Cpipe Service
      2.16.7. Modifying Epipe Service Parameters
      2.16.8. Disabling an Epipe Service
      2.16.9. Re-enabling an Epipe Service
      2.16.10. Deleting an Epipe Service
      2.16.11. Modifying Fpipe Service Parameters
      2.16.12. Disabling an Fpipe Service
      2.16.13. Re-enabling an Fpipe Service
      2.16.14. Deleting an Fpipe Service
      2.16.15. Modifying Ipipe Service Parameters
      2.16.16. Disabling an Ipipe Service
      2.16.17. Re-enabling an Ipipe Service
      2.16.18. Deleting an Ipipe Service
    2.17. VLL Service Configuration Command Reference
      2.17.1. Command Hierarchies
        2.17.1.1. Apipe Service Configuration Commands
          2.17.1.1.1. Apipe Global Commands
          2.17.1.1.2. Apipe SAP Commands
          2.17.1.1.3. Apipe Spoke-SDP Commands
        2.17.1.2. Related Apipe Commands
          2.17.1.2.1. Connection Profile Commands
        2.17.1.3. Cpipe Service Configuration Commands
          2.17.1.3.1. Cpipe Global Commands
          2.17.1.3.2. Cpipe SAP Commands
          2.17.1.3.3. Cpipe Spoke-SDP Commands
        2.17.1.4. Epipe Service Configuration Commands
          2.17.1.4.1. Epipe Global Commands
          2.17.1.4.2. Epipe SAP Configuration Commands
          2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
          2.17.1.4.4. Epipe SAP Template Commands
        2.17.1.5. Fpipe Service Configuration Commands
          2.17.1.5.1. Fpipe Global Commands
          2.17.1.5.2. Fpipe SAP Commands
          2.17.1.5.3. Fpipe Spoke-SDP Commands
        2.17.1.6. Ipipe Service Configuration Commands
          2.17.1.6.1. Ipipe Global Commands
          2.17.1.6.2. Ipipe SAP Commands
          2.17.1.6.3. Ipipe Spoke-SDP Commands
      2.17.2. Command Descriptions
        2.17.2.1. Generic Commands
        2.17.2.2. VLL Global Service Commands
        2.17.2.3. Service Configuration Commands
        2.17.2.4. Service SAP Commands
        2.17.2.5. Service Spoke-SDP Commands
        2.17.2.6. Related Apipe Commands
          2.17.2.6.1. Connection Profile Commands
        2.17.2.7. Epipe Global Commands
        2.17.2.8. Epipe SAP Template Commands
        2.17.2.9. Ipipe Global Commands
        2.17.2.10. Circuit Emulation Commands
        2.17.2.11. ETH-CFM Service Commands
        2.17.2.12. Service Filter and QoS Policy Commands
        2.17.2.13. VLL Frame Relay Commands
        2.17.2.14. ATM Commands
    2.18. VLL Show Command Reference
      2.18.1. Command Hierarchies
        2.18.1.1. Show Commands
        2.18.1.2. Clear Commands
        2.18.1.3. Debug Commands
        2.18.1.4. Tools Commands
      2.18.2. Command Descriptions
        2.18.2.1. VLL Show Commands
        2.18.2.2. VLL Clear Commands
        2.18.2.3. VLL Debug Commands
        2.18.2.4. VLL Tools Commands
  3. Virtual Private LAN Service
    3.1. VPLS Service Overview
      3.1.1. VPLS Packet Walkthrough
    3.2. VPLS Features
      3.2.1. VPLS Enhancements
      3.2.2. VPLS over MPLS
      3.2.3. VPLS Service Pseudowire VLAN Tag Processing
      3.2.4. VPLS MAC Learning and Packet Forwarding
        3.2.4.1. MAC Learning Protection
        3.2.4.2. DEI in IEEE 802.1ad
      3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
      3.2.6. Pseudowire Control Word
      3.2.7. Table Management
        3.2.7.1. Selective MAC Address Learning
          3.2.7.1.1. Example Operational Information
        3.2.7.2. System FDB Size
        3.2.7.3. Per-VPLS Service FDB Size
        3.2.7.4. System FDB Size Alarms
        3.2.7.5. Line Card FDB Size Alarms
        3.2.7.6. Per VPLS FDB Size Alarms
        3.2.7.7. Local and Remote Aging Timers
        3.2.7.8. Disable MAC Aging
        3.2.7.9. Disable MAC Learning
        3.2.7.10. Unknown MAC Discard
        3.2.7.11. VPLS and Rate Limiting
        3.2.7.12. MAC Move
        3.2.7.13. Auto-Learn MAC Protect
          3.2.7.13.1. Operation
      3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      3.2.9. VPLS and Spanning Tree Protocol
        3.2.9.1. Spanning Tree Operating Modes
        3.2.9.2. Multiple Spanning Tree
          3.2.9.2.1. Redundancy Access to VPLS
        3.2.9.3. MSTP for QinQ SAPs
        3.2.9.4. Provider MSTP
          3.2.9.4.1. MSTP General Principles
          3.2.9.4.2. MSTP in the SR-series Platform
        3.2.9.5. Enhancements to the Spanning Tree Protocol
          3.2.9.5.1. L2PT Termination
          3.2.9.5.2. BPDU Translation
          3.2.9.5.3. L2PT and BPDU Translation
      3.2.10. VPLS Redundancy
        3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
        3.2.10.2. Spoke SDP Based Redundant Access
        3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          3.2.10.3.1. Fast Detection of Peer Failure using BFD
          3.2.10.3.2. MC-EP Passive Mode
        3.2.10.4. Support for Single Chassis Endpoint Mechanisms
          3.2.10.4.1. MAC Flush Support in MC-EP
          3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
          3.2.10.4.3. Support for Force Spoke SDP in MC-EP
          3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
        3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
        3.2.10.6. MAC Flush Additions for PBB VPLS
      3.2.11. VPLS Access Redundancy
        3.2.11.1. STP-based Redundant Access to VPLS
        3.2.11.2. Redundant Access to VPLS Without STP
      3.2.12. Object Grouping and State Monitoring
        3.2.12.1. VPLS Applicability — Block on VPLS a Failure
      3.2.13. MAC Flush Message Processing
        3.2.13.1. Dual Homing to a VPLS Service
        3.2.13.2. MC-Ring and VPLS
      3.2.14. ACL Next-Hop for VPLS
      3.2.15. SDP Statistics for VPLS and VLL Services
      3.2.16. BGP Auto-Discovery for LDP VPLS
        3.2.16.1. BGP AD Overview
        3.2.16.2. Information Model
        3.2.16.3. FEC Element for T-LDP Signaling
        3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
        3.2.16.5. SDP Usage
        3.2.16.6. Automatic Creation of SDPs
        3.2.16.7. Manually Provisioned SDP
        3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
        3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        3.2.16.10. Resiliency Schemes
      3.2.17. BGP VPLS
        3.2.17.1. Pseudowire Signaling Details
        3.2.17.2. Supported VPLS Features
      3.2.18. VCCV BFD Support for VPLS Services
      3.2.19. BGP Multi-Homing for VPLS
        3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
        3.2.19.2. Supported Services and Multi-Homing Objects
        3.2.19.3. Blackhole Avoidance
          3.2.19.3.1. MAC Flush to the Core PEs
          3.2.19.3.2. Indicating non-DF status toward the access PE or CE
        3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
      3.2.20. Multicast-Aware VPLS
        3.2.20.1. IGMP Snooping for VPLS
        3.2.20.2. MLD Snooping for VPLS
        3.2.20.3. PIM Snooping for VPLS
          3.2.20.3.1. Plain PIM Snooping
          3.2.20.3.2. PIM Proxy
        3.2.20.4. IPv6 Multicast Forwarding
          3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
          3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
        3.2.20.5. PIM and IGMP/MLD Snooping Interaction
        3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
          3.2.20.6.1. IGMP Snooping Synchronization
          3.2.20.6.2. MLD Snooping Synchronization
          3.2.20.6.3. PIM Snooping for IPv4 Synchronization
        3.2.20.7. VPLS Multicast-Aware High Availability Features
      3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      3.2.22. MPLS Entropy Label and Hash Label
    3.3. Routed VPLS and I-VPLS
      3.3.1. IES or VPRN IP Interface Binding
        3.3.1.1. Assigning a Service Name to a VPLS Service
        3.3.1.2. Service Binding Requirements
        3.3.1.3. Bound Service Name Assignment
        3.3.1.4. Binding a Service Name to an IP Interface
        3.3.1.5. Bound Service Deletion or Service Name Removal
        3.3.1.6. IP Interface Attached VPLS Service Constraints
        3.3.1.7. IP Interface and VPLS Operational State Coordination
      3.3.2. IP Interface MTU and Fragmentation
        3.3.2.1. Unicast IP Routing into a VPLS Service
      3.3.3. ARP and VPLS FDB Interactions
        3.3.3.1. R-VPLS Specific ARP Cache Behavior
      3.3.4. The allow-ip-int-bind VPLS Flag
        3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
        3.3.4.2. LAG Port Membership Constraints
        3.3.4.3. R-VPLS Feature Restrictions
        3.3.4.4. Routed I-VPLS Feature Restrictions
      3.3.5. IPv4 and IPv6 Multicast Routing Support
      3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
      3.3.7. R-VPLS Caveats
        3.3.7.1. VPLS SAP Ingress IP Filter Override
        3.3.7.2. IP Interface Defined Egress QoS Reclassification
        3.3.7.3. Remarking for VPLS and Routed Packets
        3.3.7.4. IPv4 Multicast Routing
        3.3.7.5. R-VPLS Supported Routing-related Protocols
        3.3.7.6. Spanning Tree and Split Horizon
    3.4. VPLS Service Considerations
      3.4.1. SAP Encapsulations
      3.4.2. VLAN Processing
      3.4.3. Ingress VLAN Swapping
      3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
        3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
        3.4.4.3. MVRP Activation of Service Connectivity
        3.4.4.4. MVRP Control Plane
        3.4.4.5. STP-MVRP Interaction
          3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
          3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
      3.4.5. VPLS E-Tree Services
        3.4.5.1. VPLS E-Tree Services Overview
        3.4.5.2. Leaf-ac and Root-ac SAPs
        3.4.5.3. Leaf-ac and Root-ac SDP Binds
        3.4.5.4. Root-leaf-tag SAPs
        3.4.5.5. Root-leaf-tag SDP Binds
        3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
    3.5. Configuring a VPLS Service with CLI
      3.5.1. Basic Configuration
      3.5.2. Common Configuration Tasks
      3.5.3. Configuring VPLS Components
        3.5.3.1. Creating a VPLS Service
        3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
          3.5.3.2.1. Enabling MAC Move
          3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
        3.5.3.3. Configuring GSMP Parameters
        3.5.3.4. Configuring a VPLS SAP
          3.5.3.4.1. Local VPLS SAPs
          3.5.3.4.2. Distributed VPLS SAPs
          3.5.3.4.3. Configuring SAP-Specific STP Parameters
          3.5.3.4.4. STP SAP Operational States
          3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
          3.5.3.4.6. Configuring MAC Learning Protection
        3.5.3.5. Configuring SAP Subscriber Management Parameters
        3.5.3.6. MSTP Control over Ethernet Tunnels
        3.5.3.7. Configuring SDP Bindings
        3.5.3.8. Configuring Overrides on Service SAPs
          3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
          3.5.3.8.2. Spoke-SDP STP Operational States
          3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
      3.5.4. Configuring VPLS Redundancy
        3.5.4.1. Creating a Management VPLS for SAP Protection
        3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
        3.5.4.3. Configuring Load Balancing with Management VPLS
        3.5.4.4. Configuring Selective MAC Flush
        3.5.4.5. Configuring Multi-Chassis Endpoints
      3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
      3.5.6. Configuring BGP Auto-Discovery
        3.5.6.1. Configuration Steps
        3.5.6.2. LDP Signaling
        3.5.6.3. Pseudowire Template
      3.5.7. Configuring BGP VPLS
        3.5.7.1. Configuring a VPLS Management Interface
      3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      3.5.9. Configuring VPLS E-Tree Services
    3.6. Service Management Tasks
      3.6.1. Modifying VPLS Service Parameters
      3.6.2. Modifying Management VPLS Parameters
      3.6.3. Deleting a Management VPLS
      3.6.4. Disabling a Management VPLS
      3.6.5. Deleting a VPLS Service
      3.6.6. Disabling a VPLS Service
      3.6.7. Re-enabling a VPLS Service
    3.7. VPLS Service Configuration Command Reference
      3.7.1. Command Hierarchies
        3.7.1.1. Global Commands
        3.7.1.2. General Switch Management Protocol (GSMP) Commands
        3.7.1.3. BGP Auto-Discovery Commands
        3.7.1.4. Oper Group Commands
        3.7.1.5. SAP Commands
        3.7.1.6. Template Commands
        3.7.1.7. Mesh SDP Commands
        3.7.1.8. Spoke-SDP Commands
        3.7.1.9. Provider Tunnel Commands
        3.7.1.10. Multi-Chassis Redundancy Commands
      3.7.2. Command Descriptions
        3.7.2.1. Generic Commands
        3.7.2.2. VPLS Service Commands
        3.7.2.3. General Switch Management Protocol Commands
          3.7.2.3.1. VPLS DHCP Commands
          3.7.2.3.2. VPLS STP Commands
          3.7.2.3.3. VPLS SAP Commands
          3.7.2.3.4. VPLS SAP ATM Commands
        3.7.2.4. BGP Auto-Discovery Commands
        3.7.2.5. ETH-CFM Service Commands
          3.7.2.5.1. VPLS Filter and QoS Policy Commands
          3.7.2.5.2. VPLS Template Commands
          3.7.2.5.3. Provider Tunnel Commands
          3.7.2.5.4. VPLS SDP Commands
          3.7.2.5.5. SAP Subscriber Management Commands
        3.7.2.6. VPLS Multicast Commands
          3.7.2.6.1. VPLS DHCP and Anti-Spoofing Commands
        3.7.2.7. Redundancy Commands
    3.8. VPLS Show, Clear, Debug, and Tools Command Reference
      3.8.1. Command Hierarchies
        3.8.1.1. Show Commands
          3.8.1.1.1. IGMP Show Commands
          3.8.1.1.2. IGMP Snooping Show Commands
          3.8.1.1.3. MLD Snooping Commands
          3.8.1.1.4. Show Multi-Chassis Endpoint Commands
        3.8.1.2. Clear Commands
        3.8.1.3. Debug Commands
        3.8.1.4. Tools Commands
      3.8.2. Command Descriptions
        3.8.2.1. VPLS Show Commands
        3.8.2.2. IGMP Snooping Show Commands
        3.8.2.3. MLD Snooping Show Commands
        3.8.2.4. IGMP Commands
          3.8.2.4.1. Show Multi-Chassis Endpoint Commands
        3.8.2.5. VPLS Clear Commands
        3.8.2.6. VPLS Debug Commands
        3.8.2.7. Tools Commands
  4. IEEE 802.1ah Provider Backbone Bridging
    4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    4.2. PBB Features
      4.2.1. Integrated PBB-VPLS Solution
      4.2.2. PBB Technology
      4.2.3. PBB Mapping to Existing VPLS Configurations
      4.2.4. SAP and SDP Support
        4.2.4.1. PBB B-VPLS
        4.2.4.2. PBB I-VPLS
      4.2.5. PBB Packet Walkthrough
        4.2.5.1. PBB Control Planes
      4.2.6. Shortest Path Bridging MAC Mode (SPBM)
        4.2.6.1. Flooding and Learning Versus Link State
        4.2.6.2. SPB for B-VPLS
        4.2.6.3. Control B-VPLS and User B-VPLS
        4.2.6.4. Shortest Path and Single Tree
        4.2.6.5. Data Path and Forwarding
        4.2.6.6. SPB Ethernet OAM
        4.2.6.7. SPB Levels
      4.2.7. SPBM to Non-SPBM Interworking
        4.2.7.1. Static MACs and Static ISIDs
        4.2.7.2. Epipe Static Configuration
          4.2.7.2.1. I-VPLS Static Config
        4.2.7.3. SPBM ISID Policies
      4.2.8. ISID Policy Control
        4.2.8.1. Static ISID Advertisement
        4.2.8.2. I-VPLS for Unicast Service
      4.2.9. Default Behaviors
      4.2.10. Example Network Configuration
        4.2.10.1. Sample Configuration for Dut-A
          4.2.10.1.1. Show Commands Outputs
          4.2.10.1.2. Debug Commands
          4.2.10.1.3. Tools Commands
          4.2.10.1.4. Clear Commands
      4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
        4.2.12.1. I-VPLS Changes and Related MMRP Behavior
        4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        4.2.12.3. Optimization for Improved Convergence Time
        4.2.12.4. Controlling MRP Scope using MRP Policies
      4.2.13. PBB and BGP-AD
      4.2.14. PBB E-Line Service
        4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
      4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
        4.2.15.1. Solution Overview
        4.2.15.2. Detailed Solution Description
        4.2.15.3. Detailed PBB Emulated LAG Solution Description
        4.2.15.4. Support Service and Solution Combinations
      4.2.16. Periodic MAC Notification
      4.2.17. MAC Flush
        4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
          4.2.17.1.2. PBB Blackholing Issue
          4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
      4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
        4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
      4.2.19. BGP Multi-homing for I-VPLS
      4.2.20. Access Multi-Homing over MPLS for PBB Epipes
      4.2.21. PBB and IGMP/MLD Snooping
      4.2.22. PBB and PIM Snooping
      4.2.23. PBB QoS
        4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
          4.2.23.1.1. Configuration Examples
          4.2.23.1.2. Details Solution Description
      4.2.24. Egress B-SAP per ISID Shaping
        4.2.24.1. B-SAP Egress ISID Shaping Configuration
        4.2.24.2. Provisioning Model
        4.2.24.3. Egress Queue Scheduling
        4.2.24.4. B-SAP per-ISID Shaping Configuration Example
      4.2.25. PBB OAM
        4.2.25.1. Mirroring
        4.2.25.2. OAM Commands
        4.2.25.3. CFM Support
    4.3. Configuration Examples
      4.3.1. PBB using G.8031 Protected Ethernet Tunnels
      4.3.2. MC-LAG Multi-homing for Native PBB
      4.3.3. Access Multi-Homing over MPLS for PBB Epipes
    4.4. PBB Configuration Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Global Commands
        4.4.1.2. SAP Commands
        4.4.1.3. Mesh SDP Commands
        4.4.1.4. Spoke SDP Commands
        4.4.1.5. BGP-MH for I-VPLS Commands
      4.4.2. Command Descriptions
        4.4.2.1. Global Commands
        4.4.2.2. SAP Commands
        4.4.2.3. BGP-MH for I-VPLS Commands
    4.5. PBB Show, Clear, and Debug Command Reference
      4.5.1. Command Hierarchies
        4.5.1.1. Show Commands
        4.5.1.2. Clear Commands
        4.5.1.3. Debug Commands
      4.5.2. Command Descriptions
        4.5.2.1. PBB Show Commands
        4.5.2.2. PBB Clear Commands
        4.5.2.3. PBB Debug Commands
  5. Ethernet Virtual Private Networks (EVPNs)
    5.1. Overview and EVPN Applications
      5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
      5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
      5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
      5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
      5.1.5. EVPN for MPLS Tunnels in E-LAN Services
      5.1.6. EVPN for MPLS Tunnels in E-Line Services
      5.1.7. EVPN for MPLS Tunnels in E-Tree Services
      5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    5.2. EVPN for VXLAN Tunnels and Cloud Technologies
      5.2.1. VXLAN
        5.2.1.1. VXLAN ECMP and LAG
        5.2.1.2. VXLAN VPLS Tag Handling
        5.2.1.3. VXLAN MTU Considerations
        5.2.1.4. VXLAN QoS
          5.2.1.4.1. Ingress
          5.2.1.4.2. Egress
        5.2.1.5. VXLAN Ping
        5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
        5.2.1.7. IGMP and MLD Snooping on VXLAN
        5.2.1.8. PIM Snooping on VXLAN
        5.2.1.9. Static VXLAN Termination in Epipe Services
        5.2.1.10. Static VXLAN Termination in VPLS/R-VPLS Services
        5.2.1.11. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
      5.2.2. EVPN for Overlay Tunnels
        5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
        5.2.2.2. EVPN for VXLAN in VPLS Services
          5.2.2.2.1. Resiliency and BGP Multi-Homing
          5.2.2.2.2. Use of BGP-EVPN, BGP-AD, and Sites in the Same VPLS Service
          5.2.2.2.3. Use of the unknown-mac-route
        5.2.2.3. EVPN for VXLAN in R-VPLS Services
          5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
        5.2.2.4. EVPN-VPWS for VXLAN Tunnels
          5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
          5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
      5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
        5.2.3.1. XMPP Interface on the DC GW
        5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
        5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
          5.2.3.3.1. VSD-Domain Type L2-DOMAIN
          5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
          5.2.3.3.3. VSD-Domain Type VRF-GRE
          5.2.3.3.4. VSD-Domain Type VRF-VXLAN
        5.2.3.4. Fully-Dynamic VSD Integration Model
          5.2.3.4.1. Python Script Implementation Details
          5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
      5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
        5.2.4.1. Replicator (AR-R) Procedures
        5.2.4.2. Leaf (AR-L) procedures
        5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
      5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI
        5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
        5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
      5.2.6. EVPN VXLAN Multihoming
        5.2.6.1. Local Bias for EVPN VXLAN Multihoming
        5.2.6.2. Known Limitations for Local Bias
        5.2.6.3. Non-system IPv4 and IPv6 VXLAN Termination for EVPN VXLAN Multihoming
    5.3. EVPN for MPLS Tunnels
      5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
      5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
        5.3.2.1. EVPN and VPLS Integration
        5.3.2.2. EVPN Single-Active Multi-Homing and BGP-VPLS Integration
        5.3.2.3. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
        5.3.2.4. EVPN Multi-Homing in VPLS Services
          5.3.2.4.1. EVPN All-Active Multi-Homing
          5.3.2.4.2. EVPN Single-Active Multi-Homing
      5.3.3. P2MP mLDP Tunnels for BUM Traffic in EVPN-MPLS Services
      5.3.4. EVPN-VPWS for MPLS Tunnels
        5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
        5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
        5.3.4.3. PW Ports-based ESs for EVPN-VPWS
      5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
        5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
      5.3.6. PBB-EVPN
        5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
          5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
          5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or B-MAC Routes)
          5.3.6.1.3. EVPN Route Type 4 - ES Route
        5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
          5.3.6.2.1. Flood Containment for I-VPLS Services
          5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
          5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
          5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
          5.3.6.2.5. PBB-EVPN ISID-Based C-MAC Flush
          5.3.6.2.6. PBB-EVPN ISID-based Route Targets
      5.3.7. Virtual Ethernet Segments
      5.3.8. Preference-Based and Non-Revertive DF Election
      5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
      5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
        5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
      5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
        5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
      5.3.12. EVPN E-Tree
        5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
        5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
        5.3.12.3. EVPN E-Tree Operation
          5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
          5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
          5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
        5.3.12.4. EVPN E-Tree and EVPN Multi-homing
        5.3.12.5. PBB-EVPN E-Tree Services
      5.3.13. MPLS Entropy Label and Hash Label
      5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
        5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
        5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
        5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
      5.3.15. ECMP for EVPN-MPLS Destinations
      5.3.16. IPv6 tunnel resolution for EVPN MPLS Services
      5.3.17. EVPN Multi-Homing Support for MPLS Tunnels Resolved to Non-system IPv4/IPv6 Addresses
    5.4. General EVPN Topics
      5.4.1. ARP/ND Snooping and Proxy Support
        5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
        5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
        5.4.1.3. Procedure to Add the R Flag to a Specified Entry
        5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
      5.4.2. BGP-EVPN MAC-Mobility
      5.4.3. BGP-EVPN MAC-Duplication
      5.4.4. Conditional Static MAC and Protection
      5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
      5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
      5.4.7. Blackhole MAC for EVPN Loop Detection
      5.4.8. CFM Interaction with EVPN Services
      5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS/R-VPLS Service
        5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
        5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
        5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
        5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
          5.4.9.4.1. BGP-EVPN Routes on Dual BGP-Instance Services with I-ES
          5.4.9.4.2. Single-Active Multi-Homing on I-ES
          5.4.9.4.3. All-Active Multi-Homing on I-ES
      5.4.10. Configuring Multi-Instance EVPN-VXLAN in the Same VPLS/R-VPLS Service
        5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
        5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
        5.4.10.3. Interconnect Ethernet-Segment Solution for Dual BGP EVPN VXLAN Instance Services
      5.4.11. Configuring Static VXLAN and EVPN in the Same VPLS/R-VPLS Service
      5.4.12. EVPN IP-Prefix Route Interoperability
        5.4.12.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
        5.4.12.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
        5.4.12.3. Interface-less IP-VRF-to-IP-VRF Model
      5.4.13. ARP-ND Host Routes for Extended Layer 2 Data Centers
      5.4.14. EVPN Host Mobility Procedures within the Same R-VPLS Service
        5.4.14.1. EVPN Host Mobility Configuration
          5.4.14.1.1. Host Mobility Case 1
          5.4.14.1.2. Host Mobility Case 2
          5.4.14.1.3. Host Mobility Case 3
      5.4.15. BGP and EVPN Route Selection for EVPN Routes
      5.4.16. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      5.4.17. Oper-Groups Interaction with EVPN Services
        5.4.17.1. LAG-Based Link Loss Forwarding for EVPN-VPWS Services
        5.4.17.2. Core Isolation Blackhole Avoidance
        5.4.17.3. LAG Standby Signaling to the CE on Non-DF EVPN PEs (Single-Active)
      5.4.18. EVPN Layer-3 Optimized Inter-Subnet Multicast (OISM)
        5.4.18.1. Introduction and Terminology
        5.4.18.2. OISM Forwarding Plane
        5.4.18.3. OISM Control Plane
        5.4.18.4. EVPN OISM and Multi-Homing
        5.4.18.5. EVPN OISM Configuration Guidelines
        5.4.18.6. Use of mLDP in OISM
        5.4.18.7. Example of mLDP in OISM
      5.4.19. Interaction of EVPN and Other Features
        5.4.19.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
        5.4.19.2. Interaction of PBB-EVPN with Existing VPLS Features
        5.4.19.3. Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
      5.4.20. Routing Policies for BGP EVPN Routes
        5.4.20.1. Routing Policies for BGP EVPN IP Prefixes
    5.5. Configuring an EVPN Service with CLI
      5.5.1. EVPN-VXLAN Configuration Examples
        5.5.1.1. Layer 2 PE Example
        5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
        5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      5.5.2. EVPN-MPLS Configuration Examples
        5.5.2.1. EVPN All-active Multi-homing Example
        5.5.2.2. EVPN Single-active Multi-homing Example
      5.5.3. PBB-EVPN Configuration Examples
        5.5.3.1. PBB-EVPN All-active Multi-homing Example
        5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
    5.6. EVPN Command Reference
      5.6.1. Command Hierarchies
        5.6.1.1. EVPN Configuration Commands
          5.6.1.1.1. Epipe Commands
          5.6.1.1.2. VPLS Commands
          5.6.1.1.3. IES/VPRN Commands
          5.6.1.1.4. System Commands
        5.6.1.2. Show Commands
        5.6.1.3. Clear Commands
        5.6.1.4. Debug Commands
        5.6.1.5. Tools Commands
      5.6.2. Command Descriptions
        5.6.2.1. EVPN Configuration Commands
        5.6.2.2. Show Configuration Commands
        5.6.2.3. Clear Commands
        5.6.2.4. Debug Commands
        5.6.2.5. Tools Commands
  6. Pseudowire Ports
    6.1. Overview
    6.2. PW Port Bound to a Physical Port
    6.3. FPE-Based PW Port
      6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
      6.3.2. PXC-Based PW-Port — Building the Cross-Connect
        6.3.2.1. Building the Internal Transport Tunnel
        6.3.2.2. Mapping the External PW to the PW-Port
        6.3.2.3. Terminating the Service on PW-SAP
      6.3.3. FPE-Based PW-port Operational State
      6.3.4. QoS
        6.3.4.1. Preservation of Forwarding Class Across PXC
      6.3.5. Statistics on the FPE based PW-Port
      6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
    6.4. MSS and PW Ports
      6.4.1. Configuration Examples
      6.4.2. Concurrent Scheduling QoS Mechanisms on a PW Port
      6.4.3. Show Command Examples
    6.5. L2oGRE Termination on FPE-Based PW Port
      6.5.1. L2oGRE Packet Format
      6.5.2. GRE Delivery Protocol
      6.5.3. Tracking Payloads and Service Termination Points
        6.5.3.1. Plain L3 termination
        6.5.3.2. Layer 2 Termination
        6.5.3.3. ESM Termination
      6.5.4. Configuration Steps
      6.5.5. Fragmentation and MTU Configuration
      6.5.6. Reassembly
    6.6. Pseudowire Ports Command Reference
      6.6.1. Command Hierarchies
        6.6.1.1. PW Port Configuration Commands
        6.6.1.2. Redundant Interface Commands
        6.6.1.3. Show Commands
      6.6.2. Command Descriptions
        6.6.2.1. PW Port Configuration Commands
        6.6.2.2. SDP Binding Commands
        6.6.2.3. Show Commands
  7. VSR Pseudowire Ports
    7.1. Flex PW Ports
      7.1.1. PW Port List
      7.1.2. Failover Times
      7.1.3. QoS
      7.1.4. PW Port Termination for Various Tunnel Types
        7.1.4.1. MPLS-Based Spoke SDP
          7.1.4.1.1. Provisioning
          7.1.4.1.2. Flex PW-Port Operational State for MPLS Based Spoke SDP
          7.1.4.1.3. Statistics
        7.1.4.2. L2oGRE-Based Spoke SDP
          7.1.4.2.1. Provisioning
          7.1.4.2.2. Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
          7.1.4.2.3. Reassembly
    7.2. VSR Pseudowire Ports Command Reference
      7.2.1. Command Hierarchies
        7.2.1.1. PW Port Configuration Commands
        7.2.1.2. Show Commands
        7.2.1.3. Clear Commands
      7.2.2. Command Descriptions
        7.2.2.1. PW Port Configuration Commands
        7.2.2.2. Show Commands
        7.2.2.3. Clear Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
Layer 3 Services Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 3 Services Configuration Process
  2. Internet Enhanced Service
    2.1. IES Service Overview
    2.2. IES Features
      2.2.1. IP Interfaces
        2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
          2.2.1.1.1. QPPB Applications
          2.2.1.1.2. Inter-AS Coordination of QoS Policies
          2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
        2.2.1.2. QPPB
          2.2.1.2.1. Associating an FC and Priority with a Route
          2.2.1.2.2. Displaying QoS Information Associated with Routes
          2.2.1.2.3. Enabling QPPB on an IP Interface
          2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.2.1.2.5. QPPB and Multiple Paths to a Destination
          2.2.1.2.6. QPPB and Policy-Based Routing
        2.2.1.3. QPPB and GRT Lookup
          2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
        2.2.1.4. Object Grouping and State Monitoring
          2.2.1.4.1. IES IP Interface Applicability
      2.2.2. Subscriber Interfaces
        2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
        2.2.2.2. RADIUS Accounting
      2.2.3. SAPs
        2.2.3.1. Encapsulations
        2.2.3.2. ATM SAP Encapsulations for IES
        2.2.3.3. Pseudowire SAPs
        2.2.3.4. Encapsulation
        2.2.3.5. Pseudowire SAP Configuration
        2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
        2.2.3.7. Shaping and Bandwidth Control
        2.2.3.8. Lag Considerations
        2.2.3.9. Last Mile Packet Size Adjustment
        2.2.3.10. Redundancy with Pseudowire SAPs
        2.2.3.11. Operational Group Support for PW Ports
      2.2.4. Routing Protocols
        2.2.4.1. CPE Connectivity Check
      2.2.5. QoS Policies
      2.2.6. Filter Policies
      2.2.7. MPLS Entropy Label and Hash Label
      2.2.8. Spoke SDPs
      2.2.9. SRRP
        2.2.9.1. SRRP Messaging
        2.2.9.2. SRRP and Multi-Chassis Synchronization
        2.2.9.3. SRRP Instance
          2.2.9.3.1. SRRP Instance MCS Key
          2.2.9.3.2. Containing Service Type and ID
          2.2.9.3.3. Containing Subscriber IP Interface Name
          2.2.9.3.4. Subscriber Subnet Information
          2.2.9.3.5. Containing Group IP Interface Information
          2.2.9.3.6. Remote Redundant IP Interface Mismatch
          2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
          2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
          2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          2.2.9.3.10. Local and Remote Dual Master Detected
        2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
        2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
        2.2.9.7. BFD with SRRP/VRRP
    2.3. Configuring an IES Service with CLI
      2.3.1. Basic Configuration
      2.3.2. Common Configuration Tasks
      2.3.3. Configuring IES Components
        2.3.3.1. Configuring an IES Service
        2.3.3.2. Configuring IES Subscriber Interface Parameters
        2.3.3.3. Configuring IES Interface Parameters
        2.3.3.4. Configuring Spoke-SDP Parameters
        2.3.3.5. Configuring SAP Parameters
        2.3.3.6. Configuring IES SAP ATM Parameters
        2.3.3.7. Configuring VRRP
        2.3.3.8. Configuring IPsec Parameters
        2.3.3.9. IGMP Host Tracking
    2.4. Service Management Tasks
      2.4.1. Modifying IES Service Parameters
      2.4.2. Deleting a Spoke-SDP
      2.4.3. Deleting an IES Service
      2.4.4. Disabling an IES Service
      2.4.5. Re-Enabling an IES Service
    2.5. IES Services Command Reference
      2.5.1. Command Hierarchies
        2.5.1.1. Global Commands
        2.5.1.2. AARP Interface Commands
        2.5.1.3. IES Service Interface Commands
        2.5.1.4. Routed VPLS Commands
        2.5.1.5. Redundant Interface Commands
        2.5.1.6. Interface SAP Commands
        2.5.1.7. VRRP Commands
        2.5.1.8. Spoke SDP Commands
        2.5.1.9. Subscriber Interface Commands
          2.5.1.9.1. Group Interface Commands
          2.5.1.9.2. Group Interface SAP Commands
      2.5.2. Command Descriptions
        2.5.2.1. Generic Commands
        2.5.2.2. IES Global Commands
        2.5.2.3. AARP Interface Commands
        2.5.2.4. IES Interface Commands
        2.5.2.5. Redundant Interface Commands
        2.5.2.6. IES Subscriber Interface Commands
        2.5.2.7. IES Interface ICMP Commands
        2.5.2.8. IES Interface IPv6 Commands
        2.5.2.9. IES Spoke SDP Commands
        2.5.2.10. IES SAP Commands
        2.5.2.11. SAP Subscriber Management Commands
        2.5.2.12. ETH-CFM Service Commands
        2.5.2.13. IES Filter and QoS Policy Commands
        2.5.2.14. ATM Commands
        2.5.2.15. IES Interface VRRP Commands
    2.6. IES Show, Clear, and Debug Command Reference
      2.6.1. Command Hierarchies
        2.6.1.1. Show Commands
        2.6.1.2. Clear Commands
        2.6.1.3. Debug Commands
        2.6.1.4. Monitor Commands
      2.6.2. Command Descriptions
        2.6.2.1. IES Show Commands
        2.6.2.2. IES Clear Commands
        2.6.2.3. IES Debug Commands
        2.6.2.4. IES Monitor Commands
  3. Virtual Private Routed Network Service
    3.1. VPRN Service Overview
      3.1.1. Routing Prerequisites
      3.1.2. Core MP-BGP Support
      3.1.3. Route Distinguishers
        3.1.3.1. eiBGP Load Balancing
      3.1.4. Route Reflector
      3.1.5. CE to PE Route Exchange
        3.1.5.1. Route Redistribution
        3.1.5.2. CPE Connectivity Check
      3.1.6. Constrained Route Distribution (RT Constraint)
        3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
        3.1.6.2. Configuring the Route Target Address Family
        3.1.6.3. Originating RT Constraint Routes
        3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
        3.1.6.5. Using RT Constraint Routes
      3.1.7. BGP Fast Reroute in a VPRN
        3.1.7.1. BGP Fast Reroute in a VPRN Configuration
      3.1.8. BGP Best-External in a VPRN Context
    3.2. VPRN Features
      3.2.1. IP Interfaces
        3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
        3.2.1.2. QPPB Applications
        3.2.1.3. Inter-AS Coordination of QoS Policies
        3.2.1.4. Traffic Differentiation Based on Route Characteristics
        3.2.1.5. QPPB
        3.2.1.6. Associating an FC and Priority with a Route
        3.2.1.7. Displaying QoS Information Associated with Routes
        3.2.1.8. Enabling QPPB on an IP interface
        3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
        3.2.1.10. QPPB and Multiple Paths to a Destination
        3.2.1.11. QPPB and Policy-Based Routing
        3.2.1.12. QPPB and GRT Lookup
        3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
        3.2.1.14. Object Grouping and State Monitoring
        3.2.1.15. VPRN IP Interface Applicability
      3.2.2. Subscriber Interfaces
      3.2.3. SAPs
        3.2.3.1. Encapsulations
        3.2.3.2. ATM SAP Encapsulations for VPRN Services
        3.2.3.3. Pseudowire SAPs
      3.2.4. QoS Policies
      3.2.5. Filter Policies
      3.2.6. DSCP Marking
        3.2.6.1. Default DSCP Mapping Table
      3.2.7. Configuration of TTL Propagation for VPRN Routes
      3.2.8. CE to PE Routing Protocols
        3.2.8.1. PE to PE Tunneling Mechanisms
        3.2.8.2. Per VRF Route Limiting
      3.2.9. Spoke SDPs
        3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        3.2.9.2. Spoke SDP Redundancy into IES/VPRN
        3.2.9.3. Weighted ECMP for Spoke-SDPs Terminating on IES/VPRN and R-VPLS Interfaces
      3.2.10. IP-VPNs
        3.2.10.1. Using OSPF in IP-VPNs
      3.2.11. IPCP Subnet Negotiation
      3.2.12. Cflowd for IP-VPNs
      3.2.13. Inter-AS VPRNs
      3.2.14. VPRN Label Security at Inter-AS Boundary
        3.2.14.1. Feature Configuration
        3.2.14.2. CPM Behavior
        3.2.14.3. Data Path Forwarding Behavior
      3.2.15. Carrier Supporting Carrier (CSC)
        3.2.15.1. Terminology
        3.2.15.2. CSC Connectivity Models
        3.2.15.3. CSC-PE Configuration and Operation
        3.2.15.4. CSC Interface
        3.2.15.5. QoS
        3.2.15.6. MPLS
        3.2.15.7. CSC VPRN Service Configuration
      3.2.16. Node Management Using VPRN
        3.2.16.1. VPRN Management
        3.2.16.2. AAA Management
        3.2.16.3.  SNMP Management
        3.2.16.4. Events and Notifications
        3.2.16.5. DNS Resolution
      3.2.17. Traffic Leaking to GRT
      3.2.18. Traffic Leaking from VPRN to GRT for IPv6
      3.2.19. RIP Metric Propagation in VPRNs
      3.2.20. NTP Within a VPRN Service
      3.2.21. PTP Within a VPRN Service
      3.2.22. VPN Route Label Allocation
        3.2.22.1. Configuring the Service Label Mode
        3.2.22.2. Restrictions and Usage Notes
      3.2.23. VPRN Support for BGP FlowSpec
      3.2.24. MPLS Entropy Label and Hash Label
      3.2.25. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      3.2.26. Route Leaking from the Global Route Table to VPRN Instances
      3.2.27. Class-Based Forwarding of VPN-v4/v6 Prefixes over RSVP-TE or SR-TE LSPs
        3.2.27.1. Feature Configuration
        3.2.27.2. Feature Behavior
    3.3. QoS on Ingress Bindings
    3.4. Multicast in IP-VPN Applications
      3.4.1. Use of Data MDTs
      3.4.2. Multicast Protocols Supported in the Provider Network
      3.4.3. MVPN Membership Auto-discovery using BGP
      3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
      3.4.5. VRF Route Import Extended Community
      3.4.6. Provider Tunnel Support
        3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
        3.4.6.3. P2MP LDP I-PMSI and S-PMSI
        3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
        3.4.6.5. P2MP LSP S-PMSI
        3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
        3.4.6.7. MVPN Sender-only/Receiver-only
        3.4.6.8. S-PMSI Trigger Thresholds
        3.4.6.9. Migration from Existing Rosen Implementation
        3.4.6.10. Policy-based S-PMSI
          3.4.6.10.1. Supported MPLS Tunnels
          3.4.6.10.2. Supported Multicast Features
          3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
          3.4.6.10.4. Configuration Example
        3.4.6.11. Policy-based Data MDT
      3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      3.4.8. Multicast VPN Extranet
        3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
        3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
        3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
        3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
      3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      3.4.11. IPv6 MVPN Support
      3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      3.4.13. NG-MVPN Core Diversity
        3.4.13.1. NG-MVPN to Loopback Interface
        3.4.13.2. NG-MVPN Core Diversity
        3.4.13.3. Configuration Example
      3.4.14. NG-MVPN Multicast Source Geo-Redundancy
      3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
      3.4.16. Inter-AS MVPN
        3.4.16.1. BGP Connector Attribute
        3.4.16.2. PIM RPF Vector
        3.4.16.3. Inter-AS MVPN Option B
        3.4.16.4. Inter-AS MVPN Option C
        3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
          3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
          3.4.16.5.2. Configuration Example
          3.4.16.5.3. Inter-AS Non-segmented MLDP
          3.4.16.5.4. ECMP
      3.4.17.  mLDP Non-Segmented Intra-AS (inter-area) MVPN Solution
        3.4.17.1. Intra-AS and Inter-AS Option B
        3.4.17.2. MVPN Next-Hop Self on ABRs
          3.4.17.2.1. MVPN next-hop-self Policy Example
          3.4.17.2.2. LDP Configuration Example
          3.4.17.2.3. BGP Configuration Example
      3.4.18. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
    3.5. FIB Prioritization
    3.6. Configuring a VPRN Service with CLI
      3.6.1. Basic Configuration
      3.6.2. Common Configuration Tasks
      3.6.3. Configuring VPRN Components
        3.6.3.1. Creating a VPRN Service
        3.6.3.2. Configuring Global VPRN Parameters
        3.6.3.3. Configuring VPRN Log Parameters
          3.6.3.3.1. Configuring a Spoke-SDP
        3.6.3.4. Configuring VPRN Protocols - PIM
          3.6.3.4.1. Configuring Router Interfaces
          3.6.3.4.2. Configuring VPRN Protocols - BGP
          3.6.3.4.3. Configuring VPRN Protocols - RIP
          3.6.3.4.4. Configuring VPRN Protocols - OSPF
          3.6.3.4.5. Configuring a VPRN Interface
          3.6.3.4.6. Configuring Overload State on a Single SFM
          3.6.3.4.7. Configuring a VPRN Interface SAP
    3.7. Service Management Tasks
      3.7.1. Modifying VPRN Service Parameters
      3.7.2. Deleting a VPRN Service
      3.7.3. Disabling a VPRN Service
      3.7.4. Re-enabling a VPRN Service
    3.8.  VPRN Service Configuration Commands
      3.8.1. Command Hierarchies
        3.8.1.1. VPRN Service Configuration Commands
        3.8.1.2. AAA Remote Server Commands
        3.8.1.3. AARP Interface Commands
        3.8.1.4. BGP Configuration Commands
        3.8.1.5. BGP Group Configuration Commands
        3.8.1.6. BGP Group Neighbor Configuration Commands
        3.8.1.7. GSMP Commands
        3.8.1.8. IGMP Commands
        3.8.1.9. Interface Commands
        3.8.1.10. Interface SAP Commands
        3.8.1.11. Interface Spoke SDP Commands
        3.8.1.12. Interface VPLS Commands
        3.8.1.13. Interface VRRP Commands
        3.8.1.14. IS-IS Configuration Commands
        3.8.1.15. L2TP Commands
        3.8.1.16. Log Commands
        3.8.1.17. Management Commands
        3.8.1.18. MLD Configuration Commands
        3.8.1.19. MSDP Configuration Commands
        3.8.1.20. Multicast VPN Commands
        3.8.1.21. Redundant Interface Commands
        3.8.1.22. RIP Configuration Commands
        3.8.1.23. Router Advertisement Commands
        3.8.1.24. NAT Commands
        3.8.1.25. Network Ingress Commands
        3.8.1.26. Network Interface Commands
        3.8.1.27. NTP Commands
        3.8.1.28. OSPF Configuration Commands
        3.8.1.29. PIM Configuration Commands
      3.8.2. Command Descriptions
        3.8.2.1. Generic Commands
        3.8.2.2. Global Commands
        3.8.2.3. AAA Remote Server Commands
        3.8.2.4. AARP Interface Commands
        3.8.2.5. BGP Commands
        3.8.2.6. GSMP Commands
        3.8.2.7. IGMP Commands
        3.8.2.8. Interface Commands
        3.8.2.9. Interface Commands
        3.8.2.10. Interface ETH-CFM Commands
        3.8.2.11. Interface ICMP Commands
        3.8.2.12. Interface SAP Commands
        3.8.2.13. Interface SAP ATM Commands
        3.8.2.14. Interface SAP Filter and QoS Policy Commands
        3.8.2.15. Interface Anti-Spoofing Commands
        3.8.2.16. Interface VPLS Commands
        3.8.2.17. Interface VRRP Commands
        3.8.2.18. IS-IS Commands
        3.8.2.19. L2TP Commands
          3.8.2.19.1. Router L2TP Tunnel Commands
        3.8.2.20. Log Commands
        3.8.2.21. Management Commands
        3.8.2.22. MLD Configuration Commands
        3.8.2.23. MSDP Configuration Commands
        3.8.2.24. Multicast VPN Commands
        3.8.2.25. NAT Commands
        3.8.2.26. Network Ingress Commands
        3.8.2.27. Network Interface Commands
        3.8.2.28. Network Time Protocol Commands
        3.8.2.29. OSPF Commands
        3.8.2.30. PIM Commands
        3.8.2.31. Redundant Interface Commands
        3.8.2.32. RIP Commands
        3.8.2.33. Router Advertisement Commands
        3.8.2.34. SDP Commands
    3.9. VPRN Show, Clear, and Debug Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Show Commands
        3.9.1.2. Clear Commands
        3.9.1.3. Debug Commands
      3.9.2. Command Descriptions
        3.9.2.1. VPRN Show Commands
        3.9.2.2. VPRN Clear Commands
        3.9.2.3. VPRN Debug Commands
    3.10. Tools Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Tools Commands
      3.10.2. Command Descriptions
        3.10.2.1. Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Layer 3 Services Configuration Process
  2. Internet Enhanced Service
    2.1. IES Service Overview
    2.2. IES Features
      2.2.1. IP Interfaces
        2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
          2.2.1.1.1. QPPB Applications
          2.2.1.1.2. Inter-AS Coordination of QoS Policies
          2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
        2.2.1.2. QPPB
          2.2.1.2.1. Associating an FC and Priority with a Route
          2.2.1.2.2. Displaying QoS Information Associated with Routes
          2.2.1.2.3. Enabling QPPB on an IP Interface
          2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.2.1.2.5. QPPB and Multiple Paths to a Destination
          2.2.1.2.6. QPPB and Policy-Based Routing
        2.2.1.3. QPPB and GRT Lookup
          2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
        2.2.1.4. Object Grouping and State Monitoring
          2.2.1.4.1. IES IP Interface Applicability
      2.2.2. Subscriber Interfaces
        2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
        2.2.2.2. RADIUS Accounting
      2.2.3. SAPs
        2.2.3.1. Encapsulations
        2.2.3.2. ATM SAP Encapsulations for IES
        2.2.3.3. Pseudowire SAPs
        2.2.3.4. Encapsulation
        2.2.3.5. Pseudowire SAP Configuration
        2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
        2.2.3.7. Shaping and Bandwidth Control
        2.2.3.8. Lag Considerations
        2.2.3.9. Last Mile Packet Size Adjustment
        2.2.3.10. Redundancy with Pseudowire SAPs
        2.2.3.11. Operational Group Support for PW Ports
      2.2.4. Routing Protocols
        2.2.4.1. CPE Connectivity Check
      2.2.5. QoS Policies
      2.2.6. Filter Policies
      2.2.7. MPLS Entropy Label and Hash Label
      2.2.8. Spoke SDPs
      2.2.9. SRRP
        2.2.9.1. SRRP Messaging
        2.2.9.2. SRRP and Multi-Chassis Synchronization
        2.2.9.3. SRRP Instance
          2.2.9.3.1. SRRP Instance MCS Key
          2.2.9.3.2. Containing Service Type and ID
          2.2.9.3.3. Containing Subscriber IP Interface Name
          2.2.9.3.4. Subscriber Subnet Information
          2.2.9.3.5. Containing Group IP Interface Information
          2.2.9.3.6. Remote Redundant IP Interface Mismatch
          2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
          2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
          2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          2.2.9.3.10. Local and Remote Dual Master Detected
        2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
        2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
        2.2.9.7. BFD with SRRP/VRRP
    2.3. Configuring an IES Service with CLI
      2.3.1. Basic Configuration
      2.3.2. Common Configuration Tasks
      2.3.3. Configuring IES Components
        2.3.3.1. Configuring an IES Service
        2.3.3.2. Configuring IES Subscriber Interface Parameters
        2.3.3.3. Configuring IES Interface Parameters
        2.3.3.4. Configuring Spoke-SDP Parameters
        2.3.3.5. Configuring SAP Parameters
        2.3.3.6. Configuring IES SAP ATM Parameters
        2.3.3.7. Configuring VRRP
        2.3.3.8. Configuring IPsec Parameters
        2.3.3.9. IGMP Host Tracking
    2.4. Service Management Tasks
      2.4.1. Modifying IES Service Parameters
      2.4.2. Deleting a Spoke-SDP
      2.4.3. Deleting an IES Service
      2.4.4. Disabling an IES Service
      2.4.5. Re-Enabling an IES Service
    2.5. IES Services Command Reference
      2.5.1. Command Hierarchies
        2.5.1.1. Global Commands
        2.5.1.2. AARP Interface Commands
        2.5.1.3. IES Service Interface Commands
        2.5.1.4. Routed VPLS Commands
        2.5.1.5. Redundant Interface Commands
        2.5.1.6. Interface SAP Commands
        2.5.1.7. VRRP Commands
        2.5.1.8. Spoke SDP Commands
        2.5.1.9. Subscriber Interface Commands
          2.5.1.9.1. Group Interface Commands
          2.5.1.9.2. Group Interface SAP Commands
      2.5.2. Command Descriptions
        2.5.2.1. Generic Commands
        2.5.2.2. IES Global Commands
        2.5.2.3. AARP Interface Commands
        2.5.2.4. IES Interface Commands
        2.5.2.5. Redundant Interface Commands
        2.5.2.6. IES Subscriber Interface Commands
        2.5.2.7. IES Interface ICMP Commands
        2.5.2.8. IES Interface IPv6 Commands
        2.5.2.9. IES Spoke SDP Commands
        2.5.2.10. IES SAP Commands
        2.5.2.11. SAP Subscriber Management Commands
        2.5.2.12. ETH-CFM Service Commands
        2.5.2.13. IES Filter and QoS Policy Commands
        2.5.2.14. ATM Commands
        2.5.2.15. IES Interface VRRP Commands
    2.6. IES Show, Clear, and Debug Command Reference
      2.6.1. Command Hierarchies
        2.6.1.1. Show Commands
        2.6.1.2. Clear Commands
        2.6.1.3. Debug Commands
        2.6.1.4. Monitor Commands
      2.6.2. Command Descriptions
        2.6.2.1. IES Show Commands
        2.6.2.2. IES Clear Commands
        2.6.2.3. IES Debug Commands
        2.6.2.4. IES Monitor Commands
  3. Virtual Private Routed Network Service
    3.1. VPRN Service Overview
      3.1.1. Routing Prerequisites
      3.1.2. Core MP-BGP Support
      3.1.3. Route Distinguishers
        3.1.3.1. eiBGP Load Balancing
      3.1.4. Route Reflector
      3.1.5. CE to PE Route Exchange
        3.1.5.1. Route Redistribution
        3.1.5.2. CPE Connectivity Check
      3.1.6. Constrained Route Distribution (RT Constraint)
        3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
        3.1.6.2. Configuring the Route Target Address Family
        3.1.6.3. Originating RT Constraint Routes
        3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
        3.1.6.5. Using RT Constraint Routes
      3.1.7. BGP Fast Reroute in a VPRN
        3.1.7.1. BGP Fast Reroute in a VPRN Configuration
      3.1.8. BGP Best-External in a VPRN Context
    3.2. VPRN Features
      3.2.1. IP Interfaces
        3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
        3.2.1.2. QPPB Applications
        3.2.1.3. Inter-AS Coordination of QoS Policies
        3.2.1.4. Traffic Differentiation Based on Route Characteristics
        3.2.1.5. QPPB
        3.2.1.6. Associating an FC and Priority with a Route
        3.2.1.7. Displaying QoS Information Associated with Routes
        3.2.1.8. Enabling QPPB on an IP interface
        3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
        3.2.1.10. QPPB and Multiple Paths to a Destination
        3.2.1.11. QPPB and Policy-Based Routing
        3.2.1.12. QPPB and GRT Lookup
        3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
        3.2.1.14. Object Grouping and State Monitoring
        3.2.1.15. VPRN IP Interface Applicability
      3.2.2. Subscriber Interfaces
      3.2.3. SAPs
        3.2.3.1. Encapsulations
        3.2.3.2. ATM SAP Encapsulations for VPRN Services
        3.2.3.3. Pseudowire SAPs
      3.2.4. QoS Policies
      3.2.5. Filter Policies
      3.2.6. DSCP Marking
        3.2.6.1. Default DSCP Mapping Table
      3.2.7. Configuration of TTL Propagation for VPRN Routes
      3.2.8. CE to PE Routing Protocols
        3.2.8.1. PE to PE Tunneling Mechanisms
        3.2.8.2. Per VRF Route Limiting
      3.2.9. Spoke SDPs
        3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        3.2.9.2. Spoke SDP Redundancy into IES/VPRN
        3.2.9.3. Weighted ECMP for Spoke-SDPs Terminating on IES/VPRN and R-VPLS Interfaces
      3.2.10. IP-VPNs
        3.2.10.1. Using OSPF in IP-VPNs
      3.2.11. IPCP Subnet Negotiation
      3.2.12. Cflowd for IP-VPNs
      3.2.13. Inter-AS VPRNs
      3.2.14. VPRN Label Security at Inter-AS Boundary
        3.2.14.1. Feature Configuration
        3.2.14.2. CPM Behavior
        3.2.14.3. Data Path Forwarding Behavior
      3.2.15. Carrier Supporting Carrier (CSC)
        3.2.15.1. Terminology
        3.2.15.2. CSC Connectivity Models
        3.2.15.3. CSC-PE Configuration and Operation
        3.2.15.4. CSC Interface
        3.2.15.5. QoS
        3.2.15.6. MPLS
        3.2.15.7. CSC VPRN Service Configuration
      3.2.16. Node Management Using VPRN
        3.2.16.1. VPRN Management
        3.2.16.2. AAA Management
        3.2.16.3.  SNMP Management
        3.2.16.4. Events and Notifications
        3.2.16.5. DNS Resolution
      3.2.17. Traffic Leaking to GRT
      3.2.18. Traffic Leaking from VPRN to GRT for IPv6
      3.2.19. RIP Metric Propagation in VPRNs
      3.2.20. NTP Within a VPRN Service
      3.2.21. PTP Within a VPRN Service
      3.2.22. VPN Route Label Allocation
        3.2.22.1. Configuring the Service Label Mode
        3.2.22.2. Restrictions and Usage Notes
      3.2.23. VPRN Support for BGP FlowSpec
      3.2.24. MPLS Entropy Label and Hash Label
      3.2.25. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      3.2.26. Route Leaking from the Global Route Table to VPRN Instances
      3.2.27. Class-Based Forwarding of VPN-v4/v6 Prefixes over RSVP-TE or SR-TE LSPs
        3.2.27.1. Feature Configuration
        3.2.27.2. Feature Behavior
    3.3. QoS on Ingress Bindings
    3.4. Multicast in IP-VPN Applications
      3.4.1. Use of Data MDTs
      3.4.2. Multicast Protocols Supported in the Provider Network
      3.4.3. MVPN Membership Auto-discovery using BGP
      3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
      3.4.5. VRF Route Import Extended Community
      3.4.6. Provider Tunnel Support
        3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
        3.4.6.3. P2MP LDP I-PMSI and S-PMSI
        3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
        3.4.6.5. P2MP LSP S-PMSI
        3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
        3.4.6.7. MVPN Sender-only/Receiver-only
        3.4.6.8. S-PMSI Trigger Thresholds
        3.4.6.9. Migration from Existing Rosen Implementation
        3.4.6.10. Policy-based S-PMSI
          3.4.6.10.1. Supported MPLS Tunnels
          3.4.6.10.2. Supported Multicast Features
          3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
          3.4.6.10.4. Configuration Example
        3.4.6.11. Policy-based Data MDT
      3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      3.4.8. Multicast VPN Extranet
        3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
        3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
        3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
        3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
      3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      3.4.11. IPv6 MVPN Support
      3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      3.4.13. NG-MVPN Core Diversity
        3.4.13.1. NG-MVPN to Loopback Interface
        3.4.13.2. NG-MVPN Core Diversity
        3.4.13.3. Configuration Example
      3.4.14. NG-MVPN Multicast Source Geo-Redundancy
      3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
      3.4.16. Inter-AS MVPN
        3.4.16.1. BGP Connector Attribute
        3.4.16.2. PIM RPF Vector
        3.4.16.3. Inter-AS MVPN Option B
        3.4.16.4. Inter-AS MVPN Option C
        3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
          3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
          3.4.16.5.2. Configuration Example
          3.4.16.5.3. Inter-AS Non-segmented MLDP
          3.4.16.5.4. ECMP
      3.4.17.  mLDP Non-Segmented Intra-AS (inter-area) MVPN Solution
        3.4.17.1. Intra-AS and Inter-AS Option B
        3.4.17.2. MVPN Next-Hop Self on ABRs
          3.4.17.2.1. MVPN next-hop-self Policy Example
          3.4.17.2.2. LDP Configuration Example
          3.4.17.2.3. BGP Configuration Example
      3.4.18. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
    3.5. FIB Prioritization
    3.6. Configuring a VPRN Service with CLI
      3.6.1. Basic Configuration
      3.6.2. Common Configuration Tasks
      3.6.3. Configuring VPRN Components
        3.6.3.1. Creating a VPRN Service
        3.6.3.2. Configuring Global VPRN Parameters
        3.6.3.3. Configuring VPRN Log Parameters
          3.6.3.3.1. Configuring a Spoke-SDP
        3.6.3.4. Configuring VPRN Protocols - PIM
          3.6.3.4.1. Configuring Router Interfaces
          3.6.3.4.2. Configuring VPRN Protocols - BGP
          3.6.3.4.3. Configuring VPRN Protocols - RIP
          3.6.3.4.4. Configuring VPRN Protocols - OSPF
          3.6.3.4.5. Configuring a VPRN Interface
          3.6.3.4.6. Configuring Overload State on a Single SFM
          3.6.3.4.7. Configuring a VPRN Interface SAP
    3.7. Service Management Tasks
      3.7.1. Modifying VPRN Service Parameters
      3.7.2. Deleting a VPRN Service
      3.7.3. Disabling a VPRN Service
      3.7.4. Re-enabling a VPRN Service
    3.8.  VPRN Service Configuration Commands
      3.8.1. Command Hierarchies
        3.8.1.1. VPRN Service Configuration Commands
        3.8.1.2. AAA Remote Server Commands
        3.8.1.3. AARP Interface Commands
        3.8.1.4. BGP Configuration Commands
        3.8.1.5. BGP Group Configuration Commands
        3.8.1.6. BGP Group Neighbor Configuration Commands
        3.8.1.7. GSMP Commands
        3.8.1.8. IGMP Commands
        3.8.1.9. Interface Commands
        3.8.1.10. Interface SAP Commands
        3.8.1.11. Interface Spoke SDP Commands
        3.8.1.12. Interface VPLS Commands
        3.8.1.13. Interface VRRP Commands
        3.8.1.14. IS-IS Configuration Commands
        3.8.1.15. L2TP Commands
        3.8.1.16. Log Commands
        3.8.1.17. Management Commands
        3.8.1.18. MLD Configuration Commands
        3.8.1.19. MSDP Configuration Commands
        3.8.1.20. Multicast VPN Commands
        3.8.1.21. Redundant Interface Commands
        3.8.1.22. RIP Configuration Commands
        3.8.1.23. Router Advertisement Commands
        3.8.1.24. NAT Commands
        3.8.1.25. Network Ingress Commands
        3.8.1.26. Network Interface Commands
        3.8.1.27. NTP Commands
        3.8.1.28. OSPF Configuration Commands
        3.8.1.29. PIM Configuration Commands
      3.8.2. Command Descriptions
        3.8.2.1. Generic Commands
        3.8.2.2. Global Commands
        3.8.2.3. AAA Remote Server Commands
        3.8.2.4. AARP Interface Commands
        3.8.2.5. BGP Commands
        3.8.2.6. GSMP Commands
        3.8.2.7. IGMP Commands
        3.8.2.8. Interface Commands
        3.8.2.9. Interface Commands
        3.8.2.10. Interface ETH-CFM Commands
        3.8.2.11. Interface ICMP Commands
        3.8.2.12. Interface SAP Commands
        3.8.2.13. Interface SAP ATM Commands
        3.8.2.14. Interface SAP Filter and QoS Policy Commands
        3.8.2.15. Interface Anti-Spoofing Commands
        3.8.2.16. Interface VPLS Commands
        3.8.2.17. Interface VRRP Commands
        3.8.2.18. IS-IS Commands
        3.8.2.19. L2TP Commands
          3.8.2.19.1. Router L2TP Tunnel Commands
        3.8.2.20. Log Commands
        3.8.2.21. Management Commands
        3.8.2.22. MLD Configuration Commands
        3.8.2.23. MSDP Configuration Commands
        3.8.2.24. Multicast VPN Commands
        3.8.2.25. NAT Commands
        3.8.2.26. Network Ingress Commands
        3.8.2.27. Network Interface Commands
        3.8.2.28. Network Time Protocol Commands
        3.8.2.29. OSPF Commands
        3.8.2.30. PIM Commands
        3.8.2.31. Redundant Interface Commands
        3.8.2.32. RIP Commands
        3.8.2.33. Router Advertisement Commands
        3.8.2.34. SDP Commands
    3.9. VPRN Show, Clear, and Debug Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Show Commands
        3.9.1.2. Clear Commands
        3.9.1.3. Debug Commands
      3.9.2. Command Descriptions
        3.9.2.1. VPRN Show Commands
        3.9.2.2. VPRN Clear Commands
        3.9.2.3. VPRN Debug Commands
    3.10. Tools Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Tools Commands
      3.10.2. Command Descriptions
        3.10.2.1. Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
Log Events Tool
  Log Events Tool
  Log Events Tool
MD-CLI Command Reference 20.7.R1
  MD-CLI Command Reference 20.7.R1
  MD-CLI Command Reference 20.7.R1
MD-CLI User Guide 20.7.R1
  1. MD-CLI Overview
    1.1. Using the MD-CLI
  2. Controlling the Management Interface Configuration Mode
    2.1. Enabling the MD-CLI
    2.2. Switching Between the Classic CLI and MD-CLI Engines
      2.2.1. Executing Classic CLI Commands from the MD-CLI Engine
      2.2.2. MD-CLI and Classic CLI Engine Interactions
      2.2.3. Switching Explicitly to the Classic CLI Engine
      2.2.4. Switching Explicitly to the MD-CLI Engine
  3. Navigating in the MD-CLI
    3.1. The MD-CLI Tree Structure
    3.2. The MD-CLI Command Prompt
    3.3. Environment Commands
      3.3.1. Customizing Per-Session Environment Settings
      3.3.2. Customizing the Session Prompt
        3.3.2.1. Customizing the Uncommitted Changes Indicator
        3.3.2.2. Customizing the Line Preceding the Command Prompt
        3.3.2.3. Customizing the Context Information in the Command Prompt
        3.3.2.4. Customizing the Date and Time Output
      3.3.3. Customizing the Progress Indicator
      3.3.4. Customizing the Pagination Setting
      3.3.5. Customizing the Console Settings
      3.3.6. Customizing the Message Level Security Settings
      3.3.7. Preventing Changes to Environment Settings
    3.4. Using Online Help
      3.4.1. Indicators in the Online Help
        3.4.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
        3.4.1.2. Immutable Elements
        3.4.1.3. Mutually Exclusive Choice Elements
        3.4.1.4. Optional Indicators in the Online Help
    3.5. Operational Root and Global Commands
      3.5.1. Using the oam Commands
        3.5.1.1. OAM EFM Commands
        3.5.1.2. OAM ETH-CFM Commands
        3.5.1.3. OAM OAM-PM Commands
      3.5.2. Using the ping Command
      3.5.3. Using the ssh Command
      3.5.4. Using the telnet Command
      3.5.5. Using the traceroute Command
    3.6. Navigating the MD-CLI Hierarchy Levels
    3.7. Using the tree Command
      3.7.1. Using the flat Option
      3.7.2. Using the detail Option
    3.8. Using Control Characters and Editing Keystrokes on the Command Line
    3.9. Displaying Available Commands using Tab
      3.9.1. Available Commands with Mutually Exclusive Commands
    3.10. Using Command Completion
      3.10.1. Variable Parameter Completion
        3.10.1.1. Completion for Lists with a Default Keyword
        3.10.1.2. Completion for Keyword-based Leaf-lists
        3.10.1.3. Completion for Boolean Elements
    3.11. Modifying the Idle Timeout Value for CLI Sessions
      3.11.1. Idle Timeout Interaction with the Classic CLI
    3.12. Using Output Modifiers in the MD-CLI
      3.12.1. Using | match Options
        3.12.1.1. Using Regular Expressions with | match
      3.12.2. Using the | count Option
      3.12.3. Using the | no-more Option
      3.12.4. Using the File Redirect Option
    3.13. Navigating Contexts in the MD-CLI
      3.13.1. Entering Contexts
      3.13.2. Exiting Contexts
    3.14. Executing Commands from a File
      3.14.1. Using Commands that Switch Engines in an Executable File
    3.15. Displaying Information in the MD-CLI
      3.15.1. Using the info Command
        3.15.1.1. Displaying Lists
      3.15.2. Using show Commands
        3.15.2.1. Classic CLI Command Availability
    3.16. MD-CLI Admin Tree
  4. Configuring in the MD-CLI
    4.1. Configuration Workflow
      4.1.1. MD-CLI Session Modes
      4.1.2. Transactional Configuration Method
      4.1.3. Implicit and Explicit Configuration Workflows
        4.1.3.1. Using the Implicit Configuration Workflow
        4.1.3.2. Using the Explicit Configuration Workflow
        4.1.3.3. Transitioning from an Implicit to an Explicit Configuration Workflow
    4.2. Candidate Configuration Modes
      4.2.1. Multiple Simultaneous Candidate Configurations
      4.2.2. Private Configuration Mode
      4.2.3. Exclusive Configuration Mode
      4.2.4. Global Configuration Mode
      4.2.5. Read-Only Configuration Mode
      4.2.6. Transitioning Between Candidate Configuration Modes
      4.2.7. Exclusive Private Configuration Session
      4.2.8. Restricting Configuration Mode Sessions
    4.3. Modifying the Configuration
    4.4. Adding Configuration Elements
      4.4.1. Default Values for Key Leafs
      4.4.2. Entering Integer Values
      4.4.3. Configuring Lists
        4.4.3.1. System-Ordered Lists
        4.4.3.2. User-Ordered Lists
        4.4.3.3. Special Handling for Lists with all Key Leafs
      4.4.4. Configuring Leaf-Lists
        4.4.4.1. System-Ordered Leaf-Lists
        4.4.4.2. User-Ordered Leaf-Lists
      4.4.5. Configuring Leafs with Units
      4.4.6. Flexible Input for MAC and IPv6 Addresses
      4.4.7. Input Translation
    4.5. Deleting Configuration Elements
      4.5.1. Deleting Leafs
      4.5.2. Deleting Containers
      4.5.3. Deleting List Entries and Lists
        4.5.3.1. Deleting Leaf-List Entries and Leaf-Lists
    4.6. Copying Configuration Elements
    4.7. Committing a Configuration
      4.7.1. Viewing the Uncommitted Configuration Changes
        4.7.1.1. Using the compare Outputs to Copy and Paste
      4.7.2. Discarding Configuration Changes
      4.7.3. Validating the Candidate Configuration
      4.7.4. Updating the Candidate Configuration
        4.7.4.1. Example Update Scenario With Merge Conflicts
        4.7.4.2. Example Update Scenario Without Merge Conflicts
      4.7.5. Committing the Candidate Configuration
        4.7.5.1. Using the commit confirmed Command
          4.7.5.1.1. Non-persistent Operation
          4.7.5.1.2. Persistent Identifier
    4.8. Saving Changes
    4.9. Rolling Back a Configuration from a Checkpoint File
    4.10. Loading a Configuration File
      4.10.1. Using info Outputs in Load Files
    4.11. Using Configuration Groups
      4.11.1. Creating Configuration Groups
        4.11.1.1. Exact Match
        4.11.1.2. Regular Expression Match
          4.11.1.2.1. Regular Expression Match Format
        4.11.1.3. Conflicting Match Criteria Within a Configuration Group
      4.11.2. Applying Configuration Groups
      4.11.3. Inheritance Rules
      4.11.4. Displaying the Expanded Configuration
      4.11.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
      4.11.6. Configuration Group Example
      4.11.7. Caveats
    4.12. Viewing the Status of the Local Datastores
      4.12.1. Unlocking a Locked Datastore
  5. Displaying State Information in the MD-CLI
    5.1. Navigating the State Tree
  6. Troubleshooting
    6.1. Debug commands
    6.2. Logging Debug Events in the MD-CLI
  7. Advanced Tips and Features
    7.1. Discarding Changes in Specific Contexts
  8. Creating MD-CLI Configuration from the Classic CLI
  9. Standards and Protocol Support
  Customer Document and Product Support
  1. MD-CLI Overview
    1.1. Using the MD-CLI
  2. Controlling the Management Interface Configuration Mode
    2.1. Enabling the MD-CLI
    2.2. Switching Between the Classic CLI and MD-CLI Engines
      2.2.1. Executing Classic CLI Commands from the MD-CLI Engine
      2.2.2. MD-CLI and Classic CLI Engine Interactions
      2.2.3. Switching Explicitly to the Classic CLI Engine
      2.2.4. Switching Explicitly to the MD-CLI Engine
  3. Navigating in the MD-CLI
    3.1. The MD-CLI Tree Structure
    3.2. The MD-CLI Command Prompt
    3.3. Environment Commands
      3.3.1. Customizing Per-Session Environment Settings
      3.3.2. Customizing the Session Prompt
        3.3.2.1. Customizing the Uncommitted Changes Indicator
        3.3.2.2. Customizing the Line Preceding the Command Prompt
        3.3.2.3. Customizing the Context Information in the Command Prompt
        3.3.2.4. Customizing the Date and Time Output
      3.3.3. Customizing the Progress Indicator
      3.3.4. Customizing the Pagination Setting
      3.3.5. Customizing the Console Settings
      3.3.6. Customizing the Message Level Security Settings
      3.3.7. Preventing Changes to Environment Settings
    3.4. Using Online Help
      3.4.1. Indicators in the Online Help
        3.4.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
        3.4.1.2. Immutable Elements
        3.4.1.3. Mutually Exclusive Choice Elements
        3.4.1.4. Optional Indicators in the Online Help
    3.5. Operational Root and Global Commands
      3.5.1. Using the oam Commands
        3.5.1.1. OAM EFM Commands
        3.5.1.2. OAM ETH-CFM Commands
        3.5.1.3. OAM OAM-PM Commands
      3.5.2. Using the ping Command
      3.5.3. Using the ssh Command
      3.5.4. Using the telnet Command
      3.5.5. Using the traceroute Command
    3.6. Navigating the MD-CLI Hierarchy Levels
    3.7. Using the tree Command
      3.7.1. Using the flat Option
      3.7.2. Using the detail Option
    3.8. Using Control Characters and Editing Keystrokes on the Command Line
    3.9. Displaying Available Commands using Tab
      3.9.1. Available Commands with Mutually Exclusive Commands
    3.10. Using Command Completion
      3.10.1. Variable Parameter Completion
        3.10.1.1. Completion for Lists with a Default Keyword
        3.10.1.2. Completion for Keyword-based Leaf-lists
        3.10.1.3. Completion for Boolean Elements
    3.11. Modifying the Idle Timeout Value for CLI Sessions
      3.11.1. Idle Timeout Interaction with the Classic CLI
    3.12. Using Output Modifiers in the MD-CLI
      3.12.1. Using | match Options
        3.12.1.1. Using Regular Expressions with | match
      3.12.2. Using the | count Option
      3.12.3. Using the | no-more Option
      3.12.4. Using the File Redirect Option
    3.13. Navigating Contexts in the MD-CLI
      3.13.1. Entering Contexts
      3.13.2. Exiting Contexts
    3.14. Executing Commands from a File
      3.14.1. Using Commands that Switch Engines in an Executable File
    3.15. Displaying Information in the MD-CLI
      3.15.1. Using the info Command
        3.15.1.1. Displaying Lists
      3.15.2. Using show Commands
        3.15.2.1. Classic CLI Command Availability
    3.16. MD-CLI Admin Tree
  4. Configuring in the MD-CLI
    4.1. Configuration Workflow
      4.1.1. MD-CLI Session Modes
      4.1.2. Transactional Configuration Method
      4.1.3. Implicit and Explicit Configuration Workflows
        4.1.3.1. Using the Implicit Configuration Workflow
        4.1.3.2. Using the Explicit Configuration Workflow
        4.1.3.3. Transitioning from an Implicit to an Explicit Configuration Workflow
    4.2. Candidate Configuration Modes
      4.2.1. Multiple Simultaneous Candidate Configurations
      4.2.2. Private Configuration Mode
      4.2.3. Exclusive Configuration Mode
      4.2.4. Global Configuration Mode
      4.2.5. Read-Only Configuration Mode
      4.2.6. Transitioning Between Candidate Configuration Modes
      4.2.7. Exclusive Private Configuration Session
      4.2.8. Restricting Configuration Mode Sessions
    4.3. Modifying the Configuration
    4.4. Adding Configuration Elements
      4.4.1. Default Values for Key Leafs
      4.4.2. Entering Integer Values
      4.4.3. Configuring Lists
        4.4.3.1. System-Ordered Lists
        4.4.3.2. User-Ordered Lists
        4.4.3.3. Special Handling for Lists with all Key Leafs
      4.4.4. Configuring Leaf-Lists
        4.4.4.1. System-Ordered Leaf-Lists
        4.4.4.2. User-Ordered Leaf-Lists
      4.4.5. Configuring Leafs with Units
      4.4.6. Flexible Input for MAC and IPv6 Addresses
      4.4.7. Input Translation
    4.5. Deleting Configuration Elements
      4.5.1. Deleting Leafs
      4.5.2. Deleting Containers
      4.5.3. Deleting List Entries and Lists
        4.5.3.1. Deleting Leaf-List Entries and Leaf-Lists
    4.6. Copying Configuration Elements
    4.7. Committing a Configuration
      4.7.1. Viewing the Uncommitted Configuration Changes
        4.7.1.1. Using the compare Outputs to Copy and Paste
      4.7.2. Discarding Configuration Changes
      4.7.3. Validating the Candidate Configuration
      4.7.4. Updating the Candidate Configuration
        4.7.4.1. Example Update Scenario With Merge Conflicts
        4.7.4.2. Example Update Scenario Without Merge Conflicts
      4.7.5. Committing the Candidate Configuration
        4.7.5.1. Using the commit confirmed Command
          4.7.5.1.1. Non-persistent Operation
          4.7.5.1.2. Persistent Identifier
    4.8. Saving Changes
    4.9. Rolling Back a Configuration from a Checkpoint File
    4.10. Loading a Configuration File
      4.10.1. Using info Outputs in Load Files
    4.11. Using Configuration Groups
      4.11.1. Creating Configuration Groups
        4.11.1.1. Exact Match
        4.11.1.2. Regular Expression Match
          4.11.1.2.1. Regular Expression Match Format
        4.11.1.3. Conflicting Match Criteria Within a Configuration Group
      4.11.2. Applying Configuration Groups
      4.11.3. Inheritance Rules
      4.11.4. Displaying the Expanded Configuration
      4.11.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
      4.11.6. Configuration Group Example
      4.11.7. Caveats
    4.12. Viewing the Status of the Local Datastores
      4.12.1. Unlocking a Locked Datastore
  5. Displaying State Information in the MD-CLI
    5.1. Navigating the State Tree
  6. Troubleshooting
    6.1. Debug commands
    6.2. Logging Debug Events in the MD-CLI
  7. Advanced Tips and Features
    7.1. Discarding Changes in Specific Contexts
  8. Creating MD-CLI Configuration from the Classic CLI
  9. Standards and Protocol Support
  Customer Document and Product Support
MD-CLI Quick Reference Guide
  1. MD-CLI Overview
    1.1. Enabling the SR OS MD-CLI
    1.2. Disabling the SR OS MD-CLI
  2. Navigational and Operational Commands
  3. Entering and Leaving the Configuration Workflow
  4. Configuration Workflow Commands
    4.1. Commit Confirmed Commands
    4.2. Configuration Management Commands
  5. Output Modifiers
  Customer Document and Product Support
  1. MD-CLI Overview
    1.1. Enabling the SR OS MD-CLI
    1.2. Disabling the SR OS MD-CLI
  2. Navigational and Operational Commands
  3. Entering and Leaving the Configuration Workflow
  4. Configuration Workflow Commands
    4.1. Commit Confirmed Commands
    4.2. Configuration Management Commands
  5. Output Modifiers
  Customer Document and Product Support
MPLS Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia Router Configuration Process
  2. MPLS and RSVP
    2.1. MPLS
      2.1.1. MPLS Label Stack
        2.1.1.1. Label Values
        2.1.1.2. Reserved Label Blocks
      2.1.2. MPLS Entropy Label and Hash Label
        2.1.2.1. Hash Label
        2.1.2.2. Entropy Label
        2.1.2.3. Inserting and Processing the Entropy Label at LERs and LSRs
          2.1.2.3.1. Ingress LER
          2.1.2.3.2. LSR
          2.1.2.3.3. Egress LER
        2.1.2.4. Mapping Entropy Label Capability at LSP Stitching Points
        2.1.2.5. Entropy Label on OAM Packets
        2.1.2.6. Impact of EL and ELI on MTU and Label Stack Depth
      2.1.3. Label Switching Routers
        2.1.3.1. LSP Types
      2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
        2.1.4.1. Bootstrapping and Maintaining the BFD Session
        2.1.4.2. LSP BFD Configuration
        2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
        2.1.4.4. BFD Configuration on RSVP-TE LSPs
        2.1.4.5. Using LSP BFD for LSP Path Protection
          2.1.4.5.1. Failure-action down
          2.1.4.5.2. Failure-action failover
          2.1.4.5.3. LSP Active Path Failover Triggers
        2.1.4.6. MPLS/RSVP on Broadcast Interface
      2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
      2.1.6. Manual Bypass LSP
        2.1.6.1. PLR Bypass LSP Selection Rules
        2.1.6.2. FRR Facility Background Evaluation Task
      2.1.7. Uniform FRR Failover Time
      2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
        2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
        2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
        2.1.8.3. Measurement of LSP Bandwidth
        2.1.8.4. Passive Monitoring of LSP Bandwidth
        2.1.8.5. Periodic Automatic Bandwidth Adjustment
        2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
        2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
        2.1.8.8. Operational Bandwidth Carryover between Active Paths
      2.1.9. LSP Failure Codes
      2.1.10. Labeled Traffic Statistics
        2.1.10.1. Interface Statistics
        2.1.10.2. Traffic Statistics for Stacked Tunnels
        2.1.10.3. Traffic Statistics Details and Scale
        2.1.10.4. RSVP-TE and MPLS-TP Traffic Statistics
        2.1.10.5. MPLS Forwarding Policy Statistics
        2.1.10.6. gRPC-based RIB API Statistics
        2.1.10.7. Segment Routing Statistics
        2.1.10.8. SR-TE LSP Statistics
        2.1.10.9. SR Policy Statistics
    2.2. RSVP
      2.2.1. Using RSVP for MPLS
        2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
        2.2.1.2. Hello Protocol
        2.2.1.3. MD5 Authentication of RSVP Interface
        2.2.1.4. Configuring Authentication using Keychains
      2.2.2. Reservation Styles
        2.2.2.1. RSVP Message Pacing
      2.2.3. RSVP Overhead Refresh Reduction
      2.2.4. RSVP Graceful Restart Helper
      2.2.5. Enhancements to RSVP Control Plane Congestion Control
      2.2.6. BFD for RSVP-TE
      2.2.7. RSVP-TE LSP Statistics
      2.2.8. P2MP RSVP-TE LSP Statistics
        2.2.8.1. Configuring RSVP P2MP LSP Egress Statistics
        2.2.8.2. Configuring RSVP P2MP LSP Ingress Statistics
        2.2.8.3. Configuring Implicit Null
      2.2.9. Using Unnumbered Point-to-Point Interface in RSVP
        2.2.9.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
    2.3. MPLS Transport Profile
      2.3.1. MPLS-TP Model
      2.3.2. MPLS-TP Provider Edge and Gateway
        2.3.2.1. VLL Services
        2.3.2.2. Spoke SDP Termination
      2.3.3. MPLS-TP LSR
      2.3.4. Detailed Descriptions of MPLS-TP
        2.3.4.1. MPLS-TP LSPs
        2.3.4.2. MPLS-TP on Pseudowires
      2.3.5. MPLS-TP Maintenance Identifiers
        2.3.5.1. Generic Associated Channel
        2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
          2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
          2.3.5.2.2. Proactive CC, CV and RDI
          2.3.5.2.3. BFD-based RDI
        2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        2.3.5.4. PW Control Channel Status Request Mechanism
        2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
        2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
        2.3.5.7. MPLS-TP LSP Protection
      2.3.6. Alarm Indication Signal (AIS)
      2.3.7. Configuring MPLS-TP
        2.3.7.1. Configuration Overview
        2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
        2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
        2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        2.3.7.5. Interface Configuration for MPLS-TP
        2.3.7.6. LER Configuration for MPLS-TP
          2.3.7.6.1. LSP and Path Configuration
          2.3.7.6.2. Support for Downstream Mapping Information
          2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
          2.3.7.6.4. Protection templates and Linear Protection Configuration
        2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
      2.3.8. MPLS-TP Show Commands
        2.3.8.1. Static MPLS Labels
        2.3.8.2. MPLS-TP Tunnel Configuration
        2.3.8.3. MPLS-TP Path configuration
        2.3.8.4. MPLS-TP Protection
        2.3.8.5. MPLS TP Node Configuration
        2.3.8.6. MPLS-TP Interfaces
      2.3.9. MPLS-TP Debug Commands
    2.4. Traffic Engineering
      2.4.1. TE Metric (IS-IS and OSPF)
      2.4.2. Admin Group Support on Facility Bypass Backup LSP
        2.4.2.1. Procedures at Head-End Node
        2.4.2.2. Procedures at PLR Node
      2.4.3. Manual and Timer Resignal of RSVP-TE Bypass LSP
        2.4.3.1. RSVP-TE Bypass LSP Path SRLG Information Update in Manual and Timer Resignal MBB
        2.4.3.2. RSVP-TE Bypass LSP Path Administrative Group Information Update in Manual and Timer Resignal MBB
      2.4.4. RSVP-TE LSP Active Path Administrative Group Information Update in Timer Resignal MBB
      2.4.5. Diff-Serv Traffic Engineering
        2.4.5.1. Mapping of Traffic to a Diff-Serv LSP
        2.4.5.2. Admission Control of Classes
          2.4.5.2.1. Maximum Allocation Model
          2.4.5.2.2. Russian Doll Model
        2.4.5.3. RSVP Control Plane Extensions
        2.4.5.4. IGP Extensions
        2.4.5.5. Diff-Serv TE Configuration and Operation
          2.4.5.5.1. RSVP Protocol Level
          2.4.5.5.2. RSVP Interface Level
          2.4.5.5.3. LSP and LSP Path Levels
      2.4.6. Diff-Serv TE LSP Class Type Change under Failure
        2.4.6.1. LSP Primary Path Retry Procedures
        2.4.6.2. Bandwidth Sharing Across Class Types
        2.4.6.3. Downgrading the CT of Bandwidth Sharing LSP Paths
        2.4.6.4. Upgrading the CT of Bandwidth Sharing LSP Paths
    2.5. IPv6 Traffic Engineering
      2.5.1. Global Configuration
      2.5.2. IS-IS Configuration
      2.5.3. MPLS Configuration
      2.5.4. IS-IS, BGP-LS and TE Database Extensions
        2.5.4.1. BGP-LS Originator Node Handling of TE Attributes
        2.5.4.2. TE Attributes Supported in IGP and BGP-LS
      2.5.5. IS-IS IPv4/IPv6 SR-TE and IPv4 RSVP-TE Feature Behavior
      2.5.6. IPv6 SR-TE LSP Support in MPLS
        2.5.6.1. IPv6 SR-TE auto-LSP
    2.6. Advanced MPLS/RSVP Features
      2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
      2.6.2. LSP Path Change
      2.6.3. Manual LSP Path Switch
      2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      2.6.5. Automatic Creation of RSVP-TE LSP Mesh
        2.6.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
          2.6.5.1.1. Feature Configuration
          2.6.5.1.2. Feature Behavior
          2.6.5.1.3. Multi-Area and Multi-Instance Support
          2.6.5.1.4. Mesh LSP Name Encoding and Statistics
        2.6.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
          2.6.5.2.1. Feature Configuration
          2.6.5.2.2. Feature Behavior
      2.6.6. IGP Shortcut and Forwarding Adjacency
        2.6.6.1. IGP Shortcut Feature Configuration
          2.6.6.1.1. IGP Shortcut Binding Construct
        2.6.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
          2.6.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
          2.6.6.2.2. Application Support
          2.6.6.2.3. Loop-free Alternate (LFA) Protection Support
        2.6.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
          2.6.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
          2.6.6.3.2. Application Support
          2.6.6.3.3. Loop-free Alternate (LFA) Protection Support
        2.6.6.4. Using LSP Relative Metric with IGP Shortcut
        2.6.6.5. ECMP Considerations
        2.6.6.6. Handling of Control Packets
        2.6.6.7. Forwarding Adjacency
        2.6.6.8. LDP Forwarding over IGP Shortcut
        2.6.6.9. LDP Forwarding over Static Route Shortcut Tunnels
        2.6.6.10. Handling of Multicast Packets
        2.6.6.11. MPLS Entropy Label on Shortcut Tunnels
      2.6.7. Disabling TTL Propagation in an LSP Shortcut
      2.6.8. RSVP-TE LSP Signaling using LSP Template
      2.6.9. Shared Risk Link Groups
        2.6.9.1. Enabling Disjoint Backup Paths
        2.6.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
        2.6.9.3. Static Configurations of SRLG Memberships
      2.6.10. TE Graceful Shutdown
      2.6.11. Soft Preemption of Diff-Serv RSVP LSP
      2.6.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
      2.6.13. Inter-Area TE LSP (ERO Expansion Method)
        2.6.13.1. Area Border Node FRR Protection for Inter-Area LSP
          2.6.13.1.1. Rerouting of Inter-Area LSP
          2.6.13.1.2. Behavior of MPLS Options in Inter-Area LSP
        2.6.13.2. Inter-Area LSP support of OSPF Virtual Links
        2.6.13.3. Area Border Node FRR Protection for Inter-Area LSP
      2.6.14. Timer-based Reversion for RSVP-TE LSPs
      2.6.15. LSP Tagging and Auto-Bind Using Tag Information
        2.6.15.1. Internal Route Color to LSP Color Matching Algorithm
        2.6.15.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
        2.6.15.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
      2.6.16. LSP Self Ping
        2.6.16.1. Detailed Behavior of LSP Self Ping
        2.6.16.2. Considerations for Scaled Scenarios
      2.6.17. Accounting for Dark Bandwidth
    2.7. Point-to-Multipoint (P2MP) RSVP LSP
      2.7.1. Application in Video Broadcast
      2.7.2. P2MP LSP Data Plane
        2.7.2.1. Procedures at Ingress LER Node
        2.7.2.2. Procedures at LSR Node
        2.7.2.3. Procedures at Branch LSR Node
        2.7.2.4. Procedures at Egress LER Node
        2.7.2.5. Procedures at BUD LSR Node
      2.7.3. Ingress Path Management for P2MP LSP Packets
        2.7.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
      2.7.4. RSVP Control Plane in a P2MP LSP
      2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        2.7.5.1. Procedures at Ingress LER Node
        2.7.5.2. Procedures at Egress LER Node
          2.7.5.2.1. Procedures with a Primary Tunnel Interface
    2.8. Segment Routing With Traffic Engineering (SR-TE)
      2.8.1. SR-TE Support
      2.8.2. SR-TE LSP Instantiation
        2.8.2.1. PCC-Initiated and PCC-Controlled LSP
          2.8.2.1.1. Guidelines for PCC-Initiated and PCC-Controlled LSPs
        2.8.2.2. PCC-Initiated and PCE-Computed or Controlled LSP
      2.8.3. SR-TE LSP Path Computation
        2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
      2.8.4. SR-TE LSP Path Computation Using Hop-to-Label Translation
      2.8.5. SR-TE LSP Path Computation Using Local CSPF
        2.8.5.1. Extending MPLS and TE Database CSPF Support to SR-TE LSP
        2.8.5.2. SR-TE Specific TE-DB Changes
        2.8.5.3. SR-TE LSP and Auto-LSP-Specific CSPF Changes
          2.8.5.3.1. SR-TE LSP Path Protection
          2.8.5.3.2. SR-TE LSP Path Label Stack Reduction
          2.8.5.3.3. Interaction with SR-TE LSP Path Protection
          2.8.5.3.4. Examples of SR-TE LSP Path Label Stack Reduction
      2.8.6. SR-TE LSP Paths using Explicit SIDs
      2.8.7. SR-TE LSP Protection
        2.8.7.1. Local Protection
        2.8.7.2. End to End Protection
      2.8.8. Seamless BFD for SR-TE LSPs
        2.8.8.1. Configuration of S-BFD on SR-TE LSPs
        2.8.8.2. Support for BFD Failure Action with SR-TE LSPs
          2.8.8.2.1. SR-TE LSP State Changes and Failure Actions Based on S-BFD
        2.8.8.3. S-BFD Operational Considerations
      2.8.9. Static Route Resolution using SR-TE LSP
      2.8.10. BGP Shortcuts Using SR-TE LSP
      2.8.11. BGP Label Route Resolution Using SR-TE LSP
      2.8.12. Service Packet Forwarding using SR-TE LSP
      2.8.13. Data Path Support
        2.8.13.1. SR-TE LSP Metric and MTU Settings
        2.8.13.2. LSR Hashing on SR-TE LSPs
      2.8.14. SR-TE Auto-LSP
        2.8.14.1. Feature Configuration
        2.8.14.2. Automatic Creation of an SR-TE Mesh LSP
        2.8.14.3. Automatic Creation of an SR-TE One-Hop LSP
        2.8.14.4. Interaction with PCEP
        2.8.14.5. Forwarding Contexts Supported with SR-TE Auto-LSP
      2.8.15. SR-TE LSP Traffic Statistics
    2.9. MPLS Service Usage
      2.9.1. Service Distribution Paths
    2.10. MPLS/RSVP Configuration Process Overview
    2.11. Configuration Notes
    2.12. Configuring MPLS and RSVP with CLI
      2.12.1. MPLS Configuration Overview
        2.12.1.1. LSPs
        2.12.1.2. Paths
        2.12.1.3. Router Interface
        2.12.1.4. Choosing the Signaling Protocol
      2.12.2. Basic MPLS Configuration
      2.12.3. Common Configuration Tasks
      2.12.4. Configuring MPLS Components
        2.12.4.1. Configuring Global MPLS Parameters
        2.12.4.2. Configuring an MPLS Interface
        2.12.4.3. Configuring MPLS Paths
        2.12.4.4. Configuring an MPLS LSP
        2.12.4.5. Configuring a Static LSP
        2.12.4.6. Configuring Manual Bypass Tunnels
        2.12.4.7. Configuring RSVP Parameters
        2.12.4.8. Configure RSVP Message Pacing Parameters
        2.12.4.9. Configuring Graceful Shutdown
    2.13. MPLS Configuration Management Tasks
      2.13.1. Deleting MPLS
      2.13.2. Modifying MPLS Parameters
      2.13.3. Modifying an MPLS LSP
      2.13.4. Modifying MPLS Path Parameters
      2.13.5. Modifying MPLS Static LSP Parameters
      2.13.6. Deleting an MPLS Interface
    2.14. RSVP Configuration Management Tasks
      2.14.1. Modifying RSVP Parameters
      2.14.2. Modifying RSVP Message Pacing Parameters
      2.14.3. Deleting an Interface from RSVP
    2.15. Configuring and Operating SR-TE
      2.15.1. SR-TE Configuration Prerequisites
      2.15.2. SR-TE LSP Configuration Overview
      2.15.3. Configuring Path Computation and Control for SR-TE LSP
        2.15.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
      2.15.4. Configuring SR-TE LSP Label Stack Size
      2.15.5. Configuring Adjacency SID Parameters
      2.15.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
      2.15.7. Configuring a Mesh of SR-TE Auto-LSPs
    2.16. MPLS/RSVP Configuration Command Reference
      2.16.1. Command Hierarchies
        2.16.1.1. MPLS Commands
        2.16.1.2. MPLS-TP Commands
        2.16.1.3. MPLS-Label Commands
        2.16.1.4. LSP Commands
        2.16.1.5. LSP-BFD Commands
        2.16.1.6. RIB-API Commands
        2.16.1.7. MPLS Path Commands
        2.16.1.8. RSVP Commands
      2.16.2. Command Descriptions
        2.16.2.1. MPLS Commands
          2.16.2.1.1. Generic Commands
          2.16.2.1.2. MPLS Commands
          2.16.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
        2.16.2.2. RSVP Commands
          2.16.2.2.1. Generic Commands
          2.16.2.2.2. RSVP Commands
          2.16.2.2.3. Interface Commands
          2.16.2.2.4. Message Pacing Commands
    2.17. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      2.17.1. Command Hierarchies
        2.17.1.1. Show Commands
        2.17.1.2. Tools Commands
        2.17.1.3. Router Commands
        2.17.1.4. Clear Commands
        2.17.1.5. Debug Commands
      2.17.2. Command Descriptions
        2.17.2.1. Show Commands
        2.17.2.2. Show MPLS-Labels Commands
        2.17.2.3. Show Router Seamless-BFD Commands
        2.17.2.4. Show Router BFD session Commands
        2.17.2.5. Show RSVP Commands
        2.17.2.6. Tools Commands
        2.17.2.7. Clear Commands
        2.17.2.8. Debug Commands
  3. GMPLS
    3.1. GMPLS
      3.1.1. Example Applications
        3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
        3.1.1.2. Use Case 2: Multi-Layer Resiliency
    3.2. GMPLS UNI Architecture
      3.2.1. Addressing and End-to-End gLSP Architecture
    3.3. 1830 PSS Identifiers
    3.4. Recovery Reference Models
      3.4.1. End to End Recovery (IP-layer)
      3.4.2. End to End ECMP
      3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      3.4.4. End to End Recovery (GMPLS Layer)
        3.4.4.1. Unprotected gLSP
        3.4.4.2. Full LSP Rerouting
        3.4.4.3. 1: N Protection
        3.4.4.4. Optical Segment Recovery
    3.5. GMPLS Configuration Overview
    3.6. LMP and IPCC Configuration
      3.6.1. Configuration of IP Communication Channels for LMP and RSVP
      3.6.2. Configuring LMP
      3.6.3. Configuring Traffic Engineering Links and Data Bearers
    3.7. Configuring MPLS Paths for GMPLS
    3.8. Configuring RSVP in GMPLS
    3.9. Configuring a GMPLS LSP on the UNI
      3.9.1. gLSP Constraints
    3.10. Bandwidth
    3.11. Shared Risk Link Groups
    3.12. Optical Network Segment Recovery
    3.13. Configuration of End-to-End GMPLS Recovery
    3.14. GMPLS Tunnel Groups
    3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    3.16. Configuration Notes
    3.17. GMPLS Configuration Command Reference
      3.17.1. Command Hierarchies
        3.17.1.1. LMP Commands
        3.17.1.2. GMPLS Commands
        3.17.1.3. GMPLS Tunnel Group Commands
      3.17.2. Command Descriptions
        3.17.2.1. LMP Commands
        3.17.2.2. GMPLS Commands
          3.17.2.2.1. GMPLS Tunnel Group Commands
    3.18. Show, Clear, Debug, and Tools Command Reference
      3.18.1. Command Hierarchies
        3.18.1.1. Show Commands
        3.18.1.2. Clear Commands
        3.18.1.3. Debug Commands
        3.18.1.4. Tools Commands
      3.18.2. Command Descriptions
        3.18.2.1. Show Commands
        3.18.2.2. Clear Commands
        3.18.2.3. Debug Commands
        3.18.2.4. Tools Commands
  4. MPLS Forwarding Policy
    4.1. Introduction to MPLS Forward Policy
    4.2. Feature Validation and Operation Procedures
      4.2.1. Policy Parameters and Validation Procedure Rules
      4.2.2. Policy Resolution and Operational Procedures
    4.3. Tunnel Table Handling of MPLS Forwarding Policy
    4.4. Data Path Support
      4.4.1. NHG of Resolution Type Indirect
      4.4.2. NHG of Resolution Type Direct
        4.4.2.1. Active Path Determination and Failover in a NHG of Resolution Type Direct
      4.4.3. Spraying of Packets in a MPLS Forwarding Policy
      4.4.4. Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
      4.4.5. Ethertype Setting and TTL Handling in Endpoint Policy
    4.5. Weighted ECMP Enabling and Validation Rules
    4.6. Statistics
      4.6.1. Ingress Statistics
      4.6.2. Egress Statistics
    4.7. Configuring Static Label Routes using MPLS Forwarding Policy
      4.7.1. Steering Flows to an Indirect Next-Hop
      4.7.2. Steering Flows to a Direct Next-Hop
    4.8. MPLS Forwarding Policy Configuration Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. MPLS Forwarding Policy Commands
      4.8.2. Command Descriptions
        4.8.2.1. MPLS Forwarding Policy Commands
    4.9. MPLS Forwarding Policy Show Command Reference
      4.9.1. Command Hierarchies
        4.9.1.1. Show Commands
        4.9.1.2. Clear Commands
        4.9.1.3. Monitor Commands
      4.9.2. Command Descriptions
        4.9.2.1. Show Commands
        4.9.2.2. Clear Commands
        4.9.2.3. Monitor Commands
  5. PCEP
    5.1. Introduction to the Path Computation Element Protocol (PCEP)
      5.1.1. PCC and PCE Configuration
      5.1.2. Base Implementation of Path Computation Elements (PCE)
      5.1.3. PCEP Session Establishment and Maintenance
      5.1.4. PCEP Parameters
        5.1.4.1. Stateful PCE
        5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
        5.1.4.3. LSP Initiation
          5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
          5.1.4.3.2. PCE-Initiated LSPs
          5.1.4.3.3. LSP Instantiation Using PCEP
          5.1.4.3.4. LSP Deletion Using PCEP
          5.1.4.3.5. Dynamic State Handling for PCE Initiated LSPs
          5.1.4.3.6. PCEP Support for RSVP-TE LSP
          5.1.4.3.7. LSP Path Diversity and Bidirectionality Constraints
    5.2. NSP and VSR-NRC PCE Redundancy
      5.2.1. Feature Configuration
      5.2.2. Feature Behavior
        5.2.2.1. NSP Cluster Behavior
        5.2.2.2. VSR-NRC Behavior
        5.2.2.3. PCC Behavior
    5.3. Configuring and Operating RSVP-TE LSP with PCEP
    5.4. PCEP Configuration Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. PCEP Commands
      5.4.2. Command Descriptions
        5.4.2.1. PCEP Commands
    5.5. PCEP Show and Tools Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Show Commands
        5.5.1.2. Tools Commands
      5.5.2. Command Descriptions
        5.5.2.1. Show Commands
        5.5.2.2. Tools Commands
  6. Segment Routing Policies
    6.1. Statically-Configured Segment Routing Policies
    6.2. BGP Signaled Segment Routing Policies
    6.3. Segment Routing Policy Path Selection and Tie-Breaking
    6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
      6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
      6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
      6.4.5. Resolving EVPN-MPLS Routes to Segment Routing Policy Tunnels
      6.4.6. VPRN Auto-Bind-Tunnel Using Segment Routing Policy Tunnels
    6.5. Traffic Statistics
  7. Label Distribution Protocol
    7.1. Label Distribution Protocol
      7.1.1. LDP and MPLS
      7.1.2. LDP Architecture
      7.1.3. Subsystem Interrelationships
        7.1.3.1. Memory Manager and LDP
        7.1.3.2. Label Manager
        7.1.3.3. LDP Configuration
        7.1.3.4. Logger
        7.1.3.5. Service Manager
      7.1.4. Execution Flow
        7.1.4.1. Initialization
        7.1.4.2. Session Lifetime
          7.1.4.2.1. Adjacency Establishment
          7.1.4.2.2. Session Establishment
      7.1.5. Label Exchange
        7.1.5.1. Other Reasons for Label Actions
        7.1.5.2. Cleanup
        7.1.5.3. Configuring Implicit Null Label
      7.1.6. Global LDP Filters
        7.1.6.1. Per LDP Peer FEC Import and Export Policies
      7.1.7. Configuring Multiple LDP LSR ID
        7.1.7.1. Advertisement of FEC for Local LSR ID
      7.1.8. Extend LDP policies to mLDP
        7.1.8.1. Recursive FEC behavior
        7.1.8.2. Import Policy
      7.1.9. LDP FEC Resolution Per Specified Community
        7.1.9.1. Configuration
        7.1.9.2. Operation
      7.1.10. T-LDP hello reduction
      7.1.11. Tracking a T-LDP Peer with BFD
      7.1.12. Link LDP Hello Adjacency Tracking with BFD
      7.1.13. LDP LSP Statistics
      7.1.14. MPLS Entropy Label
      7.1.15. Importing LDP Tunnels to Non-Host Prefixes to TTM
    7.2. TTL Security for BGP and LDP
    7.3. ECMP Support for LDP
      7.3.1. Label Operations
      7.3.2. Weighted ECMP Support for LDP
    7.4. Unnumbered Interface Support in LDP
      7.4.1. Feature Configuration
      7.4.2. Operation of LDP over an Unnumbered IP Interface
        7.4.2.1. Link LDP
        7.4.2.2. Targeted LDP
        7.4.2.3. FEC Resolution
    7.5. LDP over RSVP Tunnels
      7.5.1. Signaling and Operation
        7.5.1.1. LDP Label Distribution and FEC Resolution
        7.5.1.2. Default FEC Resolution Procedure
        7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      7.5.2. Rerouting Around Failures
        7.5.2.1. LDP-over-RSVP Tunnel Protection
        7.5.2.2. ABR Protection
    7.6. LDP over RSVP Without Area Boundary
      7.6.1. LDP over RSVP and ECMP
    7.7. Weighted Load Balancing for LDP over RSVP
      7.7.1. Interaction with Class-Based Forwarding
    7.8. Class-based Forwarding of LDP Prefix Packets over IGP Shortcuts
      7.8.1. Configuration and Operation
        7.8.1.1. LSR and/or LER Roles with FC-to-Set Configuration
    7.9. LDP ECMP Uniform Failover
    7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
      7.10.1. LDP FRR Configuration
        7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
      7.10.2. LDP FRR Procedures
        7.10.2.1. ECMP Considerations
        7.10.2.2. LDP FRR and LDP Shortcut
        7.10.2.3. LDP FRR and LDP-over-RSVP
        7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
      7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
        7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    7.11. LDP FEC to BGP Label Route Stitching
      7.11.1. Configuration
      7.11.2. Detailed LDP FEC Resolution
      7.11.3. Detailed BGP Labeled Route Resolution
      7.11.4. Data Plane Forwarding
    7.12. LDP-SR Stitching for IPv4 prefixes
      7.12.1. LDP-SR Stitching Configuration
      7.12.2. Stitching in the LDP-to-SR Direction
      7.12.3. Stitching in the SR-to-LDP Direction
    7.13. LDP FRR LFA Backup using SR Tunnel for IPv4 Prefixes
    7.14. LDP Remote LFA
    7.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
      7.15.1. Feature Configuration
      7.15.2. Feature Behavior
    7.16. Multicast P2MP LDP for GRT
    7.17. LDP P2MP Support
      7.17.1. LDP P2MP Configuration
      7.17.2. LDP P2MP Protocol
      7.17.3. Make Before Break (MBB)
      7.17.4. ECMP Support
      7.17.5. Inter-AS Non-segmented mLDP
        7.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
        7.17.5.2. LDP Recursive FEC Process
        7.17.5.3. Supported Recursive Opaque Values
        7.17.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
        7.17.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
          7.17.5.5.1. Leaf and ABR Behavior
          7.17.5.5.2. Intra-AS Support
          7.17.5.5.3. Opaque Type Behavior with Basic FEC Generation
          7.17.5.5.4. Inter-AS Support
        7.17.5.6. Redundancy and Resiliency
        7.17.5.7. ASBR Physical Connection
        7.17.5.8. OAM
        7.17.5.9. ECMP Support
          7.17.5.9.1. ECMP Hash Algorithm
        7.17.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
      7.17.6. Intra-AS Non-segmented mLDP
        7.17.6.1. ABR MoFRR for Intra-AS
        7.17.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
        7.17.6.3. Intra-AS/Inter-AS Option B
      7.17.7. ASBR MoFRR
        7.17.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
        7.17.7.2. ASBR MoFRR Leaf Behavior
        7.17.7.3. ASBR MoFRR ASBR Behavior
        7.17.7.4. MoFRR Root AS Behavior
        7.17.7.5. Traffic Flow
        7.17.7.6. Failure Detection and Handling
        7.17.7.7. Failure Scenario
        7.17.7.8. ASBR MoFRR Consideration
        7.17.7.9. ASBR MoFRR Opaque Support
      7.17.8. MBB for MoFRR
      7.17.9. Add-path for Route Reflectors
    7.18. Multicast LDP Fast Upstream Switchover
      7.18.1. Feature Configuration
      7.18.2. Feature Behavior
      7.18.3. Uniform Failover from Primary to Backup ILM
    7.19. Multi-Area and Multi-Instance Extensions to LDP
      7.19.1. LDP Shortcut for BGP Next-Hop Resolution
      7.19.2. LDP Shortcut for IGP Routes
        7.19.2.1. LDP Shortcut Configuration
        7.19.2.2. IGP Route Resolution
        7.19.2.3. LDP Shortcut Forwarding Plane
      7.19.3. ECMP Considerations
      7.19.4. Disabling TTL Propagation in an LSP Shortcut
    7.20. LDP Graceful Handling of Resource Exhaustion
      7.20.1. LDP Base Graceful Handling of Resources
    7.21. LDP Enhanced Graceful Handling of Resources
      7.21.1. LSR Overload Notification
      7.21.2. LSR Overload Protection Capability
      7.21.3. Procedures for LSR overload protection
    7.22. LDP-IGP Synchronization
    7.23. MLDP Resolution using Multicast RTM
      7.23.1. Other Considerations for Multicast RTM MLDP Resolution
    7.24. Bidirectional Forwarding Detection for LDP LSPs
      7.24.1. Bootstrapping and Maintaining LSP BFD Sessions
      7.24.2. BFD Configuration on LDP LSPs
    7.25. User Guidelines and Troubleshooting Procedures
      7.25.1. Common Procedures
      7.25.2. Base Resource Handling Procedures
      7.25.3. Enhanced Resource Handling Procedures
    7.26. LDP IPv6 Control and Data Planes
      7.26.1. LDP Operation in an IPv6 Network
      7.26.2. Link LDP
      7.26.3. Targeted LDP
      7.26.4. FEC Resolution
      7.26.5. LDP Session Capabilities
      7.26.6. LDP Adjacency Capabilities
      7.26.7. Address and FEC Distribution
      7.26.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      7.26.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      7.26.10. IGP and Static Route Synchronization with LDP
      7.26.11. BFD Operation
      7.26.12. Services Using SDP with an LDP IPv6 FEC
      7.26.13. Mirror Services and Lawful Intercept
        7.26.13.1. Configuration at mirror source node
        7.26.13.2. Configuration at mirror destination node
      7.26.14. Static Route Resolution to a LDP IPv6 FEC
      7.26.15. IGP Route Resolution to a LDP IPv6 FEC
      7.26.16. OAM Support with LDP IPv6
      7.26.17. LDP IPv6 Interoperability Considerations
        7.26.17.1. Interoperability with Implementations Compliant with RFC 7552
        7.26.17.2. LDP IPv6 32-bit LSR-ID
          7.26.17.2.1. Feature Configuration
          7.26.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
          7.26.17.2.3. Migration Considerations
        7.26.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    7.27. LDP Process Overview
    7.28. Configuring LDP with CLI
      7.28.1. LDP Configuration Overview
      7.28.2. Basic LDP Configuration
      7.28.3. Common Configuration Tasks
        7.28.3.1. Enabling LDP
        7.28.3.2. Configuring FEC Originate Parameters
        7.28.3.3. Configuring Graceful-Restart Helper Parameters
        7.28.3.4. Applying Export and Import Policies
        7.28.3.5. Targeted Session Parameters
        7.28.3.6. Interface Parameters
        7.28.3.7. Session Parameters
        7.28.3.8. LDP Signaling and Services
    7.29. LDP Configuration Management Tasks
      7.29.1. Disabling LDP
      7.29.2. Modifying Targeted Session Parameters
      7.29.3. Modifying Interface Parameters
    7.30. LDP Command Reference
      7.30.1. Command Hierarchies
        7.30.1.1. LDP Commands
      7.30.2. Command Descriptions
        7.30.2.1. Generic Commands
        7.30.2.2. LDP Commands
        7.30.2.3. Interface Parameters Commands
        7.30.2.4. Session Parameters Commands
        7.30.2.5. Targeted Session Commands
        7.30.2.6. TCP Session Parameters Commands
    7.31. Show, Clear, Debug, and Tools Command Reference
      7.31.1. Command Hierarchies
        7.31.1.1. Show Commands
        7.31.1.2. Clear Commands
        7.31.1.3. Debug Commands
        7.31.1.4. Tools Commands
      7.31.2. Command Descriptions
        7.31.2.1. Show LDP Commands
        7.31.2.2. Clear Commands
        7.31.2.3. Debug Commands
        7.31.2.4. Tools Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia Router Configuration Process
  2. MPLS and RSVP
    2.1. MPLS
      2.1.1. MPLS Label Stack
        2.1.1.1. Label Values
        2.1.1.2. Reserved Label Blocks
      2.1.2. MPLS Entropy Label and Hash Label
        2.1.2.1. Hash Label
        2.1.2.2. Entropy Label
        2.1.2.3. Inserting and Processing the Entropy Label at LERs and LSRs
          2.1.2.3.1. Ingress LER
          2.1.2.3.2. LSR
          2.1.2.3.3. Egress LER
        2.1.2.4. Mapping Entropy Label Capability at LSP Stitching Points
        2.1.2.5. Entropy Label on OAM Packets
        2.1.2.6. Impact of EL and ELI on MTU and Label Stack Depth
      2.1.3. Label Switching Routers
        2.1.3.1. LSP Types
      2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
        2.1.4.1. Bootstrapping and Maintaining the BFD Session
        2.1.4.2. LSP BFD Configuration
        2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
        2.1.4.4. BFD Configuration on RSVP-TE LSPs
        2.1.4.5. Using LSP BFD for LSP Path Protection
          2.1.4.5.1. Failure-action down
          2.1.4.5.2. Failure-action failover
          2.1.4.5.3. LSP Active Path Failover Triggers
        2.1.4.6. MPLS/RSVP on Broadcast Interface
      2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
      2.1.6. Manual Bypass LSP
        2.1.6.1. PLR Bypass LSP Selection Rules
        2.1.6.2. FRR Facility Background Evaluation Task
      2.1.7. Uniform FRR Failover Time
      2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
        2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
        2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
        2.1.8.3. Measurement of LSP Bandwidth
        2.1.8.4. Passive Monitoring of LSP Bandwidth
        2.1.8.5. Periodic Automatic Bandwidth Adjustment
        2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
        2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
        2.1.8.8. Operational Bandwidth Carryover between Active Paths
      2.1.9. LSP Failure Codes
      2.1.10. Labeled Traffic Statistics
        2.1.10.1. Interface Statistics
        2.1.10.2. Traffic Statistics for Stacked Tunnels
        2.1.10.3. Traffic Statistics Details and Scale
        2.1.10.4. RSVP-TE and MPLS-TP Traffic Statistics
        2.1.10.5. MPLS Forwarding Policy Statistics
        2.1.10.6. gRPC-based RIB API Statistics
        2.1.10.7. Segment Routing Statistics
        2.1.10.8. SR-TE LSP Statistics
        2.1.10.9. SR Policy Statistics
    2.2. RSVP
      2.2.1. Using RSVP for MPLS
        2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
        2.2.1.2. Hello Protocol
        2.2.1.3. MD5 Authentication of RSVP Interface
        2.2.1.4. Configuring Authentication using Keychains
      2.2.2. Reservation Styles
        2.2.2.1. RSVP Message Pacing
      2.2.3. RSVP Overhead Refresh Reduction
      2.2.4. RSVP Graceful Restart Helper
      2.2.5. Enhancements to RSVP Control Plane Congestion Control
      2.2.6. BFD for RSVP-TE
      2.2.7. RSVP-TE LSP Statistics
      2.2.8. P2MP RSVP-TE LSP Statistics
        2.2.8.1. Configuring RSVP P2MP LSP Egress Statistics
        2.2.8.2. Configuring RSVP P2MP LSP Ingress Statistics
        2.2.8.3. Configuring Implicit Null
      2.2.9. Using Unnumbered Point-to-Point Interface in RSVP
        2.2.9.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
    2.3. MPLS Transport Profile
      2.3.1. MPLS-TP Model
      2.3.2. MPLS-TP Provider Edge and Gateway
        2.3.2.1. VLL Services
        2.3.2.2. Spoke SDP Termination
      2.3.3. MPLS-TP LSR
      2.3.4. Detailed Descriptions of MPLS-TP
        2.3.4.1. MPLS-TP LSPs
        2.3.4.2. MPLS-TP on Pseudowires
      2.3.5. MPLS-TP Maintenance Identifiers
        2.3.5.1. Generic Associated Channel
        2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
          2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
          2.3.5.2.2. Proactive CC, CV and RDI
          2.3.5.2.3. BFD-based RDI
        2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        2.3.5.4. PW Control Channel Status Request Mechanism
        2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
        2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
        2.3.5.7. MPLS-TP LSP Protection
      2.3.6. Alarm Indication Signal (AIS)
      2.3.7. Configuring MPLS-TP
        2.3.7.1. Configuration Overview
        2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
        2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
        2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        2.3.7.5. Interface Configuration for MPLS-TP
        2.3.7.6. LER Configuration for MPLS-TP
          2.3.7.6.1. LSP and Path Configuration
          2.3.7.6.2. Support for Downstream Mapping Information
          2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
          2.3.7.6.4. Protection templates and Linear Protection Configuration
        2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
      2.3.8. MPLS-TP Show Commands
        2.3.8.1. Static MPLS Labels
        2.3.8.2. MPLS-TP Tunnel Configuration
        2.3.8.3. MPLS-TP Path configuration
        2.3.8.4. MPLS-TP Protection
        2.3.8.5. MPLS TP Node Configuration
        2.3.8.6. MPLS-TP Interfaces
      2.3.9. MPLS-TP Debug Commands
    2.4. Traffic Engineering
      2.4.1. TE Metric (IS-IS and OSPF)
      2.4.2. Admin Group Support on Facility Bypass Backup LSP
        2.4.2.1. Procedures at Head-End Node
        2.4.2.2. Procedures at PLR Node
      2.4.3. Manual and Timer Resignal of RSVP-TE Bypass LSP
        2.4.3.1. RSVP-TE Bypass LSP Path SRLG Information Update in Manual and Timer Resignal MBB
        2.4.3.2. RSVP-TE Bypass LSP Path Administrative Group Information Update in Manual and Timer Resignal MBB
      2.4.4. RSVP-TE LSP Active Path Administrative Group Information Update in Timer Resignal MBB
      2.4.5. Diff-Serv Traffic Engineering
        2.4.5.1. Mapping of Traffic to a Diff-Serv LSP
        2.4.5.2. Admission Control of Classes
          2.4.5.2.1. Maximum Allocation Model
          2.4.5.2.2. Russian Doll Model
        2.4.5.3. RSVP Control Plane Extensions
        2.4.5.4. IGP Extensions
        2.4.5.5. Diff-Serv TE Configuration and Operation
          2.4.5.5.1. RSVP Protocol Level
          2.4.5.5.2. RSVP Interface Level
          2.4.5.5.3. LSP and LSP Path Levels
      2.4.6. Diff-Serv TE LSP Class Type Change under Failure
        2.4.6.1. LSP Primary Path Retry Procedures
        2.4.6.2. Bandwidth Sharing Across Class Types
        2.4.6.3. Downgrading the CT of Bandwidth Sharing LSP Paths
        2.4.6.4. Upgrading the CT of Bandwidth Sharing LSP Paths
    2.5. IPv6 Traffic Engineering
      2.5.1. Global Configuration
      2.5.2. IS-IS Configuration
      2.5.3. MPLS Configuration
      2.5.4. IS-IS, BGP-LS and TE Database Extensions
        2.5.4.1. BGP-LS Originator Node Handling of TE Attributes
        2.5.4.2. TE Attributes Supported in IGP and BGP-LS
      2.5.5. IS-IS IPv4/IPv6 SR-TE and IPv4 RSVP-TE Feature Behavior
      2.5.6. IPv6 SR-TE LSP Support in MPLS
        2.5.6.1. IPv6 SR-TE auto-LSP
    2.6. Advanced MPLS/RSVP Features
      2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
      2.6.2. LSP Path Change
      2.6.3. Manual LSP Path Switch
      2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      2.6.5. Automatic Creation of RSVP-TE LSP Mesh
        2.6.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
          2.6.5.1.1. Feature Configuration
          2.6.5.1.2. Feature Behavior
          2.6.5.1.3. Multi-Area and Multi-Instance Support
          2.6.5.1.4. Mesh LSP Name Encoding and Statistics
        2.6.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
          2.6.5.2.1. Feature Configuration
          2.6.5.2.2. Feature Behavior
      2.6.6. IGP Shortcut and Forwarding Adjacency
        2.6.6.1. IGP Shortcut Feature Configuration
          2.6.6.1.1. IGP Shortcut Binding Construct
        2.6.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
          2.6.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
          2.6.6.2.2. Application Support
          2.6.6.2.3. Loop-free Alternate (LFA) Protection Support
        2.6.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
          2.6.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
          2.6.6.3.2. Application Support
          2.6.6.3.3. Loop-free Alternate (LFA) Protection Support
        2.6.6.4. Using LSP Relative Metric with IGP Shortcut
        2.6.6.5. ECMP Considerations
        2.6.6.6. Handling of Control Packets
        2.6.6.7. Forwarding Adjacency
        2.6.6.8. LDP Forwarding over IGP Shortcut
        2.6.6.9. LDP Forwarding over Static Route Shortcut Tunnels
        2.6.6.10. Handling of Multicast Packets
        2.6.6.11. MPLS Entropy Label on Shortcut Tunnels
      2.6.7. Disabling TTL Propagation in an LSP Shortcut
      2.6.8. RSVP-TE LSP Signaling using LSP Template
      2.6.9. Shared Risk Link Groups
        2.6.9.1. Enabling Disjoint Backup Paths
        2.6.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
        2.6.9.3. Static Configurations of SRLG Memberships
      2.6.10. TE Graceful Shutdown
      2.6.11. Soft Preemption of Diff-Serv RSVP LSP
      2.6.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
      2.6.13. Inter-Area TE LSP (ERO Expansion Method)
        2.6.13.1. Area Border Node FRR Protection for Inter-Area LSP
          2.6.13.1.1. Rerouting of Inter-Area LSP
          2.6.13.1.2. Behavior of MPLS Options in Inter-Area LSP
        2.6.13.2. Inter-Area LSP support of OSPF Virtual Links
        2.6.13.3. Area Border Node FRR Protection for Inter-Area LSP
      2.6.14. Timer-based Reversion for RSVP-TE LSPs
      2.6.15. LSP Tagging and Auto-Bind Using Tag Information
        2.6.15.1. Internal Route Color to LSP Color Matching Algorithm
        2.6.15.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
        2.6.15.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
      2.6.16. LSP Self Ping
        2.6.16.1. Detailed Behavior of LSP Self Ping
        2.6.16.2. Considerations for Scaled Scenarios
      2.6.17. Accounting for Dark Bandwidth
    2.7. Point-to-Multipoint (P2MP) RSVP LSP
      2.7.1. Application in Video Broadcast
      2.7.2. P2MP LSP Data Plane
        2.7.2.1. Procedures at Ingress LER Node
        2.7.2.2. Procedures at LSR Node
        2.7.2.3. Procedures at Branch LSR Node
        2.7.2.4. Procedures at Egress LER Node
        2.7.2.5. Procedures at BUD LSR Node
      2.7.3. Ingress Path Management for P2MP LSP Packets
        2.7.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
      2.7.4. RSVP Control Plane in a P2MP LSP
      2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        2.7.5.1. Procedures at Ingress LER Node
        2.7.5.2. Procedures at Egress LER Node
          2.7.5.2.1. Procedures with a Primary Tunnel Interface
    2.8. Segment Routing With Traffic Engineering (SR-TE)
      2.8.1. SR-TE Support
      2.8.2. SR-TE LSP Instantiation
        2.8.2.1. PCC-Initiated and PCC-Controlled LSP
          2.8.2.1.1. Guidelines for PCC-Initiated and PCC-Controlled LSPs
        2.8.2.2. PCC-Initiated and PCE-Computed or Controlled LSP
      2.8.3. SR-TE LSP Path Computation
        2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
      2.8.4. SR-TE LSP Path Computation Using Hop-to-Label Translation
      2.8.5. SR-TE LSP Path Computation Using Local CSPF
        2.8.5.1. Extending MPLS and TE Database CSPF Support to SR-TE LSP
        2.8.5.2. SR-TE Specific TE-DB Changes
        2.8.5.3. SR-TE LSP and Auto-LSP-Specific CSPF Changes
          2.8.5.3.1. SR-TE LSP Path Protection
          2.8.5.3.2. SR-TE LSP Path Label Stack Reduction
          2.8.5.3.3. Interaction with SR-TE LSP Path Protection
          2.8.5.3.4. Examples of SR-TE LSP Path Label Stack Reduction
      2.8.6. SR-TE LSP Paths using Explicit SIDs
      2.8.7. SR-TE LSP Protection
        2.8.7.1. Local Protection
        2.8.7.2. End to End Protection
      2.8.8. Seamless BFD for SR-TE LSPs
        2.8.8.1. Configuration of S-BFD on SR-TE LSPs
        2.8.8.2. Support for BFD Failure Action with SR-TE LSPs
          2.8.8.2.1. SR-TE LSP State Changes and Failure Actions Based on S-BFD
        2.8.8.3. S-BFD Operational Considerations
      2.8.9. Static Route Resolution using SR-TE LSP
      2.8.10. BGP Shortcuts Using SR-TE LSP
      2.8.11. BGP Label Route Resolution Using SR-TE LSP
      2.8.12. Service Packet Forwarding using SR-TE LSP
      2.8.13. Data Path Support
        2.8.13.1. SR-TE LSP Metric and MTU Settings
        2.8.13.2. LSR Hashing on SR-TE LSPs
      2.8.14. SR-TE Auto-LSP
        2.8.14.1. Feature Configuration
        2.8.14.2. Automatic Creation of an SR-TE Mesh LSP
        2.8.14.3. Automatic Creation of an SR-TE One-Hop LSP
        2.8.14.4. Interaction with PCEP
        2.8.14.5. Forwarding Contexts Supported with SR-TE Auto-LSP
      2.8.15. SR-TE LSP Traffic Statistics
    2.9. MPLS Service Usage
      2.9.1. Service Distribution Paths
    2.10. MPLS/RSVP Configuration Process Overview
    2.11. Configuration Notes
    2.12. Configuring MPLS and RSVP with CLI
      2.12.1. MPLS Configuration Overview
        2.12.1.1. LSPs
        2.12.1.2. Paths
        2.12.1.3. Router Interface
        2.12.1.4. Choosing the Signaling Protocol
      2.12.2. Basic MPLS Configuration
      2.12.3. Common Configuration Tasks
      2.12.4. Configuring MPLS Components
        2.12.4.1. Configuring Global MPLS Parameters
        2.12.4.2. Configuring an MPLS Interface
        2.12.4.3. Configuring MPLS Paths
        2.12.4.4. Configuring an MPLS LSP
        2.12.4.5. Configuring a Static LSP
        2.12.4.6. Configuring Manual Bypass Tunnels
        2.12.4.7. Configuring RSVP Parameters
        2.12.4.8. Configure RSVP Message Pacing Parameters
        2.12.4.9. Configuring Graceful Shutdown
    2.13. MPLS Configuration Management Tasks
      2.13.1. Deleting MPLS
      2.13.2. Modifying MPLS Parameters
      2.13.3. Modifying an MPLS LSP
      2.13.4. Modifying MPLS Path Parameters
      2.13.5. Modifying MPLS Static LSP Parameters
      2.13.6. Deleting an MPLS Interface
    2.14. RSVP Configuration Management Tasks
      2.14.1. Modifying RSVP Parameters
      2.14.2. Modifying RSVP Message Pacing Parameters
      2.14.3. Deleting an Interface from RSVP
    2.15. Configuring and Operating SR-TE
      2.15.1. SR-TE Configuration Prerequisites
      2.15.2. SR-TE LSP Configuration Overview
      2.15.3. Configuring Path Computation and Control for SR-TE LSP
        2.15.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
      2.15.4. Configuring SR-TE LSP Label Stack Size
      2.15.5. Configuring Adjacency SID Parameters
      2.15.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
      2.15.7. Configuring a Mesh of SR-TE Auto-LSPs
    2.16. MPLS/RSVP Configuration Command Reference
      2.16.1. Command Hierarchies
        2.16.1.1. MPLS Commands
        2.16.1.2. MPLS-TP Commands
        2.16.1.3. MPLS-Label Commands
        2.16.1.4. LSP Commands
        2.16.1.5. LSP-BFD Commands
        2.16.1.6. RIB-API Commands
        2.16.1.7. MPLS Path Commands
        2.16.1.8. RSVP Commands
      2.16.2. Command Descriptions
        2.16.2.1. MPLS Commands
          2.16.2.1.1. Generic Commands
          2.16.2.1.2. MPLS Commands
          2.16.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
        2.16.2.2. RSVP Commands
          2.16.2.2.1. Generic Commands
          2.16.2.2.2. RSVP Commands
          2.16.2.2.3. Interface Commands
          2.16.2.2.4. Message Pacing Commands
    2.17. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      2.17.1. Command Hierarchies
        2.17.1.1. Show Commands
        2.17.1.2. Tools Commands
        2.17.1.3. Router Commands
        2.17.1.4. Clear Commands
        2.17.1.5. Debug Commands
      2.17.2. Command Descriptions
        2.17.2.1. Show Commands
        2.17.2.2. Show MPLS-Labels Commands
        2.17.2.3. Show Router Seamless-BFD Commands
        2.17.2.4. Show Router BFD session Commands
        2.17.2.5. Show RSVP Commands
        2.17.2.6. Tools Commands
        2.17.2.7. Clear Commands
        2.17.2.8. Debug Commands
  3. GMPLS
    3.1. GMPLS
      3.1.1. Example Applications
        3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
        3.1.1.2. Use Case 2: Multi-Layer Resiliency
    3.2. GMPLS UNI Architecture
      3.2.1. Addressing and End-to-End gLSP Architecture
    3.3. 1830 PSS Identifiers
    3.4. Recovery Reference Models
      3.4.1. End to End Recovery (IP-layer)
      3.4.2. End to End ECMP
      3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      3.4.4. End to End Recovery (GMPLS Layer)
        3.4.4.1. Unprotected gLSP
        3.4.4.2. Full LSP Rerouting
        3.4.4.3. 1: N Protection
        3.4.4.4. Optical Segment Recovery
    3.5. GMPLS Configuration Overview
    3.6. LMP and IPCC Configuration
      3.6.1. Configuration of IP Communication Channels for LMP and RSVP
      3.6.2. Configuring LMP
      3.6.3. Configuring Traffic Engineering Links and Data Bearers
    3.7. Configuring MPLS Paths for GMPLS
    3.8. Configuring RSVP in GMPLS
    3.9. Configuring a GMPLS LSP on the UNI
      3.9.1. gLSP Constraints
    3.10. Bandwidth
    3.11. Shared Risk Link Groups
    3.12. Optical Network Segment Recovery
    3.13. Configuration of End-to-End GMPLS Recovery
    3.14. GMPLS Tunnel Groups
    3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    3.16. Configuration Notes
    3.17. GMPLS Configuration Command Reference
      3.17.1. Command Hierarchies
        3.17.1.1. LMP Commands
        3.17.1.2. GMPLS Commands
        3.17.1.3. GMPLS Tunnel Group Commands
      3.17.2. Command Descriptions
        3.17.2.1. LMP Commands
        3.17.2.2. GMPLS Commands
          3.17.2.2.1. GMPLS Tunnel Group Commands
    3.18. Show, Clear, Debug, and Tools Command Reference
      3.18.1. Command Hierarchies
        3.18.1.1. Show Commands
        3.18.1.2. Clear Commands
        3.18.1.3. Debug Commands
        3.18.1.4. Tools Commands
      3.18.2. Command Descriptions
        3.18.2.1. Show Commands
        3.18.2.2. Clear Commands
        3.18.2.3. Debug Commands
        3.18.2.4. Tools Commands
  4. MPLS Forwarding Policy
    4.1. Introduction to MPLS Forward Policy
    4.2. Feature Validation and Operation Procedures
      4.2.1. Policy Parameters and Validation Procedure Rules
      4.2.2. Policy Resolution and Operational Procedures
    4.3. Tunnel Table Handling of MPLS Forwarding Policy
    4.4. Data Path Support
      4.4.1. NHG of Resolution Type Indirect
      4.4.2. NHG of Resolution Type Direct
        4.4.2.1. Active Path Determination and Failover in a NHG of Resolution Type Direct
      4.4.3. Spraying of Packets in a MPLS Forwarding Policy
      4.4.4. Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
      4.4.5. Ethertype Setting and TTL Handling in Endpoint Policy
    4.5. Weighted ECMP Enabling and Validation Rules
    4.6. Statistics
      4.6.1. Ingress Statistics
      4.6.2. Egress Statistics
    4.7. Configuring Static Label Routes using MPLS Forwarding Policy
      4.7.1. Steering Flows to an Indirect Next-Hop
      4.7.2. Steering Flows to a Direct Next-Hop
    4.8. MPLS Forwarding Policy Configuration Command Reference
      4.8.1. Command Hierarchies
        4.8.1.1. MPLS Forwarding Policy Commands
      4.8.2. Command Descriptions
        4.8.2.1. MPLS Forwarding Policy Commands
    4.9. MPLS Forwarding Policy Show Command Reference
      4.9.1. Command Hierarchies
        4.9.1.1. Show Commands
        4.9.1.2. Clear Commands
        4.9.1.3. Monitor Commands
      4.9.2. Command Descriptions
        4.9.2.1. Show Commands
        4.9.2.2. Clear Commands
        4.9.2.3. Monitor Commands
  5. PCEP
    5.1. Introduction to the Path Computation Element Protocol (PCEP)
      5.1.1. PCC and PCE Configuration
      5.1.2. Base Implementation of Path Computation Elements (PCE)
      5.1.3. PCEP Session Establishment and Maintenance
      5.1.4. PCEP Parameters
        5.1.4.1. Stateful PCE
        5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
        5.1.4.3. LSP Initiation
          5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
          5.1.4.3.2. PCE-Initiated LSPs
          5.1.4.3.3. LSP Instantiation Using PCEP
          5.1.4.3.4. LSP Deletion Using PCEP
          5.1.4.3.5. Dynamic State Handling for PCE Initiated LSPs
          5.1.4.3.6. PCEP Support for RSVP-TE LSP
          5.1.4.3.7. LSP Path Diversity and Bidirectionality Constraints
    5.2. NSP and VSR-NRC PCE Redundancy
      5.2.1. Feature Configuration
      5.2.2. Feature Behavior
        5.2.2.1. NSP Cluster Behavior
        5.2.2.2. VSR-NRC Behavior
        5.2.2.3. PCC Behavior
    5.3. Configuring and Operating RSVP-TE LSP with PCEP
    5.4. PCEP Configuration Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. PCEP Commands
      5.4.2. Command Descriptions
        5.4.2.1. PCEP Commands
    5.5. PCEP Show and Tools Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Show Commands
        5.5.1.2. Tools Commands
      5.5.2. Command Descriptions
        5.5.2.1. Show Commands
        5.5.2.2. Tools Commands
  6. Segment Routing Policies
    6.1. Statically-Configured Segment Routing Policies
    6.2. BGP Signaled Segment Routing Policies
    6.3. Segment Routing Policy Path Selection and Tie-Breaking
    6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
      6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
      6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
      6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
      6.4.5. Resolving EVPN-MPLS Routes to Segment Routing Policy Tunnels
      6.4.6. VPRN Auto-Bind-Tunnel Using Segment Routing Policy Tunnels
    6.5. Traffic Statistics
  7. Label Distribution Protocol
    7.1. Label Distribution Protocol
      7.1.1. LDP and MPLS
      7.1.2. LDP Architecture
      7.1.3. Subsystem Interrelationships
        7.1.3.1. Memory Manager and LDP
        7.1.3.2. Label Manager
        7.1.3.3. LDP Configuration
        7.1.3.4. Logger
        7.1.3.5. Service Manager
      7.1.4. Execution Flow
        7.1.4.1. Initialization
        7.1.4.2. Session Lifetime
          7.1.4.2.1. Adjacency Establishment
          7.1.4.2.2. Session Establishment
      7.1.5. Label Exchange
        7.1.5.1. Other Reasons for Label Actions
        7.1.5.2. Cleanup
        7.1.5.3. Configuring Implicit Null Label
      7.1.6. Global LDP Filters
        7.1.6.1. Per LDP Peer FEC Import and Export Policies
      7.1.7. Configuring Multiple LDP LSR ID
        7.1.7.1. Advertisement of FEC for Local LSR ID
      7.1.8. Extend LDP policies to mLDP
        7.1.8.1. Recursive FEC behavior
        7.1.8.2. Import Policy
      7.1.9. LDP FEC Resolution Per Specified Community
        7.1.9.1. Configuration
        7.1.9.2. Operation
      7.1.10. T-LDP hello reduction
      7.1.11. Tracking a T-LDP Peer with BFD
      7.1.12. Link LDP Hello Adjacency Tracking with BFD
      7.1.13. LDP LSP Statistics
      7.1.14. MPLS Entropy Label
      7.1.15. Importing LDP Tunnels to Non-Host Prefixes to TTM
    7.2. TTL Security for BGP and LDP
    7.3. ECMP Support for LDP
      7.3.1. Label Operations
      7.3.2. Weighted ECMP Support for LDP
    7.4. Unnumbered Interface Support in LDP
      7.4.1. Feature Configuration
      7.4.2. Operation of LDP over an Unnumbered IP Interface
        7.4.2.1. Link LDP
        7.4.2.2. Targeted LDP
        7.4.2.3. FEC Resolution
    7.5. LDP over RSVP Tunnels
      7.5.1. Signaling and Operation
        7.5.1.1. LDP Label Distribution and FEC Resolution
        7.5.1.2. Default FEC Resolution Procedure
        7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      7.5.2. Rerouting Around Failures
        7.5.2.1. LDP-over-RSVP Tunnel Protection
        7.5.2.2. ABR Protection
    7.6. LDP over RSVP Without Area Boundary
      7.6.1. LDP over RSVP and ECMP
    7.7. Weighted Load Balancing for LDP over RSVP
      7.7.1. Interaction with Class-Based Forwarding
    7.8. Class-based Forwarding of LDP Prefix Packets over IGP Shortcuts
      7.8.1. Configuration and Operation
        7.8.1.1. LSR and/or LER Roles with FC-to-Set Configuration
    7.9. LDP ECMP Uniform Failover
    7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
      7.10.1. LDP FRR Configuration
        7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
      7.10.2. LDP FRR Procedures
        7.10.2.1. ECMP Considerations
        7.10.2.2. LDP FRR and LDP Shortcut
        7.10.2.3. LDP FRR and LDP-over-RSVP
        7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
      7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
        7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    7.11. LDP FEC to BGP Label Route Stitching
      7.11.1. Configuration
      7.11.2. Detailed LDP FEC Resolution
      7.11.3. Detailed BGP Labeled Route Resolution
      7.11.4. Data Plane Forwarding
    7.12. LDP-SR Stitching for IPv4 prefixes
      7.12.1. LDP-SR Stitching Configuration
      7.12.2. Stitching in the LDP-to-SR Direction
      7.12.3. Stitching in the SR-to-LDP Direction
    7.13. LDP FRR LFA Backup using SR Tunnel for IPv4 Prefixes
    7.14. LDP Remote LFA
    7.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
      7.15.1. Feature Configuration
      7.15.2. Feature Behavior
    7.16. Multicast P2MP LDP for GRT
    7.17. LDP P2MP Support
      7.17.1. LDP P2MP Configuration
      7.17.2. LDP P2MP Protocol
      7.17.3. Make Before Break (MBB)
      7.17.4. ECMP Support
      7.17.5. Inter-AS Non-segmented mLDP
        7.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
        7.17.5.2. LDP Recursive FEC Process
        7.17.5.3. Supported Recursive Opaque Values
        7.17.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
        7.17.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
          7.17.5.5.1. Leaf and ABR Behavior
          7.17.5.5.2. Intra-AS Support
          7.17.5.5.3. Opaque Type Behavior with Basic FEC Generation
          7.17.5.5.4. Inter-AS Support
        7.17.5.6. Redundancy and Resiliency
        7.17.5.7. ASBR Physical Connection
        7.17.5.8. OAM
        7.17.5.9. ECMP Support
          7.17.5.9.1. ECMP Hash Algorithm
        7.17.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
      7.17.6. Intra-AS Non-segmented mLDP
        7.17.6.1. ABR MoFRR for Intra-AS
        7.17.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
        7.17.6.3. Intra-AS/Inter-AS Option B
      7.17.7. ASBR MoFRR
        7.17.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
        7.17.7.2. ASBR MoFRR Leaf Behavior
        7.17.7.3. ASBR MoFRR ASBR Behavior
        7.17.7.4. MoFRR Root AS Behavior
        7.17.7.5. Traffic Flow
        7.17.7.6. Failure Detection and Handling
        7.17.7.7. Failure Scenario
        7.17.7.8. ASBR MoFRR Consideration
        7.17.7.9. ASBR MoFRR Opaque Support
      7.17.8. MBB for MoFRR
      7.17.9. Add-path for Route Reflectors
    7.18. Multicast LDP Fast Upstream Switchover
      7.18.1. Feature Configuration
      7.18.2. Feature Behavior
      7.18.3. Uniform Failover from Primary to Backup ILM
    7.19. Multi-Area and Multi-Instance Extensions to LDP
      7.19.1. LDP Shortcut for BGP Next-Hop Resolution
      7.19.2. LDP Shortcut for IGP Routes
        7.19.2.1. LDP Shortcut Configuration
        7.19.2.2. IGP Route Resolution
        7.19.2.3. LDP Shortcut Forwarding Plane
      7.19.3. ECMP Considerations
      7.19.4. Disabling TTL Propagation in an LSP Shortcut
    7.20. LDP Graceful Handling of Resource Exhaustion
      7.20.1. LDP Base Graceful Handling of Resources
    7.21. LDP Enhanced Graceful Handling of Resources
      7.21.1. LSR Overload Notification
      7.21.2. LSR Overload Protection Capability
      7.21.3. Procedures for LSR overload protection
    7.22. LDP-IGP Synchronization
    7.23. MLDP Resolution using Multicast RTM
      7.23.1. Other Considerations for Multicast RTM MLDP Resolution
    7.24. Bidirectional Forwarding Detection for LDP LSPs
      7.24.1. Bootstrapping and Maintaining LSP BFD Sessions
      7.24.2. BFD Configuration on LDP LSPs
    7.25. User Guidelines and Troubleshooting Procedures
      7.25.1. Common Procedures
      7.25.2. Base Resource Handling Procedures
      7.25.3. Enhanced Resource Handling Procedures
    7.26. LDP IPv6 Control and Data Planes
      7.26.1. LDP Operation in an IPv6 Network
      7.26.2. Link LDP
      7.26.3. Targeted LDP
      7.26.4. FEC Resolution
      7.26.5. LDP Session Capabilities
      7.26.6. LDP Adjacency Capabilities
      7.26.7. Address and FEC Distribution
      7.26.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      7.26.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      7.26.10. IGP and Static Route Synchronization with LDP
      7.26.11. BFD Operation
      7.26.12. Services Using SDP with an LDP IPv6 FEC
      7.26.13. Mirror Services and Lawful Intercept
        7.26.13.1. Configuration at mirror source node
        7.26.13.2. Configuration at mirror destination node
      7.26.14. Static Route Resolution to a LDP IPv6 FEC
      7.26.15. IGP Route Resolution to a LDP IPv6 FEC
      7.26.16. OAM Support with LDP IPv6
      7.26.17. LDP IPv6 Interoperability Considerations
        7.26.17.1. Interoperability with Implementations Compliant with RFC 7552
        7.26.17.2. LDP IPv6 32-bit LSR-ID
          7.26.17.2.1. Feature Configuration
          7.26.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
          7.26.17.2.3. Migration Considerations
        7.26.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    7.27. LDP Process Overview
    7.28. Configuring LDP with CLI
      7.28.1. LDP Configuration Overview
      7.28.2. Basic LDP Configuration
      7.28.3. Common Configuration Tasks
        7.28.3.1. Enabling LDP
        7.28.3.2. Configuring FEC Originate Parameters
        7.28.3.3. Configuring Graceful-Restart Helper Parameters
        7.28.3.4. Applying Export and Import Policies
        7.28.3.5. Targeted Session Parameters
        7.28.3.6. Interface Parameters
        7.28.3.7. Session Parameters
        7.28.3.8. LDP Signaling and Services
    7.29. LDP Configuration Management Tasks
      7.29.1. Disabling LDP
      7.29.2. Modifying Targeted Session Parameters
      7.29.3. Modifying Interface Parameters
    7.30. LDP Command Reference
      7.30.1. Command Hierarchies
        7.30.1.1. LDP Commands
      7.30.2. Command Descriptions
        7.30.2.1. Generic Commands
        7.30.2.2. LDP Commands
        7.30.2.3. Interface Parameters Commands
        7.30.2.4. Session Parameters Commands
        7.30.2.5. Targeted Session Commands
        7.30.2.6. TCP Session Parameters Commands
    7.31. Show, Clear, Debug, and Tools Command Reference
      7.31.1. Command Hierarchies
        7.31.1.1. Show Commands
        7.31.1.2. Clear Commands
        7.31.1.3. Debug Commands
        7.31.1.4. Tools Commands
      7.31.2. Command Descriptions
        7.31.2.1. Show LDP Commands
        7.31.2.2. Clear Commands
        7.31.2.3. Debug Commands
        7.31.2.4. Tools Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
Multicast Routing Protocols Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Multicast Configuration Process
  2. Introduction to Multicast
    2.1. Multicast Overview
    2.2. Multicast Models
      2.2.1. Any-Source Multicast (ASM)
      2.2.2. Source Specific Multicast (SSM)
      2.2.3. Multicast in IP-VPN Networks
  3. IGMP
    3.1. IGMP Overview
      3.1.1. IGMP Versions and Interoperability Requirements
      3.1.2. IGMP Version Transition
      3.1.3. Source-Specific Multicast Groups
      3.1.4. Query Messages
    3.2. Configuring IGMP with CLI
      3.2.1. IGMP Configuration Overview
      3.2.2. Basic IGMP Configuration
      3.2.3. Configuring IGMP Parameters
        3.2.3.1. Enabling IGMP
        3.2.3.2. Configuring an IGMP Interface
        3.2.3.3. Configuring Static Parameters
        3.2.3.4. Configuring SSM Translation
      3.2.4. Disabling IGMP
    3.3. IGMP Configuration Command Reference
      3.3.1. Command Hierarchies
        3.3.1.1. IGMP Configuration Commands
      3.3.2. Command Descriptions
        3.3.2.1. Router IGMP Commands
    3.4. Show, Clear, and Debug Command Reference
      3.4.1. Command Hierarchies
        3.4.1.1. Show Commands
        3.4.1.2. Clear Commands
        3.4.1.3. Debug Commands
      3.4.2. Command Descriptions
        3.4.2.1. Show Commands
        3.4.2.2. Clear Commands
        3.4.2.3. Debug Commands
  4. MLD
    4.1. MLD Overview
      4.1.1. MLDv1
      4.1.2. MLDv2
    4.2. Configuring MLD with CLI
      4.2.1. MLD Configuration Overview
      4.2.2. Basic MLD Configuration
      4.2.3. Configuring MLD Parameters
        4.2.3.1. Enabling MLD
        4.2.3.2. Configuring an MLD Interface
        4.2.3.3. Configuring Static Parameters
        4.2.3.4. Configuring SSM Translation
      4.2.4. Disabling MLD
    4.3. MLD Configuration Command Reference
      4.3.1. Command Hierarchies
        4.3.1.1. MLD Configuration Commands
      4.3.2. Command Descriptions
        4.3.2.1. MLD Commands
        4.3.2.2. Generic Commands
    4.4. Show, Clear, and Debug Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Show Commands
        4.4.1.2. Clear Commands
      4.4.2. Command Descriptions
        4.4.2.1. Show Commands
        4.4.2.2. Clear Commands
  5. PIM
    5.1. PIM Overview
      5.1.1. PIM-SM Functions
        5.1.1.1. Phase One
        5.1.1.2. Phase Two
        5.1.1.3. Phase Three
      5.1.2. Encapsulating Data Packets in the Register Tunnel
      5.1.3. PIM Bootstrap Router Mechanism
      5.1.4. PIM-SM Routing Policies
      5.1.5. Reverse Path Forwarding Checks
      5.1.6. Anycast RP for PIM-SM
        5.1.6.1. Implementation
      5.1.7. Distributing PIM Joins over Multiple ECMP Paths
      5.1.8. PIM Interface on IES Subscriber Group Interfaces
      5.1.9. Multicast-Only Fast Reroute (MoFRR)
      5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      5.1.11. VRRP Aware PIM
        5.1.11.1. Configuring VRRP Aware PIM
        5.1.11.2. Configuration Recommendations
          5.1.11.2.1. Primary Router Example
          5.1.11.2.2. Secondary Router Example
    5.2. IPv6 PIM models
      5.2.1. PIM SSM
        5.2.1.1. System PIM SSM Scaling
      5.2.2. PIM ASM
      5.2.3. Embedded RP
    5.3. PIM Signaling over BIER
      5.3.1. EBBR Discovery
        5.3.1.1. Single Area Scenario
        5.3.1.2. Multiple Area Scenarios
      5.3.2. PIM Signaling Support
      5.3.3. PIM Signaling MTU Considerations
    5.4. Configuring PIM with CLI
      5.4.1. PIM Configuration Overview
      5.4.2. Basic PIM Configuration
      5.4.3. Configuring PIM Parameters
        5.4.3.1. Enabling PIM
        5.4.3.2. Configuring PIM Interface Parameters
        5.4.3.3. Configuring PIM Join/Register Policies
        5.4.3.4. Importing PIM Join/Register Policies
        5.4.3.5. Configuring Bootstrap Message Import and Export Policies
      5.4.4. Disabling PIM
    5.5. PIM Configuration Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Configuration Commands
      5.5.2. Command Descriptions
        5.5.2.1. Router PIM Commands
    5.6. Show, Clear, and Debug Command Reference
      5.6.1. Command Hierarchies
        5.6.1.1. Show Commands
        5.6.1.2. Clear Commands
        5.6.1.3. Debug Commands
      5.6.2. Command Descriptions
        5.6.2.1. Show Commands
        5.6.2.2. Clear Commands
        5.6.2.3. Debug Commands
  6. MSDP
    6.1. Multicast Source Discovery Protocol
      6.1.1. Anycast RP for MSDP
      6.1.2. MSDP Procedure
        6.1.2.1. MSDP Peering Scenarios
      6.1.3. MSDP Peer Groups
      6.1.4. MSDP Mesh Groups
      6.1.5. MSDP Routing Policies
      6.1.6. Multicast in Virtual Private Networks
        6.1.6.1. Draft Rosen
    6.2. Configuring MSDP with CLI
      6.2.1. Basic MSDP Configuration
      6.2.2. Configuring MSDP Parameters
      6.2.3. Disabling MSDP
    6.3. MSDP Configuration Command Reference
      6.3.1. Command Hierarchies
        6.3.1.1. Configuration Commands
      6.3.2. Command Descriptions
        6.3.2.1. MSDP Commands
    6.4. Show, Clear, and Debug Command Reference
      6.4.1. Command Hierarchies
        6.4.1.1. Show Commands
        6.4.1.2. Clear Commands
        6.4.1.3. Debug Commands
      6.4.2. Command Descriptions
        6.4.2.1. Show Commands
        6.4.2.2. Clear Commands
        6.4.2.3. Debug Commands
  7. MLDP
    7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
    7.2. Inter-AS Non-segmented MLDP
      7.2.1. d-MLDP Inter-AS Trees in GRT
        7.2.1.1. Routing
        7.2.1.2. Join Processing
      7.2.2. ASBR Support of PE Functionality
    7.3. Hashing for Inter-AS
    7.4. Hashing at the ASBR
  8. Multicast Extensions to BGP
    8.1. Multicast Extensions to BGP
      8.1.1. MBGP Multicast Topology Support
        8.1.1.1. Recursive Lookup for BGP Next Hops
  9. MCAC
    9.1. MCAC Overview
      9.1.1. MCAC Bundle Policy Overview
      9.1.2. MCAC Algorithm
        9.1.2.1. Interface-level MCAC details
          9.1.2.1.1. MCAC-interface-policy-level MCAC details
        9.1.2.2. Bundle-level MCAC details
      9.1.3. MCAC on Link Aggregation Group Interfaces
    9.2. Configuring MCAC with CLI
      9.2.1. Basic MCAC Configuration
      9.2.2. Configuring MCAC Parameters
    9.3. MCAC Configuration Command Reference
      9.3.1. Command Hierarchies
        9.3.1.1. MCAC Configuration Commands
        9.3.1.2. MCAC Policy Commands
      9.3.2. Command Descriptions
        9.3.2.1. MCAC Configuration Commands
    9.4. Show, Clear, and Debug Command Reference
      9.4.1. Command Hierarchies
        9.4.1.1. Show Commands
      9.4.2. Command Descriptions
        9.4.2.1. Show Commands
          9.4.2.1.1. Show MCAC Commands
  10. GTM
    10.1. GTM Overview
      10.1.1. Using BGP-MVPN Procedures in GTM
        10.1.1.1. Route Distinguishers and Route Targets
        10.1.1.2. UMH-Eligible Routes
        10.1.1.3. BGP Route Types Supported
    10.2. Configuring GTM
      10.2.1. Configuration Recommendations
      10.2.2. Configuring GTM with CLI
    10.3. GTM Configuration Command Reference
      10.3.1. Command Hierarchies
        10.3.1.1. Configuration Commands
      10.3.2. Command Descriptions
        10.3.2.1. GTM Commands
    10.4. Show, Clear, and Debug Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Show Commands
  11. BIER
    11.1. BIER Overview
      11.1.1. BIER Hardware
      11.1.2. BIER IMPM
      11.1.3. BIER ECMP
      11.1.4. BIER Redundancy and Resiliency
      11.1.5. BIER Layers
      11.1.6. Implementation
        11.1.6.1. BIER Sub-domains
        11.1.6.2. BIER Set IDs
        11.1.6.3. BIER Encapsulation
          11.1.6.3.1. BIER MPLS Encapsulation
        11.1.6.4. BIER Forwarding Tables
        11.1.6.5. BIER IS-IS Sub-TLVs
        11.1.6.6. IS-IS BIER Support
        11.1.6.7. IS-IS Multi-topologies
        11.1.6.8. BIER Intra-AS Solution
        11.1.6.9. OSPF BIER Support
          11.1.6.9.1. BIER OSPF Sub-TLVs
        11.1.6.10. BIER Forwarding
          11.1.6.10.1. BIER FIB Packet Handling
        11.1.6.11. BIER MVPN
          11.1.6.11.1. BIER MVPN IPv4 and IPv6
          11.1.6.11.2. BIER MVPN Sub-domain
          11.1.6.11.3. BIER Templates
    11.2. BIER Configuration Command Reference
      11.2.1. Command Hierarchies
        11.2.1.1. Configuration Commands
      11.2.2. Command Descriptions
        11.2.2.1. BIER Commands
    11.3. Show, Clear, and Debug Command Reference
      11.3.1. Command Hierarchies
        11.3.1.1. Show Commands
      11.3.2. Command Descriptions
        11.3.2.1. Show Commands
  12. SR P2MP Policy
    12.1. Overview
    12.2. SR P2MP Policy Details
    12.3. Replication Segment
    12.4. P2MP and Replication Segment Objects
    12.5. SR P2MP Policy Instantiation
      12.5.1. SR P2MP Policy Instantiation Using the CLI
        12.5.1.1. SPMSI for Static P2MP Policy
        12.5.1.2. PMSI Tree ID Advertised by BGP
      12.5.2. SR P2MP Policy Instantiation Using PCE
        12.5.2.1. SPMSI for PCE P2MP Policy
      12.5.3. Configuration Examples
      12.5.4. Administrative Behavior
        12.5.4.1. Candidate Path Selection Criteria
        12.5.4.2. Candidate Path Operational Status
        12.5.4.3. P2MP Policy Operational Status
        12.5.4.4. Replication Segment Operational Status
      12.5.5. FRR Behavior
        12.5.5.1. Implicit Null Case
        12.5.5.2. Non-Implicit Null Case
      12.5.6. FRR Recovery Behavior
      12.5.7. BFD Behavior
      12.5.8. Maximum SPMSI Behavior
      12.5.9. Global Optimization of P2MP Policy and MBB Behavior
      12.5.10. Global Optimization of PCEP Behavior
      12.5.11. PCEP Behavior
      12.5.12. PCE Pop with Next-hop 127.0.0.0/8 or ::1
    12.6. SR P2MP Configuration Command Reference
      12.6.1. Command Hierarchies
        12.6.1.1. P2MP SR Tree Configuration Commands
        12.6.1.2. MVPN Configuration Commands
      12.6.2. Command Descriptions
        12.6.2.1. P2MP SR Tree Commands
        12.6.2.2. MVPN Commands
    12.7. SR P2MP Show Command Reference
      12.7.1. Command Hierarchies
        12.7.1.1. SR P2MP Show Commands
      12.7.2. Command Descriptions
        12.7.2.1. Show Commands
  13. Troubleshooting Tools
    13.1. Mtrace
      13.1.1. Finding the Last Hop Router
      13.1.2. Directing the Response
    13.2. Mstat
    13.3. Mrinfo
    13.4. Troubleshooting Configuration Command Reference
      13.4.1. Command Hierarchies
        13.4.1.1. Operational Commands
      13.4.2. Command Descriptions
        13.4.2.1. Operational Commands
    13.5. Show Command Reference
      13.5.1. Command Hierarchies
        13.5.1.1. Show Commands
      13.5.2. Command Descriptions
        13.5.2.1. Show Commands
  14. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Multicast Configuration Process
  2. Introduction to Multicast
    2.1. Multicast Overview
    2.2. Multicast Models
      2.2.1. Any-Source Multicast (ASM)
      2.2.2. Source Specific Multicast (SSM)
      2.2.3. Multicast in IP-VPN Networks
  3. IGMP
    3.1. IGMP Overview
      3.1.1. IGMP Versions and Interoperability Requirements
      3.1.2. IGMP Version Transition
      3.1.3. Source-Specific Multicast Groups
      3.1.4. Query Messages
    3.2. Configuring IGMP with CLI
      3.2.1. IGMP Configuration Overview
      3.2.2. Basic IGMP Configuration
      3.2.3. Configuring IGMP Parameters
        3.2.3.1. Enabling IGMP
        3.2.3.2. Configuring an IGMP Interface
        3.2.3.3. Configuring Static Parameters
        3.2.3.4. Configuring SSM Translation
      3.2.4. Disabling IGMP
    3.3. IGMP Configuration Command Reference
      3.3.1. Command Hierarchies
        3.3.1.1. IGMP Configuration Commands
      3.3.2. Command Descriptions
        3.3.2.1. Router IGMP Commands
    3.4. Show, Clear, and Debug Command Reference
      3.4.1. Command Hierarchies
        3.4.1.1. Show Commands
        3.4.1.2. Clear Commands
        3.4.1.3. Debug Commands
      3.4.2. Command Descriptions
        3.4.2.1. Show Commands
        3.4.2.2. Clear Commands
        3.4.2.3. Debug Commands
  4. MLD
    4.1. MLD Overview
      4.1.1. MLDv1
      4.1.2. MLDv2
    4.2. Configuring MLD with CLI
      4.2.1. MLD Configuration Overview
      4.2.2. Basic MLD Configuration
      4.2.3. Configuring MLD Parameters
        4.2.3.1. Enabling MLD
        4.2.3.2. Configuring an MLD Interface
        4.2.3.3. Configuring Static Parameters
        4.2.3.4. Configuring SSM Translation
      4.2.4. Disabling MLD
    4.3. MLD Configuration Command Reference
      4.3.1. Command Hierarchies
        4.3.1.1. MLD Configuration Commands
      4.3.2. Command Descriptions
        4.3.2.1. MLD Commands
        4.3.2.2. Generic Commands
    4.4. Show, Clear, and Debug Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. Show Commands
        4.4.1.2. Clear Commands
      4.4.2. Command Descriptions
        4.4.2.1. Show Commands
        4.4.2.2. Clear Commands
  5. PIM
    5.1. PIM Overview
      5.1.1. PIM-SM Functions
        5.1.1.1. Phase One
        5.1.1.2. Phase Two
        5.1.1.3. Phase Three
      5.1.2. Encapsulating Data Packets in the Register Tunnel
      5.1.3. PIM Bootstrap Router Mechanism
      5.1.4. PIM-SM Routing Policies
      5.1.5. Reverse Path Forwarding Checks
      5.1.6. Anycast RP for PIM-SM
        5.1.6.1. Implementation
      5.1.7. Distributing PIM Joins over Multiple ECMP Paths
      5.1.8. PIM Interface on IES Subscriber Group Interfaces
      5.1.9. Multicast-Only Fast Reroute (MoFRR)
      5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      5.1.11. VRRP Aware PIM
        5.1.11.1. Configuring VRRP Aware PIM
        5.1.11.2. Configuration Recommendations
          5.1.11.2.1. Primary Router Example
          5.1.11.2.2. Secondary Router Example
    5.2. IPv6 PIM models
      5.2.1. PIM SSM
        5.2.1.1. System PIM SSM Scaling
      5.2.2. PIM ASM
      5.2.3. Embedded RP
    5.3. PIM Signaling over BIER
      5.3.1. EBBR Discovery
        5.3.1.1. Single Area Scenario
        5.3.1.2. Multiple Area Scenarios
      5.3.2. PIM Signaling Support
      5.3.3. PIM Signaling MTU Considerations
    5.4. Configuring PIM with CLI
      5.4.1. PIM Configuration Overview
      5.4.2. Basic PIM Configuration
      5.4.3. Configuring PIM Parameters
        5.4.3.1. Enabling PIM
        5.4.3.2. Configuring PIM Interface Parameters
        5.4.3.3. Configuring PIM Join/Register Policies
        5.4.3.4. Importing PIM Join/Register Policies
        5.4.3.5. Configuring Bootstrap Message Import and Export Policies
      5.4.4. Disabling PIM
    5.5. PIM Configuration Command Reference
      5.5.1. Command Hierarchies
        5.5.1.1. Configuration Commands
      5.5.2. Command Descriptions
        5.5.2.1. Router PIM Commands
    5.6. Show, Clear, and Debug Command Reference
      5.6.1. Command Hierarchies
        5.6.1.1. Show Commands
        5.6.1.2. Clear Commands
        5.6.1.3. Debug Commands
      5.6.2. Command Descriptions
        5.6.2.1. Show Commands
        5.6.2.2. Clear Commands
        5.6.2.3. Debug Commands
  6. MSDP
    6.1. Multicast Source Discovery Protocol
      6.1.1. Anycast RP for MSDP
      6.1.2. MSDP Procedure
        6.1.2.1. MSDP Peering Scenarios
      6.1.3. MSDP Peer Groups
      6.1.4. MSDP Mesh Groups
      6.1.5. MSDP Routing Policies
      6.1.6. Multicast in Virtual Private Networks
        6.1.6.1. Draft Rosen
    6.2. Configuring MSDP with CLI
      6.2.1. Basic MSDP Configuration
      6.2.2. Configuring MSDP Parameters
      6.2.3. Disabling MSDP
    6.3. MSDP Configuration Command Reference
      6.3.1. Command Hierarchies
        6.3.1.1. Configuration Commands
      6.3.2. Command Descriptions
        6.3.2.1. MSDP Commands
    6.4. Show, Clear, and Debug Command Reference
      6.4.1. Command Hierarchies
        6.4.1.1. Show Commands
        6.4.1.2. Clear Commands
        6.4.1.3. Debug Commands
      6.4.2. Command Descriptions
        6.4.2.1. Show Commands
        6.4.2.2. Clear Commands
        6.4.2.3. Debug Commands
  7. MLDP
    7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
    7.2. Inter-AS Non-segmented MLDP
      7.2.1. d-MLDP Inter-AS Trees in GRT
        7.2.1.1. Routing
        7.2.1.2. Join Processing
      7.2.2. ASBR Support of PE Functionality
    7.3. Hashing for Inter-AS
    7.4. Hashing at the ASBR
  8. Multicast Extensions to BGP
    8.1. Multicast Extensions to BGP
      8.1.1. MBGP Multicast Topology Support
        8.1.1.1. Recursive Lookup for BGP Next Hops
  9. MCAC
    9.1. MCAC Overview
      9.1.1. MCAC Bundle Policy Overview
      9.1.2. MCAC Algorithm
        9.1.2.1. Interface-level MCAC details
          9.1.2.1.1. MCAC-interface-policy-level MCAC details
        9.1.2.2. Bundle-level MCAC details
      9.1.3. MCAC on Link Aggregation Group Interfaces
    9.2. Configuring MCAC with CLI
      9.2.1. Basic MCAC Configuration
      9.2.2. Configuring MCAC Parameters
    9.3. MCAC Configuration Command Reference
      9.3.1. Command Hierarchies
        9.3.1.1. MCAC Configuration Commands
        9.3.1.2. MCAC Policy Commands
      9.3.2. Command Descriptions
        9.3.2.1. MCAC Configuration Commands
    9.4. Show, Clear, and Debug Command Reference
      9.4.1. Command Hierarchies
        9.4.1.1. Show Commands
      9.4.2. Command Descriptions
        9.4.2.1. Show Commands
          9.4.2.1.1. Show MCAC Commands
  10. GTM
    10.1. GTM Overview
      10.1.1. Using BGP-MVPN Procedures in GTM
        10.1.1.1. Route Distinguishers and Route Targets
        10.1.1.2. UMH-Eligible Routes
        10.1.1.3. BGP Route Types Supported
    10.2. Configuring GTM
      10.2.1. Configuration Recommendations
      10.2.2. Configuring GTM with CLI
    10.3. GTM Configuration Command Reference
      10.3.1. Command Hierarchies
        10.3.1.1. Configuration Commands
      10.3.2. Command Descriptions
        10.3.2.1. GTM Commands
    10.4. Show, Clear, and Debug Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Show Commands
  11. BIER
    11.1. BIER Overview
      11.1.1. BIER Hardware
      11.1.2. BIER IMPM
      11.1.3. BIER ECMP
      11.1.4. BIER Redundancy and Resiliency
      11.1.5. BIER Layers
      11.1.6. Implementation
        11.1.6.1. BIER Sub-domains
        11.1.6.2. BIER Set IDs
        11.1.6.3. BIER Encapsulation
          11.1.6.3.1. BIER MPLS Encapsulation
        11.1.6.4. BIER Forwarding Tables
        11.1.6.5. BIER IS-IS Sub-TLVs
        11.1.6.6. IS-IS BIER Support
        11.1.6.7. IS-IS Multi-topologies
        11.1.6.8. BIER Intra-AS Solution
        11.1.6.9. OSPF BIER Support
          11.1.6.9.1. BIER OSPF Sub-TLVs
        11.1.6.10. BIER Forwarding
          11.1.6.10.1. BIER FIB Packet Handling
        11.1.6.11. BIER MVPN
          11.1.6.11.1. BIER MVPN IPv4 and IPv6
          11.1.6.11.2. BIER MVPN Sub-domain
          11.1.6.11.3. BIER Templates
    11.2. BIER Configuration Command Reference
      11.2.1. Command Hierarchies
        11.2.1.1. Configuration Commands
      11.2.2. Command Descriptions
        11.2.2.1. BIER Commands
    11.3. Show, Clear, and Debug Command Reference
      11.3.1. Command Hierarchies
        11.3.1.1. Show Commands
      11.3.2. Command Descriptions
        11.3.2.1. Show Commands
  12. SR P2MP Policy
    12.1. Overview
    12.2. SR P2MP Policy Details
    12.3. Replication Segment
    12.4. P2MP and Replication Segment Objects
    12.5. SR P2MP Policy Instantiation
      12.5.1. SR P2MP Policy Instantiation Using the CLI
        12.5.1.1. SPMSI for Static P2MP Policy
        12.5.1.2. PMSI Tree ID Advertised by BGP
      12.5.2. SR P2MP Policy Instantiation Using PCE
        12.5.2.1. SPMSI for PCE P2MP Policy
      12.5.3. Configuration Examples
      12.5.4. Administrative Behavior
        12.5.4.1. Candidate Path Selection Criteria
        12.5.4.2. Candidate Path Operational Status
        12.5.4.3. P2MP Policy Operational Status
        12.5.4.4. Replication Segment Operational Status
      12.5.5. FRR Behavior
        12.5.5.1. Implicit Null Case
        12.5.5.2. Non-Implicit Null Case
      12.5.6. FRR Recovery Behavior
      12.5.7. BFD Behavior
      12.5.8. Maximum SPMSI Behavior
      12.5.9. Global Optimization of P2MP Policy and MBB Behavior
      12.5.10. Global Optimization of PCEP Behavior
      12.5.11. PCEP Behavior
      12.5.12. PCE Pop with Next-hop 127.0.0.0/8 or ::1
    12.6. SR P2MP Configuration Command Reference
      12.6.1. Command Hierarchies
        12.6.1.1. P2MP SR Tree Configuration Commands
        12.6.1.2. MVPN Configuration Commands
      12.6.2. Command Descriptions
        12.6.2.1. P2MP SR Tree Commands
        12.6.2.2. MVPN Commands
    12.7. SR P2MP Show Command Reference
      12.7.1. Command Hierarchies
        12.7.1.1. SR P2MP Show Commands
      12.7.2. Command Descriptions
        12.7.2.1. Show Commands
  13. Troubleshooting Tools
    13.1. Mtrace
      13.1.1. Finding the Last Hop Router
      13.1.2. Directing the Response
    13.2. Mstat
    13.3. Mrinfo
    13.4. Troubleshooting Configuration Command Reference
      13.4.1. Command Hierarchies
        13.4.1.1. Operational Commands
      13.4.2. Command Descriptions
        13.4.2.1. Operational Commands
    13.5. Show Command Reference
      13.5.1. Command Hierarchies
        13.5.1.1. Show Commands
      13.5.2. Command Descriptions
        13.5.2.1. Show Commands
  14. Standards and Protocol Support
  Customer Document and Product Support
Multiservice ISA and ESA 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. ISA and ESA Configuration Process
  2. ISA and ESA Hardware
    2.1. In This Section
    2.2. MS-ISA2 Overview
    2.3. MS-ISA Overview
    2.4. MS-ISM Overview
    2.5. ESA 100G Overview
    2.6. Application Assurance Hardware Features
      2.6.1. AA System Support
      2.6.2. Host IOM Support for AA on ISAs
      2.6.3. Host IOM Support for AA on ESAs
    2.7. Configuring an ESA with CLI
      2.7.1. Provisioning an ESA and ESA-VM
    2.8. Extended Services Appliance Command Reference
      2.8.1. Command Hierarchies
        2.8.1.1. ESA Configuration Commands
      2.8.2. Command Descriptions
        2.8.2.1. ESA Configuration Commands
    2.9. Show and Clear Command Reference
      2.9.1. Command Hierarchies
        2.9.1.1. Show Commands
        2.9.1.2. Clear Commands
      2.9.2. Command Descriptions
        2.9.2.1. Show Commands
        2.9.2.2. Clear Commands
  3. Application Assurance
    3.1. Application Assurance (AA) Overview
      3.1.1. Application Assurance: Inline Policy Enforcement
      3.1.2. AA Integration in Subscriber Edge Gateways
      3.1.3. Fixed Residential Broadband Services
        3.1.3.1. Dual-Stack Lite – DS-Lite
        3.1.3.2. 6to4 /6RD
      3.1.4. Wireless LAN Gateway Broadband Services
      3.1.5. Application-Aware Business VPN Services
      3.1.6. Mobile Backhaul
      3.1.7. Stateful Firewall Service
    3.2. Application Assurance System Architecture
      3.2.1. AA ISA Resource Configuration
        3.2.1.1. AA ISA Groups
          3.2.1.1.1. AA Group Partitions
          3.2.1.1.2. Bypass Modes
        3.2.1.2. Redundancy
          3.2.1.2.1. No AA ISA Group Redundancy
          3.2.1.2.2. Failure to Fabric
          3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
        3.2.1.3. ISA Load Balancing
        3.2.1.4. Asymmetry Removal
          3.2.1.4.1. Asymmetry Removal Overview
          3.2.1.4.2. Failure Modes
          3.2.1.4.3. AARP Peered Node/Instance Configuration
          3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
          3.2.1.4.5. Multi-Chassis Datapath Shunts
        3.2.1.5. ISA Overload Detection
      3.2.2. AA Packet Processing
        3.2.2.1. Divert of Traffic and Subscribers
          3.2.2.1.1. Services and AA Subscribers
          3.2.2.1.2. Spoke SDPs
          3.2.2.1.3. Transit AA Subscribers
          3.2.2.1.4. AA Subscriber Application Service Definition
        3.2.2.2. Traffic Identification
          3.2.2.2.1. Application Assurance Identification Components
          3.2.2.2.2. Protocol Signatures
          3.2.2.2.3. Custom Protocols
          3.2.2.2.4. Protocol Shutdown
          3.2.2.2.5. Supported Protocol Signatures
          3.2.2.2.6. Application Groups
          3.2.2.2.7. Charging Groups
          3.2.2.2.8. Applications
          3.2.2.2.9. Application Filters
          3.2.2.2.10. HTTP
          3.2.2.2.11. AA IP Prefix Lists
          3.2.2.2.12. Shallow Flow Inspection
          3.2.2.2.13. Flow Attributes
        3.2.2.3. Statistics and Accounting
          3.2.2.3.1. Per-AA Subscriber Special Study
          3.2.2.3.2. System Aspects
          3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
          3.2.2.3.4. AA Partition Traffic Type Statistics
          3.2.2.3.5. Configurable AA Subscriber Statistics Collection
          3.2.2.3.6. AA-Performance Record for ISA Load
          3.2.2.3.7. AA Partition Traffic Type Statistics
          3.2.2.3.8. AA Partition Admit–Deny Statistics
          3.2.2.3.9. RADIUS Accounting AA Records
          3.2.2.3.10. AA GX Based Usage Monitoring
          3.2.2.3.11. Supported AVPs
          3.2.2.3.12. Cflowd AA Records
          3.2.2.3.13. vRGW Nested Router Detection
        3.2.2.4. Application QoS Policy (AQP)
          3.2.2.4.1. AQP Match Criteria
          3.2.2.4.2. AQP Actions
          3.2.2.4.3. Application Assurance Policers
          3.2.2.4.4. Application Assurance Dynamic Experience Management
          3.2.2.4.5. Application Assurance HTTP Redirect
          3.2.2.4.6. Application Assurance HTTPS Policy Redirect
          3.2.2.4.7. ICAP - Large Scale Category-based URL Filtering
          3.2.2.4.8. Web-service URL Classification
          3.2.2.4.9. Local URL-List Filtering
          3.2.2.4.10. HTTP Header Enrichment
          3.2.2.4.11. HTTP In Browser Notification
        3.2.2.5. Application Assurance Firewall
          3.2.2.5.1. Denial of Service (DoS) Protection
          3.2.2.5.2. TCP Validation
          3.2.2.5.3. Policy Partitioned AA FW
          3.2.2.5.4. Configuring AA FW
          3.2.2.5.5. AA FW Logging
          3.2.2.5.6. SeGW Firewall Protection
          3.2.2.5.7. GTP Backhaul Roaming Firewall Protection
      3.2.3. Service Monitoring and Debugging
      3.2.4. CPU Utilization
      3.2.5. CLI Batch: Begin, Commit and Abort Commands
    3.3. Configuring Application Assurance with CLI
      3.3.1. Provisioning AA ISA MDA
      3.3.2. Configuring an AA ISA Group
        3.3.2.1. Configuring Watermark Parameters
      3.3.3. Configuring a Group Policy
        3.3.3.1. Beginning and Committing a Policy Configuration
        3.3.3.2. Aborting a Policy Configuration
        3.3.3.3. Configuring an IP Prefix List
        3.3.3.4. Configuring AA Session Filters
        3.3.3.5. Configuring an Application Group
        3.3.3.6. Configuring an Application
        3.3.3.7. Configuring an Application Filter
        3.3.3.8. Configuring an Application Profile
        3.3.3.9. Configuring Suppressible App-Profile with SRRP
        3.3.3.10. Configuring Application Service Options
        3.3.3.11. Configuring a Policer
        3.3.3.12. Configuring an Application QoS Policy
        3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        3.3.3.14. Configuring an HTTP Error Redirect
        3.3.3.15. Configuring HTTP Header Enrichment
        3.3.3.16. Configuring an HTTP Redirect Policy
        3.3.3.17. Configuring an HTTPS Policy Redirect
        3.3.3.18. Configuring a Captive Redirect HTTP Redirect Policy
          3.3.3.18.1. Captive-Redirect and HTTPS Flows Redirection
        3.3.3.19. Configuring ICAP URL Filtering
        3.3.3.20. Configuring Web-service URL Classification
        3.3.3.21. Configuring Local URL-List Filtering
        3.3.3.22. Configuring HTTP Notification
        3.3.3.23. Configuring Tethering Detection
      3.3.4. Configuring AA Volume Accounting and Statistics
        3.3.4.1. Configuring Cflowd Collector
        3.3.4.2. Configuring AA Comprehensive, RTP Performance, TCP Performance, and Volume Reporting
    3.4. Application Assurance Command Reference
      3.4.1. Application Assurance Command Reference
        3.4.1.1. Hardware Commands
        3.4.1.2. Admin Commands
        3.4.1.3. ISA Commands
        3.4.1.4. Application Assurance Commands
          3.4.1.4.1. AA Commands
          3.4.1.4.2. AA Group Commands
        3.4.1.5. AA Interface Commands
        3.4.1.6. Persistence Commands
      3.4.2. Command Descriptions
        3.4.2.1. Generic Commands
        3.4.2.2. Admin Commands
        3.4.2.3. Application Assurance Commands
        3.4.2.4. Group Commands
          3.4.2.4.1. Transit Subscriber Commands
          3.4.2.4.2. Policer Commands
          3.4.2.4.3. Policy Commands
          3.4.2.4.4. Statistics Commands
          3.4.2.4.5. TCP Validation Commands
          3.4.2.4.6. Tethering Commands
          3.4.2.4.7. Policy Commands
          3.4.2.4.8. System Persistence Commands
        3.4.2.5. ISA Commands
          3.4.2.5.1. Application Assurance Group Commands
    3.5. Show, Tools, Clear, and Debug Command Reference
      3.5.1. Command Hierarchies
        3.5.1.1. Show Commands
        3.5.1.2. Tools Commands
        3.5.1.3. Clear Commands
        3.5.1.4. Debug Commands
      3.5.2. Command Descriptions
        3.5.2.1. Show Commands
        3.5.2.2. Tools Commands
        3.5.2.3. Clear Commands
        3.5.2.4. Debug Commands
  4. IP Tunnels
    4.1. IP Tunnels Overview
      4.1.1. Tunnel ISAs
        4.1.1.1. Public Tunnel SAPs
        4.1.1.2. Private Tunnel SAPs
        4.1.1.3. IP Interface Configuration
        4.1.1.4. GRE and IP-IP Tunnel Configuration
        4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
        4.1.1.6. TCP MSS Adjustment
      4.1.2. Operational Conditions
        4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
      4.1.3. QoS Interactions
      4.1.4. OAM Interactions
      4.1.5. Redundancy
      4.1.6. Statistics Collection
      4.1.7. Security
        4.1.7.1. GRE Tunnel Multicast Support
        4.1.7.2. IPv6 over IPv4 GRE Tunnel
      4.1.8. IKEv2
        4.1.8.1. IKEv2 Traffic Selector and TS-List
        4.1.8.2. IKEv2 Fragmentation
      4.1.9. SHA2 Support
      4.1.10. IPsec Client Lockout
      4.1.11. IPsec Tunnel CHILD_SA Rekey
      4.1.12. Multiple IKE/ESP Transform Support
    4.2. X.509v3 Certificate Overview
      4.2.1. SR OS X.509v3 Certificate Support
      4.2.2. Local Storage
      4.2.3. CA-Profile
      4.2.4. CA Chain Computation
      4.2.5. Certificate Enrollment
      4.2.6. Certificate Revocation Check
      4.2.7. Certificate/CRL Expiration Warning
      4.2.8. Certificate/CRL/Key Cache
      4.2.9. Auto CRL Update
      4.2.10. IPsec Client Database
      4.2.11. Encryption of Imported Files
    4.3. Using Certificates For IPsec Tunnel Authentication
      4.3.1. IKEv2 Digital Signature Authentication
    4.4. Trust-Anchor Profile
    4.5. Cert-Profile
    4.6. Certificate Management Protocol Version 2 (CMPv2)
    4.7. OCSP
    4.8. Video Wholesale Example
    4.9. Multi-Chassis IPsec Redundancy Overview
      4.9.1. Architecture
      4.9.2. MC-IPsec Mastership Protocol (MIMP)
        4.9.2.1. MIMP Protocol States
        4.9.2.2. Election Logic
        4.9.2.3. Protection Status
        4.9.2.4. Other Details
      4.9.3. Routing
        4.9.3.1. Routing in Public Service
        4.9.3.2. Routing in Private Services
        4.9.3.3. Other Details About Shunting
      4.9.4. MC-IPsec Aware VRRP
      4.9.5. Synchronization
        4.9.5.1. Automatic CHILD_SA Rekey
      4.9.6. Responder Only
    4.10. IPsec Deployment Requirements
    4.11. IKEv2 Remote-Access Tunnel
      4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
      4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
        4.11.3.1. DHCPv4 Address Assignment
        4.11.3.2. DHCPv6 Address Assignment
        4.11.3.3. DHCPv4/v6 Usage Notes
      4.11.4. IPv6 IPsec Support
        4.11.4.1. IPv6 as Payload
        4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
        4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
        4.11.4.5. IPv6 as Encapsulation
    4.12. MLDv2 over IPsec
      4.12.1. MLDv2 over IPsec – Traffic Selector
      4.12.2. MLDv2 over IPsec – Configuration
    4.13. Secured Interface
    4.14. Configuring IPsec with CLI
      4.14.1. Provisioning a Tunnel ISA
      4.14.2. Configuring a Tunnel Group
      4.14.3. Configuring Router Interfaces for IPsec
      4.14.4. Configuring IPsec Parameters
      4.14.5. Configuring IPsec in Services
      4.14.6. Configuring X.509v3 Certificate Parameters
      4.14.7. Configuring MC-IPsec
        4.14.7.1. Configuring MIMP
        4.14.7.2. Configuring Multi-Chassis Synchronization
        4.14.7.3. Configuring Routing for MC-IPsec
      4.14.8. Configuring and Using CMPv2
      4.14.9. Configuring OCSP
      4.14.10. Configuring IKEv2 Remote — Access Tunnel
      4.14.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
      4.14.12. Configuring Secured Interfaces
    4.15. IP Tunnel Command Reference
      4.15.1. Command Hierarchies
        4.15.1.1. Configuration Commands
          4.15.1.1.1. Hardware Commands
          4.15.1.1.2. ISA Commands
          4.15.1.1.3. IPsec Commands
        4.15.1.2. Service Configuration Commands
          4.15.1.2.1. IES Commands
          4.15.1.2.2. VPRN Commands
          4.15.1.2.3. IPsec Mastership Election Commands
          4.15.1.2.4. Related Commands
          4.15.1.2.5. CMPv2 Commands
          4.15.1.2.6. Auto-Update Commands
          4.15.1.2.7. Show Commands
          4.15.1.2.8. Debug Commands
          4.15.1.2.9. Tools Commands
          4.15.1.2.10. Clear Commands
          4.15.1.2.11. Admin Commands
      4.15.2. Command Descriptions
        4.15.2.1. Generic Commands
        4.15.2.2. Hardware Commands
        4.15.2.3. ISA Commands
        4.15.2.4. Certificate Profile Commands
        4.15.2.5. Client Database Commands
        4.15.2.6. Internet Key Exchange (IKE) Commands
        4.15.2.7. IPsec Transform Commands
        4.15.2.8. IPsec Static Security Association Commands
        4.15.2.9. Trust Anchor Profile/TS Commands
        4.15.2.10. Tunnel Template Commands
        4.15.2.11. Service Configuration Commands
        4.15.2.12. Interface SAP Tunnel Commands
          4.15.2.12.1. IPsec Gateway Commands
        4.15.2.13. RADIUS Policy Commands
        4.15.2.14. CMPv2 Commands
        4.15.2.15. Auto-Update Command Descriptions
        4.15.2.16. IPsec Mastership Election Commands
        4.15.2.17. Show Commands
        4.15.2.18. Debug Commands
        4.15.2.19. Tools Commands
        4.15.2.20. Clear Commands
        4.15.2.21. Admin Commands
  5. L2TPV3 Tunnels
    5.1. L2TPv3 Overview
    5.2. Control Plane
    5.3. Public SAP
    5.4. Private SAP
  6. Video Services
    6.1. Video Services
      6.1.1. Video Groups
      6.1.2. Video SAP
      6.1.3. Video Interface
      6.1.4. Multicast Information Policies
      6.1.5. Perfect Stream Protection
      6.1.6. Perfect Stream Selection
        6.1.6.1. Stream Identification
        6.1.6.2. Initial Sequence Identification
        6.1.6.3. Packet Selection
        6.1.6.4. Clock Recovery
        6.1.6.5. Playout
        6.1.6.6. Loss of Transport
        6.1.6.7. Perfect Stream in Relation to FCC/RET
        6.1.6.8. Perfect Stream in Relation to VQM
      6.1.7. Video Quality Monitoring
        6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
        6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    6.2. Retransmission and Fast Channel Change
      6.2.1. RET and FCC Overview
        6.2.1.1. Retransmission
        6.2.1.2. Fast Channel Change (FCC)
          6.2.1.2.1. Retransmission Client
          6.2.1.2.2. Retransmission Server
          6.2.1.2.3. Fast Channel Change Server
          6.2.1.2.4. Logging and Accounting for RET and FCC
        6.2.1.3. RET and FCC Server Concurrency
          6.2.1.3.1. Prerequisites and Restrictions
      6.2.2. Separate Timers for FCC and RET
      6.2.3. Peak Bandwidth and Sessions per ISA
    6.3. Ad Insertion
      6.3.1. Local/Zoned Ad Insertion
        6.3.1.1. Transport Stream Ad Splicing
        6.3.1.2. Ad Zones
        6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
    6.4. Configuring Video Service Components with CLI
      6.4.1. Video Services Overview
        6.4.1.1. Configuring an ISA-MS Module
        6.4.1.2. Configuring a Video Group
        6.4.1.3. Configuring a Video SAP and Video Interface in a Service
        6.4.1.4. Basic Multicast Information Policy Configuration
      6.4.2. Sample Configurations
    6.5. Configuring RET/FCC Video Components with CLI
      6.5.1. Configuring RET/FCC Video Features in the CLI
        6.5.1.1. Configuring the RET Client
        6.5.1.2. Configuring the RET Server
        6.5.1.3. Configuring the FCC Server
        6.5.1.4. Logging and Accounting Collection for Video Statistics
    6.6. Configuring ADI Components with CLI
      6.6.1. Configuring ADI in CLI
        6.6.1.1. Configuring the RET Client
        6.6.1.2. Configuring a Video Group
        6.6.1.3. Configuring NTP
        6.6.1.4. Configuring Channel Parameters
        6.6.1.5. Configuring Service Entities
    6.7. Video Services Command Reference
      6.7.1. IP-TV Command Hierarchies
        6.7.1.1. Hardware Commands
        6.7.1.2. Video Group Commands
        6.7.1.3. Video Policy Video Commands
        6.7.1.4. Bundle and Channel Commands
        6.7.1.5. Service Video Interface Commands
          6.7.1.5.1. VPLS Commands
          6.7.1.5.2. IES Commands
          6.7.1.5.3. VPRN Commands
      6.7.2. Command Descriptions
        6.7.2.1. Generic Commands
        6.7.2.2. LNS Group Commands
        6.7.2.3. Video Group Commands
        6.7.2.4. Multicast Info Policy Commands
        6.7.2.5. Video Policy Commands
        6.7.2.6. Bundle and Channel Commands
        6.7.2.7. Service Video Interface Commands
    6.8. Show, Clear, and Debug Command Reference
      6.8.1. Command Hierarchies
        6.8.1.1. Show Commands
        6.8.1.2. Clear Commands
        6.8.1.3. Debug Commands
      6.8.2. Command Descriptions
        6.8.2.1. Show Commands
        6.8.2.2. Clear Commands
        6.8.2.3. Debug Commands
  7. Network Address Translation
    7.1. Terminology
    7.2. Network Address Translation (NAT) Overview
      7.2.1. Principles of NAT
      7.2.2. Traffic Load Balancing
      7.2.3. Application Compatibility
    7.3. Large Scale NAT
      7.3.1. Port Range Blocks
        7.3.1.1. Reserved Ports and Priority Sessions
        7.3.1.2. Preventing Port Block Starvation
          7.3.1.2.1. Dynamic Port Block Starvation in LSN
          7.3.1.2.2. Dynamic Port Block Reservation
      7.3.2. Timeouts
      7.3.3. Watermarks
    7.4. L2-Aware NAT
      7.4.1. L2-Aware NAT Bypass
        7.4.1.1. Full ESM Host Bypass
        7.4.1.2. Selective L2-Aware NAT Bypass
          7.4.1.2.1. On-Line Change of the Selective NAT Bypass
          7.4.1.2.2. NAT Bypass Verification
      7.4.2. L2-Aware NAT Destination-Based Multiple NAT Policies
        7.4.2.1. Logging
          7.4.2.1.1. RADIUS Logging and Nat-Policy Change via CoA
          7.4.2.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
        7.4.2.2. Static Port Forwards
        7.4.2.3. L2-Aware Ping
        7.4.2.4. UPnP
    7.5. L2-Aware Support for Residential Gateway Types
    7.6. One-to-One (1:1) NAT
      7.6.1. Static 1:1 NAT
        7.6.1.1. Protocol Agnostic Behavior
        7.6.1.2. Modification of Parameters in Static 1:1 NAT
        7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
        7.6.1.4. NAT-Policy Selection
        7.6.1.5. Mapping Timeout
        7.6.1.6. Logging
        7.6.1.7. Restrictions
      7.6.2. ICMP
    7.7. Deterministic NAT
      7.7.1. Overview
      7.7.2. Supported Deterministic NAT Types
      7.7.3. Number of Subscribers per Outside IP and per Pool
      7.7.4. Referencing a Pool
      7.7.5. Outside Pool Configuration
      7.7.6. Mapping Rules and the map Command in Deterministic LSN44
      7.7.7. Hashing Considerations in Deterministic LSN44
        7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      7.7.8. Sharing of Deterministic NAT Pools
      7.7.9. Simultaneous support of dynamic and deterministic NAT
      7.7.10. Selecting Traffic for NAT
      7.7.11. Inverse Mappings
        7.7.11.1. MIB approach
        7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
      7.7.12. Logging
      7.7.13. Deterministic DS-Lite
        7.7.13.1. Hashing Considerations in DS-Lite
        7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
    7.8. Destination Based NAT (DNAT)
      7.8.1. Combination of SNAPT and DNAT
      7.8.2. Forwarding Model in DNAT
      7.8.3. DNAT Traffic Selection via NAT Classifier
      7.8.4. Configuring DNAT
        7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
        7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    7.9. LSN – Multiple NAT Policies per Inside Routing Context
      7.9.1. Restrictions
      7.9.2. Multiple NAT Policies Per Inside Routing Context
      7.9.3. Routing Approach for NAT Diversion
      7.9.4. Filter-Based Approach
      7.9.5. Multiple NAT Policies with DS-Lite and NAT64
      7.9.6. Default NAT Policy
      7.9.7. Scaling Considerations
      7.9.8. Multiple NAT Policies and SPF Configuration Considerations
        7.9.8.1. Multiple NAT Policies and Forwarding Considerations
      7.9.9. Logging
    7.10. NAT and CoA
      7.10.1. CoA and NAT Policies
      7.10.2. CoA and DNAT
      7.10.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
    7.11. Port Control Protocol (PCP)
    7.12. Universal Plug and Play Internet Gateway Device Service
      7.12.1. Configuring UPnP IGD Service
    7.13. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      7.13.1. PPTP Protocol
        7.13.1.1. Supported Control Messages
        7.13.1.2. GRE Tunnel
      7.13.2. PPTP ALG Operation
      7.13.3. Multiple Sessions Initiated From the Same PPTP Client Node
      7.13.4. Selection of Call IDs in NAT
    7.14. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
    7.15. NAT Logging
      7.15.1. Syslog/SNMP/Local-File Logging
        7.15.1.1. Filtering LSN Events to System Memory
        7.15.1.2. NAT Logging to a Local File
      7.15.2. SNMP Trap Logging
      7.15.3. NAT Syslog
      7.15.4. LSN RADIUS Logging
        7.15.4.1. Periodic RADIUS Logging
          7.15.4.1.1. Message Pacing
        7.15.4.2. RADIUS Logging and L2-Aware NAT
      7.15.5. LSN and L2-Aware NAT Flow Logging
        7.15.5.1. IPFIX Flow Logging
        7.15.5.2. Template Formats
        7.15.5.3. Template Format1 and Format2
        7.15.5.4. Configuration Example
        7.15.5.5. Syslog Flow Logging
          7.15.5.5.1. Sequence Numbers
          7.15.5.5.2. Timestamp
          7.15.5.5.3. Event Aggregation
          7.15.5.5.4. Syslog Transmission Rate Limit and Overload Conditions
    7.16. DS-Lite and NAT64 Fragmentation
      7.16.1. Overview
      7.16.2. IPv6 Fragmentation in DS-Lite
      7.16.3. NAT64
    7.17. DS-Lite Reassembly
      7.17.1. Interpreting Fragmentation Statistics
    7.18. Enhanced Statistics in NAT — Histogram
      7.18.1. Configuration
    7.19. NAT Redundancy
      7.19.1. NAT Stateless Dual-Homing
        7.19.1.1. Configuration Considerations
        7.19.1.2. Troubleshooting Commands
      7.19.2. Active-Active ISA Redundancy Model
        7.19.2.1. Startup Conditions
        7.19.2.2. Recovery
        7.19.2.3. Adding Additional ISAs in the ISA Group
      7.19.3. L2-Aware Bypass
        7.19.3.1. Sharing IP Addresses in L2-Aware NAT
        7.19.3.2. Recovery
        7.19.3.3. Default Bypass During Reboot or MS-ISA Provisioning
        7.19.3.4. Logging
    7.20. Stateful Inter-Chassis NAT Redundancy
      7.20.1. Health Status and Failure Events
      7.20.2. Route Advertisements
      7.20.3. Flow Synchronization
        7.20.3.1. Loss of Synchronization
        7.20.3.2. Flow Timeout on the Standby Node
        7.20.3.3. Flow Timeout Following the Switchover
      7.20.4. Rapid Consecutive Switchovers
      7.20.5. ISA-to-ISA Communication
      7.20.6. Preemption
      7.20.7. Message Delivery Prioritization
      7.20.8. Subscriber-Aware NAT
      7.20.9. Matching Configuration on Redundant Pair of Nodes
      7.20.10. Online Configuration changes
      7.20.11. Scenario With Monitoring Ports
    7.21. ISA Feature Interactions
      7.21.1. MS-ISA Use with Service Mirrors
      7.21.2. LNS, Application Assurance and NAT
      7.21.3. Subscriber Aware Large Scale NAT44
    7.22. Mapping of Address and Port Using Translation (MAP-T)
      7.22.1. MAP-T Rules
      7.22.2. A+P Mapping Algorithm
      7.22.3. Routing Considerations
      7.22.4. Forwarding Considerations in the BR
        7.22.4.1. IPv6 Addresses
        7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
        7.22.4.3. Hub-And-Spoke Topology
        7.22.4.4. Rule Prefix Overlap
      7.22.5. BMR Rules Implementation Example
      7.22.6. ICMP
      7.22.7. Fragmentation
        7.22.7.1. Fragmentation in the Downstream Direction
        7.22.7.2. Fragmentation in the Upstream Direction
        7.22.7.3. Fragmentation Statistics
      7.22.8. Maximum Segment Size (MSS) Adjust
      7.22.9. Statistics Collection
      7.22.10. Logging
      7.22.11. Licensing
      7.22.12. Configuration
        7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
      7.22.13. Inter-Chassis Redundancy
    7.23. Configuring NAT
      7.23.1. ISA Redundancy
      7.23.2. NAT Layer 2-Aware Configurations
      7.23.3. Large Scale NAT Configuration
      7.23.4. NAT Configuration Examples
    7.24. Configuring VSR-NAT
      7.24.1. VSR-NAT Licensing
      7.24.2. Statistics Collection For LSN Bindings
      7.24.3. Statistics Collection For LSN Bandwidth
      7.24.4. VSR-NAT Show Command Examples
    7.25. VSR Scaling Profiles on BB-ISA
      7.25.1. Scaling Profiles on the VSR
      7.25.2. Scale Profile Modification
    7.26. NAT scaling profiles on ESA
      7.26.1. Scaling Profiles for NAT on ESA
      7.26.2. Scale Profile Modification
    7.27. Network Address Translation Command Reference
      7.27.1. Command Hierarchies
        7.27.1.1. ISA Configuration Commands
        7.27.1.2. NAT Service Configuration Commands
          7.27.1.2.1. NAT Outside Commands
          7.27.1.2.2. IPFIX Commands
          7.27.1.2.3. UPnP Commands
          7.27.1.2.4. ISA RADIUS Policy Commands
          7.27.1.2.5. NAT Syslog Commands
          7.27.1.2.6. VPRN Commands
        7.27.1.3. NAT Subscriber Management Commands
          7.27.1.3.1. NAT Subscriber Management BRG Commands
        7.27.1.4. NAT Router Configuration Commands
        7.27.1.5. NAT DNAT Commands
        7.27.1.6. NAT Admin Configuration Commands
        7.27.1.7. NAT MAP Domain Configuration Commands
        7.27.1.8. TCP MSS Adjustment Commands
        7.27.1.9. NAT MAP-T Configuration Commands
        7.27.1.10. Redundancy Configuration Commands
        7.27.1.11. Residential Firewall Subscriber Management Commands
        7.27.1.12. Residential Firewall Domain Commands
        7.27.1.13. Residential Firewall Commands
        7.27.1.14. Tools Commands
        7.27.1.15. Show Commands
        7.27.1.16. Clear Commands
        7.27.1.17. Tools Commands
        7.27.1.18. Filter Commands
      7.27.2. Command Descriptions
        7.27.2.1. Generic Commands
        7.27.2.2. ISA Configuration Commands
        7.27.2.3. NAT Configuration Commands
        7.27.2.4. NAT Service Configuration Commands
        7.27.2.5. NAT Outside Epipe Commands
        7.27.2.6. IPFlow Information Export Protocol Commands
        7.27.2.7. AAA Policy Commands
        7.27.2.8. NAT Syslog Commands
        7.27.2.9. NAT Subscriber Management Commands
        7.27.2.10. NAT Subscriber Management BRG Commands
        7.27.2.11. NAT DNAT Commands
        7.27.2.12. NAT MAP-T Commands
        7.27.2.13. NAT Filter Commands
        7.27.2.14. Redundancy Configuration Commands
        7.27.2.15. Residential Firewall Commands
        7.27.2.16. NAT Show Commands
        7.27.2.17. MAP-T Show Commands
        7.27.2.18. NAT Clear Commands
        7.27.2.19. MAP-T Clear Commands
        7.27.2.20. NAT Tools Commands
  8. Residential Firewall
    8.1. Residential Firewall Overview
      8.1.1. Supported Protocols and Extension Headers
        8.1.1.1. Unknown Protocols
        8.1.1.2. TCP and UDP
        8.1.1.3. ICMPv6
      8.1.2. Application Layer Gateway
      8.1.3. Additional Filtering Control
      8.1.4. TCP MSS Adjustment
      8.1.5. Static Port Forwards and DMZ
    8.2. Residential Firewall Provisioning
      8.2.1. Domains and Addressing
  9. TCP MSS Adjustment
    9.1. Overview
    9.2. TCP MSS Adjustment for ESM Hosts
    9.3. TCP MSS Adjustment for NAT Services
    9.4. TCC MSS Adjustment Commands
      9.4.1. Command Hierarchy
        9.4.1.1. TCC MSS Adjustment Command Descriptions
  10. L2TP Network Server
    10.1. Subscriber agg-rate-limit on LNS
    10.2. LNS Reassembly
      10.2.1. Overview
      10.2.2. Reassembly Function
      10.2.3. Load Sharing Between the ISAs
      10.2.4. Inter-chassis ISA Redundancy
    10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      10.3.1. Terminology
      10.3.2. LNS MLPPPoX
      10.3.3. MLPPP Encapsulation
      10.3.4. MLPPPoX Negotiation
      10.3.5. Enabling MLPPPoX
      10.3.6. Link Fragmentation and Interleaving (LFI)
        10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      10.3.7. LFI Functionality Implemented in LNS
        10.3.7.1. Last Mile QoS Awareness in the LNS
        10.3.7.2. BB-ISA Processing
        10.3.7.3. LNS-LAC Link
        10.3.7.4. AN-RG Link
        10.3.7.5. Home Link
        10.3.7.6. Optimum Fragment Size Calculation by LNS
          10.3.7.6.1. Encapsulation Based Fragment Size
          10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
          10.3.7.6.3. Selection of the Optimum Fragment Length
      10.3.8. Upstream Traffic Considerations
      10.3.9. Multiple Links MLPPPoX With No Interleaving
      10.3.10. MLPPPoX Session Support
      10.3.11. Session Load Balancing Across Multiple BB-ISAs
      10.3.12. BB-ISA Hashing Considerations
      10.3.13. Last Mile Rate and Encapsulation Parameters
      10.3.14. Link Failure Detection
      10.3.15. CoA Support
      10.3.16. Accounting
      10.3.17. Filters and Mirroring
      10.3.18. PTA Considerations
      10.3.19. QoS Considerations
        10.3.19.1. Dual-Pass
        10.3.19.2. Traffic Prioritization in LFI
        10.3.19.3. Shaping Based on the Last Mile Wire Rates
        10.3.19.4. Downstream Bandwidth Management on Egress Port
      10.3.20. Sub/Sla-Profile Considerations
      10.3.21. Example of MLPPPoX Session Setup Flow
      10.3.22. Other Considerations
    10.4. Configuration Notes
    10.5. L2TP Network Server Command Reference
      10.5.1. Command Hierarchies
        10.5.1.1. ISA Commands
        10.5.1.2. MLPPP on LNS Commands
      10.5.2. Command Descriptions
        10.5.2.1. Generic Commands
        10.5.2.2. LNS Commands
        10.5.2.3. Network Address Translation (NAT) Commands
        10.5.2.4. MLPPP on LNS Commands
  11. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. ISA and ESA Configuration Process
  2. ISA and ESA Hardware
    2.1. In This Section
    2.2. MS-ISA2 Overview
    2.3. MS-ISA Overview
    2.4. MS-ISM Overview
    2.5. ESA 100G Overview
    2.6. Application Assurance Hardware Features
      2.6.1. AA System Support
      2.6.2. Host IOM Support for AA on ISAs
      2.6.3. Host IOM Support for AA on ESAs
    2.7. Configuring an ESA with CLI
      2.7.1. Provisioning an ESA and ESA-VM
    2.8. Extended Services Appliance Command Reference
      2.8.1. Command Hierarchies
        2.8.1.1. ESA Configuration Commands
      2.8.2. Command Descriptions
        2.8.2.1. ESA Configuration Commands
    2.9. Show and Clear Command Reference
      2.9.1. Command Hierarchies
        2.9.1.1. Show Commands
        2.9.1.2. Clear Commands
      2.9.2. Command Descriptions
        2.9.2.1. Show Commands
        2.9.2.2. Clear Commands
  3. Application Assurance
    3.1. Application Assurance (AA) Overview
      3.1.1. Application Assurance: Inline Policy Enforcement
      3.1.2. AA Integration in Subscriber Edge Gateways
      3.1.3. Fixed Residential Broadband Services
        3.1.3.1. Dual-Stack Lite – DS-Lite
        3.1.3.2. 6to4 /6RD
      3.1.4. Wireless LAN Gateway Broadband Services
      3.1.5. Application-Aware Business VPN Services
      3.1.6. Mobile Backhaul
      3.1.7. Stateful Firewall Service
    3.2. Application Assurance System Architecture
      3.2.1. AA ISA Resource Configuration
        3.2.1.1. AA ISA Groups
          3.2.1.1.1. AA Group Partitions
          3.2.1.1.2. Bypass Modes
        3.2.1.2. Redundancy
          3.2.1.2.1. No AA ISA Group Redundancy
          3.2.1.2.2. Failure to Fabric
          3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
        3.2.1.3. ISA Load Balancing
        3.2.1.4. Asymmetry Removal
          3.2.1.4.1. Asymmetry Removal Overview
          3.2.1.4.2. Failure Modes
          3.2.1.4.3. AARP Peered Node/Instance Configuration
          3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
          3.2.1.4.5. Multi-Chassis Datapath Shunts
        3.2.1.5. ISA Overload Detection
      3.2.2. AA Packet Processing
        3.2.2.1. Divert of Traffic and Subscribers
          3.2.2.1.1. Services and AA Subscribers
          3.2.2.1.2. Spoke SDPs
          3.2.2.1.3. Transit AA Subscribers
          3.2.2.1.4. AA Subscriber Application Service Definition
        3.2.2.2. Traffic Identification
          3.2.2.2.1. Application Assurance Identification Components
          3.2.2.2.2. Protocol Signatures
          3.2.2.2.3. Custom Protocols
          3.2.2.2.4. Protocol Shutdown
          3.2.2.2.5. Supported Protocol Signatures
          3.2.2.2.6. Application Groups
          3.2.2.2.7. Charging Groups
          3.2.2.2.8. Applications
          3.2.2.2.9. Application Filters
          3.2.2.2.10. HTTP
          3.2.2.2.11. AA IP Prefix Lists
          3.2.2.2.12. Shallow Flow Inspection
          3.2.2.2.13. Flow Attributes
        3.2.2.3. Statistics and Accounting
          3.2.2.3.1. Per-AA Subscriber Special Study
          3.2.2.3.2. System Aspects
          3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
          3.2.2.3.4. AA Partition Traffic Type Statistics
          3.2.2.3.5. Configurable AA Subscriber Statistics Collection
          3.2.2.3.6. AA-Performance Record for ISA Load
          3.2.2.3.7. AA Partition Traffic Type Statistics
          3.2.2.3.8. AA Partition Admit–Deny Statistics
          3.2.2.3.9. RADIUS Accounting AA Records
          3.2.2.3.10. AA GX Based Usage Monitoring
          3.2.2.3.11. Supported AVPs
          3.2.2.3.12. Cflowd AA Records
          3.2.2.3.13. vRGW Nested Router Detection
        3.2.2.4. Application QoS Policy (AQP)
          3.2.2.4.1. AQP Match Criteria
          3.2.2.4.2. AQP Actions
          3.2.2.4.3. Application Assurance Policers
          3.2.2.4.4. Application Assurance Dynamic Experience Management
          3.2.2.4.5. Application Assurance HTTP Redirect
          3.2.2.4.6. Application Assurance HTTPS Policy Redirect
          3.2.2.4.7. ICAP - Large Scale Category-based URL Filtering
          3.2.2.4.8. Web-service URL Classification
          3.2.2.4.9. Local URL-List Filtering
          3.2.2.4.10. HTTP Header Enrichment
          3.2.2.4.11. HTTP In Browser Notification
        3.2.2.5. Application Assurance Firewall
          3.2.2.5.1. Denial of Service (DoS) Protection
          3.2.2.5.2. TCP Validation
          3.2.2.5.3. Policy Partitioned AA FW
          3.2.2.5.4. Configuring AA FW
          3.2.2.5.5. AA FW Logging
          3.2.2.5.6. SeGW Firewall Protection
          3.2.2.5.7. GTP Backhaul Roaming Firewall Protection
      3.2.3. Service Monitoring and Debugging
      3.2.4. CPU Utilization
      3.2.5. CLI Batch: Begin, Commit and Abort Commands
    3.3. Configuring Application Assurance with CLI
      3.3.1. Provisioning AA ISA MDA
      3.3.2. Configuring an AA ISA Group
        3.3.2.1. Configuring Watermark Parameters
      3.3.3. Configuring a Group Policy
        3.3.3.1. Beginning and Committing a Policy Configuration
        3.3.3.2. Aborting a Policy Configuration
        3.3.3.3. Configuring an IP Prefix List
        3.3.3.4. Configuring AA Session Filters
        3.3.3.5. Configuring an Application Group
        3.3.3.6. Configuring an Application
        3.3.3.7. Configuring an Application Filter
        3.3.3.8. Configuring an Application Profile
        3.3.3.9. Configuring Suppressible App-Profile with SRRP
        3.3.3.10. Configuring Application Service Options
        3.3.3.11. Configuring a Policer
        3.3.3.12. Configuring an Application QoS Policy
        3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        3.3.3.14. Configuring an HTTP Error Redirect
        3.3.3.15. Configuring HTTP Header Enrichment
        3.3.3.16. Configuring an HTTP Redirect Policy
        3.3.3.17. Configuring an HTTPS Policy Redirect
        3.3.3.18. Configuring a Captive Redirect HTTP Redirect Policy
          3.3.3.18.1. Captive-Redirect and HTTPS Flows Redirection
        3.3.3.19. Configuring ICAP URL Filtering
        3.3.3.20. Configuring Web-service URL Classification
        3.3.3.21. Configuring Local URL-List Filtering
        3.3.3.22. Configuring HTTP Notification
        3.3.3.23. Configuring Tethering Detection
      3.3.4. Configuring AA Volume Accounting and Statistics
        3.3.4.1. Configuring Cflowd Collector
        3.3.4.2. Configuring AA Comprehensive, RTP Performance, TCP Performance, and Volume Reporting
    3.4. Application Assurance Command Reference
      3.4.1. Application Assurance Command Reference
        3.4.1.1. Hardware Commands
        3.4.1.2. Admin Commands
        3.4.1.3. ISA Commands
        3.4.1.4. Application Assurance Commands
          3.4.1.4.1. AA Commands
          3.4.1.4.2. AA Group Commands
        3.4.1.5. AA Interface Commands
        3.4.1.6. Persistence Commands
      3.4.2. Command Descriptions
        3.4.2.1. Generic Commands
        3.4.2.2. Admin Commands
        3.4.2.3. Application Assurance Commands
        3.4.2.4. Group Commands
          3.4.2.4.1. Transit Subscriber Commands
          3.4.2.4.2. Policer Commands
          3.4.2.4.3. Policy Commands
          3.4.2.4.4. Statistics Commands
          3.4.2.4.5. TCP Validation Commands
          3.4.2.4.6. Tethering Commands
          3.4.2.4.7. Policy Commands
          3.4.2.4.8. System Persistence Commands
        3.4.2.5. ISA Commands
          3.4.2.5.1. Application Assurance Group Commands
    3.5. Show, Tools, Clear, and Debug Command Reference
      3.5.1. Command Hierarchies
        3.5.1.1. Show Commands
        3.5.1.2. Tools Commands
        3.5.1.3. Clear Commands
        3.5.1.4. Debug Commands
      3.5.2. Command Descriptions
        3.5.2.1. Show Commands
        3.5.2.2. Tools Commands
        3.5.2.3. Clear Commands
        3.5.2.4. Debug Commands
  4. IP Tunnels
    4.1. IP Tunnels Overview
      4.1.1. Tunnel ISAs
        4.1.1.1. Public Tunnel SAPs
        4.1.1.2. Private Tunnel SAPs
        4.1.1.3. IP Interface Configuration
        4.1.1.4. GRE and IP-IP Tunnel Configuration
        4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
        4.1.1.6. TCP MSS Adjustment
      4.1.2. Operational Conditions
        4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
      4.1.3. QoS Interactions
      4.1.4. OAM Interactions
      4.1.5. Redundancy
      4.1.6. Statistics Collection
      4.1.7. Security
        4.1.7.1. GRE Tunnel Multicast Support
        4.1.7.2. IPv6 over IPv4 GRE Tunnel
      4.1.8. IKEv2
        4.1.8.1. IKEv2 Traffic Selector and TS-List
        4.1.8.2. IKEv2 Fragmentation
      4.1.9. SHA2 Support
      4.1.10. IPsec Client Lockout
      4.1.11. IPsec Tunnel CHILD_SA Rekey
      4.1.12. Multiple IKE/ESP Transform Support
    4.2. X.509v3 Certificate Overview
      4.2.1. SR OS X.509v3 Certificate Support
      4.2.2. Local Storage
      4.2.3. CA-Profile
      4.2.4. CA Chain Computation
      4.2.5. Certificate Enrollment
      4.2.6. Certificate Revocation Check
      4.2.7. Certificate/CRL Expiration Warning
      4.2.8. Certificate/CRL/Key Cache
      4.2.9. Auto CRL Update
      4.2.10. IPsec Client Database
      4.2.11. Encryption of Imported Files
    4.3. Using Certificates For IPsec Tunnel Authentication
      4.3.1. IKEv2 Digital Signature Authentication
    4.4. Trust-Anchor Profile
    4.5. Cert-Profile
    4.6. Certificate Management Protocol Version 2 (CMPv2)
    4.7. OCSP
    4.8. Video Wholesale Example
    4.9. Multi-Chassis IPsec Redundancy Overview
      4.9.1. Architecture
      4.9.2. MC-IPsec Mastership Protocol (MIMP)
        4.9.2.1. MIMP Protocol States
        4.9.2.2. Election Logic
        4.9.2.3. Protection Status
        4.9.2.4. Other Details
      4.9.3. Routing
        4.9.3.1. Routing in Public Service
        4.9.3.2. Routing in Private Services
        4.9.3.3. Other Details About Shunting
      4.9.4. MC-IPsec Aware VRRP
      4.9.5. Synchronization
        4.9.5.1. Automatic CHILD_SA Rekey
      4.9.6. Responder Only
    4.10. IPsec Deployment Requirements
    4.11. IKEv2 Remote-Access Tunnel
      4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
      4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
        4.11.3.1. DHCPv4 Address Assignment
        4.11.3.2. DHCPv6 Address Assignment
        4.11.3.3. DHCPv4/v6 Usage Notes
      4.11.4. IPv6 IPsec Support
        4.11.4.1. IPv6 as Payload
        4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
        4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
        4.11.4.5. IPv6 as Encapsulation
    4.12. MLDv2 over IPsec
      4.12.1. MLDv2 over IPsec – Traffic Selector
      4.12.2. MLDv2 over IPsec – Configuration
    4.13. Secured Interface
    4.14. Configuring IPsec with CLI
      4.14.1. Provisioning a Tunnel ISA
      4.14.2. Configuring a Tunnel Group
      4.14.3. Configuring Router Interfaces for IPsec
      4.14.4. Configuring IPsec Parameters
      4.14.5. Configuring IPsec in Services
      4.14.6. Configuring X.509v3 Certificate Parameters
      4.14.7. Configuring MC-IPsec
        4.14.7.1. Configuring MIMP
        4.14.7.2. Configuring Multi-Chassis Synchronization
        4.14.7.3. Configuring Routing for MC-IPsec
      4.14.8. Configuring and Using CMPv2
      4.14.9. Configuring OCSP
      4.14.10. Configuring IKEv2 Remote — Access Tunnel
      4.14.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
      4.14.12. Configuring Secured Interfaces
    4.15. IP Tunnel Command Reference
      4.15.1. Command Hierarchies
        4.15.1.1. Configuration Commands
          4.15.1.1.1. Hardware Commands
          4.15.1.1.2. ISA Commands
          4.15.1.1.3. IPsec Commands
        4.15.1.2. Service Configuration Commands
          4.15.1.2.1. IES Commands
          4.15.1.2.2. VPRN Commands
          4.15.1.2.3. IPsec Mastership Election Commands
          4.15.1.2.4. Related Commands
          4.15.1.2.5. CMPv2 Commands
          4.15.1.2.6. Auto-Update Commands
          4.15.1.2.7. Show Commands
          4.15.1.2.8. Debug Commands
          4.15.1.2.9. Tools Commands
          4.15.1.2.10. Clear Commands
          4.15.1.2.11. Admin Commands
      4.15.2. Command Descriptions
        4.15.2.1. Generic Commands
        4.15.2.2. Hardware Commands
        4.15.2.3. ISA Commands
        4.15.2.4. Certificate Profile Commands
        4.15.2.5. Client Database Commands
        4.15.2.6. Internet Key Exchange (IKE) Commands
        4.15.2.7. IPsec Transform Commands
        4.15.2.8. IPsec Static Security Association Commands
        4.15.2.9. Trust Anchor Profile/TS Commands
        4.15.2.10. Tunnel Template Commands
        4.15.2.11. Service Configuration Commands
        4.15.2.12. Interface SAP Tunnel Commands
          4.15.2.12.1. IPsec Gateway Commands
        4.15.2.13. RADIUS Policy Commands
        4.15.2.14. CMPv2 Commands
        4.15.2.15. Auto-Update Command Descriptions
        4.15.2.16. IPsec Mastership Election Commands
        4.15.2.17. Show Commands
        4.15.2.18. Debug Commands
        4.15.2.19. Tools Commands
        4.15.2.20. Clear Commands
        4.15.2.21. Admin Commands
  5. L2TPV3 Tunnels
    5.1. L2TPv3 Overview
    5.2. Control Plane
    5.3. Public SAP
    5.4. Private SAP
  6. Video Services
    6.1. Video Services
      6.1.1. Video Groups
      6.1.2. Video SAP
      6.1.3. Video Interface
      6.1.4. Multicast Information Policies
      6.1.5. Perfect Stream Protection
      6.1.6. Perfect Stream Selection
        6.1.6.1. Stream Identification
        6.1.6.2. Initial Sequence Identification
        6.1.6.3. Packet Selection
        6.1.6.4. Clock Recovery
        6.1.6.5. Playout
        6.1.6.6. Loss of Transport
        6.1.6.7. Perfect Stream in Relation to FCC/RET
        6.1.6.8. Perfect Stream in Relation to VQM
      6.1.7. Video Quality Monitoring
        6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
        6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    6.2. Retransmission and Fast Channel Change
      6.2.1. RET and FCC Overview
        6.2.1.1. Retransmission
        6.2.1.2. Fast Channel Change (FCC)
          6.2.1.2.1. Retransmission Client
          6.2.1.2.2. Retransmission Server
          6.2.1.2.3. Fast Channel Change Server
          6.2.1.2.4. Logging and Accounting for RET and FCC
        6.2.1.3. RET and FCC Server Concurrency
          6.2.1.3.1. Prerequisites and Restrictions
      6.2.2. Separate Timers for FCC and RET
      6.2.3. Peak Bandwidth and Sessions per ISA
    6.3. Ad Insertion
      6.3.1. Local/Zoned Ad Insertion
        6.3.1.1. Transport Stream Ad Splicing
        6.3.1.2. Ad Zones
        6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
    6.4. Configuring Video Service Components with CLI
      6.4.1. Video Services Overview
        6.4.1.1. Configuring an ISA-MS Module
        6.4.1.2. Configuring a Video Group
        6.4.1.3. Configuring a Video SAP and Video Interface in a Service
        6.4.1.4. Basic Multicast Information Policy Configuration
      6.4.2. Sample Configurations
    6.5. Configuring RET/FCC Video Components with CLI
      6.5.1. Configuring RET/FCC Video Features in the CLI
        6.5.1.1. Configuring the RET Client
        6.5.1.2. Configuring the RET Server
        6.5.1.3. Configuring the FCC Server
        6.5.1.4. Logging and Accounting Collection for Video Statistics
    6.6. Configuring ADI Components with CLI
      6.6.1. Configuring ADI in CLI
        6.6.1.1. Configuring the RET Client
        6.6.1.2. Configuring a Video Group
        6.6.1.3. Configuring NTP
        6.6.1.4. Configuring Channel Parameters
        6.6.1.5. Configuring Service Entities
    6.7. Video Services Command Reference
      6.7.1. IP-TV Command Hierarchies
        6.7.1.1. Hardware Commands
        6.7.1.2. Video Group Commands
        6.7.1.3. Video Policy Video Commands
        6.7.1.4. Bundle and Channel Commands
        6.7.1.5. Service Video Interface Commands
          6.7.1.5.1. VPLS Commands
          6.7.1.5.2. IES Commands
          6.7.1.5.3. VPRN Commands
      6.7.2. Command Descriptions
        6.7.2.1. Generic Commands
        6.7.2.2. LNS Group Commands
        6.7.2.3. Video Group Commands
        6.7.2.4. Multicast Info Policy Commands
        6.7.2.5. Video Policy Commands
        6.7.2.6. Bundle and Channel Commands
        6.7.2.7. Service Video Interface Commands
    6.8. Show, Clear, and Debug Command Reference
      6.8.1. Command Hierarchies
        6.8.1.1. Show Commands
        6.8.1.2. Clear Commands
        6.8.1.3. Debug Commands
      6.8.2. Command Descriptions
        6.8.2.1. Show Commands
        6.8.2.2. Clear Commands
        6.8.2.3. Debug Commands
  7. Network Address Translation
    7.1. Terminology
    7.2. Network Address Translation (NAT) Overview
      7.2.1. Principles of NAT
      7.2.2. Traffic Load Balancing
      7.2.3. Application Compatibility
    7.3. Large Scale NAT
      7.3.1. Port Range Blocks
        7.3.1.1. Reserved Ports and Priority Sessions
        7.3.1.2. Preventing Port Block Starvation
          7.3.1.2.1. Dynamic Port Block Starvation in LSN
          7.3.1.2.2. Dynamic Port Block Reservation
      7.3.2. Timeouts
      7.3.3. Watermarks
    7.4. L2-Aware NAT
      7.4.1. L2-Aware NAT Bypass
        7.4.1.1. Full ESM Host Bypass
        7.4.1.2. Selective L2-Aware NAT Bypass
          7.4.1.2.1. On-Line Change of the Selective NAT Bypass
          7.4.1.2.2. NAT Bypass Verification
      7.4.2. L2-Aware NAT Destination-Based Multiple NAT Policies
        7.4.2.1. Logging
          7.4.2.1.1. RADIUS Logging and Nat-Policy Change via CoA
          7.4.2.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
        7.4.2.2. Static Port Forwards
        7.4.2.3. L2-Aware Ping
        7.4.2.4. UPnP
    7.5. L2-Aware Support for Residential Gateway Types
    7.6. One-to-One (1:1) NAT
      7.6.1. Static 1:1 NAT
        7.6.1.1. Protocol Agnostic Behavior
        7.6.1.2. Modification of Parameters in Static 1:1 NAT
        7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
        7.6.1.4. NAT-Policy Selection
        7.6.1.5. Mapping Timeout
        7.6.1.6. Logging
        7.6.1.7. Restrictions
      7.6.2. ICMP
    7.7. Deterministic NAT
      7.7.1. Overview
      7.7.2. Supported Deterministic NAT Types
      7.7.3. Number of Subscribers per Outside IP and per Pool
      7.7.4. Referencing a Pool
      7.7.5. Outside Pool Configuration
      7.7.6. Mapping Rules and the map Command in Deterministic LSN44
      7.7.7. Hashing Considerations in Deterministic LSN44
        7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      7.7.8. Sharing of Deterministic NAT Pools
      7.7.9. Simultaneous support of dynamic and deterministic NAT
      7.7.10. Selecting Traffic for NAT
      7.7.11. Inverse Mappings
        7.7.11.1. MIB approach
        7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
      7.7.12. Logging
      7.7.13. Deterministic DS-Lite
        7.7.13.1. Hashing Considerations in DS-Lite
        7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
    7.8. Destination Based NAT (DNAT)
      7.8.1. Combination of SNAPT and DNAT
      7.8.2. Forwarding Model in DNAT
      7.8.3. DNAT Traffic Selection via NAT Classifier
      7.8.4. Configuring DNAT
        7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
        7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    7.9. LSN – Multiple NAT Policies per Inside Routing Context
      7.9.1. Restrictions
      7.9.2. Multiple NAT Policies Per Inside Routing Context
      7.9.3. Routing Approach for NAT Diversion
      7.9.4. Filter-Based Approach
      7.9.5. Multiple NAT Policies with DS-Lite and NAT64
      7.9.6. Default NAT Policy
      7.9.7. Scaling Considerations
      7.9.8. Multiple NAT Policies and SPF Configuration Considerations
        7.9.8.1. Multiple NAT Policies and Forwarding Considerations
      7.9.9. Logging
    7.10. NAT and CoA
      7.10.1. CoA and NAT Policies
      7.10.2. CoA and DNAT
      7.10.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
    7.11. Port Control Protocol (PCP)
    7.12. Universal Plug and Play Internet Gateway Device Service
      7.12.1. Configuring UPnP IGD Service
    7.13. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      7.13.1. PPTP Protocol
        7.13.1.1. Supported Control Messages
        7.13.1.2. GRE Tunnel
      7.13.2. PPTP ALG Operation
      7.13.3. Multiple Sessions Initiated From the Same PPTP Client Node
      7.13.4. Selection of Call IDs in NAT
    7.14. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
    7.15. NAT Logging
      7.15.1. Syslog/SNMP/Local-File Logging
        7.15.1.1. Filtering LSN Events to System Memory
        7.15.1.2. NAT Logging to a Local File
      7.15.2. SNMP Trap Logging
      7.15.3. NAT Syslog
      7.15.4. LSN RADIUS Logging
        7.15.4.1. Periodic RADIUS Logging
          7.15.4.1.1. Message Pacing
        7.15.4.2. RADIUS Logging and L2-Aware NAT
      7.15.5. LSN and L2-Aware NAT Flow Logging
        7.15.5.1. IPFIX Flow Logging
        7.15.5.2. Template Formats
        7.15.5.3. Template Format1 and Format2
        7.15.5.4. Configuration Example
        7.15.5.5. Syslog Flow Logging
          7.15.5.5.1. Sequence Numbers
          7.15.5.5.2. Timestamp
          7.15.5.5.3. Event Aggregation
          7.15.5.5.4. Syslog Transmission Rate Limit and Overload Conditions
    7.16. DS-Lite and NAT64 Fragmentation
      7.16.1. Overview
      7.16.2. IPv6 Fragmentation in DS-Lite
      7.16.3. NAT64
    7.17. DS-Lite Reassembly
      7.17.1. Interpreting Fragmentation Statistics
    7.18. Enhanced Statistics in NAT — Histogram
      7.18.1. Configuration
    7.19. NAT Redundancy
      7.19.1. NAT Stateless Dual-Homing
        7.19.1.1. Configuration Considerations
        7.19.1.2. Troubleshooting Commands
      7.19.2. Active-Active ISA Redundancy Model
        7.19.2.1. Startup Conditions
        7.19.2.2. Recovery
        7.19.2.3. Adding Additional ISAs in the ISA Group
      7.19.3. L2-Aware Bypass
        7.19.3.1. Sharing IP Addresses in L2-Aware NAT
        7.19.3.2. Recovery
        7.19.3.3. Default Bypass During Reboot or MS-ISA Provisioning
        7.19.3.4. Logging
    7.20. Stateful Inter-Chassis NAT Redundancy
      7.20.1. Health Status and Failure Events
      7.20.2. Route Advertisements
      7.20.3. Flow Synchronization
        7.20.3.1. Loss of Synchronization
        7.20.3.2. Flow Timeout on the Standby Node
        7.20.3.3. Flow Timeout Following the Switchover
      7.20.4. Rapid Consecutive Switchovers
      7.20.5. ISA-to-ISA Communication
      7.20.6. Preemption
      7.20.7. Message Delivery Prioritization
      7.20.8. Subscriber-Aware NAT
      7.20.9. Matching Configuration on Redundant Pair of Nodes
      7.20.10. Online Configuration changes
      7.20.11. Scenario With Monitoring Ports
    7.21. ISA Feature Interactions
      7.21.1. MS-ISA Use with Service Mirrors
      7.21.2. LNS, Application Assurance and NAT
      7.21.3. Subscriber Aware Large Scale NAT44
    7.22. Mapping of Address and Port Using Translation (MAP-T)
      7.22.1. MAP-T Rules
      7.22.2. A+P Mapping Algorithm
      7.22.3. Routing Considerations
      7.22.4. Forwarding Considerations in the BR
        7.22.4.1. IPv6 Addresses
        7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
        7.22.4.3. Hub-And-Spoke Topology
        7.22.4.4. Rule Prefix Overlap
      7.22.5. BMR Rules Implementation Example
      7.22.6. ICMP
      7.22.7. Fragmentation
        7.22.7.1. Fragmentation in the Downstream Direction
        7.22.7.2. Fragmentation in the Upstream Direction
        7.22.7.3. Fragmentation Statistics
      7.22.8. Maximum Segment Size (MSS) Adjust
      7.22.9. Statistics Collection
      7.22.10. Logging
      7.22.11. Licensing
      7.22.12. Configuration
        7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
      7.22.13. Inter-Chassis Redundancy
    7.23. Configuring NAT
      7.23.1. ISA Redundancy
      7.23.2. NAT Layer 2-Aware Configurations
      7.23.3. Large Scale NAT Configuration
      7.23.4. NAT Configuration Examples
    7.24. Configuring VSR-NAT
      7.24.1. VSR-NAT Licensing
      7.24.2. Statistics Collection For LSN Bindings
      7.24.3. Statistics Collection For LSN Bandwidth
      7.24.4. VSR-NAT Show Command Examples
    7.25. VSR Scaling Profiles on BB-ISA
      7.25.1. Scaling Profiles on the VSR
      7.25.2. Scale Profile Modification
    7.26. NAT scaling profiles on ESA
      7.26.1. Scaling Profiles for NAT on ESA
      7.26.2. Scale Profile Modification
    7.27. Network Address Translation Command Reference
      7.27.1. Command Hierarchies
        7.27.1.1. ISA Configuration Commands
        7.27.1.2. NAT Service Configuration Commands
          7.27.1.2.1. NAT Outside Commands
          7.27.1.2.2. IPFIX Commands
          7.27.1.2.3. UPnP Commands
          7.27.1.2.4. ISA RADIUS Policy Commands
          7.27.1.2.5. NAT Syslog Commands
          7.27.1.2.6. VPRN Commands
        7.27.1.3. NAT Subscriber Management Commands
          7.27.1.3.1. NAT Subscriber Management BRG Commands
        7.27.1.4. NAT Router Configuration Commands
        7.27.1.5. NAT DNAT Commands
        7.27.1.6. NAT Admin Configuration Commands
        7.27.1.7. NAT MAP Domain Configuration Commands
        7.27.1.8. TCP MSS Adjustment Commands
        7.27.1.9. NAT MAP-T Configuration Commands
        7.27.1.10. Redundancy Configuration Commands
        7.27.1.11. Residential Firewall Subscriber Management Commands
        7.27.1.12. Residential Firewall Domain Commands
        7.27.1.13. Residential Firewall Commands
        7.27.1.14. Tools Commands
        7.27.1.15. Show Commands
        7.27.1.16. Clear Commands
        7.27.1.17. Tools Commands
        7.27.1.18. Filter Commands
      7.27.2. Command Descriptions
        7.27.2.1. Generic Commands
        7.27.2.2. ISA Configuration Commands
        7.27.2.3. NAT Configuration Commands
        7.27.2.4. NAT Service Configuration Commands
        7.27.2.5. NAT Outside Epipe Commands
        7.27.2.6. IPFlow Information Export Protocol Commands
        7.27.2.7. AAA Policy Commands
        7.27.2.8. NAT Syslog Commands
        7.27.2.9. NAT Subscriber Management Commands
        7.27.2.10. NAT Subscriber Management BRG Commands
        7.27.2.11. NAT DNAT Commands
        7.27.2.12. NAT MAP-T Commands
        7.27.2.13. NAT Filter Commands
        7.27.2.14. Redundancy Configuration Commands
        7.27.2.15. Residential Firewall Commands
        7.27.2.16. NAT Show Commands
        7.27.2.17. MAP-T Show Commands
        7.27.2.18. NAT Clear Commands
        7.27.2.19. MAP-T Clear Commands
        7.27.2.20. NAT Tools Commands
  8. Residential Firewall
    8.1. Residential Firewall Overview
      8.1.1. Supported Protocols and Extension Headers
        8.1.1.1. Unknown Protocols
        8.1.1.2. TCP and UDP
        8.1.1.3. ICMPv6
      8.1.2. Application Layer Gateway
      8.1.3. Additional Filtering Control
      8.1.4. TCP MSS Adjustment
      8.1.5. Static Port Forwards and DMZ
    8.2. Residential Firewall Provisioning
      8.2.1. Domains and Addressing
  9. TCP MSS Adjustment
    9.1. Overview
    9.2. TCP MSS Adjustment for ESM Hosts
    9.3. TCP MSS Adjustment for NAT Services
    9.4. TCC MSS Adjustment Commands
      9.4.1. Command Hierarchy
        9.4.1.1. TCC MSS Adjustment Command Descriptions
  10. L2TP Network Server
    10.1. Subscriber agg-rate-limit on LNS
    10.2. LNS Reassembly
      10.2.1. Overview
      10.2.2. Reassembly Function
      10.2.3. Load Sharing Between the ISAs
      10.2.4. Inter-chassis ISA Redundancy
    10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      10.3.1. Terminology
      10.3.2. LNS MLPPPoX
      10.3.3. MLPPP Encapsulation
      10.3.4. MLPPPoX Negotiation
      10.3.5. Enabling MLPPPoX
      10.3.6. Link Fragmentation and Interleaving (LFI)
        10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      10.3.7. LFI Functionality Implemented in LNS
        10.3.7.1. Last Mile QoS Awareness in the LNS
        10.3.7.2. BB-ISA Processing
        10.3.7.3. LNS-LAC Link
        10.3.7.4. AN-RG Link
        10.3.7.5. Home Link
        10.3.7.6. Optimum Fragment Size Calculation by LNS
          10.3.7.6.1. Encapsulation Based Fragment Size
          10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
          10.3.7.6.3. Selection of the Optimum Fragment Length
      10.3.8. Upstream Traffic Considerations
      10.3.9. Multiple Links MLPPPoX With No Interleaving
      10.3.10. MLPPPoX Session Support
      10.3.11. Session Load Balancing Across Multiple BB-ISAs
      10.3.12. BB-ISA Hashing Considerations
      10.3.13. Last Mile Rate and Encapsulation Parameters
      10.3.14. Link Failure Detection
      10.3.15. CoA Support
      10.3.16. Accounting
      10.3.17. Filters and Mirroring
      10.3.18. PTA Considerations
      10.3.19. QoS Considerations
        10.3.19.1. Dual-Pass
        10.3.19.2. Traffic Prioritization in LFI
        10.3.19.3. Shaping Based on the Last Mile Wire Rates
        10.3.19.4. Downstream Bandwidth Management on Egress Port
      10.3.20. Sub/Sla-Profile Considerations
      10.3.21. Example of MLPPPoX Session Setup Flow
      10.3.22. Other Considerations
    10.4. Configuration Notes
    10.5. L2TP Network Server Command Reference
      10.5.1. Command Hierarchies
        10.5.1.1. ISA Commands
        10.5.1.2. MLPPP on LNS Commands
      10.5.2. Command Descriptions
        10.5.2.1. Generic Commands
        10.5.2.2. LNS Commands
        10.5.2.3. Network Address Translation (NAT) Commands
        10.5.2.4. MLPPP on LNS Commands
  11. Standards and Protocol Support
  Customer Document and Product Support
OAM and Diagnostics Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. Mirror Services
    2.1. Service Mirroring
    2.2. Mirror Implementation
      2.2.1. Overview
      2.2.2. Mirror Source
        2.2.2.1. Types and Sources
        2.2.2.2. Mirror Source Priority
      2.2.3. Mirror Destination
        2.2.3.1. General Local and Remote Mirroring
        2.2.3.2. Mirror Destination Type IP-Only
        2.2.3.3. Mirror Destination Type PPP with Port-ID Insertion
        2.2.3.4. Layer 3 Encapsulation
        2.2.3.5. PCAP Packet Capture
        2.2.3.6. Mirrored Traffic Transport using MPLS-TP SDPs
        2.2.3.7. Slicing and Sampling
      2.2.4. Mirroring Performance
      2.2.5. Mirroring Configuration
    2.3. Lawful Intercept
      2.3.1. LI Activation Through RADIUS
      2.3.2. Routable Lawful Intercept Encapsulation
      2.3.3. Lawful Intercept Management Interfaces
        2.3.3.1. LI Management using the Classic CLI Engine
        2.3.3.2. LI Management using the MD-CLI Engine
        2.3.3.3. Lawful Intercept in NETCONF
        2.3.3.4. CLI Configuration Mode Migration
          2.3.3.4.1. Configuration Mode Migration Check List
      2.3.4. Configuring Lawful Intercept in MD-CLI
    2.4. Pseudowire Redundant Mirror Services
      2.4.1. Redundant Mirror Source Notes
    2.5. Lawful Intercept and NAT
      2.5.1. Carrier Grade NAT
      2.5.2. L2-Aware NAT
    2.6. Configuration Process Overview
    2.7. Configuration Notes
    2.8. Configuring Service Mirroring with CLI
      2.8.1. Mirror Configuration Overview
        2.8.1.1. Defining Mirrored Traffic
      2.8.2. Lawful Intercept Configuration Overview
        2.8.2.1. Saving LI Data
        2.8.2.2. Regulating LI Access
          2.8.2.2.1. LI User Access
          2.8.2.2.2. LI Source Configuration
        2.8.2.3. Configurable Filter Lock for Lawful Intercept
        2.8.2.4. LI MAC Filter Configuration
        2.8.2.5. LI Logging
      2.8.3. Basic Mirroring Configuration
        2.8.3.1. Mirror Classification Rules
          2.8.3.1.1. Port
          2.8.3.1.2. SAP
          2.8.3.1.3. MAC Filter
          2.8.3.1.4. IP Filter
          2.8.3.1.5. Ingress Label
          2.8.3.1.6. Subscriber
      2.8.4. Common Configuration Tasks
        2.8.4.1. Configuring a Local Mirror Service
        2.8.4.2. Configuring SDPs for Mirrors and LI
        2.8.4.3. Configuring a Remote Mirror Service
        2.8.4.4. Configuring an ATM Mirror Service
        2.8.4.5. Configuring Lawful Intercept Parameters
        2.8.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
    2.9. Service Management Tasks
      2.9.1. Modifying a Local Mirrored Service
      2.9.2. Deleting a Local Mirrored Service
      2.9.3. Modifying a Remote Mirrored Service
      2.9.4. Deleting a Remote Mirrored Service
    2.10. Mirror Service Configuration Command Reference
      2.10.1. Command Hierarchies
        2.10.1.1. Mirror Configuration Commands
        2.10.1.2. IP Mirror Interface Commands
        2.10.1.3. Lawful Intercept Commands
      2.10.2. Command Descriptions
        2.10.2.1. Generic Commands
        2.10.2.2. Mirror Destination Configuration Commands
        2.10.2.3. IP Mirror Interface Commands
        2.10.2.4. Lawful Intercept Commands
          2.10.2.4.1. Other LI Configuration Commands
    2.11. Mirror Service Show and Debug Command Reference
      2.11.1. Command Hierarchies
        2.11.1.1. Show Commands
        2.11.1.2. Clear Commands
        2.11.1.3. Debug Commands
      2.11.2. Command Descriptions
        2.11.2.1. Show Commands
        2.11.2.2. Clear Commands
        2.11.2.3. Debug Commands
  3. OAM, SAA, and OAM-PM
    3.1. OAM Overview
      3.1.1. LSP Diagnostics: LSP Ping and Trace
      3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      3.1.3. ECMP Considerations
      3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
      3.1.5. Downstream Detailed Mapping (DDMAP) TLV
      3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        3.1.6.1. Responder Node Procedures
        3.1.6.2. Sender Node Procedures
      3.1.7. MPLS OAM Support in Segment Routing
        3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
        3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
        3.1.7.3. Operation on SR-TE LSP
        3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
        3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
        3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
        3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
      3.1.8. MPLS OAM Support in IPv4 or IPv6 SR Policies
        3.1.8.1. LSP-Ping and LSP-Trace Operation
        3.1.8.2. ICMP-Tunneling Operation
      3.1.9. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      3.1.10. LDP ECMP Tree Building
      3.1.11. Periodic Path Exercising
      3.1.12. LSP Ping for RSVP P2MP LSP (P2MP)
      3.1.13. LSP Trace for RSVP P2MP LSP
        3.1.13.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      3.1.14. Tunneling of ICMP Reply Packets over MPLS LSP
      3.1.15. QoS Handling of Tunneled ICMP Reply Packets
      3.1.16. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      3.1.17. SDP Diagnostics
      3.1.18. SDP Ping
      3.1.19. SDP MTU Path Discovery
      3.1.20. Service Diagnostics
      3.1.21. VPLS MAC Diagnostics
      3.1.22. MAC Ping
      3.1.23. MAC Trace
      3.1.24. CPE Ping
      3.1.25. CPE Ping for PBB Epipe
        3.1.25.1. Hardware Support
      3.1.26. MAC Populate
      3.1.27. MAC Purge
      3.1.28. VLL Diagnostics
      3.1.29. VCCV Ping
        3.1.29.1. VCCV-Ping Application
        3.1.29.2. VCCV Ping in a Multi-Segment Pseudowire
      3.1.30. Automated VCCV-Trace Capability for MS-Pseudowire
        3.1.30.1. VCCV for Static Pseudowire Segments
        3.1.30.2. Detailed VCCV-Trace Operation
        3.1.30.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          3.1.30.3.1. Sending a VCCV Echo Request
          3.1.30.3.2. Receiving an VCCV Echo Request
          3.1.30.3.3. Receiving an VCCV Echo Reply
      3.1.31. IGMP Snooping Diagnostics
      3.1.32. MFIB Ping
      3.1.33. ATM Diagnostics
      3.1.34. MPLS-TP On-Demand OAM Commands
      3.1.35. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        3.1.35.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      3.1.36. MPLS-TP LSPs: LSP-Ping/LSP Trace
      3.1.37. VXLAN Ping Supporting EVPN for VXLAN
      3.1.38. Show Commands
      3.1.39. BFD
      3.1.40. MPLS Performance Monitoring (MPLS PM)
        3.1.40.1. Configuring MPLS PM
          3.1.40.1.1. Accounting Policy Configuration
          3.1.40.1.2. Enabling MPLS DM
          3.1.40.1.3. RSVP LSP Configuration
          3.1.40.1.4. RSVP-Auto LSP Configuration Components
          3.1.40.1.5. MPLS-TP LSP Configuration
          3.1.40.1.6. MPLS OAM-PM Configuration
      3.1.41. BIER OAM
        3.1.41.1. ECMP and BIER OAM
        3.1.41.2. Outbound Time
        3.1.41.3. Negative Outbound Time
    3.2. IP Performance Monitoring (IP PM)
      3.2.1. Two-Way Active Measurement Protocol (TWAMP)
      3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
    3.3. MPLS Performance Monitoring (MPLS PM)
    3.4. Ethernet Connectivity Fault Management (ETH-CFM)
      3.4.1. ETH-CFM Building Blocks
      3.4.2. Loopback
      3.4.3. Loopback Multicast
      3.4.4. Linktrace
      3.4.5. Continuity Check (CC)
      3.4.6. CC Remote Peer Auto-Discovery
      3.4.7. ETH-CFM Grace Overview
        3.4.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
        3.4.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
      3.4.8. CCM Hold Timers
      3.4.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
      3.4.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
      3.4.11. ITU-T Y.1731 Test (ETH-TST)
      3.4.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
      3.4.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
      3.4.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
      3.4.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
        3.4.15.1. ETH-LMM Single SAP Counter
        3.4.15.2. ETH-LMM Per Forwarding Class Counter
        3.4.15.3. Interaction Between Single and Per FC Counters
      3.4.16. ETH-CFM Destination Options
      3.4.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
    3.5. ETH-CFM Statistics
    3.6. ETH-CFM Packet Debug
    3.7. ETH-CFM CoS Considerations
    3.8. OAM Mapping
      3.8.1. CFM Connectivity Fault Conditions
      3.8.2. CFM Fault Propagation Methods
      3.8.3. Epipe Services
      3.8.4. CFM Detected Fault
        3.8.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
        3.8.4.2. Service Down
        3.8.4.3. Interaction with Pseudowire Redundancy
      3.8.5. Ipipe Services
        3.8.5.1. CFM Detected Fault
        3.8.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
        3.8.5.3. Service Administratively Shutdown
        3.8.5.4. Interaction with Pseudowire Redundancy
      3.8.6. VPLS Service
        3.8.6.1. CFM Detected Fault
        3.8.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
        3.8.6.3. Service Down
        3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
      3.8.7. IES and VPRN Services
      3.8.8. Pseudowire Switching
      3.8.9. LLF and CFM Fault Propagation
      3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
    3.9. Service Assurance Agent (SAA)
    3.10. OAM Performance Monitoring (OAM-PM)
      3.10.1. Session
      3.10.2. Standard PM Packets
      3.10.3. Detectable Transmit Errors
      3.10.4. Measurement Intervals
      3.10.5. Data Structures and Storage
      3.10.6. Bin Groups
      3.10.7. Delay Results Streaming
      3.10.8. Relating the Components
      3.10.9. IP Performance Monitoring Configuration
        3.10.9.1. Accounting Policy Configuration
        3.10.9.2. Service Configuration Launch (VPRN)
        3.10.9.3. TWAMP Light Reflector (VPRN)
        3.10.9.4. OAM-PM Configuration
      3.10.10. MPLS Performance Monitoring (MPLS PM) Configuration
        3.10.10.1. Accounting Policy Configuration
        3.10.10.2. Enabling MPLS DM
        3.10.10.3. RSVP LSP Configuration
        3.10.10.4. RSVP-Auto LSP Configuration Components
        3.10.10.5. MPLS-TP LSP Configuration
        3.10.10.6. MPLS OAM-PM Configuration
      3.10.11. Ethernet Performance Monitoring
        3.10.11.1. Accounting Policy Configuration
        3.10.11.2. ETH-CFM Configuration
        3.10.11.3. Service Configuration
        3.10.11.4. Ethernet OAM-PM Configuration
      3.10.12. OAM-PM Event Monitoring
    3.11. Bi-directional Forwarding Detection
      3.11.1. BFD Control Packet
      3.11.2. Control Packet Format
      3.11.3. Echo Support
      3.11.4. Centralized BFD
        3.11.4.1. IES Over Spoke SDP
        3.11.4.2. BFD Over LAG and VSM Interfaces
        3.11.4.3. BFD on an Unnumbered IPv4 Interface
        3.11.4.4. LSP BFD and VCCV BFD
        3.11.4.5. Seamless BFD for SR-TE LSPs
      3.11.5. Seamless Bidirectional Forwarding Detection
        3.11.5.1. S-BFD Reflector Configuration and Behavior
        3.11.5.2. S-BFD Initiator Global Configuration
          3.11.5.2.1. Static S-BFD Discriminator Configuration
          3.11.5.2.2. Automated S-BFD Discriminator Distribution
    3.12. Traceroute with ICMP Tunneling In Common Applications
      3.12.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      3.12.2. VPRN Inter-AS Option B
      3.12.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    3.13. Hashing Visibility Tool
      3.13.1. Configuring the Header Templates
      3.13.2. Configuring Parameter Overrides and Header Sequences
    3.14. Diagnostics Command Reference
      3.14.1. Command Hierarchies
        3.14.1.1. OAM Commands
          3.14.1.1.1. Base Operational Commands
          3.14.1.1.2. ATM Diagnostics
          3.14.1.1.3. Find Egress Tool
          3.14.1.1.4. IGMP Snooping
          3.14.1.1.5. LDP Diagnostics
          3.14.1.1.6. LSP Diagnostics
          3.14.1.1.7. SDP Diagnostics
          3.14.1.1.8. Common Service Diagnostics
          3.14.1.1.9. VLL Diagnostics
          3.14.1.1.10. Ethernet in the First Mile (EFM) Commands
          3.14.1.1.11. ETH-CFM OAM Commands
          3.14.1.1.12. BIER OAM Commands
        3.14.1.2. SAA Commands
        3.14.1.3. OAM Performance Monitoring, Bin Group, Session, and Streaming Commands
          3.14.1.3.1. Bin Group and Base Session Commands
          3.14.1.3.2. Session Ethernet Commands
          3.14.1.3.3. Session IP Commands
          3.14.1.3.4. Session MPLS Commands
          3.14.1.3.5. Streaming Commands
          3.14.1.3.6. Performance Monitoring Reflector Commands
          3.14.1.3.7. Seamless BFD Commands
        3.14.1.4. Show Commands
        3.14.1.5. Clear Commands
        3.14.1.6. Monitor Commands
        3.14.1.7. Debug Commands
        3.14.1.8. Tools Commands
      3.14.2. Command Descriptions
        3.14.2.1. Generic Commands
        3.14.2.2. Base Operational Commands
        3.14.2.3. ATM Diagnostics
        3.14.2.4. Find Egress Tool
        3.14.2.5.  IGMP Snooping
        3.14.2.6. LDP Diagnostics
        3.14.2.7. LSP Diagnostics
        3.14.2.8. SDP Diagnostics
        3.14.2.9. Common Service Diagnostics
        3.14.2.10. VLL Diagnostics
        3.14.2.11. Ethernet in the First Mile (EFM) Commands
        3.14.2.12. ETH-CFM OAM Commands
        3.14.2.13. BIER OAM Commands
        3.14.2.14. SAA Commands
        3.14.2.15. OAM Performance Monitoring, Bin Group, and Session Commands
          3.14.2.15.1. Bin Group Commands
          3.14.2.15.2. Session Ethernet Commands
          3.14.2.15.3. Session IP Commands
          3.14.2.15.4. Session MPLS Commands
          3.14.2.15.5. Streaming Commands
        3.14.2.16. Performance Monitoring and Reflector Commands
          3.14.2.16.1. TWAMP Server Commands
          3.14.2.16.2. TWAMP Light Reflector Commands
          3.14.2.16.3. MPLS DM Reflector Commands
        3.14.2.17. Seamless BFD Commands
        3.14.2.18. Show Commands
          3.14.2.18.1. OAM Performance Monitoring and Binning Show Commands
        3.14.2.19. Clear Commands
        3.14.2.20. Monitor Commands
        3.14.2.21. Debug Commands
        3.14.2.22. Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. Mirror Services
    2.1. Service Mirroring
    2.2. Mirror Implementation
      2.2.1. Overview
      2.2.2. Mirror Source
        2.2.2.1. Types and Sources
        2.2.2.2. Mirror Source Priority
      2.2.3. Mirror Destination
        2.2.3.1. General Local and Remote Mirroring
        2.2.3.2. Mirror Destination Type IP-Only
        2.2.3.3. Mirror Destination Type PPP with Port-ID Insertion
        2.2.3.4. Layer 3 Encapsulation
        2.2.3.5. PCAP Packet Capture
        2.2.3.6. Mirrored Traffic Transport using MPLS-TP SDPs
        2.2.3.7. Slicing and Sampling
      2.2.4. Mirroring Performance
      2.2.5. Mirroring Configuration
    2.3. Lawful Intercept
      2.3.1. LI Activation Through RADIUS
      2.3.2. Routable Lawful Intercept Encapsulation
      2.3.3. Lawful Intercept Management Interfaces
        2.3.3.1. LI Management using the Classic CLI Engine
        2.3.3.2. LI Management using the MD-CLI Engine
        2.3.3.3. Lawful Intercept in NETCONF
        2.3.3.4. CLI Configuration Mode Migration
          2.3.3.4.1. Configuration Mode Migration Check List
      2.3.4. Configuring Lawful Intercept in MD-CLI
    2.4. Pseudowire Redundant Mirror Services
      2.4.1. Redundant Mirror Source Notes
    2.5. Lawful Intercept and NAT
      2.5.1. Carrier Grade NAT
      2.5.2. L2-Aware NAT
    2.6. Configuration Process Overview
    2.7. Configuration Notes
    2.8. Configuring Service Mirroring with CLI
      2.8.1. Mirror Configuration Overview
        2.8.1.1. Defining Mirrored Traffic
      2.8.2. Lawful Intercept Configuration Overview
        2.8.2.1. Saving LI Data
        2.8.2.2. Regulating LI Access
          2.8.2.2.1. LI User Access
          2.8.2.2.2. LI Source Configuration
        2.8.2.3. Configurable Filter Lock for Lawful Intercept
        2.8.2.4. LI MAC Filter Configuration
        2.8.2.5. LI Logging
      2.8.3. Basic Mirroring Configuration
        2.8.3.1. Mirror Classification Rules
          2.8.3.1.1. Port
          2.8.3.1.2. SAP
          2.8.3.1.3. MAC Filter
          2.8.3.1.4. IP Filter
          2.8.3.1.5. Ingress Label
          2.8.3.1.6. Subscriber
      2.8.4. Common Configuration Tasks
        2.8.4.1. Configuring a Local Mirror Service
        2.8.4.2. Configuring SDPs for Mirrors and LI
        2.8.4.3. Configuring a Remote Mirror Service
        2.8.4.4. Configuring an ATM Mirror Service
        2.8.4.5. Configuring Lawful Intercept Parameters
        2.8.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
    2.9. Service Management Tasks
      2.9.1. Modifying a Local Mirrored Service
      2.9.2. Deleting a Local Mirrored Service
      2.9.3. Modifying a Remote Mirrored Service
      2.9.4. Deleting a Remote Mirrored Service
    2.10. Mirror Service Configuration Command Reference
      2.10.1. Command Hierarchies
        2.10.1.1. Mirror Configuration Commands
        2.10.1.2. IP Mirror Interface Commands
        2.10.1.3. Lawful Intercept Commands
      2.10.2. Command Descriptions
        2.10.2.1. Generic Commands
        2.10.2.2. Mirror Destination Configuration Commands
        2.10.2.3. IP Mirror Interface Commands
        2.10.2.4. Lawful Intercept Commands
          2.10.2.4.1. Other LI Configuration Commands
    2.11. Mirror Service Show and Debug Command Reference
      2.11.1. Command Hierarchies
        2.11.1.1. Show Commands
        2.11.1.2. Clear Commands
        2.11.1.3. Debug Commands
      2.11.2. Command Descriptions
        2.11.2.1. Show Commands
        2.11.2.2. Clear Commands
        2.11.2.3. Debug Commands
  3. OAM, SAA, and OAM-PM
    3.1. OAM Overview
      3.1.1. LSP Diagnostics: LSP Ping and Trace
      3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      3.1.3. ECMP Considerations
      3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
      3.1.5. Downstream Detailed Mapping (DDMAP) TLV
      3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        3.1.6.1. Responder Node Procedures
        3.1.6.2. Sender Node Procedures
      3.1.7. MPLS OAM Support in Segment Routing
        3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
        3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
        3.1.7.3. Operation on SR-TE LSP
        3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
        3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
        3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
        3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
      3.1.8. MPLS OAM Support in IPv4 or IPv6 SR Policies
        3.1.8.1. LSP-Ping and LSP-Trace Operation
        3.1.8.2. ICMP-Tunneling Operation
      3.1.9. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      3.1.10. LDP ECMP Tree Building
      3.1.11. Periodic Path Exercising
      3.1.12. LSP Ping for RSVP P2MP LSP (P2MP)
      3.1.13. LSP Trace for RSVP P2MP LSP
        3.1.13.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      3.1.14. Tunneling of ICMP Reply Packets over MPLS LSP
      3.1.15. QoS Handling of Tunneled ICMP Reply Packets
      3.1.16. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      3.1.17. SDP Diagnostics
      3.1.18. SDP Ping
      3.1.19. SDP MTU Path Discovery
      3.1.20. Service Diagnostics
      3.1.21. VPLS MAC Diagnostics
      3.1.22. MAC Ping
      3.1.23. MAC Trace
      3.1.24. CPE Ping
      3.1.25. CPE Ping for PBB Epipe
        3.1.25.1. Hardware Support
      3.1.26. MAC Populate
      3.1.27. MAC Purge
      3.1.28. VLL Diagnostics
      3.1.29. VCCV Ping
        3.1.29.1. VCCV-Ping Application
        3.1.29.2. VCCV Ping in a Multi-Segment Pseudowire
      3.1.30. Automated VCCV-Trace Capability for MS-Pseudowire
        3.1.30.1. VCCV for Static Pseudowire Segments
        3.1.30.2. Detailed VCCV-Trace Operation
        3.1.30.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          3.1.30.3.1. Sending a VCCV Echo Request
          3.1.30.3.2. Receiving an VCCV Echo Request
          3.1.30.3.3. Receiving an VCCV Echo Reply
      3.1.31. IGMP Snooping Diagnostics
      3.1.32. MFIB Ping
      3.1.33. ATM Diagnostics
      3.1.34. MPLS-TP On-Demand OAM Commands
      3.1.35. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        3.1.35.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      3.1.36. MPLS-TP LSPs: LSP-Ping/LSP Trace
      3.1.37. VXLAN Ping Supporting EVPN for VXLAN
      3.1.38. Show Commands
      3.1.39. BFD
      3.1.40. MPLS Performance Monitoring (MPLS PM)
        3.1.40.1. Configuring MPLS PM
          3.1.40.1.1. Accounting Policy Configuration
          3.1.40.1.2. Enabling MPLS DM
          3.1.40.1.3. RSVP LSP Configuration
          3.1.40.1.4. RSVP-Auto LSP Configuration Components
          3.1.40.1.5. MPLS-TP LSP Configuration
          3.1.40.1.6. MPLS OAM-PM Configuration
      3.1.41. BIER OAM
        3.1.41.1. ECMP and BIER OAM
        3.1.41.2. Outbound Time
        3.1.41.3. Negative Outbound Time
    3.2. IP Performance Monitoring (IP PM)
      3.2.1. Two-Way Active Measurement Protocol (TWAMP)
      3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
    3.3. MPLS Performance Monitoring (MPLS PM)
    3.4. Ethernet Connectivity Fault Management (ETH-CFM)
      3.4.1. ETH-CFM Building Blocks
      3.4.2. Loopback
      3.4.3. Loopback Multicast
      3.4.4. Linktrace
      3.4.5. Continuity Check (CC)
      3.4.6. CC Remote Peer Auto-Discovery
      3.4.7. ETH-CFM Grace Overview
        3.4.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
        3.4.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
      3.4.8. CCM Hold Timers
      3.4.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
      3.4.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
      3.4.11. ITU-T Y.1731 Test (ETH-TST)
      3.4.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
      3.4.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
      3.4.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
      3.4.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
        3.4.15.1. ETH-LMM Single SAP Counter
        3.4.15.2. ETH-LMM Per Forwarding Class Counter
        3.4.15.3. Interaction Between Single and Per FC Counters
      3.4.16. ETH-CFM Destination Options
      3.4.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
    3.5. ETH-CFM Statistics
    3.6. ETH-CFM Packet Debug
    3.7. ETH-CFM CoS Considerations
    3.8. OAM Mapping
      3.8.1. CFM Connectivity Fault Conditions
      3.8.2. CFM Fault Propagation Methods
      3.8.3. Epipe Services
      3.8.4. CFM Detected Fault
        3.8.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
        3.8.4.2. Service Down
        3.8.4.3. Interaction with Pseudowire Redundancy
      3.8.5. Ipipe Services
        3.8.5.1. CFM Detected Fault
        3.8.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
        3.8.5.3. Service Administratively Shutdown
        3.8.5.4. Interaction with Pseudowire Redundancy
      3.8.6. VPLS Service
        3.8.6.1. CFM Detected Fault
        3.8.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
        3.8.6.3. Service Down
        3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
      3.8.7. IES and VPRN Services
      3.8.8. Pseudowire Switching
      3.8.9. LLF and CFM Fault Propagation
      3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
    3.9. Service Assurance Agent (SAA)
    3.10. OAM Performance Monitoring (OAM-PM)
      3.10.1. Session
      3.10.2. Standard PM Packets
      3.10.3. Detectable Transmit Errors
      3.10.4. Measurement Intervals
      3.10.5. Data Structures and Storage
      3.10.6. Bin Groups
      3.10.7. Delay Results Streaming
      3.10.8. Relating the Components
      3.10.9. IP Performance Monitoring Configuration
        3.10.9.1. Accounting Policy Configuration
        3.10.9.2. Service Configuration Launch (VPRN)
        3.10.9.3. TWAMP Light Reflector (VPRN)
        3.10.9.4. OAM-PM Configuration
      3.10.10. MPLS Performance Monitoring (MPLS PM) Configuration
        3.10.10.1. Accounting Policy Configuration
        3.10.10.2. Enabling MPLS DM
        3.10.10.3. RSVP LSP Configuration
        3.10.10.4. RSVP-Auto LSP Configuration Components
        3.10.10.5. MPLS-TP LSP Configuration
        3.10.10.6. MPLS OAM-PM Configuration
      3.10.11. Ethernet Performance Monitoring
        3.10.11.1. Accounting Policy Configuration
        3.10.11.2. ETH-CFM Configuration
        3.10.11.3. Service Configuration
        3.10.11.4. Ethernet OAM-PM Configuration
      3.10.12. OAM-PM Event Monitoring
    3.11. Bi-directional Forwarding Detection
      3.11.1. BFD Control Packet
      3.11.2. Control Packet Format
      3.11.3. Echo Support
      3.11.4. Centralized BFD
        3.11.4.1. IES Over Spoke SDP
        3.11.4.2. BFD Over LAG and VSM Interfaces
        3.11.4.3. BFD on an Unnumbered IPv4 Interface
        3.11.4.4. LSP BFD and VCCV BFD
        3.11.4.5. Seamless BFD for SR-TE LSPs
      3.11.5. Seamless Bidirectional Forwarding Detection
        3.11.5.1. S-BFD Reflector Configuration and Behavior
        3.11.5.2. S-BFD Initiator Global Configuration
          3.11.5.2.1. Static S-BFD Discriminator Configuration
          3.11.5.2.2. Automated S-BFD Discriminator Distribution
    3.12. Traceroute with ICMP Tunneling In Common Applications
      3.12.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      3.12.2. VPRN Inter-AS Option B
      3.12.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    3.13. Hashing Visibility Tool
      3.13.1. Configuring the Header Templates
      3.13.2. Configuring Parameter Overrides and Header Sequences
    3.14. Diagnostics Command Reference
      3.14.1. Command Hierarchies
        3.14.1.1. OAM Commands
          3.14.1.1.1. Base Operational Commands
          3.14.1.1.2. ATM Diagnostics
          3.14.1.1.3. Find Egress Tool
          3.14.1.1.4. IGMP Snooping
          3.14.1.1.5. LDP Diagnostics
          3.14.1.1.6. LSP Diagnostics
          3.14.1.1.7. SDP Diagnostics
          3.14.1.1.8. Common Service Diagnostics
          3.14.1.1.9. VLL Diagnostics
          3.14.1.1.10. Ethernet in the First Mile (EFM) Commands
          3.14.1.1.11. ETH-CFM OAM Commands
          3.14.1.1.12. BIER OAM Commands
        3.14.1.2. SAA Commands
        3.14.1.3. OAM Performance Monitoring, Bin Group, Session, and Streaming Commands
          3.14.1.3.1. Bin Group and Base Session Commands
          3.14.1.3.2. Session Ethernet Commands
          3.14.1.3.3. Session IP Commands
          3.14.1.3.4. Session MPLS Commands
          3.14.1.3.5. Streaming Commands
          3.14.1.3.6. Performance Monitoring Reflector Commands
          3.14.1.3.7. Seamless BFD Commands
        3.14.1.4. Show Commands
        3.14.1.5. Clear Commands
        3.14.1.6. Monitor Commands
        3.14.1.7. Debug Commands
        3.14.1.8. Tools Commands
      3.14.2. Command Descriptions
        3.14.2.1. Generic Commands
        3.14.2.2. Base Operational Commands
        3.14.2.3. ATM Diagnostics
        3.14.2.4. Find Egress Tool
        3.14.2.5.  IGMP Snooping
        3.14.2.6. LDP Diagnostics
        3.14.2.7. LSP Diagnostics
        3.14.2.8. SDP Diagnostics
        3.14.2.9. Common Service Diagnostics
        3.14.2.10. VLL Diagnostics
        3.14.2.11. Ethernet in the First Mile (EFM) Commands
        3.14.2.12. ETH-CFM OAM Commands
        3.14.2.13. BIER OAM Commands
        3.14.2.14. SAA Commands
        3.14.2.15. OAM Performance Monitoring, Bin Group, and Session Commands
          3.14.2.15.1. Bin Group Commands
          3.14.2.15.2. Session Ethernet Commands
          3.14.2.15.3. Session IP Commands
          3.14.2.15.4. Session MPLS Commands
          3.14.2.15.5. Streaming Commands
        3.14.2.16. Performance Monitoring and Reflector Commands
          3.14.2.16.1. TWAMP Server Commands
          3.14.2.16.2. TWAMP Light Reflector Commands
          3.14.2.16.3. MPLS DM Reflector Commands
        3.14.2.17. Seamless BFD Commands
        3.14.2.18. Show Commands
          3.14.2.18.1. OAM Performance Monitoring and Binning Show Commands
        3.14.2.19. Clear Commands
        3.14.2.20. Monitor Commands
        3.14.2.21. Debug Commands
        3.14.2.22. Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
Quality of Service Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. QoS Configuration Process
  2. QoS Policies
    2.1. QoS Overview
    2.2. Forwarding Classes
      2.2.1. High-Priority Classes
      2.2.2. Assured Classes
      2.2.3. Best-Effort Classes
    2.3. Queue Parameters
      2.3.1. Queue ID
      2.3.2. Unicast or Multipoint Queue
      2.3.3. Queue Type
      2.3.4. Queue Scheduling
      2.3.5. Peak Information Rate
      2.3.6. Committed Information Rate
      2.3.7. Fair Information Rate
      2.3.8. Adaptation Rule
      2.3.9. Committed Burst Size
      2.3.10. Maximum Burst Size
      2.3.11. Queue Drop Tails
      2.3.12. WRED Per Queue
        2.3.12.1. Native Queue Mode
        2.3.12.2. Pool Per Queue Mode
      2.3.13. Packet Markings
      2.3.14. Queue Counters
      2.3.15. Color Aware Profiling
    2.4. QoS Policies Overview
      2.4.1. Service versus Network QoS
      2.4.2. QoS Policy Entities
      2.4.3. Network QoS Policies
      2.4.4. Network Queue QoS Policies
      2.4.5. Service Ingress QoS Policies
        2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
        2.4.5.2. Egress Forwarding Class Override
      2.4.6. Service Egress QoS Policies
      2.4.7. Slope Policies
        2.4.7.1. RED Slopes
        2.4.7.2. Tuning the SBAU Calculation
        2.4.7.3. Slope Policy Parameters
      2.4.8. Scheduler Policies
        2.4.8.1. Virtual Hierarchical Scheduling
        2.4.8.2. Hierarchical Scheduler Policies
          2.4.8.2.1. Hierarchical Virtual Schedulers
        2.4.8.3. Tiers
        2.4.8.4. Scheduler Policies Applied to Applications
        2.4.8.5. Scheduler Policies Applied to SAPs
        2.4.8.6. Scheduler Policies Applied to Customer SLAs
        2.4.8.7. Scheduler Policies Applied to Multiservice Sites
      2.4.9. ATM Traffic Descriptor Profiles
      2.4.10. Configuration Notes
  3. FP QoS Configuration
    3.1. FP4 Ingress and Egress Queue Reallocation
      3.1.1. FP QoS Configuration Command Reference
        3.1.1.1. Command Hierarchies
          3.1.1.1.1. FP QoS Commands
        3.1.1.2. Command Descriptions
          3.1.1.2.1. FP QoS Commands
      3.1.2. Show Command Reference
        3.1.2.1. Command Hierarchies
          3.1.2.1.1. Show Commands
        3.1.2.2. Command Descriptions
          3.1.2.2.1. Show Commands
  4. Match List for QoS Policies
    4.1. Match List for QoS Policies Commands
      4.1.1. Command Hierarchies
        4.1.1.1. Configuration Commands
        4.1.1.2. Show Commands
      4.1.2. Command Descriptions
        4.1.2.1. Configuration Commands
        4.1.2.2. Show Commands
  5. Network QoS Policies
    5.1. Network QoS Policies Overview
      5.1.1. Storing Match-Criteria Entries
        5.1.1.1. FP4-based Cards
    5.2. Network Ingress
      5.2.1. Network Ingress Tunnel QoS Override
      5.2.2. Network Ingress IP Match Criteria
      5.2.3. Network Ingress IPv6 Match Criteria
    5.3. Network Egress
      5.3.1. Egress Packet Reclassification Based on IP precedence DSCP
      5.3.2. Network Egress IP Match Criteria
      5.3.3. Network Egress IPv6 Match Criteria
    5.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
      5.4.1. Default DSCP Mapping Table
    5.5. Basic Configurations
      5.5.1. Creating a Network QoS Policy
      5.5.2. Applying Network QoS Policies
      5.5.3. Default Network QoS Policy Values
    5.6. Service Management Tasks
      5.6.1. Deleting QoS Policies
      5.6.2. Removing a Policy from the QoS Configuration
      5.6.3. Copying and Overwriting Network Policies
      5.6.4. Editing QoS Policies
    5.7. Network QoS Policy Command Reference
      5.7.1. Command Hierarchies
        5.7.1.1. Configuration Commands
          5.7.1.1.1. Multi-Class Frame Relay Profile Commands
          5.7.1.1.2. Network QoS Policy Commands
          5.7.1.1.3. Model-Driven Automatic ID Commands
        5.7.1.2. Self-Generated Traffic Commands
        5.7.1.3. Operational Commands
        5.7.1.4. Show Commands
        5.7.1.5. Tools Commands
      5.7.2. Command Descriptions
        5.7.2.1. Configuration Commands
          5.7.2.1.1. Generic Commands
          5.7.2.1.2. Multi-Class Frame Relay Profile Commands
          5.7.2.1.3. Network QoS Policy Commands
          5.7.2.1.4. Model-Driven Automatic ID Commands
        5.7.2.2. Self-Generated Traffic Commands
        5.7.2.3. Operational Commands
        5.7.2.4. Show Commands
  6. Network Queue QoS Policies
    6.1. Overview
    6.2. Network Queue Parent Scheduler
    6.3. Basic Configurations
      6.3.1. Creating a Network Queue QoS Policy
      6.3.2. Applying Network Queue QoS Policies
        6.3.2.1. FPs
        6.3.2.2. Ethernet Ports
        6.3.2.3. SONET/SDH Ports
      6.3.3. Default Network Queue Policy Values
    6.4. Service Management Tasks
      6.4.1. Deleting QoS Policies
      6.4.2. Removing a Policy from the QoS Configuration
      6.4.3. Copying and Overwriting QoS Policies
      6.4.4. Editing QoS Policies
    6.5. Network Queue QoS Policy Command Reference
      6.5.1. Command Hierarchies
        6.5.1.1. Configuration Commands
        6.5.1.2. Operational Commands
        6.5.1.3. Show Commands
      6.5.2. Command Descriptions
        6.5.2.1. Configuration Commands
          6.5.2.1.1. Generic Commands
          6.5.2.1.2. Network Queue QoS Policy Commands
        6.5.2.2. Operational Commands
        6.5.2.3. Show Commands
  7. Service Ingress and Egress QoS Policies
    7.1. Overview
    7.2. Basic Configurations
    7.3. Service Ingress QoS Policy
      7.3.1. Service Ingress QoS Queue
      7.3.2. Ingress Percent-Rate Support
      7.3.3. Ingress Forwarding Class (FC)
      7.3.4. Ingress IP Match Criteria
      7.3.5. Ingress IPv6 Match Criteria
      7.3.6. Ingress MAC Match Criteria
        7.3.6.1. VLAN ID Matching
      7.3.7. Ingress Criteria Classification Directly to Policer
      7.3.8. Virtual Network Identifier Classification
      7.3.9. FC Mapping Based on EXP Bits
      7.3.10. Storing Match Criteria Entries
        7.3.10.1. FP4-based Cards
    7.4. Service Egress QoS Policy
      7.4.1. Service Egress QoS Queue
      7.4.2. Egress Percent-Rate Support
      7.4.3. Dynamic MBS for Egress Queue Group Queues
        7.4.3.1. Queue Length as a Delay Value
      7.4.4. Egress SAP FC and FP Overrides
      7.4.5. Egress IP Match Criteria
      7.4.6. Egress IPv6 Match Criteria
      7.4.7. Egress Criteria Classification Directly to Policer
      7.4.8. Storing Match Criteria Entries
        7.4.8.1. FP4-based Cards
      7.4.9. Dot1p Egress Remarking
        7.4.9.1. DEI Egress Remarking
          7.4.9.1.1. DEI in IEEE 802.1ad
          7.4.9.1.2. DEI in IEEE 802.1ah
          7.4.9.1.3. IEEE 802.1ad Use Case
          7.4.9.1.4. IEEE 802.1ah Use Case
      7.4.10. DSCP and IP Precedence Egress Remarking
      7.4.11. Queue Depth Monitoring
    7.5. Service Management Tasks
      7.5.1. Applying Service Ingress and Egress Policies
        7.5.1.1. Epipe
        7.5.1.2. IES
        7.5.1.3. VPLS
        7.5.1.4. VPRN
      7.5.2. Editing QoS Policies
      7.5.3. Copying and Overwriting QoS Policies
      7.5.4. Deleting QoS Policies
      7.5.5. Removing a Policy from the QoS Configuration
    7.6. Service Ingress and Egress QoS Policy Command Reference
      7.6.1. Command Hierarchies
        7.6.1.1. Service Ingress QoS Policy Commands
        7.6.1.2. Service Egress QoS Policy Commands
        7.6.1.3. Operational Commands
        7.6.1.4. Show Commands
        7.6.1.5. Tools Commands
      7.6.2. Command Descriptions
        7.6.2.1. Generic Commands
        7.6.2.2. Service Ingress QoS Policy Commands
        7.6.2.3. Service Egress QoS Policy Commands
        7.6.2.4. Operational Commands
        7.6.2.5. Show Commands
        7.6.2.6. Tools Commands
  8. Queue Sharing and Redirection
    8.1. Queue Sharing and Redirection
      8.1.1. Supported Platforms
    8.2. Queue Group Applications
      8.2.1. Access SAP Queue Group Applications
        8.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
        8.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
      8.2.2. Network Port Queue Groups for IP Interfaces
      8.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
      8.2.4. QoS on Ingress Bindings
      8.2.5. VXLAN VNI Queue Group Redirection
        8.2.5.1. Queue Group Redirect List
        8.2.5.2. Queue Group Redirect List Example
    8.3. Queue Group Templates
    8.4. Port Queue Groups
      8.4.1. Percent-Rate Support
    8.5. Forwarding Plane Queue Groups
    8.6. Redirection Models
    8.7. Access SAP Forwarding Class-Based Redirection
      8.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
        8.7.1.1. Policy-Based Provisioning Model
        8.7.1.2. SAP-Based Provisioning Model
      8.7.2. Access Queue Group Statistics
        8.7.2.1. Port Queue Groups
        8.7.2.2. Forwarding Plane Queue Groups
    8.8. Network IP Interface Forwarding Class-Based Redirection
      8.8.1. Egress Network Forwarding Class Redirection Association Rules
      8.8.2. Egress Network IP Interface Statistics
    8.9. PW Shaping
      8.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        8.9.1.1. Feature Configuration
        8.9.1.2. Provisioning Model
        8.9.1.3. Ingress Packet Classification
      8.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        8.9.2.1. Feature Configuration
        8.9.2.2. Provisioning Model
        8.9.2.3. Egress Marking of PW Packet Header
        8.9.2.4. Ingress and Egress PW Statistics
    8.10. Queue Group Behavior on LAG
      8.10.1. Queue Group Queue Instantiation Per Link
      8.10.2. Per-Link Queue Group Queue Parameters
      8.10.3. Adding a Queue Group to an Existing LAG
      8.10.4. Adding a Port to a LAG
      8.10.5. Removing a Queue Group from a LAG
    8.11. Basic Configurations
      8.11.1. Configuring an Ingress Queue Group Template
      8.11.2. Configuring Egress Queue Group Template
      8.11.3. Applying Ingress Queue Group to SAP Ingress Policy
      8.11.4. Applying Egress Queue Group to SAP Egress Policy
      8.11.5. Configuring SAP-based Egress Queue Redirection
      8.11.6. Configuring Queue Group on Ethernet Access Ingress Port
      8.11.7. Configuring Overrides
      8.11.8. Configuring Queue Group on Ethernet Access Egress Port
      8.11.9. Configuring Queue Group for Network Egress Traffic on Port
      8.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      8.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      8.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      8.11.13. Specifying QoS Policies on Service SAPs
    8.12. QoS Queue Group Template Command Reference
      8.12.1. Command Hierarchies
        8.12.1.1. Configuring Egress Queue Group Templates
        8.12.1.2. Configuring Ingress Queue Group Templates
        8.12.1.3. Configuring VXLAN VNI Queue Group Redirection
        8.12.1.4. Show Commands
        8.12.1.5. Monitor Commands
      8.12.2. Command Descriptions
        8.12.2.1. Configuration Commands
          8.12.2.1.1. Generic Commands
          8.12.2.1.2. Queue Group Commands
        8.12.2.2. Show Commands
        8.12.2.3. Monitor Commands
  9. Scheduler QoS Policies
    9.1. Scheduler Policies
      9.1.1. Egress Port-Based Schedulers
        9.1.1.1. H-QoS Algorithm Selection
        9.1.1.2. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
        9.1.1.3. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
          9.1.1.3.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
        9.1.1.4. Frame and Packet-Based Bandwidth Allocation
        9.1.1.5. Parental Association Scope
        9.1.1.6. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
        9.1.1.7. Network Queue Parent Scheduler
        9.1.1.8. Foster Parent Behavior for Orphaned Queues and Schedulers
        9.1.1.9. Congestion Monitoring on Egress Port Scheduler
          9.1.1.9.1. Scalability, Performance, and Operation
          9.1.1.9.2. Restrictions
      9.1.2. Frame-Based Accounting
        9.1.2.1. Operational Modifications
        9.1.2.2. Existing Egress Port-Based Virtual Scheduling
        9.1.2.3. Behavior Modifications for Frame-Based Accounting
        9.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      9.1.3. Virtual Scheduling Unused Bandwidth Distribution
        9.1.3.1. Default Unused Bandwidth Distribution
        9.1.3.2. Limit Unused Bandwidth
      9.1.4. Configuring Port Scheduler Policies
        9.1.4.1. Port Scheduler Structure
        9.1.4.2. Special Orphan Queue and Scheduler Behavior
        9.1.4.3. Packet to Frame Bandwidth Conversion
        9.1.4.4. Aggregate Rate Limits for Directly Attached Queues
        9.1.4.5. SAP Egress QoS Policy Queue Parenting
        9.1.4.6. Network Queue QoS Policy Queue Parenting
        9.1.4.7. Egress Port Scheduler Overrides
        9.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
        9.1.4.9. Applying Aggregate Rate Limit to a Vport
        9.1.4.10. Applying a Scheduler Policy to a Vport
        9.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
    9.2. Basic Configurations
      9.2.1. Creating a QoS Scheduler Policy
      9.2.2. Applying Scheduler Policies
        9.2.2.1. Customer
        9.2.2.2. Epipe
        9.2.2.3. IES
        9.2.2.4. VPLS
        9.2.2.5. VPRN
      9.2.3. Creating a QoS Port Scheduler Policy
      9.2.4. Configuring Port Parent Parameters
        9.2.4.1. Within-CIR Priority Level Parameters
        9.2.4.2. Above-CIR Priority Level Parameters
      9.2.5. Configuring Distributed LAG Rate
    9.3. Service Management Tasks
      9.3.1. Deleting QoS Policies
        9.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
        9.3.1.2. Removing a QoS Policy from SAP(s)
        9.3.1.3. Removing a Policy from the QoS Configuration
      9.3.2. Copying and Overwriting Scheduler Policies
      9.3.3. Editing QoS Policies
    9.4. QoS Scheduler Policy Command Reference
      9.4.1. Command Hierarchies
        9.4.1.1. Scheduler Policy Configuration Commands
        9.4.1.2. Port Scheduler Policy Configuration Commands
        9.4.1.3. Operational Commands
        9.4.1.4. Show Commands
        9.4.1.5. Clear Commands
      9.4.2. Command Descriptions
        9.4.2.1. Configuration Commands
          9.4.2.1.1. Generic Commands
        9.4.2.2. Scheduler Policy Commands
        9.4.2.3. Port Scheduler Policy Commands
        9.4.2.4. Operational Commands
        9.4.2.5. Show Commands
        9.4.2.6. Clear Commands
  10. Slope QoS Policies
    10.1. Overview
    10.2. Basic Configurations
      10.2.1. Creating a Slope QoS Policy
      10.2.2. Applying Slope Policies
        10.2.2.1. Ports
        10.2.2.2. FP
      10.2.3. Default Slope Policy Values
    10.3. Service Management Tasks
      10.3.1. Deleting QoS Policies
        10.3.1.1. Ports
        10.3.1.2. FP
        10.3.1.3. Removing a Policy from the QoS Configuration
      10.3.2. Copying and Overwriting QoS Policies
      10.3.3. Editing QoS Policies
    10.4. Slope QoS Policy Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Configuration Commands
        10.4.1.2. Operational Commands
        10.4.1.3. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Configuration Commands
          10.4.2.1.1. Generic Commands
        10.4.2.2. Slope Policy QoS Commands
        10.4.2.3. Operational Commands
        10.4.2.4. Show Commands
  11. Shared-Queue QoS Policies
    11.1. Overview
    11.2. Multipoint Shared Queuing
      11.2.1. Ingress Queuing Modes of Operation
      11.2.2. Ingress Service Queuing
        11.2.2.1. Ingress Shared Queuing
        11.2.2.2. Ingress Multipoint Shared Queuing
    11.3. Basic Configurations
      11.3.1. Modifying the Default Shared-Queue Policy
        11.3.1.1. Applying Shared-Queue Policies
          11.3.1.1.1. Epipe Services
          11.3.1.1.2. IES Services
          11.3.1.1.3. VPLS Services
          11.3.1.1.4. VPRN Services
      11.3.2. Default Shared Queue Policy Values
    11.4. Shared-Queue QoS Policy Command Reference
      11.4.1. Command Hierarchies
        11.4.1.1. Configuration Commands
        11.4.1.2. Show Commands
      11.4.2. Command Descriptions
        11.4.2.1. Configuration Commands
          11.4.2.1.1. Generic Commands
          11.4.2.1.2. Shared Queue QoS Commands
        11.4.2.2. Show Commands
  12. Advanced QoS Policies
    12.1. Overview
    12.2. Port Scheduler Above Offered Allowance Control
    12.3. Basic Configurations
      12.3.1. Creating an Advanced QoS Policy
      12.3.2. Applying Advanced Policies
        12.3.2.1. Queue Group
        12.3.2.2. SAP Ingress
        12.3.2.3. SAP Egress
      12.3.3. Default Advanced Policy Values
    12.4. Service Management Tasks
      12.4.1. Deleting QoS Policies
        12.4.1.1. Queue Group
        12.4.1.2. SAP Ingress
        12.4.1.3. SAP Egress
      12.4.2. Copying and Overwriting Advanced Policies
      12.4.3. Editing Advanced Policies
    12.5. Advanced QoS Policy Command Reference
      12.5.1. Command Hierarchies
        12.5.1.1. Configuration Commands
        12.5.1.2. Operational Commands
        12.5.1.3. Show Commands
      12.5.2. Command Descriptions
        12.5.2.1. Configuration Commands
          12.5.2.1.1. Generic Commands
        12.5.2.2. Advanced Policy QoS Commands
        12.5.2.3. Operational Commands
        12.5.2.4. Show Commands
  13. QoS ATM Traffic Descriptor Profiles
    13.1. ATM Traffic Management
    13.2. QoS Model for ATM-Based Services
    13.3. ATM Service Categories
    13.4. ATM Traffic Descriptors and QoS Parameters
    13.5. Policing
    13.6. Shaping
    13.7. ATM Queuing and Scheduling
    13.8. Congestion Avoidance
    13.9. Basic Configurations
      13.9.1. Creating an ATM-TD-Profile QoS Policy
      13.9.2. Applying ATM-TD-Profile Policies
        13.9.2.1. ATM VLL (Apipe) SAPs
        13.9.2.2. Epipe SAPs
        13.9.2.3. IES SAPs
        13.9.2.4. Ipipe SAPs
        13.9.2.5. VPRN SAPs
        13.9.2.6. VPLS SAPs
      13.9.3. Default ATM-TD-Profile Policy Values
    13.10. Service Management Tasks
      13.10.1. Removing a Profile from the QoS Configuration
      13.10.2. Copying and Overwriting Profiles
      13.10.3. Editing QoS Policies
    13.11. ATM QoS Policy Command Reference
      13.11.1. Command Hierarchies
        13.11.1.1. Configuration Commands
        13.11.1.2. Operational Commands
        13.11.1.3. Show Commands
      13.11.2. Command Descriptions
        13.11.2.1. Configuration Commands
          13.11.2.1.1. Generic Commands
          13.11.2.1.2. ATM QoS Policy Commands
          13.11.2.1.3. Operational Commands
          13.11.2.1.4. Show Commands
  14. High Scale Ethernet MDA Capabilities
    14.1. HSMDA QoS Model
      14.1.1. Queue Scaling
      14.1.2. Port-Based Scheduling
      14.1.3. Dual Pass Queuing
      14.1.4. Egress Intermediate Destination Secondary Shapers
      14.1.5. Packet and Octet Counting
      14.1.6. Above-CIR Discard with PIR Bypass
        14.1.6.1. HSMDA Ingress Queue Policing Mode
      14.1.7. HSMDA Buffer Utilization Controls
        14.1.7.1. HSMDA Buffer Pools
        14.1.7.2. Identifying Queue Groups as Provisioned or System
        14.1.7.3. Provisioned and System Port Class Pools
        14.1.7.4. Aggregate Pools for Type and Class Separation
        14.1.7.5. Use of Aggregate Control Buffer Pools
        14.1.7.6. HSMDA Buffer Pool Policy
          14.1.7.6.1. Default HSMDA Buffer Pool Policy
        14.1.7.7. Port Class Pool Sizing
        14.1.7.8. HSMDA Available Buffer Register Operation
      14.1.8. HSMDA Queue Congestion and Buffer Utilization Controls
        14.1.8.1. Maximum HSMDA Queue Depth
        14.1.8.2. Control Plane HSMDA RED Slope Policy Management
        14.1.8.3. HSMDA Slope Policy MBS Parameter
        14.1.8.4. HSMDA Slope Policy Slope Parameters
        14.1.8.5. HSMDA Slope Shutdown Behavior
        14.1.8.6. Ingress Packet Mapping to HSMDA RED Slope
        14.1.8.7. Egress Packet Mapping to HSMDA RED Slope
        14.1.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
      14.1.9. Egress Queue CIR-Based Dot1p Remarking
    14.2. SAP Ingress and SAP Egress QoS Policies
      14.2.1. SAP Ingress QoS Policy
      14.2.2. SAP Egress QoS Policy
    14.3. Subscriber Queuing Differences
    14.4. Basic HSMDA Configurations
      14.4.1. HSMDA Pool Policies
      14.4.2. HSMDA Scheduler Policies
      14.4.3. HSMDA Slope Policies
      14.4.4. Egress Queue Group
      14.4.5. Configuring HSMDA Queue Group Overrides
    14.5. Applying HSMDA Policies
    14.6. HSMDA Features
      14.6.1. HSMDA LAG
      14.6.2. Billing
      14.6.3. Resource Management
      14.6.4. HSMDA Queue Groups
        14.6.4.1. Scheduling Classes
        14.6.4.2. Scheduling Class Weighted Groups
        14.6.4.3. Scheduler Strict Priority Levels
        14.6.4.4. Strict Priority Level PIR
        14.6.4.5. Scheduler Maximum Rate
        14.6.4.6. HSMDA Scheduler Policy Overrides
        14.6.4.7. Orphan Queues
        14.6.4.8. Default HSMDA Scheduling Policy
    14.7. HSMDA Command Reference
      14.7.1. Command Hierarchies
        14.7.1.1. Show Commands
      14.7.2. Command Descriptions
        14.7.2.1. Configuration Commands
          14.7.2.1.1. Generic Commands
          14.7.2.1.2. HSMDA Pool QoS Policy Commands
          14.7.2.1.3. HSMDA Scheduler QoS Policy Commands
          14.7.2.1.4. HSMDA Slope QoS Policy Commands
          14.7.2.1.5. HSMDA WRR QoS Policy Commands
          14.7.2.1.6. Show QoS HSMDA Commands
  15. High Scale QoS IOM
    15.1. Introduction
      15.1.1. HSQ Shaping
      15.1.2. HSQ Scheduling
      15.1.3. HSQ Buffer Management
      15.1.4. HSQ LAGs
    15.2. HSQ IOM-Specific Configurations
    15.3. Non-Applicable HSQ IOM Functions
    15.4. High Scale QoS IOM Command Reference
      15.4.1. Command Hierarchies
        15.4.1.1. HS Attachment Policy Commands
        15.4.1.2. HS Pool Policy Commands
        15.4.1.3. HS Port Pool Policy Commands
        15.4.1.4. HS Scheduler Policy Commands
        15.4.1.5. Network Queue QoS Policy HS Commands
        15.4.1.6. SAP Egress Policy QoS HS Commands
        15.4.1.7. Queue Group Template HS Commands
        15.4.1.8. Services Configuration HS Commands
          15.4.1.8.1. Epipe Commands
          15.4.1.8.2. IES Commands
          15.4.1.8.3. Ipipe Commands
          15.4.1.8.4. VPLS Commands
          15.4.1.8.5. VPRN Commands
        15.4.1.9. Forwarding Plane HS Commands
        15.4.1.10. Port Configuration HS Commands
        15.4.1.11. LAG HS Commands
        15.4.1.12. Operational Commands
        15.4.1.13. Show Commands
        15.4.1.14. Clear Commands
      15.4.2. Command Descriptions
        15.4.2.1. Configuration Commands
          15.4.2.1.1. Generic Commands
        15.4.2.2. HS Attachment Policy Commands
        15.4.2.3. HS Pool Policy Commands
        15.4.2.4. HS Port Pool Policy Commands
        15.4.2.5. HS Scheduler Policy Commands
        15.4.2.6. Network Queue HS Attachment Policy Commands
        15.4.2.7. SAP Egress HS Attachment Policy Commands
        15.4.2.8. Queue Group Template Policy HS Commands
        15.4.2.9. Operational Commands
        15.4.2.10. Show Commands
        15.4.2.11. Clear Commands
  16. QoS in MC-MLPPP
    16.1. Overview
    16.2. Ingress MLPPP Class Reassembly
    16.3. Basic Configurations
      16.3.1. Configuring MC-MLPPP
      16.3.2. Configuring MC-MLPPP QoS Parameters
    16.4. QoS in MLFR and FRF.12 Fragmentation
      16.4.1. QoS in MLFR
      16.4.2. QoS in FRF.12 End-to-End Fragmentation
    16.5. MLPPP Command Reference
      16.5.1. Command Hierarchies
        16.5.1.1. Configuration Commands
      16.5.2. Command Descriptions
        16.5.2.1. Configuration Commands
          16.5.2.1.1. MC-MLPPP Commands
  17. Class Fair Hierarchical Policing (CFHP)
    17.1. Overview
    17.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
    17.3. CFHP Ingress and Egress Use Cases
    17.4. Post-CFHP Queuing and Scheduling
      17.4.1. Ingress CFHP Queuing
      17.4.2. Egress CFHP Queuing
        17.4.2.1. Policer to Local Queue Mapping
      17.4.3. Egress Subscriber CFHP Queuing
        17.4.3.1. Subscriber Destination String Queue Group Identification
      17.4.4. SAP Default Destination String
    17.5. CFHP Policer Control Policy
      17.5.1. Policer Control Policy Root Arbiter
      17.5.2. Tier 1 and Tier 2 Explicit Arbiters
      17.5.3. Explicit Arbiter Rate Limits
      17.5.4. CFHP with Child Policer Exceed PIR Enabled
    17.6. CFHP Child Policer Definition and Creation
    17.7. Policer Enabled SAP QoS Policy Applicability
    17.8. Child Policer Parent Association
    17.9. Profile-Capped Policers
    17.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
      17.10.1. Ingress ‘Undefined’ Initial Profile
      17.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      17.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      17.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      17.10.5. Egress Explicit Profile Reclassification
      17.10.6. Preserving Out of Profile State at Egress Policer
      17.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
      17.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
      17.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
      17.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
      17.10.11. Ingress Child Policer Stat-Mode
      17.10.12. Egress Child Policer Stat-Mode
    17.11. Profile-Preferred Mode Root Policers
    17.12. Child Policer Hierarchical QoS Parenting
    17.13. Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      17.13.1. Command Hierarchies
        17.13.1.1. Class Fair Hierarchical Policing Commands
        17.13.1.2. Operational Commands
        17.13.1.3. Show Commands
      17.13.2. Command Descriptions
        17.13.2.1. Configuration Commands
          17.13.2.1.1. Generic Commands
          17.13.2.1.2. Class Fair Hierarchical Policing Commands
          17.13.2.1.3. Operational Commands
          17.13.2.1.4. Show Commands
  18. Frequently Used QoS Terms
    18.1. Overview
    18.2. Above-CIR Distribution
    18.3. Available Bandwidth
    18.4. CBS
    18.5. CIR
    18.6. CIR Level
    18.7. CIR Weight
    18.8. Child
    18.9. Level
    18.10. MBS
    18.11. Offered Load
    18.12. Orphan
    18.13. Parent
    18.14. Queue
    18.15. Rate
    18.16. Root (Scheduler)
    18.17. Scheduler Policy
    18.18. Tier
    18.19. Virtual Scheduler
    18.20. Weight
    18.21. Within-CIR Distribution
  19. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. QoS Configuration Process
  2. QoS Policies
    2.1. QoS Overview
    2.2. Forwarding Classes
      2.2.1. High-Priority Classes
      2.2.2. Assured Classes
      2.2.3. Best-Effort Classes
    2.3. Queue Parameters
      2.3.1. Queue ID
      2.3.2. Unicast or Multipoint Queue
      2.3.3. Queue Type
      2.3.4. Queue Scheduling
      2.3.5. Peak Information Rate
      2.3.6. Committed Information Rate
      2.3.7. Fair Information Rate
      2.3.8. Adaptation Rule
      2.3.9. Committed Burst Size
      2.3.10. Maximum Burst Size
      2.3.11. Queue Drop Tails
      2.3.12. WRED Per Queue
        2.3.12.1. Native Queue Mode
        2.3.12.2. Pool Per Queue Mode
      2.3.13. Packet Markings
      2.3.14. Queue Counters
      2.3.15. Color Aware Profiling
    2.4. QoS Policies Overview
      2.4.1. Service versus Network QoS
      2.4.2. QoS Policy Entities
      2.4.3. Network QoS Policies
      2.4.4. Network Queue QoS Policies
      2.4.5. Service Ingress QoS Policies
        2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
        2.4.5.2. Egress Forwarding Class Override
      2.4.6. Service Egress QoS Policies
      2.4.7. Slope Policies
        2.4.7.1. RED Slopes
        2.4.7.2. Tuning the SBAU Calculation
        2.4.7.3. Slope Policy Parameters
      2.4.8. Scheduler Policies
        2.4.8.1. Virtual Hierarchical Scheduling
        2.4.8.2. Hierarchical Scheduler Policies
          2.4.8.2.1. Hierarchical Virtual Schedulers
        2.4.8.3. Tiers
        2.4.8.4. Scheduler Policies Applied to Applications
        2.4.8.5. Scheduler Policies Applied to SAPs
        2.4.8.6. Scheduler Policies Applied to Customer SLAs
        2.4.8.7. Scheduler Policies Applied to Multiservice Sites
      2.4.9. ATM Traffic Descriptor Profiles
      2.4.10. Configuration Notes
  3. FP QoS Configuration
    3.1. FP4 Ingress and Egress Queue Reallocation
      3.1.1. FP QoS Configuration Command Reference
        3.1.1.1. Command Hierarchies
          3.1.1.1.1. FP QoS Commands
        3.1.1.2. Command Descriptions
          3.1.1.2.1. FP QoS Commands
      3.1.2. Show Command Reference
        3.1.2.1. Command Hierarchies
          3.1.2.1.1. Show Commands
        3.1.2.2. Command Descriptions
          3.1.2.2.1. Show Commands
  4. Match List for QoS Policies
    4.1. Match List for QoS Policies Commands
      4.1.1. Command Hierarchies
        4.1.1.1. Configuration Commands
        4.1.1.2. Show Commands
      4.1.2. Command Descriptions
        4.1.2.1. Configuration Commands
        4.1.2.2. Show Commands
  5. Network QoS Policies
    5.1. Network QoS Policies Overview
      5.1.1. Storing Match-Criteria Entries
        5.1.1.1. FP4-based Cards
    5.2. Network Ingress
      5.2.1. Network Ingress Tunnel QoS Override
      5.2.2. Network Ingress IP Match Criteria
      5.2.3. Network Ingress IPv6 Match Criteria
    5.3. Network Egress
      5.3.1. Egress Packet Reclassification Based on IP precedence DSCP
      5.3.2. Network Egress IP Match Criteria
      5.3.3. Network Egress IPv6 Match Criteria
    5.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
      5.4.1. Default DSCP Mapping Table
    5.5. Basic Configurations
      5.5.1. Creating a Network QoS Policy
      5.5.2. Applying Network QoS Policies
      5.5.3. Default Network QoS Policy Values
    5.6. Service Management Tasks
      5.6.1. Deleting QoS Policies
      5.6.2. Removing a Policy from the QoS Configuration
      5.6.3. Copying and Overwriting Network Policies
      5.6.4. Editing QoS Policies
    5.7. Network QoS Policy Command Reference
      5.7.1. Command Hierarchies
        5.7.1.1. Configuration Commands
          5.7.1.1.1. Multi-Class Frame Relay Profile Commands
          5.7.1.1.2. Network QoS Policy Commands
          5.7.1.1.3. Model-Driven Automatic ID Commands
        5.7.1.2. Self-Generated Traffic Commands
        5.7.1.3. Operational Commands
        5.7.1.4. Show Commands
        5.7.1.5. Tools Commands
      5.7.2. Command Descriptions
        5.7.2.1. Configuration Commands
          5.7.2.1.1. Generic Commands
          5.7.2.1.2. Multi-Class Frame Relay Profile Commands
          5.7.2.1.3. Network QoS Policy Commands
          5.7.2.1.4. Model-Driven Automatic ID Commands
        5.7.2.2. Self-Generated Traffic Commands
        5.7.2.3. Operational Commands
        5.7.2.4. Show Commands
  6. Network Queue QoS Policies
    6.1. Overview
    6.2. Network Queue Parent Scheduler
    6.3. Basic Configurations
      6.3.1. Creating a Network Queue QoS Policy
      6.3.2. Applying Network Queue QoS Policies
        6.3.2.1. FPs
        6.3.2.2. Ethernet Ports
        6.3.2.3. SONET/SDH Ports
      6.3.3. Default Network Queue Policy Values
    6.4. Service Management Tasks
      6.4.1. Deleting QoS Policies
      6.4.2. Removing a Policy from the QoS Configuration
      6.4.3. Copying and Overwriting QoS Policies
      6.4.4. Editing QoS Policies
    6.5. Network Queue QoS Policy Command Reference
      6.5.1. Command Hierarchies
        6.5.1.1. Configuration Commands
        6.5.1.2. Operational Commands
        6.5.1.3. Show Commands
      6.5.2. Command Descriptions
        6.5.2.1. Configuration Commands
          6.5.2.1.1. Generic Commands
          6.5.2.1.2. Network Queue QoS Policy Commands
        6.5.2.2. Operational Commands
        6.5.2.3. Show Commands
  7. Service Ingress and Egress QoS Policies
    7.1. Overview
    7.2. Basic Configurations
    7.3. Service Ingress QoS Policy
      7.3.1. Service Ingress QoS Queue
      7.3.2. Ingress Percent-Rate Support
      7.3.3. Ingress Forwarding Class (FC)
      7.3.4. Ingress IP Match Criteria
      7.3.5. Ingress IPv6 Match Criteria
      7.3.6. Ingress MAC Match Criteria
        7.3.6.1. VLAN ID Matching
      7.3.7. Ingress Criteria Classification Directly to Policer
      7.3.8. Virtual Network Identifier Classification
      7.3.9. FC Mapping Based on EXP Bits
      7.3.10. Storing Match Criteria Entries
        7.3.10.1. FP4-based Cards
    7.4. Service Egress QoS Policy
      7.4.1. Service Egress QoS Queue
      7.4.2. Egress Percent-Rate Support
      7.4.3. Dynamic MBS for Egress Queue Group Queues
        7.4.3.1. Queue Length as a Delay Value
      7.4.4. Egress SAP FC and FP Overrides
      7.4.5. Egress IP Match Criteria
      7.4.6. Egress IPv6 Match Criteria
      7.4.7. Egress Criteria Classification Directly to Policer
      7.4.8. Storing Match Criteria Entries
        7.4.8.1. FP4-based Cards
      7.4.9. Dot1p Egress Remarking
        7.4.9.1. DEI Egress Remarking
          7.4.9.1.1. DEI in IEEE 802.1ad
          7.4.9.1.2. DEI in IEEE 802.1ah
          7.4.9.1.3. IEEE 802.1ad Use Case
          7.4.9.1.4. IEEE 802.1ah Use Case
      7.4.10. DSCP and IP Precedence Egress Remarking
      7.4.11. Queue Depth Monitoring
    7.5. Service Management Tasks
      7.5.1. Applying Service Ingress and Egress Policies
        7.5.1.1. Epipe
        7.5.1.2. IES
        7.5.1.3. VPLS
        7.5.1.4. VPRN
      7.5.2. Editing QoS Policies
      7.5.3. Copying and Overwriting QoS Policies
      7.5.4. Deleting QoS Policies
      7.5.5. Removing a Policy from the QoS Configuration
    7.6. Service Ingress and Egress QoS Policy Command Reference
      7.6.1. Command Hierarchies
        7.6.1.1. Service Ingress QoS Policy Commands
        7.6.1.2. Service Egress QoS Policy Commands
        7.6.1.3. Operational Commands
        7.6.1.4. Show Commands
        7.6.1.5. Tools Commands
      7.6.2. Command Descriptions
        7.6.2.1. Generic Commands
        7.6.2.2. Service Ingress QoS Policy Commands
        7.6.2.3. Service Egress QoS Policy Commands
        7.6.2.4. Operational Commands
        7.6.2.5. Show Commands
        7.6.2.6. Tools Commands
  8. Queue Sharing and Redirection
    8.1. Queue Sharing and Redirection
      8.1.1. Supported Platforms
    8.2. Queue Group Applications
      8.2.1. Access SAP Queue Group Applications
        8.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
        8.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
      8.2.2. Network Port Queue Groups for IP Interfaces
      8.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
      8.2.4. QoS on Ingress Bindings
      8.2.5. VXLAN VNI Queue Group Redirection
        8.2.5.1. Queue Group Redirect List
        8.2.5.2. Queue Group Redirect List Example
    8.3. Queue Group Templates
    8.4. Port Queue Groups
      8.4.1. Percent-Rate Support
    8.5. Forwarding Plane Queue Groups
    8.6. Redirection Models
    8.7. Access SAP Forwarding Class-Based Redirection
      8.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
        8.7.1.1. Policy-Based Provisioning Model
        8.7.1.2. SAP-Based Provisioning Model
      8.7.2. Access Queue Group Statistics
        8.7.2.1. Port Queue Groups
        8.7.2.2. Forwarding Plane Queue Groups
    8.8. Network IP Interface Forwarding Class-Based Redirection
      8.8.1. Egress Network Forwarding Class Redirection Association Rules
      8.8.2. Egress Network IP Interface Statistics
    8.9. PW Shaping
      8.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        8.9.1.1. Feature Configuration
        8.9.1.2. Provisioning Model
        8.9.1.3. Ingress Packet Classification
      8.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        8.9.2.1. Feature Configuration
        8.9.2.2. Provisioning Model
        8.9.2.3. Egress Marking of PW Packet Header
        8.9.2.4. Ingress and Egress PW Statistics
    8.10. Queue Group Behavior on LAG
      8.10.1. Queue Group Queue Instantiation Per Link
      8.10.2. Per-Link Queue Group Queue Parameters
      8.10.3. Adding a Queue Group to an Existing LAG
      8.10.4. Adding a Port to a LAG
      8.10.5. Removing a Queue Group from a LAG
    8.11. Basic Configurations
      8.11.1. Configuring an Ingress Queue Group Template
      8.11.2. Configuring Egress Queue Group Template
      8.11.3. Applying Ingress Queue Group to SAP Ingress Policy
      8.11.4. Applying Egress Queue Group to SAP Egress Policy
      8.11.5. Configuring SAP-based Egress Queue Redirection
      8.11.6. Configuring Queue Group on Ethernet Access Ingress Port
      8.11.7. Configuring Overrides
      8.11.8. Configuring Queue Group on Ethernet Access Egress Port
      8.11.9. Configuring Queue Group for Network Egress Traffic on Port
      8.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      8.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      8.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      8.11.13. Specifying QoS Policies on Service SAPs
    8.12. QoS Queue Group Template Command Reference
      8.12.1. Command Hierarchies
        8.12.1.1. Configuring Egress Queue Group Templates
        8.12.1.2. Configuring Ingress Queue Group Templates
        8.12.1.3. Configuring VXLAN VNI Queue Group Redirection
        8.12.1.4. Show Commands
        8.12.1.5. Monitor Commands
      8.12.2. Command Descriptions
        8.12.2.1. Configuration Commands
          8.12.2.1.1. Generic Commands
          8.12.2.1.2. Queue Group Commands
        8.12.2.2. Show Commands
        8.12.2.3. Monitor Commands
  9. Scheduler QoS Policies
    9.1. Scheduler Policies
      9.1.1. Egress Port-Based Schedulers
        9.1.1.1. H-QoS Algorithm Selection
        9.1.1.2. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
        9.1.1.3. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
          9.1.1.3.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
        9.1.1.4. Frame and Packet-Based Bandwidth Allocation
        9.1.1.5. Parental Association Scope
        9.1.1.6. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
        9.1.1.7. Network Queue Parent Scheduler
        9.1.1.8. Foster Parent Behavior for Orphaned Queues and Schedulers
        9.1.1.9. Congestion Monitoring on Egress Port Scheduler
          9.1.1.9.1. Scalability, Performance, and Operation
          9.1.1.9.2. Restrictions
      9.1.2. Frame-Based Accounting
        9.1.2.1. Operational Modifications
        9.1.2.2. Existing Egress Port-Based Virtual Scheduling
        9.1.2.3. Behavior Modifications for Frame-Based Accounting
        9.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      9.1.3. Virtual Scheduling Unused Bandwidth Distribution
        9.1.3.1. Default Unused Bandwidth Distribution
        9.1.3.2. Limit Unused Bandwidth
      9.1.4. Configuring Port Scheduler Policies
        9.1.4.1. Port Scheduler Structure
        9.1.4.2. Special Orphan Queue and Scheduler Behavior
        9.1.4.3. Packet to Frame Bandwidth Conversion
        9.1.4.4. Aggregate Rate Limits for Directly Attached Queues
        9.1.4.5. SAP Egress QoS Policy Queue Parenting
        9.1.4.6. Network Queue QoS Policy Queue Parenting
        9.1.4.7. Egress Port Scheduler Overrides
        9.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
        9.1.4.9. Applying Aggregate Rate Limit to a Vport
        9.1.4.10. Applying a Scheduler Policy to a Vport
        9.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
    9.2. Basic Configurations
      9.2.1. Creating a QoS Scheduler Policy
      9.2.2. Applying Scheduler Policies
        9.2.2.1. Customer
        9.2.2.2. Epipe
        9.2.2.3. IES
        9.2.2.4. VPLS
        9.2.2.5. VPRN
      9.2.3. Creating a QoS Port Scheduler Policy
      9.2.4. Configuring Port Parent Parameters
        9.2.4.1. Within-CIR Priority Level Parameters
        9.2.4.2. Above-CIR Priority Level Parameters
      9.2.5. Configuring Distributed LAG Rate
    9.3. Service Management Tasks
      9.3.1. Deleting QoS Policies
        9.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
        9.3.1.2. Removing a QoS Policy from SAP(s)
        9.3.1.3. Removing a Policy from the QoS Configuration
      9.3.2. Copying and Overwriting Scheduler Policies
      9.3.3. Editing QoS Policies
    9.4. QoS Scheduler Policy Command Reference
      9.4.1. Command Hierarchies
        9.4.1.1. Scheduler Policy Configuration Commands
        9.4.1.2. Port Scheduler Policy Configuration Commands
        9.4.1.3. Operational Commands
        9.4.1.4. Show Commands
        9.4.1.5. Clear Commands
      9.4.2. Command Descriptions
        9.4.2.1. Configuration Commands
          9.4.2.1.1. Generic Commands
        9.4.2.2. Scheduler Policy Commands
        9.4.2.3. Port Scheduler Policy Commands
        9.4.2.4. Operational Commands
        9.4.2.5. Show Commands
        9.4.2.6. Clear Commands
  10. Slope QoS Policies
    10.1. Overview
    10.2. Basic Configurations
      10.2.1. Creating a Slope QoS Policy
      10.2.2. Applying Slope Policies
        10.2.2.1. Ports
        10.2.2.2. FP
      10.2.3. Default Slope Policy Values
    10.3. Service Management Tasks
      10.3.1. Deleting QoS Policies
        10.3.1.1. Ports
        10.3.1.2. FP
        10.3.1.3. Removing a Policy from the QoS Configuration
      10.3.2. Copying and Overwriting QoS Policies
      10.3.3. Editing QoS Policies
    10.4. Slope QoS Policy Command Reference
      10.4.1. Command Hierarchies
        10.4.1.1. Configuration Commands
        10.4.1.2. Operational Commands
        10.4.1.3. Show Commands
      10.4.2. Command Descriptions
        10.4.2.1. Configuration Commands
          10.4.2.1.1. Generic Commands
        10.4.2.2. Slope Policy QoS Commands
        10.4.2.3. Operational Commands
        10.4.2.4. Show Commands
  11. Shared-Queue QoS Policies
    11.1. Overview
    11.2. Multipoint Shared Queuing
      11.2.1. Ingress Queuing Modes of Operation
      11.2.2. Ingress Service Queuing
        11.2.2.1. Ingress Shared Queuing
        11.2.2.2. Ingress Multipoint Shared Queuing
    11.3. Basic Configurations
      11.3.1. Modifying the Default Shared-Queue Policy
        11.3.1.1. Applying Shared-Queue Policies
          11.3.1.1.1. Epipe Services
          11.3.1.1.2. IES Services
          11.3.1.1.3. VPLS Services
          11.3.1.1.4. VPRN Services
      11.3.2. Default Shared Queue Policy Values
    11.4. Shared-Queue QoS Policy Command Reference
      11.4.1. Command Hierarchies
        11.4.1.1. Configuration Commands
        11.4.1.2. Show Commands
      11.4.2. Command Descriptions
        11.4.2.1. Configuration Commands
          11.4.2.1.1. Generic Commands
          11.4.2.1.2. Shared Queue QoS Commands
        11.4.2.2. Show Commands
  12. Advanced QoS Policies
    12.1. Overview
    12.2. Port Scheduler Above Offered Allowance Control
    12.3. Basic Configurations
      12.3.1. Creating an Advanced QoS Policy
      12.3.2. Applying Advanced Policies
        12.3.2.1. Queue Group
        12.3.2.2. SAP Ingress
        12.3.2.3. SAP Egress
      12.3.3. Default Advanced Policy Values
    12.4. Service Management Tasks
      12.4.1. Deleting QoS Policies
        12.4.1.1. Queue Group
        12.4.1.2. SAP Ingress
        12.4.1.3. SAP Egress
      12.4.2. Copying and Overwriting Advanced Policies
      12.4.3. Editing Advanced Policies
    12.5. Advanced QoS Policy Command Reference
      12.5.1. Command Hierarchies
        12.5.1.1. Configuration Commands
        12.5.1.2. Operational Commands
        12.5.1.3. Show Commands
      12.5.2. Command Descriptions
        12.5.2.1. Configuration Commands
          12.5.2.1.1. Generic Commands
        12.5.2.2. Advanced Policy QoS Commands
        12.5.2.3. Operational Commands
        12.5.2.4. Show Commands
  13. QoS ATM Traffic Descriptor Profiles
    13.1. ATM Traffic Management
    13.2. QoS Model for ATM-Based Services
    13.3. ATM Service Categories
    13.4. ATM Traffic Descriptors and QoS Parameters
    13.5. Policing
    13.6. Shaping
    13.7. ATM Queuing and Scheduling
    13.8. Congestion Avoidance
    13.9. Basic Configurations
      13.9.1. Creating an ATM-TD-Profile QoS Policy
      13.9.2. Applying ATM-TD-Profile Policies
        13.9.2.1. ATM VLL (Apipe) SAPs
        13.9.2.2. Epipe SAPs
        13.9.2.3. IES SAPs
        13.9.2.4. Ipipe SAPs
        13.9.2.5. VPRN SAPs
        13.9.2.6. VPLS SAPs
      13.9.3. Default ATM-TD-Profile Policy Values
    13.10. Service Management Tasks
      13.10.1. Removing a Profile from the QoS Configuration
      13.10.2. Copying and Overwriting Profiles
      13.10.3. Editing QoS Policies
    13.11. ATM QoS Policy Command Reference
      13.11.1. Command Hierarchies
        13.11.1.1. Configuration Commands
        13.11.1.2. Operational Commands
        13.11.1.3. Show Commands
      13.11.2. Command Descriptions
        13.11.2.1. Configuration Commands
          13.11.2.1.1. Generic Commands
          13.11.2.1.2. ATM QoS Policy Commands
          13.11.2.1.3. Operational Commands
          13.11.2.1.4. Show Commands
  14. High Scale Ethernet MDA Capabilities
    14.1. HSMDA QoS Model
      14.1.1. Queue Scaling
      14.1.2. Port-Based Scheduling
      14.1.3. Dual Pass Queuing
      14.1.4. Egress Intermediate Destination Secondary Shapers
      14.1.5. Packet and Octet Counting
      14.1.6. Above-CIR Discard with PIR Bypass
        14.1.6.1. HSMDA Ingress Queue Policing Mode
      14.1.7. HSMDA Buffer Utilization Controls
        14.1.7.1. HSMDA Buffer Pools
        14.1.7.2. Identifying Queue Groups as Provisioned or System
        14.1.7.3. Provisioned and System Port Class Pools
        14.1.7.4. Aggregate Pools for Type and Class Separation
        14.1.7.5. Use of Aggregate Control Buffer Pools
        14.1.7.6. HSMDA Buffer Pool Policy
          14.1.7.6.1. Default HSMDA Buffer Pool Policy
        14.1.7.7. Port Class Pool Sizing
        14.1.7.8. HSMDA Available Buffer Register Operation
      14.1.8. HSMDA Queue Congestion and Buffer Utilization Controls
        14.1.8.1. Maximum HSMDA Queue Depth
        14.1.8.2. Control Plane HSMDA RED Slope Policy Management
        14.1.8.3. HSMDA Slope Policy MBS Parameter
        14.1.8.4. HSMDA Slope Policy Slope Parameters
        14.1.8.5. HSMDA Slope Shutdown Behavior
        14.1.8.6. Ingress Packet Mapping to HSMDA RED Slope
        14.1.8.7. Egress Packet Mapping to HSMDA RED Slope
        14.1.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
      14.1.9. Egress Queue CIR-Based Dot1p Remarking
    14.2. SAP Ingress and SAP Egress QoS Policies
      14.2.1. SAP Ingress QoS Policy
      14.2.2. SAP Egress QoS Policy
    14.3. Subscriber Queuing Differences
    14.4. Basic HSMDA Configurations
      14.4.1. HSMDA Pool Policies
      14.4.2. HSMDA Scheduler Policies
      14.4.3. HSMDA Slope Policies
      14.4.4. Egress Queue Group
      14.4.5. Configuring HSMDA Queue Group Overrides
    14.5. Applying HSMDA Policies
    14.6. HSMDA Features
      14.6.1. HSMDA LAG
      14.6.2. Billing
      14.6.3. Resource Management
      14.6.4. HSMDA Queue Groups
        14.6.4.1. Scheduling Classes
        14.6.4.2. Scheduling Class Weighted Groups
        14.6.4.3. Scheduler Strict Priority Levels
        14.6.4.4. Strict Priority Level PIR
        14.6.4.5. Scheduler Maximum Rate
        14.6.4.6. HSMDA Scheduler Policy Overrides
        14.6.4.7. Orphan Queues
        14.6.4.8. Default HSMDA Scheduling Policy
    14.7. HSMDA Command Reference
      14.7.1. Command Hierarchies
        14.7.1.1. Show Commands
      14.7.2. Command Descriptions
        14.7.2.1. Configuration Commands
          14.7.2.1.1. Generic Commands
          14.7.2.1.2. HSMDA Pool QoS Policy Commands
          14.7.2.1.3. HSMDA Scheduler QoS Policy Commands
          14.7.2.1.4. HSMDA Slope QoS Policy Commands
          14.7.2.1.5. HSMDA WRR QoS Policy Commands
          14.7.2.1.6. Show QoS HSMDA Commands
  15. High Scale QoS IOM
    15.1. Introduction
      15.1.1. HSQ Shaping
      15.1.2. HSQ Scheduling
      15.1.3. HSQ Buffer Management
      15.1.4. HSQ LAGs
    15.2. HSQ IOM-Specific Configurations
    15.3. Non-Applicable HSQ IOM Functions
    15.4. High Scale QoS IOM Command Reference
      15.4.1. Command Hierarchies
        15.4.1.1. HS Attachment Policy Commands
        15.4.1.2. HS Pool Policy Commands
        15.4.1.3. HS Port Pool Policy Commands
        15.4.1.4. HS Scheduler Policy Commands
        15.4.1.5. Network Queue QoS Policy HS Commands
        15.4.1.6. SAP Egress Policy QoS HS Commands
        15.4.1.7. Queue Group Template HS Commands
        15.4.1.8. Services Configuration HS Commands
          15.4.1.8.1. Epipe Commands
          15.4.1.8.2. IES Commands
          15.4.1.8.3. Ipipe Commands
          15.4.1.8.4. VPLS Commands
          15.4.1.8.5. VPRN Commands
        15.4.1.9. Forwarding Plane HS Commands
        15.4.1.10. Port Configuration HS Commands
        15.4.1.11. LAG HS Commands
        15.4.1.12. Operational Commands
        15.4.1.13. Show Commands
        15.4.1.14. Clear Commands
      15.4.2. Command Descriptions
        15.4.2.1. Configuration Commands
          15.4.2.1.1. Generic Commands
        15.4.2.2. HS Attachment Policy Commands
        15.4.2.3. HS Pool Policy Commands
        15.4.2.4. HS Port Pool Policy Commands
        15.4.2.5. HS Scheduler Policy Commands
        15.4.2.6. Network Queue HS Attachment Policy Commands
        15.4.2.7. SAP Egress HS Attachment Policy Commands
        15.4.2.8. Queue Group Template Policy HS Commands
        15.4.2.9. Operational Commands
        15.4.2.10. Show Commands
        15.4.2.11. Clear Commands
  16. QoS in MC-MLPPP
    16.1. Overview
    16.2. Ingress MLPPP Class Reassembly
    16.3. Basic Configurations
      16.3.1. Configuring MC-MLPPP
      16.3.2. Configuring MC-MLPPP QoS Parameters
    16.4. QoS in MLFR and FRF.12 Fragmentation
      16.4.1. QoS in MLFR
      16.4.2. QoS in FRF.12 End-to-End Fragmentation
    16.5. MLPPP Command Reference
      16.5.1. Command Hierarchies
        16.5.1.1. Configuration Commands
      16.5.2. Command Descriptions
        16.5.2.1. Configuration Commands
          16.5.2.1.1. MC-MLPPP Commands
  17. Class Fair Hierarchical Policing (CFHP)
    17.1. Overview
    17.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
    17.3. CFHP Ingress and Egress Use Cases
    17.4. Post-CFHP Queuing and Scheduling
      17.4.1. Ingress CFHP Queuing
      17.4.2. Egress CFHP Queuing
        17.4.2.1. Policer to Local Queue Mapping
      17.4.3. Egress Subscriber CFHP Queuing
        17.4.3.1. Subscriber Destination String Queue Group Identification
      17.4.4. SAP Default Destination String
    17.5. CFHP Policer Control Policy
      17.5.1. Policer Control Policy Root Arbiter
      17.5.2. Tier 1 and Tier 2 Explicit Arbiters
      17.5.3. Explicit Arbiter Rate Limits
      17.5.4. CFHP with Child Policer Exceed PIR Enabled
    17.6. CFHP Child Policer Definition and Creation
    17.7. Policer Enabled SAP QoS Policy Applicability
    17.8. Child Policer Parent Association
    17.9. Profile-Capped Policers
    17.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
      17.10.1. Ingress ‘Undefined’ Initial Profile
      17.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      17.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      17.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      17.10.5. Egress Explicit Profile Reclassification
      17.10.6. Preserving Out of Profile State at Egress Policer
      17.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
      17.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
      17.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
      17.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
      17.10.11. Ingress Child Policer Stat-Mode
      17.10.12. Egress Child Policer Stat-Mode
    17.11. Profile-Preferred Mode Root Policers
    17.12. Child Policer Hierarchical QoS Parenting
    17.13. Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      17.13.1. Command Hierarchies
        17.13.1.1. Class Fair Hierarchical Policing Commands
        17.13.1.2. Operational Commands
        17.13.1.3. Show Commands
      17.13.2. Command Descriptions
        17.13.2.1. Configuration Commands
          17.13.2.1.1. Generic Commands
          17.13.2.1.2. Class Fair Hierarchical Policing Commands
          17.13.2.1.3. Operational Commands
          17.13.2.1.4. Show Commands
  18. Frequently Used QoS Terms
    18.1. Overview
    18.2. Above-CIR Distribution
    18.3. Available Bandwidth
    18.4. CBS
    18.5. CIR
    18.6. CIR Level
    18.7. CIR Weight
    18.8. Child
    18.9. Level
    18.10. MBS
    18.11. Offered Load
    18.12. Orphan
    18.13. Parent
    18.14. Queue
    18.15. Rate
    18.16. Root (Scheduler)
    18.17. Scheduler Policy
    18.18. Tier
    18.19. Virtual Scheduler
    18.20. Weight
    18.21. Within-CIR Distribution
  19. Standards and Protocol Support
  Customer Document and Product Support
Quick Reference Card 20.7.R1
  7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview 20.7.R1
  7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview 20.7.R1
RADIUS Attributes Reference Guide 20.7.R1
  1. RADIUS Attributes Reference
    1.1. About this Guide
    1.2. RADIUS Authentication Attributes
      1.2.1. Subscriber Host Identification
        1.2.1.1. [87] NAS-Port-Id Attribute Details
        1.2.1.2. [26.6527.126] Alc-Subscriber-QoS-Override Attribute Details
        1.2.1.3. [26.6527.238] Alc-Remove-Override Attribute Details
      1.2.2. Wholesale-Retail — Local Access Mode
      1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
      1.2.4. Business Service Access
      1.2.5. Accounting On-Line Charging
      1.2.6. IP and IPv6 Filters
        1.2.6.1. IP Filter Attribute Details
      1.2.7. Subscriber Host Creation
      1.2.8. Subscriber Services
      1.2.9. GTP Uplink
      1.2.10. WLAN Gateway
      1.2.11. Virtual Residential Gateway
        1.2.11.1. [241.26.6527.39] Alc-Static-Port-Forward Attribute Details
      1.2.12. Bonding
      1.2.13. Dynamic Data Services
      1.2.14. Lawful Intercept
      1.2.15. IPsec
      1.2.16. Application Assurance
      1.2.17. CLI User Authentication and Authorization
      1.2.18. AAA Route Downloader
    1.3. RADIUS Accounting Attributes
      1.3.1. Enhanced Subscriber Management (ESM) Accounting
      1.3.2. Distributed Subscriber Management (DSM) Accounting
      1.3.3. Subscriber Service Accounting
      1.3.4. Large Scale NAT (LSN) Accounting
      1.3.5. L2TP Tunnel Accounting
      1.3.6. Application Assurance (AA) Accounting
      1.3.7. Dynamic Data Service accounting
      1.3.8. CLI User Access Accounting
      1.3.9. IPsec Accounting
      1.3.10. Accounting Terminate Causes
      1.3.11. Accounting Triggered Reason VSA Values
    1.4. RADIUS CoA and Disconnect Message Attributes
      1.4.1. Subscriber Host Identification Attributes
      1.4.2. WLAN-GW migrant users Identification Attributes
      1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
      1.4.4. IPsec Tunnel Identification Attributes
      1.4.5. Dynamic Data Services Identification Attributes
      1.4.6. Overview of CoA Attributes
      1.4.7. [101] Error-Cause Attribute Values
      1.4.8. Deprecated attributes and attributes not applicable in SR OS
  2. Standards and Protocol Support
  Customer Document and Product Support
  1. RADIUS Attributes Reference
    1.1. About this Guide
    1.2. RADIUS Authentication Attributes
      1.2.1. Subscriber Host Identification
        1.2.1.1. [87] NAS-Port-Id Attribute Details
        1.2.1.2. [26.6527.126] Alc-Subscriber-QoS-Override Attribute Details
        1.2.1.3. [26.6527.238] Alc-Remove-Override Attribute Details
      1.2.2. Wholesale-Retail — Local Access Mode
      1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
      1.2.4. Business Service Access
      1.2.5. Accounting On-Line Charging
      1.2.6. IP and IPv6 Filters
        1.2.6.1. IP Filter Attribute Details
      1.2.7. Subscriber Host Creation
      1.2.8. Subscriber Services
      1.2.9. GTP Uplink
      1.2.10. WLAN Gateway
      1.2.11. Virtual Residential Gateway
        1.2.11.1. [241.26.6527.39] Alc-Static-Port-Forward Attribute Details
      1.2.12. Bonding
      1.2.13. Dynamic Data Services
      1.2.14. Lawful Intercept
      1.2.15. IPsec
      1.2.16. Application Assurance
      1.2.17. CLI User Authentication and Authorization
      1.2.18. AAA Route Downloader
    1.3. RADIUS Accounting Attributes
      1.3.1. Enhanced Subscriber Management (ESM) Accounting
      1.3.2. Distributed Subscriber Management (DSM) Accounting
      1.3.3. Subscriber Service Accounting
      1.3.4. Large Scale NAT (LSN) Accounting
      1.3.5. L2TP Tunnel Accounting
      1.3.6. Application Assurance (AA) Accounting
      1.3.7. Dynamic Data Service accounting
      1.3.8. CLI User Access Accounting
      1.3.9. IPsec Accounting
      1.3.10. Accounting Terminate Causes
      1.3.11. Accounting Triggered Reason VSA Values
    1.4. RADIUS CoA and Disconnect Message Attributes
      1.4.1. Subscriber Host Identification Attributes
      1.4.2. WLAN-GW migrant users Identification Attributes
      1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
      1.4.4. IPsec Tunnel Identification Attributes
      1.4.5. Dynamic Data Services Identification Attributes
      1.4.6. Overview of CoA Attributes
      1.4.7. [101] Error-Cause Attribute Values
      1.4.8. Deprecated attributes and attributes not applicable in SR OS
  2. Standards and Protocol Support
  Customer Document and Product Support
Router Configuration Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. IP Router Configuration
    2.1. Configuring IP Router Parameters
      2.1.1. Interfaces
        2.1.1.1. Network Interface
        2.1.1.2. Network Domains
        2.1.1.3. System Interface
        2.1.1.4. Unicast Reverse Path Forwarding Check
        2.1.1.5. Creating an IP Address Range
        2.1.1.6. QoS Policy Propagation Using BGP
          2.1.1.6.1. QPPB Applications
          2.1.1.6.2. Inter-AS Coordination of QoS Policies
          2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
        2.1.1.7. QPPB
          2.1.1.7.1. Associating an FC and Priority with a Route
          2.1.1.7.2. Displaying QoS Information Associated with Routes
          2.1.1.7.3. Enabling QPPB on an IP interface
          2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.1.1.7.5. QPPB and Multiple Paths to a Destination
          2.1.1.7.6. QPPB and Policy-Based Routing
        2.1.1.8. QPPB and GRT Lookup
          2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
        2.1.1.9. Configuring Interface Delay
      2.1.2. Router ID
      2.1.3. Autonomous Systems
      2.1.4. Confederations
      2.1.5. Proxy ARP
      2.1.6. Exporting an Inactive BGP Route from a VPRN
      2.1.7. DHCP Relay
      2.1.8. Internet Protocol Versions
        2.1.8.1. IPv6 Address Format
        2.1.8.2. IPv6 Applications
        2.1.8.3. DNS
          2.1.8.3.1. DNS Resolution Using a VPRN
        2.1.8.4. Secure Neighbor Discovery
        2.1.8.5. SeND Persistent CGAs
          2.1.8.5.1. Persistent RSA Key Pair
          2.1.8.5.2. Persistent CGA Modifier
          2.1.8.5.3. Making non-persistent CGAs persistent
          2.1.8.5.4. Booting from a saved configuration file
        2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
          2.1.8.6.1. 6PE Control Plane Support
          2.1.8.6.2. 6PE Data Plane Support
      2.1.9. Static Route Resolution Using Tunnels
        2.1.9.1. Static Route ECMP Support
        2.1.9.2. Static Route using Flexible Algorithms Tunnels
    2.2. Weighted Load Balancing over MPLS LSP
      2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
        2.2.1.1. Feature Configuration
        2.2.1.2. Feature Behavior
        2.2.1.3. ECMP Considerations
        2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
          2.2.1.4.1. Feature Configuration
          2.2.1.4.2. Feature Behavior
      2.2.2. Weighted Load Balancing for 6PE and BGP IPv4-Labeled Unicast Routes
      2.2.3. Strict Weighted Load-Balancing
    2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
      2.3.1. Feature Configuration
      2.3.2. Feature Behavior
      2.3.3. Feature Limitations
      2.3.4. Data Path Support
      2.3.5. Example Configuration and Default CBF Set Election
    2.4. Aggregate Next Hop
    2.5. Invalidate Next-Hop Based on ARP/Neighbor Cache State
      2.5.1. Invalidate Next-Hop Based on IPV4 ARP
        2.5.1.1. Invalidate Next-Hop Based on Neighbor Cache State
    2.6. LDP Shortcut for IGP Route Resolution
      2.6.1. IGP Route Resolution
      2.6.2. LDP-IGP Synchronization
      2.6.3. LDP Shortcut Forwarding Plane
      2.6.4. ECMP Considerations
      2.6.5. Handling of Control Packets
      2.6.6. Handling of Multicast Packets
      2.6.7. Interaction with BGP Route Resolution to an LDP FEC
      2.6.8. Interaction with Static Route Resolution to an LDP FEC
      2.6.9. LDP Control Plane
    2.7. Weighted Load-Balancing over Interface Next-hops
    2.8. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
      2.8.1. Feature Configuration
      2.8.2. MPLS-over-GRE and IP-over-GRE Termination Function
      2.8.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
      2.8.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
      2.8.5. LER and LSR Hashing Support
    2.9. GRE Tunnel Overview
      2.9.1. Sample GRE Tunnel Configurations
    2.10. Router Interface Encryption with NGE
      2.10.1. NGE Domains
        2.10.1.1. Private IP/MPLS Network NGE Domain
        2.10.1.2. Private Over Intermediary Network NGE Domain
      2.10.2. Router Interface NGE Domain Concepts
      2.10.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
      2.10.4. EVPN-VXLAN Tunnels and Services
      2.10.5. Router Encryption Exceptions using ACLs
      2.10.6. IPsec Packets Crossing an NGE Domain
      2.10.7. Multicast Packets Traversing the NGE Domain
      2.10.8. Assigning Key Groups to Router Interfaces
      2.10.9. NGE and BFD Support
      2.10.10. NGE and ACL Interactions
      2.10.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
      2.10.12. 1588v2 Encryption With NGE
    2.11. Process Overview
    2.12. Configuration Notes
    2.13. Configuring an IP Router with CLI
      2.13.1. Router Configuration Overview
        2.13.1.1. System Interface
        2.13.1.2. Network Interface
      2.13.2. Basic Configuration
      2.13.3. Common Configuration Tasks
        2.13.3.1. Configuring a System Name
        2.13.3.2. Configuring Interfaces
          2.13.3.2.1. Configuring a System Interface
          2.13.3.2.2. Configuring a Network Interface
          2.13.3.2.3. Assigning a Key Group to a Router Interface
          2.13.3.2.4. Configuring IPv6 Parameters
          2.13.3.2.5. Configuring IPv6 Over IPv4 Parameters
          2.13.3.2.6. Tunnel Ingress Node
          2.13.3.2.7. Tunnel Egress Node
          2.13.3.2.8. Router Advertisement
          2.13.3.2.9. Configuring IPv6 Parameters
          2.13.3.2.10. Configuring Proxy ARP
          2.13.3.2.11. Creating an IP Address Range
        2.13.3.3. Deriving the Router ID
        2.13.3.4. Configuring a Confederation
        2.13.3.5. Configuring an Autonomous System
        2.13.3.6. Configuring Overload State on a Single SFM
    2.14. Service Management Tasks
      2.14.1. Changing the System Name
      2.14.2. Modifying Interface Parameters
      2.14.3. Removing a Key Group from a Router Interface
      2.14.4. Changing the Key Group for a Router Interface
      2.14.5. Deleting a Logical IP Interface
    2.15. IP Router Configuration Command Reference
      2.15.1. Command Hierarchies
        2.15.1.1. Router Commands
        2.15.1.2. Router BFD Commands
        2.15.1.3. Router Interface Commands
        2.15.1.4. Router Interface IPv6 Commands
        2.15.1.5. Router Advertisement Commands
        2.15.1.6. Router PCP Server Commands
        2.15.1.7. Router Policy Accounting Template Commands
        2.15.1.8. Flexible Algorithm Definitions Commands
      2.15.2. Command Descriptions
        2.15.2.1. Generic Commands
        2.15.2.2. Router Global Commands
        2.15.2.3. Router Interface Commands
          2.15.2.3.1. Router Interface Filter Commands
          2.15.2.3.2. Router Interface ICMP Commands
          2.15.2.3.3. Router Interface IPv6 Commands
          2.15.2.3.4. Router Interface DHCP Commands
        2.15.2.4. Router Interface Encryption Commands
        2.15.2.5. Router Advertisement Commands
        2.15.2.6. Router PCP Server Commands
        2.15.2.7. Router Policy Accounting Template Commands
        2.15.2.8. Flexible Algorithm Definitions Commands
    2.16. Show, Clear, and Debug Command Reference
      2.16.1. Command Hierarchies
        2.16.1.1. Show Commands
        2.16.1.2. Clear Commands
        2.16.1.3. Debug Commands
        2.16.1.4. Tools Commands
      2.16.2. Command Descriptions
        2.16.2.1. Show Commands
        2.16.2.2. Clear Commands
        2.16.2.3. Debug Commands
        2.16.2.4. Tools Commands
  3. VRRP
    3.1. VRRP Overview
    3.2. VRRP Components
      3.2.1. Virtual Router
      3.2.2. IP Address Owner
      3.2.3. Primary and Secondary IP Addresses
      3.2.4. Virtual Router Master
      3.2.5. Virtual Router Backup
      3.2.6. Owner and Non-Owner VRRP
      3.2.7. Configurable Parameters
        3.2.7.1. Virtual Router ID (VRID)
        3.2.7.2. Priority
        3.2.7.3. IP Addresses
        3.2.7.4. Message Interval and Master Inheritance
        3.2.7.5. Skew Time
        3.2.7.6. Master Down Interval
        3.2.7.7. Preempt Mode
        3.2.7.8. VRRP Message Authentication
          3.2.7.8.1. Authentication Type 0 – No Authentication
          3.2.7.8.2. Authentication Type 1 – Simple Text Password
          3.2.7.8.3. Authentication Failure
        3.2.7.9. Authentication Data
        3.2.7.10. Virtual MAC Address
        3.2.7.11. VRRP Advertisement Message IP Address List Verification
        3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
        3.2.7.13. IPv6 Virtual Router Instance Operationally Up
        3.2.7.14. Policies
    3.3. VRRP Priority Control Policies
      3.3.1. VRRP Virtual Router Policy Constraints
      3.3.2. VRRP Virtual Router Instance Base Priority
      3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
      3.3.4. VRRP Priority Control Policy Priority Events
        3.3.4.1. Priority Event Hold-Set Timers
        3.3.4.2. Port Down Priority Event
        3.3.4.3. LAG Degrade Priority Event
        3.3.4.4. Host Unreachable Priority Event
        3.3.4.5. Route Unknown Priority Event
    3.4. VRRP Non-Owner Accessibility
      3.4.1. Non-Owner Access Ping Reply
      3.4.2. Non-Owner Access Telnet
      3.4.3. Non-Owner Access SSH
    3.5. VRRP Configuration Process Overview
    3.6. Configuration Notes
      3.6.1. General
    3.7. Configuring VRRP with CLI
      3.7.1. VRRP Configuration Overview
        3.7.1.1. Preconfiguration Requirements
      3.7.2. Basic VRRP Configurations
        3.7.2.1. VRRP Policy
        3.7.2.2. VRRP IES Service Parameters
          3.7.2.2.1. Configure VRRP for IPv6
        3.7.2.3. VRRP Router Interface Parameters
      3.7.3. Common Configuration Tasks
        3.7.3.1. Creating Interface Parameters
      3.7.4. Configuring VRRP Policy Components
        3.7.4.1. Configuring Service VRRP Parameters
          3.7.4.1.1. Non-Owner VRRP Example
          3.7.4.1.2. Owner Service VRRP
        3.7.4.2. Configuring Router Interface VRRP Parameters
          3.7.4.2.1. Router Interface VRRP Non-Owner
          3.7.4.2.2. Router Interface VRRP Owner
    3.8. VRRP Configuration Management Tasks
      3.8.1. Modifying a VRRP Policy
        3.8.1.1. Deleting a VRRP Policy
      3.8.2. Modifying Service and Interface VRRP Parameters
        3.8.2.1. Modifying Non-Owner Parameters
        3.8.2.2. Modifying Owner Parameters
        3.8.2.3. Deleting VRRP from an Interface or Service
    3.9. VRRP Configuration Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. IPv4 Interface VRRP Commands
        3.9.1.2. IPv6 Interface VRRP Commands
        3.9.1.3. Priority Control Event Policy Commands
      3.9.2. Command Descriptions
        3.9.2.1. Interface Configuration Commands
        3.9.2.2. Priority Control Event Policy Commands
    3.10. Show, Monitor, Clear, and Debug Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Show Commands
        3.10.1.2. Monitor Commands
        3.10.1.3. Clear Commands
        3.10.1.4. Debug Commands
      3.10.2. Command Descriptions
        3.10.2.1. Show Commands
        3.10.2.2. Monitor Commands
        3.10.2.3. Clear Commands
        3.10.2.4. Debug Commands
  4. Filter Policies
    4.1. ACL Filter Policy Overview
      4.1.1. Filter Policy Basics
        4.1.1.1. Filter Policy Packet Match Criteria
        4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
        4.1.1.3. MAC Filter Policy Entry Match Criteria
        4.1.1.4. IP Exception Filters
        4.1.1.5. Filter Policy Actions
        4.1.1.6. Viewing Filter Policy Actions
        4.1.1.7. Filter Policy Statistics
        4.1.1.8. Filter Policy Logging
        4.1.1.9. Filter Policy cflowd Sampling
        4.1.1.10. Filter Policy Management
          4.1.1.10.1. Modifying Existing Filter Policy
          4.1.1.10.2. Filter Policy Copy and Renumbering
      4.1.2. Filter Policy Advanced Topics
        4.1.2.1. Match List for Filter Policies
          4.1.2.1.1. Apply-Path
          4.1.2.1.2. Prefix-exclude
        4.1.2.2. Filter Policy Scope and Embedded Filters
        4.1.2.3. Filter Policy Type
          4.1.2.3.1. IPv4, IPv6 Filter Type Src-Mac
          4.1.2.3.2. IPv4, IPv6 Filter Type Packet-Length
          4.1.2.3.3. IPv4, IPv6 Filter Type Destination-Class
          4.1.2.3.4. IPv4 and IPv6 Filter Type and Embedding
        4.1.2.4. Filter Policies and Dynamic Policy-Driven Interfaces
        4.1.2.5. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
        4.1.2.6. Extended Action for Performing Two Actions at a Time
        4.1.2.7. Advanced VPRN Redirection
        4.1.2.8. Destination MAC Rewrite When Deploying Policy-Based Forwarding
        4.1.2.9. Network-port VPRN Filter Policy
        4.1.2.10. ISID MAC Filters
        4.1.2.11. VID MAC Filters
          4.1.2.11.1. Arbitrary Bit Matching of VID Filters
          4.1.2.11.2. Port Group Configuration Example
        4.1.2.12. IP Exception Filters
        4.1.2.13. Redirect Policies
          4.1.2.13.1. Router Instance Support for Redirect Policies
          4.1.2.13.2. Binding Redirect Policies
        4.1.2.14. HTTP-Redirect (Captive Portal)
          4.1.2.14.1. Traffic Flow
        4.1.2.15. Filter Policy-based ESM Service Chaining
        4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
        4.1.2.17. Storing Filter Entries
          4.1.2.17.1. FP4-based Cards
    4.2. Configuring Filter Policies with CLI
      4.2.1. Common Configuration Tasks
        4.2.1.1. Creating an IPv4 Filter Policy
          4.2.1.1.1. IPv4 Filter Entry
        4.2.1.2. Creating an IPv6 Filter Policy
        4.2.1.3. Creating a MAC Filter Policy
          4.2.1.3.1. MAC Filter Policy
          4.2.1.3.2. MAC ISID Filter Policy
          4.2.1.3.3. MAC VID Filter Policy
          4.2.1.3.4. MAC Filter Entry
        4.2.1.4. Creating an IPv4 Exception Filter Policy
          4.2.1.4.1. IP Exception Filter Policy
          4.2.1.4.2. IP Exception Entry Matching Criteria
        4.2.1.5. Creating an IPv6 Exception Filter Policy
          4.2.1.5.1. IPv6 Exception Filter Policy
          4.2.1.5.2. IPv6 Exception Entry Matching Criteria
        4.2.1.6. Creating a Match List for Filter Policies
        4.2.1.7. Applying Filter Policies
          4.2.1.7.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
          4.2.1.7.2. Applying IPv4/IPv6 Filter Policies to a Network Port
        4.2.1.8. Creating a Redirect Policy
        4.2.1.9. Configuring Filter-Based GRE Tunneling
    4.3. Filter Management Tasks
      4.3.1. Renumbering Filter Policy Entries
      4.3.2. Modifying a Filter Policy
      4.3.3. Deleting a Filter Policy
      4.3.4. Modifying a Redirect Policy
      4.3.5. Deleting a Redirect Policy
      4.3.6. Copying Filter Policies
    4.4. Filter Configuration Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. IPv4 Filter Policy Commands
        4.4.1.2. IPv6 Filter Policy Commands
        4.4.1.3. MAC Filter Commands
        4.4.1.4. GRE Tunnel Template Configuration Commands
        4.4.1.5. System Filter Policy Commands
        4.4.1.6. Redirect Policy Configuration Commands
        4.4.1.7. Match Filter List Commands
        4.4.1.8. Log Filter Commands
        4.4.1.9. Copy Filter Commands
        4.4.1.10. Model-Driven Automatic ID Commands
      4.4.2. Command Descriptions
        4.4.2.1. Generic Commands
        4.4.2.2. IPv4 Filter Policy Commands
        4.4.2.3. IPv6 Filter Policy Commands
        4.4.2.4. MAC Filter Commands
        4.4.2.5. GRE Tunnel Template Configuration Commands
        4.4.2.6. System Filter Policy Commands
        4.4.2.7. Redirect Policy Configuration Commands
        4.4.2.8. Match Filter List Commands
        4.4.2.9. Log Filter Commands
        4.4.2.10. Copy Filter Commands
        4.4.2.11. Model-Driven Automatic ID Commands
    4.5. Show, Clear, Monitor, and Tools Command Reference
      4.5.1. Command Hierarchies
        4.5.1.1. Show Commands
        4.5.1.2. Clear Commands
        4.5.1.3. Monitor Commands
        4.5.1.4. Tools Commands
      4.5.2. Command Descriptions
        4.5.2.1. Show Commands
        4.5.2.2. Clear Commands
        4.5.2.3. Monitor Commands
        4.5.2.4. Tools Commands
  5. Hybrid OpenFlow Switch
    5.1. Hybrid OpenFlow Switching
      5.1.1. Redundant Controllers and Multiple Switch Instances
      5.1.2. GRT-only and Multi-Service H-OFS Modes of Operations
        5.1.2.1. Port and VLAN ID Match in Flow Table Entries
      5.1.3. Hybrid OpenFlow Switch Steering using Filter Policies
      5.1.4. Hybrid OpenFlow Switch Statistics
      5.1.5. OpenFlow Switch Auxiliary Channels
      5.1.6. Hybrid OpenFlow Switch Traffic Steering Details
        5.1.6.1. SR OS H-OFS Logical Port
        5.1.6.2. SR OS H-OFS Port and VLAN Encoding
        5.1.6.3. Redirect to IP next-hop
        5.1.6.4. Redirect to GRT Instance or VRF Instance
        5.1.6.5. Redirect to Next-hop and VRF/GRT Instance
        5.1.6.6. Redirect to ESI (L2)
        5.1.6.7. Redirect to ESI (L3)
        5.1.6.8. Redirect to ESI IP VAS-Interface Router
        5.1.6.9. Redirect to LSP
        5.1.6.10. Redirect to NAT
        5.1.6.11. Redirect to SAP
        5.1.6.12. Redirect to SDP
        5.1.6.13. Redirect to a Specific LSP Used by a VPRN Service
        5.1.6.14. Forward Action
        5.1.6.15. Drop Action
        5.1.6.16. Default No-match Action
        5.1.6.17. Programming of DSCP Remark Action
      5.1.7. Support for Secondary Actions for PBR/PBF Redundancy
    5.2. Configuration Notes
    5.3. OpenFlow Command Reference
      5.3.1. Command Hierarchies
        5.3.1.1. OpenFlow Commands
        5.3.1.2. Show Commands
        5.3.1.3. Clear Commands
        5.3.1.4. Tools Commands
      5.3.2. Command Descriptions
        5.3.2.1. OpenFlow Commands
        5.3.2.2. Show Commands
        5.3.2.3. Clear Commands
        5.3.2.4. Tools Commands
  6. Cflowd
    6.1. Cflowd Overview
      6.1.1. Operation
        6.1.1.1. Version 8
        6.1.1.2. Version 9
        6.1.1.3. Version 10
      6.1.2. Cflowd Filter Matching
    6.2. Cflowd Configuration Process Overview
    6.3. Configuration Notes
    6.4. Configuring Cflowd with CLI
      6.4.1. Cflowd Configuration Overview
        6.4.1.1. Traffic Sampling
        6.4.1.2. Collectors
          6.4.1.2.1. Aggregation
      6.4.2. Basic Cflowd Configuration
      6.4.3. Common Configuration Tasks
        6.4.3.1. Global Cflowd Components
        6.4.3.2. Enabling Cflowd
        6.4.3.3. Configuring Global Cflowd Parameters
        6.4.3.4. Configuring Cflowd Collectors
          6.4.3.4.1. Version 9 and Version 10 Templates
        6.4.3.5. Specifying Cflowd Options on an IP Interface
          6.4.3.5.1. Interface Configurations
          6.4.3.5.2. Service Interfaces
        6.4.3.6. Specifying Sampling Options in Filter Entries
          6.4.3.6.1. Filter Configurations
          6.4.3.6.2. Dependencies
    6.5. Cflowd Configuration Management Tasks
      6.5.1. Modifying Global Cflowd Components
      6.5.2. Modifying Cflowd Collector Parameters
    6.6. Cflowd Configuration Command Reference
      6.6.1. Command Hierarchies
      6.6.2. Command Descriptions
        6.6.2.1. Global Commands
    6.7. Show, Tools, and Clear Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Show Commands
        6.7.1.2. Tools Commands
        6.7.1.3. Clear Commands
      6.7.2. Command Descriptions
        6.7.2.1. Show Commands
        6.7.2.2. Tools Commands
        6.7.2.3. Clear Commands
  7. gRPC-based RIB API
    7.1. RIB/FIB API Overview
    7.2. RIB/FIB API Fundamentals
      7.2.1. RIB/FIB API Entry Persistence
    7.3. RIB/FIB API Configuration Overview
    7.4. RIB/FIB API - IPv4 Route Table Programming
    7.5. RIB/FIB API - IPv6 Route Table Programming
    7.6. RIB/FIB API - IPv4 Tunnel Table Programming
    7.7. RIB/FIB API - IPv6 Tunnel Table Programming
    7.8. RIB/FIB API - MPLS LFIB Programming
    7.9. RIB/FIB API - Using Next-Hop-Groups, Primary Next Hops, and Backup Next Hops
    7.10. RIB/FIB API - State and Telemetry
    7.11. Traffic Statistics
      7.11.1. Ingress statistics
      7.11.2. Egress statistics
    7.12. Show, Clear, Monitor, and Tools Command Reference
      7.12.1. Command Hierarchies
        7.12.1.1. Show Commands
        7.12.1.2. Clear Commands
        7.12.1.3. Debug Commands
        7.12.1.4. Monitor Commands
        7.12.1.5. Tools Commands
      7.12.2. Command Descriptions
        7.12.2.1. Show Commands
        7.12.2.2. Clear Commands
        7.12.2.3. Debug Commands
        7.12.2.4. Monitor Commands
        7.12.2.5. Tools Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. IP Router Configuration
    2.1. Configuring IP Router Parameters
      2.1.1. Interfaces
        2.1.1.1. Network Interface
        2.1.1.2. Network Domains
        2.1.1.3. System Interface
        2.1.1.4. Unicast Reverse Path Forwarding Check
        2.1.1.5. Creating an IP Address Range
        2.1.1.6. QoS Policy Propagation Using BGP
          2.1.1.6.1. QPPB Applications
          2.1.1.6.2. Inter-AS Coordination of QoS Policies
          2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
        2.1.1.7. QPPB
          2.1.1.7.1. Associating an FC and Priority with a Route
          2.1.1.7.2. Displaying QoS Information Associated with Routes
          2.1.1.7.3. Enabling QPPB on an IP interface
          2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.1.1.7.5. QPPB and Multiple Paths to a Destination
          2.1.1.7.6. QPPB and Policy-Based Routing
        2.1.1.8. QPPB and GRT Lookup
          2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
        2.1.1.9. Configuring Interface Delay
      2.1.2. Router ID
      2.1.3. Autonomous Systems
      2.1.4. Confederations
      2.1.5. Proxy ARP
      2.1.6. Exporting an Inactive BGP Route from a VPRN
      2.1.7. DHCP Relay
      2.1.8. Internet Protocol Versions
        2.1.8.1. IPv6 Address Format
        2.1.8.2. IPv6 Applications
        2.1.8.3. DNS
          2.1.8.3.1. DNS Resolution Using a VPRN
        2.1.8.4. Secure Neighbor Discovery
        2.1.8.5. SeND Persistent CGAs
          2.1.8.5.1. Persistent RSA Key Pair
          2.1.8.5.2. Persistent CGA Modifier
          2.1.8.5.3. Making non-persistent CGAs persistent
          2.1.8.5.4. Booting from a saved configuration file
        2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
          2.1.8.6.1. 6PE Control Plane Support
          2.1.8.6.2. 6PE Data Plane Support
      2.1.9. Static Route Resolution Using Tunnels
        2.1.9.1. Static Route ECMP Support
        2.1.9.2. Static Route using Flexible Algorithms Tunnels
    2.2. Weighted Load Balancing over MPLS LSP
      2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
        2.2.1.1. Feature Configuration
        2.2.1.2. Feature Behavior
        2.2.1.3. ECMP Considerations
        2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
          2.2.1.4.1. Feature Configuration
          2.2.1.4.2. Feature Behavior
      2.2.2. Weighted Load Balancing for 6PE and BGP IPv4-Labeled Unicast Routes
      2.2.3. Strict Weighted Load-Balancing
    2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
      2.3.1. Feature Configuration
      2.3.2. Feature Behavior
      2.3.3. Feature Limitations
      2.3.4. Data Path Support
      2.3.5. Example Configuration and Default CBF Set Election
    2.4. Aggregate Next Hop
    2.5. Invalidate Next-Hop Based on ARP/Neighbor Cache State
      2.5.1. Invalidate Next-Hop Based on IPV4 ARP
        2.5.1.1. Invalidate Next-Hop Based on Neighbor Cache State
    2.6. LDP Shortcut for IGP Route Resolution
      2.6.1. IGP Route Resolution
      2.6.2. LDP-IGP Synchronization
      2.6.3. LDP Shortcut Forwarding Plane
      2.6.4. ECMP Considerations
      2.6.5. Handling of Control Packets
      2.6.6. Handling of Multicast Packets
      2.6.7. Interaction with BGP Route Resolution to an LDP FEC
      2.6.8. Interaction with Static Route Resolution to an LDP FEC
      2.6.9. LDP Control Plane
    2.7. Weighted Load-Balancing over Interface Next-hops
    2.8. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
      2.8.1. Feature Configuration
      2.8.2. MPLS-over-GRE and IP-over-GRE Termination Function
      2.8.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
      2.8.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
      2.8.5. LER and LSR Hashing Support
    2.9. GRE Tunnel Overview
      2.9.1. Sample GRE Tunnel Configurations
    2.10. Router Interface Encryption with NGE
      2.10.1. NGE Domains
        2.10.1.1. Private IP/MPLS Network NGE Domain
        2.10.1.2. Private Over Intermediary Network NGE Domain
      2.10.2. Router Interface NGE Domain Concepts
      2.10.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
      2.10.4. EVPN-VXLAN Tunnels and Services
      2.10.5. Router Encryption Exceptions using ACLs
      2.10.6. IPsec Packets Crossing an NGE Domain
      2.10.7. Multicast Packets Traversing the NGE Domain
      2.10.8. Assigning Key Groups to Router Interfaces
      2.10.9. NGE and BFD Support
      2.10.10. NGE and ACL Interactions
      2.10.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
      2.10.12. 1588v2 Encryption With NGE
    2.11. Process Overview
    2.12. Configuration Notes
    2.13. Configuring an IP Router with CLI
      2.13.1. Router Configuration Overview
        2.13.1.1. System Interface
        2.13.1.2. Network Interface
      2.13.2. Basic Configuration
      2.13.3. Common Configuration Tasks
        2.13.3.1. Configuring a System Name
        2.13.3.2. Configuring Interfaces
          2.13.3.2.1. Configuring a System Interface
          2.13.3.2.2. Configuring a Network Interface
          2.13.3.2.3. Assigning a Key Group to a Router Interface
          2.13.3.2.4. Configuring IPv6 Parameters
          2.13.3.2.5. Configuring IPv6 Over IPv4 Parameters
          2.13.3.2.6. Tunnel Ingress Node
          2.13.3.2.7. Tunnel Egress Node
          2.13.3.2.8. Router Advertisement
          2.13.3.2.9. Configuring IPv6 Parameters
          2.13.3.2.10. Configuring Proxy ARP
          2.13.3.2.11. Creating an IP Address Range
        2.13.3.3. Deriving the Router ID
        2.13.3.4. Configuring a Confederation
        2.13.3.5. Configuring an Autonomous System
        2.13.3.6. Configuring Overload State on a Single SFM
    2.14. Service Management Tasks
      2.14.1. Changing the System Name
      2.14.2. Modifying Interface Parameters
      2.14.3. Removing a Key Group from a Router Interface
      2.14.4. Changing the Key Group for a Router Interface
      2.14.5. Deleting a Logical IP Interface
    2.15. IP Router Configuration Command Reference
      2.15.1. Command Hierarchies
        2.15.1.1. Router Commands
        2.15.1.2. Router BFD Commands
        2.15.1.3. Router Interface Commands
        2.15.1.4. Router Interface IPv6 Commands
        2.15.1.5. Router Advertisement Commands
        2.15.1.6. Router PCP Server Commands
        2.15.1.7. Router Policy Accounting Template Commands
        2.15.1.8. Flexible Algorithm Definitions Commands
      2.15.2. Command Descriptions
        2.15.2.1. Generic Commands
        2.15.2.2. Router Global Commands
        2.15.2.3. Router Interface Commands
          2.15.2.3.1. Router Interface Filter Commands
          2.15.2.3.2. Router Interface ICMP Commands
          2.15.2.3.3. Router Interface IPv6 Commands
          2.15.2.3.4. Router Interface DHCP Commands
        2.15.2.4. Router Interface Encryption Commands
        2.15.2.5. Router Advertisement Commands
        2.15.2.6. Router PCP Server Commands
        2.15.2.7. Router Policy Accounting Template Commands
        2.15.2.8. Flexible Algorithm Definitions Commands
    2.16. Show, Clear, and Debug Command Reference
      2.16.1. Command Hierarchies
        2.16.1.1. Show Commands
        2.16.1.2. Clear Commands
        2.16.1.3. Debug Commands
        2.16.1.4. Tools Commands
      2.16.2. Command Descriptions
        2.16.2.1. Show Commands
        2.16.2.2. Clear Commands
        2.16.2.3. Debug Commands
        2.16.2.4. Tools Commands
  3. VRRP
    3.1. VRRP Overview
    3.2. VRRP Components
      3.2.1. Virtual Router
      3.2.2. IP Address Owner
      3.2.3. Primary and Secondary IP Addresses
      3.2.4. Virtual Router Master
      3.2.5. Virtual Router Backup
      3.2.6. Owner and Non-Owner VRRP
      3.2.7. Configurable Parameters
        3.2.7.1. Virtual Router ID (VRID)
        3.2.7.2. Priority
        3.2.7.3. IP Addresses
        3.2.7.4. Message Interval and Master Inheritance
        3.2.7.5. Skew Time
        3.2.7.6. Master Down Interval
        3.2.7.7. Preempt Mode
        3.2.7.8. VRRP Message Authentication
          3.2.7.8.1. Authentication Type 0 – No Authentication
          3.2.7.8.2. Authentication Type 1 – Simple Text Password
          3.2.7.8.3. Authentication Failure
        3.2.7.9. Authentication Data
        3.2.7.10. Virtual MAC Address
        3.2.7.11. VRRP Advertisement Message IP Address List Verification
        3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
        3.2.7.13. IPv6 Virtual Router Instance Operationally Up
        3.2.7.14. Policies
    3.3. VRRP Priority Control Policies
      3.3.1. VRRP Virtual Router Policy Constraints
      3.3.2. VRRP Virtual Router Instance Base Priority
      3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
      3.3.4. VRRP Priority Control Policy Priority Events
        3.3.4.1. Priority Event Hold-Set Timers
        3.3.4.2. Port Down Priority Event
        3.3.4.3. LAG Degrade Priority Event
        3.3.4.4. Host Unreachable Priority Event
        3.3.4.5. Route Unknown Priority Event
    3.4. VRRP Non-Owner Accessibility
      3.4.1. Non-Owner Access Ping Reply
      3.4.2. Non-Owner Access Telnet
      3.4.3. Non-Owner Access SSH
    3.5. VRRP Configuration Process Overview
    3.6. Configuration Notes
      3.6.1. General
    3.7. Configuring VRRP with CLI
      3.7.1. VRRP Configuration Overview
        3.7.1.1. Preconfiguration Requirements
      3.7.2. Basic VRRP Configurations
        3.7.2.1. VRRP Policy
        3.7.2.2. VRRP IES Service Parameters
          3.7.2.2.1. Configure VRRP for IPv6
        3.7.2.3. VRRP Router Interface Parameters
      3.7.3. Common Configuration Tasks
        3.7.3.1. Creating Interface Parameters
      3.7.4. Configuring VRRP Policy Components
        3.7.4.1. Configuring Service VRRP Parameters
          3.7.4.1.1. Non-Owner VRRP Example
          3.7.4.1.2. Owner Service VRRP
        3.7.4.2. Configuring Router Interface VRRP Parameters
          3.7.4.2.1. Router Interface VRRP Non-Owner
          3.7.4.2.2. Router Interface VRRP Owner
    3.8. VRRP Configuration Management Tasks
      3.8.1. Modifying a VRRP Policy
        3.8.1.1. Deleting a VRRP Policy
      3.8.2. Modifying Service and Interface VRRP Parameters
        3.8.2.1. Modifying Non-Owner Parameters
        3.8.2.2. Modifying Owner Parameters
        3.8.2.3. Deleting VRRP from an Interface or Service
    3.9. VRRP Configuration Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. IPv4 Interface VRRP Commands
        3.9.1.2. IPv6 Interface VRRP Commands
        3.9.1.3. Priority Control Event Policy Commands
      3.9.2. Command Descriptions
        3.9.2.1. Interface Configuration Commands
        3.9.2.2. Priority Control Event Policy Commands
    3.10. Show, Monitor, Clear, and Debug Command Reference
      3.10.1. Command Hierarchies
        3.10.1.1. Show Commands
        3.10.1.2. Monitor Commands
        3.10.1.3. Clear Commands
        3.10.1.4. Debug Commands
      3.10.2. Command Descriptions
        3.10.2.1. Show Commands
        3.10.2.2. Monitor Commands
        3.10.2.3. Clear Commands
        3.10.2.4. Debug Commands
  4. Filter Policies
    4.1. ACL Filter Policy Overview
      4.1.1. Filter Policy Basics
        4.1.1.1. Filter Policy Packet Match Criteria
        4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
        4.1.1.3. MAC Filter Policy Entry Match Criteria
        4.1.1.4. IP Exception Filters
        4.1.1.5. Filter Policy Actions
        4.1.1.6. Viewing Filter Policy Actions
        4.1.1.7. Filter Policy Statistics
        4.1.1.8. Filter Policy Logging
        4.1.1.9. Filter Policy cflowd Sampling
        4.1.1.10. Filter Policy Management
          4.1.1.10.1. Modifying Existing Filter Policy
          4.1.1.10.2. Filter Policy Copy and Renumbering
      4.1.2. Filter Policy Advanced Topics
        4.1.2.1. Match List for Filter Policies
          4.1.2.1.1. Apply-Path
          4.1.2.1.2. Prefix-exclude
        4.1.2.2. Filter Policy Scope and Embedded Filters
        4.1.2.3. Filter Policy Type
          4.1.2.3.1. IPv4, IPv6 Filter Type Src-Mac
          4.1.2.3.2. IPv4, IPv6 Filter Type Packet-Length
          4.1.2.3.3. IPv4, IPv6 Filter Type Destination-Class
          4.1.2.3.4. IPv4 and IPv6 Filter Type and Embedding
        4.1.2.4. Filter Policies and Dynamic Policy-Driven Interfaces
        4.1.2.5. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
        4.1.2.6. Extended Action for Performing Two Actions at a Time
        4.1.2.7. Advanced VPRN Redirection
        4.1.2.8. Destination MAC Rewrite When Deploying Policy-Based Forwarding
        4.1.2.9. Network-port VPRN Filter Policy
        4.1.2.10. ISID MAC Filters
        4.1.2.11. VID MAC Filters
          4.1.2.11.1. Arbitrary Bit Matching of VID Filters
          4.1.2.11.2. Port Group Configuration Example
        4.1.2.12. IP Exception Filters
        4.1.2.13. Redirect Policies
          4.1.2.13.1. Router Instance Support for Redirect Policies
          4.1.2.13.2. Binding Redirect Policies
        4.1.2.14. HTTP-Redirect (Captive Portal)
          4.1.2.14.1. Traffic Flow
        4.1.2.15. Filter Policy-based ESM Service Chaining
        4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
        4.1.2.17. Storing Filter Entries
          4.1.2.17.1. FP4-based Cards
    4.2. Configuring Filter Policies with CLI
      4.2.1. Common Configuration Tasks
        4.2.1.1. Creating an IPv4 Filter Policy
          4.2.1.1.1. IPv4 Filter Entry
        4.2.1.2. Creating an IPv6 Filter Policy
        4.2.1.3. Creating a MAC Filter Policy
          4.2.1.3.1. MAC Filter Policy
          4.2.1.3.2. MAC ISID Filter Policy
          4.2.1.3.3. MAC VID Filter Policy
          4.2.1.3.4. MAC Filter Entry
        4.2.1.4. Creating an IPv4 Exception Filter Policy
          4.2.1.4.1. IP Exception Filter Policy
          4.2.1.4.2. IP Exception Entry Matching Criteria
        4.2.1.5. Creating an IPv6 Exception Filter Policy
          4.2.1.5.1. IPv6 Exception Filter Policy
          4.2.1.5.2. IPv6 Exception Entry Matching Criteria
        4.2.1.6. Creating a Match List for Filter Policies
        4.2.1.7. Applying Filter Policies
          4.2.1.7.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
          4.2.1.7.2. Applying IPv4/IPv6 Filter Policies to a Network Port
        4.2.1.8. Creating a Redirect Policy
        4.2.1.9. Configuring Filter-Based GRE Tunneling
    4.3. Filter Management Tasks
      4.3.1. Renumbering Filter Policy Entries
      4.3.2. Modifying a Filter Policy
      4.3.3. Deleting a Filter Policy
      4.3.4. Modifying a Redirect Policy
      4.3.5. Deleting a Redirect Policy
      4.3.6. Copying Filter Policies
    4.4. Filter Configuration Command Reference
      4.4.1. Command Hierarchies
        4.4.1.1. IPv4 Filter Policy Commands
        4.4.1.2. IPv6 Filter Policy Commands
        4.4.1.3. MAC Filter Commands
        4.4.1.4. GRE Tunnel Template Configuration Commands
        4.4.1.5. System Filter Policy Commands
        4.4.1.6. Redirect Policy Configuration Commands
        4.4.1.7. Match Filter List Commands
        4.4.1.8. Log Filter Commands
        4.4.1.9. Copy Filter Commands
        4.4.1.10. Model-Driven Automatic ID Commands
      4.4.2. Command Descriptions
        4.4.2.1. Generic Commands
        4.4.2.2. IPv4 Filter Policy Commands
        4.4.2.3. IPv6 Filter Policy Commands
        4.4.2.4. MAC Filter Commands
        4.4.2.5. GRE Tunnel Template Configuration Commands
        4.4.2.6. System Filter Policy Commands
        4.4.2.7. Redirect Policy Configuration Commands
        4.4.2.8. Match Filter List Commands
        4.4.2.9. Log Filter Commands
        4.4.2.10. Copy Filter Commands
        4.4.2.11. Model-Driven Automatic ID Commands
    4.5. Show, Clear, Monitor, and Tools Command Reference
      4.5.1. Command Hierarchies
        4.5.1.1. Show Commands
        4.5.1.2. Clear Commands
        4.5.1.3. Monitor Commands
        4.5.1.4. Tools Commands
      4.5.2. Command Descriptions
        4.5.2.1. Show Commands
        4.5.2.2. Clear Commands
        4.5.2.3. Monitor Commands
        4.5.2.4. Tools Commands
  5. Hybrid OpenFlow Switch
    5.1. Hybrid OpenFlow Switching
      5.1.1. Redundant Controllers and Multiple Switch Instances
      5.1.2. GRT-only and Multi-Service H-OFS Modes of Operations
        5.1.2.1. Port and VLAN ID Match in Flow Table Entries
      5.1.3. Hybrid OpenFlow Switch Steering using Filter Policies
      5.1.4. Hybrid OpenFlow Switch Statistics
      5.1.5. OpenFlow Switch Auxiliary Channels
      5.1.6. Hybrid OpenFlow Switch Traffic Steering Details
        5.1.6.1. SR OS H-OFS Logical Port
        5.1.6.2. SR OS H-OFS Port and VLAN Encoding
        5.1.6.3. Redirect to IP next-hop
        5.1.6.4. Redirect to GRT Instance or VRF Instance
        5.1.6.5. Redirect to Next-hop and VRF/GRT Instance
        5.1.6.6. Redirect to ESI (L2)
        5.1.6.7. Redirect to ESI (L3)
        5.1.6.8. Redirect to ESI IP VAS-Interface Router
        5.1.6.9. Redirect to LSP
        5.1.6.10. Redirect to NAT
        5.1.6.11. Redirect to SAP
        5.1.6.12. Redirect to SDP
        5.1.6.13. Redirect to a Specific LSP Used by a VPRN Service
        5.1.6.14. Forward Action
        5.1.6.15. Drop Action
        5.1.6.16. Default No-match Action
        5.1.6.17. Programming of DSCP Remark Action
      5.1.7. Support for Secondary Actions for PBR/PBF Redundancy
    5.2. Configuration Notes
    5.3. OpenFlow Command Reference
      5.3.1. Command Hierarchies
        5.3.1.1. OpenFlow Commands
        5.3.1.2. Show Commands
        5.3.1.3. Clear Commands
        5.3.1.4. Tools Commands
      5.3.2. Command Descriptions
        5.3.2.1. OpenFlow Commands
        5.3.2.2. Show Commands
        5.3.2.3. Clear Commands
        5.3.2.4. Tools Commands
  6. Cflowd
    6.1. Cflowd Overview
      6.1.1. Operation
        6.1.1.1. Version 8
        6.1.1.2. Version 9
        6.1.1.3. Version 10
      6.1.2. Cflowd Filter Matching
    6.2. Cflowd Configuration Process Overview
    6.3. Configuration Notes
    6.4. Configuring Cflowd with CLI
      6.4.1. Cflowd Configuration Overview
        6.4.1.1. Traffic Sampling
        6.4.1.2. Collectors
          6.4.1.2.1. Aggregation
      6.4.2. Basic Cflowd Configuration
      6.4.3. Common Configuration Tasks
        6.4.3.1. Global Cflowd Components
        6.4.3.2. Enabling Cflowd
        6.4.3.3. Configuring Global Cflowd Parameters
        6.4.3.4. Configuring Cflowd Collectors
          6.4.3.4.1. Version 9 and Version 10 Templates
        6.4.3.5. Specifying Cflowd Options on an IP Interface
          6.4.3.5.1. Interface Configurations
          6.4.3.5.2. Service Interfaces
        6.4.3.6. Specifying Sampling Options in Filter Entries
          6.4.3.6.1. Filter Configurations
          6.4.3.6.2. Dependencies
    6.5. Cflowd Configuration Management Tasks
      6.5.1. Modifying Global Cflowd Components
      6.5.2. Modifying Cflowd Collector Parameters
    6.6. Cflowd Configuration Command Reference
      6.6.1. Command Hierarchies
      6.6.2. Command Descriptions
        6.6.2.1. Global Commands
    6.7. Show, Tools, and Clear Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Show Commands
        6.7.1.2. Tools Commands
        6.7.1.3. Clear Commands
      6.7.2. Command Descriptions
        6.7.2.1. Show Commands
        6.7.2.2. Tools Commands
        6.7.2.3. Clear Commands
  7. gRPC-based RIB API
    7.1. RIB/FIB API Overview
    7.2. RIB/FIB API Fundamentals
      7.2.1. RIB/FIB API Entry Persistence
    7.3. RIB/FIB API Configuration Overview
    7.4. RIB/FIB API - IPv4 Route Table Programming
    7.5. RIB/FIB API - IPv6 Route Table Programming
    7.6. RIB/FIB API - IPv4 Tunnel Table Programming
    7.7. RIB/FIB API - IPv6 Tunnel Table Programming
    7.8. RIB/FIB API - MPLS LFIB Programming
    7.9. RIB/FIB API - Using Next-Hop-Groups, Primary Next Hops, and Backup Next Hops
    7.10. RIB/FIB API - State and Telemetry
    7.11. Traffic Statistics
      7.11.1. Ingress statistics
      7.11.2. Egress statistics
    7.12. Show, Clear, Monitor, and Tools Command Reference
      7.12.1. Command Hierarchies
        7.12.1.1. Show Commands
        7.12.1.2. Clear Commands
        7.12.1.3. Debug Commands
        7.12.1.4. Monitor Commands
        7.12.1.5. Tools Commands
      7.12.2. Command Descriptions
        7.12.2.1. Show Commands
        7.12.2.2. Clear Commands
        7.12.2.3. Debug Commands
        7.12.2.4. Monitor Commands
        7.12.2.5. Tools Commands
  8. Standards and Protocol Support
  Customer Document and Product Support
Services Overview Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Services Configuration Process
  2. Services Overview
    2.1. Introduction
      2.1.1. Service Types
      2.1.2. Service Policies
        2.1.2.1. Multipoint Shared Queuing
          2.1.2.1.1. Ingress Queuing Modes of Operation
          2.1.2.1.2. Ingress Service Queuing
          2.1.2.1.3. Ingress Shared Queuing
          2.1.2.1.4. Ingress Multipoint Shared Queuing
    2.2. Nokia Service Model
    2.3. Service Entities
      2.3.1. Customers
      2.3.2. Service Access Points (SAPs)
        2.3.2.1. SAP Encapsulation Types and Identifiers
        2.3.2.2. Ethernet Encapsulations
        2.3.2.3. Default SAP on a Dot1q Port
        2.3.2.4. QinQ SAPs
        2.3.2.5. Services and SAP Encapsulations
        2.3.2.6. SAP Configuration Considerations
        2.3.2.7. G.8032 Protected Ethernet Rings
        2.3.2.8. SAP Bandwidth CAC
          2.3.2.8.1. CAC Enforcement
      2.3.3. Connection Profile VLAN SAPs
        2.3.3.1. Using connection-profile-vlan in Dot1q Ports
        2.3.3.2. Using connection-profile-vlan in QinQ Ports
      2.3.4. Service Distribution Points
        2.3.4.1. SDP Binding
        2.3.4.2. Spoke and Mesh SDPs
        2.3.4.3. SDP Using BGP Route Tunnel
        2.3.4.4. SDP Keepalives
        2.3.4.5. SDP Administrative Groups
        2.3.4.6. SDP Selection Rules
        2.3.4.7. Class-Based Forwarding
          2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
          2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
        2.3.4.8. Source IPv4 Address Configuration in GRE SDP and GRE Tunnel
          2.3.4.8.1. Introduction and Feature Configuration
          2.3.4.8.2. Feature Operation with T-LDP and BGP Service Label Signaling
        2.3.4.9. GRE SDP Tunnel Fragmentation and Reassembly
          2.3.4.9.1. GRE SDP Tunnel Fragmentation
          2.3.4.9.2. GRE SDP Tunnel Reassembly
          2.3.4.9.3. NGE Considerations
        2.3.4.10. GRE SDP Termination on Router Interface IP Address
      2.3.5. SAP and MPLS Binding Loopback with MAC Swap
      2.3.6. Promiscuous ETH-LBM Mode of Operation
    2.4. Multi-Service Sites
    2.5. G.8031 Protected Ethernet Tunnels
      2.5.1. OAM Considerations
      2.5.2. QoS Considerations
      2.5.3. Mirroring and Lawful Intercept Considerations
      2.5.4. Support Service and Solution Combinations
      2.5.5. LAG Emulation using Ethernet Tunnels
    2.6. G.8032 Ethernet Ring Protection Switching
      2.6.1. Overview of G.8032 Operation
      2.6.2. Ethernet Ring Sub-Rings
        2.6.2.1. Virtual and Non-Virtual Channel
        2.6.2.2. LAG Support
      2.6.3. OAM Considerations
      2.6.4. Support Service and Solution Combinations
    2.7. Internal Objects Created for L2TP and NAT
    2.8. Ethernet Unnumbered Interfaces
    2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
    2.10. Network Group Encryption (NGE)
      2.10.1. NGE Overview
        2.10.1.1. NGE Key Groups and Encryption Partitions
        2.10.1.2. Network Services Platform Management
      2.10.2. Key Groups
        2.10.2.1. Key Group Algorithms
          2.10.2.1.1. Encapsulating Security Payload
        2.10.2.2. Security Associations
          2.10.2.2.1. Active Outbound SA
      2.10.3. Services Encryption
        2.10.3.1. Services Encryption Overview
        2.10.3.2. Assigning Key Groups to Services
        2.10.3.3. VPRN Layer 3 Spoke SDP Encryption and MP-BGP-based VPRN Encryption Interaction
        2.10.3.4. L2 Service Encryption using PW Templates
        2.10.3.5. Pseudowire Switching for NGE Traffic
        2.10.3.6. Pseudowire Control Word for NGE Traffic
        2.10.3.7. WLAN-GW Encryption
        2.10.3.8. NGE and RFC 3107
        2.10.3.9. NGE for NG-MVPN
      2.10.4. NGE Packet Overhead and MTU Considerations
      2.10.5. Statistics
      2.10.6. Remote Network Monitoring Support
      2.10.7. Configuration Notes
    2.11. Service Creation Process Overview
    2.12. Deploying and Provisioning Services
      2.12.1. Phase 1: Core Network Construction
      2.12.2. Phase 2: Service Administration
      2.12.3. Phase 3: Service Provisioning
    2.13. Configuration Notes
      2.13.1. General
    2.14. Configuring Global Service Entities with CLI
      2.14.1. Service Model Entities
      2.14.2. Basic Configurations
      2.14.3. Common Configuration Tasks
        2.14.3.1. Configuring Customers
          2.14.3.1.1. Customer Information
          2.14.3.1.2. Configuring Multi-Service-Sites
        2.14.3.2. Configuring an SDP
          2.14.3.2.1. SDP Configuration Tasks
          2.14.3.2.2. Configuring an SDP
          2.14.3.2.3. Configuring a Mixed-LSP SDP
    2.15. Ethernet Connectivity Fault Management (ETH-CFM)
      2.15.1. Facility MEPs
        2.15.1.1. Common Actionable Failures
        2.15.1.2. General Detection, Processing and Reaction
        2.15.1.3. Port-Based MEP
        2.15.1.4. LAG Based MEP
        2.15.1.5. Tunnel Based MEP
        2.15.1.6. Router Interface MEP
        2.15.1.7. Hardware Support
      2.15.2. ETH-CFM and MC-LAG
        2.15.2.1. ETH-CFM and MC-LAG Default Behavior
        2.15.2.2. Linking ETH-CFM to MC-LAG State
      2.15.3. ETH-CFM Features
        2.15.3.1. CCM Hold Timers
      2.15.4. Configuring ETH-CFM Parameters
    2.16. Configuring NGE with CLI
      2.16.1. Basic NGE Configuration Overview
      2.16.2. Configuring NGE Components
        2.16.2.1. Configuring the Global Encryption Label
        2.16.2.2. Configuring a Key Group
        2.16.2.3. Assigning a Key Group to an SDP, VPRN Service, or PW template
    2.17. Global Service Entity Management Tasks
      2.17.1. Modifying Customer Accounts
      2.17.2. Deleting Customers
      2.17.3. Modifying SDPs
      2.17.4. Deleting SDPs
    2.18. NGE Management Tasks
      2.18.1. Modifying a Key Group
      2.18.2. Removing a Key Group
        2.18.2.1. Removing a Key Group from an SDP, VPRN Service, or PW template
      2.18.3. Changing Key Groups
        2.18.3.1. Changing the Key Group for an SDP, VPRN Service, or PW template
      2.18.4. Deleting a Key Group from an NGE Node
    2.19. Global Services Configuration Command Reference
      2.19.1. Command Hierarchies
        2.19.1.1. Customer Commands
        2.19.1.2. MRP Commands
        2.19.1.3. Service System Commands
        2.19.1.4. Oper Group Commands
        2.19.1.5. Pseudowire (PW) Commands
          2.19.1.5.1. PW Port Commands
        2.19.1.6. SDP Commands
        2.19.1.7. SAP Commands
        2.19.1.8. Ethernet Ring Commands
        2.19.1.9. ETH CFM Configuration Commands
        2.19.1.10. ETH Tunnel Commands
        2.19.1.11. Connection Profile VLAN Commands
        2.19.1.12. Network Group Encryption (NGE) Commands
        2.19.1.13. NGE Services Commands
        2.19.1.14. Model-Driven Automatic ID Commands
      2.19.2. Command Descriptions
        2.19.2.1. Generic Commands
        2.19.2.2. Customer Management Commands
        2.19.2.3. MRP Commands
        2.19.2.4. Service System Commands
        2.19.2.5. Oper Group Commands
        2.19.2.6. Pseudowire (PW) Commands
          2.19.2.6.1. PW Port Commands
        2.19.2.7. SDP Commands
        2.19.2.8. Ethernet Ring Commands
        2.19.2.9. ETH CFM Configuration Commands
        2.19.2.10. Port and LAG ETH CFM Commands
        2.19.2.11. ETH-Tunnel Commands
        2.19.2.12. Connection Profile VLAN Commands
        2.19.2.13. Network Group Encryption (NGE) Commands
        2.19.2.14. NGE Services Commands
        2.19.2.15. Model-Driven Automatic ID Commands
    2.20. Show, Clear, and Tools Command Reference
      2.20.1. Command Hierarchies
        2.20.1.1. Show Commands
          2.20.1.1.1. ETH-CFM Show Commands
          2.20.1.1.2. PW-Port Show Commands
          2.20.1.1.3. NGE Show Commands
        2.20.1.2. Clear Commands
        2.20.1.3. Tools Perform Commands
        2.20.1.4. Tools Dump Commands
      2.20.2. Command Descriptions
        2.20.2.1. Service Commands
        2.20.2.2. Connection Profile VLAN Commands
        2.20.2.3. ETH-CFM Show Commands
        2.20.2.4. PW-Port Show Commands
        2.20.2.5. NGE Show Commands
        2.20.2.6. Clear Commands
        2.20.2.7. Tools Perform Commands
        2.20.2.8. Tools Dump Commands
  3. Common CLI Command Descriptions
    3.1. In This Chapter
      3.1.1. Common Service Commands
        3.1.1.1. SAP Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Services Configuration Process
  2. Services Overview
    2.1. Introduction
      2.1.1. Service Types
      2.1.2. Service Policies
        2.1.2.1. Multipoint Shared Queuing
          2.1.2.1.1. Ingress Queuing Modes of Operation
          2.1.2.1.2. Ingress Service Queuing
          2.1.2.1.3. Ingress Shared Queuing
          2.1.2.1.4. Ingress Multipoint Shared Queuing
    2.2. Nokia Service Model
    2.3. Service Entities
      2.3.1. Customers
      2.3.2. Service Access Points (SAPs)
        2.3.2.1. SAP Encapsulation Types and Identifiers
        2.3.2.2. Ethernet Encapsulations
        2.3.2.3. Default SAP on a Dot1q Port
        2.3.2.4. QinQ SAPs
        2.3.2.5. Services and SAP Encapsulations
        2.3.2.6. SAP Configuration Considerations
        2.3.2.7. G.8032 Protected Ethernet Rings
        2.3.2.8. SAP Bandwidth CAC
          2.3.2.8.1. CAC Enforcement
      2.3.3. Connection Profile VLAN SAPs
        2.3.3.1. Using connection-profile-vlan in Dot1q Ports
        2.3.3.2. Using connection-profile-vlan in QinQ Ports
      2.3.4. Service Distribution Points
        2.3.4.1. SDP Binding
        2.3.4.2. Spoke and Mesh SDPs
        2.3.4.3. SDP Using BGP Route Tunnel
        2.3.4.4. SDP Keepalives
        2.3.4.5. SDP Administrative Groups
        2.3.4.6. SDP Selection Rules
        2.3.4.7. Class-Based Forwarding
          2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
          2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
        2.3.4.8. Source IPv4 Address Configuration in GRE SDP and GRE Tunnel
          2.3.4.8.1. Introduction and Feature Configuration
          2.3.4.8.2. Feature Operation with T-LDP and BGP Service Label Signaling
        2.3.4.9. GRE SDP Tunnel Fragmentation and Reassembly
          2.3.4.9.1. GRE SDP Tunnel Fragmentation
          2.3.4.9.2. GRE SDP Tunnel Reassembly
          2.3.4.9.3. NGE Considerations
        2.3.4.10. GRE SDP Termination on Router Interface IP Address
      2.3.5. SAP and MPLS Binding Loopback with MAC Swap
      2.3.6. Promiscuous ETH-LBM Mode of Operation
    2.4. Multi-Service Sites
    2.5. G.8031 Protected Ethernet Tunnels
      2.5.1. OAM Considerations
      2.5.2. QoS Considerations
      2.5.3. Mirroring and Lawful Intercept Considerations
      2.5.4. Support Service and Solution Combinations
      2.5.5. LAG Emulation using Ethernet Tunnels
    2.6. G.8032 Ethernet Ring Protection Switching
      2.6.1. Overview of G.8032 Operation
      2.6.2. Ethernet Ring Sub-Rings
        2.6.2.1. Virtual and Non-Virtual Channel
        2.6.2.2. LAG Support
      2.6.3. OAM Considerations
      2.6.4. Support Service and Solution Combinations
    2.7. Internal Objects Created for L2TP and NAT
    2.8. Ethernet Unnumbered Interfaces
    2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
    2.10. Network Group Encryption (NGE)
      2.10.1. NGE Overview
        2.10.1.1. NGE Key Groups and Encryption Partitions
        2.10.1.2. Network Services Platform Management
      2.10.2. Key Groups
        2.10.2.1. Key Group Algorithms
          2.10.2.1.1. Encapsulating Security Payload
        2.10.2.2. Security Associations
          2.10.2.2.1. Active Outbound SA
      2.10.3. Services Encryption
        2.10.3.1. Services Encryption Overview
        2.10.3.2. Assigning Key Groups to Services
        2.10.3.3. VPRN Layer 3 Spoke SDP Encryption and MP-BGP-based VPRN Encryption Interaction
        2.10.3.4. L2 Service Encryption using PW Templates
        2.10.3.5. Pseudowire Switching for NGE Traffic
        2.10.3.6. Pseudowire Control Word for NGE Traffic
        2.10.3.7. WLAN-GW Encryption
        2.10.3.8. NGE and RFC 3107
        2.10.3.9. NGE for NG-MVPN
      2.10.4. NGE Packet Overhead and MTU Considerations
      2.10.5. Statistics
      2.10.6. Remote Network Monitoring Support
      2.10.7. Configuration Notes
    2.11. Service Creation Process Overview
    2.12. Deploying and Provisioning Services
      2.12.1. Phase 1: Core Network Construction
      2.12.2. Phase 2: Service Administration
      2.12.3. Phase 3: Service Provisioning
    2.13. Configuration Notes
      2.13.1. General
    2.14. Configuring Global Service Entities with CLI
      2.14.1. Service Model Entities
      2.14.2. Basic Configurations
      2.14.3. Common Configuration Tasks
        2.14.3.1. Configuring Customers
          2.14.3.1.1. Customer Information
          2.14.3.1.2. Configuring Multi-Service-Sites
        2.14.3.2. Configuring an SDP
          2.14.3.2.1. SDP Configuration Tasks
          2.14.3.2.2. Configuring an SDP
          2.14.3.2.3. Configuring a Mixed-LSP SDP
    2.15. Ethernet Connectivity Fault Management (ETH-CFM)
      2.15.1. Facility MEPs
        2.15.1.1. Common Actionable Failures
        2.15.1.2. General Detection, Processing and Reaction
        2.15.1.3. Port-Based MEP
        2.15.1.4. LAG Based MEP
        2.15.1.5. Tunnel Based MEP
        2.15.1.6. Router Interface MEP
        2.15.1.7. Hardware Support
      2.15.2. ETH-CFM and MC-LAG
        2.15.2.1. ETH-CFM and MC-LAG Default Behavior
        2.15.2.2. Linking ETH-CFM to MC-LAG State
      2.15.3. ETH-CFM Features
        2.15.3.1. CCM Hold Timers
      2.15.4. Configuring ETH-CFM Parameters
    2.16. Configuring NGE with CLI
      2.16.1. Basic NGE Configuration Overview
      2.16.2. Configuring NGE Components
        2.16.2.1. Configuring the Global Encryption Label
        2.16.2.2. Configuring a Key Group
        2.16.2.3. Assigning a Key Group to an SDP, VPRN Service, or PW template
    2.17. Global Service Entity Management Tasks
      2.17.1. Modifying Customer Accounts
      2.17.2. Deleting Customers
      2.17.3. Modifying SDPs
      2.17.4. Deleting SDPs
    2.18. NGE Management Tasks
      2.18.1. Modifying a Key Group
      2.18.2. Removing a Key Group
        2.18.2.1. Removing a Key Group from an SDP, VPRN Service, or PW template
      2.18.3. Changing Key Groups
        2.18.3.1. Changing the Key Group for an SDP, VPRN Service, or PW template
      2.18.4. Deleting a Key Group from an NGE Node
    2.19. Global Services Configuration Command Reference
      2.19.1. Command Hierarchies
        2.19.1.1. Customer Commands
        2.19.1.2. MRP Commands
        2.19.1.3. Service System Commands
        2.19.1.4. Oper Group Commands
        2.19.1.5. Pseudowire (PW) Commands
          2.19.1.5.1. PW Port Commands
        2.19.1.6. SDP Commands
        2.19.1.7. SAP Commands
        2.19.1.8. Ethernet Ring Commands
        2.19.1.9. ETH CFM Configuration Commands
        2.19.1.10. ETH Tunnel Commands
        2.19.1.11. Connection Profile VLAN Commands
        2.19.1.12. Network Group Encryption (NGE) Commands
        2.19.1.13. NGE Services Commands
        2.19.1.14. Model-Driven Automatic ID Commands
      2.19.2. Command Descriptions
        2.19.2.1. Generic Commands
        2.19.2.2. Customer Management Commands
        2.19.2.3. MRP Commands
        2.19.2.4. Service System Commands
        2.19.2.5. Oper Group Commands
        2.19.2.6. Pseudowire (PW) Commands
          2.19.2.6.1. PW Port Commands
        2.19.2.7. SDP Commands
        2.19.2.8. Ethernet Ring Commands
        2.19.2.9. ETH CFM Configuration Commands
        2.19.2.10. Port and LAG ETH CFM Commands
        2.19.2.11. ETH-Tunnel Commands
        2.19.2.12. Connection Profile VLAN Commands
        2.19.2.13. Network Group Encryption (NGE) Commands
        2.19.2.14. NGE Services Commands
        2.19.2.15. Model-Driven Automatic ID Commands
    2.20. Show, Clear, and Tools Command Reference
      2.20.1. Command Hierarchies
        2.20.1.1. Show Commands
          2.20.1.1.1. ETH-CFM Show Commands
          2.20.1.1.2. PW-Port Show Commands
          2.20.1.1.3. NGE Show Commands
        2.20.1.2. Clear Commands
        2.20.1.3. Tools Perform Commands
        2.20.1.4. Tools Dump Commands
      2.20.2. Command Descriptions
        2.20.2.1. Service Commands
        2.20.2.2. Connection Profile VLAN Commands
        2.20.2.3. ETH-CFM Show Commands
        2.20.2.4. PW-Port Show Commands
        2.20.2.5. NGE Show Commands
        2.20.2.6. Clear Commands
        2.20.2.7. Tools Perform Commands
        2.20.2.8. Tools Dump Commands
  3. Common CLI Command Descriptions
    3.1. In This Chapter
      3.1.1. Common Service Commands
        3.1.1.1. SAP Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
System Management Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
    1.3. Node Management Using VPRN
  2. Security
    2.1. Authentication, Authorization, and Accounting
      2.1.1. Authentication
        2.1.1.1. Local Authentication
        2.1.1.2. RADIUS Authentication
          2.1.1.2.1. RADIUS Server Selection
        2.1.1.3. TACACS+ Authentication
        2.1.1.4. LDAP Authentication
          2.1.1.4.1. LDAP Authentication Process
          2.1.1.4.2. Authentication Order
          2.1.1.4.3. LDAP Authentication Using a Password
          2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
          2.1.1.4.5. TLS Behavior and LDAP
          2.1.1.4.6. LDAP Health Check
          2.1.1.4.7. LDAP Redundancy and TLS
        2.1.1.5. Password Hashing
      2.1.2. Authorization
        2.1.2.1. Local Authorization
        2.1.2.2. RADIUS Authorization
        2.1.2.3. TACACS+ Authorization
          2.1.2.3.1. Examples
        2.1.2.4. Authorization Profiles for Different Interfaces
        2.1.2.5. Authorization Support
          2.1.2.5.1. Default User and Admin Profiles
          2.1.2.5.2. Authorization Support for Configuration Groups
      2.1.3. Accounting
        2.1.3.1. RADIUS Accounting
        2.1.3.2. TACACS+ Accounting
        2.1.3.3. Command Accounting Log Events
    2.2. Security Controls
      2.2.1. When a Server Does Not Respond
      2.2.2. Access Request Flow
    2.3. Control and Management Traffic Protection
      2.3.1. CPM Filters
        2.3.1.1. CPM Filter Packet Match
        2.3.1.2. CPM IPv4 and IPv6 Filter Entry Match Criteria
        2.3.1.3. CPM MAC Filter Entry Match Criteria
        2.3.1.4. CPM Filter Policy Action
        2.3.1.5. CPM Filter Policy Statistics and Logging
        2.3.1.6. CPM Filter: Protocols and Ports
      2.3.2. CPM Per-Peer Queuing
      2.3.3. Centralized CPU Protection
        2.3.3.1. Protocol Protection
        2.3.3.2. CPU Protection Extensions for ETH-CFM
        2.3.3.3. ETH-CFM Ingress Squelching
      2.3.4. Distributed CPU Protection (DCP)
        2.3.4.1. Applicability of Distributed CPU Protection
        2.3.4.2. Log Events, Statistics, Status, and SNMP support
        2.3.4.3. DCP Policer Resource Management
        2.3.4.4. Operational Guidelines and Tips
      2.3.5. Classification-Based Priority for Extracted Protocol Traffic
      2.3.6. TTL Security
      2.3.7. Management Access Filter
        2.3.7.1. MAF Filter Packet Match
        2.3.7.2. MAF IPv4/IPv6 Filter Entry Match Criteria
        2.3.7.3. MAF MAC Filter Entry Match Criteria
        2.3.7.4. MAF Filter Policy Action
        2.3.7.5. MAF Filter Policy Statistics and Logging
    2.4. Vendor-Specific Attributes (VSAs)
    2.5. Other Security Features
      2.5.1. SSH
      2.5.2. SSH PKI Authentication
        2.5.2.1. User Public Key Generation
      2.5.3. MAC Client and Server List
      2.5.4. KEX Client and Server List
      2.5.5. Regenerate the SSH key without disabling SSH
        2.5.5.1. Key re-exchange procedure
      2.5.6. Cipher Client and Server List
      2.5.7. Exponential Login Backoff
      2.5.8. User Lockout
      2.5.9. CLI Login Scripts
      2.5.10. 802.1x Network Access Control
      2.5.11. TCP Enhanced Authentication Option
        2.5.11.1. Packet Formats
        2.5.11.2. Keychain
      2.5.12. gRPC Authentication
      2.5.13. Hash Management per Management Interface Configuration
        2.5.13.1. Hash encryption Using AES 256
        2.5.13.2. Clear Text
    2.6. Configuration Notes
      2.6.1. General
    2.7. Configuring Security with CLI
      2.7.1. Security Configurations
      2.7.2. Security Configuration Procedures
        2.7.2.1. Configuring Management Access Filters
        2.7.2.2. Configuring IP CPM Filters
        2.7.2.3. Configuring IPv6 CPM Filters
        2.7.2.4. Configuring MAC CPM Filters
        2.7.2.5. Configuring CPM Queues
        2.7.2.6. IPsec Certificates Parameters
        2.7.2.7. Configuring Profiles
          2.7.2.7.1. Parameters
          2.7.2.7.2. Wildcards
          2.7.2.7.3. CLI Resource Management
        2.7.2.8. Configuring Users
        2.7.2.9. Configuring Keychains
        2.7.2.10. Copying and Overwriting Users and Profiles
          2.7.2.10.1. User
          2.7.2.10.2. Profile
      2.7.3. RADIUS Configurations
        2.7.3.1. Configuring RADIUS Authentication
        2.7.3.2. Configuring RADIUS Authorization
        2.7.3.3. Configuring RADIUS Accounting
      2.7.4. Configuring 802.1x RADIUS Policies
      2.7.5. TACACS+ Configurations
        2.7.5.1. Enabling TACACS+ Authentication
        2.7.5.2. Configuring TACACS+ Authorization
        2.7.5.3. Configuring TACACS+ Accounting
        2.7.5.4. Enabling SSH
      2.7.6. LDAP Configurations
        2.7.6.1. Configuring LDAP Authentication
        2.7.6.2. Configuring Redundant Servers
        2.7.6.3. Enabling SSH
      2.7.7. Configuring Login Controls
    2.8. Security Configuration Command Reference
      2.8.1. Command Hierarchies
        2.8.1.1. Security Commands
          2.8.1.1.1. LLDP Commands
          2.8.1.1.2. Management Access Filter Commands
          2.8.1.1.3. CLI Script Authorization Commands
          2.8.1.1.4. CPM Filter Commands
          2.8.1.1.5. CPM Queue Commands
          2.8.1.1.6. CPU Protection Commands
          2.8.1.1.7. Distributed CPU Protection Commands
          2.8.1.1.8. Extracted Protocol Traffic Priority Commands
          2.8.1.1.9. Security Password Commands
          2.8.1.1.10. Public Key Infrastructure (PKI) Commands
          2.8.1.1.11. Profile Commands
          2.8.1.1.12. CLI Session Commands
          2.8.1.1.13. RADIUS Commands
          2.8.1.1.14. TACACS+ Client Commands
          2.8.1.1.15. LDAP Commands
          2.8.1.1.16. User Management Commands
          2.8.1.1.17. User Template Commands
          2.8.1.1.18. Dot1x Commands
          2.8.1.1.19. Keychain Commands
          2.8.1.1.20. TTL Security Commands
          2.8.1.1.21. gRPC Commands
        2.8.1.2. Login Control Commands
      2.8.2. Command Descriptions
        2.8.2.1. General Security Commands
        2.8.2.2. Security Commands
        2.8.2.3. LLDP Commands
        2.8.2.4. Management Access Filter Commands
        2.8.2.5. CLI Script Authorization Commands
        2.8.2.6. CPM Filter Commands
        2.8.2.7. CPM Queue Commands
        2.8.2.8. CPU Protection Commands
        2.8.2.9. Distributed CPU Protection Commands
        2.8.2.10. Extracted Protocol Traffic Priority Commands
        2.8.2.11. Security Password Commands
        2.8.2.12. Public Key Infrastructure Commands
        2.8.2.13. Profile Commands
        2.8.2.14. CLI Session Commands
        2.8.2.15. RADIUS Commands
        2.8.2.16. TACACS+ Client Commands
        2.8.2.17. LDAP Client Commands
        2.8.2.18. User Management Commands
        2.8.2.19. Dot1x Commands
        2.8.2.20. Keychain Authentication
        2.8.2.21. TTL Security Commands
        2.8.2.22. gRPC Commands
        2.8.2.23. Login Control Commands
    2.9. Security Show, Clear, Debug, Tools, and Admin Command Reference
      2.9.1. Command Hierarchies
        2.9.1.1. Show Commands
          2.9.1.1.1. System Security
          2.9.1.1.2. Login Control
        2.9.1.2. Clear Commands
        2.9.1.3. Debug Commands
        2.9.1.4. Tools Commands
        2.9.1.5. Admin Commands
      2.9.2. Command Descriptions
        2.9.2.1. Show Commands
          2.9.2.1.1. System Commands
          2.9.2.1.2. Security Commands
          2.9.2.1.3. Login Control
        2.9.2.2. Clear Commands
          2.9.2.2.1. CPU Protection Commands
        2.9.2.3. Debug Commands
        2.9.2.4. Tools Commands
        2.9.2.5. Admin Commands
  3. Classic and Model-Driven Management Interfaces
    3.1. Model-Driven Management Interfaces
      3.1.1. Prerequisites for Using Model-Driven Management Interfaces
    3.2. YANG Data Models
      3.2.1. SR OS YANG Data Models
      3.2.2. OpenConfig
        3.2.2.1. Basic Configuration
        3.2.2.2. Shared Model Management Support
          3.2.2.2.1. Introduction
          3.2.2.2.2. Merging Configuration Statements
          3.2.2.2.3. Application Support
          3.2.2.2.4. Validating and Committing
          3.2.2.2.5. Error Reporting
          3.2.2.2.6. Using the info Command
          3.2.2.2.7. Deviating and Augmenting
    3.3. Datastores and Regions
    3.4. System-Provisioned Configuration (SPC) Objects
    3.5. Management Interface Configuration Mode
      3.5.1. Mixed Configuration Mode
      3.5.2. Loose References to IDs
      3.5.3. Transitioning Between Modes
    3.6. Configuring the CLI Engine
    3.7. Legacy Alcatel-Lucent Base-R13 NETCONF/YANG
      3.7.1. Alcatel-Lucent Base-R13 SR OS YANG Modules
      3.7.2. SPC Objects in Base-R13 NETCONF/YANG
    3.8. Classic and Model-Driven Management Interfaces Command Reference
      3.8.1. Command Hierarchies
        3.8.1.1. Management Infrastructure Control Commands
      3.8.2. Command Descriptions
        3.8.2.1. Management Infrastructure Control Commands
    3.9. Classic and Model-Driven Management Interfaces Show Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Management Infrastructure Show Commands
      3.9.2. Command Descriptions
        3.9.2.1. Management Infrastructure Show Commands
  4. SNMP
    4.1. SNMP Overview
      4.1.1. SNMP Architecture
      4.1.2. Management Information Base
      4.1.3. SNMP Protocol Operations
      4.1.4. SNMP Versions
      4.1.5. Management Information Access Control
      4.1.6. User-Based Security Model Community Strings
      4.1.7. Views
      4.1.8. Access Groups
      4.1.9. Users
      4.1.10. Per-VPRN Logs and SNMP Access
      4.1.11. Per-SNMP Community Source IP Address Validation
    4.2. SNMP Versions
    4.3. Best Practices for SNMP Information Retrieval
      4.3.1. SNMP GetBulkRequest
      4.3.2. Queueing, RTT, and Collection Performance
    4.4. Configuration Notes
      4.4.1. General
    4.5. Configuring SNMP with CLI
      4.5.1. SNMP Configuration Overview
        4.5.1.1. Configuring SNMPv1 and SNMPv2c
        4.5.1.2. Configuring SNMPv3
      4.5.2. Basic SNMP Security Configuration
      4.5.3. Configuring SNMP Components
        4.5.3.1. Configuring a Community String
        4.5.3.2. Configuring View Options
        4.5.3.3. Configuring Access Options
        4.5.3.4. Configuring USM Community Options
        4.5.3.5. Configuring Other SNMP Parameters
    4.6. SNMP Configuration Command Reference
      4.6.1. Command Hierarchies
        4.6.1.1. SNMP System Commands
        4.6.1.2. SNMP Security Commands
      4.6.2. Command Descriptions
        4.6.2.1. SNMP System Commands
        4.6.2.2. SNMP Security Commands
    4.7. SNMP Show Command Reference
      4.7.1. Command Hierarchies
        4.7.1.1. Show Commands
      4.7.2. Command Descriptions
        4.7.2.1. Show Commands
  5. NETCONF
    5.1. NETCONF Overview
    5.2. NETCONF in SR OS
      5.2.1. Transport and Sessions
      5.2.2. Datastores and URLs
      5.2.3. NETCONF Operations and Capabilities
        5.2.3.1. <get>
          5.2.3.1.1. Example: Namespace Specified in <configure> Tag
          5.2.3.1.2. Example: Namespace Error in <configure> Tag
          5.2.3.1.3. Example: Namespace Specified in <state> Tag
          5.2.3.1.4. Example: Namespace Error in <state> Tag
        5.2.3.2. <get-config>
          5.2.3.2.1. Example: Reply with Defaults
          5.2.3.2.2. Example: Reply Without Default Values
          5.2.3.2.3. Example: Containment Node
          5.2.3.2.4. Example: List Without a Key Specified
          5.2.3.2.5. Example: List with Non-key Leaf Specified as Selection Node
          5.2.3.2.6. Example: Non-key Leaf Specified as a Content Match Node
          5.2.3.2.7. Example: Content Match Node on a List Key
          5.2.3.2.8. Example: Content Match Node on a Leaf-list
        5.2.3.3. <edit-config>
          5.2.3.3.1. Example: <running> Datastore with the “urn:nokia.com:sros:ns:yang:sr:conf” Namespace
          5.2.3.3.2. Example: Application of Default Operation Value for Parent and Child Nodes
          5.2.3.3.3. Example: Exceptions to the Default Operation Handling
        5.2.3.4. <copy-config>
        5.2.3.5. <delete-config>
        5.2.3.6. <lock>
        5.2.3.7. <unlock>
        5.2.3.8. <commit>
        5.2.3.9. <discard-changes>
        5.2.3.10. <validate>
        5.2.3.11. <get-schema>
        5.2.3.12. <get-data>
      5.2.4. Datastore and Operation Combinations
      5.2.5. General NETCONF Behavior
        5.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
        5.2.5.2. Example: Non-default NETCONF Base Namespace
        5.2.5.3. Example: Invalid NETCONF Namespace Declaration
        5.2.5.4. Example: Non-default NETCONF Namespace or Prefix Declaration in a Child Tag
        5.2.5.5. Example: Chunked Frame Mechanism
      5.2.6. Establishing a NETCONF Session
        5.2.6.1. Example: Checking NETCONF Status
        5.2.6.2. Example: Retrieving System Configurations, QoS, and Log Branches
        5.2.6.3. Example: Creating an Epipe Service
        5.2.6.4. Example: Returning Multiple Errors
    5.3. NETCONF Notifications
      5.3.1. 5.3.1 NETCONF Notification Examples�
        5.3.1.1. Example: <create-subscription> Operation
        5.3.1.2. Example: sros-config-change-event Notification
        5.3.1.3. Example: sros-state-change-event Notification
        5.3.1.4. Example: sros-cli-accounting-event Notification
        5.3.1.5. Example: sros-log-generic-event Notification
        5.3.1.6. Example: netconf-config-change Notification
        5.3.1.7. Example: sros-md-rpc-accounting-event Notification�
    5.4. NETCONF Monitoring
    5.5. NETCONF Using the YANG Library
    5.6. NETCONF Using the Legacy Alcatel-Lucent Base-R13 SR OS YANG Modules
      5.6.1. Operations and Capabilities
    5.7. NETCONF Using the CLI Content Layer
      5.7.1. CLI Content Layer Examples
        5.7.1.1. Example: Configuration Change
        5.7.1.2. Example: Retrieving Configuration Information�
        5.7.1.3. Example: Retrieving Full Configuration Information�
        5.7.1.4. Example: <get> Request
        5.7.1.5. Example: <get> Request with Non-Syntax Error in the Second Item
    5.8. NETCONF Configuration Command Reference
      5.8.1. Command Hierarchies
        5.8.1.1. NETCONF System Commands
        5.8.1.2. NETCONF Security Commands
      5.8.2. Configuration Commands
        5.8.2.1. NETCONF System Commands
        5.8.2.2. NETCONF Security Commands
    5.9. NETCONF Show and Debug Command Reference
      5.9.1. Command Hierarchies
        5.9.1.1. Show Commands
        5.9.1.2. Debug Commands
      5.9.2. Command Descriptions
        5.9.2.1. Show Commands
          5.9.2.1.1. System Commands
      5.9.3. Debug Commands
        5.9.3.1. NETCONF Debug Commands
  6. Event and Accounting Logs
    6.1. Logging Overview
      6.1.1. Logging Using the Management VPRN
    6.2. Log Destinations
      6.2.1. Console
      6.2.2. Session
      6.2.3. CLI Logs
      6.2.4. Memory Logs
      6.2.5. Log Files
      6.2.6. SNMP Trap Group
      6.2.7. Syslog
      6.2.8. NETCONF
    6.3. Event Logs
      6.3.1. Event Sources
      6.3.2. Event Control
      6.3.3. Log Manager and Event Logs
      6.3.4. Event Filter Policies
      6.3.5. Event Log Entries
      6.3.6. Simple Logger Event Throttling
      6.3.7. Default System Log
      6.3.8. Event Handling System
        6.3.8.1. EHS Configuration and Syntax Rules
        6.3.8.2. Examples of EHS Syntax Supported in Classic CLI
        6.3.8.3. Valid Examples of EHS Syntax in Classic CLI
        6.3.8.4. Invalid Examples for EHS Syntax in Classic CLI
        6.3.8.5. EHS Debounce
        6.3.8.6. Executing EHS or CRON Scripts
    6.4. Customizing Syslog Messages Using Python
      6.4.1. Python Engine for Syslog
        6.4.1.1. Python Syslog APIs
        6.4.1.2. Timestamp Format Manipulation
      6.4.2. Python Processing Efficiency
      6.4.3. Python Backpressure
      6.4.4. Event Selection for Python Processing
      6.4.5. Modifying a Log File
      6.4.6. Deleting a Log File
      6.4.7. Modifying a File ID
      6.4.8. Modifying a Syslog ID
      6.4.9. Modifying an SNMP Trap Group
      6.4.10. Deleting an SNMP Trap Group
      6.4.11. Modifying a Log Filter
      6.4.12. Modifying Event Control Parameters
      6.4.13. Returning to the Default Event Control Configuration
    6.5. Accounting Logs
      6.5.1. Accounting Records
      6.5.2. Accounting Files
      6.5.3. Design Considerations for Accounting Policies
      6.5.4. Reporting and Time-Based Accounting
      6.5.5. Overhead Reduction in Accounting: Custom Record
        6.5.5.1. User Configurable Records
        6.5.5.2. Changed Statistics Only
        6.5.5.3. Configurable Accounting Records
          6.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
          6.5.5.3.2. XML Accounting Files for Policer Counters
          6.5.5.3.3. RADIUS Accounting in Networks Using ESM
        6.5.5.4. Significant Change Only Reporting
      6.5.6. Immediate Completion of Records
        6.5.6.1. Record Completion for XML Accounting
      6.5.7. AA Accounting per Forwarding Class
    6.6. Configuration Notes
    6.7. Configuring Logging with CLI
      6.7.1. Log Configuration Overview
      6.7.2. Log Types
      6.7.3. Basic Log Configuration
      6.7.4. Common Configuration Tasks
        6.7.4.1. Configuring an Event Log
        6.7.4.2. Configuring a File ID
        6.7.4.3. Configuring an Accounting Policy
        6.7.4.4. Configuring Event Control
        6.7.4.5. Configuring a Log Filter
        6.7.4.6. Configuring an SNMP Trap Group
          6.7.4.6.1. Setting the Replay Parameter
          6.7.4.6.2. Shutdown In-Band Port
          6.7.4.6.3. No Shutdown Port
        6.7.4.7. Configuring a Syslog Target
          6.7.4.7.1. Configuring an Accounting Custom Record
    6.8. Log Configuration Command Reference
      6.8.1. Command Hierarchies
        6.8.1.1. Log Configuration Commands
        6.8.1.2. Accounting Policy Commands
        6.8.1.3. Custom Record Commands
        6.8.1.4. File ID Commands
        6.8.1.5. Event Filter Commands
        6.8.1.6. Event Handling System (EHS) Commands
        6.8.1.7. Event Trigger Commands
        6.8.1.8. Log ID Commands
        6.8.1.9. SNMP Trap Group Commands
        6.8.1.10. Syslog Commands
      6.8.2. Command Descriptions
        6.8.2.1. Generic Commands
        6.8.2.2. Log Configuration Commands
        6.8.2.3. Accounting Policy Commands
          6.8.2.3.1. Accounting Policy Custom Record Commands
        6.8.2.4. File ID Commands
        6.8.2.5. Event Filter Commands
        6.8.2.6. Event Handling System (EHS) Commands
        6.8.2.7. Event Trigger Commands
        6.8.2.8. Log ID Commands
        6.8.2.9. SNMP Trap Groups
        6.8.2.10. Syslog Commands
    6.9. Log Show, Clear, and Tools Command Reference
      6.9.1. Command Hierarchies
        6.9.1.1. Show Commands
        6.9.1.2. Clear Command
        6.9.1.3. Tools Commands
      6.9.2. Command Descriptions
        6.9.2.1. Show Commands
        6.9.2.2. Clear Commands
        6.9.2.3. Tools Commands
  7. Node Discovery Provisioning Using OSPF
    7.1. Node Discovery Procedure
      7.1.1. Network Element Profiles
      7.1.2. Assigning a Network Element Profile
      7.1.3. OSPFv2 Opaque LSA Requirements
      7.1.4. IPv4/IPv6
    7.2. Aggregation Node Configuration
      7.2.1. MIB Requirements on the Aggregation Node
      7.2.2. SNMP Traps and Gets
    7.3. Network Element Discovery Command Reference
      7.3.1. Command Hierarchies
        7.3.1.1. Network Element Discovery Commands
      7.3.2. Command Descriptions
        7.3.2.1. Network Element Discovery Commands
  8. sFlow
    8.1. sFlow Overview
    8.2. sFlow Features
      8.2.1. sFlow Counter Polling Architecture
      8.2.2. sFlow Support on Logical Ethernet Ports
      8.2.3. sFlow SAP Counter Map
      8.2.4. sFlow Record Formats
    8.3. sFlow Command Reference
      8.3.1. Command Hierarchies
        8.3.1.1. sFlow Configuration Commands
      8.3.2. Command Descriptions
        8.3.2.1. Configuration Commands
    8.4. sFlow Show Command Descriptions
      8.4.1. Command Descriptions
        8.4.1.1. sFlow Show Commands
        8.4.1.2. Show Commands
  9. gRPC
    9.1. Security Aspects
      9.1.1. TLS-Based Encryption
      9.1.2. Authentication
    9.2. gNMI Service
      9.2.1. gNMI Service Definitions
        9.2.1.1. Capability Discovery
        9.2.1.2. Get/Set RPC
        9.2.1.3. Subscribe RPC
          9.2.1.3.1. Bytes Encoding
          9.2.1.3.2. ON_CHANGE Subscription Mode
        9.2.1.4. Publish RPC
        9.2.1.5. Schema Paths
      9.2.2. gNMI Service Use Cases
        9.2.2.1. Telemetry
          9.2.2.1.1. Dial-in Telemetry
          9.2.2.1.2. Dial-out Telemetry
        9.2.2.2. NE Configuration Management
    9.3. gNOI Services
      9.3.1. Certificate Management for TLS Connections
        9.3.1.1. RPC GetCertificates
        9.3.1.2. RPC CanGenerateCSR
        9.3.1.3. RPC Rotate
        9.3.1.4. RPC Install
        9.3.1.5. RPC RevokeCertificates
    9.4. gNOI System
      9.4.1. SetPackage RPC
      9.4.2. Reboot, CancelReboot, and RebootStatus RPC
      9.4.3. SwitchControlProcessor RPC
    9.5. MD-CLI Service
      9.5.1. Remote Management Using a Remote Network Interface Shell Manager
    9.6. gRPC Command Reference
      9.6.1. Command Hierarchies
        9.6.1.1. System Commands
        9.6.1.2. QoS Commands
      9.6.2. Command Descriptions
        9.6.2.1. System Commands
        9.6.2.2. QoS Commands
    9.7. gRPC Show, Tools, and Admin Command Reference
      9.7.1. Command Hierarchies
        9.7.1.1. Show Commands
        9.7.1.2. Tools Commands
        9.7.1.3. Admin Commands
      9.7.2. Command Descriptions
        9.7.2.1. Show Commands
        9.7.2.2. Tools Commands
        9.7.2.3. Admin Commands
  10. TLS
    10.1. TLS Overview
    10.2. TLS Server Interaction with Applications
      10.2.1. TLS Application Support
    10.3. TLS Handshake
    10.4. TLS Client Certificate
    10.5. TLS Symmetric Key Rollover
    10.6. Supported TLS Ciphers
    10.7. SR OS Certificate Management
      10.7.1. Certificate Profile
      10.7.2. TLS Server Authentication of the Client Certificate CN Field
      10.7.3. CN Regexp Format
    10.8. Operational Guidelines
      10.8.1. Server Authentication Behavior
      10.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
    10.9. LDAP Redundancy and TLS
    10.10. Basic TLS Configuration
    10.11. Common Configuration Tasks
      10.11.1. Configuring a Server TLS Profile
      10.11.2. Configuring a Client TLS Profile
      10.11.3. Configuring a TLS Client or TLS Server Certificate
      10.11.4. Configuring a TLS Trust Anchor
    10.12. TLS Command Reference
      10.12.1. Command Hierarchies
        10.12.1.1. Security TLS Commands
        10.12.1.2. LDAP TLS Profile Commands
        10.12.1.3. Admin Commands
      10.12.2. Command Descriptions
        10.12.2.1. Security TLS Commands
        10.12.2.2. LDAP TLS Profile Commands
        10.12.2.3. Admin Commands
    10.13. TLS Show Command Reference
      10.13.1. Command Hierarchies
        10.13.1.1. Show Commands
      10.13.2. Command Descriptions
        10.13.2.1. Show Commands
  11. Facility Alarms
    11.1. Facility Alarms Overview
    11.2. Facility Alarms vs. Log Events
    11.3. Facility Alarm Severities and Alarm LED Behavior
    11.4. Facility Alarm Hierarchy
    11.5. Facility Alarm List
    11.6. Configuring Logging with CLI
      11.6.1. Basic Facility Alarm Configuration
      11.6.2. Common Configuration Tasks
        11.6.2.1. Configuring the Maximum Number of Alarms to Clear
    11.7. Facility Alarms Configuration Command Reference
      11.7.1. Command Hierarchies
        11.7.1.1. Facility Alarm Configuration Commands
      11.7.2. Command Descriptions
        11.7.2.1. Generic Commands
    11.8. Facility Alarms Show Command Reference
      11.8.1. Command Hierarchies
        11.8.1.1. Show Commands
      11.8.2. Command Descriptions
        11.8.2.1. Show Commands
  12. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
    1.3. Node Management Using VPRN
  2. Security
    2.1. Authentication, Authorization, and Accounting
      2.1.1. Authentication
        2.1.1.1. Local Authentication
        2.1.1.2. RADIUS Authentication
          2.1.1.2.1. RADIUS Server Selection
        2.1.1.3. TACACS+ Authentication
        2.1.1.4. LDAP Authentication
          2.1.1.4.1. LDAP Authentication Process
          2.1.1.4.2. Authentication Order
          2.1.1.4.3. LDAP Authentication Using a Password
          2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
          2.1.1.4.5. TLS Behavior and LDAP
          2.1.1.4.6. LDAP Health Check
          2.1.1.4.7. LDAP Redundancy and TLS
        2.1.1.5. Password Hashing
      2.1.2. Authorization
        2.1.2.1. Local Authorization
        2.1.2.2. RADIUS Authorization
        2.1.2.3. TACACS+ Authorization
          2.1.2.3.1. Examples
        2.1.2.4. Authorization Profiles for Different Interfaces
        2.1.2.5. Authorization Support
          2.1.2.5.1. Default User and Admin Profiles
          2.1.2.5.2. Authorization Support for Configuration Groups
      2.1.3. Accounting
        2.1.3.1. RADIUS Accounting
        2.1.3.2. TACACS+ Accounting
        2.1.3.3. Command Accounting Log Events
    2.2. Security Controls
      2.2.1. When a Server Does Not Respond
      2.2.2. Access Request Flow
    2.3. Control and Management Traffic Protection
      2.3.1. CPM Filters
        2.3.1.1. CPM Filter Packet Match
        2.3.1.2. CPM IPv4 and IPv6 Filter Entry Match Criteria
        2.3.1.3. CPM MAC Filter Entry Match Criteria
        2.3.1.4. CPM Filter Policy Action
        2.3.1.5. CPM Filter Policy Statistics and Logging
        2.3.1.6. CPM Filter: Protocols and Ports
      2.3.2. CPM Per-Peer Queuing
      2.3.3. Centralized CPU Protection
        2.3.3.1. Protocol Protection
        2.3.3.2. CPU Protection Extensions for ETH-CFM
        2.3.3.3. ETH-CFM Ingress Squelching
      2.3.4. Distributed CPU Protection (DCP)
        2.3.4.1. Applicability of Distributed CPU Protection
        2.3.4.2. Log Events, Statistics, Status, and SNMP support
        2.3.4.3. DCP Policer Resource Management
        2.3.4.4. Operational Guidelines and Tips
      2.3.5. Classification-Based Priority for Extracted Protocol Traffic
      2.3.6. TTL Security
      2.3.7. Management Access Filter
        2.3.7.1. MAF Filter Packet Match
        2.3.7.2. MAF IPv4/IPv6 Filter Entry Match Criteria
        2.3.7.3. MAF MAC Filter Entry Match Criteria
        2.3.7.4. MAF Filter Policy Action
        2.3.7.5. MAF Filter Policy Statistics and Logging
    2.4. Vendor-Specific Attributes (VSAs)
    2.5. Other Security Features
      2.5.1. SSH
      2.5.2. SSH PKI Authentication
        2.5.2.1. User Public Key Generation
      2.5.3. MAC Client and Server List
      2.5.4. KEX Client and Server List
      2.5.5. Regenerate the SSH key without disabling SSH
        2.5.5.1. Key re-exchange procedure
      2.5.6. Cipher Client and Server List
      2.5.7. Exponential Login Backoff
      2.5.8. User Lockout
      2.5.9. CLI Login Scripts
      2.5.10. 802.1x Network Access Control
      2.5.11. TCP Enhanced Authentication Option
        2.5.11.1. Packet Formats
        2.5.11.2. Keychain
      2.5.12. gRPC Authentication
      2.5.13. Hash Management per Management Interface Configuration
        2.5.13.1. Hash encryption Using AES 256
        2.5.13.2. Clear Text
    2.6. Configuration Notes
      2.6.1. General
    2.7. Configuring Security with CLI
      2.7.1. Security Configurations
      2.7.2. Security Configuration Procedures
        2.7.2.1. Configuring Management Access Filters
        2.7.2.2. Configuring IP CPM Filters
        2.7.2.3. Configuring IPv6 CPM Filters
        2.7.2.4. Configuring MAC CPM Filters
        2.7.2.5. Configuring CPM Queues
        2.7.2.6. IPsec Certificates Parameters
        2.7.2.7. Configuring Profiles
          2.7.2.7.1. Parameters
          2.7.2.7.2. Wildcards
          2.7.2.7.3. CLI Resource Management
        2.7.2.8. Configuring Users
        2.7.2.9. Configuring Keychains
        2.7.2.10. Copying and Overwriting Users and Profiles
          2.7.2.10.1. User
          2.7.2.10.2. Profile
      2.7.3. RADIUS Configurations
        2.7.3.1. Configuring RADIUS Authentication
        2.7.3.2. Configuring RADIUS Authorization
        2.7.3.3. Configuring RADIUS Accounting
      2.7.4. Configuring 802.1x RADIUS Policies
      2.7.5. TACACS+ Configurations
        2.7.5.1. Enabling TACACS+ Authentication
        2.7.5.2. Configuring TACACS+ Authorization
        2.7.5.3. Configuring TACACS+ Accounting
        2.7.5.4. Enabling SSH
      2.7.6. LDAP Configurations
        2.7.6.1. Configuring LDAP Authentication
        2.7.6.2. Configuring Redundant Servers
        2.7.6.3. Enabling SSH
      2.7.7. Configuring Login Controls
    2.8. Security Configuration Command Reference
      2.8.1. Command Hierarchies
        2.8.1.1. Security Commands
          2.8.1.1.1. LLDP Commands
          2.8.1.1.2. Management Access Filter Commands
          2.8.1.1.3. CLI Script Authorization Commands
          2.8.1.1.4. CPM Filter Commands
          2.8.1.1.5. CPM Queue Commands
          2.8.1.1.6. CPU Protection Commands
          2.8.1.1.7. Distributed CPU Protection Commands
          2.8.1.1.8. Extracted Protocol Traffic Priority Commands
          2.8.1.1.9. Security Password Commands
          2.8.1.1.10. Public Key Infrastructure (PKI) Commands
          2.8.1.1.11. Profile Commands
          2.8.1.1.12. CLI Session Commands
          2.8.1.1.13. RADIUS Commands
          2.8.1.1.14. TACACS+ Client Commands
          2.8.1.1.15. LDAP Commands
          2.8.1.1.16. User Management Commands
          2.8.1.1.17. User Template Commands
          2.8.1.1.18. Dot1x Commands
          2.8.1.1.19. Keychain Commands
          2.8.1.1.20. TTL Security Commands
          2.8.1.1.21. gRPC Commands
        2.8.1.2. Login Control Commands
      2.8.2. Command Descriptions
        2.8.2.1. General Security Commands
        2.8.2.2. Security Commands
        2.8.2.3. LLDP Commands
        2.8.2.4. Management Access Filter Commands
        2.8.2.5. CLI Script Authorization Commands
        2.8.2.6. CPM Filter Commands
        2.8.2.7. CPM Queue Commands
        2.8.2.8. CPU Protection Commands
        2.8.2.9. Distributed CPU Protection Commands
        2.8.2.10. Extracted Protocol Traffic Priority Commands
        2.8.2.11. Security Password Commands
        2.8.2.12. Public Key Infrastructure Commands
        2.8.2.13. Profile Commands
        2.8.2.14. CLI Session Commands
        2.8.2.15. RADIUS Commands
        2.8.2.16. TACACS+ Client Commands
        2.8.2.17. LDAP Client Commands
        2.8.2.18. User Management Commands
        2.8.2.19. Dot1x Commands
        2.8.2.20. Keychain Authentication
        2.8.2.21. TTL Security Commands
        2.8.2.22. gRPC Commands
        2.8.2.23. Login Control Commands
    2.9. Security Show, Clear, Debug, Tools, and Admin Command Reference
      2.9.1. Command Hierarchies
        2.9.1.1. Show Commands
          2.9.1.1.1. System Security
          2.9.1.1.2. Login Control
        2.9.1.2. Clear Commands
        2.9.1.3. Debug Commands
        2.9.1.4. Tools Commands
        2.9.1.5. Admin Commands
      2.9.2. Command Descriptions
        2.9.2.1. Show Commands
          2.9.2.1.1. System Commands
          2.9.2.1.2. Security Commands
          2.9.2.1.3. Login Control
        2.9.2.2. Clear Commands
          2.9.2.2.1. CPU Protection Commands
        2.9.2.3. Debug Commands
        2.9.2.4. Tools Commands
        2.9.2.5. Admin Commands
  3. Classic and Model-Driven Management Interfaces
    3.1. Model-Driven Management Interfaces
      3.1.1. Prerequisites for Using Model-Driven Management Interfaces
    3.2. YANG Data Models
      3.2.1. SR OS YANG Data Models
      3.2.2. OpenConfig
        3.2.2.1. Basic Configuration
        3.2.2.2. Shared Model Management Support
          3.2.2.2.1. Introduction
          3.2.2.2.2. Merging Configuration Statements
          3.2.2.2.3. Application Support
          3.2.2.2.4. Validating and Committing
          3.2.2.2.5. Error Reporting
          3.2.2.2.6. Using the info Command
          3.2.2.2.7. Deviating and Augmenting
    3.3. Datastores and Regions
    3.4. System-Provisioned Configuration (SPC) Objects
    3.5. Management Interface Configuration Mode
      3.5.1. Mixed Configuration Mode
      3.5.2. Loose References to IDs
      3.5.3. Transitioning Between Modes
    3.6. Configuring the CLI Engine
    3.7. Legacy Alcatel-Lucent Base-R13 NETCONF/YANG
      3.7.1. Alcatel-Lucent Base-R13 SR OS YANG Modules
      3.7.2. SPC Objects in Base-R13 NETCONF/YANG
    3.8. Classic and Model-Driven Management Interfaces Command Reference
      3.8.1. Command Hierarchies
        3.8.1.1. Management Infrastructure Control Commands
      3.8.2. Command Descriptions
        3.8.2.1. Management Infrastructure Control Commands
    3.9. Classic and Model-Driven Management Interfaces Show Command Reference
      3.9.1. Command Hierarchies
        3.9.1.1. Management Infrastructure Show Commands
      3.9.2. Command Descriptions
        3.9.2.1. Management Infrastructure Show Commands
  4. SNMP
    4.1. SNMP Overview
      4.1.1. SNMP Architecture
      4.1.2. Management Information Base
      4.1.3. SNMP Protocol Operations
      4.1.4. SNMP Versions
      4.1.5. Management Information Access Control
      4.1.6. User-Based Security Model Community Strings
      4.1.7. Views
      4.1.8. Access Groups
      4.1.9. Users
      4.1.10. Per-VPRN Logs and SNMP Access
      4.1.11. Per-SNMP Community Source IP Address Validation
    4.2. SNMP Versions
    4.3. Best Practices for SNMP Information Retrieval
      4.3.1. SNMP GetBulkRequest
      4.3.2. Queueing, RTT, and Collection Performance
    4.4. Configuration Notes
      4.4.1. General
    4.5. Configuring SNMP with CLI
      4.5.1. SNMP Configuration Overview
        4.5.1.1. Configuring SNMPv1 and SNMPv2c
        4.5.1.2. Configuring SNMPv3
      4.5.2. Basic SNMP Security Configuration
      4.5.3. Configuring SNMP Components
        4.5.3.1. Configuring a Community String
        4.5.3.2. Configuring View Options
        4.5.3.3. Configuring Access Options
        4.5.3.4. Configuring USM Community Options
        4.5.3.5. Configuring Other SNMP Parameters
    4.6. SNMP Configuration Command Reference
      4.6.1. Command Hierarchies
        4.6.1.1. SNMP System Commands
        4.6.1.2. SNMP Security Commands
      4.6.2. Command Descriptions
        4.6.2.1. SNMP System Commands
        4.6.2.2. SNMP Security Commands
    4.7. SNMP Show Command Reference
      4.7.1. Command Hierarchies
        4.7.1.1. Show Commands
      4.7.2. Command Descriptions
        4.7.2.1. Show Commands
  5. NETCONF
    5.1. NETCONF Overview
    5.2. NETCONF in SR OS
      5.2.1. Transport and Sessions
      5.2.2. Datastores and URLs
      5.2.3. NETCONF Operations and Capabilities
        5.2.3.1. <get>
          5.2.3.1.1. Example: Namespace Specified in <configure> Tag
          5.2.3.1.2. Example: Namespace Error in <configure> Tag
          5.2.3.1.3. Example: Namespace Specified in <state> Tag
          5.2.3.1.4. Example: Namespace Error in <state> Tag
        5.2.3.2. <get-config>
          5.2.3.2.1. Example: Reply with Defaults
          5.2.3.2.2. Example: Reply Without Default Values
          5.2.3.2.3. Example: Containment Node
          5.2.3.2.4. Example: List Without a Key Specified
          5.2.3.2.5. Example: List with Non-key Leaf Specified as Selection Node
          5.2.3.2.6. Example: Non-key Leaf Specified as a Content Match Node
          5.2.3.2.7. Example: Content Match Node on a List Key
          5.2.3.2.8. Example: Content Match Node on a Leaf-list
        5.2.3.3. <edit-config>
          5.2.3.3.1. Example: <running> Datastore with the “urn:nokia.com:sros:ns:yang:sr:conf” Namespace
          5.2.3.3.2. Example: Application of Default Operation Value for Parent and Child Nodes
          5.2.3.3.3. Example: Exceptions to the Default Operation Handling
        5.2.3.4. <copy-config>
        5.2.3.5. <delete-config>
        5.2.3.6. <lock>
        5.2.3.7. <unlock>
        5.2.3.8. <commit>
        5.2.3.9. <discard-changes>
        5.2.3.10. <validate>
        5.2.3.11. <get-schema>
        5.2.3.12. <get-data>
      5.2.4. Datastore and Operation Combinations
      5.2.5. General NETCONF Behavior
        5.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
        5.2.5.2. Example: Non-default NETCONF Base Namespace
        5.2.5.3. Example: Invalid NETCONF Namespace Declaration
        5.2.5.4. Example: Non-default NETCONF Namespace or Prefix Declaration in a Child Tag
        5.2.5.5. Example: Chunked Frame Mechanism
      5.2.6. Establishing a NETCONF Session
        5.2.6.1. Example: Checking NETCONF Status
        5.2.6.2. Example: Retrieving System Configurations, QoS, and Log Branches
        5.2.6.3. Example: Creating an Epipe Service
        5.2.6.4. Example: Returning Multiple Errors
    5.3. NETCONF Notifications
      5.3.1. 5.3.1 NETCONF Notification Examples�
        5.3.1.1. Example: <create-subscription> Operation
        5.3.1.2. Example: sros-config-change-event Notification
        5.3.1.3. Example: sros-state-change-event Notification
        5.3.1.4. Example: sros-cli-accounting-event Notification
        5.3.1.5. Example: sros-log-generic-event Notification
        5.3.1.6. Example: netconf-config-change Notification
        5.3.1.7. Example: sros-md-rpc-accounting-event Notification�
    5.4. NETCONF Monitoring
    5.5. NETCONF Using the YANG Library
    5.6. NETCONF Using the Legacy Alcatel-Lucent Base-R13 SR OS YANG Modules
      5.6.1. Operations and Capabilities
    5.7. NETCONF Using the CLI Content Layer
      5.7.1. CLI Content Layer Examples
        5.7.1.1. Example: Configuration Change
        5.7.1.2. Example: Retrieving Configuration Information�
        5.7.1.3. Example: Retrieving Full Configuration Information�
        5.7.1.4. Example: <get> Request
        5.7.1.5. Example: <get> Request with Non-Syntax Error in the Second Item
    5.8. NETCONF Configuration Command Reference
      5.8.1. Command Hierarchies
        5.8.1.1. NETCONF System Commands
        5.8.1.2. NETCONF Security Commands
      5.8.2. Configuration Commands
        5.8.2.1. NETCONF System Commands
        5.8.2.2. NETCONF Security Commands
    5.9. NETCONF Show and Debug Command Reference
      5.9.1. Command Hierarchies
        5.9.1.1. Show Commands
        5.9.1.2. Debug Commands
      5.9.2. Command Descriptions
        5.9.2.1. Show Commands
          5.9.2.1.1. System Commands
      5.9.3. Debug Commands
        5.9.3.1. NETCONF Debug Commands
  6. Event and Accounting Logs
    6.1. Logging Overview
      6.1.1. Logging Using the Management VPRN
    6.2. Log Destinations
      6.2.1. Console
      6.2.2. Session
      6.2.3. CLI Logs
      6.2.4. Memory Logs
      6.2.5. Log Files
      6.2.6. SNMP Trap Group
      6.2.7. Syslog
      6.2.8. NETCONF
    6.3. Event Logs
      6.3.1. Event Sources
      6.3.2. Event Control
      6.3.3. Log Manager and Event Logs
      6.3.4. Event Filter Policies
      6.3.5. Event Log Entries
      6.3.6. Simple Logger Event Throttling
      6.3.7. Default System Log
      6.3.8. Event Handling System
        6.3.8.1. EHS Configuration and Syntax Rules
        6.3.8.2. Examples of EHS Syntax Supported in Classic CLI
        6.3.8.3. Valid Examples of EHS Syntax in Classic CLI
        6.3.8.4. Invalid Examples for EHS Syntax in Classic CLI
        6.3.8.5. EHS Debounce
        6.3.8.6. Executing EHS or CRON Scripts
    6.4. Customizing Syslog Messages Using Python
      6.4.1. Python Engine for Syslog
        6.4.1.1. Python Syslog APIs
        6.4.1.2. Timestamp Format Manipulation
      6.4.2. Python Processing Efficiency
      6.4.3. Python Backpressure
      6.4.4. Event Selection for Python Processing
      6.4.5. Modifying a Log File
      6.4.6. Deleting a Log File
      6.4.7. Modifying a File ID
      6.4.8. Modifying a Syslog ID
      6.4.9. Modifying an SNMP Trap Group
      6.4.10. Deleting an SNMP Trap Group
      6.4.11. Modifying a Log Filter
      6.4.12. Modifying Event Control Parameters
      6.4.13. Returning to the Default Event Control Configuration
    6.5. Accounting Logs
      6.5.1. Accounting Records
      6.5.2. Accounting Files
      6.5.3. Design Considerations for Accounting Policies
      6.5.4. Reporting and Time-Based Accounting
      6.5.5. Overhead Reduction in Accounting: Custom Record
        6.5.5.1. User Configurable Records
        6.5.5.2. Changed Statistics Only
        6.5.5.3. Configurable Accounting Records
          6.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
          6.5.5.3.2. XML Accounting Files for Policer Counters
          6.5.5.3.3. RADIUS Accounting in Networks Using ESM
        6.5.5.4. Significant Change Only Reporting
      6.5.6. Immediate Completion of Records
        6.5.6.1. Record Completion for XML Accounting
      6.5.7. AA Accounting per Forwarding Class
    6.6. Configuration Notes
    6.7. Configuring Logging with CLI
      6.7.1. Log Configuration Overview
      6.7.2. Log Types
      6.7.3. Basic Log Configuration
      6.7.4. Common Configuration Tasks
        6.7.4.1. Configuring an Event Log
        6.7.4.2. Configuring a File ID
        6.7.4.3. Configuring an Accounting Policy
        6.7.4.4. Configuring Event Control
        6.7.4.5. Configuring a Log Filter
        6.7.4.6. Configuring an SNMP Trap Group
          6.7.4.6.1. Setting the Replay Parameter
          6.7.4.6.2. Shutdown In-Band Port
          6.7.4.6.3. No Shutdown Port
        6.7.4.7. Configuring a Syslog Target
          6.7.4.7.1. Configuring an Accounting Custom Record
    6.8. Log Configuration Command Reference
      6.8.1. Command Hierarchies
        6.8.1.1. Log Configuration Commands
        6.8.1.2. Accounting Policy Commands
        6.8.1.3. Custom Record Commands
        6.8.1.4. File ID Commands
        6.8.1.5. Event Filter Commands
        6.8.1.6. Event Handling System (EHS) Commands
        6.8.1.7. Event Trigger Commands
        6.8.1.8. Log ID Commands
        6.8.1.9. SNMP Trap Group Commands
        6.8.1.10. Syslog Commands
      6.8.2. Command Descriptions
        6.8.2.1. Generic Commands
        6.8.2.2. Log Configuration Commands
        6.8.2.3. Accounting Policy Commands
          6.8.2.3.1. Accounting Policy Custom Record Commands
        6.8.2.4. File ID Commands
        6.8.2.5. Event Filter Commands
        6.8.2.6. Event Handling System (EHS) Commands
        6.8.2.7. Event Trigger Commands
        6.8.2.8. Log ID Commands
        6.8.2.9. SNMP Trap Groups
        6.8.2.10. Syslog Commands
    6.9. Log Show, Clear, and Tools Command Reference
      6.9.1. Command Hierarchies
        6.9.1.1. Show Commands
        6.9.1.2. Clear Command
        6.9.1.3. Tools Commands
      6.9.2. Command Descriptions
        6.9.2.1. Show Commands
        6.9.2.2. Clear Commands
        6.9.2.3. Tools Commands
  7. Node Discovery Provisioning Using OSPF
    7.1. Node Discovery Procedure
      7.1.1. Network Element Profiles
      7.1.2. Assigning a Network Element Profile
      7.1.3. OSPFv2 Opaque LSA Requirements
      7.1.4. IPv4/IPv6
    7.2. Aggregation Node Configuration
      7.2.1. MIB Requirements on the Aggregation Node
      7.2.2. SNMP Traps and Gets
    7.3. Network Element Discovery Command Reference
      7.3.1. Command Hierarchies
        7.3.1.1. Network Element Discovery Commands
      7.3.2. Command Descriptions
        7.3.2.1. Network Element Discovery Commands
  8. sFlow
    8.1. sFlow Overview
    8.2. sFlow Features
      8.2.1. sFlow Counter Polling Architecture
      8.2.2. sFlow Support on Logical Ethernet Ports
      8.2.3. sFlow SAP Counter Map
      8.2.4. sFlow Record Formats
    8.3. sFlow Command Reference
      8.3.1. Command Hierarchies
        8.3.1.1. sFlow Configuration Commands
      8.3.2. Command Descriptions
        8.3.2.1. Configuration Commands
    8.4. sFlow Show Command Descriptions
      8.4.1. Command Descriptions
        8.4.1.1. sFlow Show Commands
        8.4.1.2. Show Commands
  9. gRPC
    9.1. Security Aspects
      9.1.1. TLS-Based Encryption
      9.1.2. Authentication
    9.2. gNMI Service
      9.2.1. gNMI Service Definitions
        9.2.1.1. Capability Discovery
        9.2.1.2. Get/Set RPC
        9.2.1.3. Subscribe RPC
          9.2.1.3.1. Bytes Encoding
          9.2.1.3.2. ON_CHANGE Subscription Mode
        9.2.1.4. Publish RPC
        9.2.1.5. Schema Paths
      9.2.2. gNMI Service Use Cases
        9.2.2.1. Telemetry
          9.2.2.1.1. Dial-in Telemetry
          9.2.2.1.2. Dial-out Telemetry
        9.2.2.2. NE Configuration Management
    9.3. gNOI Services
      9.3.1. Certificate Management for TLS Connections
        9.3.1.1. RPC GetCertificates
        9.3.1.2. RPC CanGenerateCSR
        9.3.1.3. RPC Rotate
        9.3.1.4. RPC Install
        9.3.1.5. RPC RevokeCertificates
    9.4. gNOI System
      9.4.1. SetPackage RPC
      9.4.2. Reboot, CancelReboot, and RebootStatus RPC
      9.4.3. SwitchControlProcessor RPC
    9.5. MD-CLI Service
      9.5.1. Remote Management Using a Remote Network Interface Shell Manager
    9.6. gRPC Command Reference
      9.6.1. Command Hierarchies
        9.6.1.1. System Commands
        9.6.1.2. QoS Commands
      9.6.2. Command Descriptions
        9.6.2.1. System Commands
        9.6.2.2. QoS Commands
    9.7. gRPC Show, Tools, and Admin Command Reference
      9.7.1. Command Hierarchies
        9.7.1.1. Show Commands
        9.7.1.2. Tools Commands
        9.7.1.3. Admin Commands
      9.7.2. Command Descriptions
        9.7.2.1. Show Commands
        9.7.2.2. Tools Commands
        9.7.2.3. Admin Commands
  10. TLS
    10.1. TLS Overview
    10.2. TLS Server Interaction with Applications
      10.2.1. TLS Application Support
    10.3. TLS Handshake
    10.4. TLS Client Certificate
    10.5. TLS Symmetric Key Rollover
    10.6. Supported TLS Ciphers
    10.7. SR OS Certificate Management
      10.7.1. Certificate Profile
      10.7.2. TLS Server Authentication of the Client Certificate CN Field
      10.7.3. CN Regexp Format
    10.8. Operational Guidelines
      10.8.1. Server Authentication Behavior
      10.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
    10.9. LDAP Redundancy and TLS
    10.10. Basic TLS Configuration
    10.11. Common Configuration Tasks
      10.11.1. Configuring a Server TLS Profile
      10.11.2. Configuring a Client TLS Profile
      10.11.3. Configuring a TLS Client or TLS Server Certificate
      10.11.4. Configuring a TLS Trust Anchor
    10.12. TLS Command Reference
      10.12.1. Command Hierarchies
        10.12.1.1. Security TLS Commands
        10.12.1.2. LDAP TLS Profile Commands
        10.12.1.3. Admin Commands
      10.12.2. Command Descriptions
        10.12.2.1. Security TLS Commands
        10.12.2.2. LDAP TLS Profile Commands
        10.12.2.3. Admin Commands
    10.13. TLS Show Command Reference
      10.13.1. Command Hierarchies
        10.13.1.1. Show Commands
      10.13.2. Command Descriptions
        10.13.2.1. Show Commands
  11. Facility Alarms
    11.1. Facility Alarms Overview
    11.2. Facility Alarms vs. Log Events
    11.3. Facility Alarm Severities and Alarm LED Behavior
    11.4. Facility Alarm Hierarchy
    11.5. Facility Alarm List
    11.6. Configuring Logging with CLI
      11.6.1. Basic Facility Alarm Configuration
      11.6.2. Common Configuration Tasks
        11.6.2.1. Configuring the Maximum Number of Alarms to Clear
    11.7. Facility Alarms Configuration Command Reference
      11.7.1. Command Hierarchies
        11.7.1.1. Facility Alarm Configuration Commands
      11.7.2. Command Descriptions
        11.7.2.1. Generic Commands
    11.8. Facility Alarms Show Command Reference
      11.8.1. Command Hierarchies
        11.8.1.1. Show Commands
      11.8.2. Command Descriptions
        11.8.2.1. Show Commands
  12. Standards and Protocol Support
  Customer Document and Product Support
Triple Play Service Delivery Architecture 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia SR OS Services Configuration Process
  2. Introduction to Triple Play
    2.1. Nokia’s Triple Play Service Delivery Architecture
      2.1.1. Introduction to Triple Play
      2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
      2.1.3. Architectural Foundations
      2.1.4. Optimizing Triple Play Service Infrastructures
        2.1.4.1. Distributed Service Edges
        2.1.4.2. Service Differentiation, QoS Enablement
        2.1.4.3. Virtual MAC Subnetting for VPLS
    2.2. Services
      2.2.1. Service Types
      2.2.2. Service Policies
    2.3. Nokia Service Model
      2.3.1. Introduction
      2.3.2. Service Entities
      2.3.3. Customers
      2.3.4. Service Access Points (SAPs)
        2.3.4.1. SAP Encapsulation Types and Identifiers
        2.3.4.2. Ethernet Encapsulations
        2.3.4.3. SAP Considerations
      2.3.5. Service Distribution Points (SDPs)
        2.3.5.1. SDP Binding
        2.3.5.2. Spoke and Mesh SDPs
        2.3.5.3. SDP Encapsulation Types
          2.3.5.3.1. GRE
          2.3.5.3.2. MPLS
        2.3.5.4. SDP Keepalives
    2.4. Epipe Service Overview
    2.5. VPLS Service Overview
      2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
        2.5.1.1. Residential Split Horizon Groups
    2.6. IES Service Overview
      2.6.1. IP Interface
    2.7. VPRN Service Overview
    2.8. Deploying and Provisioning Services
      2.8.1. Phase 1: Core Network Construction
      2.8.2. Phase 2: Service Administration
      2.8.3. Phase 3: Service Provisioning
    2.9. Configuration Notes
      2.9.1. General
    2.10. Configuring Triple Play Services with CLI
      2.10.1. Configuring VPLS Residential Split Horizon Groups
        2.10.1.1. Configuring Static Hosts
          2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
          2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
          2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
          2.10.1.1.4. Configuring Static Hosts on an IES SAP
          2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
    2.11. Triple Play Services Command Reference
      2.11.1. Command Hierarchies
        2.11.1.1. IES/VPRN Triple Play Commands
        2.11.1.2. VPLS Triple Play Commands
        2.11.1.3. Show Commands
        2.11.1.4. Clear Commands
        2.11.1.5. Debug Commands
        2.11.1.6. Tools Commands
      2.11.2. Command Descriptions
        2.11.2.1. Global Commands
        2.11.2.2. IES/VPRN Service Commands
          2.11.2.2.1. VPLS Triple Play Commands
          2.11.2.2.2. Service DHCP and Anti-Spoof Filtering Commands
          2.11.2.2.3. Interface IPv6 Commands
        2.11.2.3. Show Commands
          2.11.2.3.1. IGMP Snooping Show Commands
        2.11.2.4. Clear Commands
        2.11.2.5. Debug Commands
        2.11.2.6. Tools Commands
  3. DHCP Management
    3.1. DHCP Principles
    3.2. DHCP Features
      3.2.1. DHCP Relay
      3.2.2. DHCPv4 Relay Proxy
      3.2.3. DHCPv4 Relay Lease Split
      3.2.4. Subscriber Identification Using Option 82 Field
        3.2.4.1. Trusted and Untrusted
      3.2.5. DHCP Snooping
      3.2.6. DHCP Lease State Table
      3.2.7. DHCP and Layer 3 Aggregation
        3.2.7.1. DHCPv4 Snooping
        3.2.7.2. DHCPv6 Snooping
      3.2.8. Local DHCP Servers
        3.2.8.1. Overview
        3.2.8.2. Local DHCP Server Support
      3.2.9. DHCPv6
        3.2.9.1. DHCPv6 Relay Agent
        3.2.9.2. DHCPv6 Prefix Options
        3.2.9.3. Neighbor Resolution With DHCPv6 Relay
        3.2.9.4. DHCPv6 Lease Persistency
        3.2.9.5. Local Proxy Neighbor Discovery
        3.2.9.6. IPv6oE Hosts Behind Bridged CPEs
        3.2.9.7. IPv6 Link-Address Based Pool Selection
        3.2.9.8. IPv6 Address and Prefix Stickiness
        3.2.9.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
        3.2.9.10. Host Connectivity Checks for IPv6
      3.2.10. Lease Query
      3.2.11. DHCPv6 to Server Option
      3.2.12. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
      3.2.13. DHCP Caching
      3.2.14. Flexible Creation of DHCPv4/6 Host Parameters
      3.2.15. Python DTC Variables and API
        3.2.15.1. DTC Debugging Facility
      3.2.16. Virtual Subnet for DHCPv4 Hosts
      3.2.17. Address Reservation for Sticky Leases
      3.2.18. DHCP Message Processing Overload Protection
    3.3. Proxy DHCP Server
      3.3.1. Local DHCP Servers
        3.3.1.1. Terminology
        3.3.1.2. Overview
        3.3.1.3. DHCP Lease Synchronization
        3.3.1.4. Intercommunication Link Failure Detection
        3.3.1.5. DHCP Server Failover States
        3.3.1.6. Lease Time Synchronization
        3.3.1.7. Maximum Client Lead Time (MCLT)
        3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
        3.3.1.9. Fast-Switchover of IP Address and Prefix Delegation
          3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
    3.4. Local Address Assignment
      3.4.1. Stateless Address Auto-Configuration
    3.5. Configuring DHCP with CLI
      3.5.1. Enabling DHCP Snooping
      3.5.2. Configuring Local User Database Parameters
      3.5.3. Configuring Option 82 Handling
      3.5.4. Enabling DHCP Relay
    3.6. Triple Play DHCP Command Reference
      3.6.1. Command Hierarchies
        3.6.1.1. DHCP Filter Commands
          3.6.1.1.1. DHCP Filter Commands
          3.6.1.1.2. DHCP6 Filter Commands
        3.6.1.2. Router Local DHCP Server Commands
        3.6.1.3. Router Local DHCP6 Server Commands
        3.6.1.4. Subscriber Management Commands
          3.6.1.4.1. IPoE Commands
          3.6.1.4.2. PPP Commands
          3.6.1.4.3. MSAP Policy Commands
        3.6.1.5. Service DHCP Commands
          3.6.1.5.1. VPRN Local DHCP Server Commands
          3.6.1.5.2. VPRN Local DHCP6 Server Commands
          3.6.1.5.3. VPLS DHCP Commands
          3.6.1.5.4. Anti-Spoof Filtering Commands
        3.6.1.6.  System DHCP Commands
        3.6.1.7. Show Commands
        3.6.1.8. Clear Commands
        3.6.1.9. Debug Commands
        3.6.1.10. Tools Commands
      3.6.2. Command Descriptions
        3.6.2.1. Triple Play DHCP Configuration Commands
          3.6.2.1.1. Global Commands
          3.6.2.1.2. DHCP Filter Commands
          3.6.2.1.3. Subscriber Management Local User Database Commands
          3.6.2.1.4. Managed SAP Policy Commands
          3.6.2.1.5. Local DHCP Server Commands
          3.6.2.1.6. Local DHCP6 Server Commands
          3.6.2.1.7. DHCP Service Commands
          3.6.2.1.8. System DHCP Commands
          3.6.2.1.9. Show Commands
          3.6.2.1.10. Clear Commands
          3.6.2.1.11. Debug Commands
          3.6.2.1.12. Tools Commands
  4. Stateless Address Auto-configuration (SLAAC)
    4.1. SLAAC Management Principles
    4.2. Configuration Overview
    4.3. Router-Solicit Trigger
    4.4. SLAAC Address Assignment
    4.5. Static SLAAC Prefix Assignment
    4.6. Dynamic SLAAC Prefix Assignment
    4.7. SLAAC Prefix Replacement
  5. Point-to-Point Protocol over Ethernet Management
    5.1. PPPoE
      5.1.1. PPPoE Authentication and Authorization
        5.1.1.1. General Flow
        5.1.1.2. RADIUS
        5.1.1.3. Local User Database Directly Assigned to PPPoE Node
        5.1.1.4. Subscriber per PPPoE Session Index
        5.1.1.5. Local DHCP Server with Local User Database
      5.1.2. PPPoE Session ID Allocation
      5.1.3. Multiple Sessions Per MAC Address
      5.1.4. Session Limit Per Circuit ID
      5.1.5. PPP Session Re-establishment
      5.1.6. Private Retail Subnets
      5.1.7. IPCP Subnet Negotiation
        5.1.7.1. Numbered WAN Support for Layer 3 RGs
      5.1.8. IES as Retail Service for PPPoE Host
      5.1.9. Unnumbered PPPoE
      5.1.10. Selective Backhaul of PPPoE Traffic using an Epipe Service
    5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      5.2.1. Terminology
      5.2.2. LNS MLPPPoX
      5.2.3. MLPPP Encapsulation
      5.2.4. MLPPPoX Negotiation
      5.2.5. Enabling MLPPPoX
      5.2.6. Link Fragmentation and Interleaving (LFI)
        5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      5.2.7. LFI Functionality Implemented in LNS
        5.2.7.1. Last Mile QoS Awareness in the LNS
        5.2.7.2. BB-ISA Processing
        5.2.7.3. LNS-LAC Link
        5.2.7.4. AN-RG Link
        5.2.7.5. Home Link
        5.2.7.6. Optimum Fragment Size Calculation by LNS
          5.2.7.6.1. Encapsulation Based Fragment Size
          5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
          5.2.7.6.3. Selection of the Optimum Fragment Length
      5.2.8. Upstream Traffic Considerations
      5.2.9. Multiple Links MLPPPoX With No Interleaving
      5.2.10. MLPPPoX Session Support
      5.2.11. Session Load Balancing Across Multiple BB-ISAs
      5.2.12. BB-ISA Hashing Considerations
      5.2.13. Last Mile Rate and Encapsulation Parameters
      5.2.14. Link Failure Detection
      5.2.15. CoA Support
      5.2.16. Accounting
      5.2.17. Filters and Mirroring
      5.2.18. PTA Considerations
      5.2.19. QoS Considerations
        5.2.19.1. Dual-Pass
        5.2.19.2. Traffic Prioritization in LFI
        5.2.19.3. Shaping Based on the Last Mile Wire Rates
        5.2.19.4. Downstream Bandwidth Management on Egress Port
      5.2.20. Sub/Sla-Profile Considerations
      5.2.21. Example of MLPPPoX Session Setup Flow
      5.2.22. Other Considerations
    5.3. Configuration Notes
    5.4. PPP Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. PPPoE Policy Configuration Commands
        5.4.1.2. PPPoE Service Commands
        5.4.1.3. PPPoE Local User Database Commands
        5.4.1.4. MLPPP on LNS Commands
        5.4.1.5. Show Commands
      5.4.2. Command Descriptions
        5.4.2.1. Generic Commands
          5.4.2.1.1. Subscriber Management Commands
          5.4.2.1.2. MLPPP on LNS Commands
          5.4.2.1.3. PPP/PPPoE Service Commands
          5.4.2.1.4. RADIUS Attribute Commands
        5.4.2.2. Service Commands
        5.4.2.3. Show Commands
        5.4.2.4. Clear Commands
        5.4.2.5. Debug Commands
  6. Layer 2 Tunneling Protocol (L2TP)
    6.1. Terminology
    6.2. L2TP Overview
      6.2.1. LAC DF Bit
      6.2.2. Handling L2TP Tunnel/Session Initialization Failures
        6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
        6.2.2.2. Peer Blacklist
        6.2.2.3. Tunnel Blacklists
          6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
        6.2.2.4. Tunnel Selection Mechanism
        6.2.2.5. Tunnel Probing
        6.2.2.6. Controlling the Size of Blacklist
        6.2.2.7. Displaying the Content of a Blacklist
        6.2.2.8. Generating Trap when the Blacklist is Full
        6.2.2.9. Premature Removal of Blacklisted Entries
        6.2.2.10. Manual Purging of Entities within the Blacklist
      6.2.3. CDN Result Code Overwrite
      6.2.4. LNS Proxy
    6.3. L2TP LAC VPRN
      6.3.1. Per-ISP Egress L2TP DSCP Reclassification
    6.4. Traffic Steering on L2TP LAC
      6.4.1. Steering Activation and Deactivation
      6.4.2. Steering States
      6.4.3. Configuring Traffic Steering on L2TP LAC
    6.5. L2TP Tunnel RADIUS Accounting
      6.5.1. Accounting Packets List
      6.5.2. RADIUS Attributes Value Considerations
    6.6. MLPPP on the LNS Side
    6.7. LNS Reassembly
    6.8. LNS Subscriber Policers
      6.8.1. Policer Support
    6.9. L2TP Command Reference
      6.9.1. Command Hierarchies
        6.9.1.1. L2TP Configuration Commands
          6.9.1.1.1. Router Commands
          6.9.1.1.2. Redundancy Commands
          6.9.1.1.3. Service Commands
          6.9.1.1.4. System Commands
        6.9.1.2. Steering Profile Commands
        6.9.1.3. L2TP Tunnel RADIUS Accounting Commands
        6.9.1.4. Show Commands
        6.9.1.5. Clear Commands
        6.9.1.6. Debug Commands
        6.9.1.7. Tools Commands
      6.9.2. Command Descriptions
        6.9.2.1. L2TP Configuration Commands
          6.9.2.1.1. Global Commands
          6.9.2.1.2. L2TP Commands
        6.9.2.2. Steering Profile Commands
        6.9.2.3. L2TP Tunnel RADIUS Accounting Commands
        6.9.2.4. Show Commands
        6.9.2.5. Clear Commands
        6.9.2.6. Debug Commands
        6.9.2.7. Tools Commands
  7. Triple Play Security
    7.1. Triple Play Security Features
      7.1.1. Anti-Spoofing Filters
        7.1.1.1. Anti-spoofing Filter Types
        7.1.1.2. Filtering Packets
      7.1.2. Layer 2 Triple Play Security Features
        7.1.2.1. MAC Pinning
        7.1.2.2. MAC Protection
        7.1.2.3. DoS Protection
          7.1.2.3.1. Subscriber Aggregation Network
          7.1.2.3.2. Network Control Filtering
        7.1.2.4. VPLS Redirect Policy
      7.1.3. ARP Handling
        7.1.3.1. ARP Reply Agent
        7.1.3.2. Dynamic ARP Table Population
        7.1.3.3. Local Proxy ARP
      7.1.4. Web Portal Redirect
    7.2. Configuring Triple Play Security with CLI
      7.2.1. Common Configuration Tasks
        7.2.1.1. Configuring Anti-Spoofing Filters
        7.2.1.2. Configuring Triple Play Security Features
          7.2.1.2.1. Configuring MAC Pinning
          7.2.1.2.2. Configuring MAC Protection
          7.2.1.2.3. Configuring VPLS Redirect Policy
        7.2.1.3. Configuring ARP Handling
          7.2.1.3.1. Configuring Proxy ARP
          7.2.1.3.2. Configuring Local Proxy ARP
          7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
          7.2.1.3.4. Configuring Remote Proxy ARP
          7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
          7.2.1.3.6. Configuring CPU Protection
        7.2.1.4. Configuring Web Portal Redirect
    7.3. Triple Play Security Command Reference
      7.3.1. Command Hierarchies
        7.3.1.1. Anti-Spoofing Commands
        7.3.1.2. Layer 2 Security Commands
        7.3.1.3. ARP Handling Commands
        7.3.1.4. Show Commands
        7.3.1.5. Tools Commands
      7.3.2. Command Descriptions
        7.3.2.1. Triple Play Security Configuration Commands
          7.3.2.1.1. Triple Play Anti-Spoofing Commands
          7.3.2.1.2. Triple Play Layer 2 Security Commands
          7.3.2.1.3. ARP Handling Commands
        7.3.2.2. Show Commands
        7.3.2.3. Tools Commands
  8. Triple Play Multicast
    8.1. Introduction to Multicast
    8.2. Multicast in the Broadband Service Router
      8.2.1. Internet Group Management Protocol
        8.2.1.1. IGMP Versions and Interoperability Requirements
        8.2.1.2. IGMP Version Transition
      8.2.2. Multicast Listener Discovery
        8.2.2.1. MLD Versions and Interoperability Requirements
        8.2.2.2. Source Specific Multicast Groups
      8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
      8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
    8.3. Multicast in the BSA
      8.3.1. IGMP Snooping
        8.3.1.1. IGMP/MLD Message Processing
        8.3.1.2. IGMP Message Processing
        8.3.1.3. MLD Message Processing
        8.3.1.4. IGMP/MLD Filtering
      8.3.2. Multicast VPLS Registration (MVR)
      8.3.3. Layer 3 Multicast Load Balancing
      8.3.4. IGMP State Reporter
        8.3.4.1. IGMP Data Records
        8.3.4.2. Transport Mechanism
        8.3.4.3. HA Compliance
        8.3.4.4. QoS Awareness
        8.3.4.5. IGMP Reporting Caveats
    8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
      8.4.1. Multicast Over IPoE
        8.4.1.1. Per SAP Replication Mode
          8.4.1.1.1. Per SAP Queue
          8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
          8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
        8.4.1.2. Per Subscriber Host Replication Mode
          8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
      8.4.2. Multicast Over PPPoE
      8.4.3. IGMP Flooding Containment
      8.4.4. IGMP/MLD Timers
      8.4.5. IGMP/MLD Query Intervals
      8.4.6. HQoS Adjustment
        8.4.6.1. Host Tracking (HT) Considerations
        8.4.6.2. HQoS Adjust Per Vport
          8.4.6.2.1. Multi-Chassis Redundancy
          8.4.6.2.2. Scalability Considerations
      8.4.7. Redirection
      8.4.8. Hierarchical Multicast CAC (H-MCAC)
        8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
      8.4.9. Determining MCAC Policy in Effect
      8.4.10. Multicast Filtering
      8.4.11. Joining the Multicast Tree
      8.4.12. Wholesale/Retail Requirements
      8.4.13. QoS Considerations
      8.4.14. Redundancy Considerations
        8.4.14.1. Redirection Considerations
      8.4.15. Query Intervals for Multicast
        8.4.15.1. ESM Host-based Queries
        8.4.15.2. Group Interface-based Queries
    8.5. Configuring Triple Play Multicast Services with CLI
      8.5.1. Configuring IGMP Snooping in the BSA
        8.5.1.1. Enabling IGMP Snooping in a VPLS Service
        8.5.1.2. IGMPv3 Multicast Routers
        8.5.1.3. With IGMPv1/2 Multicast Routers
        8.5.1.4. Modifying IGMP Snooping Parameters
        8.5.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
      8.5.2. Configuring Static Multicast Groups on a SAP or SDP
        8.5.2.1. Enabling IGMP Group Membership Report Filtering
          8.5.2.1.1. Enabling IGMP Traffic Filtering
      8.5.3. Configuring Multicast VPLS Registration (MVR)
      8.5.4. Configuring IGMP, MLD, and PIM in the BSR
        8.5.4.1. Enabling IGMP
        8.5.4.2. Configuring IGMP Interface Parameters
        8.5.4.3. Configuring Static Parameters
        8.5.4.4. Configuring SSM Translation
        8.5.4.5. Enabling MLD
        8.5.4.6. Configuring MLD Interface Parameters
        8.5.4.7. Configuring Static Parameters
        8.5.4.8. Configuring SSM Translation
        8.5.4.9. Configuring PIM
          8.5.4.9.1. Enabling PIM
          8.5.4.9.2. Configuring PIM Interface Parameters
          8.5.4.9.3. Importing PIM Join/Register Policies
          8.5.4.9.4. Configuring PIM Join/Register Policies
        8.5.4.10. Configuring Bootstrap Message Import and Export Policies
    8.6. Triple Play Multicast Command Reference
      8.6.1. Command Hierarchies
        8.6.1.1. Multicast Management Commands
        8.6.1.2. Multicast Info Policy Bundle Commands
        8.6.1.3. Multicast Service Commands
        8.6.1.4. Ingress Multicast Path Management Commands
        8.6.1.5. Multicast Redirection
        8.6.1.6. Multicast Query Timer Commands
        8.6.1.7. Show Commands
        8.6.1.8. Debug Commands
      8.6.2. Command Descriptions
        8.6.2.1. Multicast Management Configuration Commands
          8.6.2.1.1. Generic Commands
          8.6.2.1.2. Multicast Management Commands
          8.6.2.1.3. Bandwidth Policy Commands
          8.6.2.1.4. Multicast Info Policy Commands
          8.6.2.1.5. Service Commands
          8.6.2.1.6. VPLS Multicast Commands
          8.6.2.1.7. Chassis Level Commands
          8.6.2.1.8. Multicast Redirection Commands
          8.6.2.1.9. Multicast Query Timer Commands
          8.6.2.1.10. Forwarding Plane Commands
        8.6.2.2. Show Commands
        8.6.2.3. Debug Commands
  9. Triple Play Enhanced Subscriber Management
    9.1. Uniform RADIUS Server Configuration
      9.1.1. RADIUS Server Configuration
        9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
        9.1.1.2. Legacy RADIUS Server Configuration
    9.2. RADIUS Authentication of Subscriber Sessions
      9.2.1. RADIUS Authentication Extensions
        9.2.1.1. Triple Play Network with RADIUS Authentication
      9.2.2. RADIUS Authorization Extensions
        9.2.2.1. Calling-Station-ID
        9.2.2.2. Subscriber Session Timeout
          9.2.2.2.1. Domain Name in Authentication
        9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
        9.2.2.4. SHCV Policy
      9.2.3. radius-server-policy Retry Attempt Overview
      9.2.4. AAA RADIUS Server Operation Status
      9.2.5. AAA RADIUS Accounting Server Stickiness
      9.2.6. AAA RADIUS Authentication Fallback Action
      9.2.7. AAA Test User Account
      9.2.8. Troubleshooting the RADIUS Server
      9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
        9.2.9.1. Provisioning IP Configuration of the Host
        9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
        9.2.9.3. Change of Authorization and Disconnect-Request
          9.2.9.3.1. Change of Authorization using the Tools Command
        9.2.9.4. RADIUS-Based Accounting
        9.2.9.5. RADIUS Accounting Terminating Cause
        9.2.9.6. Accounting Modes Of Operation
        9.2.9.7. Per Session Accounting
        9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
        9.2.9.9. No Host-Accounting
        9.2.9.10. Host-Accounting Enabled
        9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
        9.2.9.12. Accounting Interim Update Message Interval
        9.2.9.13. CoA Triggered Accounting Interim Update
        9.2.9.14. Class Attribute
        9.2.9.15. User Name
        9.2.9.16. Accounting-On and Accounting Off
        9.2.9.17. RADIUS Accounting Message Buffering
        9.2.9.18. Multiple Accounting Policies
        9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
    9.3. Enhanced Subscriber Management Overview
      9.3.1. Enhanced Subscriber Management Basics
        9.3.1.1. Standard and Enhanced Subscriber Management
          9.3.1.1.1. Subscriber Management Definitions
          9.3.1.1.2. Subscriber Identification Policy
          9.3.1.1.3. Subscriber Identification String
          9.3.1.1.4. Subscriber Profile
          9.3.1.1.5. SLA Profile
          9.3.1.1.6. Explicit Subscriber Profile Mapping
      9.3.2. ESM for IPv6
        9.3.2.1. Models
          9.3.2.1.1. PPPoE Host
          9.3.2.1.2. PPPoE RG
          9.3.2.1.3. IPoE Host/RG
        9.3.2.2. Setup
        9.3.2.3. 64-bit and 128-bit WAN Mode
          9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
        9.3.2.4. Behavior
          9.3.2.4.1. Dual Stack
          9.3.2.4.2. Router Advertisements (RA)
          9.3.2.4.3. CoA and Disconnect-Request
        9.3.2.5. Delegated-Prefix-Length
          9.3.2.5.1. Order of Preference for DPL
          9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
        9.3.2.6. DHCPv6 Relay Agent
          9.3.2.6.1. Configuring a DHCPv6 Relay Agent
        9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
        9.3.2.8. DHCPv6 Local Server
      9.3.3. Dynamic Subscriber Host Processing
        9.3.3.1. Dynamic Tables
          9.3.3.1.1. Active Subscriber Table
          9.3.3.1.2. SLA Profile Instance Table
          9.3.3.1.3. Subscriber Host Table
          9.3.3.1.4. DHCP Lease State Table
      9.3.4. Enhanced Subscriber Management Entities
        9.3.4.1. Instantiating a New Host
        9.3.4.2. Packet Processing for an Existing Host
      9.3.5. ESM Host Lockout
        9.3.5.1. Functionality
      9.3.6. ANCP and GSMP
        9.3.6.1. ANCP
          9.3.6.1.1. Static ANCP Management
          9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
          9.3.6.1.3. ANCP String
          9.3.6.1.4. ANCP Persistency Support
        9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
        9.3.6.3. DHCP Release Messages
          9.3.6.3.1. DHCP Release
        9.3.6.4. DHCP Client Mobility
        9.3.6.5. DHCP Lease Control
      9.3.7. Using Scripts for Dynamic Recognition of Subscribers
        9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
        9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
        9.3.7.3. Determining the Subscriber Profile
        9.3.7.4. Determining the SLA Profile
          9.3.7.4.1. SLA Profile Instance Sharing
          9.3.7.4.2. SLA-Based Egress QoS Marking
      9.3.8. Sub-id and Brg-id Names with Lengths Between 32 and 64 Characters
        9.3.8.1. Online Change of Sub-id and Brg-id
        9.3.8.2. Usage Notes
      9.3.9. Auto-Sub ID
        9.3.9.1. Sub-id Identifiers
        9.3.9.2. Dual Stack Hosts
        9.3.9.3. Mixing Hosts with Auto-Generated IDs and non-Auto-Generated IDs
        9.3.9.4. Deployment Considerations
        9.3.9.5. Caveats
      9.3.10. Limiting Subscribers and Hosts on a SAP
      9.3.11. Static Subscriber Hosts
      9.3.12. QoS for Subscribers and Hosts
        9.3.12.1. QoS Parameters in Different Profiles
        9.3.12.2. QoS Policy Overrides
      9.3.13. ESM Subscriber Hierarchical Traffic Control
        9.3.13.1. Subscriber HQoS
        9.3.13.2. Subscriber CFHP
        9.3.13.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
          9.3.13.3.1. Broadband Network Gateway Application
          9.3.13.3.2. Queue Determination and Scheduling
          9.3.13.3.3. Weighted Scheduler Group
          9.3.13.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
          9.3.13.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
          9.3.13.3.6. Vport Determination and Evaluation
          9.3.13.3.7. Applying Aggregate Rate Limit to a Vport
          9.3.13.3.8. Applying a Scheduler Policy to a Vport
          9.3.13.3.9. Signaling of Last Mile Encapsulation Type
          9.3.13.3.10. Configuration Example
      9.3.14. Subscriber Volume Statistics
        9.3.14.1. IP (Layer 3) Volume Accounting
        9.3.14.2. Separate IPv4 and IPv6 Counters
      9.3.15. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
        9.3.15.1. Dynamic Updates of Subscriber Filter Policies
          9.3.15.1.1. SLA Profile Change
          9.3.15.1.2. Override the IP and IPv6 Filter Policies
          9.3.15.1.3. Insert Subscriber Host-Specific Filter Entries
          9.3.15.1.4. Insert Shared Filter Entries
        9.3.15.2. Checking Filter Policy Details
      9.3.16. Multi-Chassis Synchronization
        9.3.16.1. Overview
          9.3.16.1.1. Loss of Synchronization and Reconciliation
      9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
        9.3.17.1. SRRP Messaging
        9.3.17.2. SRRP and Multi-Chassis Synchronization
        9.3.17.3. SRRP Instance
          9.3.17.3.1. SRRP Instance MCS Key
          9.3.17.3.2. Containing Service Type and ID
          9.3.17.3.3. Containing Subscriber IP Interface Name
          9.3.17.3.4. Subscriber Subnet Information
          9.3.17.3.5. Containing Group IP Interface Information
          9.3.17.3.6. Remote Redundant IP Interface Mismatch
          9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
          9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
          9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          9.3.17.3.10. Local and Remote Dual Master Detected
        9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
        9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
      9.3.18. PPPoE MC Redundancy
        9.3.18.1. SRRP Considerations for PPPoE
          9.3.18.1.1. SRRP Fact-Checks
        9.3.18.2. State Synchronization
          9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
        9.3.18.3. Traffic Control and Redundant Interface
          9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
          9.3.18.3.2. Subnet Assignment and Advertisement - Option B
        9.3.18.4. MSAP Considerations
        9.3.18.5. Unnumbered Interface Support
        9.3.18.6. Compatibility with MC-LAG
        9.3.18.7. IPv6 Support
        9.3.18.8. Considerations with Local DHCP Server
        9.3.18.9. Redundant Interface Considerations
      9.3.19. Routed Central Office (CO)
        9.3.19.1. Layer 3 Subscriber Interfaces
          9.3.19.1.1. DHCP Interactions
          9.3.19.1.2. Routed CO for IES Service
          9.3.19.1.3. Routed CO for VPRN Service
        9.3.19.2. Wholesale Retail Routed CO
          9.3.19.2.1. Wholesale Retail Model
          9.3.19.2.2. Configuration and Applicability
          9.3.19.2.3. Hub-and-Spoke Forwarding
        9.3.19.3. Routed Subscriber Hosts
          9.3.19.3.1. Static Configured IPv4 Managed Route
          9.3.19.3.2. Static Configured IPv6 Managed Route
          9.3.19.3.3. Dynamic BGP Peering
          9.3.19.3.4. RIP Listener
          9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
          9.3.19.3.6. GRT Lookup and Routed CO in a VPRN
      9.3.20. Dual Homing
        9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
        9.3.20.2. Steady-State Operation of Dual-homed Ring
        9.3.20.3. Broken-Ring Operation and the Transition to this State
        9.3.20.4. Transition from Broken to Closed Ring State
        9.3.20.5. Provisioning Aspects and Error Cases
        9.3.20.6. Dual Homing to Two BSR Nodes
        9.3.20.7. MC Services
        9.3.20.8. Routed CO Dual Homing
          9.3.20.8.1. Redundant Interfaces
          9.3.20.8.2. SRRP in Dual Homing
          9.3.20.8.3. Synchronization
          9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
        9.3.20.9. SRRP and Multi-Chassis Synchronization
        9.3.20.10. Dual Homing and ANCP
      9.3.21. SRRP Enhancement
        9.3.21.1. SRRP Fate Sharing
        9.3.21.2. Fate Sharing Algorithm
        9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
          9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
          9.3.21.3.2. Managed Routes
          9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
          9.3.21.3.4. Activating SRRP State Tracking
        9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
        9.3.21.5. Group Monitor
      9.3.22. Subscriber QoS Overrides
      9.3.23. Dual-Stack Lite
        9.3.23.1. IP-in-IP
        9.3.23.2. Configuring DS-Lite
        9.3.23.3. L2TP over IPv6
      9.3.24. Call Trace
    9.4. L2TP Tunnel RADIUS Accounting
      9.4.1. Accounting Packets List
      9.4.2. RADIUS Attributes Value Considerations
      9.4.3. Other Optional RADIUS Attributes
      9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
      9.4.5. MLPPP on the LNS Side
    9.5. RADIUS Route Download
    9.6. Managed SAP (MSAP)
      9.6.1. Capture SAP
      9.6.2. MSAP Parameters
        9.6.2.1. Explicit MSAP Parameters from Local User Database
        9.6.2.2. Explicit MSAP Parameters from RADIUS or DIAMETER Authentication�
        9.6.2.3. Implicit MSAP Parameters Specified at the Capture SAP
      9.6.3. MSAP Creation
      9.6.4. MSAP QoS Configuration
      9.6.5. Sticky MSAP
    9.7. ESM Identification Process
      9.7.1. SAP-ID ESM Identifier
      9.7.2. DSLAM-ID
    9.8. Default-Subscriber
    9.9. Subscriber Mirroring
    9.10. Multicast Management
    9.11. Volume and Time Based Accounting
      9.11.1. Metering
        9.11.1.1. Categories Map and Categories
        9.11.1.2. Quota Consumption
        9.11.1.3. Minimum Credit Control Quota Values
        9.11.1.4. RADIUS VSA Alc-Credit-Control-Quota
      9.11.2. Credit Negotiation Mechanisms
      9.11.3. Action on Credit Exhaustion
      9.11.4. Action on Error-Conditions
      9.11.5. Applicability of Volume and Time Based Accounting
    9.12. Subscriber Host Idle Timeout
    9.13. Web Portal Authentication
      9.13.1. HTTP-Redirect (Captive Portal)
      9.13.2. One-time HTTP Redirection Overview
      9.13.3. Web Authentication Protocol (WPP)
        9.13.3.1. WPP Configurations
        9.13.3.2. WPP Triggered Host Creation
          9.13.3.2.1. LUDB Support For WPP
        9.13.3.3. WPP Multi-Chassis Redundancy Support
        9.13.3.4. WPP Portal Group
    9.14. ESM over MPLS Pseudowires
      9.14.1. Encapsulation
      9.14.2. ESM and PW Ports
        9.14.2.1. ESM on PW-Port Bound to a Physical Port
          9.14.2.1.1. QoS Support
          9.14.2.1.2. BNG Redundancy with ESM over Pseudowire
        9.14.2.2. ESM on PXC-Based PW-Ports
    9.15. Logical Link Identifier (LLID)
    9.16. PADI Authentication Policy for Managed SAP (MSAP)
    9.17. Open Authentication Model for DHCP and PPPoE Hosts
      9.17.1. Terminology
      9.17.2. LUDB and RADIUS Access Models
      9.17.3. No Authentication
      9.17.4. LUDB Only Access
      9.17.5. LUDB Access via DHCPv4 Server
      9.17.6. RADIUS Only Access
      9.17.7. Consecutive Access to LUDB and RADIUS
      9.17.8. RADIUS Fallback
    9.18. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
      9.18.1. Terminology
      9.18.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
      9.18.3. Default Gateway in IPv4 Flexible Addressing
      9.18.4. IPv4 Subnet Sharing
      9.18.5. IPv4 Subnet Mask Auto-Generation
      9.18.6. Local-proxy-arp and arp-populate
      9.18.7. Gi-address Configuration Consideration
      9.18.8. PPPoE Considerations
      9.18.9. IPoEv6 Considerations
      9.18.10. General Configuration Guidelines for Flexible IP Address Assignment
      9.18.11. Caveats
    9.19. uRPF for Subscriber Management
    9.20. IPoE Sessions
      9.20.1. Enabling IPoE Sessions
      9.20.2. IPoE Session Authentication
      9.20.3. IPoE Session Accounting
      9.20.4. IPoE Session Mid-Session Changes
      9.20.5. IPoE Session Termination
      9.20.6. Limiting the Number of IPoE Sessions
      9.20.7. SAP Session Index
      9.20.8. Resiliency
      9.20.9. Notes
      9.20.10. Configuration Steps
      9.20.11. IPoE Session Migration
        9.20.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
    9.21. Data-triggered Subscriber Management
      9.21.1. Provisioning Data-triggered ESM
      9.21.2. Authentication and Host Creation
      9.21.3. DoS Protection
      9.21.4. DHCP Promotion
      9.21.5. Data-Triggered SLAAC Hosts
      9.21.6. Stateful Multi-Chassis Redundancy (MCS)
      9.21.7. Stateless Multi-Chassis Redundancy
        9.21.7.1. MSAP Support
    9.22. RADIUS Subscriber Services
      9.22.1. Subscriber Service Building Blocks
        9.22.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
        9.22.1.2. RADIUS Python Interface
        9.22.1.3. Python Script
          9.22.1.3.1. Python Script Example
        9.22.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
      9.22.2. Subscriber Services RADIUS VSAs
      9.22.3. Subscriber Service RADIUS Accounting
      9.22.4. Accounting-Only Subscriber Service
      9.22.5. QoS Override-based Subscriber Service
      9.22.6. PCC Rule-based Subscriber Services
        9.22.6.1. PCC Rule Actions
        9.22.6.2. PCC Rule Instantiation
        9.22.6.3. PCC Rules in a Subscriber Service
        9.22.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
        9.22.6.5. PCC Rules on HSMDAv2
          9.22.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
        9.22.6.6. PCC Rule-based Subscriber Service Activation Failures
      9.22.7. Combined Subscriber Services
      9.22.8. Subscriber Services Python API
        9.22.8.1. Common Subscriber Services Python API
        9.22.8.2. Subscriber Service QoS Override Python API
        9.22.8.3. Subscriber Service PCC Rules Python API
      9.22.9. Operational Commands
        9.22.9.1. Show Commands
        9.22.9.2. Debug Commands
        9.22.9.3. Resource Monitoring
    9.23. Residential Gateway Replacement
    9.24. ESM Troubleshooting Show Command
    9.25. Subscriber Accumulated Statistics
    9.26. Hybrid Access
      9.26.1. BNG-based HAG
      9.26.2. PGW-based HAG
    9.27. Connection Bonding
      9.27.1. Setup
      9.27.2. Downstream Load-Balancing
      9.27.3. QoS
      9.27.4. Multicast
    9.28. Ethernet Satellites with Redundant Uplinks
      9.28.1. Single Host, Single Satellite
      9.28.2. Single Host Node, Dual Satellite
      9.28.3. QoS
      9.28.4. Preservation of Statistics and Accounting in ESM
    9.29. Multi-Chassis Synchronization of RADIUS Usage Counters
      9.29.1. Overview
      9.29.2. MCS Interval
      9.29.3. Usage Counters Synchronized
      9.29.4. Incomplete MCS Configuration
      9.29.5. Configuration Mismatch
      9.29.6. Switchover Scenarios
    9.30. Configuring Enhanced Subscriber Management with CLI
      9.30.1. Configuring RADIUS Authentication of DHCP Sessions
      9.30.2. TCP MSS adjustment for ESM Hosts
      9.30.3. Configuring Enhanced Subscriber Management
        9.30.3.1. Basic Configurations
        9.30.3.2. Subscriber Interface Configuration
        9.30.3.3. Configuring Enhanced Subscriber Management Entities
          9.30.3.3.1. Configuring a Subscriber Identification Policy
          9.30.3.3.2. Configuring a Subscriber Profile
          9.30.3.3.3. Configuring an SLA Profile
          9.30.3.3.4. Configuring Explicit Mapping Entries
        9.30.3.4. Routed CO with Basic Subscriber Management Features
        9.30.3.5. Applying the Profiles and Policies
          9.30.3.5.1. SLA Profile
      9.30.4. Configuring Dual Homing
    9.31. Subscriber Management Command Reference
      9.31.1. Command Hierarchies
        9.31.1.1. ANCP Commands
        9.31.1.2. Authentication Policy Commands
        9.31.1.3. BGP Peering Policy Commands
        9.31.1.4. Call Trace Commands
        9.31.1.5. Category Map and Credit Control Policy Commands
        9.31.1.6. Diameter Policy Commands
          9.31.1.6.1. AAA Diameter Peer Policy Commands
          9.31.1.6.2. Subscriber Management Diameter Application Policy Commands
          9.31.1.6.3. Diameter Base Commands
        9.31.1.7. Explicit Subscriber Mapping Commands
        9.31.1.8. Filter Commands
        9.31.1.9. GSMP Configuration Commands
        9.31.1.10. Host Lockout Commands
        9.31.1.11. Host Tracking Policy Commands
        9.31.1.12. IGMP Policy Commands
        9.31.1.13. Multi-Chassis Redundancy Commands
        9.31.1.14. PIM Policy Commands
        9.31.1.15. RADIUS Accounting Policy Commands
        9.31.1.16. RADIUS Route Download Commands
        9.31.1.17. Router Advertisement Commands
        9.31.1.18. SLA Profile Commands
        9.31.1.19. Subscriber Identification Policy Commands
        9.31.1.20. Auto-Generated Subscriber Identification Key Commands
        9.31.1.21. Auto-Generated Subscriber Identification Key Service Commands
        9.31.1.22. Subscriber MCAC Policy Commands
        9.31.1.23. Subscriber Profile Commands
        9.31.1.24. IPoE Session Policy Commands
        9.31.1.25. SHCV Policy Commands
        9.31.1.26. Subscriber Management Service Commands
          9.31.1.26.1. VPLS Subscriber Management Configuration Commands
          9.31.1.26.2. Managed SAP Policy Commands
          9.31.1.26.3. VPRN Subscriber Interface Commands
          9.31.1.26.4. VPRN Subscriber Group Interface Commands
          9.31.1.26.5. IES Subscriber Management Configuration Commands
          9.31.1.26.6. IES Subscriber Interface Commands
          9.31.1.26.7. IES Group Interface Commands
          9.31.1.26.8. Service Subscriber Interface, Group Interface IPoE Command
          9.31.1.26.9. RIP Commands
          9.31.1.26.10. VPort Commands
          9.31.1.26.11. Redundant Interface Commands
          9.31.1.26.12. Wireless Portal Protocol (WPP) Commands
          9.31.1.26.13. Multiple PPPoE Session QoS Commands
          9.31.1.26.14. Multicast Listener Discovery (MLD) Commands
          9.31.1.26.15. ETH-CFM Service Commands
        9.31.1.27. Show Commands
        9.31.1.28. Monitor Commands
        9.31.1.29. Clear Commands
        9.31.1.30. Debug Commands
        9.31.1.31. Tools Commands
      9.31.2. Triple Play Subscriber Management Configuration Commands
        9.31.2.1. Triple Play Subscriber Management Configuration Commands
          9.31.2.1.1. Generic Commands
          9.31.2.1.2. ANCP Commands
          9.31.2.1.3. Authentication Policy Commands
          9.31.2.1.4. BGP Peering Policy Commands
          9.31.2.1.5. Call Trace Commands
          9.31.2.1.6. Category Map Commands
          9.31.2.1.7. Diameter Policy Commands
          9.31.2.1.8. Diameter Base Commands
          9.31.2.1.9. Explicit Subscriber Mapping Commands
          9.31.2.1.10. GSMP Configuration Commands
          9.31.2.1.11. Host Lockout Commands
          9.31.2.1.12. IGMP Policy Commands
          9.31.2.1.13. Managed SAP Policy Commands
          9.31.2.1.14. Multicast Listener Discovery (MLD) Commands
          9.31.2.1.15. Multi-Chassis Redundancy Commands
          9.31.2.1.16. PIM Policy Commands
          9.31.2.1.17. RADIUS Accounting Policy Commands
          9.31.2.1.18. RADIUS Route Download Commands
          9.31.2.1.19. Redundant Interface Commands
          9.31.2.1.20. RIP Commands
          9.31.2.1.21. Router Advertisement Policy Commands
          9.31.2.1.22. SLA Profile Commands
          9.31.2.1.23. Subscriber Identification Policy Commands
          9.31.2.1.24. Subscriber Profile Commands
          9.31.2.1.25. Subscriber Management Service Commands
          9.31.2.1.26. Subscriber Management Service Commands
            9.31.2.1.1.1. Vport Commands
            9.31.2.1.2.1. IPoE Session Commands
            9.31.2.1.3.1. SHCV Policy Commands
            9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
            9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
            9.31.2.1.6.1. IPv6 Commands
            9.31.2.1.26.1. Show Commands
            9.31.2.2.26.1. Clear Commands
            9.31.2.3.26.1. Tools Commands
            9.31.2.4.26.1. Debug Commands
            9.31.2.5.26.1. Monitor Commands
            9.31.2.1.1. Vport Commands
            9.31.2.1.2. IPoE Session Commands
            9.31.2.1.3. SHCV Policy Commands
            9.31.2.1.4. Service DHCP and Anti-Spoof Filtering Commands
            9.31.2.1.5. Auto-Generated Subscriber Identification Key Commands
            9.31.2.1.6. IPv6 Commands
            9.31.2.1.26. Show Commands
            9.31.2.2.26. Clear Commands
            9.31.2.3.26. Tools Commands
            9.31.2.4.26. Debug Commands
            9.31.2.5.26. Monitor Commands
            9.31.2.1.1.1. Vport Commands
            9.31.2.1.2.1. IPoE Session Commands
            9.31.2.1.3.1. SHCV Policy Commands
            9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
            9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
            9.31.2.1.6.1. IPv6 Commands
            9.31.2.1.26.1. Show Commands
            9.31.2.2.26.1. Clear Commands
            9.31.2.3.26.1. Tools Commands
            9.31.2.4.26.1. Debug Commands
            9.31.2.5.26.1. Monitor Commands
          9.31.2.1.27. Vport Commands
          9.31.2.1.28. IPoE Session Commands
          9.31.2.1.29. SHCV Policy Commands
          9.31.2.1.30. Service DHCP and Anti-Spoof Filtering Commands
          9.31.2.1.31. Auto-Generated Subscriber Identification Key Commands
          9.31.2.1.32. IPv6 Commands
        9.31.2.2. Show Commands
        9.31.2.3. Clear Commands
        9.31.2.4. Tools Commands
        9.31.2.5. Debug Commands
        9.31.2.6. Monitor Commands
  10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
    10.1. Overview
      10.1.1. Terminology and Abbreviations
      10.1.2. Restrictions
    10.2. Deploying Oversubscribed Multi-Chassis Redundancy
      10.2.1. Resource Exhaustion Notification and Simultaneous Failures
      10.2.2. Resource Monitoring
      10.2.3. Warm-Standby Mode Of Operation
      10.2.4. IPoE vs PPPoE
      10.2.5. Persistency
      10.2.6. Routing and Redundant Interface in OMCR
      10.2.7. Revertive Behavior
      10.2.8. Service Restoration Times
      10.2.9. Processing of the SRRP Flaps
      10.2.10. Accounting
      10.2.11. Configuration Guidelines
      10.2.12. Troubleshooting Commands
    10.3. OMCR Command Reference
      10.3.1. Command Hierarchies
      10.3.2. OMCR Configuration Commands
        10.3.2.1. OMCR Configuration Commands
  11. ESM on High Scale QoS (HSQ) IOM
    11.1. Overview
      11.1.1. HSQ Traffic Manager Overview
        11.1.1.1. Shaping Hierarchy
        11.1.1.2. Scheduling
      11.1.2. HSQ and ESM SLA Modes
        11.1.2.1. ESM Single SLA Mode
        11.1.2.2. ESM Expanded SLA Mode
      11.1.3. Configuration Steps
      11.1.4. Deployment Considerations
  12. WIFI Aggregation and Offload
    12.1. WIFI Aggregation and Offload Overview
    12.2. Layer 2 over Soft-GRE Tunnels
      12.2.1. Encapsulation
      12.2.2. Data Path
      12.2.3. MDA-based Redundancy
    12.3. Tunnel Level Egress QoS
      12.3.1. QoS Overrides
      12.3.2. Operational Commands
    12.4. Authentication
      12.4.1. EAP-Based Authentication
        12.4.1.1. RADIUS Proxy
          12.4.1.1.1. RADIUS Proxy — Server Load-Balancing
          12.4.1.1.2. RADIUS Proxy — Cache Lookup
          12.4.1.1.3. RADIUS Proxy — Accounting
      12.4.2. Portal Authentication
      12.4.3. AA-based Portal Redirection
    12.5. Address Assignment
    12.6. WIFI Mobility Anchor
    12.7. Wholesale
    12.8. CGN on WLAN-GW
    12.9. Lawful Intercept on WLAN-GW
    12.10. WLAN Location Enhancements
      12.10.1. Triggered Interim Accounting-Updates
      12.10.2. Mobility Triggered Interim Updates with Counters
      12.10.3. Operational Support
    12.11. 3G/4G Interworking
      12.11.1. Signaling Call Flow
        12.11.1.1. GTP Setup with EAP Authentication
      12.11.2. Location Notification in S2a
        12.11.2.1. WLAN Location over S2a
        12.11.2.2. Cellular Location over S2a
        12.11.2.3. Cellular Location over Gn Interface
        12.11.2.4. Operational Support
    12.12. Migrant User Support
      12.12.1. Migrant User Support with Portal-Authentication
        12.12.1.1. DHCP
        12.12.1.2. Authentication and Forwarding
      12.12.2. Migrant User Support with EAP Authentication
      12.12.3. Data Triggered Subscriber Creation
    12.13. Distributed Subscriber Management (DSM)
      12.13.1. DHCP
      12.13.2. Authentication and Accounting
        12.13.2.1. DSM Data-Plane
      12.13.3. IP Filtering
        12.13.3.1. HTTP Redirect
      12.13.4. Policing
      12.13.5. Lawful Intercept (LI)
      12.13.6. Data-Triggered UE Creation
      12.13.7. Idle-Timeout and Session-Timeout Management
      12.13.8. Operational Commands
      12.13.9. Pool Manager
      12.13.10. DHCPv6 and SLAAC
      12.13.11. Application Assurance Support
    12.14. Call Trace
    12.15. Distributed RADIUS Proxy
      12.15.1. Enhanced Subscriber Management
      12.15.2. Distributed Subscriber Management
      12.15.3. VLAN Awareness
      12.15.4. Operational Commands
    12.16. WLAN-GW 1:1 Active-Backup Redundancy
      12.16.1. DHCP Server Redundancy
      12.16.2. Subscriber Creation after Switchover
    12.17. WLAN-GW Triggered Stateless Redundancy (N:1)
    12.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
    12.19. IPv6-only Access
      12.19.1. IPv6 GRE Tunnels
      12.19.2. IPv6 Client-Side RADIUS Proxy
      12.19.3. Dual-Stack UEs over WLAN-GW
        12.19.3.1. SLAAC Prefix Assignment
        12.19.3.2. DHCPv6 IA_NA Assignment
        12.19.3.3. Migrant User Support
        12.19.3.4. Accounting
    12.20. Layer 2 Wholesale
    12.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
    12.22. Soft-L2TPv3 Tunnels
    12.23. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
      12.23.1. Processing on the V-GW
      12.23.2. Processing on H-GW
      12.23.3. Idle Timeout Handling
      12.23.4. Distributed RADIUS Proxy for Closed SSID
      12.23.5. H-GW Redundancy
    12.24. ISA Operational Commands and Key Performance Indicators
      12.24.1. ISA Resources
      12.24.2. ISA Load
      12.24.3. Query-based UE and Tunnel States
      12.24.4. Packet Statistics
    12.25. WiFi Command Reference
      12.25.1. Command Hierarchies
        12.25.1.1. WLAN-GW Commands
        12.25.1.2. ISA Commands
        12.25.1.3. WLAN-GW Service Commands
        12.25.1.4. Data Plane Related Commands
        12.25.1.5. RADIUS Server and Proxy Commands
        12.25.1.6. LUDB Matching for RADIUS Proxy Cache
        12.25.1.7. Port Policy Commands
        12.25.1.8. WIFI Aggregation and Offload – Migrant User Support Commands
        12.25.1.9. Show Commands
        12.25.1.10. Debug Commands
        12.25.1.11. Tools Commands
        12.25.1.12. Clear Commands
      12.25.2. WIFI Aggregation and Offload Commands
        12.25.2.1. WIFI Aggregation and Offload Commands
          12.25.2.1.1. Generic Commands
          12.25.2.1.2. WLAN-GW Commands
          12.25.2.1.3. ISA Commands
          12.25.2.1.4. RADIUS Server Policy Commands
        12.25.2.2. CLI Command Description for RADIUS Server
        12.25.2.3. CLI Command Description for RADIUS Proxy Server
        12.25.2.4. LUDB Matching of RADIUS Proxy Cache Commands
        12.25.2.5. WLAN-GW-Group Commands
        12.25.2.6. Port Policy Commands
        12.25.2.7. WLAN-GW Group Interface Commands
        12.25.2.8. Migrant User Support Commands
          12.25.2.8.1. Show Commands
          12.25.2.8.2. Debug Commands
          12.25.2.8.3. Tools Commands
          12.25.2.8.4. Clear Commands
  13. GTP
    13.1. GTP Uplink
      13.1.1. Identification Attributes
      13.1.2. P-GW/GGSN Selection
      13.1.3. Configuration
      13.1.4. QoS Support
      13.1.5. GTP Session Hold
      13.1.6. Selective Breakout
      13.1.7. IPoE Support
      13.1.8. PPPoE Support
    13.2. GTP Access
      13.2.1. GTP Termination
        13.2.1.1. Multiple APNs
      13.2.2. GTP Session Setup
        13.2.2.1. Supported IP Stacks
      13.2.3. Mobility and Location Tracking
      13.2.4. QoS
      13.2.5. Multicast
    13.3. DHCP over GTP-u
      13.3.1. Address Management Related PCOs
      13.3.2. Address Allocation Modes
    13.4. GTP Peering
    13.5. GTP Command Reference
      13.5.1. Command Hierarchies
        13.5.1.1. GTP Commands
        13.5.1.2. GTP Service Commands
        13.5.1.3. Show Commands
        13.5.1.4. Clear Commands
        13.5.1.5. Debug Commands
      13.5.2. GTP Command Descriptions
        13.5.2.1. GTP Commands
          13.5.2.1.1. Generic Commands
          13.5.2.1.2. GTP Commands
          13.5.2.1.3. GTP Show Commands
          13.5.2.1.4. GTP Clear Commands
          13.5.2.1.5. GTP Debug Commands
  14. Virtual Residential Gateway
    14.1. Overview
      14.1.1. Access Modes
      14.1.2. Home Context on the vRGW
        14.1.2.1. Implicit Home Authentication
        14.1.2.2. Explicit Home Authentication
        14.1.2.3. Change of Configuration
        14.1.2.4. Home Lifetime
      14.1.3. Device Context on the vRGW
      14.1.4. Dynamic Configuration Changes
      14.1.5. Per-Home Pool Management and L2-Aware NAT
        14.1.5.1. Sticky IP Addresses
        14.1.5.2. Managed Static IPv4 Addresses
        14.1.5.3. DMZ
      14.1.6. IPv6
      14.1.7. QoS and Filter Support
      14.1.8. Data-Triggered Authentication
      14.1.9. Per-Host NAT Port Ranges
      14.1.10. Inter-Chassis Redundancy
        14.1.10.1. Pool State Synchronization
        14.1.10.2. Regular Group Interfaces
        14.1.10.3. WLAN-GW Group Interfaces
      14.1.11. BRG and vRG Caveats
      14.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
      14.1.13. PPPoE Client
        14.1.13.1. PPPoE Client Setup
        14.1.13.2. PPPoE Client Failure
        14.1.13.3. LCP Keepalive
        14.1.13.4. MRU/MTU
      14.1.14. SLAAC Prefix Replacement
    14.2. Home LAN Extension
      14.2.1. Overview
      14.2.2. Authentication and Authorization
      14.2.3. Data Plane Tables
      14.2.4. BGP EVPN VPLS
      14.2.5. Assistive Address Resolution
      14.2.6. MAC Address Translation
      14.2.7. Configuring HLE
      14.2.8. Traffic Handling
    14.3. AP Agnostic Access for Multiple Dwelling Units
      14.3.1. Overview
      14.3.2. Bridge Domain and BRG Identification
      14.3.3. ARP Handling
      14.3.4. Mobility
    14.4. Per-Host DNS Override
    14.5. vRGW and HLE Command Reference
      14.5.1. Command Hierarchies
        14.5.1.1.  Subscriber Management BRGW Profile Commands
        14.5.1.2. Subscriber Management Commands
        14.5.1.3. WLAN-GW Service Commands
        14.5.1.4. Service Commands
        14.5.1.5. Router HLE Commands
        14.5.1.6. Subscriber Management HLE Commands
        14.5.1.7. Show Commands
        14.5.1.8. Debug Commands
        14.5.1.9. Clear Commands
        14.5.1.10. Tools Commands
      14.5.2. Command Descriptions
        14.5.2.1. Generic Commands
        14.5.2.2. BRG Profile Commands
        14.5.2.3. Subscriber Management Commands
        14.5.2.4. WLAN-GW Service Commands
        14.5.2.5. Router Home LAN Extension Commands
        14.5.2.6. Subscriber Management Commands
        14.5.2.7. Service Commands
        14.5.2.8. Show Commands
        14.5.2.9. Debug Commands
        14.5.2.10. Clear Commands
        14.5.2.11. Tools Commands
  15. Service Chaining for ESM Hosts with L2-Aware NAT
    15.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
      15.1.1. Terminology
    15.2. VAS Filters on the ISA
      15.2.1. Matching
      15.2.2. Forwarding
      15.2.3. NSH Insertion
      15.2.4. Configuration
    15.3. EVPN Route Updates and Tracking
      15.3.1. NVE Bridging to SF
      15.3.2. NVE Routing to SF
    15.4. Data Path on the Subscriber Edge
      15.4.1. Upstream Traffic (Access to Network)
      15.4.2. Downstream Traffic — From Network
    15.5. Data Path on NVE
    15.6. Service Chaining for ESM Hosts with L2-Aware NAT
      15.6.1. Command Hierarchies
        15.6.1.1.  ISA Service Chaining Commands
        15.6.1.2. Show Commands
      15.6.2. Command Descriptions
        15.6.2.1. Generic Commands
        15.6.2.2. Service Chaining Commands
        15.6.2.3. Show Commands
  16. Dynamic Data Services
    16.1. Introduction to Dynamic Data Services
    16.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
    16.3. Data-Triggered Dynamic Data Services
      16.3.1. Data Trigger
      16.3.2. Dynamic Services Data Trigger Capture SAP
      16.3.3. RADIUS Authentication
      16.3.4. Local Authentication
      16.3.5. Data-Triggered Dynamic Service Provisioning
      16.3.6. Control Plane Protection
      16.3.7. Debugging
    16.4. Dynamic Data Services Python API
    16.5. RADIUS Triggered Dynamic Data Services Command Reference
      16.5.1. Command Hierarchies
        16.5.1.1. RADIUS Triggered Dynamic Data Services Commands
        16.5.1.2. Basic System Command
        16.5.1.3. Show Commands
        16.5.1.4. Clear Commands
        16.5.1.5. Debug Commands
        16.5.1.6. Tools Commands
      16.5.2. RADIUS Triggered Dynamic Data Services Commands
        16.5.2.1. Configuration Commands
        16.5.2.2. Basic System Command
        16.5.2.3. Show Commands
        16.5.2.4. Clear Commands
        16.5.2.5. Debug Commands
        16.5.2.6. Tools Commands
  17. Diameter and Diameter Applications
    17.1. Restrictions
    17.2. Terminology
    17.3. Diameter Base
      17.3.1. Diameter Base Protocol
      17.3.2. Diameter Peers and the Role of a Diameter Node in SR OS
      17.3.3. Capability Exchange
      17.3.4. Connection Termination
      17.3.5. Diameter Hosts and Realms
        17.3.5.1. Forwarding and Routing of Application Messages in Diameter
        17.3.5.2. Static Diameter Realm Routes
          17.3.5.2.1. Example with Static Realm Routes
          17.3.5.2.2. Default Peer
        17.3.5.3. Configuration of Host Names and Realms in SR OS
          17.3.5.3.1. New Base Configuration
          17.3.5.3.2. Legacy Configuration
      17.3.6. Dynamically Learned Parameters
      17.3.7. Diameter Routing Loop Avoidance
      17.3.8. Retransmissions and Message Timers
        17.3.8.1. Clearing the Destination-Host AVP in the Retransmitted Messages
        17.3.8.2. Retransmission Bit (T-Bit)
      17.3.9. Handling of Diameter_Unable_To_Deliver (3002) Error Message
      17.3.10. Response to Diameter_Too_Busy (3004) Error Message
      17.3.11. An SR as a Transit Diameter Node
      17.3.12. An SR as a Transit Diameter Node
      17.3.13. Python Support
    17.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
      17.4.1. Diameter Gy Out Of Credit Actions
        17.4.1.1. Graceful Service Termination
      17.4.2. Extended Failure Handling (EFH)
        17.4.2.1. Extended Failure Handling Example Call Flow
        17.4.2.2. Extended Failure Handling Triggers
        17.4.2.3. Assigning Interim Credit
        17.4.2.4. Enabling Extended Failure Handling
        17.4.2.5. Configuration Example 1 - Single Volume Interim Credit Value
        17.4.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
        17.4.2.7. Monitoring the Extended Failure Handling State
        17.4.2.8. Additional Call Flow Examples
          17.4.2.8.1. User Disconnects While EFH is Active
          17.4.2.8.2. The Maximum Number of Attempts is Reached
          17.4.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
      17.4.3. Gy CCR-t Replay
    17.5. Policy Management via Gx Interface
      17.5.1. Gx Protocol
      17.5.2. Policy Assignment Models
      17.5.3. IP-CAN Session – Gx Session Identification
        17.5.3.1. User Identification in PCRF
        17.5.3.2. NAS-Port-Id as Subscription-Id
      17.5.4. Gx Interface and ESM Subscriber Instantiation
        17.5.4.1. Gx and Dual-Stack Hosts
        17.5.4.2. Gx and PPPoEv6-DHCP
      17.5.5. Gx Fallback Function
      17.5.6. Gx CCR-I Replays
      17.5.7. Gx CCR-t Replays
        17.5.7.1. RAR and CCR-t Replay
        17.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
        17.5.7.3. CCR-t Replay And High Availability
      17.5.8. Automatic Updates for IP Address Allocation/De-allocation
      17.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
      17.5.10. Gx, ESM and AA
        17.5.10.1. ESM Subscriber-Host vs AA Subscriber
        17.5.10.2. AA Subscriber State
      17.5.11. Policy Management via Gx
      17.5.12. Gx-Based Overrides
        17.5.12.1. Instantiation of Gx Overrides
        17.5.12.2. HTTP Redirect Override
        17.5.12.3. Removal of Overrides
        17.5.12.4. Examples of Gx Overrides
      17.5.13. PCC Rules
        17.5.13.1. PCC Rule Concept
        17.5.13.2. PCC Rule Instantiation
        17.5.13.3. Base QoS-Policy and Base Filter
        17.5.13.4. Generic Policy Sharing and Rule Sharing
        17.5.13.5. PCC Rule Name and PCC Rule Removal
        17.5.13.6. Gx Rule Ordering
        17.5.13.7. PCC Rule Override
        17.5.13.8. Aggregation of IP-Criterion
        17.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
        17.5.13.10. Gx Rules with Multiple Actions and Action Sharing
        17.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
        17.5.13.12. RADIUS and Gx Interaction
        17.5.13.13. Bulk Changes via CLI while Gx Rules are Active
        17.5.13.14. PCC Rule Direction
        17.5.13.15. Action
        17.5.13.16. Rate-Limiting Action (Ingress, Egress)
          17.5.13.16.1. Dynamic Policers and Queue Mappings
          17.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
        17.5.13.17. Forwarding-Class Change (Ingress, Egress)
        17.5.13.18. QoS Forward (Ingress and Egress)
        17.5.13.19. Next Hop Redirect (Ingress)
        17.5.13.20. HTTP Redirect (Ingress)
        17.5.13.21. Filter Forward/Drop (Ingress and Egress)
        17.5.13.22. Service Gating Function
        17.5.13.23. PCC Rule Provisioning Example
        17.5.13.24. Operational Aspects
        17.5.13.25. PCC Rules and Capacity Planning
        17.5.13.26. PCC Rule Scaling Example
      17.5.14. NAS Filter Inserts
        17.5.14.1. Examples of NAS Entry Inserts
      17.5.15. Error Handing and Rule Failure Reporting in ESM
        17.5.15.1. AVP Decoding Failure in Gx
        17.5.15.2. ESM Rule-Installation Failure
        17.5.15.3. Failure Reporting in AA
        17.5.15.4. Summary of Failure Reporting
      17.5.16. Usage-Monitoring and Reporting
        17.5.16.1. ESM Usage-Monitoring - What is Being Monitored
        17.5.16.2. AA Usage-Monitoring – What is Being Monitored
        17.5.16.3. Requesting Usage-Monitoring in ESM
        17.5.16.4. Reporting Accumulated Usage
        17.5.16.5. Disabling Usage-Monitoring
        17.5.16.6. Usage-Monitoring for PCC Rules
        17.5.16.7. Session Termination
        17.5.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
        17.5.16.9. Usage-Monitoring Examples
      17.5.17. Event Triggers
      17.5.18. Subscriber Verification
      17.5.19. Subscriber Termination
      17.5.20. Mobility Support in WiFi
        17.5.20.1. Redundancy
      17.5.21. Persistency and Origin-State-ID AVP
      17.5.22. Overload Protection
    17.6. Supported-Features AVP in Gx
      17.6.1. Extended Bandwidth 5G New Radio Feature
      17.6.2. Transmission of Extended Bandwidth AVPs During Gx Session Initiation
      17.6.3. Processing the Extended Bandwidth AVPs
    17.7. Diameter NASREQ Application
      17.7.1. Sample Configuration Steps
    17.8. Diameter Redundancy
      17.8.1. Diameter Peer and Server Failover
        17.8.1.1. Diameter Peer Failover
        17.8.1.2. Diameter Sever Failover
      17.8.2. Diameter Multi-Chassis Redundancy
        17.8.2.1. Single Diameter Identity (DI) per a Pair of Redundant Diameter Nodes
        17.8.2.2. Single Peering Connection per Redundant Pair
        17.8.2.3. Inter-Peering Connection
        17.8.2.4. Inter-Peer as a Default Peer
        17.8.2.5. Handling RARs
        17.8.2.6. Handling of the Route-Record AVP
        17.8.2.7. SRRP Switchover
        17.8.2.8. Unsupported Failures
        17.8.2.9. Peer Preference in Multi-Chassis Setup
      17.8.3. Gx Usage Monitoring in Dual-Homed Systems
        17.8.3.1. Synchronization Frequency
        17.8.3.2. Switchover Triggered Synchronization
        17.8.3.3. What is Being Synchronized
        17.8.3.4. Loss of Inter-Chassis Link
        17.8.3.5. Master-to-Master SRRP Scenario
        17.8.3.6. Usage Counter Collection With No Credit Grants Received
        17.8.3.7. ISSU
    17.9. Diameter Debugging
  18. Python Script Support for ESM
    18.1. Python Script Support for ESM
    18.2. Python in SR OS Overview
      18.2.1. Python Policy – GTPv1-C API
      18.2.2. Python Policy – GTPv2-C API
      18.2.3. Python Changes
    18.3. Python Support in sub-ident-policy
      18.3.1. Configuration
      18.3.2. Operator Debugging
      18.3.3. Python Scripts
      18.3.4. Sample Python Scripts
        18.3.4.1. Example
        18.3.4.2. Example
        18.3.4.3. Example
      18.3.5. Limitations
    18.4. RADIUS Script Policy Overview
      18.4.1. Python RADIUS API
      18.4.2. Sample Script
    18.5. Python Policy Overview
      18.5.1. Python Policy – RADIUS API
      18.5.2. Python Policy – DHCPv4 API
      18.5.3. Python Policy – DHCPv6 API
      18.5.4. Python Policy – Diameter API
      18.5.5. Python Policy – DHCP Transaction Cache API
      18.5.6. Python for PPPoE API
      18.5.7. Python API for PPP Packet
      18.5.8. Python API for PPP PAP
      18.5.9. Python API for PPP CHAP
      18.5.10. Python ESM API
      18.5.11. Python Cache Support
      18.5.12. Applying a Python Policy
      18.5.13. Python Script Protection
    18.6. Tips and Tricks
    18.7. Python Command Reference
      18.7.1. Command Hierarchies
        18.7.1.1. Python Policy Commands
        18.7.1.2. Python Script Commands
        18.7.1.3. Services Commands
        18.7.1.4. Show Commands
        18.7.1.5. Tools Commands
        18.7.1.6. Debug Commands
        18.7.1.7. Clear Commands
      18.7.2. Command Descriptions
        18.7.2.1. Python Configuration Commands
          18.7.2.1.1. Global Commands
          18.7.2.1.2. Python Policy Commands
          18.7.2.1.3. Python Script Commands
          18.7.2.1.4. Services Commands
          18.7.2.1.5. Tools Commands
        18.7.2.2. Show Commands
        18.7.2.3. Debug Commands
        18.7.2.4. Clear Commands
    18.8. Python RADIUS Command Reference
      18.8.1. Command Hierarchies
      18.8.2. Command Descriptions
        18.8.2.1. Generic Commands
        18.8.2.2. Script Commands
  19. S-VLAN Statistics Collection
    19.1. Overview
      19.1.1. Statistics Retention
        19.1.1.1. MIBs
      19.1.2. Enabling S-VLAN Statistics Collection
    19.2. S-VLAN Status Collection Command Reference
      19.2.1. Command Hierarchies
        19.2.1.1. S-VLAN Status Collection Commands
        19.2.1.2. S-VLAN Status Collection Show Commands
        19.2.1.3. S-VLAN Clear Commands
      19.2.2. GTP Command Descriptions
        19.2.2.1. GTP Commands
          19.2.2.1.1. Generic Commands
          19.2.2.1.2. S-VLAN Statistics Collection Commands
          19.2.2.1.3. S-VLAN Statistics Collection Show Commands
          19.2.2.1.4. S-VLAN Statistics Collection Clear Commands
  20. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia SR OS Services Configuration Process
  2. Introduction to Triple Play
    2.1. Nokia’s Triple Play Service Delivery Architecture
      2.1.1. Introduction to Triple Play
      2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
      2.1.3. Architectural Foundations
      2.1.4. Optimizing Triple Play Service Infrastructures
        2.1.4.1. Distributed Service Edges
        2.1.4.2. Service Differentiation, QoS Enablement
        2.1.4.3. Virtual MAC Subnetting for VPLS
    2.2. Services
      2.2.1. Service Types
      2.2.2. Service Policies
    2.3. Nokia Service Model
      2.3.1. Introduction
      2.3.2. Service Entities
      2.3.3. Customers
      2.3.4. Service Access Points (SAPs)
        2.3.4.1. SAP Encapsulation Types and Identifiers
        2.3.4.2. Ethernet Encapsulations
        2.3.4.3. SAP Considerations
      2.3.5. Service Distribution Points (SDPs)
        2.3.5.1. SDP Binding
        2.3.5.2. Spoke and Mesh SDPs
        2.3.5.3. SDP Encapsulation Types
          2.3.5.3.1. GRE
          2.3.5.3.2. MPLS
        2.3.5.4. SDP Keepalives
    2.4. Epipe Service Overview
    2.5. VPLS Service Overview
      2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
        2.5.1.1. Residential Split Horizon Groups
    2.6. IES Service Overview
      2.6.1. IP Interface
    2.7. VPRN Service Overview
    2.8. Deploying and Provisioning Services
      2.8.1. Phase 1: Core Network Construction
      2.8.2. Phase 2: Service Administration
      2.8.3. Phase 3: Service Provisioning
    2.9. Configuration Notes
      2.9.1. General
    2.10. Configuring Triple Play Services with CLI
      2.10.1. Configuring VPLS Residential Split Horizon Groups
        2.10.1.1. Configuring Static Hosts
          2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
          2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
          2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
          2.10.1.1.4. Configuring Static Hosts on an IES SAP
          2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
    2.11. Triple Play Services Command Reference
      2.11.1. Command Hierarchies
        2.11.1.1. IES/VPRN Triple Play Commands
        2.11.1.2. VPLS Triple Play Commands
        2.11.1.3. Show Commands
        2.11.1.4. Clear Commands
        2.11.1.5. Debug Commands
        2.11.1.6. Tools Commands
      2.11.2. Command Descriptions
        2.11.2.1. Global Commands
        2.11.2.2. IES/VPRN Service Commands
          2.11.2.2.1. VPLS Triple Play Commands
          2.11.2.2.2. Service DHCP and Anti-Spoof Filtering Commands
          2.11.2.2.3. Interface IPv6 Commands
        2.11.2.3. Show Commands
          2.11.2.3.1. IGMP Snooping Show Commands
        2.11.2.4. Clear Commands
        2.11.2.5. Debug Commands
        2.11.2.6. Tools Commands
  3. DHCP Management
    3.1. DHCP Principles
    3.2. DHCP Features
      3.2.1. DHCP Relay
      3.2.2. DHCPv4 Relay Proxy
      3.2.3. DHCPv4 Relay Lease Split
      3.2.4. Subscriber Identification Using Option 82 Field
        3.2.4.1. Trusted and Untrusted
      3.2.5. DHCP Snooping
      3.2.6. DHCP Lease State Table
      3.2.7. DHCP and Layer 3 Aggregation
        3.2.7.1. DHCPv4 Snooping
        3.2.7.2. DHCPv6 Snooping
      3.2.8. Local DHCP Servers
        3.2.8.1. Overview
        3.2.8.2. Local DHCP Server Support
      3.2.9. DHCPv6
        3.2.9.1. DHCPv6 Relay Agent
        3.2.9.2. DHCPv6 Prefix Options
        3.2.9.3. Neighbor Resolution With DHCPv6 Relay
        3.2.9.4. DHCPv6 Lease Persistency
        3.2.9.5. Local Proxy Neighbor Discovery
        3.2.9.6. IPv6oE Hosts Behind Bridged CPEs
        3.2.9.7. IPv6 Link-Address Based Pool Selection
        3.2.9.8. IPv6 Address and Prefix Stickiness
        3.2.9.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
        3.2.9.10. Host Connectivity Checks for IPv6
      3.2.10. Lease Query
      3.2.11. DHCPv6 to Server Option
      3.2.12. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
      3.2.13. DHCP Caching
      3.2.14. Flexible Creation of DHCPv4/6 Host Parameters
      3.2.15. Python DTC Variables and API
        3.2.15.1. DTC Debugging Facility
      3.2.16. Virtual Subnet for DHCPv4 Hosts
      3.2.17. Address Reservation for Sticky Leases
      3.2.18. DHCP Message Processing Overload Protection
    3.3. Proxy DHCP Server
      3.3.1. Local DHCP Servers
        3.3.1.1. Terminology
        3.3.1.2. Overview
        3.3.1.3. DHCP Lease Synchronization
        3.3.1.4. Intercommunication Link Failure Detection
        3.3.1.5. DHCP Server Failover States
        3.3.1.6. Lease Time Synchronization
        3.3.1.7. Maximum Client Lead Time (MCLT)
        3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
        3.3.1.9. Fast-Switchover of IP Address and Prefix Delegation
          3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
    3.4. Local Address Assignment
      3.4.1. Stateless Address Auto-Configuration
    3.5. Configuring DHCP with CLI
      3.5.1. Enabling DHCP Snooping
      3.5.2. Configuring Local User Database Parameters
      3.5.3. Configuring Option 82 Handling
      3.5.4. Enabling DHCP Relay
    3.6. Triple Play DHCP Command Reference
      3.6.1. Command Hierarchies
        3.6.1.1. DHCP Filter Commands
          3.6.1.1.1. DHCP Filter Commands
          3.6.1.1.2. DHCP6 Filter Commands
        3.6.1.2. Router Local DHCP Server Commands
        3.6.1.3. Router Local DHCP6 Server Commands
        3.6.1.4. Subscriber Management Commands
          3.6.1.4.1. IPoE Commands
          3.6.1.4.2. PPP Commands
          3.6.1.4.3. MSAP Policy Commands
        3.6.1.5. Service DHCP Commands
          3.6.1.5.1. VPRN Local DHCP Server Commands
          3.6.1.5.2. VPRN Local DHCP6 Server Commands
          3.6.1.5.3. VPLS DHCP Commands
          3.6.1.5.4. Anti-Spoof Filtering Commands
        3.6.1.6.  System DHCP Commands
        3.6.1.7. Show Commands
        3.6.1.8. Clear Commands
        3.6.1.9. Debug Commands
        3.6.1.10. Tools Commands
      3.6.2. Command Descriptions
        3.6.2.1. Triple Play DHCP Configuration Commands
          3.6.2.1.1. Global Commands
          3.6.2.1.2. DHCP Filter Commands
          3.6.2.1.3. Subscriber Management Local User Database Commands
          3.6.2.1.4. Managed SAP Policy Commands
          3.6.2.1.5. Local DHCP Server Commands
          3.6.2.1.6. Local DHCP6 Server Commands
          3.6.2.1.7. DHCP Service Commands
          3.6.2.1.8. System DHCP Commands
          3.6.2.1.9. Show Commands
          3.6.2.1.10. Clear Commands
          3.6.2.1.11. Debug Commands
          3.6.2.1.12. Tools Commands
  4. Stateless Address Auto-configuration (SLAAC)
    4.1. SLAAC Management Principles
    4.2. Configuration Overview
    4.3. Router-Solicit Trigger
    4.4. SLAAC Address Assignment
    4.5. Static SLAAC Prefix Assignment
    4.6. Dynamic SLAAC Prefix Assignment
    4.7. SLAAC Prefix Replacement
  5. Point-to-Point Protocol over Ethernet Management
    5.1. PPPoE
      5.1.1. PPPoE Authentication and Authorization
        5.1.1.1. General Flow
        5.1.1.2. RADIUS
        5.1.1.3. Local User Database Directly Assigned to PPPoE Node
        5.1.1.4. Subscriber per PPPoE Session Index
        5.1.1.5. Local DHCP Server with Local User Database
      5.1.2. PPPoE Session ID Allocation
      5.1.3. Multiple Sessions Per MAC Address
      5.1.4. Session Limit Per Circuit ID
      5.1.5. PPP Session Re-establishment
      5.1.6. Private Retail Subnets
      5.1.7. IPCP Subnet Negotiation
        5.1.7.1. Numbered WAN Support for Layer 3 RGs
      5.1.8. IES as Retail Service for PPPoE Host
      5.1.9. Unnumbered PPPoE
      5.1.10. Selective Backhaul of PPPoE Traffic using an Epipe Service
    5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      5.2.1. Terminology
      5.2.2. LNS MLPPPoX
      5.2.3. MLPPP Encapsulation
      5.2.4. MLPPPoX Negotiation
      5.2.5. Enabling MLPPPoX
      5.2.6. Link Fragmentation and Interleaving (LFI)
        5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      5.2.7. LFI Functionality Implemented in LNS
        5.2.7.1. Last Mile QoS Awareness in the LNS
        5.2.7.2. BB-ISA Processing
        5.2.7.3. LNS-LAC Link
        5.2.7.4. AN-RG Link
        5.2.7.5. Home Link
        5.2.7.6. Optimum Fragment Size Calculation by LNS
          5.2.7.6.1. Encapsulation Based Fragment Size
          5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
          5.2.7.6.3. Selection of the Optimum Fragment Length
      5.2.8. Upstream Traffic Considerations
      5.2.9. Multiple Links MLPPPoX With No Interleaving
      5.2.10. MLPPPoX Session Support
      5.2.11. Session Load Balancing Across Multiple BB-ISAs
      5.2.12. BB-ISA Hashing Considerations
      5.2.13. Last Mile Rate and Encapsulation Parameters
      5.2.14. Link Failure Detection
      5.2.15. CoA Support
      5.2.16. Accounting
      5.2.17. Filters and Mirroring
      5.2.18. PTA Considerations
      5.2.19. QoS Considerations
        5.2.19.1. Dual-Pass
        5.2.19.2. Traffic Prioritization in LFI
        5.2.19.3. Shaping Based on the Last Mile Wire Rates
        5.2.19.4. Downstream Bandwidth Management on Egress Port
      5.2.20. Sub/Sla-Profile Considerations
      5.2.21. Example of MLPPPoX Session Setup Flow
      5.2.22. Other Considerations
    5.3. Configuration Notes
    5.4. PPP Command Reference
      5.4.1. Command Hierarchies
        5.4.1.1. PPPoE Policy Configuration Commands
        5.4.1.2. PPPoE Service Commands
        5.4.1.3. PPPoE Local User Database Commands
        5.4.1.4. MLPPP on LNS Commands
        5.4.1.5. Show Commands
      5.4.2. Command Descriptions
        5.4.2.1. Generic Commands
          5.4.2.1.1. Subscriber Management Commands
          5.4.2.1.2. MLPPP on LNS Commands
          5.4.2.1.3. PPP/PPPoE Service Commands
          5.4.2.1.4. RADIUS Attribute Commands
        5.4.2.2. Service Commands
        5.4.2.3. Show Commands
        5.4.2.4. Clear Commands
        5.4.2.5. Debug Commands
  6. Layer 2 Tunneling Protocol (L2TP)
    6.1. Terminology
    6.2. L2TP Overview
      6.2.1. LAC DF Bit
      6.2.2. Handling L2TP Tunnel/Session Initialization Failures
        6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
        6.2.2.2. Peer Blacklist
        6.2.2.3. Tunnel Blacklists
          6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
        6.2.2.4. Tunnel Selection Mechanism
        6.2.2.5. Tunnel Probing
        6.2.2.6. Controlling the Size of Blacklist
        6.2.2.7. Displaying the Content of a Blacklist
        6.2.2.8. Generating Trap when the Blacklist is Full
        6.2.2.9. Premature Removal of Blacklisted Entries
        6.2.2.10. Manual Purging of Entities within the Blacklist
      6.2.3. CDN Result Code Overwrite
      6.2.4. LNS Proxy
    6.3. L2TP LAC VPRN
      6.3.1. Per-ISP Egress L2TP DSCP Reclassification
    6.4. Traffic Steering on L2TP LAC
      6.4.1. Steering Activation and Deactivation
      6.4.2. Steering States
      6.4.3. Configuring Traffic Steering on L2TP LAC
    6.5. L2TP Tunnel RADIUS Accounting
      6.5.1. Accounting Packets List
      6.5.2. RADIUS Attributes Value Considerations
    6.6. MLPPP on the LNS Side
    6.7. LNS Reassembly
    6.8. LNS Subscriber Policers
      6.8.1. Policer Support
    6.9. L2TP Command Reference
      6.9.1. Command Hierarchies
        6.9.1.1. L2TP Configuration Commands
          6.9.1.1.1. Router Commands
          6.9.1.1.2. Redundancy Commands
          6.9.1.1.3. Service Commands
          6.9.1.1.4. System Commands
        6.9.1.2. Steering Profile Commands
        6.9.1.3. L2TP Tunnel RADIUS Accounting Commands
        6.9.1.4. Show Commands
        6.9.1.5. Clear Commands
        6.9.1.6. Debug Commands
        6.9.1.7. Tools Commands
      6.9.2. Command Descriptions
        6.9.2.1. L2TP Configuration Commands
          6.9.2.1.1. Global Commands
          6.9.2.1.2. L2TP Commands
        6.9.2.2. Steering Profile Commands
        6.9.2.3. L2TP Tunnel RADIUS Accounting Commands
        6.9.2.4. Show Commands
        6.9.2.5. Clear Commands
        6.9.2.6. Debug Commands
        6.9.2.7. Tools Commands
  7. Triple Play Security
    7.1. Triple Play Security Features
      7.1.1. Anti-Spoofing Filters
        7.1.1.1. Anti-spoofing Filter Types
        7.1.1.2. Filtering Packets
      7.1.2. Layer 2 Triple Play Security Features
        7.1.2.1. MAC Pinning
        7.1.2.2. MAC Protection
        7.1.2.3. DoS Protection
          7.1.2.3.1. Subscriber Aggregation Network
          7.1.2.3.2. Network Control Filtering
        7.1.2.4. VPLS Redirect Policy
      7.1.3. ARP Handling
        7.1.3.1. ARP Reply Agent
        7.1.3.2. Dynamic ARP Table Population
        7.1.3.3. Local Proxy ARP
      7.1.4. Web Portal Redirect
    7.2. Configuring Triple Play Security with CLI
      7.2.1. Common Configuration Tasks
        7.2.1.1. Configuring Anti-Spoofing Filters
        7.2.1.2. Configuring Triple Play Security Features
          7.2.1.2.1. Configuring MAC Pinning
          7.2.1.2.2. Configuring MAC Protection
          7.2.1.2.3. Configuring VPLS Redirect Policy
        7.2.1.3. Configuring ARP Handling
          7.2.1.3.1. Configuring Proxy ARP
          7.2.1.3.2. Configuring Local Proxy ARP
          7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
          7.2.1.3.4. Configuring Remote Proxy ARP
          7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
          7.2.1.3.6. Configuring CPU Protection
        7.2.1.4. Configuring Web Portal Redirect
    7.3. Triple Play Security Command Reference
      7.3.1. Command Hierarchies
        7.3.1.1. Anti-Spoofing Commands
        7.3.1.2. Layer 2 Security Commands
        7.3.1.3. ARP Handling Commands
        7.3.1.4. Show Commands
        7.3.1.5. Tools Commands
      7.3.2. Command Descriptions
        7.3.2.1. Triple Play Security Configuration Commands
          7.3.2.1.1. Triple Play Anti-Spoofing Commands
          7.3.2.1.2. Triple Play Layer 2 Security Commands
          7.3.2.1.3. ARP Handling Commands
        7.3.2.2. Show Commands
        7.3.2.3. Tools Commands
  8. Triple Play Multicast
    8.1. Introduction to Multicast
    8.2. Multicast in the Broadband Service Router
      8.2.1. Internet Group Management Protocol
        8.2.1.1. IGMP Versions and Interoperability Requirements
        8.2.1.2. IGMP Version Transition
      8.2.2. Multicast Listener Discovery
        8.2.2.1. MLD Versions and Interoperability Requirements
        8.2.2.2. Source Specific Multicast Groups
      8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
      8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
    8.3. Multicast in the BSA
      8.3.1. IGMP Snooping
        8.3.1.1. IGMP/MLD Message Processing
        8.3.1.2. IGMP Message Processing
        8.3.1.3. MLD Message Processing
        8.3.1.4. IGMP/MLD Filtering
      8.3.2. Multicast VPLS Registration (MVR)
      8.3.3. Layer 3 Multicast Load Balancing
      8.3.4. IGMP State Reporter
        8.3.4.1. IGMP Data Records
        8.3.4.2. Transport Mechanism
        8.3.4.3. HA Compliance
        8.3.4.4. QoS Awareness
        8.3.4.5. IGMP Reporting Caveats
    8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
      8.4.1. Multicast Over IPoE
        8.4.1.1. Per SAP Replication Mode
          8.4.1.1.1. Per SAP Queue
          8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
          8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
        8.4.1.2. Per Subscriber Host Replication Mode
          8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
      8.4.2. Multicast Over PPPoE
      8.4.3. IGMP Flooding Containment
      8.4.4. IGMP/MLD Timers
      8.4.5. IGMP/MLD Query Intervals
      8.4.6. HQoS Adjustment
        8.4.6.1. Host Tracking (HT) Considerations
        8.4.6.2. HQoS Adjust Per Vport
          8.4.6.2.1. Multi-Chassis Redundancy
          8.4.6.2.2. Scalability Considerations
      8.4.7. Redirection
      8.4.8. Hierarchical Multicast CAC (H-MCAC)
        8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
      8.4.9. Determining MCAC Policy in Effect
      8.4.10. Multicast Filtering
      8.4.11. Joining the Multicast Tree
      8.4.12. Wholesale/Retail Requirements
      8.4.13. QoS Considerations
      8.4.14. Redundancy Considerations
        8.4.14.1. Redirection Considerations
      8.4.15. Query Intervals for Multicast
        8.4.15.1. ESM Host-based Queries
        8.4.15.2. Group Interface-based Queries
    8.5. Configuring Triple Play Multicast Services with CLI
      8.5.1. Configuring IGMP Snooping in the BSA
        8.5.1.1. Enabling IGMP Snooping in a VPLS Service
        8.5.1.2. IGMPv3 Multicast Routers
        8.5.1.3. With IGMPv1/2 Multicast Routers
        8.5.1.4. Modifying IGMP Snooping Parameters
        8.5.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
      8.5.2. Configuring Static Multicast Groups on a SAP or SDP
        8.5.2.1. Enabling IGMP Group Membership Report Filtering
          8.5.2.1.1. Enabling IGMP Traffic Filtering
      8.5.3. Configuring Multicast VPLS Registration (MVR)
      8.5.4. Configuring IGMP, MLD, and PIM in the BSR
        8.5.4.1. Enabling IGMP
        8.5.4.2. Configuring IGMP Interface Parameters
        8.5.4.3. Configuring Static Parameters
        8.5.4.4. Configuring SSM Translation
        8.5.4.5. Enabling MLD
        8.5.4.6. Configuring MLD Interface Parameters
        8.5.4.7. Configuring Static Parameters
        8.5.4.8. Configuring SSM Translation
        8.5.4.9. Configuring PIM
          8.5.4.9.1. Enabling PIM
          8.5.4.9.2. Configuring PIM Interface Parameters
          8.5.4.9.3. Importing PIM Join/Register Policies
          8.5.4.9.4. Configuring PIM Join/Register Policies
        8.5.4.10. Configuring Bootstrap Message Import and Export Policies
    8.6. Triple Play Multicast Command Reference
      8.6.1. Command Hierarchies
        8.6.1.1. Multicast Management Commands
        8.6.1.2. Multicast Info Policy Bundle Commands
        8.6.1.3. Multicast Service Commands
        8.6.1.4. Ingress Multicast Path Management Commands
        8.6.1.5. Multicast Redirection
        8.6.1.6. Multicast Query Timer Commands
        8.6.1.7. Show Commands
        8.6.1.8. Debug Commands
      8.6.2. Command Descriptions
        8.6.2.1. Multicast Management Configuration Commands
          8.6.2.1.1. Generic Commands
          8.6.2.1.2. Multicast Management Commands
          8.6.2.1.3. Bandwidth Policy Commands
          8.6.2.1.4. Multicast Info Policy Commands
          8.6.2.1.5. Service Commands
          8.6.2.1.6. VPLS Multicast Commands
          8.6.2.1.7. Chassis Level Commands
          8.6.2.1.8. Multicast Redirection Commands
          8.6.2.1.9. Multicast Query Timer Commands
          8.6.2.1.10. Forwarding Plane Commands
        8.6.2.2. Show Commands
        8.6.2.3. Debug Commands
  9. Triple Play Enhanced Subscriber Management
    9.1. Uniform RADIUS Server Configuration
      9.1.1. RADIUS Server Configuration
        9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
        9.1.1.2. Legacy RADIUS Server Configuration
    9.2. RADIUS Authentication of Subscriber Sessions
      9.2.1. RADIUS Authentication Extensions
        9.2.1.1. Triple Play Network with RADIUS Authentication
      9.2.2. RADIUS Authorization Extensions
        9.2.2.1. Calling-Station-ID
        9.2.2.2. Subscriber Session Timeout
          9.2.2.2.1. Domain Name in Authentication
        9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
        9.2.2.4. SHCV Policy
      9.2.3. radius-server-policy Retry Attempt Overview
      9.2.4. AAA RADIUS Server Operation Status
      9.2.5. AAA RADIUS Accounting Server Stickiness
      9.2.6. AAA RADIUS Authentication Fallback Action
      9.2.7. AAA Test User Account
      9.2.8. Troubleshooting the RADIUS Server
      9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
        9.2.9.1. Provisioning IP Configuration of the Host
        9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
        9.2.9.3. Change of Authorization and Disconnect-Request
          9.2.9.3.1. Change of Authorization using the Tools Command
        9.2.9.4. RADIUS-Based Accounting
        9.2.9.5. RADIUS Accounting Terminating Cause
        9.2.9.6. Accounting Modes Of Operation
        9.2.9.7. Per Session Accounting
        9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
        9.2.9.9. No Host-Accounting
        9.2.9.10. Host-Accounting Enabled
        9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
        9.2.9.12. Accounting Interim Update Message Interval
        9.2.9.13. CoA Triggered Accounting Interim Update
        9.2.9.14. Class Attribute
        9.2.9.15. User Name
        9.2.9.16. Accounting-On and Accounting Off
        9.2.9.17. RADIUS Accounting Message Buffering
        9.2.9.18. Multiple Accounting Policies
        9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
    9.3. Enhanced Subscriber Management Overview
      9.3.1. Enhanced Subscriber Management Basics
        9.3.1.1. Standard and Enhanced Subscriber Management
          9.3.1.1.1. Subscriber Management Definitions
          9.3.1.1.2. Subscriber Identification Policy
          9.3.1.1.3. Subscriber Identification String
          9.3.1.1.4. Subscriber Profile
          9.3.1.1.5. SLA Profile
          9.3.1.1.6. Explicit Subscriber Profile Mapping
      9.3.2. ESM for IPv6
        9.3.2.1. Models
          9.3.2.1.1. PPPoE Host
          9.3.2.1.2. PPPoE RG
          9.3.2.1.3. IPoE Host/RG
        9.3.2.2. Setup
        9.3.2.3. 64-bit and 128-bit WAN Mode
          9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
        9.3.2.4. Behavior
          9.3.2.4.1. Dual Stack
          9.3.2.4.2. Router Advertisements (RA)
          9.3.2.4.3. CoA and Disconnect-Request
        9.3.2.5. Delegated-Prefix-Length
          9.3.2.5.1. Order of Preference for DPL
          9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
        9.3.2.6. DHCPv6 Relay Agent
          9.3.2.6.1. Configuring a DHCPv6 Relay Agent
        9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
        9.3.2.8. DHCPv6 Local Server
      9.3.3. Dynamic Subscriber Host Processing
        9.3.3.1. Dynamic Tables
          9.3.3.1.1. Active Subscriber Table
          9.3.3.1.2. SLA Profile Instance Table
          9.3.3.1.3. Subscriber Host Table
          9.3.3.1.4. DHCP Lease State Table
      9.3.4. Enhanced Subscriber Management Entities
        9.3.4.1. Instantiating a New Host
        9.3.4.2. Packet Processing for an Existing Host
      9.3.5. ESM Host Lockout
        9.3.5.1. Functionality
      9.3.6. ANCP and GSMP
        9.3.6.1. ANCP
          9.3.6.1.1. Static ANCP Management
          9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
          9.3.6.1.3. ANCP String
          9.3.6.1.4. ANCP Persistency Support
        9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
        9.3.6.3. DHCP Release Messages
          9.3.6.3.1. DHCP Release
        9.3.6.4. DHCP Client Mobility
        9.3.6.5. DHCP Lease Control
      9.3.7. Using Scripts for Dynamic Recognition of Subscribers
        9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
        9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
        9.3.7.3. Determining the Subscriber Profile
        9.3.7.4. Determining the SLA Profile
          9.3.7.4.1. SLA Profile Instance Sharing
          9.3.7.4.2. SLA-Based Egress QoS Marking
      9.3.8. Sub-id and Brg-id Names with Lengths Between 32 and 64 Characters
        9.3.8.1. Online Change of Sub-id and Brg-id
        9.3.8.2. Usage Notes
      9.3.9. Auto-Sub ID
        9.3.9.1. Sub-id Identifiers
        9.3.9.2. Dual Stack Hosts
        9.3.9.3. Mixing Hosts with Auto-Generated IDs and non-Auto-Generated IDs
        9.3.9.4. Deployment Considerations
        9.3.9.5. Caveats
      9.3.10. Limiting Subscribers and Hosts on a SAP
      9.3.11. Static Subscriber Hosts
      9.3.12. QoS for Subscribers and Hosts
        9.3.12.1. QoS Parameters in Different Profiles
        9.3.12.2. QoS Policy Overrides
      9.3.13. ESM Subscriber Hierarchical Traffic Control
        9.3.13.1. Subscriber HQoS
        9.3.13.2. Subscriber CFHP
        9.3.13.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
          9.3.13.3.1. Broadband Network Gateway Application
          9.3.13.3.2. Queue Determination and Scheduling
          9.3.13.3.3. Weighted Scheduler Group
          9.3.13.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
          9.3.13.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
          9.3.13.3.6. Vport Determination and Evaluation
          9.3.13.3.7. Applying Aggregate Rate Limit to a Vport
          9.3.13.3.8. Applying a Scheduler Policy to a Vport
          9.3.13.3.9. Signaling of Last Mile Encapsulation Type
          9.3.13.3.10. Configuration Example
      9.3.14. Subscriber Volume Statistics
        9.3.14.1. IP (Layer 3) Volume Accounting
        9.3.14.2. Separate IPv4 and IPv6 Counters
      9.3.15. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
        9.3.15.1. Dynamic Updates of Subscriber Filter Policies
          9.3.15.1.1. SLA Profile Change
          9.3.15.1.2. Override the IP and IPv6 Filter Policies
          9.3.15.1.3. Insert Subscriber Host-Specific Filter Entries
          9.3.15.1.4. Insert Shared Filter Entries
        9.3.15.2. Checking Filter Policy Details
      9.3.16. Multi-Chassis Synchronization
        9.3.16.1. Overview
          9.3.16.1.1. Loss of Synchronization and Reconciliation
      9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
        9.3.17.1. SRRP Messaging
        9.3.17.2. SRRP and Multi-Chassis Synchronization
        9.3.17.3. SRRP Instance
          9.3.17.3.1. SRRP Instance MCS Key
          9.3.17.3.2. Containing Service Type and ID
          9.3.17.3.3. Containing Subscriber IP Interface Name
          9.3.17.3.4. Subscriber Subnet Information
          9.3.17.3.5. Containing Group IP Interface Information
          9.3.17.3.6. Remote Redundant IP Interface Mismatch
          9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
          9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
          9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          9.3.17.3.10. Local and Remote Dual Master Detected
        9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
        9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
      9.3.18. PPPoE MC Redundancy
        9.3.18.1. SRRP Considerations for PPPoE
          9.3.18.1.1. SRRP Fact-Checks
        9.3.18.2. State Synchronization
          9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
        9.3.18.3. Traffic Control and Redundant Interface
          9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
          9.3.18.3.2. Subnet Assignment and Advertisement - Option B
        9.3.18.4. MSAP Considerations
        9.3.18.5. Unnumbered Interface Support
        9.3.18.6. Compatibility with MC-LAG
        9.3.18.7. IPv6 Support
        9.3.18.8. Considerations with Local DHCP Server
        9.3.18.9. Redundant Interface Considerations
      9.3.19. Routed Central Office (CO)
        9.3.19.1. Layer 3 Subscriber Interfaces
          9.3.19.1.1. DHCP Interactions
          9.3.19.1.2. Routed CO for IES Service
          9.3.19.1.3. Routed CO for VPRN Service
        9.3.19.2. Wholesale Retail Routed CO
          9.3.19.2.1. Wholesale Retail Model
          9.3.19.2.2. Configuration and Applicability
          9.3.19.2.3. Hub-and-Spoke Forwarding
        9.3.19.3. Routed Subscriber Hosts
          9.3.19.3.1. Static Configured IPv4 Managed Route
          9.3.19.3.2. Static Configured IPv6 Managed Route
          9.3.19.3.3. Dynamic BGP Peering
          9.3.19.3.4. RIP Listener
          9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
          9.3.19.3.6. GRT Lookup and Routed CO in a VPRN
      9.3.20. Dual Homing
        9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
        9.3.20.2. Steady-State Operation of Dual-homed Ring
        9.3.20.3. Broken-Ring Operation and the Transition to this State
        9.3.20.4. Transition from Broken to Closed Ring State
        9.3.20.5. Provisioning Aspects and Error Cases
        9.3.20.6. Dual Homing to Two BSR Nodes
        9.3.20.7. MC Services
        9.3.20.8. Routed CO Dual Homing
          9.3.20.8.1. Redundant Interfaces
          9.3.20.8.2. SRRP in Dual Homing
          9.3.20.8.3. Synchronization
          9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
        9.3.20.9. SRRP and Multi-Chassis Synchronization
        9.3.20.10. Dual Homing and ANCP
      9.3.21. SRRP Enhancement
        9.3.21.1. SRRP Fate Sharing
        9.3.21.2. Fate Sharing Algorithm
        9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
          9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
          9.3.21.3.2. Managed Routes
          9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
          9.3.21.3.4. Activating SRRP State Tracking
        9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
        9.3.21.5. Group Monitor
      9.3.22. Subscriber QoS Overrides
      9.3.23. Dual-Stack Lite
        9.3.23.1. IP-in-IP
        9.3.23.2. Configuring DS-Lite
        9.3.23.3. L2TP over IPv6
      9.3.24. Call Trace
    9.4. L2TP Tunnel RADIUS Accounting
      9.4.1. Accounting Packets List
      9.4.2. RADIUS Attributes Value Considerations
      9.4.3. Other Optional RADIUS Attributes
      9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
      9.4.5. MLPPP on the LNS Side
    9.5. RADIUS Route Download
    9.6. Managed SAP (MSAP)
      9.6.1. Capture SAP
      9.6.2. MSAP Parameters
        9.6.2.1. Explicit MSAP Parameters from Local User Database
        9.6.2.2. Explicit MSAP Parameters from RADIUS or DIAMETER Authentication�
        9.6.2.3. Implicit MSAP Parameters Specified at the Capture SAP
      9.6.3. MSAP Creation
      9.6.4. MSAP QoS Configuration
      9.6.5. Sticky MSAP
    9.7. ESM Identification Process
      9.7.1. SAP-ID ESM Identifier
      9.7.2. DSLAM-ID
    9.8. Default-Subscriber
    9.9. Subscriber Mirroring
    9.10. Multicast Management
    9.11. Volume and Time Based Accounting
      9.11.1. Metering
        9.11.1.1. Categories Map and Categories
        9.11.1.2. Quota Consumption
        9.11.1.3. Minimum Credit Control Quota Values
        9.11.1.4. RADIUS VSA Alc-Credit-Control-Quota
      9.11.2. Credit Negotiation Mechanisms
      9.11.3. Action on Credit Exhaustion
      9.11.4. Action on Error-Conditions
      9.11.5. Applicability of Volume and Time Based Accounting
    9.12. Subscriber Host Idle Timeout
    9.13. Web Portal Authentication
      9.13.1. HTTP-Redirect (Captive Portal)
      9.13.2. One-time HTTP Redirection Overview
      9.13.3. Web Authentication Protocol (WPP)
        9.13.3.1. WPP Configurations
        9.13.3.2. WPP Triggered Host Creation
          9.13.3.2.1. LUDB Support For WPP
        9.13.3.3. WPP Multi-Chassis Redundancy Support
        9.13.3.4. WPP Portal Group
    9.14. ESM over MPLS Pseudowires
      9.14.1. Encapsulation
      9.14.2. ESM and PW Ports
        9.14.2.1. ESM on PW-Port Bound to a Physical Port
          9.14.2.1.1. QoS Support
          9.14.2.1.2. BNG Redundancy with ESM over Pseudowire
        9.14.2.2. ESM on PXC-Based PW-Ports
    9.15. Logical Link Identifier (LLID)
    9.16. PADI Authentication Policy for Managed SAP (MSAP)
    9.17. Open Authentication Model for DHCP and PPPoE Hosts
      9.17.1. Terminology
      9.17.2. LUDB and RADIUS Access Models
      9.17.3. No Authentication
      9.17.4. LUDB Only Access
      9.17.5. LUDB Access via DHCPv4 Server
      9.17.6. RADIUS Only Access
      9.17.7. Consecutive Access to LUDB and RADIUS
      9.17.8. RADIUS Fallback
    9.18. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
      9.18.1. Terminology
      9.18.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
      9.18.3. Default Gateway in IPv4 Flexible Addressing
      9.18.4. IPv4 Subnet Sharing
      9.18.5. IPv4 Subnet Mask Auto-Generation
      9.18.6. Local-proxy-arp and arp-populate
      9.18.7. Gi-address Configuration Consideration
      9.18.8. PPPoE Considerations
      9.18.9. IPoEv6 Considerations
      9.18.10. General Configuration Guidelines for Flexible IP Address Assignment
      9.18.11. Caveats
    9.19. uRPF for Subscriber Management
    9.20. IPoE Sessions
      9.20.1. Enabling IPoE Sessions
      9.20.2. IPoE Session Authentication
      9.20.3. IPoE Session Accounting
      9.20.4. IPoE Session Mid-Session Changes
      9.20.5. IPoE Session Termination
      9.20.6. Limiting the Number of IPoE Sessions
      9.20.7. SAP Session Index
      9.20.8. Resiliency
      9.20.9. Notes
      9.20.10. Configuration Steps
      9.20.11. IPoE Session Migration
        9.20.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
    9.21. Data-triggered Subscriber Management
      9.21.1. Provisioning Data-triggered ESM
      9.21.2. Authentication and Host Creation
      9.21.3. DoS Protection
      9.21.4. DHCP Promotion
      9.21.5. Data-Triggered SLAAC Hosts
      9.21.6. Stateful Multi-Chassis Redundancy (MCS)
      9.21.7. Stateless Multi-Chassis Redundancy
        9.21.7.1. MSAP Support
    9.22. RADIUS Subscriber Services
      9.22.1. Subscriber Service Building Blocks
        9.22.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
        9.22.1.2. RADIUS Python Interface
        9.22.1.3. Python Script
          9.22.1.3.1. Python Script Example
        9.22.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
      9.22.2. Subscriber Services RADIUS VSAs
      9.22.3. Subscriber Service RADIUS Accounting
      9.22.4. Accounting-Only Subscriber Service
      9.22.5. QoS Override-based Subscriber Service
      9.22.6. PCC Rule-based Subscriber Services
        9.22.6.1. PCC Rule Actions
        9.22.6.2. PCC Rule Instantiation
        9.22.6.3. PCC Rules in a Subscriber Service
        9.22.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
        9.22.6.5. PCC Rules on HSMDAv2
          9.22.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
        9.22.6.6. PCC Rule-based Subscriber Service Activation Failures
      9.22.7. Combined Subscriber Services
      9.22.8. Subscriber Services Python API
        9.22.8.1. Common Subscriber Services Python API
        9.22.8.2. Subscriber Service QoS Override Python API
        9.22.8.3. Subscriber Service PCC Rules Python API
      9.22.9. Operational Commands
        9.22.9.1. Show Commands
        9.22.9.2. Debug Commands
        9.22.9.3. Resource Monitoring
    9.23. Residential Gateway Replacement
    9.24. ESM Troubleshooting Show Command
    9.25. Subscriber Accumulated Statistics
    9.26. Hybrid Access
      9.26.1. BNG-based HAG
      9.26.2. PGW-based HAG
    9.27. Connection Bonding
      9.27.1. Setup
      9.27.2. Downstream Load-Balancing
      9.27.3. QoS
      9.27.4. Multicast
    9.28. Ethernet Satellites with Redundant Uplinks
      9.28.1. Single Host, Single Satellite
      9.28.2. Single Host Node, Dual Satellite
      9.28.3. QoS
      9.28.4. Preservation of Statistics and Accounting in ESM
    9.29. Multi-Chassis Synchronization of RADIUS Usage Counters
      9.29.1. Overview
      9.29.2. MCS Interval
      9.29.3. Usage Counters Synchronized
      9.29.4. Incomplete MCS Configuration
      9.29.5. Configuration Mismatch
      9.29.6. Switchover Scenarios
    9.30. Configuring Enhanced Subscriber Management with CLI
      9.30.1. Configuring RADIUS Authentication of DHCP Sessions
      9.30.2. TCP MSS adjustment for ESM Hosts
      9.30.3. Configuring Enhanced Subscriber Management
        9.30.3.1. Basic Configurations
        9.30.3.2. Subscriber Interface Configuration
        9.30.3.3. Configuring Enhanced Subscriber Management Entities
          9.30.3.3.1. Configuring a Subscriber Identification Policy
          9.30.3.3.2. Configuring a Subscriber Profile
          9.30.3.3.3. Configuring an SLA Profile
          9.30.3.3.4. Configuring Explicit Mapping Entries
        9.30.3.4. Routed CO with Basic Subscriber Management Features
        9.30.3.5. Applying the Profiles and Policies
          9.30.3.5.1. SLA Profile
      9.30.4. Configuring Dual Homing
    9.31. Subscriber Management Command Reference
      9.31.1. Command Hierarchies
        9.31.1.1. ANCP Commands
        9.31.1.2. Authentication Policy Commands
        9.31.1.3. BGP Peering Policy Commands
        9.31.1.4. Call Trace Commands
        9.31.1.5. Category Map and Credit Control Policy Commands
        9.31.1.6. Diameter Policy Commands
          9.31.1.6.1. AAA Diameter Peer Policy Commands
          9.31.1.6.2. Subscriber Management Diameter Application Policy Commands
          9.31.1.6.3. Diameter Base Commands
        9.31.1.7. Explicit Subscriber Mapping Commands
        9.31.1.8. Filter Commands
        9.31.1.9. GSMP Configuration Commands
        9.31.1.10. Host Lockout Commands
        9.31.1.11. Host Tracking Policy Commands
        9.31.1.12. IGMP Policy Commands
        9.31.1.13. Multi-Chassis Redundancy Commands
        9.31.1.14. PIM Policy Commands
        9.31.1.15. RADIUS Accounting Policy Commands
        9.31.1.16. RADIUS Route Download Commands
        9.31.1.17. Router Advertisement Commands
        9.31.1.18. SLA Profile Commands
        9.31.1.19. Subscriber Identification Policy Commands
        9.31.1.20. Auto-Generated Subscriber Identification Key Commands
        9.31.1.21. Auto-Generated Subscriber Identification Key Service Commands
        9.31.1.22. Subscriber MCAC Policy Commands
        9.31.1.23. Subscriber Profile Commands
        9.31.1.24. IPoE Session Policy Commands
        9.31.1.25. SHCV Policy Commands
        9.31.1.26. Subscriber Management Service Commands
          9.31.1.26.1. VPLS Subscriber Management Configuration Commands
          9.31.1.26.2. Managed SAP Policy Commands
          9.31.1.26.3. VPRN Subscriber Interface Commands
          9.31.1.26.4. VPRN Subscriber Group Interface Commands
          9.31.1.26.5. IES Subscriber Management Configuration Commands
          9.31.1.26.6. IES Subscriber Interface Commands
          9.31.1.26.7. IES Group Interface Commands
          9.31.1.26.8. Service Subscriber Interface, Group Interface IPoE Command
          9.31.1.26.9. RIP Commands
          9.31.1.26.10. VPort Commands
          9.31.1.26.11. Redundant Interface Commands
          9.31.1.26.12. Wireless Portal Protocol (WPP) Commands
          9.31.1.26.13. Multiple PPPoE Session QoS Commands
          9.31.1.26.14. Multicast Listener Discovery (MLD) Commands
          9.31.1.26.15. ETH-CFM Service Commands
        9.31.1.27. Show Commands
        9.31.1.28. Monitor Commands
        9.31.1.29. Clear Commands
        9.31.1.30. Debug Commands
        9.31.1.31. Tools Commands
      9.31.2. Triple Play Subscriber Management Configuration Commands
        9.31.2.1. Triple Play Subscriber Management Configuration Commands
          9.31.2.1.1. Generic Commands
          9.31.2.1.2. ANCP Commands
          9.31.2.1.3. Authentication Policy Commands
          9.31.2.1.4. BGP Peering Policy Commands
          9.31.2.1.5. Call Trace Commands
          9.31.2.1.6. Category Map Commands
          9.31.2.1.7. Diameter Policy Commands
          9.31.2.1.8. Diameter Base Commands
          9.31.2.1.9. Explicit Subscriber Mapping Commands
          9.31.2.1.10. GSMP Configuration Commands
          9.31.2.1.11. Host Lockout Commands
          9.31.2.1.12. IGMP Policy Commands
          9.31.2.1.13. Managed SAP Policy Commands
          9.31.2.1.14. Multicast Listener Discovery (MLD) Commands
          9.31.2.1.15. Multi-Chassis Redundancy Commands
          9.31.2.1.16. PIM Policy Commands
          9.31.2.1.17. RADIUS Accounting Policy Commands
          9.31.2.1.18. RADIUS Route Download Commands
          9.31.2.1.19. Redundant Interface Commands
          9.31.2.1.20. RIP Commands
          9.31.2.1.21. Router Advertisement Policy Commands
          9.31.2.1.22. SLA Profile Commands
          9.31.2.1.23. Subscriber Identification Policy Commands
          9.31.2.1.24. Subscriber Profile Commands
          9.31.2.1.25. Subscriber Management Service Commands
          9.31.2.1.26. Subscriber Management Service Commands
            9.31.2.1.1.1. Vport Commands
            9.31.2.1.2.1. IPoE Session Commands
            9.31.2.1.3.1. SHCV Policy Commands
            9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
            9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
            9.31.2.1.6.1. IPv6 Commands
            9.31.2.1.26.1. Show Commands
            9.31.2.2.26.1. Clear Commands
            9.31.2.3.26.1. Tools Commands
            9.31.2.4.26.1. Debug Commands
            9.31.2.5.26.1. Monitor Commands
            9.31.2.1.1. Vport Commands
            9.31.2.1.2. IPoE Session Commands
            9.31.2.1.3. SHCV Policy Commands
            9.31.2.1.4. Service DHCP and Anti-Spoof Filtering Commands
            9.31.2.1.5. Auto-Generated Subscriber Identification Key Commands
            9.31.2.1.6. IPv6 Commands
            9.31.2.1.26. Show Commands
            9.31.2.2.26. Clear Commands
            9.31.2.3.26. Tools Commands
            9.31.2.4.26. Debug Commands
            9.31.2.5.26. Monitor Commands
            9.31.2.1.1.1. Vport Commands
            9.31.2.1.2.1. IPoE Session Commands
            9.31.2.1.3.1. SHCV Policy Commands
            9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
            9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
            9.31.2.1.6.1. IPv6 Commands
            9.31.2.1.26.1. Show Commands
            9.31.2.2.26.1. Clear Commands
            9.31.2.3.26.1. Tools Commands
            9.31.2.4.26.1. Debug Commands
            9.31.2.5.26.1. Monitor Commands
          9.31.2.1.27. Vport Commands
          9.31.2.1.28. IPoE Session Commands
          9.31.2.1.29. SHCV Policy Commands
          9.31.2.1.30. Service DHCP and Anti-Spoof Filtering Commands
          9.31.2.1.31. Auto-Generated Subscriber Identification Key Commands
          9.31.2.1.32. IPv6 Commands
        9.31.2.2. Show Commands
        9.31.2.3. Clear Commands
        9.31.2.4. Tools Commands
        9.31.2.5. Debug Commands
        9.31.2.6. Monitor Commands
  10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
    10.1. Overview
      10.1.1. Terminology and Abbreviations
      10.1.2. Restrictions
    10.2. Deploying Oversubscribed Multi-Chassis Redundancy
      10.2.1. Resource Exhaustion Notification and Simultaneous Failures
      10.2.2. Resource Monitoring
      10.2.3. Warm-Standby Mode Of Operation
      10.2.4. IPoE vs PPPoE
      10.2.5. Persistency
      10.2.6. Routing and Redundant Interface in OMCR
      10.2.7. Revertive Behavior
      10.2.8. Service Restoration Times
      10.2.9. Processing of the SRRP Flaps
      10.2.10. Accounting
      10.2.11. Configuration Guidelines
      10.2.12. Troubleshooting Commands
    10.3. OMCR Command Reference
      10.3.1. Command Hierarchies
      10.3.2. OMCR Configuration Commands
        10.3.2.1. OMCR Configuration Commands
  11. ESM on High Scale QoS (HSQ) IOM
    11.1. Overview
      11.1.1. HSQ Traffic Manager Overview
        11.1.1.1. Shaping Hierarchy
        11.1.1.2. Scheduling
      11.1.2. HSQ and ESM SLA Modes
        11.1.2.1. ESM Single SLA Mode
        11.1.2.2. ESM Expanded SLA Mode
      11.1.3. Configuration Steps
      11.1.4. Deployment Considerations
  12. WIFI Aggregation and Offload
    12.1. WIFI Aggregation and Offload Overview
    12.2. Layer 2 over Soft-GRE Tunnels
      12.2.1. Encapsulation
      12.2.2. Data Path
      12.2.3. MDA-based Redundancy
    12.3. Tunnel Level Egress QoS
      12.3.1. QoS Overrides
      12.3.2. Operational Commands
    12.4. Authentication
      12.4.1. EAP-Based Authentication
        12.4.1.1. RADIUS Proxy
          12.4.1.1.1. RADIUS Proxy — Server Load-Balancing
          12.4.1.1.2. RADIUS Proxy — Cache Lookup
          12.4.1.1.3. RADIUS Proxy — Accounting
      12.4.2. Portal Authentication
      12.4.3. AA-based Portal Redirection
    12.5. Address Assignment
    12.6. WIFI Mobility Anchor
    12.7. Wholesale
    12.8. CGN on WLAN-GW
    12.9. Lawful Intercept on WLAN-GW
    12.10. WLAN Location Enhancements
      12.10.1. Triggered Interim Accounting-Updates
      12.10.2. Mobility Triggered Interim Updates with Counters
      12.10.3. Operational Support
    12.11. 3G/4G Interworking
      12.11.1. Signaling Call Flow
        12.11.1.1. GTP Setup with EAP Authentication
      12.11.2. Location Notification in S2a
        12.11.2.1. WLAN Location over S2a
        12.11.2.2. Cellular Location over S2a
        12.11.2.3. Cellular Location over Gn Interface
        12.11.2.4. Operational Support
    12.12. Migrant User Support
      12.12.1. Migrant User Support with Portal-Authentication
        12.12.1.1. DHCP
        12.12.1.2. Authentication and Forwarding
      12.12.2. Migrant User Support with EAP Authentication
      12.12.3. Data Triggered Subscriber Creation
    12.13. Distributed Subscriber Management (DSM)
      12.13.1. DHCP
      12.13.2. Authentication and Accounting
        12.13.2.1. DSM Data-Plane
      12.13.3. IP Filtering
        12.13.3.1. HTTP Redirect
      12.13.4. Policing
      12.13.5. Lawful Intercept (LI)
      12.13.6. Data-Triggered UE Creation
      12.13.7. Idle-Timeout and Session-Timeout Management
      12.13.8. Operational Commands
      12.13.9. Pool Manager
      12.13.10. DHCPv6 and SLAAC
      12.13.11. Application Assurance Support
    12.14. Call Trace
    12.15. Distributed RADIUS Proxy
      12.15.1. Enhanced Subscriber Management
      12.15.2. Distributed Subscriber Management
      12.15.3. VLAN Awareness
      12.15.4. Operational Commands
    12.16. WLAN-GW 1:1 Active-Backup Redundancy
      12.16.1. DHCP Server Redundancy
      12.16.2. Subscriber Creation after Switchover
    12.17. WLAN-GW Triggered Stateless Redundancy (N:1)
    12.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
    12.19. IPv6-only Access
      12.19.1. IPv6 GRE Tunnels
      12.19.2. IPv6 Client-Side RADIUS Proxy
      12.19.3. Dual-Stack UEs over WLAN-GW
        12.19.3.1. SLAAC Prefix Assignment
        12.19.3.2. DHCPv6 IA_NA Assignment
        12.19.3.3. Migrant User Support
        12.19.3.4. Accounting
    12.20. Layer 2 Wholesale
    12.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
    12.22. Soft-L2TPv3 Tunnels
    12.23. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
      12.23.1. Processing on the V-GW
      12.23.2. Processing on H-GW
      12.23.3. Idle Timeout Handling
      12.23.4. Distributed RADIUS Proxy for Closed SSID
      12.23.5. H-GW Redundancy
    12.24. ISA Operational Commands and Key Performance Indicators
      12.24.1. ISA Resources
      12.24.2. ISA Load
      12.24.3. Query-based UE and Tunnel States
      12.24.4. Packet Statistics
    12.25. WiFi Command Reference
      12.25.1. Command Hierarchies
        12.25.1.1. WLAN-GW Commands
        12.25.1.2. ISA Commands
        12.25.1.3. WLAN-GW Service Commands
        12.25.1.4. Data Plane Related Commands
        12.25.1.5. RADIUS Server and Proxy Commands
        12.25.1.6. LUDB Matching for RADIUS Proxy Cache
        12.25.1.7. Port Policy Commands
        12.25.1.8. WIFI Aggregation and Offload – Migrant User Support Commands
        12.25.1.9. Show Commands
        12.25.1.10. Debug Commands
        12.25.1.11. Tools Commands
        12.25.1.12. Clear Commands
      12.25.2. WIFI Aggregation and Offload Commands
        12.25.2.1. WIFI Aggregation and Offload Commands
          12.25.2.1.1. Generic Commands
          12.25.2.1.2. WLAN-GW Commands
          12.25.2.1.3. ISA Commands
          12.25.2.1.4. RADIUS Server Policy Commands
        12.25.2.2. CLI Command Description for RADIUS Server
        12.25.2.3. CLI Command Description for RADIUS Proxy Server
        12.25.2.4. LUDB Matching of RADIUS Proxy Cache Commands
        12.25.2.5. WLAN-GW-Group Commands
        12.25.2.6. Port Policy Commands
        12.25.2.7. WLAN-GW Group Interface Commands
        12.25.2.8. Migrant User Support Commands
          12.25.2.8.1. Show Commands
          12.25.2.8.2. Debug Commands
          12.25.2.8.3. Tools Commands
          12.25.2.8.4. Clear Commands
  13. GTP
    13.1. GTP Uplink
      13.1.1. Identification Attributes
      13.1.2. P-GW/GGSN Selection
      13.1.3. Configuration
      13.1.4. QoS Support
      13.1.5. GTP Session Hold
      13.1.6. Selective Breakout
      13.1.7. IPoE Support
      13.1.8. PPPoE Support
    13.2. GTP Access
      13.2.1. GTP Termination
        13.2.1.1. Multiple APNs
      13.2.2. GTP Session Setup
        13.2.2.1. Supported IP Stacks
      13.2.3. Mobility and Location Tracking
      13.2.4. QoS
      13.2.5. Multicast
    13.3. DHCP over GTP-u
      13.3.1. Address Management Related PCOs
      13.3.2. Address Allocation Modes
    13.4. GTP Peering
    13.5. GTP Command Reference
      13.5.1. Command Hierarchies
        13.5.1.1. GTP Commands
        13.5.1.2. GTP Service Commands
        13.5.1.3. Show Commands
        13.5.1.4. Clear Commands
        13.5.1.5. Debug Commands
      13.5.2. GTP Command Descriptions
        13.5.2.1. GTP Commands
          13.5.2.1.1. Generic Commands
          13.5.2.1.2. GTP Commands
          13.5.2.1.3. GTP Show Commands
          13.5.2.1.4. GTP Clear Commands
          13.5.2.1.5. GTP Debug Commands
  14. Virtual Residential Gateway
    14.1. Overview
      14.1.1. Access Modes
      14.1.2. Home Context on the vRGW
        14.1.2.1. Implicit Home Authentication
        14.1.2.2. Explicit Home Authentication
        14.1.2.3. Change of Configuration
        14.1.2.4. Home Lifetime
      14.1.3. Device Context on the vRGW
      14.1.4. Dynamic Configuration Changes
      14.1.5. Per-Home Pool Management and L2-Aware NAT
        14.1.5.1. Sticky IP Addresses
        14.1.5.2. Managed Static IPv4 Addresses
        14.1.5.3. DMZ
      14.1.6. IPv6
      14.1.7. QoS and Filter Support
      14.1.8. Data-Triggered Authentication
      14.1.9. Per-Host NAT Port Ranges
      14.1.10. Inter-Chassis Redundancy
        14.1.10.1. Pool State Synchronization
        14.1.10.2. Regular Group Interfaces
        14.1.10.3. WLAN-GW Group Interfaces
      14.1.11. BRG and vRG Caveats
      14.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
      14.1.13. PPPoE Client
        14.1.13.1. PPPoE Client Setup
        14.1.13.2. PPPoE Client Failure
        14.1.13.3. LCP Keepalive
        14.1.13.4. MRU/MTU
      14.1.14. SLAAC Prefix Replacement
    14.2. Home LAN Extension
      14.2.1. Overview
      14.2.2. Authentication and Authorization
      14.2.3. Data Plane Tables
      14.2.4. BGP EVPN VPLS
      14.2.5. Assistive Address Resolution
      14.2.6. MAC Address Translation
      14.2.7. Configuring HLE
      14.2.8. Traffic Handling
    14.3. AP Agnostic Access for Multiple Dwelling Units
      14.3.1. Overview
      14.3.2. Bridge Domain and BRG Identification
      14.3.3. ARP Handling
      14.3.4. Mobility
    14.4. Per-Host DNS Override
    14.5. vRGW and HLE Command Reference
      14.5.1. Command Hierarchies
        14.5.1.1.  Subscriber Management BRGW Profile Commands
        14.5.1.2. Subscriber Management Commands
        14.5.1.3. WLAN-GW Service Commands
        14.5.1.4. Service Commands
        14.5.1.5. Router HLE Commands
        14.5.1.6. Subscriber Management HLE Commands
        14.5.1.7. Show Commands
        14.5.1.8. Debug Commands
        14.5.1.9. Clear Commands
        14.5.1.10. Tools Commands
      14.5.2. Command Descriptions
        14.5.2.1. Generic Commands
        14.5.2.2. BRG Profile Commands
        14.5.2.3. Subscriber Management Commands
        14.5.2.4. WLAN-GW Service Commands
        14.5.2.5. Router Home LAN Extension Commands
        14.5.2.6. Subscriber Management Commands
        14.5.2.7. Service Commands
        14.5.2.8. Show Commands
        14.5.2.9. Debug Commands
        14.5.2.10. Clear Commands
        14.5.2.11. Tools Commands
  15. Service Chaining for ESM Hosts with L2-Aware NAT
    15.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
      15.1.1. Terminology
    15.2. VAS Filters on the ISA
      15.2.1. Matching
      15.2.2. Forwarding
      15.2.3. NSH Insertion
      15.2.4. Configuration
    15.3. EVPN Route Updates and Tracking
      15.3.1. NVE Bridging to SF
      15.3.2. NVE Routing to SF
    15.4. Data Path on the Subscriber Edge
      15.4.1. Upstream Traffic (Access to Network)
      15.4.2. Downstream Traffic — From Network
    15.5. Data Path on NVE
    15.6. Service Chaining for ESM Hosts with L2-Aware NAT
      15.6.1. Command Hierarchies
        15.6.1.1.  ISA Service Chaining Commands
        15.6.1.2. Show Commands
      15.6.2. Command Descriptions
        15.6.2.1. Generic Commands
        15.6.2.2. Service Chaining Commands
        15.6.2.3. Show Commands
  16. Dynamic Data Services
    16.1. Introduction to Dynamic Data Services
    16.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
    16.3. Data-Triggered Dynamic Data Services
      16.3.1. Data Trigger
      16.3.2. Dynamic Services Data Trigger Capture SAP
      16.3.3. RADIUS Authentication
      16.3.4. Local Authentication
      16.3.5. Data-Triggered Dynamic Service Provisioning
      16.3.6. Control Plane Protection
      16.3.7. Debugging
    16.4. Dynamic Data Services Python API
    16.5. RADIUS Triggered Dynamic Data Services Command Reference
      16.5.1. Command Hierarchies
        16.5.1.1. RADIUS Triggered Dynamic Data Services Commands
        16.5.1.2. Basic System Command
        16.5.1.3. Show Commands
        16.5.1.4. Clear Commands
        16.5.1.5. Debug Commands
        16.5.1.6. Tools Commands
      16.5.2. RADIUS Triggered Dynamic Data Services Commands
        16.5.2.1. Configuration Commands
        16.5.2.2. Basic System Command
        16.5.2.3. Show Commands
        16.5.2.4. Clear Commands
        16.5.2.5. Debug Commands
        16.5.2.6. Tools Commands
  17. Diameter and Diameter Applications
    17.1. Restrictions
    17.2. Terminology
    17.3. Diameter Base
      17.3.1. Diameter Base Protocol
      17.3.2. Diameter Peers and the Role of a Diameter Node in SR OS
      17.3.3. Capability Exchange
      17.3.4. Connection Termination
      17.3.5. Diameter Hosts and Realms
        17.3.5.1. Forwarding and Routing of Application Messages in Diameter
        17.3.5.2. Static Diameter Realm Routes
          17.3.5.2.1. Example with Static Realm Routes
          17.3.5.2.2. Default Peer
        17.3.5.3. Configuration of Host Names and Realms in SR OS
          17.3.5.3.1. New Base Configuration
          17.3.5.3.2. Legacy Configuration
      17.3.6. Dynamically Learned Parameters
      17.3.7. Diameter Routing Loop Avoidance
      17.3.8. Retransmissions and Message Timers
        17.3.8.1. Clearing the Destination-Host AVP in the Retransmitted Messages
        17.3.8.2. Retransmission Bit (T-Bit)
      17.3.9. Handling of Diameter_Unable_To_Deliver (3002) Error Message
      17.3.10. Response to Diameter_Too_Busy (3004) Error Message
      17.3.11. An SR as a Transit Diameter Node
      17.3.12. An SR as a Transit Diameter Node
      17.3.13. Python Support
    17.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
      17.4.1. Diameter Gy Out Of Credit Actions
        17.4.1.1. Graceful Service Termination
      17.4.2. Extended Failure Handling (EFH)
        17.4.2.1. Extended Failure Handling Example Call Flow
        17.4.2.2. Extended Failure Handling Triggers
        17.4.2.3. Assigning Interim Credit
        17.4.2.4. Enabling Extended Failure Handling
        17.4.2.5. Configuration Example 1 - Single Volume Interim Credit Value
        17.4.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
        17.4.2.7. Monitoring the Extended Failure Handling State
        17.4.2.8. Additional Call Flow Examples
          17.4.2.8.1. User Disconnects While EFH is Active
          17.4.2.8.2. The Maximum Number of Attempts is Reached
          17.4.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
      17.4.3. Gy CCR-t Replay
    17.5. Policy Management via Gx Interface
      17.5.1. Gx Protocol
      17.5.2. Policy Assignment Models
      17.5.3. IP-CAN Session – Gx Session Identification
        17.5.3.1. User Identification in PCRF
        17.5.3.2. NAS-Port-Id as Subscription-Id
      17.5.4. Gx Interface and ESM Subscriber Instantiation
        17.5.4.1. Gx and Dual-Stack Hosts
        17.5.4.2. Gx and PPPoEv6-DHCP
      17.5.5. Gx Fallback Function
      17.5.6. Gx CCR-I Replays
      17.5.7. Gx CCR-t Replays
        17.5.7.1. RAR and CCR-t Replay
        17.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
        17.5.7.3. CCR-t Replay And High Availability
      17.5.8. Automatic Updates for IP Address Allocation/De-allocation
      17.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
      17.5.10. Gx, ESM and AA
        17.5.10.1. ESM Subscriber-Host vs AA Subscriber
        17.5.10.2. AA Subscriber State
      17.5.11. Policy Management via Gx
      17.5.12. Gx-Based Overrides
        17.5.12.1. Instantiation of Gx Overrides
        17.5.12.2. HTTP Redirect Override
        17.5.12.3. Removal of Overrides
        17.5.12.4. Examples of Gx Overrides
      17.5.13. PCC Rules
        17.5.13.1. PCC Rule Concept
        17.5.13.2. PCC Rule Instantiation
        17.5.13.3. Base QoS-Policy and Base Filter
        17.5.13.4. Generic Policy Sharing and Rule Sharing
        17.5.13.5. PCC Rule Name and PCC Rule Removal
        17.5.13.6. Gx Rule Ordering
        17.5.13.7. PCC Rule Override
        17.5.13.8. Aggregation of IP-Criterion
        17.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
        17.5.13.10. Gx Rules with Multiple Actions and Action Sharing
        17.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
        17.5.13.12. RADIUS and Gx Interaction
        17.5.13.13. Bulk Changes via CLI while Gx Rules are Active
        17.5.13.14. PCC Rule Direction
        17.5.13.15. Action
        17.5.13.16. Rate-Limiting Action (Ingress, Egress)
          17.5.13.16.1. Dynamic Policers and Queue Mappings
          17.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
        17.5.13.17. Forwarding-Class Change (Ingress, Egress)
        17.5.13.18. QoS Forward (Ingress and Egress)
        17.5.13.19. Next Hop Redirect (Ingress)
        17.5.13.20. HTTP Redirect (Ingress)
        17.5.13.21. Filter Forward/Drop (Ingress and Egress)
        17.5.13.22. Service Gating Function
        17.5.13.23. PCC Rule Provisioning Example
        17.5.13.24. Operational Aspects
        17.5.13.25. PCC Rules and Capacity Planning
        17.5.13.26. PCC Rule Scaling Example
      17.5.14. NAS Filter Inserts
        17.5.14.1. Examples of NAS Entry Inserts
      17.5.15. Error Handing and Rule Failure Reporting in ESM
        17.5.15.1. AVP Decoding Failure in Gx
        17.5.15.2. ESM Rule-Installation Failure
        17.5.15.3. Failure Reporting in AA
        17.5.15.4. Summary of Failure Reporting
      17.5.16. Usage-Monitoring and Reporting
        17.5.16.1. ESM Usage-Monitoring - What is Being Monitored
        17.5.16.2. AA Usage-Monitoring – What is Being Monitored
        17.5.16.3. Requesting Usage-Monitoring in ESM
        17.5.16.4. Reporting Accumulated Usage
        17.5.16.5. Disabling Usage-Monitoring
        17.5.16.6. Usage-Monitoring for PCC Rules
        17.5.16.7. Session Termination
        17.5.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
        17.5.16.9. Usage-Monitoring Examples
      17.5.17. Event Triggers
      17.5.18. Subscriber Verification
      17.5.19. Subscriber Termination
      17.5.20. Mobility Support in WiFi
        17.5.20.1. Redundancy
      17.5.21. Persistency and Origin-State-ID AVP
      17.5.22. Overload Protection
    17.6. Supported-Features AVP in Gx
      17.6.1. Extended Bandwidth 5G New Radio Feature
      17.6.2. Transmission of Extended Bandwidth AVPs During Gx Session Initiation
      17.6.3. Processing the Extended Bandwidth AVPs
    17.7. Diameter NASREQ Application
      17.7.1. Sample Configuration Steps
    17.8. Diameter Redundancy
      17.8.1. Diameter Peer and Server Failover
        17.8.1.1. Diameter Peer Failover
        17.8.1.2. Diameter Sever Failover
      17.8.2. Diameter Multi-Chassis Redundancy
        17.8.2.1. Single Diameter Identity (DI) per a Pair of Redundant Diameter Nodes
        17.8.2.2. Single Peering Connection per Redundant Pair
        17.8.2.3. Inter-Peering Connection
        17.8.2.4. Inter-Peer as a Default Peer
        17.8.2.5. Handling RARs
        17.8.2.6. Handling of the Route-Record AVP
        17.8.2.7. SRRP Switchover
        17.8.2.8. Unsupported Failures
        17.8.2.9. Peer Preference in Multi-Chassis Setup
      17.8.3. Gx Usage Monitoring in Dual-Homed Systems
        17.8.3.1. Synchronization Frequency
        17.8.3.2. Switchover Triggered Synchronization
        17.8.3.3. What is Being Synchronized
        17.8.3.4. Loss of Inter-Chassis Link
        17.8.3.5. Master-to-Master SRRP Scenario
        17.8.3.6. Usage Counter Collection With No Credit Grants Received
        17.8.3.7. ISSU
    17.9. Diameter Debugging
  18. Python Script Support for ESM
    18.1. Python Script Support for ESM
    18.2. Python in SR OS Overview
      18.2.1. Python Policy – GTPv1-C API
      18.2.2. Python Policy – GTPv2-C API
      18.2.3. Python Changes
    18.3. Python Support in sub-ident-policy
      18.3.1. Configuration
      18.3.2. Operator Debugging
      18.3.3. Python Scripts
      18.3.4. Sample Python Scripts
        18.3.4.1. Example
        18.3.4.2. Example
        18.3.4.3. Example
      18.3.5. Limitations
    18.4. RADIUS Script Policy Overview
      18.4.1. Python RADIUS API
      18.4.2. Sample Script
    18.5. Python Policy Overview
      18.5.1. Python Policy – RADIUS API
      18.5.2. Python Policy – DHCPv4 API
      18.5.3. Python Policy – DHCPv6 API
      18.5.4. Python Policy – Diameter API
      18.5.5. Python Policy – DHCP Transaction Cache API
      18.5.6. Python for PPPoE API
      18.5.7. Python API for PPP Packet
      18.5.8. Python API for PPP PAP
      18.5.9. Python API for PPP CHAP
      18.5.10. Python ESM API
      18.5.11. Python Cache Support
      18.5.12. Applying a Python Policy
      18.5.13. Python Script Protection
    18.6. Tips and Tricks
    18.7. Python Command Reference
      18.7.1. Command Hierarchies
        18.7.1.1. Python Policy Commands
        18.7.1.2. Python Script Commands
        18.7.1.3. Services Commands
        18.7.1.4. Show Commands
        18.7.1.5. Tools Commands
        18.7.1.6. Debug Commands
        18.7.1.7. Clear Commands
      18.7.2. Command Descriptions
        18.7.2.1. Python Configuration Commands
          18.7.2.1.1. Global Commands
          18.7.2.1.2. Python Policy Commands
          18.7.2.1.3. Python Script Commands
          18.7.2.1.4. Services Commands
          18.7.2.1.5. Tools Commands
        18.7.2.2. Show Commands
        18.7.2.3. Debug Commands
        18.7.2.4. Clear Commands
    18.8. Python RADIUS Command Reference
      18.8.1. Command Hierarchies
      18.8.2. Command Descriptions
        18.8.2.1. Generic Commands
        18.8.2.2. Script Commands
  19. S-VLAN Statistics Collection
    19.1. Overview
      19.1.1. Statistics Retention
        19.1.1.1. MIBs
      19.1.2. Enabling S-VLAN Statistics Collection
    19.2. S-VLAN Status Collection Command Reference
      19.2.1. Command Hierarchies
        19.2.1.1. S-VLAN Status Collection Commands
        19.2.1.2. S-VLAN Status Collection Show Commands
        19.2.1.3. S-VLAN Clear Commands
      19.2.2. GTP Command Descriptions
        19.2.2.1. GTP Commands
          19.2.2.1.1. Generic Commands
          19.2.2.1.2. S-VLAN Statistics Collection Commands
          19.2.2.1.3. S-VLAN Statistics Collection Show Commands
          19.2.2.1.4. S-VLAN Statistics Collection Clear Commands
  20. Standards and Protocol Support
  Customer Document and Product Support
Unicast Routing Protocols Guide 20.7.R1
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. RIP
    2.1. RIP Overview
      2.1.1. RIP Features
        2.1.1.1. RIP Version Types
        2.1.1.2. RIPv2 Authentication
        2.1.1.3. RIP Packet Format
          2.1.1.3.1. RIPv1 Format
          2.1.1.3.2. RIPv2 Format
        2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
    2.2. RIPng
      2.2.1. RIPng Protocol
    2.3. Common Attributes
      2.3.1. Metrics
      2.3.2. Timers
      2.3.3. Import and Export Policies
      2.3.4. Hierarchical Levels
    2.4. RIP Configuration Process Overview
    2.5. Configuration Notes
      2.5.1. General
    2.6. Configuring RIP with CLI
      2.6.1. RIP and RIPng Configuration Overview
        2.6.1.1. Preconfiguration Requirements
        2.6.1.2. RIP Hierarchy
      2.6.2. Basic RIP Configuration
      2.6.3. Common Configuration Tasks
        2.6.3.1. Configuring Interfaces
        2.6.3.2. Configuring a Route Policy
        2.6.3.3. Configuring RIP Parameters
        2.6.3.4. Configuring Global-Level Parameters
        2.6.3.5. Configuring Group-Level Parameters
        2.6.3.6. Configuring Neighbor-Level Parameters
    2.7. RIP Configuration Management Tasks
      2.7.1. Modifying RIP Parameters
      2.7.2. Deleting a Group
      2.7.3. Deleting a Neighbor
    2.8. RIP Configuration Command Reference
      2.8.1. Command Hierarchies
        2.8.1.1. Configuration Commands
          2.8.1.1.1. Group Commands
          2.8.1.1.2. Neighbor Commands
        2.8.1.2. RIPng Configuration Commands
          2.8.1.2.1. Group Commands
          2.8.1.2.2. Neighbor Commands
      2.8.2. Command Descriptions
        2.8.2.1. Generic Commands
        2.8.2.2. RIP Commands
    2.9. Show, Clear, and Debug Command Reference
      2.9.1. Command Hierarchies
        2.9.1.1. Show Commands
        2.9.1.2. Clear Commands
        2.9.1.3. Debug Commands
      2.9.2. Command Descriptions
        2.9.2.1. Show Commands
        2.9.2.2. Clear Commands
        2.9.2.3. Debug RIP Commands
  3. OSPF
    3.1. Configuring OSPF
      3.1.1. OSPF Areas
        3.1.1.1. Backbone Area
        3.1.1.2. Stub Area
        3.1.1.3. Not-So-Stubby Area
          3.1.1.3.1. OSPF Super Backbone
          3.1.1.3.2. Sham Links
          3.1.1.3.3. Implementing the OSPF Super Backbone
          3.1.1.3.4. Loop Avoidance
          3.1.1.3.5. DN-BIT
          3.1.1.3.6. Route Tag
          3.1.1.3.7. Sham Links
      3.1.2. OSPFv3 Authentication
      3.1.3. OSPF Graceful Restart Helper
        3.1.3.1. BFD Interaction with Graceful Restart
        3.1.3.2. OSPFv3 Graceful Restart Helper
      3.1.4. Virtual Links
      3.1.5. Neighbors and Adjacencies
        3.1.5.1. Broadcast and Point-to-Point Networks
        3.1.5.2. Non-Broadcast Multi-Access (NBMA) Networks
      3.1.6. Link-State Advertisements
      3.1.7. Metrics
      3.1.8. Authentication
      3.1.9. IP Subnets
      3.1.10. Preconfiguration Recommendations
      3.1.11. Multiple OSPF Instances
        3.1.11.1. Route Export Policies for OSPF
        3.1.11.2. Preventing Route Redistribution Loops
      3.1.12. Multi-Address Support for OSPFv3
      3.1.13. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
        3.1.13.1. IP FRR Configuration
          3.1.13.1.1. Reducing the Scope of the LFA Calculation by SPF
        3.1.13.2. ECMP Considerations
        3.1.13.3. IP FRR and RSVP Shortcut (IGP Shortcut)
        3.1.13.4. IP FRR and BGP Next Hop Resolution
        3.1.13.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
          3.1.13.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
          3.1.13.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
    3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
      3.2.1. Configuring a Route Next Hop Policy Template
        3.2.1.1. Configuring Affinity or Admin Group Constraints
        3.2.1.2. Configuring SRLG Group Constraints
        3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
        3.2.1.4. Configuring Protection Type and Next Hop Type Preferences
      3.2.2. Application of Route Next Hop Policy Template to an Interface
      3.2.3. Excluding Prefixes from LFA SPF
      3.2.4. Modification to LFA Next Hop Selection Algorithm
      3.2.5. Application of LFA Policy to a Segment Routing Node SID Tunnel
        3.2.5.1. Modification to the Remote LFA Selection Algorithm
        3.2.5.2. Modification to the TI-LFA Selection Algorithm
      3.2.6. Application of LFA Policy to Adjacency SID Tunnel
      3.2.7. Application of LFA Policy to Backup Node SID Tunnel
      3.2.8. Configuration Example
    3.3. LFA Protection Using Segment Routing Backup Node SID
      3.3.1. Configuring LFA Using Backup Node SID in OSPF
      3.3.2. Detailed Operation of LFA Protection Using Backup Node SID
      3.3.3. Duplicate SID Handling
      3.3.4. OSPF Control Plane Extensions
    3.4. Segment Routing in Shortest Path Forwarding
      3.4.1. OSPF Control Protocol Changes
      3.4.2. Announcing ELC, MSD-ERLD and MSD-BMI with OSPF
      3.4.3. Entropy Label for OSPF Segment Routing
      3.4.4. IPv6 Segment Routing using MPLS Encapsulation in OSPFv3
        3.4.4.1. OSPFv3 Extensions
      3.4.5. Segment Routing Traffic Statistics
      3.4.6. Class-Based Forwarding for SR-OSPF over RSVP-TE LSPs
    3.5. Segment Routing Mapping Server
      3.5.1. Segment Routing Mapping Server Prefix SID Resolution
    3.6. OSPF Link TE Attribute Reuse
      3.6.1. OSPF Application Specific TE Link Attributes
    3.7. SPF LSA Filtering
    3.8. FIB Prioritization
    3.9. Extended LSA Support in OSPFv3
    3.10. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
    3.11. OSPF Configuration Process Overview
    3.12. Configuration Notes
      3.12.1. General
        3.12.1.1. OSPF Defaults
    3.13. Configuring OSPF with CLI
      3.13.1. OSPF Configuration Guidelines
      3.13.2. Basic OSPF Configurations
        3.13.2.1. Configuring the Router ID
      3.13.3. Configuring OSPF Components
        3.13.3.1. Configuring OSPF Parameters
        3.13.3.2. Configuring OSPF3 Parameters
        3.13.3.3. Configuring an OSPF or OSPF3 Area
        3.13.3.4. Configuring a Stub Area
        3.13.3.5. Configuring a Not-So-Stubby Area
        3.13.3.6. Configuring a Virtual Link
        3.13.3.7. Configuring an Interface
        3.13.3.8. Configuring Authentication
          3.13.3.8.1. Overview
          3.13.3.8.2. Configuring Authentication Keys and Algorithms
          3.13.3.8.3. Configuring Authentication using Keychains
        3.13.3.9. Assigning a Designated Router
        3.13.3.10. Configuring Route Summaries
        3.13.3.11. Configuring Route Preferences
      3.13.4. Configuration Example of LFA Policy use in Remote LFA and TI-LFA
    3.14. OSPF Configuration Management Tasks
      3.14.1. Modifying a Router ID
      3.14.2. Deleting a Router ID
      3.14.3. Modifying OSPF Parameters
    3.15. OSPF Configuration Command Reference
      3.15.1. Command Hierarchies
        3.15.1.1. Configuration Commands
      3.15.2. Command Descriptions
        3.15.2.1. Generic Commands
        3.15.2.2. OSPF Global Commands
        3.15.2.3. OSPF Area Commands
        3.15.2.4. Interface/Virtual Link Commands
    3.16. Show, Clear, and Debug Command Reference
      3.16.1. Command Hierarchies
        3.16.1.1. Show Commands
        3.16.1.2. Clear Commands
        3.16.1.3. Debug Commands
        3.16.1.4. Tools Commands
      3.16.2. Command Descriptions
        3.16.2.1. Show Commands
        3.16.2.2. Clear Commands
        3.16.2.3. Debug Commands
        3.16.2.4. Tools Commands
  4. IS-IS
    4.1. Configuring IS-IS
      4.1.1. Routing
      4.1.2. IS-IS Frequently Used Terms
      4.1.3. ISO Network Addressing
        4.1.3.1. IS-IS PDU Configuration
        4.1.3.2. IS-IS Operations
      4.1.4. IS-IS Route Summarization
        4.1.4.1. Partial SPF Calculation
      4.1.5. IS-IS MT-Topology Support
        4.1.5.1. Native IPv6 Support
      4.1.6. IS-IS Administrative Tags
        4.1.6.1. Setting Route Tags
        4.1.6.2. Using Route Tags
        4.1.6.3. Unnumbered Interface Support
      4.1.7. Segment Routing in Shortest Path Forwarding
        4.1.7.1. Configuring Segment Routing in Shortest Path
        4.1.7.2. Announcing ELC, MSD-ERLD, and MSD-BMI with IS-IS
        4.1.7.3. Segment Routing Operational Procedures
          4.1.7.3.1. Prefix Advertisement and Resolution
          4.1.7.3.2. Error and Resource Exhaustion Handling
        4.1.7.4. Segment Routing Tunnel Management
          4.1.7.4.1. Tunnel MTU Determination
        4.1.7.5. Segment Routing Local Block
          4.1.7.5.1. Bundling Adjacencies in Adjacency Sets
        4.1.7.6. Entropy Label for IS-IS Segment Routing
        4.1.7.7. Remote LFA with Segment Routing
        4.1.7.8. Topology Independent LFA
          4.1.7.8.1. TI-LFA Configuration
          4.1.7.8.2. TI-LFA Link-Protect Operation
          4.1.7.8.3. Data Path Support
        4.1.7.9. Node Protection Support in TI-LFA and Remote LFA
          4.1.7.9.1. Feature Configuration
          4.1.7.9.2. TI-LFA Node-Protect Operation
          4.1.7.9.3. Remote LFA Node-Protect Operation
          4.1.7.9.4. TI-LFA and Remote LFA Node Protection Feature Interaction and Limitations
        4.1.7.10. IPv6 Segment Routing using MPLS Encapsulation
          4.1.7.10.1. IS-IS MT=0 Extensions
          4.1.7.10.2. Service and Forwarding Contexts Supported
          4.1.7.10.3. Services Using SDP with a SR IPv6 Tunnel
        4.1.7.11. Data Path Support
          4.1.7.11.1. Hash Label and Entropy Label Support
        4.1.7.12. IS-IS Control Protocol Changes
          4.1.7.12.1. IS-IS Control Protocol Changes
        4.1.7.13. BGP Shortcut Using Segment Routing Tunnel
        4.1.7.14. BGP Label Route Resolution Using Segment Routing Tunnel
        4.1.7.15. Service Packet Forwarding with Segment Routing
        4.1.7.16. Mirror Services and Lawful Intercept
        4.1.7.17. Class-Based Forwarding for SR-ISIS over RSVP-TE LSPs
        4.1.7.18. Segment Routing Traffic Statistics
      4.1.8. Segment Routing Mapping Server Function for IPv4 Prefixes
        4.1.8.1. Segment Routing Mapping Server
        4.1.8.2. Prefix SID Resolution for Segment Routing Mapping Server
      4.1.9. Micro-Loop Avoidance Using Loop-Free SR Tunnels (IS-IS)
        4.1.9.1. Configuring Micro-loop Avoidance
        4.1.9.2. Micro-Loop Avoidance Algorithm Steps
        4.1.9.3. Micro-Loop Avoidance for Link Addition, Restoration, or Metric Decrease
        4.1.9.4. Micro-Loop Avoidance for Link Removal, Failure, or Metric Increase
    4.2. FIB Prioritization
    4.3. IS-IS Graceful Restart Helper
      4.3.1. BFD Interaction with Graceful Restart
    4.4. IS-IS Configuration Process Overview
    4.5. Configuration Notes
      4.5.1. General
    4.6. Configuring IS-IS with CLI
      4.6.1. IS-IS Configuration Overview
        4.6.1.1. Router Levels
        4.6.1.2. Area Address Attributes
        4.6.1.3. Interface Level Capacity
        4.6.1.4. Route Leaking
      4.6.2. Basic IS-IS Configuration
      4.6.3. Common Configuration Tasks
      4.6.4. Configuring IS-IS Components
        4.6.4.1. Enabling IS-IS
        4.6.4.2. Modifying Router-Level Parameters
        4.6.4.3. Configuring ISO Area Addresses
        4.6.4.4. Configuring Global IS-IS Parameters
        4.6.4.5. Migration to IS-IS Multi-Topology
        4.6.4.6. Configuring Interface Parameters
          4.6.4.6.1. Example: Configuring a Level 1 Area
          4.6.4.6.2. Example: Modifying a Router’s Level Capability
        4.6.4.7. Configuring IS-IS Link Groups
    4.7. IS-IS Configuration Management Tasks
      4.7.1. Disabling IS-IS
      4.7.2. Removing IS-IS
      4.7.3. Modifying Global IS-IS Parameters
      4.7.4. Modifying IS-IS Interface Parameters
      4.7.5. Configuring Authentication using Keychains
      4.7.6. Configuring Leaking
      4.7.7. Redistributing External IS-IS Routers
      4.7.8. Specifying MAC Addresses for All IS-IS Routers
    4.8. Configuring IS-IS for Flexible Algorithms
      4.8.1. Configuring the Flexible Algorithm Definition
      4.8.2. Configuring IS-IS Flex-Algorithm Participation
      4.8.3. Configuring IS-IS Flex-Algorithm Prefix Node SID
      4.8.4. Verifying Basic Flex-Algorithm Behavior
      4.8.5. Configuration and Usage Considerations for Flex-Algorithms
    4.9. IS-IS Configuration Command Reference
      4.9.1. Command Hierarchies
        4.9.1.1. Configuration Commands
      4.9.2. Command Descriptions
        4.9.2.1. Generic Commands
        4.9.2.2. IS-IS Commands
    4.10. Show, Clear, and Debug Command Reference
      4.10.1. Command Hierarchies
        4.10.1.1. Show Commands
        4.10.1.2. Clear Commands
        4.10.1.3. Debug Commands
        4.10.1.4. Tools Commands
      4.10.2. Command Descriptions
        4.10.2.1. Show Commands
        4.10.2.2. Clear Commands
        4.10.2.3. Debug Commands
        4.10.2.4. Tools Commands
  5. BGP
    5.1. BGP Overview
    5.2. BGP Sessions
      5.2.1. BGP Session States
      5.2.2. Detecting BGP Session Failures
        5.2.2.1. Peer Tracking
        5.2.2.2. Bidirectional Forwarding Detection (BFD)
        5.2.2.3. Fast External Failover
      5.2.3. High Availability BGP Sessions
        5.2.3.1. BGP Graceful Restart
        5.2.3.2. BGP Long-Lived Graceful Restart
          5.2.3.2.1. LLGR Operations
          5.2.3.2.2. Receiving Routes with LLGR_STALE Community
      5.2.4. BGP Session Security
        5.2.4.1. TCP MD5 Authentication
        5.2.4.2. TTL Security Mechanism
      5.2.5. BGP Address Family Support for Different Session Types
      5.2.6. BGP Groups
    5.3. BGP Design Concepts
      5.3.1. Route Reflection
      5.3.2. BGP Confederations
    5.4. BGP Messages
      5.4.1. Open Message
        5.4.1.1. Changing the Autonomous System Number
        5.4.1.2. Changing a Confederation Number
        5.4.1.3. BGP Advertisement
      5.4.2. Update Message
      5.4.3. Keepalive Message
      5.4.4. Notification Message
        5.4.4.1. UPDATE Message Error Handling
      5.4.5. Route Refresh Message
    5.5. BGP Path Attributes
      5.5.1. Origin
      5.5.2. AS Path
        5.5.2.1. AS Override
        5.5.2.2. Using Local AS for ASN Migration
        5.5.2.3. 4-Octet Autonomous System Numbers
      5.5.3. Next-Hop
        5.5.3.1. Unlabeled IPv4 Unicast Routes
        5.5.3.2. Unlabeled IPv6 Unicast Routes
        5.5.3.3. VPN-IPv4 Routes
        5.5.3.4. VPN-IPv6 Routes
        5.5.3.5. Label-IPv4 Routes
        5.5.3.6. Label-IPv6 Routes
        5.5.3.7. Next-Hop Resolution
          5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
          5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
          5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
        5.5.3.8. Next-Hop Tracking
        5.5.3.9. Next-Hop Indirection
        5.5.3.10. Entropy Label for RFC 3107 BGP Labeled Routes
      5.5.4. MED
        5.5.4.1. Deterministic MED
      5.5.5. Local Preference
      5.5.6. Route Aggregation Path Attributes
      5.5.7. Community Attributes
        5.5.7.1. Standard Communities
        5.5.7.2. Extended Communities
        5.5.7.3. Large Communities
      5.5.8. Route Reflection Attributes
      5.5.9. Multi-Protocol BGP Attributes
      5.5.10. 4-Octet AS Attributes
      5.5.11. AIGP Metric
    5.6. BGP Routing Information Base (RIB)
      5.6.1. RIB-IN Features
        5.6.1.1. BGP Import Policies
      5.6.2. LOC-RIB Features
        5.6.2.1. BGP Decision Process
          5.6.2.1.1. Always Compare MED
          5.6.2.1.2. Ignore Next-Hop Metric
        5.6.2.2. BGP Route Installation in the Route Table
        5.6.2.3. Weighted ECMP for BGP Routes
        5.6.2.4. BGP Route Installation in the Tunnel Table
        5.6.2.5. BGP Fast Reroute
          5.6.2.5.1. Calculating Backup Paths
          5.6.2.5.2. Failure Detection and Switchover to the Backup Path
        5.6.2.6. QoS Policy Propagation via BGP (QPPB)
        5.6.2.7. BGP Policy Accounting
        5.6.2.8. Route Flap Damping (RFD)
      5.6.3. RIB-OUT Features
        5.6.3.1. BGP Export Policies
        5.6.3.2. Outbound Route Filtering (ORF)
        5.6.3.3. RT Constrained Route Distribution
        5.6.3.4. Min Route Advertisement Interval (MRAI)
        5.6.3.5. Advertise-Inactive
        5.6.3.6. Best-External
        5.6.3.7. Add-Paths
          5.6.3.7.1. Path Selection with Add-Paths
        5.6.3.8. Split-Horizon
    5.7. BGP Monitoring Protocol
    5.8. BGP Applications
      5.8.1. BGP FlowSpec
        5.8.1.1. Validating Received FlowSpec Routes
        5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
      5.8.2. Configuration of TTL Propagation for BGP Label Routes
        5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
        5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
      5.8.3. BGP Prefix Origin Validation
      5.8.4. BGP Route Leaking
      5.8.5. BGP Optimal Route Reflection
      5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      5.8.7. BGP-LS
        5.8.7.1. Supported BGP-LS components
      5.8.8. BGP Segment Routing
    5.9. BFD Support for BGP
    5.10. BGP Configuration Process Overview
    5.11. Configuration Notes
      5.11.1. General
        5.11.1.1. BGP Defaults
        5.11.1.2. BGP MIB Notes
    5.12. Configuring BGP with CLI
      5.12.1. Configuration Overview
        5.12.1.1. Preconfiguration Requirements
        5.12.1.2. BGP Hierarchy
        5.12.1.3. Internal and External BGP Configuration
        5.12.1.4. Default External BGP Route Propagation Behavior without Policies
      5.12.2. Basic BGP Configuration
      5.12.3. Common Configuration Tasks
        5.12.3.1. Creating an Autonomous System
        5.12.3.2. Configuring a Router ID
        5.12.3.3. BGP Confederations
        5.12.3.4. BGP Router Reflectors
        5.12.3.5. BGP Components
          5.12.3.5.1. Configuring Group Attributes
          5.12.3.5.2. Configuring Neighbor Attributes
          5.12.3.5.3. Configuring Route Reflection
          5.12.3.5.4. Configuring a Confederation
          5.12.3.5.5. Configuring BMP
    5.13. BGP Configuration Management Tasks
      5.13.1. Modifying an AS Number
      5.13.2. Modifying a Confederation Number
      5.13.3. Modifying the BGP Router ID
      5.13.4. Modifying the Router-Level Router ID
      5.13.5. Deleting a Neighbor
      5.13.6. Deleting Groups
    5.14. BGP Command Reference
      5.14.1. Command Hierarchies
        5.14.1.1. Global BGP Commands
        5.14.1.2. Group BGP Commands
        5.14.1.3. Neighbor BGP Commands
        5.14.1.4. BGP BMP Commands
        5.14.1.5. Other BGP-Related Commands
      5.14.2. Command Descriptions
        5.14.2.1. Generic Commands
        5.14.2.2. BGP Commands
        5.14.2.3. BGP BMP Commands
        5.14.2.4. Other BGP-Related Commands
    5.15. Show, Clear, and Debug Command Reference
      5.15.1. Command Hierarchies
        5.15.1.1. Show Commands
        5.15.1.2. Clear Commands
        5.15.1.3. Debug Commands
      5.15.2. Command Descriptions
        5.15.2.1. Show Commands
        5.15.2.2. Clear Commands
        5.15.2.3. Debug Commands
  6. Route Policies
    6.1. Configuring Route Policies
      6.1.1. Policy Statements
        6.1.1.1. Policy Statement Chaining and Logical Expressions
        6.1.1.2. Routing Policy Subroutines
        6.1.1.3. Policy Evaluation Command
        6.1.1.4. Exclusive Editing for Policy Configuration
        6.1.1.5. Default Action Behavior
        6.1.1.6. Denied IP Unicast Prefixes
        6.1.1.7. Controlling Route Flapping
      6.1.2. Regular Expressions
      6.1.3. BGP and OSPF Route Policy Support
        6.1.3.1. BGP Route Policies
        6.1.3.2. Re-advertised Route Policies
        6.1.3.3. Triggered Policies
        6.1.3.4. Set MED to IGP Cost using Route Policies
        6.1.3.5. BGP Policy Subroutines
        6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
      6.1.4. Routing Policy Parameterization
      6.1.5. When to Use Route Policies
    6.2. Route Policy Configuration Process Overview
    6.3. Configuration Notes
      6.3.1. General
      6.3.2. Policy Reference Checks
        6.3.2.1. Known Limitations
    6.4. Configuring Route Policies with CLI
      6.4.1. Route Policy Configuration Overview
        6.4.1.1. When to Create Routing Policies
        6.4.1.2. Default Route Policy Actions
        6.4.1.3. Policy Evaluation
        6.4.1.4. Damping
      6.4.2. Basic Configurations
      6.4.3. Configuring Route Policy Components
        6.4.3.1. Beginning the Policy Statement
        6.4.3.2. Creating a Route Policy
        6.4.3.3. Configuring a Default Action
        6.4.3.4. Configuring an Entry
        6.4.3.5. Configuring a Community List
        6.4.3.6. Configuring Damping
        6.4.3.7. Configuring a Prefix List
    6.5. Route Policy Configuration Management Tasks
      6.5.1. Editing Policy Statements and Parameters
      6.5.2. Deleting an Entry
      6.5.3. Deleting a Policy Statement
    6.6. Route Policy Command Reference
      6.6.1. Command Hierarchies
        6.6.1.1. Route Policy Configuration Commands
        6.6.1.2. Segment Routing Commands
      6.6.2. Command Descriptions
        6.6.2.1. Generic Commands
        6.6.2.2. Segment Routing
        6.6.2.3. Route Policy Options
        6.6.2.4. Route Policy Damping Commands
        6.6.2.5. Route Policy Prefix Commands
        6.6.2.6. Route Policy Entry Match Commands
        6.6.2.7. Route Policy Action Commands
    6.7. Show, and Clear Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Show Commands
        6.7.1.2. Clear Commands
      6.7.2. Command Descriptions
        6.7.2.1. Show Commands
        6.7.2.2. Clear Commands
  7. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. RIP
    2.1. RIP Overview
      2.1.1. RIP Features
        2.1.1.1. RIP Version Types
        2.1.1.2. RIPv2 Authentication
        2.1.1.3. RIP Packet Format
          2.1.1.3.1. RIPv1 Format
          2.1.1.3.2. RIPv2 Format
        2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
    2.2. RIPng
      2.2.1. RIPng Protocol
    2.3. Common Attributes
      2.3.1. Metrics
      2.3.2. Timers
      2.3.3. Import and Export Policies
      2.3.4. Hierarchical Levels
    2.4. RIP Configuration Process Overview
    2.5. Configuration Notes
      2.5.1. General
    2.6. Configuring RIP with CLI
      2.6.1. RIP and RIPng Configuration Overview
        2.6.1.1. Preconfiguration Requirements
        2.6.1.2. RIP Hierarchy
      2.6.2. Basic RIP Configuration
      2.6.3. Common Configuration Tasks
        2.6.3.1. Configuring Interfaces
        2.6.3.2. Configuring a Route Policy
        2.6.3.3. Configuring RIP Parameters
        2.6.3.4. Configuring Global-Level Parameters
        2.6.3.5. Configuring Group-Level Parameters
        2.6.3.6. Configuring Neighbor-Level Parameters
    2.7. RIP Configuration Management Tasks
      2.7.1. Modifying RIP Parameters
      2.7.2. Deleting a Group
      2.7.3. Deleting a Neighbor
    2.8. RIP Configuration Command Reference
      2.8.1. Command Hierarchies
        2.8.1.1. Configuration Commands
          2.8.1.1.1. Group Commands
          2.8.1.1.2. Neighbor Commands
        2.8.1.2. RIPng Configuration Commands
          2.8.1.2.1. Group Commands
          2.8.1.2.2. Neighbor Commands
      2.8.2. Command Descriptions
        2.8.2.1. Generic Commands
        2.8.2.2. RIP Commands
    2.9. Show, Clear, and Debug Command Reference
      2.9.1. Command Hierarchies
        2.9.1.1. Show Commands
        2.9.1.2. Clear Commands
        2.9.1.3. Debug Commands
      2.9.2. Command Descriptions
        2.9.2.1. Show Commands
        2.9.2.2. Clear Commands
        2.9.2.3. Debug RIP Commands
  3. OSPF
    3.1. Configuring OSPF
      3.1.1. OSPF Areas
        3.1.1.1. Backbone Area
        3.1.1.2. Stub Area
        3.1.1.3. Not-So-Stubby Area
          3.1.1.3.1. OSPF Super Backbone
          3.1.1.3.2. Sham Links
          3.1.1.3.3. Implementing the OSPF Super Backbone
          3.1.1.3.4. Loop Avoidance
          3.1.1.3.5. DN-BIT
          3.1.1.3.6. Route Tag
          3.1.1.3.7. Sham Links
      3.1.2. OSPFv3 Authentication
      3.1.3. OSPF Graceful Restart Helper
        3.1.3.1. BFD Interaction with Graceful Restart
        3.1.3.2. OSPFv3 Graceful Restart Helper
      3.1.4. Virtual Links
      3.1.5. Neighbors and Adjacencies
        3.1.5.1. Broadcast and Point-to-Point Networks
        3.1.5.2. Non-Broadcast Multi-Access (NBMA) Networks
      3.1.6. Link-State Advertisements
      3.1.7. Metrics
      3.1.8. Authentication
      3.1.9. IP Subnets
      3.1.10. Preconfiguration Recommendations
      3.1.11. Multiple OSPF Instances
        3.1.11.1. Route Export Policies for OSPF
        3.1.11.2. Preventing Route Redistribution Loops
      3.1.12. Multi-Address Support for OSPFv3
      3.1.13. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
        3.1.13.1. IP FRR Configuration
          3.1.13.1.1. Reducing the Scope of the LFA Calculation by SPF
        3.1.13.2. ECMP Considerations
        3.1.13.3. IP FRR and RSVP Shortcut (IGP Shortcut)
        3.1.13.4. IP FRR and BGP Next Hop Resolution
        3.1.13.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
          3.1.13.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
          3.1.13.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
    3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
      3.2.1. Configuring a Route Next Hop Policy Template
        3.2.1.1. Configuring Affinity or Admin Group Constraints
        3.2.1.2. Configuring SRLG Group Constraints
        3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
        3.2.1.4. Configuring Protection Type and Next Hop Type Preferences
      3.2.2. Application of Route Next Hop Policy Template to an Interface
      3.2.3. Excluding Prefixes from LFA SPF
      3.2.4. Modification to LFA Next Hop Selection Algorithm
      3.2.5. Application of LFA Policy to a Segment Routing Node SID Tunnel
        3.2.5.1. Modification to the Remote LFA Selection Algorithm
        3.2.5.2. Modification to the TI-LFA Selection Algorithm
      3.2.6. Application of LFA Policy to Adjacency SID Tunnel
      3.2.7. Application of LFA Policy to Backup Node SID Tunnel
      3.2.8. Configuration Example
    3.3. LFA Protection Using Segment Routing Backup Node SID
      3.3.1. Configuring LFA Using Backup Node SID in OSPF
      3.3.2. Detailed Operation of LFA Protection Using Backup Node SID
      3.3.3. Duplicate SID Handling
      3.3.4. OSPF Control Plane Extensions
    3.4. Segment Routing in Shortest Path Forwarding
      3.4.1. OSPF Control Protocol Changes
      3.4.2. Announcing ELC, MSD-ERLD and MSD-BMI with OSPF
      3.4.3. Entropy Label for OSPF Segment Routing
      3.4.4. IPv6 Segment Routing using MPLS Encapsulation in OSPFv3
        3.4.4.1. OSPFv3 Extensions
      3.4.5. Segment Routing Traffic Statistics
      3.4.6. Class-Based Forwarding for SR-OSPF over RSVP-TE LSPs
    3.5. Segment Routing Mapping Server
      3.5.1. Segment Routing Mapping Server Prefix SID Resolution
    3.6. OSPF Link TE Attribute Reuse
      3.6.1. OSPF Application Specific TE Link Attributes
    3.7. SPF LSA Filtering
    3.8. FIB Prioritization
    3.9. Extended LSA Support in OSPFv3
    3.10. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
    3.11. OSPF Configuration Process Overview
    3.12. Configuration Notes
      3.12.1. General
        3.12.1.1. OSPF Defaults
    3.13. Configuring OSPF with CLI
      3.13.1. OSPF Configuration Guidelines
      3.13.2. Basic OSPF Configurations
        3.13.2.1. Configuring the Router ID
      3.13.3. Configuring OSPF Components
        3.13.3.1. Configuring OSPF Parameters
        3.13.3.2. Configuring OSPF3 Parameters
        3.13.3.3. Configuring an OSPF or OSPF3 Area
        3.13.3.4. Configuring a Stub Area
        3.13.3.5. Configuring a Not-So-Stubby Area
        3.13.3.6. Configuring a Virtual Link
        3.13.3.7. Configuring an Interface
        3.13.3.8. Configuring Authentication
          3.13.3.8.1. Overview
          3.13.3.8.2. Configuring Authentication Keys and Algorithms
          3.13.3.8.3. Configuring Authentication using Keychains
        3.13.3.9. Assigning a Designated Router
        3.13.3.10. Configuring Route Summaries
        3.13.3.11. Configuring Route Preferences
      3.13.4. Configuration Example of LFA Policy use in Remote LFA and TI-LFA
    3.14. OSPF Configuration Management Tasks
      3.14.1. Modifying a Router ID
      3.14.2. Deleting a Router ID
      3.14.3. Modifying OSPF Parameters
    3.15. OSPF Configuration Command Reference
      3.15.1. Command Hierarchies
        3.15.1.1. Configuration Commands
      3.15.2. Command Descriptions
        3.15.2.1. Generic Commands
        3.15.2.2. OSPF Global Commands
        3.15.2.3. OSPF Area Commands
        3.15.2.4. Interface/Virtual Link Commands
    3.16. Show, Clear, and Debug Command Reference
      3.16.1. Command Hierarchies
        3.16.1.1. Show Commands
        3.16.1.2. Clear Commands
        3.16.1.3. Debug Commands
        3.16.1.4. Tools Commands
      3.16.2. Command Descriptions
        3.16.2.1. Show Commands
        3.16.2.2. Clear Commands
        3.16.2.3. Debug Commands
        3.16.2.4. Tools Commands
  4. IS-IS
    4.1. Configuring IS-IS
      4.1.1. Routing
      4.1.2. IS-IS Frequently Used Terms
      4.1.3. ISO Network Addressing
        4.1.3.1. IS-IS PDU Configuration
        4.1.3.2. IS-IS Operations
      4.1.4. IS-IS Route Summarization
        4.1.4.1. Partial SPF Calculation
      4.1.5. IS-IS MT-Topology Support
        4.1.5.1. Native IPv6 Support
      4.1.6. IS-IS Administrative Tags
        4.1.6.1. Setting Route Tags
        4.1.6.2. Using Route Tags
        4.1.6.3. Unnumbered Interface Support
      4.1.7. Segment Routing in Shortest Path Forwarding
        4.1.7.1. Configuring Segment Routing in Shortest Path
        4.1.7.2. Announcing ELC, MSD-ERLD, and MSD-BMI with IS-IS
        4.1.7.3. Segment Routing Operational Procedures
          4.1.7.3.1. Prefix Advertisement and Resolution
          4.1.7.3.2. Error and Resource Exhaustion Handling
        4.1.7.4. Segment Routing Tunnel Management
          4.1.7.4.1. Tunnel MTU Determination
        4.1.7.5. Segment Routing Local Block
          4.1.7.5.1. Bundling Adjacencies in Adjacency Sets
        4.1.7.6. Entropy Label for IS-IS Segment Routing
        4.1.7.7. Remote LFA with Segment Routing
        4.1.7.8. Topology Independent LFA
          4.1.7.8.1. TI-LFA Configuration
          4.1.7.8.2. TI-LFA Link-Protect Operation
          4.1.7.8.3. Data Path Support
        4.1.7.9. Node Protection Support in TI-LFA and Remote LFA
          4.1.7.9.1. Feature Configuration
          4.1.7.9.2. TI-LFA Node-Protect Operation
          4.1.7.9.3. Remote LFA Node-Protect Operation
          4.1.7.9.4. TI-LFA and Remote LFA Node Protection Feature Interaction and Limitations
        4.1.7.10. IPv6 Segment Routing using MPLS Encapsulation
          4.1.7.10.1. IS-IS MT=0 Extensions
          4.1.7.10.2. Service and Forwarding Contexts Supported
          4.1.7.10.3. Services Using SDP with a SR IPv6 Tunnel
        4.1.7.11. Data Path Support
          4.1.7.11.1. Hash Label and Entropy Label Support
        4.1.7.12. IS-IS Control Protocol Changes
          4.1.7.12.1. IS-IS Control Protocol Changes
        4.1.7.13. BGP Shortcut Using Segment Routing Tunnel
        4.1.7.14. BGP Label Route Resolution Using Segment Routing Tunnel
        4.1.7.15. Service Packet Forwarding with Segment Routing
        4.1.7.16. Mirror Services and Lawful Intercept
        4.1.7.17. Class-Based Forwarding for SR-ISIS over RSVP-TE LSPs
        4.1.7.18. Segment Routing Traffic Statistics
      4.1.8. Segment Routing Mapping Server Function for IPv4 Prefixes
        4.1.8.1. Segment Routing Mapping Server
        4.1.8.2. Prefix SID Resolution for Segment Routing Mapping Server
      4.1.9. Micro-Loop Avoidance Using Loop-Free SR Tunnels (IS-IS)
        4.1.9.1. Configuring Micro-loop Avoidance
        4.1.9.2. Micro-Loop Avoidance Algorithm Steps
        4.1.9.3. Micro-Loop Avoidance for Link Addition, Restoration, or Metric Decrease
        4.1.9.4. Micro-Loop Avoidance for Link Removal, Failure, or Metric Increase
    4.2. FIB Prioritization
    4.3. IS-IS Graceful Restart Helper
      4.3.1. BFD Interaction with Graceful Restart
    4.4. IS-IS Configuration Process Overview
    4.5. Configuration Notes
      4.5.1. General
    4.6. Configuring IS-IS with CLI
      4.6.1. IS-IS Configuration Overview
        4.6.1.1. Router Levels
        4.6.1.2. Area Address Attributes
        4.6.1.3. Interface Level Capacity
        4.6.1.4. Route Leaking
      4.6.2. Basic IS-IS Configuration
      4.6.3. Common Configuration Tasks
      4.6.4. Configuring IS-IS Components
        4.6.4.1. Enabling IS-IS
        4.6.4.2. Modifying Router-Level Parameters
        4.6.4.3. Configuring ISO Area Addresses
        4.6.4.4. Configuring Global IS-IS Parameters
        4.6.4.5. Migration to IS-IS Multi-Topology
        4.6.4.6. Configuring Interface Parameters
          4.6.4.6.1. Example: Configuring a Level 1 Area
          4.6.4.6.2. Example: Modifying a Router’s Level Capability
        4.6.4.7. Configuring IS-IS Link Groups
    4.7. IS-IS Configuration Management Tasks
      4.7.1. Disabling IS-IS
      4.7.2. Removing IS-IS
      4.7.3. Modifying Global IS-IS Parameters
      4.7.4. Modifying IS-IS Interface Parameters
      4.7.5. Configuring Authentication using Keychains
      4.7.6. Configuring Leaking
      4.7.7. Redistributing External IS-IS Routers
      4.7.8. Specifying MAC Addresses for All IS-IS Routers
    4.8. Configuring IS-IS for Flexible Algorithms
      4.8.1. Configuring the Flexible Algorithm Definition
      4.8.2. Configuring IS-IS Flex-Algorithm Participation
      4.8.3. Configuring IS-IS Flex-Algorithm Prefix Node SID
      4.8.4. Verifying Basic Flex-Algorithm Behavior
      4.8.5. Configuration and Usage Considerations for Flex-Algorithms
    4.9. IS-IS Configuration Command Reference
      4.9.1. Command Hierarchies
        4.9.1.1. Configuration Commands
      4.9.2. Command Descriptions
        4.9.2.1. Generic Commands
        4.9.2.2. IS-IS Commands
    4.10. Show, Clear, and Debug Command Reference
      4.10.1. Command Hierarchies
        4.10.1.1. Show Commands
        4.10.1.2. Clear Commands
        4.10.1.3. Debug Commands
        4.10.1.4. Tools Commands
      4.10.2. Command Descriptions
        4.10.2.1. Show Commands
        4.10.2.2. Clear Commands
        4.10.2.3. Debug Commands
        4.10.2.4. Tools Commands
  5. BGP
    5.1. BGP Overview
    5.2. BGP Sessions
      5.2.1. BGP Session States
      5.2.2. Detecting BGP Session Failures
        5.2.2.1. Peer Tracking
        5.2.2.2. Bidirectional Forwarding Detection (BFD)
        5.2.2.3. Fast External Failover
      5.2.3. High Availability BGP Sessions
        5.2.3.1. BGP Graceful Restart
        5.2.3.2. BGP Long-Lived Graceful Restart
          5.2.3.2.1. LLGR Operations
          5.2.3.2.2. Receiving Routes with LLGR_STALE Community
      5.2.4. BGP Session Security
        5.2.4.1. TCP MD5 Authentication
        5.2.4.2. TTL Security Mechanism
      5.2.5. BGP Address Family Support for Different Session Types
      5.2.6. BGP Groups
    5.3. BGP Design Concepts
      5.3.1. Route Reflection
      5.3.2. BGP Confederations
    5.4. BGP Messages
      5.4.1. Open Message
        5.4.1.1. Changing the Autonomous System Number
        5.4.1.2. Changing a Confederation Number
        5.4.1.3. BGP Advertisement
      5.4.2. Update Message
      5.4.3. Keepalive Message
      5.4.4. Notification Message
        5.4.4.1. UPDATE Message Error Handling
      5.4.5. Route Refresh Message
    5.5. BGP Path Attributes
      5.5.1. Origin
      5.5.2. AS Path
        5.5.2.1. AS Override
        5.5.2.2. Using Local AS for ASN Migration
        5.5.2.3. 4-Octet Autonomous System Numbers
      5.5.3. Next-Hop
        5.5.3.1. Unlabeled IPv4 Unicast Routes
        5.5.3.2. Unlabeled IPv6 Unicast Routes
        5.5.3.3. VPN-IPv4 Routes
        5.5.3.4. VPN-IPv6 Routes
        5.5.3.5. Label-IPv4 Routes
        5.5.3.6. Label-IPv6 Routes
        5.5.3.7. Next-Hop Resolution
          5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
          5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
          5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
        5.5.3.8. Next-Hop Tracking
        5.5.3.9. Next-Hop Indirection
        5.5.3.10. Entropy Label for RFC 3107 BGP Labeled Routes
      5.5.4. MED
        5.5.4.1. Deterministic MED
      5.5.5. Local Preference
      5.5.6. Route Aggregation Path Attributes
      5.5.7. Community Attributes
        5.5.7.1. Standard Communities
        5.5.7.2. Extended Communities
        5.5.7.3. Large Communities
      5.5.8. Route Reflection Attributes
      5.5.9. Multi-Protocol BGP Attributes
      5.5.10. 4-Octet AS Attributes
      5.5.11. AIGP Metric
    5.6. BGP Routing Information Base (RIB)
      5.6.1. RIB-IN Features
        5.6.1.1. BGP Import Policies
      5.6.2. LOC-RIB Features
        5.6.2.1. BGP Decision Process
          5.6.2.1.1. Always Compare MED
          5.6.2.1.2. Ignore Next-Hop Metric
        5.6.2.2. BGP Route Installation in the Route Table
        5.6.2.3. Weighted ECMP for BGP Routes
        5.6.2.4. BGP Route Installation in the Tunnel Table
        5.6.2.5. BGP Fast Reroute
          5.6.2.5.1. Calculating Backup Paths
          5.6.2.5.2. Failure Detection and Switchover to the Backup Path
        5.6.2.6. QoS Policy Propagation via BGP (QPPB)
        5.6.2.7. BGP Policy Accounting
        5.6.2.8. Route Flap Damping (RFD)
      5.6.3. RIB-OUT Features
        5.6.3.1. BGP Export Policies
        5.6.3.2. Outbound Route Filtering (ORF)
        5.6.3.3. RT Constrained Route Distribution
        5.6.3.4. Min Route Advertisement Interval (MRAI)
        5.6.3.5. Advertise-Inactive
        5.6.3.6. Best-External
        5.6.3.7. Add-Paths
          5.6.3.7.1. Path Selection with Add-Paths
        5.6.3.8. Split-Horizon
    5.7. BGP Monitoring Protocol
    5.8. BGP Applications
      5.8.1. BGP FlowSpec
        5.8.1.1. Validating Received FlowSpec Routes
        5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
      5.8.2. Configuration of TTL Propagation for BGP Label Routes
        5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
        5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
      5.8.3. BGP Prefix Origin Validation
      5.8.4. BGP Route Leaking
      5.8.5. BGP Optimal Route Reflection
      5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
      5.8.7. BGP-LS
        5.8.7.1. Supported BGP-LS components
      5.8.8. BGP Segment Routing
    5.9. BFD Support for BGP
    5.10. BGP Configuration Process Overview
    5.11. Configuration Notes
      5.11.1. General
        5.11.1.1. BGP Defaults
        5.11.1.2. BGP MIB Notes
    5.12. Configuring BGP with CLI
      5.12.1. Configuration Overview
        5.12.1.1. Preconfiguration Requirements
        5.12.1.2. BGP Hierarchy
        5.12.1.3. Internal and External BGP Configuration
        5.12.1.4. Default External BGP Route Propagation Behavior without Policies
      5.12.2. Basic BGP Configuration
      5.12.3. Common Configuration Tasks
        5.12.3.1. Creating an Autonomous System
        5.12.3.2. Configuring a Router ID
        5.12.3.3. BGP Confederations
        5.12.3.4. BGP Router Reflectors
        5.12.3.5. BGP Components
          5.12.3.5.1. Configuring Group Attributes
          5.12.3.5.2. Configuring Neighbor Attributes
          5.12.3.5.3. Configuring Route Reflection
          5.12.3.5.4. Configuring a Confederation
          5.12.3.5.5. Configuring BMP
    5.13. BGP Configuration Management Tasks
      5.13.1. Modifying an AS Number
      5.13.2. Modifying a Confederation Number
      5.13.3. Modifying the BGP Router ID
      5.13.4. Modifying the Router-Level Router ID
      5.13.5. Deleting a Neighbor
      5.13.6. Deleting Groups
    5.14. BGP Command Reference
      5.14.1. Command Hierarchies
        5.14.1.1. Global BGP Commands
        5.14.1.2. Group BGP Commands
        5.14.1.3. Neighbor BGP Commands
        5.14.1.4. BGP BMP Commands
        5.14.1.5. Other BGP-Related Commands
      5.14.2. Command Descriptions
        5.14.2.1. Generic Commands
        5.14.2.2. BGP Commands
        5.14.2.3. BGP BMP Commands
        5.14.2.4. Other BGP-Related Commands
    5.15. Show, Clear, and Debug Command Reference
      5.15.1. Command Hierarchies
        5.15.1.1. Show Commands
        5.15.1.2. Clear Commands
        5.15.1.3. Debug Commands
      5.15.2. Command Descriptions
        5.15.2.1. Show Commands
        5.15.2.2. Clear Commands
        5.15.2.3. Debug Commands
  6. Route Policies
    6.1. Configuring Route Policies
      6.1.1. Policy Statements
        6.1.1.1. Policy Statement Chaining and Logical Expressions
        6.1.1.2. Routing Policy Subroutines
        6.1.1.3. Policy Evaluation Command
        6.1.1.4. Exclusive Editing for Policy Configuration
        6.1.1.5. Default Action Behavior
        6.1.1.6. Denied IP Unicast Prefixes
        6.1.1.7. Controlling Route Flapping
      6.1.2. Regular Expressions
      6.1.3. BGP and OSPF Route Policy Support
        6.1.3.1. BGP Route Policies
        6.1.3.2. Re-advertised Route Policies
        6.1.3.3. Triggered Policies
        6.1.3.4. Set MED to IGP Cost using Route Policies
        6.1.3.5. BGP Policy Subroutines
        6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
      6.1.4. Routing Policy Parameterization
      6.1.5. When to Use Route Policies
    6.2. Route Policy Configuration Process Overview
    6.3. Configuration Notes
      6.3.1. General
      6.3.2. Policy Reference Checks
        6.3.2.1. Known Limitations
    6.4. Configuring Route Policies with CLI
      6.4.1. Route Policy Configuration Overview
        6.4.1.1. When to Create Routing Policies
        6.4.1.2. Default Route Policy Actions
        6.4.1.3. Policy Evaluation
        6.4.1.4. Damping
      6.4.2. Basic Configurations
      6.4.3. Configuring Route Policy Components
        6.4.3.1. Beginning the Policy Statement
        6.4.3.2. Creating a Route Policy
        6.4.3.3. Configuring a Default Action
        6.4.3.4. Configuring an Entry
        6.4.3.5. Configuring a Community List
        6.4.3.6. Configuring Damping
        6.4.3.7. Configuring a Prefix List
    6.5. Route Policy Configuration Management Tasks
      6.5.1. Editing Policy Statements and Parameters
      6.5.2. Deleting an Entry
      6.5.3. Deleting a Policy Statement
    6.6. Route Policy Command Reference
      6.6.1. Command Hierarchies
        6.6.1.1. Route Policy Configuration Commands
        6.6.1.2. Segment Routing Commands
      6.6.2. Command Descriptions
        6.6.2.1. Generic Commands
        6.6.2.2. Segment Routing
        6.6.2.3. Route Policy Options
        6.6.2.4. Route Policy Damping Commands
        6.6.2.5. Route Policy Prefix Commands
        6.6.2.6. Route Policy Entry Match Commands
        6.6.2.7. Route Policy Action Commands
    6.7. Show, and Clear Command Reference
      6.7.1. Command Hierarchies
        6.7.1.1. Show Commands
        6.7.1.2. Clear Commands
      6.7.2. Command Descriptions
        6.7.2.1. Show Commands
        6.7.2.2. Clear Commands
  7. Standards and Protocol Support
  Customer Document and Product Support