Nokia 7450 ESS, 7750 SR, 7950 XRS, and VSR 20.7.R1
Legal Disclaimers
Customer Documentation and Product Support
Legal Disclaimers
Customer Documentation and Product Support
Acronyms Reference Guide 20.7.R1
1. 7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
Customer Document and Product Support
1. 7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
Customer Document and Product Support
Basic System Configuration Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. CLI Script Control
2.8. Entering CLI Commands
2.8.1. Command Completion
2.8.2. Unordered and Unnamed Parameters
2.8.3. Editing Keystrokes
2.8.4. Absolute Paths
2.8.5. History
2.8.6. Entering Numerical Ranges
2.8.7. Pipe/Match
2.8.8. Pipe/Count
2.8.9. Range Operator Support of Regular Expression Match
2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
2.8.10. Redirection
2.9. VI Editor
2.9.1. Summary of vi Commands
2.9.2. Using the vi Commands
2.9.3. EX Commands
2.10. Configuration Rollback
2.10.1. Feature Behavior
2.10.2. Rollback and SNMP
2.10.3. Rescue Configuration
2.10.4. Operational Guidelines
2.11. Transactional Configuration
2.11.1. Basic Operation
2.11.2. Transactions and Rollback
2.11.3. Authorization
2.12. Basic CLI Command Reference
2.12.1. Command Hierarchies
2.12.1.1. Global Commands
2.12.1.2. Monitor Commands
2.12.1.3. Environment Commands
2.12.1.4. Candidate Commands
2.12.1.5. Rollback Commands
2.12.2. Command Descriptions
2.12.2.1. Global Commands
2.12.2.2. Monitor CLI Commands
2.12.2.3. CLI Environment Commands
2.12.2.4. Candidate Commands
2.12.2.5. Rollback Commands
2.12.2.6. Show Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. URLs
3.1.3. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Deleting Files and Removing Directories
3.2.6. Displaying Directory and File Information
3.2.7. Repairing the File System
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. File Commands
3.3.2. Command Descriptions
3.3.2.1. File System Commands
3.3.2.2. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Configuration and Image Loading
4.1.1.1. Persistence
4.1.1.2. Lawful Intercept
4.1.1.3. FIPS-140-2 Mode
4.1.1.4. System Profiles
4.2. Initial System Startup Process Flow
4.3. Configuration Notes
4.4. Configuring Boot Options File with CLI
4.4.1. BOF Configuration Overview
4.4.2. Basic BOF Configuration
4.4.3. Common Configuration Tasks
4.4.3.1. Searching for the BOF
4.4.3.2. Accessing the CLI
4.4.3.2.1. Console Connection
4.4.4. Configuring BOF Parameters
4.4.4.1. Autoconfigure
4.4.4.1.1. Autoconfigure Restrictions
4.4.4.1.2. DHCP Discovery of MAC Addresses
4.4.4.1.3. IPv6 DUID
4.4.4.1.4. IPv6 DHCP RAs
4.5. Service Management Tasks
4.5.1. System Administration Commands
4.5.1.1. Viewing the Current Configuration
4.5.1.2. Modifying and Saving a Configuration
4.5.1.3. Deleting Bof Parameters
4.5.1.4. Saving a Configuration to a Different Filename
4.5.1.5. Rebooting
4.6. BOF Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. Configuration Commands
4.6.2. Command Descriptions
4.6.2.1. File Management Commands
4.6.2.2. BOF Processing Control
4.6.2.3. Console Port Configuration
4.6.2.4. Image and Configuration Management
4.6.2.5. Management Ethernet Configuration
4.6.2.6. DNS Configuration Commands
4.7. BOF Show Command Reference
4.7.1. Command Hierarchies
4.7.2. Command Descriptions
4.7.2.1. BOF Show Commands
5. Debug Commands
6. Zero Touch Provisioning
6.1. ZTP Overview
6.1.1. Network Requirements
6.1.2. Network Support
6.2. ZTP Processes
6.2.1. Auto-boot Process
6.2.2. Auto-provisioning Process
6.3. DHCP Support for ZTP
6.3.1. DHCP Server Offer Options 66, 67, and 43
6.3.1.1. Nokia-specific TLV
6.3.2. Supported DHCP Client Options for ZTP
6.3.3. Supported DHCP Server Options for ZTP
6.3.4. DHCP Discovery and Solicitation
6.3.4.1. DHCP Discovery (IPv4 and IPv6)
6.3.4.1.1. DHCP Discovery Options 61 and 77
6.3.4.1.2. DHCP Discovery Option 1 DUID (IPv6)
6.3.4.2. DHCP Solicitation (IPv6)
6.3.5. IPv4 and IPv6 DHCP Support
6.3.5.1. IPv4 Route Installation Details
6.3.5.2. IPv6 DHCP/RA Details
6.3.5.3. ZTP and DHCP Timeouts
6.4. ZTP Procedure Details
6.4.1. Node Bootup
6.4.1.1. Reinitiating ZTP During Normal Node Bootup
6.4.2. BOF
6.4.2.1. SD Card and Compact Flash Support
6.4.3. Auto-boot Process
6.4.3.1. Options and Option Modification
6.4.3.2. CLI Access
6.4.3.3. Interrupting Auto-boot
6.4.4. Auto-provisioning Process
6.4.4.1. VLAN Discovery
6.4.4.1.1. VLAN Discovery Option
6.4.4.2. Auto-provisioning Procedure
6.4.4.3. Out-of-band Management Versus In-band Management
6.4.4.3.1. Supported In-band Management Ports
6.4.5. Provisioning Files
6.4.5.1. Provisioning File Download
6.4.5.2. Provisioning File Resolution Using DNS
6.4.5.3. File Download and Redundancy
6.4.5.4. Sample Provisioning File
6.4.5.5. Proxy Support
6.4.6. Logs and Events
6.5. ZTP Command Reference
6.5.1. Command Hierarchies
6.5.1.1. Configuration Commands
6.5.2. Configuration Commands
6.5.2.1. ZTP BOF Commands
6.5.2.2. ZTP Tools Commands
7. Tools Commands
8. System Management
8.1. System Management Parameters
8.1.1. System Information
8.1.1.1. System Name
8.1.1.2. System Contact
8.1.1.3. System Location
8.1.1.4. System Coordinates
8.1.1.5. Naming Objects
8.1.1.6. Common Language Location Identifier
8.1.1.7. DNS Security Extensions
8.1.2. System Time
8.1.2.1. Time Zones
8.1.2.2. Network Time Protocol (NTP)
8.1.2.3. SNTP Time Synchronization
8.1.2.4. CRON
8.2. High Availability
8.2.1. HA Features
8.2.1.1. Redundancy
8.2.1.1.1. Software Redundancy
8.2.1.1.2. Configuration Redundancy
8.2.1.1.3. Component Redundancy
8.2.1.1.4. Service Redundancy
8.2.1.1.5. Accounting Configuration Redundancy
8.2.1.2. Nonstop Forwarding
8.2.1.3. Nonstop Routing (NSR)
8.2.1.4. CPM Switchover
8.2.1.5. Synchronization
8.2.1.5.1. Configuration and boot-env Synchronization
8.2.1.5.2. State Database Synchronization
8.3. Synchronization and Redundancy
8.3.1. Active and Standby Designations
8.3.2. When the Active CPM Goes Offline
8.3.3. OOB Management Ethernet Port Redundancy
8.3.4. Persistence
8.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
8.4. Network Synchronization
8.4.1. Central Synchronization Sub-System
8.4.2. 7950 XRS-40 Extension Chassis Central Clocks
8.4.3. Synchronization Status Messages (SSM)
8.4.3.1. DS1 Signals
8.4.3.2. E1 Signals
8.4.3.3. SONET/SDH Signals
8.4.3.4. DS3/E3
8.4.4. Synchronous Ethernet
8.4.5. Clock Source Quality Level Definitions
8.4.6. Advanced G.781 Features
8.4.7. IEEE 1588v2 PTP
8.4.7.1. PTP Clock Synchronization
8.4.7.2. Performance Considerations
8.4.7.2.1. Port-Based Timestamping of PTP Messages
8.4.7.3. PTP Capabilities
8.4.7.4. PTP Ordinary Slave Clock For Frequency
8.4.7.5. PTP Ordinary Master Clock For Frequency
8.4.7.6. PTP Boundary Clock for Frequency and Time
8.4.7.7. PTP Clock Redundancy
8.4.7.8. PTP Time for System Time and OAM Time
8.4.7.9. PTP within Routing Instances
8.5. System-Wide ATM Parameters
8.6. QinQ Network Interface Support
8.7. Link Layer Discovery Protocol (LLDP)
8.8. IP Hashing as an LSR
8.9. Satellites
8.9.1. Ethernet Satellites
8.9.2. TDM Satellites
8.9.3. Software Repositories for Satellites
8.9.4. Satellite Software Upgrade Overview
8.9.5. Satellite Configuration
8.9.5.1. Satellite Client Port ID Formats
8.9.5.2. Local Forwarding
8.9.5.3. Port Template
8.9.5.4. 10GE Client Ports
8.9.5.5. 100GE Client Ports
8.9.5.6. 10GE Uplinks on the 64x10GE+4x100GE Satellite
8.9.5.7. Satellite Uplink Resiliency
8.10. Auto-Provisioning
8.10.1. Auto-provisioning limits
8.10.2. Auto-provisioning Process
8.10.3. Auto-provisioning DHCP Rules
8.10.4. Auto-provisioning Failure
8.11. Administrative Tasks
8.11.1. Saving Configurations
8.11.2. Specifying Post-Boot Configuration Files
8.11.3. Network Timing
8.11.4. Power Supplies
8.11.5. Automatic Synchronization
8.11.5.1. Boot-Env Option
8.11.5.2. Config Option
8.11.6. Manual Synchronization
8.11.6.1. Forcing a Switchover
8.12. System Router Instances
8.13. System Configuration Process Overview
8.14. Configuration Notes
8.14.1. General
8.15. Configuring System Management with CLI
8.15.1. Saving Configurations
8.15.2. Basic System Configuration
8.15.3. Common Configuration Tasks
8.15.3.1. System Information
8.15.3.1.1. System Information Parameters
8.15.3.1.2. Coordinates
8.15.3.1.3. System Time Elements
8.15.3.1.4. ANCP Enhancements
8.15.3.2. Configuring Synchronization and Redundancy
8.15.3.2.1. Configuring Persistence
8.15.3.2.2. Configuring Synchronization
8.15.3.2.3. Configuring Manual Synchronization
8.15.3.2.4. Forcing a Switchover
8.15.3.2.5. Configuring Synchronization Options
8.15.3.3. Configuring Multi-Chassis Redundancy for LAG
8.15.3.4. Configuring Power Supply Parameters
8.15.3.5. Configuring ATM System Parameters
8.15.3.6. Configuring Backup Copies
8.15.3.7. Post-Boot Configuration Extension Files
8.15.3.7.1. Show Command Output and Console Messages
8.15.4. System Timing
8.15.4.1. Edit Mode
8.15.4.2. Configuring Timing References
8.15.4.3. Using the Revert Command
8.15.4.4. Other Editing Commands
8.15.4.5. Forcing a Specific Reference
8.15.5. Configuring System Monitoring Thresholds
8.15.5.1. Creating Events
8.15.5.2. System Alarm Contact Inputs
8.15.6. Configuring LLDP
8.16. System Command Reference
8.16.1. Command Hierarchies
8.16.1.1. Configuration Commands
8.16.1.2. System Information Commands
8.16.1.3. Satellite Commands
8.16.1.4. System Alarm Contact Input Commands
8.16.1.5. System Threshold Alarm Commands
8.16.1.6. System Bluetooth Commands
8.16.1.7. Persistence Commands
8.16.1.8. PTP Commands
8.16.1.9. System Time Commands
8.16.1.10. Cron Commands
8.16.1.11. Script Control Commands
8.16.1.12. System Synchronization Commands
8.16.1.13. System Administration (Admin) Commands
8.16.1.14. High Availability (Redundancy) Commands
8.16.1.15. LLDP System Commands
8.16.1.16. LLDP Ethernet Port Commands
8.16.1.17. System Router Instance Commands
8.16.2. System Command Reference
8.16.2.1. Generic Commands
8.16.2.2. System Information Commands
8.16.2.3. System Alarm Contact Input Commands
8.16.2.4. System Threshold Alarm Commands
8.16.2.5. System Bluetooth Commands
8.16.2.6. Persistence Commands
8.16.2.7. PTP Commands
8.16.2.8. Date and Time Commands
8.16.2.9. Network Time Protocol Commands
8.16.2.9.1. SNTP Commands
8.16.2.9.2. System Time Commands
8.16.2.10. Cron Commands
8.16.2.11. Script Control Commands
8.16.2.12. System Synchronization Configuration Commands
8.16.2.13. System Administration Commands
8.16.2.14. Redundancy Commands
8.16.2.14.1. Peer Commands
8.16.2.14.2. Multi-Chassis Endpoint Commands
8.16.2.14.3. MC-LAG Commands
8.16.2.15. LLDP System Commands
8.16.2.16. LLDP Ethernet Port Commands
8.16.2.17. System Router Instance Commands
8.17. Show, Clear, Debug, and Tools Command Reference
8.17.1. Command Hierarchies
8.17.1.1. Show Commands
8.17.1.2. Clear Commands
8.17.1.3. Debug Commands
8.17.1.4. Tools Commands
8.17.2. Command Descriptions
8.17.2.1. Show Commands
8.17.2.2. Debug Commands
8.17.2.3. Tools Commands
8.17.2.4. Clear Commands
9. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router System Configuration Process
2. CLI Usage
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Basic CLI Commands
2.2.3. CLI Environment Commands
2.2.4. CLI Monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. EXEC Files
2.7. CLI Script Control
2.8. Entering CLI Commands
2.8.1. Command Completion
2.8.2. Unordered and Unnamed Parameters
2.8.3. Editing Keystrokes
2.8.4. Absolute Paths
2.8.5. History
2.8.6. Entering Numerical Ranges
2.8.7. Pipe/Match
2.8.8. Pipe/Count
2.8.9. Range Operator Support of Regular Expression Match
2.8.9.1. Regular Expression Symbols in a Regular Expression Match Operation
2.8.10. Redirection
2.9. VI Editor
2.9.1. Summary of vi Commands
2.9.2. Using the vi Commands
2.9.3. EX Commands
2.10. Configuration Rollback
2.10.1. Feature Behavior
2.10.2. Rollback and SNMP
2.10.3. Rescue Configuration
2.10.4. Operational Guidelines
2.11. Transactional Configuration
2.11.1. Basic Operation
2.11.2. Transactions and Rollback
2.11.3. Authorization
2.12. Basic CLI Command Reference
2.12.1. Command Hierarchies
2.12.1.1. Global Commands
2.12.1.2. Monitor Commands
2.12.1.3. Environment Commands
2.12.1.4. Candidate Commands
2.12.1.5. Rollback Commands
2.12.2. Command Descriptions
2.12.2.1. Global Commands
2.12.2.2. Monitor CLI Commands
2.12.2.3. CLI Environment Commands
2.12.2.4. Candidate Commands
2.12.2.5. Rollback Commands
2.12.2.6. Show Commands
3. File System Management
3.1. The File System
3.1.1. Compact Flash Devices
3.1.2. URLs
3.1.3. Wildcards
3.2. File Management Tasks
3.2.1. Modifying File Attributes
3.2.2. Creating Directories
3.2.3. Copying Files
3.2.4. Moving Files
3.2.5. Deleting Files and Removing Directories
3.2.6. Displaying Directory and File Information
3.2.7. Repairing the File System
3.3. File Command Reference
3.3.1. Command Hierarchy
3.3.1.1. File Commands
3.3.2. Command Descriptions
3.3.2.1. File System Commands
3.3.2.2. File Commands
4. Boot Options
4.1. System Initialization
4.1.1. Configuration and Image Loading
4.1.1.1. Persistence
4.1.1.2. Lawful Intercept
4.1.1.3. FIPS-140-2 Mode
4.1.1.4. System Profiles
4.2. Initial System Startup Process Flow
4.3. Configuration Notes
4.4. Configuring Boot Options File with CLI
4.4.1. BOF Configuration Overview
4.4.2. Basic BOF Configuration
4.4.3. Common Configuration Tasks
4.4.3.1. Searching for the BOF
4.4.3.2. Accessing the CLI
4.4.3.2.1. Console Connection
4.4.4. Configuring BOF Parameters
4.4.4.1. Autoconfigure
4.4.4.1.1. Autoconfigure Restrictions
4.4.4.1.2. DHCP Discovery of MAC Addresses
4.4.4.1.3. IPv6 DUID
4.4.4.1.4. IPv6 DHCP RAs
4.5. Service Management Tasks
4.5.1. System Administration Commands
4.5.1.1. Viewing the Current Configuration
4.5.1.2. Modifying and Saving a Configuration
4.5.1.3. Deleting Bof Parameters
4.5.1.4. Saving a Configuration to a Different Filename
4.5.1.5. Rebooting
4.6. BOF Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. Configuration Commands
4.6.2. Command Descriptions
4.6.2.1. File Management Commands
4.6.2.2. BOF Processing Control
4.6.2.3. Console Port Configuration
4.6.2.4. Image and Configuration Management
4.6.2.5. Management Ethernet Configuration
4.6.2.6. DNS Configuration Commands
4.7. BOF Show Command Reference
4.7.1. Command Hierarchies
4.7.2. Command Descriptions
4.7.2.1. BOF Show Commands
5. Debug Commands
6. Zero Touch Provisioning
6.1. ZTP Overview
6.1.1. Network Requirements
6.1.2. Network Support
6.2. ZTP Processes
6.2.1. Auto-boot Process
6.2.2. Auto-provisioning Process
6.3. DHCP Support for ZTP
6.3.1. DHCP Server Offer Options 66, 67, and 43
6.3.1.1. Nokia-specific TLV
6.3.2. Supported DHCP Client Options for ZTP
6.3.3. Supported DHCP Server Options for ZTP
6.3.4. DHCP Discovery and Solicitation
6.3.4.1. DHCP Discovery (IPv4 and IPv6)
6.3.4.1.1. DHCP Discovery Options 61 and 77
6.3.4.1.2. DHCP Discovery Option 1 DUID (IPv6)
6.3.4.2. DHCP Solicitation (IPv6)
6.3.5. IPv4 and IPv6 DHCP Support
6.3.5.1. IPv4 Route Installation Details
6.3.5.2. IPv6 DHCP/RA Details
6.3.5.3. ZTP and DHCP Timeouts
6.4. ZTP Procedure Details
6.4.1. Node Bootup
6.4.1.1. Reinitiating ZTP During Normal Node Bootup
6.4.2. BOF
6.4.2.1. SD Card and Compact Flash Support
6.4.3. Auto-boot Process
6.4.3.1. Options and Option Modification
6.4.3.2. CLI Access
6.4.3.3. Interrupting Auto-boot
6.4.4. Auto-provisioning Process
6.4.4.1. VLAN Discovery
6.4.4.1.1. VLAN Discovery Option
6.4.4.2. Auto-provisioning Procedure
6.4.4.3. Out-of-band Management Versus In-band Management
6.4.4.3.1. Supported In-band Management Ports
6.4.5. Provisioning Files
6.4.5.1. Provisioning File Download
6.4.5.2. Provisioning File Resolution Using DNS
6.4.5.3. File Download and Redundancy
6.4.5.4. Sample Provisioning File
6.4.5.5. Proxy Support
6.4.6. Logs and Events
6.5. ZTP Command Reference
6.5.1. Command Hierarchies
6.5.1.1. Configuration Commands
6.5.2. Configuration Commands
6.5.2.1. ZTP BOF Commands
6.5.2.2. ZTP Tools Commands
7. Tools Commands
8. System Management
8.1. System Management Parameters
8.1.1. System Information
8.1.1.1. System Name
8.1.1.2. System Contact
8.1.1.3. System Location
8.1.1.4. System Coordinates
8.1.1.5. Naming Objects
8.1.1.6. Common Language Location Identifier
8.1.1.7. DNS Security Extensions
8.1.2. System Time
8.1.2.1. Time Zones
8.1.2.2. Network Time Protocol (NTP)
8.1.2.3. SNTP Time Synchronization
8.1.2.4. CRON
8.2. High Availability
8.2.1. HA Features
8.2.1.1. Redundancy
8.2.1.1.1. Software Redundancy
8.2.1.1.2. Configuration Redundancy
8.2.1.1.3. Component Redundancy
8.2.1.1.4. Service Redundancy
8.2.1.1.5. Accounting Configuration Redundancy
8.2.1.2. Nonstop Forwarding
8.2.1.3. Nonstop Routing (NSR)
8.2.1.4. CPM Switchover
8.2.1.5. Synchronization
8.2.1.5.1. Configuration and boot-env Synchronization
8.2.1.5.2. State Database Synchronization
8.3. Synchronization and Redundancy
8.3.1. Active and Standby Designations
8.3.2. When the Active CPM Goes Offline
8.3.3. OOB Management Ethernet Port Redundancy
8.3.4. Persistence
8.3.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
8.4. Network Synchronization
8.4.1. Central Synchronization Sub-System
8.4.2. 7950 XRS-40 Extension Chassis Central Clocks
8.4.3. Synchronization Status Messages (SSM)
8.4.3.1. DS1 Signals
8.4.3.2. E1 Signals
8.4.3.3. SONET/SDH Signals
8.4.3.4. DS3/E3
8.4.4. Synchronous Ethernet
8.4.5. Clock Source Quality Level Definitions
8.4.6. Advanced G.781 Features
8.4.7. IEEE 1588v2 PTP
8.4.7.1. PTP Clock Synchronization
8.4.7.2. Performance Considerations
8.4.7.2.1. Port-Based Timestamping of PTP Messages
8.4.7.3. PTP Capabilities
8.4.7.4. PTP Ordinary Slave Clock For Frequency
8.4.7.5. PTP Ordinary Master Clock For Frequency
8.4.7.6. PTP Boundary Clock for Frequency and Time
8.4.7.7. PTP Clock Redundancy
8.4.7.8. PTP Time for System Time and OAM Time
8.4.7.9. PTP within Routing Instances
8.5. System-Wide ATM Parameters
8.6. QinQ Network Interface Support
8.7. Link Layer Discovery Protocol (LLDP)
8.8. IP Hashing as an LSR
8.9. Satellites
8.9.1. Ethernet Satellites
8.9.2. TDM Satellites
8.9.3. Software Repositories for Satellites
8.9.4. Satellite Software Upgrade Overview
8.9.5. Satellite Configuration
8.9.5.1. Satellite Client Port ID Formats
8.9.5.2. Local Forwarding
8.9.5.3. Port Template
8.9.5.4. 10GE Client Ports
8.9.5.5. 100GE Client Ports
8.9.5.6. 10GE Uplinks on the 64x10GE+4x100GE Satellite
8.9.5.7. Satellite Uplink Resiliency
8.10. Auto-Provisioning
8.10.1. Auto-provisioning limits
8.10.2. Auto-provisioning Process
8.10.3. Auto-provisioning DHCP Rules
8.10.4. Auto-provisioning Failure
8.11. Administrative Tasks
8.11.1. Saving Configurations
8.11.2. Specifying Post-Boot Configuration Files
8.11.3. Network Timing
8.11.4. Power Supplies
8.11.5. Automatic Synchronization
8.11.5.1. Boot-Env Option
8.11.5.2. Config Option
8.11.6. Manual Synchronization
8.11.6.1. Forcing a Switchover
8.12. System Router Instances
8.13. System Configuration Process Overview
8.14. Configuration Notes
8.14.1. General
8.15. Configuring System Management with CLI
8.15.1. Saving Configurations
8.15.2. Basic System Configuration
8.15.3. Common Configuration Tasks
8.15.3.1. System Information
8.15.3.1.1. System Information Parameters
8.15.3.1.2. Coordinates
8.15.3.1.3. System Time Elements
8.15.3.1.4. ANCP Enhancements
8.15.3.2. Configuring Synchronization and Redundancy
8.15.3.2.1. Configuring Persistence
8.15.3.2.2. Configuring Synchronization
8.15.3.2.3. Configuring Manual Synchronization
8.15.3.2.4. Forcing a Switchover
8.15.3.2.5. Configuring Synchronization Options
8.15.3.3. Configuring Multi-Chassis Redundancy for LAG
8.15.3.4. Configuring Power Supply Parameters
8.15.3.5. Configuring ATM System Parameters
8.15.3.6. Configuring Backup Copies
8.15.3.7. Post-Boot Configuration Extension Files
8.15.3.7.1. Show Command Output and Console Messages
8.15.4. System Timing
8.15.4.1. Edit Mode
8.15.4.2. Configuring Timing References
8.15.4.3. Using the Revert Command
8.15.4.4. Other Editing Commands
8.15.4.5. Forcing a Specific Reference
8.15.5. Configuring System Monitoring Thresholds
8.15.5.1. Creating Events
8.15.5.2. System Alarm Contact Inputs
8.15.6. Configuring LLDP
8.16. System Command Reference
8.16.1. Command Hierarchies
8.16.1.1. Configuration Commands
8.16.1.2. System Information Commands
8.16.1.3. Satellite Commands
8.16.1.4. System Alarm Contact Input Commands
8.16.1.5. System Threshold Alarm Commands
8.16.1.6. System Bluetooth Commands
8.16.1.7. Persistence Commands
8.16.1.8. PTP Commands
8.16.1.9. System Time Commands
8.16.1.10. Cron Commands
8.16.1.11. Script Control Commands
8.16.1.12. System Synchronization Commands
8.16.1.13. System Administration (Admin) Commands
8.16.1.14. High Availability (Redundancy) Commands
8.16.1.15. LLDP System Commands
8.16.1.16. LLDP Ethernet Port Commands
8.16.1.17. System Router Instance Commands
8.16.2. System Command Reference
8.16.2.1. Generic Commands
8.16.2.2. System Information Commands
8.16.2.3. System Alarm Contact Input Commands
8.16.2.4. System Threshold Alarm Commands
8.16.2.5. System Bluetooth Commands
8.16.2.6. Persistence Commands
8.16.2.7. PTP Commands
8.16.2.8. Date and Time Commands
8.16.2.9. Network Time Protocol Commands
8.16.2.9.1. SNTP Commands
8.16.2.9.2. System Time Commands
8.16.2.10. Cron Commands
8.16.2.11. Script Control Commands
8.16.2.12. System Synchronization Configuration Commands
8.16.2.13. System Administration Commands
8.16.2.14. Redundancy Commands
8.16.2.14.1. Peer Commands
8.16.2.14.2. Multi-Chassis Endpoint Commands
8.16.2.14.3. MC-LAG Commands
8.16.2.15. LLDP System Commands
8.16.2.16. LLDP Ethernet Port Commands
8.16.2.17. System Router Instance Commands
8.17. Show, Clear, Debug, and Tools Command Reference
8.17.1. Command Hierarchies
8.17.1.1. Show Commands
8.17.1.2. Clear Commands
8.17.1.3. Debug Commands
8.17.1.4. Tools Commands
8.17.2. Command Descriptions
8.17.2.1. Show Commands
8.17.2.2. Debug Commands
8.17.2.3. Tools Commands
8.17.2.4. Clear Commands
9. Standards and Protocol Support
Customer Document and Product Support
Gx AVPs Reference Guide R20.7.R1
1. Gx AVP
1.1. In This Section
1.2. AVPs
1.2.1. Reserved Keywords in the 7750 SR
1.2.2. Standard Diameter AVPs
1.2.3. Standard Diameter AVPs (format)
1.2.4. NOKIA-Specific AVPs
1.2.5. NOKIA-Specific AVPs (format)
1.2.6. Diameter-Based AVP Applicability
1.2.7. Gx AVP Applicability
1.2.8. NOKIA-Specific AVP Applicability
1.2.9. Result Codes (Result-Code AVP)
1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
1.2.11. Event Triggers (Event-Trigger AVP)
1.2.12. Termination Causes (Termination-Cause AVP)
2. Standards and Protocol Support
Customer Document and Product Support
1. Gx AVP
1.1. In This Section
1.2. AVPs
1.2.1. Reserved Keywords in the 7750 SR
1.2.2. Standard Diameter AVPs
1.2.3. Standard Diameter AVPs (format)
1.2.4. NOKIA-Specific AVPs
1.2.5. NOKIA-Specific AVPs (format)
1.2.6. Diameter-Based AVP Applicability
1.2.7. Gx AVP Applicability
1.2.8. NOKIA-Specific AVP Applicability
1.2.9. Result Codes (Result-Code AVP)
1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
1.2.11. Event Triggers (Event-Trigger AVP)
1.2.12. Termination Causes (Termination-Cause AVP)
2. Standards and Protocol Support
Customer Document and Product Support
Gy AVPs Reference Guide R20.7.R1
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. References
2. Diameter Gy Interface Specification
2.1. Diameter Gy – Credit-Control-Request (CCR) command
2.1.1. Diameter Gy – CCR Message Top Level AVPs
2.1.2. Diameter Gy – CCR Message Grouped AVPs
2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
2.2.1. Diameter Gy – CCA Message Top Level AVPs
2.2.2. Diameter Gy – CCA message grouped AVPs
2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
2.3. Diameter Gy – Re-Auth-Request (RAR) Command
2.3.1. Diameter Gy – RAR Message Format
2.3.2. Diameter Gy – RAR Message Top Level AVPs
2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
2.4.1. Diameter Gy – RAA Message Format
2.4.2. Diameter Gy – RAA Message Top Level AVPs
2.5. Diameter Gy – Abort-Session-Request (ASR) Command
2.5.1. Diameter Gy – ASR Message Format
2.5.2. Diameter Gy – ASR Message Top Level AVPs
2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
2.6.1. Diameter Gy – ASA Message Format
2.6.2. Diameter Gy – ASA Message Top Level AVPs
3. Standards and Protocol Support
Customer Document and Product Support
1. Preface
1.1. About This Guide
1.1.1. Audience
1.1.2. References
2. Diameter Gy Interface Specification
2.1. Diameter Gy – Credit-Control-Request (CCR) command
2.1.1. Diameter Gy – CCR Message Top Level AVPs
2.1.2. Diameter Gy – CCR Message Grouped AVPs
2.1.2.1. Diameter Gy CCR – Subscription-Id grouped AVP
2.1.2.2. Diameter Gy CCR – Multiple-Services-Credit-Control grouped AVP
2.1.2.3. Diameter Gy CCR – Requested-Service-Unit grouped AVP
2.1.2.4. Diameter Gy CCR – Used-Service-Unit grouped AVP
2.1.2.5. DIAMETER Gy CCR - User-Equipment-Info grouped AVP
2.1.2.6. Diameter Gy CCR – Service-Information grouped AVP
2.1.2.7. Diameter Gy CCR – PS-Information grouped AVP
2.2. Diameter Gy – Credit-Control-Answer (CCA) Command
2.2.1. Diameter Gy – CCA Message Top Level AVPs
2.2.2. Diameter Gy – CCA message grouped AVPs
2.2.2.1. Diameter Gy CCA – Failed-AVP grouped AVP
2.2.2.2. Diameter Gy CCA – Multiple-Services-Credit-Control grouped AVP
2.2.2.3. Diameter Gy CCA – Final-Unit-Indication grouped AVP
2.2.2.4. DIAMETER Gy CCA - Redirect-Server grouped AVP
2.2.2.5. Diameter Gy CCA – Granted-Service-Unit grouped AVP
2.3. Diameter Gy – Re-Auth-Request (RAR) Command
2.3.1. Diameter Gy – RAR Message Format
2.3.2. Diameter Gy – RAR Message Top Level AVPs
2.4. Diameter Gy – Re-Auth-Answer (RAA) Command
2.4.1. Diameter Gy – RAA Message Format
2.4.2. Diameter Gy – RAA Message Top Level AVPs
2.5. Diameter Gy – Abort-Session-Request (ASR) Command
2.5.1. Diameter Gy – ASR Message Format
2.5.2. Diameter Gy – ASR Message Top Level AVPs
2.6. Diameter Gy – Abort-Session-Answer (ASA) Command
2.6.1. Diameter Gy – ASA Message Format
2.6.2. Diameter Gy – ASA Message Top Level AVPs
3. Standards and Protocol Support
Customer Document and Product Support
Interface Configuration Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Interface Configuration Process
2. Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Card Slots
2.1.2. XIOM Modules
2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP, MDA-e, and MDA-s Modules
2.1.4. XMAs/C-XMAs
2.1.5. Hardware Licensing
2.1.6. Software License Activation
2.1.7. Software License Records
2.1.8. Versatile Service Module (VSM)
2.1.9. Oversubscribed Ethernet MDAs
2.1.9.1. Rate Limiting
2.1.9.2. Packet Classification and Scheduling
2.1.10. Channelized MDA Support
2.1.10.1. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
2.1.10.2. Channelized OC-12/STM-4 ASAP MDAs
2.1.10.3. Channelized DS-3/E-3 ASAP MDA (4-Port)
2.1.10.4. Channelized DS-3/E-3 ASAP MDA (12-Port)
2.1.10.5. Channelized OC-3/STM-1 Circuit Emulation Services (CES) MDA
2.1.10.6. Network Interconnections
2.2. Digital Diagnostics Monitoring
2.2.1. SFPs and XFPs
2.2.2. Statistics Collection
2.3. Ports
2.3.1. Port Types
2.3.2. Port Features
2.3.2.1. Port State and Operational State
2.3.2.2. 802.1x Network Access Control
2.3.2.2.1. 802.1x Modes
2.3.2.2.2. 802.1x Basics
2.3.2.2.3. 802.1x Timers
2.3.2.2.4. 802.1x Tunneling
2.3.2.2.5. 802.1x Configuration and Limitations
2.3.2.3. MACsec
2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
2.3.2.3.2. MACsec Encryption Mode
2.3.2.3.3. MACsec Key Management Modes
2.3.2.3.4. MACsec Terminology
2.3.2.3.5. MACsec Static CAK
2.3.2.3.6. SAK Rollover
2.3.2.3.7. MKA
2.3.2.3.8. Pre-shared Key
2.3.2.3.9. MKA Hello Timer
2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
2.3.2.3.11. Key Server
2.3.2.3.12. SA Limits and Network Design
2.3.2.3.13. P2P (Switch to Switch) Topology
2.3.2.3.14. P2MP (Switch to Switch) Topology
2.3.2.3.15. SA Exhaustion Behavior
2.3.2.3.16. Clear Tag Mode
2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
2.3.2.3.18. EAPoL Destination Address
2.3.2.3.19. Mirroring Consideration
2.3.2.4. SONET/SDH Port Attributes
2.3.2.5. SONET/SDH Path Attributes
2.3.2.6. Multilink Frame Relay
2.3.2.6.1. MLFR Bundle Data Plane
2.3.2.6.2. MLFR Bundle Link Integrity Protocol
2.3.2.7. FRF.12 End-to-End Fragmentation
2.3.2.7.1. SAP Fragment Interleaving Option
2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
2.3.2.10.1. Protocol Field (PID)
2.3.2.10.2. B & E Bits
2.3.2.10.3. Sequence Number
2.3.2.10.4. Information Field
2.3.2.10.5. Padding
2.3.2.10.6. FCS
2.3.2.10.7. LCP
2.3.2.10.8. Link Fragmentation and Interleaving Support
2.3.2.11. Multi-Class MLPPP
2.3.2.11.1. QoS in MC-MLPPP
2.3.2.12. Cisco HDLC
2.3.2.12.1. SLARP
2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
2.3.2.12.3. Timers
2.3.2.13. Automatic Protection Switching (APS)
2.3.2.13.1. Single Chassis and Multi-Chassis APS
2.3.2.13.2. APS Switching Modes
2.3.2.13.3. APS Channel and SONET Header K Bytes
2.3.2.13.4. Revertive Switching
2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
2.3.2.13.6. Annex B (1+1 Optimized) Operation
2.3.2.13.7. Protection of Upper Layer Protocols and Services
2.3.2.13.8. APS User-Initiated Requests
2.3.2.13.9. APS and SNMP
2.3.2.13.10. APS Applicability, Restrictions and Interactions
2.3.2.13.11. Sample APS Applications
2.3.2.14. Inverse Multiplexing Over ATM (IMA)
2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
2.3.2.15. Ethernet Local Management Interface (E-LMI)
2.3.2.16. Link Layer Discovery Protocol (LLDP)
2.3.2.16.1. LLDP Protocol Features
2.3.2.17. Exponential Port Dampening
2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
2.4. FP4 Data Path Mapping
2.5. Port Cross-Connect (PXC)
2.5.1. PXC Terminology
2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
2.5.2.1. Operational State
2.5.3. PXC Sub-Ports
2.5.3.1. PXC Sub-Port Operational State
2.5.4. Port Statistics
2.5.4.1. Statistics on Physical PXC Ports
2.5.5. LAG with PXC Ports – PXC LAG
2.5.6. Basic PXC Provisioning
2.5.7. QoS
2.5.7.1. Queue Allocation on PXC Sub-Ports
2.5.7.2. Pool Allocations on PXC Ports
2.5.7.3. QoS Summary
2.5.8. Mirroring and LI on PXC Ports
2.5.9. Multi-Chassis Redundancy
2.5.10. Health Monitoring on the PXC Sub-Ports
2.5.11. Configuration Example
2.6. Forwarding Path Extensions (FPE)
2.7. LAG
2.7.1. LACP
2.7.1.1. LACP Multiplexing
2.7.1.2. LACP Tunneling
2.7.2. Active-Standby LAG Operation
2.7.3. LAG on Access QoS Consideration
2.7.3.1. Adapt QoS Modes
2.7.3.2. Per-fp-ing-queuing
2.7.3.3. Per-fp-egr-queuing
2.7.3.4. Per-fp-sap-instance
2.7.4. LAG and ECMP Hashing
2.7.4.1. Per Flow Hashing
2.7.4.1.1. Changing Default Per Flow Hashing Inputs
2.7.4.2. Per Link Hashing
2.7.4.2.1. Weighted per-link-hash
2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
2.7.4.4. Consistent Per Service Hashing
2.7.4.5. ESM – LAG Hashing per Vport
2.7.4.5.1. Background
2.7.4.5.2. Hashing per Vport
2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
2.7.4.5.4. Multicast Consideration
2.7.4.5.5. VPLS and Capture SAP Considerations
2.7.5. LAG Hold Down Timers
2.7.6. BFD over LAG Links
2.7.7. LAG Port Weight Speed
2.7.8. LAG Port Hash-Weight
2.7.8.1. Configurable Hash Weight to Control Flow Distribution
2.7.8.2. Mixed-speed LAGs
2.7.9. Multi-Chassis LAG
2.7.9.1. Overview
2.7.9.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
2.7.9.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
2.7.9.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
2.7.10. LAG IGP Cost
2.8. G.8031 Protected Ethernet Tunnels
2.9. G.8032 Protected Ethernet Rings
2.10. Ethernet Port Monitoring
2.11. 802.3ah OAM
2.11.1. OAM Events
2.11.1.1. Link Monitoring
2.11.1.1.1. Capability Advertising
2.11.2. Remote Loopback
2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11.3.1. 802.3ah Grace Announcement
2.12. MTU Configuration Guidelines
2.12.1. Default MTU Values
2.12.2. Modifying MTU Defaults
2.12.3. Configuration Example
2.13. Deploying Preprovisioned Components
2.14. Setting Fabric Speed
2.14.1. 7750 SR-7/12/12e and 7450 ESS-7/12
2.14.2. 7950 XRS-20/20e
2.15. Versatile Service Module
2.15.1. VSM-CCA-XP
2.16. Configuration Process Overview
2.17. Configuration Notes
2.18. Configuring Physical Ports with CLI
2.18.1. Preprovisioning Guidelines
2.18.1.1. Predefining Entities
2.18.1.2. Preprovisioning a Port
2.18.1.3. Maximizing Bandwidth Use
2.18.2. Basic Configuration
2.18.3. Common Configuration Tasks
2.18.3.1. Configuring Cards and MDAs
2.18.3.1.1. Configuring FP Network Pool Parameters
2.18.3.2. Configuring Ports
2.18.3.2.1. Configuring Port Pool Parameters
2.18.3.2.2. Changing Hybrid-Buffer-Allocation
2.18.3.2.3. Changing APS Parameters
2.18.3.2.4. Configuring Ethernet Port Parameters
2.18.3.2.5. Configuring SONET/SDH Port Parameters
2.18.3.2.6. Configuring Channelized Ports
2.18.3.2.7. Configuring Channelized STM1/OC3 Parameters
2.18.3.2.8. Configuring ATM SAPs
2.18.3.2.9. Configuring DWDM Port Parameters
2.18.3.2.10. Configuring WaveTracker Parameters
2.18.3.2.11. Configuring OTU Port Parameters
2.18.3.2.12. Configuring ATM Interface Parameters
2.18.3.2.13. Configuring Frame Relay Parameters
2.18.3.2.14. Configuring Multilink PPP Bundles
2.18.3.2.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
2.18.3.2.16. Multi-Class MLPPP
2.18.3.2.17. Configuring Bundle Protection Group Ports
2.18.3.2.18. Configuring LAG Parameters
2.18.3.2.19. Configuring G.8031 Protected Ethernet Tunnels
2.18.3.2.20. Configuring Connectors and Connector Ports
2.19. Service Management Tasks
2.19.1. Modifying or Deleting an MDA or XMA
2.19.2. Modifying a Card Type
2.19.3. Deleting a Card
2.19.4. Deleting Port Parameters
2.19.5. Soft IOM Reset
2.19.5.1. Soft Reset
2.19.5.2. Deferred MDA Reset
2.20. Configuration Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Card Commands
2.20.1.2. MDA Commands
2.20.1.3. XIOM Commands
2.20.1.4. Power Commands
2.20.1.5. Virtual Scheduler Commands
2.20.1.6. Forwarding Plane (FP) Commands
2.20.1.7. Port Configuration Commands
2.20.1.8. Port XC Commands
2.20.1.9. Forwarding Path Extension (FPE) Commands
2.20.1.10. Port APS Commands
2.20.1.11. Ethernet Commands
2.20.1.11.1. Ethernet Access and Network Commands
2.20.1.12. HSQ Port Configuration Commands
2.20.1.13. Interface Group Handler Commands
2.20.1.14. Multilink Bundle Commands
2.20.1.15. SONET-SDH Commands
2.20.1.16. TDM Commands
2.20.1.17. DS1 Commands
2.20.1.18. DS3 Commands
2.20.1.19. E1 Commands
2.20.1.20. E3 Commands
2.20.1.21. LAG Commands
2.20.1.22. MACsec Commands
2.20.1.23. Ethernet Tunnel Commands
2.20.1.24. Multi-Chassis Redundancy Commands
2.20.1.25. Switch Fabric Commands
2.20.2. Configuration Command Descriptions
2.20.2.1. Generic Commands
2.20.2.2. Card Commands
2.20.2.3. MDA (XMA) Commands
2.20.2.4. MDA/Port QoS Commands
2.20.2.5. XIOM Commands
2.20.2.6. Power Commands
2.20.2.7. Virtual Scheduler Commands
2.20.2.8. Forwarding Plane Configuration Commands
2.20.2.9. MACsec Commands
2.20.2.10. General Port Commands
2.20.2.11. Port XC Commands
2.20.2.12. Forwarding Path Extension (FPE) Commands
2.20.2.13. APS Commands
2.20.2.14. Ethernet Port Commands
2.20.2.15. 802.1x Port Commands
2.20.2.16. LLDP Port Commands
2.20.2.17. Network Port Commands
2.20.2.18. HSQ Port Commands
2.20.2.19. Interface Group Handler Commands
2.20.2.20. Multilink-Bundle Port Commands
2.20.2.21. SONET/SDH Port Commands
2.20.2.22. SONET/SDH Path Commands
2.20.2.23. ATM Interface Commands
2.20.2.24. Frame Relay Commands
2.20.2.25. TDM Commands
2.20.2.26. LAG Commands
2.20.2.27. Eth Tunnel Commands
2.20.2.28. ETH-CFM Configuration Commands
2.20.2.29. Multi-Chassis Redundancy Commands
2.20.2.29.1. MC Endpoint Commands
2.20.2.29.2. MC LAG Commands
2.20.2.29.3. Multi-Chassis Ring Commands
2.20.2.30. Switch Fabric Commands
2.20.2.31. Forwarding Plane Tools Commands
2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
2.21.1. Command Hierarchies
2.21.1.1. Show Commands
2.21.1.2. Monitor Commands
2.21.1.3. Clear Commands
2.21.1.4. Debug Commands
2.21.1.5. Tools Commands
2.21.2. Command Descriptions
2.21.2.1. Hardware Show Commands
2.21.2.2. APS Show Commands
2.21.2.3. Port Show Commands
2.21.2.4. Multilink Bundle Show Commands
2.21.2.5. LAG Show Commands
2.21.2.6. Licensing Show Command
2.21.2.7. MACsec Show Commands
2.21.2.8. Monitor Commands
2.21.2.9. Clear Commands
2.21.2.10. Tools Commands
2.21.2.11. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Interface Configuration Process
2. Interfaces
2.1. Configuration Overview
2.1.1. Chassis Slots and Card Slots
2.1.2. XIOM Modules
2.1.3. MDA-a, MDA-aXP, MDA, MDA-XP, MDA-e, and MDA-s Modules
2.1.4. XMAs/C-XMAs
2.1.5. Hardware Licensing
2.1.6. Software License Activation
2.1.7. Software License Records
2.1.8. Versatile Service Module (VSM)
2.1.9. Oversubscribed Ethernet MDAs
2.1.9.1. Rate Limiting
2.1.9.2. Packet Classification and Scheduling
2.1.10. Channelized MDA Support
2.1.10.1. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
2.1.10.2. Channelized OC-12/STM-4 ASAP MDAs
2.1.10.3. Channelized DS-3/E-3 ASAP MDA (4-Port)
2.1.10.4. Channelized DS-3/E-3 ASAP MDA (12-Port)
2.1.10.5. Channelized OC-3/STM-1 Circuit Emulation Services (CES) MDA
2.1.10.6. Network Interconnections
2.2. Digital Diagnostics Monitoring
2.2.1. SFPs and XFPs
2.2.2. Statistics Collection
2.3. Ports
2.3.1. Port Types
2.3.2. Port Features
2.3.2.1. Port State and Operational State
2.3.2.2. 802.1x Network Access Control
2.3.2.2.1. 802.1x Modes
2.3.2.2.2. 802.1x Basics
2.3.2.2.3. 802.1x Timers
2.3.2.2.4. 802.1x Tunneling
2.3.2.2.5. 802.1x Configuration and Limitations
2.3.2.3. MACsec
2.3.2.3.1. MACsec 802.1AE Header (SecTAG)
2.3.2.3.2. MACsec Encryption Mode
2.3.2.3.3. MACsec Key Management Modes
2.3.2.3.4. MACsec Terminology
2.3.2.3.5. MACsec Static CAK
2.3.2.3.6. SAK Rollover
2.3.2.3.7. MKA
2.3.2.3.8. Pre-shared Key
2.3.2.3.9. MKA Hello Timer
2.3.2.3.10. MACsec Capability, Desire, and Encryption Offset
2.3.2.3.11. Key Server
2.3.2.3.12. SA Limits and Network Design
2.3.2.3.13. P2P (Switch to Switch) Topology
2.3.2.3.14. P2MP (Switch to Switch) Topology
2.3.2.3.15. SA Exhaustion Behavior
2.3.2.3.16. Clear Tag Mode
2.3.2.3.17. 802.1X Tunneling and Multihop MACsec
2.3.2.3.18. EAPoL Destination Address
2.3.2.3.19. Mirroring Consideration
2.3.2.4. SONET/SDH Port Attributes
2.3.2.5. SONET/SDH Path Attributes
2.3.2.6. Multilink Frame Relay
2.3.2.6.1. MLFR Bundle Data Plane
2.3.2.6.2. MLFR Bundle Link Integrity Protocol
2.3.2.7. FRF.12 End-to-End Fragmentation
2.3.2.7.1. SAP Fragment Interleaving Option
2.3.2.8. FRF.12 UNI/NNI Link Fragmentation
2.3.2.9. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
2.3.2.10. Multilink Point-to-Point Protocol (MLPPP)
2.3.2.10.1. Protocol Field (PID)
2.3.2.10.2. B & E Bits
2.3.2.10.3. Sequence Number
2.3.2.10.4. Information Field
2.3.2.10.5. Padding
2.3.2.10.6. FCS
2.3.2.10.7. LCP
2.3.2.10.8. Link Fragmentation and Interleaving Support
2.3.2.11. Multi-Class MLPPP
2.3.2.11.1. QoS in MC-MLPPP
2.3.2.12. Cisco HDLC
2.3.2.12.1. SLARP
2.3.2.12.2. SONET/SDH Scrambling and C2-Byte
2.3.2.12.3. Timers
2.3.2.13. Automatic Protection Switching (APS)
2.3.2.13.1. Single Chassis and Multi-Chassis APS
2.3.2.13.2. APS Switching Modes
2.3.2.13.3. APS Channel and SONET Header K Bytes
2.3.2.13.4. Revertive Switching
2.3.2.13.5. Bidirectional 1+1 Switchover Operation Example
2.3.2.13.6. Annex B (1+1 Optimized) Operation
2.3.2.13.7. Protection of Upper Layer Protocols and Services
2.3.2.13.8. APS User-Initiated Requests
2.3.2.13.9. APS and SNMP
2.3.2.13.10. APS Applicability, Restrictions and Interactions
2.3.2.13.11. Sample APS Applications
2.3.2.14. Inverse Multiplexing Over ATM (IMA)
2.3.2.14.1. Inverse Multiplexing over ATM (IMA) Features
2.3.2.15. Ethernet Local Management Interface (E-LMI)
2.3.2.16. Link Layer Discovery Protocol (LLDP)
2.3.2.16.1. LLDP Protocol Features
2.3.2.17. Exponential Port Dampening
2.3.3. Per Port Aggregate Egress Queue Statistics Monitoring
2.4. FP4 Data Path Mapping
2.5. Port Cross-Connect (PXC)
2.5.1. PXC Terminology
2.5.2. PXC - Physical Port in Cross-Connect (Loopback) Mode
2.5.2.1. Operational State
2.5.3. PXC Sub-Ports
2.5.3.1. PXC Sub-Port Operational State
2.5.4. Port Statistics
2.5.4.1. Statistics on Physical PXC Ports
2.5.5. LAG with PXC Ports – PXC LAG
2.5.6. Basic PXC Provisioning
2.5.7. QoS
2.5.7.1. Queue Allocation on PXC Sub-Ports
2.5.7.2. Pool Allocations on PXC Ports
2.5.7.3. QoS Summary
2.5.8. Mirroring and LI on PXC Ports
2.5.9. Multi-Chassis Redundancy
2.5.10. Health Monitoring on the PXC Sub-Ports
2.5.11. Configuration Example
2.6. Forwarding Path Extensions (FPE)
2.7. LAG
2.7.1. LACP
2.7.1.1. LACP Multiplexing
2.7.1.2. LACP Tunneling
2.7.2. Active-Standby LAG Operation
2.7.3. LAG on Access QoS Consideration
2.7.3.1. Adapt QoS Modes
2.7.3.2. Per-fp-ing-queuing
2.7.3.3. Per-fp-egr-queuing
2.7.3.4. Per-fp-sap-instance
2.7.4. LAG and ECMP Hashing
2.7.4.1. Per Flow Hashing
2.7.4.1.1. Changing Default Per Flow Hashing Inputs
2.7.4.2. Per Link Hashing
2.7.4.2.1. Weighted per-link-hash
2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
2.7.4.4. Consistent Per Service Hashing
2.7.4.5. ESM – LAG Hashing per Vport
2.7.4.5.1. Background
2.7.4.5.2. Hashing per Vport
2.7.4.5.3. Vport Hashing over Different Forwarding Complexes
2.7.4.5.4. Multicast Consideration
2.7.4.5.5. VPLS and Capture SAP Considerations
2.7.5. LAG Hold Down Timers
2.7.6. BFD over LAG Links
2.7.7. LAG Port Weight Speed
2.7.8. LAG Port Hash-Weight
2.7.8.1. Configurable Hash Weight to Control Flow Distribution
2.7.8.2. Mixed-speed LAGs
2.7.9. Multi-Chassis LAG
2.7.9.1. Overview
2.7.9.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
2.7.9.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
2.7.9.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
2.7.10. LAG IGP Cost
2.8. G.8031 Protected Ethernet Tunnels
2.9. G.8032 Protected Ethernet Rings
2.10. Ethernet Port Monitoring
2.11. 802.3ah OAM
2.11.1. OAM Events
2.11.1.1. Link Monitoring
2.11.1.1.1. Capability Advertising
2.11.2. Remote Loopback
2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11.3.1. 802.3ah Grace Announcement
2.12. MTU Configuration Guidelines
2.12.1. Default MTU Values
2.12.2. Modifying MTU Defaults
2.12.3. Configuration Example
2.13. Deploying Preprovisioned Components
2.14. Setting Fabric Speed
2.14.1. 7750 SR-7/12/12e and 7450 ESS-7/12
2.14.2. 7950 XRS-20/20e
2.15. Versatile Service Module
2.15.1. VSM-CCA-XP
2.16. Configuration Process Overview
2.17. Configuration Notes
2.18. Configuring Physical Ports with CLI
2.18.1. Preprovisioning Guidelines
2.18.1.1. Predefining Entities
2.18.1.2. Preprovisioning a Port
2.18.1.3. Maximizing Bandwidth Use
2.18.2. Basic Configuration
2.18.3. Common Configuration Tasks
2.18.3.1. Configuring Cards and MDAs
2.18.3.1.1. Configuring FP Network Pool Parameters
2.18.3.2. Configuring Ports
2.18.3.2.1. Configuring Port Pool Parameters
2.18.3.2.2. Changing Hybrid-Buffer-Allocation
2.18.3.2.3. Changing APS Parameters
2.18.3.2.4. Configuring Ethernet Port Parameters
2.18.3.2.5. Configuring SONET/SDH Port Parameters
2.18.3.2.6. Configuring Channelized Ports
2.18.3.2.7. Configuring Channelized STM1/OC3 Parameters
2.18.3.2.8. Configuring ATM SAPs
2.18.3.2.9. Configuring DWDM Port Parameters
2.18.3.2.10. Configuring WaveTracker Parameters
2.18.3.2.11. Configuring OTU Port Parameters
2.18.3.2.12. Configuring ATM Interface Parameters
2.18.3.2.13. Configuring Frame Relay Parameters
2.18.3.2.14. Configuring Multilink PPP Bundles
2.18.3.2.15. Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
2.18.3.2.16. Multi-Class MLPPP
2.18.3.2.17. Configuring Bundle Protection Group Ports
2.18.3.2.18. Configuring LAG Parameters
2.18.3.2.19. Configuring G.8031 Protected Ethernet Tunnels
2.18.3.2.20. Configuring Connectors and Connector Ports
2.19. Service Management Tasks
2.19.1. Modifying or Deleting an MDA or XMA
2.19.2. Modifying a Card Type
2.19.3. Deleting a Card
2.19.4. Deleting Port Parameters
2.19.5. Soft IOM Reset
2.19.5.1. Soft Reset
2.19.5.2. Deferred MDA Reset
2.20. Configuration Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Card Commands
2.20.1.2. MDA Commands
2.20.1.3. XIOM Commands
2.20.1.4. Power Commands
2.20.1.5. Virtual Scheduler Commands
2.20.1.6. Forwarding Plane (FP) Commands
2.20.1.7. Port Configuration Commands
2.20.1.8. Port XC Commands
2.20.1.9. Forwarding Path Extension (FPE) Commands
2.20.1.10. Port APS Commands
2.20.1.11. Ethernet Commands
2.20.1.11.1. Ethernet Access and Network Commands
2.20.1.12. HSQ Port Configuration Commands
2.20.1.13. Interface Group Handler Commands
2.20.1.14. Multilink Bundle Commands
2.20.1.15. SONET-SDH Commands
2.20.1.16. TDM Commands
2.20.1.17. DS1 Commands
2.20.1.18. DS3 Commands
2.20.1.19. E1 Commands
2.20.1.20. E3 Commands
2.20.1.21. LAG Commands
2.20.1.22. MACsec Commands
2.20.1.23. Ethernet Tunnel Commands
2.20.1.24. Multi-Chassis Redundancy Commands
2.20.1.25. Switch Fabric Commands
2.20.2. Configuration Command Descriptions
2.20.2.1. Generic Commands
2.20.2.2. Card Commands
2.20.2.3. MDA (XMA) Commands
2.20.2.4. MDA/Port QoS Commands
2.20.2.5. XIOM Commands
2.20.2.6. Power Commands
2.20.2.7. Virtual Scheduler Commands
2.20.2.8. Forwarding Plane Configuration Commands
2.20.2.9. MACsec Commands
2.20.2.10. General Port Commands
2.20.2.11. Port XC Commands
2.20.2.12. Forwarding Path Extension (FPE) Commands
2.20.2.13. APS Commands
2.20.2.14. Ethernet Port Commands
2.20.2.15. 802.1x Port Commands
2.20.2.16. LLDP Port Commands
2.20.2.17. Network Port Commands
2.20.2.18. HSQ Port Commands
2.20.2.19. Interface Group Handler Commands
2.20.2.20. Multilink-Bundle Port Commands
2.20.2.21. SONET/SDH Port Commands
2.20.2.22. SONET/SDH Path Commands
2.20.2.23. ATM Interface Commands
2.20.2.24. Frame Relay Commands
2.20.2.25. TDM Commands
2.20.2.26. LAG Commands
2.20.2.27. Eth Tunnel Commands
2.20.2.28. ETH-CFM Configuration Commands
2.20.2.29. Multi-Chassis Redundancy Commands
2.20.2.29.1. MC Endpoint Commands
2.20.2.29.2. MC LAG Commands
2.20.2.29.3. Multi-Chassis Ring Commands
2.20.2.30. Switch Fabric Commands
2.20.2.31. Forwarding Plane Tools Commands
2.21. Show, Monitor, Clear, Debug, and Tools Command Reference
2.21.1. Command Hierarchies
2.21.1.1. Show Commands
2.21.1.2. Monitor Commands
2.21.1.3. Clear Commands
2.21.1.4. Debug Commands
2.21.1.5. Tools Commands
2.21.2. Command Descriptions
2.21.2.1. Hardware Show Commands
2.21.2.2. APS Show Commands
2.21.2.3. Port Show Commands
2.21.2.4. Multilink Bundle Show Commands
2.21.2.5. LAG Show Commands
2.21.2.6. Licensing Show Command
2.21.2.7. MACsec Show Commands
2.21.2.8. Monitor Commands
2.21.2.9. Clear Commands
2.21.2.10. Tools Commands
2.21.2.11. Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
Layer 2 Services and EVPN Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Layer 2 Services and EVPN Configuration Process
2. VLL Services
2.1. ATM VLL Services
2.1.1. Apipe For End-to-End ATM Service
2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
2.1.3. Traffic Management Support
2.1.3.1. Ingress Network Classification
2.1.3.2. Ingress Queuing and Shaping on the IOM
2.1.3.3. Egress Queuing and Shaping on the IOM
2.1.3.4. Egress Shaping/Scheduling
2.2. Circuit Emulation Services
2.2.1. Mobile Infrastructure
2.2.2. Circuit Emulation Modes
2.2.3. Circuit Emulation Parameters
2.2.3.1. Circuit Emulation Modes
2.2.3.2. Absolute Mode Option
2.2.3.3. Payload Size
2.2.3.4. Jitter Buffer
2.2.3.5. CES Circuit Operation
2.2.4. Services for Transporting CES Circuits
2.2.5. Network Synchronization Considerations
2.2.6. Cpipe Payload
2.3. Ethernet Pipe Services
2.3.1. Epipe Service Overview
2.3.2. Epipe Service Pseudowire VLAN Tag Processing
2.3.3. Epipe Up Operational State Configuration Option
2.3.4. Epipe with PBB
2.3.5. Epipe over L2TPv3
2.3.6. Ethernet Interworking VLL
2.3.7. VLL CAC
2.3.8. MC-Ring and VLL
2.4. Frame Relay VLL Services
2.4.1. Frame Relay VLL
2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
2.4.3. Traffic Management Support
2.4.3.1. Frame Relay Traffic Management
2.4.3.2. Ingress SAP Classification and Marking
2.4.3.3. Egress Network EXP Marking
2.4.3.4. Ingress Network Classification
2.5. IP Interworking VLL Services
2.5.1. Ipipe VLL
2.5.2. IP Interworking VLL Datapath
2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
2.5.3.1. VLL Ethernet SAP Processes
2.5.3.1.1. VLL FR SAP Procedures
2.5.3.1.2. VLL ATM SAP Procedures
2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
2.5.4. IPv6 Support on IP Interworking VLL
2.5.4.1. IPv6 Datapath Operation
2.5.4.2. IPv6 Stack Capability Signaling
2.6. Services Configuration for MPLS-TP
2.6.1. MPLS-TP SDPs
2.6.2. VLL Spoke SDP Configuration
2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
2.6.3.2. Lock PW Endpoint Model
2.6.3.3. PW Redundancy and Lock Instruct and Loopback
2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
2.6.3.5. Configuring an Administrative Lock
2.6.3.6. Configuring a Loopback
2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
2.7.1. VCCV BFD Support
2.7.2. VCCV BFD Encapsulation on a Pseudowire
2.7.3. BFD Session Operation
2.7.4. Configuring VCCV BFD
2.8. Pseudowire Switching
2.8.1. Pseudowire Switching with Protection
2.8.2. Pseudowire Switching Behavior
2.8.2.1. Pseudowire Switching TLV
2.8.2.2. Pseudowire Switching Point Sub-TLVs
2.8.3. Static-to-Dynamic Pseudowire Switching
2.8.4. Ingress VLAN Swapping
2.8.4.1. Ingress VLAN Translation
2.8.5. Pseudowire Redundancy
2.8.6. Dynamic Multi-Segment Pseudowire Routing
2.8.6.1. Overview
2.8.6.2. Pseudowire Routing
2.8.6.2.1. Static Routing
2.8.6.2.2. Explicit Paths
2.8.6.3. Configuring VLLs using Dynamic MS-PWs
2.8.6.3.1. Active/Passive T-PE Selection
2.8.6.3.2. Automatic Endpoint Configuration
2.8.6.3.3. Selecting a Path for an MS-PW
2.8.6.3.4. Pseudowire Templates
2.8.6.4. Pseudowire Redundancy
2.8.6.5. VCCV OAM for Dynamic MS-PWs
2.8.6.6. VCCV-Ping on Dynamic MS-PWs
2.8.6.7. VCCV-Trace on Dynamic MS-PWs
2.8.7. Example Dynamic MS-PW Configuration
2.8.8. VLL Resilience with Two Destination PE Nodes
2.8.8.1. Master-Slave Operation
2.8.8.1.1. Interaction with SAP-Specific OAM
2.8.8.1.2. Local Rules at Slave VLL PE
2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
2.8.9. Pseudowire SAPs
2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
2.8.10.1. Operational Overview
2.8.10.2. Detailed Operation
2.8.10.2.1. Sample Operation of G.8031 BGP-MH
2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
2.8.12. VLL Resilience for a Switched Pseudowire Path
2.9. Pseudowire Redundancy Service Models
2.9.1. Redundant VLL Service Model
2.9.2. T-LDP Status Notification Handling Rules
2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
2.9.2.2. Processing and Merging
2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
2.10.1. Primary Spoke SDP Fallback to Secondary SAP
2.10.2. Reversion to Primary Spoke SDP Path
2.10.3. MC-APS and MC-LAG
2.10.3.1. Failure Scenario
2.11. VLL Using G.8031 Protected Ethernet Tunnels
2.12. MPLS Entropy Label and Hash Label
2.13. BGP Virtual Private Wire Service (VPWS)
2.13.1. Single-Homed BGP VPWS
2.13.2. Dual-Homed BGP VPWS
2.13.2.1. Single Pseudowire Example
2.13.2.2. Active/Standby Pseudowire Example
2.13.3. BGP VPWS Pseudowire Switching
2.13.3.1. Pseudowire Signaling
2.13.3.2. BGP-VPWS with Inter-AS Model C
2.13.3.3. BGP VPWS Configuration Procedure
2.13.3.4. Use of Pseudowire Template for BGP VPWS
2.13.3.5. Use of Endpoint for BGP VPWS
2.14. VLL Service Considerations
2.14.1. SDPs
2.14.1.1. SDP Statistics for VPLS and VLL Services
2.14.2. SAP Encapsulations and Pseudowire Types
2.14.2.1. PWE3 N-to-1 Cell Mode
2.14.2.2. PWE3 AAL5 SDU Mode
2.14.2.3. QoS Policies
2.14.2.4. Filter Policies
2.14.2.5. MAC Resources
2.15. Configuring a VLL Service with CLI
2.15.1. Common Configuration Tasks
2.15.2. Configuring VLL Components
2.15.2.1. Creating an Apipe Service
2.15.2.1.1. Configuring Basic Apipe SAP Parameters
2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
2.15.2.1.3. Configuring Apipe SDP Bindings
2.15.2.2. Creating a Cpipe Service
2.15.2.2.1. Basic Configuration
2.15.2.2.2. Configuration Requirements
2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
2.15.2.3. Creating an Epipe Service
2.15.2.3.1. Configuring Epipe SAP Parameters
2.15.2.3.2. Distributed Epipe SAPs
2.15.2.3.3. Configuring SDP Bindings
2.15.2.4. Creating an Fpipe Service
2.15.2.4.1. Configuring Fpipe SAP Parameters
2.15.2.4.2. Configuring Fpipe SDP Bindings
2.15.2.5. Creating an Ipipe Service
2.15.2.5.1. Configuring Ipipe SAP Parameters
2.15.2.5.2. Configuring Ipipe SDP Bindings
2.15.3. Using Spoke-SDP Control Words
2.15.4. Same-Fate Epipe VLANs Access Protection
2.15.5. Pseudowire Configuration Notes
2.15.6. Configuring Two VLL Paths Terminating on T-PE2
2.15.7. Configuring VLL Resilience
2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
2.15.9.1. Single-Homed BGP VPWS
2.15.9.2. Dual-Homed BGP VPWS
2.16. Service Management Tasks
2.16.1. Modifying Apipe Service Parameters
2.16.2. Disabling an Apipe Service
2.16.3. Re-enabling an Apipe Service
2.16.4. Deleting an Apipe Service
2.16.5. Modifying a Cpipe Service
2.16.6. Deleting a Cpipe Service
2.16.7. Modifying Epipe Service Parameters
2.16.8. Disabling an Epipe Service
2.16.9. Re-enabling an Epipe Service
2.16.10. Deleting an Epipe Service
2.16.11. Modifying Fpipe Service Parameters
2.16.12. Disabling an Fpipe Service
2.16.13. Re-enabling an Fpipe Service
2.16.14. Deleting an Fpipe Service
2.16.15. Modifying Ipipe Service Parameters
2.16.16. Disabling an Ipipe Service
2.16.17. Re-enabling an Ipipe Service
2.16.18. Deleting an Ipipe Service
2.17. VLL Service Configuration Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Apipe Service Configuration Commands
2.17.1.1.1. Apipe Global Commands
2.17.1.1.2. Apipe SAP Commands
2.17.1.1.3. Apipe Spoke-SDP Commands
2.17.1.2. Related Apipe Commands
2.17.1.2.1. Connection Profile Commands
2.17.1.3. Cpipe Service Configuration Commands
2.17.1.3.1. Cpipe Global Commands
2.17.1.3.2. Cpipe SAP Commands
2.17.1.3.3. Cpipe Spoke-SDP Commands
2.17.1.4. Epipe Service Configuration Commands
2.17.1.4.1. Epipe Global Commands
2.17.1.4.2. Epipe SAP Configuration Commands
2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
2.17.1.4.4. Epipe SAP Template Commands
2.17.1.5. Fpipe Service Configuration Commands
2.17.1.5.1. Fpipe Global Commands
2.17.1.5.2. Fpipe SAP Commands
2.17.1.5.3. Fpipe Spoke-SDP Commands
2.17.1.6. Ipipe Service Configuration Commands
2.17.1.6.1. Ipipe Global Commands
2.17.1.6.2. Ipipe SAP Commands
2.17.1.6.3. Ipipe Spoke-SDP Commands
2.17.2. Command Descriptions
2.17.2.1. Generic Commands
2.17.2.2. VLL Global Service Commands
2.17.2.3. Service Configuration Commands
2.17.2.4. Service SAP Commands
2.17.2.5. Service Spoke-SDP Commands
2.17.2.6. Related Apipe Commands
2.17.2.6.1. Connection Profile Commands
2.17.2.7. Epipe Global Commands
2.17.2.8. Epipe SAP Template Commands
2.17.2.9. Ipipe Global Commands
2.17.2.10. Circuit Emulation Commands
2.17.2.11. ETH-CFM Service Commands
2.17.2.12. Service Filter and QoS Policy Commands
2.17.2.13. VLL Frame Relay Commands
2.17.2.14. ATM Commands
2.18. VLL Show Command Reference
2.18.1. Command Hierarchies
2.18.1.1. Show Commands
2.18.1.2. Clear Commands
2.18.1.3. Debug Commands
2.18.1.4. Tools Commands
2.18.2. Command Descriptions
2.18.2.1. VLL Show Commands
2.18.2.2. VLL Clear Commands
2.18.2.3. VLL Debug Commands
2.18.2.4. VLL Tools Commands
3. Virtual Private LAN Service
3.1. VPLS Service Overview
3.1.1. VPLS Packet Walkthrough
3.2. VPLS Features
3.2.1. VPLS Enhancements
3.2.2. VPLS over MPLS
3.2.3. VPLS Service Pseudowire VLAN Tag Processing
3.2.4. VPLS MAC Learning and Packet Forwarding
3.2.4.1. MAC Learning Protection
3.2.4.2. DEI in IEEE 802.1ad
3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
3.2.6. Pseudowire Control Word
3.2.7. Table Management
3.2.7.1. Selective MAC Address Learning
3.2.7.1.1. Example Operational Information
3.2.7.2. System FDB Size
3.2.7.3. Per-VPLS Service FDB Size
3.2.7.4. System FDB Size Alarms
3.2.7.5. Line Card FDB Size Alarms
3.2.7.6. Per VPLS FDB Size Alarms
3.2.7.7. Local and Remote Aging Timers
3.2.7.8. Disable MAC Aging
3.2.7.9. Disable MAC Learning
3.2.7.10. Unknown MAC Discard
3.2.7.11. VPLS and Rate Limiting
3.2.7.12. MAC Move
3.2.7.13. Auto-Learn MAC Protect
3.2.7.13.1. Operation
3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
3.2.9. VPLS and Spanning Tree Protocol
3.2.9.1. Spanning Tree Operating Modes
3.2.9.2. Multiple Spanning Tree
3.2.9.2.1. Redundancy Access to VPLS
3.2.9.3. MSTP for QinQ SAPs
3.2.9.4. Provider MSTP
3.2.9.4.1. MSTP General Principles
3.2.9.4.2. MSTP in the SR-series Platform
3.2.9.5. Enhancements to the Spanning Tree Protocol
3.2.9.5.1. L2PT Termination
3.2.9.5.2. BPDU Translation
3.2.9.5.3. L2PT and BPDU Translation
3.2.10. VPLS Redundancy
3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
3.2.10.2. Spoke SDP Based Redundant Access
3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
3.2.10.3.1. Fast Detection of Peer Failure using BFD
3.2.10.3.2. MC-EP Passive Mode
3.2.10.4. Support for Single Chassis Endpoint Mechanisms
3.2.10.4.1. MAC Flush Support in MC-EP
3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
3.2.10.4.3. Support for Force Spoke SDP in MC-EP
3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
3.2.10.6. MAC Flush Additions for PBB VPLS
3.2.11. VPLS Access Redundancy
3.2.11.1. STP-based Redundant Access to VPLS
3.2.11.2. Redundant Access to VPLS Without STP
3.2.12. Object Grouping and State Monitoring
3.2.12.1. VPLS Applicability — Block on VPLS a Failure
3.2.13. MAC Flush Message Processing
3.2.13.1. Dual Homing to a VPLS Service
3.2.13.2. MC-Ring and VPLS
3.2.14. ACL Next-Hop for VPLS
3.2.15. SDP Statistics for VPLS and VLL Services
3.2.16. BGP Auto-Discovery for LDP VPLS
3.2.16.1. BGP AD Overview
3.2.16.2. Information Model
3.2.16.3. FEC Element for T-LDP Signaling
3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
3.2.16.5. SDP Usage
3.2.16.6. Automatic Creation of SDPs
3.2.16.7. Manually Provisioned SDP
3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
3.2.16.10. Resiliency Schemes
3.2.17. BGP VPLS
3.2.17.1. Pseudowire Signaling Details
3.2.17.2. Supported VPLS Features
3.2.18. VCCV BFD Support for VPLS Services
3.2.19. BGP Multi-Homing for VPLS
3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
3.2.19.2. Supported Services and Multi-Homing Objects
3.2.19.3. Blackhole Avoidance
3.2.19.3.1. MAC Flush to the Core PEs
3.2.19.3.2. Indicating non-DF status toward the access PE or CE
3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
3.2.20. Multicast-Aware VPLS
3.2.20.1. IGMP Snooping for VPLS
3.2.20.2. MLD Snooping for VPLS
3.2.20.3. PIM Snooping for VPLS
3.2.20.3.1. Plain PIM Snooping
3.2.20.3.2. PIM Proxy
3.2.20.4. IPv6 Multicast Forwarding
3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
3.2.20.5. PIM and IGMP/MLD Snooping Interaction
3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
3.2.20.6.1. IGMP Snooping Synchronization
3.2.20.6.2. MLD Snooping Synchronization
3.2.20.6.3. PIM Snooping for IPv4 Synchronization
3.2.20.7. VPLS Multicast-Aware High Availability Features
3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
3.2.22. MPLS Entropy Label and Hash Label
3.3. Routed VPLS and I-VPLS
3.3.1. IES or VPRN IP Interface Binding
3.3.1.1. Assigning a Service Name to a VPLS Service
3.3.1.2. Service Binding Requirements
3.3.1.3. Bound Service Name Assignment
3.3.1.4. Binding a Service Name to an IP Interface
3.3.1.5. Bound Service Deletion or Service Name Removal
3.3.1.6. IP Interface Attached VPLS Service Constraints
3.3.1.7. IP Interface and VPLS Operational State Coordination
3.3.2. IP Interface MTU and Fragmentation
3.3.2.1. Unicast IP Routing into a VPLS Service
3.3.3. ARP and VPLS FDB Interactions
3.3.3.1. R-VPLS Specific ARP Cache Behavior
3.3.4. The allow-ip-int-bind VPLS Flag
3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
3.3.4.2. LAG Port Membership Constraints
3.3.4.3. R-VPLS Feature Restrictions
3.3.4.4. Routed I-VPLS Feature Restrictions
3.3.5. IPv4 and IPv6 Multicast Routing Support
3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
3.3.7. R-VPLS Caveats
3.3.7.1. VPLS SAP Ingress IP Filter Override
3.3.7.2. IP Interface Defined Egress QoS Reclassification
3.3.7.3. Remarking for VPLS and Routed Packets
3.3.7.4. IPv4 Multicast Routing
3.3.7.5. R-VPLS Supported Routing-related Protocols
3.3.7.6. Spanning Tree and Split Horizon
3.4. VPLS Service Considerations
3.4.1. SAP Encapsulations
3.4.2. VLAN Processing
3.4.3. Ingress VLAN Swapping
3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
3.4.4.3. MVRP Activation of Service Connectivity
3.4.4.4. MVRP Control Plane
3.4.4.5. STP-MVRP Interaction
3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
3.4.5. VPLS E-Tree Services
3.4.5.1. VPLS E-Tree Services Overview
3.4.5.2. Leaf-ac and Root-ac SAPs
3.4.5.3. Leaf-ac and Root-ac SDP Binds
3.4.5.4. Root-leaf-tag SAPs
3.4.5.5. Root-leaf-tag SDP Binds
3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
3.5. Configuring a VPLS Service with CLI
3.5.1. Basic Configuration
3.5.2. Common Configuration Tasks
3.5.3. Configuring VPLS Components
3.5.3.1. Creating a VPLS Service
3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
3.5.3.2.1. Enabling MAC Move
3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
3.5.3.3. Configuring GSMP Parameters
3.5.3.4. Configuring a VPLS SAP
3.5.3.4.1. Local VPLS SAPs
3.5.3.4.2. Distributed VPLS SAPs
3.5.3.4.3. Configuring SAP-Specific STP Parameters
3.5.3.4.4. STP SAP Operational States
3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
3.5.3.4.6. Configuring MAC Learning Protection
3.5.3.5. Configuring SAP Subscriber Management Parameters
3.5.3.6. MSTP Control over Ethernet Tunnels
3.5.3.7. Configuring SDP Bindings
3.5.3.8. Configuring Overrides on Service SAPs
3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
3.5.3.8.2. Spoke-SDP STP Operational States
3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
3.5.4. Configuring VPLS Redundancy
3.5.4.1. Creating a Management VPLS for SAP Protection
3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
3.5.4.3. Configuring Load Balancing with Management VPLS
3.5.4.4. Configuring Selective MAC Flush
3.5.4.5. Configuring Multi-Chassis Endpoints
3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
3.5.6. Configuring BGP Auto-Discovery
3.5.6.1. Configuration Steps
3.5.6.2. LDP Signaling
3.5.6.3. Pseudowire Template
3.5.7. Configuring BGP VPLS
3.5.7.1. Configuring a VPLS Management Interface
3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
3.5.9. Configuring VPLS E-Tree Services
3.6. Service Management Tasks
3.6.1. Modifying VPLS Service Parameters
3.6.2. Modifying Management VPLS Parameters
3.6.3. Deleting a Management VPLS
3.6.4. Disabling a Management VPLS
3.6.5. Deleting a VPLS Service
3.6.6. Disabling a VPLS Service
3.6.7. Re-enabling a VPLS Service
3.7. VPLS Service Configuration Command Reference
3.7.1. Command Hierarchies
3.7.1.1. Global Commands
3.7.1.2. General Switch Management Protocol (GSMP) Commands
3.7.1.3. BGP Auto-Discovery Commands
3.7.1.4. Oper Group Commands
3.7.1.5. SAP Commands
3.7.1.6. Template Commands
3.7.1.7. Mesh SDP Commands
3.7.1.8. Spoke-SDP Commands
3.7.1.9. Provider Tunnel Commands
3.7.1.10. Multi-Chassis Redundancy Commands
3.7.2. Command Descriptions
3.7.2.1. Generic Commands
3.7.2.2. VPLS Service Commands
3.7.2.3. General Switch Management Protocol Commands
3.7.2.3.1. VPLS DHCP Commands
3.7.2.3.2. VPLS STP Commands
3.7.2.3.3. VPLS SAP Commands
3.7.2.3.4. VPLS SAP ATM Commands
3.7.2.4. BGP Auto-Discovery Commands
3.7.2.5. ETH-CFM Service Commands
3.7.2.5.1. VPLS Filter and QoS Policy Commands
3.7.2.5.2. VPLS Template Commands
3.7.2.5.3. Provider Tunnel Commands
3.7.2.5.4. VPLS SDP Commands
3.7.2.5.5. SAP Subscriber Management Commands
3.7.2.6. VPLS Multicast Commands
3.7.2.6.1. VPLS DHCP and Anti-Spoofing Commands
3.7.2.7. Redundancy Commands
3.8. VPLS Show, Clear, Debug, and Tools Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Show Commands
3.8.1.1.1. IGMP Show Commands
3.8.1.1.2. IGMP Snooping Show Commands
3.8.1.1.3. MLD Snooping Commands
3.8.1.1.4. Show Multi-Chassis Endpoint Commands
3.8.1.2. Clear Commands
3.8.1.3. Debug Commands
3.8.1.4. Tools Commands
3.8.2. Command Descriptions
3.8.2.1. VPLS Show Commands
3.8.2.2. IGMP Snooping Show Commands
3.8.2.3. MLD Snooping Show Commands
3.8.2.4. IGMP Commands
3.8.2.4.1. Show Multi-Chassis Endpoint Commands
3.8.2.5. VPLS Clear Commands
3.8.2.6. VPLS Debug Commands
3.8.2.7. Tools Commands
4. IEEE 802.1ah Provider Backbone Bridging
4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
4.2. PBB Features
4.2.1. Integrated PBB-VPLS Solution
4.2.2. PBB Technology
4.2.3. PBB Mapping to Existing VPLS Configurations
4.2.4. SAP and SDP Support
4.2.4.1. PBB B-VPLS
4.2.4.2. PBB I-VPLS
4.2.5. PBB Packet Walkthrough
4.2.5.1. PBB Control Planes
4.2.6. Shortest Path Bridging MAC Mode (SPBM)
4.2.6.1. Flooding and Learning Versus Link State
4.2.6.2. SPB for B-VPLS
4.2.6.3. Control B-VPLS and User B-VPLS
4.2.6.4. Shortest Path and Single Tree
4.2.6.5. Data Path and Forwarding
4.2.6.6. SPB Ethernet OAM
4.2.6.7. SPB Levels
4.2.7. SPBM to Non-SPBM Interworking
4.2.7.1. Static MACs and Static ISIDs
4.2.7.2. Epipe Static Configuration
4.2.7.2.1. I-VPLS Static Config
4.2.7.3. SPBM ISID Policies
4.2.8. ISID Policy Control
4.2.8.1. Static ISID Advertisement
4.2.8.2. I-VPLS for Unicast Service
4.2.9. Default Behaviors
4.2.10. Example Network Configuration
4.2.10.1. Sample Configuration for Dut-A
4.2.10.1.1. Show Commands Outputs
4.2.10.1.2. Debug Commands
4.2.10.1.3. Tools Commands
4.2.10.1.4. Clear Commands
4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
4.2.12.1. I-VPLS Changes and Related MMRP Behavior
4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
4.2.12.3. Optimization for Improved Convergence Time
4.2.12.4. Controlling MRP Scope using MRP Policies
4.2.13. PBB and BGP-AD
4.2.14. PBB E-Line Service
4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
4.2.15.1. Solution Overview
4.2.15.2. Detailed Solution Description
4.2.15.3. Detailed PBB Emulated LAG Solution Description
4.2.15.4. Support Service and Solution Combinations
4.2.16. Periodic MAC Notification
4.2.17. MAC Flush
4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
4.2.17.1.2. PBB Blackholing Issue
4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
4.2.19. BGP Multi-homing for I-VPLS
4.2.20. Access Multi-Homing over MPLS for PBB Epipes
4.2.21. PBB and IGMP/MLD Snooping
4.2.22. PBB and PIM Snooping
4.2.23. PBB QoS
4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
4.2.23.1.1. Configuration Examples
4.2.23.1.2. Details Solution Description
4.2.24. Egress B-SAP per ISID Shaping
4.2.24.1. B-SAP Egress ISID Shaping Configuration
4.2.24.2. Provisioning Model
4.2.24.3. Egress Queue Scheduling
4.2.24.4. B-SAP per-ISID Shaping Configuration Example
4.2.25. PBB OAM
4.2.25.1. Mirroring
4.2.25.2. OAM Commands
4.2.25.3. CFM Support
4.3. Configuration Examples
4.3.1. PBB using G.8031 Protected Ethernet Tunnels
4.3.2. MC-LAG Multi-homing for Native PBB
4.3.3. Access Multi-Homing over MPLS for PBB Epipes
4.4. PBB Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Global Commands
4.4.1.2. SAP Commands
4.4.1.3. Mesh SDP Commands
4.4.1.4. Spoke SDP Commands
4.4.1.5. BGP-MH for I-VPLS Commands
4.4.2. Command Descriptions
4.4.2.1. Global Commands
4.4.2.2. SAP Commands
4.4.2.3. BGP-MH for I-VPLS Commands
4.5. PBB Show, Clear, and Debug Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Debug Commands
4.5.2. Command Descriptions
4.5.2.1. PBB Show Commands
4.5.2.2. PBB Clear Commands
4.5.2.3. PBB Debug Commands
5. Ethernet Virtual Private Networks (EVPNs)
5.1. Overview and EVPN Applications
5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
5.1.5. EVPN for MPLS Tunnels in E-LAN Services
5.1.6. EVPN for MPLS Tunnels in E-Line Services
5.1.7. EVPN for MPLS Tunnels in E-Tree Services
5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
5.2. EVPN for VXLAN Tunnels and Cloud Technologies
5.2.1. VXLAN
5.2.1.1. VXLAN ECMP and LAG
5.2.1.2. VXLAN VPLS Tag Handling
5.2.1.3. VXLAN MTU Considerations
5.2.1.4. VXLAN QoS
5.2.1.4.1. Ingress
5.2.1.4.2. Egress
5.2.1.5. VXLAN Ping
5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
5.2.1.7. IGMP and MLD Snooping on VXLAN
5.2.1.8. PIM Snooping on VXLAN
5.2.1.9. Static VXLAN Termination in Epipe Services
5.2.1.10. Static VXLAN Termination in VPLS/R-VPLS Services
5.2.1.11. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
5.2.2. EVPN for Overlay Tunnels
5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
5.2.2.2. EVPN for VXLAN in VPLS Services
5.2.2.2.1. Resiliency and BGP Multi-Homing
5.2.2.2.2. Use of BGP-EVPN, BGP-AD, and Sites in the Same VPLS Service
5.2.2.2.3. Use of the unknown-mac-route
5.2.2.3. EVPN for VXLAN in R-VPLS Services
5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.2.4. EVPN-VPWS for VXLAN Tunnels
5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
5.2.3.1. XMPP Interface on the DC GW
5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
5.2.3.3.1. VSD-Domain Type L2-DOMAIN
5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
5.2.3.3.3. VSD-Domain Type VRF-GRE
5.2.3.3.4. VSD-Domain Type VRF-VXLAN
5.2.3.4. Fully-Dynamic VSD Integration Model
5.2.3.4.1. Python Script Implementation Details
5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
5.2.4.1. Replicator (AR-R) Procedures
5.2.4.2. Leaf (AR-L) procedures
5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI
5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
5.2.6. EVPN VXLAN Multihoming
5.2.6.1. Local Bias for EVPN VXLAN Multihoming
5.2.6.2. Known Limitations for Local Bias
5.2.6.3. Non-system IPv4 and IPv6 VXLAN Termination for EVPN VXLAN Multihoming
5.3. EVPN for MPLS Tunnels
5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
5.3.2.1. EVPN and VPLS Integration
5.3.2.2. EVPN Single-Active Multi-Homing and BGP-VPLS Integration
5.3.2.3. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
5.3.2.4. EVPN Multi-Homing in VPLS Services
5.3.2.4.1. EVPN All-Active Multi-Homing
5.3.2.4.2. EVPN Single-Active Multi-Homing
5.3.3. P2MP mLDP Tunnels for BUM Traffic in EVPN-MPLS Services
5.3.4. EVPN-VPWS for MPLS Tunnels
5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
5.3.4.3. PW Ports-based ESs for EVPN-VPWS
5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
5.3.6. PBB-EVPN
5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or B-MAC Routes)
5.3.6.1.3. EVPN Route Type 4 - ES Route
5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
5.3.6.2.1. Flood Containment for I-VPLS Services
5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
5.3.6.2.5. PBB-EVPN ISID-Based C-MAC Flush
5.3.6.2.6. PBB-EVPN ISID-based Route Targets
5.3.7. Virtual Ethernet Segments
5.3.8. Preference-Based and Non-Revertive DF Election
5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
5.3.12. EVPN E-Tree
5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
5.3.12.3. EVPN E-Tree Operation
5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
5.3.12.4. EVPN E-Tree and EVPN Multi-homing
5.3.12.5. PBB-EVPN E-Tree Services
5.3.13. MPLS Entropy Label and Hash Label
5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
5.3.15. ECMP for EVPN-MPLS Destinations
5.3.16. IPv6 tunnel resolution for EVPN MPLS Services
5.3.17. EVPN Multi-Homing Support for MPLS Tunnels Resolved to Non-system IPv4/IPv6 Addresses
5.4. General EVPN Topics
5.4.1. ARP/ND Snooping and Proxy Support
5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
5.4.1.3. Procedure to Add the R Flag to a Specified Entry
5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
5.4.2. BGP-EVPN MAC-Mobility
5.4.3. BGP-EVPN MAC-Duplication
5.4.4. Conditional Static MAC and Protection
5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
5.4.7. Blackhole MAC for EVPN Loop Detection
5.4.8. CFM Interaction with EVPN Services
5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS/R-VPLS Service
5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
5.4.9.4.1. BGP-EVPN Routes on Dual BGP-Instance Services with I-ES
5.4.9.4.2. Single-Active Multi-Homing on I-ES
5.4.9.4.3. All-Active Multi-Homing on I-ES
5.4.10. Configuring Multi-Instance EVPN-VXLAN in the Same VPLS/R-VPLS Service
5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
5.4.10.3. Interconnect Ethernet-Segment Solution for Dual BGP EVPN VXLAN Instance Services
5.4.11. Configuring Static VXLAN and EVPN in the Same VPLS/R-VPLS Service
5.4.12. EVPN IP-Prefix Route Interoperability
5.4.12.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
5.4.12.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
5.4.12.3. Interface-less IP-VRF-to-IP-VRF Model
5.4.13. ARP-ND Host Routes for Extended Layer 2 Data Centers
5.4.14. EVPN Host Mobility Procedures within the Same R-VPLS Service
5.4.14.1. EVPN Host Mobility Configuration
5.4.14.1.1. Host Mobility Case 1
5.4.14.1.2. Host Mobility Case 2
5.4.14.1.3. Host Mobility Case 3
5.4.15. BGP and EVPN Route Selection for EVPN Routes
5.4.16. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.4.17. Oper-Groups Interaction with EVPN Services
5.4.17.1. LAG-Based Link Loss Forwarding for EVPN-VPWS Services
5.4.17.2. Core Isolation Blackhole Avoidance
5.4.17.3. LAG Standby Signaling to the CE on Non-DF EVPN PEs (Single-Active)
5.4.18. EVPN Layer-3 Optimized Inter-Subnet Multicast (OISM)
5.4.18.1. Introduction and Terminology
5.4.18.2. OISM Forwarding Plane
5.4.18.3. OISM Control Plane
5.4.18.4. EVPN OISM and Multi-Homing
5.4.18.5. EVPN OISM Configuration Guidelines
5.4.18.6. Use of mLDP in OISM
5.4.18.7. Example of mLDP in OISM
5.4.19. Interaction of EVPN and Other Features
5.4.19.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
5.4.19.2. Interaction of PBB-EVPN with Existing VPLS Features
5.4.19.3. Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
5.4.20. Routing Policies for BGP EVPN Routes
5.4.20.1. Routing Policies for BGP EVPN IP Prefixes
5.5. Configuring an EVPN Service with CLI
5.5.1. EVPN-VXLAN Configuration Examples
5.5.1.1. Layer 2 PE Example
5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
5.5.2. EVPN-MPLS Configuration Examples
5.5.2.1. EVPN All-active Multi-homing Example
5.5.2.2. EVPN Single-active Multi-homing Example
5.5.3. PBB-EVPN Configuration Examples
5.5.3.1. PBB-EVPN All-active Multi-homing Example
5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
5.6. EVPN Command Reference
5.6.1. Command Hierarchies
5.6.1.1. EVPN Configuration Commands
5.6.1.1.1. Epipe Commands
5.6.1.1.2. VPLS Commands
5.6.1.1.3. IES/VPRN Commands
5.6.1.1.4. System Commands
5.6.1.2. Show Commands
5.6.1.3. Clear Commands
5.6.1.4. Debug Commands
5.6.1.5. Tools Commands
5.6.2. Command Descriptions
5.6.2.1. EVPN Configuration Commands
5.6.2.2. Show Configuration Commands
5.6.2.3. Clear Commands
5.6.2.4. Debug Commands
5.6.2.5. Tools Commands
6. Pseudowire Ports
6.1. Overview
6.2. PW Port Bound to a Physical Port
6.3. FPE-Based PW Port
6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
6.3.2. PXC-Based PW-Port — Building the Cross-Connect
6.3.2.1. Building the Internal Transport Tunnel
6.3.2.2. Mapping the External PW to the PW-Port
6.3.2.3. Terminating the Service on PW-SAP
6.3.3. FPE-Based PW-port Operational State
6.3.4. QoS
6.3.4.1. Preservation of Forwarding Class Across PXC
6.3.5. Statistics on the FPE based PW-Port
6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
6.4. MSS and PW Ports
6.4.1. Configuration Examples
6.4.2. Concurrent Scheduling QoS Mechanisms on a PW Port
6.4.3. Show Command Examples
6.5. L2oGRE Termination on FPE-Based PW Port
6.5.1. L2oGRE Packet Format
6.5.2. GRE Delivery Protocol
6.5.3. Tracking Payloads and Service Termination Points
6.5.3.1. Plain L3 termination
6.5.3.2. Layer 2 Termination
6.5.3.3. ESM Termination
6.5.4. Configuration Steps
6.5.5. Fragmentation and MTU Configuration
6.5.6. Reassembly
6.6. Pseudowire Ports Command Reference
6.6.1. Command Hierarchies
6.6.1.1. PW Port Configuration Commands
6.6.1.2. Redundant Interface Commands
6.6.1.3. Show Commands
6.6.2. Command Descriptions
6.6.2.1. PW Port Configuration Commands
6.6.2.2. SDP Binding Commands
6.6.2.3. Show Commands
7. VSR Pseudowire Ports
7.1. Flex PW Ports
7.1.1. PW Port List
7.1.2. Failover Times
7.1.3. QoS
7.1.4. PW Port Termination for Various Tunnel Types
7.1.4.1. MPLS-Based Spoke SDP
7.1.4.1.1. Provisioning
7.1.4.1.2. Flex PW-Port Operational State for MPLS Based Spoke SDP
7.1.4.1.3. Statistics
7.1.4.2. L2oGRE-Based Spoke SDP
7.1.4.2.1. Provisioning
7.1.4.2.2. Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
7.1.4.2.3. Reassembly
7.2. VSR Pseudowire Ports Command Reference
7.2.1. Command Hierarchies
7.2.1.1. PW Port Configuration Commands
7.2.1.2. Show Commands
7.2.1.3. Clear Commands
7.2.2. Command Descriptions
7.2.2.1. PW Port Configuration Commands
7.2.2.2. Show Commands
7.2.2.3. Clear Commands
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Layer 2 Services and EVPN Configuration Process
2. VLL Services
2.1. ATM VLL Services
2.1.1. Apipe For End-to-End ATM Service
2.1.2. ATM Virtual Trunk Over IP/MPLS Packet Switched Network
2.1.3. Traffic Management Support
2.1.3.1. Ingress Network Classification
2.1.3.2. Ingress Queuing and Shaping on the IOM
2.1.3.3. Egress Queuing and Shaping on the IOM
2.1.3.4. Egress Shaping/Scheduling
2.2. Circuit Emulation Services
2.2.1. Mobile Infrastructure
2.2.2. Circuit Emulation Modes
2.2.3. Circuit Emulation Parameters
2.2.3.1. Circuit Emulation Modes
2.2.3.2. Absolute Mode Option
2.2.3.3. Payload Size
2.2.3.4. Jitter Buffer
2.2.3.5. CES Circuit Operation
2.2.4. Services for Transporting CES Circuits
2.2.5. Network Synchronization Considerations
2.2.6. Cpipe Payload
2.3. Ethernet Pipe Services
2.3.1. Epipe Service Overview
2.3.2. Epipe Service Pseudowire VLAN Tag Processing
2.3.3. Epipe Up Operational State Configuration Option
2.3.4. Epipe with PBB
2.3.5. Epipe over L2TPv3
2.3.6. Ethernet Interworking VLL
2.3.7. VLL CAC
2.3.8. MC-Ring and VLL
2.4. Frame Relay VLL Services
2.4.1. Frame Relay VLL
2.4.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
2.4.3. Traffic Management Support
2.4.3.1. Frame Relay Traffic Management
2.4.3.2. Ingress SAP Classification and Marking
2.4.3.3. Egress Network EXP Marking
2.4.3.4. Ingress Network Classification
2.5. IP Interworking VLL Services
2.5.1. Ipipe VLL
2.5.2. IP Interworking VLL Datapath
2.5.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
2.5.3.1. VLL Ethernet SAP Processes
2.5.3.1.1. VLL FR SAP Procedures
2.5.3.1.2. VLL ATM SAP Procedures
2.5.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
2.5.4. IPv6 Support on IP Interworking VLL
2.5.4.1. IPv6 Datapath Operation
2.5.4.2. IPv6 Stack Capability Signaling
2.6. Services Configuration for MPLS-TP
2.6.1. MPLS-TP SDPs
2.6.2. VLL Spoke SDP Configuration
2.6.2.1. Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
2.6.3. Configuring MPLS-TP Lock Instruct and Loopback
2.6.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
2.6.3.2. Lock PW Endpoint Model
2.6.3.3. PW Redundancy and Lock Instruct and Loopback
2.6.3.4. Configuring a Test SAP for an MPLS-TP PW
2.6.3.5. Configuring an Administrative Lock
2.6.3.6. Configuring a Loopback
2.6.4. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
2.7. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
2.7.1. VCCV BFD Support
2.7.2. VCCV BFD Encapsulation on a Pseudowire
2.7.3. BFD Session Operation
2.7.4. Configuring VCCV BFD
2.8. Pseudowire Switching
2.8.1. Pseudowire Switching with Protection
2.8.2. Pseudowire Switching Behavior
2.8.2.1. Pseudowire Switching TLV
2.8.2.2. Pseudowire Switching Point Sub-TLVs
2.8.3. Static-to-Dynamic Pseudowire Switching
2.8.4. Ingress VLAN Swapping
2.8.4.1. Ingress VLAN Translation
2.8.5. Pseudowire Redundancy
2.8.6. Dynamic Multi-Segment Pseudowire Routing
2.8.6.1. Overview
2.8.6.2. Pseudowire Routing
2.8.6.2.1. Static Routing
2.8.6.2.2. Explicit Paths
2.8.6.3. Configuring VLLs using Dynamic MS-PWs
2.8.6.3.1. Active/Passive T-PE Selection
2.8.6.3.2. Automatic Endpoint Configuration
2.8.6.3.3. Selecting a Path for an MS-PW
2.8.6.3.4. Pseudowire Templates
2.8.6.4. Pseudowire Redundancy
2.8.6.5. VCCV OAM for Dynamic MS-PWs
2.8.6.6. VCCV-Ping on Dynamic MS-PWs
2.8.6.7. VCCV-Trace on Dynamic MS-PWs
2.8.7. Example Dynamic MS-PW Configuration
2.8.8. VLL Resilience with Two Destination PE Nodes
2.8.8.1. Master-Slave Operation
2.8.8.1.1. Interaction with SAP-Specific OAM
2.8.8.1.2. Local Rules at Slave VLL PE
2.8.8.1.3. Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
2.8.8.1.4. VLL Resilience for a Switched Pseudowire Path
2.8.9. Pseudowire SAPs
2.8.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
2.8.10.1. Operational Overview
2.8.10.2. Detailed Operation
2.8.10.2.1. Sample Operation of G.8031 BGP-MH
2.8.10.3. BGP-MH Site Support for Ethernet Tunnels Operational Group Model
2.8.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
2.8.10.5. PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
2.8.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
2.8.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
2.8.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
2.8.10.6.3. Operation for BGP-MH Site Support for Ethernet Tunnels
2.8.11. Access Node Resilience Using MC-LAG and Pseudowire Redundancy
2.8.12. VLL Resilience for a Switched Pseudowire Path
2.9. Pseudowire Redundancy Service Models
2.9.1. Redundant VLL Service Model
2.9.2. T-LDP Status Notification Handling Rules
2.9.2.1. Processing Endpoint SAP Active/Standby Status Bits
2.9.2.2. Processing and Merging
2.10. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
2.10.1. Primary Spoke SDP Fallback to Secondary SAP
2.10.2. Reversion to Primary Spoke SDP Path
2.10.3. MC-APS and MC-LAG
2.10.3.1. Failure Scenario
2.11. VLL Using G.8031 Protected Ethernet Tunnels
2.12. MPLS Entropy Label and Hash Label
2.13. BGP Virtual Private Wire Service (VPWS)
2.13.1. Single-Homed BGP VPWS
2.13.2. Dual-Homed BGP VPWS
2.13.2.1. Single Pseudowire Example
2.13.2.2. Active/Standby Pseudowire Example
2.13.3. BGP VPWS Pseudowire Switching
2.13.3.1. Pseudowire Signaling
2.13.3.2. BGP-VPWS with Inter-AS Model C
2.13.3.3. BGP VPWS Configuration Procedure
2.13.3.4. Use of Pseudowire Template for BGP VPWS
2.13.3.5. Use of Endpoint for BGP VPWS
2.14. VLL Service Considerations
2.14.1. SDPs
2.14.1.1. SDP Statistics for VPLS and VLL Services
2.14.2. SAP Encapsulations and Pseudowire Types
2.14.2.1. PWE3 N-to-1 Cell Mode
2.14.2.2. PWE3 AAL5 SDU Mode
2.14.2.3. QoS Policies
2.14.2.4. Filter Policies
2.14.2.5. MAC Resources
2.15. Configuring a VLL Service with CLI
2.15.1. Common Configuration Tasks
2.15.2. Configuring VLL Components
2.15.2.1. Creating an Apipe Service
2.15.2.1.1. Configuring Basic Apipe SAP Parameters
2.15.2.1.2. Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
2.15.2.1.3. Configuring Apipe SDP Bindings
2.15.2.2. Creating a Cpipe Service
2.15.2.2.1. Basic Configuration
2.15.2.2.2. Configuration Requirements
2.15.2.2.3. Configuring Cpipe SAPs and Spoke-SDPs
2.15.2.3. Creating an Epipe Service
2.15.2.3.1. Configuring Epipe SAP Parameters
2.15.2.3.2. Distributed Epipe SAPs
2.15.2.3.3. Configuring SDP Bindings
2.15.2.4. Creating an Fpipe Service
2.15.2.4.1. Configuring Fpipe SAP Parameters
2.15.2.4.2. Configuring Fpipe SDP Bindings
2.15.2.5. Creating an Ipipe Service
2.15.2.5.1. Configuring Ipipe SAP Parameters
2.15.2.5.2. Configuring Ipipe SDP Bindings
2.15.3. Using Spoke-SDP Control Words
2.15.4. Same-Fate Epipe VLANs Access Protection
2.15.5. Pseudowire Configuration Notes
2.15.6. Configuring Two VLL Paths Terminating on T-PE2
2.15.7. Configuring VLL Resilience
2.15.8. Configuring VLL Resilience for a Switched Pseudowire Path
2.15.9. Configuring BGP Virtual Private Wire Service (VPWS)
2.15.9.1. Single-Homed BGP VPWS
2.15.9.2. Dual-Homed BGP VPWS
2.16. Service Management Tasks
2.16.1. Modifying Apipe Service Parameters
2.16.2. Disabling an Apipe Service
2.16.3. Re-enabling an Apipe Service
2.16.4. Deleting an Apipe Service
2.16.5. Modifying a Cpipe Service
2.16.6. Deleting a Cpipe Service
2.16.7. Modifying Epipe Service Parameters
2.16.8. Disabling an Epipe Service
2.16.9. Re-enabling an Epipe Service
2.16.10. Deleting an Epipe Service
2.16.11. Modifying Fpipe Service Parameters
2.16.12. Disabling an Fpipe Service
2.16.13. Re-enabling an Fpipe Service
2.16.14. Deleting an Fpipe Service
2.16.15. Modifying Ipipe Service Parameters
2.16.16. Disabling an Ipipe Service
2.16.17. Re-enabling an Ipipe Service
2.16.18. Deleting an Ipipe Service
2.17. VLL Service Configuration Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Apipe Service Configuration Commands
2.17.1.1.1. Apipe Global Commands
2.17.1.1.2. Apipe SAP Commands
2.17.1.1.3. Apipe Spoke-SDP Commands
2.17.1.2. Related Apipe Commands
2.17.1.2.1. Connection Profile Commands
2.17.1.3. Cpipe Service Configuration Commands
2.17.1.3.1. Cpipe Global Commands
2.17.1.3.2. Cpipe SAP Commands
2.17.1.3.3. Cpipe Spoke-SDP Commands
2.17.1.4. Epipe Service Configuration Commands
2.17.1.4.1. Epipe Global Commands
2.17.1.4.2. Epipe SAP Configuration Commands
2.17.1.4.3. Epipe Spoke-SDP Configuration Commands
2.17.1.4.4. Epipe SAP Template Commands
2.17.1.5. Fpipe Service Configuration Commands
2.17.1.5.1. Fpipe Global Commands
2.17.1.5.2. Fpipe SAP Commands
2.17.1.5.3. Fpipe Spoke-SDP Commands
2.17.1.6. Ipipe Service Configuration Commands
2.17.1.6.1. Ipipe Global Commands
2.17.1.6.2. Ipipe SAP Commands
2.17.1.6.3. Ipipe Spoke-SDP Commands
2.17.2. Command Descriptions
2.17.2.1. Generic Commands
2.17.2.2. VLL Global Service Commands
2.17.2.3. Service Configuration Commands
2.17.2.4. Service SAP Commands
2.17.2.5. Service Spoke-SDP Commands
2.17.2.6. Related Apipe Commands
2.17.2.6.1. Connection Profile Commands
2.17.2.7. Epipe Global Commands
2.17.2.8. Epipe SAP Template Commands
2.17.2.9. Ipipe Global Commands
2.17.2.10. Circuit Emulation Commands
2.17.2.11. ETH-CFM Service Commands
2.17.2.12. Service Filter and QoS Policy Commands
2.17.2.13. VLL Frame Relay Commands
2.17.2.14. ATM Commands
2.18. VLL Show Command Reference
2.18.1. Command Hierarchies
2.18.1.1. Show Commands
2.18.1.2. Clear Commands
2.18.1.3. Debug Commands
2.18.1.4. Tools Commands
2.18.2. Command Descriptions
2.18.2.1. VLL Show Commands
2.18.2.2. VLL Clear Commands
2.18.2.3. VLL Debug Commands
2.18.2.4. VLL Tools Commands
3. Virtual Private LAN Service
3.1. VPLS Service Overview
3.1.1. VPLS Packet Walkthrough
3.2. VPLS Features
3.2.1. VPLS Enhancements
3.2.2. VPLS over MPLS
3.2.3. VPLS Service Pseudowire VLAN Tag Processing
3.2.4. VPLS MAC Learning and Packet Forwarding
3.2.4.1. MAC Learning Protection
3.2.4.2. DEI in IEEE 802.1ad
3.2.5. VPLS Using G.8031 Protected Ethernet Tunnels
3.2.6. Pseudowire Control Word
3.2.7. Table Management
3.2.7.1. Selective MAC Address Learning
3.2.7.1.1. Example Operational Information
3.2.7.2. System FDB Size
3.2.7.3. Per-VPLS Service FDB Size
3.2.7.4. System FDB Size Alarms
3.2.7.5. Line Card FDB Size Alarms
3.2.7.6. Per VPLS FDB Size Alarms
3.2.7.7. Local and Remote Aging Timers
3.2.7.8. Disable MAC Aging
3.2.7.9. Disable MAC Learning
3.2.7.10. Unknown MAC Discard
3.2.7.11. VPLS and Rate Limiting
3.2.7.12. MAC Move
3.2.7.13. Auto-Learn MAC Protect
3.2.7.13.1. Operation
3.2.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
3.2.9. VPLS and Spanning Tree Protocol
3.2.9.1. Spanning Tree Operating Modes
3.2.9.2. Multiple Spanning Tree
3.2.9.2.1. Redundancy Access to VPLS
3.2.9.3. MSTP for QinQ SAPs
3.2.9.4. Provider MSTP
3.2.9.4.1. MSTP General Principles
3.2.9.4.2. MSTP in the SR-series Platform
3.2.9.5. Enhancements to the Spanning Tree Protocol
3.2.9.5.1. L2PT Termination
3.2.9.5.2. BPDU Translation
3.2.9.5.3. L2PT and BPDU Translation
3.2.10. VPLS Redundancy
3.2.10.1. Spoke SDP Redundancy for Metro Interconnection
3.2.10.2. Spoke SDP Based Redundant Access
3.2.10.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
3.2.10.3.1. Fast Detection of Peer Failure using BFD
3.2.10.3.2. MC-EP Passive Mode
3.2.10.4. Support for Single Chassis Endpoint Mechanisms
3.2.10.4.1. MAC Flush Support in MC-EP
3.2.10.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
3.2.10.4.3. Support for Force Spoke SDP in MC-EP
3.2.10.4.4. Revertive Behavior for Primary Pseudowires in an MC-EP
3.2.10.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
3.2.10.6. MAC Flush Additions for PBB VPLS
3.2.11. VPLS Access Redundancy
3.2.11.1. STP-based Redundant Access to VPLS
3.2.11.2. Redundant Access to VPLS Without STP
3.2.12. Object Grouping and State Monitoring
3.2.12.1. VPLS Applicability — Block on VPLS a Failure
3.2.13. MAC Flush Message Processing
3.2.13.1. Dual Homing to a VPLS Service
3.2.13.2. MC-Ring and VPLS
3.2.14. ACL Next-Hop for VPLS
3.2.15. SDP Statistics for VPLS and VLL Services
3.2.16. BGP Auto-Discovery for LDP VPLS
3.2.16.1. BGP AD Overview
3.2.16.2. Information Model
3.2.16.3. FEC Element for T-LDP Signaling
3.2.16.4. BGP-AD and Target LDP (T-LDP) Interaction
3.2.16.5. SDP Usage
3.2.16.6. Automatic Creation of SDPs
3.2.16.7. Manually Provisioned SDP
3.2.16.8. Automatic Instantiation of Pseudowires (SDP Bindings)
3.2.16.9. Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
3.2.16.10. Resiliency Schemes
3.2.17. BGP VPLS
3.2.17.1. Pseudowire Signaling Details
3.2.17.2. Supported VPLS Features
3.2.18. VCCV BFD Support for VPLS Services
3.2.19. BGP Multi-Homing for VPLS
3.2.19.1. Information Model and Required Extensions to L2VPN NLRI
3.2.19.2. Supported Services and Multi-Homing Objects
3.2.19.3. Blackhole Avoidance
3.2.19.3.1. MAC Flush to the Core PEs
3.2.19.3.2. Indicating non-DF status toward the access PE or CE
3.2.19.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
3.2.20. Multicast-Aware VPLS
3.2.20.1. IGMP Snooping for VPLS
3.2.20.2. MLD Snooping for VPLS
3.2.20.3. PIM Snooping for VPLS
3.2.20.3.1. Plain PIM Snooping
3.2.20.3.2. PIM Proxy
3.2.20.4. IPv6 Multicast Forwarding
3.2.20.4.1. MAC-Based IPv6 Multicast Forwarding
3.2.20.4.2. SG-Based IPv6 Multicast Forwarding
3.2.20.5. PIM and IGMP/MLD Snooping Interaction
3.2.20.6. Multi-Chassis Synchronization for Layer 2 Snooping States
3.2.20.6.1. IGMP Snooping Synchronization
3.2.20.6.2. MLD Snooping Synchronization
3.2.20.6.3. PIM Snooping for IPv4 Synchronization
3.2.20.7. VPLS Multicast-Aware High Availability Features
3.2.21. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
3.2.22. MPLS Entropy Label and Hash Label
3.3. Routed VPLS and I-VPLS
3.3.1. IES or VPRN IP Interface Binding
3.3.1.1. Assigning a Service Name to a VPLS Service
3.3.1.2. Service Binding Requirements
3.3.1.3. Bound Service Name Assignment
3.3.1.4. Binding a Service Name to an IP Interface
3.3.1.5. Bound Service Deletion or Service Name Removal
3.3.1.6. IP Interface Attached VPLS Service Constraints
3.3.1.7. IP Interface and VPLS Operational State Coordination
3.3.2. IP Interface MTU and Fragmentation
3.3.2.1. Unicast IP Routing into a VPLS Service
3.3.3. ARP and VPLS FDB Interactions
3.3.3.1. R-VPLS Specific ARP Cache Behavior
3.3.4. The allow-ip-int-bind VPLS Flag
3.3.4.1. R-VPLS SAPs Only Supported on Standard Ethernet Ports
3.3.4.2. LAG Port Membership Constraints
3.3.4.3. R-VPLS Feature Restrictions
3.3.4.4. Routed I-VPLS Feature Restrictions
3.3.5. IPv4 and IPv6 Multicast Routing Support
3.3.6. BGP Auto-Discovery (BGP-AD) for R-VPLS Support
3.3.7. R-VPLS Caveats
3.3.7.1. VPLS SAP Ingress IP Filter Override
3.3.7.2. IP Interface Defined Egress QoS Reclassification
3.3.7.3. Remarking for VPLS and Routed Packets
3.3.7.4. IPv4 Multicast Routing
3.3.7.5. R-VPLS Supported Routing-related Protocols
3.3.7.6. Spanning Tree and Split Horizon
3.4. VPLS Service Considerations
3.4.1. SAP Encapsulations
3.4.2. VLAN Processing
3.4.3. Ingress VLAN Swapping
3.4.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
3.4.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
3.4.4.2. Instantiate Related VLAN FDBs and Trunks in MVRP Scope
3.4.4.3. MVRP Activation of Service Connectivity
3.4.4.4. MVRP Control Plane
3.4.4.5. STP-MVRP Interaction
3.4.4.5.1. Interaction Between MVRP and Instantiated SAP Status
3.4.4.5.2. Using Temporary Flooding to Optimize Failover Times
3.4.5. VPLS E-Tree Services
3.4.5.1. VPLS E-Tree Services Overview
3.4.5.2. Leaf-ac and Root-ac SAPs
3.4.5.3. Leaf-ac and Root-ac SDP Binds
3.4.5.4. Root-leaf-tag SAPs
3.4.5.5. Root-leaf-tag SDP Binds
3.4.5.6. Interaction between VPLS E-Tree Services and Other Features
3.5. Configuring a VPLS Service with CLI
3.5.1. Basic Configuration
3.5.2. Common Configuration Tasks
3.5.3. Configuring VPLS Components
3.5.3.1. Creating a VPLS Service
3.5.3.2. Enabling Multiple MAC Registration Protocol (MMRP)
3.5.3.2.1. Enabling MAC Move
3.5.3.2.2. Configuring STP Bridge Parameters in a VPLS
3.5.3.3. Configuring GSMP Parameters
3.5.3.4. Configuring a VPLS SAP
3.5.3.4.1. Local VPLS SAPs
3.5.3.4.2. Distributed VPLS SAPs
3.5.3.4.3. Configuring SAP-Specific STP Parameters
3.5.3.4.4. STP SAP Operational States
3.5.3.4.5. Configuring VPLS SAPs with Split Horizon
3.5.3.4.6. Configuring MAC Learning Protection
3.5.3.5. Configuring SAP Subscriber Management Parameters
3.5.3.6. MSTP Control over Ethernet Tunnels
3.5.3.7. Configuring SDP Bindings
3.5.3.8. Configuring Overrides on Service SAPs
3.5.3.8.1. Configuring Spoke-SDP Specific STP Parameters
3.5.3.8.2. Spoke-SDP STP Operational States
3.5.3.8.3. Configuring VPLS Spoke-SDPs with Split Horizon
3.5.4. Configuring VPLS Redundancy
3.5.4.1. Creating a Management VPLS for SAP Protection
3.5.4.2. Creating a Management VPLS for Spoke-SDP Protection
3.5.4.3. Configuring Load Balancing with Management VPLS
3.5.4.4. Configuring Selective MAC Flush
3.5.4.5. Configuring Multi-Chassis Endpoints
3.5.5. ATM/Frame Relay PVC Access and Termination on a VPLS Service
3.5.6. Configuring BGP Auto-Discovery
3.5.6.1. Configuration Steps
3.5.6.2. LDP Signaling
3.5.6.3. Pseudowire Template
3.5.7. Configuring BGP VPLS
3.5.7.1. Configuring a VPLS Management Interface
3.5.8. Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
3.5.9. Configuring VPLS E-Tree Services
3.6. Service Management Tasks
3.6.1. Modifying VPLS Service Parameters
3.6.2. Modifying Management VPLS Parameters
3.6.3. Deleting a Management VPLS
3.6.4. Disabling a Management VPLS
3.6.5. Deleting a VPLS Service
3.6.6. Disabling a VPLS Service
3.6.7. Re-enabling a VPLS Service
3.7. VPLS Service Configuration Command Reference
3.7.1. Command Hierarchies
3.7.1.1. Global Commands
3.7.1.2. General Switch Management Protocol (GSMP) Commands
3.7.1.3. BGP Auto-Discovery Commands
3.7.1.4. Oper Group Commands
3.7.1.5. SAP Commands
3.7.1.6. Template Commands
3.7.1.7. Mesh SDP Commands
3.7.1.8. Spoke-SDP Commands
3.7.1.9. Provider Tunnel Commands
3.7.1.10. Multi-Chassis Redundancy Commands
3.7.2. Command Descriptions
3.7.2.1. Generic Commands
3.7.2.2. VPLS Service Commands
3.7.2.3. General Switch Management Protocol Commands
3.7.2.3.1. VPLS DHCP Commands
3.7.2.3.2. VPLS STP Commands
3.7.2.3.3. VPLS SAP Commands
3.7.2.3.4. VPLS SAP ATM Commands
3.7.2.4. BGP Auto-Discovery Commands
3.7.2.5. ETH-CFM Service Commands
3.7.2.5.1. VPLS Filter and QoS Policy Commands
3.7.2.5.2. VPLS Template Commands
3.7.2.5.3. Provider Tunnel Commands
3.7.2.5.4. VPLS SDP Commands
3.7.2.5.5. SAP Subscriber Management Commands
3.7.2.6. VPLS Multicast Commands
3.7.2.6.1. VPLS DHCP and Anti-Spoofing Commands
3.7.2.7. Redundancy Commands
3.8. VPLS Show, Clear, Debug, and Tools Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Show Commands
3.8.1.1.1. IGMP Show Commands
3.8.1.1.2. IGMP Snooping Show Commands
3.8.1.1.3. MLD Snooping Commands
3.8.1.1.4. Show Multi-Chassis Endpoint Commands
3.8.1.2. Clear Commands
3.8.1.3. Debug Commands
3.8.1.4. Tools Commands
3.8.2. Command Descriptions
3.8.2.1. VPLS Show Commands
3.8.2.2. IGMP Snooping Show Commands
3.8.2.3. MLD Snooping Show Commands
3.8.2.4. IGMP Commands
3.8.2.4.1. Show Multi-Chassis Endpoint Commands
3.8.2.5. VPLS Clear Commands
3.8.2.6. VPLS Debug Commands
3.8.2.7. Tools Commands
4. IEEE 802.1ah Provider Backbone Bridging
4.1. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
4.2. PBB Features
4.2.1. Integrated PBB-VPLS Solution
4.2.2. PBB Technology
4.2.3. PBB Mapping to Existing VPLS Configurations
4.2.4. SAP and SDP Support
4.2.4.1. PBB B-VPLS
4.2.4.2. PBB I-VPLS
4.2.5. PBB Packet Walkthrough
4.2.5.1. PBB Control Planes
4.2.6. Shortest Path Bridging MAC Mode (SPBM)
4.2.6.1. Flooding and Learning Versus Link State
4.2.6.2. SPB for B-VPLS
4.2.6.3. Control B-VPLS and User B-VPLS
4.2.6.4. Shortest Path and Single Tree
4.2.6.5. Data Path and Forwarding
4.2.6.6. SPB Ethernet OAM
4.2.6.7. SPB Levels
4.2.7. SPBM to Non-SPBM Interworking
4.2.7.1. Static MACs and Static ISIDs
4.2.7.2. Epipe Static Configuration
4.2.7.2.1. I-VPLS Static Config
4.2.7.3. SPBM ISID Policies
4.2.8. ISID Policy Control
4.2.8.1. Static ISID Advertisement
4.2.8.2. I-VPLS for Unicast Service
4.2.9. Default Behaviors
4.2.10. Example Network Configuration
4.2.10.1. Sample Configuration for Dut-A
4.2.10.1.1. Show Commands Outputs
4.2.10.1.2. Debug Commands
4.2.10.1.3. Tools Commands
4.2.10.1.4. Clear Commands
4.2.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
4.2.12. MMRP Support Over B-VPLS SAPs and SDPs
4.2.12.1. I-VPLS Changes and Related MMRP Behavior
4.2.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
4.2.12.3. Optimization for Improved Convergence Time
4.2.12.4. Controlling MRP Scope using MRP Policies
4.2.13. PBB and BGP-AD
4.2.14. PBB E-Line Service
4.2.14.1. Non-Redundant PBB Epipe Spoke Termination
4.2.15. PBB Using G.8031 Protected Ethernet Tunnels
4.2.15.1. Solution Overview
4.2.15.2. Detailed Solution Description
4.2.15.3. Detailed PBB Emulated LAG Solution Description
4.2.15.4. Support Service and Solution Combinations
4.2.16. Periodic MAC Notification
4.2.17. MAC Flush
4.2.17.1. PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
4.2.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
4.2.17.1.2. PBB Blackholing Issue
4.2.17.1.3. LDP MAC Flush Solution for PBB Blackholing
4.2.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
4.2.18.1. Solution Description for I-VPLS Over Native PBB Core
4.2.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
4.2.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
4.2.19. BGP Multi-homing for I-VPLS
4.2.20. Access Multi-Homing over MPLS for PBB Epipes
4.2.21. PBB and IGMP/MLD Snooping
4.2.22. PBB and PIM Snooping
4.2.23. PBB QoS
4.2.23.1. Transparency of Customer QoS Indication through PBB Backbone
4.2.23.1.1. Configuration Examples
4.2.23.1.2. Details Solution Description
4.2.24. Egress B-SAP per ISID Shaping
4.2.24.1. B-SAP Egress ISID Shaping Configuration
4.2.24.2. Provisioning Model
4.2.24.3. Egress Queue Scheduling
4.2.24.4. B-SAP per-ISID Shaping Configuration Example
4.2.25. PBB OAM
4.2.25.1. Mirroring
4.2.25.2. OAM Commands
4.2.25.3. CFM Support
4.3. Configuration Examples
4.3.1. PBB using G.8031 Protected Ethernet Tunnels
4.3.2. MC-LAG Multi-homing for Native PBB
4.3.3. Access Multi-Homing over MPLS for PBB Epipes
4.4. PBB Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Global Commands
4.4.1.2. SAP Commands
4.4.1.3. Mesh SDP Commands
4.4.1.4. Spoke SDP Commands
4.4.1.5. BGP-MH for I-VPLS Commands
4.4.2. Command Descriptions
4.4.2.1. Global Commands
4.4.2.2. SAP Commands
4.4.2.3. BGP-MH for I-VPLS Commands
4.5. PBB Show, Clear, and Debug Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Debug Commands
4.5.2. Command Descriptions
4.5.2.1. PBB Show Commands
4.5.2.2. PBB Clear Commands
4.5.2.3. PBB Debug Commands
5. Ethernet Virtual Private Networks (EVPNs)
5.1. Overview and EVPN Applications
5.1.1. EVPN for VXLAN Tunnels in a Layer 2 DC GW (EVPN-VXLAN)
5.1.2. EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DC GW
5.1.3. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
5.1.4. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
5.1.5. EVPN for MPLS Tunnels in E-LAN Services
5.1.6. EVPN for MPLS Tunnels in E-Line Services
5.1.7. EVPN for MPLS Tunnels in E-Tree Services
5.1.8. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
5.2. EVPN for VXLAN Tunnels and Cloud Technologies
5.2.1. VXLAN
5.2.1.1. VXLAN ECMP and LAG
5.2.1.2. VXLAN VPLS Tag Handling
5.2.1.3. VXLAN MTU Considerations
5.2.1.4. VXLAN QoS
5.2.1.4.1. Ingress
5.2.1.4.2. Egress
5.2.1.5. VXLAN Ping
5.2.1.6. EVPN-VXLAN Routed VPLS Multicast Routing Support
5.2.1.7. IGMP and MLD Snooping on VXLAN
5.2.1.8. PIM Snooping on VXLAN
5.2.1.9. Static VXLAN Termination in Epipe Services
5.2.1.10. Static VXLAN Termination in VPLS/R-VPLS Services
5.2.1.11. Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
5.2.2. EVPN for Overlay Tunnels
5.2.2.1. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
5.2.2.2. EVPN for VXLAN in VPLS Services
5.2.2.2.1. Resiliency and BGP Multi-Homing
5.2.2.2.2. Use of BGP-EVPN, BGP-AD, and Sites in the Same VPLS Service
5.2.2.2.3. Use of the unknown-mac-route
5.2.2.3. EVPN for VXLAN in R-VPLS Services
5.2.2.3.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.3.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.2.4. EVPN-VPWS for VXLAN Tunnels
5.2.2.4.1. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.2.2.4.2. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.2.3. DC GW integration with the Nuage Virtual Services Directory (VSD)
5.2.3.1. XMPP Interface on the DC GW
5.2.3.2. Overview of the Static-Dynamic VSD Integration Model
5.2.3.3. VSD-Domains and Association to Static-Dynamic Services
5.2.3.3.1. VSD-Domain Type L2-DOMAIN
5.2.3.3.2. VSD-Domain Type L2-DOMAIN-IRB
5.2.3.3.3. VSD-Domain Type VRF-GRE
5.2.3.3.4. VSD-Domain Type VRF-VXLAN
5.2.3.4. Fully-Dynamic VSD Integration Model
5.2.3.4.1. Python Script Implementation Details
5.2.3.4.2. Provisioning Filters using the VSD Fully Dynamic Model
5.2.4. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
5.2.4.1. Replicator (AR-R) Procedures
5.2.4.2. Leaf (AR-L) procedures
5.2.4.3. Assisted-Replication Interaction with Other VPLS Features
5.2.5. DC GW Policy Based Forwarding/Routing to an EVPN ESI
5.2.5.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
5.2.5.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
5.2.6. EVPN VXLAN Multihoming
5.2.6.1. Local Bias for EVPN VXLAN Multihoming
5.2.6.2. Known Limitations for Local Bias
5.2.6.3. Non-system IPv4 and IPv6 VXLAN Termination for EVPN VXLAN Multihoming
5.3. EVPN for MPLS Tunnels
5.3.1. BGP-EVPN Control Plane for MPLS Tunnels
5.3.2. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
5.3.2.1. EVPN and VPLS Integration
5.3.2.2. EVPN Single-Active Multi-Homing and BGP-VPLS Integration
5.3.2.3. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
5.3.2.4. EVPN Multi-Homing in VPLS Services
5.3.2.4.1. EVPN All-Active Multi-Homing
5.3.2.4.2. EVPN Single-Active Multi-Homing
5.3.3. P2MP mLDP Tunnels for BUM Traffic in EVPN-MPLS Services
5.3.4. EVPN-VPWS for MPLS Tunnels
5.3.4.1. BGP-EVPN Control Plane for EVPN-VPWS
5.3.4.2. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
5.3.4.3. PW Ports-based ESs for EVPN-VPWS
5.3.5. EVPN for MPLS Tunnels in Routed VPLS Services
5.3.5.1. EVPN-MPLS Multi-Homing and Passive VRRP
5.3.6. PBB-EVPN
5.3.6.1. BGP-EVPN Control Plane for PBB-EVPN
5.3.6.1.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
5.3.6.1.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or B-MAC Routes)
5.3.6.1.3. EVPN Route Type 4 - ES Route
5.3.6.2. PBB-EVPN for I-VPLS and PBB Epipe Services
5.3.6.2.1. Flood Containment for I-VPLS Services
5.3.6.2.2. PBB-EVPN and PBB-VPLS Integration
5.3.6.2.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
5.3.6.2.4. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
5.3.6.2.5. PBB-EVPN ISID-Based C-MAC Flush
5.3.6.2.6. PBB-EVPN ISID-based Route Targets
5.3.7. Virtual Ethernet Segments
5.3.8. Preference-Based and Non-Revertive DF Election
5.3.9. EVPN-MPLS Routed VPLS Multicast Routing Support
5.3.10. IGMP Snooping in EVPN-MPLS and PBB EVPN Services
5.3.10.1. Data-driven IGMP Snooping Synchronization with EVPN Multihoming
5.3.11. PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
5.3.11.1. Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
5.3.12. EVPN E-Tree
5.3.12.1. BGP EVPN Control Plane for EVPN E-Tree
5.3.12.2. EVPN for MPLS Tunnels in E-Tree Services
5.3.12.3. EVPN E-Tree Operation
5.3.12.3.1. EVPN E-Tree Known Unicast Ingress Filtering
5.3.12.3.2. EVPN E-Tree BUM Egress Filtering
5.3.12.3.3. EVPN E-Tree Egress Filtering Based on MAC Source Address
5.3.12.4. EVPN E-Tree and EVPN Multi-homing
5.3.12.5. PBB-EVPN E-Tree Services
5.3.13. MPLS Entropy Label and Hash Label
5.3.14. Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
5.3.14.1. Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
5.3.14.2. BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.3. EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
5.3.14.4. EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
5.3.15. ECMP for EVPN-MPLS Destinations
5.3.16. IPv6 tunnel resolution for EVPN MPLS Services
5.3.17. EVPN Multi-Homing Support for MPLS Tunnels Resolved to Non-system IPv4/IPv6 Addresses
5.4. General EVPN Topics
5.4.1. ARP/ND Snooping and Proxy Support
5.4.1.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
5.4.1.2. Proxy-ND and the Router Flag in Neighbor Advertisement Messages
5.4.1.3. Procedure to Add the R Flag to a Specified Entry
5.4.1.4. Proxy-ARP/ND Mac-List for Dynamic Entries
5.4.2. BGP-EVPN MAC-Mobility
5.4.3. BGP-EVPN MAC-Duplication
5.4.4. Conditional Static MAC and Protection
5.4.5. Auto-Learn MAC Protect and Restricting Protected Source MACs
5.4.6. Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
5.4.7. Blackhole MAC for EVPN Loop Detection
5.4.8. CFM Interaction with EVPN Services
5.4.9. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS/R-VPLS Service
5.4.9.1. BGP-EVPN Routes in Services Configured with Two BGP Instances
5.4.9.2. Anycast Redundant Solution for Dual BGP Instance Services
5.4.9.3. Using P2MP mLDP in Redundant Anycast DC GWs
5.4.9.4. Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
5.4.9.4.1. BGP-EVPN Routes on Dual BGP-Instance Services with I-ES
5.4.9.4.2. Single-Active Multi-Homing on I-ES
5.4.9.4.3. All-Active Multi-Homing on I-ES
5.4.10. Configuring Multi-Instance EVPN-VXLAN in the Same VPLS/R-VPLS Service
5.4.10.1. BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
5.4.10.2. Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
5.4.10.3. Interconnect Ethernet-Segment Solution for Dual BGP EVPN VXLAN Instance Services
5.4.11. Configuring Static VXLAN and EVPN in the Same VPLS/R-VPLS Service
5.4.12. EVPN IP-Prefix Route Interoperability
5.4.12.1. Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
5.4.12.2. Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
5.4.12.3. Interface-less IP-VRF-to-IP-VRF Model
5.4.13. ARP-ND Host Routes for Extended Layer 2 Data Centers
5.4.14. EVPN Host Mobility Procedures within the Same R-VPLS Service
5.4.14.1. EVPN Host Mobility Configuration
5.4.14.1.1. Host Mobility Case 1
5.4.14.1.2. Host Mobility Case 2
5.4.14.1.3. Host Mobility Case 3
5.4.15. BGP and EVPN Route Selection for EVPN Routes
5.4.16. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.4.17. Oper-Groups Interaction with EVPN Services
5.4.17.1. LAG-Based Link Loss Forwarding for EVPN-VPWS Services
5.4.17.2. Core Isolation Blackhole Avoidance
5.4.17.3. LAG Standby Signaling to the CE on Non-DF EVPN PEs (Single-Active)
5.4.18. EVPN Layer-3 Optimized Inter-Subnet Multicast (OISM)
5.4.18.1. Introduction and Terminology
5.4.18.2. OISM Forwarding Plane
5.4.18.3. OISM Control Plane
5.4.18.4. EVPN OISM and Multi-Homing
5.4.18.5. EVPN OISM Configuration Guidelines
5.4.18.6. Use of mLDP in OISM
5.4.18.7. Example of mLDP in OISM
5.4.19. Interaction of EVPN and Other Features
5.4.19.1. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
5.4.19.2. Interaction of PBB-EVPN with Existing VPLS Features
5.4.19.3. Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
5.4.20. Routing Policies for BGP EVPN Routes
5.4.20.1. Routing Policies for BGP EVPN IP Prefixes
5.5. Configuring an EVPN Service with CLI
5.5.1. EVPN-VXLAN Configuration Examples
5.5.1.1. Layer 2 PE Example
5.5.1.2. EVPN for VXLAN in R-VPLS Services Example
5.5.1.3. EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
5.5.1.4. EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
5.5.2. EVPN-MPLS Configuration Examples
5.5.2.1. EVPN All-active Multi-homing Example
5.5.2.2. EVPN Single-active Multi-homing Example
5.5.3. PBB-EVPN Configuration Examples
5.5.3.1. PBB-EVPN All-active Multi-homing Example
5.5.3.2. PBB-EVPN Single-Active Multi-Homing Example
5.6. EVPN Command Reference
5.6.1. Command Hierarchies
5.6.1.1. EVPN Configuration Commands
5.6.1.1.1. Epipe Commands
5.6.1.1.2. VPLS Commands
5.6.1.1.3. IES/VPRN Commands
5.6.1.1.4. System Commands
5.6.1.2. Show Commands
5.6.1.3. Clear Commands
5.6.1.4. Debug Commands
5.6.1.5. Tools Commands
5.6.2. Command Descriptions
5.6.2.1. EVPN Configuration Commands
5.6.2.2. Show Configuration Commands
5.6.2.3. Clear Commands
5.6.2.4. Debug Commands
5.6.2.5. Tools Commands
6. Pseudowire Ports
6.1. Overview
6.2. PW Port Bound to a Physical Port
6.3. FPE-Based PW Port
6.3.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
6.3.2. PXC-Based PW-Port — Building the Cross-Connect
6.3.2.1. Building the Internal Transport Tunnel
6.3.2.2. Mapping the External PW to the PW-Port
6.3.2.3. Terminating the Service on PW-SAP
6.3.3. FPE-Based PW-port Operational State
6.3.4. QoS
6.3.4.1. Preservation of Forwarding Class Across PXC
6.3.5. Statistics on the FPE based PW-Port
6.3.6. Intra-Chassis Redundancy Models for PXC-Based PW Port
6.4. MSS and PW Ports
6.4.1. Configuration Examples
6.4.2. Concurrent Scheduling QoS Mechanisms on a PW Port
6.4.3. Show Command Examples
6.5. L2oGRE Termination on FPE-Based PW Port
6.5.1. L2oGRE Packet Format
6.5.2. GRE Delivery Protocol
6.5.3. Tracking Payloads and Service Termination Points
6.5.3.1. Plain L3 termination
6.5.3.2. Layer 2 Termination
6.5.3.3. ESM Termination
6.5.4. Configuration Steps
6.5.5. Fragmentation and MTU Configuration
6.5.6. Reassembly
6.6. Pseudowire Ports Command Reference
6.6.1. Command Hierarchies
6.6.1.1. PW Port Configuration Commands
6.6.1.2. Redundant Interface Commands
6.6.1.3. Show Commands
6.6.2. Command Descriptions
6.6.2.1. PW Port Configuration Commands
6.6.2.2. SDP Binding Commands
6.6.2.3. Show Commands
7. VSR Pseudowire Ports
7.1. Flex PW Ports
7.1.1. PW Port List
7.1.2. Failover Times
7.1.3. QoS
7.1.4. PW Port Termination for Various Tunnel Types
7.1.4.1. MPLS-Based Spoke SDP
7.1.4.1.1. Provisioning
7.1.4.1.2. Flex PW-Port Operational State for MPLS Based Spoke SDP
7.1.4.1.3. Statistics
7.1.4.2. L2oGRE-Based Spoke SDP
7.1.4.2.1. Provisioning
7.1.4.2.2. Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
7.1.4.2.3. Reassembly
7.2. VSR Pseudowire Ports Command Reference
7.2.1. Command Hierarchies
7.2.1.1. PW Port Configuration Commands
7.2.1.2. Show Commands
7.2.1.3. Clear Commands
7.2.2. Command Descriptions
7.2.2.1. PW Port Configuration Commands
7.2.2.2. Show Commands
7.2.2.3. Clear Commands
8. Standards and Protocol Support
Customer Document and Product Support
Layer 3 Services Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Layer 3 Services Configuration Process
2. Internet Enhanced Service
2.1. IES Service Overview
2.2. IES Features
2.2.1. IP Interfaces
2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
2.2.1.1.1. QPPB Applications
2.2.1.1.2. Inter-AS Coordination of QoS Policies
2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
2.2.1.2. QPPB
2.2.1.2.1. Associating an FC and Priority with a Route
2.2.1.2.2. Displaying QoS Information Associated with Routes
2.2.1.2.3. Enabling QPPB on an IP Interface
2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.2.1.2.5. QPPB and Multiple Paths to a Destination
2.2.1.2.6. QPPB and Policy-Based Routing
2.2.1.3. QPPB and GRT Lookup
2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
2.2.1.4. Object Grouping and State Monitoring
2.2.1.4.1. IES IP Interface Applicability
2.2.2. Subscriber Interfaces
2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
2.2.2.2. RADIUS Accounting
2.2.3. SAPs
2.2.3.1. Encapsulations
2.2.3.2. ATM SAP Encapsulations for IES
2.2.3.3. Pseudowire SAPs
2.2.3.4. Encapsulation
2.2.3.5. Pseudowire SAP Configuration
2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
2.2.3.7. Shaping and Bandwidth Control
2.2.3.8. Lag Considerations
2.2.3.9. Last Mile Packet Size Adjustment
2.2.3.10. Redundancy with Pseudowire SAPs
2.2.3.11. Operational Group Support for PW Ports
2.2.4. Routing Protocols
2.2.4.1. CPE Connectivity Check
2.2.5. QoS Policies
2.2.6. Filter Policies
2.2.7. MPLS Entropy Label and Hash Label
2.2.8. Spoke SDPs
2.2.9. SRRP
2.2.9.1. SRRP Messaging
2.2.9.2. SRRP and Multi-Chassis Synchronization
2.2.9.3. SRRP Instance
2.2.9.3.1. SRRP Instance MCS Key
2.2.9.3.2. Containing Service Type and ID
2.2.9.3.3. Containing Subscriber IP Interface Name
2.2.9.3.4. Subscriber Subnet Information
2.2.9.3.5. Containing Group IP Interface Information
2.2.9.3.6. Remote Redundant IP Interface Mismatch
2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
2.2.9.3.10. Local and Remote Dual Master Detected
2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
2.2.9.7. BFD with SRRP/VRRP
2.3. Configuring an IES Service with CLI
2.3.1. Basic Configuration
2.3.2. Common Configuration Tasks
2.3.3. Configuring IES Components
2.3.3.1. Configuring an IES Service
2.3.3.2. Configuring IES Subscriber Interface Parameters
2.3.3.3. Configuring IES Interface Parameters
2.3.3.4. Configuring Spoke-SDP Parameters
2.3.3.5. Configuring SAP Parameters
2.3.3.6. Configuring IES SAP ATM Parameters
2.3.3.7. Configuring VRRP
2.3.3.8. Configuring IPsec Parameters
2.3.3.9. IGMP Host Tracking
2.4. Service Management Tasks
2.4.1. Modifying IES Service Parameters
2.4.2. Deleting a Spoke-SDP
2.4.3. Deleting an IES Service
2.4.4. Disabling an IES Service
2.4.5. Re-Enabling an IES Service
2.5. IES Services Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Global Commands
2.5.1.2. AARP Interface Commands
2.5.1.3. IES Service Interface Commands
2.5.1.4. Routed VPLS Commands
2.5.1.5. Redundant Interface Commands
2.5.1.6. Interface SAP Commands
2.5.1.7. VRRP Commands
2.5.1.8. Spoke SDP Commands
2.5.1.9. Subscriber Interface Commands
2.5.1.9.1. Group Interface Commands
2.5.1.9.2. Group Interface SAP Commands
2.5.2. Command Descriptions
2.5.2.1. Generic Commands
2.5.2.2. IES Global Commands
2.5.2.3. AARP Interface Commands
2.5.2.4. IES Interface Commands
2.5.2.5. Redundant Interface Commands
2.5.2.6. IES Subscriber Interface Commands
2.5.2.7. IES Interface ICMP Commands
2.5.2.8. IES Interface IPv6 Commands
2.5.2.9. IES Spoke SDP Commands
2.5.2.10. IES SAP Commands
2.5.2.11. SAP Subscriber Management Commands
2.5.2.12. ETH-CFM Service Commands
2.5.2.13. IES Filter and QoS Policy Commands
2.5.2.14. ATM Commands
2.5.2.15. IES Interface VRRP Commands
2.6. IES Show, Clear, and Debug Command Reference
2.6.1. Command Hierarchies
2.6.1.1. Show Commands
2.6.1.2. Clear Commands
2.6.1.3. Debug Commands
2.6.1.4. Monitor Commands
2.6.2. Command Descriptions
2.6.2.1. IES Show Commands
2.6.2.2. IES Clear Commands
2.6.2.3. IES Debug Commands
2.6.2.4. IES Monitor Commands
3. Virtual Private Routed Network Service
3.1. VPRN Service Overview
3.1.1. Routing Prerequisites
3.1.2. Core MP-BGP Support
3.1.3. Route Distinguishers
3.1.3.1. eiBGP Load Balancing
3.1.4. Route Reflector
3.1.5. CE to PE Route Exchange
3.1.5.1. Route Redistribution
3.1.5.2. CPE Connectivity Check
3.1.6. Constrained Route Distribution (RT Constraint)
3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
3.1.6.2. Configuring the Route Target Address Family
3.1.6.3. Originating RT Constraint Routes
3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
3.1.6.5. Using RT Constraint Routes
3.1.7. BGP Fast Reroute in a VPRN
3.1.7.1. BGP Fast Reroute in a VPRN Configuration
3.1.8. BGP Best-External in a VPRN Context
3.2. VPRN Features
3.2.1. IP Interfaces
3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
3.2.1.2. QPPB Applications
3.2.1.3. Inter-AS Coordination of QoS Policies
3.2.1.4. Traffic Differentiation Based on Route Characteristics
3.2.1.5. QPPB
3.2.1.6. Associating an FC and Priority with a Route
3.2.1.7. Displaying QoS Information Associated with Routes
3.2.1.8. Enabling QPPB on an IP interface
3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
3.2.1.10. QPPB and Multiple Paths to a Destination
3.2.1.11. QPPB and Policy-Based Routing
3.2.1.12. QPPB and GRT Lookup
3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
3.2.1.14. Object Grouping and State Monitoring
3.2.1.15. VPRN IP Interface Applicability
3.2.2. Subscriber Interfaces
3.2.3. SAPs
3.2.3.1. Encapsulations
3.2.3.2. ATM SAP Encapsulations for VPRN Services
3.2.3.3. Pseudowire SAPs
3.2.4. QoS Policies
3.2.5. Filter Policies
3.2.6. DSCP Marking
3.2.6.1. Default DSCP Mapping Table
3.2.7. Configuration of TTL Propagation for VPRN Routes
3.2.8. CE to PE Routing Protocols
3.2.8.1. PE to PE Tunneling Mechanisms
3.2.8.2. Per VRF Route Limiting
3.2.9. Spoke SDPs
3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
3.2.9.2. Spoke SDP Redundancy into IES/VPRN
3.2.9.3. Weighted ECMP for Spoke-SDPs Terminating on IES/VPRN and R-VPLS Interfaces
3.2.10. IP-VPNs
3.2.10.1. Using OSPF in IP-VPNs
3.2.11. IPCP Subnet Negotiation
3.2.12. Cflowd for IP-VPNs
3.2.13. Inter-AS VPRNs
3.2.14. VPRN Label Security at Inter-AS Boundary
3.2.14.1. Feature Configuration
3.2.14.2. CPM Behavior
3.2.14.3. Data Path Forwarding Behavior
3.2.15. Carrier Supporting Carrier (CSC)
3.2.15.1. Terminology
3.2.15.2. CSC Connectivity Models
3.2.15.3. CSC-PE Configuration and Operation
3.2.15.4. CSC Interface
3.2.15.5. QoS
3.2.15.6. MPLS
3.2.15.7. CSC VPRN Service Configuration
3.2.16. Node Management Using VPRN
3.2.16.1. VPRN Management
3.2.16.2. AAA Management
3.2.16.3. SNMP Management
3.2.16.4. Events and Notifications
3.2.16.5. DNS Resolution
3.2.17. Traffic Leaking to GRT
3.2.18. Traffic Leaking from VPRN to GRT for IPv6
3.2.19. RIP Metric Propagation in VPRNs
3.2.20. NTP Within a VPRN Service
3.2.21. PTP Within a VPRN Service
3.2.22. VPN Route Label Allocation
3.2.22.1. Configuring the Service Label Mode
3.2.22.2. Restrictions and Usage Notes
3.2.23. VPRN Support for BGP FlowSpec
3.2.24. MPLS Entropy Label and Hash Label
3.2.25. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
3.2.26. Route Leaking from the Global Route Table to VPRN Instances
3.2.27. Class-Based Forwarding of VPN-v4/v6 Prefixes over RSVP-TE or SR-TE LSPs
3.2.27.1. Feature Configuration
3.2.27.2. Feature Behavior
3.3. QoS on Ingress Bindings
3.4. Multicast in IP-VPN Applications
3.4.1. Use of Data MDTs
3.4.2. Multicast Protocols Supported in the Provider Network
3.4.3. MVPN Membership Auto-discovery using BGP
3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
3.4.5. VRF Route Import Extended Community
3.4.6. Provider Tunnel Support
3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
3.4.6.3. P2MP LDP I-PMSI and S-PMSI
3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
3.4.6.5. P2MP LSP S-PMSI
3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
3.4.6.7. MVPN Sender-only/Receiver-only
3.4.6.8. S-PMSI Trigger Thresholds
3.4.6.9. Migration from Existing Rosen Implementation
3.4.6.10. Policy-based S-PMSI
3.4.6.10.1. Supported MPLS Tunnels
3.4.6.10.2. Supported Multicast Features
3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
3.4.6.10.4. Configuration Example
3.4.6.11. Policy-based Data MDT
3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
3.4.8. Multicast VPN Extranet
3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.4.11. IPv6 MVPN Support
3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
3.4.13. NG-MVPN Core Diversity
3.4.13.1. NG-MVPN to Loopback Interface
3.4.13.2. NG-MVPN Core Diversity
3.4.13.3. Configuration Example
3.4.14. NG-MVPN Multicast Source Geo-Redundancy
3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
3.4.16. Inter-AS MVPN
3.4.16.1. BGP Connector Attribute
3.4.16.2. PIM RPF Vector
3.4.16.3. Inter-AS MVPN Option B
3.4.16.4. Inter-AS MVPN Option C
3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
3.4.16.5.2. Configuration Example
3.4.16.5.3. Inter-AS Non-segmented MLDP
3.4.16.5.4. ECMP
3.4.17. mLDP Non-Segmented Intra-AS (inter-area) MVPN Solution
3.4.17.1. Intra-AS and Inter-AS Option B
3.4.17.2. MVPN Next-Hop Self on ABRs
3.4.17.2.1. MVPN next-hop-self Policy Example
3.4.17.2.2. LDP Configuration Example
3.4.17.2.3. BGP Configuration Example
3.4.18. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
3.5. FIB Prioritization
3.6. Configuring a VPRN Service with CLI
3.6.1. Basic Configuration
3.6.2. Common Configuration Tasks
3.6.3. Configuring VPRN Components
3.6.3.1. Creating a VPRN Service
3.6.3.2. Configuring Global VPRN Parameters
3.6.3.3. Configuring VPRN Log Parameters
3.6.3.3.1. Configuring a Spoke-SDP
3.6.3.4. Configuring VPRN Protocols - PIM
3.6.3.4.1. Configuring Router Interfaces
3.6.3.4.2. Configuring VPRN Protocols - BGP
3.6.3.4.3. Configuring VPRN Protocols - RIP
3.6.3.4.4. Configuring VPRN Protocols - OSPF
3.6.3.4.5. Configuring a VPRN Interface
3.6.3.4.6. Configuring Overload State on a Single SFM
3.6.3.4.7. Configuring a VPRN Interface SAP
3.7. Service Management Tasks
3.7.1. Modifying VPRN Service Parameters
3.7.2. Deleting a VPRN Service
3.7.3. Disabling a VPRN Service
3.7.4. Re-enabling a VPRN Service
3.8. VPRN Service Configuration Commands
3.8.1. Command Hierarchies
3.8.1.1. VPRN Service Configuration Commands
3.8.1.2. AAA Remote Server Commands
3.8.1.3. AARP Interface Commands
3.8.1.4. BGP Configuration Commands
3.8.1.5. BGP Group Configuration Commands
3.8.1.6. BGP Group Neighbor Configuration Commands
3.8.1.7. GSMP Commands
3.8.1.8. IGMP Commands
3.8.1.9. Interface Commands
3.8.1.10. Interface SAP Commands
3.8.1.11. Interface Spoke SDP Commands
3.8.1.12. Interface VPLS Commands
3.8.1.13. Interface VRRP Commands
3.8.1.14. IS-IS Configuration Commands
3.8.1.15. L2TP Commands
3.8.1.16. Log Commands
3.8.1.17. Management Commands
3.8.1.18. MLD Configuration Commands
3.8.1.19. MSDP Configuration Commands
3.8.1.20. Multicast VPN Commands
3.8.1.21. Redundant Interface Commands
3.8.1.22. RIP Configuration Commands
3.8.1.23. Router Advertisement Commands
3.8.1.24. NAT Commands
3.8.1.25. Network Ingress Commands
3.8.1.26. Network Interface Commands
3.8.1.27. NTP Commands
3.8.1.28. OSPF Configuration Commands
3.8.1.29. PIM Configuration Commands
3.8.2. Command Descriptions
3.8.2.1. Generic Commands
3.8.2.2. Global Commands
3.8.2.3. AAA Remote Server Commands
3.8.2.4. AARP Interface Commands
3.8.2.5. BGP Commands
3.8.2.6. GSMP Commands
3.8.2.7. IGMP Commands
3.8.2.8. Interface Commands
3.8.2.9. Interface Commands
3.8.2.10. Interface ETH-CFM Commands
3.8.2.11. Interface ICMP Commands
3.8.2.12. Interface SAP Commands
3.8.2.13. Interface SAP ATM Commands
3.8.2.14. Interface SAP Filter and QoS Policy Commands
3.8.2.15. Interface Anti-Spoofing Commands
3.8.2.16. Interface VPLS Commands
3.8.2.17. Interface VRRP Commands
3.8.2.18. IS-IS Commands
3.8.2.19. L2TP Commands
3.8.2.19.1. Router L2TP Tunnel Commands
3.8.2.20. Log Commands
3.8.2.21. Management Commands
3.8.2.22. MLD Configuration Commands
3.8.2.23. MSDP Configuration Commands
3.8.2.24. Multicast VPN Commands
3.8.2.25. NAT Commands
3.8.2.26. Network Ingress Commands
3.8.2.27. Network Interface Commands
3.8.2.28. Network Time Protocol Commands
3.8.2.29. OSPF Commands
3.8.2.30. PIM Commands
3.8.2.31. Redundant Interface Commands
3.8.2.32. RIP Commands
3.8.2.33. Router Advertisement Commands
3.8.2.34. SDP Commands
3.9. VPRN Show, Clear, and Debug Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Show Commands
3.9.1.2. Clear Commands
3.9.1.3. Debug Commands
3.9.2. Command Descriptions
3.9.2.1. VPRN Show Commands
3.9.2.2. VPRN Clear Commands
3.9.2.3. VPRN Debug Commands
3.10. Tools Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Tools Commands
3.10.2. Command Descriptions
3.10.2.1. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Layer 3 Services Configuration Process
2. Internet Enhanced Service
2.1. IES Service Overview
2.2. IES Features
2.2.1. IP Interfaces
2.2.1.1. QoS Policy Propagation Using BGP (QPPB)
2.2.1.1.1. QPPB Applications
2.2.1.1.2. Inter-AS Coordination of QoS Policies
2.2.1.1.3. Traffic Differentiation Based on Route Characteristics
2.2.1.2. QPPB
2.2.1.2.1. Associating an FC and Priority with a Route
2.2.1.2.2. Displaying QoS Information Associated with Routes
2.2.1.2.3. Enabling QPPB on an IP Interface
2.2.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.2.1.2.5. QPPB and Multiple Paths to a Destination
2.2.1.2.6. QPPB and Policy-Based Routing
2.2.1.3. QPPB and GRT Lookup
2.2.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
2.2.1.4. Object Grouping and State Monitoring
2.2.1.4.1. IES IP Interface Applicability
2.2.2. Subscriber Interfaces
2.2.2.1. IPv6 Enhanced Subscriber Management (ESM)
2.2.2.2. RADIUS Accounting
2.2.3. SAPs
2.2.3.1. Encapsulations
2.2.3.2. ATM SAP Encapsulations for IES
2.2.3.3. Pseudowire SAPs
2.2.3.4. Encapsulation
2.2.3.5. Pseudowire SAP Configuration
2.2.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
2.2.3.7. Shaping and Bandwidth Control
2.2.3.8. Lag Considerations
2.2.3.9. Last Mile Packet Size Adjustment
2.2.3.10. Redundancy with Pseudowire SAPs
2.2.3.11. Operational Group Support for PW Ports
2.2.4. Routing Protocols
2.2.4.1. CPE Connectivity Check
2.2.5. QoS Policies
2.2.6. Filter Policies
2.2.7. MPLS Entropy Label and Hash Label
2.2.8. Spoke SDPs
2.2.9. SRRP
2.2.9.1. SRRP Messaging
2.2.9.2. SRRP and Multi-Chassis Synchronization
2.2.9.3. SRRP Instance
2.2.9.3.1. SRRP Instance MCS Key
2.2.9.3.2. Containing Service Type and ID
2.2.9.3.3. Containing Subscriber IP Interface Name
2.2.9.3.4. Subscriber Subnet Information
2.2.9.3.5. Containing Group IP Interface Information
2.2.9.3.6. Remote Redundant IP Interface Mismatch
2.2.9.3.7. Remote Sending Redundant IP Interface Unavailable
2.2.9.3.8. Remote SRRP Advertisement SAP Non-existent
2.2.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
2.2.9.3.10. Local and Remote Dual Master Detected
2.2.9.4. Subscriber Subnet Owned IP Address Connectivity
2.2.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
2.2.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
2.2.9.7. BFD with SRRP/VRRP
2.3. Configuring an IES Service with CLI
2.3.1. Basic Configuration
2.3.2. Common Configuration Tasks
2.3.3. Configuring IES Components
2.3.3.1. Configuring an IES Service
2.3.3.2. Configuring IES Subscriber Interface Parameters
2.3.3.3. Configuring IES Interface Parameters
2.3.3.4. Configuring Spoke-SDP Parameters
2.3.3.5. Configuring SAP Parameters
2.3.3.6. Configuring IES SAP ATM Parameters
2.3.3.7. Configuring VRRP
2.3.3.8. Configuring IPsec Parameters
2.3.3.9. IGMP Host Tracking
2.4. Service Management Tasks
2.4.1. Modifying IES Service Parameters
2.4.2. Deleting a Spoke-SDP
2.4.3. Deleting an IES Service
2.4.4. Disabling an IES Service
2.4.5. Re-Enabling an IES Service
2.5. IES Services Command Reference
2.5.1. Command Hierarchies
2.5.1.1. Global Commands
2.5.1.2. AARP Interface Commands
2.5.1.3. IES Service Interface Commands
2.5.1.4. Routed VPLS Commands
2.5.1.5. Redundant Interface Commands
2.5.1.6. Interface SAP Commands
2.5.1.7. VRRP Commands
2.5.1.8. Spoke SDP Commands
2.5.1.9. Subscriber Interface Commands
2.5.1.9.1. Group Interface Commands
2.5.1.9.2. Group Interface SAP Commands
2.5.2. Command Descriptions
2.5.2.1. Generic Commands
2.5.2.2. IES Global Commands
2.5.2.3. AARP Interface Commands
2.5.2.4. IES Interface Commands
2.5.2.5. Redundant Interface Commands
2.5.2.6. IES Subscriber Interface Commands
2.5.2.7. IES Interface ICMP Commands
2.5.2.8. IES Interface IPv6 Commands
2.5.2.9. IES Spoke SDP Commands
2.5.2.10. IES SAP Commands
2.5.2.11. SAP Subscriber Management Commands
2.5.2.12. ETH-CFM Service Commands
2.5.2.13. IES Filter and QoS Policy Commands
2.5.2.14. ATM Commands
2.5.2.15. IES Interface VRRP Commands
2.6. IES Show, Clear, and Debug Command Reference
2.6.1. Command Hierarchies
2.6.1.1. Show Commands
2.6.1.2. Clear Commands
2.6.1.3. Debug Commands
2.6.1.4. Monitor Commands
2.6.2. Command Descriptions
2.6.2.1. IES Show Commands
2.6.2.2. IES Clear Commands
2.6.2.3. IES Debug Commands
2.6.2.4. IES Monitor Commands
3. Virtual Private Routed Network Service
3.1. VPRN Service Overview
3.1.1. Routing Prerequisites
3.1.2. Core MP-BGP Support
3.1.3. Route Distinguishers
3.1.3.1. eiBGP Load Balancing
3.1.4. Route Reflector
3.1.5. CE to PE Route Exchange
3.1.5.1. Route Redistribution
3.1.5.2. CPE Connectivity Check
3.1.6. Constrained Route Distribution (RT Constraint)
3.1.6.1. Constrained VPN Route Distribution Based on Route Targets
3.1.6.2. Configuring the Route Target Address Family
3.1.6.3. Originating RT Constraint Routes
3.1.6.4. Receiving and Re-Advertising RT Constraint Routes
3.1.6.5. Using RT Constraint Routes
3.1.7. BGP Fast Reroute in a VPRN
3.1.7.1. BGP Fast Reroute in a VPRN Configuration
3.1.8. BGP Best-External in a VPRN Context
3.2. VPRN Features
3.2.1. IP Interfaces
3.2.1.1. QoS Policy Propagation Using BGP (QPPB)
3.2.1.2. QPPB Applications
3.2.1.3. Inter-AS Coordination of QoS Policies
3.2.1.4. Traffic Differentiation Based on Route Characteristics
3.2.1.5. QPPB
3.2.1.6. Associating an FC and Priority with a Route
3.2.1.7. Displaying QoS Information Associated with Routes
3.2.1.8. Enabling QPPB on an IP interface
3.2.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
3.2.1.10. QPPB and Multiple Paths to a Destination
3.2.1.11. QPPB and Policy-Based Routing
3.2.1.12. QPPB and GRT Lookup
3.2.1.13. QPPB Interaction with SAP Ingress QoS Policy
3.2.1.14. Object Grouping and State Monitoring
3.2.1.15. VPRN IP Interface Applicability
3.2.2. Subscriber Interfaces
3.2.3. SAPs
3.2.3.1. Encapsulations
3.2.3.2. ATM SAP Encapsulations for VPRN Services
3.2.3.3. Pseudowire SAPs
3.2.4. QoS Policies
3.2.5. Filter Policies
3.2.6. DSCP Marking
3.2.6.1. Default DSCP Mapping Table
3.2.7. Configuration of TTL Propagation for VPRN Routes
3.2.8. CE to PE Routing Protocols
3.2.8.1. PE to PE Tunneling Mechanisms
3.2.8.2. Per VRF Route Limiting
3.2.9. Spoke SDPs
3.2.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
3.2.9.2. Spoke SDP Redundancy into IES/VPRN
3.2.9.3. Weighted ECMP for Spoke-SDPs Terminating on IES/VPRN and R-VPLS Interfaces
3.2.10. IP-VPNs
3.2.10.1. Using OSPF in IP-VPNs
3.2.11. IPCP Subnet Negotiation
3.2.12. Cflowd for IP-VPNs
3.2.13. Inter-AS VPRNs
3.2.14. VPRN Label Security at Inter-AS Boundary
3.2.14.1. Feature Configuration
3.2.14.2. CPM Behavior
3.2.14.3. Data Path Forwarding Behavior
3.2.15. Carrier Supporting Carrier (CSC)
3.2.15.1. Terminology
3.2.15.2. CSC Connectivity Models
3.2.15.3. CSC-PE Configuration and Operation
3.2.15.4. CSC Interface
3.2.15.5. QoS
3.2.15.6. MPLS
3.2.15.7. CSC VPRN Service Configuration
3.2.16. Node Management Using VPRN
3.2.16.1. VPRN Management
3.2.16.2. AAA Management
3.2.16.3. SNMP Management
3.2.16.4. Events and Notifications
3.2.16.5. DNS Resolution
3.2.17. Traffic Leaking to GRT
3.2.18. Traffic Leaking from VPRN to GRT for IPv6
3.2.19. RIP Metric Propagation in VPRNs
3.2.20. NTP Within a VPRN Service
3.2.21. PTP Within a VPRN Service
3.2.22. VPN Route Label Allocation
3.2.22.1. Configuring the Service Label Mode
3.2.22.2. Restrictions and Usage Notes
3.2.23. VPRN Support for BGP FlowSpec
3.2.24. MPLS Entropy Label and Hash Label
3.2.25. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
3.2.26. Route Leaking from the Global Route Table to VPRN Instances
3.2.27. Class-Based Forwarding of VPN-v4/v6 Prefixes over RSVP-TE or SR-TE LSPs
3.2.27.1. Feature Configuration
3.2.27.2. Feature Behavior
3.3. QoS on Ingress Bindings
3.4. Multicast in IP-VPN Applications
3.4.1. Use of Data MDTs
3.4.2. Multicast Protocols Supported in the Provider Network
3.4.3. MVPN Membership Auto-discovery using BGP
3.4.4. PE-PE Transmission of C-Multicast Routing using BGP
3.4.5. VRF Route Import Extended Community
3.4.6. Provider Tunnel Support
3.4.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
3.4.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
3.4.6.3. P2MP LDP I-PMSI and S-PMSI
3.4.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
3.4.6.5. P2MP LSP S-PMSI
3.4.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
3.4.6.7. MVPN Sender-only/Receiver-only
3.4.6.8. S-PMSI Trigger Thresholds
3.4.6.9. Migration from Existing Rosen Implementation
3.4.6.10. Policy-based S-PMSI
3.4.6.10.1. Supported MPLS Tunnels
3.4.6.10.2. Supported Multicast Features
3.4.6.10.3. In-service Changes to Multi-stream S-PMSI
3.4.6.10.4. Configuration Example
3.4.6.11. Policy-based Data MDT
3.4.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
3.4.8. Multicast VPN Extranet
3.4.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
3.4.8.2. Multicast Extranet for NG-MVPN for PIM SSM
3.4.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
3.4.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
3.4.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
3.4.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
3.4.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.4.11. IPv6 MVPN Support
3.4.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
3.4.13. NG-MVPN Core Diversity
3.4.13.1. NG-MVPN to Loopback Interface
3.4.13.2. NG-MVPN Core Diversity
3.4.13.3. Configuration Example
3.4.14. NG-MVPN Multicast Source Geo-Redundancy
3.4.15. Multicast Core Diversity for Rosen MDT SAFI MVPNs
3.4.16. Inter-AS MVPN
3.4.16.1. BGP Connector Attribute
3.4.16.2. PIM RPF Vector
3.4.16.3. Inter-AS MVPN Option B
3.4.16.4. Inter-AS MVPN Option C
3.4.16.5. NG-MVPN Non-segmented Inter-AS Solution
3.4.16.5.1. Non-Segmented d-mLDP and Inter-AS VPN
3.4.16.5.2. Configuration Example
3.4.16.5.3. Inter-AS Non-segmented MLDP
3.4.16.5.4. ECMP
3.4.17. mLDP Non-Segmented Intra-AS (inter-area) MVPN Solution
3.4.17.1. Intra-AS and Inter-AS Option B
3.4.17.2. MVPN Next-Hop Self on ABRs
3.4.17.2.1. MVPN next-hop-self Policy Example
3.4.17.2.2. LDP Configuration Example
3.4.17.2.3. BGP Configuration Example
3.4.18. Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
3.5. FIB Prioritization
3.6. Configuring a VPRN Service with CLI
3.6.1. Basic Configuration
3.6.2. Common Configuration Tasks
3.6.3. Configuring VPRN Components
3.6.3.1. Creating a VPRN Service
3.6.3.2. Configuring Global VPRN Parameters
3.6.3.3. Configuring VPRN Log Parameters
3.6.3.3.1. Configuring a Spoke-SDP
3.6.3.4. Configuring VPRN Protocols - PIM
3.6.3.4.1. Configuring Router Interfaces
3.6.3.4.2. Configuring VPRN Protocols - BGP
3.6.3.4.3. Configuring VPRN Protocols - RIP
3.6.3.4.4. Configuring VPRN Protocols - OSPF
3.6.3.4.5. Configuring a VPRN Interface
3.6.3.4.6. Configuring Overload State on a Single SFM
3.6.3.4.7. Configuring a VPRN Interface SAP
3.7. Service Management Tasks
3.7.1. Modifying VPRN Service Parameters
3.7.2. Deleting a VPRN Service
3.7.3. Disabling a VPRN Service
3.7.4. Re-enabling a VPRN Service
3.8. VPRN Service Configuration Commands
3.8.1. Command Hierarchies
3.8.1.1. VPRN Service Configuration Commands
3.8.1.2. AAA Remote Server Commands
3.8.1.3. AARP Interface Commands
3.8.1.4. BGP Configuration Commands
3.8.1.5. BGP Group Configuration Commands
3.8.1.6. BGP Group Neighbor Configuration Commands
3.8.1.7. GSMP Commands
3.8.1.8. IGMP Commands
3.8.1.9. Interface Commands
3.8.1.10. Interface SAP Commands
3.8.1.11. Interface Spoke SDP Commands
3.8.1.12. Interface VPLS Commands
3.8.1.13. Interface VRRP Commands
3.8.1.14. IS-IS Configuration Commands
3.8.1.15. L2TP Commands
3.8.1.16. Log Commands
3.8.1.17. Management Commands
3.8.1.18. MLD Configuration Commands
3.8.1.19. MSDP Configuration Commands
3.8.1.20. Multicast VPN Commands
3.8.1.21. Redundant Interface Commands
3.8.1.22. RIP Configuration Commands
3.8.1.23. Router Advertisement Commands
3.8.1.24. NAT Commands
3.8.1.25. Network Ingress Commands
3.8.1.26. Network Interface Commands
3.8.1.27. NTP Commands
3.8.1.28. OSPF Configuration Commands
3.8.1.29. PIM Configuration Commands
3.8.2. Command Descriptions
3.8.2.1. Generic Commands
3.8.2.2. Global Commands
3.8.2.3. AAA Remote Server Commands
3.8.2.4. AARP Interface Commands
3.8.2.5. BGP Commands
3.8.2.6. GSMP Commands
3.8.2.7. IGMP Commands
3.8.2.8. Interface Commands
3.8.2.9. Interface Commands
3.8.2.10. Interface ETH-CFM Commands
3.8.2.11. Interface ICMP Commands
3.8.2.12. Interface SAP Commands
3.8.2.13. Interface SAP ATM Commands
3.8.2.14. Interface SAP Filter and QoS Policy Commands
3.8.2.15. Interface Anti-Spoofing Commands
3.8.2.16. Interface VPLS Commands
3.8.2.17. Interface VRRP Commands
3.8.2.18. IS-IS Commands
3.8.2.19. L2TP Commands
3.8.2.19.1. Router L2TP Tunnel Commands
3.8.2.20. Log Commands
3.8.2.21. Management Commands
3.8.2.22. MLD Configuration Commands
3.8.2.23. MSDP Configuration Commands
3.8.2.24. Multicast VPN Commands
3.8.2.25. NAT Commands
3.8.2.26. Network Ingress Commands
3.8.2.27. Network Interface Commands
3.8.2.28. Network Time Protocol Commands
3.8.2.29. OSPF Commands
3.8.2.30. PIM Commands
3.8.2.31. Redundant Interface Commands
3.8.2.32. RIP Commands
3.8.2.33. Router Advertisement Commands
3.8.2.34. SDP Commands
3.9. VPRN Show, Clear, and Debug Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Show Commands
3.9.1.2. Clear Commands
3.9.1.3. Debug Commands
3.9.2. Command Descriptions
3.9.2.1. VPRN Show Commands
3.9.2.2. VPRN Clear Commands
3.9.2.3. VPRN Debug Commands
3.10. Tools Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Tools Commands
3.10.2. Command Descriptions
3.10.2.1. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
Log Events Tool
Log Events Tool
Log Events Tool
MD-CLI Command Reference 20.7.R1
MD-CLI Command Reference 20.7.R1
MD-CLI Command Reference 20.7.R1
MD-CLI User Guide 20.7.R1
1. MD-CLI Overview
1.1. Using the MD-CLI
2. Controlling the Management Interface Configuration Mode
2.1. Enabling the MD-CLI
2.2. Switching Between the Classic CLI and MD-CLI Engines
2.2.1. Executing Classic CLI Commands from the MD-CLI Engine
2.2.2. MD-CLI and Classic CLI Engine Interactions
2.2.3. Switching Explicitly to the Classic CLI Engine
2.2.4. Switching Explicitly to the MD-CLI Engine
3. Navigating in the MD-CLI
3.1. The MD-CLI Tree Structure
3.2. The MD-CLI Command Prompt
3.3. Environment Commands
3.3.1. Customizing Per-Session Environment Settings
3.3.2. Customizing the Session Prompt
3.3.2.1. Customizing the Uncommitted Changes Indicator
3.3.2.2. Customizing the Line Preceding the Command Prompt
3.3.2.3. Customizing the Context Information in the Command Prompt
3.3.2.4. Customizing the Date and Time Output
3.3.3. Customizing the Progress Indicator
3.3.4. Customizing the Pagination Setting
3.3.5. Customizing the Console Settings
3.3.6. Customizing the Message Level Security Settings
3.3.7. Preventing Changes to Environment Settings
3.4. Using Online Help
3.4.1. Indicators in the Online Help
3.4.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
3.4.1.2. Immutable Elements
3.4.1.3. Mutually Exclusive Choice Elements
3.4.1.4. Optional Indicators in the Online Help
3.5. Operational Root and Global Commands
3.5.1. Using the oam Commands
3.5.1.1. OAM EFM Commands
3.5.1.2. OAM ETH-CFM Commands
3.5.1.3. OAM OAM-PM Commands
3.5.2. Using the ping Command
3.5.3. Using the ssh Command
3.5.4. Using the telnet Command
3.5.5. Using the traceroute Command
3.6. Navigating the MD-CLI Hierarchy Levels
3.7. Using the tree Command
3.7.1. Using the flat Option
3.7.2. Using the detail Option
3.8. Using Control Characters and Editing Keystrokes on the Command Line
3.9. Displaying Available Commands using Tab
3.9.1. Available Commands with Mutually Exclusive Commands
3.10. Using Command Completion
3.10.1. Variable Parameter Completion
3.10.1.1. Completion for Lists with a Default Keyword
3.10.1.2. Completion for Keyword-based Leaf-lists
3.10.1.3. Completion for Boolean Elements
3.11. Modifying the Idle Timeout Value for CLI Sessions
3.11.1. Idle Timeout Interaction with the Classic CLI
3.12. Using Output Modifiers in the MD-CLI
3.12.1. Using | match Options
3.12.1.1. Using Regular Expressions with | match
3.12.2. Using the | count Option
3.12.3. Using the | no-more Option
3.12.4. Using the File Redirect Option
3.13. Navigating Contexts in the MD-CLI
3.13.1. Entering Contexts
3.13.2. Exiting Contexts
3.14. Executing Commands from a File
3.14.1. Using Commands that Switch Engines in an Executable File
3.15. Displaying Information in the MD-CLI
3.15.1. Using the info Command
3.15.1.1. Displaying Lists
3.15.2. Using show Commands
3.15.2.1. Classic CLI Command Availability
3.16. MD-CLI Admin Tree
4. Configuring in the MD-CLI
4.1. Configuration Workflow
4.1.1. MD-CLI Session Modes
4.1.2. Transactional Configuration Method
4.1.3. Implicit and Explicit Configuration Workflows
4.1.3.1. Using the Implicit Configuration Workflow
4.1.3.2. Using the Explicit Configuration Workflow
4.1.3.3. Transitioning from an Implicit to an Explicit Configuration Workflow
4.2. Candidate Configuration Modes
4.2.1. Multiple Simultaneous Candidate Configurations
4.2.2. Private Configuration Mode
4.2.3. Exclusive Configuration Mode
4.2.4. Global Configuration Mode
4.2.5. Read-Only Configuration Mode
4.2.6. Transitioning Between Candidate Configuration Modes
4.2.7. Exclusive Private Configuration Session
4.2.8. Restricting Configuration Mode Sessions
4.3. Modifying the Configuration
4.4. Adding Configuration Elements
4.4.1. Default Values for Key Leafs
4.4.2. Entering Integer Values
4.4.3. Configuring Lists
4.4.3.1. System-Ordered Lists
4.4.3.2. User-Ordered Lists
4.4.3.3. Special Handling for Lists with all Key Leafs
4.4.4. Configuring Leaf-Lists
4.4.4.1. System-Ordered Leaf-Lists
4.4.4.2. User-Ordered Leaf-Lists
4.4.5. Configuring Leafs with Units
4.4.6. Flexible Input for MAC and IPv6 Addresses
4.4.7. Input Translation
4.5. Deleting Configuration Elements
4.5.1. Deleting Leafs
4.5.2. Deleting Containers
4.5.3. Deleting List Entries and Lists
4.5.3.1. Deleting Leaf-List Entries and Leaf-Lists
4.6. Copying Configuration Elements
4.7. Committing a Configuration
4.7.1. Viewing the Uncommitted Configuration Changes
4.7.1.1. Using the compare Outputs to Copy and Paste
4.7.2. Discarding Configuration Changes
4.7.3. Validating the Candidate Configuration
4.7.4. Updating the Candidate Configuration
4.7.4.1. Example Update Scenario With Merge Conflicts
4.7.4.2. Example Update Scenario Without Merge Conflicts
4.7.5. Committing the Candidate Configuration
4.7.5.1. Using the commit confirmed Command
4.7.5.1.1. Non-persistent Operation
4.7.5.1.2. Persistent Identifier
4.8. Saving Changes
4.9. Rolling Back a Configuration from a Checkpoint File
4.10. Loading a Configuration File
4.10.1. Using info Outputs in Load Files
4.11. Using Configuration Groups
4.11.1. Creating Configuration Groups
4.11.1.1. Exact Match
4.11.1.2. Regular Expression Match
4.11.1.2.1. Regular Expression Match Format
4.11.1.3. Conflicting Match Criteria Within a Configuration Group
4.11.2. Applying Configuration Groups
4.11.3. Inheritance Rules
4.11.4. Displaying the Expanded Configuration
4.11.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
4.11.6. Configuration Group Example
4.11.7. Caveats
4.12. Viewing the Status of the Local Datastores
4.12.1. Unlocking a Locked Datastore
5. Displaying State Information in the MD-CLI
5.1. Navigating the State Tree
6. Troubleshooting
6.1. Debug commands
6.2. Logging Debug Events in the MD-CLI
7. Advanced Tips and Features
7.1. Discarding Changes in Specific Contexts
8. Creating MD-CLI Configuration from the Classic CLI
9. Standards and Protocol Support
Customer Document and Product Support
1. MD-CLI Overview
1.1. Using the MD-CLI
2. Controlling the Management Interface Configuration Mode
2.1. Enabling the MD-CLI
2.2. Switching Between the Classic CLI and MD-CLI Engines
2.2.1. Executing Classic CLI Commands from the MD-CLI Engine
2.2.2. MD-CLI and Classic CLI Engine Interactions
2.2.3. Switching Explicitly to the Classic CLI Engine
2.2.4. Switching Explicitly to the MD-CLI Engine
3. Navigating in the MD-CLI
3.1. The MD-CLI Tree Structure
3.2. The MD-CLI Command Prompt
3.3. Environment Commands
3.3.1. Customizing Per-Session Environment Settings
3.3.2. Customizing the Session Prompt
3.3.2.1. Customizing the Uncommitted Changes Indicator
3.3.2.2. Customizing the Line Preceding the Command Prompt
3.3.2.3. Customizing the Context Information in the Command Prompt
3.3.2.4. Customizing the Date and Time Output
3.3.3. Customizing the Progress Indicator
3.3.4. Customizing the Pagination Setting
3.3.5. Customizing the Console Settings
3.3.6. Customizing the Message Level Security Settings
3.3.7. Preventing Changes to Environment Settings
3.4. Using Online Help
3.4.1. Indicators in the Online Help
3.4.1.1. Descriptions and Format Guidelines for Leafs and Leaf-lists
3.4.1.2. Immutable Elements
3.4.1.3. Mutually Exclusive Choice Elements
3.4.1.4. Optional Indicators in the Online Help
3.5. Operational Root and Global Commands
3.5.1. Using the oam Commands
3.5.1.1. OAM EFM Commands
3.5.1.2. OAM ETH-CFM Commands
3.5.1.3. OAM OAM-PM Commands
3.5.2. Using the ping Command
3.5.3. Using the ssh Command
3.5.4. Using the telnet Command
3.5.5. Using the traceroute Command
3.6. Navigating the MD-CLI Hierarchy Levels
3.7. Using the tree Command
3.7.1. Using the flat Option
3.7.2. Using the detail Option
3.8. Using Control Characters and Editing Keystrokes on the Command Line
3.9. Displaying Available Commands using Tab
3.9.1. Available Commands with Mutually Exclusive Commands
3.10. Using Command Completion
3.10.1. Variable Parameter Completion
3.10.1.1. Completion for Lists with a Default Keyword
3.10.1.2. Completion for Keyword-based Leaf-lists
3.10.1.3. Completion for Boolean Elements
3.11. Modifying the Idle Timeout Value for CLI Sessions
3.11.1. Idle Timeout Interaction with the Classic CLI
3.12. Using Output Modifiers in the MD-CLI
3.12.1. Using | match Options
3.12.1.1. Using Regular Expressions with | match
3.12.2. Using the | count Option
3.12.3. Using the | no-more Option
3.12.4. Using the File Redirect Option
3.13. Navigating Contexts in the MD-CLI
3.13.1. Entering Contexts
3.13.2. Exiting Contexts
3.14. Executing Commands from a File
3.14.1. Using Commands that Switch Engines in an Executable File
3.15. Displaying Information in the MD-CLI
3.15.1. Using the info Command
3.15.1.1. Displaying Lists
3.15.2. Using show Commands
3.15.2.1. Classic CLI Command Availability
3.16. MD-CLI Admin Tree
4. Configuring in the MD-CLI
4.1. Configuration Workflow
4.1.1. MD-CLI Session Modes
4.1.2. Transactional Configuration Method
4.1.3. Implicit and Explicit Configuration Workflows
4.1.3.1. Using the Implicit Configuration Workflow
4.1.3.2. Using the Explicit Configuration Workflow
4.1.3.3. Transitioning from an Implicit to an Explicit Configuration Workflow
4.2. Candidate Configuration Modes
4.2.1. Multiple Simultaneous Candidate Configurations
4.2.2. Private Configuration Mode
4.2.3. Exclusive Configuration Mode
4.2.4. Global Configuration Mode
4.2.5. Read-Only Configuration Mode
4.2.6. Transitioning Between Candidate Configuration Modes
4.2.7. Exclusive Private Configuration Session
4.2.8. Restricting Configuration Mode Sessions
4.3. Modifying the Configuration
4.4. Adding Configuration Elements
4.4.1. Default Values for Key Leafs
4.4.2. Entering Integer Values
4.4.3. Configuring Lists
4.4.3.1. System-Ordered Lists
4.4.3.2. User-Ordered Lists
4.4.3.3. Special Handling for Lists with all Key Leafs
4.4.4. Configuring Leaf-Lists
4.4.4.1. System-Ordered Leaf-Lists
4.4.4.2. User-Ordered Leaf-Lists
4.4.5. Configuring Leafs with Units
4.4.6. Flexible Input for MAC and IPv6 Addresses
4.4.7. Input Translation
4.5. Deleting Configuration Elements
4.5.1. Deleting Leafs
4.5.2. Deleting Containers
4.5.3. Deleting List Entries and Lists
4.5.3.1. Deleting Leaf-List Entries and Leaf-Lists
4.6. Copying Configuration Elements
4.7. Committing a Configuration
4.7.1. Viewing the Uncommitted Configuration Changes
4.7.1.1. Using the compare Outputs to Copy and Paste
4.7.2. Discarding Configuration Changes
4.7.3. Validating the Candidate Configuration
4.7.4. Updating the Candidate Configuration
4.7.4.1. Example Update Scenario With Merge Conflicts
4.7.4.2. Example Update Scenario Without Merge Conflicts
4.7.5. Committing the Candidate Configuration
4.7.5.1. Using the commit confirmed Command
4.7.5.1.1. Non-persistent Operation
4.7.5.1.2. Persistent Identifier
4.8. Saving Changes
4.9. Rolling Back a Configuration from a Checkpoint File
4.10. Loading a Configuration File
4.10.1. Using info Outputs in Load Files
4.11. Using Configuration Groups
4.11.1. Creating Configuration Groups
4.11.1.1. Exact Match
4.11.1.2. Regular Expression Match
4.11.1.2.1. Regular Expression Match Format
4.11.1.3. Conflicting Match Criteria Within a Configuration Group
4.11.2. Applying Configuration Groups
4.11.3. Inheritance Rules
4.11.4. Displaying the Expanded Configuration
4.11.5. Authentication, Authorization, and Accounting (AAA) in Configuration Groups
4.11.6. Configuration Group Example
4.11.7. Caveats
4.12. Viewing the Status of the Local Datastores
4.12.1. Unlocking a Locked Datastore
5. Displaying State Information in the MD-CLI
5.1. Navigating the State Tree
6. Troubleshooting
6.1. Debug commands
6.2. Logging Debug Events in the MD-CLI
7. Advanced Tips and Features
7.1. Discarding Changes in Specific Contexts
8. Creating MD-CLI Configuration from the Classic CLI
9. Standards and Protocol Support
Customer Document and Product Support
MD-CLI Quick Reference Guide
1. MD-CLI Overview
1.1. Enabling the SR OS MD-CLI
1.2. Disabling the SR OS MD-CLI
2. Navigational and Operational Commands
3. Entering and Leaving the Configuration Workflow
4. Configuration Workflow Commands
4.1. Commit Confirmed Commands
4.2. Configuration Management Commands
5. Output Modifiers
Customer Document and Product Support
1. MD-CLI Overview
1.1. Enabling the SR OS MD-CLI
1.2. Disabling the SR OS MD-CLI
2. Navigational and Operational Commands
3. Entering and Leaving the Configuration Workflow
4. Configuration Workflow Commands
4.1. Commit Confirmed Commands
4.2. Configuration Management Commands
5. Output Modifiers
Customer Document and Product Support
MPLS Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Nokia Router Configuration Process
2. MPLS and RSVP
2.1. MPLS
2.1.1. MPLS Label Stack
2.1.1.1. Label Values
2.1.1.2. Reserved Label Blocks
2.1.2. MPLS Entropy Label and Hash Label
2.1.2.1. Hash Label
2.1.2.2. Entropy Label
2.1.2.3. Inserting and Processing the Entropy Label at LERs and LSRs
2.1.2.3.1. Ingress LER
2.1.2.3.2. LSR
2.1.2.3.3. Egress LER
2.1.2.4. Mapping Entropy Label Capability at LSP Stitching Points
2.1.2.5. Entropy Label on OAM Packets
2.1.2.6. Impact of EL and ELI on MTU and Label Stack Depth
2.1.3. Label Switching Routers
2.1.3.1. LSP Types
2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
2.1.4.1. Bootstrapping and Maintaining the BFD Session
2.1.4.2. LSP BFD Configuration
2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
2.1.4.4. BFD Configuration on RSVP-TE LSPs
2.1.4.5. Using LSP BFD for LSP Path Protection
2.1.4.5.1. Failure-action down
2.1.4.5.2. Failure-action failover
2.1.4.5.3. LSP Active Path Failover Triggers
2.1.4.6. MPLS/RSVP on Broadcast Interface
2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.1.6. Manual Bypass LSP
2.1.6.1. PLR Bypass LSP Selection Rules
2.1.6.2. FRR Facility Background Evaluation Task
2.1.7. Uniform FRR Failover Time
2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
2.1.8.3. Measurement of LSP Bandwidth
2.1.8.4. Passive Monitoring of LSP Bandwidth
2.1.8.5. Periodic Automatic Bandwidth Adjustment
2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
2.1.8.8. Operational Bandwidth Carryover between Active Paths
2.1.9. LSP Failure Codes
2.1.10. Labeled Traffic Statistics
2.1.10.1. Interface Statistics
2.1.10.2. Traffic Statistics for Stacked Tunnels
2.1.10.3. Traffic Statistics Details and Scale
2.1.10.4. RSVP-TE and MPLS-TP Traffic Statistics
2.1.10.5. MPLS Forwarding Policy Statistics
2.1.10.6. gRPC-based RIB API Statistics
2.1.10.7. Segment Routing Statistics
2.1.10.8. SR-TE LSP Statistics
2.1.10.9. SR Policy Statistics
2.2. RSVP
2.2.1. Using RSVP for MPLS
2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
2.2.1.2. Hello Protocol
2.2.1.3. MD5 Authentication of RSVP Interface
2.2.1.4. Configuring Authentication using Keychains
2.2.2. Reservation Styles
2.2.2.1. RSVP Message Pacing
2.2.3. RSVP Overhead Refresh Reduction
2.2.4. RSVP Graceful Restart Helper
2.2.5. Enhancements to RSVP Control Plane Congestion Control
2.2.6. BFD for RSVP-TE
2.2.7. RSVP-TE LSP Statistics
2.2.8. P2MP RSVP-TE LSP Statistics
2.2.8.1. Configuring RSVP P2MP LSP Egress Statistics
2.2.8.2. Configuring RSVP P2MP LSP Ingress Statistics
2.2.8.3. Configuring Implicit Null
2.2.9. Using Unnumbered Point-to-Point Interface in RSVP
2.2.9.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.3. MPLS Transport Profile
2.3.1. MPLS-TP Model
2.3.2. MPLS-TP Provider Edge and Gateway
2.3.2.1. VLL Services
2.3.2.2. Spoke SDP Termination
2.3.3. MPLS-TP LSR
2.3.4. Detailed Descriptions of MPLS-TP
2.3.4.1. MPLS-TP LSPs
2.3.4.2. MPLS-TP on Pseudowires
2.3.5. MPLS-TP Maintenance Identifiers
2.3.5.1. Generic Associated Channel
2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.3.5.2.2. Proactive CC, CV and RDI
2.3.5.2.3. BFD-based RDI
2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.3.5.4. PW Control Channel Status Request Mechanism
2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
2.3.5.7. MPLS-TP LSP Protection
2.3.6. Alarm Indication Signal (AIS)
2.3.7. Configuring MPLS-TP
2.3.7.1. Configuration Overview
2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
2.3.7.5. Interface Configuration for MPLS-TP
2.3.7.6. LER Configuration for MPLS-TP
2.3.7.6.1. LSP and Path Configuration
2.3.7.6.2. Support for Downstream Mapping Information
2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
2.3.7.6.4. Protection templates and Linear Protection Configuration
2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.3.8. MPLS-TP Show Commands
2.3.8.1. Static MPLS Labels
2.3.8.2. MPLS-TP Tunnel Configuration
2.3.8.3. MPLS-TP Path configuration
2.3.8.4. MPLS-TP Protection
2.3.8.5. MPLS TP Node Configuration
2.3.8.6. MPLS-TP Interfaces
2.3.9. MPLS-TP Debug Commands
2.4. Traffic Engineering
2.4.1. TE Metric (IS-IS and OSPF)
2.4.2. Admin Group Support on Facility Bypass Backup LSP
2.4.2.1. Procedures at Head-End Node
2.4.2.2. Procedures at PLR Node
2.4.3. Manual and Timer Resignal of RSVP-TE Bypass LSP
2.4.3.1. RSVP-TE Bypass LSP Path SRLG Information Update in Manual and Timer Resignal MBB
2.4.3.2. RSVP-TE Bypass LSP Path Administrative Group Information Update in Manual and Timer Resignal MBB
2.4.4. RSVP-TE LSP Active Path Administrative Group Information Update in Timer Resignal MBB
2.4.5. Diff-Serv Traffic Engineering
2.4.5.1. Mapping of Traffic to a Diff-Serv LSP
2.4.5.2. Admission Control of Classes
2.4.5.2.1. Maximum Allocation Model
2.4.5.2.2. Russian Doll Model
2.4.5.3. RSVP Control Plane Extensions
2.4.5.4. IGP Extensions
2.4.5.5. Diff-Serv TE Configuration and Operation
2.4.5.5.1. RSVP Protocol Level
2.4.5.5.2. RSVP Interface Level
2.4.5.5.3. LSP and LSP Path Levels
2.4.6. Diff-Serv TE LSP Class Type Change under Failure
2.4.6.1. LSP Primary Path Retry Procedures
2.4.6.2. Bandwidth Sharing Across Class Types
2.4.6.3. Downgrading the CT of Bandwidth Sharing LSP Paths
2.4.6.4. Upgrading the CT of Bandwidth Sharing LSP Paths
2.5. IPv6 Traffic Engineering
2.5.1. Global Configuration
2.5.2. IS-IS Configuration
2.5.3. MPLS Configuration
2.5.4. IS-IS, BGP-LS and TE Database Extensions
2.5.4.1. BGP-LS Originator Node Handling of TE Attributes
2.5.4.2. TE Attributes Supported in IGP and BGP-LS
2.5.5. IS-IS IPv4/IPv6 SR-TE and IPv4 RSVP-TE Feature Behavior
2.5.6. IPv6 SR-TE LSP Support in MPLS
2.5.6.1. IPv6 SR-TE auto-LSP
2.6. Advanced MPLS/RSVP Features
2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
2.6.2. LSP Path Change
2.6.3. Manual LSP Path Switch
2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.6.5. Automatic Creation of RSVP-TE LSP Mesh
2.6.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
2.6.5.1.1. Feature Configuration
2.6.5.1.2. Feature Behavior
2.6.5.1.3. Multi-Area and Multi-Instance Support
2.6.5.1.4. Mesh LSP Name Encoding and Statistics
2.6.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
2.6.5.2.1. Feature Configuration
2.6.5.2.2. Feature Behavior
2.6.6. IGP Shortcut and Forwarding Adjacency
2.6.6.1. IGP Shortcut Feature Configuration
2.6.6.1.1. IGP Shortcut Binding Construct
2.6.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
2.6.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
2.6.6.2.2. Application Support
2.6.6.2.3. Loop-free Alternate (LFA) Protection Support
2.6.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
2.6.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
2.6.6.3.2. Application Support
2.6.6.3.3. Loop-free Alternate (LFA) Protection Support
2.6.6.4. Using LSP Relative Metric with IGP Shortcut
2.6.6.5. ECMP Considerations
2.6.6.6. Handling of Control Packets
2.6.6.7. Forwarding Adjacency
2.6.6.8. LDP Forwarding over IGP Shortcut
2.6.6.9. LDP Forwarding over Static Route Shortcut Tunnels
2.6.6.10. Handling of Multicast Packets
2.6.6.11. MPLS Entropy Label on Shortcut Tunnels
2.6.7. Disabling TTL Propagation in an LSP Shortcut
2.6.8. RSVP-TE LSP Signaling using LSP Template
2.6.9. Shared Risk Link Groups
2.6.9.1. Enabling Disjoint Backup Paths
2.6.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
2.6.9.3. Static Configurations of SRLG Memberships
2.6.10. TE Graceful Shutdown
2.6.11. Soft Preemption of Diff-Serv RSVP LSP
2.6.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
2.6.13. Inter-Area TE LSP (ERO Expansion Method)
2.6.13.1. Area Border Node FRR Protection for Inter-Area LSP
2.6.13.1.1. Rerouting of Inter-Area LSP
2.6.13.1.2. Behavior of MPLS Options in Inter-Area LSP
2.6.13.2. Inter-Area LSP support of OSPF Virtual Links
2.6.13.3. Area Border Node FRR Protection for Inter-Area LSP
2.6.14. Timer-based Reversion for RSVP-TE LSPs
2.6.15. LSP Tagging and Auto-Bind Using Tag Information
2.6.15.1. Internal Route Color to LSP Color Matching Algorithm
2.6.15.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
2.6.15.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
2.6.16. LSP Self Ping
2.6.16.1. Detailed Behavior of LSP Self Ping
2.6.16.2. Considerations for Scaled Scenarios
2.6.17. Accounting for Dark Bandwidth
2.7. Point-to-Multipoint (P2MP) RSVP LSP
2.7.1. Application in Video Broadcast
2.7.2. P2MP LSP Data Plane
2.7.2.1. Procedures at Ingress LER Node
2.7.2.2. Procedures at LSR Node
2.7.2.3. Procedures at Branch LSR Node
2.7.2.4. Procedures at Egress LER Node
2.7.2.5. Procedures at BUD LSR Node
2.7.3. Ingress Path Management for P2MP LSP Packets
2.7.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
2.7.4. RSVP Control Plane in a P2MP LSP
2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.7.5.1. Procedures at Ingress LER Node
2.7.5.2. Procedures at Egress LER Node
2.7.5.2.1. Procedures with a Primary Tunnel Interface
2.8. Segment Routing With Traffic Engineering (SR-TE)
2.8.1. SR-TE Support
2.8.2. SR-TE LSP Instantiation
2.8.2.1. PCC-Initiated and PCC-Controlled LSP
2.8.2.1.1. Guidelines for PCC-Initiated and PCC-Controlled LSPs
2.8.2.2. PCC-Initiated and PCE-Computed or Controlled LSP
2.8.3. SR-TE LSP Path Computation
2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
2.8.4. SR-TE LSP Path Computation Using Hop-to-Label Translation
2.8.5. SR-TE LSP Path Computation Using Local CSPF
2.8.5.1. Extending MPLS and TE Database CSPF Support to SR-TE LSP
2.8.5.2. SR-TE Specific TE-DB Changes
2.8.5.3. SR-TE LSP and Auto-LSP-Specific CSPF Changes
2.8.5.3.1. SR-TE LSP Path Protection
2.8.5.3.2. SR-TE LSP Path Label Stack Reduction
2.8.5.3.3. Interaction with SR-TE LSP Path Protection
2.8.5.3.4. Examples of SR-TE LSP Path Label Stack Reduction
2.8.6. SR-TE LSP Paths using Explicit SIDs
2.8.7. SR-TE LSP Protection
2.8.7.1. Local Protection
2.8.7.2. End to End Protection
2.8.8. Seamless BFD for SR-TE LSPs
2.8.8.1. Configuration of S-BFD on SR-TE LSPs
2.8.8.2. Support for BFD Failure Action with SR-TE LSPs
2.8.8.2.1. SR-TE LSP State Changes and Failure Actions Based on S-BFD
2.8.8.3. S-BFD Operational Considerations
2.8.9. Static Route Resolution using SR-TE LSP
2.8.10. BGP Shortcuts Using SR-TE LSP
2.8.11. BGP Label Route Resolution Using SR-TE LSP
2.8.12. Service Packet Forwarding using SR-TE LSP
2.8.13. Data Path Support
2.8.13.1. SR-TE LSP Metric and MTU Settings
2.8.13.2. LSR Hashing on SR-TE LSPs
2.8.14. SR-TE Auto-LSP
2.8.14.1. Feature Configuration
2.8.14.2. Automatic Creation of an SR-TE Mesh LSP
2.8.14.3. Automatic Creation of an SR-TE One-Hop LSP
2.8.14.4. Interaction with PCEP
2.8.14.5. Forwarding Contexts Supported with SR-TE Auto-LSP
2.8.15. SR-TE LSP Traffic Statistics
2.9. MPLS Service Usage
2.9.1. Service Distribution Paths
2.10. MPLS/RSVP Configuration Process Overview
2.11. Configuration Notes
2.12. Configuring MPLS and RSVP with CLI
2.12.1. MPLS Configuration Overview
2.12.1.1. LSPs
2.12.1.2. Paths
2.12.1.3. Router Interface
2.12.1.4. Choosing the Signaling Protocol
2.12.2. Basic MPLS Configuration
2.12.3. Common Configuration Tasks
2.12.4. Configuring MPLS Components
2.12.4.1. Configuring Global MPLS Parameters
2.12.4.2. Configuring an MPLS Interface
2.12.4.3. Configuring MPLS Paths
2.12.4.4. Configuring an MPLS LSP
2.12.4.5. Configuring a Static LSP
2.12.4.6. Configuring Manual Bypass Tunnels
2.12.4.7. Configuring RSVP Parameters
2.12.4.8. Configure RSVP Message Pacing Parameters
2.12.4.9. Configuring Graceful Shutdown
2.13. MPLS Configuration Management Tasks
2.13.1. Deleting MPLS
2.13.2. Modifying MPLS Parameters
2.13.3. Modifying an MPLS LSP
2.13.4. Modifying MPLS Path Parameters
2.13.5. Modifying MPLS Static LSP Parameters
2.13.6. Deleting an MPLS Interface
2.14. RSVP Configuration Management Tasks
2.14.1. Modifying RSVP Parameters
2.14.2. Modifying RSVP Message Pacing Parameters
2.14.3. Deleting an Interface from RSVP
2.15. Configuring and Operating SR-TE
2.15.1. SR-TE Configuration Prerequisites
2.15.2. SR-TE LSP Configuration Overview
2.15.3. Configuring Path Computation and Control for SR-TE LSP
2.15.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
2.15.4. Configuring SR-TE LSP Label Stack Size
2.15.5. Configuring Adjacency SID Parameters
2.15.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
2.15.7. Configuring a Mesh of SR-TE Auto-LSPs
2.16. MPLS/RSVP Configuration Command Reference
2.16.1. Command Hierarchies
2.16.1.1. MPLS Commands
2.16.1.2. MPLS-TP Commands
2.16.1.3. MPLS-Label Commands
2.16.1.4. LSP Commands
2.16.1.5. LSP-BFD Commands
2.16.1.6. RIB-API Commands
2.16.1.7. MPLS Path Commands
2.16.1.8. RSVP Commands
2.16.2. Command Descriptions
2.16.2.1. MPLS Commands
2.16.2.1.1. Generic Commands
2.16.2.1.2. MPLS Commands
2.16.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
2.16.2.2. RSVP Commands
2.16.2.2.1. Generic Commands
2.16.2.2.2. RSVP Commands
2.16.2.2.3. Interface Commands
2.16.2.2.4. Message Pacing Commands
2.17. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Show Commands
2.17.1.2. Tools Commands
2.17.1.3. Router Commands
2.17.1.4. Clear Commands
2.17.1.5. Debug Commands
2.17.2. Command Descriptions
2.17.2.1. Show Commands
2.17.2.2. Show MPLS-Labels Commands
2.17.2.3. Show Router Seamless-BFD Commands
2.17.2.4. Show Router BFD session Commands
2.17.2.5. Show RSVP Commands
2.17.2.6. Tools Commands
2.17.2.7. Clear Commands
2.17.2.8. Debug Commands
3. GMPLS
3.1. GMPLS
3.1.1. Example Applications
3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
3.1.1.2. Use Case 2: Multi-Layer Resiliency
3.2. GMPLS UNI Architecture
3.2.1. Addressing and End-to-End gLSP Architecture
3.3. 1830 PSS Identifiers
3.4. Recovery Reference Models
3.4.1. End to End Recovery (IP-layer)
3.4.2. End to End ECMP
3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
3.4.4. End to End Recovery (GMPLS Layer)
3.4.4.1. Unprotected gLSP
3.4.4.2. Full LSP Rerouting
3.4.4.3. 1: N Protection
3.4.4.4. Optical Segment Recovery
3.5. GMPLS Configuration Overview
3.6. LMP and IPCC Configuration
3.6.1. Configuration of IP Communication Channels for LMP and RSVP
3.6.2. Configuring LMP
3.6.3. Configuring Traffic Engineering Links and Data Bearers
3.7. Configuring MPLS Paths for GMPLS
3.8. Configuring RSVP in GMPLS
3.9. Configuring a GMPLS LSP on the UNI
3.9.1. gLSP Constraints
3.10. Bandwidth
3.11. Shared Risk Link Groups
3.12. Optical Network Segment Recovery
3.13. Configuration of End-to-End GMPLS Recovery
3.14. GMPLS Tunnel Groups
3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
3.16. Configuration Notes
3.17. GMPLS Configuration Command Reference
3.17.1. Command Hierarchies
3.17.1.1. LMP Commands
3.17.1.2. GMPLS Commands
3.17.1.3. GMPLS Tunnel Group Commands
3.17.2. Command Descriptions
3.17.2.1. LMP Commands
3.17.2.2. GMPLS Commands
3.17.2.2.1. GMPLS Tunnel Group Commands
3.18. Show, Clear, Debug, and Tools Command Reference
3.18.1. Command Hierarchies
3.18.1.1. Show Commands
3.18.1.2. Clear Commands
3.18.1.3. Debug Commands
3.18.1.4. Tools Commands
3.18.2. Command Descriptions
3.18.2.1. Show Commands
3.18.2.2. Clear Commands
3.18.2.3. Debug Commands
3.18.2.4. Tools Commands
4. MPLS Forwarding Policy
4.1. Introduction to MPLS Forward Policy
4.2. Feature Validation and Operation Procedures
4.2.1. Policy Parameters and Validation Procedure Rules
4.2.2. Policy Resolution and Operational Procedures
4.3. Tunnel Table Handling of MPLS Forwarding Policy
4.4. Data Path Support
4.4.1. NHG of Resolution Type Indirect
4.4.2. NHG of Resolution Type Direct
4.4.2.1. Active Path Determination and Failover in a NHG of Resolution Type Direct
4.4.3. Spraying of Packets in a MPLS Forwarding Policy
4.4.4. Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
4.4.5. Ethertype Setting and TTL Handling in Endpoint Policy
4.5. Weighted ECMP Enabling and Validation Rules
4.6. Statistics
4.6.1. Ingress Statistics
4.6.2. Egress Statistics
4.7. Configuring Static Label Routes using MPLS Forwarding Policy
4.7.1. Steering Flows to an Indirect Next-Hop
4.7.2. Steering Flows to a Direct Next-Hop
4.8. MPLS Forwarding Policy Configuration Command Reference
4.8.1. Command Hierarchies
4.8.1.1. MPLS Forwarding Policy Commands
4.8.2. Command Descriptions
4.8.2.1. MPLS Forwarding Policy Commands
4.9. MPLS Forwarding Policy Show Command Reference
4.9.1. Command Hierarchies
4.9.1.1. Show Commands
4.9.1.2. Clear Commands
4.9.1.3. Monitor Commands
4.9.2. Command Descriptions
4.9.2.1. Show Commands
4.9.2.2. Clear Commands
4.9.2.3. Monitor Commands
5. PCEP
5.1. Introduction to the Path Computation Element Protocol (PCEP)
5.1.1. PCC and PCE Configuration
5.1.2. Base Implementation of Path Computation Elements (PCE)
5.1.3. PCEP Session Establishment and Maintenance
5.1.4. PCEP Parameters
5.1.4.1. Stateful PCE
5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
5.1.4.3. LSP Initiation
5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
5.1.4.3.2. PCE-Initiated LSPs
5.1.4.3.3. LSP Instantiation Using PCEP
5.1.4.3.4. LSP Deletion Using PCEP
5.1.4.3.5. Dynamic State Handling for PCE Initiated LSPs
5.1.4.3.6. PCEP Support for RSVP-TE LSP
5.1.4.3.7. LSP Path Diversity and Bidirectionality Constraints
5.2. NSP and VSR-NRC PCE Redundancy
5.2.1. Feature Configuration
5.2.2. Feature Behavior
5.2.2.1. NSP Cluster Behavior
5.2.2.2. VSR-NRC Behavior
5.2.2.3. PCC Behavior
5.3. Configuring and Operating RSVP-TE LSP with PCEP
5.4. PCEP Configuration Command Reference
5.4.1. Command Hierarchies
5.4.1.1. PCEP Commands
5.4.2. Command Descriptions
5.4.2.1. PCEP Commands
5.5. PCEP Show and Tools Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Show Commands
5.5.1.2. Tools Commands
5.5.2. Command Descriptions
5.5.2.1. Show Commands
5.5.2.2. Tools Commands
6. Segment Routing Policies
6.1. Statically-Configured Segment Routing Policies
6.2. BGP Signaled Segment Routing Policies
6.3. Segment Routing Policy Path Selection and Tie-Breaking
6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
6.4.5. Resolving EVPN-MPLS Routes to Segment Routing Policy Tunnels
6.4.6. VPRN Auto-Bind-Tunnel Using Segment Routing Policy Tunnels
6.5. Traffic Statistics
7. Label Distribution Protocol
7.1. Label Distribution Protocol
7.1.1. LDP and MPLS
7.1.2. LDP Architecture
7.1.3. Subsystem Interrelationships
7.1.3.1. Memory Manager and LDP
7.1.3.2. Label Manager
7.1.3.3. LDP Configuration
7.1.3.4. Logger
7.1.3.5. Service Manager
7.1.4. Execution Flow
7.1.4.1. Initialization
7.1.4.2. Session Lifetime
7.1.4.2.1. Adjacency Establishment
7.1.4.2.2. Session Establishment
7.1.5. Label Exchange
7.1.5.1. Other Reasons for Label Actions
7.1.5.2. Cleanup
7.1.5.3. Configuring Implicit Null Label
7.1.6. Global LDP Filters
7.1.6.1. Per LDP Peer FEC Import and Export Policies
7.1.7. Configuring Multiple LDP LSR ID
7.1.7.1. Advertisement of FEC for Local LSR ID
7.1.8. Extend LDP policies to mLDP
7.1.8.1. Recursive FEC behavior
7.1.8.2. Import Policy
7.1.9. LDP FEC Resolution Per Specified Community
7.1.9.1. Configuration
7.1.9.2. Operation
7.1.10. T-LDP hello reduction
7.1.11. Tracking a T-LDP Peer with BFD
7.1.12. Link LDP Hello Adjacency Tracking with BFD
7.1.13. LDP LSP Statistics
7.1.14. MPLS Entropy Label
7.1.15. Importing LDP Tunnels to Non-Host Prefixes to TTM
7.2. TTL Security for BGP and LDP
7.3. ECMP Support for LDP
7.3.1. Label Operations
7.3.2. Weighted ECMP Support for LDP
7.4. Unnumbered Interface Support in LDP
7.4.1. Feature Configuration
7.4.2. Operation of LDP over an Unnumbered IP Interface
7.4.2.1. Link LDP
7.4.2.2. Targeted LDP
7.4.2.3. FEC Resolution
7.5. LDP over RSVP Tunnels
7.5.1. Signaling and Operation
7.5.1.1. LDP Label Distribution and FEC Resolution
7.5.1.2. Default FEC Resolution Procedure
7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
7.5.2. Rerouting Around Failures
7.5.2.1. LDP-over-RSVP Tunnel Protection
7.5.2.2. ABR Protection
7.6. LDP over RSVP Without Area Boundary
7.6.1. LDP over RSVP and ECMP
7.7. Weighted Load Balancing for LDP over RSVP
7.7.1. Interaction with Class-Based Forwarding
7.8. Class-based Forwarding of LDP Prefix Packets over IGP Shortcuts
7.8.1. Configuration and Operation
7.8.1.1. LSR and/or LER Roles with FC-to-Set Configuration
7.9. LDP ECMP Uniform Failover
7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
7.10.1. LDP FRR Configuration
7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
7.10.2. LDP FRR Procedures
7.10.2.1. ECMP Considerations
7.10.2.2. LDP FRR and LDP Shortcut
7.10.2.3. LDP FRR and LDP-over-RSVP
7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
7.11. LDP FEC to BGP Label Route Stitching
7.11.1. Configuration
7.11.2. Detailed LDP FEC Resolution
7.11.3. Detailed BGP Labeled Route Resolution
7.11.4. Data Plane Forwarding
7.12. LDP-SR Stitching for IPv4 prefixes
7.12.1. LDP-SR Stitching Configuration
7.12.2. Stitching in the LDP-to-SR Direction
7.12.3. Stitching in the SR-to-LDP Direction
7.13. LDP FRR LFA Backup using SR Tunnel for IPv4 Prefixes
7.14. LDP Remote LFA
7.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
7.15.1. Feature Configuration
7.15.2. Feature Behavior
7.16. Multicast P2MP LDP for GRT
7.17. LDP P2MP Support
7.17.1. LDP P2MP Configuration
7.17.2. LDP P2MP Protocol
7.17.3. Make Before Break (MBB)
7.17.4. ECMP Support
7.17.5. Inter-AS Non-segmented mLDP
7.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
7.17.5.2. LDP Recursive FEC Process
7.17.5.3. Supported Recursive Opaque Values
7.17.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
7.17.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
7.17.5.5.1. Leaf and ABR Behavior
7.17.5.5.2. Intra-AS Support
7.17.5.5.3. Opaque Type Behavior with Basic FEC Generation
7.17.5.5.4. Inter-AS Support
7.17.5.6. Redundancy and Resiliency
7.17.5.7. ASBR Physical Connection
7.17.5.8. OAM
7.17.5.9. ECMP Support
7.17.5.9.1. ECMP Hash Algorithm
7.17.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
7.17.6. Intra-AS Non-segmented mLDP
7.17.6.1. ABR MoFRR for Intra-AS
7.17.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
7.17.6.3. Intra-AS/Inter-AS Option B
7.17.7. ASBR MoFRR
7.17.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
7.17.7.2. ASBR MoFRR Leaf Behavior
7.17.7.3. ASBR MoFRR ASBR Behavior
7.17.7.4. MoFRR Root AS Behavior
7.17.7.5. Traffic Flow
7.17.7.6. Failure Detection and Handling
7.17.7.7. Failure Scenario
7.17.7.8. ASBR MoFRR Consideration
7.17.7.9. ASBR MoFRR Opaque Support
7.17.8. MBB for MoFRR
7.17.9. Add-path for Route Reflectors
7.18. Multicast LDP Fast Upstream Switchover
7.18.1. Feature Configuration
7.18.2. Feature Behavior
7.18.3. Uniform Failover from Primary to Backup ILM
7.19. Multi-Area and Multi-Instance Extensions to LDP
7.19.1. LDP Shortcut for BGP Next-Hop Resolution
7.19.2. LDP Shortcut for IGP Routes
7.19.2.1. LDP Shortcut Configuration
7.19.2.2. IGP Route Resolution
7.19.2.3. LDP Shortcut Forwarding Plane
7.19.3. ECMP Considerations
7.19.4. Disabling TTL Propagation in an LSP Shortcut
7.20. LDP Graceful Handling of Resource Exhaustion
7.20.1. LDP Base Graceful Handling of Resources
7.21. LDP Enhanced Graceful Handling of Resources
7.21.1. LSR Overload Notification
7.21.2. LSR Overload Protection Capability
7.21.3. Procedures for LSR overload protection
7.22. LDP-IGP Synchronization
7.23. MLDP Resolution using Multicast RTM
7.23.1. Other Considerations for Multicast RTM MLDP Resolution
7.24. Bidirectional Forwarding Detection for LDP LSPs
7.24.1. Bootstrapping and Maintaining LSP BFD Sessions
7.24.2. BFD Configuration on LDP LSPs
7.25. User Guidelines and Troubleshooting Procedures
7.25.1. Common Procedures
7.25.2. Base Resource Handling Procedures
7.25.3. Enhanced Resource Handling Procedures
7.26. LDP IPv6 Control and Data Planes
7.26.1. LDP Operation in an IPv6 Network
7.26.2. Link LDP
7.26.3. Targeted LDP
7.26.4. FEC Resolution
7.26.5. LDP Session Capabilities
7.26.6. LDP Adjacency Capabilities
7.26.7. Address and FEC Distribution
7.26.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
7.26.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
7.26.10. IGP and Static Route Synchronization with LDP
7.26.11. BFD Operation
7.26.12. Services Using SDP with an LDP IPv6 FEC
7.26.13. Mirror Services and Lawful Intercept
7.26.13.1. Configuration at mirror source node
7.26.13.2. Configuration at mirror destination node
7.26.14. Static Route Resolution to a LDP IPv6 FEC
7.26.15. IGP Route Resolution to a LDP IPv6 FEC
7.26.16. OAM Support with LDP IPv6
7.26.17. LDP IPv6 Interoperability Considerations
7.26.17.1. Interoperability with Implementations Compliant with RFC 7552
7.26.17.2. LDP IPv6 32-bit LSR-ID
7.26.17.2.1. Feature Configuration
7.26.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
7.26.17.2.3. Migration Considerations
7.26.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
7.27. LDP Process Overview
7.28. Configuring LDP with CLI
7.28.1. LDP Configuration Overview
7.28.2. Basic LDP Configuration
7.28.3. Common Configuration Tasks
7.28.3.1. Enabling LDP
7.28.3.2. Configuring FEC Originate Parameters
7.28.3.3. Configuring Graceful-Restart Helper Parameters
7.28.3.4. Applying Export and Import Policies
7.28.3.5. Targeted Session Parameters
7.28.3.6. Interface Parameters
7.28.3.7. Session Parameters
7.28.3.8. LDP Signaling and Services
7.29. LDP Configuration Management Tasks
7.29.1. Disabling LDP
7.29.2. Modifying Targeted Session Parameters
7.29.3. Modifying Interface Parameters
7.30. LDP Command Reference
7.30.1. Command Hierarchies
7.30.1.1. LDP Commands
7.30.2. Command Descriptions
7.30.2.1. Generic Commands
7.30.2.2. LDP Commands
7.30.2.3. Interface Parameters Commands
7.30.2.4. Session Parameters Commands
7.30.2.5. Targeted Session Commands
7.30.2.6. TCP Session Parameters Commands
7.31. Show, Clear, Debug, and Tools Command Reference
7.31.1. Command Hierarchies
7.31.1.1. Show Commands
7.31.1.2. Clear Commands
7.31.1.3. Debug Commands
7.31.1.4. Tools Commands
7.31.2. Command Descriptions
7.31.2.1. Show LDP Commands
7.31.2.2. Clear Commands
7.31.2.3. Debug Commands
7.31.2.4. Tools Commands
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Nokia Router Configuration Process
2. MPLS and RSVP
2.1. MPLS
2.1.1. MPLS Label Stack
2.1.1.1. Label Values
2.1.1.2. Reserved Label Blocks
2.1.2. MPLS Entropy Label and Hash Label
2.1.2.1. Hash Label
2.1.2.2. Entropy Label
2.1.2.3. Inserting and Processing the Entropy Label at LERs and LSRs
2.1.2.3.1. Ingress LER
2.1.2.3.2. LSR
2.1.2.3.3. Egress LER
2.1.2.4. Mapping Entropy Label Capability at LSP Stitching Points
2.1.2.5. Entropy Label on OAM Packets
2.1.2.6. Impact of EL and ELI on MTU and Label Stack Depth
2.1.3. Label Switching Routers
2.1.3.1. LSP Types
2.1.4. Bidirectional Forwarding Detection for MPLS LSPs
2.1.4.1. Bootstrapping and Maintaining the BFD Session
2.1.4.2. LSP BFD Configuration
2.1.4.3. Enabling and Implementing Limits for LSP BFD on a Node
2.1.4.4. BFD Configuration on RSVP-TE LSPs
2.1.4.5. Using LSP BFD for LSP Path Protection
2.1.4.5.1. Failure-action down
2.1.4.5.2. Failure-action failover
2.1.4.5.3. LSP Active Path Failover Triggers
2.1.4.6. MPLS/RSVP on Broadcast Interface
2.1.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.1.6. Manual Bypass LSP
2.1.6.1. PLR Bypass LSP Selection Rules
2.1.6.2. FRR Facility Background Evaluation Task
2.1.7. Uniform FRR Failover Time
2.1.8. Automatic Bandwidth Allocation for RSVP LSPs
2.1.8.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
2.1.8.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
2.1.8.3. Measurement of LSP Bandwidth
2.1.8.4. Passive Monitoring of LSP Bandwidth
2.1.8.5. Periodic Automatic Bandwidth Adjustment
2.1.8.6. Overflow-Triggered Auto-Bandwidth Adjustment
2.1.8.7. Manually-Triggered Auto-Bandwidth Adjustment
2.1.8.8. Operational Bandwidth Carryover between Active Paths
2.1.9. LSP Failure Codes
2.1.10. Labeled Traffic Statistics
2.1.10.1. Interface Statistics
2.1.10.2. Traffic Statistics for Stacked Tunnels
2.1.10.3. Traffic Statistics Details and Scale
2.1.10.4. RSVP-TE and MPLS-TP Traffic Statistics
2.1.10.5. MPLS Forwarding Policy Statistics
2.1.10.6. gRPC-based RIB API Statistics
2.1.10.7. Segment Routing Statistics
2.1.10.8. SR-TE LSP Statistics
2.1.10.9. SR Policy Statistics
2.2. RSVP
2.2.1. Using RSVP for MPLS
2.2.1.1. RSVP Traffic Engineering Extensions for MPLS
2.2.1.2. Hello Protocol
2.2.1.3. MD5 Authentication of RSVP Interface
2.2.1.4. Configuring Authentication using Keychains
2.2.2. Reservation Styles
2.2.2.1. RSVP Message Pacing
2.2.3. RSVP Overhead Refresh Reduction
2.2.4. RSVP Graceful Restart Helper
2.2.5. Enhancements to RSVP Control Plane Congestion Control
2.2.6. BFD for RSVP-TE
2.2.7. RSVP-TE LSP Statistics
2.2.8. P2MP RSVP-TE LSP Statistics
2.2.8.1. Configuring RSVP P2MP LSP Egress Statistics
2.2.8.2. Configuring RSVP P2MP LSP Ingress Statistics
2.2.8.3. Configuring Implicit Null
2.2.9. Using Unnumbered Point-to-Point Interface in RSVP
2.2.9.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.3. MPLS Transport Profile
2.3.1. MPLS-TP Model
2.3.2. MPLS-TP Provider Edge and Gateway
2.3.2.1. VLL Services
2.3.2.2. Spoke SDP Termination
2.3.3. MPLS-TP LSR
2.3.4. Detailed Descriptions of MPLS-TP
2.3.4.1. MPLS-TP LSPs
2.3.4.2. MPLS-TP on Pseudowires
2.3.5. MPLS-TP Maintenance Identifiers
2.3.5.1. Generic Associated Channel
2.3.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.3.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.3.5.2.2. Proactive CC, CV and RDI
2.3.5.2.3. BFD-based RDI
2.3.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.3.5.4. PW Control Channel Status Request Mechanism
2.3.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
2.3.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
2.3.5.7. MPLS-TP LSP Protection
2.3.6. Alarm Indication Signal (AIS)
2.3.7. Configuring MPLS-TP
2.3.7.1. Configuration Overview
2.3.7.2. Node-Wide MPLS-TP Parameter Configuration
2.3.7.3. Node-Wide MPLS-TP Identifier Configuration
2.3.7.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
2.3.7.5. Interface Configuration for MPLS-TP
2.3.7.6. LER Configuration for MPLS-TP
2.3.7.6.1. LSP and Path Configuration
2.3.7.6.2. Support for Downstream Mapping Information
2.3.7.6.3. Proactive CC/CV (using BFD) Configuration
2.3.7.6.4. Protection templates and Linear Protection Configuration
2.3.7.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.3.8. MPLS-TP Show Commands
2.3.8.1. Static MPLS Labels
2.3.8.2. MPLS-TP Tunnel Configuration
2.3.8.3. MPLS-TP Path configuration
2.3.8.4. MPLS-TP Protection
2.3.8.5. MPLS TP Node Configuration
2.3.8.6. MPLS-TP Interfaces
2.3.9. MPLS-TP Debug Commands
2.4. Traffic Engineering
2.4.1. TE Metric (IS-IS and OSPF)
2.4.2. Admin Group Support on Facility Bypass Backup LSP
2.4.2.1. Procedures at Head-End Node
2.4.2.2. Procedures at PLR Node
2.4.3. Manual and Timer Resignal of RSVP-TE Bypass LSP
2.4.3.1. RSVP-TE Bypass LSP Path SRLG Information Update in Manual and Timer Resignal MBB
2.4.3.2. RSVP-TE Bypass LSP Path Administrative Group Information Update in Manual and Timer Resignal MBB
2.4.4. RSVP-TE LSP Active Path Administrative Group Information Update in Timer Resignal MBB
2.4.5. Diff-Serv Traffic Engineering
2.4.5.1. Mapping of Traffic to a Diff-Serv LSP
2.4.5.2. Admission Control of Classes
2.4.5.2.1. Maximum Allocation Model
2.4.5.2.2. Russian Doll Model
2.4.5.3. RSVP Control Plane Extensions
2.4.5.4. IGP Extensions
2.4.5.5. Diff-Serv TE Configuration and Operation
2.4.5.5.1. RSVP Protocol Level
2.4.5.5.2. RSVP Interface Level
2.4.5.5.3. LSP and LSP Path Levels
2.4.6. Diff-Serv TE LSP Class Type Change under Failure
2.4.6.1. LSP Primary Path Retry Procedures
2.4.6.2. Bandwidth Sharing Across Class Types
2.4.6.3. Downgrading the CT of Bandwidth Sharing LSP Paths
2.4.6.4. Upgrading the CT of Bandwidth Sharing LSP Paths
2.5. IPv6 Traffic Engineering
2.5.1. Global Configuration
2.5.2. IS-IS Configuration
2.5.3. MPLS Configuration
2.5.4. IS-IS, BGP-LS and TE Database Extensions
2.5.4.1. BGP-LS Originator Node Handling of TE Attributes
2.5.4.2. TE Attributes Supported in IGP and BGP-LS
2.5.5. IS-IS IPv4/IPv6 SR-TE and IPv4 RSVP-TE Feature Behavior
2.5.6. IPv6 SR-TE LSP Support in MPLS
2.5.6.1. IPv6 SR-TE auto-LSP
2.6. Advanced MPLS/RSVP Features
2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
2.6.2. LSP Path Change
2.6.3. Manual LSP Path Switch
2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.6.5. Automatic Creation of RSVP-TE LSP Mesh
2.6.5.1. Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
2.6.5.1.1. Feature Configuration
2.6.5.1.2. Feature Behavior
2.6.5.1.3. Multi-Area and Multi-Instance Support
2.6.5.1.4. Mesh LSP Name Encoding and Statistics
2.6.5.2. Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
2.6.5.2.1. Feature Configuration
2.6.5.2.2. Feature Behavior
2.6.6. IGP Shortcut and Forwarding Adjacency
2.6.6.1. IGP Shortcut Feature Configuration
2.6.6.1.1. IGP Shortcut Binding Construct
2.6.6.2. IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
2.6.6.2.1. Family Prefix Resolution and Tunnel Selection Rules
2.6.6.2.2. Application Support
2.6.6.2.3. Loop-free Alternate (LFA) Protection Support
2.6.6.3. SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
2.6.6.3.1. Family Prefix Resolution and Tunnel Selection Rules
2.6.6.3.2. Application Support
2.6.6.3.3. Loop-free Alternate (LFA) Protection Support
2.6.6.4. Using LSP Relative Metric with IGP Shortcut
2.6.6.5. ECMP Considerations
2.6.6.6. Handling of Control Packets
2.6.6.7. Forwarding Adjacency
2.6.6.8. LDP Forwarding over IGP Shortcut
2.6.6.9. LDP Forwarding over Static Route Shortcut Tunnels
2.6.6.10. Handling of Multicast Packets
2.6.6.11. MPLS Entropy Label on Shortcut Tunnels
2.6.7. Disabling TTL Propagation in an LSP Shortcut
2.6.8. RSVP-TE LSP Signaling using LSP Template
2.6.9. Shared Risk Link Groups
2.6.9.1. Enabling Disjoint Backup Paths
2.6.9.2. SRLG Penalty Weights for Detour and Bypass LSPs
2.6.9.3. Static Configurations of SRLG Memberships
2.6.10. TE Graceful Shutdown
2.6.11. Soft Preemption of Diff-Serv RSVP LSP
2.6.12. Least-Fill Bandwidth Rule in CSPF ECMP Selection
2.6.13. Inter-Area TE LSP (ERO Expansion Method)
2.6.13.1. Area Border Node FRR Protection for Inter-Area LSP
2.6.13.1.1. Rerouting of Inter-Area LSP
2.6.13.1.2. Behavior of MPLS Options in Inter-Area LSP
2.6.13.2. Inter-Area LSP support of OSPF Virtual Links
2.6.13.3. Area Border Node FRR Protection for Inter-Area LSP
2.6.14. Timer-based Reversion for RSVP-TE LSPs
2.6.15. LSP Tagging and Auto-Bind Using Tag Information
2.6.15.1. Internal Route Color to LSP Color Matching Algorithm
2.6.15.2. LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
2.6.15.3. LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
2.6.16. LSP Self Ping
2.6.16.1. Detailed Behavior of LSP Self Ping
2.6.16.2. Considerations for Scaled Scenarios
2.6.17. Accounting for Dark Bandwidth
2.7. Point-to-Multipoint (P2MP) RSVP LSP
2.7.1. Application in Video Broadcast
2.7.2. P2MP LSP Data Plane
2.7.2.1. Procedures at Ingress LER Node
2.7.2.2. Procedures at LSR Node
2.7.2.3. Procedures at Branch LSR Node
2.7.2.4. Procedures at Egress LER Node
2.7.2.5. Procedures at BUD LSR Node
2.7.3. Ingress Path Management for P2MP LSP Packets
2.7.3.1. Ingress P2MP Path Management on XCM/IOM/IMMs
2.7.4. RSVP Control Plane in a P2MP LSP
2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.7.5.1. Procedures at Ingress LER Node
2.7.5.2. Procedures at Egress LER Node
2.7.5.2.1. Procedures with a Primary Tunnel Interface
2.8. Segment Routing With Traffic Engineering (SR-TE)
2.8.1. SR-TE Support
2.8.2. SR-TE LSP Instantiation
2.8.2.1. PCC-Initiated and PCC-Controlled LSP
2.8.2.1.1. Guidelines for PCC-Initiated and PCC-Controlled LSPs
2.8.2.2. PCC-Initiated and PCE-Computed or Controlled LSP
2.8.3. SR-TE LSP Path Computation
2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
2.8.4. SR-TE LSP Path Computation Using Hop-to-Label Translation
2.8.5. SR-TE LSP Path Computation Using Local CSPF
2.8.5.1. Extending MPLS and TE Database CSPF Support to SR-TE LSP
2.8.5.2. SR-TE Specific TE-DB Changes
2.8.5.3. SR-TE LSP and Auto-LSP-Specific CSPF Changes
2.8.5.3.1. SR-TE LSP Path Protection
2.8.5.3.2. SR-TE LSP Path Label Stack Reduction
2.8.5.3.3. Interaction with SR-TE LSP Path Protection
2.8.5.3.4. Examples of SR-TE LSP Path Label Stack Reduction
2.8.6. SR-TE LSP Paths using Explicit SIDs
2.8.7. SR-TE LSP Protection
2.8.7.1. Local Protection
2.8.7.2. End to End Protection
2.8.8. Seamless BFD for SR-TE LSPs
2.8.8.1. Configuration of S-BFD on SR-TE LSPs
2.8.8.2. Support for BFD Failure Action with SR-TE LSPs
2.8.8.2.1. SR-TE LSP State Changes and Failure Actions Based on S-BFD
2.8.8.3. S-BFD Operational Considerations
2.8.9. Static Route Resolution using SR-TE LSP
2.8.10. BGP Shortcuts Using SR-TE LSP
2.8.11. BGP Label Route Resolution Using SR-TE LSP
2.8.12. Service Packet Forwarding using SR-TE LSP
2.8.13. Data Path Support
2.8.13.1. SR-TE LSP Metric and MTU Settings
2.8.13.2. LSR Hashing on SR-TE LSPs
2.8.14. SR-TE Auto-LSP
2.8.14.1. Feature Configuration
2.8.14.2. Automatic Creation of an SR-TE Mesh LSP
2.8.14.3. Automatic Creation of an SR-TE One-Hop LSP
2.8.14.4. Interaction with PCEP
2.8.14.5. Forwarding Contexts Supported with SR-TE Auto-LSP
2.8.15. SR-TE LSP Traffic Statistics
2.9. MPLS Service Usage
2.9.1. Service Distribution Paths
2.10. MPLS/RSVP Configuration Process Overview
2.11. Configuration Notes
2.12. Configuring MPLS and RSVP with CLI
2.12.1. MPLS Configuration Overview
2.12.1.1. LSPs
2.12.1.2. Paths
2.12.1.3. Router Interface
2.12.1.4. Choosing the Signaling Protocol
2.12.2. Basic MPLS Configuration
2.12.3. Common Configuration Tasks
2.12.4. Configuring MPLS Components
2.12.4.1. Configuring Global MPLS Parameters
2.12.4.2. Configuring an MPLS Interface
2.12.4.3. Configuring MPLS Paths
2.12.4.4. Configuring an MPLS LSP
2.12.4.5. Configuring a Static LSP
2.12.4.6. Configuring Manual Bypass Tunnels
2.12.4.7. Configuring RSVP Parameters
2.12.4.8. Configure RSVP Message Pacing Parameters
2.12.4.9. Configuring Graceful Shutdown
2.13. MPLS Configuration Management Tasks
2.13.1. Deleting MPLS
2.13.2. Modifying MPLS Parameters
2.13.3. Modifying an MPLS LSP
2.13.4. Modifying MPLS Path Parameters
2.13.5. Modifying MPLS Static LSP Parameters
2.13.6. Deleting an MPLS Interface
2.14. RSVP Configuration Management Tasks
2.14.1. Modifying RSVP Parameters
2.14.2. Modifying RSVP Message Pacing Parameters
2.14.3. Deleting an Interface from RSVP
2.15. Configuring and Operating SR-TE
2.15.1. SR-TE Configuration Prerequisites
2.15.2. SR-TE LSP Configuration Overview
2.15.3. Configuring Path Computation and Control for SR-TE LSP
2.15.3.1. Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
2.15.4. Configuring SR-TE LSP Label Stack Size
2.15.5. Configuring Adjacency SID Parameters
2.15.6. Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
2.15.7. Configuring a Mesh of SR-TE Auto-LSPs
2.16. MPLS/RSVP Configuration Command Reference
2.16.1. Command Hierarchies
2.16.1.1. MPLS Commands
2.16.1.2. MPLS-TP Commands
2.16.1.3. MPLS-Label Commands
2.16.1.4. LSP Commands
2.16.1.5. LSP-BFD Commands
2.16.1.6. RIB-API Commands
2.16.1.7. MPLS Path Commands
2.16.1.8. RSVP Commands
2.16.2. Command Descriptions
2.16.2.1. MPLS Commands
2.16.2.1.1. Generic Commands
2.16.2.1.2. MPLS Commands
2.16.2.1.3. Point-to-Multipoint MPLS (P2MP) Commands
2.16.2.2. RSVP Commands
2.16.2.2.1. Generic Commands
2.16.2.2.2. RSVP Commands
2.16.2.2.3. Interface Commands
2.16.2.2.4. Message Pacing Commands
2.17. MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
2.17.1. Command Hierarchies
2.17.1.1. Show Commands
2.17.1.2. Tools Commands
2.17.1.3. Router Commands
2.17.1.4. Clear Commands
2.17.1.5. Debug Commands
2.17.2. Command Descriptions
2.17.2.1. Show Commands
2.17.2.2. Show MPLS-Labels Commands
2.17.2.3. Show Router Seamless-BFD Commands
2.17.2.4. Show Router BFD session Commands
2.17.2.5. Show RSVP Commands
2.17.2.6. Tools Commands
2.17.2.7. Clear Commands
2.17.2.8. Debug Commands
3. GMPLS
3.1. GMPLS
3.1.1. Example Applications
3.1.1.1. Use Case 1: Dynamic Connection Setup with Constraints
3.1.1.2. Use Case 2: Multi-Layer Resiliency
3.2. GMPLS UNI Architecture
3.2.1. Addressing and End-to-End gLSP Architecture
3.3. 1830 PSS Identifiers
3.4. Recovery Reference Models
3.4.1. End to End Recovery (IP-layer)
3.4.2. End to End ECMP
3.4.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
3.4.4. End to End Recovery (GMPLS Layer)
3.4.4.1. Unprotected gLSP
3.4.4.2. Full LSP Rerouting
3.4.4.3. 1: N Protection
3.4.4.4. Optical Segment Recovery
3.5. GMPLS Configuration Overview
3.6. LMP and IPCC Configuration
3.6.1. Configuration of IP Communication Channels for LMP and RSVP
3.6.2. Configuring LMP
3.6.3. Configuring Traffic Engineering Links and Data Bearers
3.7. Configuring MPLS Paths for GMPLS
3.8. Configuring RSVP in GMPLS
3.9. Configuring a GMPLS LSP on the UNI
3.9.1. gLSP Constraints
3.10. Bandwidth
3.11. Shared Risk Link Groups
3.12. Optical Network Segment Recovery
3.13. Configuration of End-to-End GMPLS Recovery
3.14. GMPLS Tunnel Groups
3.15. Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
3.16. Configuration Notes
3.17. GMPLS Configuration Command Reference
3.17.1. Command Hierarchies
3.17.1.1. LMP Commands
3.17.1.2. GMPLS Commands
3.17.1.3. GMPLS Tunnel Group Commands
3.17.2. Command Descriptions
3.17.2.1. LMP Commands
3.17.2.2. GMPLS Commands
3.17.2.2.1. GMPLS Tunnel Group Commands
3.18. Show, Clear, Debug, and Tools Command Reference
3.18.1. Command Hierarchies
3.18.1.1. Show Commands
3.18.1.2. Clear Commands
3.18.1.3. Debug Commands
3.18.1.4. Tools Commands
3.18.2. Command Descriptions
3.18.2.1. Show Commands
3.18.2.2. Clear Commands
3.18.2.3. Debug Commands
3.18.2.4. Tools Commands
4. MPLS Forwarding Policy
4.1. Introduction to MPLS Forward Policy
4.2. Feature Validation and Operation Procedures
4.2.1. Policy Parameters and Validation Procedure Rules
4.2.2. Policy Resolution and Operational Procedures
4.3. Tunnel Table Handling of MPLS Forwarding Policy
4.4. Data Path Support
4.4.1. NHG of Resolution Type Indirect
4.4.2. NHG of Resolution Type Direct
4.4.2.1. Active Path Determination and Failover in a NHG of Resolution Type Direct
4.4.3. Spraying of Packets in a MPLS Forwarding Policy
4.4.4. Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
4.4.5. Ethertype Setting and TTL Handling in Endpoint Policy
4.5. Weighted ECMP Enabling and Validation Rules
4.6. Statistics
4.6.1. Ingress Statistics
4.6.2. Egress Statistics
4.7. Configuring Static Label Routes using MPLS Forwarding Policy
4.7.1. Steering Flows to an Indirect Next-Hop
4.7.2. Steering Flows to a Direct Next-Hop
4.8. MPLS Forwarding Policy Configuration Command Reference
4.8.1. Command Hierarchies
4.8.1.1. MPLS Forwarding Policy Commands
4.8.2. Command Descriptions
4.8.2.1. MPLS Forwarding Policy Commands
4.9. MPLS Forwarding Policy Show Command Reference
4.9.1. Command Hierarchies
4.9.1.1. Show Commands
4.9.1.2. Clear Commands
4.9.1.3. Monitor Commands
4.9.2. Command Descriptions
4.9.2.1. Show Commands
4.9.2.2. Clear Commands
4.9.2.3. Monitor Commands
5. PCEP
5.1. Introduction to the Path Computation Element Protocol (PCEP)
5.1.1. PCC and PCE Configuration
5.1.2. Base Implementation of Path Computation Elements (PCE)
5.1.3. PCEP Session Establishment and Maintenance
5.1.4. PCEP Parameters
5.1.4.1. Stateful PCE
5.1.4.2. PCEP Extensions in Support of SR-TE LSPs
5.1.4.3. LSP Initiation
5.1.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
5.1.4.3.2. PCE-Initiated LSPs
5.1.4.3.3. LSP Instantiation Using PCEP
5.1.4.3.4. LSP Deletion Using PCEP
5.1.4.3.5. Dynamic State Handling for PCE Initiated LSPs
5.1.4.3.6. PCEP Support for RSVP-TE LSP
5.1.4.3.7. LSP Path Diversity and Bidirectionality Constraints
5.2. NSP and VSR-NRC PCE Redundancy
5.2.1. Feature Configuration
5.2.2. Feature Behavior
5.2.2.1. NSP Cluster Behavior
5.2.2.2. VSR-NRC Behavior
5.2.2.3. PCC Behavior
5.3. Configuring and Operating RSVP-TE LSP with PCEP
5.4. PCEP Configuration Command Reference
5.4.1. Command Hierarchies
5.4.1.1. PCEP Commands
5.4.2. Command Descriptions
5.4.2.1. PCEP Commands
5.5. PCEP Show and Tools Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Show Commands
5.5.1.2. Tools Commands
5.5.2. Command Descriptions
5.5.2.1. Show Commands
5.5.2.2. Tools Commands
6. Segment Routing Policies
6.1. Statically-Configured Segment Routing Policies
6.2. BGP Signaled Segment Routing Policies
6.3. Segment Routing Policy Path Selection and Tie-Breaking
6.4. Resolving BGP Routes to Segment Routing Policy Tunnels
6.4.1. Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.2. Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
6.4.3. Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
6.4.4. Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
6.4.5. Resolving EVPN-MPLS Routes to Segment Routing Policy Tunnels
6.4.6. VPRN Auto-Bind-Tunnel Using Segment Routing Policy Tunnels
6.5. Traffic Statistics
7. Label Distribution Protocol
7.1. Label Distribution Protocol
7.1.1. LDP and MPLS
7.1.2. LDP Architecture
7.1.3. Subsystem Interrelationships
7.1.3.1. Memory Manager and LDP
7.1.3.2. Label Manager
7.1.3.3. LDP Configuration
7.1.3.4. Logger
7.1.3.5. Service Manager
7.1.4. Execution Flow
7.1.4.1. Initialization
7.1.4.2. Session Lifetime
7.1.4.2.1. Adjacency Establishment
7.1.4.2.2. Session Establishment
7.1.5. Label Exchange
7.1.5.1. Other Reasons for Label Actions
7.1.5.2. Cleanup
7.1.5.3. Configuring Implicit Null Label
7.1.6. Global LDP Filters
7.1.6.1. Per LDP Peer FEC Import and Export Policies
7.1.7. Configuring Multiple LDP LSR ID
7.1.7.1. Advertisement of FEC for Local LSR ID
7.1.8. Extend LDP policies to mLDP
7.1.8.1. Recursive FEC behavior
7.1.8.2. Import Policy
7.1.9. LDP FEC Resolution Per Specified Community
7.1.9.1. Configuration
7.1.9.2. Operation
7.1.10. T-LDP hello reduction
7.1.11. Tracking a T-LDP Peer with BFD
7.1.12. Link LDP Hello Adjacency Tracking with BFD
7.1.13. LDP LSP Statistics
7.1.14. MPLS Entropy Label
7.1.15. Importing LDP Tunnels to Non-Host Prefixes to TTM
7.2. TTL Security for BGP and LDP
7.3. ECMP Support for LDP
7.3.1. Label Operations
7.3.2. Weighted ECMP Support for LDP
7.4. Unnumbered Interface Support in LDP
7.4.1. Feature Configuration
7.4.2. Operation of LDP over an Unnumbered IP Interface
7.4.2.1. Link LDP
7.4.2.2. Targeted LDP
7.4.2.3. FEC Resolution
7.5. LDP over RSVP Tunnels
7.5.1. Signaling and Operation
7.5.1.1. LDP Label Distribution and FEC Resolution
7.5.1.2. Default FEC Resolution Procedure
7.5.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
7.5.2. Rerouting Around Failures
7.5.2.1. LDP-over-RSVP Tunnel Protection
7.5.2.2. ABR Protection
7.6. LDP over RSVP Without Area Boundary
7.6.1. LDP over RSVP and ECMP
7.7. Weighted Load Balancing for LDP over RSVP
7.7.1. Interaction with Class-Based Forwarding
7.8. Class-based Forwarding of LDP Prefix Packets over IGP Shortcuts
7.8.1. Configuration and Operation
7.8.1.1. LSR and/or LER Roles with FC-to-Set Configuration
7.9. LDP ECMP Uniform Failover
7.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
7.10.1. LDP FRR Configuration
7.10.1.1. Reducing the Scope of the LFA Calculation by SPF
7.10.2. LDP FRR Procedures
7.10.2.1. ECMP Considerations
7.10.2.2. LDP FRR and LDP Shortcut
7.10.2.3. LDP FRR and LDP-over-RSVP
7.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
7.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
7.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
7.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
7.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
7.11. LDP FEC to BGP Label Route Stitching
7.11.1. Configuration
7.11.2. Detailed LDP FEC Resolution
7.11.3. Detailed BGP Labeled Route Resolution
7.11.4. Data Plane Forwarding
7.12. LDP-SR Stitching for IPv4 prefixes
7.12.1. LDP-SR Stitching Configuration
7.12.2. Stitching in the LDP-to-SR Direction
7.12.3. Stitching in the SR-to-LDP Direction
7.13. LDP FRR LFA Backup using SR Tunnel for IPv4 Prefixes
7.14. LDP Remote LFA
7.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
7.15.1. Feature Configuration
7.15.2. Feature Behavior
7.16. Multicast P2MP LDP for GRT
7.17. LDP P2MP Support
7.17.1. LDP P2MP Configuration
7.17.2. LDP P2MP Protocol
7.17.3. Make Before Break (MBB)
7.17.4. ECMP Support
7.17.5. Inter-AS Non-segmented mLDP
7.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
7.17.5.2. LDP Recursive FEC Process
7.17.5.3. Supported Recursive Opaque Values
7.17.5.4. Optimized Option C and Basic FEC Generation for Inter-AS
7.17.5.5. Basic Opaque Generation When Root PE is Resolved Using BGP
7.17.5.5.1. Leaf and ABR Behavior
7.17.5.5.2. Intra-AS Support
7.17.5.5.3. Opaque Type Behavior with Basic FEC Generation
7.17.5.5.4. Inter-AS Support
7.17.5.6. Redundancy and Resiliency
7.17.5.7. ASBR Physical Connection
7.17.5.8. OAM
7.17.5.9. ECMP Support
7.17.5.9.1. ECMP Hash Algorithm
7.17.5.10. Dynamic mLDP and Static mLDP Co-existing on the Same Node
7.17.6. Intra-AS Non-segmented mLDP
7.17.6.1. ABR MoFRR for Intra-AS
7.17.6.2. Interaction with an Inter-AS Non-segmented mLDP Solution
7.17.6.3. Intra-AS/Inter-AS Option B
7.17.7. ASBR MoFRR
7.17.7.1. IGP MoFRR Versus BGP (ASBR) MoFRR
7.17.7.2. ASBR MoFRR Leaf Behavior
7.17.7.3. ASBR MoFRR ASBR Behavior
7.17.7.4. MoFRR Root AS Behavior
7.17.7.5. Traffic Flow
7.17.7.6. Failure Detection and Handling
7.17.7.7. Failure Scenario
7.17.7.8. ASBR MoFRR Consideration
7.17.7.9. ASBR MoFRR Opaque Support
7.17.8. MBB for MoFRR
7.17.9. Add-path for Route Reflectors
7.18. Multicast LDP Fast Upstream Switchover
7.18.1. Feature Configuration
7.18.2. Feature Behavior
7.18.3. Uniform Failover from Primary to Backup ILM
7.19. Multi-Area and Multi-Instance Extensions to LDP
7.19.1. LDP Shortcut for BGP Next-Hop Resolution
7.19.2. LDP Shortcut for IGP Routes
7.19.2.1. LDP Shortcut Configuration
7.19.2.2. IGP Route Resolution
7.19.2.3. LDP Shortcut Forwarding Plane
7.19.3. ECMP Considerations
7.19.4. Disabling TTL Propagation in an LSP Shortcut
7.20. LDP Graceful Handling of Resource Exhaustion
7.20.1. LDP Base Graceful Handling of Resources
7.21. LDP Enhanced Graceful Handling of Resources
7.21.1. LSR Overload Notification
7.21.2. LSR Overload Protection Capability
7.21.3. Procedures for LSR overload protection
7.22. LDP-IGP Synchronization
7.23. MLDP Resolution using Multicast RTM
7.23.1. Other Considerations for Multicast RTM MLDP Resolution
7.24. Bidirectional Forwarding Detection for LDP LSPs
7.24.1. Bootstrapping and Maintaining LSP BFD Sessions
7.24.2. BFD Configuration on LDP LSPs
7.25. User Guidelines and Troubleshooting Procedures
7.25.1. Common Procedures
7.25.2. Base Resource Handling Procedures
7.25.3. Enhanced Resource Handling Procedures
7.26. LDP IPv6 Control and Data Planes
7.26.1. LDP Operation in an IPv6 Network
7.26.2. Link LDP
7.26.3. Targeted LDP
7.26.4. FEC Resolution
7.26.5. LDP Session Capabilities
7.26.6. LDP Adjacency Capabilities
7.26.7. Address and FEC Distribution
7.26.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
7.26.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
7.26.10. IGP and Static Route Synchronization with LDP
7.26.11. BFD Operation
7.26.12. Services Using SDP with an LDP IPv6 FEC
7.26.13. Mirror Services and Lawful Intercept
7.26.13.1. Configuration at mirror source node
7.26.13.2. Configuration at mirror destination node
7.26.14. Static Route Resolution to a LDP IPv6 FEC
7.26.15. IGP Route Resolution to a LDP IPv6 FEC
7.26.16. OAM Support with LDP IPv6
7.26.17. LDP IPv6 Interoperability Considerations
7.26.17.1. Interoperability with Implementations Compliant with RFC 7552
7.26.17.2. LDP IPv6 32-bit LSR-ID
7.26.17.2.1. Feature Configuration
7.26.17.2.2. LDP LSR IPv6 Operation with 32-bit LSR-ID
7.26.17.2.3. Migration Considerations
7.26.17.3. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
7.27. LDP Process Overview
7.28. Configuring LDP with CLI
7.28.1. LDP Configuration Overview
7.28.2. Basic LDP Configuration
7.28.3. Common Configuration Tasks
7.28.3.1. Enabling LDP
7.28.3.2. Configuring FEC Originate Parameters
7.28.3.3. Configuring Graceful-Restart Helper Parameters
7.28.3.4. Applying Export and Import Policies
7.28.3.5. Targeted Session Parameters
7.28.3.6. Interface Parameters
7.28.3.7. Session Parameters
7.28.3.8. LDP Signaling and Services
7.29. LDP Configuration Management Tasks
7.29.1. Disabling LDP
7.29.2. Modifying Targeted Session Parameters
7.29.3. Modifying Interface Parameters
7.30. LDP Command Reference
7.30.1. Command Hierarchies
7.30.1.1. LDP Commands
7.30.2. Command Descriptions
7.30.2.1. Generic Commands
7.30.2.2. LDP Commands
7.30.2.3. Interface Parameters Commands
7.30.2.4. Session Parameters Commands
7.30.2.5. Targeted Session Commands
7.30.2.6. TCP Session Parameters Commands
7.31. Show, Clear, Debug, and Tools Command Reference
7.31.1. Command Hierarchies
7.31.1.1. Show Commands
7.31.1.2. Clear Commands
7.31.1.3. Debug Commands
7.31.1.4. Tools Commands
7.31.2. Command Descriptions
7.31.2.1. Show LDP Commands
7.31.2.2. Clear Commands
7.31.2.3. Debug Commands
7.31.2.4. Tools Commands
8. Standards and Protocol Support
Customer Document and Product Support
Multicast Routing Protocols Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. Multicast Overview
2.2. Multicast Models
2.2.1. Any-Source Multicast (ASM)
2.2.2. Source Specific Multicast (SSM)
2.2.3. Multicast in IP-VPN Networks
3. IGMP
3.1. IGMP Overview
3.1.1. IGMP Versions and Interoperability Requirements
3.1.2. IGMP Version Transition
3.1.3. Source-Specific Multicast Groups
3.1.4. Query Messages
3.2. Configuring IGMP with CLI
3.2.1. IGMP Configuration Overview
3.2.2. Basic IGMP Configuration
3.2.3. Configuring IGMP Parameters
3.2.3.1. Enabling IGMP
3.2.3.2. Configuring an IGMP Interface
3.2.3.3. Configuring Static Parameters
3.2.3.4. Configuring SSM Translation
3.2.4. Disabling IGMP
3.3. IGMP Configuration Command Reference
3.3.1. Command Hierarchies
3.3.1.1. IGMP Configuration Commands
3.3.2. Command Descriptions
3.3.2.1. Router IGMP Commands
3.4. Show, Clear, and Debug Command Reference
3.4.1. Command Hierarchies
3.4.1.1. Show Commands
3.4.1.2. Clear Commands
3.4.1.3. Debug Commands
3.4.2. Command Descriptions
3.4.2.1. Show Commands
3.4.2.2. Clear Commands
3.4.2.3. Debug Commands
4. MLD
4.1. MLD Overview
4.1.1. MLDv1
4.1.2. MLDv2
4.2. Configuring MLD with CLI
4.2.1. MLD Configuration Overview
4.2.2. Basic MLD Configuration
4.2.3. Configuring MLD Parameters
4.2.3.1. Enabling MLD
4.2.3.2. Configuring an MLD Interface
4.2.3.3. Configuring Static Parameters
4.2.3.4. Configuring SSM Translation
4.2.4. Disabling MLD
4.3. MLD Configuration Command Reference
4.3.1. Command Hierarchies
4.3.1.1. MLD Configuration Commands
4.3.2. Command Descriptions
4.3.2.1. MLD Commands
4.3.2.2. Generic Commands
4.4. Show, Clear, and Debug Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Show Commands
4.4.1.2. Clear Commands
4.4.2. Command Descriptions
4.4.2.1. Show Commands
4.4.2.2. Clear Commands
5. PIM
5.1. PIM Overview
5.1.1. PIM-SM Functions
5.1.1.1. Phase One
5.1.1.2. Phase Two
5.1.1.3. Phase Three
5.1.2. Encapsulating Data Packets in the Register Tunnel
5.1.3. PIM Bootstrap Router Mechanism
5.1.4. PIM-SM Routing Policies
5.1.5. Reverse Path Forwarding Checks
5.1.6. Anycast RP for PIM-SM
5.1.6.1. Implementation
5.1.7. Distributing PIM Joins over Multiple ECMP Paths
5.1.8. PIM Interface on IES Subscriber Group Interfaces
5.1.9. Multicast-Only Fast Reroute (MoFRR)
5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.1.11. VRRP Aware PIM
5.1.11.1. Configuring VRRP Aware PIM
5.1.11.2. Configuration Recommendations
5.1.11.2.1. Primary Router Example
5.1.11.2.2. Secondary Router Example
5.2. IPv6 PIM models
5.2.1. PIM SSM
5.2.1.1. System PIM SSM Scaling
5.2.2. PIM ASM
5.2.3. Embedded RP
5.3. PIM Signaling over BIER
5.3.1. EBBR Discovery
5.3.1.1. Single Area Scenario
5.3.1.2. Multiple Area Scenarios
5.3.2. PIM Signaling Support
5.3.3. PIM Signaling MTU Considerations
5.4. Configuring PIM with CLI
5.4.1. PIM Configuration Overview
5.4.2. Basic PIM Configuration
5.4.3. Configuring PIM Parameters
5.4.3.1. Enabling PIM
5.4.3.2. Configuring PIM Interface Parameters
5.4.3.3. Configuring PIM Join/Register Policies
5.4.3.4. Importing PIM Join/Register Policies
5.4.3.5. Configuring Bootstrap Message Import and Export Policies
5.4.4. Disabling PIM
5.5. PIM Configuration Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Configuration Commands
5.5.2. Command Descriptions
5.5.2.1. Router PIM Commands
5.6. Show, Clear, and Debug Command Reference
5.6.1. Command Hierarchies
5.6.1.1. Show Commands
5.6.1.2. Clear Commands
5.6.1.3. Debug Commands
5.6.2. Command Descriptions
5.6.2.1. Show Commands
5.6.2.2. Clear Commands
5.6.2.3. Debug Commands
6. MSDP
6.1. Multicast Source Discovery Protocol
6.1.1. Anycast RP for MSDP
6.1.2. MSDP Procedure
6.1.2.1. MSDP Peering Scenarios
6.1.3. MSDP Peer Groups
6.1.4. MSDP Mesh Groups
6.1.5. MSDP Routing Policies
6.1.6. Multicast in Virtual Private Networks
6.1.6.1. Draft Rosen
6.2. Configuring MSDP with CLI
6.2.1. Basic MSDP Configuration
6.2.2. Configuring MSDP Parameters
6.2.3. Disabling MSDP
6.3. MSDP Configuration Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands
6.3.2. Command Descriptions
6.3.2.1. MSDP Commands
6.4. Show, Clear, and Debug Command Reference
6.4.1. Command Hierarchies
6.4.1.1. Show Commands
6.4.1.2. Clear Commands
6.4.1.3. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. Show Commands
6.4.2.2. Clear Commands
6.4.2.3. Debug Commands
7. MLDP
7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
7.2. Inter-AS Non-segmented MLDP
7.2.1. d-MLDP Inter-AS Trees in GRT
7.2.1.1. Routing
7.2.1.2. Join Processing
7.2.2. ASBR Support of PE Functionality
7.3. Hashing for Inter-AS
7.4. Hashing at the ASBR
8. Multicast Extensions to BGP
8.1. Multicast Extensions to BGP
8.1.1. MBGP Multicast Topology Support
8.1.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. MCAC Overview
9.1.1. MCAC Bundle Policy Overview
9.1.2. MCAC Algorithm
9.1.2.1. Interface-level MCAC details
9.1.2.1.1. MCAC-interface-policy-level MCAC details
9.1.2.2. Bundle-level MCAC details
9.1.3. MCAC on Link Aggregation Group Interfaces
9.2. Configuring MCAC with CLI
9.2.1. Basic MCAC Configuration
9.2.2. Configuring MCAC Parameters
9.3. MCAC Configuration Command Reference
9.3.1. Command Hierarchies
9.3.1.1. MCAC Configuration Commands
9.3.1.2. MCAC Policy Commands
9.3.2. Command Descriptions
9.3.2.1. MCAC Configuration Commands
9.4. Show, Clear, and Debug Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Show Commands
9.4.2.1.1. Show MCAC Commands
10. GTM
10.1. GTM Overview
10.1.1. Using BGP-MVPN Procedures in GTM
10.1.1.1. Route Distinguishers and Route Targets
10.1.1.2. UMH-Eligible Routes
10.1.1.3. BGP Route Types Supported
10.2. Configuring GTM
10.2.1. Configuration Recommendations
10.2.2. Configuring GTM with CLI
10.3. GTM Configuration Command Reference
10.3.1. Command Hierarchies
10.3.1.1. Configuration Commands
10.3.2. Command Descriptions
10.3.2.1. GTM Commands
10.4. Show, Clear, and Debug Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Show Commands
11. BIER
11.1. BIER Overview
11.1.1. BIER Hardware
11.1.2. BIER IMPM
11.1.3. BIER ECMP
11.1.4. BIER Redundancy and Resiliency
11.1.5. BIER Layers
11.1.6. Implementation
11.1.6.1. BIER Sub-domains
11.1.6.2. BIER Set IDs
11.1.6.3. BIER Encapsulation
11.1.6.3.1. BIER MPLS Encapsulation
11.1.6.4. BIER Forwarding Tables
11.1.6.5. BIER IS-IS Sub-TLVs
11.1.6.6. IS-IS BIER Support
11.1.6.7. IS-IS Multi-topologies
11.1.6.8. BIER Intra-AS Solution
11.1.6.9. OSPF BIER Support
11.1.6.9.1. BIER OSPF Sub-TLVs
11.1.6.10. BIER Forwarding
11.1.6.10.1. BIER FIB Packet Handling
11.1.6.11. BIER MVPN
11.1.6.11.1. BIER MVPN IPv4 and IPv6
11.1.6.11.2. BIER MVPN Sub-domain
11.1.6.11.3. BIER Templates
11.2. BIER Configuration Command Reference
11.2.1. Command Hierarchies
11.2.1.1. Configuration Commands
11.2.2. Command Descriptions
11.2.2.1. BIER Commands
11.3. Show, Clear, and Debug Command Reference
11.3.1. Command Hierarchies
11.3.1.1. Show Commands
11.3.2. Command Descriptions
11.3.2.1. Show Commands
12. SR P2MP Policy
12.1. Overview
12.2. SR P2MP Policy Details
12.3. Replication Segment
12.4. P2MP and Replication Segment Objects
12.5. SR P2MP Policy Instantiation
12.5.1. SR P2MP Policy Instantiation Using the CLI
12.5.1.1. SPMSI for Static P2MP Policy
12.5.1.2. PMSI Tree ID Advertised by BGP
12.5.2. SR P2MP Policy Instantiation Using PCE
12.5.2.1. SPMSI for PCE P2MP Policy
12.5.3. Configuration Examples
12.5.4. Administrative Behavior
12.5.4.1. Candidate Path Selection Criteria
12.5.4.2. Candidate Path Operational Status
12.5.4.3. P2MP Policy Operational Status
12.5.4.4. Replication Segment Operational Status
12.5.5. FRR Behavior
12.5.5.1. Implicit Null Case
12.5.5.2. Non-Implicit Null Case
12.5.6. FRR Recovery Behavior
12.5.7. BFD Behavior
12.5.8. Maximum SPMSI Behavior
12.5.9. Global Optimization of P2MP Policy and MBB Behavior
12.5.10. Global Optimization of PCEP Behavior
12.5.11. PCEP Behavior
12.5.12. PCE Pop with Next-hop 127.0.0.0/8 or ::1
12.6. SR P2MP Configuration Command Reference
12.6.1. Command Hierarchies
12.6.1.1. P2MP SR Tree Configuration Commands
12.6.1.2. MVPN Configuration Commands
12.6.2. Command Descriptions
12.6.2.1. P2MP SR Tree Commands
12.6.2.2. MVPN Commands
12.7. SR P2MP Show Command Reference
12.7.1. Command Hierarchies
12.7.1.1. SR P2MP Show Commands
12.7.2. Command Descriptions
12.7.2.1. Show Commands
13. Troubleshooting Tools
13.1. Mtrace
13.1.1. Finding the Last Hop Router
13.1.2. Directing the Response
13.2. Mstat
13.3. Mrinfo
13.4. Troubleshooting Configuration Command Reference
13.4.1. Command Hierarchies
13.4.1.1. Operational Commands
13.4.2. Command Descriptions
13.4.2.1. Operational Commands
13.5. Show Command Reference
13.5.1. Command Hierarchies
13.5.1.1. Show Commands
13.5.2. Command Descriptions
13.5.2.1. Show Commands
14. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. Multicast Overview
2.2. Multicast Models
2.2.1. Any-Source Multicast (ASM)
2.2.2. Source Specific Multicast (SSM)
2.2.3. Multicast in IP-VPN Networks
3. IGMP
3.1. IGMP Overview
3.1.1. IGMP Versions and Interoperability Requirements
3.1.2. IGMP Version Transition
3.1.3. Source-Specific Multicast Groups
3.1.4. Query Messages
3.2. Configuring IGMP with CLI
3.2.1. IGMP Configuration Overview
3.2.2. Basic IGMP Configuration
3.2.3. Configuring IGMP Parameters
3.2.3.1. Enabling IGMP
3.2.3.2. Configuring an IGMP Interface
3.2.3.3. Configuring Static Parameters
3.2.3.4. Configuring SSM Translation
3.2.4. Disabling IGMP
3.3. IGMP Configuration Command Reference
3.3.1. Command Hierarchies
3.3.1.1. IGMP Configuration Commands
3.3.2. Command Descriptions
3.3.2.1. Router IGMP Commands
3.4. Show, Clear, and Debug Command Reference
3.4.1. Command Hierarchies
3.4.1.1. Show Commands
3.4.1.2. Clear Commands
3.4.1.3. Debug Commands
3.4.2. Command Descriptions
3.4.2.1. Show Commands
3.4.2.2. Clear Commands
3.4.2.3. Debug Commands
4. MLD
4.1. MLD Overview
4.1.1. MLDv1
4.1.2. MLDv2
4.2. Configuring MLD with CLI
4.2.1. MLD Configuration Overview
4.2.2. Basic MLD Configuration
4.2.3. Configuring MLD Parameters
4.2.3.1. Enabling MLD
4.2.3.2. Configuring an MLD Interface
4.2.3.3. Configuring Static Parameters
4.2.3.4. Configuring SSM Translation
4.2.4. Disabling MLD
4.3. MLD Configuration Command Reference
4.3.1. Command Hierarchies
4.3.1.1. MLD Configuration Commands
4.3.2. Command Descriptions
4.3.2.1. MLD Commands
4.3.2.2. Generic Commands
4.4. Show, Clear, and Debug Command Reference
4.4.1. Command Hierarchies
4.4.1.1. Show Commands
4.4.1.2. Clear Commands
4.4.2. Command Descriptions
4.4.2.1. Show Commands
4.4.2.2. Clear Commands
5. PIM
5.1. PIM Overview
5.1.1. PIM-SM Functions
5.1.1.1. Phase One
5.1.1.2. Phase Two
5.1.1.3. Phase Three
5.1.2. Encapsulating Data Packets in the Register Tunnel
5.1.3. PIM Bootstrap Router Mechanism
5.1.4. PIM-SM Routing Policies
5.1.5. Reverse Path Forwarding Checks
5.1.6. Anycast RP for PIM-SM
5.1.6.1. Implementation
5.1.7. Distributing PIM Joins over Multiple ECMP Paths
5.1.8. PIM Interface on IES Subscriber Group Interfaces
5.1.9. Multicast-Only Fast Reroute (MoFRR)
5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.1.11. VRRP Aware PIM
5.1.11.1. Configuring VRRP Aware PIM
5.1.11.2. Configuration Recommendations
5.1.11.2.1. Primary Router Example
5.1.11.2.2. Secondary Router Example
5.2. IPv6 PIM models
5.2.1. PIM SSM
5.2.1.1. System PIM SSM Scaling
5.2.2. PIM ASM
5.2.3. Embedded RP
5.3. PIM Signaling over BIER
5.3.1. EBBR Discovery
5.3.1.1. Single Area Scenario
5.3.1.2. Multiple Area Scenarios
5.3.2. PIM Signaling Support
5.3.3. PIM Signaling MTU Considerations
5.4. Configuring PIM with CLI
5.4.1. PIM Configuration Overview
5.4.2. Basic PIM Configuration
5.4.3. Configuring PIM Parameters
5.4.3.1. Enabling PIM
5.4.3.2. Configuring PIM Interface Parameters
5.4.3.3. Configuring PIM Join/Register Policies
5.4.3.4. Importing PIM Join/Register Policies
5.4.3.5. Configuring Bootstrap Message Import and Export Policies
5.4.4. Disabling PIM
5.5. PIM Configuration Command Reference
5.5.1. Command Hierarchies
5.5.1.1. Configuration Commands
5.5.2. Command Descriptions
5.5.2.1. Router PIM Commands
5.6. Show, Clear, and Debug Command Reference
5.6.1. Command Hierarchies
5.6.1.1. Show Commands
5.6.1.2. Clear Commands
5.6.1.3. Debug Commands
5.6.2. Command Descriptions
5.6.2.1. Show Commands
5.6.2.2. Clear Commands
5.6.2.3. Debug Commands
6. MSDP
6.1. Multicast Source Discovery Protocol
6.1.1. Anycast RP for MSDP
6.1.2. MSDP Procedure
6.1.2.1. MSDP Peering Scenarios
6.1.3. MSDP Peer Groups
6.1.4. MSDP Mesh Groups
6.1.5. MSDP Routing Policies
6.1.6. Multicast in Virtual Private Networks
6.1.6.1. Draft Rosen
6.2. Configuring MSDP with CLI
6.2.1. Basic MSDP Configuration
6.2.2. Configuring MSDP Parameters
6.2.3. Disabling MSDP
6.3. MSDP Configuration Command Reference
6.3.1. Command Hierarchies
6.3.1.1. Configuration Commands
6.3.2. Command Descriptions
6.3.2.1. MSDP Commands
6.4. Show, Clear, and Debug Command Reference
6.4.1. Command Hierarchies
6.4.1.1. Show Commands
6.4.1.2. Clear Commands
6.4.1.3. Debug Commands
6.4.2. Command Descriptions
6.4.2.1. Show Commands
6.4.2.2. Clear Commands
6.4.2.3. Debug Commands
7. MLDP
7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
7.2. Inter-AS Non-segmented MLDP
7.2.1. d-MLDP Inter-AS Trees in GRT
7.2.1.1. Routing
7.2.1.2. Join Processing
7.2.2. ASBR Support of PE Functionality
7.3. Hashing for Inter-AS
7.4. Hashing at the ASBR
8. Multicast Extensions to BGP
8.1. Multicast Extensions to BGP
8.1.1. MBGP Multicast Topology Support
8.1.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. MCAC Overview
9.1.1. MCAC Bundle Policy Overview
9.1.2. MCAC Algorithm
9.1.2.1. Interface-level MCAC details
9.1.2.1.1. MCAC-interface-policy-level MCAC details
9.1.2.2. Bundle-level MCAC details
9.1.3. MCAC on Link Aggregation Group Interfaces
9.2. Configuring MCAC with CLI
9.2.1. Basic MCAC Configuration
9.2.2. Configuring MCAC Parameters
9.3. MCAC Configuration Command Reference
9.3.1. Command Hierarchies
9.3.1.1. MCAC Configuration Commands
9.3.1.2. MCAC Policy Commands
9.3.2. Command Descriptions
9.3.2.1. MCAC Configuration Commands
9.4. Show, Clear, and Debug Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Show Commands
9.4.2. Command Descriptions
9.4.2.1. Show Commands
9.4.2.1.1. Show MCAC Commands
10. GTM
10.1. GTM Overview
10.1.1. Using BGP-MVPN Procedures in GTM
10.1.1.1. Route Distinguishers and Route Targets
10.1.1.2. UMH-Eligible Routes
10.1.1.3. BGP Route Types Supported
10.2. Configuring GTM
10.2.1. Configuration Recommendations
10.2.2. Configuring GTM with CLI
10.3. GTM Configuration Command Reference
10.3.1. Command Hierarchies
10.3.1.1. Configuration Commands
10.3.2. Command Descriptions
10.3.2.1. GTM Commands
10.4. Show, Clear, and Debug Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Show Commands
11. BIER
11.1. BIER Overview
11.1.1. BIER Hardware
11.1.2. BIER IMPM
11.1.3. BIER ECMP
11.1.4. BIER Redundancy and Resiliency
11.1.5. BIER Layers
11.1.6. Implementation
11.1.6.1. BIER Sub-domains
11.1.6.2. BIER Set IDs
11.1.6.3. BIER Encapsulation
11.1.6.3.1. BIER MPLS Encapsulation
11.1.6.4. BIER Forwarding Tables
11.1.6.5. BIER IS-IS Sub-TLVs
11.1.6.6. IS-IS BIER Support
11.1.6.7. IS-IS Multi-topologies
11.1.6.8. BIER Intra-AS Solution
11.1.6.9. OSPF BIER Support
11.1.6.9.1. BIER OSPF Sub-TLVs
11.1.6.10. BIER Forwarding
11.1.6.10.1. BIER FIB Packet Handling
11.1.6.11. BIER MVPN
11.1.6.11.1. BIER MVPN IPv4 and IPv6
11.1.6.11.2. BIER MVPN Sub-domain
11.1.6.11.3. BIER Templates
11.2. BIER Configuration Command Reference
11.2.1. Command Hierarchies
11.2.1.1. Configuration Commands
11.2.2. Command Descriptions
11.2.2.1. BIER Commands
11.3. Show, Clear, and Debug Command Reference
11.3.1. Command Hierarchies
11.3.1.1. Show Commands
11.3.2. Command Descriptions
11.3.2.1. Show Commands
12. SR P2MP Policy
12.1. Overview
12.2. SR P2MP Policy Details
12.3. Replication Segment
12.4. P2MP and Replication Segment Objects
12.5. SR P2MP Policy Instantiation
12.5.1. SR P2MP Policy Instantiation Using the CLI
12.5.1.1. SPMSI for Static P2MP Policy
12.5.1.2. PMSI Tree ID Advertised by BGP
12.5.2. SR P2MP Policy Instantiation Using PCE
12.5.2.1. SPMSI for PCE P2MP Policy
12.5.3. Configuration Examples
12.5.4. Administrative Behavior
12.5.4.1. Candidate Path Selection Criteria
12.5.4.2. Candidate Path Operational Status
12.5.4.3. P2MP Policy Operational Status
12.5.4.4. Replication Segment Operational Status
12.5.5. FRR Behavior
12.5.5.1. Implicit Null Case
12.5.5.2. Non-Implicit Null Case
12.5.6. FRR Recovery Behavior
12.5.7. BFD Behavior
12.5.8. Maximum SPMSI Behavior
12.5.9. Global Optimization of P2MP Policy and MBB Behavior
12.5.10. Global Optimization of PCEP Behavior
12.5.11. PCEP Behavior
12.5.12. PCE Pop with Next-hop 127.0.0.0/8 or ::1
12.6. SR P2MP Configuration Command Reference
12.6.1. Command Hierarchies
12.6.1.1. P2MP SR Tree Configuration Commands
12.6.1.2. MVPN Configuration Commands
12.6.2. Command Descriptions
12.6.2.1. P2MP SR Tree Commands
12.6.2.2. MVPN Commands
12.7. SR P2MP Show Command Reference
12.7.1. Command Hierarchies
12.7.1.1. SR P2MP Show Commands
12.7.2. Command Descriptions
12.7.2.1. Show Commands
13. Troubleshooting Tools
13.1. Mtrace
13.1.1. Finding the Last Hop Router
13.1.2. Directing the Response
13.2. Mstat
13.3. Mrinfo
13.4. Troubleshooting Configuration Command Reference
13.4.1. Command Hierarchies
13.4.1.1. Operational Commands
13.4.2. Command Descriptions
13.4.2.1. Operational Commands
13.5. Show Command Reference
13.5.1. Command Hierarchies
13.5.1.1. Show Commands
13.5.2. Command Descriptions
13.5.2.1. Show Commands
14. Standards and Protocol Support
Customer Document and Product Support
Multiservice ISA and ESA 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. ISA and ESA Configuration Process
2. ISA and ESA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISA Overview
2.4. MS-ISM Overview
2.5. ESA 100G Overview
2.6. Application Assurance Hardware Features
2.6.1. AA System Support
2.6.2. Host IOM Support for AA on ISAs
2.6.3. Host IOM Support for AA on ESAs
2.7. Configuring an ESA with CLI
2.7.1. Provisioning an ESA and ESA-VM
2.8. Extended Services Appliance Command Reference
2.8.1. Command Hierarchies
2.8.1.1. ESA Configuration Commands
2.8.2. Command Descriptions
2.8.2.1. ESA Configuration Commands
2.9. Show and Clear Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.2. Clear Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.2. Clear Commands
3. Application Assurance
3.1. Application Assurance (AA) Overview
3.1.1. Application Assurance: Inline Policy Enforcement
3.1.2. AA Integration in Subscriber Edge Gateways
3.1.3. Fixed Residential Broadband Services
3.1.3.1. Dual-Stack Lite – DS-Lite
3.1.3.2. 6to4 /6RD
3.1.4. Wireless LAN Gateway Broadband Services
3.1.5. Application-Aware Business VPN Services
3.1.6. Mobile Backhaul
3.1.7. Stateful Firewall Service
3.2. Application Assurance System Architecture
3.2.1. AA ISA Resource Configuration
3.2.1.1. AA ISA Groups
3.2.1.1.1. AA Group Partitions
3.2.1.1.2. Bypass Modes
3.2.1.2. Redundancy
3.2.1.2.1. No AA ISA Group Redundancy
3.2.1.2.2. Failure to Fabric
3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
3.2.1.3. ISA Load Balancing
3.2.1.4. Asymmetry Removal
3.2.1.4.1. Asymmetry Removal Overview
3.2.1.4.2. Failure Modes
3.2.1.4.3. AARP Peered Node/Instance Configuration
3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.2.1.4.5. Multi-Chassis Datapath Shunts
3.2.1.5. ISA Overload Detection
3.2.2. AA Packet Processing
3.2.2.1. Divert of Traffic and Subscribers
3.2.2.1.1. Services and AA Subscribers
3.2.2.1.2. Spoke SDPs
3.2.2.1.3. Transit AA Subscribers
3.2.2.1.4. AA Subscriber Application Service Definition
3.2.2.2. Traffic Identification
3.2.2.2.1. Application Assurance Identification Components
3.2.2.2.2. Protocol Signatures
3.2.2.2.3. Custom Protocols
3.2.2.2.4. Protocol Shutdown
3.2.2.2.5. Supported Protocol Signatures
3.2.2.2.6. Application Groups
3.2.2.2.7. Charging Groups
3.2.2.2.8. Applications
3.2.2.2.9. Application Filters
3.2.2.2.10. HTTP
3.2.2.2.11. AA IP Prefix Lists
3.2.2.2.12. Shallow Flow Inspection
3.2.2.2.13. Flow Attributes
3.2.2.3. Statistics and Accounting
3.2.2.3.1. Per-AA Subscriber Special Study
3.2.2.3.2. System Aspects
3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.2.2.3.4. AA Partition Traffic Type Statistics
3.2.2.3.5. Configurable AA Subscriber Statistics Collection
3.2.2.3.6. AA-Performance Record for ISA Load
3.2.2.3.7. AA Partition Traffic Type Statistics
3.2.2.3.8. AA Partition Admit–Deny Statistics
3.2.2.3.9. RADIUS Accounting AA Records
3.2.2.3.10. AA GX Based Usage Monitoring
3.2.2.3.11. Supported AVPs
3.2.2.3.12. Cflowd AA Records
3.2.2.3.13. vRGW Nested Router Detection
3.2.2.4. Application QoS Policy (AQP)
3.2.2.4.1. AQP Match Criteria
3.2.2.4.2. AQP Actions
3.2.2.4.3. Application Assurance Policers
3.2.2.4.4. Application Assurance Dynamic Experience Management
3.2.2.4.5. Application Assurance HTTP Redirect
3.2.2.4.6. Application Assurance HTTPS Policy Redirect
3.2.2.4.7. ICAP - Large Scale Category-based URL Filtering
3.2.2.4.8. Web-service URL Classification
3.2.2.4.9. Local URL-List Filtering
3.2.2.4.10. HTTP Header Enrichment
3.2.2.4.11. HTTP In Browser Notification
3.2.2.5. Application Assurance Firewall
3.2.2.5.1. Denial of Service (DoS) Protection
3.2.2.5.2. TCP Validation
3.2.2.5.3. Policy Partitioned AA FW
3.2.2.5.4. Configuring AA FW
3.2.2.5.5. AA FW Logging
3.2.2.5.6. SeGW Firewall Protection
3.2.2.5.7. GTP Backhaul Roaming Firewall Protection
3.2.3. Service Monitoring and Debugging
3.2.4. CPU Utilization
3.2.5. CLI Batch: Begin, Commit and Abort Commands
3.3. Configuring Application Assurance with CLI
3.3.1. Provisioning AA ISA MDA
3.3.2. Configuring an AA ISA Group
3.3.2.1. Configuring Watermark Parameters
3.3.3. Configuring a Group Policy
3.3.3.1. Beginning and Committing a Policy Configuration
3.3.3.2. Aborting a Policy Configuration
3.3.3.3. Configuring an IP Prefix List
3.3.3.4. Configuring AA Session Filters
3.3.3.5. Configuring an Application Group
3.3.3.6. Configuring an Application
3.3.3.7. Configuring an Application Filter
3.3.3.8. Configuring an Application Profile
3.3.3.9. Configuring Suppressible App-Profile with SRRP
3.3.3.10. Configuring Application Service Options
3.3.3.11. Configuring a Policer
3.3.3.12. Configuring an Application QoS Policy
3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
3.3.3.14. Configuring an HTTP Error Redirect
3.3.3.15. Configuring HTTP Header Enrichment
3.3.3.16. Configuring an HTTP Redirect Policy
3.3.3.17. Configuring an HTTPS Policy Redirect
3.3.3.18. Configuring a Captive Redirect HTTP Redirect Policy
3.3.3.18.1. Captive-Redirect and HTTPS Flows Redirection
3.3.3.19. Configuring ICAP URL Filtering
3.3.3.20. Configuring Web-service URL Classification
3.3.3.21. Configuring Local URL-List Filtering
3.3.3.22. Configuring HTTP Notification
3.3.3.23. Configuring Tethering Detection
3.3.4. Configuring AA Volume Accounting and Statistics
3.3.4.1. Configuring Cflowd Collector
3.3.4.2. Configuring AA Comprehensive, RTP Performance, TCP Performance, and Volume Reporting
3.4. Application Assurance Command Reference
3.4.1. Application Assurance Command Reference
3.4.1.1. Hardware Commands
3.4.1.2. Admin Commands
3.4.1.3. ISA Commands
3.4.1.4. Application Assurance Commands
3.4.1.4.1. AA Commands
3.4.1.4.2. AA Group Commands
3.4.1.5. AA Interface Commands
3.4.1.6. Persistence Commands
3.4.2. Command Descriptions
3.4.2.1. Generic Commands
3.4.2.2. Admin Commands
3.4.2.3. Application Assurance Commands
3.4.2.4. Group Commands
3.4.2.4.1. Transit Subscriber Commands
3.4.2.4.2. Policer Commands
3.4.2.4.3. Policy Commands
3.4.2.4.4. Statistics Commands
3.4.2.4.5. TCP Validation Commands
3.4.2.4.6. Tethering Commands
3.4.2.4.7. Policy Commands
3.4.2.4.8. System Persistence Commands
3.4.2.5. ISA Commands
3.4.2.5.1. Application Assurance Group Commands
3.5. Show, Tools, Clear, and Debug Command Reference
3.5.1. Command Hierarchies
3.5.1.1. Show Commands
3.5.1.2. Tools Commands
3.5.1.3. Clear Commands
3.5.1.4. Debug Commands
3.5.2. Command Descriptions
3.5.2.1. Show Commands
3.5.2.2. Tools Commands
3.5.2.3. Clear Commands
3.5.2.4. Debug Commands
4. IP Tunnels
4.1. IP Tunnels Overview
4.1.1. Tunnel ISAs
4.1.1.1. Public Tunnel SAPs
4.1.1.2. Private Tunnel SAPs
4.1.1.3. IP Interface Configuration
4.1.1.4. GRE and IP-IP Tunnel Configuration
4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.1.1.6. TCP MSS Adjustment
4.1.2. Operational Conditions
4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
4.1.3. QoS Interactions
4.1.4. OAM Interactions
4.1.5. Redundancy
4.1.6. Statistics Collection
4.1.7. Security
4.1.7.1. GRE Tunnel Multicast Support
4.1.7.2. IPv6 over IPv4 GRE Tunnel
4.1.8. IKEv2
4.1.8.1. IKEv2 Traffic Selector and TS-List
4.1.8.2. IKEv2 Fragmentation
4.1.9. SHA2 Support
4.1.10. IPsec Client Lockout
4.1.11. IPsec Tunnel CHILD_SA Rekey
4.1.12. Multiple IKE/ESP Transform Support
4.2. X.509v3 Certificate Overview
4.2.1. SR OS X.509v3 Certificate Support
4.2.2. Local Storage
4.2.3. CA-Profile
4.2.4. CA Chain Computation
4.2.5. Certificate Enrollment
4.2.6. Certificate Revocation Check
4.2.7. Certificate/CRL Expiration Warning
4.2.8. Certificate/CRL/Key Cache
4.2.9. Auto CRL Update
4.2.10. IPsec Client Database
4.2.11. Encryption of Imported Files
4.3. Using Certificates For IPsec Tunnel Authentication
4.3.1. IKEv2 Digital Signature Authentication
4.4. Trust-Anchor Profile
4.5. Cert-Profile
4.6. Certificate Management Protocol Version 2 (CMPv2)
4.7. OCSP
4.8. Video Wholesale Example
4.9. Multi-Chassis IPsec Redundancy Overview
4.9.1. Architecture
4.9.2. MC-IPsec Mastership Protocol (MIMP)
4.9.2.1. MIMP Protocol States
4.9.2.2. Election Logic
4.9.2.3. Protection Status
4.9.2.4. Other Details
4.9.3. Routing
4.9.3.1. Routing in Public Service
4.9.3.2. Routing in Private Services
4.9.3.3. Other Details About Shunting
4.9.4. MC-IPsec Aware VRRP
4.9.5. Synchronization
4.9.5.1. Automatic CHILD_SA Rekey
4.9.6. Responder Only
4.10. IPsec Deployment Requirements
4.11. IKEv2 Remote-Access Tunnel
4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.11.3.1. DHCPv4 Address Assignment
4.11.3.2. DHCPv6 Address Assignment
4.11.3.3. DHCPv4/v6 Usage Notes
4.11.4. IPv6 IPsec Support
4.11.4.1. IPv6 as Payload
4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
4.11.4.5. IPv6 as Encapsulation
4.12. MLDv2 over IPsec
4.12.1. MLDv2 over IPsec – Traffic Selector
4.12.2. MLDv2 over IPsec – Configuration
4.13. Secured Interface
4.14. Configuring IPsec with CLI
4.14.1. Provisioning a Tunnel ISA
4.14.2. Configuring a Tunnel Group
4.14.3. Configuring Router Interfaces for IPsec
4.14.4. Configuring IPsec Parameters
4.14.5. Configuring IPsec in Services
4.14.6. Configuring X.509v3 Certificate Parameters
4.14.7. Configuring MC-IPsec
4.14.7.1. Configuring MIMP
4.14.7.2. Configuring Multi-Chassis Synchronization
4.14.7.3. Configuring Routing for MC-IPsec
4.14.8. Configuring and Using CMPv2
4.14.9. Configuring OCSP
4.14.10. Configuring IKEv2 Remote — Access Tunnel
4.14.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
4.14.12. Configuring Secured Interfaces
4.15. IP Tunnel Command Reference
4.15.1. Command Hierarchies
4.15.1.1. Configuration Commands
4.15.1.1.1. Hardware Commands
4.15.1.1.2. ISA Commands
4.15.1.1.3. IPsec Commands
4.15.1.2. Service Configuration Commands
4.15.1.2.1. IES Commands
4.15.1.2.2. VPRN Commands
4.15.1.2.3. IPsec Mastership Election Commands
4.15.1.2.4. Related Commands
4.15.1.2.5. CMPv2 Commands
4.15.1.2.6. Auto-Update Commands
4.15.1.2.7. Show Commands
4.15.1.2.8. Debug Commands
4.15.1.2.9. Tools Commands
4.15.1.2.10. Clear Commands
4.15.1.2.11. Admin Commands
4.15.2. Command Descriptions
4.15.2.1. Generic Commands
4.15.2.2. Hardware Commands
4.15.2.3. ISA Commands
4.15.2.4. Certificate Profile Commands
4.15.2.5. Client Database Commands
4.15.2.6. Internet Key Exchange (IKE) Commands
4.15.2.7. IPsec Transform Commands
4.15.2.8. IPsec Static Security Association Commands
4.15.2.9. Trust Anchor Profile/TS Commands
4.15.2.10. Tunnel Template Commands
4.15.2.11. Service Configuration Commands
4.15.2.12. Interface SAP Tunnel Commands
4.15.2.12.1. IPsec Gateway Commands
4.15.2.13. RADIUS Policy Commands
4.15.2.14. CMPv2 Commands
4.15.2.15. Auto-Update Command Descriptions
4.15.2.16. IPsec Mastership Election Commands
4.15.2.17. Show Commands
4.15.2.18. Debug Commands
4.15.2.19. Tools Commands
4.15.2.20. Clear Commands
4.15.2.21. Admin Commands
5. L2TPV3 Tunnels
5.1. L2TPv3 Overview
5.2. Control Plane
5.3. Public SAP
5.4. Private SAP
6. Video Services
6.1. Video Services
6.1.1. Video Groups
6.1.2. Video SAP
6.1.3. Video Interface
6.1.4. Multicast Information Policies
6.1.5. Perfect Stream Protection
6.1.6. Perfect Stream Selection
6.1.6.1. Stream Identification
6.1.6.2. Initial Sequence Identification
6.1.6.3. Packet Selection
6.1.6.4. Clock Recovery
6.1.6.5. Playout
6.1.6.6. Loss of Transport
6.1.6.7. Perfect Stream in Relation to FCC/RET
6.1.6.8. Perfect Stream in Relation to VQM
6.1.7. Video Quality Monitoring
6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.2. Retransmission and Fast Channel Change
6.2.1. RET and FCC Overview
6.2.1.1. Retransmission
6.2.1.2. Fast Channel Change (FCC)
6.2.1.2.1. Retransmission Client
6.2.1.2.2. Retransmission Server
6.2.1.2.3. Fast Channel Change Server
6.2.1.2.4. Logging and Accounting for RET and FCC
6.2.1.3. RET and FCC Server Concurrency
6.2.1.3.1. Prerequisites and Restrictions
6.2.2. Separate Timers for FCC and RET
6.2.3. Peak Bandwidth and Sessions per ISA
6.3. Ad Insertion
6.3.1. Local/Zoned Ad Insertion
6.3.1.1. Transport Stream Ad Splicing
6.3.1.2. Ad Zones
6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
6.4. Configuring Video Service Components with CLI
6.4.1. Video Services Overview
6.4.1.1. Configuring an ISA-MS Module
6.4.1.2. Configuring a Video Group
6.4.1.3. Configuring a Video SAP and Video Interface in a Service
6.4.1.4. Basic Multicast Information Policy Configuration
6.4.2. Sample Configurations
6.5. Configuring RET/FCC Video Components with CLI
6.5.1. Configuring RET/FCC Video Features in the CLI
6.5.1.1. Configuring the RET Client
6.5.1.2. Configuring the RET Server
6.5.1.3. Configuring the FCC Server
6.5.1.4. Logging and Accounting Collection for Video Statistics
6.6. Configuring ADI Components with CLI
6.6.1. Configuring ADI in CLI
6.6.1.1. Configuring the RET Client
6.6.1.2. Configuring a Video Group
6.6.1.3. Configuring NTP
6.6.1.4. Configuring Channel Parameters
6.6.1.5. Configuring Service Entities
6.7. Video Services Command Reference
6.7.1. IP-TV Command Hierarchies
6.7.1.1. Hardware Commands
6.7.1.2. Video Group Commands
6.7.1.3. Video Policy Video Commands
6.7.1.4. Bundle and Channel Commands
6.7.1.5. Service Video Interface Commands
6.7.1.5.1. VPLS Commands
6.7.1.5.2. IES Commands
6.7.1.5.3. VPRN Commands
6.7.2. Command Descriptions
6.7.2.1. Generic Commands
6.7.2.2. LNS Group Commands
6.7.2.3. Video Group Commands
6.7.2.4. Multicast Info Policy Commands
6.7.2.5. Video Policy Commands
6.7.2.6. Bundle and Channel Commands
6.7.2.7. Service Video Interface Commands
6.8. Show, Clear, and Debug Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Show Commands
6.8.1.2. Clear Commands
6.8.1.3. Debug Commands
6.8.2. Command Descriptions
6.8.2.1. Show Commands
6.8.2.2. Clear Commands
6.8.2.3. Debug Commands
7. Network Address Translation
7.1. Terminology
7.2. Network Address Translation (NAT) Overview
7.2.1. Principles of NAT
7.2.2. Traffic Load Balancing
7.2.3. Application Compatibility
7.3. Large Scale NAT
7.3.1. Port Range Blocks
7.3.1.1. Reserved Ports and Priority Sessions
7.3.1.2. Preventing Port Block Starvation
7.3.1.2.1. Dynamic Port Block Starvation in LSN
7.3.1.2.2. Dynamic Port Block Reservation
7.3.2. Timeouts
7.3.3. Watermarks
7.4. L2-Aware NAT
7.4.1. L2-Aware NAT Bypass
7.4.1.1. Full ESM Host Bypass
7.4.1.2. Selective L2-Aware NAT Bypass
7.4.1.2.1. On-Line Change of the Selective NAT Bypass
7.4.1.2.2. NAT Bypass Verification
7.4.2. L2-Aware NAT Destination-Based Multiple NAT Policies
7.4.2.1. Logging
7.4.2.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.4.2.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.4.2.2. Static Port Forwards
7.4.2.3. L2-Aware Ping
7.4.2.4. UPnP
7.5. L2-Aware Support for Residential Gateway Types
7.6. One-to-One (1:1) NAT
7.6.1. Static 1:1 NAT
7.6.1.1. Protocol Agnostic Behavior
7.6.1.2. Modification of Parameters in Static 1:1 NAT
7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.6.1.4. NAT-Policy Selection
7.6.1.5. Mapping Timeout
7.6.1.6. Logging
7.6.1.7. Restrictions
7.6.2. ICMP
7.7. Deterministic NAT
7.7.1. Overview
7.7.2. Supported Deterministic NAT Types
7.7.3. Number of Subscribers per Outside IP and per Pool
7.7.4. Referencing a Pool
7.7.5. Outside Pool Configuration
7.7.6. Mapping Rules and the map Command in Deterministic LSN44
7.7.7. Hashing Considerations in Deterministic LSN44
7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.7.8. Sharing of Deterministic NAT Pools
7.7.9. Simultaneous support of dynamic and deterministic NAT
7.7.10. Selecting Traffic for NAT
7.7.11. Inverse Mappings
7.7.11.1. MIB approach
7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
7.7.12. Logging
7.7.13. Deterministic DS-Lite
7.7.13.1. Hashing Considerations in DS-Lite
7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.8. Destination Based NAT (DNAT)
7.8.1. Combination of SNAPT and DNAT
7.8.2. Forwarding Model in DNAT
7.8.3. DNAT Traffic Selection via NAT Classifier
7.8.4. Configuring DNAT
7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.9. LSN – Multiple NAT Policies per Inside Routing Context
7.9.1. Restrictions
7.9.2. Multiple NAT Policies Per Inside Routing Context
7.9.3. Routing Approach for NAT Diversion
7.9.4. Filter-Based Approach
7.9.5. Multiple NAT Policies with DS-Lite and NAT64
7.9.6. Default NAT Policy
7.9.7. Scaling Considerations
7.9.8. Multiple NAT Policies and SPF Configuration Considerations
7.9.8.1. Multiple NAT Policies and Forwarding Considerations
7.9.9. Logging
7.10. NAT and CoA
7.10.1. CoA and NAT Policies
7.10.2. CoA and DNAT
7.10.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.11. Port Control Protocol (PCP)
7.12. Universal Plug and Play Internet Gateway Device Service
7.12.1. Configuring UPnP IGD Service
7.13. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.13.1. PPTP Protocol
7.13.1.1. Supported Control Messages
7.13.1.2. GRE Tunnel
7.13.2. PPTP ALG Operation
7.13.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.13.4. Selection of Call IDs in NAT
7.14. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.15. NAT Logging
7.15.1. Syslog/SNMP/Local-File Logging
7.15.1.1. Filtering LSN Events to System Memory
7.15.1.2. NAT Logging to a Local File
7.15.2. SNMP Trap Logging
7.15.3. NAT Syslog
7.15.4. LSN RADIUS Logging
7.15.4.1. Periodic RADIUS Logging
7.15.4.1.1. Message Pacing
7.15.4.2. RADIUS Logging and L2-Aware NAT
7.15.5. LSN and L2-Aware NAT Flow Logging
7.15.5.1. IPFIX Flow Logging
7.15.5.2. Template Formats
7.15.5.3. Template Format1 and Format2
7.15.5.4. Configuration Example
7.15.5.5. Syslog Flow Logging
7.15.5.5.1. Sequence Numbers
7.15.5.5.2. Timestamp
7.15.5.5.3. Event Aggregation
7.15.5.5.4. Syslog Transmission Rate Limit and Overload Conditions
7.16. DS-Lite and NAT64 Fragmentation
7.16.1. Overview
7.16.2. IPv6 Fragmentation in DS-Lite
7.16.3. NAT64
7.17. DS-Lite Reassembly
7.17.1. Interpreting Fragmentation Statistics
7.18. Enhanced Statistics in NAT — Histogram
7.18.1. Configuration
7.19. NAT Redundancy
7.19.1. NAT Stateless Dual-Homing
7.19.1.1. Configuration Considerations
7.19.1.2. Troubleshooting Commands
7.19.2. Active-Active ISA Redundancy Model
7.19.2.1. Startup Conditions
7.19.2.2. Recovery
7.19.2.3. Adding Additional ISAs in the ISA Group
7.19.3. L2-Aware Bypass
7.19.3.1. Sharing IP Addresses in L2-Aware NAT
7.19.3.2. Recovery
7.19.3.3. Default Bypass During Reboot or MS-ISA Provisioning
7.19.3.4. Logging
7.20. Stateful Inter-Chassis NAT Redundancy
7.20.1. Health Status and Failure Events
7.20.2. Route Advertisements
7.20.3. Flow Synchronization
7.20.3.1. Loss of Synchronization
7.20.3.2. Flow Timeout on the Standby Node
7.20.3.3. Flow Timeout Following the Switchover
7.20.4. Rapid Consecutive Switchovers
7.20.5. ISA-to-ISA Communication
7.20.6. Preemption
7.20.7. Message Delivery Prioritization
7.20.8. Subscriber-Aware NAT
7.20.9. Matching Configuration on Redundant Pair of Nodes
7.20.10. Online Configuration changes
7.20.11. Scenario With Monitoring Ports
7.21. ISA Feature Interactions
7.21.1. MS-ISA Use with Service Mirrors
7.21.2. LNS, Application Assurance and NAT
7.21.3. Subscriber Aware Large Scale NAT44
7.22. Mapping of Address and Port Using Translation (MAP-T)
7.22.1. MAP-T Rules
7.22.2. A+P Mapping Algorithm
7.22.3. Routing Considerations
7.22.4. Forwarding Considerations in the BR
7.22.4.1. IPv6 Addresses
7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
7.22.4.3. Hub-And-Spoke Topology
7.22.4.4. Rule Prefix Overlap
7.22.5. BMR Rules Implementation Example
7.22.6. ICMP
7.22.7. Fragmentation
7.22.7.1. Fragmentation in the Downstream Direction
7.22.7.2. Fragmentation in the Upstream Direction
7.22.7.3. Fragmentation Statistics
7.22.8. Maximum Segment Size (MSS) Adjust
7.22.9. Statistics Collection
7.22.10. Logging
7.22.11. Licensing
7.22.12. Configuration
7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.22.13. Inter-Chassis Redundancy
7.23. Configuring NAT
7.23.1. ISA Redundancy
7.23.2. NAT Layer 2-Aware Configurations
7.23.3. Large Scale NAT Configuration
7.23.4. NAT Configuration Examples
7.24. Configuring VSR-NAT
7.24.1. VSR-NAT Licensing
7.24.2. Statistics Collection For LSN Bindings
7.24.3. Statistics Collection For LSN Bandwidth
7.24.4. VSR-NAT Show Command Examples
7.25. VSR Scaling Profiles on BB-ISA
7.25.1. Scaling Profiles on the VSR
7.25.2. Scale Profile Modification
7.26. NAT scaling profiles on ESA
7.26.1. Scaling Profiles for NAT on ESA
7.26.2. Scale Profile Modification
7.27. Network Address Translation Command Reference
7.27.1. Command Hierarchies
7.27.1.1. ISA Configuration Commands
7.27.1.2. NAT Service Configuration Commands
7.27.1.2.1. NAT Outside Commands
7.27.1.2.2. IPFIX Commands
7.27.1.2.3. UPnP Commands
7.27.1.2.4. ISA RADIUS Policy Commands
7.27.1.2.5. NAT Syslog Commands
7.27.1.2.6. VPRN Commands
7.27.1.3. NAT Subscriber Management Commands
7.27.1.3.1. NAT Subscriber Management BRG Commands
7.27.1.4. NAT Router Configuration Commands
7.27.1.5. NAT DNAT Commands
7.27.1.6. NAT Admin Configuration Commands
7.27.1.7. NAT MAP Domain Configuration Commands
7.27.1.8. TCP MSS Adjustment Commands
7.27.1.9. NAT MAP-T Configuration Commands
7.27.1.10. Redundancy Configuration Commands
7.27.1.11. Residential Firewall Subscriber Management Commands
7.27.1.12. Residential Firewall Domain Commands
7.27.1.13. Residential Firewall Commands
7.27.1.14. Tools Commands
7.27.1.15. Show Commands
7.27.1.16. Clear Commands
7.27.1.17. Tools Commands
7.27.1.18. Filter Commands
7.27.2. Command Descriptions
7.27.2.1. Generic Commands
7.27.2.2. ISA Configuration Commands
7.27.2.3. NAT Configuration Commands
7.27.2.4. NAT Service Configuration Commands
7.27.2.5. NAT Outside Epipe Commands
7.27.2.6. IPFlow Information Export Protocol Commands
7.27.2.7. AAA Policy Commands
7.27.2.8. NAT Syslog Commands
7.27.2.9. NAT Subscriber Management Commands
7.27.2.10. NAT Subscriber Management BRG Commands
7.27.2.11. NAT DNAT Commands
7.27.2.12. NAT MAP-T Commands
7.27.2.13. NAT Filter Commands
7.27.2.14. Redundancy Configuration Commands
7.27.2.15. Residential Firewall Commands
7.27.2.16. NAT Show Commands
7.27.2.17. MAP-T Show Commands
7.27.2.18. NAT Clear Commands
7.27.2.19. MAP-T Clear Commands
7.27.2.20. NAT Tools Commands
8. Residential Firewall
8.1. Residential Firewall Overview
8.1.1. Supported Protocols and Extension Headers
8.1.1.1. Unknown Protocols
8.1.1.2. TCP and UDP
8.1.1.3. ICMPv6
8.1.2. Application Layer Gateway
8.1.3. Additional Filtering Control
8.1.4. TCP MSS Adjustment
8.1.5. Static Port Forwards and DMZ
8.2. Residential Firewall Provisioning
8.2.1. Domains and Addressing
9. TCP MSS Adjustment
9.1. Overview
9.2. TCP MSS Adjustment for ESM Hosts
9.3. TCP MSS Adjustment for NAT Services
9.4. TCC MSS Adjustment Commands
9.4.1. Command Hierarchy
9.4.1.1. TCC MSS Adjustment Command Descriptions
10. L2TP Network Server
10.1. Subscriber agg-rate-limit on LNS
10.2. LNS Reassembly
10.2.1. Overview
10.2.2. Reassembly Function
10.2.3. Load Sharing Between the ISAs
10.2.4. Inter-chassis ISA Redundancy
10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
10.3.1. Terminology
10.3.2. LNS MLPPPoX
10.3.3. MLPPP Encapsulation
10.3.4. MLPPPoX Negotiation
10.3.5. Enabling MLPPPoX
10.3.6. Link Fragmentation and Interleaving (LFI)
10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
10.3.7. LFI Functionality Implemented in LNS
10.3.7.1. Last Mile QoS Awareness in the LNS
10.3.7.2. BB-ISA Processing
10.3.7.3. LNS-LAC Link
10.3.7.4. AN-RG Link
10.3.7.5. Home Link
10.3.7.6. Optimum Fragment Size Calculation by LNS
10.3.7.6.1. Encapsulation Based Fragment Size
10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
10.3.7.6.3. Selection of the Optimum Fragment Length
10.3.8. Upstream Traffic Considerations
10.3.9. Multiple Links MLPPPoX With No Interleaving
10.3.10. MLPPPoX Session Support
10.3.11. Session Load Balancing Across Multiple BB-ISAs
10.3.12. BB-ISA Hashing Considerations
10.3.13. Last Mile Rate and Encapsulation Parameters
10.3.14. Link Failure Detection
10.3.15. CoA Support
10.3.16. Accounting
10.3.17. Filters and Mirroring
10.3.18. PTA Considerations
10.3.19. QoS Considerations
10.3.19.1. Dual-Pass
10.3.19.2. Traffic Prioritization in LFI
10.3.19.3. Shaping Based on the Last Mile Wire Rates
10.3.19.4. Downstream Bandwidth Management on Egress Port
10.3.20. Sub/Sla-Profile Considerations
10.3.21. Example of MLPPPoX Session Setup Flow
10.3.22. Other Considerations
10.4. Configuration Notes
10.5. L2TP Network Server Command Reference
10.5.1. Command Hierarchies
10.5.1.1. ISA Commands
10.5.1.2. MLPPP on LNS Commands
10.5.2. Command Descriptions
10.5.2.1. Generic Commands
10.5.2.2. LNS Commands
10.5.2.3. Network Address Translation (NAT) Commands
10.5.2.4. MLPPP on LNS Commands
11. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. ISA and ESA Configuration Process
2. ISA and ESA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISA Overview
2.4. MS-ISM Overview
2.5. ESA 100G Overview
2.6. Application Assurance Hardware Features
2.6.1. AA System Support
2.6.2. Host IOM Support for AA on ISAs
2.6.3. Host IOM Support for AA on ESAs
2.7. Configuring an ESA with CLI
2.7.1. Provisioning an ESA and ESA-VM
2.8. Extended Services Appliance Command Reference
2.8.1. Command Hierarchies
2.8.1.1. ESA Configuration Commands
2.8.2. Command Descriptions
2.8.2.1. ESA Configuration Commands
2.9. Show and Clear Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.2. Clear Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.2. Clear Commands
3. Application Assurance
3.1. Application Assurance (AA) Overview
3.1.1. Application Assurance: Inline Policy Enforcement
3.1.2. AA Integration in Subscriber Edge Gateways
3.1.3. Fixed Residential Broadband Services
3.1.3.1. Dual-Stack Lite – DS-Lite
3.1.3.2. 6to4 /6RD
3.1.4. Wireless LAN Gateway Broadband Services
3.1.5. Application-Aware Business VPN Services
3.1.6. Mobile Backhaul
3.1.7. Stateful Firewall Service
3.2. Application Assurance System Architecture
3.2.1. AA ISA Resource Configuration
3.2.1.1. AA ISA Groups
3.2.1.1.1. AA Group Partitions
3.2.1.1.2. Bypass Modes
3.2.1.2. Redundancy
3.2.1.2.1. No AA ISA Group Redundancy
3.2.1.2.2. Failure to Fabric
3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
3.2.1.3. ISA Load Balancing
3.2.1.4. Asymmetry Removal
3.2.1.4.1. Asymmetry Removal Overview
3.2.1.4.2. Failure Modes
3.2.1.4.3. AARP Peered Node/Instance Configuration
3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.2.1.4.5. Multi-Chassis Datapath Shunts
3.2.1.5. ISA Overload Detection
3.2.2. AA Packet Processing
3.2.2.1. Divert of Traffic and Subscribers
3.2.2.1.1. Services and AA Subscribers
3.2.2.1.2. Spoke SDPs
3.2.2.1.3. Transit AA Subscribers
3.2.2.1.4. AA Subscriber Application Service Definition
3.2.2.2. Traffic Identification
3.2.2.2.1. Application Assurance Identification Components
3.2.2.2.2. Protocol Signatures
3.2.2.2.3. Custom Protocols
3.2.2.2.4. Protocol Shutdown
3.2.2.2.5. Supported Protocol Signatures
3.2.2.2.6. Application Groups
3.2.2.2.7. Charging Groups
3.2.2.2.8. Applications
3.2.2.2.9. Application Filters
3.2.2.2.10. HTTP
3.2.2.2.11. AA IP Prefix Lists
3.2.2.2.12. Shallow Flow Inspection
3.2.2.2.13. Flow Attributes
3.2.2.3. Statistics and Accounting
3.2.2.3.1. Per-AA Subscriber Special Study
3.2.2.3.2. System Aspects
3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.2.2.3.4. AA Partition Traffic Type Statistics
3.2.2.3.5. Configurable AA Subscriber Statistics Collection
3.2.2.3.6. AA-Performance Record for ISA Load
3.2.2.3.7. AA Partition Traffic Type Statistics
3.2.2.3.8. AA Partition Admit–Deny Statistics
3.2.2.3.9. RADIUS Accounting AA Records
3.2.2.3.10. AA GX Based Usage Monitoring
3.2.2.3.11. Supported AVPs
3.2.2.3.12. Cflowd AA Records
3.2.2.3.13. vRGW Nested Router Detection
3.2.2.4. Application QoS Policy (AQP)
3.2.2.4.1. AQP Match Criteria
3.2.2.4.2. AQP Actions
3.2.2.4.3. Application Assurance Policers
3.2.2.4.4. Application Assurance Dynamic Experience Management
3.2.2.4.5. Application Assurance HTTP Redirect
3.2.2.4.6. Application Assurance HTTPS Policy Redirect
3.2.2.4.7. ICAP - Large Scale Category-based URL Filtering
3.2.2.4.8. Web-service URL Classification
3.2.2.4.9. Local URL-List Filtering
3.2.2.4.10. HTTP Header Enrichment
3.2.2.4.11. HTTP In Browser Notification
3.2.2.5. Application Assurance Firewall
3.2.2.5.1. Denial of Service (DoS) Protection
3.2.2.5.2. TCP Validation
3.2.2.5.3. Policy Partitioned AA FW
3.2.2.5.4. Configuring AA FW
3.2.2.5.5. AA FW Logging
3.2.2.5.6. SeGW Firewall Protection
3.2.2.5.7. GTP Backhaul Roaming Firewall Protection
3.2.3. Service Monitoring and Debugging
3.2.4. CPU Utilization
3.2.5. CLI Batch: Begin, Commit and Abort Commands
3.3. Configuring Application Assurance with CLI
3.3.1. Provisioning AA ISA MDA
3.3.2. Configuring an AA ISA Group
3.3.2.1. Configuring Watermark Parameters
3.3.3. Configuring a Group Policy
3.3.3.1. Beginning and Committing a Policy Configuration
3.3.3.2. Aborting a Policy Configuration
3.3.3.3. Configuring an IP Prefix List
3.3.3.4. Configuring AA Session Filters
3.3.3.5. Configuring an Application Group
3.3.3.6. Configuring an Application
3.3.3.7. Configuring an Application Filter
3.3.3.8. Configuring an Application Profile
3.3.3.9. Configuring Suppressible App-Profile with SRRP
3.3.3.10. Configuring Application Service Options
3.3.3.11. Configuring a Policer
3.3.3.12. Configuring an Application QoS Policy
3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
3.3.3.14. Configuring an HTTP Error Redirect
3.3.3.15. Configuring HTTP Header Enrichment
3.3.3.16. Configuring an HTTP Redirect Policy
3.3.3.17. Configuring an HTTPS Policy Redirect
3.3.3.18. Configuring a Captive Redirect HTTP Redirect Policy
3.3.3.18.1. Captive-Redirect and HTTPS Flows Redirection
3.3.3.19. Configuring ICAP URL Filtering
3.3.3.20. Configuring Web-service URL Classification
3.3.3.21. Configuring Local URL-List Filtering
3.3.3.22. Configuring HTTP Notification
3.3.3.23. Configuring Tethering Detection
3.3.4. Configuring AA Volume Accounting and Statistics
3.3.4.1. Configuring Cflowd Collector
3.3.4.2. Configuring AA Comprehensive, RTP Performance, TCP Performance, and Volume Reporting
3.4. Application Assurance Command Reference
3.4.1. Application Assurance Command Reference
3.4.1.1. Hardware Commands
3.4.1.2. Admin Commands
3.4.1.3. ISA Commands
3.4.1.4. Application Assurance Commands
3.4.1.4.1. AA Commands
3.4.1.4.2. AA Group Commands
3.4.1.5. AA Interface Commands
3.4.1.6. Persistence Commands
3.4.2. Command Descriptions
3.4.2.1. Generic Commands
3.4.2.2. Admin Commands
3.4.2.3. Application Assurance Commands
3.4.2.4. Group Commands
3.4.2.4.1. Transit Subscriber Commands
3.4.2.4.2. Policer Commands
3.4.2.4.3. Policy Commands
3.4.2.4.4. Statistics Commands
3.4.2.4.5. TCP Validation Commands
3.4.2.4.6. Tethering Commands
3.4.2.4.7. Policy Commands
3.4.2.4.8. System Persistence Commands
3.4.2.5. ISA Commands
3.4.2.5.1. Application Assurance Group Commands
3.5. Show, Tools, Clear, and Debug Command Reference
3.5.1. Command Hierarchies
3.5.1.1. Show Commands
3.5.1.2. Tools Commands
3.5.1.3. Clear Commands
3.5.1.4. Debug Commands
3.5.2. Command Descriptions
3.5.2.1. Show Commands
3.5.2.2. Tools Commands
3.5.2.3. Clear Commands
3.5.2.4. Debug Commands
4. IP Tunnels
4.1. IP Tunnels Overview
4.1.1. Tunnel ISAs
4.1.1.1. Public Tunnel SAPs
4.1.1.2. Private Tunnel SAPs
4.1.1.3. IP Interface Configuration
4.1.1.4. GRE and IP-IP Tunnel Configuration
4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.1.1.6. TCP MSS Adjustment
4.1.2. Operational Conditions
4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
4.1.3. QoS Interactions
4.1.4. OAM Interactions
4.1.5. Redundancy
4.1.6. Statistics Collection
4.1.7. Security
4.1.7.1. GRE Tunnel Multicast Support
4.1.7.2. IPv6 over IPv4 GRE Tunnel
4.1.8. IKEv2
4.1.8.1. IKEv2 Traffic Selector and TS-List
4.1.8.2. IKEv2 Fragmentation
4.1.9. SHA2 Support
4.1.10. IPsec Client Lockout
4.1.11. IPsec Tunnel CHILD_SA Rekey
4.1.12. Multiple IKE/ESP Transform Support
4.2. X.509v3 Certificate Overview
4.2.1. SR OS X.509v3 Certificate Support
4.2.2. Local Storage
4.2.3. CA-Profile
4.2.4. CA Chain Computation
4.2.5. Certificate Enrollment
4.2.6. Certificate Revocation Check
4.2.7. Certificate/CRL Expiration Warning
4.2.8. Certificate/CRL/Key Cache
4.2.9. Auto CRL Update
4.2.10. IPsec Client Database
4.2.11. Encryption of Imported Files
4.3. Using Certificates For IPsec Tunnel Authentication
4.3.1. IKEv2 Digital Signature Authentication
4.4. Trust-Anchor Profile
4.5. Cert-Profile
4.6. Certificate Management Protocol Version 2 (CMPv2)
4.7. OCSP
4.8. Video Wholesale Example
4.9. Multi-Chassis IPsec Redundancy Overview
4.9.1. Architecture
4.9.2. MC-IPsec Mastership Protocol (MIMP)
4.9.2.1. MIMP Protocol States
4.9.2.2. Election Logic
4.9.2.3. Protection Status
4.9.2.4. Other Details
4.9.3. Routing
4.9.3.1. Routing in Public Service
4.9.3.2. Routing in Private Services
4.9.3.3. Other Details About Shunting
4.9.4. MC-IPsec Aware VRRP
4.9.5. Synchronization
4.9.5.1. Automatic CHILD_SA Rekey
4.9.6. Responder Only
4.10. IPsec Deployment Requirements
4.11. IKEv2 Remote-Access Tunnel
4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.11.3.1. DHCPv4 Address Assignment
4.11.3.2. DHCPv6 Address Assignment
4.11.3.3. DHCPv4/v6 Usage Notes
4.11.4. IPv6 IPsec Support
4.11.4.1. IPv6 as Payload
4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
4.11.4.5. IPv6 as Encapsulation
4.12. MLDv2 over IPsec
4.12.1. MLDv2 over IPsec – Traffic Selector
4.12.2. MLDv2 over IPsec – Configuration
4.13. Secured Interface
4.14. Configuring IPsec with CLI
4.14.1. Provisioning a Tunnel ISA
4.14.2. Configuring a Tunnel Group
4.14.3. Configuring Router Interfaces for IPsec
4.14.4. Configuring IPsec Parameters
4.14.5. Configuring IPsec in Services
4.14.6. Configuring X.509v3 Certificate Parameters
4.14.7. Configuring MC-IPsec
4.14.7.1. Configuring MIMP
4.14.7.2. Configuring Multi-Chassis Synchronization
4.14.7.3. Configuring Routing for MC-IPsec
4.14.8. Configuring and Using CMPv2
4.14.9. Configuring OCSP
4.14.10. Configuring IKEv2 Remote — Access Tunnel
4.14.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
4.14.12. Configuring Secured Interfaces
4.15. IP Tunnel Command Reference
4.15.1. Command Hierarchies
4.15.1.1. Configuration Commands
4.15.1.1.1. Hardware Commands
4.15.1.1.2. ISA Commands
4.15.1.1.3. IPsec Commands
4.15.1.2. Service Configuration Commands
4.15.1.2.1. IES Commands
4.15.1.2.2. VPRN Commands
4.15.1.2.3. IPsec Mastership Election Commands
4.15.1.2.4. Related Commands
4.15.1.2.5. CMPv2 Commands
4.15.1.2.6. Auto-Update Commands
4.15.1.2.7. Show Commands
4.15.1.2.8. Debug Commands
4.15.1.2.9. Tools Commands
4.15.1.2.10. Clear Commands
4.15.1.2.11. Admin Commands
4.15.2. Command Descriptions
4.15.2.1. Generic Commands
4.15.2.2. Hardware Commands
4.15.2.3. ISA Commands
4.15.2.4. Certificate Profile Commands
4.15.2.5. Client Database Commands
4.15.2.6. Internet Key Exchange (IKE) Commands
4.15.2.7. IPsec Transform Commands
4.15.2.8. IPsec Static Security Association Commands
4.15.2.9. Trust Anchor Profile/TS Commands
4.15.2.10. Tunnel Template Commands
4.15.2.11. Service Configuration Commands
4.15.2.12. Interface SAP Tunnel Commands
4.15.2.12.1. IPsec Gateway Commands
4.15.2.13. RADIUS Policy Commands
4.15.2.14. CMPv2 Commands
4.15.2.15. Auto-Update Command Descriptions
4.15.2.16. IPsec Mastership Election Commands
4.15.2.17. Show Commands
4.15.2.18. Debug Commands
4.15.2.19. Tools Commands
4.15.2.20. Clear Commands
4.15.2.21. Admin Commands
5. L2TPV3 Tunnels
5.1. L2TPv3 Overview
5.2. Control Plane
5.3. Public SAP
5.4. Private SAP
6. Video Services
6.1. Video Services
6.1.1. Video Groups
6.1.2. Video SAP
6.1.3. Video Interface
6.1.4. Multicast Information Policies
6.1.5. Perfect Stream Protection
6.1.6. Perfect Stream Selection
6.1.6.1. Stream Identification
6.1.6.2. Initial Sequence Identification
6.1.6.3. Packet Selection
6.1.6.4. Clock Recovery
6.1.6.5. Playout
6.1.6.6. Loss of Transport
6.1.6.7. Perfect Stream in Relation to FCC/RET
6.1.6.8. Perfect Stream in Relation to VQM
6.1.7. Video Quality Monitoring
6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.2. Retransmission and Fast Channel Change
6.2.1. RET and FCC Overview
6.2.1.1. Retransmission
6.2.1.2. Fast Channel Change (FCC)
6.2.1.2.1. Retransmission Client
6.2.1.2.2. Retransmission Server
6.2.1.2.3. Fast Channel Change Server
6.2.1.2.4. Logging and Accounting for RET and FCC
6.2.1.3. RET and FCC Server Concurrency
6.2.1.3.1. Prerequisites and Restrictions
6.2.2. Separate Timers for FCC and RET
6.2.3. Peak Bandwidth and Sessions per ISA
6.3. Ad Insertion
6.3.1. Local/Zoned Ad Insertion
6.3.1.1. Transport Stream Ad Splicing
6.3.1.2. Ad Zones
6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
6.4. Configuring Video Service Components with CLI
6.4.1. Video Services Overview
6.4.1.1. Configuring an ISA-MS Module
6.4.1.2. Configuring a Video Group
6.4.1.3. Configuring a Video SAP and Video Interface in a Service
6.4.1.4. Basic Multicast Information Policy Configuration
6.4.2. Sample Configurations
6.5. Configuring RET/FCC Video Components with CLI
6.5.1. Configuring RET/FCC Video Features in the CLI
6.5.1.1. Configuring the RET Client
6.5.1.2. Configuring the RET Server
6.5.1.3. Configuring the FCC Server
6.5.1.4. Logging and Accounting Collection for Video Statistics
6.6. Configuring ADI Components with CLI
6.6.1. Configuring ADI in CLI
6.6.1.1. Configuring the RET Client
6.6.1.2. Configuring a Video Group
6.6.1.3. Configuring NTP
6.6.1.4. Configuring Channel Parameters
6.6.1.5. Configuring Service Entities
6.7. Video Services Command Reference
6.7.1. IP-TV Command Hierarchies
6.7.1.1. Hardware Commands
6.7.1.2. Video Group Commands
6.7.1.3. Video Policy Video Commands
6.7.1.4. Bundle and Channel Commands
6.7.1.5. Service Video Interface Commands
6.7.1.5.1. VPLS Commands
6.7.1.5.2. IES Commands
6.7.1.5.3. VPRN Commands
6.7.2. Command Descriptions
6.7.2.1. Generic Commands
6.7.2.2. LNS Group Commands
6.7.2.3. Video Group Commands
6.7.2.4. Multicast Info Policy Commands
6.7.2.5. Video Policy Commands
6.7.2.6. Bundle and Channel Commands
6.7.2.7. Service Video Interface Commands
6.8. Show, Clear, and Debug Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Show Commands
6.8.1.2. Clear Commands
6.8.1.3. Debug Commands
6.8.2. Command Descriptions
6.8.2.1. Show Commands
6.8.2.2. Clear Commands
6.8.2.3. Debug Commands
7. Network Address Translation
7.1. Terminology
7.2. Network Address Translation (NAT) Overview
7.2.1. Principles of NAT
7.2.2. Traffic Load Balancing
7.2.3. Application Compatibility
7.3. Large Scale NAT
7.3.1. Port Range Blocks
7.3.1.1. Reserved Ports and Priority Sessions
7.3.1.2. Preventing Port Block Starvation
7.3.1.2.1. Dynamic Port Block Starvation in LSN
7.3.1.2.2. Dynamic Port Block Reservation
7.3.2. Timeouts
7.3.3. Watermarks
7.4. L2-Aware NAT
7.4.1. L2-Aware NAT Bypass
7.4.1.1. Full ESM Host Bypass
7.4.1.2. Selective L2-Aware NAT Bypass
7.4.1.2.1. On-Line Change of the Selective NAT Bypass
7.4.1.2.2. NAT Bypass Verification
7.4.2. L2-Aware NAT Destination-Based Multiple NAT Policies
7.4.2.1. Logging
7.4.2.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.4.2.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.4.2.2. Static Port Forwards
7.4.2.3. L2-Aware Ping
7.4.2.4. UPnP
7.5. L2-Aware Support for Residential Gateway Types
7.6. One-to-One (1:1) NAT
7.6.1. Static 1:1 NAT
7.6.1.1. Protocol Agnostic Behavior
7.6.1.2. Modification of Parameters in Static 1:1 NAT
7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.6.1.4. NAT-Policy Selection
7.6.1.5. Mapping Timeout
7.6.1.6. Logging
7.6.1.7. Restrictions
7.6.2. ICMP
7.7. Deterministic NAT
7.7.1. Overview
7.7.2. Supported Deterministic NAT Types
7.7.3. Number of Subscribers per Outside IP and per Pool
7.7.4. Referencing a Pool
7.7.5. Outside Pool Configuration
7.7.6. Mapping Rules and the map Command in Deterministic LSN44
7.7.7. Hashing Considerations in Deterministic LSN44
7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.7.8. Sharing of Deterministic NAT Pools
7.7.9. Simultaneous support of dynamic and deterministic NAT
7.7.10. Selecting Traffic for NAT
7.7.11. Inverse Mappings
7.7.11.1. MIB approach
7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
7.7.12. Logging
7.7.13. Deterministic DS-Lite
7.7.13.1. Hashing Considerations in DS-Lite
7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.8. Destination Based NAT (DNAT)
7.8.1. Combination of SNAPT and DNAT
7.8.2. Forwarding Model in DNAT
7.8.3. DNAT Traffic Selection via NAT Classifier
7.8.4. Configuring DNAT
7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.9. LSN – Multiple NAT Policies per Inside Routing Context
7.9.1. Restrictions
7.9.2. Multiple NAT Policies Per Inside Routing Context
7.9.3. Routing Approach for NAT Diversion
7.9.4. Filter-Based Approach
7.9.5. Multiple NAT Policies with DS-Lite and NAT64
7.9.6. Default NAT Policy
7.9.7. Scaling Considerations
7.9.8. Multiple NAT Policies and SPF Configuration Considerations
7.9.8.1. Multiple NAT Policies and Forwarding Considerations
7.9.9. Logging
7.10. NAT and CoA
7.10.1. CoA and NAT Policies
7.10.2. CoA and DNAT
7.10.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.11. Port Control Protocol (PCP)
7.12. Universal Plug and Play Internet Gateway Device Service
7.12.1. Configuring UPnP IGD Service
7.13. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.13.1. PPTP Protocol
7.13.1.1. Supported Control Messages
7.13.1.2. GRE Tunnel
7.13.2. PPTP ALG Operation
7.13.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.13.4. Selection of Call IDs in NAT
7.14. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.15. NAT Logging
7.15.1. Syslog/SNMP/Local-File Logging
7.15.1.1. Filtering LSN Events to System Memory
7.15.1.2. NAT Logging to a Local File
7.15.2. SNMP Trap Logging
7.15.3. NAT Syslog
7.15.4. LSN RADIUS Logging
7.15.4.1. Periodic RADIUS Logging
7.15.4.1.1. Message Pacing
7.15.4.2. RADIUS Logging and L2-Aware NAT
7.15.5. LSN and L2-Aware NAT Flow Logging
7.15.5.1. IPFIX Flow Logging
7.15.5.2. Template Formats
7.15.5.3. Template Format1 and Format2
7.15.5.4. Configuration Example
7.15.5.5. Syslog Flow Logging
7.15.5.5.1. Sequence Numbers
7.15.5.5.2. Timestamp
7.15.5.5.3. Event Aggregation
7.15.5.5.4. Syslog Transmission Rate Limit and Overload Conditions
7.16. DS-Lite and NAT64 Fragmentation
7.16.1. Overview
7.16.2. IPv6 Fragmentation in DS-Lite
7.16.3. NAT64
7.17. DS-Lite Reassembly
7.17.1. Interpreting Fragmentation Statistics
7.18. Enhanced Statistics in NAT — Histogram
7.18.1. Configuration
7.19. NAT Redundancy
7.19.1. NAT Stateless Dual-Homing
7.19.1.1. Configuration Considerations
7.19.1.2. Troubleshooting Commands
7.19.2. Active-Active ISA Redundancy Model
7.19.2.1. Startup Conditions
7.19.2.2. Recovery
7.19.2.3. Adding Additional ISAs in the ISA Group
7.19.3. L2-Aware Bypass
7.19.3.1. Sharing IP Addresses in L2-Aware NAT
7.19.3.2. Recovery
7.19.3.3. Default Bypass During Reboot or MS-ISA Provisioning
7.19.3.4. Logging
7.20. Stateful Inter-Chassis NAT Redundancy
7.20.1. Health Status and Failure Events
7.20.2. Route Advertisements
7.20.3. Flow Synchronization
7.20.3.1. Loss of Synchronization
7.20.3.2. Flow Timeout on the Standby Node
7.20.3.3. Flow Timeout Following the Switchover
7.20.4. Rapid Consecutive Switchovers
7.20.5. ISA-to-ISA Communication
7.20.6. Preemption
7.20.7. Message Delivery Prioritization
7.20.8. Subscriber-Aware NAT
7.20.9. Matching Configuration on Redundant Pair of Nodes
7.20.10. Online Configuration changes
7.20.11. Scenario With Monitoring Ports
7.21. ISA Feature Interactions
7.21.1. MS-ISA Use with Service Mirrors
7.21.2. LNS, Application Assurance and NAT
7.21.3. Subscriber Aware Large Scale NAT44
7.22. Mapping of Address and Port Using Translation (MAP-T)
7.22.1. MAP-T Rules
7.22.2. A+P Mapping Algorithm
7.22.3. Routing Considerations
7.22.4. Forwarding Considerations in the BR
7.22.4.1. IPv6 Addresses
7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
7.22.4.3. Hub-And-Spoke Topology
7.22.4.4. Rule Prefix Overlap
7.22.5. BMR Rules Implementation Example
7.22.6. ICMP
7.22.7. Fragmentation
7.22.7.1. Fragmentation in the Downstream Direction
7.22.7.2. Fragmentation in the Upstream Direction
7.22.7.3. Fragmentation Statistics
7.22.8. Maximum Segment Size (MSS) Adjust
7.22.9. Statistics Collection
7.22.10. Logging
7.22.11. Licensing
7.22.12. Configuration
7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.22.13. Inter-Chassis Redundancy
7.23. Configuring NAT
7.23.1. ISA Redundancy
7.23.2. NAT Layer 2-Aware Configurations
7.23.3. Large Scale NAT Configuration
7.23.4. NAT Configuration Examples
7.24. Configuring VSR-NAT
7.24.1. VSR-NAT Licensing
7.24.2. Statistics Collection For LSN Bindings
7.24.3. Statistics Collection For LSN Bandwidth
7.24.4. VSR-NAT Show Command Examples
7.25. VSR Scaling Profiles on BB-ISA
7.25.1. Scaling Profiles on the VSR
7.25.2. Scale Profile Modification
7.26. NAT scaling profiles on ESA
7.26.1. Scaling Profiles for NAT on ESA
7.26.2. Scale Profile Modification
7.27. Network Address Translation Command Reference
7.27.1. Command Hierarchies
7.27.1.1. ISA Configuration Commands
7.27.1.2. NAT Service Configuration Commands
7.27.1.2.1. NAT Outside Commands
7.27.1.2.2. IPFIX Commands
7.27.1.2.3. UPnP Commands
7.27.1.2.4. ISA RADIUS Policy Commands
7.27.1.2.5. NAT Syslog Commands
7.27.1.2.6. VPRN Commands
7.27.1.3. NAT Subscriber Management Commands
7.27.1.3.1. NAT Subscriber Management BRG Commands
7.27.1.4. NAT Router Configuration Commands
7.27.1.5. NAT DNAT Commands
7.27.1.6. NAT Admin Configuration Commands
7.27.1.7. NAT MAP Domain Configuration Commands
7.27.1.8. TCP MSS Adjustment Commands
7.27.1.9. NAT MAP-T Configuration Commands
7.27.1.10. Redundancy Configuration Commands
7.27.1.11. Residential Firewall Subscriber Management Commands
7.27.1.12. Residential Firewall Domain Commands
7.27.1.13. Residential Firewall Commands
7.27.1.14. Tools Commands
7.27.1.15. Show Commands
7.27.1.16. Clear Commands
7.27.1.17. Tools Commands
7.27.1.18. Filter Commands
7.27.2. Command Descriptions
7.27.2.1. Generic Commands
7.27.2.2. ISA Configuration Commands
7.27.2.3. NAT Configuration Commands
7.27.2.4. NAT Service Configuration Commands
7.27.2.5. NAT Outside Epipe Commands
7.27.2.6. IPFlow Information Export Protocol Commands
7.27.2.7. AAA Policy Commands
7.27.2.8. NAT Syslog Commands
7.27.2.9. NAT Subscriber Management Commands
7.27.2.10. NAT Subscriber Management BRG Commands
7.27.2.11. NAT DNAT Commands
7.27.2.12. NAT MAP-T Commands
7.27.2.13. NAT Filter Commands
7.27.2.14. Redundancy Configuration Commands
7.27.2.15. Residential Firewall Commands
7.27.2.16. NAT Show Commands
7.27.2.17. MAP-T Show Commands
7.27.2.18. NAT Clear Commands
7.27.2.19. MAP-T Clear Commands
7.27.2.20. NAT Tools Commands
8. Residential Firewall
8.1. Residential Firewall Overview
8.1.1. Supported Protocols and Extension Headers
8.1.1.1. Unknown Protocols
8.1.1.2. TCP and UDP
8.1.1.3. ICMPv6
8.1.2. Application Layer Gateway
8.1.3. Additional Filtering Control
8.1.4. TCP MSS Adjustment
8.1.5. Static Port Forwards and DMZ
8.2. Residential Firewall Provisioning
8.2.1. Domains and Addressing
9. TCP MSS Adjustment
9.1. Overview
9.2. TCP MSS Adjustment for ESM Hosts
9.3. TCP MSS Adjustment for NAT Services
9.4. TCC MSS Adjustment Commands
9.4.1. Command Hierarchy
9.4.1.1. TCC MSS Adjustment Command Descriptions
10. L2TP Network Server
10.1. Subscriber agg-rate-limit on LNS
10.2. LNS Reassembly
10.2.1. Overview
10.2.2. Reassembly Function
10.2.3. Load Sharing Between the ISAs
10.2.4. Inter-chassis ISA Redundancy
10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
10.3.1. Terminology
10.3.2. LNS MLPPPoX
10.3.3. MLPPP Encapsulation
10.3.4. MLPPPoX Negotiation
10.3.5. Enabling MLPPPoX
10.3.6. Link Fragmentation and Interleaving (LFI)
10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
10.3.7. LFI Functionality Implemented in LNS
10.3.7.1. Last Mile QoS Awareness in the LNS
10.3.7.2. BB-ISA Processing
10.3.7.3. LNS-LAC Link
10.3.7.4. AN-RG Link
10.3.7.5. Home Link
10.3.7.6. Optimum Fragment Size Calculation by LNS
10.3.7.6.1. Encapsulation Based Fragment Size
10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
10.3.7.6.3. Selection of the Optimum Fragment Length
10.3.8. Upstream Traffic Considerations
10.3.9. Multiple Links MLPPPoX With No Interleaving
10.3.10. MLPPPoX Session Support
10.3.11. Session Load Balancing Across Multiple BB-ISAs
10.3.12. BB-ISA Hashing Considerations
10.3.13. Last Mile Rate and Encapsulation Parameters
10.3.14. Link Failure Detection
10.3.15. CoA Support
10.3.16. Accounting
10.3.17. Filters and Mirroring
10.3.18. PTA Considerations
10.3.19. QoS Considerations
10.3.19.1. Dual-Pass
10.3.19.2. Traffic Prioritization in LFI
10.3.19.3. Shaping Based on the Last Mile Wire Rates
10.3.19.4. Downstream Bandwidth Management on Egress Port
10.3.20. Sub/Sla-Profile Considerations
10.3.21. Example of MLPPPoX Session Setup Flow
10.3.22. Other Considerations
10.4. Configuration Notes
10.5. L2TP Network Server Command Reference
10.5.1. Command Hierarchies
10.5.1.1. ISA Commands
10.5.1.2. MLPPP on LNS Commands
10.5.2. Command Descriptions
10.5.2.1. Generic Commands
10.5.2.2. LNS Commands
10.5.2.3. Network Address Translation (NAT) Commands
10.5.2.4. MLPPP on LNS Commands
11. Standards and Protocol Support
Customer Document and Product Support
OAM and Diagnostics Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. Service Mirroring
2.2. Mirror Implementation
2.2.1. Overview
2.2.2. Mirror Source
2.2.2.1. Types and Sources
2.2.2.2. Mirror Source Priority
2.2.3. Mirror Destination
2.2.3.1. General Local and Remote Mirroring
2.2.3.2. Mirror Destination Type IP-Only
2.2.3.3. Mirror Destination Type PPP with Port-ID Insertion
2.2.3.4. Layer 3 Encapsulation
2.2.3.5. PCAP Packet Capture
2.2.3.6. Mirrored Traffic Transport using MPLS-TP SDPs
2.2.3.7. Slicing and Sampling
2.2.4. Mirroring Performance
2.2.5. Mirroring Configuration
2.3. Lawful Intercept
2.3.1. LI Activation Through RADIUS
2.3.2. Routable Lawful Intercept Encapsulation
2.3.3. Lawful Intercept Management Interfaces
2.3.3.1. LI Management using the Classic CLI Engine
2.3.3.2. LI Management using the MD-CLI Engine
2.3.3.3. Lawful Intercept in NETCONF
2.3.3.4. CLI Configuration Mode Migration
2.3.3.4.1. Configuration Mode Migration Check List
2.3.4. Configuring Lawful Intercept in MD-CLI
2.4. Pseudowire Redundant Mirror Services
2.4.1. Redundant Mirror Source Notes
2.5. Lawful Intercept and NAT
2.5.1. Carrier Grade NAT
2.5.2. L2-Aware NAT
2.6. Configuration Process Overview
2.7. Configuration Notes
2.8. Configuring Service Mirroring with CLI
2.8.1. Mirror Configuration Overview
2.8.1.1. Defining Mirrored Traffic
2.8.2. Lawful Intercept Configuration Overview
2.8.2.1. Saving LI Data
2.8.2.2. Regulating LI Access
2.8.2.2.1. LI User Access
2.8.2.2.2. LI Source Configuration
2.8.2.3. Configurable Filter Lock for Lawful Intercept
2.8.2.4. LI MAC Filter Configuration
2.8.2.5. LI Logging
2.8.3. Basic Mirroring Configuration
2.8.3.1. Mirror Classification Rules
2.8.3.1.1. Port
2.8.3.1.2. SAP
2.8.3.1.3. MAC Filter
2.8.3.1.4. IP Filter
2.8.3.1.5. Ingress Label
2.8.3.1.6. Subscriber
2.8.4. Common Configuration Tasks
2.8.4.1. Configuring a Local Mirror Service
2.8.4.2. Configuring SDPs for Mirrors and LI
2.8.4.3. Configuring a Remote Mirror Service
2.8.4.4. Configuring an ATM Mirror Service
2.8.4.5. Configuring Lawful Intercept Parameters
2.8.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
2.9. Service Management Tasks
2.9.1. Modifying a Local Mirrored Service
2.9.2. Deleting a Local Mirrored Service
2.9.3. Modifying a Remote Mirrored Service
2.9.4. Deleting a Remote Mirrored Service
2.10. Mirror Service Configuration Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Mirror Configuration Commands
2.10.1.2. IP Mirror Interface Commands
2.10.1.3. Lawful Intercept Commands
2.10.2. Command Descriptions
2.10.2.1. Generic Commands
2.10.2.2. Mirror Destination Configuration Commands
2.10.2.3. IP Mirror Interface Commands
2.10.2.4. Lawful Intercept Commands
2.10.2.4.1. Other LI Configuration Commands
2.11. Mirror Service Show and Debug Command Reference
2.11.1. Command Hierarchies
2.11.1.1. Show Commands
2.11.1.2. Clear Commands
2.11.1.3. Debug Commands
2.11.2. Command Descriptions
2.11.2.1. Show Commands
2.11.2.2. Clear Commands
2.11.2.3. Debug Commands
3. OAM, SAA, and OAM-PM
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.3. ECMP Considerations
3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.1.5. Downstream Detailed Mapping (DDMAP) TLV
3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.6.1. Responder Node Procedures
3.1.6.2. Sender Node Procedures
3.1.7. MPLS OAM Support in Segment Routing
3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
3.1.7.3. Operation on SR-TE LSP
3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
3.1.8. MPLS OAM Support in IPv4 or IPv6 SR Policies
3.1.8.1. LSP-Ping and LSP-Trace Operation
3.1.8.2. ICMP-Tunneling Operation
3.1.9. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.1.10. LDP ECMP Tree Building
3.1.11. Periodic Path Exercising
3.1.12. LSP Ping for RSVP P2MP LSP (P2MP)
3.1.13. LSP Trace for RSVP P2MP LSP
3.1.13.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.14. Tunneling of ICMP Reply Packets over MPLS LSP
3.1.15. QoS Handling of Tunneled ICMP Reply Packets
3.1.16. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.1.17. SDP Diagnostics
3.1.18. SDP Ping
3.1.19. SDP MTU Path Discovery
3.1.20. Service Diagnostics
3.1.21. VPLS MAC Diagnostics
3.1.22. MAC Ping
3.1.23. MAC Trace
3.1.24. CPE Ping
3.1.25. CPE Ping for PBB Epipe
3.1.25.1. Hardware Support
3.1.26. MAC Populate
3.1.27. MAC Purge
3.1.28. VLL Diagnostics
3.1.29. VCCV Ping
3.1.29.1. VCCV-Ping Application
3.1.29.2. VCCV Ping in a Multi-Segment Pseudowire
3.1.30. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.30.1. VCCV for Static Pseudowire Segments
3.1.30.2. Detailed VCCV-Trace Operation
3.1.30.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.30.3.1. Sending a VCCV Echo Request
3.1.30.3.2. Receiving an VCCV Echo Request
3.1.30.3.3. Receiving an VCCV Echo Reply
3.1.31. IGMP Snooping Diagnostics
3.1.32. MFIB Ping
3.1.33. ATM Diagnostics
3.1.34. MPLS-TP On-Demand OAM Commands
3.1.35. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.35.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.1.36. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.37. VXLAN Ping Supporting EVPN for VXLAN
3.1.38. Show Commands
3.1.39. BFD
3.1.40. MPLS Performance Monitoring (MPLS PM)
3.1.40.1. Configuring MPLS PM
3.1.40.1.1. Accounting Policy Configuration
3.1.40.1.2. Enabling MPLS DM
3.1.40.1.3. RSVP LSP Configuration
3.1.40.1.4. RSVP-Auto LSP Configuration Components
3.1.40.1.5. MPLS-TP LSP Configuration
3.1.40.1.6. MPLS OAM-PM Configuration
3.1.41. BIER OAM
3.1.41.1. ECMP and BIER OAM
3.1.41.2. Outbound Time
3.1.41.3. Negative Outbound Time
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. MPLS Performance Monitoring (MPLS PM)
3.4. Ethernet Connectivity Fault Management (ETH-CFM)
3.4.1. ETH-CFM Building Blocks
3.4.2. Loopback
3.4.3. Loopback Multicast
3.4.4. Linktrace
3.4.5. Continuity Check (CC)
3.4.6. CC Remote Peer Auto-Discovery
3.4.7. ETH-CFM Grace Overview
3.4.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
3.4.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
3.4.8. CCM Hold Timers
3.4.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
3.4.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
3.4.11. ITU-T Y.1731 Test (ETH-TST)
3.4.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
3.4.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
3.4.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
3.4.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
3.4.15.1. ETH-LMM Single SAP Counter
3.4.15.2. ETH-LMM Per Forwarding Class Counter
3.4.15.3. Interaction Between Single and Per FC Counters
3.4.16. ETH-CFM Destination Options
3.4.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
3.5. ETH-CFM Statistics
3.6. ETH-CFM Packet Debug
3.7. ETH-CFM CoS Considerations
3.8. OAM Mapping
3.8.1. CFM Connectivity Fault Conditions
3.8.2. CFM Fault Propagation Methods
3.8.3. Epipe Services
3.8.4. CFM Detected Fault
3.8.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.4.2. Service Down
3.8.4.3. Interaction with Pseudowire Redundancy
3.8.5. Ipipe Services
3.8.5.1. CFM Detected Fault
3.8.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
3.8.5.3. Service Administratively Shutdown
3.8.5.4. Interaction with Pseudowire Redundancy
3.8.6. VPLS Service
3.8.6.1. CFM Detected Fault
3.8.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.6.3. Service Down
3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.8.7. IES and VPRN Services
3.8.8. Pseudowire Switching
3.8.9. LLF and CFM Fault Propagation
3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.9. Service Assurance Agent (SAA)
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Detectable Transmit Errors
3.10.4. Measurement Intervals
3.10.5. Data Structures and Storage
3.10.6. Bin Groups
3.10.7. Delay Results Streaming
3.10.8. Relating the Components
3.10.9. IP Performance Monitoring Configuration
3.10.9.1. Accounting Policy Configuration
3.10.9.2. Service Configuration Launch (VPRN)
3.10.9.3. TWAMP Light Reflector (VPRN)
3.10.9.4. OAM-PM Configuration
3.10.10. MPLS Performance Monitoring (MPLS PM) Configuration
3.10.10.1. Accounting Policy Configuration
3.10.10.2. Enabling MPLS DM
3.10.10.3. RSVP LSP Configuration
3.10.10.4. RSVP-Auto LSP Configuration Components
3.10.10.5. MPLS-TP LSP Configuration
3.10.10.6. MPLS OAM-PM Configuration
3.10.11. Ethernet Performance Monitoring
3.10.11.1. Accounting Policy Configuration
3.10.11.2. ETH-CFM Configuration
3.10.11.3. Service Configuration
3.10.11.4. Ethernet OAM-PM Configuration
3.10.12. OAM-PM Event Monitoring
3.11. Bi-directional Forwarding Detection
3.11.1. BFD Control Packet
3.11.2. Control Packet Format
3.11.3. Echo Support
3.11.4. Centralized BFD
3.11.4.1. IES Over Spoke SDP
3.11.4.2. BFD Over LAG and VSM Interfaces
3.11.4.3. BFD on an Unnumbered IPv4 Interface
3.11.4.4. LSP BFD and VCCV BFD
3.11.4.5. Seamless BFD for SR-TE LSPs
3.11.5. Seamless Bidirectional Forwarding Detection
3.11.5.1. S-BFD Reflector Configuration and Behavior
3.11.5.2. S-BFD Initiator Global Configuration
3.11.5.2.1. Static S-BFD Discriminator Configuration
3.11.5.2.2. Automated S-BFD Discriminator Distribution
3.12. Traceroute with ICMP Tunneling In Common Applications
3.12.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.12.2. VPRN Inter-AS Option B
3.12.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.13. Hashing Visibility Tool
3.13.1. Configuring the Header Templates
3.13.2. Configuring Parameter Overrides and Header Sequences
3.14. Diagnostics Command Reference
3.14.1. Command Hierarchies
3.14.1.1. OAM Commands
3.14.1.1.1. Base Operational Commands
3.14.1.1.2. ATM Diagnostics
3.14.1.1.3. Find Egress Tool
3.14.1.1.4. IGMP Snooping
3.14.1.1.5. LDP Diagnostics
3.14.1.1.6. LSP Diagnostics
3.14.1.1.7. SDP Diagnostics
3.14.1.1.8. Common Service Diagnostics
3.14.1.1.9. VLL Diagnostics
3.14.1.1.10. Ethernet in the First Mile (EFM) Commands
3.14.1.1.11. ETH-CFM OAM Commands
3.14.1.1.12. BIER OAM Commands
3.14.1.2. SAA Commands
3.14.1.3. OAM Performance Monitoring, Bin Group, Session, and Streaming Commands
3.14.1.3.1. Bin Group and Base Session Commands
3.14.1.3.2. Session Ethernet Commands
3.14.1.3.3. Session IP Commands
3.14.1.3.4. Session MPLS Commands
3.14.1.3.5. Streaming Commands
3.14.1.3.6. Performance Monitoring Reflector Commands
3.14.1.3.7. Seamless BFD Commands
3.14.1.4. Show Commands
3.14.1.5. Clear Commands
3.14.1.6. Monitor Commands
3.14.1.7. Debug Commands
3.14.1.8. Tools Commands
3.14.2. Command Descriptions
3.14.2.1. Generic Commands
3.14.2.2. Base Operational Commands
3.14.2.3. ATM Diagnostics
3.14.2.4. Find Egress Tool
3.14.2.5. IGMP Snooping
3.14.2.6. LDP Diagnostics
3.14.2.7. LSP Diagnostics
3.14.2.8. SDP Diagnostics
3.14.2.9. Common Service Diagnostics
3.14.2.10. VLL Diagnostics
3.14.2.11. Ethernet in the First Mile (EFM) Commands
3.14.2.12. ETH-CFM OAM Commands
3.14.2.13. BIER OAM Commands
3.14.2.14. SAA Commands
3.14.2.15. OAM Performance Monitoring, Bin Group, and Session Commands
3.14.2.15.1. Bin Group Commands
3.14.2.15.2. Session Ethernet Commands
3.14.2.15.3. Session IP Commands
3.14.2.15.4. Session MPLS Commands
3.14.2.15.5. Streaming Commands
3.14.2.16. Performance Monitoring and Reflector Commands
3.14.2.16.1. TWAMP Server Commands
3.14.2.16.2. TWAMP Light Reflector Commands
3.14.2.16.3. MPLS DM Reflector Commands
3.14.2.17. Seamless BFD Commands
3.14.2.18. Show Commands
3.14.2.18.1. OAM Performance Monitoring and Binning Show Commands
3.14.2.19. Clear Commands
3.14.2.20. Monitor Commands
3.14.2.21. Debug Commands
3.14.2.22. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. Service Mirroring
2.2. Mirror Implementation
2.2.1. Overview
2.2.2. Mirror Source
2.2.2.1. Types and Sources
2.2.2.2. Mirror Source Priority
2.2.3. Mirror Destination
2.2.3.1. General Local and Remote Mirroring
2.2.3.2. Mirror Destination Type IP-Only
2.2.3.3. Mirror Destination Type PPP with Port-ID Insertion
2.2.3.4. Layer 3 Encapsulation
2.2.3.5. PCAP Packet Capture
2.2.3.6. Mirrored Traffic Transport using MPLS-TP SDPs
2.2.3.7. Slicing and Sampling
2.2.4. Mirroring Performance
2.2.5. Mirroring Configuration
2.3. Lawful Intercept
2.3.1. LI Activation Through RADIUS
2.3.2. Routable Lawful Intercept Encapsulation
2.3.3. Lawful Intercept Management Interfaces
2.3.3.1. LI Management using the Classic CLI Engine
2.3.3.2. LI Management using the MD-CLI Engine
2.3.3.3. Lawful Intercept in NETCONF
2.3.3.4. CLI Configuration Mode Migration
2.3.3.4.1. Configuration Mode Migration Check List
2.3.4. Configuring Lawful Intercept in MD-CLI
2.4. Pseudowire Redundant Mirror Services
2.4.1. Redundant Mirror Source Notes
2.5. Lawful Intercept and NAT
2.5.1. Carrier Grade NAT
2.5.2. L2-Aware NAT
2.6. Configuration Process Overview
2.7. Configuration Notes
2.8. Configuring Service Mirroring with CLI
2.8.1. Mirror Configuration Overview
2.8.1.1. Defining Mirrored Traffic
2.8.2. Lawful Intercept Configuration Overview
2.8.2.1. Saving LI Data
2.8.2.2. Regulating LI Access
2.8.2.2.1. LI User Access
2.8.2.2.2. LI Source Configuration
2.8.2.3. Configurable Filter Lock for Lawful Intercept
2.8.2.4. LI MAC Filter Configuration
2.8.2.5. LI Logging
2.8.3. Basic Mirroring Configuration
2.8.3.1. Mirror Classification Rules
2.8.3.1.1. Port
2.8.3.1.2. SAP
2.8.3.1.3. MAC Filter
2.8.3.1.4. IP Filter
2.8.3.1.5. Ingress Label
2.8.3.1.6. Subscriber
2.8.4. Common Configuration Tasks
2.8.4.1. Configuring a Local Mirror Service
2.8.4.2. Configuring SDPs for Mirrors and LI
2.8.4.3. Configuring a Remote Mirror Service
2.8.4.4. Configuring an ATM Mirror Service
2.8.4.5. Configuring Lawful Intercept Parameters
2.8.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
2.9. Service Management Tasks
2.9.1. Modifying a Local Mirrored Service
2.9.2. Deleting a Local Mirrored Service
2.9.3. Modifying a Remote Mirrored Service
2.9.4. Deleting a Remote Mirrored Service
2.10. Mirror Service Configuration Command Reference
2.10.1. Command Hierarchies
2.10.1.1. Mirror Configuration Commands
2.10.1.2. IP Mirror Interface Commands
2.10.1.3. Lawful Intercept Commands
2.10.2. Command Descriptions
2.10.2.1. Generic Commands
2.10.2.2. Mirror Destination Configuration Commands
2.10.2.3. IP Mirror Interface Commands
2.10.2.4. Lawful Intercept Commands
2.10.2.4.1. Other LI Configuration Commands
2.11. Mirror Service Show and Debug Command Reference
2.11.1. Command Hierarchies
2.11.1.1. Show Commands
2.11.1.2. Clear Commands
2.11.1.3. Debug Commands
2.11.2. Command Descriptions
2.11.2.1. Show Commands
2.11.2.2. Clear Commands
2.11.2.3. Debug Commands
3. OAM, SAA, and OAM-PM
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.1.3. ECMP Considerations
3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.1.5. Downstream Detailed Mapping (DDMAP) TLV
3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.6.1. Responder Node Procedures
3.1.6.2. Sender Node Procedures
3.1.7. MPLS OAM Support in Segment Routing
3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
3.1.7.3. Operation on SR-TE LSP
3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
3.1.8. MPLS OAM Support in IPv4 or IPv6 SR Policies
3.1.8.1. LSP-Ping and LSP-Trace Operation
3.1.8.2. ICMP-Tunneling Operation
3.1.9. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.1.10. LDP ECMP Tree Building
3.1.11. Periodic Path Exercising
3.1.12. LSP Ping for RSVP P2MP LSP (P2MP)
3.1.13. LSP Trace for RSVP P2MP LSP
3.1.13.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.14. Tunneling of ICMP Reply Packets over MPLS LSP
3.1.15. QoS Handling of Tunneled ICMP Reply Packets
3.1.16. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.1.17. SDP Diagnostics
3.1.18. SDP Ping
3.1.19. SDP MTU Path Discovery
3.1.20. Service Diagnostics
3.1.21. VPLS MAC Diagnostics
3.1.22. MAC Ping
3.1.23. MAC Trace
3.1.24. CPE Ping
3.1.25. CPE Ping for PBB Epipe
3.1.25.1. Hardware Support
3.1.26. MAC Populate
3.1.27. MAC Purge
3.1.28. VLL Diagnostics
3.1.29. VCCV Ping
3.1.29.1. VCCV-Ping Application
3.1.29.2. VCCV Ping in a Multi-Segment Pseudowire
3.1.30. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.30.1. VCCV for Static Pseudowire Segments
3.1.30.2. Detailed VCCV-Trace Operation
3.1.30.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.30.3.1. Sending a VCCV Echo Request
3.1.30.3.2. Receiving an VCCV Echo Request
3.1.30.3.3. Receiving an VCCV Echo Reply
3.1.31. IGMP Snooping Diagnostics
3.1.32. MFIB Ping
3.1.33. ATM Diagnostics
3.1.34. MPLS-TP On-Demand OAM Commands
3.1.35. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.35.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.1.36. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.37. VXLAN Ping Supporting EVPN for VXLAN
3.1.38. Show Commands
3.1.39. BFD
3.1.40. MPLS Performance Monitoring (MPLS PM)
3.1.40.1. Configuring MPLS PM
3.1.40.1.1. Accounting Policy Configuration
3.1.40.1.2. Enabling MPLS DM
3.1.40.1.3. RSVP LSP Configuration
3.1.40.1.4. RSVP-Auto LSP Configuration Components
3.1.40.1.5. MPLS-TP LSP Configuration
3.1.40.1.6. MPLS OAM-PM Configuration
3.1.41. BIER OAM
3.1.41.1. ECMP and BIER OAM
3.1.41.2. Outbound Time
3.1.41.3. Negative Outbound Time
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. MPLS Performance Monitoring (MPLS PM)
3.4. Ethernet Connectivity Fault Management (ETH-CFM)
3.4.1. ETH-CFM Building Blocks
3.4.2. Loopback
3.4.3. Loopback Multicast
3.4.4. Linktrace
3.4.5. Continuity Check (CC)
3.4.6. CC Remote Peer Auto-Discovery
3.4.7. ETH-CFM Grace Overview
3.4.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
3.4.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
3.4.8. CCM Hold Timers
3.4.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
3.4.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
3.4.11. ITU-T Y.1731 Test (ETH-TST)
3.4.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
3.4.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
3.4.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
3.4.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
3.4.15.1. ETH-LMM Single SAP Counter
3.4.15.2. ETH-LMM Per Forwarding Class Counter
3.4.15.3. Interaction Between Single and Per FC Counters
3.4.16. ETH-CFM Destination Options
3.4.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
3.5. ETH-CFM Statistics
3.6. ETH-CFM Packet Debug
3.7. ETH-CFM CoS Considerations
3.8. OAM Mapping
3.8.1. CFM Connectivity Fault Conditions
3.8.2. CFM Fault Propagation Methods
3.8.3. Epipe Services
3.8.4. CFM Detected Fault
3.8.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.4.2. Service Down
3.8.4.3. Interaction with Pseudowire Redundancy
3.8.5. Ipipe Services
3.8.5.1. CFM Detected Fault
3.8.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
3.8.5.3. Service Administratively Shutdown
3.8.5.4. Interaction with Pseudowire Redundancy
3.8.6. VPLS Service
3.8.6.1. CFM Detected Fault
3.8.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.6.3. Service Down
3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.8.7. IES and VPRN Services
3.8.8. Pseudowire Switching
3.8.9. LLF and CFM Fault Propagation
3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.9. Service Assurance Agent (SAA)
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Detectable Transmit Errors
3.10.4. Measurement Intervals
3.10.5. Data Structures and Storage
3.10.6. Bin Groups
3.10.7. Delay Results Streaming
3.10.8. Relating the Components
3.10.9. IP Performance Monitoring Configuration
3.10.9.1. Accounting Policy Configuration
3.10.9.2. Service Configuration Launch (VPRN)
3.10.9.3. TWAMP Light Reflector (VPRN)
3.10.9.4. OAM-PM Configuration
3.10.10. MPLS Performance Monitoring (MPLS PM) Configuration
3.10.10.1. Accounting Policy Configuration
3.10.10.2. Enabling MPLS DM
3.10.10.3. RSVP LSP Configuration
3.10.10.4. RSVP-Auto LSP Configuration Components
3.10.10.5. MPLS-TP LSP Configuration
3.10.10.6. MPLS OAM-PM Configuration
3.10.11. Ethernet Performance Monitoring
3.10.11.1. Accounting Policy Configuration
3.10.11.2. ETH-CFM Configuration
3.10.11.3. Service Configuration
3.10.11.4. Ethernet OAM-PM Configuration
3.10.12. OAM-PM Event Monitoring
3.11. Bi-directional Forwarding Detection
3.11.1. BFD Control Packet
3.11.2. Control Packet Format
3.11.3. Echo Support
3.11.4. Centralized BFD
3.11.4.1. IES Over Spoke SDP
3.11.4.2. BFD Over LAG and VSM Interfaces
3.11.4.3. BFD on an Unnumbered IPv4 Interface
3.11.4.4. LSP BFD and VCCV BFD
3.11.4.5. Seamless BFD for SR-TE LSPs
3.11.5. Seamless Bidirectional Forwarding Detection
3.11.5.1. S-BFD Reflector Configuration and Behavior
3.11.5.2. S-BFD Initiator Global Configuration
3.11.5.2.1. Static S-BFD Discriminator Configuration
3.11.5.2.2. Automated S-BFD Discriminator Distribution
3.12. Traceroute with ICMP Tunneling In Common Applications
3.12.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.12.2. VPRN Inter-AS Option B
3.12.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.13. Hashing Visibility Tool
3.13.1. Configuring the Header Templates
3.13.2. Configuring Parameter Overrides and Header Sequences
3.14. Diagnostics Command Reference
3.14.1. Command Hierarchies
3.14.1.1. OAM Commands
3.14.1.1.1. Base Operational Commands
3.14.1.1.2. ATM Diagnostics
3.14.1.1.3. Find Egress Tool
3.14.1.1.4. IGMP Snooping
3.14.1.1.5. LDP Diagnostics
3.14.1.1.6. LSP Diagnostics
3.14.1.1.7. SDP Diagnostics
3.14.1.1.8. Common Service Diagnostics
3.14.1.1.9. VLL Diagnostics
3.14.1.1.10. Ethernet in the First Mile (EFM) Commands
3.14.1.1.11. ETH-CFM OAM Commands
3.14.1.1.12. BIER OAM Commands
3.14.1.2. SAA Commands
3.14.1.3. OAM Performance Monitoring, Bin Group, Session, and Streaming Commands
3.14.1.3.1. Bin Group and Base Session Commands
3.14.1.3.2. Session Ethernet Commands
3.14.1.3.3. Session IP Commands
3.14.1.3.4. Session MPLS Commands
3.14.1.3.5. Streaming Commands
3.14.1.3.6. Performance Monitoring Reflector Commands
3.14.1.3.7. Seamless BFD Commands
3.14.1.4. Show Commands
3.14.1.5. Clear Commands
3.14.1.6. Monitor Commands
3.14.1.7. Debug Commands
3.14.1.8. Tools Commands
3.14.2. Command Descriptions
3.14.2.1. Generic Commands
3.14.2.2. Base Operational Commands
3.14.2.3. ATM Diagnostics
3.14.2.4. Find Egress Tool
3.14.2.5. IGMP Snooping
3.14.2.6. LDP Diagnostics
3.14.2.7. LSP Diagnostics
3.14.2.8. SDP Diagnostics
3.14.2.9. Common Service Diagnostics
3.14.2.10. VLL Diagnostics
3.14.2.11. Ethernet in the First Mile (EFM) Commands
3.14.2.12. ETH-CFM OAM Commands
3.14.2.13. BIER OAM Commands
3.14.2.14. SAA Commands
3.14.2.15. OAM Performance Monitoring, Bin Group, and Session Commands
3.14.2.15.1. Bin Group Commands
3.14.2.15.2. Session Ethernet Commands
3.14.2.15.3. Session IP Commands
3.14.2.15.4. Session MPLS Commands
3.14.2.15.5. Streaming Commands
3.14.2.16. Performance Monitoring and Reflector Commands
3.14.2.16.1. TWAMP Server Commands
3.14.2.16.2. TWAMP Light Reflector Commands
3.14.2.16.3. MPLS DM Reflector Commands
3.14.2.17. Seamless BFD Commands
3.14.2.18. Show Commands
3.14.2.18.1. OAM Performance Monitoring and Binning Show Commands
3.14.2.19. Clear Commands
3.14.2.20. Monitor Commands
3.14.2.21. Debug Commands
3.14.2.22. Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
Quality of Service Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2. QoS Policies
2.1. QoS Overview
2.2. Forwarding Classes
2.2.1. High-Priority Classes
2.2.2. Assured Classes
2.2.3. Best-Effort Classes
2.3. Queue Parameters
2.3.1. Queue ID
2.3.2. Unicast or Multipoint Queue
2.3.3. Queue Type
2.3.4. Queue Scheduling
2.3.5. Peak Information Rate
2.3.6. Committed Information Rate
2.3.7. Fair Information Rate
2.3.8. Adaptation Rule
2.3.9. Committed Burst Size
2.3.10. Maximum Burst Size
2.3.11. Queue Drop Tails
2.3.12. WRED Per Queue
2.3.12.1. Native Queue Mode
2.3.12.2. Pool Per Queue Mode
2.3.13. Packet Markings
2.3.14. Queue Counters
2.3.15. Color Aware Profiling
2.4. QoS Policies Overview
2.4.1. Service versus Network QoS
2.4.2. QoS Policy Entities
2.4.3. Network QoS Policies
2.4.4. Network Queue QoS Policies
2.4.5. Service Ingress QoS Policies
2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.4.5.2. Egress Forwarding Class Override
2.4.6. Service Egress QoS Policies
2.4.7. Slope Policies
2.4.7.1. RED Slopes
2.4.7.2. Tuning the SBAU Calculation
2.4.7.3. Slope Policy Parameters
2.4.8. Scheduler Policies
2.4.8.1. Virtual Hierarchical Scheduling
2.4.8.2. Hierarchical Scheduler Policies
2.4.8.2.1. Hierarchical Virtual Schedulers
2.4.8.3. Tiers
2.4.8.4. Scheduler Policies Applied to Applications
2.4.8.5. Scheduler Policies Applied to SAPs
2.4.8.6. Scheduler Policies Applied to Customer SLAs
2.4.8.7. Scheduler Policies Applied to Multiservice Sites
2.4.9. ATM Traffic Descriptor Profiles
2.4.10. Configuration Notes
3. FP QoS Configuration
3.1. FP4 Ingress and Egress Queue Reallocation
3.1.1. FP QoS Configuration Command Reference
3.1.1.1. Command Hierarchies
3.1.1.1.1. FP QoS Commands
3.1.1.2. Command Descriptions
3.1.1.2.1. FP QoS Commands
3.1.2. Show Command Reference
3.1.2.1. Command Hierarchies
3.1.2.1.1. Show Commands
3.1.2.2. Command Descriptions
3.1.2.2.1. Show Commands
4. Match List for QoS Policies
4.1. Match List for QoS Policies Commands
4.1.1. Command Hierarchies
4.1.1.1. Configuration Commands
4.1.1.2. Show Commands
4.1.2. Command Descriptions
4.1.2.1. Configuration Commands
4.1.2.2. Show Commands
5. Network QoS Policies
5.1. Network QoS Policies Overview
5.1.1. Storing Match-Criteria Entries
5.1.1.1. FP4-based Cards
5.2. Network Ingress
5.2.1. Network Ingress Tunnel QoS Override
5.2.2. Network Ingress IP Match Criteria
5.2.3. Network Ingress IPv6 Match Criteria
5.3. Network Egress
5.3.1. Egress Packet Reclassification Based on IP precedence DSCP
5.3.2. Network Egress IP Match Criteria
5.3.3. Network Egress IPv6 Match Criteria
5.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
5.4.1. Default DSCP Mapping Table
5.5. Basic Configurations
5.5.1. Creating a Network QoS Policy
5.5.2. Applying Network QoS Policies
5.5.3. Default Network QoS Policy Values
5.6. Service Management Tasks
5.6.1. Deleting QoS Policies
5.6.2. Removing a Policy from the QoS Configuration
5.6.3. Copying and Overwriting Network Policies
5.6.4. Editing QoS Policies
5.7. Network QoS Policy Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. Multi-Class Frame Relay Profile Commands
5.7.1.1.2. Network QoS Policy Commands
5.7.1.1.3. Model-Driven Automatic ID Commands
5.7.1.2. Self-Generated Traffic Commands
5.7.1.3. Operational Commands
5.7.1.4. Show Commands
5.7.1.5. Tools Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Multi-Class Frame Relay Profile Commands
5.7.2.1.3. Network QoS Policy Commands
5.7.2.1.4. Model-Driven Automatic ID Commands
5.7.2.2. Self-Generated Traffic Commands
5.7.2.3. Operational Commands
5.7.2.4. Show Commands
6. Network Queue QoS Policies
6.1. Overview
6.2. Network Queue Parent Scheduler
6.3. Basic Configurations
6.3.1. Creating a Network Queue QoS Policy
6.3.2. Applying Network Queue QoS Policies
6.3.2.1. FPs
6.3.2.2. Ethernet Ports
6.3.2.3. SONET/SDH Ports
6.3.3. Default Network Queue Policy Values
6.4. Service Management Tasks
6.4.1. Deleting QoS Policies
6.4.2. Removing a Policy from the QoS Configuration
6.4.3. Copying and Overwriting QoS Policies
6.4.4. Editing QoS Policies
6.5. Network Queue QoS Policy Command Reference
6.5.1. Command Hierarchies
6.5.1.1. Configuration Commands
6.5.1.2. Operational Commands
6.5.1.3. Show Commands
6.5.2. Command Descriptions
6.5.2.1. Configuration Commands
6.5.2.1.1. Generic Commands
6.5.2.1.2. Network Queue QoS Policy Commands
6.5.2.2. Operational Commands
6.5.2.3. Show Commands
7. Service Ingress and Egress QoS Policies
7.1. Overview
7.2. Basic Configurations
7.3. Service Ingress QoS Policy
7.3.1. Service Ingress QoS Queue
7.3.2. Ingress Percent-Rate Support
7.3.3. Ingress Forwarding Class (FC)
7.3.4. Ingress IP Match Criteria
7.3.5. Ingress IPv6 Match Criteria
7.3.6. Ingress MAC Match Criteria
7.3.6.1. VLAN ID Matching
7.3.7. Ingress Criteria Classification Directly to Policer
7.3.8. Virtual Network Identifier Classification
7.3.9. FC Mapping Based on EXP Bits
7.3.10. Storing Match Criteria Entries
7.3.10.1. FP4-based Cards
7.4. Service Egress QoS Policy
7.4.1. Service Egress QoS Queue
7.4.2. Egress Percent-Rate Support
7.4.3. Dynamic MBS for Egress Queue Group Queues
7.4.3.1. Queue Length as a Delay Value
7.4.4. Egress SAP FC and FP Overrides
7.4.5. Egress IP Match Criteria
7.4.6. Egress IPv6 Match Criteria
7.4.7. Egress Criteria Classification Directly to Policer
7.4.8. Storing Match Criteria Entries
7.4.8.1. FP4-based Cards
7.4.9. Dot1p Egress Remarking
7.4.9.1. DEI Egress Remarking
7.4.9.1.1. DEI in IEEE 802.1ad
7.4.9.1.2. DEI in IEEE 802.1ah
7.4.9.1.3. IEEE 802.1ad Use Case
7.4.9.1.4. IEEE 802.1ah Use Case
7.4.10. DSCP and IP Precedence Egress Remarking
7.4.11. Queue Depth Monitoring
7.5. Service Management Tasks
7.5.1. Applying Service Ingress and Egress Policies
7.5.1.1. Epipe
7.5.1.2. IES
7.5.1.3. VPLS
7.5.1.4. VPRN
7.5.2. Editing QoS Policies
7.5.3. Copying and Overwriting QoS Policies
7.5.4. Deleting QoS Policies
7.5.5. Removing a Policy from the QoS Configuration
7.6. Service Ingress and Egress QoS Policy Command Reference
7.6.1. Command Hierarchies
7.6.1.1. Service Ingress QoS Policy Commands
7.6.1.2. Service Egress QoS Policy Commands
7.6.1.3. Operational Commands
7.6.1.4. Show Commands
7.6.1.5. Tools Commands
7.6.2. Command Descriptions
7.6.2.1. Generic Commands
7.6.2.2. Service Ingress QoS Policy Commands
7.6.2.3. Service Egress QoS Policy Commands
7.6.2.4. Operational Commands
7.6.2.5. Show Commands
7.6.2.6. Tools Commands
8. Queue Sharing and Redirection
8.1. Queue Sharing and Redirection
8.1.1. Supported Platforms
8.2. Queue Group Applications
8.2.1. Access SAP Queue Group Applications
8.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
8.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
8.2.2. Network Port Queue Groups for IP Interfaces
8.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
8.2.4. QoS on Ingress Bindings
8.2.5. VXLAN VNI Queue Group Redirection
8.2.5.1. Queue Group Redirect List
8.2.5.2. Queue Group Redirect List Example
8.3. Queue Group Templates
8.4. Port Queue Groups
8.4.1. Percent-Rate Support
8.5. Forwarding Plane Queue Groups
8.6. Redirection Models
8.7. Access SAP Forwarding Class-Based Redirection
8.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
8.7.1.1. Policy-Based Provisioning Model
8.7.1.2. SAP-Based Provisioning Model
8.7.2. Access Queue Group Statistics
8.7.2.1. Port Queue Groups
8.7.2.2. Forwarding Plane Queue Groups
8.8. Network IP Interface Forwarding Class-Based Redirection
8.8.1. Egress Network Forwarding Class Redirection Association Rules
8.8.2. Egress Network IP Interface Statistics
8.9. PW Shaping
8.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.9.1.1. Feature Configuration
8.9.1.2. Provisioning Model
8.9.1.3. Ingress Packet Classification
8.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
8.9.2.1. Feature Configuration
8.9.2.2. Provisioning Model
8.9.2.3. Egress Marking of PW Packet Header
8.9.2.4. Ingress and Egress PW Statistics
8.10. Queue Group Behavior on LAG
8.10.1. Queue Group Queue Instantiation Per Link
8.10.2. Per-Link Queue Group Queue Parameters
8.10.3. Adding a Queue Group to an Existing LAG
8.10.4. Adding a Port to a LAG
8.10.5. Removing a Queue Group from a LAG
8.11. Basic Configurations
8.11.1. Configuring an Ingress Queue Group Template
8.11.2. Configuring Egress Queue Group Template
8.11.3. Applying Ingress Queue Group to SAP Ingress Policy
8.11.4. Applying Egress Queue Group to SAP Egress Policy
8.11.5. Configuring SAP-based Egress Queue Redirection
8.11.6. Configuring Queue Group on Ethernet Access Ingress Port
8.11.7. Configuring Overrides
8.11.8. Configuring Queue Group on Ethernet Access Egress Port
8.11.9. Configuring Queue Group for Network Egress Traffic on Port
8.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
8.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
8.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.11.13. Specifying QoS Policies on Service SAPs
8.12. QoS Queue Group Template Command Reference
8.12.1. Command Hierarchies
8.12.1.1. Configuring Egress Queue Group Templates
8.12.1.2. Configuring Ingress Queue Group Templates
8.12.1.3. Configuring VXLAN VNI Queue Group Redirection
8.12.1.4. Show Commands
8.12.1.5. Monitor Commands
8.12.2. Command Descriptions
8.12.2.1. Configuration Commands
8.12.2.1.1. Generic Commands
8.12.2.1.2. Queue Group Commands
8.12.2.2. Show Commands
8.12.2.3. Monitor Commands
9. Scheduler QoS Policies
9.1. Scheduler Policies
9.1.1. Egress Port-Based Schedulers
9.1.1.1. H-QoS Algorithm Selection
9.1.1.2. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
9.1.1.3. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
9.1.1.3.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
9.1.1.4. Frame and Packet-Based Bandwidth Allocation
9.1.1.5. Parental Association Scope
9.1.1.6. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
9.1.1.7. Network Queue Parent Scheduler
9.1.1.8. Foster Parent Behavior for Orphaned Queues and Schedulers
9.1.1.9. Congestion Monitoring on Egress Port Scheduler
9.1.1.9.1. Scalability, Performance, and Operation
9.1.1.9.2. Restrictions
9.1.2. Frame-Based Accounting
9.1.2.1. Operational Modifications
9.1.2.2. Existing Egress Port-Based Virtual Scheduling
9.1.2.3. Behavior Modifications for Frame-Based Accounting
9.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
9.1.3. Virtual Scheduling Unused Bandwidth Distribution
9.1.3.1. Default Unused Bandwidth Distribution
9.1.3.2. Limit Unused Bandwidth
9.1.4. Configuring Port Scheduler Policies
9.1.4.1. Port Scheduler Structure
9.1.4.2. Special Orphan Queue and Scheduler Behavior
9.1.4.3. Packet to Frame Bandwidth Conversion
9.1.4.4. Aggregate Rate Limits for Directly Attached Queues
9.1.4.5. SAP Egress QoS Policy Queue Parenting
9.1.4.6. Network Queue QoS Policy Queue Parenting
9.1.4.7. Egress Port Scheduler Overrides
9.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
9.1.4.9. Applying Aggregate Rate Limit to a Vport
9.1.4.10. Applying a Scheduler Policy to a Vport
9.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
9.2. Basic Configurations
9.2.1. Creating a QoS Scheduler Policy
9.2.2. Applying Scheduler Policies
9.2.2.1. Customer
9.2.2.2. Epipe
9.2.2.3. IES
9.2.2.4. VPLS
9.2.2.5. VPRN
9.2.3. Creating a QoS Port Scheduler Policy
9.2.4. Configuring Port Parent Parameters
9.2.4.1. Within-CIR Priority Level Parameters
9.2.4.2. Above-CIR Priority Level Parameters
9.2.5. Configuring Distributed LAG Rate
9.3. Service Management Tasks
9.3.1. Deleting QoS Policies
9.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
9.3.1.2. Removing a QoS Policy from SAP(s)
9.3.1.3. Removing a Policy from the QoS Configuration
9.3.2. Copying and Overwriting Scheduler Policies
9.3.3. Editing QoS Policies
9.4. QoS Scheduler Policy Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Scheduler Policy Configuration Commands
9.4.1.2. Port Scheduler Policy Configuration Commands
9.4.1.3. Operational Commands
9.4.1.4. Show Commands
9.4.1.5. Clear Commands
9.4.2. Command Descriptions
9.4.2.1. Configuration Commands
9.4.2.1.1. Generic Commands
9.4.2.2. Scheduler Policy Commands
9.4.2.3. Port Scheduler Policy Commands
9.4.2.4. Operational Commands
9.4.2.5. Show Commands
9.4.2.6. Clear Commands
10. Slope QoS Policies
10.1. Overview
10.2. Basic Configurations
10.2.1. Creating a Slope QoS Policy
10.2.2. Applying Slope Policies
10.2.2.1. Ports
10.2.2.2. FP
10.2.3. Default Slope Policy Values
10.3. Service Management Tasks
10.3.1. Deleting QoS Policies
10.3.1.1. Ports
10.3.1.2. FP
10.3.1.3. Removing a Policy from the QoS Configuration
10.3.2. Copying and Overwriting QoS Policies
10.3.3. Editing QoS Policies
10.4. Slope QoS Policy Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Configuration Commands
10.4.1.2. Operational Commands
10.4.1.3. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Configuration Commands
10.4.2.1.1. Generic Commands
10.4.2.2. Slope Policy QoS Commands
10.4.2.3. Operational Commands
10.4.2.4. Show Commands
11. Shared-Queue QoS Policies
11.1. Overview
11.2. Multipoint Shared Queuing
11.2.1. Ingress Queuing Modes of Operation
11.2.2. Ingress Service Queuing
11.2.2.1. Ingress Shared Queuing
11.2.2.2. Ingress Multipoint Shared Queuing
11.3. Basic Configurations
11.3.1. Modifying the Default Shared-Queue Policy
11.3.1.1. Applying Shared-Queue Policies
11.3.1.1.1. Epipe Services
11.3.1.1.2. IES Services
11.3.1.1.3. VPLS Services
11.3.1.1.4. VPRN Services
11.3.2. Default Shared Queue Policy Values
11.4. Shared-Queue QoS Policy Command Reference
11.4.1. Command Hierarchies
11.4.1.1. Configuration Commands
11.4.1.2. Show Commands
11.4.2. Command Descriptions
11.4.2.1. Configuration Commands
11.4.2.1.1. Generic Commands
11.4.2.1.2. Shared Queue QoS Commands
11.4.2.2. Show Commands
12. Advanced QoS Policies
12.1. Overview
12.2. Port Scheduler Above Offered Allowance Control
12.3. Basic Configurations
12.3.1. Creating an Advanced QoS Policy
12.3.2. Applying Advanced Policies
12.3.2.1. Queue Group
12.3.2.2. SAP Ingress
12.3.2.3. SAP Egress
12.3.3. Default Advanced Policy Values
12.4. Service Management Tasks
12.4.1. Deleting QoS Policies
12.4.1.1. Queue Group
12.4.1.2. SAP Ingress
12.4.1.3. SAP Egress
12.4.2. Copying and Overwriting Advanced Policies
12.4.3. Editing Advanced Policies
12.5. Advanced QoS Policy Command Reference
12.5.1. Command Hierarchies
12.5.1.1. Configuration Commands
12.5.1.2. Operational Commands
12.5.1.3. Show Commands
12.5.2. Command Descriptions
12.5.2.1. Configuration Commands
12.5.2.1.1. Generic Commands
12.5.2.2. Advanced Policy QoS Commands
12.5.2.3. Operational Commands
12.5.2.4. Show Commands
13. QoS ATM Traffic Descriptor Profiles
13.1. ATM Traffic Management
13.2. QoS Model for ATM-Based Services
13.3. ATM Service Categories
13.4. ATM Traffic Descriptors and QoS Parameters
13.5. Policing
13.6. Shaping
13.7. ATM Queuing and Scheduling
13.8. Congestion Avoidance
13.9. Basic Configurations
13.9.1. Creating an ATM-TD-Profile QoS Policy
13.9.2. Applying ATM-TD-Profile Policies
13.9.2.1. ATM VLL (Apipe) SAPs
13.9.2.2. Epipe SAPs
13.9.2.3. IES SAPs
13.9.2.4. Ipipe SAPs
13.9.2.5. VPRN SAPs
13.9.2.6. VPLS SAPs
13.9.3. Default ATM-TD-Profile Policy Values
13.10. Service Management Tasks
13.10.1. Removing a Profile from the QoS Configuration
13.10.2. Copying and Overwriting Profiles
13.10.3. Editing QoS Policies
13.11. ATM QoS Policy Command Reference
13.11.1. Command Hierarchies
13.11.1.1. Configuration Commands
13.11.1.2. Operational Commands
13.11.1.3. Show Commands
13.11.2. Command Descriptions
13.11.2.1. Configuration Commands
13.11.2.1.1. Generic Commands
13.11.2.1.2. ATM QoS Policy Commands
13.11.2.1.3. Operational Commands
13.11.2.1.4. Show Commands
14. High Scale Ethernet MDA Capabilities
14.1. HSMDA QoS Model
14.1.1. Queue Scaling
14.1.2. Port-Based Scheduling
14.1.3. Dual Pass Queuing
14.1.4. Egress Intermediate Destination Secondary Shapers
14.1.5. Packet and Octet Counting
14.1.6. Above-CIR Discard with PIR Bypass
14.1.6.1. HSMDA Ingress Queue Policing Mode
14.1.7. HSMDA Buffer Utilization Controls
14.1.7.1. HSMDA Buffer Pools
14.1.7.2. Identifying Queue Groups as Provisioned or System
14.1.7.3. Provisioned and System Port Class Pools
14.1.7.4. Aggregate Pools for Type and Class Separation
14.1.7.5. Use of Aggregate Control Buffer Pools
14.1.7.6. HSMDA Buffer Pool Policy
14.1.7.6.1. Default HSMDA Buffer Pool Policy
14.1.7.7. Port Class Pool Sizing
14.1.7.8. HSMDA Available Buffer Register Operation
14.1.8. HSMDA Queue Congestion and Buffer Utilization Controls
14.1.8.1. Maximum HSMDA Queue Depth
14.1.8.2. Control Plane HSMDA RED Slope Policy Management
14.1.8.3. HSMDA Slope Policy MBS Parameter
14.1.8.4. HSMDA Slope Policy Slope Parameters
14.1.8.5. HSMDA Slope Shutdown Behavior
14.1.8.6. Ingress Packet Mapping to HSMDA RED Slope
14.1.8.7. Egress Packet Mapping to HSMDA RED Slope
14.1.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
14.1.9. Egress Queue CIR-Based Dot1p Remarking
14.2. SAP Ingress and SAP Egress QoS Policies
14.2.1. SAP Ingress QoS Policy
14.2.2. SAP Egress QoS Policy
14.3. Subscriber Queuing Differences
14.4. Basic HSMDA Configurations
14.4.1. HSMDA Pool Policies
14.4.2. HSMDA Scheduler Policies
14.4.3. HSMDA Slope Policies
14.4.4. Egress Queue Group
14.4.5. Configuring HSMDA Queue Group Overrides
14.5. Applying HSMDA Policies
14.6. HSMDA Features
14.6.1. HSMDA LAG
14.6.2. Billing
14.6.3. Resource Management
14.6.4. HSMDA Queue Groups
14.6.4.1. Scheduling Classes
14.6.4.2. Scheduling Class Weighted Groups
14.6.4.3. Scheduler Strict Priority Levels
14.6.4.4. Strict Priority Level PIR
14.6.4.5. Scheduler Maximum Rate
14.6.4.6. HSMDA Scheduler Policy Overrides
14.6.4.7. Orphan Queues
14.6.4.8. Default HSMDA Scheduling Policy
14.7. HSMDA Command Reference
14.7.1. Command Hierarchies
14.7.1.1. Show Commands
14.7.2. Command Descriptions
14.7.2.1. Configuration Commands
14.7.2.1.1. Generic Commands
14.7.2.1.2. HSMDA Pool QoS Policy Commands
14.7.2.1.3. HSMDA Scheduler QoS Policy Commands
14.7.2.1.4. HSMDA Slope QoS Policy Commands
14.7.2.1.5. HSMDA WRR QoS Policy Commands
14.7.2.1.6. Show QoS HSMDA Commands
15. High Scale QoS IOM
15.1. Introduction
15.1.1. HSQ Shaping
15.1.2. HSQ Scheduling
15.1.3. HSQ Buffer Management
15.1.4. HSQ LAGs
15.2. HSQ IOM-Specific Configurations
15.3. Non-Applicable HSQ IOM Functions
15.4. High Scale QoS IOM Command Reference
15.4.1. Command Hierarchies
15.4.1.1. HS Attachment Policy Commands
15.4.1.2. HS Pool Policy Commands
15.4.1.3. HS Port Pool Policy Commands
15.4.1.4. HS Scheduler Policy Commands
15.4.1.5. Network Queue QoS Policy HS Commands
15.4.1.6. SAP Egress Policy QoS HS Commands
15.4.1.7. Queue Group Template HS Commands
15.4.1.8. Services Configuration HS Commands
15.4.1.8.1. Epipe Commands
15.4.1.8.2. IES Commands
15.4.1.8.3. Ipipe Commands
15.4.1.8.4. VPLS Commands
15.4.1.8.5. VPRN Commands
15.4.1.9. Forwarding Plane HS Commands
15.4.1.10. Port Configuration HS Commands
15.4.1.11. LAG HS Commands
15.4.1.12. Operational Commands
15.4.1.13. Show Commands
15.4.1.14. Clear Commands
15.4.2. Command Descriptions
15.4.2.1. Configuration Commands
15.4.2.1.1. Generic Commands
15.4.2.2. HS Attachment Policy Commands
15.4.2.3. HS Pool Policy Commands
15.4.2.4. HS Port Pool Policy Commands
15.4.2.5. HS Scheduler Policy Commands
15.4.2.6. Network Queue HS Attachment Policy Commands
15.4.2.7. SAP Egress HS Attachment Policy Commands
15.4.2.8. Queue Group Template Policy HS Commands
15.4.2.9. Operational Commands
15.4.2.10. Show Commands
15.4.2.11. Clear Commands
16. QoS in MC-MLPPP
16.1. Overview
16.2. Ingress MLPPP Class Reassembly
16.3. Basic Configurations
16.3.1. Configuring MC-MLPPP
16.3.2. Configuring MC-MLPPP QoS Parameters
16.4. QoS in MLFR and FRF.12 Fragmentation
16.4.1. QoS in MLFR
16.4.2. QoS in FRF.12 End-to-End Fragmentation
16.5. MLPPP Command Reference
16.5.1. Command Hierarchies
16.5.1.1. Configuration Commands
16.5.2. Command Descriptions
16.5.2.1. Configuration Commands
16.5.2.1.1. MC-MLPPP Commands
17. Class Fair Hierarchical Policing (CFHP)
17.1. Overview
17.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
17.3. CFHP Ingress and Egress Use Cases
17.4. Post-CFHP Queuing and Scheduling
17.4.1. Ingress CFHP Queuing
17.4.2. Egress CFHP Queuing
17.4.2.1. Policer to Local Queue Mapping
17.4.3. Egress Subscriber CFHP Queuing
17.4.3.1. Subscriber Destination String Queue Group Identification
17.4.4. SAP Default Destination String
17.5. CFHP Policer Control Policy
17.5.1. Policer Control Policy Root Arbiter
17.5.2. Tier 1 and Tier 2 Explicit Arbiters
17.5.3. Explicit Arbiter Rate Limits
17.5.4. CFHP with Child Policer Exceed PIR Enabled
17.6. CFHP Child Policer Definition and Creation
17.7. Policer Enabled SAP QoS Policy Applicability
17.8. Child Policer Parent Association
17.9. Profile-Capped Policers
17.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
17.10.1. Ingress ‘Undefined’ Initial Profile
17.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
17.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
17.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
17.10.5. Egress Explicit Profile Reclassification
17.10.6. Preserving Out of Profile State at Egress Policer
17.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
17.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
17.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
17.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
17.10.11. Ingress Child Policer Stat-Mode
17.10.12. Egress Child Policer Stat-Mode
17.11. Profile-Preferred Mode Root Policers
17.12. Child Policer Hierarchical QoS Parenting
17.13. Class Fair Hierarchical Policing (CFHP) Policy Command Reference
17.13.1. Command Hierarchies
17.13.1.1. Class Fair Hierarchical Policing Commands
17.13.1.2. Operational Commands
17.13.1.3. Show Commands
17.13.2. Command Descriptions
17.13.2.1. Configuration Commands
17.13.2.1.1. Generic Commands
17.13.2.1.2. Class Fair Hierarchical Policing Commands
17.13.2.1.3. Operational Commands
17.13.2.1.4. Show Commands
18. Frequently Used QoS Terms
18.1. Overview
18.2. Above-CIR Distribution
18.3. Available Bandwidth
18.4. CBS
18.5. CIR
18.6. CIR Level
18.7. CIR Weight
18.8. Child
18.9. Level
18.10. MBS
18.11. Offered Load
18.12. Orphan
18.13. Parent
18.14. Queue
18.15. Rate
18.16. Root (Scheduler)
18.17. Scheduler Policy
18.18. Tier
18.19. Virtual Scheduler
18.20. Weight
18.21. Within-CIR Distribution
19. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2. QoS Policies
2.1. QoS Overview
2.2. Forwarding Classes
2.2.1. High-Priority Classes
2.2.2. Assured Classes
2.2.3. Best-Effort Classes
2.3. Queue Parameters
2.3.1. Queue ID
2.3.2. Unicast or Multipoint Queue
2.3.3. Queue Type
2.3.4. Queue Scheduling
2.3.5. Peak Information Rate
2.3.6. Committed Information Rate
2.3.7. Fair Information Rate
2.3.8. Adaptation Rule
2.3.9. Committed Burst Size
2.3.10. Maximum Burst Size
2.3.11. Queue Drop Tails
2.3.12. WRED Per Queue
2.3.12.1. Native Queue Mode
2.3.12.2. Pool Per Queue Mode
2.3.13. Packet Markings
2.3.14. Queue Counters
2.3.15. Color Aware Profiling
2.4. QoS Policies Overview
2.4.1. Service versus Network QoS
2.4.2. QoS Policy Entities
2.4.3. Network QoS Policies
2.4.4. Network Queue QoS Policies
2.4.5. Service Ingress QoS Policies
2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.4.5.2. Egress Forwarding Class Override
2.4.6. Service Egress QoS Policies
2.4.7. Slope Policies
2.4.7.1. RED Slopes
2.4.7.2. Tuning the SBAU Calculation
2.4.7.3. Slope Policy Parameters
2.4.8. Scheduler Policies
2.4.8.1. Virtual Hierarchical Scheduling
2.4.8.2. Hierarchical Scheduler Policies
2.4.8.2.1. Hierarchical Virtual Schedulers
2.4.8.3. Tiers
2.4.8.4. Scheduler Policies Applied to Applications
2.4.8.5. Scheduler Policies Applied to SAPs
2.4.8.6. Scheduler Policies Applied to Customer SLAs
2.4.8.7. Scheduler Policies Applied to Multiservice Sites
2.4.9. ATM Traffic Descriptor Profiles
2.4.10. Configuration Notes
3. FP QoS Configuration
3.1. FP4 Ingress and Egress Queue Reallocation
3.1.1. FP QoS Configuration Command Reference
3.1.1.1. Command Hierarchies
3.1.1.1.1. FP QoS Commands
3.1.1.2. Command Descriptions
3.1.1.2.1. FP QoS Commands
3.1.2. Show Command Reference
3.1.2.1. Command Hierarchies
3.1.2.1.1. Show Commands
3.1.2.2. Command Descriptions
3.1.2.2.1. Show Commands
4. Match List for QoS Policies
4.1. Match List for QoS Policies Commands
4.1.1. Command Hierarchies
4.1.1.1. Configuration Commands
4.1.1.2. Show Commands
4.1.2. Command Descriptions
4.1.2.1. Configuration Commands
4.1.2.2. Show Commands
5. Network QoS Policies
5.1. Network QoS Policies Overview
5.1.1. Storing Match-Criteria Entries
5.1.1.1. FP4-based Cards
5.2. Network Ingress
5.2.1. Network Ingress Tunnel QoS Override
5.2.2. Network Ingress IP Match Criteria
5.2.3. Network Ingress IPv6 Match Criteria
5.3. Network Egress
5.3.1. Egress Packet Reclassification Based on IP precedence DSCP
5.3.2. Network Egress IP Match Criteria
5.3.3. Network Egress IPv6 Match Criteria
5.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
5.4.1. Default DSCP Mapping Table
5.5. Basic Configurations
5.5.1. Creating a Network QoS Policy
5.5.2. Applying Network QoS Policies
5.5.3. Default Network QoS Policy Values
5.6. Service Management Tasks
5.6.1. Deleting QoS Policies
5.6.2. Removing a Policy from the QoS Configuration
5.6.3. Copying and Overwriting Network Policies
5.6.4. Editing QoS Policies
5.7. Network QoS Policy Command Reference
5.7.1. Command Hierarchies
5.7.1.1. Configuration Commands
5.7.1.1.1. Multi-Class Frame Relay Profile Commands
5.7.1.1.2. Network QoS Policy Commands
5.7.1.1.3. Model-Driven Automatic ID Commands
5.7.1.2. Self-Generated Traffic Commands
5.7.1.3. Operational Commands
5.7.1.4. Show Commands
5.7.1.5. Tools Commands
5.7.2. Command Descriptions
5.7.2.1. Configuration Commands
5.7.2.1.1. Generic Commands
5.7.2.1.2. Multi-Class Frame Relay Profile Commands
5.7.2.1.3. Network QoS Policy Commands
5.7.2.1.4. Model-Driven Automatic ID Commands
5.7.2.2. Self-Generated Traffic Commands
5.7.2.3. Operational Commands
5.7.2.4. Show Commands
6. Network Queue QoS Policies
6.1. Overview
6.2. Network Queue Parent Scheduler
6.3. Basic Configurations
6.3.1. Creating a Network Queue QoS Policy
6.3.2. Applying Network Queue QoS Policies
6.3.2.1. FPs
6.3.2.2. Ethernet Ports
6.3.2.3. SONET/SDH Ports
6.3.3. Default Network Queue Policy Values
6.4. Service Management Tasks
6.4.1. Deleting QoS Policies
6.4.2. Removing a Policy from the QoS Configuration
6.4.3. Copying and Overwriting QoS Policies
6.4.4. Editing QoS Policies
6.5. Network Queue QoS Policy Command Reference
6.5.1. Command Hierarchies
6.5.1.1. Configuration Commands
6.5.1.2. Operational Commands
6.5.1.3. Show Commands
6.5.2. Command Descriptions
6.5.2.1. Configuration Commands
6.5.2.1.1. Generic Commands
6.5.2.1.2. Network Queue QoS Policy Commands
6.5.2.2. Operational Commands
6.5.2.3. Show Commands
7. Service Ingress and Egress QoS Policies
7.1. Overview
7.2. Basic Configurations
7.3. Service Ingress QoS Policy
7.3.1. Service Ingress QoS Queue
7.3.2. Ingress Percent-Rate Support
7.3.3. Ingress Forwarding Class (FC)
7.3.4. Ingress IP Match Criteria
7.3.5. Ingress IPv6 Match Criteria
7.3.6. Ingress MAC Match Criteria
7.3.6.1. VLAN ID Matching
7.3.7. Ingress Criteria Classification Directly to Policer
7.3.8. Virtual Network Identifier Classification
7.3.9. FC Mapping Based on EXP Bits
7.3.10. Storing Match Criteria Entries
7.3.10.1. FP4-based Cards
7.4. Service Egress QoS Policy
7.4.1. Service Egress QoS Queue
7.4.2. Egress Percent-Rate Support
7.4.3. Dynamic MBS for Egress Queue Group Queues
7.4.3.1. Queue Length as a Delay Value
7.4.4. Egress SAP FC and FP Overrides
7.4.5. Egress IP Match Criteria
7.4.6. Egress IPv6 Match Criteria
7.4.7. Egress Criteria Classification Directly to Policer
7.4.8. Storing Match Criteria Entries
7.4.8.1. FP4-based Cards
7.4.9. Dot1p Egress Remarking
7.4.9.1. DEI Egress Remarking
7.4.9.1.1. DEI in IEEE 802.1ad
7.4.9.1.2. DEI in IEEE 802.1ah
7.4.9.1.3. IEEE 802.1ad Use Case
7.4.9.1.4. IEEE 802.1ah Use Case
7.4.10. DSCP and IP Precedence Egress Remarking
7.4.11. Queue Depth Monitoring
7.5. Service Management Tasks
7.5.1. Applying Service Ingress and Egress Policies
7.5.1.1. Epipe
7.5.1.2. IES
7.5.1.3. VPLS
7.5.1.4. VPRN
7.5.2. Editing QoS Policies
7.5.3. Copying and Overwriting QoS Policies
7.5.4. Deleting QoS Policies
7.5.5. Removing a Policy from the QoS Configuration
7.6. Service Ingress and Egress QoS Policy Command Reference
7.6.1. Command Hierarchies
7.6.1.1. Service Ingress QoS Policy Commands
7.6.1.2. Service Egress QoS Policy Commands
7.6.1.3. Operational Commands
7.6.1.4. Show Commands
7.6.1.5. Tools Commands
7.6.2. Command Descriptions
7.6.2.1. Generic Commands
7.6.2.2. Service Ingress QoS Policy Commands
7.6.2.3. Service Egress QoS Policy Commands
7.6.2.4. Operational Commands
7.6.2.5. Show Commands
7.6.2.6. Tools Commands
8. Queue Sharing and Redirection
8.1. Queue Sharing and Redirection
8.1.1. Supported Platforms
8.2. Queue Group Applications
8.2.1. Access SAP Queue Group Applications
8.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
8.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
8.2.2. Network Port Queue Groups for IP Interfaces
8.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
8.2.4. QoS on Ingress Bindings
8.2.5. VXLAN VNI Queue Group Redirection
8.2.5.1. Queue Group Redirect List
8.2.5.2. Queue Group Redirect List Example
8.3. Queue Group Templates
8.4. Port Queue Groups
8.4.1. Percent-Rate Support
8.5. Forwarding Plane Queue Groups
8.6. Redirection Models
8.7. Access SAP Forwarding Class-Based Redirection
8.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
8.7.1.1. Policy-Based Provisioning Model
8.7.1.2. SAP-Based Provisioning Model
8.7.2. Access Queue Group Statistics
8.7.2.1. Port Queue Groups
8.7.2.2. Forwarding Plane Queue Groups
8.8. Network IP Interface Forwarding Class-Based Redirection
8.8.1. Egress Network Forwarding Class Redirection Association Rules
8.8.2. Egress Network IP Interface Statistics
8.9. PW Shaping
8.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.9.1.1. Feature Configuration
8.9.1.2. Provisioning Model
8.9.1.3. Ingress Packet Classification
8.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
8.9.2.1. Feature Configuration
8.9.2.2. Provisioning Model
8.9.2.3. Egress Marking of PW Packet Header
8.9.2.4. Ingress and Egress PW Statistics
8.10. Queue Group Behavior on LAG
8.10.1. Queue Group Queue Instantiation Per Link
8.10.2. Per-Link Queue Group Queue Parameters
8.10.3. Adding a Queue Group to an Existing LAG
8.10.4. Adding a Port to a LAG
8.10.5. Removing a Queue Group from a LAG
8.11. Basic Configurations
8.11.1. Configuring an Ingress Queue Group Template
8.11.2. Configuring Egress Queue Group Template
8.11.3. Applying Ingress Queue Group to SAP Ingress Policy
8.11.4. Applying Egress Queue Group to SAP Egress Policy
8.11.5. Configuring SAP-based Egress Queue Redirection
8.11.6. Configuring Queue Group on Ethernet Access Ingress Port
8.11.7. Configuring Overrides
8.11.8. Configuring Queue Group on Ethernet Access Egress Port
8.11.9. Configuring Queue Group for Network Egress Traffic on Port
8.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
8.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
8.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.11.13. Specifying QoS Policies on Service SAPs
8.12. QoS Queue Group Template Command Reference
8.12.1. Command Hierarchies
8.12.1.1. Configuring Egress Queue Group Templates
8.12.1.2. Configuring Ingress Queue Group Templates
8.12.1.3. Configuring VXLAN VNI Queue Group Redirection
8.12.1.4. Show Commands
8.12.1.5. Monitor Commands
8.12.2. Command Descriptions
8.12.2.1. Configuration Commands
8.12.2.1.1. Generic Commands
8.12.2.1.2. Queue Group Commands
8.12.2.2. Show Commands
8.12.2.3. Monitor Commands
9. Scheduler QoS Policies
9.1. Scheduler Policies
9.1.1. Egress Port-Based Schedulers
9.1.1.1. H-QoS Algorithm Selection
9.1.1.2. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
9.1.1.3. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
9.1.1.3.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
9.1.1.4. Frame and Packet-Based Bandwidth Allocation
9.1.1.5. Parental Association Scope
9.1.1.6. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
9.1.1.7. Network Queue Parent Scheduler
9.1.1.8. Foster Parent Behavior for Orphaned Queues and Schedulers
9.1.1.9. Congestion Monitoring on Egress Port Scheduler
9.1.1.9.1. Scalability, Performance, and Operation
9.1.1.9.2. Restrictions
9.1.2. Frame-Based Accounting
9.1.2.1. Operational Modifications
9.1.2.2. Existing Egress Port-Based Virtual Scheduling
9.1.2.3. Behavior Modifications for Frame-Based Accounting
9.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
9.1.3. Virtual Scheduling Unused Bandwidth Distribution
9.1.3.1. Default Unused Bandwidth Distribution
9.1.3.2. Limit Unused Bandwidth
9.1.4. Configuring Port Scheduler Policies
9.1.4.1. Port Scheduler Structure
9.1.4.2. Special Orphan Queue and Scheduler Behavior
9.1.4.3. Packet to Frame Bandwidth Conversion
9.1.4.4. Aggregate Rate Limits for Directly Attached Queues
9.1.4.5. SAP Egress QoS Policy Queue Parenting
9.1.4.6. Network Queue QoS Policy Queue Parenting
9.1.4.7. Egress Port Scheduler Overrides
9.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
9.1.4.9. Applying Aggregate Rate Limit to a Vport
9.1.4.10. Applying a Scheduler Policy to a Vport
9.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
9.2. Basic Configurations
9.2.1. Creating a QoS Scheduler Policy
9.2.2. Applying Scheduler Policies
9.2.2.1. Customer
9.2.2.2. Epipe
9.2.2.3. IES
9.2.2.4. VPLS
9.2.2.5. VPRN
9.2.3. Creating a QoS Port Scheduler Policy
9.2.4. Configuring Port Parent Parameters
9.2.4.1. Within-CIR Priority Level Parameters
9.2.4.2. Above-CIR Priority Level Parameters
9.2.5. Configuring Distributed LAG Rate
9.3. Service Management Tasks
9.3.1. Deleting QoS Policies
9.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
9.3.1.2. Removing a QoS Policy from SAP(s)
9.3.1.3. Removing a Policy from the QoS Configuration
9.3.2. Copying and Overwriting Scheduler Policies
9.3.3. Editing QoS Policies
9.4. QoS Scheduler Policy Command Reference
9.4.1. Command Hierarchies
9.4.1.1. Scheduler Policy Configuration Commands
9.4.1.2. Port Scheduler Policy Configuration Commands
9.4.1.3. Operational Commands
9.4.1.4. Show Commands
9.4.1.5. Clear Commands
9.4.2. Command Descriptions
9.4.2.1. Configuration Commands
9.4.2.1.1. Generic Commands
9.4.2.2. Scheduler Policy Commands
9.4.2.3. Port Scheduler Policy Commands
9.4.2.4. Operational Commands
9.4.2.5. Show Commands
9.4.2.6. Clear Commands
10. Slope QoS Policies
10.1. Overview
10.2. Basic Configurations
10.2.1. Creating a Slope QoS Policy
10.2.2. Applying Slope Policies
10.2.2.1. Ports
10.2.2.2. FP
10.2.3. Default Slope Policy Values
10.3. Service Management Tasks
10.3.1. Deleting QoS Policies
10.3.1.1. Ports
10.3.1.2. FP
10.3.1.3. Removing a Policy from the QoS Configuration
10.3.2. Copying and Overwriting QoS Policies
10.3.3. Editing QoS Policies
10.4. Slope QoS Policy Command Reference
10.4.1. Command Hierarchies
10.4.1.1. Configuration Commands
10.4.1.2. Operational Commands
10.4.1.3. Show Commands
10.4.2. Command Descriptions
10.4.2.1. Configuration Commands
10.4.2.1.1. Generic Commands
10.4.2.2. Slope Policy QoS Commands
10.4.2.3. Operational Commands
10.4.2.4. Show Commands
11. Shared-Queue QoS Policies
11.1. Overview
11.2. Multipoint Shared Queuing
11.2.1. Ingress Queuing Modes of Operation
11.2.2. Ingress Service Queuing
11.2.2.1. Ingress Shared Queuing
11.2.2.2. Ingress Multipoint Shared Queuing
11.3. Basic Configurations
11.3.1. Modifying the Default Shared-Queue Policy
11.3.1.1. Applying Shared-Queue Policies
11.3.1.1.1. Epipe Services
11.3.1.1.2. IES Services
11.3.1.1.3. VPLS Services
11.3.1.1.4. VPRN Services
11.3.2. Default Shared Queue Policy Values
11.4. Shared-Queue QoS Policy Command Reference
11.4.1. Command Hierarchies
11.4.1.1. Configuration Commands
11.4.1.2. Show Commands
11.4.2. Command Descriptions
11.4.2.1. Configuration Commands
11.4.2.1.1. Generic Commands
11.4.2.1.2. Shared Queue QoS Commands
11.4.2.2. Show Commands
12. Advanced QoS Policies
12.1. Overview
12.2. Port Scheduler Above Offered Allowance Control
12.3. Basic Configurations
12.3.1. Creating an Advanced QoS Policy
12.3.2. Applying Advanced Policies
12.3.2.1. Queue Group
12.3.2.2. SAP Ingress
12.3.2.3. SAP Egress
12.3.3. Default Advanced Policy Values
12.4. Service Management Tasks
12.4.1. Deleting QoS Policies
12.4.1.1. Queue Group
12.4.1.2. SAP Ingress
12.4.1.3. SAP Egress
12.4.2. Copying and Overwriting Advanced Policies
12.4.3. Editing Advanced Policies
12.5. Advanced QoS Policy Command Reference
12.5.1. Command Hierarchies
12.5.1.1. Configuration Commands
12.5.1.2. Operational Commands
12.5.1.3. Show Commands
12.5.2. Command Descriptions
12.5.2.1. Configuration Commands
12.5.2.1.1. Generic Commands
12.5.2.2. Advanced Policy QoS Commands
12.5.2.3. Operational Commands
12.5.2.4. Show Commands
13. QoS ATM Traffic Descriptor Profiles
13.1. ATM Traffic Management
13.2. QoS Model for ATM-Based Services
13.3. ATM Service Categories
13.4. ATM Traffic Descriptors and QoS Parameters
13.5. Policing
13.6. Shaping
13.7. ATM Queuing and Scheduling
13.8. Congestion Avoidance
13.9. Basic Configurations
13.9.1. Creating an ATM-TD-Profile QoS Policy
13.9.2. Applying ATM-TD-Profile Policies
13.9.2.1. ATM VLL (Apipe) SAPs
13.9.2.2. Epipe SAPs
13.9.2.3. IES SAPs
13.9.2.4. Ipipe SAPs
13.9.2.5. VPRN SAPs
13.9.2.6. VPLS SAPs
13.9.3. Default ATM-TD-Profile Policy Values
13.10. Service Management Tasks
13.10.1. Removing a Profile from the QoS Configuration
13.10.2. Copying and Overwriting Profiles
13.10.3. Editing QoS Policies
13.11. ATM QoS Policy Command Reference
13.11.1. Command Hierarchies
13.11.1.1. Configuration Commands
13.11.1.2. Operational Commands
13.11.1.3. Show Commands
13.11.2. Command Descriptions
13.11.2.1. Configuration Commands
13.11.2.1.1. Generic Commands
13.11.2.1.2. ATM QoS Policy Commands
13.11.2.1.3. Operational Commands
13.11.2.1.4. Show Commands
14. High Scale Ethernet MDA Capabilities
14.1. HSMDA QoS Model
14.1.1. Queue Scaling
14.1.2. Port-Based Scheduling
14.1.3. Dual Pass Queuing
14.1.4. Egress Intermediate Destination Secondary Shapers
14.1.5. Packet and Octet Counting
14.1.6. Above-CIR Discard with PIR Bypass
14.1.6.1. HSMDA Ingress Queue Policing Mode
14.1.7. HSMDA Buffer Utilization Controls
14.1.7.1. HSMDA Buffer Pools
14.1.7.2. Identifying Queue Groups as Provisioned or System
14.1.7.3. Provisioned and System Port Class Pools
14.1.7.4. Aggregate Pools for Type and Class Separation
14.1.7.5. Use of Aggregate Control Buffer Pools
14.1.7.6. HSMDA Buffer Pool Policy
14.1.7.6.1. Default HSMDA Buffer Pool Policy
14.1.7.7. Port Class Pool Sizing
14.1.7.8. HSMDA Available Buffer Register Operation
14.1.8. HSMDA Queue Congestion and Buffer Utilization Controls
14.1.8.1. Maximum HSMDA Queue Depth
14.1.8.2. Control Plane HSMDA RED Slope Policy Management
14.1.8.3. HSMDA Slope Policy MBS Parameter
14.1.8.4. HSMDA Slope Policy Slope Parameters
14.1.8.5. HSMDA Slope Shutdown Behavior
14.1.8.6. Ingress Packet Mapping to HSMDA RED Slope
14.1.8.7. Egress Packet Mapping to HSMDA RED Slope
14.1.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
14.1.9. Egress Queue CIR-Based Dot1p Remarking
14.2. SAP Ingress and SAP Egress QoS Policies
14.2.1. SAP Ingress QoS Policy
14.2.2. SAP Egress QoS Policy
14.3. Subscriber Queuing Differences
14.4. Basic HSMDA Configurations
14.4.1. HSMDA Pool Policies
14.4.2. HSMDA Scheduler Policies
14.4.3. HSMDA Slope Policies
14.4.4. Egress Queue Group
14.4.5. Configuring HSMDA Queue Group Overrides
14.5. Applying HSMDA Policies
14.6. HSMDA Features
14.6.1. HSMDA LAG
14.6.2. Billing
14.6.3. Resource Management
14.6.4. HSMDA Queue Groups
14.6.4.1. Scheduling Classes
14.6.4.2. Scheduling Class Weighted Groups
14.6.4.3. Scheduler Strict Priority Levels
14.6.4.4. Strict Priority Level PIR
14.6.4.5. Scheduler Maximum Rate
14.6.4.6. HSMDA Scheduler Policy Overrides
14.6.4.7. Orphan Queues
14.6.4.8. Default HSMDA Scheduling Policy
14.7. HSMDA Command Reference
14.7.1. Command Hierarchies
14.7.1.1. Show Commands
14.7.2. Command Descriptions
14.7.2.1. Configuration Commands
14.7.2.1.1. Generic Commands
14.7.2.1.2. HSMDA Pool QoS Policy Commands
14.7.2.1.3. HSMDA Scheduler QoS Policy Commands
14.7.2.1.4. HSMDA Slope QoS Policy Commands
14.7.2.1.5. HSMDA WRR QoS Policy Commands
14.7.2.1.6. Show QoS HSMDA Commands
15. High Scale QoS IOM
15.1. Introduction
15.1.1. HSQ Shaping
15.1.2. HSQ Scheduling
15.1.3. HSQ Buffer Management
15.1.4. HSQ LAGs
15.2. HSQ IOM-Specific Configurations
15.3. Non-Applicable HSQ IOM Functions
15.4. High Scale QoS IOM Command Reference
15.4.1. Command Hierarchies
15.4.1.1. HS Attachment Policy Commands
15.4.1.2. HS Pool Policy Commands
15.4.1.3. HS Port Pool Policy Commands
15.4.1.4. HS Scheduler Policy Commands
15.4.1.5. Network Queue QoS Policy HS Commands
15.4.1.6. SAP Egress Policy QoS HS Commands
15.4.1.7. Queue Group Template HS Commands
15.4.1.8. Services Configuration HS Commands
15.4.1.8.1. Epipe Commands
15.4.1.8.2. IES Commands
15.4.1.8.3. Ipipe Commands
15.4.1.8.4. VPLS Commands
15.4.1.8.5. VPRN Commands
15.4.1.9. Forwarding Plane HS Commands
15.4.1.10. Port Configuration HS Commands
15.4.1.11. LAG HS Commands
15.4.1.12. Operational Commands
15.4.1.13. Show Commands
15.4.1.14. Clear Commands
15.4.2. Command Descriptions
15.4.2.1. Configuration Commands
15.4.2.1.1. Generic Commands
15.4.2.2. HS Attachment Policy Commands
15.4.2.3. HS Pool Policy Commands
15.4.2.4. HS Port Pool Policy Commands
15.4.2.5. HS Scheduler Policy Commands
15.4.2.6. Network Queue HS Attachment Policy Commands
15.4.2.7. SAP Egress HS Attachment Policy Commands
15.4.2.8. Queue Group Template Policy HS Commands
15.4.2.9. Operational Commands
15.4.2.10. Show Commands
15.4.2.11. Clear Commands
16. QoS in MC-MLPPP
16.1. Overview
16.2. Ingress MLPPP Class Reassembly
16.3. Basic Configurations
16.3.1. Configuring MC-MLPPP
16.3.2. Configuring MC-MLPPP QoS Parameters
16.4. QoS in MLFR and FRF.12 Fragmentation
16.4.1. QoS in MLFR
16.4.2. QoS in FRF.12 End-to-End Fragmentation
16.5. MLPPP Command Reference
16.5.1. Command Hierarchies
16.5.1.1. Configuration Commands
16.5.2. Command Descriptions
16.5.2.1. Configuration Commands
16.5.2.1.1. MC-MLPPP Commands
17. Class Fair Hierarchical Policing (CFHP)
17.1. Overview
17.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
17.3. CFHP Ingress and Egress Use Cases
17.4. Post-CFHP Queuing and Scheduling
17.4.1. Ingress CFHP Queuing
17.4.2. Egress CFHP Queuing
17.4.2.1. Policer to Local Queue Mapping
17.4.3. Egress Subscriber CFHP Queuing
17.4.3.1. Subscriber Destination String Queue Group Identification
17.4.4. SAP Default Destination String
17.5. CFHP Policer Control Policy
17.5.1. Policer Control Policy Root Arbiter
17.5.2. Tier 1 and Tier 2 Explicit Arbiters
17.5.3. Explicit Arbiter Rate Limits
17.5.4. CFHP with Child Policer Exceed PIR Enabled
17.6. CFHP Child Policer Definition and Creation
17.7. Policer Enabled SAP QoS Policy Applicability
17.8. Child Policer Parent Association
17.9. Profile-Capped Policers
17.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
17.10.1. Ingress ‘Undefined’ Initial Profile
17.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
17.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
17.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
17.10.5. Egress Explicit Profile Reclassification
17.10.6. Preserving Out of Profile State at Egress Policer
17.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
17.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
17.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
17.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
17.10.11. Ingress Child Policer Stat-Mode
17.10.12. Egress Child Policer Stat-Mode
17.11. Profile-Preferred Mode Root Policers
17.12. Child Policer Hierarchical QoS Parenting
17.13. Class Fair Hierarchical Policing (CFHP) Policy Command Reference
17.13.1. Command Hierarchies
17.13.1.1. Class Fair Hierarchical Policing Commands
17.13.1.2. Operational Commands
17.13.1.3. Show Commands
17.13.2. Command Descriptions
17.13.2.1. Configuration Commands
17.13.2.1.1. Generic Commands
17.13.2.1.2. Class Fair Hierarchical Policing Commands
17.13.2.1.3. Operational Commands
17.13.2.1.4. Show Commands
18. Frequently Used QoS Terms
18.1. Overview
18.2. Above-CIR Distribution
18.3. Available Bandwidth
18.4. CBS
18.5. CIR
18.6. CIR Level
18.7. CIR Weight
18.8. Child
18.9. Level
18.10. MBS
18.11. Offered Load
18.12. Orphan
18.13. Parent
18.14. Queue
18.15. Rate
18.16. Root (Scheduler)
18.17. Scheduler Policy
18.18. Tier
18.19. Virtual Scheduler
18.20. Weight
18.21. Within-CIR Distribution
19. Standards and Protocol Support
Customer Document and Product Support
Quick Reference Card 20.7.R1
7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview 20.7.R1
7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview 20.7.R1
RADIUS Attributes Reference Guide 20.7.R1
1. RADIUS Attributes Reference
1.1. About this Guide
1.2. RADIUS Authentication Attributes
1.2.1. Subscriber Host Identification
1.2.1.1. [87] NAS-Port-Id Attribute Details
1.2.1.2. [26.6527.126] Alc-Subscriber-QoS-Override Attribute Details
1.2.1.3. [26.6527.238] Alc-Remove-Override Attribute Details
1.2.2. Wholesale-Retail — Local Access Mode
1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
1.2.4. Business Service Access
1.2.5. Accounting On-Line Charging
1.2.6. IP and IPv6 Filters
1.2.6.1. IP Filter Attribute Details
1.2.7. Subscriber Host Creation
1.2.8. Subscriber Services
1.2.9. GTP Uplink
1.2.10. WLAN Gateway
1.2.11. Virtual Residential Gateway
1.2.11.1. [241.26.6527.39] Alc-Static-Port-Forward Attribute Details
1.2.12. Bonding
1.2.13. Dynamic Data Services
1.2.14. Lawful Intercept
1.2.15. IPsec
1.2.16. Application Assurance
1.2.17. CLI User Authentication and Authorization
1.2.18. AAA Route Downloader
1.3. RADIUS Accounting Attributes
1.3.1. Enhanced Subscriber Management (ESM) Accounting
1.3.2. Distributed Subscriber Management (DSM) Accounting
1.3.3. Subscriber Service Accounting
1.3.4. Large Scale NAT (LSN) Accounting
1.3.5. L2TP Tunnel Accounting
1.3.6. Application Assurance (AA) Accounting
1.3.7. Dynamic Data Service accounting
1.3.8. CLI User Access Accounting
1.3.9. IPsec Accounting
1.3.10. Accounting Terminate Causes
1.3.11. Accounting Triggered Reason VSA Values
1.4. RADIUS CoA and Disconnect Message Attributes
1.4.1. Subscriber Host Identification Attributes
1.4.2. WLAN-GW migrant users Identification Attributes
1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
1.4.4. IPsec Tunnel Identification Attributes
1.4.5. Dynamic Data Services Identification Attributes
1.4.6. Overview of CoA Attributes
1.4.7. [101] Error-Cause Attribute Values
1.4.8. Deprecated attributes and attributes not applicable in SR OS
2. Standards and Protocol Support
Customer Document and Product Support
1. RADIUS Attributes Reference
1.1. About this Guide
1.2. RADIUS Authentication Attributes
1.2.1. Subscriber Host Identification
1.2.1.1. [87] NAS-Port-Id Attribute Details
1.2.1.2. [26.6527.126] Alc-Subscriber-QoS-Override Attribute Details
1.2.1.3. [26.6527.238] Alc-Remove-Override Attribute Details
1.2.2. Wholesale-Retail — Local Access Mode
1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
1.2.4. Business Service Access
1.2.5. Accounting On-Line Charging
1.2.6. IP and IPv6 Filters
1.2.6.1. IP Filter Attribute Details
1.2.7. Subscriber Host Creation
1.2.8. Subscriber Services
1.2.9. GTP Uplink
1.2.10. WLAN Gateway
1.2.11. Virtual Residential Gateway
1.2.11.1. [241.26.6527.39] Alc-Static-Port-Forward Attribute Details
1.2.12. Bonding
1.2.13. Dynamic Data Services
1.2.14. Lawful Intercept
1.2.15. IPsec
1.2.16. Application Assurance
1.2.17. CLI User Authentication and Authorization
1.2.18. AAA Route Downloader
1.3. RADIUS Accounting Attributes
1.3.1. Enhanced Subscriber Management (ESM) Accounting
1.3.2. Distributed Subscriber Management (DSM) Accounting
1.3.3. Subscriber Service Accounting
1.3.4. Large Scale NAT (LSN) Accounting
1.3.5. L2TP Tunnel Accounting
1.3.6. Application Assurance (AA) Accounting
1.3.7. Dynamic Data Service accounting
1.3.8. CLI User Access Accounting
1.3.9. IPsec Accounting
1.3.10. Accounting Terminate Causes
1.3.11. Accounting Triggered Reason VSA Values
1.4. RADIUS CoA and Disconnect Message Attributes
1.4.1. Subscriber Host Identification Attributes
1.4.2. WLAN-GW migrant users Identification Attributes
1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
1.4.4. IPsec Tunnel Identification Attributes
1.4.5. Dynamic Data Services Identification Attributes
1.4.6. Overview of CoA Attributes
1.4.7. [101] Error-Cause Attribute Values
1.4.8. Deprecated attributes and attributes not applicable in SR OS
2. Standards and Protocol Support
Customer Document and Product Support
Router Configuration Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface
2.1.1.2. Network Domains
2.1.1.3. System Interface
2.1.1.4. Unicast Reverse Path Forwarding Check
2.1.1.5. Creating an IP Address Range
2.1.1.6. QoS Policy Propagation Using BGP
2.1.1.6.1. QPPB Applications
2.1.1.6.2. Inter-AS Coordination of QoS Policies
2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
2.1.1.7. QPPB
2.1.1.7.1. Associating an FC and Priority with a Route
2.1.1.7.2. Displaying QoS Information Associated with Routes
2.1.1.7.3. Enabling QPPB on an IP interface
2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.1.1.7.5. QPPB and Multiple Paths to a Destination
2.1.1.7.6. QPPB and Policy-Based Routing
2.1.1.8. QPPB and GRT Lookup
2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.1.1.9. Configuring Interface Delay
2.1.2. Router ID
2.1.3. Autonomous Systems
2.1.4. Confederations
2.1.5. Proxy ARP
2.1.6. Exporting an Inactive BGP Route from a VPRN
2.1.7. DHCP Relay
2.1.8. Internet Protocol Versions
2.1.8.1. IPv6 Address Format
2.1.8.2. IPv6 Applications
2.1.8.3. DNS
2.1.8.3.1. DNS Resolution Using a VPRN
2.1.8.4. Secure Neighbor Discovery
2.1.8.5. SeND Persistent CGAs
2.1.8.5.1. Persistent RSA Key Pair
2.1.8.5.2. Persistent CGA Modifier
2.1.8.5.3. Making non-persistent CGAs persistent
2.1.8.5.4. Booting from a saved configuration file
2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.1.8.6.1. 6PE Control Plane Support
2.1.8.6.2. 6PE Data Plane Support
2.1.9. Static Route Resolution Using Tunnels
2.1.9.1. Static Route ECMP Support
2.1.9.2. Static Route using Flexible Algorithms Tunnels
2.2. Weighted Load Balancing over MPLS LSP
2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.2.1.1. Feature Configuration
2.2.1.2. Feature Behavior
2.2.1.3. ECMP Considerations
2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.2.1.4.1. Feature Configuration
2.2.1.4.2. Feature Behavior
2.2.2. Weighted Load Balancing for 6PE and BGP IPv4-Labeled Unicast Routes
2.2.3. Strict Weighted Load-Balancing
2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
2.3.1. Feature Configuration
2.3.2. Feature Behavior
2.3.3. Feature Limitations
2.3.4. Data Path Support
2.3.5. Example Configuration and Default CBF Set Election
2.4. Aggregate Next Hop
2.5. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.5.1. Invalidate Next-Hop Based on IPV4 ARP
2.5.1.1. Invalidate Next-Hop Based on Neighbor Cache State
2.6. LDP Shortcut for IGP Route Resolution
2.6.1. IGP Route Resolution
2.6.2. LDP-IGP Synchronization
2.6.3. LDP Shortcut Forwarding Plane
2.6.4. ECMP Considerations
2.6.5. Handling of Control Packets
2.6.6. Handling of Multicast Packets
2.6.7. Interaction with BGP Route Resolution to an LDP FEC
2.6.8. Interaction with Static Route Resolution to an LDP FEC
2.6.9. LDP Control Plane
2.7. Weighted Load-Balancing over Interface Next-hops
2.8. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
2.8.1. Feature Configuration
2.8.2. MPLS-over-GRE and IP-over-GRE Termination Function
2.8.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
2.8.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
2.8.5. LER and LSR Hashing Support
2.9. GRE Tunnel Overview
2.9.1. Sample GRE Tunnel Configurations
2.10. Router Interface Encryption with NGE
2.10.1. NGE Domains
2.10.1.1. Private IP/MPLS Network NGE Domain
2.10.1.2. Private Over Intermediary Network NGE Domain
2.10.2. Router Interface NGE Domain Concepts
2.10.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
2.10.4. EVPN-VXLAN Tunnels and Services
2.10.5. Router Encryption Exceptions using ACLs
2.10.6. IPsec Packets Crossing an NGE Domain
2.10.7. Multicast Packets Traversing the NGE Domain
2.10.8. Assigning Key Groups to Router Interfaces
2.10.9. NGE and BFD Support
2.10.10. NGE and ACL Interactions
2.10.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
2.10.12. 1588v2 Encryption With NGE
2.11. Process Overview
2.12. Configuration Notes
2.13. Configuring an IP Router with CLI
2.13.1. Router Configuration Overview
2.13.1.1. System Interface
2.13.1.2. Network Interface
2.13.2. Basic Configuration
2.13.3. Common Configuration Tasks
2.13.3.1. Configuring a System Name
2.13.3.2. Configuring Interfaces
2.13.3.2.1. Configuring a System Interface
2.13.3.2.2. Configuring a Network Interface
2.13.3.2.3. Assigning a Key Group to a Router Interface
2.13.3.2.4. Configuring IPv6 Parameters
2.13.3.2.5. Configuring IPv6 Over IPv4 Parameters
2.13.3.2.6. Tunnel Ingress Node
2.13.3.2.7. Tunnel Egress Node
2.13.3.2.8. Router Advertisement
2.13.3.2.9. Configuring IPv6 Parameters
2.13.3.2.10. Configuring Proxy ARP
2.13.3.2.11. Creating an IP Address Range
2.13.3.3. Deriving the Router ID
2.13.3.4. Configuring a Confederation
2.13.3.5. Configuring an Autonomous System
2.13.3.6. Configuring Overload State on a Single SFM
2.14. Service Management Tasks
2.14.1. Changing the System Name
2.14.2. Modifying Interface Parameters
2.14.3. Removing a Key Group from a Router Interface
2.14.4. Changing the Key Group for a Router Interface
2.14.5. Deleting a Logical IP Interface
2.15. IP Router Configuration Command Reference
2.15.1. Command Hierarchies
2.15.1.1. Router Commands
2.15.1.2. Router BFD Commands
2.15.1.3. Router Interface Commands
2.15.1.4. Router Interface IPv6 Commands
2.15.1.5. Router Advertisement Commands
2.15.1.6. Router PCP Server Commands
2.15.1.7. Router Policy Accounting Template Commands
2.15.1.8. Flexible Algorithm Definitions Commands
2.15.2. Command Descriptions
2.15.2.1. Generic Commands
2.15.2.2. Router Global Commands
2.15.2.3. Router Interface Commands
2.15.2.3.1. Router Interface Filter Commands
2.15.2.3.2. Router Interface ICMP Commands
2.15.2.3.3. Router Interface IPv6 Commands
2.15.2.3.4. Router Interface DHCP Commands
2.15.2.4. Router Interface Encryption Commands
2.15.2.5. Router Advertisement Commands
2.15.2.6. Router PCP Server Commands
2.15.2.7. Router Policy Accounting Template Commands
2.15.2.8. Flexible Algorithm Definitions Commands
2.16. Show, Clear, and Debug Command Reference
2.16.1. Command Hierarchies
2.16.1.1. Show Commands
2.16.1.2. Clear Commands
2.16.1.3. Debug Commands
2.16.1.4. Tools Commands
2.16.2. Command Descriptions
2.16.2.1. Show Commands
2.16.2.2. Clear Commands
2.16.2.3. Debug Commands
2.16.2.4. Tools Commands
3. VRRP
3.1. VRRP Overview
3.2. VRRP Components
3.2.1. Virtual Router
3.2.2. IP Address Owner
3.2.3. Primary and Secondary IP Addresses
3.2.4. Virtual Router Master
3.2.5. Virtual Router Backup
3.2.6. Owner and Non-Owner VRRP
3.2.7. Configurable Parameters
3.2.7.1. Virtual Router ID (VRID)
3.2.7.2. Priority
3.2.7.3. IP Addresses
3.2.7.4. Message Interval and Master Inheritance
3.2.7.5. Skew Time
3.2.7.6. Master Down Interval
3.2.7.7. Preempt Mode
3.2.7.8. VRRP Message Authentication
3.2.7.8.1. Authentication Type 0 – No Authentication
3.2.7.8.2. Authentication Type 1 – Simple Text Password
3.2.7.8.3. Authentication Failure
3.2.7.9. Authentication Data
3.2.7.10. Virtual MAC Address
3.2.7.11. VRRP Advertisement Message IP Address List Verification
3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.2.7.13. IPv6 Virtual Router Instance Operationally Up
3.2.7.14. Policies
3.3. VRRP Priority Control Policies
3.3.1. VRRP Virtual Router Policy Constraints
3.3.2. VRRP Virtual Router Instance Base Priority
3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.3.4. VRRP Priority Control Policy Priority Events
3.3.4.1. Priority Event Hold-Set Timers
3.3.4.2. Port Down Priority Event
3.3.4.3. LAG Degrade Priority Event
3.3.4.4. Host Unreachable Priority Event
3.3.4.5. Route Unknown Priority Event
3.4. VRRP Non-Owner Accessibility
3.4.1. Non-Owner Access Ping Reply
3.4.2. Non-Owner Access Telnet
3.4.3. Non-Owner Access SSH
3.5. VRRP Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.7. Configuring VRRP with CLI
3.7.1. VRRP Configuration Overview
3.7.1.1. Preconfiguration Requirements
3.7.2. Basic VRRP Configurations
3.7.2.1. VRRP Policy
3.7.2.2. VRRP IES Service Parameters
3.7.2.2.1. Configure VRRP for IPv6
3.7.2.3. VRRP Router Interface Parameters
3.7.3. Common Configuration Tasks
3.7.3.1. Creating Interface Parameters
3.7.4. Configuring VRRP Policy Components
3.7.4.1. Configuring Service VRRP Parameters
3.7.4.1.1. Non-Owner VRRP Example
3.7.4.1.2. Owner Service VRRP
3.7.4.2. Configuring Router Interface VRRP Parameters
3.7.4.2.1. Router Interface VRRP Non-Owner
3.7.4.2.2. Router Interface VRRP Owner
3.8. VRRP Configuration Management Tasks
3.8.1. Modifying a VRRP Policy
3.8.1.1. Deleting a VRRP Policy
3.8.2. Modifying Service and Interface VRRP Parameters
3.8.2.1. Modifying Non-Owner Parameters
3.8.2.2. Modifying Owner Parameters
3.8.2.3. Deleting VRRP from an Interface or Service
3.9. VRRP Configuration Command Reference
3.9.1. Command Hierarchies
3.9.1.1. IPv4 Interface VRRP Commands
3.9.1.2. IPv6 Interface VRRP Commands
3.9.1.3. Priority Control Event Policy Commands
3.9.2. Command Descriptions
3.9.2.1. Interface Configuration Commands
3.9.2.2. Priority Control Event Policy Commands
3.10. Show, Monitor, Clear, and Debug Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Show Commands
3.10.1.2. Monitor Commands
3.10.1.3. Clear Commands
3.10.1.4. Debug Commands
3.10.2. Command Descriptions
3.10.2.1. Show Commands
3.10.2.2. Monitor Commands
3.10.2.3. Clear Commands
3.10.2.4. Debug Commands
4. Filter Policies
4.1. ACL Filter Policy Overview
4.1.1. Filter Policy Basics
4.1.1.1. Filter Policy Packet Match Criteria
4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.1.1.3. MAC Filter Policy Entry Match Criteria
4.1.1.4. IP Exception Filters
4.1.1.5. Filter Policy Actions
4.1.1.6. Viewing Filter Policy Actions
4.1.1.7. Filter Policy Statistics
4.1.1.8. Filter Policy Logging
4.1.1.9. Filter Policy cflowd Sampling
4.1.1.10. Filter Policy Management
4.1.1.10.1. Modifying Existing Filter Policy
4.1.1.10.2. Filter Policy Copy and Renumbering
4.1.2. Filter Policy Advanced Topics
4.1.2.1. Match List for Filter Policies
4.1.2.1.1. Apply-Path
4.1.2.1.2. Prefix-exclude
4.1.2.2. Filter Policy Scope and Embedded Filters
4.1.2.3. Filter Policy Type
4.1.2.3.1. IPv4, IPv6 Filter Type Src-Mac
4.1.2.3.2. IPv4, IPv6 Filter Type Packet-Length
4.1.2.3.3. IPv4, IPv6 Filter Type Destination-Class
4.1.2.3.4. IPv4 and IPv6 Filter Type and Embedding
4.1.2.4. Filter Policies and Dynamic Policy-Driven Interfaces
4.1.2.5. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.1.2.6. Extended Action for Performing Two Actions at a Time
4.1.2.7. Advanced VPRN Redirection
4.1.2.8. Destination MAC Rewrite When Deploying Policy-Based Forwarding
4.1.2.9. Network-port VPRN Filter Policy
4.1.2.10. ISID MAC Filters
4.1.2.11. VID MAC Filters
4.1.2.11.1. Arbitrary Bit Matching of VID Filters
4.1.2.11.2. Port Group Configuration Example
4.1.2.12. IP Exception Filters
4.1.2.13. Redirect Policies
4.1.2.13.1. Router Instance Support for Redirect Policies
4.1.2.13.2. Binding Redirect Policies
4.1.2.14. HTTP-Redirect (Captive Portal)
4.1.2.14.1. Traffic Flow
4.1.2.15. Filter Policy-based ESM Service Chaining
4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
4.1.2.17. Storing Filter Entries
4.1.2.17.1. FP4-based Cards
4.2. Configuring Filter Policies with CLI
4.2.1. Common Configuration Tasks
4.2.1.1. Creating an IPv4 Filter Policy
4.2.1.1.1. IPv4 Filter Entry
4.2.1.2. Creating an IPv6 Filter Policy
4.2.1.3. Creating a MAC Filter Policy
4.2.1.3.1. MAC Filter Policy
4.2.1.3.2. MAC ISID Filter Policy
4.2.1.3.3. MAC VID Filter Policy
4.2.1.3.4. MAC Filter Entry
4.2.1.4. Creating an IPv4 Exception Filter Policy
4.2.1.4.1. IP Exception Filter Policy
4.2.1.4.2. IP Exception Entry Matching Criteria
4.2.1.5. Creating an IPv6 Exception Filter Policy
4.2.1.5.1. IPv6 Exception Filter Policy
4.2.1.5.2. IPv6 Exception Entry Matching Criteria
4.2.1.6. Creating a Match List for Filter Policies
4.2.1.7. Applying Filter Policies
4.2.1.7.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
4.2.1.7.2. Applying IPv4/IPv6 Filter Policies to a Network Port
4.2.1.8. Creating a Redirect Policy
4.2.1.9. Configuring Filter-Based GRE Tunneling
4.3. Filter Management Tasks
4.3.1. Renumbering Filter Policy Entries
4.3.2. Modifying a Filter Policy
4.3.3. Deleting a Filter Policy
4.3.4. Modifying a Redirect Policy
4.3.5. Deleting a Redirect Policy
4.3.6. Copying Filter Policies
4.4. Filter Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. IPv4 Filter Policy Commands
4.4.1.2. IPv6 Filter Policy Commands
4.4.1.3. MAC Filter Commands
4.4.1.4. GRE Tunnel Template Configuration Commands
4.4.1.5. System Filter Policy Commands
4.4.1.6. Redirect Policy Configuration Commands
4.4.1.7. Match Filter List Commands
4.4.1.8. Log Filter Commands
4.4.1.9. Copy Filter Commands
4.4.1.10. Model-Driven Automatic ID Commands
4.4.2. Command Descriptions
4.4.2.1. Generic Commands
4.4.2.2. IPv4 Filter Policy Commands
4.4.2.3. IPv6 Filter Policy Commands
4.4.2.4. MAC Filter Commands
4.4.2.5. GRE Tunnel Template Configuration Commands
4.4.2.6. System Filter Policy Commands
4.4.2.7. Redirect Policy Configuration Commands
4.4.2.8. Match Filter List Commands
4.4.2.9. Log Filter Commands
4.4.2.10. Copy Filter Commands
4.4.2.11. Model-Driven Automatic ID Commands
4.5. Show, Clear, Monitor, and Tools Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Monitor Commands
4.5.1.4. Tools Commands
4.5.2. Command Descriptions
4.5.2.1. Show Commands
4.5.2.2. Clear Commands
4.5.2.3. Monitor Commands
4.5.2.4. Tools Commands
5. Hybrid OpenFlow Switch
5.1. Hybrid OpenFlow Switching
5.1.1. Redundant Controllers and Multiple Switch Instances
5.1.2. GRT-only and Multi-Service H-OFS Modes of Operations
5.1.2.1. Port and VLAN ID Match in Flow Table Entries
5.1.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.1.4. Hybrid OpenFlow Switch Statistics
5.1.5. OpenFlow Switch Auxiliary Channels
5.1.6. Hybrid OpenFlow Switch Traffic Steering Details
5.1.6.1. SR OS H-OFS Logical Port
5.1.6.2. SR OS H-OFS Port and VLAN Encoding
5.1.6.3. Redirect to IP next-hop
5.1.6.4. Redirect to GRT Instance or VRF Instance
5.1.6.5. Redirect to Next-hop and VRF/GRT Instance
5.1.6.6. Redirect to ESI (L2)
5.1.6.7. Redirect to ESI (L3)
5.1.6.8. Redirect to ESI IP VAS-Interface Router
5.1.6.9. Redirect to LSP
5.1.6.10. Redirect to NAT
5.1.6.11. Redirect to SAP
5.1.6.12. Redirect to SDP
5.1.6.13. Redirect to a Specific LSP Used by a VPRN Service
5.1.6.14. Forward Action
5.1.6.15. Drop Action
5.1.6.16. Default No-match Action
5.1.6.17. Programming of DSCP Remark Action
5.1.7. Support for Secondary Actions for PBR/PBF Redundancy
5.2. Configuration Notes
5.3. OpenFlow Command Reference
5.3.1. Command Hierarchies
5.3.1.1. OpenFlow Commands
5.3.1.2. Show Commands
5.3.1.3. Clear Commands
5.3.1.4. Tools Commands
5.3.2. Command Descriptions
5.3.2.1. OpenFlow Commands
5.3.2.2. Show Commands
5.3.2.3. Clear Commands
5.3.2.4. Tools Commands
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.1.1. Version 8
6.1.1.2. Version 9
6.1.1.3. Version 10
6.1.2. Cflowd Filter Matching
6.2. Cflowd Configuration Process Overview
6.3. Configuration Notes
6.4. Configuring Cflowd with CLI
6.4.1. Cflowd Configuration Overview
6.4.1.1. Traffic Sampling
6.4.1.2. Collectors
6.4.1.2.1. Aggregation
6.4.2. Basic Cflowd Configuration
6.4.3. Common Configuration Tasks
6.4.3.1. Global Cflowd Components
6.4.3.2. Enabling Cflowd
6.4.3.3. Configuring Global Cflowd Parameters
6.4.3.4. Configuring Cflowd Collectors
6.4.3.4.1. Version 9 and Version 10 Templates
6.4.3.5. Specifying Cflowd Options on an IP Interface
6.4.3.5.1. Interface Configurations
6.4.3.5.2. Service Interfaces
6.4.3.6. Specifying Sampling Options in Filter Entries
6.4.3.6.1. Filter Configurations
6.4.3.6.2. Dependencies
6.5. Cflowd Configuration Management Tasks
6.5.1. Modifying Global Cflowd Components
6.5.2. Modifying Cflowd Collector Parameters
6.6. Cflowd Configuration Command Reference
6.6.1. Command Hierarchies
6.6.2. Command Descriptions
6.6.2.1. Global Commands
6.7. Show, Tools, and Clear Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.1.2. Tools Commands
6.7.1.3. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
6.7.2.2. Tools Commands
6.7.2.3. Clear Commands
7. gRPC-based RIB API
7.1. RIB/FIB API Overview
7.2. RIB/FIB API Fundamentals
7.2.1. RIB/FIB API Entry Persistence
7.3. RIB/FIB API Configuration Overview
7.4. RIB/FIB API - IPv4 Route Table Programming
7.5. RIB/FIB API - IPv6 Route Table Programming
7.6. RIB/FIB API - IPv4 Tunnel Table Programming
7.7. RIB/FIB API - IPv6 Tunnel Table Programming
7.8. RIB/FIB API - MPLS LFIB Programming
7.9. RIB/FIB API - Using Next-Hop-Groups, Primary Next Hops, and Backup Next Hops
7.10. RIB/FIB API - State and Telemetry
7.11. Traffic Statistics
7.11.1. Ingress statistics
7.11.2. Egress statistics
7.12. Show, Clear, Monitor, and Tools Command Reference
7.12.1. Command Hierarchies
7.12.1.1. Show Commands
7.12.1.2. Clear Commands
7.12.1.3. Debug Commands
7.12.1.4. Monitor Commands
7.12.1.5. Tools Commands
7.12.2. Command Descriptions
7.12.2.1. Show Commands
7.12.2.2. Clear Commands
7.12.2.3. Debug Commands
7.12.2.4. Monitor Commands
7.12.2.5. Tools Commands
8. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface
2.1.1.2. Network Domains
2.1.1.3. System Interface
2.1.1.4. Unicast Reverse Path Forwarding Check
2.1.1.5. Creating an IP Address Range
2.1.1.6. QoS Policy Propagation Using BGP
2.1.1.6.1. QPPB Applications
2.1.1.6.2. Inter-AS Coordination of QoS Policies
2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
2.1.1.7. QPPB
2.1.1.7.1. Associating an FC and Priority with a Route
2.1.1.7.2. Displaying QoS Information Associated with Routes
2.1.1.7.3. Enabling QPPB on an IP interface
2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.1.1.7.5. QPPB and Multiple Paths to a Destination
2.1.1.7.6. QPPB and Policy-Based Routing
2.1.1.8. QPPB and GRT Lookup
2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.1.1.9. Configuring Interface Delay
2.1.2. Router ID
2.1.3. Autonomous Systems
2.1.4. Confederations
2.1.5. Proxy ARP
2.1.6. Exporting an Inactive BGP Route from a VPRN
2.1.7. DHCP Relay
2.1.8. Internet Protocol Versions
2.1.8.1. IPv6 Address Format
2.1.8.2. IPv6 Applications
2.1.8.3. DNS
2.1.8.3.1. DNS Resolution Using a VPRN
2.1.8.4. Secure Neighbor Discovery
2.1.8.5. SeND Persistent CGAs
2.1.8.5.1. Persistent RSA Key Pair
2.1.8.5.2. Persistent CGA Modifier
2.1.8.5.3. Making non-persistent CGAs persistent
2.1.8.5.4. Booting from a saved configuration file
2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.1.8.6.1. 6PE Control Plane Support
2.1.8.6.2. 6PE Data Plane Support
2.1.9. Static Route Resolution Using Tunnels
2.1.9.1. Static Route ECMP Support
2.1.9.2. Static Route using Flexible Algorithms Tunnels
2.2. Weighted Load Balancing over MPLS LSP
2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.2.1.1. Feature Configuration
2.2.1.2. Feature Behavior
2.2.1.3. ECMP Considerations
2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.2.1.4.1. Feature Configuration
2.2.1.4.2. Feature Behavior
2.2.2. Weighted Load Balancing for 6PE and BGP IPv4-Labeled Unicast Routes
2.2.3. Strict Weighted Load-Balancing
2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
2.3.1. Feature Configuration
2.3.2. Feature Behavior
2.3.3. Feature Limitations
2.3.4. Data Path Support
2.3.5. Example Configuration and Default CBF Set Election
2.4. Aggregate Next Hop
2.5. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.5.1. Invalidate Next-Hop Based on IPV4 ARP
2.5.1.1. Invalidate Next-Hop Based on Neighbor Cache State
2.6. LDP Shortcut for IGP Route Resolution
2.6.1. IGP Route Resolution
2.6.2. LDP-IGP Synchronization
2.6.3. LDP Shortcut Forwarding Plane
2.6.4. ECMP Considerations
2.6.5. Handling of Control Packets
2.6.6. Handling of Multicast Packets
2.6.7. Interaction with BGP Route Resolution to an LDP FEC
2.6.8. Interaction with Static Route Resolution to an LDP FEC
2.6.9. LDP Control Plane
2.7. Weighted Load-Balancing over Interface Next-hops
2.8. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
2.8.1. Feature Configuration
2.8.2. MPLS-over-GRE and IP-over-GRE Termination Function
2.8.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
2.8.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
2.8.5. LER and LSR Hashing Support
2.9. GRE Tunnel Overview
2.9.1. Sample GRE Tunnel Configurations
2.10. Router Interface Encryption with NGE
2.10.1. NGE Domains
2.10.1.1. Private IP/MPLS Network NGE Domain
2.10.1.2. Private Over Intermediary Network NGE Domain
2.10.2. Router Interface NGE Domain Concepts
2.10.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
2.10.4. EVPN-VXLAN Tunnels and Services
2.10.5. Router Encryption Exceptions using ACLs
2.10.6. IPsec Packets Crossing an NGE Domain
2.10.7. Multicast Packets Traversing the NGE Domain
2.10.8. Assigning Key Groups to Router Interfaces
2.10.9. NGE and BFD Support
2.10.10. NGE and ACL Interactions
2.10.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
2.10.12. 1588v2 Encryption With NGE
2.11. Process Overview
2.12. Configuration Notes
2.13. Configuring an IP Router with CLI
2.13.1. Router Configuration Overview
2.13.1.1. System Interface
2.13.1.2. Network Interface
2.13.2. Basic Configuration
2.13.3. Common Configuration Tasks
2.13.3.1. Configuring a System Name
2.13.3.2. Configuring Interfaces
2.13.3.2.1. Configuring a System Interface
2.13.3.2.2. Configuring a Network Interface
2.13.3.2.3. Assigning a Key Group to a Router Interface
2.13.3.2.4. Configuring IPv6 Parameters
2.13.3.2.5. Configuring IPv6 Over IPv4 Parameters
2.13.3.2.6. Tunnel Ingress Node
2.13.3.2.7. Tunnel Egress Node
2.13.3.2.8. Router Advertisement
2.13.3.2.9. Configuring IPv6 Parameters
2.13.3.2.10. Configuring Proxy ARP
2.13.3.2.11. Creating an IP Address Range
2.13.3.3. Deriving the Router ID
2.13.3.4. Configuring a Confederation
2.13.3.5. Configuring an Autonomous System
2.13.3.6. Configuring Overload State on a Single SFM
2.14. Service Management Tasks
2.14.1. Changing the System Name
2.14.2. Modifying Interface Parameters
2.14.3. Removing a Key Group from a Router Interface
2.14.4. Changing the Key Group for a Router Interface
2.14.5. Deleting a Logical IP Interface
2.15. IP Router Configuration Command Reference
2.15.1. Command Hierarchies
2.15.1.1. Router Commands
2.15.1.2. Router BFD Commands
2.15.1.3. Router Interface Commands
2.15.1.4. Router Interface IPv6 Commands
2.15.1.5. Router Advertisement Commands
2.15.1.6. Router PCP Server Commands
2.15.1.7. Router Policy Accounting Template Commands
2.15.1.8. Flexible Algorithm Definitions Commands
2.15.2. Command Descriptions
2.15.2.1. Generic Commands
2.15.2.2. Router Global Commands
2.15.2.3. Router Interface Commands
2.15.2.3.1. Router Interface Filter Commands
2.15.2.3.2. Router Interface ICMP Commands
2.15.2.3.3. Router Interface IPv6 Commands
2.15.2.3.4. Router Interface DHCP Commands
2.15.2.4. Router Interface Encryption Commands
2.15.2.5. Router Advertisement Commands
2.15.2.6. Router PCP Server Commands
2.15.2.7. Router Policy Accounting Template Commands
2.15.2.8. Flexible Algorithm Definitions Commands
2.16. Show, Clear, and Debug Command Reference
2.16.1. Command Hierarchies
2.16.1.1. Show Commands
2.16.1.2. Clear Commands
2.16.1.3. Debug Commands
2.16.1.4. Tools Commands
2.16.2. Command Descriptions
2.16.2.1. Show Commands
2.16.2.2. Clear Commands
2.16.2.3. Debug Commands
2.16.2.4. Tools Commands
3. VRRP
3.1. VRRP Overview
3.2. VRRP Components
3.2.1. Virtual Router
3.2.2. IP Address Owner
3.2.3. Primary and Secondary IP Addresses
3.2.4. Virtual Router Master
3.2.5. Virtual Router Backup
3.2.6. Owner and Non-Owner VRRP
3.2.7. Configurable Parameters
3.2.7.1. Virtual Router ID (VRID)
3.2.7.2. Priority
3.2.7.3. IP Addresses
3.2.7.4. Message Interval and Master Inheritance
3.2.7.5. Skew Time
3.2.7.6. Master Down Interval
3.2.7.7. Preempt Mode
3.2.7.8. VRRP Message Authentication
3.2.7.8.1. Authentication Type 0 – No Authentication
3.2.7.8.2. Authentication Type 1 – Simple Text Password
3.2.7.8.3. Authentication Failure
3.2.7.9. Authentication Data
3.2.7.10. Virtual MAC Address
3.2.7.11. VRRP Advertisement Message IP Address List Verification
3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.2.7.13. IPv6 Virtual Router Instance Operationally Up
3.2.7.14. Policies
3.3. VRRP Priority Control Policies
3.3.1. VRRP Virtual Router Policy Constraints
3.3.2. VRRP Virtual Router Instance Base Priority
3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.3.4. VRRP Priority Control Policy Priority Events
3.3.4.1. Priority Event Hold-Set Timers
3.3.4.2. Port Down Priority Event
3.3.4.3. LAG Degrade Priority Event
3.3.4.4. Host Unreachable Priority Event
3.3.4.5. Route Unknown Priority Event
3.4. VRRP Non-Owner Accessibility
3.4.1. Non-Owner Access Ping Reply
3.4.2. Non-Owner Access Telnet
3.4.3. Non-Owner Access SSH
3.5. VRRP Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.7. Configuring VRRP with CLI
3.7.1. VRRP Configuration Overview
3.7.1.1. Preconfiguration Requirements
3.7.2. Basic VRRP Configurations
3.7.2.1. VRRP Policy
3.7.2.2. VRRP IES Service Parameters
3.7.2.2.1. Configure VRRP for IPv6
3.7.2.3. VRRP Router Interface Parameters
3.7.3. Common Configuration Tasks
3.7.3.1. Creating Interface Parameters
3.7.4. Configuring VRRP Policy Components
3.7.4.1. Configuring Service VRRP Parameters
3.7.4.1.1. Non-Owner VRRP Example
3.7.4.1.2. Owner Service VRRP
3.7.4.2. Configuring Router Interface VRRP Parameters
3.7.4.2.1. Router Interface VRRP Non-Owner
3.7.4.2.2. Router Interface VRRP Owner
3.8. VRRP Configuration Management Tasks
3.8.1. Modifying a VRRP Policy
3.8.1.1. Deleting a VRRP Policy
3.8.2. Modifying Service and Interface VRRP Parameters
3.8.2.1. Modifying Non-Owner Parameters
3.8.2.2. Modifying Owner Parameters
3.8.2.3. Deleting VRRP from an Interface or Service
3.9. VRRP Configuration Command Reference
3.9.1. Command Hierarchies
3.9.1.1. IPv4 Interface VRRP Commands
3.9.1.2. IPv6 Interface VRRP Commands
3.9.1.3. Priority Control Event Policy Commands
3.9.2. Command Descriptions
3.9.2.1. Interface Configuration Commands
3.9.2.2. Priority Control Event Policy Commands
3.10. Show, Monitor, Clear, and Debug Command Reference
3.10.1. Command Hierarchies
3.10.1.1. Show Commands
3.10.1.2. Monitor Commands
3.10.1.3. Clear Commands
3.10.1.4. Debug Commands
3.10.2. Command Descriptions
3.10.2.1. Show Commands
3.10.2.2. Monitor Commands
3.10.2.3. Clear Commands
3.10.2.4. Debug Commands
4. Filter Policies
4.1. ACL Filter Policy Overview
4.1.1. Filter Policy Basics
4.1.1.1. Filter Policy Packet Match Criteria
4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.1.1.3. MAC Filter Policy Entry Match Criteria
4.1.1.4. IP Exception Filters
4.1.1.5. Filter Policy Actions
4.1.1.6. Viewing Filter Policy Actions
4.1.1.7. Filter Policy Statistics
4.1.1.8. Filter Policy Logging
4.1.1.9. Filter Policy cflowd Sampling
4.1.1.10. Filter Policy Management
4.1.1.10.1. Modifying Existing Filter Policy
4.1.1.10.2. Filter Policy Copy and Renumbering
4.1.2. Filter Policy Advanced Topics
4.1.2.1. Match List for Filter Policies
4.1.2.1.1. Apply-Path
4.1.2.1.2. Prefix-exclude
4.1.2.2. Filter Policy Scope and Embedded Filters
4.1.2.3. Filter Policy Type
4.1.2.3.1. IPv4, IPv6 Filter Type Src-Mac
4.1.2.3.2. IPv4, IPv6 Filter Type Packet-Length
4.1.2.3.3. IPv4, IPv6 Filter Type Destination-Class
4.1.2.3.4. IPv4 and IPv6 Filter Type and Embedding
4.1.2.4. Filter Policies and Dynamic Policy-Driven Interfaces
4.1.2.5. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.1.2.6. Extended Action for Performing Two Actions at a Time
4.1.2.7. Advanced VPRN Redirection
4.1.2.8. Destination MAC Rewrite When Deploying Policy-Based Forwarding
4.1.2.9. Network-port VPRN Filter Policy
4.1.2.10. ISID MAC Filters
4.1.2.11. VID MAC Filters
4.1.2.11.1. Arbitrary Bit Matching of VID Filters
4.1.2.11.2. Port Group Configuration Example
4.1.2.12. IP Exception Filters
4.1.2.13. Redirect Policies
4.1.2.13.1. Router Instance Support for Redirect Policies
4.1.2.13.2. Binding Redirect Policies
4.1.2.14. HTTP-Redirect (Captive Portal)
4.1.2.14.1. Traffic Flow
4.1.2.15. Filter Policy-based ESM Service Chaining
4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
4.1.2.17. Storing Filter Entries
4.1.2.17.1. FP4-based Cards
4.2. Configuring Filter Policies with CLI
4.2.1. Common Configuration Tasks
4.2.1.1. Creating an IPv4 Filter Policy
4.2.1.1.1. IPv4 Filter Entry
4.2.1.2. Creating an IPv6 Filter Policy
4.2.1.3. Creating a MAC Filter Policy
4.2.1.3.1. MAC Filter Policy
4.2.1.3.2. MAC ISID Filter Policy
4.2.1.3.3. MAC VID Filter Policy
4.2.1.3.4. MAC Filter Entry
4.2.1.4. Creating an IPv4 Exception Filter Policy
4.2.1.4.1. IP Exception Filter Policy
4.2.1.4.2. IP Exception Entry Matching Criteria
4.2.1.5. Creating an IPv6 Exception Filter Policy
4.2.1.5.1. IPv6 Exception Filter Policy
4.2.1.5.2. IPv6 Exception Entry Matching Criteria
4.2.1.6. Creating a Match List for Filter Policies
4.2.1.7. Applying Filter Policies
4.2.1.7.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
4.2.1.7.2. Applying IPv4/IPv6 Filter Policies to a Network Port
4.2.1.8. Creating a Redirect Policy
4.2.1.9. Configuring Filter-Based GRE Tunneling
4.3. Filter Management Tasks
4.3.1. Renumbering Filter Policy Entries
4.3.2. Modifying a Filter Policy
4.3.3. Deleting a Filter Policy
4.3.4. Modifying a Redirect Policy
4.3.5. Deleting a Redirect Policy
4.3.6. Copying Filter Policies
4.4. Filter Configuration Command Reference
4.4.1. Command Hierarchies
4.4.1.1. IPv4 Filter Policy Commands
4.4.1.2. IPv6 Filter Policy Commands
4.4.1.3. MAC Filter Commands
4.4.1.4. GRE Tunnel Template Configuration Commands
4.4.1.5. System Filter Policy Commands
4.4.1.6. Redirect Policy Configuration Commands
4.4.1.7. Match Filter List Commands
4.4.1.8. Log Filter Commands
4.4.1.9. Copy Filter Commands
4.4.1.10. Model-Driven Automatic ID Commands
4.4.2. Command Descriptions
4.4.2.1. Generic Commands
4.4.2.2. IPv4 Filter Policy Commands
4.4.2.3. IPv6 Filter Policy Commands
4.4.2.4. MAC Filter Commands
4.4.2.5. GRE Tunnel Template Configuration Commands
4.4.2.6. System Filter Policy Commands
4.4.2.7. Redirect Policy Configuration Commands
4.4.2.8. Match Filter List Commands
4.4.2.9. Log Filter Commands
4.4.2.10. Copy Filter Commands
4.4.2.11. Model-Driven Automatic ID Commands
4.5. Show, Clear, Monitor, and Tools Command Reference
4.5.1. Command Hierarchies
4.5.1.1. Show Commands
4.5.1.2. Clear Commands
4.5.1.3. Monitor Commands
4.5.1.4. Tools Commands
4.5.2. Command Descriptions
4.5.2.1. Show Commands
4.5.2.2. Clear Commands
4.5.2.3. Monitor Commands
4.5.2.4. Tools Commands
5. Hybrid OpenFlow Switch
5.1. Hybrid OpenFlow Switching
5.1.1. Redundant Controllers and Multiple Switch Instances
5.1.2. GRT-only and Multi-Service H-OFS Modes of Operations
5.1.2.1. Port and VLAN ID Match in Flow Table Entries
5.1.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.1.4. Hybrid OpenFlow Switch Statistics
5.1.5. OpenFlow Switch Auxiliary Channels
5.1.6. Hybrid OpenFlow Switch Traffic Steering Details
5.1.6.1. SR OS H-OFS Logical Port
5.1.6.2. SR OS H-OFS Port and VLAN Encoding
5.1.6.3. Redirect to IP next-hop
5.1.6.4. Redirect to GRT Instance or VRF Instance
5.1.6.5. Redirect to Next-hop and VRF/GRT Instance
5.1.6.6. Redirect to ESI (L2)
5.1.6.7. Redirect to ESI (L3)
5.1.6.8. Redirect to ESI IP VAS-Interface Router
5.1.6.9. Redirect to LSP
5.1.6.10. Redirect to NAT
5.1.6.11. Redirect to SAP
5.1.6.12. Redirect to SDP
5.1.6.13. Redirect to a Specific LSP Used by a VPRN Service
5.1.6.14. Forward Action
5.1.6.15. Drop Action
5.1.6.16. Default No-match Action
5.1.6.17. Programming of DSCP Remark Action
5.1.7. Support for Secondary Actions for PBR/PBF Redundancy
5.2. Configuration Notes
5.3. OpenFlow Command Reference
5.3.1. Command Hierarchies
5.3.1.1. OpenFlow Commands
5.3.1.2. Show Commands
5.3.1.3. Clear Commands
5.3.1.4. Tools Commands
5.3.2. Command Descriptions
5.3.2.1. OpenFlow Commands
5.3.2.2. Show Commands
5.3.2.3. Clear Commands
5.3.2.4. Tools Commands
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.1.1. Version 8
6.1.1.2. Version 9
6.1.1.3. Version 10
6.1.2. Cflowd Filter Matching
6.2. Cflowd Configuration Process Overview
6.3. Configuration Notes
6.4. Configuring Cflowd with CLI
6.4.1. Cflowd Configuration Overview
6.4.1.1. Traffic Sampling
6.4.1.2. Collectors
6.4.1.2.1. Aggregation
6.4.2. Basic Cflowd Configuration
6.4.3. Common Configuration Tasks
6.4.3.1. Global Cflowd Components
6.4.3.2. Enabling Cflowd
6.4.3.3. Configuring Global Cflowd Parameters
6.4.3.4. Configuring Cflowd Collectors
6.4.3.4.1. Version 9 and Version 10 Templates
6.4.3.5. Specifying Cflowd Options on an IP Interface
6.4.3.5.1. Interface Configurations
6.4.3.5.2. Service Interfaces
6.4.3.6. Specifying Sampling Options in Filter Entries
6.4.3.6.1. Filter Configurations
6.4.3.6.2. Dependencies
6.5. Cflowd Configuration Management Tasks
6.5.1. Modifying Global Cflowd Components
6.5.2. Modifying Cflowd Collector Parameters
6.6. Cflowd Configuration Command Reference
6.6.1. Command Hierarchies
6.6.2. Command Descriptions
6.6.2.1. Global Commands
6.7. Show, Tools, and Clear Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.1.2. Tools Commands
6.7.1.3. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
6.7.2.2. Tools Commands
6.7.2.3. Clear Commands
7. gRPC-based RIB API
7.1. RIB/FIB API Overview
7.2. RIB/FIB API Fundamentals
7.2.1. RIB/FIB API Entry Persistence
7.3. RIB/FIB API Configuration Overview
7.4. RIB/FIB API - IPv4 Route Table Programming
7.5. RIB/FIB API - IPv6 Route Table Programming
7.6. RIB/FIB API - IPv4 Tunnel Table Programming
7.7. RIB/FIB API - IPv6 Tunnel Table Programming
7.8. RIB/FIB API - MPLS LFIB Programming
7.9. RIB/FIB API - Using Next-Hop-Groups, Primary Next Hops, and Backup Next Hops
7.10. RIB/FIB API - State and Telemetry
7.11. Traffic Statistics
7.11.1. Ingress statistics
7.11.2. Egress statistics
7.12. Show, Clear, Monitor, and Tools Command Reference
7.12.1. Command Hierarchies
7.12.1.1. Show Commands
7.12.1.2. Clear Commands
7.12.1.3. Debug Commands
7.12.1.4. Monitor Commands
7.12.1.5. Tools Commands
7.12.2. Command Descriptions
7.12.2.1. Show Commands
7.12.2.2. Clear Commands
7.12.2.3. Debug Commands
7.12.2.4. Monitor Commands
7.12.2.5. Tools Commands
8. Standards and Protocol Support
Customer Document and Product Support
Services Overview Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.1.2.1. Multipoint Shared Queuing
2.1.2.1.1. Ingress Queuing Modes of Operation
2.1.2.1.2. Ingress Service Queuing
2.1.2.1.3. Ingress Shared Queuing
2.1.2.1.4. Ingress Multipoint Shared Queuing
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. Service Access Points (SAPs)
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Default SAP on a Dot1q Port
2.3.2.4. QinQ SAPs
2.3.2.5. Services and SAP Encapsulations
2.3.2.6. SAP Configuration Considerations
2.3.2.7. G.8032 Protected Ethernet Rings
2.3.2.8. SAP Bandwidth CAC
2.3.2.8.1. CAC Enforcement
2.3.3. Connection Profile VLAN SAPs
2.3.3.1. Using connection-profile-vlan in Dot1q Ports
2.3.3.2. Using connection-profile-vlan in QinQ Ports
2.3.4. Service Distribution Points
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. SDP Selection Rules
2.3.4.7. Class-Based Forwarding
2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.3.4.8. Source IPv4 Address Configuration in GRE SDP and GRE Tunnel
2.3.4.8.1. Introduction and Feature Configuration
2.3.4.8.2. Feature Operation with T-LDP and BGP Service Label Signaling
2.3.4.9. GRE SDP Tunnel Fragmentation and Reassembly
2.3.4.9.1. GRE SDP Tunnel Fragmentation
2.3.4.9.2. GRE SDP Tunnel Reassembly
2.3.4.9.3. NGE Considerations
2.3.4.10. GRE SDP Termination on Router Interface IP Address
2.3.5. SAP and MPLS Binding Loopback with MAC Swap
2.3.6. Promiscuous ETH-LBM Mode of Operation
2.4. Multi-Service Sites
2.5. G.8031 Protected Ethernet Tunnels
2.5.1. OAM Considerations
2.5.2. QoS Considerations
2.5.3. Mirroring and Lawful Intercept Considerations
2.5.4. Support Service and Solution Combinations
2.5.5. LAG Emulation using Ethernet Tunnels
2.6. G.8032 Ethernet Ring Protection Switching
2.6.1. Overview of G.8032 Operation
2.6.2. Ethernet Ring Sub-Rings
2.6.2.1. Virtual and Non-Virtual Channel
2.6.2.2. LAG Support
2.6.3. OAM Considerations
2.6.4. Support Service and Solution Combinations
2.7. Internal Objects Created for L2TP and NAT
2.8. Ethernet Unnumbered Interfaces
2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
2.10. Network Group Encryption (NGE)
2.10.1. NGE Overview
2.10.1.1. NGE Key Groups and Encryption Partitions
2.10.1.2. Network Services Platform Management
2.10.2. Key Groups
2.10.2.1. Key Group Algorithms
2.10.2.1.1. Encapsulating Security Payload
2.10.2.2. Security Associations
2.10.2.2.1. Active Outbound SA
2.10.3. Services Encryption
2.10.3.1. Services Encryption Overview
2.10.3.2. Assigning Key Groups to Services
2.10.3.3. VPRN Layer 3 Spoke SDP Encryption and MP-BGP-based VPRN Encryption Interaction
2.10.3.4. L2 Service Encryption using PW Templates
2.10.3.5. Pseudowire Switching for NGE Traffic
2.10.3.6. Pseudowire Control Word for NGE Traffic
2.10.3.7. WLAN-GW Encryption
2.10.3.8. NGE and RFC 3107
2.10.3.9. NGE for NG-MVPN
2.10.4. NGE Packet Overhead and MTU Considerations
2.10.5. Statistics
2.10.6. Remote Network Monitoring Support
2.10.7. Configuration Notes
2.11. Service Creation Process Overview
2.12. Deploying and Provisioning Services
2.12.1. Phase 1: Core Network Construction
2.12.2. Phase 2: Service Administration
2.12.3. Phase 3: Service Provisioning
2.13. Configuration Notes
2.13.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.14.2. Basic Configurations
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring Customers
2.14.3.1.1. Customer Information
2.14.3.1.2. Configuring Multi-Service-Sites
2.14.3.2. Configuring an SDP
2.14.3.2.1. SDP Configuration Tasks
2.14.3.2.2. Configuring an SDP
2.14.3.2.3. Configuring a Mixed-LSP SDP
2.15. Ethernet Connectivity Fault Management (ETH-CFM)
2.15.1. Facility MEPs
2.15.1.1. Common Actionable Failures
2.15.1.2. General Detection, Processing and Reaction
2.15.1.3. Port-Based MEP
2.15.1.4. LAG Based MEP
2.15.1.5. Tunnel Based MEP
2.15.1.6. Router Interface MEP
2.15.1.7. Hardware Support
2.15.2. ETH-CFM and MC-LAG
2.15.2.1. ETH-CFM and MC-LAG Default Behavior
2.15.2.2. Linking ETH-CFM to MC-LAG State
2.15.3. ETH-CFM Features
2.15.3.1. CCM Hold Timers
2.15.4. Configuring ETH-CFM Parameters
2.16. Configuring NGE with CLI
2.16.1. Basic NGE Configuration Overview
2.16.2. Configuring NGE Components
2.16.2.1. Configuring the Global Encryption Label
2.16.2.2. Configuring a Key Group
2.16.2.3. Assigning a Key Group to an SDP, VPRN Service, or PW template
2.17. Global Service Entity Management Tasks
2.17.1. Modifying Customer Accounts
2.17.2. Deleting Customers
2.17.3. Modifying SDPs
2.17.4. Deleting SDPs
2.18. NGE Management Tasks
2.18.1. Modifying a Key Group
2.18.2. Removing a Key Group
2.18.2.1. Removing a Key Group from an SDP, VPRN Service, or PW template
2.18.3. Changing Key Groups
2.18.3.1. Changing the Key Group for an SDP, VPRN Service, or PW template
2.18.4. Deleting a Key Group from an NGE Node
2.19. Global Services Configuration Command Reference
2.19.1. Command Hierarchies
2.19.1.1. Customer Commands
2.19.1.2. MRP Commands
2.19.1.3. Service System Commands
2.19.1.4. Oper Group Commands
2.19.1.5. Pseudowire (PW) Commands
2.19.1.5.1. PW Port Commands
2.19.1.6. SDP Commands
2.19.1.7. SAP Commands
2.19.1.8. Ethernet Ring Commands
2.19.1.9. ETH CFM Configuration Commands
2.19.1.10. ETH Tunnel Commands
2.19.1.11. Connection Profile VLAN Commands
2.19.1.12. Network Group Encryption (NGE) Commands
2.19.1.13. NGE Services Commands
2.19.1.14. Model-Driven Automatic ID Commands
2.19.2. Command Descriptions
2.19.2.1. Generic Commands
2.19.2.2. Customer Management Commands
2.19.2.3. MRP Commands
2.19.2.4. Service System Commands
2.19.2.5. Oper Group Commands
2.19.2.6. Pseudowire (PW) Commands
2.19.2.6.1. PW Port Commands
2.19.2.7. SDP Commands
2.19.2.8. Ethernet Ring Commands
2.19.2.9. ETH CFM Configuration Commands
2.19.2.10. Port and LAG ETH CFM Commands
2.19.2.11. ETH-Tunnel Commands
2.19.2.12. Connection Profile VLAN Commands
2.19.2.13. Network Group Encryption (NGE) Commands
2.19.2.14. NGE Services Commands
2.19.2.15. Model-Driven Automatic ID Commands
2.20. Show, Clear, and Tools Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Show Commands
2.20.1.1.1. ETH-CFM Show Commands
2.20.1.1.2. PW-Port Show Commands
2.20.1.1.3. NGE Show Commands
2.20.1.2. Clear Commands
2.20.1.3. Tools Perform Commands
2.20.1.4. Tools Dump Commands
2.20.2. Command Descriptions
2.20.2.1. Service Commands
2.20.2.2. Connection Profile VLAN Commands
2.20.2.3. ETH-CFM Show Commands
2.20.2.4. PW-Port Show Commands
2.20.2.5. NGE Show Commands
2.20.2.6. Clear Commands
2.20.2.7. Tools Perform Commands
2.20.2.8. Tools Dump Commands
3. Common CLI Command Descriptions
3.1. In This Chapter
3.1.1. Common Service Commands
3.1.1.1. SAP Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.1.2.1. Multipoint Shared Queuing
2.1.2.1.1. Ingress Queuing Modes of Operation
2.1.2.1.2. Ingress Service Queuing
2.1.2.1.3. Ingress Shared Queuing
2.1.2.1.4. Ingress Multipoint Shared Queuing
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. Service Access Points (SAPs)
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Default SAP on a Dot1q Port
2.3.2.4. QinQ SAPs
2.3.2.5. Services and SAP Encapsulations
2.3.2.6. SAP Configuration Considerations
2.3.2.7. G.8032 Protected Ethernet Rings
2.3.2.8. SAP Bandwidth CAC
2.3.2.8.1. CAC Enforcement
2.3.3. Connection Profile VLAN SAPs
2.3.3.1. Using connection-profile-vlan in Dot1q Ports
2.3.3.2. Using connection-profile-vlan in QinQ Ports
2.3.4. Service Distribution Points
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. SDP Selection Rules
2.3.4.7. Class-Based Forwarding
2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.3.4.8. Source IPv4 Address Configuration in GRE SDP and GRE Tunnel
2.3.4.8.1. Introduction and Feature Configuration
2.3.4.8.2. Feature Operation with T-LDP and BGP Service Label Signaling
2.3.4.9. GRE SDP Tunnel Fragmentation and Reassembly
2.3.4.9.1. GRE SDP Tunnel Fragmentation
2.3.4.9.2. GRE SDP Tunnel Reassembly
2.3.4.9.3. NGE Considerations
2.3.4.10. GRE SDP Termination on Router Interface IP Address
2.3.5. SAP and MPLS Binding Loopback with MAC Swap
2.3.6. Promiscuous ETH-LBM Mode of Operation
2.4. Multi-Service Sites
2.5. G.8031 Protected Ethernet Tunnels
2.5.1. OAM Considerations
2.5.2. QoS Considerations
2.5.3. Mirroring and Lawful Intercept Considerations
2.5.4. Support Service and Solution Combinations
2.5.5. LAG Emulation using Ethernet Tunnels
2.6. G.8032 Ethernet Ring Protection Switching
2.6.1. Overview of G.8032 Operation
2.6.2. Ethernet Ring Sub-Rings
2.6.2.1. Virtual and Non-Virtual Channel
2.6.2.2. LAG Support
2.6.3. OAM Considerations
2.6.4. Support Service and Solution Combinations
2.7. Internal Objects Created for L2TP and NAT
2.8. Ethernet Unnumbered Interfaces
2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
2.10. Network Group Encryption (NGE)
2.10.1. NGE Overview
2.10.1.1. NGE Key Groups and Encryption Partitions
2.10.1.2. Network Services Platform Management
2.10.2. Key Groups
2.10.2.1. Key Group Algorithms
2.10.2.1.1. Encapsulating Security Payload
2.10.2.2. Security Associations
2.10.2.2.1. Active Outbound SA
2.10.3. Services Encryption
2.10.3.1. Services Encryption Overview
2.10.3.2. Assigning Key Groups to Services
2.10.3.3. VPRN Layer 3 Spoke SDP Encryption and MP-BGP-based VPRN Encryption Interaction
2.10.3.4. L2 Service Encryption using PW Templates
2.10.3.5. Pseudowire Switching for NGE Traffic
2.10.3.6. Pseudowire Control Word for NGE Traffic
2.10.3.7. WLAN-GW Encryption
2.10.3.8. NGE and RFC 3107
2.10.3.9. NGE for NG-MVPN
2.10.4. NGE Packet Overhead and MTU Considerations
2.10.5. Statistics
2.10.6. Remote Network Monitoring Support
2.10.7. Configuration Notes
2.11. Service Creation Process Overview
2.12. Deploying and Provisioning Services
2.12.1. Phase 1: Core Network Construction
2.12.2. Phase 2: Service Administration
2.12.3. Phase 3: Service Provisioning
2.13. Configuration Notes
2.13.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.14.2. Basic Configurations
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring Customers
2.14.3.1.1. Customer Information
2.14.3.1.2. Configuring Multi-Service-Sites
2.14.3.2. Configuring an SDP
2.14.3.2.1. SDP Configuration Tasks
2.14.3.2.2. Configuring an SDP
2.14.3.2.3. Configuring a Mixed-LSP SDP
2.15. Ethernet Connectivity Fault Management (ETH-CFM)
2.15.1. Facility MEPs
2.15.1.1. Common Actionable Failures
2.15.1.2. General Detection, Processing and Reaction
2.15.1.3. Port-Based MEP
2.15.1.4. LAG Based MEP
2.15.1.5. Tunnel Based MEP
2.15.1.6. Router Interface MEP
2.15.1.7. Hardware Support
2.15.2. ETH-CFM and MC-LAG
2.15.2.1. ETH-CFM and MC-LAG Default Behavior
2.15.2.2. Linking ETH-CFM to MC-LAG State
2.15.3. ETH-CFM Features
2.15.3.1. CCM Hold Timers
2.15.4. Configuring ETH-CFM Parameters
2.16. Configuring NGE with CLI
2.16.1. Basic NGE Configuration Overview
2.16.2. Configuring NGE Components
2.16.2.1. Configuring the Global Encryption Label
2.16.2.2. Configuring a Key Group
2.16.2.3. Assigning a Key Group to an SDP, VPRN Service, or PW template
2.17. Global Service Entity Management Tasks
2.17.1. Modifying Customer Accounts
2.17.2. Deleting Customers
2.17.3. Modifying SDPs
2.17.4. Deleting SDPs
2.18. NGE Management Tasks
2.18.1. Modifying a Key Group
2.18.2. Removing a Key Group
2.18.2.1. Removing a Key Group from an SDP, VPRN Service, or PW template
2.18.3. Changing Key Groups
2.18.3.1. Changing the Key Group for an SDP, VPRN Service, or PW template
2.18.4. Deleting a Key Group from an NGE Node
2.19. Global Services Configuration Command Reference
2.19.1. Command Hierarchies
2.19.1.1. Customer Commands
2.19.1.2. MRP Commands
2.19.1.3. Service System Commands
2.19.1.4. Oper Group Commands
2.19.1.5. Pseudowire (PW) Commands
2.19.1.5.1. PW Port Commands
2.19.1.6. SDP Commands
2.19.1.7. SAP Commands
2.19.1.8. Ethernet Ring Commands
2.19.1.9. ETH CFM Configuration Commands
2.19.1.10. ETH Tunnel Commands
2.19.1.11. Connection Profile VLAN Commands
2.19.1.12. Network Group Encryption (NGE) Commands
2.19.1.13. NGE Services Commands
2.19.1.14. Model-Driven Automatic ID Commands
2.19.2. Command Descriptions
2.19.2.1. Generic Commands
2.19.2.2. Customer Management Commands
2.19.2.3. MRP Commands
2.19.2.4. Service System Commands
2.19.2.5. Oper Group Commands
2.19.2.6. Pseudowire (PW) Commands
2.19.2.6.1. PW Port Commands
2.19.2.7. SDP Commands
2.19.2.8. Ethernet Ring Commands
2.19.2.9. ETH CFM Configuration Commands
2.19.2.10. Port and LAG ETH CFM Commands
2.19.2.11. ETH-Tunnel Commands
2.19.2.12. Connection Profile VLAN Commands
2.19.2.13. Network Group Encryption (NGE) Commands
2.19.2.14. NGE Services Commands
2.19.2.15. Model-Driven Automatic ID Commands
2.20. Show, Clear, and Tools Command Reference
2.20.1. Command Hierarchies
2.20.1.1. Show Commands
2.20.1.1.1. ETH-CFM Show Commands
2.20.1.1.2. PW-Port Show Commands
2.20.1.1.3. NGE Show Commands
2.20.1.2. Clear Commands
2.20.1.3. Tools Perform Commands
2.20.1.4. Tools Dump Commands
2.20.2. Command Descriptions
2.20.2.1. Service Commands
2.20.2.2. Connection Profile VLAN Commands
2.20.2.3. ETH-CFM Show Commands
2.20.2.4. PW-Port Show Commands
2.20.2.5. NGE Show Commands
2.20.2.6. Clear Commands
2.20.2.7. Tools Perform Commands
2.20.2.8. Tools Dump Commands
3. Common CLI Command Descriptions
3.1. In This Chapter
3.1.1. Common Service Commands
3.1.1.1. SAP Commands
4. Standards and Protocol Support
Customer Document and Product Support
System Management Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
1.3. Node Management Using VPRN
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.1.4. LDAP Authentication
2.1.1.4.1. LDAP Authentication Process
2.1.1.4.2. Authentication Order
2.1.1.4.3. LDAP Authentication Using a Password
2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.1.1.4.5. TLS Behavior and LDAP
2.1.1.4.6. LDAP Health Check
2.1.1.4.7. LDAP Redundancy and TLS
2.1.1.5. Password Hashing
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.2.3.1. Examples
2.1.2.4. Authorization Profiles for Different Interfaces
2.1.2.5. Authorization Support
2.1.2.5.1. Default User and Admin Profiles
2.1.2.5.2. Authorization Support for Configuration Groups
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.1.3.3. Command Accounting Log Events
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Control and Management Traffic Protection
2.3.1. CPM Filters
2.3.1.1. CPM Filter Packet Match
2.3.1.2. CPM IPv4 and IPv6 Filter Entry Match Criteria
2.3.1.3. CPM MAC Filter Entry Match Criteria
2.3.1.4. CPM Filter Policy Action
2.3.1.5. CPM Filter Policy Statistics and Logging
2.3.1.6. CPM Filter: Protocols and Ports
2.3.2. CPM Per-Peer Queuing
2.3.3. Centralized CPU Protection
2.3.3.1. Protocol Protection
2.3.3.2. CPU Protection Extensions for ETH-CFM
2.3.3.3. ETH-CFM Ingress Squelching
2.3.4. Distributed CPU Protection (DCP)
2.3.4.1. Applicability of Distributed CPU Protection
2.3.4.2. Log Events, Statistics, Status, and SNMP support
2.3.4.3. DCP Policer Resource Management
2.3.4.4. Operational Guidelines and Tips
2.3.5. Classification-Based Priority for Extracted Protocol Traffic
2.3.6. TTL Security
2.3.7. Management Access Filter
2.3.7.1. MAF Filter Packet Match
2.3.7.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.3.7.3. MAF MAC Filter Entry Match Criteria
2.3.7.4. MAF Filter Policy Action
2.3.7.5. MAF Filter Policy Statistics and Logging
2.4. Vendor-Specific Attributes (VSAs)
2.5. Other Security Features
2.5.1. SSH
2.5.2. SSH PKI Authentication
2.5.2.1. User Public Key Generation
2.5.3. MAC Client and Server List
2.5.4. KEX Client and Server List
2.5.5. Regenerate the SSH key without disabling SSH
2.5.5.1. Key re-exchange procedure
2.5.6. Cipher Client and Server List
2.5.7. Exponential Login Backoff
2.5.8. User Lockout
2.5.9. CLI Login Scripts
2.5.10. 802.1x Network Access Control
2.5.11. TCP Enhanced Authentication Option
2.5.11.1. Packet Formats
2.5.11.2. Keychain
2.5.12. gRPC Authentication
2.5.13. Hash Management per Management Interface Configuration
2.5.13.1. Hash encryption Using AES 256
2.5.13.2. Clear Text
2.6. Configuration Notes
2.6.1. General
2.7. Configuring Security with CLI
2.7.1. Security Configurations
2.7.2. Security Configuration Procedures
2.7.2.1. Configuring Management Access Filters
2.7.2.2. Configuring IP CPM Filters
2.7.2.3. Configuring IPv6 CPM Filters
2.7.2.4. Configuring MAC CPM Filters
2.7.2.5. Configuring CPM Queues
2.7.2.6. IPsec Certificates Parameters
2.7.2.7. Configuring Profiles
2.7.2.7.1. Parameters
2.7.2.7.2. Wildcards
2.7.2.7.3. CLI Resource Management
2.7.2.8. Configuring Users
2.7.2.9. Configuring Keychains
2.7.2.10. Copying and Overwriting Users and Profiles
2.7.2.10.1. User
2.7.2.10.2. Profile
2.7.3. RADIUS Configurations
2.7.3.1. Configuring RADIUS Authentication
2.7.3.2. Configuring RADIUS Authorization
2.7.3.3. Configuring RADIUS Accounting
2.7.4. Configuring 802.1x RADIUS Policies
2.7.5. TACACS+ Configurations
2.7.5.1. Enabling TACACS+ Authentication
2.7.5.2. Configuring TACACS+ Authorization
2.7.5.3. Configuring TACACS+ Accounting
2.7.5.4. Enabling SSH
2.7.6. LDAP Configurations
2.7.6.1. Configuring LDAP Authentication
2.7.6.2. Configuring Redundant Servers
2.7.6.3. Enabling SSH
2.7.7. Configuring Login Controls
2.8. Security Configuration Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Security Commands
2.8.1.1.1. LLDP Commands
2.8.1.1.2. Management Access Filter Commands
2.8.1.1.3. CLI Script Authorization Commands
2.8.1.1.4. CPM Filter Commands
2.8.1.1.5. CPM Queue Commands
2.8.1.1.6. CPU Protection Commands
2.8.1.1.7. Distributed CPU Protection Commands
2.8.1.1.8. Extracted Protocol Traffic Priority Commands
2.8.1.1.9. Security Password Commands
2.8.1.1.10. Public Key Infrastructure (PKI) Commands
2.8.1.1.11. Profile Commands
2.8.1.1.12. CLI Session Commands
2.8.1.1.13. RADIUS Commands
2.8.1.1.14. TACACS+ Client Commands
2.8.1.1.15. LDAP Commands
2.8.1.1.16. User Management Commands
2.8.1.1.17. User Template Commands
2.8.1.1.18. Dot1x Commands
2.8.1.1.19. Keychain Commands
2.8.1.1.20. TTL Security Commands
2.8.1.1.21. gRPC Commands
2.8.1.2. Login Control Commands
2.8.2. Command Descriptions
2.8.2.1. General Security Commands
2.8.2.2. Security Commands
2.8.2.3. LLDP Commands
2.8.2.4. Management Access Filter Commands
2.8.2.5. CLI Script Authorization Commands
2.8.2.6. CPM Filter Commands
2.8.2.7. CPM Queue Commands
2.8.2.8. CPU Protection Commands
2.8.2.9. Distributed CPU Protection Commands
2.8.2.10. Extracted Protocol Traffic Priority Commands
2.8.2.11. Security Password Commands
2.8.2.12. Public Key Infrastructure Commands
2.8.2.13. Profile Commands
2.8.2.14. CLI Session Commands
2.8.2.15. RADIUS Commands
2.8.2.16. TACACS+ Client Commands
2.8.2.17. LDAP Client Commands
2.8.2.18. User Management Commands
2.8.2.19. Dot1x Commands
2.8.2.20. Keychain Authentication
2.8.2.21. TTL Security Commands
2.8.2.22. gRPC Commands
2.8.2.23. Login Control Commands
2.9. Security Show, Clear, Debug, Tools, and Admin Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.1.1. System Security
2.9.1.1.2. Login Control
2.9.1.2. Clear Commands
2.9.1.3. Debug Commands
2.9.1.4. Tools Commands
2.9.1.5. Admin Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.1.1. System Commands
2.9.2.1.2. Security Commands
2.9.2.1.3. Login Control
2.9.2.2. Clear Commands
2.9.2.2.1. CPU Protection Commands
2.9.2.3. Debug Commands
2.9.2.4. Tools Commands
2.9.2.5. Admin Commands
3. Classic and Model-Driven Management Interfaces
3.1. Model-Driven Management Interfaces
3.1.1. Prerequisites for Using Model-Driven Management Interfaces
3.2. YANG Data Models
3.2.1. SR OS YANG Data Models
3.2.2. OpenConfig
3.2.2.1. Basic Configuration
3.2.2.2. Shared Model Management Support
3.2.2.2.1. Introduction
3.2.2.2.2. Merging Configuration Statements
3.2.2.2.3. Application Support
3.2.2.2.4. Validating and Committing
3.2.2.2.5. Error Reporting
3.2.2.2.6. Using the info Command
3.2.2.2.7. Deviating and Augmenting
3.3. Datastores and Regions
3.4. System-Provisioned Configuration (SPC) Objects
3.5. Management Interface Configuration Mode
3.5.1. Mixed Configuration Mode
3.5.2. Loose References to IDs
3.5.3. Transitioning Between Modes
3.6. Configuring the CLI Engine
3.7. Legacy Alcatel-Lucent Base-R13 NETCONF/YANG
3.7.1. Alcatel-Lucent Base-R13 SR OS YANG Modules
3.7.2. SPC Objects in Base-R13 NETCONF/YANG
3.8. Classic and Model-Driven Management Interfaces Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Management Infrastructure Control Commands
3.8.2. Command Descriptions
3.8.2.1. Management Infrastructure Control Commands
3.9. Classic and Model-Driven Management Interfaces Show Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Management Infrastructure Show Commands
3.9.2. Command Descriptions
3.9.2.1. Management Infrastructure Show Commands
4. SNMP
4.1. SNMP Overview
4.1.1. SNMP Architecture
4.1.2. Management Information Base
4.1.3. SNMP Protocol Operations
4.1.4. SNMP Versions
4.1.5. Management Information Access Control
4.1.6. User-Based Security Model Community Strings
4.1.7. Views
4.1.8. Access Groups
4.1.9. Users
4.1.10. Per-VPRN Logs and SNMP Access
4.1.11. Per-SNMP Community Source IP Address Validation
4.2. SNMP Versions
4.3. Best Practices for SNMP Information Retrieval
4.3.1. SNMP GetBulkRequest
4.3.2. Queueing, RTT, and Collection Performance
4.4. Configuration Notes
4.4.1. General
4.5. Configuring SNMP with CLI
4.5.1. SNMP Configuration Overview
4.5.1.1. Configuring SNMPv1 and SNMPv2c
4.5.1.2. Configuring SNMPv3
4.5.2. Basic SNMP Security Configuration
4.5.3. Configuring SNMP Components
4.5.3.1. Configuring a Community String
4.5.3.2. Configuring View Options
4.5.3.3. Configuring Access Options
4.5.3.4. Configuring USM Community Options
4.5.3.5. Configuring Other SNMP Parameters
4.6. SNMP Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. SNMP System Commands
4.6.1.2. SNMP Security Commands
4.6.2. Command Descriptions
4.6.2.1. SNMP System Commands
4.6.2.2. SNMP Security Commands
4.7. SNMP Show Command Reference
4.7.1. Command Hierarchies
4.7.1.1. Show Commands
4.7.2. Command Descriptions
4.7.2.1. Show Commands
5. NETCONF
5.1. NETCONF Overview
5.2. NETCONF in SR OS
5.2.1. Transport and Sessions
5.2.2. Datastores and URLs
5.2.3. NETCONF Operations and Capabilities
5.2.3.1. <get>
5.2.3.1.1. Example: Namespace Specified in <configure> Tag
5.2.3.1.2. Example: Namespace Error in <configure> Tag
5.2.3.1.3. Example: Namespace Specified in <state> Tag
5.2.3.1.4. Example: Namespace Error in <state> Tag
5.2.3.2. <get-config>
5.2.3.2.1. Example: Reply with Defaults
5.2.3.2.2. Example: Reply Without Default Values
5.2.3.2.3. Example: Containment Node
5.2.3.2.4. Example: List Without a Key Specified
5.2.3.2.5. Example: List with Non-key Leaf Specified as Selection Node
5.2.3.2.6. Example: Non-key Leaf Specified as a Content Match Node
5.2.3.2.7. Example: Content Match Node on a List Key
5.2.3.2.8. Example: Content Match Node on a Leaf-list
5.2.3.3. <edit-config>
5.2.3.3.1. Example: <running> Datastore with the “urn:nokia.com:sros:ns:yang:sr:conf” Namespace
5.2.3.3.2. Example: Application of Default Operation Value for Parent and Child Nodes
5.2.3.3.3. Example: Exceptions to the Default Operation Handling
5.2.3.4. <copy-config>
5.2.3.5. <delete-config>
5.2.3.6. <lock>
5.2.3.7. <unlock>
5.2.3.8. <commit>
5.2.3.9. <discard-changes>
5.2.3.10. <validate>
5.2.3.11. <get-schema>
5.2.3.12. <get-data>
5.2.4. Datastore and Operation Combinations
5.2.5. General NETCONF Behavior
5.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
5.2.5.2. Example: Non-default NETCONF Base Namespace
5.2.5.3. Example: Invalid NETCONF Namespace Declaration
5.2.5.4. Example: Non-default NETCONF Namespace or Prefix Declaration in a Child Tag
5.2.5.5. Example: Chunked Frame Mechanism
5.2.6. Establishing a NETCONF Session
5.2.6.1. Example: Checking NETCONF Status
5.2.6.2. Example: Retrieving System Configurations, QoS, and Log Branches
5.2.6.3. Example: Creating an Epipe Service
5.2.6.4. Example: Returning Multiple Errors
5.3. NETCONF Notifications
5.3.1. 5.3.1 NETCONF Notification Examples�
5.3.1.1. Example: <create-subscription> Operation
5.3.1.2. Example: sros-config-change-event Notification
5.3.1.3. Example: sros-state-change-event Notification
5.3.1.4. Example: sros-cli-accounting-event Notification
5.3.1.5. Example: sros-log-generic-event Notification
5.3.1.6. Example: netconf-config-change Notification
5.3.1.7. Example: sros-md-rpc-accounting-event Notification�
5.4. NETCONF Monitoring
5.5. NETCONF Using the YANG Library
5.6. NETCONF Using the Legacy Alcatel-Lucent Base-R13 SR OS YANG Modules
5.6.1. Operations and Capabilities
5.7. NETCONF Using the CLI Content Layer
5.7.1. CLI Content Layer Examples
5.7.1.1. Example: Configuration Change
5.7.1.2. Example: Retrieving Configuration Information�
5.7.1.3. Example: Retrieving Full Configuration Information�
5.7.1.4. Example: <get> Request
5.7.1.5. Example: <get> Request with Non-Syntax Error in the Second Item
5.8. NETCONF Configuration Command Reference
5.8.1. Command Hierarchies
5.8.1.1. NETCONF System Commands
5.8.1.2. NETCONF Security Commands
5.8.2. Configuration Commands
5.8.2.1. NETCONF System Commands
5.8.2.2. NETCONF Security Commands
5.9. NETCONF Show and Debug Command Reference
5.9.1. Command Hierarchies
5.9.1.1. Show Commands
5.9.1.2. Debug Commands
5.9.2. Command Descriptions
5.9.2.1. Show Commands
5.9.2.1.1. System Commands
5.9.3. Debug Commands
5.9.3.1. NETCONF Debug Commands
6. Event and Accounting Logs
6.1. Logging Overview
6.1.1. Logging Using the Management VPRN
6.2. Log Destinations
6.2.1. Console
6.2.2. Session
6.2.3. CLI Logs
6.2.4. Memory Logs
6.2.5. Log Files
6.2.6. SNMP Trap Group
6.2.7. Syslog
6.2.8. NETCONF
6.3. Event Logs
6.3.1. Event Sources
6.3.2. Event Control
6.3.3. Log Manager and Event Logs
6.3.4. Event Filter Policies
6.3.5. Event Log Entries
6.3.6. Simple Logger Event Throttling
6.3.7. Default System Log
6.3.8. Event Handling System
6.3.8.1. EHS Configuration and Syntax Rules
6.3.8.2. Examples of EHS Syntax Supported in Classic CLI
6.3.8.3. Valid Examples of EHS Syntax in Classic CLI
6.3.8.4. Invalid Examples for EHS Syntax in Classic CLI
6.3.8.5. EHS Debounce
6.3.8.6. Executing EHS or CRON Scripts
6.4. Customizing Syslog Messages Using Python
6.4.1. Python Engine for Syslog
6.4.1.1. Python Syslog APIs
6.4.1.2. Timestamp Format Manipulation
6.4.2. Python Processing Efficiency
6.4.3. Python Backpressure
6.4.4. Event Selection for Python Processing
6.4.5. Modifying a Log File
6.4.6. Deleting a Log File
6.4.7. Modifying a File ID
6.4.8. Modifying a Syslog ID
6.4.9. Modifying an SNMP Trap Group
6.4.10. Deleting an SNMP Trap Group
6.4.11. Modifying a Log Filter
6.4.12. Modifying Event Control Parameters
6.4.13. Returning to the Default Event Control Configuration
6.5. Accounting Logs
6.5.1. Accounting Records
6.5.2. Accounting Files
6.5.3. Design Considerations for Accounting Policies
6.5.4. Reporting and Time-Based Accounting
6.5.5. Overhead Reduction in Accounting: Custom Record
6.5.5.1. User Configurable Records
6.5.5.2. Changed Statistics Only
6.5.5.3. Configurable Accounting Records
6.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
6.5.5.3.2. XML Accounting Files for Policer Counters
6.5.5.3.3. RADIUS Accounting in Networks Using ESM
6.5.5.4. Significant Change Only Reporting
6.5.6. Immediate Completion of Records
6.5.6.1. Record Completion for XML Accounting
6.5.7. AA Accounting per Forwarding Class
6.6. Configuration Notes
6.7. Configuring Logging with CLI
6.7.1. Log Configuration Overview
6.7.2. Log Types
6.7.3. Basic Log Configuration
6.7.4. Common Configuration Tasks
6.7.4.1. Configuring an Event Log
6.7.4.2. Configuring a File ID
6.7.4.3. Configuring an Accounting Policy
6.7.4.4. Configuring Event Control
6.7.4.5. Configuring a Log Filter
6.7.4.6. Configuring an SNMP Trap Group
6.7.4.6.1. Setting the Replay Parameter
6.7.4.6.2. Shutdown In-Band Port
6.7.4.6.3. No Shutdown Port
6.7.4.7. Configuring a Syslog Target
6.7.4.7.1. Configuring an Accounting Custom Record
6.8. Log Configuration Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Log Configuration Commands
6.8.1.2. Accounting Policy Commands
6.8.1.3. Custom Record Commands
6.8.1.4. File ID Commands
6.8.1.5. Event Filter Commands
6.8.1.6. Event Handling System (EHS) Commands
6.8.1.7. Event Trigger Commands
6.8.1.8. Log ID Commands
6.8.1.9. SNMP Trap Group Commands
6.8.1.10. Syslog Commands
6.8.2. Command Descriptions
6.8.2.1. Generic Commands
6.8.2.2. Log Configuration Commands
6.8.2.3. Accounting Policy Commands
6.8.2.3.1. Accounting Policy Custom Record Commands
6.8.2.4. File ID Commands
6.8.2.5. Event Filter Commands
6.8.2.6. Event Handling System (EHS) Commands
6.8.2.7. Event Trigger Commands
6.8.2.8. Log ID Commands
6.8.2.9. SNMP Trap Groups
6.8.2.10. Syslog Commands
6.9. Log Show, Clear, and Tools Command Reference
6.9.1. Command Hierarchies
6.9.1.1. Show Commands
6.9.1.2. Clear Command
6.9.1.3. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. Show Commands
6.9.2.2. Clear Commands
6.9.2.3. Tools Commands
7. Node Discovery Provisioning Using OSPF
7.1. Node Discovery Procedure
7.1.1. Network Element Profiles
7.1.2. Assigning a Network Element Profile
7.1.3. OSPFv2 Opaque LSA Requirements
7.1.4. IPv4/IPv6
7.2. Aggregation Node Configuration
7.2.1. MIB Requirements on the Aggregation Node
7.2.2. SNMP Traps and Gets
7.3. Network Element Discovery Command Reference
7.3.1. Command Hierarchies
7.3.1.1. Network Element Discovery Commands
7.3.2. Command Descriptions
7.3.2.1. Network Element Discovery Commands
8. sFlow
8.1. sFlow Overview
8.2. sFlow Features
8.2.1. sFlow Counter Polling Architecture
8.2.2. sFlow Support on Logical Ethernet Ports
8.2.3. sFlow SAP Counter Map
8.2.4. sFlow Record Formats
8.3. sFlow Command Reference
8.3.1. Command Hierarchies
8.3.1.1. sFlow Configuration Commands
8.3.2. Command Descriptions
8.3.2.1. Configuration Commands
8.4. sFlow Show Command Descriptions
8.4.1. Command Descriptions
8.4.1.1. sFlow Show Commands
8.4.1.2. Show Commands
9. gRPC
9.1. Security Aspects
9.1.1. TLS-Based Encryption
9.1.2. Authentication
9.2. gNMI Service
9.2.1. gNMI Service Definitions
9.2.1.1. Capability Discovery
9.2.1.2. Get/Set RPC
9.2.1.3. Subscribe RPC
9.2.1.3.1. Bytes Encoding
9.2.1.3.2. ON_CHANGE Subscription Mode
9.2.1.4. Publish RPC
9.2.1.5. Schema Paths
9.2.2. gNMI Service Use Cases
9.2.2.1. Telemetry
9.2.2.1.1. Dial-in Telemetry
9.2.2.1.2. Dial-out Telemetry
9.2.2.2. NE Configuration Management
9.3. gNOI Services
9.3.1. Certificate Management for TLS Connections
9.3.1.1. RPC GetCertificates
9.3.1.2. RPC CanGenerateCSR
9.3.1.3. RPC Rotate
9.3.1.4. RPC Install
9.3.1.5. RPC RevokeCertificates
9.4. gNOI System
9.4.1. SetPackage RPC
9.4.2. Reboot, CancelReboot, and RebootStatus RPC
9.4.3. SwitchControlProcessor RPC
9.5. MD-CLI Service
9.5.1. Remote Management Using a Remote Network Interface Shell Manager
9.6. gRPC Command Reference
9.6.1. Command Hierarchies
9.6.1.1. System Commands
9.6.1.2. QoS Commands
9.6.2. Command Descriptions
9.6.2.1. System Commands
9.6.2.2. QoS Commands
9.7. gRPC Show, Tools, and Admin Command Reference
9.7.1. Command Hierarchies
9.7.1.1. Show Commands
9.7.1.2. Tools Commands
9.7.1.3. Admin Commands
9.7.2. Command Descriptions
9.7.2.1. Show Commands
9.7.2.2. Tools Commands
9.7.2.3. Admin Commands
10. TLS
10.1. TLS Overview
10.2. TLS Server Interaction with Applications
10.2.1. TLS Application Support
10.3. TLS Handshake
10.4. TLS Client Certificate
10.5. TLS Symmetric Key Rollover
10.6. Supported TLS Ciphers
10.7. SR OS Certificate Management
10.7.1. Certificate Profile
10.7.2. TLS Server Authentication of the Client Certificate CN Field
10.7.3. CN Regexp Format
10.8. Operational Guidelines
10.8.1. Server Authentication Behavior
10.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
10.9. LDAP Redundancy and TLS
10.10. Basic TLS Configuration
10.11. Common Configuration Tasks
10.11.1. Configuring a Server TLS Profile
10.11.2. Configuring a Client TLS Profile
10.11.3. Configuring a TLS Client or TLS Server Certificate
10.11.4. Configuring a TLS Trust Anchor
10.12. TLS Command Reference
10.12.1. Command Hierarchies
10.12.1.1. Security TLS Commands
10.12.1.2. LDAP TLS Profile Commands
10.12.1.3. Admin Commands
10.12.2. Command Descriptions
10.12.2.1. Security TLS Commands
10.12.2.2. LDAP TLS Profile Commands
10.12.2.3. Admin Commands
10.13. TLS Show Command Reference
10.13.1. Command Hierarchies
10.13.1.1. Show Commands
10.13.2. Command Descriptions
10.13.2.1. Show Commands
11. Facility Alarms
11.1. Facility Alarms Overview
11.2. Facility Alarms vs. Log Events
11.3. Facility Alarm Severities and Alarm LED Behavior
11.4. Facility Alarm Hierarchy
11.5. Facility Alarm List
11.6. Configuring Logging with CLI
11.6.1. Basic Facility Alarm Configuration
11.6.2. Common Configuration Tasks
11.6.2.1. Configuring the Maximum Number of Alarms to Clear
11.7. Facility Alarms Configuration Command Reference
11.7.1. Command Hierarchies
11.7.1.1. Facility Alarm Configuration Commands
11.7.2. Command Descriptions
11.7.2.1. Generic Commands
11.8. Facility Alarms Show Command Reference
11.8.1. Command Hierarchies
11.8.1.1. Show Commands
11.8.2. Command Descriptions
11.8.2.1. Show Commands
12. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
1.3. Node Management Using VPRN
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.1.4. LDAP Authentication
2.1.1.4.1. LDAP Authentication Process
2.1.1.4.2. Authentication Order
2.1.1.4.3. LDAP Authentication Using a Password
2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.1.1.4.5. TLS Behavior and LDAP
2.1.1.4.6. LDAP Health Check
2.1.1.4.7. LDAP Redundancy and TLS
2.1.1.5. Password Hashing
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.2.3.1. Examples
2.1.2.4. Authorization Profiles for Different Interfaces
2.1.2.5. Authorization Support
2.1.2.5.1. Default User and Admin Profiles
2.1.2.5.2. Authorization Support for Configuration Groups
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.1.3.3. Command Accounting Log Events
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Control and Management Traffic Protection
2.3.1. CPM Filters
2.3.1.1. CPM Filter Packet Match
2.3.1.2. CPM IPv4 and IPv6 Filter Entry Match Criteria
2.3.1.3. CPM MAC Filter Entry Match Criteria
2.3.1.4. CPM Filter Policy Action
2.3.1.5. CPM Filter Policy Statistics and Logging
2.3.1.6. CPM Filter: Protocols and Ports
2.3.2. CPM Per-Peer Queuing
2.3.3. Centralized CPU Protection
2.3.3.1. Protocol Protection
2.3.3.2. CPU Protection Extensions for ETH-CFM
2.3.3.3. ETH-CFM Ingress Squelching
2.3.4. Distributed CPU Protection (DCP)
2.3.4.1. Applicability of Distributed CPU Protection
2.3.4.2. Log Events, Statistics, Status, and SNMP support
2.3.4.3. DCP Policer Resource Management
2.3.4.4. Operational Guidelines and Tips
2.3.5. Classification-Based Priority for Extracted Protocol Traffic
2.3.6. TTL Security
2.3.7. Management Access Filter
2.3.7.1. MAF Filter Packet Match
2.3.7.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.3.7.3. MAF MAC Filter Entry Match Criteria
2.3.7.4. MAF Filter Policy Action
2.3.7.5. MAF Filter Policy Statistics and Logging
2.4. Vendor-Specific Attributes (VSAs)
2.5. Other Security Features
2.5.1. SSH
2.5.2. SSH PKI Authentication
2.5.2.1. User Public Key Generation
2.5.3. MAC Client and Server List
2.5.4. KEX Client and Server List
2.5.5. Regenerate the SSH key without disabling SSH
2.5.5.1. Key re-exchange procedure
2.5.6. Cipher Client and Server List
2.5.7. Exponential Login Backoff
2.5.8. User Lockout
2.5.9. CLI Login Scripts
2.5.10. 802.1x Network Access Control
2.5.11. TCP Enhanced Authentication Option
2.5.11.1. Packet Formats
2.5.11.2. Keychain
2.5.12. gRPC Authentication
2.5.13. Hash Management per Management Interface Configuration
2.5.13.1. Hash encryption Using AES 256
2.5.13.2. Clear Text
2.6. Configuration Notes
2.6.1. General
2.7. Configuring Security with CLI
2.7.1. Security Configurations
2.7.2. Security Configuration Procedures
2.7.2.1. Configuring Management Access Filters
2.7.2.2. Configuring IP CPM Filters
2.7.2.3. Configuring IPv6 CPM Filters
2.7.2.4. Configuring MAC CPM Filters
2.7.2.5. Configuring CPM Queues
2.7.2.6. IPsec Certificates Parameters
2.7.2.7. Configuring Profiles
2.7.2.7.1. Parameters
2.7.2.7.2. Wildcards
2.7.2.7.3. CLI Resource Management
2.7.2.8. Configuring Users
2.7.2.9. Configuring Keychains
2.7.2.10. Copying and Overwriting Users and Profiles
2.7.2.10.1. User
2.7.2.10.2. Profile
2.7.3. RADIUS Configurations
2.7.3.1. Configuring RADIUS Authentication
2.7.3.2. Configuring RADIUS Authorization
2.7.3.3. Configuring RADIUS Accounting
2.7.4. Configuring 802.1x RADIUS Policies
2.7.5. TACACS+ Configurations
2.7.5.1. Enabling TACACS+ Authentication
2.7.5.2. Configuring TACACS+ Authorization
2.7.5.3. Configuring TACACS+ Accounting
2.7.5.4. Enabling SSH
2.7.6. LDAP Configurations
2.7.6.1. Configuring LDAP Authentication
2.7.6.2. Configuring Redundant Servers
2.7.6.3. Enabling SSH
2.7.7. Configuring Login Controls
2.8. Security Configuration Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Security Commands
2.8.1.1.1. LLDP Commands
2.8.1.1.2. Management Access Filter Commands
2.8.1.1.3. CLI Script Authorization Commands
2.8.1.1.4. CPM Filter Commands
2.8.1.1.5. CPM Queue Commands
2.8.1.1.6. CPU Protection Commands
2.8.1.1.7. Distributed CPU Protection Commands
2.8.1.1.8. Extracted Protocol Traffic Priority Commands
2.8.1.1.9. Security Password Commands
2.8.1.1.10. Public Key Infrastructure (PKI) Commands
2.8.1.1.11. Profile Commands
2.8.1.1.12. CLI Session Commands
2.8.1.1.13. RADIUS Commands
2.8.1.1.14. TACACS+ Client Commands
2.8.1.1.15. LDAP Commands
2.8.1.1.16. User Management Commands
2.8.1.1.17. User Template Commands
2.8.1.1.18. Dot1x Commands
2.8.1.1.19. Keychain Commands
2.8.1.1.20. TTL Security Commands
2.8.1.1.21. gRPC Commands
2.8.1.2. Login Control Commands
2.8.2. Command Descriptions
2.8.2.1. General Security Commands
2.8.2.2. Security Commands
2.8.2.3. LLDP Commands
2.8.2.4. Management Access Filter Commands
2.8.2.5. CLI Script Authorization Commands
2.8.2.6. CPM Filter Commands
2.8.2.7. CPM Queue Commands
2.8.2.8. CPU Protection Commands
2.8.2.9. Distributed CPU Protection Commands
2.8.2.10. Extracted Protocol Traffic Priority Commands
2.8.2.11. Security Password Commands
2.8.2.12. Public Key Infrastructure Commands
2.8.2.13. Profile Commands
2.8.2.14. CLI Session Commands
2.8.2.15. RADIUS Commands
2.8.2.16. TACACS+ Client Commands
2.8.2.17. LDAP Client Commands
2.8.2.18. User Management Commands
2.8.2.19. Dot1x Commands
2.8.2.20. Keychain Authentication
2.8.2.21. TTL Security Commands
2.8.2.22. gRPC Commands
2.8.2.23. Login Control Commands
2.9. Security Show, Clear, Debug, Tools, and Admin Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.1.1. System Security
2.9.1.1.2. Login Control
2.9.1.2. Clear Commands
2.9.1.3. Debug Commands
2.9.1.4. Tools Commands
2.9.1.5. Admin Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.1.1. System Commands
2.9.2.1.2. Security Commands
2.9.2.1.3. Login Control
2.9.2.2. Clear Commands
2.9.2.2.1. CPU Protection Commands
2.9.2.3. Debug Commands
2.9.2.4. Tools Commands
2.9.2.5. Admin Commands
3. Classic and Model-Driven Management Interfaces
3.1. Model-Driven Management Interfaces
3.1.1. Prerequisites for Using Model-Driven Management Interfaces
3.2. YANG Data Models
3.2.1. SR OS YANG Data Models
3.2.2. OpenConfig
3.2.2.1. Basic Configuration
3.2.2.2. Shared Model Management Support
3.2.2.2.1. Introduction
3.2.2.2.2. Merging Configuration Statements
3.2.2.2.3. Application Support
3.2.2.2.4. Validating and Committing
3.2.2.2.5. Error Reporting
3.2.2.2.6. Using the info Command
3.2.2.2.7. Deviating and Augmenting
3.3. Datastores and Regions
3.4. System-Provisioned Configuration (SPC) Objects
3.5. Management Interface Configuration Mode
3.5.1. Mixed Configuration Mode
3.5.2. Loose References to IDs
3.5.3. Transitioning Between Modes
3.6. Configuring the CLI Engine
3.7. Legacy Alcatel-Lucent Base-R13 NETCONF/YANG
3.7.1. Alcatel-Lucent Base-R13 SR OS YANG Modules
3.7.2. SPC Objects in Base-R13 NETCONF/YANG
3.8. Classic and Model-Driven Management Interfaces Command Reference
3.8.1. Command Hierarchies
3.8.1.1. Management Infrastructure Control Commands
3.8.2. Command Descriptions
3.8.2.1. Management Infrastructure Control Commands
3.9. Classic and Model-Driven Management Interfaces Show Command Reference
3.9.1. Command Hierarchies
3.9.1.1. Management Infrastructure Show Commands
3.9.2. Command Descriptions
3.9.2.1. Management Infrastructure Show Commands
4. SNMP
4.1. SNMP Overview
4.1.1. SNMP Architecture
4.1.2. Management Information Base
4.1.3. SNMP Protocol Operations
4.1.4. SNMP Versions
4.1.5. Management Information Access Control
4.1.6. User-Based Security Model Community Strings
4.1.7. Views
4.1.8. Access Groups
4.1.9. Users
4.1.10. Per-VPRN Logs and SNMP Access
4.1.11. Per-SNMP Community Source IP Address Validation
4.2. SNMP Versions
4.3. Best Practices for SNMP Information Retrieval
4.3.1. SNMP GetBulkRequest
4.3.2. Queueing, RTT, and Collection Performance
4.4. Configuration Notes
4.4.1. General
4.5. Configuring SNMP with CLI
4.5.1. SNMP Configuration Overview
4.5.1.1. Configuring SNMPv1 and SNMPv2c
4.5.1.2. Configuring SNMPv3
4.5.2. Basic SNMP Security Configuration
4.5.3. Configuring SNMP Components
4.5.3.1. Configuring a Community String
4.5.3.2. Configuring View Options
4.5.3.3. Configuring Access Options
4.5.3.4. Configuring USM Community Options
4.5.3.5. Configuring Other SNMP Parameters
4.6. SNMP Configuration Command Reference
4.6.1. Command Hierarchies
4.6.1.1. SNMP System Commands
4.6.1.2. SNMP Security Commands
4.6.2. Command Descriptions
4.6.2.1. SNMP System Commands
4.6.2.2. SNMP Security Commands
4.7. SNMP Show Command Reference
4.7.1. Command Hierarchies
4.7.1.1. Show Commands
4.7.2. Command Descriptions
4.7.2.1. Show Commands
5. NETCONF
5.1. NETCONF Overview
5.2. NETCONF in SR OS
5.2.1. Transport and Sessions
5.2.2. Datastores and URLs
5.2.3. NETCONF Operations and Capabilities
5.2.3.1. <get>
5.2.3.1.1. Example: Namespace Specified in <configure> Tag
5.2.3.1.2. Example: Namespace Error in <configure> Tag
5.2.3.1.3. Example: Namespace Specified in <state> Tag
5.2.3.1.4. Example: Namespace Error in <state> Tag
5.2.3.2. <get-config>
5.2.3.2.1. Example: Reply with Defaults
5.2.3.2.2. Example: Reply Without Default Values
5.2.3.2.3. Example: Containment Node
5.2.3.2.4. Example: List Without a Key Specified
5.2.3.2.5. Example: List with Non-key Leaf Specified as Selection Node
5.2.3.2.6. Example: Non-key Leaf Specified as a Content Match Node
5.2.3.2.7. Example: Content Match Node on a List Key
5.2.3.2.8. Example: Content Match Node on a Leaf-list
5.2.3.3. <edit-config>
5.2.3.3.1. Example: <running> Datastore with the “urn:nokia.com:sros:ns:yang:sr:conf” Namespace
5.2.3.3.2. Example: Application of Default Operation Value for Parent and Child Nodes
5.2.3.3.3. Example: Exceptions to the Default Operation Handling
5.2.3.4. <copy-config>
5.2.3.5. <delete-config>
5.2.3.6. <lock>
5.2.3.7. <unlock>
5.2.3.8. <commit>
5.2.3.9. <discard-changes>
5.2.3.10. <validate>
5.2.3.11. <get-schema>
5.2.3.12. <get-data>
5.2.4. Datastore and Operation Combinations
5.2.5. General NETCONF Behavior
5.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
5.2.5.2. Example: Non-default NETCONF Base Namespace
5.2.5.3. Example: Invalid NETCONF Namespace Declaration
5.2.5.4. Example: Non-default NETCONF Namespace or Prefix Declaration in a Child Tag
5.2.5.5. Example: Chunked Frame Mechanism
5.2.6. Establishing a NETCONF Session
5.2.6.1. Example: Checking NETCONF Status
5.2.6.2. Example: Retrieving System Configurations, QoS, and Log Branches
5.2.6.3. Example: Creating an Epipe Service
5.2.6.4. Example: Returning Multiple Errors
5.3. NETCONF Notifications
5.3.1. 5.3.1 NETCONF Notification Examples�
5.3.1.1. Example: <create-subscription> Operation
5.3.1.2. Example: sros-config-change-event Notification
5.3.1.3. Example: sros-state-change-event Notification
5.3.1.4. Example: sros-cli-accounting-event Notification
5.3.1.5. Example: sros-log-generic-event Notification
5.3.1.6. Example: netconf-config-change Notification
5.3.1.7. Example: sros-md-rpc-accounting-event Notification�
5.4. NETCONF Monitoring
5.5. NETCONF Using the YANG Library
5.6. NETCONF Using the Legacy Alcatel-Lucent Base-R13 SR OS YANG Modules
5.6.1. Operations and Capabilities
5.7. NETCONF Using the CLI Content Layer
5.7.1. CLI Content Layer Examples
5.7.1.1. Example: Configuration Change
5.7.1.2. Example: Retrieving Configuration Information�
5.7.1.3. Example: Retrieving Full Configuration Information�
5.7.1.4. Example: <get> Request
5.7.1.5. Example: <get> Request with Non-Syntax Error in the Second Item
5.8. NETCONF Configuration Command Reference
5.8.1. Command Hierarchies
5.8.1.1. NETCONF System Commands
5.8.1.2. NETCONF Security Commands
5.8.2. Configuration Commands
5.8.2.1. NETCONF System Commands
5.8.2.2. NETCONF Security Commands
5.9. NETCONF Show and Debug Command Reference
5.9.1. Command Hierarchies
5.9.1.1. Show Commands
5.9.1.2. Debug Commands
5.9.2. Command Descriptions
5.9.2.1. Show Commands
5.9.2.1.1. System Commands
5.9.3. Debug Commands
5.9.3.1. NETCONF Debug Commands
6. Event and Accounting Logs
6.1. Logging Overview
6.1.1. Logging Using the Management VPRN
6.2. Log Destinations
6.2.1. Console
6.2.2. Session
6.2.3. CLI Logs
6.2.4. Memory Logs
6.2.5. Log Files
6.2.6. SNMP Trap Group
6.2.7. Syslog
6.2.8. NETCONF
6.3. Event Logs
6.3.1. Event Sources
6.3.2. Event Control
6.3.3. Log Manager and Event Logs
6.3.4. Event Filter Policies
6.3.5. Event Log Entries
6.3.6. Simple Logger Event Throttling
6.3.7. Default System Log
6.3.8. Event Handling System
6.3.8.1. EHS Configuration and Syntax Rules
6.3.8.2. Examples of EHS Syntax Supported in Classic CLI
6.3.8.3. Valid Examples of EHS Syntax in Classic CLI
6.3.8.4. Invalid Examples for EHS Syntax in Classic CLI
6.3.8.5. EHS Debounce
6.3.8.6. Executing EHS or CRON Scripts
6.4. Customizing Syslog Messages Using Python
6.4.1. Python Engine for Syslog
6.4.1.1. Python Syslog APIs
6.4.1.2. Timestamp Format Manipulation
6.4.2. Python Processing Efficiency
6.4.3. Python Backpressure
6.4.4. Event Selection for Python Processing
6.4.5. Modifying a Log File
6.4.6. Deleting a Log File
6.4.7. Modifying a File ID
6.4.8. Modifying a Syslog ID
6.4.9. Modifying an SNMP Trap Group
6.4.10. Deleting an SNMP Trap Group
6.4.11. Modifying a Log Filter
6.4.12. Modifying Event Control Parameters
6.4.13. Returning to the Default Event Control Configuration
6.5. Accounting Logs
6.5.1. Accounting Records
6.5.2. Accounting Files
6.5.3. Design Considerations for Accounting Policies
6.5.4. Reporting and Time-Based Accounting
6.5.5. Overhead Reduction in Accounting: Custom Record
6.5.5.1. User Configurable Records
6.5.5.2. Changed Statistics Only
6.5.5.3. Configurable Accounting Records
6.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
6.5.5.3.2. XML Accounting Files for Policer Counters
6.5.5.3.3. RADIUS Accounting in Networks Using ESM
6.5.5.4. Significant Change Only Reporting
6.5.6. Immediate Completion of Records
6.5.6.1. Record Completion for XML Accounting
6.5.7. AA Accounting per Forwarding Class
6.6. Configuration Notes
6.7. Configuring Logging with CLI
6.7.1. Log Configuration Overview
6.7.2. Log Types
6.7.3. Basic Log Configuration
6.7.4. Common Configuration Tasks
6.7.4.1. Configuring an Event Log
6.7.4.2. Configuring a File ID
6.7.4.3. Configuring an Accounting Policy
6.7.4.4. Configuring Event Control
6.7.4.5. Configuring a Log Filter
6.7.4.6. Configuring an SNMP Trap Group
6.7.4.6.1. Setting the Replay Parameter
6.7.4.6.2. Shutdown In-Band Port
6.7.4.6.3. No Shutdown Port
6.7.4.7. Configuring a Syslog Target
6.7.4.7.1. Configuring an Accounting Custom Record
6.8. Log Configuration Command Reference
6.8.1. Command Hierarchies
6.8.1.1. Log Configuration Commands
6.8.1.2. Accounting Policy Commands
6.8.1.3. Custom Record Commands
6.8.1.4. File ID Commands
6.8.1.5. Event Filter Commands
6.8.1.6. Event Handling System (EHS) Commands
6.8.1.7. Event Trigger Commands
6.8.1.8. Log ID Commands
6.8.1.9. SNMP Trap Group Commands
6.8.1.10. Syslog Commands
6.8.2. Command Descriptions
6.8.2.1. Generic Commands
6.8.2.2. Log Configuration Commands
6.8.2.3. Accounting Policy Commands
6.8.2.3.1. Accounting Policy Custom Record Commands
6.8.2.4. File ID Commands
6.8.2.5. Event Filter Commands
6.8.2.6. Event Handling System (EHS) Commands
6.8.2.7. Event Trigger Commands
6.8.2.8. Log ID Commands
6.8.2.9. SNMP Trap Groups
6.8.2.10. Syslog Commands
6.9. Log Show, Clear, and Tools Command Reference
6.9.1. Command Hierarchies
6.9.1.1. Show Commands
6.9.1.2. Clear Command
6.9.1.3. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. Show Commands
6.9.2.2. Clear Commands
6.9.2.3. Tools Commands
7. Node Discovery Provisioning Using OSPF
7.1. Node Discovery Procedure
7.1.1. Network Element Profiles
7.1.2. Assigning a Network Element Profile
7.1.3. OSPFv2 Opaque LSA Requirements
7.1.4. IPv4/IPv6
7.2. Aggregation Node Configuration
7.2.1. MIB Requirements on the Aggregation Node
7.2.2. SNMP Traps and Gets
7.3. Network Element Discovery Command Reference
7.3.1. Command Hierarchies
7.3.1.1. Network Element Discovery Commands
7.3.2. Command Descriptions
7.3.2.1. Network Element Discovery Commands
8. sFlow
8.1. sFlow Overview
8.2. sFlow Features
8.2.1. sFlow Counter Polling Architecture
8.2.2. sFlow Support on Logical Ethernet Ports
8.2.3. sFlow SAP Counter Map
8.2.4. sFlow Record Formats
8.3. sFlow Command Reference
8.3.1. Command Hierarchies
8.3.1.1. sFlow Configuration Commands
8.3.2. Command Descriptions
8.3.2.1. Configuration Commands
8.4. sFlow Show Command Descriptions
8.4.1. Command Descriptions
8.4.1.1. sFlow Show Commands
8.4.1.2. Show Commands
9. gRPC
9.1. Security Aspects
9.1.1. TLS-Based Encryption
9.1.2. Authentication
9.2. gNMI Service
9.2.1. gNMI Service Definitions
9.2.1.1. Capability Discovery
9.2.1.2. Get/Set RPC
9.2.1.3. Subscribe RPC
9.2.1.3.1. Bytes Encoding
9.2.1.3.2. ON_CHANGE Subscription Mode
9.2.1.4. Publish RPC
9.2.1.5. Schema Paths
9.2.2. gNMI Service Use Cases
9.2.2.1. Telemetry
9.2.2.1.1. Dial-in Telemetry
9.2.2.1.2. Dial-out Telemetry
9.2.2.2. NE Configuration Management
9.3. gNOI Services
9.3.1. Certificate Management for TLS Connections
9.3.1.1. RPC GetCertificates
9.3.1.2. RPC CanGenerateCSR
9.3.1.3. RPC Rotate
9.3.1.4. RPC Install
9.3.1.5. RPC RevokeCertificates
9.4. gNOI System
9.4.1. SetPackage RPC
9.4.2. Reboot, CancelReboot, and RebootStatus RPC
9.4.3. SwitchControlProcessor RPC
9.5. MD-CLI Service
9.5.1. Remote Management Using a Remote Network Interface Shell Manager
9.6. gRPC Command Reference
9.6.1. Command Hierarchies
9.6.1.1. System Commands
9.6.1.2. QoS Commands
9.6.2. Command Descriptions
9.6.2.1. System Commands
9.6.2.2. QoS Commands
9.7. gRPC Show, Tools, and Admin Command Reference
9.7.1. Command Hierarchies
9.7.1.1. Show Commands
9.7.1.2. Tools Commands
9.7.1.3. Admin Commands
9.7.2. Command Descriptions
9.7.2.1. Show Commands
9.7.2.2. Tools Commands
9.7.2.3. Admin Commands
10. TLS
10.1. TLS Overview
10.2. TLS Server Interaction with Applications
10.2.1. TLS Application Support
10.3. TLS Handshake
10.4. TLS Client Certificate
10.5. TLS Symmetric Key Rollover
10.6. Supported TLS Ciphers
10.7. SR OS Certificate Management
10.7.1. Certificate Profile
10.7.2. TLS Server Authentication of the Client Certificate CN Field
10.7.3. CN Regexp Format
10.8. Operational Guidelines
10.8.1. Server Authentication Behavior
10.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
10.9. LDAP Redundancy and TLS
10.10. Basic TLS Configuration
10.11. Common Configuration Tasks
10.11.1. Configuring a Server TLS Profile
10.11.2. Configuring a Client TLS Profile
10.11.3. Configuring a TLS Client or TLS Server Certificate
10.11.4. Configuring a TLS Trust Anchor
10.12. TLS Command Reference
10.12.1. Command Hierarchies
10.12.1.1. Security TLS Commands
10.12.1.2. LDAP TLS Profile Commands
10.12.1.3. Admin Commands
10.12.2. Command Descriptions
10.12.2.1. Security TLS Commands
10.12.2.2. LDAP TLS Profile Commands
10.12.2.3. Admin Commands
10.13. TLS Show Command Reference
10.13.1. Command Hierarchies
10.13.1.1. Show Commands
10.13.2. Command Descriptions
10.13.2.1. Show Commands
11. Facility Alarms
11.1. Facility Alarms Overview
11.2. Facility Alarms vs. Log Events
11.3. Facility Alarm Severities and Alarm LED Behavior
11.4. Facility Alarm Hierarchy
11.5. Facility Alarm List
11.6. Configuring Logging with CLI
11.6.1. Basic Facility Alarm Configuration
11.6.2. Common Configuration Tasks
11.6.2.1. Configuring the Maximum Number of Alarms to Clear
11.7. Facility Alarms Configuration Command Reference
11.7.1. Command Hierarchies
11.7.1.1. Facility Alarm Configuration Commands
11.7.2. Command Descriptions
11.7.2.1. Generic Commands
11.8. Facility Alarms Show Command Reference
11.8.1. Command Hierarchies
11.8.1.1. Show Commands
11.8.2. Command Descriptions
11.8.2.1. Show Commands
12. Standards and Protocol Support
Customer Document and Product Support
Triple Play Service Delivery Architecture 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2. Introduction to Triple Play
2.1. Nokia’s Triple Play Service Delivery Architecture
2.1.1. Introduction to Triple Play
2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.1.3. Architectural Foundations
2.1.4. Optimizing Triple Play Service Infrastructures
2.1.4.1. Distributed Service Edges
2.1.4.2. Service Differentiation, QoS Enablement
2.1.4.3. Virtual MAC Subnetting for VPLS
2.2. Services
2.2.1. Service Types
2.2.2. Service Policies
2.3. Nokia Service Model
2.3.1. Introduction
2.3.2. Service Entities
2.3.3. Customers
2.3.4. Service Access Points (SAPs)
2.3.4.1. SAP Encapsulation Types and Identifiers
2.3.4.2. Ethernet Encapsulations
2.3.4.3. SAP Considerations
2.3.5. Service Distribution Points (SDPs)
2.3.5.1. SDP Binding
2.3.5.2. Spoke and Mesh SDPs
2.3.5.3. SDP Encapsulation Types
2.3.5.3.1. GRE
2.3.5.3.2. MPLS
2.3.5.4. SDP Keepalives
2.4. Epipe Service Overview
2.5. VPLS Service Overview
2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.5.1.1. Residential Split Horizon Groups
2.6. IES Service Overview
2.6.1. IP Interface
2.7. VPRN Service Overview
2.8. Deploying and Provisioning Services
2.8.1. Phase 1: Core Network Construction
2.8.2. Phase 2: Service Administration
2.8.3. Phase 3: Service Provisioning
2.9. Configuration Notes
2.9.1. General
2.10. Configuring Triple Play Services with CLI
2.10.1. Configuring VPLS Residential Split Horizon Groups
2.10.1.1. Configuring Static Hosts
2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
2.10.1.1.4. Configuring Static Hosts on an IES SAP
2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
2.11. Triple Play Services Command Reference
2.11.1. Command Hierarchies
2.11.1.1. IES/VPRN Triple Play Commands
2.11.1.2. VPLS Triple Play Commands
2.11.1.3. Show Commands
2.11.1.4. Clear Commands
2.11.1.5. Debug Commands
2.11.1.6. Tools Commands
2.11.2. Command Descriptions
2.11.2.1. Global Commands
2.11.2.2. IES/VPRN Service Commands
2.11.2.2.1. VPLS Triple Play Commands
2.11.2.2.2. Service DHCP and Anti-Spoof Filtering Commands
2.11.2.2.3. Interface IPv6 Commands
2.11.2.3. Show Commands
2.11.2.3.1. IGMP Snooping Show Commands
2.11.2.4. Clear Commands
2.11.2.5. Debug Commands
2.11.2.6. Tools Commands
3. DHCP Management
3.1. DHCP Principles
3.2. DHCP Features
3.2.1. DHCP Relay
3.2.2. DHCPv4 Relay Proxy
3.2.3. DHCPv4 Relay Lease Split
3.2.4. Subscriber Identification Using Option 82 Field
3.2.4.1. Trusted and Untrusted
3.2.5. DHCP Snooping
3.2.6. DHCP Lease State Table
3.2.7. DHCP and Layer 3 Aggregation
3.2.7.1. DHCPv4 Snooping
3.2.7.2. DHCPv6 Snooping
3.2.8. Local DHCP Servers
3.2.8.1. Overview
3.2.8.2. Local DHCP Server Support
3.2.9. DHCPv6
3.2.9.1. DHCPv6 Relay Agent
3.2.9.2. DHCPv6 Prefix Options
3.2.9.3. Neighbor Resolution With DHCPv6 Relay
3.2.9.4. DHCPv6 Lease Persistency
3.2.9.5. Local Proxy Neighbor Discovery
3.2.9.6. IPv6oE Hosts Behind Bridged CPEs
3.2.9.7. IPv6 Link-Address Based Pool Selection
3.2.9.8. IPv6 Address and Prefix Stickiness
3.2.9.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.2.9.10. Host Connectivity Checks for IPv6
3.2.10. Lease Query
3.2.11. DHCPv6 to Server Option
3.2.12. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.2.13. DHCP Caching
3.2.14. Flexible Creation of DHCPv4/6 Host Parameters
3.2.15. Python DTC Variables and API
3.2.15.1. DTC Debugging Facility
3.2.16. Virtual Subnet for DHCPv4 Hosts
3.2.17. Address Reservation for Sticky Leases
3.2.18. DHCP Message Processing Overload Protection
3.3. Proxy DHCP Server
3.3.1. Local DHCP Servers
3.3.1.1. Terminology
3.3.1.2. Overview
3.3.1.3. DHCP Lease Synchronization
3.3.1.4. Intercommunication Link Failure Detection
3.3.1.5. DHCP Server Failover States
3.3.1.6. Lease Time Synchronization
3.3.1.7. Maximum Client Lead Time (MCLT)
3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.3.1.9. Fast-Switchover of IP Address and Prefix Delegation
3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.4. Local Address Assignment
3.4.1. Stateless Address Auto-Configuration
3.5. Configuring DHCP with CLI
3.5.1. Enabling DHCP Snooping
3.5.2. Configuring Local User Database Parameters
3.5.3. Configuring Option 82 Handling
3.5.4. Enabling DHCP Relay
3.6. Triple Play DHCP Command Reference
3.6.1. Command Hierarchies
3.6.1.1. DHCP Filter Commands
3.6.1.1.1. DHCP Filter Commands
3.6.1.1.2. DHCP6 Filter Commands
3.6.1.2. Router Local DHCP Server Commands
3.6.1.3. Router Local DHCP6 Server Commands
3.6.1.4. Subscriber Management Commands
3.6.1.4.1. IPoE Commands
3.6.1.4.2. PPP Commands
3.6.1.4.3. MSAP Policy Commands
3.6.1.5. Service DHCP Commands
3.6.1.5.1. VPRN Local DHCP Server Commands
3.6.1.5.2. VPRN Local DHCP6 Server Commands
3.6.1.5.3. VPLS DHCP Commands
3.6.1.5.4. Anti-Spoof Filtering Commands
3.6.1.6. System DHCP Commands
3.6.1.7. Show Commands
3.6.1.8. Clear Commands
3.6.1.9. Debug Commands
3.6.1.10. Tools Commands
3.6.2. Command Descriptions
3.6.2.1. Triple Play DHCP Configuration Commands
3.6.2.1.1. Global Commands
3.6.2.1.2. DHCP Filter Commands
3.6.2.1.3. Subscriber Management Local User Database Commands
3.6.2.1.4. Managed SAP Policy Commands
3.6.2.1.5. Local DHCP Server Commands
3.6.2.1.6. Local DHCP6 Server Commands
3.6.2.1.7. DHCP Service Commands
3.6.2.1.8. System DHCP Commands
3.6.2.1.9. Show Commands
3.6.2.1.10. Clear Commands
3.6.2.1.11. Debug Commands
3.6.2.1.12. Tools Commands
4. Stateless Address Auto-configuration (SLAAC)
4.1. SLAAC Management Principles
4.2. Configuration Overview
4.3. Router-Solicit Trigger
4.4. SLAAC Address Assignment
4.5. Static SLAAC Prefix Assignment
4.6. Dynamic SLAAC Prefix Assignment
4.7. SLAAC Prefix Replacement
5. Point-to-Point Protocol over Ethernet Management
5.1. PPPoE
5.1.1. PPPoE Authentication and Authorization
5.1.1.1. General Flow
5.1.1.2. RADIUS
5.1.1.3. Local User Database Directly Assigned to PPPoE Node
5.1.1.4. Subscriber per PPPoE Session Index
5.1.1.5. Local DHCP Server with Local User Database
5.1.2. PPPoE Session ID Allocation
5.1.3. Multiple Sessions Per MAC Address
5.1.4. Session Limit Per Circuit ID
5.1.5. PPP Session Re-establishment
5.1.6. Private Retail Subnets
5.1.7. IPCP Subnet Negotiation
5.1.7.1. Numbered WAN Support for Layer 3 RGs
5.1.8. IES as Retail Service for PPPoE Host
5.1.9. Unnumbered PPPoE
5.1.10. Selective Backhaul of PPPoE Traffic using an Epipe Service
5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.2.1. Terminology
5.2.2. LNS MLPPPoX
5.2.3. MLPPP Encapsulation
5.2.4. MLPPPoX Negotiation
5.2.5. Enabling MLPPPoX
5.2.6. Link Fragmentation and Interleaving (LFI)
5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.2.7. LFI Functionality Implemented in LNS
5.2.7.1. Last Mile QoS Awareness in the LNS
5.2.7.2. BB-ISA Processing
5.2.7.3. LNS-LAC Link
5.2.7.4. AN-RG Link
5.2.7.5. Home Link
5.2.7.6. Optimum Fragment Size Calculation by LNS
5.2.7.6.1. Encapsulation Based Fragment Size
5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
5.2.7.6.3. Selection of the Optimum Fragment Length
5.2.8. Upstream Traffic Considerations
5.2.9. Multiple Links MLPPPoX With No Interleaving
5.2.10. MLPPPoX Session Support
5.2.11. Session Load Balancing Across Multiple BB-ISAs
5.2.12. BB-ISA Hashing Considerations
5.2.13. Last Mile Rate and Encapsulation Parameters
5.2.14. Link Failure Detection
5.2.15. CoA Support
5.2.16. Accounting
5.2.17. Filters and Mirroring
5.2.18. PTA Considerations
5.2.19. QoS Considerations
5.2.19.1. Dual-Pass
5.2.19.2. Traffic Prioritization in LFI
5.2.19.3. Shaping Based on the Last Mile Wire Rates
5.2.19.4. Downstream Bandwidth Management on Egress Port
5.2.20. Sub/Sla-Profile Considerations
5.2.21. Example of MLPPPoX Session Setup Flow
5.2.22. Other Considerations
5.3. Configuration Notes
5.4. PPP Command Reference
5.4.1. Command Hierarchies
5.4.1.1. PPPoE Policy Configuration Commands
5.4.1.2. PPPoE Service Commands
5.4.1.3. PPPoE Local User Database Commands
5.4.1.4. MLPPP on LNS Commands
5.4.1.5. Show Commands
5.4.2. Command Descriptions
5.4.2.1. Generic Commands
5.4.2.1.1. Subscriber Management Commands
5.4.2.1.2. MLPPP on LNS Commands
5.4.2.1.3. PPP/PPPoE Service Commands
5.4.2.1.4. RADIUS Attribute Commands
5.4.2.2. Service Commands
5.4.2.3. Show Commands
5.4.2.4. Clear Commands
5.4.2.5. Debug Commands
6. Layer 2 Tunneling Protocol (L2TP)
6.1. Terminology
6.2. L2TP Overview
6.2.1. LAC DF Bit
6.2.2. Handling L2TP Tunnel/Session Initialization Failures
6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.2.2. Peer Blacklist
6.2.2.3. Tunnel Blacklists
6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.2.4. Tunnel Selection Mechanism
6.2.2.5. Tunnel Probing
6.2.2.6. Controlling the Size of Blacklist
6.2.2.7. Displaying the Content of a Blacklist
6.2.2.8. Generating Trap when the Blacklist is Full
6.2.2.9. Premature Removal of Blacklisted Entries
6.2.2.10. Manual Purging of Entities within the Blacklist
6.2.3. CDN Result Code Overwrite
6.2.4. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. Traffic Steering on L2TP LAC
6.4.1. Steering Activation and Deactivation
6.4.2. Steering States
6.4.3. Configuring Traffic Steering on L2TP LAC
6.5. L2TP Tunnel RADIUS Accounting
6.5.1. Accounting Packets List
6.5.2. RADIUS Attributes Value Considerations
6.6. MLPPP on the LNS Side
6.7. LNS Reassembly
6.8. LNS Subscriber Policers
6.8.1. Policer Support
6.9. L2TP Command Reference
6.9.1. Command Hierarchies
6.9.1.1. L2TP Configuration Commands
6.9.1.1.1. Router Commands
6.9.1.1.2. Redundancy Commands
6.9.1.1.3. Service Commands
6.9.1.1.4. System Commands
6.9.1.2. Steering Profile Commands
6.9.1.3. L2TP Tunnel RADIUS Accounting Commands
6.9.1.4. Show Commands
6.9.1.5. Clear Commands
6.9.1.6. Debug Commands
6.9.1.7. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. L2TP Configuration Commands
6.9.2.1.1. Global Commands
6.9.2.1.2. L2TP Commands
6.9.2.2. Steering Profile Commands
6.9.2.3. L2TP Tunnel RADIUS Accounting Commands
6.9.2.4. Show Commands
6.9.2.5. Clear Commands
6.9.2.6. Debug Commands
6.9.2.7. Tools Commands
7. Triple Play Security
7.1. Triple Play Security Features
7.1.1. Anti-Spoofing Filters
7.1.1.1. Anti-spoofing Filter Types
7.1.1.2. Filtering Packets
7.1.2. Layer 2 Triple Play Security Features
7.1.2.1. MAC Pinning
7.1.2.2. MAC Protection
7.1.2.3. DoS Protection
7.1.2.3.1. Subscriber Aggregation Network
7.1.2.3.2. Network Control Filtering
7.1.2.4. VPLS Redirect Policy
7.1.3. ARP Handling
7.1.3.1. ARP Reply Agent
7.1.3.2. Dynamic ARP Table Population
7.1.3.3. Local Proxy ARP
7.1.4. Web Portal Redirect
7.2. Configuring Triple Play Security with CLI
7.2.1. Common Configuration Tasks
7.2.1.1. Configuring Anti-Spoofing Filters
7.2.1.2. Configuring Triple Play Security Features
7.2.1.2.1. Configuring MAC Pinning
7.2.1.2.2. Configuring MAC Protection
7.2.1.2.3. Configuring VPLS Redirect Policy
7.2.1.3. Configuring ARP Handling
7.2.1.3.1. Configuring Proxy ARP
7.2.1.3.2. Configuring Local Proxy ARP
7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
7.2.1.3.4. Configuring Remote Proxy ARP
7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
7.2.1.3.6. Configuring CPU Protection
7.2.1.4. Configuring Web Portal Redirect
7.3. Triple Play Security Command Reference
7.3.1. Command Hierarchies
7.3.1.1. Anti-Spoofing Commands
7.3.1.2. Layer 2 Security Commands
7.3.1.3. ARP Handling Commands
7.3.1.4. Show Commands
7.3.1.5. Tools Commands
7.3.2. Command Descriptions
7.3.2.1. Triple Play Security Configuration Commands
7.3.2.1.1. Triple Play Anti-Spoofing Commands
7.3.2.1.2. Triple Play Layer 2 Security Commands
7.3.2.1.3. ARP Handling Commands
7.3.2.2. Show Commands
7.3.2.3. Tools Commands
8. Triple Play Multicast
8.1. Introduction to Multicast
8.2. Multicast in the Broadband Service Router
8.2.1. Internet Group Management Protocol
8.2.1.1. IGMP Versions and Interoperability Requirements
8.2.1.2. IGMP Version Transition
8.2.2. Multicast Listener Discovery
8.2.2.1. MLD Versions and Interoperability Requirements
8.2.2.2. Source Specific Multicast Groups
8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
8.3. Multicast in the BSA
8.3.1. IGMP Snooping
8.3.1.1. IGMP/MLD Message Processing
8.3.1.2. IGMP Message Processing
8.3.1.3. MLD Message Processing
8.3.1.4. IGMP/MLD Filtering
8.3.2. Multicast VPLS Registration (MVR)
8.3.3. Layer 3 Multicast Load Balancing
8.3.4. IGMP State Reporter
8.3.4.1. IGMP Data Records
8.3.4.2. Transport Mechanism
8.3.4.3. HA Compliance
8.3.4.4. QoS Awareness
8.3.4.5. IGMP Reporting Caveats
8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
8.4.1. Multicast Over IPoE
8.4.1.1. Per SAP Replication Mode
8.4.1.1.1. Per SAP Queue
8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.4.1.2. Per Subscriber Host Replication Mode
8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.4.2. Multicast Over PPPoE
8.4.3. IGMP Flooding Containment
8.4.4. IGMP/MLD Timers
8.4.5. IGMP/MLD Query Intervals
8.4.6. HQoS Adjustment
8.4.6.1. Host Tracking (HT) Considerations
8.4.6.2. HQoS Adjust Per Vport
8.4.6.2.1. Multi-Chassis Redundancy
8.4.6.2.2. Scalability Considerations
8.4.7. Redirection
8.4.8. Hierarchical Multicast CAC (H-MCAC)
8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
8.4.9. Determining MCAC Policy in Effect
8.4.10. Multicast Filtering
8.4.11. Joining the Multicast Tree
8.4.12. Wholesale/Retail Requirements
8.4.13. QoS Considerations
8.4.14. Redundancy Considerations
8.4.14.1. Redirection Considerations
8.4.15. Query Intervals for Multicast
8.4.15.1. ESM Host-based Queries
8.4.15.2. Group Interface-based Queries
8.5. Configuring Triple Play Multicast Services with CLI
8.5.1. Configuring IGMP Snooping in the BSA
8.5.1.1. Enabling IGMP Snooping in a VPLS Service
8.5.1.2. IGMPv3 Multicast Routers
8.5.1.3. With IGMPv1/2 Multicast Routers
8.5.1.4. Modifying IGMP Snooping Parameters
8.5.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
8.5.2. Configuring Static Multicast Groups on a SAP or SDP
8.5.2.1. Enabling IGMP Group Membership Report Filtering
8.5.2.1.1. Enabling IGMP Traffic Filtering
8.5.3. Configuring Multicast VPLS Registration (MVR)
8.5.4. Configuring IGMP, MLD, and PIM in the BSR
8.5.4.1. Enabling IGMP
8.5.4.2. Configuring IGMP Interface Parameters
8.5.4.3. Configuring Static Parameters
8.5.4.4. Configuring SSM Translation
8.5.4.5. Enabling MLD
8.5.4.6. Configuring MLD Interface Parameters
8.5.4.7. Configuring Static Parameters
8.5.4.8. Configuring SSM Translation
8.5.4.9. Configuring PIM
8.5.4.9.1. Enabling PIM
8.5.4.9.2. Configuring PIM Interface Parameters
8.5.4.9.3. Importing PIM Join/Register Policies
8.5.4.9.4. Configuring PIM Join/Register Policies
8.5.4.10. Configuring Bootstrap Message Import and Export Policies
8.6. Triple Play Multicast Command Reference
8.6.1. Command Hierarchies
8.6.1.1. Multicast Management Commands
8.6.1.2. Multicast Info Policy Bundle Commands
8.6.1.3. Multicast Service Commands
8.6.1.4. Ingress Multicast Path Management Commands
8.6.1.5. Multicast Redirection
8.6.1.6. Multicast Query Timer Commands
8.6.1.7. Show Commands
8.6.1.8. Debug Commands
8.6.2. Command Descriptions
8.6.2.1. Multicast Management Configuration Commands
8.6.2.1.1. Generic Commands
8.6.2.1.2. Multicast Management Commands
8.6.2.1.3. Bandwidth Policy Commands
8.6.2.1.4. Multicast Info Policy Commands
8.6.2.1.5. Service Commands
8.6.2.1.6. VPLS Multicast Commands
8.6.2.1.7. Chassis Level Commands
8.6.2.1.8. Multicast Redirection Commands
8.6.2.1.9. Multicast Query Timer Commands
8.6.2.1.10. Forwarding Plane Commands
8.6.2.2. Show Commands
8.6.2.3. Debug Commands
9. Triple Play Enhanced Subscriber Management
9.1. Uniform RADIUS Server Configuration
9.1.1. RADIUS Server Configuration
9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
9.1.1.2. Legacy RADIUS Server Configuration
9.2. RADIUS Authentication of Subscriber Sessions
9.2.1. RADIUS Authentication Extensions
9.2.1.1. Triple Play Network with RADIUS Authentication
9.2.2. RADIUS Authorization Extensions
9.2.2.1. Calling-Station-ID
9.2.2.2. Subscriber Session Timeout
9.2.2.2.1. Domain Name in Authentication
9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.2.2.4. SHCV Policy
9.2.3. radius-server-policy Retry Attempt Overview
9.2.4. AAA RADIUS Server Operation Status
9.2.5. AAA RADIUS Accounting Server Stickiness
9.2.6. AAA RADIUS Authentication Fallback Action
9.2.7. AAA Test User Account
9.2.8. Troubleshooting the RADIUS Server
9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.2.9.1. Provisioning IP Configuration of the Host
9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
9.2.9.3. Change of Authorization and Disconnect-Request
9.2.9.3.1. Change of Authorization using the Tools Command
9.2.9.4. RADIUS-Based Accounting
9.2.9.5. RADIUS Accounting Terminating Cause
9.2.9.6. Accounting Modes Of Operation
9.2.9.7. Per Session Accounting
9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
9.2.9.9. No Host-Accounting
9.2.9.10. Host-Accounting Enabled
9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.2.9.12. Accounting Interim Update Message Interval
9.2.9.13. CoA Triggered Accounting Interim Update
9.2.9.14. Class Attribute
9.2.9.15. User Name
9.2.9.16. Accounting-On and Accounting Off
9.2.9.17. RADIUS Accounting Message Buffering
9.2.9.18. Multiple Accounting Policies
9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.3. Enhanced Subscriber Management Overview
9.3.1. Enhanced Subscriber Management Basics
9.3.1.1. Standard and Enhanced Subscriber Management
9.3.1.1.1. Subscriber Management Definitions
9.3.1.1.2. Subscriber Identification Policy
9.3.1.1.3. Subscriber Identification String
9.3.1.1.4. Subscriber Profile
9.3.1.1.5. SLA Profile
9.3.1.1.6. Explicit Subscriber Profile Mapping
9.3.2. ESM for IPv6
9.3.2.1. Models
9.3.2.1.1. PPPoE Host
9.3.2.1.2. PPPoE RG
9.3.2.1.3. IPoE Host/RG
9.3.2.2. Setup
9.3.2.3. 64-bit and 128-bit WAN Mode
9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
9.3.2.4. Behavior
9.3.2.4.1. Dual Stack
9.3.2.4.2. Router Advertisements (RA)
9.3.2.4.3. CoA and Disconnect-Request
9.3.2.5. Delegated-Prefix-Length
9.3.2.5.1. Order of Preference for DPL
9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
9.3.2.6. DHCPv6 Relay Agent
9.3.2.6.1. Configuring a DHCPv6 Relay Agent
9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
9.3.2.8. DHCPv6 Local Server
9.3.3. Dynamic Subscriber Host Processing
9.3.3.1. Dynamic Tables
9.3.3.1.1. Active Subscriber Table
9.3.3.1.2. SLA Profile Instance Table
9.3.3.1.3. Subscriber Host Table
9.3.3.1.4. DHCP Lease State Table
9.3.4. Enhanced Subscriber Management Entities
9.3.4.1. Instantiating a New Host
9.3.4.2. Packet Processing for an Existing Host
9.3.5. ESM Host Lockout
9.3.5.1. Functionality
9.3.6. ANCP and GSMP
9.3.6.1. ANCP
9.3.6.1.1. Static ANCP Management
9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.3.6.1.3. ANCP String
9.3.6.1.4. ANCP Persistency Support
9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.3.6.3. DHCP Release Messages
9.3.6.3.1. DHCP Release
9.3.6.4. DHCP Client Mobility
9.3.6.5. DHCP Lease Control
9.3.7. Using Scripts for Dynamic Recognition of Subscribers
9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.3.7.3. Determining the Subscriber Profile
9.3.7.4. Determining the SLA Profile
9.3.7.4.1. SLA Profile Instance Sharing
9.3.7.4.2. SLA-Based Egress QoS Marking
9.3.8. Sub-id and Brg-id Names with Lengths Between 32 and 64 Characters
9.3.8.1. Online Change of Sub-id and Brg-id
9.3.8.2. Usage Notes
9.3.9. Auto-Sub ID
9.3.9.1. Sub-id Identifiers
9.3.9.2. Dual Stack Hosts
9.3.9.3. Mixing Hosts with Auto-Generated IDs and non-Auto-Generated IDs
9.3.9.4. Deployment Considerations
9.3.9.5. Caveats
9.3.10. Limiting Subscribers and Hosts on a SAP
9.3.11. Static Subscriber Hosts
9.3.12. QoS for Subscribers and Hosts
9.3.12.1. QoS Parameters in Different Profiles
9.3.12.2. QoS Policy Overrides
9.3.13. ESM Subscriber Hierarchical Traffic Control
9.3.13.1. Subscriber HQoS
9.3.13.2. Subscriber CFHP
9.3.13.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.3.13.3.1. Broadband Network Gateway Application
9.3.13.3.2. Queue Determination and Scheduling
9.3.13.3.3. Weighted Scheduler Group
9.3.13.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.3.13.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.3.13.3.6. Vport Determination and Evaluation
9.3.13.3.7. Applying Aggregate Rate Limit to a Vport
9.3.13.3.8. Applying a Scheduler Policy to a Vport
9.3.13.3.9. Signaling of Last Mile Encapsulation Type
9.3.13.3.10. Configuration Example
9.3.14. Subscriber Volume Statistics
9.3.14.1. IP (Layer 3) Volume Accounting
9.3.14.2. Separate IPv4 and IPv6 Counters
9.3.15. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.3.15.1. Dynamic Updates of Subscriber Filter Policies
9.3.15.1.1. SLA Profile Change
9.3.15.1.2. Override the IP and IPv6 Filter Policies
9.3.15.1.3. Insert Subscriber Host-Specific Filter Entries
9.3.15.1.4. Insert Shared Filter Entries
9.3.15.2. Checking Filter Policy Details
9.3.16. Multi-Chassis Synchronization
9.3.16.1. Overview
9.3.16.1.1. Loss of Synchronization and Reconciliation
9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
9.3.17.1. SRRP Messaging
9.3.17.2. SRRP and Multi-Chassis Synchronization
9.3.17.3. SRRP Instance
9.3.17.3.1. SRRP Instance MCS Key
9.3.17.3.2. Containing Service Type and ID
9.3.17.3.3. Containing Subscriber IP Interface Name
9.3.17.3.4. Subscriber Subnet Information
9.3.17.3.5. Containing Group IP Interface Information
9.3.17.3.6. Remote Redundant IP Interface Mismatch
9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.3.17.3.10. Local and Remote Dual Master Detected
9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.3.18. PPPoE MC Redundancy
9.3.18.1. SRRP Considerations for PPPoE
9.3.18.1.1. SRRP Fact-Checks
9.3.18.2. State Synchronization
9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.3.18.3. Traffic Control and Redundant Interface
9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
9.3.18.3.2. Subnet Assignment and Advertisement - Option B
9.3.18.4. MSAP Considerations
9.3.18.5. Unnumbered Interface Support
9.3.18.6. Compatibility with MC-LAG
9.3.18.7. IPv6 Support
9.3.18.8. Considerations with Local DHCP Server
9.3.18.9. Redundant Interface Considerations
9.3.19. Routed Central Office (CO)
9.3.19.1. Layer 3 Subscriber Interfaces
9.3.19.1.1. DHCP Interactions
9.3.19.1.2. Routed CO for IES Service
9.3.19.1.3. Routed CO for VPRN Service
9.3.19.2. Wholesale Retail Routed CO
9.3.19.2.1. Wholesale Retail Model
9.3.19.2.2. Configuration and Applicability
9.3.19.2.3. Hub-and-Spoke Forwarding
9.3.19.3. Routed Subscriber Hosts
9.3.19.3.1. Static Configured IPv4 Managed Route
9.3.19.3.2. Static Configured IPv6 Managed Route
9.3.19.3.3. Dynamic BGP Peering
9.3.19.3.4. RIP Listener
9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.3.19.3.6. GRT Lookup and Routed CO in a VPRN
9.3.20. Dual Homing
9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.3.20.2. Steady-State Operation of Dual-homed Ring
9.3.20.3. Broken-Ring Operation and the Transition to this State
9.3.20.4. Transition from Broken to Closed Ring State
9.3.20.5. Provisioning Aspects and Error Cases
9.3.20.6. Dual Homing to Two BSR Nodes
9.3.20.7. MC Services
9.3.20.8. Routed CO Dual Homing
9.3.20.8.1. Redundant Interfaces
9.3.20.8.2. SRRP in Dual Homing
9.3.20.8.3. Synchronization
9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.3.20.9. SRRP and Multi-Chassis Synchronization
9.3.20.10. Dual Homing and ANCP
9.3.21. SRRP Enhancement
9.3.21.1. SRRP Fate Sharing
9.3.21.2. Fate Sharing Algorithm
9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.3.21.3.2. Managed Routes
9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.3.21.3.4. Activating SRRP State Tracking
9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.3.21.5. Group Monitor
9.3.22. Subscriber QoS Overrides
9.3.23. Dual-Stack Lite
9.3.23.1. IP-in-IP
9.3.23.2. Configuring DS-Lite
9.3.23.3. L2TP over IPv6
9.3.24. Call Trace
9.4. L2TP Tunnel RADIUS Accounting
9.4.1. Accounting Packets List
9.4.2. RADIUS Attributes Value Considerations
9.4.3. Other Optional RADIUS Attributes
9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.4.5. MLPPP on the LNS Side
9.5. RADIUS Route Download
9.6. Managed SAP (MSAP)
9.6.1. Capture SAP
9.6.2. MSAP Parameters
9.6.2.1. Explicit MSAP Parameters from Local User Database
9.6.2.2. Explicit MSAP Parameters from RADIUS or DIAMETER Authentication�
9.6.2.3. Implicit MSAP Parameters Specified at the Capture SAP
9.6.3. MSAP Creation
9.6.4. MSAP QoS Configuration
9.6.5. Sticky MSAP
9.7. ESM Identification Process
9.7.1. SAP-ID ESM Identifier
9.7.2. DSLAM-ID
9.8. Default-Subscriber
9.9. Subscriber Mirroring
9.10. Multicast Management
9.11. Volume and Time Based Accounting
9.11.1. Metering
9.11.1.1. Categories Map and Categories
9.11.1.2. Quota Consumption
9.11.1.3. Minimum Credit Control Quota Values
9.11.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.11.2. Credit Negotiation Mechanisms
9.11.3. Action on Credit Exhaustion
9.11.4. Action on Error-Conditions
9.11.5. Applicability of Volume and Time Based Accounting
9.12. Subscriber Host Idle Timeout
9.13. Web Portal Authentication
9.13.1. HTTP-Redirect (Captive Portal)
9.13.2. One-time HTTP Redirection Overview
9.13.3. Web Authentication Protocol (WPP)
9.13.3.1. WPP Configurations
9.13.3.2. WPP Triggered Host Creation
9.13.3.2.1. LUDB Support For WPP
9.13.3.3. WPP Multi-Chassis Redundancy Support
9.13.3.4. WPP Portal Group
9.14. ESM over MPLS Pseudowires
9.14.1. Encapsulation
9.14.2. ESM and PW Ports
9.14.2.1. ESM on PW-Port Bound to a Physical Port
9.14.2.1.1. QoS Support
9.14.2.1.2. BNG Redundancy with ESM over Pseudowire
9.14.2.2. ESM on PXC-Based PW-Ports
9.15. Logical Link Identifier (LLID)
9.16. PADI Authentication Policy for Managed SAP (MSAP)
9.17. Open Authentication Model for DHCP and PPPoE Hosts
9.17.1. Terminology
9.17.2. LUDB and RADIUS Access Models
9.17.3. No Authentication
9.17.4. LUDB Only Access
9.17.5. LUDB Access via DHCPv4 Server
9.17.6. RADIUS Only Access
9.17.7. Consecutive Access to LUDB and RADIUS
9.17.8. RADIUS Fallback
9.18. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.18.1. Terminology
9.18.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
9.18.3. Default Gateway in IPv4 Flexible Addressing
9.18.4. IPv4 Subnet Sharing
9.18.5. IPv4 Subnet Mask Auto-Generation
9.18.6. Local-proxy-arp and arp-populate
9.18.7. Gi-address Configuration Consideration
9.18.8. PPPoE Considerations
9.18.9. IPoEv6 Considerations
9.18.10. General Configuration Guidelines for Flexible IP Address Assignment
9.18.11. Caveats
9.19. uRPF for Subscriber Management
9.20. IPoE Sessions
9.20.1. Enabling IPoE Sessions
9.20.2. IPoE Session Authentication
9.20.3. IPoE Session Accounting
9.20.4. IPoE Session Mid-Session Changes
9.20.5. IPoE Session Termination
9.20.6. Limiting the Number of IPoE Sessions
9.20.7. SAP Session Index
9.20.8. Resiliency
9.20.9. Notes
9.20.10. Configuration Steps
9.20.11. IPoE Session Migration
9.20.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.21. Data-triggered Subscriber Management
9.21.1. Provisioning Data-triggered ESM
9.21.2. Authentication and Host Creation
9.21.3. DoS Protection
9.21.4. DHCP Promotion
9.21.5. Data-Triggered SLAAC Hosts
9.21.6. Stateful Multi-Chassis Redundancy (MCS)
9.21.7. Stateless Multi-Chassis Redundancy
9.21.7.1. MSAP Support
9.22. RADIUS Subscriber Services
9.22.1. Subscriber Service Building Blocks
9.22.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.22.1.2. RADIUS Python Interface
9.22.1.3. Python Script
9.22.1.3.1. Python Script Example
9.22.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.22.2. Subscriber Services RADIUS VSAs
9.22.3. Subscriber Service RADIUS Accounting
9.22.4. Accounting-Only Subscriber Service
9.22.5. QoS Override-based Subscriber Service
9.22.6. PCC Rule-based Subscriber Services
9.22.6.1. PCC Rule Actions
9.22.6.2. PCC Rule Instantiation
9.22.6.3. PCC Rules in a Subscriber Service
9.22.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.22.6.5. PCC Rules on HSMDAv2
9.22.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
9.22.6.6. PCC Rule-based Subscriber Service Activation Failures
9.22.7. Combined Subscriber Services
9.22.8. Subscriber Services Python API
9.22.8.1. Common Subscriber Services Python API
9.22.8.2. Subscriber Service QoS Override Python API
9.22.8.3. Subscriber Service PCC Rules Python API
9.22.9. Operational Commands
9.22.9.1. Show Commands
9.22.9.2. Debug Commands
9.22.9.3. Resource Monitoring
9.23. Residential Gateway Replacement
9.24. ESM Troubleshooting Show Command
9.25. Subscriber Accumulated Statistics
9.26. Hybrid Access
9.26.1. BNG-based HAG
9.26.2. PGW-based HAG
9.27. Connection Bonding
9.27.1. Setup
9.27.2. Downstream Load-Balancing
9.27.3. QoS
9.27.4. Multicast
9.28. Ethernet Satellites with Redundant Uplinks
9.28.1. Single Host, Single Satellite
9.28.2. Single Host Node, Dual Satellite
9.28.3. QoS
9.28.4. Preservation of Statistics and Accounting in ESM
9.29. Multi-Chassis Synchronization of RADIUS Usage Counters
9.29.1. Overview
9.29.2. MCS Interval
9.29.3. Usage Counters Synchronized
9.29.4. Incomplete MCS Configuration
9.29.5. Configuration Mismatch
9.29.6. Switchover Scenarios
9.30. Configuring Enhanced Subscriber Management with CLI
9.30.1. Configuring RADIUS Authentication of DHCP Sessions
9.30.2. TCP MSS adjustment for ESM Hosts
9.30.3. Configuring Enhanced Subscriber Management
9.30.3.1. Basic Configurations
9.30.3.2. Subscriber Interface Configuration
9.30.3.3. Configuring Enhanced Subscriber Management Entities
9.30.3.3.1. Configuring a Subscriber Identification Policy
9.30.3.3.2. Configuring a Subscriber Profile
9.30.3.3.3. Configuring an SLA Profile
9.30.3.3.4. Configuring Explicit Mapping Entries
9.30.3.4. Routed CO with Basic Subscriber Management Features
9.30.3.5. Applying the Profiles and Policies
9.30.3.5.1. SLA Profile
9.30.4. Configuring Dual Homing
9.31. Subscriber Management Command Reference
9.31.1. Command Hierarchies
9.31.1.1. ANCP Commands
9.31.1.2. Authentication Policy Commands
9.31.1.3. BGP Peering Policy Commands
9.31.1.4. Call Trace Commands
9.31.1.5. Category Map and Credit Control Policy Commands
9.31.1.6. Diameter Policy Commands
9.31.1.6.1. AAA Diameter Peer Policy Commands
9.31.1.6.2. Subscriber Management Diameter Application Policy Commands
9.31.1.6.3. Diameter Base Commands
9.31.1.7. Explicit Subscriber Mapping Commands
9.31.1.8. Filter Commands
9.31.1.9. GSMP Configuration Commands
9.31.1.10. Host Lockout Commands
9.31.1.11. Host Tracking Policy Commands
9.31.1.12. IGMP Policy Commands
9.31.1.13. Multi-Chassis Redundancy Commands
9.31.1.14. PIM Policy Commands
9.31.1.15. RADIUS Accounting Policy Commands
9.31.1.16. RADIUS Route Download Commands
9.31.1.17. Router Advertisement Commands
9.31.1.18. SLA Profile Commands
9.31.1.19. Subscriber Identification Policy Commands
9.31.1.20. Auto-Generated Subscriber Identification Key Commands
9.31.1.21. Auto-Generated Subscriber Identification Key Service Commands
9.31.1.22. Subscriber MCAC Policy Commands
9.31.1.23. Subscriber Profile Commands
9.31.1.24. IPoE Session Policy Commands
9.31.1.25. SHCV Policy Commands
9.31.1.26. Subscriber Management Service Commands
9.31.1.26.1. VPLS Subscriber Management Configuration Commands
9.31.1.26.2. Managed SAP Policy Commands
9.31.1.26.3. VPRN Subscriber Interface Commands
9.31.1.26.4. VPRN Subscriber Group Interface Commands
9.31.1.26.5. IES Subscriber Management Configuration Commands
9.31.1.26.6. IES Subscriber Interface Commands
9.31.1.26.7. IES Group Interface Commands
9.31.1.26.8. Service Subscriber Interface, Group Interface IPoE Command
9.31.1.26.9. RIP Commands
9.31.1.26.10. VPort Commands
9.31.1.26.11. Redundant Interface Commands
9.31.1.26.12. Wireless Portal Protocol (WPP) Commands
9.31.1.26.13. Multiple PPPoE Session QoS Commands
9.31.1.26.14. Multicast Listener Discovery (MLD) Commands
9.31.1.26.15. ETH-CFM Service Commands
9.31.1.27. Show Commands
9.31.1.28. Monitor Commands
9.31.1.29. Clear Commands
9.31.1.30. Debug Commands
9.31.1.31. Tools Commands
9.31.2. Triple Play Subscriber Management Configuration Commands
9.31.2.1. Triple Play Subscriber Management Configuration Commands
9.31.2.1.1. Generic Commands
9.31.2.1.2. ANCP Commands
9.31.2.1.3. Authentication Policy Commands
9.31.2.1.4. BGP Peering Policy Commands
9.31.2.1.5. Call Trace Commands
9.31.2.1.6. Category Map Commands
9.31.2.1.7. Diameter Policy Commands
9.31.2.1.8. Diameter Base Commands
9.31.2.1.9. Explicit Subscriber Mapping Commands
9.31.2.1.10. GSMP Configuration Commands
9.31.2.1.11. Host Lockout Commands
9.31.2.1.12. IGMP Policy Commands
9.31.2.1.13. Managed SAP Policy Commands
9.31.2.1.14. Multicast Listener Discovery (MLD) Commands
9.31.2.1.15. Multi-Chassis Redundancy Commands
9.31.2.1.16. PIM Policy Commands
9.31.2.1.17. RADIUS Accounting Policy Commands
9.31.2.1.18. RADIUS Route Download Commands
9.31.2.1.19. Redundant Interface Commands
9.31.2.1.20. RIP Commands
9.31.2.1.21. Router Advertisement Policy Commands
9.31.2.1.22. SLA Profile Commands
9.31.2.1.23. Subscriber Identification Policy Commands
9.31.2.1.24. Subscriber Profile Commands
9.31.2.1.25. Subscriber Management Service Commands
9.31.2.1.26. Subscriber Management Service Commands
9.31.2.1.1.1. Vport Commands
9.31.2.1.2.1. IPoE Session Commands
9.31.2.1.3.1. SHCV Policy Commands
9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.6.1. IPv6 Commands
9.31.2.1.26.1. Show Commands
9.31.2.2.26.1. Clear Commands
9.31.2.3.26.1. Tools Commands
9.31.2.4.26.1. Debug Commands
9.31.2.5.26.1. Monitor Commands
9.31.2.1.1. Vport Commands
9.31.2.1.2. IPoE Session Commands
9.31.2.1.3. SHCV Policy Commands
9.31.2.1.4. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.5. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.6. IPv6 Commands
9.31.2.1.26. Show Commands
9.31.2.2.26. Clear Commands
9.31.2.3.26. Tools Commands
9.31.2.4.26. Debug Commands
9.31.2.5.26. Monitor Commands
9.31.2.1.1.1. Vport Commands
9.31.2.1.2.1. IPoE Session Commands
9.31.2.1.3.1. SHCV Policy Commands
9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.6.1. IPv6 Commands
9.31.2.1.26.1. Show Commands
9.31.2.2.26.1. Clear Commands
9.31.2.3.26.1. Tools Commands
9.31.2.4.26.1. Debug Commands
9.31.2.5.26.1. Monitor Commands
9.31.2.1.27. Vport Commands
9.31.2.1.28. IPoE Session Commands
9.31.2.1.29. SHCV Policy Commands
9.31.2.1.30. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.31. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.32. IPv6 Commands
9.31.2.2. Show Commands
9.31.2.3. Clear Commands
9.31.2.4. Tools Commands
9.31.2.5. Debug Commands
9.31.2.6. Monitor Commands
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. Overview
10.1.1. Terminology and Abbreviations
10.1.2. Restrictions
10.2. Deploying Oversubscribed Multi-Chassis Redundancy
10.2.1. Resource Exhaustion Notification and Simultaneous Failures
10.2.2. Resource Monitoring
10.2.3. Warm-Standby Mode Of Operation
10.2.4. IPoE vs PPPoE
10.2.5. Persistency
10.2.6. Routing and Redundant Interface in OMCR
10.2.7. Revertive Behavior
10.2.8. Service Restoration Times
10.2.9. Processing of the SRRP Flaps
10.2.10. Accounting
10.2.11. Configuration Guidelines
10.2.12. Troubleshooting Commands
10.3. OMCR Command Reference
10.3.1. Command Hierarchies
10.3.2. OMCR Configuration Commands
10.3.2.1. OMCR Configuration Commands
11. ESM on High Scale QoS (HSQ) IOM
11.1. Overview
11.1.1. HSQ Traffic Manager Overview
11.1.1.1. Shaping Hierarchy
11.1.1.2. Scheduling
11.1.2. HSQ and ESM SLA Modes
11.1.2.1. ESM Single SLA Mode
11.1.2.2. ESM Expanded SLA Mode
11.1.3. Configuration Steps
11.1.4. Deployment Considerations
12. WIFI Aggregation and Offload
12.1. WIFI Aggregation and Offload Overview
12.2. Layer 2 over Soft-GRE Tunnels
12.2.1. Encapsulation
12.2.2. Data Path
12.2.3. MDA-based Redundancy
12.3. Tunnel Level Egress QoS
12.3.1. QoS Overrides
12.3.2. Operational Commands
12.4. Authentication
12.4.1. EAP-Based Authentication
12.4.1.1. RADIUS Proxy
12.4.1.1.1. RADIUS Proxy — Server Load-Balancing
12.4.1.1.2. RADIUS Proxy — Cache Lookup
12.4.1.1.3. RADIUS Proxy — Accounting
12.4.2. Portal Authentication
12.4.3. AA-based Portal Redirection
12.5. Address Assignment
12.6. WIFI Mobility Anchor
12.7. Wholesale
12.8. CGN on WLAN-GW
12.9. Lawful Intercept on WLAN-GW
12.10. WLAN Location Enhancements
12.10.1. Triggered Interim Accounting-Updates
12.10.2. Mobility Triggered Interim Updates with Counters
12.10.3. Operational Support
12.11. 3G/4G Interworking
12.11.1. Signaling Call Flow
12.11.1.1. GTP Setup with EAP Authentication
12.11.2. Location Notification in S2a
12.11.2.1. WLAN Location over S2a
12.11.2.2. Cellular Location over S2a
12.11.2.3. Cellular Location over Gn Interface
12.11.2.4. Operational Support
12.12. Migrant User Support
12.12.1. Migrant User Support with Portal-Authentication
12.12.1.1. DHCP
12.12.1.2. Authentication and Forwarding
12.12.2. Migrant User Support with EAP Authentication
12.12.3. Data Triggered Subscriber Creation
12.13. Distributed Subscriber Management (DSM)
12.13.1. DHCP
12.13.2. Authentication and Accounting
12.13.2.1. DSM Data-Plane
12.13.3. IP Filtering
12.13.3.1. HTTP Redirect
12.13.4. Policing
12.13.5. Lawful Intercept (LI)
12.13.6. Data-Triggered UE Creation
12.13.7. Idle-Timeout and Session-Timeout Management
12.13.8. Operational Commands
12.13.9. Pool Manager
12.13.10. DHCPv6 and SLAAC
12.13.11. Application Assurance Support
12.14. Call Trace
12.15. Distributed RADIUS Proxy
12.15.1. Enhanced Subscriber Management
12.15.2. Distributed Subscriber Management
12.15.3. VLAN Awareness
12.15.4. Operational Commands
12.16. WLAN-GW 1:1 Active-Backup Redundancy
12.16.1. DHCP Server Redundancy
12.16.2. Subscriber Creation after Switchover
12.17. WLAN-GW Triggered Stateless Redundancy (N:1)
12.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
12.19. IPv6-only Access
12.19.1. IPv6 GRE Tunnels
12.19.2. IPv6 Client-Side RADIUS Proxy
12.19.3. Dual-Stack UEs over WLAN-GW
12.19.3.1. SLAAC Prefix Assignment
12.19.3.2. DHCPv6 IA_NA Assignment
12.19.3.3. Migrant User Support
12.19.3.4. Accounting
12.20. Layer 2 Wholesale
12.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
12.22. Soft-L2TPv3 Tunnels
12.23. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
12.23.1. Processing on the V-GW
12.23.2. Processing on H-GW
12.23.3. Idle Timeout Handling
12.23.4. Distributed RADIUS Proxy for Closed SSID
12.23.5. H-GW Redundancy
12.24. ISA Operational Commands and Key Performance Indicators
12.24.1. ISA Resources
12.24.2. ISA Load
12.24.3. Query-based UE and Tunnel States
12.24.4. Packet Statistics
12.25. WiFi Command Reference
12.25.1. Command Hierarchies
12.25.1.1. WLAN-GW Commands
12.25.1.2. ISA Commands
12.25.1.3. WLAN-GW Service Commands
12.25.1.4. Data Plane Related Commands
12.25.1.5. RADIUS Server and Proxy Commands
12.25.1.6. LUDB Matching for RADIUS Proxy Cache
12.25.1.7. Port Policy Commands
12.25.1.8. WIFI Aggregation and Offload – Migrant User Support Commands
12.25.1.9. Show Commands
12.25.1.10. Debug Commands
12.25.1.11. Tools Commands
12.25.1.12. Clear Commands
12.25.2. WIFI Aggregation and Offload Commands
12.25.2.1. WIFI Aggregation and Offload Commands
12.25.2.1.1. Generic Commands
12.25.2.1.2. WLAN-GW Commands
12.25.2.1.3. ISA Commands
12.25.2.1.4. RADIUS Server Policy Commands
12.25.2.2. CLI Command Description for RADIUS Server
12.25.2.3. CLI Command Description for RADIUS Proxy Server
12.25.2.4. LUDB Matching of RADIUS Proxy Cache Commands
12.25.2.5. WLAN-GW-Group Commands
12.25.2.6. Port Policy Commands
12.25.2.7. WLAN-GW Group Interface Commands
12.25.2.8. Migrant User Support Commands
12.25.2.8.1. Show Commands
12.25.2.8.2. Debug Commands
12.25.2.8.3. Tools Commands
12.25.2.8.4. Clear Commands
13. GTP
13.1. GTP Uplink
13.1.1. Identification Attributes
13.1.2. P-GW/GGSN Selection
13.1.3. Configuration
13.1.4. QoS Support
13.1.5. GTP Session Hold
13.1.6. Selective Breakout
13.1.7. IPoE Support
13.1.8. PPPoE Support
13.2. GTP Access
13.2.1. GTP Termination
13.2.1.1. Multiple APNs
13.2.2. GTP Session Setup
13.2.2.1. Supported IP Stacks
13.2.3. Mobility and Location Tracking
13.2.4. QoS
13.2.5. Multicast
13.3. DHCP over GTP-u
13.3.1. Address Management Related PCOs
13.3.2. Address Allocation Modes
13.4. GTP Peering
13.5. GTP Command Reference
13.5.1. Command Hierarchies
13.5.1.1. GTP Commands
13.5.1.2. GTP Service Commands
13.5.1.3. Show Commands
13.5.1.4. Clear Commands
13.5.1.5. Debug Commands
13.5.2. GTP Command Descriptions
13.5.2.1. GTP Commands
13.5.2.1.1. Generic Commands
13.5.2.1.2. GTP Commands
13.5.2.1.3. GTP Show Commands
13.5.2.1.4. GTP Clear Commands
13.5.2.1.5. GTP Debug Commands
14. Virtual Residential Gateway
14.1. Overview
14.1.1. Access Modes
14.1.2. Home Context on the vRGW
14.1.2.1. Implicit Home Authentication
14.1.2.2. Explicit Home Authentication
14.1.2.3. Change of Configuration
14.1.2.4. Home Lifetime
14.1.3. Device Context on the vRGW
14.1.4. Dynamic Configuration Changes
14.1.5. Per-Home Pool Management and L2-Aware NAT
14.1.5.1. Sticky IP Addresses
14.1.5.2. Managed Static IPv4 Addresses
14.1.5.3. DMZ
14.1.6. IPv6
14.1.7. QoS and Filter Support
14.1.8. Data-Triggered Authentication
14.1.9. Per-Host NAT Port Ranges
14.1.10. Inter-Chassis Redundancy
14.1.10.1. Pool State Synchronization
14.1.10.2. Regular Group Interfaces
14.1.10.3. WLAN-GW Group Interfaces
14.1.11. BRG and vRG Caveats
14.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
14.1.13. PPPoE Client
14.1.13.1. PPPoE Client Setup
14.1.13.2. PPPoE Client Failure
14.1.13.3. LCP Keepalive
14.1.13.4. MRU/MTU
14.1.14. SLAAC Prefix Replacement
14.2. Home LAN Extension
14.2.1. Overview
14.2.2. Authentication and Authorization
14.2.3. Data Plane Tables
14.2.4. BGP EVPN VPLS
14.2.5. Assistive Address Resolution
14.2.6. MAC Address Translation
14.2.7. Configuring HLE
14.2.8. Traffic Handling
14.3. AP Agnostic Access for Multiple Dwelling Units
14.3.1. Overview
14.3.2. Bridge Domain and BRG Identification
14.3.3. ARP Handling
14.3.4. Mobility
14.4. Per-Host DNS Override
14.5. vRGW and HLE Command Reference
14.5.1. Command Hierarchies
14.5.1.1. Subscriber Management BRGW Profile Commands
14.5.1.2. Subscriber Management Commands
14.5.1.3. WLAN-GW Service Commands
14.5.1.4. Service Commands
14.5.1.5. Router HLE Commands
14.5.1.6. Subscriber Management HLE Commands
14.5.1.7. Show Commands
14.5.1.8. Debug Commands
14.5.1.9. Clear Commands
14.5.1.10. Tools Commands
14.5.2. Command Descriptions
14.5.2.1. Generic Commands
14.5.2.2. BRG Profile Commands
14.5.2.3. Subscriber Management Commands
14.5.2.4. WLAN-GW Service Commands
14.5.2.5. Router Home LAN Extension Commands
14.5.2.6. Subscriber Management Commands
14.5.2.7. Service Commands
14.5.2.8. Show Commands
14.5.2.9. Debug Commands
14.5.2.10. Clear Commands
14.5.2.11. Tools Commands
15. Service Chaining for ESM Hosts with L2-Aware NAT
15.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
15.1.1. Terminology
15.2. VAS Filters on the ISA
15.2.1. Matching
15.2.2. Forwarding
15.2.3. NSH Insertion
15.2.4. Configuration
15.3. EVPN Route Updates and Tracking
15.3.1. NVE Bridging to SF
15.3.2. NVE Routing to SF
15.4. Data Path on the Subscriber Edge
15.4.1. Upstream Traffic (Access to Network)
15.4.2. Downstream Traffic — From Network
15.5. Data Path on NVE
15.6. Service Chaining for ESM Hosts with L2-Aware NAT
15.6.1. Command Hierarchies
15.6.1.1. ISA Service Chaining Commands
15.6.1.2. Show Commands
15.6.2. Command Descriptions
15.6.2.1. Generic Commands
15.6.2.2. Service Chaining Commands
15.6.2.3. Show Commands
16. Dynamic Data Services
16.1. Introduction to Dynamic Data Services
16.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
16.3. Data-Triggered Dynamic Data Services
16.3.1. Data Trigger
16.3.2. Dynamic Services Data Trigger Capture SAP
16.3.3. RADIUS Authentication
16.3.4. Local Authentication
16.3.5. Data-Triggered Dynamic Service Provisioning
16.3.6. Control Plane Protection
16.3.7. Debugging
16.4. Dynamic Data Services Python API
16.5. RADIUS Triggered Dynamic Data Services Command Reference
16.5.1. Command Hierarchies
16.5.1.1. RADIUS Triggered Dynamic Data Services Commands
16.5.1.2. Basic System Command
16.5.1.3. Show Commands
16.5.1.4. Clear Commands
16.5.1.5. Debug Commands
16.5.1.6. Tools Commands
16.5.2. RADIUS Triggered Dynamic Data Services Commands
16.5.2.1. Configuration Commands
16.5.2.2. Basic System Command
16.5.2.3. Show Commands
16.5.2.4. Clear Commands
16.5.2.5. Debug Commands
16.5.2.6. Tools Commands
17. Diameter and Diameter Applications
17.1. Restrictions
17.2. Terminology
17.3. Diameter Base
17.3.1. Diameter Base Protocol
17.3.2. Diameter Peers and the Role of a Diameter Node in SR OS
17.3.3. Capability Exchange
17.3.4. Connection Termination
17.3.5. Diameter Hosts and Realms
17.3.5.1. Forwarding and Routing of Application Messages in Diameter
17.3.5.2. Static Diameter Realm Routes
17.3.5.2.1. Example with Static Realm Routes
17.3.5.2.2. Default Peer
17.3.5.3. Configuration of Host Names and Realms in SR OS
17.3.5.3.1. New Base Configuration
17.3.5.3.2. Legacy Configuration
17.3.6. Dynamically Learned Parameters
17.3.7. Diameter Routing Loop Avoidance
17.3.8. Retransmissions and Message Timers
17.3.8.1. Clearing the Destination-Host AVP in the Retransmitted Messages
17.3.8.2. Retransmission Bit (T-Bit)
17.3.9. Handling of Diameter_Unable_To_Deliver (3002) Error Message
17.3.10. Response to Diameter_Too_Busy (3004) Error Message
17.3.11. An SR as a Transit Diameter Node
17.3.12. An SR as a Transit Diameter Node
17.3.13. Python Support
17.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
17.4.1. Diameter Gy Out Of Credit Actions
17.4.1.1. Graceful Service Termination
17.4.2. Extended Failure Handling (EFH)
17.4.2.1. Extended Failure Handling Example Call Flow
17.4.2.2. Extended Failure Handling Triggers
17.4.2.3. Assigning Interim Credit
17.4.2.4. Enabling Extended Failure Handling
17.4.2.5. Configuration Example 1 - Single Volume Interim Credit Value
17.4.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
17.4.2.7. Monitoring the Extended Failure Handling State
17.4.2.8. Additional Call Flow Examples
17.4.2.8.1. User Disconnects While EFH is Active
17.4.2.8.2. The Maximum Number of Attempts is Reached
17.4.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
17.4.3. Gy CCR-t Replay
17.5. Policy Management via Gx Interface
17.5.1. Gx Protocol
17.5.2. Policy Assignment Models
17.5.3. IP-CAN Session – Gx Session Identification
17.5.3.1. User Identification in PCRF
17.5.3.2. NAS-Port-Id as Subscription-Id
17.5.4. Gx Interface and ESM Subscriber Instantiation
17.5.4.1. Gx and Dual-Stack Hosts
17.5.4.2. Gx and PPPoEv6-DHCP
17.5.5. Gx Fallback Function
17.5.6. Gx CCR-I Replays
17.5.7. Gx CCR-t Replays
17.5.7.1. RAR and CCR-t Replay
17.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
17.5.7.3. CCR-t Replay And High Availability
17.5.8. Automatic Updates for IP Address Allocation/De-allocation
17.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
17.5.10. Gx, ESM and AA
17.5.10.1. ESM Subscriber-Host vs AA Subscriber
17.5.10.2. AA Subscriber State
17.5.11. Policy Management via Gx
17.5.12. Gx-Based Overrides
17.5.12.1. Instantiation of Gx Overrides
17.5.12.2. HTTP Redirect Override
17.5.12.3. Removal of Overrides
17.5.12.4. Examples of Gx Overrides
17.5.13. PCC Rules
17.5.13.1. PCC Rule Concept
17.5.13.2. PCC Rule Instantiation
17.5.13.3. Base QoS-Policy and Base Filter
17.5.13.4. Generic Policy Sharing and Rule Sharing
17.5.13.5. PCC Rule Name and PCC Rule Removal
17.5.13.6. Gx Rule Ordering
17.5.13.7. PCC Rule Override
17.5.13.8. Aggregation of IP-Criterion
17.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
17.5.13.10. Gx Rules with Multiple Actions and Action Sharing
17.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
17.5.13.12. RADIUS and Gx Interaction
17.5.13.13. Bulk Changes via CLI while Gx Rules are Active
17.5.13.14. PCC Rule Direction
17.5.13.15. Action
17.5.13.16. Rate-Limiting Action (Ingress, Egress)
17.5.13.16.1. Dynamic Policers and Queue Mappings
17.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
17.5.13.17. Forwarding-Class Change (Ingress, Egress)
17.5.13.18. QoS Forward (Ingress and Egress)
17.5.13.19. Next Hop Redirect (Ingress)
17.5.13.20. HTTP Redirect (Ingress)
17.5.13.21. Filter Forward/Drop (Ingress and Egress)
17.5.13.22. Service Gating Function
17.5.13.23. PCC Rule Provisioning Example
17.5.13.24. Operational Aspects
17.5.13.25. PCC Rules and Capacity Planning
17.5.13.26. PCC Rule Scaling Example
17.5.14. NAS Filter Inserts
17.5.14.1. Examples of NAS Entry Inserts
17.5.15. Error Handing and Rule Failure Reporting in ESM
17.5.15.1. AVP Decoding Failure in Gx
17.5.15.2. ESM Rule-Installation Failure
17.5.15.3. Failure Reporting in AA
17.5.15.4. Summary of Failure Reporting
17.5.16. Usage-Monitoring and Reporting
17.5.16.1. ESM Usage-Monitoring - What is Being Monitored
17.5.16.2. AA Usage-Monitoring – What is Being Monitored
17.5.16.3. Requesting Usage-Monitoring in ESM
17.5.16.4. Reporting Accumulated Usage
17.5.16.5. Disabling Usage-Monitoring
17.5.16.6. Usage-Monitoring for PCC Rules
17.5.16.7. Session Termination
17.5.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
17.5.16.9. Usage-Monitoring Examples
17.5.17. Event Triggers
17.5.18. Subscriber Verification
17.5.19. Subscriber Termination
17.5.20. Mobility Support in WiFi
17.5.20.1. Redundancy
17.5.21. Persistency and Origin-State-ID AVP
17.5.22. Overload Protection
17.6. Supported-Features AVP in Gx
17.6.1. Extended Bandwidth 5G New Radio Feature
17.6.2. Transmission of Extended Bandwidth AVPs During Gx Session Initiation
17.6.3. Processing the Extended Bandwidth AVPs
17.7. Diameter NASREQ Application
17.7.1. Sample Configuration Steps
17.8. Diameter Redundancy
17.8.1. Diameter Peer and Server Failover
17.8.1.1. Diameter Peer Failover
17.8.1.2. Diameter Sever Failover
17.8.2. Diameter Multi-Chassis Redundancy
17.8.2.1. Single Diameter Identity (DI) per a Pair of Redundant Diameter Nodes
17.8.2.2. Single Peering Connection per Redundant Pair
17.8.2.3. Inter-Peering Connection
17.8.2.4. Inter-Peer as a Default Peer
17.8.2.5. Handling RARs
17.8.2.6. Handling of the Route-Record AVP
17.8.2.7. SRRP Switchover
17.8.2.8. Unsupported Failures
17.8.2.9. Peer Preference in Multi-Chassis Setup
17.8.3. Gx Usage Monitoring in Dual-Homed Systems
17.8.3.1. Synchronization Frequency
17.8.3.2. Switchover Triggered Synchronization
17.8.3.3. What is Being Synchronized
17.8.3.4. Loss of Inter-Chassis Link
17.8.3.5. Master-to-Master SRRP Scenario
17.8.3.6. Usage Counter Collection With No Credit Grants Received
17.8.3.7. ISSU
17.9. Diameter Debugging
18. Python Script Support for ESM
18.1. Python Script Support for ESM
18.2. Python in SR OS Overview
18.2.1. Python Policy – GTPv1-C API
18.2.2. Python Policy – GTPv2-C API
18.2.3. Python Changes
18.3. Python Support in sub-ident-policy
18.3.1. Configuration
18.3.2. Operator Debugging
18.3.3. Python Scripts
18.3.4. Sample Python Scripts
18.3.4.1. Example
18.3.4.2. Example
18.3.4.3. Example
18.3.5. Limitations
18.4. RADIUS Script Policy Overview
18.4.1. Python RADIUS API
18.4.2. Sample Script
18.5. Python Policy Overview
18.5.1. Python Policy – RADIUS API
18.5.2. Python Policy – DHCPv4 API
18.5.3. Python Policy – DHCPv6 API
18.5.4. Python Policy – Diameter API
18.5.5. Python Policy – DHCP Transaction Cache API
18.5.6. Python for PPPoE API
18.5.7. Python API for PPP Packet
18.5.8. Python API for PPP PAP
18.5.9. Python API for PPP CHAP
18.5.10. Python ESM API
18.5.11. Python Cache Support
18.5.12. Applying a Python Policy
18.5.13. Python Script Protection
18.6. Tips and Tricks
18.7. Python Command Reference
18.7.1. Command Hierarchies
18.7.1.1. Python Policy Commands
18.7.1.2. Python Script Commands
18.7.1.3. Services Commands
18.7.1.4. Show Commands
18.7.1.5. Tools Commands
18.7.1.6. Debug Commands
18.7.1.7. Clear Commands
18.7.2. Command Descriptions
18.7.2.1. Python Configuration Commands
18.7.2.1.1. Global Commands
18.7.2.1.2. Python Policy Commands
18.7.2.1.3. Python Script Commands
18.7.2.1.4. Services Commands
18.7.2.1.5. Tools Commands
18.7.2.2. Show Commands
18.7.2.3. Debug Commands
18.7.2.4. Clear Commands
18.8. Python RADIUS Command Reference
18.8.1. Command Hierarchies
18.8.2. Command Descriptions
18.8.2.1. Generic Commands
18.8.2.2. Script Commands
19. S-VLAN Statistics Collection
19.1. Overview
19.1.1. Statistics Retention
19.1.1.1. MIBs
19.1.2. Enabling S-VLAN Statistics Collection
19.2. S-VLAN Status Collection Command Reference
19.2.1. Command Hierarchies
19.2.1.1. S-VLAN Status Collection Commands
19.2.1.2. S-VLAN Status Collection Show Commands
19.2.1.3. S-VLAN Clear Commands
19.2.2. GTP Command Descriptions
19.2.2.1. GTP Commands
19.2.2.1.1. Generic Commands
19.2.2.1.2. S-VLAN Statistics Collection Commands
19.2.2.1.3. S-VLAN Statistics Collection Show Commands
19.2.2.1.4. S-VLAN Statistics Collection Clear Commands
20. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2. Introduction to Triple Play
2.1. Nokia’s Triple Play Service Delivery Architecture
2.1.1. Introduction to Triple Play
2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.1.3. Architectural Foundations
2.1.4. Optimizing Triple Play Service Infrastructures
2.1.4.1. Distributed Service Edges
2.1.4.2. Service Differentiation, QoS Enablement
2.1.4.3. Virtual MAC Subnetting for VPLS
2.2. Services
2.2.1. Service Types
2.2.2. Service Policies
2.3. Nokia Service Model
2.3.1. Introduction
2.3.2. Service Entities
2.3.3. Customers
2.3.4. Service Access Points (SAPs)
2.3.4.1. SAP Encapsulation Types and Identifiers
2.3.4.2. Ethernet Encapsulations
2.3.4.3. SAP Considerations
2.3.5. Service Distribution Points (SDPs)
2.3.5.1. SDP Binding
2.3.5.2. Spoke and Mesh SDPs
2.3.5.3. SDP Encapsulation Types
2.3.5.3.1. GRE
2.3.5.3.2. MPLS
2.3.5.4. SDP Keepalives
2.4. Epipe Service Overview
2.5. VPLS Service Overview
2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.5.1.1. Residential Split Horizon Groups
2.6. IES Service Overview
2.6.1. IP Interface
2.7. VPRN Service Overview
2.8. Deploying and Provisioning Services
2.8.1. Phase 1: Core Network Construction
2.8.2. Phase 2: Service Administration
2.8.3. Phase 3: Service Provisioning
2.9. Configuration Notes
2.9.1. General
2.10. Configuring Triple Play Services with CLI
2.10.1. Configuring VPLS Residential Split Horizon Groups
2.10.1.1. Configuring Static Hosts
2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
2.10.1.1.4. Configuring Static Hosts on an IES SAP
2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
2.11. Triple Play Services Command Reference
2.11.1. Command Hierarchies
2.11.1.1. IES/VPRN Triple Play Commands
2.11.1.2. VPLS Triple Play Commands
2.11.1.3. Show Commands
2.11.1.4. Clear Commands
2.11.1.5. Debug Commands
2.11.1.6. Tools Commands
2.11.2. Command Descriptions
2.11.2.1. Global Commands
2.11.2.2. IES/VPRN Service Commands
2.11.2.2.1. VPLS Triple Play Commands
2.11.2.2.2. Service DHCP and Anti-Spoof Filtering Commands
2.11.2.2.3. Interface IPv6 Commands
2.11.2.3. Show Commands
2.11.2.3.1. IGMP Snooping Show Commands
2.11.2.4. Clear Commands
2.11.2.5. Debug Commands
2.11.2.6. Tools Commands
3. DHCP Management
3.1. DHCP Principles
3.2. DHCP Features
3.2.1. DHCP Relay
3.2.2. DHCPv4 Relay Proxy
3.2.3. DHCPv4 Relay Lease Split
3.2.4. Subscriber Identification Using Option 82 Field
3.2.4.1. Trusted and Untrusted
3.2.5. DHCP Snooping
3.2.6. DHCP Lease State Table
3.2.7. DHCP and Layer 3 Aggregation
3.2.7.1. DHCPv4 Snooping
3.2.7.2. DHCPv6 Snooping
3.2.8. Local DHCP Servers
3.2.8.1. Overview
3.2.8.2. Local DHCP Server Support
3.2.9. DHCPv6
3.2.9.1. DHCPv6 Relay Agent
3.2.9.2. DHCPv6 Prefix Options
3.2.9.3. Neighbor Resolution With DHCPv6 Relay
3.2.9.4. DHCPv6 Lease Persistency
3.2.9.5. Local Proxy Neighbor Discovery
3.2.9.6. IPv6oE Hosts Behind Bridged CPEs
3.2.9.7. IPv6 Link-Address Based Pool Selection
3.2.9.8. IPv6 Address and Prefix Stickiness
3.2.9.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.2.9.10. Host Connectivity Checks for IPv6
3.2.10. Lease Query
3.2.11. DHCPv6 to Server Option
3.2.12. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.2.13. DHCP Caching
3.2.14. Flexible Creation of DHCPv4/6 Host Parameters
3.2.15. Python DTC Variables and API
3.2.15.1. DTC Debugging Facility
3.2.16. Virtual Subnet for DHCPv4 Hosts
3.2.17. Address Reservation for Sticky Leases
3.2.18. DHCP Message Processing Overload Protection
3.3. Proxy DHCP Server
3.3.1. Local DHCP Servers
3.3.1.1. Terminology
3.3.1.2. Overview
3.3.1.3. DHCP Lease Synchronization
3.3.1.4. Intercommunication Link Failure Detection
3.3.1.5. DHCP Server Failover States
3.3.1.6. Lease Time Synchronization
3.3.1.7. Maximum Client Lead Time (MCLT)
3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.3.1.9. Fast-Switchover of IP Address and Prefix Delegation
3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.4. Local Address Assignment
3.4.1. Stateless Address Auto-Configuration
3.5. Configuring DHCP with CLI
3.5.1. Enabling DHCP Snooping
3.5.2. Configuring Local User Database Parameters
3.5.3. Configuring Option 82 Handling
3.5.4. Enabling DHCP Relay
3.6. Triple Play DHCP Command Reference
3.6.1. Command Hierarchies
3.6.1.1. DHCP Filter Commands
3.6.1.1.1. DHCP Filter Commands
3.6.1.1.2. DHCP6 Filter Commands
3.6.1.2. Router Local DHCP Server Commands
3.6.1.3. Router Local DHCP6 Server Commands
3.6.1.4. Subscriber Management Commands
3.6.1.4.1. IPoE Commands
3.6.1.4.2. PPP Commands
3.6.1.4.3. MSAP Policy Commands
3.6.1.5. Service DHCP Commands
3.6.1.5.1. VPRN Local DHCP Server Commands
3.6.1.5.2. VPRN Local DHCP6 Server Commands
3.6.1.5.3. VPLS DHCP Commands
3.6.1.5.4. Anti-Spoof Filtering Commands
3.6.1.6. System DHCP Commands
3.6.1.7. Show Commands
3.6.1.8. Clear Commands
3.6.1.9. Debug Commands
3.6.1.10. Tools Commands
3.6.2. Command Descriptions
3.6.2.1. Triple Play DHCP Configuration Commands
3.6.2.1.1. Global Commands
3.6.2.1.2. DHCP Filter Commands
3.6.2.1.3. Subscriber Management Local User Database Commands
3.6.2.1.4. Managed SAP Policy Commands
3.6.2.1.5. Local DHCP Server Commands
3.6.2.1.6. Local DHCP6 Server Commands
3.6.2.1.7. DHCP Service Commands
3.6.2.1.8. System DHCP Commands
3.6.2.1.9. Show Commands
3.6.2.1.10. Clear Commands
3.6.2.1.11. Debug Commands
3.6.2.1.12. Tools Commands
4. Stateless Address Auto-configuration (SLAAC)
4.1. SLAAC Management Principles
4.2. Configuration Overview
4.3. Router-Solicit Trigger
4.4. SLAAC Address Assignment
4.5. Static SLAAC Prefix Assignment
4.6. Dynamic SLAAC Prefix Assignment
4.7. SLAAC Prefix Replacement
5. Point-to-Point Protocol over Ethernet Management
5.1. PPPoE
5.1.1. PPPoE Authentication and Authorization
5.1.1.1. General Flow
5.1.1.2. RADIUS
5.1.1.3. Local User Database Directly Assigned to PPPoE Node
5.1.1.4. Subscriber per PPPoE Session Index
5.1.1.5. Local DHCP Server with Local User Database
5.1.2. PPPoE Session ID Allocation
5.1.3. Multiple Sessions Per MAC Address
5.1.4. Session Limit Per Circuit ID
5.1.5. PPP Session Re-establishment
5.1.6. Private Retail Subnets
5.1.7. IPCP Subnet Negotiation
5.1.7.1. Numbered WAN Support for Layer 3 RGs
5.1.8. IES as Retail Service for PPPoE Host
5.1.9. Unnumbered PPPoE
5.1.10. Selective Backhaul of PPPoE Traffic using an Epipe Service
5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.2.1. Terminology
5.2.2. LNS MLPPPoX
5.2.3. MLPPP Encapsulation
5.2.4. MLPPPoX Negotiation
5.2.5. Enabling MLPPPoX
5.2.6. Link Fragmentation and Interleaving (LFI)
5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.2.7. LFI Functionality Implemented in LNS
5.2.7.1. Last Mile QoS Awareness in the LNS
5.2.7.2. BB-ISA Processing
5.2.7.3. LNS-LAC Link
5.2.7.4. AN-RG Link
5.2.7.5. Home Link
5.2.7.6. Optimum Fragment Size Calculation by LNS
5.2.7.6.1. Encapsulation Based Fragment Size
5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
5.2.7.6.3. Selection of the Optimum Fragment Length
5.2.8. Upstream Traffic Considerations
5.2.9. Multiple Links MLPPPoX With No Interleaving
5.2.10. MLPPPoX Session Support
5.2.11. Session Load Balancing Across Multiple BB-ISAs
5.2.12. BB-ISA Hashing Considerations
5.2.13. Last Mile Rate and Encapsulation Parameters
5.2.14. Link Failure Detection
5.2.15. CoA Support
5.2.16. Accounting
5.2.17. Filters and Mirroring
5.2.18. PTA Considerations
5.2.19. QoS Considerations
5.2.19.1. Dual-Pass
5.2.19.2. Traffic Prioritization in LFI
5.2.19.3. Shaping Based on the Last Mile Wire Rates
5.2.19.4. Downstream Bandwidth Management on Egress Port
5.2.20. Sub/Sla-Profile Considerations
5.2.21. Example of MLPPPoX Session Setup Flow
5.2.22. Other Considerations
5.3. Configuration Notes
5.4. PPP Command Reference
5.4.1. Command Hierarchies
5.4.1.1. PPPoE Policy Configuration Commands
5.4.1.2. PPPoE Service Commands
5.4.1.3. PPPoE Local User Database Commands
5.4.1.4. MLPPP on LNS Commands
5.4.1.5. Show Commands
5.4.2. Command Descriptions
5.4.2.1. Generic Commands
5.4.2.1.1. Subscriber Management Commands
5.4.2.1.2. MLPPP on LNS Commands
5.4.2.1.3. PPP/PPPoE Service Commands
5.4.2.1.4. RADIUS Attribute Commands
5.4.2.2. Service Commands
5.4.2.3. Show Commands
5.4.2.4. Clear Commands
5.4.2.5. Debug Commands
6. Layer 2 Tunneling Protocol (L2TP)
6.1. Terminology
6.2. L2TP Overview
6.2.1. LAC DF Bit
6.2.2. Handling L2TP Tunnel/Session Initialization Failures
6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.2.2. Peer Blacklist
6.2.2.3. Tunnel Blacklists
6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.2.4. Tunnel Selection Mechanism
6.2.2.5. Tunnel Probing
6.2.2.6. Controlling the Size of Blacklist
6.2.2.7. Displaying the Content of a Blacklist
6.2.2.8. Generating Trap when the Blacklist is Full
6.2.2.9. Premature Removal of Blacklisted Entries
6.2.2.10. Manual Purging of Entities within the Blacklist
6.2.3. CDN Result Code Overwrite
6.2.4. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. Traffic Steering on L2TP LAC
6.4.1. Steering Activation and Deactivation
6.4.2. Steering States
6.4.3. Configuring Traffic Steering on L2TP LAC
6.5. L2TP Tunnel RADIUS Accounting
6.5.1. Accounting Packets List
6.5.2. RADIUS Attributes Value Considerations
6.6. MLPPP on the LNS Side
6.7. LNS Reassembly
6.8. LNS Subscriber Policers
6.8.1. Policer Support
6.9. L2TP Command Reference
6.9.1. Command Hierarchies
6.9.1.1. L2TP Configuration Commands
6.9.1.1.1. Router Commands
6.9.1.1.2. Redundancy Commands
6.9.1.1.3. Service Commands
6.9.1.1.4. System Commands
6.9.1.2. Steering Profile Commands
6.9.1.3. L2TP Tunnel RADIUS Accounting Commands
6.9.1.4. Show Commands
6.9.1.5. Clear Commands
6.9.1.6. Debug Commands
6.9.1.7. Tools Commands
6.9.2. Command Descriptions
6.9.2.1. L2TP Configuration Commands
6.9.2.1.1. Global Commands
6.9.2.1.2. L2TP Commands
6.9.2.2. Steering Profile Commands
6.9.2.3. L2TP Tunnel RADIUS Accounting Commands
6.9.2.4. Show Commands
6.9.2.5. Clear Commands
6.9.2.6. Debug Commands
6.9.2.7. Tools Commands
7. Triple Play Security
7.1. Triple Play Security Features
7.1.1. Anti-Spoofing Filters
7.1.1.1. Anti-spoofing Filter Types
7.1.1.2. Filtering Packets
7.1.2. Layer 2 Triple Play Security Features
7.1.2.1. MAC Pinning
7.1.2.2. MAC Protection
7.1.2.3. DoS Protection
7.1.2.3.1. Subscriber Aggregation Network
7.1.2.3.2. Network Control Filtering
7.1.2.4. VPLS Redirect Policy
7.1.3. ARP Handling
7.1.3.1. ARP Reply Agent
7.1.3.2. Dynamic ARP Table Population
7.1.3.3. Local Proxy ARP
7.1.4. Web Portal Redirect
7.2. Configuring Triple Play Security with CLI
7.2.1. Common Configuration Tasks
7.2.1.1. Configuring Anti-Spoofing Filters
7.2.1.2. Configuring Triple Play Security Features
7.2.1.2.1. Configuring MAC Pinning
7.2.1.2.2. Configuring MAC Protection
7.2.1.2.3. Configuring VPLS Redirect Policy
7.2.1.3. Configuring ARP Handling
7.2.1.3.1. Configuring Proxy ARP
7.2.1.3.2. Configuring Local Proxy ARP
7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
7.2.1.3.4. Configuring Remote Proxy ARP
7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
7.2.1.3.6. Configuring CPU Protection
7.2.1.4. Configuring Web Portal Redirect
7.3. Triple Play Security Command Reference
7.3.1. Command Hierarchies
7.3.1.1. Anti-Spoofing Commands
7.3.1.2. Layer 2 Security Commands
7.3.1.3. ARP Handling Commands
7.3.1.4. Show Commands
7.3.1.5. Tools Commands
7.3.2. Command Descriptions
7.3.2.1. Triple Play Security Configuration Commands
7.3.2.1.1. Triple Play Anti-Spoofing Commands
7.3.2.1.2. Triple Play Layer 2 Security Commands
7.3.2.1.3. ARP Handling Commands
7.3.2.2. Show Commands
7.3.2.3. Tools Commands
8. Triple Play Multicast
8.1. Introduction to Multicast
8.2. Multicast in the Broadband Service Router
8.2.1. Internet Group Management Protocol
8.2.1.1. IGMP Versions and Interoperability Requirements
8.2.1.2. IGMP Version Transition
8.2.2. Multicast Listener Discovery
8.2.2.1. MLD Versions and Interoperability Requirements
8.2.2.2. Source Specific Multicast Groups
8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
8.3. Multicast in the BSA
8.3.1. IGMP Snooping
8.3.1.1. IGMP/MLD Message Processing
8.3.1.2. IGMP Message Processing
8.3.1.3. MLD Message Processing
8.3.1.4. IGMP/MLD Filtering
8.3.2. Multicast VPLS Registration (MVR)
8.3.3. Layer 3 Multicast Load Balancing
8.3.4. IGMP State Reporter
8.3.4.1. IGMP Data Records
8.3.4.2. Transport Mechanism
8.3.4.3. HA Compliance
8.3.4.4. QoS Awareness
8.3.4.5. IGMP Reporting Caveats
8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
8.4.1. Multicast Over IPoE
8.4.1.1. Per SAP Replication Mode
8.4.1.1.1. Per SAP Queue
8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.4.1.2. Per Subscriber Host Replication Mode
8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.4.2. Multicast Over PPPoE
8.4.3. IGMP Flooding Containment
8.4.4. IGMP/MLD Timers
8.4.5. IGMP/MLD Query Intervals
8.4.6. HQoS Adjustment
8.4.6.1. Host Tracking (HT) Considerations
8.4.6.2. HQoS Adjust Per Vport
8.4.6.2.1. Multi-Chassis Redundancy
8.4.6.2.2. Scalability Considerations
8.4.7. Redirection
8.4.8. Hierarchical Multicast CAC (H-MCAC)
8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
8.4.9. Determining MCAC Policy in Effect
8.4.10. Multicast Filtering
8.4.11. Joining the Multicast Tree
8.4.12. Wholesale/Retail Requirements
8.4.13. QoS Considerations
8.4.14. Redundancy Considerations
8.4.14.1. Redirection Considerations
8.4.15. Query Intervals for Multicast
8.4.15.1. ESM Host-based Queries
8.4.15.2. Group Interface-based Queries
8.5. Configuring Triple Play Multicast Services with CLI
8.5.1. Configuring IGMP Snooping in the BSA
8.5.1.1. Enabling IGMP Snooping in a VPLS Service
8.5.1.2. IGMPv3 Multicast Routers
8.5.1.3. With IGMPv1/2 Multicast Routers
8.5.1.4. Modifying IGMP Snooping Parameters
8.5.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
8.5.2. Configuring Static Multicast Groups on a SAP or SDP
8.5.2.1. Enabling IGMP Group Membership Report Filtering
8.5.2.1.1. Enabling IGMP Traffic Filtering
8.5.3. Configuring Multicast VPLS Registration (MVR)
8.5.4. Configuring IGMP, MLD, and PIM in the BSR
8.5.4.1. Enabling IGMP
8.5.4.2. Configuring IGMP Interface Parameters
8.5.4.3. Configuring Static Parameters
8.5.4.4. Configuring SSM Translation
8.5.4.5. Enabling MLD
8.5.4.6. Configuring MLD Interface Parameters
8.5.4.7. Configuring Static Parameters
8.5.4.8. Configuring SSM Translation
8.5.4.9. Configuring PIM
8.5.4.9.1. Enabling PIM
8.5.4.9.2. Configuring PIM Interface Parameters
8.5.4.9.3. Importing PIM Join/Register Policies
8.5.4.9.4. Configuring PIM Join/Register Policies
8.5.4.10. Configuring Bootstrap Message Import and Export Policies
8.6. Triple Play Multicast Command Reference
8.6.1. Command Hierarchies
8.6.1.1. Multicast Management Commands
8.6.1.2. Multicast Info Policy Bundle Commands
8.6.1.3. Multicast Service Commands
8.6.1.4. Ingress Multicast Path Management Commands
8.6.1.5. Multicast Redirection
8.6.1.6. Multicast Query Timer Commands
8.6.1.7. Show Commands
8.6.1.8. Debug Commands
8.6.2. Command Descriptions
8.6.2.1. Multicast Management Configuration Commands
8.6.2.1.1. Generic Commands
8.6.2.1.2. Multicast Management Commands
8.6.2.1.3. Bandwidth Policy Commands
8.6.2.1.4. Multicast Info Policy Commands
8.6.2.1.5. Service Commands
8.6.2.1.6. VPLS Multicast Commands
8.6.2.1.7. Chassis Level Commands
8.6.2.1.8. Multicast Redirection Commands
8.6.2.1.9. Multicast Query Timer Commands
8.6.2.1.10. Forwarding Plane Commands
8.6.2.2. Show Commands
8.6.2.3. Debug Commands
9. Triple Play Enhanced Subscriber Management
9.1. Uniform RADIUS Server Configuration
9.1.1. RADIUS Server Configuration
9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
9.1.1.2. Legacy RADIUS Server Configuration
9.2. RADIUS Authentication of Subscriber Sessions
9.2.1. RADIUS Authentication Extensions
9.2.1.1. Triple Play Network with RADIUS Authentication
9.2.2. RADIUS Authorization Extensions
9.2.2.1. Calling-Station-ID
9.2.2.2. Subscriber Session Timeout
9.2.2.2.1. Domain Name in Authentication
9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.2.2.4. SHCV Policy
9.2.3. radius-server-policy Retry Attempt Overview
9.2.4. AAA RADIUS Server Operation Status
9.2.5. AAA RADIUS Accounting Server Stickiness
9.2.6. AAA RADIUS Authentication Fallback Action
9.2.7. AAA Test User Account
9.2.8. Troubleshooting the RADIUS Server
9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.2.9.1. Provisioning IP Configuration of the Host
9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
9.2.9.3. Change of Authorization and Disconnect-Request
9.2.9.3.1. Change of Authorization using the Tools Command
9.2.9.4. RADIUS-Based Accounting
9.2.9.5. RADIUS Accounting Terminating Cause
9.2.9.6. Accounting Modes Of Operation
9.2.9.7. Per Session Accounting
9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
9.2.9.9. No Host-Accounting
9.2.9.10. Host-Accounting Enabled
9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.2.9.12. Accounting Interim Update Message Interval
9.2.9.13. CoA Triggered Accounting Interim Update
9.2.9.14. Class Attribute
9.2.9.15. User Name
9.2.9.16. Accounting-On and Accounting Off
9.2.9.17. RADIUS Accounting Message Buffering
9.2.9.18. Multiple Accounting Policies
9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.3. Enhanced Subscriber Management Overview
9.3.1. Enhanced Subscriber Management Basics
9.3.1.1. Standard and Enhanced Subscriber Management
9.3.1.1.1. Subscriber Management Definitions
9.3.1.1.2. Subscriber Identification Policy
9.3.1.1.3. Subscriber Identification String
9.3.1.1.4. Subscriber Profile
9.3.1.1.5. SLA Profile
9.3.1.1.6. Explicit Subscriber Profile Mapping
9.3.2. ESM for IPv6
9.3.2.1. Models
9.3.2.1.1. PPPoE Host
9.3.2.1.2. PPPoE RG
9.3.2.1.3. IPoE Host/RG
9.3.2.2. Setup
9.3.2.3. 64-bit and 128-bit WAN Mode
9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
9.3.2.4. Behavior
9.3.2.4.1. Dual Stack
9.3.2.4.2. Router Advertisements (RA)
9.3.2.4.3. CoA and Disconnect-Request
9.3.2.5. Delegated-Prefix-Length
9.3.2.5.1. Order of Preference for DPL
9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
9.3.2.6. DHCPv6 Relay Agent
9.3.2.6.1. Configuring a DHCPv6 Relay Agent
9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
9.3.2.8. DHCPv6 Local Server
9.3.3. Dynamic Subscriber Host Processing
9.3.3.1. Dynamic Tables
9.3.3.1.1. Active Subscriber Table
9.3.3.1.2. SLA Profile Instance Table
9.3.3.1.3. Subscriber Host Table
9.3.3.1.4. DHCP Lease State Table
9.3.4. Enhanced Subscriber Management Entities
9.3.4.1. Instantiating a New Host
9.3.4.2. Packet Processing for an Existing Host
9.3.5. ESM Host Lockout
9.3.5.1. Functionality
9.3.6. ANCP and GSMP
9.3.6.1. ANCP
9.3.6.1.1. Static ANCP Management
9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.3.6.1.3. ANCP String
9.3.6.1.4. ANCP Persistency Support
9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.3.6.3. DHCP Release Messages
9.3.6.3.1. DHCP Release
9.3.6.4. DHCP Client Mobility
9.3.6.5. DHCP Lease Control
9.3.7. Using Scripts for Dynamic Recognition of Subscribers
9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.3.7.3. Determining the Subscriber Profile
9.3.7.4. Determining the SLA Profile
9.3.7.4.1. SLA Profile Instance Sharing
9.3.7.4.2. SLA-Based Egress QoS Marking
9.3.8. Sub-id and Brg-id Names with Lengths Between 32 and 64 Characters
9.3.8.1. Online Change of Sub-id and Brg-id
9.3.8.2. Usage Notes
9.3.9. Auto-Sub ID
9.3.9.1. Sub-id Identifiers
9.3.9.2. Dual Stack Hosts
9.3.9.3. Mixing Hosts with Auto-Generated IDs and non-Auto-Generated IDs
9.3.9.4. Deployment Considerations
9.3.9.5. Caveats
9.3.10. Limiting Subscribers and Hosts on a SAP
9.3.11. Static Subscriber Hosts
9.3.12. QoS for Subscribers and Hosts
9.3.12.1. QoS Parameters in Different Profiles
9.3.12.2. QoS Policy Overrides
9.3.13. ESM Subscriber Hierarchical Traffic Control
9.3.13.1. Subscriber HQoS
9.3.13.2. Subscriber CFHP
9.3.13.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.3.13.3.1. Broadband Network Gateway Application
9.3.13.3.2. Queue Determination and Scheduling
9.3.13.3.3. Weighted Scheduler Group
9.3.13.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.3.13.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.3.13.3.6. Vport Determination and Evaluation
9.3.13.3.7. Applying Aggregate Rate Limit to a Vport
9.3.13.3.8. Applying a Scheduler Policy to a Vport
9.3.13.3.9. Signaling of Last Mile Encapsulation Type
9.3.13.3.10. Configuration Example
9.3.14. Subscriber Volume Statistics
9.3.14.1. IP (Layer 3) Volume Accounting
9.3.14.2. Separate IPv4 and IPv6 Counters
9.3.15. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.3.15.1. Dynamic Updates of Subscriber Filter Policies
9.3.15.1.1. SLA Profile Change
9.3.15.1.2. Override the IP and IPv6 Filter Policies
9.3.15.1.3. Insert Subscriber Host-Specific Filter Entries
9.3.15.1.4. Insert Shared Filter Entries
9.3.15.2. Checking Filter Policy Details
9.3.16. Multi-Chassis Synchronization
9.3.16.1. Overview
9.3.16.1.1. Loss of Synchronization and Reconciliation
9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
9.3.17.1. SRRP Messaging
9.3.17.2. SRRP and Multi-Chassis Synchronization
9.3.17.3. SRRP Instance
9.3.17.3.1. SRRP Instance MCS Key
9.3.17.3.2. Containing Service Type and ID
9.3.17.3.3. Containing Subscriber IP Interface Name
9.3.17.3.4. Subscriber Subnet Information
9.3.17.3.5. Containing Group IP Interface Information
9.3.17.3.6. Remote Redundant IP Interface Mismatch
9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.3.17.3.10. Local and Remote Dual Master Detected
9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.3.18. PPPoE MC Redundancy
9.3.18.1. SRRP Considerations for PPPoE
9.3.18.1.1. SRRP Fact-Checks
9.3.18.2. State Synchronization
9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.3.18.3. Traffic Control and Redundant Interface
9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
9.3.18.3.2. Subnet Assignment and Advertisement - Option B
9.3.18.4. MSAP Considerations
9.3.18.5. Unnumbered Interface Support
9.3.18.6. Compatibility with MC-LAG
9.3.18.7. IPv6 Support
9.3.18.8. Considerations with Local DHCP Server
9.3.18.9. Redundant Interface Considerations
9.3.19. Routed Central Office (CO)
9.3.19.1. Layer 3 Subscriber Interfaces
9.3.19.1.1. DHCP Interactions
9.3.19.1.2. Routed CO for IES Service
9.3.19.1.3. Routed CO for VPRN Service
9.3.19.2. Wholesale Retail Routed CO
9.3.19.2.1. Wholesale Retail Model
9.3.19.2.2. Configuration and Applicability
9.3.19.2.3. Hub-and-Spoke Forwarding
9.3.19.3. Routed Subscriber Hosts
9.3.19.3.1. Static Configured IPv4 Managed Route
9.3.19.3.2. Static Configured IPv6 Managed Route
9.3.19.3.3. Dynamic BGP Peering
9.3.19.3.4. RIP Listener
9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.3.19.3.6. GRT Lookup and Routed CO in a VPRN
9.3.20. Dual Homing
9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.3.20.2. Steady-State Operation of Dual-homed Ring
9.3.20.3. Broken-Ring Operation and the Transition to this State
9.3.20.4. Transition from Broken to Closed Ring State
9.3.20.5. Provisioning Aspects and Error Cases
9.3.20.6. Dual Homing to Two BSR Nodes
9.3.20.7. MC Services
9.3.20.8. Routed CO Dual Homing
9.3.20.8.1. Redundant Interfaces
9.3.20.8.2. SRRP in Dual Homing
9.3.20.8.3. Synchronization
9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.3.20.9. SRRP and Multi-Chassis Synchronization
9.3.20.10. Dual Homing and ANCP
9.3.21. SRRP Enhancement
9.3.21.1. SRRP Fate Sharing
9.3.21.2. Fate Sharing Algorithm
9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.3.21.3.2. Managed Routes
9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.3.21.3.4. Activating SRRP State Tracking
9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.3.21.5. Group Monitor
9.3.22. Subscriber QoS Overrides
9.3.23. Dual-Stack Lite
9.3.23.1. IP-in-IP
9.3.23.2. Configuring DS-Lite
9.3.23.3. L2TP over IPv6
9.3.24. Call Trace
9.4. L2TP Tunnel RADIUS Accounting
9.4.1. Accounting Packets List
9.4.2. RADIUS Attributes Value Considerations
9.4.3. Other Optional RADIUS Attributes
9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.4.5. MLPPP on the LNS Side
9.5. RADIUS Route Download
9.6. Managed SAP (MSAP)
9.6.1. Capture SAP
9.6.2. MSAP Parameters
9.6.2.1. Explicit MSAP Parameters from Local User Database
9.6.2.2. Explicit MSAP Parameters from RADIUS or DIAMETER Authentication�
9.6.2.3. Implicit MSAP Parameters Specified at the Capture SAP
9.6.3. MSAP Creation
9.6.4. MSAP QoS Configuration
9.6.5. Sticky MSAP
9.7. ESM Identification Process
9.7.1. SAP-ID ESM Identifier
9.7.2. DSLAM-ID
9.8. Default-Subscriber
9.9. Subscriber Mirroring
9.10. Multicast Management
9.11. Volume and Time Based Accounting
9.11.1. Metering
9.11.1.1. Categories Map and Categories
9.11.1.2. Quota Consumption
9.11.1.3. Minimum Credit Control Quota Values
9.11.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.11.2. Credit Negotiation Mechanisms
9.11.3. Action on Credit Exhaustion
9.11.4. Action on Error-Conditions
9.11.5. Applicability of Volume and Time Based Accounting
9.12. Subscriber Host Idle Timeout
9.13. Web Portal Authentication
9.13.1. HTTP-Redirect (Captive Portal)
9.13.2. One-time HTTP Redirection Overview
9.13.3. Web Authentication Protocol (WPP)
9.13.3.1. WPP Configurations
9.13.3.2. WPP Triggered Host Creation
9.13.3.2.1. LUDB Support For WPP
9.13.3.3. WPP Multi-Chassis Redundancy Support
9.13.3.4. WPP Portal Group
9.14. ESM over MPLS Pseudowires
9.14.1. Encapsulation
9.14.2. ESM and PW Ports
9.14.2.1. ESM on PW-Port Bound to a Physical Port
9.14.2.1.1. QoS Support
9.14.2.1.2. BNG Redundancy with ESM over Pseudowire
9.14.2.2. ESM on PXC-Based PW-Ports
9.15. Logical Link Identifier (LLID)
9.16. PADI Authentication Policy for Managed SAP (MSAP)
9.17. Open Authentication Model for DHCP and PPPoE Hosts
9.17.1. Terminology
9.17.2. LUDB and RADIUS Access Models
9.17.3. No Authentication
9.17.4. LUDB Only Access
9.17.5. LUDB Access via DHCPv4 Server
9.17.6. RADIUS Only Access
9.17.7. Consecutive Access to LUDB and RADIUS
9.17.8. RADIUS Fallback
9.18. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.18.1. Terminology
9.18.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
9.18.3. Default Gateway in IPv4 Flexible Addressing
9.18.4. IPv4 Subnet Sharing
9.18.5. IPv4 Subnet Mask Auto-Generation
9.18.6. Local-proxy-arp and arp-populate
9.18.7. Gi-address Configuration Consideration
9.18.8. PPPoE Considerations
9.18.9. IPoEv6 Considerations
9.18.10. General Configuration Guidelines for Flexible IP Address Assignment
9.18.11. Caveats
9.19. uRPF for Subscriber Management
9.20. IPoE Sessions
9.20.1. Enabling IPoE Sessions
9.20.2. IPoE Session Authentication
9.20.3. IPoE Session Accounting
9.20.4. IPoE Session Mid-Session Changes
9.20.5. IPoE Session Termination
9.20.6. Limiting the Number of IPoE Sessions
9.20.7. SAP Session Index
9.20.8. Resiliency
9.20.9. Notes
9.20.10. Configuration Steps
9.20.11. IPoE Session Migration
9.20.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.21. Data-triggered Subscriber Management
9.21.1. Provisioning Data-triggered ESM
9.21.2. Authentication and Host Creation
9.21.3. DoS Protection
9.21.4. DHCP Promotion
9.21.5. Data-Triggered SLAAC Hosts
9.21.6. Stateful Multi-Chassis Redundancy (MCS)
9.21.7. Stateless Multi-Chassis Redundancy
9.21.7.1. MSAP Support
9.22. RADIUS Subscriber Services
9.22.1. Subscriber Service Building Blocks
9.22.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.22.1.2. RADIUS Python Interface
9.22.1.3. Python Script
9.22.1.3.1. Python Script Example
9.22.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.22.2. Subscriber Services RADIUS VSAs
9.22.3. Subscriber Service RADIUS Accounting
9.22.4. Accounting-Only Subscriber Service
9.22.5. QoS Override-based Subscriber Service
9.22.6. PCC Rule-based Subscriber Services
9.22.6.1. PCC Rule Actions
9.22.6.2. PCC Rule Instantiation
9.22.6.3. PCC Rules in a Subscriber Service
9.22.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.22.6.5. PCC Rules on HSMDAv2
9.22.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
9.22.6.6. PCC Rule-based Subscriber Service Activation Failures
9.22.7. Combined Subscriber Services
9.22.8. Subscriber Services Python API
9.22.8.1. Common Subscriber Services Python API
9.22.8.2. Subscriber Service QoS Override Python API
9.22.8.3. Subscriber Service PCC Rules Python API
9.22.9. Operational Commands
9.22.9.1. Show Commands
9.22.9.2. Debug Commands
9.22.9.3. Resource Monitoring
9.23. Residential Gateway Replacement
9.24. ESM Troubleshooting Show Command
9.25. Subscriber Accumulated Statistics
9.26. Hybrid Access
9.26.1. BNG-based HAG
9.26.2. PGW-based HAG
9.27. Connection Bonding
9.27.1. Setup
9.27.2. Downstream Load-Balancing
9.27.3. QoS
9.27.4. Multicast
9.28. Ethernet Satellites with Redundant Uplinks
9.28.1. Single Host, Single Satellite
9.28.2. Single Host Node, Dual Satellite
9.28.3. QoS
9.28.4. Preservation of Statistics and Accounting in ESM
9.29. Multi-Chassis Synchronization of RADIUS Usage Counters
9.29.1. Overview
9.29.2. MCS Interval
9.29.3. Usage Counters Synchronized
9.29.4. Incomplete MCS Configuration
9.29.5. Configuration Mismatch
9.29.6. Switchover Scenarios
9.30. Configuring Enhanced Subscriber Management with CLI
9.30.1. Configuring RADIUS Authentication of DHCP Sessions
9.30.2. TCP MSS adjustment for ESM Hosts
9.30.3. Configuring Enhanced Subscriber Management
9.30.3.1. Basic Configurations
9.30.3.2. Subscriber Interface Configuration
9.30.3.3. Configuring Enhanced Subscriber Management Entities
9.30.3.3.1. Configuring a Subscriber Identification Policy
9.30.3.3.2. Configuring a Subscriber Profile
9.30.3.3.3. Configuring an SLA Profile
9.30.3.3.4. Configuring Explicit Mapping Entries
9.30.3.4. Routed CO with Basic Subscriber Management Features
9.30.3.5. Applying the Profiles and Policies
9.30.3.5.1. SLA Profile
9.30.4. Configuring Dual Homing
9.31. Subscriber Management Command Reference
9.31.1. Command Hierarchies
9.31.1.1. ANCP Commands
9.31.1.2. Authentication Policy Commands
9.31.1.3. BGP Peering Policy Commands
9.31.1.4. Call Trace Commands
9.31.1.5. Category Map and Credit Control Policy Commands
9.31.1.6. Diameter Policy Commands
9.31.1.6.1. AAA Diameter Peer Policy Commands
9.31.1.6.2. Subscriber Management Diameter Application Policy Commands
9.31.1.6.3. Diameter Base Commands
9.31.1.7. Explicit Subscriber Mapping Commands
9.31.1.8. Filter Commands
9.31.1.9. GSMP Configuration Commands
9.31.1.10. Host Lockout Commands
9.31.1.11. Host Tracking Policy Commands
9.31.1.12. IGMP Policy Commands
9.31.1.13. Multi-Chassis Redundancy Commands
9.31.1.14. PIM Policy Commands
9.31.1.15. RADIUS Accounting Policy Commands
9.31.1.16. RADIUS Route Download Commands
9.31.1.17. Router Advertisement Commands
9.31.1.18. SLA Profile Commands
9.31.1.19. Subscriber Identification Policy Commands
9.31.1.20. Auto-Generated Subscriber Identification Key Commands
9.31.1.21. Auto-Generated Subscriber Identification Key Service Commands
9.31.1.22. Subscriber MCAC Policy Commands
9.31.1.23. Subscriber Profile Commands
9.31.1.24. IPoE Session Policy Commands
9.31.1.25. SHCV Policy Commands
9.31.1.26. Subscriber Management Service Commands
9.31.1.26.1. VPLS Subscriber Management Configuration Commands
9.31.1.26.2. Managed SAP Policy Commands
9.31.1.26.3. VPRN Subscriber Interface Commands
9.31.1.26.4. VPRN Subscriber Group Interface Commands
9.31.1.26.5. IES Subscriber Management Configuration Commands
9.31.1.26.6. IES Subscriber Interface Commands
9.31.1.26.7. IES Group Interface Commands
9.31.1.26.8. Service Subscriber Interface, Group Interface IPoE Command
9.31.1.26.9. RIP Commands
9.31.1.26.10. VPort Commands
9.31.1.26.11. Redundant Interface Commands
9.31.1.26.12. Wireless Portal Protocol (WPP) Commands
9.31.1.26.13. Multiple PPPoE Session QoS Commands
9.31.1.26.14. Multicast Listener Discovery (MLD) Commands
9.31.1.26.15. ETH-CFM Service Commands
9.31.1.27. Show Commands
9.31.1.28. Monitor Commands
9.31.1.29. Clear Commands
9.31.1.30. Debug Commands
9.31.1.31. Tools Commands
9.31.2. Triple Play Subscriber Management Configuration Commands
9.31.2.1. Triple Play Subscriber Management Configuration Commands
9.31.2.1.1. Generic Commands
9.31.2.1.2. ANCP Commands
9.31.2.1.3. Authentication Policy Commands
9.31.2.1.4. BGP Peering Policy Commands
9.31.2.1.5. Call Trace Commands
9.31.2.1.6. Category Map Commands
9.31.2.1.7. Diameter Policy Commands
9.31.2.1.8. Diameter Base Commands
9.31.2.1.9. Explicit Subscriber Mapping Commands
9.31.2.1.10. GSMP Configuration Commands
9.31.2.1.11. Host Lockout Commands
9.31.2.1.12. IGMP Policy Commands
9.31.2.1.13. Managed SAP Policy Commands
9.31.2.1.14. Multicast Listener Discovery (MLD) Commands
9.31.2.1.15. Multi-Chassis Redundancy Commands
9.31.2.1.16. PIM Policy Commands
9.31.2.1.17. RADIUS Accounting Policy Commands
9.31.2.1.18. RADIUS Route Download Commands
9.31.2.1.19. Redundant Interface Commands
9.31.2.1.20. RIP Commands
9.31.2.1.21. Router Advertisement Policy Commands
9.31.2.1.22. SLA Profile Commands
9.31.2.1.23. Subscriber Identification Policy Commands
9.31.2.1.24. Subscriber Profile Commands
9.31.2.1.25. Subscriber Management Service Commands
9.31.2.1.26. Subscriber Management Service Commands
9.31.2.1.1.1. Vport Commands
9.31.2.1.2.1. IPoE Session Commands
9.31.2.1.3.1. SHCV Policy Commands
9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.6.1. IPv6 Commands
9.31.2.1.26.1. Show Commands
9.31.2.2.26.1. Clear Commands
9.31.2.3.26.1. Tools Commands
9.31.2.4.26.1. Debug Commands
9.31.2.5.26.1. Monitor Commands
9.31.2.1.1. Vport Commands
9.31.2.1.2. IPoE Session Commands
9.31.2.1.3. SHCV Policy Commands
9.31.2.1.4. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.5. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.6. IPv6 Commands
9.31.2.1.26. Show Commands
9.31.2.2.26. Clear Commands
9.31.2.3.26. Tools Commands
9.31.2.4.26. Debug Commands
9.31.2.5.26. Monitor Commands
9.31.2.1.1.1. Vport Commands
9.31.2.1.2.1. IPoE Session Commands
9.31.2.1.3.1. SHCV Policy Commands
9.31.2.1.4.1. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.5.1. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.6.1. IPv6 Commands
9.31.2.1.26.1. Show Commands
9.31.2.2.26.1. Clear Commands
9.31.2.3.26.1. Tools Commands
9.31.2.4.26.1. Debug Commands
9.31.2.5.26.1. Monitor Commands
9.31.2.1.27. Vport Commands
9.31.2.1.28. IPoE Session Commands
9.31.2.1.29. SHCV Policy Commands
9.31.2.1.30. Service DHCP and Anti-Spoof Filtering Commands
9.31.2.1.31. Auto-Generated Subscriber Identification Key Commands
9.31.2.1.32. IPv6 Commands
9.31.2.2. Show Commands
9.31.2.3. Clear Commands
9.31.2.4. Tools Commands
9.31.2.5. Debug Commands
9.31.2.6. Monitor Commands
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. Overview
10.1.1. Terminology and Abbreviations
10.1.2. Restrictions
10.2. Deploying Oversubscribed Multi-Chassis Redundancy
10.2.1. Resource Exhaustion Notification and Simultaneous Failures
10.2.2. Resource Monitoring
10.2.3. Warm-Standby Mode Of Operation
10.2.4. IPoE vs PPPoE
10.2.5. Persistency
10.2.6. Routing and Redundant Interface in OMCR
10.2.7. Revertive Behavior
10.2.8. Service Restoration Times
10.2.9. Processing of the SRRP Flaps
10.2.10. Accounting
10.2.11. Configuration Guidelines
10.2.12. Troubleshooting Commands
10.3. OMCR Command Reference
10.3.1. Command Hierarchies
10.3.2. OMCR Configuration Commands
10.3.2.1. OMCR Configuration Commands
11. ESM on High Scale QoS (HSQ) IOM
11.1. Overview
11.1.1. HSQ Traffic Manager Overview
11.1.1.1. Shaping Hierarchy
11.1.1.2. Scheduling
11.1.2. HSQ and ESM SLA Modes
11.1.2.1. ESM Single SLA Mode
11.1.2.2. ESM Expanded SLA Mode
11.1.3. Configuration Steps
11.1.4. Deployment Considerations
12. WIFI Aggregation and Offload
12.1. WIFI Aggregation and Offload Overview
12.2. Layer 2 over Soft-GRE Tunnels
12.2.1. Encapsulation
12.2.2. Data Path
12.2.3. MDA-based Redundancy
12.3. Tunnel Level Egress QoS
12.3.1. QoS Overrides
12.3.2. Operational Commands
12.4. Authentication
12.4.1. EAP-Based Authentication
12.4.1.1. RADIUS Proxy
12.4.1.1.1. RADIUS Proxy — Server Load-Balancing
12.4.1.1.2. RADIUS Proxy — Cache Lookup
12.4.1.1.3. RADIUS Proxy — Accounting
12.4.2. Portal Authentication
12.4.3. AA-based Portal Redirection
12.5. Address Assignment
12.6. WIFI Mobility Anchor
12.7. Wholesale
12.8. CGN on WLAN-GW
12.9. Lawful Intercept on WLAN-GW
12.10. WLAN Location Enhancements
12.10.1. Triggered Interim Accounting-Updates
12.10.2. Mobility Triggered Interim Updates with Counters
12.10.3. Operational Support
12.11. 3G/4G Interworking
12.11.1. Signaling Call Flow
12.11.1.1. GTP Setup with EAP Authentication
12.11.2. Location Notification in S2a
12.11.2.1. WLAN Location over S2a
12.11.2.2. Cellular Location over S2a
12.11.2.3. Cellular Location over Gn Interface
12.11.2.4. Operational Support
12.12. Migrant User Support
12.12.1. Migrant User Support with Portal-Authentication
12.12.1.1. DHCP
12.12.1.2. Authentication and Forwarding
12.12.2. Migrant User Support with EAP Authentication
12.12.3. Data Triggered Subscriber Creation
12.13. Distributed Subscriber Management (DSM)
12.13.1. DHCP
12.13.2. Authentication and Accounting
12.13.2.1. DSM Data-Plane
12.13.3. IP Filtering
12.13.3.1. HTTP Redirect
12.13.4. Policing
12.13.5. Lawful Intercept (LI)
12.13.6. Data-Triggered UE Creation
12.13.7. Idle-Timeout and Session-Timeout Management
12.13.8. Operational Commands
12.13.9. Pool Manager
12.13.10. DHCPv6 and SLAAC
12.13.11. Application Assurance Support
12.14. Call Trace
12.15. Distributed RADIUS Proxy
12.15.1. Enhanced Subscriber Management
12.15.2. Distributed Subscriber Management
12.15.3. VLAN Awareness
12.15.4. Operational Commands
12.16. WLAN-GW 1:1 Active-Backup Redundancy
12.16.1. DHCP Server Redundancy
12.16.2. Subscriber Creation after Switchover
12.17. WLAN-GW Triggered Stateless Redundancy (N:1)
12.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
12.19. IPv6-only Access
12.19.1. IPv6 GRE Tunnels
12.19.2. IPv6 Client-Side RADIUS Proxy
12.19.3. Dual-Stack UEs over WLAN-GW
12.19.3.1. SLAAC Prefix Assignment
12.19.3.2. DHCPv6 IA_NA Assignment
12.19.3.3. Migrant User Support
12.19.3.4. Accounting
12.20. Layer 2 Wholesale
12.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
12.22. Soft-L2TPv3 Tunnels
12.23. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
12.23.1. Processing on the V-GW
12.23.2. Processing on H-GW
12.23.3. Idle Timeout Handling
12.23.4. Distributed RADIUS Proxy for Closed SSID
12.23.5. H-GW Redundancy
12.24. ISA Operational Commands and Key Performance Indicators
12.24.1. ISA Resources
12.24.2. ISA Load
12.24.3. Query-based UE and Tunnel States
12.24.4. Packet Statistics
12.25. WiFi Command Reference
12.25.1. Command Hierarchies
12.25.1.1. WLAN-GW Commands
12.25.1.2. ISA Commands
12.25.1.3. WLAN-GW Service Commands
12.25.1.4. Data Plane Related Commands
12.25.1.5. RADIUS Server and Proxy Commands
12.25.1.6. LUDB Matching for RADIUS Proxy Cache
12.25.1.7. Port Policy Commands
12.25.1.8. WIFI Aggregation and Offload – Migrant User Support Commands
12.25.1.9. Show Commands
12.25.1.10. Debug Commands
12.25.1.11. Tools Commands
12.25.1.12. Clear Commands
12.25.2. WIFI Aggregation and Offload Commands
12.25.2.1. WIFI Aggregation and Offload Commands
12.25.2.1.1. Generic Commands
12.25.2.1.2. WLAN-GW Commands
12.25.2.1.3. ISA Commands
12.25.2.1.4. RADIUS Server Policy Commands
12.25.2.2. CLI Command Description for RADIUS Server
12.25.2.3. CLI Command Description for RADIUS Proxy Server
12.25.2.4. LUDB Matching of RADIUS Proxy Cache Commands
12.25.2.5. WLAN-GW-Group Commands
12.25.2.6. Port Policy Commands
12.25.2.7. WLAN-GW Group Interface Commands
12.25.2.8. Migrant User Support Commands
12.25.2.8.1. Show Commands
12.25.2.8.2. Debug Commands
12.25.2.8.3. Tools Commands
12.25.2.8.4. Clear Commands
13. GTP
13.1. GTP Uplink
13.1.1. Identification Attributes
13.1.2. P-GW/GGSN Selection
13.1.3. Configuration
13.1.4. QoS Support
13.1.5. GTP Session Hold
13.1.6. Selective Breakout
13.1.7. IPoE Support
13.1.8. PPPoE Support
13.2. GTP Access
13.2.1. GTP Termination
13.2.1.1. Multiple APNs
13.2.2. GTP Session Setup
13.2.2.1. Supported IP Stacks
13.2.3. Mobility and Location Tracking
13.2.4. QoS
13.2.5. Multicast
13.3. DHCP over GTP-u
13.3.1. Address Management Related PCOs
13.3.2. Address Allocation Modes
13.4. GTP Peering
13.5. GTP Command Reference
13.5.1. Command Hierarchies
13.5.1.1. GTP Commands
13.5.1.2. GTP Service Commands
13.5.1.3. Show Commands
13.5.1.4. Clear Commands
13.5.1.5. Debug Commands
13.5.2. GTP Command Descriptions
13.5.2.1. GTP Commands
13.5.2.1.1. Generic Commands
13.5.2.1.2. GTP Commands
13.5.2.1.3. GTP Show Commands
13.5.2.1.4. GTP Clear Commands
13.5.2.1.5. GTP Debug Commands
14. Virtual Residential Gateway
14.1. Overview
14.1.1. Access Modes
14.1.2. Home Context on the vRGW
14.1.2.1. Implicit Home Authentication
14.1.2.2. Explicit Home Authentication
14.1.2.3. Change of Configuration
14.1.2.4. Home Lifetime
14.1.3. Device Context on the vRGW
14.1.4. Dynamic Configuration Changes
14.1.5. Per-Home Pool Management and L2-Aware NAT
14.1.5.1. Sticky IP Addresses
14.1.5.2. Managed Static IPv4 Addresses
14.1.5.3. DMZ
14.1.6. IPv6
14.1.7. QoS and Filter Support
14.1.8. Data-Triggered Authentication
14.1.9. Per-Host NAT Port Ranges
14.1.10. Inter-Chassis Redundancy
14.1.10.1. Pool State Synchronization
14.1.10.2. Regular Group Interfaces
14.1.10.3. WLAN-GW Group Interfaces
14.1.11. BRG and vRG Caveats
14.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
14.1.13. PPPoE Client
14.1.13.1. PPPoE Client Setup
14.1.13.2. PPPoE Client Failure
14.1.13.3. LCP Keepalive
14.1.13.4. MRU/MTU
14.1.14. SLAAC Prefix Replacement
14.2. Home LAN Extension
14.2.1. Overview
14.2.2. Authentication and Authorization
14.2.3. Data Plane Tables
14.2.4. BGP EVPN VPLS
14.2.5. Assistive Address Resolution
14.2.6. MAC Address Translation
14.2.7. Configuring HLE
14.2.8. Traffic Handling
14.3. AP Agnostic Access for Multiple Dwelling Units
14.3.1. Overview
14.3.2. Bridge Domain and BRG Identification
14.3.3. ARP Handling
14.3.4. Mobility
14.4. Per-Host DNS Override
14.5. vRGW and HLE Command Reference
14.5.1. Command Hierarchies
14.5.1.1. Subscriber Management BRGW Profile Commands
14.5.1.2. Subscriber Management Commands
14.5.1.3. WLAN-GW Service Commands
14.5.1.4. Service Commands
14.5.1.5. Router HLE Commands
14.5.1.6. Subscriber Management HLE Commands
14.5.1.7. Show Commands
14.5.1.8. Debug Commands
14.5.1.9. Clear Commands
14.5.1.10. Tools Commands
14.5.2. Command Descriptions
14.5.2.1. Generic Commands
14.5.2.2. BRG Profile Commands
14.5.2.3. Subscriber Management Commands
14.5.2.4. WLAN-GW Service Commands
14.5.2.5. Router Home LAN Extension Commands
14.5.2.6. Subscriber Management Commands
14.5.2.7. Service Commands
14.5.2.8. Show Commands
14.5.2.9. Debug Commands
14.5.2.10. Clear Commands
14.5.2.11. Tools Commands
15. Service Chaining for ESM Hosts with L2-Aware NAT
15.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
15.1.1. Terminology
15.2. VAS Filters on the ISA
15.2.1. Matching
15.2.2. Forwarding
15.2.3. NSH Insertion
15.2.4. Configuration
15.3. EVPN Route Updates and Tracking
15.3.1. NVE Bridging to SF
15.3.2. NVE Routing to SF
15.4. Data Path on the Subscriber Edge
15.4.1. Upstream Traffic (Access to Network)
15.4.2. Downstream Traffic — From Network
15.5. Data Path on NVE
15.6. Service Chaining for ESM Hosts with L2-Aware NAT
15.6.1. Command Hierarchies
15.6.1.1. ISA Service Chaining Commands
15.6.1.2. Show Commands
15.6.2. Command Descriptions
15.6.2.1. Generic Commands
15.6.2.2. Service Chaining Commands
15.6.2.3. Show Commands
16. Dynamic Data Services
16.1. Introduction to Dynamic Data Services
16.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
16.3. Data-Triggered Dynamic Data Services
16.3.1. Data Trigger
16.3.2. Dynamic Services Data Trigger Capture SAP
16.3.3. RADIUS Authentication
16.3.4. Local Authentication
16.3.5. Data-Triggered Dynamic Service Provisioning
16.3.6. Control Plane Protection
16.3.7. Debugging
16.4. Dynamic Data Services Python API
16.5. RADIUS Triggered Dynamic Data Services Command Reference
16.5.1. Command Hierarchies
16.5.1.1. RADIUS Triggered Dynamic Data Services Commands
16.5.1.2. Basic System Command
16.5.1.3. Show Commands
16.5.1.4. Clear Commands
16.5.1.5. Debug Commands
16.5.1.6. Tools Commands
16.5.2. RADIUS Triggered Dynamic Data Services Commands
16.5.2.1. Configuration Commands
16.5.2.2. Basic System Command
16.5.2.3. Show Commands
16.5.2.4. Clear Commands
16.5.2.5. Debug Commands
16.5.2.6. Tools Commands
17. Diameter and Diameter Applications
17.1. Restrictions
17.2. Terminology
17.3. Diameter Base
17.3.1. Diameter Base Protocol
17.3.2. Diameter Peers and the Role of a Diameter Node in SR OS
17.3.3. Capability Exchange
17.3.4. Connection Termination
17.3.5. Diameter Hosts and Realms
17.3.5.1. Forwarding and Routing of Application Messages in Diameter
17.3.5.2. Static Diameter Realm Routes
17.3.5.2.1. Example with Static Realm Routes
17.3.5.2.2. Default Peer
17.3.5.3. Configuration of Host Names and Realms in SR OS
17.3.5.3.1. New Base Configuration
17.3.5.3.2. Legacy Configuration
17.3.6. Dynamically Learned Parameters
17.3.7. Diameter Routing Loop Avoidance
17.3.8. Retransmissions and Message Timers
17.3.8.1. Clearing the Destination-Host AVP in the Retransmitted Messages
17.3.8.2. Retransmission Bit (T-Bit)
17.3.9. Handling of Diameter_Unable_To_Deliver (3002) Error Message
17.3.10. Response to Diameter_Too_Busy (3004) Error Message
17.3.11. An SR as a Transit Diameter Node
17.3.12. An SR as a Transit Diameter Node
17.3.13. Python Support
17.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
17.4.1. Diameter Gy Out Of Credit Actions
17.4.1.1. Graceful Service Termination
17.4.2. Extended Failure Handling (EFH)
17.4.2.1. Extended Failure Handling Example Call Flow
17.4.2.2. Extended Failure Handling Triggers
17.4.2.3. Assigning Interim Credit
17.4.2.4. Enabling Extended Failure Handling
17.4.2.5. Configuration Example 1 - Single Volume Interim Credit Value
17.4.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
17.4.2.7. Monitoring the Extended Failure Handling State
17.4.2.8. Additional Call Flow Examples
17.4.2.8.1. User Disconnects While EFH is Active
17.4.2.8.2. The Maximum Number of Attempts is Reached
17.4.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
17.4.3. Gy CCR-t Replay
17.5. Policy Management via Gx Interface
17.5.1. Gx Protocol
17.5.2. Policy Assignment Models
17.5.3. IP-CAN Session – Gx Session Identification
17.5.3.1. User Identification in PCRF
17.5.3.2. NAS-Port-Id as Subscription-Id
17.5.4. Gx Interface and ESM Subscriber Instantiation
17.5.4.1. Gx and Dual-Stack Hosts
17.5.4.2. Gx and PPPoEv6-DHCP
17.5.5. Gx Fallback Function
17.5.6. Gx CCR-I Replays
17.5.7. Gx CCR-t Replays
17.5.7.1. RAR and CCR-t Replay
17.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
17.5.7.3. CCR-t Replay And High Availability
17.5.8. Automatic Updates for IP Address Allocation/De-allocation
17.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
17.5.10. Gx, ESM and AA
17.5.10.1. ESM Subscriber-Host vs AA Subscriber
17.5.10.2. AA Subscriber State
17.5.11. Policy Management via Gx
17.5.12. Gx-Based Overrides
17.5.12.1. Instantiation of Gx Overrides
17.5.12.2. HTTP Redirect Override
17.5.12.3. Removal of Overrides
17.5.12.4. Examples of Gx Overrides
17.5.13. PCC Rules
17.5.13.1. PCC Rule Concept
17.5.13.2. PCC Rule Instantiation
17.5.13.3. Base QoS-Policy and Base Filter
17.5.13.4. Generic Policy Sharing and Rule Sharing
17.5.13.5. PCC Rule Name and PCC Rule Removal
17.5.13.6. Gx Rule Ordering
17.5.13.7. PCC Rule Override
17.5.13.8. Aggregation of IP-Criterion
17.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
17.5.13.10. Gx Rules with Multiple Actions and Action Sharing
17.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
17.5.13.12. RADIUS and Gx Interaction
17.5.13.13. Bulk Changes via CLI while Gx Rules are Active
17.5.13.14. PCC Rule Direction
17.5.13.15. Action
17.5.13.16. Rate-Limiting Action (Ingress, Egress)
17.5.13.16.1. Dynamic Policers and Queue Mappings
17.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
17.5.13.17. Forwarding-Class Change (Ingress, Egress)
17.5.13.18. QoS Forward (Ingress and Egress)
17.5.13.19. Next Hop Redirect (Ingress)
17.5.13.20. HTTP Redirect (Ingress)
17.5.13.21. Filter Forward/Drop (Ingress and Egress)
17.5.13.22. Service Gating Function
17.5.13.23. PCC Rule Provisioning Example
17.5.13.24. Operational Aspects
17.5.13.25. PCC Rules and Capacity Planning
17.5.13.26. PCC Rule Scaling Example
17.5.14. NAS Filter Inserts
17.5.14.1. Examples of NAS Entry Inserts
17.5.15. Error Handing and Rule Failure Reporting in ESM
17.5.15.1. AVP Decoding Failure in Gx
17.5.15.2. ESM Rule-Installation Failure
17.5.15.3. Failure Reporting in AA
17.5.15.4. Summary of Failure Reporting
17.5.16. Usage-Monitoring and Reporting
17.5.16.1. ESM Usage-Monitoring - What is Being Monitored
17.5.16.2. AA Usage-Monitoring – What is Being Monitored
17.5.16.3. Requesting Usage-Monitoring in ESM
17.5.16.4. Reporting Accumulated Usage
17.5.16.5. Disabling Usage-Monitoring
17.5.16.6. Usage-Monitoring for PCC Rules
17.5.16.7. Session Termination
17.5.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
17.5.16.9. Usage-Monitoring Examples
17.5.17. Event Triggers
17.5.18. Subscriber Verification
17.5.19. Subscriber Termination
17.5.20. Mobility Support in WiFi
17.5.20.1. Redundancy
17.5.21. Persistency and Origin-State-ID AVP
17.5.22. Overload Protection
17.6. Supported-Features AVP in Gx
17.6.1. Extended Bandwidth 5G New Radio Feature
17.6.2. Transmission of Extended Bandwidth AVPs During Gx Session Initiation
17.6.3. Processing the Extended Bandwidth AVPs
17.7. Diameter NASREQ Application
17.7.1. Sample Configuration Steps
17.8. Diameter Redundancy
17.8.1. Diameter Peer and Server Failover
17.8.1.1. Diameter Peer Failover
17.8.1.2. Diameter Sever Failover
17.8.2. Diameter Multi-Chassis Redundancy
17.8.2.1. Single Diameter Identity (DI) per a Pair of Redundant Diameter Nodes
17.8.2.2. Single Peering Connection per Redundant Pair
17.8.2.3. Inter-Peering Connection
17.8.2.4. Inter-Peer as a Default Peer
17.8.2.5. Handling RARs
17.8.2.6. Handling of the Route-Record AVP
17.8.2.7. SRRP Switchover
17.8.2.8. Unsupported Failures
17.8.2.9. Peer Preference in Multi-Chassis Setup
17.8.3. Gx Usage Monitoring in Dual-Homed Systems
17.8.3.1. Synchronization Frequency
17.8.3.2. Switchover Triggered Synchronization
17.8.3.3. What is Being Synchronized
17.8.3.4. Loss of Inter-Chassis Link
17.8.3.5. Master-to-Master SRRP Scenario
17.8.3.6. Usage Counter Collection With No Credit Grants Received
17.8.3.7. ISSU
17.9. Diameter Debugging
18. Python Script Support for ESM
18.1. Python Script Support for ESM
18.2. Python in SR OS Overview
18.2.1. Python Policy – GTPv1-C API
18.2.2. Python Policy – GTPv2-C API
18.2.3. Python Changes
18.3. Python Support in sub-ident-policy
18.3.1. Configuration
18.3.2. Operator Debugging
18.3.3. Python Scripts
18.3.4. Sample Python Scripts
18.3.4.1. Example
18.3.4.2. Example
18.3.4.3. Example
18.3.5. Limitations
18.4. RADIUS Script Policy Overview
18.4.1. Python RADIUS API
18.4.2. Sample Script
18.5. Python Policy Overview
18.5.1. Python Policy – RADIUS API
18.5.2. Python Policy – DHCPv4 API
18.5.3. Python Policy – DHCPv6 API
18.5.4. Python Policy – Diameter API
18.5.5. Python Policy – DHCP Transaction Cache API
18.5.6. Python for PPPoE API
18.5.7. Python API for PPP Packet
18.5.8. Python API for PPP PAP
18.5.9. Python API for PPP CHAP
18.5.10. Python ESM API
18.5.11. Python Cache Support
18.5.12. Applying a Python Policy
18.5.13. Python Script Protection
18.6. Tips and Tricks
18.7. Python Command Reference
18.7.1. Command Hierarchies
18.7.1.1. Python Policy Commands
18.7.1.2. Python Script Commands
18.7.1.3. Services Commands
18.7.1.4. Show Commands
18.7.1.5. Tools Commands
18.7.1.6. Debug Commands
18.7.1.7. Clear Commands
18.7.2. Command Descriptions
18.7.2.1. Python Configuration Commands
18.7.2.1.1. Global Commands
18.7.2.1.2. Python Policy Commands
18.7.2.1.3. Python Script Commands
18.7.2.1.4. Services Commands
18.7.2.1.5. Tools Commands
18.7.2.2. Show Commands
18.7.2.3. Debug Commands
18.7.2.4. Clear Commands
18.8. Python RADIUS Command Reference
18.8.1. Command Hierarchies
18.8.2. Command Descriptions
18.8.2.1. Generic Commands
18.8.2.2. Script Commands
19. S-VLAN Statistics Collection
19.1. Overview
19.1.1. Statistics Retention
19.1.1.1. MIBs
19.1.2. Enabling S-VLAN Statistics Collection
19.2. S-VLAN Status Collection Command Reference
19.2.1. Command Hierarchies
19.2.1.1. S-VLAN Status Collection Commands
19.2.1.2. S-VLAN Status Collection Show Commands
19.2.1.3. S-VLAN Clear Commands
19.2.2. GTP Command Descriptions
19.2.2.1. GTP Commands
19.2.2.1.1. Generic Commands
19.2.2.1.2. S-VLAN Statistics Collection Commands
19.2.2.1.3. S-VLAN Statistics Collection Show Commands
19.2.2.1.4. S-VLAN Statistics Collection Clear Commands
20. Standards and Protocol Support
Customer Document and Product Support
Unicast Routing Protocols Guide 20.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. RIP Overview
2.1.1. RIP Features
2.1.1.1. RIP Version Types
2.1.1.2. RIPv2 Authentication
2.1.1.3. RIP Packet Format
2.1.1.3.1. RIPv1 Format
2.1.1.3.2. RIPv2 Format
2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
2.2. RIPng
2.2.1. RIPng Protocol
2.3. Common Attributes
2.3.1. Metrics
2.3.2. Timers
2.3.3. Import and Export Policies
2.3.4. Hierarchical Levels
2.4. RIP Configuration Process Overview
2.5. Configuration Notes
2.5.1. General
2.6. Configuring RIP with CLI
2.6.1. RIP and RIPng Configuration Overview
2.6.1.1. Preconfiguration Requirements
2.6.1.2. RIP Hierarchy
2.6.2. Basic RIP Configuration
2.6.3. Common Configuration Tasks
2.6.3.1. Configuring Interfaces
2.6.3.2. Configuring a Route Policy
2.6.3.3. Configuring RIP Parameters
2.6.3.4. Configuring Global-Level Parameters
2.6.3.5. Configuring Group-Level Parameters
2.6.3.6. Configuring Neighbor-Level Parameters
2.7. RIP Configuration Management Tasks
2.7.1. Modifying RIP Parameters
2.7.2. Deleting a Group
2.7.3. Deleting a Neighbor
2.8. RIP Configuration Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Configuration Commands
2.8.1.1.1. Group Commands
2.8.1.1.2. Neighbor Commands
2.8.1.2. RIPng Configuration Commands
2.8.1.2.1. Group Commands
2.8.1.2.2. Neighbor Commands
2.8.2. Command Descriptions
2.8.2.1. Generic Commands
2.8.2.2. RIP Commands
2.9. Show, Clear, and Debug Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.2. Clear Commands
2.9.1.3. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.2. Clear Commands
2.9.2.3. Debug RIP Commands
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.1.3.7. Sham Links
3.1.2. OSPFv3 Authentication
3.1.3. OSPF Graceful Restart Helper
3.1.3.1. BFD Interaction with Graceful Restart
3.1.3.2. OSPFv3 Graceful Restart Helper
3.1.4. Virtual Links
3.1.5. Neighbors and Adjacencies
3.1.5.1. Broadcast and Point-to-Point Networks
3.1.5.2. Non-Broadcast Multi-Access (NBMA) Networks
3.1.6. Link-State Advertisements
3.1.7. Metrics
3.1.8. Authentication
3.1.9. IP Subnets
3.1.10. Preconfiguration Recommendations
3.1.11. Multiple OSPF Instances
3.1.11.1. Route Export Policies for OSPF
3.1.11.2. Preventing Route Redistribution Loops
3.1.12. Multi-Address Support for OSPFv3
3.1.13. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.1.13.1. IP FRR Configuration
3.1.13.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.13.2. ECMP Considerations
3.1.13.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.1.13.4. IP FRR and BGP Next Hop Resolution
3.1.13.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.1.13.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.1.13.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.1. Configuring a Route Next Hop Policy Template
3.2.1.1. Configuring Affinity or Admin Group Constraints
3.2.1.2. Configuring SRLG Group Constraints
3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.2.1.4. Configuring Protection Type and Next Hop Type Preferences
3.2.2. Application of Route Next Hop Policy Template to an Interface
3.2.3. Excluding Prefixes from LFA SPF
3.2.4. Modification to LFA Next Hop Selection Algorithm
3.2.5. Application of LFA Policy to a Segment Routing Node SID Tunnel
3.2.5.1. Modification to the Remote LFA Selection Algorithm
3.2.5.2. Modification to the TI-LFA Selection Algorithm
3.2.6. Application of LFA Policy to Adjacency SID Tunnel
3.2.7. Application of LFA Policy to Backup Node SID Tunnel
3.2.8. Configuration Example
3.3. LFA Protection Using Segment Routing Backup Node SID
3.3.1. Configuring LFA Using Backup Node SID in OSPF
3.3.2. Detailed Operation of LFA Protection Using Backup Node SID
3.3.3. Duplicate SID Handling
3.3.4. OSPF Control Plane Extensions
3.4. Segment Routing in Shortest Path Forwarding
3.4.1. OSPF Control Protocol Changes
3.4.2. Announcing ELC, MSD-ERLD and MSD-BMI with OSPF
3.4.3. Entropy Label for OSPF Segment Routing
3.4.4. IPv6 Segment Routing using MPLS Encapsulation in OSPFv3
3.4.4.1. OSPFv3 Extensions
3.4.5. Segment Routing Traffic Statistics
3.4.6. Class-Based Forwarding for SR-OSPF over RSVP-TE LSPs
3.5. Segment Routing Mapping Server
3.5.1. Segment Routing Mapping Server Prefix SID Resolution
3.6. OSPF Link TE Attribute Reuse
3.6.1. OSPF Application Specific TE Link Attributes
3.7. SPF LSA Filtering
3.8. FIB Prioritization
3.9. Extended LSA Support in OSPFv3
3.10. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
3.11. OSPF Configuration Process Overview
3.12. Configuration Notes
3.12.1. General
3.12.1.1. OSPF Defaults
3.13. Configuring OSPF with CLI
3.13.1. OSPF Configuration Guidelines
3.13.2. Basic OSPF Configurations
3.13.2.1. Configuring the Router ID
3.13.3. Configuring OSPF Components
3.13.3.1. Configuring OSPF Parameters
3.13.3.2. Configuring OSPF3 Parameters
3.13.3.3. Configuring an OSPF or OSPF3 Area
3.13.3.4. Configuring a Stub Area
3.13.3.5. Configuring a Not-So-Stubby Area
3.13.3.6. Configuring a Virtual Link
3.13.3.7. Configuring an Interface
3.13.3.8. Configuring Authentication
3.13.3.8.1. Overview
3.13.3.8.2. Configuring Authentication Keys and Algorithms
3.13.3.8.3. Configuring Authentication using Keychains
3.13.3.9. Assigning a Designated Router
3.13.3.10. Configuring Route Summaries
3.13.3.11. Configuring Route Preferences
3.13.4. Configuration Example of LFA Policy use in Remote LFA and TI-LFA
3.14. OSPF Configuration Management Tasks
3.14.1. Modifying a Router ID
3.14.2. Deleting a Router ID
3.14.3. Modifying OSPF Parameters
3.15. OSPF Configuration Command Reference
3.15.1. Command Hierarchies
3.15.1.1. Configuration Commands
3.15.2. Command Descriptions
3.15.2.1. Generic Commands
3.15.2.2. OSPF Global Commands
3.15.2.3. OSPF Area Commands
3.15.2.4. Interface/Virtual Link Commands
3.16. Show, Clear, and Debug Command Reference
3.16.1. Command Hierarchies
3.16.1.1. Show Commands
3.16.1.2. Clear Commands
3.16.1.3. Debug Commands
3.16.1.4. Tools Commands
3.16.2. Command Descriptions
3.16.2.1. Show Commands
3.16.2.2. Clear Commands
3.16.2.3. Debug Commands
3.16.2.4. Tools Commands
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.3.1. IS-IS PDU Configuration
4.1.3.2. IS-IS Operations
4.1.4. IS-IS Route Summarization
4.1.4.1. Partial SPF Calculation
4.1.5. IS-IS MT-Topology Support
4.1.5.1. Native IPv6 Support
4.1.6. IS-IS Administrative Tags
4.1.6.1. Setting Route Tags
4.1.6.2. Using Route Tags
4.1.6.3. Unnumbered Interface Support
4.1.7. Segment Routing in Shortest Path Forwarding
4.1.7.1. Configuring Segment Routing in Shortest Path
4.1.7.2. Announcing ELC, MSD-ERLD, and MSD-BMI with IS-IS
4.1.7.3. Segment Routing Operational Procedures
4.1.7.3.1. Prefix Advertisement and Resolution
4.1.7.3.2. Error and Resource Exhaustion Handling
4.1.7.4. Segment Routing Tunnel Management
4.1.7.4.1. Tunnel MTU Determination
4.1.7.5. Segment Routing Local Block
4.1.7.5.1. Bundling Adjacencies in Adjacency Sets
4.1.7.6. Entropy Label for IS-IS Segment Routing
4.1.7.7. Remote LFA with Segment Routing
4.1.7.8. Topology Independent LFA
4.1.7.8.1. TI-LFA Configuration
4.1.7.8.2. TI-LFA Link-Protect Operation
4.1.7.8.3. Data Path Support
4.1.7.9. Node Protection Support in TI-LFA and Remote LFA
4.1.7.9.1. Feature Configuration
4.1.7.9.2. TI-LFA Node-Protect Operation
4.1.7.9.3. Remote LFA Node-Protect Operation
4.1.7.9.4. TI-LFA and Remote LFA Node Protection Feature Interaction and Limitations
4.1.7.10. IPv6 Segment Routing using MPLS Encapsulation
4.1.7.10.1. IS-IS MT=0 Extensions
4.1.7.10.2. Service and Forwarding Contexts Supported
4.1.7.10.3. Services Using SDP with a SR IPv6 Tunnel
4.1.7.11. Data Path Support
4.1.7.11.1. Hash Label and Entropy Label Support
4.1.7.12. IS-IS Control Protocol Changes
4.1.7.12.1. IS-IS Control Protocol Changes
4.1.7.13. BGP Shortcut Using Segment Routing Tunnel
4.1.7.14. BGP Label Route Resolution Using Segment Routing Tunnel
4.1.7.15. Service Packet Forwarding with Segment Routing
4.1.7.16. Mirror Services and Lawful Intercept
4.1.7.17. Class-Based Forwarding for SR-ISIS over RSVP-TE LSPs
4.1.7.18. Segment Routing Traffic Statistics
4.1.8. Segment Routing Mapping Server Function for IPv4 Prefixes
4.1.8.1. Segment Routing Mapping Server
4.1.8.2. Prefix SID Resolution for Segment Routing Mapping Server
4.1.9. Micro-Loop Avoidance Using Loop-Free SR Tunnels (IS-IS)
4.1.9.1. Configuring Micro-loop Avoidance
4.1.9.2. Micro-Loop Avoidance Algorithm Steps
4.1.9.3. Micro-Loop Avoidance for Link Addition, Restoration, or Metric Decrease
4.1.9.4. Micro-Loop Avoidance for Link Removal, Failure, or Metric Increase
4.2. FIB Prioritization
4.3. IS-IS Graceful Restart Helper
4.3.1. BFD Interaction with Graceful Restart
4.4. IS-IS Configuration Process Overview
4.5. Configuration Notes
4.5.1. General
4.6. Configuring IS-IS with CLI
4.6.1. IS-IS Configuration Overview
4.6.1.1. Router Levels
4.6.1.2. Area Address Attributes
4.6.1.3. Interface Level Capacity
4.6.1.4. Route Leaking
4.6.2. Basic IS-IS Configuration
4.6.3. Common Configuration Tasks
4.6.4. Configuring IS-IS Components
4.6.4.1. Enabling IS-IS
4.6.4.2. Modifying Router-Level Parameters
4.6.4.3. Configuring ISO Area Addresses
4.6.4.4. Configuring Global IS-IS Parameters
4.6.4.5. Migration to IS-IS Multi-Topology
4.6.4.6. Configuring Interface Parameters
4.6.4.6.1. Example: Configuring a Level 1 Area
4.6.4.6.2. Example: Modifying a Router’s Level Capability
4.6.4.7. Configuring IS-IS Link Groups
4.7. IS-IS Configuration Management Tasks
4.7.1. Disabling IS-IS
4.7.2. Removing IS-IS
4.7.3. Modifying Global IS-IS Parameters
4.7.4. Modifying IS-IS Interface Parameters
4.7.5. Configuring Authentication using Keychains
4.7.6. Configuring Leaking
4.7.7. Redistributing External IS-IS Routers
4.7.8. Specifying MAC Addresses for All IS-IS Routers
4.8. Configuring IS-IS for Flexible Algorithms
4.8.1. Configuring the Flexible Algorithm Definition
4.8.2. Configuring IS-IS Flex-Algorithm Participation
4.8.3. Configuring IS-IS Flex-Algorithm Prefix Node SID
4.8.4. Verifying Basic Flex-Algorithm Behavior
4.8.5. Configuration and Usage Considerations for Flex-Algorithms
4.9. IS-IS Configuration Command Reference
4.9.1. Command Hierarchies
4.9.1.1. Configuration Commands
4.9.2. Command Descriptions
4.9.2.1. Generic Commands
4.9.2.2. IS-IS Commands
4.10. Show, Clear, and Debug Command Reference
4.10.1. Command Hierarchies
4.10.1.1. Show Commands
4.10.1.2. Clear Commands
4.10.1.3. Debug Commands
4.10.1.4. Tools Commands
4.10.2. Command Descriptions
4.10.2.1. Show Commands
4.10.2.2. Clear Commands
4.10.2.3. Debug Commands
4.10.2.4. Tools Commands
5. BGP
5.1. BGP Overview
5.2. BGP Sessions
5.2.1. BGP Session States
5.2.2. Detecting BGP Session Failures
5.2.2.1. Peer Tracking
5.2.2.2. Bidirectional Forwarding Detection (BFD)
5.2.2.3. Fast External Failover
5.2.3. High Availability BGP Sessions
5.2.3.1. BGP Graceful Restart
5.2.3.2. BGP Long-Lived Graceful Restart
5.2.3.2.1. LLGR Operations
5.2.3.2.2. Receiving Routes with LLGR_STALE Community
5.2.4. BGP Session Security
5.2.4.1. TCP MD5 Authentication
5.2.4.2. TTL Security Mechanism
5.2.5. BGP Address Family Support for Different Session Types
5.2.6. BGP Groups
5.3. BGP Design Concepts
5.3.1. Route Reflection
5.3.2. BGP Confederations
5.4. BGP Messages
5.4.1. Open Message
5.4.1.1. Changing the Autonomous System Number
5.4.1.2. Changing a Confederation Number
5.4.1.3. BGP Advertisement
5.4.2. Update Message
5.4.3. Keepalive Message
5.4.4. Notification Message
5.4.4.1. UPDATE Message Error Handling
5.4.5. Route Refresh Message
5.5. BGP Path Attributes
5.5.1. Origin
5.5.2. AS Path
5.5.2.1. AS Override
5.5.2.2. Using Local AS for ASN Migration
5.5.2.3. 4-Octet Autonomous System Numbers
5.5.3. Next-Hop
5.5.3.1. Unlabeled IPv4 Unicast Routes
5.5.3.2. Unlabeled IPv6 Unicast Routes
5.5.3.3. VPN-IPv4 Routes
5.5.3.4. VPN-IPv6 Routes
5.5.3.5. Label-IPv4 Routes
5.5.3.6. Label-IPv6 Routes
5.5.3.7. Next-Hop Resolution
5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.5.3.8. Next-Hop Tracking
5.5.3.9. Next-Hop Indirection
5.5.3.10. Entropy Label for RFC 3107 BGP Labeled Routes
5.5.4. MED
5.5.4.1. Deterministic MED
5.5.5. Local Preference
5.5.6. Route Aggregation Path Attributes
5.5.7. Community Attributes
5.5.7.1. Standard Communities
5.5.7.2. Extended Communities
5.5.7.3. Large Communities
5.5.8. Route Reflection Attributes
5.5.9. Multi-Protocol BGP Attributes
5.5.10. 4-Octet AS Attributes
5.5.11. AIGP Metric
5.6. BGP Routing Information Base (RIB)
5.6.1. RIB-IN Features
5.6.1.1. BGP Import Policies
5.6.2. LOC-RIB Features
5.6.2.1. BGP Decision Process
5.6.2.1.1. Always Compare MED
5.6.2.1.2. Ignore Next-Hop Metric
5.6.2.2. BGP Route Installation in the Route Table
5.6.2.3. Weighted ECMP for BGP Routes
5.6.2.4. BGP Route Installation in the Tunnel Table
5.6.2.5. BGP Fast Reroute
5.6.2.5.1. Calculating Backup Paths
5.6.2.5.2. Failure Detection and Switchover to the Backup Path
5.6.2.6. QoS Policy Propagation via BGP (QPPB)
5.6.2.7. BGP Policy Accounting
5.6.2.8. Route Flap Damping (RFD)
5.6.3. RIB-OUT Features
5.6.3.1. BGP Export Policies
5.6.3.2. Outbound Route Filtering (ORF)
5.6.3.3. RT Constrained Route Distribution
5.6.3.4. Min Route Advertisement Interval (MRAI)
5.6.3.5. Advertise-Inactive
5.6.3.6. Best-External
5.6.3.7. Add-Paths
5.6.3.7.1. Path Selection with Add-Paths
5.6.3.8. Split-Horizon
5.7. BGP Monitoring Protocol
5.8. BGP Applications
5.8.1. BGP FlowSpec
5.8.1.1. Validating Received FlowSpec Routes
5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.2. Configuration of TTL Propagation for BGP Label Routes
5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.3. BGP Prefix Origin Validation
5.8.4. BGP Route Leaking
5.8.5. BGP Optimal Route Reflection
5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.8.7. BGP-LS
5.8.7.1. Supported BGP-LS components
5.8.8. BGP Segment Routing
5.9. BFD Support for BGP
5.10. BGP Configuration Process Overview
5.11. Configuration Notes
5.11.1. General
5.11.1.1. BGP Defaults
5.11.1.2. BGP MIB Notes
5.12. Configuring BGP with CLI
5.12.1. Configuration Overview
5.12.1.1. Preconfiguration Requirements
5.12.1.2. BGP Hierarchy
5.12.1.3. Internal and External BGP Configuration
5.12.1.4. Default External BGP Route Propagation Behavior without Policies
5.12.2. Basic BGP Configuration
5.12.3. Common Configuration Tasks
5.12.3.1. Creating an Autonomous System
5.12.3.2. Configuring a Router ID
5.12.3.3. BGP Confederations
5.12.3.4. BGP Router Reflectors
5.12.3.5. BGP Components
5.12.3.5.1. Configuring Group Attributes
5.12.3.5.2. Configuring Neighbor Attributes
5.12.3.5.3. Configuring Route Reflection
5.12.3.5.4. Configuring a Confederation
5.12.3.5.5. Configuring BMP
5.13. BGP Configuration Management Tasks
5.13.1. Modifying an AS Number
5.13.2. Modifying a Confederation Number
5.13.3. Modifying the BGP Router ID
5.13.4. Modifying the Router-Level Router ID
5.13.5. Deleting a Neighbor
5.13.6. Deleting Groups
5.14. BGP Command Reference
5.14.1. Command Hierarchies
5.14.1.1. Global BGP Commands
5.14.1.2. Group BGP Commands
5.14.1.3. Neighbor BGP Commands
5.14.1.4. BGP BMP Commands
5.14.1.5. Other BGP-Related Commands
5.14.2. Command Descriptions
5.14.2.1. Generic Commands
5.14.2.2. BGP Commands
5.14.2.3. BGP BMP Commands
5.14.2.4. Other BGP-Related Commands
5.15. Show, Clear, and Debug Command Reference
5.15.1. Command Hierarchies
5.15.1.1. Show Commands
5.15.1.2. Clear Commands
5.15.1.3. Debug Commands
5.15.2. Command Descriptions
5.15.2.1. Show Commands
5.15.2.2. Clear Commands
5.15.2.3. Debug Commands
6. Route Policies
6.1. Configuring Route Policies
6.1.1. Policy Statements
6.1.1.1. Policy Statement Chaining and Logical Expressions
6.1.1.2. Routing Policy Subroutines
6.1.1.3. Policy Evaluation Command
6.1.1.4. Exclusive Editing for Policy Configuration
6.1.1.5. Default Action Behavior
6.1.1.6. Denied IP Unicast Prefixes
6.1.1.7. Controlling Route Flapping
6.1.2. Regular Expressions
6.1.3. BGP and OSPF Route Policy Support
6.1.3.1. BGP Route Policies
6.1.3.2. Re-advertised Route Policies
6.1.3.3. Triggered Policies
6.1.3.4. Set MED to IGP Cost using Route Policies
6.1.3.5. BGP Policy Subroutines
6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.1.4. Routing Policy Parameterization
6.1.5. When to Use Route Policies
6.2. Route Policy Configuration Process Overview
6.3. Configuration Notes
6.3.1. General
6.3.2. Policy Reference Checks
6.3.2.1. Known Limitations
6.4. Configuring Route Policies with CLI
6.4.1. Route Policy Configuration Overview
6.4.1.1. When to Create Routing Policies
6.4.1.2. Default Route Policy Actions
6.4.1.3. Policy Evaluation
6.4.1.4. Damping
6.4.2. Basic Configurations
6.4.3. Configuring Route Policy Components
6.4.3.1. Beginning the Policy Statement
6.4.3.2. Creating a Route Policy
6.4.3.3. Configuring a Default Action
6.4.3.4. Configuring an Entry
6.4.3.5. Configuring a Community List
6.4.3.6. Configuring Damping
6.4.3.7. Configuring a Prefix List
6.5. Route Policy Configuration Management Tasks
6.5.1. Editing Policy Statements and Parameters
6.5.2. Deleting an Entry
6.5.3. Deleting a Policy Statement
6.6. Route Policy Command Reference
6.6.1. Command Hierarchies
6.6.1.1. Route Policy Configuration Commands
6.6.1.2. Segment Routing Commands
6.6.2. Command Descriptions
6.6.2.1. Generic Commands
6.6.2.2. Segment Routing
6.6.2.3. Route Policy Options
6.6.2.4. Route Policy Damping Commands
6.6.2.5. Route Policy Prefix Commands
6.6.2.6. Route Policy Entry Match Commands
6.6.2.7. Route Policy Action Commands
6.7. Show, and Clear Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.1.2. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
6.7.2.2. Clear Commands
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. RIP Overview
2.1.1. RIP Features
2.1.1.1. RIP Version Types
2.1.1.2. RIPv2 Authentication
2.1.1.3. RIP Packet Format
2.1.1.3.1. RIPv1 Format
2.1.1.3.2. RIPv2 Format
2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
2.2. RIPng
2.2.1. RIPng Protocol
2.3. Common Attributes
2.3.1. Metrics
2.3.2. Timers
2.3.3. Import and Export Policies
2.3.4. Hierarchical Levels
2.4. RIP Configuration Process Overview
2.5. Configuration Notes
2.5.1. General
2.6. Configuring RIP with CLI
2.6.1. RIP and RIPng Configuration Overview
2.6.1.1. Preconfiguration Requirements
2.6.1.2. RIP Hierarchy
2.6.2. Basic RIP Configuration
2.6.3. Common Configuration Tasks
2.6.3.1. Configuring Interfaces
2.6.3.2. Configuring a Route Policy
2.6.3.3. Configuring RIP Parameters
2.6.3.4. Configuring Global-Level Parameters
2.6.3.5. Configuring Group-Level Parameters
2.6.3.6. Configuring Neighbor-Level Parameters
2.7. RIP Configuration Management Tasks
2.7.1. Modifying RIP Parameters
2.7.2. Deleting a Group
2.7.3. Deleting a Neighbor
2.8. RIP Configuration Command Reference
2.8.1. Command Hierarchies
2.8.1.1. Configuration Commands
2.8.1.1.1. Group Commands
2.8.1.1.2. Neighbor Commands
2.8.1.2. RIPng Configuration Commands
2.8.1.2.1. Group Commands
2.8.1.2.2. Neighbor Commands
2.8.2. Command Descriptions
2.8.2.1. Generic Commands
2.8.2.2. RIP Commands
2.9. Show, Clear, and Debug Command Reference
2.9.1. Command Hierarchies
2.9.1.1. Show Commands
2.9.1.2. Clear Commands
2.9.1.3. Debug Commands
2.9.2. Command Descriptions
2.9.2.1. Show Commands
2.9.2.2. Clear Commands
2.9.2.3. Debug RIP Commands
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.1.3.7. Sham Links
3.1.2. OSPFv3 Authentication
3.1.3. OSPF Graceful Restart Helper
3.1.3.1. BFD Interaction with Graceful Restart
3.1.3.2. OSPFv3 Graceful Restart Helper
3.1.4. Virtual Links
3.1.5. Neighbors and Adjacencies
3.1.5.1. Broadcast and Point-to-Point Networks
3.1.5.2. Non-Broadcast Multi-Access (NBMA) Networks
3.1.6. Link-State Advertisements
3.1.7. Metrics
3.1.8. Authentication
3.1.9. IP Subnets
3.1.10. Preconfiguration Recommendations
3.1.11. Multiple OSPF Instances
3.1.11.1. Route Export Policies for OSPF
3.1.11.2. Preventing Route Redistribution Loops
3.1.12. Multi-Address Support for OSPFv3
3.1.13. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.1.13.1. IP FRR Configuration
3.1.13.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.13.2. ECMP Considerations
3.1.13.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.1.13.4. IP FRR and BGP Next Hop Resolution
3.1.13.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.1.13.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.1.13.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.1. Configuring a Route Next Hop Policy Template
3.2.1.1. Configuring Affinity or Admin Group Constraints
3.2.1.2. Configuring SRLG Group Constraints
3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.2.1.4. Configuring Protection Type and Next Hop Type Preferences
3.2.2. Application of Route Next Hop Policy Template to an Interface
3.2.3. Excluding Prefixes from LFA SPF
3.2.4. Modification to LFA Next Hop Selection Algorithm
3.2.5. Application of LFA Policy to a Segment Routing Node SID Tunnel
3.2.5.1. Modification to the Remote LFA Selection Algorithm
3.2.5.2. Modification to the TI-LFA Selection Algorithm
3.2.6. Application of LFA Policy to Adjacency SID Tunnel
3.2.7. Application of LFA Policy to Backup Node SID Tunnel
3.2.8. Configuration Example
3.3. LFA Protection Using Segment Routing Backup Node SID
3.3.1. Configuring LFA Using Backup Node SID in OSPF
3.3.2. Detailed Operation of LFA Protection Using Backup Node SID
3.3.3. Duplicate SID Handling
3.3.4. OSPF Control Plane Extensions
3.4. Segment Routing in Shortest Path Forwarding
3.4.1. OSPF Control Protocol Changes
3.4.2. Announcing ELC, MSD-ERLD and MSD-BMI with OSPF
3.4.3. Entropy Label for OSPF Segment Routing
3.4.4. IPv6 Segment Routing using MPLS Encapsulation in OSPFv3
3.4.4.1. OSPFv3 Extensions
3.4.5. Segment Routing Traffic Statistics
3.4.6. Class-Based Forwarding for SR-OSPF over RSVP-TE LSPs
3.5. Segment Routing Mapping Server
3.5.1. Segment Routing Mapping Server Prefix SID Resolution
3.6. OSPF Link TE Attribute Reuse
3.6.1. OSPF Application Specific TE Link Attributes
3.7. SPF LSA Filtering
3.8. FIB Prioritization
3.9. Extended LSA Support in OSPFv3
3.10. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
3.11. OSPF Configuration Process Overview
3.12. Configuration Notes
3.12.1. General
3.12.1.1. OSPF Defaults
3.13. Configuring OSPF with CLI
3.13.1. OSPF Configuration Guidelines
3.13.2. Basic OSPF Configurations
3.13.2.1. Configuring the Router ID
3.13.3. Configuring OSPF Components
3.13.3.1. Configuring OSPF Parameters
3.13.3.2. Configuring OSPF3 Parameters
3.13.3.3. Configuring an OSPF or OSPF3 Area
3.13.3.4. Configuring a Stub Area
3.13.3.5. Configuring a Not-So-Stubby Area
3.13.3.6. Configuring a Virtual Link
3.13.3.7. Configuring an Interface
3.13.3.8. Configuring Authentication
3.13.3.8.1. Overview
3.13.3.8.2. Configuring Authentication Keys and Algorithms
3.13.3.8.3. Configuring Authentication using Keychains
3.13.3.9. Assigning a Designated Router
3.13.3.10. Configuring Route Summaries
3.13.3.11. Configuring Route Preferences
3.13.4. Configuration Example of LFA Policy use in Remote LFA and TI-LFA
3.14. OSPF Configuration Management Tasks
3.14.1. Modifying a Router ID
3.14.2. Deleting a Router ID
3.14.3. Modifying OSPF Parameters
3.15. OSPF Configuration Command Reference
3.15.1. Command Hierarchies
3.15.1.1. Configuration Commands
3.15.2. Command Descriptions
3.15.2.1. Generic Commands
3.15.2.2. OSPF Global Commands
3.15.2.3. OSPF Area Commands
3.15.2.4. Interface/Virtual Link Commands
3.16. Show, Clear, and Debug Command Reference
3.16.1. Command Hierarchies
3.16.1.1. Show Commands
3.16.1.2. Clear Commands
3.16.1.3. Debug Commands
3.16.1.4. Tools Commands
3.16.2. Command Descriptions
3.16.2.1. Show Commands
3.16.2.2. Clear Commands
3.16.2.3. Debug Commands
3.16.2.4. Tools Commands
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.3.1. IS-IS PDU Configuration
4.1.3.2. IS-IS Operations
4.1.4. IS-IS Route Summarization
4.1.4.1. Partial SPF Calculation
4.1.5. IS-IS MT-Topology Support
4.1.5.1. Native IPv6 Support
4.1.6. IS-IS Administrative Tags
4.1.6.1. Setting Route Tags
4.1.6.2. Using Route Tags
4.1.6.3. Unnumbered Interface Support
4.1.7. Segment Routing in Shortest Path Forwarding
4.1.7.1. Configuring Segment Routing in Shortest Path
4.1.7.2. Announcing ELC, MSD-ERLD, and MSD-BMI with IS-IS
4.1.7.3. Segment Routing Operational Procedures
4.1.7.3.1. Prefix Advertisement and Resolution
4.1.7.3.2. Error and Resource Exhaustion Handling
4.1.7.4. Segment Routing Tunnel Management
4.1.7.4.1. Tunnel MTU Determination
4.1.7.5. Segment Routing Local Block
4.1.7.5.1. Bundling Adjacencies in Adjacency Sets
4.1.7.6. Entropy Label for IS-IS Segment Routing
4.1.7.7. Remote LFA with Segment Routing
4.1.7.8. Topology Independent LFA
4.1.7.8.1. TI-LFA Configuration
4.1.7.8.2. TI-LFA Link-Protect Operation
4.1.7.8.3. Data Path Support
4.1.7.9. Node Protection Support in TI-LFA and Remote LFA
4.1.7.9.1. Feature Configuration
4.1.7.9.2. TI-LFA Node-Protect Operation
4.1.7.9.3. Remote LFA Node-Protect Operation
4.1.7.9.4. TI-LFA and Remote LFA Node Protection Feature Interaction and Limitations
4.1.7.10. IPv6 Segment Routing using MPLS Encapsulation
4.1.7.10.1. IS-IS MT=0 Extensions
4.1.7.10.2. Service and Forwarding Contexts Supported
4.1.7.10.3. Services Using SDP with a SR IPv6 Tunnel
4.1.7.11. Data Path Support
4.1.7.11.1. Hash Label and Entropy Label Support
4.1.7.12. IS-IS Control Protocol Changes
4.1.7.12.1. IS-IS Control Protocol Changes
4.1.7.13. BGP Shortcut Using Segment Routing Tunnel
4.1.7.14. BGP Label Route Resolution Using Segment Routing Tunnel
4.1.7.15. Service Packet Forwarding with Segment Routing
4.1.7.16. Mirror Services and Lawful Intercept
4.1.7.17. Class-Based Forwarding for SR-ISIS over RSVP-TE LSPs
4.1.7.18. Segment Routing Traffic Statistics
4.1.8. Segment Routing Mapping Server Function for IPv4 Prefixes
4.1.8.1. Segment Routing Mapping Server
4.1.8.2. Prefix SID Resolution for Segment Routing Mapping Server
4.1.9. Micro-Loop Avoidance Using Loop-Free SR Tunnels (IS-IS)
4.1.9.1. Configuring Micro-loop Avoidance
4.1.9.2. Micro-Loop Avoidance Algorithm Steps
4.1.9.3. Micro-Loop Avoidance for Link Addition, Restoration, or Metric Decrease
4.1.9.4. Micro-Loop Avoidance for Link Removal, Failure, or Metric Increase
4.2. FIB Prioritization
4.3. IS-IS Graceful Restart Helper
4.3.1. BFD Interaction with Graceful Restart
4.4. IS-IS Configuration Process Overview
4.5. Configuration Notes
4.5.1. General
4.6. Configuring IS-IS with CLI
4.6.1. IS-IS Configuration Overview
4.6.1.1. Router Levels
4.6.1.2. Area Address Attributes
4.6.1.3. Interface Level Capacity
4.6.1.4. Route Leaking
4.6.2. Basic IS-IS Configuration
4.6.3. Common Configuration Tasks
4.6.4. Configuring IS-IS Components
4.6.4.1. Enabling IS-IS
4.6.4.2. Modifying Router-Level Parameters
4.6.4.3. Configuring ISO Area Addresses
4.6.4.4. Configuring Global IS-IS Parameters
4.6.4.5. Migration to IS-IS Multi-Topology
4.6.4.6. Configuring Interface Parameters
4.6.4.6.1. Example: Configuring a Level 1 Area
4.6.4.6.2. Example: Modifying a Router’s Level Capability
4.6.4.7. Configuring IS-IS Link Groups
4.7. IS-IS Configuration Management Tasks
4.7.1. Disabling IS-IS
4.7.2. Removing IS-IS
4.7.3. Modifying Global IS-IS Parameters
4.7.4. Modifying IS-IS Interface Parameters
4.7.5. Configuring Authentication using Keychains
4.7.6. Configuring Leaking
4.7.7. Redistributing External IS-IS Routers
4.7.8. Specifying MAC Addresses for All IS-IS Routers
4.8. Configuring IS-IS for Flexible Algorithms
4.8.1. Configuring the Flexible Algorithm Definition
4.8.2. Configuring IS-IS Flex-Algorithm Participation
4.8.3. Configuring IS-IS Flex-Algorithm Prefix Node SID
4.8.4. Verifying Basic Flex-Algorithm Behavior
4.8.5. Configuration and Usage Considerations for Flex-Algorithms
4.9. IS-IS Configuration Command Reference
4.9.1. Command Hierarchies
4.9.1.1. Configuration Commands
4.9.2. Command Descriptions
4.9.2.1. Generic Commands
4.9.2.2. IS-IS Commands
4.10. Show, Clear, and Debug Command Reference
4.10.1. Command Hierarchies
4.10.1.1. Show Commands
4.10.1.2. Clear Commands
4.10.1.3. Debug Commands
4.10.1.4. Tools Commands
4.10.2. Command Descriptions
4.10.2.1. Show Commands
4.10.2.2. Clear Commands
4.10.2.3. Debug Commands
4.10.2.4. Tools Commands
5. BGP
5.1. BGP Overview
5.2. BGP Sessions
5.2.1. BGP Session States
5.2.2. Detecting BGP Session Failures
5.2.2.1. Peer Tracking
5.2.2.2. Bidirectional Forwarding Detection (BFD)
5.2.2.3. Fast External Failover
5.2.3. High Availability BGP Sessions
5.2.3.1. BGP Graceful Restart
5.2.3.2. BGP Long-Lived Graceful Restart
5.2.3.2.1. LLGR Operations
5.2.3.2.2. Receiving Routes with LLGR_STALE Community
5.2.4. BGP Session Security
5.2.4.1. TCP MD5 Authentication
5.2.4.2. TTL Security Mechanism
5.2.5. BGP Address Family Support for Different Session Types
5.2.6. BGP Groups
5.3. BGP Design Concepts
5.3.1. Route Reflection
5.3.2. BGP Confederations
5.4. BGP Messages
5.4.1. Open Message
5.4.1.1. Changing the Autonomous System Number
5.4.1.2. Changing a Confederation Number
5.4.1.3. BGP Advertisement
5.4.2. Update Message
5.4.3. Keepalive Message
5.4.4. Notification Message
5.4.4.1. UPDATE Message Error Handling
5.4.5. Route Refresh Message
5.5. BGP Path Attributes
5.5.1. Origin
5.5.2. AS Path
5.5.2.1. AS Override
5.5.2.2. Using Local AS for ASN Migration
5.5.2.3. 4-Octet Autonomous System Numbers
5.5.3. Next-Hop
5.5.3.1. Unlabeled IPv4 Unicast Routes
5.5.3.2. Unlabeled IPv6 Unicast Routes
5.5.3.3. VPN-IPv4 Routes
5.5.3.4. VPN-IPv6 Routes
5.5.3.5. Label-IPv4 Routes
5.5.3.6. Label-IPv6 Routes
5.5.3.7. Next-Hop Resolution
5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.5.3.8. Next-Hop Tracking
5.5.3.9. Next-Hop Indirection
5.5.3.10. Entropy Label for RFC 3107 BGP Labeled Routes
5.5.4. MED
5.5.4.1. Deterministic MED
5.5.5. Local Preference
5.5.6. Route Aggregation Path Attributes
5.5.7. Community Attributes
5.5.7.1. Standard Communities
5.5.7.2. Extended Communities
5.5.7.3. Large Communities
5.5.8. Route Reflection Attributes
5.5.9. Multi-Protocol BGP Attributes
5.5.10. 4-Octet AS Attributes
5.5.11. AIGP Metric
5.6. BGP Routing Information Base (RIB)
5.6.1. RIB-IN Features
5.6.1.1. BGP Import Policies
5.6.2. LOC-RIB Features
5.6.2.1. BGP Decision Process
5.6.2.1.1. Always Compare MED
5.6.2.1.2. Ignore Next-Hop Metric
5.6.2.2. BGP Route Installation in the Route Table
5.6.2.3. Weighted ECMP for BGP Routes
5.6.2.4. BGP Route Installation in the Tunnel Table
5.6.2.5. BGP Fast Reroute
5.6.2.5.1. Calculating Backup Paths
5.6.2.5.2. Failure Detection and Switchover to the Backup Path
5.6.2.6. QoS Policy Propagation via BGP (QPPB)
5.6.2.7. BGP Policy Accounting
5.6.2.8. Route Flap Damping (RFD)
5.6.3. RIB-OUT Features
5.6.3.1. BGP Export Policies
5.6.3.2. Outbound Route Filtering (ORF)
5.6.3.3. RT Constrained Route Distribution
5.6.3.4. Min Route Advertisement Interval (MRAI)
5.6.3.5. Advertise-Inactive
5.6.3.6. Best-External
5.6.3.7. Add-Paths
5.6.3.7.1. Path Selection with Add-Paths
5.6.3.8. Split-Horizon
5.7. BGP Monitoring Protocol
5.8. BGP Applications
5.8.1. BGP FlowSpec
5.8.1.1. Validating Received FlowSpec Routes
5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.2. Configuration of TTL Propagation for BGP Label Routes
5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.3. BGP Prefix Origin Validation
5.8.4. BGP Route Leaking
5.8.5. BGP Optimal Route Reflection
5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.8.7. BGP-LS
5.8.7.1. Supported BGP-LS components
5.8.8. BGP Segment Routing
5.9. BFD Support for BGP
5.10. BGP Configuration Process Overview
5.11. Configuration Notes
5.11.1. General
5.11.1.1. BGP Defaults
5.11.1.2. BGP MIB Notes
5.12. Configuring BGP with CLI
5.12.1. Configuration Overview
5.12.1.1. Preconfiguration Requirements
5.12.1.2. BGP Hierarchy
5.12.1.3. Internal and External BGP Configuration
5.12.1.4. Default External BGP Route Propagation Behavior without Policies
5.12.2. Basic BGP Configuration
5.12.3. Common Configuration Tasks
5.12.3.1. Creating an Autonomous System
5.12.3.2. Configuring a Router ID
5.12.3.3. BGP Confederations
5.12.3.4. BGP Router Reflectors
5.12.3.5. BGP Components
5.12.3.5.1. Configuring Group Attributes
5.12.3.5.2. Configuring Neighbor Attributes
5.12.3.5.3. Configuring Route Reflection
5.12.3.5.4. Configuring a Confederation
5.12.3.5.5. Configuring BMP
5.13. BGP Configuration Management Tasks
5.13.1. Modifying an AS Number
5.13.2. Modifying a Confederation Number
5.13.3. Modifying the BGP Router ID
5.13.4. Modifying the Router-Level Router ID
5.13.5. Deleting a Neighbor
5.13.6. Deleting Groups
5.14. BGP Command Reference
5.14.1. Command Hierarchies
5.14.1.1. Global BGP Commands
5.14.1.2. Group BGP Commands
5.14.1.3. Neighbor BGP Commands
5.14.1.4. BGP BMP Commands
5.14.1.5. Other BGP-Related Commands
5.14.2. Command Descriptions
5.14.2.1. Generic Commands
5.14.2.2. BGP Commands
5.14.2.3. BGP BMP Commands
5.14.2.4. Other BGP-Related Commands
5.15. Show, Clear, and Debug Command Reference
5.15.1. Command Hierarchies
5.15.1.1. Show Commands
5.15.1.2. Clear Commands
5.15.1.3. Debug Commands
5.15.2. Command Descriptions
5.15.2.1. Show Commands
5.15.2.2. Clear Commands
5.15.2.3. Debug Commands
6. Route Policies
6.1. Configuring Route Policies
6.1.1. Policy Statements
6.1.1.1. Policy Statement Chaining and Logical Expressions
6.1.1.2. Routing Policy Subroutines
6.1.1.3. Policy Evaluation Command
6.1.1.4. Exclusive Editing for Policy Configuration
6.1.1.5. Default Action Behavior
6.1.1.6. Denied IP Unicast Prefixes
6.1.1.7. Controlling Route Flapping
6.1.2. Regular Expressions
6.1.3. BGP and OSPF Route Policy Support
6.1.3.1. BGP Route Policies
6.1.3.2. Re-advertised Route Policies
6.1.3.3. Triggered Policies
6.1.3.4. Set MED to IGP Cost using Route Policies
6.1.3.5. BGP Policy Subroutines
6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.1.4. Routing Policy Parameterization
6.1.5. When to Use Route Policies
6.2. Route Policy Configuration Process Overview
6.3. Configuration Notes
6.3.1. General
6.3.2. Policy Reference Checks
6.3.2.1. Known Limitations
6.4. Configuring Route Policies with CLI
6.4.1. Route Policy Configuration Overview
6.4.1.1. When to Create Routing Policies
6.4.1.2. Default Route Policy Actions
6.4.1.3. Policy Evaluation
6.4.1.4. Damping
6.4.2. Basic Configurations
6.4.3. Configuring Route Policy Components
6.4.3.1. Beginning the Policy Statement
6.4.3.2. Creating a Route Policy
6.4.3.3. Configuring a Default Action
6.4.3.4. Configuring an Entry
6.4.3.5. Configuring a Community List
6.4.3.6. Configuring Damping
6.4.3.7. Configuring a Prefix List
6.5. Route Policy Configuration Management Tasks
6.5.1. Editing Policy Statements and Parameters
6.5.2. Deleting an Entry
6.5.3. Deleting a Policy Statement
6.6. Route Policy Command Reference
6.6.1. Command Hierarchies
6.6.1.1. Route Policy Configuration Commands
6.6.1.2. Segment Routing Commands
6.6.2. Command Descriptions
6.6.2.1. Generic Commands
6.6.2.2. Segment Routing
6.6.2.3. Route Policy Options
6.6.2.4. Route Policy Damping Commands
6.6.2.5. Route Policy Prefix Commands
6.6.2.6. Route Policy Entry Match Commands
6.6.2.7. Route Policy Action Commands
6.7. Show, and Clear Command Reference
6.7.1. Command Hierarchies
6.7.1.1. Show Commands
6.7.1.2. Clear Commands
6.7.2. Command Descriptions
6.7.2.1. Show Commands
6.7.2.2. Clear Commands
7. Standards and Protocol Support
Customer Document and Product Support