7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress counter parameters for this custom record.
The no form of this command reverts to the default.
All
This command configures egress counter parameters for this custom record.
The no form of this command reverts all egress counters to their default value.
e-counters
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
Commands in this context configure E-1 parameters. E-1 is a basic time division multiplexing scheme used to carry digital circuits. It is also a standard WAN digital communication format designed to operate over copper facilities at a rate of 2.048 Mb/s.
North America uses the T-Carrier system while Europe uses the E-Carrier system of transmission, using multiples of the DS system. Digital signals are carried inside the carrier systems.
The no form of this command disables E-1 capabilities.
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command defines the end-to-end recovery type for the gLSP. This is the recovery model between the source and terminating UNI-C nodes of the GMPLS LSP.
The no form of this command removes any configured end-to-end recovery, and the GMPLS LSP becomes unprotected.
e2e-protection-type unprotected
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
Commands in this context configure E-3 parameters. E-3 lines provide a speed of 44.736 Mb/s and is also frequently used by service providers. E-3 lines carry 16 E-1 signals with a data rate of 34.368 Mb/s.
An E-3 connection typically supports data rates of about 43 Mb/s. An E-3 line actually consists of 672 individual channels, each supporting 64 kb/s. E-3 lines are used mainly by Service Providers to connect to the Internet backbone and for the backbone itself.
Depending on the MDA type, the E-3 parameters must be disabled if clear channel is enabled by default (for example, on the m12-ds3e3 MDA). Clear channel is a channel that uses out-of-band signaling, not in-band signaling, so the channel's entire bit rate is available. Channelization must be explicitly specified. Note that if E-3 nodes are provisioned on the channelized SONET/SDH MDA you must provision the parent STS-1 SONET/STM0 SDH path first.
North America uses the T-Carrier system while Europe uses the E-Carrier system of transmission, using multiples of the DS system. Digital signals are carried inside the carrier systems.
The no form of this command disables E-3 capabilities.
VSR
This command configures the length of EA bits in the MAP rule. The no ea-length statement sets the ea-length to 0.
no ea-length
All
The EAPoL destination MAC address uses a destination multicast MAC address of 01:80:C2:00:00:03. Some networks cannot tunnel this packet over the network and consume these packets, causing the MKA session to fail. This command can change the destination MAC of the EAPoL to the unicast address of the MACsec peer, and as such, the EAPoL and MKA signaling will be unicasted between two peers.
The no form of this command returns the value to the default.
no eapol-destination-address
All
This command configures the default import and export policy behavior for EBGP neighbors.
The no form of this command removes the default import and export policy behavior.
no ebgp-default-reject-policy
All
This command configures the default import and export policy behavior for EBGP neighbors.
The no form of this command removes the default import and export policy behavior.
no ebgp-default-reject-policy
All
This command instructs the BGP decision process to ignore the difference between EBGP and IBGP routes in selecting the best path and eligible multipaths (if multipath and ECMP are enabled). The result is a form of EIBGP load-balancing in a multipath scenario.
By default (with the no form of this command), the BGP decision process prefers an EBGP learned route over an IBGP learned route.
The behavior can be applied selectively to only certain types of routes by specifying one or more address family names in the command. If no families are specified, the command applies to IPv4 and IPv6 routes, and VPN-IPv4 and VPN-IPv6 routes.
no ebgp-ibgp-equal
All
This command instructs the BGP decision process to ignore the difference between EBGP and IBGP routes in selecting the best path and eligible multipaths (if multipath and ECMP are enabled). The result is a form of EIBGP load-balancing in a multipath scenario.
By default (with the no form of this command), the BGP decision process prefers an EBGP learned route over an IBGP learned route.
The behavior can be applied selectively to only certain types of routes by specifying one or more address family names in the command. If no families are specified, the command applies to IPv4, IPv6, label-IPv4, label-IPv6, VPN-IPv4, and VPN-IPv6 routes.
no ebgp-ibgp-equal
All
This command allows the user to enter the context to configure ECDSA public keys.
All
This command creates an ECDSA public key and associates it with the username. Multiple public keys can be associated with the user. The key ID is used to identify these keys for the user.
This command echoes arguments on the command line. The primary use of this command is to allow messages to be displayed to the screen in files executed with the exec command.
All
This command configures the Echo Request interval for monitoring the OpenFlow control channels to the controllers for this OpenFlow switch instance.
The no form of this command restores default value.
echo-interval 10
All
This command configures the number of consecutive Echo Reply messages that must be lost to declare OF control channel down.
The no form of this command restores default value.
echo-multiple 3
All
This command sets the minimum echo receive interval, in milliseconds, for a session. This is not used by a BFD session for MPLS-TP.
The no form of this command reverts to the default value.
echo-receive 100
All
When configured in a VPLS service, this command controls the number of paths that are allowed to reach a specified MAC address when that MAC in the FDB is associated to a remote all-active multi-homed ES.
The configuration of two or more ECMP paths to a specified MAC enables the aliasing function described in RFC 7432.
When used in an Epipe service, this command controls the number of paths that are allowed to reach a specified remote Ethernet tag that is associated to an ES destination.
ecmp 1
All
This command configures the maximum number of tunnels that may be used as ECMP next-hops for the VPRN. This value overrides any values that are configured using the config>service>vprn>ecmp command.
The no form of this command removes the configured overriding value, and the value configured using the config>service>vprn>ecmp command is used.
ecmp 1
All
This command enables ECMP and configures the number of routes for path sharing; for example, the value 2 means two equal cost routes will be used for cost sharing.
ECMP can only be used for routes learned with the same preference and same protocol.
When more ECMP routes are available at the best preference than configured in max-ecmp-routes, then the lowest next-hop IP address algorithm is used to select the number of routes configured in max-ecmp-routes.
The no form of this command disables ECMP path sharing. If ECMP is disabled and multiple routes are available at the best preference and equal cost, then the route with the lowest next-hop IP address is used.
no ecmp
All
This command enables equal-cost multipath (ECMP) and configures the number of routes for path sharing. For example, the value of 2 means that 2 equal cost routes are used for cost sharing.
ECMP groups form when the system routes to the same destination with equal cost values. Routing table entries can be entered manually (as static routes), or they can be formed when neighbors are discovered and routing table information is exchanged by routing protocols. The system can balance traffic across the groups with equal costs.
ECMP can only be used for routes learned with the same preference and same protocol. See the discussion on preferences in the application6 command.
When more ECMP routes are available at the best preference than configured by the max-ecmp-routes parameter, then the lowest next-hop IP address algorithm is used to select the number of routes configured.
The no form of this command disables ECMP path sharing. If ECMP is disabled and multiple routes are available at the best preference and equal cost, the newly updated route is used.
no ecmp
All
This command defines the preference level threshold where multicast ECMP path management can dynamically optimize channels based on topology or bandwidth events. If the channels preference is equal to or less than the ecmp-opt-threshold, ECMP can move the channel between ECMP paths when bandwidth distribution events happen. Channels with a preference level higher than the threshold are moved during these events.
The default ECMP optimization limit threshold is 7. This means that multicast channels with a preference level of 0 to 7 (all channels) are allowed to move between ECMP paths. The ecmp-opt-threshold command can be used to change the default threshold.
Changing the threshold causes all channels ECMP optimization eligibility to be reevaluated.
The no form of this command restores the default ECMP optimization preference threshold value.
ecmp-opt-threshold 7
All
This command relaxes the constraint that ECMP multipaths must have the same IGP cost to reach the BGP next-hop. When VPN routes for the same IP prefix are imported into a VPRN service, they are eligible to be used as multipaths. The resulting route is programmed as an ECMP IP route.
The BGP best path selection algorithm is the basis for choosing the set of imported VPN routes that can be combined to form an ECMP route. Normally (unless an ignore-nh-metric command is configured), the BGP decision process gives higher preference to VPN routes with a lower next-hop cost if other, more significant criteria, are tied. In these circumstances, a VPN route cannot be an eligible multipath if it does not have the same next-hop cost as the best VPN route. Configuring this command removes this restriction and allows the multipaths to have different (meaning lower) next-hop costs than the best route. This broadens the applicability of multipath and can result in better load balancing in the network.
This command applies only to the following types of routes imported by a VPRN.
The no form of this command restores the default behavior that requires next-hop costs of multipaths to be equal, unless the next-hop cost is completely removed from the BGP decision process.
ecmp-unequal-cost
All
This command configures the ect-algorithm associated with a FID. Names are:
The algorithm for low-path-id chooses the path with the lowest metric and uses the sum of each Bridge-ID to break-ties (in this case preferring the lowest bridge identifiers).
The algorithm for high-path-id choose the path with the lowest metric and the sum of each Bridge-ID (after each one is modified by the algorithm mask) to break-ties (in this case preferring the highest bridge identifiers).
A Forwarding Identifier (FID) is an abstraction of the IEEE 802.1 SPB Base VID and represents the VLAN (B-VPLS) in IS-IS LSPs. B-VPLS services with the same FID share B-MACs and I-SIDs. (the SAP encapsulation VLAN tag may be set to the same value as the FID or to any other valid VLAN tag). One or more FIDs can be associated with an ECT-algorithm by using the FID range. User B-VPLS services may share the same FID as the control B-VPLS or use independent FIDs where each FID has an assigned ect-algorithm. B-VPLS services with i-vpls services must have an independent FID. B-VPLS services with only PBB Epipes may share FIDs with other B-VPLS services including the control B-VPLS service.
The ect-algorithm is associated with the FID and can only be changed only when there are no VPLS, SAPs or SDP bindings associated with the FID. The FID must be independent from the FID assigned to other services.
ect-algorithm fid-range 1-4095 low-path-id
All
This command configures the SAP or SDP as an edge or non-edge port. If auto-edge is enabled for the SAP, this value will be used only as the initial value.
Note: The function of the edge-port command is similar to the rapid-start command. It tells RSTP that it is on the edge of the network (for example, there are no other bridges connected to that port) and, as a consequence, it can immediately transition to a forwarding state if the port becomes available. |
RSTP, however, can detect that the actual situation is different from what edge-port may indicate.
Initially, the value of the SAP or spoke-SDP parameter is set to edge-port. This value will change if:
The no form of this command returns the edge port setting to the default value.
no edge-port
All
This command configures the SAP or SDP as an edge or non-edge port. If auto-edge is enabled for the SAP, this value will be used only as the initial value.
Note: On the 7750 SR and the 7950 XRS, the function of the edge-port command is similar to the rapid-start command. It tells RSTP that it is on the edge of the network (for example, there are no other bridges connected to that port) and, as a consequence, it can immediately transition to a forwarding state if the port becomes available. |
RSTP, however, can detect that the actual situation is different from what edge-port may indicate.
Initially, the value of the SAP or spoke SDP parameter is set to edge-port. This value will change if:
The no form of this command returns the edge port setting to the default value.
no edge-port
All
This command enables the edit-cfg mode where changes can be made to the candidate configuration and sets the edit-point to the end of the candidate. In edit-cfg mode the CLI prompt contains edit-cfg near the root of the prompt. Commands in the candidate CLI branch, except candidate edit, are available only when in edit-cfg mode.
All
This command enables Ethernet in the First Mile (EFM) OAM tests loopback tests on the specified port. The EFM OAM remote loopback OAMPDU is sent to the peering device to trigger remote loopback.
When EFM OAM is disabled or shutdown on a port, the dying gasp flag for the OAMPDU is set for the OAMPDUs sent to the peer. This speeds up the peer loss detection time.
Note: On the 7950 XRS, The XMA ID takes the place of the MDA. |
port-id | slot/mda/port [.channel] | ||
eth-sat-id | esat-id/slot/port | ||
esat | keyword | ||
id | 1 to 20 | ||
pxc-id | pxc-id.sub-port | ||
pxc | keyword | ||
id | 1 to 64 | ||
sub-port | a, b |
For EFM OAM tunneling to function properly, EFM OAM tunneling should be configured for VLL services or a VPLS service with two SAPs only.
All
This command configures EFM-OAM attributes.
All
This command specifies whether to include the source address or destination address or both in the LAG/ECMP hash on IP interfaces. Additionally, when l4-load-balancing is enabled, the command also applies to the inclusion of source/destination port in the hash inputs.
The no form of this command includes both source and destination parameters.
no egr-ip-load-balancing
All
This command specifies whether to include the source address or destination address or both in the LAG/ECMP hash on IP interfaces. Additionally, when l4-load-balancing is enabled, the command also applies to the inclusion of source/destination port in the hash inputs.
The no form of this command includes both source and destination parameters.
no egr-ip-load-balancing
All
This command specifies whether to include source address or destination address or both in LAG/ECMP hash on IP interfaces. Additionally, when l4-load-balancing is enabled the command applies also to inclusion of source/destination port in the hash inputs.
The no form of this command includes both source and destination parameters.
no egr-ip-load-balancing
All
The egr-percentage-of-rate command increases or decreases the active bandwidth associated with the egress port that affects the amount of egress buffer space managed by the port. Changing a ports active bandwidth using the egr-percentage-of-rate command is an effective means of artificially lowering the buffers managed by one egress port and giving them to other egress ports on the same MDA.
The egr-percentage-of-rate command accepts a percentage value that increases or decreases the active bandwidth based on the defined percentage. A value of 50% causes the active bandwidth to be reduced by 50%. A value of 150% causes the active bandwidth to be increased by 50%. Values from 1 to 1000 percent are supported.
A value of 100 (the default value) is equivalent to executing the no egr-percentage-of-rate command and restores the egress active rate to the normal value.
The no form of this command removes any artificial increase or decrease of the egress active bandwidth used for egress buffer space allocation to the port. The no egr-percentage-of-rate command sets the egress rate percentage to 100%.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
All
This command configures the static destination VTEP IP used when originating VXLAN packets for the service.
All
This command configures the sharing of the egress buffers allocated to a hybrid port among the access and network contexts. By default, it is split equally between network and access.
The no form of this command reverts to the default values for the egress access and network weights.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress ANCP policy parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress policies for Managed SAPs (MSAPs).
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress SDP parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command configures an SDP context.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress parameters for the SLA profile.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
Commands in this context configure egress Quality of Service (QoS) policies and filter policies.
If no QoS policy is defined, the system default QoS policy is used for egress processing. If no egress filter is defined, no filtering is performed.
All
Commands in this context configure egress filter policies.
If no sap-egress QoS policy is defined, the system default sap-egress QoS policy is used for egress processing. If no egress filter is defined, no filtering is performed.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
Commands in this context configure egress SDP parameters.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
Commands in this context configure egress ATM attributes for the SAP.
All
This command configures Ethernet access egress port parameters.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress QoS parameters for wlan-gw tunnels.
All
Commands in this context configure egress buffer pool parameters which define the percentage of the pool buffers that are used for CBS calculations and specify the slope policy that is configured in the config>qos>slope-policy context.
On the MDA level, network and access egress pools are only allocated on channelized MDAs.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables access to the egress fp CLI context.
All
This command configures Ethernet egress port parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
Commands in this context configure the egress QoS profile for an MLFR bundle or a Frame Relay port with FRF.12 UNI/NNI fragmentation enabled.
7450 ESS, 7750 SR-7/12/12e
Commands in this context configure egress MLPPP QoS profile parameters for the multilink bundle.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
Commands in this context configure egress traffic attributes for the ILMI link.
All
Commands in this context configure PW port egress side parameters.
All
This command enters egress configuration context for the vport.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
This command configures egress ATM attributes for the SAP.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
All
Commands in this context configure egress SAP parameters.
If no sap-egress QoS policy is defined, the system default sap-egress QoS policy is used for egress processing.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
All
This command configures the egress SDP context.
All
Commands in this context configure PW-port egress-side parameters
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress filter policies.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
All
The egress node under the vpls binding is used to define the optional sap-egress QoS policy that will be used for reclassifying the egress forwarding class or profile for routed packets associated with the IP interface on the attached VPLS or I-VPLS service context.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
Commands in this context configure egress ATM attributes for the SAP.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
All
Commands in this context configure egress network filter policies for the interface.
All
Commands in this context configure egress SAP Quality of Service (QoS) policies and filter policies.
If no sap-egress QoS policy is defined, the system default sap-egress QoS policy is used for egress processing. If no egress filter is defined, no filtering is performed.
All
The egress node under the vpls binding is used to define the optional sap-egress QoS policy that will be used for reclassifying the egress forwarding class or profile for routed packets associated with the IP interface on the attached VPLS service context.
All
Commands in this context configure egress network filter policies for the interface.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure egress parameters.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
7450 ESS, 7750 SR-7/12/12e
Commands in this context configure egress parameters for the service’s video SAP.
All
Commands in this context configure spoke SDP egress parameters.
All
This command enables access to the context to associate an egress SAP Quality of Service (QoS) policy with a mirror destination SAP.
If no QoS policy is defined, the system default SAP egress QoS policy is used for egress processing.
All
This command is used to enter the CLI node that creates or edits egress policy entries that specify the forwarding class queues to be instantiated when this policy is applied to the network port.
The forwarding class and profile state mapping to in- and out-of-profile DiffServ Code Points (DSCPs), dot1p, and MPLS EXP bits mapping for all labeled packets are also defined in this context.
All service packets are aggregated into DiffServ-based egress queues on the network interface. The service packets are transported either with IP GRE encapsulation or over a MPLS LSP. The exception is with the IES service. In this case, the actual customer IP header has the DSCP field mapped.
All out-of-profile service packets are marked with the corresponding out-of-profile DSCP, dot1p, or the EXP bit value at network egress. All the in-profile service ingress packets are marked with the corresponding in-profile DSCP, dot1p, or EXP bit value based on the forwarding class to which they belong. The exceed-profile traffic is marked with the same value as out-of-profile traffic and the inplus-profile traffic is marked with the same value as in-profile traffic.
All
Commands in this context configure QoS egress queue groups. Egress queue group templates can be applied to egress Ethernet ports to create an egress queue group.
All
This command enables access to the context to configure egress network filter policies for the IP interface. If an egress filter is not defined, no filtering is performed.
All
Commands in this context configure the egress node associate an existing scheduler policy name with the customer site. The egress node is an entity to associate commands that complement the association.
All
Commands in this context configure spoke SDP binding egress filter parameters.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
Commands in this context configure MSAP ATM egress parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure subscriber profile egress setting parameters.
7750 SR, 7750 SR-s, 7950 XRS
This command configures the egress counter map for sFlow. The map must be configured so sFlow agent understands how to interpret data collected against SAP queues and policers. Multiple queues and policers can be mapped to the same traffic-type using separate line entries.
The no form of this command deletes a SAP policy queue/policer from the map.
All
This command configures the forwarding class to be used by the egress QoS processing. It overrides the forwarding class determined by ingress classification but not the QoS Policy Propagation via BGP.
The forwarding class and/or forwarding subclass can be overridden.
The new egress forwarding class is applicable to both SAP egress and network egress.
no egress-fc
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure the egress IP filter parameters.
The no form of this command reverts to the default.
egress-ip-filter-entries
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure the egress IPv6 filter parameters.
The no form of this command reverts to the default.
egress-ipv6-filter-entries
All
This command specifies that the configured PBR action is applicable to egress processing. The command should only be enabled in ACL policies used by residential subscribers. Enabling egress-pbr on filters not deployed for residential subscribers is not blocked but may lead to unexpected behavior and should be avoided.
The no form of this command removes the egress-pbr designation of the filter entry's action.
no egress-pbr
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies the egress policer applied to all UEs corresponding to default vlan-range (such as, group-interface) or the specified vlan-range. The policer can be created in the config>subscr-mgmt>isa-policer context. The egress policer can be overridden per UE from RADIUS via access-accept or COA.
The no form of this command reverts to the default.
All
Commands in this context configure Ethernet network egress port queue override parameters.
All
This command configures the rate of traffic leaving the network. The configured sub-rate uses packet-based accounting. An event log is generated each time the egress rate is modified unless the port is part of a LAG.
The no form of this command returns the value to the default.
no egress-rate
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command specifies the egress-rate modification that is to be applied.
The no form of this command reverts to the default value.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command is used to apply HQoS Adjustment to a subscriber. HQoS Adjustment is needed when multicast traffic flow for the subscriber is dissociated from subscriber host queues. Multicast redirection is typical such case although it can be applied in direct IPoE subscriber per-sap replication mode.
The channel bandwidth definition policy is defined in the mcac policy under the config>router>mcac>policy context. The policy is applied under the redirected interface or under the group-interface.
In order for HQoS Adjustment to take effect, sub-mcac-policy must be in a no shutdown mode and applied under the sub-profile even if mcac is not deployed.
The no form of this command reverts to the default value.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the egress rate modification.
The no form of this command removes the values from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command applies HQoS Adjustment to a Vport. HQoS Adjustment refers to the dynamic adjustment of the rate limit at an QoS enforcement point within a Nokia router when the multicast traffic stream is disjointed from the unicast traffic stream. This QoS enforcement point within the router represents the physical point further down in the access part of the network where the two streams join each other and potentially can cause congestion.
An example would be a PON port which is shared amongst subscriber’s multicast traffic (single copy of each channel) and subscriber’s unicast traffic. The bandwidth control point for this PON port resides in the upstream Nokia BNG node in the form of a Vport. In the case where the multicast delivery method of the BNG utilizes redirection, the multicast traffic in the BNG will flow outside of the subscriber or the Vport context and thus will bypass any bandwidth enforcement in the Nokia router. To correct this, a Vport bandwidth adjustment is necessary in the router that will account for the multicast bandwidth consumption that is bypassing Vport in the router but is present in the PON port whose bandwidth is controlled by Vport.
An estimate of the multicast bandwidth consumption on the PON port can be made at the Vport level based on the IGMP messages sourced from the subscribers behind the PON port. This process is called HQoS Adjustment.
A multicast channel bandwidth is subtracted from or added to the Vport rate limit according to the received IGMP Join/Leave messages and the channel bandwidth definition policy associated with the Vport (indirectly through a group-interface). Since the multicast traffic on the PON port is shared amongst subscribers behind this PON port, only the first IGMP Join or the last IGMP Leave per multicast channel is tracked for the purpose of the Vport bandwidth modification.
The Vport rate that will be affected by this functionality depends on the configuration:
The channel bandwidth definition policy is defined in the mcac policy in the config>router>mcac>policy context. The policy is applied under the group-interface or in case of redirection under the redirected-interface.
The rates in effect can be displayed with the following two commands:
The configuration of a scheduler policy under a Vport, which is only applicable to Ethernet interfaces, is mutually exclusive with the configuration of the egress-rate-modify parameter.
Context: HQoS Adjustment for Vport is disabled.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
All
This command applies egress scheduler overrides. When a port scheduler is associated with an egress port, it is possible to override the following parameters:
See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Quality of Service Guide for command syntax and usage for the port-scheduler-policy command.
The no form of this command removes all override parameters from the egress port or channel scheduler context. Once removed, the port scheduler reverts all rate parameters back to the parameters defined on the port-scheduler-policy associated with the port.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command references a port scheduler policy that is defined under the config>qos>port-scheduler-policy> hierarchy. Port schedulers are instantiated on carrier IOMs towards all ISAs that are part of the lns-group.
The no form of the command removes the port scheduler policy from the configuration.
no egress-scheduler-policy
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
All
This command enables the provisioning of an existing port-scheduler-policy to a port or channel.
The egress-scheduler-override node allows for the definition of the scheduler overrides for a specific port or channel.
When a port scheduler is active on a port or channel, all queues and intermediate service schedulers on the port are subject to receiving bandwidth from the scheduler. Any policers, queues, or schedulers with port-parent associations are mapped to the appropriate port priority levels based on the port-parent command parameters. Any policers, queues, or schedulers that do not have a port-parent or valid intermediate scheduler parent defined are treated as orphaned and are handled based on the port scheduler policies default or explicit orphan behavior.
The port scheduler maximum rate and priority level rate parameters may be overridden to allow unique values separate from the port-scheduler-policy-name attached to the port or channel. Use the egress-scheduler-override command to specify the port or channel specific scheduling parameters.
The no form of this command removes a port scheduler policy from an egress port or channel. Once the scheduler policy is removed, all orphaned policers, queues, and schedulers revert to a free running state governed only by the local queue or scheduler parameters. This includes any queues or schedulers with a port-parent association.
All
Commands in this context enter the LDP FEC prefix for the purpose of enabling egress data path statistics at the ingress LER for this FEC.
All
This command configures statistics in the egress data path of an originating LSP at a head-end node. The user must execute the no shutdown for this command to effectively enable statistics.
Note: SR-TE LSP egress statistics are not supported on VSR. |
The same set of counters is updated for packets forwarded over any path of the RSVP-TE LSP and over the lifetime of the LSP. In steady state, the counters are updated for packets forwarded over the active path of the LSP. The active path can be the primary path, one of the secondary paths, the FRR detour path, or the FRR bypass path when the head-end node is also the PLR.
For SR-TE LSPs, egress statistics are collected independently for each path (primary, backup standby or not), and are preserved on switchover (except for non-standby).
LSP egress statistics are collected if the head-end node is also the Penultimate-Popping Hop (PHP) node for a single-hop LSP using an implicit null egress label.
RSVP-TE LSP statistics are not collected on a dynamic or a static bypass tunnel itself.
Statistics collection on two labels of the stack is possible. Please refer to config>system>ip>mpls>label-stack-statistics-count.
The no form of this command disables the statistics in the egress data path and removes the accounting policy association from the LSP.
no egress-statistics
All
This command configures egress statistics in an MPLS forwarding policy.
The no form of this command removes any egress statistics in a forwarding policy.
no egress-statistics
All
Commands in this context configure the egress statistics for IGP SIDs.
All
This command administratively enables the collection of egress traffic statistics for all segment routing policies.
The no form of this command disables egress traffic statistics collection for all segment routing policies.
no egress-statistics
All
This command enables the allocation of statistical indexes to BGP-LU route entries that are programmed on an egress data path.
The no form of this command disables the allocation of statistical indexes to BGP-LU entries.
no egress-statistics
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure egress-xpl settings used by the fail-on-error feature.
All
This command enables eiBGP load sharing so routes with both MP-BGP and IPv4 next-hops can be used simultaneously.
In order for this command to be effective, the ecmp and multipath commands for the associated VPRN instance must also be configured to allow for multiple routes to the same destination.
The no form of this command used at the global level reverts to default values.
no eibgp-loadbalance
All
This command configures Ethernet Local Management Interface (E-LMI) parameters for the Ethernet port. E-LMI is only supported on Ethernet access ports with Dot1q encapsulation type.
All
This command embeds a previously defined IPv4, IPv6, or MAC embedded filter policy or Hybrid OpenFlow switch instance into this exclusive, template, or system filter policy at the specified offset value. Rules derived from the BGP FlowSpec can also be embedded into template filter policies only.
Note: For MAC filters, embedding is supported for VSD filters or filter entries only. |
The embed-filter open-flow ofs-name form of this command enables OpenFlow (OF) in GRT either by embedding the specified OpenFlow switch (OFS) instance with switch-defined-cookie disabled, or by embedding rules with sros-cookie:type “grt-cookie”, value 0, from the specified OFS instance with switch-defined-cookie enabled. The embedding filter can only be deployed in GRT context or be unassigned.
The embed-filter open-flow ofs-name system form of this command enables OF in system filters by embedding rules with sros-cookie:type “system-cookie”, value 0, from the specified OFS instance with switch-defined-cookie enabled. The embedding filter can only be of scope system.
The embed-filter open-flow ofs-name service {service-id | service-name} form of this command enables OF in VPRN/VPLS filters by embedding rules with sros-cookie:type “service-cookie”, value service-id, from the specified OFS instance with switch-defined-cookie enabled—per service rules. The embedding filter can only be deployed in the specified VPRN/VPLS service. A single VPLS service can only support OF rules per SAP or per service.
The embed-filter open-flow ofs-name sap sap-id form of this command enables OF in VPLS SAP filters by embedding rules with sros-cookie:type “service-cookie”, value service-id and flow match conditions specifying the sap-id from the specified OFS instance with switch-defined-cookie enabled—per SAP OF rules. The embedding filter must be of type exclusive and can only be deployed on the specified SAP in the context of the specified VPLS service. A single VPLS service can only support OF rules per SAP or per service.
The no embed-filter open-flow ofs-name form of this command removes the OF embedding for the GRT context.
The embed-filter flowspec form of this command enables the embedding of rules derived from BGP FlowSpec routes into the filter policy that is being configured. The optional group parameter specifies that only FlowSpec routes tagged with an interface-set extended community containing this group ID should be selected for embedding. The optional router parameter specifies the routing instance source of the BGP FlowSpec routes; if the parameter is not specified, the routing instance is derived automatically from the context in which the filter policy is applied.
The no embed-filter flowspec form of this command removes the FlowSpec filter embedding from this filter policy.
The embed-filter vsd vsd-filter-id command refers to the VSD filter ID encoded _tmnx_vsd_filter-id. The filter is created dynamically and managed exclusively using the Python script, so rules can be inserted and removed in the correct VSD filters. The command is supported with IP, IPv6, and MAC filters. For more information about VSD filter provisioning, automation, and the Python script, refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN Guide: VLL, VPLS, PBB, and EVPN.
The no embed-filter vsd vsd-filter-id form of this command removes the VSD filter embedding from this filter policy.
The no embed-filter filter-id form of this command removes the embedding from this filter policy.
See the description of embedded filter policies in this guide for further operational details.
Not including the system, service or sap parameters will specify OF in a GRT instance context by default. This allows embedding of OF rules into filters deployed in GRT instances from OFS with switch-defined-cookie disabled, or embedding rules from OFS with switch-defined-cookie enabled, when the FlowTable cookie encodes sros-cookie:type “grt-cookie”.
service-name — Specifies an existing VPRN or VPLS service name that the embedding filter can be used for.
sap-id — Specifies an existing SAP that the embedding filter can be used for.
All
This command enables context to configure IPv6 embedded RP parameters.
All
Commands in this context configure embedded RP parameters.
Embedded RP is required to support IPv6 inter-domain multicast because there is no MSDP equivalent in IPv6.
The detailed protocol specification is defined in RFC 3956, Embedding the Rendezvous Point (RP) Address in an IPv6 Multicast Address. This RFC describes a multicast address allocation policy in which the address of the RP is encoded in the IPv6 multicast group address, and specifies a PIM-SM group-to-RP mapping to use the encoding, leveraging, and extending unicast-prefix-based addressing. This mechanism not only provides a simple solution for IPv6 inter-domain ASM but can be used as a simple solution for IPv6 intra-domain ASM with scoped multicast addresses as well. It can also be used as an automatic RP discovery mechanism in those deployment scenarios that would have previously used the Bootstrap Router protocol (BSR).
The no form of this command disables embedded RP.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command configures the IP address which is used as the DHCP server address in the context of the SAP. Typically, the configured address should be in the context of the subnet represented by the service.
The no form of this command reverts to the default setting. The local proxy server will not become operational without the emulated-server address being specified.
The no form of this command reverts to the default.
See the description for the admin-password command. If the admin-password is configured in the config>system>security>password context, then any user can enter a special administrative mode by entering the enable-admin command.
enable-admin is in the default profile. By default, all users are given access to this command.
Once the enable-admin command is entered, the user is prompted for a password. If the password matches, the user is given unrestricted access to all the commands.
The minimum length of the password is determined by the minimum-length command. The complexity requirements for the password are determined by the complexity command.
The following shows a password configuration example:
There are two ways to verify that a user is in the enable-admin mode:
All
Enable the user to become a system administrator.
Note: This command applies to users on RADIUS, TACACS, and LDAP. |
All
This command enables Data MDT with PIM-ASM mode on the receiver PE node. PIM-ASM or PIM-SSM operation mode is derived based on the locally configured SSM range on the node.
If asm-mode is disabled using this command, then PIM-SSM mode is enabled for all groups, independent of the configured SSM range on the node.
All
This command enables unidirectional multi-point BFD session on a receiver (leaf) PE node for upstream fast failure detection over RSVP-TE P2MP LSP.
All
This command enables unidirectional multi-point BFD session on a sender (Root) PE node for upstream fast failure detection over RSVP-TE P2MP LSP.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command allows BGP-VPN routes imported into the VPRN to be used as backup paths for IPv4 and/or IPv6 BGP-learned prefixes.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables access to a satellite console interface for additional debugging purposes.
When configured through the 7750 SR, 7450 ESS, and 7950 XRS host CLI, the 7210 SAS console port is enabled to perform the debug function. Console commands are limited to specific show commands and no configuration or operational changes can be made using the 7210 console.
The no form of this command disables satellite console interface access.
no enable-console-access
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
This command enables DSCP/precedence remarking based on the profile state of a packet being forwarded by a SAP or subscriber egress policer. The DSCP/precedence can be remarked to a value independent of, or separately based on, the packet's profile, if the packet has an exceed, in-profile, or out-of-profile state.
no enable-dscp-prec-remarking
Note: See also the description for the dynsvc-password command. |
If the dynsvc-password is configured in the config>system>security>password context, then any user can enter a special dynamic services configuration mode by entering the enable-dynamic-services-config command.
The enable-dynamic-services-config command is not in the default profile. To give access to this command, the user must belong to the administrative profile or a new profile should be created.
Once the enable-dynamic-services-config command is entered, the user is prompted for a password. If the password matches, the user is given access to the dynamic services configuration. Access to static configuration is in this case prohibited.
To verify that a user is in the enable-dynamic-services-config mode, use the show users command. Users in the enable-dynamic-services-config mode lists the letter “D” next to the user’s CLI session.
The no form of this command disables the dynamic services configuration mode for this user.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
This command enables the forwarding of packets with an exceed-profile state and traffic exceeding the PIR for a SAP egress or a network egress queue group (configured in the egress queue group template) policer. This traffic is forwarded as exceed-profile instead of being dropped. This parameter is not supported when policers-hqos-manageable is configured in the SAP egress QoS policy.
no enable-exceed-pir
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, 7950 XRS, VSR
This command enables the forwarding of traffic exceeding the PIR for a SAP egress or a network egress queue group (configured in the egress queue group template) policer. This traffic is forwarded as exceed-profile instead of being dropped.
no enable-exceed-pir
All
This command enables the ETH-LMM test within the OAM-PM session to collect per-FC counters. This command must be used in combination with the collect-lmm-fc-stats command for the entity over which the source MEP is defined. The config>oam-pm>session>ethernet>priority value must match the numerical value that represents the FC name (7 = NC, 6 = H1, 5 = EF, 4 = H2, 3 = L1, 2 = AF, 1 = L2, 0 = BE).
The OAM-PM infrastructure does not validate that the proper counting mode has been configured on the entity that is linked to the source MEP, and does not validate that the FC and priority have been configured. The show>eth-cfm>collect-lmm-fc-stats command may be used to display the entities and the FCs on those entities that have established individual FC counters.
Sessions that launch from the same source MEP must use the same counting model; either collect-lmm-fc-stats for individual counters for the defined FCs, or collect-lmm-stats for a single all-encompassing counter.
Individual OAM-PM sessions must be configured if multiple Ethernet LMM tests are required for different FCs. Cross-session validation occurs to ensure that a source MEP does not include multiple tests that are using the same priority.
The no form of this command removes all previously defined FCs and stops counting for those FCs.
All
This command enables graceful shutdown of telnet sessions.
The no form of this command disables graceful shutdown of telnet sessions.
All
This command enables the functions required for looking up routes in the Global Route Table (GRT) when the lookup in the local VRF fails. If this command is enabled without the use of a static-route option (as subcommand to this parent), a lookup in the local VRF is preferred over the GRT. When the local VRF returns no route table lookup matches, the result from the GRT is preferred.
The no form of this command disables the lookup in the GRT when the lookup in the local VRF fails.
no enable-grt
All
This command enables vendor specific extensions to ICMP.
no enable-icmp-vse
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command enables the collection of ingress interface IP stats. This command is only applicable to IP statistics, and not to uRPF statistics.
If enabled, then the following statistics are collected:
Note: Octet statistics for IPv4 and IPv6 bytes at IP interfaces include the Layer 2 frame overhead. |
no enable-ingress-stats
All
This command specifies whether VPNs can exchange routes across autonomous system boundaries, providing model B connectivity.
The no form of this command disallows ASBRs to advertise VPRN routes to their peers in other autonomous systems.
no enable-inter-as-vpn
All
This command enables MAC accounting functionality on this interface.
The no form of this command disables MAC accounting functionality on this interface.
All
This command enables MAC accounting functionality on this interface.
The no form of this command disables MAC accounting functionality on this interface.
All
This command enables MAC Accounting functionality for the interface.
no enable-mac-accounting
All
This command enables SPT switchover for default MDT. On enable, PIM instance resets all MDTs and re-initiate setup.
The no form of this command disables SPT switchover for default MDT. On disable, PIM instance resets all MDTs and re-initiate setup.
no enable-mdt-spt
All
When this command is present, the graceful restart capability sent by this router indicates support for NOTIFICATION messages. If the peer also supports this capability then the session can be restarted gracefully (while preserving forwarding) if either peer sends a NOTIFICATION message due to some type of event or error.
no enable-notification
All
When this command is present, the graceful restart capability sent by this router indicates support for NOTIFICATION messages. If the peer also supports this capability, then the session can be restarted gracefully (while preserving forwarding) if either peer needs to send a NOTIFICATION message due to some type of event or error.
no enable-notification
All
When this command is added to the configuration of a group or neighbor, it causes every inbound IPv4, IPv6, and label-IPv4 route from that peer to be marked with one of the following origin validation states:
By default (when no family parameter is present in the command) or when all the family options are specified, all unicast IPv4 (AFI1/SAFI1), label-IPv4 (AFI1/SAFI4), and unicast IPv6 (AFI2/SAFI1) routes are evaluated to determine their origin validation states. When only a subset of the family options are present, then only the corresponding address family routes are evaluated.
This command applies to all types of VPRN BGP peers, generally, it should only be applied to EBGP peers and groups that contain only EBGP peers.
The no form of this command disables the inspection of received routes from the peer to determine origin validation state.
no enable-origin-validation
All
When the enable-origin-validation command is added to the configuration of a group or neighbor, it causes every inbound IPv4 and/or IPv6 route from that peer to be marked with one of the 3 following origin validation states:
By default (when neither the ipv4 or ipv6 option is present in the command) or when both the ipv4 and ipv6 options are specified, all unicast IPv4 (AFI1/SAFI1), label-IPv4 (AFI1/SAFI4), unicast IPv6 (AFI2/SAFI1), and label-IPv6 (AFI2/SAFI4) routes are evaluated to determine their origin validation states. When only the ipv4 or ipv6 option is present, only the corresponding address family routes (unlabeled and labeled) are evaluated.
The enable-origin-validation command applies to all types of BGP peers, but as a general rule, it should only be applied to EBGP peers and groups that contain only EBGP peers.
no enable-origin-validation
All
This command enables BGP peer tracking.
no enable-peer-tracking
All
This command enables BGP peer tracking. BGP peer tracking allows a BGP peer to be dropped immediately if the route used to resolve the BGP peer address is removed from the IP routing table and there is no alternative available. The BGP peer will not wait for the holdtimer to expire; therefore, the BGP re-convergence process is accelerated.
The no form of this command disables peer tracking.
no enable-peer-tracking
All
This command includes the mirrored packet system’s port ID. The system port ID can be used to identify which port the packet was received or sent on. Inclusion of the port ID is only supported for mirror-dest type ppp.
The no form of this command disables the inclusion of the port ID of the system in the packet.
All
When this command is configured all received VPN-IP routes, regardless of route target, are imported into the dummy VRF, where the BGP next-hops are resolved. The label-route-transport-tunnel under config>router>bgp>next-hop-resolution determines what types of tunnels are eligible to resolve the next-hops. If a received VPN-IP route from IBGP peer X is resolved and selected as best so that it can be re-advertised to an IBGP peer Y, and the BGP next-hop is modified towards peer Y (by using the next-hop-self command in Y’s group or neighbor context or by using a next-hop action in an export policy applied to Y) then BGP allocates a new VPRN service label value for the route, signals that new label value to Y and programs the IOM to do the corresponding label swap operation. The supported combinations of X and Y are outlined below:
The no form of this command causes the re-advertisement of a VPN-IP route between one IBGP peer and another IBGP peer does not cause a new VPRN service label value to be signaled and programmed even if the BGP next-hop is changed through group/neighbor configuration or policy.
Nokia recommends leaving this command disabled for scaling and convergence reasons.
no enable-rr-vpn-forwarding
7450 ESS, 7750 SR-7/12/12e
By default, the video ISA has both client and server capability for RET (retransmission). The client capability can be disabled to enable higher performance
The no form of the command enables higher performance.
enable-rt-client
All
This command enables the shell and kernel commands.
Note: This command should only be used with authorized direction from the Nokia Technical Assistance Center (TAC). |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables system to auto creates ESM hosts upon successful WPP authentication. The default host must be configured under SAP on the subscriber SAP to redirect unauthenticated client traffic to the web portal.
The no form of this command reverts to the default.
This command allows editing of VSD services just like normal services. As this is an action that should only be executed by authorized personnel, the activation of this command is protected by the use of a password, defined under configure system security password vsd-password.
All
All
This command creates a new QoS sub-context in B-VPLS SAP egress context. The user can define encapsulation groups, referred to as encap-group, based on the ISID value in the packet’s encapsulation and assign a QoS policy and a scheduler policy or aggregate rate limit to the group.
All
This command defines an encapsulation group which consists of a group of ISID values. All packets forwarded on the egress of a B-VPLS SAP which payload header matches one of the ISID value in the encap-group will use the same QoS policy instance and scheduler policy or aggregate rate limit instance.
The user adds or removes members to the encap-group one at a time or as a range of contiguous values using the member command. However, when the qos-per-member option is enabled, members must be added or removed one at a time. These members are also referred to as ISID contexts.
The user can configure one or more encap-groups in the egress context of the same B-SAP, therefore defining different ISID values and applying each a different SAP egress QoS policy, and optionally a different scheduler policy/agg-rate. ISID values are unique within the context of a B-SAP. The same ISID value cannot be re-used in another encap-group under the same B-SAP but can be re-used in an encap-group under a different B-SAP. Finally, if the user adds to an encap-group an ISID value which is already a member of this encap-group, the command causes no effect. The same if the user attempts to remove an ISID value which is not a member of this encap-group.
Once a group is created, the user will assign a SAP egress QoS policy, and optionally a scheduler policy or aggregate rate limit, using the following commands:
config>service>vpls>sap>egress>encap-defined-qos>encap-group>qos sap-egress-policy-id
config>service>vpls>sap>egress>encap-defined-qos>encap-group>scheduler-policy scheduler-policy-name
config>service>vpls>sap>egress>encap-defined-qos>encap-group>agg-rate kilobits-per-second
A SAP egress QoS policy must first be assigned to the created encap group before the user can add members to this group. Conversely, the user cannot perform the no qos command until all members are deleted from the encap-group.
An explicit or the default SAP egress QoS policy will continue to be applied to the entire B-SAP but this will serve to create the set of egress queues which will be used to store and forward a packet which does not match any of the defined ISID values in any of the encap-groups for this SAP.
Only the queue definition and fc-to-queue mapping from the encap-group SAP egress QoS policy is applied to the ISID members. All other parameters configurable in a SAP egress QoS policy must be inherited from egress QoS policy applied to the B-SAP.
Furthermore, any other CLI option configured in the egress context of the B-SAP will continue to apply to packets matching a member of any encap-group defined in this B-SAP.
The keyword qos-per-member allows the user to specify that a separate queue set instance and scheduler/agg-rate instance will be created for each ISID value in the encap-group. By default, shared instances will be created for the entire encap-group.
When the B-SAP is configured on a LAG port, the ISID queue instances defined by all the encap-groups applied to the egress context of the SAP will be replicated on each member link of the LAG. The set of scheduler/agg-rate instances will be replicated per link or per IOM or XMA depending if the adapt-qos option is set to link/port-fair mode or distribute mode. This is the same behavior as that applied to the entire B-SAP in the current implementation.
The no form of this command deletes the encap-group.
All
This command defines the sub-set of traffic on this port affected by this MACsec sub-port.
In order to establish an end-to-end communication between the remote MACsec peers encrypting VLAN-tagged traffic, the MKA packets have to be able to travel over the network following the same path as the encrypted traffic. MKA packets are generated with specific tags depending on the traffic match criteria configured, as shown in Table 49.
The no form of this command removes all traffic sub-set definitions from the MACsec sub-port.
Configuration | Config Example (<s-tag>.<c-tag>) | MKA Packet Generation | Traffic pattern match/behavior |
PORT all-encap | Config>port>ethernet>dot1x>macsec Sub-port 10 encap-match all-encap ca-name 10 | untagged MKA packet | Matches all traffic on the port, including untagged, single-tag, double-tag. This is the Release 15.0 default behavior. |
Untagged | Config>port>ethernet>dot1x>macsec Sub-port 1 encap-match untagged ca-name 2 | untagged MKA packet | Matches only untagged traffic on the port |
802.1Q single S-TAG (specific S-TAG) | Config>port>ethernet>dot1x>macsec Sub-port 2 encap-match dot1q 1 ca-name 3 | MKA packet generated with S-TAG=1 | Matches only single-tag traffic on port with tag ID of 1 |
802.1Q single S-TAG (any S-TAG) | Config>port>ethernet>dot1x>macsec Sub-port 3 encap-match dot1q * ca-name 4 | untagged MKA packet | Matches any single-tag traffic on port |
802.1ad double tag (both tag have specific TAGs) | Config>port>ethernet>dot1x>macsec Sub-port 4 encap-match qinq 1.1 ca-name 5 | MKA packet generated with S-tag=1 and C-TAG=1 | Matches only double-tag traffic on port with service tag of 1 and customer tag of 1 |
802.1ad double tag (specific S-TAG, any C-TAG) | Config>port>ethernet>dot1x>macsec Sub-port 6 encap-match qinq 1.* ca-name 7 | MKA packet generated with S-TAG=1 | Matches only double-tag traffic on port with service tag of 1 and customer tag of any |
802.1ad double tag (any S-TAG, any C-TAG | Config>port>ethernet>dot1x>macsec Sub-port 7 encap-match double-tag *.* ca-name 8 | untagged MKA packet | Matches any double-tag traffic on port |
encap-match all-encap
Type | Parameter |
all-encap | — |
untagged | — |
dot1q | [*| s] (s = 0..4094) |
qinq | [*.*| s.*| s.c] (s and c = 0..4094) |
where:
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables the adjustment of the queue and subscriber aggregate rate based on the last mile Ethernet or ATM encapsulation.
The data path computes the adjusted frame size real-time for each serviced packet from a queue by adding the actual packet size to the fixed offset provided by CPM for this queue and variable AAL5 padding.
When this command is enabled, the fixed packet offset is derived from the encapsulation type value signaled in the Access-loop-encapsulation sub-TLV in the Vendor-Specific PPPoE Tags or DHCP Relay Options as per RFC 4679. If the user specifies an encapsulation type with the command, this value is used as the default value for all hosts of this subscriber until a host session signaled a valid value. The signaled value is applied to this host only and the remaining hosts of this subscriber continue to use the user entered default type value if configured, or no offset is applied. However, hosts of the same subscriber using the same SLA profile and which are on the same SAP will share the same instance of FC queues. In this case, the last valid encapsulation value signaled by a host of that same instance of the SAP egress QoS policy will override any previous signaled or configured value.
If the user manually applied a constant byte offset to each packet serviced by the queue by configuring the packet-byte-offset, it will have no effect on the net offset computed for the packet. This net offset is stored in the subscriber host table.
The procedures for handling signaling changes or configuration changes affecting the subscriber profile are as follows:
The avg-frame-size parameter in the subscriber profile is ignored.
If the user specifies an encapsulation type with the command, this value is used as the default value for all hosts of this subscriber until a host session signaled a valid value. The signaled value is applied to this host and other hosts of the same subscriber sharing the same SLA profile and which are on the same SAP. The remaining hosts of this subscriber continue to use the user entered default type value if configured, or no offset is applied.
If the user enables/disables the encap-offset option, or changes the parameter value of the encap-offset option, CPM immediately triggers a re-evaluation of subscribers hosts using the corresponding subscriber profile and an update the IOM with the new fixed offset value.
If a subscriber has a static host or an ARP host, the subscriber host continues to use the user-configured default encapsulation type value or the last valid encapsulation value signaled in the PPPoE tags or DHCP relay options by other hosts of the same subscriber which use the same SLA profile instance. If none was signaled or configured, then no rate adjustment is applied.
When the encap-offset option is configured in the subscriber profile, the subscriber host queue rates, that is, CLI and operational PIR and CIR as well as queue bucket updates, the queue statistics, that is, forwarded, dropped, and HQoS offered counters use the last-mile frame-over-the-wire format. The scheduler policy CLI and operational rates also use LM-FoW format. The port scheduler max-rate and the priority level rates and weights, if a Weighted Scheduler Group is used, are always entered in CLI and interpreted as local port frame-over-the-wire rates. The same is true for an agg-rate-limit applied to a Vport. Finally the subscriber agg-rate-limit is entered in CLI as last-mile frame-over-the-wire rate. The system maintains a running average frame expansion ratio for each queue to convert queue rates between these two formats.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
This command is applicable within the LAC/LNS context. It provides the last mile link encapsulation information that is needed for proper (shaping) rate calculations and interleaving delay in the last mile.
The encapsulation value will be taken from the following sources in the order of priority:
In case that the encapsulation information is not provided by any of the existing means (LUDB, RADIUS, AVP signaling, PPPoE Tags), then by default pppoea-null encapsulation will be in effect.
The following values are supported encapsulation values on LNS in the 7750 SR.
encap-type:
pppoa-llc | LLC (NLPID) PPPoA encapsulation. |
pppoa-null | VC-MUX PPPoA encapsulation. |
pppoeoa-llc | LLC/SNAP based bridged Ethernet PPPoEoA encapsulation without FCS. |
pppoeoa-llc-fcs | LLC/SNAP based bridged Ethernet PPPoEoA encapsulation with FCS. |
pppoeoa-null | VC-MUX PPPoEoA encapsulation without FCS. |
pppoeoa-null-fcs | VC-MUX PPPoEoA encapsulation with FCS. |
pppoe | PPPoE encapsulation. |
pppoe-tagged | Tagged PPPoE Encapsulation. |
The values are not supported encapsulation values on LNS in the 7750 SR.
pppoeoa-llc-tagged | |
pppoeoa-llc-tagged-fcs | |
pppoeoa-null-tagged | |
pppoeoa-null-tagged-fcs | |
ipoa-llc | |
ipoa-null | |
ipoeeoa-llc | |
ipoeoa-llc-fcs | |
ipoeoa-llc-tagged | |
ipoeoa-llc-tagged-fcs | |
ipoeoa-null | |
ipoeoa-null-fcs | |
ipoeoa-null-tagged | |
ipoeoa-null-tagged-fcs | |
ipoe | |
ipoe-tagged |
no encap-offset
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
For dot1q, the start/end-tag is single number, range from 0-4094; for QinQ, the start/end-tag format is x.y, x or y could be “*”, which means ignore inner or outer tag.
Note: This command is only used when encap-tag-range is configured as one of the match-list parameters. |
start-tag | dot1q | qtag1 | |
qinq |
end-tag | dot1q | qtag1 | |
qinq |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command specifies a range of encapsulation tags as the host identifications.
Note: This command is only used when encap-tag-separate-range is configured as one of the match-list parameters. |
no encap-tag-separate-range
7750 SR, 7750 SR-e, 7750 SR-s, VSR
If different from default, this command overrides the value specified by l2-ap-encap-type on wlan-gw level. See the description of l2-ap-encap-type for more detail. This value can only be changed while the l2-ap is shut down.
The no form of this command sets the default value.
encap-type default
All
This command configures the encapsulation method used to distinguish customer traffic on an Ethernet access port, or different VLANs on a network port.
The no form of this command restores the default.
encap-type null
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the encapsulation method used to distinguish customer traffic on an access SONET/SDH channel sub-port.
When the encap-type is set to ATM the CRC default cannot be changed.
When the encap-type is ATM, ATM sub-layer verification (GR-1248-CORE, Generic Requirements for Operations of ATM Network Elements (NEs)) is automatically enabled. The result of the verification includes:
The encap-type is only required when configuring a SONET/SDH path for access mode.
The no form of this command restores the default.
encap-type bcp-null
Note that null ports will accept q-tagged frames.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
This command configures the encapsulation method used to on the specified port, path, or channel. This parameter can be set on both access and network ports.
When the encap-type is set to ATM the CRC, timeslots, scrambling (if applicable), and idle-cycle-flags are set to ATM defaults respectively. When the encap-type is changed from ATM, those parameters are set to their non-ATM defaults.
When the encap-type is ATM, ATM sub-layer verification (GR-1248-CORE, Generic Requirements for Operations of ATM Network Elements (NEs)) is automatically enabled. When ATM PLCP cell mapping is used, the results of this verification include:
When ATM direct cell mapping is used, the result of the verification includes:
The no form of this command restores the default.
encap-type bcp-null
All
This command configures the encapsulation method used to distinguish customer traffic on a LAG. The encapsulation type is configurable on a LAG port. The LAG port and the port member encapsulation types must match when adding a port member.
If the encapsulation type of the LAG port is changed, the encapsulation type on all the port members will also change. The encapsulation type can be changed on the LAG port only if there is no interface associated with it. If the MTU is set to a non-default value, it will be reset to the default value when the encap type is changed.
The no form of this command restores the default.
encap-type null — All traffic on the port belongs to a single service or VLAN.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the encapsulation method used to distinguish customer traffic on a LAG. The encapsulation type is configurable on a LAG port. The LAG port and the port member encapsulation types must match when adding a port member.
If the encapsulation type of the LAG port is changed, the encapsulation type on all the port members will also change. The encapsulation type can be changed on the LAG port only if there is no interface associated with it. If the MTU is set to a non-default value, it will be reset to the default value when the encap type is changed.
The no form of this command reverts to the default.
encap-type dot1q
All
This command configures the encapsulation type on a PW port. Customer Ethernet frames can be single-tagged or double-tagged, and this command determines the number of tags that the SR OS will check (and strip) on PW-SAP ingress and insert on PW-SAP egress.
The no form of this command removes the configuration.
7450 ESS, 7750 SR, 7750 SR-1s, 7750 SR-2s, 7750 SR-e, VSR
VSR
This command specifies the maximum size of encapsulated tunnel packet for the ipsec-tunnel, ip-tunnel, or the dynamic tunnels terminated on the ipsec-gw. If the encapsulated IPv4 or IPv6 tunnel packet exceeds the encapsulated-ip-mtu, then the system fragments the packet against the encapsulated-ip-mtu.
The no form of this command reverts to the default.
no encapsulated-ip-mtu
This command configures the tunnel encapsulated IP MTU.
The no form of this command reverts to the default.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
This command specifies the data encapsulation for an ATM PVCC delimited Epipe SAP. The definition references RFC 2684, Multiprotocol Encapsulation over ATM AAL5, and to the ATM Forum LAN Emulation specification.
Ingress traffic that does not match the configured encapsulation will be dropped.
encapsulation aal5snap-bridged
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
This command specifies the data encapsulation for an ATM PVCC delimited Ipipe SAP. The definition references RFC 2684, Multiprotocol Encapsulation over ATM AAL5, and to the ATM Forum LAN Emulation specification. Ingress traffic that does not match the configured encapsulation will be dropped.
encapsulation aal5snap-routed
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
This command configures RFC 2684, Multiprotocol Encapsulation over ATM Adaptation Layer 5, encapsulation for an ATM PVCC delimited SAP. This command specifies the data encapsulation for an ATM PVCC delimited SAP. The definition also references the ATM Forum LAN Emulation specification. The encapsulation is driven by the services for which the SAP is configured.
Ingress traffic that does not match the configured encapsulation will be dropped.
encapsulation aal5snap-routed
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies whether or not Wavetracker keys should be encoded on the transmitted optical signal.
no encode
DWDM ITU Channel Number | Key 1 Minimum | Key 1 Maximum | Key 2 Minimum | Key 2 Maximum |
17 | 1276 | 1290 | 1760 | 1774 |
18 | 1259 | 1273 | 1743 | 1757 |
19 | 1242 | 1256 | 1726 | 1740 |
20 | 1225 | 1239 | 1709 | 1723 |
21 | 528 | 542 | 1072 | 1086 |
22 | 511 | 525 | 1055 | 1069 |
23 | 494 | 508 | 1038 | 1052 |
24 | 477 | 491 | 1021 | 1035 |
25 | 1208 | 1222 | 1692 | 1706 |
26 | 460 | 474 | 1004 | 1018 |
27 | 443 | 457 | 987 | 1001 |
28 | 426 | 440 | 970 | 984 |
29 | 409 | 423 | 953 | 967 |
30 | 1191 | 1205 | 1675 | 1689 |
31 | 392 | 406 | 936 | 950 |
32 | 375 | 389 | 919 | 933 |
33 | 358 | 372 | 902 | 916 |
34 | 341 | 355 | 885 | 899 |
35 | 1174 | 1188 | 1658 | 1672 |
36 | 324 | 338 | 868 | 882 |
37 | 307 | 321 | 851 | 865 |
38 | 290 | 304 | 834 | 848 |
39 | 273 | 287 | 817 | 831 |
40 | 1157 | 1171 | 1641 | 1655 |
41 | 256 | 270 | 800 | 814 |
42 | 239 | 253 | 783 | 797 |
43 | 222 | 236 | 766 | 780 |
44 | 205 | 219 | 749 | 763 |
45 | 1140 | 1154 | 1624 | 1638 |
46 | 188 | 202 | 732 | 746 |
47 | 171 | 185 | 715 | 729 |
48 | 154 | 168 | 698 | 712 |
49 | 137 | 151 | 681 | 698 |
50 | 1123 | 1137 | 1607 | 1621 |
51 | 120 | 134 | 664 | 678 |
52 | 103 | 117 | 647 | 661 |
53 | 86 | 100 | 630 | 644 |
54 | 69 | 83 | 613 | 627 |
55 | 1106 | 1120 | 1590 | 1604 |
56 | 52 | 66 | 596 | 610 |
57 | 35 | 49 | 579 | 593 |
58 | 18 | 32 | 562 | 576 |
59 | 1 | 15 | 545 | 559 |
60 | 1089 | 1103 | 1573 | 1587 |
61 | 1548 | 1548 | 2032 | 2032 |
175 | 3553 | 3567 | 4065 | 4079 |
185 | 3536 | 3550 | 4048 | 4062 |
195 | 3519 | 3533 | 4031 | 4045 |
205 | 3502 | 3516 | 4014 | 4028 |
215 | 3840 | 3854 | 2304 | 2318 |
225 | 3823 | 3837 | 2287 | 2301 |
235 | 3806 | 3820 | 2270 | 2284 |
245 | 3789 | 3803 | 2253 | 2267 |
255 | 3485 | 3499 | 3997 | 4011 |
265 | 3772 | 3786 | 2236 | 2250 |
275 | 3755 | 3769 | 2219 | 2233 |
285 | 3738 | 3752 | 2202 | 2216 |
295 | 3721 | 3735 | 2185 | 2199 |
305 | 3468 | 3482 | 3980 | 3994 |
315 | 3704 | 3718 | 2168 | 2182 |
325 | 3687 | 3701 | 2151 | 2165 |
335 | 3670 | 3684 | 2134 | 2148 |
345 | 3653 | 3667 | 2117 | 2131 |
355 | 3451 | 3465 | 3963 | 3977 |
365 | 3636 | 3650 | 2100 | 2114 |
375 | 3619 | 3633 | 2083 | 2097 |
385 | 3602 | 3616 | 2066 | 2080 |
395 | 3585 | 3599 | 2049 | 2063 |
405 | 3434 | 3448 | 3946 | 3960 |
415 | 1548 | 1562 | 2032 | 2046 |
425 | 1531 | 1545 | 2015 | 2029 |
435 | 1514 | 1528 | 1998 | 2012 |
445 | 1497 | 1511 | 1981 | 1995 |
455 | 3908 | 3922 | 2372 | 2386 |
465 | 1480 | 1494 | 1964 | 1978 |
475 | 1463 | 1477 | 1947 | 1961 |
485 | 1446 | 1460 | 1930 | 1944 |
495 | 1429 | 1443 | 1913 | 1927 |
505 | 3891 | 3905 | 2355 | 2369 |
515 | 1412 | 1426 | 1896 | 1910 |
525 | 1395 | 1409 | 1879 | 1893 |
535 | 1378 | 1392 | 1862 | 1876 |
545 | 1361 | 1375 | 1845 | 1859 |
555 | 3874 | 3888 | 2338 | 2352 |
565 | 1344 | 1358 | 1828 | 1842 |
575 | 1327 | 1341 | 1811 | 1825 |
585 | 1310 | 1324 | 1794 | 1808 |
595 | 1293 | 1307 | 1777 | 1791 |
605 | 3857 | 3871 | 2321 | 2335 |
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an HTTP header enrichment template field static string.
The no form of this command removes the template field static string.
no encode
All
This command configures the encoding type that is used for telemetry notifications in accordance with the definitions in the gNMI OpenConfig standard.
encoding json
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the encoding type of the payload carried by the GMPLS LSP; line is the only supported type.
encoding-type line
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command binds an encryption key-group to a WLAN-GW soft-GRE group interface. When configured in the inbound direction, received packets must be encrypted using one of the valid security-associations configured for the key-group. When configured in the outbound direction, L2oMPLSoGRE packets egressing the node use the “active-outbound-sa” associated with the key-group configured.
The no form of this command removes the encryption keygroup from the inbound or outbound group interface.
VSR
This command is used to bind a key group to a router interface for inbound or outbound packet processing. When configured in the outbound direction, packets egressing the router use the active-outbound-sa associated with the configured key group. When configured in the inbound direction, received packets must be encrypted using one of the valid security associations configured for the key group.
The no form of this command removes the key group from the router interface in the specified direction.
no encryption-keygroup direction inbound
no encryption-keygroup direction outbound
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command is used to create a key group. Once the key group is created, use the command to enter the key group context or delete a key group.
The no form of the command removes the key group. Before using the no form, the key group association must be deleted from all services that are using this key group.
VSR
This command is used to bind a key group to an SDP, VPRN service, or PW template for inbound or outbound packet processing. When configured in the outbound direction, packets egressing the node use the active-outbound-sa associated with the key group configured. When configured in the inbound direction, received packets must be encrypted using one of the valid security associations configured for the key group. Services using the SDP will be encrypted.
The encryption (enabled or disabled) configured on an SDP used to terminate a Layer 3 spoke SDP of a VPRN always overrides any VPRN-level configuration for encryption.
Encryption is enabled after the outbound direction is configured.
For PW template changes, the following tools command must be executed after the configuration changes are made: tools>perform>service>eval-pw-template>allow-service-impact. This command applies the changes to services that use the PW template.
The no form of the command removes the key group from the SDP or service in the specified direction (inbound or outbound).
All
This command specifies the offset of the encryption in MACsec packet.
The encryption-offset is distributed by MKA (Key-server) to all parties.
It is signaled via MACsec capabilities. There are four basic settings for this. Table 51 breaks down the settings.
Setting | Description |
0 | MACsec is not implemented |
1 | Integrity without confidentiality |
2 | The following are supported:
|
3 1 | The following are supported:
|
Note:
The no form of this command rejects all arriving traffic whether MACsec is secured or not.
encryption-offset 0
All
This command configures start of summer time settings.
end first sunday january 00:00
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
The End SID function for each SRH mode must be statically allocated. The value is not automatically allocated by default.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies the number of end marker packets that are sent when it is certain no more packets will be sent over the corresponding GTP-U tunnel, such as after a completed mobility event.
The no form of this command reverts the value to the default.
end-marker-count 1
All
This command enables debugging for end of data RPKI packets.
The no form of this command disables debugging for end of data RPKI packets.
All
This command configures the end-station-only. This option prevents MMRP messages from being generated or processed. It is useful in case all the MMRP entries for the B-VPLS are static.
All
This command is used concurrently with type periodic or calendar. Using the type of periodic, end-time determines at which interval the schedule will end. Using the type of calendar, end-time determines on which date the schedule will end.
When no end-time is specified, the schedule runs forever.
no end-time
All
This command specifies the calendar date and time after which the key specified by the authentication key is no longer eligible to sign and/or authenticate the protocol stream.
end-time forever
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
A static function value can be configured for each combination of SRH mode and protection type.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
Note: |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
When configured under the l2tp hierarchy, this command is applicable to LNS.
Within the ppp-policy, this command is applicable only to LAC.
The endpoint, according to RFC 1990, represents the system transmitting the packet. It is used during MLPPPoX negotiation phase to distinguish this peer from all others.
In the case that the client rejects the endpoint option during LCP negotiation, the LAC and the LNS must be able to negotiate the LCP session without the endpoint option.
The no form of this command disables sending endpoint option in LCP negotiation.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
All
This command configures a service endpoint.
All
This command configures a service endpoint.
All
This command configures the endpoint address for an MPLS forwarding policy.
The policy allows the user to forward unlabeled packets over a set of user-defined direct (with option to push a label stack) or indirect next hops. Routes are bound to an endpoint policy when their next hop matches the endpoint address of the policy.
The no form of the command removes the endpoint from the MPLS forwarding policy.
| ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x - [0..FFFF]H | ||
d - [0..255]D |
All
This command configures a service end point. A mirror service supports two implicit endpoints managed internally by the system. The following applies to endpoint configurations.
Up to two named endpoints may be created per service mirror or LI service. The endpoint name is locally significant to the service mirror or LI service.
Creating an object without an explicit endpoint:
Creating an object with an explicit endpoint name:
Changing an object’s implicit endpoint to an explicit endpoint name
Changing an object’s explicit endpoint to another explicit endpoint name
An explicitly named endpoint can have a maximum of one SAP and one ICB. Once a SAP is added to the endpoint, only one more object of type ICB sdp is allowed. The ICB sdp cannot be added to the endpoint if the SAP is not part of a MC-LAG instance. Conversely, a SAP which is not part of a MC-LAG instance cannot be added to an endpoint which already has an ICB sdp.
An explicitly named endpoint which does not have a SAP object can have a maximum of four SDPs which can include any of the following: a single primary SDP, one or many secondary SDPs with precedence, and a single ICB SDP.
The user can only add a SAP configured on a MC-LAG instance to this endpoint. Conversely, the user will not be able to change the mirror service type away from mirror service without first deleting the MC-LAG SAP.
The no form of this command removes the association of a SAP or an SDP with an explicit endpoint name. When removing an objects explicit endpoint association:
All
This command associates an IPv4 or IPv6 endpoint address with a statically-defined segment routing policy. This association is mandatory when enabling an SR segment-routing policy.
The endpoint address 0.0.0.0 is a special value that matches all BGP next-hops. To use it, the BGP route must have a color-extended community with the color-only bits set to '01' or '10'.
The no form of this command removes the endpoint association.
no endpoint
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
All
This command configures an SR Policy endpoint address as a route policy match criterion. This match criterion is only used in import policies.
The no form of this command removes the endpoint IP match criterion from the configuration.
7450 ESS, 7750 SR-7/12/12e
This command configures the endpoint-discriminator class and ID. The port must be shutdown to modify command parameters.
The no form of this command removes the parameters from the configuration.
This command specifies the range of VLAN IDs that are controlled by MVRP on the port associated with the parent SAP. When the command is present under a certain SAP, the MVRP will treat the associated virtual port as an end-station.
MVRP endstation behavior means that configuration of a new data SAP with the outer tag in the configured endstation-vid-group will generate down that virtual port a MVRP declaration for the new [outer] VLAN attribute. Also registration received for the VLAN attribute in the range will be accepted but not propagated in the rest of MVRP context.
VPLS-groups are not allowed under the associated Management VPLS (M-VPLS) when the endstation is configured under one SAP. VPLS-groups can be supported in the chassis using a different M-VPLS.
The no form of this command removes the specified group id.
no endstation-vid-group
All
This command enables checking by RSVP that a Forwarding Class (FC) mapping to an LSP under the SDP configuration is compatible with the Diff-Serv Class Type (CT) configuration for this LSP.
When the user enables this option, the service manager inquires with RSVP if the FC is supported by the LSP. RSVP checks if the FC maps to the CT of the LSP, for example, the default class-type value or the class-type value entered at the LSP configuration level.
If RSVP did not validate the FC, then the service manager will return an error and the check has failed. In this case, packets matching this FC will be forwarded over the default LSP. Any addition of an LSP to an SDP that will not satisfy the FC check will also be rejected.
The service manager does not validate the default-lsp FC-to-CT mapping. Whether or not the FC is validated, the default-lsp will always end up being used in this case.
RSVP will not allow the user to change the CT of the LSP until no SDP with class-based forwarding enabled and the enforce-diffserv-lsp-fc option enabled is using this LSP. All other SDPs using this LSP are not concerned by this rule.
The SDP will continue to enforce the mapping of a single LSP per FC. However, when enforce-diffserv-lsp-fc enabled, RSVP will also enforce the use of a single CT per FC as per the user configured mapping in RSVP.
If class-forwarding is enabled but enforce-diffserv-lsp-fc is disabled, forwarding of the service packets will continue to be based on the user entered mapping of FC to LSP name without further validation as per the existing implementation. The CT of the LSP does not matter in this case.
If class-forwarding is not enabled on the SDP, forwarding of the service packets will continue to be based on the ECMP/LAG hash routine. The CT of the LSP does not matter in this case.
The no form of this command reverts to the default value which is to use the user entered mapping of FC to LSP name.
no enforce-diffserv-lsp-fc
All
When this command is configured so that it applies to an EBGP session, all routes (belonging to all address families) that are received from the EBGP peer are checked to ensure that the most recent autonomous system number (ASN) in the AS_PATH attribute of each route matches the configured peer-as of the session; if it does not match, then either the session is reset (if update-fault-tolerance is not enabled) or the session is left up but the route is treated as withdrawn (if update-fault-tolerance is enabled).
Enabling or disabling this command on a session that is already up does not flap the session. When enforce-first-as is enabled, previously received routes are not checked for compliance with the rule. Enforcement applies only to routes received after the command is enabled and stops when the command is disabled.
All
When this command is configured so that it applies to an EBGP session, all routes (belonging to all address families) that are received from the EBGP peer are checked to ensure that the most recent autonomous system number (ASN) in the AS_PATH attribute of each route matches the configured peer-as of the session; if it does not match, then either the session is reset (if update-fault-tolerance is not enabled) or the session is left up but the route is treated as withdrawn (if update-fault-tolerance is enabled).
Enabling or disabling this command on a session that is already up does not flap the session. When enforce-first-as is enabled, previously received routes are not checked for compliance with the rule. Enforcement applies only to routes received after the command is enabled and stops when the command is disabled.
All
This command forces the system to only consider LSPs marked with an admin tag for next hop resolution. Untagged LSPs are not considered.
The no form of this command reverts to default value. While tagged RSVP and SR-TE LSPs are considered first, the system can fall back to using untagged LSPs of other types and does not exclude them depending on the auto-bind-tunnel configuration.
no enforce-strict-tunnel-tagging
All
This command forces the system to only consider LSPs marked with an admin-tag for next-hop resolution. Untagged LSPs are not be considered.
The no form of this command reverts to the default behavior. While tagged RSVP and SR-TE LSPs will be considered first, the system can fall back to using tagged LSPs that are not explicitly excluded by a route admin tag policy and untagged LSPs of other types and not exclude them.
no enforce-strict-tunnel-tagging
All
This command enables the options to force the creation of IP interface indexes so that they are globally unique across all routing contexts. In addition, the command ensures that any interface created using SNMP also has a system-wide unique IP interface index.
If this command is issued but the system has previously existing interface indexes that conflict, the command will be rejected until all the conflicts are removed. Pre-existing persistency tables should also be removed before enabling this system option.
The no form of the command disables this option and returns the system to the default behavior.
no enforce-unique-if-index
All
This command configures the enforcement method for the protocol.
enforcement dynamic local-mon-bypass
All
This command sets the SNMP engineID to uniquely identify the SNMPv3 node. By default, the engineID is generated using information from the system backplane.
If SNMP engine ID is changed in the config>system>snmp> engineID engine-id context, the current configuration must be saved and a reboot must be executed. If not, the previously configured SNMP communities and logger trap-target notify communities will not be valid for the new engine ID.
Note: In conformance with IETF standard RFC 2274, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), hashing algorithms which generate SNMPv3 MD5 or SHA security digest keys use the engineID. Changing the SNMP engineID invalidates all SNMPv3 MD5 and SHA security digest keys and may render the node unmanageable. |
When a chassis is replaced, use the engine ID of the first system and configure it in the new system to preserve SNMPv3 security keys. This allows management stations to use their existing authentication keys for the new system.
Ensure that the engine IDs are not used on multiple systems. A management domain can only have one instance of each engineID.
The no form of the command reverts to the default setting.
7750 SR-14s, 7750 SR-7s, 7950 XRS
This command enables the inclusion of the ingress port ID into the hash algorithm used to distribute cflowd sample traffic to cflowd processes running on the 7950 XRS CPM. By including this new attribute, cflowd may see better distribution of flows across processing tasks if there is a limited number of IP interfaces on which sampling is performed, but those interfaces use LAGs with a large number of port members.
By enabling this option, the same flow may be captured multiple times if packets are received on multiple ingress ports.
This command is only applicable to cflowd running on a 7950 XRS platform.
The no form of this command removes the command from the configuration and disables the inclusion of the ingress port ID in the cflowd hash algorithm.
no enhanced-distribution
All
This command is used to enable queuing of new packets when H-QoS determines that a queue should stop forwarding (operational PIR set to zero). The default behavior is to allow the queue to continue to use the previously determined operational PIR and set the queue’s MBS (Maximum Burst Size) to zero. This prevents new packets from being admitted to the queue until the PIR zero case terminates. The new behavior when enqueue-on-pir-zero is enabled is to set the operational PIR to zero and leave the queue’s MBS set to the normal value.
This command overrides the limit-pir-zero-drain command.
The no form of this command reverts to default behavior.
All
This command enables completion on the enter character.
The no form of this command reverts to the default value.
enter
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
All
This command enables or disables the use of entropy labels for spoke SDPs.
If entropy-label is configured, the entropy label and ELI are inserted in packets for which at least one LSP in the stack for the far-end of the tunnel used by the service has advertised entropy-label-capability. If the tunnel is RSVP type, entropy-label can also be controlled under the config>router>mpls or config>router>mpls>lsp contexts.
The entropy label and hash label features are mutually exclusive. The entropy label cannot be configured on a spoke SDP or service where the hash label feature has already been configured.
no entropy-label
All
This command enables the use of entropy labels on a spoke-SDP bound to an IES interface.
If entropy-label is configured, the entropy label and ELI are inserted in packets for which at least one LSP in the stack for the far-end of the tunnel used by the service has advertised entropy-label-capability. If the tunnel is RSVP, entropy-label can also be controlled under the config>router>mpls or config>router>mpls>lsp contexts.
The entropy label and hash label features are mutually exclusive. The entropy label cannot be configured on a spoke-sdp or service where the hash label feature has already been configured.
no entropy-label
All
This command enables or disables the use of entropy labels for spoke SDPs on a VPRN.
If entropy-label is configured, the entropy label and ELI are inserted in packets for which at least one LSP in the stack for the far-end of the tunnel used by the service has advertised entropy-label-capability. If the tunnel is RSVP type, entropy-label can also be controlled under the config>router>mpls or config>router>mpls>lsp contexts.
The entropy label and the hash label features are mutually exclusive. The entropy label cannot be configured on a spoke SDP or service where the hash label feature has already been configured.
no entropy-label
All
The entropy label is only applicable to PW ports bound to a static port, and not to ports using an FPE.
no entropy-label
All
This command configures the use of entropy labels for MPLS.
The entropy label (EL) and entropy label indicator (ELI) require the insertion of two additional labels in the label stack. In some cases, this may result in an unsupported label stack depth or large changes in the label stack depth during the lifetime of an LSP (for example, due to switching from a primary path with ELC enabled to a secondary path for which the far end has not signaled ELC).
This command provides control at the head end of an RSVP LSP or SR-TE LSP as to whether an EL is inserted on an LSP by ignoring the ELC signaled from the far-end LER, and to control how the additional label stack depth is accounted for.
By default, regardless of the value set for entropy label capability at the egress node, the ingress LER considers the EL and ELI in the label stack while sending the information to the TTM and NHLFE. The application using the LSP does not insert an EL and ELI in the label stack unless the far-end signals ELC and the application is configured to insert an entropy label.
When entropy-label is set to force-disable, the ingress LER does not consider EL and ELC in the label stack when sending the information to the TTM and NHLFE. Therefore, the system marks the TTM and NHLFE as ELC not supported, and applications do not insert an EL or ELI.
The entropy-label command value changes at either the MPLS level or the LSP level. The new operational value does not take effect until the LSP is re-signaled. A shutdown and no shutdown of the LSP is required to enable the new value.
The user can use the clear command or bounce MPLS itself (shutdown/no shutdown) to force the new value to take effect for a large numbers of LSPs.
entropy-label rsvp-te enable
All
This command configures the use of entropy labels for an LSP.
The entropy label (EL) and entropy label indicator (ELI) require the insertion of two additional labels in the label stack. In some cases, this may result in an unsupported label stack depth or large changes in the label stack depth during the lifetime of an LSP (for example, due to switching from a primary path with ELC enabled to a secondary path for which the far end has not signaled ELC).
This command provides control at the head end of an RSVP LSP or SR-TE LSP over whether an entropy label is inserted on an LSP by overriding the ELC signaled from the far-end LER, and control over how the additional label stack depth is accounted for.
By default, the value of entropy-label is inherited from the MPLS level. The command under the LSP context provides a means to override the default MPLS behavior on a per-LSP basis. For auto-LSPs, it can only be configured in LSP templates of type one-hope-p2p and mesh-p2p.
Under the LSP context, when the value of entropy-label is set to enable, the ingress LER will take into consideration what is signaled from the egress node for ELC when marking the NHLFE as entropy-label-capable. Since the value of entropy-label is set to enable at the LSP level, the system will always mark it in the TTM as entropy-label-capable regardless of the signaled value, in order to ensure that the potential additional label stack depth is accounted for. In this scenario, the TTM and NHLFE can be out of synchronization based on what is configured at the egress node. That is, the application will always account for the entropy label and ELI in the label stack without taking into consideration the signaled value of ELC.
When entropy-label is set to force-disable, the ingress LER will not consider EL and ELI in the label stack while sending the information to the TTM and NHLFE, regardless of what the far end signals. Therefore, the system will mark the TTM and NHLFE as ELC not supported, and applications will not insert an EL or ELI.
When the value of entropy-label changes at either the MPLS level or the LSP level, the new operational value will not take effect until the LSP is re-signaled. A shutdown and no shutdown of the LSP is required to enable the new value.
The user can use the clear command or bounce MPLS itself (shutdown and no shutdown) to force the new value to take effect for a large numbers of LSPs.
entropy-label inherit
All
If entropy-label is configured, the Entropy label and Entropy Label Indicator is inserted on packets for which at least one LSP in the stack for the far-end of the LDP or RSVP tunnel used by an IGP or BGP shortcut has advertised entropy-label-capability. If the tunnel is of type RSVP, then entropy-label must also have been enabled under config>router>mpls or config>router>mpls>lsp.
This configuration will result in other traffic that is forwarded over an LDP or RSVP LSP for which this router is the LER, and for which there is no explicit service endpoint on this router, to have the EL/ELI enabled, subject to the LSP far-end advertising entropy-label-capability. An example of such traffic includes packets arriving on a stitched LDP LSP forwarded over an RSVP LSP.
no entropy-label
All
Commands in this context configure entropy label capabilities for the routing protocol.
All
This command instructs the system to ignore any received IGP advertisements of entropy label capability relating to remote nodes in the network. It also prevents a user from configuring override-tunnel-elc for the IGP instance.
The no version of this command enables the processing of any received IGP advertisements of entropy label capability.
entropy-label enable
All
This command enables or disables ELC for RSV.
If entropy-label-capability is configured, then the system will signal (using the procedures specified in RFC 6790) that it is capable of receiving and processing the entropy label and ELI on incoming packets of RSVP and LDP LSPs.
If no entropy-label-capability is configured, then the system will not signal ELC. If an ELI is exposed on a packet where the tunnel label is popped at the termination of that LSP, and an entropy label is not configured, then the packet will be dropped.
no entropy-label-capability
All
This command configures DHCP filter entries.
The no form of this command removes the entry from the configuration.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an entry in the VAS filter.
The no form of this command removes the entry ID from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures an ANCP name. When ANCP is configured to provide rate adaptation without the use of enhanced subscriber management, this command will define how to map an ANCP key (usually the circuit-id of the DSLAM port) to either a SAP and a scheduler name (when a Multi-Service Site (MSS) is not used) or a customer, site and scheduler name when MSS is used.
Different ANCP names may be used with the same SAPs or customer ID/MSS combinations to allow schedulers within the policy to be mapped to the ANCP names. An ANCP string and SAP combination may reference only one ancp-policy. An ANCP string and customer and site-name combination may reference a single ancp-policy.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the IP filter entry.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures a subscriber identification string.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an application profile string.
The no form of this command removes the values from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures an SLA profile string. Each subscriber identification string can be provisioned into a subscriber mapping table providing an explicit mapping of the string to a specific subscriber profile. This allows certain subscribers to be directly mapped to the appropriate subscriber profile in the event that the default mappings are not desired for the subscriber.
An explicit mapping of a subscriber identification string to a subscriber profile cannot be defined with the subscriber profile name default. It is possible for the subscriber identification string to be entered in the mapping table without a defined subscriber profile which can result in the explicitly defined subscriber to be associated with the subscriber profile named default.
Explicitly mapping a subscriber identification string to a subscriber profile will cause an existing active subscriber associated with the string to be reassigned to the newly mapped subscriber profile. An explicit mapping overrides all default subscriber profile definitions.
Attempting to delete a subscriber profile that is currently defined as in an explicit subscriber identification string mapping will fail.
The system will fail the removal attempt of an explicit subscriber identification string mapping to a subscriber profile definition when an active subscriber is using the mapping and cannot be reassigned to a defined default non-provisioned subscriber profile.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures a subscriber profile string.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command defines the direction of the policer or queue to the stored and accumulated policy.
The no form of this command removes the entry.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command creates a new entry for this filter. When processing a packet, entries are matched in order, starting with the lowest entry-id. A maximum of 128 IPv4 and 128 IPv6 DSM filter entries are allowed.
The no form of this command removes the specified entry from the ISA filter.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command matches the specified prefix or suffix string with the selected accounting server policy or authentication server policy.
All
This command creates or edits an mrp-policy entry. Multiple entries can be created using unique entry-id numbers within the policy. The implementation exits the policy on the first match found and executes the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly from most to least explicit. An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword will be considered incomplete and therefore will be rendered inactive.
The no form of this command removes the specified entry from the mrp-policy. Entries removed from the mrp-policy are immediately removed from all services where the policy is applied.
All
This command creates or edits an ISID policy entry. Multiple entries can be created using unique entry-id numbers within the ISID policy.
entry-id — Specifies an entry-id uniquely identifies a ISID range and the corresponding actions. This allows users to insert a new entry in an existing policy without requiring renumbering of all the existing entries.
The following rules govern the usage of multiple entry statements:
no isid - removes all the previous statements under one entry.
no isid value | from value to higher-value - removes a specific ISID value or range. Must match a previously used positive statement: for example, if the command “isid 16 to 100” was used using “no isid 16 to 50”, it will not work but “no isid 16 to 100 will be successful.
Values 1 to 65535
no entry
All
This command is used to create or edit an event filter entry. Multiple entries may be created using unique entry-id values. The SR OS implementation exits the filter on the first match found and executes the action in accordance with the action command.
Comparisons are performed in an ascending entry ID order. When entries are created, they should be arranged sequentially from the most explicit entry to the least explicit. Matching ceases when a packet matches an entry. The entry action is performed on the packet, either drop or forward. To be considered a match, the packet must meet all the conditions defined in the entry.
An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword will be considered incomplete and are rendered inactive.
By default, no filter entries are defined. Entries must be explicitly configured.
The no form of this command removes the specified entry from the event filter. Entries removed from the event filter are immediately removed from all log-id’s where the filter is applied.
No event filter entries are defined. An entry must be explicitly configured.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates an application filter entry.
App filter entries are an ordered list, the lowest numerical entry that matches the flow defines the application for that flow.
An application filter entry or entries configures match attributes of an application.
The no form of this command deletes the specified application filter entry.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates an application QoS policy entry. A flow that matches multiple Application QoS policies (AQP) entries will have multiple AQP entries actions applied. When a conflict occurs for two or more actions, the action from the AQP entry with the lowest numerical value takes precedence.
The no form of this command deletes the specified application QoS policy entry.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a particular Application-Assurance session filter match entry. Every session filter can have zero or more session filter match entries. An application filter entry or entries configures match attributes of an application.
The no form of this command deletes the specified entry.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a TCA for the counter capturing hits for the specified GTP filter entry. A GTP filter entry TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating a default action TCA.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a TCA for the counter capturing hits for the specified GTPv2 message type filter entry. A GTP filter entry TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating an entry TCA.
This command configures a TCA for the counter capturing hits for the specified IMSI-APN filter entry. A GTP IMSI-APN filter entry TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating an entry TCA.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a TCA for the counter capturing hits for the specified SCTP filter PPID entry. An SCTP filter entry TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating a TCA.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a TCA for the counter capturing hits for the specified session filter entry. A session filter entry TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating a TCA.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an entry within the IMSI-APN filter to allow for IMSI-APN match and action configuration.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an entry for a specific GTPv1 message type value.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an entry for a specific GTPv2 message type value.
entry permit
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies if an SCTP PPID value is allowed or not.
The no form of this command removes this PPID. In which case, the default action for the sctp-filter>ppid is applied.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the index to a specific entry of a transit prefix policy.
The no form of this command removes the entry ID from the transit prefix policy configuration.
7450 ESS, 7750 SR, 7750 SR-1s, 7750 SR-2s, 7750 SR-e, VSR
This command configures the certificate profile entry information
The no form of this command removes the entry-id value from the cert-profile configuration.
7450 ESS, 7750 SR, 7750 SR-1s, 7750 SR-2s, 7750 SR-e, VSR
This command creates a new TS-list entry or enables the context to configure an existing TS-list entry.
The no form of this command removes the entry from the local or remote configuration.
7450 ESS, 7750 SR, 7750 SR-1s, 7750 SR-2s, 7750 SR-e, VSR
VSR
This command configures an IPsec security policy entry.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates or edits a nat-classifier entry. Multiple entries can be created using unique entry-id numbers within the nat-classifier. Entries must be sequenced from most to least explicit. An entry may not have any match criteria defined, in which case all UDP traffic will be matched. In case that the action is not explicitly configured, a default-action will be applied.
The no form of the command removes the specified entry from the filter. Entries removed from the nat-classifier are immediately removed from all entities to which the nat-classifier is applied.
none
All
This command creates or edits a Lawful Interception filter entry. Multiple entries can be created using unique entry-id numbers within the filter.
An entry in an LI filter always has an implicit action of “forward”.
The no form of this command removes the specified entry from the filter. Entries removed from the filter are immediately removed from all services or network ports where the associated filter is applied.
LI filter entries can be used as li-source entries.
The entry numbers for LI filters serve purely as keys for managing the entries (deleting entries, and so on). The order of LI filter entries is not guaranteed to match the entry numbers and the software may reorder entries. Operators must use LI entries in a manner such that relative order of the LI entries amongst themselves is not important.
The no form of this command removes the LI entry ID from the configuration.
All
This command is used to create or edit an IP, IPv6, or MAC criteria entry for the policy. Multiple entries can be created using unique entry-id numbers.
The list of flow criteria is evaluated in a top-down manner with the lowest entry ID at the top and the highest entry ID at the bottom. If the defined match criteria for an entry within the list matches the information in the egress packet, the system stops matching the packet against the list and performs the matching entries reclassification actions. If none of the entries match the packet, the IP flow reclassification list has no effect on the packet.
An entry is not populated in the list unless the action command is executed for the entry. An entry that is not populated in the list has no effect on egress packets. If the action command is executed without any explicit reclassification actions specified, the entry is populated in the list allowing packets matching the entry to exit the list, preventing them from matching entries lower in the list. Since this is the only flow reclassification entry that the packet matched and this entry explicitly states that no reclassification action is to be performed, the matching packet will not be reclassified.
The no form of this command removes the specified entry from the policy. Entries removed from the policy are immediately removed from all services where that policy is applied.
An entry cannot have any match criteria defined (in which case, everything matches) but must have at least the keyword action fc fc-name for it to be considered complete. Entries without the action keyword will be considered incomplete and, therefore, will be rendered inactive.
All
This command is used to create or edit an IP or IPv6 criteria entry for the policy. Multiple entries can be created using unique entry numbers.
The list of flow criteria is evaluated in a top-down manner with the lowest entry ID at the top and the highest entry ID at the bottom. If the defined match criteria for an entry within the list matches the information in the packet, the system stops matching the packet against the list and performs the matching entries reclassification actions. If none of the entries match the packet, the IP flow reclassification list has no effect on the packet.
An entry is not populated in the list unless the action command is executed for the entry. An entry that is not populated in the list has no effect on ingress packets. If the action command is executed without any explicit reclassification actions specified, the entry is populated in the list allowing packets matching the entry to exit the list, preventing them from matching entries lower in the list. Since this is the only flow reclassification entry that the packet matched, and this entry explicitly states that no reclassification action is to be performed, the matching packet will not be reclassified.
The configuration of egress prec/DSCP classification and the configuration of an egress IP criteria or IPv6 criteria entry statement within a network QoS policy are mutually exclusive.
Network QoS policies containing egress ip-criteria or ipv6-criteria entry statements are only applicable to network interfaces. Configuration of ip-criteria or ipv6-criteria entry statements in a network egress QoS policy and the application of the policy on any object other than a GRT network interface are mutually exclusive.
The no form of this command removes the specified entry from the policy. Entries removed from the policy are immediately removed from all services to which that policy is applied.
An entry cannot have any match criteria defined (in which case, everything matches) but must have at least the keyword action fc fc-name profile profile for it to be considered complete. Entries without the action keyword will be considered incomplete and will be rendered inactive.
All
VSR
This command creates or edits an IPv4, IPv6, MAC, IP exception filter, or IPv6 exception filter entry. Multiple entries can be created using unique entry-id numbers within the filter. Entries must be sequenced from most to least explicit.
An entry may not have any match criteria defined (in which case everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword will be considered incomplete and hence will be rendered inactive.
The no form of the command removes the specified entry from the filter. Entries removed from the filter are immediately removed from all services or network ports where that filter is applied.
All
This command creates or edits an event filter entry. Multiple entries can be created using unique entry-id values. The SR OS implementation exits the filter on the first match found and executes the action in accordance with the action command.
Comparisons are performed in an ascending entry ID order. When entries are created, they should be arranged sequentially from the most explicit entry to the least explicit. Matching ceases when a packet matches an entry. The entry action is performed on the packet, either drop or forward. To be considered a match, the packet must meet all the conditions defined in the entry.
An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword will be considered incomplete and are rendered inactive.
By default, no filter entries are defined. Entries must be explicitly configured.
The no form of this command removes the specified entry from the event filter. Entries removed from the event filter are immediately removed from all log-id’s where the filter is applied.
All
This command configures an EHS handler action-list entry. A handler can have multiple actions where each action, for example, could request the execution of a different script. When the handler is triggered it will walk through the list of configured actions.
The no form of this command removes the specified EHS handler action-list entry.
All
This command is used to create or edit a management access IP(v4), IPv6, or MAC filter entry. Multiple entries can be created with unique entry-id numbers. The OS exits the filter upon the first match found and executes the actions according to the respective action command. For this reason, entries must be sequenced correctly from most to least explicit.
An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action defined to be considered complete. Entries without the action keyword are considered incomplete and inactive.
The no form of this command removes the specified entry from the management access filter.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies a particular CPM filter match entry. Every CPM filter must have at least one filter match entry. Entries are created and deleted by user.
The default match criteria is match none.
7450 ESS, 7750 SR-14s, 7750 SR-7/12/12e, 7750 SR-7s, 7950 XRS
Builds the specific match and rate criteria. Up to ten entries may exist in up to four CPU protection policies.
The no form of this command reverses the match and rate criteria configured.
no entry
All
This command is used to create a user profile entry.
More than one entry can be created with unique entry-id numbers. Exits when the first match is found and executes the actions according to the accompanying action command. Entries should be sequenced from most explicit to least explicit.
An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete.
The no form of this command removes the specified entry from the user profile.
All
This command defines a particular key in the keychain. Entries are defined by an entry-id. A keychain must have valid entries for the TCP Enhanced Authentication mechanism to work.
If the entry is the active entry for sending, then this causes a new active key to be selected (if one is available using the youngest key rule). If it is the only possible key to send, then the system rejects the command with an error indicating the configured key is the only available send key.
If the key is one of the eligible keys for receiving, it will be removed. If the key is the only possible eligible key, then the command is accepted, and an error indicating that this is the only eligible key will be generated.
The no form of this command removes the entry from the keychain.
The authentication-key can be any combination of letters or numbers.
This is useful when a user must configure the parameter, but, for security purposes, the actual unencrypted key value is not provided.
All
This command configures an entry for the TLS certificate profile. A certificate profile may have up to eight entries. Currently, TLS uses the entry with the smallest ID number when responding to server requests.
The no form of the command deletes the specified entry.
All
This command creates the context to edit route policy entries within an autonomous system path group.
Multiple entries can be created using unique entries. The router exits the filter when the first match is found and executes the action specified. For this reason, entries must be sequenced correctly from most to least explicit.
An entry does not require matching criteria defined (in which case, everything matches) but must have at least define an action in order to be considered complete. Entries without an action are considered incomplete and will be rendered inactive.
The no form of this command removes the specified entry from the autonomous system path group.
All
This command creates the context to edit route policy entries within the route policy statement.
Multiple entries can be created using unique entries. The router exits the filter when the first match is found and executes the action specified. For this reason, entries must be sequenced correctly from most to least explicit.
An entry does not require matching criteria defined (in which case, everything matches) but must have at least define an action in order to be considered complete. Entries without an action are considered incomplete and will be rendered inactive.
The no form of this command removes the specified entry from the route policy statement.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates a classification override, manually setting the category of a hostname.
The no form of this command removes the classification override entry.
no entry
All
This command configures the maximum size of the data structure that can be stored in a single Python cache entry which includes both a value and key.
When requesting to store a data structure, the size of the serialized object is compared with the value specified. If larger, the object will not be stored and Python will return exception.
The no form of this command reverts to the default.
entry-size 256
All
Commands in this context set up the environment preferences.
All
Commands in this context configure MD-CLI session environment parameters.
All
This command configures an Epipe service instance. This command is used to configure a point-to-point epipe service. An Epipe connects two endpoints defined as Service Access Points (SAPs). Both SAPs may be defined in one 7450 ESS, 7750 SR, or 7950 XRS or they may be defined in separate devices connected over the service provider network. When the endpoint SAPs are separated by the service provider network, the far end SAP is generalized into a Service Distribution Point (SDP). This SDP describes a destination and the encapsulation method used to reach it.
No MAC learning or filtering is provided on an Epipe.
When creating a service, you must enter the customer keyword and specify a customer-id to associate the service with a customer. The customer-id must already exist, having been created using the customer command in the service context. After a service has been created with a customer association, it is not possible to edit the customer association. The service must be deleted and re-created with a new customer association.
After a service is created, the use of the customer customer-id is optional for navigating into the service configuration context. Attempting to edit a service with the incorrect customer-id specified will result in an error.
By default, no epipe services exist until they are explicitly created with this command.
The no form of this command deletes the epipe service instance with the specified service-id. The service cannot be deleted until the service has been shutdown.
Cpipe services are enabled on the 7450 ESS.
To create a service, you must assign a service ID; however, after it is created, either the service ID or the service name can be used to identify and reference a service.
If a name is not specified at creation time, then SR OS assigns a string version of the service-id as the name.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies which SAP parameter template should be applied to the l2-ap SAP. This can only be changed when the l2-ap is shut down.
The no form of this command removes the template, the SAP will use default parameters.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies which SAP parameter template should be applied to the l2-ap SAP. This can only be changed when the l2-ap is shutdown.
The no form of this command removes the template, the SAP will use default parameters.
All
This command enables debugging for RIP errors.
All
This command enables debugging for RIPng errors.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command refers to which HTTP status codes a redirect action is applied. Only messages with sizes less than that configured here (custom-msg-size) are eligible for redirect action.
The no form of this command removes the parameters from the configuration.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a drop action for error flows (bad IP checksums, tcp/udp port 0, and so on).
no error-drop
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a TCA for the counter capturing error drops. An error drop TCA can be created for traffic generated from the subscriber side of AA (from-sub) or for traffic generated from the network toward the AA subscriber (to-sub). The create keyword is mandatory when creating an error-drop TCA.
All
This command specifies whether the error handling mechanism for optional transitive path attributes is enabled for this peer group.
All
This command specifies whether updated BGP error handling procedures should be applied.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the error handling action for the policy.
The no form of this command reverts to the default.
error-handling-action continue
All
This command enables debugging for error report RPKI packets.
The no form of this command disables debugging for error report RPKI packets.
All
The context used to define errored frame parameters including thresholds, and windows of time to which the error count will be compared. An errored frame is counted when there is any frame error detected by the Ethernet physical layer. This excludes jumbo frames above 9192 bytes which are dropped prior to this function.
All
The context used to define errored frame parameters including thresholds, and windows of received packets to which the error count will be compared. An errored frame is counted when there is any frame error detected by the Ethernet physical layer. This excludes jumbo frames above 9192 bytes which are dropped prior to this function. The received packet count will be checked every one second to see if the window has been reached.
All
This command defines the errored frame seconds parameters including thresholds, and windows of time to which the error count will be compared. An errored second is any second in which a single frame error occurred. An errored frame is counted when there is any frame error detected by the Ethernet physical layer. This excludes jumbo frames above 9192 bytes that are dropped prior to this function.
All
This command defines the symbol error parameters including thresholds, and windows of time (converted to symbols in that time) to which the error count will be compared. A symbol error occurs when any encoded symbol is in error and independent of frame counters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables/disables the generation of a specific dynamic data service script debugging event output: errors.
All
This command enables/disables the generation of a specific script debugging event output: errors.
All
This command configures the Ethernet Segment activation timer for a specified Ethernet Segment. The es-activation-timer delays the activation of a specified ethernet-segment on a specified PE that has been elected as DF (Designated Forwarder). Only when the es-activation-timer has expired, the SAP/SDP-binding associated to an ethernet-segment can be activated (in case of single-active multi-homing) or added to the default-multicast-list (in case of all-active multi-homing).
If no es-activation-timer is configured, the system uses the value configured in the config>redundancy>bgp-evpn-multi-homing>es-activation-timer context, if configured. Otherwise the system uses a default value of 3 seconds.
no es-activation-timer
All
This command configures the global Ethernet-Segment activation timer. The es-activation-timer delays the activation of a specified Ethernet-Segment on a specified PE that has been elected as DF (Designated Forwarder). Only when the es-activation-timer has expired, the SAP/SDP-binding associated to an Ethernet-Segment can be activated (in case of single-active multi-homing) or added to the default-multicast-list (in case of all-active multi-homing).
The es-activation-timer configured at the Ethernet-Segment level supersedes this global es-activation-timer.
es-activation-timer 3
All
This command modifies the Originating IP field advertised in the ES route for a given Ethernet Segment. By default, the Originating IP is the system-ip of the PE. However, this value can be changed to the IPv4 or IPv6 address configured with this command.
With the es-orig-ip configured, ES shutdown is required, for the following cases:
The no form of the command changes the originating IP address back to the system-ip.
no es-orig-ip
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s
This command configures or creates an ESA instance with an identifier.
The no form of this command removes the ESA from the system.
7450 ESS, 7750 SR, 7750 SR-1s, 7750 SR-2s, 7750 SR-e
This command specifies the tunnel ESA VM for the tunnel group. The ISA and ESA VM cannot co-exist in the same tunnel group.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s
This command specifies the ISA and ESA VM to be used in the LNS group.
vapp-id: | esa-id/vm-id | |
esa-id | 1 to 16 | |
vm-id | 1 to 4 |
This command configures the ESA VM for the WLAN-GW group. It requires group redundancy to be configured in MDA mode.
vapp-id: | esa-id/vm-id | |
esa-id | 1 to 16 | |
vm-id | 1 to 4 |
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s
This command assigns an ESA-VM to a NAT group.
vapp-id: | esa-id/vm-id | |
esa-id | 1 to 16 | |
vm-id | 1 to 4 |
7750 SR-7/12/12e
This command assigns an ESA-VM to a video group.
The no form of this command removes the specified ESA-VM from the video group.
no esa-vm
vapp-id: | esa-id/vm-id | |
esa-id | 1 to 16 | |
vm-id | 1 to 4 |
All
This command configures the 10-byte Ethernet Segment identifier (ESI) associated to the Ethernet-Segment that will be signaled in the BGP-EVPN routes. The ESI value cannot be changed unless the Ethernet-Segment is shutdown. Reserved esi values (0 and MAX-ESI) are not allowed.
no esi
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables matching on ESM UEs.
The no form of this command disables matching on DSM UEs, unless UE state matching is disabled altogether.
no esm
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables matching on UEs in an ESM state.
The no form of this command disables matching on UEs in an ESM state, unless all state matching is disabled.
no esm
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command allows ESMC frames that are received into the Ethernet port to be tunneled in an Epipe or VPLS service. This is not recommended because it breaks the concepts inherent in Synchronous Ethernet, however it is required for compliance to MEF 6.1.1 EPL Option 2.
The no form of this command extracts the ESMC frames upon reception by the port. The ESMC frames are not tunneled through the service.
no esmc-tunnel
7450 ESS, 7750 SR, 7750 SR-1s, 7750 SR-2s, 7750 SR-e, VSR
This command specifies which hashing algorithm should be used for the authentication function Encapsulating Security Payload (ESP). Both ends of a manually configured tunnel must share the same configuration parameters for the IPsec tunnel to enter the operational state.
The no form of this command disables the authentication.
esp-auth-algorithm sha1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies the hashing algorithm used to perform authentication on the Encapsulating Security Payload (ESP) within NGE packets for services configured using this key group. All SPI entries must be deleted before the no form of the command may be entered or the esp-auth-algorithm value changed from its current value.
The no form of the command reverts to the default value.
esp-auth-algorithm sha256
7450 ESS, 7750 SR, 7750 SR-1s, 7750 SR-2s, 7750 SR-e, VSR
This command specifies the encryption algorithm to use for the IPsec session. Encryption only applies to esp configurations. If encryption is not defined, esp will not be used.
For IPsec tunnels to come up, both ends need to be configured with the same encryption algorithm.
The no form of this command removes the specified encryption algorithm.
Note: When aes-gcm or aes-gmac is configured:
|
esp-encryption-algorithm aes128
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies the encryption algorithm used to perform encryption on the Encapsulating Security Payload (ESP) within NGE packets for services configured using this key group. All SPI entries must be deleted before the no form of the command may be entered or the esp-encryption-algorithm value changed from its current value.
The no form of the command resets the parameter to the default value.
esp-encryption-algorithm aes128
All
This command enables match on existence of ESP Extension Header in the IPv6 filter policy.
The no form of this command ignores ESP Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.
no esp-ext-hdr
7750 SR-7/12
This command allows a new RoHS compliant 7750 SR-12 or 7750 SR-7 chassis to operate as an 7450 ESS-12 or 7450 ESS-7 system.
After entering this command, the system must be rebooted for the change to take effect.
If the RoHS compliant 7750 SR-12 or 7750 SR-7 chassis is operating as an 7450 ESS system, it can operate with either the 7750 SR or 7450 ESS CPM (subject to SR OS support) but both should always be the same type.
In addition, the system can operate with supported 7450 ESS or 7750 SR IOMs, MDAs, and IMMs.
The no form of this command disables this mode of operation and returns the system to a 7750 SR chassis type operation on the next reboot.
no ess-system-type
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the maximum length of a fragment to be transmitted.
The no form of this command reverts to the default.
All
This command configures the FRF.12 fragmentation threshold.
The no form of this command removes the value.
ete-fragment-threshold 128
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command sets the maximum length, in bytes, of a fragment transmitted across a Frame Relay SAP with the FRF.12 end-to-end fragmentation enabled.
The no form of this command resets the fragment threshold back to the default value.
ete-fragment-threshold 128
This command specifies the maximum length of a fragment to be transmitted.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Ethernet Bandwidth Notification (ETH-BN) message handling.
All
This command allows rate changes received in ETH-BN messages on a port-based MEP to update the egress rate used on the port. The egress rate is capped by the minimum of the configured egress-rate and the maximum port rate, and the minimum egress rate is 1 kb/s. The no form of this command returns the value to the default.
no eth-bn-egress-rate-changes
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure 802.1ag CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM debugging functions.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ETH-CFM parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure 802.1ag CFM parameters.
7450 ESS, 7750 SR-14s, 7750 SR-7/12/12e, 7750 SR-7s, 7950 XRS
Provides the construct under which the different entries within CPU policy can define the match criteria and overall arrival rate of the Ethernet Configuration and Fault Management (ETH-CFM) packets at the CPU.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures a CFM linktrace test in SAA.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures an Ethernet CFM loopback test in SAA.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures an Ethernet CFM two-way delay test in SAA.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures an Ethernet CFM two-way SLM test in SAA.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ITU-T Y.1731 ETH-ED expected defect functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ITU-T Y.1731 ETH-ED expected defect functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ITU-T Y.1731 ETH-ED expected defect functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ITU-T Y.1731 ETH-ED expected defect functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ITU-T Y.1731 ETH-ED expected defect functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure ITU-T Y.1731 ETH-ED expected defect functional parameters.
All
This is the top level of the hierarchy containing Ethernet to Legacy fault notification parameters. This context must activate using the no shutdown command before Ethernet to legacy fault notification can occur for Ipipe services that make use of PPP, MLPPP or HDLC. This is only applicable to Ipipe services with one legacy (PPP, MLPPP or HDLC) connection and an Ethernet SAP. No other services, not other combinations are supported.
This command configures a VPLS SAP to be associated with an Ethernet ring. The SAP port ID is associated with the corresponding Ethernet ring path configured on the same port ID. The encapsulation type must be compatible with the Ethernet ring path encapsulation.
The no form of this command removes the Ethernet ring association from this SAP.
no eth-ring
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures a G.8032 protected Ethernet ring. G.8032 Rings may be configured as major rings with two paths (a&b) or as sub-rings with two paths, or in the case of an interconnection node a single path.
The no form of this command deletes the Ethernet ring specified by the ring-id.
no eth-ring
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables the specified Ethernet satellite configuration context.
The no form of the command deletes the specified Ethernet satellite.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command can be used to perform administrative functions on the specified Ethernet-satellite chassis.
All
This command configures the Ethernet tag value. When configured in the local-attachment-circuit context, the system uses the value in the advertised AD per-EVI route sent for the attachment circuit. When configured in the remote-attachment-circuit context the system compares that value with the eth-tag value of the imported AD per-EVI routes for the service. If there is a match, the system creates an EVPN destination for the Epipe.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command initiates an ETH-CFM test. The implementation supports a single ETH-TST PDU to check unidirectional reachability, launched from a source MEP and terminated on the remote MEP with no response PDU toward the source.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables eth-test functionality on MEP. For this test to work, operators need to configure ETH-test parameters on both sender and receiver nodes. The ETH-test is then performed using the following OAM commands:
oam eth-cfm eth-test mac-address mep mep-id domain md-index association ma-index [priority priority] [data-length data-length]
A check is done for both the provisioning and test to ensure the MEP is an Y.1731 MEP (MEP provisioned with domain format none, association format icc-based). If not, the operation fails. An error message in the CLI and SNMP will indicate the problem.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
For this test to work, operators need to configure ETH-test parameters on both sender and receiver nodes. The ETH-test is then performed using the following OAM commands:
oam eth-cfm eth-test mac-address mep mep-id domain md-index association ma-index [priority priority] [data-length data-length]
The no form of this command disables eth-test capabilities.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
For this test to work, operators need to configure ETH-test parameters on both sender and receiver nodes. The ETH-test is then performed using the following OAM commands:
oam eth-cfm eth-test mac-address mep mep-id domain md-index association ma-index [priority priority] [data-length data-length]
A check is performed for both the provisioning and test to ensure the MEP is an Y.1731 MEP (MEP provisioned with domain format none, association format icc-based). If not, the operation fails. An error message in the CLI and SNMP indicates the problem.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
For ETH-test to work, operators need to configure ETH-test parameters on both sender and receiver nodes. The ETH-test is then performed using the following OAM commands:
oam eth-cfm eth-test mac-address mep mep-id domain md-index association ma-index [priority priority] [data-length data-length]
A check is done for both the provisioning and test to ensure the MEP is an Y.1731 MEP (MEP provisioned with domain format none, association format icc-based). If not, the operation fails. An error message in the CLI and SNMP will indicate the problem.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
For ETH-test to work, operators need to configure ETH-test parameters on both sender and receiver nodes. The ETH-test is then performed using the following OAM commands:
oam eth-cfm eth-test mac-address mep mep-id domain md-index association ma-index [priority priority] [data-length data-length]
A check is done for both the provisioning and test to ensure the MEP is an Y.1731 MEP (MEP provisioned with domain format none, association format icc-based). If not, the operation fails. An error message in the CLI and SNMP will indicate the problem.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables eth-test functionality on MEP. For this test to work, operators need to configure ETH-test parameters on both sender and receiver nodes. The ETH-test is then performed using the following OAM commands:
oam eth-cfm eth-test mac-address mep mep-id domain md-index association ma-index [priority priority] [data-length data-length]
A check is done for both the provisioning and test to ensure the MEP is an Y.1731 MEP (MEP provisioned with domain format none, association format icc-based). If not, the operation fails. An error message in the CLI and SNMP will indicate the problem.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables eth-test functionality on MEP. For this test to work, operators need to configure ETH-test parameters on both sender and receiver nodes. The ETH-test is then performed using the following OAM commands:
oam eth-cfm eth-test mac-address mep mep-id domain md-index association ma-index [priority priority] [data-length data-length]
A check is done for both the provisioning and test to ensure the MEP is an Y.1731 MEP (MEP provisioned with domain format none, association format icc-based). If not, the operation fails. An error message in the CLI and SNMP will indicate the problem.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure Ethernet tunnel client parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures a G.8031 protected Ethernet tunnel.
The no form of this command deletes the Ethernet tunnel specified by the tunnel-id.
This command associates a BVPLS SAP with the global Ethernet tunnel object specified by tunnel-id. Only one-to-one mapping between SAP and Ethernet tunnel is supported in the initial implementation. The global eth-tunnel tunnel-id with at least a member port must be configured in advance for the command to be successful. A SAP will be instantiated using the active path components (member port and control-tag) for VPLS forwarding. The last member port in the Ethernet tunnel cannot be deleted if there is a SAP configured on that eth-tunnel. This command is only available in the BVPLS context.
The no form of this command removes the sap from the Ethernet tunnel object.
no sap is specified
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Ethernet tunnel SAP parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Ethernet tunnel SAP parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Nokia ETH-CFM Grace functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Nokia ETH-CFM Grace functional parameters.
Commands in this context configure Nokia ETH-CFM Grace functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Nokia ETH-CFM Grace functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Nokia ETH-CFM Grace functional parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Nokia ETH-CFM Grace functional parameters.
All
This command the context to configure Ethernet port attributes.
This context can only be used when configuring Fast Ethernet, gigabit or 10-G Fast Ethernet or Ethernet LAN ports on an appropriate MDA.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Commands in this context configure Ethernet parameters for the Ethernet tunnel.
All
Commands in this context configure Ethernet properties in this SAP.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command causes the associated header to be defined as an Ethernet header template and enables the context to define the Ethernet parameters.
The no form of this command removes the Ethernet header association.
All
Commands in this context configure the Ethernet specific source and destination information, the priority, and the Ethernet tests tools on the launch point.
All
This command specifies that the top customer tag should be used for egress reclassification based on dot1p criteria. This command applies to all dot1p criteria configured in a given SAP egress QoS policy.
The no form of this command means that a service delimiting tag will be used for egress reclassification based on dot1p criteria.
no ethernet-ctag
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the Ethernet header for the NAT sources.
The no form of this command removes the values from the configuration.
All
This command configures an Ethernet Segment instance and its corresponding name. The configuration of the dot1q or qinq nodes is only allowed if the Ethernet Segment (ES) is created as virtual.
For a virtual ES, a port, LAG, or SDP must be created for the ES before configuring a VLAN or vc-id association.
When a port or LAG is added, the type and encap-type values are checked. If the encap-type is dot1q, then only the dot1q node can be configured; the qinq context is not allowed. In the same way, if the encap-type is qinq, then only the qinq node is allowed. A dot1q, qinq, or vc-id range is required for a virtual ES to be operationally active.
All
Configures an Ethernet type II value to be used as a service ingress QoS policy match criterion.
The Ethernet type field is a 2-byte field used to identify the protocol carried by the Ethernet frame. For e.g. 0800 is used to identify the IPv4 packets.
The Ethernet type field is used by the Ethernet version-II frames. IEEE 802.3 Ethernet frames do not use the type field. For IEEE 802.3 frames, use the dsap, ssap, or snap-pid fields as match criteria.
The snap-pid field, etype field, ssap, and dsap fields are mutually exclusive and cannot be part of the same match criteria.
The no form of this command removes the previously entered etype field as the match criteria.
no etype
All
Configures an Ethernet type II Ethertype value to be used as a MAC filter match criterion.
The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify the IPv4 packets.
The Ethernet type field is used by the Ethernet version-II frames. IEEE 802.3 Ethernet frames do not use the type field. For IEEE 802.3 frames, use the dsap, ssap or snap-pid fields as match criteria.
The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.
The no form of the command removes the previously entered etype field as the match criteria.
no etype
All
Configures an Ethernet type II Ethertype value to be used as a MAC filter match criterion.
The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify the IPv4 packets.
The Ethernet type field is used by the Ethernet version-II frames. IEEE 802.3 Ethernet frames do not use the type field. For IEEE 802.3 frames, use the dsap, ssap or snap-pid fields as match criteria.
The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria. Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Router Configuration Guide for information about MAC Match Criteria Exclusivity Rules fields that are exclusive based on the frame format.
The no form of this command removes the previously entered etype field as the match criteria.
no etype
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures detailed debugging of all events in the GTP system.
The no form of this command disables event debugging.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures an L2TP debugging event.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables the PPP event debug context.
The no form of this command disables PPP event debugging.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables/disables the generation of all dynamic data service script debugging events output: cli, errors, executed-cmd, warnings, state-change.
All
This command allows the user to control the action to be taken when a specific hardware error event is raised against the target MDA.
If no event action has been created for a specific event-type, then the hardware errors related to that event-type are ignored by the management plane of the router.
The no form of this command clears any action defined for the event.
All
This command enables/disables the generation of all script debugging event output: cli, errors, execute-cmd, warnings, state-change.
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables and disables debugging for specific GMPLS events.
All
This command configures debugging for specific LDP events.
All
This command enables debugging for specific events.
The no form of the command disables the debugging.
All
This command enables debugging for specific IP events.
The no form of this command disables debugging for the specified IP events.
All
The event command configures an entry in the RMON-MIB event table. The event command controls the generation and notification of threshold crossing events configured with the alarm command. When a threshold crossing event is triggered, the rmon>event configuration optionally specifies if an entry in the RMON-MIB log table should be created to record the occurrence of the event. It may also specify that an SNMP notification (trap) should be generated for the event. The RMON-MIB defines two notifications for threshold crossing events: Rising Alarm and Falling Alarm.
Creating an event entry in the RMON-MIB log table does not create a corresponding entry in the SR OS event logs. However, when the event-type is set to trap, the generation of a Rising Alarm or Falling Alarm notification creates an entry in the SR OS event logs and that is distributed to all the SR OS log destinations that are configured: CONSOLE, session, memory, file, syslog, or SNMP trap destination.
The SR OS logger message includes a rising or falling threshold crossing event indicator, the sample type (absolute or delta), the sampled value, the threshold value, the RMON-alarm-id, the associated RMON-event-id and the sampled SNMP object identifier.
Use the no form of this command to remove an rmon-event-id from the configuration.
All
This command configures a specific log event as a trigger for one or more EHS handlers. Further matching criteria can be applied to only trigger certain handlers with certain instances of the log event.
The no form of this command removes the specified trigger event.
All
This command is used to specify that a particular event or all events associated with an application is either generated or suppressed.
Events are generated by an application and contain an event number and description explaining the cause of the event. Each event has a default designation which directs it to be generated or suppressed.
Events are generated with a default severity level that can be modified by using the severity-level option.
Events that are suppressed by default are typically used for debugging purposes. Events are suppressed at the time the application requests the event’s generation. No event log entry is generated regardless of the destination. While this feature can save processor resources, there may be a negative effect on the ability to troubleshoot problems if the logging entries are squelched. In reverse, indiscriminate application may cause excessive overhead.
The rate of event generation can be throttled by using the throttle parameter.
The no form of this command reverts the parameters to the default setting for events for the application or a specific event within the application. The severity, generate, suppress, and throttle options will also be reset to the initial values.
Each event has a set of default settings. To display a list of all events and the current configuration use the event-control command.
All
This command allows the user to set the event damping algorithm to suppress QoS or filter change events.
The no form of this command removes the event damping algorithm.
Note: While this event damping is original behavior for some modules such as service manager, QoS, and filters, it can result in the NMS system database being out of sync because of missed change events. On the other hand, if the damping is disabled (no event-damping), it may take much longer to exec a large CLI configuration file after system bootup. |
All
This command configures the event handler to be used for this trigger entry.
The no form of this command removes the event handler configuration.
All
Commands in this context configure authorization for the Event Handling System (EHS). EHS allows user-controlled programmatic exception handling by allowing a CLI script to be executed upon the detection of a log event.
All
Commands in this context configure event handling within the Event Handler System (EHS).
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an event log.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables logging of traffic dropped by TCP validation.
The no form of this command disables logging of traffic dropped by TCP validation.
no event-log
Without the all option, discards related to these cases are not captured in any event log.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command allows AA to treat traffic on UDP port number 2152 as GTP-u. Without further specifying any other parameters within this GTP context, AA performs basic GTP-u header sanity checks and discards packets that are malformed. This GTP context allows the operator to configure various GTP filters (maximum of 128 GTP filters).
no event-log
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an event log for packets dropped by the SCTP filter.
no event-log
This command enables the different threshold events on a specific measurement interval. Only one measurement interval with a configured OAM PM session can have events enabled using the no shutdown command.
All
Allows the frame error sf-threshold crossing events to transmit the Event Notification OAMPDU with the specific Link Event TLV information. The Event Notification OAM PDU will only be generated when the initial sf-threshold is reached. No subsequent notification will be sent until the event that triggered until the event is manually cleared. The burst parameter under the local-sf-action will determine the number of Event Notification OAMPDUs to generate when the event occurs. The reception of the event notification will be processed regardless of this parameter.
The no version of this command will disable the transmission of the Event Notification OAMPDU for this event type.
event-notification
All
This command allows the symbol error event threshold crossing actions to transmit the Event Notification OAM PDU with the specific Link Event TLV information. The Event Notification OAM PDU will only be generated on the initial sf-threshold is reached. No subsequent notification will be sent until the event that triggered the notification clears, through manual intervention or a window where the configured sd-threshold is not reached. The burst parameter under the local-sf-action will determine the number of Event Notification OAM PDUs to generate when the event occurs. The reception of the event notification will be processed regardless of this parameter.
The no version of this command will disable the transmission of the Event Notification OAM PDU for this event type.
event-notification
All
This command defines how to react to the reception of event TLVs contained in the Event Notification OAMPDU. The event TLVs contained in the event notification OAMPDU will be analyzed to determine if the peer has crossed the error threshold for the window. The analysis does not consider any local signal degrades or signal failure threshold. The analysis is based solely on the information receive form the peer. The analysis is performed on all event TLVs contained in the Event Notification OAMPDU without regard for support of a specific error counters or local configuration of any thresholds. In the case of symbol errors only, a threshold below the error rate can be used to return the port to service.
event-notification local-port-action log-only
All
This command defines the number of the Event Notification OAM PDU to be send to the peer if the local signal failure threshold (sf-threshold) has been reached. The sending of the Event Notification OAMPDU is configured under the individual monitors.
Interactions: The sf-thresh threshold will trigger these actions.
All
Commands in this context configure log events as triggers for Event Handling System (EHS) handlers.
All
This command enables a particular debugging event type.
The no form of this command disables the event type debugging.
The following output is an example of event-type information.
All
This command enables a particular debugging event type.
The no form of this command disables the event type debugging.
All
This command enables a particular debugging event type. The no form of this command disables the event type debugging.
7450 ESS, 7750 SR-14s, 7750 SR-2s, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-a, 7750 SR-e
This command configures whether captured traces include events that occurred on the SR OS router, such as mobility and idle-timeout.
events none
All
This command enables debugging for SRRP packets.
The no form of this command disables debugging.
All
This command enables debugging for VRRP events.
The no form of the command disables debugging.
All
This command logs all events changing the state of a BGP peer.
The no form of this command disables the debugging.
All
This command enables debugging for all BMP events.
The no form of the command disables debugging for all BMP events.
All
This command enables debugging for RIP events.
All
This command enables debugging for RIPng events.
All
This command allows you to specify a 2-byte EVPN instance unique in the system. It is used for the service-carving algorithm for multi-homing and auto-deriving route-target and route-distinguishers.
If not specified, the value will be zero and no route-distinguisher or route-targets will be auto-derived from it. If the evi value is specified and no other route-distinguisher/route-target are configured in the service, then the following rules apply:
If vsi-import and export policies are configured, the route-target must be configured in the policies and those values take preference over the auto-derived route-targets. If bgp-ad>vpls-id and bgp-evpn>evi are both configured on the same service, the vpls-id auto-derived route-target/route-distinguisher takes precedence over the evi auto-derived ones The operational route-target for a service will be shown in the show service id bgp command.
The no version of the command will set the evi value back to zero.
All
This command configures the evi ranges for which the PE is primary, or uses the lowest preference algorithm.
Note: Multiple individual evi values and ranges are allowed. |
There are two service-carving manual algorithms for DF election:
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the import mode for the service chaining EVPN service. The import-mode controls the EPVN route types that are imported by the EVPN system.
The no form of this command removes the configuration parameters.
All
Commands in this context configure EVPN parameters.
This command specifies that the SR OS is to cache inter-as EVPN PMSI AD routes for option B.
The no form of this command disables caching of EVPN PMSI AD routes. The default is disabled, however when an upgrade from a software load that does not supports this command is performed, this command will be enabled after the upgrade.
This command is not enabled if the user is using an older configuration file.
no evpn
All
This command enables EVPN Ethernet-Tree (E-Tree) VPLS services on the router (not B-VPLS). It allocates an E-Tree leaf label for the PE and programs the ILM entry.
The command ensures that in-flight traffic can perform an ILM entry lookup at any time, and therefore avoid the discards during shutdown or no shutdown services (or at least reduce the timing window so that it does not occur during normal operation or configuration).
Note: The evpn-etree-leaf-label command must be configured to execute bgp-evpn mpls no shutdown. |
no evpn-etree-leaf-label
All
This command shows IGMP packets for EVPN-MPLS destinations. The no form of this command disables the debugging for EVPN-MPLS destinations
All
This command enables the advertisement of static or dynamic entries that are learned as host or routers (only one option is possible in a specified service), and determines the R flag (host or router) when sending Neighbor Advertisement (NA) messages for existing EVPN entries in the proxy-ND table.
This command cannot be modified without proxy-nd shutdown.
evpn-nd-advertise router
All
This command enables EVPN proxy for IGMP and MLD snooping.
This no form of this command disables EVPN proxy for IGMP and MLD snooping.
All
This command configures a local route tag that can be used on export policies to match MAC/IP routes generated by the proxy-ARP or proxy-ND module. For example, if a new active dynamic proxy-ARP entry is added to the proxy-ARP table and evpn-route-tag is 10, an export policy that matches on tag 10 and adds a site-of-origin community SOO-1, allows the router to advertise the MAC/IP route for the proxy-ARP entry with community SOO-1.
The no form of this command removes the route tag for the generated EVPN MAC/IP routes.
All
This command sets the evpn-tunnel mode for the attached R-VPLS. When enabled for an IPv4 interface, no IPv4 address is required under the same interface. When enabled on an IPv6 interface, the ipv6-gateway-address parameter can be configured as ip or mac.
When configured as evpn-tunnel ipv6-gateway-address ip or simply evpn-tunnel, then:
When configured as evpn-tunnel ipv6-gateway-address mac, then:
The supplementary-broadcast-domain option instructs the data path to exclude EVPN destinations in the Layer 3 lookup for packets coming from an RVPLS SAP and configures the entire set of VPRN as well as attached RVPLS services in OISM mode. Only one SBD RVPLS can exist in a given VPRN. In order to add or remove the supplementary-broadcast-domain option, the entire evpn-tunnel command must first be removed.
The configuration of evpn-tunnel without options is equivalent to the ipv6-gateway-address ip option.
The no form of this command disables the evpn-tunnel mode.
no evpn-tunnel
All
This command matches BGP routes based on the EVPN route type. The route types supported in SR OS are the following:
The no form of this command removes the evpn-type matching.
All
Commands in this context configure the queue exceed drop tail parameters. The exceed drop tail defines the queue depth beyond which exceed-profile packets will not be accepted into the queue and will be discarded.
All
Commands in this context configure the queue exceed drop-tail parameters. The exceed drop tail defines the queue depth beyond which exceed-profile packets will not be accepted into the queue and will be discarded.
All
This command controls the action performed upon the extracted control packets when the configured policer rates are exceeded.
exceed-action none
All
This command controls the action performed upon the extracted control packets when the configured policer rates are exceeded.
exceed-action none
When the SR OS software detects that an enforcement policer has marked or discarded one or more packets (software may detect this some time after the packets are actually discarded), and an optional hold-down seconds value has been specified for the exceed-action, then the policer will be set into a “mark-all” or “drop-all” mode that cause the following:
The hold-down is cleared after approximately the configured time in seconds after it was set. The hold-down seconds option should be selected for protocols that receive more than one packet in a complete handshake/negotiation (for example, DHCP, PPP). hold-down is not applicable to a local monitoring policer. The “detection-time” will only start after any hold-down is complete. During the hold-down (and the detection-time), the policer is considered as in an “exceed” state. The policer may re-enter the hold-down state if an exceed packet is detected during the detection-time countdown.
Configuring the indefinite parameter value will cause hold down to remain in place until the operator clears it manually using a tools command (tools perform security dist-cpu-protection release-hold-down) or removes the dist-cpu-protection policy from the object.
Configuring the none parameter value will disable hold down.
All
This command includes the exceed profile octets discarded count.
The no form of this command excludes the exceed profile octets discarded count.
no exceed-profile-octets-discarded-count
All
This command includes the exceed profile octets forwarded count.
The no form of this command excludes the exceed profile octets forwarded count.
no exceed-profile-octets-forwarded-count
All
This command includes the exceed profile octets offered count.
The no form of this command excludes the exceed profile octets offered count.
no exceed-profile-octets-offered-count
All
This command includes the exceed profile packets discarded count.
The no form of this command excludes the exceed profile packets discarded count.
no exceed-profile-packets-discarded-count
All
This command includes the exceed profile packets forwarded count.
The no form of this command excludes the exceed profile packets forwarded count.
no exceed-profile-packets-forwarded-count
All
This command includes the exceed profile packets offered count.
The no form of this command excludes the exceed profile packets offered count.
no exceed-profile-packets-offered-count
All
The exceed-slope context contains the commands and parameters for defining the exceed Random Early Detection (RED) slope graph. Each egress buffer pool supports an exceed RED slope for managing access to the shared portion of the buffer pool for exceed-profile packets.
The exceed-slope parameters can be changed at any time and the affected buffer pool exceed RED slopes are adjusted appropriately.
The no form of this command restores the exceed slope configuration commands to the default values. If the leaf commands within exceed-slope are set to the default parameters, the exceed-slope node will not appear in save config and show config output unless the detail parameter is present.
All
This command enables STP debugging for exceptions.
The no form of the command disables debugging.
All
This command excludes from LFA SPF calculation prefixes that match a prefix entry or a tag entry in a prefix policy.
The user can exclude an interface in IS-IS or OSPF, an OSPF area, or an IS-IS level from the LFA SPF.
If a prefix is excluded from LFA, then it will not be included in LFA calculation regardless of its priority. The prefix tag will, however, be used in the main SPF.
Note: Prefix tags are defined for the IS-IS protocol but not for the OSPF protocol. |
The default action of the exclude command, when not explicitly specified by the user in the prefix policy, is a “reject”. Thus, regardless of whether the user has explicitly added the statement “default-action reject” to the prefix policy, a prefix that does not match any entry in the policy is accepted into LFA SPF.
The no form of this command deletes the exclude prefix policy.
no exclude
All
This command excludes from LFA SPF calculation prefixes that match a prefix entry or a tag entry in a prefix policy.
The implementation already allows the user to exclude an interface in IS-IS or OSPF, an OSPF area, or an IS-IS level from the LFA SPF.
If a prefix is excluded from LFA, then it will not be included in LFA calculation regardless of its priority. The prefix tag will, however, be used in the main SPF.
Note: Prefix tags are defined for the IS-IS protocol but not for the OSPF protocol. |
The default action of the exclude command, when not explicitly specified by the user in the prefix policy, is a “reject”. Thus, regardless if the user did or did not explicitly add the statement “default-action reject” to the prefix policy, a prefix that did not match any entry in the policy will be accepted into LFA SPF.
The no form of this command deletes the exclude prefix policy.
no exclude
All
This command specifies the admin groups to be excluded when an LSP is set up. Up to five groups per operation can be specified, up to 32 maximum. The admin groups are defined in the config>router>if-attribute>admin-group context.
The config>router>mpls>lsp>primary-p2mp-instance>exclude command is not supported on the 7450 ESS.
Use the no form of this command to remove the exclude command.
no exclude
All
This configures an admin tag to be excluded when matching a route against an LSP.
Up to eight exclusion statements are supported per policy.
The no form of this command removes the admin tag from the exclude statement.
All
Commands in this context configure administrative groups that will be excluded from the flexible algorithm topology graph.
If the defined FAD includes administrative groups link in its exclude list, the specified links are excluded from the topology graph.
All
All
Commands in this context configure a prefix policy for excluding specific prefixes in the LFA calculation by ISIS or OSPF.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command specifies a range of IP addresses that excluded from the pool of IP addresses in this subnet.
The no form of the removes the parameters from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the L2TP AVPs to exclude.
no exclude-avps
All
This optional command allows the results from probes that map to the specified bins within the bin type to be excluded from the average calculation. Individual counters are incremented in the bin, but the average is not affected by the value of the excluded delay metric for the individual probes in this bin. The bin group does not allow this command to be added, modified, or deleted when a test is actively referencing the bin group. Sessions that reference the bin group must have the bin group and tests shut down before changes can be made.
The no form of this command removes the exclusion, and all bins are included in the average calculation.
no exclude-from-avg forward
no exclude-from-avg backward
no exclude-from-avg round-trip
A hyphen can be entered between bin numbers to include a continuous sequence of bins; for example, entering 7-9 would specify bins 7, 8, and 9. Commas can be entered between bin numbers to include separate or non-continuous bins; for example, entering 0,8,9 would specify bins 0, 8, and 9. Both hyphens and commas can be used in this manner in the same configuration; for example, entering 0,7-9 would include bins 0, 7, 8, and 9. All bin numbers specified as part of this command must be configured. If a specified bin does not exist, the command fails.
All
This command configures the admin group constraint into the route next-hop policy template.
Each group is entered individually. The include-group statement instructs the LFA SPF selection algorithm to pick up a subset of LFA next-hops among the links that belong to one or more of the specified admin groups. A link that does not belong to at least one of the admin-groups is excluded. However, a link can still be selected if it belongs to one of the groups in an include-group statement but also belongs to other groups that are not part of any include-group statement in the route next-hop policy.
The pref option is used to provide a relative preference for the admin group to select. A lower preference value means that LFA SPF will first attempt to select an LFA backup next-hop that is a member of the corresponding admin group. If none is found, then the admin group with the next highest preference value is evaluated. If no preference is configured for a given admin group name, then it is supposed to be the least preferred, that is, numerically the highest preference value.
When evaluating multiple include-group statements within the same preference, any link that belongs to one or more of the included admin groups can be selected as an LFA next-hop. There is no relative preference based on how many of those included admin groups the link is a member of.
The exclude-group statement simply prunes all links belonging to the specified admin group before making the LFA backup next-hop selection for a prefix.
If the same group name is part of both include and exclude statements, the exclude statement will win. It other words, the exclude statement can be viewed as having an implicit preference value of zero (0).
The admin-group criteria are applied before running the LFA next-hop selection algorithm.
The no form deletes the admin group constraint from the route next-hop policy template.
All
This command specifies the MAC policy to be excluded from MACsec encryption.
The no form of this command removes the policy from the MACsec and allows all destination MAC addresses.
no exclude-mac-policy
All
This command enables the option to include XRO object in the bypass LSP PATH message object. The exclude-node option is required for manual bypass LSP with XRO to FRR protect ABR node in a multi-vendor network deployment. This command must be configured on the PLR node that protects the ABR node. The ABR node IP address must be configured as exclude-node.
no exclude-node
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command defines a prefix that to be excluded from available prefix in the pool for DHCP6. The typical use case is to exclude the interface address.
The no form of this command removes the prefix that is to be excluded from available prefix in the pool.
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D | ||
prefix-length | 0 to 128 |
All
Specifies protocols whose packets are not secured using Media Access Control Security (MACsec) when MACsec is enabled on a port.
When this option is enabled in a connectivity association that is attached to an interface, MACsec is not enabled for all packets of the specified protocols that are sent and received on the link.
When this option is enabled on a port where MACsec is configured, packets of the specified protocols will be sent and accepted in clear text.
no exclude-protocol
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies a list of one to five SRLG groups in the optical network which the router can request to the UNI-N that the GMPLS LSP path should avoid by signaling it in the XRO of the RSVP path message. Each group-name must have been defined under config>router>if-attribute>srlg-group.
The no form of the command removes the list of SRLG groups to exclude.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command is to only to EPC. When enabled, TCP errors and retransmission packets are not counted for the purpose of CBC. This setting has no impact on app/app-group aggregate AA stats.
no exclude-tcp-retrans
All
This command specifies the inactivity timer for the exclusive lock time for policy editing. When a session is idle for greater than this time, the lock is removed and the configuration changes is aborted.
exclusive-lock-time 300
This command executes the contents of a text file as if they were CLI commands entered at the console.
exec commands do not have no versions.
Related Commands:
boot-bad-exec: Use this command to configure a URL for a CLI script to exec following a failed configuration boot.
boot-good-exec: Use this command to configure a URL for a CLI script to exec following a successful configuration boot.
stdin can be used as the source of commands for the exec command. When stdin is used as the exec command input, the command list is terminated with <Ctrl-C>, “EOF<Return>” or “eof_string<Return>”.
If an error occurs entering an exec file sourced from stdin, all commands after the command returning the error will be silently ignored. The exec command will indicate the command error line number when the stdin input is terminated with an end-of-file input.
Example:
Assume the test.cfg file has the following commands:
echo $(1)
echo $(2)
echo $(3)
Enter the following command:
exec test.cfg –arguments 10 20 30
The output from this command will be:
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables/disables the generation of a specific dynamic data service script debugging event output: executed-cmd.
All
This command enables/disables the generation of a specific script debugging event output: execute-cmd.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure the exhausted credit service level.
The no form of this command reverts to the default.
exhausted-credit-service-level
This command returns to the context from which the current level was entered. For example, to navigate to the current level on a context by context basis, then the exit command only moves the cursor back one level.
When navigating to the current level by entering a command string, the exit command returns the cursor to the context in which the command was initially entered.
The exit all command moves the cursor all the way back to the root level.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command allows the user to configure the expected RX trail trace identifier (TTI) for path monitoring (PM) in the ODU overhead. This identifier can be a string or a non-printable sequence of bytes. The length of the string or sequence of bytes cannot exceed 64 bytes. This trace should match the far-end port’s PM trace. When this trace does not match the received PM trace, the ODU-TIM alarm will be reported if enabled.
Blank (all zeros)
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command allows the user to configure the expected received payload type value in byte 0 of the Payload structure identifier (PSI) of the OPU overhead. When this values does not match the received value, the OPU-PLM alarm will be reported if it is enabled.
3 for 10GE-LAN/WAN or OC192 with OTU encapsulation; 5 for GFP framed 10GE-LAN with OTU encapsulation.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables the user to configure the expected RX Trail Trace Identifier (TTI) for Section Monitoring (SM) in the OTU overhead. This identifier can be a string or a non-printable sequence of bytes. The length of the string or sequence of bytes cannot exceed 64 bytes. This trace should match the expected far-end port’s SM trace. When this trace does not match the received SM trace, the OTU-TIM alarm will be reported if enabled.
Blank (all zeros)
All
This command is used to configure the maximum amount of time to keep the run history status entry from a script run.
expire-time 3600
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the time that the system continues to track inactive hosts.
The no form of this command removes the values from the configuration.
This command configures the time that the system continues to track inactive hosts.
The no form of this command removes the values from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the time that the system continues to track inactive hosts.
The no form of this command removes the values from the configuration.
no expiry-time
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the time that the system continues to track inactive hosts.
The no form of this command removes the values from the configuration.
no expiry-time
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the time that the system continues to track inactive hosts.
The no form of this command removes the values from the configuration.
no expiry-time
7450 ESS, 7750 SR-7/12/12e, 7750 SR-s, 7950 XRS, VSR
This command defines an explicit ingress switch fabric multicast path assigned to a multicast channel. When defined, the channel is setup with the explicit path as its inactive path. When an explicit path is not defined, all multicast channels are initialized on the secondary path and when they start to consume bandwidth, they are moved to the appropriate path based on the channel attributes and path limitations. Explicit path channels are not allowed to move from their defined path.
The explicit-sf-path command in the bundle context defines the initial path for all channels associated with the bundle unless the channel has an overriding explicit-sw-path defined in the channel context. The channel context may also be overridden by the explicit-sf-path command in the source-override context. The channel and source-override explicit-sf-path settings default to null (undefined) and have no effect unless explicitly set.
The no form of this command restores default path association behavior (dynamic or null depending on the context).
Override sequence — The channel setting overrides the bundle setting. The source-override setting overrides the channel and bundle settings.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures an explicit subscriber mapping.
All
This command enables the exponential-backoff of the login prompt. The exponential-backoff command is used to deter dictionary attacks, when a malicious user can gain access to the CLI by using a script to try admin with any conceivable password.
The no form of this command disables exponential-backoff.
no exponential-backoff
All
This command enables the use of an exponential back-off timer when re-trying an LSP. When an LSP path establishment attempt fails, the path is put into retry procedures and a new attempt will be performed at the expiry of the user-configurable retry timer (config>router>mpls>lsp>retry-timer). By default, the retry time is constant for every attempt. The exponential back-off timer procedures will double the value of the user configured retry timer value at every failure of the attempt to adjust to the potential network congestion that caused the failure. An LSP establishment fails if no Resv message was received and the Path message retry timer expired or a PathErr message was received before the timer expired.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure information related to the export of EVPN BGP routes related to service chaining.
The no form of this command disables exporting EVPN BGP routes related to service chaining
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command specifies the export policies to be used to control routes advertised to BGP neighbors.
When multiple policy names are specified, the policies are evaluated in the order they are specified. A maximum of five (5) policy names can be configured. The first policy that matches is applied.
Note: If a non-existent route policy is applied to a VPRN instance, the CLI generates a warning message. This message is only generated at an interactive CLI session and the route policy association is made. No warning message is generated when a non-existent route policy is applied to a VPRN instance in a configuration file or when SNMP is used. |
The no form of this command removes all route policy names from the export list.
no export — BGP advertises routes from other BGP routes but does not advertise any routes from other protocols unless directed by an export policy.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies an IPv4 route (prefix/length) per subscriber-interface to be exported (announced) to indicate liveness of the subscriber-interface on the WLAN-GW. This route is the one that is monitored in routing by the peer WLAN-GW to decide its state with respect.
The no form of this command reverts to the default.
All
This command is used to specify route policies that control how outbound routes transmitted to certain peers are handled. Route policies are configured in the config>router>policy-options context.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in a peer-group) or neighbor level (only applies to the specified peer). The most specific level is used.
The export command can reference up to 15 objects, where each object is either a policy logical expression or the name of a single policy. The objects are evaluated in the specified order to determine the modifications of each route and the final action to accept or reject the route.
Only one of the 15 objects referenced by the export command can be a policy logical expression consisting of policy names (enclosed in square brackets) and logical operators (AND, OR, NOT). The first of the 15 objects has a maximum length of 255 characters while the remaining 14 objects have a maximum length of 64 characters each.
When multiple export commands are issued, the last command entered overrides the previous command.
When an export policy is not specified, BGP-learned routes are advertised by default; non-BGP routes are not advertised.
The no form of this command removes the policy association.
no export
All
This command configures export routing policies that determine the routes exported from the routing table to IS-IS.
If no export policy is defined, non IS-IS routes are not exported from the routing table manager to IS-IS.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered overrides the previous command. A maximum of five policy names can be specified.
If an aggregate command is also configured in the config>router context, then the aggregation is applied before the export policy is applied.
Routing policies are created in the config>router>policy-options context.
The no form of this command removes the specified policy-name or all policies from the configuration if no policy-name is specified.
no export — No export policy name is specified.
All
This command specifies the policies to export source active state from the source active list into Multicast Source Discovery Protocol (MSDP).
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of this command removes all policies from the configuration.
no export
If you configure an export policy at the global level, each individual peer inherits the global policy. If you configure an export policy at the group level, each individual peer in a group inherits the group’s policy. If you configure an export policy at the peer level, then policy only applies to the peer where it is configured.
All
This command specifies communities to be sent to peers.
target:{ip-address:comm-val | 2byte-asnumber:ext-comm-val | 4byte-asnumber:comm-val} | ||
ip-address: | a.b.c.d | |
comm-val: | 0 to 65535 | |
2byte-asnumber: | 1 to 65535 | |
4byte-asnumber | 0 to 4294967295 |
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command installs the export route in the routing table for active NAT pools.
Once the export route is in the routing table, it can be advertised in the network via a routing protocol. NAT pools in the standby or disabled state will not advertise the export route.
A NAT pool becomes active when it becomes operationally UP, and there is no monitoring route (which is also the export route from the peer) present in the routing node (as received from the network). The pool will transition into standby state in case that the monitoring route (or export route from the peer) is already present in the routing table. In other words, the monitoring route is already advertised as an export route from the peering node with active NAT pool.
The export route can be advertised only from:
no export
Syntax:
ip-prefix/length: | ip-prefix | a.b.c.d |
ip-prefix-length | 0 to 32 |
All
This command configures ABR export policies to filter OSPFv2 Type 3 Summary-LSAs or OSPFv3 Inter-Area-Prefix-LSA between areas, in to only permit the export of specified routes into an area.
This command cannot be used in OSPF area 0.
The no form of this command reverts to the default value.
no export
The specified policy names must be predefined and already exist in the system.
All
This command associates export route policies to determine which routes are exported from the route table to OSPF. Export polices are only in effect if OSPF is configured as an ASBR.
If no export policy is specified, non-OSPF routes are not exported from the routing table manager to OSPF.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of this command removes all policies from the configuration.
no export — No export route policies specified.
The specified policy name(s) must be predefined and already exist in the system.
All
This command specifies the export route policies used to determine which routes are exported to RIP. If no export policy is specified, non-RIP routes will not be exported from the routing table manager to RIP; RIP-learned routes will be exported to RIP neighbors.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of this command removes all policies from the configuration.
no export
All
This command specifies the export route policies used to determine which routes are exported to LDP. Policies are configured in the config>router>policy-options context.
If no export policy is specified, non-LDP routes will not be exported from the routing table manager to LDP. LDP-learned routes will be exported to LDP neighbors. Present implementation of export policy (outbound filtering) can be used “only” to add FECs for label propagation. The export policy does not control propagation of FECs that an LSR receives from its neighbors.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered will override the previous command. A maximum of 5 policy names can be specified.
The no form of this command removes all policies from the configuration.
no export — No export route policies specified.
The specified name(s) must already be defined.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the route to export to the peer. While the export prefix is configured and the value of the object tmnxNatPlLsnRedActive is equal to true, the system exports this prefix in the realm of the virtual router instance associated with this pool; to the NAT redundancy peer, the presence of this prefix is an indication that the Large Scale NAT function in this virtual router instance is active; hence, the export prefix of this system is the monitor prefix of the peer.
The export prefix must be different from the monitor prefix.
no export
ip-prefix: | a.b.c.d |
ip-prefix-length: | 0 to 32 |
All
This command specifies the policies to export source active state from the source active list into Multicast Source Discovery Protocol (MSDP).
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of this command applies no export policies and all SA entries are announced.
no export
If you configure an export policy at the global level, each individual peer inherits the global policy. If you configure an export policy at the group level, each individual peer in a group inherits the group’s policy. If you configure an export policy at the peer level, then policy only applies to the peer where it is configured.
All
This command performs certificate operations.
url-string | <local-url> [up to 99 characters] |
local-url | <cflash-id>/<file-path> |
cflash-id | cf1: | cf2: | cf3: |
All
This command specifies route policies that control the handling of outbound routes transmitted to all peers. Route policies are configured in the config>router>policy-options context.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific level is used.
The export command can reference up to 15 objects, where each object is either a policy logical expression or the name of a single policy. The objects are evaluated in the specified order to determine the modifications of each route and the final action to accept or reject the route.
Only one of the 15 objects referenced by the command can be a policy logical expression consisting of policy names (enclosed in square brackets) and logical operators (AND, OR, NOT). The first of the 15 objects has a maximum length of 255 characters; the remaining 14 objects have a maximum length of 64 characters each.
When multiple export commands are issued, the last command entered overrides the previous command.
When an export policy is not specified, BGP-learned routes are advertised by default and non-BGP routes are not advertised.
The no form of this command removes the policy association.
no export
All
This command configures export routing policies that determine the routes exported from the routing table to IS-IS.
If no export policy is defined, non IS-IS routes are not exported from the routing table manager to IS-IS.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered overrides the previous command. A maximum of five policy names can be specified.
If an aggregate command is also configured in the config>router context, then the aggregation is applied before the export policy is applied.
Routing policies are created in the config>router>policy-options context.
The no form of this command removes the specified policy-name or all policies from the configuration if no policy-name is specified.
All
This command associates export route policies to determine which routes are exported from the route table to OSPF. Export polices are only in effect if OSPF is configured as an ASBR.
If no export policy is specified, non-OSPF routes are not exported from the routing table manager to OSPF.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of this command removes all policies from the configuration.
no export
All
This command configures ABR export policies to filter OSPFv2 Type 3 Summary-LSAs or OSPFv3 Inter-Area-Prefix-LSA between areas, in order to only permit the specified routes from being exported into an area.
This command cannot be used in OSPF area 0.
The no form of this command reverts to the default value.
no export
All
This command specifies the export route policies used to determine which routes are exported to RIP.
If no export policy is specified, non-RIP routes will not be exported from the routing table manager to RIP. RIP-learned routes will be exported to RIP neighbors.
If multiple policy names are specified, the policies are evaluated in the order they are specified. The first policy that matches is applied. If multiple export commands are issued, the last command entered will override the previous command. A maximum of five policy names can be specified.
The no form of the command removes all policies from the configuration.
no export
The specified names must already be defined.
All
This command specifies the export prefix policy to local addresses advertised to this peer.
Policies are configured in the config>router>policy-options context. A maximum of five policy names can be specified.
The no form of this command removes the policy from the configuration.
All
This command creates the CLI context to specify cflowd data filters. These filters allow the administrator to control which flows are sent or are not sent to an associated cflowd collector.
All
This command uses route policy to determine which routes are exported from the VRF to the GRT along with all the forwarding information. These entries are marked as BGP-VPN routes in the GRT. Routes must be in the GRT in order for proper routing to occur from the GRT to the VRF.
no export-grt
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command controls the export of subscriber management host routes from a retail service to the corresponding forwarding wholesale VPRN service.
By default, subscriber management host routes are not exported.
The presence of retail subscriber management host routes in the wholesale VPRN service is required for downstream traffic forwarding in multi-chassis redundancy scenarios with a redundant interface and when the retail subscriber subnets are not leaked in the wholesale VPRN service (allow-unmatching-subnets or unnumbered retail subscriber interface).
This command fails if the subscriber interface is not associated with a forwarding wholesale service subscriber interface or if the subscriber interface is not configured to support address allocation outside the provisioned subnets (allow-unmatching-subnets or unnumbered subscriber interface).
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command assigns an export-id value to a charging group app-group or application to be used for accounting export identification in RADIUS accounting. This ID is encoded in the top 2 bytes of the RADIUS accounting VSA to identify which charging group the counter value represents.
If no export-id is assigned, that counter cannot be added to the aa-sub stats RADIUS export-type. Once a charging group index is referenced, it cannot be deleted without removing the reference.
The no form of this command removes the export-id from the configuration.
no export-id
All
This command allows the best BGP route learned by a VPRN to be exported as a VPN-IP route even when that BGP route is inactive in the route table due to the presence of a preferred BGP-VPN route from another PE. In order for the BGP route to be exported, it must be accepted by the VRF export policy.
This “best-external” type of route advertisement is useful in active/standby multi-homing scenarios because it can ensure that all PEs have knowledge of the backup path provided by the standby PE.
By default, an inactive BGP route cannot be exported from a VPRN.
no export-inactive-bgp
All
This command provides the ability to limit the total number of routes exported from the VRF to the GRT. The value zero (0) provides an override that disables the maximum limit. Setting this value to zero (0) will not limit the number of routes exported from the VRF to the GRT. Configuring a range of one (1) to 1000 will limit the number of routes to the specified value.
The no form of this command sets the export-limit to a default of five (5).
export-limit 5
All
This command configures the maximum number of routes (prefixes) that can be exported into RIP from the route table.
The no form of this command removes the parameters from the configuration.
no export-limit
All
This command configures the maximum number of routes (prefixes) that can be exported into IS-IS from the route table for the VPRN instance.
The no form of this command removes the parameters from the configuration.
no export-limit - The export limit for routes or prefixes is disabled.
All
This command configures the maximum number of routes (prefixes) that can be exported into IS-IS from the route table. After the maximum is reached, a warning log message is sent and additional routes are ignored.
The no form of this command removes the parameters from the configuration.
All
This command configures the maximum number of routes (prefixes) that can be exported into OSPF from the route table. After the maximum is reached, a warning log message is sent and additional routes are ignored.
The no form of this command removes the parameters from the configuration.
no export-limit
All
This command configures the maximum number of routes (prefixes) that can be exported into RIP from the route table.
The no form of the command removes the parameters from the configuration.
no export-limit
All
This command can be used to control how exports are generated by the cflowd process. The default behavior is for flow data to be exported automatically based on the active and inactive time-out values. The alternative mode is manual in which case flow data is only exported when the command “tools perform cflowd manual-export” is issued. The only exception is if the cflowd cache overflows, in which case the normal automatic export process is used.
export-mode automatic
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the AA sub-type used in cflowd record export. The cflowd stats exported to the cflowd collector to look identical to when AA is on the type of system defined by the mode. The following cflowd export fields are affected:
All AA cflowd record types are affected by export-override. To change any of the export-override and/or prefix, cflowd must be shutdown first. When the export-override is set back to default (no export-override) the prefix will also be set back to default.
The no form of this command removes the export override.
no export-override
All
This command specifies the export route policy used to determine which prefixes received from other LDP and T-LDP peers are re-distributed to this LDP peer via the LDP/T-LDP session to this peer. A prefix that is filtered out (deny) will not be exported. A prefix that is filtered in (accept) will be exported.
If no export policy is specified, all FEC prefixes learned will be exported to this LDP peer. This policy is applied in addition to the global LDP policy and targeted session policy.
Policies are configured in the config>router>policy-options context. A maximum of five policy names can be specified. Peer address has to be the peer LSR-ID address.
The no form of this command removes the policy from the configuration.
no export-prefixes - no export route policy is specified
All
This command specifies the export route policy used to determine which FEC prefix label bindings are exported from a targeted LDP session. A route that is filtered out (deny) will not be exported. A route that is filtered in (accept) will be exported.
If no export policy is specified, all bindings learned through a targeted LDP session will be exported to all targeted LDP peers. This policy is applied in addition to the global LDP policy.
Policies are configured in the config>router>policy-options context. A maximum of five policy names can be specified.
The no form of this command removes the policy from the configuration.
All
This command enables exports BGP label route and SR tunnels from the TTM into LDP for the purpose of stitching an LDP FEC to a BGP or SR tunnel for the same destination prefix.
To enable route stitching between LDP and BGP, separately configure tunnel table route export policies in both protocols and enable the advertisement of RFC 3107, Carrying Label Information in BGP-4, formatted labeled routes for prefixes learned from LDP FECs.
The BGP route export policy instructs BGP to listen to LDP route entries in the CPM Tunnel Table. If a /32 LDP FEC prefix matches an entry in the export policy, BGP originates a BGP labeled route, stitches it to the LDP FEC, and re-distributes the BGP labeled route to its Interior Border Gateway Protocol (IBGP) neighbors.
Using the following commands to add LDP FEC prefixes with the from protocol ldp statement in the existing BGP export policy configuration at the global level, peer-group level, or peer level:
To indicate to BGP to evaluate the entries with the from protocol ldp statement in the export policy when applied to a specific BGP neighbor, use commands:
Without the latter configuration, only core IPv4 routes learned from RTM are advertised as BGP labeled routes to the neighbor. No stitching of LDP FEC to the BGP labeled route will be performed for this neighbor even if the same prefix was learned from LDP.
The LDP tunnel table route export policy instructs LDP to listen to BGP route entries in the CPM Tunnel Table. If a /32 BGP labeled route matches a prefix entry in the export policy, LDP originates an LDP FEC for the prefix, stitches it to the BGP labeled route, and re-distributes the LDP FEC to its IBGP neighbors.
The user can add BGP labeled route prefixes with the from protocol bgp statement in the configuration of the LDP tunnel table export policy. The from protocol statement is applied only when the protocol value is ldp. Policy entries with protocol values of rsvp, bgp, or any value other than ldp are ignored at the time the policy is applied to LDP.
In the LDP-to-SR data path direction, LDP listens to SR tunnel entries in the TTM. The user can restrict the export of SR tunnels to LDP from a specific prefix list. The user can also restrict the export to a specific IGP instance by optionally specifying the instance ID in the “from protocol” statement. The statement has an effect only when the protocol value is isis or bgp. Policy entries with any other protocol value are ignored at the time the policy is applied. If the user configures multiple from protocol statements in the same policy or does not include the from protocol statement but adds a default action of accept, then LDP will follow the TTM selection rules to select a tunnel to which it will stitch the LDP ILM:
If an LDP FEC primary next-hop cannot be resolved using an RTM route and a SR tunnel of type SR-ISIS to the same destination prefix matches a prefix entry in the export policy, LDP programs an LDP ILM and stitches it to the SR node-SID tunnel endpoint. LDP also originates an FEC for the prefix and re-distributes it to its LDP peers. When an LDP FEC is stitched to a SR tunnel, packets forwarded will benefit from the protection of the LFA/remote LFA backup next-hop of the SR tunnel.
When resolving a FEC, LDP will prefer RTM over TTM when both resolutions are possible. That is, swapping the LDP ILM to a LDP NHLFE is preferred over stitching it to an SR tunnel endpoint.
Nokia recommends that the user should enable the bfd-enable option on the interfaces in LDP, IGP instance, and BGP contexts to speed up failure detection and activation of the SR LFA/remote-LFA backup next-hop or the BGP backup, depending on the stitching operation.
This feature is limited to IPv4 /32 prefixes in LDP, BGP and SR.
The no form of this command disables the export of BGP and SR tunnels to LDP.
no export-tunnel-table — no tunnel table export route policy is specified.
All
This command exports the LDP tunnels to an IGP instance for the purpose of stitching a SR tunnel to a LDP FEC for the same destination IPv4 /32 prefix.
In the SR-to-LDP data path direction, the SR mapping server provides a global policy for the prefixes corresponding to the LDP FECs the SR stitches to.
When this command is enabled in the segment-routing context of an IGP instance, IGP listens to LDP tunnel entries in the TTM. Whenever a LDP tunnel destination matches a prefix for which IGP received a prefix-SID sub-TLV from a mapping server, it instructs the SR module to program the SR ILM and to stitch it to the LDP tunnel endpoint. The LDP FEC can be resolved via a static route, a IS-IS instance, or an OSPF instance.
When an SR tunnel is stitched to a LDP FEC, packets forwarded will benefit from the protection of the LFA backup next-hop of the LDP FEC.
When resolving a node SID, IGP will prefer resolution of prefix SID received in a IP Reach TLV over a prefix SID received via the mapping server. That is, swapping the SR ILM to a SR NHLFE is preferred over stitching it to a LDP tunnel endpoint.
Nokia recommends that the user should enable the bfd-enable option on the interfaces in both LDP and IGP instance contexts to speed up the failure detection and the activation of the LFA/remote-LFA backup next-hop in either direction of the stitching.
This feature is limited to IPv4 /32 prefixes in both LDP and SR.
The no form of this command disables the exporting of LDP tunnels to the IGP instance.
no export-tunnel-table
All
This command enables exporting, to an IGP instance, the LDP tunnels for the purpose of stitching a SR tunnel to a LDP FEC for the same destination IPv4 /32 prefix.
In the SR-to-LDP data path direction, the SR mapping server provides a global policy for the prefixes corresponding to the LDP FECs that the SR stitches to.
When this command is enabled in the segment-routing context of an IGP instance, IGP listens to LDP tunnel entries in the TTM. Whenever a LDP tunnel destination matches a prefix for which IGP received a prefix-SID sub-TLV from a mapping server, it instructs the SR module to program the SR ILM and to stitch it to the LDP tunnel endpoint. The LDP FEC can be resolved via a static route, a IS-IS instance, or an OSPF instance.
When an SR tunnel is stitched to a LDP FEC, packets forwarded will benefit from the protection of the LFA backup next hop of the LDP FEC.
When resolving a node SID, IGP will prefer resolution of prefix SID received in a IP Reach TLV over a prefix SID received via the mapping server. In other words, the swapping of the SR ILM to a SR NHLFE is preferred over stitching it to a LDP tunnel endpoint.
It is recommended to enable the bfd-enable option on the interfaces in both LDP and IGP instance contexts, to speed up the failure detection and the activation of the LFA/remote-LFA backup next hop in either direction of the stitching.
This feature is limited to IPv4 /32 prefixes in both LDP and SR.
The no form of this command disables the exporting of LDP tunnels to the IGP instance.
All
This command limits the total number of IPv6 routes exported from the VPRN to the GRT. The value “0” provides an override that disables the maximum limit. Setting this value to “0” does not limit the number of routes exported from the VPRN to the GRT. Configuring a range of 1 to 1000 limits the number of routes to the specified value.
The no form of this command sets the export-limit to a default of 5.
export-v6-limit 5
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures string values to use in the application definition.
http-host — Matches the string against the HTTP Host field or TLS Server Name Indicator (SNI).
http-uri — Matches the string against the HTTP URI field.
http-referer — Matches the string against the HTTP Referer field.
http-user-agent — Matches the string against the HTTP User Agent field.
sip-ua — Matches the string against the SIP UA field.
sip-uri — Matches the string against the SIP URI field.
sip-mt — Matches the string against the SIP MT field.
citrix-app — Matches the string against the Citrix app field.
h323-product-id — Matches the string against the h323-product-id field.
tls-cert-subj-org-name — Matches the TLS Certificate Subject Organization Name substring.
tls-cert-subj-common-name — Matches the TLS Certificate Subject Common Name substring.
rtsp-host — Matches the Real Time Streaming Protocol (RTSP) substring host.
rtsp-uri — Matches the RTSP URI substring.
rtsp-ua — Matches the RTSP UA substring.
rtmp-page-host — Matches against the RTMP Page Host field
rtmp-page-uri — Matches against the RTMP Page URI field
rtmp-swf-host — Matches against the RTMP Swf Host field
rtmp-swf-uri — Matches against the RTMP Swf URI field
dns-domain-name — Matches the string against the DNS Name field.
The following syntax is permitted within the substring to define the pattern match criteria:
^<substring>* - matches when <substring> is at the beginning of the object.
*<substring>* - matches when <substring> is at any place within the object.
*<substring>$ - matches when <substring> is at the end of the object.
^<substring>$ - matches when <substring> is the entire object.
* - matches zero to many of any character. A single wildcard as infix in the expression is allowed.
\. - matches any single character
\d - matches any single decimal digit [0-9]
\I - forces case sensitivity (by default, the expression match are case insensitive), the \I can be specified anywhere between
the leading [^*] and trailing [$*]
\* - matches the asterisk character
Rules for <substring> characters:
<substring> must contain printable ASCII characters.
<substring> must not contain the “double quote” character or the “ ” (space) character on its own.
<substring> match is case in sensitive by default.
<substring> must not include any regular expression meta-characters other than "*", "\I", "\.", "\*" and "\d".
The “\” (slash) character is used as an ESCAPE sequence. The following ESCAPE sequences are permitted within the <substring>:
Character to match <substring> input
Hexadecimal Octet YY \xYY
A <substring> that uses the '\' (backslash) ESCAPE character which is not followed by a “\” or “\x” and a 2-digit hex octet is not valid.
Operational notes:
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures an expression string value for pattern-based custom protocols match. A flow matches a custom protocol if the specified string is found at an offset of a TCP/UDP of the first payload packet.
Options:
The no form of this command deletes a specified string expression from the definition.
The “\” (slash) character is used as an ESCAPE sequence. The following ESCAPE sequences are permitted within the expr-string:
Character to match expr-string input
Hexadecimal Octet YY \xYY
An expr-string that uses the '\' (backslash) ESCAPE character which is not followed by a “\” or “\x” and a 2-digit hex octet is not valid.
This command configures the recorder filter expressions.
All
This command creates a route policy AS path regular expression statement to use in route policy entries.
The no form of this command deletes the AS path regular expression statement.
All
This command creates a logical expression to match a route policy community.
The no form of this command deletes the logical expression.
no expression
from community expression "[community list A] OR ([community list B] AND [community list C])"
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a URL list that contains hostnames with wildcards.
The no form of this command removes the URL list containing hostnames with wildcards.
no expression-match
All
Commands in this context configure an extended action for a filter entry's PBR action (configured under config>filter>ip-filter>entry>action and config>filter>ipv6-filter>entry>action contexts). The extended action is executed in addition to the configured PBR action.
The no form of the command removes the extended action.
no extended-action
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command specifies whether extended bandwidth AVPs are supported. Extended bandwidth AVPs are capable of supporting bandwidth values greater than (232 - 1) b/s. The extended AVPs allow bitrates in kb/s and are as follows:
The no form of this command disables the extended bandwidth AVP support.
no extended-bw
All
The extended-community command opens the configuration tree for sending or accepting extended-community based BGP filters.
For the no version of the command to work, all sub-commands (send-orf, accept-orf) must be removed first.
no extended-community
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure Extended Failure Handling (EFH), a mechanism to establish a new Diameter Gy session with the Online Charging Server (OCS) after Credit Control Failure Handling (CCFH) CONTINUE is triggered.
All
This command configures the use of extended LSA format in OSPFv3 as per draft-ietf-ospf-ospfv3-lsa-extend.
Prior to this feature, SR OS used the fixed format LSA to carry the prefix and link information as per RFC 5340, OSPF for IPv6. The fixed format is not extensible and the TLV format of the extended LSA must be used.
With this feature, the default mode of operation for OSPFv3 is referred to as sparse mode, meaning that the router will always advertise the fixed format for existing LSAs and will add the TLV-based extended LSA only when it needs to advertise new sub-TLVs. This mode of operation is similar to the way OSPFv2 advertises the segment routing information. It sends the prefix in the original fixed-format prefix LSA and then follows with the extended prefix TLV which is sent in an extended prefix opaque LSA containing the prefix SID sub-TLV.
The extended-lsa only value enables the full extended LSA mode. This causes all existing and new LSAs to use the extended LSA format.
The OSPFv3 instance must first be shut down before the user can change the mode of operation since the protocol must flush all LSAs and re-establish all adjacencies.
The no form at the OSPFv3 instance level reverts the OSPFv3 instance into the default sparse mode of operation.
extended-lsa sparse
All
This command configures the use of extended LSA format in a OSPFv3 area as per draft-ietf-ospf-ospfv3-lsa-extend.
By default, the area inherits the instance level configuration. The latter defaults to sparse mode of operation. The extended-lsa only value enables the full extended LSA mode and this will cause all existing and new LSAs to use the extended LSA format.
The OSPFv3 instance must first be shut down before the user can change the mode of operation since the protocol must flush all LSAs and re-establish all adjacencies.
The no form at the area level returns the area into the default mode of inheriting the mode from the OSPFv3 instance level.
extended-lsa inherit
All
This command configures BGP to advertise (at session OPEN) the capability to receive IPv4 routes with IPv6 next-hops from the VPRN BGP peers included in the scope of the command. These peers should not send these routes unless they receive the capability. If the SR OS router receives an IPv4 route from a peer to which it did not advertise the necessary capability, the UPDATE message will be considered malformed and causes either a session reset or treat as withdraw behavior depending on the error handling settings.
The no form of this command causes the sending of an extended NH encoding BGP capability to the associated BGP peers to be inherited from a higher configuration level or disabled (if configured at the BGP level).
no extended-nh-encoding
All
This command configures BGP to advertise (at session OPEN) the capability to receive label IPv4, VPN IPv4 routes, or IPv6 next hops from the peers. These peers should not send such routes unless they receive notification of this capability. If the SR OS router receives a label IPv4 or VPN IPv4 route from a peer to which it did not advertise the necessary capability, the UPDATE message will be considered malformed and this will cause either session reset or treat-as-withdraw behavior depending on the error handling settings.
The no form of this command causes the sending of an extended NH encoding BGP capability to the associated BGP peers to be inherited from a higher configuration level or disabled (if configured at the BGP level).
no extended-nh-encoding
All
This command specifies the external route matching criteria for the entry.
no external
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables external allocation of L2-Aware NAT outside IP addresses from the pool.
The no form of the command disables the allocation.
All
This command enables limits on the number of non-default AS-external-LSA entries that can be stored in the LSDB and specifies a wait timer before processing these after the limit is exceeded.
The limit value specifies the maximum number of non-default AS-external-LSA entries that can be stored in the link-state database (LSDB). Placing a limit on the non-default AS-external-LSAs in the LSDB protects the router from receiving an excessive number of external routes that consume excessive memory or CPU resources. If the number of routes reach or exceed the limit, the table is in an overflow state. When in an overflow state, the router does not originate any new AS-external-LSAs and it withdraws all self-originated non-default external LSAs.
The interval specifies the amount of time to wait after an overflow state before regenerating and processing non-default AS-external-LSAs. The waiting period acts like a dampening period, which prevents the router from continuously running Shortest Path First (SPF) calculations caused by the excessive number of non-default AS-external LSAs.
The external-db-overflow must be set identically on all routers attached to any regular OSPF area. OSPF stub areas and not-so-stubby areas (NSSAs) are excluded.
The no form of this command disables limiting the number of non-default AS-external-LSA entries.
no external-db-overflow — No limit on non-default AS-external-LSA entries.
Note: Setting a value of -1 is equivalent to no external-db-overflow. |
All
This command enables limits on the number of non-default AS-external-LSA entries that can be stored in the LSDB and specifies a wait timer before processing these after the limit is exceeded.
The limit value specifies the maximum number of non-default AS-external-LSA entries that can be stored in the link-state database (LSDB). Placing a limit on the non-default AS-external-LSAs in the LSDB protects the router from receiving an excessive number of external routes that consume excessive memory or CPU resources. If the number of routes reach or exceed the limit, the table is in an overflow state. When in an overflow state, the router will not originate any new AS-external-LSAs. In fact, it withdraws all the self-originated non-default external LSAs.
The interval specifies the amount of time to wait after an overflow state before regenerating and processing non-default AS-external-LSAs. The waiting period acts like a dampening period preventing the router from continuously running Shortest Path First (SPF) calculations caused by the excessive number of non-default AS-external LSAs.
The external-db-overflow must be set identically on all routers attached to any regular OSPF area. OSPF stub areas and not-so-stubby areas (NSSAs) are excluded.
The no form of this command disables limiting the number of non-default AS-external-LSA entries.
no external-db-overflow
All
This command configures the external route preference for the IS-IS level.
The external-preference command configures the preference level of either IS-IS level 1 or IS-IS level 2 external routes. By default, the preferences are as listed in the table below.
A route can be learned by the router by different protocols, in which case, the costs are not comparable. When this occurs, the preference decides the route to use.
Different protocols should not be configured with the same preference, if this occurs the tiebreaker is dependent on the default preference table. If multiple routes are learned with an identical preference using the same protocol, the lowest cost route is used. If multiple routes are learned with an identical preference using the same protocol and the costs (metrics) are equal, then the decision of the route to use is determined by the configuration of the ecmp in the config>router context.
Default preferences are listed in Table 52.
Route Type | Preference | Configurable |
Direct attached | 0 | No |
Static route | 5 | Yes |
MPLS | 7 | — |
OSPF internal routes | 10 | No |
IS-IS Level 1 internal | 15 | Yes 1 |
IS-IS Level 2 internal | 18 | Yes 1 |
OSPF external | 150 | Yes |
IS-IS Level 1 external | 160 | Yes |
IS-IS Level 2 external | 165 | Yes |
BGP | 170 | Yes |
BGP | 170 | Yes |
Note:
All
This command configures the preference for OSPF external routes.
A route can be learned by the router from different protocols, in which case the costs are not comparable. If this occurs, preference is used to decide which route is used.
Different protocols should not be configured with the same preference. If this occurs, the tiebreaker is per the default preference table as defined in Table 53. If multiple routes are learned with an identical preference using the same protocol, the lowest cost route is used.
If multiple routes are learned with an identical preference using the same protocol and the costs (metrics) are equal, the decision of which route to use is determined by the configuration of the ecmp in the config>router context.
The no form of this command reverts to the default value.
Route Type | Preference | Configurable |
Direct attached | 0 | No |
Static routes | 5 | Yes |
OSPF internal | 10 | Yes 1 |
IS-IS level 1 internal | 15 | Yes |
IS-IS level 2 internal | 18 | Yes |
RIP | 100 | Yes |
OSPF external | 150 | Yes |
IS-IS level 1 external | 160 | Yes |
IS-IS level 2 external | 165 | Yes |
Note:
external-preference 150 — OSPF external routes have a default preference of 150.
All
This command configures the external route preference for the IS-IS level.
The external-preference command configures the preference level of either IS-IS level 1 or IS-IS level 2 external routes. By default, the preferences are as listed in the table below.
A route can be learned by the router by different protocols, in which case, the costs are not comparable. When this occurs, the preference decides the route to use.
Different protocols should not be configured with the same preference, if this occurs the tiebreaker is dependent on the default preference table. If multiple routes are learned with an identical preference using the same protocol, the lowest cost route is used. If multiple routes are learned with an identical preference using the same protocol and the costs (metrics) are equal, then the decision of the route to use is determined by the configuration of the ecmp in the config>router context.
The no form of this command reverts to the default value.
external-preference (Level 1) — 160
external-preference (Level 2) — 165
Default preferences are listed in the Table 54:
Route Type | Preference | Configurable |
Direct attached | 0 | — |
Static-route | 5 | Yes |
OSPF internal routes | 10 | — |
IS-IS Level 1 internal | 15 | Yes 1 |
IS-IS Level 2 internal | 18 | Yes 1 |
OSPF external | 150 | Yes |
IS-IS Level 1 external | 160 | Yes |
IS-IS Level 2 external | 165 | Yes |
BGP | 170 | Yes |
Note:
All
This command configures the preference for OSPF external routes.
A route can be learned by the router from different protocols, in which case, the costs are not comparable. When this occurs, the preference is used to decide which route will be used.
Different protocols should not be configured with the same preference, if this occurs the tiebreaker is per the default preference table as defined in the Table 55. If multiple routes are learned with an identical preference using the same protocol, the lowest cost route is used.
If multiple routes are learned with an identical preference using the same protocol and the costs (metrics) are equal, then the decision of what route to use is determined by the configuration of the ecmp in the config>router context.
The no form of this command reverts to the default value.
external-preference 150
Route Type | Preference | Configurable |
Direct attached | 0 | No |
Static routes | 5 | Yes |
OSPF internal | 10 | Yes 1 |
IS-IS level 1 internal | 15 | Yes |
IS-IS level 2 internal | 18 | Yes |
RIP | 100 | Yes |
OSPF external | 150 | Yes |
IS-IS level 1 external | 160 | Yes |
IS-IS level 2 external | 165 | Yes |
BGP | 170 | Yes |
Note:
All
This command enables debugging for extranet PIM.
The no form of this command disables PIM extranet debugging.