Nokia 7450 ESS, 7750 SR, 7950 XRS, and VSR 21.7.R1
Legal Disclaimers
Customer Documentation and Product Support
Legal Disclaimers
Customer Documentation and Product Support
Acronyms Reference Guide Release 21.7.R1
Legal notice
7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
Customer Documentation and Product Support
Legal notice
7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms
Customer Documentation and Product Support
Basic System Configuration Guide Release 21.7.R1
Legal notice
Getting Started
About This Guide
Router System Configuration Process
File System Management
The File System
Storage Devices
URLs
Wildcards and Special Characters
File Management Tasks in the Classic CLI
Displaying Directory and File Information
Modifying File Attributes
Creating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Unzipping Files
Repairing the File System
File Management Tasks in the MD-CLI
Displaying Directory and File Information
Modifying File Attributes
Creating and Navigating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Unzipping Files
Repairing the File System
Displaying File Checksums
Boot Options
System Initialization
BOF and Configuration File Encryption
Configuration and Image Loading
Persistent Indices in the Classic and Mixed Configuration Mode
Lawful Intercept
FIPS-140-2 Mode
System Profiles
Initial System Startup Process Flow
Configuration Notes
Configuring Boot Options File with CLI
BOF Configuration Overview
Basic BOF Configuration
Common Configuration Tasks
Searching for the BOF
Accessing the CLI
Console Connection
Configuring BOF Encryption
Configuring the BOF Interactive Menu Password
Configuring Configuration File Encryption
Autoconfigure
Autoconfigure Restrictions
DHCP Discovery of MAC Addresses
IPv6 DUID
IPv6 DHCP RAs
System Administration Commands in the Classic CLI
Viewing the Current Configuration
Modifying and Saving a Configuration
Deleting Bof Parameters
Saving a Configuration to a Different Filename
Rebooting
Setting the MTU Value for the Management Port
System Administration Commands in the MD-CLI
Viewing the Current Configuration
Modifying BOF Parameters
Saving a Configuration
Rebooting
Setting the MTU Value for the Management Port
Debug Configuration
Debug Commands in the Classic CLI
Debug Commands in the MD-CLI
Logging Debug Events in the MD-CLI
Zero Touch Provisioning
ZTP Overview
Network Requirements
Network Support
ZTP Processes
Auto-boot Process
Auto-provisioning Process
DHCP Support for ZTP
DHCP Server Offer Options 66, 67, and 43
Nokia-specific TLV
Supported DHCP Client Options for ZTP
Supported DHCP Server Options for ZTP
DHCP Discovery and Solicitation
DHCP Discovery (IPv4 and IPv6)
DHCP Discovery Options 61 and 77
DHCP Discovery Option 1 DUID (IPv6)
DHCP Solicitation (IPv6)
IPv4 and IPv6 DHCP Support
IPv4 Route Installation Details
IPv6 DHCP/RA Details
ZTP and DHCP Timeouts
ZTP Procedure Details
Node Bootup
Reinitiating ZTP During Normal Node Bootup
BOF
SD Card and Compact Flash Support
Auto-boot Process
Options and Option Modification
CLI Access
Interrupting Auto-boot
Auto-provisioning Process
VLAN Discovery
VLAN Discovery Option
Auto-provisioning Procedure
Out-of-band Management Versus In-band Management
Supported In-band Management Ports
Provisioning Files
Provisioning File Download
Provisioning File Resolution Using DNS
File Download and Redundancy
Example Provisioning File
Proxy Support
Logs and Events
Tools Commands
System Management
System Management Parameters
System Information
System Name
System Contact
System Location
System Coordinates
Naming Objects
Common Language Location Identifier
DNS Security Extensions
System Time
Time Zones
Network Time Protocol (NTP)
SNTP Time Synchronization
CRON
High Availability
HA Features
Redundancy
Software Redundancy
Configuration Redundancy
Component Redundancy
Service Redundancy
Accounting Configuration Redundancy
Nonstop Forwarding
Nonstop Routing (NSR)
CPM Switchover
Synchronization
Configuration and boot-env Synchronization
State Database Synchronization
Synchronization and Redundancy
Active and Standby Designations
When the Active CPM Goes Offline
OOB Management Ethernet Port Redundancy
Persistence
Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
Network Synchronization
Central Synchronization Sub-System
7950 XRS-40 Extension Chassis Central Clocks
Synchronization Status Messages (SSM)
DS1 Signals
E1 Signals
SONET/SDH Signals
DS3/E3
Synchronous Ethernet
Clock Source Quality Level Definitions
Advanced G.781 Features
IEEE 1588v2 PTP
PTP Clock Synchronization
Performance Considerations
Port-Based Timestamping of PTP Messages
PTP Capabilities
PTP Ordinary Slave Clock For Frequency
PTP Ordinary Master Clock For Frequency
PTP Boundary Clock for Frequency and Time
PTP Clock Redundancy
PTP Time for System Time and OAM Time
PTP within Routing Instances
PTSF-unusable for G.8275.1
System-Wide ATM Parameters
QinQ Network Interface Support
Link Layer Discovery Protocol (LLDP)
IP Hashing as an LSR
Satellites
Ethernet Satellites
TDM Satellites
Software Repositories for Satellites
Satellite Software Upgrade Overview
Satellite Configuration
Satellite Client Port ID Formats
Local Forwarding
Port Template
10GE Client Ports
100GE Client Ports
10GE Uplinks on the 64x10GE+4x100GE Satellite
Satellite Uplink Resiliency
Auto-Provisioning
Auto-provisioning limits
Auto-provisioning Process
Auto-provisioning DHCP Rules
Auto-provisioning Failure
Administrative Tasks
Saving Configurations
Specifying Post-Boot Configuration Files
Network Timing
Power Supplies
Automatic Synchronization
Boot-Env Option
Config Option
Manual Synchronization
Forcing a Switchover
System Router Instances
System Configuration Process Overview
Configuration Notes
General
Configuring System Management with CLI
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Time Elements
Zone
Summer Time Coordinates
NTP
Authentication-check
Authentication-key
Broadcast
Broadcastclient
Multicast
Multicastclient
NTP-Server
Peer
Server
SNTP
Broadcast-client
Server-address
CRON
Schedule
ANCP Enhancements
Configuring Synchronization and Redundancy
Configuring Persistence
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy for LAG
Configuring Power Supply Parameters
Configuring ATM System Parameters
Configuring Backup Copies
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Edit Mode
Configuring Timing References
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
System Alarm Contact Inputs
Configuring LLDP
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting Started
About This Guide
Router System Configuration Process
File System Management
The File System
Storage Devices
URLs
Wildcards and Special Characters
File Management Tasks in the Classic CLI
Displaying Directory and File Information
Modifying File Attributes
Creating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Unzipping Files
Repairing the File System
File Management Tasks in the MD-CLI
Displaying Directory and File Information
Modifying File Attributes
Creating and Navigating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Unzipping Files
Repairing the File System
Displaying File Checksums
Boot Options
System Initialization
BOF and Configuration File Encryption
Configuration and Image Loading
Persistent Indices in the Classic and Mixed Configuration Mode
Lawful Intercept
FIPS-140-2 Mode
System Profiles
Initial System Startup Process Flow
Configuration Notes
Configuring Boot Options File with CLI
BOF Configuration Overview
Basic BOF Configuration
Common Configuration Tasks
Searching for the BOF
Accessing the CLI
Console Connection
Configuring BOF Encryption
Configuring the BOF Interactive Menu Password
Configuring Configuration File Encryption
Autoconfigure
Autoconfigure Restrictions
DHCP Discovery of MAC Addresses
IPv6 DUID
IPv6 DHCP RAs
System Administration Commands in the Classic CLI
Viewing the Current Configuration
Modifying and Saving a Configuration
Deleting Bof Parameters
Saving a Configuration to a Different Filename
Rebooting
Setting the MTU Value for the Management Port
System Administration Commands in the MD-CLI
Viewing the Current Configuration
Modifying BOF Parameters
Saving a Configuration
Rebooting
Setting the MTU Value for the Management Port
Debug Configuration
Debug Commands in the Classic CLI
Debug Commands in the MD-CLI
Logging Debug Events in the MD-CLI
Zero Touch Provisioning
ZTP Overview
Network Requirements
Network Support
ZTP Processes
Auto-boot Process
Auto-provisioning Process
DHCP Support for ZTP
DHCP Server Offer Options 66, 67, and 43
Nokia-specific TLV
Supported DHCP Client Options for ZTP
Supported DHCP Server Options for ZTP
DHCP Discovery and Solicitation
DHCP Discovery (IPv4 and IPv6)
DHCP Discovery Options 61 and 77
DHCP Discovery Option 1 DUID (IPv6)
DHCP Solicitation (IPv6)
IPv4 and IPv6 DHCP Support
IPv4 Route Installation Details
IPv6 DHCP/RA Details
ZTP and DHCP Timeouts
ZTP Procedure Details
Node Bootup
Reinitiating ZTP During Normal Node Bootup
BOF
SD Card and Compact Flash Support
Auto-boot Process
Options and Option Modification
CLI Access
Interrupting Auto-boot
Auto-provisioning Process
VLAN Discovery
VLAN Discovery Option
Auto-provisioning Procedure
Out-of-band Management Versus In-band Management
Supported In-band Management Ports
Provisioning Files
Provisioning File Download
Provisioning File Resolution Using DNS
File Download and Redundancy
Example Provisioning File
Proxy Support
Logs and Events
Tools Commands
System Management
System Management Parameters
System Information
System Name
System Contact
System Location
System Coordinates
Naming Objects
Common Language Location Identifier
DNS Security Extensions
System Time
Time Zones
Network Time Protocol (NTP)
SNTP Time Synchronization
CRON
High Availability
HA Features
Redundancy
Software Redundancy
Configuration Redundancy
Component Redundancy
Service Redundancy
Accounting Configuration Redundancy
Nonstop Forwarding
Nonstop Routing (NSR)
CPM Switchover
Synchronization
Configuration and boot-env Synchronization
State Database Synchronization
Synchronization and Redundancy
Active and Standby Designations
When the Active CPM Goes Offline
OOB Management Ethernet Port Redundancy
Persistence
Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
Network Synchronization
Central Synchronization Sub-System
7950 XRS-40 Extension Chassis Central Clocks
Synchronization Status Messages (SSM)
DS1 Signals
E1 Signals
SONET/SDH Signals
DS3/E3
Synchronous Ethernet
Clock Source Quality Level Definitions
Advanced G.781 Features
IEEE 1588v2 PTP
PTP Clock Synchronization
Performance Considerations
Port-Based Timestamping of PTP Messages
PTP Capabilities
PTP Ordinary Slave Clock For Frequency
PTP Ordinary Master Clock For Frequency
PTP Boundary Clock for Frequency and Time
PTP Clock Redundancy
PTP Time for System Time and OAM Time
PTP within Routing Instances
PTSF-unusable for G.8275.1
System-Wide ATM Parameters
QinQ Network Interface Support
Link Layer Discovery Protocol (LLDP)
IP Hashing as an LSR
Satellites
Ethernet Satellites
TDM Satellites
Software Repositories for Satellites
Satellite Software Upgrade Overview
Satellite Configuration
Satellite Client Port ID Formats
Local Forwarding
Port Template
10GE Client Ports
100GE Client Ports
10GE Uplinks on the 64x10GE+4x100GE Satellite
Satellite Uplink Resiliency
Auto-Provisioning
Auto-provisioning limits
Auto-provisioning Process
Auto-provisioning DHCP Rules
Auto-provisioning Failure
Administrative Tasks
Saving Configurations
Specifying Post-Boot Configuration Files
Network Timing
Power Supplies
Automatic Synchronization
Boot-Env Option
Config Option
Manual Synchronization
Forcing a Switchover
System Router Instances
System Configuration Process Overview
Configuration Notes
General
Configuring System Management with CLI
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Time Elements
Zone
Summer Time Coordinates
NTP
Authentication-check
Authentication-key
Broadcast
Broadcastclient
Multicast
Multicastclient
NTP-Server
Peer
Server
SNTP
Broadcast-client
Server-address
CRON
Schedule
ANCP Enhancements
Configuring Synchronization and Redundancy
Configuring Persistence
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy for LAG
Configuring Power Supply Parameters
Configuring ATM System Parameters
Configuring Backup Copies
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Edit Mode
Configuring Timing References
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
System Alarm Contact Inputs
Configuring LLDP
Standards and Protocol Support
Customer Documentation and Product Support
BNG CUPS User Plane Function Guide Release 21.7.R1
Legal notice
Getting started
Packet forwarding control protocol association
UPF PFCP association
PFCP heartbeats and headless mode
Default IBCP session
Operational commands and debugging
Session management
Basic PFCP session functions
Subscribers, QoS, and filters
In-band control plane
IP gateway, services, and routing
Statistics reporting
Operational commands
Fixed access sessions
Fixed access session functions
Downstream IBCP
SAP and group interface templates
Network address translation
Provisioning residential NAT for BNG CUPS
Layer 2 Tunneling Protocol
UPF triggered L2TP access concentrator
Lawful intercept
Provisioning SNMPv3 and LI subscribers for the BNG CUPS UPF
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting started
Packet forwarding control protocol association
UPF PFCP association
PFCP heartbeats and headless mode
Default IBCP session
Operational commands and debugging
Session management
Basic PFCP session functions
Subscribers, QoS, and filters
In-band control plane
IP gateway, services, and routing
Statistics reporting
Operational commands
Fixed access sessions
Fixed access session functions
Downstream IBCP
SAP and group interface templates
Network address translation
Provisioning residential NAT for BNG CUPS
Layer 2 Tunneling Protocol
UPF triggered L2TP access concentrator
Lawful intercept
Provisioning SNMPv3 and LI subscribers for the BNG CUPS UPF
Standards and Protocol Support
Customer Documentation and Product Support
Classic CLI Command Reference Guide 21.7.R1
1. Getting Started
1.1. Command Tree
1.2. Command Descriptions
1.3. Navigational Aids
1.3.1. Context Path
1.3.2. Searching
1.3.3. Linking to the Tree
2. Classic CLI Overview
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Operational Root and Global Commands
2.2.3. CLI environment Commands
2.2.4. CLI monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. exec Files
2.7. CLI Script Control
2.8. Entering CLI Commands
2.8.1. Command Completion
2.8.2. Unordered and Unnamed Parameters
2.8.3. Editing Keystrokes
2.8.4. Absolute Paths
2.8.5. History
2.8.6. Entering Numerical Ranges
2.8.7. Pipe/Match
2.8.8. Pipe/Count
2.8.9. Pipe/reverse-dns
2.8.10. Range Operator Support of Regular Expression Match
2.8.10.1. Regular Expression Symbols in a Regular Expression Match Operation
2.8.11. Redirection
2.9. vi Editor
2.9.1. Summary of vi Commands
2.9.2. Using the vi Commands
2.9.3. EX commands
2.10. Configuration Rollback
2.10.1. Feature Behavior
2.10.2. Rollback and SNMP
2.10.3. Rescue Configuration
2.10.4. Operational Guidelines
2.11. Transactional Configuration
2.11.1. Basic Operation
2.11.2. Transactions and Rollback
2.11.3. Authorization
3. Command Trees
3.1. admin Commands
3.2. bof Commands
3.3. candidate Commands
3.4. configure Commands
3.4.1. configure aaa Commands
3.4.2. configure application-assurance Commands
3.4.3. configure bfd Commands
3.4.4. configure bmp Commands
3.4.5. configure call-trace Commands
3.4.6. configure card Commands
3.4.7. configure cflowd Commands
3.4.8. configure connection-profile Commands
3.4.9. configure connection-profile-vlan Commands
3.4.10. configure esa Commands
3.4.11. configure eth-cfm Commands
3.4.12. configure eth-ring Commands
3.4.13. configure eth-tunnel Commands
3.4.14. configure filter Commands
3.4.15. configure fwd-path-ext Commands
3.4.16. configure gmpls-tun-grp Commands
3.4.17. configure group-encryption Commands
3.4.18. configure info Commands
3.4.19. configure interface-group-handler Commands
3.4.20. configure ipsec Commands
3.4.21. configure isa Commands
3.4.22. configure lag Commands
3.4.23. configure li Commands
3.4.24. configure log Commands
3.4.25. configure macsec Commands
3.4.26. configure mcast-management Commands
3.4.27. configure mirror Commands
3.4.28. configure oam-pm Commands
3.4.29. configure open-flow Commands
3.4.30. configure port Commands
3.4.31. configure port-policy Commands
3.4.32. configure port-xc Commands
3.4.33. configure pw-port Commands
3.4.34. configure python Commands
3.4.35. configure qos Commands
3.4.36. configure redundancy Commands
3.4.37. configure router Commands
3.4.37.1. configure router admin-tags Commands
3.4.37.2. configure router aggregate Commands
3.4.37.3. configure router allow-icmp-redirect Commands
3.4.37.4. configure router allow-icmp6-redirect Commands
3.4.37.5. configure router autonomous-system Commands
3.4.37.6. configure router bfd Commands
3.4.37.7. configure router bgp Commands
3.4.37.8. configure router bier Commands
3.4.37.9. configure router class-forwarding Commands
3.4.37.10. configure router confederation Commands
3.4.37.11. configure router description Commands
3.4.37.12. configure router dhcp Commands
3.4.37.13. configure router dhcp6 Commands
3.4.37.14. configure router disable-selective-fib Commands
3.4.37.15. configure router dns Commands
3.4.37.16. configure router ecmp Commands
3.4.37.17. configure router entropy-label Commands
3.4.37.18. configure router fib-priority Commands
3.4.37.19. configure router fib-telemetry Commands
3.4.37.20. configure router firewall Commands
3.4.37.21. configure router flexible-algorithm-definitions Commands
3.4.37.22. configure router flowspec Commands
3.4.37.23. configure router gmpls Commands
3.4.37.24. configure router gtm Commands
3.4.37.25. configure router gtp Commands
3.4.37.26. configure router icmp-tunneling Commands
3.4.37.27. configure router if-attribute Commands
3.4.37.28. configure router igmp Commands
3.4.37.29. configure router interface Commands
3.4.37.30. configure router ip-fast-reroute Commands
3.4.37.31. configure router ipsec Commands
3.4.37.32. configure router ipv6 Commands
3.4.37.33. configure router ipv6-te-router-id Commands
3.4.37.34. configure router isa-service-chaining Commands
3.4.37.35. configure router isis Commands
3.4.37.36. configure router l2tp Commands
3.4.37.37. configure router ldp Commands
3.4.37.38. configure router ldp-shortcut Commands
3.4.37.39. configure router leak-export Commands
3.4.37.40. configure router leak-export-limit Commands
3.4.37.41. configure router lmp Commands
3.4.37.42. configure router lsp-bfd Commands
3.4.37.43. configure router mc-maximum-routes Commands
3.4.37.44. configure router mcac Commands
3.4.37.45. configure router mld Commands
3.4.37.46. configure router mpls Commands
3.4.37.47. configure router mpls-labels Commands
3.4.37.48. configure router msdp Commands
3.4.37.49. configure router mss-adjust-group Commands
3.4.37.50. configure router mtrace2 Commands
3.4.37.51. configure router multicast-info-policy Commands
3.4.37.52. configure router nat Commands
3.4.37.53. configure router network-domains Commands
3.4.37.54. configure router origin-validation Commands
3.4.37.55. configure router ospf Commands
3.4.37.56. configure router ospf3 Commands
3.4.37.57. configure router p2mp-sr-tree Commands
3.4.37.58. configure router pcep Commands
3.4.37.59. configure router pcp-server Commands
3.4.37.60. configure router pim Commands
3.4.37.61. configure router policy-acct-template Commands
3.4.37.62. configure router policy-options Commands
3.4.37.63. configure router policy-reference-checks Commands
3.4.37.64. configure router radius-proxy Commands
3.4.37.65. configure router radius-server Commands
3.4.37.66. configure router reassembly-group Commands
3.4.37.67. configure router rib-api Commands
3.4.37.68. configure router rip Commands
3.4.37.69. configure router ripng Commands
3.4.37.70. configure router route-next-hop-policy Commands
3.4.37.71. configure router router-advertisement Commands
3.4.37.72. configure router router-id Commands
3.4.37.73. configure router rsvp Commands
3.4.37.74. configure router segment-routing Commands
3.4.37.75. configure router service-prefix Commands
3.4.37.76. configure router sgt-qos Commands
3.4.37.77. configure router shutdown Commands
3.4.37.78. configure router single-sfm-overload Commands
3.4.37.79. configure router static-route-entry Commands
3.4.37.80. configure router static-route-hold-down Commands
3.4.37.81. configure router triggered-policy Commands
3.4.37.82. configure router ttl-propagate Commands
3.4.37.83. configure router tunnel-interface Commands
3.4.37.84. configure router twamp-light Commands
3.4.37.85. configure router vrgw Commands
3.4.37.86. configure router weighted-ecmp Commands
3.4.37.87. configure router wlan-gw Commands
3.4.37.88. configure router wpp Commands
3.4.38. configure saa Commands
3.4.39. configure service Commands
3.4.39.1. configure service apipe Commands
3.4.39.2. configure service cpipe Commands
3.4.39.3. configure service customer Commands
3.4.39.4. configure service dynamic-services Commands
3.4.39.5. configure service epipe Commands
3.4.39.6. configure service fpipe Commands
3.4.39.7. configure service ies Commands
3.4.39.8. configure service ipfix Commands
3.4.39.9. configure service ipipe Commands
3.4.39.10. configure service mac-list Commands
3.4.39.11. configure service mac-notification Commands
3.4.39.12. configure service md-auto-id Commands
3.4.39.13. configure service mrp Commands
3.4.39.14. configure service nat Commands
3.4.39.15. configure service oper-group Commands
3.4.39.16. configure service pbb Commands
3.4.39.17. configure service proxy-arp-nd Commands
3.4.39.18. configure service pw-routing Commands
3.4.39.19. configure service pw-template Commands
3.4.39.20. configure service sdp Commands
3.4.39.21. configure service sdp-group Commands
3.4.39.22. configure service system Commands
3.4.39.23. configure service template Commands
3.4.39.24. configure service upnp Commands
3.4.39.25. configure service vpls Commands
3.4.39.26. configure service vprn Commands
3.4.39.27. configure service vsd Commands
3.4.40. configure sflow Commands
3.4.41. configure sfm Commands
3.4.42. configure subscriber-mgmt Commands
3.4.43. configure system Commands
3.4.44. configure test-oam Commands
3.4.45. configure vrrp Commands
3.5. debug Commands
3.6. environment Commands
3.7. file Commands
3.8. global Commands
3.9. monitor Commands
3.10. oam Commands
4. 3 Commands
4.1. 3gpp-charging-characteristics
4.2. 3gpp-charging-id
4.3. 3gpp-ggsn-address
4.4. 3gpp-ggsn-ipv6-address
4.5. 3gpp-gprs-negotiated-qos-profile
4.6. 3gpp-imsi
4.7. 3gpp-nsapi
4.8. 3gpp-qos-mapping
4.9. 3gpp-rat-type
4.10. 3gpp-selection-mode
4.11. 3gpp-session-stop-indicator
4.12. 3gpp-user-location-info
5. a Commands
5.1. aa-admit-deny
5.2. aa-interface
5.3. aa-specific
5.4. aa-sub
5.5. aa-sub-attributes
5.6. aa-sub-congestion-detection
5.7. aa-sub-counters
5.8. aa-sub-ip
5.9. aa-sub-remote
5.10. aa-sub-study
5.11. aa-sub-suppressible
5.12. aa-sub-tethering-state
5.13. aaa
5.14. aal5-frame-aware
5.15. aarp
5.16. aarp-interface
5.17. abort
5.18. above-offered-allowance
5.19. above-offered-cap
5.20. absolute
5.21. ac-df-capability
5.22. accept-authorization-change
5.23. accept-coa
5.24. accept-from-ebgp
5.25. accept-ivpls-evpn-flush
5.26. accept-mrru
5.27. accept-orf
5.28. accept-remote-loopback
5.29. accept-script-policy
5.30. accept-unprotected-errormsg
5.31. accept-unprotected-pkiconf
5.32. access
5.33. access group
5.34. access-algorithm
5.35. access-loop-encapsulation
5.36. access-loop-information
5.37. access-loop-options
5.38. access-network-location
5.39. accounting
5.40. accounting-1
5.41. accounting-2
5.42. accounting-policy
5.43. accounting-port
5.44. accounting-type
5.45. accounting-update-interval
5.46. acct-authentic
5.47. acct-delay-time
5.48. acct-include-attributes
5.49. acct-interim
5.50. acct-on-off
5.51. acct-on-off-group
5.52. acct-policy
5.53. acct-port
5.54. acct-request-script-policy
5.55. acct-session-id
5.56. acct-stats
5.57. acct-stop
5.58. acct-trigger-reason
5.59. acct-tunnel-connection-fmt
5.60. acct-update-triggers
5.61. accu-stats-policy
5.62. ack
5.63. ack-auth-retry-count
5.64. ack-timeout
5.65. acknowledgment
5.66. action
5.67. action-list
5.68. action-on-fail
5.69. activate
5.70. activate-entry-tag
5.71. active-cpm-protocols
5.72. active-flow-timeout
5.73. active-hold-delay
5.74. active-instance
5.75. active-iom-limit
5.76. active-lease-time
5.77. active-mda-limit
5.78. active-mda-number
5.79. active-outbound-sa
5.80. active-preferred-lifetime
5.81. active-psk
5.82. active-source-limit
5.83. active-valid-lifetime
5.84. activity-threshold
5.85. ad-insert
5.86. ad-per-es-route-target
5.87. ad-server
5.88. ad-validation
5.89. adapt-qos
5.90. adaptation-rule
5.91. adaptive
5.92. adaptive-load-balancing
5.93. add
5.94. add-paths
5.95. add-paths-send-limit
5.96. add-srv6-tlvs
5.97. add-to-received-ebgp
5.98. add-tunnel
5.99. address
5.100. address-avp
5.101. address-pref
5.102. address-range
5.103. address-source
5.104. address-state
5.105. address-type
5.106. adi
5.107. adi-packet
5.108. adj-set
5.109. adj-sid
5.110. adj-sid-hold
5.111. adjacency
5.112. adjacency-set
5.113. adjacency-sid
5.114. adjust-down
5.115. adjust-up
5.116. admin
5.117. admin-bw
5.118. admin-bw-threshold
5.119. admin-group
5.120. admin-group-frr
5.121. admin-password
5.122. admin-state
5.123. admin-status
5.124. admin-tag
5.125. admin-tag-policy
5.126. admin-tags
5.127. adspec
5.128. adv-adj-addr-only
5.129. adv-config-policy
5.130. adv-local-lsr-id
5.131. adv-mtu-override
5.132. adv-noaddrs-global
5.133. adv-service-mtu
5.134. advertise
5.135. advertise-bgp
5.136. advertise-capabilities
5.137. advertise-external
5.138. advertise-inactive
5.139. advertise-interval
5.140. advertise-ipv6-next-hops
5.141. advertise-label
5.142. advertise-ldp-prefix
5.143. advertise-local
5.144. advertise-ne-profile
5.145. advertise-passive-only
5.146. advertise-router-capability
5.147. advertise-selection
5.148. advertise-stale-to-all-neighbors
5.149. advertise-subnet
5.150. advertise-tunnel-link
5.151. advertised-stale-time
5.152. advertising-timeout
5.153. age-time
5.154. agg-rate
5.155. agg-rate-limit
5.156. agg-shaper-weight
5.157. aggregate
5.158. aggregate-contributor
5.159. aggregate-prefix-match
5.160. aggregate-sample-window
5.161. aggregate-shapers
5.162. aggregate-stats
5.163. aggregate-used-paths
5.164. aggregation
5.165. aggregator-id-zero
5.166. agi
5.167. aging
5.168. ah-ext-hdr
5.169. aigp
5.170. aigp-metric
5.171. ais-enable
5.172. alarm
5.173. alarm-cells
5.174. alarm-contact-in-power
5.175. alarm-contact-input
5.176. alarm-notification
5.177. alarms
5.178. alc-acct-triggered-reason
5.179. alc-error-code
5.180. alg
5.181. algorithm
5.182. alias
5.183. align
5.184. all
5.185. all-authorized-session-addresses
5.186. all-events
5.187. all-l1isis
5.188. all-l2isis
5.189. all-octets-offered-count
5.190. all-packets-offered-count
5.191. allocation
5.192. allocation-percent
5.193. allocation-weight
5.194. allow-boot-license-violations
5.195. allow-directed-broadcasts
5.196. allow-dot1q-msaps
5.197. allow-egress-remark-dscp
5.198. allow-export-bgp-vpn
5.199. allow-flex-algo-fallback
5.200. allow-fragmentation
5.201. allow-ftp
5.202. allow-grpc
5.203. allow-icmp-redirect
5.204. allow-icmp6-redirect
5.205. allow-immediate
5.206. allow-ip-int-bind
5.207. allow-ipv6-udp-checksum-zero
5.208. allow-lease-query
5.209. allow-list
5.210. allow-local-management
5.211. allow-multiple-wan-addresses
5.212. allow-netconf
5.213. allow-qinq-network-interface
5.214. allow-reverse-route-override
5.215. allow-ssh
5.216. allow-static
5.217. allow-telnet
5.218. allow-telnet6
5.219. allow-unmatching-prefixes
5.220. allow-unmatching-subnets
5.221. allow-unresolved-leaking
5.222. allow-unsecure-connection
5.223. allow-unsecured-msgs
5.224. allow-user-name
5.225. allowed-peer-as
5.226. allowed-source-macs
5.227. already-signed-in
5.228. alt-port-class-pools
5.229. always-compare-med
5.230. always-set-sender-for-ir
5.231. amber-alarm-threshold
5.232. ambr
5.233. ambr-qos-mapping
5.234. an-gw-address
5.235. analyze-gre-payload
5.236. analyze-l2tp-traffic
5.237. analyze-v4overv6-traffic
5.238. analyzer
5.239. ancp
5.240. ancp-policy
5.241. ancp-static-map
5.242. ancp-string
5.243. anno-rx-timeout
5.244. announce
5.245. anti-spoof
5.246. anycast
5.247. ap-mac-learn-failed
5.248. apipe
5.249. apn
5.250. apn-ambr
5.251. apn-ambr-dl
5.252. apn-ambr-ul
5.253. apn-policy
5.254. app-filter
5.255. app-group
5.256. app-profile
5.257. app-profile-map
5.258. app-profile-string
5.259. app-qos-policy
5.260. app-route-notifications
5.261. app-service-options
5.262. applicant-sm
5.263. application
5.264. application-assurance
5.265. application-assurance-group
5.266. application-link-attributes
5.267. application-policy
5.268. application6
5.269. applications
5.270. apply-bgp-nh-override
5.271. apply-function-specific-behavior
5.272. apply-path
5.273. apply-to
5.274. aps
5.275. aqp-initial-lookup
5.276. arbiter
5.277. arbiter-stats
5.278. area
5.279. area-id
5.280. area-range
5.281. arp
5.282. arp-host
5.283. arp-host-route
5.284. arp-learn-unsolicited
5.285. arp-limit
5.286. arp-populate
5.287. arp-populate-host-route
5.288. arp-proactive-refresh
5.289. arp-reply-agent
5.290. arp-retry-timer
5.291. arp-route-tag
5.292. arp-timeout
5.293. as-matrix
5.294. as-override
5.295. as-path
5.296. as-path-group
5.297. as-path-ignore
5.298. as-path-length
5.299. as-path-prepend
5.300. asbr
5.301. assert
5.302. assert-period
5.303. assignment
5.304. assignment-id
5.305. assisted-replication
5.306. assisted-replication-ip
5.307. assistive-address-resolution
5.308. association
5.309. association-setup-retry
5.310. async-mapping
5.311. asynchronous-execution
5.312. asynchronous-retention
5.313. atm
5.314. atm-location-id
5.315. atm-ping
5.316. atm-td-profile
5.317. atm-vci
5.318. attempts
5.319. attrib
5.320. attribute
5.321. attribute-matching
5.322. attribute-table-high-wmark
5.323. attribute-table-low-wmark
5.324. attribute-table-size
5.325. audio-template
5.326. augment-route-table
5.327. auth
5.328. auth-domain-name
5.329. auth-include-attributes
5.330. auth-keychain
5.331. auth-method
5.332. auth-policy
5.333. auth-port
5.334. auth-request-script-policy
5.335. authenticate
5.336. authenticate-client
5.337. authenticate-on-dhcp
5.338. authenticated-brg-only
5.339. authentication
5.340. authentication-check
5.341. authentication-key
5.342. authentication-order
5.343. authentication-origin
5.344. authentication-policy
5.345. authentication-type
5.346. authenticator-init
5.347. authorization
5.348. authorized-only
5.349. auto-bandwidth
5.350. auto-bandwidth-multipliers
5.351. auto-bind-tunnel
5.352. auto-boot
5.353. auto-config
5.354. auto-config-save
5.355. auto-creation
5.356. auto-crl-update
5.357. auto-disc-route-advertisement
5.358. auto-discovery
5.359. auto-discovery-disable
5.360. auto-eap-method
5.361. auto-eap-own-method
5.362. auto-edge
5.363. auto-esi
5.364. auto-establish
5.365. auto-learn-mac-protect
5.366. auto-lifetimes
5.367. auto-lsp
5.368. auto-mep-discovery
5.369. auto-reply
5.370. auto-rp
5.371. auto-rp-discovery
5.372. auto-rx
5.373. auto-sub-id-key
5.374. auto-tx
5.375. autoconfigure
5.376. autonegotiate
5.377. autonomous
5.378. autonomous-system
5.379. autonomous-system-type
5.380. aux-channel-enable
5.381. aux-stats
5.382. availability
5.383. avg-flr-event
5.384. avg-frame-overhead
5.385. avp
5.386. avp-hiding
5.387. avp-match
5.388. avp-subscription-id
6. b Commands
6.1. back
6.2. backbone-vpls
6.3. backup
6.4. backup-class-type
6.5. backup-next-hop
6.6. backup-node-sid
6.7. backup-path
6.8. backup-remote-ip
6.9. backup-tag
6.10. bandwidth
6.11. bandwidth-distribution
6.12. bandwidth-policer
6.13. bandwidth-policy
6.14. base-op-authorization
6.15. base-r13-modules
6.16. base-routing-instance
6.17. base-user-name
6.18. bd
6.19. bd-mac-prefix
6.20. bearer-fteid
6.21. begin
6.22. begin-time
6.23. ber-sf-link-down
6.24. bert
6.25. best-path-selection
6.26. bfd
6.27. bfd-designate
6.28. bfd-enable
6.29. bfd-on-distributing-only
6.30. bfd-sessions
6.31. bfd-template
6.32. bfd-trap-suppression
6.33. bfr-id
6.34. bgp
6.35. bgp-ad
6.36. bgp-auto-rd-range
6.37. bgp-evpn
6.38. bgp-evpn-multi-homing
6.39. bgp-high-priority
6.40. bgp-ipvpn
6.41. bgp-labels-hold-timer
6.42. bgp-leak
6.43. bgp-med
6.44. bgp-multi-homing
6.45. bgp-peering-policy
6.46. bgp-peers
6.47. bgp-shared-queue
6.48. bgp-shortcut
6.49. bgp-transport-tunnel
6.50. bgp-tunnel
6.51. bgp-tunnel-metric
6.52. bgp-vpls
6.53. bgp-vpls-mh-ve-id
6.54. bgp-vpws
6.55. bi
6.56. bier
6.57. bier-ping
6.58. bier-signaling
6.59. bier-trace
6.60. bin
6.61. bin-group
6.62. bin-type
6.63. bind-authentication
6.64. binding
6.65. binding-label
6.66. binding-operator
6.67. binding-sid
6.68. bindings
6.69. bit-error-insertion
6.70. bit-error-threshold
6.71. bit-rate-high-wmark
6.72. bit-rate-low-wmark
6.73. bits
6.74. bits-interface-type
6.75. black-hole
6.76. black-hole-dup-mac
6.77. blackhole-aggregate
6.78. block-length
6.79. block-limit
6.80. block-on-mesh-failure
6.81. block-on-peer-fault
6.82. block-prefix-sid
6.83. bluetooth
6.84. bmp
6.85. bof
6.86. bonding-active-connections
6.87. bonding-id
6.88. bonding-parameters
6.89. bonding-selection
6.90. booking-factor
6.91. boot-bad-exec
6.92. boot-good-exec
6.93. boot-timer
6.94. bootstrap-export
6.95. bootstrap-import
6.96. boundary-type
6.97. bpdu
6.98. bpdu-translation
6.99. breakout
6.100. brg
6.101. brg-id
6.102. brg-num-active-sessions
6.103. brg-profile
6.104. bridge-identifier
6.105. bridge-priority
6.106. broadcast
6.107. broadcast-client
6.108. broadcast-policer
6.109. broadcast-queue
6.110. broadcastclient
6.111. bsm-check-rtr-alert
6.112. bsr
6.113. bsr-candidate
6.114. buffer-allocation
6.115. buffer-pool
6.116. buffer-type
6.117. buffering
6.118. build-packet
6.119. buildout
6.120. bundle
6.121. burst-limit
6.122. bw-activity
6.123. bypass-resignal-timer
7. c Commands
7.1. c-mcast-signaling
7.2. ca-name
7.3. ca-profile
7.4. cache
7.5. cache-reset
7.6. cache-response
7.7. cache-size
7.8. cak
7.9. calculate-counts
7.10. call-trace
7.11. called-station-id
7.12. calling-number-format
7.13. calling-station-id
7.14. cancel-commit
7.15. candidate
7.16. cannot-change-password
7.17. capacity-cost
7.18. captive-redirect
7.19. capture
7.20. capture-sap
7.21. card
7.22. card-type
7.23. carrier-carrier-vpn
7.24. category
7.25. category-map
7.26. category-map-name
7.27. cbs
7.28. cc-error
7.29. ccag
7.30. ccm-enable
7.31. ccm-hold-time
7.32. ccm-interval
7.33. ccm-ltm-priority
7.34. ccm-padding-size
7.35. ccm-tlv-ignore
7.36. ccrt-replay
7.37. cd
7.38. ce-address
7.39. ce-address-discovery
7.40. cell-concatenation
7.41. cell-format
7.42. cem
7.43. cert
7.44. cert-file
7.45. cert-profile
7.46. cert-request
7.47. cert-sync
7.48. certificate
7.49. certificate-display-format
7.50. certificate-expiration-warning
7.51. certificate-profile
7.52. cflash-cap-alarm
7.53. cflash-cap-alarm-pct
7.54. cflash-cap-warn
7.55. cflash-cap-warn-pct
7.56. cflowd
7.57. cflowd-parameters
7.58. cfm-mac-advertisement
7.59. cfm-opcode
7.60. chain-to-system-filter
7.61. challenge
7.62. change-reporting-action
7.63. channel
7.64. channel-group
7.65. channelized
7.66. chap-challenge-length
7.67. characteristic
7.68. charging-characteristics
7.69. charging-group
7.70. charging-rule-base-name
7.71. chassis-level
7.72. chassis-mode
7.73. check-zero
7.74. child-control
7.75. chli-event
7.76. cipher
7.77. cipher-list
7.78. cipher-suite
7.79. cir
7.80. cir-non-profiling
7.81. circuit-id
7.82. circuit-id-from-auth
7.83. cisco-hdlc
7.84. cisco-nas-port
7.85. ckn
7.86. class
7.87. class-forwarding
7.88. class-forwarding-policy
7.89. class-pool
7.90. class-type
7.91. class-type-bw
7.92. class-weight
7.93. classes
7.94. classic-cli
7.95. classic-lsn-max-subscriber-limit
7.96. classic-lsn-sub
7.97. classification-overrides
7.98. classifier
7.99. clear
7.100. clear-alarm-msg
7.101. clear-df-bit
7.102. clear-ocsp-cache
7.103. clear-request
7.104. clear-tag-mode
7.105. cli
7.106. cli-engine
7.107. cli-script
7.108. cli-session-group
7.109. cli-user
7.110. client
7.111. client-application
7.112. client-applications
7.113. client-cert-subject-key-id
7.114. client-cipher-list
7.115. client-db
7.116. client-down-delay
7.117. client-id
7.118. client-identification
7.119. client-ip
7.120. client-kex-list
7.121. client-mac
7.122. client-mac-address
7.123. client-mac-list
7.124. client-meg-level
7.125. client-name
7.126. client-port
7.127. client-tls-profile
7.128. clli-code
7.129. clock-mode
7.130. clock-offset
7.131. clock-source
7.132. clock-type
7.133. close-session
7.134. clp-change
7.135. clp-tagging
7.136. cluster
7.137. cluster-id
7.138. cmpv2
7.139. cn
7.140. coa
7.141. coa-script-policy
7.142. code-type
7.143. coherent
7.144. cold-start-wait
7.145. collect-aa-acct-stats
7.146. collect-lmm-fc-stats
7.147. collect-lmm-stats
7.148. collect-stats
7.149. collection-interval
7.150. collector
7.151. color
7.152. combined-max-sessions
7.153. command-accounting-during-load
7.154. command-completion
7.155. commit
7.156. common-name-list
7.157. community
7.158. community-count
7.159. compare
7.160. compare-origin-validation-state
7.161. compatibility
7.162. compatible-rfc1583
7.163. compatible-version
7.164. complexity-rules
7.165. comprehensive
7.166. compress
7.167. conditional-expression
7.168. confederation
7.169. confidence
7.170. config-backup
7.171. configuration-mode
7.172. configure
7.173. confirm
7.174. cong-priority-threshold
7.175. congestion-override
7.176. congestion-override-stage2
7.177. congestion-threshold
7.178. connect-retry
7.179. connection
7.180. connection-profile
7.181. connection-profile-vlan
7.182. connection-timeout
7.183. connection-timer
7.184. connectivity-association
7.185. connectivity-verification
7.186. connectivity-verify
7.187. connector
7.188. consider-system-ip-in-gep
7.189. console
7.190. console-speed
7.191. contact
7.192. context
7.193. continuous
7.194. control
7.195. control-channel
7.196. control-channel-router
7.197. control-channel-status
7.198. control-mep
7.199. control-tag
7.200. control-word
7.201. controlword
7.202. convergence
7.203. convert-file
7.204. cookie
7.205. cookie-length
7.206. coordinates
7.207. copy
7.208. copy-config
7.209. copy-traffic-class-upon-decapsulation
7.210. core-connectivity
7.211. core-mvpn
7.212. cores
7.213. correlation-id
7.214. count
7.215. cpe-check
7.216. cpe-ping
7.217. cpipe
7.218. cpm-filter
7.219. cpm-http-redirect
7.220. cpm-queue
7.221. cpr-window-size
7.222. cpu-alarm
7.223. cpu-protection
7.224. crc
7.225. crc-monitor
7.226. create
7.227. create-subscription
7.228. create-udp-tunnel
7.229. credential
7.230. credit-control-policy
7.231. credit-control-quota
7.232. credit-control-server
7.233. credit-exhaust-threshold
7.234. credit-mcs-interval
7.235. credit-type
7.236. credit-type-override
7.237. credits
7.238. criteria-overrides
7.239. critical-event
7.240. crl-expiration-warning
7.241. crl-file
7.242. crl-update
7.243. crl-urls
7.244. cron
7.245. cross-connect
7.246. csf-enable
7.247. csnp-authentication
7.248. csnp-interval
7.249. cspf
7.250. cspf-on-loose-hop
7.251. cumulative-factor
7.252. cups
7.253. current-hop-limit
7.254. custom-buffer-mode
7.255. custom-option
7.256. custom-protocol
7.257. custom-record
7.258. custom-x-header
7.259. customer
7.260. customer-id-range
7.261. cut-through-packets
8. d Commands
8.1. dad-disable
8.2. dad-snooping
8.3. damp-peer-oscillations
8.4. dampening
8.5. damping
8.6. data
8.7. data-bearer
8.8. data-delay-interval
8.9. data-encapsulation
8.10. data-threshold
8.11. data-tlv-size
8.12. data-trigger
8.13. data-triggered
8.14. data-triggered-ue-creation
8.15. data-triggers
8.16. database
8.17. database-export
8.18. database-export-exclude
8.19. datapath-cpu-high-wmark
8.20. datapath-cpu-low-wmark
8.21. day-of-month
8.22. db
8.23. dbw-accounting
8.24. dbw-down-threshold
8.25. dbw-multiplier
8.26. dbw-up-threshold
8.27. ddm-events
8.28. de-1-out-profile
8.29. de-mark
8.30. de-mark-inner
8.31. de-mark-outer
8.32. dead-interval
8.33. dead-timer
8.34. debounce
8.35. debug
8.36. debug-output
8.37. debug-save
8.38. decrypt-key
8.39. def-app-profile
8.40. def-instance-sharing
8.41. def-inter-dest-id
8.42. def-recv-evpn-encap
8.43. def-sla-profile
8.44. def-sub-id
8.45. def-sub-profile
8.46. default
8.47. default-accounting-server-policy
8.48. default-action
8.49. default-authentication-server-policy
8.50. default-brg-profile
8.51. default-category-map
8.52. default-charging-group
8.53. default-credit
8.54. default-dnat-ip-address
8.55. default-dns
8.56. default-domain
8.57. default-fc
8.58. default-filter-action
8.59. default-group-interface
8.60. default-gtp-tunnel-endpoint-limit
8.61. default-host
8.62. default-instance
8.63. default-ipv4-multicast-metric
8.64. default-ipv6-multicast-metric
8.65. default-ipv6-unicast-metric
8.66. default-label-preference
8.67. default-metric
8.68. default-msap-policy
8.69. default-pap-password
8.70. default-path
8.71. default-peer
8.72. default-pool
8.73. default-preference
8.74. default-priority
8.75. default-profile
8.76. default-result
8.77. default-retail-svc-id
8.78. default-route-tag
8.79. default-route-target
8.80. default-router
8.81. default-sap
8.82. default-secure-service
8.83. default-set
8.84. default-tag
8.85. default-tunnel-endpoint-limit
8.86. default-tunnel-template
8.87. default-user-name
8.88. default-value
8.89. defaults
8.90. delay
8.91. delay-event
8.92. delay-event-exclusion
8.93. delay-events
8.94. delay-selection
8.95. delay-start-time
8.96. delay-template
8.97. delegated-ipv6-prefix
8.98. delegated-prefix-length
8.99. delete
8.100. delete-config
8.101. delete-pending
8.102. delivery-service
8.103. delta-consumed-agg-rate
8.104. delta-consumed-higher-tier-rate
8.105. delta-in-use-limit
8.106. dent-threshold
8.107. deny-list
8.108. depleted-event
8.109. derived-id
8.110. description
8.111. descriptor-type
8.112. dest-class
8.113. dest-global-id
8.114. dest-ip
8.115. dest-ip-addr
8.116. dest-mac
8.117. dest-mac-address
8.118. dest-mac-rewrite
8.119. dest-realm
8.120. dest-realm-learning
8.121. dest-tunnel-number
8.122. dest-udp-port
8.123. destination
8.124. destination-address
8.125. destination-class
8.126. destination-class-lookup
8.127. destination-group
8.128. destination-host
8.129. destination-ip
8.130. destination-port
8.131. destination-prefix
8.132. destination-realm
8.133. destruct-timeout
8.134. detail-level
8.135. detailed-acct-attributes
8.136. detect
8.137. detect-seen-ip
8.138. detection-time
8.139. deterministic
8.140. deterministic-med
8.141. deterministic-script
8.142. device
8.143. device-label
8.144. device-name
8.145. df-bit-lac
8.146. dh-group
8.147. dhcp
8.148. dhcp-client
8.149. dhcp-filter
8.150. dhcp-leasetime-threshold
8.151. dhcp-options
8.152. dhcp-pool
8.153. dhcp-python-policy
8.154. dhcp-server
8.155. dhcp-triggered
8.156. dhcp-user-db
8.157. dhcp-vendor-class-id
8.158. dhcp6
8.159. dhcp6-address
8.160. dhcp6-filter
8.161. dhcp6-options
8.162. dhcp6-python-policy
8.163. dhcp6-relay
8.164. dhcp6-server
8.165. dhcp6-user-db
8.166. dhcpv4-nat
8.167. dhcpv6-client
8.168. diameter
8.169. diameter-application-policy
8.170. diameter-auth-policy
8.171. diameter-node
8.172. diameter-peer
8.173. diameter-peer-policy
8.174. diameter-proxy
8.175. diff
8.176. diffserv-te
8.177. digest-type
8.178. digital-coherent-optics
8.179. dir
8.180. direction
8.181. direction-bit
8.182. disable
8.183. disable-4byte-asn
8.184. disable-aging
8.185. disable-capability-negotiation
8.186. disable-client-reflect
8.187. disable-communities
8.188. disable-cookies
8.189. disable-deferred-billing
8.190. disable-explicit-null
8.191. disable-fast-external-failover
8.192. disable-graceful-shutdown
8.193. disable-ldp-sync
8.194. disable-learning
8.195. disable-route-table-install
8.196. disable-router-alert-check
8.197. disable-selective-fib
8.198. disable-send-bvpls-evpn-flush
8.199. disable-shcv
8.200. disable-soft-reset-extension
8.201. disable-stickiness
8.202. disable-targeted-session
8.203. disallow-igp
8.204. discard
8.205. discard-changes
8.206. discard-rx-pause-frames
8.207. discard-unknown
8.208. discard-unknown-source
8.209. disconnect
8.210. discover-delay
8.211. discovery
8.212. discovery-interval
8.213. discriminator
8.214. dispersion
8.215. display
8.216. display-config
8.217. display-key
8.218. dist-cpu-protection
8.219. dist-lag-rate-shared
8.220. distinguisher
8.221. distributed-sub-mgmt
8.222. divert
8.223. divert-fc
8.224. dm
8.225. dmm
8.226. dmr-prefix
8.227. dnat
8.228. dnat-only
8.229. dns
8.230. dns-domain
8.231. dns-ip-cache
8.232. dns-match
8.233. dns-options
8.234. dns-server
8.235. dnssec
8.236. do-not-fragment
8.237. dod-label-distribution
8.238. domain
8.239. domain-name
8.240. dot1p
8.241. dot1p-in-profile
8.242. dot1p-inner
8.243. dot1p-out-profile
8.244. dot1p-outer
8.245. dot1q
8.246. dot1q-etype
8.247. dot1x
8.248. down
8.249. down-count
8.250. down-link
8.251. down-on-internal-error
8.252. down-threshold
8.253. down-timeout
8.254. down-when-looped
8.255. downlink
8.256. download-interval
8.257. downstream-ip-filter
8.258. downstream-ipv6-filter
8.259. downstream-map-tlv
8.260. dpd
8.261. drain
8.262. drop
8.263. drop-count
8.264. drop-extracted-traffic
8.265. drop-tail
8.266. drop-unidentified-traffic
8.267. drop-zero-ipv4-checksum
8.268. dropped-only
8.269. ds1
8.270. ds3
8.271. dsap
8.272. dscp
8.273. dscp-in-profile
8.274. dscp-out-profile
8.275. dslite-lsn-sub
8.276. dslite-max-subscriber-limit
8.277. dsm
8.278. dsm-ip-filter
8.279. dsm-subscriber
8.280. dsmap
8.281. dst-ip
8.282. dst-ipv4-address
8.283. dst-ipv6-address
8.284. dst-mac
8.285. dst-mac-address
8.286. dst-port
8.287. dst-port-range
8.288. dst-tcp-port
8.289. dst-udp-port
8.290. dst-zone
8.291. dual-stack-lite
8.292. dual-stack-lite-address
8.293. duid
8.294. dup-detect
8.295. duplex
8.296. dwdm
8.297. dying-gasp
8.298. dying-gasp-tx-on-reset
8.299. dynamic
8.300. dynamic-arp-populate
8.301. dynamic-bgp
8.302. dynamic-bypass
8.303. dynamic-cost
8.304. dynamic-enforcement-policer-pool
8.305. dynamic-fields
8.306. dynamic-keying
8.307. dynamic-mbs
8.308. dynamic-nd-populate
8.309. dynamic-neighbor
8.310. dynamic-neighbor-limit
8.311. dynamic-parameters
8.312. dynamic-policer
8.313. dynamic-services
8.314. dynamic-services-policy
8.315. dynamic-topology-discover
8.316. dynamic-tunnel-redundant-next-hop
8.317. dynmldp
8.318. dynsvc-password
9. e Commands
9.1. e-counters
9.2. e1
9.3. e2e-protection-type
9.4. e3
9.5. ea-length
9.6. eapol-destination-address
9.7. ebgp-default-reject-policy
9.8. ebgp-ibgp-equal
9.9. ecdsa
9.10. ecdsa-key
9.11. echo
9.12. echo-interval
9.13. echo-multiple
9.14. echo-receive
9.15. ecmp
9.16. ecmp-opt-threshold
9.17. ecmp-unequal-cost
9.18. ect-algorithm
9.19. edge-port
9.20. edit
9.21. edit-config
9.22. efm
9.23. efm-oam
9.24. egr-ip-load-balancing
9.25. egr-percentage-of-rate
9.26. egr-vtep
9.27. egr-weight
9.28. egress
9.29. egress-counter-map
9.30. egress-engineering
9.31. egress-fc
9.32. egress-ip-filter-entries
9.33. egress-ipv6-filter-entries
9.34. egress-pbr
9.35. egress-peer-engineering
9.36. egress-policer
9.37. egress-port-queue-overrides
9.38. egress-rate
9.39. egress-rate-modify
9.40. egress-scheduler-override
9.41. egress-scheduler-policy
9.42. egress-statistics
9.43. egress-xpl
9.44. eibgp-loadbalance
9.45. elmi
9.46. embed-filter
9.47. embedded-rp
9.48. emulated-server
9.49. enable-admin
9.50. enable-admin-control
9.51. enable-asm-mdt
9.52. enable-bfd-leaf
9.53. enable-bfd-root
9.54. enable-bgp-vpn-backup
9.55. enable-console-access
9.56. enable-dscp-prec-remarking
9.57. enable-dynamic-services-config
9.58. enable-exceed-pir
9.59. enable-fc-collection
9.60. enable-graceful-shutdown
9.61. enable-grt
9.62. enable-icmp-vse
9.63. enable-ingress-stats
9.64. enable-inter-as-vpn
9.65. enable-mac-accounting
9.66. enable-mdt-spt
9.67. enable-notification
9.68. enable-origin-validation
9.69. enable-peer-tracking
9.70. enable-port-id
9.71. enable-rr-vpn-forwarding
9.72. enable-rt-client
9.73. enable-tech
9.74. enable-triggered-hosts
9.75. enable-vsd-config
9.76. encap
9.77. encap-defined-qos
9.78. encap-group
9.79. encap-match
9.80. encap-offset
9.81. encap-tag-range
9.82. encap-tag-separate-range
9.83. encap-type
9.84. encapsulated-ip-mtu
9.85. encapsulation
9.86. encode
9.87. encoding
9.88. encoding-type
9.89. encrypt
9.90. encryption-key
9.91. encryption-keygroup
9.92. encryption-offset
9.93. end
9.94. end-dt4
9.95. end-dt46
9.96. end-dt6
9.97. end-dx2
9.98. end-marker-count
9.99. end-of-data
9.100. end-station-only
9.101. end-time
9.102. end-x
9.103. end-x-auto-allocate
9.104. endpoint
9.105. endpoint-discriminator
9.106. endstation-vid-group
9.107. enforce-diffserv-lsp-fc
9.108. enforce-first-as
9.109. enforce-strict-tunnel-tagging
9.110. enforce-unique-if-index
9.111. enforcement
9.112. engineID
9.113. enhanced-distribution
9.114. enqueue-on-pir-zero
9.115. enter
9.116. entropy-label
9.117. entropy-label-capability
9.118. entry
9.119. entry-size
9.120. environment
9.121. epipe
9.122. epipe-sap-template
9.123. error
9.124. error-code
9.125. error-drop
9.126. error-handling
9.127. error-handling-action
9.128. error-report
9.129. errored-frame
9.130. errored-frame-period
9.131. errored-frame-seconds
9.132. errored-symbols
9.133. errors
9.134. es-activation-timer
9.135. es-orig-ip
9.136. esa
9.137. esa-vm
9.138. esi
9.139. esm
9.140. esmc-tunnel
9.141. esp-auth-algorithm
9.142. esp-encryption-algorithm
9.143. esp-ext-hdr
9.144. ess-system-type
9.145. ete-fragment-threshold
9.146. eth-bn
9.147. eth-bn-egress-rate-changes
9.148. eth-cfm
9.149. eth-cfm-linktrace
9.150. eth-cfm-loopback
9.151. eth-cfm-two-way-delay
9.152. eth-cfm-two-way-slm
9.153. eth-ed
9.154. eth-legacy-fault-notification
9.155. eth-ring
9.156. eth-sat
9.157. eth-tag
9.158. eth-test
9.159. eth-test-enable
9.160. eth-tunnel
9.161. eth-vsm-grace
9.162. ethernet
9.163. ethernet-ctag
9.164. ethernet-header
9.165. ethernet-segment
9.166. etype
9.167. event
9.168. event-control
9.169. event-damping
9.170. event-handler
9.171. event-handling
9.172. event-log
9.173. event-mon
9.174. event-notification
9.175. event-notification-burst
9.176. event-trigger
9.177. event-type
9.178. events
9.179. evi
9.180. evpn
9.181. evpn-etree-leaf-label
9.182. evpn-mpls
9.183. evpn-nd-advertise
9.184. evpn-proxy
9.185. evpn-route-tag
9.186. evpn-tunnel
9.187. evpn-type
9.188. exceed
9.189. exceed-action
9.190. exceed-profile-octets-discarded-count
9.191. exceed-profile-octets-forwarded-count
9.192. exceed-profile-octets-offered-count
9.193. exceed-profile-packets-discarded-count
9.194. exceed-profile-packets-forwarded-count
9.195. exceed-profile-packets-offered-count
9.196. exceed-slope
9.197. exception
9.198. exclude
9.199. exclude-addresses
9.200. exclude-avps
9.201. exclude-from-avg
9.202. exclude-group
9.203. exclude-mac-policy
9.204. exclude-node
9.205. exclude-prefix
9.206. exclude-protocol
9.207. exclude-srlg
9.208. exclude-tcp-retrans
9.209. exclusive-lock-time
9.210. exec
9.211. executed-cmd
9.212. exhausted-credit-service-level
9.213. exit
9.214. expected
9.215. expire-time
9.216. expiry-time
9.217. explicit-sf-path
9.218. explicit-subscriber-map
9.219. exponential-backoff
9.220. exponential-backoff-retry
9.221. export
9.222. export-addresses
9.223. export-filter
9.224. export-grt
9.225. export-host-routes
9.226. export-id
9.227. export-inactive-bgp
9.228. export-limit
9.229. export-mode
9.230. export-override
9.231. export-prefixes
9.232. export-tunnel-table
9.233. export-v6-limit
9.234. expression
9.235. expression-match
9.236. extended-action
9.237. extended-bw
9.238. extended-community
9.239. extended-failure-handling
9.240. extended-lsa
9.241. extended-nh-encoding
9.242. extended-sequence-number
9.243. extension
9.244. extensions
9.245. external
9.246. external-assignment
9.247. external-db-overflow
9.248. external-preference
9.249. extranet
10. f Commands
10.1. facility
10.2. facility-fault
10.3. facility-id-permission
10.4. fail-action
10.5. fail-on-error
10.6. fail-to-open
10.7. failed-mda-limit
10.8. failed-threshold
10.9. failover
10.10. failure-action
10.11. failure-mode
10.12. failure-recovery
10.13. failure-threshold
10.14. fallback-action
10.15. fallback-path-computation-method
10.16. falling-percent-reset
10.17. family
10.18. far-end
10.19. fast-leave
10.20. fast-reroute
10.21. fast-start
10.22. fast-stop
10.23. fault-propagation-bmac
10.24. fault-propagation-enable
10.25. fc
10.26. fc-in-profile
10.27. fcc
10.28. fcc-burst
10.29. fcc-channel-type
10.30. fcc-min-duration
10.31. fcc-server
10.32. fcc-session-timeout
10.33. fd-avg
10.34. fdb-table-high-wmark
10.35. fdb-table-low-wmark
10.36. fdb-table-size
10.37. feac-loop-respond
10.38. feature
10.39. features
10.40. fec
10.41. fec-egress-stats
10.42. fec-limit
10.43. fec-originate
10.44. fec-prefix
10.45. fec-type-capability
10.46. fec129-cisco-interop
10.47. fib-priority
10.48. fib-telemetry
10.49. field
10.50. field-override
10.51. field-selection
10.52. file
10.53. file-id
10.54. file-transfer
10.55. file-transmission-profile
10.56. file-url
10.57. filter
10.58. filter-cam-type
10.59. filter-id-range
10.60. filter-name
10.61. filter-profile
10.62. filter-sample
10.63. filtering
10.64. find-egress
10.65. fips-140-2
10.66. fir-burst-limit
10.67. firewall
10.68. firewall-info
10.69. firewall-policy
10.70. flags-tlv
10.71. flex-algo
10.72. flexible-algorithm-definitions
10.73. flexible-algorithms
10.74. flood-garp-and-unknown-req
10.75. flood-time
10.76. flow-attribute
10.77. flow-count
10.78. flow-count-limit
10.79. flow-label
10.80. flow-label-load-balancing
10.81. flow-rate
10.82. flow-rate-limit
10.83. flow-rate2
10.84. flow-setup-direction
10.85. flow-setup-high-wmark
10.86. flow-setup-low-wmark
10.87. flow-spec-dest
10.88. flow-spec-source
10.89. flow-table-high-wmark
10.90. flow-table-low-wmark
10.91. flow-timeout-on-switchover
10.92. flows-active-count
10.93. flows-admitted-count
10.94. flows-denied-count
10.95. flowspec
10.96. flowtable
10.97. flr-threshold
10.98. fng-alarm-time
10.99. fng-reset-time
10.100. follow
10.101. force-auth
10.102. force-ipv6cp
10.103. force-l2pt-boundary
10.104. force-mcast
10.105. force-ppp-mtu-gt-1492
10.106. force-qinq-vc-forwarding
10.107. force-qtag-forwarding
10.108. force-reference
10.109. force-renews
10.110. force-switchover
10.111. force-vlan-vc-forwarding
10.112. foreign-ip
10.113. foreign-port
10.114. format
10.115. forward
10.116. forward-6in4
10.117. forward-delay
10.118. forward-entries
10.119. forward-ip-over-gre
10.120. forward-ipv4-multicast-to-ip-int
10.121. forward-ipv4-packets
10.122. forward-ipv6-multicast-to-ip-int
10.123. forward-path
10.124. forward-when
10.125. forwarding
10.126. forwarding-bits-set
10.127. forwarding-class
10.128. forwarding-policies
10.129. forwarding-policy
10.130. forwarding-set
10.131. forwarding-tree-topology
10.132. fp
10.133. fp-redirect-group
10.134. fp-resource-policy
10.135. fpe
10.136. fpipe
10.137. fqdn
10.138. frag-required
10.139. fragment
10.140. fragment-drop
10.141. fragment-drop-all
10.142. fragment-drop-out-of-order
10.143. fragment-threshold
10.144. frame-based-accounting
10.145. frame-counters
10.146. frame-relay
10.147. framed-interface-id
10.148. framed-ip-addr
10.149. framed-ip-netmask
10.150. framed-ipv6-prefix
10.151. framed-ipv6-route
10.152. framed-route
10.153. framing
10.154. frf-12
10.155. frf16
10.156. from
10.157. from-aa-sub-counters
10.158. from-subscriber
10.159. from-vpls
10.160. frr
10.161. frr-object
10.162. fsm-state-changes
10.163. fsm-timers
10.164. ftp
10.165. ftp-server
10.166. function
10.167. function-length
10.168. fwd-inside-router
10.169. fwd-path-ext
10.170. fwd-wholesale
11. g Commands
11.1. garp-flood-evpn
11.2. gateway
11.3. gateway-ip
11.4. gen-keypair
11.5. gen-local-cert-req
11.6. general-port
11.7. generalized-pid
11.8. generate-basic-fec-only
11.9. generate-icmp
11.10. generate-traps
11.11. get
11.12. get-config
11.13. get-data
11.14. get-schema
11.15. ggsn
11.16. ggsn-address
11.17. gi-address
11.18. global
11.19. global-id
11.20. global-timeouts
11.21. global-variables
11.22. glsp
11.23. gmpls
11.24. gmpls-loopback-address
11.25. gmpls-tun-grp
11.26. gnmi
11.27. gnmi-capabilities
11.28. gnmi-get
11.29. gnmi-set
11.30. gnmi-subscribe
11.31. gnoi-cert-mgmt-cangenerate
11.32. gnoi-cert-mgmt-getcert
11.33. gnoi-cert-mgmt-install
11.34. gnoi-cert-mgmt-revoke
11.35. gnoi-cert-mgmt-rotate
11.36. gnoi-file-get
11.37. gnoi-file-put
11.38. gnoi-file-remove
11.39. gnoi-file-stat
11.40. gnoi-file-transfertoremote
11.41. gnoi-system-cancelreboot
11.42. gnoi-system-ping
11.43. gnoi-system-reboot
11.44. gnoi-system-rebootstatus
11.45. gnoi-system-setpackage
11.46. gnoi-system-switchcontrolprocessor
11.47. gnoi-system-time
11.48. gnoi-system-traceroute
11.49. goto
11.50. gprs-negotiated-qos-profile
11.51. gr-helper
11.52. gr-helper-time
11.53. grace
11.54. grace-tx-enable
11.55. grace-vendor-oui
11.56. graceful-restart
11.57. graceful-shutdown
11.58. grafts
11.59. granularity
11.60. gratuitous-rtr-adv
11.61. gre
11.62. gre-eth-bridged
11.63. gre-header
11.64. gre-key
11.65. gre-termination
11.66. gre-tunnel-template
11.67. group
11.68. group down
11.69. group up
11.70. group-address
11.71. group-encryption
11.72. group-encryption-label
11.73. group-inserted-entries
11.74. group-interface
11.75. group-interface-template
11.76. group-name
11.77. group-policy
11.78. group-prefix
11.79. group-range
11.80. group-session-limit
11.81. grp-if-query-src-ip
11.82. grp-range
11.83. grpc
11.84. grt
11.85. grt-extranet
11.86. grt-lookup
11.87. gsmp
11.88. gtm
11.89. gtp
11.90. gtp-authorized
11.91. gtp-filter
11.92. gtp-filter-stats
11.93. gtp-in-gtp
11.94. gtp-local-breakout
11.95. gtp-mobility
11.96. gtp-parameters
11.97. gtp-peer-clear-timeout
11.98. gtp-ping
11.99. gtp-sanity-drop
11.100. gtp-traffic
11.101. gtp-tunnel-database
11.102. gtp-user
11.103. gtp-user-name
11.104. gtpc-inspection
11.105. gtpv1-c
11.106. gtpv2-c
11.107. guard-time
11.108. gw-address-range
11.109. gw-addresses
11.110. gw-mac
11.111. gx
11.112. gx-session-level-usage
11.113. gy
12. h Commands
12.1. half-life
12.2. handler
12.3. hardware-timestamp
12.4. hash-algorithm
12.5. hash-label
12.6. hash-mask-len
12.7. hash-weight-threshold
12.8. hashing
12.9. hd
12.10. head-end
12.11. header
12.12. header-sanity
12.13. header-sequence
12.14. health-check
12.15. heartbeat
12.16. hello
12.17. hello-auth-keychain
12.18. hello-authentication
12.19. hello-authentication-key
12.20. hello-authentication-type
12.21. hello-interval
12.22. hello-multiplier
12.23. hello-padding
12.24. hello-reduction
12.25. hello-time
12.26. help
12.27. helper-disable
12.28. helper-override-restart-time
12.29. helper-override-stale-time
12.30. hi-bw-mcast-src
12.31. high
12.32. high-availability
12.33. high-octets-discarded-count
12.34. high-octets-offered-count
12.35. high-packets-discarded-count
12.36. high-packets-offered-count
12.37. high-prio-only
12.38. high-rate-hold-time
12.39. high-slope
12.40. high-wmark
12.41. highplus
12.42. highplus-slope
12.43. history
12.44. history-size
12.45. hli-event
12.46. hli-force-count
12.47. hold-clear
12.48. hold-count
12.49. hold-down-time
12.50. hold-down-timer
12.51. hold-multiplier
12.52. hold-on-neighbor-failure
12.53. hold-set
12.54. hold-time
12.55. hold-time-aps
12.56. hold-time-down
12.57. hold-time-up
12.58. hold-timer
12.59. holddown
12.60. holdtime
12.61. home
12.62. home-directory
12.63. hop
12.64. hop-by-hop-opt
12.65. hop-limit
12.66. host
12.67. host-accounting
12.68. host-connectivity-verify
12.69. host-identification
12.70. host-ip
12.71. host-key
12.72. host-limit
12.73. host-limits
12.74. host-lockout-policy
12.75. host-match
12.76. host-port
12.77. host-shutdown
12.78. host-tracking-policy
12.79. host-unreachable
12.80. host-unsolicited-na-flood-evpn
12.81. hour
12.82. hqos-algorithm
12.83. hqos-mode
12.84. hs-agg-rate-limit
12.85. hs-alt-port-class-pool
12.86. hs-attachment-policy
12.87. hs-class-weight
12.88. hs-fixed-high-thresh-delta
12.89. hs-low-burst-max-class
12.90. hs-mbs
12.91. hs-pool-policy
12.92. hs-port-pool-policy
12.93. hs-queue-stat-mode
12.94. hs-scheduler-overrides
12.95. hs-scheduler-policy
12.96. hs-secondary-shaper
12.97. hs-sla-mode
12.98. hs-turbo
12.99. hs-wred-queue
12.100. hs-wred-queue-policy
12.101. hs-wrr-group
12.102. hs-wrr-weight
12.103. http-connections
12.104. http-enrich
12.105. http-enrich-max-pkt
12.106. http-error-redirect
12.107. http-host
12.108. http-host-recorder
12.109. http-listening-port
12.110. http-match-all-requests
12.111. http-notification
12.112. http-port
12.113. http-redirect
12.114. http-redirect-policy
12.115. http-request-filtering
12.116. http-response-timeout
12.117. http-version
12.118. http-x-online-host
12.119. hw-agg-shaper-scheduler-policy
12.120. hw-agg-shapers
12.121. hybrid-buffer-allocation
13. i Commands
13.1. i-counters
13.2. i-sid
13.3. ia-na
13.4. ibgp-multipath
13.5. icmp
13.6. icmp-code
13.7. icmp-generation
13.8. icmp-ping
13.9. icmp-query
13.10. icmp-trace
13.11. icmp-tunneling
13.12. icmp-type
13.13. icmp6
13.14. icmp6-generation
13.15. icmp6-query
13.16. id
13.17. id-permission
13.18. identification-strings
13.19. identifier
13.20. idi
13.21. idle-cycle-flag
13.22. idle-filter
13.23. idle-payload-fill
13.24. idle-signal-fill
13.25. idle-time
13.26. idle-timeout
13.27. idle-timeout-action
13.28. ies
13.29. ies-vprn-only-sap-parameters
13.30. if-attribute
13.31. if-num
13.32. if-num-validation
13.33. if-policy
13.34. ifdv-avg
13.35. iff-attribute-uniform-propagation
13.36. iff-bgp-path-selection
13.37. igmp
13.38. igmp-host-tracking
13.39. igmp-policy
13.40. igmp-snooping
13.41. ignore-app-profile
13.42. ignore-attached-bit
13.43. ignore-avps
13.44. ignore-default
13.45. ignore-df-bit
13.46. ignore-dn-bit
13.47. ignore-efm-state
13.48. ignore-lsp-errors
13.49. ignore-match
13.50. ignore-mclt-on-takeover
13.51. ignore-narrow-metric
13.52. ignore-nh-metric
13.53. ignore-oper-down
13.54. ignore-rapid-commit
13.55. ignore-received-srv6-tlvs
13.56. ignore-router-id
13.57. ignore-standby-signaling
13.58. ignore-tos
13.59. igp-shortcut
13.60. iid-tlv-enable
13.61. ike-auth-algorithm
13.62. ike-encryption-algorithm
13.63. ike-mode
13.64. ike-policy
13.65. ike-prf-algorithm
13.66. ike-transform
13.67. ike-version
13.68. ikev1-ph1-responder-delete-notify
13.69. ikev2-fragment
13.70. ilmi
13.71. ima
13.72. imei
13.73. implicit-generation
13.74. implicit-null-label
13.75. import
13.76. import-grt
13.77. import-mcast-policy
13.78. import-pmsi-routes
13.79. import-prefixes
13.80. import-tunnel-table
13.81. imported-format
13.82. improved-assert
13.83. imsi
13.84. imsi-apn-filter
13.85. in-band-control-path
13.86. in-label
13.87. in-plus-profile-octets-discarded-count
13.88. in-plus-profile-octets-forwarded-count
13.89. in-plus-profile-octets-offered-count
13.90. in-plus-profile-packets-discarded-count
13.91. in-plus-profile-packets-forwarded-count
13.92. in-plus-profile-packets-offered-count
13.93. in-profile-octets-discarded-count
13.94. in-profile-octets-forwarded-count
13.95. in-profile-octets-offered-count
13.96. in-profile-packets-discarded-count
13.97. in-profile-packets-forwarded-count
13.98. in-profile-packets-offered-count
13.99. in-remark
13.100. inactive-flow-timeout
13.101. inactivity-mon
13.102. inactivity-timeout
13.103. inactivity-timer
13.104. inband-collector-export-only
13.105. inbound-max-sessions
13.106. incl-mcast-orig-ip
13.107. include
13.108. include-all
13.109. include-any
13.110. include-avp
13.111. include-dns
13.112. include-group
13.113. include-radius-attribute
13.114. include-system-info
13.115. included-protocols
13.116. inclusive
13.117. incoming-sid
13.118. incremental-spf-wait
13.119. index
13.120. indirect
13.121. ine-identifier
13.122. info
13.123. info-notification
13.124. ing-percentage-of-rate
13.125. ing-weight
13.126. ingress
13.127. ingress-buffer-allocation
13.128. ingress-counter-map
13.129. ingress-ip-filter-entries
13.130. ingress-ipv6-filter-entries
13.131. ingress-label
13.132. ingress-percent-of-total
13.133. ingress-policer
13.134. ingress-rate
13.135. ingress-repl-inc-mcast-advertisement
13.136. ingress-replication-bum-label
13.137. ingress-statistics
13.138. ingress-xpl
13.139. init
13.140. init-delay
13.141. init-extract-prio-mode
13.142. initial-app-profile
13.143. initial-hold-time
13.144. initial-lease-time
13.145. initial-preferred-lifetime
13.146. initial-registration
13.147. initial-send-delay-zero
13.148. initial-sla-profile
13.149. initial-sub-profile
13.150. initial-valid-lifetime
13.151. initiation-message
13.152. inner-tag
13.153. input
13.154. input-power-mode
13.155. insert
13.156. insert-ipv6-fragment-header
13.157. insert-nsh
13.158. insert-subscriber-id
13.159. inside
13.160. inside-service-id
13.161. install-backup-path
13.162. instance
13.163. instance-id
13.164. instances
13.165. instant-prune-echo
13.166. int-dest-id
13.167. inter-chassis-redundancy
13.168. inter-dest-id
13.169. inter-vlan
13.170. interactive-authentication
13.171. intercept-id
13.172. interconnect
13.173. interface
13.174. interface-a
13.175. interface-b
13.176. interface-disable-sample
13.177. interface-group-handler
13.178. interface-id
13.179. interface-id-mapping
13.180. interface-list
13.181. interface-parameters
13.182. interface-subnets
13.183. interface-support-enable
13.184. interface-type
13.185. interim-credit
13.186. interim-update
13.187. interim-update-interval
13.188. interleave
13.189. interleave-fragments
13.190. internal-ip4-address
13.191. internal-ip4-dns
13.192. internal-ip4-netmask
13.193. internal-ip6-address
13.194. internal-ip6-dns
13.195. internal-lease-ipsec
13.196. internal-scheduler-weight-mode
13.197. intersite-shared
13.198. interval
13.199. intervals-stored
13.200. interworking
13.201. invert-data
13.202. iom
13.203. ip
13.204. ip-addr-backup
13.205. ip-addr-primary
13.206. ip-addr1
13.207. ip-addr2
13.208. ip-address
13.209. ip-advertise-routes
13.210. ip-assigned
13.211. ip-assigned-authorized
13.212. ip-cache
13.213. ip-can-type
13.214. ip-criteria
13.215. ip-exception
13.216. ip-fast-reroute
13.217. ip-filter
13.218. ip-filter-max-size
13.219. ip-filter-name
13.220. ip-fragmentation
13.221. ip-helper-address
13.222. ip-mirror
13.223. ip-mirror-interface
13.224. ip-mtu
13.225. ip-option
13.226. ip-prefix
13.227. ip-prefix-list
13.228. ip-prefix-routes
13.229. ip-protocol-num
13.230. ip-route-advertisement
13.231. ip-src
13.232. ip-ttl
13.233. ip-tunnel
13.234. ipcp
13.235. ipcp-subnet-negotiation
13.236. ipfix
13.237. ipfix-export-policy
13.238. ipipe
13.239. ipoe
13.240. ipoe-bridged-mode
13.241. ipoe-linking
13.242. ipoe-session
13.243. ipoe-session-policy
13.244. ipoe-sub-id-key
13.245. ipsec
13.246. ipsec-auth
13.247. ipsec-gw
13.248. ipsec-lifetime
13.249. ipsec-responder-only
13.250. ipsec-transform
13.251. ipsec-tunnel
13.252. ipv4
13.253. ipv4-address
13.254. ipv4-adjacency-sid
13.255. ipv4-arp
13.256. ipv4-dhcp
13.257. ipv4-mtu
13.258. ipv4-multicast
13.259. ipv4-multicast-disable
13.260. ipv4-multicast-metric
13.261. ipv4-multicast-metric-offset
13.262. ipv4-multicast-routing
13.263. ipv4-node-sid
13.264. ipv4-overall
13.265. ipv4-ppp
13.266. ipv4-prefix
13.267. ipv4-routing
13.268. ipv4-source-address
13.269. ipv4-unicast-metric-offset
13.270. ipv6
13.271. ipv6-address
13.272. ipv6-address-prefix-length
13.273. ipv6-adjacency-sid
13.274. ipv6-criteria
13.275. ipv6-delegated-prefix
13.276. ipv6-delegated-prefix-length
13.277. ipv6-delegated-prefix-pool
13.278. ipv6-eh
13.279. ipv6-error
13.280. ipv6-exception
13.281. ipv6-filter
13.282. ipv6-filter-max-size
13.283. ipv6-filter-name
13.284. ipv6-fragment
13.285. ipv6-lease-times
13.286. ipv6-mtu
13.287. ipv6-multicast
13.288. ipv6-multicast-disable
13.289. ipv6-multicast-metric
13.290. ipv6-multicast-metric-offset
13.291. ipv6-multicast-routing
13.292. ipv6-node-sid
13.293. ipv6-overall
13.294. ipv6-pd-ipoe-dhcp
13.295. ipv6-pd-overall
13.296. ipv6-pd-ppp-dhcp
13.297. ipv6-prefix
13.298. ipv6-prefix-list
13.299. ipv6-routing
13.300. ipv6-slaac-prefix
13.301. ipv6-slaac-prefix-pool
13.302. ipv6-source-address
13.303. ipv6-tcp-mss-adjust
13.304. ipv6-te-router-id
13.305. ipv6-unicast
13.306. ipv6-unicast-disable
13.307. ipv6-unicast-metric
13.308. ipv6-unicast-metric-offset
13.309. ipv6-wan-address-pool
13.310. ipv6-wan-ipoe-dhcp
13.311. ipv6-wan-ipoe-slaac
13.312. ipv6-wan-overall
13.313. ipv6-wan-ppp-dhcp
13.314. ipv6-wan-ppp-slaac
13.315. isa
13.316. isa-aa-group
13.317. isa-aa-oversubscription-factor
13.318. isa-capacity-cost-high-threshold
13.319. isa-capacity-cost-low-threshold
13.320. isa-dp-cpu-usage
13.321. isa-filter
13.322. isa-overload-cut-through
13.323. isa-policer
13.324. isa-radius-policy
13.325. isa-service-chaining
13.326. isakmp-lifetime
13.327. isid
13.328. isid-policy
13.329. isid-range
13.330. isid-route-target
13.331. isis
14. j Commands
14.1. jitter-event
14.2. join-time
14.3. join-tlv-packing-disable
14.4. jp
15. k Commands
15.1. kb-memory-use-alarm
15.2. kb-memory-use-warn
15.3. keep-alive
15.4. keep-alive-interval
15.5. keep-count
15.6. keep-idle
15.7. keep-interval
15.8. keep-multiplier
15.9. keepalive
15.10. keepalive-override
15.11. kernel
15.12. kex
15.13. key
15.14. key-list
15.15. key-re-exchange
15.16. key-rollover-interval
15.17. key-update
15.18. key-value
15.19. keychain
15.20. keygroup-name
15.21. kill-session
16. l Commands
16.1. l2
16.2. l2-access-points
16.3. l2-ap
16.4. l2-ap-auto-sub-id-fmt
16.5. l2-ap-encap-type
16.6. l2-aware
16.7. l2-aware-ip-address
16.8. l2-aware-nat-bypass
16.9. l2-aware-sub
16.10. l2-inner-vlan
16.11. l2-ip
16.12. l2-outer-vlan
16.13. l2-outside
16.14. l2-sap
16.15. l2-service
16.16. l2pt-termination
16.17. l2tp
16.18. l2tp-accounting-policy
16.19. l2tp-lns
16.20. l2tp-load-balancing
16.21. l2tp-lts
16.22. l2tp-overall
16.23. l2tp-tunnel-id-range
16.24. l2tpv3
16.25. l2tpv3-session
16.26. l2w
16.27. l3-ring
16.28. l4-load-balancing
16.29. l4-src-port
16.30. label
16.31. label-allocation
16.32. label-block
16.33. label-ipv4
16.34. label-ipv6
16.35. label-ipv6-explicit-null
16.36. label-map
16.37. label-mode
16.38. label-preference
16.39. label-route-local
16.40. label-route-transit
16.41. label-stack-reduction
16.42. label-stack-statistics-count
16.43. label-withdrawal-delay
16.44. labeled-routes
16.45. lac-overall
16.46. lacp
16.47. lacp-mux-control
16.48. lacp-system-priority
16.49. lacp-tunnel
16.50. lacp-xmit-interval
16.51. lacp-xmit-stdby
16.52. lag
16.53. lag-emulation
16.54. lag-link-map-profile
16.55. lag-per-link-hash
16.56. lag-port-down
16.57. lag-usage-optimization
16.58. lanext
16.59. lanext-bridge-id
16.60. lanext-device-type
16.61. lanext-route-distinguisher
16.62. lanext-route-target
16.63. lanext-vni
16.64. last-member-query-interval
16.65. last-reported-delay-hold
16.66. latency-event
16.67. layer-3
16.68. layer-3-encap
16.69. lbm-svc-act-responder
16.70. lbo
16.71. lcp-force-ack-accm
16.72. lcp-ignore-magic-numbers
16.73. ldap
16.74. ldap-server
16.75. ldp
16.76. ldp-over-rsvp
16.77. ldp-shortcut
16.78. ldp-sync
16.79. ldp-sync-timer
16.80. ldp-treetrace
16.81. leak
16.82. leak-export
16.83. leak-export-limit
16.84. leak-import
16.85. learn-ap-mac
16.86. learn-dynamic
16.87. learn-l2tp-cookie
16.88. lease-hold-time
16.89. lease-hold-time-for
16.90. lease-populate
16.91. lease-query
16.92. lease-rebind-time
16.93. lease-renew-time
16.94. lease-time
16.95. least-fill
16.96. least-fill-min-thd
16.97. least-fill-reoptim-thd
16.98. leave-all-sm
16.99. leave-all-time
16.100. leave-time
16.101. legacy
16.102. legacy-dns-nbns
16.103. legacy-ipv4-lsr-interop
16.104. length
16.105. ler-use-dscp
16.106. less-specific
16.107. level
16.108. level-capability
16.109. lfa-policy-map
16.110. li
16.111. li-filter
16.112. li-filter-associations
16.113. li-filter-block-reservation
16.114. li-filter-lock-state
16.115. li-group
16.116. li-ip-filter
16.117. li-ipv6-filter
16.118. li-local-save
16.119. li-mac-filter
16.120. li-reserved-block
16.121. li-separate
16.122. li-source
16.123. lic
16.124. lic-identifier
16.125. license
16.126. license-file
16.127. lics
16.128. lifetime
16.129. limit
16.130. limit-init-exchange
16.131. limit-mac-move
16.132. limit-pir-zero-drain
16.133. limit-unused-bandwidth
16.134. line-length
16.135. link
16.136. link-addr
16.137. link-address
16.138. link-bandwidth
16.139. link-delay
16.140. link-fault
16.141. link-group
16.142. link-local-address
16.143. link-local-modifier
16.144. link-map-profile
16.145. link-measurement
16.146. link-monitoring
16.147. link-name
16.148. link-specific-rate
16.149. link-state-export-enable
16.150. link-state-import-enable
16.151. link-type
16.152. linktrace
16.153. live-output
16.154. lldp
16.155. llf
16.156. lmi
16.157. lmi-type
16.158. lmm
16.159. lmp
16.160. lns-group
16.161. load
16.162. load-balance-key
16.163. load-balance-method
16.164. load-balancing
16.165. load-balancing-algorithm
16.166. load-balancing-weight
16.167. local
16.168. local-address
16.169. local-address-assignment
16.170. local-age
16.171. local-as
16.172. local-attachment-circuit
16.173. local-auth-db
16.174. local-dhcp-server
16.175. local-ecid
16.176. local-end
16.177. local-fcc-port
16.178. local-filtering
16.179. local-forward
16.180. local-gateway-address
16.181. local-id
16.182. local-ip
16.183. local-ip-address
16.184. local-ip-range-start
16.185. local-lsr-id
16.186. local-max-checkpoints
16.187. local-monitoring-policer
16.188. local-name
16.189. local-port-action
16.190. local-preference
16.191. local-prefix
16.192. local-priority
16.193. local-proxy-arp
16.194. local-proxy-nd
16.195. local-rt-port
16.196. local-rt-server
16.197. local-sf-action
16.198. local-source-address
16.199. local-sr-protection
16.200. local-state
16.201. local-switching-service-state
16.202. local-user-db
16.203. local-v6-ip
16.204. location
16.205. locator
16.206. lock
16.207. lock-override
16.208. lockout
16.209. lockout-reset-time
16.210. lockout-time
16.211. log
16.212. log-anno-interval
16.213. log-delay-interval
16.214. log-events
16.215. log-filter
16.216. log-id
16.217. log-prefix
16.218. log-sync-interval
16.219. logger-event-bundling
16.220. logical-access-id
16.221. logical-port-status
16.222. login-banner
16.223. login-control
16.224. login-exec
16.225. login-scripts
16.226. logout
16.227. long-duration-flow-count
16.228. long-lived
16.229. loop-detect
16.230. loop-detect-threshold
16.231. loopback
16.232. loopback-period
16.233. loopfree-alternate-exclude
16.234. loopfree-alternates
16.235. loss
16.236. loss-event
16.237. loss-events
16.238. low
16.239. low-burst-max-class
16.240. low-octets-discarded-count
16.241. low-octets-offered-count
16.242. low-packets-discarded-count
16.243. low-packets-offered-count
16.244. low-priority-defect
16.245. low-slope
16.246. low-wmark
16.247. lower-bound
16.248. lsa-accumulate
16.249. lsa-arrival
16.250. lsa-filter-out
16.251. lsa-generate
16.252. lsdb
16.253. lsn
16.254. lsp
16.255. lsp-bfd
16.256. lsp-egress-stats
16.257. lsp-exp
16.258. lsp-exp-in-profile
16.259. lsp-exp-out-profile
16.260. lsp-hold-timer
16.261. lsp-ingress-stats
16.262. lsp-init-retry-timeout
16.263. lsp-lifetime
16.264. lsp-minimum-remaining-lifetime
16.265. lsp-mtu-size
16.266. lsp-num
16.267. lsp-pacing-interval
16.268. lsp-ping
16.269. lsp-ping-interval
16.270. lsp-ping-trace
16.271. lsp-refresh-interval
16.272. lsp-self-ping
16.273. lsp-setup
16.274. lsp-template
16.275. lsp-trace
16.276. lsp-wait
16.277. lsr-label-route
16.278. lsr-load-balancing
16.279. lub-init-min-pir
17. m Commands
17.1. ma-index-range
17.2. mac
17.3. mac-address
17.4. mac-advertisement
17.5. mac-criteria
17.6. mac-da-hashing
17.7. mac-duplication
17.8. mac-filter
17.9. mac-filter-name
17.10. mac-format
17.11. mac-learning-options
17.12. mac-linking
17.13. mac-list
17.14. mac-move
17.15. mac-move-level
17.16. mac-name
17.17. mac-notification
17.18. mac-ping
17.19. mac-pinning
17.20. mac-policy
17.21. mac-populate
17.22. mac-prefix
17.23. mac-protect
17.24. mac-purge
17.25. mac-refresh
17.26. mac-subnet-length
17.27. mac-trace
17.28. mac-translation
17.29. macsec
17.30. macsec-encrypt
17.31. magic-number
17.32. main-ct-retry-limit
17.33. maintenance-policy
17.34. managed-configuration
17.35. managed-routes
17.36. managed-vlan-list
17.37. management
17.38. management-access-filter
17.39. management-interface
17.40. manager
17.41. manager-address
17.42. manager-port
17.43. manual
17.44. manual-keying
17.45. map
17.46. map-domain
17.47. mapping
17.48. mapping-limit
17.49. mapping-rule
17.50. mapping-server
17.51. maps-to
17.52. mark
17.53. mask
17.54. mask-reply
17.55. master-int-inherit
17.56. master-only
17.57. master-selection-mode
17.58. match
17.59. match-circuit-id
17.60. match-list
17.61. match-peer-id-to-cert
17.62. match-qinq-dot1p
17.63. match-radius-proxy-cache
17.64. max
17.65. max-admin-down-time
17.66. max-advertisement
17.67. max-advertisement-interval
17.68. max-age
17.69. max-attempts
17.70. max-auth-req
17.71. max-avg
17.72. max-bandwidth
17.73. max-burst
17.74. max-burst-size
17.75. max-bypass-associations
17.76. max-bypass-plr-associations
17.77. max-cells
17.78. max-cleared
17.79. max-completed
17.80. max-conn-prefix
17.81. max-conn-server
17.82. max-data-size
17.83. max-debounce-time
17.84. max-decrement
17.85. max-delay
17.86. max-description-size
17.87. max-drop-count
17.88. max-ecmp-routes
17.89. max-entries
17.90. max-entry-lifetime
17.91. max-fail
17.92. max-files-number
17.93. max-fragment-delay
17.94. max-groups
17.95. max-grp-sources
17.96. max-held-sessions
17.97. max-history-esp-key-records
17.98. max-history-ike-key-records
17.99. max-igmp-latency
17.100. max-lanext-bd
17.101. max-lease-time
17.102. max-lifetime
17.103. max-links
17.104. max-list-length
17.105. max-lockout-hosts
17.106. max-mac
17.107. max-msg-size
17.108. max-nbr-mac-addr
17.109. max-nbr-of-leases
17.110. max-num-groups
17.111. max-num-grp-sources
17.112. max-num-sources
17.113. max-num-ue
17.114. max-path
17.115. max-payload-length
17.116. max-peer
17.117. max-percent-rate
17.118. max-prob
17.119. max-queue-size
17.120. max-rate
17.121. max-retries-estab
17.122. max-retries-not-estab
17.123. max-routes
17.124. max-rx-defect-window
17.125. max-sess-prefix
17.126. max-sess-server
17.127. max-sessions
17.128. max-sessions-per-cid
17.129. max-sessions-per-mac
17.130. max-setup-time
17.131. max-size
17.132. max-sources
17.133. max-sr-labels
17.134. max-srte-pce-init-lsps
17.135. max-stats
17.136. max-suppress
17.137. max-throughput-octet-count
17.138. max-throughput-packet-count
17.139. max-throughput-stats
17.140. max-throughput-timestamp
17.141. max-time
17.142. max-ttl
17.143. max-tx-delay
17.144. max-ve-id
17.145. max-wait-to-advertise
17.146. maximum-cert-chain-depth
17.147. maximum-client-lead-time
17.148. maximum-declined
17.149. maximum-ipv6-routes
17.150. maximum-p2mp-spmsi
17.151. maximum-paths
17.152. maximum-recovery-time
17.153. maximum-routes
17.154. maximum-sid-depth
17.155. mbb
17.156. mbb-prefer-current-hops
17.157. mbs
17.158. mbs-contribution
17.159. mbytes
17.160. mc-constraints
17.161. mc-ecmp-balance
17.162. mc-ecmp-balance-hold
17.163. mc-ecmp-hashing-enabled
17.164. mc-endpoint
17.165. mc-enh-load-balancing
17.166. mc-ep-peer
17.167. mc-fr-profile-egress
17.168. mc-fr-profile-ingress
17.169. mc-handover
17.170. mc-ipsec
17.171. mc-ipsec-non-forwarding
17.172. mc-lag
17.173. mc-maximum-routes
17.174. mc-ring
17.175. mcac
17.176. mcast-capacity
17.177. mcast-ipv4
17.178. mcast-ipv6
17.179. mcast-ipv6-snooping-scope
17.180. mcast-management
17.181. mcast-path-management
17.182. mcast-pool
17.183. mcast-reporting
17.184. mcast-reporting-dest
17.185. mcast-tunneling
17.186. mcast-upstream-asbr-frr
17.187. mcast-upstream-frr
17.188. mcast-vpn-ipv4
17.189. mcast-vpn-ipv6
17.190. mcc-mnc-prefix
17.191. mcr-default-gtw
17.192. mcs
17.193. mcs-interval
17.194. mcs-peer
17.195. md
17.196. md-auto-id
17.197. md-cli
17.198. md-cli-session
17.199. md-index-range
17.200. md-interfaces
17.201. mda
17.202. mda-type
17.203. mdl
17.204. mdl-transmit
17.205. mdt-pim
17.206. mdt-type
17.207. meas-interval
17.208. measurement-template
17.209. med-out
17.210. medium-duration-flow-count
17.211. member
17.212. member-threshold
17.213. members
17.214. memory
17.215. memory-alarm
17.216. memory-use-alarm
17.217. memory-use-warn
17.218. mep
17.219. mesh-group
17.220. mesh-sdp
17.221. mesh-sdp-binding
17.222. message
17.223. message-count
17.224. message-digest-key
17.225. message-fast-tx
17.226. message-fast-tx-init
17.227. message-interval
17.228. message-length
17.229. message-path
17.230. message-retransmit
17.231. message-severity-level
17.232. message-size
17.233. message-timeout
17.234. message-type
17.235. message-type-gtpv2
17.236. messages
17.237. meta-data
17.238. metric
17.239. metric-in
17.240. metric-out
17.241. metric-type
17.242. mfib-allowed-mda-destinations
17.243. mfib-ping
17.244. mfib-table-high-wmark
17.245. mfib-table-low-wmark
17.246. mfib-table-size
17.247. mgmt-ethernet
17.248. mh-mode
17.249. mhf-creation
17.250. micro-loop-avoidance
17.251. mid-pool
17.252. mid-tier
17.253. migrant
17.254. millisecond-event-timestamp
17.255. min-advertisement
17.256. min-advertisement-interval
17.257. min-auth-interval
17.258. min-bandwidth
17.259. min-delay
17.260. min-frame-length
17.261. min-lease-time
17.262. min-num-ue
17.263. min-route-advertisement
17.264. min-thresh-separation
17.265. min-vp-vpi
17.266. min-wait-to-advertise
17.267. minimum
17.268. minimum-age
17.269. minimum-change
17.270. minimum-classes
17.271. minimum-free
17.272. minimum-isa-generation
17.273. minimum-length
17.274. minimum-lifetimes
17.275. minimum-links
17.276. minute
17.277. minutes
17.278. mip
17.279. mip-ltr-priority
17.280. mir
17.281. mirror-dest
17.282. mirror-dest-reservation
17.283. mirror-dest-template
17.284. mirror-source
17.285. misc
17.286. mismatch-reaction
17.287. missing-mandatory-ie
17.288. mixed-lsp-mode
17.289. mka-hello-interval
17.290. mka-key-server-priority
17.291. mld
17.292. mld-parameters
17.293. mld-policy
17.294. mld-snooping
17.295. mldp
17.296. mlfr
17.297. mlppp
17.298. mlppp-profile-egress
17.299. mlppp-profile-ingress
17.300. mme
17.301. mmrp
17.302. mmrp-impm-override
17.303. mmrp-mac
17.304. mobility
17.305. mobility-acct-updates
17.306. mobility-triggered-acct
17.307. mode
17.308. mode-annexb
17.309. modify-buffer-allocation-rate
17.310. module
17.311. mofrr
17.312. mon-hw-agg-shaper-sch
17.313. mon-port-sch
17.314. monitor
17.315. monitor-agg-egress-queue-stats
17.316. monitor-bandwidth
17.317. monitor-depth
17.318. monitor-oper-group
17.319. monitor-port
17.320. monitor-ptsf-unusable
17.321. monitor-queue-depth
17.322. monitor-threshold
17.323. month
17.324. more
17.325. more-fragments
17.326. motd
17.327. move
17.328. move-frequency
17.329. mp-bgp-keep
17.330. mp-mbb-time
17.331. mpls
17.332. mpls-dm
17.333. mpls-echo-request-downstream-map
17.334. mpls-fwd-policy
17.335. mpls-label
17.336. mpls-labels
17.337. mpls-time-stamp-format
17.338. mpls-tp
17.339. mpls-tp-mep
17.340. mpls-tp-static
17.341. mrib
17.342. mrinfo
17.343. mrouter-dest
17.344. mrouter-port
17.345. mrp
17.346. mrp-policy
17.347. mrpdu
17.348. mrru
17.349. mru
17.350. mru-mismatch-detection
17.351. msap
17.352. msap-defaults
17.353. msap-policy
17.354. msdp
17.355. msg
17.356. msg-pacing
17.357. msisdn
17.358. mss-adjust-group
17.359. mst-instance
17.360. mst-max-hops
17.361. mst-name
17.362. mst-path-cost
17.363. mst-port-priority
17.364. mst-priority
17.365. mst-revision
17.366. mstat
17.367. mstat2
17.368. mt
17.369. mtrace
17.370. mtrace2
17.371. mtu
17.372. mtu-over-head
17.373. multi-access
17.374. multi-active
17.375. multi-chassis
17.376. multi-chassis-redundancy
17.377. multi-homing
17.378. multi-instance
17.379. multi-path
17.380. multi-service-site
17.381. multi-session-id
17.382. multi-sub-sap
17.383. multi-topology
17.384. multi-tunnel-type
17.385. multicast
17.386. multicast-fast-failover
17.387. multicast-import
17.388. multicast-info-policy
17.389. multicast-leave-sync-propagation
17.390. multicast-lsp
17.391. multicast-network-domain
17.392. multicast-policer
17.393. multicast-queue
17.394. multicast-redirection
17.395. multicast-senders
17.396. multicast-service
17.397. multicast6-fast-failover
17.398. multicastclient
17.399. multiclass
17.400. multihop
17.401. multilink-bundle
17.402. multipath-eligible
17.403. multiple-option
17.404. multiplier
17.405. multipliers
17.406. multistream-spmsi
17.407. mvpn
17.408. mvpn-ipv4
17.409. mvpn-ipv6
17.410. mvpn-no-export
17.411. mvpn-rtcache
17.412. mvpn-type
17.413. mvpn-vrf-import-subtype-new
17.414. mvr
17.415. mvrp
17.416. mvrp-control
18. n Commands
18.1. n391dte
18.2. n392dce
18.3. n392dte
18.4. n393
18.5. n393dce
18.6. n393dte
18.7. nak-non-matching-subnet
18.8. name
18.9. named-pool-policy
18.10. nas-identifier
18.11. nas-ip-addr
18.12. nas-ip-address
18.13. nas-ip-address-origin
18.14. nas-port
18.15. nas-port-id
18.16. nas-port-type
18.17. nasreq
18.18. nat
18.19. nat-access-mode
18.20. nat-allow-bypass
18.21. nat-classifier
18.22. nat-group
18.23. nat-import
18.24. nat-outside
18.25. nat-policy
18.26. nat-policy-name
18.27. nat-port-forwarding
18.28. nat-port-range
18.29. nat-prefix-list
18.30. nat-subscriber-string
18.31. nat-traversal
18.32. nat64
18.33. nat64-lsn-sub
18.34. national-bits
18.35. nbr
18.36. nd
18.37. nd-host-route
18.38. nd-learn-unsolicited
18.39. nd-populate-host-route
18.40. nd-proactive-refresh
18.41. nd-route-tag
18.42. neid
18.43. neighbor
18.44. neighbor-limit
18.45. neighbor-liveness-time
18.46. neighbor-resolution
18.47. neighbor-solicitation
18.48. neighbor-trust
18.49. neip
18.50. netbios-name-server
18.51. netbios-node-type
18.52. netconf
18.53. netconf-stream
18.54. network
18.55. network-address
18.56. network-domain
18.57. network-domains
18.58. network-element-discovery
18.59. network-interconnect-vxlan
18.60. network-interface
18.61. network-ip
18.62. network-queue
18.63. network-type
18.64. new-password-at-login
18.65. new-qinq-untagged-sap
18.66. new-session-id
18.67. newline
18.68. next
18.69. next-attempt
18.70. next-header
18.71. next-hop
18.72. next-hop-address
18.73. next-hop-group
18.74. next-hop-id
18.75. next-hop-interface-name
18.76. next-hop-resolution
18.77. next-hop-self
18.78. next-hop-unchanged
18.79. nh-type
18.80. nmda
18.81. nmda-support
18.82. no-match-action
18.83. node
18.84. node-id
18.85. node-id-in-rro
18.86. node-protect
18.87. node-sid
18.88. nokia-combined-modules
18.89. nokia-submodules
18.90. non-dr-attract-traffic
18.91. non-multi-chassis-tunnel-id-range
18.92. non-sub-traffic
18.93. non-vid-pid-absent
18.94. nonce-length
18.95. normal-state
18.96. notification
18.97. notification-interval
18.98. notify
18.99. notify-dest-change
18.100. nssa
18.101. nssa-range
18.102. ntf-logout-retry-count
18.103. ntp
18.104. ntp-reply
18.105. ntp-server
18.106. number
18.107. number-down
18.108. number-paths
18.109. number-retries
19. o Commands
19.1. oam
19.2. oam-perf
19.3. oam-pm
19.4. oam-template
19.5. ocsp
19.6. octet-counters
19.7. octets-admitted-count
19.8. octets-denied-count
19.9. of-controller
19.10. of-switch
19.11. offer-selection
19.12. offer-time
19.13. offered-measurement
19.14. offset
19.15. on-cac-failure
19.16. on-error
19.17. on-failure
19.18. on-link
19.19. one-garp-per-sap
19.20. one-time-http-redirection
19.21. one-time-redirect
19.22. one-way-delay-test
19.23. one-way-delay-threshold
19.24. opaque-data
19.25. opcode
19.26. open
19.27. open-flow
19.28. oper-down-on-group-degrade
19.29. oper-group
19.30. oper-members
19.31. oper-up-while-empty
19.32. operations
19.33. opt-reporting-fields
19.34. optimal-route-reflection
19.35. optimized-mode
19.36. option
19.37. option-present
19.38. option60
19.39. options
19.40. options6
19.41. origin
19.42. origin-host
19.43. origin-invalid-unusable
19.44. origin-realm
19.45. origin-validation
19.46. origin-validation-state
19.47. originate-default-route
19.48. originated-qos-marking
19.49. origination-fpe
19.50. orphan-override
19.51. ospf
19.52. ospf-dynamic-hostnames
19.53. ospf3
19.54. other-stateful-configuration
19.55. otu
19.56. otu2-lan-data-rate
19.57. out-label
19.58. out-of-credit-action
19.59. out-of-credit-action-override
19.60. out-of-credit-reporting
19.61. out-profile-octets-discarded-count
19.62. out-profile-octets-forwarded-count
19.63. out-profile-octets-offered-count
19.64. out-profile-packets-discarded-count
19.65. out-profile-packets-forwarded-count
19.66. out-profile-packets-offered-count
19.67. out-profile-rate
19.68. out-remark
19.69. outbound-max-sessions
19.70. outbound-route-filtering
19.71. outer-tag
19.72. output
19.73. output-authorization
19.74. outside
19.75. outside-ip
19.76. outside-service-id
19.77. overall
19.78. overall-rate
19.79. overflow
19.80. overflow-limit
19.81. overload
19.82. overload-drop
19.83. overload-export-external
19.84. overload-export-interlevel
19.85. overload-include-ext-1
19.86. overload-include-ext-2
19.87. overload-include-stub
19.88. overload-on-boot
19.89. overload-sub-quarantine
19.90. override
19.91. override-bmi
19.92. override-counter
19.93. override-erld
19.94. override-slaac
19.95. override-tunnel-elc
19.96. own-auth-method
19.97. owner
20. p Commands
20.1. p2mp
20.2. p2mp-candidate-path
20.3. p2mp-id
20.4. p2mp-ipv4
20.5. p2mp-ipv6
20.6. p2mp-ldp-tree-join
20.7. p2mp-lsp-ping
20.8. p2mp-lsp-trace
20.9. p2mp-merge-point-abort-timer
20.10. p2mp-policy
20.11. p2mp-resignal-timer
20.12. p2mp-s2l-fast-retry
20.13. p2mp-sr
20.14. p2mp-sr-tree
20.15. p2mp-template-lsp
20.16. p2p-active-path-fast-retry
20.17. p2p-merge-point-abort-timer
20.18. p2p-template-lsp
20.19. packet
20.20. packet-byte-offset
20.21. packet-length
20.22. packet-rate-high-wmark
20.23. packet-rate-low-wmark
20.24. packet-rx
20.25. packet-sanity
20.26. packet-size
20.27. packet-too-big
20.28. packet-tx
20.29. packet-type
20.30. packets
20.31. packets-admitted-count
20.32. packets-denied-count
20.33. pad-size
20.34. pad-tlv-size
20.35. padding-size
20.36. padi-auth-policy
20.37. pado-ac-name
20.38. pado-delay
20.39. pairing-button
20.40. parallel
20.41. param-problem
20.42. parent
20.43. parent-location
20.44. parent-mid-pool
20.45. parent-root-pool
20.46. participant-id
20.47. participate
20.48. partitions
20.49. partner-down-delay
20.50. passive
20.51. passive-mode
20.52. passkey
20.53. password
20.54. password-history
20.55. pat-repetition
20.56. pat-syntax
20.57. path
20.58. path-b
20.59. path-computation-method
20.60. path-cost
20.61. path-destination
20.62. path-discovery
20.63. path-excl
20.64. path-id
20.65. path-mtu
20.66. path-mtu-discovery
20.67. path-preference
20.68. path-probing
20.69. path-profile
20.70. path-restoration-time
20.71. path-threshold
20.72. path-type
20.73. patherr
20.74. pathtear
20.75. pattern
20.76. payload
20.77. pbb
20.78. pbb-etype
20.79. pbr-down-action-override
20.80. pcap
20.81. pcc
20.82. pce
20.83. pce-control
20.84. pce-initiated-lsp
20.85. pce-report
20.86. pcep
20.87. pcm
20.88. pcm-type
20.89. pcp
20.90. pcp-server
20.91. pcp-server-policy
20.92. pcr-repetition
20.93. pd-managed-route
20.94. pdn-connection-id
20.95. pdn-type
20.96. pdp-context-type
20.97. pe-id-mac-flush-interop
20.98. peak-rate
20.99. peer
20.100. peer-address-change-policy
20.101. peer-as
20.102. peer-endpoint
20.103. peer-group
20.104. peer-interface-address
20.105. peer-ip-address
20.106. peer-ip-prefix
20.107. peer-limit
20.108. peer-loopback-address
20.109. peer-name
20.110. peer-profile
20.111. peer-profile-map
20.112. peer-rdi-rx
20.113. peer-template
20.114. peer-template-map
20.115. peer-to-peer
20.116. peer-tracking-policy
20.117. peer-transport
20.118. peer6
20.119. peers
20.120. pending-requests-limit
20.121. peq
20.122. peq-type
20.123. per-fp-egr-queuing
20.124. per-fp-ing-queuing
20.125. per-fp-sap-instance
20.126. per-host-authentication
20.127. per-host-replication
20.128. per-link-hash
20.129. per-mcast-plane-capacity
20.130. per-peer-queuing
20.131. per-service-hashing
20.132. per-source-rate
20.133. per-spi-replication
20.134. per-user
20.135. percent-rate
20.136. percent-reduction-from-mbs
20.137. performance
20.138. period
20.139. periodic
20.140. periodic-loopback
20.141. periodic-sm
20.142. periodic-time
20.143. periodic-timer
20.144. periodic-update
20.145. periodic-update-interval
20.146. persist
20.147. persistence
20.148. persistency-database
20.149. persistent-subscriptions
20.150. pfcp
20.151. pfcp-association
20.152. pfs
20.153. pfs-dh-group
20.154. pgw
20.155. phone
20.156. physical-access-id
20.157. pid-pmt-unref
20.158. pim
20.159. pim-asm
20.160. pim-policy
20.161. pim-snooping
20.162. pim-ssm
20.163. pim-ssm-scaling
20.164. ping
20.165. ping-reply
20.166. ping-template
20.167. ping-test
20.168. pip
20.169. pir
20.170. pki
20.171. pkt-too-big
20.172. platform-type
20.173. pm-tti
20.174. pmt-repetition
20.175. pmt-syntax
20.176. pmtu-discovery-aging
20.177. poi-tlv-enable
20.178. policer
20.179. policer-control-override
20.180. policer-control-policy
20.181. policer-override
20.182. policer-stats
20.183. policer-stats-resources
20.184. policers
20.185. policers-hqos-manageable
20.186. policing
20.187. policy
20.188. policy-accounting
20.189. policy-acct-template
20.190. policy-control
20.191. policy-options
20.192. policy-override
20.193. policy-reference-checks
20.194. policy-statement
20.195. policy-variables
20.196. poll
20.197. poll-interval
20.198. pool
20.199. pool-manager
20.200. pool-name
20.201. pop
20.202. populate
20.203. port
20.204. port-block-extension
20.205. port-bw-oversub-factor
20.206. port-control
20.207. port-down
20.208. port-format
20.209. port-forwarding
20.210. port-forwarding-dyn-block-reservation
20.211. port-forwarding-range
20.212. port-id
20.213. port-id-subtype
20.214. port-limits
20.215. port-list
20.216. port-map
20.217. port-num
20.218. port-overall-rate
20.219. port-parent
20.220. port-policy
20.221. port-range-block
20.222. port-recorder
20.223. port-redirect-group
20.224. port-reservation
20.225. port-role
20.226. port-scheduler-policy
20.227. port-set
20.228. port-state
20.229. port-template
20.230. port-threshold
20.231. port-topology
20.232. port-type
20.233. port-weight-speed
20.234. port-xc
20.235. port1
20.236. port2
20.237. portal
20.238. portal-group
20.239. portal-groups
20.240. portal-hold-time
20.241. portals
20.242. ports
20.243. post-policer-mapping
20.244. power
20.245. power-control
20.246. power-priority-level
20.247. power-safety-alert
20.248. power-safety-level
20.249. power-save
20.250. power-supply
20.251. ppid
20.252. ppid-range
20.253. ppp
20.254. ppp-authentication
20.255. ppp-chap-challenge-length
20.256. ppp-initial-delay
20.257. ppp-mtu
20.258. ppp-options
20.259. ppp-policy
20.260. ppp-sub-id-key
20.261. ppp-user-db
20.262. ppp-user-name
20.263. pppoe
20.264. pppoe-access-method
20.265. pppoe-client
20.266. pppoe-client-policy
20.267. pppoe-lac
20.268. pppoe-local
20.269. pppoe-overall
20.270. pppoe-policy
20.271. pppoe-python-policy
20.272. pppoe-service-name
20.273. pppoe-trace
20.274. pppoe-user-db
20.275. pptp
20.276. pre-auth-policy
20.277. pre-login-message
20.278. pre-shared-key
20.279. pre-update-time
20.280. prec
20.281. precedence
20.282. preempt
20.283. preemption-timer
20.284. prefer-failure
20.285. prefer-local-time
20.286. prefer-mcast-tunnel-in-tunnel
20.287. prefer-protocol-stitching
20.288. prefer-tunnel-in-tunnel
20.289. preference
20.290. preference-option
20.291. preferred
20.292. preferred-lifetime
20.293. prefix
20.294. prefix-attributes-tlv
20.295. prefix-delegation
20.296. prefix-exclude
20.297. prefix-ipv4
20.298. prefix-ipv6
20.299. prefix-limit
20.300. prefix-list
20.301. prefix-options
20.302. prefix-policy
20.303. prefix-sid-range
20.304. preserve-key
20.305. primary
20.306. primary-cf
20.307. primary-config
20.308. primary-dns
20.309. primary-image
20.310. primary-ip-address
20.311. primary-ipv6-address
20.312. primary-location
20.313. primary-nbns
20.314. primary-next-hop
20.315. primary-p2mp-instance
20.316. primary-path
20.317. primary-ports
20.318. primary-tunnel-interface
20.319. primary-url
20.320. prio-code-point
20.321. priority
20.322. priority-event
20.323. priority-marking
20.324. priority-mbs-thresholds
20.325. priority-sessions
20.326. priority1
20.327. priority2
20.328. priv-lvl
20.329. priv-lvl-map
20.330. private-interface
20.331. private-ki
20.332. private-retail-subnets
20.333. private-service
20.334. private-tcp-mss-adjust
20.335. probe-count
20.336. probe-fail-enable
20.337. probe-fail-threshold
20.338. probe-history
20.339. process-cpm-traffic-on-sap-down
20.340. profile
20.341. profile-capped
20.342. profile-out-preserve
20.343. profile-preferred
20.344. profiled-traffic-only
20.345. progress-indicator
20.346. prompt
20.347. propagate-admin-group
20.348. propagate-hold-time
20.349. propagate-mac-flush
20.350. propagate-mac-flush-from-bvpls
20.351. propagate-metric
20.352. propagate-pmtu-v4
20.353. propagate-pmtu-v6
20.354. propagate-topology-change
20.355. protect-bundle
20.356. protect-circuit
20.357. protect-path
20.358. protect-tp-path
20.359. protecting-nexthop-id
20.360. protection
20.361. protection-template
20.362. protection-type
20.363. protocol
20.364. protocol-configuration-options
20.365. protocol-list
20.366. protocol-port
20.367. protocol-protection
20.368. provider-tunnel
20.369. proxy
20.370. proxy-arp
20.371. proxy-arp-nd
20.372. proxy-arp-policy
20.373. proxy-authentication
20.374. proxy-lcp
20.375. proxy-nd
20.376. proxy-nd-policy
20.377. proxy-server
20.378. ps-information
20.379. psi-payload
20.380. psid-offset
20.381. psnp-authentication
20.382. ptp
20.383. ptp-asymmetry
20.384. ptp-hw-assist
20.385. ptp-tc
20.386. ptsf
20.387. public-key-authentication
20.388. public-key-min-bits
20.389. public-keys
20.390. public-tcp-mss-adjust
20.391. purge-timeout
20.392. purge-timer
20.393. push
20.394. pushed-labels
20.395. pw-cap-list
20.396. pw-path-id
20.397. pw-port
20.398. pw-port-list
20.399. pw-routing
20.400. pw-sap-secondary-shaper
20.401. pw-status-signaling
20.402. pw-template
20.403. pw-template-bind
20.404. pw-template-binding
20.405. pw-template-id-range
20.406. pw-type
20.407. pwc
20.408. pxc
20.409. pxc-pxc-id.sub-port-id
20.410. python
20.411. python-policy
20.412. python-policy-cache
20.413. python-script
21. q Commands
21.1. q-tag-range
21.2. qci
21.3. qinq
21.4. qinq-etype
21.5. qinq-mark-top-only
21.6. qinq-vlan-translation
21.7. ql-minimum
21.8. ql-override
21.9. ql-selection
21.10. qos
21.11. qos-marking-from-sap
21.12. qos-policy-id-range
21.13. qos-profile
21.14. qos-route-lookup
21.15. query-interval
21.16. query-last-listener-interval
21.17. query-last-member-interval
21.18. query-response-interval
21.19. query-src-ip
21.20. queue
21.21. queue-delay
21.22. queue-frame-based-accounting
21.23. queue-group
21.24. queue-group-egress
21.25. queue-group-ingress
21.26. queue-group-redirect-list
21.27. queue-group-templates
21.28. queue-instance-accounting
21.29. queue-override
21.30. queue-overrides
21.31. queue-parameters
21.32. queue-policy
21.33. queues
21.34. queues-hqos-manageable
21.35. quiet-period
21.36. quit
22. r Commands
22.1. radius
22.2. radius-accounting
22.3. radius-accounting-policy
22.4. radius-accounting-server
22.5. radius-attr
22.6. radius-auth-policy
22.7. radius-authentication
22.8. radius-authentication-policy
22.9. radius-authentication-server
22.10. radius-coa-port
22.11. radius-plcy
22.12. radius-proxy
22.13. radius-proxy-cache
22.14. radius-proxy-server
22.15. radius-script-policy
22.16. radius-server
22.17. radius-server-policy
22.18. radius-session-timeout
22.19. radius-user-name
22.20. rai
22.21. range
22.22. rapid-psc-timer
22.23. rapid-retransmit-time
22.24. rapid-retry-limit
22.25. rapid-update
22.26. rapid-withdrawal
22.27. rat-type
22.28. rate
22.29. rate-adjustment
22.30. rate-calc-min-int
22.31. rate-down
22.32. rate-limit
22.33. rate-modify
22.34. rate-monitor
22.35. rate-percentage
22.36. rate-percentage-stage2
22.37. rate-reduction
22.38. rate-thresholds
22.39. rating-group
22.40. raw
22.41. rd
22.42. rdi-alarms
22.43. rdnss-lifetime
22.44. re-auth-period
22.45. re-authentication
22.46. re-establish-session
22.47. reachable-time
22.48. reactivation-failure-threshold
22.49. reactivation-interval
22.50. reactivation-threshold
22.51. reactivation-timeout
22.52. read-algorithm
22.53. reassemble
22.54. reassembly
22.55. reassembly-group
22.56. reassembly-timeout
22.57. rebind-timer
22.58. reboot
22.59. receive
22.60. receive-interval
22.61. receive-msdp-msg-rate
22.62. receive-window-size
22.63. receiver
22.64. reclassify-using-qos
22.65. reconnect-timeout
22.66. record
22.67. record-label
22.68. record-stats
22.69. recovery
22.70. recovery-failed
22.71. recovery-max-session-lifetime
22.72. recovery-method
22.73. recovery-time
22.74. recovery-timer
22.75. red
22.76. red-alarm-threshold
22.77. red-differential-delay
22.78. red-source-list
22.79. redelegation-timer
22.80. redirect-https
22.81. redirect-policy
22.82. redirect-policy-binding
22.83. redirect-url
22.84. redirect-vprn
22.85. redirection
22.86. redirection-policy
22.87. redirects
22.88. redistribute-delay
22.89. redistribute-external
22.90. redo
22.91. reduced-prompt
22.92. redundancy
22.93. redundant-interface
22.94. redundant-mcast-capacity
22.95. redundant-multicast
22.96. ref-aa-specific-counter
22.97. ref-order
22.98. ref-override-counter
22.99. ref-policer
22.100. ref-queue
22.101. ref1
22.102. ref2
22.103. reference-bandwidth
22.104. reflect-pad
22.105. reflector
22.106. refresh-reduction
22.107. refresh-reduction-over-bypass
22.108. refresh-time
22.109. refresh-timer
22.110. register
22.111. registrant-sm
22.112. reinit-delay
22.113. reject-disabled-ncp
22.114. relative
22.115. relay
22.116. relay-plain-bootp
22.117. relay-proxy
22.118. relay-unsolicited-cfg-attribute
22.119. release-reason
22.120. release-timeout
22.121. reliable-delivery
22.122. reload
22.123. rem-router-id
22.124. remark
22.125. remarking
22.126. remote
22.127. remote-address
22.128. remote-age
22.129. remote-attachment-circuit
22.130. remote-ecid
22.131. remote-gateway-address
22.132. remote-id
22.133. remote-ip
22.134. remote-ip-address
22.135. remote-ip-range-start
22.136. remote-lfa
22.137. remote-loop-respond
22.138. remote-mac
22.139. remote-management
22.140. remote-max-checkpoints
22.141. remote-mepid
22.142. remote-name
22.143. remote-proxy-arp
22.144. remote-servers
22.145. remote-source
22.146. remote-v6-ip
22.147. remote-ve-name
22.148. remove-oldest
22.149. remove-private
22.150. renew-timer
22.151. renotify
22.152. renum
22.153. renumber
22.154. reorder-audio
22.155. repair
22.156. repeated-characters
22.157. replace
22.158. replace-result-code
22.159. replay-protection
22.160. replay-window
22.161. replay-window-size
22.162. replication-segment
22.163. replication-sid
22.164. replication-threshold
22.165. reply-on-padt
22.166. report-alarm
22.167. report-alarms
22.168. report-ip-address-event
22.169. report-local-routes
22.170. report-path-constraints
22.171. report-rate
22.172. report-src-ip
22.173. report-wlan-location
22.174. reporting
22.175. request
22.176. request-script-policy
22.177. request-timer
22.178. requests
22.179. required
22.180. rescue-location
22.181. reserved
22.182. reserved-label-block
22.183. reserved-lbl-block
22.184. reset-on-recoverable-error
22.185. reset-policy-exclusive
22.186. reset-query
22.187. reset-unknown-tcp
22.188. resignal-on-igp-event
22.189. resignal-on-igp-overload
22.190. resignal-timer
22.191. resolution
22.192. resolution-filter
22.193. resolve
22.194. resolve-root-using
22.195. resolve-static
22.196. responder-url
22.197. response-signing-cert
22.198. restart-backoff
22.199. restart-time
22.200. restore-disconnected
22.201. restrict-protected-src
22.202. restrict-unprotected-dst
22.203. restricted-to-home
22.204. results
22.205. resv
22.206. resv-cbs
22.207. resv-ret
22.208. resverr
22.209. resvtear
22.210. ret
22.211. ret-session-timeout
22.212. retail-service-id
22.213. retail-svc-id
22.214. retransmission-interval
22.215. retransmit-interval
22.216. retransmit-time
22.217. retries
22.218. retry
22.219. retry-count
22.220. retry-down
22.221. retry-interval
22.222. retry-limit
22.223. retry-on-igp-overload
22.224. retry-timeout
22.225. retry-timer
22.226. retry-up
22.227. reuse
22.228. reuse-ext-ip
22.229. reverse-path
22.230. revert
22.231. revert-members
22.232. revert-time
22.233. revert-timer
22.234. revertive
22.235. revertive-timer
22.236. revocation-check
22.237. rib-api
22.238. rib-api-getversion
22.239. rib-api-modify
22.240. rib-management
22.241. rib-priority
22.242. ring
22.243. ring-node
22.244. rip
22.245. rip-policy
22.246. ripng
22.247. rmon
22.248. roaming
22.249. robust-count
22.250. role
22.251. rollback
22.252. rollback-location
22.253. rollback-sync
22.254. rollover
22.255. root
22.256. root-address
22.257. root-and-leaf
22.258. root-guard
22.259. root-pool
22.260. root-tier
22.261. root-tree-id
22.262. round-robin-inactive-records
22.263. route
22.264. route index
22.265. route-admin-tag-policy
22.266. route-distinguisher
22.267. route-downloader
22.268. route-exists
22.269. route-limit
22.270. route-monitoring
22.271. route-next-hop
22.272. route-next-hop-policy
22.273. route-preference
22.274. route-recovery-wait
22.275. route-refresh
22.276. route-table
22.277. route-table-import
22.278. route-target
22.279. route-target-list
22.280. route-unknown
22.281. router
22.282. router-advertisement
22.283. router-advertisement-policy
22.284. router-advertisements
22.285. router-id
22.286. router-instance
22.287. router-lifetime
22.288. router-solicit
22.289. router-solicitation
22.290. router-target-as-number
22.291. router-unsolicited-na-flood-evpn
22.292. routing-type0
22.293. rp
22.294. rp-candidate
22.295. rp-set-peer
22.296. rpc-authorization
22.297. rpf-select
22.298. rpf-table
22.299. rpf6-table
22.300. rpfv
22.301. rpki-session
22.302. rpl-end
22.303. rpl-node
22.304. rr
22.305. rr-use-route-table
22.306. rs-fec-mode
22.307. rsa
22.308. rsa-key
22.309. rsa-signature
22.310. rsvp-auto
22.311. rsvp-resv-style
22.312. rsvp-shortcut
22.313. rsvp-te
22.314. rt-buffer-size
22.315. rt-client
22.316. rt-client-src-address
22.317. rt-payload-type
22.318. rt-rate
22.319. rt-server
22.320. rtm
22.321. rtm-debounce-time
22.322. rtp-header
22.323. rtp-performance
22.324. rtr-adv-lsa-limit
22.325. rtr-solicit-user-db
22.326. rtsp
22.327. rtt-threshold
22.328. rtt-threshold-rat
22.329. rtt-threshold-tolerance
22.330. rule-prefix
22.331. rx-discard-on-ndf
22.332. rx-eth-ed
22.333. rx-eth-vsm-grace
22.334. rx-los-reaction
22.335. rx-los-thresh
22.336. rx-must-be-encrypted
22.337. rx-update-pacing
22.338. rxdtv-adjust
23. s Commands
23.1. s-pmsi
23.2. s-tag
23.3. s-tag-range
23.4. s11
23.5. s2l-path
23.6. sa-db
23.7. sa-mac
23.8. sa-timeout
23.9. saa
23.10. saii-type2
23.11. same-recipnonce-for-pollreq
23.12. sample-interval
23.13. sample-multiplier
23.14. sample-profile
23.15. sample-rate
23.16. sample-window
23.17. sampling
23.18. sampling-rate
23.19. sap
23.20. sap-egress
23.21. sap-host-limit
23.22. sap-id
23.23. sap-ingress
23.24. sap-limit
23.25. sap-parameters
23.26. sap-session-index
23.27. sap-session-limit
23.28. sap-template
23.29. sap-template-binding
23.30. sat-type
23.31. satellite
23.32. save
23.33. save-deterministic-script
23.34. saved-ind-prompt
23.35. scaling-profile
23.36. sched-class
23.37. sched-class-elevation
23.38. sched-run-min-int
23.39. schedule
23.40. schedule-type
23.41. scheduler
23.42. scheduler-override
23.43. scheduler-parent
23.44. scheduler-policy
23.45. scheduler-stats
23.46. scheduling-class
23.47. schema-path
23.48. scope
23.49. scp
23.50. scramble
23.51. script
23.52. script-all-info
23.53. script-compile-error
23.54. script-control
23.55. script-export-variables
23.56. script-output
23.57. script-output-on-error
23.58. script-parameters-1
23.59. script-parameters-2
23.60. script-parameters-3
23.61. script-parameters-4
23.62. script-policy
23.63. script-runtime-error
23.64. script-url
23.65. scripts
23.66. scte30
23.67. scte35-action
23.68. sctp-filter
23.69. sctp-filter-stats
23.70. sd
23.71. sd-offset
23.72. sd-threshold
23.73. sd-threshold-clear
23.74. sdp
23.75. sdp-exclude
23.76. sdp-group
23.77. sdp-id-range
23.78. sdp-include
23.79. sdp-mtu
23.80. sdp-ping
23.81. seamless-bfd
23.82. search
23.83. secondary
23.84. secondary-config
23.85. secondary-dns
23.86. secondary-fast-retry-timer
23.87. secondary-image
23.88. secondary-ip-address
23.89. secondary-ipv6-address
23.90. secondary-location
23.91. secondary-nbns
23.92. secondary-path
23.93. secondary-ports
23.94. secondary-retry-limit
23.95. secondary-shaper-hashing
23.96. secondary-url
23.97. secret
23.98. section-trace
23.99. secure-nd
23.100. secure-nd-export
23.101. secure-nd-import
23.102. security
23.103. security-association
23.104. security-param-index
23.105. security-parameter
23.106. security-policy
23.107. seen-ip-radius-acct-policy
23.108. segment
23.109. segment-list
23.110. segment-protection-type
23.111. segment-routing
23.112. segment-routing-v6
23.113. sel-mcast-advertisement
23.114. selection-criteria
23.115. selective
23.116. selective-label-ipv4-install
23.117. selective-learned-fdb
23.118. send
23.119. send-accounting-response
23.120. send-acct-stop-on-fail
23.121. send-bvpls-evpn-flush
23.122. send-bvpls-flush
23.123. send-chain
23.124. send-count
23.125. send-default
23.126. send-fib-population-packets
23.127. send-flush-on-bvpls-failure
23.128. send-flush-on-failure
23.129. send-idr-after-eap-success
23.130. send-imet-ir-on-ndf
23.131. send-orf
23.132. send-queries
23.133. send-refresh
23.134. send-release
23.135. send-to-ebgp
23.136. send-tunnel-encap
23.137. sender-id
23.138. sensor-group
23.139. sensor-groups
23.140. sequence-group
23.141. serial-notify
23.142. serial-query
23.143. server
23.144. server-address
23.145. server-cipher-list
23.146. server-id
23.147. server-ip
23.148. server-kex-list
23.149. server-mac-list
23.150. server-policy
23.151. server-port
23.152. server-shutdown
23.153. server-timeout
23.154. server-tls-profile
23.155. server6
23.156. servers
23.157. service
23.158. service-carving
23.159. service-category
23.160. service-context-id
23.161. service-id
23.162. service-id-lag-hashing
23.163. service-id-range
23.164. service-mtu
23.165. service-name
23.166. service-prefix
23.167. service-range
23.168. services-all-events
23.169. serving-network
23.170. session
23.171. session-accounting
23.172. session-assign-method
23.173. session-filter
23.174. session-filter-stats
23.175. session-hold-time
23.176. session-id
23.177. session-id-format
23.178. session-key
23.179. session-limit
23.180. session-limits
23.181. session-messages
23.182. session-optimized-stop
23.183. session-parameters
23.184. session-time
23.185. session-timeout
23.186. set-time
23.187. set-tos
23.188. setup-role
23.189. setup-timeout
23.190. severity
23.191. severity-level
23.192. sf-offset
23.193. sf-sd-method
23.194. sf-threshold
23.195. sf-threshold-clear
23.196. sflow
23.197. sfm
23.198. sfm-loss-threshold
23.199. sfm-type
23.200. sg
23.201. sgsn-mcc-mnc
23.202. sgt-qos
23.203. shallow-inspection
23.204. sham-link
23.205. sham-neighbor
23.206. shape-multi-client-only
23.207. shaper
23.208. shaping
23.209. shared-circuit-id
23.210. shared-queue
23.211. shared-radius-filter-wmark
23.212. shared-resources
23.213. shcv-policy
23.214. shcv-policy-ipv4
23.215. shcv-policy-ipv6
23.216. shell
23.217. short-duration-flow-count
23.218. short-sequence
23.219. short-sequence-numbers
23.220. shortcut-local-ttl-propagate
23.221. shortcut-transit-ttl-propagate
23.222. shortcut-tunnel
23.223. show-ipsec-keys
23.224. show-request
23.225. shutdown
23.226. sid
23.227. sid-action
23.228. sid-allocation
23.229. sid-map
23.230. sid-protection
23.231. signal-label
23.232. signal-mode
23.233. signaled-vc-type-override
23.234. signaling
23.235. significant-change
23.236. single-fiber
23.237. single-mac
23.238. single-sfm-overload
23.239. single-sub-parameters
23.240. sip
23.241. site
23.242. site-activation-timer
23.243. site-id
23.244. site-min-down-timer
23.245. site-preference
23.246. size
23.247. size-limit
23.248. skip-gtp-ipv4-alloc
23.249. skip-ttl-decrement
23.250. sla-profile
23.251. sla-profile-map
23.252. sla-profile-string
23.253. slaac
23.254. slaac-prefix
23.255. sleep
23.256. slice-size
23.257. slm
23.258. slope-policy
23.259. slow-psc-timer
23.260. slow-queue-threshold
23.261. sm-tti
23.262. snap-oui
23.263. snap-pid
23.264. snmp
23.265. snmp-trap-group
23.266. snoop
23.267. snooping
23.268. sntp
23.269. socket
23.270. soft-quota-exhausted
23.271. soft-quota-exhausted-filter
23.272. software-repository
23.273. solicit-delay
23.274. solicited-release
23.275. sonet-sdh
23.276. source
23.277. source-address
23.278. source-address-range
23.279. source-bmac
23.280. source-bmac-lsb
23.281. source-class
23.282. source-destination-prefix
23.283. source-ip
23.284. source-ip-address-ranges
23.285. source-ip-origin
23.286. source-mac
23.287. source-override
23.288. source-port
23.289. source-prefix
23.290. source-prefix-list
23.291. source-udp-port
23.292. source-vtep-security
23.293. sp-reverse-route
23.294. space
23.295. spb
23.296. spbm-control-vpls
23.297. spe-address
23.298. speed
23.299. spf
23.300. spf-wait
23.301. spi
23.302. spi-load-balancing
23.303. spi-sharing-group-id
23.304. spi-sharing-id
23.305. split-horizon
23.306. split-horizon-group
23.307. spoke-sdp
23.308. spoke-sdp-fec
23.309. spt-switchover-threshold
23.310. squelch
23.311. squelch-ingress-ctag-levels
23.312. squelch-ingress-levels
23.313. sr-isis
23.314. sr-label-index
23.315. sr-labels
23.316. sr-maintenance-policy
23.317. sr-ospf
23.318. sr-ospf3
23.319. sr-policies
23.320. sr-policy
23.321. sr-policy-import
23.322. sr-te
23.323. sr-te-lsp
23.324. sr-te-resignal
23.325. src-access-list
23.326. src-gsn
23.327. src-host
23.328. src-ip
23.329. src-ip-address
23.330. src-ipv4-address
23.331. src-ipv6-address
23.332. src-mac
23.333. src-mac-address
23.334. src-port
23.335. src-prefix
23.336. src-route-option
23.337. src-tcp-port
23.338. src-udp-port
23.339. srefresh
23.340. srh-mode
23.341. srlb
23.342. srlg
23.343. srlg-database
23.344. srlg-enable
23.345. srlg-frr
23.346. srlg-group
23.347. srrp
23.348. srrp-enabled-routing
23.349. srrp-instance
23.350. srv6
23.351. srv6-instance
23.352. ssap
23.353. ssh
23.354. ssh-max-sessions
23.355. ssh-reply
23.356. ssm
23.357. ssm-assert-compatible-mode
23.358. ssm-bit
23.359. ssm-default-range-disable
23.360. ssm-groups
23.361. ssm-translate
23.362. stable-pool-sizing
23.363. stack
23.364. stack-capability-signaling
23.365. stale-routes-time
23.366. stale-time
23.367. standard-multi-instance
23.368. standby
23.369. standby-forwarding
23.370. standby-ip-lifetime
23.371. standby-mep-shutdown
23.372. standby-signaling
23.373. standby-signaling-master
23.374. standby-signaling-slave
23.375. starg
23.376. start
23.377. start-avg
23.378. start-entry
23.379. start-label
23.380. startup-wait-time
23.381. stat-mode
23.382. state
23.383. state-change
23.384. state-timer
23.385. stateful
23.386. stateless
23.387. stateless-aps-switchover
23.388. static
23.389. static-aa-sub
23.390. static-address
23.391. static-arp
23.392. static-cak
23.393. static-entry
23.394. static-function
23.395. static-host
23.396. static-host-mgmt
23.397. static-isid
23.398. static-label-range
23.399. static-lsp
23.400. static-lsp-fast-retry
23.401. static-mac
23.402. static-policer
23.403. static-policy
23.404. static-remote-aa-sub
23.405. static-route
23.406. static-route-entry
23.407. static-route-hold-down
23.408. static-sa
23.409. static-string
23.410. static-tunnel-redundant-next-hop
23.411. station
23.412. station-address
23.413. statistic
23.414. statistics
23.415. stats-collection
23.416. stats-report-interval
23.417. stats-type
23.418. status-verify
23.419. std-acct-attributes
23.420. std-port-class-pools
23.421. steering-profile
23.422. steering-route
23.423. sticky-dest
23.424. sticky-dr
23.425. sticky-ecmp
23.426. sticky-msaps
23.427. stp
23.428. stream-selection
23.429. streaming
23.430. strict
23.431. strict-adjacency-check
23.432. strict-lsa-checking
23.433. strict-mode
23.434. string
23.435. strings-from-option
23.436. strip-label
23.437. stub
23.438. sub-domain
23.439. sub-host-trk
23.440. sub-hosts-only
23.441. sub-id
23.442. sub-ident-policy
23.443. sub-insert-credit-control
23.444. sub-insert-radius
23.445. sub-insert-shared-pccrule
23.446. sub-insert-shared-radius
23.447. sub-insert-wmark
23.448. sub-mcac-policy
23.449. sub-mgmt
23.450. sub-mgmt-extensions
23.451. sub-port
23.452. sub-profile
23.453. sub-profile-map
23.454. sub-profile-string
23.455. sub-ring
23.456. sub-sla-mgmt
23.457. subject
23.458. subnet
23.459. subnet-check
23.460. subnet-mask
23.461. subrate
23.462. subscriber
23.463. subscriber-bw-limit
23.464. subscriber-data
23.465. subscriber-id
23.466. subscriber-identification
23.467. subscriber-interface
23.468. subscriber-limit
23.469. subscriber-mgmt
23.470. subscriber-prefix-length
23.471. subscriber-prefixes
23.472. subscriber-retention
23.473. subscriber-sap-id
23.474. subscription
23.475. subscription cancel-all
23.476. subtype
23.477. suggest-internal-objects
23.478. summaries
23.479. summary
23.480. summary-address
23.481. summary-crit
23.482. super-backbone
23.483. supplicant-timeout
23.484. supported-features
23.485. suppress
23.486. suppress-attached-bit
23.487. suppress-dn-bit
23.488. suppress-lo-alarm
23.489. suppress-lsn-events
23.490. suppress-lsn-sub-blks-free
23.491. suppress-standby-signaling
23.492. suppress-threshold
23.493. svc-id
23.494. svc-path
23.495. svc-ping
23.496. svlan-statistics
23.497. swap
23.498. sweep
23.499. switch-defined-cookie
23.500. switch-fabric
23.501. switching-mode
23.502. switching-type
23.503. switchover-exec
23.504. symbol-monitor
23.505. sync
23.506. sync-boot-env
23.507. sync-e
23.508. sync-if-timing
23.509. synce
23.510. synchronize
23.511. synchronous-execution
23.512. syslog
23.513. syslog-export-policy
23.514. system
23.515. system-base-mac
23.516. system-behavior
23.517. system-filter
23.518. system-id
23.519. system-ip-load-balancing
23.520. system-mac
23.521. system-priority
23.522. system-profile
23.523. system-reserve
24. t Commands
24.1. t2-paths
24.2. t391
24.3. t391dte
24.4. t392
24.5. t392dce
24.6. tab
24.7. table-size
24.8. tacplus
24.9. tacplus-map-to-priv-lvl
24.10. tag
24.11. tag-protocol-id
24.12. taii-type2
24.13. target-power
24.14. target-retry-wait
24.15. targeted-session
24.16. task-scheduling-int
24.17. tcp
24.18. tcp-ack
24.19. tcp-adv-func
24.20. tcp-client-reset
24.21. tcp-cwr
24.22. tcp-ece
24.23. tcp-established
24.24. tcp-fin
24.25. tcp-keepalive
24.26. tcp-mss
24.27. tcp-mss-adjust
24.28. tcp-ns
24.29. tcp-option-number
24.30. tcp-performance
24.31. tcp-psh
24.32. tcp-rst
24.33. tcp-session-parameters
24.34. tcp-syn
24.35. tcp-time-wait
24.36. tcp-transitory
24.37. tcp-urg
24.38. tcp-validate
24.39. tcp-validate-stats
24.40. tdcm
24.41. tdm
24.42. tdm-sat
24.43. te
24.44. te-class
24.45. te-down-threshold
24.46. te-link
24.47. te-metric
24.48. te-threshold-update
24.49. te-up-threshold
24.50. tech-support
24.51. tei-set
24.52. teid-load-balancing
24.53. telemetry
24.54. telemetry-data
24.55. telnet
24.56. telnet-max-sessions
24.57. telnet-reply
24.58. telnet-server
24.59. telnet6-server
24.60. temp-flooding
24.61. template
24.62. template-format
24.63. template-refresh-timeout
24.64. template-retransmit
24.65. template-set
24.66. terminal
24.67. terminate
24.68. termination-fpe
24.69. tertiary
24.70. tertiary-config
24.71. tertiary-dns
24.72. tertiary-image
24.73. tertiary-ip-address
24.74. tertiary-ipv6-address
24.75. tertiary-location
24.76. tertiary-url
24.77. test
24.78. test-account
24.79. test-completion-enable
24.80. test-duration
24.81. test-fail-enable
24.82. test-fail-threshold
24.83. test-link
24.84. test-oam
24.85. test-pattern
24.86. test-pattern-procedure
24.87. tethering-detection
24.88. tethering-summary
24.89. third-party
24.90. third-party-nexthop
24.91. three-way-hello
24.92. threshold
24.93. threshold-crossing-alert
24.94. thresholds
24.95. throttle-rate
24.96. throughput-alarm
24.97. ti-lfa
24.98. tier
24.99. time
24.100. time-average-factor
24.101. time-display
24.102. time-exceeded
24.103. time-format
24.104. time-limit
24.105. time-range
24.106. time-stamp
24.107. timeout
24.108. timeout-action
24.109. timeouts
24.110. timers
24.111. timeslots
24.112. timestamp
24.113. timestamp-format
24.114. timing
24.115. tls
24.116. tls-client-profile
24.117. tls-extension
24.118. tls-profile
24.119. tls-re-negotiate-timer
24.120. tls-server-profile
24.121. to
24.122. to cli
24.123. to console
24.124. to file
24.125. to memory
24.126. to netconf
24.127. to session
24.128. to snmp
24.129. to syslog
24.130. to-aa-sub-counters
24.131. to-client-options
24.132. to-sap
24.133. to-server-options
24.134. to-subscriber
24.135. tod-override
24.136. tolerance
24.137. tos-marking-state
24.138. total
24.139. total-capacity
24.140. total-flow-duration
24.141. total-flows-completed-count
24.142. tp-lsp-egress-stats
24.143. tp-lsp-ingress-stats
24.144. tp-tunnel-id-range
24.145. trace
24.146. trace-profile
24.147. trace-string
24.148. traceroute
24.149. traceroute-reply
24.150. track-accounting
24.151. track-authentication
24.152. track-delete-hold-time
24.153. track-mobility
24.154. track-password-change
24.155. track-srrp
24.156. track-srrp-instances
24.157. tracking-support
24.158. traffic
24.159. traffic-capture
24.160. traffic-class
24.161. traffic-desc
24.162. traffic-direction
24.163. traffic-engineering
24.164. traffic-engineering-options
24.165. traffic-rate-delta
24.166. traffic-type
24.167. transaction-timer
24.168. transceiver
24.169. transform
24.170. transit
24.171. transit-auto-create
24.172. transit-delay
24.173. transit-ip-policy
24.174. transit-path
24.175. transit-policy
24.176. transit-prefix-ipv4-entries
24.177. transit-prefix-ipv4-remote-entries
24.178. transit-prefix-ipv6-entries
24.179. transit-prefix-ipv6-remote-entries
24.180. transit-prefix-policy
24.181. transmission-profile
24.182. transmit-interval
24.183. transmit-period
24.184. transport
24.185. transport-address
24.186. transport-encryption
24.187. transport-tunnel
24.188. transport-type
24.189. trap-gen
24.190. trap-target
24.191. tree
24.192. trigger
24.193. trigger-alarm-msg
24.194. trigger-entry
24.195. trigger-fault
24.196. trigger-packet
24.197. triggered-policy
24.198. triggered-updates
24.199. trust-anchor
24.200. trust-anchor-profile
24.201. trusted
24.202. ts-list
24.203. ts-location
24.204. ts-negotiation
24.205. ts-sync-loss
24.206. ttl
24.207. ttl-expired
24.208. ttl-propagate
24.209. ttl-security
24.210. tunnel
24.211. tunnel-client-attrs
24.212. tunnel-dot1q
24.213. tunnel-down-damp-time
24.214. tunnel-encaps
24.215. tunnel-endpoint
24.216. tunnel-endpoint-id
24.217. tunnel-far-end
24.218. tunnel-fault
24.219. tunnel-group
24.220. tunnel-id
24.221. tunnel-interface
24.222. tunnel-local-address
24.223. tunnel-mtu
24.224. tunnel-nearest-bridge
24.225. tunnel-next-hop
24.226. tunnel-port-policy
24.227. tunnel-qinq
24.228. tunnel-query
24.229. tunnel-remote-address
24.230. tunnel-resource-limit
24.231. tunnel-router
24.232. tunnel-selection-blacklist
24.233. tunnel-server-attrs
24.234. tunnel-session-limit
24.235. tunnel-source-ip
24.236. tunnel-table
24.237. tunnel-table-pref
24.238. tunnel-template
24.239. tunnel-termination
24.240. tunnel-type
24.241. tunneling
24.242. twamp
24.243. twamp-light
24.244. two-way-delay-test
24.245. two-way-slm-test
24.246. tx
24.247. tx-credit-max
24.248. tx-dus
24.249. tx-eth-ed
24.250. tx-eth-vsm-grace
24.251. tx-hold-multiplier
24.252. tx-interval
24.253. tx-mgmt-address
24.254. tx-timer
24.255. tx-tlvs
24.256. type
24.257. type-multi-line
25. u Commands
25.1. udp
25.2. udp-dns
25.3. udp-dst
25.4. udp-dst-port
25.5. udp-inbound-refresh
25.6. udp-initial
25.7. udp-port
25.8. udp-return-object
25.9. udp-src
25.10. ue
25.11. ue-creation-type
25.12. ue-query
25.13. ue-state
25.14. uli
25.15. umh-pe
25.16. umh-pe-backup
25.17. umh-rate-monitoring
25.18. umh-selection
25.19. unavailability-event
25.20. uncoloured-octets-offered-count
25.21. uncoloured-packets-offered-count
25.22. uncommitted-changes-indicator
25.23. unconstrained-bw
25.24. unconsumed-agg-rate
25.25. unconsumed-higher-tier-rate
25.26. underflow-limit
25.27. undet-availability-event
25.28. undet-unavailability-event
25.29. undo
25.30. uni
25.31. unicast-address
25.32. unicast-import-disable
25.33. unicast-rt-test
25.34. unidirectional-measurement
25.35. unique-sid-per-sap
25.36. unknown-arp-request-flood-evpn
25.37. unknown-mac-route
25.38. unknown-message-rate
25.39. unknown-ns-flood-evpn
25.40. unknown-policer
25.41. unknown-protocol
25.42. unknown-protocols
25.43. unknown-queue
25.44. unnumbered
25.45. unreachables
25.46. untrusted
25.47. unzip
25.48. up
25.49. up-count
25.50. up-link
25.51. up-nat-policy
25.52. up-threshold
25.53. update
25.54. update-fault-tolerance
25.55. update-interval
25.56. update-interval-jitter
25.57. update-timer
25.58. updated-error-handling
25.59. updates
25.60. upgrade
25.61. uplink
25.62. uplink-initial-wait
25.63. upnp
25.64. upnp-mappings
25.65. upnp-policy
25.66. upstream-ip-filter
25.67. upstream-ipv6-filter
25.68. url
25.69. url-entry
25.70. url-filter
25.71. url-list
25.72. urpf-check
25.73. urpf-selected-vprns
25.74. usage-monitoring
25.75. use-arp
25.76. use-bgp-routes
25.77. use-broadcast-address
25.78. use-broadcast-mac
25.79. use-def-mcast
25.80. use-default-template
25.81. use-direct-map-as-default
25.82. use-es-bmac
25.83. use-gi-address
25.84. use-ingress-l2tp-dscp
25.85. use-lag-port-weight
25.86. use-last-adj-bw
25.87. use-link-address
25.88. use-outside-ip-address
25.89. use-pool-from-client
25.90. use-sap-bmac
25.91. use-sdp-bmac
25.92. use-virtual-mac
25.93. use-vrtr-if-index
25.94. user
25.95. user-db
25.96. user-equipment-info
25.97. user-ident
25.98. user-location-info
25.99. user-name
25.100. user-name-format
25.101. user-name-operation
25.102. user-srlg-db
25.103. user-template
25.104. username
25.105. usm-community
25.106. util-stats-interval
26. v Commands
26.1. v4-routed-override-filter
26.2. v6-aggregate-stats
26.3. v6-frag-header
26.4. v6-routed-override-filter
26.5. valid-lifetime
26.6. validate
26.7. validate-dest-prefix
26.8. validate-gtp-tunnels
26.9. validate-next-hop
26.10. validate-redirect-ip
26.11. validate-sequence-number
26.12. validate-source-ip-addr
26.13. validate-src-ip-addr
26.14. validity-time
26.15. value
26.16. vas-filter
26.17. vas-if-type
26.18. vc-id
26.19. vc-id-range
26.20. vc-label
26.21. vc-range
26.22. vc-threshold
26.23. vc-type
26.24. vccv-ping
26.25. vccv-trace
26.26. ve-id
26.27. ve-name
26.28. vendor-id
26.29. vendor-specific-option
26.30. vendor-support
26.31. version
26.32. vi
26.33. vid-pid-absent
26.34. video
26.35. video-group
26.36. video-interface
26.37. video-policy
26.38. video-sap
26.39. video-template
26.40. view
26.41. virtual-chassis-identifier
26.42. virtual-link
26.43. virtual-neighbor
26.44. virtual-scheduler-adjustment
26.45. virtual-subnet
26.46. vlan
26.47. vlan-id
26.48. vlan-mismatch-timeout
26.49. vlan-range
26.50. vlan-tag-ranges
26.51. vlan-translation
26.52. vlan-vc-etype
26.53. vlan-vc-tag
26.54. vm
26.55. vm-traffic-distribution-by-ip
26.56. vm-traffic-distribution-by-teid
26.57. vm-type
26.58. vmep-filter
26.59. voice-template
26.60. volume
26.61. volume-quota-direction
26.62. volume-stats-type
26.63. vpi
26.64. vpls
26.65. vpls-group
26.66. vpls-id
26.67. vpls-only-sap-parameters
26.68. vpls-sap-template
26.69. vpls-template
26.70. vpls-template-binding
26.71. vpn-apply-export
26.72. vpn-apply-import
26.73. vpn-domain
26.74. vpn-family-policy
26.75. vpn-gre-source-ip
26.76. vpn-ipv4
26.77. vpn-ipv6
26.78. vpn-tag
26.79. vport
26.80. vport-hashing
26.81. vprn
26.82. vprn-auto-bind
26.83. vprn-local
26.84. vprn-network-exceptions
26.85. vprn-ping
26.86. vprn-trace
26.87. vprn-transit
26.88. vrf-export
26.89. vrf-import
26.90. vrf-target
26.91. vrgw
26.92. vrrp
26.93. vsd
26.94. vsd-domain
26.95. vsd-password
26.96. vsi-export
26.97. vsi-id
26.98. vsi-import
26.99. vxlan
26.100. vxlan-ipv4-tep-ecmp
26.101. vxlan-ping
26.102. vxlan-port
26.103. vxlan-src-vtep
26.104. vxlan-termination
26.105. vxlan-vni
26.106. vxlan-vtep-range
27. w Commands
27.1. wa-shared-high-wmark
27.2. wa-shared-low-wmark
27.3. wait
27.4. wait-for-up-timer
27.5. wait-to-restore
27.6. wap1x
27.7. warm-standby
27.8. warnings
27.9. watchdog-timer
27.10. watermark
27.11. watermarks
27.12. wavetracker
27.13. web-service
27.14. web-service-url-filter
27.15. weekday
27.16. weight
27.17. weight-down
27.18. weight-threshold
27.19. weighted-ecmp
27.20. wide-metrics-only
27.21. width
27.22. wifi-num-attached-ues
27.23. wifi-rssi
27.24. wifi-ssid-vlan
27.25. wildcard-spmsi
27.26. window
27.27. window-integrity
27.28. window-size
27.29. wlan-gw
27.30. wlan-gw-group
27.31. working-bundle
27.32. working-circuit
27.33. working-path
27.34. working-tp-path
27.35. wpp
27.36. wrap-around
27.37. wred-queue
27.38. wred-queue-control
27.39. writable-running
27.40. write
27.41. write-algorithm
27.42. wrr-group
27.43. wtr-annexb
28. x Commands
28.1. x-interfaces
28.2. x1
28.3. x2
28.4. x3
28.5. xc
28.6. xcon
28.7. xconnect
28.8. xconnect-tunnel-home-address
28.9. xconnect-tunnel-local-ipv6-address
28.10. xconnect-tunnel-remote-ipv6-address
28.11. xconnect-tunnel-service
28.12. xconnect-tunnel-type
28.13. xgig
28.14. xiom
28.15. xiom-type
28.16. xmpp
29. y Commands
29.1. yang-modules
29.2. yellow-differential-delay
30. z Commands
30.1. zone
30.2. zone-channel
Customer Document and Product Support
1. Getting Started
1.1. Command Tree
1.2. Command Descriptions
1.3. Navigational Aids
1.3.1. Context Path
1.3.2. Searching
1.3.3. Linking to the Tree
2. Classic CLI Overview
2.1. CLI Structure
2.2. Navigating in the CLI
2.2.1. CLI Contexts
2.2.2. Operational Root and Global Commands
2.2.3. CLI environment Commands
2.2.4. CLI monitor Commands
2.3. Getting Help in the CLI
2.4. The CLI Command Prompt
2.5. Displaying Configuration Contexts
2.6. exec Files
2.7. CLI Script Control
2.8. Entering CLI Commands
2.8.1. Command Completion
2.8.2. Unordered and Unnamed Parameters
2.8.3. Editing Keystrokes
2.8.4. Absolute Paths
2.8.5. History
2.8.6. Entering Numerical Ranges
2.8.7. Pipe/Match
2.8.8. Pipe/Count
2.8.9. Pipe/reverse-dns
2.8.10. Range Operator Support of Regular Expression Match
2.8.10.1. Regular Expression Symbols in a Regular Expression Match Operation
2.8.11. Redirection
2.9. vi Editor
2.9.1. Summary of vi Commands
2.9.2. Using the vi Commands
2.9.3. EX commands
2.10. Configuration Rollback
2.10.1. Feature Behavior
2.10.2. Rollback and SNMP
2.10.3. Rescue Configuration
2.10.4. Operational Guidelines
2.11. Transactional Configuration
2.11.1. Basic Operation
2.11.2. Transactions and Rollback
2.11.3. Authorization
3. Command Trees
3.1. admin Commands
3.2. bof Commands
3.3. candidate Commands
3.4. configure Commands
3.4.1. configure aaa Commands
3.4.2. configure application-assurance Commands
3.4.3. configure bfd Commands
3.4.4. configure bmp Commands
3.4.5. configure call-trace Commands
3.4.6. configure card Commands
3.4.7. configure cflowd Commands
3.4.8. configure connection-profile Commands
3.4.9. configure connection-profile-vlan Commands
3.4.10. configure esa Commands
3.4.11. configure eth-cfm Commands
3.4.12. configure eth-ring Commands
3.4.13. configure eth-tunnel Commands
3.4.14. configure filter Commands
3.4.15. configure fwd-path-ext Commands
3.4.16. configure gmpls-tun-grp Commands
3.4.17. configure group-encryption Commands
3.4.18. configure info Commands
3.4.19. configure interface-group-handler Commands
3.4.20. configure ipsec Commands
3.4.21. configure isa Commands
3.4.22. configure lag Commands
3.4.23. configure li Commands
3.4.24. configure log Commands
3.4.25. configure macsec Commands
3.4.26. configure mcast-management Commands
3.4.27. configure mirror Commands
3.4.28. configure oam-pm Commands
3.4.29. configure open-flow Commands
3.4.30. configure port Commands
3.4.31. configure port-policy Commands
3.4.32. configure port-xc Commands
3.4.33. configure pw-port Commands
3.4.34. configure python Commands
3.4.35. configure qos Commands
3.4.36. configure redundancy Commands
3.4.37. configure router Commands
3.4.37.1. configure router admin-tags Commands
3.4.37.2. configure router aggregate Commands
3.4.37.3. configure router allow-icmp-redirect Commands
3.4.37.4. configure router allow-icmp6-redirect Commands
3.4.37.5. configure router autonomous-system Commands
3.4.37.6. configure router bfd Commands
3.4.37.7. configure router bgp Commands
3.4.37.8. configure router bier Commands
3.4.37.9. configure router class-forwarding Commands
3.4.37.10. configure router confederation Commands
3.4.37.11. configure router description Commands
3.4.37.12. configure router dhcp Commands
3.4.37.13. configure router dhcp6 Commands
3.4.37.14. configure router disable-selective-fib Commands
3.4.37.15. configure router dns Commands
3.4.37.16. configure router ecmp Commands
3.4.37.17. configure router entropy-label Commands
3.4.37.18. configure router fib-priority Commands
3.4.37.19. configure router fib-telemetry Commands
3.4.37.20. configure router firewall Commands
3.4.37.21. configure router flexible-algorithm-definitions Commands
3.4.37.22. configure router flowspec Commands
3.4.37.23. configure router gmpls Commands
3.4.37.24. configure router gtm Commands
3.4.37.25. configure router gtp Commands
3.4.37.26. configure router icmp-tunneling Commands
3.4.37.27. configure router if-attribute Commands
3.4.37.28. configure router igmp Commands
3.4.37.29. configure router interface Commands
3.4.37.30. configure router ip-fast-reroute Commands
3.4.37.31. configure router ipsec Commands
3.4.37.32. configure router ipv6 Commands
3.4.37.33. configure router ipv6-te-router-id Commands
3.4.37.34. configure router isa-service-chaining Commands
3.4.37.35. configure router isis Commands
3.4.37.36. configure router l2tp Commands
3.4.37.37. configure router ldp Commands
3.4.37.38. configure router ldp-shortcut Commands
3.4.37.39. configure router leak-export Commands
3.4.37.40. configure router leak-export-limit Commands
3.4.37.41. configure router lmp Commands
3.4.37.42. configure router lsp-bfd Commands
3.4.37.43. configure router mc-maximum-routes Commands
3.4.37.44. configure router mcac Commands
3.4.37.45. configure router mld Commands
3.4.37.46. configure router mpls Commands
3.4.37.47. configure router mpls-labels Commands
3.4.37.48. configure router msdp Commands
3.4.37.49. configure router mss-adjust-group Commands
3.4.37.50. configure router mtrace2 Commands
3.4.37.51. configure router multicast-info-policy Commands
3.4.37.52. configure router nat Commands
3.4.37.53. configure router network-domains Commands
3.4.37.54. configure router origin-validation Commands
3.4.37.55. configure router ospf Commands
3.4.37.56. configure router ospf3 Commands
3.4.37.57. configure router p2mp-sr-tree Commands
3.4.37.58. configure router pcep Commands
3.4.37.59. configure router pcp-server Commands
3.4.37.60. configure router pim Commands
3.4.37.61. configure router policy-acct-template Commands
3.4.37.62. configure router policy-options Commands
3.4.37.63. configure router policy-reference-checks Commands
3.4.37.64. configure router radius-proxy Commands
3.4.37.65. configure router radius-server Commands
3.4.37.66. configure router reassembly-group Commands
3.4.37.67. configure router rib-api Commands
3.4.37.68. configure router rip Commands
3.4.37.69. configure router ripng Commands
3.4.37.70. configure router route-next-hop-policy Commands
3.4.37.71. configure router router-advertisement Commands
3.4.37.72. configure router router-id Commands
3.4.37.73. configure router rsvp Commands
3.4.37.74. configure router segment-routing Commands
3.4.37.75. configure router service-prefix Commands
3.4.37.76. configure router sgt-qos Commands
3.4.37.77. configure router shutdown Commands
3.4.37.78. configure router single-sfm-overload Commands
3.4.37.79. configure router static-route-entry Commands
3.4.37.80. configure router static-route-hold-down Commands
3.4.37.81. configure router triggered-policy Commands
3.4.37.82. configure router ttl-propagate Commands
3.4.37.83. configure router tunnel-interface Commands
3.4.37.84. configure router twamp-light Commands
3.4.37.85. configure router vrgw Commands
3.4.37.86. configure router weighted-ecmp Commands
3.4.37.87. configure router wlan-gw Commands
3.4.37.88. configure router wpp Commands
3.4.38. configure saa Commands
3.4.39. configure service Commands
3.4.39.1. configure service apipe Commands
3.4.39.2. configure service cpipe Commands
3.4.39.3. configure service customer Commands
3.4.39.4. configure service dynamic-services Commands
3.4.39.5. configure service epipe Commands
3.4.39.6. configure service fpipe Commands
3.4.39.7. configure service ies Commands
3.4.39.8. configure service ipfix Commands
3.4.39.9. configure service ipipe Commands
3.4.39.10. configure service mac-list Commands
3.4.39.11. configure service mac-notification Commands
3.4.39.12. configure service md-auto-id Commands
3.4.39.13. configure service mrp Commands
3.4.39.14. configure service nat Commands
3.4.39.15. configure service oper-group Commands
3.4.39.16. configure service pbb Commands
3.4.39.17. configure service proxy-arp-nd Commands
3.4.39.18. configure service pw-routing Commands
3.4.39.19. configure service pw-template Commands
3.4.39.20. configure service sdp Commands
3.4.39.21. configure service sdp-group Commands
3.4.39.22. configure service system Commands
3.4.39.23. configure service template Commands
3.4.39.24. configure service upnp Commands
3.4.39.25. configure service vpls Commands
3.4.39.26. configure service vprn Commands
3.4.39.27. configure service vsd Commands
3.4.40. configure sflow Commands
3.4.41. configure sfm Commands
3.4.42. configure subscriber-mgmt Commands
3.4.43. configure system Commands
3.4.44. configure test-oam Commands
3.4.45. configure vrrp Commands
3.5. debug Commands
3.6. environment Commands
3.7. file Commands
3.8. global Commands
3.9. monitor Commands
3.10. oam Commands
4. 3 Commands
4.1. 3gpp-charging-characteristics
4.2. 3gpp-charging-id
4.3. 3gpp-ggsn-address
4.4. 3gpp-ggsn-ipv6-address
4.5. 3gpp-gprs-negotiated-qos-profile
4.6. 3gpp-imsi
4.7. 3gpp-nsapi
4.8. 3gpp-qos-mapping
4.9. 3gpp-rat-type
4.10. 3gpp-selection-mode
4.11. 3gpp-session-stop-indicator
4.12. 3gpp-user-location-info
5. a Commands
5.1. aa-admit-deny
5.2. aa-interface
5.3. aa-specific
5.4. aa-sub
5.5. aa-sub-attributes
5.6. aa-sub-congestion-detection
5.7. aa-sub-counters
5.8. aa-sub-ip
5.9. aa-sub-remote
5.10. aa-sub-study
5.11. aa-sub-suppressible
5.12. aa-sub-tethering-state
5.13. aaa
5.14. aal5-frame-aware
5.15. aarp
5.16. aarp-interface
5.17. abort
5.18. above-offered-allowance
5.19. above-offered-cap
5.20. absolute
5.21. ac-df-capability
5.22. accept-authorization-change
5.23. accept-coa
5.24. accept-from-ebgp
5.25. accept-ivpls-evpn-flush
5.26. accept-mrru
5.27. accept-orf
5.28. accept-remote-loopback
5.29. accept-script-policy
5.30. accept-unprotected-errormsg
5.31. accept-unprotected-pkiconf
5.32. access
5.33. access group
5.34. access-algorithm
5.35. access-loop-encapsulation
5.36. access-loop-information
5.37. access-loop-options
5.38. access-network-location
5.39. accounting
5.40. accounting-1
5.41. accounting-2
5.42. accounting-policy
5.43. accounting-port
5.44. accounting-type
5.45. accounting-update-interval
5.46. acct-authentic
5.47. acct-delay-time
5.48. acct-include-attributes
5.49. acct-interim
5.50. acct-on-off
5.51. acct-on-off-group
5.52. acct-policy
5.53. acct-port
5.54. acct-request-script-policy
5.55. acct-session-id
5.56. acct-stats
5.57. acct-stop
5.58. acct-trigger-reason
5.59. acct-tunnel-connection-fmt
5.60. acct-update-triggers
5.61. accu-stats-policy
5.62. ack
5.63. ack-auth-retry-count
5.64. ack-timeout
5.65. acknowledgment
5.66. action
5.67. action-list
5.68. action-on-fail
5.69. activate
5.70. activate-entry-tag
5.71. active-cpm-protocols
5.72. active-flow-timeout
5.73. active-hold-delay
5.74. active-instance
5.75. active-iom-limit
5.76. active-lease-time
5.77. active-mda-limit
5.78. active-mda-number
5.79. active-outbound-sa
5.80. active-preferred-lifetime
5.81. active-psk
5.82. active-source-limit
5.83. active-valid-lifetime
5.84. activity-threshold
5.85. ad-insert
5.86. ad-per-es-route-target
5.87. ad-server
5.88. ad-validation
5.89. adapt-qos
5.90. adaptation-rule
5.91. adaptive
5.92. adaptive-load-balancing
5.93. add
5.94. add-paths
5.95. add-paths-send-limit
5.96. add-srv6-tlvs
5.97. add-to-received-ebgp
5.98. add-tunnel
5.99. address
5.100. address-avp
5.101. address-pref
5.102. address-range
5.103. address-source
5.104. address-state
5.105. address-type
5.106. adi
5.107. adi-packet
5.108. adj-set
5.109. adj-sid
5.110. adj-sid-hold
5.111. adjacency
5.112. adjacency-set
5.113. adjacency-sid
5.114. adjust-down
5.115. adjust-up
5.116. admin
5.117. admin-bw
5.118. admin-bw-threshold
5.119. admin-group
5.120. admin-group-frr
5.121. admin-password
5.122. admin-state
5.123. admin-status
5.124. admin-tag
5.125. admin-tag-policy
5.126. admin-tags
5.127. adspec
5.128. adv-adj-addr-only
5.129. adv-config-policy
5.130. adv-local-lsr-id
5.131. adv-mtu-override
5.132. adv-noaddrs-global
5.133. adv-service-mtu
5.134. advertise
5.135. advertise-bgp
5.136. advertise-capabilities
5.137. advertise-external
5.138. advertise-inactive
5.139. advertise-interval
5.140. advertise-ipv6-next-hops
5.141. advertise-label
5.142. advertise-ldp-prefix
5.143. advertise-local
5.144. advertise-ne-profile
5.145. advertise-passive-only
5.146. advertise-router-capability
5.147. advertise-selection
5.148. advertise-stale-to-all-neighbors
5.149. advertise-subnet
5.150. advertise-tunnel-link
5.151. advertised-stale-time
5.152. advertising-timeout
5.153. age-time
5.154. agg-rate
5.155. agg-rate-limit
5.156. agg-shaper-weight
5.157. aggregate
5.158. aggregate-contributor
5.159. aggregate-prefix-match
5.160. aggregate-sample-window
5.161. aggregate-shapers
5.162. aggregate-stats
5.163. aggregate-used-paths
5.164. aggregation
5.165. aggregator-id-zero
5.166. agi
5.167. aging
5.168. ah-ext-hdr
5.169. aigp
5.170. aigp-metric
5.171. ais-enable
5.172. alarm
5.173. alarm-cells
5.174. alarm-contact-in-power
5.175. alarm-contact-input
5.176. alarm-notification
5.177. alarms
5.178. alc-acct-triggered-reason
5.179. alc-error-code
5.180. alg
5.181. algorithm
5.182. alias
5.183. align
5.184. all
5.185. all-authorized-session-addresses
5.186. all-events
5.187. all-l1isis
5.188. all-l2isis
5.189. all-octets-offered-count
5.190. all-packets-offered-count
5.191. allocation
5.192. allocation-percent
5.193. allocation-weight
5.194. allow-boot-license-violations
5.195. allow-directed-broadcasts
5.196. allow-dot1q-msaps
5.197. allow-egress-remark-dscp
5.198. allow-export-bgp-vpn
5.199. allow-flex-algo-fallback
5.200. allow-fragmentation
5.201. allow-ftp
5.202. allow-grpc
5.203. allow-icmp-redirect
5.204. allow-icmp6-redirect
5.205. allow-immediate
5.206. allow-ip-int-bind
5.207. allow-ipv6-udp-checksum-zero
5.208. allow-lease-query
5.209. allow-list
5.210. allow-local-management
5.211. allow-multiple-wan-addresses
5.212. allow-netconf
5.213. allow-qinq-network-interface
5.214. allow-reverse-route-override
5.215. allow-ssh
5.216. allow-static
5.217. allow-telnet
5.218. allow-telnet6
5.219. allow-unmatching-prefixes
5.220. allow-unmatching-subnets
5.221. allow-unresolved-leaking
5.222. allow-unsecure-connection
5.223. allow-unsecured-msgs
5.224. allow-user-name
5.225. allowed-peer-as
5.226. allowed-source-macs
5.227. already-signed-in
5.228. alt-port-class-pools
5.229. always-compare-med
5.230. always-set-sender-for-ir
5.231. amber-alarm-threshold
5.232. ambr
5.233. ambr-qos-mapping
5.234. an-gw-address
5.235. analyze-gre-payload
5.236. analyze-l2tp-traffic
5.237. analyze-v4overv6-traffic
5.238. analyzer
5.239. ancp
5.240. ancp-policy
5.241. ancp-static-map
5.242. ancp-string
5.243. anno-rx-timeout
5.244. announce
5.245. anti-spoof
5.246. anycast
5.247. ap-mac-learn-failed
5.248. apipe
5.249. apn
5.250. apn-ambr
5.251. apn-ambr-dl
5.252. apn-ambr-ul
5.253. apn-policy
5.254. app-filter
5.255. app-group
5.256. app-profile
5.257. app-profile-map
5.258. app-profile-string
5.259. app-qos-policy
5.260. app-route-notifications
5.261. app-service-options
5.262. applicant-sm
5.263. application
5.264. application-assurance
5.265. application-assurance-group
5.266. application-link-attributes
5.267. application-policy
5.268. application6
5.269. applications
5.270. apply-bgp-nh-override
5.271. apply-function-specific-behavior
5.272. apply-path
5.273. apply-to
5.274. aps
5.275. aqp-initial-lookup
5.276. arbiter
5.277. arbiter-stats
5.278. area
5.279. area-id
5.280. area-range
5.281. arp
5.282. arp-host
5.283. arp-host-route
5.284. arp-learn-unsolicited
5.285. arp-limit
5.286. arp-populate
5.287. arp-populate-host-route
5.288. arp-proactive-refresh
5.289. arp-reply-agent
5.290. arp-retry-timer
5.291. arp-route-tag
5.292. arp-timeout
5.293. as-matrix
5.294. as-override
5.295. as-path
5.296. as-path-group
5.297. as-path-ignore
5.298. as-path-length
5.299. as-path-prepend
5.300. asbr
5.301. assert
5.302. assert-period
5.303. assignment
5.304. assignment-id
5.305. assisted-replication
5.306. assisted-replication-ip
5.307. assistive-address-resolution
5.308. association
5.309. association-setup-retry
5.310. async-mapping
5.311. asynchronous-execution
5.312. asynchronous-retention
5.313. atm
5.314. atm-location-id
5.315. atm-ping
5.316. atm-td-profile
5.317. atm-vci
5.318. attempts
5.319. attrib
5.320. attribute
5.321. attribute-matching
5.322. attribute-table-high-wmark
5.323. attribute-table-low-wmark
5.324. attribute-table-size
5.325. audio-template
5.326. augment-route-table
5.327. auth
5.328. auth-domain-name
5.329. auth-include-attributes
5.330. auth-keychain
5.331. auth-method
5.332. auth-policy
5.333. auth-port
5.334. auth-request-script-policy
5.335. authenticate
5.336. authenticate-client
5.337. authenticate-on-dhcp
5.338. authenticated-brg-only
5.339. authentication
5.340. authentication-check
5.341. authentication-key
5.342. authentication-order
5.343. authentication-origin
5.344. authentication-policy
5.345. authentication-type
5.346. authenticator-init
5.347. authorization
5.348. authorized-only
5.349. auto-bandwidth
5.350. auto-bandwidth-multipliers
5.351. auto-bind-tunnel
5.352. auto-boot
5.353. auto-config
5.354. auto-config-save
5.355. auto-creation
5.356. auto-crl-update
5.357. auto-disc-route-advertisement
5.358. auto-discovery
5.359. auto-discovery-disable
5.360. auto-eap-method
5.361. auto-eap-own-method
5.362. auto-edge
5.363. auto-esi
5.364. auto-establish
5.365. auto-learn-mac-protect
5.366. auto-lifetimes
5.367. auto-lsp
5.368. auto-mep-discovery
5.369. auto-reply
5.370. auto-rp
5.371. auto-rp-discovery
5.372. auto-rx
5.373. auto-sub-id-key
5.374. auto-tx
5.375. autoconfigure
5.376. autonegotiate
5.377. autonomous
5.378. autonomous-system
5.379. autonomous-system-type
5.380. aux-channel-enable
5.381. aux-stats
5.382. availability
5.383. avg-flr-event
5.384. avg-frame-overhead
5.385. avp
5.386. avp-hiding
5.387. avp-match
5.388. avp-subscription-id
6. b Commands
6.1. back
6.2. backbone-vpls
6.3. backup
6.4. backup-class-type
6.5. backup-next-hop
6.6. backup-node-sid
6.7. backup-path
6.8. backup-remote-ip
6.9. backup-tag
6.10. bandwidth
6.11. bandwidth-distribution
6.12. bandwidth-policer
6.13. bandwidth-policy
6.14. base-op-authorization
6.15. base-r13-modules
6.16. base-routing-instance
6.17. base-user-name
6.18. bd
6.19. bd-mac-prefix
6.20. bearer-fteid
6.21. begin
6.22. begin-time
6.23. ber-sf-link-down
6.24. bert
6.25. best-path-selection
6.26. bfd
6.27. bfd-designate
6.28. bfd-enable
6.29. bfd-on-distributing-only
6.30. bfd-sessions
6.31. bfd-template
6.32. bfd-trap-suppression
6.33. bfr-id
6.34. bgp
6.35. bgp-ad
6.36. bgp-auto-rd-range
6.37. bgp-evpn
6.38. bgp-evpn-multi-homing
6.39. bgp-high-priority
6.40. bgp-ipvpn
6.41. bgp-labels-hold-timer
6.42. bgp-leak
6.43. bgp-med
6.44. bgp-multi-homing
6.45. bgp-peering-policy
6.46. bgp-peers
6.47. bgp-shared-queue
6.48. bgp-shortcut
6.49. bgp-transport-tunnel
6.50. bgp-tunnel
6.51. bgp-tunnel-metric
6.52. bgp-vpls
6.53. bgp-vpls-mh-ve-id
6.54. bgp-vpws
6.55. bi
6.56. bier
6.57. bier-ping
6.58. bier-signaling
6.59. bier-trace
6.60. bin
6.61. bin-group
6.62. bin-type
6.63. bind-authentication
6.64. binding
6.65. binding-label
6.66. binding-operator
6.67. binding-sid
6.68. bindings
6.69. bit-error-insertion
6.70. bit-error-threshold
6.71. bit-rate-high-wmark
6.72. bit-rate-low-wmark
6.73. bits
6.74. bits-interface-type
6.75. black-hole
6.76. black-hole-dup-mac
6.77. blackhole-aggregate
6.78. block-length
6.79. block-limit
6.80. block-on-mesh-failure
6.81. block-on-peer-fault
6.82. block-prefix-sid
6.83. bluetooth
6.84. bmp
6.85. bof
6.86. bonding-active-connections
6.87. bonding-id
6.88. bonding-parameters
6.89. bonding-selection
6.90. booking-factor
6.91. boot-bad-exec
6.92. boot-good-exec
6.93. boot-timer
6.94. bootstrap-export
6.95. bootstrap-import
6.96. boundary-type
6.97. bpdu
6.98. bpdu-translation
6.99. breakout
6.100. brg
6.101. brg-id
6.102. brg-num-active-sessions
6.103. brg-profile
6.104. bridge-identifier
6.105. bridge-priority
6.106. broadcast
6.107. broadcast-client
6.108. broadcast-policer
6.109. broadcast-queue
6.110. broadcastclient
6.111. bsm-check-rtr-alert
6.112. bsr
6.113. bsr-candidate
6.114. buffer-allocation
6.115. buffer-pool
6.116. buffer-type
6.117. buffering
6.118. build-packet
6.119. buildout
6.120. bundle
6.121. burst-limit
6.122. bw-activity
6.123. bypass-resignal-timer
7. c Commands
7.1. c-mcast-signaling
7.2. ca-name
7.3. ca-profile
7.4. cache
7.5. cache-reset
7.6. cache-response
7.7. cache-size
7.8. cak
7.9. calculate-counts
7.10. call-trace
7.11. called-station-id
7.12. calling-number-format
7.13. calling-station-id
7.14. cancel-commit
7.15. candidate
7.16. cannot-change-password
7.17. capacity-cost
7.18. captive-redirect
7.19. capture
7.20. capture-sap
7.21. card
7.22. card-type
7.23. carrier-carrier-vpn
7.24. category
7.25. category-map
7.26. category-map-name
7.27. cbs
7.28. cc-error
7.29. ccag
7.30. ccm-enable
7.31. ccm-hold-time
7.32. ccm-interval
7.33. ccm-ltm-priority
7.34. ccm-padding-size
7.35. ccm-tlv-ignore
7.36. ccrt-replay
7.37. cd
7.38. ce-address
7.39. ce-address-discovery
7.40. cell-concatenation
7.41. cell-format
7.42. cem
7.43. cert
7.44. cert-file
7.45. cert-profile
7.46. cert-request
7.47. cert-sync
7.48. certificate
7.49. certificate-display-format
7.50. certificate-expiration-warning
7.51. certificate-profile
7.52. cflash-cap-alarm
7.53. cflash-cap-alarm-pct
7.54. cflash-cap-warn
7.55. cflash-cap-warn-pct
7.56. cflowd
7.57. cflowd-parameters
7.58. cfm-mac-advertisement
7.59. cfm-opcode
7.60. chain-to-system-filter
7.61. challenge
7.62. change-reporting-action
7.63. channel
7.64. channel-group
7.65. channelized
7.66. chap-challenge-length
7.67. characteristic
7.68. charging-characteristics
7.69. charging-group
7.70. charging-rule-base-name
7.71. chassis-level
7.72. chassis-mode
7.73. check-zero
7.74. child-control
7.75. chli-event
7.76. cipher
7.77. cipher-list
7.78. cipher-suite
7.79. cir
7.80. cir-non-profiling
7.81. circuit-id
7.82. circuit-id-from-auth
7.83. cisco-hdlc
7.84. cisco-nas-port
7.85. ckn
7.86. class
7.87. class-forwarding
7.88. class-forwarding-policy
7.89. class-pool
7.90. class-type
7.91. class-type-bw
7.92. class-weight
7.93. classes
7.94. classic-cli
7.95. classic-lsn-max-subscriber-limit
7.96. classic-lsn-sub
7.97. classification-overrides
7.98. classifier
7.99. clear
7.100. clear-alarm-msg
7.101. clear-df-bit
7.102. clear-ocsp-cache
7.103. clear-request
7.104. clear-tag-mode
7.105. cli
7.106. cli-engine
7.107. cli-script
7.108. cli-session-group
7.109. cli-user
7.110. client
7.111. client-application
7.112. client-applications
7.113. client-cert-subject-key-id
7.114. client-cipher-list
7.115. client-db
7.116. client-down-delay
7.117. client-id
7.118. client-identification
7.119. client-ip
7.120. client-kex-list
7.121. client-mac
7.122. client-mac-address
7.123. client-mac-list
7.124. client-meg-level
7.125. client-name
7.126. client-port
7.127. client-tls-profile
7.128. clli-code
7.129. clock-mode
7.130. clock-offset
7.131. clock-source
7.132. clock-type
7.133. close-session
7.134. clp-change
7.135. clp-tagging
7.136. cluster
7.137. cluster-id
7.138. cmpv2
7.139. cn
7.140. coa
7.141. coa-script-policy
7.142. code-type
7.143. coherent
7.144. cold-start-wait
7.145. collect-aa-acct-stats
7.146. collect-lmm-fc-stats
7.147. collect-lmm-stats
7.148. collect-stats
7.149. collection-interval
7.150. collector
7.151. color
7.152. combined-max-sessions
7.153. command-accounting-during-load
7.154. command-completion
7.155. commit
7.156. common-name-list
7.157. community
7.158. community-count
7.159. compare
7.160. compare-origin-validation-state
7.161. compatibility
7.162. compatible-rfc1583
7.163. compatible-version
7.164. complexity-rules
7.165. comprehensive
7.166. compress
7.167. conditional-expression
7.168. confederation
7.169. confidence
7.170. config-backup
7.171. configuration-mode
7.172. configure
7.173. confirm
7.174. cong-priority-threshold
7.175. congestion-override
7.176. congestion-override-stage2
7.177. congestion-threshold
7.178. connect-retry
7.179. connection
7.180. connection-profile
7.181. connection-profile-vlan
7.182. connection-timeout
7.183. connection-timer
7.184. connectivity-association
7.185. connectivity-verification
7.186. connectivity-verify
7.187. connector
7.188. consider-system-ip-in-gep
7.189. console
7.190. console-speed
7.191. contact
7.192. context
7.193. continuous
7.194. control
7.195. control-channel
7.196. control-channel-router
7.197. control-channel-status
7.198. control-mep
7.199. control-tag
7.200. control-word
7.201. controlword
7.202. convergence
7.203. convert-file
7.204. cookie
7.205. cookie-length
7.206. coordinates
7.207. copy
7.208. copy-config
7.209. copy-traffic-class-upon-decapsulation
7.210. core-connectivity
7.211. core-mvpn
7.212. cores
7.213. correlation-id
7.214. count
7.215. cpe-check
7.216. cpe-ping
7.217. cpipe
7.218. cpm-filter
7.219. cpm-http-redirect
7.220. cpm-queue
7.221. cpr-window-size
7.222. cpu-alarm
7.223. cpu-protection
7.224. crc
7.225. crc-monitor
7.226. create
7.227. create-subscription
7.228. create-udp-tunnel
7.229. credential
7.230. credit-control-policy
7.231. credit-control-quota
7.232. credit-control-server
7.233. credit-exhaust-threshold
7.234. credit-mcs-interval
7.235. credit-type
7.236. credit-type-override
7.237. credits
7.238. criteria-overrides
7.239. critical-event
7.240. crl-expiration-warning
7.241. crl-file
7.242. crl-update
7.243. crl-urls
7.244. cron
7.245. cross-connect
7.246. csf-enable
7.247. csnp-authentication
7.248. csnp-interval
7.249. cspf
7.250. cspf-on-loose-hop
7.251. cumulative-factor
7.252. cups
7.253. current-hop-limit
7.254. custom-buffer-mode
7.255. custom-option
7.256. custom-protocol
7.257. custom-record
7.258. custom-x-header
7.259. customer
7.260. customer-id-range
7.261. cut-through-packets
8. d Commands
8.1. dad-disable
8.2. dad-snooping
8.3. damp-peer-oscillations
8.4. dampening
8.5. damping
8.6. data
8.7. data-bearer
8.8. data-delay-interval
8.9. data-encapsulation
8.10. data-threshold
8.11. data-tlv-size
8.12. data-trigger
8.13. data-triggered
8.14. data-triggered-ue-creation
8.15. data-triggers
8.16. database
8.17. database-export
8.18. database-export-exclude
8.19. datapath-cpu-high-wmark
8.20. datapath-cpu-low-wmark
8.21. day-of-month
8.22. db
8.23. dbw-accounting
8.24. dbw-down-threshold
8.25. dbw-multiplier
8.26. dbw-up-threshold
8.27. ddm-events
8.28. de-1-out-profile
8.29. de-mark
8.30. de-mark-inner
8.31. de-mark-outer
8.32. dead-interval
8.33. dead-timer
8.34. debounce
8.35. debug
8.36. debug-output
8.37. debug-save
8.38. decrypt-key
8.39. def-app-profile
8.40. def-instance-sharing
8.41. def-inter-dest-id
8.42. def-recv-evpn-encap
8.43. def-sla-profile
8.44. def-sub-id
8.45. def-sub-profile
8.46. default
8.47. default-accounting-server-policy
8.48. default-action
8.49. default-authentication-server-policy
8.50. default-brg-profile
8.51. default-category-map
8.52. default-charging-group
8.53. default-credit
8.54. default-dnat-ip-address
8.55. default-dns
8.56. default-domain
8.57. default-fc
8.58. default-filter-action
8.59. default-group-interface
8.60. default-gtp-tunnel-endpoint-limit
8.61. default-host
8.62. default-instance
8.63. default-ipv4-multicast-metric
8.64. default-ipv6-multicast-metric
8.65. default-ipv6-unicast-metric
8.66. default-label-preference
8.67. default-metric
8.68. default-msap-policy
8.69. default-pap-password
8.70. default-path
8.71. default-peer
8.72. default-pool
8.73. default-preference
8.74. default-priority
8.75. default-profile
8.76. default-result
8.77. default-retail-svc-id
8.78. default-route-tag
8.79. default-route-target
8.80. default-router
8.81. default-sap
8.82. default-secure-service
8.83. default-set
8.84. default-tag
8.85. default-tunnel-endpoint-limit
8.86. default-tunnel-template
8.87. default-user-name
8.88. default-value
8.89. defaults
8.90. delay
8.91. delay-event
8.92. delay-event-exclusion
8.93. delay-events
8.94. delay-selection
8.95. delay-start-time
8.96. delay-template
8.97. delegated-ipv6-prefix
8.98. delegated-prefix-length
8.99. delete
8.100. delete-config
8.101. delete-pending
8.102. delivery-service
8.103. delta-consumed-agg-rate
8.104. delta-consumed-higher-tier-rate
8.105. delta-in-use-limit
8.106. dent-threshold
8.107. deny-list
8.108. depleted-event
8.109. derived-id
8.110. description
8.111. descriptor-type
8.112. dest-class
8.113. dest-global-id
8.114. dest-ip
8.115. dest-ip-addr
8.116. dest-mac
8.117. dest-mac-address
8.118. dest-mac-rewrite
8.119. dest-realm
8.120. dest-realm-learning
8.121. dest-tunnel-number
8.122. dest-udp-port
8.123. destination
8.124. destination-address
8.125. destination-class
8.126. destination-class-lookup
8.127. destination-group
8.128. destination-host
8.129. destination-ip
8.130. destination-port
8.131. destination-prefix
8.132. destination-realm
8.133. destruct-timeout
8.134. detail-level
8.135. detailed-acct-attributes
8.136. detect
8.137. detect-seen-ip
8.138. detection-time
8.139. deterministic
8.140. deterministic-med
8.141. deterministic-script
8.142. device
8.143. device-label
8.144. device-name
8.145. df-bit-lac
8.146. dh-group
8.147. dhcp
8.148. dhcp-client
8.149. dhcp-filter
8.150. dhcp-leasetime-threshold
8.151. dhcp-options
8.152. dhcp-pool
8.153. dhcp-python-policy
8.154. dhcp-server
8.155. dhcp-triggered
8.156. dhcp-user-db
8.157. dhcp-vendor-class-id
8.158. dhcp6
8.159. dhcp6-address
8.160. dhcp6-filter
8.161. dhcp6-options
8.162. dhcp6-python-policy
8.163. dhcp6-relay
8.164. dhcp6-server
8.165. dhcp6-user-db
8.166. dhcpv4-nat
8.167. dhcpv6-client
8.168. diameter
8.169. diameter-application-policy
8.170. diameter-auth-policy
8.171. diameter-node
8.172. diameter-peer
8.173. diameter-peer-policy
8.174. diameter-proxy
8.175. diff
8.176. diffserv-te
8.177. digest-type
8.178. digital-coherent-optics
8.179. dir
8.180. direction
8.181. direction-bit
8.182. disable
8.183. disable-4byte-asn
8.184. disable-aging
8.185. disable-capability-negotiation
8.186. disable-client-reflect
8.187. disable-communities
8.188. disable-cookies
8.189. disable-deferred-billing
8.190. disable-explicit-null
8.191. disable-fast-external-failover
8.192. disable-graceful-shutdown
8.193. disable-ldp-sync
8.194. disable-learning
8.195. disable-route-table-install
8.196. disable-router-alert-check
8.197. disable-selective-fib
8.198. disable-send-bvpls-evpn-flush
8.199. disable-shcv
8.200. disable-soft-reset-extension
8.201. disable-stickiness
8.202. disable-targeted-session
8.203. disallow-igp
8.204. discard
8.205. discard-changes
8.206. discard-rx-pause-frames
8.207. discard-unknown
8.208. discard-unknown-source
8.209. disconnect
8.210. discover-delay
8.211. discovery
8.212. discovery-interval
8.213. discriminator
8.214. dispersion
8.215. display
8.216. display-config
8.217. display-key
8.218. dist-cpu-protection
8.219. dist-lag-rate-shared
8.220. distinguisher
8.221. distributed-sub-mgmt
8.222. divert
8.223. divert-fc
8.224. dm
8.225. dmm
8.226. dmr-prefix
8.227. dnat
8.228. dnat-only
8.229. dns
8.230. dns-domain
8.231. dns-ip-cache
8.232. dns-match
8.233. dns-options
8.234. dns-server
8.235. dnssec
8.236. do-not-fragment
8.237. dod-label-distribution
8.238. domain
8.239. domain-name
8.240. dot1p
8.241. dot1p-in-profile
8.242. dot1p-inner
8.243. dot1p-out-profile
8.244. dot1p-outer
8.245. dot1q
8.246. dot1q-etype
8.247. dot1x
8.248. down
8.249. down-count
8.250. down-link
8.251. down-on-internal-error
8.252. down-threshold
8.253. down-timeout
8.254. down-when-looped
8.255. downlink
8.256. download-interval
8.257. downstream-ip-filter
8.258. downstream-ipv6-filter
8.259. downstream-map-tlv
8.260. dpd
8.261. drain
8.262. drop
8.263. drop-count
8.264. drop-extracted-traffic
8.265. drop-tail
8.266. drop-unidentified-traffic
8.267. drop-zero-ipv4-checksum
8.268. dropped-only
8.269. ds1
8.270. ds3
8.271. dsap
8.272. dscp
8.273. dscp-in-profile
8.274. dscp-out-profile
8.275. dslite-lsn-sub
8.276. dslite-max-subscriber-limit
8.277. dsm
8.278. dsm-ip-filter
8.279. dsm-subscriber
8.280. dsmap
8.281. dst-ip
8.282. dst-ipv4-address
8.283. dst-ipv6-address
8.284. dst-mac
8.285. dst-mac-address
8.286. dst-port
8.287. dst-port-range
8.288. dst-tcp-port
8.289. dst-udp-port
8.290. dst-zone
8.291. dual-stack-lite
8.292. dual-stack-lite-address
8.293. duid
8.294. dup-detect
8.295. duplex
8.296. dwdm
8.297. dying-gasp
8.298. dying-gasp-tx-on-reset
8.299. dynamic
8.300. dynamic-arp-populate
8.301. dynamic-bgp
8.302. dynamic-bypass
8.303. dynamic-cost
8.304. dynamic-enforcement-policer-pool
8.305. dynamic-fields
8.306. dynamic-keying
8.307. dynamic-mbs
8.308. dynamic-nd-populate
8.309. dynamic-neighbor
8.310. dynamic-neighbor-limit
8.311. dynamic-parameters
8.312. dynamic-policer
8.313. dynamic-services
8.314. dynamic-services-policy
8.315. dynamic-topology-discover
8.316. dynamic-tunnel-redundant-next-hop
8.317. dynmldp
8.318. dynsvc-password
9. e Commands
9.1. e-counters
9.2. e1
9.3. e2e-protection-type
9.4. e3
9.5. ea-length
9.6. eapol-destination-address
9.7. ebgp-default-reject-policy
9.8. ebgp-ibgp-equal
9.9. ecdsa
9.10. ecdsa-key
9.11. echo
9.12. echo-interval
9.13. echo-multiple
9.14. echo-receive
9.15. ecmp
9.16. ecmp-opt-threshold
9.17. ecmp-unequal-cost
9.18. ect-algorithm
9.19. edge-port
9.20. edit
9.21. edit-config
9.22. efm
9.23. efm-oam
9.24. egr-ip-load-balancing
9.25. egr-percentage-of-rate
9.26. egr-vtep
9.27. egr-weight
9.28. egress
9.29. egress-counter-map
9.30. egress-engineering
9.31. egress-fc
9.32. egress-ip-filter-entries
9.33. egress-ipv6-filter-entries
9.34. egress-pbr
9.35. egress-peer-engineering
9.36. egress-policer
9.37. egress-port-queue-overrides
9.38. egress-rate
9.39. egress-rate-modify
9.40. egress-scheduler-override
9.41. egress-scheduler-policy
9.42. egress-statistics
9.43. egress-xpl
9.44. eibgp-loadbalance
9.45. elmi
9.46. embed-filter
9.47. embedded-rp
9.48. emulated-server
9.49. enable-admin
9.50. enable-admin-control
9.51. enable-asm-mdt
9.52. enable-bfd-leaf
9.53. enable-bfd-root
9.54. enable-bgp-vpn-backup
9.55. enable-console-access
9.56. enable-dscp-prec-remarking
9.57. enable-dynamic-services-config
9.58. enable-exceed-pir
9.59. enable-fc-collection
9.60. enable-graceful-shutdown
9.61. enable-grt
9.62. enable-icmp-vse
9.63. enable-ingress-stats
9.64. enable-inter-as-vpn
9.65. enable-mac-accounting
9.66. enable-mdt-spt
9.67. enable-notification
9.68. enable-origin-validation
9.69. enable-peer-tracking
9.70. enable-port-id
9.71. enable-rr-vpn-forwarding
9.72. enable-rt-client
9.73. enable-tech
9.74. enable-triggered-hosts
9.75. enable-vsd-config
9.76. encap
9.77. encap-defined-qos
9.78. encap-group
9.79. encap-match
9.80. encap-offset
9.81. encap-tag-range
9.82. encap-tag-separate-range
9.83. encap-type
9.84. encapsulated-ip-mtu
9.85. encapsulation
9.86. encode
9.87. encoding
9.88. encoding-type
9.89. encrypt
9.90. encryption-key
9.91. encryption-keygroup
9.92. encryption-offset
9.93. end
9.94. end-dt4
9.95. end-dt46
9.96. end-dt6
9.97. end-dx2
9.98. end-marker-count
9.99. end-of-data
9.100. end-station-only
9.101. end-time
9.102. end-x
9.103. end-x-auto-allocate
9.104. endpoint
9.105. endpoint-discriminator
9.106. endstation-vid-group
9.107. enforce-diffserv-lsp-fc
9.108. enforce-first-as
9.109. enforce-strict-tunnel-tagging
9.110. enforce-unique-if-index
9.111. enforcement
9.112. engineID
9.113. enhanced-distribution
9.114. enqueue-on-pir-zero
9.115. enter
9.116. entropy-label
9.117. entropy-label-capability
9.118. entry
9.119. entry-size
9.120. environment
9.121. epipe
9.122. epipe-sap-template
9.123. error
9.124. error-code
9.125. error-drop
9.126. error-handling
9.127. error-handling-action
9.128. error-report
9.129. errored-frame
9.130. errored-frame-period
9.131. errored-frame-seconds
9.132. errored-symbols
9.133. errors
9.134. es-activation-timer
9.135. es-orig-ip
9.136. esa
9.137. esa-vm
9.138. esi
9.139. esm
9.140. esmc-tunnel
9.141. esp-auth-algorithm
9.142. esp-encryption-algorithm
9.143. esp-ext-hdr
9.144. ess-system-type
9.145. ete-fragment-threshold
9.146. eth-bn
9.147. eth-bn-egress-rate-changes
9.148. eth-cfm
9.149. eth-cfm-linktrace
9.150. eth-cfm-loopback
9.151. eth-cfm-two-way-delay
9.152. eth-cfm-two-way-slm
9.153. eth-ed
9.154. eth-legacy-fault-notification
9.155. eth-ring
9.156. eth-sat
9.157. eth-tag
9.158. eth-test
9.159. eth-test-enable
9.160. eth-tunnel
9.161. eth-vsm-grace
9.162. ethernet
9.163. ethernet-ctag
9.164. ethernet-header
9.165. ethernet-segment
9.166. etype
9.167. event
9.168. event-control
9.169. event-damping
9.170. event-handler
9.171. event-handling
9.172. event-log
9.173. event-mon
9.174. event-notification
9.175. event-notification-burst
9.176. event-trigger
9.177. event-type
9.178. events
9.179. evi
9.180. evpn
9.181. evpn-etree-leaf-label
9.182. evpn-mpls
9.183. evpn-nd-advertise
9.184. evpn-proxy
9.185. evpn-route-tag
9.186. evpn-tunnel
9.187. evpn-type
9.188. exceed
9.189. exceed-action
9.190. exceed-profile-octets-discarded-count
9.191. exceed-profile-octets-forwarded-count
9.192. exceed-profile-octets-offered-count
9.193. exceed-profile-packets-discarded-count
9.194. exceed-profile-packets-forwarded-count
9.195. exceed-profile-packets-offered-count
9.196. exceed-slope
9.197. exception
9.198. exclude
9.199. exclude-addresses
9.200. exclude-avps
9.201. exclude-from-avg
9.202. exclude-group
9.203. exclude-mac-policy
9.204. exclude-node
9.205. exclude-prefix
9.206. exclude-protocol
9.207. exclude-srlg
9.208. exclude-tcp-retrans
9.209. exclusive-lock-time
9.210. exec
9.211. executed-cmd
9.212. exhausted-credit-service-level
9.213. exit
9.214. expected
9.215. expire-time
9.216. expiry-time
9.217. explicit-sf-path
9.218. explicit-subscriber-map
9.219. exponential-backoff
9.220. exponential-backoff-retry
9.221. export
9.222. export-addresses
9.223. export-filter
9.224. export-grt
9.225. export-host-routes
9.226. export-id
9.227. export-inactive-bgp
9.228. export-limit
9.229. export-mode
9.230. export-override
9.231. export-prefixes
9.232. export-tunnel-table
9.233. export-v6-limit
9.234. expression
9.235. expression-match
9.236. extended-action
9.237. extended-bw
9.238. extended-community
9.239. extended-failure-handling
9.240. extended-lsa
9.241. extended-nh-encoding
9.242. extended-sequence-number
9.243. extension
9.244. extensions
9.245. external
9.246. external-assignment
9.247. external-db-overflow
9.248. external-preference
9.249. extranet
10. f Commands
10.1. facility
10.2. facility-fault
10.3. facility-id-permission
10.4. fail-action
10.5. fail-on-error
10.6. fail-to-open
10.7. failed-mda-limit
10.8. failed-threshold
10.9. failover
10.10. failure-action
10.11. failure-mode
10.12. failure-recovery
10.13. failure-threshold
10.14. fallback-action
10.15. fallback-path-computation-method
10.16. falling-percent-reset
10.17. family
10.18. far-end
10.19. fast-leave
10.20. fast-reroute
10.21. fast-start
10.22. fast-stop
10.23. fault-propagation-bmac
10.24. fault-propagation-enable
10.25. fc
10.26. fc-in-profile
10.27. fcc
10.28. fcc-burst
10.29. fcc-channel-type
10.30. fcc-min-duration
10.31. fcc-server
10.32. fcc-session-timeout
10.33. fd-avg
10.34. fdb-table-high-wmark
10.35. fdb-table-low-wmark
10.36. fdb-table-size
10.37. feac-loop-respond
10.38. feature
10.39. features
10.40. fec
10.41. fec-egress-stats
10.42. fec-limit
10.43. fec-originate
10.44. fec-prefix
10.45. fec-type-capability
10.46. fec129-cisco-interop
10.47. fib-priority
10.48. fib-telemetry
10.49. field
10.50. field-override
10.51. field-selection
10.52. file
10.53. file-id
10.54. file-transfer
10.55. file-transmission-profile
10.56. file-url
10.57. filter
10.58. filter-cam-type
10.59. filter-id-range
10.60. filter-name
10.61. filter-profile
10.62. filter-sample
10.63. filtering
10.64. find-egress
10.65. fips-140-2
10.66. fir-burst-limit
10.67. firewall
10.68. firewall-info
10.69. firewall-policy
10.70. flags-tlv
10.71. flex-algo
10.72. flexible-algorithm-definitions
10.73. flexible-algorithms
10.74. flood-garp-and-unknown-req
10.75. flood-time
10.76. flow-attribute
10.77. flow-count
10.78. flow-count-limit
10.79. flow-label
10.80. flow-label-load-balancing
10.81. flow-rate
10.82. flow-rate-limit
10.83. flow-rate2
10.84. flow-setup-direction
10.85. flow-setup-high-wmark
10.86. flow-setup-low-wmark
10.87. flow-spec-dest
10.88. flow-spec-source
10.89. flow-table-high-wmark
10.90. flow-table-low-wmark
10.91. flow-timeout-on-switchover
10.92. flows-active-count
10.93. flows-admitted-count
10.94. flows-denied-count
10.95. flowspec
10.96. flowtable
10.97. flr-threshold
10.98. fng-alarm-time
10.99. fng-reset-time
10.100. follow
10.101. force-auth
10.102. force-ipv6cp
10.103. force-l2pt-boundary
10.104. force-mcast
10.105. force-ppp-mtu-gt-1492
10.106. force-qinq-vc-forwarding
10.107. force-qtag-forwarding
10.108. force-reference
10.109. force-renews
10.110. force-switchover
10.111. force-vlan-vc-forwarding
10.112. foreign-ip
10.113. foreign-port
10.114. format
10.115. forward
10.116. forward-6in4
10.117. forward-delay
10.118. forward-entries
10.119. forward-ip-over-gre
10.120. forward-ipv4-multicast-to-ip-int
10.121. forward-ipv4-packets
10.122. forward-ipv6-multicast-to-ip-int
10.123. forward-path
10.124. forward-when
10.125. forwarding
10.126. forwarding-bits-set
10.127. forwarding-class
10.128. forwarding-policies
10.129. forwarding-policy
10.130. forwarding-set
10.131. forwarding-tree-topology
10.132. fp
10.133. fp-redirect-group
10.134. fp-resource-policy
10.135. fpe
10.136. fpipe
10.137. fqdn
10.138. frag-required
10.139. fragment
10.140. fragment-drop
10.141. fragment-drop-all
10.142. fragment-drop-out-of-order
10.143. fragment-threshold
10.144. frame-based-accounting
10.145. frame-counters
10.146. frame-relay
10.147. framed-interface-id
10.148. framed-ip-addr
10.149. framed-ip-netmask
10.150. framed-ipv6-prefix
10.151. framed-ipv6-route
10.152. framed-route
10.153. framing
10.154. frf-12
10.155. frf16
10.156. from
10.157. from-aa-sub-counters
10.158. from-subscriber
10.159. from-vpls
10.160. frr
10.161. frr-object
10.162. fsm-state-changes
10.163. fsm-timers
10.164. ftp
10.165. ftp-server
10.166. function
10.167. function-length
10.168. fwd-inside-router
10.169. fwd-path-ext
10.170. fwd-wholesale
11. g Commands
11.1. garp-flood-evpn
11.2. gateway
11.3. gateway-ip
11.4. gen-keypair
11.5. gen-local-cert-req
11.6. general-port
11.7. generalized-pid
11.8. generate-basic-fec-only
11.9. generate-icmp
11.10. generate-traps
11.11. get
11.12. get-config
11.13. get-data
11.14. get-schema
11.15. ggsn
11.16. ggsn-address
11.17. gi-address
11.18. global
11.19. global-id
11.20. global-timeouts
11.21. global-variables
11.22. glsp
11.23. gmpls
11.24. gmpls-loopback-address
11.25. gmpls-tun-grp
11.26. gnmi
11.27. gnmi-capabilities
11.28. gnmi-get
11.29. gnmi-set
11.30. gnmi-subscribe
11.31. gnoi-cert-mgmt-cangenerate
11.32. gnoi-cert-mgmt-getcert
11.33. gnoi-cert-mgmt-install
11.34. gnoi-cert-mgmt-revoke
11.35. gnoi-cert-mgmt-rotate
11.36. gnoi-file-get
11.37. gnoi-file-put
11.38. gnoi-file-remove
11.39. gnoi-file-stat
11.40. gnoi-file-transfertoremote
11.41. gnoi-system-cancelreboot
11.42. gnoi-system-ping
11.43. gnoi-system-reboot
11.44. gnoi-system-rebootstatus
11.45. gnoi-system-setpackage
11.46. gnoi-system-switchcontrolprocessor
11.47. gnoi-system-time
11.48. gnoi-system-traceroute
11.49. goto
11.50. gprs-negotiated-qos-profile
11.51. gr-helper
11.52. gr-helper-time
11.53. grace
11.54. grace-tx-enable
11.55. grace-vendor-oui
11.56. graceful-restart
11.57. graceful-shutdown
11.58. grafts
11.59. granularity
11.60. gratuitous-rtr-adv
11.61. gre
11.62. gre-eth-bridged
11.63. gre-header
11.64. gre-key
11.65. gre-termination
11.66. gre-tunnel-template
11.67. group
11.68. group down
11.69. group up
11.70. group-address
11.71. group-encryption
11.72. group-encryption-label
11.73. group-inserted-entries
11.74. group-interface
11.75. group-interface-template
11.76. group-name
11.77. group-policy
11.78. group-prefix
11.79. group-range
11.80. group-session-limit
11.81. grp-if-query-src-ip
11.82. grp-range
11.83. grpc
11.84. grt
11.85. grt-extranet
11.86. grt-lookup
11.87. gsmp
11.88. gtm
11.89. gtp
11.90. gtp-authorized
11.91. gtp-filter
11.92. gtp-filter-stats
11.93. gtp-in-gtp
11.94. gtp-local-breakout
11.95. gtp-mobility
11.96. gtp-parameters
11.97. gtp-peer-clear-timeout
11.98. gtp-ping
11.99. gtp-sanity-drop
11.100. gtp-traffic
11.101. gtp-tunnel-database
11.102. gtp-user
11.103. gtp-user-name
11.104. gtpc-inspection
11.105. gtpv1-c
11.106. gtpv2-c
11.107. guard-time
11.108. gw-address-range
11.109. gw-addresses
11.110. gw-mac
11.111. gx
11.112. gx-session-level-usage
11.113. gy
12. h Commands
12.1. half-life
12.2. handler
12.3. hardware-timestamp
12.4. hash-algorithm
12.5. hash-label
12.6. hash-mask-len
12.7. hash-weight-threshold
12.8. hashing
12.9. hd
12.10. head-end
12.11. header
12.12. header-sanity
12.13. header-sequence
12.14. health-check
12.15. heartbeat
12.16. hello
12.17. hello-auth-keychain
12.18. hello-authentication
12.19. hello-authentication-key
12.20. hello-authentication-type
12.21. hello-interval
12.22. hello-multiplier
12.23. hello-padding
12.24. hello-reduction
12.25. hello-time
12.26. help
12.27. helper-disable
12.28. helper-override-restart-time
12.29. helper-override-stale-time
12.30. hi-bw-mcast-src
12.31. high
12.32. high-availability
12.33. high-octets-discarded-count
12.34. high-octets-offered-count
12.35. high-packets-discarded-count
12.36. high-packets-offered-count
12.37. high-prio-only
12.38. high-rate-hold-time
12.39. high-slope
12.40. high-wmark
12.41. highplus
12.42. highplus-slope
12.43. history
12.44. history-size
12.45. hli-event
12.46. hli-force-count
12.47. hold-clear
12.48. hold-count
12.49. hold-down-time
12.50. hold-down-timer
12.51. hold-multiplier
12.52. hold-on-neighbor-failure
12.53. hold-set
12.54. hold-time
12.55. hold-time-aps
12.56. hold-time-down
12.57. hold-time-up
12.58. hold-timer
12.59. holddown
12.60. holdtime
12.61. home
12.62. home-directory
12.63. hop
12.64. hop-by-hop-opt
12.65. hop-limit
12.66. host
12.67. host-accounting
12.68. host-connectivity-verify
12.69. host-identification
12.70. host-ip
12.71. host-key
12.72. host-limit
12.73. host-limits
12.74. host-lockout-policy
12.75. host-match
12.76. host-port
12.77. host-shutdown
12.78. host-tracking-policy
12.79. host-unreachable
12.80. host-unsolicited-na-flood-evpn
12.81. hour
12.82. hqos-algorithm
12.83. hqos-mode
12.84. hs-agg-rate-limit
12.85. hs-alt-port-class-pool
12.86. hs-attachment-policy
12.87. hs-class-weight
12.88. hs-fixed-high-thresh-delta
12.89. hs-low-burst-max-class
12.90. hs-mbs
12.91. hs-pool-policy
12.92. hs-port-pool-policy
12.93. hs-queue-stat-mode
12.94. hs-scheduler-overrides
12.95. hs-scheduler-policy
12.96. hs-secondary-shaper
12.97. hs-sla-mode
12.98. hs-turbo
12.99. hs-wred-queue
12.100. hs-wred-queue-policy
12.101. hs-wrr-group
12.102. hs-wrr-weight
12.103. http-connections
12.104. http-enrich
12.105. http-enrich-max-pkt
12.106. http-error-redirect
12.107. http-host
12.108. http-host-recorder
12.109. http-listening-port
12.110. http-match-all-requests
12.111. http-notification
12.112. http-port
12.113. http-redirect
12.114. http-redirect-policy
12.115. http-request-filtering
12.116. http-response-timeout
12.117. http-version
12.118. http-x-online-host
12.119. hw-agg-shaper-scheduler-policy
12.120. hw-agg-shapers
12.121. hybrid-buffer-allocation
13. i Commands
13.1. i-counters
13.2. i-sid
13.3. ia-na
13.4. ibgp-multipath
13.5. icmp
13.6. icmp-code
13.7. icmp-generation
13.8. icmp-ping
13.9. icmp-query
13.10. icmp-trace
13.11. icmp-tunneling
13.12. icmp-type
13.13. icmp6
13.14. icmp6-generation
13.15. icmp6-query
13.16. id
13.17. id-permission
13.18. identification-strings
13.19. identifier
13.20. idi
13.21. idle-cycle-flag
13.22. idle-filter
13.23. idle-payload-fill
13.24. idle-signal-fill
13.25. idle-time
13.26. idle-timeout
13.27. idle-timeout-action
13.28. ies
13.29. ies-vprn-only-sap-parameters
13.30. if-attribute
13.31. if-num
13.32. if-num-validation
13.33. if-policy
13.34. ifdv-avg
13.35. iff-attribute-uniform-propagation
13.36. iff-bgp-path-selection
13.37. igmp
13.38. igmp-host-tracking
13.39. igmp-policy
13.40. igmp-snooping
13.41. ignore-app-profile
13.42. ignore-attached-bit
13.43. ignore-avps
13.44. ignore-default
13.45. ignore-df-bit
13.46. ignore-dn-bit
13.47. ignore-efm-state
13.48. ignore-lsp-errors
13.49. ignore-match
13.50. ignore-mclt-on-takeover
13.51. ignore-narrow-metric
13.52. ignore-nh-metric
13.53. ignore-oper-down
13.54. ignore-rapid-commit
13.55. ignore-received-srv6-tlvs
13.56. ignore-router-id
13.57. ignore-standby-signaling
13.58. ignore-tos
13.59. igp-shortcut
13.60. iid-tlv-enable
13.61. ike-auth-algorithm
13.62. ike-encryption-algorithm
13.63. ike-mode
13.64. ike-policy
13.65. ike-prf-algorithm
13.66. ike-transform
13.67. ike-version
13.68. ikev1-ph1-responder-delete-notify
13.69. ikev2-fragment
13.70. ilmi
13.71. ima
13.72. imei
13.73. implicit-generation
13.74. implicit-null-label
13.75. import
13.76. import-grt
13.77. import-mcast-policy
13.78. import-pmsi-routes
13.79. import-prefixes
13.80. import-tunnel-table
13.81. imported-format
13.82. improved-assert
13.83. imsi
13.84. imsi-apn-filter
13.85. in-band-control-path
13.86. in-label
13.87. in-plus-profile-octets-discarded-count
13.88. in-plus-profile-octets-forwarded-count
13.89. in-plus-profile-octets-offered-count
13.90. in-plus-profile-packets-discarded-count
13.91. in-plus-profile-packets-forwarded-count
13.92. in-plus-profile-packets-offered-count
13.93. in-profile-octets-discarded-count
13.94. in-profile-octets-forwarded-count
13.95. in-profile-octets-offered-count
13.96. in-profile-packets-discarded-count
13.97. in-profile-packets-forwarded-count
13.98. in-profile-packets-offered-count
13.99. in-remark
13.100. inactive-flow-timeout
13.101. inactivity-mon
13.102. inactivity-timeout
13.103. inactivity-timer
13.104. inband-collector-export-only
13.105. inbound-max-sessions
13.106. incl-mcast-orig-ip
13.107. include
13.108. include-all
13.109. include-any
13.110. include-avp
13.111. include-dns
13.112. include-group
13.113. include-radius-attribute
13.114. include-system-info
13.115. included-protocols
13.116. inclusive
13.117. incoming-sid
13.118. incremental-spf-wait
13.119. index
13.120. indirect
13.121. ine-identifier
13.122. info
13.123. info-notification
13.124. ing-percentage-of-rate
13.125. ing-weight
13.126. ingress
13.127. ingress-buffer-allocation
13.128. ingress-counter-map
13.129. ingress-ip-filter-entries
13.130. ingress-ipv6-filter-entries
13.131. ingress-label
13.132. ingress-percent-of-total
13.133. ingress-policer
13.134. ingress-rate
13.135. ingress-repl-inc-mcast-advertisement
13.136. ingress-replication-bum-label
13.137. ingress-statistics
13.138. ingress-xpl
13.139. init
13.140. init-delay
13.141. init-extract-prio-mode
13.142. initial-app-profile
13.143. initial-hold-time
13.144. initial-lease-time
13.145. initial-preferred-lifetime
13.146. initial-registration
13.147. initial-send-delay-zero
13.148. initial-sla-profile
13.149. initial-sub-profile
13.150. initial-valid-lifetime
13.151. initiation-message
13.152. inner-tag
13.153. input
13.154. input-power-mode
13.155. insert
13.156. insert-ipv6-fragment-header
13.157. insert-nsh
13.158. insert-subscriber-id
13.159. inside
13.160. inside-service-id
13.161. install-backup-path
13.162. instance
13.163. instance-id
13.164. instances
13.165. instant-prune-echo
13.166. int-dest-id
13.167. inter-chassis-redundancy
13.168. inter-dest-id
13.169. inter-vlan
13.170. interactive-authentication
13.171. intercept-id
13.172. interconnect
13.173. interface
13.174. interface-a
13.175. interface-b
13.176. interface-disable-sample
13.177. interface-group-handler
13.178. interface-id
13.179. interface-id-mapping
13.180. interface-list
13.181. interface-parameters
13.182. interface-subnets
13.183. interface-support-enable
13.184. interface-type
13.185. interim-credit
13.186. interim-update
13.187. interim-update-interval
13.188. interleave
13.189. interleave-fragments
13.190. internal-ip4-address
13.191. internal-ip4-dns
13.192. internal-ip4-netmask
13.193. internal-ip6-address
13.194. internal-ip6-dns
13.195. internal-lease-ipsec
13.196. internal-scheduler-weight-mode
13.197. intersite-shared
13.198. interval
13.199. intervals-stored
13.200. interworking
13.201. invert-data
13.202. iom
13.203. ip
13.204. ip-addr-backup
13.205. ip-addr-primary
13.206. ip-addr1
13.207. ip-addr2
13.208. ip-address
13.209. ip-advertise-routes
13.210. ip-assigned
13.211. ip-assigned-authorized
13.212. ip-cache
13.213. ip-can-type
13.214. ip-criteria
13.215. ip-exception
13.216. ip-fast-reroute
13.217. ip-filter
13.218. ip-filter-max-size
13.219. ip-filter-name
13.220. ip-fragmentation
13.221. ip-helper-address
13.222. ip-mirror
13.223. ip-mirror-interface
13.224. ip-mtu
13.225. ip-option
13.226. ip-prefix
13.227. ip-prefix-list
13.228. ip-prefix-routes
13.229. ip-protocol-num
13.230. ip-route-advertisement
13.231. ip-src
13.232. ip-ttl
13.233. ip-tunnel
13.234. ipcp
13.235. ipcp-subnet-negotiation
13.236. ipfix
13.237. ipfix-export-policy
13.238. ipipe
13.239. ipoe
13.240. ipoe-bridged-mode
13.241. ipoe-linking
13.242. ipoe-session
13.243. ipoe-session-policy
13.244. ipoe-sub-id-key
13.245. ipsec
13.246. ipsec-auth
13.247. ipsec-gw
13.248. ipsec-lifetime
13.249. ipsec-responder-only
13.250. ipsec-transform
13.251. ipsec-tunnel
13.252. ipv4
13.253. ipv4-address
13.254. ipv4-adjacency-sid
13.255. ipv4-arp
13.256. ipv4-dhcp
13.257. ipv4-mtu
13.258. ipv4-multicast
13.259. ipv4-multicast-disable
13.260. ipv4-multicast-metric
13.261. ipv4-multicast-metric-offset
13.262. ipv4-multicast-routing
13.263. ipv4-node-sid
13.264. ipv4-overall
13.265. ipv4-ppp
13.266. ipv4-prefix
13.267. ipv4-routing
13.268. ipv4-source-address
13.269. ipv4-unicast-metric-offset
13.270. ipv6
13.271. ipv6-address
13.272. ipv6-address-prefix-length
13.273. ipv6-adjacency-sid
13.274. ipv6-criteria
13.275. ipv6-delegated-prefix
13.276. ipv6-delegated-prefix-length
13.277. ipv6-delegated-prefix-pool
13.278. ipv6-eh
13.279. ipv6-error
13.280. ipv6-exception
13.281. ipv6-filter
13.282. ipv6-filter-max-size
13.283. ipv6-filter-name
13.284. ipv6-fragment
13.285. ipv6-lease-times
13.286. ipv6-mtu
13.287. ipv6-multicast
13.288. ipv6-multicast-disable
13.289. ipv6-multicast-metric
13.290. ipv6-multicast-metric-offset
13.291. ipv6-multicast-routing
13.292. ipv6-node-sid
13.293. ipv6-overall
13.294. ipv6-pd-ipoe-dhcp
13.295. ipv6-pd-overall
13.296. ipv6-pd-ppp-dhcp
13.297. ipv6-prefix
13.298. ipv6-prefix-list
13.299. ipv6-routing
13.300. ipv6-slaac-prefix
13.301. ipv6-slaac-prefix-pool
13.302. ipv6-source-address
13.303. ipv6-tcp-mss-adjust
13.304. ipv6-te-router-id
13.305. ipv6-unicast
13.306. ipv6-unicast-disable
13.307. ipv6-unicast-metric
13.308. ipv6-unicast-metric-offset
13.309. ipv6-wan-address-pool
13.310. ipv6-wan-ipoe-dhcp
13.311. ipv6-wan-ipoe-slaac
13.312. ipv6-wan-overall
13.313. ipv6-wan-ppp-dhcp
13.314. ipv6-wan-ppp-slaac
13.315. isa
13.316. isa-aa-group
13.317. isa-aa-oversubscription-factor
13.318. isa-capacity-cost-high-threshold
13.319. isa-capacity-cost-low-threshold
13.320. isa-dp-cpu-usage
13.321. isa-filter
13.322. isa-overload-cut-through
13.323. isa-policer
13.324. isa-radius-policy
13.325. isa-service-chaining
13.326. isakmp-lifetime
13.327. isid
13.328. isid-policy
13.329. isid-range
13.330. isid-route-target
13.331. isis
14. j Commands
14.1. jitter-event
14.2. join-time
14.3. join-tlv-packing-disable
14.4. jp
15. k Commands
15.1. kb-memory-use-alarm
15.2. kb-memory-use-warn
15.3. keep-alive
15.4. keep-alive-interval
15.5. keep-count
15.6. keep-idle
15.7. keep-interval
15.8. keep-multiplier
15.9. keepalive
15.10. keepalive-override
15.11. kernel
15.12. kex
15.13. key
15.14. key-list
15.15. key-re-exchange
15.16. key-rollover-interval
15.17. key-update
15.18. key-value
15.19. keychain
15.20. keygroup-name
15.21. kill-session
16. l Commands
16.1. l2
16.2. l2-access-points
16.3. l2-ap
16.4. l2-ap-auto-sub-id-fmt
16.5. l2-ap-encap-type
16.6. l2-aware
16.7. l2-aware-ip-address
16.8. l2-aware-nat-bypass
16.9. l2-aware-sub
16.10. l2-inner-vlan
16.11. l2-ip
16.12. l2-outer-vlan
16.13. l2-outside
16.14. l2-sap
16.15. l2-service
16.16. l2pt-termination
16.17. l2tp
16.18. l2tp-accounting-policy
16.19. l2tp-lns
16.20. l2tp-load-balancing
16.21. l2tp-lts
16.22. l2tp-overall
16.23. l2tp-tunnel-id-range
16.24. l2tpv3
16.25. l2tpv3-session
16.26. l2w
16.27. l3-ring
16.28. l4-load-balancing
16.29. l4-src-port
16.30. label
16.31. label-allocation
16.32. label-block
16.33. label-ipv4
16.34. label-ipv6
16.35. label-ipv6-explicit-null
16.36. label-map
16.37. label-mode
16.38. label-preference
16.39. label-route-local
16.40. label-route-transit
16.41. label-stack-reduction
16.42. label-stack-statistics-count
16.43. label-withdrawal-delay
16.44. labeled-routes
16.45. lac-overall
16.46. lacp
16.47. lacp-mux-control
16.48. lacp-system-priority
16.49. lacp-tunnel
16.50. lacp-xmit-interval
16.51. lacp-xmit-stdby
16.52. lag
16.53. lag-emulation
16.54. lag-link-map-profile
16.55. lag-per-link-hash
16.56. lag-port-down
16.57. lag-usage-optimization
16.58. lanext
16.59. lanext-bridge-id
16.60. lanext-device-type
16.61. lanext-route-distinguisher
16.62. lanext-route-target
16.63. lanext-vni
16.64. last-member-query-interval
16.65. last-reported-delay-hold
16.66. latency-event
16.67. layer-3
16.68. layer-3-encap
16.69. lbm-svc-act-responder
16.70. lbo
16.71. lcp-force-ack-accm
16.72. lcp-ignore-magic-numbers
16.73. ldap
16.74. ldap-server
16.75. ldp
16.76. ldp-over-rsvp
16.77. ldp-shortcut
16.78. ldp-sync
16.79. ldp-sync-timer
16.80. ldp-treetrace
16.81. leak
16.82. leak-export
16.83. leak-export-limit
16.84. leak-import
16.85. learn-ap-mac
16.86. learn-dynamic
16.87. learn-l2tp-cookie
16.88. lease-hold-time
16.89. lease-hold-time-for
16.90. lease-populate
16.91. lease-query
16.92. lease-rebind-time
16.93. lease-renew-time
16.94. lease-time
16.95. least-fill
16.96. least-fill-min-thd
16.97. least-fill-reoptim-thd
16.98. leave-all-sm
16.99. leave-all-time
16.100. leave-time
16.101. legacy
16.102. legacy-dns-nbns
16.103. legacy-ipv4-lsr-interop
16.104. length
16.105. ler-use-dscp
16.106. less-specific
16.107. level
16.108. level-capability
16.109. lfa-policy-map
16.110. li
16.111. li-filter
16.112. li-filter-associations
16.113. li-filter-block-reservation
16.114. li-filter-lock-state
16.115. li-group
16.116. li-ip-filter
16.117. li-ipv6-filter
16.118. li-local-save
16.119. li-mac-filter
16.120. li-reserved-block
16.121. li-separate
16.122. li-source
16.123. lic
16.124. lic-identifier
16.125. license
16.126. license-file
16.127. lics
16.128. lifetime
16.129. limit
16.130. limit-init-exchange
16.131. limit-mac-move
16.132. limit-pir-zero-drain
16.133. limit-unused-bandwidth
16.134. line-length
16.135. link
16.136. link-addr
16.137. link-address
16.138. link-bandwidth
16.139. link-delay
16.140. link-fault
16.141. link-group
16.142. link-local-address
16.143. link-local-modifier
16.144. link-map-profile
16.145. link-measurement
16.146. link-monitoring
16.147. link-name
16.148. link-specific-rate
16.149. link-state-export-enable
16.150. link-state-import-enable
16.151. link-type
16.152. linktrace
16.153. live-output
16.154. lldp
16.155. llf
16.156. lmi
16.157. lmi-type
16.158. lmm
16.159. lmp
16.160. lns-group
16.161. load
16.162. load-balance-key
16.163. load-balance-method
16.164. load-balancing
16.165. load-balancing-algorithm
16.166. load-balancing-weight
16.167. local
16.168. local-address
16.169. local-address-assignment
16.170. local-age
16.171. local-as
16.172. local-attachment-circuit
16.173. local-auth-db
16.174. local-dhcp-server
16.175. local-ecid
16.176. local-end
16.177. local-fcc-port
16.178. local-filtering
16.179. local-forward
16.180. local-gateway-address
16.181. local-id
16.182. local-ip
16.183. local-ip-address
16.184. local-ip-range-start
16.185. local-lsr-id
16.186. local-max-checkpoints
16.187. local-monitoring-policer
16.188. local-name
16.189. local-port-action
16.190. local-preference
16.191. local-prefix
16.192. local-priority
16.193. local-proxy-arp
16.194. local-proxy-nd
16.195. local-rt-port
16.196. local-rt-server
16.197. local-sf-action
16.198. local-source-address
16.199. local-sr-protection
16.200. local-state
16.201. local-switching-service-state
16.202. local-user-db
16.203. local-v6-ip
16.204. location
16.205. locator
16.206. lock
16.207. lock-override
16.208. lockout
16.209. lockout-reset-time
16.210. lockout-time
16.211. log
16.212. log-anno-interval
16.213. log-delay-interval
16.214. log-events
16.215. log-filter
16.216. log-id
16.217. log-prefix
16.218. log-sync-interval
16.219. logger-event-bundling
16.220. logical-access-id
16.221. logical-port-status
16.222. login-banner
16.223. login-control
16.224. login-exec
16.225. login-scripts
16.226. logout
16.227. long-duration-flow-count
16.228. long-lived
16.229. loop-detect
16.230. loop-detect-threshold
16.231. loopback
16.232. loopback-period
16.233. loopfree-alternate-exclude
16.234. loopfree-alternates
16.235. loss
16.236. loss-event
16.237. loss-events
16.238. low
16.239. low-burst-max-class
16.240. low-octets-discarded-count
16.241. low-octets-offered-count
16.242. low-packets-discarded-count
16.243. low-packets-offered-count
16.244. low-priority-defect
16.245. low-slope
16.246. low-wmark
16.247. lower-bound
16.248. lsa-accumulate
16.249. lsa-arrival
16.250. lsa-filter-out
16.251. lsa-generate
16.252. lsdb
16.253. lsn
16.254. lsp
16.255. lsp-bfd
16.256. lsp-egress-stats
16.257. lsp-exp
16.258. lsp-exp-in-profile
16.259. lsp-exp-out-profile
16.260. lsp-hold-timer
16.261. lsp-ingress-stats
16.262. lsp-init-retry-timeout
16.263. lsp-lifetime
16.264. lsp-minimum-remaining-lifetime
16.265. lsp-mtu-size
16.266. lsp-num
16.267. lsp-pacing-interval
16.268. lsp-ping
16.269. lsp-ping-interval
16.270. lsp-ping-trace
16.271. lsp-refresh-interval
16.272. lsp-self-ping
16.273. lsp-setup
16.274. lsp-template
16.275. lsp-trace
16.276. lsp-wait
16.277. lsr-label-route
16.278. lsr-load-balancing
16.279. lub-init-min-pir
17. m Commands
17.1. ma-index-range
17.2. mac
17.3. mac-address
17.4. mac-advertisement
17.5. mac-criteria
17.6. mac-da-hashing
17.7. mac-duplication
17.8. mac-filter
17.9. mac-filter-name
17.10. mac-format
17.11. mac-learning-options
17.12. mac-linking
17.13. mac-list
17.14. mac-move
17.15. mac-move-level
17.16. mac-name
17.17. mac-notification
17.18. mac-ping
17.19. mac-pinning
17.20. mac-policy
17.21. mac-populate
17.22. mac-prefix
17.23. mac-protect
17.24. mac-purge
17.25. mac-refresh
17.26. mac-subnet-length
17.27. mac-trace
17.28. mac-translation
17.29. macsec
17.30. macsec-encrypt
17.31. magic-number
17.32. main-ct-retry-limit
17.33. maintenance-policy
17.34. managed-configuration
17.35. managed-routes
17.36. managed-vlan-list
17.37. management
17.38. management-access-filter
17.39. management-interface
17.40. manager
17.41. manager-address
17.42. manager-port
17.43. manual
17.44. manual-keying
17.45. map
17.46. map-domain
17.47. mapping
17.48. mapping-limit
17.49. mapping-rule
17.50. mapping-server
17.51. maps-to
17.52. mark
17.53. mask
17.54. mask-reply
17.55. master-int-inherit
17.56. master-only
17.57. master-selection-mode
17.58. match
17.59. match-circuit-id
17.60. match-list
17.61. match-peer-id-to-cert
17.62. match-qinq-dot1p
17.63. match-radius-proxy-cache
17.64. max
17.65. max-admin-down-time
17.66. max-advertisement
17.67. max-advertisement-interval
17.68. max-age
17.69. max-attempts
17.70. max-auth-req
17.71. max-avg
17.72. max-bandwidth
17.73. max-burst
17.74. max-burst-size
17.75. max-bypass-associations
17.76. max-bypass-plr-associations
17.77. max-cells
17.78. max-cleared
17.79. max-completed
17.80. max-conn-prefix
17.81. max-conn-server
17.82. max-data-size
17.83. max-debounce-time
17.84. max-decrement
17.85. max-delay
17.86. max-description-size
17.87. max-drop-count
17.88. max-ecmp-routes
17.89. max-entries
17.90. max-entry-lifetime
17.91. max-fail
17.92. max-files-number
17.93. max-fragment-delay
17.94. max-groups
17.95. max-grp-sources
17.96. max-held-sessions
17.97. max-history-esp-key-records
17.98. max-history-ike-key-records
17.99. max-igmp-latency
17.100. max-lanext-bd
17.101. max-lease-time
17.102. max-lifetime
17.103. max-links
17.104. max-list-length
17.105. max-lockout-hosts
17.106. max-mac
17.107. max-msg-size
17.108. max-nbr-mac-addr
17.109. max-nbr-of-leases
17.110. max-num-groups
17.111. max-num-grp-sources
17.112. max-num-sources
17.113. max-num-ue
17.114. max-path
17.115. max-payload-length
17.116. max-peer
17.117. max-percent-rate
17.118. max-prob
17.119. max-queue-size
17.120. max-rate
17.121. max-retries-estab
17.122. max-retries-not-estab
17.123. max-routes
17.124. max-rx-defect-window
17.125. max-sess-prefix
17.126. max-sess-server
17.127. max-sessions
17.128. max-sessions-per-cid
17.129. max-sessions-per-mac
17.130. max-setup-time
17.131. max-size
17.132. max-sources
17.133. max-sr-labels
17.134. max-srte-pce-init-lsps
17.135. max-stats
17.136. max-suppress
17.137. max-throughput-octet-count
17.138. max-throughput-packet-count
17.139. max-throughput-stats
17.140. max-throughput-timestamp
17.141. max-time
17.142. max-ttl
17.143. max-tx-delay
17.144. max-ve-id
17.145. max-wait-to-advertise
17.146. maximum-cert-chain-depth
17.147. maximum-client-lead-time
17.148. maximum-declined
17.149. maximum-ipv6-routes
17.150. maximum-p2mp-spmsi
17.151. maximum-paths
17.152. maximum-recovery-time
17.153. maximum-routes
17.154. maximum-sid-depth
17.155. mbb
17.156. mbb-prefer-current-hops
17.157. mbs
17.158. mbs-contribution
17.159. mbytes
17.160. mc-constraints
17.161. mc-ecmp-balance
17.162. mc-ecmp-balance-hold
17.163. mc-ecmp-hashing-enabled
17.164. mc-endpoint
17.165. mc-enh-load-balancing
17.166. mc-ep-peer
17.167. mc-fr-profile-egress
17.168. mc-fr-profile-ingress
17.169. mc-handover
17.170. mc-ipsec
17.171. mc-ipsec-non-forwarding
17.172. mc-lag
17.173. mc-maximum-routes
17.174. mc-ring
17.175. mcac
17.176. mcast-capacity
17.177. mcast-ipv4
17.178. mcast-ipv6
17.179. mcast-ipv6-snooping-scope
17.180. mcast-management
17.181. mcast-path-management
17.182. mcast-pool
17.183. mcast-reporting
17.184. mcast-reporting-dest
17.185. mcast-tunneling
17.186. mcast-upstream-asbr-frr
17.187. mcast-upstream-frr
17.188. mcast-vpn-ipv4
17.189. mcast-vpn-ipv6
17.190. mcc-mnc-prefix
17.191. mcr-default-gtw
17.192. mcs
17.193. mcs-interval
17.194. mcs-peer
17.195. md
17.196. md-auto-id
17.197. md-cli
17.198. md-cli-session
17.199. md-index-range
17.200. md-interfaces
17.201. mda
17.202. mda-type
17.203. mdl
17.204. mdl-transmit
17.205. mdt-pim
17.206. mdt-type
17.207. meas-interval
17.208. measurement-template
17.209. med-out
17.210. medium-duration-flow-count
17.211. member
17.212. member-threshold
17.213. members
17.214. memory
17.215. memory-alarm
17.216. memory-use-alarm
17.217. memory-use-warn
17.218. mep
17.219. mesh-group
17.220. mesh-sdp
17.221. mesh-sdp-binding
17.222. message
17.223. message-count
17.224. message-digest-key
17.225. message-fast-tx
17.226. message-fast-tx-init
17.227. message-interval
17.228. message-length
17.229. message-path
17.230. message-retransmit
17.231. message-severity-level
17.232. message-size
17.233. message-timeout
17.234. message-type
17.235. message-type-gtpv2
17.236. messages
17.237. meta-data
17.238. metric
17.239. metric-in
17.240. metric-out
17.241. metric-type
17.242. mfib-allowed-mda-destinations
17.243. mfib-ping
17.244. mfib-table-high-wmark
17.245. mfib-table-low-wmark
17.246. mfib-table-size
17.247. mgmt-ethernet
17.248. mh-mode
17.249. mhf-creation
17.250. micro-loop-avoidance
17.251. mid-pool
17.252. mid-tier
17.253. migrant
17.254. millisecond-event-timestamp
17.255. min-advertisement
17.256. min-advertisement-interval
17.257. min-auth-interval
17.258. min-bandwidth
17.259. min-delay
17.260. min-frame-length
17.261. min-lease-time
17.262. min-num-ue
17.263. min-route-advertisement
17.264. min-thresh-separation
17.265. min-vp-vpi
17.266. min-wait-to-advertise
17.267. minimum
17.268. minimum-age
17.269. minimum-change
17.270. minimum-classes
17.271. minimum-free
17.272. minimum-isa-generation
17.273. minimum-length
17.274. minimum-lifetimes
17.275. minimum-links
17.276. minute
17.277. minutes
17.278. mip
17.279. mip-ltr-priority
17.280. mir
17.281. mirror-dest
17.282. mirror-dest-reservation
17.283. mirror-dest-template
17.284. mirror-source
17.285. misc
17.286. mismatch-reaction
17.287. missing-mandatory-ie
17.288. mixed-lsp-mode
17.289. mka-hello-interval
17.290. mka-key-server-priority
17.291. mld
17.292. mld-parameters
17.293. mld-policy
17.294. mld-snooping
17.295. mldp
17.296. mlfr
17.297. mlppp
17.298. mlppp-profile-egress
17.299. mlppp-profile-ingress
17.300. mme
17.301. mmrp
17.302. mmrp-impm-override
17.303. mmrp-mac
17.304. mobility
17.305. mobility-acct-updates
17.306. mobility-triggered-acct
17.307. mode
17.308. mode-annexb
17.309. modify-buffer-allocation-rate
17.310. module
17.311. mofrr
17.312. mon-hw-agg-shaper-sch
17.313. mon-port-sch
17.314. monitor
17.315. monitor-agg-egress-queue-stats
17.316. monitor-bandwidth
17.317. monitor-depth
17.318. monitor-oper-group
17.319. monitor-port
17.320. monitor-ptsf-unusable
17.321. monitor-queue-depth
17.322. monitor-threshold
17.323. month
17.324. more
17.325. more-fragments
17.326. motd
17.327. move
17.328. move-frequency
17.329. mp-bgp-keep
17.330. mp-mbb-time
17.331. mpls
17.332. mpls-dm
17.333. mpls-echo-request-downstream-map
17.334. mpls-fwd-policy
17.335. mpls-label
17.336. mpls-labels
17.337. mpls-time-stamp-format
17.338. mpls-tp
17.339. mpls-tp-mep
17.340. mpls-tp-static
17.341. mrib
17.342. mrinfo
17.343. mrouter-dest
17.344. mrouter-port
17.345. mrp
17.346. mrp-policy
17.347. mrpdu
17.348. mrru
17.349. mru
17.350. mru-mismatch-detection
17.351. msap
17.352. msap-defaults
17.353. msap-policy
17.354. msdp
17.355. msg
17.356. msg-pacing
17.357. msisdn
17.358. mss-adjust-group
17.359. mst-instance
17.360. mst-max-hops
17.361. mst-name
17.362. mst-path-cost
17.363. mst-port-priority
17.364. mst-priority
17.365. mst-revision
17.366. mstat
17.367. mstat2
17.368. mt
17.369. mtrace
17.370. mtrace2
17.371. mtu
17.372. mtu-over-head
17.373. multi-access
17.374. multi-active
17.375. multi-chassis
17.376. multi-chassis-redundancy
17.377. multi-homing
17.378. multi-instance
17.379. multi-path
17.380. multi-service-site
17.381. multi-session-id
17.382. multi-sub-sap
17.383. multi-topology
17.384. multi-tunnel-type
17.385. multicast
17.386. multicast-fast-failover
17.387. multicast-import
17.388. multicast-info-policy
17.389. multicast-leave-sync-propagation
17.390. multicast-lsp
17.391. multicast-network-domain
17.392. multicast-policer
17.393. multicast-queue
17.394. multicast-redirection
17.395. multicast-senders
17.396. multicast-service
17.397. multicast6-fast-failover
17.398. multicastclient
17.399. multiclass
17.400. multihop
17.401. multilink-bundle
17.402. multipath-eligible
17.403. multiple-option
17.404. multiplier
17.405. multipliers
17.406. multistream-spmsi
17.407. mvpn
17.408. mvpn-ipv4
17.409. mvpn-ipv6
17.410. mvpn-no-export
17.411. mvpn-rtcache
17.412. mvpn-type
17.413. mvpn-vrf-import-subtype-new
17.414. mvr
17.415. mvrp
17.416. mvrp-control
18. n Commands
18.1. n391dte
18.2. n392dce
18.3. n392dte
18.4. n393
18.5. n393dce
18.6. n393dte
18.7. nak-non-matching-subnet
18.8. name
18.9. named-pool-policy
18.10. nas-identifier
18.11. nas-ip-addr
18.12. nas-ip-address
18.13. nas-ip-address-origin
18.14. nas-port
18.15. nas-port-id
18.16. nas-port-type
18.17. nasreq
18.18. nat
18.19. nat-access-mode
18.20. nat-allow-bypass
18.21. nat-classifier
18.22. nat-group
18.23. nat-import
18.24. nat-outside
18.25. nat-policy
18.26. nat-policy-name
18.27. nat-port-forwarding
18.28. nat-port-range
18.29. nat-prefix-list
18.30. nat-subscriber-string
18.31. nat-traversal
18.32. nat64
18.33. nat64-lsn-sub
18.34. national-bits
18.35. nbr
18.36. nd
18.37. nd-host-route
18.38. nd-learn-unsolicited
18.39. nd-populate-host-route
18.40. nd-proactive-refresh
18.41. nd-route-tag
18.42. neid
18.43. neighbor
18.44. neighbor-limit
18.45. neighbor-liveness-time
18.46. neighbor-resolution
18.47. neighbor-solicitation
18.48. neighbor-trust
18.49. neip
18.50. netbios-name-server
18.51. netbios-node-type
18.52. netconf
18.53. netconf-stream
18.54. network
18.55. network-address
18.56. network-domain
18.57. network-domains
18.58. network-element-discovery
18.59. network-interconnect-vxlan
18.60. network-interface
18.61. network-ip
18.62. network-queue
18.63. network-type
18.64. new-password-at-login
18.65. new-qinq-untagged-sap
18.66. new-session-id
18.67. newline
18.68. next
18.69. next-attempt
18.70. next-header
18.71. next-hop
18.72. next-hop-address
18.73. next-hop-group
18.74. next-hop-id
18.75. next-hop-interface-name
18.76. next-hop-resolution
18.77. next-hop-self
18.78. next-hop-unchanged
18.79. nh-type
18.80. nmda
18.81. nmda-support
18.82. no-match-action
18.83. node
18.84. node-id
18.85. node-id-in-rro
18.86. node-protect
18.87. node-sid
18.88. nokia-combined-modules
18.89. nokia-submodules
18.90. non-dr-attract-traffic
18.91. non-multi-chassis-tunnel-id-range
18.92. non-sub-traffic
18.93. non-vid-pid-absent
18.94. nonce-length
18.95. normal-state
18.96. notification
18.97. notification-interval
18.98. notify
18.99. notify-dest-change
18.100. nssa
18.101. nssa-range
18.102. ntf-logout-retry-count
18.103. ntp
18.104. ntp-reply
18.105. ntp-server
18.106. number
18.107. number-down
18.108. number-paths
18.109. number-retries
19. o Commands
19.1. oam
19.2. oam-perf
19.3. oam-pm
19.4. oam-template
19.5. ocsp
19.6. octet-counters
19.7. octets-admitted-count
19.8. octets-denied-count
19.9. of-controller
19.10. of-switch
19.11. offer-selection
19.12. offer-time
19.13. offered-measurement
19.14. offset
19.15. on-cac-failure
19.16. on-error
19.17. on-failure
19.18. on-link
19.19. one-garp-per-sap
19.20. one-time-http-redirection
19.21. one-time-redirect
19.22. one-way-delay-test
19.23. one-way-delay-threshold
19.24. opaque-data
19.25. opcode
19.26. open
19.27. open-flow
19.28. oper-down-on-group-degrade
19.29. oper-group
19.30. oper-members
19.31. oper-up-while-empty
19.32. operations
19.33. opt-reporting-fields
19.34. optimal-route-reflection
19.35. optimized-mode
19.36. option
19.37. option-present
19.38. option60
19.39. options
19.40. options6
19.41. origin
19.42. origin-host
19.43. origin-invalid-unusable
19.44. origin-realm
19.45. origin-validation
19.46. origin-validation-state
19.47. originate-default-route
19.48. originated-qos-marking
19.49. origination-fpe
19.50. orphan-override
19.51. ospf
19.52. ospf-dynamic-hostnames
19.53. ospf3
19.54. other-stateful-configuration
19.55. otu
19.56. otu2-lan-data-rate
19.57. out-label
19.58. out-of-credit-action
19.59. out-of-credit-action-override
19.60. out-of-credit-reporting
19.61. out-profile-octets-discarded-count
19.62. out-profile-octets-forwarded-count
19.63. out-profile-octets-offered-count
19.64. out-profile-packets-discarded-count
19.65. out-profile-packets-forwarded-count
19.66. out-profile-packets-offered-count
19.67. out-profile-rate
19.68. out-remark
19.69. outbound-max-sessions
19.70. outbound-route-filtering
19.71. outer-tag
19.72. output
19.73. output-authorization
19.74. outside
19.75. outside-ip
19.76. outside-service-id
19.77. overall
19.78. overall-rate
19.79. overflow
19.80. overflow-limit
19.81. overload
19.82. overload-drop
19.83. overload-export-external
19.84. overload-export-interlevel
19.85. overload-include-ext-1
19.86. overload-include-ext-2
19.87. overload-include-stub
19.88. overload-on-boot
19.89. overload-sub-quarantine
19.90. override
19.91. override-bmi
19.92. override-counter
19.93. override-erld
19.94. override-slaac
19.95. override-tunnel-elc
19.96. own-auth-method
19.97. owner
20. p Commands
20.1. p2mp
20.2. p2mp-candidate-path
20.3. p2mp-id
20.4. p2mp-ipv4
20.5. p2mp-ipv6
20.6. p2mp-ldp-tree-join
20.7. p2mp-lsp-ping
20.8. p2mp-lsp-trace
20.9. p2mp-merge-point-abort-timer
20.10. p2mp-policy
20.11. p2mp-resignal-timer
20.12. p2mp-s2l-fast-retry
20.13. p2mp-sr
20.14. p2mp-sr-tree
20.15. p2mp-template-lsp
20.16. p2p-active-path-fast-retry
20.17. p2p-merge-point-abort-timer
20.18. p2p-template-lsp
20.19. packet
20.20. packet-byte-offset
20.21. packet-length
20.22. packet-rate-high-wmark
20.23. packet-rate-low-wmark
20.24. packet-rx
20.25. packet-sanity
20.26. packet-size
20.27. packet-too-big
20.28. packet-tx
20.29. packet-type
20.30. packets
20.31. packets-admitted-count
20.32. packets-denied-count
20.33. pad-size
20.34. pad-tlv-size
20.35. padding-size
20.36. padi-auth-policy
20.37. pado-ac-name
20.38. pado-delay
20.39. pairing-button
20.40. parallel
20.41. param-problem
20.42. parent
20.43. parent-location
20.44. parent-mid-pool
20.45. parent-root-pool
20.46. participant-id
20.47. participate
20.48. partitions
20.49. partner-down-delay
20.50. passive
20.51. passive-mode
20.52. passkey
20.53. password
20.54. password-history
20.55. pat-repetition
20.56. pat-syntax
20.57. path
20.58. path-b
20.59. path-computation-method
20.60. path-cost
20.61. path-destination
20.62. path-discovery
20.63. path-excl
20.64. path-id
20.65. path-mtu
20.66. path-mtu-discovery
20.67. path-preference
20.68. path-probing
20.69. path-profile
20.70. path-restoration-time
20.71. path-threshold
20.72. path-type
20.73. patherr
20.74. pathtear
20.75. pattern
20.76. payload
20.77. pbb
20.78. pbb-etype
20.79. pbr-down-action-override
20.80. pcap
20.81. pcc
20.82. pce
20.83. pce-control
20.84. pce-initiated-lsp
20.85. pce-report
20.86. pcep
20.87. pcm
20.88. pcm-type
20.89. pcp
20.90. pcp-server
20.91. pcp-server-policy
20.92. pcr-repetition
20.93. pd-managed-route
20.94. pdn-connection-id
20.95. pdn-type
20.96. pdp-context-type
20.97. pe-id-mac-flush-interop
20.98. peak-rate
20.99. peer
20.100. peer-address-change-policy
20.101. peer-as
20.102. peer-endpoint
20.103. peer-group
20.104. peer-interface-address
20.105. peer-ip-address
20.106. peer-ip-prefix
20.107. peer-limit
20.108. peer-loopback-address
20.109. peer-name
20.110. peer-profile
20.111. peer-profile-map
20.112. peer-rdi-rx
20.113. peer-template
20.114. peer-template-map
20.115. peer-to-peer
20.116. peer-tracking-policy
20.117. peer-transport
20.118. peer6
20.119. peers
20.120. pending-requests-limit
20.121. peq
20.122. peq-type
20.123. per-fp-egr-queuing
20.124. per-fp-ing-queuing
20.125. per-fp-sap-instance
20.126. per-host-authentication
20.127. per-host-replication
20.128. per-link-hash
20.129. per-mcast-plane-capacity
20.130. per-peer-queuing
20.131. per-service-hashing
20.132. per-source-rate
20.133. per-spi-replication
20.134. per-user
20.135. percent-rate
20.136. percent-reduction-from-mbs
20.137. performance
20.138. period
20.139. periodic
20.140. periodic-loopback
20.141. periodic-sm
20.142. periodic-time
20.143. periodic-timer
20.144. periodic-update
20.145. periodic-update-interval
20.146. persist
20.147. persistence
20.148. persistency-database
20.149. persistent-subscriptions
20.150. pfcp
20.151. pfcp-association
20.152. pfs
20.153. pfs-dh-group
20.154. pgw
20.155. phone
20.156. physical-access-id
20.157. pid-pmt-unref
20.158. pim
20.159. pim-asm
20.160. pim-policy
20.161. pim-snooping
20.162. pim-ssm
20.163. pim-ssm-scaling
20.164. ping
20.165. ping-reply
20.166. ping-template
20.167. ping-test
20.168. pip
20.169. pir
20.170. pki
20.171. pkt-too-big
20.172. platform-type
20.173. pm-tti
20.174. pmt-repetition
20.175. pmt-syntax
20.176. pmtu-discovery-aging
20.177. poi-tlv-enable
20.178. policer
20.179. policer-control-override
20.180. policer-control-policy
20.181. policer-override
20.182. policer-stats
20.183. policer-stats-resources
20.184. policers
20.185. policers-hqos-manageable
20.186. policing
20.187. policy
20.188. policy-accounting
20.189. policy-acct-template
20.190. policy-control
20.191. policy-options
20.192. policy-override
20.193. policy-reference-checks
20.194. policy-statement
20.195. policy-variables
20.196. poll
20.197. poll-interval
20.198. pool
20.199. pool-manager
20.200. pool-name
20.201. pop
20.202. populate
20.203. port
20.204. port-block-extension
20.205. port-bw-oversub-factor
20.206. port-control
20.207. port-down
20.208. port-format
20.209. port-forwarding
20.210. port-forwarding-dyn-block-reservation
20.211. port-forwarding-range
20.212. port-id
20.213. port-id-subtype
20.214. port-limits
20.215. port-list
20.216. port-map
20.217. port-num
20.218. port-overall-rate
20.219. port-parent
20.220. port-policy
20.221. port-range-block
20.222. port-recorder
20.223. port-redirect-group
20.224. port-reservation
20.225. port-role
20.226. port-scheduler-policy
20.227. port-set
20.228. port-state
20.229. port-template
20.230. port-threshold
20.231. port-topology
20.232. port-type
20.233. port-weight-speed
20.234. port-xc
20.235. port1
20.236. port2
20.237. portal
20.238. portal-group
20.239. portal-groups
20.240. portal-hold-time
20.241. portals
20.242. ports
20.243. post-policer-mapping
20.244. power
20.245. power-control
20.246. power-priority-level
20.247. power-safety-alert
20.248. power-safety-level
20.249. power-save
20.250. power-supply
20.251. ppid
20.252. ppid-range
20.253. ppp
20.254. ppp-authentication
20.255. ppp-chap-challenge-length
20.256. ppp-initial-delay
20.257. ppp-mtu
20.258. ppp-options
20.259. ppp-policy
20.260. ppp-sub-id-key
20.261. ppp-user-db
20.262. ppp-user-name
20.263. pppoe
20.264. pppoe-access-method
20.265. pppoe-client
20.266. pppoe-client-policy
20.267. pppoe-lac
20.268. pppoe-local
20.269. pppoe-overall
20.270. pppoe-policy
20.271. pppoe-python-policy
20.272. pppoe-service-name
20.273. pppoe-trace
20.274. pppoe-user-db
20.275. pptp
20.276. pre-auth-policy
20.277. pre-login-message
20.278. pre-shared-key
20.279. pre-update-time
20.280. prec
20.281. precedence
20.282. preempt
20.283. preemption-timer
20.284. prefer-failure
20.285. prefer-local-time
20.286. prefer-mcast-tunnel-in-tunnel
20.287. prefer-protocol-stitching
20.288. prefer-tunnel-in-tunnel
20.289. preference
20.290. preference-option
20.291. preferred
20.292. preferred-lifetime
20.293. prefix
20.294. prefix-attributes-tlv
20.295. prefix-delegation
20.296. prefix-exclude
20.297. prefix-ipv4
20.298. prefix-ipv6
20.299. prefix-limit
20.300. prefix-list
20.301. prefix-options
20.302. prefix-policy
20.303. prefix-sid-range
20.304. preserve-key
20.305. primary
20.306. primary-cf
20.307. primary-config
20.308. primary-dns
20.309. primary-image
20.310. primary-ip-address
20.311. primary-ipv6-address
20.312. primary-location
20.313. primary-nbns
20.314. primary-next-hop
20.315. primary-p2mp-instance
20.316. primary-path
20.317. primary-ports
20.318. primary-tunnel-interface
20.319. primary-url
20.320. prio-code-point
20.321. priority
20.322. priority-event
20.323. priority-marking
20.324. priority-mbs-thresholds
20.325. priority-sessions
20.326. priority1
20.327. priority2
20.328. priv-lvl
20.329. priv-lvl-map
20.330. private-interface
20.331. private-ki
20.332. private-retail-subnets
20.333. private-service
20.334. private-tcp-mss-adjust
20.335. probe-count
20.336. probe-fail-enable
20.337. probe-fail-threshold
20.338. probe-history
20.339. process-cpm-traffic-on-sap-down
20.340. profile
20.341. profile-capped
20.342. profile-out-preserve
20.343. profile-preferred
20.344. profiled-traffic-only
20.345. progress-indicator
20.346. prompt
20.347. propagate-admin-group
20.348. propagate-hold-time
20.349. propagate-mac-flush
20.350. propagate-mac-flush-from-bvpls
20.351. propagate-metric
20.352. propagate-pmtu-v4
20.353. propagate-pmtu-v6
20.354. propagate-topology-change
20.355. protect-bundle
20.356. protect-circuit
20.357. protect-path
20.358. protect-tp-path
20.359. protecting-nexthop-id
20.360. protection
20.361. protection-template
20.362. protection-type
20.363. protocol
20.364. protocol-configuration-options
20.365. protocol-list
20.366. protocol-port
20.367. protocol-protection
20.368. provider-tunnel
20.369. proxy
20.370. proxy-arp
20.371. proxy-arp-nd
20.372. proxy-arp-policy
20.373. proxy-authentication
20.374. proxy-lcp
20.375. proxy-nd
20.376. proxy-nd-policy
20.377. proxy-server
20.378. ps-information
20.379. psi-payload
20.380. psid-offset
20.381. psnp-authentication
20.382. ptp
20.383. ptp-asymmetry
20.384. ptp-hw-assist
20.385. ptp-tc
20.386. ptsf
20.387. public-key-authentication
20.388. public-key-min-bits
20.389. public-keys
20.390. public-tcp-mss-adjust
20.391. purge-timeout
20.392. purge-timer
20.393. push
20.394. pushed-labels
20.395. pw-cap-list
20.396. pw-path-id
20.397. pw-port
20.398. pw-port-list
20.399. pw-routing
20.400. pw-sap-secondary-shaper
20.401. pw-status-signaling
20.402. pw-template
20.403. pw-template-bind
20.404. pw-template-binding
20.405. pw-template-id-range
20.406. pw-type
20.407. pwc
20.408. pxc
20.409. pxc-pxc-id.sub-port-id
20.410. python
20.411. python-policy
20.412. python-policy-cache
20.413. python-script
21. q Commands
21.1. q-tag-range
21.2. qci
21.3. qinq
21.4. qinq-etype
21.5. qinq-mark-top-only
21.6. qinq-vlan-translation
21.7. ql-minimum
21.8. ql-override
21.9. ql-selection
21.10. qos
21.11. qos-marking-from-sap
21.12. qos-policy-id-range
21.13. qos-profile
21.14. qos-route-lookup
21.15. query-interval
21.16. query-last-listener-interval
21.17. query-last-member-interval
21.18. query-response-interval
21.19. query-src-ip
21.20. queue
21.21. queue-delay
21.22. queue-frame-based-accounting
21.23. queue-group
21.24. queue-group-egress
21.25. queue-group-ingress
21.26. queue-group-redirect-list
21.27. queue-group-templates
21.28. queue-instance-accounting
21.29. queue-override
21.30. queue-overrides
21.31. queue-parameters
21.32. queue-policy
21.33. queues
21.34. queues-hqos-manageable
21.35. quiet-period
21.36. quit
22. r Commands
22.1. radius
22.2. radius-accounting
22.3. radius-accounting-policy
22.4. radius-accounting-server
22.5. radius-attr
22.6. radius-auth-policy
22.7. radius-authentication
22.8. radius-authentication-policy
22.9. radius-authentication-server
22.10. radius-coa-port
22.11. radius-plcy
22.12. radius-proxy
22.13. radius-proxy-cache
22.14. radius-proxy-server
22.15. radius-script-policy
22.16. radius-server
22.17. radius-server-policy
22.18. radius-session-timeout
22.19. radius-user-name
22.20. rai
22.21. range
22.22. rapid-psc-timer
22.23. rapid-retransmit-time
22.24. rapid-retry-limit
22.25. rapid-update
22.26. rapid-withdrawal
22.27. rat-type
22.28. rate
22.29. rate-adjustment
22.30. rate-calc-min-int
22.31. rate-down
22.32. rate-limit
22.33. rate-modify
22.34. rate-monitor
22.35. rate-percentage
22.36. rate-percentage-stage2
22.37. rate-reduction
22.38. rate-thresholds
22.39. rating-group
22.40. raw
22.41. rd
22.42. rdi-alarms
22.43. rdnss-lifetime
22.44. re-auth-period
22.45. re-authentication
22.46. re-establish-session
22.47. reachable-time
22.48. reactivation-failure-threshold
22.49. reactivation-interval
22.50. reactivation-threshold
22.51. reactivation-timeout
22.52. read-algorithm
22.53. reassemble
22.54. reassembly
22.55. reassembly-group
22.56. reassembly-timeout
22.57. rebind-timer
22.58. reboot
22.59. receive
22.60. receive-interval
22.61. receive-msdp-msg-rate
22.62. receive-window-size
22.63. receiver
22.64. reclassify-using-qos
22.65. reconnect-timeout
22.66. record
22.67. record-label
22.68. record-stats
22.69. recovery
22.70. recovery-failed
22.71. recovery-max-session-lifetime
22.72. recovery-method
22.73. recovery-time
22.74. recovery-timer
22.75. red
22.76. red-alarm-threshold
22.77. red-differential-delay
22.78. red-source-list
22.79. redelegation-timer
22.80. redirect-https
22.81. redirect-policy
22.82. redirect-policy-binding
22.83. redirect-url
22.84. redirect-vprn
22.85. redirection
22.86. redirection-policy
22.87. redirects
22.88. redistribute-delay
22.89. redistribute-external
22.90. redo
22.91. reduced-prompt
22.92. redundancy
22.93. redundant-interface
22.94. redundant-mcast-capacity
22.95. redundant-multicast
22.96. ref-aa-specific-counter
22.97. ref-order
22.98. ref-override-counter
22.99. ref-policer
22.100. ref-queue
22.101. ref1
22.102. ref2
22.103. reference-bandwidth
22.104. reflect-pad
22.105. reflector
22.106. refresh-reduction
22.107. refresh-reduction-over-bypass
22.108. refresh-time
22.109. refresh-timer
22.110. register
22.111. registrant-sm
22.112. reinit-delay
22.113. reject-disabled-ncp
22.114. relative
22.115. relay
22.116. relay-plain-bootp
22.117. relay-proxy
22.118. relay-unsolicited-cfg-attribute
22.119. release-reason
22.120. release-timeout
22.121. reliable-delivery
22.122. reload
22.123. rem-router-id
22.124. remark
22.125. remarking
22.126. remote
22.127. remote-address
22.128. remote-age
22.129. remote-attachment-circuit
22.130. remote-ecid
22.131. remote-gateway-address
22.132. remote-id
22.133. remote-ip
22.134. remote-ip-address
22.135. remote-ip-range-start
22.136. remote-lfa
22.137. remote-loop-respond
22.138. remote-mac
22.139. remote-management
22.140. remote-max-checkpoints
22.141. remote-mepid
22.142. remote-name
22.143. remote-proxy-arp
22.144. remote-servers
22.145. remote-source
22.146. remote-v6-ip
22.147. remote-ve-name
22.148. remove-oldest
22.149. remove-private
22.150. renew-timer
22.151. renotify
22.152. renum
22.153. renumber
22.154. reorder-audio
22.155. repair
22.156. repeated-characters
22.157. replace
22.158. replace-result-code
22.159. replay-protection
22.160. replay-window
22.161. replay-window-size
22.162. replication-segment
22.163. replication-sid
22.164. replication-threshold
22.165. reply-on-padt
22.166. report-alarm
22.167. report-alarms
22.168. report-ip-address-event
22.169. report-local-routes
22.170. report-path-constraints
22.171. report-rate
22.172. report-src-ip
22.173. report-wlan-location
22.174. reporting
22.175. request
22.176. request-script-policy
22.177. request-timer
22.178. requests
22.179. required
22.180. rescue-location
22.181. reserved
22.182. reserved-label-block
22.183. reserved-lbl-block
22.184. reset-on-recoverable-error
22.185. reset-policy-exclusive
22.186. reset-query
22.187. reset-unknown-tcp
22.188. resignal-on-igp-event
22.189. resignal-on-igp-overload
22.190. resignal-timer
22.191. resolution
22.192. resolution-filter
22.193. resolve
22.194. resolve-root-using
22.195. resolve-static
22.196. responder-url
22.197. response-signing-cert
22.198. restart-backoff
22.199. restart-time
22.200. restore-disconnected
22.201. restrict-protected-src
22.202. restrict-unprotected-dst
22.203. restricted-to-home
22.204. results
22.205. resv
22.206. resv-cbs
22.207. resv-ret
22.208. resverr
22.209. resvtear
22.210. ret
22.211. ret-session-timeout
22.212. retail-service-id
22.213. retail-svc-id
22.214. retransmission-interval
22.215. retransmit-interval
22.216. retransmit-time
22.217. retries
22.218. retry
22.219. retry-count
22.220. retry-down
22.221. retry-interval
22.222. retry-limit
22.223. retry-on-igp-overload
22.224. retry-timeout
22.225. retry-timer
22.226. retry-up
22.227. reuse
22.228. reuse-ext-ip
22.229. reverse-path
22.230. revert
22.231. revert-members
22.232. revert-time
22.233. revert-timer
22.234. revertive
22.235. revertive-timer
22.236. revocation-check
22.237. rib-api
22.238. rib-api-getversion
22.239. rib-api-modify
22.240. rib-management
22.241. rib-priority
22.242. ring
22.243. ring-node
22.244. rip
22.245. rip-policy
22.246. ripng
22.247. rmon
22.248. roaming
22.249. robust-count
22.250. role
22.251. rollback
22.252. rollback-location
22.253. rollback-sync
22.254. rollover
22.255. root
22.256. root-address
22.257. root-and-leaf
22.258. root-guard
22.259. root-pool
22.260. root-tier
22.261. root-tree-id
22.262. round-robin-inactive-records
22.263. route
22.264. route index
22.265. route-admin-tag-policy
22.266. route-distinguisher
22.267. route-downloader
22.268. route-exists
22.269. route-limit
22.270. route-monitoring
22.271. route-next-hop
22.272. route-next-hop-policy
22.273. route-preference
22.274. route-recovery-wait
22.275. route-refresh
22.276. route-table
22.277. route-table-import
22.278. route-target
22.279. route-target-list
22.280. route-unknown
22.281. router
22.282. router-advertisement
22.283. router-advertisement-policy
22.284. router-advertisements
22.285. router-id
22.286. router-instance
22.287. router-lifetime
22.288. router-solicit
22.289. router-solicitation
22.290. router-target-as-number
22.291. router-unsolicited-na-flood-evpn
22.292. routing-type0
22.293. rp
22.294. rp-candidate
22.295. rp-set-peer
22.296. rpc-authorization
22.297. rpf-select
22.298. rpf-table
22.299. rpf6-table
22.300. rpfv
22.301. rpki-session
22.302. rpl-end
22.303. rpl-node
22.304. rr
22.305. rr-use-route-table
22.306. rs-fec-mode
22.307. rsa
22.308. rsa-key
22.309. rsa-signature
22.310. rsvp-auto
22.311. rsvp-resv-style
22.312. rsvp-shortcut
22.313. rsvp-te
22.314. rt-buffer-size
22.315. rt-client
22.316. rt-client-src-address
22.317. rt-payload-type
22.318. rt-rate
22.319. rt-server
22.320. rtm
22.321. rtm-debounce-time
22.322. rtp-header
22.323. rtp-performance
22.324. rtr-adv-lsa-limit
22.325. rtr-solicit-user-db
22.326. rtsp
22.327. rtt-threshold
22.328. rtt-threshold-rat
22.329. rtt-threshold-tolerance
22.330. rule-prefix
22.331. rx-discard-on-ndf
22.332. rx-eth-ed
22.333. rx-eth-vsm-grace
22.334. rx-los-reaction
22.335. rx-los-thresh
22.336. rx-must-be-encrypted
22.337. rx-update-pacing
22.338. rxdtv-adjust
23. s Commands
23.1. s-pmsi
23.2. s-tag
23.3. s-tag-range
23.4. s11
23.5. s2l-path
23.6. sa-db
23.7. sa-mac
23.8. sa-timeout
23.9. saa
23.10. saii-type2
23.11. same-recipnonce-for-pollreq
23.12. sample-interval
23.13. sample-multiplier
23.14. sample-profile
23.15. sample-rate
23.16. sample-window
23.17. sampling
23.18. sampling-rate
23.19. sap
23.20. sap-egress
23.21. sap-host-limit
23.22. sap-id
23.23. sap-ingress
23.24. sap-limit
23.25. sap-parameters
23.26. sap-session-index
23.27. sap-session-limit
23.28. sap-template
23.29. sap-template-binding
23.30. sat-type
23.31. satellite
23.32. save
23.33. save-deterministic-script
23.34. saved-ind-prompt
23.35. scaling-profile
23.36. sched-class
23.37. sched-class-elevation
23.38. sched-run-min-int
23.39. schedule
23.40. schedule-type
23.41. scheduler
23.42. scheduler-override
23.43. scheduler-parent
23.44. scheduler-policy
23.45. scheduler-stats
23.46. scheduling-class
23.47. schema-path
23.48. scope
23.49. scp
23.50. scramble
23.51. script
23.52. script-all-info
23.53. script-compile-error
23.54. script-control
23.55. script-export-variables
23.56. script-output
23.57. script-output-on-error
23.58. script-parameters-1
23.59. script-parameters-2
23.60. script-parameters-3
23.61. script-parameters-4
23.62. script-policy
23.63. script-runtime-error
23.64. script-url
23.65. scripts
23.66. scte30
23.67. scte35-action
23.68. sctp-filter
23.69. sctp-filter-stats
23.70. sd
23.71. sd-offset
23.72. sd-threshold
23.73. sd-threshold-clear
23.74. sdp
23.75. sdp-exclude
23.76. sdp-group
23.77. sdp-id-range
23.78. sdp-include
23.79. sdp-mtu
23.80. sdp-ping
23.81. seamless-bfd
23.82. search
23.83. secondary
23.84. secondary-config
23.85. secondary-dns
23.86. secondary-fast-retry-timer
23.87. secondary-image
23.88. secondary-ip-address
23.89. secondary-ipv6-address
23.90. secondary-location
23.91. secondary-nbns
23.92. secondary-path
23.93. secondary-ports
23.94. secondary-retry-limit
23.95. secondary-shaper-hashing
23.96. secondary-url
23.97. secret
23.98. section-trace
23.99. secure-nd
23.100. secure-nd-export
23.101. secure-nd-import
23.102. security
23.103. security-association
23.104. security-param-index
23.105. security-parameter
23.106. security-policy
23.107. seen-ip-radius-acct-policy
23.108. segment
23.109. segment-list
23.110. segment-protection-type
23.111. segment-routing
23.112. segment-routing-v6
23.113. sel-mcast-advertisement
23.114. selection-criteria
23.115. selective
23.116. selective-label-ipv4-install
23.117. selective-learned-fdb
23.118. send
23.119. send-accounting-response
23.120. send-acct-stop-on-fail
23.121. send-bvpls-evpn-flush
23.122. send-bvpls-flush
23.123. send-chain
23.124. send-count
23.125. send-default
23.126. send-fib-population-packets
23.127. send-flush-on-bvpls-failure
23.128. send-flush-on-failure
23.129. send-idr-after-eap-success
23.130. send-imet-ir-on-ndf
23.131. send-orf
23.132. send-queries
23.133. send-refresh
23.134. send-release
23.135. send-to-ebgp
23.136. send-tunnel-encap
23.137. sender-id
23.138. sensor-group
23.139. sensor-groups
23.140. sequence-group
23.141. serial-notify
23.142. serial-query
23.143. server
23.144. server-address
23.145. server-cipher-list
23.146. server-id
23.147. server-ip
23.148. server-kex-list
23.149. server-mac-list
23.150. server-policy
23.151. server-port
23.152. server-shutdown
23.153. server-timeout
23.154. server-tls-profile
23.155. server6
23.156. servers
23.157. service
23.158. service-carving
23.159. service-category
23.160. service-context-id
23.161. service-id
23.162. service-id-lag-hashing
23.163. service-id-range
23.164. service-mtu
23.165. service-name
23.166. service-prefix
23.167. service-range
23.168. services-all-events
23.169. serving-network
23.170. session
23.171. session-accounting
23.172. session-assign-method
23.173. session-filter
23.174. session-filter-stats
23.175. session-hold-time
23.176. session-id
23.177. session-id-format
23.178. session-key
23.179. session-limit
23.180. session-limits
23.181. session-messages
23.182. session-optimized-stop
23.183. session-parameters
23.184. session-time
23.185. session-timeout
23.186. set-time
23.187. set-tos
23.188. setup-role
23.189. setup-timeout
23.190. severity
23.191. severity-level
23.192. sf-offset
23.193. sf-sd-method
23.194. sf-threshold
23.195. sf-threshold-clear
23.196. sflow
23.197. sfm
23.198. sfm-loss-threshold
23.199. sfm-type
23.200. sg
23.201. sgsn-mcc-mnc
23.202. sgt-qos
23.203. shallow-inspection
23.204. sham-link
23.205. sham-neighbor
23.206. shape-multi-client-only
23.207. shaper
23.208. shaping
23.209. shared-circuit-id
23.210. shared-queue
23.211. shared-radius-filter-wmark
23.212. shared-resources
23.213. shcv-policy
23.214. shcv-policy-ipv4
23.215. shcv-policy-ipv6
23.216. shell
23.217. short-duration-flow-count
23.218. short-sequence
23.219. short-sequence-numbers
23.220. shortcut-local-ttl-propagate
23.221. shortcut-transit-ttl-propagate
23.222. shortcut-tunnel
23.223. show-ipsec-keys
23.224. show-request
23.225. shutdown
23.226. sid
23.227. sid-action
23.228. sid-allocation
23.229. sid-map
23.230. sid-protection
23.231. signal-label
23.232. signal-mode
23.233. signaled-vc-type-override
23.234. signaling
23.235. significant-change
23.236. single-fiber
23.237. single-mac
23.238. single-sfm-overload
23.239. single-sub-parameters
23.240. sip
23.241. site
23.242. site-activation-timer
23.243. site-id
23.244. site-min-down-timer
23.245. site-preference
23.246. size
23.247. size-limit
23.248. skip-gtp-ipv4-alloc
23.249. skip-ttl-decrement
23.250. sla-profile
23.251. sla-profile-map
23.252. sla-profile-string
23.253. slaac
23.254. slaac-prefix
23.255. sleep
23.256. slice-size
23.257. slm
23.258. slope-policy
23.259. slow-psc-timer
23.260. slow-queue-threshold
23.261. sm-tti
23.262. snap-oui
23.263. snap-pid
23.264. snmp
23.265. snmp-trap-group
23.266. snoop
23.267. snooping
23.268. sntp
23.269. socket
23.270. soft-quota-exhausted
23.271. soft-quota-exhausted-filter
23.272. software-repository
23.273. solicit-delay
23.274. solicited-release
23.275. sonet-sdh
23.276. source
23.277. source-address
23.278. source-address-range
23.279. source-bmac
23.280. source-bmac-lsb
23.281. source-class
23.282. source-destination-prefix
23.283. source-ip
23.284. source-ip-address-ranges
23.285. source-ip-origin
23.286. source-mac
23.287. source-override
23.288. source-port
23.289. source-prefix
23.290. source-prefix-list
23.291. source-udp-port
23.292. source-vtep-security
23.293. sp-reverse-route
23.294. space
23.295. spb
23.296. spbm-control-vpls
23.297. spe-address
23.298. speed
23.299. spf
23.300. spf-wait
23.301. spi
23.302. spi-load-balancing
23.303. spi-sharing-group-id
23.304. spi-sharing-id
23.305. split-horizon
23.306. split-horizon-group
23.307. spoke-sdp
23.308. spoke-sdp-fec
23.309. spt-switchover-threshold
23.310. squelch
23.311. squelch-ingress-ctag-levels
23.312. squelch-ingress-levels
23.313. sr-isis
23.314. sr-label-index
23.315. sr-labels
23.316. sr-maintenance-policy
23.317. sr-ospf
23.318. sr-ospf3
23.319. sr-policies
23.320. sr-policy
23.321. sr-policy-import
23.322. sr-te
23.323. sr-te-lsp
23.324. sr-te-resignal
23.325. src-access-list
23.326. src-gsn
23.327. src-host
23.328. src-ip
23.329. src-ip-address
23.330. src-ipv4-address
23.331. src-ipv6-address
23.332. src-mac
23.333. src-mac-address
23.334. src-port
23.335. src-prefix
23.336. src-route-option
23.337. src-tcp-port
23.338. src-udp-port
23.339. srefresh
23.340. srh-mode
23.341. srlb
23.342. srlg
23.343. srlg-database
23.344. srlg-enable
23.345. srlg-frr
23.346. srlg-group
23.347. srrp
23.348. srrp-enabled-routing
23.349. srrp-instance
23.350. srv6
23.351. srv6-instance
23.352. ssap
23.353. ssh
23.354. ssh-max-sessions
23.355. ssh-reply
23.356. ssm
23.357. ssm-assert-compatible-mode
23.358. ssm-bit
23.359. ssm-default-range-disable
23.360. ssm-groups
23.361. ssm-translate
23.362. stable-pool-sizing
23.363. stack
23.364. stack-capability-signaling
23.365. stale-routes-time
23.366. stale-time
23.367. standard-multi-instance
23.368. standby
23.369. standby-forwarding
23.370. standby-ip-lifetime
23.371. standby-mep-shutdown
23.372. standby-signaling
23.373. standby-signaling-master
23.374. standby-signaling-slave
23.375. starg
23.376. start
23.377. start-avg
23.378. start-entry
23.379. start-label
23.380. startup-wait-time
23.381. stat-mode
23.382. state
23.383. state-change
23.384. state-timer
23.385. stateful
23.386. stateless
23.387. stateless-aps-switchover
23.388. static
23.389. static-aa-sub
23.390. static-address
23.391. static-arp
23.392. static-cak
23.393. static-entry
23.394. static-function
23.395. static-host
23.396. static-host-mgmt
23.397. static-isid
23.398. static-label-range
23.399. static-lsp
23.400. static-lsp-fast-retry
23.401. static-mac
23.402. static-policer
23.403. static-policy
23.404. static-remote-aa-sub
23.405. static-route
23.406. static-route-entry
23.407. static-route-hold-down
23.408. static-sa
23.409. static-string
23.410. static-tunnel-redundant-next-hop
23.411. station
23.412. station-address
23.413. statistic
23.414. statistics
23.415. stats-collection
23.416. stats-report-interval
23.417. stats-type
23.418. status-verify
23.419. std-acct-attributes
23.420. std-port-class-pools
23.421. steering-profile
23.422. steering-route
23.423. sticky-dest
23.424. sticky-dr
23.425. sticky-ecmp
23.426. sticky-msaps
23.427. stp
23.428. stream-selection
23.429. streaming
23.430. strict
23.431. strict-adjacency-check
23.432. strict-lsa-checking
23.433. strict-mode
23.434. string
23.435. strings-from-option
23.436. strip-label
23.437. stub
23.438. sub-domain
23.439. sub-host-trk
23.440. sub-hosts-only
23.441. sub-id
23.442. sub-ident-policy
23.443. sub-insert-credit-control
23.444. sub-insert-radius
23.445. sub-insert-shared-pccrule
23.446. sub-insert-shared-radius
23.447. sub-insert-wmark
23.448. sub-mcac-policy
23.449. sub-mgmt
23.450. sub-mgmt-extensions
23.451. sub-port
23.452. sub-profile
23.453. sub-profile-map
23.454. sub-profile-string
23.455. sub-ring
23.456. sub-sla-mgmt
23.457. subject
23.458. subnet
23.459. subnet-check
23.460. subnet-mask
23.461. subrate
23.462. subscriber
23.463. subscriber-bw-limit
23.464. subscriber-data
23.465. subscriber-id
23.466. subscriber-identification
23.467. subscriber-interface
23.468. subscriber-limit
23.469. subscriber-mgmt
23.470. subscriber-prefix-length
23.471. subscriber-prefixes
23.472. subscriber-retention
23.473. subscriber-sap-id
23.474. subscription
23.475. subscription cancel-all
23.476. subtype
23.477. suggest-internal-objects
23.478. summaries
23.479. summary
23.480. summary-address
23.481. summary-crit
23.482. super-backbone
23.483. supplicant-timeout
23.484. supported-features
23.485. suppress
23.486. suppress-attached-bit
23.487. suppress-dn-bit
23.488. suppress-lo-alarm
23.489. suppress-lsn-events
23.490. suppress-lsn-sub-blks-free
23.491. suppress-standby-signaling
23.492. suppress-threshold
23.493. svc-id
23.494. svc-path
23.495. svc-ping
23.496. svlan-statistics
23.497. swap
23.498. sweep
23.499. switch-defined-cookie
23.500. switch-fabric
23.501. switching-mode
23.502. switching-type
23.503. switchover-exec
23.504. symbol-monitor
23.505. sync
23.506. sync-boot-env
23.507. sync-e
23.508. sync-if-timing
23.509. synce
23.510. synchronize
23.511. synchronous-execution
23.512. syslog
23.513. syslog-export-policy
23.514. system
23.515. system-base-mac
23.516. system-behavior
23.517. system-filter
23.518. system-id
23.519. system-ip-load-balancing
23.520. system-mac
23.521. system-priority
23.522. system-profile
23.523. system-reserve
24. t Commands
24.1. t2-paths
24.2. t391
24.3. t391dte
24.4. t392
24.5. t392dce
24.6. tab
24.7. table-size
24.8. tacplus
24.9. tacplus-map-to-priv-lvl
24.10. tag
24.11. tag-protocol-id
24.12. taii-type2
24.13. target-power
24.14. target-retry-wait
24.15. targeted-session
24.16. task-scheduling-int
24.17. tcp
24.18. tcp-ack
24.19. tcp-adv-func
24.20. tcp-client-reset
24.21. tcp-cwr
24.22. tcp-ece
24.23. tcp-established
24.24. tcp-fin
24.25. tcp-keepalive
24.26. tcp-mss
24.27. tcp-mss-adjust
24.28. tcp-ns
24.29. tcp-option-number
24.30. tcp-performance
24.31. tcp-psh
24.32. tcp-rst
24.33. tcp-session-parameters
24.34. tcp-syn
24.35. tcp-time-wait
24.36. tcp-transitory
24.37. tcp-urg
24.38. tcp-validate
24.39. tcp-validate-stats
24.40. tdcm
24.41. tdm
24.42. tdm-sat
24.43. te
24.44. te-class
24.45. te-down-threshold
24.46. te-link
24.47. te-metric
24.48. te-threshold-update
24.49. te-up-threshold
24.50. tech-support
24.51. tei-set
24.52. teid-load-balancing
24.53. telemetry
24.54. telemetry-data
24.55. telnet
24.56. telnet-max-sessions
24.57. telnet-reply
24.58. telnet-server
24.59. telnet6-server
24.60. temp-flooding
24.61. template
24.62. template-format
24.63. template-refresh-timeout
24.64. template-retransmit
24.65. template-set
24.66. terminal
24.67. terminate
24.68. termination-fpe
24.69. tertiary
24.70. tertiary-config
24.71. tertiary-dns
24.72. tertiary-image
24.73. tertiary-ip-address
24.74. tertiary-ipv6-address
24.75. tertiary-location
24.76. tertiary-url
24.77. test
24.78. test-account
24.79. test-completion-enable
24.80. test-duration
24.81. test-fail-enable
24.82. test-fail-threshold
24.83. test-link
24.84. test-oam
24.85. test-pattern
24.86. test-pattern-procedure
24.87. tethering-detection
24.88. tethering-summary
24.89. third-party
24.90. third-party-nexthop
24.91. three-way-hello
24.92. threshold
24.93. threshold-crossing-alert
24.94. thresholds
24.95. throttle-rate
24.96. throughput-alarm
24.97. ti-lfa
24.98. tier
24.99. time
24.100. time-average-factor
24.101. time-display
24.102. time-exceeded
24.103. time-format
24.104. time-limit
24.105. time-range
24.106. time-stamp
24.107. timeout
24.108. timeout-action
24.109. timeouts
24.110. timers
24.111. timeslots
24.112. timestamp
24.113. timestamp-format
24.114. timing
24.115. tls
24.116. tls-client-profile
24.117. tls-extension
24.118. tls-profile
24.119. tls-re-negotiate-timer
24.120. tls-server-profile
24.121. to
24.122. to cli
24.123. to console
24.124. to file
24.125. to memory
24.126. to netconf
24.127. to session
24.128. to snmp
24.129. to syslog
24.130. to-aa-sub-counters
24.131. to-client-options
24.132. to-sap
24.133. to-server-options
24.134. to-subscriber
24.135. tod-override
24.136. tolerance
24.137. tos-marking-state
24.138. total
24.139. total-capacity
24.140. total-flow-duration
24.141. total-flows-completed-count
24.142. tp-lsp-egress-stats
24.143. tp-lsp-ingress-stats
24.144. tp-tunnel-id-range
24.145. trace
24.146. trace-profile
24.147. trace-string
24.148. traceroute
24.149. traceroute-reply
24.150. track-accounting
24.151. track-authentication
24.152. track-delete-hold-time
24.153. track-mobility
24.154. track-password-change
24.155. track-srrp
24.156. track-srrp-instances
24.157. tracking-support
24.158. traffic
24.159. traffic-capture
24.160. traffic-class
24.161. traffic-desc
24.162. traffic-direction
24.163. traffic-engineering
24.164. traffic-engineering-options
24.165. traffic-rate-delta
24.166. traffic-type
24.167. transaction-timer
24.168. transceiver
24.169. transform
24.170. transit
24.171. transit-auto-create
24.172. transit-delay
24.173. transit-ip-policy
24.174. transit-path
24.175. transit-policy
24.176. transit-prefix-ipv4-entries
24.177. transit-prefix-ipv4-remote-entries
24.178. transit-prefix-ipv6-entries
24.179. transit-prefix-ipv6-remote-entries
24.180. transit-prefix-policy
24.181. transmission-profile
24.182. transmit-interval
24.183. transmit-period
24.184. transport
24.185. transport-address
24.186. transport-encryption
24.187. transport-tunnel
24.188. transport-type
24.189. trap-gen
24.190. trap-target
24.191. tree
24.192. trigger
24.193. trigger-alarm-msg
24.194. trigger-entry
24.195. trigger-fault
24.196. trigger-packet
24.197. triggered-policy
24.198. triggered-updates
24.199. trust-anchor
24.200. trust-anchor-profile
24.201. trusted
24.202. ts-list
24.203. ts-location
24.204. ts-negotiation
24.205. ts-sync-loss
24.206. ttl
24.207. ttl-expired
24.208. ttl-propagate
24.209. ttl-security
24.210. tunnel
24.211. tunnel-client-attrs
24.212. tunnel-dot1q
24.213. tunnel-down-damp-time
24.214. tunnel-encaps
24.215. tunnel-endpoint
24.216. tunnel-endpoint-id
24.217. tunnel-far-end
24.218. tunnel-fault
24.219. tunnel-group
24.220. tunnel-id
24.221. tunnel-interface
24.222. tunnel-local-address
24.223. tunnel-mtu
24.224. tunnel-nearest-bridge
24.225. tunnel-next-hop
24.226. tunnel-port-policy
24.227. tunnel-qinq
24.228. tunnel-query
24.229. tunnel-remote-address
24.230. tunnel-resource-limit
24.231. tunnel-router
24.232. tunnel-selection-blacklist
24.233. tunnel-server-attrs
24.234. tunnel-session-limit
24.235. tunnel-source-ip
24.236. tunnel-table
24.237. tunnel-table-pref
24.238. tunnel-template
24.239. tunnel-termination
24.240. tunnel-type
24.241. tunneling
24.242. twamp
24.243. twamp-light
24.244. two-way-delay-test
24.245. two-way-slm-test
24.246. tx
24.247. tx-credit-max
24.248. tx-dus
24.249. tx-eth-ed
24.250. tx-eth-vsm-grace
24.251. tx-hold-multiplier
24.252. tx-interval
24.253. tx-mgmt-address
24.254. tx-timer
24.255. tx-tlvs
24.256. type
24.257. type-multi-line
25. u Commands
25.1. udp
25.2. udp-dns
25.3. udp-dst
25.4. udp-dst-port
25.5. udp-inbound-refresh
25.6. udp-initial
25.7. udp-port
25.8. udp-return-object
25.9. udp-src
25.10. ue
25.11. ue-creation-type
25.12. ue-query
25.13. ue-state
25.14. uli
25.15. umh-pe
25.16. umh-pe-backup
25.17. umh-rate-monitoring
25.18. umh-selection
25.19. unavailability-event
25.20. uncoloured-octets-offered-count
25.21. uncoloured-packets-offered-count
25.22. uncommitted-changes-indicator
25.23. unconstrained-bw
25.24. unconsumed-agg-rate
25.25. unconsumed-higher-tier-rate
25.26. underflow-limit
25.27. undet-availability-event
25.28. undet-unavailability-event
25.29. undo
25.30. uni
25.31. unicast-address
25.32. unicast-import-disable
25.33. unicast-rt-test
25.34. unidirectional-measurement
25.35. unique-sid-per-sap
25.36. unknown-arp-request-flood-evpn
25.37. unknown-mac-route
25.38. unknown-message-rate
25.39. unknown-ns-flood-evpn
25.40. unknown-policer
25.41. unknown-protocol
25.42. unknown-protocols
25.43. unknown-queue
25.44. unnumbered
25.45. unreachables
25.46. untrusted
25.47. unzip
25.48. up
25.49. up-count
25.50. up-link
25.51. up-nat-policy
25.52. up-threshold
25.53. update
25.54. update-fault-tolerance
25.55. update-interval
25.56. update-interval-jitter
25.57. update-timer
25.58. updated-error-handling
25.59. updates
25.60. upgrade
25.61. uplink
25.62. uplink-initial-wait
25.63. upnp
25.64. upnp-mappings
25.65. upnp-policy
25.66. upstream-ip-filter
25.67. upstream-ipv6-filter
25.68. url
25.69. url-entry
25.70. url-filter
25.71. url-list
25.72. urpf-check
25.73. urpf-selected-vprns
25.74. usage-monitoring
25.75. use-arp
25.76. use-bgp-routes
25.77. use-broadcast-address
25.78. use-broadcast-mac
25.79. use-def-mcast
25.80. use-default-template
25.81. use-direct-map-as-default
25.82. use-es-bmac
25.83. use-gi-address
25.84. use-ingress-l2tp-dscp
25.85. use-lag-port-weight
25.86. use-last-adj-bw
25.87. use-link-address
25.88. use-outside-ip-address
25.89. use-pool-from-client
25.90. use-sap-bmac
25.91. use-sdp-bmac
25.92. use-virtual-mac
25.93. use-vrtr-if-index
25.94. user
25.95. user-db
25.96. user-equipment-info
25.97. user-ident
25.98. user-location-info
25.99. user-name
25.100. user-name-format
25.101. user-name-operation
25.102. user-srlg-db
25.103. user-template
25.104. username
25.105. usm-community
25.106. util-stats-interval
26. v Commands
26.1. v4-routed-override-filter
26.2. v6-aggregate-stats
26.3. v6-frag-header
26.4. v6-routed-override-filter
26.5. valid-lifetime
26.6. validate
26.7. validate-dest-prefix
26.8. validate-gtp-tunnels
26.9. validate-next-hop
26.10. validate-redirect-ip
26.11. validate-sequence-number
26.12. validate-source-ip-addr
26.13. validate-src-ip-addr
26.14. validity-time
26.15. value
26.16. vas-filter
26.17. vas-if-type
26.18. vc-id
26.19. vc-id-range
26.20. vc-label
26.21. vc-range
26.22. vc-threshold
26.23. vc-type
26.24. vccv-ping
26.25. vccv-trace
26.26. ve-id
26.27. ve-name
26.28. vendor-id
26.29. vendor-specific-option
26.30. vendor-support
26.31. version
26.32. vi
26.33. vid-pid-absent
26.34. video
26.35. video-group
26.36. video-interface
26.37. video-policy
26.38. video-sap
26.39. video-template
26.40. view
26.41. virtual-chassis-identifier
26.42. virtual-link
26.43. virtual-neighbor
26.44. virtual-scheduler-adjustment
26.45. virtual-subnet
26.46. vlan
26.47. vlan-id
26.48. vlan-mismatch-timeout
26.49. vlan-range
26.50. vlan-tag-ranges
26.51. vlan-translation
26.52. vlan-vc-etype
26.53. vlan-vc-tag
26.54. vm
26.55. vm-traffic-distribution-by-ip
26.56. vm-traffic-distribution-by-teid
26.57. vm-type
26.58. vmep-filter
26.59. voice-template
26.60. volume
26.61. volume-quota-direction
26.62. volume-stats-type
26.63. vpi
26.64. vpls
26.65. vpls-group
26.66. vpls-id
26.67. vpls-only-sap-parameters
26.68. vpls-sap-template
26.69. vpls-template
26.70. vpls-template-binding
26.71. vpn-apply-export
26.72. vpn-apply-import
26.73. vpn-domain
26.74. vpn-family-policy
26.75. vpn-gre-source-ip
26.76. vpn-ipv4
26.77. vpn-ipv6
26.78. vpn-tag
26.79. vport
26.80. vport-hashing
26.81. vprn
26.82. vprn-auto-bind
26.83. vprn-local
26.84. vprn-network-exceptions
26.85. vprn-ping
26.86. vprn-trace
26.87. vprn-transit
26.88. vrf-export
26.89. vrf-import
26.90. vrf-target
26.91. vrgw
26.92. vrrp
26.93. vsd
26.94. vsd-domain
26.95. vsd-password
26.96. vsi-export
26.97. vsi-id
26.98. vsi-import
26.99. vxlan
26.100. vxlan-ipv4-tep-ecmp
26.101. vxlan-ping
26.102. vxlan-port
26.103. vxlan-src-vtep
26.104. vxlan-termination
26.105. vxlan-vni
26.106. vxlan-vtep-range
27. w Commands
27.1. wa-shared-high-wmark
27.2. wa-shared-low-wmark
27.3. wait
27.4. wait-for-up-timer
27.5. wait-to-restore
27.6. wap1x
27.7. warm-standby
27.8. warnings
27.9. watchdog-timer
27.10. watermark
27.11. watermarks
27.12. wavetracker
27.13. web-service
27.14. web-service-url-filter
27.15. weekday
27.16. weight
27.17. weight-down
27.18. weight-threshold
27.19. weighted-ecmp
27.20. wide-metrics-only
27.21. width
27.22. wifi-num-attached-ues
27.23. wifi-rssi
27.24. wifi-ssid-vlan
27.25. wildcard-spmsi
27.26. window
27.27. window-integrity
27.28. window-size
27.29. wlan-gw
27.30. wlan-gw-group
27.31. working-bundle
27.32. working-circuit
27.33. working-path
27.34. working-tp-path
27.35. wpp
27.36. wrap-around
27.37. wred-queue
27.38. wred-queue-control
27.39. writable-running
27.40. write
27.41. write-algorithm
27.42. wrr-group
27.43. wtr-annexb
28. x Commands
28.1. x-interfaces
28.2. x1
28.3. x2
28.4. x3
28.5. xc
28.6. xcon
28.7. xconnect
28.8. xconnect-tunnel-home-address
28.9. xconnect-tunnel-local-ipv6-address
28.10. xconnect-tunnel-remote-ipv6-address
28.11. xconnect-tunnel-service
28.12. xconnect-tunnel-type
28.13. xgig
28.14. xiom
28.15. xiom-type
28.16. xmpp
29. y Commands
29.1. yang-modules
29.2. yellow-differential-delay
30. z Commands
30.1. zone
30.2. zone-channel
Customer Document and Product Support
Clear, Show, and Tools CLI Command Reference Guide 21.7.R1
1. Getting Started
1.1. Command Tree
1.2. Command Descriptions
1.3. Navigational Aids
1.3.1. Context Path
1.3.2. Searching
1.3.3. Linking to the Tree
2. Command Trees
2.1. clear Commands
2.2. show Commands
2.3. tools Commands
3. a Commands
3.1. aa-anl-list
3.2. aa-interface
3.3. aa-sub
3.4. aa-sub-list
3.5. aa-sub-search
3.6. aa-sub-study
3.7. aa-sub-using
3.8. aaa
3.9. aarp
3.10. abort-startup-wait
3.11. access-group
3.12. accounting-policy
3.13. accounting-records
3.14. acct-off
3.15. acct-on
3.16. acct-on-off-group
3.17. accu-stats
3.18. accu-stats-policy
3.19. accu-stats-subscribers
3.20. activate-best-dest
3.21. activate-primary-action
3.22. active
3.23. active-subscribers
3.24. adi
3.25. adi-session
3.26. adjacency
3.27. adjust-autobandwidth
3.28. admin
3.29. admin-group
3.30. admin-lock
3.31. admit-deny-stats
3.32. adv-config-policy
3.33. agg-rate
3.34. aggregate
3.35. alarm-contact-input
3.36. alarms
3.37. ale-adjust
3.38. all
3.39. all-subscriptions
3.40. ancp
3.41. ancp ancp-sub-string
3.42. ancp-policy
3.43. ancp-string
3.44. anycast
3.45. app-filter
3.46. app-group
3.47. app-profile
3.48. app-qos-policy
3.49. app-service-option
3.50. application
3.51. application-assurance
3.52. application-assurance-group
3.53. applications
3.54. aps
3.55. arbiter-stats
3.56. area
3.57. arp
3.58. arp-host
3.59. arp-table
3.60. association
3.61. associations
3.62. atm
3.63. atm-td-profile
3.64. auth-keychain
3.65. authentication
3.66. authentication-origin
3.67. authentication-server-check
3.68. auto-boot
3.69. auto-discovered-meps
3.70. auto-lsp
3.71. auto-node-provisioning
3.72. autoconfigure
3.73. avp-match-learned-session-id
4. b Commands
4.1. bandwidth-policy
4.2. base
4.3. bcg
4.4. bd
4.5. bfd
4.6. bfd-template
4.7. bfd-templates-in-use
4.8. bgp
4.9. bgp-auto-rd
4.10. bgp-evpn
4.11. bgp-evpn-multi-homing
4.12. bgp-route-distinguisher
4.13. bgp-vpws
4.14. bier
4.15. bin-group
4.16. bin-group-using
4.17. binding-label
4.18. bindings
4.19. bluetooth
4.20. bmp
4.21. bof
4.22. bonding
4.23. boot-messages
4.24. brg
4.25. brg-hosts
4.26. brg-profile
4.27. bundles
4.28. bypass-tunnel
5. c Commands
5.1. ca-profile
5.2. cache
5.3. calculate-maps
5.4. call-trace
5.5. cam-utilization
5.6. candidate
5.7. capabilities
5.8. capture-sap
5.9. card
5.10. card-status
5.11. category-map
5.12. category-set-id
5.13. ccrt-replay
5.14. cem
5.15. cert-profile
5.16. certificate
5.17. cflowd
5.18. cfm-stack-table
5.19. channel
5.20. charging-group
5.21. chassis
5.22. check-bp-eprom
5.23. class-forwarding-policy
5.24. clear
5.25. clear-arp
5.26. clear-force
5.27. clear-lockout-annexb
5.28. clear-mac
5.29. clear-neighbor
5.30. clear-quarantine
5.31. cli-session-group
5.32. client
5.33. client-db
5.34. client-tls-profile
5.35. coa
5.36. coherent
5.37. collect-lmm-fc-stats
5.38. collect-lmm-stats
5.39. collector
5.40. command-list
5.41. community
5.42. completed
5.43. configuration-mode
5.44. configuration-sessions
5.45. connection
5.46. connection-profile
5.47. connection-profile-vlan
5.48. connections
5.49. connectivity-association
5.50. control-channel
5.51. convergence
5.52. count
5.53. counters
5.54. cpm
5.55. cpm-filter
5.56. cpm-http-redirect
5.57. cpm-queue
5.58. cpr-wndw-sz-srch-info
5.59. cpu
5.60. cpu-protection
5.61. cpu-usage
5.62. create-sticky-lease
5.63. credit-control
5.64. credit-reset
5.65. cron
5.66. crp
5.67. cspf
5.68. custom-protocol
5.69. customer
6. d Commands
6.1. damping
6.2. data-bearer
6.3. data-trigger
6.4. data-triggers
6.5. database
6.6. datapath
6.7. datastore-locks
6.8. debounce
6.9. debug
6.10. debug-packet
6.11. declined-addresses
6.12. default-domain
6.13. delay-template
6.14. delay-template-using
6.15. dest-tracking
6.16. detail
6.17. detected-protocols
6.18. deterministic
6.19. dhcp
6.20. dhcp-rx-stats
6.21. dhcp6
6.22. diameter
6.23. diameter-application-policy
6.24. diameter-node
6.25. diameter-peer-policy
6.26. diameter-session
6.27. direct-export
6.28. discovery
6.29. dist-cpu-protection
6.30. dns
6.31. dns-ip-cache
6.32. domain
6.33. domain-to-vsd-mapping
6.34. downgrade
6.35. drain
6.36. dscp
6.37. dscp-map
6.38. dscp-table
6.39. dump
6.40. dwdm
6.41. dynamic-blocks
6.42. dynamic-resolve
6.43. dynamic-services
6.44. dynamic-services command-list
6.45. dynamic-services-policy
7. e Commands
7.1. ecmp
7.2. edit-ipoe-session
7.3. edit-lease-state
7.4. edit-ppp-session
7.5. edit-slaac-host
7.6. efm-oam
7.7. egress-label
7.8. egress-pbr
7.9. egress-statistics
7.10. elmi
7.11. encryption-keygroup
7.12. endpoint
7.13. entry
7.14. epipe
7.15. epipe-map-access-to-egress-port
7.16. error-codes
7.17. error-counters
7.18. errors
7.19. es-bmac
7.20. es-pbr
7.21. esa
7.22. esa-vm
7.23. esi
7.24. eth
7.25. eth-cfm
7.26. eth-cfm-monitoring
7.27. eth-ring
7.28. eth-sat
7.29. eth-tunnel
7.30. ethernet
7.31. ethernet-segment
7.32. etree
7.33. eval-group-interface-template
7.34. eval-ipoe-session
7.35. eval-lease-state
7.36. eval-msap
7.37. eval-ppp-session
7.38. eval-rates
7.39. eval-sap-template
7.40. eval-slaac-host
7.41. evaluate-script
7.42. evc
7.43. event-control
7.44. event-handling
7.45. event-log
7.46. event-parameters
7.47. evpn
7.48. evpn mac-dup-detect
7.49. evpn usage
7.50. evpn-mpls
7.51. evpn-proxy-db
7.52. excessive-sources
7.53. exercise
7.54. expand-wildcard-path
7.55. explicit-subscriber-map
7.56. export
7.57. extranet-interface
8. f Commands
8.1. failover
8.2. failover-pool-stats
8.3. failover-server-stats
8.4. failure-recovery
8.5. fate-sharing
8.6. fd-domain-sync
8.7. fdb
8.8. fdb-info
8.9. fdb-mac
8.10. fdb-usage
8.11. fec
8.12. fec-egress-stats
8.13. fec-originate
8.14. fib
8.15. fib-telemetry
8.16. fid
8.17. field
8.18. fields
8.19. file
8.20. file-id
8.21. files
8.22. filter
8.23. filter-id
8.24. firewall
8.25. firewall-hosts
8.26. firewall-policy
8.27. flap-statistics
8.28. flex-algo
8.29. flexible-algorithm-definitions
8.30. flood-table
8.31. flow-attribute
8.32. flow-record-search
8.33. force
8.34. force-partner-down
8.35. force-switch-path
8.36. force-switchover
8.37. force-uplink-switch
8.38. forced-single-sfm-overload
8.39. forcerenew
8.40. forwarding
8.41. forwarding-policies
8.42. forwarding-policy
8.43. forwarding-table
8.44. fp
8.45. fp-resource-policy
8.46. fp-tunnel-table
8.47. frag-stats
8.48. frame-relay
8.49. free-addresses
8.50. ftn
8.51. fwd-path-ext
9. g Commands
9.1. gateway
9.2. gateways
9.3. global
9.4. gmpls
9.5. gmpls-tun-grp
9.6. gre-tunnel-template
9.7. group
9.8. group-encryption
9.9. group-interface
9.10. groups
9.11. grpc
9.12. grt-lookup
9.13. gsmp
9.14. gtm
9.15. gtp
9.16. gtp session
9.17. gtp statistics
9.18. gtp-session
9.19. gtp-statistics
10. h Commands
10.1. handler
10.2. hierarchy
10.3. histogram
10.4. host
10.5. host-connectivity-verify
10.6. host-lockout-policy
10.7. host-lookup
10.8. host-tracking
10.9. hostname
10.10. hosts
10.11. hs-attachment-policy
10.12. hs-pool-policy
10.13. hs-pools
10.14. hs-port-pool-policy
10.15. hs-scheduler-hierarchy
10.16. hs-scheduler-policy
10.17. http-client
10.18. http-enrich
10.19. http-error-redirect
10.20. http-host-recorder detail
10.21. http-host-recorder status
10.22. http-host-recorder top
10.23. http-notification
10.24. http-redirect
11. i Commands
11.1. i-vpls
11.2. icmp
11.3. icmp-redirect-route
11.4. icmp-stats
11.5. icmp6
11.6. icmp6-redirect-route
11.7. id
11.8. idle-only-msap
11.9. if-attribute
11.10. if-policy
11.11. igmp
11.12. igmp-policy
11.13. igmp-snooping
11.14. ignore-sap-port-state
11.15. ike-exchange-failure-rate
11.16. ike-initiate
11.17. ike-policy
11.18. ike-stats
11.19. ike-transform
11.20. ikev2-msg-drop
11.21. ilm
11.22. ima
11.23. inactive-peers
11.24. inband-tunnel
11.25. information
11.26. ingress-label
11.27. ingress-statistics
11.28. ingress-stats
11.29. ingress-stats-template
11.30. instance
11.31. inter-as-label
11.32. inter-chassis
11.33. interface
11.34. interface-group-handler
11.35. interface-id-mapping
11.36. iom
11.37. ip
11.38. ip-exception
11.39. ip-filter
11.40. ip-prefix-list
11.41. ip-tunnel-stats
11.42. ipoe
11.43. ipoe-session
11.44. ipoe-session-policy
11.45. ipsec
11.46. ipsec-interface
11.47. ipsec-stats
11.48. ipv4
11.49. ipv6
11.50. ipv6-exception
11.51. ipv6-filter
11.52. ipv6-prefix-list
11.53. isa
11.54. isa-filter
11.55. isa-policer
11.56. isa-radius-policy
11.57. isa-service-chaining
11.58. isa-subnets
11.59. isid-route-target
11.60. isid-using
11.61. isis
11.62. issu-post-process
12. k Commands
12.1. keychain
13. l Commands
13.1. l2-aware
13.2. l2-aware-blocks
13.3. l2-aware-hosts
13.4. l2-aware-subscribers
13.5. l2-route-table
13.6. l2-services
13.7. l2pt
13.8. l2tp
13.9. label
13.10. label-ipv4
13.11. label-ipv6
13.12. label-range
13.13. label-type
13.14. labels
13.15. lag
13.16. lanext
13.17. lbm-svc-act-responder
13.18. ldp
13.19. ldp fec-egress-statistics
13.20. ldp-sync-exit
13.21. ldp-treetrace
13.22. learned-remote-mac
13.23. lease-state
13.24. leases
13.25. lfa-coverage
13.26. li
13.27. li-ip
13.28. li-ipv6
13.29. li-mac
13.30. li-source
13.31. license
13.32. licensing
13.33. link-check
13.34. link-group-member-status
13.35. link-group-status
13.36. lldp
13.37. lmp
13.38. lns-group
13.39. load-balance
13.40. load-balancing-alg
13.41. local-bfd-discrim
13.42. local-dhcp-db
13.43. local-dhcp-server
13.44. local-tx-pdu
13.45. local-user-db
13.46. lockout
13.47. lockout-annexb
13.48. log
13.49. log-collector
13.50. log-id
13.51. logger-event-bundling
13.52. loopback
13.53. lsn
13.54. lsn-blocks
13.55. lsp
13.56. lsp-autobandwidth
13.57. lsp-bfd
13.58. lsp-db
13.59. lsp-egress-stats
13.60. lsp-ingress-stats
13.61. lsp-ldp
13.62. lsp-rsvp
13.63. lsp-self-ping
13.64. lsp-template
13.65. lspinfo
14. m Commands
14.1. mac
14.2. mac-filter
14.3. mac-list
14.4. mac-move
14.5. mac-protect
14.6. mac-status
14.7. mac-table
14.8. macsec
14.9. managed-hosts
14.10. management-access-filter
14.11. management-interface
14.12. manager
14.13. manual
14.14. manual-export
14.15. manual-switch-path
14.16. map
14.17. map-domain
14.18. map-to-phy-port
14.19. mapping-server
14.20. mappings
14.21. match-criteria-overload
14.22. match-list
14.23. mc-ecmp-balance
14.24. mc-ecmp-rebalance
14.25. mc-endpoint
14.26. mc-fr-profile-egress
14.27. mc-fr-profile-ingress
14.28. mc-ipsec
14.29. mc-lag
14.30. mc-ring
14.31. mcac
14.32. mcast-management
14.33. mcast-path-mgr cpm
14.34. mcast-reporting-dest
14.35. mcast-reporting-statistics
14.36. mcast-umh-red
14.37. md-auto-id
14.38. mda
14.39. measurement-template
14.40. measurement-template-using
14.41. megapools
14.42. member
14.43. memory-allocation-failure-rate
14.44. memory-pools
14.45. memory-usage
14.46. mep
14.47. mep domain
14.48. mesh-sdp
14.49. mfib
14.50. mgmt-ethernet
14.51. mgw-address-cache
14.52. migration
14.53. mip
14.54. mip-instantiation
14.55. mirror
14.56. mirror-dest
14.57. mka-session
14.58. mld
14.59. mld-snooping
14.60. mlppp
14.61. mmrp
14.62. module
14.63. mpls
14.64. mpls-labels
14.65. mpls-tp
14.66. mrouters
14.67. mrp
14.68. mrp-policy
14.69. msap
14.70. msap-policy
14.71. msdp
14.72. mstp-configuration
14.73. multi-chassis
14.74. multicast-info-policy
14.75. multilink-bundle
14.76. mvpn
14.77. mvpn-list
14.78. mvr
15. n Commands
15.1. nat
15.2. nat-accounting-policy
15.3. nat-group
15.4. nat-policy
15.5. neighbor
15.6. neighbor-table
15.7. neighbors
15.8. netconf
15.9. network
15.10. network-domains
15.11. network-queue
15.12. next-hop
15.13. next-hop-id
15.14. ntp
15.15. number-of-tunnels
16. o Commands
16.1. oam-config-summary
16.2. oam-perf
16.3. oam-pm
16.4. oam-template
16.5. ocsp-cache
16.6. of-switch
16.7. on-change-paths
16.8. opaque-database
16.9. open-flow
16.10. oper-group
16.11. optimal-route-reflection
16.12. origin-validation
16.13. ospf
16.14. ospf3
16.15. overload
17. p Commands
17.1. p2mp
17.2. p2mp-candidate-path
17.3. p2mp-info
17.4. p2mp-lsp
17.5. p2mp-policy
17.6. p2mp-sr-tree
17.7. packet-size
17.8. parameters
17.9. partition
17.10. password-options
17.11. path
17.12. path-request
17.13. paths
17.14. pattern-match
17.15. pbb base
17.16. pbb mac-name
17.17. pbr-steering
17.18. pcap
17.19. pcc
17.20. pcc-rule
17.21. pcep
17.22. pcm
17.23. pcp-server
17.24. pcp-server-policy
17.25. pcs
17.26. peakvalue-stats
17.27. peer
17.28. peer-profile
17.29. peer-profile-map
17.30. peers
17.31. peq
17.32. per-peer-queuing
17.33. perform
17.34. performance
17.35. persistence
17.36. persistent
17.37. pfcp
17.38. pfcp-association
17.39. pfcp-session
17.40. pim
17.41. pim-snooping
17.42. ping-template
17.43. ping-template-sync
17.44. ping-template-using
17.45. pip
17.46. plr
17.47. policer
17.48. policer-hierarchy
17.49. policers
17.50. policy
17.51. policy-edits
17.52. policy-test
17.53. pool
17.54. pool-ext-stats
17.55. pool-stats
17.56. pool-threshold-stats
17.57. pools
17.58. port
17.59. port-connection
17.60. port-db
17.61. port-forwarding-action
17.62. port-forwarding-entries
17.63. port-list
17.64. port-map
17.65. port-recorder detail
17.66. port-recorder status
17.67. port-recorder top
17.68. port-scheduler-policy
17.69. port-topology
17.70. port-tree
17.71. port-xc
17.72. post-policer-mapping
17.73. power-management
17.74. power-module
17.75. power-shelf
17.76. ppp
17.77. ppp-policy
17.78. pppoe
17.79. pppoe-client
17.80. prefix-ext-stats
17.81. prefix-label
17.82. prefix-sids
17.83. prefix-stats
17.84. prefix-threshold-stats
17.85. prefixes
17.86. profile
17.87. protection-template
17.88. protocol
17.89. protocol-list
17.90. protocol-protection
17.91. provider-tunnel
17.92. provider-tunnel-using
17.93. provider-tunnels
17.94. proxy-arp
17.95. proxy-arp-nd
17.96. proxy-db
17.97. proxy-nd
17.98. psb
17.99. ptp
17.100. pvc
17.101. pvp
17.102. pvt
17.103. pw
17.104. pw-port
17.105. pw-port-list
17.106. pw-sap-using
17.107. pw-template
17.108. python
17.109. python-policy
17.110. python-script
17.111. python-script protect
17.112. python-script reload
18. q Commands
18.1. qos
18.2. quarantine
18.3. querier
18.4. query-results
18.5. queue
18.6. queue-depth
18.7. queue-depth-violations
18.8. queue-group
18.9. queue-group-redirect-list
19. r Commands
19.1. radius
19.2. radius-accounting
19.3. radius-accounting-policy
19.4. radius-acct
19.5. radius-acct-terminate-cause
19.6. radius-attr-username
19.7. radius-authentication-policy
19.8. radius-configuration
19.9. radius-proxy-server
19.10. radius-server-policy
19.11. range
19.12. recover-l2aw-bypass
19.13. redirect-policy
19.14. redirect-policy-binding
19.15. redundancy
19.16. reflectors
19.17. refresh-lsas
19.18. relations
19.19. release-hold-down
19.20. remap-lease-state
19.21. remote-bfd-discrim
19.22. remote-management
19.23. replication-segment
19.24. request
19.25. requirements
19.26. reset
19.27. resignal
19.28. resignal-bypass
19.29. resource-failures
19.30. resource-usage
19.31. resources
19.32. restart
19.33. retailers
19.34. revert
19.35. rib-api
19.36. ring
19.37. ring-node
19.38. ring-nodes
19.39. rip
19.40. ripng
19.41. rollback
19.42. root-objects
19.43. route
19.44. route-downloader
19.45. route-next-hop-policy
19.46. route-table
19.47. router
19.48. router-advertisement
19.49. routes
19.50. routing
19.51. rp
19.52. rp-hash
19.53. rpki-session
19.54. rs-fec
19.55. rsb
19.56. rsvp
19.57. rtp-session
19.58. rtr-advertisement
19.59. run-manual-spf
20. s Commands
20.1. s-pmsi
20.2. s11
20.3. saa
20.4. saii-type2-using
20.5. sap
20.6. sap-egress
20.7. sap-ingress
20.8. sap-template
20.9. sap-using
20.10. sap-using aarp
20.11. sap-using app-profile
20.12. sap-using transit-policy
20.13. saps
20.14. satellite
20.15. schedule
20.16. scheduler-hierarchy
20.17. scheduler-name
20.18. scheduler-policy
20.19. scheduler-stats
20.20. schema-path
20.21. screen
20.22. script
20.23. script-control
20.24. script-policy
20.25. scripts
20.26. sctp-filter
20.27. sdp
20.28. sdp-group
20.29. sdp-group-using
20.30. sdp-using
20.31. sdp-using aarp
20.32. sdp-using transit-policy
20.33. seamless-bfd
20.34. security
20.35. security-policy
20.36. seen-ip
20.37. segment-routing
20.38. selective-fib-log
20.39. send-force-renew
20.40. sensor-group
20.41. server
20.42. server-stats
20.43. server-tls-profile
20.44. servers
20.45. service
20.46. service-name-using
20.47. service-prefix
20.48. service-using
20.49. services
20.50. session
20.51. session-filter
20.52. session-parameters
20.53. sessions
20.54. set-epoch-value
20.55. set-fabric-speed
20.56. set-role
20.57. sflow
20.58. sfm
20.59. sfm-interco-test
20.60. sgt-qos
20.61. sham-link
20.62. sham-link-neighbor
20.63. shared-queue
20.64. show
20.65. sid-egress-stats
20.66. sid-ingress-stats
20.67. sid-stats
20.68. site
20.69. sla-profile
20.70. slaac
20.71. slope-policy
20.72. snippets
20.73. snmp
20.74. snmp-trap-group
20.75. sntp
20.76. sockets
20.77. source
20.78. source-active
20.79. source-active-rejected
20.80. source-address
20.81. spb
20.82. spf
20.83. spf-log
20.84. splice-status
20.85. split-horizon-group
20.86. spoke-sdp
20.87. spoke-sdp-fec
20.88. spoke-sdp-fec-using
20.89. sr-adj-sets
20.90. sr-adjacencies
20.91. sr-database
20.92. sr-label
20.93. sr-lfa-coverage
20.94. sr-policies
20.95. sr-te-cspf
20.96. sr-te-lsp
20.97. sr-te-lsp-egress-stats
20.98. src-access-list
20.99. src-bmac-lsb
20.100. srlg-database
20.101. srlg-group
20.102. srrp
20.103. srrp-sync-database
20.104. ssh
20.105. ssid
20.106. ssm-translate
20.107. standby
20.108. standby-ip-addresses
20.109. start
20.110. static
20.111. static-arp
20.112. static-host
20.113. static-lsp
20.114. static-policy
20.115. static-route
20.116. static-sa
20.117. station
20.118. statistics
20.119. statistics frag-stats
20.120. statistics map-domain
20.121. statistics-summary
20.122. stats
20.123. status
20.124. steering-profile
20.125. sticky-dest
20.126. sticky-leases
20.127. stop
20.128. stp
20.129. streaming
20.130. sub-ident-policy
20.131. sub-mcac
20.132. sub-profile
20.133. subnet-ext-stats
20.134. subnet-stats
20.135. subscribe-to
20.136. subscriber
20.137. subscriber-hosts
20.138. subscriber-identification
20.139. subscriber-mgmt
20.140. subscriber-using
20.141. subscription
20.142. subscriptions
20.143. summary
20.144. summary-address
20.145. svlan-statistics
20.146. switch-fabric
20.147. switch-fabric failure-recovery
20.148. switch-path
20.149. sync
20.150. sync-database
20.151. sync-database-reconcile
20.152. sync-if-timing
20.153. synchronization
20.154. syslog
20.155. syslog-export-policy
20.156. system
20.157. system-config
20.158. system-filter
20.159. system-info
21. t Commands
21.1. taii-type2-using
21.2. tail
21.3. targ-peer
21.4. targ-peer-template
21.5. targ-peer-template-map
21.6. targeted-auto-rx
21.7. tcp-session-parameters
21.8. tcp-validate
21.9. tdm-sat
21.10. te-database
21.11. te-link
21.12. te-lspinfo
21.13. telemetry
21.14. template
21.15. test-oam
21.16. tests
21.17. tethering
21.18. threshold-crossing-alert
21.19. thresholds
21.20. throughput
21.21. time
21.22. timers
21.23. tls
21.24. tools
21.25. top-active-meps
21.26. top-flows
21.27. top-protocols
21.28. topology
21.29. tp-interface
21.30. tp-lsp
21.31. tp-tunnel
21.32. trace
21.33. trace-profile
21.34. traffic-capture
21.35. traffic-forward
21.36. traffic-statistics
21.37. traffic-type
21.38. transform
21.39. transit-ip-policy
21.40. transit-path
21.41. transit-prefix-policy
21.42. trap-suppress
21.43. trust-anchor-profile
21.44. ts-list
21.45. tunnel
21.46. tunnel-group
21.47. tunnel-interface
21.48. tunnel-isa
21.49. tunnel-qos
21.50. tunnel-selection-blacklist
21.51. tunnel-setup-rate
21.52. tunnel-table
21.53. tunnel-template
21.54. tunnels
21.55. twamp
21.56. twamp-light
22. u Commands
22.1. ue
22.2. uni
22.3. unicast
22.4. unknown-origin
22.5. unsubscribe-from
22.6. update-path
22.7. uplink
22.8. upnp
22.9. upnp-mappings
22.10. upnp-policy
22.11. upnp-policy-statistics
22.12. uptime
22.13. url-filter
22.14. url-list
22.15. usage
22.16. usage-monitor
22.17. user
22.18. users
22.19. utilization
23. v Commands
23.1. vas-filter
23.2. vas-tunnel
23.3. vccv-bfd
23.4. version
23.5. video
23.6. video-group
23.7. view
23.8. violators
23.9. virtual-link
23.10. virtual-neighbor
23.11. virtual-subnet
23.12. vpls-fdb-stats
23.13. vpls-sap-template
23.14. vpls-sap-template-using
23.15. vpls-template
23.16. vpls-template-using
23.17. vport
23.18. vrf-export-test
23.19. vrgw
23.20. vrrp
23.21. vsd
23.22. vsd domain
23.23. vsd scripts
23.24. vsd-refresh
23.25. vsd-services
23.26. vxlan
23.27. vxlan-instance-using
24. w Commands
24.1. walk
24.2. web-rd
24.3. web-service
24.4. wholesalers
24.5. wlan-gw
24.6. wlan-gw-group
24.7. wpp
25. x Commands
25.1. xiom
25.2. xmpp
25.3. xmpp server
Customer Document and Product Support
1. Getting Started
1.1. Command Tree
1.2. Command Descriptions
1.3. Navigational Aids
1.3.1. Context Path
1.3.2. Searching
1.3.3. Linking to the Tree
2. Command Trees
2.1. clear Commands
2.2. show Commands
2.3. tools Commands
3. a Commands
3.1. aa-anl-list
3.2. aa-interface
3.3. aa-sub
3.4. aa-sub-list
3.5. aa-sub-search
3.6. aa-sub-study
3.7. aa-sub-using
3.8. aaa
3.9. aarp
3.10. abort-startup-wait
3.11. access-group
3.12. accounting-policy
3.13. accounting-records
3.14. acct-off
3.15. acct-on
3.16. acct-on-off-group
3.17. accu-stats
3.18. accu-stats-policy
3.19. accu-stats-subscribers
3.20. activate-best-dest
3.21. activate-primary-action
3.22. active
3.23. active-subscribers
3.24. adi
3.25. adi-session
3.26. adjacency
3.27. adjust-autobandwidth
3.28. admin
3.29. admin-group
3.30. admin-lock
3.31. admit-deny-stats
3.32. adv-config-policy
3.33. agg-rate
3.34. aggregate
3.35. alarm-contact-input
3.36. alarms
3.37. ale-adjust
3.38. all
3.39. all-subscriptions
3.40. ancp
3.41. ancp ancp-sub-string
3.42. ancp-policy
3.43. ancp-string
3.44. anycast
3.45. app-filter
3.46. app-group
3.47. app-profile
3.48. app-qos-policy
3.49. app-service-option
3.50. application
3.51. application-assurance
3.52. application-assurance-group
3.53. applications
3.54. aps
3.55. arbiter-stats
3.56. area
3.57. arp
3.58. arp-host
3.59. arp-table
3.60. association
3.61. associations
3.62. atm
3.63. atm-td-profile
3.64. auth-keychain
3.65. authentication
3.66. authentication-origin
3.67. authentication-server-check
3.68. auto-boot
3.69. auto-discovered-meps
3.70. auto-lsp
3.71. auto-node-provisioning
3.72. autoconfigure
3.73. avp-match-learned-session-id
4. b Commands
4.1. bandwidth-policy
4.2. base
4.3. bcg
4.4. bd
4.5. bfd
4.6. bfd-template
4.7. bfd-templates-in-use
4.8. bgp
4.9. bgp-auto-rd
4.10. bgp-evpn
4.11. bgp-evpn-multi-homing
4.12. bgp-route-distinguisher
4.13. bgp-vpws
4.14. bier
4.15. bin-group
4.16. bin-group-using
4.17. binding-label
4.18. bindings
4.19. bluetooth
4.20. bmp
4.21. bof
4.22. bonding
4.23. boot-messages
4.24. brg
4.25. brg-hosts
4.26. brg-profile
4.27. bundles
4.28. bypass-tunnel
5. c Commands
5.1. ca-profile
5.2. cache
5.3. calculate-maps
5.4. call-trace
5.5. cam-utilization
5.6. candidate
5.7. capabilities
5.8. capture-sap
5.9. card
5.10. card-status
5.11. category-map
5.12. category-set-id
5.13. ccrt-replay
5.14. cem
5.15. cert-profile
5.16. certificate
5.17. cflowd
5.18. cfm-stack-table
5.19. channel
5.20. charging-group
5.21. chassis
5.22. check-bp-eprom
5.23. class-forwarding-policy
5.24. clear
5.25. clear-arp
5.26. clear-force
5.27. clear-lockout-annexb
5.28. clear-mac
5.29. clear-neighbor
5.30. clear-quarantine
5.31. cli-session-group
5.32. client
5.33. client-db
5.34. client-tls-profile
5.35. coa
5.36. coherent
5.37. collect-lmm-fc-stats
5.38. collect-lmm-stats
5.39. collector
5.40. command-list
5.41. community
5.42. completed
5.43. configuration-mode
5.44. configuration-sessions
5.45. connection
5.46. connection-profile
5.47. connection-profile-vlan
5.48. connections
5.49. connectivity-association
5.50. control-channel
5.51. convergence
5.52. count
5.53. counters
5.54. cpm
5.55. cpm-filter
5.56. cpm-http-redirect
5.57. cpm-queue
5.58. cpr-wndw-sz-srch-info
5.59. cpu
5.60. cpu-protection
5.61. cpu-usage
5.62. create-sticky-lease
5.63. credit-control
5.64. credit-reset
5.65. cron
5.66. crp
5.67. cspf
5.68. custom-protocol
5.69. customer
6. d Commands
6.1. damping
6.2. data-bearer
6.3. data-trigger
6.4. data-triggers
6.5. database
6.6. datapath
6.7. datastore-locks
6.8. debounce
6.9. debug
6.10. debug-packet
6.11. declined-addresses
6.12. default-domain
6.13. delay-template
6.14. delay-template-using
6.15. dest-tracking
6.16. detail
6.17. detected-protocols
6.18. deterministic
6.19. dhcp
6.20. dhcp-rx-stats
6.21. dhcp6
6.22. diameter
6.23. diameter-application-policy
6.24. diameter-node
6.25. diameter-peer-policy
6.26. diameter-session
6.27. direct-export
6.28. discovery
6.29. dist-cpu-protection
6.30. dns
6.31. dns-ip-cache
6.32. domain
6.33. domain-to-vsd-mapping
6.34. downgrade
6.35. drain
6.36. dscp
6.37. dscp-map
6.38. dscp-table
6.39. dump
6.40. dwdm
6.41. dynamic-blocks
6.42. dynamic-resolve
6.43. dynamic-services
6.44. dynamic-services command-list
6.45. dynamic-services-policy
7. e Commands
7.1. ecmp
7.2. edit-ipoe-session
7.3. edit-lease-state
7.4. edit-ppp-session
7.5. edit-slaac-host
7.6. efm-oam
7.7. egress-label
7.8. egress-pbr
7.9. egress-statistics
7.10. elmi
7.11. encryption-keygroup
7.12. endpoint
7.13. entry
7.14. epipe
7.15. epipe-map-access-to-egress-port
7.16. error-codes
7.17. error-counters
7.18. errors
7.19. es-bmac
7.20. es-pbr
7.21. esa
7.22. esa-vm
7.23. esi
7.24. eth
7.25. eth-cfm
7.26. eth-cfm-monitoring
7.27. eth-ring
7.28. eth-sat
7.29. eth-tunnel
7.30. ethernet
7.31. ethernet-segment
7.32. etree
7.33. eval-group-interface-template
7.34. eval-ipoe-session
7.35. eval-lease-state
7.36. eval-msap
7.37. eval-ppp-session
7.38. eval-rates
7.39. eval-sap-template
7.40. eval-slaac-host
7.41. evaluate-script
7.42. evc
7.43. event-control
7.44. event-handling
7.45. event-log
7.46. event-parameters
7.47. evpn
7.48. evpn mac-dup-detect
7.49. evpn usage
7.50. evpn-mpls
7.51. evpn-proxy-db
7.52. excessive-sources
7.53. exercise
7.54. expand-wildcard-path
7.55. explicit-subscriber-map
7.56. export
7.57. extranet-interface
8. f Commands
8.1. failover
8.2. failover-pool-stats
8.3. failover-server-stats
8.4. failure-recovery
8.5. fate-sharing
8.6. fd-domain-sync
8.7. fdb
8.8. fdb-info
8.9. fdb-mac
8.10. fdb-usage
8.11. fec
8.12. fec-egress-stats
8.13. fec-originate
8.14. fib
8.15. fib-telemetry
8.16. fid
8.17. field
8.18. fields
8.19. file
8.20. file-id
8.21. files
8.22. filter
8.23. filter-id
8.24. firewall
8.25. firewall-hosts
8.26. firewall-policy
8.27. flap-statistics
8.28. flex-algo
8.29. flexible-algorithm-definitions
8.30. flood-table
8.31. flow-attribute
8.32. flow-record-search
8.33. force
8.34. force-partner-down
8.35. force-switch-path
8.36. force-switchover
8.37. force-uplink-switch
8.38. forced-single-sfm-overload
8.39. forcerenew
8.40. forwarding
8.41. forwarding-policies
8.42. forwarding-policy
8.43. forwarding-table
8.44. fp
8.45. fp-resource-policy
8.46. fp-tunnel-table
8.47. frag-stats
8.48. frame-relay
8.49. free-addresses
8.50. ftn
8.51. fwd-path-ext
9. g Commands
9.1. gateway
9.2. gateways
9.3. global
9.4. gmpls
9.5. gmpls-tun-grp
9.6. gre-tunnel-template
9.7. group
9.8. group-encryption
9.9. group-interface
9.10. groups
9.11. grpc
9.12. grt-lookup
9.13. gsmp
9.14. gtm
9.15. gtp
9.16. gtp session
9.17. gtp statistics
9.18. gtp-session
9.19. gtp-statistics
10. h Commands
10.1. handler
10.2. hierarchy
10.3. histogram
10.4. host
10.5. host-connectivity-verify
10.6. host-lockout-policy
10.7. host-lookup
10.8. host-tracking
10.9. hostname
10.10. hosts
10.11. hs-attachment-policy
10.12. hs-pool-policy
10.13. hs-pools
10.14. hs-port-pool-policy
10.15. hs-scheduler-hierarchy
10.16. hs-scheduler-policy
10.17. http-client
10.18. http-enrich
10.19. http-error-redirect
10.20. http-host-recorder detail
10.21. http-host-recorder status
10.22. http-host-recorder top
10.23. http-notification
10.24. http-redirect
11. i Commands
11.1. i-vpls
11.2. icmp
11.3. icmp-redirect-route
11.4. icmp-stats
11.5. icmp6
11.6. icmp6-redirect-route
11.7. id
11.8. idle-only-msap
11.9. if-attribute
11.10. if-policy
11.11. igmp
11.12. igmp-policy
11.13. igmp-snooping
11.14. ignore-sap-port-state
11.15. ike-exchange-failure-rate
11.16. ike-initiate
11.17. ike-policy
11.18. ike-stats
11.19. ike-transform
11.20. ikev2-msg-drop
11.21. ilm
11.22. ima
11.23. inactive-peers
11.24. inband-tunnel
11.25. information
11.26. ingress-label
11.27. ingress-statistics
11.28. ingress-stats
11.29. ingress-stats-template
11.30. instance
11.31. inter-as-label
11.32. inter-chassis
11.33. interface
11.34. interface-group-handler
11.35. interface-id-mapping
11.36. iom
11.37. ip
11.38. ip-exception
11.39. ip-filter
11.40. ip-prefix-list
11.41. ip-tunnel-stats
11.42. ipoe
11.43. ipoe-session
11.44. ipoe-session-policy
11.45. ipsec
11.46. ipsec-interface
11.47. ipsec-stats
11.48. ipv4
11.49. ipv6
11.50. ipv6-exception
11.51. ipv6-filter
11.52. ipv6-prefix-list
11.53. isa
11.54. isa-filter
11.55. isa-policer
11.56. isa-radius-policy
11.57. isa-service-chaining
11.58. isa-subnets
11.59. isid-route-target
11.60. isid-using
11.61. isis
11.62. issu-post-process
12. k Commands
12.1. keychain
13. l Commands
13.1. l2-aware
13.2. l2-aware-blocks
13.3. l2-aware-hosts
13.4. l2-aware-subscribers
13.5. l2-route-table
13.6. l2-services
13.7. l2pt
13.8. l2tp
13.9. label
13.10. label-ipv4
13.11. label-ipv6
13.12. label-range
13.13. label-type
13.14. labels
13.15. lag
13.16. lanext
13.17. lbm-svc-act-responder
13.18. ldp
13.19. ldp fec-egress-statistics
13.20. ldp-sync-exit
13.21. ldp-treetrace
13.22. learned-remote-mac
13.23. lease-state
13.24. leases
13.25. lfa-coverage
13.26. li
13.27. li-ip
13.28. li-ipv6
13.29. li-mac
13.30. li-source
13.31. license
13.32. licensing
13.33. link-check
13.34. link-group-member-status
13.35. link-group-status
13.36. lldp
13.37. lmp
13.38. lns-group
13.39. load-balance
13.40. load-balancing-alg
13.41. local-bfd-discrim
13.42. local-dhcp-db
13.43. local-dhcp-server
13.44. local-tx-pdu
13.45. local-user-db
13.46. lockout
13.47. lockout-annexb
13.48. log
13.49. log-collector
13.50. log-id
13.51. logger-event-bundling
13.52. loopback
13.53. lsn
13.54. lsn-blocks
13.55. lsp
13.56. lsp-autobandwidth
13.57. lsp-bfd
13.58. lsp-db
13.59. lsp-egress-stats
13.60. lsp-ingress-stats
13.61. lsp-ldp
13.62. lsp-rsvp
13.63. lsp-self-ping
13.64. lsp-template
13.65. lspinfo
14. m Commands
14.1. mac
14.2. mac-filter
14.3. mac-list
14.4. mac-move
14.5. mac-protect
14.6. mac-status
14.7. mac-table
14.8. macsec
14.9. managed-hosts
14.10. management-access-filter
14.11. management-interface
14.12. manager
14.13. manual
14.14. manual-export
14.15. manual-switch-path
14.16. map
14.17. map-domain
14.18. map-to-phy-port
14.19. mapping-server
14.20. mappings
14.21. match-criteria-overload
14.22. match-list
14.23. mc-ecmp-balance
14.24. mc-ecmp-rebalance
14.25. mc-endpoint
14.26. mc-fr-profile-egress
14.27. mc-fr-profile-ingress
14.28. mc-ipsec
14.29. mc-lag
14.30. mc-ring
14.31. mcac
14.32. mcast-management
14.33. mcast-path-mgr cpm
14.34. mcast-reporting-dest
14.35. mcast-reporting-statistics
14.36. mcast-umh-red
14.37. md-auto-id
14.38. mda
14.39. measurement-template
14.40. measurement-template-using
14.41. megapools
14.42. member
14.43. memory-allocation-failure-rate
14.44. memory-pools
14.45. memory-usage
14.46. mep
14.47. mep domain
14.48. mesh-sdp
14.49. mfib
14.50. mgmt-ethernet
14.51. mgw-address-cache
14.52. migration
14.53. mip
14.54. mip-instantiation
14.55. mirror
14.56. mirror-dest
14.57. mka-session
14.58. mld
14.59. mld-snooping
14.60. mlppp
14.61. mmrp
14.62. module
14.63. mpls
14.64. mpls-labels
14.65. mpls-tp
14.66. mrouters
14.67. mrp
14.68. mrp-policy
14.69. msap
14.70. msap-policy
14.71. msdp
14.72. mstp-configuration
14.73. multi-chassis
14.74. multicast-info-policy
14.75. multilink-bundle
14.76. mvpn
14.77. mvpn-list
14.78. mvr
15. n Commands
15.1. nat
15.2. nat-accounting-policy
15.3. nat-group
15.4. nat-policy
15.5. neighbor
15.6. neighbor-table
15.7. neighbors
15.8. netconf
15.9. network
15.10. network-domains
15.11. network-queue
15.12. next-hop
15.13. next-hop-id
15.14. ntp
15.15. number-of-tunnels
16. o Commands
16.1. oam-config-summary
16.2. oam-perf
16.3. oam-pm
16.4. oam-template
16.5. ocsp-cache
16.6. of-switch
16.7. on-change-paths
16.8. opaque-database
16.9. open-flow
16.10. oper-group
16.11. optimal-route-reflection
16.12. origin-validation
16.13. ospf
16.14. ospf3
16.15. overload
17. p Commands
17.1. p2mp
17.2. p2mp-candidate-path
17.3. p2mp-info
17.4. p2mp-lsp
17.5. p2mp-policy
17.6. p2mp-sr-tree
17.7. packet-size
17.8. parameters
17.9. partition
17.10. password-options
17.11. path
17.12. path-request
17.13. paths
17.14. pattern-match
17.15. pbb base
17.16. pbb mac-name
17.17. pbr-steering
17.18. pcap
17.19. pcc
17.20. pcc-rule
17.21. pcep
17.22. pcm
17.23. pcp-server
17.24. pcp-server-policy
17.25. pcs
17.26. peakvalue-stats
17.27. peer
17.28. peer-profile
17.29. peer-profile-map
17.30. peers
17.31. peq
17.32. per-peer-queuing
17.33. perform
17.34. performance
17.35. persistence
17.36. persistent
17.37. pfcp
17.38. pfcp-association
17.39. pfcp-session
17.40. pim
17.41. pim-snooping
17.42. ping-template
17.43. ping-template-sync
17.44. ping-template-using
17.45. pip
17.46. plr
17.47. policer
17.48. policer-hierarchy
17.49. policers
17.50. policy
17.51. policy-edits
17.52. policy-test
17.53. pool
17.54. pool-ext-stats
17.55. pool-stats
17.56. pool-threshold-stats
17.57. pools
17.58. port
17.59. port-connection
17.60. port-db
17.61. port-forwarding-action
17.62. port-forwarding-entries
17.63. port-list
17.64. port-map
17.65. port-recorder detail
17.66. port-recorder status
17.67. port-recorder top
17.68. port-scheduler-policy
17.69. port-topology
17.70. port-tree
17.71. port-xc
17.72. post-policer-mapping
17.73. power-management
17.74. power-module
17.75. power-shelf
17.76. ppp
17.77. ppp-policy
17.78. pppoe
17.79. pppoe-client
17.80. prefix-ext-stats
17.81. prefix-label
17.82. prefix-sids
17.83. prefix-stats
17.84. prefix-threshold-stats
17.85. prefixes
17.86. profile
17.87. protection-template
17.88. protocol
17.89. protocol-list
17.90. protocol-protection
17.91. provider-tunnel
17.92. provider-tunnel-using
17.93. provider-tunnels
17.94. proxy-arp
17.95. proxy-arp-nd
17.96. proxy-db
17.97. proxy-nd
17.98. psb
17.99. ptp
17.100. pvc
17.101. pvp
17.102. pvt
17.103. pw
17.104. pw-port
17.105. pw-port-list
17.106. pw-sap-using
17.107. pw-template
17.108. python
17.109. python-policy
17.110. python-script
17.111. python-script protect
17.112. python-script reload
18. q Commands
18.1. qos
18.2. quarantine
18.3. querier
18.4. query-results
18.5. queue
18.6. queue-depth
18.7. queue-depth-violations
18.8. queue-group
18.9. queue-group-redirect-list
19. r Commands
19.1. radius
19.2. radius-accounting
19.3. radius-accounting-policy
19.4. radius-acct
19.5. radius-acct-terminate-cause
19.6. radius-attr-username
19.7. radius-authentication-policy
19.8. radius-configuration
19.9. radius-proxy-server
19.10. radius-server-policy
19.11. range
19.12. recover-l2aw-bypass
19.13. redirect-policy
19.14. redirect-policy-binding
19.15. redundancy
19.16. reflectors
19.17. refresh-lsas
19.18. relations
19.19. release-hold-down
19.20. remap-lease-state
19.21. remote-bfd-discrim
19.22. remote-management
19.23. replication-segment
19.24. request
19.25. requirements
19.26. reset
19.27. resignal
19.28. resignal-bypass
19.29. resource-failures
19.30. resource-usage
19.31. resources
19.32. restart
19.33. retailers
19.34. revert
19.35. rib-api
19.36. ring
19.37. ring-node
19.38. ring-nodes
19.39. rip
19.40. ripng
19.41. rollback
19.42. root-objects
19.43. route
19.44. route-downloader
19.45. route-next-hop-policy
19.46. route-table
19.47. router
19.48. router-advertisement
19.49. routes
19.50. routing
19.51. rp
19.52. rp-hash
19.53. rpki-session
19.54. rs-fec
19.55. rsb
19.56. rsvp
19.57. rtp-session
19.58. rtr-advertisement
19.59. run-manual-spf
20. s Commands
20.1. s-pmsi
20.2. s11
20.3. saa
20.4. saii-type2-using
20.5. sap
20.6. sap-egress
20.7. sap-ingress
20.8. sap-template
20.9. sap-using
20.10. sap-using aarp
20.11. sap-using app-profile
20.12. sap-using transit-policy
20.13. saps
20.14. satellite
20.15. schedule
20.16. scheduler-hierarchy
20.17. scheduler-name
20.18. scheduler-policy
20.19. scheduler-stats
20.20. schema-path
20.21. screen
20.22. script
20.23. script-control
20.24. script-policy
20.25. scripts
20.26. sctp-filter
20.27. sdp
20.28. sdp-group
20.29. sdp-group-using
20.30. sdp-using
20.31. sdp-using aarp
20.32. sdp-using transit-policy
20.33. seamless-bfd
20.34. security
20.35. security-policy
20.36. seen-ip
20.37. segment-routing
20.38. selective-fib-log
20.39. send-force-renew
20.40. sensor-group
20.41. server
20.42. server-stats
20.43. server-tls-profile
20.44. servers
20.45. service
20.46. service-name-using
20.47. service-prefix
20.48. service-using
20.49. services
20.50. session
20.51. session-filter
20.52. session-parameters
20.53. sessions
20.54. set-epoch-value
20.55. set-fabric-speed
20.56. set-role
20.57. sflow
20.58. sfm
20.59. sfm-interco-test
20.60. sgt-qos
20.61. sham-link
20.62. sham-link-neighbor
20.63. shared-queue
20.64. show
20.65. sid-egress-stats
20.66. sid-ingress-stats
20.67. sid-stats
20.68. site
20.69. sla-profile
20.70. slaac
20.71. slope-policy
20.72. snippets
20.73. snmp
20.74. snmp-trap-group
20.75. sntp
20.76. sockets
20.77. source
20.78. source-active
20.79. source-active-rejected
20.80. source-address
20.81. spb
20.82. spf
20.83. spf-log
20.84. splice-status
20.85. split-horizon-group
20.86. spoke-sdp
20.87. spoke-sdp-fec
20.88. spoke-sdp-fec-using
20.89. sr-adj-sets
20.90. sr-adjacencies
20.91. sr-database
20.92. sr-label
20.93. sr-lfa-coverage
20.94. sr-policies
20.95. sr-te-cspf
20.96. sr-te-lsp
20.97. sr-te-lsp-egress-stats
20.98. src-access-list
20.99. src-bmac-lsb
20.100. srlg-database
20.101. srlg-group
20.102. srrp
20.103. srrp-sync-database
20.104. ssh
20.105. ssid
20.106. ssm-translate
20.107. standby
20.108. standby-ip-addresses
20.109. start
20.110. static
20.111. static-arp
20.112. static-host
20.113. static-lsp
20.114. static-policy
20.115. static-route
20.116. static-sa
20.117. station
20.118. statistics
20.119. statistics frag-stats
20.120. statistics map-domain
20.121. statistics-summary
20.122. stats
20.123. status
20.124. steering-profile
20.125. sticky-dest
20.126. sticky-leases
20.127. stop
20.128. stp
20.129. streaming
20.130. sub-ident-policy
20.131. sub-mcac
20.132. sub-profile
20.133. subnet-ext-stats
20.134. subnet-stats
20.135. subscribe-to
20.136. subscriber
20.137. subscriber-hosts
20.138. subscriber-identification
20.139. subscriber-mgmt
20.140. subscriber-using
20.141. subscription
20.142. subscriptions
20.143. summary
20.144. summary-address
20.145. svlan-statistics
20.146. switch-fabric
20.147. switch-fabric failure-recovery
20.148. switch-path
20.149. sync
20.150. sync-database
20.151. sync-database-reconcile
20.152. sync-if-timing
20.153. synchronization
20.154. syslog
20.155. syslog-export-policy
20.156. system
20.157. system-config
20.158. system-filter
20.159. system-info
21. t Commands
21.1. taii-type2-using
21.2. tail
21.3. targ-peer
21.4. targ-peer-template
21.5. targ-peer-template-map
21.6. targeted-auto-rx
21.7. tcp-session-parameters
21.8. tcp-validate
21.9. tdm-sat
21.10. te-database
21.11. te-link
21.12. te-lspinfo
21.13. telemetry
21.14. template
21.15. test-oam
21.16. tests
21.17. tethering
21.18. threshold-crossing-alert
21.19. thresholds
21.20. throughput
21.21. time
21.22. timers
21.23. tls
21.24. tools
21.25. top-active-meps
21.26. top-flows
21.27. top-protocols
21.28. topology
21.29. tp-interface
21.30. tp-lsp
21.31. tp-tunnel
21.32. trace
21.33. trace-profile
21.34. traffic-capture
21.35. traffic-forward
21.36. traffic-statistics
21.37. traffic-type
21.38. transform
21.39. transit-ip-policy
21.40. transit-path
21.41. transit-prefix-policy
21.42. trap-suppress
21.43. trust-anchor-profile
21.44. ts-list
21.45. tunnel
21.46. tunnel-group
21.47. tunnel-interface
21.48. tunnel-isa
21.49. tunnel-qos
21.50. tunnel-selection-blacklist
21.51. tunnel-setup-rate
21.52. tunnel-table
21.53. tunnel-template
21.54. tunnels
21.55. twamp
21.56. twamp-light
22. u Commands
22.1. ue
22.2. uni
22.3. unicast
22.4. unknown-origin
22.5. unsubscribe-from
22.6. update-path
22.7. uplink
22.8. upnp
22.9. upnp-mappings
22.10. upnp-policy
22.11. upnp-policy-statistics
22.12. uptime
22.13. url-filter
22.14. url-list
22.15. usage
22.16. usage-monitor
22.17. user
22.18. users
22.19. utilization
23. v Commands
23.1. vas-filter
23.2. vas-tunnel
23.3. vccv-bfd
23.4. version
23.5. video
23.6. video-group
23.7. view
23.8. violators
23.9. virtual-link
23.10. virtual-neighbor
23.11. virtual-subnet
23.12. vpls-fdb-stats
23.13. vpls-sap-template
23.14. vpls-sap-template-using
23.15. vpls-template
23.16. vpls-template-using
23.17. vport
23.18. vrf-export-test
23.19. vrgw
23.20. vrrp
23.21. vsd
23.22. vsd domain
23.23. vsd scripts
23.24. vsd-refresh
23.25. vsd-services
23.26. vxlan
23.27. vxlan-instance-using
24. w Commands
24.1. walk
24.2. web-rd
24.3. web-service
24.4. wholesalers
24.5. wlan-gw
24.6. wlan-gw-group
24.7. wpp
25. x Commands
25.1. xiom
25.2. xmpp
25.3. xmpp server
Customer Document and Product Support
Gx AVPs Reference Guide Release 21.7.R1
Legal notice
Gx AVP
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Gx AVP
Standards and Protocol Support
Customer Documentation and Product Support
Gy AVPs Reference Guide Release 21.7.R1
Legal notice
Getting Started
Diameter Gy Interface Specification
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting Started
Diameter Gy Interface Specification
Standards and Protocol Support
Customer Documentation and Product Support
Interface Configuration Guide Release 21.7.R1
Legal notice
Getting Started
About This Guide
Interface Configuration Process
Interfaces
Configuration Overview
Chassis Slots and Card Slots
XIOM Modules
MDA-a, MDA-aXP, MDA, MDA-XP, MDA-e, and MDA-s Modules
XMAs/C-XMAs
Hardware Licensing
Software License Activation
Software License Records
Versatile Service Module (VSM)
Oversubscribed Ethernet MDAs
Rate Limiting
Packet Classification and Scheduling
Channelized MDA Support
Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
Channelized OC-12/STM-4 ASAP MDAs
Channelized DS-3/E-3 ASAP MDA (4-Port)
Channelized DS-3/E-3 ASAP MDA (12-Port)
Channelized OC-3/STM-1 Circuit Emulation Services (CES) MDA
Network Interconnections
Digital Diagnostics Monitoring
SFPs and XFPs
Statistics Collection
Ports
Port Types
Port Features
Port State and Operational State
802.1x Network Access Control
802.1x Modes
802.1x Basics
802.1x Timers
802.1x Tunneling
Per-Host Authentication
Per-Host Authentication Interaction with dot1x
Static Allow Source MAC
Tagged dot1x Authentication
dot1x and LAG
SR Host Authentication Behaviour
Authentication Lists
802.1x Configuration and Limitations
MACsec
MACsec 802.1AE Header (SecTAG)
MACsec Encryption Mode
MACsec Encryption per Traffic Flow Encapsulation Matching
MACsec Key Management Modes
MACsec Terminology
MACsec Static CAK
SAK Rollover
MKA
MKA PDU Generation
Tags in Clear Behavior by Traffic Encapsulation Types
Pre-shared Key
MKA Hello Timer
MACsec Capability, Desire, and Encryption Offset
Key Server
SA Limits and Network Design
P2P (Switch to Switch) Topology
P2MP (Switch to Switch) Topology
SA Exhaustion Behavior
Clear Tag Mode
802.1X Tunneling and Multihop MACsec
EAPoL Destination Address
Mirroring Consideration
SONET/SDH Port Attributes
SONET/SDH Path Attributes
Multilink Frame Relay
MLFR Bundle Data Plane
MLFR Bundle Link Integrity Protocol
FRF.12 End-to-End Fragmentation
SAP Fragment Interleaving Option
FRF.12 UNI/NNI Link Fragmentation
MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
Multilink Point-to-Point Protocol (MLPPP)
Protocol Field (PID)
B and E Bits
Sequence Number
Information Field
Padding
FCS
LCP
Link Fragmentation and Interleaving Support
Multi-Class MLPPP
QoS in MC-MLPPP
Ingress MLPPP Class Reassembly
Configuring MC-MLPPP QoS Parameters
Cisco HDLC
SLARP
SONET/SDH Scrambling and C2-Byte
Timers
Automatic Protection Switching (APS)
Single Chassis and Multi-Chassis APS
APS on a Single Node (SC-APS)
APS Across Two Nodes (MC-APS)
APS Switching Modes
Bidirectional 1+1 Signaling APS
Unidirectional 1+1 Signaling APS
Unidirectional 1+1 Signaling and Datapath APS
APS Channel and SONET Header K Bytes
K1 Byte
K2 Byte
Differences in SONET/SDH Standards for K Bytes
Failures Indicated by K Bytes
APS Protection Switching Byte Failure
APS Channel Mismatch Failure
APS Mode Mismatch Failure
APS Far-End Protection Line Failure
Revertive Switching
Bidirectional 1+1 Switchover Operation Example
Annex B (1+1 Optimized) Operation
Annex B APS Outage Reduction Optimization
Protection of Upper Layer Protocols and Services
Switchover Process for Transmitted Data
Switchover Process for Received Data
APS User-Initiated Requests
Lockout Protection
Request Switch of Active to Protection
Request Switch of Active to Working
Forced Switching of Active to Protection
Forced Switch of Active to Working
Exercise Command
APS and SNMP
APS Applicability, Restrictions and Interactions
APS and Bundles
APS Switchover Impact on Statistics
Supported APS MDA/Port Combinations
APS Switchover During CPM Switchover
Removing or Failure of a Protect MDA
Mirroring Support
Sample APS Applications
Sample APS Application: MLPPP with SC-APS and MC-APS on Channelized Interfaces
Sample APS Application: MC-APS for ATM SAP with ATM VPLS Service
Sample APS Application: MC-APS with VLL Redundancy
Inverse Multiplexing Over ATM (IMA)
Inverse Multiplexing over ATM (IMA) Features
Hardware Applicability
Software Capabilities
Ethernet Local Management Interface (E-LMI)
Link Layer Discovery Protocol (LLDP)
LLDP Protocol Features
Exponential Port Dampening
Per Port Aggregate Egress Queue Statistics Monitoring
FP4 Data Path Mapping
Port Cross-Connect
PXC Terminology
Overview
Port-Based PXC
Internal PXC
PXC Sub-Ports
Bandwidth Considerations and QoS
Location Selection for Internal PXC
Internal PXC and Source Fabric Taps
QoS
QoS on PXC Sub-Ports
Queue Allocation on PXC Sub-Ports
Pool Allocations on PXC Ports
Operational States
PXC Statistics
Statistics on Faceplate PXC Ports
Statistics Collection on Internal (MAC-based) PXC
Statistics Collection on PXC Sub-Ports
PXC LAG
Basic PXC Provisioning
PXC Mirroring and LI
Multi-Chassis Redundancy
Health Monitoring on the PXC
Configuration Example
Forwarding Path Extensions (FPE)
LAG
LACP
LACP Multiplexing
LACP Tunneling
Active-Standby LAG Operation
LAG on Access QoS Consideration
Adapt QoS Modes
Per-fp-ing-queuing
Per-fp-egr-queuing
Per-fp-sap-instance
Traffic Load Balancing Options
Per Flow Hashing
Changing Default Per Flow Hashing Inputs
LSR Hashing
LSR Default Hash Routine—Label-Only Hash Option
LSR Label-IP Hash Option Enabled
LSR IP-Only Hash Option Enabled
LSR Ethernet Encapsulated IP Hash only Option Enabled
LSR Hashing of MPLS-over-GRE Encapsulated Packet
LSR Hashing when an Entropy Label is Present in the Packet's Label Stack
Layer 4 Load Balancing
System IP Load Balancing
TEID Hash for GTP-Encapsulated Traffic
Source-Only/Destination-Only Hash Inputs
Enhanced Multicast Load Balancing
Security Parameter Index (SPI) Load Balancing
Adaptive Load Balancing
LAG Port Weight Speed
LAG Port Hash-Weight
Configurable Hash Weight to Control Flow Distribution
Mixed-speed LAGs
Per Link Hashing
Weighted per-link-hash
Explicit Per Link Hash Using LAG Link Mapping Profiles
Consistent Per Service Hashing
ESM – LAG Hashing per Vport
Background
Hashing per Vport
Vport Hashing over Different Forwarding Complexes
Multicast Consideration
VPLS and Capture SAP Considerations
IPv6 Flow Label Load Balancing
Interaction with Other Load Balancing Features
LAG Hold Down Timers
BFD over LAG Links
Multi-Chassis LAG
Overview
MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
DSLAM Dual Homing in Layer 2/3 TPSDA Model
LAG IGP Cost
G.8031 Protected Ethernet Tunnels
G.8032 Protected Ethernet Rings
Ethernet Port Monitoring
802.3ah OAM
OAM Events
Link Monitoring
Capability Advertising
Remote Loopback
802.3ah OAM PDU Tunneling for Epipe Service
802.3ah Grace Announcement
MTU Configuration Guidelines
Default MTU Values
Modifying MTU Defaults
Configuration Example
Deploying Preprovisioned Components
Setting Fabric Speed
7750 SR-7/12/12e and 7450 ESS-7/12
7950 XRS-20/20e
Versatile Service Module
VSM-CCA-XP
Configuration Process Overview
Configuration Notes
Configuring Physical Ports with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port
Maximizing Bandwidth Use
Basic Configuration
Common Configuration Tasks
Configuring Cards and MDAs
Configuring FP Network Pool Parameters
Configuring Ports
Configuring Port Pool Parameters
Changing Hybrid-Buffer-Allocation
Changing APS Parameters
Configuring Ethernet Port Parameters
Ethernet Network Port
Ethernet Access Port
Configuring 802.1x Authentication Port Parameters
Configuring SONET/SDH Port Parameters
SONET/SDH Network Port
SONET/SDH Access Port
Configuring Channelized Ports
Verify the MDA Type
Configuring a Channelized DS3 Port
Configuring a Channelized OC-12-SFP Port
Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
Configuring Cisco HDLC on a Channelized Port
Configuring Channelized STM1/OC3 Parameters
Sample Cpipe Port Configurations
Configuring a DS1 Port
Configuring a Channel Group
Configuring ATM SAPs
ATM SAP in an IES Service
ATM SAP in an Epipe Service
Configuring DWDM Port Parameters
Configuring WaveTracker Parameters
Configuring OTU Port Parameters
Configuring ATM Interface Parameters
PLCP/Direct Mapping
ATM Interface Configurations
Configuring Frame Relay Parameters
SONET/SDH Interfaces
Configuring Multilink PPP Bundles
Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
IMA Bundles
Multi-Class MLPPP
IMA Test Procedure
Configuring Bundle Protection Group Ports
Configuring LAG Parameters
Configuring BFD on LAG Links
Configuring G.8031 Protected Ethernet Tunnels
Configuring Connectors and Connector Ports
Service Management Tasks
Modifying or Deleting an MDA or XMA
Modifying a Card Type
Deleting a Card
Deleting Port Parameters
Soft IOM Reset
Soft Reset
Deferred MDA Reset
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting Started
About This Guide
Interface Configuration Process
Interfaces
Configuration Overview
Chassis Slots and Card Slots
XIOM Modules
MDA-a, MDA-aXP, MDA, MDA-XP, MDA-e, and MDA-s Modules
XMAs/C-XMAs
Hardware Licensing
Software License Activation
Software License Records
Versatile Service Module (VSM)
Oversubscribed Ethernet MDAs
Rate Limiting
Packet Classification and Scheduling
Channelized MDA Support
Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
Channelized OC-12/STM-4 ASAP MDAs
Channelized DS-3/E-3 ASAP MDA (4-Port)
Channelized DS-3/E-3 ASAP MDA (12-Port)
Channelized OC-3/STM-1 Circuit Emulation Services (CES) MDA
Network Interconnections
Digital Diagnostics Monitoring
SFPs and XFPs
Statistics Collection
Ports
Port Types
Port Features
Port State and Operational State
802.1x Network Access Control
802.1x Modes
802.1x Basics
802.1x Timers
802.1x Tunneling
Per-Host Authentication
Per-Host Authentication Interaction with dot1x
Static Allow Source MAC
Tagged dot1x Authentication
dot1x and LAG
SR Host Authentication Behaviour
Authentication Lists
802.1x Configuration and Limitations
MACsec
MACsec 802.1AE Header (SecTAG)
MACsec Encryption Mode
MACsec Encryption per Traffic Flow Encapsulation Matching
MACsec Key Management Modes
MACsec Terminology
MACsec Static CAK
SAK Rollover
MKA
MKA PDU Generation
Tags in Clear Behavior by Traffic Encapsulation Types
Pre-shared Key
MKA Hello Timer
MACsec Capability, Desire, and Encryption Offset
Key Server
SA Limits and Network Design
P2P (Switch to Switch) Topology
P2MP (Switch to Switch) Topology
SA Exhaustion Behavior
Clear Tag Mode
802.1X Tunneling and Multihop MACsec
EAPoL Destination Address
Mirroring Consideration
SONET/SDH Port Attributes
SONET/SDH Path Attributes
Multilink Frame Relay
MLFR Bundle Data Plane
MLFR Bundle Link Integrity Protocol
FRF.12 End-to-End Fragmentation
SAP Fragment Interleaving Option
FRF.12 UNI/NNI Link Fragmentation
MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
Multilink Point-to-Point Protocol (MLPPP)
Protocol Field (PID)
B and E Bits
Sequence Number
Information Field
Padding
FCS
LCP
Link Fragmentation and Interleaving Support
Multi-Class MLPPP
QoS in MC-MLPPP
Ingress MLPPP Class Reassembly
Configuring MC-MLPPP QoS Parameters
Cisco HDLC
SLARP
SONET/SDH Scrambling and C2-Byte
Timers
Automatic Protection Switching (APS)
Single Chassis and Multi-Chassis APS
APS on a Single Node (SC-APS)
APS Across Two Nodes (MC-APS)
APS Switching Modes
Bidirectional 1+1 Signaling APS
Unidirectional 1+1 Signaling APS
Unidirectional 1+1 Signaling and Datapath APS
APS Channel and SONET Header K Bytes
K1 Byte
K2 Byte
Differences in SONET/SDH Standards for K Bytes
Failures Indicated by K Bytes
APS Protection Switching Byte Failure
APS Channel Mismatch Failure
APS Mode Mismatch Failure
APS Far-End Protection Line Failure
Revertive Switching
Bidirectional 1+1 Switchover Operation Example
Annex B (1+1 Optimized) Operation
Annex B APS Outage Reduction Optimization
Protection of Upper Layer Protocols and Services
Switchover Process for Transmitted Data
Switchover Process for Received Data
APS User-Initiated Requests
Lockout Protection
Request Switch of Active to Protection
Request Switch of Active to Working
Forced Switching of Active to Protection
Forced Switch of Active to Working
Exercise Command
APS and SNMP
APS Applicability, Restrictions and Interactions
APS and Bundles
APS Switchover Impact on Statistics
Supported APS MDA/Port Combinations
APS Switchover During CPM Switchover
Removing or Failure of a Protect MDA
Mirroring Support
Sample APS Applications
Sample APS Application: MLPPP with SC-APS and MC-APS on Channelized Interfaces
Sample APS Application: MC-APS for ATM SAP with ATM VPLS Service
Sample APS Application: MC-APS with VLL Redundancy
Inverse Multiplexing Over ATM (IMA)
Inverse Multiplexing over ATM (IMA) Features
Hardware Applicability
Software Capabilities
Ethernet Local Management Interface (E-LMI)
Link Layer Discovery Protocol (LLDP)
LLDP Protocol Features
Exponential Port Dampening
Per Port Aggregate Egress Queue Statistics Monitoring
FP4 Data Path Mapping
Port Cross-Connect
PXC Terminology
Overview
Port-Based PXC
Internal PXC
PXC Sub-Ports
Bandwidth Considerations and QoS
Location Selection for Internal PXC
Internal PXC and Source Fabric Taps
QoS
QoS on PXC Sub-Ports
Queue Allocation on PXC Sub-Ports
Pool Allocations on PXC Ports
Operational States
PXC Statistics
Statistics on Faceplate PXC Ports
Statistics Collection on Internal (MAC-based) PXC
Statistics Collection on PXC Sub-Ports
PXC LAG
Basic PXC Provisioning
PXC Mirroring and LI
Multi-Chassis Redundancy
Health Monitoring on the PXC
Configuration Example
Forwarding Path Extensions (FPE)
LAG
LACP
LACP Multiplexing
LACP Tunneling
Active-Standby LAG Operation
LAG on Access QoS Consideration
Adapt QoS Modes
Per-fp-ing-queuing
Per-fp-egr-queuing
Per-fp-sap-instance
Traffic Load Balancing Options
Per Flow Hashing
Changing Default Per Flow Hashing Inputs
LSR Hashing
LSR Default Hash Routine—Label-Only Hash Option
LSR Label-IP Hash Option Enabled
LSR IP-Only Hash Option Enabled
LSR Ethernet Encapsulated IP Hash only Option Enabled
LSR Hashing of MPLS-over-GRE Encapsulated Packet
LSR Hashing when an Entropy Label is Present in the Packet's Label Stack
Layer 4 Load Balancing
System IP Load Balancing
TEID Hash for GTP-Encapsulated Traffic
Source-Only/Destination-Only Hash Inputs
Enhanced Multicast Load Balancing
Security Parameter Index (SPI) Load Balancing
Adaptive Load Balancing
LAG Port Weight Speed
LAG Port Hash-Weight
Configurable Hash Weight to Control Flow Distribution
Mixed-speed LAGs
Per Link Hashing
Weighted per-link-hash
Explicit Per Link Hash Using LAG Link Mapping Profiles
Consistent Per Service Hashing
ESM – LAG Hashing per Vport
Background
Hashing per Vport
Vport Hashing over Different Forwarding Complexes
Multicast Consideration
VPLS and Capture SAP Considerations
IPv6 Flow Label Load Balancing
Interaction with Other Load Balancing Features
LAG Hold Down Timers
BFD over LAG Links
Multi-Chassis LAG
Overview
MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
DSLAM Dual Homing in Layer 2/3 TPSDA Model
LAG IGP Cost
G.8031 Protected Ethernet Tunnels
G.8032 Protected Ethernet Rings
Ethernet Port Monitoring
802.3ah OAM
OAM Events
Link Monitoring
Capability Advertising
Remote Loopback
802.3ah OAM PDU Tunneling for Epipe Service
802.3ah Grace Announcement
MTU Configuration Guidelines
Default MTU Values
Modifying MTU Defaults
Configuration Example
Deploying Preprovisioned Components
Setting Fabric Speed
7750 SR-7/12/12e and 7450 ESS-7/12
7950 XRS-20/20e
Versatile Service Module
VSM-CCA-XP
Configuration Process Overview
Configuration Notes
Configuring Physical Ports with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port
Maximizing Bandwidth Use
Basic Configuration
Common Configuration Tasks
Configuring Cards and MDAs
Configuring FP Network Pool Parameters
Configuring Ports
Configuring Port Pool Parameters
Changing Hybrid-Buffer-Allocation
Changing APS Parameters
Configuring Ethernet Port Parameters
Ethernet Network Port
Ethernet Access Port
Configuring 802.1x Authentication Port Parameters
Configuring SONET/SDH Port Parameters
SONET/SDH Network Port
SONET/SDH Access Port
Configuring Channelized Ports
Verify the MDA Type
Configuring a Channelized DS3 Port
Configuring a Channelized OC-12-SFP Port
Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
Configuring Cisco HDLC on a Channelized Port
Configuring Channelized STM1/OC3 Parameters
Sample Cpipe Port Configurations
Configuring a DS1 Port
Configuring a Channel Group
Configuring ATM SAPs
ATM SAP in an IES Service
ATM SAP in an Epipe Service
Configuring DWDM Port Parameters
Configuring WaveTracker Parameters
Configuring OTU Port Parameters
Configuring ATM Interface Parameters
PLCP/Direct Mapping
ATM Interface Configurations
Configuring Frame Relay Parameters
SONET/SDH Interfaces
Configuring Multilink PPP Bundles
Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
IMA Bundles
Multi-Class MLPPP
IMA Test Procedure
Configuring Bundle Protection Group Ports
Configuring LAG Parameters
Configuring BFD on LAG Links
Configuring G.8031 Protected Ethernet Tunnels
Configuring Connectors and Connector Ports
Service Management Tasks
Modifying or Deleting an MDA or XMA
Modifying a Card Type
Deleting a Card
Deleting Port Parameters
Soft IOM Reset
Soft Reset
Deferred MDA Reset
Standards and Protocol Support
Customer Documentation and Product Support
Layer 2 Services and EVPN Guide Release 21.7.R1
Legal notice
Getting Started
About This Guide
Layer 2 Services and EVPN Configuration Process
VLL Services
ATM VLL Services
Apipe For End-to-End ATM Service
ATM Virtual Trunk Over IP/MPLS Packet Switched Network
Traffic Management Support
Ingress Network Classification
Ingress Queuing and Shaping on the IOM
Egress Queuing and Shaping on the IOM
Egress Shaping/Scheduling
Circuit Emulation Services
Mobile Infrastructure
Circuit Emulation Modes
Circuit Emulation Parameters
Circuit Emulation Modes
Absolute Mode Option
Payload Size
Jitter Buffer
CES Circuit Operation
Services for Transporting CES Circuits
Network Synchronization Considerations
Cpipe Payload
Ethernet Pipe Services
Epipe Service Overview
Epipe Service Pseudowire VLAN Tag Processing
Epipe Up Operational State Configuration Option
Epipe with PBB
Epipe over L2TPv3
Ethernet Interworking VLL
VLL CAC
MC-Ring and VLL
Frame Relay VLL Services
Frame Relay VLL
Frame Relay-to-ATM Interworking (FRF.5) VLL
Traffic Management Support
Frame Relay Traffic Management
Ingress SAP Classification and Marking
Egress Network EXP Marking
Ingress Network Classification
IP Interworking VLL Services
Ipipe VLL
IP Interworking VLL Datapath
Extension to IP VLL for Discovery of Ethernet CE IP Address
VLL Ethernet SAP Processes
VLL FR SAP Procedures
VLL ATM SAP Procedures
VLL PPP/IPCP and Cisco-HDLC SAP Procedures
IPv6 Support on IP Interworking VLL
IPv6 Datapath Operation
IPv6 Stack Capability Signaling
Services Configuration for MPLS-TP
MPLS-TP SDPs
VLL Spoke SDP Configuration
Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
Configuring MPLS-TP Lock Instruct and Loopback
MPLS-TP PW Lock Instruct and Loopback Overview
Lock PW Endpoint Model
PW Redundancy and Lock Instruct and Loopback
Configuring a Test SAP for an MPLS-TP PW
Configuring an Administrative Lock
Configuring a Loopback
Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
VCCV BFD Support
VCCV BFD Encapsulation on a Pseudowire
BFD Session Operation
Using VCCV BFD to set SDP Binding Operational State
Configuring VCCV BFD
Pseudowire Switching
Pseudowire Switching with Protection
Pseudowire Switching Behavior
Pseudowire Switching TLV
Pseudowire Switching Point Sub-TLVs
Static-to-Dynamic Pseudowire Switching
Ingress VLAN Swapping
Ingress VLAN Translation
Pseudowire Redundancy
Dynamic Multi-Segment Pseudowire Routing
Overview
Pseudowire Routing
Static Routing
Explicit Paths
Configuring VLLs using Dynamic MS-PWs
Active/Passive T-PE Selection
Automatic Endpoint Configuration
Selecting a Path for an MS-PW
Pseudowire Templates
Pseudowire Redundancy
VCCV OAM for Dynamic MS-PWs
VCCV-Ping on Dynamic MS-PWs
VCCV-Trace on Dynamic MS-PWs
Example Dynamic MS-PW Configuration
VLL Resilience with Two Destination PE Nodes
Master-Slave Operation
Interaction with SAP-Specific OAM
Local Rules at Slave VLL PE
Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
VLL Resilience Path Example
VLL Resilience for a Switched Pseudowire Path
Pseudowire SAPs
Epipe Using BGP-MH Site Support for Ethernet Tunnels
Operational Overview
Detailed Operation
Sample Operation of G.8031 BGP-MH
Events in Sample Operation
BGP-MH Site Support for Ethernet Tunnels Operational Group Model
BGP-MH Specifics for MH Site Support for Ethernet Tunnels
PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
T-LDP Status Notification Handling Rules of BGP-MH Epipes
Rules for Processing Endpoint SAP Active/Standby Status Bits
Rules for Processing, Merging Local, and Received Endpoint Operational Status
Operation for BGP-MH Site Support for Ethernet Tunnels
Configuration Examples
Configuration with Fate Sharing on Node-3
Access Node Resilience Using MC-LAG and Pseudowire Redundancy
VLL Resilience for a Switched Pseudowire Path
Pseudowire Redundancy Service Models
Redundant VLL Service Model
T-LDP Status Notification Handling Rules
Processing Endpoint SAP Active/Standby Status Bits
Processing and Merging
High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
Primary Spoke SDP Fallback to Secondary SAP
Reversion to Primary Spoke SDP Path
MC-APS and MC-LAG
Failure Scenario
VLL Using G.8031 Protected Ethernet Tunnels
MPLS Entropy Label and Hash Label
BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Single Pseudowire Example
Active/Standby Pseudowire Example
BGP VPWS Pseudowire Switching
Pseudowire Signaling
BGP-VPWS with Inter-AS Model C
BGP VPWS Configuration Procedure
Use of Pseudowire Template for BGP VPWS
Use of Endpoint for BGP VPWS
VLL Service Considerations
SDPs
SDP Statistics for VPLS and VLL Services
SAP Encapsulations and Pseudowire Types
PWE3 N-to-1 Cell Mode
PWE3 AAL5 SDU Mode
QoS Policies
Filter Policies
MAC Resources
Configuring a VLL Service with CLI
Common Configuration Tasks
Configuring VLL Components
Creating an Apipe Service
Configuring Basic Apipe SAP Parameters
Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
Configuring Apipe SDP Bindings
Creating a Cpipe Service
Basic Configuration
Configuration Requirements
Configuring a DS1 Port
Configuring a Channel Group
Configuring Cpipe SAPs and Spoke-SDPs
Creating an Epipe Service
Configuring Epipe SAP Parameters
Local Epipe SAPs
Distributed Epipe SAPs
PBB Epipe Configuration
Configuring Ingress and Egress SAP Parameters
Configuring SDP Bindings
Creating an Fpipe Service
Configuring Fpipe SAP Parameters
Configuring Fpipe SDP Bindings
Creating an Ipipe Service
Configuring Ipipe SAP Parameters
Configuring Ipipe SDP Bindings
Using Spoke-SDP Control Words
Same-Fate Epipe VLANs Access Protection
Pseudowire Configuration Notes
Configuring Two VLL Paths Terminating on T-PE2
Configuring VLL Resilience
Configuring VLL Resilience for a Switched Pseudowire Path
Configuring BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Service Management Tasks
Modifying Apipe Service Parameters
Disabling an Apipe Service
Re-enabling an Apipe Service
Deleting an Apipe Service
Modifying a Cpipe Service
Deleting a Cpipe Service
Modifying Epipe Service Parameters
Disabling an Epipe Service
Re-enabling an Epipe Service
Deleting an Epipe Service
Modifying Fpipe Service Parameters
Disabling an Fpipe Service
Re-enabling an Fpipe Service
Deleting an Fpipe Service
Modifying Ipipe Service Parameters
Disabling an Ipipe Service
Re-enabling an Ipipe Service
Deleting an Ipipe Service
Virtual Private LAN Service
VPLS Service Overview
VPLS Packet Walkthrough
VPLS Features
VPLS Enhancements
VPLS over MPLS
VPLS Service Pseudowire VLAN Tag Processing
VPLS MAC Learning and Packet Forwarding
MAC Learning Protection
DEI in IEEE 802.1ad
VPLS Using G.8031 Protected Ethernet Tunnels
Pseudowire Control Word
Table Management
Selective MAC Address Learning
Example Operational Information
Global MAC address learning only (default)
Selective and global MAC address learning
System FDB Size
Per-VPLS Service FDB Size
System FDB Size Alarms
Line Card FDB Size Alarms
Per VPLS FDB Size Alarms
Local and Remote Aging Timers
Disable MAC Aging
Disable MAC Learning
Unknown MAC Discard
VPLS and Rate Limiting
MAC Move
Auto-Learn MAC Protect
Operation
Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
VPLS and Spanning Tree Protocol
Spanning Tree Operating Modes
Multiple Spanning Tree
Redundancy Access to VPLS
MSTP for QinQ SAPs
Provider MSTP
MSTP General Principles
MSTP in the SR-series Platform
Enhancements to the Spanning Tree Protocol
L2PT Termination
BPDU Translation
L2PT and BPDU Translation
VPLS Redundancy
Spoke SDP Redundancy for Metro Interconnection
Spoke SDP Based Redundant Access
Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
Fast Detection of Peer Failure using BFD
MC-EP Passive Mode
Support for Single Chassis Endpoint Mechanisms
MAC Flush Support in MC-EP
Block-on-Mesh-Failure Support in MC-EP Scenario
Support for Force Spoke SDP in MC-EP
Revertive Behavior for Primary Pseudowires in an MC-EP
Using B-VPLS for Increased Scalability and Reduced Convergence Times
MAC Flush Additions for PBB VPLS
VPLS Access Redundancy
STP-based Redundant Access to VPLS
Redundant Access to VPLS Without STP
Object Grouping and State Monitoring
VPLS Applicability — Block on VPLS a Failure
MAC Flush Message Processing
Dual Homing to a VPLS Service
MC-Ring and VPLS
ACL Next-Hop for VPLS
SDP Statistics for VPLS and VLL Services
BGP Auto-Discovery for LDP VPLS
BGP AD Overview
Information Model
FEC Element for T-LDP Signaling
BGP-AD and Target LDP (T-LDP) Interaction
SDP Usage
Automatic Creation of SDPs
Manually Provisioned SDP
Automatic Instantiation of Pseudowires (SDP Bindings)
Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
Resiliency Schemes
BGP VPLS
Pseudowire Signaling Details
Supported VPLS Features
VCCV BFD Support for VPLS Services
BGP Multi-Homing for VPLS
Information Model and Required Extensions to L2VPN NLRI
Supported Services and Multi-Homing Objects
Blackhole Avoidance
MAC Flush to the Core PEs
Indicating non-DF status toward the access PE or CE
BGP Multi-Homing for VPLS Inter-Domain Resiliency
Multicast-Aware VPLS
IGMP Snooping for VPLS
MLD Snooping for VPLS
PIM Snooping for VPLS
Plain PIM Snooping
PIM Proxy
IPv6 Multicast Forwarding
MAC-Based IPv6 Multicast Forwarding
SG-Based IPv6 Multicast Forwarding
PIM and IGMP/MLD Snooping Interaction
Multi-Chassis Synchronization for Layer 2 Snooping States
IGMP Snooping Synchronization
MLD Snooping Synchronization
PIM Snooping for IPv4 Synchronization
VPLS Multicast-Aware High Availability Features
RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
MPLS Entropy Label and Hash Label
Routed VPLS and I-VPLS
IES or VPRN IP Interface Binding
Assigning a Service Name to a VPLS Service
Service Binding Requirements
Bound Service Name Assignment
Binding a Service Name to an IP Interface
Bound Service Deletion or Service Name Removal
IP Interface Attached VPLS Service Constraints
IP Interface and VPLS Operational State Coordination
IP Interface MTU and Fragmentation
Unicast IP Routing into a VPLS Service
ARP and VPLS FDB Interactions
R-VPLS Specific ARP Cache Behavior
The allow-ip-int-bind VPLS Flag
R-VPLS SAPs Only Supported on Standard Ethernet Ports
LAG Port Membership Constraints
R-VPLS Feature Restrictions
Routed I-VPLS Feature Restrictions
IPv4 and IPv6 Multicast Routing Support
BGP Auto-Discovery (BGP-AD) for R-VPLS Support
R-VPLS Caveats
VPLS SAP Ingress IP Filter Override
IP Interface Defined Egress QoS Reclassification
Remarking for VPLS and Routed Packets
IPv4 Multicast Routing
R-VPLS Supported Routing-related Protocols
Spanning Tree and Split Horizon
VPLS Service Considerations
SAP Encapsulations
VLAN Processing
Ingress VLAN Swapping
Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
Configure the MVRP Infrastructure using an M-VPLS Context
Instantiate Related VLAN FDBs and Trunks in MVRP Scope
MVRP Activation of Service Connectivity
MVRP Control Plane
STP-MVRP Interaction
Interaction Between MVRP and Instantiated SAP Status
Using Temporary Flooding to Optimize Failover Times
VPLS E-Tree Services
VPLS E-Tree Services Overview
Leaf-ac and Root-ac SAPs
Leaf-ac and Root-ac SDP Binds
Root-leaf-tag SAPs
Root-leaf-tag SDP Binds
Interaction between VPLS E-Tree Services and Other Features
Configuring a VPLS Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPLS Components
Creating a VPLS Service
Enabling Multiple MAC Registration Protocol (MMRP)
Enabling MAC Move
Configuring STP Bridge Parameters in a VPLS
Bridge STP Admin State
Mode
Bridge Priority
Max Age
Forward Delay
Hello Time
Hold Count
MST Instances
MST Max Hops
MST Name
MST Revision
Configuring GSMP Parameters
Configuring a VPLS SAP
Local VPLS SAPs
Distributed VPLS SAPs
Configuring SAP-Specific STP Parameters
SAP STP Administrative State
SAP Virtual Port Number
SAP Priority
SAP Path Cost
SAP Edge Port
SAP Auto Edge
SAP Link Type
STP SAP Operational States
Operationally Disabled
Operationally Discarding
Operationally Learning
Operationally Forwarding
SAP BPDU Encapsulation State
Configuring VPLS SAPs with Split Horizon
Configuring MAC Learning Protection
Configuring SAP Subscriber Management Parameters
MSTP Control over Ethernet Tunnels
Configuring SDP Bindings
Configuring Overrides on Service SAPs
Configuring Spoke-SDP Specific STP Parameters
Spoke-SDP STP Administrative State
Spoke-SDP Virtual Port Number
Spoke-SDP Priority
Spoke-SDP Path Cost
Spoke-SDP Edge Port
Spoke-SDP Auto Edge
Spoke-SDP Link Type
Spoke-SDP STP Operational States
Operationally Disabled
Operationally Discarding
Operationally Learning
Operationally Forwarding
Spoke-SDP BPDU Encapsulation States
Configuring VPLS Spoke-SDPs with Split Horizon
Configuring VPLS Redundancy
Creating a Management VPLS for SAP Protection
Creating a Management VPLS for Spoke-SDP Protection
Configuring Load Balancing with Management VPLS
Configuring Selective MAC Flush
Configuring Multi-Chassis Endpoints
ATM/Frame Relay PVC Access and Termination on a VPLS Service
Configuring BGP Auto-Discovery
Configuration Steps
LDP Signaling
Pseudowire Template
Configuring BGP VPLS
Configuring a VPLS Management Interface
Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
Configuring VPLS E-Tree Services
Service Management Tasks
Modifying VPLS Service Parameters
Modifying Management VPLS Parameters
Deleting a Management VPLS
Disabling a Management VPLS
Deleting a VPLS Service
Disabling a VPLS Service
Re-enabling a VPLS Service
IEEE 802.1ah Provider Backbone Bridging
IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
PBB Features
Integrated PBB-VPLS Solution
PBB Technology
PBB Mapping to Existing VPLS Configurations
SAP and SDP Support
PBB B-VPLS
PBB I-VPLS
PBB Packet Walkthrough
PBB Control Planes
Shortest Path Bridging MAC Mode (SPBM)
Flooding and Learning Versus Link State
SPB for B-VPLS
Control B-VPLS and User B-VPLS
Shortest Path and Single Tree
Data Path and Forwarding
SPB Ethernet OAM
SPB Levels
SPBM to Non-SPBM Interworking
Static MACs and Static ISIDs
Epipe Static Configuration
I-VPLS Static Config
SPBM ISID Policies
ISID Policy Control
Static ISID Advertisement
I-VPLS for Unicast Service
Default Behaviors
Example Network Configuration
Example Configuration for Dut-A
Show Commands Outputs
Debug Commands
Tools Commands
Clear Commands
IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
MMRP Support Over B-VPLS SAPs and SDPs
I-VPLS Changes and Related MMRP Behavior
Limiting the Number of MMRP Entries on a Per B-VPLS Basis
Optimization for Improved Convergence Time
Controlling MRP Scope using MRP Policies
PBB and BGP-AD
PBB E-Line Service
Non-Redundant PBB Epipe Spoke Termination
PBB Using G.8031 Protected Ethernet Tunnels
Solution Overview
Detailed Solution Description
Detailed PBB Emulated LAG Solution Description
Support Service and Solution Combinations
Periodic MAC Notification
MAC Flush
PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
Porting existing VPLS LDP MAC Flush in PBB VPLS
PBB Blackholing Issue
LDP MAC Flush Solution for PBB Blackholing
Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
Solution Description for I-VPLS Over Native PBB Core
Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
Dual-Homing into PBB Epipe - Local Switching Use Case
BGP Multi-homing for I-VPLS
Access Multi-Homing over MPLS for PBB Epipes
PBB and IGMP/MLD Snooping
PBB and PIM Snooping
PBB QoS
Transparency of Customer QoS Indication through PBB Backbone
Configuration Examples
Details Solution Description
Egress B-SAP per ISID Shaping
B-SAP Egress ISID Shaping Configuration
Provisioning Model
Egress Queue Scheduling
B-SAP per-ISID Shaping Configuration Example
PBB OAM
Mirroring
OAM Commands
CFM Support
Configuration Examples
PBB using G.8031 Protected Ethernet Tunnels
MC-LAG Multi-homing for Native PBB
Access Multi-Homing over MPLS for PBB Epipes
Ethernet Virtual Private Networks (EVPNs)
Overview and EVPN Applications
EVPN for VXLAN Tunnels in a Layer 2 DGW (EVPN-VXLAN)
EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DGW
EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
EVPN for MPLS Tunnels in E-LAN Services
EVPN for MPLS Tunnels in E-Line Services
EVPN for MPLS Tunnels in E-Tree Services
EVPN for PBB over MPLS Tunnels (PBB-EVPN)
EVPN for VXLAN Tunnels and Cloud Technologies
VXLAN
VXLAN ECMP and LAG
VXLAN VPLS Tag Handling
VXLAN MTU Considerations
VXLAN QoS
Ingress
Egress
VXLAN Ping
EVPN-VXLAN Routed VPLS Multicast Routing Support
IGMP and MLD Snooping on VXLAN
PIM Snooping on VXLAN
Static VXLAN Termination in Epipe Services
Static VXLAN Termination in VPLS/R-VPLS Services
Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
EVPN for Overlay Tunnels
BGP-EVPN Control Plane for VXLAN Overlay Tunnels
EVPN for VXLAN in VPLS Services
Resiliency and BGP Multi-Homing
Use of BGP-EVPN, BGP-AD, and Sites in the Same VPLS Service
Use of the unknown-mac-route
EVPN for VXLAN in R-VPLS Services
EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
EVPN for VXLAN in EVPN Tunnel R-VPLS Services
EVPN-VPWS for VXLAN Tunnels
EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
EVPN for VXLAN in EVPN Tunnel R-VPLS Services
DGW integration with the Nuage Virtual Services Directory (VSD)
XMPP Interface on the DGW
Overview of the Static-Dynamic VSD Integration Model
VSD-Domains and Association to Static-Dynamic Services
VSD-Domain Type L2-DOMAIN
VSD-Domain Type L2-DOMAIN-IRB
VSD-Domain Type VRF-GRE
VSD-Domain Type VRF-VXLAN
Fully-Dynamic VSD Integration Model
Python Script Implementation Details
Provisioning Filters using the VSD Fully Dynamic Model
Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
Replicator (AR-R) Procedures
Leaf (AR-L) procedures
Assisted-Replication Interaction with Other VPLS Features
DGW Policy Based Forwarding/Routing to an EVPN ESI
Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
EVPN VXLAN Multihoming
Local Bias for EVPN VXLAN Multihoming
Known Limitations for Local Bias
Non-system IPv4 and IPv6 VXLAN Termination for EVPN VXLAN Multihoming
EVPN for MPLS Tunnels
BGP-EVPN Control Plane for MPLS Tunnels
EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
EVPN and VPLS Integration
EVPN Single-Active Multi-Homing and BGP-VPLS Integration
Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
EVPN Multi-Homing in VPLS Services
EVPN All-Active Multi-Homing
All-Active Multi-Homing Service Model
ES Discovery and DF Election Procedures
Aliasing
Network Failures and Convergence for All-Active Multi-Homing
Logical Failures on ESs and Blackholes
Transient Issues Caused by MAC Route Delays
EVPN Single-Active Multi-Homing
Single-Active Multi-Homing Service Model
ES and DF Election Procedures
Backup PE Function
Network Failures and Convergence for Single-Active Multi-Homing
EVPN ESI Type 1 Support
P2MP mLDP Tunnels for BUM Traffic in EVPN-MPLS Services
PBB-EVPN
BGP-EVPN Control Plane for PBB-EVPN
EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
EVPN Route Type 2 - MAC/IP Advertisement Route (or B-MAC Routes)
EVPN Route Type 4 - ES Route
PBB-EVPN for I-VPLS and PBB Epipe Services
Flood Containment for I-VPLS Services
PBB-EVPN and PBB-VPLS Integration
PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
System B-MAC Assignment in PBB-EVPN
PBB-EVPN All-Active Multi-Homing Service Model
Network failures and convergence for all-active multi-homing
PBB-EVPN Single-Active Multi-Homing Service Model
Network Failures and Convergence for Single-Active Multihoming
PBB-Epipes and EVPN Multi-Homing
PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
PBB-EVPN ISID-Based C-MAC Flush
PBB-EVPN ISID-based Route Targets
EVPN-VPWS for MPLS Tunnels
BGP-EVPN Control Plane for EVPN-VPWS
EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
PW Ports-based ESs for EVPN-VPWS
EVPN-VPWS Services with Local-Switching Support
Example-1:
Example-2
Example-3
EVPN for MPLS Tunnels in Routed VPLS Services
EVPN-MPLS Multi-Homing and Passive VRRP
Virtual Ethernet Segments
Preference-Based and Non-Revertive DF Election
EVPN-MPLS Routed VPLS Multicast Routing Support
IGMP Snooping in EVPN-MPLS and PBB EVPN Services
Data-driven IGMP Snooping Synchronization with EVPN Multihoming
PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
EVPN E-Tree
BGP EVPN Control Plane for EVPN E-Tree
EVPN for MPLS Tunnels in E-Tree Services
EVPN E-Tree Operation
EVPN E-Tree Known Unicast Ingress Filtering
EVPN E-Tree BUM Egress Filtering
EVPN E-Tree Egress Filtering Based on MAC Source Address
EVPN E-Tree and EVPN Multi-homing
PBB-EVPN E-Tree Services
MPLS Entropy Label and Hash Label
Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
ECMP for EVPN-MPLS Destinations
IPv6 tunnel resolution for EVPN MPLS Services
EVPN Multi-Homing Support for MPLS Tunnels Resolved to Non-system IPv4/IPv6 Addresses
EVPN for SRv6 Tunnels
General EVPN Topics
ARP/ND Snooping and Proxy Support
Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
Proxy-ND and the Router Flag in Neighbor Advertisement Messages
Procedure to Add the R Flag to a Specified Entry
Proxy-ARP/ND Mac-List for Dynamic Entries
BGP-EVPN MAC-Mobility
BGP-EVPN MAC-Duplication
Conditional Static MAC and Protection
Auto-Learn MAC Protect and Restricting Protected Source MACs
Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
Blackhole MAC for EVPN Loop Detection
CFM Interaction with EVPN Services
Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS/R-VPLS Service
BGP-EVPN Routes in Services Configured with Two BGP Instances
Anycast Redundant Solution for Dual BGP Instance Services
Using P2MP mLDP in Redundant Anycast DC GWs
Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
BGP-EVPN Routes on Dual BGP-Instance Services with I-ES
Single-Active Multi-Homing on I-ES
All-Active Multi-Homing on I-ES
Configuring Multi-Instance EVPN-VXLAN in the Same VPLS/R-VPLS Service
BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
Interconnect Ethernet-Segment Solution for Dual BGP EVPN VXLAN Instance Services
Configuring Static VXLAN and EVPN in the Same VPLS/R-VPLS Service
EVPN IP-Prefix Route Interoperability
Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
Interoperable Interface-less IP-VRF-to-IP-VRF Model (Ethernet Encapsulation)
Interface-less IP-VRF-to-IP-VRF Model (IP encapsulation) for MPLS Tunnels
ARP-ND Host Routes for Extended Layer 2 Data Centers
EVPN Host Mobility Procedures within the Same R-VPLS Service
EVPN Host Mobility Configuration
Host Mobility Case 1
Host Mobility Case 2
Host Mobility Case 3
BGP and EVPN Route Selection for EVPN Routes
LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
Oper-Groups Interaction with EVPN Services
LAG-Based LLF for EVPN-VPWS Services
Core Isolation Blackhole Avoidance
LAG Standby Signaling to the CE on Non-DF EVPN PEs (Single-Active)
AC-Influenced DF Election Capability on an ES with oper-group
EVPN Layer-3 Optimized Inter-Subnet Multicast (OISM)
Introduction and Terminology
OISM Forwarding Plane
OISM Control Plane
EVPN OISM and Multi-Homing
EVPN OISM Configuration Guidelines
Use of mLDP in OISM
Example of mLDP in OISM
EVPN Layer-2 Multicast (IGMP/MLD Proxy)
Interaction of EVPN and Other Features
Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
Interaction of PBB-EVPN with Existing VPLS Features
Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
Interaction of EVPN with BGP Owners in the Same VPRN Service
Interworking of EVPN-IFL and IPVPN in the Same VPRN
Route Selection Across EVPN-IFL and Other Owners in the VPRN Service
Route Selection for EVPN-IFF Routes in the VPRN Service
BGP Path Attribute Propagation
Configuration Examples
Example 1 - Stitching IPVPN and EVPN-IFL Domains
Example 2 - Propagation of BGP Path Attributes for EVPN-IFF
Routing Policies for BGP EVPN Routes
Routing Policies for BGP EVPN IP Prefixes
Configuring an EVPN Service with CLI
EVPN-VXLAN Configuration Examples
Layer 2 PE Example
EVPN for VXLAN in R-VPLS Services Example
EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
EVPN-MPLS Configuration Examples
EVPN All-active Multi-homing Example
EVPN Single-active Multi-homing Example
PBB-EVPN Configuration Examples
PBB-EVPN All-active Multi-homing Example
PBB-EVPN Single-Active Multi-Homing Example
Pseudowire Ports
Overview
PW Port Bound to a Physical Port
FPE-Based PW Port
Cross-Connect Between the External PW and the FPE-Based PW-Port
PXC-Based PW-Port — Building the Cross-Connect
Building the Internal Transport Tunnel
Mapping the External PW to the PW-Port
Terminating the Service on PW-SAP
FPE-Based PW-port Operational State
QoS
Preservation of Forwarding Class Across PXC
Statistics on the FPE based PW-Port
Intra-Chassis Redundancy Models for PXC-Based PW Port
PW Ports and MTU
MSS and PW Ports
Configuration Examples
Concurrent Scheduling QoS Mechanisms on a PW Port
Show Command Examples
L2oGRE Termination on FPE-Based PW Port
L2oGRE Packet Format
GRE Delivery Protocol
Tracking Payloads and Service Termination Points
Plain L3 termination
Layer 2 Termination
ESM Termination
Configuration Steps
Fragmentation and MTU Configuration
Reassembly
VSR Pseudowire Ports
Flex PW Ports
PW Port List
Failover Times
QoS
PW Port Termination for Various Tunnel Types
MPLS-Based Spoke SDP
Provisioning
Flex PW-Port Operational State for MPLS Based Spoke SDP
Statistics
L2oGRE-Based Spoke SDP
Provisioning
Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
Reassembly
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting Started
About This Guide
Layer 2 Services and EVPN Configuration Process
VLL Services
ATM VLL Services
Apipe For End-to-End ATM Service
ATM Virtual Trunk Over IP/MPLS Packet Switched Network
Traffic Management Support
Ingress Network Classification
Ingress Queuing and Shaping on the IOM
Egress Queuing and Shaping on the IOM
Egress Shaping/Scheduling
Circuit Emulation Services
Mobile Infrastructure
Circuit Emulation Modes
Circuit Emulation Parameters
Circuit Emulation Modes
Absolute Mode Option
Payload Size
Jitter Buffer
CES Circuit Operation
Services for Transporting CES Circuits
Network Synchronization Considerations
Cpipe Payload
Ethernet Pipe Services
Epipe Service Overview
Epipe Service Pseudowire VLAN Tag Processing
Epipe Up Operational State Configuration Option
Epipe with PBB
Epipe over L2TPv3
Ethernet Interworking VLL
VLL CAC
MC-Ring and VLL
Frame Relay VLL Services
Frame Relay VLL
Frame Relay-to-ATM Interworking (FRF.5) VLL
Traffic Management Support
Frame Relay Traffic Management
Ingress SAP Classification and Marking
Egress Network EXP Marking
Ingress Network Classification
IP Interworking VLL Services
Ipipe VLL
IP Interworking VLL Datapath
Extension to IP VLL for Discovery of Ethernet CE IP Address
VLL Ethernet SAP Processes
VLL FR SAP Procedures
VLL ATM SAP Procedures
VLL PPP/IPCP and Cisco-HDLC SAP Procedures
IPv6 Support on IP Interworking VLL
IPv6 Datapath Operation
IPv6 Stack Capability Signaling
Services Configuration for MPLS-TP
MPLS-TP SDPs
VLL Spoke SDP Configuration
Epipe VLL Spoke SDP Termination on IES, VPRN, and VPLS
Configuring MPLS-TP Lock Instruct and Loopback
MPLS-TP PW Lock Instruct and Loopback Overview
Lock PW Endpoint Model
PW Redundancy and Lock Instruct and Loopback
Configuring a Test SAP for an MPLS-TP PW
Configuring an Administrative Lock
Configuring a Loopback
Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
VCCV BFD Support
VCCV BFD Encapsulation on a Pseudowire
BFD Session Operation
Using VCCV BFD to set SDP Binding Operational State
Configuring VCCV BFD
Pseudowire Switching
Pseudowire Switching with Protection
Pseudowire Switching Behavior
Pseudowire Switching TLV
Pseudowire Switching Point Sub-TLVs
Static-to-Dynamic Pseudowire Switching
Ingress VLAN Swapping
Ingress VLAN Translation
Pseudowire Redundancy
Dynamic Multi-Segment Pseudowire Routing
Overview
Pseudowire Routing
Static Routing
Explicit Paths
Configuring VLLs using Dynamic MS-PWs
Active/Passive T-PE Selection
Automatic Endpoint Configuration
Selecting a Path for an MS-PW
Pseudowire Templates
Pseudowire Redundancy
VCCV OAM for Dynamic MS-PWs
VCCV-Ping on Dynamic MS-PWs
VCCV-Trace on Dynamic MS-PWs
Example Dynamic MS-PW Configuration
VLL Resilience with Two Destination PE Nodes
Master-Slave Operation
Interaction with SAP-Specific OAM
Local Rules at Slave VLL PE
Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
VLL Resilience Path Example
VLL Resilience for a Switched Pseudowire Path
Pseudowire SAPs
Epipe Using BGP-MH Site Support for Ethernet Tunnels
Operational Overview
Detailed Operation
Sample Operation of G.8031 BGP-MH
Events in Sample Operation
BGP-MH Site Support for Ethernet Tunnels Operational Group Model
BGP-MH Specifics for MH Site Support for Ethernet Tunnels
PW Redundancy for BGP-MH Site Support for Ethernet Tunnels
T-LDP Status Notification Handling Rules of BGP-MH Epipes
Rules for Processing Endpoint SAP Active/Standby Status Bits
Rules for Processing, Merging Local, and Received Endpoint Operational Status
Operation for BGP-MH Site Support for Ethernet Tunnels
Configuration Examples
Configuration with Fate Sharing on Node-3
Access Node Resilience Using MC-LAG and Pseudowire Redundancy
VLL Resilience for a Switched Pseudowire Path
Pseudowire Redundancy Service Models
Redundant VLL Service Model
T-LDP Status Notification Handling Rules
Processing Endpoint SAP Active/Standby Status Bits
Processing and Merging
High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
Primary Spoke SDP Fallback to Secondary SAP
Reversion to Primary Spoke SDP Path
MC-APS and MC-LAG
Failure Scenario
VLL Using G.8031 Protected Ethernet Tunnels
MPLS Entropy Label and Hash Label
BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Single Pseudowire Example
Active/Standby Pseudowire Example
BGP VPWS Pseudowire Switching
Pseudowire Signaling
BGP-VPWS with Inter-AS Model C
BGP VPWS Configuration Procedure
Use of Pseudowire Template for BGP VPWS
Use of Endpoint for BGP VPWS
VLL Service Considerations
SDPs
SDP Statistics for VPLS and VLL Services
SAP Encapsulations and Pseudowire Types
PWE3 N-to-1 Cell Mode
PWE3 AAL5 SDU Mode
QoS Policies
Filter Policies
MAC Resources
Configuring a VLL Service with CLI
Common Configuration Tasks
Configuring VLL Components
Creating an Apipe Service
Configuring Basic Apipe SAP Parameters
Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
Configuring Apipe SDP Bindings
Creating a Cpipe Service
Basic Configuration
Configuration Requirements
Configuring a DS1 Port
Configuring a Channel Group
Configuring Cpipe SAPs and Spoke-SDPs
Creating an Epipe Service
Configuring Epipe SAP Parameters
Local Epipe SAPs
Distributed Epipe SAPs
PBB Epipe Configuration
Configuring Ingress and Egress SAP Parameters
Configuring SDP Bindings
Creating an Fpipe Service
Configuring Fpipe SAP Parameters
Configuring Fpipe SDP Bindings
Creating an Ipipe Service
Configuring Ipipe SAP Parameters
Configuring Ipipe SDP Bindings
Using Spoke-SDP Control Words
Same-Fate Epipe VLANs Access Protection
Pseudowire Configuration Notes
Configuring Two VLL Paths Terminating on T-PE2
Configuring VLL Resilience
Configuring VLL Resilience for a Switched Pseudowire Path
Configuring BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Service Management Tasks
Modifying Apipe Service Parameters
Disabling an Apipe Service
Re-enabling an Apipe Service
Deleting an Apipe Service
Modifying a Cpipe Service
Deleting a Cpipe Service
Modifying Epipe Service Parameters
Disabling an Epipe Service
Re-enabling an Epipe Service
Deleting an Epipe Service
Modifying Fpipe Service Parameters
Disabling an Fpipe Service
Re-enabling an Fpipe Service
Deleting an Fpipe Service
Modifying Ipipe Service Parameters
Disabling an Ipipe Service
Re-enabling an Ipipe Service
Deleting an Ipipe Service
Virtual Private LAN Service
VPLS Service Overview
VPLS Packet Walkthrough
VPLS Features
VPLS Enhancements
VPLS over MPLS
VPLS Service Pseudowire VLAN Tag Processing
VPLS MAC Learning and Packet Forwarding
MAC Learning Protection
DEI in IEEE 802.1ad
VPLS Using G.8031 Protected Ethernet Tunnels
Pseudowire Control Word
Table Management
Selective MAC Address Learning
Example Operational Information
Global MAC address learning only (default)
Selective and global MAC address learning
System FDB Size
Per-VPLS Service FDB Size
System FDB Size Alarms
Line Card FDB Size Alarms
Per VPLS FDB Size Alarms
Local and Remote Aging Timers
Disable MAC Aging
Disable MAC Learning
Unknown MAC Discard
VPLS and Rate Limiting
MAC Move
Auto-Learn MAC Protect
Operation
Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
VPLS and Spanning Tree Protocol
Spanning Tree Operating Modes
Multiple Spanning Tree
Redundancy Access to VPLS
MSTP for QinQ SAPs
Provider MSTP
MSTP General Principles
MSTP in the SR-series Platform
Enhancements to the Spanning Tree Protocol
L2PT Termination
BPDU Translation
L2PT and BPDU Translation
VPLS Redundancy
Spoke SDP Redundancy for Metro Interconnection
Spoke SDP Based Redundant Access
Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
Fast Detection of Peer Failure using BFD
MC-EP Passive Mode
Support for Single Chassis Endpoint Mechanisms
MAC Flush Support in MC-EP
Block-on-Mesh-Failure Support in MC-EP Scenario
Support for Force Spoke SDP in MC-EP
Revertive Behavior for Primary Pseudowires in an MC-EP
Using B-VPLS for Increased Scalability and Reduced Convergence Times
MAC Flush Additions for PBB VPLS
VPLS Access Redundancy
STP-based Redundant Access to VPLS
Redundant Access to VPLS Without STP
Object Grouping and State Monitoring
VPLS Applicability — Block on VPLS a Failure
MAC Flush Message Processing
Dual Homing to a VPLS Service
MC-Ring and VPLS
ACL Next-Hop for VPLS
SDP Statistics for VPLS and VLL Services
BGP Auto-Discovery for LDP VPLS
BGP AD Overview
Information Model
FEC Element for T-LDP Signaling
BGP-AD and Target LDP (T-LDP) Interaction
SDP Usage
Automatic Creation of SDPs
Manually Provisioned SDP
Automatic Instantiation of Pseudowires (SDP Bindings)
Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
Resiliency Schemes
BGP VPLS
Pseudowire Signaling Details
Supported VPLS Features
VCCV BFD Support for VPLS Services
BGP Multi-Homing for VPLS
Information Model and Required Extensions to L2VPN NLRI
Supported Services and Multi-Homing Objects
Blackhole Avoidance
MAC Flush to the Core PEs
Indicating non-DF status toward the access PE or CE
BGP Multi-Homing for VPLS Inter-Domain Resiliency
Multicast-Aware VPLS
IGMP Snooping for VPLS
MLD Snooping for VPLS
PIM Snooping for VPLS
Plain PIM Snooping
PIM Proxy
IPv6 Multicast Forwarding
MAC-Based IPv6 Multicast Forwarding
SG-Based IPv6 Multicast Forwarding
PIM and IGMP/MLD Snooping Interaction
Multi-Chassis Synchronization for Layer 2 Snooping States
IGMP Snooping Synchronization
MLD Snooping Synchronization
PIM Snooping for IPv4 Synchronization
VPLS Multicast-Aware High Availability Features
RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
MPLS Entropy Label and Hash Label
Routed VPLS and I-VPLS
IES or VPRN IP Interface Binding
Assigning a Service Name to a VPLS Service
Service Binding Requirements
Bound Service Name Assignment
Binding a Service Name to an IP Interface
Bound Service Deletion or Service Name Removal
IP Interface Attached VPLS Service Constraints
IP Interface and VPLS Operational State Coordination
IP Interface MTU and Fragmentation
Unicast IP Routing into a VPLS Service
ARP and VPLS FDB Interactions
R-VPLS Specific ARP Cache Behavior
The allow-ip-int-bind VPLS Flag
R-VPLS SAPs Only Supported on Standard Ethernet Ports
LAG Port Membership Constraints
R-VPLS Feature Restrictions
Routed I-VPLS Feature Restrictions
IPv4 and IPv6 Multicast Routing Support
BGP Auto-Discovery (BGP-AD) for R-VPLS Support
R-VPLS Caveats
VPLS SAP Ingress IP Filter Override
IP Interface Defined Egress QoS Reclassification
Remarking for VPLS and Routed Packets
IPv4 Multicast Routing
R-VPLS Supported Routing-related Protocols
Spanning Tree and Split Horizon
VPLS Service Considerations
SAP Encapsulations
VLAN Processing
Ingress VLAN Swapping
Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
Configure the MVRP Infrastructure using an M-VPLS Context
Instantiate Related VLAN FDBs and Trunks in MVRP Scope
MVRP Activation of Service Connectivity
MVRP Control Plane
STP-MVRP Interaction
Interaction Between MVRP and Instantiated SAP Status
Using Temporary Flooding to Optimize Failover Times
VPLS E-Tree Services
VPLS E-Tree Services Overview
Leaf-ac and Root-ac SAPs
Leaf-ac and Root-ac SDP Binds
Root-leaf-tag SAPs
Root-leaf-tag SDP Binds
Interaction between VPLS E-Tree Services and Other Features
Configuring a VPLS Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPLS Components
Creating a VPLS Service
Enabling Multiple MAC Registration Protocol (MMRP)
Enabling MAC Move
Configuring STP Bridge Parameters in a VPLS
Bridge STP Admin State
Mode
Bridge Priority
Max Age
Forward Delay
Hello Time
Hold Count
MST Instances
MST Max Hops
MST Name
MST Revision
Configuring GSMP Parameters
Configuring a VPLS SAP
Local VPLS SAPs
Distributed VPLS SAPs
Configuring SAP-Specific STP Parameters
SAP STP Administrative State
SAP Virtual Port Number
SAP Priority
SAP Path Cost
SAP Edge Port
SAP Auto Edge
SAP Link Type
STP SAP Operational States
Operationally Disabled
Operationally Discarding
Operationally Learning
Operationally Forwarding
SAP BPDU Encapsulation State
Configuring VPLS SAPs with Split Horizon
Configuring MAC Learning Protection
Configuring SAP Subscriber Management Parameters
MSTP Control over Ethernet Tunnels
Configuring SDP Bindings
Configuring Overrides on Service SAPs
Configuring Spoke-SDP Specific STP Parameters
Spoke-SDP STP Administrative State
Spoke-SDP Virtual Port Number
Spoke-SDP Priority
Spoke-SDP Path Cost
Spoke-SDP Edge Port
Spoke-SDP Auto Edge
Spoke-SDP Link Type
Spoke-SDP STP Operational States
Operationally Disabled
Operationally Discarding
Operationally Learning
Operationally Forwarding
Spoke-SDP BPDU Encapsulation States
Configuring VPLS Spoke-SDPs with Split Horizon
Configuring VPLS Redundancy
Creating a Management VPLS for SAP Protection
Creating a Management VPLS for Spoke-SDP Protection
Configuring Load Balancing with Management VPLS
Configuring Selective MAC Flush
Configuring Multi-Chassis Endpoints
ATM/Frame Relay PVC Access and Termination on a VPLS Service
Configuring BGP Auto-Discovery
Configuration Steps
LDP Signaling
Pseudowire Template
Configuring BGP VPLS
Configuring a VPLS Management Interface
Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
Configuring VPLS E-Tree Services
Service Management Tasks
Modifying VPLS Service Parameters
Modifying Management VPLS Parameters
Deleting a Management VPLS
Disabling a Management VPLS
Deleting a VPLS Service
Disabling a VPLS Service
Re-enabling a VPLS Service
IEEE 802.1ah Provider Backbone Bridging
IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
PBB Features
Integrated PBB-VPLS Solution
PBB Technology
PBB Mapping to Existing VPLS Configurations
SAP and SDP Support
PBB B-VPLS
PBB I-VPLS
PBB Packet Walkthrough
PBB Control Planes
Shortest Path Bridging MAC Mode (SPBM)
Flooding and Learning Versus Link State
SPB for B-VPLS
Control B-VPLS and User B-VPLS
Shortest Path and Single Tree
Data Path and Forwarding
SPB Ethernet OAM
SPB Levels
SPBM to Non-SPBM Interworking
Static MACs and Static ISIDs
Epipe Static Configuration
I-VPLS Static Config
SPBM ISID Policies
ISID Policy Control
Static ISID Advertisement
I-VPLS for Unicast Service
Default Behaviors
Example Network Configuration
Example Configuration for Dut-A
Show Commands Outputs
Debug Commands
Tools Commands
Clear Commands
IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
MMRP Support Over B-VPLS SAPs and SDPs
I-VPLS Changes and Related MMRP Behavior
Limiting the Number of MMRP Entries on a Per B-VPLS Basis
Optimization for Improved Convergence Time
Controlling MRP Scope using MRP Policies
PBB and BGP-AD
PBB E-Line Service
Non-Redundant PBB Epipe Spoke Termination
PBB Using G.8031 Protected Ethernet Tunnels
Solution Overview
Detailed Solution Description
Detailed PBB Emulated LAG Solution Description
Support Service and Solution Combinations
Periodic MAC Notification
MAC Flush
PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
Porting existing VPLS LDP MAC Flush in PBB VPLS
PBB Blackholing Issue
LDP MAC Flush Solution for PBB Blackholing
Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
Solution Description for I-VPLS Over Native PBB Core
Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
Dual-Homing into PBB Epipe - Local Switching Use Case
BGP Multi-homing for I-VPLS
Access Multi-Homing over MPLS for PBB Epipes
PBB and IGMP/MLD Snooping
PBB and PIM Snooping
PBB QoS
Transparency of Customer QoS Indication through PBB Backbone
Configuration Examples
Details Solution Description
Egress B-SAP per ISID Shaping
B-SAP Egress ISID Shaping Configuration
Provisioning Model
Egress Queue Scheduling
B-SAP per-ISID Shaping Configuration Example
PBB OAM
Mirroring
OAM Commands
CFM Support
Configuration Examples
PBB using G.8031 Protected Ethernet Tunnels
MC-LAG Multi-homing for Native PBB
Access Multi-Homing over MPLS for PBB Epipes
Ethernet Virtual Private Networks (EVPNs)
Overview and EVPN Applications
EVPN for VXLAN Tunnels in a Layer 2 DGW (EVPN-VXLAN)
EVPN for VXLAN Tunnels in a Layer 2 DC with Integrated Routing Bridging Connectivity on the DGW
EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
EVPN for MPLS Tunnels in E-LAN Services
EVPN for MPLS Tunnels in E-Line Services
EVPN for MPLS Tunnels in E-Tree Services
EVPN for PBB over MPLS Tunnels (PBB-EVPN)
EVPN for VXLAN Tunnels and Cloud Technologies
VXLAN
VXLAN ECMP and LAG
VXLAN VPLS Tag Handling
VXLAN MTU Considerations
VXLAN QoS
Ingress
Egress
VXLAN Ping
EVPN-VXLAN Routed VPLS Multicast Routing Support
IGMP and MLD Snooping on VXLAN
PIM Snooping on VXLAN
Static VXLAN Termination in Epipe Services
Static VXLAN Termination in VPLS/R-VPLS Services
Non-System IPv4 and IPv6 VXLAN Termination in VPLS, R-VPLS, and Epipe Services
EVPN for Overlay Tunnels
BGP-EVPN Control Plane for VXLAN Overlay Tunnels
EVPN for VXLAN in VPLS Services
Resiliency and BGP Multi-Homing
Use of BGP-EVPN, BGP-AD, and Sites in the Same VPLS Service
Use of the unknown-mac-route
EVPN for VXLAN in R-VPLS Services
EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
EVPN for VXLAN in EVPN Tunnel R-VPLS Services
EVPN-VPWS for VXLAN Tunnels
EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
EVPN for VXLAN in EVPN Tunnel R-VPLS Services
DGW integration with the Nuage Virtual Services Directory (VSD)
XMPP Interface on the DGW
Overview of the Static-Dynamic VSD Integration Model
VSD-Domains and Association to Static-Dynamic Services
VSD-Domain Type L2-DOMAIN
VSD-Domain Type L2-DOMAIN-IRB
VSD-Domain Type VRF-GRE
VSD-Domain Type VRF-VXLAN
Fully-Dynamic VSD Integration Model
Python Script Implementation Details
Provisioning Filters using the VSD Fully Dynamic Model
Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
Replicator (AR-R) Procedures
Leaf (AR-L) procedures
Assisted-Replication Interaction with Other VPLS Features
DGW Policy Based Forwarding/Routing to an EVPN ESI
Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
EVPN VXLAN Multihoming
Local Bias for EVPN VXLAN Multihoming
Known Limitations for Local Bias
Non-system IPv4 and IPv6 VXLAN Termination for EVPN VXLAN Multihoming
EVPN for MPLS Tunnels
BGP-EVPN Control Plane for MPLS Tunnels
EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
EVPN and VPLS Integration
EVPN Single-Active Multi-Homing and BGP-VPLS Integration
Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
EVPN Multi-Homing in VPLS Services
EVPN All-Active Multi-Homing
All-Active Multi-Homing Service Model
ES Discovery and DF Election Procedures
Aliasing
Network Failures and Convergence for All-Active Multi-Homing
Logical Failures on ESs and Blackholes
Transient Issues Caused by MAC Route Delays
EVPN Single-Active Multi-Homing
Single-Active Multi-Homing Service Model
ES and DF Election Procedures
Backup PE Function
Network Failures and Convergence for Single-Active Multi-Homing
EVPN ESI Type 1 Support
P2MP mLDP Tunnels for BUM Traffic in EVPN-MPLS Services
PBB-EVPN
BGP-EVPN Control Plane for PBB-EVPN
EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
EVPN Route Type 2 - MAC/IP Advertisement Route (or B-MAC Routes)
EVPN Route Type 4 - ES Route
PBB-EVPN for I-VPLS and PBB Epipe Services
Flood Containment for I-VPLS Services
PBB-EVPN and PBB-VPLS Integration
PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
System B-MAC Assignment in PBB-EVPN
PBB-EVPN All-Active Multi-Homing Service Model
Network failures and convergence for all-active multi-homing
PBB-EVPN Single-Active Multi-Homing Service Model
Network Failures and Convergence for Single-Active Multihoming
PBB-Epipes and EVPN Multi-Homing
PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
PBB-EVPN ISID-Based C-MAC Flush
PBB-EVPN ISID-based Route Targets
EVPN-VPWS for MPLS Tunnels
BGP-EVPN Control Plane for EVPN-VPWS
EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
PW Ports-based ESs for EVPN-VPWS
EVPN-VPWS Services with Local-Switching Support
Example-1:
Example-2
Example-3
EVPN for MPLS Tunnels in Routed VPLS Services
EVPN-MPLS Multi-Homing and Passive VRRP
Virtual Ethernet Segments
Preference-Based and Non-Revertive DF Election
EVPN-MPLS Routed VPLS Multicast Routing Support
IGMP Snooping in EVPN-MPLS and PBB EVPN Services
Data-driven IGMP Snooping Synchronization with EVPN Multihoming
PIM Snooping for IPv4 in EVPN-MPLS and PBB-EVPN Services
Data-driven PIM Snooping for IPv4 Synchronization with EVPN Multihoming
EVPN E-Tree
BGP EVPN Control Plane for EVPN E-Tree
EVPN for MPLS Tunnels in E-Tree Services
EVPN E-Tree Operation
EVPN E-Tree Known Unicast Ingress Filtering
EVPN E-Tree BUM Egress Filtering
EVPN E-Tree Egress Filtering Based on MAC Source Address
EVPN E-Tree and EVPN Multi-homing
PBB-EVPN E-Tree Services
MPLS Entropy Label and Hash Label
Inter-AS Option B and Next-Hop-Self Route-Reflector for EVPN-MPLS
Inter-AS Option B and VPN-NH-RR Procedures on EVPN Routes
BUM Traffic in Inter-AS Option B and VPN-NH-RR Networks
EVPN Multi-Homing in Inter-AS Option B and VPN-NH-RR Networks
EVPN E-Tree in Inter-AS Option B and VPN-NH-RR Networks
ECMP for EVPN-MPLS Destinations
IPv6 tunnel resolution for EVPN MPLS Services
EVPN Multi-Homing Support for MPLS Tunnels Resolved to Non-system IPv4/IPv6 Addresses
EVPN for SRv6 Tunnels
General EVPN Topics
ARP/ND Snooping and Proxy Support
Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
Proxy-ND and the Router Flag in Neighbor Advertisement Messages
Procedure to Add the R Flag to a Specified Entry
Proxy-ARP/ND Mac-List for Dynamic Entries
BGP-EVPN MAC-Mobility
BGP-EVPN MAC-Duplication
Conditional Static MAC and Protection
Auto-Learn MAC Protect and Restricting Protected Source MACs
Blackhole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
Blackhole MAC for EVPN Loop Detection
CFM Interaction with EVPN Services
Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS/R-VPLS Service
BGP-EVPN Routes in Services Configured with Two BGP Instances
Anycast Redundant Solution for Dual BGP Instance Services
Using P2MP mLDP in Redundant Anycast DC GWs
Interconnect Ethernet-Segment Solution for Dual BGP Instance Services
BGP-EVPN Routes on Dual BGP-Instance Services with I-ES
Single-Active Multi-Homing on I-ES
All-Active Multi-Homing on I-ES
Configuring Multi-Instance EVPN-VXLAN in the Same VPLS/R-VPLS Service
BGP-EVPN Routes in Multi-Instance EVPN-VXLAN Services
Anycast Redundant Solution for Multi-Instance EVPN-VXLAN Services
Interconnect Ethernet-Segment Solution for Dual BGP EVPN VXLAN Instance Services
Configuring Static VXLAN and EVPN in the Same VPLS/R-VPLS Service
EVPN IP-Prefix Route Interoperability
Interface-ful IP-VRF-to-IP-VRF with SBD IRB Model
Interface-ful IP-VRF-to-IP-VRF with Unnumbered SBD IRB Model
Interoperable Interface-less IP-VRF-to-IP-VRF Model (Ethernet Encapsulation)
Interface-less IP-VRF-to-IP-VRF Model (IP encapsulation) for MPLS Tunnels
ARP-ND Host Routes for Extended Layer 2 Data Centers
EVPN Host Mobility Procedures within the Same R-VPLS Service
EVPN Host Mobility Configuration
Host Mobility Case 1
Host Mobility Case 2
Host Mobility Case 3
BGP and EVPN Route Selection for EVPN Routes
LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
Oper-Groups Interaction with EVPN Services
LAG-Based LLF for EVPN-VPWS Services
Core Isolation Blackhole Avoidance
LAG Standby Signaling to the CE on Non-DF EVPN PEs (Single-Active)
AC-Influenced DF Election Capability on an ES with oper-group
EVPN Layer-3 Optimized Inter-Subnet Multicast (OISM)
Introduction and Terminology
OISM Forwarding Plane
OISM Control Plane
EVPN OISM and Multi-Homing
EVPN OISM Configuration Guidelines
Use of mLDP in OISM
Example of mLDP in OISM
EVPN Layer-2 Multicast (IGMP/MLD Proxy)
Interaction of EVPN and Other Features
Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
Interaction of PBB-EVPN with Existing VPLS Features
Interaction of VXLAN, EVPN-VXLAN and EVPN-MPLS with Existing VPRN or IES Features
Interaction of EVPN with BGP Owners in the Same VPRN Service
Interworking of EVPN-IFL and IPVPN in the Same VPRN
Route Selection Across EVPN-IFL and Other Owners in the VPRN Service
Route Selection for EVPN-IFF Routes in the VPRN Service
BGP Path Attribute Propagation
Configuration Examples
Example 1 - Stitching IPVPN and EVPN-IFL Domains
Example 2 - Propagation of BGP Path Attributes for EVPN-IFF
Routing Policies for BGP EVPN Routes
Routing Policies for BGP EVPN IP Prefixes
Configuring an EVPN Service with CLI
EVPN-VXLAN Configuration Examples
Layer 2 PE Example
EVPN for VXLAN in R-VPLS Services Example
EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
EVPN-MPLS Configuration Examples
EVPN All-active Multi-homing Example
EVPN Single-active Multi-homing Example
PBB-EVPN Configuration Examples
PBB-EVPN All-active Multi-homing Example
PBB-EVPN Single-Active Multi-Homing Example
Pseudowire Ports
Overview
PW Port Bound to a Physical Port
FPE-Based PW Port
Cross-Connect Between the External PW and the FPE-Based PW-Port
PXC-Based PW-Port — Building the Cross-Connect
Building the Internal Transport Tunnel
Mapping the External PW to the PW-Port
Terminating the Service on PW-SAP
FPE-Based PW-port Operational State
QoS
Preservation of Forwarding Class Across PXC
Statistics on the FPE based PW-Port
Intra-Chassis Redundancy Models for PXC-Based PW Port
PW Ports and MTU
MSS and PW Ports
Configuration Examples
Concurrent Scheduling QoS Mechanisms on a PW Port
Show Command Examples
L2oGRE Termination on FPE-Based PW Port
L2oGRE Packet Format
GRE Delivery Protocol
Tracking Payloads and Service Termination Points
Plain L3 termination
Layer 2 Termination
ESM Termination
Configuration Steps
Fragmentation and MTU Configuration
Reassembly
VSR Pseudowire Ports
Flex PW Ports
PW Port List
Failover Times
QoS
PW Port Termination for Various Tunnel Types
MPLS-Based Spoke SDP
Provisioning
Flex PW-Port Operational State for MPLS Based Spoke SDP
Statistics
L2oGRE-Based Spoke SDP
Provisioning
Flex PW-Port Operational State for L2oGRE-Based Spoke SDP
Reassembly
Standards and Protocol Support
Customer Documentation and Product Support
Layer 3 Services Guide: IES and VPRN Services Release 21.7.R1
Legal notice
Getting Started
About This Guide
Layer 3 Services Configuration Process
Internet Enhanced Service
IES Service Overview
IES Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP Interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
IES IP Interface Applicability
Subscriber Interfaces
IPv6 Enhanced Subscriber Management (ESM)
RADIUS Accounting
RADIUS Connectivity
RADIUS Connectivity on VPRN or GRT
RADIUS Support for IPv6 Server Connectivity
Common Backend RADIUS Server Support
Authentication and Accounting RADIUS Server
Accounting Considerations for Per-Host Configurations
SAPs
Encapsulations
ATM SAP Encapsulations for IES
Pseudowire SAPs
Encapsulation
Pseudowire SAP Configuration
QoS for Pseudowire Ports and Pseudowire SAPs
Shaping and Bandwidth Control
Lag Considerations
Last Mile Packet Size Adjustment
Redundancy with Pseudowire SAPs
Operational Group Support for PW Ports
Routing Protocols
CPE Connectivity Check
QoS Policies
Filter Policies
MPLS Entropy Label and Hash Label
Spoke SDPs
SRRP
SRRP Messaging
SRRP and Multi-Chassis Synchronization
SRRP Instance
SRRP Instance MCS Key
Containing Service Type and ID
Containing Subscriber IP Interface Name
Subscriber Subnet Information
Containing Group IP Interface Information
Remote Redundant IP Interface Mismatch
Remote Sending Redundant IP Interface Unavailable
Remote SRRP Advertisement SAP Non-existent
Remote Sending Local Receive SRRP Advertisement SAP Unavailable
Local and Remote Dual Master Detected
Subscriber Subnet Owned IP Address Connectivity
Subscriber Subnet SRRP Gateway IP Address Connectivity
Receive SRRP Advertisement SAP and Anti-Spoof
BFD with SRRP/VRRP
Configuring an IES Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring IES Components
Configuring an IES Service
Configuring IES Subscriber Interface Parameters
Configuring IES Interface Parameters
Configuring Spoke-SDP Parameters
Configuring SAP Parameters
Configuring IES SAP ATM Parameters
Configuring VRRP
Configuring IPsec Parameters
IGMP Host Tracking
Service Management Tasks
Modifying IES Service Parameters
Deleting a Spoke-SDP
Deleting an IES Service
Disabling an IES Service
Re-Enabling an IES Service
Virtual Private Routed Network Service
VPRN Service Overview
Routing Prerequisites
Core MP-BGP Support
Route Distinguishers
eiBGP Load Balancing
Route Reflector
CE to PE Route Exchange
Route Redistribution
CPE Connectivity Check
Constrained Route Distribution (RT Constraint)
Constrained VPN Route Distribution Based on Route Targets
Configuring the Route Target Address Family
Originating RT Constraint Routes
Receiving and Re-Advertising RT Constraint Routes
Using RT Constraint Routes
BGP Fast Reroute in a VPRN
BGP Fast Reroute in a VPRN Configuration
BGP Best-External in a VPRN Context
VPRN Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
VPRN IP Interface Applicability
Subscriber Interfaces
SAPs
Encapsulations
ATM SAP Encapsulations for VPRN Services
Pseudowire SAPs
QoS Policies
Filter Policies
DSCP Marking
Default DSCP Mapping Table
Configuration of TTL Propagation for VPRN Routes
CE to PE Routing Protocols
PE to PE Tunneling Mechanisms
Per VRF Route Limiting
Spoke SDPs
T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
Spoke SDP Redundancy into IES/VPRN
Weighted ECMP for Spoke-SDPs Terminating on IES/VPRN and R-VPLS Interfaces
IP-VPNs
Using OSPF in IP-VPNs
IPCP Subnet Negotiation
Cflowd for IP-VPNs
Inter-AS VPRNs
VPRN Label Security at Inter-AS Boundary
Feature Configuration
CPM Behavior
Data Path Forwarding Behavior
Carrier Supporting Carrier (CSC)
Terminology
CSC Connectivity Models
CSC-PE Configuration and Operation
CSC Interface
QoS
MPLS
CSC VPRN Service Configuration
Node Management Using VPRN
VPRN Management
AAA Management
SNMP Management
Events and Notifications
DNS Resolution
Traffic Leaking to GRT
Management via VPRN using GRT Leaking
Traffic Leaking from VPRN to GRT for IPv6
RIP Metric Propagation in VPRNs
NTP Within a VPRN Service
PTP Within a VPRN Service
VPN Route Label Allocation
Configuring the Service Label Mode
Restrictions and Usage Notes
VPRN Support for BGP FlowSpec
MPLS Entropy Label and Hash Label
LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
Route Leaking from the Global Route Table to VPRN Instances
Class-Based Forwarding of VPN-v4/v6 Prefixes over RSVP-TE or SR-TE LSPs
Feature Configuration
Feature Behavior
QoS on Ingress Bindings
Multicast in IP-VPN Applications
Use of Data MDTs
Multicast Protocols Supported in the Provider Network
MVPN Membership Auto-discovery using BGP
PE-PE Transmission of C-Multicast Routing using BGP
VRF Route Import Extended Community
Provider Tunnel Support
Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
P2MP RSVP-TE I-PMSI and S-PMSI
P2MP LDP I-PMSI and S-PMSI
Wildcard (C-*, C-*) P2MP LSP S-PMSI
P2MP LSP S-PMSI
Dynamic Multicast Signaling over P2MP LDP in VRF
MVPN Sender-only/Receiver-only
S-PMSI Trigger Thresholds
Migration from Existing Rosen Implementation
Policy-based S-PMSI
Supported MPLS Tunnels
Supported Multicast Features
In-service Changes to Multi-stream S-PMSI
Configuration Example
Policy-based Data MDT
MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
Multicast VPN Extranet
Multicast Extranet for Rosen MVPN for PIM SSM
Multicast Extranet for NG-MVPN for PIM SSM
Multicast Extranet with Per-group Mapping for PIM SSM
Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
Multicast Extranet with Per-group Mapping for PIM ASM
Non-Congruent Unicast and Multicast Topologies for Multicast VPN
Automatic Discovery of Group-to-RP Mappings (Auto-RP)
IPv6 MVPN Support
Multicast Core Diversity for Rosen MDT_SAFI MVPNs
NG-MVPN Core Diversity
NG-MVPN to Loopback Interface
NG-MVPN Core Diversity
Configuration Example
NG-MVPN Multicast Source Geo-Redundancy
Multicast Core Diversity for Rosen MDT SAFI MVPNs
Inter-AS MVPN
BGP Connector Attribute
PIM RPF Vector
Inter-AS MVPN Option B
Inter-AS MVPN Option C
NG-MVPN Non-segmented Inter-AS Solution
Non-Segmented d-mLDP and Inter-AS VPN
Inter-AS Option A
Inter-AS Option B
Inter-AS Option C
Inter-AS Option C support for NG-MVPN
Configuration Example
Inter-AS Non-segmented MLDP
ECMP
mLDP Non-Segmented Intra-AS (inter-area) MVPN Solution
Intra-AS and Inter-AS Option B
MVPN Next-Hop Self on ABRs
MVPN next-hop-self Policy Example
LDP Configuration Example
BGP Configuration Example
Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
UMH Redundancy Using Bandwidth Monitoring
Fault Recovery Mitigation at PMSI Switchover Time
S-PMSI Behavior
Bandwidth Monitoring on Single IOMs
ASM Behavior
Low Traffic Rate
Revertive Timer
FIB Prioritization
Configuring a VPRN Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPRN Components
Creating a VPRN Service
Configuring Global VPRN Parameters
Configuring VPRN Log Parameters
Configuring a Spoke-SDP
Configuring VPRN Protocols - PIM
Configuring Router Interfaces
Configuring VPRN Protocols - BGP
Configuring VPRN BGP Group and Neighbor Parameters
Configuring Route Reflection
Configuring BGP Confederations
VPRN BGP CLI Syntax
Configuring VPRN Protocols - RIP
VPRN RIP CLI Syntax
Configuring VPRN Protocols - OSPF
VPRN OSPF CLI Syntax
Configuring a VPRN Interface
Configuring Overload State on a Single SFM
Configuring a VPRN Interface SAP
Service Management Tasks
Modifying VPRN Service Parameters
Deleting a VPRN Service
Disabling a VPRN Service
Re-enabling a VPRN Service
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting Started
About This Guide
Layer 3 Services Configuration Process
Internet Enhanced Service
IES Service Overview
IES Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP Interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
IES IP Interface Applicability
Subscriber Interfaces
IPv6 Enhanced Subscriber Management (ESM)
RADIUS Accounting
RADIUS Connectivity
RADIUS Connectivity on VPRN or GRT
RADIUS Support for IPv6 Server Connectivity
Common Backend RADIUS Server Support
Authentication and Accounting RADIUS Server
Accounting Considerations for Per-Host Configurations
SAPs
Encapsulations
ATM SAP Encapsulations for IES
Pseudowire SAPs
Encapsulation
Pseudowire SAP Configuration
QoS for Pseudowire Ports and Pseudowire SAPs
Shaping and Bandwidth Control
Lag Considerations
Last Mile Packet Size Adjustment
Redundancy with Pseudowire SAPs
Operational Group Support for PW Ports
Routing Protocols
CPE Connectivity Check
QoS Policies
Filter Policies
MPLS Entropy Label and Hash Label
Spoke SDPs
SRRP
SRRP Messaging
SRRP and Multi-Chassis Synchronization
SRRP Instance
SRRP Instance MCS Key
Containing Service Type and ID
Containing Subscriber IP Interface Name
Subscriber Subnet Information
Containing Group IP Interface Information
Remote Redundant IP Interface Mismatch
Remote Sending Redundant IP Interface Unavailable
Remote SRRP Advertisement SAP Non-existent
Remote Sending Local Receive SRRP Advertisement SAP Unavailable
Local and Remote Dual Master Detected
Subscriber Subnet Owned IP Address Connectivity
Subscriber Subnet SRRP Gateway IP Address Connectivity
Receive SRRP Advertisement SAP and Anti-Spoof
BFD with SRRP/VRRP
Configuring an IES Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring IES Components
Configuring an IES Service
Configuring IES Subscriber Interface Parameters
Configuring IES Interface Parameters
Configuring Spoke-SDP Parameters
Configuring SAP Parameters
Configuring IES SAP ATM Parameters
Configuring VRRP
Configuring IPsec Parameters
IGMP Host Tracking
Service Management Tasks
Modifying IES Service Parameters
Deleting a Spoke-SDP
Deleting an IES Service
Disabling an IES Service
Re-Enabling an IES Service
Virtual Private Routed Network Service
VPRN Service Overview
Routing Prerequisites
Core MP-BGP Support
Route Distinguishers
eiBGP Load Balancing
Route Reflector
CE to PE Route Exchange
Route Redistribution
CPE Connectivity Check
Constrained Route Distribution (RT Constraint)
Constrained VPN Route Distribution Based on Route Targets
Configuring the Route Target Address Family
Originating RT Constraint Routes
Receiving and Re-Advertising RT Constraint Routes
Using RT Constraint Routes
BGP Fast Reroute in a VPRN
BGP Fast Reroute in a VPRN Configuration
BGP Best-External in a VPRN Context
VPRN Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
VPRN IP Interface Applicability
Subscriber Interfaces
SAPs
Encapsulations
ATM SAP Encapsulations for VPRN Services
Pseudowire SAPs
QoS Policies
Filter Policies
DSCP Marking
Default DSCP Mapping Table
Configuration of TTL Propagation for VPRN Routes
CE to PE Routing Protocols
PE to PE Tunneling Mechanisms
Per VRF Route Limiting
Spoke SDPs
T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
Spoke SDP Redundancy into IES/VPRN
Weighted ECMP for Spoke-SDPs Terminating on IES/VPRN and R-VPLS Interfaces
IP-VPNs
Using OSPF in IP-VPNs
IPCP Subnet Negotiation
Cflowd for IP-VPNs
Inter-AS VPRNs
VPRN Label Security at Inter-AS Boundary
Feature Configuration
CPM Behavior
Data Path Forwarding Behavior
Carrier Supporting Carrier (CSC)
Terminology
CSC Connectivity Models
CSC-PE Configuration and Operation
CSC Interface
QoS
MPLS
CSC VPRN Service Configuration
Node Management Using VPRN
VPRN Management
AAA Management
SNMP Management
Events and Notifications
DNS Resolution
Traffic Leaking to GRT
Management via VPRN using GRT Leaking
Traffic Leaking from VPRN to GRT for IPv6
RIP Metric Propagation in VPRNs
NTP Within a VPRN Service
PTP Within a VPRN Service
VPN Route Label Allocation
Configuring the Service Label Mode
Restrictions and Usage Notes
VPRN Support for BGP FlowSpec
MPLS Entropy Label and Hash Label
LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
Route Leaking from the Global Route Table to VPRN Instances
Class-Based Forwarding of VPN-v4/v6 Prefixes over RSVP-TE or SR-TE LSPs
Feature Configuration
Feature Behavior
QoS on Ingress Bindings
Multicast in IP-VPN Applications
Use of Data MDTs
Multicast Protocols Supported in the Provider Network
MVPN Membership Auto-discovery using BGP
PE-PE Transmission of C-Multicast Routing using BGP
VRF Route Import Extended Community
Provider Tunnel Support
Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
P2MP RSVP-TE I-PMSI and S-PMSI
P2MP LDP I-PMSI and S-PMSI
Wildcard (C-*, C-*) P2MP LSP S-PMSI
P2MP LSP S-PMSI
Dynamic Multicast Signaling over P2MP LDP in VRF
MVPN Sender-only/Receiver-only
S-PMSI Trigger Thresholds
Migration from Existing Rosen Implementation
Policy-based S-PMSI
Supported MPLS Tunnels
Supported Multicast Features
In-service Changes to Multi-stream S-PMSI
Configuration Example
Policy-based Data MDT
MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
Multicast VPN Extranet
Multicast Extranet for Rosen MVPN for PIM SSM
Multicast Extranet for NG-MVPN for PIM SSM
Multicast Extranet with Per-group Mapping for PIM SSM
Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
Multicast Extranet with Per-group Mapping for PIM ASM
Non-Congruent Unicast and Multicast Topologies for Multicast VPN
Automatic Discovery of Group-to-RP Mappings (Auto-RP)
IPv6 MVPN Support
Multicast Core Diversity for Rosen MDT_SAFI MVPNs
NG-MVPN Core Diversity
NG-MVPN to Loopback Interface
NG-MVPN Core Diversity
Configuration Example
NG-MVPN Multicast Source Geo-Redundancy
Multicast Core Diversity for Rosen MDT SAFI MVPNs
Inter-AS MVPN
BGP Connector Attribute
PIM RPF Vector
Inter-AS MVPN Option B
Inter-AS MVPN Option C
NG-MVPN Non-segmented Inter-AS Solution
Non-Segmented d-mLDP and Inter-AS VPN
Inter-AS Option A
Inter-AS Option B
Inter-AS Option C
Inter-AS Option C support for NG-MVPN
Configuration Example
Inter-AS Non-segmented MLDP
ECMP
mLDP Non-Segmented Intra-AS (inter-area) MVPN Solution
Intra-AS and Inter-AS Option B
MVPN Next-Hop Self on ABRs
MVPN next-hop-self Policy Example
LDP Configuration Example
BGP Configuration Example
Weighted ECMP and ECMP for VPRN IPv4 and IPv6 over MPLS LSPs
UMH Redundancy Using Bandwidth Monitoring
Fault Recovery Mitigation at PMSI Switchover Time
S-PMSI Behavior
Bandwidth Monitoring on Single IOMs
ASM Behavior
Low Traffic Rate
Revertive Timer
FIB Prioritization
Configuring a VPRN Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPRN Components
Creating a VPRN Service
Configuring Global VPRN Parameters
Configuring VPRN Log Parameters
Configuring a Spoke-SDP
Configuring VPRN Protocols - PIM
Configuring Router Interfaces
Configuring VPRN Protocols - BGP
Configuring VPRN BGP Group and Neighbor Parameters
Configuring Route Reflection
Configuring BGP Confederations
VPRN BGP CLI Syntax
Configuring VPRN Protocols - RIP
VPRN RIP CLI Syntax
Configuring VPRN Protocols - OSPF
VPRN OSPF CLI Syntax
Configuring a VPRN Interface
Configuring Overload State on a Single SFM
Configuring a VPRN Interface SAP
Service Management Tasks
Modifying VPRN Service Parameters
Deleting a VPRN Service
Disabling a VPRN Service
Re-enabling a VPRN Service
Standards and Protocol Support
Customer Documentation and Product Support
Log Events Tool
Log Events Tool
Log Events Tool
MD-CLI Command Reference Guide 21.7.R1
Overview
1. MD-CLI Command Reference
1.1. MD-CLI Tree Hierarchy
1.2. MD-CLI Command Descriptions
Operational Commands
2. admin Commands
2.1. admin Command Descriptions
3. Configuration Mode Commands
3.1. Configuration Mode Descriptions
4. environment Commands
4.1. environment Command Descriptions
5. file Commands
5.1. file Command Descriptions
6. Global Commands
6.1. Global Command Descriptions
7. Output Modifier Commands
7.1. Output Modifier Command Descriptions
Configuration Commands
8. aaa Commands
8.1. aaa Command Descriptions
9. aps Commands
9.1. aps Command Descriptions
10. bfd Commands
10.1. bfd Command Descriptions
11. bmp Commands
11.1. bmp Command Descriptions
12. bof Commands
12.1. bof Command Descriptions
13. call-trace Commands
13.1. call-trace Command Descriptions
14. card Commands
14.1. card Command Descriptions
15. cflowd Commands
15.1. cflowd Command Descriptions
16. chassis Commands
16.1. chassis Command Descriptions
17. connection-profile Commands
17.1. connection-profile Command Descriptions
18. debug Commands
18.1. debug Command Descriptions
19. esa Commands
19.1. esa Command Descriptions
20. eth-cfm Commands
20.1. eth-cfm Command Descriptions
21. eth-ring Commands
21.1. eth-ring Command Descriptions
22. filter Commands
22.1. filter Command Descriptions
23. fwd-path-ext Commands
23.1. fwd-path-ext Command Descriptions
24. ipsec Commands
24.1. ipsec Command Descriptions
25. isa Commands
25.1. isa Command Descriptions
26. lag Commands
26.1. lag Command Descriptions
27. li Commands
27.1. li Command Descriptions
28. log Commands
28.1. log Command Descriptions
29. macsec Commands
29.1. macsec Command Descriptions
30. mcac Commands
30.1. mcac Command Descriptions
31. mirror Commands
31.1. mirror Command Descriptions
32. multicast-management Commands
32.1. multicast-management Command Descriptions
33. multilink-bundle Commands
33.1. multilink-bundle Command Descriptions
34. oam-pm Commands
34.1. oam-pm Command Descriptions
35. openflow Commands
35.1. openflow Command Descriptions
36. policy-options Commands
36.1. policy-options Command Descriptions
37. port Commands
37.1. port Command Descriptions
38. port-policy Commands
38.1. port-policy Command Descriptions
39. port-xc Commands
39.1. port-xc Command Descriptions
40. pw-port Commands
40.1. pw-port Command Descriptions
41. python Commands
41.1. python Command Descriptions
42. qos Commands
42.1. qos Command Descriptions
43. redundancy Commands
43.1. redundancy Command Descriptions
44. router Commands
44.1. router Command Descriptions
45. routing-options Commands
45.1. routing-options Command Descriptions
46. saa Commands
46.1. saa Command Descriptions
47. satellite Commands
47.1. satellite Command Descriptions
48. service Commands
48.1. service Command Descriptions
49. sfm Commands
49.1. sfm Command Descriptions
50. subscriber-mgmt Commands
50.1. subscriber-mgmt Command Descriptions
51. system Commands
51.1. system Command Descriptions
52. test-oam Commands
52.1. test-oam Command Descriptions
53. vrrp Commands
53.1. vrrp Command Descriptions
Deprecated and Obsolete Commands
54. Deprecated Commands
54.1. 21.7.R1
55. Obsolete Commands
55.1. 21.2.R1
55.2. 21.5.R1
Customer Document and Product Support
Overview
1. MD-CLI Command Reference
1.1. MD-CLI Tree Hierarchy
1.2. MD-CLI Command Descriptions
Operational Commands
2. admin Commands
2.1. admin Command Descriptions
3. Configuration Mode Commands
3.1. Configuration Mode Descriptions
4. environment Commands
4.1. environment Command Descriptions
5. file Commands
5.1. file Command Descriptions
6. Global Commands
6.1. Global Command Descriptions
7. Output Modifier Commands
7.1. Output Modifier Command Descriptions
Configuration Commands
8. aaa Commands
8.1. aaa Command Descriptions
9. aps Commands
9.1. aps Command Descriptions
10. bfd Commands
10.1. bfd Command Descriptions
11. bmp Commands
11.1. bmp Command Descriptions
12. bof Commands
12.1. bof Command Descriptions
13. call-trace Commands
13.1. call-trace Command Descriptions
14. card Commands
14.1. card Command Descriptions
15. cflowd Commands
15.1. cflowd Command Descriptions
16. chassis Commands
16.1. chassis Command Descriptions
17. connection-profile Commands
17.1. connection-profile Command Descriptions
18. debug Commands
18.1. debug Command Descriptions
19. esa Commands
19.1. esa Command Descriptions
20. eth-cfm Commands
20.1. eth-cfm Command Descriptions
21. eth-ring Commands
21.1. eth-ring Command Descriptions
22. filter Commands
22.1. filter Command Descriptions
23. fwd-path-ext Commands
23.1. fwd-path-ext Command Descriptions
24. ipsec Commands
24.1. ipsec Command Descriptions
25. isa Commands
25.1. isa Command Descriptions
26. lag Commands
26.1. lag Command Descriptions
27. li Commands
27.1. li Command Descriptions
28. log Commands
28.1. log Command Descriptions
29. macsec Commands
29.1. macsec Command Descriptions
30. mcac Commands
30.1. mcac Command Descriptions
31. mirror Commands
31.1. mirror Command Descriptions
32. multicast-management Commands
32.1. multicast-management Command Descriptions
33. multilink-bundle Commands
33.1. multilink-bundle Command Descriptions
34. oam-pm Commands
34.1. oam-pm Command Descriptions
35. openflow Commands
35.1. openflow Command Descriptions
36. policy-options Commands
36.1. policy-options Command Descriptions
37. port Commands
37.1. port Command Descriptions
38. port-policy Commands
38.1. port-policy Command Descriptions
39. port-xc Commands
39.1. port-xc Command Descriptions
40. pw-port Commands
40.1. pw-port Command Descriptions
41. python Commands
41.1. python Command Descriptions
42. qos Commands
42.1. qos Command Descriptions
43. redundancy Commands
43.1. redundancy Command Descriptions
44. router Commands
44.1. router Command Descriptions
45. routing-options Commands
45.1. routing-options Command Descriptions
46. saa Commands
46.1. saa Command Descriptions
47. satellite Commands
47.1. satellite Command Descriptions
48. service Commands
48.1. service Command Descriptions
49. sfm Commands
49.1. sfm Command Descriptions
50. subscriber-mgmt Commands
50.1. subscriber-mgmt Command Descriptions
51. system Commands
51.1. system Command Descriptions
52. test-oam Commands
52.1. test-oam Command Descriptions
53. vrrp Commands
53.1. vrrp Command Descriptions
Deprecated and Obsolete Commands
54. Deprecated Commands
54.1. 21.7.R1
55. Obsolete Commands
55.1. 21.2.R1
55.2. 21.5.R1
Customer Document and Product Support
MD-CLI Quick Reference Guide
Legal notice
MD-CLI Overview
Enabling the SR OS MD-CLI
Disabling the SR OS MD-CLI
Navigational and Operational Commands
Entering and Leaving the Configuration Workflow
Configuration Workflow Commands
Output Modifiers
Customer Documentation and Product Support
Legal notice
MD-CLI Overview
Enabling the SR OS MD-CLI
Disabling the SR OS MD-CLI
Navigational and Operational Commands
Entering and Leaving the Configuration Workflow
Configuration Workflow Commands
Output Modifiers
Customer Documentation and Product Support
MD-CLI User Guide Release 21.7.R1
Legal notice
MD-CLI Overview
Using the MD-CLI
Switching Between the Classic CLI and MD-CLI Engines
Navigating in the MD-CLI
The MD-CLI Tree Structure
The MD-CLI Command Prompt
Environment Commands
Using Online Help
Available Commands
Navigating the MD-CLI Hierarchy Levels
Using the tree Command
Using Control Characters and Editing Keystrokes on the Command Line
Displaying Available Commands using Tab
Using Command Completion
Modifying the Idle Timeout Value for CLI Sessions
Using Output Modifiers in the MD-CLI
Navigating Contexts in the MD-CLI
Executing Commands from a File
Displaying Information in the MD-CLI
Using the info Command
Using show Commands
Displaying Configuration with admin Commands
Specifying Paths in MD-CLI Commands
Configuring in the MD-CLI
Configuration Workflow
Candidate Configuration Modes
Modifying the Configuration
Adding Configuration Elements
Deleting Configuration Elements
Copying Configuration Elements
Commenting Configuration Elements
Committing a Configuration
Saving Changes
Rolling Back a Configuration from a Checkpoint File
Loading a Configuration File
Using Configuration Groups
Viewing the Status of the Local Datastores
Displaying State Information in the MD-CLI
Creating MD-CLI Configuration from the Classic CLI
Creating MD-CLI Configuration from the Classic CLI Procedure
MD-CLI Configuration Example Output
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
MD-CLI Overview
Using the MD-CLI
Switching Between the Classic CLI and MD-CLI Engines
Navigating in the MD-CLI
The MD-CLI Tree Structure
The MD-CLI Command Prompt
Environment Commands
Using Online Help
Available Commands
Navigating the MD-CLI Hierarchy Levels
Using the tree Command
Using Control Characters and Editing Keystrokes on the Command Line
Displaying Available Commands using Tab
Using Command Completion
Modifying the Idle Timeout Value for CLI Sessions
Using Output Modifiers in the MD-CLI
Navigating Contexts in the MD-CLI
Executing Commands from a File
Displaying Information in the MD-CLI
Using the info Command
Using show Commands
Displaying Configuration with admin Commands
Specifying Paths in MD-CLI Commands
Configuring in the MD-CLI
Configuration Workflow
Candidate Configuration Modes
Modifying the Configuration
Adding Configuration Elements
Deleting Configuration Elements
Copying Configuration Elements
Commenting Configuration Elements
Committing a Configuration
Saving Changes
Rolling Back a Configuration from a Checkpoint File
Loading a Configuration File
Using Configuration Groups
Viewing the Status of the Local Datastores
Displaying State Information in the MD-CLI
Creating MD-CLI Configuration from the Classic CLI
Creating MD-CLI Configuration from the Classic CLI Procedure
MD-CLI Configuration Example Output
Standards and Protocol Support
Customer Documentation and Product Support
MPLS Guide Release 21.7.R1
Legal notice
Getting Started
About This Guide
Nokia Router Configuration Process
MPLS and RSVP
MPLS
MPLS Label Stack
Label Values
Reserved Label Blocks
MPLS Entropy Label and Hash Label
Hash Label
Entropy Label
Inserting and Processing the Entropy Label at LERs and LSRs
Ingress LER
LSR
Egress LER
Mapping Entropy Label Capability at LSP Stitching Points
Entropy Label on OAM Packets
Impact of EL and ELI on MTU and Label Stack Depth
Label Switching Routers
LSP Types
Bidirectional Forwarding Detection for MPLS LSPs
Bootstrapping and Maintaining the BFD Session
LSP BFD Configuration
Enabling and Implementing Limits for LSP BFD on a Node
BFD Configuration on RSVP-TE LSPs
Using LSP BFD for LSP Path Protection
Failure-action down
Failure-action failover
LSP Active Path Failover Triggers
MPLS/RSVP on Broadcast Interface
MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
Manual Bypass LSP
PLR Bypass LSP Selection Rules
FRR Facility Background Evaluation Task
Uniform FRR Failover Time
Automatic Bandwidth Allocation for RSVP LSPs
Enabling and Disabling Auto-Bandwidth Allocation on an LSP
Autobandwidth on LSPs with Secondary or Secondary Standby Paths
Measurement of LSP Bandwidth
Passive Monitoring of LSP Bandwidth
Periodic Automatic Bandwidth Adjustment
Overflow-Triggered Auto-Bandwidth Adjustment
Manually-Triggered Auto-Bandwidth Adjustment
Operational Bandwidth Carryover between Active Paths
LSP Failure Codes
Labeled Traffic Statistics
Interface Statistics
Traffic Statistics for Stacked Tunnels
Traffic Statistics Details and Scale
RSVP-TE and MPLS-TP Traffic Statistics
RSVP
Using RSVP for MPLS
RSVP Traffic Engineering Extensions for MPLS
Hello Protocol
MD5 Authentication of RSVP Interface
Configuring Authentication using Keychains
Reservation Styles
RSVP Message Pacing
RSVP Overhead Refresh Reduction
RSVP Graceful Restart Helper
Enhancements to RSVP Control Plane Congestion Control
BFD for RSVP-TE
RSVP-TE LSP Statistics
P2MP RSVP-TE LSP Statistics
Configuring RSVP P2MP LSP Egress Statistics
Configuring RSVP P2MP LSP Ingress Statistics
Configuring Implicit Null
Using Unnumbered Point-to-Point Interface in RSVP
Operation of RSVP FRR Facility Backup over Unnumbered Interface
MPLS Transport Profile
MPLS-TP Model
MPLS-TP Provider Edge and Gateway
VLL Services
Spoke SDP Termination
MPLS-TP LSR
Detailed Descriptions of MPLS-TP
MPLS-TP LSPs
MPLS-TP on Pseudowires
MPLS-TP Maintenance Identifiers
Generic Associated Channel
MPLS-TP Operations, Administration and Maintenance (OAM)
On-Demand Connectivity Verification (CV) using LSP-Ping
Proactive CC, CV and RDI
BFD-based RDI
PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
PW Control Channel Status Request Mechanism
Pseudowire Redundancy and Active / Standby Dual Homing
Lock Instruct and Loopback for MPLS-TP Pseudowires
MPLS-TP LSP Protection
Alarm Indication Signal (AIS)
Configuring MPLS-TP
Configuration Overview
Node-Wide MPLS-TP Parameter Configuration
Node-Wide MPLS-TP Identifier Configuration
Static LSP and Pseudowire (VC) Label and Tunnel Ranges
Interface Configuration for MPLS-TP
LER Configuration for MPLS-TP
LSP and Path Configuration
Support for Downstream Mapping Information
Proactive CC/CV (using BFD) Configuration
Protection templates and Linear Protection Configuration
Intermediate LSR Configuration for MPLS-TP LSPs
MPLS-TP Show Commands
Static MPLS Labels
MPLS-TP Tunnel Configuration
MPLS-TP Path configuration
MPLS-TP Protection
MPLS TP Node Configuration
MPLS-TP Interfaces
MPLS-TP Debug Commands
Traffic Engineering
TE Metric (IS-IS and OSPF)
Admin Group Support on Facility Bypass Backup LSP
Actions at Head-End Node
Actions at PLR Node
Manual and Timer Resignal of RSVP-TE Bypass LSP
RSVP-TE Bypass LSP Path SRLG Information Update in Manual and Timer Resignal MBB
RSVP-TE Bypass LSP Path Administrative Group Information Update in Manual and Timer Resignal MBB
RSVP-TE LSP Active Path Administrative Group Information Update in Timer Resignal MBB
Diff-Serv Traffic Engineering
Mapping of Traffic to a Diff-Serv LSP
Admission Control of Classes
Maximum Allocation Model
Russian Doll Model
Example CT Bandwidth Sharing with RDM
RSVP Control Plane Extensions
IGP Extensions
Diff-Serv TE Configuration and Operation
RSVP Protocol Level
RSVP Interface Level
LSP and LSP Path Levels
Diff-Serv TE LSP Class Type Change under Failure
LSP Primary Path Retry Procedures
Bandwidth Sharing Across Class Types
Downgrading the CT of Bandwidth Sharing LSP Paths
Upgrading the CT of Bandwidth Sharing LSP Paths
Advanced MPLS/RSVP Features
Extending RSVP LSP to use Loopback Interfaces Other than Router-id
LSP Path Change
Manual LSP Path Switch
Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
Automatic Creation of RSVP-TE LSP Mesh
Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
Feature Configuration
Feature Behavior
Multi-Area and Multi-Instance Support
Mesh LSP Name Encoding and Statistics
Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
Feature Configuration
Feature Behavior
IGP Shortcut and Forwarding Adjacency
IGP Shortcut Feature Configuration
IGP Shortcut Binding Construct
IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
Family Prefix Resolution and Tunnel Selection Rules
Application Support
Loop-free Alternate (LFA) Protection Support
SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
Family Prefix Resolution and Tunnel Selection Rules
Application Support
Loop-free Alternate (LFA) Protection Support
Using LSP Relative Metric with IGP Shortcut
ECMP Considerations
Handling of Control Packets
Forwarding Adjacency
SR Shortest Path Tunnel Over RSVP-TE Forwarding Adjacency
LDP Forwarding over IGP Shortcut
LDP Forwarding over Static Route Shortcut Tunnels
Handling of Multicast Packets
MPLS Entropy Label on Shortcut Tunnels
Disabling TTL Propagation in an LSP Shortcut
RSVP-TE LSP Signaling using LSP Template
Shared Risk Link Groups
Enabling Disjoint Backup Paths
SRLG Penalty Weights for Detour and Bypass LSPs
Static Configurations of SRLG Memberships
TE Graceful Shutdown
Soft Preemption of Diff-Serv RSVP LSP
Least-Fill Bandwidth Rule in CSPF ECMP Selection
Inter-Area TE LSP (ERO Expansion Method)
Area Border Node FRR Protection for Inter-Area LSP
Rerouting of Inter-Area LSP
Behavior of MPLS Options in Inter-Area LSP
Inter-Area LSP support of OSPF Virtual Links
Area Border Node FRR Protection for Inter-Area LSP
Timer-based Reversion for RSVP-TE LSPs
LSP Tagging and Auto-Bind Using Tag Information
Internal Route Color to LSP Color Matching Algorithm
LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
LSP Self-Ping
Detailed Behavior of LSP Self-Ping
Considerations for Scaled Scenarios
Accounting for Dark Bandwidth
Point-to-Multipoint (P2MP) RSVP LSP
Application in Video Broadcast
P2MP LSP Data Plane
Ingress LER Node
LSR Node
Branch LSR Node
Egress LER Node
BUD LSR Node
Ingress Path Management for P2MP LSP Packets
Ingress P2MP Path Management on XCM/IOM/IMMs
RSVP Control Plane in a P2MP LSP
Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
Procedures at Ingress LER Node
Procedures at Egress LER Node
Procedures with a Primary Tunnel Interface
MPLS Service Usage
Service Distribution Paths
MPLS/RSVP Configuration Process Overview
Configuration Notes
Configuring MPLS and RSVP with CLI
MPLS Configuration Overview
LSPs
Paths
Router Interface
Choosing the Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring Manual Bypass Tunnels
Configuring RSVP Parameters
Configure RSVP Message Pacing Parameters
Configuring Graceful Shutdown
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP Configuration Management Tasks
Modifying RSVP Parameters
Modifying RSVP Message Pacing Parameters
Deleting an Interface from RSVP
GMPLS
GMPLS
Example Applications
Use Case 1: Dynamic Connection Setup with Constraints
Use Case 2: Multi-Layer Resiliency
GMPLS UNI Architecture
Addressing and End-to-End gLSP Architecture
1830 PSS Identifiers
Recovery Reference Models
End to End Recovery (IP-layer)
End to End ECMP
End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
End to End Recovery (GMPLS Layer)
Unprotected gLSP
Full LSP Rerouting
1: N Protection
Optical Segment Recovery
GMPLS Configuration Overview
LMP and IPCC Configuration
Configuration of IP Communication Channels for LMP and RSVP
Configuring LMP
Configuring Traffic Engineering Links and Data Bearers
Configuring MPLS Paths for GMPLS
Configuring RSVP in GMPLS
Configuring a GMPLS LSP on the UNI
gLSP Constraints
Bandwidth
Shared Risk Link Groups
Optical Network Segment Recovery
Configuration of End-to-End GMPLS Recovery
GMPLS Tunnel Groups
Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
Configuration Notes
Label Distribution Protocol
Label Distribution Protocol
LDP and MPLS
LDP Architecture
Subsystem Interrelationships
Memory Manager and LDP
Label Manager
LDP Configuration
Logger
Service Manager
Execution Flow
Initialization
Session Lifetime
Adjacency Establishment
Session Establishment
Label Exchange
Other Reasons for Label Actions
Cleanup
Configuring Implicit Null Label
Global LDP Filters
Per LDP Peer FEC Import and Export Policies
Configuring Multiple LDP LSR ID
Advertisement of FEC for Local LSR ID
Extend LDP policies to mLDP
Recursive FEC behavior
Import Policy
LDP FEC Resolution Per Specified Community
Configuration
Operation
T-LDP hello reduction
Tracking a T-LDP Peer with BFD
Link LDP Hello Adjacency Tracking with BFD
LDP LSP Statistics
MPLS Entropy Label
Importing LDP Tunnels to Non-Host Prefixes to TTM
TTL Security for BGP and LDP
ECMP Support for LDP
Label Operations
Weighted ECMP Support for LDP
Unnumbered Interface Support in LDP
Feature Configuration
Operation of LDP over an Unnumbered IP Interface
Link LDP
Targeted LDP
FEC Resolution
LDP over RSVP Tunnels
Signaling and Operation
LDP Label Distribution and FEC Resolution
Default FEC Resolution Procedure
FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
Rerouting Around Failures
LDP-over-RSVP Tunnel Protection
ABR Protection
LDP over RSVP Without Area Boundary
LDP over RSVP and ECMP
Weighted Load Balancing for LDP over RSVP
Interaction with Class-Based Forwarding
Class-based Forwarding of LDP Prefix Packets over IGP Shortcuts
Configuration and Operation
LSR and LER Roles with FC-to-Set Configuration
LDP ECMP Uniform Failover
LDP Fast-Reroute for IS-IS and OSPF Prefixes
LDP FRR Configuration
Reducing the Scope of the LFA Calculation by SPF
LDP FRR Procedures
ECMP Considerations
LDP FRR and LDP Shortcut
LDP FRR and LDP-over-RSVP
LDP FRR and RSVP Shortcut (IGP Shortcut)
IS-IS and OSPF Support for Loop-Free Alternate Calculation
Loop-Free Alternate Calculation in the Presence of IGP shortcuts
Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
Loop-Free Alternate Shortest Path First (LFA SPF) Policies
LDP FEC to BGP Label Route Stitching
Configuration
Detailed LDP FEC Resolution
Detailed BGP Labeled Route Resolution
Data Plane Forwarding
LDP-SR Stitching for IPv4 prefixes
LDP-SR Stitching Configuration
Stitching in the LDP-to-SR Direction
Stitching in the SR-to-LDP Direction
LDP FRR LFA Backup using SR Tunnel for IPv4 Prefixes
LDP Remote LFA
Automatic LDP rLFA
Automatic Creation of a Targeted Hello Adjacency and LDP Session
Feature Configuration
Feature Behavior
Multicast P2MP LDP for GRT
LDP P2MP Support
LDP P2MP Configuration
LDP P2MP Protocol
Make Before Break (MBB)
ECMP Support
Inter-AS Non-segmented mLDP
In-band Signaling with Non-segmented mLDP Trees in GRT
LDP Recursive FEC Process
Supported Recursive Opaque Values
Optimized Option C and Basic FEC Generation for Inter-AS
Basic Opaque Generation When Root PE is Resolved Using BGP
Leaf and ABR Behavior
Intra-AS Support
Opaque Type Behavior with Basic FEC Generation
Inter-AS Support
Redundancy and Resiliency
ASBR Physical Connection
OAM
ECMP Support
ECMP Hash Algorithm
Dynamic mLDP and Static mLDP Co-existing on the Same Node
Intra-AS Non-segmented mLDP
ABR MoFRR for Intra-AS
Interaction with an Inter-AS Non-segmented mLDP Solution
Intra-AS/Inter-AS Option B
ASBR MoFRR
IGP MoFRR Versus BGP (ASBR) MoFRR
ASBR MoFRR Leaf Behavior
ASBR MoFRR ASBR Behavior
MoFRR Root AS Behavior
Traffic Flow
Failure Detection and Handling
Failure Scenario
ASBR MoFRR Consideration
ASBR MoFRR Opaque Support
MBB for MoFRR
Add-path for Route Reflectors
Multicast LDP Fast Upstream Switchover
Feature Configuration
Feature Behavior
Uniform Failover from Primary to Backup ILM
Multi-Area and Multi-Instance Extensions to LDP
LDP Shortcut for BGP Next-Hop Resolution
LDP Shortcut for IGP Routes
LDP Shortcut Configuration
IGP Route Resolution
LDP Shortcut Forwarding Plane
ECMP Considerations
Disabling TTL Propagation in an LSP Shortcut
LDP Graceful Handling of Resource Exhaustion
LDP Base Graceful Handling of Resources
LDP Enhanced Graceful Handling of Resources
LSR Overload Notification
LSR Overload Protection Capability
Procedures for LSR overload protection
LDP-IGP Synchronization
MLDP Resolution using Multicast RTM
Other Considerations for Multicast RTM MLDP Resolution
Bidirectional Forwarding Detection for LDP LSPs
Bootstrapping and Maintaining LSP BFD Sessions
BFD Configuration on LDP LSPs
User Guidelines and Troubleshooting Procedures
Common Procedures
Base Resource Handling Procedures
Enhanced Resource Handling Procedures
LDP IPv6 Control and Data Planes
LDP Operation in an IPv6 Network
Link LDP
Targeted LDP
FEC Resolution
LDP Session Capabilities
LDP Adjacency Capabilities
Address and FEC Distribution
Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
IGP and Static Route Synchronization with LDP
BFD Operation
Services Using SDP with an LDP IPv6 FEC
Mirror Services and Lawful Intercept
Configuration at mirror source node
Configuration at mirror destination node
Static Route Resolution to a LDP IPv6 FEC
IGP Route Resolution to a LDP IPv6 FEC
OAM Support with LDP IPv6
LDP IPv6 Interoperability Considerations
Interoperability with Implementations Compliant with RFC 7552
LDP IPv6 32-bit LSR-ID
Feature Configuration
LDP LSR IPv6 Operation with 32-bit LSR-ID
Link LDP
Targeted LDP
Link and Targeted LDP Feature Interaction
Migration Considerations
Migrating Services from LDP IPv4 Session to 32-bit LSR-ID LDP IPv6 Session
Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
LDP Process Overview
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring FEC Originate Parameters
Configuring Graceful-Restart Helper Parameters
Applying Export and Import Policies
Targeted Session Parameters
Interface Parameters
Session Parameters
LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting Started
About This Guide
Nokia Router Configuration Process
MPLS and RSVP
MPLS
MPLS Label Stack
Label Values
Reserved Label Blocks
MPLS Entropy Label and Hash Label
Hash Label
Entropy Label
Inserting and Processing the Entropy Label at LERs and LSRs
Ingress LER
LSR
Egress LER
Mapping Entropy Label Capability at LSP Stitching Points
Entropy Label on OAM Packets
Impact of EL and ELI on MTU and Label Stack Depth
Label Switching Routers
LSP Types
Bidirectional Forwarding Detection for MPLS LSPs
Bootstrapping and Maintaining the BFD Session
LSP BFD Configuration
Enabling and Implementing Limits for LSP BFD on a Node
BFD Configuration on RSVP-TE LSPs
Using LSP BFD for LSP Path Protection
Failure-action down
Failure-action failover
LSP Active Path Failover Triggers
MPLS/RSVP on Broadcast Interface
MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
Manual Bypass LSP
PLR Bypass LSP Selection Rules
FRR Facility Background Evaluation Task
Uniform FRR Failover Time
Automatic Bandwidth Allocation for RSVP LSPs
Enabling and Disabling Auto-Bandwidth Allocation on an LSP
Autobandwidth on LSPs with Secondary or Secondary Standby Paths
Measurement of LSP Bandwidth
Passive Monitoring of LSP Bandwidth
Periodic Automatic Bandwidth Adjustment
Overflow-Triggered Auto-Bandwidth Adjustment
Manually-Triggered Auto-Bandwidth Adjustment
Operational Bandwidth Carryover between Active Paths
LSP Failure Codes
Labeled Traffic Statistics
Interface Statistics
Traffic Statistics for Stacked Tunnels
Traffic Statistics Details and Scale
RSVP-TE and MPLS-TP Traffic Statistics
RSVP
Using RSVP for MPLS
RSVP Traffic Engineering Extensions for MPLS
Hello Protocol
MD5 Authentication of RSVP Interface
Configuring Authentication using Keychains
Reservation Styles
RSVP Message Pacing
RSVP Overhead Refresh Reduction
RSVP Graceful Restart Helper
Enhancements to RSVP Control Plane Congestion Control
BFD for RSVP-TE
RSVP-TE LSP Statistics
P2MP RSVP-TE LSP Statistics
Configuring RSVP P2MP LSP Egress Statistics
Configuring RSVP P2MP LSP Ingress Statistics
Configuring Implicit Null
Using Unnumbered Point-to-Point Interface in RSVP
Operation of RSVP FRR Facility Backup over Unnumbered Interface
MPLS Transport Profile
MPLS-TP Model
MPLS-TP Provider Edge and Gateway
VLL Services
Spoke SDP Termination
MPLS-TP LSR
Detailed Descriptions of MPLS-TP
MPLS-TP LSPs
MPLS-TP on Pseudowires
MPLS-TP Maintenance Identifiers
Generic Associated Channel
MPLS-TP Operations, Administration and Maintenance (OAM)
On-Demand Connectivity Verification (CV) using LSP-Ping
Proactive CC, CV and RDI
BFD-based RDI
PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
PW Control Channel Status Request Mechanism
Pseudowire Redundancy and Active / Standby Dual Homing
Lock Instruct and Loopback for MPLS-TP Pseudowires
MPLS-TP LSP Protection
Alarm Indication Signal (AIS)
Configuring MPLS-TP
Configuration Overview
Node-Wide MPLS-TP Parameter Configuration
Node-Wide MPLS-TP Identifier Configuration
Static LSP and Pseudowire (VC) Label and Tunnel Ranges
Interface Configuration for MPLS-TP
LER Configuration for MPLS-TP
LSP and Path Configuration
Support for Downstream Mapping Information
Proactive CC/CV (using BFD) Configuration
Protection templates and Linear Protection Configuration
Intermediate LSR Configuration for MPLS-TP LSPs
MPLS-TP Show Commands
Static MPLS Labels
MPLS-TP Tunnel Configuration
MPLS-TP Path configuration
MPLS-TP Protection
MPLS TP Node Configuration
MPLS-TP Interfaces
MPLS-TP Debug Commands
Traffic Engineering
TE Metric (IS-IS and OSPF)
Admin Group Support on Facility Bypass Backup LSP
Actions at Head-End Node
Actions at PLR Node
Manual and Timer Resignal of RSVP-TE Bypass LSP
RSVP-TE Bypass LSP Path SRLG Information Update in Manual and Timer Resignal MBB
RSVP-TE Bypass LSP Path Administrative Group Information Update in Manual and Timer Resignal MBB
RSVP-TE LSP Active Path Administrative Group Information Update in Timer Resignal MBB
Diff-Serv Traffic Engineering
Mapping of Traffic to a Diff-Serv LSP
Admission Control of Classes
Maximum Allocation Model
Russian Doll Model
Example CT Bandwidth Sharing with RDM
RSVP Control Plane Extensions
IGP Extensions
Diff-Serv TE Configuration and Operation
RSVP Protocol Level
RSVP Interface Level
LSP and LSP Path Levels
Diff-Serv TE LSP Class Type Change under Failure
LSP Primary Path Retry Procedures
Bandwidth Sharing Across Class Types
Downgrading the CT of Bandwidth Sharing LSP Paths
Upgrading the CT of Bandwidth Sharing LSP Paths
Advanced MPLS/RSVP Features
Extending RSVP LSP to use Loopback Interfaces Other than Router-id
LSP Path Change
Manual LSP Path Switch
Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
Automatic Creation of RSVP-TE LSP Mesh
Automatic Creation of RSVP Mesh LSP: Configuration and Behavior
Feature Configuration
Feature Behavior
Multi-Area and Multi-Instance Support
Mesh LSP Name Encoding and Statistics
Automatic Creation of RSVP One-Hop LSP: Configuration and Behavior
Feature Configuration
Feature Behavior
IGP Shortcut and Forwarding Adjacency
IGP Shortcut Feature Configuration
IGP Shortcut Binding Construct
IPv4 IGP Shortcuts using SR-TE LSP Feature Configuration
Family Prefix Resolution and Tunnel Selection Rules
Application Support
Loop-free Alternate (LFA) Protection Support
SR Shortest Path Tunnel Over RSVP-TE IGP Shortcut Feature Configuration
Family Prefix Resolution and Tunnel Selection Rules
Application Support
Loop-free Alternate (LFA) Protection Support
Using LSP Relative Metric with IGP Shortcut
ECMP Considerations
Handling of Control Packets
Forwarding Adjacency
SR Shortest Path Tunnel Over RSVP-TE Forwarding Adjacency
LDP Forwarding over IGP Shortcut
LDP Forwarding over Static Route Shortcut Tunnels
Handling of Multicast Packets
MPLS Entropy Label on Shortcut Tunnels
Disabling TTL Propagation in an LSP Shortcut
RSVP-TE LSP Signaling using LSP Template
Shared Risk Link Groups
Enabling Disjoint Backup Paths
SRLG Penalty Weights for Detour and Bypass LSPs
Static Configurations of SRLG Memberships
TE Graceful Shutdown
Soft Preemption of Diff-Serv RSVP LSP
Least-Fill Bandwidth Rule in CSPF ECMP Selection
Inter-Area TE LSP (ERO Expansion Method)
Area Border Node FRR Protection for Inter-Area LSP
Rerouting of Inter-Area LSP
Behavior of MPLS Options in Inter-Area LSP
Inter-Area LSP support of OSPF Virtual Links
Area Border Node FRR Protection for Inter-Area LSP
Timer-based Reversion for RSVP-TE LSPs
LSP Tagging and Auto-Bind Using Tag Information
Internal Route Color to LSP Color Matching Algorithm
LSP Admin Tag use in Tunnel Selection for VPRN and E-VPN Auto-Bind
LSP Admin Tag Use for BGP Next Hop or BGP Prefix for Labeled and Unlabeled Unicast Routes
LSP Self-Ping
Detailed Behavior of LSP Self-Ping
Considerations for Scaled Scenarios
Accounting for Dark Bandwidth
Point-to-Multipoint (P2MP) RSVP LSP
Application in Video Broadcast
P2MP LSP Data Plane
Ingress LER Node
LSR Node
Branch LSR Node
Egress LER Node
BUD LSR Node
Ingress Path Management for P2MP LSP Packets
Ingress P2MP Path Management on XCM/IOM/IMMs
RSVP Control Plane in a P2MP LSP
Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
Procedures at Ingress LER Node
Procedures at Egress LER Node
Procedures with a Primary Tunnel Interface
MPLS Service Usage
Service Distribution Paths
MPLS/RSVP Configuration Process Overview
Configuration Notes
Configuring MPLS and RSVP with CLI
MPLS Configuration Overview
LSPs
Paths
Router Interface
Choosing the Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring Manual Bypass Tunnels
Configuring RSVP Parameters
Configure RSVP Message Pacing Parameters
Configuring Graceful Shutdown
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP Configuration Management Tasks
Modifying RSVP Parameters
Modifying RSVP Message Pacing Parameters
Deleting an Interface from RSVP
GMPLS
GMPLS
Example Applications
Use Case 1: Dynamic Connection Setup with Constraints
Use Case 2: Multi-Layer Resiliency
GMPLS UNI Architecture
Addressing and End-to-End gLSP Architecture
1830 PSS Identifiers
Recovery Reference Models
End to End Recovery (IP-layer)
End to End ECMP
End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
End to End Recovery (GMPLS Layer)
Unprotected gLSP
Full LSP Rerouting
1: N Protection
Optical Segment Recovery
GMPLS Configuration Overview
LMP and IPCC Configuration
Configuration of IP Communication Channels for LMP and RSVP
Configuring LMP
Configuring Traffic Engineering Links and Data Bearers
Configuring MPLS Paths for GMPLS
Configuring RSVP in GMPLS
Configuring a GMPLS LSP on the UNI
gLSP Constraints
Bandwidth
Shared Risk Link Groups
Optical Network Segment Recovery
Configuration of End-to-End GMPLS Recovery
GMPLS Tunnel Groups
Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
Configuration Notes
Label Distribution Protocol
Label Distribution Protocol
LDP and MPLS
LDP Architecture
Subsystem Interrelationships
Memory Manager and LDP
Label Manager
LDP Configuration
Logger
Service Manager
Execution Flow
Initialization
Session Lifetime
Adjacency Establishment
Session Establishment
Label Exchange
Other Reasons for Label Actions
Cleanup
Configuring Implicit Null Label
Global LDP Filters
Per LDP Peer FEC Import and Export Policies
Configuring Multiple LDP LSR ID
Advertisement of FEC for Local LSR ID
Extend LDP policies to mLDP
Recursive FEC behavior
Import Policy
LDP FEC Resolution Per Specified Community
Configuration
Operation
T-LDP hello reduction
Tracking a T-LDP Peer with BFD
Link LDP Hello Adjacency Tracking with BFD
LDP LSP Statistics
MPLS Entropy Label
Importing LDP Tunnels to Non-Host Prefixes to TTM
TTL Security for BGP and LDP
ECMP Support for LDP
Label Operations
Weighted ECMP Support for LDP
Unnumbered Interface Support in LDP
Feature Configuration
Operation of LDP over an Unnumbered IP Interface
Link LDP
Targeted LDP
FEC Resolution
LDP over RSVP Tunnels
Signaling and Operation
LDP Label Distribution and FEC Resolution
Default FEC Resolution Procedure
FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
Rerouting Around Failures
LDP-over-RSVP Tunnel Protection
ABR Protection
LDP over RSVP Without Area Boundary
LDP over RSVP and ECMP
Weighted Load Balancing for LDP over RSVP
Interaction with Class-Based Forwarding
Class-based Forwarding of LDP Prefix Packets over IGP Shortcuts
Configuration and Operation
LSR and LER Roles with FC-to-Set Configuration
LDP ECMP Uniform Failover
LDP Fast-Reroute for IS-IS and OSPF Prefixes
LDP FRR Configuration
Reducing the Scope of the LFA Calculation by SPF
LDP FRR Procedures
ECMP Considerations
LDP FRR and LDP Shortcut
LDP FRR and LDP-over-RSVP
LDP FRR and RSVP Shortcut (IGP Shortcut)
IS-IS and OSPF Support for Loop-Free Alternate Calculation
Loop-Free Alternate Calculation in the Presence of IGP shortcuts
Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
Loop-Free Alternate Shortest Path First (LFA SPF) Policies
LDP FEC to BGP Label Route Stitching
Configuration
Detailed LDP FEC Resolution
Detailed BGP Labeled Route Resolution
Data Plane Forwarding
LDP-SR Stitching for IPv4 prefixes
LDP-SR Stitching Configuration
Stitching in the LDP-to-SR Direction
Stitching in the SR-to-LDP Direction
LDP FRR LFA Backup using SR Tunnel for IPv4 Prefixes
LDP Remote LFA
Automatic LDP rLFA
Automatic Creation of a Targeted Hello Adjacency and LDP Session
Feature Configuration
Feature Behavior
Multicast P2MP LDP for GRT
LDP P2MP Support
LDP P2MP Configuration
LDP P2MP Protocol
Make Before Break (MBB)
ECMP Support
Inter-AS Non-segmented mLDP
In-band Signaling with Non-segmented mLDP Trees in GRT
LDP Recursive FEC Process
Supported Recursive Opaque Values
Optimized Option C and Basic FEC Generation for Inter-AS
Basic Opaque Generation When Root PE is Resolved Using BGP
Leaf and ABR Behavior
Intra-AS Support
Opaque Type Behavior with Basic FEC Generation
Inter-AS Support
Redundancy and Resiliency
ASBR Physical Connection
OAM
ECMP Support
ECMP Hash Algorithm
Dynamic mLDP and Static mLDP Co-existing on the Same Node
Intra-AS Non-segmented mLDP
ABR MoFRR for Intra-AS
Interaction with an Inter-AS Non-segmented mLDP Solution
Intra-AS/Inter-AS Option B
ASBR MoFRR
IGP MoFRR Versus BGP (ASBR) MoFRR
ASBR MoFRR Leaf Behavior
ASBR MoFRR ASBR Behavior
MoFRR Root AS Behavior
Traffic Flow
Failure Detection and Handling
Failure Scenario
ASBR MoFRR Consideration
ASBR MoFRR Opaque Support
MBB for MoFRR
Add-path for Route Reflectors
Multicast LDP Fast Upstream Switchover
Feature Configuration
Feature Behavior
Uniform Failover from Primary to Backup ILM
Multi-Area and Multi-Instance Extensions to LDP
LDP Shortcut for BGP Next-Hop Resolution
LDP Shortcut for IGP Routes
LDP Shortcut Configuration
IGP Route Resolution
LDP Shortcut Forwarding Plane
ECMP Considerations
Disabling TTL Propagation in an LSP Shortcut
LDP Graceful Handling of Resource Exhaustion
LDP Base Graceful Handling of Resources
LDP Enhanced Graceful Handling of Resources
LSR Overload Notification
LSR Overload Protection Capability
Procedures for LSR overload protection
LDP-IGP Synchronization
MLDP Resolution using Multicast RTM
Other Considerations for Multicast RTM MLDP Resolution
Bidirectional Forwarding Detection for LDP LSPs
Bootstrapping and Maintaining LSP BFD Sessions
BFD Configuration on LDP LSPs
User Guidelines and Troubleshooting Procedures
Common Procedures
Base Resource Handling Procedures
Enhanced Resource Handling Procedures
LDP IPv6 Control and Data Planes
LDP Operation in an IPv6 Network
Link LDP
Targeted LDP
FEC Resolution
LDP Session Capabilities
LDP Adjacency Capabilities
Address and FEC Distribution
Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
IGP and Static Route Synchronization with LDP
BFD Operation
Services Using SDP with an LDP IPv6 FEC
Mirror Services and Lawful Intercept
Configuration at mirror source node
Configuration at mirror destination node
Static Route Resolution to a LDP IPv6 FEC
IGP Route Resolution to a LDP IPv6 FEC
OAM Support with LDP IPv6
LDP IPv6 Interoperability Considerations
Interoperability with Implementations Compliant with RFC 7552
LDP IPv6 32-bit LSR-ID
Feature Configuration
LDP LSR IPv6 Operation with 32-bit LSR-ID
Link LDP
Targeted LDP
Link and Targeted LDP Feature Interaction
Migration Considerations
Migrating Services from LDP IPv4 Session to 32-bit LSR-ID LDP IPv6 Session
Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
LDP Process Overview
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring FEC Originate Parameters
Configuring Graceful-Restart Helper Parameters
Applying Export and Import Policies
Targeted Session Parameters
Interface Parameters
Session Parameters
LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
Standards and Protocol Support
Customer Documentation and Product Support
Multicast Routing Protocols Guide 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. Multicast Overview
2.2. Multicast Models
2.2.1. Any-Source Multicast (ASM)
2.2.2. Source Specific Multicast (SSM)
2.2.3. Multicast in IP-VPN Networks
3. IGMP
3.1. IGMP Overview
3.1.1. IGMP Versions and Interoperability Requirements
3.1.2. IGMP Version Transition
3.1.3. Source-Specific Multicast Groups
3.1.4. Query Messages
3.2. Configuring IGMP with CLI
3.2.1. IGMP Configuration Overview
3.2.2. Basic IGMP Configuration
3.2.3. Configuring IGMP Parameters
3.2.3.1. Enabling IGMP
3.2.3.2. Configuring an IGMP Interface
3.2.3.3. Configuring Static Parameters
3.2.3.4. Configuring SSM Translation
3.2.4. Disabling IGMP
4. MLD
4.1. MLD Overview
4.1.1. MLDv1
4.1.2. MLDv2
4.2. Configuring MLD with CLI
4.2.1. MLD Configuration Overview
4.2.2. Basic MLD Configuration
4.2.3. Configuring MLD Parameters
4.2.3.1. Enabling MLD
4.2.3.2. Configuring an MLD Interface
4.2.3.3. Configuring Static Parameters
4.2.3.4. Configuring SSM Translation
4.2.4. Disabling MLD
5. PIM
5.1. PIM Overview
5.1.1. PIM-SM Functions
5.1.1.1. Phase One
5.1.1.2. Phase Two
5.1.1.3. Phase Three
5.1.2. Encapsulating Data Packets in the Register Tunnel
5.1.3. PIM Bootstrap Router Mechanism
5.1.4. PIM-SM Routing Policies
5.1.5. Reverse Path Forwarding Checks
5.1.6. Anycast RP for PIM-SM
5.1.6.1. Implementation
5.1.7. Distributing PIM Joins over Multiple ECMP Paths
5.1.8. PIM Interface on IES Subscriber Group Interfaces
5.1.9. Multicast-Only Fast Reroute (MoFRR)
5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.1.11. VRRP Aware PIM
5.1.11.1. Configuring VRRP Aware PIM
5.1.11.2. Configuration Recommendations
5.1.11.2.1. Primary Router Example
5.1.11.2.2. Secondary Router Example
5.2. IPv6 PIM models
5.2.1. PIM SSM
5.2.1.1. System PIM SSM Scaling
5.2.2. PIM ASM
5.2.3. Embedded RP
5.3. PIM Signaling over BIER
5.3.1. EBBR Discovery
5.3.1.1. Single Area Scenario
5.3.1.2. Multiple Area Scenarios
5.3.2. PIM Signaling Support
5.3.3. PIM Signaling MTU Considerations
5.4. PIM Auto-RP Full Support
5.4.1. Candidate RP Considerations
5.4.2. Timer Considerations
5.5. Configuring PIM with CLI
5.5.1. PIM Configuration Overview
5.5.2. Basic PIM Configuration
5.5.3. Configuring PIM Parameters
5.5.3.1. Enabling PIM
5.5.3.2. Configuring PIM Interface Parameters
5.5.3.3. Configuring PIM Join/Register Policies
5.5.3.4. Importing PIM Join/Register Policies
5.5.3.5. Configuring Bootstrap Message Import and Export Policies
5.5.4. Disabling PIM
6. MSDP
6.1. Multicast Source Discovery Protocol
6.1.1. Anycast RP for MSDP
6.1.2. MSDP Procedure
6.1.2.1. MSDP Peering Scenarios
6.1.3. MSDP Peer Groups
6.1.4. MSDP Mesh Groups
6.1.5. MSDP Routing Policies
6.1.6. Multicast in Virtual Private Networks
6.1.6.1. Draft Rosen
6.2. Configuring MSDP with CLI
6.2.1. Basic MSDP Configuration
6.2.2. Configuring MSDP Parameters
6.2.3. Disabling MSDP
7. MLDP
7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
7.2. Inter-AS Non-segmented MLDP
7.2.1. d-MLDP Inter-AS Trees in GRT
7.2.1.1. Routing
7.2.1.2. Join Processing
7.2.2. ASBR Support of PE Functionality
7.3. Hashing for Inter-AS
7.4. Hashing at the ASBR
7.5. MLDP over RSVP P2P LSP
7.5.1. Summary of Procedures for MLDP over RSVP
7.5.2. Summary of Requirements and Procedures for IGP Shortcut
7.5.3. FEC T-LDP Session Selection
7.5.4. Basic FEC and Recursive FEC
7.5.5. Two Nodes with ECMP Upstream
7.5.6. Single Upstream Node with Multiple T-LDP to the Upstream Node
7.5.7. Root Node with Multiple T-LDP to the Root Node
7.5.8. Root and Leaf Connectivity
7.5.9. IGP Shortcut and ldp-over-rsvp Knob
7.5.10. T-LDP Peer and RSVP-TE Far-end
7.5.11. MoFRR Considerations
8. Multicast Extensions to BGP
8.1. Multicast Extensions to BGP
8.1.1. MBGP Multicast Topology Support
8.1.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. MCAC Overview
9.1.1. MCAC Bundle Policy Overview
9.1.2. MCAC Algorithm
9.1.2.1. Interface-level MCAC details
9.1.2.1.1. MCAC-interface-policy-level MCAC details
9.1.2.2. Bundle-level MCAC details
9.1.3. MCAC on Link Aggregation Group Interfaces
9.2. Configuring MCAC with CLI
9.2.1. Basic MCAC Configuration
9.2.2. Configuring MCAC Parameters
10. GTM
10.1. GTM Overview
10.1.1. Using BGP-MVPN Procedures in GTM
10.1.1.1. Route Distinguishers and Route Targets
10.1.1.2. UMH-Eligible Routes
10.1.1.3. BGP Route Types Supported
10.2. Configuring GTM
10.2.1. Configuration Recommendations
10.2.2. Configuring GTM with CLI
11. BIER
11.1. BIER Overview
11.1.1. BIER Hardware
11.1.2. BIER IMPM
11.1.3. BIER ECMP
11.1.4. BIER Redundancy and Resiliency
11.1.4.1. BIER FRR
11.1.4.1.1. BIER FRR Limitation
11.1.4.1.2. BIER BFD for Next-hop Failure Detection
11.1.5. BIER Layers
11.1.6. Implementation
11.1.6.1. BIER Sub-domains
11.1.6.2. BIER Set IDs
11.1.6.3. BIER Encapsulation
11.1.6.3.1. BIER MPLS Encapsulation
11.1.6.4. BIER Forwarding Tables
11.1.6.5. BIER IS-IS Sub-TLVs
11.1.6.6. IS-IS BIER Support
11.1.6.7. IS-IS Multi-topologies
11.1.6.8. BIER Intra-AS Solution
11.1.6.9. OSPF BIER Support
11.1.6.9.1. BIER OSPF Sub-TLVs
11.1.6.10. BIER Forwarding
11.1.6.10.1. BIER FIB Packet Handling
11.1.6.11. BIER MVPN
11.1.6.11.1. BIER MVPN IPv4 and IPv6
11.1.6.11.2. BIER MVPN Sub-domain
11.1.6.11.3. BIER Templates
12. SR P2MP Policy
12.1. SR P2MP Policy Details
12.2. Replication Segment
12.3. P2MP and Replication Segment Objects
12.4. SR P2MP Policy Instantiation
12.4.1. SR P2MP Policy Instantiation Using the CLI
12.4.1.1. SPMSI for Static P2MP Policy
12.4.1.2. PMSI Tree ID Advertised by BGP
12.4.2. SR P2MP Policy Instantiation Using PCE
12.4.2.1. SPMSI for PCE P2MP Policy
12.4.3. Configuration Examples
12.4.4. Administrative Behavior
12.4.4.1. Candidate Path Selection Criteria
12.4.4.2. Candidate Path Operational Status
12.4.4.3. P2MP Policy Operational Status
12.4.4.4. Replication Segment Operational Status
12.4.5. FRR Behavior
12.4.5.1. Implicit Null Case
12.4.5.2. Non-Implicit Null Case
12.4.6. FRR Recovery Behavior
12.4.7. BFD Behavior
12.4.8. Maximum SPMSI Behavior
12.4.9. Global Optimization of P2MP Policy and MBB Behavior
12.4.10. Global Optimization of PCEP Behavior
12.4.11. PCEP Behavior
12.4.12. PCE Pop with Next-hop 127.0.0.0/8 or ::1
12.4.13. P2MP Policy Special Considerations
12.5. Replication Segment Steering Through a Unicast SR Network
13. Troubleshooting Tools
13.1. Mtrace
13.1.1. Finding the Last Hop Router
13.1.2. Directing the Response
13.2. Mstat
13.3. Mrinfo
14. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. Multicast Overview
2.2. Multicast Models
2.2.1. Any-Source Multicast (ASM)
2.2.2. Source Specific Multicast (SSM)
2.2.3. Multicast in IP-VPN Networks
3. IGMP
3.1. IGMP Overview
3.1.1. IGMP Versions and Interoperability Requirements
3.1.2. IGMP Version Transition
3.1.3. Source-Specific Multicast Groups
3.1.4. Query Messages
3.2. Configuring IGMP with CLI
3.2.1. IGMP Configuration Overview
3.2.2. Basic IGMP Configuration
3.2.3. Configuring IGMP Parameters
3.2.3.1. Enabling IGMP
3.2.3.2. Configuring an IGMP Interface
3.2.3.3. Configuring Static Parameters
3.2.3.4. Configuring SSM Translation
3.2.4. Disabling IGMP
4. MLD
4.1. MLD Overview
4.1.1. MLDv1
4.1.2. MLDv2
4.2. Configuring MLD with CLI
4.2.1. MLD Configuration Overview
4.2.2. Basic MLD Configuration
4.2.3. Configuring MLD Parameters
4.2.3.1. Enabling MLD
4.2.3.2. Configuring an MLD Interface
4.2.3.3. Configuring Static Parameters
4.2.3.4. Configuring SSM Translation
4.2.4. Disabling MLD
5. PIM
5.1. PIM Overview
5.1.1. PIM-SM Functions
5.1.1.1. Phase One
5.1.1.2. Phase Two
5.1.1.3. Phase Three
5.1.2. Encapsulating Data Packets in the Register Tunnel
5.1.3. PIM Bootstrap Router Mechanism
5.1.4. PIM-SM Routing Policies
5.1.5. Reverse Path Forwarding Checks
5.1.6. Anycast RP for PIM-SM
5.1.6.1. Implementation
5.1.7. Distributing PIM Joins over Multiple ECMP Paths
5.1.8. PIM Interface on IES Subscriber Group Interfaces
5.1.9. Multicast-Only Fast Reroute (MoFRR)
5.1.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.1.11. VRRP Aware PIM
5.1.11.1. Configuring VRRP Aware PIM
5.1.11.2. Configuration Recommendations
5.1.11.2.1. Primary Router Example
5.1.11.2.2. Secondary Router Example
5.2. IPv6 PIM models
5.2.1. PIM SSM
5.2.1.1. System PIM SSM Scaling
5.2.2. PIM ASM
5.2.3. Embedded RP
5.3. PIM Signaling over BIER
5.3.1. EBBR Discovery
5.3.1.1. Single Area Scenario
5.3.1.2. Multiple Area Scenarios
5.3.2. PIM Signaling Support
5.3.3. PIM Signaling MTU Considerations
5.4. PIM Auto-RP Full Support
5.4.1. Candidate RP Considerations
5.4.2. Timer Considerations
5.5. Configuring PIM with CLI
5.5.1. PIM Configuration Overview
5.5.2. Basic PIM Configuration
5.5.3. Configuring PIM Parameters
5.5.3.1. Enabling PIM
5.5.3.2. Configuring PIM Interface Parameters
5.5.3.3. Configuring PIM Join/Register Policies
5.5.3.4. Importing PIM Join/Register Policies
5.5.3.5. Configuring Bootstrap Message Import and Export Policies
5.5.4. Disabling PIM
6. MSDP
6.1. Multicast Source Discovery Protocol
6.1.1. Anycast RP for MSDP
6.1.2. MSDP Procedure
6.1.2.1. MSDP Peering Scenarios
6.1.3. MSDP Peer Groups
6.1.4. MSDP Mesh Groups
6.1.5. MSDP Routing Policies
6.1.6. Multicast in Virtual Private Networks
6.1.6.1. Draft Rosen
6.2. Configuring MSDP with CLI
6.2.1. Basic MSDP Configuration
6.2.2. Configuring MSDP Parameters
6.2.3. Disabling MSDP
7. MLDP
7.1. Dynamic Multicast Signaling over P2MP in GRT Instance
7.2. Inter-AS Non-segmented MLDP
7.2.1. d-MLDP Inter-AS Trees in GRT
7.2.1.1. Routing
7.2.1.2. Join Processing
7.2.2. ASBR Support of PE Functionality
7.3. Hashing for Inter-AS
7.4. Hashing at the ASBR
7.5. MLDP over RSVP P2P LSP
7.5.1. Summary of Procedures for MLDP over RSVP
7.5.2. Summary of Requirements and Procedures for IGP Shortcut
7.5.3. FEC T-LDP Session Selection
7.5.4. Basic FEC and Recursive FEC
7.5.5. Two Nodes with ECMP Upstream
7.5.6. Single Upstream Node with Multiple T-LDP to the Upstream Node
7.5.7. Root Node with Multiple T-LDP to the Root Node
7.5.8. Root and Leaf Connectivity
7.5.9. IGP Shortcut and ldp-over-rsvp Knob
7.5.10. T-LDP Peer and RSVP-TE Far-end
7.5.11. MoFRR Considerations
8. Multicast Extensions to BGP
8.1. Multicast Extensions to BGP
8.1.1. MBGP Multicast Topology Support
8.1.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. MCAC Overview
9.1.1. MCAC Bundle Policy Overview
9.1.2. MCAC Algorithm
9.1.2.1. Interface-level MCAC details
9.1.2.1.1. MCAC-interface-policy-level MCAC details
9.1.2.2. Bundle-level MCAC details
9.1.3. MCAC on Link Aggregation Group Interfaces
9.2. Configuring MCAC with CLI
9.2.1. Basic MCAC Configuration
9.2.2. Configuring MCAC Parameters
10. GTM
10.1. GTM Overview
10.1.1. Using BGP-MVPN Procedures in GTM
10.1.1.1. Route Distinguishers and Route Targets
10.1.1.2. UMH-Eligible Routes
10.1.1.3. BGP Route Types Supported
10.2. Configuring GTM
10.2.1. Configuration Recommendations
10.2.2. Configuring GTM with CLI
11. BIER
11.1. BIER Overview
11.1.1. BIER Hardware
11.1.2. BIER IMPM
11.1.3. BIER ECMP
11.1.4. BIER Redundancy and Resiliency
11.1.4.1. BIER FRR
11.1.4.1.1. BIER FRR Limitation
11.1.4.1.2. BIER BFD for Next-hop Failure Detection
11.1.5. BIER Layers
11.1.6. Implementation
11.1.6.1. BIER Sub-domains
11.1.6.2. BIER Set IDs
11.1.6.3. BIER Encapsulation
11.1.6.3.1. BIER MPLS Encapsulation
11.1.6.4. BIER Forwarding Tables
11.1.6.5. BIER IS-IS Sub-TLVs
11.1.6.6. IS-IS BIER Support
11.1.6.7. IS-IS Multi-topologies
11.1.6.8. BIER Intra-AS Solution
11.1.6.9. OSPF BIER Support
11.1.6.9.1. BIER OSPF Sub-TLVs
11.1.6.10. BIER Forwarding
11.1.6.10.1. BIER FIB Packet Handling
11.1.6.11. BIER MVPN
11.1.6.11.1. BIER MVPN IPv4 and IPv6
11.1.6.11.2. BIER MVPN Sub-domain
11.1.6.11.3. BIER Templates
12. SR P2MP Policy
12.1. SR P2MP Policy Details
12.2. Replication Segment
12.3. P2MP and Replication Segment Objects
12.4. SR P2MP Policy Instantiation
12.4.1. SR P2MP Policy Instantiation Using the CLI
12.4.1.1. SPMSI for Static P2MP Policy
12.4.1.2. PMSI Tree ID Advertised by BGP
12.4.2. SR P2MP Policy Instantiation Using PCE
12.4.2.1. SPMSI for PCE P2MP Policy
12.4.3. Configuration Examples
12.4.4. Administrative Behavior
12.4.4.1. Candidate Path Selection Criteria
12.4.4.2. Candidate Path Operational Status
12.4.4.3. P2MP Policy Operational Status
12.4.4.4. Replication Segment Operational Status
12.4.5. FRR Behavior
12.4.5.1. Implicit Null Case
12.4.5.2. Non-Implicit Null Case
12.4.6. FRR Recovery Behavior
12.4.7. BFD Behavior
12.4.8. Maximum SPMSI Behavior
12.4.9. Global Optimization of P2MP Policy and MBB Behavior
12.4.10. Global Optimization of PCEP Behavior
12.4.11. PCEP Behavior
12.4.12. PCE Pop with Next-hop 127.0.0.0/8 or ::1
12.4.13. P2MP Policy Special Considerations
12.5. Replication Segment Steering Through a Unicast SR Network
13. Troubleshooting Tools
13.1. Mtrace
13.1.1. Finding the Last Hop Router
13.1.2. Directing the Response
13.2. Mstat
13.3. Mrinfo
14. Standards and Protocol Support
Customer Document and Product Support
Multiservice ISA and ESA 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. ISA and ESA Configuration Process
2. ISA and ESA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISM Overview
2.4. ESA 100G Overview
2.5. Application Assurance Hardware Features
2.5.1. AA System Support
2.5.2. Host IOM Support for AA on ISAs
2.5.3. Host IOM Support for AA on ESAs
2.6. Configuring an ESA with CLI
2.6.1. Provisioning an ESA and ESA-VM
3. Application Assurance
3.1. Application Assurance (AA) Overview
3.1.1. Application Assurance: Inline Policy Enforcement
3.1.2. AA Integration in Subscriber Edge Gateways
3.1.3. Fixed Residential Broadband Services
3.1.3.1. Dual-Stack Lite – DS-Lite
3.1.3.2. 6to4 /6RD
3.1.4. Wireless LAN Gateway Broadband Services
3.1.5. Application-Aware Business VPN Services
3.1.6. Mobile Backhaul
3.1.7. Stateful Firewall Service
3.2. Application Assurance System Architecture
3.2.1. AA ISA Resource Configuration
3.2.1.1. AA ISA Groups
3.2.1.1.1. AA Group Partitions
3.2.1.1.2. Bypass Modes
3.2.1.2. Redundancy
3.2.1.2.1. No AA ISA Group Redundancy
3.2.1.2.2. Failure to Fabric
3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
3.2.1.3. ISA Load Balancing
3.2.1.4. Asymmetry Removal
3.2.1.4.1. Asymmetry Removal Overview
3.2.1.4.2. Failure Modes
3.2.1.4.3. AARP Peered Node/Instance Configuration
3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.2.1.4.5. Multi-Chassis Datapath Shunts
3.2.1.5. ISA Overload Detection
3.2.2. AA Packet Processing
3.2.2.1. Divert of Traffic and Subscribers
3.2.2.1.1. Services and AA Subscribers
3.2.2.1.2. Spoke SDPs
3.2.2.1.3. Transit AA Subscribers
3.2.2.1.4. AA Subscriber Application Service Definition
3.2.2.2. Traffic Identification
3.2.2.2.1. Application Assurance Identification Components
3.2.2.2.2. Protocol Signatures
3.2.2.2.3. Custom Protocols
3.2.2.2.4. Protocol Shutdown
3.2.2.2.5. Supported Protocol Signatures
3.2.2.2.6. Application Groups
3.2.2.2.7. Charging Groups
3.2.2.2.8. Applications
3.2.2.2.9. Application Filters
3.2.2.2.10. HTTP
3.2.2.2.11. AA IP Prefix Lists
3.2.2.2.12. Shallow Flow Inspection
3.2.2.2.13. Flow Attributes
3.2.2.3. Statistics and Accounting
3.2.2.3.1. Per-AA Subscriber Special Study
3.2.2.3.2. System Aspects
3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.2.2.3.4. AA Partition Traffic Type Statistics
3.2.2.3.5. Configurable AA Subscriber Statistics Collection
3.2.2.3.6. AA-Performance Record for ISA Load
3.2.2.3.7. AA Partition Traffic Type Statistics
3.2.2.3.8. AA Partition Admit–Deny Statistics
3.2.2.3.9. RADIUS Accounting AA Records
3.2.2.3.10. AA Gx Based Usage Monitoring
3.2.2.3.11. Supported AVPs
3.2.2.3.12. Cflowd AA Records
3.2.2.3.13. vRGW Nested Router Detection
3.2.2.4. Application QoS Policy (AQP)
3.2.2.4.1. AQP Match Criteria
3.2.2.4.2. AQP Actions
3.2.2.4.3. Application Assurance Policers
3.2.2.4.4. Application Assurance Dynamic Experience Management
3.2.2.4.5. Application Assurance HTTP Redirect
3.2.2.4.6. Application Assurance HTTPS Policy Redirect
3.2.2.4.7. ICAP - Large Scale Category-based URL Filtering
3.2.2.4.8. Web-service URL Classification
3.2.2.4.9. Local URL-List Filtering
3.2.2.4.10. HTTP Header Enrichment
3.2.2.4.11. ACR HTTP Enrichment
3.2.2.4.12. HTTP In Browser Notification
3.2.2.5. Application Assurance Firewall
3.2.2.5.1. Denial of Service (DoS) Protection
3.2.2.5.2. TCP Validation
3.2.2.5.3. Policy Partitioned AA FW
3.2.2.5.4. Configuring AA FW
3.2.2.5.5. AA FW Logging
3.2.2.5.6. SeGW Firewall Protection
3.2.2.5.7. GTP Backhaul Roaming Firewall Protection
3.2.3. Service Monitoring and Debugging
3.2.4. CPU Utilization
3.2.5. CLI Batch: Begin, Commit and Abort Commands
3.3. Configuring Application Assurance with CLI
3.3.1. Provisioning AA ISA MDA
3.3.2. Configuring an AA ISA Group
3.3.2.1. Configuring Watermark Parameters
3.3.3. Configuring a Group Policy
3.3.3.1. Beginning and Committing a Policy Configuration
3.3.3.2. Aborting a Policy Configuration
3.3.3.3. Configuring an IP Prefix List
3.3.3.4. Configuring AA Session Filters
3.3.3.5. Configuring an Application Group
3.3.3.6. Configuring an Application
3.3.3.7. Configuring an Application Filter
3.3.3.8. Configuring an Application Profile
3.3.3.9. Configuring Suppressible App-Profile with SRRP
3.3.3.10. Configuring Application Service Options
3.3.3.11. Configuring a Policer
3.3.3.12. Configuring an Application QoS Policy
3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
3.3.3.14. Configuring an HTTP Error Redirect
3.3.3.15. Configuring HTTP Header Enrichment
3.3.3.16. Configuring an HTTP Redirect Policy
3.3.3.17. Configuring an HTTPS Policy Redirect
3.3.3.18. Configuring a Captive Redirect HTTP Redirect Policy
3.3.3.18.1. Captive-Redirect and HTTPS Flows Redirection
3.3.3.19. Configuring ICAP URL Filtering
3.3.3.20. Configuring Web-service URL Classification
3.3.3.21. Configuring Local URL-List Filtering
3.3.3.22. Configuring HTTP Notification
3.3.3.23. Configuring Tethering Detection
3.3.4. Configuring AA Volume Accounting and Statistics
3.3.4.1. Configuring Cflowd Collector
3.3.4.2. Configuring AA Comprehensive, RTP Performance, TCP Performance, and Volume Reporting
4. IP Tunnels
4.1. IP Tunnels Overview
4.1.1. Tunnel ISAs
4.1.1.1. Public Tunnel SAPs
4.1.1.2. Private Tunnel SAPs
4.1.1.3. IP Interface Configuration
4.1.1.4. GRE and IP-IP Tunnel Configuration
4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.1.1.6. TCP MSS Adjustment
4.1.1.7. MTU Propagation
4.1.2. Operational Conditions
4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
4.1.3. QoS Interactions
4.1.4. OAM Interactions
4.1.5. Redundancy
4.1.6. Statistics Collection
4.1.7. Security
4.1.7.1. GRE Tunnel Multicast Support
4.1.7.2. IPv6 over IPv4 GRE Tunnel
4.1.8. IKEv2
4.1.8.1. IKEv2 Traffic Selector and TS-List
4.1.8.2. IKEv2 Fragmentation
4.1.9. SHA2 Support
4.1.10. IPsec Client Lockout
4.1.11. IPsec Tunnel CHILD_SA Rekey
4.1.12. Multiple IKE/ESP Transform Support
4.2. X.509v3 Certificate Overview
4.2.1. SR OS X.509v3 Certificate Support
4.2.2. Local Storage
4.2.3. CA-Profile
4.2.4. CA Chain Computation
4.2.5. Certificate Enrollment
4.2.6. Certificate Revocation Check
4.2.7. Certificate/CRL Expiration Warning
4.2.8. Certificate/CRL/Key Cache
4.2.9. Auto CRL Update
4.2.10. IPsec Client Database
4.2.11. Encryption of Imported Files
4.3. Using Certificates For IPsec Tunnel Authentication
4.3.1. IKEv2 Digital Signature Authentication
4.4. Trust-Anchor Profile
4.5. Cert-Profile
4.6. Certificate Management Protocol Version 2 (CMPv2)
4.7. OCSP
4.8. Video Wholesale Example
4.9. Multi-Chassis IPsec Redundancy Overview
4.9.1. Architecture
4.9.2. MC-IPsec Mastership Protocol (MIMP)
4.9.2.1. MIMP Protocol States
4.9.2.2. Election Logic
4.9.2.3. Protection Status
4.9.2.4. Other Details
4.9.3. Routing
4.9.3.1. Routing in Public Service
4.9.3.2. Routing in Private Services
4.9.3.3. Other Details About Shunting
4.9.4. MC-IPsec Aware VRRP
4.9.5. Synchronization
4.9.5.1. Automatic CHILD_SA Rekey
4.9.5.2. Encryption of Synced States
4.9.5.2.1. Gracefully Enable Encryption Steps
4.9.6. Synchronization
4.9.6.1. Automatic CHILD_SA Rekey
4.9.6.2. Encryption of Synced States
4.9.6.2.1. Gracefully Enable Encryption Steps
4.9.7. Responder Only
4.10. IPsec Deployment Requirements
4.11. IKEv2 Remote-Access Tunnel
4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.11.3.1. DHCPv4 Address Assignment
4.11.3.2. DHCPv6 Address Assignment
4.11.3.3. DHCPv4/v6 Usage Notes
4.11.4. IPv6 IPsec Support
4.11.4.1. IPv6 as Payload
4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
4.11.4.5. IPv6 as Encapsulation
4.12. MLDv2 over IPsec
4.12.1. MLDv2 over IPsec – Traffic Selector
4.12.2. MLDv2 over IPsec – Configuration
4.13. Secured Interface
4.14. Configuring IPsec with CLI
4.14.1. Provisioning a Tunnel ISA
4.14.2. Configuring a Tunnel Group
4.14.3. Configuring Router Interfaces for IPsec
4.14.4. Configuring IPsec Parameters
4.14.5. Configuring IPsec in Services
4.14.6. Configuring X.509v3 Certificate Parameters
4.14.7. Configuring MC-IPsec
4.14.7.1. Configuring MIMP
4.14.7.2. Configuring Multi-Chassis Synchronization
4.14.7.3. Configuring Routing for MC-IPsec
4.14.7.4. Configuring MCS Encryption
4.14.8. Configuring and Using CMPv2
4.14.9. Configuring OCSP
4.14.10. Configuring IKEv2 Remote — Access Tunnel
4.14.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
4.14.12. Configuring Secured Interfaces
5. L2TPV3 Tunnels
5.1. L2TPv3 Overview
5.2. Control Plane
5.3. Public SAP
5.4. Private SAP
6. Video Services
6.1. Video Services
6.1.1. Video Groups
6.1.2. Video SAP
6.1.3. Video Interface
6.1.4. Multicast Information Policies
6.1.5. Perfect Stream Protection
6.1.6. Perfect Stream Selection
6.1.6.1. Stream Identification
6.1.6.2. Initial Sequence Identification
6.1.6.3. Packet Selection
6.1.6.4. Clock Recovery
6.1.6.5. Playout
6.1.6.6. Loss of Transport
6.1.6.7. Perfect Stream in Relation to FCC/RET
6.1.6.8. Perfect Stream in Relation to VQM
6.1.7. Video Quality Monitoring
6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.2. Retransmission and Fast Channel Change
6.2.1. RET and FCC Overview
6.2.1.1. Retransmission
6.2.1.2. Fast Channel Change (FCC)
6.2.1.2.1. Retransmission Client
6.2.1.2.2. Retransmission Server
6.2.1.2.3. Fast Channel Change Server
6.2.1.2.4. Logging and Accounting for RET and FCC
6.2.1.3. RET and FCC Server Concurrency
6.2.1.3.1. Prerequisites and Restrictions
6.2.2. Separate Timers for FCC and RET
6.2.3. Peak Bandwidth and Sessions per ISA
6.2.4. Video Support on ESA
6.3. Ad Insertion
6.3.1. Local/Zoned Ad Insertion
6.3.1.1. Transport Stream Ad Splicing
6.3.1.2. Ad Zones
6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
6.4. Configuring Video Service Components with CLI
6.4.1. Video Services Overview
6.4.1.1. Configuring an ISA-MS Module
6.4.1.2. Configuring a Video Group
6.4.1.3. Configuring a Video SAP and Video Interface in a Service
6.4.1.4. Basic Multicast Information Policy Configuration
6.4.2. Sample Configurations
6.5. Configuring RET/FCC Video Components with CLI
6.5.1. Configuring RET/FCC Video Features in the CLI
6.5.1.1. Configuring the RET Client
6.5.1.2. Configuring the RET Server
6.5.1.3. Configuring the FCC Server
6.5.1.4. Logging and Accounting Collection for Video Statistics
6.6. Configuring ADI Components with CLI
6.6.1. Configuring ADI in CLI
6.6.1.1. Configuring the RET Client
6.6.1.2. Configuring a Video Group
6.6.1.3. Configuring NTP
6.6.1.4. Configuring Channel Parameters
6.6.1.5. Configuring Service Entities
7. Network Address Translation
7.1. Terminology
7.2. Network Address Translation (NAT) Overview
7.2.1. Principles of NAT
7.2.2. Traffic Load Balancing
7.2.3. Application Compatibility
7.3. Large Scale NAT
7.3.1. Port Range Blocks
7.3.1.1. Reserved Ports and Priority Sessions
7.3.1.2. Preventing Port Block Starvation
7.3.1.2.1. Dynamic Port Block Starvation in LSN
7.3.1.2.2. Dynamic Port Block Reservation
7.3.2. Timeouts
7.3.3. Watermarks
7.4. L2-Aware NAT
7.4.1. Port Block Extensions
7.4.1.1. Managing Port Block Space
7.4.2. L2-Aware NAT Bypass
7.4.2.1. Full ESM Host Bypass
7.4.2.2. Selective L2-Aware NAT Bypass
7.4.2.2.1. On-Line Change of the Selective NAT Bypass
7.4.2.2.2. NAT Bypass Verification
7.4.3. L2-Aware NAT Destination-Based Multiple NAT Policies
7.4.3.1. Logging
7.4.3.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.4.3.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.4.3.2. Static Port Forwards
7.4.3.3. L2-Aware Ping
7.4.3.4. UPnP
7.5. Traffic Steering to NAT
7.5.1. Routing Approach in LSN44
7.5.1.1. Static NAT Routes
7.5.1.2. Dynamic Routing to LSN44
7.5.1.2.1. Deterministic LSN44, Non-Deterministic LSN44, and 1:1 Static LSN44 in a Dynamic Routing Environment
7.5.1.3. Combination of Static and Dynamic Routes
7.5.1.4. Scale and Logging Notes
7.5.2. NAT Steering through IP Filters
7.6. L2-Aware Support for Residential Gateway Types
7.7. One-to-One (1:1) NAT
7.7.1. Static 1:1 NAT
7.7.1.1. Protocol Agnostic Behavior
7.7.1.2. Modification of Parameters in Static 1:1 NAT
7.7.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.7.1.4. NAT-Policy Selection
7.7.1.5. Mapping Timeout
7.7.1.6. Logging
7.7.1.7. Restrictions
7.7.2. ICMP
7.8. Deterministic NAT
7.8.1. Overview
7.8.2. Supported Deterministic NAT Types
7.8.3. Number of Subscribers per Outside IP and per Pool
7.8.4. Referencing a Pool
7.8.5. Outside Pool Configuration
7.8.6. Mapping Rules and the map Command in Deterministic LSN44
7.8.7. Hashing Considerations in Deterministic LSN44
7.8.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.8.8. Sharing of Deterministic NAT Pools
7.8.9. Simultaneous support of dynamic and deterministic NAT
7.8.10. Selecting Traffic for NAT
7.8.11. Inverse Mappings
7.8.11.1. MIB approach
7.8.11.2. Off-line Approach to Obtain Deterministic Mappings
7.8.12. Logging
7.8.13. Deterministic DS-Lite
7.8.13.1. Hashing Considerations in DS-Lite
7.8.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.9. Destination Based NAT (DNAT)
7.9.1. Combination of SNAPT and DNAT
7.9.2. Forwarding Model in DNAT
7.9.3. DNAT Traffic Selection via NAT Classifier
7.9.4. Configuring DNAT
7.9.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.9.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.10. LSN – Multiple NAT Policies per Inside Routing Context
7.10.1. Restrictions
7.10.2. Multiple NAT Policies Per Inside Routing Context
7.10.3. Routing Approach for NAT Diversion
7.10.4. Filter-Based Approach
7.10.5. Multiple NAT Policies and Deterministic NAT
7.10.5.1. Combination of Deterministic LSN44, Non-Deterministic LSN44, and MNP
7.10.6. Multiple NAT Policies with DS-Lite and NAT64
7.10.7. Default NAT Policy
7.10.8. Scaling Considerations
7.10.9. Multiple NAT Policies and SPF Configuration Considerations
7.10.9.1. Multiple NAT Policies and Forwarding Considerations
7.10.10. Logging
7.11. NAT and CoA
7.11.1. CoA and NAT Policies
7.11.2. CoA and DNAT
7.11.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.12. Port Control Protocol (PCP)
7.13. PORT_SET Option
7.13.1. Terminology
7.13.2. Enabling the PORT_SET Option
7.13.3. Port Allocation Scheme
7.13.4. Limits and Quotas
7.13.5. Port Overlaps
7.13.6. Port Allocation Example
7.13.7. Operational Considerations
7.14. Universal Plug and Play Internet Gateway Device Service
7.14.1. Configuring UPnP IGD Service
7.15. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.15.1. PPTP Protocol
7.15.1.1. Supported Control Messages
7.15.1.2. GRE Tunnel
7.15.2. PPTP ALG Operation
7.15.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.15.4. Selection of Call IDs in NAT
7.16. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.17. NAT Logging
7.17.1. Syslog/SNMP/Local-File Logging
7.17.1.1. Filtering LSN Events to System Memory
7.17.1.2. NAT Logging to a Local File
7.17.2. SNMP Trap Logging
7.17.3. NAT Syslog
7.17.4. LSN RADIUS Logging
7.17.4.1. Periodic RADIUS Logging
7.17.4.1.1. Message Pacing
7.17.4.2. RADIUS Logging and L2-Aware NAT
7.17.5. Integrated L2-Aware NAT RADIUS Logging and BNG Accounting
7.17.5.1. Enabling RADIUS Logging for L2-Aware NAT Subscribers
7.17.5.2. Timestamp Interpretation
7.17.5.3. High Logging Rates
7.17.5.4. Intra-Chassis Redundancy
7.17.6. LSN and L2-Aware NAT Flow Logging
7.17.6.1. IPFIX Flow Logging
7.17.6.2. Template Formats
7.17.6.3. Template Format1 and Format2
7.17.6.4. Configuration Example
7.17.6.5. Syslog Flow Logging
7.17.6.5.1. Sequence Numbers
7.17.6.5.2. Timestamp
7.17.6.5.3. Event Aggregation
7.17.6.5.4. Syslog Transmission Rate Limit and Overload Conditions
7.18. DS-Lite and NAT64 Fragmentation
7.18.1. Overview
7.18.2. IPv6 Fragmentation in DS-Lite
7.18.3. NAT64
7.19. DS-Lite Reassembly
7.19.1. Interpreting Fragmentation Statistics
7.20. Enhanced Statistics in NAT — Histogram
7.20.1. Configuration
7.21. NAT Redundancy
7.21.1. NAT Stateless Dual-Homing
7.21.1.1. Configuration Considerations
7.21.1.2. Troubleshooting Commands
7.21.2. Active-Active ISA Redundancy Model
7.21.2.1. Startup Conditions
7.21.2.2. Recovery
7.21.2.3. Adding Additional ISAs in the ISA Group
7.21.3. L2-Aware Bypass
7.21.3.1. Sharing IP Addresses in L2-Aware NAT
7.21.3.2. Recovery
7.21.3.3. Default Bypass During Reboot or MS-ISA Provisioning
7.21.3.4. Logging
7.22. Stateful Inter-Chassis NAT Redundancy
7.22.1. Health Status and Failure Events
7.22.2. Route Advertisements
7.22.3. Flow Synchronization
7.22.3.1. Loss of Synchronization
7.22.3.2. Flow Timeout on the Standby Node
7.22.3.3. Flow Timeout Following the Switchover
7.22.4. Rapid Consecutive Switchovers
7.22.5. ISA-to-ISA Communication
7.22.6. Preemption
7.22.7. Message Delivery Prioritization
7.22.8. Subscriber-Aware NAT
7.22.9. Matching Configuration on Redundant Pair of Nodes
7.22.10. Online Configuration changes
7.22.11. Scenario With Monitoring Ports
7.22.12. Configuring Stateful Inter-Chassis NAT Redundancy
7.23. ISA Feature Interactions
7.23.1. MS-ISA Use with Service Mirrors
7.23.2. LNS, Application Assurance and NAT
7.23.3. Subscriber Aware Large Scale NAT44
7.24. Mapping of Address and Port Using Translation (MAP-T)
7.24.1. MAP-T Rules
7.24.2. A+P Mapping Algorithm
7.24.3. Routing Considerations
7.24.4. Forwarding Considerations in the BR
7.24.4.1. IPv6 Addresses
7.24.4.2. 1:1 Translations and IPv4 Prefix Translations
7.24.4.3. Hub-And-Spoke Topology
7.24.4.4. Rule Prefix Overlap
7.24.5. BMR Rules Implementation Example
7.24.6. ICMP
7.24.7. Fragmentation
7.24.7.1. Fragmentation in the Downstream Direction
7.24.7.2. Fragmentation in the Upstream Direction
7.24.7.3. Fragmentation Statistics
7.24.8. Maximum Segment Size (MSS) Adjust
7.24.9. Statistics Collection
7.24.10. Logging
7.24.11. Licensing
7.24.12. Configuration
7.24.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.24.13. Inter-Chassis Redundancy
7.25. Configuring NAT
7.25.1. ISA Redundancy
7.25.2. NAT Layer 2-Aware Configurations
7.25.3. Large Scale NAT Configuration
7.25.4. NAT Configuration Examples
7.26. Configuring VSR-NAT
7.26.1. VSR-NAT Licensing
7.26.2. Statistics Collection For LSN Bindings
7.26.3. Statistics Collection For LSN Bandwidth
7.26.4. VSR-NAT Show Command Examples
7.27. VSR Scaling Profiles on BB-ISA
7.27.1. Scaling Profiles on the VSR
7.27.2. Scale Profile Modification
7.28. NAT scaling profiles on ESA
7.28.1. Scaling Profiles for NAT on ESA
7.28.2. Scale Profile Modification
8. Residential Firewall
8.1. Residential Firewall Overview
8.1.1. Supported Protocols and Extension Headers
8.1.1.1. Unknown Protocols
8.1.1.2. TCP and UDP
8.1.1.3. ICMPv6
8.1.2. Application Layer Gateway
8.1.3. Additional Filtering Control
8.1.4. TCP MSS Adjustment
8.1.5. Static Port Forwards and DMZ
8.2. Residential Firewall Provisioning
8.2.1. Domains and Addressing
9. TCP MSS Adjustment
9.1. Overview
9.2. TCP MSS Adjustment for ESM Hosts
9.3. TCP MSS Adjustment for NAT Services
10. L2TP Network Server
10.1. Subscriber agg-rate-limit on LNS
10.2. LNS Reassembly
10.2.1. Overview
10.2.2. Reassembly Function
10.2.3. Load Sharing Between the ISAs
10.2.4. Inter-chassis ISA Redundancy
10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
10.3.1. Terminology
10.3.2. LNS MLPPPoX
10.3.3. MLPPP Encapsulation
10.3.4. MLPPPoX Negotiation
10.3.5. Enabling MLPPPoX
10.3.6. Link Fragmentation and Interleaving (LFI)
10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
10.3.7. LFI Functionality Implemented in LNS
10.3.7.1. Last Mile QoS Awareness in the LNS
10.3.7.2. BB-ISA Processing
10.3.7.3. LNS-LAC Link
10.3.7.4. AN-RG Link
10.3.7.5. Home Link
10.3.7.6. Optimum Fragment Size Calculation by LNS
10.3.7.6.1. Encapsulation Based Fragment Size
10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
10.3.7.6.3. Selection of the Optimum Fragment Length
10.3.8. Upstream Traffic Considerations
10.3.9. Multiple Links MLPPPoX With No Interleaving
10.3.10. MLPPPoX Session Support
10.3.11. Session Load Balancing Across Multiple BB-ISAs
10.3.12. BB-ISA Hashing Considerations
10.3.13. Last Mile Rate and Encapsulation Parameters
10.3.14. Link Failure Detection
10.3.15. CoA Support
10.3.16. Accounting
10.3.17. Filters and Mirroring
10.3.18. PTA Considerations
10.3.19. QoS Considerations
10.3.19.1. Dual-Pass
10.3.19.2. Traffic Prioritization in LFI
10.3.19.3. Shaping Based on the Last Mile Wire Rates
10.3.19.4. Downstream Bandwidth Management on Egress Port
10.3.20. Sub/Sla-Profile Considerations
10.3.21. Example of MLPPPoX Session Setup Flow
10.3.22. Other Considerations
10.4. LNS Support on ESA
10.5. Configuration Notes
11. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. ISA and ESA Configuration Process
2. ISA and ESA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISM Overview
2.4. ESA 100G Overview
2.5. Application Assurance Hardware Features
2.5.1. AA System Support
2.5.2. Host IOM Support for AA on ISAs
2.5.3. Host IOM Support for AA on ESAs
2.6. Configuring an ESA with CLI
2.6.1. Provisioning an ESA and ESA-VM
3. Application Assurance
3.1. Application Assurance (AA) Overview
3.1.1. Application Assurance: Inline Policy Enforcement
3.1.2. AA Integration in Subscriber Edge Gateways
3.1.3. Fixed Residential Broadband Services
3.1.3.1. Dual-Stack Lite – DS-Lite
3.1.3.2. 6to4 /6RD
3.1.4. Wireless LAN Gateway Broadband Services
3.1.5. Application-Aware Business VPN Services
3.1.6. Mobile Backhaul
3.1.7. Stateful Firewall Service
3.2. Application Assurance System Architecture
3.2.1. AA ISA Resource Configuration
3.2.1.1. AA ISA Groups
3.2.1.1.1. AA Group Partitions
3.2.1.1.2. Bypass Modes
3.2.1.2. Redundancy
3.2.1.2.1. No AA ISA Group Redundancy
3.2.1.2.2. Failure to Fabric
3.2.1.2.3. N+1 AA ISA Card Warm Redundancy
3.2.1.3. ISA Load Balancing
3.2.1.4. Asymmetry Removal
3.2.1.4.1. Asymmetry Removal Overview
3.2.1.4.2. Failure Modes
3.2.1.4.3. AARP Peered Node/Instance Configuration
3.2.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.2.1.4.5. Multi-Chassis Datapath Shunts
3.2.1.5. ISA Overload Detection
3.2.2. AA Packet Processing
3.2.2.1. Divert of Traffic and Subscribers
3.2.2.1.1. Services and AA Subscribers
3.2.2.1.2. Spoke SDPs
3.2.2.1.3. Transit AA Subscribers
3.2.2.1.4. AA Subscriber Application Service Definition
3.2.2.2. Traffic Identification
3.2.2.2.1. Application Assurance Identification Components
3.2.2.2.2. Protocol Signatures
3.2.2.2.3. Custom Protocols
3.2.2.2.4. Protocol Shutdown
3.2.2.2.5. Supported Protocol Signatures
3.2.2.2.6. Application Groups
3.2.2.2.7. Charging Groups
3.2.2.2.8. Applications
3.2.2.2.9. Application Filters
3.2.2.2.10. HTTP
3.2.2.2.11. AA IP Prefix Lists
3.2.2.2.12. Shallow Flow Inspection
3.2.2.2.13. Flow Attributes
3.2.2.3. Statistics and Accounting
3.2.2.3.1. Per-AA Subscriber Special Study
3.2.2.3.2. System Aspects
3.2.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.2.2.3.4. AA Partition Traffic Type Statistics
3.2.2.3.5. Configurable AA Subscriber Statistics Collection
3.2.2.3.6. AA-Performance Record for ISA Load
3.2.2.3.7. AA Partition Traffic Type Statistics
3.2.2.3.8. AA Partition Admit–Deny Statistics
3.2.2.3.9. RADIUS Accounting AA Records
3.2.2.3.10. AA Gx Based Usage Monitoring
3.2.2.3.11. Supported AVPs
3.2.2.3.12. Cflowd AA Records
3.2.2.3.13. vRGW Nested Router Detection
3.2.2.4. Application QoS Policy (AQP)
3.2.2.4.1. AQP Match Criteria
3.2.2.4.2. AQP Actions
3.2.2.4.3. Application Assurance Policers
3.2.2.4.4. Application Assurance Dynamic Experience Management
3.2.2.4.5. Application Assurance HTTP Redirect
3.2.2.4.6. Application Assurance HTTPS Policy Redirect
3.2.2.4.7. ICAP - Large Scale Category-based URL Filtering
3.2.2.4.8. Web-service URL Classification
3.2.2.4.9. Local URL-List Filtering
3.2.2.4.10. HTTP Header Enrichment
3.2.2.4.11. ACR HTTP Enrichment
3.2.2.4.12. HTTP In Browser Notification
3.2.2.5. Application Assurance Firewall
3.2.2.5.1. Denial of Service (DoS) Protection
3.2.2.5.2. TCP Validation
3.2.2.5.3. Policy Partitioned AA FW
3.2.2.5.4. Configuring AA FW
3.2.2.5.5. AA FW Logging
3.2.2.5.6. SeGW Firewall Protection
3.2.2.5.7. GTP Backhaul Roaming Firewall Protection
3.2.3. Service Monitoring and Debugging
3.2.4. CPU Utilization
3.2.5. CLI Batch: Begin, Commit and Abort Commands
3.3. Configuring Application Assurance with CLI
3.3.1. Provisioning AA ISA MDA
3.3.2. Configuring an AA ISA Group
3.3.2.1. Configuring Watermark Parameters
3.3.3. Configuring a Group Policy
3.3.3.1. Beginning and Committing a Policy Configuration
3.3.3.2. Aborting a Policy Configuration
3.3.3.3. Configuring an IP Prefix List
3.3.3.4. Configuring AA Session Filters
3.3.3.5. Configuring an Application Group
3.3.3.6. Configuring an Application
3.3.3.7. Configuring an Application Filter
3.3.3.8. Configuring an Application Profile
3.3.3.9. Configuring Suppressible App-Profile with SRRP
3.3.3.10. Configuring Application Service Options
3.3.3.11. Configuring a Policer
3.3.3.12. Configuring an Application QoS Policy
3.3.3.13. Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
3.3.3.14. Configuring an HTTP Error Redirect
3.3.3.15. Configuring HTTP Header Enrichment
3.3.3.16. Configuring an HTTP Redirect Policy
3.3.3.17. Configuring an HTTPS Policy Redirect
3.3.3.18. Configuring a Captive Redirect HTTP Redirect Policy
3.3.3.18.1. Captive-Redirect and HTTPS Flows Redirection
3.3.3.19. Configuring ICAP URL Filtering
3.3.3.20. Configuring Web-service URL Classification
3.3.3.21. Configuring Local URL-List Filtering
3.3.3.22. Configuring HTTP Notification
3.3.3.23. Configuring Tethering Detection
3.3.4. Configuring AA Volume Accounting and Statistics
3.3.4.1. Configuring Cflowd Collector
3.3.4.2. Configuring AA Comprehensive, RTP Performance, TCP Performance, and Volume Reporting
4. IP Tunnels
4.1. IP Tunnels Overview
4.1.1. Tunnel ISAs
4.1.1.1. Public Tunnel SAPs
4.1.1.2. Private Tunnel SAPs
4.1.1.3. IP Interface Configuration
4.1.1.4. GRE and IP-IP Tunnel Configuration
4.1.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.1.1.6. TCP MSS Adjustment
4.1.1.7. MTU Propagation
4.1.2. Operational Conditions
4.1.2.1. Dynamic Configuration Change Support for IPsec Gateway
4.1.3. QoS Interactions
4.1.4. OAM Interactions
4.1.5. Redundancy
4.1.6. Statistics Collection
4.1.7. Security
4.1.7.1. GRE Tunnel Multicast Support
4.1.7.2. IPv6 over IPv4 GRE Tunnel
4.1.8. IKEv2
4.1.8.1. IKEv2 Traffic Selector and TS-List
4.1.8.2. IKEv2 Fragmentation
4.1.9. SHA2 Support
4.1.10. IPsec Client Lockout
4.1.11. IPsec Tunnel CHILD_SA Rekey
4.1.12. Multiple IKE/ESP Transform Support
4.2. X.509v3 Certificate Overview
4.2.1. SR OS X.509v3 Certificate Support
4.2.2. Local Storage
4.2.3. CA-Profile
4.2.4. CA Chain Computation
4.2.5. Certificate Enrollment
4.2.6. Certificate Revocation Check
4.2.7. Certificate/CRL Expiration Warning
4.2.8. Certificate/CRL/Key Cache
4.2.9. Auto CRL Update
4.2.10. IPsec Client Database
4.2.11. Encryption of Imported Files
4.3. Using Certificates For IPsec Tunnel Authentication
4.3.1. IKEv2 Digital Signature Authentication
4.4. Trust-Anchor Profile
4.5. Cert-Profile
4.6. Certificate Management Protocol Version 2 (CMPv2)
4.7. OCSP
4.8. Video Wholesale Example
4.9. Multi-Chassis IPsec Redundancy Overview
4.9.1. Architecture
4.9.2. MC-IPsec Mastership Protocol (MIMP)
4.9.2.1. MIMP Protocol States
4.9.2.2. Election Logic
4.9.2.3. Protection Status
4.9.2.4. Other Details
4.9.3. Routing
4.9.3.1. Routing in Public Service
4.9.3.2. Routing in Private Services
4.9.3.3. Other Details About Shunting
4.9.4. MC-IPsec Aware VRRP
4.9.5. Synchronization
4.9.5.1. Automatic CHILD_SA Rekey
4.9.5.2. Encryption of Synced States
4.9.5.2.1. Gracefully Enable Encryption Steps
4.9.6. Synchronization
4.9.6.1. Automatic CHILD_SA Rekey
4.9.6.2. Encryption of Synced States
4.9.6.2.1. Gracefully Enable Encryption Steps
4.9.7. Responder Only
4.10. IPsec Deployment Requirements
4.11. IKEv2 Remote-Access Tunnel
4.11.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.11.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.11.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.11.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.11.3.1. DHCPv4 Address Assignment
4.11.3.2. DHCPv6 Address Assignment
4.11.3.3. DHCPv4/v6 Usage Notes
4.11.4. IPv6 IPsec Support
4.11.4.1. IPv6 as Payload
4.11.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.11.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.11.4.4. IPv6 as Payload: Remote-Access Tunnel
4.11.4.5. IPv6 as Encapsulation
4.12. MLDv2 over IPsec
4.12.1. MLDv2 over IPsec – Traffic Selector
4.12.2. MLDv2 over IPsec – Configuration
4.13. Secured Interface
4.14. Configuring IPsec with CLI
4.14.1. Provisioning a Tunnel ISA
4.14.2. Configuring a Tunnel Group
4.14.3. Configuring Router Interfaces for IPsec
4.14.4. Configuring IPsec Parameters
4.14.5. Configuring IPsec in Services
4.14.6. Configuring X.509v3 Certificate Parameters
4.14.7. Configuring MC-IPsec
4.14.7.1. Configuring MIMP
4.14.7.2. Configuring Multi-Chassis Synchronization
4.14.7.3. Configuring Routing for MC-IPsec
4.14.7.4. Configuring MCS Encryption
4.14.8. Configuring and Using CMPv2
4.14.9. Configuring OCSP
4.14.10. Configuring IKEv2 Remote — Access Tunnel
4.14.11. Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
4.14.12. Configuring Secured Interfaces
5. L2TPV3 Tunnels
5.1. L2TPv3 Overview
5.2. Control Plane
5.3. Public SAP
5.4. Private SAP
6. Video Services
6.1. Video Services
6.1.1. Video Groups
6.1.2. Video SAP
6.1.3. Video Interface
6.1.4. Multicast Information Policies
6.1.5. Perfect Stream Protection
6.1.6. Perfect Stream Selection
6.1.6.1. Stream Identification
6.1.6.2. Initial Sequence Identification
6.1.6.3. Packet Selection
6.1.6.4. Clock Recovery
6.1.6.5. Playout
6.1.6.6. Loss of Transport
6.1.6.7. Perfect Stream in Relation to FCC/RET
6.1.6.8. Perfect Stream in Relation to VQM
6.1.7. Video Quality Monitoring
6.1.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.1.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.2. Retransmission and Fast Channel Change
6.2.1. RET and FCC Overview
6.2.1.1. Retransmission
6.2.1.2. Fast Channel Change (FCC)
6.2.1.2.1. Retransmission Client
6.2.1.2.2. Retransmission Server
6.2.1.2.3. Fast Channel Change Server
6.2.1.2.4. Logging and Accounting for RET and FCC
6.2.1.3. RET and FCC Server Concurrency
6.2.1.3.1. Prerequisites and Restrictions
6.2.2. Separate Timers for FCC and RET
6.2.3. Peak Bandwidth and Sessions per ISA
6.2.4. Video Support on ESA
6.3. Ad Insertion
6.3.1. Local/Zoned Ad Insertion
6.3.1.1. Transport Stream Ad Splicing
6.3.1.2. Ad Zones
6.3.1.3. Local/Zoned ADI Prerequisites and Restrictions
6.4. Configuring Video Service Components with CLI
6.4.1. Video Services Overview
6.4.1.1. Configuring an ISA-MS Module
6.4.1.2. Configuring a Video Group
6.4.1.3. Configuring a Video SAP and Video Interface in a Service
6.4.1.4. Basic Multicast Information Policy Configuration
6.4.2. Sample Configurations
6.5. Configuring RET/FCC Video Components with CLI
6.5.1. Configuring RET/FCC Video Features in the CLI
6.5.1.1. Configuring the RET Client
6.5.1.2. Configuring the RET Server
6.5.1.3. Configuring the FCC Server
6.5.1.4. Logging and Accounting Collection for Video Statistics
6.6. Configuring ADI Components with CLI
6.6.1. Configuring ADI in CLI
6.6.1.1. Configuring the RET Client
6.6.1.2. Configuring a Video Group
6.6.1.3. Configuring NTP
6.6.1.4. Configuring Channel Parameters
6.6.1.5. Configuring Service Entities
7. Network Address Translation
7.1. Terminology
7.2. Network Address Translation (NAT) Overview
7.2.1. Principles of NAT
7.2.2. Traffic Load Balancing
7.2.3. Application Compatibility
7.3. Large Scale NAT
7.3.1. Port Range Blocks
7.3.1.1. Reserved Ports and Priority Sessions
7.3.1.2. Preventing Port Block Starvation
7.3.1.2.1. Dynamic Port Block Starvation in LSN
7.3.1.2.2. Dynamic Port Block Reservation
7.3.2. Timeouts
7.3.3. Watermarks
7.4. L2-Aware NAT
7.4.1. Port Block Extensions
7.4.1.1. Managing Port Block Space
7.4.2. L2-Aware NAT Bypass
7.4.2.1. Full ESM Host Bypass
7.4.2.2. Selective L2-Aware NAT Bypass
7.4.2.2.1. On-Line Change of the Selective NAT Bypass
7.4.2.2.2. NAT Bypass Verification
7.4.3. L2-Aware NAT Destination-Based Multiple NAT Policies
7.4.3.1. Logging
7.4.3.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.4.3.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.4.3.2. Static Port Forwards
7.4.3.3. L2-Aware Ping
7.4.3.4. UPnP
7.5. Traffic Steering to NAT
7.5.1. Routing Approach in LSN44
7.5.1.1. Static NAT Routes
7.5.1.2. Dynamic Routing to LSN44
7.5.1.2.1. Deterministic LSN44, Non-Deterministic LSN44, and 1:1 Static LSN44 in a Dynamic Routing Environment
7.5.1.3. Combination of Static and Dynamic Routes
7.5.1.4. Scale and Logging Notes
7.5.2. NAT Steering through IP Filters
7.6. L2-Aware Support for Residential Gateway Types
7.7. One-to-One (1:1) NAT
7.7.1. Static 1:1 NAT
7.7.1.1. Protocol Agnostic Behavior
7.7.1.2. Modification of Parameters in Static 1:1 NAT
7.7.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.7.1.4. NAT-Policy Selection
7.7.1.5. Mapping Timeout
7.7.1.6. Logging
7.7.1.7. Restrictions
7.7.2. ICMP
7.8. Deterministic NAT
7.8.1. Overview
7.8.2. Supported Deterministic NAT Types
7.8.3. Number of Subscribers per Outside IP and per Pool
7.8.4. Referencing a Pool
7.8.5. Outside Pool Configuration
7.8.6. Mapping Rules and the map Command in Deterministic LSN44
7.8.7. Hashing Considerations in Deterministic LSN44
7.8.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.8.8. Sharing of Deterministic NAT Pools
7.8.9. Simultaneous support of dynamic and deterministic NAT
7.8.10. Selecting Traffic for NAT
7.8.11. Inverse Mappings
7.8.11.1. MIB approach
7.8.11.2. Off-line Approach to Obtain Deterministic Mappings
7.8.12. Logging
7.8.13. Deterministic DS-Lite
7.8.13.1. Hashing Considerations in DS-Lite
7.8.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.9. Destination Based NAT (DNAT)
7.9.1. Combination of SNAPT and DNAT
7.9.2. Forwarding Model in DNAT
7.9.3. DNAT Traffic Selection via NAT Classifier
7.9.4. Configuring DNAT
7.9.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.9.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.10. LSN – Multiple NAT Policies per Inside Routing Context
7.10.1. Restrictions
7.10.2. Multiple NAT Policies Per Inside Routing Context
7.10.3. Routing Approach for NAT Diversion
7.10.4. Filter-Based Approach
7.10.5. Multiple NAT Policies and Deterministic NAT
7.10.5.1. Combination of Deterministic LSN44, Non-Deterministic LSN44, and MNP
7.10.6. Multiple NAT Policies with DS-Lite and NAT64
7.10.7. Default NAT Policy
7.10.8. Scaling Considerations
7.10.9. Multiple NAT Policies and SPF Configuration Considerations
7.10.9.1. Multiple NAT Policies and Forwarding Considerations
7.10.10. Logging
7.11. NAT and CoA
7.11.1. CoA and NAT Policies
7.11.2. CoA and DNAT
7.11.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.12. Port Control Protocol (PCP)
7.13. PORT_SET Option
7.13.1. Terminology
7.13.2. Enabling the PORT_SET Option
7.13.3. Port Allocation Scheme
7.13.4. Limits and Quotas
7.13.5. Port Overlaps
7.13.6. Port Allocation Example
7.13.7. Operational Considerations
7.14. Universal Plug and Play Internet Gateway Device Service
7.14.1. Configuring UPnP IGD Service
7.15. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.15.1. PPTP Protocol
7.15.1.1. Supported Control Messages
7.15.1.2. GRE Tunnel
7.15.2. PPTP ALG Operation
7.15.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.15.4. Selection of Call IDs in NAT
7.16. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.17. NAT Logging
7.17.1. Syslog/SNMP/Local-File Logging
7.17.1.1. Filtering LSN Events to System Memory
7.17.1.2. NAT Logging to a Local File
7.17.2. SNMP Trap Logging
7.17.3. NAT Syslog
7.17.4. LSN RADIUS Logging
7.17.4.1. Periodic RADIUS Logging
7.17.4.1.1. Message Pacing
7.17.4.2. RADIUS Logging and L2-Aware NAT
7.17.5. Integrated L2-Aware NAT RADIUS Logging and BNG Accounting
7.17.5.1. Enabling RADIUS Logging for L2-Aware NAT Subscribers
7.17.5.2. Timestamp Interpretation
7.17.5.3. High Logging Rates
7.17.5.4. Intra-Chassis Redundancy
7.17.6. LSN and L2-Aware NAT Flow Logging
7.17.6.1. IPFIX Flow Logging
7.17.6.2. Template Formats
7.17.6.3. Template Format1 and Format2
7.17.6.4. Configuration Example
7.17.6.5. Syslog Flow Logging
7.17.6.5.1. Sequence Numbers
7.17.6.5.2. Timestamp
7.17.6.5.3. Event Aggregation
7.17.6.5.4. Syslog Transmission Rate Limit and Overload Conditions
7.18. DS-Lite and NAT64 Fragmentation
7.18.1. Overview
7.18.2. IPv6 Fragmentation in DS-Lite
7.18.3. NAT64
7.19. DS-Lite Reassembly
7.19.1. Interpreting Fragmentation Statistics
7.20. Enhanced Statistics in NAT — Histogram
7.20.1. Configuration
7.21. NAT Redundancy
7.21.1. NAT Stateless Dual-Homing
7.21.1.1. Configuration Considerations
7.21.1.2. Troubleshooting Commands
7.21.2. Active-Active ISA Redundancy Model
7.21.2.1. Startup Conditions
7.21.2.2. Recovery
7.21.2.3. Adding Additional ISAs in the ISA Group
7.21.3. L2-Aware Bypass
7.21.3.1. Sharing IP Addresses in L2-Aware NAT
7.21.3.2. Recovery
7.21.3.3. Default Bypass During Reboot or MS-ISA Provisioning
7.21.3.4. Logging
7.22. Stateful Inter-Chassis NAT Redundancy
7.22.1. Health Status and Failure Events
7.22.2. Route Advertisements
7.22.3. Flow Synchronization
7.22.3.1. Loss of Synchronization
7.22.3.2. Flow Timeout on the Standby Node
7.22.3.3. Flow Timeout Following the Switchover
7.22.4. Rapid Consecutive Switchovers
7.22.5. ISA-to-ISA Communication
7.22.6. Preemption
7.22.7. Message Delivery Prioritization
7.22.8. Subscriber-Aware NAT
7.22.9. Matching Configuration on Redundant Pair of Nodes
7.22.10. Online Configuration changes
7.22.11. Scenario With Monitoring Ports
7.22.12. Configuring Stateful Inter-Chassis NAT Redundancy
7.23. ISA Feature Interactions
7.23.1. MS-ISA Use with Service Mirrors
7.23.2. LNS, Application Assurance and NAT
7.23.3. Subscriber Aware Large Scale NAT44
7.24. Mapping of Address and Port Using Translation (MAP-T)
7.24.1. MAP-T Rules
7.24.2. A+P Mapping Algorithm
7.24.3. Routing Considerations
7.24.4. Forwarding Considerations in the BR
7.24.4.1. IPv6 Addresses
7.24.4.2. 1:1 Translations and IPv4 Prefix Translations
7.24.4.3. Hub-And-Spoke Topology
7.24.4.4. Rule Prefix Overlap
7.24.5. BMR Rules Implementation Example
7.24.6. ICMP
7.24.7. Fragmentation
7.24.7.1. Fragmentation in the Downstream Direction
7.24.7.2. Fragmentation in the Upstream Direction
7.24.7.3. Fragmentation Statistics
7.24.8. Maximum Segment Size (MSS) Adjust
7.24.9. Statistics Collection
7.24.10. Logging
7.24.11. Licensing
7.24.12. Configuration
7.24.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.24.13. Inter-Chassis Redundancy
7.25. Configuring NAT
7.25.1. ISA Redundancy
7.25.2. NAT Layer 2-Aware Configurations
7.25.3. Large Scale NAT Configuration
7.25.4. NAT Configuration Examples
7.26. Configuring VSR-NAT
7.26.1. VSR-NAT Licensing
7.26.2. Statistics Collection For LSN Bindings
7.26.3. Statistics Collection For LSN Bandwidth
7.26.4. VSR-NAT Show Command Examples
7.27. VSR Scaling Profiles on BB-ISA
7.27.1. Scaling Profiles on the VSR
7.27.2. Scale Profile Modification
7.28. NAT scaling profiles on ESA
7.28.1. Scaling Profiles for NAT on ESA
7.28.2. Scale Profile Modification
8. Residential Firewall
8.1. Residential Firewall Overview
8.1.1. Supported Protocols and Extension Headers
8.1.1.1. Unknown Protocols
8.1.1.2. TCP and UDP
8.1.1.3. ICMPv6
8.1.2. Application Layer Gateway
8.1.3. Additional Filtering Control
8.1.4. TCP MSS Adjustment
8.1.5. Static Port Forwards and DMZ
8.2. Residential Firewall Provisioning
8.2.1. Domains and Addressing
9. TCP MSS Adjustment
9.1. Overview
9.2. TCP MSS Adjustment for ESM Hosts
9.3. TCP MSS Adjustment for NAT Services
10. L2TP Network Server
10.1. Subscriber agg-rate-limit on LNS
10.2. LNS Reassembly
10.2.1. Overview
10.2.2. Reassembly Function
10.2.3. Load Sharing Between the ISAs
10.2.4. Inter-chassis ISA Redundancy
10.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
10.3.1. Terminology
10.3.2. LNS MLPPPoX
10.3.3. MLPPP Encapsulation
10.3.4. MLPPPoX Negotiation
10.3.5. Enabling MLPPPoX
10.3.6. Link Fragmentation and Interleaving (LFI)
10.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
10.3.7. LFI Functionality Implemented in LNS
10.3.7.1. Last Mile QoS Awareness in the LNS
10.3.7.2. BB-ISA Processing
10.3.7.3. LNS-LAC Link
10.3.7.4. AN-RG Link
10.3.7.5. Home Link
10.3.7.6. Optimum Fragment Size Calculation by LNS
10.3.7.6.1. Encapsulation Based Fragment Size
10.3.7.6.2. Fragment Size Based on the Max Transmission Delay
10.3.7.6.3. Selection of the Optimum Fragment Length
10.3.8. Upstream Traffic Considerations
10.3.9. Multiple Links MLPPPoX With No Interleaving
10.3.10. MLPPPoX Session Support
10.3.11. Session Load Balancing Across Multiple BB-ISAs
10.3.12. BB-ISA Hashing Considerations
10.3.13. Last Mile Rate and Encapsulation Parameters
10.3.14. Link Failure Detection
10.3.15. CoA Support
10.3.16. Accounting
10.3.17. Filters and Mirroring
10.3.18. PTA Considerations
10.3.19. QoS Considerations
10.3.19.1. Dual-Pass
10.3.19.2. Traffic Prioritization in LFI
10.3.19.3. Shaping Based on the Last Mile Wire Rates
10.3.19.4. Downstream Bandwidth Management on Egress Port
10.3.20. Sub/Sla-Profile Considerations
10.3.21. Example of MLPPPoX Session Setup Flow
10.3.22. Other Considerations
10.4. LNS Support on ESA
10.5. Configuration Notes
11. Standards and Protocol Support
Customer Document and Product Support
NISH Installation and User Guide Release 21.7.R1
Legal notice
Getting started
About this guide
Audience
Related technical publications
Network interface shell
NISH overview
NISH components
Accessing the Linux man pages
MD-CLI features support
NISH client
NISH client overview
SR OS node management
SR OS lifecycle support
MD-CLI navigation in NISH client
NISH Help and assistance
Linux direct access using NISH MD-CLI hybrid shell
SR OS node configuration using NISH MD-CLI
Obtaining the SR OS node operational state using NISH MD-CLI
NISH client installation
Installation process
Installing the NISH client
NISH client operation modes
Using the NISH client in 1:1 direct mode
Using the NISH client in 1:n static mode
Using the NISH client in 1:n manager mode
Command options
Authentication credentials
Device labels
Connections file
Local schema file
NISH rc files
Multi-node operations
Multi-node configuration modes
Configuration load operation
Multi-node rollback operation
Multi-node commit operation
Device name conflict resolution
Troubleshooting NISH client issues
NISH manager
Overview
Installing the NISH manager
Execution options
Interactive process
Linux service
Command options
Backup file
NISH manager logging
Setting the verbosity level for the log file
NISH manager configuration files
Configuring NISH security
Customer Documentation and Product Support
Legal notice
Getting started
About this guide
Audience
Related technical publications
Network interface shell
NISH overview
NISH components
Accessing the Linux man pages
MD-CLI features support
NISH client
NISH client overview
SR OS node management
SR OS lifecycle support
MD-CLI navigation in NISH client
NISH Help and assistance
Linux direct access using NISH MD-CLI hybrid shell
SR OS node configuration using NISH MD-CLI
Obtaining the SR OS node operational state using NISH MD-CLI
NISH client installation
Installation process
Installing the NISH client
NISH client operation modes
Using the NISH client in 1:1 direct mode
Using the NISH client in 1:n static mode
Using the NISH client in 1:n manager mode
Command options
Authentication credentials
Device labels
Connections file
Local schema file
NISH rc files
Multi-node operations
Multi-node configuration modes
Configuration load operation
Multi-node rollback operation
Multi-node commit operation
Device name conflict resolution
Troubleshooting NISH client issues
NISH manager
Overview
Installing the NISH manager
Execution options
Interactive process
Linux service
Command options
Backup file
NISH manager logging
Setting the verbosity level for the log file
NISH manager configuration files
Configuring NISH security
Customer Documentation and Product Support
OAM and Diagnostics Guide 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. Mirror Implementation
2.1.1. Mirror Components
2.1.2. Mirror Source
2.1.2.1. Types and Sources
2.1.2.2. Mirror Source Priority
2.1.3. Mirror Destination
2.1.3.1. General Local and Remote Mirroring
2.1.3.2. Mirror Destination Type IP-Only
2.1.3.3. Mirror Destination Type PPP with Port-ID Insertion
2.1.3.4. Layer 3 Encapsulation
2.1.3.5. PCAP Packet Capture
2.1.3.6. Mirrored Traffic Transport using MPLS-TP SDPs
2.1.3.7. Slicing and Sampling
2.1.4. Mirroring Performance
2.2. Lawful Intercept
2.2.1. LI Activation Through RADIUS
2.2.2. Routable Lawful Intercept Encapsulation
2.2.3. Lawful Intercept and NAT
2.2.3.1. Carrier Grade NAT
2.2.3.2. L2-Aware NAT
2.2.4. Lawful Intercept Management Interfaces
2.2.4.1. LI Management using the Classic CLI Engine
2.2.4.2. LI Management using the MD-CLI Engine
2.2.4.3. Lawful Intercept in NETCONF
2.2.4.4. Lawful Intercept in gNMI
2.2.4.5. CLI Configuration Mode Migration
2.2.4.5.1. Configuration Mode Migration Check List
2.2.5. Configuring Lawful Intercept in MD-CLI
2.3. Pseudowire Redundant Mirror Services
2.3.1. Redundant Mirror Source Notes
2.4. Configuration Process Overview
2.5. Configuration Notes
2.6. Configuring Service Mirroring with CLI
2.6.1. Mirror Configuration Overview
2.6.1.1. Defining Mirrored Traffic
2.6.2. Lawful Intercept Configuration Overview
2.6.2.1. Saving LI Data
2.6.2.2. Regulating LI Access
2.6.2.2.1. LI User Access
2.6.2.2.2. LI Source Configuration
2.6.2.3. Configurable Filter Lock for Lawful Intercept
2.6.2.4. LI MAC Filter Configuration
2.6.2.5. LI Logging
2.6.3. Basic Mirroring Configuration
2.6.3.1. Mirror Classification Rules
2.6.3.1.1. Port
2.6.3.1.2. SAP
2.6.3.1.3. MAC Filter
2.6.3.1.4. IP Filter
2.6.3.1.5. Ingress Label
2.6.3.1.6. Subscriber
2.6.4. Common Configuration Tasks
2.6.4.1. Configuring a Local Mirror Service
2.6.4.2. Configuring SDPs for Mirrors and LI
2.6.4.3. Configuring a Remote Mirror Service
2.6.4.4. Configuring an ATM Mirror Service
2.6.4.5. Configuring Lawful Intercept Parameters
2.6.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
2.7. Service Management Tasks
2.7.1. Modifying a Local Mirrored Service
2.7.2. Deleting a Local Mirrored Service
2.7.3. Modifying a Remote Mirrored Service
2.7.4. Deleting a Remote Mirrored Service
3. OAM Fault and Performance Tools and Protocols
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 or IPv6 Label Route
3.1.3. ECMP Considerations
3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.1.5. Downstream Detailed Mapping (DDMAP) TLV
3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.6.1. Responder Node Procedures
3.1.6.2. Sender Node Procedures
3.1.7. MPLS OAM Support in Segment Routing
3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
3.1.7.3. Operation on SR-TE LSP
3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
3.1.8. MPLS OAM Support in IPv4 or IPv6 SR Policies
3.1.8.1. LSP-Ping and LSP-Trace Operation
3.1.8.2. ICMP-Tunneling Operation
3.1.9. Segment Routing IPv6 (SRv6) OAM
3.1.9.1. Ping or Traceroute of SRv6 Remote Locator or Remote SID (End, End.X, End.DT4, End.DT6, End.DT46)
3.1.9.1.1. Ingress PE Router (Sender Node) Behavior
3.1.9.1.2. Transit P Router Behavior
3.1.9.1.3. Egress PE Router (Target Node) Behavior
3.1.9.1.4. Ping or Traceroute of an IPv4 or IPv6 VRF Prefix Resolved to an SRv6 Tunnel
3.1.9.1.5. Ping or Traceroute of an IPv4 or IPv6 Global Routing Instance Prefix Resolved to an SRv6 Tunnel
3.1.10. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.1.11. LDP ECMP Tree Building
3.1.12. Periodic Path Exercising
3.1.13. LSP Ping for RSVP P2MP LSP (P2MP)
3.1.14. LSP Trace for RSVP P2MP LSP
3.1.14.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.15. Tunneling of ICMP Reply Packets over MPLS LSP
3.1.16. QoS Handling of Tunneled ICMP Reply Packets
3.1.17. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.1.18. SDP Diagnostics
3.1.19. SDP Ping
3.1.20. SDP MTU Path Discovery
3.1.21. Service Diagnostics
3.1.22. VPLS MAC Diagnostics
3.1.23. MAC Ping
3.1.24. MAC Trace
3.1.25. CPE Ping
3.1.26. CPE Ping for PBB Epipe
3.1.26.1. Hardware Support
3.1.27. MAC Populate
3.1.28. MAC Purge
3.1.29. VLL Diagnostics
3.1.30. VCCV Ping
3.1.30.1. VCCV-Ping Application
3.1.30.2. VCCV Ping in a Multi-Segment Pseudowire
3.1.31. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.31.1. VCCV for Static Pseudowire Segments
3.1.31.2. Detailed VCCV-Trace Operation
3.1.31.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.31.3.1. Sending a VCCV Echo Request
3.1.31.3.2. Receiving an VCCV Echo Request
3.1.31.3.3. Receiving an VCCV Echo Reply
3.1.32. IGMP Snooping Diagnostics
3.1.33. MFIB Ping
3.1.34. ATM Diagnostics
3.1.35. MPLS-TP On-Demand OAM Commands
3.1.36. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.36.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.1.37. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.38. VXLAN Ping Supporting EVPN for VXLAN
3.1.39. Show Commands
3.1.40. BFD
3.1.41. MPLS Performance Monitoring (MPLS PM)
3.1.41.1. Configuring MPLS PM
3.1.41.1.1. Accounting Policy Configuration
3.1.41.1.2. Enabling MPLS DM
3.1.41.1.3. RSVP LSP Configuration
3.1.41.1.4. RSVP-Auto LSP Configuration Components
3.1.41.1.5. MPLS-TP LSP Configuration
3.1.41.1.6. MPLS OAM-PM Configuration
3.1.42. BIER OAM
3.1.42.1. ECMP and BIER OAM
3.1.42.2. Outbound Time
3.1.42.3. Negative Outbound Time
3.1.43. ICMP ping check connectivity Checking using ICMP Echo Request and Response
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. MPLS Performance Monitoring (MPLS PM)
3.4. Ethernet Connectivity Fault Management (ETH-CFM)
3.4.1. ETH-CFM Building Blocks
3.4.2. Loopback
3.4.3. Loopback Multicast
3.4.4. Linktrace
3.4.5. Continuity Check (CC)
3.4.6. CC Remote Peer Auto-Discovery
3.4.7. ETH-CFM Grace Overview
3.4.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
3.4.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
3.4.8. CCM Hold Timers
3.4.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
3.4.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
3.4.11. ITU-T Y.1731 Test (ETH-TST)
3.4.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
3.4.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
3.4.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
3.4.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
3.4.15.1. ETH-LMM Single SAP Counter
3.4.15.2. ETH-LMM Per Forwarding Class Counter
3.4.15.3. Interaction Between Single and Per FC Counters
3.4.16. ETH-CFM Destination Options
3.4.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
3.5. ETH-CFM Statistics
3.6. ETH-CFM Packet Debug
3.7. ETH-CFM CoS Considerations
3.8. OAM Mapping
3.8.1. CFM Connectivity Fault Conditions
3.8.2. CFM Fault Propagation Methods
3.8.3. Epipe Services
3.8.4. CFM Detected Fault
3.8.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.4.2. Service Down
3.8.4.3. Interaction with Pseudowire Redundancy
3.8.5. Ipipe Services
3.8.5.1. CFM Detected Fault
3.8.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
3.8.5.3. Service Administratively Shutdown
3.8.5.4. Interaction with Pseudowire Redundancy
3.8.6. VPLS Service
3.8.6.1. CFM Detected Fault
3.8.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.6.3. Service Down
3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.8.7. IES and VPRN Services
3.8.8. Pseudowire Switching
3.8.9. LLF and CFM Fault Propagation
3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.9. Bi-directional Forwarding Detection
3.9.1. BFD Control Packet
3.9.2. Control Packet Format
3.9.3. Echo Support
3.9.4. Centralized BFD
3.9.4.1. IES Over Spoke SDP
3.9.4.2. BFD Over LAG and VSM Interfaces
3.9.4.3. BFD on an Unnumbered IPv4 Interface
3.9.4.4. LSP BFD and VCCV BFD
3.9.4.5. Seamless BFD for SR-TE LSPs
3.9.5. Seamless Bidirectional Forwarding Detection
3.9.5.1. S-BFD Reflector Configuration and Behavior
3.9.5.2. S-BFD Initiator Global Configuration
3.9.5.2.1. Static S-BFD Discriminator Configuration
3.9.5.2.2. Automated S-BFD Discriminator Distribution
3.10. Traceroute with ICMP Tunneling In Common Applications
3.10.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.10.2. VPRN Inter-AS Option B
3.10.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.11. Hashing Visibility Tool
3.11.1. Configuring the Header Templates
3.11.2. Configuring Parameter Overrides and Header Sequences
3.12. Silent CFM Dropping with Squelching
4. OAM Monitoring and Reporting
4.1. Link Measurement
4.1.1. Link Measurement Template
4.1.1.1. General Configuration
4.1.1.2. Collection and Reporting
4.1.1.3. Protocol
4.1.1.4. Modifying Measurement Template Configuration
4.1.1.5. Displaying Link Measurements
4.1.2. Interface Assignment
4.1.2.1. IP Addressing
4.1.2.2. Test Initialization
4.1.2.3. History and Results
4.1.2.4. Static Versus Dynamic
4.1.2.5. Displaying Interface Delay Tests
4.2. OAM Performance Monitoring
4.2.1. Session
4.2.2. Standard PM Packets
4.2.3. Measurement Intervals
4.2.4. Data Structures and Storage
4.2.5. Bin Groups
4.2.6. Delay Results Streaming
4.2.6.1. Path Subscription Counters
4.2.7. Relating the Components
4.2.8. Monitoring
4.2.8.1. Accounting Policy Configuration
4.2.8.2. ETH-CFM Configuration
4.2.8.3. Service Configuration
4.2.8.4. OAM-PM Configuration
4.2.8.5. Show and Monitor Commands
4.3. Service Assurance Agent
5. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. Mirror Implementation
2.1.1. Mirror Components
2.1.2. Mirror Source
2.1.2.1. Types and Sources
2.1.2.2. Mirror Source Priority
2.1.3. Mirror Destination
2.1.3.1. General Local and Remote Mirroring
2.1.3.2. Mirror Destination Type IP-Only
2.1.3.3. Mirror Destination Type PPP with Port-ID Insertion
2.1.3.4. Layer 3 Encapsulation
2.1.3.5. PCAP Packet Capture
2.1.3.6. Mirrored Traffic Transport using MPLS-TP SDPs
2.1.3.7. Slicing and Sampling
2.1.4. Mirroring Performance
2.2. Lawful Intercept
2.2.1. LI Activation Through RADIUS
2.2.2. Routable Lawful Intercept Encapsulation
2.2.3. Lawful Intercept and NAT
2.2.3.1. Carrier Grade NAT
2.2.3.2. L2-Aware NAT
2.2.4. Lawful Intercept Management Interfaces
2.2.4.1. LI Management using the Classic CLI Engine
2.2.4.2. LI Management using the MD-CLI Engine
2.2.4.3. Lawful Intercept in NETCONF
2.2.4.4. Lawful Intercept in gNMI
2.2.4.5. CLI Configuration Mode Migration
2.2.4.5.1. Configuration Mode Migration Check List
2.2.5. Configuring Lawful Intercept in MD-CLI
2.3. Pseudowire Redundant Mirror Services
2.3.1. Redundant Mirror Source Notes
2.4. Configuration Process Overview
2.5. Configuration Notes
2.6. Configuring Service Mirroring with CLI
2.6.1. Mirror Configuration Overview
2.6.1.1. Defining Mirrored Traffic
2.6.2. Lawful Intercept Configuration Overview
2.6.2.1. Saving LI Data
2.6.2.2. Regulating LI Access
2.6.2.2.1. LI User Access
2.6.2.2.2. LI Source Configuration
2.6.2.3. Configurable Filter Lock for Lawful Intercept
2.6.2.4. LI MAC Filter Configuration
2.6.2.5. LI Logging
2.6.3. Basic Mirroring Configuration
2.6.3.1. Mirror Classification Rules
2.6.3.1.1. Port
2.6.3.1.2. SAP
2.6.3.1.3. MAC Filter
2.6.3.1.4. IP Filter
2.6.3.1.5. Ingress Label
2.6.3.1.6. Subscriber
2.6.4. Common Configuration Tasks
2.6.4.1. Configuring a Local Mirror Service
2.6.4.2. Configuring SDPs for Mirrors and LI
2.6.4.3. Configuring a Remote Mirror Service
2.6.4.4. Configuring an ATM Mirror Service
2.6.4.5. Configuring Lawful Intercept Parameters
2.6.4.6. Pseudowire Redundancy for Mirror Services Configuration Example
2.7. Service Management Tasks
2.7.1. Modifying a Local Mirrored Service
2.7.2. Deleting a Local Mirrored Service
2.7.3. Modifying a Remote Mirrored Service
2.7.4. Deleting a Remote Mirrored Service
3. OAM Fault and Performance Tools and Protocols
3.1. OAM Overview
3.1.1. LSP Diagnostics: LSP Ping and Trace
3.1.2. LSP Ping/Trace for an LSP Using a BGP IPv4 or IPv6 Label Route
3.1.3. ECMP Considerations
3.1.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.1.5. Downstream Detailed Mapping (DDMAP) TLV
3.1.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.1.6.1. Responder Node Procedures
3.1.6.2. Sender Node Procedures
3.1.7. MPLS OAM Support in Segment Routing
3.1.7.1. SR Extensions for LSP-PING and LSP-TRACE
3.1.7.2. Operation on SR-ISIS or SR-OSPF Tunnels
3.1.7.3. Operation on SR-TE LSP
3.1.7.4. Operation on an SR-ISIS Tunnel Stitched to an LDP FEC
3.1.7.5. Operation on a BGP IPv4 LSP Resolved Over an SR-ISIS IPv4 Tunnel, SR-OSPF IPv4 Tunnel, or SR-TE IPv4 LSP
3.1.7.6. Operation on an SR-ISIS IPv4 Tunnel, IPv6 Tunnel, or SR-OSPF IPv4 Tunnel Resolved Over IGP IPv4 Shortcuts Using RSVP-TE LSPs
3.1.7.7. Operation on an LDP IPv4 FEC Resolved Over IGP IPv4 Shortcuts Using SR-TE LSPs
3.1.8. MPLS OAM Support in IPv4 or IPv6 SR Policies
3.1.8.1. LSP-Ping and LSP-Trace Operation
3.1.8.2. ICMP-Tunneling Operation
3.1.9. Segment Routing IPv6 (SRv6) OAM
3.1.9.1. Ping or Traceroute of SRv6 Remote Locator or Remote SID (End, End.X, End.DT4, End.DT6, End.DT46)
3.1.9.1.1. Ingress PE Router (Sender Node) Behavior
3.1.9.1.2. Transit P Router Behavior
3.1.9.1.3. Egress PE Router (Target Node) Behavior
3.1.9.1.4. Ping or Traceroute of an IPv4 or IPv6 VRF Prefix Resolved to an SRv6 Tunnel
3.1.9.1.5. Ping or Traceroute of an IPv4 or IPv6 Global Routing Instance Prefix Resolved to an SRv6 Tunnel
3.1.10. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.1.11. LDP ECMP Tree Building
3.1.12. Periodic Path Exercising
3.1.13. LSP Ping for RSVP P2MP LSP (P2MP)
3.1.14. LSP Trace for RSVP P2MP LSP
3.1.14.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.1.15. Tunneling of ICMP Reply Packets over MPLS LSP
3.1.16. QoS Handling of Tunneled ICMP Reply Packets
3.1.17. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.1.18. SDP Diagnostics
3.1.19. SDP Ping
3.1.20. SDP MTU Path Discovery
3.1.21. Service Diagnostics
3.1.22. VPLS MAC Diagnostics
3.1.23. MAC Ping
3.1.24. MAC Trace
3.1.25. CPE Ping
3.1.26. CPE Ping for PBB Epipe
3.1.26.1. Hardware Support
3.1.27. MAC Populate
3.1.28. MAC Purge
3.1.29. VLL Diagnostics
3.1.30. VCCV Ping
3.1.30.1. VCCV-Ping Application
3.1.30.2. VCCV Ping in a Multi-Segment Pseudowire
3.1.31. Automated VCCV-Trace Capability for MS-Pseudowire
3.1.31.1. VCCV for Static Pseudowire Segments
3.1.31.2. Detailed VCCV-Trace Operation
3.1.31.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.1.31.3.1. Sending a VCCV Echo Request
3.1.31.3.2. Receiving an VCCV Echo Request
3.1.31.3.3. Receiving an VCCV Echo Reply
3.1.32. IGMP Snooping Diagnostics
3.1.33. MFIB Ping
3.1.34. ATM Diagnostics
3.1.35. MPLS-TP On-Demand OAM Commands
3.1.36. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.1.36.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.1.37. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.1.38. VXLAN Ping Supporting EVPN for VXLAN
3.1.39. Show Commands
3.1.40. BFD
3.1.41. MPLS Performance Monitoring (MPLS PM)
3.1.41.1. Configuring MPLS PM
3.1.41.1.1. Accounting Policy Configuration
3.1.41.1.2. Enabling MPLS DM
3.1.41.1.3. RSVP LSP Configuration
3.1.41.1.4. RSVP-Auto LSP Configuration Components
3.1.41.1.5. MPLS-TP LSP Configuration
3.1.41.1.6. MPLS OAM-PM Configuration
3.1.42. BIER OAM
3.1.42.1. ECMP and BIER OAM
3.1.42.2. Outbound Time
3.1.42.3. Negative Outbound Time
3.1.43. ICMP ping check connectivity Checking using ICMP Echo Request and Response
3.2. IP Performance Monitoring (IP PM)
3.2.1. Two-Way Active Measurement Protocol (TWAMP)
3.2.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.3. MPLS Performance Monitoring (MPLS PM)
3.4. Ethernet Connectivity Fault Management (ETH-CFM)
3.4.1. ETH-CFM Building Blocks
3.4.2. Loopback
3.4.3. Loopback Multicast
3.4.4. Linktrace
3.4.5. Continuity Check (CC)
3.4.6. CC Remote Peer Auto-Discovery
3.4.7. ETH-CFM Grace Overview
3.4.7.1. ETH-VSM Grace (Nokia SR OS Vendor-Specific)
3.4.7.2. ITU-T Y.1731 Ethernet-Expected Defect (ETH-ED)
3.4.8. CCM Hold Timers
3.4.9. ITU-T Y.1731 Alarm Indication Signal (ETH-AIS)
3.4.10. ITU-T Y.1731 Client Signal Fail (ETH-CSF)
3.4.11. ITU-T Y.1731 Test (ETH-TST)
3.4.12. ITU-T Y.1731 One-Way Delay Measurement (ETH-1DM)
3.4.13. ITU-T Y.1731 Two-Way Delay Measurement (ETH-DMM)
3.4.14. ITU-T Y.1731 Synthetic Loss Measurement (ETH-SLM)
3.4.15. ITU-T Y.1731 Frame Loss Measurement (ETH-LMM)
3.4.15.1. ETH-LMM Single SAP Counter
3.4.15.2. ETH-LMM Per Forwarding Class Counter
3.4.15.3. Interaction Between Single and Per FC Counters
3.4.16. ETH-CFM Destination Options
3.4.17. ITU-T Y.1731 Ethernet Bandwidth Notification (ETH-BN)
3.5. ETH-CFM Statistics
3.6. ETH-CFM Packet Debug
3.7. ETH-CFM CoS Considerations
3.8. OAM Mapping
3.8.1. CFM Connectivity Fault Conditions
3.8.2. CFM Fault Propagation Methods
3.8.3. Epipe Services
3.8.4. CFM Detected Fault
3.8.4.1. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.4.2. Service Down
3.8.4.3. Interaction with Pseudowire Redundancy
3.8.5. Ipipe Services
3.8.5.1. CFM Detected Fault
3.8.5.2. SAP or SDP-Binding Failure (Including Pseudowire Status)
3.8.5.3. Service Administratively Shutdown
3.8.5.4. Interaction with Pseudowire Redundancy
3.8.6. VPLS Service
3.8.6.1. CFM Detected Fault
3.8.6.2. SAP and SDP-Binding Failure (Including Pseudowire Status)
3.8.6.3. Service Down
3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.8.7. IES and VPRN Services
3.8.8. Pseudowire Switching
3.8.9. LLF and CFM Fault Propagation
3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.9. Bi-directional Forwarding Detection
3.9.1. BFD Control Packet
3.9.2. Control Packet Format
3.9.3. Echo Support
3.9.4. Centralized BFD
3.9.4.1. IES Over Spoke SDP
3.9.4.2. BFD Over LAG and VSM Interfaces
3.9.4.3. BFD on an Unnumbered IPv4 Interface
3.9.4.4. LSP BFD and VCCV BFD
3.9.4.5. Seamless BFD for SR-TE LSPs
3.9.5. Seamless Bidirectional Forwarding Detection
3.9.5.1. S-BFD Reflector Configuration and Behavior
3.9.5.2. S-BFD Initiator Global Configuration
3.9.5.2.1. Static S-BFD Discriminator Configuration
3.9.5.2.2. Automated S-BFD Discriminator Distribution
3.10. Traceroute with ICMP Tunneling In Common Applications
3.10.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.10.2. VPRN Inter-AS Option B
3.10.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.11. Hashing Visibility Tool
3.11.1. Configuring the Header Templates
3.11.2. Configuring Parameter Overrides and Header Sequences
3.12. Silent CFM Dropping with Squelching
4. OAM Monitoring and Reporting
4.1. Link Measurement
4.1.1. Link Measurement Template
4.1.1.1. General Configuration
4.1.1.2. Collection and Reporting
4.1.1.3. Protocol
4.1.1.4. Modifying Measurement Template Configuration
4.1.1.5. Displaying Link Measurements
4.1.2. Interface Assignment
4.1.2.1. IP Addressing
4.1.2.2. Test Initialization
4.1.2.3. History and Results
4.1.2.4. Static Versus Dynamic
4.1.2.5. Displaying Interface Delay Tests
4.2. OAM Performance Monitoring
4.2.1. Session
4.2.2. Standard PM Packets
4.2.3. Measurement Intervals
4.2.4. Data Structures and Storage
4.2.5. Bin Groups
4.2.6. Delay Results Streaming
4.2.6.1. Path Subscription Counters
4.2.7. Relating the Components
4.2.8. Monitoring
4.2.8.1. Accounting Policy Configuration
4.2.8.2. ETH-CFM Configuration
4.2.8.3. Service Configuration
4.2.8.4. OAM-PM Configuration
4.2.8.5. Show and Monitor Commands
4.3. Service Assurance Agent
5. Standards and Protocol Support
Customer Document and Product Support
Quality of Service Guide 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2. QoS Policies
2.1. QoS Overview
2.2. Forwarding Classes
2.2.1. High-Priority Classes
2.2.2. Assured Classes
2.2.3. Best-Effort Classes
2.3. Queue Parameters
2.3.1. Queue ID
2.3.2. Unicast or Multipoint Queue
2.3.3. Queue Type
2.3.4. Queue Scheduling
2.3.5. Peak Information Rate
2.3.6. Committed Information Rate
2.3.7. Fair Information Rate
2.3.8. Adaptation Rule
2.3.9. Committed Burst Size
2.3.10. Maximum Burst Size
2.3.11. Queue Drop Tails
2.3.12. WRED Per Queue
2.3.12.1. Native Queue Mode
2.3.12.2. Pool Per Queue Mode
2.3.13. Packet Markings
2.3.14. Queue Counters
2.3.15. Color Aware Profiling
2.4. QoS Policies Overview
2.4.1. Service versus Network QoS
2.4.2. QoS Policy Entities
2.4.3. Network QoS Policies
2.4.4. Network Queue QoS Policies
2.4.5. Service Ingress QoS Policies
2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.4.5.2. Egress Forwarding Class Override
2.4.6. Service Egress QoS Policies
2.4.7. Slope Policies
2.4.7.1. RED Slopes
2.4.7.2. Tuning the SBAU Calculation
2.4.7.3. Slope Policy Parameters
2.4.8. Scheduler Policies
2.4.8.1. Virtual Hierarchical Scheduling
2.4.8.2. Hierarchical Scheduler Policies
2.4.8.2.1. Hierarchical Virtual Schedulers
2.4.8.3. Tiers
2.4.8.4. Scheduler Policies Applied to Applications
2.4.8.5. Scheduler Policies Applied to SAPs
2.4.8.6. Scheduler Policies Applied to Customer SLAs
2.4.8.7. Scheduler Policies Applied to Multiservice Sites
2.4.9. ATM Traffic Descriptor Profiles
2.4.10. Configuration Notes
3. FP QoS Configuration
3.1. FP4 Ingress and Egress Queue Reallocation
4. Match List for QoS Policies
5. Network QoS Policies
5.1. Network QoS Policies Overview
5.1.1. Storing Match-Criteria Entries
5.1.1.1. FP4-based Cards
5.2. Network Ingress
5.2.1. Network Ingress Tunnel QoS Override
5.2.2. Network Ingress IP Match Criteria
5.2.3. Network Ingress IPv6 Match Criteria
5.3. Network Egress
5.3.1. Egress Packet Reclassification Based on IP precedence DSCP
5.3.2. Network Egress IP Match Criteria
5.3.3. Network Egress IPv6 Match Criteria
5.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
5.4.1. Default DSCP Mapping Table
5.5. Basic Configurations
5.5.1. Creating a Network QoS Policy
5.5.2. Applying Network QoS Policies
5.5.3. Default Network QoS Policy Values
5.6. Service Management Tasks
5.6.1. Deleting QoS Policies
5.6.2. Removing a Policy from the QoS Configuration
5.6.3. Copying and Overwriting Network Policies
5.6.4. Editing QoS Policies
6. Network Queue QoS Policies
6.1. Overview
6.2. Network Queue Parent Scheduler
6.3. Basic Configurations
6.3.1. Creating a Network Queue QoS Policy
6.3.2. Applying Network Queue QoS Policies
6.3.2.1. FPs
6.3.2.2. Ethernet Ports
6.3.2.3. SONET/SDH Ports
6.3.3. Default Network Queue Policy Values
6.4. Service Management Tasks
6.4.1. Deleting QoS Policies
6.4.2. Removing a Policy from the QoS Configuration
6.4.3. Copying and Overwriting QoS Policies
6.4.4. Editing QoS Policies
7. Service Ingress and Egress QoS Policies
7.1. Overview
7.2. Basic Configurations
7.3. Service Ingress QoS Policy
7.3.1. Service Ingress QoS Queue
7.3.2. Ingress Percent-Rate Support
7.3.3. Ingress Forwarding Class (FC)
7.3.4. Ingress IP Match Criteria
7.3.5. Ingress IPv6 Match Criteria
7.3.6. Tagging of Ingress Ip-criteria and Ipv6-criteria
7.3.7. Ingress MAC Match Criteria
7.3.7.1. VLAN ID Matching
7.3.8. Ingress Criteria Classification Directly to Policer
7.3.9. Virtual Network Identifier Classification
7.3.10. FC Mapping Based on EXP Bits
7.3.11. Storing Match Criteria Entries
7.3.11.1. FP4-based Cards
7.4. Service Egress QoS Policy
7.4.1. Service Egress QoS Queue
7.4.2. Egress Percent-Rate Support
7.4.3. Dynamic MBS for Egress Queue Group Queues
7.4.3.1. Queue Length as a Delay Value
7.4.4. Egress SAP FC and FP Overrides
7.4.5. Egress IP Match Criteria
7.4.6. Egress IPv6 Match Criteria
7.4.7. Egress Criteria Classification Directly to Policer
7.4.8. Storing Match Criteria Entries
7.4.8.1. FP4-based Cards
7.4.9. Dot1p Egress Remarking
7.4.9.1. DEI Egress Remarking
7.4.9.1.1. DEI in IEEE 802.1ad
7.4.9.1.2. DEI in IEEE 802.1ah
7.4.9.1.3. IEEE 802.1ad Use Case
7.4.9.1.4. IEEE 802.1ah Use Case
7.4.10. DSCP and IP Precedence Egress Remarking
7.4.11. Queue Depth Monitoring
7.5. Service Management Tasks
7.5.1. Applying Service Ingress and Egress Policies
7.5.1.1. Epipe
7.5.1.2. IES
7.5.1.3. VPLS
7.5.1.4. VPRN
7.5.2. Editing QoS Policies
7.5.3. Copying and Overwriting QoS Policies
7.5.4. Deleting QoS Policies
7.5.5. Removing a Policy from the QoS Configuration
8. Queue Sharing and Redirection
8.1. Queue Sharing and Redirection
8.1.1. Supported Platforms
8.2. Queue Group Applications
8.2.1. Access SAP Queue Group Applications
8.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
8.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
8.2.2. Network Port Queue Groups for IP Interfaces
8.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
8.2.4. QoS on Ingress Bindings
8.2.5. VXLAN VNI Queue Group Redirection
8.2.5.1. Queue Group Redirect List
8.2.5.2. Queue Group Redirect List Example
8.3. Queue Group Templates
8.4. Port Queue Groups
8.4.1. Percent-Rate Support
8.5. Forwarding Plane Queue Groups
8.6. Redirection Models
8.7. Access SAP Forwarding Class-Based Redirection
8.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
8.7.1.1. Policy-Based Provisioning Model
8.7.1.2. SAP-Based Provisioning Model
8.7.2. Access Queue Group Statistics
8.7.2.1. Port Queue Groups
8.7.2.2. Forwarding Plane Queue Groups
8.8. Network IP Interface Forwarding Class-Based Redirection
8.8.1. Egress Network Forwarding Class Redirection Association Rules
8.8.2. Egress Network IP Interface Statistics
8.9. PW Shaping
8.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.9.1.1. Feature Configuration
8.9.1.2. Provisioning Model
8.9.1.3. Ingress Packet Classification
8.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
8.9.2.1. Feature Configuration
8.9.2.2. Provisioning Model
8.9.2.3. Egress Marking of PW Packet Header
8.9.2.4. Ingress and Egress PW Statistics
8.10. Queue Group Behavior on LAG
8.10.1. Queue Group Queue Instantiation Per Link
8.10.2. Per-Link Queue Group Queue Parameters
8.10.3. Adding a Queue Group to an Existing LAG
8.10.4. Adding a Port to a LAG
8.10.5. Removing a Queue Group from a LAG
8.11. Basic Configurations
8.11.1. Configuring an Ingress Queue Group Template
8.11.2. Configuring Egress Queue Group Template
8.11.3. Applying Ingress Queue Group to SAP Ingress Policy
8.11.4. Applying Egress Queue Group to SAP Egress Policy
8.11.5. Configuring SAP-based Egress Queue Redirection
8.11.6. Configuring Queue Group on Ethernet Access Ingress Port
8.11.7. Configuring Overrides
8.11.8. Configuring Queue Group on Ethernet Access Egress Port
8.11.9. Configuring Queue Group for Network Egress Traffic on Port
8.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
8.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
8.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.11.13. Specifying QoS Policies on Service SAPs
9. Scheduler QoS Policies
9.1. Scheduler Policies
9.1.1. Egress Port-Based Schedulers
9.1.1.1. H-QoS Algorithm Selection
9.1.1.2. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
9.1.1.3. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
9.1.1.3.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
9.1.1.4. Frame and Packet-Based Bandwidth Allocation
9.1.1.5. Parental Association Scope
9.1.1.6. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
9.1.1.7. Network Queue Parent Scheduler
9.1.1.8. Foster Parent Behavior for Orphaned Queues and Schedulers
9.1.1.9. Congestion Monitoring on Egress Port Scheduler
9.1.1.9.1. Scalability, Performance, and Operation
9.1.1.9.2. Restrictions
9.1.2. Frame-Based Accounting
9.1.2.1. Operational Modifications
9.1.2.2. Existing Egress Port-Based Virtual Scheduling
9.1.2.3. Behavior Modifications for Frame-Based Accounting
9.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
9.1.3. Virtual Scheduling Unused Bandwidth Distribution
9.1.3.1. Default Unused Bandwidth Distribution
9.1.3.2. Limit Unused Bandwidth
9.1.4. Configuring Port Scheduler Policies
9.1.4.1. Port Scheduler Structure
9.1.4.2. Special Orphan Queue and Scheduler Behavior
9.1.4.3. Packet to Frame Bandwidth Conversion
9.1.4.4. Aggregate Rate Limits for Directly Attached Queues
9.1.4.5. SAP Egress QoS Policy Queue Parenting
9.1.4.6. Network Queue QoS Policy Queue Parenting
9.1.4.7. Egress Port Scheduler Overrides
9.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
9.1.4.9. Applying Aggregate Rate Limit to a Vport
9.1.4.10. Applying a Scheduler Policy to a Vport
9.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
9.2. Basic Configurations
9.2.1. Creating a QoS Scheduler Policy
9.2.2. Applying Scheduler Policies
9.2.2.1. Customer
9.2.2.2. Epipe
9.2.2.3. IES
9.2.2.4. VPLS
9.2.2.5. VPRN
9.2.3. Creating a QoS Port Scheduler Policy
9.2.4. Configuring Port Parent Parameters
9.2.4.1. Within-CIR Priority Level Parameters
9.2.4.2. Above-CIR Priority Level Parameters
9.2.5. Configuring Distributed LAG Rate
9.3. Service Management Tasks
9.3.1. Deleting QoS Policies
9.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
9.3.1.2. Removing a QoS Policy from SAP(s)
9.3.1.3. Removing a Policy from the QoS Configuration
9.3.2. Copying and Overwriting Scheduler Policies
9.3.3. Editing QoS Policies
10. Hardware-assisted Hierarchical QoS
10.1. Hardware Aggregate Shapers
10.2. Fair Bandwidth-distribution Algorithm
10.3. Hardware Aggregate Shaper Scheduler Policy
10.4. Interactions with Other QoS Features
10.4.1. Activation of Hardware Aggregate Shapers
10.4.2. Hardware Aggregate Shapers and LAG
10.4.3. Encapsulation Offset
10.4.4. Advanced QoS Configuration Policy
11. Slope QoS Policies
11.1. Overview
11.2. Basic Configurations
11.2.1. Creating a Slope QoS Policy
11.2.2. Applying Slope Policies
11.2.2.1. Ports
11.2.2.2. FP
11.2.3. Default Slope Policy Values
11.3. Service Management Tasks
11.3.1. Deleting QoS Policies
11.3.1.1. Ports
11.3.1.2. FP
11.3.1.3. Removing a Policy from the QoS Configuration
11.3.2. Copying and Overwriting QoS Policies
11.3.3. Editing QoS Policies
12. Shared-Queue QoS Policies
12.1. Overview
12.2. Multipoint Shared Queuing
12.2.1. Ingress Queuing Modes of Operation
12.2.2. Ingress Service Queuing
12.2.2.1. Ingress Shared Queuing
12.2.2.2. Ingress Multipoint Shared Queuing
12.3. Basic Configurations
12.3.1. Modifying the Default Shared-Queue Policy
12.3.1.1. Applying Shared-Queue Policies
12.3.1.1.1. Epipe Services
12.3.1.1.2. IES Services
12.3.1.1.3. VPLS Services
12.3.1.1.4. VPRN Services
12.3.2. Default Shared Queue Policy Values
13. Advanced QoS Policies
13.1. Overview
13.2. Port Scheduler Above Offered Allowance Control
13.3. Basic Configurations
13.3.1. Creating an Advanced QoS Policy
13.3.2. Applying Advanced Policies
13.3.2.1. Queue Group
13.3.2.2. SAP Ingress
13.3.2.3. SAP Egress
13.3.3. Default Advanced Policy Values
13.4. Service Management Tasks
13.4.1. Deleting QoS Policies
13.4.1.1. Queue Group
13.4.1.2. SAP Ingress
13.4.1.3. SAP Egress
13.4.2. Copying and Overwriting Advanced Policies
13.4.3. Editing Advanced Policies
14. QoS ATM Traffic Descriptor Profiles
14.1. ATM Traffic Management
14.2. QoS Model for ATM-Based Services
14.3. ATM Service Categories
14.4. ATM Traffic Descriptors and QoS Parameters
14.5. Policing
14.6. Shaping
14.7. ATM Queuing and Scheduling
14.8. Congestion Avoidance
14.9. Basic Configurations
14.9.1. Creating an ATM-TD-Profile QoS Policy
14.9.2. Applying ATM-TD-Profile Policies
14.9.2.1. ATM VLL (Apipe) SAPs
14.9.2.2. Epipe SAPs
14.9.2.3. IES SAPs
14.9.2.4. Ipipe SAPs
14.9.2.5. VPRN SAPs
14.9.2.6. VPLS SAPs
14.9.3. Default ATM-TD-Profile Policy Values
14.10. Service Management Tasks
14.10.1. Removing a Profile from the QoS Configuration
14.10.2. Copying and Overwriting Profiles
14.10.3. Editing QoS Policies
15. High Scale QoS IOM
15.1. Introduction
15.1.1. HSQ Shaping
15.1.2. HSQ Scheduling
15.1.3. HSQ Buffer Management
15.1.4. HSQ LAGs
15.2. HSQ IOM-Specific Configurations
15.3. Non-Applicable HSQ IOM Functions
16. QoS in MC-MLPPP
16.1. Overview
16.2. Ingress MLPPP Class Reassembly
16.3. Basic Configurations
16.3.1. Configuring MC-MLPPP
16.3.2. Configuring MC-MLPPP QoS Parameters
16.4. QoS in MLFR and FRF.12 Fragmentation
16.4.1. QoS in MLFR
16.4.2. QoS in FRF.12 End-to-End Fragmentation
17. Class Fair Hierarchical Policing (CFHP)
17.1. Overview
17.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
17.3. CFHP Ingress and Egress Use Cases
17.4. Post-CFHP Queuing and Scheduling
17.4.1. Ingress CFHP Queuing
17.4.2. Egress CFHP Queuing
17.4.2.1. Policer to Local Queue Mapping
17.4.3. Egress Subscriber CFHP Queuing
17.4.3.1. Subscriber Destination String Queue Group Identification
17.4.4. SAP Default Destination String
17.5. CFHP Policer Control Policy
17.5.1. Policer Control Policy Root Arbiter
17.5.2. Tier 1 and Tier 2 Explicit Arbiters
17.5.3. Explicit Arbiter Rate Limits
17.5.4. CFHP with Child Policer Exceed PIR Enabled
17.6. CFHP Child Policer Definition and Creation
17.7. Policer Enabled SAP QoS Policy Applicability
17.8. Child Policer Parent Association
17.9. Profile-Capped Policers
17.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
17.10.1. Ingress ‘Undefined’ Initial Profile
17.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
17.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
17.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
17.10.5. Egress Explicit Profile Reclassification
17.10.6. Preserving Out of Profile State at Egress Policer
17.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
17.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
17.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
17.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
17.10.11. Ingress Child Policer Stat-Mode
17.10.12. Egress Child Policer Stat-Mode
17.11. Profile-Preferred Mode Root Policers
17.12. Child Policer Hierarchical QoS Parenting
18. Frequently Used QoS Terms
18.1. Overview
18.2. Above-CIR Distribution
18.3. Available Bandwidth
18.4. CBS
18.5. CIR
18.6. CIR Level
18.7. CIR Weight
18.8. Child
18.9. Level
18.10. MBS
18.11. Offered Load
18.12. Orphan
18.13. Parent
18.14. Queue
18.15. Rate
18.16. Root (Scheduler)
18.17. Scheduler Policy
18.18. Tier
18.19. Virtual Scheduler
18.20. Weight
18.21. Within-CIR Distribution
19. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2. QoS Policies
2.1. QoS Overview
2.2. Forwarding Classes
2.2.1. High-Priority Classes
2.2.2. Assured Classes
2.2.3. Best-Effort Classes
2.3. Queue Parameters
2.3.1. Queue ID
2.3.2. Unicast or Multipoint Queue
2.3.3. Queue Type
2.3.4. Queue Scheduling
2.3.5. Peak Information Rate
2.3.6. Committed Information Rate
2.3.7. Fair Information Rate
2.3.8. Adaptation Rule
2.3.9. Committed Burst Size
2.3.10. Maximum Burst Size
2.3.11. Queue Drop Tails
2.3.12. WRED Per Queue
2.3.12.1. Native Queue Mode
2.3.12.2. Pool Per Queue Mode
2.3.13. Packet Markings
2.3.14. Queue Counters
2.3.15. Color Aware Profiling
2.4. QoS Policies Overview
2.4.1. Service versus Network QoS
2.4.2. QoS Policy Entities
2.4.3. Network QoS Policies
2.4.4. Network Queue QoS Policies
2.4.5. Service Ingress QoS Policies
2.4.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.4.5.2. Egress Forwarding Class Override
2.4.6. Service Egress QoS Policies
2.4.7. Slope Policies
2.4.7.1. RED Slopes
2.4.7.2. Tuning the SBAU Calculation
2.4.7.3. Slope Policy Parameters
2.4.8. Scheduler Policies
2.4.8.1. Virtual Hierarchical Scheduling
2.4.8.2. Hierarchical Scheduler Policies
2.4.8.2.1. Hierarchical Virtual Schedulers
2.4.8.3. Tiers
2.4.8.4. Scheduler Policies Applied to Applications
2.4.8.5. Scheduler Policies Applied to SAPs
2.4.8.6. Scheduler Policies Applied to Customer SLAs
2.4.8.7. Scheduler Policies Applied to Multiservice Sites
2.4.9. ATM Traffic Descriptor Profiles
2.4.10. Configuration Notes
3. FP QoS Configuration
3.1. FP4 Ingress and Egress Queue Reallocation
4. Match List for QoS Policies
5. Network QoS Policies
5.1. Network QoS Policies Overview
5.1.1. Storing Match-Criteria Entries
5.1.1.1. FP4-based Cards
5.2. Network Ingress
5.2.1. Network Ingress Tunnel QoS Override
5.2.2. Network Ingress IP Match Criteria
5.2.3. Network Ingress IPv6 Match Criteria
5.3. Network Egress
5.3.1. Egress Packet Reclassification Based on IP precedence DSCP
5.3.2. Network Egress IP Match Criteria
5.3.3. Network Egress IPv6 Match Criteria
5.4. QoS for Self-Generated (CPU) Traffic on Network Interfaces
5.4.1. Default DSCP Mapping Table
5.5. Basic Configurations
5.5.1. Creating a Network QoS Policy
5.5.2. Applying Network QoS Policies
5.5.3. Default Network QoS Policy Values
5.6. Service Management Tasks
5.6.1. Deleting QoS Policies
5.6.2. Removing a Policy from the QoS Configuration
5.6.3. Copying and Overwriting Network Policies
5.6.4. Editing QoS Policies
6. Network Queue QoS Policies
6.1. Overview
6.2. Network Queue Parent Scheduler
6.3. Basic Configurations
6.3.1. Creating a Network Queue QoS Policy
6.3.2. Applying Network Queue QoS Policies
6.3.2.1. FPs
6.3.2.2. Ethernet Ports
6.3.2.3. SONET/SDH Ports
6.3.3. Default Network Queue Policy Values
6.4. Service Management Tasks
6.4.1. Deleting QoS Policies
6.4.2. Removing a Policy from the QoS Configuration
6.4.3. Copying and Overwriting QoS Policies
6.4.4. Editing QoS Policies
7. Service Ingress and Egress QoS Policies
7.1. Overview
7.2. Basic Configurations
7.3. Service Ingress QoS Policy
7.3.1. Service Ingress QoS Queue
7.3.2. Ingress Percent-Rate Support
7.3.3. Ingress Forwarding Class (FC)
7.3.4. Ingress IP Match Criteria
7.3.5. Ingress IPv6 Match Criteria
7.3.6. Tagging of Ingress Ip-criteria and Ipv6-criteria
7.3.7. Ingress MAC Match Criteria
7.3.7.1. VLAN ID Matching
7.3.8. Ingress Criteria Classification Directly to Policer
7.3.9. Virtual Network Identifier Classification
7.3.10. FC Mapping Based on EXP Bits
7.3.11. Storing Match Criteria Entries
7.3.11.1. FP4-based Cards
7.4. Service Egress QoS Policy
7.4.1. Service Egress QoS Queue
7.4.2. Egress Percent-Rate Support
7.4.3. Dynamic MBS for Egress Queue Group Queues
7.4.3.1. Queue Length as a Delay Value
7.4.4. Egress SAP FC and FP Overrides
7.4.5. Egress IP Match Criteria
7.4.6. Egress IPv6 Match Criteria
7.4.7. Egress Criteria Classification Directly to Policer
7.4.8. Storing Match Criteria Entries
7.4.8.1. FP4-based Cards
7.4.9. Dot1p Egress Remarking
7.4.9.1. DEI Egress Remarking
7.4.9.1.1. DEI in IEEE 802.1ad
7.4.9.1.2. DEI in IEEE 802.1ah
7.4.9.1.3. IEEE 802.1ad Use Case
7.4.9.1.4. IEEE 802.1ah Use Case
7.4.10. DSCP and IP Precedence Egress Remarking
7.4.11. Queue Depth Monitoring
7.5. Service Management Tasks
7.5.1. Applying Service Ingress and Egress Policies
7.5.1.1. Epipe
7.5.1.2. IES
7.5.1.3. VPLS
7.5.1.4. VPRN
7.5.2. Editing QoS Policies
7.5.3. Copying and Overwriting QoS Policies
7.5.4. Deleting QoS Policies
7.5.5. Removing a Policy from the QoS Configuration
8. Queue Sharing and Redirection
8.1. Queue Sharing and Redirection
8.1.1. Supported Platforms
8.2. Queue Group Applications
8.2.1. Access SAP Queue Group Applications
8.2.1.1. Ingress Per SAP Statistics with Ingress Queue Groups
8.2.1.2. Ingress Access Port Queue Group Hardware Queue Allocation
8.2.2. Network Port Queue Groups for IP Interfaces
8.2.3. Pseudowire Shaping for Layer 2 and Layer 3 Services
8.2.4. QoS on Ingress Bindings
8.2.5. VXLAN VNI Queue Group Redirection
8.2.5.1. Queue Group Redirect List
8.2.5.2. Queue Group Redirect List Example
8.3. Queue Group Templates
8.4. Port Queue Groups
8.4.1. Percent-Rate Support
8.5. Forwarding Plane Queue Groups
8.6. Redirection Models
8.7. Access SAP Forwarding Class-Based Redirection
8.7.1. Ingress and Egress SAP Forwarding Class Redirection Association Rules
8.7.1.1. Policy-Based Provisioning Model
8.7.1.2. SAP-Based Provisioning Model
8.7.2. Access Queue Group Statistics
8.7.2.1. Port Queue Groups
8.7.2.2. Forwarding Plane Queue Groups
8.8. Network IP Interface Forwarding Class-Based Redirection
8.8.1. Egress Network Forwarding Class Redirection Association Rules
8.8.2. Egress Network IP Interface Statistics
8.9. PW Shaping
8.9.1. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.9.1.1. Feature Configuration
8.9.1.2. Provisioning Model
8.9.1.3. Ingress Packet Classification
8.9.2. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
8.9.2.1. Feature Configuration
8.9.2.2. Provisioning Model
8.9.2.3. Egress Marking of PW Packet Header
8.9.2.4. Ingress and Egress PW Statistics
8.10. Queue Group Behavior on LAG
8.10.1. Queue Group Queue Instantiation Per Link
8.10.2. Per-Link Queue Group Queue Parameters
8.10.3. Adding a Queue Group to an Existing LAG
8.10.4. Adding a Port to a LAG
8.10.5. Removing a Queue Group from a LAG
8.11. Basic Configurations
8.11.1. Configuring an Ingress Queue Group Template
8.11.2. Configuring Egress Queue Group Template
8.11.3. Applying Ingress Queue Group to SAP Ingress Policy
8.11.4. Applying Egress Queue Group to SAP Egress Policy
8.11.5. Configuring SAP-based Egress Queue Redirection
8.11.6. Configuring Queue Group on Ethernet Access Ingress Port
8.11.7. Configuring Overrides
8.11.8. Configuring Queue Group on Ethernet Access Egress Port
8.11.9. Configuring Queue Group for Network Egress Traffic on Port
8.11.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
8.11.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
8.11.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
8.11.13. Specifying QoS Policies on Service SAPs
9. Scheduler QoS Policies
9.1. Scheduler Policies
9.1.1. Egress Port-Based Schedulers
9.1.1.1. H-QoS Algorithm Selection
9.1.1.2. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
9.1.1.3. Service or Subscriber or Multiservice Site Scheduler Child to Port Scheduler Parent
9.1.1.3.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
9.1.1.4. Frame and Packet-Based Bandwidth Allocation
9.1.1.5. Parental Association Scope
9.1.1.6. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
9.1.1.7. Network Queue Parent Scheduler
9.1.1.8. Foster Parent Behavior for Orphaned Queues and Schedulers
9.1.1.9. Congestion Monitoring on Egress Port Scheduler
9.1.1.9.1. Scalability, Performance, and Operation
9.1.1.9.2. Restrictions
9.1.2. Frame-Based Accounting
9.1.2.1. Operational Modifications
9.1.2.2. Existing Egress Port-Based Virtual Scheduling
9.1.2.3. Behavior Modifications for Frame-Based Accounting
9.1.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
9.1.3. Virtual Scheduling Unused Bandwidth Distribution
9.1.3.1. Default Unused Bandwidth Distribution
9.1.3.2. Limit Unused Bandwidth
9.1.4. Configuring Port Scheduler Policies
9.1.4.1. Port Scheduler Structure
9.1.4.2. Special Orphan Queue and Scheduler Behavior
9.1.4.3. Packet to Frame Bandwidth Conversion
9.1.4.4. Aggregate Rate Limits for Directly Attached Queues
9.1.4.5. SAP Egress QoS Policy Queue Parenting
9.1.4.6. Network Queue QoS Policy Queue Parenting
9.1.4.7. Egress Port Scheduler Overrides
9.1.4.8. Applying a Port Scheduler Policy to a Virtual Port
9.1.4.9. Applying Aggregate Rate Limit to a Vport
9.1.4.10. Applying a Scheduler Policy to a Vport
9.1.4.11. Weighted Scheduler Group in a Port Scheduler Policy
9.2. Basic Configurations
9.2.1. Creating a QoS Scheduler Policy
9.2.2. Applying Scheduler Policies
9.2.2.1. Customer
9.2.2.2. Epipe
9.2.2.3. IES
9.2.2.4. VPLS
9.2.2.5. VPRN
9.2.3. Creating a QoS Port Scheduler Policy
9.2.4. Configuring Port Parent Parameters
9.2.4.1. Within-CIR Priority Level Parameters
9.2.4.2. Above-CIR Priority Level Parameters
9.2.5. Configuring Distributed LAG Rate
9.3. Service Management Tasks
9.3.1. Deleting QoS Policies
9.3.1.1. Removing a QoS Policy from a Customer Multiservice Site
9.3.1.2. Removing a QoS Policy from SAP(s)
9.3.1.3. Removing a Policy from the QoS Configuration
9.3.2. Copying and Overwriting Scheduler Policies
9.3.3. Editing QoS Policies
10. Hardware-assisted Hierarchical QoS
10.1. Hardware Aggregate Shapers
10.2. Fair Bandwidth-distribution Algorithm
10.3. Hardware Aggregate Shaper Scheduler Policy
10.4. Interactions with Other QoS Features
10.4.1. Activation of Hardware Aggregate Shapers
10.4.2. Hardware Aggregate Shapers and LAG
10.4.3. Encapsulation Offset
10.4.4. Advanced QoS Configuration Policy
11. Slope QoS Policies
11.1. Overview
11.2. Basic Configurations
11.2.1. Creating a Slope QoS Policy
11.2.2. Applying Slope Policies
11.2.2.1. Ports
11.2.2.2. FP
11.2.3. Default Slope Policy Values
11.3. Service Management Tasks
11.3.1. Deleting QoS Policies
11.3.1.1. Ports
11.3.1.2. FP
11.3.1.3. Removing a Policy from the QoS Configuration
11.3.2. Copying and Overwriting QoS Policies
11.3.3. Editing QoS Policies
12. Shared-Queue QoS Policies
12.1. Overview
12.2. Multipoint Shared Queuing
12.2.1. Ingress Queuing Modes of Operation
12.2.2. Ingress Service Queuing
12.2.2.1. Ingress Shared Queuing
12.2.2.2. Ingress Multipoint Shared Queuing
12.3. Basic Configurations
12.3.1. Modifying the Default Shared-Queue Policy
12.3.1.1. Applying Shared-Queue Policies
12.3.1.1.1. Epipe Services
12.3.1.1.2. IES Services
12.3.1.1.3. VPLS Services
12.3.1.1.4. VPRN Services
12.3.2. Default Shared Queue Policy Values
13. Advanced QoS Policies
13.1. Overview
13.2. Port Scheduler Above Offered Allowance Control
13.3. Basic Configurations
13.3.1. Creating an Advanced QoS Policy
13.3.2. Applying Advanced Policies
13.3.2.1. Queue Group
13.3.2.2. SAP Ingress
13.3.2.3. SAP Egress
13.3.3. Default Advanced Policy Values
13.4. Service Management Tasks
13.4.1. Deleting QoS Policies
13.4.1.1. Queue Group
13.4.1.2. SAP Ingress
13.4.1.3. SAP Egress
13.4.2. Copying and Overwriting Advanced Policies
13.4.3. Editing Advanced Policies
14. QoS ATM Traffic Descriptor Profiles
14.1. ATM Traffic Management
14.2. QoS Model for ATM-Based Services
14.3. ATM Service Categories
14.4. ATM Traffic Descriptors and QoS Parameters
14.5. Policing
14.6. Shaping
14.7. ATM Queuing and Scheduling
14.8. Congestion Avoidance
14.9. Basic Configurations
14.9.1. Creating an ATM-TD-Profile QoS Policy
14.9.2. Applying ATM-TD-Profile Policies
14.9.2.1. ATM VLL (Apipe) SAPs
14.9.2.2. Epipe SAPs
14.9.2.3. IES SAPs
14.9.2.4. Ipipe SAPs
14.9.2.5. VPRN SAPs
14.9.2.6. VPLS SAPs
14.9.3. Default ATM-TD-Profile Policy Values
14.10. Service Management Tasks
14.10.1. Removing a Profile from the QoS Configuration
14.10.2. Copying and Overwriting Profiles
14.10.3. Editing QoS Policies
15. High Scale QoS IOM
15.1. Introduction
15.1.1. HSQ Shaping
15.1.2. HSQ Scheduling
15.1.3. HSQ Buffer Management
15.1.4. HSQ LAGs
15.2. HSQ IOM-Specific Configurations
15.3. Non-Applicable HSQ IOM Functions
16. QoS in MC-MLPPP
16.1. Overview
16.2. Ingress MLPPP Class Reassembly
16.3. Basic Configurations
16.3.1. Configuring MC-MLPPP
16.3.2. Configuring MC-MLPPP QoS Parameters
16.4. QoS in MLFR and FRF.12 Fragmentation
16.4.1. QoS in MLFR
16.4.2. QoS in FRF.12 End-to-End Fragmentation
17. Class Fair Hierarchical Policing (CFHP)
17.1. Overview
17.2. Parent Policer Priority and Unfair Sensitive Discard Thresholds
17.3. CFHP Ingress and Egress Use Cases
17.4. Post-CFHP Queuing and Scheduling
17.4.1. Ingress CFHP Queuing
17.4.2. Egress CFHP Queuing
17.4.2.1. Policer to Local Queue Mapping
17.4.3. Egress Subscriber CFHP Queuing
17.4.3.1. Subscriber Destination String Queue Group Identification
17.4.4. SAP Default Destination String
17.5. CFHP Policer Control Policy
17.5.1. Policer Control Policy Root Arbiter
17.5.2. Tier 1 and Tier 2 Explicit Arbiters
17.5.3. Explicit Arbiter Rate Limits
17.5.4. CFHP with Child Policer Exceed PIR Enabled
17.6. CFHP Child Policer Definition and Creation
17.7. Policer Enabled SAP QoS Policy Applicability
17.8. Child Policer Parent Association
17.9. Profile-Capped Policers
17.10. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
17.10.1. Ingress ‘Undefined’ Initial Profile
17.10.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
17.10.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
17.10.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
17.10.5. Egress Explicit Profile Reclassification
17.10.6. Preserving Out of Profile State at Egress Policer
17.10.7. Egress Policer CIR Packet Handling without Profile-capped Mode
17.10.8. Egress Policer CIR Packet Handling with Profile-capped Mode
17.10.9. Forwarding Traffic Exceeding PIR in Egress Policers
17.10.10. Post Egress Policer Packet Forwarding Class and Profile State Remapping
17.10.11. Ingress Child Policer Stat-Mode
17.10.12. Egress Child Policer Stat-Mode
17.11. Profile-Preferred Mode Root Policers
17.12. Child Policer Hierarchical QoS Parenting
18. Frequently Used QoS Terms
18.1. Overview
18.2. Above-CIR Distribution
18.3. Available Bandwidth
18.4. CBS
18.5. CIR
18.6. CIR Level
18.7. CIR Weight
18.8. Child
18.9. Level
18.10. MBS
18.11. Offered Load
18.12. Orphan
18.13. Parent
18.14. Queue
18.15. Rate
18.16. Root (Scheduler)
18.17. Scheduler Policy
18.18. Tier
18.19. Virtual Scheduler
18.20. Weight
18.21. Within-CIR Distribution
19. Standards and Protocol Support
Customer Document and Product Support
Quick Reference Card 21.7.R1
7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview 21.7.R1
7450 ESS, 7750 SR, 7950 XRS, and VSR Documentation Suite Overview 21.7.R1
RADIUS Attributes Reference Guide Release 21.7.R1
Legal notice
RADIUS Attributes Reference
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
RADIUS Attributes Reference
Standards and Protocol Support
Customer Documentation and Product Support
Router Configuration Guide 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface
2.1.1.2. Network Domains
2.1.1.3. System Interface
2.1.1.4. Unicast Reverse Path Forwarding Check
2.1.1.5. Creating an IP Address Range
2.1.1.6. QoS Policy Propagation Using BGP
2.1.1.6.1. QPPB Applications
2.1.1.6.2. Inter-AS Coordination of QoS Policies
2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
2.1.1.7. QPPB
2.1.1.7.1. Associating an FC and Priority with a Route
2.1.1.7.2. Displaying QoS Information Associated with Routes
2.1.1.7.3. Enabling QPPB on an IP interface
2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.1.1.7.5. QPPB and Multiple Paths to a Destination
2.1.1.7.6. QPPB and Policy-Based Routing
2.1.1.8. QPPB and GRT Lookup
2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.1.1.9. Configuring Interface Delay
2.1.2. Router ID
2.1.3. Autonomous Systems
2.1.4. Confederations
2.1.5. Proxy ARP
2.1.6. Exporting an Inactive BGP Route from a VPRN
2.1.7. DHCP Relay
2.1.8. Internet Protocol Versions
2.1.8.1. IPv6 Address Format
2.1.8.2. IPv6 Applications
2.1.8.3. DNS
2.1.8.3.1. DNS Resolution Using a VPRN
2.1.8.4. Secure Neighbor Discovery
2.1.8.5. SeND Persistent CGAs
2.1.8.5.1. Persistent RSA Key Pair
2.1.8.5.2. Persistent CGA Modifier
2.1.8.5.3. Making non-persistent CGAs persistent
2.1.8.5.4. Booting from a saved configuration file
2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.1.8.6.1. 6PE Control Plane Support
2.1.8.6.2. 6PE Data Plane Support
2.1.9. Static Route Resolution Using Tunnels
2.1.9.1. Static Route ECMP Support
2.1.9.2. Static Route using Flexible Algorithms Tunnels
2.2. Weighted Load Balancing over MPLS LSP
2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.2.1.1. Feature Configuration
2.2.1.2. Feature Behavior
2.2.1.3. ECMP Considerations
2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.2.1.4.1. Feature Configuration
2.2.1.4.2. Feature Behavior
2.2.2. Weighted Load Balancing for 6PE and BGP IPv4-Labeled Unicast Routes
2.2.3. Strict Weighted Load-Balancing
2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
2.3.1. Feature Configuration
2.3.2. Feature Behavior
2.3.3. Feature Limitations
2.3.4. Data Path Support
2.3.5. Example Configuration and Default CBF Set Election
2.4. Aggregate Next Hop
2.5. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.5.1. Invalidate Next-Hop Based on IPV4 ARP
2.5.1.1. Invalidate Next-Hop Based on Neighbor Cache State
2.6. LDP Shortcut for IGP Route Resolution
2.6.1. IGP Route Resolution
2.6.2. LDP-IGP Synchronization
2.6.3. LDP Shortcut Forwarding Plane
2.6.4. ECMP Considerations
2.6.5. Handling of Control Packets
2.6.6. Handling of Multicast Packets
2.6.7. Interaction with BGP Route Resolution to an LDP FEC
2.6.8. Interaction with Static Route Resolution to an LDP FEC
2.6.9. LDP Control Plane
2.7. Weighted Load-Balancing over Interface Next-hops
2.8. IP FRR for Static Route Entry
2.9. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
2.9.1. Feature Configuration
2.9.2. MPLS-over-GRE and IP-over-GRE Termination Function
2.9.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
2.9.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
2.9.5. LER and LSR Hashing Support
2.10. GRE Tunnel Overview
2.10.1. Sample GRE Tunnel Configurations
2.11. Router Interface Encryption with NGE
2.11.1. NGE Domains
2.11.1.1. Private IP/MPLS Network NGE Domain
2.11.1.2. Private Over Intermediary Network NGE Domain
2.11.2. Router Interface NGE Domain Concepts
2.11.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
2.11.4. EVPN-VXLAN Tunnels and Services
2.11.5. Router Encryption Exceptions using ACLs
2.11.6. IPsec Packets Crossing an NGE Domain
2.11.7. Multicast Packets Traversing the NGE Domain
2.11.8. Assigning Key Groups to Router Interfaces
2.11.9. NGE and BFD Support
2.11.10. NGE and ACL Interactions
2.11.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
2.11.12. 1588v2 Encryption With NGE
2.12. Process Overview
2.13. Configuration Notes
2.14. Configuring an IP Router with CLI
2.14.1. Router Configuration Overview
2.14.1.1. System Interface
2.14.1.2. Network Interface
2.14.2. Basic Configuration
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring a System Name
2.14.3.2. Configuring Interfaces
2.14.3.2.1. Configuring a System Interface
2.14.3.2.2. Configuring a Network Interface
2.14.3.2.3. Assigning a Key Group to a Router Interface
2.14.3.2.4. Configuring IPv6 Parameters
2.14.3.2.5. Configuring IPv6 Over IPv4 Parameters
2.14.3.2.6. Tunnel Ingress Node
2.14.3.2.7. Tunnel Egress Node
2.14.3.2.8. Router Advertisement
2.14.3.2.9. Configuring IPv6 Parameters
2.14.3.2.10. Configuring Proxy ARP
2.14.3.2.11. Creating an IP Address Range
2.14.3.3. Deriving the Router ID
2.14.3.4. Configuring a Confederation
2.14.3.5. Configuring an Autonomous System
2.14.3.6. Configuring Overload State on a Single SFM
2.15. Service Management Tasks
2.15.1. Changing the System Name
2.15.2. Modifying Interface Parameters
2.15.3. Removing a Key Group from a Router Interface
2.15.4. Changing the Key Group for a Router Interface
2.15.5. Deleting a Logical IP Interface
3. VRRP
3.1. VRRP Overview
3.2. VRRP Components
3.2.1. Virtual Router
3.2.2. IP Address Owner
3.2.3. Primary and Secondary IP Addresses
3.2.4. Virtual Router
3.2.5. Virtual Router Backup
3.2.6. Owner and Non-Owner VRRP
3.2.7. Configurable Parameters
3.2.7.1. Virtual Router ID (VRID)
3.2.7.2. Priority
3.2.7.3. IP Addresses
3.2.7.4. Message Interval and Master Inheritance
3.2.7.5. Skew Time
3.2.7.6. Master Down Interval
3.2.7.7. Preempt Mode
3.2.7.8. VRRP Message Authentication
3.2.7.8.1. Authentication Type 0 – No Authentication
3.2.7.8.2. Authentication Type 1 – Simple Text Password
3.2.7.8.3. Authentication Failure
3.2.7.9. Authentication Data
3.2.7.10. Virtual MAC Address
3.2.7.11. VRRP Advertisement Message IP Address List Verification
3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.2.7.13. IPv6 Virtual Router Instance Operationally Up
3.2.7.14. Policies
3.3. VRRP Priority Control Policies
3.3.1. VRRP Virtual Router Policy Constraints
3.3.2. VRRP Virtual Router Instance Base Priority
3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.3.4. VRRP Priority Control Policy Priority Events
3.3.4.1. Priority Event Hold-Set Timers
3.3.4.2. Port Down Priority Event
3.3.4.3. LAG Degrade Priority Event
3.3.4.4. Host Unreachable Priority Event
3.3.4.5. Route Unknown Priority Event
3.4. VRRP Non-Owner Accessibility
3.4.1. Non-Owner Access Ping Reply
3.4.2. Non-Owner Access Telnet
3.4.3. Non-Owner Access SSH
3.5. VRRP Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.7. Configuring VRRP with CLI
3.7.1. VRRP Configuration Overview
3.7.1.1. Preconfiguration Requirements
3.7.2. Basic VRRP Configurations
3.7.2.1. VRRP Policy
3.7.2.2. VRRP IES Service Parameters
3.7.2.2.1. Configure VRRP for IPv6
3.7.2.3. VRRP Router Interface Parameters
3.7.3. Common Configuration Tasks
3.7.3.1. Creating Interface Parameters
3.7.4. Configuring VRRP Policy Components
3.7.4.1. Configuring Service VRRP Parameters
3.7.4.1.1. Non-Owner VRRP Example
3.7.4.1.2. Owner Service VRRP
3.7.4.2. Configuring Router Interface VRRP Parameters
3.7.4.2.1. Router Interface VRRP Non-Owner
3.7.4.2.2. Router Interface VRRP Owner
3.8. VRRP Configuration Management Tasks
3.8.1. Modifying a VRRP Policy
3.8.1.1. Deleting a VRRP Policy
3.8.2. Modifying Service and Interface VRRP Parameters
3.8.2.1. Modifying Non-Owner Parameters
3.8.2.2. Modifying Owner Parameters
3.8.2.3. Deleting VRRP from an Interface or Service
4. Filter Policies
4.1. ACL Filter Policy Overview
4.1.1. Filter Policy Basics
4.1.1.1. Filter Policy Packet Match Criteria
4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.1.1.3. MAC Filter Policy Entry Match Criteria
4.1.1.4. IP Exception Filters
4.1.1.5. Filter Policy Actions
4.1.1.6. Viewing Filter Policy Actions
4.1.1.7. Filter Policy Statistics
4.1.1.8. Filter Policy Logging
4.1.1.9. Filter Policy cflowd Sampling
4.1.1.10. Filter Policy Management
4.1.1.10.1. Modifying Existing Filter Policy
4.1.1.10.2. Filter Policy Copy and Renumbering
4.1.2. Filter Policy Advanced Topics
4.1.2.1. Match List for Filter Policies
4.1.2.1.1. Apply-Path
4.1.2.1.2. Prefix-exclude
4.1.2.2. Filter Policy Scope and Embedded Filters
4.1.2.3. Filter Policy Type
4.1.2.3.1. IPv4, IPv6 Filter Type Src-Mac
4.1.2.3.2. IPv4, IPv6 Filter Type Packet-Length
4.1.2.3.3. IPv4, IPv6 Filter Type Destination-Class
4.1.2.3.4. IPv4 and IPv6 Filter Type and Embedding
4.1.2.4. Filter Policies and Dynamic Policy-Driven Interfaces
4.1.2.5. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.1.2.6. Extended Action for Performing Two Actions at a Time
4.1.2.7. Advanced VPRN Redirection
4.1.2.8. Destination MAC Rewrite When Deploying Policy-Based Forwarding
4.1.2.9. Network-port VPRN Filter Policy
4.1.2.10. ISID MAC Filters
4.1.2.11. VID MAC Filters
4.1.2.11.1. Arbitrary Bit Matching of VID Filters
4.1.2.11.2. Port Group Configuration Example
4.1.2.12. IP Exception Filters
4.1.2.13. Redirect Policies
4.1.2.13.1. Router Instance Support for Redirect Policies
4.1.2.13.2. Binding Redirect Policies
4.1.2.14. HTTP-Redirect (Captive Portal)
4.1.2.14.1. Traffic Flow
4.1.2.15. Filter Policy-based ESM Service Chaining
4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
4.1.2.17. Storing Filter Entries
4.1.2.17.1. FP4-based Cards
4.2. Configuring Filter Policies with CLI
4.2.1. Common Configuration Tasks
4.2.1.1. Creating an IPv4 Filter Policy
4.2.1.1.1. IPv4 Filter Entry
4.2.1.2. Creating an IPv6 Filter Policy
4.2.1.3. Creating a MAC Filter Policy
4.2.1.3.1. MAC Filter Policy
4.2.1.3.2. MAC ISID Filter Policy
4.2.1.3.3. MAC VID Filter Policy
4.2.1.3.4. MAC Filter Entry
4.2.1.4. Creating an IPv4 Exception Filter Policy
4.2.1.4.1. IP Exception Filter Policy
4.2.1.4.2. IP Exception Entry Matching Criteria
4.2.1.5. Creating an IPv6 Exception Filter Policy
4.2.1.5.1. IPv6 Exception Filter Policy
4.2.1.5.2. IPv6 Exception Entry Matching Criteria
4.2.1.6. Creating a Match List for Filter Policies
4.2.1.7. Applying Filter Policies
4.2.1.7.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
4.2.1.7.2. Applying IPv4/IPv6 Filter Policies to a Network Port
4.2.1.8. Creating a Redirect Policy
4.2.1.9. Configuring Filter-Based GRE Tunneling
4.3. Filter Management Tasks
4.3.1. Renumbering Filter Policy Entries
4.3.2. Modifying a Filter Policy
4.3.3. Deleting a Filter Policy
4.3.4. Modifying a Redirect Policy
4.3.5. Deleting a Redirect Policy
4.3.6. Copying Filter Policies
5. Hybrid OpenFlow Switch
5.1. Hybrid OpenFlow Switching
5.1.1. Redundant Controllers and Multiple Switch Instances
5.1.2. GRT-only and Multi-Service H-OFS Modes of Operations
5.1.2.1. Port and VLAN ID Match in Flow Table Entries
5.1.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.1.4. Hybrid OpenFlow Switch Statistics
5.1.5. OpenFlow Switch Auxiliary Channels
5.1.6. Hybrid OpenFlow Switch Traffic Steering Details
5.1.6.1. SR OS H-OFS Logical Port
5.1.6.2. SR OS H-OFS Port and VLAN Encoding
5.1.6.3. Redirect to IP next-hop
5.1.6.4. Redirect to GRT Instance or VRF Instance
5.1.6.5. Redirect to Next-hop and VRF/GRT Instance
5.1.6.6. Redirect to ESI (L2)
5.1.6.7. Redirect to ESI (L3)
5.1.6.8. Redirect to ESI IP VAS-Interface Router
5.1.6.9. Redirect to LSP
5.1.6.10. Redirect to NAT
5.1.6.11. Redirect to SAP
5.1.6.12. Redirect to SDP
5.1.6.13. Redirect to a Specific LSP Used by a VPRN Service
5.1.6.14. Forward Action
5.1.6.15. Drop Action
5.1.6.16. Default No-match Action
5.1.6.17. Programming of DSCP Remark Action
5.1.7. Support for Secondary Actions for PBR/PBF Redundancy
5.2. Configuration Notes
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.1.1. Version 8
6.1.1.2. Version 9
6.1.1.3. Version 10
6.1.2. Cflowd Filter Matching
6.2. Cflowd Configuration Process Overview
6.3. Configuration Notes
6.4. Configuring Cflowd with CLI
6.4.1. Cflowd Configuration Overview
6.4.1.1. Traffic Sampling
6.4.1.2. Collectors
6.4.1.2.1. Aggregation
6.4.2. Basic Cflowd Configuration
6.4.3. Common Configuration Tasks
6.4.3.1. Global Cflowd Components
6.4.3.2. Enabling Cflowd
6.4.3.3. Configuring Global Cflowd Parameters
6.4.3.4. Configuring Cflowd Collectors
6.4.3.4.1. Version 9 and Version 10 Templates
6.4.3.5. Specifying Cflowd Options on an IP Interface
6.4.3.5.1. Interface Configurations
6.4.3.5.2. Service Interfaces
6.4.3.6. Specifying Sampling Options in Filter Entries
6.4.3.6.1. Filter Configurations
6.4.3.6.2. Dependencies
6.5. Cflowd Configuration Management Tasks
6.5.1. Modifying Global Cflowd Components
6.5.2. Modifying Cflowd Collector Parameters
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. IP Router Configuration
2.1. Configuring IP Router Parameters
2.1.1. Interfaces
2.1.1.1. Network Interface
2.1.1.2. Network Domains
2.1.1.3. System Interface
2.1.1.4. Unicast Reverse Path Forwarding Check
2.1.1.5. Creating an IP Address Range
2.1.1.6. QoS Policy Propagation Using BGP
2.1.1.6.1. QPPB Applications
2.1.1.6.2. Inter-AS Coordination of QoS Policies
2.1.1.6.3. Traffic Differentiation Based on Route Characteristics
2.1.1.7. QPPB
2.1.1.7.1. Associating an FC and Priority with a Route
2.1.1.7.2. Displaying QoS Information Associated with Routes
2.1.1.7.3. Enabling QPPB on an IP interface
2.1.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.1.1.7.5. QPPB and Multiple Paths to a Destination
2.1.1.7.6. QPPB and Policy-Based Routing
2.1.1.8. QPPB and GRT Lookup
2.1.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.1.1.9. Configuring Interface Delay
2.1.2. Router ID
2.1.3. Autonomous Systems
2.1.4. Confederations
2.1.5. Proxy ARP
2.1.6. Exporting an Inactive BGP Route from a VPRN
2.1.7. DHCP Relay
2.1.8. Internet Protocol Versions
2.1.8.1. IPv6 Address Format
2.1.8.2. IPv6 Applications
2.1.8.3. DNS
2.1.8.3.1. DNS Resolution Using a VPRN
2.1.8.4. Secure Neighbor Discovery
2.1.8.5. SeND Persistent CGAs
2.1.8.5.1. Persistent RSA Key Pair
2.1.8.5.2. Persistent CGA Modifier
2.1.8.5.3. Making non-persistent CGAs persistent
2.1.8.5.4. Booting from a saved configuration file
2.1.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.1.8.6.1. 6PE Control Plane Support
2.1.8.6.2. 6PE Data Plane Support
2.1.9. Static Route Resolution Using Tunnels
2.1.9.1. Static Route ECMP Support
2.1.9.2. Static Route using Flexible Algorithms Tunnels
2.2. Weighted Load Balancing over MPLS LSP
2.2.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.2.1.1. Feature Configuration
2.2.1.2. Feature Behavior
2.2.1.3. ECMP Considerations
2.2.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.2.1.4.1. Feature Configuration
2.2.1.4.2. Feature Behavior
2.2.2. Weighted Load Balancing for 6PE and BGP IPv4-Labeled Unicast Routes
2.2.3. Strict Weighted Load-Balancing
2.3. Class-Based Forwarding of IPv4/IPv6 Prefix Over IGP IPv4 Shortcut
2.3.1. Feature Configuration
2.3.2. Feature Behavior
2.3.3. Feature Limitations
2.3.4. Data Path Support
2.3.5. Example Configuration and Default CBF Set Election
2.4. Aggregate Next Hop
2.5. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.5.1. Invalidate Next-Hop Based on IPV4 ARP
2.5.1.1. Invalidate Next-Hop Based on Neighbor Cache State
2.6. LDP Shortcut for IGP Route Resolution
2.6.1. IGP Route Resolution
2.6.2. LDP-IGP Synchronization
2.6.3. LDP Shortcut Forwarding Plane
2.6.4. ECMP Considerations
2.6.5. Handling of Control Packets
2.6.6. Handling of Multicast Packets
2.6.7. Interaction with BGP Route Resolution to an LDP FEC
2.6.8. Interaction with Static Route Resolution to an LDP FEC
2.6.9. LDP Control Plane
2.7. Weighted Load-Balancing over Interface Next-hops
2.8. IP FRR for Static Route Entry
2.9. IP-over-GRE and MPLS-over-GRE Termination on a User-Configured Subnet
2.9.1. Feature Configuration
2.9.2. MPLS-over-GRE and IP-over-GRE Termination Function
2.9.3. Outgoing Packet Ethertype Setting and TTL Handling in MPLS-over-GRE Termination
2.9.4. Ethertype Setting and TTL Handling in IP-over-GRE Termination
2.9.5. LER and LSR Hashing Support
2.10. GRE Tunnel Overview
2.10.1. Sample GRE Tunnel Configurations
2.11. Router Interface Encryption with NGE
2.11.1. NGE Domains
2.11.1.1. Private IP/MPLS Network NGE Domain
2.11.1.2. Private Over Intermediary Network NGE Domain
2.11.2. Router Interface NGE Domain Concepts
2.11.3. GRE-MPLS and MPLSoUDP Packets Inside the NGE Domain
2.11.4. EVPN-VXLAN Tunnels and Services
2.11.5. Router Encryption Exceptions using ACLs
2.11.6. IPsec Packets Crossing an NGE Domain
2.11.7. Multicast Packets Traversing the NGE Domain
2.11.8. Assigning Key Groups to Router Interfaces
2.11.9. NGE and BFD Support
2.11.10. NGE and ACL Interactions
2.11.11. Router Interface NGE and ICMP Interactions Over the NGE Domain
2.11.12. 1588v2 Encryption With NGE
2.12. Process Overview
2.13. Configuration Notes
2.14. Configuring an IP Router with CLI
2.14.1. Router Configuration Overview
2.14.1.1. System Interface
2.14.1.2. Network Interface
2.14.2. Basic Configuration
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring a System Name
2.14.3.2. Configuring Interfaces
2.14.3.2.1. Configuring a System Interface
2.14.3.2.2. Configuring a Network Interface
2.14.3.2.3. Assigning a Key Group to a Router Interface
2.14.3.2.4. Configuring IPv6 Parameters
2.14.3.2.5. Configuring IPv6 Over IPv4 Parameters
2.14.3.2.6. Tunnel Ingress Node
2.14.3.2.7. Tunnel Egress Node
2.14.3.2.8. Router Advertisement
2.14.3.2.9. Configuring IPv6 Parameters
2.14.3.2.10. Configuring Proxy ARP
2.14.3.2.11. Creating an IP Address Range
2.14.3.3. Deriving the Router ID
2.14.3.4. Configuring a Confederation
2.14.3.5. Configuring an Autonomous System
2.14.3.6. Configuring Overload State on a Single SFM
2.15. Service Management Tasks
2.15.1. Changing the System Name
2.15.2. Modifying Interface Parameters
2.15.3. Removing a Key Group from a Router Interface
2.15.4. Changing the Key Group for a Router Interface
2.15.5. Deleting a Logical IP Interface
3. VRRP
3.1. VRRP Overview
3.2. VRRP Components
3.2.1. Virtual Router
3.2.2. IP Address Owner
3.2.3. Primary and Secondary IP Addresses
3.2.4. Virtual Router
3.2.5. Virtual Router Backup
3.2.6. Owner and Non-Owner VRRP
3.2.7. Configurable Parameters
3.2.7.1. Virtual Router ID (VRID)
3.2.7.2. Priority
3.2.7.3. IP Addresses
3.2.7.4. Message Interval and Master Inheritance
3.2.7.5. Skew Time
3.2.7.6. Master Down Interval
3.2.7.7. Preempt Mode
3.2.7.8. VRRP Message Authentication
3.2.7.8.1. Authentication Type 0 – No Authentication
3.2.7.8.2. Authentication Type 1 – Simple Text Password
3.2.7.8.3. Authentication Failure
3.2.7.9. Authentication Data
3.2.7.10. Virtual MAC Address
3.2.7.11. VRRP Advertisement Message IP Address List Verification
3.2.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.2.7.13. IPv6 Virtual Router Instance Operationally Up
3.2.7.14. Policies
3.3. VRRP Priority Control Policies
3.3.1. VRRP Virtual Router Policy Constraints
3.3.2. VRRP Virtual Router Instance Base Priority
3.3.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.3.4. VRRP Priority Control Policy Priority Events
3.3.4.1. Priority Event Hold-Set Timers
3.3.4.2. Port Down Priority Event
3.3.4.3. LAG Degrade Priority Event
3.3.4.4. Host Unreachable Priority Event
3.3.4.5. Route Unknown Priority Event
3.4. VRRP Non-Owner Accessibility
3.4.1. Non-Owner Access Ping Reply
3.4.2. Non-Owner Access Telnet
3.4.3. Non-Owner Access SSH
3.5. VRRP Configuration Process Overview
3.6. Configuration Notes
3.6.1. General
3.7. Configuring VRRP with CLI
3.7.1. VRRP Configuration Overview
3.7.1.1. Preconfiguration Requirements
3.7.2. Basic VRRP Configurations
3.7.2.1. VRRP Policy
3.7.2.2. VRRP IES Service Parameters
3.7.2.2.1. Configure VRRP for IPv6
3.7.2.3. VRRP Router Interface Parameters
3.7.3. Common Configuration Tasks
3.7.3.1. Creating Interface Parameters
3.7.4. Configuring VRRP Policy Components
3.7.4.1. Configuring Service VRRP Parameters
3.7.4.1.1. Non-Owner VRRP Example
3.7.4.1.2. Owner Service VRRP
3.7.4.2. Configuring Router Interface VRRP Parameters
3.7.4.2.1. Router Interface VRRP Non-Owner
3.7.4.2.2. Router Interface VRRP Owner
3.8. VRRP Configuration Management Tasks
3.8.1. Modifying a VRRP Policy
3.8.1.1. Deleting a VRRP Policy
3.8.2. Modifying Service and Interface VRRP Parameters
3.8.2.1. Modifying Non-Owner Parameters
3.8.2.2. Modifying Owner Parameters
3.8.2.3. Deleting VRRP from an Interface or Service
4. Filter Policies
4.1. ACL Filter Policy Overview
4.1.1. Filter Policy Basics
4.1.1.1. Filter Policy Packet Match Criteria
4.1.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.1.1.3. MAC Filter Policy Entry Match Criteria
4.1.1.4. IP Exception Filters
4.1.1.5. Filter Policy Actions
4.1.1.6. Viewing Filter Policy Actions
4.1.1.7. Filter Policy Statistics
4.1.1.8. Filter Policy Logging
4.1.1.9. Filter Policy cflowd Sampling
4.1.1.10. Filter Policy Management
4.1.1.10.1. Modifying Existing Filter Policy
4.1.1.10.2. Filter Policy Copy and Renumbering
4.1.2. Filter Policy Advanced Topics
4.1.2.1. Match List for Filter Policies
4.1.2.1.1. Apply-Path
4.1.2.1.2. Prefix-exclude
4.1.2.2. Filter Policy Scope and Embedded Filters
4.1.2.3. Filter Policy Type
4.1.2.3.1. IPv4, IPv6 Filter Type Src-Mac
4.1.2.3.2. IPv4, IPv6 Filter Type Packet-Length
4.1.2.3.3. IPv4, IPv6 Filter Type Destination-Class
4.1.2.3.4. IPv4 and IPv6 Filter Type and Embedding
4.1.2.4. Filter Policies and Dynamic Policy-Driven Interfaces
4.1.2.5. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.1.2.6. Extended Action for Performing Two Actions at a Time
4.1.2.7. Advanced VPRN Redirection
4.1.2.8. Destination MAC Rewrite When Deploying Policy-Based Forwarding
4.1.2.9. Network-port VPRN Filter Policy
4.1.2.10. ISID MAC Filters
4.1.2.11. VID MAC Filters
4.1.2.11.1. Arbitrary Bit Matching of VID Filters
4.1.2.11.2. Port Group Configuration Example
4.1.2.12. IP Exception Filters
4.1.2.13. Redirect Policies
4.1.2.13.1. Router Instance Support for Redirect Policies
4.1.2.13.2. Binding Redirect Policies
4.1.2.14. HTTP-Redirect (Captive Portal)
4.1.2.14.1. Traffic Flow
4.1.2.15. Filter Policy-based ESM Service Chaining
4.1.2.16. Policy-Based Forwarding for Deep Packet Inspection in VPLS
4.1.2.17. Storing Filter Entries
4.1.2.17.1. FP4-based Cards
4.2. Configuring Filter Policies with CLI
4.2.1. Common Configuration Tasks
4.2.1.1. Creating an IPv4 Filter Policy
4.2.1.1.1. IPv4 Filter Entry
4.2.1.2. Creating an IPv6 Filter Policy
4.2.1.3. Creating a MAC Filter Policy
4.2.1.3.1. MAC Filter Policy
4.2.1.3.2. MAC ISID Filter Policy
4.2.1.3.3. MAC VID Filter Policy
4.2.1.3.4. MAC Filter Entry
4.2.1.4. Creating an IPv4 Exception Filter Policy
4.2.1.4.1. IP Exception Filter Policy
4.2.1.4.2. IP Exception Entry Matching Criteria
4.2.1.5. Creating an IPv6 Exception Filter Policy
4.2.1.5.1. IPv6 Exception Filter Policy
4.2.1.5.2. IPv6 Exception Entry Matching Criteria
4.2.1.6. Creating a Match List for Filter Policies
4.2.1.7. Applying Filter Policies
4.2.1.7.1. Applying IPv4/IPv6 and MAC Filter Policies to a Service
4.2.1.7.2. Applying IPv4/IPv6 Filter Policies to a Network Port
4.2.1.8. Creating a Redirect Policy
4.2.1.9. Configuring Filter-Based GRE Tunneling
4.3. Filter Management Tasks
4.3.1. Renumbering Filter Policy Entries
4.3.2. Modifying a Filter Policy
4.3.3. Deleting a Filter Policy
4.3.4. Modifying a Redirect Policy
4.3.5. Deleting a Redirect Policy
4.3.6. Copying Filter Policies
5. Hybrid OpenFlow Switch
5.1. Hybrid OpenFlow Switching
5.1.1. Redundant Controllers and Multiple Switch Instances
5.1.2. GRT-only and Multi-Service H-OFS Modes of Operations
5.1.2.1. Port and VLAN ID Match in Flow Table Entries
5.1.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.1.4. Hybrid OpenFlow Switch Statistics
5.1.5. OpenFlow Switch Auxiliary Channels
5.1.6. Hybrid OpenFlow Switch Traffic Steering Details
5.1.6.1. SR OS H-OFS Logical Port
5.1.6.2. SR OS H-OFS Port and VLAN Encoding
5.1.6.3. Redirect to IP next-hop
5.1.6.4. Redirect to GRT Instance or VRF Instance
5.1.6.5. Redirect to Next-hop and VRF/GRT Instance
5.1.6.6. Redirect to ESI (L2)
5.1.6.7. Redirect to ESI (L3)
5.1.6.8. Redirect to ESI IP VAS-Interface Router
5.1.6.9. Redirect to LSP
5.1.6.10. Redirect to NAT
5.1.6.11. Redirect to SAP
5.1.6.12. Redirect to SDP
5.1.6.13. Redirect to a Specific LSP Used by a VPRN Service
5.1.6.14. Forward Action
5.1.6.15. Drop Action
5.1.6.16. Default No-match Action
5.1.6.17. Programming of DSCP Remark Action
5.1.7. Support for Secondary Actions for PBR/PBF Redundancy
5.2. Configuration Notes
6. Cflowd
6.1. Cflowd Overview
6.1.1. Operation
6.1.1.1. Version 8
6.1.1.2. Version 9
6.1.1.3. Version 10
6.1.2. Cflowd Filter Matching
6.2. Cflowd Configuration Process Overview
6.3. Configuration Notes
6.4. Configuring Cflowd with CLI
6.4.1. Cflowd Configuration Overview
6.4.1.1. Traffic Sampling
6.4.1.2. Collectors
6.4.1.2.1. Aggregation
6.4.2. Basic Cflowd Configuration
6.4.3. Common Configuration Tasks
6.4.3.1. Global Cflowd Components
6.4.3.2. Enabling Cflowd
6.4.3.3. Configuring Global Cflowd Parameters
6.4.3.4. Configuring Cflowd Collectors
6.4.3.4.1. Version 9 and Version 10 Templates
6.4.3.5. Specifying Cflowd Options on an IP Interface
6.4.3.5.1. Interface Configurations
6.4.3.5.2. Service Interfaces
6.4.3.6. Specifying Sampling Options in Filter Entries
6.4.3.6.1. Filter Configurations
6.4.3.6.2. Dependencies
6.5. Cflowd Configuration Management Tasks
6.5.1. Modifying Global Cflowd Components
6.5.2. Modifying Cflowd Collector Parameters
7. Standards and Protocol Support
Customer Document and Product Support
Segment Routing and PCE User Guide Release 21.7.R1
Legal notice
Getting started
Segment Routing with MPLS Data Plane (SR-MPLS)
Segment Routing in Shortest Path Forwarding
Configuring Segment Routing in Shortest Path
Segment Routing Shortest Path Forwarding with IS-IS
IS-IS Control Protocol Changes
Announcing ELC, MSD-ERLD, and MSD-BMI with IS-IS
Entropy Label for IS-IS Segment Routing
IPv6 Segment Routing using MPLS Encapsulation
IS-IS MT=0 Extensions
Service and Forwarding Contexts Supported
Services Using SDP with an SR IPv6 Tunnel
Segment Routing Mapping Server Function for IPv4 Prefixes
Segment Routing Mapping Server Prefix SID Resolution
Segment Routing Shortest Path Forwarding with OSPF
OSPFv2 Control Protocol Changes
OSPFv3 Control Protocol Changes
Announcing ELC, MSD-ERLD and MSD-BMI with OSPF
Entropy Label for OSPF Segment Routing
IPv6 Segment Routing using MPLS Encapsulation in OSPFv3
Segment Routing Mapping Server for IPv4 Prefixes
Segment Routing Mapping Server Prefix SID Resolution
Segment Routing with BGP
Segment Routing Operational Procedures
Prefix Advertisement and Resolution
Error and Resource Exhaustion Handling
Configuration Example 1: Supporting multiple topologies for the same destination prefix
Configuration Example 2: Resolving received SID indexes or labels to different routes of the same prefix within the same IGP instance
Configuration Example 3: Checking for SID error before programming ILM and NHLFE
Configuration Example 4: Programming ILM/NHLFE for duplicate prefix-SID indexes/labels for different prefixes
Configuration Example 5: Programming ILM/NHLFE for the same prefix across IGP instances
Configuration Example 6: Handling ILM resource exhaustion while assigning a SID index/label
Configuration Example 7: Handling ILM, NHLFE, other IOM or CPM resource exhaustion while resolving or programming a SID index/label
Segment Routing Tunnel Management
Tunnel MTU Determination
Segment Routing Local Block
Bundling Adjacencies in Adjacency Sets
Associating an Interface with an Adjacency Set
Provisioning Adjacency SID Values for an Adjacency Set
Loop Free Alternates
Remote LFA with Segment Routing
Topology Independent LFA
TI-LFA Configuration
TI-LFA Link-Protect Operation
LFA Protection Option Applicability
TI-LFA Algorithm
TI-LFA Feature Interaction and Limitations
Data Path Support
Node Protection Support in TI-LFA and Remote LFA
Feature Configuration
TI-LFA Node-Protect Operation
Remote LFA Node-Protect Operation
TI-LFA and Remote LFA Node Protection Feature Interaction and Limitations
LFA Policies
Application of LFA Policy to a Segment Routing Node SID Tunnel
Application of LFA Policy to Adjacency SID Tunnel
Application of LFA Policy to Backup Node SID Tunnel
Configuration Example of LFA Policy use in Remote LFA and TI-LFA
LFA Protection Using Segment Routing Backup Node SID
Configuring LFA Using Backup Node SID in OSPF
Detailed Operation of LFA Protection Using Backup Node SID
Duplicate SID Handling
OSPF Control Plane Extensions
Segment Routing Data Path Support
Hash Label and Entropy Label Support
BGP Shortcut Using Segment Routing Tunnel
BGP Label Route Resolution Using Segment Routing Tunnel
Service Packet Forwarding with Segment Routing
Mirror Services and Lawful Intercept
Class-Based Forwarding for SR-ISIS over RSVP-TE LSPs
Segment Routing Traffic Statistics
Micro-Loop Avoidance Using Loop-Free SR Tunnels for IS-IS
Configuring Micro-loop Avoidance
Micro-Loop Avoidance Algorithm Process
Micro-Loop Avoidance for Link Addition, Restoration, or Metric Decrease
Micro-Loop Avoidance for Link Removal, Failure, or Metric Increase
Configuring Flexible Algorithms
Configuring IS-IS for Flexible Algorithms for SR-MPLS
Configuring the Flexible Algorithm Definition
Configuring IS-IS Flex-Algorithm Participation
Configuring IS-IS Flex-Algorithm Prefix Node SID
Verifying Basic Flex-Algorithm Behavior
Configuration and Usage Considerations for Flex-Algorithms
OSPFv2 Configuration for Flexible Algorithms for SR-MPLS
Configuring FAD for OSPFv2
Configuring OSPFv2 Flex-Algorithm Participation
Configuring OSPFv2 Flex-Algorithm Prefix Node SID
Verifying Basic Flex-Algorithm Behavior
Configuration and Usage Considerations for Flex-Algorithms
Configuring IS-IS Flex-Algorithm for SRv6
Segment Routing With Traffic Engineering (SR-TE)
SR-TE MPLS Configuration Commands
SR-TE LSP Instantiation
PCC-Initiated and PCC-Controlled LSP
Guidelines for PCC-Initiated and PCC-Controlled LSPs
PCC-Initiated and PCE-Computed or Controlled LSP
SR-TE LSP Path Computation
SR-TE LSP Path Computation Using Hop-to-Label Translation
SR-TE LSP Path Computation Using Local CSPF
Extending MPLS and TE Database CSPF Support to SR-TE LSP
SR-TE Specific TE-DB Changes
SR-TE LSP and Auto-LSP-Specific CSPF Changes
SR-TE LSP Path Protection
SR-TE LSP Path Label Stack Reduction
Interaction with SR-TE LSP Path Protection
Examples of SR-TE LSP Path Label Stack Reduction
SR-TE LSP Paths using Explicit SIDs
SR-TE LSP Protection
Local Protection
End to End Protection
Seamless BFD for SR-TE LSPs
Configuration of S-BFD on SR-TE LSPs
Support for BFD Failure Action with SR-TE LSPs
SR-TE LSP State Changes and Failure Actions Based on S-BFD
S-BFD Operational Considerations
Static Route Resolution using SR-TE LSP
BGP Shortcuts Using SR-TE LSP
BGP Label Route Resolution Using SR-TE LSP
Service Packet Forwarding using SR-TE LSP
Data Path Support
SR-TE LSP Metric and MTU Settings
LSR Hashing on SR-TE LSPs
SR-TE Auto-LSP
Feature Configuration
Automatic Creation of an SR-TE Mesh LSP
Automatic Creation of an SR-TE One-Hop LSP
Interaction with PCEP
Forwarding Contexts Supported with SR-TE Auto-LSP
SR-TE LSP Traffic Statistics
SR-TE Label Stack Checks
Service and Shortcut Application SR-TE Label Stack Check
Control Plane Handling of Egress Label Stack Limitations
IPv6 Traffic Engineering
Global Configuration
IS-IS Configuration
MPLS Configuration
IS-IS, BGP-LS and TE Database Extensions
BGP-LS Originator Node Handling of TE Attributes
TE Attributes Supported in IGP and BGP-LS
IS-IS IPv4/IPv6 SR-TE and IPv4 RSVP-TE Feature Behavior
IPv6 SR-TE LSP Support in MPLS
IPv6 SR-TE auto-LSP
OSPF Link TE Attribute Reuse
OSPF Application Specific TE Link Attributes
Configuring and Operating SR-TE
SR-TE Configuration Prerequisites
SR-TE LSP Configuration Overview
Configuring Path Computation and Control for SR-TE LSP
Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
Configuring SR-TE LSP Label Stack Size
Configuring Adjacency SID Parameters
Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
Configuring a Mesh of SR-TE Auto-LSPs
Segment Routing Policies
Statically-Configured Segment Routing Policies
BGP Signaled Segment Routing Policies
Segment Routing Policy Path Selection and Tie-Breaking
Resolving BGP Routes to Segment Routing Policy Tunnels
Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
Resolving EVPN-MPLS Routes to Segment Routing Policy Tunnels
VPRN Auto-Bind-Tunnel Using Segment Routing Policy Tunnels
Seamless BFD and End-to-End Protection for SR Policies
Introduction
ECMP Protected Mode
Linear Mode
Detailed Description
S-BFD for SR Policies
Support for Primary and Backup Candidate Paths
Configuration of S-BFD and Protection for SR Policies
Configuration of SR Policy S-BFD and Mode Parameters
Application of S-BFD and Protection Parameters to Static SR-Policies
Application of S-BFD and Protection Parameters to BGP SR-Policies
SR Policy Route and Candidate Path Parameter Consistency
Traffic Statistics for Segment Routing Policies
Segment Routing with IPv6 Data Plane (SRv6)
Introduction to Segment Routing with IPv6 Data Plane (SRv6)
Configuring the SRv6 Locator and SIDs
IS-IS Control Plane Extensions
BGP Service Control Plane Extensions
Overview of the BGP Requirements
BGP Extensions
Advertising SRv6 Service TLVs
Transposition procedures when advertising service routes
Supported Service Routes for SRv6
BGP Next-Hop for SRv6 Service Routes
Route Table, FIB Table and Tunnel Table Support
RTM and FIB
TTM
Users of SRv6 RTM Routes
Datapath Support
Service Origination and Termination Roles
Transit Router Role with or without Segment Termination
Using Flow Label in Load-balancing of IPv6 and SRv6 Encapsulated Packets
Interaction with other Datapath Features
LFA Support
IS-IS Procedures
Datapath Procedures
SRv6 Tunnel Metric and MTU Settings
MTU Configuration Examples
Service Extensions
SRv6 Forwarding Path Extension
SRv6 VPRN Services
SRv6 VPRN and BGP Path Attribute Propagation Between RTM BGP Owners
Migration from MPLS to SRv6 in VPRN Services
SRv6 Service SIDs and BGP Routes in the Base Router
SRv6 Epipe Services
MPLS Forwarding Policy
Introduction to MPLS Forward Policy
Feature Validation and Operation Procedures
Policy Parameters and Validation Procedure Rules
Policy Resolution and Operational Procedures
Tunnel Table Handling of MPLS Forwarding Policy
Data Path Support
NHG of Resolution Type Indirect
NHG of Resolution Type Direct
Active Path Determination and Failover in a NHG of Resolution Type Direct
Spraying of Packets in a MPLS Forwarding Policy
Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
Ethertype Setting and TTL Handling in Endpoint Policy
Weighted ECMP Enabling and Validation Rules
Statistics
Ingress Statistics
Egress Statistics
Configuring Static Label Routes using MPLS Forwarding Policy
Steering Flows to an Indirect Next-Hop
Steering Flows to a Direct Next-Hop
gRPC-based RIB API
RIB/FIB API Overview
RIB/FIB API Fundamentals
RIB/FIB API Entry Persistence
RIB/FIB API Configuration Overview
RIB/FIB API - IPv4 Route Table Programming
RIB/FIB API - IPv6 Route Table Programming
RIB/FIB API - IPv4 Tunnel Table Programming
RIB/FIB API - IPv6 Tunnel Table Programming
RIB/FIB API - MPLS LFIB Programming
RIB/FIB API - Using Next-Hop-Groups, Primary Next Hops, and Backup Next Hops
RIB/FIB API - State and Telemetry
Traffic Statistics
Ingress statistics
Egress statistics
Path Computation Element Protocol (PCEP)
Introduction to the Path Computation Element Protocol (PCEP)
PCC and PCE Configuration
Base Implementation of Path Computation Elements (PCE)
PCEP Session Establishment and Maintenance
PCEP Parameters
Stateful PCE
PCEP Extensions in Support of SR-TE LSPs
LSP Initiation
PCC-Initiated and PCE-Computed/Controlled LSPs
PCE-Initiated LSPs
LSP Instantiation Using PCEP
NSP Generation of PCInitiate
SR OS Router Procedures on Receiving a PCInitiate Message
NSP Procedures on Receiving a PCRpt Message for a PCE
LSP Deletion Using PCEP
SR OS Router Procedures on Receipt of a PCInitiate with the R-bit Set
NSP Procedures Upon Issuance of pce-init delete Command
Dynamic State Handling for PCE Initiated LSPs
NSP Procedures
SR OS Router Procedures
PCEP Support for RSVP-TE LSP
Feature Configuration
Behavior of the LSP Path Update
Behavior of LSP MBB
PCE-Controlled LSP
PCE-Computed LSP
PCC-Controlled LSP
Behavior of Secondary LSP Paths
PCE Path Profile Support
LSP Path Diversity and Bidirectionality Constraints
Path Computation Fallback for PCC-Initiated LSPs
TE-DB and LSP-DB Partial Synchronization
NSP and VSR-NRC PCE Redundancy
Overview of NSP Ecosystem Redundancy
Redundancy in a Single Site Deployment
Redundancy in a Dual Site Deployment
PCC and PCE Configuration
NSP Cluster Redundancy
VSR-NRC 1+1 Redundancy
VSR-NRC 1+1 Single-Site Redundancy
Initial Establishment of Active/ Standby VSR-NRC Roles
Failover to Backup VSR-NRC
Recovery of the Failed VSR-NRC
Manual Switchover to the Mate VSR-NRC
VSR-NRC Dual-Site Redundancy
Global Health and Notification CPROTO Channel
PCE Southbound and PCC Behavior
PCE Southbound Behavior
PCC Behavior
Configuring and Operating RSVP-TE LSP with PCEP
Standards and Protocol Support
Customer Documentation and Product Support
Legal notice
Getting started
Segment Routing with MPLS Data Plane (SR-MPLS)
Segment Routing in Shortest Path Forwarding
Configuring Segment Routing in Shortest Path
Segment Routing Shortest Path Forwarding with IS-IS
IS-IS Control Protocol Changes
Announcing ELC, MSD-ERLD, and MSD-BMI with IS-IS
Entropy Label for IS-IS Segment Routing
IPv6 Segment Routing using MPLS Encapsulation
IS-IS MT=0 Extensions
Service and Forwarding Contexts Supported
Services Using SDP with an SR IPv6 Tunnel
Segment Routing Mapping Server Function for IPv4 Prefixes
Segment Routing Mapping Server Prefix SID Resolution
Segment Routing Shortest Path Forwarding with OSPF
OSPFv2 Control Protocol Changes
OSPFv3 Control Protocol Changes
Announcing ELC, MSD-ERLD and MSD-BMI with OSPF
Entropy Label for OSPF Segment Routing
IPv6 Segment Routing using MPLS Encapsulation in OSPFv3
Segment Routing Mapping Server for IPv4 Prefixes
Segment Routing Mapping Server Prefix SID Resolution
Segment Routing with BGP
Segment Routing Operational Procedures
Prefix Advertisement and Resolution
Error and Resource Exhaustion Handling
Configuration Example 1: Supporting multiple topologies for the same destination prefix
Configuration Example 2: Resolving received SID indexes or labels to different routes of the same prefix within the same IGP instance
Configuration Example 3: Checking for SID error before programming ILM and NHLFE
Configuration Example 4: Programming ILM/NHLFE for duplicate prefix-SID indexes/labels for different prefixes
Configuration Example 5: Programming ILM/NHLFE for the same prefix across IGP instances
Configuration Example 6: Handling ILM resource exhaustion while assigning a SID index/label
Configuration Example 7: Handling ILM, NHLFE, other IOM or CPM resource exhaustion while resolving or programming a SID index/label
Segment Routing Tunnel Management
Tunnel MTU Determination
Segment Routing Local Block
Bundling Adjacencies in Adjacency Sets
Associating an Interface with an Adjacency Set
Provisioning Adjacency SID Values for an Adjacency Set
Loop Free Alternates
Remote LFA with Segment Routing
Topology Independent LFA
TI-LFA Configuration
TI-LFA Link-Protect Operation
LFA Protection Option Applicability
TI-LFA Algorithm
TI-LFA Feature Interaction and Limitations
Data Path Support
Node Protection Support in TI-LFA and Remote LFA
Feature Configuration
TI-LFA Node-Protect Operation
Remote LFA Node-Protect Operation
TI-LFA and Remote LFA Node Protection Feature Interaction and Limitations
LFA Policies
Application of LFA Policy to a Segment Routing Node SID Tunnel
Application of LFA Policy to Adjacency SID Tunnel
Application of LFA Policy to Backup Node SID Tunnel
Configuration Example of LFA Policy use in Remote LFA and TI-LFA
LFA Protection Using Segment Routing Backup Node SID
Configuring LFA Using Backup Node SID in OSPF
Detailed Operation of LFA Protection Using Backup Node SID
Duplicate SID Handling
OSPF Control Plane Extensions
Segment Routing Data Path Support
Hash Label and Entropy Label Support
BGP Shortcut Using Segment Routing Tunnel
BGP Label Route Resolution Using Segment Routing Tunnel
Service Packet Forwarding with Segment Routing
Mirror Services and Lawful Intercept
Class-Based Forwarding for SR-ISIS over RSVP-TE LSPs
Segment Routing Traffic Statistics
Micro-Loop Avoidance Using Loop-Free SR Tunnels for IS-IS
Configuring Micro-loop Avoidance
Micro-Loop Avoidance Algorithm Process
Micro-Loop Avoidance for Link Addition, Restoration, or Metric Decrease
Micro-Loop Avoidance for Link Removal, Failure, or Metric Increase
Configuring Flexible Algorithms
Configuring IS-IS for Flexible Algorithms for SR-MPLS
Configuring the Flexible Algorithm Definition
Configuring IS-IS Flex-Algorithm Participation
Configuring IS-IS Flex-Algorithm Prefix Node SID
Verifying Basic Flex-Algorithm Behavior
Configuration and Usage Considerations for Flex-Algorithms
OSPFv2 Configuration for Flexible Algorithms for SR-MPLS
Configuring FAD for OSPFv2
Configuring OSPFv2 Flex-Algorithm Participation
Configuring OSPFv2 Flex-Algorithm Prefix Node SID
Verifying Basic Flex-Algorithm Behavior
Configuration and Usage Considerations for Flex-Algorithms
Configuring IS-IS Flex-Algorithm for SRv6
Segment Routing With Traffic Engineering (SR-TE)
SR-TE MPLS Configuration Commands
SR-TE LSP Instantiation
PCC-Initiated and PCC-Controlled LSP
Guidelines for PCC-Initiated and PCC-Controlled LSPs
PCC-Initiated and PCE-Computed or Controlled LSP
SR-TE LSP Path Computation
SR-TE LSP Path Computation Using Hop-to-Label Translation
SR-TE LSP Path Computation Using Local CSPF
Extending MPLS and TE Database CSPF Support to SR-TE LSP
SR-TE Specific TE-DB Changes
SR-TE LSP and Auto-LSP-Specific CSPF Changes
SR-TE LSP Path Protection
SR-TE LSP Path Label Stack Reduction
Interaction with SR-TE LSP Path Protection
Examples of SR-TE LSP Path Label Stack Reduction
SR-TE LSP Paths using Explicit SIDs
SR-TE LSP Protection
Local Protection
End to End Protection
Seamless BFD for SR-TE LSPs
Configuration of S-BFD on SR-TE LSPs
Support for BFD Failure Action with SR-TE LSPs
SR-TE LSP State Changes and Failure Actions Based on S-BFD
S-BFD Operational Considerations
Static Route Resolution using SR-TE LSP
BGP Shortcuts Using SR-TE LSP
BGP Label Route Resolution Using SR-TE LSP
Service Packet Forwarding using SR-TE LSP
Data Path Support
SR-TE LSP Metric and MTU Settings
LSR Hashing on SR-TE LSPs
SR-TE Auto-LSP
Feature Configuration
Automatic Creation of an SR-TE Mesh LSP
Automatic Creation of an SR-TE One-Hop LSP
Interaction with PCEP
Forwarding Contexts Supported with SR-TE Auto-LSP
SR-TE LSP Traffic Statistics
SR-TE Label Stack Checks
Service and Shortcut Application SR-TE Label Stack Check
Control Plane Handling of Egress Label Stack Limitations
IPv6 Traffic Engineering
Global Configuration
IS-IS Configuration
MPLS Configuration
IS-IS, BGP-LS and TE Database Extensions
BGP-LS Originator Node Handling of TE Attributes
TE Attributes Supported in IGP and BGP-LS
IS-IS IPv4/IPv6 SR-TE and IPv4 RSVP-TE Feature Behavior
IPv6 SR-TE LSP Support in MPLS
IPv6 SR-TE auto-LSP
OSPF Link TE Attribute Reuse
OSPF Application Specific TE Link Attributes
Configuring and Operating SR-TE
SR-TE Configuration Prerequisites
SR-TE LSP Configuration Overview
Configuring Path Computation and Control for SR-TE LSP
Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
Configuring SR-TE LSP Label Stack Size
Configuring Adjacency SID Parameters
Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
Configuring a Mesh of SR-TE Auto-LSPs
Segment Routing Policies
Statically-Configured Segment Routing Policies
BGP Signaled Segment Routing Policies
Segment Routing Policy Path Selection and Tie-Breaking
Resolving BGP Routes to Segment Routing Policy Tunnels
Resolving Unlabeled IPv4 BGP Routes to Segment Routing Policy Tunnels
Resolving Unlabeled IPv6 BGP Routes to Segment Routing Policy Tunnels
Resolving Label-IPv4 BGP Routes to Segment Routing Policy Tunnels
Resolving Label-IPv6 BGP Routes to Segment Routing Policy Tunnels
Resolving EVPN-MPLS Routes to Segment Routing Policy Tunnels
VPRN Auto-Bind-Tunnel Using Segment Routing Policy Tunnels
Seamless BFD and End-to-End Protection for SR Policies
Introduction
ECMP Protected Mode
Linear Mode
Detailed Description
S-BFD for SR Policies
Support for Primary and Backup Candidate Paths
Configuration of S-BFD and Protection for SR Policies
Configuration of SR Policy S-BFD and Mode Parameters
Application of S-BFD and Protection Parameters to Static SR-Policies
Application of S-BFD and Protection Parameters to BGP SR-Policies
SR Policy Route and Candidate Path Parameter Consistency
Traffic Statistics for Segment Routing Policies
Segment Routing with IPv6 Data Plane (SRv6)
Introduction to Segment Routing with IPv6 Data Plane (SRv6)
Configuring the SRv6 Locator and SIDs
IS-IS Control Plane Extensions
BGP Service Control Plane Extensions
Overview of the BGP Requirements
BGP Extensions
Advertising SRv6 Service TLVs
Transposition procedures when advertising service routes
Supported Service Routes for SRv6
BGP Next-Hop for SRv6 Service Routes
Route Table, FIB Table and Tunnel Table Support
RTM and FIB
TTM
Users of SRv6 RTM Routes
Datapath Support
Service Origination and Termination Roles
Transit Router Role with or without Segment Termination
Using Flow Label in Load-balancing of IPv6 and SRv6 Encapsulated Packets
Interaction with other Datapath Features
LFA Support
IS-IS Procedures
Datapath Procedures
SRv6 Tunnel Metric and MTU Settings
MTU Configuration Examples
Service Extensions
SRv6 Forwarding Path Extension
SRv6 VPRN Services
SRv6 VPRN and BGP Path Attribute Propagation Between RTM BGP Owners
Migration from MPLS to SRv6 in VPRN Services
SRv6 Service SIDs and BGP Routes in the Base Router
SRv6 Epipe Services
MPLS Forwarding Policy
Introduction to MPLS Forward Policy
Feature Validation and Operation Procedures
Policy Parameters and Validation Procedure Rules
Policy Resolution and Operational Procedures
Tunnel Table Handling of MPLS Forwarding Policy
Data Path Support
NHG of Resolution Type Indirect
NHG of Resolution Type Direct
Active Path Determination and Failover in a NHG of Resolution Type Direct
Spraying of Packets in a MPLS Forwarding Policy
Outgoing Packet Ethertype Setting and TTL Handling in Label Binding Policy
Ethertype Setting and TTL Handling in Endpoint Policy
Weighted ECMP Enabling and Validation Rules
Statistics
Ingress Statistics
Egress Statistics
Configuring Static Label Routes using MPLS Forwarding Policy
Steering Flows to an Indirect Next-Hop
Steering Flows to a Direct Next-Hop
gRPC-based RIB API
RIB/FIB API Overview
RIB/FIB API Fundamentals
RIB/FIB API Entry Persistence
RIB/FIB API Configuration Overview
RIB/FIB API - IPv4 Route Table Programming
RIB/FIB API - IPv6 Route Table Programming
RIB/FIB API - IPv4 Tunnel Table Programming
RIB/FIB API - IPv6 Tunnel Table Programming
RIB/FIB API - MPLS LFIB Programming
RIB/FIB API - Using Next-Hop-Groups, Primary Next Hops, and Backup Next Hops
RIB/FIB API - State and Telemetry
Traffic Statistics
Ingress statistics
Egress statistics
Path Computation Element Protocol (PCEP)
Introduction to the Path Computation Element Protocol (PCEP)
PCC and PCE Configuration
Base Implementation of Path Computation Elements (PCE)
PCEP Session Establishment and Maintenance
PCEP Parameters
Stateful PCE
PCEP Extensions in Support of SR-TE LSPs
LSP Initiation
PCC-Initiated and PCE-Computed/Controlled LSPs
PCE-Initiated LSPs
LSP Instantiation Using PCEP
NSP Generation of PCInitiate
SR OS Router Procedures on Receiving a PCInitiate Message
NSP Procedures on Receiving a PCRpt Message for a PCE
LSP Deletion Using PCEP
SR OS Router Procedures on Receipt of a PCInitiate with the R-bit Set
NSP Procedures Upon Issuance of pce-init delete Command
Dynamic State Handling for PCE Initiated LSPs
NSP Procedures
SR OS Router Procedures
PCEP Support for RSVP-TE LSP
Feature Configuration
Behavior of the LSP Path Update
Behavior of LSP MBB
PCE-Controlled LSP
PCE-Computed LSP
PCC-Controlled LSP
Behavior of Secondary LSP Paths
PCE Path Profile Support
LSP Path Diversity and Bidirectionality Constraints
Path Computation Fallback for PCC-Initiated LSPs
TE-DB and LSP-DB Partial Synchronization
NSP and VSR-NRC PCE Redundancy
Overview of NSP Ecosystem Redundancy
Redundancy in a Single Site Deployment
Redundancy in a Dual Site Deployment
PCC and PCE Configuration
NSP Cluster Redundancy
VSR-NRC 1+1 Redundancy
VSR-NRC 1+1 Single-Site Redundancy
Initial Establishment of Active/ Standby VSR-NRC Roles
Failover to Backup VSR-NRC
Recovery of the Failed VSR-NRC
Manual Switchover to the Mate VSR-NRC
VSR-NRC Dual-Site Redundancy
Global Health and Notification CPROTO Channel
PCE Southbound and PCC Behavior
PCE Southbound Behavior
PCC Behavior
Configuring and Operating RSVP-TE LSP with PCEP
Standards and Protocol Support
Customer Documentation and Product Support
Services Overview Guide 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.1.2.1. Multipoint Shared Queuing
2.1.2.1.1. Ingress Queuing Modes of Operation
2.1.2.1.2. Ingress Service Queuing
2.1.2.1.3. Ingress Shared Queuing
2.1.2.1.4. Ingress Multipoint Shared Queuing
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. Service Access Points (SAPs)
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Default SAP on a Dot1q Port
2.3.2.4. QinQ SAPs
2.3.2.5. Services and SAP Encapsulations
2.3.2.6. SAP Configuration Considerations
2.3.2.7. G.8032 Protected Ethernet Rings
2.3.2.8. SAP Bandwidth CAC
2.3.2.8.1. CAC Enforcement
2.3.3. Connection Profile VLAN SAPs
2.3.3.1. Using connection-profile-vlan in Dot1q Ports
2.3.3.2. Using connection-profile-vlan in QinQ Ports
2.3.4. Service Distribution Points
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. SDP Selection Rules
2.3.4.7. Class-Based Forwarding
2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.3.4.8. Source IPv4 Address Configuration in GRE SDP and GRE Tunnel
2.3.4.8.1. Introduction and Feature Configuration
2.3.4.8.2. Feature Operation with T-LDP and BGP Service Label Signaling
2.3.4.9. GRE SDP Tunnel Fragmentation and Reassembly
2.3.4.9.1. GRE SDP Tunnel Fragmentation
2.3.4.9.2. GRE SDP Tunnel Reassembly
2.3.4.9.3. NGE Considerations
2.3.4.10. GRE SDP Termination on Router Interface IP Address
2.3.5. SAP and MPLS Binding Loopback with MAC Swap
2.3.6. Promiscuous ETH-LBM Mode of Operation
2.4. Multi-Service Sites
2.5. G.8031 Protected Ethernet Tunnels
2.5.1. OAM Considerations
2.5.2. QoS Considerations
2.5.3. Mirroring and Lawful Intercept Considerations
2.5.4. Support Service and Solution Combinations
2.5.5. LAG Emulation using Ethernet Tunnels
2.6. G.8032 Ethernet Ring Protection Switching
2.6.1. Overview of G.8032 Operation
2.6.2. Ethernet Ring Sub-Rings
2.6.2.1. Virtual and Non-Virtual Channel
2.6.2.2. LAG Support
2.6.3. OAM Considerations
2.6.4. Support Service and Solution Combinations
2.7. Internal Objects Created for L2TP and NAT
2.8. Ethernet Unnumbered Interfaces
2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
2.10. Network Group Encryption (NGE)
2.10.1. NGE Overview
2.10.1.1. NGE Key Groups and Encryption Partitions
2.10.1.2. Network Services Platform Management
2.10.2. Key Groups
2.10.2.1. Key Group Algorithms
2.10.2.1.1. Encapsulating Security Payload
2.10.2.2. Security Associations
2.10.2.2.1. Active Outbound SA
2.10.3. Services Encryption
2.10.3.1. Services Encryption Overview
2.10.3.2. Assigning Key Groups to Services
2.10.3.3. VPRN Layer 3 Spoke SDP Encryption and MP-BGP-based VPRN Encryption Interaction
2.10.3.4. L2 Service Encryption using PW Templates
2.10.3.5. Pseudowire Switching for NGE Traffic
2.10.3.6. Pseudowire Control Word for NGE Traffic
2.10.3.7. WLAN-GW Encryption
2.10.3.8. NGE and RFC 3107
2.10.3.9. NGE for NG-MVPN
2.10.4. NGE Packet Overhead and MTU Considerations
2.10.5. Statistics
2.10.6. Remote Network Monitoring Support
2.10.7. Configuration Notes
2.11. Service Creation Process Overview
2.12. Deploying and Provisioning Services
2.12.1. Phase 1: Core Network Construction
2.12.2. Phase 2: Service Administration
2.12.3. Phase 3: Service Provisioning
2.13. Configuration Notes
2.13.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.14.2. Basic Configurations
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring Customers
2.14.3.1.1. Customer Information
2.14.3.1.2. Configuring Multi-Service-Sites
2.14.3.2. Configuring an SDP
2.14.3.2.1. SDP Configuration Tasks
2.14.3.2.2. Configuring an SDP
2.14.3.2.3. Configuring a Mixed-LSP SDP
2.15. Ethernet Connectivity Fault Management (ETH-CFM)
2.15.1. Facility MEPs
2.15.1.1. Common Actionable Failures
2.15.1.2. General Detection, Processing and Reaction
2.15.1.3. Port-Based MEP
2.15.1.4. LAG Based MEP
2.15.1.5. Tunnel Based MEP
2.15.1.6. Router Interface MEP
2.15.1.7. Hardware Support
2.15.2. ETH-CFM and MC-LAG
2.15.2.1. ETH-CFM and MC-LAG Default Behavior
2.15.2.2. Linking ETH-CFM to MC-LAG State
2.15.3. ETH-CFM Features
2.15.3.1. CCM Hold Timers
2.15.4. Configuring ETH-CFM Parameters
2.16. Configuring NGE with CLI
2.16.1. Basic NGE Configuration Overview
2.16.2. Configuring NGE Components
2.16.2.1. Configuring the Global Encryption Label
2.16.2.2. Configuring a Key Group
2.16.2.3. Assigning a Key Group to an SDP, VPRN Service, or PW template
2.17. Global Service Entity Management Tasks
2.17.1. Modifying Customer Accounts
2.17.2. Deleting Customers
2.17.3. Modifying SDPs
2.17.4. Deleting SDPs
2.18. NGE Management Tasks
2.18.1. Modifying a Key Group
2.18.2. Removing a Key Group
2.18.2.1. Removing a Key Group from an SDP, VPRN Service, or PW template
2.18.3. Changing Key Groups
2.18.3.1. Changing the Key Group for an SDP, VPRN Service, or PW template
2.18.4. Deleting a Key Group from an NGE Node
3. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Services Configuration Process
2. Services Overview
2.1. Introduction
2.1.1. Service Types
2.1.2. Service Policies
2.1.2.1. Multipoint Shared Queuing
2.1.2.1.1. Ingress Queuing Modes of Operation
2.1.2.1.2. Ingress Service Queuing
2.1.2.1.3. Ingress Shared Queuing
2.1.2.1.4. Ingress Multipoint Shared Queuing
2.2. Nokia Service Model
2.3. Service Entities
2.3.1. Customers
2.3.2. Service Access Points (SAPs)
2.3.2.1. SAP Encapsulation Types and Identifiers
2.3.2.2. Ethernet Encapsulations
2.3.2.3. Default SAP on a Dot1q Port
2.3.2.4. QinQ SAPs
2.3.2.5. Services and SAP Encapsulations
2.3.2.6. SAP Configuration Considerations
2.3.2.7. G.8032 Protected Ethernet Rings
2.3.2.8. SAP Bandwidth CAC
2.3.2.8.1. CAC Enforcement
2.3.3. Connection Profile VLAN SAPs
2.3.3.1. Using connection-profile-vlan in Dot1q Ports
2.3.3.2. Using connection-profile-vlan in QinQ Ports
2.3.4. Service Distribution Points
2.3.4.1. SDP Binding
2.3.4.2. Spoke and Mesh SDPs
2.3.4.3. SDP Using BGP Route Tunnel
2.3.4.4. SDP Keepalives
2.3.4.5. SDP Administrative Groups
2.3.4.6. SDP Selection Rules
2.3.4.7. Class-Based Forwarding
2.3.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.3.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.3.4.8. Source IPv4 Address Configuration in GRE SDP and GRE Tunnel
2.3.4.8.1. Introduction and Feature Configuration
2.3.4.8.2. Feature Operation with T-LDP and BGP Service Label Signaling
2.3.4.9. GRE SDP Tunnel Fragmentation and Reassembly
2.3.4.9.1. GRE SDP Tunnel Fragmentation
2.3.4.9.2. GRE SDP Tunnel Reassembly
2.3.4.9.3. NGE Considerations
2.3.4.10. GRE SDP Termination on Router Interface IP Address
2.3.5. SAP and MPLS Binding Loopback with MAC Swap
2.3.6. Promiscuous ETH-LBM Mode of Operation
2.4. Multi-Service Sites
2.5. G.8031 Protected Ethernet Tunnels
2.5.1. OAM Considerations
2.5.2. QoS Considerations
2.5.3. Mirroring and Lawful Intercept Considerations
2.5.4. Support Service and Solution Combinations
2.5.5. LAG Emulation using Ethernet Tunnels
2.6. G.8032 Ethernet Ring Protection Switching
2.6.1. Overview of G.8032 Operation
2.6.2. Ethernet Ring Sub-Rings
2.6.2.1. Virtual and Non-Virtual Channel
2.6.2.2. LAG Support
2.6.3. OAM Considerations
2.6.4. Support Service and Solution Combinations
2.7. Internal Objects Created for L2TP and NAT
2.8. Ethernet Unnumbered Interfaces
2.9. ECMP and Weighted ECMP for Services Using RSVP and SR-TE LSPs
2.10. Network Group Encryption (NGE)
2.10.1. NGE Overview
2.10.1.1. NGE Key Groups and Encryption Partitions
2.10.1.2. Network Services Platform Management
2.10.2. Key Groups
2.10.2.1. Key Group Algorithms
2.10.2.1.1. Encapsulating Security Payload
2.10.2.2. Security Associations
2.10.2.2.1. Active Outbound SA
2.10.3. Services Encryption
2.10.3.1. Services Encryption Overview
2.10.3.2. Assigning Key Groups to Services
2.10.3.3. VPRN Layer 3 Spoke SDP Encryption and MP-BGP-based VPRN Encryption Interaction
2.10.3.4. L2 Service Encryption using PW Templates
2.10.3.5. Pseudowire Switching for NGE Traffic
2.10.3.6. Pseudowire Control Word for NGE Traffic
2.10.3.7. WLAN-GW Encryption
2.10.3.8. NGE and RFC 3107
2.10.3.9. NGE for NG-MVPN
2.10.4. NGE Packet Overhead and MTU Considerations
2.10.5. Statistics
2.10.6. Remote Network Monitoring Support
2.10.7. Configuration Notes
2.11. Service Creation Process Overview
2.12. Deploying and Provisioning Services
2.12.1. Phase 1: Core Network Construction
2.12.2. Phase 2: Service Administration
2.12.3. Phase 3: Service Provisioning
2.13. Configuration Notes
2.13.1. General
2.14. Configuring Global Service Entities with CLI
2.14.1. Service Model Entities
2.14.2. Basic Configurations
2.14.3. Common Configuration Tasks
2.14.3.1. Configuring Customers
2.14.3.1.1. Customer Information
2.14.3.1.2. Configuring Multi-Service-Sites
2.14.3.2. Configuring an SDP
2.14.3.2.1. SDP Configuration Tasks
2.14.3.2.2. Configuring an SDP
2.14.3.2.3. Configuring a Mixed-LSP SDP
2.15. Ethernet Connectivity Fault Management (ETH-CFM)
2.15.1. Facility MEPs
2.15.1.1. Common Actionable Failures
2.15.1.2. General Detection, Processing and Reaction
2.15.1.3. Port-Based MEP
2.15.1.4. LAG Based MEP
2.15.1.5. Tunnel Based MEP
2.15.1.6. Router Interface MEP
2.15.1.7. Hardware Support
2.15.2. ETH-CFM and MC-LAG
2.15.2.1. ETH-CFM and MC-LAG Default Behavior
2.15.2.2. Linking ETH-CFM to MC-LAG State
2.15.3. ETH-CFM Features
2.15.3.1. CCM Hold Timers
2.15.4. Configuring ETH-CFM Parameters
2.16. Configuring NGE with CLI
2.16.1. Basic NGE Configuration Overview
2.16.2. Configuring NGE Components
2.16.2.1. Configuring the Global Encryption Label
2.16.2.2. Configuring a Key Group
2.16.2.3. Assigning a Key Group to an SDP, VPRN Service, or PW template
2.17. Global Service Entity Management Tasks
2.17.1. Modifying Customer Accounts
2.17.2. Deleting Customers
2.17.3. Modifying SDPs
2.17.4. Deleting SDPs
2.18. NGE Management Tasks
2.18.1. Modifying a Key Group
2.18.2. Removing a Key Group
2.18.2.1. Removing a Key Group from an SDP, VPRN Service, or PW template
2.18.3. Changing Key Groups
2.18.3.1. Changing the Key Group for an SDP, VPRN Service, or PW template
2.18.4. Deleting a Key Group from an NGE Node
3. Standards and Protocol Support
Customer Document and Product Support
System Management Guide 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
1.3. Node Management Using VPRN
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.1.4. LDAP Authentication
2.1.1.4.1. LDAP Authentication Process
2.1.1.4.2. Authentication Order
2.1.1.4.3. LDAP Authentication Using a Password
2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.1.1.4.5. TLS Behavior and LDAP
2.1.1.4.6. LDAP Health Check
2.1.1.4.7. LDAP Redundancy and TLS
2.1.1.5. Password Hashing
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.2.3.1. Examples
2.1.2.4. Authorization Profiles for Different Interfaces
2.1.2.5. Authorization Support
2.1.2.5.1. System-Provisioned AAA Command Authorization Profiles
2.1.2.5.2. Authorization Support for Configuration Groups
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.1.3.3. Command Accounting Log Events
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Control and Management Traffic Protection
2.3.1. CPM Filters
2.3.1.1. CPM Filter Packet Match
2.3.1.2. CPM IPv4 and IPv6 Filter Entry Match Criteria
2.3.1.3. CPM MAC Filter Entry Match Criteria
2.3.1.4. CPM Filter Policy Action
2.3.1.5. CPM Filter Policy Statistics and Logging
2.3.1.6. CPM Filter: Protocols and Ports
2.3.2. CPM Per-Peer Queuing
2.3.3. CPM Queues
2.3.4. Centralized CPU Protection
2.3.4.1. Protocol Protection
2.3.4.2. CPU Protection Extensions for ETH-CFM
2.3.4.3. ETH-CFM Ingress Squelching
2.3.5. Distributed CPU Protection (DCP)
2.3.5.1. Policer
2.3.5.2. Applicability
2.3.5.3. Log Events, Statistics, Status, and SNMP Support
2.3.5.4. DCP Policer Resource Management
2.3.5.5. Operational Guidelines and Tips
2.3.6. Classification-Based Priority for Extracted Protocol Traffic
2.3.7. TTL Security
2.3.8. Management Access Filter
2.3.8.1. MAF Filter Packet Match
2.3.8.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.3.8.3. MAF MAC Filter Entry Match Criteria
2.3.8.4. MAF Filter Policy Action
2.3.8.5. MAF Filter Policy Statistics and Logging
2.4. Vendor-Specific Attributes (VSAs)
2.5. Other Security Features
2.5.1. SSH
2.5.1.1. SSH PKI Authentication
2.5.1.1.1. User Public Key Generation
2.5.1.2. MAC Client and Server List
2.5.1.3. KEX Client and Server List
2.5.1.4. Regenerate the SSH key without disabling SSH
2.5.1.4.1. Key re-exchange procedure
2.5.1.5. Cipher Client and Server List
2.5.2. Exponential Login Backoff
2.5.3. User Lockout
2.5.4. CLI Login Scripts
2.5.5. 802.1x Network Access Control
2.5.6. TCP Enhanced Authentication Option
2.5.6.1. Packet Formats
2.5.6.2. Keychain
2.5.7. gRPC Authentication
2.5.8. Hash Management per Management Interface Configuration
2.5.8.1. Hash encryption Using AES-256
2.5.8.2. Clear Text
2.6. Configuring Security with CLI
2.6.1. Security Configurations
2.6.2. Configuring Management Access Filters
2.6.3. Configuring IP CPM Filters
2.6.4. Configuring IPv6 CPM Filters
2.6.5. Configuring MAC CPM Filters
2.6.6. Configuring CPM Queues
2.6.7. IPsec Certificates Parameters
2.6.8. Configuring Local Command Authorization Profiles
2.6.8.1. Parameters
2.6.8.2. Wildcards
2.6.8.3. CLI Session Resource Management
2.6.9. Configuring Users
2.6.10. Configuring Keychains
2.6.11. Copying and Overwriting Users and Profiles
2.6.11.1. User
2.6.11.2. Profile
2.6.12. RADIUS Configurations
2.6.12.1. Configuring RADIUS Authentication
2.6.12.2. Configuring RADIUS Authorization
2.6.12.3. Configuring RADIUS Accounting
2.6.13. Configuring 802.1x RADIUS Policies
2.6.14. TACACS+ Configurations
2.6.14.1. Enabling TACACS+ Authentication
2.6.14.2. Configuring TACACS+ Authorization
2.6.14.3. Configuring TACACS+ Accounting
2.6.14.4. Enabling SSH
2.6.15. LDAP Configurations
2.6.15.1. Configuring LDAP Authentication
2.6.15.2. Configuring Redundant Servers
2.6.15.3. Enabling SSH
2.6.16. Configuring Login Controls
3. Model-Driven Management Interfaces
3.1. Management Interface Configuration Modes
3.2. YANG Data Models
3.2.1. Nokia SR OS YANG Data Models
3.2.2. OpenConfig YANG Data Models
3.2.2.1. Basic Configuration
3.2.2.2. Shared Model Management Support
3.2.2.2.1. Introduction
3.2.2.2.2. Merging Configuration Statements
3.2.2.2.3. Application Support
3.2.2.2.4. Validating and Committing
3.2.2.2.5. Error Reporting
3.2.2.2.6. Using the info Command
3.2.2.2.7. Deviating and Augmenting
3.3. Datastores and Regions
3.3.1. NMDA Support
3.4. SPC Objects
3.5. Prerequisites for Using Model-Driven Management Interfaces
3.5.1. Loose References to IDs
3.5.2. String Routing Policy Validation
3.5.3. String Names as Keys
3.6. Transitioning Between Modes
3.6.1. Configuring the CLI Engine
3.7. YANG-based Operations
3.7.1. Asynchronous Versus Synchronous Operations
3.7.1.1. Examples of Operations in MD-CLI
3.7.1.2. Examples of Synchronous Operations in NETCONF
3.7.1.3. Examples of Asynchronous Operations in NETCONF
4. SNMP
4.1. SNMP Overview
4.1.1. SNMP Architecture
4.1.2. Management Information Base
4.1.3. SNMP Protocol Operations
4.1.4. SNMP Versions
4.1.5. Management Information Access Control
4.1.6. User-Based Security Model Community Strings
4.1.7. Views
4.1.8. Access Groups
4.1.9. Users
4.1.10. Per-VPRN Logs and SNMP Access
4.1.11. Per-SNMP Community Source IP Address Validation
4.2. SNMP Versions
4.3. Best Practices for SNMP Information Retrieval
4.3.1. SNMP GetBulkRequest
4.3.2. Queueing, RTT, and Collection Performance
4.4. Configuration Notes
4.4.1. General
4.5. Configuring SNMP with CLI
4.5.1. SNMP Configuration Overview
4.5.1.1. Configuring SNMPv1 and SNMPv2c
4.5.1.2. Configuring SNMPv3
4.5.2. Basic SNMP Security Configuration
4.5.3. Configuring SNMP Components
4.5.3.1. Configuring a Community String
4.5.3.2. Configuring View Options
4.5.3.3. Configuring Access Options
4.5.3.4. Configuring USM Community Options
4.5.3.5. Configuring Other SNMP Parameters
5. NETCONF
5.1. NETCONF Overview
5.2. NETCONF in SR OS
5.2.1. Transport and Sessions
5.2.2. Datastores and URLs
5.2.3. NETCONF Operations and Capabilities
5.2.3.1. <get>
5.2.3.1.1. Example: Namespace Specified in <configure> Tag
5.2.3.1.2. Example: Namespace Error in <configure> Tag
5.2.3.1.3. Example: Namespace Specified in <state> Tag
5.2.3.1.4. Example: Namespace Error in <state> Tag
5.2.3.2. <get-config>
5.2.3.2.1. Example: Reply with Defaults
5.2.3.2.2. Example: Reply Without Default Values
5.2.3.2.3. Example: Containment Node
5.2.3.2.4. Example: List Without a Key Specified
5.2.3.2.5. Example: List with Non-key Leaf Specified as Selection Node
5.2.3.2.6. Example: Non-key Leaf Specified as a Content Match Node
5.2.3.2.7. Example: Content Match Node on a List Key
5.2.3.2.8. Example: Content Match Node on a Leaf-list
5.2.3.3. <edit-config>
5.2.3.3.1. Example: <running> Datastore with the “urn:nokia.com:sros:ns:yang:sr:conf” Namespace
5.2.3.3.2. Example: Application of Default Operation Value for Parent and Child Nodes
5.2.3.3.3. Example: Exceptions to the Default Operation Handling
5.2.3.4. <copy-config>
5.2.3.5. <delete-config>
5.2.3.6. <lock>
5.2.3.7. <unlock>
5.2.3.8. <commit>
5.2.3.9. <discard-changes>
5.2.3.10. <validate>
5.2.3.11. <get-schema>
5.2.3.12. <get-data>
5.2.4. Datastore and Operation Combinations
5.2.5. General NETCONF Behavior
5.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
5.2.5.2. Example: Non-default NETCONF Base Namespace
5.2.5.3. Example: Invalid NETCONF Namespace Declaration
5.2.5.4. Example: Non-default NETCONF Namespace or Prefix Declaration in a Child Tag
5.2.5.5. Example: Chunked Frame Mechanism
5.2.6. Establishing a NETCONF Session
5.2.6.1. Example: Checking NETCONF Status
5.2.6.2. Example: Retrieving System Configurations, QoS, and Log Branches
5.2.6.3. Example: Creating an Epipe Service
5.2.6.4. Example: Returning Multiple Errors
5.3. NETCONF Notifications
5.3.1. NETCONF Notification Examples�
5.3.1.1. Example: <create-subscription> Operation
5.3.1.2. Example: sros-config-change-event Notification
5.3.1.3. Example: sros-state-change-event Notification
5.3.1.4. Example: sros-cli-accounting-event Notification
5.3.1.5. Example: sros-log-generic-event Notification
5.3.1.6. Example: netconf-config-change Notification
5.3.1.7. Example: sros-md-rpc-accounting-event Notification�
5.4. NETCONF Monitoring
5.5. YANG Library
5.6. Operational Commands via NETCONF
5.6.1. Individually Modeled YANG-based Operations
5.6.2. NETCONF Operations Using the md-cli-raw-command Request
6. Python
6.1. Python Overview
6.2. Python in SR OS
6.2.1. Prerequisites
6.2.2. YANG Model Support
6.3. Python 3 Interpreter
6.4. Building an Application
6.4.1. Available Libraries
6.4.2. The pySROS API
6.4.2.1. Installing the pySROS Libraries
6.4.2.2. Importing into Applications
6.4.2.3. API Documentation
6.4.2.4. Connecting to a Model-driven SR OS Device
6.4.2.5. Obtaining Modeled Data
6.4.2.6. Editing Configuration
6.4.3. The pySROS Data Structure
6.5. Provisioning and Precompiling Python Applications
6.5.1. Refreshing Configured Python Scripts
6.6. Execution Pathways
6.6.1. Running a Python Application Remotely
6.6.2. Running a Python Application from the Command Line
6.6.2.1. pyexec and Input Parameters
6.6.2.2. Running a Python Application as an Output Modifier
6.6.2.3. Chaining Python Applications
6.6.2.4. Python Applications and the MD-CLI Pager
6.6.3. Running Python Applications Using Aliased MD-CLI
6.7. Security
6.7.1. Python Authentication and Authorization
6.7.1.1. Authentication
6.7.1.2. Authorization
6.7.2. Other Restrictions
6.7.3. Memory Management
6.7.4. Performance and Scale
7. Event and Accounting Logs
7.1. Logging Overview
7.1.1. Logging Using the Management VPRN
7.2. Log Destinations
7.2.1. Console
7.2.2. Session
7.2.3. CLI Logs
7.2.4. Memory Logs
7.2.5. Log Files
7.2.6. SNMP Trap Group
7.2.7. Syslog
7.2.8. NETCONF
7.3. Event Logs
7.3.1. Event Sources
7.3.2. Event Control
7.3.3. Log Manager and Event Logs
7.3.4. Event Filter Policies
7.3.5. Event Log Entries
7.3.6. Simple Logger Event Throttling
7.3.7. Default System Log
7.3.8. Event Handling System
7.3.8.1. EHS Configuration and Syntax Rules
7.3.8.2. Examples of EHS Syntax Supported in Classic CLI
7.3.8.3. Valid Examples of EHS Syntax in Classic CLI
7.3.8.4. Invalid Examples for EHS Syntax in Classic CLI
7.3.8.5. EHS Debounce
7.3.8.6. Executing EHS or CRON Scripts
7.4. Customizing Syslog Messages Using Python
7.4.1. Python Engine for Syslog
7.4.1.1. Python Syslog APIs
7.4.1.2. Timestamp Format Manipulation
7.4.2. Python Processing Efficiency
7.4.3. Python Backpressure
7.4.4. Event Selection for Python Processing
7.4.5. Modifying a Log File
7.4.6. Deleting a Log File
7.4.7. Modifying a File ID
7.4.8. Modifying a Syslog ID
7.4.9. Modifying an SNMP Trap Group
7.4.10. Deleting an SNMP Trap Group
7.4.11. Modifying a Log Filter
7.4.12. Modifying Event Control Parameters
7.4.13. Returning to the Default Event Control Configuration
7.5. Accounting Logs
7.5.1. Accounting Records
7.5.2. Accounting Files
7.5.3. Design Considerations for Accounting Policies
7.5.4. Reporting and Time-Based Accounting
7.5.5. Overhead Reduction in Accounting: Custom Record
7.5.5.1. User Configurable Records
7.5.5.2. Changed Statistics Only
7.5.5.3. Configurable Accounting Records
7.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
7.5.5.3.2. XML Accounting Files for Policer Counters
7.5.5.3.3. RADIUS Accounting in Networks Using ESM
7.5.5.4. Significant Change Only Reporting
7.5.6. Immediate Completion of Records
7.5.6.1. Record Completion for XML Accounting
7.5.7. AA Accounting per Forwarding Class
7.6. Configuration Notes
7.7. Configuring Logging with CLI
7.7.1. Log Configuration Overview
7.7.2. Log Types
7.7.3. Basic Log Configuration
7.7.4. Common Configuration Tasks
7.7.4.1. Configuring an Event Log
7.7.4.2. Configuring a File ID
7.7.4.3. Configuring an Accounting Policy
7.7.4.4. Configuring Event Control
7.7.4.5. Configuring a Log Filter
7.7.4.6. Configuring an SNMP Trap Group
7.7.4.6.1. Setting the Replay Parameter
7.7.4.6.2. Shutdown In-Band Port
7.7.4.6.3. No Shutdown Port
7.7.4.7. Configuring a Syslog Target
7.7.4.7.1. Configuring an Accounting Custom Record
8. Node Discovery Provisioning Using OSPF
8.1. Node Discovery Procedure
8.1.1. Network Element Profiles
8.1.2. Assigning a Network Element Profile
8.1.3. OSPFv2 Opaque LSA Requirements
8.1.4. IPv4/IPv6
8.2. Auto-provisioning Using OSPF
8.2.1. NEID
8.2.2. NEIP
8.2.3. NEIP and NEID Auto-generate CLI Configuration
8.2.4. Auto-provisioning Using OSPF
8.2.4.1. Auto-generate Configuration
8.2.4.1.1. Auto-generate NEID configuration
8.2.4.2. The auto-boot ospf Flag and its Options
8.2.4.3. CLI Generation of the Loopback Address and Router ID from auto-boot ospf and its Options
8.2.4.3.1. Auto-provisioning Details
8.2.4.4. Connectivity Requirements
8.2.4.5. Auto-provisioning Success
8.2.4.6. Auto-boot OSPF Reboot Timers
8.2.4.7. Auto-boot OSPF Relation with Auto-boot
8.2.4.8. Auto-provisioning Log Options
8.2.4.9. Console Access during Auto-provisioning
8.2.4.10. Disabling OSPF Auto-provisioning
8.2.5. CLI Structure
8.2.5.1. Assigning the ne-discovery Profile to IGP
8.3. Aggregation Node Configuration
8.3.1. MIB Requirements on the Aggregation Node
8.3.2. SNMP Traps and Gets
9. sFlow
9.1. sFlow Overview
9.2. sFlow Features
9.2.1. sFlow Counter Polling Architecture
9.2.2. sFlow Support on Logical Ethernet Ports
9.2.3. sFlow SAP Counter Map
9.2.4. sFlow Record Formats
10. gRPC
10.1. Security Aspects
10.1.1. TLS-Based Encryption
10.1.2. Authentication
10.2. gNMI Service
10.2.1. gNMI Service Definitions
10.2.1.1. Capability Discovery
10.2.1.2. Get/Set RPC
10.2.1.3. Subscribe RPC
10.2.1.3.1. Bytes Encoding
10.2.1.3.2. PROTO Encoding
10.2.1.3.3. ON_CHANGE Subscription Mode
10.2.1.4. Publish RPC
10.2.1.5. Schema Paths
10.2.2. gNMI Service Use Cases
10.2.2.1. Telemetry
10.2.2.1.1. Dial-in Telemetry
10.2.2.1.2. Dial-out Telemetry
10.2.2.2. NE Configuration Management
10.3. gNOI Services
10.3.1. Certificate Management for TLS Connections
10.3.1.1. RPC GetCertificates
10.3.1.2. RPC CanGenerateCSR
10.3.1.3. RPC Rotate
10.3.1.4. RPC Install
10.3.1.5. RPC RevokeCertificates
10.4. gNOI System
10.4.1. SetPackage RPC
10.4.2. Reboot, CancelReboot, and RebootStatus RPC
10.4.3. SwitchControlProcessor RPC
10.4.4. Ping RPC
10.4.5. Time RPC
10.4.6. Traceroute RPC
10.5. MD-CLI Service
10.5.1. Remote Management Using a Remote Network Interface Shell Manager
10.6. gNOI File
10.6.1. Get RPC
10.6.2. Put RPC
10.6.3. Stat RPC
10.6.4. Remove RPC
10.6.5. TransferToRemote RPC
11. TLS
11.1. TLS Overview
11.2. TLS Server Interaction with Applications
11.2.1. TLS Application Support
11.3. TLS Handshake
11.4. TLS Client Certificate
11.5. TLS Symmetric Key Rollover
11.6. Supported TLS Ciphers
11.7. SR OS Certificate Management
11.7.1. Certificate Profile
11.7.2. TLS Server Authentication of the Client Certificate CN Field
11.7.3. CN Regexp Format
11.8. Operational Guidelines
11.8.1. Server Authentication Behavior
11.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
11.9. LDAP Redundancy and TLS
11.10. Basic TLS Configuration
11.11. Common Configuration Tasks
11.11.1. Configuring a Server TLS Profile
11.11.2. Configuring a Client TLS Profile
11.11.3. Configuring a TLS Client or TLS Server Certificate
11.11.4. Configuring a TLS Trust Anchor
12. Facility Alarms
12.1. Facility Alarms Overview
12.2. Facility Alarms vs. Log Events
12.3. Facility Alarm Severities and Alarm LED Behavior
12.4. Facility Alarm Hierarchy
12.5. Facility Alarm List
12.6. Configuring Logging with CLI
12.6.1. Basic Facility Alarm Configuration
12.6.2. Common Configuration Tasks
12.6.2.1. Configuring the Maximum Number of Alarms to Clear
13. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
1.3. Node Management Using VPRN
2. Security
2.1. Authentication, Authorization, and Accounting
2.1.1. Authentication
2.1.1.1. Local Authentication
2.1.1.2. RADIUS Authentication
2.1.1.2.1. RADIUS Server Selection
2.1.1.3. TACACS+ Authentication
2.1.1.4. LDAP Authentication
2.1.1.4.1. LDAP Authentication Process
2.1.1.4.2. Authentication Order
2.1.1.4.3. LDAP Authentication Using a Password
2.1.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.1.1.4.5. TLS Behavior and LDAP
2.1.1.4.6. LDAP Health Check
2.1.1.4.7. LDAP Redundancy and TLS
2.1.1.5. Password Hashing
2.1.2. Authorization
2.1.2.1. Local Authorization
2.1.2.2. RADIUS Authorization
2.1.2.3. TACACS+ Authorization
2.1.2.3.1. Examples
2.1.2.4. Authorization Profiles for Different Interfaces
2.1.2.5. Authorization Support
2.1.2.5.1. System-Provisioned AAA Command Authorization Profiles
2.1.2.5.2. Authorization Support for Configuration Groups
2.1.3. Accounting
2.1.3.1. RADIUS Accounting
2.1.3.2. TACACS+ Accounting
2.1.3.3. Command Accounting Log Events
2.2. Security Controls
2.2.1. When a Server Does Not Respond
2.2.2. Access Request Flow
2.3. Control and Management Traffic Protection
2.3.1. CPM Filters
2.3.1.1. CPM Filter Packet Match
2.3.1.2. CPM IPv4 and IPv6 Filter Entry Match Criteria
2.3.1.3. CPM MAC Filter Entry Match Criteria
2.3.1.4. CPM Filter Policy Action
2.3.1.5. CPM Filter Policy Statistics and Logging
2.3.1.6. CPM Filter: Protocols and Ports
2.3.2. CPM Per-Peer Queuing
2.3.3. CPM Queues
2.3.4. Centralized CPU Protection
2.3.4.1. Protocol Protection
2.3.4.2. CPU Protection Extensions for ETH-CFM
2.3.4.3. ETH-CFM Ingress Squelching
2.3.5. Distributed CPU Protection (DCP)
2.3.5.1. Policer
2.3.5.2. Applicability
2.3.5.3. Log Events, Statistics, Status, and SNMP Support
2.3.5.4. DCP Policer Resource Management
2.3.5.5. Operational Guidelines and Tips
2.3.6. Classification-Based Priority for Extracted Protocol Traffic
2.3.7. TTL Security
2.3.8. Management Access Filter
2.3.8.1. MAF Filter Packet Match
2.3.8.2. MAF IPv4/IPv6 Filter Entry Match Criteria
2.3.8.3. MAF MAC Filter Entry Match Criteria
2.3.8.4. MAF Filter Policy Action
2.3.8.5. MAF Filter Policy Statistics and Logging
2.4. Vendor-Specific Attributes (VSAs)
2.5. Other Security Features
2.5.1. SSH
2.5.1.1. SSH PKI Authentication
2.5.1.1.1. User Public Key Generation
2.5.1.2. MAC Client and Server List
2.5.1.3. KEX Client and Server List
2.5.1.4. Regenerate the SSH key without disabling SSH
2.5.1.4.1. Key re-exchange procedure
2.5.1.5. Cipher Client and Server List
2.5.2. Exponential Login Backoff
2.5.3. User Lockout
2.5.4. CLI Login Scripts
2.5.5. 802.1x Network Access Control
2.5.6. TCP Enhanced Authentication Option
2.5.6.1. Packet Formats
2.5.6.2. Keychain
2.5.7. gRPC Authentication
2.5.8. Hash Management per Management Interface Configuration
2.5.8.1. Hash encryption Using AES-256
2.5.8.2. Clear Text
2.6. Configuring Security with CLI
2.6.1. Security Configurations
2.6.2. Configuring Management Access Filters
2.6.3. Configuring IP CPM Filters
2.6.4. Configuring IPv6 CPM Filters
2.6.5. Configuring MAC CPM Filters
2.6.6. Configuring CPM Queues
2.6.7. IPsec Certificates Parameters
2.6.8. Configuring Local Command Authorization Profiles
2.6.8.1. Parameters
2.6.8.2. Wildcards
2.6.8.3. CLI Session Resource Management
2.6.9. Configuring Users
2.6.10. Configuring Keychains
2.6.11. Copying and Overwriting Users and Profiles
2.6.11.1. User
2.6.11.2. Profile
2.6.12. RADIUS Configurations
2.6.12.1. Configuring RADIUS Authentication
2.6.12.2. Configuring RADIUS Authorization
2.6.12.3. Configuring RADIUS Accounting
2.6.13. Configuring 802.1x RADIUS Policies
2.6.14. TACACS+ Configurations
2.6.14.1. Enabling TACACS+ Authentication
2.6.14.2. Configuring TACACS+ Authorization
2.6.14.3. Configuring TACACS+ Accounting
2.6.14.4. Enabling SSH
2.6.15. LDAP Configurations
2.6.15.1. Configuring LDAP Authentication
2.6.15.2. Configuring Redundant Servers
2.6.15.3. Enabling SSH
2.6.16. Configuring Login Controls
3. Model-Driven Management Interfaces
3.1. Management Interface Configuration Modes
3.2. YANG Data Models
3.2.1. Nokia SR OS YANG Data Models
3.2.2. OpenConfig YANG Data Models
3.2.2.1. Basic Configuration
3.2.2.2. Shared Model Management Support
3.2.2.2.1. Introduction
3.2.2.2.2. Merging Configuration Statements
3.2.2.2.3. Application Support
3.2.2.2.4. Validating and Committing
3.2.2.2.5. Error Reporting
3.2.2.2.6. Using the info Command
3.2.2.2.7. Deviating and Augmenting
3.3. Datastores and Regions
3.3.1. NMDA Support
3.4. SPC Objects
3.5. Prerequisites for Using Model-Driven Management Interfaces
3.5.1. Loose References to IDs
3.5.2. String Routing Policy Validation
3.5.3. String Names as Keys
3.6. Transitioning Between Modes
3.6.1. Configuring the CLI Engine
3.7. YANG-based Operations
3.7.1. Asynchronous Versus Synchronous Operations
3.7.1.1. Examples of Operations in MD-CLI
3.7.1.2. Examples of Synchronous Operations in NETCONF
3.7.1.3. Examples of Asynchronous Operations in NETCONF
4. SNMP
4.1. SNMP Overview
4.1.1. SNMP Architecture
4.1.2. Management Information Base
4.1.3. SNMP Protocol Operations
4.1.4. SNMP Versions
4.1.5. Management Information Access Control
4.1.6. User-Based Security Model Community Strings
4.1.7. Views
4.1.8. Access Groups
4.1.9. Users
4.1.10. Per-VPRN Logs and SNMP Access
4.1.11. Per-SNMP Community Source IP Address Validation
4.2. SNMP Versions
4.3. Best Practices for SNMP Information Retrieval
4.3.1. SNMP GetBulkRequest
4.3.2. Queueing, RTT, and Collection Performance
4.4. Configuration Notes
4.4.1. General
4.5. Configuring SNMP with CLI
4.5.1. SNMP Configuration Overview
4.5.1.1. Configuring SNMPv1 and SNMPv2c
4.5.1.2. Configuring SNMPv3
4.5.2. Basic SNMP Security Configuration
4.5.3. Configuring SNMP Components
4.5.3.1. Configuring a Community String
4.5.3.2. Configuring View Options
4.5.3.3. Configuring Access Options
4.5.3.4. Configuring USM Community Options
4.5.3.5. Configuring Other SNMP Parameters
5. NETCONF
5.1. NETCONF Overview
5.2. NETCONF in SR OS
5.2.1. Transport and Sessions
5.2.2. Datastores and URLs
5.2.3. NETCONF Operations and Capabilities
5.2.3.1. <get>
5.2.3.1.1. Example: Namespace Specified in <configure> Tag
5.2.3.1.2. Example: Namespace Error in <configure> Tag
5.2.3.1.3. Example: Namespace Specified in <state> Tag
5.2.3.1.4. Example: Namespace Error in <state> Tag
5.2.3.2. <get-config>
5.2.3.2.1. Example: Reply with Defaults
5.2.3.2.2. Example: Reply Without Default Values
5.2.3.2.3. Example: Containment Node
5.2.3.2.4. Example: List Without a Key Specified
5.2.3.2.5. Example: List with Non-key Leaf Specified as Selection Node
5.2.3.2.6. Example: Non-key Leaf Specified as a Content Match Node
5.2.3.2.7. Example: Content Match Node on a List Key
5.2.3.2.8. Example: Content Match Node on a Leaf-list
5.2.3.3. <edit-config>
5.2.3.3.1. Example: <running> Datastore with the “urn:nokia.com:sros:ns:yang:sr:conf” Namespace
5.2.3.3.2. Example: Application of Default Operation Value for Parent and Child Nodes
5.2.3.3.3. Example: Exceptions to the Default Operation Handling
5.2.3.4. <copy-config>
5.2.3.5. <delete-config>
5.2.3.6. <lock>
5.2.3.7. <unlock>
5.2.3.8. <commit>
5.2.3.9. <discard-changes>
5.2.3.10. <validate>
5.2.3.11. <get-schema>
5.2.3.12. <get-data>
5.2.4. Datastore and Operation Combinations
5.2.5. General NETCONF Behavior
5.2.5.1. Example: Multiple Use of Standard NETCONF Namespace
5.2.5.2. Example: Non-default NETCONF Base Namespace
5.2.5.3. Example: Invalid NETCONF Namespace Declaration
5.2.5.4. Example: Non-default NETCONF Namespace or Prefix Declaration in a Child Tag
5.2.5.5. Example: Chunked Frame Mechanism
5.2.6. Establishing a NETCONF Session
5.2.6.1. Example: Checking NETCONF Status
5.2.6.2. Example: Retrieving System Configurations, QoS, and Log Branches
5.2.6.3. Example: Creating an Epipe Service
5.2.6.4. Example: Returning Multiple Errors
5.3. NETCONF Notifications
5.3.1. NETCONF Notification Examples�
5.3.1.1. Example: <create-subscription> Operation
5.3.1.2. Example: sros-config-change-event Notification
5.3.1.3. Example: sros-state-change-event Notification
5.3.1.4. Example: sros-cli-accounting-event Notification
5.3.1.5. Example: sros-log-generic-event Notification
5.3.1.6. Example: netconf-config-change Notification
5.3.1.7. Example: sros-md-rpc-accounting-event Notification�
5.4. NETCONF Monitoring
5.5. YANG Library
5.6. Operational Commands via NETCONF
5.6.1. Individually Modeled YANG-based Operations
5.6.2. NETCONF Operations Using the md-cli-raw-command Request
6. Python
6.1. Python Overview
6.2. Python in SR OS
6.2.1. Prerequisites
6.2.2. YANG Model Support
6.3. Python 3 Interpreter
6.4. Building an Application
6.4.1. Available Libraries
6.4.2. The pySROS API
6.4.2.1. Installing the pySROS Libraries
6.4.2.2. Importing into Applications
6.4.2.3. API Documentation
6.4.2.4. Connecting to a Model-driven SR OS Device
6.4.2.5. Obtaining Modeled Data
6.4.2.6. Editing Configuration
6.4.3. The pySROS Data Structure
6.5. Provisioning and Precompiling Python Applications
6.5.1. Refreshing Configured Python Scripts
6.6. Execution Pathways
6.6.1. Running a Python Application Remotely
6.6.2. Running a Python Application from the Command Line
6.6.2.1. pyexec and Input Parameters
6.6.2.2. Running a Python Application as an Output Modifier
6.6.2.3. Chaining Python Applications
6.6.2.4. Python Applications and the MD-CLI Pager
6.6.3. Running Python Applications Using Aliased MD-CLI
6.7. Security
6.7.1. Python Authentication and Authorization
6.7.1.1. Authentication
6.7.1.2. Authorization
6.7.2. Other Restrictions
6.7.3. Memory Management
6.7.4. Performance and Scale
7. Event and Accounting Logs
7.1. Logging Overview
7.1.1. Logging Using the Management VPRN
7.2. Log Destinations
7.2.1. Console
7.2.2. Session
7.2.3. CLI Logs
7.2.4. Memory Logs
7.2.5. Log Files
7.2.6. SNMP Trap Group
7.2.7. Syslog
7.2.8. NETCONF
7.3. Event Logs
7.3.1. Event Sources
7.3.2. Event Control
7.3.3. Log Manager and Event Logs
7.3.4. Event Filter Policies
7.3.5. Event Log Entries
7.3.6. Simple Logger Event Throttling
7.3.7. Default System Log
7.3.8. Event Handling System
7.3.8.1. EHS Configuration and Syntax Rules
7.3.8.2. Examples of EHS Syntax Supported in Classic CLI
7.3.8.3. Valid Examples of EHS Syntax in Classic CLI
7.3.8.4. Invalid Examples for EHS Syntax in Classic CLI
7.3.8.5. EHS Debounce
7.3.8.6. Executing EHS or CRON Scripts
7.4. Customizing Syslog Messages Using Python
7.4.1. Python Engine for Syslog
7.4.1.1. Python Syslog APIs
7.4.1.2. Timestamp Format Manipulation
7.4.2. Python Processing Efficiency
7.4.3. Python Backpressure
7.4.4. Event Selection for Python Processing
7.4.5. Modifying a Log File
7.4.6. Deleting a Log File
7.4.7. Modifying a File ID
7.4.8. Modifying a Syslog ID
7.4.9. Modifying an SNMP Trap Group
7.4.10. Deleting an SNMP Trap Group
7.4.11. Modifying a Log Filter
7.4.12. Modifying Event Control Parameters
7.4.13. Returning to the Default Event Control Configuration
7.5. Accounting Logs
7.5.1. Accounting Records
7.5.2. Accounting Files
7.5.3. Design Considerations for Accounting Policies
7.5.4. Reporting and Time-Based Accounting
7.5.5. Overhead Reduction in Accounting: Custom Record
7.5.5.1. User Configurable Records
7.5.5.2. Changed Statistics Only
7.5.5.3. Configurable Accounting Records
7.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
7.5.5.3.2. XML Accounting Files for Policer Counters
7.5.5.3.3. RADIUS Accounting in Networks Using ESM
7.5.5.4. Significant Change Only Reporting
7.5.6. Immediate Completion of Records
7.5.6.1. Record Completion for XML Accounting
7.5.7. AA Accounting per Forwarding Class
7.6. Configuration Notes
7.7. Configuring Logging with CLI
7.7.1. Log Configuration Overview
7.7.2. Log Types
7.7.3. Basic Log Configuration
7.7.4. Common Configuration Tasks
7.7.4.1. Configuring an Event Log
7.7.4.2. Configuring a File ID
7.7.4.3. Configuring an Accounting Policy
7.7.4.4. Configuring Event Control
7.7.4.5. Configuring a Log Filter
7.7.4.6. Configuring an SNMP Trap Group
7.7.4.6.1. Setting the Replay Parameter
7.7.4.6.2. Shutdown In-Band Port
7.7.4.6.3. No Shutdown Port
7.7.4.7. Configuring a Syslog Target
7.7.4.7.1. Configuring an Accounting Custom Record
8. Node Discovery Provisioning Using OSPF
8.1. Node Discovery Procedure
8.1.1. Network Element Profiles
8.1.2. Assigning a Network Element Profile
8.1.3. OSPFv2 Opaque LSA Requirements
8.1.4. IPv4/IPv6
8.2. Auto-provisioning Using OSPF
8.2.1. NEID
8.2.2. NEIP
8.2.3. NEIP and NEID Auto-generate CLI Configuration
8.2.4. Auto-provisioning Using OSPF
8.2.4.1. Auto-generate Configuration
8.2.4.1.1. Auto-generate NEID configuration
8.2.4.2. The auto-boot ospf Flag and its Options
8.2.4.3. CLI Generation of the Loopback Address and Router ID from auto-boot ospf and its Options
8.2.4.3.1. Auto-provisioning Details
8.2.4.4. Connectivity Requirements
8.2.4.5. Auto-provisioning Success
8.2.4.6. Auto-boot OSPF Reboot Timers
8.2.4.7. Auto-boot OSPF Relation with Auto-boot
8.2.4.8. Auto-provisioning Log Options
8.2.4.9. Console Access during Auto-provisioning
8.2.4.10. Disabling OSPF Auto-provisioning
8.2.5. CLI Structure
8.2.5.1. Assigning the ne-discovery Profile to IGP
8.3. Aggregation Node Configuration
8.3.1. MIB Requirements on the Aggregation Node
8.3.2. SNMP Traps and Gets
9. sFlow
9.1. sFlow Overview
9.2. sFlow Features
9.2.1. sFlow Counter Polling Architecture
9.2.2. sFlow Support on Logical Ethernet Ports
9.2.3. sFlow SAP Counter Map
9.2.4. sFlow Record Formats
10. gRPC
10.1. Security Aspects
10.1.1. TLS-Based Encryption
10.1.2. Authentication
10.2. gNMI Service
10.2.1. gNMI Service Definitions
10.2.1.1. Capability Discovery
10.2.1.2. Get/Set RPC
10.2.1.3. Subscribe RPC
10.2.1.3.1. Bytes Encoding
10.2.1.3.2. PROTO Encoding
10.2.1.3.3. ON_CHANGE Subscription Mode
10.2.1.4. Publish RPC
10.2.1.5. Schema Paths
10.2.2. gNMI Service Use Cases
10.2.2.1. Telemetry
10.2.2.1.1. Dial-in Telemetry
10.2.2.1.2. Dial-out Telemetry
10.2.2.2. NE Configuration Management
10.3. gNOI Services
10.3.1. Certificate Management for TLS Connections
10.3.1.1. RPC GetCertificates
10.3.1.2. RPC CanGenerateCSR
10.3.1.3. RPC Rotate
10.3.1.4. RPC Install
10.3.1.5. RPC RevokeCertificates
10.4. gNOI System
10.4.1. SetPackage RPC
10.4.2. Reboot, CancelReboot, and RebootStatus RPC
10.4.3. SwitchControlProcessor RPC
10.4.4. Ping RPC
10.4.5. Time RPC
10.4.6. Traceroute RPC
10.5. MD-CLI Service
10.5.1. Remote Management Using a Remote Network Interface Shell Manager
10.6. gNOI File
10.6.1. Get RPC
10.6.2. Put RPC
10.6.3. Stat RPC
10.6.4. Remove RPC
10.6.5. TransferToRemote RPC
11. TLS
11.1. TLS Overview
11.2. TLS Server Interaction with Applications
11.2.1. TLS Application Support
11.3. TLS Handshake
11.4. TLS Client Certificate
11.5. TLS Symmetric Key Rollover
11.6. Supported TLS Ciphers
11.7. SR OS Certificate Management
11.7.1. Certificate Profile
11.7.2. TLS Server Authentication of the Client Certificate CN Field
11.7.3. CN Regexp Format
11.8. Operational Guidelines
11.8.1. Server Authentication Behavior
11.8.2. Client TLS Profile and Trust Anchor Behavior and Scale
11.9. LDAP Redundancy and TLS
11.10. Basic TLS Configuration
11.11. Common Configuration Tasks
11.11.1. Configuring a Server TLS Profile
11.11.2. Configuring a Client TLS Profile
11.11.3. Configuring a TLS Client or TLS Server Certificate
11.11.4. Configuring a TLS Trust Anchor
12. Facility Alarms
12.1. Facility Alarms Overview
12.2. Facility Alarms vs. Log Events
12.3. Facility Alarm Severities and Alarm LED Behavior
12.4. Facility Alarm Hierarchy
12.5. Facility Alarm List
12.6. Configuring Logging with CLI
12.6.1. Basic Facility Alarm Configuration
12.6.2. Common Configuration Tasks
12.6.2.1. Configuring the Maximum Number of Alarms to Clear
13. Standards and Protocol Support
Customer Document and Product Support
Triple Play Service Delivery Architecture 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2. Introduction to Triple Play
2.1. Nokia’s Triple Play Service Delivery Architecture
2.1.1. Introduction to Triple Play
2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.1.3. Architectural Foundations
2.1.4. Optimizing Triple Play Service Infrastructures
2.1.4.1. Distributed Service Edges
2.1.4.2. Service Differentiation, QoS Enablement
2.1.4.3. Virtual MAC Subnetting for VPLS
2.2. Services
2.2.1. Service Types
2.2.2. Service Policies
2.3. Nokia Service Model
2.3.1. Introduction
2.3.2. Service Entities
2.3.3. Customers
2.3.4. Service Access Points (SAPs)
2.3.4.1. SAP Encapsulation Types and Identifiers
2.3.4.2. Ethernet Encapsulations
2.3.4.3. SAP Considerations
2.3.5. Service Distribution Points (SDPs)
2.3.5.1. SDP Binding
2.3.5.2. Spoke and Mesh SDPs
2.3.5.3. SDP Encapsulation Types
2.3.5.3.1. GRE
2.3.5.3.2. MPLS
2.3.5.4. SDP Keepalives
2.4. Epipe Service Overview
2.5. VPLS Service Overview
2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.5.1.1. Residential Split Horizon Groups
2.6. IES Service Overview
2.6.1. IP Interface
2.7. VPRN Service Overview
2.8. Deploying and Provisioning Services
2.8.1. Phase 1: Core Network Construction
2.8.2. Phase 2: Service Administration
2.8.3. Phase 3: Service Provisioning
2.9. Configuration Notes
2.9.1. General
2.10. Configuring Triple Play Services with CLI
2.10.1. Configuring VPLS Residential Split Horizon Groups
2.10.1.1. Configuring Static Hosts
2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
2.10.1.1.4. Configuring Static Hosts on an IES SAP
2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
3. DHCP Management
3.1. DHCP Principles
3.2. DHCP Features
3.2.1. DHCP Relay
3.2.2. DHCPv4 Relay Proxy
3.2.3. DHCP Lease Split
3.2.3.1. DHCPv4
3.2.3.2. DHCPv6
3.2.4. Subscriber Identification Using Option 82 Field
3.2.4.1. Trusted and Untrusted
3.2.5. DHCP Snooping
3.2.6. DHCP Lease State Table
3.2.7. DHCP and Layer 3 Aggregation
3.2.7.1. DHCPv4 Snooping
3.2.7.2. DHCPv6 Snooping
3.2.8. Local DHCP Servers
3.2.8.1. Overview
3.2.8.2. Local DHCP Server Support
3.2.9. DHCPv6
3.2.9.1. DHCPv6 Relay Agent
3.2.9.2. DHCPv6 Prefix Options
3.2.9.3. Neighbor Resolution With DHCPv6 Relay
3.2.9.4. DHCPv6 Lease Persistency
3.2.9.5. Local Proxy Neighbor Discovery
3.2.9.6. IPv6oE Hosts Behind Bridged CPEs
3.2.9.7. IPv6 Link-Address Based Pool Selection
3.2.9.8. IPv6 Address and Prefix Stickiness
3.2.9.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.2.9.10. Host Connectivity Checks for IPv6
3.2.10. Lease Query
3.2.11. DHCPv6 to Server Option
3.2.12. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.2.13. DHCP Caching
3.2.14. Flexible Creation of DHCPv4/6 Host Parameters
3.2.15. Python DTC Variables and API
3.2.15.1. DTC Debugging Facility
3.2.16. Virtual Subnet for DHCPv4 Hosts
3.2.17. Address Reservation for Sticky Leases
3.2.18. DHCP Message Processing Overload Protection
3.2.19. DHCPv4 Offer and DHCPv6 Advertise Selection Parameters for DHCP Relay
3.2.19.1. DHCPv4 Offer Selection Parameters on a Subscriber Group-interface DHCP Relay
3.2.19.2. DHCPv6 Advertise Selection Parameters on a Subscriber Group-interface DHCP6 Relay
3.2.20. DHCP Release Messages
3.3. Proxy DHCP Server
3.3.1. Local DHCP Servers
3.3.1.1. Terminology
3.3.1.2. Overview
3.3.1.3. DHCP Lease Synchronization
3.3.1.4. Intercommunication Link Failure Detection
3.3.1.5. DHCP Server Failover States
3.3.1.6. Lease Time Synchronization
3.3.1.7. Maximum Client Lead Time (MCLT)
3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.3.1.9. Fast-Switchover of IP Address and Prefix Delegation
3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.4. Local Address Assignment
3.4.1. Stateless Address Auto-Configuration
3.5. Configuring DHCP with CLI
3.5.1. Enabling DHCP Snooping
3.5.2. Configuring Local User Database Parameters
3.5.3. Configuring Option 82 Handling
3.5.4. Enabling DHCP Relay
4. Stateless Address Auto-configuration (SLAAC)
4.1. SLAAC Management Principles
4.2. Configuration Overview
4.3. Router-Solicit Trigger
4.4. SLAAC Address Assignment
4.5. Static SLAAC Prefix Assignment
4.6. Dynamic SLAAC Prefix Assignment
4.7. SLAAC Prefix Replacement
5. Point-to-Point Protocol over Ethernet Management
5.1. PPPoE
5.1.1. PPPoE Authentication and Authorization
5.1.1.1. General Flow
5.1.1.2. RADIUS
5.1.1.3. Local User Database Directly Assigned to PPPoE Node
5.1.1.4. Subscriber per PPPoE Session Index
5.1.1.5. Local DHCP Server with Local User Database
5.1.2. PPPoE Session ID Allocation
5.1.3. Multiple Sessions Per MAC Address
5.1.4. Session Limit Per Circuit ID
5.1.5. PPP Session Re-establishment
5.1.6. Private Retail Subnets
5.1.7. IPCP Subnet Negotiation
5.1.7.1. Numbered WAN Support for Layer 3 RGs
5.1.8. IES as Retail Service for PPPoE Host
5.1.9. Unnumbered PPPoE
5.1.10. Selective Backhaul of PPPoE Traffic using an Epipe Service
5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.2.1. Terminology
5.2.2. LNS MLPPPoX
5.2.3. MLPPP Encapsulation
5.2.4. MLPPPoX Negotiation
5.2.5. Enabling MLPPPoX
5.2.6. Link Fragmentation and Interleaving (LFI)
5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.2.7. LFI Functionality Implemented in LNS
5.2.7.1. Last Mile QoS Awareness in the LNS
5.2.7.2. BB-ISA Processing
5.2.7.3. LNS-LAC Link
5.2.7.4. AN-RG Link
5.2.7.5. Home Link
5.2.7.6. Optimum Fragment Size Calculation by LNS
5.2.7.6.1. Encapsulation Based Fragment Size
5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
5.2.7.6.3. Selection of the Optimum Fragment Length
5.2.8. Upstream Traffic Considerations
5.2.9. Multiple Links MLPPPoX With No Interleaving
5.2.10. MLPPPoX Session Support
5.2.11. Session Load Balancing Across Multiple BB-ISAs
5.2.12. BB-ISA Hashing Considerations
5.2.13. Last Mile Rate and Encapsulation Parameters
5.2.14. Link Failure Detection
5.2.15. CoA Support
5.2.16. Accounting
5.2.17. Filters and Mirroring
5.2.18. PTA Considerations
5.2.19. QoS Considerations
5.2.19.1. Dual-Pass
5.2.19.2. Traffic Prioritization in LFI
5.2.19.3. Shaping Based on the Last Mile Wire Rates
5.2.19.4. Downstream Bandwidth Management on Egress Port
5.2.20. Sub/Sla-Profile Considerations
5.2.21. Example of MLPPPoX Session Setup Flow
5.2.22. Other Considerations
5.3. Configuration Notes
6. Layer 2 Tunneling Protocol (L2TP)
6.1. Terminology
6.2. L2TP Overview
6.2.1. LAC DF Bit
6.2.2. Handling L2TP Tunnel/Session Initialization Failures
6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.2.2. Peer Denylist
6.2.2.3. Tunnel Denylists
6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.2.4. Tunnel Selection Mechanism
6.2.2.5. Tunnel Probing
6.2.2.6. Controlling the Size of Denylist
6.2.2.7. Displaying the Content of a Denylist
6.2.2.8. Generating Trap when the Denylist is Full
6.2.2.9. Premature Removal of Denylisted Entries
6.2.2.10. Manual Purging of Entities within the Denylist
6.2.3. CDN Result Code Overwrite
6.2.4. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. Traffic Steering on L2TP LAC
6.4.1. Steering Activation and Deactivation
6.4.2. Steering States
6.4.3. Configuring Traffic Steering on L2TP LAC
6.5. L2TP Tunnel RADIUS Accounting
6.5.1. Accounting Packets List
6.5.2. RADIUS Attributes Value Considerations
6.6. MLPPP on the LNS Side
6.7. LNS Reassembly
6.8. LNS Subscriber Policers
6.8.1. Policer Support
7. Triple Play Security
7.1. Triple Play Security Features
7.1.1. Anti-Spoofing Filters
7.1.1.1. Anti-spoofing Filter Types
7.1.1.2. Filtering Packets
7.1.2. Layer 2 Triple Play Security Features
7.1.2.1. MAC Pinning
7.1.2.2. MAC Protection
7.1.2.3. DoS Protection
7.1.2.3.1. Subscriber Aggregation Network
7.1.2.3.2. Network Control Filtering
7.1.2.4. VPLS Redirect Policy
7.1.3. ARP Handling
7.1.3.1. ARP Reply Agent
7.1.3.2. Dynamic ARP Table Population
7.1.3.3. Local Proxy ARP
7.1.4. Web Portal Redirect
7.2. Configuring Triple Play Security with CLI
7.2.1. Common Configuration Tasks
7.2.1.1. Configuring Anti-Spoofing Filters
7.2.1.2. Configuring Triple Play Security Features
7.2.1.2.1. Configuring MAC Pinning
7.2.1.2.2. Configuring MAC Protection
7.2.1.2.3. Configuring VPLS Redirect Policy
7.2.1.3. Configuring ARP Handling
7.2.1.3.1. Configuring Proxy ARP
7.2.1.3.2. Configuring Local Proxy ARP
7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
7.2.1.3.4. Configuring Remote Proxy ARP
7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
7.2.1.3.6. Configuring CPU Protection
7.2.1.4. Configuring Web Portal Redirect
8. Triple Play Multicast
8.1. Introduction to Multicast
8.2. Multicast in the Broadband Service Router
8.2.1. Internet Group Management Protocol
8.2.1.1. IGMP Versions and Interoperability Requirements
8.2.1.2. IGMP Version Transition
8.2.2. Multicast Listener Discovery
8.2.2.1. MLD Versions and Interoperability Requirements
8.2.2.2. Source Specific Multicast Groups
8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
8.3. Multicast in the BSA
8.3.1. IGMP Snooping
8.3.1.1. IGMP/MLD Message Processing
8.3.1.2. IGMP Message Processing
8.3.1.3. MLD Message Processing
8.3.1.4. IGMP/MLD Filtering
8.3.2. Multicast VPLS Registration (MVR)
8.3.3. Layer 3 Multicast Load Balancing
8.3.4. IGMP State Reporter
8.3.4.1. IGMP Data Records
8.3.4.2. Transport Mechanism
8.3.4.3. HA Compliance
8.3.4.4. QoS Awareness
8.3.4.5. IGMP Reporting Caveats
8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
8.4.1. Multicast Over IPoE
8.4.1.1. Per SAP Replication Mode
8.4.1.1.1. Per SAP Queue
8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.4.1.2. Per Subscriber Host Replication Mode
8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.4.1.3. Per-SLA Profile Instance Replication Mode
8.4.2. Multicast Over PPPoE
8.4.3. IGMP Flooding Containment
8.4.4. IGMP/MLD Timers
8.4.5. IGMP/MLD Query Intervals
8.4.6. HQoS Adjustment
8.4.6.1. Host Tracking (HT) Considerations
8.4.6.2. HQoS Adjust Per Vport
8.4.6.2.1. Multi-Chassis Redundancy
8.4.6.2.2. Scalability Considerations
8.4.7. Redirection
8.4.8. Hierarchical Multicast CAC (H-MCAC)
8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
8.4.9. Determining MCAC Policy in Effect
8.4.10. Multicast Filtering
8.4.11. Joining the Multicast Tree
8.4.12. Wholesale/Retail Requirements
8.4.13. QoS Considerations
8.4.14. Redundancy Considerations
8.4.14.1. Redirection Considerations
8.4.15. Query Intervals for Multicast
8.4.15.1. ESM Host-based Queries
8.4.15.2. Group Interface-based Queries
8.4.16. ESM Multicast Replication Modes
8.5. ESM Multicast on BNG CUPS UPF
8.6. Configuring Triple Play Multicast Services with CLI
8.6.1. Configuring IGMP Snooping in the BSA
8.6.1.1. Enabling IGMP Snooping in a VPLS Service
8.6.1.2. IGMPv3 Multicast Routers
8.6.1.3. With IGMPv1/2 Multicast Routers
8.6.1.4. Modifying IGMP Snooping Parameters
8.6.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
8.6.2. Configuring Static Multicast Groups on a SAP or SDP
8.6.2.1. Enabling IGMP Group Membership Report Filtering
8.6.2.1.1. Enabling IGMP Traffic Filtering
8.6.3. Configuring Multicast VPLS Registration (MVR)
8.6.4. Configuring IGMP, MLD, and PIM in the BSR
8.6.4.1. Enabling IGMP
8.6.4.2. Configuring IGMP Interface Parameters
8.6.4.3. Configuring Static Parameters
8.6.4.4. Configuring SSM Translation
8.6.4.5. Enabling MLD
8.6.4.6. Configuring MLD Interface Parameters
8.6.4.7. Configuring Static Parameters
8.6.4.8. Configuring SSM Translation
8.6.4.9. Configuring PIM
8.6.4.9.1. Enabling PIM
8.6.4.9.2. Configuring PIM Interface Parameters
8.6.4.9.3. Importing PIM Join/Register Policies
8.6.4.9.4. Configuring PIM Join/Register Policies
8.6.4.10. Configuring Bootstrap Message Import and Export Policies
9. Triple Play Enhanced Subscriber Management
9.1. Uniform RADIUS Server Configuration
9.1.1. RADIUS Server Configuration
9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
9.1.1.2. Legacy RADIUS Server Configuration
9.2. RADIUS Authentication of Subscriber Sessions
9.2.1. RADIUS Authentication Extensions
9.2.1.1. Triple Play Network with RADIUS Authentication
9.2.2. RADIUS Authorization Extensions
9.2.2.1. Calling-Station-ID
9.2.2.2. Subscriber Session Timeout
9.2.2.2.1. Domain Name in Authentication
9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.2.2.4. SHCV Policy
9.2.3. radius-server-policy Retry Attempt Overview
9.2.4. AAA RADIUS Server Operation Status
9.2.5. AAA RADIUS Accounting Server Stickiness
9.2.6. AAA RADIUS Authentication Fallback Action
9.2.7. AAA Test User Account
9.2.8. Troubleshooting the RADIUS Server
9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.2.9.1. Provisioning IP Configuration of the Host
9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
9.2.9.3. Change of Authorization and Disconnect-Request
9.2.9.3.1. Change of Authorization using the Tools Command
9.2.9.4. RADIUS-Based Accounting
9.2.9.5. RADIUS Accounting Terminating Cause
9.2.9.6. Accounting Modes Of Operation
9.2.9.7. Per Session Accounting
9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
9.2.9.9. No Host-Accounting
9.2.9.10. Host-Accounting Enabled
9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.2.9.12. Accounting Interim Update Message Interval
9.2.9.13. CoA Triggered Accounting Interim Update
9.2.9.14. Class Attribute
9.2.9.15. User Name
9.2.9.16. Accounting-On and Accounting Off
9.2.9.17. RADIUS Accounting Message Buffering
9.2.9.18. Multiple Accounting Policies
9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.2.9.20. Sending an Accounting Stop Message upon an IPoE Host Creation Failure
9.3. Enhanced Subscriber Management Overview
9.3.1. Enhanced Subscriber Management Basics
9.3.1.1. Standard and Enhanced Subscriber Management
9.3.1.1.1. Subscriber Management Definitions
9.3.1.1.2. Subscriber Identification Policy
9.3.1.1.3. Subscriber Identification String
9.3.1.1.4. Subscriber Profile
9.3.1.1.5. SLA Profile
9.3.1.1.6. Explicit Subscriber Profile Mapping
9.3.2. ESM for IPv6
9.3.2.1. Models
9.3.2.1.1. PPPoE Host
9.3.2.1.2. PPPoE RG
9.3.2.1.3. IPoE Host/RG
9.3.2.2. Setup
9.3.2.3. 64-bit and 128-bit WAN Mode
9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
9.3.2.4. Behavior
9.3.2.4.1. Dual-Stack
9.3.2.4.2. Router Advertisements (RA)
9.3.2.4.3. CoA and Disconnect-Request
9.3.2.5. Delegated-Prefix-Length
9.3.2.5.1. Order of Preference for DPL
9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
9.3.2.6. DHCPv6 Relay Agent
9.3.2.6.1. Configuring a DHCPv6 Relay Agent
9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
9.3.2.8. DHCPv6 Local Server
9.3.3. Dynamic Subscriber Host Processing
9.3.3.1. Dynamic Tables
9.3.3.1.1. Active Subscriber Table
9.3.3.1.2. SLA Profile Instance Table
9.3.3.1.3. Subscriber Host Table
9.3.3.1.4. DHCP Lease State Table
9.3.4. Enhanced Subscriber Management Entities
9.3.4.1. Instantiating a New Host
9.3.4.2. Packet Processing for an Existing Host
9.3.5. ESM Host Lockout
9.3.5.1. Functionality
9.3.6. ANCP and GSMP
9.3.6.1. ANCP
9.3.6.1.1. Static ANCP Management
9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.3.6.1.3. ANCP String
9.3.6.1.4. ANCP Persistency Support
9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.3.6.3. DHCP Client Mobility
9.3.6.4. DHCP Lease Control
9.3.7. Using Scripts for Dynamic Recognition of Subscribers
9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.3.7.3. Determining the Subscriber Profile
9.3.7.4. Determining the SLA Profile
9.3.7.4.1. SLA Profile Instance Sharing
9.3.7.4.2. SLA-Based Egress QoS Marking
9.3.8. Sub-id and Brg-id Names with Lengths Between 32 and 64 Characters
9.3.8.1. Online Change of Sub-id and Brg-id
9.3.8.2. Usage Notes
9.3.9. Auto-Sub ID
9.3.9.1. Sub-id Identifiers
9.3.9.2. Dual-Stack Hosts
9.3.9.3. Mixing Hosts with Auto-Generated IDs and non-Auto-Generated IDs
9.3.9.4. Deployment Considerations
9.3.9.5. Caveats
9.3.10. Limiting Subscribers, Hosts, and Sessions
9.3.10.1. Limiting the Number of IPoE Sessions
9.3.10.2. Limiting the Number of PPPoE Sessions
9.3.10.3. Limiting the Number of Hosts and Sessions per SLA Profile Instance and per Subscriber
9.3.11. Static Subscriber Hosts
9.3.12. QoS for Subscribers and Hosts
9.3.12.1. QoS Parameters in Different Profiles
9.3.12.2. QoS Policy Overrides
9.3.13. ESM Subscriber Hierarchical Traffic Control
9.3.13.1. Subscriber HQoS
9.3.13.2. Subscriber CFHP
9.3.13.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.3.13.3.1. Broadband Network Gateway Application
9.3.13.3.2. Queue Determination and Scheduling
9.3.13.3.3. Weighted Scheduler Group
9.3.13.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.3.13.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.3.13.3.6. Vport Determination and Evaluation
9.3.13.3.7. Applying Aggregate Rate Limit to a Vport
9.3.13.3.8. Applying a Scheduler Policy to a Vport
9.3.13.3.9. Signaling of Last Mile Encapsulation Type
9.3.13.3.10. Configuration Example
9.3.14. Subscriber Volume Statistics
9.3.14.1. IP (Layer 3) Volume Accounting
9.3.14.2. Separate IPv4 and IPv6 Counters
9.3.15. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.3.15.1. Dynamic Updates of Subscriber Filter Policies
9.3.15.1.1. SLA Profile Change
9.3.15.1.2. Override the IP and IPv6 Filter Policies
9.3.15.1.3. Insert Subscriber Host-Specific Filter Entries
9.3.15.1.4. Insert Shared Filter Entries
9.3.15.2. Checking Filter Policy Details
9.3.16. Multi-Chassis Synchronization
9.3.16.1. Overview
9.3.16.1.1. Loss of Synchronization and Reconciliation
9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
9.3.17.1. SRRP Messaging
9.3.17.2. SRRP and Multi-Chassis Synchronization
9.3.17.3. SRRP Instance
9.3.17.3.1. SRRP Instance MCS Key
9.3.17.3.2. Containing Service Type and ID
9.3.17.3.3. Containing Subscriber IP Interface Name
9.3.17.3.4. Subscriber Subnet Information
9.3.17.3.5. Containing Group IP Interface Information
9.3.17.3.6. Remote Redundant IP Interface Mismatch
9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.3.17.3.10. Local and Remote Dual SRRP Master State Detected
9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.3.18. PPPoE MC Redundancy
9.3.18.1. SRRP Considerations for PPPoE
9.3.18.1.1. SRRP Fact-Checks
9.3.18.2. State Synchronization
9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.3.18.3. Traffic Control and Redundant Interface
9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
9.3.18.3.2. Subnet Assignment and Advertisement - Option B
9.3.18.4. MSAP Considerations
9.3.18.5. Unnumbered Interface Support
9.3.18.6. Compatibility with MC-LAG
9.3.18.7. IPv6 Support
9.3.18.8. Considerations with Local DHCP Server
9.3.18.9. Redundant Interface Considerations
9.3.19. Routed Central Office (CO)
9.3.19.1. Layer 3 Subscriber Interfaces
9.3.19.1.1. DHCP Interactions
9.3.19.1.2. Routed CO for IES Service
9.3.19.1.3. Routed CO for VPRN Service
9.3.19.2. Wholesale Retail Routed CO
9.3.19.2.1. Wholesale Retail Model
9.3.19.2.2. Configuration and Applicability
9.3.19.2.3. Hub-and-Spoke Forwarding
9.3.19.3. Routed Subscriber Hosts
9.3.19.3.1. Static Configured IPv4 Managed Route
9.3.19.3.2. Static Configured IPv6 Managed Route
9.3.19.3.3. Dynamic BGP Peering
9.3.19.3.4. RIP Listener
9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.3.19.4. Subscriber Prefix Leaking
9.3.19.4.1. VPRN Leaking
9.3.19.4.2. GRT Lookup and Routed CO in a VPRN
9.3.20. Dual Homing
9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.3.20.2. Steady-State Operation of Dual-homed Ring
9.3.20.3. Broken-Ring Operation and the Transition to this State
9.3.20.4. Transition from Broken to Closed Ring State
9.3.20.5. Provisioning Aspects and Error Cases
9.3.20.6. Dual Homing to Two BSR Nodes
9.3.20.7. MC Services
9.3.20.8. Routed CO Dual Homing
9.3.20.8.1. Redundant Interfaces
9.3.20.8.2. SRRP in Dual Homing
9.3.20.8.3. Synchronization
9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.3.20.9. SRRP and Multi-Chassis Synchronization
9.3.20.10. Dual Homing and ANCP
9.3.21. SRRP Enhancement
9.3.21.1. SRRP Fate Sharing
9.3.21.2. Fate Sharing Algorithm
9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.3.21.3.2. Managed Routes
9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.3.21.3.4. Activating SRRP State Tracking
9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.3.21.5. Group Monitor
9.3.22. Subscriber QoS Overrides
9.3.23. Dual-Stack Lite
9.3.23.1. IP-in-IP
9.3.23.2. Configuring DS-Lite
9.3.23.3. L2TP over IPv6
9.3.24. Call Trace
9.3.25. DNS and NBNS Name Server IP Addresses for Subscriber Sessions
9.3.25.1. DNS and NBNS Name Server Origins
9.3.25.2. Primary, Secondary and Extended Name Servers
9.3.25.3. Assigning DNS and NBNS Name Servers to Subscriber Sessions
9.3.25.3.1. Initial Subscriber Host or Session Creation
9.3.25.3.2. Changing DNS and NBNS Name Servers Mid-Session
9.3.25.3.3. Verifying the DNS and NBNS Name Servers Stored for a Subscriber Session
9.3.25.3.4. Deployment Model Specific Notes
9.3.25.4. Alternative Ways to Specify DNS and NBNS Name Servers
9.3.25.4.1. To Client Options
9.3.25.4.2. DHCP Python
9.3.25.5. Legacy DNS and NBNS Name Server Origins
9.4. L2TP Tunnel RADIUS Accounting
9.4.1. Accounting Packets List
9.4.2. RADIUS Attributes Value Considerations
9.4.3. Other Optional RADIUS Attributes
9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.4.5. MLPPP on the LNS Side
9.5. RADIUS Route Download
9.6. Managed SAP (MSAP)
9.6.1. Capture SAP
9.6.2. MSAP Parameters
9.6.2.1. Explicit MSAP Parameters from Local User Database
9.6.2.2. Explicit MSAP Parameters from RADIUS or DIAMETER Authentication�
9.6.2.3. Implicit MSAP Parameters Specified at the Capture SAP
9.6.3. MSAP Creation
9.6.4. MSAP QoS Configuration
9.6.5. Sticky MSAP
9.7. ESM Identification Process
9.7.1. SAP-ID ESM Identifier
9.7.2. DSLAM-ID
9.8. Default-Subscriber
9.9. Subscriber Mirroring
9.10. Multicast Management
9.11. Volume and Time-Based Accounting
9.11.1. Metering
9.11.1.1. Categories Map and Categories
9.11.1.2. Quota Consumption
9.11.1.3. Minimum Credit Control Quota Values
9.11.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.11.2. Credit Negotiation Mechanisms
9.11.3. Action on Credit Exhaustion
9.11.4. Action on Error-Conditions
9.11.5. Applicability of Volume and Time-Based Accounting
9.12. Subscriber Host Idle Timeout
9.13. Web Portal Authentication
9.13.1. HTTP-Redirect (Captive Portal)
9.13.2. One-time HTTP Redirection Overview
9.13.3. Web Authentication Protocol (WPP)
9.13.3.1. WPP Configurations
9.13.3.2. WPP Triggered Host Creation
9.13.3.2.1. LUDB Support For WPP
9.13.3.3. WPP Multi-Chassis Redundancy Support
9.13.3.4. WPP Portal Group
9.13.4. WPP Support for IPv6
9.14. ESM over MPLS Pseudowires
9.14.1. Encapsulation
9.14.2. ESM and PW Ports
9.14.2.1. ESM on PW Port Bound to a Physical Port
9.14.2.1.1. QoS Support
9.14.2.1.2. BNG Redundancy with ESM over Pseudowire
9.14.2.2. ESM on PXC-Based PW Ports
9.15. Logical Link Identifier (LLID)
9.16. PADI Authentication Policy for Managed SAP (MSAP)
9.17. Open Authentication Model for DHCP and PPPoE Hosts
9.17.1. Terminology
9.17.2. Prioritization of Authentication Sources
9.17.2.1. Authentication Source — Session vs. Host ESM Model
9.17.3. No Authentication
9.17.4. LUDB Only Access
9.17.5. LUDB Access by DHCPv4 Server
9.17.6. RADIUS Only Access
9.17.7. Consecutive Access to LUDB and RADIUS
9.17.8. RADIUS Fallback
9.18. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.18.1. Terminology
9.18.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
9.18.3. Default Gateway in IPv4 Flexible Addressing
9.18.4. IPv4 Subnet Sharing
9.18.5. IPv4 Subnet Mask Auto-Generation
9.18.6. Local-proxy-arp and arp-populate
9.18.7. Gi-address Configuration Consideration
9.18.8. PPPoE Considerations
9.18.9. IPoEv6 Considerations
9.18.10. General Configuration Guidelines for Flexible IP Address Assignment
9.18.11. Caveats
9.19. uRPF for Subscriber Management
9.20. IPoE Sessions
9.20.1. Enabling IPoE Sessions
9.20.2. IPoE Session Authentication
9.20.3. IPoE Session Accounting
9.20.4. IPoE Session Mid-Session Changes
9.20.5. IPoE Session Termination
9.20.6. Limiting the Number of IPoE Sessions
9.20.7. SAP Session Index
9.20.8. Resiliency
9.20.9. Notes
9.20.10. Configuration Steps
9.20.11. IPoE Session Migration
9.20.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.21. Data-triggered Subscriber Management
9.21.1. Provisioning Data-triggered ESM
9.21.2. Authentication and Host Creation
9.21.3. DoS Protection
9.21.4. DHCP Promotion
9.21.5. Data-Triggered SLAAC Hosts
9.21.5.1. Data-Triggered Subscriber Management and LAA
9.21.6. Stateful Multi-Chassis Redundancy (MCS)
9.21.7. Stateless Multi-Chassis Redundancy
9.21.7.1. MSAP Support
9.21.8. IPv6 Prefix Learning
9.22. RADIUS Subscriber Services
9.22.1. Subscriber Service Building Blocks
9.22.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.22.1.2. RADIUS Python Interface
9.22.1.3. Python Script
9.22.1.3.1. Python Script Example
9.22.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.22.2. Subscriber Services RADIUS VSAs
9.22.3. Subscriber Service RADIUS Accounting
9.22.4. Accounting-Only Subscriber Service
9.22.5. QoS Override-Based Subscriber Service
9.22.6. PCC Rule-based Subscriber Services
9.22.6.1. PCC Rule Actions
9.22.6.2. PCC Rule Instantiation
9.22.6.3. PCC Rules in a Subscriber Service
9.22.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.22.6.5. PCC Rule-based Subscriber Service Activation Failures
9.22.7. Combined Subscriber Services
9.22.8. Subscriber Services Python API
9.22.8.1. Common Subscriber Services Python API
9.22.8.2. Subscriber Service QoS Override Python API
9.22.8.3. Subscriber Service PCC Rules Python API
9.22.9. Operational Commands
9.22.9.1. Show Commands
9.22.9.2. Debug Commands
9.22.9.3. Resource Monitoring
9.23. Residential Gateway Replacement
9.24. ESM Troubleshooting Show Command
9.25. Subscriber Accumulated Statistics
9.26. Hybrid Access
9.26.1. BNG-based HAG
9.26.2. PGW-based HAG
9.27. Connection Bonding
9.27.1. Setup
9.27.2. Downstream Load-Balancing
9.27.3. QoS
9.27.4. Multicast
9.28. Ethernet Satellites with Redundant Uplinks
9.28.1. Single Host, Single Satellite
9.28.2. Single Host Node, Dual Satellite
9.28.3. QoS
9.28.4. Preservation of Statistics and Accounting in ESM
9.29. Multi-Chassis Synchronization of RADIUS Usage Counters
9.29.1. Overview
9.29.2. MCS Interval
9.29.3. Usage Counters Synchronized
9.29.4. Incomplete MCS Configuration
9.29.5. Configuration Mismatch
9.29.6. Switchover Scenarios
9.30. Configuring Enhanced Subscriber Management with CLI
9.30.1. Configuring RADIUS Authentication of DHCP Sessions
9.30.2. TCP MSS adjustment for ESM Hosts
9.30.3. Configuring Enhanced Subscriber Management
9.30.3.1. Basic Configurations
9.30.3.2. Subscriber Interface Configuration
9.30.3.3. Configuring Enhanced Subscriber Management Entities
9.30.3.3.1. Configuring a Subscriber Identification Policy
9.30.3.3.2. Configuring a Subscriber Profile
9.30.3.3.3. Configuring an SLA Profile
9.30.3.3.4. Configuring Explicit Mapping Entries
9.30.3.4. Routed CO with Basic Subscriber Management Features
9.30.3.5. Applying the Profiles and Policies
9.30.3.5.1. SLA Profile
9.30.4. Configuring Dual Homing
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. Overview
10.1.1. Terminology and Abbreviations
10.1.2. Restrictions
10.2. Deploying Oversubscribed Multi-Chassis Redundancy
10.2.1. Resource Exhaustion Notification and Simultaneous Failures
10.2.2. Resource Monitoring
10.2.3. Warm-Standby Mode Of Operation
10.2.4. IPoE vs PPPoE
10.2.5. Persistency
10.2.6. Routing and Redundant Interface in OMCR
10.2.7. Revertive Behavior
10.2.8. Service Restoration Times
10.2.9. Processing of the SRRP Flaps
10.2.10. Accounting
10.2.11. Configuration Guidelines
10.2.12. Troubleshooting Commands
11. ESM on High Scale QoS (HSQ) IOM
11.1. Overview
11.1.1. HSQ Traffic Manager Overview
11.1.1.1. Shaping Hierarchy
11.1.1.2. Scheduling
11.1.2. HSQ and ESM SLA Modes
11.1.2.1. ESM Single SLA Mode
11.1.2.2. ESM Expanded SLA Mode
11.1.3. Configuration Steps
11.1.4. Deployment Considerations
12. WIFI Aggregation and Offload
12.1. WIFI Aggregation and Offload Overview
12.2. WLAN-GW Group
12.2.1. IOM-based Resiliency
12.2.2. MDA-based Redundancy
12.3. Layer 2 over Soft-GRE Tunnels
12.3.1. Encapsulation
12.3.2. Data Path
12.4. WiFi SSIDs and VLAN Ranges
12.5. WIFI Mobility Anchor
12.6. WLAN Location Enhancements
12.6.1. Triggered Interim Accounting-Updates
12.6.2. Mobility Triggered Interim Updates with Counters
12.6.3. Operational Support
12.7. Migrant User Support
12.7.1. Migrant User Support with Portal-Authentication
12.7.1.1. DHCP
12.7.1.2. Authentication and Forwarding
12.7.2. Migrant User Support with EAP Authentication
12.7.3. Data Triggered Subscriber Creation
12.8. Distributed Subscriber Management (DSM)
12.8.1. DHCP
12.8.2. Authentication and Accounting
12.8.2.1. DSM Data-Plane
12.8.3. IP Filtering
12.8.3.1. HTTP Redirect
12.8.4. Policing
12.8.5. Lawful Intercept (LI)
12.8.6. Data-Triggered UE Creation
12.8.7. Idle-Timeout and Session-Timeout Management
12.8.8. Operational Commands
12.8.9. Pool Manager
12.8.10. DHCPv6 and SLAAC
12.8.11. Application Assurance Support
12.8.12. Volume Quota Enforcement
12.9. Enhanced Subscriber Management (ESM)
12.9.1. Authentication
12.9.1.1. EAP-Based Authentication
12.9.1.1.1. RADIUS Proxy
12.9.1.2. Portal Authentication
12.9.1.3. AA-based Portal Redirection
12.9.2. Address Assignment
12.9.3. Wholesale
12.9.4. 3G/4G Interworking
12.9.4.1. Signaling Call Flow
12.9.4.2. GTP Setup with EAP Authentication
12.9.4.3. Location Notification in S2a
12.9.4.3.1. WLAN Location over S2a
12.9.4.3.2. Cellular Location over S2a
12.9.4.3.3. Cellular Location over Gn Interface
12.9.4.3.4. Operational Support
12.9.5. CGN on WLAN-GW
12.9.6. Lawful Intercept on WLAN-GW
12.9.7. Tunnel Level Egress QoS
12.9.7.1. QoS Overrides
12.9.7.2. Operational Commands
12.10. Call Trace
12.11. Distributed RADIUS Proxy
12.11.1. Enhanced Subscriber Management
12.11.2. Distributed Subscriber Management
12.11.3. VLAN Awareness
12.11.4. Operational Commands
12.12. WLAN-GW 1:1 Active-Backup Redundancy
12.12.1. DHCP Server Redundancy
12.12.2. Subscriber Creation after Switchover
12.13. WLAN-GW Triggered Stateless Redundancy (N:1)
12.14. AP Triggered Stateless WLAN-GW Redundancy (N:1)
12.15. IPv6-only Access
12.15.1. IPv6 GRE Tunnels
12.15.2. IPv6 Client-Side RADIUS Proxy
12.15.3. Dual-Stack UEs over WLAN-GW
12.15.3.1. SLAAC Prefix Assignment
12.15.3.2. DHCPv6 IA_NA Assignment
12.15.3.3. Migrant User Support
12.15.3.4. Accounting
12.16. Layer 2 Wholesale
12.17. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
12.18. Soft-L2TPv3 Tunnels
12.19. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
12.19.1. Processing on the V-GW
12.19.2. Processing on H-GW
12.19.3. Idle Timeout Handling
12.19.4. Distributed RADIUS Proxy for Closed SSID
12.19.5. H-GW Redundancy
12.20. ISA Operational Commands and Key Performance Indicators
12.20.1. ISA Resources
12.20.2. ISA Load
12.20.3. Query-based UE and Tunnel States
12.20.4. Packet Statistics
13. GTP
13.1. GTP Uplink
13.1.1. Identification Attributes
13.1.2. P-GW/GGSN Selection
13.1.3. Configuration
13.1.4. QoS Support
13.1.5. GTP Session Hold
13.1.6. Selective Breakout
13.1.7. IPoE Support
13.1.8. PPPoE Support
13.2. GTP Access
13.2.1. GTP Termination
13.2.1.1. Multiple APNs
13.2.2. GTP Session Setup
13.2.2.1. Supported IP Stacks
13.2.3. Mobility and Location Tracking
13.2.4. QoS
13.2.5. Multicast
13.3. DHCP over GTP-u
13.3.1. Address Management Related PCOs
13.3.2. Address Allocation Modes
13.4. GTP Peering
14. Virtual Residential Gateway
14.1. Overview
14.1.1. Access Modes
14.1.2. Home Context on the vRGW
14.1.2.1. Implicit Home Authentication
14.1.2.2. Explicit Home Authentication
14.1.2.3. Change of Configuration
14.1.2.4. Home Lifetime
14.1.3. Device Context on the vRGW
14.1.4. Dynamic Configuration Changes
14.1.5. Per-Home Pool Management and L2-Aware NAT
14.1.5.1. Sticky IP Addresses
14.1.5.2. Managed Static IPv4 Addresses
14.1.5.3. DMZ
14.1.6. IPv6
14.1.7. QoS and Filter Support
14.1.8. Data-Triggered Authentication
14.1.9. Per-Host NAT Port Ranges
14.1.10. Inter-Chassis Redundancy
14.1.10.1. Pool State Synchronization
14.1.10.2. Regular Group Interfaces
14.1.10.3. WLAN-GW Group Interfaces
14.1.11. BRG and vRG Caveats
14.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
14.1.13. PPPoE Client
14.1.13.1. PPPoE Client Setup
14.1.13.2. PPPoE Client Failure
14.1.13.3. LCP Keepalive
14.1.13.4. MRU/MTU
14.1.14. SLAAC Prefix Replacement
14.2. Home LAN Extension
14.2.1. Overview
14.2.2. Authentication and Authorization
14.2.3. Data Plane Tables
14.2.4. BGP EVPN VPLS
14.2.5. Assistive Address Resolution
14.2.6. MAC Address Translation
14.2.7. Configuring HLE
14.2.8. Traffic Handling
14.3. AP Agnostic Access for Multiple Dwelling Units
14.3.1. Overview
14.3.2. Bridge Domain and BRG Identification
14.3.3. ARP Handling
14.3.4. Mobility
14.4. Per-Host DNS Override
15. Service Chaining for ESM Hosts with L2-Aware NAT
15.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
15.1.1. Terminology
15.2. VAS Filters on the ISA
15.2.1. Matching
15.2.2. Forwarding
15.2.3. NSH Insertion
15.2.4. Configuration
15.3. EVPN Route Updates and Tracking
15.3.1. NVE Bridging to SF
15.3.2. NVE Routing to SF
15.4. Data Path on the Subscriber Edge
15.4.1. Upstream Traffic (Access to Network)
15.4.2. Downstream Traffic — From Network
15.5. Data Path on NVE
16. Dynamic Data Services
16.1. Introduction to Dynamic Data Services
16.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
16.3. Data-Triggered Dynamic Data Services
16.3.1. Data Trigger
16.3.2. Dynamic Services Data Trigger Capture SAP
16.3.3. RADIUS Authentication
16.3.4. Local Authentication
16.3.5. Data-Triggered Dynamic Service Provisioning
16.3.6. Control Plane Protection
16.3.7. Debugging
16.4. Dynamic Data Services Python API
17. Diameter and Diameter Applications
17.1. Restrictions
17.2. Terminology
17.3. Diameter Base
17.3.1. Diameter Base Protocol
17.3.2. Diameter Peers and the Role of a Diameter Node in SR OS
17.3.3. Capability Exchange
17.3.4. Connection Termination
17.3.5. Diameter Hosts and Realms
17.3.5.1. Forwarding and Routing of Application Messages in Diameter
17.3.5.2. Static Diameter Realm Routes
17.3.5.2.1. Example with Static Realm Routes
17.3.5.2.2. Default Peer
17.3.5.3. Configuration of Host Names and Realms in SR OS
17.3.5.3.1. New Base Configuration
17.3.5.3.2. Legacy Configuration
17.3.6. Dynamically Learned Parameters
17.3.7. Diameter Routing Loop Avoidance
17.3.8. Retransmissions and Message Timers
17.3.8.1. Clearing the Destination-Host AVP in the Retransmitted Messages
17.3.8.2. Retransmission Bit (T-Bit)
17.3.9. Handling of Diameter_Unable_To_Deliver (3002) Error Message
17.3.10. Response to Diameter_Too_Busy (3004) Error Message
17.3.11. An SR as a Transit Diameter Node
17.3.12. An SR as a Transit Diameter Node
17.3.13. Python Support
17.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
17.4.1. Diameter Gy Out Of Credit Actions
17.4.1.1. Graceful Service Termination
17.4.2. Extended Failure Handling (EFH)
17.4.2.1. Extended Failure Handling Example Call Flow
17.4.2.2. Extended Failure Handling Triggers
17.4.2.3. Assigning Interim Credit
17.4.2.4. Enabling Extended Failure Handling
17.4.2.5. Configuration Example 1 - Single Volume Interim Credit Value
17.4.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
17.4.2.7. Monitoring the Extended Failure Handling State
17.4.2.8. Additional Call Flow Examples
17.4.2.8.1. User Disconnects While EFH is Active
17.4.2.8.2. The Maximum Number of Attempts is Reached
17.4.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
17.4.3. Gy CCR-T Replay
17.5. Policy Management via Gx Interface
17.5.1. Gx Protocol
17.5.2. Policy Assignment Models
17.5.3. IP-CAN Session – Gx Session Identification
17.5.3.1. User Identification in PCRF
17.5.3.2. NAS-Port-Id as Subscription-Id
17.5.4. Gx Interface and ESM Subscriber Instantiation
17.5.4.1. Gx and Dual-Stack Hosts
17.5.4.2. Gx and PPPoEv6-DHCP
17.5.5. Gx Fallback Function
17.5.6. Gx CCR-I Replays
17.5.7. Gx CCR-T Replays
17.5.7.1. RAR and CCR-T Replay
17.5.7.2. CCR-T Replay And Multi-Chassis Redundancy
17.5.7.3. CCR-T Replay And High Availability
17.5.8. Automatic Updates for IP Address Allocation/De-allocation
17.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
17.5.10. Gx, ESM and AA
17.5.10.1. ESM Subscriber-Host vs AA Subscriber
17.5.10.2. AA Subscriber State
17.5.11. Policy Management via Gx
17.5.12. Gx-Based Overrides
17.5.12.1. Instantiation of Gx Overrides
17.5.12.2. HTTP Redirect Override
17.5.12.3. Removal of Overrides
17.5.12.4. Examples of Gx Overrides
17.5.13. PCC Rules
17.5.13.1. PCC Rule Concept
17.5.13.2. PCC Rule Instantiation
17.5.13.3. Base QoS-Policy and Base Filter
17.5.13.4. Generic Policy Sharing and Rule Sharing
17.5.13.5. PCC Rule Name and PCC Rule Removal
17.5.13.6. Gx Rule Ordering
17.5.13.7. PCC Rule Override
17.5.13.8. Aggregation of IP-Criterion
17.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
17.5.13.10. Gx Rules with Multiple Actions and Action Sharing
17.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
17.5.13.12. RADIUS and Gx Interaction
17.5.13.13. Bulk Changes via CLI while Gx Rules are Active
17.5.13.14. PCC Rule Direction
17.5.13.15. Action
17.5.13.16. Rate-Limiting Action (Ingress, Egress)
17.5.13.16.1. Dynamic Policers and Queue Mappings
17.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
17.5.13.17. Forwarding-Class Change (Ingress, Egress)
17.5.13.18. QoS Forward (Ingress and Egress)
17.5.13.19. Next Hop Redirect (Ingress)
17.5.13.20. HTTP Redirect (Ingress)
17.5.13.21. Filter Forward/Drop (Ingress and Egress)
17.5.13.22. Service Gating Function
17.5.13.23. PCC Rule Provisioning Example
17.5.13.24. Operational Aspects
17.5.13.25. PCC Rules and Capacity Planning
17.5.13.26. PCC Rule Scaling Example
17.5.14. NAS Filter Inserts
17.5.14.1. Examples of NAS Entry Inserts
17.5.15. Error Handing and Rule Failure Reporting in ESM
17.5.15.1. AVP Decoding Failure in Gx
17.5.15.2. ESM Rule-Installation Failure
17.5.15.3. Failure Reporting in AA
17.5.15.4. Summary of Failure Reporting
17.5.16. Usage-Monitoring and Reporting
17.5.16.1. ESM Usage-Monitoring - What is Being Monitored
17.5.16.2. AA Usage-Monitoring – What is Being Monitored
17.5.16.3. Requesting Usage-Monitoring in ESM
17.5.16.4. Reporting Accumulated Usage
17.5.16.5. Disabling Usage-Monitoring
17.5.16.6. Usage-Monitoring for PCC Rules
17.5.16.7. Session Termination
17.5.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
17.5.16.9. Usage-Monitoring Examples
17.5.17. Event Triggers
17.5.18. Subscriber Verification
17.5.19. Subscriber Termination
17.5.20. Mobility Support in WiFi
17.5.20.1. Redundancy
17.5.21. Persistency and Origin-State-ID AVP
17.5.22. Overload Protection
17.6. Supported-Features AVP in Gx
17.6.1. Extended Bandwidth 5G New Radio Feature
17.6.2. Transmission of Extended Bandwidth AVPs During Gx Session Initiation
17.6.3. Processing the Extended Bandwidth AVPs
17.7. Diameter NASREQ Application
17.7.1. Sample Configuration Steps
17.8. Diameter Redundancy
17.8.1. Diameter Peer and Server Failover
17.8.1.1. Diameter Peer Failover
17.8.1.2. Diameter Sever Failover
17.8.2. Diameter Multi-Chassis Redundancy
17.8.2.1. Single Diameter Identity (DI) per a Pair of Redundant Diameter Nodes
17.8.2.2. Single Peering Connection per Redundant Pair
17.8.2.3. Inter-Peering Connection
17.8.2.4. Inter-Peer as a Default Peer
17.8.2.5. Handling RARs
17.8.2.6. Handling of the Route-Record AVP
17.8.2.7. SRRP Switchover
17.8.2.8. Unsupported Failures
17.8.2.9. Peer Preference in Multi-Chassis Setup
17.8.3. Gx Usage Monitoring in Dual-Homed Systems
17.8.3.1. Synchronization Frequency
17.8.3.2. Switchover Triggered Synchronization
17.8.3.3. What is Being Synchronized
17.8.3.4. Loss of Inter-Chassis Link
17.8.3.5. Master-to-Master SRRP Scenario
17.8.3.6. Usage Counter Collection With No Credit Grants Received
17.8.3.7. ISSU
17.9. Diameter Debugging
18. Python Script Support for ESM
18.1. Python Script Support for ESM
18.2. Python in SR OS Overview
18.2.1. Python Policy – GTPv1-C API
18.2.2. Python Policy – GTPv2-C API
18.2.3. Python Changes
18.3. Python Support in sub-ident-policy
18.3.1. Configuration
18.3.2. Operator Debugging
18.3.3. Python Scripts
18.3.4. Sample Python Scripts
18.3.4.1. Example
18.3.4.2. Example
18.3.4.3. Example
18.3.5. Limitations
18.4. RADIUS Script Policy Overview
18.4.1. Python RADIUS API
18.4.2. Sample Script
18.5. Python Policy Overview
18.5.1. Python Policy – RADIUS API
18.5.2. Python Policy – DHCPv4 API
18.5.3. Python Policy – DHCPv6 API
18.5.4. Python Policy – Diameter API
18.5.5. Python Policy – DHCP Transaction Cache API
18.5.6. Python for PPPoE API
18.5.7. Python API for PPP Packet
18.5.8. Python API for PPP PAP
18.5.9. Python API for PPP CHAP
18.5.10. Python ESM API
18.5.11. Python Cache Support
18.5.12. Applying a Python Policy
18.5.13. Python Script Protection
18.6. Tips and Tricks
19. Statistics Collection Per Outer VLAN Tag
19.1. Statistics Retention
19.1.1. MIBs
19.1.2. Enabling VLAN Statistics Collection
20. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2. Introduction to Triple Play
2.1. Nokia’s Triple Play Service Delivery Architecture
2.1.1. Introduction to Triple Play
2.1.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.1.3. Architectural Foundations
2.1.4. Optimizing Triple Play Service Infrastructures
2.1.4.1. Distributed Service Edges
2.1.4.2. Service Differentiation, QoS Enablement
2.1.4.3. Virtual MAC Subnetting for VPLS
2.2. Services
2.2.1. Service Types
2.2.2. Service Policies
2.3. Nokia Service Model
2.3.1. Introduction
2.3.2. Service Entities
2.3.3. Customers
2.3.4. Service Access Points (SAPs)
2.3.4.1. SAP Encapsulation Types and Identifiers
2.3.4.2. Ethernet Encapsulations
2.3.4.3. SAP Considerations
2.3.5. Service Distribution Points (SDPs)
2.3.5.1. SDP Binding
2.3.5.2. Spoke and Mesh SDPs
2.3.5.3. SDP Encapsulation Types
2.3.5.3.1. GRE
2.3.5.3.2. MPLS
2.3.5.4. SDP Keepalives
2.4. Epipe Service Overview
2.5. VPLS Service Overview
2.5.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.5.1.1. Residential Split Horizon Groups
2.6. IES Service Overview
2.6.1. IP Interface
2.7. VPRN Service Overview
2.8. Deploying and Provisioning Services
2.8.1. Phase 1: Core Network Construction
2.8.2. Phase 2: Service Administration
2.8.3. Phase 3: Service Provisioning
2.9. Configuration Notes
2.9.1. General
2.10. Configuring Triple Play Services with CLI
2.10.1. Configuring VPLS Residential Split Horizon Groups
2.10.1.1. Configuring Static Hosts
2.10.1.1.1. BNG Learning IP-Only Static Host’s MAC Address
2.10.1.1.2. Static Host Learning the IPv6 Default Gateway Address
2.10.1.1.3. Configuring Static Hosts on an VPLS SAP
2.10.1.1.4. Configuring Static Hosts on an IES SAP
2.10.1.1.5. Configuring Static Hosts on a VPRN SAP
3. DHCP Management
3.1. DHCP Principles
3.2. DHCP Features
3.2.1. DHCP Relay
3.2.2. DHCPv4 Relay Proxy
3.2.3. DHCP Lease Split
3.2.3.1. DHCPv4
3.2.3.2. DHCPv6
3.2.4. Subscriber Identification Using Option 82 Field
3.2.4.1. Trusted and Untrusted
3.2.5. DHCP Snooping
3.2.6. DHCP Lease State Table
3.2.7. DHCP and Layer 3 Aggregation
3.2.7.1. DHCPv4 Snooping
3.2.7.2. DHCPv6 Snooping
3.2.8. Local DHCP Servers
3.2.8.1. Overview
3.2.8.2. Local DHCP Server Support
3.2.9. DHCPv6
3.2.9.1. DHCPv6 Relay Agent
3.2.9.2. DHCPv6 Prefix Options
3.2.9.3. Neighbor Resolution With DHCPv6 Relay
3.2.9.4. DHCPv6 Lease Persistency
3.2.9.5. Local Proxy Neighbor Discovery
3.2.9.6. IPv6oE Hosts Behind Bridged CPEs
3.2.9.7. IPv6 Link-Address Based Pool Selection
3.2.9.8. IPv6 Address and Prefix Stickiness
3.2.9.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.2.9.10. Host Connectivity Checks for IPv6
3.2.10. Lease Query
3.2.11. DHCPv6 to Server Option
3.2.12. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.2.13. DHCP Caching
3.2.14. Flexible Creation of DHCPv4/6 Host Parameters
3.2.15. Python DTC Variables and API
3.2.15.1. DTC Debugging Facility
3.2.16. Virtual Subnet for DHCPv4 Hosts
3.2.17. Address Reservation for Sticky Leases
3.2.18. DHCP Message Processing Overload Protection
3.2.19. DHCPv4 Offer and DHCPv6 Advertise Selection Parameters for DHCP Relay
3.2.19.1. DHCPv4 Offer Selection Parameters on a Subscriber Group-interface DHCP Relay
3.2.19.2. DHCPv6 Advertise Selection Parameters on a Subscriber Group-interface DHCP6 Relay
3.2.20. DHCP Release Messages
3.3. Proxy DHCP Server
3.3.1. Local DHCP Servers
3.3.1.1. Terminology
3.3.1.2. Overview
3.3.1.3. DHCP Lease Synchronization
3.3.1.4. Intercommunication Link Failure Detection
3.3.1.5. DHCP Server Failover States
3.3.1.6. Lease Time Synchronization
3.3.1.7. Maximum Client Lead Time (MCLT)
3.3.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.3.1.9. Fast-Switchover of IP Address and Prefix Delegation
3.3.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.4. Local Address Assignment
3.4.1. Stateless Address Auto-Configuration
3.5. Configuring DHCP with CLI
3.5.1. Enabling DHCP Snooping
3.5.2. Configuring Local User Database Parameters
3.5.3. Configuring Option 82 Handling
3.5.4. Enabling DHCP Relay
4. Stateless Address Auto-configuration (SLAAC)
4.1. SLAAC Management Principles
4.2. Configuration Overview
4.3. Router-Solicit Trigger
4.4. SLAAC Address Assignment
4.5. Static SLAAC Prefix Assignment
4.6. Dynamic SLAAC Prefix Assignment
4.7. SLAAC Prefix Replacement
5. Point-to-Point Protocol over Ethernet Management
5.1. PPPoE
5.1.1. PPPoE Authentication and Authorization
5.1.1.1. General Flow
5.1.1.2. RADIUS
5.1.1.3. Local User Database Directly Assigned to PPPoE Node
5.1.1.4. Subscriber per PPPoE Session Index
5.1.1.5. Local DHCP Server with Local User Database
5.1.2. PPPoE Session ID Allocation
5.1.3. Multiple Sessions Per MAC Address
5.1.4. Session Limit Per Circuit ID
5.1.5. PPP Session Re-establishment
5.1.6. Private Retail Subnets
5.1.7. IPCP Subnet Negotiation
5.1.7.1. Numbered WAN Support for Layer 3 RGs
5.1.8. IES as Retail Service for PPPoE Host
5.1.9. Unnumbered PPPoE
5.1.10. Selective Backhaul of PPPoE Traffic using an Epipe Service
5.2. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.2.1. Terminology
5.2.2. LNS MLPPPoX
5.2.3. MLPPP Encapsulation
5.2.4. MLPPPoX Negotiation
5.2.5. Enabling MLPPPoX
5.2.6. Link Fragmentation and Interleaving (LFI)
5.2.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.2.7. LFI Functionality Implemented in LNS
5.2.7.1. Last Mile QoS Awareness in the LNS
5.2.7.2. BB-ISA Processing
5.2.7.3. LNS-LAC Link
5.2.7.4. AN-RG Link
5.2.7.5. Home Link
5.2.7.6. Optimum Fragment Size Calculation by LNS
5.2.7.6.1. Encapsulation Based Fragment Size
5.2.7.6.2. Fragment Size Based on the Max Transmission Delay
5.2.7.6.3. Selection of the Optimum Fragment Length
5.2.8. Upstream Traffic Considerations
5.2.9. Multiple Links MLPPPoX With No Interleaving
5.2.10. MLPPPoX Session Support
5.2.11. Session Load Balancing Across Multiple BB-ISAs
5.2.12. BB-ISA Hashing Considerations
5.2.13. Last Mile Rate and Encapsulation Parameters
5.2.14. Link Failure Detection
5.2.15. CoA Support
5.2.16. Accounting
5.2.17. Filters and Mirroring
5.2.18. PTA Considerations
5.2.19. QoS Considerations
5.2.19.1. Dual-Pass
5.2.19.2. Traffic Prioritization in LFI
5.2.19.3. Shaping Based on the Last Mile Wire Rates
5.2.19.4. Downstream Bandwidth Management on Egress Port
5.2.20. Sub/Sla-Profile Considerations
5.2.21. Example of MLPPPoX Session Setup Flow
5.2.22. Other Considerations
5.3. Configuration Notes
6. Layer 2 Tunneling Protocol (L2TP)
6.1. Terminology
6.2. L2TP Overview
6.2.1. LAC DF Bit
6.2.2. Handling L2TP Tunnel/Session Initialization Failures
6.2.2.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.2.2. Peer Denylist
6.2.2.3. Tunnel Denylists
6.2.2.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.2.4. Tunnel Selection Mechanism
6.2.2.5. Tunnel Probing
6.2.2.6. Controlling the Size of Denylist
6.2.2.7. Displaying the Content of a Denylist
6.2.2.8. Generating Trap when the Denylist is Full
6.2.2.9. Premature Removal of Denylisted Entries
6.2.2.10. Manual Purging of Entities within the Denylist
6.2.3. CDN Result Code Overwrite
6.2.4. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. Traffic Steering on L2TP LAC
6.4.1. Steering Activation and Deactivation
6.4.2. Steering States
6.4.3. Configuring Traffic Steering on L2TP LAC
6.5. L2TP Tunnel RADIUS Accounting
6.5.1. Accounting Packets List
6.5.2. RADIUS Attributes Value Considerations
6.6. MLPPP on the LNS Side
6.7. LNS Reassembly
6.8. LNS Subscriber Policers
6.8.1. Policer Support
7. Triple Play Security
7.1. Triple Play Security Features
7.1.1. Anti-Spoofing Filters
7.1.1.1. Anti-spoofing Filter Types
7.1.1.2. Filtering Packets
7.1.2. Layer 2 Triple Play Security Features
7.1.2.1. MAC Pinning
7.1.2.2. MAC Protection
7.1.2.3. DoS Protection
7.1.2.3.1. Subscriber Aggregation Network
7.1.2.3.2. Network Control Filtering
7.1.2.4. VPLS Redirect Policy
7.1.3. ARP Handling
7.1.3.1. ARP Reply Agent
7.1.3.2. Dynamic ARP Table Population
7.1.3.3. Local Proxy ARP
7.1.4. Web Portal Redirect
7.2. Configuring Triple Play Security with CLI
7.2.1. Common Configuration Tasks
7.2.1.1. Configuring Anti-Spoofing Filters
7.2.1.2. Configuring Triple Play Security Features
7.2.1.2.1. Configuring MAC Pinning
7.2.1.2.2. Configuring MAC Protection
7.2.1.2.3. Configuring VPLS Redirect Policy
7.2.1.3. Configuring ARP Handling
7.2.1.3.1. Configuring Proxy ARP
7.2.1.3.2. Configuring Local Proxy ARP
7.2.1.3.3. Configuring ARP Reply Agent in a VPLS Service
7.2.1.3.4. Configuring Remote Proxy ARP
7.2.1.3.5. Configuring Automatic ARP Table Population in an IES or VPRN Interface
7.2.1.3.6. Configuring CPU Protection
7.2.1.4. Configuring Web Portal Redirect
8. Triple Play Multicast
8.1. Introduction to Multicast
8.2. Multicast in the Broadband Service Router
8.2.1. Internet Group Management Protocol
8.2.1.1. IGMP Versions and Interoperability Requirements
8.2.1.2. IGMP Version Transition
8.2.2. Multicast Listener Discovery
8.2.2.1. MLD Versions and Interoperability Requirements
8.2.2.2. Source Specific Multicast Groups
8.2.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.2.4. Ingress Multicast Path Management (IMPM) Enhancements
8.3. Multicast in the BSA
8.3.1. IGMP Snooping
8.3.1.1. IGMP/MLD Message Processing
8.3.1.2. IGMP Message Processing
8.3.1.3. MLD Message Processing
8.3.1.4. IGMP/MLD Filtering
8.3.2. Multicast VPLS Registration (MVR)
8.3.3. Layer 3 Multicast Load Balancing
8.3.4. IGMP State Reporter
8.3.4.1. IGMP Data Records
8.3.4.2. Transport Mechanism
8.3.4.3. HA Compliance
8.3.4.4. QoS Awareness
8.3.4.5. IGMP Reporting Caveats
8.4. Multicast Support over Subscriber Interfaces in Routed CO Model
8.4.1. Multicast Over IPoE
8.4.1.1. Per SAP Replication Mode
8.4.1.1.1. Per SAP Queue
8.4.1.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.4.1.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.4.1.2. Per Subscriber Host Replication Mode
8.4.1.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.4.1.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.4.1.3. Per-SLA Profile Instance Replication Mode
8.4.2. Multicast Over PPPoE
8.4.3. IGMP Flooding Containment
8.4.4. IGMP/MLD Timers
8.4.5. IGMP/MLD Query Intervals
8.4.6. HQoS Adjustment
8.4.6.1. Host Tracking (HT) Considerations
8.4.6.2. HQoS Adjust Per Vport
8.4.6.2.1. Multi-Chassis Redundancy
8.4.6.2.2. Scalability Considerations
8.4.7. Redirection
8.4.8. Hierarchical Multicast CAC (H-MCAC)
8.4.8.1. MCAC Bundle Bandwidth Limit Considerations
8.4.9. Determining MCAC Policy in Effect
8.4.10. Multicast Filtering
8.4.11. Joining the Multicast Tree
8.4.12. Wholesale/Retail Requirements
8.4.13. QoS Considerations
8.4.14. Redundancy Considerations
8.4.14.1. Redirection Considerations
8.4.15. Query Intervals for Multicast
8.4.15.1. ESM Host-based Queries
8.4.15.2. Group Interface-based Queries
8.4.16. ESM Multicast Replication Modes
8.5. ESM Multicast on BNG CUPS UPF
8.6. Configuring Triple Play Multicast Services with CLI
8.6.1. Configuring IGMP Snooping in the BSA
8.6.1.1. Enabling IGMP Snooping in a VPLS Service
8.6.1.2. IGMPv3 Multicast Routers
8.6.1.3. With IGMPv1/2 Multicast Routers
8.6.1.4. Modifying IGMP Snooping Parameters
8.6.1.5. Modifying IGMP Snooping Parameters for a SAP or SDP
8.6.2. Configuring Static Multicast Groups on a SAP or SDP
8.6.2.1. Enabling IGMP Group Membership Report Filtering
8.6.2.1.1. Enabling IGMP Traffic Filtering
8.6.3. Configuring Multicast VPLS Registration (MVR)
8.6.4. Configuring IGMP, MLD, and PIM in the BSR
8.6.4.1. Enabling IGMP
8.6.4.2. Configuring IGMP Interface Parameters
8.6.4.3. Configuring Static Parameters
8.6.4.4. Configuring SSM Translation
8.6.4.5. Enabling MLD
8.6.4.6. Configuring MLD Interface Parameters
8.6.4.7. Configuring Static Parameters
8.6.4.8. Configuring SSM Translation
8.6.4.9. Configuring PIM
8.6.4.9.1. Enabling PIM
8.6.4.9.2. Configuring PIM Interface Parameters
8.6.4.9.3. Importing PIM Join/Register Policies
8.6.4.9.4. Configuring PIM Join/Register Policies
8.6.4.10. Configuring Bootstrap Message Import and Export Policies
9. Triple Play Enhanced Subscriber Management
9.1. Uniform RADIUS Server Configuration
9.1.1. RADIUS Server Configuration
9.1.1.1. Uniform RADIUS Server Configuration (Preferred)
9.1.1.2. Legacy RADIUS Server Configuration
9.2. RADIUS Authentication of Subscriber Sessions
9.2.1. RADIUS Authentication Extensions
9.2.1.1. Triple Play Network with RADIUS Authentication
9.2.2. RADIUS Authorization Extensions
9.2.2.1. Calling-Station-ID
9.2.2.2. Subscriber Session Timeout
9.2.2.2.1. Domain Name in Authentication
9.2.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.2.2.4. SHCV Policy
9.2.3. radius-server-policy Retry Attempt Overview
9.2.4. AAA RADIUS Server Operation Status
9.2.5. AAA RADIUS Accounting Server Stickiness
9.2.6. AAA RADIUS Authentication Fallback Action
9.2.7. AAA Test User Account
9.2.8. Troubleshooting the RADIUS Server
9.2.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.2.9.1. Provisioning IP Configuration of the Host
9.2.9.2. RADIUS-Based Authentication in Wholesale Environment
9.2.9.3. Change of Authorization and Disconnect-Request
9.2.9.3.1. Change of Authorization using the Tools Command
9.2.9.4. RADIUS-Based Accounting
9.2.9.5. RADIUS Accounting Terminating Cause
9.2.9.6. Accounting Modes Of Operation
9.2.9.7. Per Session Accounting
9.2.9.8. RADIUS Session Accounting with PD as a Managed Route
9.2.9.9. No Host-Accounting
9.2.9.10. Host-Accounting Enabled
9.2.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.2.9.12. Accounting Interim Update Message Interval
9.2.9.13. CoA Triggered Accounting Interim Update
9.2.9.14. Class Attribute
9.2.9.15. User Name
9.2.9.16. Accounting-On and Accounting Off
9.2.9.17. RADIUS Accounting Message Buffering
9.2.9.18. Multiple Accounting Policies
9.2.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.2.9.20. Sending an Accounting Stop Message upon an IPoE Host Creation Failure
9.3. Enhanced Subscriber Management Overview
9.3.1. Enhanced Subscriber Management Basics
9.3.1.1. Standard and Enhanced Subscriber Management
9.3.1.1.1. Subscriber Management Definitions
9.3.1.1.2. Subscriber Identification Policy
9.3.1.1.3. Subscriber Identification String
9.3.1.1.4. Subscriber Profile
9.3.1.1.5. SLA Profile
9.3.1.1.6. Explicit Subscriber Profile Mapping
9.3.2. ESM for IPv6
9.3.2.1. Models
9.3.2.1.1. PPPoE Host
9.3.2.1.2. PPPoE RG
9.3.2.1.3. IPoE Host/RG
9.3.2.2. Setup
9.3.2.3. 64-bit and 128-bit WAN Mode
9.3.2.3.1. Migration from 64-bit to 128-bit WAN Mode
9.3.2.4. Behavior
9.3.2.4.1. Dual-Stack
9.3.2.4.2. Router Advertisements (RA)
9.3.2.4.3. CoA and Disconnect-Request
9.3.2.5. Delegated-Prefix-Length
9.3.2.5.1. Order of Preference for DPL
9.3.2.5.2. DHCP Server Address Utilization and Delegated Prefix Length
9.3.2.6. DHCPv6 Relay Agent
9.3.2.6.1. Configuring a DHCPv6 Relay Agent
9.3.2.7. DHCPv6 Relay to Third Party DHCPv6 External Server
9.3.2.8. DHCPv6 Local Server
9.3.3. Dynamic Subscriber Host Processing
9.3.3.1. Dynamic Tables
9.3.3.1.1. Active Subscriber Table
9.3.3.1.2. SLA Profile Instance Table
9.3.3.1.3. Subscriber Host Table
9.3.3.1.4. DHCP Lease State Table
9.3.4. Enhanced Subscriber Management Entities
9.3.4.1. Instantiating a New Host
9.3.4.2. Packet Processing for an Existing Host
9.3.5. ESM Host Lockout
9.3.5.1. Functionality
9.3.6. ANCP and GSMP
9.3.6.1. ANCP
9.3.6.1.1. Static ANCP Management
9.3.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.3.6.1.3. ANCP String
9.3.6.1.4. ANCP Persistency Support
9.3.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.3.6.3. DHCP Client Mobility
9.3.6.4. DHCP Lease Control
9.3.7. Using Scripts for Dynamic Recognition of Subscribers
9.3.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.3.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.3.7.3. Determining the Subscriber Profile
9.3.7.4. Determining the SLA Profile
9.3.7.4.1. SLA Profile Instance Sharing
9.3.7.4.2. SLA-Based Egress QoS Marking
9.3.8. Sub-id and Brg-id Names with Lengths Between 32 and 64 Characters
9.3.8.1. Online Change of Sub-id and Brg-id
9.3.8.2. Usage Notes
9.3.9. Auto-Sub ID
9.3.9.1. Sub-id Identifiers
9.3.9.2. Dual-Stack Hosts
9.3.9.3. Mixing Hosts with Auto-Generated IDs and non-Auto-Generated IDs
9.3.9.4. Deployment Considerations
9.3.9.5. Caveats
9.3.10. Limiting Subscribers, Hosts, and Sessions
9.3.10.1. Limiting the Number of IPoE Sessions
9.3.10.2. Limiting the Number of PPPoE Sessions
9.3.10.3. Limiting the Number of Hosts and Sessions per SLA Profile Instance and per Subscriber
9.3.11. Static Subscriber Hosts
9.3.12. QoS for Subscribers and Hosts
9.3.12.1. QoS Parameters in Different Profiles
9.3.12.2. QoS Policy Overrides
9.3.13. ESM Subscriber Hierarchical Traffic Control
9.3.13.1. Subscriber HQoS
9.3.13.2. Subscriber CFHP
9.3.13.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.3.13.3.1. Broadband Network Gateway Application
9.3.13.3.2. Queue Determination and Scheduling
9.3.13.3.3. Weighted Scheduler Group
9.3.13.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.3.13.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.3.13.3.6. Vport Determination and Evaluation
9.3.13.3.7. Applying Aggregate Rate Limit to a Vport
9.3.13.3.8. Applying a Scheduler Policy to a Vport
9.3.13.3.9. Signaling of Last Mile Encapsulation Type
9.3.13.3.10. Configuration Example
9.3.14. Subscriber Volume Statistics
9.3.14.1. IP (Layer 3) Volume Accounting
9.3.14.2. Separate IPv4 and IPv6 Counters
9.3.15. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.3.15.1. Dynamic Updates of Subscriber Filter Policies
9.3.15.1.1. SLA Profile Change
9.3.15.1.2. Override the IP and IPv6 Filter Policies
9.3.15.1.3. Insert Subscriber Host-Specific Filter Entries
9.3.15.1.4. Insert Shared Filter Entries
9.3.15.2. Checking Filter Policy Details
9.3.16. Multi-Chassis Synchronization
9.3.16.1. Overview
9.3.16.1.1. Loss of Synchronization and Reconciliation
9.3.17. Subscriber Routed Redundancy Protocol (SRRP)
9.3.17.1. SRRP Messaging
9.3.17.2. SRRP and Multi-Chassis Synchronization
9.3.17.3. SRRP Instance
9.3.17.3.1. SRRP Instance MCS Key
9.3.17.3.2. Containing Service Type and ID
9.3.17.3.3. Containing Subscriber IP Interface Name
9.3.17.3.4. Subscriber Subnet Information
9.3.17.3.5. Containing Group IP Interface Information
9.3.17.3.6. Remote Redundant IP Interface Mismatch
9.3.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.3.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.3.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.3.17.3.10. Local and Remote Dual SRRP Master State Detected
9.3.17.4. Subscriber Subnet Owned IP Address Connectivity
9.3.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.3.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.3.18. PPPoE MC Redundancy
9.3.18.1. SRRP Considerations for PPPoE
9.3.18.1.1. SRRP Fact-Checks
9.3.18.2. State Synchronization
9.3.18.2.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.3.18.3. Traffic Control and Redundant Interface
9.3.18.3.1. Subnet Assignment and Advertisement - Option ‘A’
9.3.18.3.2. Subnet Assignment and Advertisement - Option B
9.3.18.4. MSAP Considerations
9.3.18.5. Unnumbered Interface Support
9.3.18.6. Compatibility with MC-LAG
9.3.18.7. IPv6 Support
9.3.18.8. Considerations with Local DHCP Server
9.3.18.9. Redundant Interface Considerations
9.3.19. Routed Central Office (CO)
9.3.19.1. Layer 3 Subscriber Interfaces
9.3.19.1.1. DHCP Interactions
9.3.19.1.2. Routed CO for IES Service
9.3.19.1.3. Routed CO for VPRN Service
9.3.19.2. Wholesale Retail Routed CO
9.3.19.2.1. Wholesale Retail Model
9.3.19.2.2. Configuration and Applicability
9.3.19.2.3. Hub-and-Spoke Forwarding
9.3.19.3. Routed Subscriber Hosts
9.3.19.3.1. Static Configured IPv4 Managed Route
9.3.19.3.2. Static Configured IPv6 Managed Route
9.3.19.3.3. Dynamic BGP Peering
9.3.19.3.4. RIP Listener
9.3.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.3.19.4. Subscriber Prefix Leaking
9.3.19.4.1. VPRN Leaking
9.3.19.4.2. GRT Lookup and Routed CO in a VPRN
9.3.20. Dual Homing
9.3.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.3.20.2. Steady-State Operation of Dual-homed Ring
9.3.20.3. Broken-Ring Operation and the Transition to this State
9.3.20.4. Transition from Broken to Closed Ring State
9.3.20.5. Provisioning Aspects and Error Cases
9.3.20.6. Dual Homing to Two BSR Nodes
9.3.20.7. MC Services
9.3.20.8. Routed CO Dual Homing
9.3.20.8.1. Redundant Interfaces
9.3.20.8.2. SRRP in Dual Homing
9.3.20.8.3. Synchronization
9.3.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.3.20.9. SRRP and Multi-Chassis Synchronization
9.3.20.10. Dual Homing and ANCP
9.3.21. SRRP Enhancement
9.3.21.1. SRRP Fate Sharing
9.3.21.2. Fate Sharing Algorithm
9.3.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.3.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.3.21.3.2. Managed Routes
9.3.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.3.21.3.4. Activating SRRP State Tracking
9.3.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.3.21.5. Group Monitor
9.3.22. Subscriber QoS Overrides
9.3.23. Dual-Stack Lite
9.3.23.1. IP-in-IP
9.3.23.2. Configuring DS-Lite
9.3.23.3. L2TP over IPv6
9.3.24. Call Trace
9.3.25. DNS and NBNS Name Server IP Addresses for Subscriber Sessions
9.3.25.1. DNS and NBNS Name Server Origins
9.3.25.2. Primary, Secondary and Extended Name Servers
9.3.25.3. Assigning DNS and NBNS Name Servers to Subscriber Sessions
9.3.25.3.1. Initial Subscriber Host or Session Creation
9.3.25.3.2. Changing DNS and NBNS Name Servers Mid-Session
9.3.25.3.3. Verifying the DNS and NBNS Name Servers Stored for a Subscriber Session
9.3.25.3.4. Deployment Model Specific Notes
9.3.25.4. Alternative Ways to Specify DNS and NBNS Name Servers
9.3.25.4.1. To Client Options
9.3.25.4.2. DHCP Python
9.3.25.5. Legacy DNS and NBNS Name Server Origins
9.4. L2TP Tunnel RADIUS Accounting
9.4.1. Accounting Packets List
9.4.2. RADIUS Attributes Value Considerations
9.4.3. Other Optional RADIUS Attributes
9.4.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.4.5. MLPPP on the LNS Side
9.5. RADIUS Route Download
9.6. Managed SAP (MSAP)
9.6.1. Capture SAP
9.6.2. MSAP Parameters
9.6.2.1. Explicit MSAP Parameters from Local User Database
9.6.2.2. Explicit MSAP Parameters from RADIUS or DIAMETER Authentication�
9.6.2.3. Implicit MSAP Parameters Specified at the Capture SAP
9.6.3. MSAP Creation
9.6.4. MSAP QoS Configuration
9.6.5. Sticky MSAP
9.7. ESM Identification Process
9.7.1. SAP-ID ESM Identifier
9.7.2. DSLAM-ID
9.8. Default-Subscriber
9.9. Subscriber Mirroring
9.10. Multicast Management
9.11. Volume and Time-Based Accounting
9.11.1. Metering
9.11.1.1. Categories Map and Categories
9.11.1.2. Quota Consumption
9.11.1.3. Minimum Credit Control Quota Values
9.11.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.11.2. Credit Negotiation Mechanisms
9.11.3. Action on Credit Exhaustion
9.11.4. Action on Error-Conditions
9.11.5. Applicability of Volume and Time-Based Accounting
9.12. Subscriber Host Idle Timeout
9.13. Web Portal Authentication
9.13.1. HTTP-Redirect (Captive Portal)
9.13.2. One-time HTTP Redirection Overview
9.13.3. Web Authentication Protocol (WPP)
9.13.3.1. WPP Configurations
9.13.3.2. WPP Triggered Host Creation
9.13.3.2.1. LUDB Support For WPP
9.13.3.3. WPP Multi-Chassis Redundancy Support
9.13.3.4. WPP Portal Group
9.13.4. WPP Support for IPv6
9.14. ESM over MPLS Pseudowires
9.14.1. Encapsulation
9.14.2. ESM and PW Ports
9.14.2.1. ESM on PW Port Bound to a Physical Port
9.14.2.1.1. QoS Support
9.14.2.1.2. BNG Redundancy with ESM over Pseudowire
9.14.2.2. ESM on PXC-Based PW Ports
9.15. Logical Link Identifier (LLID)
9.16. PADI Authentication Policy for Managed SAP (MSAP)
9.17. Open Authentication Model for DHCP and PPPoE Hosts
9.17.1. Terminology
9.17.2. Prioritization of Authentication Sources
9.17.2.1. Authentication Source — Session vs. Host ESM Model
9.17.3. No Authentication
9.17.4. LUDB Only Access
9.17.5. LUDB Access by DHCPv4 Server
9.17.6. RADIUS Only Access
9.17.7. Consecutive Access to LUDB and RADIUS
9.17.8. RADIUS Fallback
9.18. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.18.1. Terminology
9.18.2. Flexible Subscriber-Interface Addressing for IPOE/PPPoE v4/v6 Subscribers
9.18.3. Default Gateway in IPv4 Flexible Addressing
9.18.4. IPv4 Subnet Sharing
9.18.5. IPv4 Subnet Mask Auto-Generation
9.18.6. Local-proxy-arp and arp-populate
9.18.7. Gi-address Configuration Consideration
9.18.8. PPPoE Considerations
9.18.9. IPoEv6 Considerations
9.18.10. General Configuration Guidelines for Flexible IP Address Assignment
9.18.11. Caveats
9.19. uRPF for Subscriber Management
9.20. IPoE Sessions
9.20.1. Enabling IPoE Sessions
9.20.2. IPoE Session Authentication
9.20.3. IPoE Session Accounting
9.20.4. IPoE Session Mid-Session Changes
9.20.5. IPoE Session Termination
9.20.6. Limiting the Number of IPoE Sessions
9.20.7. SAP Session Index
9.20.8. Resiliency
9.20.9. Notes
9.20.10. Configuration Steps
9.20.11. IPoE Session Migration
9.20.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.21. Data-triggered Subscriber Management
9.21.1. Provisioning Data-triggered ESM
9.21.2. Authentication and Host Creation
9.21.3. DoS Protection
9.21.4. DHCP Promotion
9.21.5. Data-Triggered SLAAC Hosts
9.21.5.1. Data-Triggered Subscriber Management and LAA
9.21.6. Stateful Multi-Chassis Redundancy (MCS)
9.21.7. Stateless Multi-Chassis Redundancy
9.21.7.1. MSAP Support
9.21.8. IPv6 Prefix Learning
9.22. RADIUS Subscriber Services
9.22.1. Subscriber Service Building Blocks
9.22.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.22.1.2. RADIUS Python Interface
9.22.1.3. Python Script
9.22.1.3.1. Python Script Example
9.22.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.22.2. Subscriber Services RADIUS VSAs
9.22.3. Subscriber Service RADIUS Accounting
9.22.4. Accounting-Only Subscriber Service
9.22.5. QoS Override-Based Subscriber Service
9.22.6. PCC Rule-based Subscriber Services
9.22.6.1. PCC Rule Actions
9.22.6.2. PCC Rule Instantiation
9.22.6.3. PCC Rules in a Subscriber Service
9.22.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.22.6.5. PCC Rule-based Subscriber Service Activation Failures
9.22.7. Combined Subscriber Services
9.22.8. Subscriber Services Python API
9.22.8.1. Common Subscriber Services Python API
9.22.8.2. Subscriber Service QoS Override Python API
9.22.8.3. Subscriber Service PCC Rules Python API
9.22.9. Operational Commands
9.22.9.1. Show Commands
9.22.9.2. Debug Commands
9.22.9.3. Resource Monitoring
9.23. Residential Gateway Replacement
9.24. ESM Troubleshooting Show Command
9.25. Subscriber Accumulated Statistics
9.26. Hybrid Access
9.26.1. BNG-based HAG
9.26.2. PGW-based HAG
9.27. Connection Bonding
9.27.1. Setup
9.27.2. Downstream Load-Balancing
9.27.3. QoS
9.27.4. Multicast
9.28. Ethernet Satellites with Redundant Uplinks
9.28.1. Single Host, Single Satellite
9.28.2. Single Host Node, Dual Satellite
9.28.3. QoS
9.28.4. Preservation of Statistics and Accounting in ESM
9.29. Multi-Chassis Synchronization of RADIUS Usage Counters
9.29.1. Overview
9.29.2. MCS Interval
9.29.3. Usage Counters Synchronized
9.29.4. Incomplete MCS Configuration
9.29.5. Configuration Mismatch
9.29.6. Switchover Scenarios
9.30. Configuring Enhanced Subscriber Management with CLI
9.30.1. Configuring RADIUS Authentication of DHCP Sessions
9.30.2. TCP MSS adjustment for ESM Hosts
9.30.3. Configuring Enhanced Subscriber Management
9.30.3.1. Basic Configurations
9.30.3.2. Subscriber Interface Configuration
9.30.3.3. Configuring Enhanced Subscriber Management Entities
9.30.3.3.1. Configuring a Subscriber Identification Policy
9.30.3.3.2. Configuring a Subscriber Profile
9.30.3.3.3. Configuring an SLA Profile
9.30.3.3.4. Configuring Explicit Mapping Entries
9.30.3.4. Routed CO with Basic Subscriber Management Features
9.30.3.5. Applying the Profiles and Policies
9.30.3.5.1. SLA Profile
9.30.4. Configuring Dual Homing
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. Overview
10.1.1. Terminology and Abbreviations
10.1.2. Restrictions
10.2. Deploying Oversubscribed Multi-Chassis Redundancy
10.2.1. Resource Exhaustion Notification and Simultaneous Failures
10.2.2. Resource Monitoring
10.2.3. Warm-Standby Mode Of Operation
10.2.4. IPoE vs PPPoE
10.2.5. Persistency
10.2.6. Routing and Redundant Interface in OMCR
10.2.7. Revertive Behavior
10.2.8. Service Restoration Times
10.2.9. Processing of the SRRP Flaps
10.2.10. Accounting
10.2.11. Configuration Guidelines
10.2.12. Troubleshooting Commands
11. ESM on High Scale QoS (HSQ) IOM
11.1. Overview
11.1.1. HSQ Traffic Manager Overview
11.1.1.1. Shaping Hierarchy
11.1.1.2. Scheduling
11.1.2. HSQ and ESM SLA Modes
11.1.2.1. ESM Single SLA Mode
11.1.2.2. ESM Expanded SLA Mode
11.1.3. Configuration Steps
11.1.4. Deployment Considerations
12. WIFI Aggregation and Offload
12.1. WIFI Aggregation and Offload Overview
12.2. WLAN-GW Group
12.2.1. IOM-based Resiliency
12.2.2. MDA-based Redundancy
12.3. Layer 2 over Soft-GRE Tunnels
12.3.1. Encapsulation
12.3.2. Data Path
12.4. WiFi SSIDs and VLAN Ranges
12.5. WIFI Mobility Anchor
12.6. WLAN Location Enhancements
12.6.1. Triggered Interim Accounting-Updates
12.6.2. Mobility Triggered Interim Updates with Counters
12.6.3. Operational Support
12.7. Migrant User Support
12.7.1. Migrant User Support with Portal-Authentication
12.7.1.1. DHCP
12.7.1.2. Authentication and Forwarding
12.7.2. Migrant User Support with EAP Authentication
12.7.3. Data Triggered Subscriber Creation
12.8. Distributed Subscriber Management (DSM)
12.8.1. DHCP
12.8.2. Authentication and Accounting
12.8.2.1. DSM Data-Plane
12.8.3. IP Filtering
12.8.3.1. HTTP Redirect
12.8.4. Policing
12.8.5. Lawful Intercept (LI)
12.8.6. Data-Triggered UE Creation
12.8.7. Idle-Timeout and Session-Timeout Management
12.8.8. Operational Commands
12.8.9. Pool Manager
12.8.10. DHCPv6 and SLAAC
12.8.11. Application Assurance Support
12.8.12. Volume Quota Enforcement
12.9. Enhanced Subscriber Management (ESM)
12.9.1. Authentication
12.9.1.1. EAP-Based Authentication
12.9.1.1.1. RADIUS Proxy
12.9.1.2. Portal Authentication
12.9.1.3. AA-based Portal Redirection
12.9.2. Address Assignment
12.9.3. Wholesale
12.9.4. 3G/4G Interworking
12.9.4.1. Signaling Call Flow
12.9.4.2. GTP Setup with EAP Authentication
12.9.4.3. Location Notification in S2a
12.9.4.3.1. WLAN Location over S2a
12.9.4.3.2. Cellular Location over S2a
12.9.4.3.3. Cellular Location over Gn Interface
12.9.4.3.4. Operational Support
12.9.5. CGN on WLAN-GW
12.9.6. Lawful Intercept on WLAN-GW
12.9.7. Tunnel Level Egress QoS
12.9.7.1. QoS Overrides
12.9.7.2. Operational Commands
12.10. Call Trace
12.11. Distributed RADIUS Proxy
12.11.1. Enhanced Subscriber Management
12.11.2. Distributed Subscriber Management
12.11.3. VLAN Awareness
12.11.4. Operational Commands
12.12. WLAN-GW 1:1 Active-Backup Redundancy
12.12.1. DHCP Server Redundancy
12.12.2. Subscriber Creation after Switchover
12.13. WLAN-GW Triggered Stateless Redundancy (N:1)
12.14. AP Triggered Stateless WLAN-GW Redundancy (N:1)
12.15. IPv6-only Access
12.15.1. IPv6 GRE Tunnels
12.15.2. IPv6 Client-Side RADIUS Proxy
12.15.3. Dual-Stack UEs over WLAN-GW
12.15.3.1. SLAAC Prefix Assignment
12.15.3.2. DHCPv6 IA_NA Assignment
12.15.3.3. Migrant User Support
12.15.3.4. Accounting
12.16. Layer 2 Wholesale
12.17. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
12.18. Soft-L2TPv3 Tunnels
12.19. WLAN-GW — Dynamic Tunnel X-Connect for Seamless Inter-WLAN-GW Mobility
12.19.1. Processing on the V-GW
12.19.2. Processing on H-GW
12.19.3. Idle Timeout Handling
12.19.4. Distributed RADIUS Proxy for Closed SSID
12.19.5. H-GW Redundancy
12.20. ISA Operational Commands and Key Performance Indicators
12.20.1. ISA Resources
12.20.2. ISA Load
12.20.3. Query-based UE and Tunnel States
12.20.4. Packet Statistics
13. GTP
13.1. GTP Uplink
13.1.1. Identification Attributes
13.1.2. P-GW/GGSN Selection
13.1.3. Configuration
13.1.4. QoS Support
13.1.5. GTP Session Hold
13.1.6. Selective Breakout
13.1.7. IPoE Support
13.1.8. PPPoE Support
13.2. GTP Access
13.2.1. GTP Termination
13.2.1.1. Multiple APNs
13.2.2. GTP Session Setup
13.2.2.1. Supported IP Stacks
13.2.3. Mobility and Location Tracking
13.2.4. QoS
13.2.5. Multicast
13.3. DHCP over GTP-u
13.3.1. Address Management Related PCOs
13.3.2. Address Allocation Modes
13.4. GTP Peering
14. Virtual Residential Gateway
14.1. Overview
14.1.1. Access Modes
14.1.2. Home Context on the vRGW
14.1.2.1. Implicit Home Authentication
14.1.2.2. Explicit Home Authentication
14.1.2.3. Change of Configuration
14.1.2.4. Home Lifetime
14.1.3. Device Context on the vRGW
14.1.4. Dynamic Configuration Changes
14.1.5. Per-Home Pool Management and L2-Aware NAT
14.1.5.1. Sticky IP Addresses
14.1.5.2. Managed Static IPv4 Addresses
14.1.5.3. DMZ
14.1.6. IPv6
14.1.7. QoS and Filter Support
14.1.8. Data-Triggered Authentication
14.1.9. Per-Host NAT Port Ranges
14.1.10. Inter-Chassis Redundancy
14.1.10.1. Pool State Synchronization
14.1.10.2. Regular Group Interfaces
14.1.10.3. WLAN-GW Group Interfaces
14.1.11. BRG and vRG Caveats
14.1.12. External Allocation of L2-Aware NAT Outside IP Addresses
14.1.13. PPPoE Client
14.1.13.1. PPPoE Client Setup
14.1.13.2. PPPoE Client Failure
14.1.13.3. LCP Keepalive
14.1.13.4. MRU/MTU
14.1.14. SLAAC Prefix Replacement
14.2. Home LAN Extension
14.2.1. Overview
14.2.2. Authentication and Authorization
14.2.3. Data Plane Tables
14.2.4. BGP EVPN VPLS
14.2.5. Assistive Address Resolution
14.2.6. MAC Address Translation
14.2.7. Configuring HLE
14.2.8. Traffic Handling
14.3. AP Agnostic Access for Multiple Dwelling Units
14.3.1. Overview
14.3.2. Bridge Domain and BRG Identification
14.3.3. ARP Handling
14.3.4. Mobility
14.4. Per-Host DNS Override
15. Service Chaining for ESM Hosts with L2-Aware NAT
15.1. Steering to Service Chains for ESM hosts with L2-Aware NAT
15.1.1. Terminology
15.2. VAS Filters on the ISA
15.2.1. Matching
15.2.2. Forwarding
15.2.3. NSH Insertion
15.2.4. Configuration
15.3. EVPN Route Updates and Tracking
15.3.1. NVE Bridging to SF
15.3.2. NVE Routing to SF
15.4. Data Path on the Subscriber Edge
15.4.1. Upstream Traffic (Access to Network)
15.4.2. Downstream Traffic — From Network
15.5. Data Path on NVE
16. Dynamic Data Services
16.1. Introduction to Dynamic Data Services
16.2. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
16.3. Data-Triggered Dynamic Data Services
16.3.1. Data Trigger
16.3.2. Dynamic Services Data Trigger Capture SAP
16.3.3. RADIUS Authentication
16.3.4. Local Authentication
16.3.5. Data-Triggered Dynamic Service Provisioning
16.3.6. Control Plane Protection
16.3.7. Debugging
16.4. Dynamic Data Services Python API
17. Diameter and Diameter Applications
17.1. Restrictions
17.2. Terminology
17.3. Diameter Base
17.3.1. Diameter Base Protocol
17.3.2. Diameter Peers and the Role of a Diameter Node in SR OS
17.3.3. Capability Exchange
17.3.4. Connection Termination
17.3.5. Diameter Hosts and Realms
17.3.5.1. Forwarding and Routing of Application Messages in Diameter
17.3.5.2. Static Diameter Realm Routes
17.3.5.2.1. Example with Static Realm Routes
17.3.5.2.2. Default Peer
17.3.5.3. Configuration of Host Names and Realms in SR OS
17.3.5.3.1. New Base Configuration
17.3.5.3.2. Legacy Configuration
17.3.6. Dynamically Learned Parameters
17.3.7. Diameter Routing Loop Avoidance
17.3.8. Retransmissions and Message Timers
17.3.8.1. Clearing the Destination-Host AVP in the Retransmitted Messages
17.3.8.2. Retransmission Bit (T-Bit)
17.3.9. Handling of Diameter_Unable_To_Deliver (3002) Error Message
17.3.10. Response to Diameter_Too_Busy (3004) Error Message
17.3.11. An SR as a Transit Diameter Node
17.3.12. An SR as a Transit Diameter Node
17.3.13. Python Support
17.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
17.4.1. Diameter Gy Out Of Credit Actions
17.4.1.1. Graceful Service Termination
17.4.2. Extended Failure Handling (EFH)
17.4.2.1. Extended Failure Handling Example Call Flow
17.4.2.2. Extended Failure Handling Triggers
17.4.2.3. Assigning Interim Credit
17.4.2.4. Enabling Extended Failure Handling
17.4.2.5. Configuration Example 1 - Single Volume Interim Credit Value
17.4.2.6. Configuration Example 2 - Interim Credit Values Per Rating Group
17.4.2.7. Monitoring the Extended Failure Handling State
17.4.2.8. Additional Call Flow Examples
17.4.2.8.1. User Disconnects While EFH is Active
17.4.2.8.2. The Maximum Number of Attempts is Reached
17.4.2.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
17.4.3. Gy CCR-T Replay
17.5. Policy Management via Gx Interface
17.5.1. Gx Protocol
17.5.2. Policy Assignment Models
17.5.3. IP-CAN Session – Gx Session Identification
17.5.3.1. User Identification in PCRF
17.5.3.2. NAS-Port-Id as Subscription-Id
17.5.4. Gx Interface and ESM Subscriber Instantiation
17.5.4.1. Gx and Dual-Stack Hosts
17.5.4.2. Gx and PPPoEv6-DHCP
17.5.5. Gx Fallback Function
17.5.6. Gx CCR-I Replays
17.5.7. Gx CCR-T Replays
17.5.7.1. RAR and CCR-T Replay
17.5.7.2. CCR-T Replay And Multi-Chassis Redundancy
17.5.7.3. CCR-T Replay And High Availability
17.5.8. Automatic Updates for IP Address Allocation/De-allocation
17.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
17.5.10. Gx, ESM and AA
17.5.10.1. ESM Subscriber-Host vs AA Subscriber
17.5.10.2. AA Subscriber State
17.5.11. Policy Management via Gx
17.5.12. Gx-Based Overrides
17.5.12.1. Instantiation of Gx Overrides
17.5.12.2. HTTP Redirect Override
17.5.12.3. Removal of Overrides
17.5.12.4. Examples of Gx Overrides
17.5.13. PCC Rules
17.5.13.1. PCC Rule Concept
17.5.13.2. PCC Rule Instantiation
17.5.13.3. Base QoS-Policy and Base Filter
17.5.13.4. Generic Policy Sharing and Rule Sharing
17.5.13.5. PCC Rule Name and PCC Rule Removal
17.5.13.6. Gx Rule Ordering
17.5.13.7. PCC Rule Override
17.5.13.8. Aggregation of IP-Criterion
17.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
17.5.13.10. Gx Rules with Multiple Actions and Action Sharing
17.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
17.5.13.12. RADIUS and Gx Interaction
17.5.13.13. Bulk Changes via CLI while Gx Rules are Active
17.5.13.14. PCC Rule Direction
17.5.13.15. Action
17.5.13.16. Rate-Limiting Action (Ingress, Egress)
17.5.13.16.1. Dynamic Policers and Queue Mappings
17.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
17.5.13.17. Forwarding-Class Change (Ingress, Egress)
17.5.13.18. QoS Forward (Ingress and Egress)
17.5.13.19. Next Hop Redirect (Ingress)
17.5.13.20. HTTP Redirect (Ingress)
17.5.13.21. Filter Forward/Drop (Ingress and Egress)
17.5.13.22. Service Gating Function
17.5.13.23. PCC Rule Provisioning Example
17.5.13.24. Operational Aspects
17.5.13.25. PCC Rules and Capacity Planning
17.5.13.26. PCC Rule Scaling Example
17.5.14. NAS Filter Inserts
17.5.14.1. Examples of NAS Entry Inserts
17.5.15. Error Handing and Rule Failure Reporting in ESM
17.5.15.1. AVP Decoding Failure in Gx
17.5.15.2. ESM Rule-Installation Failure
17.5.15.3. Failure Reporting in AA
17.5.15.4. Summary of Failure Reporting
17.5.16. Usage-Monitoring and Reporting
17.5.16.1. ESM Usage-Monitoring - What is Being Monitored
17.5.16.2. AA Usage-Monitoring – What is Being Monitored
17.5.16.3. Requesting Usage-Monitoring in ESM
17.5.16.4. Reporting Accumulated Usage
17.5.16.5. Disabling Usage-Monitoring
17.5.16.6. Usage-Monitoring for PCC Rules
17.5.16.7. Session Termination
17.5.16.8. Usage Monitoring When Multiple Subscriber Hosts or Sessions Share an SLA Profile Instance
17.5.16.9. Usage-Monitoring Examples
17.5.17. Event Triggers
17.5.18. Subscriber Verification
17.5.19. Subscriber Termination
17.5.20. Mobility Support in WiFi
17.5.20.1. Redundancy
17.5.21. Persistency and Origin-State-ID AVP
17.5.22. Overload Protection
17.6. Supported-Features AVP in Gx
17.6.1. Extended Bandwidth 5G New Radio Feature
17.6.2. Transmission of Extended Bandwidth AVPs During Gx Session Initiation
17.6.3. Processing the Extended Bandwidth AVPs
17.7. Diameter NASREQ Application
17.7.1. Sample Configuration Steps
17.8. Diameter Redundancy
17.8.1. Diameter Peer and Server Failover
17.8.1.1. Diameter Peer Failover
17.8.1.2. Diameter Sever Failover
17.8.2. Diameter Multi-Chassis Redundancy
17.8.2.1. Single Diameter Identity (DI) per a Pair of Redundant Diameter Nodes
17.8.2.2. Single Peering Connection per Redundant Pair
17.8.2.3. Inter-Peering Connection
17.8.2.4. Inter-Peer as a Default Peer
17.8.2.5. Handling RARs
17.8.2.6. Handling of the Route-Record AVP
17.8.2.7. SRRP Switchover
17.8.2.8. Unsupported Failures
17.8.2.9. Peer Preference in Multi-Chassis Setup
17.8.3. Gx Usage Monitoring in Dual-Homed Systems
17.8.3.1. Synchronization Frequency
17.8.3.2. Switchover Triggered Synchronization
17.8.3.3. What is Being Synchronized
17.8.3.4. Loss of Inter-Chassis Link
17.8.3.5. Master-to-Master SRRP Scenario
17.8.3.6. Usage Counter Collection With No Credit Grants Received
17.8.3.7. ISSU
17.9. Diameter Debugging
18. Python Script Support for ESM
18.1. Python Script Support for ESM
18.2. Python in SR OS Overview
18.2.1. Python Policy – GTPv1-C API
18.2.2. Python Policy – GTPv2-C API
18.2.3. Python Changes
18.3. Python Support in sub-ident-policy
18.3.1. Configuration
18.3.2. Operator Debugging
18.3.3. Python Scripts
18.3.4. Sample Python Scripts
18.3.4.1. Example
18.3.4.2. Example
18.3.4.3. Example
18.3.5. Limitations
18.4. RADIUS Script Policy Overview
18.4.1. Python RADIUS API
18.4.2. Sample Script
18.5. Python Policy Overview
18.5.1. Python Policy – RADIUS API
18.5.2. Python Policy – DHCPv4 API
18.5.3. Python Policy – DHCPv6 API
18.5.4. Python Policy – Diameter API
18.5.5. Python Policy – DHCP Transaction Cache API
18.5.6. Python for PPPoE API
18.5.7. Python API for PPP Packet
18.5.8. Python API for PPP PAP
18.5.9. Python API for PPP CHAP
18.5.10. Python ESM API
18.5.11. Python Cache Support
18.5.12. Applying a Python Policy
18.5.13. Python Script Protection
18.6. Tips and Tricks
19. Statistics Collection Per Outer VLAN Tag
19.1. Statistics Retention
19.1.1. MIBs
19.1.2. Enabling VLAN Statistics Collection
20. Standards and Protocol Support
Customer Document and Product Support
Unicast Routing Protocols Guide 21.7.R1
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. RIP Overview
2.1.1. RIP Features
2.1.1.1. RIP Version Types
2.1.1.2. RIPv2 Authentication
2.1.1.3. RIP Packet Format
2.1.1.3.1. RIPv1 Format
2.1.1.3.2. RIPv2 Format
2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
2.2. RIPng
2.2.1. RIPng Protocol
2.3. Common Attributes
2.3.1. Metrics
2.3.2. Timers
2.3.3. Import and Export Policies
2.3.4. Hierarchical Levels
2.4. RIP Configuration Process Overview
2.5. Configuration Notes
2.5.1. General
2.6. Configuring RIP with CLI
2.6.1. RIP and RIPng Configuration Overview
2.6.1.1. Preconfiguration Requirements
2.6.1.2. RIP Hierarchy
2.6.2. Basic RIP Configuration
2.6.3. Common Configuration Tasks
2.6.3.1. Configuring Interfaces
2.6.3.2. Configuring a Route Policy
2.6.3.3. Configuring RIP Parameters
2.6.3.4. Configuring Global-Level Parameters
2.6.3.5. Configuring Group-Level Parameters
2.6.3.6. Configuring Neighbor-Level Parameters
2.7. RIP Configuration Management Tasks
2.7.1. Modifying RIP Parameters
2.7.2. Deleting a Group
2.7.3. Deleting a Neighbor
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.1.3.7. Sham Links
3.1.2. OSPFv3 Authentication
3.1.3. OSPF Graceful Restart Helper
3.1.3.1. BFD Interaction with Graceful Restart
3.1.3.2. OSPFv3 Graceful Restart Helper
3.1.4. Virtual Links
3.1.5. Neighbors and Adjacencies
3.1.5.1. Broadcast and Point-to-Point Networks
3.1.5.2. Non-Broadcast Multi-Access (NBMA) Networks
3.1.6. Link-State Advertisements
3.1.7. Metrics
3.1.8. Authentication
3.1.9. IP Subnets
3.1.10. Preconfiguration Recommendations
3.1.11. Multiple OSPF Instances
3.1.11.1. Route Export Policies for OSPF
3.1.11.2. Preventing Route Redistribution Loops
3.1.12. Multi-Address Support for OSPFv3
3.1.13. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.1.13.1. IP FRR Configuration
3.1.13.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.13.2. ECMP Considerations
3.1.13.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.1.13.4. IP FRR and BGP Next Hop Resolution
3.1.13.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.1.13.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.1.13.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.1. Configuring a Route Next Hop Policy Template
3.2.1.1. Configuring Affinity or Admin Group Constraints
3.2.1.2. Configuring SRLG Group Constraints
3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.2.1.4. Configuring Protection Type and Next Hop Type Preferences
3.2.2. Application of Route Next Hop Policy Template to an Interface
3.2.3. Excluding Prefixes from LFA SPF
3.2.4. Modification to LFA Next Hop Selection Algorithm
3.3. SPF LSA Filtering
3.4. FIB Prioritization
3.5. Extended LSA Support in OSPFv3
3.6. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
3.7. OSPF Configuration Process Overview
3.8. Configuration Notes
3.8.1. General
3.8.1.1. OSPF Defaults
3.9. Configuring OSPF with CLI
3.9.1. OSPF Configuration Guidelines
3.9.2. Basic OSPF Configurations
3.9.2.1. Configuring the Router ID
3.9.3. Configuring OSPF Components
3.9.3.1. Configuring OSPF Parameters
3.9.3.2. Configuring OSPF3 Parameters
3.9.3.3. Configuring an OSPF or OSPF3 Area
3.9.3.4. Configuring a Stub Area
3.9.3.5. Configuring a Not-So-Stubby Area
3.9.3.6. Configuring a Virtual Link
3.9.3.7. Configuring an Interface
3.9.3.8. Configuring Authentication
3.9.3.8.1. Overview
3.9.3.8.2. Configuring Authentication Keys and Algorithms
3.9.3.8.3. Configuring Authentication using Keychains
3.9.3.9. Assigning a Designated Router
3.9.3.10. Configuring Route Summaries
3.9.3.11. Configuring Route Preferences
3.10. OSPF Configuration Management Tasks
3.10.1. Modifying a Router ID
3.10.2. Deleting a Router ID
3.10.3. Modifying OSPF Parameters
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.3.1. IS-IS PDU Configuration
4.1.3.2. IS-IS Operations
4.1.4. IS-IS Route Summarization
4.1.4.1. Partial SPF Calculation
4.1.5. IS-IS MT-Topology Support
4.1.5.1. Native IPv6 Support
4.1.6. IS-IS Administrative Tags
4.1.6.1. Setting Route Tags
4.1.6.2. Using Route Tags
4.1.6.3. Unnumbered Interface Support
4.2. FIB Prioritization
4.3. IS-IS Graceful Restart Helper
4.3.1. BFD Interaction with Graceful Restart
4.4. IS-IS Configuration Process Overview
4.5. Configuration Notes
4.5.1. General
4.6. Configuring IS-IS with CLI
4.6.1. IS-IS Configuration Overview
4.6.1.1. Router Levels
4.6.1.2. Area Address Attributes
4.6.1.3. Interface Level Capacity
4.6.1.4. Route Leaking
4.6.2. Basic IS-IS Configuration
4.6.3. Common Configuration Tasks
4.6.4. Configuring IS-IS Components
4.6.4.1. Enabling IS-IS
4.6.4.2. Modifying Router-Level Parameters
4.6.4.3. Configuring ISO Area Addresses
4.6.4.4. Configuring Global IS-IS Parameters
4.6.4.5. Migration to IS-IS Multi-Topology
4.6.4.6. Configuring Interface Parameters
4.6.4.6.1. Example: Configuring a Level 1 Area
4.6.4.6.2. Example: Modifying a Router’s Level Capability
4.6.4.7. Configuring IS-IS Link Groups
4.7. IS-IS Configuration Management Tasks
4.7.1. Disabling IS-IS
4.7.2. Removing IS-IS
4.7.3. Modifying Global IS-IS Parameters
4.7.4. Modifying IS-IS Interface Parameters
4.7.5. Configuring Authentication using Keychains
4.7.6. Configuring Leaking
4.7.7. Redistributing External IS-IS Routers
4.7.8. Specifying MAC Addresses for All IS-IS Routers
5. BGP
5.1. BGP Overview
5.2. BGP Sessions
5.2.1. BGP Session States
5.2.2. Detecting BGP Session Failures
5.2.2.1. Peer Tracking
5.2.2.2. Bidirectional Forwarding Detection (BFD)
5.2.2.3. Fast External Failover
5.2.3. High Availability BGP Sessions
5.2.3.1. BGP Graceful Restart
5.2.3.2. BGP Long-Lived Graceful Restart
5.2.3.2.1. LLGR Operations
5.2.3.2.2. Receiving Routes with LLGR_STALE Community
5.2.4. BGP Session Security
5.2.4.1. TCP MD5 Authentication
5.2.4.2. TTL Security Mechanism
5.2.5. BGP Address Family Support for Different Session Types
5.2.6. BGP Groups
5.3. BGP Design Concepts
5.3.1. Route Reflection
5.3.2. BGP Confederations
5.4. BGP Messages
5.4.1. Open Message
5.4.1.1. Changing the Autonomous System Number
5.4.1.2. Changing a Confederation Number
5.4.1.3. BGP Advertisement
5.4.2. Update Message
5.4.3. Keepalive Message
5.4.4. Notification Message
5.4.4.1. UPDATE Message Error Handling
5.4.5. Route Refresh Message
5.5. BGP Path Attributes
5.5.1. Origin
5.5.2. AS Path
5.5.2.1. AS Override
5.5.2.2. Using Local AS for ASN Migration
5.5.2.3. 4-Octet Autonomous System Numbers
5.5.3. Next-Hop
5.5.3.1. Unlabeled IPv4 Unicast Routes
5.5.3.2. Unlabeled IPv6 Unicast Routes
5.5.3.3. VPN-IPv4 Routes
5.5.3.4. VPN-IPv6 Routes
5.5.3.5. Label-IPv4 Routes
5.5.3.6. Label-IPv6 Routes
5.5.3.7. Next-Hop Resolution
5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.5.3.8. Next-Hop Tracking
5.5.3.9. Next-Hop Indirection
5.5.3.10. Entropy Label for RFC 3107 BGP Labeled Routes
5.5.4. MED
5.5.4.1. Deterministic MED
5.5.5. Local Preference
5.5.6. Route Aggregation Path Attributes
5.5.7. Community Attributes
5.5.7.1. Standard Communities
5.5.7.2. Extended Communities
5.5.7.3. Large Communities
5.5.8. Route Reflection Attributes
5.5.9. Multi-Protocol BGP Attributes
5.5.10. 4-Octet AS Attributes
5.5.11. AIGP Metric
5.6. BGP Routing Information Base (RIB)
5.6.1. RIB-IN Features
5.6.1.1. BGP Import Policies
5.6.2. LOC-RIB Features
5.6.2.1. BGP Decision Process
5.6.2.2. BGP Route Installation in the Route Table
5.6.2.3. Weighted ECMP for BGP Routes
5.6.2.4. BGP Route Installation in the Tunnel Table
5.6.2.4.1. Label-IPv4 Tunnels
5.6.2.4.2. Label-IPv6 Tunnels
5.6.2.5. BGP Fast Reroute
5.6.2.5.1. Calculating Backup Paths
5.6.2.5.2. Failure Detection and Switchover to the Backup Path
5.6.2.6. QoS Policy Propagation via BGP (QPPB)
5.6.2.7. BGP Policy Accounting and Policing
5.6.2.8. Route Flap Damping (RFD)
5.6.3. RIB-OUT Features
5.6.3.1. BGP Export Policies
5.6.3.2. Outbound Route Filtering (ORF)
5.6.3.3. RT Constrained Route Distribution
5.6.3.4. Min Route Advertisement Interval (MRAI)
5.6.3.5. Advertise-Inactive
5.6.3.6. Best-External
5.6.3.7. Add-Paths
5.6.3.7.1. Path Selection with Add-Paths
5.6.3.8. Split-Horizon
5.7. BGP Monitoring Protocol
5.8. BGP Applications
5.8.1. BGP FlowSpec
5.8.1.1. Validating Received FlowSpec Routes
5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.2. Configuration of TTL Propagation for BGP Label Routes
5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.3. BGP Prefix Origin Validation
5.8.4. BGP Route Leaking
5.8.5. BGP Optimal Route Reflection
5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.8.7. BGP-LS
5.8.7.1. Supported BGP-LS components
5.8.8. BGP-LU Traffic Statistics
5.8.9. BGP Egress Peer Engineering for Segment Routing
5.8.9.1. Configuring BGP EPE
5.9. BFD Support for BGP
5.10. BGP Configuration Process Overview
5.11. Configuration Notes
5.11.1. General
5.11.1.1. BGP Defaults
5.11.1.2. BGP MIB Notes
5.12. Configuring BGP with CLI
5.12.1. Configuration Overview
5.12.1.1. Preconfiguration Requirements
5.12.1.2. BGP Hierarchy
5.12.1.3. Internal and External BGP Configuration
5.12.1.4. Default External BGP Route Propagation Behavior without Policies
5.12.2. Basic BGP Configuration
5.12.3. Common Configuration Tasks
5.12.3.1. Creating an Autonomous System
5.12.3.2. Configuring a Router ID
5.12.3.3. BGP Confederations
5.12.3.4. BGP Router Reflectors
5.12.3.5. BGP Components
5.12.3.5.1. Configuring Group Attributes
5.12.3.5.2. Configuring Neighbor Attributes
5.12.3.5.3. Configuring Route Reflection
5.12.3.5.4. Configuring a Confederation
5.12.3.5.5. Configuring BMP
5.13. BGP Configuration Management Tasks
5.13.1. Modifying an AS Number
5.13.2. Modifying a Confederation Number
5.13.3. Modifying the BGP Router ID
5.13.4. Modifying the Router-Level Router ID
5.13.5. Deleting a Neighbor
5.13.6. Deleting Groups
6. Route Policies
6.1. Configuring Route Policies
6.1.1. Policy Statements
6.1.1.1. Policy Statement Chaining and Logical Expressions
6.1.1.2. Routing Policy Subroutines
6.1.1.3. Policy Evaluation Command
6.1.1.4. Exclusive Editing for Policy Configuration
6.1.1.5. Default Action Behavior
6.1.1.6. Denied IP Unicast Prefixes
6.1.1.7. Controlling Route Flapping
6.1.2. Regular Expressions
6.1.3. BGP and OSPF Route Policy Support
6.1.3.1. BGP Route Policies
6.1.3.2. Re-advertised Route Policies
6.1.3.3. Triggered Policies
6.1.3.4. Set MED to IGP Cost using Route Policies
6.1.3.5. BGP Policy Subroutines
6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.1.4. Routing Policy Parameterization
6.1.5. When to Use Route Policies
6.2. Route Policy Configuration Process Overview
6.3. Configuration Notes
6.3.1. General
6.3.2. Policy Reference Checks
6.3.2.1. Known Limitations
6.4. Configuring Route Policies with CLI
6.4.1. Route Policy Configuration Overview
6.4.1.1. When to Create Routing Policies
6.4.1.2. Default Route Policy Actions
6.4.1.3. Policy Evaluation
6.4.1.4. Damping
6.4.2. Basic Configurations
6.4.3. Configuring Route Policy Components
6.4.3.1. Beginning the Policy Statement
6.4.3.2. Creating a Route Policy
6.4.3.3. Configuring a Default Action
6.4.3.4. Configuring an Entry
6.4.3.5. Configuring a Community List
6.4.3.6. Configuring Damping
6.4.3.7. Configuring a Prefix List
6.5. Route Policy Configuration Management Tasks
6.5.1. Editing Policy Statements and Parameters
6.5.2. Deleting an Entry
6.5.3. Deleting a Policy Statement
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. RIP Overview
2.1.1. RIP Features
2.1.1.1. RIP Version Types
2.1.1.2. RIPv2 Authentication
2.1.1.3. RIP Packet Format
2.1.1.3.1. RIPv1 Format
2.1.1.3.2. RIPv2 Format
2.1.1.4. BFD Monitoring of RIP Neighbor Liveliness
2.2. RIPng
2.2.1. RIPng Protocol
2.3. Common Attributes
2.3.1. Metrics
2.3.2. Timers
2.3.3. Import and Export Policies
2.3.4. Hierarchical Levels
2.4. RIP Configuration Process Overview
2.5. Configuration Notes
2.5.1. General
2.6. Configuring RIP with CLI
2.6.1. RIP and RIPng Configuration Overview
2.6.1.1. Preconfiguration Requirements
2.6.1.2. RIP Hierarchy
2.6.2. Basic RIP Configuration
2.6.3. Common Configuration Tasks
2.6.3.1. Configuring Interfaces
2.6.3.2. Configuring a Route Policy
2.6.3.3. Configuring RIP Parameters
2.6.3.4. Configuring Global-Level Parameters
2.6.3.5. Configuring Group-Level Parameters
2.6.3.6. Configuring Neighbor-Level Parameters
2.7. RIP Configuration Management Tasks
2.7.1. Modifying RIP Parameters
2.7.2. Deleting a Group
2.7.3. Deleting a Neighbor
3. OSPF
3.1. Configuring OSPF
3.1.1. OSPF Areas
3.1.1.1. Backbone Area
3.1.1.2. Stub Area
3.1.1.3. Not-So-Stubby Area
3.1.1.3.1. OSPF Super Backbone
3.1.1.3.2. Sham Links
3.1.1.3.3. Implementing the OSPF Super Backbone
3.1.1.3.4. Loop Avoidance
3.1.1.3.5. DN-BIT
3.1.1.3.6. Route Tag
3.1.1.3.7. Sham Links
3.1.2. OSPFv3 Authentication
3.1.3. OSPF Graceful Restart Helper
3.1.3.1. BFD Interaction with Graceful Restart
3.1.3.2. OSPFv3 Graceful Restart Helper
3.1.4. Virtual Links
3.1.5. Neighbors and Adjacencies
3.1.5.1. Broadcast and Point-to-Point Networks
3.1.5.2. Non-Broadcast Multi-Access (NBMA) Networks
3.1.6. Link-State Advertisements
3.1.7. Metrics
3.1.8. Authentication
3.1.9. IP Subnets
3.1.10. Preconfiguration Recommendations
3.1.11. Multiple OSPF Instances
3.1.11.1. Route Export Policies for OSPF
3.1.11.2. Preventing Route Redistribution Loops
3.1.12. Multi-Address Support for OSPFv3
3.1.13. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.1.13.1. IP FRR Configuration
3.1.13.1.1. Reducing the Scope of the LFA Calculation by SPF
3.1.13.2. ECMP Considerations
3.1.13.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.1.13.4. IP FRR and BGP Next Hop Resolution
3.1.13.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.1.13.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.1.13.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.2. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.2.1. Configuring a Route Next Hop Policy Template
3.2.1.1. Configuring Affinity or Admin Group Constraints
3.2.1.2. Configuring SRLG Group Constraints
3.2.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.2.1.4. Configuring Protection Type and Next Hop Type Preferences
3.2.2. Application of Route Next Hop Policy Template to an Interface
3.2.3. Excluding Prefixes from LFA SPF
3.2.4. Modification to LFA Next Hop Selection Algorithm
3.3. SPF LSA Filtering
3.4. FIB Prioritization
3.5. Extended LSA Support in OSPFv3
3.6. Support of Multiple Instances of Router Information LSA in OSPFv2 and OSPFv3
3.7. OSPF Configuration Process Overview
3.8. Configuration Notes
3.8.1. General
3.8.1.1. OSPF Defaults
3.9. Configuring OSPF with CLI
3.9.1. OSPF Configuration Guidelines
3.9.2. Basic OSPF Configurations
3.9.2.1. Configuring the Router ID
3.9.3. Configuring OSPF Components
3.9.3.1. Configuring OSPF Parameters
3.9.3.2. Configuring OSPF3 Parameters
3.9.3.3. Configuring an OSPF or OSPF3 Area
3.9.3.4. Configuring a Stub Area
3.9.3.5. Configuring a Not-So-Stubby Area
3.9.3.6. Configuring a Virtual Link
3.9.3.7. Configuring an Interface
3.9.3.8. Configuring Authentication
3.9.3.8.1. Overview
3.9.3.8.2. Configuring Authentication Keys and Algorithms
3.9.3.8.3. Configuring Authentication using Keychains
3.9.3.9. Assigning a Designated Router
3.9.3.10. Configuring Route Summaries
3.9.3.11. Configuring Route Preferences
3.10. OSPF Configuration Management Tasks
3.10.1. Modifying a Router ID
3.10.2. Deleting a Router ID
3.10.3. Modifying OSPF Parameters
4. IS-IS
4.1. Configuring IS-IS
4.1.1. Routing
4.1.2. IS-IS Frequently Used Terms
4.1.3. ISO Network Addressing
4.1.3.1. IS-IS PDU Configuration
4.1.3.2. IS-IS Operations
4.1.4. IS-IS Route Summarization
4.1.4.1. Partial SPF Calculation
4.1.5. IS-IS MT-Topology Support
4.1.5.1. Native IPv6 Support
4.1.6. IS-IS Administrative Tags
4.1.6.1. Setting Route Tags
4.1.6.2. Using Route Tags
4.1.6.3. Unnumbered Interface Support
4.2. FIB Prioritization
4.3. IS-IS Graceful Restart Helper
4.3.1. BFD Interaction with Graceful Restart
4.4. IS-IS Configuration Process Overview
4.5. Configuration Notes
4.5.1. General
4.6. Configuring IS-IS with CLI
4.6.1. IS-IS Configuration Overview
4.6.1.1. Router Levels
4.6.1.2. Area Address Attributes
4.6.1.3. Interface Level Capacity
4.6.1.4. Route Leaking
4.6.2. Basic IS-IS Configuration
4.6.3. Common Configuration Tasks
4.6.4. Configuring IS-IS Components
4.6.4.1. Enabling IS-IS
4.6.4.2. Modifying Router-Level Parameters
4.6.4.3. Configuring ISO Area Addresses
4.6.4.4. Configuring Global IS-IS Parameters
4.6.4.5. Migration to IS-IS Multi-Topology
4.6.4.6. Configuring Interface Parameters
4.6.4.6.1. Example: Configuring a Level 1 Area
4.6.4.6.2. Example: Modifying a Router’s Level Capability
4.6.4.7. Configuring IS-IS Link Groups
4.7. IS-IS Configuration Management Tasks
4.7.1. Disabling IS-IS
4.7.2. Removing IS-IS
4.7.3. Modifying Global IS-IS Parameters
4.7.4. Modifying IS-IS Interface Parameters
4.7.5. Configuring Authentication using Keychains
4.7.6. Configuring Leaking
4.7.7. Redistributing External IS-IS Routers
4.7.8. Specifying MAC Addresses for All IS-IS Routers
5. BGP
5.1. BGP Overview
5.2. BGP Sessions
5.2.1. BGP Session States
5.2.2. Detecting BGP Session Failures
5.2.2.1. Peer Tracking
5.2.2.2. Bidirectional Forwarding Detection (BFD)
5.2.2.3. Fast External Failover
5.2.3. High Availability BGP Sessions
5.2.3.1. BGP Graceful Restart
5.2.3.2. BGP Long-Lived Graceful Restart
5.2.3.2.1. LLGR Operations
5.2.3.2.2. Receiving Routes with LLGR_STALE Community
5.2.4. BGP Session Security
5.2.4.1. TCP MD5 Authentication
5.2.4.2. TTL Security Mechanism
5.2.5. BGP Address Family Support for Different Session Types
5.2.6. BGP Groups
5.3. BGP Design Concepts
5.3.1. Route Reflection
5.3.2. BGP Confederations
5.4. BGP Messages
5.4.1. Open Message
5.4.1.1. Changing the Autonomous System Number
5.4.1.2. Changing a Confederation Number
5.4.1.3. BGP Advertisement
5.4.2. Update Message
5.4.3. Keepalive Message
5.4.4. Notification Message
5.4.4.1. UPDATE Message Error Handling
5.4.5. Route Refresh Message
5.5. BGP Path Attributes
5.5.1. Origin
5.5.2. AS Path
5.5.2.1. AS Override
5.5.2.2. Using Local AS for ASN Migration
5.5.2.3. 4-Octet Autonomous System Numbers
5.5.3. Next-Hop
5.5.3.1. Unlabeled IPv4 Unicast Routes
5.5.3.2. Unlabeled IPv6 Unicast Routes
5.5.3.3. VPN-IPv4 Routes
5.5.3.4. VPN-IPv6 Routes
5.5.3.5. Label-IPv4 Routes
5.5.3.6. Label-IPv6 Routes
5.5.3.7. Next-Hop Resolution
5.5.3.7.1. Next-Hop Resolution of BGP Unlabeled IPv4 Unicast Routes to Tunnels
5.5.3.7.2. Next-Hop Resolution of BGP Unlabeled IPv6 Unicast Routes to Tunnels
5.5.3.7.3. Next-Hop Resolution of BGP Labeled Routes to Tunnels
5.5.3.8. Next-Hop Tracking
5.5.3.9. Next-Hop Indirection
5.5.3.10. Entropy Label for RFC 3107 BGP Labeled Routes
5.5.4. MED
5.5.4.1. Deterministic MED
5.5.5. Local Preference
5.5.6. Route Aggregation Path Attributes
5.5.7. Community Attributes
5.5.7.1. Standard Communities
5.5.7.2. Extended Communities
5.5.7.3. Large Communities
5.5.8. Route Reflection Attributes
5.5.9. Multi-Protocol BGP Attributes
5.5.10. 4-Octet AS Attributes
5.5.11. AIGP Metric
5.6. BGP Routing Information Base (RIB)
5.6.1. RIB-IN Features
5.6.1.1. BGP Import Policies
5.6.2. LOC-RIB Features
5.6.2.1. BGP Decision Process
5.6.2.2. BGP Route Installation in the Route Table
5.6.2.3. Weighted ECMP for BGP Routes
5.6.2.4. BGP Route Installation in the Tunnel Table
5.6.2.4.1. Label-IPv4 Tunnels
5.6.2.4.2. Label-IPv6 Tunnels
5.6.2.5. BGP Fast Reroute
5.6.2.5.1. Calculating Backup Paths
5.6.2.5.2. Failure Detection and Switchover to the Backup Path
5.6.2.6. QoS Policy Propagation via BGP (QPPB)
5.6.2.7. BGP Policy Accounting and Policing
5.6.2.8. Route Flap Damping (RFD)
5.6.3. RIB-OUT Features
5.6.3.1. BGP Export Policies
5.6.3.2. Outbound Route Filtering (ORF)
5.6.3.3. RT Constrained Route Distribution
5.6.3.4. Min Route Advertisement Interval (MRAI)
5.6.3.5. Advertise-Inactive
5.6.3.6. Best-External
5.6.3.7. Add-Paths
5.6.3.7.1. Path Selection with Add-Paths
5.6.3.8. Split-Horizon
5.7. BGP Monitoring Protocol
5.8. BGP Applications
5.8.1. BGP FlowSpec
5.8.1.1. Validating Received FlowSpec Routes
5.8.1.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.2. Configuration of TTL Propagation for BGP Label Routes
5.8.2.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.2.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.3. BGP Prefix Origin Validation
5.8.4. BGP Route Leaking
5.8.5. BGP Optimal Route Reflection
5.8.6. LSP Tagging for BGP Next-Hops or Prefixes and BGP-LU
5.8.7. BGP-LS
5.8.7.1. Supported BGP-LS components
5.8.8. BGP-LU Traffic Statistics
5.8.9. BGP Egress Peer Engineering for Segment Routing
5.8.9.1. Configuring BGP EPE
5.9. BFD Support for BGP
5.10. BGP Configuration Process Overview
5.11. Configuration Notes
5.11.1. General
5.11.1.1. BGP Defaults
5.11.1.2. BGP MIB Notes
5.12. Configuring BGP with CLI
5.12.1. Configuration Overview
5.12.1.1. Preconfiguration Requirements
5.12.1.2. BGP Hierarchy
5.12.1.3. Internal and External BGP Configuration
5.12.1.4. Default External BGP Route Propagation Behavior without Policies
5.12.2. Basic BGP Configuration
5.12.3. Common Configuration Tasks
5.12.3.1. Creating an Autonomous System
5.12.3.2. Configuring a Router ID
5.12.3.3. BGP Confederations
5.12.3.4. BGP Router Reflectors
5.12.3.5. BGP Components
5.12.3.5.1. Configuring Group Attributes
5.12.3.5.2. Configuring Neighbor Attributes
5.12.3.5.3. Configuring Route Reflection
5.12.3.5.4. Configuring a Confederation
5.12.3.5.5. Configuring BMP
5.13. BGP Configuration Management Tasks
5.13.1. Modifying an AS Number
5.13.2. Modifying a Confederation Number
5.13.3. Modifying the BGP Router ID
5.13.4. Modifying the Router-Level Router ID
5.13.5. Deleting a Neighbor
5.13.6. Deleting Groups
6. Route Policies
6.1. Configuring Route Policies
6.1.1. Policy Statements
6.1.1.1. Policy Statement Chaining and Logical Expressions
6.1.1.2. Routing Policy Subroutines
6.1.1.3. Policy Evaluation Command
6.1.1.4. Exclusive Editing for Policy Configuration
6.1.1.5. Default Action Behavior
6.1.1.6. Denied IP Unicast Prefixes
6.1.1.7. Controlling Route Flapping
6.1.2. Regular Expressions
6.1.3. BGP and OSPF Route Policy Support
6.1.3.1. BGP Route Policies
6.1.3.2. Re-advertised Route Policies
6.1.3.3. Triggered Policies
6.1.3.4. Set MED to IGP Cost using Route Policies
6.1.3.5. BGP Policy Subroutines
6.1.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.1.4. Routing Policy Parameterization
6.1.5. When to Use Route Policies
6.2. Route Policy Configuration Process Overview
6.3. Configuration Notes
6.3.1. General
6.3.2. Policy Reference Checks
6.3.2.1. Known Limitations
6.4. Configuring Route Policies with CLI
6.4.1. Route Policy Configuration Overview
6.4.1.1. When to Create Routing Policies
6.4.1.2. Default Route Policy Actions
6.4.1.3. Policy Evaluation
6.4.1.4. Damping
6.4.2. Basic Configurations
6.4.3. Configuring Route Policy Components
6.4.3.1. Beginning the Policy Statement
6.4.3.2. Creating a Route Policy
6.4.3.3. Configuring a Default Action
6.4.3.4. Configuring an Entry
6.4.3.5. Configuring a Community List
6.4.3.6. Configuring Damping
6.4.3.7. Configuring a Prefix List
6.5. Route Policy Configuration Management Tasks
6.5.1. Editing Policy Statements and Parameters
6.5.2. Deleting an Entry
6.5.3. Deleting a Policy Statement
7. Standards and Protocol Support
Customer Document and Product Support