This command enables matching on Layer 2 tunnels.
The no form of this command disables matching on Layer 2 access points, unless no other tunnel type specifier is configured.
no l2
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables matching on UEs in a Layer 2 wholesale state.
The no form of this command disables matching on UEs in a Layer 2 wholesale state, unless all state matching is disabled.
no l2
7750 SR, 7750 SR-e, 7750 SR-s, VSR
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure Layer 2 access points in WLAN gateway group interfaces.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command adds a specific SAP where Layer 2 WLAN gateway aggregation is performed. The following SAPs are supported:
This command can be repeated multiple times to create multiple Layer 2 access points.
The no form of this command removes the Layer 2 access point. This is only allowed if the Layer 2 access point SAP is shutdown.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the contents of the auto-generated subscriber ID when the ipoe-sub-id-key command is set to include sap-id and the def-sub-id command is configured with use-auto-id. The VLANs must be configured so that the subscriber ID length is not exceeded.
This command can include either the SAP or the SAP + AP delimiting tags.
The no form of this command reverts to the default configuration.
l2-ap-auto-sub-id-fmt include-ap-tags
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This parameter specifies the number of AP identifying VLAN tags for an AP. This is the default value that can be overridden per SAP. This value must be at least equal to the number of VLANs configured in the SAP or enabling a SAP will fail.
A SAP VLAN is explicitly configured, for example l2-ap 1/1/1:25. Other VLANs on the same port can still be used in other contexts.
The number of VLAN tags Epiped to the WLAN gateway IOM equals the l2-ap-encap-type minus the encaps of the SAP. Upon receipt of a packet, these VLANs are stored as a Layer 2 tunnel identifier, and are only used in context of WLAN gateway.
The no form of this command sets the default value.
l2-ap-encap-type null
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure parameters specific to Layer2-Aware NAT.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure Layer2-Aware NAT.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the Layer2-Aware NAT inside IP address to be assigned via DHCP on the WLAN-GW ISA.
If the from-pool parameter is specified instead of an IPv4 address, a unique address is allocated to each UE. The pool used is managed by the dhcpv4-nat pool manager, configured under the same subscriber interface. This option is only available when auth-on-dhcp is also configured.
The no form of this command reverts to the default.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables bypassing NAT for packets pertaining to L2-Aware hosts and matching this entry. This action is only applicable to L2-Aware NAT subscribers and it must be configured together with action forward. Traffic identified in the match condition bypasses L2-Aware NAT. A common use case is to bypass NAT for on-net destinations (within the customer network).
Traffic that is not classified for bypass is automatically diverted to L2-Aware NAT, unless it is explicitly configured in the IP filter to be dropped.
For selective NAT bypass to take effect, in addition to the IP filter configuration, the L2-Aware NAT subscriber must be specifically enabled for selective bypass via the nat-allow-bypass configuration option in the NAT CLI node in the SLA profile.
The no form of this command automatically diverts traffic to L2-Aware NAT, unless it is explicitly configured in the IP filter to be dropped.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a Layer-2-Aware subscriber source.
The no form of this command removes the values from the configuration.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables matching on a Layer 2 access point with a specified C-VLAN.
The no form of this command disables matching on a C-VLAN.
no l2-inner-vlan
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command filters Layer 2 IP flow data from being sent to the associated collector.
The no form of this command removes the filter, allowing Layer 2 IP flow data to be sent to the associated collector.
no l2-ip
All
This command enables matching on a Layer 2 access point with a specified S-VLAN.
The no form of this command disables matching on an S-VLAN.
no l2-outer-vlan
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a NAT policy to be used with a Layer 2 outside service instead of a Layer 3 outside service. This command and the pool command are mutually exclusive.
no l2-outside
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables matching on Layer 2 access points active on the specified SAP.
The no form of this command disables matching on the SAP.
no l2-sap
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies the VPLS service used for L2 wholesale. When such a service is configured no other configuration is allowed under the vlan-range.
The no form of this command removes the L2 wholesale service, this is only allowed if the l2-service node is shut down.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables Layer 2 Protocol Tunneling (L2PT) termination on a specified SAP or spoke-SDP. L2PT termination is supported only for STP BPDUs. PDUs of other protocols are discarded.
This feature can be enabled only if STP is disabled in the context of the specified VPLS service.
The no form of this command reverts to the default.
no l2pt-termination
All
This command enables Layer 2 Protocol Tunneling (L2PT) termination on a given SAP or spoke SDP. L2PT termination will be supported only for STP BPDUs. PDUs of other protocols will be discarded.
This feature can be enabled only if STP is disabled in the context of the given VPLS service.
no l2pt-termination
All
Commands in this context configure L2TP parameters for the host.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure L2TP parameters. L2TP extends the PPP model by allowing Layer 2 and PPP endpoints to reside on different devices interconnected by a packet-switched network.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command sets debugging for L2TP packets.
The no form of this command removes the settings of debugging for L2TP packet.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables L2TP.
The no form of this command disables L2TP.
All
This command enables PPP L2TP event debug.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables matching on L2TP tunnels.
The no form of this command disables matching on L2TP tunnels, unless no other tunnel type specifier is configured.
no l2tp
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure L2TP parameters. L2TP extends the PPP model by allowing Layer 2 and PPP endpoints to reside on different devices interconnected by a packet-switched network.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command causes the associated header to be defined as an L2TP header template and enables the context to define the L2TP parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures an L2TP accounting policy.
The no form of this command removes the policy-name from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the maximum number of L2TP LNS sessions per SLA profile instance or per subscriber.
The no form of this command removes the maximum number of L2TP LNS sessions limit.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables the inclusion of the L2TPv2 session ID into the load-balancing hash algorithm to induce more variation and better load distribution over available links and next-hops.
The no form of this command disables the inclusion of the session-id.
All
This command configures the maximum number of L2TP LTS sessions per SLA profile instance or per subscriber.
The no form of this command removes the maximum number of L2TP LTS sessions limit.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the maximum number of L2TP sessions per SLA profile instance or per subscriber.
The no form of this command removes the maximum number of L2TP sessions limit.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command sets the tunnel-id range that is used to allocate a new tunnel-id for a tunnel for which multi-chassis redundancy is configured to this MCS peer.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure L2TPv3 parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure L2TPv3 spoke SDPs for Epipe services.
All
Commands in this context configure an RX/TX cookie for L2TPv3 egress spoke SDP or for the remote-source ingress spoke SDP.
All
This command creates the configuration context to define the L2TPv3 tunnel parameters.
The no form of this command deletes the L2TPv3 configuration context.
All
This command enables matching on tunnels with L2W UEs.
The no form of this command disables matching on L2W UEs, unless UE state matching is disabled altogether.
no l2w
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures a Layer 3 multi-chassis ring.
The no form of this command reverts to the default.
All
This command configures system-wide Layer 4 load balancing. The configuration at the system level can enable or disable load balancing based on Layer 4 fields. If enabled, the Layer 4 source and destination port fields will be included in hashing calculation for TCP/UDP packets.
The hashing algorithm addresses finer spraying granularity where many hosts are connected to the network.
To address more efficient traffic distribution between network links (forming a LAG group), a hashing algorithm extension takes into account L4 information (that is, src/dst L4-protocol port).
The hashing index can be calculated according to the following algorithm:
This algorithm will be used in all cases where IP information in per-packet hashing is included (refer to "Traffic Load Balancing Options" in the 7450 ESS, 7750 SR, 7950 XRS, and VSR Interface Configuration Guide). However, the Layer 4 information (TCP/UDP ports) will not be used for fragmented packets.
no l4-load-balancing
All
This command configures a destination TCP or UDP port number or port range for a management access filter match criterion.
The no form of this command reverts to the default values.
no l4-src-port
Format Style | Format Syntax | Example |
Decimal | DDDDD | 63488 |
Hexadecimal | 0xHHHH | 0xF800 |
Binary | 0bBBBBBBBBBBBBBBBB | 0b1111100000000000 |
To select a range from 1024 up to 2047, specify 1024 and 0xFC00 for port and maskrespectively.
All
This command enables debugging for LDP Label packets.
The no form of the command disables the debugging output.
All
This command defines the MPLS value to be used in the MPLS header.
The no form of this command removes the label value.
label 0
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables debugging for the specified RIB-API label.
All
This commands enables the context to configure the allocation of MPLS labels to specific BGP routes.
All
This command configures a reserved label block name to be used in the termination of services on the SRv6 FPE.
Static values of the service SID function are mapped to label values drawn from this reserved label block. A static function value of 1 maps to the first label in this label block and so on.
Dynamic values of service SID function are mapped to label values drawn from the dynamic label range.
An End or End.X function does not map to a label value.
The no form of this command removes the label block name from the configuration.
no label-block
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command configures a reserved label block name for the termination of services on the SRv6 FPE.
When an operator configures this block, the router maps both static and dynamic values of the service SID functions to label values drawn from the reserved label block. This reserved block and the block defined under static-function are mutually exclusive. The configuration of this block does not constrain the configuration of a particular function length.
An End or End.X function does not map to a label value.
The no form of this command removes the label block name from the configuration.
no label-block
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command sets ECMP multipath parameters that apply only to the label unicast IPv4 address family.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The distribution of traffic over the multiple paths may or may not be equal. The distribution is based on weights derived from the Link Bandwidth Extended Community.
For more information about the criteria a non-best route must meet to qualify as a multipath, see “BGP route installation in the route table” in the 7450 ESS 7750 SR 7950 XRS VSR Unicast Routing Protocols User Guide.
The no form of this command removes label-IPv4-specific overrides.
no label-ipv4
All
This command configures the add-paths capability for labeled-unicast IPv4 routes. By default, add-paths is not enabled for labeled-unicast IPv4 routes.
The maximum number of labeled-unicast paths per IPv4 prefix to send is the configured send-limit, which is a mandatory parameter. The capability to receive multiple labeled-unicast paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command, receive capability is enabled by default.
The no form of this command disables add-paths support for labeled-unicast IPv4 routes, causing sessions established using add-paths for labeled-unicast IPv4 to go down and come back up without the add-paths capability.
no label-ipv4
All
This command sets ECMP multipath parameters that apply only to the label IPv4 unicast address family. These settings override the values set by the maximum-paths command.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
The no form of this command removes label-IPv4-specific overrides.
no label-ipv4
All
This command sets ECMP multipath parameters that apply only to the label unicast IPv6 address family.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The distribution of traffic over the multiple paths may or may not be equal. The distribution is based on weights derived from the Link Bandwidth Extended Community.
For more information about the criteria a non-best route must meet to qualify as a multipath, see “BGP route installation in the route table” in the 7450 ESS 7750 SR 7950 XRS VSR Unicast Routing Protocols User Guide.
The no form of this command removes label-IPv6-specific overrides.
no label-ipv6
All
This command configures the add-paths capability for labeled-unicast IPv6 routes. By default, add-paths is not enabled for labeled-unicast IPv6 routes.
The maximum number of labeled-unicast paths per IPv6 prefix to send is the configured send-limit, which is a mandatory parameter. The capability to receive multiple labeled-unicast paths per prefix from a peer is configurable using the receive keyword, which is optional. If the receive keyword is not included in the command, receive capability is enabled by default.
The no form of this command disables add-paths support for labeled-unicast IPv6 routes, causing sessions established using add-paths for labeled-unicast IPv6 to go down and come back up without the add-paths capability.
no label-ipv6
All
This command sets ECMP multipath parameters that apply only to the label unicast IPv6 address family. These settings override the values set by the maximum-paths command.
When multipath is enabled, traffic to the destination is load-shared across a set of paths (BGP routes) that the BGP decision process considers equal to the best path. The actual distribution of traffic over the multiple paths may be equal or unequal (that is, based on weights derived from the Link Bandwidth Extended Community).
The no form of this command removes label-IPv6-specific overrides.
no label-ipv6
All
Commands in this context configure advertised label IPv6 programming rules.
All
All
This command allows a labelled IPv6 route with the explicit-null label to be resolved by other labelled IPv6 routes with the explicit-null label, and also by unlabeled IPv4 routes and unlabeled IPv6 routes that are resolved by static routes, interface routes, or tunnels. Up to four levels of recursive resolution are supported when the top route is a labelled IPv6 route with an explicit-null label.
Regardless of setting, a labelled IPv6 route with a regular label (other than explicit-null) is never resolved by other labelled IPv6 routes.
The no form of this command disables the label-ipv6-explicit-null functionality. When disabled, a labeled IPv6 route cannot be resolved by other labeled IPv6 routes.
no label-ipv6-explicit-null
All
This command is used on transit routers when a static LSP is defined. The static LSP on the ingress router is initiated using the config router mpls static-lsp lsp-name command. An in-label can be associated with either a pop or a swap action, but not both. If both actions are specified, the last action specified takes effect.
The no form of this command deletes the static LSP configuration associated with the in-label.
All
This command controls the method by which service labels are allocated to routes exported by the VPRN as BGP-VPN routes. The vrf option selects service label per VRF mode while the next-hop option selects service label per next-hop mode.
The no form of this command sets the mode to the default mode of service label per VRF.
no label-mode
All
This command configures the route preference for routes learned from labeled-unicast peers.
This command can be configured at three levels:
The most specific value is used.
The lower the preference, the higher the chance of the route being the active route.
The no form of this command used at the global level reverts to the default value of 170.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no label-preference
All
This command configures the route preference for routes learned from labeled-unicast peers.
This command can be configured at three levels:
The most specific value is used.
The lower the preference, the higher the chance of the route being the active route.
The no form of this command used at the global level reverts to the default value of 170.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no label-preference
All
This command configures the TTL propagation for locally generated packets which are forwarded over a BGP label route in the Global Routing Table (GRT) context.
For IPv4 and IPv6 packets forwarded using a RFC 3107 label route in the global routing instance, including 6PE, the all value of the command enables TTL propagation from the IP header into all labels in the transport label stack. The none value reverts to the default mode which disables TTL propagation from the IP header to the labels in the transport label stack. This command does not have a no version.
The TTL of the IP packet is always propagated into the RFC 3107 label itself, and this command only controls the propagation into the transport labels, for example, labels of the RSVP or LDP LSP to which the BGP label route resolves and which are pushed on top of the BGP label.
If the BGP peer advertised the implicit-null label value for the BGP label route, the TTL propagation will not follow the configuration described, but will follow the configuration to which the BGP label route resolves:
RSVP LSP shortcut:
LDP LSP shortcut:
This feature does not impact packets forwarded over BGP shortcuts. The ingress LER operates in uniform mode by default and can be changed into pipe mode using the configuration of TTL propagation for RSVP or LDP LSP shortcut listed.
label-route-local none
All
This command configures the TTL propagation for transit packets which are forwarded over a BGP label route in the Global Routing Table (GRT) context.
For IPv4 and IPv6 packets forwarded using a RFC 3107 label route in the global routing instance, including 6PE, the all value of the command enables TTL propagation from the IP header into all labels in the transport label stack. The none value reverts to the default mode which disables TTL propagation from the IP header to the labels in the transport label stack. This command does not have a no version.
The TTL of the IP packet is always propagated into the RFC 3107 label itself, and this command only controls the propagation into the transport labels, for example, labels of the RSVP or LDP LSP to which the BGP label route resolves and which are pushed on top of the BGP label.
If the BGP peer advertised the implicit-null label value for the BGP label route, the TTL propagation will not follow the configuration described, but will follow the configuration to which the BGP label route resolves.
RSVP LSP shortcut:
LDP LSP shortcut:
This feature does not impact packets forwarded over BGP shortcuts. The ingress LER operates in uniform mode by default and can be changed into pipe mode using the configuration of TTL propagation for the listed RSVP or LDP LSP shortcut.
label-route-transit none
All
This command enables the label stack size reduction for a SR-TE LSP or SR-TE LSP template.
At a high level, the label stack reduction algorithm attempts to replace a segment of a computed SR-TE LSP path with the farthest node SID on that path that results in using ECMP paths with links which still comply to the TE constraints of the LSP path.
The no form of this command returns the command to its default value.
no label-stack-reduction
All
This command enables the system to collect traffic statistics on the specified number of labels of the MPLS label stack.
The no form of this command disables the collecting of traffic statistics.
label-stack-statistics-count 1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies configures the time interval (in s), LDP will delay for the withdrawal of FEC-label binding it distributed to its neighbors when FEC is de-activated. When the timer expires, LDP then sends a label withdrawal for the FEC to all its neighbors. This is applicable only to LDP IPv4 prefix FECs and is not applicable to pseudowires (service FECs).
When there is an upper layer (user of LDP) which depends of LDP control plane for failover detection then label withdrawal delay and tunnel-down-damp-time options must be set to 0.
An example is PW redundancy where the primary PW doesn’t have its own fast failover detection mechanism and the node depends on LDP tunnel down event to activate the standby PW.
no label-withdrawal-delay
All
Commands in this context configure labeled route options for next-hop resolution.
All
This command configures the maximum number of L2TP LAC hosts per SLA profile instance or per subscriber.
The no form of this command removes the maximum number of L2TP LAC hosts limit.
![]() | Note: The operational maximum value may be smaller due to equipped hardware dependencies. |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables the LACP protocol. Per the IEEE 802.1ax standard, the Link Aggregation Control Protocol (LACP) provides a standardized means for exchanging information between Partner Systems on a link to allow their Link Aggregation Control instances to reach agreement on the identity of the Link Aggregation Group to which the link belongs, move the link to that Link Aggregation Group, and enable its transmission and reception functions in an orderly manner.
If any of the parameters are omitted, the existing configuration is preserved. The default parameter values are used if a parameter is never explicitly configured.
no lacp
All
This command configures the type of multiplexing machine control to be used in a LAG with LACP in active/passive modes.
The no form of this command disables multiplexing machine control.
lacp-mux-control coupled
All
This command configures the Link Aggregation Control Protocol (LACP) system priority on aggregated Ethernet interfaces. LACP allows the operator to aggregate multiple physical interfaces to form one logical interface.
lacp-system-priority 32768
All
This command enables LACP packet tunneling for the Ethernet port. When tunneling is enabled, the port will not process any LACP packets but will tunnel them instead. The port cannot be added as a member to a LAG group.
In this context, the lacp-tunnel command is supported for Epipe and VPLS services only.
The no form of this command disables LACP packet tunneling for the Ethernet port.
no lacp-tunnel
All
This command specifies the interval signaled to the peer and tells the peer at which rate it should transmit.
lacp-xmit-interval fast
All
This command enables LACP message transmission on standby links.
The no form of this command disables LACP message transmission. This command should be disabled for compatibility when using active/standby groups. This forces a timeout of the standby links by the peer. Use the no form if the peer does not implement the correct behavior regarding the lacp sync bit.
lacp-xmit-stdby
All
This command defines a LAG which is forming a redundant-pair for MC-LAG with a LAG configured on the given peer. The same LAG group can be defined only in the scope of 1 peer. In order MC-LAG to become operational, all parameters (lacp-key, system-id, system-priority) must be configured the same on both nodes of the same redundant pair.
The partner system (the system connected to all links forming MC-LAG) will consider all ports using the same lacp-key, system-id, system-priority as the part of the same LAG. In order to achieve this in MC operation, both redundant-pair nodes have to be configured with the same values. In case of the mismatch, MC-LAG is kept in oper-down status.
Note that the correct CLI command to enable MC LAG for a LAG in standby-signaling power-off mode is lag lag-id [remote-lag remote-lag-id]. In the CLI help output, the first three forms are used to enable MC LAG for a LAG in LACP mode. MC LAG is disabled (regardless of the mode) for a given LAG with no lag lag-id.
All
Commands in this context configure Link Aggregation Group (LAG) attributes.
A LAG is used to group multiple ports into one logical link. The aggregation of multiple physical links allows for load sharing and offers seamless redundancy. If one link fails, traffic is redistributed over the remaining links.
![]() | Note: For all ports in a LAG group, autonegotiation must be set to “limited” or “off”. |
There are three possible settings for autonegotiation, as follows:
When autonegotiation is enabled on a port, the link attempts to automatically negotiate the link speed and duplex parameters; the configured duplex and speed parameters are ignored.
When autonegotiation is disabled on a port, the port does not attempt to autonegotiate and will only operate at the speed and duplex settings configured for the port.
![]() | Note: Disabling autonegotiation on gigabit ports is not allowed. This is in accordance with the IEEE 802.3 specification for gigabit Ethernet, which requires gigabyte to be enabled for far end fault indication. |
If the config>port>ethernet autonegotiate limited keyword option is specified, the port will autonegotiate but only advertise the speed and duplex settings configured for the port. Use the limited mode on multi-speed gigabit ports to force gigabit operation while keeping autonegotiation is enabled for compliance with IEEE 801.3.
The system requires autonegotiation to be disabled or limited for ports in a LAG to guarantee a specific port speed.
The no form of this command deletes the LAG from the configuration. A LAG can only be deleted while the LAG is administratively shut down. Any dependencies, such as IP-Interface configurations, must be removed from the configuration before the no lag command is issued.
The LAG ID ranging from 1 to 64 supports up to 64 LAG members and LAG ID above 64 supports 32 LAG members.
In model-driven interfaces, the LAG name is used for configuration references and show commands. A service provider or administrator can use the defined LAG name to identify and manage LAGs within the SR OS platforms.
In the classic CLI interface, the user must assign a LAG ID to create the LAG. The LAG name is optional and, if specified, must always start with “lag-”. If a name is not specified, SR OS automatically assigns a string version of the LAG ID as “lag-<lag-id>”.
All
This command enables debugging for LAG.
All
This command configures a lag-id associated to the Ethernet-Segment. When the Ethernet-Segment is configured as all-active, then only a lag or PW port can be associated to the Ethernet-Segment. When the Ethernet-Segment is configured as single-active, then a lag, port or sdp can be associated to the Ethernet-Segment. In either case, only one of the four objects can be configured in the Ethernet-Segment. A specified lag can be part of only one Ethernet-Segment.
no lag
All
This command binds the interface to a Link Aggregation Group (LAG)
The no form of this command removes the LAG id from the configuration.
lag-id | 1 to 800 |
encap-val | 0 (for null) |
0 to 4094 (for dot1q) |
All
Commands in this context configure eth-tunnel loadsharing parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command assigns a pre-configured lag link map profile to a SAP or network interface configured on a LAG or a PW port that exists on a LAG. Once assigned or de-assigned, the SAP or network interface egress traffic is re-hashed over LAG as required by the new configuration.
The no form of this command reverts the SAP/network interface to use per-flow, service or link hash as configured for the service/LAG.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command assigns a pre-configured lag link map profile to a SAP/network interface configured on a LAG or a PW port that exists on a LAG. Once assigned/de-assigned, the SAP’s/network interface’s egress traffic will be re-hashed over LAG as required by the new configuration.
The no form of this command reverts the SAP/network interface to use per-flow, service or link hash as configured for the service/LAG.
no lag-link-map-profile
All
This command assigns a pre-configured lag link map profile to a SAP/network interface configured on a LAG or a PW port that exists on a LAG. Once assigned/unassigned, the SAP/network interface egress traffic will be re-hashed over LAG as required by the new configuration.
The no form of this command reverts the SAP/network interface to use per-flow, service or link hash as configured for the service/LAG.
no lag-link-map-profile
All
This command assigns a pre-configured lag link map profile to a SAP/network interface configured on a LAG or a PW port that exists on a LAG. Once assigned/de-assigned, the SAP/network interface egress traffic will be re-hashed over LAG as required by the new configuration.
The no form of this command reverts the SAP/network interface to use per-flow, service or link hash as configured for the service/LAG.
no lag-link-map-profile
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command assigns a pre-configured LAG link map profile to a SAP or network interface configured on a LAG or a PW port that exists on a LAG. Once assigned, the SAP or network interface egress traffic will be re-hashed over LAG as required by the new configuration.
The no form of this command reverts the SAP or network interface to use per-flow, service or link hash as configured for the service or LAG.
no lag-link-map-profile
All
This command assigns a preconfigured lag link map profile to a SAP/network interface configured on a LAG or a PW port that exists on a LAG. Once assigned/unassigned, the SAP/network interface egress traffic will be re-hashed over LAG as required by the new configuration.
The no form of this command reverts the SAP/network interface to use per-flow, service or link hash as configured for the service/LAG.
no lag-link-map-profile
All
This command configures weight and class to be used on LAG egress when the LAG uses weighted per-link-hash by subscribers with the profile assigned. Subscribers using profile with lag-per-link-hash default configuration, inherit weight and class from the SAP configuration (1 and 1 respectively if none configured under SAP).
The no form of this command restores default configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures weight and class to this SAP to be used on LAG egress when the LAG uses weighted per-link-hash.
The no form of this command restores default configuration.
no lag-per-link-hash (equivalent to weight 1 class 1)
All
This command configures weight and class to this SAP to be used on LAG egress when the LAG uses weighted per-link-hash.
The no form of this command restores default configuration.
no lag-per-link-hash (equivalent to weight 1 class 1)
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command configures weight and class to this SAP to be used on LAG egress when the LAG uses weighted per-link-hash.
The no form of this command restores the default configuration.
no lag-per-link-hash (equivalent to weight 1 class 1)
All
This command configures weight and class to this interface to be used on LAG egress when the LAG uses weighted per-link-hash.
The no form of this command restores the default configuration (weight 1 class 1).
no lag-per-link-hash
All
This command configures the bandwidth available both at the interface and bundle level when a specific number of ports in a LAG group fail.
The no form of this command removes the values from the configuration.
All
This command creates the context to configure Link Aggregation Group (LAG) priority control events that monitor the operational state of the links in the LAG.
The lag-port-down command configures a priority control event. The event monitors the operational state of each port in the specified LAG. When one or more of the ports enter the operational down state, the event is considered to be set. When all the ports enter the operational up state, the event is considered to be clear. As ports enter the operational up state, any previous set threshold that represents more down ports is considered cleared, while the event is considered to be set.
Multiple unique lag-port-down event nodes can be configured within the priority-event node up to the maximum of 32 events.
The lag-port-down command can reference an arbitrary LAG. The lag-id does have to already exist within the system. The operational state of the lag-port-down event will indicate:
When the lag-id is created, or a port in lag-id becomes operationally up or down, the event operational state must be updated appropriately.
When one or more of the LAG composite ports enters the operationally down state or the lag-id is deleted or does not exist, the event is considered to be set. When an event transitions from clear to set, the set is processed immediately and must be reflected in the associated virtual router instances in-use priority value. As the event transitions from clear to set, a hold-set timer is loaded with the value configured by the events hold-set command. This timer prevents the event from clearing until it expires, damping the effect of event flapping. If the event clears and becomes set again before the hold-set timer expires, the timer is reset to the hold-set value, extending the time before another clear can take effect.
The lag-port-down event is considered to have a tiered event set state. While the priority impact per number of ports down is totally configurable, as more ports go down, the effect on the associated virtual router instances in-use priority is expected to increase (lowering the priority). When each configured threshold is crossed, any higher thresholds are considered further event sets and are processed immediately with the hold-set timer reset to the configured value of the hold-set command. As the thresholds are crossed in the opposite direction (fewer ports down then previously), the priority effect of the event is not processed until the hold-set timer expires. If the number of ports down threshold again increases before the hold-set timer expires, the timer is only reset to the hold-set value if the number of ports down is equal to or greater than the threshold that set the timer.
The event contains number-down nodes that define the priority delta or explicit value to be used based on the number of LAG composite ports that are in the operationally down state. These nodes represent the event set thresholds. Not all port down thresholds must be configured. As the number of down ports increase, the number-down ports-down node that expresses a value equal to or less than the number of down ports describes the delta or explicit priority value to be applied.
The no form of the command deletes the specific LAG monitoring event. The event can be removed at anytime. When the event is removed, the in-use priority of all associated virtual router instances must be reevaluated. The events hold-set timer has no effect on the removal procedure.
no lag-port-down — No LAG priority control events are created.
All
This command enables the router’s usage of the LAG so traffic for a given multicast stream destined to an IP interface using the LAG is sent only to the forwarding complex that owns the LAG link on which it will actually be forwarded.
Changing the value causes the PIM protocol to be restarted.
If this optimization is disabled, the traffic is sent to all forwarding complexes that own at least one link in the LAG.
The no form of this command causes the traffic to be sent to all the forwarding complexes that own at least one link in the LAG.
![]() | Note: Changes made for multicast hashing cause Layer 4 multicast traffic to not be hashed. This is independent of if lag-usage-optimization is enabled or disabled. Using this command and the mc-ecmp-hashing-enabled command on mixed port speed LAGs is not recommended, because some groups may be forwarded incorrectly. |
no lag-usage-optimization
All
Commands in this context configure HLE parameters.
The no form of this command disables the vRGW parameters enabled in this context.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure HLE parameters.
The no form of this command disables the context.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure subscriber management vRGW home HLE parameters.
The no form of this command disables the context.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables the system to include the HLE service’s bridge ID (Alc-Bridge-Id) in RADIUS accounting packets.
The no form of this command excludes the HLE service’s bridge ID (Alc-Bridge-Id) from RADIUS accounting packets.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables the system to include the HLE host’s device type (Alc-HLE-Device-Type) in RADIUS accounting packets.
The no form of this command excludes the HLE host’s device type (Alc-HLE-Device-Type) from RADIUS accounting packets.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables the system to include the HLE service’s EVPN route distinguisher (Alc-RD) in RADIUS accounting packets.
The no form of this command excludes the HLE service’s EVPN route distinguisher (Alc-RD) from RADIUS accounting packets.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables the system to include the HLE service’s EVPN route target (Alc-RT) in RADIUS accounting packets.
The no form of this command excludes the HLE service’s EVPN route target (Alc-RT) from RADIUS accounting packets.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables the system to include the HLE service’s EVPN VXLAN VNI (Alc-Vxlan-VNI) in RADIUS accounting packets.
The no form of this command excludes the HLE service’s EVPN VXLAN VNI (Alc-Vxlan-VNI) from RADIUS accounting packets.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the maximum response time used in group-specific queries sent in response to 'leave' messages, and is also the amount of time between two consecutive group-specific queries. This value may be tuned to modify the leave latency of the network. A reduced value results in reduced time to detect the loss of the last member of a group.
The configured last-member-query-interval is ignored when fast leave is enabled on the SAP or SDP.
The no form of this command reverts to the default value.
last-member-query-interval 10
All
This command configures the maximum response time used in group-specific queries sent in response to leave messages, and is also the amount of time between two consecutive group-specific queries. This value may be tuned to modify the leave latency of the network. A reduced value results in reduced time to detect the loss of the last member of a group.
The configured interval is ignored when fast-leave is enabled on the SAP or SDP.
The no form of this command reverts to the default.
last-member-query-interval 10
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the maximum response time used in group-specific queries sent in response to ‘leave’ messages, and is also the amount of time between 2 consecutive group-specific queries. This value may be tuned to modify the leave latency of the network. A reduced value results in reduced time to detect the loss of the last member of a group.
The configured last-member-query-interval is ignored when fast-leave is enabled on the SAP or SDP.
last-member-query-interval 10
All
This command configures the timer that specifies the wait time before the last reported delay measurement is flushed after a link measurement test enters the operationally down state. The aging timer delays the flushing of the last reported delay metric to the routing engine.
This timer starts a countdown to zero when an administrative function causes the operational state of the test on that specific interface to transition from up to down. If the timer expires before the operational state transitions to up, the previously reported value is flushed. The Delay Measurement Last Reported indicates “Cleared”. The timestamp indicates the time of the clear event. The Triggered By indicates “Expired”. If the administrative state recovers to operationally up before the expiration of the timer, the previous reported value is not flushed.
The aging timer does not apply to failure conditions that do not affect the administrative state of the interface, for example interface failure or routing changes.
The no form of this command reverts to the default value.
last-reported-delay-hold 86400
A configured value of 0 indicates that the previous reported value is cleared without additional wait time.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Specifies that at the termination of an SAA test probe, the calculated latency event value is evaluated against the configured rising and falling latency event thresholds. SAA threshold events are generated as required.
Once the threshold (rising/falling) is crossed, it is disabled from generating additional events until the opposite threshold is crossed. If a falling-threshold is not supplied, the rising- threshold is re-enabled when it falls below the threshold after the initial crossing that generated the event.
The configuration of latency event thresholds is optional.
The no form of this command disables the latency event.
All
Commands in this context configure SHCV behavior parameters for IES and VPRN services.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command specifies the format of the routable encapsulation to add to each copied packet. Layer 3 encapsulation takes precedence over Ethernet encapsulation configuration in an LI source. No changes are allowed to the Layer 3 encapsulation once a gateway is configured.
The no form of this command removes the routable encapsulation.
no layer-3-encap
All
This command specifies the format of the routable encapsulation to add to each copied packet. Layer 3 encapsulation takes precedence over Ethernet encapsulation configuration in an LI source. No changes are allowed to the Layer 3 encapsulation after a gateway is configured.
The no form of this command disables Layer 3 encapsulation.
All
no lbl-eth-or-ip-l4-teid
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables the MEP to process service activation streams encapsulated in ETH-CFM LBM frames that are directed to the MEP. The MEP will be allocated additional resources to rapidly respond to a high-speed stream of LBM messages.
A MEP created with this option will not validate any TLVs, will not validate the ETH-LBM MAC Address, and will not increment or compute any loopback statistics. Statistical computation and reporting is the responsibility of the test head-end. The ETH-CFM level of the high speed ETH-LBM stream must match the level of a MEP configured with this command. The high-speed stream must not target an ETH-CFM level that is not explicitly configured with this option. MEPs act as boundaries for lower levels, below the configured MEP level values. Those boundary levels do not inherit this function.
When the service activation test is complete, the MEP may be returned to standard processing by removing this command. If there is available bandwidth, the MEP will respond to other ETH-CFM PDUs, such as ETH-DMM marker packets, using standard processing.
The interaction between this command and the tools perform service id service-id loopback eth command must be carefully considered. It is recommended that either the lbm-svc-act-responder or the tools perform service id service-id loopback eth command be used at any given time within a service. If both commands must be configured, and the target reflection point is the MAC Swap Loopback function, the inbound stream of data must not include ETH-CFM traffic that is equal to or lower than the domain level of any configured MEP which would otherwise extract and process the ETH-CFM message. If the reflection target is a MEP configured with the lbm-svc-act-responder option, the mode (ingress or egress) of the SAP or SDP specified with this tools command and the MEP direction (up or down) must match when the functions are enabled on the same reflection point, and the domain level of the inbound ETH-LBM must be the same as that of the MEP configured with the lbm-svc-act-responder option. At no time should the two functions be conflicting with each other along the path of the stream. This conflict would lead to unpredictable and possibly destabilizing situations.
The no form of this command reverts to MEP LBM standard processing.
no lbm-svc-act-responder
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables the MEP to process service activation streams encapsulated in ETH-CFM LBM frames that are directed to the MEP. The MEP will be allocated additional resources to rapidly respond to a high-speed stream of LBM messages. A MEP created with this option will not validate any TLVs, will not validate the ETH-LBM MAC Address, and will not increment or compute any loopback statistics. Statistical computation and reporting is the responsibility of the test head-end. The ETH-CFM level of the high speed ETH-LBM stream must match the level of a MEP configured with this command. It must not target any lower ETH-CFM level the MEP will terminate. When the service activation test is complete, the MEP may be returned to standard processing by removing this command. If there is available bandwidth, the MEP will respond to other ETH-CFM PDUs, such as ETH-DMM marker packets, using standard processing.
The interaction between this command and the tools perform service id service-id loopback eth command must be carefully considered. It is recommended that either the lbm-svc-act-responder or the tools perform service id service-id loopback eth command be used at any given time within a service. If both commands must be configured, and the target reflection point is the MAC Swap Loopback function, the inbound stream of data must not include ETH-CFM traffic that is equal to or lower than the domain level of any configured MEP which would otherwise extract and process the ETH-CFM message. If the reflection target is a MEP configured with the lbm-svc-act-responder option, the mode (ingress or egress) of the SAP or SDP specified with this tools command and the MEP direction (up or down) must match when the functions are enabled on the same reflection point, and the domain level of the inbound ETH-LBM must be the same as that of the MEP configured with the lbm-svc-act-responder option. At no time should the two functions be conflicting with each other along the path of the stream. This conflict would lead to unpredictable and possibly destabilizing situations.
The no form of this command reverts to MEP LBM standard processing.
no lbm-svc-act-responder
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables the MEP to process service activation streams encapsulated in ETH-CFM LBM frames that are directed to the MEP. The MEP will be allocated additional resources to rapidly respond to a high-speed stream of LBM messages. A MEP created with this option will not validate any TLVs, will not validate the ETH-LBM MAC Address, and will not increment or compute any loopback statistics. Statistical computation and reporting is the responsibility of the test head-end. The ETH-CFM level of the high speed ETH-LBM stream must match the level of a MEP configured with this command. It must not target any lower ETH-CFM level the MEP will terminate. When the service activation test is complete, the MEP may be returned to standard processing by removing this command. If there is available bandwidth, the MEP will respond to other ETH-CFM PDUs, such as ETH-DMM marker packets, using standard processing.
The interaction between this command and the tools perform service id service-id loopback eth command must be carefully considered. It is recommended that either the lbm-svc-act-responder or the tools perform service id service-id loopback eth command be used at any given time within a service. If both commands must be configured, and the target reflection point is the MAC Swap Loopback function, the inbound stream of data must not include ETH-CFM traffic that is equal to or lower than the domain level of any configured MEP which would otherwise extract and process the ETH-CFM message. If the reflection target is a MEP configured with the lbm-svc-act-responder option, the mode (ingress or egress) of the SAP or SDP specified with this tools command and the MEP direction (up or down) must match when the functions are enabled on the same reflection point, and the domain level of the inbound ETH-LBM must be the same as that of the MEP configured with the lbm-svc-act-responder option. At no time should the two functions be conflicting with each other along the path of the stream. This conflict would lead to unpredictable and possibly destabilizing situations.
The no form of this command reverts to MEP LBM standard processing.
no lbm-svc-act-responder
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command applies only to a DS-1 port configured with a 'long' buildout (see the buildout command). Specify the number of decibels the transmission signal decreases over the line.
For 'short' buildout the following values are valid:
lboNotApplicable — Not applicable
For 'long' buildout the following values are valid:
lbo0dB | For 0 dB |
lboNeg7p5dB | For -7.5 dB |
lboNeg15p0dB | For -15.0 dB |
lboNeg22p5dB | For -22.5 dB |
The default for 'short' build out is 'NotApplicable' while the default for 'long' buildout is 'lbo0dB'.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
This command enables the LCP Asynchronous Control Character Map (ACCM) configuration option. When enabled, the LCP ACCM configuration option is acknowledged during LCP negotiation between the LNS and the PPP client. The option is then ignored and no ACCM mapping is done.
By default, an L2TP tunnel inherits the configuration from the L2TP group CLI context.
The no form of this command disables the LCP ACCM configuration option.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
lcp-ignore-identifier
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures checking the magic number field in LCP Echo-Request and LCP Echo-Reply messages.
The no form of this command reverts to the default value.
no lcp-ignore-magic-numbers
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables the PPP session to stay established when an LCP peer magic number mismatch is detected.
By default, the PPP session is terminated when an LCP peer magic number mismatch is detected.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures LDAP authentication parameters for the system.
The no form of this command de-configures the LDAP client from the SR OS.
All
This command enables the LDAP server name or description.
The no form of this command disables the LDAP server name.
All
This command enables LDP for the auto-bind tunnel resolution filter.
This command instructs BGP to search for an LDP LSP with a FEC prefix corresponding to the address of the BGP next hop.
The no form of this command removes the configuration.
no ldp
All
To suspend the LDP protocol, use the shutdown command. Configuration parameters are not affected.
The no form of the command deletes the LDP protocol instance, removing all associated configuration parameters. The LDP instance must first be disabled with the shutdown command before being deleted.
All
Use this command to configure LDP debugging.
All
This command enables the use of LDP-sourced tunnel entries in the TTM to resolve the associated static route next-hop.
The no form of this command disables the use of LDP-sourced tunnel entries to resolve static route next hops.
no ldp
All
This command enables LDP-signaled LSPs on MPLS-encapsulated SDPs.
In MPLS SDP configurations either one or more LSP names can be specified or LDP can be enabled. The SDP ldp and lsp commands are mutually exclusive except if the mixed-lsp-mode option is also enabled. If an LSP is specified on an MPLS SDP, then LDP cannot be enabled on the SDP. To enable LDP on the SDP when an LSP is already specified, the LSP must be removed from the configuration using the no lsp lsp-name command or the mixed-lsp-mode option is also enabled.
Alternatively, if LDP is already enabled on an MPLS SDP, then an LSP cannot be specified on the SDP. To specify an LSP on the SDP, the LDP must be disabled. The LSP must have already been created in the config>router>mpls context with a valid far-end IP address. The above rules are relaxed when the mixed-lsp option is enabled on the SDP.
no ldp (disabled)
All
This command enables LDP tunneling for next-hop resolution and specifies the LDP tunnels in the tunnel table corresponding to /32 IPv4 FECs and /128 IPv6 FECs.
The no form of this command disables LDP tunneling for next-hop resolution.
All
This command configures an LSP so that it can be used by the IGP to calculate its SPF tree.
When the ldp-over-rsvp option is also enabled in ISIS or OSPF, the IGP provides LDP with all ECMP IP next-hops and tunnel endpoints that it considers to be the lowest cost path to its destination.
IGP provides only the endpoints which are the closest to the destination in terms of IGP cost for each IP next-hop of a prefix. If this results in more endpoints than the ECMP value configured on the router, it will further prune the endpoints based on the lowest router-id and for the same router-id, it will select lowest interface-index first.
LDP then looks up the tunnel table to select the actual tunnels to the endpoint provided by IGP and further limits the endpoint selection to the ones which are the closest to destination across all the IP next-hops provided by IGP for a prefix. For each remaining endpoint, LDP selects a tunnel in a round-robin fashion until the router ECMP value is reached. For each endpoint, only tunnels with the same lowest metric are candidates. If more than one tunnel qualifies, the selection begins with the lowest tunnel-id.
ldp-over-rsvp include
All
This command allows LDP over RSVP processing in IS-IS.
The no form of this command disables LDP over RSVP processing.
no ldp-over-rsvp
All
This command allows LDP-over-RSVP processing in this OSPF instance.
no ldp-over-rsvp
All
This command enables the resolution of IGP routes using LDP LSP across all network interfaces participating in the IS-IS and OSPF routing protocol in the system.
When LDP shortcut is enabled, LDP populates the routing table with next-hop entries corresponding to all prefixes for which it activated an LDP FEC. For a given prefix, two route entries are populated in the system routing table. One corresponds to the LDP shortcut next-hop and has an owner of LDP. The other one is the regular IP next-hop. The LDP shortcut next-hop always has preference over the regular IP next-hop for forwarding user packets and specified control packets over a given outgoing interface to the route next-hop.
All user and specified control packets for which the longest prefix match in RTM yields the FEC prefix will be forwarded over the LDP LSP.
When an IPv4 packet is received on an ingress network interface, a subscriber IES interface, or a regular IES interface, the lookup of the packet by the ingress forwarding engine will result in the packet being sent labeled with the label stack corresponding to the NHLFE of the LDP LSP when the preferred RTM entry corresponds to an LDP shortcut.
If the preferred RTM entry corresponds to an IP next-hop, the IPv4 packet is forwarded without a label.
When ECMP is enabled and multiple equal-cost next-hops exit for the IGP route, the ingress forwarding engine will spray the packets for this route based on hashing routine currently supported for IPv4 packets. When the preferred RTM entry corresponds to an LDP shortcut route, spraying will be performed across the multiple next-hops for the LDP FEC. The FEC next-hops can either be direct link LDP neighbors or T-LDP neighbors reachable over RSVP LSPs in the case of LDP-over-RSVP but not both.
When the preferred RTM entry corresponds to a regular IP route, spraying will be performed across regular IP next-hops for the prefix.
The no form of this command disables the resolution of IGP routes using LDP shortcuts.
no ldp-shortcut
All
This command extends the LDP synchronization feature to a static route. When an interface comes back up, it is possible that a preferred static route using the interface as next-hop for a given prefix is enabled before the LDP adjacency to the peer LSR comes up on this interface. In this case, traffic on an SDP that uses the static route for the far-end address would be black-holed until the LDP session comes up and the FECs exchanged.
This option when enabled delays the activation of the static route until the LDP session comes up over the interface and the ldp-sync-timer configured on that interface has expired
no ldp-sync
This command extends the LDP synchronization feature to a static route. When an interface comes back up, it is possible that a preferred static route using the interface as next-hop for a given prefix is enabled before the LDP adjacency to the peer LSR comes up on this interface. In this case, traffic on an SDP that uses the static route for the far-end address would be black-holed until the LDP session comes up and the FECs exchanged.
This option when enabled delays the activation of the static route until the LDP session comes up over the interface and the ldp-sync-timer configured on that interface has expired
no ldp-sync
All
This command enables synchronization of an IGP and LDP. When a link is restored after a failure, the IGP sets the link cost to infinity and advertises it. The actual value advertised in OSPF is 0xFFFF (65535). The actual value advertised in IS-IS regular metric is 0x3F (63) and in IS-IS wide-metric is 0xFFFFFE (16777214). This feature is not supported on RIP interfaces.
If an interface belongs to both IS-IS and OSPF, a physical failure will cause both IGPs to advertise an infinite metric and to follow the IGP-LDP synchronization procedures. If only one IGP bounces on this interface or on the system, then only the affected IGP advertises the infinite metric and follows the IGP-LDP synchronization procedures.
Next, an LDP Hello adjacency is brought up with the neighbor. The LDP synchronization timer is started by the IGP when the LDP session to the neighbor is up over the interface. This is to allow time for the label-FEC bindings to be exchanged.
When the LDP synchronization timer expires, the link cost is restored and is readvertised. The IGP will announce a new best next hop and LDP will use it if the label binding for the neighbor’s FEC is available.
If the user changes the cost of an interface, the new value is advertised at the next flooding of link attributes by the IGP. However, if the LDP synchronization timer is still running, the new cost value will only be advertised after the timer expires. The new cost value will also be advertised after the user executes any of the following commands:
If the user changes the value of the LDP synchronization timer parameter, the new value will take effect at the next synchronization event. If the timer is still running, it will continue to use the previous value.
If parallel links exist to the same neighbor, then the bindings and services should remain up as long as there is one interface that is up. However, the user-configured LDP synchronization timer still applies on the interface that failed and was restored. In this case, the router will only consider this interface for forwarding after the IGP re-advertises its actual cost value.
The LDP Sync Timer State is not always synchronized across to the standby CPM. Therefore, after an activity switch, the timer state might not be same as it was on the previously active CPM.
If the end-of-lib option is configured, then the system will start the LDP synchronization timer as usual. If the LDP End of LIB Typed Wildcard FEC messages are received for every FEC type negotiated for a given session to an LDP peer for that IGP interface, the ldp-sync-timer is terminated early and the IGP link cost is restored. If the ldp-sync-timer expires before the LDP End of LIB messages are received for every negotiated FEC type, then the system will restore the IGP link cost. The end-of-lib option is disabled by default.
The no form of this command disables IGP-LDP synchronization and deletes the configuration.
no ldp-sync-timer
All
This command allows the user to perform a single run of the LDP ECMP OAM tree trace to discover all ECMP paths of an LDP FEC.
When an MPLS echo request packet is generated in CPM and is forwarded to the outgoing interface, the packet is queued in the egress network queue corresponding to the specified FC and profile parameter values. The marking of the packet's EXP is dictated by the LSP-EXP mappings on the outgoing interface.
When the MPLS echo request packet is received on the responding node, The FC and profile parameter values are dictated by the LSP-EXP mappings of the incoming interface.
When an MPLS echo reply packet is generated in CPM and is forwarded to the outgoing interface, the packet is queued in the egress network queue corresponding to the FC and profile parameter values determined by the classification of the echo request packet, which is being replied to, at the incoming interface. The marking of the packet's EXP is dictated by the LSP-EXP mappings on the outgoing interface. The ToS byte is not modified. Table 67 summarizes this behavior.
CPM (sender node) | Echo request packet:
|
Outgoing interface (sender node) | Echo request packet:
|
Incoming interface (responder node) | Echo request packet:
|
CPM (responder node) | Echo reply packet:
|
Outgoing interface (responder node) | Echo reply packet:
|
Incoming interface (sender node) | Echo reply packet:
|
The following is an example of treetrace prefix information.
All
This command creates the context to configure the LDP ECMP OAM tree trace which consists of an LDP ECMP path discovery and an LDP ECMP path probing features.
The no form of this command deletes the configuration for the LDP ECMP OAM tree discovery and path probing under this context.
The following is an example LDP treetrace information.
All
This command enables debugging for OAM LDP treetrace.
The no form of this command disables the debugging.
All
This command enables debugging for IS-IS leaks.
The no form of the command disables debugging.
All
This command enables debugging for OSPF leaks.
All
This command associates up to four policies to control the leaking of GRT routes into the associated VPRN.
If a route is evaluated and the action is accepted, that route is subject leaking into an associated VPRN instance, assuming the route is fully resolved and active.
This process creates the pool of routes that can be leaked. Within each VPRN, a corresponding import-grt policy must be configured to import select routes into that specific VPRN instance.
The no form of this command removes all route leaking policy associations and effectively disables the leaking of GRT routes into associated VPRNs.
All
This command sets a maximum limit on the number of GRT routes that can be leaked into VPRN instances.
The no form of this command resets the leak-export-limit to its default value of 5.
leak-export-limit 5
All
When a leak-import policy is not specified, no BGP routes from other routing instances are leaked into the VPRN BGP RIB.
The no form of this command removes the policy association.
no leak-import
All
The leak-import command can reference up to 15 objects, where each object is either a policy logical expression or the name of a single policy. The objects are evaluated in the specified order to determine final action to accept or reject the route.
When a leak-import policy is not specified, no BGP routes from other routing instances are leaked into the base router BGP RIB.
The no form of this command removes the policy association.
no leak-import
All
This command enables the sending of ARP or ND packets on the WLAN-GW GRE tunnel for certain events. The target IP address in the ARP/ND packet is the endpoint IP address of the AP. The ARP/ND response from the AP should contain the AP MAC, which subsequently can be reported in a called-station-id message. When enabled, a message will be sent for following events:
This configuration is ignored for L2-AP and L2TPv3 access.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command controls whether the ARP or ND frames received on EVPN binds are used to learn dynamic ARP and ND entries in the ARP/ND table.
The no form of the command reverts to the default.
learn-dynamic
All
This command specifies when this system will learn the cookie from L2TP tunnels terminating on this interface. Learning the cookie means that the value of the octets 3-8 of the cookie is interpreted as an access point’s MAC address, and used as such, for example in the Called-Station-Id attribute of RADIUS Interim-Update messages.
This command configures the time to remember this lease and is applicable for unsolicited release conditions such as lease timeout if the lease-hold-time-for command is set to the default value no solicited-release and is additionally applicable for normal solicited releases from DHCP clients if the lease-hold-time-for command is set to solicited-release.
The no form of this command reverts to the default.
lease-hold-time sec 0
days | 0 to 7305 |
hours | 0 to 23 |
minutes | 0 to 59 |
seconds | 0 to 59 |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure lease-hold-time-for parameters which define additional types of lease or triggers that cause system to hold up leases.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure IPoE host parameters.
For VPLS, DHCP snooping must be explicitly enabled (using the snoop command) at all points where DHCP messages requiring snooping enter the VPLS instance (both from the DHCP server and from the subscribers). Lease state information is extracted from snooped DHCP ACK messages to populate lease state table entries for the SAP.
The optional nbr-of-leases parameter defines the number lease state table entries allowed.
If the nbr-of-leases parameter is omitted, only a single entry is allowed. Once the maximum number of entries has been reached, subsequent lease state entries are not allowed and subsequent DHCP ACK messages are discarded.
The retained lease state information representing dynamic hosts may be used to:
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command specifies the maximum number of DHCPv6 lease states allocated by the DHCPv6 relay function, allowed on this interface.
Optionally, by specifying route-populate parameter, system could:
These routes could be redistributed into IGP/BGP by using route-policy, following protocol types that could be used in “from protocol”:
All
This command specifies the maximum number of DHCPv6 lease states allocated by the DHCPv6 relay function, allowed on this interface.
Optionally, by specifying “route-populate” parameter, system could:
These routes could be redistributed into IGP/BGP by using route-policy, following protocol types that could be used in “from protocol”:
This command enables lease-query. If this is specified the dhcp6-client will retrieve any existing addresses when becoming active. The lease-query is performed for all of the configured servers
The no form of this command disables lease-query.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the time the client transitions to a rebinding state for a DHCP client.
The no form of this command removes the time from the configuration.
days: | 0 to 3650 |
hours: | 0 to 23 |
minutes: | 0 to 59 |
seconds | 0 to 59 |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the time the client transitions to a renew state for a DHCP client.
The no form of this command removes the time from the configuration.
days: | 0 to 3650 |
hours: | 0 to 23 |
minutes: | 0 to 59 |
seconds | 0 to 59 |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the amount of time that the DHCP server grants to the DHCP client permission to use a specific IP address.
The no form of this command removes the lease time parameters from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command defines the length of lease-time that is provided to DHCP clients. By default, the local-proxy-server always makes use of the lease time information provide by either a RADIUS or DHCP server.
The no form of this command disables the use of the lease-time command. The local-proxy-server will use the lease-time offered by either a RADIUS or DHCP server.
lease-time days 7
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command configures the amount of time that the DHCP server grants to the DHCP client permission to use a particular IP address.
The no form of this command removes the lease time parameters from the configuration.
days days | 0 to 3650 |
hrs hours | 0 to 23 |
min minutes | 0 to 59 |
sec seconds | 0 to 59 |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the lease time, in seconds, to be used when allocating addresses from the pool. This time value should always be longer than the renew/rebind time.
The no form of this command reverts to the default.
lease-time hrs 6
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables the use of the least-fill path selection method for the computation of the path of this LSP.
When MPLS requests the computation of a path for this LSP, CSPF will find all equal cost shortest paths which satisfy the constraints of this path. Then, CSPF identifies the single link in each of these paths which has the least available bandwidth as a percentage of its maximum reservable bandwidth. It then selects the path which has the largest value of this percentage least available bandwidth figure. CSPF identifies the least available bandwidth link in each equal cost path after it has accounted for the bandwidth of the new requested path of this LSP.
CSPF applies the least-fill path selection method to all requests for a path, primary and secondary, of an LSP for which this option is enabled. The bandwidth of the path can be any value, including zero.
CSPF applies the least-fill criterion separately to each preemption priority in the base TE. A higher setup priority path can preemptively lower holding priority paths.
CSPF also applies the least-fill criterion separately to each Diff-Serv TE class if Diff-Serv TE is enabled on this node. A higher setup priority path can preemptively lower holding priority paths within a Class Type.
MPLS will re-signal and move the LSP to the new path in the following cases:
During a manual re-signaling of an LSP path, MPLS will always re-signal the path regardless of whether the new path is exactly the same or different than the current path and regardless of whether the metric of the new path is different or not from that of the current path.
During a timer-based re-signaling of an LSP path which has the least-fill option enabled, MPLS will only re-signal the path if the metric of the new path is different than the one of the current path.
The no form of this command deletes a specific node entry in this database.
no least-fill. The path of an LSP is randomly chosen among a set of equal cost paths.
All
This parameter is used in the least-fill path selection process. When comparing the percentage of least available link bandwidth across the sorted paths, whenever two percentages differ by less than the value configured as the least-fill-min-thresh, CSPF will consider them equal and will apply a random number generator to select the path among these paths
The no form of this command resets this parameter to its default value.
least-fill-min-thd 5
All
This parameter is used in the least-fill path selection method. During a timer-based re-signaling of an LSP path which has the least-fill option enabled, CSPF will first update the least-available bandwidth figure for the current path of this LSP. It then applies the least-fill path selection method to select a new path for this LSP. If the new computed path has the same cost as the current path, it will compare the least-available bandwidth figures of the two paths and if the difference exceeds the user configured optimization threshold, MPLS will generate a trap to indicate that a better least-fill path is available for this LSP. This trap can be used by an external SNMP based device to trigger a manual re-signaling of the LSP path since the timer-based re-signaling will not re-signal the path in this case. MPLS will generate a path update trap at the first MBB event which results in the re-signaling of the LSP path. This should clear the eligibility status of the path at the SNMP device.
The no form of this command resets this parameter to its default value.
least-fill-reoptim-thd 10
All
This command enables debugging of the leave all state machine.
The no form of this command disables debugging of the leave all state machine.
All
This command controls the frequency with which the LeaveAll state machine generates LeaveAll PDUs. The timer is required on a per-Port, per-MRP Participant basis. The Leave All Period Timer is set to a random value, T, in the range LeaveAllTime<T<1.5*leave-all-time when it is started. Refer to IEEE 802.1ak-2007 section 10.7.4.3.
leave-all-time 100
All
This command controls the period of time that the Registrar state machine will wait in the leave state before transitioning to the MT (Empty) state when it is removed. An instance of the timer is required for each state machine that is in the leave state. The leave period timer is set to the value specified for leave-time when it is started.
A registration is normally in an “in” state where there is an MFIB entry and traffic is being forwarded. When a “leave all” is performed (periodically around every 10-15 seconds per SAP/SDP binding - see leave-all-time-below), a node sends a message to its peer indicating a leave all is occurring and puts all of its registrations in leave state.
The peer refreshes its registrations based on the leave all PDU it receives and sends a PDU back to the originating node with the state of all its declarations.
Refer to IEEE 802.1ak-2007 section 10.7.4.2.
leave-time 30
All
This command enables legacy mode of advertising TE attributes.
The no form of this command disables legacy mode, but enables the per-application TE attribute advertisement for RSVP-TE.
legacy
All
This command enables legacy DNS NBNS behavior, which restricts the supported default extended authentication origins for DNS and NBNS name servers. The main differences include:
The no form of this command reverts to the recommended default extended DNS and NBNS name server origin priorities.
no legacy-dns-nbns
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command provides for a global LDP knob to allow interoperability with legacy IPv4 LSR implementations which do not comply with the processing of Hello TLVs with the U-bit set. Specifically, this feature disables the following Hello TLVs:
All
This command applies only to a DS-1 port configured with a 'short' buildout. The length command configures the length of the line (in feet). For line lengths longer than 655 feet, configure the DS-1 port buildout as 'long'.
For 'long' buildout the following values are valid:
NotApplicable — Not applicable
For 'short' buildout the following values are valid:
The default for 'long' buildout is 'NotApplicable' while the default for 'short' buildout is '0 to 133'.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
This command sets the number of lines on a screen.
All
This command configures the set number of lines displayed on screen.
length 24
All
This command is used to enable tunnel QoS mapping on all ingress network IP interfaces that the network-qos-policy-id is associated with. The command may be defined at any time after the network QoS policy has been created. Any network IP interfaces currently associated with the policy will immediately start to use the internal IP ToS field of any tunnel terminated IP routed packet received on the interface, ignoring any QoS markings in the tunnel portion of the packet.
This attribute provides the ability to ignore the network ingress QoS mapping of a terminated tunnel containing an IP packet that is to be routed to a base router or VPRN destination. This is advantageous when the mapping for the tunnel QoS marking does not accurately or completely reflect the required QoS handling for the IP routed packet. When the mechanism is enabled on an ingress network IP interface, the IP interface will ignore the tunnel’s QoS mapping and derive the internal forwarding class and profile based on the precedence or DiffServ Code Point (DSCP) values within the routed IP header ToS field compared to the Network QoS policy defined on the IP interface.
The default state is not to enforce tunnel termination IP routed QoS override within the network QoS policy.
The no form of this command removes tunnel termination IP routed QoS override from the network QoS policy and all ingress network IP interfaces associated with the policy.
no ler-use-dscp
All
This command allows a CIDR shortest match hit on a route prefix that contains the IP route prefix associated with the route unknown priority event.
The less-specific command modifies the search parameters for the IP route prefix specified in the route-unknown priority event. Specifying less-specific allows a CIDR shortest match hit on a route prefix that contains the IP route prefix.
The less-specific command eases the RTM lookup criteria when searching for the prefix/mask-length. When the route-unknown priority event sends the prefix to the RTM (as if it was a destination lookup), the result route table prefix (if a result is found) is checked to see if it is an exact match or a less specific match. The less-specific command enables a less specific route table prefix to match the configured prefix. When less-specific is not specified, a less specific route table prefix fails to match the configured prefix. The allow-default optional parameter extends the less-specific match to include the default route (0.0.0.0).
The no form of the command prevents RTM lookup results that are less specific than the route prefix from matching.
no less-specific — The route unknown priority events requires an exact prefix/mask match.
All
This command configures levels and their associated bandwidth for multicast CAC policy on an interface.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command overrides the maximum and CIR rate parameters for a specific priority level on the port or channel’s port scheduler instance. When the level command is executed for a priority level, the corresponding priority level command in the port-scheduler-policy associated with the port is ignored.
The override level command supports the keyword max for the rate and cir parameter. When executing the level override command, at least the rate or cir keywords and associated parameters must be specified for the command to succeed.
The no form of this command removes the local port priority level rate overrides. Once removed, the port priority level will use the port scheduler policies level command for that priority level.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
All
This command creates the context to configure SPB Level 1 or Level 2 area attributes. This is IS-IS levels. Only Level 1 can be configured.
A Level 1 adjacency can be established only with other Level 1 B-VPLS. A Level 2 adjacency can be established only with other Level 2 B-VPLS. Currently there is no support for level 1 and level 2 in the same instance of SPB.
level 1
All
Commands in this context configure SPB level information.
All
This command configures levels and their associated bandwidth for multicast CAC policy on this interface.
All
This command configures interface levels and associated bandwidth for multicast CAC policy.
The no form of this command removes the values from the configuration.
All
This command creates the context to configure IS-IS Level 1 or Level 2 area attributes.
A router can be configured as a Level 1, Level 2, or Level 1-2 system. A Level 1 adjacency can be established if there is at least one area address shared by this router and a neighbor. A Level 2 adjacency cannot be established over this interface.
Level 1/2 adjacency is created if the neighbor is also configured as Level 1/2 router and has at least one area address in common. A Level 2 adjacency is established if there are no common area IDs.
A Level 2 adjacency is established if another router is configured as Level 2 or a Level 1/2 router with interfaces configured as Level 1/2 or Level 2. Level 1 adjacencies are not established over this interface.
To reset global and/or interface level parameters to the default, the following commands must be entered independently:
level> no hello-authentication-key level> no hello-authentication-type level> no hello-interval level> no hello-multiplier level> no metric level> no passive level> no priority
level 1 or level 2
By default an interface operates in both Level 1 and Level 2 modes.
All
This command configures the syslog message severity level threshold. All messages with severity level equal to or higher than the threshold are sent to the syslog target host.
Only a single threshold level can be specified. If multiple levels are entered, the last level entered will overwrite the previously entered commands.
level info
Router severity level | Numerical Severity (highest to lowest) | Configured Severity | Definition |
0 | emergency | system is unusable | |
3 | 1 | alert | action must be taken immediately |
4 | 2 | critical | critical condition |
5 | 3 | error | error condition |
6 | 4 | warning | warning condition |
5 | notice | normal but significant condition | |
1 cleared 2 indeterminate | 6 | info | informational messages |
7 | debug | debug-level messages |
All
This command configures the amount of bandwidth available within a given bundle for MC traffic for a specified level. The amount of allowable BW for the specified level is expressed in kb/s and this can be defined for up to eight different levels.
If no bandwidth is defined for a given level then no limit is applied.
The no form of this command removes the level from the configuration.
All
This command configures an explicit within-CIR bandwidth limit and a total bandwidth limit for each port scheduler’s priority level. To understand how to set the level rate and CIR parameters, a basic understanding of the port-level scheduler bandwidth allocation mechanism is required. The port scheduler takes all available bandwidth for the port or channel (after the max-rate and any port egress-rate limits have been accounted for) and offers it to each of the eight priority levels twice.
The first pass is called the within-CIR pass and consists of providing the available port bandwidth to each of the 8 priority levels, starting with level 8 and moving down to level 1. Each level takes the offered load and distributes it to all child members that have a port-parent cir-level equal to the current priority level. (Any child with a cir-weight equal to 0 is skipped in this pass.) Each child may consume bandwidth up to the child’s frame-based within-CIR offered load. The remaining available port bandwidth is then offered to the next lower priority level until level 1 is reached.
The second pass is called the above-CIR pass and consists of providing the remaining available port bandwidth to each of the eight priority levels a second time. Again, each level takes the offered load and distributes it to all child members that have a port-parent level equal to the current priority level. Each child may consume bandwidth up to the remainder of the child’s frame-based offered load (some of the offered load may have been serviced during the within-CIR pass). The remaining available port bandwidth is then offered to the next priority level until level 1 is again reached.
If the port scheduling policy is using the default orphan behavior (orphan-override has not been configured on the policy), the system then takes any remaining port bandwidth and allocates it to the orphan queues and scheduler on priority level 1. In a non-override orphan state, all orphans are attached to priority level 1 using a weight of 0. The zero weight value causes the system to allocate bandwidth equally to all orphans based on each orphan queue or scheduler’s ability to use the bandwidth. If the policy has an orphan-override configured, the orphans are handled based on the override commands parameters in a similar fashion to properly parented queues and schedulers.
The port scheduler priority level command rate keyword is used to optionally limit the total amount of bandwidth that is allocated to a priority level (total for the within-CIR and above-CIR passes). The cir keyword optionally limits the first pass bandwidth allocated to the priority level during the within-CIR pass.
When executing the level command, at least one of the optional keywords, rate or cir, must be specified. If neither keyword is included, the command will fail.
If a previous explicit value for rate or cir exists when the level command is executed, and either rate or cir is omitted, the previous value for the parameter is overwritten by the default value and the previous value is lost.
The configured priority level rate limits may be overridden at the egress port or channel using the egress-scheduler-override level priority-level command. When a scheduler instance has an override defined for a priority level, both the rate and cir values are overridden even when one of them is not explicitly expressed in the override command. For instance, if the cir kilobits per second portion of the override is not expressed, the scheduler instance defaults to not having a CIR rate limit for the priority level even when the port scheduler policy has an explicit CIR limit defined.
The no form of this command returns the level to its default value.
no level priority-level
All
This command configures the syslog message severity level threshold. All messages with severity level equal to or higher than the threshold are sent to the syslog target host.
Only a single threshold level can be specified. If multiple levels are entered, the last level entered will overwrite the previously entered commands.
The no form of this command reverts to the default value.
level info
Router severity level | Numerical Severity (highest to lowest) | Configured Severity | Definition |
0 | emergency | system is unusable | |
3 | 1 | alert | action must be taken immediately |
4 | 2 | critical | critical condition |
5 | 3 | error | error condition |
6 | 4 | warning | warning condition |
5 | notice | normal but significant condition | |
1 cleared 2 indeterminate | 6 | info | informational messages |
7 | debug | debug-level messages |
All
This command creates the context to configure IS-IS Level 1 or Level 2 area attributes.
A router can be configured as a Level 1, Level 2, or Level 1-2 system. A Level 1 adjacency can be established if there is at least one area address shared by this router and a neighbor. A Level 2 adjacency cannot be established over this interface.
Level 1/2 adjacency is created if the neighbor is also configured as Level 1/2 router and has at least one area address in common. A Level 2 adjacency is established if there are no common area IDs.
A Level 2 adjacency is established if another router is configured as Level 2 or a Level 1/2 router with interfaces configured as Level 1/2 or Level 2. Level 1 adjacencies will not be established over this interface.
To reset global and/or interface level parameters to the default, the following commands must be entered independently:
level 1 or level 2
By default, an interface operates in both Level 1 and Level 2 modes.
All
Commands in this context configure the ISIS level attributes of the SRv6 locator.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command specifies the ISIS route level as a match criterion for the entry.
no level
All
This command configures the routing level for an instance of the IS-IS routing process.
An IS-IS router and an IS-IS interface can operate at Level 1, Level 2 or both Level 1 and 2.
Table 69 displays configuration combinations and the potential adjacencies that can be formed.
Global Level | Interface Level | Potential Adjacency |
L 1/2 | L 1/2 | Level 1 and/or Level 2 |
L 1/2 | L 1 | Level 1 only |
L 1/2 | L 2 | Level 2 only |
L 2 | L 1/2 | Level 2 only |
L 2 | L 2 | Level 2 only |
L 2 | L 1 | none |
L 1 | L 1/2 | Level 1 only |
L 1 | L 2 | none |
L 1 | L 1 | Level 1 only |
The no form of this command removes the level capability from the configuration.
level-capability level-1/2
All
This command configures the routing level for an instance of the IS-IS routing process.
An IS-IS router and an IS-IS interface can operate at Level 1, Level 2 or both Level 1 and 2.
Table 70 displays configuration combinations and the potential adjacencies that can be formed.
Global Level | Interface Level | Potential Adjacency |
L 1/2 | L 1/2 | Level 1 and/or Level 2 |
L 1/2 | L 1 | Level 1 only |
L 1/2 | L 2 | Level 2 only |
L 2 | L 1/2 | Level 2 only |
L 2 | L 2 | Level 2 only |
L 2 | L 1 | — |
L 1 | L 1/2 | Level 1 only |
L 1 | L 2 | — |
L 1 | L 1 | Level 1 only |
The no form of this command removes the level capability from the configuration.
level-capability level-1/2
All
This command configures the ISIS routing level scope of a SRv6 locator. An SRv6 locator can be advertised at level 1 only, level 2 only, or both level 1 and level 2.
The no form of this command reverts to the default value.
level-capability level-1/2
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command applies a route next-hop policy template to the IS-IS interface for the VPRN instance.
When a route next-hop policy template is applied to an interface in IS-IS, it is applied in both level 1 and level 2. When a route next-hop policy template is applied to an interface in OSPF, it is applied in all areas. However, the command in an OSPF interface context can only be executed under the area in which the specified interface is primary and then applied in that area and in all other areas where the interface is secondary. If the user attempts to apply it to an area where the interface is secondary, the command fails.
If the user excluded the interface from LFA using the command loopfree-alternate-exclude, the LFA policy, if applied to the interface, has no effect.
Finally, if the user applied a route next-hop policy template to a loopback interface or to the system interface, the command will not be rejected, but it will result in no action being taken.
The no form deletes the mapping of a route next-hop policy template to an OSPF or IS-IS interface.
All
This command applies a route next-hop policy template to an OSPF or IS-IS interface.
When a route next-hop policy template is applied to an interface in IS-IS, it is applied in both level 1 and level 2. When a route next-hop policy template is applied to an interface in OSPF, it is applied in all areas. However, the command in an OSPF interface context can only be executed under the area in which the specified interface is primary and then applied in that area and in all other areas where the interface is secondary. If the user attempts to apply it to an area where the interface is secondary, the command fails.
If the user excluded the interface from LFA using the command loopfree-alternate-exclude, the LFA policy, if applied to the interface, has no effect.
Finally, if the user applied a route next-hop policy template to a loopback interface or to the system interface, the command will not be rejected, but it results in no action being taken.
The no form deletes the mapping of a route next-hop policy template to an OSPF or IS-IS interface.
no lfa-policy-map
All
Commands in this context configure lawful intercept (LI) parameters.
All
This command enables the Lawful Intercept (LI) profile identifier.
The no form of this command disables the LI profile identifier.
All
Commands in this context configure the li-filter branch to create LI filter lists and entries.
All
Commands in this context configure the LI filter associations entries that are inserted into normal filters.
All
This command enable the LI filter block reservation branch to configure lawful intercept filter reservations.
All
This command configures the lock state of the filters used by LI. With the configurable filter lock for LI feature an LI user can control the behavior of filters when they are used for LI.
Prior to Release 12.0.R1, when a filter entry was used as a Lawful Intercept (LI) mirror source criteria, all subsequent attempts to modify the filter were then blocked to avoid having the LI session impacted by a non-LI user.
The no form of this command reverts to the default.
li-filter-lock-state locked
All
This command configures the ISA group used for the X3 interface.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command creates a Lawful Interception (LI) IPv4 filter list, or enters the CLI context for a LI IPv4 filter list. LI IPv4 filters are used as a manner to create confidential IPv4 filter based li-source entries. The LI IPv4 filter entries are inserted/merged into normal IPv4 filters as configured with the li-filter-associations and li-filter-block-reservation commands, but the LI IPv4 filter entries are not visible to users without LI permissions.
The no form of this command removes the LI IPv4 filter name from the configuration.
All
Specifies the li-ip-filter that will have its entries inserted into a list of normal IP filters.
The no form of this command removes the LI filter name from the configuration.
All
This command enables lawful interception (LI) of packets that match specific entries in an existing LI IP filter that has been associated with a normal IP filter. The specification of an li-ip-filter entry as an li-source means that packets matching the li-ip-filter entry will be intercepted on all interfaces/saps/and so on where the associated normal ip-filter(s) are applied.
All
This command creates a Lawful Interception (LI) IPv6 filter list, or enters the CLI context for a LI IPv6 filter list. LI IPv6 filters are used as a manner to create confidential IPv6 filter based li-source entries. The LI IPv6 filter entries are inserted or merged into normal IPv6 filters as configured with the li-filter-associations and li-filter-block-reservation commands, but the LI IPv6 filter entries are not visible to users without LI permissions.
The no form of this command removes the LI IPv6 filter name from the configuration.
All
This command specifies the li-ipv6-filter that will have its entries inserted into a list of normal IPv6 filters.
The no form of this command removes the filter name from the configuration.
All
This command enables lawful interception (LI) of packets that match specific entries in an existing LI IPv6 filter that has been associated with a normal IPv6 filter. The specification of an li-ipv6-filter entry as an li-source means that packets matching the li-ipv6-filter entry will be intercepted on all interfaces/saps/and so on, where the associated normal ip-filter(s) are applied.
All
This command specifies whether or not lawful intercept (LI) configuration is allowed to be saved to a local file. Modifying this command will not take effect until the system is rebooted.
li-local-save
All
This command creates a Lawful Interception (LI) MAC filter list, or enters the CLI context for a LI MAC filter list. LI MAC filters are used as a manner to create confidential MAC filter based li-source entries. The LI MAC filter entries are inserted/merged into normal MAC filters as configured via the li-filter-associations and li-filter-block-reservation commands, but the LI MAC filter entries are not visible to users without LI permissions.
The no form of this command removes the MAC LI filter name from the configuration.
All
Specifies the li-mac-filter that will have its entries inserted into a list of normal mac filters.
All
This command enables lawful interception (LI) of packets that match specific entries in an existing LI MAC filter that has been associated with a normal MAC filter. The specification of an li-mac-filter entry as an li-source means that packets matching the li-mac-filter entry will be intercepted on all interfaces, saps and so on where the associated normal mac-filter(s) are applied.
All
This command creates or edits an LI reserved block. An LI reserved block allows an operator to define where entries from an LI filter should be inserted into a normal filter. The block reserves a configurable number of entries in the normal filter that can only be used for entries inserted from associated LI filters. The LI filter entries that get inserted into the reserved block in each normal filter are not visible to non-LI operators. The block also defines to which normal filters the reservation is applied.
The no form of this command removes the block name from the configuration.
All
This command specifies whether or not a non-LI user has access to lawful intercept (LI) information. When this command is enabled, a user who does not have LI access will not be allowed to access CLI or SNMP objects in the li context. Modifying this command will not take effect until the system is rebooted.
When the no li-separate command is set (the default mode), those who are allowed access to the config>system>security>profile context and user command nodes are allowed to modify the configuration of the LI parameters. In this mode, a user that has a profile allowing access to the config>li and/or show>li command contexts can enter and use the commands under those nodes.
When the li-separate command is configured, only users that have the LI access capabilities set in the config>system>security>user>access li context are allowed to access the config>li and/or show>li command contexts. A user who does not have LI access is not allowed to enter the config>li and show>li contexts even though they have a profile that allows access to these nodes. When in the li-separate mode, only users with config>system>security>user>access li set in their user account have the ability modify the setting LI parameters in either their own or other profiles and user configurations.
no li-separate
All
This command configures a lawful intercept (LI) mirror source.
All
This command configures the parameters to communicate with a specific LIC.
The no form of this command removes the LIC name.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the string that identifies this LIC.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enters a context for administrative commands related to licensing.
All
This command configures the license location and file name.
The no form of this command removes the file URL from the configuration.
file-url | {local-url | remote-url} (up to 180 characters) |
local-url | [cflash-id/][file-path] |
remote-url | [{ftp://| tftp://} login:pswd@remote-locn/][file-path] |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
All
Commands in this context configure the Network Element to communicate with LI Centers (LICs).
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the lifetime of explicit mappings made by the PCP servers.
lifetime minimum 120 maximum 86400
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command is used to configure the maximum amount of time that a script may run.
lifetime 3600
All
This command records limit conditions.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command limits the number of ongoing IKEv2 initial exchanges per tunnel to 1. When the system receives a new IKEv2 IKE_SA_INIT request when there is an ongoing IKEv2 initial exchange from same peer, then system reduces the timeout value of the existing exchange to the specified reduced-max-exchange-timeout. If the reduced-max-exchange-timeout is disabled, then the system does not reduce the timeout value.
The no form of this command reverts to the default value.
limit-init-exchange reduced-max-exchange-timeout 2
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command indicates whether or not the mac-move agent, when enabled using config>service>vpls>mac-move or config>service>epipe>mac-move, limits the MAC re-learn (move) rate on this SAP.
limit-mac-move blockable
All
This command indicates whether or not the mac-move agent will limit the MAC re-learn (move) rate.
limit-mac-move blockable
All
This command is used to configure the system to use the minimum configurable PIR instead of an H-QoS derived zero operational PIR. The default behavior is to allow the operational PIR of the queue to remain the last configured value while setting the queue MBS to zero (preventing queuing of newly arriving packets). Retaining the previous PIR value may cause a momentary burst above an aggregate rate associated with the queue as it drains. Using the limit-pir-zero-drain command causes the queue to drain at the lowest rate possible (typically 1 kb/s) that limits overrun situations.
The no form of this command reverts to default behavior.
All
This command specifies to limit the unused bandwidth and allow a tighter control in allocation of bandwidth by HQoS. When enabled, HQoS algorithm distributes any unused aggregate bandwidth between queues operating below their fair share rates. This allows a simplified aggregate rate protection while allocating bandwidth by HQoS.
The no form of this command reverts to the default.
All
This command enables aggregate rate overrun protection.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command is used to enable (or disable) aggregate rate overrun protection on the agg-rate context.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
All
This command is used to enable aggregate rate overrun protection on the agg-rate context.
The no form of this command disables the overrun protection.
All
This command is used to enable (or disable) aggregate rate overrun protection on the agg-rate context.
All
This command is used to enable (or disable) aggregate rate overrun protection on the agg-rate context.
All
This command is used to enable aggregate rate overrun protection.
The no form of the command disables aggregate rate overrun protection.
no limit-unused-bandwidth
All
This command configures the line-length parameter of the BITS output, This is the distance in feet between the network element and the office clock (BITS/SSU). There are two possible BITS-out interfaces, one for each CPM. They are configured together, but they are displayed separately in the show command. This command is only applicable when the interface-type is DS1.
line-length 110
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command designates one of the configured ports of the LAG to be used on egress as either a primary or secondary link (based on the option selected) by all SAPs and network interfaces that use this LAG link map profile.
Links are part of a profile When a link is added or deleted, all SAPs and network interfaces that use this link-map-profile may be re-hashed if required.
The no form of this command deletes the link from this LAG link mapping profile. A port must be deleted from all LAG link profiles if it is to be deleted from the LAG.
port-id | slot/mda/port[.channel] | ||
eth-sat-id | esat-id/slot/port | ||
esat | keyword | ||
id | 1 to 20 | ||
pxc-id | pxc-id.sub-port | ||
pxc | keyword | ||
id | 1 to 64 | ||
sub-port | a, b |
All
This command specifies the ipv6-address that should be included in the link-address field of the relay header. This can be used for pool selection by the DHCPv6 server.
The no form of this command falls back to the default.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the link address used for prefix selection at the DHCP server.
The link-address is a field in DHCP6 Relay-Forward message that is used in DHCP6 server to select the IPv6 address (IA-NA) or IPv6 prefix (IA-PD) from a pool with configured prefix range covering the link-address. The selection scope is the pool or a prefix range within the pool.
The no form of this command reverts to the default.
no link-address
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x - [0 to FFFF]H | |
d - [0 to 255]D |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command specifies the link address of the relayed DHCPv6 packets sent by the system.
no link-address
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables the configuration context for handling the link-bandwidth extended community attached to specific BGP routes.
When all used multipaths of an IP prefix correspond to BGP routes with a link-bandwidth extended community, the datapath is programmed to do weighted ECMP across the BGP next-hops in proportion to the bandwidth values.
All
This command enables the configuration context for handling the link-bandwidth extended community attached to specific BGP routes.
When all used multipaths of an IP prefix correspond to BGP routes with a link-bandwidth extended community, the datapath is programmed to do weighted ECMP across the BGP next-hops in proportion to the bandwidth values.
All
This command specifies the time to delay between detection of a link activation/deactivation condition and acting upon it (going in/out of the RX failure state on a link).
7450 ESS, 7750 SR-7/12/12e
This command defines how to react to the reception of a link fault flag set in the informational PDU from a peer.
link-fault local-port-action out-of-service
All
This command configures a link-group for the router or VPRN instance.
The no form of this command removes the specified link-group.
All
This command specifies the IS-IS link group associated with this particular level of the interface.
All
This command configures the IPv6 Link Local address that is used as a virtual SRRP IPv6 address by the Master SRRP node. This address is sent in the Router Advertisements initiated by the Master SRRP node. Clients use this address as IPv6 default-gateway. Both SRRP nodes, Master and Backup, must be configured with the same Link Local address.
Only one link-local-address is allowed per interface.
![]() | Caution: Removing a manually configured link local address may impact routing protocols or static routes that have a dependency on that address. It is not recommended to remove a link local address when there are active IPv6 subscriber hosts on an IES or VPRN interface. |
The no form of this command reverts to the default.
ipv6-address: | x:x:x:x:x:x:x:x |
x:x:x:x:x:x:d.d.d.d | |
x - [0..FFFF]H | |
d - [0..255]D |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command configures the Cryptographically Generated Address (CGA) modifier for link-local addresses.
All
This command configures the Cryptographically Generated Address (CGA) modifier for link-local addresses.
This command configures the Cryptographically Generated Address (CGA) modifier for link-local addresses.
All
This command creates the link map profile that can to control which LAG ports are to be used on egress or enables the configuration context for previously created link map profile. link map profiles are not created by default.
The no form of this command, deletes the specified link map profile.
All
Commands in this context configure various link measurement template attributes that are inherited on associated IP interfaces for delay reporting to the routing engine.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
When the link monitoring function is in a no shutdown state, the Link Monitoring capability (EV) is advertised to the peer through the EFM OAM protocol. This may not be desired if the remote peer does not support the Link Monitoring functionality.
The no version of this command suppresses the advertisement of capabilities.
link-monitoring
All
This context contains link monitoring specific options defining the various local thresholds, port interaction and peer notification methods. In order to activate Link monitoring function, this context must be configured with the no shutdown option. Shutting down link monitoring will clear all historical link monitoring counters. If the port was removed from service and placed in a non-operational down state and a port state of link up because a signal failure threshold was crossed and link monitoring is shutdown, the port will be returned to service assuming no underlying conditions prevent this return to service.
When the link monitoring function is in a no shutdown state, the Link Monitoring capability (EV) is advertised to the peer through the EFM OAM protocol. This may not be desired if the remote peer does not support the Link Monitoring functionality.
All
This command configures text names for the TE Link.
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures a link-specific rate for CPU protection. This limit is applied to all ports within the system. The CPU will receive no more than the configured packet rate for all link level protocols such as LACP from any one port. The measurement is cleared each second and is based on the ingress port.
link-specific-rate 15000
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
This command enables the export of link-state information from the BGP-LS address family into the local Traffic Engineering Database (TED).
The no form of this command disables the export of link state information into the TED.
no link-state-export-enable
All
This command enables the import of link-state information into the BGP-LS address family for advertisement to other BGP neighbors.
The no form of this command disables the import of link state information into the BGP-LS address family.
no link-state-import-enable
All
This command instructs STP on the maximum number of bridges behind this SAP or spoke-SDP. If there is only a single bridge, transitioning to forwarding state will be based on handshaking (fast transitions). If more than two bridges are connected via a shared media, their SAP or spoke-SDPs should all be configured as shared, and timer-based transitions are used.
The no form of this command returns the link type to the default value.
link-type pt-pt
All
This command instructs STP on the maximum number of bridges behind this SAP or spoke SDP. If there is only a single bridge, transitioning to forwarding state will be based on handshaking (fast transitions). If more than two bridges are connected via a shared media, their SAP or spoke SDPs should all be configured as shared, and timer-based transitions are used.
The no form of this command returns the link type to the default value.
link-type pt-pt
All
The command initiates a linktrace test.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies a live output destination for this trace. When configured, captures will not be stored locally but sent (over UDP) to the server in the specified routing context. The destination can be specified as either an IP address or a DNS FQDN. The live-output and debug-output commands are mutually exclusive.
The no form of this command disables live output streaming.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure Link Layer Discovery Protocol (LLDP) parameters on the specified port.
All
Commands in this context configure Link Layer Discovery Protocol (LLDP) parameters on the specified port.
All
Commands in this context configure system-wide Link Layer Discovery Protocol parameters.
All
This command enables Link Loss Forwarding (LLF) on an Ethernet port or an ATM port. This feature provides an end-to-end OAM fault notification for Ethernet VLL service and for ATM VLL service of vc-type atm-cell. It brings down the Ethernet port (Ethernet LLF) or sends a SONET/SDH Path AIS (ATM LLF) toward the attached CE when there is a local fault on the Pseudowire or service, or a remote fault on the SAP or pseudowire, signaled with label withdrawal or T-LDP status bits. It ceases when the fault disappears.
The Ethernet port must be configured for null encapsulation.
For the 7750 SR, the ATM port must be configured as a SAP on an Apipe service of vc-type atm-cell. The ATM port must also be configured on the following MDAs:
The ATM port must be configured as a SAP on an Apipe service of vc-type atm-cell. The ATM port must also be configured on the following MDAs:
This feature is also supported in Epipes with BGP-EVPN enabled. In this case, upon removal of the EVPN destination, the port is brought oper-down with flag LinkLossFwd, however the AD per-EVI route for the SAP is still advertised (the SAP is kept oper-up).
The no form of this command disables LLF on an Ethernet port or an ATM port.
no llf
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
All
This debug command enables tracing of all the LMI messages in both receive and transmit directions for one or all of the Frame Relay interfaces. All types of Frame Relay interfaces are supported. If the port ID is not specified, debug is enabled on all Frame Relay interfaces.
The no form of this command turns off LMI and Frame-Relay debugging, debug>frame-relay>no lmi and debug>no frame-relay.
port-id | slot/mda/port [.channel] | ||
eth-sat-id | esat-id/slot/port | ||
esat | keyword | ||
id | 1 to 20 | ||
pxc-id | pxc-id.sub-port | ||
pxc | keyword | ||
id | 1 to 64 | ||
sub-port | a, b |
The following output is an example of frame relay LMI information.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the Local Management Interface (LMI) type for Frame Relay interfaces. LMIs are sets of enhancements to the basic Frame Relay specification.
The no form of this command changes the LMI type back to the default value.
itu
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
This command configures the LMM test ID to be assigned to the Tx and Rx counter-based loss test and creates the individual test. LMM does not carry this test ID in the PDU; the value is of local significance.
The no form of this command removes the LMM test function from the PM Session.
All
This command creates a context for the configuration of the Link Management Protocol (LMP) on the system.
no lmp
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the ISA LNS group for the L2TP group.
The no form of this command removes the LNS group ID from the configuration.
no lns-group
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures an LNS group.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command loads a previously saved candidate configuration into the current candidate. The edit point will be set to the end of the loaded configuration lines. The candidate configuration cannot be modified while a load is in progress.
If the candidate is empty then a load without any of the optional parameters (such as overwrite, and so on) will load the file-url into the candidate. If the candidate is not empty then one of the options, such as overwrite, insert, and so on, must be specified.
This command specifies the key used in calculating a hash to select an external RADIUS server from the pool of configured servers.
The key can be the source IP and source UDP port tuple, or the specified RADIUS attribute in RADIUS packets.
The no form of this command removes the parameters from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command is applicable only to LNS. By default traffic load balancing between the BB-ISAs is based on sessions. Each session is individually assigned to an BB-ISA during session establishment phase.
By introducing MLPPPoX, all sessions of a bundle must be terminated on the same LNS BB-ISA. This is necessary for two reasons:
Therefore, if fragmentation is enabled, load-balancing per tunnel must be configured. In the per tunnel load-balancing mode, all sessions within the same tunnel are terminated on the same LNS BB-ISA.
In the case that we have MLPPPoX sessions with a single member link, both load-balancing methods are valid.
The no form of this command reverts to the default.
load-balance-method per-session
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables the load-balancing context to configure interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
not applicable
All
This command enables the load-balancing context to configure interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
This command enables the load-balancing context to configure interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
All
This command enables the load-balancing context to configure interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
All
This command enables the load-balancing context to configure interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
All
This command enables the load-balancing context to configure the interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
All
This command specifies the load balancing algorithm to be used on this port.
In the default mode, no load-balancing-algorithm, the port inherits the global settings. The value is not applicable for ports that do not pass any traffic.
The configuration of load-balancing-algorithm at logical port level has three possible values:
The hashing algorithm addresses finer spraying granularity where many hosts are connected to the network. To address more efficient traffic distribution between network links (forming a LAG group), a hashing algorithm extension takes into account Layer 4 information (src/dst L4-protocol port). The hashing index can be calculated according to the following algorithm:
If [(TCP or UDP traffic) & enabled]
hash (<TCP/UDP ports>, <IP addresses>)
else if (IP traffic)
hash (<IP addresses>)
else
hash (<MAC addresses>)
endif
This algorithm will be used in all cases where IP information in per-packet hashing is included (refer to “Traffic Load Balancing Options” in the 7450 ESS, 7750 SR, 7950 XRS, and VSR Interface Configuration Guide). However the Layer 4 information (TCP/UDP ports) will not be used in the following cases:
no load-balancing-algorithm
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
All
This command configures a weighted ECMP load-balancing weight for a static route next-hop.
If all of the ECMP next-hops of a static route have a configured load-balancing-weight then packets matching the route are sprayed according to the relative weights. In other words, the next-hop interface with the largest load-balancing weight should receive the most forwarded traffic if weighted ECMP is applicable.
The no form of this command disables weighted ECMP for the interface and effectively disables weighted ECMP for the entire static route.
All
This command configures the weighted ECMP load-balancing weight for an IS-IS, OSPF, and OSPF3 interface. If the interface becomes an ECMP next hop for an IPv4 or IPv6 route, and all the other ECMP next hops are interfaces with configured (non-zero) load-balancing weights, then the traffic distribution over the ECMP interfaces is proportional to the weights. This means that the interface with the largest load-balancing weight receives the most forwarded traffic if weighted ECMP is applicable.
The no form of this command disables weighted ECMP for the interface which effectively disables weighted ECMP for any IP prefix that has this interface as a next hop.
no load-balancing-weight
All
This command configures the weighted ECMP load-balancing weight for an IS-IS interface of the VPRN. If the interface becomes an ECMP next-hop for IPv4 or IPv6 route and all the other ECMP next-hops are interfaces with configured (non-zero) load-balancing weights, then the traffic distribution over the ECMP interfaces is proportional to the weights. In other words, the interface with the largest load-balancing-weight should receive the most forwarded traffic if weighted ECMP is applicable.
The no form of this command disables weighted ECMP for the interface and, therefore, effectively disables weighted ECMP for any IP prefix that has this interface as a next-hop.
no load-balancing-weight
All
This command configures the load balancing weight for the LDP interface. The load balancing weight, normalized to 64, is used for weighted ECMP of LDP labeled packets over direct network IP interfaces.
If the interface becomes an ECMP next hop for an LDP FEC, and all the other ECMP next hops are interfaces with configured (non-zero) load-balancing weights, then the traffic distribution over the ECMP interfaces is proportional to the normalized weight with a granularity of 64.
If one or more of the LDP interfaces in the ECMP set does not have a configured load-balancing weight, then the system falls back to ECMP.
The no form of this command removes the load balancing weight for the LDP interface.
All
This command assigns a weight to an MPLS LSP for use in the weighted load-balancing, or weighted ECMP, over MPLS feature.
All
This command configures the load balancing weight of an NHG entry in a forwarding policy.
A weight for each NHG of a policy must be assigned to the weighted ECMP forwarding to operate over the set of NHGs of the policy.
The no form of this command removes the load balancing weight from an NHG entry in a forwarding policy.
All
This command configures a weighted ECMP load-balancing weight for a static route next-hop.
If all of the ECMP next-hops of a static route have a configured load-balancing-weight then packets matching the route are sprayed according to the relative weights. In other words, the next-hop interface with the largest load-balancing weight should receive the most forwarded traffic if weighted ECMP is applicable.
The no form of this command disables weighted ECMP for the interface and effectively disables weighted ECMP for the entire static route.
All
This command configures the weighted ECMP load-balancing weight for an IS-IS interface. If the interface becomes an ECMP next hop for an IPv4 or IPv6 route, and all the other ECMP next hops are interfaces with configured (non-zero) load-balancing weights, then the traffic distribution over the ECMP interfaces is proportional to the weights. In other words, the interface with the largest load-balancing weight should receive the most forwarded traffic if weighted ECMP is applicable.
The no form of this command disables weighted ECMP for the interface and therefore effectively disables weighted ECMP for any IP prefix that has this interface as a next hop.
no load-balancing-weight
All
This command configures the weighted ECMP load-balancing weight for an OSPF or OSPF3 interface. If the interface becomes an ECMP next hop for an IPv4 or IPv6 route, and all the other ECMP next hops are interfaces with configured (non-zero) load-balancing weights, then the traffic distribution over the ECMP interfaces is proportional to the weights. This means that the interface with the largest load-balancing weight receives the most forwarded traffic if weighted ECMP is applicable.
The no form of this command disables weighted ECMP for the interface which effectively disables weighted ECMP for any IP prefix that has this interface as a next hop.
no load-balancing-weight
All
This command enables a session that is set up with local control plane handling to use this SLA profile. This command cannot be disabled.
local
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables a session that is set up with local control plane handling to use this subscriber profile. This command cannot be disabled.
local
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command overrides the global configuration of the TTL propagation for locally generated packets which are forwarded over a MPLS LSPs in a given VPRN service context.
The global configuration is performed under config>router>ttl-propagate>vprn-local.
The default behavior for a given VPRN instance is to inherit the global configuration for the same command. The user can explicitly set the default behavior by configuring the inherit value
local inherit
All
Commands in this context configure local TS-list parameters. The TS-list is the traffic selector of the local system, such as TSr, when the system acts as an IKEv2 responder.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the local address.
The no form of this command removes the local IP address from the configuration.
no local-address
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the local IP address used by the group or neighbor when communicating with BGP peers.
Outgoing connections use the local-address as the source of the TCP connection when initiating connections with a peer.
When a local address is not specified, the 7750 SR OS uses the system IP address when communicating with IBGP peers and uses the interface address for directly connected EBGP peers. This command is used at the neighbor level to revert to the value defined under the group level.
The no form of this command removes the configured local-address for BGP.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
For IPv4, the local address is expressed in dotted decimal notation. Allowed values are a valid routable IP address on the router, either an interface or system IP address.
For IPv6, the local address is expressed in semi-colon hexadecimal notation. Allowed values is an interface or a system IP address.
ipv4-address: | a.b.c.d |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x - [0 to FFFF]H | |
d - [0 to 255]D |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the source ip-address used in the connection towards the neighbor. The local address is optional. If specified the node will accept connections only for that address in the service running ANCP. The address may be created after the reference but connections will not be accepted until it is created. If the local address is not used, the system accepts connections on any interface within the routing context.
The no form of this command reverts to the default.
All
This command enables matching on tunnels that are terminated by the specified IP address on the WLAN-GW.
The no form of this command disables matching on the local IP address.
no local-address
7750 SR, 7750 SR-e, 7750 SR-s, VSR
Configures the local IP address used by the group or neighbor when communicating with BGP peers.
Outgoing connections use the local-address as the source of the TCP connection when initiating connections with a peer.
When a local address is not specified, the OS uses the system IP address when communicating with IBGP peers and uses the interface address for directly connected EBGP peers. This command is used at the neighbor level to revert to the value defined under the group level.
The no form of this command removes the configured local-address for BGP.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
All
This command configures the local end of a Multicast Source Discovery Protocol (MSDP) session. For MSDP to function, at least one peer must be configured. When configuring a peer, you must include this local-address command to configure the local end of the MSDP session. This address must be present on the node and is used to validate incoming connections to the peer and to establish connections to the remote peer.
If the user enters this command, then the address provided is validated and will be used as the local address for MSDP peers from that point. If a subsequent local-address command is entered, it will replace the existing configuration and existing sessions will be terminated.
Similarly, when the no form of this command is entered, the existing local address will be removed from the configuration and the existing sessions will be terminated.
Whenever a session is terminated, all information pertaining to and learned from that peer will be removed.
Whenever a new peering session is created or a peering session is lost, an event message should be generated.
The no form of this command removes the local address from the configuration.
no local-address
All
This command configures the local address of the PCEP speaker.
The PCEP protocol operates over TCP using destination TCP port 4189. The PCE client (PCC) always initiates the connection. Once the user configures the PCEP local address and the peer address on the PCC, the latter initiates a TCP connection to the PCE. When the connection is established, the PCC and PCE exchange OPEN messages, which initializes the PCEP session and exchanges the session parameters to be negotiated.
The PCC always checks first if the remote PCE address is reachable out-of-band via the management port. If not, it will check if the remote PCE address is reachable in-band. When the session comes up out-of-band, the system IP address is always used. The local address configured by the user is only used for in-band sessions, and is otherwise ignored.
The no form of the command removes the configured local address of the PCEP speaker.
All
SCTE 30 requires a TCP session per zone-channel between the ad server and splicer for control communication and it requires UDP sessions on which the video ad stream is sent. This command specifies the splicer’s control IP address to which the ad-servers should setup TCP connections and the data IP address to which the video ad streams should be sent.
The no form of the command removes the address information from the local address configuration.
The values of control ip-address and the data ip-address specify the local IP address to which ad servers send SCTE 30 ad data streams, must be set together in the same SNMP request PDU or else the set request will fail with an inconsistent value error.
The values of the control ip-address and the data ip-address specify the local IP address to which ad servers send SCTE 30 ad control streams, must be set together in the same SNMP request PDU or else the set request will fail with an inconsistent value error.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-14s
This command configures the local end of a Multicast Source Discovery Protocol (MSDP) session. For MSDP to function, at least one peer must be configured. When configuring a peer, you must include this local-address command to configure the local end of the MSDP session. This address must be present on the node and is used to validate incoming connections to the peer and to establish connections to the remote peer.
If the user enters this command, then the address provided is validated and will be used as the local address for MSDP peers from that point. If a subsequent local-address command is entered, it will replace the existing configuration and existing sessions will be terminated.
Similarly, when the no form of this command is entered, the existing local-address will be removed from the configuration and the existing sessions will be terminated.
Whenever a session is terminated, all information pertaining to and learned from that peer will be removed.
Whenever a new peering session is created or a peering session is lost, an event message should be generated.
The no form of this command removes the local-address from the configuration.
no local-address
All
This command configures the local address to use for setting up the TCP connection used by an RPKI-Router session. The default local-address is the outgoing interface IPv4 or IPv6 address. The local-address cannot be changed without first shutting down the session.
no local-address
All
This command configures the local IP address used by the group or neighbor when communicating with BGP peers.
Outgoing connections use the local-address as the source of the TCP connection when initiating connections with a peer.
When a local address is not specified, the router uses the system IP address when communicating with IBGP peers and uses the interface address for directly connected EBGP peers. This command is used at the neighbor level to revert to the value defined under the group level.
When set to a router interface, the local-address inherits the primary IPv4 or IPv6 address of the router interface depending on whether BGP is configured for IPv4 or IPv6. If the corresponding IPv4 or IPv6 address is not configured on the router interface, the BGP sessions that have this interface set as the local-address are kept down until an interface address is configured on the router interface.
The no form of this command removes the configured local-address for BGP.
The no form of this command used at the group level returns the configuration to the value defined at the global level.
The no form of this command used at the neighbor level returns the configuration to the value defined at the group level.
no local-address
All
This command configures the local IP address used by the local router when communicating with the BMP monitoring station. This configuration is optional.
Outgoing connections use the local-address as the source of the TCP connection when initiating connections with a monitoring station.
The BMP session may flap when this parameter is changed. Shut down the BMP session before changing the values.
The no form of this command removes the configured local-address for the BMP session. The default is to use the system IP address.
local-address ip-address (system IP address)
All
Commands in this context configure local address assignment parameters.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables debugging for local-address-assignment events.
The no form of this command disables debugging.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure local address assignments for the IPsec gateway.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Specifies the aging time for locally learned MAC addresses in the forwarding database (FDB) for the Virtual Private LAN Service (VPLS) instance. In a VPLS service, MAC addresses are associated with a Service Access Point (SAP) or with a Service Distribution Point (SDP). MACs associated with a SAP are classified as local MACs, and MACs associated with an SDP are remote MACs.
Like in a Layer 2 switch, learned MACs can be aged out if no packets are sourced from the MAC address for a period of time (the aging time). In each VPLS service instance, there are independent aging timers for local learned MAC and remote learned MAC entries in the FDB. The local-age timer specifies the aging time for local learned MAC addresses.
The no form of this command returns the local aging timer to the default value.
local age 300 — Local MACs aged after 300 seconds.
All
This command configures a BGP virtual autonomous system (AS) number.
In addition to the AS number configured for BGP in the config>router>autonomous-system context, a virtual (local) AS number is configured. The virtual AS number is added to the as-path message before the router’s AS number makes the virtual AS the second AS in the as-path.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). Thus, by specifying this at each neighbor level, it is possible to have a separate as-number per EBGP session.
When a command is entered multiple times for the same AS, the last command entered is used in the configuration. The private attribute can be added or removed dynamically by reissuing the command.
Changing the local AS at the global level in an active BGP instance causes the BGP instance to restart with the new local AS number. Changing the local AS at the global level in an active BGP instance causes BGP to re-establish the peer relationships with all peers in the group with the new local AS number. Changing the local AS at the neighbor level in an active BGP instance causes BGP to re-establish the peer relationship with the new local AS number.
This is an optional command and can be used in the following circumstance:
Provider router P is moved from AS1 to AS2. The customer router that is connected to P, however, is configured to belong to AS1. To avoid reconfiguring the customer router, the local-as value on router P can be set to AS1. Thus, router P adds AS1 to the as-path message for routes it advertises to the customer router.
The no form of this command used at the global level will remove any virtual AS number configured.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures a BGP virtual autonomous system (AS) number.
In addition to the global AS number configured for BGP in the config>router>autonomous-system context, a virtual (local) AS number can be configured to support various AS number migration scenarios. The local AS number is added to the to the beginning the as-path attribute ahead of the router’s AS number.
This configuration parameter can be set at three levels: global level (applies to all EBGP peers), group level (applies to all EBGP peers in peer-group) or neighbor level (only applies to EBGP specified peer). Thus, by specifying this at each neighbor level, it is possible to have a separate local-as per EBGP session. The local-as command is not supported for IBGP sessions. When the optional private keyword is specified in the command the local-as number is not added to inbound routes from the EBGP peer that has local-as in effect.
When a command is entered multiple times for the same AS, the last command entered is used in the configuration. The private attribute can be added or removed dynamically by reissuing the command.
Changing the local AS at the global level in an active BGP instance causes the BGP instance to restart with the new local AS number. Changing the local AS at the global level in an active BGP instance causes BGP to re-establish the peer relationships with all peers in the group with the new local AS number. Changing the local AS at the neighbor level in an active BGP instance causes BGP to re-establish the peer relationship with the new local AS number.
This is an optional command and can be used in the following circumstance:
Provider router P is moved from AS1 to AS2. The customer router that is connected to P, however, is configured to belong to AS1. To avoid reconfiguring the customer router, the local-as value on router P can be set to AS1. Thus, router P adds AS1 to the as-path message for routes it advertises to the customer router.
The no form of this command used at the global level removes any virtual AS number configured.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no local-as
All
This command configures a BGP local autonomous system (AS) number. In addition to the global AS number configured for BGP using the autonomous-system command, a local AS number can be configured to support various AS number migration scenarios.
When the local-as command is applied to a BGP neighbor and the local-as is different from the peer-as, the session comes up as EBGP and by default the global-AS number and then (in that order) the local-as number are prepended to the AS_PATH attribute in outbound routes sent to the peer. In received routes from the EBGP peer, the local AS is prepended to the AS path by default, but this can be disabled with the private option.
When the local-as command is applied to a BGP neighbor and the local-as is the same as the peer-as, the session comes up as IBGP, and by default, the global-AS number is prepended to the AS_PATH attribute in outbound routes sent to the peer.
This configuration parameter can be set at three levels: global level (applies to all BGP peers), group level (applies to all BGP peers in group) or neighbor level (only applies to one specific BGP neighbor). By specifying this at the neighbor level, it is possible to have a separate local-as for each BGP session.
When the optional no-prepend-global-as command is configured, the global-as number is not added in outbound routes sent to an IBGP or EBGP peer.
When a command is entered multiple times for the same AS, the last command entered is used in the configuration. The private option can be added or removed dynamically by reissuing the command. Changing the local AS at the global level in an active BGP instance causes the BGP instance to restart with the new local AS number. Changing the local AS at the global level in an active BGP instance causes BGP to re-establish the peer relationships with all peers in the group with the new local AS number. Changing the local AS at the neighbor level in an active BGP instance causes BGP to re-establish the peer relationship with the new local AS number.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no local-as
All
This command configures a local attachment circuit (AC) in which the local Ethernet tag can be configured.
The no form of this command disables the context.
no local-attachment-circuit
All
This command configures the local authentication database to be used for local authentication of data-triggered dynamic services.
Local authentication and RADIUS authentication are mutually exclusive.
The no form of this command removes the local authentication database from the configuration and disables local authentication.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command creates a local authentication database that can be used for local authentication of data-triggered dynamic services.
The no form of this command removes the local authentication database from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command instantiates a local DHCP server. A local DHCP server can serve multiple interfaces but is limited to the routing context it was which it was created.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command instantiates a DHCP6 server. A local DHCP6 server can serve multiple interfaces but is limited to the routing context it was which it was created.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables, disables or configures debugging for a local DHCP server.
ipv6-address: | x:x:x:x:x:x:x:x [-interface] |
x:x:x:x:x:x:d.d.d.d [-interface] | |
x: [0 to FFFF]H | |
d: [0 to 255]D | |
interface | up to 32 characters, mandatory for link local addresses |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command synchronizes DHCP server information.
no local-dhcp-server
All
This command assigns a DHCP server to the interface.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command instantiates a local DHCP server. A local DHCP server can serve multiple interfaces but is limited to the routing context in which it was created.
The no form of this command reverts to the default value.
no local-dhcp-server
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command defines the Emulated Circuit Identifiers (ECID) to be used for the local (source) end of the circuit emulation service.
The no form of this command removes the ECID from the configuration.
local-ecid 65535
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
This command configures the local-end address of the following SDP encapsulation types:
A change to the value of the local-end parameter requires that the SDP be shut down.
When used as the source address of a SDP of encapsulation gre (GRE SDP), the primary IPv4 address of any local network IP interface, loopback or otherwise, may be used.
The address of the following interfaces are not supported:
The local-end parameter value adheres to the following rules:
The no form of the command removes the address from the local-end configuration.
ip-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x - [0..FFFF]H | ||
d - [0..255]D |
All
This command configures the local port on which Fast Channel Change (FCC) requests are received. The value of this object can only be set for the default bundle and will be used by all bundles and channels.
The local-fcc-port port value is the only configuration parameter in the bundle “default” context.
The no form of the command removes the port from the video configuration.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-14s
This command configures a URL filter policy for local filtering in order to filter traffic based on a list of URLs located on a file stored in the router compact flash.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates a local-forward instance.
A local-forward instance creates a traffic bypass within the Ethernet satellite, which allows traffic to be forwarded between satellite client ports.
The no form of this command deletes the specified local-forward instance.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures local gateway address of the IPsec gateway.
VSR
This command configures local gateway address of the IPsec gateway.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies the local gateway address used for the tunnel and the address of the remote security gateway at the other end of the tunnel remote peer IP address to use.
no local-gateway-address
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command specifies the local ID used for IDi or IDr for IKEv2 negotiation.
The default behavior depends on the local-auth-method as follows:
The no form of this command removes the parameters from the configuration.
no local-id
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
VSR
This command configures the local (from the VPN) IP prefix/mask for the policy parameter entry.
Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
VSR
This command is used to specify the IPv4 or IPv6 address of the BFD source.
The no form of this command removes this address from the configuration.
no local-ip-address
ipv4-address: | a.b.c.d |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x:-[0 to FFFF]H | |
d: [0 to 255]D |
All
This command configures the first IP address that is assigned to a first member ISA in the nat-group. The remaining member ISAs in the nat-group are automatically assigned the consecutive IP addresses, starting from the first IP address. These IP addresses are used to communicate between the ISAs on redundant nodes for the purpose of flow synchronization. Traffic from the first local IP address (member ISA), is sent to the first IP address from the remote IP range.
The no form of this command reverts to the default.
no local-ip-range-start
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command enables the use of the address of the local LDP interface, or any other network interface configured on the system, as the LSR-ID to establish link LDP Hello adjacency and LDP session with directly connected LDP peers. The network interface can be a loopback or not.
Link LDP sessions to all peers discovered over a given LDP interface share the same local LSR-ID. However, LDP sessions on different LDP interfaces can use different network interface addresses as their local LSR-ID.
By default, the LDP session to a peer uses the system interface address as the LSR-ID unless explicitly configured using this command. The system interface must always be configured on the router, or the LDP protocol will not come up on the node. There is no requirement to include the system interface in any routing protocol.
At initial configuration, the LDP session to a peer will remain down while the network interface used as LSR-ID is down. LDP will not try to bring it up using the system interface.
If the network IP interface used as LSR-ID goes down, the LDP sessions to all discovered peers using this LSR-ID go down.
When an interface other than the system is used as the LSR-ID, the transport connection (TCP) for the link LDP session will also use the address of that interface as the transport address. If the system or interface value is configured in the config>router>ldp>if-params>if>ipv4 or config>router>ldp>if-params>if>ipv6>transport-address context, it will be overridden with the address of the LSR-ID interface.
When the local-lsr-id command is enabled with the 32bit-format option, an SR OS LSR will be able to establish an LDP IPv6 Hello adjacency and an LDP IPv6 session with an RFC 7552 compliant peer LSR. The LSR uses a 32-bit LSR-ID set to the value of the IPv4 address of the specified local LSR-ID interface and a 128-bit transport address set to the value of the IPv6 address of the specified local LSR-ID interface.
![]() | Note: The system interface cannot be used as a local LSR-ID with the 32bit-format option enabled because the system interface is the default LSR-ID and transport address for all LDP sessions to peers on this LSR. This configuration is blocked in the CLI. |
If the user enables the 32bit-format option in the IPv6 context of a running LDP interface, the already established LDP IPv6 Hello adjacency and LDP IPv6 session will be brought down and re-established with the new 32-bit LSR-ID value.
If the user changes the LSR-ID value between system, interface, and interface-name, or enables the 32bit-format option while the LDP session is up, LDP will immediately tear down all sessions using this LSR-ID and will attempt to re-establish them using the new LSR-ID.
The no form of this command returns to the default behavior, in which case the system interface address is used as the LSR-ID.
no local-lsr-id
All
This command enables the use of the address of any network interface configured on the system, as the LSR-ID to establish a targeted LDP Hello adjacency and a targeted LDP session with an LDP peer. The network interface can be a loopback or not.
By default, the targeted LDP session to a peer uses the system interface address as the LSR-ID and as the transport address, unless explicitly configured using this command. The system interface must always be configured on the router, or the LDP protocol will not come up on the node. There is no requirement to include the system interface in any routing protocol.
When the local-lsr-id command is enabled with the 32bit-format option, an SR OS LSR will be able to establish a targeted LDP IPv6 Hello adjacency and a targeted LDP IPv6 session with an RFC 7552 compliant peer LSR. The LSR uses a 32-bit LSR-ID set to the value of the IPv4 address of the specified local LSR-ID interface and a 128-bit transport address set to the value of the IPv6 address of the specified local LSR-ID interface.
![]() | Note: The system interface cannot be used as a local LSR-ID with the 32bit-format option enabled because the system interface is the default LSR-ID and transport address for all targeted LDP sessions to peers on this LSR. This configuration is blocked in the CLI. |
If the user enables the 32bit-format option in the IPv6 context of a running targeted LDP peer, the already established targeted LDP IPv6 Hello adjacency and targeted LDP IPv6 session will be brought down and re-established with the new 32-bit LSR-ID value.
If the user changes the local LSR-ID value or enables/disables the 32bit-format option, while the targeted LDP session is up, LDP will immediately tear down the targeted session using this LSR-ID and will attempt to re-establish it using the new LSR-ID.
The no form of this command returns to the default behavior, in which case the system interface address is used as the LSR-ID.
no local-lsr-id
All
This command configures the maximum number of rollback checkpoint files when the rollback-location is on local compact flash.
no local-max-checkpoints
All
This command configures a monitoring policer that is used to monitor the aggregate rate of several protocols arriving on an object (for example, SAP). When the local-monitoring-policer is determined to be in a nonconforming state (at the end of a minimum monitoring time of 60 seconds) then the system will attempt to allocate dynamic policers for the particular object for any protocols associated with the local monitor (for example, using the protocol name enforcement dynamic policer-name CLI command).
If the system cannot allocate all the dynamic policers within 150 seconds, it will stop attempting to allocate dynamic policers, raise a LocMonExcdAllDynAlloc log event, and go back to using the local monitor. The local monitor may then detect exceeded packets again and make another attempt at allocating dynamic policers.
Once this policer-name is referenced by a protocol then this policer will be instantiated for each “object” that is created and references this DDoS policy. If there is no policer free then the object will be blocked from being created.
All
This command creates the local host name used by this system for the tunnels in this L2TP group during the authentication phase of tunnel establishment. It can be used to distinguish tunnels.
The no form of this command removes the host name from the configuration.
no local-name
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the parameters that define if and how the local port will be affected when the local signal failure threshold (sf-threshold) has been reached within the configured window.
Interactions: The signal failure threshold will trigger these actions.
local-port-action out-of-service
All
This command enables setting the BGP local-preference attribute in incoming routes if not specified and configures the default value for the attribute. This value is used if the BGP route arrives from a BGP peer without the local-preference integer set.
The specified value can be overridden by any value set via a route policy.
The no form of this command at the global level specifies that incoming routes with local-preference set are not overridden and routes arriving without local-preference set are interpreted as if the route had local-preference value of 100.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables setting the BGP local-preference attribute in incoming routes if not specified and configures the default value for the attribute. This value is used if the BGP route arrives from a BGP peer without the local-preference integer set.
The specified value can be overridden by any value set via a route policy. This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific value is used.
The no form of this command at the global level specifies that incoming routes with local-preference set are not overridden and routes arriving without local-preference set are interpreted as if the route had local-preference value of 100.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no local-preference - Does not override the local-preference value set in arriving routes and analyze routes without local preference with value of 100.
All
This command enables setting the BGP local-preference attribute in incoming routes if not specified and configures the default value for the attribute.
This value is used if the BGP route arrives from a BGP peer without the local-preference integer set.
The specified value can be overridden by any value set via a route policy. This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to the specified peer). The most specific value is used.
The no form of this command at the global level specifies that incoming routes with local-preference set are not overridden and routes arriving without local-preference set are interpreted as if the route had local-preference value of 100.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
no local-preference
All
This command matches BGP routes based on local preference (the value in the LOCAL_PREF attribute).
If no comparison qualifiers are present (equal, or-higher, or-lower), then equal is the implied default.
A non-BGP route does not match a policy entry if it contains the local-preference command.
no local-preference
All
This command assigns a BGP local preference to routes matching a route policy statement entry.
If no local preference is specified, the BGP configured local preference is used.
The no form of this command disables assigning a local preference in the route policy entry.
no local-preference
All
This command configures one or more node prefix values to be used for MS-PW routing. At least one prefix must be configured on each node that is an S-PE or a T-PE.
The no form of this command removes a previously configured prefix, and will cause the corresponding route to be withdrawn if it has been advertised in BGP.
no local-prefix
ip-addr | a.b.c.d |
raw-prefix | 1 to 4294967295 |
global-id | 1 to 4294967295 |
All
This command configures the local priority used to choose between PTP masters in the best master clock algorithm (BMCA). This setting is relevant when the profile is set to either g8265dot1-2010 or g8275dot1-2014. The parameter is ignored when any other profile is selected.
The value 1 is the highest priority and 255 is the lowest priority. The priority of a peer cannot be configured if the PTP profile is ieee1588-2008.
For g8265dot1-2010, this parameter configures the priority used to choose between master clocks with the same quality (see G.8265.1 for more information).
For g8275dot1-2014, this parameter sets the value of the localPriority associated with the Announce messages received from external clocks (ptp>peer or ptp>port), or the local clock (ptp). See G.8275.1 for more information.
local-priority 128
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the local priority used to choose between PTP masters in the best master clock algorithm (BMCA). This setting is relevant when the profile is set to either g8265dot1-2010 or g8275dot1-2014. The parameter is ignored when any other profile is selected.
The value 1 is the highest priority and 255 is the lowest priority. The priority of a peer cannot be configured if the PTP profile is ieee1588-2008.
For g8265dot1-2010, this parameter configures the priority used to choose between master clocks with the same quality (refer to G.8265.1 for more details).
For g8275dot1-2014, this parameter sets the value of the localPriority associated with the Announce messages received from the external clocks (ptp>peer or ptp>port), or the local clock (PTP). Refer to G.8275.1 for detailed information.
local-priority 128
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables local proxy ARP. When local proxy ARP is enabled on an IP interface, the system responds to all ARP requests for IP addresses belonging to the subnet with its own MAC address, and thus becomes the forwarding point for all traffic between hosts in that subnet.
When local-proxy-arp is enabled, ICMP redirects on the ports associated with the service are automatically blocked.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
All
This command enables local proxy ARP on the interface.
no local-proxy-arp
All
This command enables local proxy neighbor discovery on the interface.
When this command is enabled, the interface replies to neighbor solicitation requests when both the hosts are on the same subnet. In this case, ICMP redirects are disabled. When this command is disabled, the interface does not reply to neighbor solicitation requests if both the hosts are on the same subnet.
The no form of this command reverts to the default.
All
This command enables local proxy neighbor discovery on the interface.
The no form of this command disables local proxy neighbor discovery.
All
This command specifies the domain ID that is used in the D-PATH attribute for local routes before those routes are exported to a BGP neighbor using BGP-IPVPN, EVPN-IFF, EVPN-IFL or PE-CE BGP. A local route is a non-BGP route installed in the VPRN route table and learned using static route or an IGP.
The domain IDs are used in the D-PATH attribute, in accordance with draft-ietf-bess-evpn-ipvpn-interworking. The D-PATH attribute is modified by gateway routers, where a gateway is defined as a PE where a VPRN is instantiated, and that VPRN advertises or receives routes from multiple BGP owners (for example, EVPN-IFL and BGP-IPVPN).
The D-PATH attribute is used on gateways to detect loops (for received routes where the D-PATH contains a local domain ID) and to make BGP best path selection decisions based on the D-PATH length (shorter D-PATH is preferred).
The no form of this command removes the domain ID for local routes.
no local-routes-domain-id
4byte-GlobalAdminValue:2byte-LocalAdminValue | ||
4byte-GlobalAdminValue: | 0 to 4294967295 | |
2byte-LocalAdminValue | 0 to 65535 |
All
This command configures the local port on which retransmission (RET) requests are received. The value of this object can only be set for the default bundle and will be used by all channels.
The local-rt-port port value is the only configuration parameter in the bundle “default” context.
The no form of the command removes the port from the video configuration.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-14s
This command enables the local RET server for the group. A local RET server cannot be enabled if an FCC server or ad insertion is enabled.
The no form of the command disables the server.
no local-rt-server
7450 ESS, 7750 SR-7/12/12e, 7750 SR-14s
This command enables the local retransmission server function for requests directed to the IP address.
The no form of the command disables the retransmission server.
no local-rt-server
7450 ESS, 7750 SR-7/12/12e, 7750 SR-14s
This command enables the local retransmission server capability on the ISA video group.
RET server parameters can be configured in a multicast information policy or a service, but the parameters will have no effect if the RET server is disabled or if the video group is administratively disabled (shutdown).
The no form of the command returns the parameter to the default value where the RET server is disabled on the video group.
no local-rt-server
7450 ESS, 7750 SR-7/12/12e, 7750 SR-14s
This command defines how crossing the local signal failure threshold (sf-threshold) will be handled. This includes local actions and if and how to notify the peer that the threshold has been crossed.
All
This command is used to assign a source IP address in the respective persistent subscription context for use when packets are sent out.
The no form of this command removes this address from the configuration.
ipv4-address: | a.b.c.d |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x:-[0 to FFFF]H | |
d: [0 to 255]D |
This command configures a local source IP address in the destination group context for use when packets are sent out.
The no form of this command removes this address from the configuration.
no local-source-address
ipv4-address: | a.b.c.d |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x:-[0 to FFFF]H | |
d: [0 to 255]D |
All
This command configures the SR LFA protection needed for the adjacencies used in the path computation of an SR-TE LSP by the local CSPF.
The default value of the command is preferred. The local CSPF will prefer a protected adjacency over an unprotected adjacency whenever both exist for a TE link. However, the entire computed path can combine both types of adjacencies.
When the user enables the mandatory value, CSPF uses it as an additional path constraint and selects protected adjacencies exclusively in computing the path of the SR-TE LSP. CSPF will return no path if all candidate paths that otherwise satisfy all other LSP path constraints do not have an unprotected SID for each of their TE links.
Similarly, if the user enables the value none, CSPF uses it as an additional path constraint and selects unprotected adjacencies exclusively in computing the path of the SR-TE LSP. CSPF will return no path if all candidate paths that otherwise satisfy all other LSP path constraints do not have a protected SID for each of their TE links.
The no form of this command returns the command to its default value.
no local-sr-protection
All
This command specifies the setting of the local state field in reflected seamless BFD control packets.
The no form of this command means that the field is not explicitly set by the reflector.
local-state up
All
In a PBB Epipe with two SAPs and a PBB tunnel, this command controls whether the operational status of the PBB-Epipe service depends on the status of the PBB tunnel only.
local-switching-service-state sap
All
Commands in this context configure a local user database.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command specifies the local v6 prefix for the security-policy entry.
ipv6-address/prefix: ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
| x:x:x:x:x:x:d.d.d.d |
| x [0 to FFFF]H |
d [0 to 255]D | |
host bits must be 0 | |
:: not allowed | |
prefix-length [1 to 128] |
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
VSR
This command instructs the system where to write the persistency files for the corresponding application. Each application creates two files on the flash card, one with suffix .i<version>, referencing an index file, and the other with suffix .0<version>, where <version> is a 2-digit number reflecting the file version. These versions are not related to the SR OS release running on the node. The <version> can remain the same over two major releases, for example, when no format change is made to the persistency file. On boot, the system scans the file systems looking for the corresponding persistency files, and the load begins.
For example, in the subscriber management context, the location specifies the flash device on a CPM card where the data for handling subscriber management persistency is stored.
The no form of this command returns the system to the default. If there is a change in file location while persistence is running, a new file will be written on the new flash, and then the old file will be removed.
no location
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
All
This command specifies the compact flash (CF) configuration to store call trace files.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command instructs the system where to write the file. The name of the file is: appassure.db. On boot the system scans the file systems looking for appassure.db, if it finds it, it starts to load it.
The no form of this command returns the system to the default. If there is a change in file location while persistence is running, a new file will be written on the new flash, and then the old file will be removed.
no location
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command configures the remote location where the Python script will be exported. The Python script is then used off-line to perform reverse query. If this command is configured, the Python script generation is triggered by any modification of the deterministic NAT configuration. The new script reflects the change in mappings caused by configuration change. However, the script must be manually exported to the outside location with the admin nat save-deterministic-nat command. The script cannot be stored locally on the system.
The script allows two forms of queries:
Forward Query:
output:
Reverse Query:
output:
no location
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates a text string that identifies the system location for the device.
Only one location can be configured. If multiple locations are configured, the last one entered overwrites the previous entry.
The no form of the command reverts to the default value.
All
This command is used to identify the location of a script to be scheduled.
The no form of the command removes the location.
no location
All
This command specifies the primary and optional backup location where the log or billing file will be created.
The location command is optional. If the location command not explicitly configured, log files will be created on cf1: and accounting files will be created on cf2: without overflow onto other devices. Generally, cf3: is reserved for system files (configurations, images, and so on).
When multiple location commands are entered in a single file ID context, the last command overwrites the previous command.
When the location of a file ID that is associated with an active log ID is changed, the log events are not immediately written to the new location. The new location does not take effect until the log is rolled over either because the rollover period has expired or a clear log log-id command is entered to manually rollover the log file.
When creating files, the primary location is used as long as there is available space. If no space is available, an attempt is made to delete unnecessary files that are past their retention date.
If sufficient space is not available an attempt is made to remove the oldest to newest closed log or accounting files. After each file is deleted, the system attempts to create the new file.
A medium severity trap is issued to indicate that a compact flash is either not available or that no space is available on the specified flash and that the backup location is being used.
A high priority alarm condition is raised if none of the configured compact flash devices for this file ID are present or if there is insufficient space available. If space does becomes available, then the alarm condition will be cleared.
Log files are created on cf1: and accounting files are created on cf2.
Use the no form of this command to revert to default settings.
no location
This command configures the location ID for the for the route reflector. A BGP neighbor can be associated with a location if it is a route-reflector client.
All
This command configures the name of an SRv6 locator to be used by the routing protocols and services. This also creates the context to configure the locator block, locator node, function and argument lengths.
A limit of 16 locators per system is enforced.
The no form of this command removes the specified locator name.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command refers to a locator name defined under the config>router>segment-routing>srv6 context. This command assigns a locator to BGP for use with base router routes.
The no form of this command removes the reference to a locator name locator.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command refers to a locator name defined under the config>router>segment-routing>srv6 context.
This command assigns a locator to each algorithm in an IS-IS instance. The same locator of a specific algorithm number can be shared with other IGP instances and BGP instances in IP-VPN or EVPN.
The locator block, locator node, function and argument lengths are defined under the config>router>segment-routing>srv6 context.
The no form of this command removes the reference to a locator name.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command refers to a locator name defined under the config>router>segment-routing>srv6 context.
This command assigns a locator to the SRv6 instance in the service. The same locator can be referenced in multiple BGP instances used by IPVPN or EVPN.
The locator block, locator node, function and argument lengths are defined under the config>router>segment-routing>srv6 context.
The no form of this command removes the reference to a locator name.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS, VSR
This command authorizes a user associated with the profile to send a NETCONF <lock> operation. This lock operation allows a NETCONF client to lock a configuration datastore.
The no form of the command denies the user from requesting a lock.
no lock
All
This command allows a triggered EHS/CRON script to execute while there is a datastore lock, started by an MD interface, in place.
A triggered EHS/CRON script queues until an ongoing commit (or confirmed-commit) is done. When an EHS/CRON script is triggered while the lock-override CLI knob is on, SR OS behaves as follows.
When an exclusive session is in place:
When a global session is in place:
The no form of this command does not allow the script to execute while there is a datastore lock in place.
lock-override
All
This command enables the lockout mechanism for the IPsec tunnel. The system will lock out an IPsec client for the configured time interval if the number of failed authentications exceeds the configured value within the specified duration. This command only applies when the system acts as a tunnel responder.
A client is defined as the tunnel IP address plus the port.
Optionally, the max-port-per-ip parameter can be configured as the maximum number of ports allowed behind the same IP address. If this threshold is exceeded, then all ports behind the IP address are blocked.
The no form of this command disables the lockout mechanism.
no lockout
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command is used to clear any lockouts for a specific user, or for all users.
All
This command configures the time that needs to elapse from the point a client enters lockout to when the client’s lockout time can be reset to the configured minimum value. The range is 1 second.
The no form of this command reverts to the default value.
lockout-reset-time 60
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures the time for which a client stays in the lockout state during which authentication and ESM host creation is suppressed.
The no form of this command reverts to the default value.
lockout-time min 10 max 3600
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This optional parameter enables the ability to log transitions between active and in-active based on the CPE connectivity check. Events will be sent to the system log, syslog and SNMP traps.
no log
All
Commands in this context configure event logging within a specific VPRN.
By default, the log events in a VPRN log are a subset of the complete set of possible log events in SR OS. See the config>log>services-all-events command for more details.
All
Commands in this context configure an event log for LI.
All
This command associates a filter log to the current filter policy entry and therefore enables logging for that filter entry.
The filter log must exist before a filter entry can be enabled to use the filter log.
The no form of the command disables logging for the filter entry.
no log
All
This command, creates a configuration context for the specified filter log if it does not exist, and enables the context to configure the specified filter log.
The no form of the command deletes the filter log. The log cannot be deleted if there are filter entries configured to write to the log. All filter entry logging associations need to be removed before the log can be deleted.
log 101
All
This optional parameter enables the ability to log transitions between active and in-active based on the CPE connectivity check. Events will be sent to the system log, syslog and SNMP traps.
no log
All
This command enables match logging. When enabled, matches on this entry will cause the Security event mafEntryMatch to be raised.
no log
All
This command specifies the log in which packets matching this entry should be entered. The value zero indicates that logging is disabled.
The no form of this command deletes the log ID.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the announce message interval used for both unicast and multicast messages.
For unicast messages, it defines the announce message interval that is requested during unicast negotiation to any peer. This controls the announce message rate sent from remote peers to the local node. It does not affect the announce message rate that may be sent from the local node to remote peers. Remote peers may request an announce message rate anywhere within the acceptable grant range.
For multicast messages, used on PTP Ethernet ports, this configures the message interval used for Announce messages transmitted by the local node.
This value also defines the interval between executions of the BMCA within the node.
The announce-interval cannot be changed unless the PTP is shut down.
![]() | Note: In order to minimize BMCA driven reconfigurations, the IEEE recommends that the announce-interval should be consistent across the entire 1588 network. |
log-anno-interval 1 (1 packet every 2 seconds) for ieee1588-2008
log-anno-interval 1 (1 packet every 2 seconds) for g8265dot1-2010
log-anno-interval -3 (8 packets per second) for g8275dot1-2014
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
It is a requirement of the 1588 standard that a port in timeReceiver state shall check the logMessageInterval field of received multicast Delay_Resp messages. If the value of the logMessageInterval field of those messages is greater than the value programmed locally for the generation of Delay_Req messages, then the timeReceiver must change to use the greater value (i.e. longer interval) for the generation of Delay_Req messages. This requirement is supported in the router.
The parameter is only applicable to ports and not to peers.
log-delay-interval -6 for ieee1588-2008
log-delay-interval -6 for g8265dot1-2010
log-delay-interval -4 for g8275dot1-2014
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command controls the creation of log events related to local-monitoring-policer status and activity.
log-events
All
This command controls the creation of log events related to dynamic enforcement policer status and activity.
log-events
All
This command controls the creation of log events related to static-policer status and activity.
log-events
All
This command configures the log filter to be used for this trigger entry. The log filter defines the matching criteria that must be met in order for the log event to trigger the handler execution. The log filter is applied to the log event and, if the filtering decision results in a forward action, then the handler is triggered.
It is typically unnecessary to configure match criteria for the application or number in the log filter used for EHS since the particular filter is only applied for a specific log event application and number, as configured under the config>log>event-trigger context.
The no form of this command removes the log filter configuration.
All
This command creates a context to configure destinations for event streams.
The log-id context is used to direct events, alarms or traps, and debug information to respective destinations.
A maximum of 30 logs can be configured.
Before an event can be associated with this log-id, the from command identifying the source of the event must be configured.
Only one destination can be specified for a log-id. The destination of an event stream can be an in-memory buffer, console, session, snmp-trap-group, Syslog, or file.
Use the event-control command to suppress the generation of events, alarms, and traps for all log destinations.
An event filter policy can be applied in the log-id context to limit which events, alarms, and traps are sent to the specified log-id.
By default, the log events in a VPRN log are a subset of the complete set of possible log events in SR OS. See the config>log>services-all-events command for more details.
The no form of this command deletes the log destination ID from the configuration.
No log destinations are defined.
All
This command configures an LI event log destination. The log-id is used to direct events, alarms or traps, and debug information for specific destinations.
All
This command creates a context to configure destinations for event streams.
The log-id context is used to direct events, alarms or traps, and debug information for specific destinations.
A maximum of 30 logs can be configured.
Before an event can be associated with this log ID, the from command identifying the source of the event must be configured.
Only one destination can be specified for a log-id. The destination of an event stream can be an in-memory buffer, console, session, snmp-trap-group, syslog, or file.
Use the event-control command to suppress the generation of events, alarms, and traps for all log destinations.
An event filter policy can be applied in the log-id context to limit which events, alarms, and traps are sent to the specified log-id.
Log-IDs 99 and 100 are created by the agent. Log-ID 99 captures all log messages. Log-ID 100 captures log messages with a severity level of major and above.
![]() | Note: Log-ID 99 provides valuable information for the admin-tech file. Removing or changing the log configuration may hinder debugging capabilities. It is strongly recommended not to alter the configuration for Log-ID 99. |
The no form of this command deletes the log destination ID from the configuration.
All
This command adds the string prepended to every syslog message sent to the syslog host.
RFC3164, The BSD syslog Protocol, allows an alphanumeric string (tag) to be prepended to the content of every log message sent to the syslog host. This alphanumeric string can, for example, be used to identify the node that generates the log entry. The software appends a colon (:) and a space to the string and it is inserted in the syslog message after the date stamp and before the syslog message content.
Only one string can be entered. If multiple strings are entered, the last string overwrites the previous string. The alphanumeric string can contain lowercase (a-z), uppercase (A-Z) and numeric (0-9) characters.
The no form of this command removes the log prefix string.
log-prefix "TMNX".
All
This command configures the syslog log prefix. For more information, refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR System Management Guide. The config>log>syslog>level hierarchy also applies to this context.
log-prefix “TMNX”
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command adds the string prepended to every syslog message sent to the syslog host.
RFC 3164, allows an alphanumeric string (tag) to be prepended to the content of every log message sent to the syslog host. This alphanumeric string can, for example, be used to identify the node that generates the log entry. The software appends a colon (:) and a space to the string and it is inserted in the syslog message after the date stamp and before the syslog message content.
Only one string can be entered. If multiple strings are entered, the last string overwrites the previous string. The alphanumeric string can contain lowercase (a-z), uppercase (A-Z) and numeric (0 to 9) characters.
The no form of this command removes the log prefix string.
no log-prefix
All
This command configures the message interval used for unicast event messages. It defines the message interval for both Sync and Delay_Resp messages that are requested during unicast negotiation to the specific peer. This controls the Sync and Delay_Resp message rate sent from remote peers to the local node. It does not affect the Sync or Delay_Resp packet rate that may be sent from the local node to remote peers. Remote peers may request a Sync or Delay_Resp packet rate anywhere within the acceptable grant range.
The log-sync-interval cannot be changed unless the peer is shutdown.
This command only applies to the 7450 ESS and 7750 SR.
-6 (64 packets per second) for 1588-2008 or
-6 (64 packets per second) for g8265dot1-2010 or
-4 (16 packets per second) for g8275dot1-2014
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the message interval used for unicast event messages. It defines the message interval for both Sync and Delay_Resp messages that are requested during unicast negotiation to the specific peer. This controls the Sync and Delay_Resp message rate sent from remote peers to the local node. It does not affect the Sync or Delay_Resp packet rate that may be sent from the local node to remote peers. Remote peers may request a Sync or Delay_Resp packet rate anywhere within the acceptable grant range.
The log-sync-interval cannot be changed unless the peer is shutdown.
log-sync-interval -6 (64 packets per second) for 1588-2008
log-sync-interval -6 (64 packets per second) for g8265dot1-2010
log-sync-interval -4 (16 packets per second) for g8275dot1-2014
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the message interval used for transmission of multicast Sync messages.
For multicast messages used on PTP Ethernet ports, this configures the message interval used for Sync messages transmitted by the local node when the port is in Master state.
log-sync-interval -6 (64 packets per second) for ieee1588-2008 or
log-sync-interval -6 (64 packets per second) for g8265dot1-2010 or
log-sync-interval -4 (16 packets per second) for g8275dot1-2014
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This feature merges two of the most commonly generated MPLS traps, vRtrMplsXCCreate and vRtrMplsXCDelete, which can be generated at both LER and LSR into a new specific trap vRtrMplsSessionsModified. In addition, this feature perform bundling of traps of multiple RSVP sessions, that is LSPs, into this new specific trap.
The intent is to provide a tool for the user to minimize trap generation in an MPLS network. Note that the MPLS trap throttling will not be applied to this new trap.
The no version of this command disables the merging and bundling of the above MPLS traps.
All
This command includes the logical-access-id.
The no form of this command reverts to the default.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command enables status change reporting to the OpenFlow controller for the specified logical port type. To report on multiple logical port types, the command needs to be executed multiple times with different logical port specified as required.
The no form of this command disables status reporting for specified or all (no argument) logical ports.
no logical-port-status
All
This command enables or disables the display of a login banner. The login banner contains the SR OS copyright and build date information for a console login attempt.
The no form of this command causes only the configured pre-login-message and a generic login prompt to display.
All
This command creates the context to configure the session control for console, Telnet, SSH, and FTP sessions.
All
This command configures a user’s login exec file which executes whenever the user successfully logs in to a console session.
Only one exec file can be configured. If multiple login-exec commands are entered for the same user, each subsequent entry overwrites the previous entry.
The no form of this command disables the login exec file for the user.
no login-exec
All
Commands in this context configure CLI scripts that execute when a user (authenticated via any method including local user database, TACACS+, or RADIUS) first logs into a CLI session.
All
This command logs out of the router session.
When the logout command is issued from the console, the login prompt is displayed, and any log IDs directed to the console are discarded. When the console session resumes (regardless of the user), the log output to the console resumes.
When a Telnet session is terminated from a logout command, all log IDs directed to the session are removed. When a user logs back in, the log IDs must be re-created.
This command includes the long duration flow count. This command only applies to the 7750 SR.
The no form of this command excludes the long duration flow count in the AA subscriber's custom record.
no long-duration-flow-count
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Commands in this context configure BGP Long-Lived Graceful-Restart (LLGR) procedures.
LLGR, known informally as BGP persistence, is an extension of BGP graceful restart that allows a session to stay down for a longer period of time. During this time, learned routes are marked and re-advertised as stale but they can continue to be used as routes of last resort.
The LLGR handling of a session failure can be invoked immediately or it can be delayed until the end of the traditional GR restart window.
no long-lived
All
Commands in this context enter commands related to BGP Long-Lived Graceful-Restart (LLGR) procedures.
LLGR, known informally as BGP persistence, is an extension of BGP GR that allows a session to stay down for a longer period of time. During this time, learned routes are marked and re-advertised as stale but they can continue to be used as routes of last resort.
The LLGR handling of a session failure can be invoked immediately or it can be delayed until the end of the traditional GR restart window.
no long-lived
All
This command configures how the BGP peer session handles loop detection in the AS path.
![]() | Note: Dynamic configuration changes of loop-detect are not recognized. |
The no form of this command used at the global level reverts to default, which is loop-detect ignore-loop.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command configures how the BGP peer session handles loop detection in the AS path.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific value is used.
Dynamic configuration changes of loop-detect are not recognized.
The no form of this command used at the global level reverts to default, which is loop-detect ignore-loop.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
loop-detect ignore-loop
All
This command configures how the BGP peer session handles loop detection in the AS path.
This configuration parameter can be set at three levels: global level (applies to all peers), group level (applies to all peers in peer-group) or neighbor level (only applies to specified peer). The most specific value is used.
![]() | Note: Dynamic configuration changes of loop-detect are not recognized. |
The no form of this command used at the global level reverts to default, which is loop-detect ignore-loop.
The no form of this command used at the group level reverts to the value defined at the global level.
The no form of this command used at the neighbor level reverts to the value defined at the group level.
loop-detect ignore-loop
All
This command provides additional control over the behavior enabled by the loop-detect command. If this command specifies a threshold value of n, then a route received by the local BGP speaker with an AS path that contains up to n occurrences of the local speaker's AS number is considered valid and not treated as an AS path loop. An AS loop is considered to occur only when the received AS path has more than n occurrences of the local speaker's AS number.
The no form of this command removes the configuration and sets the value to 0. One or more occurrence of the local speaker's AS number in the received AS path triggers the loop-detect behavior.
no loop-detect-threshold
All
This command provides additional control over the behavior enabled by the loop-detect command. If this command specifies a threshold value of n, then a route received by the local BGP speaker with an AS path that contains up to n occurrences of the local speaker's AS number is considered valid and not treated as an AS path loop. An AS loop is considered to occur only when the received AS path has more than n occurrences of the local speaker's AS number.
The no form of this command removes the configuration and sets the value to 0. One or more occurrence of the local speaker's AS number in the received AS path triggers the loop-detect behavior.
no loop-detect-threshold
All
This command specifies that the associated interface is a loopback interface that has no associated physical interface. As a result, the associated IES/VPRN interface cannot be bound to a SAP.
![]() | Note: Configure an IES interface as a loopback interface by issuing the loopback command instead of the sap sap-id command. The loopback flag cannot be set on an interface where a SAP is already defined and a SAP cannot be defined on a loopback interface. |
The no form of this command reverts to the default.
All
This command specifies that the associated interface is a loopback interface that has no associated physical interface. As a result, the associated interface cannot be bound to a SAP.
When using mtrace/mstat in a Layer 3 VPN context then the configuration for the VPRN should have a loopback address configured which has the same address as the core instance's system address (BGP next-hop).
no loopback
All
This command activates a loopback on the SONET/SDH port.
The SONET port must be in a shut down state to activate any type of loopback. The loopback setting is never saved to the generated/saved configuration file.
Note that loopback mode changes on a SONET/SDH port can affect traffic on the remaining ports.
This command is supported by TDM satellite.
no loopback
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command puts the specified port or channel into a loopback mode.
The corresponding port or channel must be in a shutdown state in order for the loopback mode to be enabled. The upper level port or channel or parallel channels should not be affected by the loopback mode.
Note that this command is not saved in the router configuration between boots.
The no form of this command disables the specified type of loopback.
no loopback
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
This command puts the specified port or channel into a loopback mode.
The corresponding port or channel must be in a shutdown state in order for the loopback mode to be enabled. The upper level port or channel or parallel channels should not be affected by the loopback mode.
Note that this command is not saved in the router configuration between boots.
The no form of this command disables the specified type of loopback.
no loopback
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
This command puts the specified port or channel into a loopback mode.
The corresponding port or channel must be in a shutdown state in order for the loopback mode to be enabled. The upper level port or channel or parallel channels should not be affected by the loopback mode
Note that this command is not saved in the router configuration between boots.
The no form of this command disables the specified type of loopback.
no loopback
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e
The command initiates a loopback test.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the interface as a loopback interface. The vas-if-type and loopback commands are mutually exclusive.
Not enabled
All
This command configures a MAC loopback on a MAC chip. The system and services can start using the loopback only when a port is associated with it (for example, port 1/1/m1/1, where m1 represents the MAC ID).
The no form of this command removes the loopback ID from the configuration.
7450 ESS, 7750 SR, 7750 SR-s, 7950 XRS
7750 SR-s
This command specifies the number of seconds between periodic loopback attempts on an ATM endpoint that has periodic loopback enabled.
no loopback-period
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
This command instructs IGP to not include a specific interface or all interfaces participating in a specific IS-IS level or OSPF area in the SPF LFA computation. This provides a way of reducing the LFA SPF calculation where it is not needed.
When an interface is excluded from the LFA SPF in IS-IS, it is excluded in both level 1 and level 2. When it is excluded from the LFA SPF in OSPF, it is excluded in all areas. However, the above OSPF command can only be executed under the area in which the specified interface is primary and once enabled, the interface is excluded in that area and in all other areas where the interface is secondary. If the user attempts to apply it to an area where the interface is secondary, the command will fail.
The no form of this command re-instates the default value for this command.
no loopfree-alternate-exclude
All
This command instructs IGP to not include a specific interface or all interfaces participating in a specific IS-IS level or OSPF area in the SPF LFA computation. This provides a way of reducing the LFA SPF calculation where it is not needed.
When an interface is excluded from the LFA SPF in IS-IS, it is excluded in both level 1 and level 2. When it is excluded from the LFA SPF in OSPF, it is excluded in all areas. However, the above OSPF command can only be executed under the area in which the specified interface is primary and once enabled, the interface is excluded in that area and in all other areas where the interface is secondary. If the user attempts to apply it to an area where the interface is secondary, the command fails.
The no form of this command re-instates the default value for this command.
no loopfree-alternate-exclude
All
This command excludes from the LFA SPF calculation those prefixes that match a prefix entry or a tag entry in a prefix policy. If a prefix is excluded from LFA, it is not included in LFA calculations regardless of its priority. The prefix tag will, however, be used in the main SPF.
The implementation also allows the user to exclude a specific interface in IS-IS or OSPF, a or all interfaces in an OSPF area or IS-IS level from the LFA SPF.
![]() | Note: Prefix tags are defined for the IS-IS protocol but not for the OSPF protocol. |
The default action of the loopfree-alternate-exclude command, when not explicitly specified by the user in the prefix policy, is “reject”. Therefore, regardless of whether the user explicitly added the statement “default-action reject” to the prefix policy, a prefix that does not match any entry in the policy will be accepted into LFA SPF.
The no form of this command deletes the exclude prefix policy.
no loopfree-alternate-exclude
This command instructs IGP to not include a specific interface or all interfaces participating in a specific IS-IS level or OSPF area in the SPF LFA computation. This provides a way of reducing the LFA SPF calculation where it is not needed.
When an interface is excluded from the LFA SPF in IS-IS, it is excluded in both level 1 and level 2. When it is excluded from the LFA SPF in OSPF, it is excluded in all areas. However, the above OSPF command can only be executed under the area in which the specified interface is primary and once enabled, the interface is excluded in that area and in all other areas where the interface is secondary. If the user attempts to apply it to an area where the interface is secondary, the command will fail.
The no form of this command re-instates the default value for this command.
no loopfree-alternate-exclude
All
This command enables Loop-Free Alternate (LFA) computation by SPF under the IS-IS routing protocol level or under the OSPF routing protocol instance level.
When this command is enabled, it instructs the IGP SPF to attempt to pre-compute both a primary next-hop and an LFA next-hop for every learned prefix. When found, the LFA next-hop is populated into the routing table along with the primary next-hop for the prefix.
The no form of this command disables the LFA computation by IGP SPF.
no loopfree-alternates
All
This command enables Loop-Free Alternate (LFA) computation by SPF under the IS-IS routing protocol level, or under the OSPF routing protocol instance level.
When this command is enabled, it instructs the IGP SPF to attempt to pre-compute both a primary next-hop and an LFA next-hop for every learned prefix. IS-IS computes the primary SPF first and then computes the LFA SPF. The LFA backup next-hop is only available after the LFA SPF is completed. When found, the LFA next-hop is populated into the routing table along with the primary next-hop for the prefix.
The no form of this command disables the LFA computation by IGP SPF.
no loopfree-alternates
All
This command enables the advertisement of flexible-algorithm aware loop free alternates (LFAs).
The flexible algorithm LFA configuration (for example, LFA, remote-LFA or TI-LFA) inherits the LFA configuration for base SPF algorithm 0.
LFAs are administratively disabled for flexible algorithms in which IS-IS is participating. LFAs must be explicitly enabled using the loopfree-alternates command.
The no form of this command disables LFAs for the specific flexible algorithm in which the router is participating.
no loopfree-alternates
All
This command enables Loop-Free Alternate (LFA) computation by SPF for the IS-IS routing protocol.
When this command is enabled, it instructs the IGP SPF to attempt to pre-compute both a primary nexthop and an LFA next-hop for every learned prefix. When found, the LFA next-hop is populated into the routing table along with the primary next-hop for the prefix.
The user enables the remote LFA next-hop calculation by the IGP LFA SPF by appending the remote-lfa option. When this option is enabled in an IGP instance, SPF performs the remote LFA additional computation following the regular LFA next-hop calculation when the latter resulted in no protection for one or more prefixes which are resolved to a given interface.
Remote LFA extends the protection coverage of LFA-FRR to any topology by automatically computing and establishing/tearing-down shortcut tunnels, also referred to as repair tunnels, to a remote LFA node which puts the packets back into the shortest without looping them back to the node which forwarded them over the repair tunnel. The remote LFA node is referred to as PQ node. A repair tunnel can in theory be an RSVP LSP, a LDP-in-LDP tunnel, or a SR tunnel. In this feature, it is restricted to use SR repair tunnel to the remote LFA node.
The remote LFA algorithm is a per-link LFA SPF calculation and not a per-prefix like the regular LFA one. So, it provides protection for all destination prefixes which share the protected link by using the neighbor on the other side of the protected link as a proxy for all these destinations.
The Topology-Independent LFA (TI-LFA) further improves the protection coverage of a network topology by computing and automatically instantiating a repair tunnel to a Q node which is not in shortest path from the computing node. The repair tunnel uses shortest path to the P node and a source routed path from the P node to the Q node.
In addition, the TI-LFA algorithm selects the backup path which matches the post-convergence path. This helps the capacity planning in the network since traffic will always flow on the same path when transitioning to the FRR next-hop and then onto the new primary next-hop.
At a high level, the TI-LFA protection algorithm is searching for a candidate P-Q set separated with a number of hops such that the label stack size does not exceed the value of ti-lfa max-sr-frr-labels, on each of the post-convergence paths to each destination node or prefix D.
When the ti-lfa option is enabled in IS-IS, it provides TI-LFA node-protect or link-protect backup path in IS-IS MT=0 for an SR-ISIS IPV4/IPv6 tunnel (node SID and adjacency SID), for an IPv4 SR-TE LSP, and for LDP IPv4 FEC when the LDP fast-reroute backup-sr-tunnel option is enabled.
The max-sr-frr-labels parameter is used to limit the search for the TI-LFA backup next-hop:
When the node-protect command is enabled, the router will prefer a node-protect over a link-protect repair tunnel for a given prefix if both are found in the Remote LFA or TI-LFA SPF computations. The SPF computations may only find a link-protect repair tunnel for prefixes owned by the protected node. This node-protect backup protects against the failure of a downstream node in the path of the prefix of a node SID except for the node owner of the node SID.
The parameter max-pq-nodes in Remote LFA controls the maximum number of PQ nodes found in the LFA SPFs for which the node protection check is performed. The node-protect condition means the router must run the original Remote LFA algorithm plus one extra forward SPF on behalf of each PQ node found, potentially after applying the max-pq-cost parameter, to check if the path from the PQ node to the destination does not traverse the protected node. Setting this parameter to a lower value means the LFA SPFs will use less computation time and resources but may result in not finding a node-protect repair tunnel.
The no form of this command disables the LFA computation by IGP SPF.
no loopfree-alternates
All
This command enables Loop-Free Alternate (LFA) computation by SPF under the OSPF or OSPFv3 routing protocol instance.
When this command is enabled, it instructs the IGP SPF to attempt to precalculate both a primary next hop and an LFA next hop for every learned prefix. When found, the LFA next hop is populated into the routing table along with the primary next hop for the prefix.
The user enables the remote LFA next hop calculation by the IGP LFA SPF by appending the remote-lfa option. When this option is enabled in an IGP instance, SPF performs the remote LFA additional computation following the regular LFA next hop calculation when the latter resulted in no protection for one or more prefixes which are resolved to a particular interface.
Remote LFA extends the protection coverage of LFA-FRR to any topology by automatically computing and establishing or tearing down shortcut tunnels, also referred to as repair tunnels, to a remote LFA node that puts the packets back into the shortest path without looping them back to the node that forwarded them over the repair tunnel. The remote LFA node is referred to as a PQ node. A repair tunnel can, in theory, be an RSVP-TE LSP, an LDP-in-LDP tunnel, or a segment routing (SR) tunnel. In this command, remote-lfa is restricted to using an SR repair tunnel to the remote LFA node.
The remote LFA algorithm is a per-link LFA SPF calculation and not a per-prefix calculation like the regular LFA algorithm. The remote LFA algorithm provides protection for all destination prefixes that share the protected link by using the neighbor on the other side of the protected link as a proxy for all the destinations.
The Topology-Independent LFA (TI-LFA) further improves the protection coverage of a network topology by computing and automatically instantiating a repair tunnel to a Q node which is not in shortest path from the computing node. The repair tunnel uses shortest path to the P node and a source routed path from the P node to the Q node.
In addition, the TI-LFA algorithm selects the backup path which matches the post-convergence path. This helps the capacity planning in the network since traffic will always flow on the same path when transitioning to the FRR next hop and then onto the new primary next hop.
At a high level, the TI-LFA protection algorithm is searching for a candidate P-Q set separated with a number of hops such that the label stack size does not exceed the value of ti-lfa max-sr-frr-labels, on each of the post-convergence paths to each destination node or prefix D.
When the ti-lfa option is enabled in OSPF, it provides TI-LFA node-protect or link-protect backup path for a SR-OSPF IPV4 tunnel (node SID and adjacency SID), and for a IPv4 SR-TE LSP.
The max-sr-frr-labels parameter is used to limit the search for the TI-LFA backup next hop:
The TI-LFA repair tunnel can have a maximum of three labels pushed in addition to the label of the destination node or prefix. The user can set a lower maximum value for the additional FRR labels by configuring the CLI option max-sr-frr-labels labels. The default value is 2.
When the node-protect command is enabled, the router will prefer a node-protect over a link-protect repair tunnel for a given prefix if both are found in the Remote LFA or TI-LFA SPF computations. The SPF computations may only find a link-protect repair tunnel for prefixes owned by the protected node. This node-protect backup protects against the failure of a downstream node in the path of the prefix of a node SID except for the node owner of the node SID.
The parameter max-pq-nodes in Remote LFA controls the maximum number of PQ nodes found in the LFA SPFs for which the node protection check is performed. The node-protect condition means the router must run the original Remote LFA algorithm plus one extra forward SPF on behalf of each PQ node found, potentially after applying the max-pq-cost parameter, to check if the path from the PQ node to the destination does not traverse the protected node. Setting this parameter to a lower value means the LFA SPFs will use less computation time and resources but may result in not finding a node-protect repair tunnel.
The no form of this command disables the LFA computation by the IGP SPF.
no loopfree-alternates
All
Commands in this context configure loss parameters for the TWAMP-Light test.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Specifies that at the termination of an SAA test run, the calculated loss event value is evaluated against the configured rising and falling loss event thresholds. SAA threshold events are generated as required.
The configuration of loss event thresholds is optional.
The no form of this command disables the loss-event test run.
All
This enables the monitoring of all configured loss events. Adding this functionality starts the monitoring of the configured loss events at the start of the next measurement interval. If the function is removed using the no command, all monitoring of configured loss events, logging, and recording of new events for that session are suspended. Any existing events at the time of the shut down are maintained until the active measurement window in which the removal was performed has completed. The state of this monitoring function can be changed without having to shut down all the tests in the session.
The no form of this command disables the monitoring of all configured loss events.
This context allows the operator to define the loss events and thresholds that are to be tracked.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
All
Commands in this context configure the queue low drop-tail parameters. The low drop-tail defines the queue depth beyond which out-of-profile packets are not accepted into the queue and are discarded.
7450 ESS, 7750 SR-7/12/12e, 7750 SR-s, 7950 XRS, VSR
Commands in this context configure the queue low drop-tail parameters. The low drop tail defines the queue depth beyond which out-of-profile packets are not accepted into the queue and are discarded.
All
Commands in this context configure the queue low drop tail parameters. The low drop tail defines the queue depth beyond which out-of-profile packets will not be accepted into the queue and will be discarded.
All
Commands in this context configure the queue low drop-tail parameters. The low drop tail defines the queue depth beyond which out-of-profile packets are not accepted into the queue and will be discarded.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
7450 ESS, 7750 SR-7/12/12e, 7750 SR-a, 7750 SR-e, 7950 XRS
All
Commands in this context configure the queue low drop tail parameters. The low drop tail defines the queue depth beyond which out-of-profile packets are not accepted into the queue and will be discarded.
All
Commands in this context configure the queue low drop-tail parameters. The low drop tail defines the queue depth beyond which out-of-profile packets will not be accepted into the queue and will be discarded.
All
Commands in this context configure the queue low drop tail parameters. The low drop tail defines the queue depth beyond which out-of-profile packets will not be accepted into the queue and will be discarded.
All
Commands in this context configure the queue low drop-tail parameters. The low drop tail defines the queue depth beyond which out-of-profile packets will not be accepted into the queue and will be discarded.
All
Commands in this context configure the queue low drop-tail parameters. The low drop-tail defines the queue depth beyond which out-of-profile packets will not be accepted into the queue and will be discarded.
All
This command specifies which scheduling classes map to the low burst-limit threshold of an egress HS secondary shaper. Egress SAPs can be configured to use an HS secondary shaper that manages their maximum burst limit over a specified aggregate shaping rate. Each HS secondary shaper supports two thresholds, a low burst limit threshold and a high burst limit threshold.
By default, all scheduling classes are mapped to the low burst limit threshold. It is important to note that when mapping scheduling classes to the high burst limit threshold an adequate value for the card>fp>egress>hs-fixed-high-thresh-delta must be specified. This is due to the fact that the queues associated with the lower classes may burst over the lower threshold in normal operation due to the scheduler forwarding whole packets. The hs-fixed-high-thresh-delta value should be set to at least two times the maximum frame size to prevent lower threshold class forwarding from also affecting the higher threshold classes when forwarding larger packet sizes. An insufficient high threshold delta defeats the intended purpose of mapping classes to the higher threshold.
The system utilizes the lowest value attainable for each low threshold aggregate burst limit without causing shaper underrun conditions. The high burst limit threshold is determined by adding the hs-fixed-high-thresh-delta value configured in the config>card>fp>egress context to the aggregate’s low burst limit threshold value.
The low-burst-max-class value can be changed at any time for an HS secondary shaper.
The no form of this command restores the HS secondary shaper’s aggregate low burst limit threshold maximum scheduling class mapping to the default value. This causes all sets of queues associated with the hs-secondary-shaper secondary-shaper-name to have all scheduling classes mapped to the low burst limit threshold.
low-burst-max-class 6
7750 SR-7/12/12e
This command specifies which scheduling classes map to the low burst-limit threshold of the queue-level aggregate shaper. Each egress SAP or subscriber SLA profile instance (SPI), per port set of network interface queues and egress queue group template instance has an aggregate shaper that manages the maximum burst limit over a specified shaping rate. Each aggregate shaper supports two thresholds. As the scheduling rate for the set of queues increases, eventually the aggregate rate exceeds the rate limit and the aggregate burst limit starts to be consumed. If this continues, the low burst limit threshold is exceeded and the queues mapped to the scheduling classes associated with low threshold are removed from the scheduler. If the remaining aggregate rate (from the higher scheduling classes) continues to exceed the shaping rate, then the burst limit continues to be consumed and eventually the high burst limit threshold is exceeded. This causes the queues for all scheduling classes to be removed from the scheduler.
The second (high) threshold exists to allow the higher priority classes to continue to forward, thereby mitigating the effects of low priority bursts beyond the aggregate shaping rate. Typically, the higher scheduling class queues are either individually rate-limited so their aggregate allowed throughput is less than the aggregate rate or the expected aggregate unshaped traffic from the individual higher scheduling classes does not exceed the aggregate shaping rate. Determining the value of low-burst-max-class class involves anticipating the proper dividing line between the low and high scheduling classes by evaluating the forwarding behavior and SLA enforcement of each class.
By default, all scheduling classes are mapped to the low burst limit threshold. When mapping scheduling classes to the high burst limit threshold, an adequate value for the card>fp>egress>hs-fixed-high-thresh-delta must be specified. This is due to the fact that the queues associated with the lower classes may burst over the lower threshold in normal operation due to the scheduler forwarding whole packets. Set the hs-fixed-highthresh- delta value to at least two times the maximum frame size to prevent lower threshold class forwarding from also affecting the higher threshold classes when forwarding larger packet sizes. An insufficient high threshold delta defeats the intended purpose of mapping classes to the higher threshold.
The system utilizes the lowest value attainable for each low threshold aggregate burst limit without causing shaper underrun conditions. The high burst limit threshold is determined by adding the hs-fixed-high-thresh-delta value configured in the config>card>fp>egress CLI context to the aggregate’s low burst limit threshold value.
The low-burst-max-class value can be changed at any time in the HS attachment policy. Modifying the setting causes all queue aggregate shapers to reconfigure the scheduling class mappings to the low and high burst limit thresholds to reflect the new value for scheduling class ID.
Scheduling Classes — As described in the queue and wrr-group attachment commands, each queue is either directly or indirectly (through a WRR group) mapped to a scheduling class. Each scheduling class has an inherent priority at the port scheduler. The inherent descending priority is as follows:
Placing scheduling classes into the port level WRR group causes those classes to compete for scheduling opportunities based on their associated weights instead of inherent priority. If higher weights are given to higher scheduling class IDs, then the relative proportional scheduling priority may continue to exhibit the priority level indicated by the class ID.
Setting Low and High Burst Limit Threshold Association — Table 71 demonstrates the effect of the low-burst-max-class command parameters on scheduling class mappings to the low and high burst limit thresholds.
low-burst-max-class sched-class | Scheduling Classes on Low Threshold | Scheduling Classes on High Threshold |
1 | 1 | 2, 3, 4, 5, and 6 |
2 | 1 and 2 | 3, 4, 5, and 6 |
3 | 1, 2, and 3 | 4, 5, and 6 |
4 | 1, 2, 3, and 4 | 5 and 6 |
5 | 1, 2, 3, 4, and 5 | 6 |
6 | 1, 2, 3, 4, 5, and 6 | — |
The no form of the command restores the queue aggregate low burst limit threshold maximum scheduling class mapping to the default value. This causes all sets of queues associated with the specified hs-attachment-policy policy-name to have all scheduling classes mapped to the low burst limit threshold.
low-burst-max-class 6
7750 SR-7/12/12e
This command includes the low octets discarded count.
For queues with stat-mode v4-v6, this command includes the IPv6 octets discarded count instead.
The no form of this command excludes the low octets discarded count.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command includes the low octets discarded count.
The no form of this command excludes the low octets discarded count.
no low-octets-discarded-count
All
This command includes the low octets discarded count.
The no form of this command excludes the low octets discarded count.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command includes the low octets discarded count.
The no form of this command excludes the low octets discarded count.
no low-octets-offered-count
All
This command includes the low packets discarded count.
For queues with stat-mode v4-v6, this command includes the IPv6 packets discarded count instead.
The no form of this command excludes the low packets discarded count.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command includes the low packets discarded count.
The no form of this command excludes the low packets discarded count.
no low-packets-discarded-count
All
This command includes the low packets discarded count.
The no form of this command excludes the low packets discarded count.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
This command includes the low packets discarded count.
The no form of this command excludes the low packets discarded count.
no low-packets-offered-count
All
This command specifies the lowest priority defect that is allowed to generate a fault alarm.
low-priority-defect remErrXcon
allDef | DefRDICCM, DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
macRemErrXcon | Only DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
remErrXcon | Only DefRemoteCCM, DefErrorCCM, and DefXconCCM |
errXcon | Only DefErrorCCM and DefXconCCM |
xcon | Only DefXconCCM; or |
noXcon | No defects DefXcon or lower are to be reported |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the lowest priority defect that is allowed to generate a fault alarm.
low-priority-defect remErrXcon
allDef | DefRDICCM, DefMACstatus, DefRemoteCCM, DefErrorCCM |
macRemErrXcon | Only DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
remErrXcon | Only DefRemoteCCM, DefErrorCCM, and DefXconCCM |
errXcon | Only DefErrorCCM and DefXconCCM |
xcon | Only DefXconCCM; or |
noXcon | No defects DefXcon or lower are to be reported |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the lowest priority defect that is allowed to generate a fault alarm. This setting is also used to determine the fault state of the MEP which, when enabled to do so, causes a network reaction.
low-priority-defect macRemErrXcon
This command allows the operator to include all CCM Defect conditions or exclude the Remote Defect Indication CCM (DefRDICCM) as a trigger for generating AIS. AIS generation can only occur when the client-meg-level configuration option has been included. Changing this parameter will evaluate the MEP for AIS triggers based on the new criteria.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the lowest priority defect that is allowed to generate a fault alarm.
low-priority-defect macRemErrXcon
allDef | DefRDICCM, DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM | |
macRemErrXcon | Only DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM | |
remErrXcon | Only DefRemoteCCM, DefErrorCCM, and DefXconCCM | |
errXcon | Only DefErrorCCM and DefXconCCM | |
xcon | Only DefXconCCM | |
noXcon | No defects DefXcon or lower are to be reported |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command allows the operator to include all CCM Defect conditions or exclude the Remote Defect Indication CCM (DefRDICCM) as a trigger for generating AIS. AIS generation can only occur when the client-meg-level configuration option has been included. Changing this parameter will evaluate the MEP for AIS triggers based on the new criteria.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the lowest priority defect that is allowed to generate a fault alarm.
low-priority-defect macRemErrXcon
allDef | DefRDICCM, DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
macRemErrXcon | Only DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
remErrXcon | Only DefRemoteCCM, DefErrorCCM, and DefXconCCM |
errXcon | Only DefErrorCCM and DefXconCCM |
xcon | Only DefXconCCM; or |
noXcon | No defects DefXcon or lower are to be reported |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the lowest priority defect that is allowed to generate a fault alarm.
low-priority-defect macRemErrXcon
allDef | DefRDICCM, DefMACstatus, DefRemoteCCM, efErrorCCM, and DefXconCCM |
macRemErrXcon | only DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
remErrXcon | only DefRemoteCCM, DefErrorCCM, and DefXconCCM |
errXcon | only DefErrorCCM and DefXconCCM |
xcon | only DefXconCCM; or |
noXcon | no defects DefXcon or lower are to be reported |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the lowest priority defect that is allowed to generate a fault alarm.
low-priority-defect macRemErrXcon
allDef | DefRDICCM, DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
macRemErrXcon | Only DefMACstatus, DefRemoteCCM, DefErrorCCM, and DefXconCCM |
remErrXcon | Only DefRemoteCCM, DefErrorCCM, and DefXconCCM |
errXcon | Only DefErrorCCM and DefXconCCM |
xcon | Only DefXconCCM; or |
noXcon | No defects DefXcon or lower are to be reported |
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the lowest priority defect that generates a fault alarm. This setting is also used to determine the fault state of the MEP which, when enabled to do so, causes a network reaction.
low-priority-defect macRemErrXcon
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
The low-slope context contains the commands and parameters for defining the low Random Early Detection (RED) slope graph. Each buffer pool supports a low RED slope for managing access to the shared portion of the buffer pool for low out-of-profile packets.
The low-slope parameters can be changed at any time and the affected buffer pool low RED slopes must be adjusted appropriately.
The no form of this command restores the low slope configuration commands to the default values. If the leaf commands within low-slope are set to the default parameters, the low-slope node will not appear in save config and show config output unless the detail parameter is present.
All
This command configures the low watermark value for the dns-ip-cache. If the dns-ip-cache has previously crossed the high-watermark value, the system will clear the trap in case the number of IP addresses stored in the cache crosses below the low watermark value.
low-wmark 80
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command allows the operator specify the individual floors thresholds for the bins. The operator does not have to specific a lower threshold for every bin that was previously defined by the bin-count for the specific type. By default, each bin is the bin-number times 5000 microseconds. Lower thresholds in the previous adjacent bin must be lower than the threshold of the next higher bin threshold. A separate line per bin is required to configure an operator-specific threshold. An error prevents the bin from entering the active state if this is not maintained, at the time the no shutdown is issued. Bin 0 is the result of the difference between 0 and the configured lower-threshold of bin 1. The highest bin in the bin-count captures every result above the threshold. Any negative delay metric result is treated as zero and placed in bin 0.
The no form of this command removes the user configured threshold value and applies the default for the bin.
All
This command sets the internal OSPF delay to allow for the accumulation of multiple LSA so OSPF messages can be sent as efficiently as possible. The lsa-accumulate timer applies to all LSAs except Type 1 and Type 2 LSAs, which are sent immediately. LSAs are accumulated and then sent when:
Shorting this delay can speed up the advertisement of LSAs to OSPF neighbors but may increase the number of OSPF messages sent.
The no form of this command reverts to the default value.
![]() | Note: The timer granularity is 10 ms if the value is less than 500 ms, and 100 ms if the value is greater than or equal to 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
lsa-accumulate 1000
All
This parameter defines the minimum delay that must pass between receipt of the same Link State Advertisements (LSAs) arriving from neighbors.
It is recommended that the neighbor’s configured lsa-generate lsa-second-wait interval is equal to or greater than the lsa-arrival timer configured here.
Use the no form of this command to return to the default.
![]() | Note: The timer granularity is 10 ms if the value is less than 500 ms, and 100 ms if the value is ≥ 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
lsa-arrival 1000
All
This parameter defines the minimum delay that must pass between receipt of the same Link State Advertisements (LSAs) arriving from neighbors.
It is recommended that the neighbors configured lsa-generate lsa-second-wait interval is equal or greater than the lsa-arrival timer configured here.
The no form of this command reverts to the default.
![]() | Note: The timer granularity is 10 ms if the value is less than 500 ms, and 100 ms if the value is greater than or equal to 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
lsa-arrival 1000
All
This command enables filtering of outgoing OSPF LSAs on the selected OSPFv2 or OSPFv3 interface. Three filtering options are provided:
The no form of this command disables OSPF LSA filtering (normal operation).
no lsa-filter-out
All
This parameter customizes the throttling of OSPF LSA-generation. Timers that determine when to generate the first, second, and subsequent LSAs can be controlled with this command. Subsequent LSAs are generated at increasing intervals of the lsa-second-wait timer until a maximum value is reached.
Configuring the lsa-arrival interval to equal or less than the lsa-second-wait interval configured in the lsa-generate command is recommended.
The no form of this command reverts to the default.
![]() | Note: The timer granularity is 10 ms if the value is less than 500 ms, and 100 ms if the value is ≥ 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
When an LSA is generated, the initial wait period commences. If, within the specified lsa-initial-wait period and another topology change occurs, then the lsa-initial-wait timer applies.
All
This parameter customizes the throttling of OSPF LSA-generation. Timers that determine when to generate the first, second, and subsequent LSAs can be controlled with this command. Subsequent LSAs are generated at increasing intervals of the lsa-second-wait timer until a maximum value is reached.
Configuring the lsa-arrival interval to equal or less than the lsa-second-wait interval configured in the lsa-generate command is recommended.
The no form of this command reverts to the default.
![]() | Note: The timer granularity is 10 ms if the value is less than 500 ms, and 100 ms if the value is greater than or equal to 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
lsa-generate 5000
When an LSA is generated, the initial wait period commences. If, within the specified lsa-initial-wait period and another topology change occurs, then the lsa-initial-wait timer applies.
All
This command enables debugging for Link State DataBase (LSDB).
The no form of the command disables debugging.
All
This command enables debugging for an OSPF link-state database (LSDB).
All
This command enables Large Scale NAT (LSN).
The no form of this command disables LSN.
7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates NAT static port forwards for LSN44, Ds-Lite and NAT64. Static port forwards (SPF) are static mappings created so that certain applications on the inside (private side) can be reached from host that are on the outside of the NAT. SPF statically map the subscriber (inside IP address in LSN44, CPE IPv6 address/prefix in DS-Lite and IPv6 prefix in NAT64), inside port and protocol to an outside IPv4 address, port and the same protocol.
If only the inside router, the inside IPv4/v6 address/prefix and the protocol are configured as parameters in the SPF request, the remaining fields in the mapping (outside port and outside IPv4 address) will be selected automatically by the node and reported in CLI once the command execution is completed.
Specifying the outside IPv4 address in the SPF request, mandates that all other, otherwise optional, parameters be also specified in the request (inside port and outside port). This creates a fully specified SPF request. Fully specified SPF request can be used in multi-chassis NAT redundancy deployments where the SPF is manually replicated between the SR OS nodes. In single chassis NAT deployments, fully specified SPF request is guaranteed to work only in the system with a single MS-ISA in it. Otherwise (multiple MS-ISAs in the system) a conflict may arise where two distinct inside IP addresses that may reside on separate MS-ISAs are requested to be mapped to the same outside IPv4 address. This will not be possible since the outside IPv4 address cannot be split across the MS-ISAs (each IP address, inside or outside, is tied to a single MS-ISA).
In non-fully specified SPF requests (missing the inside port and/or outside port and the outside IPv4 address within the SPF request), the outside IPv4 address selection will depend on the configuration of the outside port in the SPF request:
If multiple NAT policies per inside routing context are used, then the NAT policy must be specified in the SPF creation request. This is needed so the SPF be created in the correct pool.
SPFs are disabled by default and they must be explicitly enabled by the port-limits forwarding command within the NAT policy.
Configured SPFs, unlike SPFs created with the tools commands, are preserved across reboots without having to configure persistency (config>system>persistence>nat-port-forwarding) since they are part of the configuration. When the pool is shutdown the SPFs are deactivated. When the pool is enabled (no shutdown), the SPFs (as created by the tools command or by configuration) are activated.
To avoid possible persistency related conflicts, SPFs can only be created using one method on a given node: either as configuration (the CLI configure branch) or using the tools command. For example: if a first SPF entry is created via CLI tools commands, the node prevents SPF creation via configuration (the CLI configure branch) and vice versa.
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
This command creates a GMPLS LSP that is signaled dynamically by the router.
When the LSP is created, the egress router must be specified using the to command and a working-path must be specified.
GMPLS LSPs are created in the administratively down (shutdown) state.
The no form of this command deletes the GMPLS LSP. All configuration information associated with this GMPLS LSP is lost. The GMPLS LSP must be administratively shut down before it can be deleted.
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures a specific LSP destined to this peer and to be used for tunneling of LDP FEC over RSVP. A maximum of 4 RSVP LSPs can be explicitly used for tunneling LDP FECs to the T-LDP peer.
All
This command configures a specific LSP destined to this peer and to be used for tunneling of multicast LDP FEC over RSVP.
All
This command configures statistics in the ingress data path of a terminating RSVP LSP at an egress LER. The LSP name must correspond to the name configured by the operator at the ingress LER. It must not contain the special character “:” which is used as a field separator by the ingress LER for encoding the LSP and path names into the RSVP session name field in the session_attribute object. The operator must execute the no shutdown for this command to effectively enable statistics.
The same set of counters is updated for packets received over any path of this LSP and over the lifetime of the LSP. In steady-state, the counters are updated for packets received over the active path of the LSP. The active path can be the primary path, one of the secondary paths, the FRR detour path, or the FRR bypass path when the tail-end node is also the MP.
When a hierarchy of LSPs is in use, statistics collection on the outermost label corresponding to the tunneling LSP and on the inner labels, corresponding to the tunneled LSPs are mutually exclusive. A consequence of this is that when the operator enables statistics collection on an RSVP LSP which is also used for tunneling LDP FECs with the LDP over RSVP feature, then statistics will be collected on the RSVP LSP only. There will be no statistics collected for an LDP FEC tunneled over this RSVP LSP and also egressing on the same node regardless if the operator enabled statistics collection on this FEC. When, the operator disables statistics collection on the RSVP LSP, then statistics collection, if enabled, will be performed on a tunneled LDP FEC.
The operator can enable statistics collection on a manual bypass terminating on the egress LER. However all LSPs which primary path is protected by the manual bypass will not collect statistics when they activate forwarding over the manual bypass. When, the operator disables statistics collection on the manual bypass LSP, then statistics collection on the protected LSP, if enabled, will continue when the bypass LSP is activated.
The no form of this command disables statistics for this RSVP LSP in the ingress data path and removes the accounting policy association from the LSP.
All
This command creates an LSP that is either signaled dynamically by the router, or a statically provisioned MPLS-TP LSP.
When the LSP is created, the egress router must be specified using the to command and at least one primary or secondary path must be specified for signaled LSPs, or at least one working path for MPLS-TP LSPs. All other statements under the LSP hierarchy are optional.
LSPs are created in the administratively down (shutdown) state.
The no form of this command deletes the LSP. All configuration information associated with this LSP is lost. The LSP must be administratively shutdown before it can be deleted. The LSP must also be unbound from all SDPs before it can be deleted.
This option is not supported on the 7450 ESS.
All
Commands in this context define the type of label switched path and the identification of the LSP for which packets traverse. Only a single LSP can be configured per session. Once an LSP has been configured, other LSP types under this context is blocked.
The no form of this command deletes the configured LSP under the context, when there are no active tests are executing under this session.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command specifies the MPLS LSP to be tested.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command restricts the search for a resolving LSP to a specific set of named LSPs. Only those LSPs named in the associated name list will be searched for a match to resolve the associated static route.
All
This command creates associations between one or more label switched paths (LSPs) and an Multi-Protocol Label Switching (MPLS) Service Distribution Point (SDP). This command is implemented only on MPLS-type encapsulated SDPs.
In MPLS SDP configurations either one or more LSP names can be specified or LDP can be enabled. The SDP ldp and lsp commands are mutually exclusive except if the mixed-lsp-mode option is also enabled. If an LSP is specified on an MPLS SDP, then LDP cannot be enabled on the SDP. To enable LDP on the SDP when an LSP is already specified, the LSP must be removed from the configuration using the no lsp lsp-name command.
Alternatively, if LDP is already enabled on an MPLS SDP, then an LSP cannot be specified on the SDP. To specify an LSP on the SDP, the LDP must be disabled or the mixed-lsp-mode option is also enabled. The LSP must have already been created in the config>router>mpls context. with a valid far-end IP address. RSVP must be enabled.
If no LSP is associated with an MPLS SDP, the SDP cannot enter the operationally up state. The SDP can be administratively enabled (no shutdown) with no LSP associations. The lsp-name may be shutdown, causing the association with the SDP to be operationally down (the LSP will not be used by the SDP).
Up to 16 LSP names can be entered on a single command line.
The no form of this command deletes one or more LSP associations from an SDP. If the lsp-name does not exist as an association or as a configured LSP, no error is returned. An lsp-name must be removed from all SDP associations before the lsp-name can be deleted from the system. The SDP must be administratively disabled (shutdown) before the last lsp-name association with the SDP is deleted.
All
Commands in this context configure LSP BFD for a set of LDP LSPs with FECs matching those defined in the specified prefix list.
Up to 16 LSP BFD instances can be configured for LDP.
If a prefix corresponding to an LDP FEC appears in more than one prefix list, then the system will apply the LSP BFD configuration to the LSP only once. A prefix list may contain a longest match corresponding to one or more LDP FECs, in which case the BFD configuration is applied to all of those LDP LSPs.
The no form of the command removes LSP BFD. Specifying a prefix list name will remove LSP BFD for all LDP FECs that match the specified prefix list, except those LDP FECs that also match another LSP BFD prefix list.
no lsp-bfd
All
This command creates a context for the configuration of LSP BFD parameters.
All
This command explicitly sets the forwarding class or subclass enqueuing priority when a packet is marked with a MPLS EXP bits specified. Adding a lsp-exp rule on the policy forces packets that match the MPLS LSP EXP specified to override the forwarding class and enqueuing priority based on the parameters included in the lsp-exp rule. When the forwarding class is not specified in the rule, a matching packet preserves (or inherits) the existing forwarding class derived from earlier matches in the classification hierarchy. When the enqueuing priority is not specified in the rule, a matching packet preserves (or inherits) the existing enqueuing priority derived from earlier matches in the classification hierarchy.
The lsp-exp-value is derived from the MPLS LSP EXP bits of the top label.
Multiple commands can be entered to define the association of some or all eight LSP EX bit values to the forwarding class.
The no form of this command removes the explicit lsp-exp classification rule from the SAP ingress policy. Removing the rule on the policy immediately removes the rule on all ingress SAPs using the policy.
This command applies to Ethernet Layer 2 SAPs only.
A maximum of eight lsp-exp rules are allowed on a single policy.
The subclass-name parameter is optional and used with the fc-name parameter to define a pre-existing subclass. The fc-name and subclass-name parameters must be separated by a period (dot). If subclass-name does not exist in the context of fc -name, an error will occur.
All
This command creates a mapping between the LSP EXP bits of the network ingress traffic and the forwarding class.
Ingress traffic that matches the specified LSP EXP bits will be assigned to the corresponding forwarding class. Multiple commands can be entered to define the association of some or all eight LSP EXP bit values to the forwarding class. For undefined values, packets are assigned to the forwarding class specified under the default-action command.
The no form of this command removes the association of the LSP EXP bit value to the forwarding class. The default-action then applies to that LSP EXP bit pattern.
no lsp-exp
All
This command specifies the in-profile LSP EXP value for the forwarding class. The EXP value will be used for all LSP labeled packets requiring marking that require marking at egress on this forwarding class queue, and that are in-profile. The inplus-profile traffic is marked with the same value as in-profile traffic.
When multiple EXP values are associated with the forwarding class at network egress, the last name entered will overwrite the previous value.
The no form of this command resets the configuration to the factory default in-profile EXP setting.
Policy-id 1: | Factory setting |
Policy-id 2 to 65535: | Policy-id setting |
All
This command specifies the out-of-profile LSP EXP value for the forwarding class. The EXP value will be used for all LSP labeled packets that require marking at egress on this forwarding class queue, and that are out-of-profile. The exceed-profile traffic is marked with the same value as out-of-profile traffic.
When multiple EXP values are associated with the forwarding class at network egress, the last name entered will overwrite the previous value.
The no form of this command resets the configuration to the factory default out-of-profile EXP setting.
Policy-id 1: | Factory setting |
Policy-id 2 to 65535: | Policy-id setting |
All
This command specifies the amount of time that the ingress node holds before programming its data plane and declaring a GMPLS LSP up. This occurs anytime the ingress UNI-C node brings up a GMPLS LSP path or reroutes a GMPLS LSP. The hold-time value should be configured to reflect the data path programming time for the optical technology used between the ingress and egress UNI-N nodes.
The no form of the command resets the configuration to the default value.
lsp-hold-timer 60
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the initial GMPLS LSP path retry timer.
The new GMPLS LSP path initial retry timer is used instead of the retry-timer to abort the retry cycle when no RESV is received. The retry-timer exclusively governs the time between two retry cycles and to handle retrying of a GMPLS LSP path in a failure case with PATH errors or RESVTear.
The no form of this command returns the timer to the default value.
lsp-init-retry-timeout 30
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the initial LSP path retry-timer.
The new LSP path initial retry-timer is used instead of the retry-timer to abort the retry cycle when no RESV is received. The retry-timer exclusively governs the time between two retry cycles and to handle retrying of an LSP path in a failure case with PATH errors or RESVTear.
The intent is that the user can now control how many refreshes of the pending PATH state can be performed before starting a new retry-cycle with a new LSP ID. This is all done without affecting the ability to react faster to failures of the LSP path, which will continue to be governed by the retry-timer.
The no form of this command returns the timer to the default value.
lsp-init-retry-timeout 30
All
This command sets the time, in seconds, SPB wants the LSPs it originates to be considered valid by other routers in the domain. This is a control B-VPLS command.
Each LSP received is maintained in an LSP database until the lsp-lifetime expires unless the originating router refreshes the LSP. By default, each router refreshes its LSPs every 20 minutes (1200 seconds) so other routers will not age out the LSP.
The LSP refresh timer is derived from this formula: lsp-lifetime/2.
LSPs originated by SPB should be valid for 1200 seconds (20 minutes).
The no form of this command reverts to the default value.
lsp-lifetime 1200
All
This command sets the time, in seconds, the router wants the LSPs it originates to be considered valid by other routers in the domain.
Each LSP received is maintained in an LSP database until the lsp-lifetime expires unless the originating router refreshes the LSP. By default, each router refreshes its LSPs every 20 minutes (1200 seconds) so other routers will not age out the LSP.
The LSP refresh timer is derived from this formula: lsp-lifetime/2
LSPs originated by the router should be valid for 1200 seconds (20 minutes).
The no form of this command reverts to the default value.
lsp-lifetime 1200
All
This command sets the time, in seconds, the router wants the LSPs it originates to be considered valid by other routers in the domain.
Each LSP received is maintained in an LSP database until the lsp-lifetime expires unless the originating router refreshes the LSP. By default, each router refreshes its LSPs every 20 minutes (1200 seconds) so other routers will not age out the LSP.
The LSP refresh timer is derived from this formula: lsp-lifetime/2
The no form of this command reverts to the default value.
lsp-lifetime 1200
All
This command configures the minimum value to which the remaining lifetime of the LSP is set. The value is a counter that decrements, in seconds, starting from the value in the received LSP (if not self-originated) or from lsp-lifetime seconds (if self-originated). When the remaining lifetime becomes zero, the contents of the LSP is purged. The remaining lifetime of an LSP is not changed when there is no lsp-minimum-remaining-lifetime value configured.
The configured value must be greater than or equal to the lsp-lifetime value.
The no form of this command removes the seconds value from the configuration.
no lsp-minimum-remaining-lifetime
All
This command configures the minimum value to which the remaining lifetime of the LSP is set. The value is a counter that decrements, in seconds, starting from the value in the received LSP (if not self-originated) or from lsp-lifetime seconds (if self-originated). When the remaining lifetime becomes zero, the contents of the LSP is purged. The remaining lifetime of an LSP is not changed when there is no lsp-minimum-remaining-lifetime value configured.
The configured value must be greater than or equal to the lsp-lifetime value.
The no form of this command removes the seconds value from the configuration.
All
This command configures the LSP MTU size. If the size value is changed from the default using CLI or SNMP, then ISIS must be restarted for the change to take effect. This can be done by performing a shutdown command and then a no shutdown command in the config>router>isis context.
![]() | Note: Using the exec command to execute a configuration file to change the LSP MTU size from its default value will automatically restart IS-IS for the change to take effect. |
The no form of this command reverts to the default value.
lsp-mtu-size 1492
All
This command configures the LSP MTU size. If the size value is changed from the default using CLI or SNMP, then IS-IS must be restarted in order for the change to take effect. This can be done by performing a shutdown command and then a no shutdown command in the config>router>isis context.
![]() | Note: Using the exec command to execute a configuration file to change the LSP MTU-size from its default value automatically restarts IS-IS for the change to take effect. |
The no form of this command reverts to the default value.
lsp-mtu-size 1492
All
This command configures the MPLS-TP LSP Number for the working TP path or the Protect TP Path.
lsp-num 1 (for a working path), lsp-num 2 (for a protect path)
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command configures the interval during which LSPs are sent from the interface.
To avoid overwhelming neighbors that have less CPU processing power with LSPs, the pacing interval can be configured to limit how many LSPs are sent during an interval. LSPs may be sent in bursts during the interval up to the configured limit. If a value of 0 is configured, no LSPs are sent from the interface.
If configured to the default LSP pacing interval of 100, LSPs are sent in 100 millisecond intervals.
The no form of this command reverts to the default value.
![]() | Note: The IS-IS timer granularity is 100 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
lsp-pacing-interval 100
0 to 65535
All
This command configures the interval at which LSPs are sent from the interface.
To avoid overwhelming neighbors that have less CPU processing power with LSPs, the pacing interval can be configured to limit how many LSPs are sent at the interval. LSPs are sent in bursts at the interval up to the configured limit. If a value of 0 is configured, no LSPs are sent from the interface.
If configured to the default LSP pacing interval of 100, LSPs are sent in 100 millisecond intervals.
The no form of this command reverts to the default value.
![]() | Note: The IS-IS LSP pacing interval is 100 milliseconds for values < 100 milliseconds, and 1 second for values ≥ 100 milliseconds. For example, a pacing interval of 2 milliseconds means that a maximum of 50 LSPs are sent in a burst at 100 millisecond intervals. The default pacing interval of 100 milliseconds means that a maximum of 10 LSPs are sent in a burst at 1 second intervals. |
lsp-pacing-interval 100
All
This command configures the interval at which LSPs are sent from the interface.
To avoid overwhelming neighbors that have less CPU processing power with LSPs, the pacing interval can be configured to limit how many LSPs are sent at the interval. LSPs are sent in bursts at the interval up to the configured limit. If a value of 0 is configured, no LSPs are sent from the interface. The interval applies to all LSPs: LSPs generated by the router, and LSPs received from other routers.
If configured to the default LSP pacing interval of 100, LSPs are sent in 100 millisecond intervals.
The no form of this command reverts to the default value.
![]() | Note: The IS-IS LSP pacing interval is 100 milliseconds for values < 100 milliseconds, and 1 second for values ≥ 100 milliseconds. For example, a pacing interval of 2 milliseconds means that a maximum of 50 LSPs are sent in a burst at 100 millisecond intervals. The default pacing interval of 100 milliseconds means that a maximum of 10 LSPs are sent in a burst at 1 second intervals. |
lsp-pacing-interval 100
All
This command performs in-band LSP connectivity tests.
This command performs an LSP ping using the protocol and data structures defined in the RFC 8029, Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures.
The LSP ping operation is modeled after the IP ping utility which uses ICMP echo request and reply packets to determine IP connectivity.
In an LSP ping, the originating device creates an MPLS echo request packet for the LSP and path to be tested. The MPLS echo request packet is sent through the data plane and awaits an MPLS echo reply packet from the device terminating the LSP. The status of the LSP is displayed when the MPLS echo reply packet is received.
This command, when used with the static option, performs in-band on-demand LSP connectivity verification tests for static MPLS-TP LSPs. For other LSP types, the static option should be excluded and these are described elsewhere in this user guide.
The lsp-ping static command performs an LSP ping using the protocol and data structures defined in the RFC 8029, Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures, as extended by RFC 6426, MPLS On-Demand Connectivity Verification and Route Tracing.
In MPLS-TP, the echo request and echo reply messages are always sent in-band over the LSP, either in a G-ACh channel or encapsulated as an IP packet below the LSP label.
The timestamp format to be sent, and to be expected when received in a PDU, is as configured by the config>test-oam>mpls-time-stamp-format command. If RFC 4379 (obsoleted by RFC 8029) is selected, then the timestamp is in seconds and microseconds since 1900, otherwise it is in seconds and microseconds since 1970.
The active LSP path
Values: Any path name associated with the LSP
![]() | Note: The rsvp-te explicit target FEC type is not supported under the SAA context. |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | a.b.c.d | ||
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x: | [0 to FFFF]H | ||
d: | [0 to 255]D |
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | a.b.c.d | ||
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x: | [0 to FFFF]H | ||
d: | [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | a.b.c.d | ||
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x: | [0 to FFFF]H | ||
d: | [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | a.b.c.d | ||
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x: | [0 to FFFF]H | ||
d: | [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | - a.b.c.d | ||
ipv6-prefix | - x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x - | [0 to FFFF]H | ||
d - | [0 to 255]D |
ipv6-prefix | - x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x - | [0 to FFFF]H | ||
d - | [0 to 255]D |
![]() | Note: The sr-policy target FEC type is supported under the OAM context and under type-multi-line node in the SAA context. |
color color-id — Specifies the color ID.
Values 0 to 4294967295
endpoint ip-address — Specifies the endpoint address.
Values
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
segment-list segment-list-id — Specifies the segment list ID.
Values 1 to 32
When an MPLS echo request packet is generated in CPM and is forwarded to the outgoing interface, the packet is queued in the egress network queue corresponding to the specified fc and profile parameter values. The marking of the packet's EXP is dictated by the LSP-EXP mappings on the outgoing interface.
When the MPLS echo request packet is received on the responding node, The FC and profile parameter values are dictated by the LSP-EXP mappings of the incoming interface.
When an MPLS echo reply packet is generated in CPM and is forwarded to the outgoing interface, the packet is queued in the egress network queue corresponding to the FC and profile parameter values determined by the classification of the echo request packet, which is being replied to, at the incoming interface. The marking of the packet's EXP is dictated by the LSP-EXP mappings on the outgoing interface. The ToS byte is not modified. Table 72 summarizes this behavior.
CPM (sender node) | Echo request packet:
|
Outgoing interface (sender node) | Echo request packet:
|
Incoming interface (responder node) | Echo request packet:
|
CPM (responder node) | Echo reply packet:
|
Outgoing interface (responder node) | Echo reply packet:
|
Incoming interface (sender node) | Echo reply packet:
|
The LSP-EXP mappings on the receive network interface controls the mapping of the message reply at the originating router.
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
This sample output is for a LDP IPv4 and IPv6 prefix FECs.
All
Commands in this context configure the lsp-ping OAM probe type.
All
This command configures the interval between periodic LSP ping messages for LSPs on which bfd-enable is configured. The LSP ping messages are used to bootstrap and maintain the LSP BFD session.
Configuring an interval of 0 seconds disables periodic LSP ping. An LSP ping message containing a bootstrap TLV will only be sent when the BFD session is first initialized.
In scaled environments, LSP BFD sessions should use longer intervals to reduce congestion and common resource loading. Unless required, the interval should not be set lower than 300 s.
The no form of this command restores the default interval.
lsp-ping-interval 60
All
This command configures the interval for the periodic LSP ping for RSVP LSPs on which bfd-enable has been configured. This interval is used to bootstrap and maintain the LSP BFD session. A value of 0 disables periodic LSP Ping, such that an LSP Ping containing a bootstrap TLV is only sent when the BFD session is first initialized.
In scaled environments, LSP BFD sessions should use longer timers to reduce the chance of congestion and loading of common resources. Unless required, the lsp-ping-interval should not be set lower than 300 seconds.
The no form of this command reverts to the default value.
no lsp-ping-interval
All
This command enables debugging for lsp-ping.
All
This command configures the LSP refresh timer interval. When configuring the LSP refresh interval, the value that is specified for lsp-lifetime must also be considered. The LSP refresh interval cannot be greater than 90% of the LSP lifetime.
The no form of this command reverts to the default (600 seconds), unless this value is greater than 90% of the LSP lifetime. For example, if the LSP lifetime is 400, then the no lsp-refresh-interval command will be rejected.
lsp-refresh-interval 600 half-lifetime enable
All
This command configures the IS-IS LSP refresh timer interval for the VPRN instance. When configuring the LSP refresh interval, the value that is specified for lsp-lifetime must also be considered. The LSP refresh interval cannot be greater than 90% of the LSP lifetime.
The no form of this command reverts to the default (600 seconds), unless this value is greater than 90% of the LSP lifetime. For example, if the LSP lifetime is 400, then the no lsp-refresh-interval command will be rejected.
lsp-refresh-interval 600 half-lifetime enable
All
This command configures the IS-IS LSP refresh timer interval. When configuring the LSP refresh interval, the value that is specified for lsp-lifetime must also be considered. The LSP refresh interval cannot be greater than 90% of the LSP lifetime.
The no form of this command reverts to the default (600 seconds), unless this value is greater than 90% of the LSP lifetime. For example, if the LSP lifetime is 400, then the no lsp-refresh-interval command will be rejected.
lsp-refresh-interval 600 half-lifetime enable
All
Commands in this context configure LSP self-ping parameters.
LSP Self-ping checks that the datapath of an RSVP LSP has been programmed by all LSRs along its path before switching the traffic to it. If enabled, LSP Self-ping packets are sent periodically at a configurable interval following the receipt of the RESV message for an RSVP LSP path following an MBB or other event where the active path changes while the previous active path stayed up. The router will not switch traffic to the new path until an LSP Self-ping reply is received from the far-end LER.
When configured under the MPLS context, LSP Self-ping is enabled for all RSVP LSPs, unless it is explicitly disabled for a given LSP.
The no form of this command disables the system check for LSP Self-ping.
no lsp-self-ping
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command enables LSP Self-ping on a given RSVP-TE LSP or LSP template. If set to disable, then LSP Self-ping is disabled irrespective of the setting of lsp-self-ping>rsvp-te under the mpls context. By default, each LSP and LSP template inherits this value.
The no form of this command reverts to the default.
lsp-self-ping inherit
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
All
This command enables and disables debugging for GMPLS LSP Setup events.
7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command debugs LSP setup events.
The no form of the command disables the debugging.
All
This command specifies the template name of the RSVP P2MP LSP instance to be used by the leaf node or the root-and-leaf node that participates in BGP-AD VPLS. The P2MP LSP is referred to as the Inclusive Provider Multicast Service Interface (I-PMSI).
After the user performs a no shutdown under the context of the inclusive node and the delay timer expires, BUM packets will be forwarded over an automatically signaled instance of the RSVP P2MP LSP specified in the LSP template.
The no version of this command removes the P2MP LSP template from the I-PMSI configuration.
All
This command specifies the use of automatically created P2MP LSP as the provider tunnel. The P2MP LSP will be signaled using the parameters specified in the template, such as bandwidth constraints, and so on.
no lsp-template
All
This command creates a RSVP-TE LSP template for S-PMSI. Multi-stream S-PMSIs can share a single template or can each use their own template.
All
This command specifies the use of automatically created P2MP LSP as the inclusive or selective provider tunnel. The P2MP LSP will be signaled using the parameters specified in the template, such as bandwidth constraints, and so on.
no lsp-template
All
The no form of this command deletes the LSP template. An LSP template cannot be deleted if a client application is using it.
The p2mp option is supported on the 7750 SR, 7950 XRS, and with VPLS only on the 7450 ESS.
All
This command specifies the use of automatically created P2MP LSP as the provider tunnel. The P2MP LSP will be signaled using the parameters specified in the template, such as bandwidth constraints.
The no form of this command removes the lsp-template name from this configuration.
no lsp-template
All
This command specifies the LSP template used to identify the LSP for testing.
One of three mandatory configuration statements that are required to identify automatically created RSVP LSPs, created using config>router>mpls>lsp-template. The config>router>mpls>auto-lsp>lsp-template links three distinct functions.
The lsp-template template-name must match the name of config>router>mpls>lsp-template used to dynamically create the RSVP LSP. This is a lose reference and does not impede the manipulation of the config>router>mpls>lsp-template. The required identifiers are from, lsp-template and to, all under this node.
The no form of this command deletes the template-name reference from the configuration.
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
This command performs an LSP traceroute using the protocol and data structures defined in IETF RFC 8029.
The LSP trace operation is modeled after the IP traceroute utility which uses ICMP echo request and reply packets with increasing TTL values to determine the hop-by-hop route to a destination IP.
In an LSP trace, the originating device creates an MPLS echo request packet for the LSP to be tested with increasing values of the TTL in the outermost label. The MPLS echo request packet is sent through the data plane and awaits a TTL exceeded response or the MPLS echo reply packet from the device terminating the LSP. The devices that reply to the MPLS echo request packets with the TTL exceeded and the MPLS echo reply are displayed.
The downstream mapping TLV is used in lsp-trace to provide a mechanism for the sender and responder nodes to exchange and validate interface and label stack information for each downstream hop in the path of the LDP FEC an RSVP LSP, or a BGP IPv4 label route.
Two downstream mapping TLVs are supported. The original Downstream Mapping (DSMAP) TLV defined in RFC 4379 (obsoleted by RFC 8029) and the new Downstream Detailed Mapping (DDMAP) TLV defined in RFC 6424 AND RFC 8029. More details are provided in the DDMAP TLV sub-section below.
In addition, when the responder node has multiple equal cost next hops for an LDP FEC, a BGP label IPv4 prefix, an SR-ISIS node SID, an SR-OSPF node SID, or an SR-TE LSP, it replies in the Downstream Mapping TLV with the downstream information for each outgoing interface which is part of the ECMP next-hop set for the prefix. The downstream mapping TLV can further be used to exercise a specific path of the ECMP set using the path-destination option.
This command, when used with the static option, performs in-band on-demand LSP traceroute tests for static MPLS-TP LSPs. For other LSP types, the static option should be excluded and these are described elsewhere in this user guide.
The lsp-trace static command performs an LSP trace using the protocol and data structures defined in the RFC 8029, Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures, as extended by RFC 6426, MPLS On-Demand Connectivity Verification and Route Tracing.
In MPLS-TP, the echo request and echo reply messages are always sent in-band over the LSP, either in a G-ACh channel or encapsulated as an IP packet below the LSP label.
The timestamp format to be sent, and to be expected when received in a PDU, is as configured by the configure test-oam mpls-time-stamp-format command. If RFC 4379 (obsoleted by RFC 8029) is selected, then the timestamp is in seconds and microseconds since 1900, otherwise it is in seconds and microseconds since 1970.
![]() | Note: The rsvp-te explicit target FEC type is not supported under the SAA context. |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | a.b.c.d | ||
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x: | [0 to FFFF]H | ||
d: | [0 to 255]D |
ipv4-address: a.b.c.d | |
ipv6-address: x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | |
x: [0 to FFFF]H | |
d: [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | - a.b.c.d | ||
ipv6-prefix | - x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x - | [0 to FFFF]H | ||
d - | [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | a.b.c.d | ||
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x: | [0 to FFFF]H | ||
d: | [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | a.b.c.d | ||
ipv6-prefix | x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x: | [0 to FFFF]H | ||
d: | [0 to 255]D |
<ipv4-prefix>/32 | <ipv6-prefix>/128 | |||
ipv4-prefix | - a.b.c.d | ||
ipv6-prefix | - x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x - | [0 to FFFF]H | ||
d - | [0 to 255]D |
ipv6-prefix | - x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | |||
x - | [0 to FFFF]H | ||
d - | [0 to 255]D |
![]() | Note: The sr-policy target FEC type is supported under the OAM context and under type-multi-line node in the SAA context. |
color color-id — Specifies the color ID.
Values 0 to 4294967295
endpoint ip-address — Specifies the endpoint address.
Values
ipv4-address: | a.b.c.d | |
ipv6-address: | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x: | [0 to FFFF]H | |
d: | [0 to 255]D |
segment-list segment-list-id — Specifies the segment list ID.
Values 1 to 32
When an MPLS echo request packet is generated in CPM and is forwarded to the outgoing interface, the packet is queued in the egress network queue corresponding to the specified FC and profile parameter values. The marking of the packet EXP is dictated by the LSP-EXP mappings on the outgoing interface.
When the MPLS echo request packet is received on the responding node, The FC and profile parameter values are dictated by the LSP-EXP mappings of the incoming interface.
When an MPLS echo reply packet is generated in CPM and is forwarded to the outgoing interface, the packet is queued in the egress network queue corresponding to the fc and profile parameter values determined by the classification of the echo request packet, which is being replied to, at the incoming interface. The marking of the packet's EXP is dictated by the LSP-EXP mappings on the outgoing interface. The ToS byte is not modified. Table 73 summarizes this behavior.
CPM (sender node) | Echo request packet:
|
Outgoing interface (sender node) | Echo request packet:
|
Incoming interface (responder node) | Echo request packet:
|
CPM (responder node) | Echo reply packet:
|
Outgoing interface (responder node) | Echo reply packet:
|
Incoming interface (sender node) | Echo reply packet:
|
If the interval is set to 1 second, and the timeout value is set to 10 seconds, then the maximum time between message requests is 10 seconds and the minimum is 1 second. This depends upon the receipt of a message reply corresponding to the outstanding message request.
ipv4-address: a.b.c.d | ||
ipv6-address: x:x:x:x:x:x:x:x (eight 16-bit pieces) | ||
x:x:x:x:x:x:d.d.d.d | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D |
All
This command creates the context to perform an LSP traceroute using the protocol and data structures defined in IETF RFC 4379 (obsoleted by RFC 8029).
All
This command is used to customize LSP generation throttling. Timers that determine when to generate the first, second and subsequent LSPs can be controlled with this command. Subsequent LSPs are generated at increasing intervals of the second lsp-wait timer until a maximum value is reached.
![]() | Note: The IS-IS timer granularity is 100 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
All
This command is used to customize LSP generation throttling. Timers that determine when to generate the first, second, and subsequent LSPs can be controlled with this command. Subsequent LSPs are generated at increasing intervals of the second lsp-wait timer until a maximum value is reached.
![]() | Note: The timer granularity is 10 ms if the value is < 500 ms, and 100 ms if the value is ≥ 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
All
This command customizes LSP generation throttling. Timers that determine when to generate the first, second and subsequent LSPs can be controlled with this command. Subsequent LSPs are generated at increasing intervals of the second lsp-wait timer until a maximum value is reached.
![]() | Note: The timer granularity is 10 ms if the value is less than 500 ms, and 100 ms if the value is greater than or equal to 500 ms. Timer values are rounded down to the nearest granularity, for example a configured value of 550 ms is internally rounded down to 500 ms. |
lsp-wait 5000 lsp-initial-wait 10 lsp-second-wait 1000
All
This command configures the TTL propagation for transit packets at a router acting as an LSR for a BGP label route.
When an LSR swaps the BGP label for a ipv4 prefix packet, therefore acting as a ABR, ASBR, or data-path Route-Reflector (RR) in the base routing instance, or swaps the BGP label for a vpn-ipv4 or vpn-ipv6 prefix packet, therefore acting as an inter-AS Option B VPRN ASBR or VPRN data path Route-Reflector (RR), the all value of this command enables TTL propagation of the decremented TTL of the swapped BGP label into all outgoing LDP or RSVP transport labels.
When an LSR swaps a label or stitches a label, it always writes the decremented TTL value into the outgoing swapped or stitched label. What this feature controls is whether this decremented TTL value is also propagated to the transport label stack pushed on top of the swapped or stitched label.
The none value reverts to the default mode which disables TTL propagation. This changes the existing default behavior which propagates the TTL to the transport label stack. When a customer upgrades, the new default becomes in effect. This command does not have a no version.
This feature also controls the TTL propagation at an LDP-BGP stitching LSR in the LDP to BGP stitching direction. It also controls the TTL propagation in Carrier Supporting Carrier (CsC) VPRN at both the CsC CE and CsC PE.
SR OS does not support ASBR or data path RR functionality for labeled IPv6 routes in the global routing instance (6PE). As such the CLI command of this feature has no impact on prefix packets forwarded in this context.
lsr-label-route none
All
This command specifies whether the IP header is used in the LAG and ECMP LSR hashing algorithm. This is the per interface setting.
no lsr-load-balancing
All
This command specifies whether the IP header is used in the LAG and ECMP LSR hashing algorithm. This is the per interface setting.
no lsr-load-balancing
All
This command configures system-wide LSR load balancing. Hashing can be enabled on the label stack and/or IP header at an LSR for spraying labeled IP packets over multiple equal cost paths and/or over multiple links of a LAG group.
The LSR hash routine operates on the label stack and the IP header if a packet is IPv4. An LSR will consider a packet to be IPv4 if the first nibble following the bottom of the label stack is 4. The hash on label and IPv4 and IPv6 headers can be enabled or disabled at the system level or incoming network IP interface level.
no lsr-load-balancing
All
This command enables new queues associated with a LUB context to use a minimum PIR similar to the effect of the limit-pir-zero-drain command. When a queue is initially created in a LUB context, it defaults to a zero value PIR until H-QoS has an opportunity to configure an offered rate based operational PIR. Enabling this command forces a minimum rate operational PIR to be applied to the queue for use by enqueued packets prior to an H-QoS iteration.
The no form of this command reverts to default behavior.
no lub-init-min-pir
All