For feedback and comments:
documentation.feedback@alcatel-lucent.com

Table of Contents Previous Next Index


Table of Contents

Preface
Preface
About This Guide
About This Guide
Audience
List of Technical Publications
Technical Support
Basic System
In This Section
IEEE 1588 for Frequency, Phase, and Time Distribution
In This Chapter
In This Chapter
Applicability
Summary
PTP Basics
PTP Deployment Architectures
PTP Profiles
Unicast Message Negotiation
Network Limits
Packet Delay Variation
PDV Metrics
ITU-T Budget for Frequency
ITU-T Budget for Time
Configuration
IP Addressing for PTP Communication
Master and Slave Clocks for Frequency
Ordinary Master Configuration
Ordinary Slave Configuration
Verification of Session Establishment
Optional Configuration Items for Ordinary Master or Slave Configuration
Boundary Clock
Boundary Clock with VPRN Access
Port Based Timestamping
1588 as NTP Local Clock (server)
Conclusion
Multi-Chassis Synchronization for IGMP Snooping
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Configuration of MCS without IGMP snooping
Configuration of MCS with IGMP Snooping
Conclusion
Synchronous Ethernet
In This Chapter
In This Chapter
Applicability
Summary
Overview
Synchronous Ethernet
Central Synchronization Sub-System
Synchronization Status Messages (SSM)
SyncE Chains
Configuration
Configuration 1
Configuration 2
Conclusion
Interface Configuration
In This Section
Multi-Chassis APS and Pseudowire Redundancy Interworking
In This Chapter
In This Chapter
Applicability
Overview
MC-APS
Pseudowire Redundancy
Network Topology
Configuration
Forced Switchover
Conclusion
Multi-Chassis LAG and Pseudowire Redundancy Interworking
In This Chapter
In This Chapter
Applicability
Overview
MC-LAG
Pseudowire Redundancy
Network Topology
Configuration
MC-LAG in VPLS Services
Forced Switchover
Conclusion
Services: Layer 2 and EVPN
In This Section
BGP Multi-Homing for VPLS Networks
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
Global BGP Configuration
Service Level Configuration
Core PE Service Configuration
MTU Service Configuration
Influencing the Designated Forwarder (DF) Decision
Black-hole Avoidance
Access CE/PE Signaling
Operational Groups for BGP-MH
Show Commands and Debugging Options
Conclusion
BGP VPLS
In This Chapter
In This Chapter
Applicability
Summary
Overview
BGP VPLS
Configuration
BGP VPLS PE Configuration
Pseudowire Templates
Pseudowire Templates for Auto-SDP Creation Using LDP
Pseudowire Templates for Provisioned SDPs using RSVP-TE
BGP VPLS Using Auto-Provisioned SDPs
VE-ID and BGP Label Allocations
PE-2 Service Creation
PE-3 Service Creation
PE-1 Service Operation Verification
PE-2 Service Operation Verification
PE-2 De-Multiplexer Label Calculation
PE-3 Service Operation Verification
PE-3 De-Multiplexer Label Verification
BGP VPLS Using Pre-Provisioned SDP
PE-1 De-Multiplexor Label Calculation
Conclusion
BGP Virtual Private Wire Services
In This Chapter
In This Chapter
Applicability
Introduction
Overview
BGP VPWS
Configuration Tasks
Configuration
Pseudowire Templates
Pseudowire Templates for Auto-SDP Creation using LDP
Pseudowire Templates for Provisioned SDPs using RSVP-TE
Single Homed BGP VPWS using Auto-Provisioned SDPs
VE-ID and BGP Label Allocations
PE-3 Service Creation
PE-1 Service Operation Verification
PE-3 Service Operation Verification
Single Homed BGP VPWS using Pre-Provisioned SDP
Dual Homed BGP VPWS with Single Pseudowire
Dual Homed BGP VPWS with Active/Standby Pseudowire
Conclusion
EVPN for VXLAN Tunnels (Layer 2)
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Enabling EVPN-VXLAN in a VPLS Service
MAC Learning and unknown-mac-route
Scaling BGP-MH Resiliency with the Use of Operational Groups
Use of Proxy-ARP in EVPN-VXLAN Services
MAC Mobility, MAC Duplication and MAC Protection in EVPN
Debug and Show Commands
Conclusion
EVPN for VXLAN Tunnels (Layer 3)
In This Chapter
In This Chapter
Applicability
Overview
Configuration
EVPN-VXLAN in an R-VPLS Service
EVPN-VXLAN in IRB Backhaul R-VPLS Services
EVPN-VXLAN in EVPN Tunnel R-VPLS Services
Routing Policies for IP Prefixes in EVPN
Use of Routing Policies to Avoid Routing Loops in Redundant PEs
Troubleshooting and Debug Commands
Conclusion
Inter-AS Model C for VLL
In This Chapter
In This Chapter
Applicability
Overview
Network Setup
Configuration
BGP Configuration
Policy Configuration
Service Configuration
Show Commands and Troubleshooting
Conclusion
LDP VPLS using BGP-Auto Discovery
In This Chapter
In This Chapter
Applicability
Summary
Overview
BGP-AD
Configuration
VPLS PE Configuration
Pseudowire-Templates
Pseudowire Templates for Auto-SDP Creation using LDP
Pseudowire Templates for Provisioned SDPs using RSVP
VPLS BGP-AD using Auto-Provisioned SDPs
BGP AD using Pre-Provisioned SDPs
Conclusion
Multi-Chassis Endpoint for VPLS Active/Standby Pseudowire
In This Chapter
In This Chapter
Applicability
Overview
Network Topology
Configuration
SDP Configuration
Full Mesh VPLS Configuration
Multi-Chassis Configuration
Mesh Resiliency Configuration
Square Resiliency Configuration
Additional Parameters
Multi-Chassis
Peer Failure Detection
BFD Session
Boot Timer
System Priority
VPLS Endpoint and Spoke SDP
Ignore Standby Pseudowire Bits
Block-on-Mesh-Failure
Precedence
Revert-Time
MAC-Flush Parameters
Failure Scenarios
Core Node Failure
Multi-Chassis Node Failure
Multi-Chassis Communication Failure
Passive Mode
Conclusion
Multi-Segment Pseudowire Routing
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
Pseudowire Routing Enablement
Building the Pseudowire Routing Table
Explicit Paths
Static Routes
BGP Routes
Configuring Dynamic Pseudowires on the T-PEs
Active/Passive Signaling and Auto-Configuration
Spoke-SDP-FEC Timers
Standby Signaling
Spoke-SDP-FEC Templates and Filters
Intra-AS MS-PW Routing
MS-PW using BGP Routing
MS-PW using Static Routing
MS-PW using Explicit Paths
Inter-AS MS-PW Routing
MS-PW using BGP Routing
Conclusion
PBB-Epipe
In This Chapter
In This Chapter
Applicability
Overview
Configuration
PBB Epipe Service Configuration
B-VPLS and PBB Configuration
Epipe Configuration
Flood Avoidance in PBB-Epipes
Flooding Cases 1 and 2 — Wrong backbone-dest-mac
Flooding Case 3 — Unidirectional Traffic: Virtual MEP and CCM Configuration
Flooding Case 4 — Remote Node Failure
PBB-Epipe Show Commands
Conclusion
PBB-VPLS
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
PBB-VPLS M:1 Service Configuration
B-VPLS Configuration
I-VPLS Configuration
MMRP for Flooding Optimization
MAC Flush: Avoiding Blackholes
Access Dual-Homing and MAC Notification
PBB and IGMP Snooping
MMRP Policies and ISID-Based Filtering for PBB Inter-Domain Expansion
MMRP Policies
B-VPLS and I-VPLS Show and Debug Commands
Conclusion
Shortest Path Bridging for MAC
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Basic SPBM Configuration
Control and User B-VPLS Configuration
SPBM Access Resiliency Configuration
Static BMACs and Static ISIDs Configuration
Configuration of ISID-Policies in SPB B-VPLS
Conclusion
Services: Layer 3
In This Section
Carrier Supporting Carrier IP VPNs
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Conclusion
Layer 3 VPN: VPRN Type Spoke
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
Hub Site Configuration
Hub Site Verification
Spoke Site Configuration
Spoke Site Verification
Spoke Sites Connectivity Verification
Conclusion
Multicast in a VPN I
In This Chapter
In This Chapter
Applicability
Summary
References
Overview
Multicast VPN Overview
Configuration
Provider Common Configuration
PE Global Configuration
PE VPRN Configuration
PE VPRN Multicast Configuration
Auto-Discovery within Provider Domain Using PIM
PIM Auto-Discovery: Customer Signaling using PIM
PIM Any Source Multicasting with RP at the Provider PE
Customer Edge Router Multicast Configuration
Traffic Flow
PIM Any Source Multicasting with Anycast RP at the Provider PE
Anycast RP - PE VPRN Configuration
Anycast RP — Customer Edge Router Multicast Configuration
Traffic Flow
PIM Source-Specific Multicasting
PIM SSM — Customer Edge Router Multicast Configuration
Traffic Flow
PE BGP Auto-Discovery
BGP Auto-Discovery — PE VPRN Multicast Configuration
BGP Auto-Discovery — Customer Signaling Domain
Data Path Using Selective PMSI
Conclusion
Multicast in a VPN II
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
Provider Common Configuration
PE Global Configuration
PE VPRN Configuration and PE VPRN Multicast Configuration
PMSI using mLDP
Unicast
Auto-Discovery and mLDP PMSI Establishment
Traffic Flow
PMSI using RSVP-TE
Unicast
Auto-Discovery and RSVP PMSI Establishment
Traffic Flow
MVPN Source Redundancy
MDT AFI SAFI
Conclusion
Multicast VPN: Sender-Only, Receiver-Only
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
RSVP-Based MVPN Configuration
RSVP-Based MVPN Verification and Debugging
MDT-Type Verification
BGP Verification and Debugging
RSVP Verification and Debugging
Multicast Stream Verification
mLDP-Based MVPN Configuration
mLDP-Based MVPN Verification and Debugging
MDT-Type Verification
BGP Verification and Debugging
LDP Verification and Debugging
Multicast Stream Verification
Conclusion
MVPN: Inter-AS Option B
In This Chapter
In This Chapter
Applicability
Overview
Overview
Configuration
MVPN Verification and Debugging
BGP Core Signaling
Core PIM Signaling
Customer PIM Signaling
When Multicast Stream Threshold is Reached
Conclusion
Source Redundancy in a Multicast VPN
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
Global BGP Configuration
Configuring VPRN on PEs
MVPN Configuration for Source PEs
Sender PE Route Policies
Receiver PE Configuration
Enable Redundant Sources
Host Group Membership
Sender PE MVPN status
Conclusion
Spoke Termination for IPv6-6VPE
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Conclusion
VPRN Inter-AS VPN Model C
In This Chapter
In This Chapter
Applicability
Overview
Introduction
Configuration
Conclusion
MPLS
In This Section
Automatic Creation of RSVP-TE LSPs
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Test Topology
Automatic Creation of an RSVP-TE LSP Mesh
Service and Application Verification
IGP Shortcuts
Layer 3 VPN
Layer 2 VPN
Automatic Creation of an RSVP Single-Hop LSPs
Conclusion
BGP Anycast
In This Chapter
In This Chapter
Applicability
Summary
Overview
GRT
IP-VPN
Context-Specific Label Space
Data Path in GRT
BGP Control Plane
Configuration
Anycast Interface
IGP
LDP
BGP Configuration
BGP on the ABR
BGP on the RR
BGP on the PE
Data Path Verification
Deployment Options
E2E MPLS Between Access Nodes
BGP Configuration
SDP Configuration
IP-VPN Routes
Configure IP-VPN at the PE (PE-2 and PE-3)
Configure IP-VPN at the Remote PE (PE-6)
Configure IP-VPN at the CE
Verify Anycast Labels
Verify Data Path Between VPRN on PE-6 and the CE
Conclusion
IGP Shortcuts
In This Chapter
In This Chapter
Applicability
Overview
Configuration
LDP and RSVP Shortcuts
LDP Static Route (IP Tunneled in LDP Tunnel)
RSVP Static Route (IP Tunneled in RSVP Tunnel)
LDP Shortcut for IGP Route Resolution
Handling of Control Packets
Handling of Multicast Packets
ECMP Considerations
RSVP Shortcut for IGP Route Resolution
Handling of Control Packets
Handling of Multicast Packets
ECMP Considerations
RSVP Shortcuts Configuration
Advertising RSVP LSP Tunnel Links in the IGP: Forwarding Adjacency Feature
LSP Relative Metric
LDP/IP FRR LFA for IGP Shortcut Using IS-IS/OSPF
Rules Determining the Installation of Shortcuts into RTM
LDP/RSVP LSP Shortcut for BGP NH Resolution
MPLS/GRE Shortcut for BGP NH Resolution within a VRF
Conclusion
Inter-Area TE Point-to-Point LSPs
In This Chapter
In This Chapter
Applicability
Summary
Inter-Area TE LSP Based On Explicit Route Expansion
ABR Protection
Overview
Configuration
MPLS Path Configuration
MPLS LSP Configuration
ABR Node Protection
Node-ID Inclusion in the RESV Message
Bypass Configuration For ABR Protection
Admin Groups
Admin Group Configuration
Shared Risk Link Groups (SRLG)
SRLG Configuration
LSP Configuration
Conclusion
LDP over RSVP Using OSPF as IGP
In This Chapter
In This Chapter
Applicability
Overview
Introduction
Configuration
Additional Topics
Conclusion
MPLS LDP FRR using ISIS as IGP
In This Chapter
In This Chapter
Applicability
Summary
Implementation
Configuration
Additional Topics
Metric Change
IS-IS Overload Bit
Conclusion
MPLS Transport Profile 
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
Conclusion
Point-to-Point LSPs
In This Chapter
In This Chapter
Applicability
Overview
Packet Forwarding
Terminology
LSP Establishment
Testbed Topology
Configuration
Manually Configured LSPs
LDP
Import and Export Policies
RSVP-TE
Simple RSVP LSP
Manual Resignal
LSP OAM
Debug Tools
Conclusion
RSVP Signaled Point-to-Multipoint LSPs
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Configuring the IP/MPLS Network
Configuring P2MP RSVP LSP
Mapping Multicast Traffic
Head-end Node (Ingress LER)
Leaf Node (Egress LER)
OAM Tool
Additional Topics
<*,G> IGMP join iso <S,G> IGMP join
Influence IGP Metric
Intelligent Remerge
Conclusion
Shared Risk Link Groups for RSVP-Based LSP
In This Chapter
In This Chapter
Applicability
Overview
Introduction
SRLG
Configuration
On-Line Verification
SRLG for FRR
SRLG for Standby Path
SRLG Database
Conclusion
Multi-Service Integrated Service Adapter
In This Section
Application Assurance — App-Profile, ASO and Control Policies
In This Chapter
In This Chapter
Applicability
Summary
Configuration
Activation of AA Services
App-Profile
Residential and Wi-Fi Services
Business VPN and other Service Interfaces
Defining Application Service Options
ASOs for Traffic Control - Introduction
ASO Characteristics and Values
How to Specify Service Options for AA Subscribers
ASO Assignment in App-Profile
ASO Overrides per Subscriber via RADIUS or Gx
ASO Overrides for Business VPN and Other Services
Application Control Policies
App-QoS-Policy (AQP)
App-Profile / ASO / AQP Workflow Summary
Match and Action Criteria
AQP Match Criteria
Default Versus Application-Specific AQP Policies
Application QoS Policy
Default QoS Policy
Implicit Default Subscriber Policy
AQP Entries Evaluation
Multiple AQP Match Entries Per Flow
AQP Evaluation
Policing
Policers
Bandwidth Policing
Single Bucket Subscriber/System Bandwidth Policer
Dual Bucket Subscriber Bandwidth Policer
MBS/CBS Calculation for Bandwidth Policers
Flow Rate Limit Policer
Flow Count Limit Policer
Time of Day Policing
Design and Configuration Examples
Default AA QoS Policy
App-Profile and ASO
Default Bandwidth Policing – 25Mbps AA-Sub
Default Flow-Count-Limit Policing – 25Mbps AA-Sub
Default Flow-Rate-Limit Policing – 25Mbps AA-Sub
Application BW Policing (Per Subscriber)
Conclusion
Application Assurance — Best Practices for ISA and Host IOM Overload Protection
In This Chapter
In This Chapter
Applicability
Overview
ISA Capacity Planning Approach
AA Overload and Resource Monitoring
ISA Overload Models
Understanding Packet and Protocol Cut-Through
Configuration
AA Traffic Load Test Environment
ISA Capacity Cost and Load Balancing Across ISAs
ISA-AA Host IOM - Network Egress Shared Memory and QoS
Configuring ISA Resources and Stats Collection
ISA Overload Cut-through
ISA Default Subscriber Policy
Conclusion
Application Assurance – HTTP In Browser Notification
In This Chapter
In This Chapter
Applicability
Summary
Configuration
HTTP Notification Policy per Message Type
HTTP Notification Policy
App-Profiles and App-Service-Options
RADIUS Policy
Show Commands
HTTP Notification Customization using RADIUS VSA
HTTP Notification Policy
App-Profile and App-Service-Options
RADIUS Policy
Show Commands
Conclusion
Application Assurance — Usage Monitoring and Policy Control via Diameter Gx Protocol
In This Chapter
In This Chapter
Applicability
Overview
Policy Assignment Use Case
Usage Management/Monitoring Use-Case
Gx Usage Monitoring AVP Summary
Configuration
Conclusion
Application Assurance — Asymmetry Removal
In This Chapter
In This Chapter
Applicability
Overview
Configuration
AARP Service Configuration
Configuration Commands for AARP
Show Commands for AARP
Network to Subscriber Traffic Flow
Subscriber to Network Traffic Flow
Typical Configuration Mistakes
Conclusion
Application Assurance — Application Identification and User-Defined Applications
In This Chapter
In This Chapter
Applicability
Overview
Basics and Terminology
Configuration
Classification Criteria (App-Filter)
Application Definition Example
User-Defined Applications
General Recommendations
AppDB/Default AA Policy
App-Filters
App-Filters Ranges
HTTP
Protocol
HTTP Request
Configuration Examples
HTTP Host (Wikipedia)
Classification per URI within the Same Host
SSL/TLS (HTTPs)
Protocol
SSL/TLS Certificates
Server Name Indication
SIP
Protocol
Configuration Example
H323
Protocol
Configuration Example
RTSP
Protocol
Configuration Example
Citrix
Protocol
Configuration Example
IP Address and TCP/UDP Port
Server Address
Server-Address + Server Port
Server Port and Protocol Signature
Flow Setup Direction
IP Protocol
Custom Protocol
Typical Configuration Mistakes
Troubleshooting Application Identification
Show Commands
Router/Partition Statistics
Subscriber Statistics
AppFilterMiss
Tools
Flow-Record-Search
HTTP Host Recorder
Port Recorder
Conclusion
Application Assurance — Stateful Firewall
In This Chapter
In This Chapter
Applicability
Overview
Stateful Filtering
Application Layer Gateway Filtering
Denial Of Service (DOS) Protection
Virtual FW/Zone-Based FW
Configuration
Conclusion
Deterministic Large Scale NAT44
In This Chapter
In This Chapter
Applicability
Overview
Algorithm
Deterministic Mapping
Mapping Rules
Configuration
Configuration Pre-Requisites
Configure a NAT group
Configuration Commands
Case 1
Case 2
Case 3
Inverse Mapping
Online Approach
Offline Approach
Simultaneous Support of Deterministic and Non-Deterministic NAT
Conclusion
IP/GRE Termination
In This Chapter
In This Chapter
Applicability
Summary
Overview
7750 SR-12/SR-7 Implementation
Configuration
Tunnel ISA MDA
Tunnel Groups and Tunnel Group Restrictions
Interfaces
Unprotected GRE Tunnel Configuration
IP/GRE Tunneling via Static Route
IP/GRE Tunneling via BGP Peering
IP/GRE Tunneling via OSPFv2 Peering
IP/GRE Tunneling Protection using IPSec Tunnel Mode
IPSec Configuration
BFD Support on Private Tunnel Interfaces
IP/GRE Termination – Advanced Topics
DSCP Value of Outer Delivery Header
IP-MTU
Statistics and Accounting
Filtering, Policing and QoS
Mirroring
Conclusion
L2TP Network Server
In This Chapter
In This Chapter
Applicability
Overview
Test Topology
Hardware Configuration
Configuration
ESM Base Configuration
Basic LNS Configuration
L2TP Tunnel Set-up
PPP Session Set-up
Wholesale/Retail
QoS
Propagating QoS Markings to L2TP/MPLS Headers
Framed-Route
L2TP Tunnel Switching (LTS)
IPv6
Conclusion
Multi-Chassis IPSec Redundancy
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Configuration Guidelines
Conclusion
NAT in Combination with ESM
In This Chapter
In This Chapter
Applicability
Overview
Server Functionality Behind NAT
Configuration
Hardware Configuration
Service Configuration
Initial Service and Enhanced Subscriber Management Configuration
Successful Creation of a NAT Subscriber
NAT Inside Configuration
NAT Outside Configuration
Binding Inside NAT, Outside NAT and ESM Host
Advanced Topics
RADIUS Accounting
Hardware Resource Monitoring
Outside IP Address Range Management
Quality of Service
Operation
Conclusion
Quality of Service
In This Section
Class Fair Hierarchical Policing for SAPs
In This Chapter
In This Chapter
Applicability
Summary
Overview
Policers
Policer Buckets
Hierarchical Policing
Configuration
Policers
Parent Policer and Arbiters
Access to Switch Fabric and Egress Port
Applying the SAP Ingress and Policer Control Policy
Show Output
Conclusion
Pseudowire QoS
In This Chapter
In This Chapter
Applicability
Overview
Ingress QoS
Egress QoS
Configuration
Create the Ingress and Egress Queue Groups
Create the Ingress FP and Egress Port Queue Group Instances
Create the Network QoS Policy
Apply Network QoS Policy with Queue Group Instances to the Spoke SDP
Show Output
Conclusion
QoS Architecture and Basic Operation
In This Chapter
In This Chapter
Applicability
Overview
QoS Components
Configuration
Policies
Access Network and Hybrid Ports
Service Ingress QoS Policy
Classification
Buffering (Enqueuing)
Scheduling (Dequeuing)
Profile Mode
Remarking
Service Egress QoS Policy
Remarking
Network Ports
Network QoS Policy
Classification
Remarking
Network Queue Policy
Summary of Network Policies
Queue Management
Enqueuing Packets: Buffer Pools
Enqueuing Packets: Queue Sizing
Enqueuing Packets: Weight Random Earlier Detection (WRED)
Dequeuing Packets: Queue Rates
Dequeuing Packets: Scheduling
Show Output
SAP Queue Statistics
Port Queue Statistics
Access-Ingress Pools
Conclusion
Router Configuration
In This Section
Aggregate Route Indirect Next-Hop Option
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Conclusion
Bi-Directional Forwarding Detection
In This Chapter
In This Chapter
Applicability
Overview
Configuration
BFD Base Parameter Configuration and Troubleshooting
BFD for IS-IS
BFD for OSPF
BFD for PIM
BFD for Static Routes
BFD for IES
BFD for RSVP
BFD for T-LDP
BFD Support of OSPF PE-CE Adjacencies
BFD within IPSec Tunnels
BFD for VRRP
Conclusion
LFA Policies Using OSPF as IGP
In This Chapter
In This Chapter
Applicability
Overview
Implementation
Configuration
Examples
Example 1: admin-group
Example 2: SRLG
Example 3: NH-type
Example 4: Exclude Prefix
Conclusion
Routing Protocols
In This Section
Associating Communities with Static and Aggregate Routes
In This Chapter
In This Chapter
Applicability
Introduction
Overview
Associating Communities with Static and Aggregate Routes
Configuration
VPRN: IPv4
Static Routes with Communities
Aggregate Routes with Communities
Conclusion
IS-IS Link Bundling
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Link Group Configuration
Conclusion
Services Overview
In This Section
G.8032 Ethernet Ring Protection Single Ring Topology
In This Chapter
In This Chapter
Applicability
Overview
Ring Protection Mechanism
Configuration
Prerequisites
Conclusion
G.8032 Ethernet Ring Protection Multiple Ring Topology
In This Chapter
In This Chapter
Applicability
Overview
Ring Protection Mechanism
Eth-Ring Terminologies
Load Balancing with Multiple Ring Instances
Provider Backbone (PBB) Support
SR/ESS Implementation
Configuration
Configuration of a Sub-Ring to a Major Ring with a Virtual Link
Configuration of a Sub-Ring to a Major Ring with a Non-Virtual Link
Configuration of a Sub-Ring to a VPLS Service (with a Non-Virtual Link)
Operational Procedures
Conclusion
System Management
In This Section
Distributed CPU Protection
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Conclusion
Triple Play Service Delivery Architecture
ARP Hosts
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
ARP Hosts in a Bridged CO Environment
ARP Hosts in a Routed CO Environment
RADIUS User Configuration Bridged/Routed CO
Setup and Debugging of ARP Host
ARP Host Session Timeout
Throttling Toward RADIUS
ARP Host Mobility
ARP Host Persistency
Session Limitation Options
Conclusion
Bridged CO
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
Basic ESM Configuration on BSA
BSA/BSR Configuration for Host-1 Operation
BSA/BSR Configuration for Host-2 Operation
BSA/BSR Configuration for Host-3 Operation
RADIUS Configuration Bridged CO
Local DHCP Server Configuration Bridged CO
Setup Procedures and Debugging
Subscriber/Host Verification
Host-1 Setup Debug
Host-2 Setup Debug
Host-3 Setup Debug
Advanced Topics
Limiting Number of Subscribers
Limiting Number of Lease States
Limiting Number of Host Per SLA-Profile
Subscriber Host Connectivity Verification
Lease Split
DHCP Option 82
Conclusion
IPv4 DHCP Hosts
In This Chapter
In This Chapter
Applicability
Summary
Overview
Review of the DHCP Protocol
Configuration
DHCP Snooping
DHCP Snooping
DHCP Relay Agent
DHCP Options (Relay Agent Information)
DHCP Lease State
DHCP Host Session: Set-up, Operation and Release
DHCP Hosts Advanced Topics
High Availability
DHCP Lease State Persistency
Limiting the Number of DHCP Hosts
DHCP Host Connectivity Verification
DHCP Lease Split
DHCP Host Mobility
Conclusion
ESM Basics
In This Chapter
In This Chapter
Applicability
Summary
Overview
Configuration
SLA Profile
Subscriber Profile
Subscriber SAP
Subscriber Host Identification and Instantiation
Subscriber Identification Policy
Combining Multiple ESM Data Sources
Default ESM Data Profiles
Address Information
Direct Address Assignment using LUDB/RADIUS
Indirect Address Assignment using a DHCP server
Indirect Address Assignment using LAA
ESM Data Retrieval Examples
ESM Data Retrieval for Static Hosts
ESM Data Retrieval through RADIUS
Authentication Policy
DHCP Host
PPP Host
ESM Data Retrieval through a Local User Database
Optional ESM Data
Limits
Filtering
Accounting
Application Profile
Intermediate Destinations
Conclusion
ESM IPv4: Multicast in a Wholesale/Retail Scenario
In This Chapter
In This Chapter
Applicability
Overview
Configuration
ESM Wholesale-Retail Multicast
ESM Layer 3 Wholesale-Retail Multicast
ESM L2TP Wholesale/Retail Multicast
Conclusion
ESM IPv4: Multicast with Redirection
In This Chapter
In This Chapter
Applicability
Overview
Configuration
ESM Multicast Interface Redirection
ESM SRRP with MC-LAG
Enable IGMP on Group Interface and Redirect Interface on the BNGs
ESM IGMP IPoE walkthrough
ESM IGMP PPPoE Walkthrough
ESM IGMP MCS
ESM IGMP Debug
Conclusion
ESM IPv4: Multicast with SRRP
In This Chapter
In This Chapter
Applicability
Overview
Configuration
ESM SRRP Configuration Overview
Enable IGMP on Group Interfaces
ESM IGMP Policy
ESM IGMP IPoE Walkthrough
ESM IGMP PPPoE Walkthrough
ESM IGMP MCS
ESM IGMP Debug
IGMP Control Plane Filters
IGMP Data Plane Filters
Conclusion
ESMv4: PPPoE Hosts
In This Chapter
In This Chapter
Applicability
Summary
Overview
PPPoE Hosts in a Routed CO Environment
Review of the PPPoE Protocol
Discovery Stage
PPPoE Tags
Session Stage
Setup
PPP Link Control Protocol (LCP)
Authentication Phase
Network-Layer Protocol Phase (PPP IPCP Opening Phase)
Maintenance
Termination
Link Termination Phase
Configuration
PPPoE Host Session: Set-Up, Operation and Release
Discovery Stage
PPPoE Policy Parameters
Local User Database Authentication
Session Stage
lcp
RADIUS Authentication
Local User Database Authentication
DHCP Client Authentication
Local DHCP Server
PPPoE Hosts Advanced Topics
QoS Aspects
Limiting the Number of PPPoE Hosts
Redundancy
High Availability
Conclusion
ESMv6: IPoE Dual Stack Hosts
In This Chapter
In This Chapter
Applicability
Pre-requisites
Summary
Overview
IPoE Dual Stack Hosts
Dual Stack IPoE Routed Gateway Service
Recap of the DHCPv6 Protocol
Prefix Delegation
Configuration
Scenario 1
Scenario 2
Configuring IPv6 Subscriber Prefixes
Enable DHCPv6 Proxy Server
Enable Router Advertisements
RADIUS Authentication and Authorization
Local User Database Authentication and Authorization
DHCP and DHCP6 Lease State
Operation
Troubleshooting
Advanced Topics
Security
Downstream Router Advertisements
Processing of Neighbor Discovery Messages
Anti-spoof Filters
1:1 VLAN Model
Managed SAPs
RADIUS Change of Authorization (CoA)
Accounting
Lease State Persistency
Conclusion
ESMv6: PPPoE Dual Stack Hosts
In This Chapter
In This Chapter
Applicability
Pre-requisites:
Overview
PPPoE Dual Stack
Dual Stack PPPoE Bridged Gateway Service
Dual Stack PPPoE Routed Gateway Service
SLAAC
DHCPv6
Prefix Delegation
Configuration
Service
Dual Stack PPPoE for Bridged Gateway
Dual Stack PPPoE for Routed Gateway
RADIUS
Dual Stack PPPoE for Bridged Gateway
Dual Stack PPPoE for Routed Gateway
Router Advertisements
DHCPv6 Proxy Server
Dual Stack PPPoE for Bridged Gateway
Dual Stack PPPoE for Routed Gateway
DHCPv6 Lease State
Operation
Dual Stack PPPoE for Bridged Gateway
DNSv6
Dual Stack PPPoE for Routed Gateway
DNSv6
Debugging
Advanced Topics
RADIUS COA
IPv6CP Interface ID
Conclusion
Establishing a Diameter Peering Session
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Troubleshooting
Events
Conclusion
Flexible Authentication Model in ESM
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Common Configuration Examples
Access Ethernet Port with QinQ Encapsulation
Capture SAP
auto-sub-id
PPPoE Policy
MSAP Policy
subscriber-interface Configuration
Specific Configuration Parts
DHCP Relay Case with No Authentication
Show Commands
DHCP Relay Case with LUDB + RADIUS Authentication
Show Commands
IP Proxy Case with LUDB + RADIUS Authentication
Show Commands
IP Proxy Case with LUDB + RADIUS Authentication
Show Commands
Troubleshooting Commands
Conclusion
Ingress Multicast Path Management
In This Chapter
In This Chapter
Applicability
Summary
Overview
Paths and Planes
IMPM Managed Traffic
Configuration
Prerequisites
Configuring IMPM
IMPM on an IOM3-XP/IMM
IOM3-XP/IMM Paths
IOM3-XP/IMM Planes
IOM3-XP/IMM Path to Plane Mapping
IMPM Operation on IOM3-XP/IMM
Principle of Operation
Monitoring Traffic Rates
Channel Prioritization and Blackholing Control
IMPM on an IOM1/2
IOM1/2 Paths
IOM1/2 Planes
IOM1/2 Path to Plane Mapping
IMPM Operation on IOM1/2
IMPM Not Enabled
Point-to-Multipoint (P2MP) LSP IP Multicast Traffic
Policed Ingress Routed IP Multicast or VPLS Broadcast, Unknown Or Multicast Traffic
Show Output
IOM3-XP/IMM and Generic Output
IOM1/2 Specific Output
Conclusion
L2TP for Subscriber Access — LAC
In This Chapter
In This Chapter
Applicability
Overview
PPP Access Architectures (PTA versus LAA)
Supported L2TP Encapsulations
Recap of the L2TPv2 Protocol
L2TP Header and AVP Layout
RADIUS-Triggered Tunnel/Session Setup without LNS Renegotiation
RADIUS-Triggered Tunnel/Session Setup with LNS Renegotiation
Running Multiple PPP Sessions Over a Single L2TP Tunnel
PPP User-Initiated Release/Terminate
L2TP Tunnel/Session State Diagram
Configuration
Scenario 1: RADIUS-Derived L2TP Parameters
LAC in the Base Routing Context (base) with Single Endpoint/Single Tunnel
LAC in the Base Routing Context with Multiple Endpoints
LAC in a VRF
Scenario 2: Node-Derived L2TP Parameters
RADIUS Returns L2TP Group
RADIUS-Less Setup (LUDB Returns L2TP Group)
Operation and Troubleshooting
Overview of Debug and Show Commands
Understanding the Debug l2tp Command Output
Scenario 1: RADIUS-Derived L2TP Parameters
LAC in Base Routing Context (base) with Single Endpoint/Single Tunnel
LAC in Base Routing Context with Multiple Endpoints (Tunnel Selection Process)
LAC in a VRF
Scenario 2: Node-Derived L2TP Parameters
RADIUS Returns L2TP Group
LUDB Returns L2TP Group
Advanced Topics
Non-Session-Triggered L2TP Tunnel Setup
Auto-Establish
Tools Tunnel Start
How Long Does a Tunnel Remain Idle Before Being Torn Down?
Idle-Timeout
Tools Tunnel Stop
Keepalive (hello)
Does L2TP Keeps Info About Closed Tunnels, Sessions?
Floating Peers
Tx Connect Speed AVP 24 and Rx Connect Speed AVP 38
Calling Number AVP 22 Format
Prevent LAC from transmitting Calling Number AVP 22 to LNS
cisco-nas-port AVP 100
L2TP Group/Peer/Tunnel Draining
Conclusion
Managed SAPs with Routed CO
In This Chapter
In This Chapter
Applicability
Overview
Capture SAP
Triggering Packets
RADIUS Authentication and Vendor Specifc Attributes (VSAs) for MSAP
Configuration
Configure RADIUS Authentication Policy “authentication-1”
Configure a RADIUS Accounting Policy
Configure an QoS SAP Ingress Policy
Configure Enhanced Subscriber Management Parameters
Configure an MSAP Policy
Configure a VPLS Service with a Capture SAP
Configuration Scenario — Routed CO/VLAN-Per-Subscriber (PPPOE)
Configure RADIUS User Files
Connect PPPoE “user1”
Verify Subscriber Values
Check the Actual Values
MSAP with Redundant Configurations
MSAP QoS Notes
QoS Egress Remarking
Queue Optimization
Configuration Tips
Conclusion
Multi-Chassis Ring Layer 2 with Enhanced Subscriber Management
In This Chapter
In This Chapter
Applicability
Summary
Overview
MC-Ring
MC-Ring Layer 2 CO Operation
Steady-State Operation of Dual-Homed Ring
Broken-Ring Operation and the Transition to this State
Transition from Broken to Closed Ring State
Configuration
Base Topology
NTP Configuration
MC-Ring Configuration
MC-Ring Verification
Unicast Services Configuration
Unicast Services Verification
MCS Verification
Ring Failure Verification
Multicast Service Configuration
Multicast Service Verification
Configuration Notes
Conclusion
Python Cache Support for ESM Applications
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Configuration and Operational Guidelines
Conclusion
RADIUS-Triggered Dynamic Data Service Provisioning
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Conclusion
Raw Formatting of DHCPv4/v6 Options in ESM
In This Chapter
In This Chapter
Applicability
Overview
Configuration
Access Ethernet Port with QinQ Encapsulation
Capture SAP
MSAP-Policy Configuration
Subscriber-Interface and Group-Interface Configuration
Loopback (DHCP) Interface Configuration
DHCPv4/6 Server Configuration
RADIUS Authentication-Policy Configuration
Subscriber-Identification Policy
Sla-Profile and Sub-Profile Configuration
Python-Policy Configuration
Python Script Configuration
RADIUS Access-Accept
Results and Verification
DHCPv4 Results
DHCPv6 Results
Python Debug Output
DHCPv4
DHCPV6
Conclusion
Routed CO
In This Chapter
In This Chapter
Applicability
Summary
Overview
Subscriber Interface
Subnet/Prefix Assignment
Host IP Reachability
Group Interface
Configuration
Subscriber Interface
Group Interface
Numbered Scenario
Verification
Unnumbered Scenario
Verification
Hybrid Scenario
Host IP Reachability
Option 1 – No Export Policy
Option 2 – Export Policy (from protocol direct)
Option 3 – Export Protocol (from protocol sub-mgmt)
Conclusion
Subscriber Redundancy for Routed-CO
In This Chapter
In This Chapter
Applicability
Summary
Overview
The SRRP Protocol
Configuration
Subscriber Interface Configuration
Redundant Default Gateway
Group Interface Configuration
Static Host Configuration
SRRP Configuration
SRRP Configuration Notes
BFD (Bi-directional Forwarding Detection)
Monitoring In-Band Communications Path
Synchronizing the SRRP Peer State
Multi-Chassis Synchronization
Subscriber Management Synchronization
Redundant Interface
Show and Debug Commands
Routing Table Related Information
Subscriber Related Information
MCS Redundancy Related Information
Tool Dump Commands Related Information
The SRRP Instance Related Information
Monitoring the Traffic on Redundant Interface
BFD-Related Information
SRRP Debug Commands
SRRP Traffic Marking
Conclusion
WiFi Aggregation and Offload – Migrant User Support
In This Chapter
In This Chapter
Applicability
Overview
Migrant User Support for Open SSID Based on Portal Authentication
Sequence Of Events
Configuration
Conclusion
Glossary