Router Configuration Guide
Router Configuration Guide
© 2022 Nokia.
Use subject to Terms available at: www.nokia.com/terms/.
Nokia is committed to diversity and inclusion. We are continuously reviewing our customer
documentation and consulting with standards bodies to ensure that terminology is inclusive and
aligned with the industry. Our future customer documentation will be updated accordingly.
This document includes Nokia proprietary and confidential information, which may not be distributed
or disclosed to any third parties without the prior written consent of Nokia.
This document is intended for use by Nokia’s customers (“You”/”Your”) in connection with a product
purchased or licensed from any company within Nokia Group of Companies. Use this document
as agreed. You agree to notify Nokia of any errors you may find in this document; however, should
you elect to use this document for any purpose(s) for which it is not intended, You understand and
warrant that any determinations You may make or actions You may take will be based upon Your
independent judgment and analysis of the content of this document.
Nokia reserves the right to make changes to this document without notice. At all times, the
controlling version is the one available on Nokia’s site.
Copyright and trademark: Nokia is a registered trademark of Nokia Corporation. Other product
names mentioned in this document may be trademarks of their respective owners.
© 2022 Nokia.
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
Table of contents
1 Getting started......................................................................................................................................... 13
1.1 About this guide................................................................................................................................ 13
1.2 Router configuration process............................................................................................................14
1.3 Conventions.......................................................................................................................................15
1.3.1 Precautionary and information messages................................................................................ 15
1.3.2 Options or substeps in procedures and sequential workflows................................................. 15
2 IP router configuration........................................................................................................................... 17
2.1 Configuring IP router parameters..................................................................................................... 17
2.1.1 Interfaces.................................................................................................................................. 17
2.1.1.1 Network interface............................................................................................................. 17
2.1.1.2 Network domains..............................................................................................................17
2.1.1.3 System interface...............................................................................................................18
2.1.1.4 Unicast reverse path forwardingcheck.............................................................................18
2.1.1.5 QoS policy propagation using BGP................................................................................. 19
2.1.1.6 QPPB................................................................................................................................21
2.1.1.7 QPPB and GRT lookup....................................................................................................25
2.1.1.8 Configuring interface delay.............................................................................................. 27
2.1.2 Router ID.................................................................................................................................. 27
2.1.3 Autonomous systems............................................................................................................... 28
2.1.4 Confederations..........................................................................................................................28
2.1.5 Proxy ARP................................................................................................................................ 29
2.1.6 Exporting an inactive BGP route from a VPRN....................................................................... 30
2.1.7 DHCP relay...............................................................................................................................30
2.1.8 Internet protocol versions......................................................................................................... 30
2.1.8.1 IPv6 address format.........................................................................................................31
2.1.8.2 IPv6 applications.............................................................................................................. 32
2.1.8.3 DNS.................................................................................................................................. 34
2.1.8.4 Secure Neighbor Discovery............................................................................................. 35
2.1.8.5 SeND persistent CGAs.................................................................................................... 36
2.1.8.6 IPv6 provider edge over MPLS (6PE)............................................................................. 40
2.1.9 Static route resolution using tunnels........................................................................................ 41
2.1.9.1 Static route ECMP support.............................................................................................. 42
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
3 VRRP......................................................................................................................................................... 99
3.1 VRRP overview................................................................................................................................. 99
3.2 VRRP components............................................................................................................................99
3.2.1 Virtual router........................................................................................................................... 100
3.2.2 IP address owner................................................................................................................... 100
3.2.3 Primary and secondary IP addresses.................................................................................... 100
3.2.4 Virtual router........................................................................................................................... 100
3.2.5 Virtual router backup.............................................................................................................. 101
3.2.6 Owner and non-owner VRRP.................................................................................................101
3.2.7 Configurable parameters........................................................................................................ 101
3.2.7.1 Virtual Router ID (VRID)................................................................................................ 102
3.2.7.2 Priority.............................................................................................................................102
3.2.7.3 IP Addresses.................................................................................................................. 102
3.2.7.4 Message Interval and Master Inheritance......................................................................103
3.2.7.5 Skew Time......................................................................................................................103
3.2.7.6 Master Down Interval..................................................................................................... 103
3.2.7.7 Preempt Mode................................................................................................................104
3.2.7.8 VRRP Message Authentication......................................................................................104
3.2.7.9 Authentication Data........................................................................................................ 105
3.2.7.10 Virtual MAC Address....................................................................................................106
3.2.7.11 VRRP Advertisement Message IP Address List Verification........................................ 106
3.2.7.12 Inherit Master VRRP Router’s Advertisement Interval Timer.......................................106
3.2.7.13 IPv6 Virtual Router Instance Operationally Up............................................................ 106
3.2.7.14 Policies......................................................................................................................... 107
3.3 VRRP priority control policies......................................................................................................... 107
3.3.1 VRRP virtual router policy constraints................................................................................... 107
3.3.2 VRRP virtual router instance base priority............................................................................. 107
3.3.3 VRRP priority control policy delta in-use priority limit............................................................ 107
3.3.4 VRRP priority control policy priority events............................................................................108
3.3.4.1 Priority event hold-set timers......................................................................................... 108
3.3.4.2 Port down priority event................................................................................................. 109
3.3.4.3 LAG degrade priority event............................................................................................109
3.3.4.4 Host unreachable priority event..................................................................................... 111
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
6 Cflowd..................................................................................................................................................... 208
6.1 Cflowd overview.............................................................................................................................. 208
6.1.1 Operation................................................................................................................................ 208
6.1.1.1 Version 8........................................................................................................................ 210
6.1.1.2 Version 9........................................................................................................................ 211
6.1.1.3 Version 10...................................................................................................................... 211
6.1.2 Cflowd filter matching............................................................................................................. 211
6.2 Cflowd configuration process overview.......................................................................................... 211
6.3 Configuration notes......................................................................................................................... 212
6.4 Configuring cflowd with CLI............................................................................................................ 213
6.4.1 Cflowd configuration overview................................................................................................213
6.4.1.1 Traffic sampling.............................................................................................................. 213
6.4.1.2 Collectors........................................................................................................................214
6.4.2 Basic cflowd configuration...................................................................................................... 215
6.4.3 Common configuration tasks.................................................................................................. 215
6.4.3.1 Global cflowd components............................................................................................. 215
6.4.3.2 Enabling cflowd.............................................................................................................. 216
6.4.3.3 Configuring global cflowd parameters............................................................................217
6.4.3.4 Configuring cflowd collectors......................................................................................... 217
6.4.3.5 Specifying cflowd options on an IP interface.................................................................230
6.4.3.6 Specifying sampling options in filter entries...................................................................236
6.5 Cflowd configuration management tasks........................................................................................237
6.5.1 Modifying global cflowd components..................................................................................... 237
6.5.2 Modifying cflowd collector parameters................................................................................... 238
6.6 FP acceleration for cflowd processing............................................................................................239
6.6.1 Configuring FP acceleration for cflowd processing................................................................ 239
6.6.2 Supported forwarding status codes........................................................................................240
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Table of contents
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Getting started
22.5.R1
1 Getting started
Note: Unless otherwise indicated, this guide uses classic CLI command syntax and configuration
examples.
For a list of unsupported features by platform and chassis, see SR OS R22.x.Rx Software Release Notes,
part number 3HE 18412 000 x TQZZA.
Command outputs shown in this guide are examples only; actual displays may differ depending on
supported functionality and user configuration.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Getting started
22.5.R1
Note:
The SR OS CLI trees and command descriptions can be found in the following guides:
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI Command Reference Guide
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor, Show, and Tools Command
Reference Guide (for both MD-CLI and Classic CLI)
• 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference Guide
Note:
Content previously found in this guide related to Segment Routing and PCE has been moved to
the 7750 SR and 7950 XRS Segment Routing and PCE User Guide.
Note:
This guide generically covers Release 22.x.Rx content and may contain some content that may
be released in later maintenance loads. See SR OS R22.x.Rx Software Release Notes, part
number 3HE 18412 000 x TQZZA for information about features supported in each load of the
Release 22.x.Rx software.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Getting started
22.5.R1
1.3 Conventions
This section describes the general conventions used in this guide.
DANGER: Danger warns that the described activity or situation may result in serious personal
injury or death. An electric shock hazard could exist. Before you begin work on this equipment,
be aware of hazards involving electrical circuitry, be familiar with networking environments, and
implement accident prevention procedures.
WARNING: Warning indicates that the described activity or situation may, or will, cause
equipment damage, serious performance problems, or loss of data.
Caution: Caution indicates that the described activity or situation may reduce your component or
system performance.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Getting started
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
2 IP router configuration
2.1.1 Interfaces
Nokia routers use different types of interfaces for various functions. Interfaces must be configured with
parameters such as the interface type (network and system) and address. A port is not associated with a
system interface. An interface can be associated with the system (loopback address).
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
uRPF is supported for both IPv4 and IPv6 on network and access. It is supported on any IP interface,
including base router, IES, VPRN, and subscriber group interfaces.
In strict mode, uRPF checks whether the incoming packet has a source address that matches a prefix in
the routing table, and whether the interface expects to receive a packet with this source address prefix.
In loose mode, uRPF checks whether the incoming packet has a source address that matches a prefix
in the routing table; loose mode does not check whether the interface expects to receive a packet with a
specific source address prefix.
Loose mode uRPF check is supported for ECMP, IGP shortcuts, and VPRN MP-BGP routes. Packets
coming from a source that matches any ECMP, IGP shortcut, or VPRN MP-BGP route passes the uRPF
check even when uRPF is set to strict mode on the incoming interface.
In the case of ECMP, this allows a packet received on an IP interface configured in strict uRPF mode to
be forwarded if the source address of the packet matches an ECMP route, even if the IP interface is not a
next-hop of the ECMP route or not a member of any ECMP routes. The strict-no-ecmp uRPF mode may
be configured on any interface that is known to not be a next-hop of any ECMP route. When a packet is
received on this interface, and the source address matches an ECMP route, the packet is dropped by
uRPF.
If there is a default route, the following is included in the uRPF check:
• A loose mode uRPF check always succeeds.
• A strict mode uRPF check only succeeds if the source address matches any route (including the default
route) where the next-hop is on the incoming interface for the packet.
Otherwise, the uRPF check fails.
If the source IP address matches a discard/blackhole route, the packet is treated as if it failed the uRPF
check.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
2.1.1.6 QPPB
There are two main aspects of the QPPB feature:
• The ability to associate a forwarding-class and priority with specific routes in the routing table.
• The ability to classify an IP packet arriving on a specific IP interface to the forwarding-class and priority
associated with the route that best matches the packet.
config>router>policy-options
begin
community gold members 300:100
policy-statement qppb_policy
entry 10
from
protocol bgp
community gold
exit
action accept
fc h1 priority high
exit
exit
exit
commit
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
The fc command is supported with all existing from and to match conditions in a route policy entry, with
any action other than reject, and with next-entry, next-policy, and accept actions. If a next-entry or next-
policy action results in multiple matching entries, then the last entry with a QPPB action determines the
forwarding class and priority.
A route policy that includes the fc command in one or more entries can be used in any import or export
policy, but the fc command has no effect except in the following types of policies:
• VRF import policies
config>service>vprn>vrf-import
• BGP import policies:
– config>router>bgp>import
– config>router>bgp>group>import
– config>router>bgp>group>neighbor>import
– config>service>vprn>bgp>import
– config>service>vprn>bgp>group>import
– config>service>vprn>bgp>group>neighbor>import
• RIP import policies:
– config>router>rip>import
– config>router>rip>group>import
– config>router>rip>group>neighbor>import
– config>service>vprn>rip>import
– config>service>vprn>rip>group>import
– config>service>vprn>rip>group>neighbor>import
As shown, QPPB route policies support routes learned from RIP and BGP neighbors of a VPRN, as well as
for routes learned from RIP and BGP neighbors of the base/global routing instance.
QPPB is supported for BGP routes belonging to any of the following address families:
• IPv4 (AFI=1, SAFI=1)
• IPv6 (AFI=2, SAFI=1)
• VPN-IPv4 (AFI=1, SAFI=128)
• VPN-IPv6 (AFI=2, SAFI=128)
A VPN-IP route may match both a VRF import policy entry and a BGP import policy entry (if vpn-apply-
import is configured in the base router BGP instance). In this case, the VRF import policy is applied first,
then the BGP import policy, so the QPPB QoS is based on the BGP import policy entry.
This feature also provides the ability to associate a forwarding-class and, optionally, priority with IPv4 and
IPv6 static routes. This is achieved by specifying the forwarding-class within the static-route-entry>next-
hop or static-route-entry>indirect context.
Priority is optional when specifying the forwarding class of a static route, but when configured it can only be
deleted and returned to unspecified by deleting the entire static route.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
When the qos-route-lookup command with the destination parameter is applied to an IP interface and
the destination address of an incoming IP packet matches a route with QoS information, the packet is
classified to the fc and priority associated with that route. The command overrides the FC and priority/
profile determined from the SAP ingress or network QoS policy associated with the IP interface (see
section 5.7 for more information). If the destination address of the incoming packet matches a route with no
QoS information, the fc and priority of the packet remain as determined by the sap-ingress or network qos
policy.
Similarly, when the qos-route-lookup command with the source parameter is applied to an IP interface
and the source address of an incoming IP packet matches a route with QoS information, the packet is
classified to the FC and priority associated with that route. The command overrides the FC and priority/
profile determined from the SAP ingress or network QoS policy associated with the IP interface. If the
source address of the incoming packet matches a route with no QoS information, the FC and priority of the
packet remain as determined by the SAP ingress or network QoS policy.
Currently, QPPB is not supported for ingress MPLS traffic on network interfaces or on CsC PE’-CE’
interfaces (config>service>vprn>nw-if).
Note:
QPPB based on a source IP address is not supported for ingress subscriber management traffic
on a group interface.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
Priority mode Priority mode Ignored If DE=1 override then From new From original FC
queue queue low otherwise from base FC and sub-class
QPPB, if no DEI or
QPPB overrides then
from original dot1p/
exp/DSCP mapping or
policy default
Policer Policer From new If DE=1 override then From new From original FC
base FC low otherwise from base FC and sub-class
unless QPPB, if no DEI or
overridden by QPPB overrides then
DE=1 from original dot1p/
exp/DSCP mapping or
policy default
Priority mode Policer From new If DE=1 override then From new From original FC
queue base FC low otherwise from base FC and sub-class
unless QPPB, if no DEI or
overridden by QPPB overrides then
DE=1 from original dot1p/
exp/DSCP mapping or
policy default
Policer Priority mode Ignored If DE=1 override then From new From original FC
queue low otherwise from base FC and sub-class
QPPB, if no DEI or
QPPB overrides then
from original dot1p/
exp/DSCP mapping or
policy default
Profile mode Priority mode Ignored If DE=1 override then From new From original FC
queue queue low otherwise from base FC and sub-class
QPPB, if no DEI or
QPPB overrides then
follows original FC’s
profile mode rules
Priority mode Profile mode From new From QPPB, unless From new From original FC
queue queue base FC packet is marked in or base FC and sub-class
unless out of profile in which
overridden by case follows profile
DE=1 Default: high priority
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
Policer Profile mode From new From QPPB, unless From new From original FC
queue base FC packet is marked in or base FC and sub-class
unless out of profile in which
overridden by case follows profile
DE=1 Default: high priority
config>router
interface interface-name
if-attribute
delay
static microseconds
no static
The static delay can be configured within the range 1 to 16777214 microseconds.
2.1.2 Router ID
The router ID, a 32-bit number, uniquely identifies the router within an autonomous system (AS) (see
Autonomous systems). In protocols such as OSPF, routing information is exchanged between areas—
groups of networks that share routing information. It can be set to be the same as the loopback address.
The router ID is used by both OSPF and BGP routing protocols in the routing table manager instance.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
There are several ways to obtain the router ID. On each router, the router ID can be obtained in the
following ways.
• Define the value in the config>router router-id context. The value becomes the router ID.
• Configure the system interface with an IP address in the config>router>interface ip-int-name context.
If the router ID is not manually configured in the config>router router-id context, the system interface
acts as the router ID.
• If neither the system interface or router ID are implicitly specified, the router ID is inherited from the last
four bytes of the MAC address.
• The router can be obtained from the protocol level; for example, BGP.
2.1.4 Confederations
Configuring confederations is optional and should only be implemented to reduce the interior border
gateway protocol (IBGP) mesh inside an AS. An AS can be logically divided into smaller groupings called
sub-confederations and then assigned a confederation ID (similar to an autonomous system number).
Each sub-confederation has fully meshed IBGP and connections to other ASs outside of the confederation.
The sub-confederations have EBGP-type peers to other sub-confederations within the confederation. They
exchange routing information as if they were using IBGP. Parameter values such as next hop, metric, and
local preference settings are preserved. The confederation appears and behaves like a single AS.
Confederations have the following characteristics:
• A large AS can be sub-divided into sub-confederations.
• Routing within each sub-confederation is accomplished via IBGP.
• EBGP is used to communicate between sub-confederations.
• BGP speakers within a sub-confederation must be fully meshed.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
• Each sub-confederation (member) of the confederation has a different AS number. The AS numbers
used are typically in the private AS range of 64512 to 65535.
To migrate from a non-confederation configuration to a confederation configuration requires a major
topology change and configuration modifications on each participating router. Setting BGP policies to
select an optimal path through a confederation requires other BGP modifications.
There are no default confederations. Router confederations must be explicitly created. Figure 2:
Confederation configuration shows an example of a confederation configuration.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
Static ARP is used when a Nokia router needs to know about a device on an interface that cannot or does
not respond to ARP requests. The configuration can state that, if it has a packet with a specific IP address,
to send it to the corresponding ARP address. Use proxy ARP so the router responds to ARP requests on
behalf of another device.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
Field Description
Version 4-bit Internet Protocol version number = 6
Payload Length 16-bit unsigned integer; the length of payload, for example, the rest of the packet
following the IPv6 header, in octets; if the value is zero, the payload length is carried
in a jumbo payload hop-by-hop option
Next Header 8-bit selector; identifies the type of header immediately following the IPv6 header;
this field uses the same values as the IPv4 protocol field
Hop Limit 8-bit unsigned integer; decremented by 1 by each node that forwards the packet; the
packet is discarded if the hop limit is decremented to zero
Destination Address 128-bit address of the intended recipient of the packet (possibly not the ultimate
recipient if a routing header is present)
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
2001:0db8:0000:0000:0000:0000:0000:0000
Leading zeros must be omitted from each block in the address. A series of zeros can be replaced with a
double colon. For example:
2001:db8::
The double colon can only be used one time in an address.
The IPv6 prefix is the part of the IPv6 address that represents the network identifier, which appears at the
beginning of the address. The IPv6 prefix length, which begins with a forward slash (/), shows how many
bits of the address make up the network identifier. For example, the address 2001:db8:8086:6502::1/64
means that the first 64 bits of the address represent the network identifier; the remaining 64 bits represent
the node identifier.
Note:
IPv6 addresses and prefixes are displayed according to RFC 5952, A Recommendation for IPv6
Address Text Representation.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
2.1.8.3 DNS
The DNS client is extended to use IPv6 as transport and to handle the IPv6 address in the DNS AAA
resource record from an IPv4 or IPv6 DNS server. An assigned name can be used instead of an IPv6
address because IPv6 addresses are more difficult to remember than IPv4 addresses.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
For information about management VPRNs, see Node Management Using VPRN in the 7450 ESS,
7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN.
When SeND is enabled on a node, basic neighbor discovery messaging is changed as shown in Figure 8:
Neighbor discovery with and without SeND. In the example, PE-A needs to find the MAC address of PE-B.
1. PE-A sends an NS message to the solicited node multicast address for PE-B's address with the CGA
option, RSA signature option, timestamp option, and nonce option.
2. PE-B processes the NS message and, because it is configured for SeND operation, processes the
NS. PE-B validates the source address of the packet to ensure it is a valid CGA, then validate the
cryptographic signature embedded in the NS message.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
3. PE-B generates an NA message, which is sent back to PE-A with the solicited bit, router bit set. The
source address is that of PE-B, while the destination address is that of PE-A from the NS message. The
timestamp is generated from PE-B, while the nonce is copied from PE-A's NS message.
4. PE-A receives the NA and completes similar checks as PE-B did.
If all steps process correctly, both nodes install each other’s addresses into their neighbor cache database.
• Because SeND only uses RSA key pairs, the command is refused if the imported key type is not RSA.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
• Because SeND only supports key size 1024, the command is refused if the imported key size is not
1024.
• The password has to be specified when an offline generated file in pkcs12 format has to be imported.
• key-rollover keyword: see the RSA key pair rollover mechanism section that follows.
• This command creates the file cfx:\system-pki\secureNdKey (fixed directory and filename) and saves
the imported key in that file in encrypted per format (same as the admin certificate import command).
• The RSA key pair is uploaded in the memory of SeND.
RSA key pair rollover mechanism
To trigger a key rollover, use the admin certificate secure-nd-import command described in Import an
online/offline generated RSA key pair section.
For example:
• If CGAs exist that are generated based on an auto-generated or previously imported RSA key pair and
the key-rollover keyword is not specified, the secure-nd-import command is refused.
• If a secure-nd-import with key-rollover is requested while a previous key rollover is still being
handled, the new command is refused.
• If the secure-nd-import command is accepted, the imported RSA key pair is written to the file cfx:
\system-pki\secureNdKey and loaded to SeND. Existing CGAs, if any, are regenerated.
• While handling a key rollover, SeND keeps track of which interface uses which RSA key pair.
Temporarily, SeND can have two RSA key pairs in use. At all times, only the latest RSA key pair is
stored in the file cfx:\system-pki\secureNdKey. When the rollover is finished, the RSA key pair that is no
longer referred to, is deleted from SeND’s memory.
Auto-generation of RSA key pair
The first time an interface becomes SeND enabled, SeND needs an RSA key pair to generate or check a
modifier and to generate a CGA.
If the operator did not import an RSA key pair for SeND, an auto-generated RSA key pair are used as a
fallback.
The auto-generated RSA key pair is synchronized to the standby CPM, but is not written to the CF.
Therefore, all CGAs generated via an auto-generated RSA key pair are not persistent. A warning is raised
whenever a non-persistent CGA is generated.
The admin certificate secure-nd-import command without the key-rollover keyword is refused if CGAs
exist that made use of the auto-generated RSA key pair. Specifying the key-rollover keyword results in
regeneration of the CGAs.
See the section Making non-persistent CGAs persistent for more information about the procedure to make
non-persistent CGAs persistent.
HA
For the synchronization of the RSA key pair file in cfx:\system-pki\ used by SeND, the following commands
for manual and automatic certificate synchronization are used:
• manual: admin redundancy synchronize cert
• automatic: configure redundancy cert-sync
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SeND also synchronizes the RSA key pair to the standby CPM.
=> A modifier is generated based on the actual RSA key pair (that is, imported or auto-generated). The
modifier is used to generate a link-local CGA.
=> The modifier is saved in the interface configuration file:
exit
address 2000:1::/64
=> A modifier is generated based on the actual RSA key pair. The modifier is used to generate the global
CGA.
=> The modifier is stored in the interface configuration file.
Example 2: Configure a SeND interface with modifiers:
=> The offline generated modifier is used to generate the link-local CGA:
no shutdown
exit
address 3000:1::/64
=> A modifier is generated based on the actual RSA key pair. The modifier is used to generate the global
CGA.
=> The modifier is stored in the interface configuration file:
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
=> The same offline generated modifier as the preceding link-local address is used for the generation of a
global address:
=> Another offline generated modifier (*) is used for the generation of a global address.
=> For an offline generated modifier, a check is performed to see if it is generated with the actual RSA key
pair and the security parameter applicable for the interface. If this check fails, the command is refused,
unless the command is triggered in the context of an exec of a config file. In that case, the modifier is
replaced by a new one that is generated based on the actual RSA key pair.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
New CGAs have to be generated (from the CLI context). Follow one of the procedures described in section
Making non-persistent CGAs persistent to make the non-persistent CGA's persistent.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
The egress 6PE router pops the top transport labels. When the IPv6 explicit null label is exposed, the
egress 6PE router knows that an IPv6 packet is encapsulated. It pops the IPv6 explicit null label and
performs an IPv6 route lookup to find the next hop for the IPv6 packet.
If the tunnel-next-hop context is configured and resolution is set to disabled, the binding to the tunnel is
removed and resolution resumes in RTM to IP next-hops.
If the resolution is set to any, any supported tunnel type in the static route context is selected following
TTM preference.
The following tunnel types are supported in a static route context: LDP, RSVP-TE, Segment Routing (SR)
Shortest Path, and Segment Routing Traffic Engineering (SR-TE):
• LDP
The ldp value instructs the code to search for an LDP LSP with a FEC prefix corresponding to the
address of the indirect next-hop. Both LDP IPv4 FEC and LDP IPv6 FEC can be used as the tunnel
next-hop. However, only an indirect next-hop of the same family (IPv4 or IPv6) as the prefix of the route
can use an LDP FEC as the tunnel next-hop. In other words, an IPv4 (IPv6) prefix can only be resolved
to an LDP IPv4 (IPv6) FEC.
• RSVP-TE
The rsvp-te value instructs the code to search for the set of lowest metric RSVP-TE LSPs to the
address of the indirect next-hop. The LSP metric is provided by MPLS in the tunnel table. The static
route treats a set of RSVP-TE LSPs with the same lowest metric as an ECMP set.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
The user has the option of configuring a list of RSVP-TE LSP names to be used exclusively instead
of searching in the tunnel table. In that case, all LSPs must have the same LSP metric in order for the
static route to use them as an ECMP set. Otherwise, only the LSPs with the lowest common metric
value are selected.
A P2P auto-lsp that is instantiated via an LSP template can be selected in TTM when resolution is
set to any. However, it is not recommended to configure an auto-lsp name explicitly under the rsvp-
te node as the auto-generated name can change if the node reboots, which blackholes the traffic of the
static route.
• SR shortest path
When the sr-isis or sr-ospf value is enabled, an SR tunnel to the indirect next-hop is selected in the
TTM from the lowest preference ISIS or OSPF instance, and if many instances have the same lowest
preference, it is selected from the lowest numbered IS-IS or OSPF instance. Both SR-ISIS IPv4 and
SR-ISIS IPv6 tunnels can be used as tunnel next-hops. However, only an indirect next-hop of the same
family (IPv4 or IPv6) as the prefix of the route can use an SR-ISIS tunnel as a tunnel next-hop. In other
words, an IPv4 (IPv6) prefix can only be resolved to a SR-ISIS IPv4 (IPv6).
• SR-TE
The sr-te value instructs the code to search for the set of lowest metric SR-TE LSPs to the address of
the indirect next-hop. The LSP metric is provided by MPLS in the tunnel table. The static route treats a
set of SR-TE LSPs with the same lowest metric as an ECMP set.
The user has the option of configuring a list of SR-TE LSP names to be used exclusively instead of
searching in the tunnel table. In that case, all LSPs must have the same LSP metric in order for the
static route to use them as an ECMP set. Otherwise, only the LSPs with the lowest common metric
value are selected.
Realize that the resolution filter, under static-route-entry, does not validate the provided lsp-name type of
the LSP against the requested filter context protocol type.
If one or more explicit tunnel types are specified using the resolution-filter option, only these tunnel types
are selected again following the TTM preference.
The user must set resolution to filter to activate the list of tunnel-types configured under resolution-filter.
If disallow-igp is enabled, the static route is not activated using IP next-hops in RTM if no tunnel next-hops
are found in TTM.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
• ECMP is supported when resolving in TTM multiple static routes of the same prefix with multiple user-
entered indirect next-hops, each binding to a tunnel type. The system picks as many tunnel next-hops
as available in TTM beginning from the first indirect next-hop and up to the value of the ecmp option
in the system. The spraying of flow packets is performed over the entire set of resolved next-hops that
correspond to the selected indirect next-hops.
• ECMP is supported when resolving concurrently in RTM and TTM multiple static routes of the same
prefix with multiple user-entered indirect tunnel next-hops. There is no support for mixing IP and tunnel
next-hops for the same prefix using different indirect next-hops. Tunnel next-hops are preferred over IP
next-hops.
- config>router
- [no] static-route-entry ip-prefix/prefix-length [mcast]
- [no] indirect ip-address
- tunnel-next-hop
- [no] disallow-igp
- no flex-algo
- flex-algo flex-algo
- resolution {any|disabled|filter}
- resolution-filter
- [no] sr-isis
- [no] sr-ospf
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
• IGP prefix resolved to IGP shortcuts in RTM (igp-shortcut or advertise-tunnel-link enabled in the IGP
instance)
• BGP prefix with the BGP next hop resolved to IGP shortcuts in RTM
• Static route prefix resolved to an indirect next hop, which is resolved to a set of equal-metric MPLS
LSPs in TTM. The user can allow automatic selection or specify the names of the equal-metric MPLS
LSPs in TTM to be used in the ECMP set.
• Static route prefix resolved to an indirect next hop, which is resolved to IGP shortcuts in RTM
• BGP prefix with a BGP next hop resolved to a static route, which resolves to a set of tunnel next hops
toward an indirect next hop in RTM or TTM
• BGP prefix resolving to another BGP prefix, whose next hop is resolved to a set of ECMP tunnel next
hops with a static route in RTM or TTM or to IGP shortcuts in RTM
• IPv4 BGP-labeled unicast routes whose next hop resolves to a set of tunnels in TTM
• BGP-labeled IPv6 packets (6PE) resolving in TTM
This feature does not modify the route calculation: the same set of ECMP next hops is computed for a
prefix. The feature also does not change the hash routine; only the spraying of the flows over the tunnel
next hops is modified to reflect the normalized weight of each tunnel next hop.
Static route implementation supports ECMP over a set of equal-cost MPLS LSPs. The user can allow
automatic selection or specify the names of the equal-metric MPLS LSPs in TTM to be used in the ECMP
set. For more information, see Static route resolution using tunnels.
2.2.1 Weighted load balancing IGP, BGP, and static route prefix packets over IGP
shortcut
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
config>router>mpls>lsp-template>load-balancing-weight <32-bit-integer>
There is no default weight value for an LSP. If any LSP in the ECMP set of a prefix does not have a
weight configured, the regular ECMP spraying for the prefix is performed. The user-entered weight is
normalized to the closest integer value that represents the number of entries in the ingress prefix hash
table assigned to the LSP for the purpose of spraying packets of all prefixes resolved to this LSP. The
higher the normalized weight, the more entries are assigned to the LSP, and the more packets are sent to
this LSP.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
2.2.1.4 Weighted load balancing static route packets over MPLS LSP
- config>router>mpls>lsp>metric
If the user enters, for the same static route, more LSP names with the same LSP metric than the value
of the router level ecmp option, only the first configured LSPs equal to the ecmp value are selected.
The remaining tunnel next-hops for the route are not activated. When automatic MPLS LSP selection is
performed in TTM, the lowest tunnel ID is used as a tie-breaker among the same lowest metric LSPs.
To perform weighted load-balancing over the set of MPLS LSPs, either when the LSP names are provided
or when auto-selection in TTM is performed, the user must also enable the weighted ECMP globally like for
static, IGP, and BGP prefixes resolving to IGP shortcuts:
- config>router>weighted-ecmp
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
ECMP is also supported when resolving in TTM the same static route with multiple user-entered indirect
next-hops, each binding to the same or different tunnel types. The system picks as many tunnel next-hops
as available in RTM, beginning from the first indirect next-hop and up to the value of the ecmp option in the
system. In this case, the weighted load-balancing is applied directly using the weights of the selected set of
tunnel next-hops. If any LSP in the ECMP set of a prefix static route does not have a weight configured, or
if any of the indirect next-hops binds to an LDP LSP, the regular ECMP spraying for the prefix is performed.
If the same prefix is resolved via both a static route and an IGP shortcut route, the RTM default protocol
preference installs the static route only. Therefore, the set of ECMP tunnel next-hops and the weighted
load balancing behavior are determined by the static route configuration and not by the IGP shortcut
configuration.
2.2.2 Weighted load balancing for 6PE and BGP IPv4-Labeled unicast routes
ECMP-like spraying for BGP-labeled IPv6 packets (6PE) and BGP-labeled IPv4 unicast routes resolving
to tunnels in TTM is controlled using the config>router>ecmp max-ecmp-routes command, where max-
ecmp-routes represents the maximum number of RSVP and SR-TE tunnels in the set representing equal-
cost paths to the BGP next hop.
Weighted ECMP behavior, where the load-balancing weight of the tunnel is considered in the packet
spraying behavior, is configured using the config>router>bgp> next-hop-resolution>weighted-ecmp
command. Weighted ECMP is disabled by default.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
The SR OS CBF implementation supports spraying of packets over a maximum of six forwarding sets of
ECMP LSPs. The user must define a class-forwarding policy object in MPLS to configure the mapping of
FCs to the forwarding sets. Then, the user assigns the CBF policy name and set ID to each MPLS LSP
that is used in IGP shortcuts.
When a BGP IPv4 or IPv6 prefix is resolved, the FC of the packet, is used to look up the forwarding set ID.
Then, a modulo operation is performed on the tunnel next-hops of this set ID only, to spray packets of this
FC. The data path concurrently implements, CBF and ECMP within the tunnels of each set ID.
CPM-originated packets on the router, including control plane and OAM packets, are forwarded over a
single LSP from the set of LSPs that the packet's FC is mapped to, as per the CBF configuration.
config
router
[no] mpls
class-forwarding-policy policy-name create
fc be forwarding-set set-id <1..4>
fc l2 forwarding-set set-id <1..4>
fc af forwarding-set set-id <1..4>
fc l1 forwarding-set set-id <1..4>
fc h2 forwarding-set set-id <1..4>
fc ef forwarding-set set-id <1..4>
fc h1 forwarding-set set-id <1..4>
fc nc forwarding-set set-id <1..4>
[no] default-set set-id <1..4>
All FCs are mapped to set 1 as soon as the policy is created. The user can make changes to the mapping
of FCs as required. An FC, which is not added to the class-forwarding policy, is therefore always mapped
to set 1. At most, an FC can be mapped to a single forwarding set. One or more FCs can map to the same
set. The user can indicate the initial default set by including the default-set option.
The default forwarding set is used to forward packets of any FC in cases where all LSPs of the forwarding
set the FC maps to become operationally down. The router uses the user-configured default set as the
initial default set. Otherwise, the router elects the lowest numbered set as the default forwarding set in
a class-forwarding policy. When the last LSP in a default forwarding set goes into an operationally down
state, the router designates the next lowest-numbered set as the new default forwarding set.
A mapping to a class-forwarding policy and set is added to the existing CBF configuration of an RSVP-TE
or SR-TE LSP or to an LSP template. The following commands perform this function.
config>router>mpls>lsp>class-forwarding forwarding-set policy policy-name set set-id
config>router>mpls>lsp-template>class-forwarding forwarding-set policy policy-name set set-id
An MPLS LSP can map only to a single class-forwarding policy and forwarding set. Multiple LSPs can map
to the same policy and set. If they form an ECMP set, from the IGP shortcut perspective, packets of the
FCs mapped to this set are sprayed over these LSPs based on a modulo operation of the output of the
hash routine on the packet's headers and the number of LSPs in the set.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
• An FC, for which all LSPs in the forwarding set are operationally down, has its packets forwarded
over the default forwarding set. The default forwarding set is either the initial default forwarding set
configured by the user or the lowest numbered set in the class-forwarding policy that has one or more
LSPs in the operationally UP state. If the initial or subsequently elected default forwarding set has all its
LSPs operationally down, the next lower numbered forwarding set, which has at least one LSP in the
operationally up state, is elected as the default forwarding set.
• If all LSPs of all forwarding sets become operationally down, the router resumes regular ECMP spraying
on the remaining LSPs and IP next-hops in the full ECMP set.
• Whenever the first LSP in a forwarding set becomes operationally UP, the router triggers the re-election
of the default set and selects this set as the new default set, if it is the initial default set, otherwise, it
selects lowest numbered set.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
If MPLS deletes an LSP from a specified set ID, the IOM handles failover within the same set ID. The IOM
reprograms the data path to spray packets of the impacted FCs over the remaining tunnel next-hops of the
set ID.
Similarly, the IOM handles failover between class-forwarding sets when MPLS deletes the last LSP in a
set ID. The IOM reprograms the data path to spray packets of the impacted FCs over the tunnel next-
hops of the failover set ID. In both cases, the failover does not make use of the uniform failover procedure;
however, if an LSP activated its FRR backup path, it remains in the set ID and continues to forward traffic
of the mapped FCs.
Finally, BGP updates the set IDs, used to reach a BGP next-hop, any time IGP updates the information in
the RTM.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
class-forwarding
// Enables CBF feature for BGP and CPM traffic
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
exit
no shutdown
lsp "RSVP-TE_LSP-BB1-SET2[1..4]" // Four LSPs in Set2
shutdown
to 192.0.2.194/32
cspf
class-forwarding
forwarding-set policy ‟cbf1” set 2
exit
primary "empty"
exit
exit
lsp "RSVP-TE_LSP-BB1-SET3[1..4]" // Four LSPs in Set3
shutdown
to 192.0.2.194/32
cspf
class-forwarding
forwarding-set policy ‟cbf1” set 3
exit
primary "empty"
exit
exit
lsp "RSVP-TE_LSP-BB1[1..52]" //
Other LSP configuration with no CBF options for a total of 64 LSPs to BB1
shutdown
to 192.0.2.194/32
cspf
primary "empty"
exit
exit
no shutdown
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
Assume that the egress LER advertised a FEC for some /24 prefix using the fec-originate command. At the
ingress LER, LDP resolves the FEC by checking in RTM that an exact match exists for this prefix. After the
LDP activates the FEC, it programs the NHLFE in the egress data path and the LDP tunnel information in
the ingress data path tunnel table.
Next, LDP provides the shortcut route to RTM, which associates it with the same /24 prefix. There are two
entries for this /24 prefix: the LDP shortcut next-hop and the regular IP next-hop. The latter was used by
LDP to validate and activate the FEC. RTM then resolves all user prefixes that succeed a longest prefix
match against the /24 route entry to use the LDP LSP.
Now assume that the aggregate-prefix-match was enabled and that LDP found a /16 prefix in RTM to
activate the FEC for the /24 FEC prefix. In this case, RTM adds a new, more-specific route entry of /24 and
has the next-hop as the LDP LSP. However, RTM does not have a specific /24 IP route entry. RTM then
resolves all user prefixes that succeed a longest prefix match against the /24 route entry to use the LDP
LSP. All other prefixes that succeed a longest prefix match against the /16 route entry uses the IP next-hop.
LDP shortcut also works when using RIP for routing.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
neighbors reachable over RSVP LSPs, in the case of LDP-over-RSVP, but not both. This is as per ECMP
for LDP.
When the preferred RTM entry corresponds to a regular IP route, spraying is performed across regular IP
next-hops for the prefix.
Spraying across regular IP next-hops and LDP-shortcut next-hops concurrently is not supported.
config>router>bgp>next-hop-res>shortcut-tunnel
family ipv4
resolution-filter ldp
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
Note:
FRR for static route entries is only supported for IP traffic on FP-based platforms.
IP FRR for static route is supported in the base router and service VPRN contexts.
If the primary next-hop of the static route entry fails and the IP FRR backup next-hop is activated, then the
backup tag is applied to the static route and the configured preference and metric for the primary hop is
inherited. If the primary next-hop is activated again, then make-before-break functionality is used to avoid
any packet loss.
The following is a example configuration for IP FRR:
static-route-entry 10.10.0.0/16
tag 20
backup-tag 100
next-hop 101.1.1.1
preference 100
backup-next-hop
address 50.1.1.2
exit
exit
exit
exit
The logic behavior applied to the associated tag of the static route entry is summarized in Table 5: Static
route tag for IP FRR configuration .
UP UP UP 20
1
UP DOWN UP 20
1
DOWN UP UP 100
1
Note:
1. The tag value is based on the IP FRR example configuration provided above.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
IGP export policies can use the tag and the backup-tag as match criteria when exporting a static route
entry using route policies. The export policies may introduce unique export properties for each tag (for
example, resulting in different IGP metrics) and may make an exported route more or less desirable when
the primary next-hop fails and the backup next-hop is activated.
The following limitations apply in the IP FRR for static route entries.
• Only the primary next-hop has IP FRR support. The backup next-hop has no IP FRR support if it
suddenly becomes unreachable.
• If multiple next-hops are configured with a backup for a static route entry, then IP FRR is activated if
there is only one remaining primary next-hop active. If multiple primary next-hops can be activated, then
the static route entry uses ECMP and the backup next-hop IP FRR functionality is not used.
• If the primary next-hop fails and the backup next-hop is used as the primary hop, then the backup next-
hop uses the configured backup tag (or 0, if not configured) and inherits the configured preference and
metric of the primary next-hop (or the default values, if not configured).
• The backup inherits the preference and the metric of the primary next-hop, however, it does not support
any of the features configured on the primary next-hop (for example, BFD, CPE check, LDP sync, and
so on) even when the backup becomes the active next-hop.
• If the primary next-hop of a static route entry, configured with a backup next-hop, is held down because
the static-route-hold-down command is configured, the backup next-hop is also held down and is not
used for traffic, even in cases where the backup-next-hop can be activated.
• The following tunnel types are supported:
– OSPF or ISIS shortcuts using RSVP-TE and SR-TE
– BGP VPN-v4/v6 or BGP shortcut routes over LDP, RSVP, SR-ISIS, SR-OSPF, LDPoRSVP, SR-TE,
GREv4, SR policy, MPLS forward policy, and RIB API
– backup-next-hop recursion through indirect next-hop static-route-entry with resolution filter for LDP,
RSVP, LDPoRSVP, SR-TE, SR-ISIS, SR-OSPF, SR policy, MPLS forward policy, or RIB API
• LDP-FRR using a static-route is not mutually supported in combination with static-route backup-next-
hop for the same static route.
• Any other backup-next-hop types are considered as non-supported. For example:
– Locally aggregated BGP routes
– BGP routes when the BGP next-hop is recursively resolved through another BGP route
– 6over4 tunnel
– GREv6 tunnel
– OSPF or IS-IS shortcuts using LDP, SR-ISIS, SR-OSPF, and LDPoRSVP (generic IGP shortcut
limitation not only for backup-next-hop)
– OSPF or IS-IS shortcuts over SR policy, MPLS forward policy, and RIB API (generic IGP shortcut
limitation not only for backup-next-hop)
– BGP-LU over LDP, RSVP, LDPoRSVP, SR-TE, SR-OSPF, SR-ISIS, SR policy, MPLS forward policy
and RIB API
– 4PE
– 6PE
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|C| |K|S| Reserved0 | Ver | Protocol Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Checksum (optional) | Reserved1 (Optional) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Key (optional) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number (Optional) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
All the fields of the GRE encapsulation in RFC 2890 are optional except for the base header (first 4 bytes).
The C, K, and S flags are used to indicate if the header includes the optional fields of Checksum (plus
Reserved field), Key, and Sequence Number. SR OS can process packets received with the base 4-byte
header or with the 8-byte header which includes the Key field. In other words, packets with the flags set to
{C=0, K=0/1, S=0}. Any other GRE header setting results in the packet being dropped.
When originating a GRE encapsulated packet, SR OS supports the following header formats:
1. The 4-byte base header {C=0, K=0, S=0} in the IP-over-GRE feature using a Port Cross Connect (PXC)
port (see GRE tunnel overview).
2. The 4-byte base header {C=0, K=0, S=0} in the IP-over-GRE feature using the Multiservice Integrated
Service Adapter.
See Section 4.1, IP Tunnel Overview, of the 7450 ESS, 7750 SR, and VSR Multiservice Integrated
Service Adapter and Extended Services Appliance Guide.
3. The 4-byte base header {C=0, K=0, S=0} in the MPLS-over-GRE tunnel and SDP.
See 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN Guide: VLL, VPLS, PBB,
and EVPN, the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN, and
the 7450 ESS, 7750 SR, 7950 XRS, and VSR Services Overview Guide.
4. The 8-byte header which includes the Key field {C=0, K=1, S=0} in the filter-based GRE tunneling
feature (see Configuring filter-based GRE tunneling ).
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
• The termination of MPLS-over-GRE on the system interface address can be performed concurrently
and extends to terminating IP-over-GRE packets as well.
• A single GRE termination subnet is permitted per router. If the user attempts to configure another
subnet on another interface, the command is rejected.
• The GRE termination subnet length can be of maximum size of /16.
• The subnet of the primary IPv4 address of the numbered loopback interface or the numbered network
IP interface is used as the GRE termination subnet.
• When the GRE termination subnet is enabled on a numbered network IP interface, the packet can
be received from the interface itself and any other network IP interface as long as the target IPv4
termination subnet is reachable.
• The feature can terminate packets with the base 4-byte header {C=0, K=0, S=0} or with the 8-byte
header which includes the Key field {C=0, K=1, S=0}. Any other GRE header setting results in the
packet being dropped.
• For routers in the network to forward MPLS-over-GRE or IP-over-GRE packets to this router, the prefix
of the GRE subnet must be advertised in IGP or BGP. This is performed by adding the interface to IGP
or BGP. Alternatively, a static route is added to the other routers.
• The GRE termination subnet is not supported with the following interface types. If these interface types
are configured, the configuration of the gre-termination option is rejected:
– unnumbered network IP interface
– IES interface
– VPRN interface
– CSC VPRN interface
• The configuration of the gre-termination option is also rejected when applied to the system interface,
as the system interface supports the termination of MPLS-over-GRE packet on its /32 subnet with no
explicit configuration.
• This feature introduces full support of LER and LSR roles for the packet after the GRE encapsulation
is removed, regardless if the GRE termination was on the system interface address or the GRE
termination subnet.
• In an LSR role, this feature sprays the decapsulated packets over LAG and ECMP links by attempting
a hash on the SA/DA and Layer 4 ports of the inner IP header if the payload below the label stack
is IPv4 or IPv6. Otherwise, a hash is performed on the SA/DA of the outer IPv4 header of the GRE
encapsulation.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
– Pop one or more labels and look up the packet in the FIB or in a local service context. The router
operates as an egress LER.
– Pop one or more labels and swap a label out to the outgoing interface with NHLFE encapsulation
pushed on the packet. The router operates as an LSR.
– When the incoming label is swapped to an implicit-null label, the user is able to remark the DSCP
field of the exposed IPv4 or IPv6 packet on egress of the data path.
• If a match exists and the GRE Protocol Type field indicates an IPv4 or an IPv6 payload, continue
processing in the pipeline as an IP packet and forward out based on FIB lookup.
• If a match exists and the GRE Protocol Type field indicates a Bridged Ethernet payload, drop the
packet. To enable the feature to terminate the Bridged Ethernet payload, ensure that the termination
subnet for that feature does not overlap with the GRE termination subnet of MPLS-over-GRE and IP-
over-GRE termination.
• If a match exists and the GRE protocol Type field is set to any other payload value, drop the packet.
• If a match exists and the packet is not dropped, the application of ACL filter on the incoming interface
matches against the inner (payload) header of the received GRE-encapsulated packet.
• If a match does not exist, continue processing in the pipeline as an IPv4 packet. In this case, the
application of ACL filter on the incoming interface matches against the outer IPv4 header of the
received GRE-encapsulated packet.
This feature supports GRE/IPv4 encapsulation when the payload is MPLS, IPv4, or IPv6.
All MPLS egress LER and LSR features associated with the processed label are supported.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
The router checks and decrements the TTL field of the inner IPv4 or IPv6 header and ignores the TTL of
the outer IPv4 header.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
In Figure 11: GRE deployment using a PXC port example, the public network is typically an unsecured
network, such as public Internet, over which packets belonging to the private network in the diagram
cannot be transmitted natively. Inside the 7750 SR, a public service instance (IES or VPRN) connects to
the public network, and a private service instance (typically a VPRN) connects to the private network.
For GRE tunnels using PXC ports, the public and private services must be two different services,
and the PXC is the connection between the two services. Traffic from the public network may require
authentication and encryption inside an IPsec tunnel to reach the private network. In this way, the
authenticity, confidentiality, and integrity of private network access can be enforced. If authentication and
confidentiality are not required, then access to the private network may be provided through GRE or IP-IP
tunnels.
Traffic flows through PXC-based tunnels in the following ways:
• In the upstream direction (public to private), the encapsulated traffic is forwarded to a public tunnel
interface if the destination address matches the local or gateway address of a GRE tunnel. As the traffic
passes through the PXC port, the tunnel header is removed, the payload IP packet is delivered to the
private service, and from there, the traffic is forwarded again based on the destination address of the
payload IP packet.
• In the downstream direction (private to public), unencapsulated traffic belonging to the private service
is forwarded into the tunnel by matching a route with the GRE tunnel as next-hop. The route can be
configured statically, learned by running OSPF on the private tunnel interface or by running BGP over
the tunnel. After clear traffic is forwarded to the PXC port, it is encapsulated in the GRE header and
passed to the public service, and from there, the traffic is forwarded again based on the destination
address of the GRE header.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
exit
exit
static-route 172.16.1.1/24 next-hop 10.1.1.2
... [additional SAPs and or SDP configuration]
Figure 12: Router Interface Encryption Packet Format (IPsec Transport Mode)
The protocol field in the IP header of an NGE packet is always set to ‟ESP”. Within an NGE domain,
the SPI that is included in the ESP header is always an SPI for the key group configured on the router
interface. Other fields in the IP header, such as the source and destination addresses, are not altered by
NGE router interface encryption. Packets are routed through the NGE domain and decrypted when the
packet leaves the NGE domain.
The group keys used on an NGE-enabled router interface provide encryption of broadcast and multicast
packets within the GRT. For example, OSPF uses a broadcast address to establish adjacencies, which can
be encrypted by NGE without the need to establish point-to-point encryption tunnels. Similarly, multicast
packets are also encrypted without point-to-point encryption tunnels.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
In Figure 13: NGE Domain Transit, nodes A, B, C, and D have router interfaces configured with router
interface encryption enabled. Traffic is encrypted when entering the NGE domain using the key group
configured on the router interface and is decrypted when exiting the NGE domain. Traffic may traverse
multiple hops before exiting the NGE domain, yet decryption only occurs on the final node when the traffic
exits the NGE domain.
Various traffic types are supported and encrypted when entering the NGE domain, as illustrated by the
following items on node A in Figure 13: NGE Domain Transit:
• Item 1: Self-generated packets
These packets, which include all types of control plane and management packets such as OSPF, BGP,
LDP, SNMPv3, SSH, ICMP, RSVP-TE, and 1588, are encrypted.
• Item 2: User Layer 3 and VXLAN packets
Any Layer 3 user packets that are routed into the NGE domain from an interface outside the NGE
domain are encrypted. Any VXLAN packets that are routed into the NGE domain from this NGE node
are encrypted.
• Item 3: IPsec packets
IPsec packets are NGE-encrypted when entering the NGE domain to ensure that the IPsec packets’
security association information does not conflict with the NGE domain.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
GRE-MPLS- or MPLSoUDP-based service traffic consists of Layer 3 packets, and router interface NGE is
not applied to these types of packets. Instead, service-level NGE is used for encryption to avoid double-
encrypting these packets and impacting throughput and latencies. The two types of GRE-MPLS or
MPLSoUDP packets that can enter the NGE domain are illustrated by items 4 and 5 in Figure 13: NGE
Domain Transit.
• Item 4: GRE-MPLS and MPLSoUDP packets (SDP or VPRN) with service-level NGE enabled
These encrypted packets use the key group that is configured on the service. The services key group
may be different from the key group configured on the router interface where the GRE-MPLS or
MPLSoUDP packet enters the NGE domain.
• Item 5: GRE-MPLS and MPLSoUDP packets (SDP or VPRN) with NGE disabled
These packets are not encrypted and can traverse the NGE domain in clear text. If these packets
require encryption, SDP or VPRN encryption must be enabled.
Creating an NGE domain from the NSP NFM-P requires the operator to determine the type of NGE domain
being managed. This indicates whether NGE gateway nodes are required to manage the NGE domain,
and other operational considerations. The two types of NGE domains are:
• Private IP/MPLS network NGE domain
• Private over intermediary network NGE domain
In a private IP/MPLS network NGE domain, all interfaces are owned by the operator and there is no
intermediary service provider needed to interconnect nodes. Each interface is a point-to-point private link
between private nodes. When a new node is added to this type of NGE domain (node D in Figure 14:
Private IP/MPLS network NGE domain), the links that connect node D to the existing nodes in the NGE
domain (nodes A, B, and C) must be enabled with NGE router interface encryption. Links from the new
node to the existing nodes are enabled one at a time. The NSP NFM-P provides tools that simplify adding
nodes to the NGE domain and enabling NGE on their associated interfaces. In this type of NGE domain,
each interface is a direct link between two nodes and is not used to communicate with multiple nodes over
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
a broadcast medium offered by an intermediary network. Also, there are no NGE gateway nodes required
between the NSP NFM-P and new nodes entering the NGE domain.
Private over intermediary network NGE domains have nodes with links that connect to a service provider
network where a single link can communicate with multiple nodes over a Layer 3 service such as a VPRN.
In Figure 15: Private over intermediary network NGE domain, node A has NGE enabled on its interface
with the service provider and uses that single interface to communicate with nodes B and C, and eventually
with node D when node D has been added to the NGE domain. This type of NGE domain requires the
recognition of NGE gateway nodes that allow the NSP NFM-P to reach new nodes that enter the domain.
Node C is designated as a gateway node.
When node D is added to the NGE domain, it must first have the NGE domain key group downloaded
to it from the NSP NFM-P. The NSP NFM-P creates an NGE exception ACL on the gateway node, C, to
allow communication with node D using SNMPv3 and SSH through the NGE domain. After the key group
is downloaded, the NSP NFM-P enables router interface encryption on node D’s interface with the service
provider and node D is now able to participate in the NGE domain. The NSP NFM-P automatically removes
the IP exception ACL from node C when node D enters the NGE domain.
See Router interface NGE domain concepts for more information.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
the NGE domain. NGE domains use only one key group when the domain is created; however, two key
groups may be active at when if some links within the NGE domain are in transition from one key group to
the other.
Figure 16: Inside and outside NGE domains illustrates the NGE domain concept. Table 6: Inside and
outside NGE domains configuration scenarios describes the three configuration scenarios inside the NGE
domain.
Key Description
4 Outside the NGE domain, the interface is not configured for NGE; any ESP
packets are IPsec packets
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
A router interface is considered to be inside the NGE domain when it has been configured with group-
encryption on the interface. When group-encryption is configured on the interface, the router can receive
unencrypted packets or NGE-encrypted packets from any configured key group on the router, but any other
type of IPsec-formatted packet is not allowed. If an IPsec-formatted packet is received on an interface that
has group-encryption enabled, it does not pass NGE authentication and is dropped. Therefore, IPsec
packets cannot exist within the NGE domain without first being converted to NGE packets. This conversion
requirement delineates the boundary of the NGE domain and other IPsec services.
When NGE router interface encryption is enabled and only an outbound key group is configured, the
interface can receive unencrypted packets or NGE-encrypted packets from any configured key group on
the router. All outbound packets are encrypted using the outbound key group if the packet was not already
encrypted further upstream in the network.
When NGE router interface encryption has been configured with both an inbound and outbound key group,
only NGE packets encrypted with the key group security association can be sent and received over the
interface.
When there is no NGE router interface encryption, the interface is considered outside the NGE domain
where NGE is not applied.
See the ‟NGE Packet Overhead and MTU Considerations” section in the 7450 ESS, 7750 SR, 7950 XRS,
and VSR Services Overview Guide for MTU information related to enabling NGE on a router interface.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
be accomplished by using a router interface NGE exception filter applied on the router interface for the
required direction, inbound or outbound.
Figure 17: Router interface NGE exception filter example shows the use of a router interface NGE
exception filter.
The inbound or outbound exception filter is used to allow specific packet flows through the NGE domain
in clear text, where there is an explicit inbound and outbound key group configured on the interface. The
behavior of the exception filter for each router interface configuration is as follows:
• NGE enabled, no inbound or outbound key group
In this scenario, the router does not encrypt outbound traffic, and so the outbound exception filter is not
applied. The router can still receive inbound NGE packets, so the exception filter is applied to inbound
packets. If the filter detects a match, clear text packets can be received and forwarded by the router.
• Outbound key group, no inbound key group
The outbound exception filter is applied to outbound traffic, and packets that match the filter are not
encrypted on egress. The router can receive inbound NGE packets without an inbound key group set
and applies the exception filter to inbound packets. If the filter detects a match, clear text packets can
be received and forwarded by the router.
• Inbound and outbound key group
The inbound and outbound exception filters are applied, and any packets that match are passed in clear
text.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
An IPsec packet enters the router from outside the NGE domain. When the router determines that the
egress interface to route the packet is inside an NGE domain, it selects an NGE router interface with one of
the following configurations.
• NGE enabled with no inbound or outbound key group configured
This link cannot forward the IPsec packet without adding the NGE ESP, but because nothing is
configured for the outbound key group, the packet must be dropped.
• NGE enabled with outbound key group configured and no inbound key group configured — the packet
originates outside the NGE domain, so the router adds an ESP header over the existing ESP and
encrypts the payload using the NGE domain keys for the configured outbound key group.
• NGE enabled with both inbound and outbound key groups configured — the packet originates outside
the NGE domain, so the router adds an ESP header over the existing ESP and encrypts the payload
using the NGE domain keys for the configured outbound key group.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
OSPFv3 IPsec support also uses IPsec transport mode packets. These packets originate from the CPM,
which is considered outside the NGE domain; however, the above rules for encapsulating the packets with
an NGE ESP apply and allow these packets to successfully transit the NGE domain.
Multicast packets received from outside the NGE domain (Scenario 1) are processed similarly to multicast
packets received from inside the NGE domain (Scenarios 2a and 2b).
The processing rule is that multicast packets are always forwarded as clear text over the fabric. This
means that for Scenario 2b, when a multicast packet is received on an encryption-capable interface and
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
is NGE-encrypted, the packet is always decrypted first so that it can be processed in the same way as
packets in Scenarios 1 and 2a.
On egress, the following scenarios apply:
• Egressing an interface outside the NGE domain
Packets are processed in the same way as any multicast packets forwarded out a non-NGE interface.
• Egressing an NGE router interface and no inbound or outbound key group is configured
The router forwards these packets out from the egress interface without encrypting them because
there is no outbound key group configured. This behavior also applies to unicast packets in the same
scenario.
• egressing an NGE router interface with the outbound key group configured — the router encrypts the
multicast packet using the SPI keys of the outgoing SA configured in the key group. This behavior also
applies to unicast packets in the same scenario.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
2.11.11 Router interface NGE and ICMP interactions over the NGE domain
Typically, ICMP works as expected over an NGE domain when all routers participating in the NGE domain
are NGE-capable; this includes running an NGE domain over a private IP/MPLS network. When an ICMP
message is required, the NGE packet is decrypted first and the original packet is restored to create a
detailed ICMP message using the original packet’s header information.
When the NGE domain crosses a Layer 3 service provider, or crosses over routers that are not NGE-
aware, it is not possible to create a detailed ICMP message using the original packet’s information, as
the NGE packet protocol is always set to ESP. Furthermore, the NGE router that receives these ICMP
messages drops them because the messages are not NGE-encrypted.
The combination of dropping ICMP messages at the NGE border node and the missing unencrypted
packet details in the ICMP information can cause problems with diagnosing network issues.
To help with diagnosing network issues, additional statistics are available on the interface to show whether
ICMP messages are being returned from a foreign node. The following statistics are included in the group
encryption NGE statistics for an interface:
• Group Enc Rx ICMP DestUnRch Pkts
• Group Enc Rx ICMP TimeExc Pkts
• Group Enc Rx ICMP Other Pkts
These statistics are used when clear text ICMP messages are received on an NGE router interface. The
Invalid ESP statistics are not used in this situation even though the packet does not have a correct NGE
ESP header. If there is no ingress exception ACL configured on the interface to allow the ICMP messages
to be forwarded, the messages are counted and dropped.
If more information is required for these ICMP messages, such as source or destination address
information, a second ICMP filter can be configured on the interface to allow logging of the ICMP
messages. If the original packet information is also required, an egress exception ACL can be configured
with the respective source or destination address information, or other criteria, to allow the original packet
to enter the NGE domain in clear text and determine which flows are causing the ICMP failures.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
• IPv6 interfaces and associated routing protocols may only be configured on the following systems:
– 7950 XRS systems
– 7750 SR chassis systems
– 7750 SR-a chassis systems
– 7750 SR-e chassis systems
– 7450 ESS systems with IPv6 functionality limited to those interfaces on slots with 7750 IOM3-XPs/
IMMs (or later) line cards.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
A:ALA-A>config>system# info
#------------------------------------------
# System Configuration
#------------------------------------------
name "ALA-A"
location "Mt.View, CA, NE corner of FERG 1 Building"
coordinates "37.390, -122.05500 degrees lat."
snmp
exit
- config>router
- interface interface-name
- address {ip-address/mask | ip-address [netmask]} [broadcast {all-ones | host-
ones]
- secondary {[address/mask | ip-address] [netmask]} [broadcast {all-ones | host-
ones}] [igp-inhibit]
- config>router
- interface interface-name
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
- config>router
- interface interface-name
- address ip-address{/mask-length | mask} [broadcast {all-ones | host-ones}]
- cflowd {acl | interface}
- egress
- filter ip ip-filter-id
- filter ipv6 ipv6-filter-id
- ingress
- filter ip ip-filter-id
- filter ipv6 ipv6-filter-id
- port port-name
- config>router
- interface interface-name
- address ip-addr{/mask-length | mask} [broadcast {all-ones | host-ones}]
- egress
- filter ip ip-filter-id
- filter ipv6 ipv6-filter-id
- ingress
- filter ip ip-filter-id
- filter ipv6 ipv6-filter-id
- port port-name
A:ALA-A>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.0.4/32
exit
interface "to-ALA-2"
address 10.10.24.4/24
port 1/1/1
egress
filter ip 10
exit
exit
...
#------------------------------------------
A:ALA-A>config>router#
- config>router
- interface interface-name
- cpu-protection policy-id
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
CPU protection policies are configured in the config>sys>security>cpu-protection context. See the
7450 ESS, 7750 SR, 7950 XRS, and VSR System Management Guide.
The following example displays key group configuration for a router interface.
domain1>config>router# info
----------------------------------------------
...
interface demo
group-encryption
encryption-keygroup 6 direction inbound
encryption-keygroup 6 direction outbound
exit
no shutdown
exit
exit
...
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
packet-too-big 100 10
param-problem 100 10
redirects 100 10
time-exceeded 100 10
unreachables 100 10
exit
----------------------------------------------
A:ALA-49>config>router>if>ipv6# exit all
A:ALA-49>config>router>if# info
----------------------------------------------
address 10.11.10.1/24
port 1/2/37
ipv6
address 2001:db8::1/24
exit
----------------------------------------------
A:ALA-49>config>router>if#
- config>router
- static-route-entry 3ffe::c8c8:c802/128
- indirect 10.200.200.2
- interface ip-int-name
- address {ip-address/mask | ip-address netmask} [broadcast {all-ones |
host-ones}]
- port port-name
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
A:ALA-49>config>router# info
----------------------------------------------
...
interface "ip-1.1.1.1"
address 10.1.1.1/30
port 1/1/1
exit
...
----------------------------------------------
A:ALA-49>config>router#
- config>router
- interface ip-int-name
- address {ip-address/mask | ip-address netmask} [broadcast {all-ones | host-ones}]
- ipv6
- address ipv6-address/prefix-length [eui-64]
A:ALA-49>config>router# info
----------------------------------------------
...
interface "system"
address 10.0.113.1/32
ipv6
address 3ffe::c8c8:c801/128
exit
exit
...
----------------------------------------------
A:ALA-49>config>router#
- config>router
- ospf
- area area-id
- interface ip-int-name
A:ALA-49>config>router# info
----------------------------------------------
...
ospf
area 0.0.0.0
interface "system"
exit
interface "ip-1.1.1.1"
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
exit
exit
exit
----------------------------------------------
A:ALA-49>config>router#
A:ALA-49>config>router# info
----------------------------------------------
...
bgp
export "ospf3"
router-id 203.0.113.1
group "main"
family ipv4 ipv6
type internal
neighbor 203.0.113.2
local-as 1
peer-as 1
exit
exit
exit
...
----------------------------------------------
A:ALA-49>config>router#
A:ALA-49>config>router# info
----------------------------------------------
...
policy-options
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
policy-statement "ospf3"
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10
description "Entry From Protocol ospf3 To bgp"
from
protocol ospf3
exit
to
protocol bgp
exit
action accept
exit
exit
exit
exit
...
----------------------------------------------
A:ALA-49>config>router#
- config>router
- static-route 3ffe::c8c8:c801/128
- indirect 10.0.113.1
- interface ip-int-name
- address {ip-address/mask> | ip-address netmask} [broadcast {all-ones |
host-ones}]
- ipv6
- address ipv6-address/prefix-length [eui-64]
- port port-name
A:ALA-49>config>router# info
----------------------------------------------
...
interface "ip-1.1.1.2"
address 10.1.1.2/30
port 1/1/1
exit
interface "system"
address 10.0.113.2/32
ipv6
address 3ffe::c8c8:c802/128
exit
exit
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
- config>router
- ospf
- area area-id
- interface ip-int-name
A:ALA-49>config>router# info
----------------------------------------------
...
ospf
area 0.0.0.0
interface "system"
exit
interface "ip-1.1.1.2"
exit
exit
exit
----------------------------------------------
A:ALA-49>config>router#
- config>router
- bgp
- export policy-name [policy-name]
- router-id ip-address
- group name
- family [ipv4] [vpn-ipv4] [ipv6] [mcast-ipv4]
- type {internal | external}
- neighbor ip-address
- local-as as-number [private]
- peer-as as-number
A:ALA-49>config>router# info
----------------------------------------------
...
bgp
export "ospf3"
router-id 203.0.113.2
group "main"
family ipv4 ipv6
type internal
neighbor 203.0.113.1
local-as 1
peer-as 1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
exit
exit
exit
...
----------------------------------------------
A:ALA-49>config>router#
- config>router
- bgp
- export policy-name [policy-name]
- router-id ip-address
- group name
- family [ipv4] [vpn-ipv4] [ipv6] [mcast-ipv4]
- type {internal | external}
- neighbor ip-address
- local-as as-number [private]
- peer-as as-number
A:ALA-49>config>router# info
----------------------------------------------
...
policy-options
policy-statement "ospf3"
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10
description "Entry From Protocol ospf3 To bgp"
from
protocol ospf3
exit
to
protocol bgp
exit
action accept
exit
exit
exit
exit
----------------------------------------------
A:ALA-49>config>router#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
- config>router# router-advertisement
- dns-options
- rdnss-lifetime seconds
- dns-servers ipv6-address
- interface ip-int-name
- current-hop-limit number
- dns-options
- rdnss-lifetime {seconds | infinite}
- dns-servers ipv6-address
- include-dns
- managed-configuration
- max-advertisement-interval seconds
- min-advertisement-interval seconds
- mtu mtu-bytes
- other-stateful-configuration
- prefix ipv6-prefix/prefix-length
- autonomous
- on-link
- preferred-lifetime {seconds | infinite}
- valid-lifetime {seconds | infinite}
- reachable-time milliseconds
- retransmit-time milliseconds
- router-lifetime seconds
- no shutdown
- use-virtual-mac
- config>router# router-advertisement
- dns-options
- rdnss-lifetime seconds
- interface ip-int-name
- current-hop-limit number
- dns-options
- rdnss-lifetime {seconds | infinite}
- include-dns
- managed-configuration
- max-advertisement-interval seconds
- min-advertisement-interval seconds
- mtu mtu-bytes
- other-stateful-configuration
- autonomous
- on-link
- preferred-lifetime {seconds | infinite}
- valid-lifetime {seconds | infinite}
- reachable-time milliseconds
- retransmit-time milliseconds
- router-lifetime seconds
- no shutdown
- use-virtual-mac
*A:sim131>config>router>router-advert# info
----------------------------------------------
interface "n1"
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
prefix 2001:db8:3::/64
exit
use-virtual-mac
no shutdown
exit
----------------------------------------------
*A:sim131>config>router>router-advert# interface n1
*A:sim131>config>router>router-advert>if# prefix 2001:db8:3::/64
----------------------------------------------
autonomous
on-link
preferred-lifetime 604800
valid-lifetime 2592000
----------------------------------------------
*A:tahi>config>router>router-advert>if>prefix#
A:ALA-49>config>router>if# info
----------------------------------------------
address 10.11.10.1/24
port 1/3/37
ipv6
address 2001:db8::1/24
exit
----------------------------------------------
A:ALA-49>config>router>if#
- config>router
- bgp
- export policy-name [policy-name]
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
- router-id ip-address
- group name
- family [ipv4] [vpn-ipv4] [ipv6] [mcast-ipv4]
- type {internal | external}
- neighbor ip-address
- local-as as-number [private]
- peer-as as-number
A:ALA-49>config>router# info
----------------------------------------------
...
policy-options
policy-statement "ospf3"
description "Plcy Stmnt For 'From ospf3 To bgp'"
entry 10
description "Entry From Protocol ospf3 To bgp"
from
protocol ospf3
exit
to
protocol bgp
exit
action accept
exit
exit
exit
exit
----------------------------------------------
A:ALA-49>config>router#
- config>router# policy-options
- begin
- commit
- prefix-list name
- prefix ip-prefix/mask [exact | longer | through length | prefix-length-range length1-
length2]
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
- config>router# policy-options
- begin
- commit
- policy-statement name
- default-action {accept | next-entry | next-policy | reject}
- entry entry-id
- action {accept | next-entry | next-policy | drop | reject}
- to
- prefix-list name [name]
- from
- prefix-list name [name]
The following example shows the prefix list and policy statement configuration:
A:ALA-49>config>router>policy-options# info
----------------------------------------------
prefix-list "prefixlist1"
prefix 10.20.30.0/24 through 32
exit
prefix-list "prefixlist2"
prefix 10.10.10.0/24 through 32
exit
...
policy-statement "ProxyARPpolicy"
entry 10
from
prefix-list "prefixlist1"
exit
to
prefix-list "prefixlist2"
exit
action reject
exit
default-action accept
exit
exit
...
----------------------------------------------
A:ALA-49>config>router>policy-options#
- config>router>interface interface-name
- local-proxy-arp
- proxy-arp-policy policy-name [policy-name]
- remote-proxy-arp
A:ALA-49>config>router>if# info
----------------------------------------------
address 192.0.2.59/24
local-proxy-arp
proxy-arp
policy-statement "ProxyARPpolicy"
exit
----------------------------------------------
A:ALA-49>config>router>if#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
- config>router
- router-id router-id
- interface ip-int-name
- address {ip-address/mask | ip-address netmask} [broadcast {all-ones | host-ones}]
A:ALA-4>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.0.4/32
exit
. . .
router-id 10.10.0.4
#------------------------------------------
A:ALA-4>config>router#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
The following example shows the configuration of the confederation topology in Figure 2: Confederation
configuration.
Note:
• Confederations can be preconfigured before configuring BGP connections and peering.
• Each confederation can have up to 15 members.
A:ALA-B>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.10.103/32
exit
interface "to-104"
shutdown
address 10.0.0.103/24
port 1/1/1
exit
autonomous-system 100
confederation 2002 members 200 300 400
router-id 10.10.10.103
#------------------------------------------
A:ALA-B>config>router#
A;ALA-A>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.10.10.103/32
exit
interface "to-104"
address 10.0.0.103/24
port 1/1/1
exit
exit
autonomous-system 100
router-id 10.10.10.103
#------------------------------------------
A:ALA-A>config>router#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
These cause an overload state in the IGP to trigger the traffic reroute by setting the overload bit in IS-IS
or setting the metric to maximum in OSPF. When PIM uses IS-IS or OSPF to find out the upstream router,
a next-hop change in the IS-IS or OSPF causes PIM to join the new path and prune the old path, which
effectively also reroutes the multicast traffic downstream as well as the unicast traffic.
When the problem is resolved, and the required compliment of SFMs become active in the router, the
overload condition is cleared, which causes the traffic to be routed back to the router.
The conditions to set overload are:
• 7750 SR-12/SR-7 and 7450 ESS-12/ESS-7 platforms: protocol sets overload if one of the SF/CPMs
fails
• 7750 SR-12e and 7950 XRS platforms: protocol sets overload if two SFMs fail (two SFMs belonging to
different SFM pairs on the XRS-40)
The following example shows the configuration to change the system name:
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
To modify a port:
A:ALA-A>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
interface "system"
address 10.0.0.103/32
exit
interface "to-sr1"
address 10.0.0.25/24
port 1/1/2
exit
router-id 10.10.0.3
#------------------------------------------
A:ALA-A>config>router#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
The following example displays a key group removed from a router interface:
The following example shows that the key group configuration has been removed from a router interface.
domain1>config>router# info
----------------------------------------------
...
interface demo
group-encryption
exit
no shutdown
exit
exit
...
----------------------------------------------
The following example shows that the key group configuration has been changed for the router interface.
domain1>config>router# info
----------------------------------------------
...
interface demo
group-encryption
encryption-keygroup 8 direction inbound
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE IP router configuration
22.5.R1
- config>router
- no interface ip-int-name
Procedure
Step 1. Before an IP interface can be deleted, it must first be administratively disabled with the shutdown
command.
Step 2. After the interface has been shut down, it can then be deleted with the no interface command.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
3 VRRP
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
The preempt parameter can be set to false to prevent a backup virtual router with a better priority value
from becoming master when an existing non-owner virtual router is the current master. This is determined
on a first-come, first-served basis.
While master, a virtual router routes and originates all IP packets into the LAN using the physical MAC
address for the IP interface as the Layer 2 source MAC address, not the VRID MAC address. ARP packets
also use the parent IP interface MAC address as the Layer 2 source MAC address while inserting the
virtual router MAC address in the appropriate hardware address field. VRRP messages are the only
packets transmitted using the virtual router MAC address as the Layer 2 source MAC address.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
• Preempt Mode
• VRRP Message Authentication
• Authentication Data
• Virtual MAC Address
• Inherit Master VRRP Router’s Advertisement Interval Timer
• Policies
3.2.7.2 Priority
The priority value affects the interaction between this VRID and the same VRID of other virtual routers
participating on the same LAN. A higher-priority value defines a greater priority in becoming the virtual
router master for the VRID. The priority value can only be configured when the defined IP address on the
IP interface is different from the virtual router IP address (non-owner mode).
When the IP address on the IP interface matches the virtual router IP address (owner mode), the priority
value is fixed at 255, the highest value possible. This virtual router member is considered the owner of the
virtual router IP address. There can only be one owner of the virtual router IP address for all virtual router
members.
The priority value 0 is reserved for VRRP advertisement message purposes. It is used to tell other virtual
routers in the same VRID that this virtual router is no longer acting as master, triggering a new election
process. When this happens, each backup virtual router sets its master down timer equal to the skew time
value. This shortens the time until one of the backup virtual routers becomes master.
The current master virtual router must transmit a VRRP advertisement message immediately upon receipt
of a VRRP message with priority set to 0. This prevents another backup from becoming master for a short
period of time.
Non-owner virtual routers may be configured with a priority of 254 through 1. The default value is 100.
Multiple non-owners can share the same priority value. When multiple non-owner backup virtual routers
are tied (transmit VRRP advertisement messages simultaneously) in the election process, all attempts to
become master simultaneously. The one with the best priority wins the election. If the priority value in the
message is equal to the master’s local priority value, the primary IP address of the local master and of the
message is evaluated as the tie breaker. The higher IP address becomes master. (The primary IP address
is the source IP address of the VRRP advertisement message.)
The priority value is also used to determine when to preempt the existing master. If the preempt mode
value is true, VRRP advertisement messages from inferior (lower-priority) masters are discarded, causing
the master down timer to expire and causing the transition to master state.
The priority value also dictates the skew time added to the master timeout period.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
3.2.7.3 IP Addresses
Each virtual router with the same VRID should be defined with the same set of IP addresses. These are
the IP addresses being used by hosts on the LAN as gateway addresses. Multi-netting supports 16 IP
addresses on the IP interface; up to 16 addresses can be assigned to a specific virtual router instance.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
advertisement interval field in the VRRP advertisement message. When inherit is disabled, the operational
advertisement interval must be equal to the locally configured advertisement interval.
The master down timer is only operational when the local virtual router is operating in backup mode.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
3.2.7.14 Policies
Policies can be configured to control VRRP priority with the virtual router instance. VRRP priority control
policies can be used to override or adjust the base priority value, depending on events or conditions within
the chassis.
The policy can be associated with more than one virtual router instance. The priority events within the
policy override or diminish the base priority dynamically affecting the in-use priority. As priority events clear
in the policy, the in-use priority can eventually be restored to the base priority value.
Policies can only be configured in the non-owner VRRP context. For non-owner virtual router instances, if
policies are not configured, then the base priorityis used as the in-use priority.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
For an example of a hold-set timer setting, see LAG degrade priority event.
1 One port up Event State Set - 8 ports down Cannot change until hold-set timer
expires
2 All ports up Event State Set - 8 ports down Still waiting for hold-set timer expiry
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
202 Seven ports Event State Set - 7 ports down Changed because of increase
down
Event Threshold 6 ports down —
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
• The operator can associate additional VRRP instances with the leading VRRP instance by configuring
the following instances to monitor the lead oper-group instance.
• Configuration parameters associated with the instance state or priority are ignored within a following
VRRP instance.
• If the lead instance becomes primary, all following instances assume a primary role for their respective
VRRP instances.
• If the lead instance transitions from primary to standby, all the following instances transition to standby.
• If the lead instance transitions to a down state, all following instances transition to standby.
interface "base-1-1" {
port 1/1/3:1
ipv6 {
link-local-address {
address fe80::1
duplicate-address-detection false
}
address 2500::1 {
prefix-length 64
duplicate-address-detection false
}
vrrp 1 {
backup [2500::10 fe80::1:1]
message-interval 5
mac 00:00:5e:00:02:01
priority 130
ping-reply true
oper-group "op-v6LI-1"
bfd-liveness {
dest-ip 2000::2
service-name "100"
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
interface-name "bfd-1-1"
}
}
}
}
interface "base-1-2" {
port 1/1/3:2
ipv6 {
link-local-address {
address fe80::2
duplicate-address-detection false
}
address 2500:0:1::1 {
prefix-length 64
duplicate-address-detection false
}
vrrp 1 {
backup [2500:0:1::10 fe80::1:2]
message-interval 50
mac 00:00:5e:00:02:01
priority 130
ping-reply true
monitor-oper-group "op-v6LI-1"
bfd-liveness {
dest-ip 2000::2
service-name "100"
interface-name "bfd-1-1"
}
}
}
}
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
3.7.1 General
• Creating and applying VRRP policies are optional.
• Backup command:
– The backup IP addresses must be on the same subnet. The backup addresses explicitly define
which IP addresses are in the VRRP advertisement message IP address list.
– In the owner mode, the backup IP address must be identical to one of the interface’s IP addresses.
The backup address explicitly defines which IP addresses are in the VRRP advertisement message
IP address list.
– For IPv6, one of the backup addresses configured must be the link-local address of the owner VRRP
instance.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
The following example shows a configuration of a VRRP policy for the 7450 ESS:
A:SR2>config>vrrp>policy# info
----------------------------------------------
delta-in-use-limit 50
priority-event
port-down 4/1/2
hold-set 43200
priority 100 delta
exit
port-down 4/1/3
priority 200 explicit
exit
lag-port-down 1
number-down 3
priority 50 explicit
exit
exit
host-unreachable 10.10.24.4
drop-count 25
exit
route-unknown 10.10.0.0/32
priority 50 delta
exit
exit
----------------------------------------------
The following example shows a configuration of a VRRP policy for the 7750 SR and 7950 XRS:
A:SR2>config>vrrp>policy# info
----------------------------------------------
delta-in-use-limit 50
priority-event
port-down 4/1/2
hold-set 43200
priority 100 delta
exit
port-down 4/1/3
priority 200 explicit
exit
lag-port-down 1
number-down 3
priority 50 explicit
exit
exit
host-unreachable 10.10.24.4
drop-count 25
exit
route-unknown 10.10.0.0/32
priority 50 delta
protocol bgp
exit
exit
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
A:SR2>config>service>ies# info
----------------------------------------------
interface "tuesday" create
address 10.10.36.2/24
sap 7/1/1.2.2 create
vrrp 19 owner
backup 10.10.36.2
authentication-key "testabc"
exit
exit
interface "testing" create
address 10.10.10.16/24
sap 1/1/55:0 create
vrrp 12
backup 10.10.10.15
policy 1
authentication-key "testabc"
exit
exit
no shutdown
----------------------------------------------
A:SR2>config>service>ies#
*A:nlt7750-3>config>router>router-advert# info
----------------------------------------------
interface "Application-interface-101"
use-virtual-mac
no shutdown
exit
...
----------------------------------------------
*A:nlt7750-3>config>router>router-advert#
*A:nlt7750-3>config>service>ies# info
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
----------------------------------------------
description "Application VLAN 921"
interface "Application-interface-101" create
address 10.152.2.220/28
vrrp 217
backup 10.152.2.222
priority 254
ping-reply
exit
ipv6
address 2001:db8:D68F:1:221::FFFD/64
link-local-address fe80::d68f:1:221:fffd dad-disable
vrrp 219
backup fe80::d68f:1:221:ffff
priority 254
ping-reply
exit
exit
sap ccag-1.a:921 create
description "cross connect to VPLS 921"
exit
exit
no shutdown
----------------------------------------------
*A:nlt7750-3>config>service>ies#
A:SR4>config>router# info
#------------------------------------------
echo "IP Configuration "
#------------------------------------------
interface "system"
address 10.10.0.4/32
exit
interface "test1"
address 10.10.14.1/24
secondary 10.10.16.1/24
secondary 10.10.17.1/24
secondary 10.10.18.1/24
exit
interface "test2"
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
address 10.10.10.23/24
vrrp 1 owner
backup 10.10.10.23
authentication-key "testabc"
exit
exit
#------------------------------------------
A:SR4>config>router#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
A:SR1>config>router# info
#------------------------------------------
echo "IP Configuration "
#------------------------------------------
interface "system"
address 10.10.0.1/32
exit
interface "testA"
address 10.123.123.123/24
exit
interface "testB"
address 10.10.14.1/24
secondary 10.10.16.1/24
secondary 10.10.17.1/24
secondary 10.10.18.1/24
exit
router-id 10.10.0.1
#------------------------------------------
A:SR1>config>router#
A:SR1>config>vrrp# info
----------------------------------------------
policy 1
delta-in-use-limit 50
priority-event
port-down 1/1/2
hold-set 43200
priority 100 delta
exit
route-unknown 0.0.0.0/0
protocol isis
exit
exit
exit
----------------------------------------------
A:SR1>config>vrrp#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
A:SR2>config>service>ies# info
----------------------------------------------
...
interface "testing" create
address 10.10.10.16/24
sap 1/1/55:0 create
vrrp 12
backup 10.10.10.15
policy 1
authentication-key "testabc"
exit
exit
no shutdown
----------------------------------------------
A:SR2>config>service>ies#
A:SR4>config>router# info
#------------------------------------------
echo "IP Configuration "
#------------------------------------------
...
interface "test2"
address 10.10.10.23/24
vrrp 1 owner
backup 10.10.10.23
authentication-key "testabc"
exit
exit
#------------------------------------------
A:SR4>config>router#
A:SR2>config># info
#------------------------------------------
interface "if-test"
address 10.20.30.40/24
secondary 10.10.50.1/24
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
secondary 10.10.60.1/24
secondary 10.10.70.1/24
vrrp 1
backup 10.10.50.2
backup 10.10.60.2
backup 10.10.70.2
backup 10.20.30.41
ping-reply
telnet-reply
authentication-key "testabc"
exit
exit
#------------------------------------------
A:SR2>config>#
A:SR2>config>router# info
#------------------------------------------
interface "vrrpowner"
address 10.10.10.23/24
vrrp 1 owner
backup 10.10.10.23
authentication-key "testabc"
exit
exit
#------------------------------------------
A:SR2>config>router#
A:SR2>config>vrrp>policy# info
----------------------------------------------
delta-in-use-limit 50
priority-event
port-down 1/1/2
hold-set 43200
priority 100 delta
exit
port-down 1/1/3
priority 200 explicit
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
exit
host-unreachable 10.10.24.4
drop-count 25
exit
exit
----------------------------------------------
A:SR2>config>vrrp>policy#
A:SR2#
===============================================================================
VRRP Policies
===============================================================================
Policy Current Current Current Delta Applied
Id Priority & Effect Explicit Delta Sum Limit
-------------------------------------------------------------------------------
1 200 Explicit 200 100 50 Yes
15 254 None None 1 No
32 100 None None 1 No
===============================================================================
A:SR2#
- config>router#interface
- config>router# interface if-test
- config>router>if# shutdown
- config>router>if# exit
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE VRRP
22.5.R1
The following example shows the command usage to delete a VRRP instance from an interface or IES
service:
- config>service#ies 10
- config>service>ies# interface ‟test”
- config>service>ies>if# vrrp 1
- config>service>ies>if>vrrp# shutdown
- config>service>ies>if>vrrp# exit
- config>service>ies>if# no vrrp 1
- config>service>ies>if# exit all
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
4 Filter policies
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
2 forwarded traffic and a Layer 3 filter policy can be applied to Layer 3 routed traffic. For dual-stack
interfaces, if both IPv4 and IPv6 filter policies are configured, the policy applied are based on the outer
IP header of the packet. Non-IP packets do not affect an IP filter policy, so the default action in the IP
filter policy do not apply to these packets. Egress IPv4 QoS-based classification criteria are ignored when
egress MAC filter policy is configured on the same interface.
Additionally, platforms that support Network Group Encryption (NGE) can use IP exception filters. IP
exception filters scan all outbound traffic entering an NGE domain and allow packets that match the
exception filter criteria to transit the NGE domain unencrypted. See Router encryption exceptions using
ACLs for information about IP exception filters supported by NGE nodes.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Match the specified DSCP value against the Differentiated Services Code Point/Traffic Class field in the
IPv4 or IPv6 packet header.
• src-ip, dst-ip, or ip
Match the specified source or destination IPv4 or IPv6 address prefix against the IP address field in the
IPv4 or IPv6 packet header. The operator can optionally configure a mask to be used in a match. The ip
command can be used to configure a single filter-policy entry that provides non-directional matching of
either the source or destination (logical OR).
• flow-label
Match the specified flow label against the Flow label field in IPv6 packets. The operator can optionally
configure a mask to be used in a match. This operation is supported on ingress filters.
• protocol
Match the specified protocol against the Protocol field in the IPv4 packet header (for example, TCP,
UDP, IGMP) of the outer IPv4. ‟*” can be used to specify TCP or UDP upper-layer protocol match
(Logical OR).
• next-header
Match the specified upper-layer protocol (such as, TCP, UDP, IGMPv6) against the Next Header
field of the IPv6 packet header. ‟*” can be used to specify TCP or UDP upper-layer protocol match
(Logical OR). When config>system>ip>ipv6-eh max is configured, the next-header value is the
last next header field in the last extension header, up to six extension header are supported. When
config>system>ip>ipv6-eh limited is configured, the next-header value is the next header field from
the IPv6 header.
Fragmentation match criteria: fragment
Match for the presence of fragmented packet. For IPv4, match against the MF bit or Fragment Offset
field to determine whether the packet is a fragment. For IPv6, match against the Next Header Field for
Fragment Extension Header value to determine whether the packet is a fragment. Up to six extension
headers are matched against to find the Fragmentation Extension Header.
IPv4 and IPv6 filters support matching against initial fragment using first-only or non-initial fragment non-
first-only.
IPv4 match fragment true or false criteria are supported on both ingress and egress.
IPv4 match fragment first-only or non-first-only are supported on ingress only.
Operational note for fragmented traffic
IP and IPv6 filters defined to match TCP, UDP, ICMP, or SCTP criteria (such as src-port, dst-port, port,
tcp-ack, tcp-syn, icmp-type, and icmp-code) with values of zero or false also match non-first fragment
packets if other match criteria within the same filer entry are also met. Non-initial fragment packets do not
contain a UDP, TCP, ICMP or SCTP header.
IPv4 options match criteria:
• ip-option
Matches the specified option value in the first option of the IPv4 packet. Operator can optionally
configure a mask to be used in a match.
option-present
Matches the presence of IP options in the IPv4 packet. Padding and EOOL are also considered as IP
options. Up to six IP options are matched against.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
• multiple-option
Matches the presence of multiple IP options in the IPv4 packet.
• src-route-option
Matches the presence of IP Option 3 or 9 (Loose or Strict Source Route) in the first three IP options of
the IPv4 packet. A packet also matches this rule if the packet has more than three IP options.
IPv6 Extension Header match criteria:
Up to six extension headers are matched against when config>system>ip>ipv6-eh max is configured.
When config>system>ip>ipv6-eh limited is configured, the next header value of the IPv6 header is used
instead.
• ah-ext-header
Matches for the presence of the Authentication Header extension header in the IPv6 packet. This match
criterion is supported on ingress only.
• esp-ext-header
Matches for the presence of the Encapsulating Security Payload extension header in the IPv6 packet.
This match criterion is supported on ingress only.
• hop-by-hop-opt
Matches for the presence of hop-by-hop options extension header in the IPv6 packet. This match
criterion is supported on ingress only.
• routing-type0
Matches for the presence of Routing extension header type 0 in the IPv6 packet. This match criterion is
supported on ingress only.
Upper-layer protocol match criteria:
• icmp-code
Matches the specified value against the Code field of the ICMP/ICMPv6 header of the packet. This
match is supported only for entries that also define protocol/next-header match for ‟ICMP”/”ICMPv6”
protocol.
• icmp-type
Matches the specified value against the Type field of the ICMP/ICMPv6 header of the packet. This
match is supported only for entries that also define protocol/next-header match for ‟ICMP”/”ICMPv6”
protocol.
• src-port/dst-port/port
Matches the specified port value, port list, or port range against the Source Port Number/Destination
Port Number of the UDP/TCP/SCTP packet header. An option to match either source or destination
(Logical OR) using a single filter policy entry is supported by using a directionless ‟port” command.
Source/destination match is supported only for entries that also define protocol/next-header match for
‟TCP”, ‟UDP”, ‟SCTP”, or ‟TCP or UDP” protocols. A non-initial fragment never matches an entry with
non-zero port criteria specified. Match on SCTP src-port, dst-port, or port is supported on ingress filter
policy.
• tcp-ack/tcp-cwr/tcp-ece/tcp-fin/tcp-ns/tcp-psh/tcp-rst/tcp-syn/tcp-urg
Matches the presence or absence of the TCP flags defined in RFC 793/3168/3540 in the TCP header of
the packet. This match criteria also requires defining the protocol/next-header match as TCP. tcp-cwr,
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
tcp-ece, tcp-fin, tcp-ns, tcp-psh, tcp-rst, tcp-urg are supported on FP4-based line cards only. When
configured on other line cards, the bit for the unsupported TCP flags is ignored.
For filter type match criteria:
Additional match criteria for src-mac, packet-length, and destination-class are available using different
filter types. See Filter policy type for more information.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
• isid
The filter searches to match for the matching Ethernet frames with the 24-bit ISID value from the PBB I-
TAG. This match criterion is mutually exclusive of all the other match criteria under a specific MAC filter
policy and is applicable to MAC filters of type isid only. The resulting MAC filter can only be applied on
a BVPLS SAP or PW in the egress direction.
• inner-tag/outer-tag
The filter searches to match Ethernet frames with the non-service delimiting tags, as described in the
VID MAC filters section. This match criterion is mutually exclusive of all other match criteria under a
specific MAC filter policy and is applicable to MAC filters of type vid only.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Packets that match filter policy entry match criteria and the drop ttl-value or hop-limit-value are
dropped. Packets that match only the filter policy entry match criteria and do not match the drop ttl-
value or hop-limit-value are forwarded with no further match in following filter entries.
Packets matching this filter entry and not matching the conditional criteria are not logged, counted,
or mirrored.
– Pattern conditional drop
Traffic can be dropped when it is based on a pattern found in the packet header or data payload.
The pattern is defined by an expression, mask, offset-type, and offset-value match in the first
256 bytes of a packet.
The pattern expression is up to 8 bytes long. The offset-type-value identifies the starting point for
the offset-value and the supported offset type values are:
• layer-3: layer 3 IP header
• layer-4: layer 4 protocol header
• data: data payload for TCP or UDP protocols
• dns-qtype: DNS request or response query type
The content of the packet is compared with the expression/mask value found at the offset-type-value
and offset-value as defined in the filter entry. For example, if the pattern is expression 0xAA11, mask
0xFFFF, offset-type data, offset-value 20, then the filter entry compares the content of the first 2
bytes in the packet data payload found 20 bytes after the TCP/UDP header with 0xAA11.
This drop condition is a filter entry action evaluation, and not a filter entry match evaluation. Within
this evaluation, the condition is checked after the packet matches the entry based on the specified
filter entry match criteria.
Packets that match a filter policy's entry match criteria and the pattern, are dropped. Packets that
match only the filter policy's entry match criteria and do not match the pattern, are forwarded without
a further match in subsequent filter entries.
This filtering capability is supported on ingress IPv4 and IPv6 policies using FP4-based line cards,
and cannot be configured on egress. A filter entry using a pattern, is not supported on FP2 or FP3-
based line cards. If programmed, the pattern is ignored and the action is forward.
Packets matching this filter entry and not matching the conditional criteria are not logged, counted,
or mirrored.
• drop-extracted-traffic — Traffic extracted to the CPM can be dropped using ingress IPv4 and IPv6
filter policies based on filter match criteria. Any IP traffic extracted to the CPM is subject to this filter
action, including routing protocols, snooped traffic, and TTL expired traffic.
Packets that match the filter entry match criteria and extracted to the CPM are dropped. Packets that
match only the filter entry match criteria and are not extracted to the CPM are forwarded with no further
match in the subsequent filter entries.
Cflowd, log, mirror, and statistics apply to all traffic matching the filter entry, regardless of drop or
forward action.
• forward
Allows operators to accept traffic to ingress or egress the system and be subject to regular processing.
• forward-when
Allows operators to accept a conditional filter action.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Rate limit policers are configured with MBS equals CBS equals 10 ms of the rate and high-prio-only
equals 0.
Interaction with QoS: Packets matching an ingress rate-limit filter policy entry bypass ingress QoS
queuing or policing, and only the filter rate limit policer is applied. Packets matching an egress rate-limit
filter policy bypass egress QoS policing, normal egress QoS queuing still applies.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
This rate limit condition is a filter entry action evaluation, and not a filter entry match evaluation.
Within this evaluation, the condition is checked after the packet matches the entry based on the
specified filter entry match criteria.
Packets that match a filter policy's entry match criteria and the pattern, are rate limited. Packets that
match only the filter policy's entry match criteria and do not match the pattern, are forwarded without
a further match in subsequent filter entries.
This filtering capability is supported on ingress IPv4 and IPv6 policies using FP4-based line cards
and cannot be configured on egress. A filter entry using a pattern is not supported on FP2 or FP3-
based line cards. If programmed, the pattern is ignored and the action is forward.
Cflowd, logging, and mirroring apply to all traffic matching this filter entry regardless of the pattern
value.
– Extracted traffic conditional rate limit
Traffic extracted to the CPM can be rate limited using ingress IPv4 and IPv6 filter policies based on
filter match criteria. Any IP traffic extracted to the CPM is subject to this filter action, including routing
protocols, snooped traffic, and TTL expired traffic.
Packets that match the filter entry match criteria and are extracted to the CPM are rate limited by this
filter action and not subject to distributed CPU protection policing.
Packets that match only the filter entry match criteria and are not extracted to the CPM are
forwarded with no further match in the subsequent filter entries.
Cflowd, logging, and mirroring apply to all traffic matching the ACL entry regardless of the outcome
of the rate limit or the extracted conditional match.
• forward ‟Policy-based Routing/Forwarding (PBR/PBF) action”
Allows operators to allow ingress traffic but change the regular routing or forwarding that a packet would
be a subject to. The PBR/PBF is applicable to unicast traffic only. The following PBR or PBF actions are
supported (See CLI section for command details):
– egress-pbr
Enabling egress-pbr activates a PBR action on egress, while disabling egress-pbr activates a PBR
action on ingress (default).
The following subset of the PBR actions (defined as follows) can be activated on egress: redirect-
policy, next-hop router, and esi.
Egress PBR is supported in IPv4 and IPv6 filter policies for ESM only. Unicast traffic that is subject
to slow-path processing on ingress (for example, IPv4 packets with options or IPv6 packets with
hop-by-hop extension header) does not match egress PBR entries. Filter logging, cflowd, and mirror
source are mutually exclusive of configuring a filter entry with an egress PBR action. Configuring
pbr-down-action-override, if supported with a specific PBR ingress action type, is also supported
when the action is an egress PBR action. Processing defined by pbr-down-action-override does
not apply if the action is deployed in the wrong direction. If a packet matches a filter PBR entry and
the entry is not activated for the direction in which the filter is deployed, action forward is executed.
Egress PBR cannot be enabled in system filters.
– esi
Forwards the incoming traffic using VXLAN tunnel resolved using EVPN MP BGP control plane to
the first service chain function identified by ESI (Layer 2) or ESI/SF-IP (Layer 3). Supported with
VPLS (Layer 2) and IES/VPRN (Layer 3) services. If the service function forwarding cannot be
resolved, traffic matches an entry and action forward is executed.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
For VPLS, no cross-service PBF is supported; that is, the filter specifying ESI PBF entry must be
deployed in the VPLS service where BGP EVPN control plane resolution takes place as configured
for a specific ESI PBF action. The functionality is supported in filter policies deployed on ingress
VPLS interfaces. BUM traffic that matches a filter entry with ESI PBF is unicast forwarded to the
VTEP:VNI resolved through PBF forwarding.
For IES/VPRN, the outgoing R-VPLS interface can be in any VPRN service. The outgoing interface
and VPRN service for BGP EVPN control plane resolution must again be configured as part of ESI
PBR entry configuration. The functionality is supported in filter policies deployed on ingress IES/
VPRN interfaces and in filter policies deployed on ingress and egress for ESM subscribers. Only
unicast traffic is subject to ESI PBR; any other traffic matching a filter entry with Layer 3 ESI action is
subjected to action forward.
When deployed in unsupported direction, traffic matching a filter policy ESI PBR/PBF entry is subject
to action forward.
– lsp
Forwards the incoming traffic onto the specified LSP. Supports RSVP-TE LSPs (type static or
dynamic only), MPLS-TP LSPs, or SR-TE LSPs. Supported for ingress IPv4/IPv6 filter policies and
only deployed on IES SAPs or network interfaces. If the configured LSP is down, traffic matches the
entry and action forward is executed.
– mpls-policy
Redirects the incoming traffic to the active instance of the MPLS forwarding policy specified by
its endpoint. This policy is applicable on any ingress interface (egress is blocked). The traffic is
subject to a plain forward if no policy matches the one specified, or if the policy has no programmed
instance, or if it is applied on non-L3 interface.
– next-hop
Changes the IP destination address used in routing from the address in the packet to the address
configured in this PBR action. The operator can configure whether the next-hop IP address must
be direct (local subnet only) or indirect (any IP). This functionality is supported for ingress IPv4/IPv6
filter policies only, and is deployed on Layer 3 interfaces. If the configured next-hop is not reachable,
traffic is dropped and a ‟ICMP destination unreachable” message is sent. If the indirect keyword is
not specified but the IP address is a remote IP address, traffic is dropped.
interface
Forwards the incoming traffic onto the specified IPv4 interface. Supported for ingress IPv4 filter
policies in global routing table instance. If the configured interface is down or not of the supported
type, traffic is dropped.
– redirect-policy
Implements PBR next-hop or PBR next-hop router action with ability to select and prioritize multiple
redirect targets and monitor the specified redirect targets so PBR action can be changed if the
selected destination goes down. Supported for ingress IPv4 and IPv6 filter policies deployed on
Layer 3 interfaces only. See section Redirect policies for further details.
– remark dscp
Allows an operator to remark the DiffServ Code Points of packets matching filter policy entry criteria.
Packets are remarked regardless of QoS-based in-/out-of- profile classification and QoS-based
DSCP remarking is overridden. DSCP remarking is supported both as a main action and as an
extended action. As a main action, this functionality applies to IPv4 and IPv6 filter policies of any
scope and can only be applied at ingress on either access or network interfaces of Layer 3 services
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
only. Although the filter is applied on ingress the dscp remarking effectively performed on egress. As
an extended action, this functionality applies to IPv4 and IPv6 filter policies of any scope and can be
applied at ingress on either access or network interfaces of Layer 3 services, or at egress on Layer 3
subscriber interfaces.
– router
Changes the routing instance a packet is routed in from the upcoming interface’s instance to the
routing instance specified in the PBR action (supports both GRT and VPRN redirect). It is supported
for ingress IPv4/IPv6 filter policies deployed on Layer 3 interfaces. The action can be combined with
the next-hop action specifying direct/indirect IPv4/IPv6 next hop. Packets are dropped if they cannot
be routed in the configured routing instance. For further details, see section ‟Traffic Leaking to GRT”
in the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN.
– sap
Forwards the incoming traffic onto the specified VPLS SAP. Supported for ingress IPv4/IPv6 and
MAC filter policies deployed in VPLS service. The SAP that the traffic is to egress on must be in the
same VPLS service as the incoming interface. If the configured SAP is down, traffic is dropped.
– sdp
Forwards the incoming traffic onto the specified VPLS SDP. Supported for ingress IPv4/IPv6 and
MAC filter policies deployed in VPLS service. The SDP that the traffic is to egress on must be in the
same VPLS service as the incoming interface. If the configured SDP is down, traffic is dropped.
– srte-policy
Redirects the incoming traffic to the active instance of the SR-TE forwarding policy specified by
its endpoint and color. This policy is applicable on any ingress interface (egress is blocked). The
traffic is subject to a plain forward if no policy matches the one specified, or if the policy has no
programmed instance, or if it is applied on non-L3 interface.
– vprn-target
Redirects the incoming traffic in a similar manner to combined next-hop and LSP redirection actions,
but with greater control and slightly different behavior. This action is supported for both IPv4 and
IPv6 filter policies and is applicable on ingress of access interfaces of IES/VPRN services. See Filter
policy advanced topics for further details.
• forward ‟isa action”
ISA processing actions allow operator to allow ingress traffic and send it for ISA processing as per
specified ISA action. The following ISA actions are supported (see CLI section for command details):
– gtp-local-breakout
Forwards matching traffic to NAT instead of being GTP tunneled to the mobile operator’s PGW or
GGSN. The action applies to GTP-subscriber-hosts. If filter is deployed on other entities, action
forward is applied. Supported for IPv4 ingress filter policies only. If ISAs performing NAT are down,
traffic is dropped.
– nat
Forwards matching traffic for NAT. Supported for IPv4/IPv6 filter policies for Layer 3 services in GRT
or VPRN. If ISAs performing NAT are down, traffic is dropped. (see CLI for options).
– reassemble
Forwards matching packets to the reassembly function. Supported for IPv4 ingress filter policies
only. If ISAs performing reassemble are down, traffic is dropped.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
– tcp-mss-adjust
Forwards matching packets (TCP Syn) to an ISA BB group for MSS adjustment. In addition to the
IP filter, the operator also needs to configure the mss-adjust-group command under the Layer 3
service to specify the bb-group-id and the new segment-size.
• http-redirect
Implements the HTTP redirect captive portal. HTTP GET is forwarded to CPM card for captive portal
processing by router. See the HTTP redirect (captive portal) section for more information.
• ignore-match
This action allow the operator to disable a filter entry, as a result the entry is not programmed in
hardware.
In addition to the above actions:
• An operator can select a default-action for a filter policy. The default action is executed on packets
subjected to an active filter when none of the filter’s active entries matches the packet. By default, filter
policies have default action set to drop but operator can select a default action to be forward instead.
• An operator can override default action applied to packets matching a PBR/PBF entry when the PBR/
PBF target is down using pbr-down-action-override. Supported options are to drop the packet,
forward the packet, or apply the same action as configured for the filter policy's default-action. The
override is supported for the following PBR/PBF actions. For the last three actions, the override is
supported whether in redundancy mode or not.
– forward esi (Layer 2 or Layer 3)
– forward sap
– forward sdp
– forward next-hop [indirect] router
Table 9: Default behavior when a PBR/PBF target is down defines default behavior for packets
matching a PBR/PBF filter entry when a target is down.
forward redirect-policy Forward when destination tests are enabled and the
best destination is not reachable
forward redirect-policy Drop when destination tests are not enabled and the
best destination is not reachable
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
There are situations where, collectively, this information does not capture what effectively happens to
the packet throughout the system. The effective-action keyword of the show>filter>[{ip | ipv6 | mac}]
commands enables advanced checks to be performed and accurate packet fates to be displayed.
The criteria for determining when a target is down. While there is little ambiguity on that aspect when the
target is local to the system performing the steering action, ambiguity is much more prominent when the
target is distant. Therefore, because the use of effective-action triggers advanced tests, a discrepancy is
introduced compared to the action when effective-action keyword is not used. This is, for example, be the
case for redundant actions.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
• If source or destination address of the log messages does not match an entry already present in the
table, the source/destination address is stored in a free entry in the mini-table.
• In case the mini-table has no more free entries, only total counter is incremented.
• At expiry of the summarization interval, the mini-table for each type is flushed to the syslog destination.
Operational note:
Conditional action match criteria filter entries for ttl, hop-limit, packet-length, and payload-length support
logging and statistics when the condition is met, allowing visibility of filter matched and action executed. If
the condition is not met, packets are not logged and statistics against the entry are not incremented.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
4.1.2.1.1 Apply-Path
The router supports the auto-generation of IPv4 and IPv6 prefix list entries for BGP peers which are
configured in the Base router or in VPRN services using the match-list apply-path filter. This capability
simplifies the management of CPM filters to allow BGP control traffic from trusted configured peers only. By
using the match-list apply-path, filter the operator can:
• specify one or more regex expression matches per match list, including wildcard matches (".*")
• mix auto-generated entries with statically configured entries within a match list
Additional rules are applied when using apply-path as follows:
• Operational and administrative states of a specific router configuration are ignored when auto-
generating address prefixes.
• Duplicates are not removed when populated by different auto-generation matches and static
configuration.
• Configuration fails if auto-generation of an address prefix results in the filter policy resource exhaustion
on a filter entry, system, or line card level.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
4.1.2.1.2 Prefix-exclude
A prefix can be excluded from an IPv4 or IPv6 prefix list by using the prefix-exclude command.
For example, when the operator needs to rate-limit traffic to 10.0.0.0/16 with the exception of 10.0.2.0/24,
then the following options are available.
• By applying prefix-exclude, a single IP prefix list with two prefixes is configured:
• Without applying prefix-exclude, all eight included subnets should be manually configured in the ip-
prefix-list:
This is a time consuming, and error-prone task compared to using the prefix-exclude command.
The filter resources, consumed in hardware, are identical between the two configurations.
A filter match-list using prefix-exclude is mutually exclusive with apply-path, and is not supported as a
match criterion in cpm-filter.
Configured prefix-exclude prefixes are ignored when no overlapping larger subnet is configured in the
prefix-list. For example: prefix-exclude 1.1.1.1/24 is ignored if the only included subnet is 10.0.0.0/16.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
A filter policy of scope template can be re-used across multiple interfaces. This filter policy uses a single
set of resources per line card regardless of how many interfaces use it. Template filter policies used on
access interfaces consume resources on line cards where the access interfaces are configured only. A
filter policy of scope template is the most common type of filter policies configured in a router.
A filter policy of scope exclusive defines a filter dedicated to a single interface. An exclusive filter allows
the highest level of customization but uses the most resources on the system line cards as it cannot be
shared with other interfaces.
Embedded
To simplify the management of filters sharing a common set of filter entries, the operator can create a filter
policy of scope embedded. This filter can then be included in (embedded into) a filter of scope template,
exclusive or system.
Using filter scope embedded, a common set of filter entries can be updated in a single place and deployed
across multiple filter policies. The scope embedded is supported for IPv4 and IPv6 filter policies.
A filter policy of scope embedded is not directly downloaded to a line card and cannot be directly
referenced in an interface. However, this policy helps the network operator provision a common set of rules
across different filter policies.
The following rules apply when using filter policy of scope embedded:
• The operator explicitly defines the offset at which to insert a filter of scope embedded in a template,
exclusive or system filter. The embedded filter entry-id X becomes entry-id (X + offset) in the main filter.
• Multiple filter policies of scope embedded can be included (embedded into) in a single filter policy of
scope template, exclusive or system.
• The same filter policy of scope embedded can be included in multiple filter policies of scope template,
exclusive or system.
• Configuration modifications to embedded filter policy entries are automatically applied to all filter policies
that embed this filter.
• The system performs a resource management check when a filter policy of scope embedded is updated
or embedded in a new filter. If resources are not available, the configuration is rejected. In rare cases,
a filter policy resource check may pass but the filter policy can still fail to load because of a resource
exhaustion on a line card (for example, when other filter policy entries are dynamically configured
by applications like RADIUS in parallel). If that is the case, the embedded filter policy configured is
deactivated (configuration is changed from activate to inactivate).
• An embedded filter is never embedded partially in a single filter and resources must exist to embed
all the entries in a specific exclusive, template or system filter. However, an embedded filter may be
embedded only in a subset of all the filters it is referenced into, only those where there are sufficient
resources available.
• Overlapping of filter entries between an embedded filter and a filter of scope template, exclusive or
system filter can happen but should be avoided. It is recommended instead that network operators
use a large enough offset value and an appropriate filter entry-id in the main filter policy to avoid
overlapping. In case of overlapping entries, the main filter policy entry overwrites the embedded filter
entry.
• Configuring a default action in a filter of scope embedded is not required as this information is not used
to embed filter entries.
Figure 22: Embedded Filter Policy shows a configuration with two filter policies of scope template, filter 100
and 200 each embed filter policy 10 at a different offset:
• Filter policy 100 and 200 are of scope template.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
• Filter policy 10 of scope embedded is configured with 4 filter entries: entry-id 10, 20, 30, 40.
• Filter policy 100 embed filter 10 at offset 0 and includes two additional static entries with entry-id 20010
and 20020.
• Filter policy 200 embed filter 10 at offset 10000 and includes two additional static entries with entry-id
100 and 110.
• As a result, filter 100 automatically creates entry 10, 20, 30, 40 while filter 200 automatically creates
entry 10010, 10020, 10030, 10040. Filter policy 100 and 200 consumed in total 12 entries when both
policies are installed in the same line card.
*A:7750>config>filter# info
----------------------------------------------
ip-filter 10 name "10" create
scope embedded
entry 10 create
... ...
exit
entry 20 create
... ...
exit
entry 30 create
... ...
exit
entry 40 create
... ...
exit
exit
ip-filter 100 name "100" create
scope template
embed-filter 10
entry 20010 create
... ...
exit
entry 20020 create
... ...
exit
exit
ip-filter 200 name "200" create
scope template
embed-filter 10 offset 10000
entry 100 create
... ...
exit
entry 110 create
... ...
exit
exit
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
System
The filter policy of scope system provides the most optimized use of hardware resources by programming
filter entries after the line cards regardless of how many IPv4 or IPv6 filter policies of scope template or
exclusive use this filter. The system filter policy entries are not duplicated inside each policy that uses it,
instead, template or exclusive filter policies can be chained to the system filter using the chain-to-system-
filter command.
When a template of exclusive filter policy is chained to the system filter, system filter rules are evaluated
first before any rules of the chaining filter are evaluated (that is chaining filter's rules are only matched
against if no system filter match took place).
The system filter policy is intended primarily to deploy a common set of system-level deny rules and
infrastructure-level filtering rules to allow, block, or rate limit traffic. Other actions like, for example, PBR
actions, or redirect to ISAs should not be used unless the system filter policy is activated only in filters
used by services that support such action. The ‟nat” action is not supported and should not be configured.
Failure to observe these restrictions can lead to unwanted behavior as system filter actions are not verified
against the services the chaining filters are deployed for. System filter policy entries also cannot be the
sources of mirroring.
System filter policies can be populated using CLI, SNMP, Netconf, Openflow and Flowspec. System filter
policy entries cannot be populated using RADIUS or Gx.
An example for IPv4 system filter configuration is shown as follows:
• System filter policy 10 includes a single entry to rate limit NTP traffic to the Infrastructure subnets.
• Filter policy 100 of scope template is configured to use the system filter using the chain-to-system-
filter command.
*7750>config>filter# info
----------------------------------------------
ip-filter 10 name "10" create
scope system
entry 10 create
description "Rate Limit NTP to the Infrastructure"
match protocol udp
dst-ip ip-prefix-list "Infrastructure IPs"
dst-port eq 123
exit
action
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
rate-limit 2000
exit
exit
exit
ip-filter 100 name "100" create
chain-to-system-filter
description "Filter scope template for network interfaces"
exit
system-filter
ip 10
exit
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Match criteria available using FP4-based cards and ingress filter policies; if configured on FP2 or FP3-
based cards, the ttl or hop-limit match criteria part of the filter entries are not programmed in the line
card.
The following match criteria are not available for filter entries in a filter policy of type packet-length:
• IPv4
dscp, ip-option, option-present, multiple-option, src-route-option
• IPv6
flow-label
For a QoS policy assigned to the same service or interface endpoint on egress as a filter policy of type
packet-length, QoS IP criteria cannot use dscp match criteria with no restriction to ingress.
This filter type is available for both ingress and egress on all service and router interfaces endpoints with
the exception of video ISA, service templates, and PW templates.
Dynamic filter entry embedding using Openflow and VSD is not supported using this filter type.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
A:7750>config>router#
----------------------------------------------
flowspec
ip-filter-max-size 50000
exit
----------------------------------------------
A:7750>config>filter# info
----------------------------------------------
ip-filter 100 name "100" create
embed-filter flowspec router "Base" offset 100000
exit
----------------------------------------------
OpenFlow
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
The embedded filter infrastructure is used to insert OpenFlow rules into an existing filter policy. See Hybrid
OpenFlow switch for more details. Policy-controlled auto-created filters are re-created on system reboot.
Policy controlled filter entries are lost on system reboot and need to be re-programmed.
VSD
VSD filters are created dynamically using XMPP and managed using a Python script so rules can be
inserted into or removed from the correct VSD template or embedded filters. XMPP messages received
by the 7750 SR are passed transparently to the Python module to generate the appropriate CLI. For more
information about VSD filter provisioning, automation, and Python scripting details see the 7450 ESS,
7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN Guide: VLL, VPLS, PBB, and EVPN.
RADIUS/Diameter for Subscriber Management
The operator can assign filter policies or filter entries used by a subscriber within a preconfigured filter
entry range defined for RADIUS or Diameter. See the 7450 ESS, 7750 SR, and VSR Triple Play Service
Delivery Architecture Guide and filter RADIUS-related commands for more details.
4.1.2.5 Primary and secondary filter policy action for PBR/PBF redundancy
In some deployments, operators may want to specify a backup PBR/PBF target if the primary target
is down. SR OS allows the configuration of a primary action (config>filter>{ip-filter | ipv6-filter
| mac-filter}>entry>action) and a secondary action (config>filter>{ip-filter | ipv6-filter | mac-
filter}>entry>action secondary) as part of a single filter policy entry. The secondary action can only be
configured if the primary action is configured.
For Layer 2 PBF redundancy, the operator can configure the following redundancy options:
• action forward sap and action secondary forward sap
• action forward sdp and action secondary forward sdp
• action forward sap and action secondary forward sdp
• action forward sdp and action secondary forward sap
For Layer 3 PBR redundancy, an operator can configure any of the following actions as a primary action
and any (either same or different than primary) of the following as a secondary action. Furthermore, none
of the parameters need to be the same between primary and secondary actions. Although the following
commands pertain to IPv4 in the ip-address parameter, they also apply to IPv6.
• forward next-hop ip-address router router-instance
• forward next-hop ip-address router service-name service-name
• forward next-hop indirect ip-address router router-instance
• forward next-hop indirect ip-address router service-name service-name
• forward vprn-target bgp-nh ip-address router service-name service-name [adv-prefix ip-
address/mask] [lsp lsp-name]
When primary and secondary actions are configured, PBR/PBF uses the primary action if its target is
operationally up, or it uses the secondary action if the primary PBR/PBF target is operationally down. If
both targets are down, the default action when the target is down (see Table 9: Default behavior when
a PBR/PBF target is down), as per the primary action, is used, unless pbr-down-action-override is
configured.
When PBR/PBF redundancy is configured, the operator can use sticky destination functionality for a
redundant filter entry. When sticky destination is configured (config>filter>{ip-filter | ipv6-filter | mac-
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
filter}>entry>sticky-dest), the functionality mimics that of sticky destination configured for redirect
policies. To force a switchover from the secondary to the primary action when sticky destination is enabled
and secondary action is selected, the operator can use the tools>perform>filter>{ip-filter | ipv6-filter
| mac-filter}>entry>activate-primary-action command. Sticky destination can be configured even if no
secondary action is configured.
The control plane monitors whether primary and secondary actions can be performed and programs
forwarding filter policy to use either the primary or secondary action as required. More generally, the state
of PBR/PBF targets is monitored in the following situations:
• when a secondary action is configured
• when sticky destination is configured
• when a pbr-down-action-override is configured
The show>filter>{ip-filter | ipv6-filter | mac-filter} [entry] command displays which redundant action is
activated or downloaded, including when both PBR/PBF targets are down. The following example shows
partial output of the command as applicable for PBF redundancy.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Note:
While the system only performs the redirection when the traffic is effectively able to reach the
target BGP next-hop, it does not verify whether the redirected packets effectively reach their
destination after that.
This action is resilient in that it tracks events affecting the redirection at the service level and reacts to
those events. The system performs the redirection as long as it can reach the target BGP next-hop using
the correct service label. If the redirection cannot be performed (for example, if no LSP is available, the
peer is down, or there is no more specific labeled route), the system reverts to normal forwarding. This can
be overridden and configured to drop. A maximum of 8k of unique (3-tuple {bgp-nh, router, adv-prefix})
redirection targets can be tracked.
When enabled, all unicast packets have their destination MAC rewritten to operator-configured value on an
Layer 2 switch VPLS SAP. Multicast and broadcast packets are unaffected. The feature:
• Is supported for regular and split-horizon group Ethernet SAPs in a regular VPLS Service
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
• Is expected to be deployed on a SAP that faces far-end IP interface (either a SAP that is the target of
PBF action, as shown in Figure 23: Layer 2 policy-based forwarding (PBF) redirect action, or a VPLS
SAP of a downstream Layer 2 switch that is connected to a far-end router—not shown).
• Applies to any unicast egress traffic including LI and mirror.
Restrictions:
Mutually exclusive with SAP MAC ingress and egress loopback feature: tools perform service id service-
id loopback eth sap sap-id {ingress | egress} mac-swap ieee-address
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
VID filters are available on Ethernet SAPs for Epipe, VPLS, or I-VPLS including eth-tunnel and eth-ring
services.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Figure 25: Port groups shows a customer use example where some VLANs are prevented from ingressing
or egressing specific ports. In the example, port A sap 1/1/1:1.* would have a filter as shown below while
port A sap 1/1/1:2.* would not.:
mac-filter 4 create
default-action forward
type vid
entry 1 create
match frame-type ethernet_II
outer-tag 30 4095
exit
action drop
exit
exit
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Note:
The unicast-rt-test command fails when performed in the context of a VPRN routing instance
when the destination is routable only through grt-leak functionality. ping-test is recommended in
these cases.
Feature restrictions:
• Redirect policy is supported for ingress IPv4 and IPv6 filter policies only.
• Different platforms support different scale for redirect policies. Contact your local Nokia representative
to ensure the planned deployment does not exceed recommended scale.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
multiple tests, or destinations of redirect policies which are administratively down. However, some specific
scenarios exist when binding redirect policies:
• A destination that is in the Administratively down state is considered DOWN (that is, as if its test result
was negative, even if no test had been performed).
• An Administratively down redirect policy is equivalent to a policy with all destinations in an
Administratively down state. The system performs a simple forward.
• A destination with no test is considered always UP.
• If a destination has multiple tests, all tests must be positive for the destination to be considered UP
(logical AND between its own tests results).
• Destination tests are performed even if a redirect policy has not been applied (that is, not declared as
an action of a filter which itself has been applied).
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
common open DNS servers provide the most security, allowing, alternatively, UDP -port 53 alone is
another option.
• entry 20: Allows HTTP TCP port 80 traffic to the portal landing page defined as a prefix-list. The TCP
port directionality indicates an HTTP request. Optionally, the operator can create an additional entry to
allow TCP port 443 in case the landing page uses both HTTP and HTTPS.
• entry 30: Redirects all TCP port 80 traffic, other than entry 20, to the landing page URL http://
www.mydomain/com/redirect.html?subscriber=$SUB&ipaddress=$IP&mac=$MAC&location=$SAP .
• entry 40: Drops explicitly any other IP flows, as in the following configuration example:
Also, the router supports two redirect scale modes that are configurable at the system level. The
optimized-mode improves the number of HTTP redirect sessions supported by system as compared to
the no optimized-mode, as follows:
A>config>system>cpm-http-redirect#
----------------------------------------------
optimized-mode
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
VAS services/tiers of service are needed. Often the only way to identify a subscriber’s traffic with a specific
tier-of-service is to preallocate IP/IPv6 address pools to a specific service tier and use those addresses in
VAS PBR match criteria. This creates an application-services to network infrastructure dependency that
can be hard to overcome, especially if fast and flexible application service delivery is needed.
Filter policy-based ESM service chaining removes ESM VAS steering to network infrastructure inter-
dependency. An operator can configure per tier of service or per individual VAS service upstream and
downstream service chaining rules without a need to define subscriber or tier-of-service match conditions.
Figure 27: ACL filter modeling for ESM service chaining shows a possible ACL model (embedded filters
are used for VAS service chaining rules).
On the left in Figure 27: ACL filter modeling for ESM service chaining, the per-tier-of-service ACL model
is depicted. Each tier of service (Gold or Silver) has a dedicated embedded VAS filter (‟Gold VAS”, ‟Silver
VAS”) that contains all steering rules for all service chains applicable to the specific tier. Each VAS filter is
then embedded by the ACL filter used by a specific tier. A subscriber is subject to VAS service chain rules
based on the per-tier ACL assigned to that subscriber (for example, via RADIUS). If a new VAS rule needs
to be added, an operator must program that rule in all applicable tiers. Upstream and downstream rules
can be configured in a single filter (as shown) or can use dedicated ingress and egress filters.
On the right in Figure 27: ACL filter modeling for ESM service chaining, the per-VAS-service ACL model is
depicted. Each VAS has a dedicated embedded filter (‟VAS 1”, ‟VAS 2”, ‟VAS 3”) that contains all steering
rules for all service chains applicable to that VAS service. A tier of service is then created by embedding
multiple VAS-specific filters: Gold: VAS 1, VAS 2, VAS 3; Silver: VAS 1 and VAS 3. A subscriber is subject
to VAS service chain rules based on the per-tier ACL assigned to that subscriber. If a new VAS rule needs
to be added, an operator needs to program that rule in a single VAS-specific filter only. Again, upstream
and downstream rules can be configured in a single filter (as shown) or can use dedicated ingress and
egress filters.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Figure 28: Upstream ESM ACL policy-based service chaining shows upstream VAS service chaining
steering using filter policies. Upstream subscriber traffic entering Res-GW is subject to the subscriber's
ingress ACL filter assigned to that subscriber by a policy server. If the ACL contains VAS steering rules, the
VAS-rule-matching subscriber traffic is steered for VAS processing over a dedicated to-from-access VAS
interface in the same or a different routing instance. After the VAS processing, the upstream traffic can be
returned to Res-GW by a to-from-network interface (shown in Figure 28: Upstream ESM ACL policy-based
service chaining) or can be injected to WAN to be routed toward the final destination (not shown).
Figure 29: Downstream ESM ACL-policy based service chaining shows downstream VAS service chaining
steering using filter policies. Downstream subscriber traffic entering Res-GW is forwarded to a subscriber-
facing line card. On that card, the traffic is subject to the subscriber's egress ACL filter policy processing
assigned to that subscriber by a policy server. If the ACL contains VAS steering rules, the VAS rule-
matching subscriber's traffic is steered for VAS processing over a dedicated to-from-network VAS interface
(in the same or a different routing instance). After the VAS processing, the downstream traffic must be
returned to Res-GW via a ‟to-from-network” interface (shown in Figure 29: Downstream ESM ACL-policy
based service chaining) to ensure the traffic is not redirected to VAS again when the subscriber-facing line
card processes that traffic.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Ensuring the correct settings for the VAS interface type, for upstream and downstream traffic redirected
to a VAS and returned after VAS processing, is critical for achieving loop-free network connectivity
for VAS services. The available configuration options (config>service>vprn>if>vas-if-type,
config>service>ies>if>vas-if-type and config>router>if>vas-if-type) are described below:
• deployments that use two separate interfaces for VAS connectivity (recommended, and required if local
subscriber-to-subscriber VAS traffic support is required)
– to-from-access
• upstream traffic arriving from subscribers over access interfaces must be redirected to a VAS
PBR target reachable over this interface for upstream VAS processing
• downstream traffic destined for subscribers after VAS processing must arrive on this interface, so
that the traffic is subject to regular routing but is not subject to Application Assurance diversion,
nor to egress subscriber PBR
• the interface must not be used for downstream pre-VAS traffic; otherwise, routing loops occur
– to-from-network
• downstream traffic destined for subscribers arriving from network interfaces must be redirected to
a VAS PBR target reachable over this interface for downstream VAS processing
• upstream traffic after VAS processing, if returned to the router, must arrive on this interface so
that regular routing can be applied
• deployments that use a single interface for VAS connectivity (optional, no local subscriber-to-subscriber
VAS traffic support)
to-from-both
– both upstream traffic arriving from access interfaces and downstream traffic arriving from the
network are redirected to a PBR target reachable over this interface for upstream/downstream VAS
processing
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
– after VAS processing, traffic must arrive on this interface (optional for upstream), so that the traffic is
subject to regular routing but is not subject to AA diversion, nor to egress subscriber PBR
– the interface must be used for downstream pre-VAS traffic, otherwise, routing loops occur
The ESM filter policy-based service chaining allows operators to do the following:
• Steer upstream and downstream traffic per-subscriber with full ACL-flow-defined granularity without the
need to specify match conditions that identify subscriber or tier-of-service
• Steer both upstream and downstream traffic on a single Res-GW
• Flexibly assign subscribers to tier-of-service by changing the ACL filter policy a specific subscriber uses
• Flexibly add new services to a subscriber or tier-of-service by adding the subscriber-independent filter
rules required to achieve steering
• Achieve isolation of VAS steering from other ACL functions like security through the use of embedded
filters
• Deploy integrated Application Assurance (AA) as part of a VAS service chain—both upstream and
downstream traffic is processed by AA before a VAS redirect
• Select whether to use IP-Src/IP-Dst address hash or IP-Src/IP-Dst address plus TCP/UDP port hash
when LAG/ECMP connectivity to DC is used. Layer 4 inputs are not used in hash with IPv6 packets with
extension headers present.
ESM filter policy-based traffic steering supports the following:
• IPv4 and IPv6 steering of unicast traffic using IPv4 and IPv6 ACLs
• action forward redirect-policy or action forward next-hop router for IP steering with TCAM-based
load-balancing, -to-wire, and sticky destination
• action forward esi sf-ip vas-interface router for an integrated service chaining solution
Operational notes:
• Downstream traffic steered toward a VAS on the subscriber-facing IOM is reclassified (FC and profile)
based on the subscriber egress QoS policy, and is queued toward the VAS based on the network
egress QoS configuration. Packets sent toward VAS do not have DSCP remarked (because they are
not yet forwarded to a subscriber). DSCP remarking based on subscriber's egress QoS profile only
applies to traffic ultimately forwarded to the subscriber (after VAS or not subject to VAS).
• If mirroring of subscriber traffic is configured using ACL entry/subscriber/SAP/port mirror, the mirroring
applies to traffic ultimately forwarded to subscriber (after VAS or not subject to VAS). Traffic that is being
redirected to VAS cannot be mirrored using an ACL filter implementing PBR action (the same egress
ACL filter entry being a mirror source and specifying egress PBR action is not supported).
• Use dedicated ingress and egress filter policies to prevent accidental match of an ingress PBR entry
on egress, and the other way around, that results in forwarding or dropping of traffic matching the entry
(based on the filter's default action configuration).
Restrictions:
• This feature is not supported with HSMDAs on subscriber ingress.
• This feature is not supported when the traffic is subject to non-AA ISA on Res-GW.
• Traffic that matches an egress filter entry with an egress PBR action cannot be mirrored, cannot be
sampled using cflowd, and cannot be logged using filter logging while being redirected to VAS on a sub-
facing line card.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
• This feature is not supported with LAC/LNS ESM (PPPoE subscriber traffic encapsulated into or de-
encapsulated from L2TP tunnels).
• This feature is not supported for system filter policies.
*A:ALA-48>config>service# info
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
...
vpls 10 customer 1 create
service-mtu 1400
split-horizon-group "dpi" residential-group create
exit
split-horizon-group "split" create
exit
stp
shutdown
exit
sap 1/1/21:1 split-horizon-group "split" create
disable-learning
static-mac 00:00:00:31:11:01 create
exit
sap 1/1/22:1 split-horizon-group "dpi" create
disable-learning
static-mac 00:00:00:31:12:01 create
exit
sap 1/1/23:5 create
static-mac 00:00:00:31:13:05 create
exit
no shutdown
exit
...
----------------------------------------------
*A:ALA-48>config>service#
*A:ALA-48>config>filter# info
----------------------------------------------
...
mac-filter 100 create
default-action forward
entry 10 create
match
dot1p 7 7
exit
log 101
action forward sap 1/1/22:1
exit
exit
...
----------------------------------------------
*A:ALA-48>config>filter#
The following displays the MAC filter added to the VPLS service configuration:
*A:ALA-48>config>service# info
----------------------------------------------
...
vpls 10 customer 1 create
service-mtu 1400
split-horizon-group "dpi" residential-group create
exit
split-horizon-group "split" create
exit
stp
shutdown
exit
sap 1/1/5:5 split-horizon-group "split" create
ingress
filter mac 100
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
exit
static-mac 00:00:00:31:15:05 create
exit
sap 1/1/21:1 split-horizon-group "split" create
disable-learning
static-mac 00:00:00:31:11:01 create
exit
sap 1/1/22:1 split-horizon-group "dpi" create
disable-learning
static-mac 00:00:00:31:12:01 create
exit
sap 1/1/23:5 create
static-mac 00:00:00:31:13:05 create
exit
spoke-sdp 3:5 create
exit
no shutdown
exit
....
----------------------------------------------
*A:ALA-48>config>service#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Note:
The filter resource management task on the CPM controls the maximum number of filter entries
per FP. If the operator attempts to go over the scaling limit, the system returns an interactive error
message. This mechanism is independent from the overload state of the FP CAM.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
A:ALA-7>config>filter>ip-filter# info
----------------------------------------------
description "filter-main"
scope exclusive
entry 10 create
description "no-91"
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
----------------------------------------------
A:ALA-7>config>filter>ip-filter#
A:ALA-7>config>filter>ip-filter# info
----------------------------------------------
description "filter-main"
scope exclusive
entry 10 create
description "no-91"
filter-sample
interface-disable-sample
match
exit
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Within a filter entry, you can also specify that traffic matching the associated IPv4 filter entry is not sampled
by cflowd if the IPv4 interface is set to cflowd interface mode. The following displays an IPv4 filter entry
configuration example:
A:ALA-7>config>filter>ip-filter# info
----------------------------------------------
description "filter-main"
scope exclusive
entry 10 create
description "no-91"
no filter-sample
no interface-disable-sample
match
exit
action forward redirect-policy redirect1
exit
----------------------------------------------
A:ALA-7>config>filter>ip-filter#
A:ALA-7>config>filter# info
----------------------------------------------
...
mac-filter 90 create
description "filter-west"
scope exclusive
type normal
exit
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
----------------------------------------------
A:ALA-7>config>filter#
A;ALA-7>config>filter# info
----------------------------------------------
mac-filter 90 create
description "filter-wan-man"
scope template
type isid
entry 1 create
description "drop-local-isids"
match
isid 100 to 1000
exit
action drop
exit
entry 2 create
description "allow-wan-isids"
match
isid 150
exit
action forward
exit
A:TOP_NODE>config>filter>mac-filter# info
----------------------------------------------
default-action forward
type vic
entry 1 create
match frame-type ethernet_II
outer-tag 85 4095
exit
action drop
exit
entry 2 create
match frame-type ethernet_II
outer-tag 43 4095
exit
action drop
exit
----------------------------------------------
A:TOP_NODE>config>filter>mac-filter#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
A:sim1>config>filter# info
----------------------------------------------
mac-filter 90 create
entry 1 create
description "allow-104"
match
exit
action drop
exit
exit
----------------------------------------------
A:sim1>config>filter#
A:domain1>config>filter# info
----------------------------------------------
...
ip-exception 1 create
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
description "IP-exception"
scope template
exit
...
----------------------------------------------
A:domain1>config>filter#
A:domain1>config>filter>ip-exception# info
----------------------------------------------
description "exception-main"
scope exclusive
entry 1
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.10/32
exit
exit
----------------------------------------------
A:domain1>config>filter>ip-except#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
Note:
In the ipv6-exception command, exception-id is equivalent to the ip-exception variable filter-id.
The following example displays a template IPv6 exception filter policy configuration.
A:domain1>config>filter# info
----------------------------------------------
...
ipv6-exception 1 create
description "IPv6-exception"
exit
...
----------------------------------------------
A:domain1>config>filter#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
- icmp-type icmp-type
- src-ip {ipv6-address/prefix-length | ipv6-address | ipv6-prefix-list prefix-
list-name}
- src-port {lt | gt | eq} src-port-number
- src-port range src-port-number src-port-number
A:domain1>config>filter>ipv6-exception# info
----------------------------------------------
description "exception-main"
entry 1
match
dst-ip 2001:db8::1/128
src-ip 2001:db8::2/128
exit
exit
----------------------------------------------
A:domain1>config>filter>ipv6-except#
*A:ala-48>config>filter# info
----------------------------------------------
match-list
ip-prefix-list "IPv4-Deny-List"
description "IPv4 deny-list"
prefix 10.0.0.0/21
prefix 10.254.0.0/24
exit
exit
ip-filter 10 name "ip-edge-filter"
scope template
entry 10
match
src-ip ip-prefix-list IPv4-Deny-List
exit
action drop
exit
exit
---------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
spoke SDP —
spoke SDP —
VPLS mesh SDP, spoke SDP, SAP VPLS mesh SDP, spoke SDP, SAP
Network interface —
A:ALA-48>config>service>epipe# info
----------------------------------------------
sap 1/1/1.1.1 create
ingress
filter ip 10
exit
egress
filter mac 92
exit
exit
spoke-sdp 8:8 create
ingress
filter ip ‟epipe sap default filter”
exit
egress
filter mac 91
exit
exit
no shutdown
----------------------------------------------
A:ALA-48>config>service>epipe#
The following output displays an IPv6 filters assigned to an IES service interface:
A:ALA-48>config>service>ies# info
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
A:ALA-48>config>router# info
#------------------------------------------
# IP Configuration
#------------------------------------------
...
interface "to-104"
address 10.0.0.103/24
port 1/1/1
ingress
filter ip 10
exit
egress
filter ip ‟default network egress policy”
exit
exit
...
#------------------------------------------
A:ALA-48>config>router#
The following displays IPv4 and IPv6 filters applied to an interface at ingress and egress.
A:config>router>if# info
----------------------------------------------
port 1/1/1
ipv6
address 3FFE::101:101/120
exit
ingress
filter ip 2
filter ipv6 1
exit
egress
filter ip 2
filter ipv6 1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
exit
----------------------------------------------
A:config>router>if#
A:ALA-7>config>filter# info
----------------------------------------------
redirect-policy "redirect1" create
destination 10.10.10.104 create
priority 105
exit
no shutdown
exit
destination 10.10.10.105 create
priority 95
ping-test
timeout 30
drop-count 5
exit
no shutdown
exit
destination 10.10.10.106 create
priority 90
exit
no shutdown
exit
...
----------------------------------------------
A:ALA-7>config>filter#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
• The source address can be configured to any value and is not validated against a local IP address on
the local router.
• The optional gre-key field can be populated with the ifIndex of the ingress interface on which the
matching IP packet was received.
• An optional template parameter, skip-ttl-decrement, allows the TTL of the encapsulated IP packet to
be not decremented when encapsulated into the GRE header.
The following is an example configuration:
*A:Nokia-C>config>filter>ip-filter$ default-action
gre-tunnel-template "test" create
description "10.20.1.5"
ipv4
source-address 10.20.1.3
destination-address 9.9.9.9
destination-address 10.20.1.5
destination-address 13.13.13.13
exit
exit
ip-filter 1 name "1" create
entry 1 create
action
exit
pbr-down-action-override forward
exit
entry 2 create
action
forward gre-tunnel "test"
exit
exit
exit
- config>filter>ip-filter# renum 10 15
- config>filter>ip-filter# renum 20 10
- config>filter>ip-filter# renum 40 1
The following displays the original filter entry order, followed by the reordered filter entries:
A:ALA-7>config>filter# info
----------------------------------------------
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
...
ip-filter 11 create
description "filter-main"
scope exclusive
entry 10 create
description "no-91"
filter-sample
interface-disable-sample
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.103/24
exit
action forward redirect-policy redirect1
exit
entry 20 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
entry 30 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.200/24
exit
action forward
exit
entry 40 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
exit
...
----------------------------------------------
A:ALA-7>config>filter#
A:ALA-7>config>filter# info
----------------------------------------------
...
ip-filter 11 create
description "filter-main"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 10 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
entry 15 create
description "no-91"
filter-sample
interface-disable-sample
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.103/24
exit
action forward redirect-policy
redirect1
exit
entry 30 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.200/24
exit
action forward
exit
exit
...
----------------------------------------------
A:ALA-7>config>filter#
A:ALA-7>config>filter# info
----------------------------------------------
...
ip-filter 11 create
description "New IP filter info"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 2 create
description "new entry"
match
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
dst-ip 10.10.10.104/32
exit
action drop
exit
entry 10 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.100/24
exit
action drop
exit
entry 15 create
description "no-91"
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.103/24
exit
action forward
exit
entry 30 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.0.200/24
exit
action forward
exit
exit
..
----------------------------------------------
A:ALA-7>config>filter#
- config>service# epipe 5
- config>service>epipe# sap 1/1/2:3
- config>service>epipe>sap# ingress
- config>service>epipe>sap>ingress# no filter
After you have removed the filter from the SAPs network interfaces, you can delete the filter as shown in
the following example.
- config>filter# no ip-filter 11
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
A:ALA-7>config>filter# info
----------------------------------------------
...
redirect-policy "redirect1" create
description "New redirect info"
destination 10.10.10.104 create
priority 105
ping-test
timeout 20
drop-count 7
exit
no shutdown
exit
destination 10.10.10.105 create
priority 95
ping-test
timeout 30
drop-count 5
exit
no shutdown
exit
no shutdown
exit
...
----------------------------------------------
A:ALA-7>config>filter#
A:ALA-7>config>filter>ip-filter# info
----------------------------------------------
description "This is new"
scope exclusive
entry 1 create
filter-sample
interface-disable-sample
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action forward redirect-policy redirect2
exit
entry 2 create
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Filter policies
22.5.R1
A:ALA-7>config>filter# info
----------------------------------------------
...
ip-filter 11 create
description "This is new"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 2 create
...
ip-filter 12 create
description "This is new"
scope exclusive
entry 1 create
match
dst-ip 10.10.10.91/24
src-ip 10.10.10.106/24
exit
action drop
exit
entry 2 create
...
----------------------------------------------
A:ALA-7>config>filter#
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
rule can be assigned for packets that do not match specific rules. These packets can be dropped,
forwarded, or sent to the OpenFlow controller.
To enable rules in an H-OFS on an existing service router interface, an operator must:
1. Create one or more ingress line card policies.
2. Assign those line card ingress filter policies to the 7450 ESS, 7750 SR, 7950 XRS, and VSR service
router interfaces.
3. Embed an H-OFS instance into those line card policies.
4. Program OF rules as required.
OpenFlow can be embedded in IPv4/IPv6 ACL filter policies deployed on:
• Layer 3 IES service interfaces
• Layer 3 network interfaces in base router context
• Layer 3 VPRN service interfaces, including those with NAT
• Layer 2 VPLS service interfaces
• IES/VPRN r-VPLS service interfaces, including those with NAT
• System ACL filters
OpenFlow functionality can be enabled with no effect on forwarding performance. Operators can move
from CLI/SNMP programmed steering rules to OpenFlow operational model in service without service
disruption.
The control channel is routed via the GRT, meaning that the controller must be reachable via GRT, or
it may be routed via a VPRN. VPRN support requires that a loopback interface corresponding to each
OpenFlow switch, reachable via the VPRN, is configured in the VPRN. Then, the VPRN service ID or name
and the corresponding OpenFlow control channel loopback address are specified in the OpenFlow switch
control channel configuration.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
Table 11: Multi-service mode — higher-order bit flow table cookie encoding
sros-cookie Name sros-cookie Type sros-cookie Value FlowTable Entry Interpretation Based
(Bits 63...60) (Bits 59...32) on the sros-cookie
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
sros-cookie Name sros-cookie Type sros-cookie Value FlowTable Entry Interpretation Based
(Bits 63...60) (Bits 59...32) on the sros-cookie
To enable multi-service mode of operation, an operator must embed the OF switch in an ACL filter policy,
and, because multi-service H-OFS supports a mix of VPRN/VPLS/GRT/System rules, an additional scope
of embedding must be selected (embed open-flow service, embed open-flow system - grt scope used
by default). After embedding H-OFS instance, an ACL policy contains rules specific to a VPRN or VPLS
service instance or to a GRT or to a System Filter Policy. Therefore, the ACL filter policy can only be used
in the scope defined by H-OFS embedding.
Rules programmed by an OF controller with grt, system, and service cookies specified are accepted even
if the H-OFS instance is not embedded by a filter activated in a specific context. Rules programmed by an
OF controller with a service cookie specified, when the service ID is not one of the supported service types,
or when the service with the specified ID does not exist, are rejected with an error returned back to the
controller. If an H-OFS is embedded into a line card policy with a specific service context, the embedding
must be removed before that service is deleted.
Table 12: Differences between GRT mode and multi-service mode summarizes the main differences
between the two modes of operation.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
Restrictions:
• See the SR OS R22.x.Rx Software Release Notes for a full list of GRT/IES/VPRN/VPLS interfaces that
support OF control for multi-service mode.
• The 7450 ESS, 7750 SR, 7950 XRS, and VSR H-OFS always requires an sros-cookie to be provided
for FlowTable operations and fails any operation without the cookie when the switch-defined-cookie
command is enabled.
• OF no-match-action is not programmed in hardware for system filters, because system filters are
chained to other filter policies and no-match-action would break the chaining.
• An H-OFS instance does not support overlapping of priorities (flow_priority value) within a single sros-
cookie (type plus value). The supported values for priority differ based on a value for switch-define-
cookie:
– H-OFS with the switch-defined-cookie command disabled
• Valid flow_priority_range 1 to max-size – 1
• flow_priority_value 0 is reserved (no match action)
– H-OFS with the switch-defined-cookie command enabled
• Valid flow_priority_range 1 to 65534
• flow_priority_value 0 is reserved (no match action)
• flow_priority must map to a valid filter ID. The following items show how flow_priority is mapped to a
filter policy entry ID:
– H-OFS with switch-define-cookie disabled
filter entry ID = max-size – flow_priority + embedding offset
– H-OFS with switch-define-cookie enabled
filter entry ID = 65535 – flow_priority + embedding offset
• When multiple H-OFS instances are embedded into a single ACL filter, no two H-OFS instances can
program the same filter entry ID.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
The SR OS H-OFS supports a mix of rules with service scope and with SAP scope. For VPLS SAPs, an
H-OFS instance must be embedded twice: after for the VPLS service and after for the SAP if both service-
level and SAP-level rules are to be activated.
An example of activating both service-level and SAP-level rules inside a single ACL policy 1 used on VPLS
SAP 1/1/1:100 is as follows:
Restrictions:
• Because an H-OFS instance does not support overlapping priorities within a single sros-cookie (type
+value), the priority for rules applicable to different SAPs within the same VPLS service must not
overlap.
• Masking is not supported when adding a new flow table rule with a port and VLAN ID match.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
instantiation of the rules for all services/interfaces that have a filter policy embedding this H-OFS instance.
Embedded filter policy configuration/operational rules apply also to embedded filters auto-created for an H-
OFS instance (see Embedded Filter Support for ACL Filter Policies section of this guide). MPLS cannot be
deleted if OFS rules are created that redirect to an LSP.
The auto-created embedded filters can be viewed through CLI but cannot be modified or deleted through
filter policy CLI/SNMP. The operator can see the above embedded filters under show filter context,
including the details about the filters, entries programmed, interface association, statistics, and so on.
Figure 29 shows the H-OFS to service operator-configurable mapping example.
For an H-OFS with the switch-defined-cookie command enabled, embedded filters are created for each
unique context in the H-OFS instead.
Figure 32: OF flow table mapping to router/switch service infrastructure example — switch-defined-cookie
disabled
The router allows mixing H-OFS rules from one or more H-OFS instances in a single filter policy.
Co-existence of H-OFS rules in a single policy with CLI/SNMP programmed rules or BGP FlowSpec
programmed rules in a single line card filter policy is also supported. When a management interface and an
OF controller flow entry have the same filter policy entry, the management interface-created entry overrides
the OF controller-created entry; see the embedded filter functional description. For mixing of the rules from
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
multiple management entities, the controller should not program an entry in its Flow Table that would match
all traffic, because this would stop evaluation of the filter policy.
The router supports HA for the OF Flow Table content and statistics. On an activity switch, the channel
goes down and is reestablished by the newly active CPM. ‟Fail secure mode” operation takes place during
channel reestablishment (OpenFlow rules continue to be applied to the arriving traffic). The OF controller
is expected to resynchronize the OF table when the channel is reestablished. On a router reboot or H-
OFS instance shutdown, H-OFS Flow Table rules and statistics are purged. An H-OFS instance cannot be
deleted unless the H-OFS instance is first removed from all embedding filter policies.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
The following encoding example shows logical port types supported by SR OS H-OFS:
RSVP LSP: LPT: 0100, LPT-S: 0000 (tunnel), LPT-V: RSVP TE Tunnel ID
MPLS-TP LSP: LPT: 0100, LPT-S: 0000 (tunnel), LTP-V: MPLS-TP Tunnel Number
SR-TE LSP: LPT: 0100, LPT-S: 0000 (tunnel), LTP-V: SR-TE LSP Index
GRT instance: LPT: 0100, LPT-S: 0001 (L3 routing instance), LPT-V: 0
VPRN Id: LPT: 0100, LPT-S: 0001 (L3 routing instance), LPT-V: VPRN Service ID for a
VPRN instance configured on the system, NAT: LPT 0100, LPT-S: 0020 (NAT), LPT-V: 0
OF is limited to a 24-bit service ID value range (a subset of VPRN IDs supported by the SR OS system).
Logical port values other than RSVP-TE LSP, SR-TE LSP, and MPLS-TP LSP require H-OFS with the
switch-defined-cookie command enabled. Only tunnel-encoded ports are stored in the H-OFS logical port
table. Therefore, functionality such as retrieving statistics per port is not available for logical ports that are
not stored in the H-OFS logical port table.
NULL tag, dot1Q tag, inner QinQ tag VlanId Outer QinQ tag VlanId
OXM_OF_VLAN_VID OFL_OUT_VLAN_ID (Experimenter field uses same
encoding as OXM_OF_VLAN_VID)
Table 15: Translation of OF Programmed Values to SR OS SAPs shows how OF programmed values are
translated to SR OS SAPs.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
ALU_IPD_EXPERIMENTER_ID: 0x000025BA
ALU_AXN_REDIRECT_TO_NEXTHOP: 2
flow_mod:
instruction= OFPIT_WRITE_ACTION/OFPIT_APPLY_ACTION,
action= OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_NEXTHOP),
encoding:
struct alu_axn_redirect_to_nhopv4{
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
In case of erroneous programming, the following experimenter-specific errors are returned to the controller:
enum alu_err_exp_class{
ALU_ERR_CLASS_RD_TO_SDP = 0,
ALU_ERR_CLASS_RD_TO_NHOP = 1,
}
enum alu_err_subtype_redirect_to_nhop
{
ALU_ERR_RN_INVALID_FLAGS = 0
ALU_ERR_RN_INVALID_ARGS = 1
ALU_ERR_RN_INVALID_ADDR = 2
}
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
port= SR OS LOGICAL port encoding GRT or VPRN Service ID as described in the SR OS H-OFS logical
port section.
Because a 24-bit value is used to encode the VPRN service ID in the logical port, redirection to a VPRN
service with a service ID above that range is not supported.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
ALU_IPD_EXPERIMENT_ID:0X000025BA
ALU_AXN_REDIRECT_TO_NEXTHOP:2
flow_mod:
Instruction 1:
instruction=OFPIT_WRITE_ACTION/OFPIT_APPLY_ACTION
action=OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_NEXTHOP),
Encoding as described in the Redirect to IP next-hop section (indirect flag must be set).
Instruction 2:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
port= SR OS LOGICAL port encoding GRT or VPRN Service ID as described in the SR OS H-OFS logical
port section.
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_ESI_L2)
encoding:
struct alu_axn_redirect_to_ESI_L2{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 3 for ESI*/
uint8_t flags; /* flags is 0-7 bits:
Value 0 = L2,
*/
uint8_t esi[10]; /* 10 byte ESI */
uint32_t svcId; /* Svc-Name Using the OF Encoding */
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L2) == 24)
flow_mod:
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
struct alu_axn_redirect_to_ESI_L3_V4{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 3 for ESI*/
uint8_t flags; /* flags is 0-7 bits:
Value 1 = L3 (ipv4)
*/
uint8_t esi[10]; /* 10 byte ESI */
uint32_t svcId; /* Svc-Name Using the OF Encoding */
uint32_t sf-ip; /* v4 address of sf-ip */
uint32_t ifIndex; /* interface id*/
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L3_V42) == 32)
struct alu_axn_redirect_to_ESI_L3_V6{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 1 for Nhop*/
uint8_t flags; /* flags is 0-7 bits:
Value = 2 = L3 (ipv6)
*/
uint8_t esi[10]; /* 10 byte ESI */
uint32_t svcId; /* Svc-Name Using the OF Encoding */
uint128_t sf-ip; /* v6 address of sf-ip */
uint32_t ifIndex; /* interface id*/
uint8_t pad[4];
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L3_V6) == 48)
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_ESI_L3)
encoding:
struct alu_axn_redirect_to_ESI_L3_V4{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type ; /* Type = 2 for ESI*/
uint8_t flags; /* flags is 0-7 bits:
Value 2 = L3 (ipv4)
*/
uint8_t esi[10];
uint32_t svcId; /* Svc-Name Using the OF Encoding */
uint32_t vas-ip; /* v4 address of sf-ip */
uint32_t ifIndex; /* vas interface id*/
}; ASSERT(sizeof(alu_axn_redirect_to_ESI_L3_V4) == 24)
struct alu_axn_redirect_to_ESI_L3_V6{
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS or OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
The port uses SR OS LOGICAL port encoding RSVP-TE, SR-TE, or MPLS-TP LSP as described in the SR
OS H-OFS logical port section.
An LSP received in a flow rule is compared against those in the H-OFS logical port table. If the table does
not contain the LSP, the rule programming fails. Otherwise, the rule is installed in an ACL filter. As long as
any path within the LSP is UP, the redirect rule forwards unicast IPv4 or IPv6 traffic on the current best LSP
path by adding an LSP transport label and, in the case of IPv6 traffic, also adding an explicit NULL label.
When an LSP in the H-OFS logical port table goes down, the OF switch removes the LSP from its logical
port table and notifies the controller of that fact if the logical port status reporting is enabled. It is up to the
OF controller to decide whether to remove rules using this LSP. If the rules are left in the flow table, the
traffic that was to be redirected to this LSP instead is subject to a forward action for this flow rule. If the
controller does not remove the entries and the system reuses the LSP identified for another LSP, the rules
left in the flow table start redirecting traffic onto this new LSP.
In some deployments, an SDN controller may need to learn from the router H-OFS logical ports status. To
support this function, the OF switch supports optional status reporting using asynchronous OF protocol
messages for ports status change.
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
The port uses SR OS LOGICAL port encoding as described in the SR OS H-OFS logical port section.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS or OFPIT_APPLY_ACTION,
Action 1:
action type: OFPAT_OUTPUT,
The port uses encoding as described in the SR OS H-OFS port and VLAN encoding section.
Action 2:
action type=OFPAT_SET_FIELD
OXM TLVs encode SAP VLANs as described in the SR OS H-OFS port and VLAN encoding section:
- OXM_OF_VLAN_VID
- OFL_OUT_VLAN_ID (optional)
ALU_IPD_EXPERIMENTER_ID: 0x000025BA
ALU_AXN_REDIRECT_TO_SDP: 1
flow_mod:
instruction= OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTIONS,
action= OFPAT_EXPERIMENTER(ALU_AXN_REDIRECT_TO_SDP),
encoding:
struct alu_axn_redirect_to_sdp{
uint16_t type; /* OFPAT_EXPERIMENTER. */
uint16_t len; /* Total Length is a multiple of 8. */
uint32_t experimenter; /* Experimenter ID vendor unique*/
uint8_t redirect_type; /* Type = 0 for SDP*/
uint8_t flags; /
* Flags that can be used to denote info(reserved)*/
uint16_t sdp-id; /* Sdp-id*/
uint32_t vcId; /* Vc-id*/
unit8_t pad[0]; /* Not needed */
}; ASSERT(sizeof(alu_axn_redirect_to_sdp) == 16)
In case of erroneous programming, the following experimenter-specific errors are returned to the controller:
enum alu_err_exp_class
{
ALU_ERR_CLASS_RD_TO_SDP = 0,
ALU_ERR_CLASS_RD_TO_NHOP = 1,
}
enum alu_err_redirect_to_sdp
{
ALU_ERR_RS_INVALID_FLAGS = 0
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
ALU_ERR_RS_INVALID_ARGS = 1
ALU_ERR_RS_INVALID_SDP_ID = 2
ALU_ERR_RS_INVALID_VC_ID = 3
}
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS/OFPIT_APPLY_ACTION,
Action 1:
action type: OFPAT_EXPERIMENTER
ALU_IPD_EXPERIMENTER_ID: 0x000025BA
ExpType= ALU_AXN_REDIRECT_TO_NEXTHOP,
Action 2:
action type: OFPAT_OUTPUT,
port= SR OS LOGICAL port encoding RSVP-TE, MPLS-TP LSP, or segment routing, as described in SR
OS H-OFS logical port section.
Action 3 (optional): to redirect to a different VPRN
Action 3:
action type: OFPAT_EXPERIMENTER
ALU_IPD_EXPERIMENTER_ID: 0x000025BA
ExpType= ALU_AXN_REDIRECT_TO_VPRN,
Encoding:
struct alu_axn_redirect_to_vprn {
uint16_t type; /* OFPAT_EXPERIMENTER => ff ff */
uint16_t len;
uint32_t experimenter; /
* Vendor specific experimenter id => 00 00 25 ba */
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
Action 4:
action type: OFPAT_SET_FIELD
Field is an IP destination address. Subnet masks are not supported in the set_field instruction.
flow_mod:
instruction type: OFPIT_WRITE_ACTIONS or OFPIT_APPLY_ACTION,
action type: OFPAT_OUTPUT,
port= NORMAL
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
flow_mod:
instruction type: OFPIT_METER
action type: with the meterId.
The meters are configured using meter modification messages, and are configured before the flow
messages are sent with meter instruction:
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Hybrid OpenFlow switch
22.5.R1
The router supports multi-action using the OpenFlow version 1.3.1 Required Action: Group (For more
details, see Section 6.4, Flow Table Modification Messages, Section 6.5, Group Table Modification
Messages, and Section 5.6.1, Group Types with group type of fast failover of the TS-007, OpenFlow
Switch Specification Version 1.3.1 (OpenFlow-hybrid switches)).
Redundancy uses fast failover group modeling as per the OpenFlow specification with two buckets,
with liveliness detection provided by the filter module. Note that failover operates independently of the
OpenFlow controller.
The router supports the programming of pbr-on-down-override and sticky-dest using an experimenter,
as follows:
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
6 Cflowd
6.1.1 Operation
Figure 34: Basic cflowd steps shows the basic operation of the cflowd feature. This sampled flow is only
used to describe the basic steps that are performed. It is not intended to specify implementation.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Generates a variable export record, depending on user configuration and sampled traffic type (IPv4,
IPv6, or MPLS), for each individual flow captured.
• Version 10 (IPFIX)
Generates a variable export record, depending on user configuration and sampled traffic type (IPv4,
IPv6, or MPLS), for each individual flow captured.
Figure 35: V5, V8, V9, V10, and flow processing shows V5, V8, V9, and V10 flow processing.
As flows are expired from the active flow cache, the export format must be determined, either V5, V8, V9,
and V10.
• If the export format is V5 or V9 and V10, no further processing is performed and the flow data is
accumulated to be sent to the external collector.
• If the export format is V8, the flow entry is added to one or more of the configured aggregation matrices.
• As the entries within the aggregate matrices are aged out, they are accumulated to be sent to the
external flow collector in V8 format.
The sample rate and cache size are configurable values. The cache size default is 64K flow entries.
A flow terminates when one of the following conditions is met:
• When the inactive timeout period expires (default: 15 s). A flow is considered terminated when no
packets are seen for the flow for n seconds.
• When an active timeout expires (default: 30 s). Default active timeout is 30 min. A flow terminates
according to the time duration, regardless of whether there are packets coming in for the flow.
• When the user executes a clear cflowd command.
• When other measures are met that apply to aggressively age flows as the cache becomes too full (such
as overflow percent).
6.1.1.1 Version 8
There are several different aggregate flow types including:
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
• AS matrix
• Destination prefix matrix
• Source prefix matrix
• Prefix matrix
• Protocol/port matrix.
Version 8 is an aggregated export format. As individual flows are aged out of the raw flow cache, the
data is added to the aggregate flow cache for each configured aggregate type. Each of these aggregate
flows are also aged in a manner similar to the method the active flow cache entries are aged. When an
aggregate flow is aged out, it is sent to the external collector in the V8 record format.
6.1.1.2 Version 9
Version 9 format is a more flexible format and allows for different templates or sets of cflowd data to be
sent based on the type of traffic being sampled and the template set configured.
Version 9 is interoperable with RFC 3954, Cisco Systems NetFlow Services Export Version 9.
6.1.1.3 Version 10
Version 10 is a new format and protocol that interoperates with the specifications from the IETF as the IP
Flow Information Export (IPFIX) standard. Like V9, the V10 format uses templates to allow for different data
elements about a flow that is to be exported and to handle different type of data flows, such as IPv4, IPv6,
and MPLS.
Version 10 is interoperable with RFC 5101 and 5102.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
There are three modes in which cflowd can be enabled to sample traffic on an interface:
• Cflowd interface, where all traffic entering a specified port is subjected to sampling at the configured
sampling rate.
• Cflowd interface plus the definition of IP filters that specify an action of interface-disable-sample, where
traffic that matches these filter entries is not subject to cflowd sampling.
• Cflowd ACL, where IP filters must be created with entries containing the action filter-sampled. In this
mode, only traffic matching these filter entries is subject to the cflowd sampling process.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Within the raw flow cache, the following characteristics are used to identify an individual flow:
• Ingress interface
• Source IP address
• Destination IP address
• Source transport port number
• Destination transport port number
• IP protocol type
• IP ToS byte
• Virtual router ID
• ICMP type and code
• Direction
• MPLS labels
SR OS implementation allows cflowd to be enabled at the interface level or as an action to a filter. By
enabling cflowd at the interface level, all IP packets forwarded by the interface are subject to cflowd
analysis. By setting cflowd as an action in a filter, only packets matching the specified filter are subject to
cflowd analysis. This provides the network operator greater flexibility in the types of flows that are captured.
6.4.1.2 Collectors
A collector defines how data flows should be exported from the flow cache. A maximum of five collectors
can be configured. Each collector is identified by a unique IP address and UDP port value. Each collector
can only export traffic in one version type: V5, V8, V9, or V10.
The parameters within a collector configuration can be modified or the defaults retained.
The autonomous-system-type command defines whether the autonomous system information to be
included in the flow data is based on the originating AS or external peer AS of the flow.
6.4.1.2.1 Aggregation
V8 aggregation allows for flow data to be aggregated into larger, less granular flows. Use aggregation
commands to specify the type of data to be collected. These aggregation types are only applicable to flows
being exported to a V8 collector.
The following aggregation schemes are supported:
• AS matrix
Flows are aggregated based on source and destination AS and ingress and egress interface.
• Protocol port
Flows are aggregated based on the IP protocol, source port number, and destination port number.
• Source prefix
Flows are aggregated based on source prefix and mask, source AS, and ingress interface.
• Destination prefix
Flows are aggregated based on destination prefix and mask, destination AS, and egress interface.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
• Source-destination prefix
Flows are aggregated based on source prefix and mask, destination prefix and mask, source and
destination AS, ingress interface and egress interface.
• Raw
Flows are not aggregated and are sent to the collector in a V5 record.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Controls the maximum time a flow record can be active before it is automatically exported to defined
collectors.
• Inactive flow timeout
Controls the minimum time before a flow is declared inactive. If no traffic is sampled for a flow for
the inactive timeout duration, the flow is declared inactive and marked to be exported to the defined
collectors.
• Cache size
Defines the maximum size of the flow cache.
• Overflow
Defines the percentage of flow records that are exported to all collectors if the flow cache size is
exceeded.
• Rate
Defines the system-wide sampling rate for cflowd.
• Template retransmit
Defines the interval (in seconds) at which the V9 and V10 templates are retransmitted to all configured
V9 or V10 collectors.
- config# cflowd
- no shutdown
The following example shows the default values when cflowd is initially enabled. No collectors or collector
options are configured.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
- config>cflowd#
- active-flow-timeout seconds
- cache-size num-entries
- enhanced-distribution
- export-mode {automatic | manual}
- inactive-flow-timeout seconds
- overflow percent
- sample-profile 1 create
- sample-rate rate
- template-retransmit seconds
- no shutdown
A:ALA-1>config>cflowd# info
#------------------------------------------
active-flow-timeout 1800
inactive-flow-timeout 10
overflow 10
sample-profile 1 create
sample-rate 100
exit
#------------------------------------------
A:ALA-1>config>cflowd#
- config>cflowd#
- collector ip-address[:port] [version version]
- aggregation
- as-matrix
- destination-prefix
- protocol-port
- raw
- source-destination-prefix
- source-prefix
- autonomous-system-type [origin | peer]
- description description-string
- no shutdown
- template-set {basic | mpls-ip | l2-ip | mpls-transport}
A:ALA-1>config>cflowd# info
-----------------------------------------
active-flow timeout 1800
inactive-flow-timeout 10
overflow 10
sample-profile 1 create
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
sample-rate 100
exit
no sample-profile
collector 10.10.10.1:2000 version 8
aggregation
as-matrix
raw
exit
description "AS info collector"
exit
collector 10.10.10.2:5000 version 8
aggregation
protocol-port
source-destination-prefix
exit
autonomous-system-type peer
description "Neighbor collector"
exit
-----------------------------------------
A:ALA-1>config>cflowd#
Each flow exported to a collector configured for either V9 or V10 formats is sent using one of the flow
template sets listed in Table 16: Template sets.
Table 17: Basic IPv4 template to Table 24: MPLS TRANSPORT template list the fields in each template
listed in Table 16: Template sets.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
IPv4 Nexthop 15
BGP Nexthop 18
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
Forwarding Status 89
IPv4 Protocol 4
IPv4 ToS 5
IP version 60
Direction 61
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Minimum TTL 52
Maximum TTL 53
bgpNextAdjacentAsNumber 128
bgpPrevAdjacentAsNumber 129
IsMulticast
1 206
Ingress VRFID
1 234
Egress VRFID
1 235
Note:
1. Only sent to collectors configured for V10 format.
IPv4 Nexthop 15
BGP Nexthop 18
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
IPv4 Protocol 4
IPv4 ToS 5
IP version 60
Direction 61
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
MPLS Label 6 75
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
Minimum TTL 52
Maximum TTL 53
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
bgpPrevAdjacentAsNumber 129
IsMulticast
1 206
Ingress VRFID
1 234
Egress VRFID
1 235
Note:
1. Only sent to collectors configured for V10 format.
IPv6 Nexthop 62
IPv4 Nexthop 15
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
Forwarding Status 89
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Protocol 4
ToS 5
IP version 60
Direction 61
Minimum TTL 52
Maximum TTL 53
bgpNextAdjacentAsNumber 128
bgpPrevAdjacentAsNumber 129
IsMulticast
1 206
Ingress VRFID
1 234
Egress VRFID
1 235
Note:
1. Only sent to collectors configured for V10 format.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
IPv6 Nexthop 62
IPv4 Nexthop 15
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
Forwarding Status 89
Protocol 4
ToS 5
IP version 60
Direction 61
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
MPLS Label 6 75
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
MPLS_TOP_LABEL_TYPE 46
MPLS_TOP_LABEL_ADDR 47
Minimum TTL 52
Maximum TTL 53
bgpNextAdjacentAsNumber 128
bgpPrevAdjacentAsNumber 129
IsMulticast
1 206
Ingress VRFID
1 234
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Egress VRFID
1 235
Note:
1. Only sent to collectors configured for V10 format.
Start Time 22
End Time 21
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Direction 61
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
MPLS Label 6 75
Note:
1. Only sent to collectors configured for V10 format.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
IPv4 Nexthop 15
IPv6 Nexthop 62
Ingress Interface 10
Egress Interface 14
Packet Count 2
Byte Count 1
Start Time 22
End Time 21
Src Port 7
Dest Port 11
IPv4 Protocol 4
IPv4 ToS 5
IP version 60
Direction 61
MPLS Label 1 70
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
MPLS Label 6 75
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
Note:
1. Only sent to collectors configured for V10 format.
Field Name
1 Field ID
Packet Count 2
Byte Count 1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Field Name
1 Field ID
Src Port 7
Dest Port 11
Protocol 4
ToS 5
IP Version 60
Note:
1. Only one Ethernet (L2-IP) flow template is supported and exported to IPFIX (V10) collectors.
VRF ID 234
Ingress Interface 10
Packet Count 2
Byte Count 1
Direction 61
MPLS_TOP_LABEL_TYPE 46
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
MPLS_TOP_LABEL_ADDR 47
MPLS Label-1 70
Field Name
1 Field ID
Ingress ID 252
Egress ID 253
Ingress VRF ID
2 234
Egress VRF ID
2 235
Protocol
2 4
ToS
2 5
Note:
1. The field names are exported only to IPFIX (V10) collectors.
2. The IP fields contain values from the outer GRE IP header.
3. The Data Link Frame section field includes the inner IP headers.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Depending on the option selected, either acl or interface, cflowd extracts traffic flow samples from an
IP filter or an interface for analysis. All packets forwarded by the interface are analyzed according to the
cflowd configuration.
The acl option must be selected to enable traffic sampling on an IP filter. Cflowd (filter-sample) must be
enabled in at least one IP filter entry.
The interface option must be selected to enable traffic sampling on an interface. If cflowd is not enabled
(no cflowd), traffic sampling does not occur on the interface.
When enabled on a service interface, cflowd collects routed traffic flow samples through a router for
analysis. Cflowd is supported on IES and VPRN services interfaces only. Layer 2 traffic is excluded. All
packets forwarded by the interface are analyzed according to the cflowd configuration. On the interface
level, cflowd can be associated with a filter (ACL) or an IP interface. Layer 2 cflowd ingress sampling is
supported on VPLS and Epipe SAPs.
Byte 1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Output ifIndex 14
IP version 60
IP Src Port 7
IP Dst Port 11
IP proto 4
IP tcpflags 6
IP min TTL 52
IP max TTL 53
IP tos 5
Flow Direction 61
IP icmp type/code 32
Forwarding status 89
Byte 1
Input ifIndex 10
Output ifIndex 14
IP version 60
IP Src Port 7
IP Dst Port 11
IP proto 4
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
IP min TTL 52
IP max TTL 53
IP tos 5
Flow Direction 61
Forwarding status 89
Input ifIndex 10
Output ifIndex 14
Packet 2
Byte 1
Flow Direction 61
MPLS Label 1 70
MPLS Label 2 71
MPLS Label 3 72
MPLS Label 4 73
MPLS Label 5 74
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
MPLS Label 7 76
MPLS Label 8 77
MPLS Label 9 78
MPLS Label 10 79
Packet Count 2
Byte Count 1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Input ifIndex 10
Output ifIndex 14
IP version 60
IP src Port 7
IP Dst Port 11
IP Proto 4
IP TCP flags 6
IP min TTL 52
IP TOS 5
IP icmp type/code 32
Forwarding status 89
Input ifIndex 10
Output ifIndex 14
IP version 60
IP src Port 7
IP Dst Port 11
IP Proto 4
IP TCP flags 6
IP min TTL 52
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Forwarding status 89
or
When a filter policy is applied to a service or a network interface, sampling can be configured so that traffic
matching the associated IP filter entry is sampled when the IP interface is set to cflowd ACL mode and the
filter-sample command is enabled. If cflowd is either not enabled (no filter-sample) or set to the cflowd
interface mode, sampling does not occur.
When the interface-disable-sample command is enabled, traffic matching the associated IP filter entry is
not sampled if the IP interface is set to cflowd ACL mode.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
6.4.3.6.2 Dependencies
For cflowd to be operational, the following requirements must be met:
• Cflowd must be enabled on a global level. If cflowd is disabled, any traffic sampling instances are also
disabled.
• At least one collector must be configured and enabled in order for traffic sampling to occur on an
enabled entity.
• If a specific collector UDP port is not identified, flows are sent to port 2055 by default.
Cflowd can also be dependent on the following entity configurations:
• Interface configurations
• Service interfaces
• Filter configurations
The combination of interface and filter entry configurations determines whether flow sampling occurs.
Table 32: Cflowd configuration dependencies lists the expected results based on cflowd configuration
dependencies.
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
- config>cflowd#
- active-flow-timeout seconds
- no active-flow-timeout
- cache-size num-entries
- no cache-size
- [no] enhanced-distribution
- export-mode {automatic | manual}
- inactive-flow-timeout seconds
- no inactive-flow-timeout
- overflow percent
- no overflow
- sample-profile 1 create
- rate sample-rate
- no rate
- exit
- no sample-profile
- [no] shutdown
- template-retransmit seconds
- no template-retransmit
The following example shows the cflowd command syntax to modify configuration parameters:
A:ALA-1>config>cflowd# info
#------------------------------------------
active-flow-timeout 3600
overflow 2
sample-rate 10
#------------------------------------------
A:ALA-1>config>cflowd#
- config>cflowd#
- collector ip-address[:port] [version version]
- no collector ip-address[:port]
- [no] aggregation
- [no] as-matrix
- [no] destination-prefix
- [no] protocol-port
- [no] raw
- [no] source-destination-prefix
- [no] source-prefix
- [no] autonomous-system-type [origin | peer]
- [no] description description-string
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
- [no] shutdown
- template-set {basic | mpls-ip | l2-ip | mpls-transport}
If a specific collector UDP port is not identified, flows are sent to port 2055 by default.
The following example displays basic cflowd modifications:
A:ALA-1>config>cflowd# info
-----------------------------------------
active-flow-timeout 3600
overflow 2
sample-rate 10
collector 10.10.10.1:2000 version 5
description "AS info collector"
exit
collector 10.10.10.2:5000 version 8
aggregation
source-prefix
raw
exit
description "Test collector"
exit
-----------------------------------------
A:ALA-1>config>cflowd#
cflowd
inband-collector-export-only true
sample-profile 2 {
sample-rate 2000
metering-process fp-accelerated
}
collector 10.10.10.10 {
template-set fastpath
version 10
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Cflowd
22.5.R1
Drop-ACL 130
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
7.5 Broadband Network Gateway (BNG) Control and User Plane Separation
(CUPS)
3GPP 23.007, Restoration procedures
3GPP 29.244, Interface between the Control Plane and the User Plane nodes
3GPP 29.281, General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U)
BBF TR-459, Control and User Plane Separation for a Disaggregated BNG
RFC 8300, Network Service Header (NSH)
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
7.8 Ethernet
IEEE 802.1AB, Station and Media Access Control Connectivity Discovery
IEEE 802.1ad, Provider Bridges
IEEE 802.1ag, Connectivity Fault Management
IEEE 802.1ah, Provider Backbone Bridges
IEEE 802.1ak, Multiple Registration Protocol
IEEE 802.1aq, Shortest Path Bridging
IEEE 802.1ax, Link Aggregation
IEEE 802.1D, MAC Bridges
IEEE 802.1p, Traffic Class Expediting
IEEE 802.1Q, Virtual LANs
IEEE 802.1s, Multiple Spanning Trees
IEEE 802.1w, Rapid Reconfiguration of Spanning Tree
IEEE 802.1X, Port Based Network Access Control
IEEE 802.3ac, VLAN Tag
IEEE 802.3ad, Link Aggregation
IEEE 802.3ah, Ethernet in the First Mile
IEEE 802.3x, Ethernet Flow Control
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
ISO/IEC 10589:2002 Second Edition, Intermediate system to Intermediate system intra-domain routeing
information exchange protocol for use in conjunction with the protocol for providing the connectionless-
mode Network Service (ISO 8473)
RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments
RFC 2973, IS-IS Mesh Groups
RFC 3359, Reserved Type, Length and Value (TLV) Codepoints in Intermediate System to Intermediate
System
RFC 3719, Recommendations for Interoperable Networks using Intermediate System to Intermediate
System (IS-IS)
RFC 3787, Recommendations for Interoperable IP Networks using Intermediate System to Intermediate
System (IS-IS)
RFC 4971, Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router
Information
RFC 5120, M-ISIS: Multi Topology (MT) Routing in IS-IS
RFC 5130, A Policy Control Mechanism in IS-IS Using Administrative Tags
RFC 5301, Dynamic Hostname Exchange Mechanism for IS-IS
RFC 5302, Domain-wide Prefix Distribution with Two-Level IS-IS
RFC 5303, Three-Way Handshake for IS-IS Point-to-Point Adjacencies
RFC 5304, IS-IS Cryptographic Authentication
RFC 5305, IS-IS Extensions for Traffic Engineering TE
RFC 5306, Restart Signaling for IS-IS – helper mode
RFC 5307, IS-IS Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)
RFC 5308, Routing IPv6 with IS-IS
RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols
RFC 5310, IS-IS Generic Cryptographic Authentication
RFC 6119, IPv6 Traffic Engineering in IS-IS
RFC 6213, IS-IS BFD-Enabled TLV
RFC 6232, Purge Originator Identification TLV for IS-IS
RFC 6233, IS-IS Registry Extension for Purges
RFC 6329, IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging
RFC 7775, IS-IS Route Preference for Extended IP and IPv6 Reachability
RFC 7794, IS-IS Prefix Attributes for Extended IPv4 and IPv6 Reachability
RFC 7987, IS-IS Minimum Remaining Lifetime
RFC 8202, IS-IS Multi-Instance – single topology
RFC 8570, IS-IS Traffic Engineering (TE) Metric Extensions – Min/Max Unidirectional Link Delay metric for
flex-algo
RFC 8919, IS-IS Application-Specific Link Attributes
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
RFC 5656, Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer – ECDSA
RFC 5925, The TCP Authentication Option
RFC 5926, Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)
RFC 6398, IP Router Alert Considerations and Usage – MLD
RFC 6528, Defending against Sequence Number Attacks
RFC 7011, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow
Information
RFC 7012, Information Model for IP Flow Information Export
RFC 7230, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing
RFC 7231, Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
RFC 7232, Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests
RFC 7301, Transport Layer Security (TLS) Application Layer Protocol Negotiation Extension
RFC 7616, HTTP Digest Access Authentication
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
RFC 4541, Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener
Discovery (MLD) Snooping Switches
RFC 4604, Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener
Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast
RFC 4607, Source-Specific Multicast for IP
RFC 4608, Source-Specific Protocol Independent Multicast in 232/8
RFC 4610, Anycast-RP Using Protocol Independent Multicast (PIM)
RFC 4611, Multicast Source Discovery Protocol (MSDP) Deployment Scenarios
RFC 5059, Bootstrap Router (BSR) Mechanism for Protocol Independent Multicast (PIM)
RFC 5186, Internet Group Management Protocol Version 3 (IGMPv3) / Multicast Listener Discovery
Version 2 (MLDv2) and Multicast Routing Protocol Interaction
RFC 5384, The Protocol Independent Multicast (PIM) Join Attribute Format
RFC 5496, The Reverse Path Forwarding (RPF) Vector TLV
RFC 6037, Cisco Systems' Solution for Multicast in MPLS/BGP IP VPNs
RFC 6512, Using Multipoint LDP When the Backbone Has No Route to the Root
RFC 6513, Multicast in MPLS/BGP IP VPNs
RFC 6514, BGP Encodings and Procedures for Multicast in MPLS/IP VPNs
RFC 6515, IPv4 and IPv6 Infrastructure Addresses in BGP Updates for Multicast VPNs
RFC 6516, IPv6 Multicast VPN (MVPN) Support Using PIM Control Plane and Selective Provider Multicast
Service Interface (S-PMSI) Join Messages
RFC 6625, Wildcards in Multicast VPN Auto-Discover Routes
RFC 6826, Multipoint LDP In-Band Signaling for Point-to-Multipoint and Multipoint-to-Multipoint Label
Switched Path
RFC 7246, Multipoint Label Distribution Protocol In-Band Signaling in a Virtual Routing and Forwarding
(VRF) Table Context
RFC 7385, IANA Registry for P-Multicast Service Interface (PMSI) Tunnel Type Code Points
RFC 7716, Global Table Multicast with BGP Multicast VPN (BGP-MVPN) Procedures
RFC 7761, Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)
RFC 8279, Multicast Using Bit Index Explicit Replication (BIER)
RFC 8296, Encapsulation for Bit Index Explicit Replication (BIER) in MPLS and Non-MPLS Networks –
MPLS encapsulation
RFC 8401, Bit Index Explicit Replication (BIER) Support via IS-IS
RFC 8444, OSPFv2 Extensions for Bit Index Explicit Replication (BIER)
RFC 8487, Mtrace Version 2: Traceroute Facility for IP Multicast
RFC 8534, Explicit Tracking with Wildcard Routes in Multicast VPN – (C-*,C-*) wildcard
RFC 8556, Multicast VPN Using Bit Index Explicit Replication (BIER)
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC 3526, More Modular Exponential (MODP) Diffie-Hellman group for Internet Key Exchange (IKE)
RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPsec
RFC 3706, A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers
RFC 3947, Negotiation of NAT-Traversal in the IKE
RFC 3948, UDP Encapsulation of IPsec ESP Packets
RFC 4106, The Use of Galois/Counter Mode (GCM) in IPsec ESP
RFC 4109, Algorithms for Internet Key Exchange version 1 (IKEv1)
RFC 4301, Security Architecture for the Internet Protocol
RFC 4303, IP Encapsulating Security Payload
RFC 4307, Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)
RFC 4308, Cryptographic Suites for IPsec
RFC 4434, The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)
RFC 4543, The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH
RFC 4754, IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)
RFC 4835, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload
(ESP) and Authentication Header (AH)
RFC 4868, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
RFC 4945, The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2 and PKIX
RFC 5019, The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume
Environments
RFC 5282, Using Authenticated Encryption Algorithms with the Encrypted Payload of the IKEv2 Protocol
RFC 5903, ECP Groups for IKE and IKEv2
RFC 5996, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 5998, An Extension for EAP-Only Authentication in IKEv2
RFC 6379, Suite B Cryptographic Suites for IPsec
RFC 6380, Suite B Profile for Internet Protocol Security (IPsec)
RFC 6960, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC 7296, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 7321, Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating
Security Payload (ESP) and Authentication Header (AH)
RFC 7383, Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation
RFC 7427, Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
RFC 4222, Prioritized Treatment of Specific OSPF Version 2 Packets and Congestion Avoidance
RFC 4552, Authentication/Confidentiality for OSPFv3
RFC 4576, Using a Link State Advertisement (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual
Private Networks (VPNs)
RFC 4577, OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks
(VPNs)
RFC 5185, OSPF Multi-Area Adjacency
RFC 5187, OSPFv3 Graceful Restart – helper mode
RFC 5243, OSPF Database Exchange Summary List Optimization
RFC 5250, The OSPF Opaque LSA Option
RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols
RFC 5340, OSPF for IPv6
RFC 5642, Dynamic Hostname Exchange Mechanism for OSPF
RFC 5709, OSPFv2 HMAC-SHA Cryptographic Authentication
RFC 5838, Support of Address Families in OSPFv3
RFC 6549, OSPFv2 Multi-Instance Extensions
RFC 6987, OSPF Stub Router Advertisement
RFC 7471, OSPF Traffic Engineering (TE) Metric Extensions – Min/Max Unidirectional Link Delay metric
for flex-algo
RFC 7684, OSPFv2 Prefix/Link Attribute Advertisement
RFC 7770, Extensions to OSPF for Advertising Optional Router Capabilities
RFC 8362, OSPFv3 Link State Advertisement (LSA) Extensibility
RFC 8920, OSPF Application-Specific Link Attributes
7.25 OpenFlow
TS-007 Version 1.3.1, OpenFlow Switch Specification – OpenFlow-hybrid switches
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
RFC 4447, Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)
RFC 4448, Encapsulation Methods for Transport of Ethernet over MPLS Networks
RFC 5085, Pseudowire Virtual Circuit Connectivity Verification (VCCV): A Control Channel for Pseudowires
RFC 5659, An Architecture for Multi-Segment Pseudowire Emulation Edge-to-Edge
RFC 5885, Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity
Verification (VCCV)
RFC 6073, Segmented Pseudowire
RFC 6310, Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping
RFC 6391, Flow-Aware Transport of Pseudowires over an MPLS Packet Switched Network
RFC 6575, Address Resolution Protocol (ARP) Mediation for IP Interworking of Layer 2 VPNs
RFC 6718, Pseudowire Redundancy
RFC 6829, Label Switched Path (LSP) Ping for Pseudowire Forwarding Equivalence Classes (FECs)
Advertised over IPv6
RFC 6870, Pseudowire Preferential Forwarding Status bit
RFC 7023, MPLS and Ethernet Operations, Administration, and Maintenance (OAM) Interworking
RFC 7267, Dynamic Placement of Multi-Segment Pseudowires
RFC 7392, Explicit Path Routing for Dynamic Multi-Segment Pseudowires – ER-TLV and ER-HOP IPv4
Prefix
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
7.36 Timing
GR-1244-CORE Issue 3, Clocks for the Synchronized Network: Common Generic Criteria
GR-253-CORE Issue 3, SONET Transport Systems: Common Generic Criteria
IEEE 1588-2008, IEEE Standard for a Precision Clock Synchronization Protocol for Networked
Measurement and Control Systems
ITU-T G.781, Synchronization layer functions
ITU-T G.813, Timing characteristics of SDH equipment slave clocks (SEC)
ITU-T G.8261, Timing and synchronization aspects in packet networks
ITU-T G.8262, Timing characteristics of synchronous Ethernet equipment slave clock (EEC)
ITU-T G.8262.1, Timing characteristics of an enhanced synchronous Ethernet equipment slave clock
(eEEC)
ITU-T G.8264, Distribution of timing information through packet networks
ITU-T G.8265.1, Precision time protocol telecom profile for frequency synchronization
ITU-T G.8275.1, Precision time protocol telecom profile for phase/time synchronization with full timing
support from the network
RFC 3339, Date and Time on the Internet: Timestamps
RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms Specification
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
RFC 6038, Two-Way Active Measurement Protocol (TWAMP) Reflect Octets and Symmetrical Size
Features
RFC 8545, Well-Known Port Assignments for the One-Way Active Measurement Protocol (OWAMP) and
the Two-Way Active Measurement Protocol (TWAMP) – TWAMP
RFC 8762, Simple Two-Way Active Measurement Protocol – unauthenticated
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
ROUTER CONFIGURATION GUIDE RELEASE Standards and protocol support
22.5.R1
SPACER TEXT
Customer document and product support
Customer documentation
Customer documentation welcome page
Technical support
Product support portal
Documentation feedback
Customer documentation feedback