![]() |
COMMAND DESCRIPTION 8/190 82-CRA 119 1170/1-V1 Uen D | ![]() |
Copyright
© Ericsson AB 2009–2010. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.
Disclaimer
The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.
Trademark List
SmartEdge | is a registered trademark of Telefonaktiebolaget LM Ericsson. | |
NetOp | is a trademark of Telefonaktiebolaget LM Ericsson. |
Commands starting with “e” through commands starting with “f” are included.
ebgp-multihop max-hops
no ebgp-multihop max-hops
Configures the maximum number of hops used to reach the external Border Gateway Protocol (eBGP) neighbor when the neighbor or peer group is not directly connected.
max-hops |
Maximum number of hops. The range of values is 1 to 255; the default value is 1. |
The maximum number of hops is set to 1.
Use the ebgp-multihop command to configure the maximum number of hops used to reach the eBGP neighbor when the neighbor or peer group is not directly connected.
Use the no form of this command to restore the maximum number of hops to the default value of 1.
The following example sets the maximum number of hops to the neighbor at IP address, 12.10.10.1 to 3:
[local]Redback(config-ctx)#router bgp 100 [local]Redback(config-bgp)#neighbor 12.10.10.1 external [local]Redback(config-bgp-neighbor)#egbp-multihop 3
ecmp-transit
no ecmp-transit
Enables equal-cost multipath (ECMP) on label-switched path (LSP) transit nodes.
LDP router configuration
This command has no keywords or arguments.
ECMP is disabled on transit nodes and enabled on ingress nodes.
Use the ecmp-transit command to enable ECMP on LSP transit nodes.
A constituent of an ECMP LSP can be protected against link failure at the label edge router (LER) using next-hop fast reroute (NFRR) for link protection when the LDP traffic is carried over a bypass RSVP LSP.
Use the no form of this command to disable ECMP on LSP transit nodes.
The following example shows how to enable ECMP on an LSP transit node:
[local]Redback#config [local]Redback(config)#context local [local]Redback(config-ctx)#router ldp [local]Redback(config-ldp)#ecmp-transit
edit url
Using the vi editor, creates or opens an existing file on the local file system for editing.
exec (10)
url |
URL of the file to be created or edited. |
None
Use the edit command to create or open an existing file on the local file system for editing.
Use the :q! command to discard any edits and exit the editor; use the :wq! command to save any edits and exit the editor.
The following example opens the redback.cfg file using the vi editor:
[local]Redback#edit redback.cfg
! ! Configuration last changed by user 'pm' at Mon Jan 2 08:04:25 2006 ! service multiple-contexts ! context local ! ip domain-lookup ! interface mgmt ip address 10.1.1.3/21 ! enable encrypted 1 $1$........$kvQfdsjs0ACFMeDHQ7n/o. ! user test encrypted 1 $1$........$kvQfdsjs0ACFMeDHQ7n/o. ! ip route 10.1.0.0/16 10.12.208.1 cost 1 permanent ip route 155.53.0.0/16 10.12.208.1 cost 1 permanent ! port ethernet 7/1 ! XCRP management ports on slot 7 and 8 are configured through 7/1 no shutdown bind interface mgmt local ! system hostname supercomm7 ! service console-break ! end
edge-port
no edge-port
Configures the associated port as a Rapid Spanning Tree Protocol (RSTP) edge port.
spanning-tree profile configuration
This command has no keywords or arguments.
The associated port is not an edge port.
Use the edge-port command to configure the associated port as an RSTP edge port.
The following example illustrates how the spanning-tree profile command creates the spanning-tree profile womp and configures it as an RSTP edge-port profile. In the second part of the example, an Ethernet port is assigned the spanning-tree profile womp and, therefore, is configured as an RSTP edge port:
[local]Redback(config)#spanning-tree profile womp [local]Redback(config-stp-prof)#edge-port [local]Redback(config-stp-prof)#exit [local]Redback(config)#port ethernet 1/1 [local]Redback(config-port)#spanning-tree profile womp
egress egress-addr
Specifies the IP address of the egress label-switched router (LSR) in a label-switched path (LSP).
egress-addr |
IP address of the egress LSR. |
None
Use the egress command to specify the IP address of the egress LSR in an LSP.
An egress LSR is the last LSR in the chain of LSRs that constitute an LSP. It forwards packets out of a network. The IP address of the egress LSR must be specified in both signaled and static LSPs.
The following example configures the egress IP address to 192.168.1.2 for the static LSP, lsp01:
[local]Redback(config-ctx)#router mpls-static [local]Redback(config-mpls-static)#lsp lsp01 [local]Redback(config-mpls-static-lsp)#egress 192.168.1.2
egress prefer dscp-qos
no egress prefer dscp-qos
Enables the use of only Differentiated Services Code Point (DSCP) bits for queuing at the Multiprotocol Label Switching (MPLS) egress router.
MPLS router configuration
This command has no keywords or arguments.
If penultimate hop popping is enabled, the tunnel label is removed at the penultimate hop, and the egress router uses the Virtual Private Network (VPN) label experimental (EXP) bits for queuing; however, if there is no VPN label, the egress router uses the DSCP bits for queuing. For more information, see Configuring MPLS.
Use the egress prefer dscp-qos command to enable the use of only DSCP bits for queuing at the MPLS egress router.
Use the no form of this command to return the system to its default behavior.
The following example enables the use of only DSCP bits for queuing at the egress router:
[local]Redback(config-ctx)#router mpls [local]Redback(config-mpls)#egress prefer dscp-qos
enable [level]
no enable
Modifies the privilege level for the current exec session.
exec
level |
Optional. Requested privilege level. The range of values is 0 to 15; if you do not enter a value, the system defaults to 15. |
When you enter this command without the level argument, the current exec session is held at level 15. For whatever value is set, the administrator’s privilege level must be the same or higher.
Use the enable command to modify the privilege level for the current exec session. Use the level argument to select the desired privilege level, up to the maximum privilege level configured for this administrator account. If this argument is omitted, the maximum privilege level (15) is enabled. This command is available for any privilege level.
If no passwords have been configured and if local authentication is enabled, you can enter the enable command (in exec mode) only on the console port; the system does not prompt for a password. By default, local authentication is enabled; see the enable authentication command (in context configuration mode). If at least one password has been configured, you can enter the enable command from the console or a remote session; see the enable password and enabled encrypted commands (in context configuration mode).
You can use the enable command to enter a privilege level password only if a password for the privilege level has been set. If you attempt to use this command for a privilege level that has no password, the system displays an error message and does not change the privilege level for the exec session. For information on the privilege level passwords, see Configuring Contexts and Interfaces. Use the show privilege command to display the enabled privilege level.
Use the no form of this command to return to the initial privilege level configured for the administrator account. The disable command (in exec mode) performs the same function.
The following example shows the results of an attempt by an administrator to set the privilege level for the exec session to a privilege level for which no password is configured:
[local]Redback>enable 10 %No enable password configured for this level
The following example shows how to set the current exec session privilege level to 15. The system prompts for the password, which the system does not display on the screen. After the administrator enters the correct password, the system enters privileged mode as indicated by the pound sign (#) in the prompt:
[local]Redback>enable 15 Password: [local]Redback#
enable authentication {none | local | radius | tacacs+}
default enable authentication
Specifies how the system performs privilege level authentication.
context configuration
none |
Specifies no privilege level password authentication. |
local |
Specifies privilege level password authentication using the local configuration. |
radius |
Specifies privilege level password authentication using the Remote Authentication Dial-In User Service (RADIUS) database. |
tacacs+ |
Specifies privilege level password authentication using the Terminal Access Controller Access Control System Plus (TACACS+) database. |
The system authenticates privilege level passwords using the local configuration database.
Use the enable authentication command to specify how the system performs privilege level authentication. If you select the none keyword, administrators are not prompted for a password when changing privilege levels.
If you enter the radius or tacacs+ keyword, you must configure the enable passwords on the RADIUS or TACACS+ system, respectively. The format of the enable password is enable [level]@ctx-name, where the level argument represents the privilege level of the password (and is not specified for level 15), and the ctx-name argument is the name of the context for which the password is configured.
Use the default form of this command to configure the system to use the default authentication (local).
The following example configures the system to authenticate privilege level passwords using RADIUS:
[local]Redback(config-ctx)#enable authentication radius
The following example shows how the administrator names would be configured on the RADIUS server for privilege level 10 and privilege level 15 in the local context:
username = enable10@local username = enable@local
enable encrypted [level level] encrypt-type password
no enable encrypted [level level encrypt-type]
Creates a password, in encrypted form, for the specified privilege level.
context configuration
level level |
Optional. Privilege level for which to configure a password. The range of values is 0 to 15. |
encrypt-type |
Type of encryption used for a password; only type 1 is supported. Optional for the no form of this command. |
password |
Password to assign to the specified privilege level. This argument is not available when using the no form of this command. |
No passwords are assigned for any privilege level.
Use the enable encrypted command to create a password, in encrypted form, for the specified privilege level.
The SmartEdge® router supports up to 16 different privilege levels (0 through 15) for both administrators and commands. Privilege levels are enabled on a per-context basis.
If password authentication is enabled, the system prompts the administrator for a password when the administrator attempts to enter the privilege level using the enable command (in exec mode). By default, local password authentication is enabled; see the enable authentication command (in context configuration mode).
This command is similar to the enable password command (in context configuration mode), except that this command requires you to enter the password in encrypted form. Typically, you use the enable password command to configure a password in unencrypted form. However, to protect your passwords, the system always displays the enable encrypted command when displaying the configuration.
Use the no form of this command to delete the password for a specific privilege level.
The following example creates an encrypted password for privilege level 15:
[local]Redback#(config-ctx)enable encrypted level 15 1 $1$...... $CMfiiltCkWPquxFsg8WPy0
The following example shows an administrator attempting to enter privilege level 15. The administrator is prompted for the password (unencrypted, and not echoed):
[local]Redback>enable 15 password: [local]Redback#
enable password [level level] password
no enable password [level level]
Configures a password for the specified privilege level that the system will encrypt.
context configuration
level level |
Optional. Privilege level for which to configure a password. The range of values is 0 to 15; the default value is 15. |
password |
Password to assign to the specified privilege level. This argument is not available when using the no form of this command. |
No passwords are assigned for any privilege level.
Use the enable password command to configure a password for the specified privilege level that the system will encrypt.
The SmartEdge router supports up to 16 different privilege levels (0 through 15) for both administrators and commands. Privilege levels are enabled on a per-context basis.
If password authentication is enabled, the system prompts an administrator for the password when the administrator attempts to enter the privilege level using the enable command (in exec mode). By default, local password authentication is enabled; see the enable authentication command (in context configuration mode).
To protect your passwords, the system does not store or display this command. Instead, the system stores and displays the password in an encrypted form. When displaying the configuration, the system uses the enable encrypted command (in context configuration mode).
Use the no form of this command to delete the password for a specific privilege level.
The following example shows an administrator attempting to enter privilege level 15. The administrator is prompted for the password to enter privilege level 15 (the password is not echoed):
[local]Redback>enable 15 password: [local]Redback#
The following example creates the s00persecret password for privilege level 15:
[local]Redback(config-ctx)#enable password level 15 s00persecret
The following example shows how the previous command is stored and displayed by the system, in its encrypted form:
[local]Redback#show configuration . . . enable encrypted 1 $1$........$AGSXlr2Tk5AsG92NBXzqi0 . . .
enable vxworks-password {password | encrypted encypt-type password}
no enable vxworks-password {password | encrypted encypt-type password}
context configuration
password |
Assign an unencrypted password for the VxWorks shell. |
encrypted |
Assign an already encrypted password for the VxWorks shell. |
encrypt-type |
Type of encryption used for a password; only type 1 is supported. |
password |
Encrypted password. |
There is no password for the VxWorks shell.
Use the enable vxworks-password command in the local context to assign a password to the VxWorks shell. You can assign a plain text password or an encrypted password.Use the no form of the command to disable the password (including the entire line that was previously configured after the no).
The following example enables an encrypted password for the VxWorks shell:
[local]Redback(config-ctx)#enable vxworks-password encrypted 1 $xttt7Hxlf.tty
encaps-access-line {pppoa-llc | pppoa-null | ipoa-llc | ipoa-null | ether-aal5-llc-fcs | ether-aal5-llc | ether-aal5-null-fcs | ether-aal5-null | ethernet | value byte-range data-link data-type}
no encaps-access-line {pppoa-llc | pppoa-null | ipoa-llc | ipoa-null | ether-aal5-llc-fcs | ether-aal5-llc | ether-aal5-null-fcs | ether-aal5-null | ethernet | value byte-range data-link data-type}
Specifies the default encapsulation of an access line.
pppoa-llc |
Specifies the Point-to-Point over Asynchronous Transfer Mode (PPPoA) Logical Link Control (LLC) encapsulation type. |
pppoa-null |
Specifies the PPPoA NULL encapsulation type. |
ipoa-llc |
Specifies the IP over ATM (IPoA) LLC encapsulation type. |
ipoa-null |
Specifies the IPoA NULL encapsulation type. |
ether-aal5-llc-fcs |
Specifies the Ethernet ATM adaption layer type 5 (AAL5) Logical Link Control (LLC) with Frame Check Sequence (FCS) encapsulation type. |
ether-aal5-llc |
Specifies the Ethernet over AAL5 LLC without FCS encapsulation type. |
ether-aal5-null-fcs |
Specifies the Ethernet over AAL5 LLC NULL FCS encapsulation factor encapsulation type. |
ether-aal5-null |
Specifies the Ethernet over AAL5 NULL without FCS encapsulation type. |
ethernet |
Specifies the Ethernet encapsulation type. |
value byte-range |
Value of overhead in bytes. The range of values is 0 to 255; the default value is 0. |
data-link data-type |
Data link type; valid values for the data-type arguments are ATM or Ethernet. |
The size of the overhead is 0 bytes; the data-link type is ATM must be set.
Use the encaps-access-line command to specify the encapsulation size, in bytes, for a specific access-line type. This command determines the Layer 2 overhead value of the access-line type.
The Layer 2 overhead value is the number of bytes per packet of overhead for the access-line encapsulation types. Table 1 lists supported access-line encapsulation types and the number of bytes per packet of overhead for each. If the encapsulation type is not listed in Table 1, you can specify number of bytes of overhead, along with the data-link type (Ethernet or ATM).
Encapsulation Type |
Bytes of Overhead |
Overhead Components |
---|---|---|
pppoa-llc |
12 |
8 bytes—AAL5 trailer 3 bytes—LLC 1 byte—NLPID |
pppoa-null |
8 |
8 bytes—AAL5 trailer |
ipoa-llc |
16 |
8 bytes—AAL5 trailer 8 bytes—LLC/snap |
ipoa-null |
8 |
8 bytes—AAL5 trailer |
ether-aal5-llc-fcs |
36 |
8 bytes—AAL5 trailer 8 bytes—LLC/snap 14 bytes—Ethernet header 4 bytes—FCS 2 bytes—padding |
ether-aal5-llc |
32 |
8 bytes—AAL5 trailer 8 bytes—LLC/snap 14 bytes—Ethernet header 2 bytes—padding |
ether-aal5-null-fcs |
28 |
8 bytes—AAL5 trailer 14 bytes—Ethernet header 4 bytes—FCS 2 bytes—padding |
ether-aal5-null |
24 |
8 bytes—AAL5 trailer 14 bytes—Ethernet header 2 bytes—padding |
ethernet |
18 |
14 bytes—Ethernet header 4 bytes—FCS |
Use the no form of this command to specify the default access-line encapsulation type.
The following example configures an overhead profile for example1, and sets the default rate factor to 15, a reserve value to 8, and the encapsulation type to pppoa-llc. After you set the overhead profile with default values, you configure adsl1 and vdsl1 with custom encapsulation and reserve values:
[local]Redback(config)#qos profile example1 overhead [local]Redback(config-profile-overhead)#rate-factor 15 [local]Redback(config-profile-overhead)#encaps-access-line pppoa-llc [local]Redback(config-profile-overhead)#reserved 8 [local]Redback(config-profile-overhead)#type adsl1 [local]Redback(config-type-overhead)#encaps-access-line pppoa-null
encapsulation pppoe
no encapsulation pppoe
Specifies the encapsulation type of the port pseudowire connection.
port pseudowire configuration
pppoe |
Sets the encapsulation type of the port pseudowire connection to PPPoE. |
None
Use the encapsulation command to set the encapsulation type of the port pseudowire connection to a specified protocol.
Use the no form of this command to remove the encapsulation type of the port pseudowire connection from the currently specified protocol.
The following example shows how to set the encapsulation type to pppoe:
[local]Redback(config-port)#encapsulation pppoe
encapsulation {cisco-hdlc | frame-relay | ppp}
no encapsulation
Specifies the encapsulation type for a clear-channel DS-3 channel or port, E3 port, DS-1 channel on a channelized DS-3 channel or port, E1 channel or port, or DS-0 channel group on a channelized E1 channel or port.
cisco-hdlc |
Specifies the encapsulation type as Cisco High-Level Data Link Control (HDLC) (Cisco’s proprietary HDLC encapsulation of IP); this is the default. |
frame-relay |
Specifies the encapsulation type as Frame Relay, as described in RFC 1490, Multiprotocol Interconnect over Frame Relay. |
ppp |
Specifies the encapsulation type as Point-to-Point Protocol (PPP) encapsulation, as described in RFC 1662, PPP in HDLC-like Framing. |
The default encapsulation type is Cisco HDLC.
Use the encapsulation (channels) command to specify the encapsulation type for a clear-channel DS-3 channel or port, E3 port, DS-1 channel on a channelized DS-3 channel or port, E1 channel or port, or DS-0 channel group on a channelized E1 channel or port.
The commands that are available depend on the encapsulation type specified by this command. For example, if you specify Cisco HDLC, none of the Frame Relay commands are available.
Use the no form of this command to specify the default encapsulation type.
Caution! | ||
Risk of data loss. If the encapsulation of a channel or port is
changed, some channel or port information and all circuits and circuit
configurations, including any binding information, for that channel
or port are deleted. To reduce the risk, postpone creating circuits
and bindings until you have determined the encapsulation of the channel
or port.
|
The following example shows how to specify Frame Relay encapsulation on a clear-channel DS-3 channel:
[local]Redback(config)#port ds3 3/1:1 [local]Redback(config-ds3)#encapsulation frame-relay
encapsulation dot1q
no encapsulation
Specifies the encapsulation for an Ethernet port to create 802.1Q permanent virtual circuits (PVCs).
port configuration
dot1q |
Specifies 802.1Q encapsulation to support 802.1Q PVCs on the Ethernet port. |
The encapsulation is IP over Ethernet (IPoE).
Use the encapsulation (802.1Q) command to specify the encapsulation for an Ethernet port to create 802.1Q PVCs.
Use the no form of this command to specify IP over Ethernet encapsulation.
Caution! | ||
Risk of data loss. When you use the no form of this
command to specify IPoE encapsulation, all 802.1Q PVCs defined on
the port are deleted. To reduce the risk, ensure that the PVCs are
not active before issuing the no form of this command.
|
The following example shows how to specify 802.1Q encapsulation for port 1 in slot 4:
[local]Redback(config)#port ethernet 4/1 [local]Redback(config-port)#encapsulation dot1q
encapsulation {dot1q | pppoe}
{no | default} encapsulation
Specifies the encapsulation type for the access link group.
link-group configuration
dot1q |
Specifies 802.1Q encapsulation for the ports to be added to the link group. |
pppoe |
Specifies Point-to-Point Protocol over Ethernet (PPPoE) encapsulation for the ports to be added to the link group. |
no | default |
Use the no or default keyword to reset the encapsulation of the link group to it default IP over Ethernet (IPoE) encapsulation type; that is no encapsulation. |
An access link group is created with IPoE encapsulation.
Use the encapsulation (access lg) command to specify the encapsulation for the access link group.
If you specify the dot1q keyword, you can use the bind authentication or the bind auto-subscriber command (in link-group configuration mode) to bind the link group to its interface. For 802.1Q encapsulation, the value for the max-ses argument in the bind authentication command is 1.
If you specify the pppoe keyword, you can use the bind authentication or bind subscriber command to bind the link group to its interface. For PPPoE encapsulation, the value of max-ses in the bind authentication command must be greater than 1.
Use the no or default form of this command to specify the default encapsulation.
The following example shows how to create an 802.1Q-encapsulated access link group:
[local]Redback(config)#link-group foo access [local]Redback(config-link-group)#encapsulation dot1q [local]Redback(config-link-group)#bind authentication pap chap maximum 3
The following example shows how to create a PPPoE-encapsulated access link group:
[local]Redback(config)#link-group foo access [local]Redback(config-link-group)#encapsulation pppoe [local]Redback(config-link-group)#bind authentication pap chap maximum 3
encapsulation {cisco-hdlc | frame-relay | ppp}
no encapsulation
Specifies the encapsulation type for a Packet over SONET/SDH (POS) port.
port configuration
cisco-hdlc |
Specifies Cisco High-Level Data Link Control (HDLC) or other higher layer protocol as the encapsulation type; this is the default. |
frame-relay |
Specifies Frame Relay as the encapsulation type as described in RFC 1490, Multiprotocol Interconnect over Frame Relay. |
ppp |
Specifies Point-to-Point Protocol (PPP) encapsulation, as described in RFC 2615, PPP over SONET/SDH and RFC 1662, PPP in HDLC-like Framing as the encapsulation type. |
The encapsulation type for POS ports is Cisco HDLC.
Use the encapsulation (POS) command to specify the encapsulation type for a POS or Ethernet port.
The commands that are available depend on the encapsulation type specified by this command. For example, if you specify Cisco HDLC, none of the Frame Relay commands are available.
Use the no form of this command to specify the default encapsulation type.
The following example shows how to specify Frame Relay encapsulation for a POS port:
[local]Redback(config)#port pos 4/1 [local]Redback(config-port)#encapsulation frame-relay
encapsulation pppoe
no encapsulation
Specifies the encapsulation type for an Ethernet port without 802.1Q permanent virtual circuits (PVCs).
port configuration
pppoe |
Specifies Point-to-Point over Ethernet (PPPoE) encapsulation. |
The default encapsulation type for Ethernet ports is IP over Ethernet (IPoE).
Use the encapsulation (PPPoE) command to specify the encapsulation type for an Ethernet port without 802.1Q PVCs.
Use the no form of this command to specify the default encapsulation type.
The following example shows how to specify PPPoE encapsulation for an Ethernet port:
[local]Redback(config)#port ethernet 4/1 [local]Redback(config-port)#encapsulation pppoe
encrypt sharedkey delimiter character
no encrypt
Encrypts the identity attributes associated with the redirected subscriber HTTP session.
HTTP redirect profile configuration
sharedkey |
Shared key used to encrypt the identity attributes associated with the redirected subscriber HTTP session. |
delimiter character |
Character that marks when the encrypted data starts and ends. The delimiter character is not displayed as part of the redirected subscriber HTTP session. |
The identity attributes associated with the redirected subscriber HTTP session are redirected in plain text.
Use the encrypt command to encrypt the identity attributes associated with the redirected subscriber HTTP session. The encryption ensures the confidentiality of the identity attributes.
Use the no form of this command to remove the encrypt command from the HTTP redirect profile.
To encrypt the identity attributes associated with a redirected subscriber HTTP session, the SmartEdge router performs an Exclusive Or (XOR) operation. The router takes the variable representing each identity attribute and then applies the XOR operator to each character using a shared key. The identity attributes and sharedkey are all in ASCII text. The XOR operation on the ASCII text produces binary text. Because it is required that the URL be transmitted in ASCII text, the binary text is encoded to a two-character hexadecimal value. To decrypt the string of hexadecimal values, map each two-character hexadecimal value to its ASCII value and apply the XOR operation to it using the same shared key.
If the shared key is shorter than the combined string of identity attributes, the shared key is repeated within the XOR equation so that each ASCII value that represents a value for the identity attribute is paired with a value from the shared key. For instance, here are sample identity attributes and a shared key to encrypt:
Here is what the XOR equation looks like using this data:
joe@example.com10.1.11.22 abcdabcdabcdabcdabcdabcda
Here is an example of a redirected HTTP session that is encrypted:
where 061413144a57515658514a50514f504f is the encrypted data.
See the Configuring HTTP Redirect document.
end
Exits the current configuration mode and returns to exec mode.
all configuration modes
This command has no keywords or arguments.
None
Use the end command to exit the current configuration mode and return to exec mode. When you enter this command, all commands that you have entered since the beginning of the configuration session, or since the last abort or commit command (in configuration mode), are committed to the database.
The following example displays an administrator exiting interface configuration mode and returning to exec mode:
[local]Redback(config-if)#end [local]Redback#
endpoint-independent filtering udp
{no endpoint-independent filtering udp
Enables Endpoint-Independent Filtering, allowing point-to-multipoint (P2MP) traffic for all UDP traffic in the current class.
This command has no keywords or arguments.
NAT operates in point-to-point (P2P) mode using Address-Dependent Filtering with firewall enabled for all UDP traffic in the current class.
Use the endpoint-independent filtering udp command to enable Endpoint-Independent Filtering as described by RFC 4787, Network Address Translation (NAT) Behavioral Requirements for Unicast UDP, REQ 8. Enabling Endpoint-Independent Filtering allows P2MP UDP traffic: an internal host can initiate multiple simultaneous sessions from a single endpoint (as defined by a private IP address, private port, and UDP port) to multiple distinct points on the external network.
The SmartEdge router allows Endpoint-Independent Filtering to be applied at the class level within a NAT policy, so that P2MP traffic can be enabled for selected UDP traffic streams. Alternatively, Endpoint-Independent Filtering can be applied to the default class, at the policy level. Endpoint-Independent Filtering is not supported for TCP traffic.
You must specify either an existing address pool (using the pool command) or the "ignore" action (using the ignore command).
You cannot enable Endpoint-Independent Filtering with an action of "drop"; if you configure an action of "drop" for the class, the system returns a warning. If you do configure an action of "drop" for the class, the system disables Endpoint-Independent Filtering.
Similarly, you cannot use Endpoint-Independent Filtering together with destination NAT (DNAT). If you try to configure DNAT when Endpoint-Independent Filtering is enabled, or vice versa, the system issues a warning.
When P2MP mode is enabled, it is applied to all UDP traffic in the class. This can make the private host initiating UDP traffic from a given port susceptible to UDP traffic from any host through that port; care should be taken to protect the initiating host from a Denial of Service (DoS) attack.
When you enable Endpoint-Independent Filtering , the change applies only to new NAPT sessions; P2MP functionality is not added for existing sessions. Similarly, when you disable Endpoint-Independent Filtering, the change applies only to new NAPT sessions; P2MP functionality is not removed for existing sessions.
When Endpoint-Independent Filtering is used together with a DMZ, it limits the DMZ functionality. If the P2MP NAT IP addresses configured for the class overlap with those in the DMZ rules, then return traffic to the private host (from which the UDP traffic initiated) is treated differently. In cases where return NAPT traffic would be dropped because the return source destination does not match the original outgoing destination IP address ( "destination address mismatch"), traffic is not dropped as expected, but is translated and sent to the private host from which the UDP traffic originated. (If the return traffic is dropped for other reasons than destination address mismatch, it is dropped as expected and redirected to the DMZ server.)
Use the no form of this command to disable P2MP mode for the current class, restoring P2P mode.
The following example enables P2MP mode for all UDP traffic in the class yes_p2mp:
[local]Redback(config)#context nat_context [local]Redback(config-ctx)#nat policy basic_nat [local]Redback(config-policy-nat)#drop [local]Redback(config-policy-nat)#access group basic_nat_rules [local]Redback(config-policy-group)#class yes_p2mp [local]Redback(config-policy-group-class)#pool NAPT_POOL local [local]Redback(config-policy-group-class)#endpoint-independent filtering udp [local]Redback(config-policy-group-class)#exit [local]Redback(config-policy-group)#class firewall [local]Redback(config-policy-group-class)#pool NAPT_POOL local [local]Redback(config-policy-group-class)#exit [local]Redback(config-policy-group)#class no_NAT [local]Redback(config-policy-group-class)#ignore
enforce first-as
no enforce first-as
Enables verification of the first AS number in a received AS path from an eBGP peer.
BGP neighbor configuration
This command has no keywords or arguments.
This command is enabled.
Use the enforce first-as command to enable verification of the first AS number in a received AS path from an eBGP peer.
By default, a BGP router compares the remote AS number of an eBGP peer with the AS number of the first segment in the paths received from that peer. If those AS numbers do not match, the BGP router:
Use the show configuration bgp command to see whether first-AS-path verification is enabled or disabled for a BGP neighbor.
Use the no form for this command to disable first-AS-path verification for a BGP neighbor.
The following example disables the verification of the first AS number in a received AS path from eBGP peer10.10.10.20:
[local]Redback(config-bgp)#neighbor 10.10.10.20 external [local]Redback(config-bgp-neighbor)#no enforce first-as
The following example enables the verification of the first AS number in a received AS path from the eBGP peer10.10.10.20::
[local]Redback(config-bgp)#neighbor 10.10.10.20 external [local]Redback(config-bgp-neighbor)#enforce first-as
enforce ttl
no enforce ttl
Enables Border Gateway Protocol (BGP) time-to-live (TTL) security check in the kernel for the specified BGP neighbor or BGP peer group.
This command has no keywords or arguments.
BGP TTL security check is not enabled in kernel.
Use the enforce ttl command to enable BGP TTL security check in the kernel for the specified BGP neighbor or BGP peer group.
The BGP TTL security check feature can be used instead of, or in conjunction with, the BGP Session Protection via TCP Message Digest 5 (MD5) signature option for external BGP (eBGP); however, the TTL-based security check mechanism is more simple to operate because it does not require the coordination for managing the MD5 keys.
Caution! | ||
Risk of data loss. Enabling the BGP TTL security check on only
one end of an eBGP session causes the session to drop. To reduce the
risk, verify that the BGP TLL security check feature is enabled on
both ends of the eBGP session.
|
The BGP TTL security check is designed to protect the BGP infrastructure from CPU-utilization based attacks caused by sending control traffic that appears to be valid control traffic to a BGP session. It protects the BGP infrastructure by setting the value of the TTL field to 255 in outgoing BGP packets, and dropping incoming BGP packets that have TTL values less than the maximum TTL value (255) minus the maximum number of eBGP hops allowed.
For example, if you use the ebgp-multihop command to set the maximum number of hops used to reach an eBGP neighbor to two, then you should receive eBGP packets with TTL values of no less than 253 (255 - 2). When the BGP TTL security check is enabled using the enforce ttl command, all incoming BGP packets that have a TTL value less than 253 are dropped.
If the ebgp-multihop command is not used to set the maximum number of hops, then the default maximum hop value of 1 is used, and the BGP TTL security check drops all incoming BGP packets with TTL values less than 254.
The following example enables the BGP TTL security check to drop all BGP packets with a TTL value lower than 254 received from BGP neighbor, 10.10.10.20:
[local]Redback(config-bgp)#neighbor 10.10.10.20 external [local]Redback(config-bgp-neighbor)#enforce ttl
equipment-loopback {customer | network}
default equipment-loopback
Enables an Asynchronous Transfer Mode (ATM) DS-3 port to respond to or ignore remote loopback requests.
ATM DS-3 configuration
customer |
Configures the ATM DS-3 port to respond to remote loopback requests; this is the default. |
network |
Configures the ATM DS-3 port to ignore remote loopback requests. |
The ATM DS-3 port responds to remote loopback requests.
Use the equipment-loopback command to configure an ATM DS-3 port to respond to or ignore remote loopback requests.
Use the default form of this command to return to the port to its default behavior of responding to remote loopback requests.
The following example shows how to configure port 1 on the ATM DS-3 traffic card in slot 3 to ignore remote loopback requests:
[local]Redback(config)#port atm 3/1 [local]Redback(config-atm-ds3)#equipment-loopback network
equipment-loopback {customer | network}
default equipment-loopback
Configures a DS-3 channel or port, either clear-channel or channelized, or a DS-1 channel, to respond to or ignore remote loopback requests.
customer |
Configures the channel or port to respond to remote loopback requests; this is the default. |
network |
Configures the channel or port to ignore remote loopback requests. |
The channel or port responds to remote loopback requests.
Use the equipment-loopback command to configure a DS-3 channel or port, either clear-channel or channelized, or a DS-1 channel, to respond to or ignore remote loopback requests.
Use the default form of this command to configure the channel or port to respond to remote loopback requests.
The following example shows how to configure DS-3 channel 1 on port 1 on the channelized OC-12 traffic card in slot 3 to ignore remote loopback requests:
[local]Redback(config)#port ds3 3/1:1 [local]Redback(config-ds3)#equipment-loopback network
ethernet-cfm instance-name
{no | default} ethernet-cfm instance-name
Creates a CFM instance and enters CFM configuration mode where the parameters of the maintenance points in the instance can be specified.
global configuration
instance-name |
The name used to identify the CFM service instance on the SmartEdge router. |
No CFM service instances exist.
Use the cfm command to create a CFM instance and enter the CFM configuration mode where the parameters of the maintenance points in the instance can be specified. You can create multiple CFM instances.
restriction synopsis |
restriction description |
---|---|
Each service instance is limited to a single maintenance domain (MD) and a single MD level. |
Effectively, each service instance is equivalent to a MD. |
Each MD name must be unique within the SmartEdge router. |
The MD names created in the CFM instances of the SmartEdge router must be unique even if they occur in different CFM instances. |
The default MD name is the same as the CFM instance name set by the ethernet-cfm command.
The following example shows how to use this command to create the maintenance instance instance-1 at MD level 4:
[local]Redback(config)#ethernet-cfm instance-1 [local]Redback(config-ether-cfm)#level 4
ethernet-cfm linktrace from {local-mep | {circuit | link-group} [transport | vlan]} to {dest-mac | rmep} level
Initiates a CFM link-trace from a specified circuit, transport circuit, Ethernet link group, port, or local maintenance association endpoint (MEP) to a specified remote MEP (RMEP) or MAC address.
The link-trace transaction ID is displayed in the output when you run the ethernet-cfm linktrace command.
exec (10)
local-mep |
md md-id ma ma-id mep mep-id Specifies the maintenance domain (MD), maintenance association (MA), and ID of a local MEP where the link-trace starts. The value specified for this argument must correspond to a valid 802.1Q PVC. |
circuit |
slot/port [:ch:sub] Specifies the Ethernet circuit or port where the link-trace starts. |
link-group |
lg {link-group-name | id link-group-id} Specifies the link group where the link-trace starts. |
transport |
transport {transport-vlans | any} Use this construct when initiating the link-trace from transport circuits bound to a MEP. Specifies the transport circuits initiating the link-trace. The transport-vlans argument can be either a range or a single VLAN. It must be one of the following constructs:
If you enter any, the vlan-id that follows specifies the link-trace initiator. In the following example, 33:68 would be the link-trace initiator: ...transport any vlan-id 33:68... |
vlan |
vlan-id vlan-id Specifies the parent circuit of link-trace. If no transport circuits are specified in the command, this parameter also specifies the VLAN tag of the loopback initiator. The vlan-id argument is one of the following constructs:
The vlan-id argument must also specify a PVC configured in the link group or port specified by the link-group or circuit arguments. |
dest-mac |
nn:nn:nn:nn:nn:nn Specifies the MAC address of the device where the link-trace ends. |
rmep |
rmep rmep-id Specifies the ID of the remote maintenance association endpoint (RMEP) where the link-trace ends. The value specified for this argument must correspond to a valid 802.1Q PVC. |
level |
level level Specifies the MD level of the device initiating the link-trace. Enter an integer from 0 to 7. |
There is no default behavior.
The following example illustrates the ethernet-cfm linktrace command:
[local]Redback#ethernet-cfm linktrace from 5/1 to 00:01:02:03:ab:12 level 3
ethernet-cfm loopback from {local-mep | {circuit | link-group} [[transport] vlan]} to {dest-mac | rmep} level [data] [size]
Initiates a CFM loopback message (LBM) from a specified circuit, transport circuit, Ethernet link group, port, or local maintenance association endpoint (MEP) to a specified remote MEP (RMEP) or MAC address.
exec (10)
local-mep |
md md-id ma ma-id mep mep-id Specifies the maintenance domain (MD), maintenance association (MA), and ID of a local MEP from which the LBR is sent. The value specified for this argument must correspond to a valid 802.1Q PVC. |
circuit |
slot/port [:ch:sub] Specifies the Ethernet circuit or port from which the LBR is sent. |
link-group |
lg {link-group-name | id link-group-id} Specifies the link group from which the LBR is sent. |
transport |
transport {transport-vlans | any} Use this construct when initiating the loopback from transport circuits bound to a MEP. Specifies the transport circuits initiating the loopback. The transport-vlans argument can be either a range or a single VLAN. It must be one of the following constructs:
If you enter any, the vlan-id that follows specifies the loopback initiator. In the following example, 33:68 would be the loopback initiator: ...transport any vlan-id 33:68... |
vlan |
vlan-id vlan-id Specifies the parent circuit of loopback. If no transport range is specified in the command, this parameter also specifies the VLAN tag sent in the LBR as the loopback initiator. The vlan-id argument is one of the following constructs:
The vlan-id argument must also specify a PVC configured in the link group or port specified by the link-group or circuit arguments. |
dest-mac |
nn:nn:nn:nn:nn:nn Specifies the MAC address of the device to which the LBR is sent and which returns the LBR. |
rmep |
rmep rmep-id Specifies the ID of the remote maintenance association endpoint (RMEP) to which the LBR is sent and which returns the LBR. The value specified for this argument must correspond to a valid 802.1Q PVC. |
level |
level level Specifies the MD level of the device initiating the loopback. Enter an integer from 0 to 7. |
data data |
data data Specifies the data carried by the LBR PDU. Up to 127 ASCII characters can be specified. If data data is not specified, CFM loopbacks are sent without any data. |
size |
size size The loopback message (LBM) size. The (LBM) contains the number of bytes specified by this parameter in which the data pattern specified by data data is repeated as many times as it takes to reach the specified size. You can specify up to 1500 bytes for the LBM size. |
There is no default behavior.
The following example illustrates the ethernet-cfm loopback command in which the LBM carries the data string, 324cuai:
[local]Redback#ethernet-cfm loopback from 5/1 to 00:01:02:03:ab:12 level 5 data 324cuai
ethernet {802.1p-value | all} to qos pd-value
default ethernet {802.1p-value | all}
Translates Ethernet 802.1p values to packet descriptor (PD) quality of service (QoS) values on ingress.
class map configuration
802.1p-value |
An integer from 0 (lowest priority) to 7 (highest priority) representing the contents of the three user priority bits in the 802.1p virtual LAN (VLAN) Tag Control Information (TCI) field. |
all |
Maps all valid values for the source value to the specified target value. Any existing configuration for the classification map is overridden. |
pd-value |
An integer from 0 to 63 (six bits), with the packet priority encoded in three higher-order bits and the packet drop precedence in the three lower-order bits. You can enter the value in decimal or hexadecimal format, for example 16 or 0x10. You can also enter a standard Differentiated Services Code Point (DSCP) marking label as defined in DSCP Class Keywords. The scale used by this command for packet priority, from 0 (lowest priority) to 7 (highest priority), is the relative inverse of the scale used by the mark priority command. For details on this command, see Configuring Rate-Limiting and Class-Limiting. |
None
Use the ethernet to qos command to define ingress mappings from Ethernet 802.1p values to PD QoS values.
If you specify the all keyword, all valid 802.1p values are mapped to the specified PD value. Any existing configuration for the classification map is overridden. You can use the all keyword to specify a single default value for all the mapping entries, then override that value for a subset of entries by entering subsequent mapping commands without this keyword.
Use the default form of this command to revert one or all map entries to either the default 8P0D or mapping schema values, if a mapping schema has been specified.
The following example defines the classification map 8021p-to-pd for PD bits on ingress, then maps the Ethernet 802.1p values 1 and 7 to PD user priority values af33 and af21, respectively:
[local]Redback(config)#qos class-map 8021p-to-pd ethernet in [local]Redback(config-class-map)#ethernet 1 to qos af33 [local]Redback(config-class-map)#ethernet 7 to qos af21
ethernet {802.1p-value | all} use-ip [class-map-name]
default ethernet {802.1p-value | all}
For IP packets, determines packet descriptor (PD) values by mapping IP Differentiated Services Code Point (DSCP) values instead of Ethernet 802.1p values on ingress. For IPv4 packets, the DSCP marking is the upper six bits of the IPv4 header Type of Service (ToS) field. For IPv6 packets, the DSCP marking is the upper six bits of the IPv6 header Traffic Class field.
class map configuration
802.1p-value |
An integer from 0 (lowest priority) to 7 (highest priority) representing the contents of the three user priority bits in the 802.1p virtual LAN (VLAN) Tag Control Information (TCI) field. |
all |
Maps all valid values for the source value to the specified target value. Any existing configuration for the classification map is overridden. |
use-ip |
Enables a secondary mapping lookup using the packet’s DSCP bits as input. If no classification map is specified for the secondary lookup, the default DSCP-to-target mapping is used. |
class-map-name |
Optional. Name of the secondary classification map. |
None
Use the ethernet use-ip command to set initial PD values based on IP header DSCP bits instead of Ethernet 802.1p values on ingress.
If you specify the all keyword, all valid 802.1p values are configured to use DSCP-to-PD mapping. Any existing configuration for the classification map is overridden. You can use the all keyword to specify a single default value for all the mapping entries, then override that value for a subset of entries by entering subsequent mapping commands without this keyword.
If you specify the optional class-map-name argument, the resulting DSCP-to-PD mapping uses the specified DSCP-to-PD classification map. The secondary classification map must have a value of ip for the marking-type argument, and a value of in for the mapping direction. If no secondary classification map is specified, the default DSCP-to-target mapping is used.
Use the default form of this command to revert one or all map entries to either the default 8P0D or mapping schema values, if a mapping schema has been specified.
The following example defines the classification map 8021p-to-pd to determine initial QoS PD values on ingress, and specifies 7P1D encoding as a default mapping schema. It then overrides the default 7P1D values for Ethernet 802.1p value 1 with PD value 0x24, and specifies that the IP header DSCP value determines the initial QoS PD value for packets received with Ethernet 802.1p value 3:
[local]Redback(config)#qos class-map 8021p-to-pd ethernet in [local]Redback(config-class-map)#mapping-schema 7P1D [local]Redback(config-class-map)#ethernet 1 to qos 0x24 [local]Redback(config-class-map)#ethernet 3 use-ip
eventtype {communicationsAlarm | envirnomentalAlarm | equipmentAlarm | integrityViolation | operationalViolation | other | physicalViolation | processingErrorAlarm | qualityOfServiceAlarm | securityServideOrMechanismViolation | timeDomainViolation}
no eventtype
Describes the alarm communication event type.
SNMP alarm model configuration
communicationsAlarm |
The alarm is related to the communication between systems. |
envirnomentalAlarm |
The alarm is related to the functions of the network environment. |
equipmentAlarm |
The alarm is caused by a problem with the equipment or hardware in your network. |
integrityViolation |
The alarm is a result of a breach in system integrity. |
operationalViolation |
The alarm is a result of a problem with the operation of the system. |
other |
The alarm is related to some other problem that is not a communication, environmental, equipment, integrity, operational, physical, processing error, quality of service, security service or mechanism, or time problem. |
physicalViolation |
The alarm is related to a physical violation of the system. |
processingErrorAlarm |
The alarm is a result of a processing error |
qualityOfServiceAlarm |
The alarm is a result of a problem with QoS. |
securityServiceOrMechanismViolation |
The alarm is a result of problem with security service or a security mechanism. |
timeDomainViolation |
The alarm is a result of a time domain violation. |
None
Use the eventtype command to describe the notification event that the alarm model identifies. These values are a subset to those defined by IANAItuEventType. Running this command results in an entry in the ituAlarmTable.
Use the no form of this command to remove the alarm description.
The following example configures the alarm description as qualityofservice.
[local]jazz#config [local]jazz(config)#snmp alarm model 1 state clear [local]jazz(config-snmp-alarmmodel)#eventtype qualityofservice [local]jazz(config-snmp-alarmmodel)#exit
exceed drop [qos-priority group-num]
{no | default} exceed drop [qos-priority group-num]
Specifies how packets are dropped when the traffic rate exceeds the quality of service (QoS) rate and burst tolerance.
qos-priority group-num |
Optional. Priority group number. This option is available only if the QoS rate is configured with an excess burst tolerance. The range of values for the group-num argument is 0 to 7. |
If the excess burst tolerance is not configured, all packets exceeding the QoS burst tolerance are dropped. If the excess burst tolerance is configured, packets exceeding the QoS burst tolerance are dropped randomly.
Use the exceed drop command to specify how packets are dropped when the traffic rate exceeds the QoS rate and burst tolerance. Use this command as part of a policing policy for incoming packets and as part of a metering policy for outgoing packets.
You can configure the traffic rate, burst tolerance, and excess burst tolerance with the rate command (in policy ACL class, metering policy, or policing policy configuration mode). The following conditions determine how packets are dropped:
If the excess burst tolerance is configured, and the traffic rate does not exceed the excess burst tolerance, packets are dropped according to one of the following conditions:
Caution! | ||
Risk of overriding configurations. The SmartEdge router checks for and applies marking in a specific
order. To reduce the risk, remember the following guidelines: Circuit-based
marking overrides class-based marking and Border Gateway Protocol
(BGP) destination-based marking, through route maps, overrides both
circuit-based and class-based marking.
|
Use the no or default form of this command to specify the default condition.
The following example drops packets that exceed the traffic rate and burst tolerance:
[local]Redback(config)#qos policy protection1 policing [local]Redback(config-policy-policing)#rate 10000 burst 100000 [local]Redback(config-policy-rate)#exceed drop
exceed mark dscp dscp-class
{no | default} exceed mark dscp
Assigns a quality of service (QoS) Differentiated Services Code Point (DSCP) priority to IP packets that exceed the configured QoS rate and burst tolerance. For IPv4 packets, the DSCP marking is the upper six bits of the IPv4 header Type of Service (ToS) field. For IPv6 packets, the DSCP marking is the upper six bits of the IPv6 header Traffic Class field.
dscp-class |
Priority with which packets exceeding the rate are marked. Values can be:
|
Packets exceeding the policing rate are dropped.
Use the exceed mark dscp command to mark packets that exceed the configured rate with a DSCP value.
To configure the rate, enter the rate command (in policy ACL class, metering policy, or policing policy configuration mode). Only one mark instruction can be in effect at a time. To change the mark instruction, enter the exceed mark dscp command, specifying a new value for the dscp-class argument. This supersedes the one previously configured.
Table 3 lists the keywords for the dscp-class argument.
DSCP Class |
Keyword |
DSCP Class |
Keyword |
---|---|---|---|
Assured Forwarding (AF) Class 1 /Drop precedence 1 |
af11 |
Class Selector 0 (same as default forwarding) |
cs0 (same as df) |
AF Class 1/Drop precedence 2 |
af12 |
Class Selector 1 |
cs1 |
AF Class 1/Drop precedence 3 |
af13 |
Class Selector 2 |
cs2 |
AF Class 2/Drop precedence 1 |
af21 |
Class Selector 3 |
cs3 |
AF Class 2/Drop precedence 2 |
af22 |
Class Selector 4 |
cs4 |
AF Class 3/Drop precedence 3 |
af23 |
Class Selector 5 |
cs5 |
AF Class 3/Drop precedence 1 |
af31 |
Class Selector 6 |
cs6 |
AF Class 3/Drop precedence 2 |
af32 |
Class Selector 7 |
cs7 |
AF Class 3/Drop precedence 3 |
af33 |
Default Forwarding (same as Class Selector 0) |
df (same as cs0) |
AF Class 4/Drop precedence 1 |
af41 |
Expedited Forwarding |
ef |
AF Class 4/Drop precedence 2 |
af42 |
||
AF Class 4/Drop precedence 3 |
af43 |
Caution! | ||
Risk of packet reordering. To reduce the risk, ensure that the
marking of conforming packets and exceeding packets differ only within
a major DSCP class. Major DSCP classes are identified by the Class
Selector code, and include CS0=DF, CS1=AF11, AF12, AF13, CS2=AF21,
AF22, AF23, CS3=AF31, AF32, AF33, CS4=AF41, AF42, AF43, and CS5=EF.
For example, if you mark conforming packets with AF11 and you want
to avoid reordering, mark exceeding packets with AF11, AF12, or AF13
only.
|
Caution! | ||
Risk of overriding configurations. The SmartEdge router checks for and applies marking in a specific
order. To reduce the risk, remember the following guidelines: Circuit-based
marking overrides class-based marking and Border Gateway Protocol
(BGP) destination-based marking, through route maps, overrides both
circuit-based and class-based marking.
|
Use the no or default form of this command to return to the default behavior of dropping packets that exceed the rate.
The following example configures the policy to mark all packets that conform to the configured rate with a DSCP value representing a high priority and drops all packets that exceed the rate:
[local]Redback(config)#qos policy protection1 policing [local]Redback(config-policy-policing)#rate 10000 burst 100000 [local]Redback(config-policy-rate)#conform mark dscp ef
exceed mark precedence prec-value
{no | default} exceed mark precedence
Assigns a quality of service (QoS) Differentiated Services Code Point (DSCP) drop-precedence value to IP packets that exceed the configured QoS rate. For IPv4 packets, the DSCP marking is applied to the IPv4 header Type of Service (ToS) field. For IPv6 packets, the DSCP marking is applied to the IPv6 header Traffic Class field. In either case, the specific bits affected are those denoted by dd in the octet field with the format pppddxxx.
prec-value |
Drop precedence bits value. See Table 4. |
Packets exceeding the policy rate are dropped.
Use the exceed mark precedence command to mark packets that exceed the configured rate with a drop precedence value corresponding to the AF class of the packet.
To configure the rate, enter the rate command (in policy ACL class, metering policy, or policing policy configuration mode).
In general, the level of forwarding assurance of an IP packet is based on: (1) the resources allocated to the AF class to which the packet belongs, (2) the current load of the AF class, and, in case of congestion within the class, (3) the drop precedence of the packet. In case of congestion, the drop precedence of a packet determines the relative importance of the packet within the AF class. Packets with a lower drop precedence value are preferred and protected from being lost, while packets with a higher drop precedence value are discarded.
With AF classes AF1 (AF11, AF12, AF13), AF2 (AF21, AF22, AF23), AF3 (AF31, AF32, AF33), and AF4 (AF41, AF42, AF43), the second integer represents a drop precedence value. Table 4 shows how the AF drop precedence value of an incoming packet is changed when it exits the SmartEdge router after being tagged with a new drop precedence. (See also RFC 2597, Assured Forwarding PHB Group.)
DSCP Value of an Incoming Packet |
Packet is Tagged with a Drop Precedence Value |
DSCP Value of the Outgoing Packet |
---|---|---|
AF11, AF12, AF13 AF21, AF22, AF23 AF31, AF32, AF33 AF41, AF42, AF43 |
1 |
AF11 AF21 AF31 AF41 |
AF11, AF12, AF13 AF21, AF22, AF23 AF31, AF32, AF33 AF41, AF42, AF43 |
2 |
AF12 AF22 AF32 AF42 |
AF11, AF12, AF13 AF21, AF22, AF23 AF31, AF32, AF33 AF41, AF42, AF43 |
3 |
AF13 AF23 AF33 AF43 |
Only one mark instruction can be in effect at a time. To change the mark instruction, enter the exceed mark precedence command, specifying a new value for the prec-value argument, which supersedes the one previously configured.
Caution! | ||
Risk of overriding configurations. The SmartEdge router checks for and applies marking in a specific
order. To reduce the risk, remember the following guidelines: Circuit-based
marking overrides class-based marking and Border Gateway Protocol
(BGP) destination-based marking, through route maps, overrides both
circuit-based and class-based marking.
|
Use the no or default form of this command to return to the default behavior of dropping packets that exceed the rate.
The following example configures the policy to mark all packets that conform to the configured rate with an IP precedence value of 3 and uses the conform mark command, which by default, drops all packets that exceed the rate:
[local]Redback(config)#qos policy protection1 policing [local]Redback(config-policy-policing)#rate 10000 burst 100000 [local]Redback(config-policy-rate)#conform mark precedence 3
exceed mark priority {group-num | ignore} [{drop-precedence {group-num | ignore} | af-drop drop-value}]
{no | default} exceed mark priority
Marks packets that exceed the quality of service (QoS) rate and burst tolerance with a priority group number, a drop-precedence value, or both, while leaving the packet’s IP header Differentiated Services Code Point (DSCP) value unmodified.
group-num |
Priority group number. The range of values is 0 to 7. The scale used by this command for packet priority, from 0 (highest priority) to 7 (lowest priority), is the relative inverse of the scale used by QoS classification map and classification definition commands. |
ignore |
Specifies that the internal packet descriptor (PD) priority or drop-precedence value is not modified. |
drop-precedence |
Optional. Enables you to specify a setting for either the drop-precedence portion of the PD QoS field or the priority group, or both. |
af-drop drop-value |
Optional. Specifies the target internal drop-precedence value in two-bit format, leaving the least significant bit unmodified. The range of values is 1 to 3. |
Packets exceeding the rate are dropped.
Use the exceed mark priority command to mark packets that exceed the QoS rate and burst tolerance with a priority group number, a drop-precedence value, or both, while preserving the packet's IP header. To configure the rate, enter the rate command (in policy ACL class, metering policy, or policing policy configuration mode).
A priority group is an internal value used by the SmartEdge router to determine into which egress queue the inbound packet should be placed. The type of service (ToS) value, Differentiated Services Code Point (DSCP) value, and Multiprotocol Label Switching (MPLS) experimental (EXP) bits are unchanged by this command. The actual queue number depends on the number of queues configured on the circuit. For more information, see the num-queues command in Configuring Queuing and Scheduling.
The SmartEdge router uses the factory preset, or default, mapping of a priority group to queue, according to the number of queues configured on a circuit; see Table 5.
Priority Group |
8 Queues |
4 Queues |
2 Queues |
1 Queue |
---|---|---|---|---|
0 |
Queue 0 |
Queue 0 |
Queue 0 |
Queue 0 |
1 |
Queue 1 |
Queue 1 |
Queue 1 |
Queue 0 |
2 |
Queue 2 |
Queue 1 |
Queue 1 |
Queue 0 |
3 |
Queue 3 |
Queue 2 |
Queue 1 |
Queue 0 |
4 |
Queue 4 |
Queue 2 |
Queue 1 |
Queue 0 |
5 |
Queue 5 |
Queue 2 |
Queue 1 |
Queue 0 |
6 |
Queue 6 |
Queue 2 |
Queue 1 |
Queue 0 |
7 |
Queue 7 |
Queue 3 |
Queue 1 |
Queue 0 |
Only one mark instruction can be in effect at a time. To change the mark instruction, enter the exceed mark priority command, specifying a new value for the group-num argument. This supersedes the value previously configured.
Caution! | ||
Risk of overriding configurations. The SmartEdge router checks for and applies marking in a specific
order. To reduce the risk, remember the following guidelines: Circuit-based
marking overrides class-based marking and Border Gateway Protocol
(BGP) destination-based marking, through route maps, overrides both
circuit-based and class-based marking.
|
Use the no or default form of this command to return to the default behavior.
The following example configures the policy to mark all packets that exceed the configured rate with a priority group of 3 and uses the exceed mark command, which by default, drops all packets that exceed the rate:
[local]Redback(config)#qos policy protection1 policing [local]Redback(config-policy-policing)#rate 10000 burst 100000 [local]Redback(config-policy-rate)#exceed mark priority 3
exceed no-action
{no | default} exceed no-action
Specifies that no action is taken on packets that exceed the configured quality of service (QoS) rate and burst tolerance.
This command has no keywords or arguments.
Packets exceeding the rate are dropped.
Use the exceed no-action command to specify that no action is taken on packets that exceed the rate.
To configure the rate, enter the rate command (in policy ACL class, metering policy, or policing policy configuration mode).
Caution! | ||
Risk of overriding configurations. The SmartEdge router checks for and applies marking in a specific
order. To reduce the risk, remember the following guidelines: Circuit-based
marking overrides class-based marking and Border Gateway Protocol
(BGP) destination-based marking, through route maps, overrides both
circuit-based and class-based marking.
|
Use the no or default form of this command to return to the default behavior of dropping packets that exceed the rate.
The following example configures the policy to take no action on packets that exceed the rate:
[local]Redback(config)#qos policy protection1 policing [local]Redback(config-policy-policing)#rate 10000 burst 100000 [local]Redback(config-policy-rate)#exceed no-action
exclude {node-ip-addr | link-ip-addr}
no exclude
Specifies nodes or links to exclude from the Constrained Shortest Path First (CSPF) calculation.
RSVP constraint configuration
node-ip-addr |
IP address of a node to exclude from the label-switched path (LSP). |
link-ip-addr |
IP address of a link to exclude from the LSP. |
No nodes or links are excluded from the CSPF calculation.
Use the exclude command to exclude nodes or links from the CSPF path calculation.
Use the no form of this command to remove nodes or links excluded from the CSPF calculation.
The following example shows how to exclude node 10.2.3.4 from an LSP that traverses the network:
[local]Redback#configure [local]Redback(config)#context local [local]Redback(config-ctx)#router rsvp [local]Redback(config-rsvp)#constraint constraint1 [local]Redback(config-rsvp-constr)#exclude node 10.2.3.4
exclusive
Configures a primary LSP to support pseudowire (PW) traffic only.
RSVP LSP configuration
This command has no keywords or arguments.
None
Use the exclusive command to configure a primary LSP to support PW traffic only.
For more information about mapped RSVP LSPs, see one of the following sections, as appropriate:
Use the no version of this command to return the LSP to non-exclusive configuration.
The following example configures the LSP called RBAK1_RC1_BLACK to support PW traffic only.
[local]Redback(config-rsvp)#lsp RBAK1_RC1_BLACK [local]Redback(config-rsvp-lsp)#exclusive
exit
Exits the current configuration mode and returns to the next highest-level configuration mode. At the exec prompt, closes an active terminal or console session, and terminates the session.
all modes
This command has no keywords or arguments.
None
Use the exit command to exit the current configuration mode, return to exec mode, or close an active terminal or console session.
Entering this command in any configuration mode exits the current configuration mode and returns to the next highest level configuration mode. When you enter this command in global configuration mode and return to exec mode, all commands that you have entered since the beginning of the configuration session, or since the last abort or commit command (in any configuration mode), are committed to the database.
The following example displays an administrator exiting global configuration mode and returning to exec mode:
[local]Redback(config)#exit
[local]Redback#
The following example displays how to exit an active Telnet session:
[local]Redback>exit
exp-bits bits-num
no exp-bits bits-num
Specifies the EXP bits configuration in an L2VPN profile.
L2VPN profile peer configuration
bits-num |
Number of EXP bits to be used for transport over an XC. Range of bits is from 0 to 7. |
None.
Use the exp-bits command to specify the EXP bits to be used for transport on an XC in an L2VPN profile. Any XCs that have the profile attached inherit this configuration for the EXP bits.
Use the no form of this command to remove the EXP bits configuration from an L2VPN profile.
The following example shows how to configure an L2VPN profile to specify that 5 EXP bits are used for transport over an XC:
[local]Redback(config)#exp-bits 5
[neighbor ip-addr] explicit-null [prefix-list pl-name]
no [neighbor ip-addr] explicit-null [prefix-list pl-name]
Enables an egress router to advertise an explicit null label (value 0), in place of an implicit null label (value 3), to the penultimate hop router.
LDP router configuration
neighbor ip-addr |
Optional. Neighbor IP address. Enables the advertisement of explicit null labels to the neighbor specified by the ip-addr argument. When a neighbor is not specified, explicit null advertisement is enabled for all neighbors in the context. |
prefix-list pl-name |
Optional. Prefix list name. Applies the filters in the specified prefix list to label advertisements and enables advertisement of explicit null labels only for directly connected prefixes that are permitted by the prefix list. When the prefix list is not specified, explicit null label advertisement is enabled for all directly connected prefixes. |
The implicit null label (value 3) is advertised.
Use the explicit-null command to enable an egress router to advertise an explicit null label (value 0), in place of an implicit null label (value 3), to the penultimate hop router.
By default, Label Distribution Protocol (LDP) advertises an implicit null label for directly connected prefixes. An implicit null label causes the upstream router to perform penultimate hop popping (PHP), and the implicit null label is not transmitted on the egress router. In some cases, such as quality of service (QoS) enforcement, PHP may not be desirable. In those cases, using the explicit-null command causes the egress router to advertise an explicit null label in place of an implicit null label for directly connected prefixes, which forces the upstream router to transmit packets with an explicit null label on the last hop.
If a neighbor IP address is specified, then the explicit-null command is neighbor-specific, and applies only to the LDP neighbor whose transport address matches the IP address specified in the command. If a neighbor address is not specified, then the explicit-null command is non neighbor-specific, and applies to all LDP neighbors in the context.
When both a neighbor-specific explicit-null command and a non neighbor-specific explicit-null command exist, only the neighbor-specific command applies to the neighbor whose transport address matches the IP address given in the neighbor-specific explicit-null command.
Use the no form of this command to disable explicit null label advertisement.
The following example enables advertising explicit-null label to neighbor 10.1.1.1 for directly connected prefixes that match the prefix-list, net01:
[local]Redback(config-ctx)#ip prefix-list net01 permit 155.0.0.0/8 ge 8 [local]Redback(config-ctx)#router ldp [local]Redback(config-ldp)#neighbor 10.1.1.1 explicit-null prefix-list net01
explicit-null
no explicit-null
Enables an egress router to advertise an explicit null label (value 0), in place of an implicit null label (value 3), to the penultimate hop router.
RSVP router configuration
This command has no keywords or arguments.
The implicit null label (value 3) is advertised.
Use the explicit-null command to enable an egress router to advertise an explicit null label (value 0), in place of an implicit null label (value 3), to the penultimate hop router.
By default, Resource Reservation Protocol (RSVP) advertises an implicit null label for directly connected prefixes. An implicit null label causes the upstream router to perform penultimate hop popping (PHP), and the implicit null label is not transmitted on the egress router. In some cases, such as quality of service (QoS) enforcement, PHP may not be desirable. In those cases, using the explicit-null command causes the egress router to advertise an explicit null label in place of an implicit null label for directly connected prefixes, which forces the upstream router to transmit packets with an explicit null label on the last hop.
Use the no form of this command to use the implicit null label.
The following example enables the explicit null value:
[local]Redback(config-ctx)#router rsvp [local]Redback(config-rsvp)#explicit-null
explicit-route er-name
no explicit-route er-name
Creates an explicit route (ERO) and enters RSVP explicit route configuration mode.
RSVP router configuration
er-name |
Name of the explicit route; an alphanumeric string. |
None
Use the explicit-route command to create an explicit route and to enter RSVP explicit route configuration mode.
When an label-switched path (LSP) is configured to use an explicit route, it uses the path determined by the specified explicit route. If the path defined by the explicit route is not topologically possible, either because the network is partitioned, or because of insufficient resources, the LSP fails. No alternate paths can be used. If the LSP does not fail, it continues to use the explicit route.
When you reference a source path (in RSVP LSP configuration mode) with an ERO, the router does not use Constrained Shortest Path First (CSPF). If you specify the strict option in the next-hop command (in RSVP explicit route configuration mode), the router uses the strict way to traverse the path. If you specify the loose option (in RSVP explicit route configuration mode), the router uses the Gateway Protocol (IGP) to traverse the path.
When you reference an explicit route using the dynamic-path command (in RSVP LSP configuration mode), the ingress router uses CSPF to traverse the path. The ERO becomes one of the constraints used in CSPF computation. The path traverses the next hops that are in the ERO in a strict or loose way.
Use the no form of this command to delete an explicit route.
The following example shows how to create a Resource Reservation Protocol (RSVP) explicit route, ex-route02,using a constraint, constaint1, which consists of two next hops:
[local]Redback#config [local]Redback(config)#context local [local]Redback(config-ctx)#router rsvp [local]Redback(config-rsvp)#explicit-route ex-route02 [local]Redback(config-rsvp-explicit-route)#next-hop 13.1.1.2 [local]Redback(config-rsvp-explicit-route)#next-hop 14.1.1.2
export route-target {ext-com | route-map route-map [ctx-name]}
no export route-target {ext-com | route-map route-map [ctx-name]}
Creates a list of export route targets for a specified Virtual Private Network (VPN) context.
BGP address family configuration
ext-com |
Route target extended community value that is added to the export target list. The route target extended community value can be expressed in either of the following formats:
|
route-map route-map |
Name of the route map used for this VPN context. |
ctx-name |
Optional. Name of the context in which the route map is defined. |
None. A VPN context has no export route targets unless this command is used.
Use the export route-target command to create a list of export route targets for a specified VPN context.
Use the ext-com argument to configure a single route target extended community, or use the route-map route-map construct to configure an export route map for finer control over exported Border Gateway Protocol (BGP) routes. You can configure a single route target extended community, an export route map, or both. You can add multiple export route targets on the same line, or you can issue the command multiple times with individual route targets. Export route targets are sent as extended community attributes to other provider edge (PE) routers.
A route map allows you to filter routes or change attributes such as the export route target based on policy requirements. A route map may only be used when a target community value has not yet been configured. Use the optional ctx-name argument to reference a route-map in another context. If the optional ctx-name argument is not specified, then the route maps in the current context are referenced.
Use the no form of this command to remove a list of export route targets for a specified VPN context.
The following example configures the export route targets, 701:3 and 192.168.1.2:5:
[local]Redback(config)#context vpncontext vpn-rd 701:3 [local]Redback(config-ctx)#router bgp vpn [local]Redback(config-bgp)#address-family ipv4 unicast [local]Redback(config-bgp-af)#export route-target 701:3 192.168.1.2:5
The following example configures an export route map, customer-export-map:
[local]Redback(config)#context vpncontext vpn-rd 701:3 [local]Redback(config-ctx)#route map customer-export-map permit 10 [local]Redback(config-route-map)#match as-path foo [local]Redback(config-route-map)#set ext-community RT:701:3 [local]Redback(config-route-map)#exit [local]Redback(config-ctx)#route map customer-export-map permit 20 [local]Redback(config-route-map)#set ext-community RT:701:3 [local]Redback(config-route-map)#exit [local]Redback(config-ctx)#router bgp vpn [local]Redback(config-bgp)#address-family ipv4 unicast [local]Redback(config-bgp-af)#export route-target route-map customer-export-map
export-version v5
Specifies the export format used to send flow records to the external collector.
flow collector configuration
v5 |
Configures the external collector to use version 5 formatting when exporting flow records. |
None.
Use the export-version command to specify the export format used to send flow records to the external collector.
The following example shows how to configure an external collector to use v5 formatting for exporting flow records:
[local]Redback#configure [local]Redback(config)#context local [local]Redback(config-ctx)#flow collector c1 [local]Redback(config-flow-collector)#export-version v5
ext-community-list ecl-name
no ext-community-list ecl-name
Creates a Border Gateway Protocol (BGP) extended community list and enters community list configuration mode.
context configuration
ecl-name |
Name of the extended community list. |
There are no pre-configured extended community lists.
Use the ext-community-list command to create a BGP extended community list and enter community list configuration mode where you can define conditions using the permit and deny commands.
The extended communities attribute consists of a set of extended communities. Each extended community is coded as an eight octet extended community number. An extended communities attribute is specified by configuring an extended communities list. You can specify multiple extended communities in a single extended community list entry. Like access control lists, extended community lists can have multiple entries that are examined in order of ascending sequence number.
All routes with the extended communities attribute belong to the communities listed in the attribute.
To set the extended communities attribute and match clauses based on extended communities, use the set ext-community and match ext-community-list commands in route map configuration mode.
Use the no form of this command to remove an extended community list.
The following example configures the extended community list, permit_local, and enters community list configuration mode:
[local]Redback(config-ctx)#ext-community-list permit_local [local]Redback(config-community-list)#
fast-convergence [spf-delay-interval | max-spf-count]
no fast-convergence
default fast-convergence
Enables fast convergence for an Intermediate System-to-Intermediate System (IS-IS) instance.
IS-IS router configuration
spf-delay-interval |
Optional. Delay time, in milliseconds, between the receipt of a topology change and the start of the Shortest Path First (SPF) calculation. Valid values are 0 to 999; the default value is 100. |
max-spf-count |
Optional. Maximum number of additional SPF calculations allowed per level during the SPF hold time. Valid values are 0 to 15; the default value is 3. |
Fast convergence is enabled for all instances of IS-IS routers.
Use the fast-convergence command to enable fast convergence for an IS-IS instance.
IS-IS fast convergence enables network operators to offer high availability IP services by:
This fast response affects not only the local router that has the link status change, but also the entire IS-IS routing domain.
IS-IS fast convergence response is adaptive to the frequency of network events. It reacts quickly when there is a sudden network change, but it slows down when there are persistent topology changes, to offer IS-IS routing stability.
Using the fast-convergence command to configure a maximum SPF count greater than zero enables additional SPF calculations in the SPF holddown interval. Configuring the maximum SPF count to zero prevents additional SPF calculations, which imposes a delay (holddown) interval between a second event and it's SPF calculation. In other words, a maximum SPF count of zero enforces delay between an event that triggers an SPF calculation and the calculation itself.
Use the debug isis spf-events command to turn on error messages related to IS-IS fast convergence.
Use the no form of this command to disable fast convergence for an IS-IS instance. This command reverts the system to normal operation, in which the holddown time is in seconds (instead of milliseconds), and there is always a delay between successive SPF calculations.
Use the default form of this command to enable fast-convergence with the default settings, or to return the current fast-convergence SPF configuration to the default settings.
The following example enables fast convergence on the IS-IS instance, ip-backbone, using the default configuration.
[local]Redback(config-ctx)#router isis ip-backbone [local]Redback(config-isis)#fast-convergence
The following example shows how to:
[local]Redback(config-ctx)#router isis ip1 [local]Redback(config-isis)#fast-convergence 10 5
fast-convergence [spf-delay-interval max-spf-count]
{no | default} fast-convergence
Enables fast convergence for an Open Shortest Path First (OSPF) instance.
OSPF router configuration
spf-delay-interval |
Optional. Delay time, in milliseconds, between the receipt of a topology change and the start of the Shortest Path First (SPF) calculation. Valid values are 0 to 999; the default value is 100 |
max-spf-count |
Optional. Maximum number of additional SPF calculations allowed during the SPF hold time. Valid values are 0 to 15; the default value is 3. |
Fast convergence is disabled for all OSPF instances.
Use the fast-convergence command to enable fast convergence for an OSPF instance.
OSPF fast convergence enables networks to offer high-availability IP services to their customers by:
This fast response not only affects the local router that has the status change but also the entire OSPF routing domain.
OSPF fast convergence response is adaptive to the frequency of network events. It reacts quickly when a sudden network change occurs, but it slows when persistent topology changes exist to offer OSPF routing stability.
Use the spf-delay-interval argument to set an SPF delay that is less than one second. When fast convergence is enabled, the spf-delay-interval argument provides an SPF delay with sub-second (millisecond) granularity, and the value for the delay argument of the spf-timers command (in OSPF router configuration mode) is ignored, regardless of whether it has been configured. Otherwise, under normal convergence, the delay argument value (in seconds) is used.
Use the max-spf-count argument to allow additional SPF calculations within the SPF hold time specified by the spf-timers command. Specifying a value greater than zero effectively squeezes additional SPF calculations into the SPF time interval; specifying a value of zero does not allow for squeezing additional SPF calculations into the SPF hold time and returns OSPF to the standard SPF hold time behavior.
Use the no or default form of this command to disable fast convergence for an OSPF instance.
The following example enables fast convergence on the OSPF instance, with an SPF delay interval of 250 milliseconds and up to 5 additional SPF calculations allowed during the SPF hold time:
[local]Redback#config [local]Redback(config)#context local [local]Redback(config-ctx)#router ospf 1 [local]Redback(config-ospf)#fast-convergence 250 5 [local]Redback(config-ospf)#
fast-hello count-per-second count
no fast-hello
default fast-hello
Enables the sending of more than one Open Shortest Path First (OSPF) or OSPF Version 3 (OSPFv3) Hello packet per second on the interface.
count-per-second count |
Number of OSPF or OSPFv3 Hello packets to be sent on the specified interface each second. The range of values is 2 to 5. |
Four OSPF Hello packets are sent each second.
Use the fast-hello command to enable the sending of more than one OSPF or OSPFv3 Hello packet per second on the interface.
The following restrictions apply to the fast-hello command:
Use the no form of this command to disable the sending of more than one OSPF or OSPFv3 Hello packet per second on the interface.
Use the default form of this command to send four OSPF or OSPFv3 Hello packets each second.
The following example configures Hello packets to be sent 2 times per second, indicating that the interval between Hello packets to 500 ms:
[local]Redback(config-ospf-if)#fast-hello 2
fast-lsa-origination
{no | default} fast-lsa-origination
Enables fast link-state advertisement (LSA) origination for an Open Shortest Path First (OSPF) instance.
OSPF router configuration
This command has no keywords or arguments.
Fast LSA origination is disabled.
Use the fast-lsa-origination command to enable fast LSA origination for an OSPF instance.
Normally, OSPF originates an LSA every five seconds. Because there can be multiple changes to router or network LSAs during that five-second interval, the five-second LSA origination limit can slow network convergence. When fast LSA origination is enabled, up to four instances of the same LSA can be originated in the same five-second interval.
Likewise, LSA reception is normally rate limited to one new LSA instance per second. LSA instances received in less than one second after the previous LSA instance are dropped. When fast LSA origination is enabled, LSA reception is not restricted to one new instance per second.
Use the no or default form of this command to disable fast LSA origination.
The following example enables fast LSA origination:
[local]Redback(config-ctx)#router ospf 1 [local]Redback(config-ospf)#fast-lsa origination
fast-reroute nnhop-intf-address ip-addr
no fast-reroute nnhop-intf-address ip-addr
Configures a bypass Resource Reservation Protocol (RSVP) label-switched path (LSP) for node protection when the SmartEdge OSinteroperates with other vendor equipment.
RSVP LSP configuration
nnhop-intf-address ip-addr |
Next-next-hop node interface IP address. |
None
Use the fast-reroute command to configure a bypass RSVP LSP for node protection when the SmartEdge OS interoperates with other vendor equipment.
The fast-reroute command is useful when the merge-point
does not send its loopback address in its RRO. The nnhop-intf-address ip-addr construct specifies the address
that the MP includes in the incoming-label RRO that is sent to the
protected LSP. Use the show rsvp lsp command to obtain
the
next-next-hop node interface IP address. The fast-reroute command is also useful for node protection in an interarea MPLS
fast reroute configuration.
Use the no version of this command to remove node protection configuration from bypass RSVP LSP.
The following example configures the RSVP LSP, to-r1-edge, to match the next-next-hop interface IP address, 10.2.2.2:
[local]Redback(config-ctx)#router rsvp [local]Redback(config-rsvp)#lsp to-r1-edge bypass 10.1.1.1 node-protect-lsp-egress 192.168.1.1 [local]Redback(config-rsvp-lsp)#fast-reroute nnhop-intf-address 10.2.2.2
fast-reset interval
no fast-reset interval
For iBGP or multihop eBGP sessions:
BGP neighbor configuration
interval |
Interval (in milliseconds) that must pass before the BGP routing process triggers fast reset after all of the links in the BGP fast-reset interface list go down. The range of values for the interval argument is 0 to 60,000 milliseconds (a maximum of 60 seconds). |
Fast-reset is disabled, and BGP sessions are dropped after the BGP hold-time value (set with the timers command in BGP router configuration mode) is exceeded.
For iBGP or multihop eBGP sessions (where the neighbor is configured with the ebgp-multihop command) , use the fast-reset command to:
Use the interface command in BGP neighbor configuration mode to add an interface to the list of interfaces that must go down before BGP fast reset takes effect. You can add up to ten interfaces to the list. The BGP session does not come up if you configure the fast-reset command in BGP neighbor configuration mode without adding any interfaces to the interface list (using the interface command).
Consider the following rules and restrictions when configuring BGP fast reset on a multihop BGP session:
Use the no form of this command to disable BGP fast reset for an iBGP or multihop eBGP session.
The following example shows how to perform the following tasks on an eBGP neighbor with IP address 1.1.1.1:
[local]Redback(config)#router bgp 1 [local]Redback(config-bgp)#neighbor 1.1.1.1 external [local]Redback(config-bgp-neighbor)#fast-reset 250 [local]Redback(config-nbr-fast-reset)#interface to_red5 [local]Redback(config-nbr-fast-reset)#interface to_red10 [local]Redback(config-nbr-fast-reset)#interface to_red15
fast-reset interval
no fast-reset interval
For iBGP or multihop eBGP sessions:
BGP peer group configuration
interval |
Interval (in milliseconds) that must pass before the BGP routing process triggers fast reset after all of the links in the BGP fast-reset interface list go down. The range of values for the interval argument is 0 to 60,000 milliseconds (a maximum of 60 seconds). |
Fast-reset is disabled, and BGP sessions are dropped after the BGP hold-time value (set with the timers command in BGP router configuration mode) is exceeded.
For iBGP or multihop eBGP sessions (where the neighbor is configured with the ebgp-multihop command) , use the fast-reset command to:
Use the interface command in BGP neighbor configuration mode to add an interface to the list of interfaces that must go down before BGP fast reset takes effect. You can add up to ten interfaces to the list. The BGP session does not come up if you configure the fast-reset command in BGP neighbor configuration mode without adding any interfaces to the interface list (using the interface command).
Consider the following rules and restrictions when configuring BGP fast reset on a multihop BGP session:
Use the no form of this command to disable BGP fast reset for an iBGP or multihop eBGP session.
The following example shows how to perform the following tasks on an iBGP peer group called mpg1:
[local]Redback(config)#router bgp 1 [local]Redback(config-bgp)#peer-group mpg1 internal [local]Redback(config-bgp-peer-group)#fast-reset 200 [local]Redback(config-nbr-fast-reset)#interface to_blue1 [local]Redback(config-nbr-fast-reset)#interface to_blue2 [local]Redback(config-nbr-fast-reset)#interface to_blue3
fast-reset [confed] interval
no fast-reset [confed] interval
Configures the Border Gateway Protocol (BGP) routing process to wait a specified period of time before dropping sessions with directly connected peers if the links used to reach those peers go down.
BGP router configuration
interval |
Interval, in seconds, the BGP routing process waits before dropping sessions with directly connected peers if the links use to reach those peers go down. The range of values for the interval argument when specified in seconds is 0 to 60. |
confed |
Optional. Fast-resets confederation peers as well as directly connected peers. |
Fast-reset is disabled, and BGP sessions are dropped after the BGP hold-time value (set with the timers command in BGP router configuration mode) is exceeded.
Use the fast-reset command to configure the BGP routing process to wait a specified period of time before dropping sessions with directly connected peers if the links use to reach those peers go down. In this case, the fast-reset configuration applies to all eBGP neighbors that are directly connected to the local system.
Normally, a BGP session is dropped only after the hold time specified by the timers command expires. BGP fast reset allows faster route convergence by bringing down the session immediately and triggering a BGP best path calculation before the hold time expires. This fast reset minimizes routing convergence times, and therefore packet loss, during network failures.
Use the no form of this command to disable BGP fast reset for an instance.
To disable the application of fast reset on BGP confederation peers only, use the fast-reset command without the confed keyword.
To see the reason for a fast reset, use the show bgp neighbor command. To see the fast-reset configuration for a BGP neighbor or peer group, use the show bgp neighbor or show bgp peer-group command.
The following example shows how to configure the BGP routing process to wait 50 seconds before dropping sessions with directly connected peers if the links used to reach those peers go down:
[local]Redback(config)#router bgp 100 [local]Redback(config-bgp)#fast-reset 50
The following example shows how to configure the BGP routing process to wait 40 seconds before dropping sessions with directly connected eBGP peers or directly connected BGP confederation peers if the links used to reach those peers go down:
[local]Redback(config)#router bgp 1 [local]Redback(config-bgp)#fast-reset confed 40
flap-statistics
no flap-statistics
Enables route-flap statistics accounting for the address family for both internal Border Gateway Protocol (iBGP) and external BGP (eBGP) routing processes.
BGP address family configuration
This command has no keywords or arguments.
Route-flap statistics accounting is disabled.
Use the flap-statistics command to enable route-flap statistics accounting for both iBGP and eBGP routing processes.
This command is useful for determining routing stability and for diagnosing problems. In particular, this command is useful for troubleshooting persistent iBGP routing loops. Use this command if the network is experiencing a high degree of route flapping.
Use the no form of this command to disable route-flap statistics accounting.
The following example enables route-flap statistics accounting:
[local]Redback(config-ctx)#router bgp 64001 [local]Redback(config-bgp)#address-family ipv4 multicast [local]Redback(config-bgp-af)#flap-statistics
flash-update-threshold seconds
{no | default} flash-update-threshold
Modifies the minimum interval between consecutive Routing Information Protocol (RIP) or RIP next generation (RIPng) flash updates.
seconds |
Minimum number of seconds between consecutive RIP or RIPng flash updates. The range of values is 1 to 30; the default value is 5. |
The flash update threshold is five seconds.
Use the flash-update-threshold command to modify the minimum interval between consecutive RIP or RIPng flash updates. Each flash update contains only those routes that have been changed since the most recent update.
Use the no or default form of this command to return the threshold limit to five seconds.
The following example sets a RIP flash update threshold of 10 seconds:
[local]Redback(config-ctx)#router rip rip001 [local]Redback(config-rip)#flash-update-threshold 10
flood-reduction
no flood-reduction
Suppresses periodic link-state advertisement (LSA) refresh in stable topologies.
This command has no keywords or arguments.
Flood reduction is disabled on the interface.
Use the flood-reduction command to suppress periodic LSA refresh in stable topologies.
Use the no form of this command to disable flood reduction.
The following example suppresses periodic LSA refresh for the OSPF interface, ETH3/4, in area 0:
[local]Redback(config-ospf)#area 0 [local]Redback(config-ospf-area)#interface ETH3/4 [local]Redback(config-ospf-if)#flood-reduction
flow admission-control profile profile
no flow admission-control
Creates a flow admission control (FAC) profile and enters flow configuration mode.
global configuration
profile |
Name of the profile. |
No flow admission control profiles are configured.
Use the flow admission-control profile command to create a FAC profile and enter flow configuration mode. You use this profile to apply flow attributes to a circuit.
Use the no form of this command to remove a FAC profile.
The following example creates a FAC profile called profile1:
[local]Redback(config)#flow admission-control profile profile1
flow apply admission-control profile name {in | out | bidirectional}
no flow apply admission-control
Applies a flow admission control (FAC) profile to a circuit for a specified traffic direction.
circuit configuration
name |
Name of the FAC profile. |
in |
Specifies that the FAC profile applies to ingress traffic on the circuit. |
out |
Specifies that the FAC profile applies to egress traffic on the circuit. |
bidirectional |
Specifies that the FAC profile applies to both ingress and egress traffic on the circuit. |
None
Use the flow apply admission-control profile command to apply a FAC profile to a circuit for a specified traffic direction.
Use the no form of this command to remove a FAC profile from a circuit.
The following example applies FAC profile profile1 to bidirectional traffic on circuit dot1q pvc 1:
[local]Redback(config)#port ethernet 1/1 [local]Redback(config-port)#dot1q pvc 1 [local]Redback(config-dot1q-pvc)#flow apply admission-control profile profile1 bidirectional
flow apply ip profile profile-name {in | out | both}
no flow apply ip profile profile-name
Attaches a specified RFlow profile to a circuit.
profile-name |
The profile that you want to apply to the circuit. |
in |
Applies the profile to the circuit in the ingress direction only. |
out |
Applies the profile to the circuit in the egress direction only. |
both |
Applies the profile to the circuit in both the ingress and egress directions. |
None.
Use the flow apply ip profile command to attach a specified RFlow profile to a circuit.
Use the no form of this command to remove an RFlow profile from a circuit.
The following example shows how to attach an RFlow profile called p1 to the dot1q circuit on port 4/1:
[local]Redback(config)#port ethernet 4/1 [local]Redback(config-port)#no shutdown [local]Redback(config-port)#encapsulation dot1q [local]Redback(config-port)#bind interface if1_1 local [local]Redback(config-port)#flow apply ip profile p1 in
flow collector collector-name
Enters flow collector configuration mode, where you configure access to an external collector.
context configuration
collector-name |
Name that identifies this external collector. |
None.
Use the flow collector command to enter flow collector configuration mode, where you configure access to an external collector.
The following example shows how to enter flow collector configuration mode for an external collector called c1:
[local]Redback#configure [local]Redback(config)#context local [local]Redback(config-ctx)#flow collector c1 [local]Redback(config-flow-collector)#
For a GE port, the syntax is:
flow-control [flow-control]
{no | default} flow-control
For a 10GE port, the syntax is:
flow-control
{no | default} flow-control
For a Gigabit Ethernet (GE) port, sets the flow control mode on a port to be applied when auto-negotiation is disabled or fails with force mode enabled. For a 10GE port, sets the flow control mode on a port to be applied unconditionally for both transmitted and received traffic because these ports do not support auto-negotiation.
port configuration
flow-control |
Optional. Specifies the direction flow control is to be applied, according to one of the following keywords:
This argument is only available for GE ports. |
Flow control is applied to received traffic on a GE port. For 10GE ports, flow-control is enabled by default for both transmitted and received traffic. However, for the oversubscribe-capable 4-port 10GE card, receive flow control (in this case, transmission of Ethernet PAUSE frames) is always disabled whenever more than two of the four ports of the card are placed in service by using the no shutdown command.
For a GE port, use the flow-control command to set the flow control mode on a GE port to be applied when auto-negotiation is disabled or fails with force mode enabled. The flow control mode set using this command is applied when:
Otherwise, the value set using this command is ignored and flow control is negotiated using the parameters specified in the auto-negotiate command (in port configuration mode).
For a 10GE port, use the flow-control command to set the flow control mode on a port to be applied unconditionally for both transmitted and received traffic because these ports do not support auto-negotiation.
Use the default form of this command to set flow control to its default value.
Use the no form of this command to disable all flow control on the port.
The following example shows how to disable receive and transmit flow control on a 10GE port:
[local]Redback(config)#port ethernet 4/1 [local]Redback(config-port)#no flow-control
The following example shows how to apply flow control to traffic both transmitted from and received on GE port 1 in slot 4:
[local]Redback(config)#port ethernet 4/1 [local]Redback(config-port)#flow-control tx&rx
flow enable circuit circuit-handle direction
no flow enable
Enables flows on a circuit.
exec
circuit-handle |
Handle of the circuit to which flows apply. A circuit handle occurs in the following syntax: slot/port:channel:sub-channel/circuit-id. |
slot |
Chassis slot number of a traffic card to which the circuit is mapped. |
port |
Required if you enter the slot argument. Port number for the circuit. |
channel |
Channel number of the circuit. |
sub-channel |
Sub-channel number of the circuit. |
circuit-id |
Circuit ID number to which flows apply. |
direction |
Direction of the flow on the circuit. The range of value can be in, out, or bidirectional. |
Flows are disabled.
Use the flow enable command to enable flows on a circuit.
Use the no form of this command to disable flows on a circuit.
The following example enables flows on circuit 3/1:1023:63/1/2/81922:
[local]Redback#flow enable circuit 3/1:1023:63/1/2/81922 in
flow ip application-list list-name
no application-list list-name
Creates a flow IP application list and accesses flow IP application-list configuration mode.
flow IP configuration
list-name |
Application list name. |
None.
Use the flow ip application-list command to create a flow IP application list and access flow IP application-list configuration mode.
In flow IP application-list configuration mode, you can classify the IP traffic that is being sent over the system (for example Telnet, FTP, HTTP, SMTP, and BGP). Applications, based on IP protocol number and port number may be defined within an application list, providing flexibility in the definition of the applications you want to monitor.
Use the no version of this command to remove a flow IP application list configuration.
Use the flow ip application-list command to access flow IP application-list configuration mode for an application list called applist10:
[local]Redback(config)# flow ip application-list applist10 [local]Redback(config-flow-ip-app-list)#
flow ip profile profile-name
no flow ip profile profile-name
Creates an RFlow IP profile and enters flow IP profile configuration mode.
global configuration
profile-name |
Identifies the IP profile. |
None.
Use the flow ip profile command to create an RFlow IP profile and enter flow IP profile configuration mode.
Use the no form of this command to delete an RFlow profile.
The following example shows how to create an RFlow IP profile called p1 and enter flow IP profile configuration mode for that profile:
[local]Redback)#configure [local]Redback)(config)#flow ip profile p1 [local]Redback(config-flow-ip-profile)#
flow ip sampling
Accesses flow IP sampling configuration mode.
global configuration
This command has no keywords or arguments.
None.
Use the flow ip sampling command to access flow IP sampling configuration mode.
In flow IP sampling configuration mode, you can use the command so globally specify the packet sampling interval to be used when sampling is enabled.
Use the no version of this command to remove a flow ip sampling configuration.
The following example shows how to access flow IP sampling configuration mode:
[local]Redback(config)# flow ip sampling [local]Redback(config-flow-ip-sampling)#
flow monitor circuit {count | list | log}
no flow monitor circuit
Initiates monitoring of flows on a circuit.
flow configuration
count |
Indicates that flows are to be counted on the current circuit. |
list |
Indicates that flows are to be tracked on the current circuit. |
log |
Indicates that flow events are to be logged on the current circuit. |
Flows are not monitored.
Use the flow monitor circuit command to initiate monitoring of flows on a circuit.
Use the no form of this command to specify the default condition.
The following example initiates the counting of flows on a circuit:
[local]Redback(config-ac-profile)#flow monitor circuit count
foreach param-name-list
no foreach
Specifies a field in a Remote Authentication Dial-In User Service (RADIUS) standard attribute, Redback vendor-specific attribute (VSA) provided by Ericsson AB, or service attribute that can have multiple values and accesses parameter array loop configuration mode.
service profile configuration
param-name-list |
Name of the field that can have multiple values. |
No fields are specified in any attribute in the service profile.
Use the foreach command to specify a field in a RADIUS standard attribute, Redback VSA provided by Ericsson AB, or service attribute that can have multiple values and access parameter array loop configuration mode.
The param-name-list argument is the one you specified for the field in the parameter command (in service profile configuration mode). When the param-name-list argument is inserted in the string for the attribute command (in parameter array loop configuration mode), include a dollar sign ($) immediately before the field name.
Use the no form of this command to remove the foreach command and the attribute command that follows it from the service profile.
The following example defines the tcp-port field in Redback VSA 164 provided by Ericsson AB (Dynamic-Policy-Filter) to have multiple values:
[local]Redback(config-ctx)#radius service profile redirect [local]Redback(config-svc-profile)#parameter list tcp-port [local]Redback(config-svc-profile)#foreach tcp-port [local]Redback(config-param-array-loop)#attribute Dynamic-Policy-Filter<nl /> “ip in forward tcp dstport = $tcp-port class redirect fwd”
foreign-agent
no foreign-agent
Creates or selects a foreign-agent (FA) instance in this context and accesses FA configuration mode.
Mobile IP configuration
This command has no keywords or arguments.
No FAs are created.
Use the foreign-agent command to create or select an FA instance in this context and access FA configuration mode. You can only create one FA instance in a context. You can also apply a dynamic tunnel profile.
Use the no form of this command to delete the FA instance in this context.
The following example creates an FA instance in the fa context:
[local]Redback(config)#context fa [local]Redback(config-ctx)#router mobile-ip [local]Redback(config-mip)#foreign-agent [local]Redback(config-mip-fa)#
foreign-agent-peer ip-addr
no foreign-agent-peer ip-addr
Creates or selects a foreign-agent (FA) peer for this home-agent (HA) instance and accesses FA peer configuration mode.
HA configuration
ip-addr |
IP address for this FA peer. |
No FA peers are created.
Use the foreign-agent-peer command to create or select an FA peer for this HA instance and access FA peer configuration mode. If a Mobile IP registration is received from an FA peer that isn't configured, one is created dynamically. FA and HA authentication and dynamic tunnel configuration are inherited from the HA instance.
Use the no form of this command to delete the FA peer with the specified IP address.
The following example creates an FA peer with IP address 172.16.2.1 for the HA instance in the ha context:
[local]Redback(config)#context ha [local]Redback(config-ctx)#router mobile-ip [local]Redback(config-mip)#home-agent [local]Redback(config-ha)#foreign-agent-peer 172.16.2.1 [local]Redback(config-fapeer)#
format media-device
Reformats the mass-storage device installed in the external slot of the controller card to which you are connected, or the compact-flash (CF) card installed in the external slot of the SmartEdge 100 chassis.
exec (10)
This command has no keywords or arguments.
The mass-storage device or CF card is shipped from Redback pre-formatted with three partitions, one of which is essential for obtaining kernel core dumps more quickly..
Use the format media-device command to reformat mass-storage device installed in the external slot of the controller card to which you are connected, or the CF card installed in the external slot of the SmartEdge 100 chassis.
Because the device is formatted when shipped from Redback, you do not need to enter this command unless the device becomes unusable. The reformat operation duplicates the original formatting.
Caution! | ||
Risk of data loss. If the mass-storage device or CF card (the /md
partition) has any useful information (configuration or Packet Processing
ASIC [PPA] crash dumps, and so on), that information is destroyed
during the format operation. To reduce the risk, archive useful information
before you enter this command.
|
This command performs the same reformat function that is part of the procedure described in the Upgrading the Boot ROM or Minikernel document.
The following example formats the mass-storage device installed in the external slot of the active controller card:
[local]Redback#format media-device
The following example formats the mass-storage device installed in the external slot of the standby controller card; the administrator is connected to the Craft 2 port on the standby controller card:
[local]standby#format media-device
The following example reformats the CF card in a SmartEdge 100 chassis:
[local]Redback#format media-device
format sse slot disk_num
exec
slot |
Chassis slot number of the SSE card. |
disk_num |
Disk number on the SSE card. Values: 1 or 2. |
None.
Formats the specified disk on the SSE card, removing all user-configured partitions and data.
The SSE card cannot be bound to an SSE group when you issue this command.
[local]Redback#format sse 2 2
forward-all
no forward-all
Forwards packets to all other external Dynamic Host Configuration Protocol (DHCP) servers in a DHCP server group.
DHCP relay server configuration
This command has no keywords or arguments.
Packets are not forwarded to the other DHCP servers in the DHCP server group.
When a DHCP server is unreachable, DHCP request packets can be forwarded to all other DHCP servers in its DHCP server group. Use the forward-all command to forward packets to all other DHCP servers in a server group.
Use the no form of this command to disable the forward all option.
The following example forwards packets to all other DHCP servers in DHCP server group, int-grp, when the DHCP server, 10.30.40.50, is unreachable:
[local]Redback(config-ctx)#dhcp relay server 10.30.40.50 [local]Redback(config-dhcp-relay)#server-group int-grp [local]Redback(config-dhcp-relay)#forward-all
forward-delay sec
{default | no} forward-delay
Sets forward delay time.
spanning-tree configuration
sec |
Forward delay time in seconds (4 to 30). The forward delay time minus one second must be in whole seconds and greater than or equal to half the maximum age of the received Bridge Protocol Data Units (BPDUs) set in the max-age command; that is, it must conform to the following formula: 2 * (forward-delay - 1.0) >= max-age >= 2 * (hello-interval + 1.0) |
The default forward delay is 15 seconds.
Use the forward-delay command to set the forward delay time; that is, the time spent in the listening state. This command applies when the current bridge is the root bridge.
The following example shows how to set the forward-delay, max-age, and hello-interval:
[local]Redback(config)#context bridge [local]Redback(config-ctx)#bridge isp1 [local]Redback(config-bridge)#spanning-tree [local]Redback(config-bridge-stp)#forward-delay 20 [local]Redback(config-bridge-stp)#max-age 38 [local]Redback(config-bridge-stp)#hello-interval 2
forward output dest-name
no forward output dest-name
Specifies a circuit as the output destination for mirrored or redirected traffic.
dest-name |
Output destination name for mirrored or redirected traffic. |
No output destination for mirrored or redirected traffic is specified.
Use the forward output command to specify a circuit as an output destination for mirrored or redirected traffic.
You cannot use the circuit referencing the forward policy as the forward output port. The selected circuit must be different from the circuit used for the traffic being mirrored or redirected.
Use the mirror destination or redirect destination circuit commands (in forward policy or policy group class configuration mode) to mirror or redirect traffic to this circuit.
Use the no form of this command to remove the circuit as the output destination for mirrored or redirected traffic.
GRE tunnels only support IP datagram mirrored data. If a forward policy specifies a GRE tunnel as the mirror destination, the ip-datagrams option must be used with the mirror destination command.
The following example specifies two forward outputs, snoop1 and snoop2 on Ethernet ports:
[local]Redback(config)#port ethernet 5/12 [local]Redback(config-port)#forward output snoop1 [local]Redback(config-port)#exit [local]Redback(config)#port ethernet 7/1 [local]Redback(config-port)#forward output snoop2
forward output tunl-out-name
no forward output tunl-out-name
Specifies the name of a tunnel to which the output of the current tunnel is forwarded.
tunnel configuration
tunl-out-name |
Name of a tunnel to which the output of the current tunnel is forwarded. |
Output is not forwarded.
Use the forward output command to specify the name of the tunnel to which the output of the current tunnel is forwarded.
Use the no form of this command to specify the default condition.
The following example forwards output from the DenverTnl tunnel to the ColoradoSpringsTnl tunnel:
[local]Redback(config)#tunnel gre DenverTnl [local]Redback(config-tunnel)#forward output ColoradoSpringsTnl
forward policy name [radius-guided]
no forward policy name
Creates or selects a forward policy and access forward policy configuration mode.
global configuration
name |
Forward policy name. |
radius-guided |
Optional. Specifies a Remote Authentication Dial-In User Service (RADIUS) guided policy and allows the policy to be modified by dynamic access control lists (ACLs). |
No forward policy is configured.
Use the forward policy command to create or select a forward policy and access forward policy configuration mode. A forward policy can contain a combination of mirror, redirect, and drop functions.
Use the radius-guided keyword to specify a RADIUS-guided policy and to allow the policy to be modified by dynamic ACLs. You cannot remove a dynamic policy ACL from the policy after you have configured it, nor can you change the policy type from static to RADIUS-guided. To remove the dynamic policy ACL or change its type, delete the policy and then recreate it as a static policy.
Use the no form of this command to remove the forward policy from the configuration.
The following example creates the forward policy, MirrorPolicy, and accesses forward policy configuration mode:
[local]Redback(config)#forward policy MirrorPolicy [local]Redback(config-policy-frwd)#
forward policy name in [acl-counters]
no forward policy name in [acl-counters]
Attaches a forward policy to incoming traffic on a circuit, subscriber record, or port.
name |
Forward policy name. |
acl-counters |
Optional. Enables per-rule statistics for the policy access control list (ACL). |
No policy is attached.
Use the forward policy in command to attach a forward policy to incoming traffic on a circuit, port, or subscriber record.
Use the acl-counters keyword to track the number of packets mirrored, redirected, or dropped.
Forward policies are not supported for dynamic 802.1Q permanent virtual circuit (PVC) ranges.
Use the no form of this command to remove a forward policy from a circuit, port, or subscriber record.
The following example attaches the forward policy, MirrorPolicy, to incoming traffic on a Packet over SONET/SDH (POS) port:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#forward policy MirrorPolicy in
forward policy name out [acl-counters]
no forward policy name out [acl-counters]
Attaches a forward policy that mirrors traffic to outgoing traffic on a circuit, port, or subscriber record.
name |
Forward policy name. |
acl-counters |
Optional. Keeps track of the number of packets that are mirrored when a policy access control list (ACL) is attached to the forward policy. |
No policy is attached.
Use the forward policy out command to attach a forward policy that mirrors traffic to outgoing traffic on a circuit, port, or subscriber record.
Forward policies are not supported for dynamic 802.1Q permanent virtual circuit (PVC) ranges.
Use the no form of this command to remove a forward policy from a circuit, port, or subscriber record.
The following example attaches the forward policy, MirrorPolicy, to outgoing traffic on an Asynchronous Transfer Mode (ATM) port:
[local]Redback(config)#port atm 13/1 [local]Redback(config-atm-oc)#forward policy MirrorPolicy out
forwarding scheme {source-mac}
{no | default} forwarding scheme
Specifies how the IP route used for packet forwarding for a mobile node (MN) is determined.
FA configuration
source-mac |
Use the source medium access control (MAC) address to look up the IP route. |
The forwarding scheme uses the source MAC address.
Use the forwarding scheme command to specify the means by which IP route used for packet forwarding for a MN is determined.
Use the no or default form of this command to specify the default condition.
The following example specifies forwarding based on the source MAC address:
[local]Redback(config)#context fa [local]Redback(config-ctx)#router mobile-ip [local]Redback(config-mip)#foreign-agent [local]Redback(config-mip-fa)#forwarding scheme source-mac validate-source-ip
forwarding traffic routed-ip
no forwarding traffic routed-ip
Enables the forwarding of non-Mobile IP traffic for this foreign-agent (FA) instance.
FA configuration
routed-ip |
Forward routed IP (non-Mobile IP) traffic. |
Routing of non-Mobile IP traffic is enabled.
Use the forwarding traffic command to enable the forwarding of non-Mobile IP traffic for this foreign-agent (FA) instance. Non-Mobile IP traffic is routed IP traffic received on an interface that is enabled for Mobile IP services.
Use the no form of this command to disable the forwarding of non-Mobile IP traffic.
The following example disables the forwarding of non-Mobile IP traffic:
[local]Redback(config)#context fa [local]Redback(config-ctx)#router mobile-ip [local]Redback(config-mip)#foreign-agent [local]Redback(config-mip-fa)#no forwarding traffic routed-ip
framed-route allow-ecmp
no framed-route allow-ecmp
Configures multiple framed routes using the Framed-Route Remote Authentication Dial-In User Service (RADIUS) attribute to allow for equal-cost multipath (ECMP) routing over no more than eight subscriber links.
subscriber configuration
This command has no keywords or arguments.
By default, redundant routes exist across the multiple subscriber links.
Use the framed-route allow-ecmp command to configure multiple framed routes using the Framed-Route RADIUS attribute to allow for ECMP routing over no more than eight subscriber links. Configure this command for the default subscriber within a context. The configuration applies to all other subscribers that are configured within the context.
Use the no form of this command to remove the configured Framed-Route attributes.
For more information about the Framed-Route attribute (standard attribute 22), see RADIUS Attributes.
The following example shows how to configure the framed-route allow-ecmp command for a default subscriber profile within the xyz context:
[local]Redback(config)#config [local]Redback(config)#context xyz [local]Redback(config-ctx)#subscriber default [local]Redback(config-sub)#framed-route allow-ecmp
frame-loss count
{no | default} frame-loss
Configures the continuity check message (CCM) frame-loss criteria in the current maintenance association (MA).
CCM configuration
frame-loss count |
Sets the number of consecutive CCM PDUs failures that are considered a connectivity fault. By default, the failure of a MEP to receive three consecutive CCM PDUs from any one of the other MEPs in the MA is considered as a connectivity fault. A connectivity fault causes an SNMP trap to be transmitted to the SNMP network manager. |
Connectivity fault declared after the failure to receive three (3) consecutive CCM PDUs from any one of the other MEPs in the MA.
Use the frame-loss command to configure the CCM frame-loss criteria in the current MA.
Enter an integer value for the count argument from 3 to 100.
Use the no or default form of this command to return the count parameter to its default value.
In the following example, the frame-loss command changes the default frame-loss count setting of the MEPs in the bayarea MA from the default of 3 to 10:
[local]Redback(config)#ethernet-cfm instance-1 [local]Redback(config-ether-cfm)#level 4 [local]Redback(config-ether-cfm)#domain-name sbc.com [local]Redback(config-ether-cfm)#disable-linktrace [local]Redback(config-ether-cfm)#maintenance-association bayarea [local]Redback(config-ether-cfm-ma)#ccm [local]Redback(config-ether-cfm-ma-ccm)#frame-loss 10
frame-relay auto-detect
{no | default} frame-relay auto-detect
Enables the automatic detection of the type of Local Management Interface (LMI) for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
This command has no keywords or arguments.
Auto-detection is enabled.
Use the frame-relay auto-detect command to enable the automatic detection of the type of LMI for a Frame Relay-encapsulated channel or port, or MFR bundle. The auto-detect feature tells the system to look at the first LMI message received from the remote end, determine from the message the LMI type of the remote end, and reconfigure the LMI type at the local end to match.
The original “group of 4” LMI uses DLCI number 1023 as the PVC number; both the ANSI and ITU LMI use DLCI number 0. If the LMI type is not set to group-of-4 (using the frame-relay lmi-type command in DS-0, DS-1, DS-3, E1, E3, link group, or port configuration mode) and the local Frame Relay interface type is data communications equipment (DCE), this command allows the software to detect which LMI type is being used by the remote end, and use that same LMI type at the local end.
Because the default interface type is data terminal equipment (DTE), the auto-detect function does not normally operate. However, if you configure the interface type to be DCE, then the auto-detect function takes effect (unless previously disabled using the no form of this command).
Use the no form of this command to disable the automatic detection of the LMI type.
Use the default form of this command to enable the automatic detection of the LMI type.
The following example shows how to enable automatic detection of the LMI type for a Packet over SONET/SDH (POS) port in slot 9:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay auto-detect
frame-relay intf-type {dce | dte}
Configures the Frame Relay interface as data communications equipment (DCE) or data terminal equipment (DTE) for a Frame Relay-encapsulated channel or port or Multilink Frame Relay (MFR) bundle.
dce |
Specifies that the port functions as a Frame Relay switch connected to a router. |
dte |
Specifies that the port is connected to a Frame Relay network. |
Frame Relay interfaces are set to DTE.
Use the frame-relay intf-type command to configure the interface type for a Frame Relay-encapsulated channel or port or MFR bundle.
If you configure the interface type as DCE and the Local Management Interface (LMI) is not disabled, LMI Status Enquiries are expected to be received by the port, and Status messages are sent as a response.
If you configure the interface type as DTE and LMI is not disabled, LMI Status Enquiries are sent by the port, and Status messages are expected to be received.
The following example shows how to configure a Packet over SONET/SDH (POS) port in slot 9 as a DCE interface:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay intf-type dce
frame-relay keepalive seconds
{no | default} frame-relay keepalive
Enables the Frame Relay keepalive function and specifies the interval between the transmissions of keepalive messages by a data terminal equipment (DTE) interface for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
seconds |
Number of seconds between keepalive messages. The range of values is 0 to 60; the default value is 10. |
The Frame Relay keepalive function is enabled, with a 10-second interval between messages.
Use the frame-relay keepalive command to enable the Frame Relay keepalive function and specify the interval between the transmissions of keepalive messages by a DTE interface for a Frame Relay-encapsulated channel or port, or MFR bundle.
Use the no form of this command (or the frame-relay keepalive 0 command) to disable the transmission of keepalive messages completely. This allows connections to time out and terminate during periods of inactivity.
Use the default form of this command to specify the default values.
The following example shows how to specify the Frame Relay keepalive interval on DS-3 channel 1 on a channelized OC-12 port to 20 seconds:
[local]Redback(config)#port ds3 4/1:1 [local]Redback(config-ds3)#frame-relay keepalive 20
The following example shows how to specify the Frame Relay keepalive interval on a Packet over SONET/SDH (POS) port to 20 seconds:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay keepalive 20
frame-relay lmi-n391dte exchanges
default frame-relay lmi-n391dte
Specifies the number of keepalive messages to be sent before a request for a full status message is sent for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
exchanges |
Number of keepalive messages (exchanges) to be sent before a full status request message is sent. The range of values is 0 to 255; the default value is 6. |
The number of keepalive messages sent is 6.
Use the frame-relay lmi-n391dte command to specify the number of keepalive messages to be sent before a request for a full status message is sent for a Frame Relay-encapsulated channel or port, or MFR bundle.
Use the default form of this command to specify the default value.
The following example shows how to specify 10 as the number of keepalive messages before a request for a full status message is sent on DS-3 channel 1 on a channelized OC-12 port:
[local]Redback(config)#port ds3 4/1:1 [local]Redback(config-ds3)#frame-relay lmi-n391dte 10
The following example shows how to specify 10 as the number of keepalive messages before a request for a full status message is sent on a Packet over SONET/SDH (POS) port:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay lmi-n391dte 10
frame-relay lmi-n392dce threshold
default frame-relay lmi-n392dce
Sets the error threshold before the Local Management Interface (LMI) is considered to have failed on a data communications equipment (DCE) interface for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
threshold |
Error threshold in number of errors. The range of values is 0 to 10; the default value is 3. |
The threshold is 3.
Use the frame-relay lmi-n392dce command to set the error threshold before LMI is considered to have failed on a DCE interface for a Frame Relay-encapsulated channel or port, or MFR bundle. You can only use this command when you have configured the Frame Relay interface type as DCE (using the frame-relay intf-type command in DS-0, DS-1, DS-3, E1, E3, link group, or port configuration mode).
The error threshold should never be greater than the monitored event count (configured with the frame-relay lmi-n393dce command in DS-1, DS-3, E1, link group, or port configuration mode) because when the error threshold meets or exceeds the monitored event count, the LMI is considered to have failed.
Use the default form of this command to set the error threshold to the default value of 3.
The following example shows how to set the error threshold to 5 on a DCE interface:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay intf-type dce [local]Redback(config-port)#frame-relay lmi-n392dce 5
frame-relay lmi-n392dte threshold
default frame-relay lmi-n392dte
Specifies the error threshold before the Local Management Interface (LMI) is considered to have failed on a Frame Relay data terminal equipment (DTE) interface for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
threshold |
Error threshold in number of errors. The range of values is 0 to 10; the default value is 3. |
The threshold is 3.
Use the frame-relay lmi-n392dte command to specify the error threshold before the LMI is considered to have failed on a Frame Relay DTE interface for a Frame Relay-encapsulated channel or port, or MFR bundle.
The error threshold should never be greater than the monitored event count (configured with the frame-relay lmi-n393dte command in DS-0, DS-1, DS-3, E1, E3, link group, or port configuration mode). When the error threshold meets or exceeds the monitored event count, the LMI is considered to have failed.
Use the default form of this command to specify the default value.
The following example shows how to specify 5 as the error threshold on a DTE interface, which is on DS-3 channel 1 on channelized OC-12 port 1:
[local]Redback(config)#port ds3 4/1:1 [local]Redback(config-ds3)#frame-relay lmi-n392dte 5
The following example shows how to specify 5 as the error threshold on a DTE interface on a Packet over SONET/SDH (POS) port:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay lmi-n392dte 5
frame-relay lmi-n393dce event-count
{no | default} frame-relay lmi-n393dce
Sets the monitored event count on a data communications equipment (DCE) interface for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
event-count |
Number of events (receipts of messages across the interface) to be included in the monitored event count. The range of values is 0 to 10; the default value is 4. |
The monitored event count is enabled and set to 4.
Use the frame-relay lmi-n393dce command to set the monitored event count on a DCE interface. You can only use this command if you have configured the Frame Relay interface type as DCE for a Frame Relay-encapsulated channel or port, or MFR bundle.
The event count should never be less than the error threshold count (configured by the frame-relay lmi-n392dce command in DS-0, DS-1, DS-3, E1, E3, link group, or port configuration mode). When the error threshold meets or exceeds the monitored event count, the Local Management Interface (LMI) is considered to have failed.
Use the no form of this command to set the monitored event count value to 0.
Use the default form of this command to set the monitored event count to the default value of 4.
The following example shows how to set the monitored event count to 5 on a DCE interface:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay intf-type dce [local]Redback(config-port)#frame-relay lmi-n393dce 5
frame-relay lmi-n393dte event-count
default frame-relay lmi-n393dte
Specifies the monitored event count on a data terminal equipment (DTE) interface for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
event-count |
Number of events (receipts of messages across the interface) to be included in the monitored event count. The range of values is 0 to 10; the default value is 4. |
The monitored event count is 4.
Use the frame-relay lmi-n393dte command to specify the monitored event count on a DTE interface for a Frame Relay-encapsulated channel or port, or MFR bundle.
The event count should never be less than the error threshold count, which you specify by entering the frame-relay lmi-n392dte command (in DS-0, DS-1, DS-3, E1, E3, link group, or port configuration mode). When the error threshold meets or exceeds the monitored event count, the Local Management Interface (LMI) is considered to have failed.
Use the default form of this command to specify the default value.
The following example shows how to specify 5 as the monitored event count on a DTE interface, which is on DS-3 channel 1 on channelized OC-12 port 1:
[local]Redback(config)#port ds3 4/1:1 [local]Redback(config-ds3)#frame-relay lmi-n393dte 5
The following example shows how to specify 5 as the monitored event count on a DTE interface on a Packet over SONET/SDH (POS) port:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay lmi-n393dte 5
frame-relay lmi-t392dce seconds
default frame-relay lmi-t392dce
Specifies the interval for the polling verification timer when the interface type is data communications equipment (DCE) for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
seconds |
Number of seconds after which an error is counted if a message has not been received. The range of values is 5 to 60; the default value is 15. |
The timer interval is 15 seconds.
Use the frame-relay lmi-t392dce command to specify the interval for the polling verification timer when the interface type is DCE for a Frame Relay-encapsulated channel or port, or MFR bundle.
The polling verification timer starts each time a keepalive message is received from the remote end. If no keepalive message is received before the timer expires, an error is counted. If the number of errors exceeds the error threshold, the LMI is declared down. The value specified for the timer should be greater than the keepalive timer that is set by the remote end.
Use the default form of this command to specify the default interval of 15 seconds.
The following example shows how to specify a 10 second interval for the polling verification timer for a DCE interface type on a DS-3 channel 1 on a channelized OC-12 port:
[local]Redback(config)#port ds3 10/1:1 [local]Redback(config-ds3)#frame-relay intf-type dce [local]Redback(config-ds3)#frame-relay lmi-t392dce 10
frame-relay lmi-type {ansi | group-of-4 | itu}
default frame-relay lmi-type
Specifies the Frame Relay Local Management Interface (LMI) type for a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle.
ansi |
Specifies the LMI type for Annex D as defined by ANSI standard T1.617; this is the default. |
group-of-4 |
Specifies the original LMI as defined by Cisco, DEC, Northern Telecom, and StrataCom. |
itu |
Specifies the LMI type for ITU-T Q933 Annex A (formerly labeled as “CCITT”). |
The LMI type is ANSI.
Use the frame-relay lmi-type command to specify the LMI type for the Frame Relay interface for a Frame Relay-encapsulated channel or port, or MFR bundle.
Use the default form of this command to specify the default LMI type.
The following example shows how to specify an LMI type of ITU-T Q933 Annex A for DS-3 channel 1 on a channelized OC-12 port:
[local]Redback(config)#port ds3 3/1:1 [local]Redback(config-ds3)#frame-relay lmi-type itu
The following example shows how to specify an LMI type of ITU-T Q933 Annex A for a POS port:
[local]Redback(config)#port pos 9/1 [local]Redback(config-port)#frame-relay lmi-type itu
frame-relay multilink {ack-delay seconds | hello-interval seconds | retries count}
{no} frame-relay multilink {ack-delay | hello-interval | retries}
Specifies the timing for Hello and acknowledgement messages for a channel in a Multilink Frame Relay (MFR) bundle.
ack-delay seconds |
Interval, in seconds, to wait for an inbound acknowledgement message to an outgoing control message before taking action. The range of values is 1 to 10; the default value is 4. |
hello-interval seconds |
Interval, in seconds, between sending outbound Hello messages. The range of values is 1 to 180; the default value is 10. |
retries count |
Number of times to resend an Hello message before receiving an acknowledgement message. The range of values is 1 to 5; the default value is 2. |
Timing for Hello and acknowledgement messages is enabled according to the defaults.
Use the frame-relay multilink command to specify the timing for Hello and acknowledgement messages for a channel or port in an MFR bundle. You can enter this command multiple times to specify each construct for each channel or port in the MFR bundle.
You must add the channel or port to the MFR bundle by using the link-group command (in DS-1 or E1 configuration mode) before you can enter the frame-relay multilink command.
Hello messages inform the peer at the remote end that the link is up; acknowledgement messages notify the peer that a control message from the peer has been received by the SmartEdge router.
Control messages are those that add a link, remove a link, notify the peer that the link is up, or notify the peer that an invalid control message has been received.
Use the no form of this command to specify the default values for the timing for Hello and acknowledgement messages.
The following example shows how to specify the timing for Hello and acknowledgement messages for a DS-1 channel that is added to an MFR link group, lg-mfr:
[local]Redback(config)#port ds1 2/1:1 [local]Redback(config-ds1)#encapsulation frame-relay [local]Redback(config-ds1)#link-group lg-mfr [local]Redback(config-ds1)#frame-relay multilink ack-delay 5 [local]Redback(config-ds1)#frame-relay multilink hello-interval 5 [local]Redback(config-ds1)#frame-relay multilink retries 3
frame-relay profile prof-name
no frame-relay profile prof-name
Creates a new Frame Relay profile or selects an existing one for modification, and enters Frame Relay profile configuration mode.
global configuration
prof-name |
Alphanumeric string to be used as the name of the particular profile. |
No Frame Relay profiles are defined.
Use the frame-relay profile command to create a new Frame Relay profile or to select an existing profile for modification, and enter Frame Relay profile configuration mode.
Use the no form of this command to delete a Frame Relay profile. This form deletes any PVCs that reference that profile.
The following example shows how to configure the Frame Relay profile, fr-pro, and enters Frame Relay profile configuration mode:
[local]Redback(config)#frame-relay profile fr-pro [local]Redback(config-fr-profile)#
In link-group configuration mode, the syntax is:
frame-relay pvc dlci
no frame-relay pvc dlci
In all other configuration modes, the syntax is:
frame-relay pvc {dlci | default [profile prof-name]}
no frame-relay pvc dlci
Creates or selects a Frame Relay permanent virtual circuit (PVC) on a Frame Relay-encapsulated channel or port, or Multilink Frame Relay (MFR) bundle, and enters Frame Relay PVC or link PVC configuration mode.
dlci |
Data-link connection identifier (DLCI) of the individual circuit be created. The range of values is 16 to 991. |
default |
Specifies the default profile and encapsulation. Not available in link-group configuration mode. |
profile prof-name |
Optional. Name of an existing Frame Relay profile. Not available in link-group configuration mode. |
No Frame Relay PVCs are defined.
Use the frame-relay pvc command to create or select a Frame Relay PVC on a Frame Relay-encapsulated channel or port, or MFR bundle, and enter Frame Relay PVC or link PVC configuration mode.
When entered in link-group configuration mode, this command creates or selects an aggregated Frame Relay PVC in the MFR bundle. When a DS-1 channel, or clear-channel E1 channel or port, is added to the MFR bundle, a Frame Relay PVC with the specified dlci is created on that channel or port.
When entered in DS-0, DS-1, DS-3, E1, E3, or port configuration mode, creates or selects a Frame Relay PVC on the single-link channel, channel group, or port.
Use the no form of this command to delete a previously configured Frame Relay PVC.
The following example encapsulates DS-3 channel 1 on channelized OC-12 port 1 for Frame Relay, creates a Frame Relay PVC with DLCI 16 to use the frame20 profile, and enters Frame Relay PVC configuration mode:
[local]Redback(config)#frame-relay profile frame20 [local]Redback(config-fr-profile)#bulkstats schema fr [local]Redback(config-fr-profile)#exit [local]Redback(config)#port ds3 3/1:1 [local]Redback(config-ds3)#no shutdown [local]Redback(config-ds3)#encapsulation frame-relay [local]Redback(config-ds3)#frame-relay pvc 16 profile frame20 [local]Redback(config-fr-pvc)#
The following example encapsulates a POS port for Frame Relay, creates a Frame Relay PVC with DLCI 16, and enters Frame Relay PVC configuration mode:
[local]Redback(config)#frame-relay profile frame20 [local]Redback(config-fr-profile)#bulkstats schema fr-port [local]Redback(config-fr-profile)#exit [local]Redback(config)#port pos 3/1 [local]Redback(config-port)#encapsulation frame-relay [local]Redback(config-port)#frame-relay pvc 16 profile frame20 [local]Redback(config-fr-pvc)#
The following example shows how to create a Frame Relay link group and two aggregated Frame Relay PVCs with DLCIs 26 and 27 for two sets of constituent Frame Relay PVCs to be aggregated in the MFR bundle lg1:
[local]Redback(config)#link-group lg1 mfr [local]Redback(config-link-group)#frame-relay pvc 26 [local]Redback(config-link-pvc)#exit [local]Redback(config-link-group)#frame-relay pvc 27 [local]Redback(config-link-pvc)#exit
For an Asynchronous Transfer Mode (ATM) DS-3 port, the syntax in ATM DS-3 configuration mode is:
framing {cbit-adm | cbit-plcp}
default framing
For an ATM OC or Packet over SONET/SDH (POS) port, the syntax in ATM OC or port configuration mode is:
framing {sdh | sonet}
default framing
For an Ethernet WAN-PHY port, the syntax in port configuration mode is:
framing {sdh | sonet}
Specifies the framing for an ATM DS-3, ATM OC, Ethernet WAN-PHY, or POS port.
cbit-adm |
Uses ATM direct mapping (ADM) as the mechanism to map ATM cells into a DS-3 frame. This is the default setting. |
cbit-plcp |
Uses the Physical Layer Convergence Protocol (PLCP) to map ATM cells into a DS-3 frame. |
sdh |
Specifies Synchronous Digital Hierarchy (SDH) framing for an ATM OC or POS or Ethernet WAN-PHY port. |
sonet |
Specifies Synchronous Optical Network (SONET) framing for an ATM OC or POS or Ethernet WAN-PHY port; this is the default framing. |
The default framing for an ATM DS-3 port is ADM. The default framing for an ATM OC, Ethernet WAN-PHY, or POS port is SONET.
Use the framing command to specify the framing for an ATM DS-3, ATM OC, Ethernet WAN-PHY, or POS port.
You can make framing changes to an ATM DS-3 port only if you have not configured permanent virtual circuits (PVCs) on it. The system provides the following error message if you attempt to change the framing on a port with PVCs:
Cannot change Framing while PVCs/VPs exist on any port on this card - Please remove all PVCs/VPs on this card and try again
The framing on all ports must be the same. When the framing is changed on one ATM DS-3 port, all ports on the card are also changed automatically.
Use the default form of this command to set the framing to the default setting.
The following example shows how to set the framing for an ATM DS-3 port to cbit-plcp:
[local]Redback(config)#port atm 3/1 [local]Redback(config-atm-ds3)#framing cbit-plcp
The following example shows how to set the framing for an WAN-PHY port to sdh:
[local]Redback(config)#port ethernet 3/1 wan-phy [local]Redback(config-port)#framing sdh
For a clear-channel DS-3 channel or port, the syntax in DS-3 configuration mode is:
framing {c-bit | m13}
default framing
For a clear-channel E3 port, the syntax in E3 configuration mode is:
framing g751
{no | default} framing
For a channelized DS-3 channel or port, the syntax in DS-3 configuration mode is:
framing {c-bit | m23}
default framing
For a DS-1 channel, the syntax in DS-1 configuration mode is:
framing {esf | sf}
default framing
For an E1 channel or port, the syntax is in E1 configuration mode:
framing {crc4 | no-crc4 | unframed}
{no | default} framing
Specifies the framing for a clear-channel or channelized DS-3 channel or port, a clear-channel E3 port, a DS-1 channel, or an E1 channel or port.
c-bit |
Specifies C-bit format. Available only for DS-3 channels or ports, either channelized or clear-channel; this is the default for clear-channel DS-3 channels or ports. |
g751 |
Specifies ITU-T G.751 format. Available only for clear-channel E3 ports; this is the default. |
m13 |
Specifies M13 framing. Available only for clear-channel DS-3 channels or ports. This option is not currently supported. |
m23 |
Specifies M23 format. Available only for channelized DS-3 channels or ports; this is the default for channelized DS-3 channels or ports. |
esf |
Specifies Extended Superframe Format (ESF). Available only for DS-1 channels; this is the default. |
sf |
Specifies Superframe Format (SF). Available only for DS-1 channels. |
crc4 |
Specifies CRC-4 framing. Available only for E1 channels or ports; this is the default, which channelizes the E1 channel or port. |
no-crc4 |
Specifies non-CRC-4 framing. Available only for E1 channels or ports, it removes the channelization for an E1 channel or port. |
unframed |
Specifies no framing. Available only for E1 channels or ports, it removes the channelization for an E1 channel or port. |
The framing for clear-channel and channelized DS-3 channels or ports is C-bit format. The framing for clear-channel E3 ports is G.751 format. The framing for DS-1 channels is ESF. The framing for E1 channels or ports is CRC-4 format.
Use the framing command to specify the framing for a clear-channel or channelized DS-3 channel or port, clear-channel E3 port, DS-1 channel, or El channel or port.
For clear-channel E3 ports, use the no form of this command to specify the framing as unframed.
For DS-1 channels, the following caution applies:
Caution! | ||
Risk of data loss. To specify a different framing for a DS-1 channel,
where the DS-1 channel is operating in a remote (line fdl ansi, line
in-band, or payload) loopback state, and the new framing is not compatible
with the type of remote loopback that you have operating, the system
terminates the remote loopback (change the DS-1 channel operation
to a normal state) before changing the framing. To reduce the risk,
postpone issuing the framing command until you are
ready to terminate the remote loopback. The description of the loopback command in this document includes the framing format
compatible with each type of remote loopback.
|
For E1 channels or ports, the following guidelines apply:
Use the default form of this command to set the framing to the default, regardless of channel or port type.
The following example shows how to set the framing for a channelized DS-3 channel 2 on port 1 to C-bit format (c-bit):
[local]Redback(config)#port channelized-ds3 3/1:2 [local]Redback(config-ds3)#framing c-bit
The following example shows how to configure a clear-channel E1 port:
[local]Redback(config)#port e1 4/1 [local]Redback(config-e1)#framing unframed
frr-auto-revert-delay delay-interval
no frr-auto-revert-delay
Sets the amount of time that RSVP waits after a failed interface comes back up before traffic is switched back to the primary LSP from a bypass LSP.
RSVP router configuration mode
delay-interval |
Amount of time, in seconds, that RSVP waits after a failed interface comes back up before traffic is switched back to the primary LSP from a bypass LSP. The range of values is 0 to 65,535. |
The frr-auto-revert-delay command is disabled and bypass LSPs do not switch back to primary LSPs.
Use the frr-auto-revert-delay command to set the amount of time that RSVP waits after a failed interface comes back up before traffic is switched back to the primary LSP from a bypass LSP.
When the delay-interval value is changed, and it is lower than the delay interval set for any existing bypass RSVP LSPs that are scheduled to switch back to their primary LSPs, then their delay timer is reset to the new, lower value.
From Release 2.6.5.2 to Release 5.0.3.1 of the SmartEdge router ,when the NFRR auto-revert delay is enabled, traffic is automatically switched to the primary LSP after the specified delay interval has elapsed. Starting with Release 5.0.3.2, after the delay interval has elapsed, a new instance of the primary LSP must be established before traffic is switched to it; otherwise, traffic continues to use the bypass LSP.
Use the no form of this command to disable the NFRR auto-revert delay. If the NFRR auto-revert delay is disabled, then all existing bypass LSPs do not switch back to their primary LSPs, even if their delay timer has started.
The following example enables an RSVP instance to restart gracefully:
[local]Redback(config-ctx)#router rsvp [local]Redback(config-rsvp)#frr-auto-revert-delay
full-name text
no full-name
Associates a full name or textual description with an administrator account.
administrator configuration
text |
Alphanumeric string representing a new or existing administrator. |
No full name is associated with an administrator account.
Use the full-name command to associate a full name or text description with an administrator account. You can enter a full name with embedded spaces by enclosing the entire name in double quotation marks; for example, "Fred Q. Lynch".
Use the no form of this command to remove the full name text for an administrator.
The following example configures the full name for an administrator, Fred:
[local]Redback(config-ctx)#administrator fred
[local]Redback(config-administrator)#full-name "Fred Q. Lynch, x1234"
function {lac-only | lns-only}
{no | default} function
Specifies the role that the SmartEdge router assumes with this Layer 2 Tunneling Protocol (L2TP) peer, either as an L2TP access concentrator (LAC) or as an L2TP network server (LNS).
L2TP peer configuration
lac-only |
Specifies that the SmartEdge router can send incoming call requests to, but cannot receive them from, this peer. |
lns-only |
Specifies that the SmartEdge router can receive incoming call requests from, but cannot send them to, this peer. |
The SmartEdge router functions as a LAC only for this peer.
Use the function command to specify the role that the SmartEdge router assumes with this L2TP peer, either as a LAC or as an LNS. The LAC-only role prevents the acceptance of Incoming-Call-Request (ICRQ) control messages from a LAC peer. The LNS-only role prevents the generation of ICRQ control messages based on incoming Point-to-Point Protocol (PPP) sessions to an LNS peer.
Use the default or no form of this command to disable any specification.
The following example shows how to specify that the SmartEdge router function as a LAC with the named L2TP peer:
[local]Redback(config-ctx)#l2tp-peer name peer1 [local]Redback(config-l2tp)#function lac-only