Sign In
Upload
Manuals
Brands
Juniper Manuals
Software
JUNOSE 11.3
Juniper JUNOSE 11.3 Manuals
Manuals and User Guides for Juniper JUNOSE 11.3. We have
15
Juniper JUNOSE 11.3 manuals available for free PDF download: Command Reference Manual, Configuration Manual, Reference Manual, Release Note
Juniper JUNOSE 11.3 Command Reference Manual (1506 pages)
Software for E Series Broadband Services Routers Command Reference A to M
Brand:
Juniper
| Category:
Software
| Size: 10.26 MB
Table of Contents
Table of Contents
9
List of Tables
39
About the Documentation
41
Audience
41
E Series and Junose Documentation and Release Notes
41
E Series and Junose Text and Syntax Conventions
41
Table 1: Notice Icons
42
Table 2: Text and Syntax Conventions
42
Documentation Feedback
43
Obtaining Documentation
43
Requesting Technical Support
43
About the Documentation
43
Opening a Case with JTAC
44
Self-Help Online Tools and Resources
44
Commands, a to M
45
Command Reference Topics
47
Using the no Version Versus the Default Version of Commands
47
Deprecated Commands
48
Filtering Show Commands
48
Interface Types and Specifiers
49
Chapter 1 Command Reference Topics
49
Table 3: Interface Types and Specifiers for Erx7Xx Models, Erx14Xx Models
49
Table 4: Interface Types and Specifiers for E120 Router and E320 Router
57
Chapter 2 A Commands
63
Aaa Accounting Acct-Stop On-Aaa-Failure
64
Aaa Accounting Acct-Stop On-Access-Deny
65
Aaa Accounting Broadcast
66
Aaa Accounting Commands
67
Aaa Accounting Default
68
Aaa Accounting Duplication
69
Aaa Accounting Exec
70
Aaa Accounting Immediate-Update
71
Aaa Accounting Interval
72
Aaa Accounting Statistics
73
Aaa Accounting Suppress Null-Username
74
Aaa Accounting Vr-Group
75
Aaa Authentication Default
76
Aaa Authentication Enable Default
77
Aaa Authentication Login
78
Aaa Authorization
79
Aaa Authorization Config-Commands
80
Aaa Delimiter
81
Aaa Dhcpv6-Delegated-Prefix Delegated-Ipv6-Prefix
82
Aaa Dns
83
Aaa Domain-Map
84
Aaa Duplicate-Address-Check
85
Aaa Duplicate-Prefix-Check
86
Aaa Intf-Desc-Format Include
87
Aaa Ipv6-Dns
88
Aaa Ipv6-Nd-Ra-Prefix Framed-Ipv6-Prefix
89
Aaa Local Database
90
Aaa Local Select Database
91
Aaa Local Username
92
Aaa New-Model
93
Aaa Parse-Direction
94
Aaa Parse-Order
95
Aaa Profile
96
Aaa Qos Downstream-Rate
97
Aaa Route-Download
98
Aaa Route-Download Now
99
Aaa Route-Download Suspend
100
Aaa Service Accounting Interval
101
Aaa Subscriber Limit Per-Port
102
Aaa Subscriber Limit Per-Vr
103
Aaa Timeout
104
Aaa Tunnel Assignment-ID-Format
105
Aaa Tunnel Calling-Number-Format
106
Aaa Tunnel Calling-Number-Format-Fallback
109
Aaa Tunnel Client-Name
111
Aaa Tunnel-Group
112
Aaa Tunnel Ignore
113
Aaa Tunnel Nas-Port-Method
114
Aaa Tunnel Password
115
Aaa Tunnel Switch-Profile
116
Aaa Tunnel Tx-Connect-Speed-Method
117
Aaa User Accounting Interval
118
Aaa Virtual-Router
119
Aaa Wins
120
Access-Class in
121
Access-List
122
Accounting
123
Adapter Accept
124
Adapter Disable
125
Adapter Enable
126
Adapter Erase
127
Address
128
Address Area
129
Address Authentication Key
130
Address Authentication-Key
131
Address Authentication Message-Digest
132
Address Authentication Mode
133
Address Authentication-None
134
Address Bfd-Liveness-Detection
135
Address Cost
136
Address Dead-Interval
137
Address-Family
138
Address Hello-Interval
140
Address Message-Digest-Key Md5
141
Address Network
142
Address Passive-Interface
143
Address-Pool-Name
144
Address Priority
145
Address Receive Version
146
Address Retransmit-Interval
147
Address Send Version
148
Address Transmit-Delay
149
Adjustment-Factor
150
Agent Context-Name
151
Aggregate-Address
152
Aggregation-Node
153
Aggressive-Mode
154
Allow
155
Append-After
156
Application
157
Aps Events
158
Aps Force
159
Aps Group
160
Aps Lockout
161
Aps Manual
162
Aps Protect
163
Aps Revert
164
Aps Unidirectional
165
Aps Working
166
Area
167
Area-Authentication
168
Area-Authentication-Key
169
Area Default-Cost
170
Area-Message-Digest-Key
171
Area Nssa
173
Area Range
174
Area Stub
175
Area Virtual-Link
176
Area Virtual-Link Authentication-Key
177
Area Virtual-Link Authentication Message-Digest
178
Area Virtual-Link Authentication-None
179
Area Virtual-Link Dead-Interval
180
Area Virtual-Link Hello-Interval
181
Area Virtual-Link Message-Digest-Key Md5
182
Area Virtual-Link Retransmit-Interval
183
Area Virtual-Link Transmit-Delay
184
Arp
185
Arp Spoof-Check
186
Arp Timeout
187
Assured-Rate
188
Atm
189
Atm Aal5 Description
190
Atm Aal5 Shutdown
191
Atm Aal5 Snmp Trap Link-Status
192
Atm Atm1483 Advisory-Rx-Speed
193
Atm Atm1483 Auto-Configure
194
Atm Atm1483 Description
195
Atm Atm1483 Export-Subinterface-Description
196
Atm Atm1483 Mtu
197
Atm Atm1483 Profile
198
Atm Atm1483 Shutdown
199
Atm Atm1483 Snmp Trap Link-Status
200
Atm Atm1483 Subscriber
201
Atm Auto-Configuration
202
Atm Bulk-Config
203
Atm Bulk-Config Modify
204
Atm Bulk-Config Shutdown
205
Atm Cac
206
Atm Cell-Packing
207
Atm-Cell-Mode
208
Atm Classifier-List
209
Atm Class-VC
210
Atm Clock Internal
211
Atm Description
212
Atm Dos-Protection-Group
213
Atm Framing
214
Atm Ilmi-Enable
215
Atm Ilmi-Keepalive
216
Atm Lbo
217
Atm Mcpt-Timers
218
Atm Oam
219
Atm Oam Flush
220
Atm Oam Loopback-Location
221
Atm Policy
222
Atm Policy-List
223
Atm Pvc
224
Atm Shutdown
227
Atm Snmp Trap Link-Status
228
Atm Sonet Stm-1
229
Atm Uni-Version
230
Atm VC-Per-Vp
231
Atm Vp-Description
232
Atm-Vp Qos-Parameter
233
Atm-Vp Qos-Profile
234
Atm Vp-Tunnel
235
Authentication
236
Authentication Key
237
Authentication-Key
238
Authentication Message-Digest
239
Authentication Mode
240
Authentication-None
241
Authorization
242
Authorization Change
243
Auth-Router-Name
244
Auto-Configure
245
Auto-Configure Atm1483
246
Auto-Configure Vlan
247
Auto-Cost Reference-Bandwidth
248
Automatic-Virtual-Link
249
Auto-Summary
250
Average-Length-Exponent
251
Avp
252
Advertisement
Juniper JUNOSE 11.3 Command Reference Manual (1496 pages)
Software for E Series Broadband Services Routers Command Reference N to Z
Brand:
Juniper
| Category:
Software
| Size: 10.92 MB
Table of Contents
Table of Contents
9
List of Tables
37
About the Documentation
39
Audience
39
E Series and Junose Documentation and Release Notes
39
E Series and Junose Text and Syntax Conventions
39
Table 1: Notice Icons
40
Table 2: Text and Syntax Conventions
40
Documentation Feedback
41
Obtaining Documentation
41
Requesting Technical Support
41
About the Documentation
41
Opening a Case with JTAC
42
Self-Help Online Tools and Resources
42
Commands, N to Z
43
Command Reference Topics
45
Using the no Version Versus the Default Version of Commands
45
Deprecated Commands
46
Filtering Show Commands
46
Interface Types and Specifiers
47
Chapter 1 Command Reference Topics
47
Table 3: Interface Types and Specifiers for Erx7Xx Models, Erx14Xx Models
47
Table 4: Interface Types and Specifiers for E120 Router and E320 Router
55
Chapter 2 N Commands
61
Nas-Port-Type Atm
62
Nas-Port-Type Ethernet
63
Neighbor
64
Neighbor Activate
65
Neighbor Advertise-Map
66
Neighbor Advertisement-Interval
67
Neighbor Allow
68
Neighbor Allowas-In
69
Neighbor As-Override
70
Neighbor Bfd-Liveness-Detection
71
Neighbor Capability
73
Neighbor Default-Originate
75
Neighbor Description
76
Neighbor Distribute-List
77
Neighbor Ebgp-Multihop
78
Neighbor Filter-List
79
Neighbor Graceful-Restart
80
Neighbor Graceful-Restart Restart-Time
81
Neighbor Graceful-Restart Stalepaths-Time
82
Neighbor Ibgp-Singlehop
83
Neighbor Lenient
84
Neighbor Local-As
85
Neighbor Maximum-Orf-Entries
86
Neighbor Maximum-Prefix
87
Neighbor Maximum-Update-Size
88
Neighbor Next-Hop-Self
89
Neighbor Next-Hop-Unchanged
90
Neighbor Passive
91
Neighbor Password
92
Neighbor Peer-Group
93
Neighbor Peer-Type
94
Neighbor Prefix-List
95
Neighbor Prefix-Tree
96
Neighbor Remote-As
97
Neighbor Remove-Private-As
98
Neighbor Rib-Out Disable
99
Neighbor Route-Map
100
Neighbor Route-Reflector-Client
101
Neighbor Send-Community
102
Neighbor Send-Label
103
Neighbor Shutdown
104
Neighbor Site-Of-Origin
105
Neighbor Soft-Reconfiguration Inbound
107
Neighbor Timers
108
Neighbor Unsuppress-Map
109
Neighbor Update-Source
110
Neighbor Weight
111
Net
112
Netbios-Name-Server
113
Netbios-Node-Type
114
Network
115
Network Area
117
Next-Address
118
Next-Hop
119
Next-Interface
120
Next-Parent
121
No Area
122
No Boot Hotfix All-Releases
123
No Bulkstats
124
No Ip Interface
125
No Log Filters
126
No Radius Client
127
No Rtr
128
No Rtr Reaction-Configuration
129
No Service-Management Subscriber-Session Force
130
Node
131
Notification ID
132
Nsf Ietf
133
Nsf Interface Wait
134
Nsf T1
135
Nsf T2
136
Nsf T3
137
Ntp Access-Group
138
Ntp Broadcast
139
Ntp Broadcast-Client
140
Ntp Broadcast-Delay
141
Ntp Disable
142
Ntp Enable
143
Ntp Master
144
Ntp Server
145
Ntp Server Enable
146
Ntp Source
147
Juniper JUNOSE 11.3 Configuration Manual (786 pages)
Software for E Series Broadband Services Routers Broadband Access Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 10.02 MB
Table of Contents
Table of Contents
9
About the Documentation
35
Audience
35
E Series and Junose Documentation and Release Notes
35
E Series and Junose Text and Syntax Conventions
35
Table 1: Notice Icons
36
Table 2: Text and Syntax Conventions
36
About the Documentation
37
Self-Help Online Tools and Resources
38
Opening a Case with JTAC
38
Documentation Feedback
37
Obtaining Documentation
37
Requesting Technical Support
37
Managing Remote Access
39
Chapter 1 Configuring Remote Access
41
Remote Access Overview
42
B-RAS Data Flow
42
Configuring IP Addresses for Remote Clients
42
AAA Overview
43
Remote Access Platform Considerations
43
B-RAS Protocol Support
43
Remote Access References
44
Before You Configure B-RAS
44
Remote Access Configuration Tasks
44
Configuring a B-RAS License
45
Mapping a User Domain Name to a Virtual Router
46
Mapping User Requests Without a Valid Domain Name
46
Mapping User Requests Without a Configured Domain Name
47
Using DNIS
47
Redirected Authentication
47
IP Hinting
48
Setting up Domain Name and Realm Name Usage
50
Using the Realm Name as the Domain Name
51
Using Delimiters Other than
51
Using Either the Domain or the Realm as the Domain Name
51
Specifying the Domain Name or Realm Name Parse Direction
51
Stripping the Domain Name
52
Domain Name and Realm Name Examples
54
Specifying a Single Name for Users from a Domain
54
Table 3: Username and Domain Name Examples
54
Configuring RADIUS Authentication and Accounting Servers
56
Server Access
56
Server Request Processing Limit
57
Authentication and Accounting Methods
57
Table 4: Local UDP Port Ranges by RADIUS Request Type
57
Supporting Exchange of Extensible Authentication Protocol Messages
58
Immediate Accounting Updates
59
Duplicate and Broadcast Accounting
59
Configuring AAA Duplicate Accounting
60
Configuring AAA Broadcast Accounting
60
Overriding AAA Accounting NAS Information
60
UDP Checksums
61
Collecting Accounting Statistics
61
Configuring RADIUS AAA Servers
61
SNMP Traps and System Log Messages
73
SNMP Traps
73
System Log Messages
74
Configuring SNMP Traps
74
Configuring Local Authentication Servers
77
Creating the Local Authentication Environment
77
Creating Local User Databases
77
Adding User Entries to Local User Databases
78
Using the Aaa Local Username Command
78
Using the Username Command
78
Assigning a Local User Database to a Virtual Router
79
Enabling Local Authentication on the Virtual Router
79
Configuration Commands
80
Local Authentication Example
84
Configuring Tunnel Subscriber Authentication
87
Configuring Name Server Addresses
88
Configuration Tasks
88
DNS Primary and Secondary NMS Configuration
88
WINS Primary and Secondary NMS Configuration
90
Configuring Local Address Servers
90
Local Address Pool Ranges
91
Local Address Pool Aliases
91
Shared Local Address Pools
91
Figure 1: Local Address Pool Hierarchy
91
SNMP Thresholds
92
Figure 2: Shared Local Address Pools
92
Configuring a Local Address Server
93
Configuring DHCP Features
97
Creating an IP Interface
97
Single Clients Per ATM Subinterface
97
Figure 3: Single PPP Clients Per ATM Subinterface
97
Multiple Clients Per ATM Subinterface
98
Figure 4: Multiple PPP Clients Per ATM Subinterface
98
Configuring AAA Profiles
99
Allowing or Denying Domain Names
100
Configuration Example
100
Using Domain Name Aliases
101
Manually Setting NAS-Port-Type Attribute
104
Service-Description Attribute
106
Using RADIUS Route-Download Server to Distribute Routes
107
Format of Downloaded Routes
107
Cisco-Avpair (Cisco VSA 26-1)
107
Framed-Route (RADIUS Attribute 22)
107
How the Route-Download Server Downloads Routes
108
Configuring the Route-Download Server to Download Routes
108
Using the AAA Logical Line Identifier to Track Subscribers
112
How the Router Obtains and Uses the LLID
112
RADIUS Attributes in Preauthentication Request
113
Table 5: RADIUS IETF Attributes in Preauthentication Request
113
Configuring the Router to Obtain the LLID for a Subscriber
114
Considerations for Using the LLID
114
Table 6: Vsas that Apply to Dynamic IP Interfaces
117
Troubleshooting Subscriber Preauthentication
117
Traffic Shaping for PPP over ATM Interfaces
118
Table 7: Traffic-Shaping Vsas that Apply to Dynamic IP Interfaces
119
Using Vsas for Dynamic IP Interfaces
117
Mapping Application Terminate Reasons to RADIUS Terminate Codes
120
Table 8: Supported RADIUS Acct-Terminate-Cause Codes
120
Configuration Example
121
Configuring Timeout
123
Limiting Active Subscribers
125
Notifying RADIUS of AAA Failure
125
Configuring Standard RADIUS Ipv6 Attributes for Ipv6 Neighbor Discovery Router Advertisements and Dhcpv6 Prefix Delegation
126
Duplicate Ipv6 Prefix Check Overview
127
Configuring Duplicate Ipv6 Prefix Check
128
Propagation of LAG Subscriber Information to AAA and RADIUS
128
Configuring the SRC Client
130
Monitoring and Troubleshooting Remote Access
130
Table 10: SRC Client and COPS Terminology
130
Table 9: RADIUS Attributes Specifying LAG Interface
130
Retrieval of DSL Line Rate Information from Access Nodes Overview
138
Dhcpv6 Local Address Pools for Allocation of Ipv6 Prefixes Overview
139
Dhcpv6 Prefix Delegation Example
141
Prefixes
142
Order of Preference in Allocating Prefixes and Assigning DNS Addresses to Requesting Routers
142
Configuring the Dhcpv6 Local Address Pools
143
Limitation on the Number of Prefixes Used by Clients
145
Example
146
Advertisement
Juniper JUNOSE 11.3 Configuration Manual (750 pages)
Software for E Series Broadband Services Routers BGP and MPLS Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 13.89 MB
Table of Contents
Chapter 3 MPLS Overview
245
MPLS Overview
246
Terminology for MPLS Topics
246
Table 49: Conventions for MPLS Terms
247
Border Gateway Protocol
248
MPLS Terms and Acronyms
248
Figure 47: Simple MPLS Domain
255
Figure 48: Label Switching
255
Figure 49: Label Stacking
257
Figure 50: Shim Header
258
TTL Processing in the Platform Label Space Overview
258
TTL Processing on Incoming MPLS Packets
259
Figure 51: TTL Processing on Incoming MPLS Packets
260
Rules for Processing on an LSR
260
TTL Processing on Outgoing MPLS Packets
260
Rules for Processing on an LER
261
Figure 52: TTL Processing on Outgoing MPLS Packets
262
MPLS Rules for TTL Expiration
262
MPLS Label Distribution Methodology
263
Figure 53: LSP Creation, Downstream-On-Demand, Ordered Control
264
Figure 54: LSP Creation, Downstream-Unsolicited, Independent Control
265
IP Data Packet Mapping Onto MPLS Lsps Overview
265
Statistics for IP Packets Moving on or off MPLS Lsps
267
MPLS Forwarding and Next-Hop Tables Overview
269
MPLS Packet Spoof Checking Overview
270
Explicit Routing for MPLS Overview
271
IP and Ipv6 Tunnel Routing Tables and MPLS Tunnels Overview
271
Figure 55: Explicit Routing in an MPLS Domain
272
MPLS Interfaces and Interface Stacking Overview
272
MPLS Major Interfaces
272
Interface Stacking
273
MPLS Minor Interfaces
273
MPLS Shim Interfaces
273
Figure 56: MPLS Interface Stacking for the Platform Label Space
274
MPLS Label Distribution Protocols Overview
274
Table 51: Tlvs Supported by MPLS LSP Ping
279
Table 52: Sub-Tlvs Supported for the Target FEC Stack TLV
280
MPLS Connectivity Verification and Troubleshooting Methods
281
Overview
282
Point-To-Multipoint Lsps Connectivity Verification at Egress Nodes
282
Nodes
283
P2MP Responder Identifier TLV Overview
283
RSVP P2MP Ipv4 Session Sub-TLV Overview
283
Echo Jitter TLV Operations
284
Echo Jitter TLV Overview
284
Tlvs and Sub-Tlvs Supported for Point-To-Multipoint Lsps Connectivity Verification at Egress Nodes
284
Traceroute Overview
284
P2MP Responder Identifier TLV Operations
285
Table 53: Sub-Tlvs Supported for the P2MP Responder Identifier TLV
285
Egress Address P2MP Responder Identifier Sub-Tlvs
286
Node Address P2MP Responder Identifier Sub-Tlvs
286
LDP Basic Discovery Mechanism
287
LDP Discovery Mechanisms
287
LDP Extended Discovery Mechanism
287
LSP Backup
288
MPLS Traffic Engineering Overview
288
Path Option
288
Methods for Configuring RSVP-TE Tunnels
289
Reoptimization
289
Tracking Resources for MPLS Traffic Engineering Overview
289
Admission Control Interface Table
290
Configuring Traffic-Engineering Resources
290
Starting Admission Control
290
LDP over RSVP-TE
291
LSP Preemption
291
Topology-Driven Lsps Overview
291
Figure 58: LDP Tunneled through an RSVP-TE Core
292
LDP Graceful Restart Overview
292
Table 54: Summary of LDP Graceful Restart States
293
LDP-IGP Synchronization Overview
294
Synchronization and te Metrics
296
Synchronization Behavior During Graceful Restart
296
Synchronization Behavior on IGP Passive Interfaces
296
Synchronization Behavior on LAN Interfaces
296
Use of RSVP-TE Hello Messages to Determine Peer Reachability
296
Hello Message Instances
297
Hello Message Objects
297
Sequence of Hello Message Exchange
297
Behavior of the Acknowledging Peer
298
Behavior of the Requesting Peer
298
Determination that a Peer Has Reset
298
Announcement of the Graceful Restart Capability
299
Behavior of both Peers
299
RSVP-TE Graceful Restart Overview
299
Recovery Behavior
300
Restarting Behavior
300
Preservation of an Established LSP Label
301
RSVP-TE Hellos Based on Node Ids Overview
301
BFD Protocol and RSVP-TE Overview
302
Pipe and Short Pipe Models
303
Tunneling Model for Differentiated Services Overview
303
EXP Bits for Differentiated Services Overview
304
Incoming Traffic
304
Uniform Model
304
Outgoing Traffic
305
Table 50: MPLS Terms and Acronyms
248
MPLS Features
250
MPLS Platform Considerations
251
MPLS References
252
MPLS Label Switching and Packet Forwarding Overview
254
MPLS Label Switching: Push, Look Up, and Pop
255
MPLS Lsrs
255
Figure 57: MPLS Interface Stacking for the Interface Label Space
274
LDP Messages and Sessions
275
RSVP-TE Messages and Sessions
276
RSVP-TE State Refresh and Reliability
277
BGP Signaling
278
ECMP Labels for MPLS Overview
278
MPLS Connectivity and ECMP
279
Supported Tlvs
279
MPLS Label Stacking
256
MPLS Labels and Label Spaces
257
Setting the EXP Bits for Outgoing Traffic
305
Figure 59: Flow for Initial Setting of EXP Bits for the First Label Pushed
306
Figure 60: Flow for Setting EXP Bits for All Pushed Labels
307
Point-To-Multipoint Lsps Overview
307
Using E Series Routers as Egress Lsrs
308
Figure 61: Simple MPLS Domain
309
Configuring MPLS
311
Basic MPLS Configuration Tasks
312
Table 55: Configuration Tasks by Type of Network
312
Configuring MPLS
313
MPLS Global Configuration Tasks
313
MPLS Global Tasks
313
LDP Global Tasks
314
RSVP-TE Global Tasks
315
LDP and RSVP-TE Interface Profile Configuration Tasks
316
LDP Interface Profile Configuration Tasks and Commands
317
MPLS Interface Configuration Tasks
317
RSVP-TE Interface Profile Configuration Tasks and Commands
317
LDP Interface Tasks
318
MPLS Interface Tasks
318
RSVP-TE Interface Tasks
318
MPLS Tunnel Configuration Tasks
319
MPLS Tunnel Profile Configuration Tasks
321
Configuring Explicit Routing for MPLS
322
Defining Configured Explicit Paths
323
Specifying Configured Explicit Paths on a Tunnel
323
Additional LDP Configuration Tasks
324
Configuring Dynamic Explicit Paths on a Tunnel
324
Configuring LDP FEC Deaggregation
324
Configuring LDP Graceful Restart
325
Figure 62: FEC Aggregation and Equal-Cost Paths
325
Configuring LDP Autoconfiguration
326
Configuring LDP MD5 Authentication
327
Configuring LDP-IGP Synchronization
327
Controlling LDP Label Distribution
328
Additional RSVP-TE Configuration Tasks
329
Configuring RSVP MD5 Authentication
330
Configuring RSVP-TE Fast Rerouting with RSVP-TE Bypass Tunnels
331
Configuration Example
332
Figure 63: Bypass Tunnel
332
Configuring RSVP-TE Hello Messages to Determine Peer Reachability
333
Fast Reroute over SONET/SDH
333
Configuring RSVP-TE Graceful Restart
335
Configuring RSVP-TE Hellos Based on Node Ids
335
Configuring the BFD Protocol for RSVP-TE
336
Configuring Igps and MPLS
337
Configuring the Igps for Traffic Engineering
339
Configuring MPLS and Differentiated Services
340
Configuring EXP Bits for Differentiated Services
341
Configuring the Tunneling Model for Differentiated Services
341
Example Differentiated Services Application and Configuration
341
Differentiated Services Configuration Example
342
Figure 64: Differentiated Services over an MPLS Network
342
Classifying Traffic for Differentiated Services
344
Table 56: Incoming L-LSP PHB Determination
345
Table 57: Examples of Incoming L-LSP PHB Determination
345
Table 58: Outgoing L-LSP PHB Determination
345
Configuring Static EXP-To-PHB Mapping
346
Signaled Mapping for RSVP-TE Tunnels
346
Figure 65: Associations between PHB ID, EXP Bits, and Traffic
347
Figure 66: Signaled Mapping
348
Example Traffic Class Configuration for Differentiated Services
349
Preference of Per-VR Versus Per-LSP Behavior
349
Table 59: Differentiated Services Mapping
349
Configuration on the Ingress Router
351
Configuration on the Ingress and Transit Routers
352
Configuration on the Transit and Egress Routers
353
Configuring Point-To-Multipoint Lsps
354
Monitoring MPLS
357
Setting a Baseline for MPLS Major Interface Statistics
358
Setting the Baseline for MPLS Statistics
358
Enabling and Setting a Baseline for MPLS Forwarding Table Statistics
359
Enabling and Setting a Baseline for MPLS Next-Hop Table Statistics
359
Clearing and Re-Creating Dynamic Interfaces from MPLS Major Interfaces
360
Enabling Statistics Collection for Policies Attached to MPLS Tunnels
360
Setting a Baseline for MPLS Tunnel Statistics
360
Clearing and Refreshing Ipv4 Dynamic Routes in the Tunnel Routing Table
361
Clearing and Refreshing Ipv6 Dynamic Routes in the Tunnel Routing Table
361
Tracing Paths through the MPLS User Plane
361
Monitoring ATM Vcs and VPI/VCI Ranges Used for MPLS
362
Table 60: Show Atm VC Output Fields
362
Accounting
363
Monitoring Global Call Admission Control Configuration
363
Monitoring Virtual Router Configuration
364
Table 61: Show Cac Interface Output Fields
364
Monitoring IP and Ipv6 Tunnel Routing Tables
365
Monitoring LDP
366
Table 62: Show Ip Tunnel Route and Show Ipv6 Tunnel-Route Output Fields
366
Table 63: Show Ldp Output Fields
367
Monitoring MPLS Label Bindings
368
Monitoring LDP Graceful Restart
369
Table 64: Show Ldp Binding and Show Mpls Binding Output Fields
369
Monitoring Interfaces that Are Synchronizing with LDP
370
Table 65: Show Ldp Graceful Restart Output Fields
370
Table 66: Show Ldp Igp-Sync Output Fields
370
Monitoring LDP Interfaces
371
Table 67: Show Ldp Interface Output Fields
371
Monitoring LDP Neighbors
373
Table 68: Show Ldp Neighbor Output Fields
375
Monitoring LDP Profiles
376
Monitoring LDP Statistics
376
Table 69: Show Ldp Profile Output Fields
376
Table 70: Show Ldp Statistics Output Fields
377
Monitoring LDP Targeted Hello Receive and Send Lists
379
Table 71: Show Ldp Targeted Session Output Fields
379
Monitoring MPLS Status and Configuration
380
Table 72: Show Mpls Output Fields
381
Monitoring MPLS Explicit Paths
382
Monitoring the RSVP-TE Bypass Tunnels
383
Table 73: Show Mpls Explicit-Paths Output Fields
383
Table 74: Show Mpls Fast-Reroute Output Fields
383
Monitoring MPLS Labels Used for Forwarding
384
Table 75: Show Mpls Forwarding Output Fields
384
Monitoring MPLS Interfaces
385
Table 76: Show Mpls Interface Output Fields
389
Monitoring MPLS Minor Interfaces
391
Monitoring MPLS Next Hops
392
Table 77: Show Mpls Minor-Interface Output Fields
392
Monitoring the Configured Mapping between PHB Ids and Traffic Class/Color Combinations
393
Table 78: Show Mpls Next-Hop Output Fields
393
Monitoring RSVP-TE Profiles and MPLS Tunnel Profiles
394
Table 79: Show Mpls Phb-ID Output Fields
394
Monitoring RSVP Path State Control Blocks, Reservation State Control Blocks
395
Or Sessions
395
Table 80: Show Mpls Profile Output Fields
395
Table 81: Show Mpls Rsvp Output Fields
396
Monitoring RSVP MD5 Authentication
399
Monitoring RSVP-TE Interfaces Where BFD Is Enabled
400
Table 82: Show Mpls Rsvp Authentication Output Fields
400
Table 83: Show Mpls Rsvp Bfd Interfaces Output Fields
400
Monitoring RSVP-TE Interface Counters
401
Table 84: Show Mpls Rsvp Counters Output Fields
401
Monitoring RSVP-TE Graceful Restart
403
Table 85: Show Mpls Rsvp Hello Graceful Restart Output Fields
403
Monitoring RSVP-TE Hello Adjacency Instances
404
Table 86: Show Mpls Rsvp Hello Instance Output Fields
404
Monitoring Status and Configuration for MPLS Tunnels
406
Table 87: Show Mpls Tunnels Output Fields
407
Verifying and Troubleshooting MPLS Connectivity
408
Sending an MPLS Echo Request Packet to a Martini Circuit
409
Sending an MPLS Echo Request Packet to an IP or Ipv6 Address
409
Sending an MPLS Echo Request Packet to an L3VPN IP or Ipv6 Prefix
409
Sending an MPLS Echo Request Packet to an RSVP-TE Tunnel
409
Tracing the Path of an MPLS Echo Request Packet to a Martini Circuit
409
Tracing the Path of an MPLS Echo Request Packet to an IP or Ipv6 Address
409
Tracing the Path of an MPLS Echo Request Packet to an L3VPN IP or Ipv6 Prefix
409
Packet Flow Examples for Verifying MPLS Connectivity
410
Sending an MPLS Echo Request Packet to a VPLS Instance
410
Tracing the Path of an MPLS Echo Request Packet to a VPLS Instance
410
Tracing the Path of an MPLS Echo Request Packet to an RSVP-TE Tunnel
410
Figure 67: Sample MPLS L3VPN Topology
411
Packet Flow Example for the Ping Mpls Command
411
Packet Flow Examples for MPLS Lsps to an IP Prefix
411
Packet Flow Example for the Trace Mpls Command
413
Packet Flows for Ping and Trace to L3VPN Ipv4 Prefixes
414
Inter-AS Topology
416
Packet Flows to L3VPN Ipv6 Prefixes
417
Troubleshooting MTU Problems in Point-To-Point Lsps
417
Troubleshooting MTU Problems in a Point-To-Point MPLS LSP Associated with a Martini Circuit
418
Troubleshooting MTU Problems in a Point-To-Point MPLS LSP Associated with a VPLS Instance
418
Troubleshooting MTU Problems in a Point-To-Point MPLS LSP Associated with an IP or Ipv6 Address
418
Troubleshooting MTU Problems in a Point-To-Point MPLS LSP Associated with an L3VPN IP or Ipv6 Prefix
418
Troubleshooting MTU Problems in a Point-To-Point MPLS LSP Associated with an RSVP-TE Tunnel
418
Configuring BGP-MPLS Applications
421
Overview
421
Address Families
422
Equal-Cost Multipath Support
423
BGP/MPLS VPN Components
424
Figure 68: ECMP BGP/MPLS VPN Scenario
424
Figure 69: BGP/MPLS VPN Scenario
425
Figure 70: BGP/MPLS VPN Components
426
Route Targets
427
VPN-Ipv4 Addresses
427
Distribution of Routes and Labels with BGP
428
Figure 71: Route and Label Distribution
428
Figure 72: Standard and Extended BGP Update Messages
430
Platform Considerations
431
References
431
Figure 73: BGP/MPLS VPN Route Exchange
432
Transporting Packets Across an IP Backbone with MPLS
432
Figure 74: LSP Creation for BGP/MPLS VPN
434
Figure 75: Traffic Across the MPLS Backbone of a BGP/MPLS VPN
435
Configuring Ipv6 Vpns
436
Intra-AS Ipv6 Vpns
437
BGP Control Plane Behavior
438
CE-PE Behavior
438
Figure 76: Ipv6 VPN Services over Ipv4 MPLS
438
MPLS Data Plane Behavior
439
PE-PE Behavior
439
Providing Ipv4 VPN Services Across Multiple Autonomous Systems
439
Figure 77: Inter-AS Topology with Vrfs on each as Boundary Router
440
Inter-AS Option a
440
Inter-AS Option B
440
Figure 78: Inter-AS Topology with End-To-End Stacked MPLS Tunnels
441
Figure 79: Topology for Three-Label Stack Configuration for Inter-AS Option
444
Inter-AS Option C
444
Figure 80: Topology for Inter-AS Option C with Route Reflectors
446
Inter-AS Option C with Route Reflectors
446
Figure 81: Inter-AS Ipv6 VPN Services
447
Providing Ipv6 VPN Services Across Multiple Autonomous Systems
447
Figure 82: Site Connectivity in a Full-Mesh VPN
448
Full-Mesh Vpns
448
Using Route Targets to Configure VPN Topologies
448
Figure 83: Route Target Configuration for a Full-Mesh VPN
449
Figure 84: Site Connectivity in a Hub-And-Spoke VPN
449
Hub-And-Spoke Vpns
449
Figure 85: Route Target Configuration for a Hub-And-Spoke VPN
450
Figure 86: Site Connectivity in an Overlapping VPN
450
Overlapping Vpns
450
Figure 87: Route Target Configuration for an Overlapping VPN
451
Figure 88: Overlapping Vpns on a Single PE
451
Table 88: Route-Target Filtering Advertisement Rules for Routes Received from
455
Advertising a Default Route
456
Conditions for Advertising RT-MEM-NLRI Routes
456
Configuring Route-Target Filtering
458
Route Selection When Route-Target Filtering Is Enabled
458
Configuring BGP VPN Services
460
Multicast Services over Vpns
460
VRF Configuration Tasks
460
PE Router Configuration Tasks
461
Creating a VRF
462
Defining Route Targets for Vrfs
463
Specifying a Route Distinguisher
463
Figure 89: Fully Meshed Vpns
465
Figure 90: Hub-And-Spoke VPN
467
Setting Import and Export Maps for a VRF
467
Characteristics of Import and Global Import Maps
468
Figure 91: Import and Export Maps
468
Characteristics of Export and Global Export Maps
469
Subsequent Distribution of Routes
469
Table 89: Characteristics of Import and Global Import Maps
469
Table 90: Characteristics of Export and Global Export Maps
469
Creating a Map
470
Export Maps
470
Global Export Maps
471
Import Maps
471
Global Export of Ipv6 VPN Routes into the Global BGP Ipv6 RIB
472
Global Import Maps
472
Assigning an Interface to a VRF
473
Defining Secondary Routing Table Lookup
474
Adding Static Routes to a VRF
476
Configuring Igps on the VRF
476
Figure 92: Configuring Static Routes
476
Configuring the IGP in the VRF Context
477
Configuring the IGP Outside the VRF Context
477
Disabling Automatic Route-Target Filtering
478
Creating Labels Per FEC
479
Configuring PE-To-PE Lsps
480
Enabling BGP ECMP for BGP/MPLS Vpns
480
Enabling BGP Routing
480
Figure 93: BGP/MPLS VPN IBGP Example
481
Figure 94: BGP/MPLS VPN EIBGP Example
482
Enabling VPN Address Exchange
483
Constraining Route Distribution with Route-Target Filtering
452
Exchanging Route-Target Membership Information
452
Receiving and Sending RT-MEM-NLRI Routing Updates
454
Configuring PE-To-CE BGP Sessions
484
Figure 95: PE-To-CE Session
484
Advertising IGP Routes to Customers
485
Advertising Static Routes to Customers
485
Disabling the Default Address Family
485
Using a Single as Number for All CE Sites
486
Preventing Routing Loops
487
Figure 96: Network with Potential Routing Loops
488
Figure 97: Preventing Potential Routing Loops in the Network
489
Figure 98: Allowing Local as in Vpnv4 Address Family
490
Controlling Route Importation
491
Deleting Routes for a VRF
492
Enabling VRF-To-VR Peering
493
Achieving Fast Reconvergence in VPN Networks
494
Fast Reconvergence with Unique Rds
495
Figure 99: Topology for Fast Reconvergence by Means of Unique VRF Rds, before Tunnels Go down
495
Fast Reconvergence by Means of Reachability Checking
496
Configuring BGP to Send Labeled and Unlabeled Unicast Routes
497
Figure 100: Topology for Fast Reconvergence by Means of Reachability Checking, after Tunnels Go down
497
BGP Next-Hop-Self
498
BGP Processing of Received Routes
499
Labeled Unicast Routes
499
Labeled VPN Routes
499
Resolving Ipv6 Indirect Next Hops
499
Unlabeled Unicast Routes
499
Afi
500
Providing Internet Access to and from Vpns
500
Table 91: Resolution of Indirect Next Hops
500
Table 92: Advertising Action Taken Following Best Route Selection
500
Configuring a Default Route to a Shared Interface
501
Enabling Traffic Flow from the VPN to the Internet
501
Problems
501
Solutions
501
Configuring a Fallback Global Option
502
Figure 101: Static Default Route for Internet Access
502
Configuring a Global Import Map for Specific Routes
503
Figure 102: Fallback Global Option
503
Creating a BGP Session between the CE Router and the Parent VR
504
Figure 103: Global Import Map Applied to Routes Imported from VRF BGP
504
Figure 104: BGP Session between CE Router and Parent VR
505
Enabling Traffic Flow from the Internet to the VPN
506
Static Routes to a Shared IP Interface
506
Figure 105: Static Route to Shared IP Interface
507
Global Export Map
507
Carrier-Of-Carriers Ipv4 Vpns
508
Figure 106: Global Export Map Applied to Routes Exported from VRF BGP
508
Customer Carrier as an Internet Service Provider
509
Configuration Steps
510
Figure 107: Carrier-Of-Carriers Internet Service
510
Customer Carrier as a VPN Service Provider
511
Configuration Steps
512
Figure 108: Carrier-Of-Carriers VPN Service
512
Enabling Carrier-Of-Carriers Support on a VRF
513
Carrier-Of-Carriers Ipv6 Vpns
514
Carrier-Of-Carriers Using BGP as the Label Distribution Protocol
514
Figure 109: Carrier-Of-Carrier Ipv6 Vpns
514
Connecting Ipv6 Islands Across Ipv4 Clouds with BGP
515
Figure 110: Ipv6 Tunneled over MPLS-Ipv4
515
Connecting Ipv6 Islands Across Multiple Ipv4 Domains
516
Figure 111: Ipv6 Tunneled Across Ipv4 Domains
516
Configuring Ipv6 Tunneling over Ipv4 MPLS
517
OSPF and BGP/MPLS Vpns
518
Distributing OSPF Routes from CE Router to PE Router
519
Distributing Routes between PE Routers
519
OSPF Domain Identifier Attribute
519
Preserving OSPF Routing Information Across the MPLS/VPN Backbone
519
Advertising Prefixes with Duplicate as Numbers
490
OSPF Route Type Attribute
519
Table 93: Route Types and Route Origins
519
Distributing OSPF Routes from PE Router to CE Router
520
Preventing Routing Loops
520
Figure 112: OSPF Topology with Backdoor Link
521
Using Remote Neighbors to Configure OSPF Sham Links
521
OSPF Backdoor Links
522
OSPF Sham Links
522
Figure 113: OSPF Sham Link
523
Configuration Tasks
524
Configuring L2Vpns
526
Configuring VPLS
526
Enabling the MP-BGP Events Log Display
527
Monitoring BGP Next Hops for VPN
527
Monitoring BGP/MPLS Vpns
527
Table 94: Show Ip Bgp Next-Hop Output Fields
528
Monitoring VRF Interfaces
529
Table 95: Show Ip Interface Vrf Output Fields
530
Monitoring VRF Routing Protocols
532
Table 96: Show Ip Protocols Output Fields
532
Monitoring the VRF Routing Table
534
Monitoring the VRF
535
Table 97: Show Ip Route Output Fields
535
Table 98: Show Ip Vrf Output Fields
538
Table 99: Show Mpls L2Transport Load-Balancing-Group Output Fields
542
Monitoring MPLS Tunnels
543
Disabling the MP-BGP Events Log Display
544
Table 100: Show Mpls Tunnels Output Fields
544
Layer 2 Services over MPLS
547
Layer 2 Services over MPLS Overview
549
Figure 114: Layer 2 Services over a Provider's MPLS Network
550
Layer 2 Services over MPLS Platform Considerations
550
Module Requirements
550
Interface Specifiers
551
Layer 2 Services over MPLS References
551
Layer 2 Services over MPLS Implementation
552
Local Cross-Connects between Layer 2 Interfaces Using MPLS Overview
553
MPLS Shim Interfaces for Layer 2 Services over MPLS Overview
554
ATM Layer 2 Services over MPLS Overview
555
Multiple Layer 2 Services over MPLS Overview
555
AAL5 Encapsulation
556
Figure 115: Common ISP Network
556
Figure 116: E Series Router Replacing Remote ATM Switch
556
Figure 117: AAL5 Pseudowire and MPLS Tunnel
557
Limitations
557
OAM Cells
557
Qos Classification
557
AAL0 Raw Cell Mode
558
Cell Concatenation Parameters
558
Control Word Support
558
VCC Cell Relay Encapsulation
558
Cell Concatenation and Latency
559
Control Word Support
559
Unsupported Features
559
Control Word Support
560
Encapsulation
560
HDLC Layer 2 Services over MPLS Overview
560
Interface Stacking
560
Local Cross-Connects
561
Monitoring Load-Balanced Martini Circuits
541
CE-Side MPLS L2Vpns over LAG Overview
561
Ethernet Raw Mode Encapsulation for Martini Layer 2 Transport Overview
562
Figure 118: CE-Side MPLS L2VPN Tunnel over LAG
562
S-VLAN Subinterface with an Untagged C-VLAN ID Overview
564
Multiple ATM Virtual Circuits over a Single Pseudowire Overview
565
Guidelines for Configuring VPI/VCI Ranges of ATM Virtual Circuits
567
An ATM Port
568
Performance Impact and Scalability Considerations
568
Before You Configure Layer 2 Services over MPLS
571
Configuring Layer 2 Services over MPLS
571
Configuring Frame Relay Layer 2 Services
572
Configuring Interoperation with Legacy Frame Relay Layer 2 Services
572
Configuring Ethernet/Vlan Layer 2 Services
573
Configuring S-VLAN Tunnels for Layer 2 Services
574
Configuring Local Cross-Connects between Ethernet/Vlan Interfaces
575
Figure 119: Local Cross-Connect between Ethernet/Vlan Interfaces
575
Configuring Local ATM Cross-Connects with AAL5 Encapsulation
576
Configuring an MPLS Pseudowire with VCC Cell Relay Encapsulation
578
Configuring HDLC Layer 2 Services
580
CE-Side Load Balancing for Martini Layer 2 Transport
581
Differences
581
Understanding CE Load Balancing for Martini Layer 2 Transport
581
And VC ID
582
VC ID
582
Load-Balancing Group Configuration
583
Figure 120: CE-Side Load-Balancing Topology
584
Adding a Member Interface to a Group Circuit
585
Configuring Load-Balancing Groups
585
MPLS Interfaces and Labels
585
Removing Member Subinterfaces from a Circuit
585
Example: Configuring Frame Relay over MPLS
586
Figure 121: Sample Frame Relay over MPLS Configuration
586
Configuration on CE1 (Local CE Router)
589
Example: Configuring MPLS L2VPN Tunnel over VLAN over LAG
589
Figure 122: MPLS L2VPN Tunnel over VLAN over LAG Configuration Example
589
Configuration on PE1 (Local PE Router)
590
Configuration on PE2 (Remote PE Router)
591
Configuration on CE2 (Remote CE Router)
592
Example: Configuring MPLS L2VPN Tunnel over LAG
592
Configuration on CE1 (Local CE Router)
593
Figure 123: MPLS L2VPN Tunnel over LAG Configuration Example
593
Configuration on PE1 (Local PE Router)
594
Configuration on PE2 (Remote PE Router)
595
Configuration on CE2 (Remote CE Router)
596
Examples: Ethernet Raw Mode Encapsulation for Martini Layer 2 Transport
596
Figure 124: MPLS L2VPN Tunnel over LAG Configuration Example
597
Table 101: Martini Circuit Scenarios Without Ethernet Raw Mode
597
Figure 125: Ethernet Packet Distribution over Martini Circuits
598
Table 102: Martini Circuit Scenarios with Ethernet Raw Mode
598
Figure 126: Martini Circuit with Two Pseudowires between PE-Facing
600
Example: Multiple ATM Virtual Circuits over a Single Pseudowire
601
Figure 127: Martini Circuit Deployment for Transmission of Multiple ATM Vcs
602
Monitoring Layer 2 Services over MPLS
605
Setting Baselines for Layer 2 Services over MPLS Statistics
605
Monitoring ATM Martini Cell Packing Timers for Layer 2 Services over MPLS
606
Examples: Configuring S-VLAN Subinterface with an Untagged C-VLAN ID
599
Monitoring ATM Subinterfaces for Layer 2 Services over MPLS
606
Table 103: Show Atm Mcpt-Timers Output Fields
606
Table 104: Show Atm Subinterface Output Fields
607
Monitoring ATM Cross-Connects for Layer 2 Services over MPLS
608
Monitoring MPLS Forwarding for Layer 2 Services over MPLS
608
Table 105: Show Mpls Cross-Connects Atm Output Fields
608
Table 106: Show Mpls Forwarding Output Fields
609
Monitoring MPLS Layer 2 Interfaces for Layer 2 Services over MPLS
610
Table 107: Show Mpls Interface and Show Mpls L2Transport Interface Output
611
Virtual Private LAN Service
615
VPLS Overview
617
VPLS Protocol Overview
617
Figure 128: VPLS Sample Topology
618
VPLS Components Overview
618
Customer Edge Devices
619
VPLS Domains
619
VPLS Edge Devices
619
Table 108: VPLS Forwarding Table on PE 1 for VPLS a
620
Table 109: VPLS Forwarding Table on PE 1 for VPLS B
620
Table 110: VPLS Forwarding Table on PE 2 for VPLS a
620
VPLS and Transparent Bridging Overview
620
Table 111: VPLS Forwarding Table on PE 2 for VPLS B
621
Modifying Subscriber Policies
622
Table 112: Default Subscriber Policies for VPLS Network Interfaces
622
BGP Signaling for VPLS Overview
623
Considerations for VPLS Network Interfaces
623
Table 113: Commands to Configure Subscriber Policies
623
LDP Signaling for VPLS Overview
624
Targeted Sessions
624
BGP Multihoming for VPLS Overview
625
Pwid FEC Element TLV
625
Designated VE Device Selection for a Multihomed Site
627
Multihoming Reaction to Failures in the Network
629
VPLS Supported Features
629
Module Requirements
630
VPLS Platform Considerations
630
Interface Specifiers
631
VPLS References
631
Configuring VPLS
633
Default Subscriber Policies
621
Network Interface Types
621
Subscriber Policies for VPLS Network Interfaces Overview
621
Juniper JUNOSE 11.3 Configuration Manual (772 pages)
Software for E Series Broadband Services Routers Link Layer Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 11.79 MB
Table of Contents
Abbreviated
7
Table of Contents
7
List of Tables
27
About the Documentation
29
E Series and Junose Documentation and Release Notes
29
Audience
29
E Series and Junose Text and Syntax Conventions
29
Table 1: Notice Icons
30
Table 2: Text and Syntax Conventions
30
Obtaining Documentation
31
Documentation Feedback
31
Requesting Technical Support
31
About the Documentation
31
Self-Help Online Tools and Resources
32
Opening a Case with JTAC
32
Chapters
33
Configuring ATM
33
Configuring Packet over SONET
33
Configuring ATM
35
Overview
35
Chapter 1 Configuring ATM
35
ATM Interfaces
36
ATM Physical Connections
36
Figure 1: ATM Interface Column
36
ATM Adaptation Layer
37
ATM Svcs
37
ATM Virtual Connections
37
Virtual Channel Connection
37
Virtual Path Connection
37
Configuring ATM
37
Local ATM Passthrough
38
VCC Cell Relay Encapsulation
38
Configuring ATM
39
Traffic Management
39
Connection Admission Control
39
Table 3: Scheduling Priorities for Traffic Classes
39
Table 4: Traffic Parameters Used to Compute Bandwidth
39
Ilmi
41
VPI/VCI Address Ranges
41
VP Tunneling
41
Platform Considerations
42
Module Requirements
42
Interface Specifiers
42
References
43
Supported Features
43
Module Capabilities
43
Virtual Channel Support
44
Table 5: ATM Capabilities on Line Modules and I/O Modules
44
Atm Nbma
45
ARP Table
45
Static Map Versus Inverse ARP
45
Figure 2: NBMA Interface Stack
45
Aging
46
Removing Circuits
46
Operations, Administration, and Management of ATM Interfaces
46
End-To-End and Segment Endpoints
46
Fault Management
47
How the ATM Interface Handles AIS Cells
47
How the ATM Interface Handles RDI Cells
47
Continuity Verification
48
Activation and Deactivation Cells
48
Activating CC Cell Flow
48
Deactivating CC Cell Flow
48
After CC Cell Flow Is Enabled
49
Loopback
49
VC Integrity
49
F4 OAM Cells
50
ATM Ping
50
How the ATM Interface Handles Loopback Cells Received
50
Automatic Disabling of F5 OAM Services
51
Rate Limiting for F5 OAM Cells
51
Table 6: Handling of F4 and F5 Loopback Cells Received
51
Before You Configure ATM
52
Configuration Tasks
52
Creating a Basic Configuration
53
Figure 3: Configuring an ATM Interface, Subinterface, and PVC
54
Setting Optional Parameters
55
Optional Tasks on ATM 1483 Subinterfaces
57
Configuring OAM
63
Configuring F4 OAM
64
Configuring F5 OAM
65
Setting a Loopback Location ID
67
Enabling OAM Flush
67
Running ATM Ping
68
Configuring an NBMA Interface
70
Creating an NBMA Static Map
70
Assigning Descriptions to Interfaces
72
Sending Interface Descriptions to AAA
73
Assigning Descriptions to Virtual Paths
74
Exporting ATM 1483 Subinterface Descriptions
74
Configuring Individual ATM PVC Parameters
75
Benefits
76
Creating Control Pvcs
77
Creating Data Pvcs
77
Configuring the Service Category for Data Pvcs
78
Configuring Encapsulation for Data Pvcs
80
Configuring F5 OAM for Data Pvcs
81
Table 7: F5 OAM Configuration Tasks and Associated Commands
81
Configuring Inverse ARP for Data Pvcs
84
Configuring ATM VC Classes
85
Benefits
85
Precedence Levels
86
Precedence Levels for Static Pvcs
86
Precedence Levels for Dynamic Pvcs
87
Precedence Level Examples
87
Upgrade Considerations
87
Configuring VC Classes
88
Table 8: Commands to Configure VC Class Attributes
89
Assigning VC Classes to Individual Pvcs
93
Assigning VC Classes to ATM Major Interfaces
94
Assigning VC Classes to Static ATM 1483 Subinterfaces
95
Assigning VC Classes to Base Profiles for Bulk-Configured VC Ranges
96
Precedence Level Examples for Assigning VC Classes
96
Example 1: Explicitly Changing the Service Category
97
Example 2: Changing the Encapsulation Method in the VC Class
97
Example 3: Effect of Using the Atm Pvc Command
98
Example 4: Overriding RADIUS Values
98
Configuring Dynamic ATM 1483 Subinterfaces
98
Monitoring ATM
99
Setting Statistics Baselines
99
Displaying Interface Rate Statistics for ATM Vcs and ATM Vps
100
Using ATM Show Commands
104
Chapter 2 Configuring Frame Relay
137
Overview
137
Framing
137
Error Frames
138
Unicast and Multicast Addressing
138
User-To-Network and Network-To-Network Interfaces
138
Platform Considerations
139
Module Requirements
139
Interface Specifiers
139
Configuring Frame Relay
139
Figure 4: Interconnection and Relationship of Nnis and Subnetworks
139
References
140
Before You Configure Frame Relay
140
Configuring Frame Relay
140
Configuring Frame Relay
141
End-To-End Fragmentation and Reassembly
148
Frame Fragmentation
148
Frame Reassembly
148
Map Class
149
Configuring End-To-End Fragmentation
149
Monitoring Frame Relay
152
Chapter 3 Configuring Multilink Frame Relay
163
Overview
163
T1/E1 Connections
163
MLFR Link Integrity Protocol
164
Figure 5: MLFR Aggregation of T1 Lines into a Single Bundle
164
Figure 6: Terminating the Bundle at an MLFR Bridge
164
Table 9: LIP Messages and Functions
164
Interface Stacking
165
Platform Considerations
165
Figure 7: Structure of MLFR
165
Module Requirements
166
Interface Specifiers
166
References
166
Supported MLFR Features
166
Unsupported MLFR Features
167
Before You Configure MLFR
168
Configuration Tasks
168
Configuration Example
169
Configuring Frame Relay Versus MLFR
169
Monitoring MLFR
170
Chapter 4 Configuring Upper-Layer Protocols over Static Ethernet Interfaces
183
Upper-Layer Protocols over Static Ethernet Overview
183
Upper-Layer Protocols over Static Ethernet Platform Considerations
184
Figure 8: Multiplexing Multiple Protocols over a Single Physical Link
184
Configuring Upper-Layer Protocols over Static Ethernet Interfaces
185
Module Requirements
185
Interface Specifiers
185
Upper-Layer Protocols over Static Ethernet References
185
Configuring IP over a Static Ethernet Interface
185
Configuring Pppoe over a Static Ethernet Interface
186
Figure 9: Example of IP over Ethernet Stacking Configuration Procedure
186
Figure 10: Example of Pppoe Stacking Configuration Procedure
186
Configuring IP and MPLS over a Static Ethernet Interface
187
Configuring IP, MPLS, and Pppoe over Ethernet
187
Figure 11: Example of IP and MPLS Stacking Configuration Procedure
187
L2TP and Ethernet
188
Figure 12: Example of IP, MPLS, and Pppoe Stacking Configuration
188
Multinetting and Ethernet
189
Monitoring Upper-Level Protocols over Ethernet
189
Chapter 5 Configuring VLAN and S-VLAN Subinterfaces
199
VLAN Overview
199
S-VLAN Overview
200
Figure 13: Use of Vlans to Multiplex Different Protocols over a Single Physical
200
VLAN and S-VLAN Platform Considerations
201
Module Requirements
201
Interface Specifiers
202
VLAN and S-VLAN References
202
Creating a VLAN Subinterface
202
Configuring VLAN and S-VLAN Subinterfaces
203
Creating a VLAN Major Interface
203
Configuring IP over VLAN
203
Configuring Pppoe over VLAN
204
Figure 14: Example of Ip/Vlan/Fast Ethernet Stacking Configuration
204
Configuring MPLS over VLAN
205
Figure 15: Example of Pppoe/Vlan/Fast Ethernet Stacking Configuration
205
Configuring IP over VLAN and Pppoe over VLAN
206
Figure 16: Example of Mpls/Vlan/Fast Ethernet Stacking Configuration
206
Figure 17: Example of Pppoe over VLAN with IP over VLAN Stacking Configuration
208
Configuring an S-VLAN Subinterface
210
Configuring Pppoe over an S-VLAN
211
Figure 18: Example of Pppoe over S-VLAN Stacking Configuration Procedure
212
Configuring S-VLAN Tunnels for Layer 2 Services over MPLS
214
Advantages
214
Figure 19: S-VLAN Tunnels for Ethernet Layer 2 Services over MPLS
214
Interface Stacking
215
Configuration Example
215
S-VLAN Oversubscription
217
Monitoring VLAN and S-VLAN Subinterfaces
218
Displaying Interface Rate Statistics for VLAN Subinterfaces
218
Using Ethernet Show Commands
221
Chapter 6 Configuring 802.3Ad Link Aggregation and Link Redundancy
229
802.3Ad Link Aggregation for Ethernet Overview
229
Lacp
230
Higher-Level Protocols
230
Figure 20: Interface Stack for 802.3Ad Link Aggregation
230
Load Balancing and Qos
231
Ethernet Link Aggregation and MPLS
231
802.3Ad Link Aggregation Platform Considerations
231
Module Requirements
231
Configuring 802.3Ad Link Aggregation and Link Redundancy
231
Interface Specifiers
232
802.3Ad Link Aggregation References
232
Configuring 802.3Ad Link Aggregation
232
Configuring 802.3Ad Link Aggregation and Link Redundancy
233
Configuring an Ethernet Physical Interface
233
Configuring a LAG Bundle
233
Configuring IP for a LAG Bundle
233
Configuring a VLAN Subinterface for a LAG Bundle
234
Configuring a Pppoe Subinterface for a LAG Bundle
234
Configuring MPLS for a LAG Bundle
234
Example: Configuring an IP Interface for a LAG Bundle
237
Example: Configuring a Pppoe Subinterface for a LAG Bundle
237
Example: Configuring a Pppoe Subinterface over a VLAN for a LAG Bundle
238
Example: Configuring MPLS for a LAG Bundle
239
Example: Configuring MPLS over a VLAN for a LAG Bundle
239
Ethernet Link Redundancy Overview
240
Ethernet Link Redundancy Configuration Models
240
Ethernet Link Redundancy Configuration Diagrams
241
Figure 21: Ethernet Link Redundancy Configuration Models
241
Figure 22: GE-2 Line Module Using Physical Port Redundancy
242
Figure 23: Single-Homed GE-2 Line Module Configuration
242
Figure 24: Single-Homed FE-8 Line Module Configuration (1:N)
242
Figure 25: FE-8 Line Module with 4 Redundant Ethernet Links (1:1)
243
Figure 26: Single-Homed GE-4 IOA Configuration (1:4)
243
Ethernet Link Redundancy Behavior
244
Figure 27: GE-8 IOA Configuration Across Ioas (1:N)
244
Figure 28: Dual-Homed Configuration (1:1)
244
Link Failure and Acquisition
245
Protecting against Physical Link Failure
245
Protecting against Virtual Link Failure
245
Reverting after a Failover
246
LACP Configuration and Member Link Behavior
246
Member Link with Non-LAG Partner
247
Ethernet Link Redundancy and RSTP
247
Figure 29: Dual-Homed Heterogeneous Configuration in an RSTP Network
247
Table 10: Behavior of Member Links Using Local and Remote LACP Modes
247
Acquiring Initial Links
248
Detecting Failures
248
Failing over
248
Configuring Ethernet Link Redundancy
249
Monitoring 802.3Ad Link Aggregation
250
Chapter 7 Configuring IEEE 802.3Ah OAM Link-Fault Management
255
Ethernet OAM Link-Fault Management Overview
256
Ethernet OAM Link-Fault Management Platform Considerations
257
Module Requirements
257
Interface Specifiers
257
Configuring IEEE 802.3Ah OAM Link-Fault Management
257
Ethernet OAM Link-Fault Management References
258
OAM Messages
258
Figure 30: OAM PDU Format
258
Configuring IEEE 802.3Ah OAM Link-Fault Management
259
OAM Elements Overview
259
OAM Client
260
OAM Sublayer
260
Figure 31: OAM Sublayer Interfaces
260
Control Block
261
Multiplexer
261
Parser
261
Figure 32: OAM Sublayer Entities
261
OAM Feature Overview
262
OAM Discovery Feature
262
Information OAM PDU Components
263
Transmission Settings for Information OAM Pdus
263
OAM Link Monitoring Feature
264
Supported Error Events for Tracking Link Faults
265
Actions Performed on Exceeding Threshold Values
265
OAM Remote Fault Detection Feature
266
Link Fault
266
Dying Gasp
266
Critical Event
266
OAM Remote and Local Loopback Feature
267
Interrelationship of OAM Link-Fault Management with Ethernet Subsystems
268
Figure 33: Interrelationship between 802.3Ah OAM and 802.3Ad LAG
268
Guidelines for Configuring 802.3Ah OAM Link-Fault Management
269
Configuring 802.3Ah OAM Link-Fault Management
270
Example: Configuring 802.3Ah OAM Link-Fault Management and Enabling Remote Failure Monitoring on an Interface
276
Example: Enabling Remote Loopback Support on the Local Interface
277
Monitoring OAM Link-Fault Management Discovery Settings for an Interface
277
Table 11: Show Ethernet Oam Lfm Discovery Output Fields
278
Monitoring OAM Link-Fault Management Statistics for an Interface
280
Table 12: Show Ethernet Oam Lfm Statistics Output Fields
281
Monitoring OAM Link-Fault Management Configuration for an Interface
282
Table 13: Show Ethernet Oam Lfm Status Output Fields
283
Monitoring OAM Link-Fault Management Sessions on All Configured
285
Interfaces
285
Table 14: Show Ethernet Oam Lfm Summary Output Fields
286
Chapter 8 Configuring Point-To-Point Protocol
291
Overview
291
Framing
291
Error Frames
292
Link Control Protocol
292
LCP Negotiation Parameters
292
Validation of LCP Peer Magic Number
293
Configuring Point-To-Point Protocol
293
B-RAS Support
294
Configuring Point-To-Point Protocol
295
Authentication
295
Rate Limiting for PPP Control Packets
295
Extensible Authentication Protocol
295
Figure 34: Authentication with EAP
295
EAP Types
296
EAP Packet Retransmission
296
Table 15: Supported EAP Types
296
EAP Behavior in an L2TP Environment
297
Limitations
297
Performance
298
Remote Peer Scenarios During Negotiation of PPP Options
299
IPCP Lockout and Local IP Address Pool Restoration
300
IPCP Negotiation with Optional Peer IP Address
300
Platform Considerations
301
Module Requirements
301
Interface Specifiers
302
References
302
Before You Configure PPP
303
Configuration Tasks
303
Optional Configuration Tasks
306
Configuring PPP Authentication
311
PPP Accounting Statistics
313
Monitoring PPP Interfaces
314
Troubleshooting
328
Chapter 9 Configuring Multilink PPP
331
Overview
331
Application
332
MLPPP LCP Extensions
332
Figure 35: MLPPP Aggregation of T1 Lines into a Single Bundle
332
Figure 36: Structure of MLPPP
332
MLPPP Link Selection
333
Configuring Multilink PPP
333
Platform Considerations
334
Configuring Multilink PPP
335
Module Requirements
335
Interface Specifiers
335
References
335
Supported MLPPP Features
336
Unsupported MLPPP Features
340
Before You Configure Static MLPPP
340
Configuring Static MLPPP
340
Configuration Example
341
Contextual Command Differences
342
Configuring Authentication
342
Configuring Other PPP Attributes
344
Configuring Dynamic MLPPP
351
Configuring MLPPP Fragmentation and Reassembly
352
Overview
352
Application
352
Supported Configurations
352
Table 16: Supported Configurations for MLPPP Fragmentation and Reassembly
352
Module Requirements
353
Link Configuration Parameters
353
Bundle Validation and Configuration Guidelines
353
Bundle Validation Failure
354
Recovering from Bundle Validation Failure
354
Configuring Fragmentation and Reassembly for Static MLPPP
355
Static MLPPP over ATM 1483 Example
356
Configuring Fragmentation and Reassembly for Dynamic MLPPP
356
Dynamic MLPPP over Pppoe Example
357
Dynamic MLPPP over L2TP Example
357
Configuring Fragmentation and Reassembly for MLPPP Bundles
360
Configuring Multiclass MLPPP
360
Monitoring MLPPP
361
Chapter 10 Configuring Multiclass Multilink PPP
377
Multiclass MLPPP Overview
377
Multiclass MLPPP Fragmentation and Reassembly
377
Multiclass MLPPP Configuration Guidelines
378
Multiclass MLPPP Traffic Classes Overview
378
Multiclass MLPPP LCP Extensions Overview
379
Multiclass MLPPP Platform Considerations
379
Configuring Multiclass Multilink PPP
379
Module Requirements
380
Interface Specifiers
380
Multiclass MLPPP References
380
Configuring Multiclass MLPPP
380
Configuring Multiclass Multilink PPP
381
Enabling Multiclass MLPPP
381
Configuring Traffic Classes on Multiclass MLPPP Interfaces
382
Configuring Fragmentation on Multiclass MLPPP Interfaces
382
Configuring Reassembly on Multiclass MLPPP Interfaces
383
Example: Configuring Multiclass MLPPP on a Dynamic Interface
384
Example: Configuring Multiclass MLPPP on a Static Interface
385
Monitoring Multiclass MLPPP
385
Table 17: Show Ppp Interface Mlppp Output Fields
387
Chapter 11 Configuring Packet over SONET
391
Overview
391
POS Features
391
Sonet/Sdh
392
Platform Considerations
392
Table 18: most Common SONET/SDH Implementations
392
Configuring Packet over SONET
393
Module Requirements
393
Interface Specifiers
393
References
393
Before You Configure POS
394
Configuration Tasks
394
Monitoring POS
398
Chapter 12 Configuring Point-To-Point Protocol over Ethernet
403
Overview
403
Sessions
403
Pppoe Stages
404
Discovery
404
Figure 37: Pppoe over ATM
404
Configuring Point-To-Point Protocol over Ethernet
405
Session
405
Pppoe Service Name Tables
405
Features
406
Table 19: Sample Pppoe Service Name Table
406
Enabling the Service Name Table for Use
407
Using the Pppoe Remote Circuit ID to Identify Subscribers
407
Application
407
Pppoe Remote Circuit ID Capture
408
Pppoe Remote Circuit ID Format
408
Table 20: Configuring Nondefault Formats for the Pppoe Remote Circuit ID
408
Table 21: Interface Specifier Format Examples for Dsl-Forum-1 Keyword
410
Use by RADIUS or L2TP
411
System Event Log
412
Pppoe MTU Configuration
412
Platform Considerations
412
Module Requirements
413
Interface Specifiers
413
References
413
Access Nodes in Ethernet Aggregation Networks Overview
414
ATM-To-Ethernet Interworking Overview
414
Before You Configure Pppoe
416
Configuring Pppoe over ATM
416
Configuring Upper-Layer Protocols over Static Ethernet Interfaces
416
Figure 38: Example of Pppoe over ATM Stacking
419
Processing of IWF Pppoe Sessions with Duplicate MAC Addresses
423
Guidelines for Configuring Duplicate Protection for IWF Pppoe Sessions
423
Configuration Examples for ATM-To-Ethernet Interworking Functions
424
Single DSLAM Connected to a Pppoe Access Concentrator Example
424
Table 22: Pppoe Duplicate Protection Scenarios for IWF and Non-IWF Pppoe
424
Multiple Dslams Connected to a Pppoe Access Concentrator Example
425
Figure 39: Single DSLAM Connected to a Pppoe Access Concentrator
425
Configuring Pppoe for Ethernet Modules
426
Figure 40: Multiple Dslams Connected to a Pppoe Access Concentrator
426
Pppoe Interface and Subinterface Limits
427
Configuring Ipv4 and Ipv6 over Pppoe with VLAN
427
Figure 41: Example of Configuring Ipv4 and Ipv6 over Pppoe
427
Configuring Pppoe Without Vlans
430
Figure 42: Example of Pppoe Stacking
431
Configuring PADM Messages
434
Configuring PADN Messages
436
Configuring Pppoe Service Name Tables
437
Creating and Populating Pppoe Service Name Tables
437
Table 23: Default Pppoe Service Name Table
438
Table 24: Pppoe Service Name Table with Entries
438
Enabling Pppoe Service Name Tables for Use with Static Interfaces
440
Pppoe over ATM Configurations
440
Pppoe over Ethernet Configurations
442
Enabling Pppoe Service Name Tables for Use with Dynamic Interfaces
443
Configuring PADS Packet Content
445
Configuring Pppoe Remote Circuit ID Capture
446
Monitoring Pppoe
451
Troubleshooting
467
Configuring Bridged IP
469
Overview
469
Proxy ARP
469
Chapter 13 Configuring Bridged IP
469
Dhcp
470
Platform Considerations
470
Module Requirements
470
Interface Specifiers
471
Before You Configure Bridged IP
471
References
471
Configuring Bridged IP
472
Table 25: Prerequisite Tasks for Configuring Bridged IP
472
Chapter 14 Configuring Bridged Ethernet
475
Overview
475
Bridged Ethernet Application
476
Assigning MAC Addresses
476
VLAN and S-VLAN Configurations
476
Figure 43: Bridged Ethernet Topology, Router Terminating and Routing
476
Figure 44: Interface Stacking for Vlans over Bridged Ethernet
477
Platform Considerations
478
Module Requirements
478
Interface Specifiers
478
References
479
Configuring Bridged Ethernet
479
Configuring IP with Pppoe Terminated at the Router
479
Alternative Configuration
483
Configuring Vlans over Bridged Ethernet
484
Configuring VLAN Subinterfaces over Bridged Ethernet
485
Configuring Higher-Level Protocols over Vlans
485
Configuring IP over VLAN
485
Configuring Pppoe over VLAN
485
Configuring MPLS over VLAN
486
Configuring S-Vlans over Bridged Ethernet
489
Configuring S-VLAN Subinterfaces over Bridged Ethernet
489
Configuring Higher-Level Protocols over S-Vlans
490
Configuring the MTU Size for Bridged Ethernet
491
Monitoring Bridged Ethernet
492
Configuring Transparent Bridging
497
Chapter 15 Configuring Transparent Bridging
497
Overview
497
How Transparent Bridging Works
497
Bridge Groups and Bridge Group Interfaces
498
Bridge Interface Types and Supported Configurations
499
Figure 45: Bridge Group with Fast Ethernet and Gigabit Ethernet Bridge
499
Table 26: Sample Bridge Group Forwarding Table
499
Subscriber Policies
500
Table 27: Default Subscriber Policies for Bridge Group Interfaces
500
Concurrent Routing and Bridging
501
Transparent Bridging and VPLS
502
Unsupported Features
502
Platform Considerations
502
Module Requirements
502
Interface Specifiers
503
Before You Configure Transparent Bridging
503
References
503
Configuration Tasks
504
Table 28: Prerequisite Tasks for Configuring Transparent Bridging
504
Creating Bridge Groups
505
Configuring Optional Bridge Group Attributes
505
Configuring Bridge Group Interfaces
508
Configuring Subscriber Policies
510
Enabling Concurrent Routing and Bridging
515
Configuring Explicit Routing
515
Configuration Examples
517
Example 1: Bridging with Bridged Ethernet
517
Example 2: Bridging with Vlans
518
Monitoring Transparent Bridging
519
Setting Statistics Baselines
520
Removing Dynamic MAC Address Entries
521
Monitoring Bridge Groups
522
Monitoring Bridge Interfaces
529
Monitoring Subscriber Policies
531
Configuring Cisco HDLC
535
Chapter 16 Configuring Cisco HDLC
535
Overview
535
Framing
535
Error Frames
536
SLARP Keepalive
536
Platform Considerations
536
Module Requirements
536
Interface Specifiers
536
Before You Configure Cisco HDLC
537
Configuration Tasks
537
Optional Tasks
538
Configuration Example
540
Monitoring Cisco HDLC
540
Configuring Dynamic Interfaces
543
Chapter 17 Configuring Dynamic Interfaces
543
Overview
543
Autodetection
544
Types of Dynamic Interfaces
544
Upper-Layer Dynamic Interface Configurations
545
Profiles
546
RADIUS Authentication
546
ATM Oversubscription for Dynamic Interfaces
547
How Oversubscription Works
547
Static ATM 1483 Subinterfaces
547
Bulk-Configured VC Ranges
548
VC Ranges
548
Ethernet Oversubscription for Dynamic Interfaces
548
Platform Considerations
549
Module Requirements
549
Interface Specifiers
549
About Configuring Dynamic Interfaces over Static ATM
550
Figure 46: Configuring an ATM 1483 Interface to Support Dynamic Interfaces
550
About Configuring RADIUS for Dynamic Interfaces
551
Subscriber Command
551
Authenticating Subscribers on Dynamic Bridged Ethernet over Static ATM Interfaces
551
Placing Dynamic IP Routes in the Routing Table
552
Auto-Configure Command
553
Encapsulation Type Lockout
553
Atm Pvc Command
557
References
550
Configuration Example for Encapsulation Type Lockout for IWF Pppoe
557
Sessions
557
Configuring PPP and Pppoe Dynamic Interfaces over Static ATM
557
Figure 47: Dynamic PPP Interface Columns
558
Figure 48: Dynamic Pppoe Interface Columns
558
Configuring a PPP or Pppoe Dynamic Interface
559
Terminating Stale Pppoa Subscribers and Restarting LCP Negotiations
562
Configuring Pppoe Dynamic Interfaces over Pppoe Static Interfaces
563
Configuring Dynamic Pppoe over Static Pppoe with ATM Interface
563
Columns
563
Figure 49: Dynamic Pppoe over Static Pppoe with ATM Interface Columns
563
Columns
564
Configuring Dynamic Pppoe over Static Pppoe with Ethernet and VLAN Interface Columns
565
Figure 50: Dynamic Pppoe over Static Pppoe with Non-VLAN Interface
565
Configuring Ipv4 and Ipv6 over Static and Dynamic Pppoe
566
Figure 51: Dynamic Pppoe over Static Pppoe with VLAN Interface Columns
566
Figure 52: Ipv4 and Ipv6 Interface Columns over Static and Dynamic Pppoe
567
Configuring Dynamic Pppoe over Static Pppoe with Ethernet and S-VLAN Interface Columns
571
Figure 53: Dynamic Pppoe over Static Pppoe with S-VLAN Interface
571
S-VLAN Oversubscription
572
Configuring Encapsulation Type Lockout for Pppoe Clients
576
Differences from Lockout Configuration for Pppoe over Static ATM
577
Configuration Tasks
577
Configuring and Verifying Lockout for Pppoe Clients
577
Table 29: Differences in Lockout Operation for Dynamic Pppoe
577
Clearing the Lockout Condition for a Pppoe Client
579
Configuring Ipoa Dynamic Interfaces
582
Configuring a Dynamic Ipoa Interface
582
Figure 54: Dynamic Ipoa over Static ATM 1483 Interface Columns
582
Configuring Bridged Ethernet Dynamic Interfaces
586
Configuring a Dynamic Bridged Ethernet Interface
586
Figure 55: Dynamic Bridged Ethernet over Static ATM 1483 Interface
586
Configuring Subscriber Management for IP Subscribers on Dynamic Bridged Ethernet Interfaces
589
Configuration Example Using Subscriber Command
590
Equivalent Configuration Example Using IP Subscriber Management
590
Configuring a Dynamic Interface from a Profile
591
Profile Considerations
591
Profile Characteristics
592
Bridged Ethernet Characteristics
592
IP Characteristics
592
Ipv6 Characteristics
593
L2TP Characteristics
594
MLPPP and PPP Characteristics
594
Pppoe Characteristics
595
VLAN Characteristics
596
Working with Profiles
596
Figure 56: Creating and Configuring a Profile
596
Configuring a Profile
597
Figure 57: Assigning a Profile to a Static Interface
597
Assigning a Profile to an Interface
621
Profile Configuration Examples
623
Monitoring Upper-Layer Dynamic Interfaces and Profiles
625
Scripts and Macros
625
Troubleshooting PPP and Pppoe Dynamic Interfaces
646
Configuring Dynamic Interfaces Using Bulk Configuration
651
Overview
651
Bulk Dynamic Interface Configurations
652
Profiles
652
ATM Oversubscription for Bulk-Configured VC Ranges
653
Bulk-Configured VC Ranges
653
VC Ranges
654
Platform Considerations
654
Module Requirements
655
Interface Specifiers
655
References
656
Configuring ATM 1483 Dynamic Subinterfaces
656
About Configuring Dynamic ATM 1483 Subinterfaces
657
Overview and Benefits
657
ATM 1483 Base Profiles
658
Nested Profile Assignments
658
Additional Profile Characteristics for Upper Interfaces
659
Bulk Configuration of VC Ranges
659
Bulk Configuration and VC Classes
660
Bulk Configuration and CAC
661
Dynamic Interface Creation
661
Overriding Base Profile Assignments
661
Changing VC Subranges
662
Static ATM Interfaces Within VC Subranges
662
Terminating Stale Pppoa Subscribers and Restarting LCP Negotiations
663
Authenticating Subscribers on Dynamic Bridged Ethernet over Dynamic ATM Interfaces
664
Configuring a Dynamic ATM 1483 Subinterface
665
Configuring Overriding Profile Assignments
673
Assigning an Overriding Profile to an ATM PVC
674
Removing an Overriding Profile Assignment from an ATM PVC
675
Removing Overriding Profile Assignments from a VC Range or VC Subrange
676
Changing VC Subranges
678
Adding VC Subranges
678
Removing VC Subranges
679
Modifying VC Subranges
679
Merging VC Subranges
680
Changing the Administrative State of VC Subranges
680
Configuring Static ATM Interfaces Within VC Subranges
682
Creating Static ATM Interfaces Within VC Subranges
683
Creating VC Subranges that Include Static ATM Interfaces
683
Configuring VLAN Dynamic Subinterfaces
685
About Configuring Dynamic VLAN Subinterfaces
686
Overview and Benefits
686
VLAN Base Profiles
687
Nested Profile Assignments
688
Additional Profile Characteristics for Upper Interfaces
689
Bulk Configuration of VLAN Ranges
689
Information
690
Dynamic Interface Creation
691
Overriding Base Profile Assignments
692
Changing VLAN Subranges
692
Static VLAN Subinterfaces Within VLAN Subranges
692
Configuring a Dynamic VLAN Subinterface
693
Configuring Dynamic VLAN Subinterfaces Based on Agent Circuit Identifier Information
695
Configuring Overriding Profile Assignments for VLAN Major Interfaces
696
Removing an Overriding Profile Assignment from a VLAN
697
Subrange
698
Changing VLAN Subranges
705
Adding VLAN Subranges
706
Removing VLAN Subranges
706
Modifying VLAN Subranges
707
Merging VLAN Subranges
708
Changing the Administrative State of VLAN Subranges
708
Index
739
Juniper JUNOSE 11.3 Configuration Manual (632 pages)
Software for E Series Broadband Services Routers System Basics Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 8.09 MB
Table of Contents
Table of Contents
7
About the Documentation
27
Audience
27
E Series and Junose Documentation and Release Notes
27
E Series and Junose Text and Syntax Conventions
27
Table 1: Notice Icons
28
Table 2: Text and Syntax Conventions
28
About the Documentation
29
Documentation Feedback
29
Obtaining Documentation
29
Requesting Technical Support
29
Opening a Case with JTAC
30
Self-Help Online Tools and Resources
30
Chapters
31
Planning Your Network
31
Planning Your Network
33
Platform Considerations
33
Edge Applications Overview
34
Interface Specifiers
34
Private Line Aggregation
34
Figure 1: Private Line Aggregation with the E Series Router
35
Planning Your Network
35
Table 3: Common Access/Uplink Pairings
35
Xdsl Session Termination
35
Layered Approach
36
Figure 2: B-RAS Application
36
Chapter 1 Planning Your Network
37
Figure 3: Network Configuration Using a Bottom-Up Approach
37
Figure 4: E Series Router Support for Fractional T1/E1 through
41
Figure 5: Channelized T3 Interface Configuration Parameters
42
Configuring T3 and E3 Interfaces
43
Figure 6: T3 Interface Configuration Parameters
43
Configuring Channelized Ocx/Stmx Line Interfaces
44
Configuring Ocx/Stmx and OC48 Interfaces
44
Figure 7: SONET Interfaces
44
Configuring Ethernet Interfaces
45
Figure 8: Parameters for T1 over DS3 Interface Configuration
45
Configuring Data Link-Layer Interfaces
46
Configuring Ip/Frame Relay
46
Configuring Ipsec-Service Interfaces
46
Configuring Tunnel Service Interfaces
46
Configurable HDLC Parameters
42
Configuring Channelized T3 Interfaces
42
Line Modules, I/O Modules, and Ioas
37
Interface Command
38
Interfaces
38
Subinterfaces
38
Configuring Virtual Routers
39
General Configuration Tasks
39
Configuring Ipsec
40
Configuring Physical Layer Interfaces
40
Line Module Features
41
Figure 10: Structure of Frame Relay Protocols
47
Figure 9: Frame Relay Interface Design
47
Configuring IP/ATM
48
Figure 11: Serial Interface Configuration Parameters for a Frame Relay
48
Figure 12: E Series Router IP/ATM Access Connection
48
Figure 13: Structure of the ATM Interface Design
49
Figure 14: Structure of ATM Protocol
49
Figure 15: ATM Interface Configuration Parameters
49
Configuring IP/PPP
50
Figure 16: IP/PPP Connections from the CPE on an E Series Router
50
Figure 17: Structure of PPP
50
Configuring IP/HDLC
51
Figure 18: PPP Interface Configuration Parameters
51
Figure 19: Structure of Cisco HDLC Protocol
51
Figure 20: Example of IP over Ethernet Stacking Configuration Steps
52
Configuring Routing Protocols
53
Configuring Qos
54
Configuring Routing Policy
54
Configuring VRRP
54
Configuring Policy Management
55
Configuring Remote Access
55
Configuring IP Tunnels
52
Configuring IP Tunnels, Shared IP Interfaces, and Subscriber Interfaces
52
Configuring Ip/Ethernet
52
Configuring Shared Interfaces and Subscriber Interfaces
52
Juniper JUNOSE 11.3 Configuration Manual (376 pages)
Software for E Series Broadband Services Routers Quality of Service Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 6.66 MB
Table of Contents
Table of Contents
9
Part 3 Scheduling and Shaping Traffic
23
Part 4 Creating a Qos Scheduler Hierarchy on an Interface with Qos
23
Part 5 Interface Solutions for Qos
24
About the Documentation
27
Audience
27
E Series and Junose Documentation and Release Notes
27
E Series and Junose Text and Syntax Conventions
27
Table 1: Notice Icons
28
Table 2: Text and Syntax Conventions
28
Documentation Feedback
29
Obtaining Documentation
29
Requesting Technical Support
29
About the Documentation
29
Opening a Case with JTAC
30
Self-Help Online Tools and Resources
30
Qos on the E Series Router
31
Chapter 1 Quality of Service Overview
33
Qos on the E Series Router Overview
33
Qos on the E Series Router
33
Qos Audience
34
Qos Platform Considerations
34
Figure 1: Traffic Flow through an E Series Router
34
Interface Specifiers
35
Qos Terms
35
Table 3: Qos Terminology
35
Qos Features
37
Table 4: Qos Features
37
Configuring Qos on the E Series Router
39
Qos References
39
Classifying, Queuing, and Dropping Traffic
41
Configuring Dropping Behavior with RED and WRED
41
Configuring Queue Profiles for Buffer Management
41
Chapter 2 Defining Service Levels with Traffic Classes and Traffic-Class Groups
43
Defining Service Levels with Traffic Classes and Traffic-Class Groups
43
Traffic Class and Traffic-Class Groups Overview
43
Best-Effort Forwarding
43
Traffic-Class Groups Overview
44
Configuring Traffic Classes that Define Service Levels
44
Configuring Traffic-Class Groups that Define Service Levels
45
Monitoring Traffic Classes and Traffic-Class Groups for Defined Levels of
45
Service
46
Chapter 3 Configuring Queue Profiles for Buffer Management
47
Queuing and Buffer Management Overview
47
Static Oversubscription
48
Dynamic Oversubscription
48
Color-Based Thresholding
48
Memory Requirements for Queue and Buffers
49
Guidelines for Managing Queue Thresholds
49
Guidelines for Configuring a Maximum Threshold
49
Table 5: Egress Memory and Region Size on ASIC Line Modules
49
Guidelines for Configuring a Minimum Threshold
50
Guidelines for Managing Buffers
50
Guidelines for Managing Buffer Starvation
51
Configuring Queue Profiles to Manage Buffers and Thresholds
52
Monitoring Queues and Buffers
54
Chapter 4 Configuring Dropping Behavior with RED and WRED
55
Dropping Behavior Overview
55
RED and WRED Overview
56
Figure 2: Packets Dropped as Queue Length Increases
56
Configuring RED
57
Example: Configuring Average Queue Length for RED
58
Example: Configuring Dropping Thresholds for RED
58
Example: Configuring Color-Blind RED
59
Figure 3: Color-Blind RED Drop Profile with Colorless Queue Profile
59
Configuring WRED
60
Figure 4: Color-Blind RED Drop Profile with Color-Sensitive Queue Profile
60
Example: Configuring Different Treatment of Colored Packets for WRED
62
Example: Defining Different Drop Behavior for each Traffic Class for WRED
62
Figure 5: Different Treatment of Colored Packets
62
Example: Configuring WRED and Dynamic Queue Thresholds
63
Figure 6: Defining Different Drop Behavior for each Queue
63
Monitoring RED and WRED
65
Figure 7: WRED and Dynamic Queue Thresholding
65
Juniper JUNOSE 11.3 Configuration Manual (444 pages)
Software for E Series Broadband Services Routers IP, IPv6, and IGP Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 5.89 MB
Table of Contents
Table of Contents
9
About the Documentation
21
Audience
21
E Series and Junose Documentation and Release Notes
21
E Series and Junose Text and Syntax Conventions
21
Table 1: Notice Icons
22
Table 2: Text and Syntax Conventions
22
Documentation Feedback
23
Obtaining Documentation
23
Requesting Technical Support
23
Self-Help Online Tools and Resources
24
Opening a Case with JTAC
24
Internet Protocol
25
Chapter 1 Configuring IP
27
Configuring IP
27
Overview
27
IP Functions
28
Moving Data between Layers
28
Routing Datagrams to Remote Hosts
28
Fragmenting and Reassembling Datagrams
28
IP Layering
28
Network Interface Layer
29
Internet Layer
29
Transport Layer
29
Application Layer
29
IP Packets
28
Figure 1: TCP/IP Conceptual Layers
29
Platform Considerations
29
IP Features
30
References
30
IP Addressing
31
Physical and Logical Addresses
31
Internet Addresses
31
Subnetwork Mask Format Options
32
Figure 2: IP Address Classes
32
Subnet Addressing
33
Figure 3: Basic Network Masking
33
Classless Addressing with CIDR
34
Figure 4: Subnetting
34
Adding and Deleting Addresses
35
Adding a Primary Address
35
Deleting a Primary Address
35
Adding a Secondary (Multinet) Address
35
Figure 5: Routing with and Without CIDR
35
Deleting a Secondary Address
36
Ip Address Command
36
Indirect Next-Hop Support
36
Before You Configure IP
37
Figure 6: Direct Next Hops
37
Figure 7: Indirect Next Hops
37
Creating a Profile
38
Assigning a Profile
41
Address Resolution Protocol
41
How ARP Works
42
Figure 8: Sample ARP Process-1 through 3
42
Figure 9: Sample ARP Process-4 and 5
43
MAC Address Validation
45
Broadcast Addressing
46
Broadcast Tasks
47
Fragmentation
48
IP Routing
49
Routing Information Tables
49
Figure 10: Routers in a Small Network
50
Table 3: Routing Table for Router NY
50
Table 4: Routing Table for Router la
50
Setting the Administrative Distance for a Route
51
Table 5: Default Administrative Distances for Route Sources
51
Setting the Metric for a Route
52
Routing Operations
52
Identifying a Router Within an Autonomous System
52
Establishing a Static Route
53
Configuring Static Routes with Indirect Next Hops
53
Figure 11: Static Routes with Indirect Next Hops
53
Verifying Next Hops for Static Routes
54
How BFD Next-Hop Verification Works
54
BFD Next Hop Verification Configuration Example
55
How RTR Next-Hop Verification Works
56
RTR Configuration Example
56
Figure 12: Sample Configuration for Next-Hop Verification
57
Table 6: Next-Hop Verification Results for Sample Configuration
57
Configuring RTR Next-Hop Verification
58
Setting up Default Routes
62
Setting up an Unnumbered Interface
62
Adding a Host Route to a Peer on a PPP Interface
63
Enabling Source Address Validation
63
Enabling Source Address Validation Traps
63
Defining TCP Maximum Segment Size
64
Setting MSS for TCP Connections
64
Configuring IP Path MTU Discovery
65
Enabling PMTU Discovery
65
Limiting PMTU
66
Specifying Black Hole Thresholds
67
Shutting down an IP Interface
67
Removing the IP Configuration
67
Clearing IP Routes
68
Clearing IP Interfaces
68
Setting a Baseline
68
Disabling Forwarding of Packets
69
Enabling Forwarding of Source-Routed Packets
69
Forcing an Interface to Appear up
70
Specifying a Debounce Time
70
Adding a Description
70
Enabling Link Status Traps
71
Configuring the Speed
71
Configuring Equal-Cost Multipath Load Sharing
72
Defining Maximum Paths
72
Round-Robin Mode
72
Fast Reroute Protection
73
Setting a TTL Value
73
Protecting against TCP RST or SYN Dos Attacks
74
Preventing TCP PAWS Timestamp Dos Attacks
74
Protecting against TCP out of Order Dos Attacks
75
Limiting Buffers Per Router
76
Limiting Buffers Per Virtual Router
76
Limiting Buffers Per Connection
77
Distributing Routing Table Updates to Line Modules
77
IP Tunnel Routing Table
78
Shared IP Interfaces
78
Configuring Shared IP Interfaces
79
Moving IP Interfaces
80
IP Shared Interface Statistics
81
Subscriber Interfaces
81
Internet Control Message Protocol
81
ICMP Tasks
82
Specifying a Source Address for ICMP Messages
83
Reachability Commands
83
Response Time Reporter
86
Configuration Tasks
86
Configuring the Probe Type
87
Configuring Optional Characteristics
88
Table 7: Probe Characteristics
88
Capturing Statistics
90
Collecting History
91
Setting the Receiving Interface
91
Setting Reaction Conditions
92
Scheduling the Probe
93
Shutting down the Probe
94
Monitoring RTR
95
Monitoring IP
100
System Event Logs
100
Establishing a Baseline
101
IP Show Commands
102
Juniper JUNOSE 11.3 Configuration Manual (356 pages)
Software for E Series Broadband Services Routers IP Services Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 5.23 MB
Table of Contents
Table of Contents
7
List of Figures
19
About the Documentation
23
Audience
23
E Series and Junose Documentation and Release Notes
23
E Series and Junose Text and Syntax Conventions
23
Table 1: Notice Icons
24
Table 2: Text and Syntax Conventions
24
About the Documentation
25
Documentation Feedback
25
Obtaining Documentation
25
Requesting Technical Support
25
Opening a Case with JTAC
26
Self-Help Online Tools and Resources
26
Chapters
27
Configuring Routing Policy
29
Overview
29
Platform Considerations
30
References
30
Route Maps
30
Route Map Configuration Example
31
Multiple Values in a Match Entry
32
Figure 1: Applying Route Maps to Routes
32
Chapter 1 Configuring Routing Policy
33
Negating Match Clauses
33
Matching a Community List Exactly
34
Removing Community Lists from a Route Map
34
Matching a Policy List
35
Redistributing Access Routes
35
Setting Multicast Bandwidths
35
Match Policy Lists
45
Access Lists
46
Filtering Prefixes
46
Configuration Example 1
47
Configuration Example 2
47
Configuration Example 3
48
Figure 2: Filtering with Access Lists
48
Figure 3: Filtering with AS-Path Access Lists
49
Figure 4: Route Map Filtering
50
Using Access Lists for PIM Join Filters
55
Clearing Access List Counters
56
Creating Table Maps
56
Table 3: Match and Set Policy Values
56
Prefix Lists
58
Using the Null Interface
58
Configuration Example 1
50
Using Access Lists in a Route Map
50
Filtering as Paths
48
Configuration Example 1
49
Using a Prefix List
59
Prefix Trees
61
Using a Prefix Tree
61
Community Lists
63
Table 4: Action Based on Well-Known Community Membership
63
Figure 5: Community Lists
64
Table 5: Supported Regular Expression Metacharacters
69
Regular Expression Examples
70
Using Metacharacters as Literal Tokens
70
Table 6: Sample Regular Expressions
71
Managing the Routing Table
73
Troubleshooting Routing Policy
73
Monitoring Routing Policy
74
Configuring NAT
87
Overview
87
Module Requirements
88
Platform Considerations
88
References
88
Basic NAT
89
Configuring NAT
89
Napt
89
NAT Configurations
89
Traditional NAT
89
Bidirectional NAT
90
Network and Address Terms
90
Twice NAT
90
Extended Community Lists
66
AS-Path Lists
68
Using Regular Expressions
68
Community Lists
69
Community Numbers
69
Metacharacters
69
Juniper JUNOSE 11.3 Configuration Manual (304 pages)
Software for E Series Broadband Services Routers Policy Management Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 4.03 MB
Table of Contents
Table of Contents
9
About the Documentation
21
Audience
21
E Series and Junose Documentation and Release Notes
21
E Series and Junose Text and Syntax Conventions
21
Table 1: Notice Icons
22
Table 2: Text and Syntax Conventions
22
Documentation Feedback
23
Obtaining Documentation
23
Requesting Technical Support
23
Self-Help Online Tools and Resources
24
Opening a Case with JTAC
24
Creating Policy Lists
25
Creating Classifier Control Lists for Policies
25
Policy Management
25
Chapter 1 Managing Policies on the E Series Router
27
Policy Management Overview
27
Policy Management
27
Description of a Policy
29
Policy Platform Considerations
29
Policy References
30
Policy Management Configuration Tasks
30
Chapter 2 Creating Classifier Control Lists for Policies
31
Classifier Control Lists Overview
31
Table 3: CLACL Criteria
31
Creating or Modifying Classifier Control Lists for ATM Policy Lists
33
Creating or Modifying Classifier Control Lists for Frame-Relay Policy Lists
33
Creating or Modifying Classifier Control Lists for GRE Tunnel Policy Lists
34
Creating or Modifying Classifier Control Lists for IP Policy Lists
34
Creating Classifier Control List for Only IP Policy Lists
34
Sources
34
Classifying IP Traffic Based on Source and Destination Addresses
35
Using IP Classifier Control Lists to Match Route Class Values
35
Creating IP Classifier Control Lists for TCP and UDP Ports
35
Creating an IP Classifier Control List that Matches the Tos Byte
36
Creating an IP Classifier Control List that Filters ICMP Echo Requests
36
Creating IP Classifier Control Lists that Use TCP or IP Flags
36
Offset
36
Creating or Modifying Classifier Control Lists for Ipv6 Policy Lists
36
Creating or Modifying Classifier Control Lists for L2TP Policy Lists
37
Creating or Modifying Classifier Control Lists for MPLS Policy Lists
37
Creating or Modifying Classifier Control Lists for VLAN Policy Lists
37
Chapter 3 Creating Policy Lists
39
Policy Lists Overview
39
Interface
39
Figure 1: Constructing an IP Policy List
40
Creating Policy Lists for ATM
41
Creating Policy Lists for Frame Relay
43
Creating Policy Lists for GRE Tunnels
44
Creating Policy Lists for IP
45
Creating Policy Lists for Ipv6
46
Creating Policy Lists for L2TP
48
Creating Policy Lists for MPLS
48
Creating Policy Lists for Vlans
49
Juniper JUNOSE 11.3 Configuration Manual (256 pages)
Software for E Series Broadband Services Routers Physical Layer Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 3.51 MB
Table of Contents
Table of Contents
7
List of Tables
17
About the Documentation
19
Audience
19
E Series and Junose Documentation and Release Notes
19
E Series and Junose Text and Syntax Conventions
19
Table 1: Notice Icons
20
Table 2: Text and Syntax Conventions
20
About the Documentation
21
Documentation Feedback
21
Obtaining Documentation
21
Requesting Technical Support
21
Opening a Case with JTAC
22
Self-Help Online Tools and Resources
22
Chapters
23
Configuring Channelized T3 Interfaces
23
Configuring Channelized T3 Interfaces
25
MDL/FDL Support
25
Overview
25
FDL Standards
26
MDL Standards
26
Table 3: MDL and FDL Message Strings and Message Types
26
Timeout of Received MDL and FDL Messages
26
Configuring Channelized T3 Interfaces
27
Frequency of FDL Path Messages
27
Higher-Level Protocols
27
Platform Considerations
27
CT3/T3-F0 Line Modules and CT3/T3 12 I/O Modules
28
Exchanging Modules
28
Interface Stack
28
Chapter 1 Configuring Channelized T3 Interfaces
29
Figure 1: Stack for Channelized T3 Interface
29
Numbering Scheme
29
T1 Channels
29
T3 Controllers
29
Figure 2: T1 Channels and DS0 Timeslots on a T3 Line
30
Fractional T1
30
Table 4: Sample T1 Subchannel/Timeslot Assignments
30
MDL Support
67
Overview
67
MDL Standards
68
Timeout of Received MDL Messages
68
Before You Configure an Interface
31
HDLC Channels
31
References
31
Configuration Tasks
32
Configuring a T3 Controller
32
Configuring MDL Messages
33
Other Optional Tasks
34
Configuring T1 Channels
36
Optional Tasks
36
Configuring FDL Messages
39
Configuring an HDLC Channel
41
Optional Tasks
41
Configuration Example
44
Testing Interfaces
44
Testing at the T3 Layer
45
Testing at the T1 Layer
47
Monitoring Interfaces
49
Displaying Counters and Time Intervals
50
Setting a Baseline
50
Output Filtering
51
Juniper JUNOSE 11.3 Configuration Manual (222 pages)
Software for E Series Broadband Services Routers Service Availability Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 3.12 MB
Table of Contents
Table of Contents
7
About the Documentation
19
Audience
19
E Series and Junose Documentation and Release Notes
19
E Series and Junose Text and Syntax Conventions
19
Table 1: Notice Icons
20
Table 2: Text and Syntax Conventions
20
About the Documentation
21
Documentation Feedback
21
Obtaining Documentation
21
Requesting Technical Support
21
Opening a Case with JTAC
22
Self-Help Online Tools and Resources
22
Chapters
23
Service Availability
23
Managing Interchassis Redundancy
23
Managing Module Redundancy
23
Chapter 1 Service Availability
25
Service Availability Overview
25
Figure 1: Junose Software Service Availability Layers
26
Service Availability Versus High Availability
26
Module Redundancy
27
Stateful Line Module Switchover
27
Stateful SRP Switchover
27
Understanding Service Availability Features
27
Interchassis Redundancy
28
Unified ISSU
28
Vrrp
28
Chapter 2 Managing Module Redundancy
31
Line Module Redundancy Overview
31
E120 and E320 Routers
32
Erx7Xx Models and Erx14Xx Models
32
Line Module Redundancy Requirements
32
IOA Behavior When the Router Reboots
33
Line Module Behavior When Disabling or Enabling Ioas
33
Managing Module Redundancy
33
Limitations of Automatic Switchover
34
Table 3: Commands that Can Cause Automatic Switchover
34
Figure 2: SRP Module on Erx7Xx Models and Erx14Xx Models
40
Figure 3: SRP Module on the E120 and E320 Routers
41
Installing a Redundant SRP Module
42
Managing SRP Module Redundancy
43
Status Leds
44
Switching to the Redundant SRP Module
44
Table 4: Function of the Online and Redundant Leds
44
Monitoring Redundancy in Installed Hardware
45
Table 5: Show Environment Output Fields
47
Monitoring Redundancy in Line Module and SRP Modules
49
Table 6: Show Hardware Output Fields
51
Monitoring Redundancy Status on E320 Router
52
Table 7: Show Redundancy Output Fields
53
Managing Stateful SRP Switchover
57
Stateful SRP Switchover Overview
57
Module Requirements
58
Stateful SRP Switchover Platform Considerations
58
File System Synchronization Mode
59
High Availability Mode
59
Managing Stateful SRP Switchover
59
Stateful SRP Switchover Redundancy Modes
59
Stateful SRP Switchover States
60
Disabled State
61
Figure 4: High Availability States
61
Managing Stateful SRP Switchover
61
Active State
62
Initializing State
62
Understanding Configuration of SRP Modules for Redundancy
41
Understanding Automatic Switchover
34
Understanding Reversion after Switchover
34
Configuring Line Module Redundancy
35
Managing Line Module Redundancy
35
Module
36
Interoperation of Redundancy and Stateful Switchover for Line Modules
37
Understanding SRP Module Redundancy
38
Juniper JUNOSE 11.3 Configuration Manual (266 pages)
Software for E Series Broadband Services Routers Multicast Routing Configuration Guide
Brand:
Juniper
| Category:
Software
| Size: 3.71 MB
Table of Contents
Table of Contents
9
List of Tables
17
About the Documentation
19
Audience
19
E Series and Junose Documentation and Release Notes
19
E Series and Junose Text and Syntax Conventions
19
Table 1: Notice Icons
20
Table 2: Text and Syntax Conventions
20
Documentation Feedback
21
Obtaining Documentation
21
Requesting Technical Support
21
Self-Help Online Tools and Resources
22
Opening a Case with JTAC
22
Configuring PIM for Ipv4 Multicast
23
Internet Protocol Version 4
23
Chapter 1 Configuring Ipv4 Multicast
25
Ipv4 Multicast Overview
25
Internet Protocol Version
26
Reverse-Path Forwarding
26
Table 3: Function of Multicast Protocols on a Router
26
Multicast Packet Forwarding
27
Platform Considerations
27
References
28
Before You Begin
28
Configuring the Switch Fabric Bandwidth
28
Enabling IP Multicast
28
Defining Static Routes for Reverse-Path Forwarding
29
Displaying Available Routes for Reverse-Path Forwarding
29
Enabling and Disabling RPF Checks
31
Using Unicast Routes for RPF
31
Defining Permanent IP Multicast Forwarding Entries
32
Defining a Multicast Bandwidth Map
32
Using the Autosense Mechanism
33
How Adaptive Mode Works
33
Figure 1: Example of Adaptive Ipv4 Multicast Bandwidth Detection
34
Multicast Bandwidth Map Example
35
Table 4: Adaptive Mode Algorithm Values
35
Configuring Multicast Qos Adjustment
37
Multicast OIF Mapping Case
37
Multicast Traffic Receipt Without Forwarding
38
Figure 2: Multicast OIF Mapping
38
Activating Multicast Qos Adjustment Functions
39
Configuring Hardware Multicast Packet Replication
39
Figure 3: Multicast Traffic Receipt Without Forwarding
39
Figure 4: Packet Flow Without Hardware Multicast Packet Replication
40
Figure 5: Packet Flow with Hardware Multicast Packet Replication
41
Supported Modules and Encapsulations
42
Hardware Multicast Packet Replication Considerations
43
Relationship with OIF Mapping
43
Configuring Hardware Multicast Packet Replication
44
Configuring Hardware Multicast Packet Replication with OIF-Mapping
46
Monitoring Hardware Multicast Packet Replication
46
Port Statistics
46
IP and VLAN Statistics
47
IGMP Statistics
47
Blocking and Limiting Multicast Traffic
47
Blocking Mroutes
47
Limiting Interface Admission Bandwidth
48
Enabling Interface Admission Bandwidth Limitation
48
OIF Interface Reevaluation Example
48
Creating Mroute Port Limits
49
Limiting Port Admission Bandwidth
49
Enabling Port Admission Bandwidth Control
50
OIF Port Reevaluation Example
51
Deleting Multicast Forwarding Entries
51
Monitoring IP Multicast Settings
52
Support for Multicast Router Information
61
BGP Multicasting
61
Investigating Multicast Routes
62
Juniper JUNOSE 11.3 Reference Manual (284 pages)
Software for E Series Broadband Services Routers System Event Logging Reference Guide
Brand:
Juniper
| Category:
Software
| Size: 2.88 MB
Table of Contents
Table of Contents
9
List of Tables
19
About the Documentation
21
Table 1: Notice Icons
22
Table 2: Text and Syntax Conventions
22
Documentation Feedback
23
Requesting Technical Support
23
Part 1 Chapters
25
Chapter 1 System Logging Overview
27
Overview of System Logging
27
Log Verbosity
28
Logging Platform Considerations
28
Persistent Logs
28
Table 3: Log Severity Descriptions
28
Configuring Event Logging
29
Configuring Log Severity for Individual and Systemwide Logs
34
Configuring Log Verbosity for Individual Logs or All Logs
38
Setting the Timestamp for Log Messages
38
Configuring Log Filters
39
Turning off Log Filters
40
Monitoring Logging System Events
41
Chapter 2 Event Categories
45
Event Categories
47
A Commands
49
Aaaatm1483Cfg
49
Aaaenginegeneral
50
Aaaqoscfg
50
Aaaservergeneral
51
Aaauseraccess
51
Addressservergeneral
52
Ar1Aaaservergeneral
52
Atm
53
Atm1483
53
Atm1483Vcclass
54
Atmaal5
55
Atmvcclass
55
Auditipsec
56
B Commands
57
Bfdadaptivity
57
Chapter 4 B Commands
57
Bfdevents
58
Bfdgeneral
58
Bfdsession
59
Bgpconnections
59
Bgpdampening
60
Bgpevents
61
Bgpgeneral
62
Bgpgracefulrestart
62
Bgpipv6Nexthops
63
Bgpkeepalives
64
Bgpmessages
65
Bgpneighborchanges
66
Bgpnexthops
66
Bgproutes
67
Bridge
70
Bridgeengine
70
Bridgingmgr
71
Bulkstats
71
C Commands
73
Cacgeneral
73
Juniper JUNOSE 11.3 Release Note (106 pages)
Software for E Series Broadband Services Routers
Brand:
Juniper
| Category:
Software
| Size: 1.72 MB
Table of Contents
Table of Contents
5
Release 11.3.0
9
Release Installation
9
Upgrading to Release 5.3.0 or a Higher-Numbered Release
9
Upgrading from Release 5.1.1 or Lower-Numbered Releases to Release 6.X.X or Higher-Numbered Releases
9
Moving Line Modules between Releases
10
SRP Module Memory Requirements
10
Hardware and Software Compatibility
11
Requesting Technical Support
11
Self-Help Online Tools and Resources
11
Opening a Case with JTAC
12
Release Overview
13
Before You Start
13
Release Highlights
15
Dhcp
15
Documentation
16
Radius
17
System
17
Tunneling
18
Early Field Trial Features
18
Dhcp
18
Stateful Line Module Switchover (High Availability)
19
Unsupported Features
20
E120 Router and E320 Router
20
Policy Management
20
Stateful SRP Switchover (High Availability)
20
Release Software Protocols
21
Core Routing Stack
21
Network Management Protocols
21
Routing Protocols
21
Multiprotocol Label Switching (MPLS)
21
Layer 2 Protocols
21
Security Protocols
22
SRC Software and SDX Software Compatibility Matrix
22
Known Behavior
23
Aaa
23
Atm
23
Bgp
24
BGP/MPLS Vpns
24
B-Ras
25
Bridged Ethernet
25
Cli
25
Dhcp
28
DHCP External Server
28
Dynamic Interfaces
30
Ethernet
30
Flash
31
Forwarding
31
Gre
31
Hardware
31
Hdlc
32
Ipsec
34
Is-Is
35
L2Tp
36
Line Module Redundancy
37
Mlppp
37
Mpls
37
Multicast
38
Packet Mirroring
39
Policy Management
39
Ppp
42
Pppoe
42
Qos
42
Radius
43
Snmp
44
SRC Software and SDX Software
44
Ssh
45
Stateful SRP Switchover (High Availability)
45
Subscriber Interfaces
46
System
46
System Logging
47
Tunneling
47
Advertisement
Related Products
Juniper JUNOSE 11.1.X BGP AND MPLS
Juniper JUNOSE 11.1.X IP SERVICES
Juniper JUNOSE 11.0.2 RELEASE NOTES
Juniper JUNOSE 11.0.X IP SERVICES
Juniper JUNOSE 11.2.X MULTICAST ROUTING
Juniper JUNOSE 11.2.X BGP AND MPLS
Juniper JUNOSe 11.1
Juniper JUNOSE 11.2
Juniper JUNOSE 11.0
Juniper JUNOSE 11.1.1
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL