Juniper ACX1000 Configuration Manual page 215

Junos os; acx series universal access router
Hide thumbs Also See for ACX1000:
Table of Contents

Advertisement

Table 25: Hashing Behavior for Pseudowire (Layer 2 Circuit) and Bridging Services
Traffic Type
Default Hash Fields
Layer 2
None
IP
Source IP and Destination IP
MPLS
MPLS label 1 and MPLS label 2
Copyright © 2017, Juniper Networks, Inc.
For LAG bundles, the hashing algorithm determines how traffic entering a LAG bundle is
placed onto the bundle's member links. The hashing algorithm tries to manage bandwidth
by evenly load-balancing all incoming traffic across the member links in the bundle.
The hashing algorithm makes hashing decisions based on values in various packet fields,
as well as on some internal values like source port ID and source device ID. The packet
fields used by the hashing algorithm varies by the packet's EtherType and, in some
instances, by the configuration on the router. The hashing algorithm recognizes the
following EtherTypes:
IPv4
MPLS
Traffic that is not recognized as belonging to any of these EtherTypes is hashed based
on the Layer 2 header. IP and MPLS traffic are also hashed based on the Layer 2 header
when a user configures the hash mode as Layer 2 header.
You can configure some fields that are used by the hashing algorithm to make traffic
forwarding decisions. You cannot, however, configure how certain values within a header
are used by the hashing algorithm.
Note the following points regarding the hashing algorithm:
The fields selected for hashing are based on the packet type only. The fields are not
based on any other parameters, including forwarding decision (bridged or routed) or
egress LAG bundle configuration (Layer 2 or Layer 3).
The same fields are used for hashing unicast and multicast packets. Unicast and
multicast packets are, however, hashed differently.
Table 25 on page 157
describes the fields used for hashing by Layer 2 services. The table
explains the default behavior and the configurable fields based on the type of traffic
received on the Layer 2 service
Chapter 4: Configuring Interfaces and Chassis
Configurable Fields (Hash keys)
Source MAC Address
Destination MAC
Source MAC and Destination MAC
Source MAC Address
Destination MAC
Source MAC and Destination MAC
Source MAC Address
Destination MAC
Source MAC and Destination MAC
157

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Acx5048Acx5096Acx500Acx1100Acx2000Acx2100 ... Show all

Table of Contents