Services Overview Guide NOKIA
Services Overview Guide NOKIA
© 2021 Nokia.
Use subject to Terms available at: www.nokia.com/terms/.
Nokia is committed to diversity and inclusion. We are continuously reviewing our customer
documentation and consulting with standards bodies to ensure that terminology is inclusive and
aligned with the industry. Our future customer documentation will be updated accordingly.
This document includes Nokia proprietary and confidential information, which may not be distributed
or disclosed to any third parties without the prior written consent of Nokia.
This document is intended for use by Nokia’s customers (“You”/”Your”) in connection with a product
purchased or licensed from any company within Nokia Group of Companies. Use this document
as agreed. You agree to notify Nokia of any errors you may find in this document; however, should
you elect to use this document for any purpose(s) for which it is not intended, You understand and
warrant that any determinations You may make or actions You may take will be based upon Your
independent judgment and analysis of the content of this document.
Nokia reserves the right to make changes to this document without notice. At all times, the
controlling version is the one available on Nokia’s site.
Copyright and trademark: Nokia is a registered trademark of Nokia Corporation. Other product
names mentioned in this document may be trademarks of their respective owners.
© 2021 Nokia.
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Table of contents
Table of contents
1 Getting started........................................................................................................................................... 8
1.1 About this guide.................................................................................................................................. 8
1.2 Services configuration process........................................................................................................... 9
2 Services overview................................................................................................................................... 10
2.1 Introduction........................................................................................................................................10
2.1.1 Service types............................................................................................................................ 10
2.1.2 Service policies.........................................................................................................................11
2.1.2.1 Multipoint shared queuing................................................................................................ 11
2.2 Nokia service model......................................................................................................................... 16
2.3 Service entities..................................................................................................................................17
2.3.1 Customers.................................................................................................................................17
2.3.2 SAPs......................................................................................................................................... 17
2.3.2.1 SAP encapsulation types and identifiers......................................................................... 18
2.3.2.2 Ethernet encapsulations...................................................................................................18
2.3.2.3 Default SAP on a dot1q port........................................................................................... 19
2.3.2.4 QinQ SAPs....................................................................................................................... 20
2.3.2.5 Services and SAP encapsulations................................................................................... 25
2.3.2.6 SAP configuration considerations.................................................................................... 26
2.3.2.7 G.8032 protected Ethernet rings......................................................................................26
2.3.2.8 SAP bandwidth CAC........................................................................................................27
2.3.3 Connection profile VLAN SAPs................................................................................................29
2.3.3.1 Using connection-profile-vlan in dot1q ports....................................................................31
2.3.3.2 Using connection-profile-vlan in QinQ ports.................................................................... 31
2.3.4 Service distribution points........................................................................................................ 32
2.3.4.1 SDP binding..................................................................................................................... 33
2.3.4.2 Spoke and mesh SDPs................................................................................................... 34
2.3.4.3 SDP using BGP route tunnel........................................................................................... 34
2.3.4.4 SDP keepalives................................................................................................................ 34
2.3.4.5 SDP administrative groups.............................................................................................. 35
2.3.4.6 SDP selection rules..........................................................................................................36
2.3.4.7 Class-based forwarding....................................................................................................37
2.3.4.8 Source IPv4 address configuration in GRE SDP and GRE tunnel.................................. 38
2.3.4.9 GRE SDP tunnel fragmentation and reassembly............................................................ 42
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Table of contents
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Table of contents
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Table of contents
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Table of contents
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Getting started
1 Getting started
For a list of unsupported features by platform and chassis, see the SR OS 21.x.Rx Software Release
Notes, part number 3HE 17177 000 x TQZZA.
Command outputs shown in this guide are examples only; actual displays may differ depending on
supported functionality and user configuration.
Note:
The SR OS CLI trees and command descriptions can be found in the following guides:
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI Command Reference Guide
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor, Show, and Tools Command
Reference Guide (for both MD-CLI and Classic CLI)
• 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference Guide
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Getting started
Note:
This guide generically covers Release 21.x.Rx content and may contain some content that will
be released in later maintenance loads. See the SR OS 21.x.Rx Software Release Notes, part
number 3HE 17177 000 x TQZZA for information about features supported in each load of the
Release 21.x.Rx software.
Service configuration Configure global service entities Configuring global service entities
with CLI
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
2 Services overview
2.1 Introduction
A service is a globally unique entity that refers to a type of connectivity service for either Internet or VPN
connectivity. Each service is uniquely identified by a service ID and an optional service name within a
service area. The Nokia service router model uses logical service entities to construct a service. In the
service model, logical service entities provide a uniform, service-centric configuration, management, and
billing model for service provisioning.
In the Nokia router services can provide Layer 2 bridged service or Layer 3 IP-routed connectivity between
a service access point (SAP) on one router and another service access point (a SAP is where traffic enters
and exits the service) on the same (local) router or another router (distributed). A distributed service spans
more than one router.
Distributed services use service distribution points (SDPs) to direct traffic to another Nokia router through a
service tunnel. SDPs are created on each participating router, specifying the origination address (the router
participating in the service communication) and the destination address of another router. SDPs are then
bound to a specific customer service. Without the binding process, far-end router is not able to participate
in the service (there is no service without associating an SDP with a service).
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• Internet Enhanced Service (IES) — A direct Internet access service where the customer is assigned an
IP interface for Internet connectivity.
See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN for more
information about IES.
• Virtual Private Routed Network (VPRN) — A Layer 3 IP multipoint-to-multipoint VPN service as defined
in RFC 2547bis.
See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN for more
information about VPRN services.
• Circuit Emulation Service (Cpipe) — 7750 SR circuits encapsulated in MPLS use circuit pipes (Cpipes)
to connect to the far end circuit. Cpipes support either SAP-spoke SDP or SAP-SAP connections.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SAPs or SLA profile instances on the forwarding plane, the multipoint queues are not created. Instead,
the ingress multipoint packets are handled by the unicast queue mapped to the forwarding class of the
multipoint packet.
Functionally, multipoint shared queuing is a superset of shared queuing. With shared queuing on a SAP
or SLA profile instance, only unicast packets are processed twice, once for the initial service level queuing
and a second time for switch fabric destination queuing. Shared queuing does not affect multipoint packet
handling. Multipoint packet handling in normal (service queuing) is the same as shared queuing. When
multipoint shared queuing is enabled, shared queuing for unicast packets is automatically enabled.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Figure 1: Unicast service queue mapping to multiple destination based hardware queues
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Enabling shared queuing may affect ingress performance because of double packet processing through
the service and shared queues.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• QoS policies, filter policies, and accounting policies are applied to each service instead of correlating
parameters and statistics from ports to customers to services.
Service provisioning uses logical entities to provision a service where additional properties can be
configured for bandwidth provisioning, QoS, security filtering, accounting/billing to the appropriate entity.
2.3.1 Customers
In this section, the terms customers and subscribers are used synonymously. The most basic required
entity is the customer ID value which is assigned when the customer account is created. To provision a
service, a customer ID must be associated with the service at the time of service creation.
2.3.2 SAPs
Each subscriber service type is configured with at least one service access point (SAP). A SAP identifies
the customer interface point for a service on a router (for example Figure 6: 7750 SR/7950 XRS service
access point (SAP)). The SAP configuration requires that slot, XMA or MDA, and port/channel information
be specified. The slot, XMA or MDA, and port/channel parameters must be configured before provisioning
a service (See the XMAs, Cards, MDAs, and Ports sections of the SR OS Interface Configuration Guide).
A SAP is a local entity to the router and is uniquely identified by:
• The physical Ethernet port or SONET/SDH port or TDM channel
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A SAP can also be associated with a pseudowire port instead of an access port. Such SAPs are called
pseudowire SAPs. This is only applicable to IES, VPRN, and Epipe services. Pseudowire ports represent
pseudowires in enhanced subscriber management (ESM). For a description of pseudowire ports, see the
7450 ESS, 7750 SR, and VSR Triple Play Service Delivery Architecture Guide.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• Internet Protocol Control Protocol (IPCP) — Supports a single IP service on a SONET/SDH port
or a single service per channel (if the interface is channelized). This is typically used for router
interconnection using point-to-point protocol (PPP).
• Bridging Control Protocol (BCP-null) — Supports a single service on the SONET/SDH port or a single
service per channel (if the interface is channelized). This is used for bridging a single service between
two devices using PPP over SONET/SDH. The encapsulation ID is always 0 (zero).
• Bridging Control Protocol (BCP-dot1q) — Supports multiple services on the SONET/SDH port/channel.
This encapsulation type is used for bridging multiple services between two devices using PPP over
SONET/SDH. The encapsulation ID used to distinguish services is the VLAN ID in the IEEE 802.1Q
header in the BCP-encapsulated frame.
• ATM — ATM, ATM-FR, ATM SAP-bridge encapsulation termination Epipe and VPLS.
• Frame Relay — Supports the switched data link layer protocol that handles multiple virtual circuits.
There are several 7450 ESS encapsulation service options on SONET/SDH channels:
• Internet Protocol Control Protocol (IPCP) — Supports a single IP service on a SONET/SDH port. This is
typically used for router interconnection using point-to-point protocol (PPP).
• Bridging Control Protocol (BCP-null) — Supports a single service on the SONET/SDH port. This is used
for bridging a single service between two devices using PPP over SONET/SDH. The encapsulation ID
is always 0 (zero).
• Bridging Control Protocol (BCP-dot1q) — Supports multiple services on the SONET/SDH port. This
encapsulation type is used for bridging multiple services between two devices using PPP over SONET/
SDH. The encapsulation ID used to distinguish services is the VLAN ID in the IEEE 802.1Q header in
the BCP-encapsulated frame.
• Frame Relay — Supports the switched data link layer protocol that handles multiple virtual circuits.
Figure 7: 7750 SR/7950 XRS and 7450 ESS multiple SAPs on a single port/channel
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
One of the applications where this feature can be applicable is an access connection of a customer who
uses the whole port to access Layer 2 services. The internal VLAN tags are transparent to the service
provider. This can be provided by a null encapsulated port. A dedicated VLAN (not used by the user) can
be used to provide CPE management.
In this type of environment, logically two SAPs exist, a management SAP and a service SAP. The
management SAP can be created by specifying a VLAN tag which is reserved to manage the CPE. The
service SAP covers all other VLANs and behaves as a SAP on a null-encapsulated port.
There a few constraints related for the use of default SAP on a Dot1q-encapsulated port:
• This type of SAP is supported only on VPLS and Epipe services and cannot be created in IES and
VPRN services as it cannot preserve VLAN tag markings.
• For VPLS SAPs with STP enabled, STP listens to untagged and null-tagged BPDUs only. All other
tagged BPDUs are forwarded like other customer packets. This is the same behavior as null-
encapsulated ports.
• IGMP snooping is not supported on a default SAP. This would require remembering VLAN tags per
hosts. By not allowing IGMP snooping of this SAP, all IGMP packets are transparently forwarded.
• This type of SAP and a SAP defined by explicit null encapsulation (for example, 1/1/1:0) are mutually
exclusive. This avoids conflict as to which SAP untagged frames should be associated.
In a Dot1q port SAP with a non-zero or non-default tag, the tag (referred to as service-delimiting tag) is
stripped off on ingress and pushed on egress. For example, the tag is popped from frames received on
SAP 1/1/1:10 with a tag that contains VID 10. A tag with VID 10 is pushed onto frames that are sent out of
SAP 1/1/1:10.
In case of Dot1q port SAPs with a zero or default tag, no tag is stripped off on ingress, and no tag is
pushed on egress. For instance, tags are not stripped off from frames entering 1/1/1:* or 1/1/1:0, and tags
are not pushed either on frames egressing those SAPs.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• ‛0.*’ can also be used as a default SAP and captures untagged frames, doubly-tagged frames with
qtag1 0 (and any value on qtag2) and singly-tagged frames with qtag 0. SAP ‛0.*’ and ‛null.null’ cannot
be configured on the same QinQ port.
• In addition to the above-mentioned SAPs, qtag2 can also be '0' or '*' when qtag1 is an explicit value in
the 1 to 4094 range, for instance: 1/1/1:10.0 or 1/1/1:10.*. Assuming qtag1 is the same value, qtag1.*
and qtag1.0 are supported in the same QinQ port. The system never pushes any qtag2 on egress for
1/1/110.0 and 1/1/1:10.*, only qtag1 is pushed. The x.0 accepts only 0 as second tag or not tag (and
nothing else), while x.* accepts anything as second tag or no tag.
A SAP lookup is performed when a new frame arrives to a QinQ port. This 'lookup' is based on the <outer-
tag, inner-tag> values of the frame.
Table 3: SAP lookup precedence order for incoming frames shows the SAP lookup precedence order for
incoming frames with <qtag1.qtag2> qtag values.
The following considerations apply to the information described in Table 3: SAP lookup precedence order
for incoming frames:
• All SAP types (:X.Y, :X.0, :X.*, :0.* or :null.null, :*.null and :*.*) are supported in the same QinQ port (with
the exception of :0.* and :null.null being incompatible) and, in the table, they are ordered from the most
specific (left-hand side) to the least specific with the following VID matching ranges:
– X or Y means <1 to 4094>
– * means <0 to 4095> or untagged
– null means 'no tag'
– 0 means VID 0 or untagged
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• On egress, the system pushes a tag with a VID value for X and Y, whereas no tag is pushed on egress
for values 0, * or null. For example:
– On SAP 1/1/1:10.20, the system pushes tags with VIDs 10 and 20 (outer and inner respectively) on
egress.
– On SAP 1/1/1:10.0 or 1/1/1:10.* the system pushes only one tag with VID 10 on egress.
– On SAPs 1/1/1:0.*, 1/1/1:null.null, 1/1/1:*.null or 1/1/1:*.* the system never pushes any tags on
egress.
• The user can decide the SAP types that are configured in a specific port. Not all SAP types must be
configured in a port.
• Table 3: SAP lookup precedence order for incoming frames shows the lookup behavior for ingress
frames and priority across SAPs in case more than one can match a specific ingress frame. The SAP
lookup result for a specific frame does not depend on the operational status of the SAP. For instance:
– In a port with SAPs 1/1/1:0.* and 1/1/1:*.* defined, the SAP lookup for a specific frame with VIDs (0,
300) yields SAP 1/1/1:0.* regardless of its operational status.
– The frame only matches SAP 1/1/1:*.* when the 0.* SAP is removed from the configuration.
• The following applies to VLAN tag handling:
– The system does not strip-off any tags for frames entering the default SAPs (:0.*, :null.null, :*.null
or :*.*).
– No extra tags are added when the system transmits frames on the default SAPs
(:0.*, :null.null, :*.null or :*.*).
The following examples illustrate the SAP classification QinQ ports. The examples assume that the new-
qinq-untagged-sap command is enabled.
As shown in Figure 8: Example 1 SAP classification QinQ ports, assuming that the new-qinq-untagged-
sap command is enabled, the following SAPs are defined on the same port:
• 1/1/1:3000.1001 - business customer - vpls-1
• 1/1/1:2000.1002 - business customer - vpls-2
• 1/1/1:20.0 - BNG traffic - vpls-3
• 1/1/1:20.* - business customer - epipe-4
• 1/1/1:0.* - business customer - epipe-5
• 1/1/1:*.null - wholesaling single tag - epipe-6
• 1/1/1:*.* - wholesaling double tag - epipe-7
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Based on the SAPs configuration described above, the incoming traffic is classified in the following way -
notation (outer-VID, inner-VID):
• (3000, 1001) goes to vpls-1
• (20) goes to BNG (vpls-3)
• (20, 0) goes to BNG (vpls-3)
• (20, 10) goes to epipe-4
• untagged, (0), (0, 0), and (0, 10) go to epipe-5
• (500) goes to wholesaling single tag (epipe-6)
• (500, 300) and (500, 0) go to wholesaling double tag (epipe-7)
Figure 9: Example 2 SAP classification QinQ ports highlights how untagged, VID=0 tagged frames and
20.X frames are classified in the absence of the 0.* and 20.* SAPs.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
As described in Figure 9: Example 2 SAP classification QinQ ports, assuming the new-qinq-untagged-
sap command is enabled, the following SAPs are defined on the same port:
• 1/1/1:3000.1001 - business customer - vpls-1
• 1/1/1:2000.1002 - business customer - vpls-2
• 1/1/1:20.0 - BNG traffic - vpls-3
• 1/1/1:*.null - wholesaling single tag - epipe-6
• 1/1/1:*.* - wholesaling double tag - epipe-7
Incoming traffic - notation (outer-VID, inner-VID)
• (3000, 1001) goes to vpls-1
• (20) goes to BNG (vpls-3)
• (20, 0) goes to BNG (vpls-3)
• (20, 10) goes to wholesaling double tag (epipe-7)
• untagged and (0) go to wholesaling single tag (epipe-6)
• (500) goes to wholesaling single tag (epipe-6)
• (500, 300) and (500, 0) go to wholesaling double tag (epipe-7)
• (0,0), and (0,10) goes to wholesaling double tag (epipe-7)
Note:
The system does not add service-delimiting tags with VID=0; however, tags with VID=0 are
accepted and classified appropriately.
The following constraints must be considered when configuring default QinQ SAPs
(:0.*, :null.null, :*.null, :*.*):
• Only supported in Ethernet ports or LAG.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• Only supported on Epipe, PBB-Epipe, VPLS and I-VPLS services. They are not supported on VPRN,
IES, R-VPLS or B-VPLS services.
• Capture SAPs with encapsulation :*.* cannot coexist with a default :*.* SAP on the same port.
• Inverse-capture SAPs (*.x) are mutually-exclusive with :*.null SAPs.
• *.null SAPs are not supported for Open Flow matching and forwarding.
• The following applies to Eth-CFM:
– Primary VLAN is not supported.
– Eth-CFM extractions occur within the service after the packet lookup has determined which service
the inbound packet belongs to.
– All four SAPs (null.null, *.null, *.* and 0.*) are treated equally by ETH-CFM. Only untagged CFM
PDUs are extracted by a local MEP or MIP. Additional tags in the header may match the service
context but are not extracted by ETH-CFM for processing.
– ETH-CFM PDU transmission encapsulation is based on the SAP configuration. This means that the
ETH-CFM PDUs are transmitted out all four of these SAPs untagged. Care must be taken to ensure
that there is no downstream service that may intercept the ETH-CFM PDUs that are not intended for
that service. See Table 3: SAP lookup precedence order for incoming frames for a description of the
SAP lookup precedence order for incoming frames and to understand the potential consequences.
• Default QinQ SAPs do not support the following features:
– PW-SAPs
– Eth-tunnel or eth-ring SAPs
– VLAN-translation copy-outer
– E-Tree root-leaf-tag SAPs
– Subscriber-management features
– BPDU-translation
– Eth-tunnels
– IGMP-snooping
– MLD-snooping
Ethernet Null
Ethernet Dot1q
Ethernet QinQ
SONET/SDH IPCP
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SONET/SDH BCP-null
SONET/SDH BCP-dot1q
SONET/SDH ATM
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
For further information about Ethernet rings, see G.8032 Ethernet ring protection switching.
configure
lag <lag-id>
access
bandwidth <bw-value>
booking-factor <percentage>
port <port-id>
ethernet
access
bandwidth <bw-value>
booking-factor <percentage>
service
[apipe | cpipe | epipe | fpipe | ipipe | vpls] <service-id>
sap <sap-id>
bandwidth <bw-value>
[ies | vprn] <service-id>
interface <ip-int-name>
sap <sap-id>
bandwidth <bw-value>
Changes in admin bandwidth and booking factor are possible dynamically without having to disable the
SAP, port or LAG.
After a SAP has been allocated bandwidth on a port or LAG that bandwidth is allocated to that SAP
regardless of whether the SAP and, or port or LAG are up or down (either administratively or operationally).
The admin bandwidth must be removed from the SAP configuration to free up its bandwidth on the port
or LAG. Actions such as clearing the card or MDA, power-cycling the card or removing/inserting a card or
MDA do not change the SAP and port or LAG CAC state.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A:PE>config>service>vpls# info
----------------------------------------------
<snip>
sap 1/1/1:cp-1 create
no shutdown
exit
sap 1/1/2:100.cp-1 create
no shutdown
exit
sap 1/1/3:cp-1.* create
no shutdown
exit
<snip>
For VLAN manipulation, the CP SAP behavior is equivalent to the default SAP’s (when the ingress VID
falls into the range configured in the CP), where the range of VIDs included is not service-delimiting and
therefore, the VIDs are not pushed/popped. The main differences between the CP SAPs and the default
SAPs are:
• Resources — A default SAP consumes one SAP instance, whereas a CP SAP consumes SAP
instances equal to the number of VLANs in the range. To check the number of SAP instances used by
the system, run the following CLI commands:
See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Basic System Configuration Guide for a complete
description of the tools dump resource-usage command.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• Unlike the default SAP, a CP SAP cannot coexist with a vlan SAP that is in the same range. For
example, 1/1/1:* and 1/1/1:100 can coexist; in contrast, 2/1/1:cp-1 (cp-1 = vlan 1 to 200) and 2/1/1:100
cannot coexist.
Figure 10: VLAN tag handling shows customer VID processing by SAPs with service-delimiting VIDs, and
by CP SAPs. In this example, SAP 1/1/1:cp-1 does not strip off or push VID 10, whereas SAP 1/1/1:100
and SAP 1/1/1:200 do strip off and push the corresponding VID.
A connection-profile-vlan allows the configuration of VLAN ranges with the following characteristics.
• A vlan-range can be defined as a single VID (for example, vlan-range 101), or two VIDs delimiting the
beginning and the end of the range (for example, vlan-range 105 to 107).
• Discontinuous ranges are allowed.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• Overlapping ranges are not allowed within the same connection-profile-vlan configuration.
Overlapping VLAN ranges can exist across different connection profiles if they are not applied to the
same port (in the case of dot1q ports), or the same port and service-delimiting tag (in the case of QinQ
ports). For example:
– 1/1/1:x.cp-1 and 1/1/1:y.cp-2 can coexist on the same port, where cp-1 includes VIDs [10-20] and
cp-2 includes VIDs [15-25]
– if x=y, then the overlapping is not possible in the above case
• A connection-profile-vlan must have at least one range (with a single or multiple VIDs) before it can
be associated with a SAP.
• A connection-profile-vlan cannot contain an explicitly defined SAP within any of the ranges when the
explicit SAP is configured on the same port.
• The configured VLAN ranges cannot contain VIDs 0 or 4095.
• The connection-profile-vlan SAPs are supported in Layer 2 services only. No IES or VPRN services
can contain CP SAPs.
• CP SAPs are supported on access or hybrid ports but are not on network interfaces.
• CP SAPs are supported in (non-PBB) Epipe and VPLS services.
• CP SAPs support SAP based QoS policies. VID type MAC criteria can be used on CP SAPs to apply
specific QoS on a VLAN within the connection-profile-vlan.
• The legacy OAM commands (mac-ping, mac-trace, mac-purge, and mac-populate) are not
supported for CP SAPs.
:X :CP :0 :*
0 1st 1st
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The following considerations apply when connection profile VLAN (CP VLAN) is used in QinQ ports:
• A CP can be defined for inner or outer tags but not both at the same time; for example, ‟:X.CP” and
‟:CP.*” are possible, but not ‟:CP.CP”.
• It is important to note that ‟:CP:Y” is not allowed; for example, if a CP is defined at the outer VID, the
inner VID can only be a ‟*” or a ‟0”.
• ‟:0.CP” SAPs are not allowed; if the outer VID is 0, the inner VID cannot be a connection-profile-vlan
value.
• A CP cannot contain a VID that is associated with an explicitly defined inner or outer tag in a specific
port. For example, assuming that X and Y are tags defined in ‟CP”, a specific port can be defined with
":X.CP" or ":Y.CP", but not with ":X.Y" and ":X.CP" or ":CP.*" and "X.*" in the same port.
• The following combinations are allowed:
– :CP.0 - matches frames with outer tags contained in CP and inner tags 0 or null
– :CP.* - matches frames with outer tags contained in CP and any inner tags
• In the case where a VLAN tag combination matches different SAPs, the highest priority SAP is picked,
irrespective of its oper-status, as long as the SAP is still created. Therefore, if the SAP is down, the
frames do not go to a different SAP. For example, suppose that ingress frames with VIDs 10.25 are
classified as part of sap 10.cp-1. Only when sap 10.cp-1 is removed from the configuration do the
frames with VIDs 10.25 go to sap cp-1.*.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Figure 11: GRE service distribution point (SDP) pointing from ALA-A to ALA-B
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
configured or the command is failed. Admin groups are supported on an SDP of type GRE and of type
MPLS (BGP/RSVP/LDP). They are also supported on an SDP with the mixed-lsp-mode option enabled.
The user then selects which admin groups to include or exclude in a pseudowire template:
config>service>pw-template>sdp-include group-name
config>service>pw-template>sdp-exclude group-name
The admin group name must have been configured or the command is failed. The user can execute the
command multiple times to include or exclude more than one admin group. The sdp-include and sdp-
exclude commands can only be used with the use-provisioned-sdp or prefer-provisioned-sdp options.
If the same group name is included and excluded within the same PW template, only the exclude option is
enforced.
Any changes made to the admin group sdp-include and sdp-exclude constraints are only reflected in
existing spoke SDPs after the following command has been executed:
tools>perform>service>eval-pw-template>allow-service-impact
When the service is bound to the PW template, the SDP selection rules enforce the admin group
constraints specified in the sdp-include and sdp-exclude commands.
config>service>vpls>bgp>pw-template-binding policy-id
config>service>epipe>spoke-sdp-fec>pw-template-bind policy-id
Note:
The group value is used to uniquely identify an SDP admin group throughout the network in NSP
NFM-P. The node sends both the group name and value to NSP NFM-P (or other SNMP device)
at the creation of the SDP admin group. In all other operations in the node, such as adding an
SDP to an admin group or including or excluding an SDP admin group in a service context, only
the group name is sent to NSP NFM-P or the SNMP device.
SDP admin groups can be enabled on all router services that make use of the pseudowire template (BGP-
AD VPLS service, BGP-VPLS service, BGP-VPWS and FEC129 VLL service). In the latter case, SR OS
provides support at the T-PE nodes only.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Figure 12: Class-based forwarding over SDP LSPs illustrates the use of class-based forwarding to direct
packets of a service to specific RSVP or static LSPs that are part of the same SDP based on the packets'
forwarding class. The forwarding class of the packet is the one assigned to the packet as a result of
applying the ingress QoS policy to the service SAP. The VLL service packets are all classified into the ef
forwarding class and those that are destined for PE2 are forwarded over LSP1. Multicast and broadcast
are classified into the be class and are forwarded over LSP2.
This feature allows service providers to dedicate specific LSPs with a determined level of traffic
engineering and protection to select service packets. For example, packets of a VoIP service are assigned
the ef class to expedite their forwarding but are also sent over carefully traffic-engineered and FRR-
protected LSP paths across the service provider network.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
which the SDP does not have an explicitly-configured LSP association. It is also used to forward a received
packet if the LSP supporting its forwarding class is down.
Note:
The SDP goes down if the default LSP is down.
Class-based forwarding can be applied to all services supported by the Nokia routers. For VPLS services,
explicit FC-to-LSP mappings are used for known unicast packets. Multicast and broadcast packets use the
default LSP. There is a per-SDP user configuration that optionally overrides this behavior to specify an LSP
to be used for multicast/broadcast packets.
VLL service packets are forwarded based on their forwarding class only if shared queuing is enabled on
the ingress SAP. Shared queuing must be enabled on the VLL ingress SAP if class-forwarding is enabled
on the SDP the service is bound to. Otherwise, the VLL packets are forwarded to the LSP which is the
result of hashing the VLL service ID. Because there are eight entries in the ECMP table for an SDP, one
LSP ID for each forwarding class, the resulting load balancing of VLL service ID is weighted by the number
of times an LSP appears on that table. For instance, if there are eight LSPs, the result of the hashing is
similar to when class based forwarding is disabled on the SDP. If there are fewer LSPs, then the LSPs
which were mapped to more than one forwarding class, including the default LSP, have proportionally more
VLL services forwarding to them.
Only user packets are forwarded based on their forwarding class. OAM packets are forwarded in the same
way as an SDP with class-based forwarding disabled. In other words, LSP ping and LSP trace messages
are queued in the queue corresponding to the forwarding class specified by the user and are forwarded
over the LSP being tested. Service and SDP OAM packets, such as service ping, VCCV ping, and SDP
ping are queued in the queue corresponding to the forwarding class specified by the user and forwarded
over the first available LSP.
Class-based forwarding is not supported for protocol packets tunneled through an SDP. All packets are
forwarded over the default LSP.
Class-based forwarding is not supported on a spoke SDP used for termination on an IES or VPRN service.
All packets are forwarded over the default LSP.
2.3.4.8 Source IPv4 address configuration in GRE SDP and GRE tunnel
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• VPRN interface
• CSC VPRN interface
The following rules apply to the local-end command:
• A maximum of 15 distinct address values can be configured for all GRE SDPs under
the config>service>sdp>local-end context, and all L2oGRE SDPs under the
config>service>system>gre-eth-bridged>tunnel-termination context.
The same source address cannot be used in both contexts because an address configured for a
L2oGRE SDP matches an internally created interface which is not available to other applications.
• The local-end address of a GRE SDP, when different from system, need not match the primary address
of an interface which has the MPLS-over-GRE termination subnet configured, unless a GRE SDP or
tunnel from the far-end router terminates on this address.
The user must ensure that the local-end address is reachable from the far-end router that terminates the
GRE SDP. To help ensure reachability, the interface for this address may be added to IGP or BGP, or a
static route may be configured on the far-end router.
The following services can be bound to a GRE SDP when the local-end address is modified:
• VPRN or IES with a spoke-sdp interface
(config>service>vprn>interface>spoke-sdp)
• VPLS with provisioned a spoke SDP
• BGP-AD VPLS and use-provisioned-sdp or prefer-provisioned-sdp option enabled
• BGP-VPLS and use-provisioned-sdp or prefer-provisioned-sdp or prefer-provisioned option
enabled
• Epipe with provisioned a spoke SDP
• Epipe with BGP-VPWS and use-provisioned-sdp or prefer-provisioned-sdp or prefer-provisioned
option enabled
For services that support auto-binding to a GRE tunnel, a new CLI command is introduced to configure a
single alternate source address per system:
config>service>system>vpn-gre-source-ip ip-address
The default value is the primary IPv4 address of the system interface.
A change to the value of the vpn-gre-source-ip parameter can be performed without shutting down the
service. After the new value is configured, the system address is not used in services that bind to the GRE
tunnel.
The primary IPv4 address of any local network IP interface, loopback or otherwise, may be used.
The address of the following interfaces are not supported:
• unnumbered network IP interface
• IES interface
• VPRN interface
• CSC VPRN interface
The following rules apply to the vpn-gre-source-ip parameter value:
• This single source address counts toward the maximum of 15 distinct address values per system that
are used by all GRE SDPs under the config>service>sdp>local-end context and all L2oGRE SDPs
under the config>service>system>gre-eth-bridged>tunnel-termination context.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• The same source address can be used in both vpn-gre-source-ip and config>service>sdp>local-end
contexts.
• The same source address cannot be used in both vpn-gre-source-ip and
config>service>system>gre-eth-bridged>tunnel-termination contexts because an address
configured for a L2oGRE SDP matches an internally created interface that is not available to other
applications.
• The vpn-gre-source-ip address, when different from system, need not match the primary address of an
interface which has the MPLS-over-GRE termination subnet configured, unless a GRE SDP or tunnel
from the far-end router terminates on this address.
The following contexts can use a GRE tunnel when the source IP address is modified:
• VPRN service with a SDP (config>service>vprn>spoke-sdp)
• VPRN auto-bind-tunnel
The source address cannot be configured for the following services with auto-created GRE-SDP:
• BGP-AD VPLS
• BGP-VPLS
• VGP-VPWS
An alternative solution to bind any one of these services to its own specific GRE SDP with its own source
IP address, is to tag a pre-provisioned GRE SDP with a SDP admin-group (sdp-group command) and
include the admin-group with the PW template binding of this service (config>service>pw-template
policy-id [use-provisioned-sdp]> sdp-include group-name). The command prefer-provisioned-sdp can
also be used.
2.3.4.8.2 Feature operation with T-LDP and BGP service label signaling
The origination function continues to operate as in previous releases. The only change is the ability to
insert the user configured address in the source address field of the GRE/IPv4 header as described in
Introduction and feature configuration.
Note:
The service manager does not explicitly request from the LDP module that an SDP auto-
generated T-LDP session for the MPLS-over-GRE SDP uses the source address configured with
the local-end CLI command. LDP ensures that either a user-configured T-LDP session, or a peer
template based auto-created T-LDP session, exists and is connected to the far-end address of
the SDP. LDP uses one of these sessions, or auto-creates one using the default local transport
address of system.
Consequently, if the source transport address used by the T-LDP control plane session does not match
the destination transport address set by the remote PE in the targeted LDP Hello messages, the T-LDP
session does not come up.
For example, the setup in Figure 13: Mismatched T-LDP control plane parameters results in both GRE
SDP1 and SDP2 to remain down because the targeted Hello adjacency and LDP session does not come
up between the two LDP LSRs.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The user must match the local transport address of the T-LDP session to the local-end address of the
GRE SDP in both the local and remote PE routers. This can be achieved by manually configuring a T-
LDP session to the peer, or by auto-creating a T-LDP session with the targeted peer template feature, and
setting the local-lsr-id command to the address configured in the local-end command of the GRE SDP.
In addition, the far-end address must be in a GRE termination subnet at the remote PE and be the primary
address of an interface in order for T-LDP to use it as its local LSR ID at the remote PE. Figure 14: Proper
setting of T-LDP control plane parameters shows an example of a correct configuration.
The source address used by the GRE tunnel in the data plane can be different than the local transport
address used by T-LDP in the control plane and the GRE SDPs still come up. For example, the setup
in Figure 15: Source address mismatch between control and data planes uses at each end the system
address for the T-LDP session but uses a loopback interface address as the source address of the GRE
SDP.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Figure 15: Source address mismatch between control and data planes
Note:
The LDP uses a priority mechanism to select which parameters to use to instantiate a T-LDP
session to the same far-end transport address. A manually provisioned T-LDP session overrides
one that is signaled using the targeted peer template which overrides one that is auto-created by
an SDP. This is done automatically by LDP by issuing, an ad-hoc update to the Hello message
to the far-end with the new parameters. As long as the corresponding change is performed at
the far-end router to match the local-end parameter change (for example, changing the local
transport address requires a change of the far-end transport address in the remote LSR to the
same value) the T-LDP session remains up while the Hello adjacency is being synchronized by
both LSRs.
The same recommendation applies when the SDP uses BGP for signaling the VC labels of the services.
The user must configure the BGP session to the peer and set the local-address CLI command under the
BGP group context or under the neighbor context to the address configured in the local-end command of
the GRE SDP.
Replies to OAM messages such as an SDP keep-alive and sdp-ping are sent by the far-end PE using the
MPLS-over-GRE encapsulation to the source address of the received OAM message. This means, the
source transport address of the T-LDP control plane session or the BGP control plane session is used for
the signaling of the VC-label in the local PE. Replies to OAM messages when the VC label is static are
sent to the source address of the local PE. In all cases however, the system can properly extract them to
the CPM as long as the subnet of that local interface is reachable.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
#--bb-isa----------------------------------------------
config
card 1
mda 2
mda-type isa-bb-v
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
no shutdown
exit
no shutdown
exit
#--ip-filter----------------------------------------------
filter
ip-filter 10 create
default-action forward
entry 1 create
match protocol gre
fragment true
exit
action
reassemble
exit
exit
exit
exit
#--nat-group----------------------------------------------
isa
nat-group 1 create
active-mda-limit 1
mda 1/2
no shutdown
exit
exit
#--router-base--------------------------------------------
router Base
interface "system"
address 91.91.91.91/32
no shutdown
exit
interface "to-PE2"
address 61.61.61.61/24 gre-termination
port 1/1/11:123
ingress
filter ip 10
exit
no shutdown
exit
exit
exit
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• VSR-I
• VSR-a
Services that support GRE SDP termination on the router interface IP address include the following:
• VPRN services (spoke SDP and auto-bind-tunnel)
• T-LDP signaled Ethernet VLL services
• T-LDP signaled VPLS services
• BGP-VPLS services
• BGP-VPWS services
Only GRE SDP tunnel packets that have a destination IP that is equal to the /31 value of the IP address
configured on the router interface can terminate on the router interface. For example, if the address is set
to 1.2.3.4/24, only the single /31 address 1.2.3.4 is used for the GRE SDP tunnel packet to terminate on.
GRE SDP termination on router interface IP addresses is not supported on loopback interfaces.
When T-LDP is used to signal services, the local-lsr-id must be set to the /31 value of the IP address of
the router interface used for the GRE SDP tunnel packets to terminate on.
When BGP is used to advertise routes for services, the local-address for BGP sessions must be set to
the /31 value of the IP address of the router interface used for the GRE-SDP tunnel packets to terminate
on.
Note:
Do not enable this functionality in the core PBB context because there is no ISID awareness. If
this feature is enabled in the core PBB context all traffic that arrives on the B-SAP or B-MPLS
binding is looped back into the PBB context, without regard for ISID or customer specific MAC
headers.
An ingress loopback configured on the entity has the following effects on traffic forwarding on the entity:
• Traffic arriving on the entity is looped back to the same entity, via the fabric.
• Traffic attempting to egress that entity from another SAP or SDP binding within the service is blocked.
Essentially an ingress loopback function isolates the SAP or MPLS SDP binding from the rest of the
service. Figure 16: Ingress loopback packet processing uses a simple Epipe service example to show the
various touch points for a packet that is processed by an ingress loopback as it moves through the network
element.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
An egress loopback configured on the entity has the following effects on the traffic forwarding on the entity.
• Traffic arriving on any service SAP or SDP binding that is forwarded to an egress loopback is looped
back into the service.
• Traffic attempting to gain access to the service from that entity (ingress the network element from the
entity) is dropped.
In the case of the egress loopback, the SAP or MPLS SDP binding is not isolated from the rest of the
service it remains part of the service and reflects traffic back into the service.
Note:
Extreme care must be used when considering the application of an egress loopback in a VPLS
or I-VPLS service. Because a VPLS service relies on MAC based forwarding, any packet
that arrives at an egress loopback is reflected back into the service, which uses MAC based
forwarding to apply the correct forwarding decision. In a live multipoint service with active
endpoints this could have a major negative impact on the service and the clients connected
to this service. Even if the forwarding database is primed, any arriving broadcast, unknown or
multicast traffic arrives on the egress loopback and is reflected back into the service causing (at
the very least) duplication of this type of traffic in the service.
Figure 17: Egress loopback packet processing uses a simple Epipe service to illustrate the various touch
points for a packet that is processed by an egress loopback as it moves through the network element.
Egress processing does not perform queuing functions on the egress; only functions of the forwarding
plane like remarking are performed.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The operational state of the SAP or MPLS SDP binding does not change as a result of the loopback
function. This means a SAP or MPLS SDP binding that is operationally up does not change state strictly
because the loopback started or stopped. Of course control protocols that are attempting to gain access
via the entity that is not allowing packets to enter the service eventually time out.
Exercise caution when considering the use of control protocols in a service with enabled loopbacks. The
operator must understand that control protocol interruptions can significantly impact the state of the SAP.
When SAPs are dynamically created using a protocol or a protocol is required to maintain the operational
state of the SAP, interrupting the control protocol causes the SAP to fail. Other SAPs linking their state to a
failed SAP react to that failure as well. This loopback function is per Ethernet SAP or MPLS SDP binding.
That is, all traffic that is extracted and sent to the CPM before the loopback process is looped back in the
direction it was received, or in the case of VPLS, back into the service. All service based control protocols
that are included with this service should be removed to ensure the loopback process is handling the
packets and not some other function on the node that can extract the control protocol but never respond
because the service is blocked. However, there may be instances where it is essential to continue running
control protocols for the service during a loopback. For example, Down MEPs on an Ethernet SAP could
continue to process ETH-CFM packets if the loopback is on the mate Ethernet SAP and was configured as
an egress loopback.
By default, no MAC swap functions are performed. Options are available to support various MAC swap
functions. Table 7: MAC-Swap configuration and options lists the actions and functions based on the
configured mac-swap and associated options.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The following is an example output of the active loopback mode based on Figure 18: Active loopback
mode.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Packets Octets
CPM Ingress : 491790 46721290
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Promiscuous ETH-LBM mode bypasses some checks and extended functions typically performed by a
MEP. In this mode, the MEP does not validate the Layer 2 destination MAC address of the arriving ETH-
LBM frame to ensure that it matches the MEP. ETH-LB system statistics and per-MEP statistics, as well as
ETH-LB specific counters, are not incremented. CFM debugging is not available for these ETH-LB packets.
Only ETH-LBM PDUs at the same domain level as the MEP that is configured with the lbm-svc-act-
responder function access the additional resources required to accommodate high-speed service
activation processing. Normal processing of ETH-CFM packets occurs for all other ETH-CFM PDUs that
arrive on the MEP with the same domain level. The MEP also processes and terminates the lower levels
as per normal processing. To ensure correct handling of the service activation stream encapsulated in the
ETH-LBM PDU, the level of all ETH-LBM packets in the stream must equal that of the target MEP with the
lbm-svc-act-responder command.
This mode of operation is supported for Up and Down MEPs in Epipe and VPLS services as well as for
base router interfaces. This functionality requires a minimum of FP3 hardware.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
through health-monitoring. The 1:1 model is common practice for packet based services because it makes
best use of available bandwidth.
Within each path, Y.1731 Maintenance Entity Group (MEG) Endpoints (MEPs) are used to exchange APS-
specific information (specifically to co-ordinate switchovers) as well as optionally fast Continuity Check
Messages (CCM) providing an inherent fault detection mechanism as part of the protocol. Failure detection
of a working path by one of the mechanisms triggers to move from working to protecting circuits. Upon
failure, re-convergence times are a dependent on the failure detection mechanisms. In the case of Y.1731,
the CCM transmit interval determines the response time. The OS supports message timers as low as 10
milliseconds so the restoration times are comparable to SONET/SDH. Alternatively, 802.3ah (Ethernet in
the First Mile) or simple Loss of Signal can act as a trigger for a protection switch where appropriate.
Revertive or non-revertive behavior can be configured based on service provider environment. Revertive
behavior is commonly deployed because it restores the traffic to a predictable state.
Ethernet APS can be configured on any port configured for access mode using dot1q or Q-in-Q
encapsulation enabling support for Ethernet APS protected services on the service edge toward the
customer site, or within the Ethernet backbone. E-Line, E-LAN, and E-Tree services can be afforded
Ethernet APS protection and, although the Ethernet Tunnel providing the protection has a working/
protecting path that is presented to the service as a single logical entity to the service layer. The intention
of this is to cause minimum disruption to the service during Ethernet APS failure detection and recovery.
In the implementation, the Ethernet tunnel is a logical interface for a SAP defined Layer 2 service similar to
a LAG. The implementation offers ITU G.8031 1:1 compliance as well as some added capabilities such as
fate sharing and emulated LAG support.
• Synchronization between services such that both send and receive on the same Ethernet path in stable
state.
• Revertive/non-revertive choices.
• Emulated-LAG coexistence.
It is important that the configuration for the various services does not change when a new Ethernet
tunneling type is introduced on the backbone side. This is achieved by using a SAP to map the eth-tunnel
object into service instance.
The member port and control tag defined under each eth-tunnel path are then used for encapsulating and
forwarding the CCMs and the G.8031 PDUs used for protection function, the latter frames being sent only
on the secondary path. The configuration of the active path is also used to instantiate the SAP object in the
forwarding plane.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
If a failure of a link or node affects the primary eth-tunnel path, the services fail to receive the CC
messages exchanged on that path or receive a fault indication from the link layer OAM module.
For fault detection using CCMs, a number of 3.5 CC intervals plus a configurable hold-off timer must be
missed for a fault to be declared on the associated path. The latter mechanism is required to accommodate
the existence of additional 50 ms resiliency mechanism in the optical layer. After it received the fault
indication, the protection module declares the associated path down, then sends an indication to the
remote protection module to switch the transmit direction to the backup path.
To address unidirectional failures, the RDI bit is set in CC messages transmitted in the reverse direction
upon detection of failure at the receiving service. The same applies for link layer OAM. Until the protection
switch indication arrives from the remote node, the local node continues to receive frames from both
primary and backup paths to avoid the loss of in-flight packets.
In case of direct connectivity between the nodes, there is no need to use Ethernet CCM messaging for
liveliness detection. Link level detection mechanisms like LoS (Loss of Signal) or IEEE 802.3ah link layer
OAM can be used to detect link or nodal failure. This can be achieved by not provisioning a MEP on the
primary path.
Using the Ethernet Tunnel as a building block for Ethernet APS protection it is possible to provide different
protection schemes with different fate-dependency; or indeed to mix protected and non-protected services
on the same physical port.
The simplest model is the fate-independent model where each Ethernet Tunnel supports its own protection
using Y.1731 CCMs for example. In this case a single VLAN Tag may be used for control and data traffic.
In cases where Ethernet Tunnels can be guaranteed to share a common physical path, it is possible to
implement a fate-sharing model. This approach provides the advantage of reducing the amount of Ethernet
OAM signaling because only one control tag determines the fate of many user tags.
Epipe using BGP-MH site support for Ethernet tunnels (see the7450 ESS, 7750 SR, 7950 XRS, and
VSR Layer 2 Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information) offers an
enhancement to Ethernet tunnels enabling an Ethernet edge device using G.8031 to support multi-chassis
redundancy for Epipe services. The G.8031 device configuration is standard on the Ethernet edge device,
but the active link is controlled by BGP-multihoming just as with VPLS services. This Epipe feature offers a
standards-based alternative for multihomed access.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
One of the advantages of access redundancy using Ethernet APS is that because it operates at the VLAN
level protection mechanisms can be varied between services supported on the physical port. For example,
it is possible to provide a protected service for ‟Premium” customers and also provide non-protected
services for ‟Standard” users on the same physical port.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
for the same bandwidth resources with the Ethernet CCMs. As CCM loss could lead to unnecessary
bouncing of the Ethernet tunnel, congestion of the queues associated with the NC traffic should be
avoided. The operator must configure different QoS Policies to avoid congestion for the CCM forwarding
class by controlling the amount of traffic assigned into the corresponding queue.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
When a ring failure occurs, a node or nodes detecting the failure (enabled by Y.1731 OAM CC monitoring)
send R-APS message in both directions. This allows the nodes at both ends of the failed link to block
forwarding to the failed link preventing it from becoming active. In revertive mode, the RPL Owner
then unblocks the previously blocked RPL and triggers FDB flush for all nodes for the affected service
instances. The ring is now in protecting state and full ring connectivity is restored. MAC learning takes
place to allow Layer 2 packet forwarding on a ring. Figure 23: 0-1 G.8032 ring in the protecting state
depicts the failed link scenario.
When the failed link recovers, the nodes that blocked the link again send the R-APS messages indicating
no failure this time. This in turn triggers RPL owner to block the RPL link and indicate the blocked RPL
link the ring in R-APS message, which when received by the nodes at the recovered link cause them to
unblock that link and restore connectivity (again all nodes in the ring perform FDB flush and MAC learning
takes place). The ring is back in the normal (or idle) state.
Within each path, Y.1731 Maintenance Entity Group (MEG) Endpoints (MEPs) are used to exchange
R-APS specific information (specifically to co-ordinate switchovers) as well as optionally fast Continuity
Check Messages (CCM) providing an inherent fault detection mechanism as part of the protocol. Failure
detection of a ring path by one of the mechanisms triggers to activate the protection links. Upon failure,
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
reconvergence times are a dependent on the failure detection mechanisms. In the case of Y.1731, the
CCM transmit interval determines the response time. The router supports message timers as low as
10 milliseconds (also 100 ms) so the restoration times are comparable to SONET/SDH. Alternatively,
802.3ah (Ethernet in the First Mile) or simple Loss of Signal can act as a trigger for a protection switch
where appropriate. In case of direct connectivity between the nodes, there is no need to use Ethernet CC
messaging for liveliness detection.
Revertive and non-revertive behaviors are supported. The Ring protection link (RPL) is configured and
Ethernet-rings can be configured to revert to the RPL upon recovery.
G.8032 supports multiple data channels (VIDs) or instances per ring control instance (R-APS tag). G.8032
also supports multiple control instances such that each instance can support RPLs on different links
providing for a load balancing capability. However, after services have been assigned to one instance the
rest of the services that need to be interconnected to those services must be on the same instance. In
other words each data instance is a separate data VLAN on the same physical topology. When there is any
one link failure or any one node failure in the ring, G.8032 protocols are capable of restoring traffic between
all remaining nodes in these data instances.
Ethernet R-APS can be configured on any port configured for access mode using dot1q, q-in-q
encapsulation enabling support for Ethernet R-APS protected services on the service edge toward the
customer site, or within the Ethernet backbone. ELINE services (using PBB Epipes with the B-VPLS
configured with Ethernet rings), E-LAN services, and E-Tree data services can be afforded Ethernet R-APS
protection and, although the Ethernet ring providing the protection uses a ring for protection the services
are configured independent of the Ring properties. The intention of this is to cause minimum disruption to
the service during Ethernet R-APS failure detection and recovery.
In the implementation, the Ethernet Ring is built from a VPLS service on each node with VPLS SAPs that
provides Ring path with SAPs. As a result, most of the VPLS SAP features are available on Ethernet rings
if needed. This results in a fairly feature rich ring service.
The control tag defined under each Ethernet-ring is used for encapsulating and forwarding the CCMs
and the G.8032 messages used for the protection function. If a failure of a link or node affects an active
Ethernet ring segment, the services fail to receive the CCMs exchanged on that segment or receive a fault
indication from the Link Layer OAM module. CCMs are optional but MEPs are always configured to provide
G.8032 control. Note that the forwarding of CCMs and G.8032 R-APS messages continues in the control
VPLS even if the service or its SAPs are administratively shut down. The Ethernet ring instance can be
shut down if it is needed to stop the operation of the ring on a node.
For fault detection using CCMs three CC messages plus a configurable hold-off timer must be missed
for a fault to be declared on the associated path. The latter mechanism is required to accommodate the
existence of additional, 50 ms resiliency mechanism in the optical layer. After it receives the fault indication,
the protection module declares the associated ring link down and the G.8032 state machine sends the
appropriate messages to open the RPL and flush the learned addresses.
Flushing is triggered by the G.8032 state machine and the router implementation allows flooding of traffic
during the flushing interval to expedite traffic recovery.
Figure 24: 0-3 ring example illustrates a resilient Ring Service. In the example a PBB ring (solid line)
using VID 500 carries 2 service VLANs on I-SID 1000 and 1001 for Service VIDs (Dot1q 100 and QinQ
400.1 respectively.) The RPL for the PBB ring is between A and B where B is the RPL owner. Also
illustrated is a QinQ service on the (dotted line) ring that uses Dot1q VID 600 for the ring to connect service
VLAN 100.50. The two rings have RPLs on different nodes which allow a form of load balancing. The
example serves to illustrate that service encapsulations and ring encapsulation can be mixed in various
combinations. Also note that neither of the rings is closed loop. A ring can restore connectivity when any
one node or link fails to all remaining nodes within the 50 ms transfer time (signaling time after detection).
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Example configuration:
configure eth-ring 1
description "Ring PBB BLUE on Node B"
revert-time 100
guard-time 5
ccm-hold-time down 100 up 200
rpl-node owner
path a 6/6/1 raps-tag 100 // CC Tag 100
description "To A ring link"
rpl-end
eth-cfm
mep 1 domain 1 association 1 direction down
// Control MEP
no shutdown
exit
exit
no shutdown // would allow protect switching
// in absence of the "force" cmd
exit
path b 6/6/2 raps-tag 100 //Tag 100
description "to D Ring Link"
eth-cfm
mep 1 domain 1 association 1 direction down
no shutdown
exit
exit
no shutdown
no shutdown
exit
service
vpls 10 customer 1 create // Ring APS SAPs
description "Ring Control VID 100"
sap 6/6/1:100 eth-ring 1 create
// TAG for the Control Path a
exit
sap 6/6/2:100 eth-ring 1 create
// TAG for the Control Path b
exit
no shutdown
exit
service
vpls 40 customer 1 b-vpls create //Data Channel on Ring
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Sub-Rings and Major Rings run similar state machines for the ring logic, however there are some
differences. When Sub-Rings protect a link, the flush messages are propagated to the major ring. (A
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
special configuration allows control of this option on the router.) When major rings change topology, the
flush is propagated around the major ring and does not continue to any sub-rings. The reason for this is
that Major Rings are completely connected but Sub-Rings are dependent on another ring or network for full
connectivity. The topology changes need to be propagated to the other ring or network usually. Sub-Rings
offer the same capabilities as major rings in terms of control and data so that all link resource may be used.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Sub-ring configuration is similar to major ring configuration and consists of three parts: Ethernet-ring
instance configuration, control VPLS configuration, and data VPLS configuration (data instance or data
channel). The Ethernet-ring configuration of a sub-ring is tied to a major ring and only one path is allowed.
Note:
A split horizon group is mandatory to ensure that Sub-Ring control messages from the major ring
are only passed to the sub-ring control.
As with a major ring, the forwarding of CCMs and G.8032 R-APS messages continues in the control VPLS
even if the service or its SAPs are administratively shut down. The Ethernet ring instance can be shut
down if it is needed to stop the operation of the ring on a node.
The data VPLS can be configured on the major ring, and in the example, shares the same VID (SAP
encapsulation) on both the major ring and the sub-ring to keep data on the same VLAN ID everywhere.
Note:
Like other services in the router, the encapsulation VID is controlled by SAP configuration and the
association to the controlling ring is by the Ethernet-ring, ring-id.
eth-ring 2
description "Ethernet Sub Ring on Ring 1"
sub-ring virtual-link // Using a virtual link
interconnect ring-id 1 // Link to Major Ring 1
propagate-topology-change
exit
exit
path a 1/1/3 raps-tag 100 // Ring control uses VID 100
eth-cfm
mep 9 domain 1 association 4
ccm-enable
control-mep
no shutdown
exit
exit
no shutdown
exit
no shutdown
exit
If the sub-ring had been configured as a non-virtual-link, the sub-ring configuration above and on all the
other sub-ring nodes for this sub-ring would become:
# Control Channel for the Major Ring ERP1 illustrates that Major ring
# control is still separate from Sub-ring control
vpls 10 customer 1 create
description "Control VID 10 for Ring 1 Major Ring"
stp shutdown
sap 1/1/1:10 eth-ring 1 create
stp shutdown
exit
sap 1/1/4:10 eth-ring 1 create
stp shutdown
exit
no shutdown
exit
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
If the sub-ring had been configured as a non-virtual-link, the configuration above would then become:
The 7450 ESS, 7750 SR, and 7950 XRS allow for a special configuration of the non-virtual link sub-ring
that can be homed to a VPLS service illustrated in Figure 27: 0-6 sub-ring homed to VPLS. This is an
economical way to have a redundant ring connection to a VPLS service. This is currently supported only
for dot1Q and QinQ sub-rings and only on LDP based VPLS. The primary application for this is access
rings that require resiliency. This configuration shows the configuration for a sub-ring at an interconnection
node without a virtual channel and interconnected to a VPLS. A VPLS service 1 is used to terminate the
ring control. The Ethernet ring data SAP appears in the associated LDP based VPLS service 5.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
eth-ring 1
description "Ethernet Ring 1"
guard-time 20
no revert-time
rpl-node nbr
sub-ring non-virtual-link
interconnect vpls // VPLS is interconnection type
propagate-topology-change
exit
exit
path a 1/1/3 raps-tag 1.1
description "Ethernet Ring : 1 Path on LAG"
eth-cfm
mep 8 domain 1 association 8
ccm-enable
control-mep
no shutdown
exit
exit
no shutdown
exit
no shutdown
exit
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
# Configuration for the ring data into the LDP based VPLS Service
no shutdown
exit
Ethernet-rings and sub-rings offer a way to build a scalable resilient Ethernet transport network. Figure 28:
0-7 multi ring hierarchy illustrates a hierarchical ring network using PBB where dual homed services are
connected to a PBB based Ethernet ring network.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The major rings are connected by sub-rings to the top level major ring. These sub-rings require virtual
channel and do not work with non-virtual channel. Ring flushing is contained to major rings, or in the case
of a sub-ring link or node failure, to the sub-ring and the directly attached major rings.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
2.9 ECMP and weighted ECMP for services using RSVP and SR-TE LSPs
ECMP over MPLS LSPs refers to spraying packets across multiple named RSVP and SR-TE LSPs within
the same ECMP set. The ECMP-like spraying consists of hashing the relevant fields in the header of a
labeled packet and selecting the next-hop tunnel based on the modulo operation of the output of the hash
and the number of ECMP tunnels. Only LSPs with the same lowest LSP metric can be part of the ECMP
set.
In weighted ECMP, the load-balancing weight of the LSP is normalized by the system and then used
to bias the amount of traffic forwarded over each LSP. The weight of the LSP is configured using the
config>router>mpls>lsp>load-balancing-weight weight and config>router>mpls>lsp-template>load-
balancing-weight weight commands.
If one or more LSPs in the ECMP set do not have load-balancing-weight configured, and the ECMP is set
to a specific next hop, regular ECMP spraying is used.
Weighted ECMP is supported for VPRN Layer 3 services. See the 7450 ESS, 7750 SR, 7950 XRS, and
VSR Layer 3 Services Guide: IES and VPRN for more information.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Weighted ECMP is supported for the following Layer 2 services over RSVP-TE (including LDP over RSVP)
and SR-TE tunnels:
• Epipe VLLs
• Ipipe VLLs
• LDP VPLS
• BGP-AD VPLS with provisioned SDPs
Class Based Forwarding (CBF) and weighted ECMP are mutually exclusive for VLL and VPLS services.
For services that use an explicitly configured SDP, weighted ECMP is configured under the SDP used
by the service with the config>service>sdp>weighted-ecmp command. By default, weighted ECMP is
disabled.
For VLL and VPLS services, when a service uses a provisioned SDP on which weighted ECMP is
configured, a path is selected based on the configured hash. Paths are then load-balanced across LSPs
within an SDP according to the normalized LSP weights. Additional fields may be taken into account for
VPLS services based on the commands in the config>service>load-balancing context.
2.10 NGE
This section provides information to configure network group encryption (NGE) on the VSR.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Note:
See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Router Configuration Guide for information
about configuring NGE on router interfaces. See the 7450 ESS, 7750 SR, and VSR Triple Play
Service Delivery Architecture Guide for information about configuring group encryption on the
WLAN-GW group interface.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• 7750 SR-12e
• 7750 SR-1e
• 7750 SR-2e
• 7750 SR-3e
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Another application of key group partitioning allows different parts of an organization to have their
own method of end-to-end communication without the need to share encryption keys between each
organization. If two partitions need to communicate between themselves, gateway nodes configured with
both key groups allow inter-organization traffic flows between the key group partitions as needed.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The NSP NFM-P acts as the key manager for NGE-enabled nodes and allocates the keys in key groups
that are used to perform encryption and authentication. The NSP NFM-P ensures that all nodes in a key
group are kept in synchronization and that only the key groups that are relevant to the associated nodes
are downloaded with key information.
The NSP NFM-P performs network-wide hitless rekeying for each key group at the rekeying interval
specified by the operator. Different key groups can be rekeyed at different times if needed, or all key
groups can be rekeyed network-wide at the same time.
For more information about NSP NFM-P management, see the ‟Service Management” section in the
NSP NFM‑P User Guide.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Note:
Keys are entered in clear text using the security-association command. After configuration,
they are never displayed in their original, clear text form. Keys are displayed in an encrypted
form, which is indicated by the system-appended crypto keyword when an info command is
run. The NGE node also includes the crypto keyword with an admin>save operation so that the
NGE node can decrypt the keys when reloading a configuration database. For security reasons,
keys encrypted on one node are not usable on other nodes (that is, keys are not exchangeable
between nodes).
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Figure 33: NGE and packet formats illustrates VPRN and PW (with control word) packet formats using
NGE.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The outbound key group identifies which key group to use for traffic that egresses the node for the service.
The inbound key group ensures that ingress traffic is using the correct key group for the service.
If the inbound key group is not set, the node ensures that packets are either unencrypted or are using one
of the valid key groups configured in the system.
In most deployment scenarios, the inbound and outbound key groups are identical; however, it is possible
to configure different key groups as the outbound and the inbound key groups, as this is not checked by
the node.
Including an inbound and outbound direction when assigning key groups to services allows users to:
• gracefully enable and disable NGE for services
• move services from one key group domain to another domain without halting encryption
The NGE feature makes use of the NSP NFM-P to help manage the assignment of key groups to services
on a network-wide basis. See the NSP NFM‑P User Guide for more information.
2.10.3.3 VPRN Layer 3 spoke SDP encryption and MP-BGP-based VPRN encryption
interaction
The encryption configured on an SDP used to terminate the Layer 3 spoke SDP of a VPRN always
overrides any VPRN-level configuration for encryption.
• When VPRN encryption is enabled, all routes resolved using MP-BGP (either with spoke SDPs using
spoke-sdp or auto-bind SDPs using auto-bind-tunnel) are encrypted or decrypted using the VPRN
key group.
• When Layer 3 spoke SDP encryption is enabled, all routes resolved using the Layer 3 interface are
encrypted or decrypted using the SDP's key group.
Some examples are as follows.
• If a VPRN is enabled for encryption while a Layer 3 spoke SDP for the same VPRN is using an SDP
that is not enabled for encryption, then traffic egressing the spoke SDP is not encrypted.
• If a VPRN is disabled for encryption while a Layer 3 spoke SDP for the same VPRN is using an SDP
that is enabled for encryption, then traffic egressing the spoke SDP is encrypted.
• If a VPRN is enabled for encryption using key group X, while a Layer 3 spoke SDP for the same VPRN
is using key group Y, then traffic egressing the spoke SDP is encrypted using key group Y.
The commands used for these scenarios are config>service>sdp>encryption-keygroup and
config>service>vprn>encryption-keygroup.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
destined for the WLAN-GW, the application uses Epipe pseudowire services, as described in Pseudowire
switching for NGE traffic and Pseudowire control word for NGE traffic, with L2oMPLSoGRE transport and
NGE applied to the GRE-SDP.
Figure 35: Terminating NGE-protected WLAN AP traffic destined for the WLAN-GW
In Figure 35: Terminating NGE-protected WLAN AP traffic destined for the WLAN-GW, the same key
group, KG1, is configured on:
• the WLAN-GW gw-address under the IES or VPRN soft-GRE group interface for the vMS-ISA
• the GRE SDPs that are bound to any WLAN AP Epipes that are terminating soft-GRE services on the
WLAN-GW group interface
Traffic from an authenticated user on the SAR-Hm WLAN AP is encrypted and an NGE label is added
to the packet after the Epipe service label. The packet format is shown in Figure 35: Terminating NGE-
protected WLAN AP traffic destined for the WLAN-GW.
The WLAN-GW group interface is configured with the same inbound and outbound key group as the
GRE-SDP used for the Epipe from the WLAN AP. Any L2oMPLSoGRE packet received by the WLAN-
GW on the NGE-enabled group interface must be encrypted with NGE per the above format. All other
supported WLAN-GW packet types (that is, those not using L2oMPLSoGRE) are not impacted by the NGE
configuration and can pass through the WLAN-GW without NGE (such as L2oGRE packets).
Note:
It is the responsibility of the network operator to ensure key group consistency across the (ABR).
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Encryption label 4
ESP 24
ICV 32
Padding 17
Total 81
For MP-BGP-based VPRNs, the total is 77 bytes because the control word copy is not required.
ESP 24
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
ICV 32
Padding 17
Total 73
For Layer 3 packets for router interface encryption, the total is 73 bytes because the encryption label and
control word copy are not required.
The overhead values in Table 8: NGE overhead for MPLS must be considered for services that are
supported by NGE.
Note:
Currently, the port MTU has a default value of 1572 bytes. This value is too low for outbound
traffic when NGE is enabled. Users must configure new MTU values to adjust for the overhead
associated with NGE, as described in Table 10: Accounting for NGE overhead SDP and
service MTU — calculation examples for MPLS-based and GRE-based services. For details on
configuring MTU, see the ‟MTU Configuration Guidelines” section in the 7450 ESS, 7750 SR,
7950 XRS, and VSR Interface Configuration Guide.
The calculations in Table 10: Accounting for NGE overhead SDP and service MTU — calculation examples
show how NGE overhead affects SDP MTU and service MTU values for MPLS-based, GRE-based, and
VPRN-based services. The calculations are with and without NGE enabled.
Table 10: Accounting for NGE overhead SDP and service MTU — calculation examples
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
VPRN-based Each interface inherits its MTU from the SAP or spoke SDP to which it is bound and the
services MTU value can be manually changed using the ip-mtu command.
When an unencrypted Layer 3 packet ingresses the node and routing determines that the egress interface
is a router interface NGE-enabled interface, the node calculates whether the packet size is greater than
the MTU of the egress interface after the router interface NGE overhead is added. If the packet cannot be
forwarded out from the network interface, an ICMP message is sent back to the sender and the packet is
dropped. Users must configure new MTU values to adjust for the overhead associated with NGE.
If an IP exception ACL that matches the ingressing packet exists on the egress interface, the MTU check
applied to the ingress packet includes the router interface NGE overhead. This is because the ingress
interface cannot determine which IP exceptions are configured on the egress interface, and therefore the
worst-case MTU check that includes the router interface NGE overhead is performed.
2.10.5 Statistics
Statistics specific to NGE are counted for the following main areas:
• key group
• SPI
• MDA
• service
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
2.10.7.3 Changing NGE from one key group to another key group for an SDP or VPRN
service
About this task
To change NGE from one key group to another key group for an SDP or VPRN service:
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Procedure
Step 1. Remove the inbound direction key group from each node for the service.
Step 2. Change the outbound direction key group on each node for the service.
Step 3. Install the new inbound direction key group on each node for the service.
2.10.7.4 Changing NGE from one key group to another key group for a router interface:
About this task
To change NGE from one key group to another key group for a router interface:
Procedure
Step 1. Remove the inbound key group.
Step 2. Configure the new outbound key group.
Step 3. Configure the new inbound key group.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• Build templates for QoS, filter or accounting policies needed to support the core services.
2.13.1 General
Service provisioning tasks are typically performed before provisioning a subscriber service and can be
logically separated into two main functional areas: core tasks and subscriber tasks.
Core tasks include the following:
• Create customer accounts
• Create template QoS, filter, scheduler, and accounting policies
• Create SDPs
Subscriber services tasks include the following:
• Create Apipe, Cpipe, Epipe, Fpipe, IES, Ipipe, VPLS or VPRN services on the 7750 SR.
• Create Epipe, IES, Ipipe, VPLS or VPRN services on the 7450 ESS or 7950 XRS.
• Bind SDPs
• Configure interfaces (where required) and SAPs
• Create exclusive QoS and filter policies
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
• Services:
– ATM VLL (Apipe) services — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services
and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– Circuit Emulation services (Cpipe) — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2
Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– Ethernet Pipe (Epipe) services — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2
Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– Frame Relay VLL (Fpipe) services — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2
Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– IP Interworking VLL (Ipipe) services — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2
Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– Virtual Private LAN Service (VPLS) — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2
Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– Internet Enhanced Service (IES) — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3
Services Guide: IES and VPRN for more information
– Virtual Private Routed Network (VPRN) service — See the 7450 ESS, 7750 SR, 7950 XRS, and
VSR Layer 3 Services Guide: IES and VPRN for more information
• Service Access Points (SAPs)
– Ethernet Pipe (Epipe) Services — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2
Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– ATM VLL (Apipe) SAP — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and
EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– Frame Relay VLL (Fpipe) SAP — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2
Services and EVPN Guide: VLL, VPLS, PBB, and EVPN for more information
– VPLS SAP — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN
Guide: VLL, VPLS, PBB, and EVPN for more information
– IES SAP — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and
VPRN for more information
– VPRN Interface SAP — See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide:
IES and VPRN for more information
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The following example provides an Epipe service configuration displaying the SDP and Epipe service
entities. SDP ID 2 was created with the far-end node 10.10.10.104. Epipe ID 6000 was created for
customer ID 6 which uses the SDP ID 2.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A:ALA-12>config>service# info
-------------------------------------------
...
customer 5 create
description "Nokia Customer"
contact "Technical Support"
phone "650 555-5100"
exit
...
-------------------------------------------
A:A:ALA-12>config>service#
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A:ALA-12>config>service# info
-------------------------------------------
..
customer 5 create
multi-service-site "EastCoast" create
assignment card 4
ingress
scheduler-policy "alpha1"
exit
exit
multi-service-site "WestCoast" create
assignment card 3
egress
scheduler-policy "SLA1"
exit
exit
description "Nokia Customer"
contact "Technical Support"
phone "650 555-5100"
exit
...
-------------------------------------------
A:ALA-12>config>service#
A:ALA-12>config>service# info
-------------------------------------------
..
customer 5 create
multi-service-site "EastCoast" create
assignment card 4
ingress
scheduler-policy "alpha1"
exit
exit
multi-service-site "WestCoast" create
assignment card 3
egress
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
scheduler-policy "SLA1"
exit
exit
description "Nokia Customer"
contact "Technical Support"
phone "650 555-5100"
exit
...
-------------------------------------------
A:ALA-12>config>service#
Note:
If signaling is disabled for an SDP, then services using that SDP must configure ingress and
egress vc-labels manually.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Note:
When specifying the far-end IP address, a tunnel is created. The path from Point A to Point B
is created. When configuring a distributed service, an SDP ID must be specified. Use the show
service sdp command to display the qualifying SDPs.
When specifying MPLS SDP parameters, specify an LSP or enable LDP. There cannot be two methods of
transport in a single SDP except if the mixed-lsp command is specified. If an LSP name is specified, then
RSVP is used for dynamic signaling within the LSP.
LSPs are configured in the config>router>mpls context. See the 7450 ESS, 7750 SR, 7950 XRS, and
VSR MPLS Guide MPLS Configuration Guide for configuration and command information.
Use the following CLI syntax to create a GRE SDP or an MPLS SDP:
The following displays an example of a GRE SDP, an LSP-signaled MPLS SDP, and an LDP-signaled
MPLS SDP configuration.
A:ALA-12>config>service# info
-------------------------------------------
...
sdp 2 create
description "GRE-10.10.10.104"
far-end 10.10.10.104
keep-alive
shutdown
exit
no shutdown
exit
sdp 8 mpls create
description "MPLS-10.10.10.104"
far-end 10.10.10.104
lsp "to-104"
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
keep-alive
shutdown
exit
no shutdown
exit
sdp 104 mpls create
description "MPLS-10.10.10.94"
far-end 10.10.10.94
ldp
keep-alive
shutdown
exit
no shutdown
exit
...
-----------------------------------------
A:ALA-12>config>service#
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Note:
LDP uses a tunnel down damp timer which is set to three seconds by default. When the LDP
LSP fails, the SDP reverts to the RSVP LSP type after the expiry of this timer. For an immediate
switchover this timer must be set to zero; use the config>router>ldp>tunnel-down-damp-time
command.
If the value of the sdp-revert-time timer is changed, it takes effect only at the next use of the timer. Any
timer which is outstanding at the time of the change is restarted with the new value.
If class based forwarding is enabled for this SDP, the forwarding of the packets over the RSVP LSPs is
based on the FC of the packet as in current implementation. When the SDP activates the LDP LSP type,
then packets are forwarded over the LDP ECMP paths using the regular hash routine.
In the case of the LDP/BGP SDP, the service manager prefers the LDP LSP type over the BGP LSP type.
The service manager re-programs the linecard with the BGP LSP if available otherwise it brings down the
SDP operationally.
Also note the following difference in behavior of the LDP/BGP SDP compared to that of an RSVP/LDP
SDP. For a specific /32 prefix, only a single route exists in the routing table: the IGP route or the BGP
route. Therefore, either the LDP FEC or the BGP label route is active at any time. The impact of this is that
the tunnel table needs to be re-programmed each time a route is deactivated and the other is activated.
Furthermore, the SDP revert-time cannot be used because there is no situation where both LSP types are
active for the same /32 prefix.
1. RSVP LSP type. Up to 16 RSVP LSPs can be entered by the user and programmed by the service
manager in ingress line card to load balance service packets. This is the highest priority LSP type.
2. LDP LSP type. One LDP FEC programmed by service manager but ingress line card can use up to 16
LDP ECMP paths for the FEC to load balance service packets when ECMP is enabled on the node.
3. BGP LSP type. One RFC 3107-labeled BGP prefix programmed by the service manager. The ingress
line card can use more than one next-hop for the prefix.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Table 11: ETH-CFM acronym expansions lists and expands the acronyms used in this section.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Note:
Do not exceed the platform-specific scaling limits. A single facility fault may trigger the generation
of many service level faults, ensure that the specific ETH-CFM processing power of the network
element and any configured rate controlling features for the service are not exceeded. Exceeding
the network element scaling properties may lead to OAM packet loss during processing and
result in undesirable behavior.
The implementation of facility MEPs must adhere to all platform-specific specifications. For example,
sub-second enabled CCM MEPs are supported on port based MEPs. However, any platform restrictions
preventing the sub-second enabled MEPs override this capability and require the operator to configure
CCM intervals that are supported for that specific platform.
Facility MEPs are created in the same manner as service MEPs, both related to the ETH-CFM domain and
association. However, the association used to build the facility MEP does not include a bridge-identifier.
The CLI ensures that a bridge ID is not configured when the association is applied to a facility MEP.
Service MEPs and Facility MEPs may communicate with each other, as long as all the matching criteria are
met. Because facility MEPs use the standard ETH-CFM packets, there is nothing contained in the packet
that would identify an ETH-CFM packet as a facility MEP or Service MEP.
Facility MEPs are not supported on ports that are configured with Eth-Tunnels (G.8031) and only facility
MEPs of 1 second and above are supported on the ports that are involved in an Eth-Ring (G.8032).
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A facility MEP may trigger two distinct actions as a result of fault. Epipe services generate AIS that have
been configured to do so as a result of a failure. The level of the AIS is derived from the facility MEP.
Multiple client-meg-levels can be configured under the facility MEP to allow for operational efficiency
in the event a change is required. However, only the lowest AIS level is generated for all the linked and
applicable services. VPLS, IES and VPRN SAPs transition the SAP state that are configured to react to the
facility MEP state. In addition, Epipe services may also take advantages of OAM and mapping functions.
Before implementing facility MEPs, it is important to understand the behavior of AIS and Fault propagation.
Nokia advises considers the following recommendations listed below before enabling or altering the
configuration of any facility MEP. These steps must be tested on each individual network before building a
maintenance operational procedure (MOP).
• Do not configure AIS on the facility MEP until the ETH-CCM has been verified. For instance, when
a local MEP is configured with AIS before the completion of the remote MEP, the AIS is immediately
generated when the MEP enters a fault state for all services linked to that facility MEP.
• Disable the client-meg-level configuration parameter when changes are being made to existing
functional facility MEPs for AIS. Doing this stops the transmit function but maintains the ability to receive
and understand AIS conditions from the network.
• Set the low-priority-defect parameter to noXconn to prevent the MEP from entering a defect state,
triggering SAP transitions and OAM mapping reactions.
It is important to consider and select what types of fault conditions causes the MEP to enter a faulty state
when using fault propagation functions.
The ccm-hold-timers supported on port-based MEPs configured with a sub-second interval. The ccm-
hold-timers prevents the MEP from entering a failed state for 3.5 times the CCM interval plus the
additional hold timer.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Note:
Facility MEPs do not support the generation of AIS to an explicitly configured endpoint. An
explicitly configured endpoint abstracts multiple endpoints within its context; for example,
pseudowire (PW) redundancy. Although the linkage of a facility MEP to an Epipe, and AIS
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
generation triggered as a result of the facility MEP failure can be configured, AIS generation
is not supported and is unpredictable. When an explicit endpoint is configured, service-based
MEPs are required when AIS generation is the needed behavior.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
There are two types of port in the context of port-based facility MEPs. The first type are ports that are not
part of a LAG, referred to as non-member ports. The second type of ports are ports that are part of a LAG,
referred to member ports, and have slightly different reactions to fault. MEPs configured directly on either
type of port act the same. However, a MEP configured on a non-member port and a MEP configured on a
member port handle fault propagation differently.
When a port-based facility MEP causes the port to enter the operational state Link Up, normal processing
occurs for all higher level functions. If the port is a member port, unless the entire LAG enters a non-
operational state, the SAP configured on the LAG remains operational. A facility MEP on a member port
has no direct influence on the SAP. The purpose of a facility MEP on a member port is to provide feedback
to the LAG. The LAG performs the normal computations in response to a port down condition. A facility
MEP configured on a non-member port does have direct control over the SAPs configured on the port.
Therefore, when a port fails, all the SAPs transitions to the operation state down. When this occurs, fault
may be propagated using AIS for those Epipe services that are AIS-enabled under the SAP. For the
services that have MEPs configured on the SAP or the binding, fault propagation occurs. For VPLS, IES
and VPRN services, normal reaction to a SAP entering a down state occurs.
When a LAG is administratively shutdown, the member ports are shutdown automatically. As a result,
packet reception is interrupted, causing ETH-CFM functions running on physical member ports to lose
connectivity. Therefore, the CFM functions on member ports are somewhat tied to the LAG admin status in
this case.
Note:
LAG convergence time is not affected by a facility MEP on a member port after the port has
entered the link up operational state. The ETH-CFM failure of a port-based MEP acts as the
trigger to transition the port.
Figure 37: Fault handling non-member port provides an example of how an ETH-CFM failure reacts with
the various services that share that port. The green Epipe service generates AIS as a result of the port
failure using the client-meg-level command configured on the port facility MEP. The multipoint service
takes location configured action when the SAP transitions to the down operational state. The blue Epipe
service is not affected by the port link up state as a result of ETH-CFM fault.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A debounce function has been implemented to prevent notifying every port state change if a port bounces
multiple times within a window. Up to four notifications are accepted in a three second window. If the third
port state is a down state change, the fourth is ignored. If the fourth port state change is a down state
change, it is processed. After that, no further state changes are accepted for the duration of the three
second timer. This helps ensure that the port is not artificially held in the UP state when it is not operation.
Following the processing of that last port state change, the third or fourth, the latest state change is held
and processed at the expiration of the three second hold timer.
Port based facility MEPs are not allowed on a port that is configured with G.8031 Ethernet Tunnels.
Figure 38: Port-Based MEP example displays an example of how port-based MEPs and defect conditions
translate into service awareness without service-based MEPs. From the two nodes perspective, they are
aware they are directly connected at the port. The two nodes are unaware of any of the cross connections
that allow this to occur.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Configure port-based MEPs with the facility-fault option and ais-enable client-meg-level command.
When the MEP enters any defect state, an AIS is generated to any Epipe service that has the ais-enable
configured under the sap>eth-cfm hierarchy.
NODE1
config>eth-cfm# info
----------------------------------------------
domain 10 format none level 0
association 1 format icc-based name "FacilityPort0"
ccm-interval 1
remote-mepid 2
exit
exit
----------------------------------------------
config>port# info
----------------------------------------------
ethernet
mode access
encap-type qinq
eth-cfm
mep 1 domain 10 association 1
ais-enable
client-meg-level 5
exit
facility-fault
ccm-enable
mac-address d0:0d:1e:00:00:01
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
ais-enable
exit
exit
sap 1/1/10:100.31 create
exit
no shutdown
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
----------------------------------------------
NODE2
config>eth-cfm# info
----------------------------------------------
domain 10 format none level 0
association 1 format icc-based name "FacilityPort0"
ccm-interval 1
remote-mepid 1
exit
exit
----------------------------------------------
config>port# info
----------------------------------------------
ethernet
mode access
encap-type qinq
eth-cfm
mep 2 domain 10 association 1
ais-enable
client-meg-level 5
exit
facility-fault
ccm-enable
mac-address d0:0d:1e:00:00:02
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
ais-enable
exit
exit
sap 1/1/10:100.31 create
exit
no shutdown
----------------------------------------------
There are two different levels of fault to consider: Port State/Operational State driven by the low-priority-
defect setting and the generation of AIS driven by the defect state for the MEP.
If the low-priority-defect is left at the default macRemErrXcon setting, then port state may not match on
both nodes. If an unidirectional failure is introduced for port-based MEPs, then RDI is received on one of
the nodes and the other node would report and react to RemoteCCM (timeout). The RDI defect is below
the default low-priority-defect in priority, and the port would remain operationally UP and the port state
would remain UP. The MEP that has timed out the peer MEP takes port level action because this defect is
higher in priority than the default low-priority-defect. The port state is recorded as Link Up and the Port is
operationally down with a Reason Down: ethCfmFault. To avoid this inconsistency, set the low-priority-
defect setting to detection unidirectional failures using the allDef option.
The following show commands reveal the condition mentioned above within the network. Node 1 is
receiving RDI and Node 2 has timed out its peer MEP.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
NODE1
#show port
===============================================================================
Ports on Slot 1
===============================================================================
Port Admin Link Port Cfg Oper LAG/ Port Port Port C/QS/S/XFP/
Id State State MTU MTU Bndl Mode Encp Type MDIMDX
-------------------------------------------------------------------------------
…snip..
1/1/2 Up Yes Up 1522 1522 - accs qinq xcme
…snip..
NODE2
# show port
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
===============================================================================
Ports on Slot 1
===============================================================================
Port Admin Link Port Cfg Oper LAG/ Port Port Port C/QS/S/XFP/
Id State State MTU MTU Bndl Mode Encp Type MDIMDX
-------------------------------------------------------------------------------
…snip..
1/1/2 Up Yes Link Up 1522 1522 - accs qinq xcme
…snip..
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
With the introduction of the LAG, the port no longer has direct control over the services SAPs. The ais-
enable command has been disabled from the port for this reason. The low-priority-defect condition has
been modified to react to all defect conditions ‟allDef”, avoiding the unidirectional issue demonstrated in
the previous port-based MEP example. A LAG MEP is built on top the LAG with the facility-fault option
and ais-enable command with the associated client-meg-level. This allows the Epipe services to generate
AIS when the LAG MEP enters any defect condition. This example introduce the use of a VPLS service.
VPLS, IES and VPRN services do not support the generation of AIS as a result of a facility MEP failure.
However, all service SAPs which correspond to the failed facility transition to a down state. Epipe service
also generates AIS in this example.
NODE1
config>eth-cfm# info
----------------------------------------------
domain 1 format none level 1
association 1 format icc-based name "FacilityLag01"
ccm-interval 1
remote-mepid 22
exit
exit
domain 10 format none level 0
association 1 format icc-based name "FacilityPort0"
ccm-interval 1
remote-mepid 2
exit
exit
----------------------------------------------
config>port# info
----------------------------------------------
ethernet
mode access
encap-type qinq
eth-cfm
mep 1 domain 10 association 1
facility-fault
ccm-enable
low-priority-defect allDef
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
mac-address d0:0d:1e:00:00:01
no shutdown
exit
exit
autonegotiate limited
exit
no shutdown
----------------------------------------------
config>lag# info
----------------------------------------------
mode access
encap-type qinq
eth-cfm
mep 11 domain 1 association 1
ais-enable
client-meg-level 5
exit
ccm-enable
facility-fault
low-priority-defect allDef
no shutdown
exit
exit
port 1/1/2
no shutdown
----------------------------------------------
config>service# info
----------------------------------------------
customer 1 create
description "Default customer"
exit
epipe 100 customer 1 create
sap 1/1/10:100.31 create
exit
sap lag-1:100.31 create
eth-cfm
ais-enable
exit
exit
no shutdown
exit
vpls 200 customer 1 create
stp
shutdown
exit
sap 1/1/10:200.20 create
exit
sap lag-1:200.20 create
exit
no shutdown
exit
----------------------------------------------
NODE2
config>eth-cfm# info
----------------------------------------------
domain 1 format none level 1
association 1 format icc-based name "FacilityLag01"
ccm-interval 1
remote-mepid 11
exit
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
exit
domain 10 format none level 0
association 1 format icc-based name "FacilityPort0"
ccm-interval 1
remote-mepid 1
exit
exit
----------------------------------------------
config>port# info
----------------------------------------------
ethernet
mode access
encap-type qinq
eth-cfm
mep 2 domain 10 association 1
facility-fault
ccm-enable
low-priority-defect allDef
mac-address d0:0d:1e:00:00:02
no shutdown
exit
exit
autonegotiate limited
exit
no shutdown
----------------------------------------------
config>lag# info
----------------------------------------------
mode access
encap-type qinq
eth-cfm
mep 22 domain 1 association 1
ais-enable
client-meg-level 5
exit
facility-fault
ccm-enable
low-priority-defect allDef
no shutdown
exit
exit
port 1/1/2
no shutdown
----------------------------------------------
config>service# info
----------------------------------------------
customer 1 create
description "Default customer"
exit
epipe 100 customer 1 create
sap 1/1/10:100.31 create
exit
sap lag-1:100.31 create
eth-cfm
ais-enable
exit
exit
no shutdown
exit
vpls 200 customer 1 create
stp
shutdown
exit
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A fault is introduced that only affects the LAG MEP. The port MEP continues to validate the port, meaning
that the port remains operationally up and the lag transitions to operation down. The LAG transition causes
all the SAPs tied to the LAG to transition to down. The VPLS service reacts normally with the configured
behavior as a result of a SAP down condition. The Epipe SAP also transitions to down, causing the
operational state of the Epipe service to transition to down. In this case, AIS is enabled under the SAP in
the service those AIS packets are still generated out the mate SAP.
Output from one of the nodes is included below. Because both react in the same manner, output from both
nodes is not shown.
NODE1
#show port
===============================================================================
Ports on Slot 1
===============================================================================
Port Admin Link Port Cfg Oper LAG/ Port Port Port C/QS/S/XFP/
Id State State MTU MTU Bndl Mode Encp Type MDIMDX
-------------------------------------------------------------------------------
…snip..
1/1/2 Up Yes Up 1522 1522 - accs qinq xcme
…snip..
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The tunnel-fault accept service level option is also available under Epipe, VPLS and IES services
hierarchy level within the CLI. This allows for a tunnel fault to share fate with these service SAPs. For the
non-Epipe services, the SAP enters an operationally down state, and normal processing occurs as a result
of the SAP transition. To generate any ETH-CC based fault propagation, suspend-cmm or use-int-stat-
tlv, this requires service-based MEPs that are actively running CCM with a peer.
The tunnel-fault configuration options occur in two levels of the CLI hierarchy: service level and SAP level.
Both of the levels within a service and within the SAP (whose underlying port and outer tag has a tunnel
MEP) must be set to accept, in order to have the function enabled. By default the tunnel-fault is set to
ignore at the service level and accept at the SAP level. This means that a single tunnel-fault accept at the
service level enables fault operations for all SAPs in the service. The operator is free to enable and disable
on specific SAPs by choosing the ignore option under the individual SAP. The combination of accept at the
service level and ignore at the SAP level prevents that specific SAP from recognizing fault. AIS generation
for Epipe services is not controlled by the tunnel-fault configuration options.
Specific to tunnel MEPs, reception of AIS on the tunnel MEP causes AIS to be cut through to all Epipe
services that have the ais-enabled command configured under the SAP. During a fault condition, it
is important that the AIS configuration under the tunnel MEP not be modified. This causes increased
network element CPU processing requirements and in scaled environments transitioning this command
during a heavily loaded fault condition, where highly scaled SAPs are linked to the fate of the tunnel
MEP, may cause the system to spend more than normal processing time to be spent dealing with this
artificially induced clear and fault situation. It is not expected that operators perform these types of tasks in
production networks. Reception of AIS does not trigger a fault condition or AIS to be cut through when sub
second CCM intervals have been configured on the Tunnel MEP.
Service-based MEPs may also be configured as normal for all services. They perform normal processing
tasks, including service-based MEP with fault propagation.
As with all other facility MEPs, use only ETH-CFM functions to cause the Tunnel MEP to enter the fault
state. Tunnel MEPs support sub second ccm-intervals on selected hardware. Tunnel MEPs must be
configured with a direction of down. UP MEPs are not supported as part of the facility MEP concept.
LAG-based MEPs and LAG-based tunnel MEPs cannot be configured on the same LAG. Port-based MEPs
may be configured on the LAG member ports of a tunnel MEP as long as they follow the requirements for
port-based MEPs on LAG member ports. All those consideration are applicable here, including nesting and
port-level control only without propagation.
Port-based MEPs and port-based tunnel MEPs cannot be configured on the same port.
LAG-based tunnel MEPs are supported in Multi-Chassis LAG (MC-LAG) configuration. However, sub
second CCM enabled intervals should not be configured when the LAG-based tunnel MEP uses the
transport of an MC-LAG. Only one second and above CCM intervals should be used. Not all platforms
support sub second CCM enable tunnel MEPs.
Tunnel MEPs are meant to propagate fault from one segment to the other for Epipe services. Figure 41:
Tunnel concepts and encapsulation shows how individual Epipes have SAPs connecting to a legacy
network. A MEP is configured at the tunnel level and peers with a single remote peer MEP.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
This is only one example of a tagged service. The principles of a tunnel MEP may be applied to other
service as applicable. Remember that tunnel MEPs are only supported on LAGs that are configured with
QinQ encapsulation and must have an outer VLAN.
Individual services can be monitored end-to-end by placing a MEP on the service endpoint at the CPE,
denoted by the MEP at level 5 on the individual EVC (customer levels 5-7). The Network Interface
Demarcation (NID) typically places a single tag, outer or only, on the customer traffic. This is cross
connected to the correct connection in the access network and eventually arrive on the Ethernet
Aggregation Switch. The connection between the legacy or access network and the aggregation switch
must be either a LAG bundle or MC-LAG in order for tunnel MEPs to be configured.
Because there can be a large number of services transported by a single tunnel, the MEP executing at the
tunnel-level reduces network overhead and simplifies the configuration.
Note:
All services in the tunnel must share a common physical path.
A SAP is needed in order for the Tunnel MEP to extract the tunnel MEP ETH-CFM packets at the
appropriate level. No SAP record is created by default. A service must already exist that includes a SAP
in the form lag-id:vid.* or lag-id:vid.0 where the vid matches the outer VLAN in which the tunnel is to
monitor. Because the ETH-CFM traffic arrives at the Ethernet aggregation node as a single outer tag
with no inner tag, the operator may want to consider the ability to configure the lag-id:vid.0 to accept
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
untagged only frames with the matching outer tag and no inner tag. The global command config>system-
>ethernet>new-qinq-untagged-sap is available to enable this functionality. By default both the vid.* and
vid.0 accepts all packets that match the outer vid and any inner vid. If no SAP record exists for this VLAN,
one must be created manually. Manually creating this SAP requires a service context. Nokia recommends
that an Epipe service be configured with this single SAP, preventing any flooding of packets. It is possible
to use a VPLS instance and combine many tunnel SAP records into a single service instance. However,
configuration errors may result in leakage because of the multipoint nature of a VPLS service. Regardless
of the service type chosen, it should be in a shutdown state. Also, normal ETH-CFM rules apply. ETH-CFM
packets arriving on the SAP passes all ETH-CFM packets at and below the tunnel MEP to the ETH-CFM
application for processing.
The goal of a Tunnel MEP is to validate an attachment circuit and relate the state to services that share
the same LAG and outer VLAN to other services across the network. Tunnel MEPs are not intended for
propagating fault between two endpoints that share the same LAG and outer VLAN. For this reason, locally
switched circuits that share the same LAG and the same outer tag must not use the ais-enable function
under those SAPs. As an example, lag-1 may have two SAPs associated with it: lag-1:1.1 and lag-1:1.2.
These two SAP represent two different endpoints on the same LAG using the same outer VLAN. In this
case, if the ais-enable is configured under both SAPs, AIS functionality does not work properly. Normal
fault propagation could be used in this case instead. Because the tunnel MEP is validating the common
physical path and these two MEPs share the common physical path, there is no reason to propagate fault.
Service-based MEPs could be configured on the endpoints to validate the connectivity between the two
endpoints when this type of model is deployed. However, two SAPs that are connected to different LAGs is
a supported configuration. An example of this would be lag-1:1.1 and lag-2:1.1.
Sub second Tunnel MEPs are monitored for every three seconds to ensure that they are not continuously
bouncing and consuming an unfair allocation of ETH-CFM resources. A sub second MEP is only allowed
three operational status changes in a three second window before holding the state for the remaining time
in that window. Messages are paced from Tunnel MEPs. Fault propagation depends on factors such as
how busy the node is, or how scaled the node configuration is.
Five percent of the operational/negotiated port speed not physical speed is available for Tunnel MEP
control traffic. When applying this to the LAG-based Tunnel MEPs the five percent is derived from the
lowest speed of a single member port in the bundle. If this bandwidth percentage required for ETH-CFM
is exceeded the ETH-CFM packets are not able to be sent and failures occur. As an example, a physical
port of 1Gb/s that has negotiated an operational speed of 100 Mb/s with a peer is allowed to send up to a
maximum of 5 Mb/s of Tunnel MEP control traffic.
Figure 42: Tunnel MEP example shows how fate can be shared between the Tunnel MEP and the services
configured on the same LAG and outer VLAN.
In this example, a single Tunnel, LAG-1 outer VLAN 100, carries three services. Epipe 101, Epipe 102 and
VPLS 201 are the service extraction points on the aggregation node. Epipe 100 is the extraction point for
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
the Tunnel MEP eth-cfm traffic. This is a single SAP Epipe that is operationally shutdown. One common
configuration error when using Tunnel MEPs is the lack extraction on the aggregation node, causing
unidirectional failures. The aggregation node is sending eth-cfm traffic to the NID, but is not extracting the
eth-cfm traffic that the NID is sending.
Epipe 101 is configured to accept the tunnel MEP fate and generate AIS.
Epipe 102 is configured to accept the tunnel MEP state and apply fault propagation rules. If the network-
side mate were an SDP binding, then the applicable setting of the LDP status bits are in the header.
Because this example uses an Ethernet SAP as the mate, and only tunnel fault-accept is configured with
no ais-enable, only the SAP flag is set to indicate an error.
VPLS 201 also shares the fate of the tunnel MEP. The tunnel-fault accept transitions the SAP to
operationally down. Any configured event that occurs because of a SAP down for the VPLS also occur.
Only the configuration for the aggregation node is shown below. The NID configuration is not required to
show how this function works.
Aggregation node
config>eth-cfm# info
----------------------------------------------
domain 2 format none level 2
association 1 format icc-based name "FacilityTun01"
ccm-interval 1
remote-mepid 101
exit
exit
----------------------------------------------
config>lag# info
----------------------------------------------
mode access
encap-type qinq
eth-cfm
mep 100 domain 2 association 1 vlan 100
description "Tunnel Facility MEP - Do NOT Delete"
ais-enable
client-meg-level 5
exit
facility-fault
ccm-enable
low-priority-defect allDef
no shutdown
exit
exit
port 1/1/2
no shutdown
----------------------------------------------
config>service# info
----------------------------------------------
customer 1 create
description "Default customer"
exit
epipe 100 customer 1 create
shutdown
description "Tunnel Extraction Service"
sap lag-1:100.0 create
exit
exit
epipe 101 customer 1 create
description "Customer Service 100.31"
sap 1/1/10:100.31 create
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
exit
sap lag-1:100.31 create
eth-cfm
ais-enable
exit
exit
no shutdown
exit
epipe 102 customer 1 create
description "Customer Service 100.32"
eth-cfm
tunnel-fault accept
exit
sap 1/1/10:100.32 create
exit
sap lag-1:100.32 create
exit
no shutdown
exit
vpls 201 customer 1 create
description "Customer Service 100.51"
stp
shutdown
exit
eth-cfm
tunnel-fault accept
exit
sap 1/1/10:100.51 create
exit
sap lag-1:100.51 create
exit
no shutdown
exit
----------------------------------------------
Redundancy:
MC-LAG State : n/a
CcmLastFailure Frame:
None
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
XconCcmFailure Frame:
None
===============================================================================
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Redundancy:
MC-LAG State : n/a
CcmLastFailure Frame:
None
XconCcmFailure Frame:
None
===============================================================================
-------------------------------------------------------------------------------
Service Access & Destination Points
-------------------------------------------------------------------------------
Identifier Type AdmMTU OprMTU Adm Opr
-------------------------------------------------------------------------------
sap:1/1/10:100.31 qinq 1522 1522 Up Up
sap:lag-1:100.31 qinq 1522 1522 Up Up
===============================================================================
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
-------------------------------------------------------------------------------
Service Access & Destination Points
-------------------------------------------------------------------------------
Identifier Type AdmMTU OprMTU Adm Opr
-------------------------------------------------------------------------------
sap:1/1/10:100.32 qinq 1522 1522 Up Up
sap:lag-1:100.32 qinq 1522 1522 Up Up
===============================================================================
-------------------------------------------------------------------------------
ETH-CFM SAP specifics
-------------------------------------------------------------------------------
Tunnel Faults : accept AIS : Disabled
MC Prop-Hold-Timer : n/a
===============================================================================
===============================================================================
Service Basic Information
===============================================================================
Service Id : 1 Vpn Id : 0
Service Type : VPLS
Name : 1
Description : (Not Specified)
Customer Id : 1 Creation Origin : manual
Last Status Change: 05/08/2018 09:40:32
Last Mgmt Change : 05/08/2018 09:40:24
Etree Mode : Disabled
Admin State : Up Oper State : Up
MTU : 1514
SAP Count : 1 SDP Bind Count : 1
Snd Flush on Fail : Disabled Host Conn Verify : Disabled
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
-------------------------------------------------------------------------------
Service Access & Destination Points
-------------------------------------------------------------------------------
Identifier Type AdmMTU OprMTU Adm Opr
-------------------------------------------------------------------------------
sap:1/1/c1/1:1 q-tag 9000 9000 Up Up
sdp:65:1 S(192.0.2.5) Spok 0 8974 Up Down
===============================================================================
* indicates that the corresponding row element may have been truncated.
ETH-CFM tools for proactive management (ETH-CC), troubleshooting (Loopback, Linktrace, and so on)
and profiling (Delay Measurement, and so on) are supported. The configuration and some ETH-CFM test
commands are shown for Node1 (left). Following the on-demand test output, the configuration for Node 2 is
included for completeness, without repeating the on-demand tests.
NODE1
config>port# info
----------------------------------------------
ethernet
exit
no shutdown
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
----------------------------------------------
config>eth-cfm# info
----------------------------------------------
domain 2 format none level 2
association 2 format icc-based name "FacilityRtr01"
exit
exit
----------------------------------------------
config>router# info
----------------------------------------------
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "Core1"
address 192.168.1.1/30
port 1/2/1
eth-cfm
mep 1 domain 2 association 2
mac-address d0:0d:1e:00:00:01
no shutdown
exit
exit
exit
interface "system"
exit
----------------------------------------------
===============================================================================
CFM Facility Interface Stack Table
===============================================================================
Interface Lvl Dir Md-index Ma-index MepId Mac-address Defect
-------------------------------------------------------------------------------
Core1 2 Down 2 2 1 d0:0d:1e:00:00:01 ------
===============================================================================
===============================================================================
CFM Facility Interface Stack Table
===============================================================================
Interface Lvl Dir Md-index Ma-index MepId Mac-address Defect
-------------------------------------------------------------------------------
Core1 2 Down 2 2 1 d0:0d:1e:00:00:01 ------
===============================================================================
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
NODE2
config>port# info
----------------------------------------------
ethernet
exit
no shutdown
----------------------------------------------
config>eth-cfm# info
----------------------------------------------
domain 2 format none level 2
association 2 format icc-based name "FacilityRtr01"
exit
exit
----------------------------------------------
config>router# info
----------------------------------------------
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "Core2"
address 192.168.1.2/30
port 1/2/2
eth-cfm
mep 2 domain 2 association 2
mac-address d0:0d:1e:00:00:02
no shutdown
exit
exit
exit
interface "system"
exit
----------------------------------------------
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Port:
Facility Fault Controls port Controls shared Controls Shared Controls LAG Controls IP
operational fate service fate service operational state interface
state SAPs and Epipe SAPs and Epipe operational state
Failure=Oper:
AIS AIS in reaction to
Failure=Link Up down,
CFM state
Success=Up Success=Oper=up
Sub-second CCM-enabled MEPs are platform-specific and may not be supported uniformly on the 7750
SR, 7450 ESS and 7950 XRS platforms. For those 7750 SR, 7450 ESS and 7950 XRS platforms which
support sub-second CCM-enabled MEPs, this additional restriction is applied; QinQ tunnel MEPs require a
minimum of SF/CPM3.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
A similar condition exists if down MEPs are configured on the SAPs that are operationally down. Figure 45:
Independent processing down MEP example shows how the same service configured with down MEPs
would generate AIS, if enabled, toward the remote client at the configured client-meg-level, in the reverse
direction of the MEP. This is also the correct behavior from the perspective ETH-CFM.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
MC-LAG represents the two upstream nodes as a single system to the node terminating a standard LAG.
Linking the ETH-CFM MPs to the state of the MC-LAG allows the operator to configure MPs across the
two boxes that appear the same. Under the default configuration, this would introduce various defect
conditions to be raised and event conditions. However, when ETH-CFM is tracking the state of the MC-
LAG, the MPs performs a role that represents the state of the resiliency mechanism. To enable this
new behavior, configure the system-wide command standby-mep-shutdown under the config>eth-
cfm>redundancy>mc-lag hierarchy.
When a MP is part of the active MC-LAG system, it performs as a normal MP: terminating, generating,
responding to, and processing all appropriate ETH-CFM packets. An MP that is on the standby MC-LAG
node enters a pseudo-shutdown state. These MPs terminates all ETH-CFM that are part of the regular
interception process, but does not process them. They are silently discarded. Also, an MP that exists
on a standby MC-LAG system does not generate any ETH-CFM packets. All proactive and on-demand
functions are blocked on the standby MC-LAG node. When scheduled tests are executed through SAA
these test attempt to execute. The tests record failures as a result of the MEP state. These failures are not
representative of the network.
This feature relies on the correct configuration, design, and deployment of the MC-LAG protocol. There
are numerous optimizations and configuration parameters that are available as part of the MC-LAG
functions. For example, by default, when a currently active MC-LAG port transitions to standby, by any
means including manual operator intervention, the remote node terminating the standard LAG sees
the LAG transition because all ports in the LAG are down for an instance in time. This is standard LAG
behavior does not change as a result of the linkage of MP state to MC-LAG state. This transition causes
the propagation of faults for MEPs configured on that node. Normal architectural LAG design must take
these types of events into consideration. MC-LAG provides numerous tuning parameters that need to be
considered before deploying in the field. These include a hold-time down option on the node terminating
the standard LAG, as well as other parameters for revertive behavior such as the hold-time up option. It
is important to ensure that the operator’s specific environment be taken into consideration when tuning the
MC-LAG parameters to avoid the propagation of error conditions during normal recover events. In the case
that the resumption of data forwarding exceed the timeout value of a MEP (3.5 times the CCM-Interval),
the appropriate defect conditions are raised.
ETH-CFM registers a fault propagation delay timer equal to propagate-hold-time under the config>eth-
cfm>redundancy>mc-lag hierarchy (default of 1s) to delay notification of an event that may be a result of
MC-LAG failover. This allows the system time to coordinate events and triggers that together represent the
MC-LAG transition from active to standby.
A fixed timer value of 1s delays an UP MEP from announcing a SAP down condition through CCM
Interface-Status-TLV bits, is Down. ETH-CFM maintains a status of last sent to the UP MEPs peer.
When the SAP transitions either to UP or DOWN that fault is held for the fixed 1s interval and the last
Interface-Status-TLV bits are set based on the previous transmission. If the condition, different from the
previous sent, still exists at the end of the 1s fixed timer and when the next CCM interval expires, the
representative value of the SAP is sent in the Interface-Status-TLV. These two timers help to smooth out
network transitions at the cost of propagation and clearing of faults.
When a node with ETH-CFM linked to MC-LAG is transitioning from standby to active ETH-CFM assumes
there are no underlying conditions for any of the SAPs that are now part of the newly activating MC-LAG.
The initial notification to an UP MEPs peer does not include any faults. It assumes that the transitioning
SAPs are stabilizing as the switchover proceeds. The fixed 1s timer starts and a second CCM PDU based
on the UP MEPs interval is sent without any recognition of potential fault on the SAP. However, after the
expiration of the fixed timer and on the next CCM-Interval, the Interface-Status-TLV represents the state of
the SAP.
In scaled environments it is important to configure the propagation-hold-time and the CCM intervals to
achieve the needed goals. If these timers are set too aggressively, then fault and defect conditions may
be generated during times of network stabilization. The use of fault propagation and AIS transmission
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
needs to be carefully considered in environments where MC-LAG protection mechanisms are deployed.
Timer values do not guarantee that transitional state is not propagated to the peer. The propagation of such
state may be more taxing and disruptive that allowing the transmission states to complete. For example,
if AIS generation is being used in this type of solution the operator should use a 60s AIS interval to avoid
transitional state from being advertised.
AIS generation is paced in a first come first serve model not to exceed the system capability, scale is
dependent on the type of system. If AIS is configured in an MC-LAG solution the operator must make sure
that the same MEPs on each system are configured to generate AIS and this number does not exceed the
maximum. This would require the operator to configure both nodes with the same MEPs that can generate
AIS and not exceed the system capacity. If the nodes are configured differently or exceed the system scale
there is a very high potential where a transition may see a different set of MEPs pacing out the AIS than
the original set of MEPs. There is no synchronization of AIS state across nodes.
Administrative functions, like admin down, are special cases. When the administrative state changes from
up to down, the timer is bypassed and communication from ETH-CFM is immediate.
When an MP is configured in an MC-LAG environment, Nokia recommends that each aspect of the MP be
configured the same, including MAC address. Also, although this may be obvious, both nodes participating
in the MC-LAG requiring this functionality should include the global command in the config>eth-
cfm>redundancy>mc-lag>standby-mep>shutdown context to avoid unpredictable behavior.
In summary, a SAP with ETH-CFM tracking the state of the MC-LAG represents the state of the MC-LAG.
MPs configured on the standby MC-LAG ports enters a state similar to shutdown. MPs on the MC-LAG
ports on the active MC-LAG ports performs all normal processing.
The following illustration, shows how MEPS can be linked to MC-LAG state. In this example, a service
MEP is created on the LAG SAP on NODE1 within service VPLS 100. The MEPs configured on the MC-
LAG nodes within service 100 are both configured the same. Both MEPs use the same MEP-ID, the same
MAC address.
Only one of the MEPs on the MC-LAG nodes is active for VPLS service 100. The other MEP is in a
shutdown mode, so that even when the MC-LAG is in standby and the port state is Link Up, the MEP is in
a pseudo shutdown state.
The following configuration example is not meant to provide all possible MC-LAG configuration statement
to tune each provider’s network. It does provide a base configuration to demonstrate the ETH-CFM feature.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
NODE1
config>lag# info
----------------------------------------------
mode access
encap-type qinq
access
adapt-qos link
exit
port 1/1/5
port 1/1/6
lacp active administrative-key 32768
hold-time down 10
no shutdown
----------------------------------------------
config>eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000100"
bridge-identifier 100
exit
ccm-interval 1
remote-mepid 101
exit
exit
----------------------------------------------
config>service>vpls# info
----------------------------------------------
stp
shutdown
exit
sap 1/1/3:100.100 create
exit
sap lag-1:100.100 create
eth-cfm
mep 100 domain 3 association 1 direction down
ccm-enable
mac-address d0:0d:1e:00:01:00
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
autonegotiate limited
exit
no shutdown
----------------------------------------------
config>lag# info
----------------------------------------------
mode access
encap-type qinq
access
adapt-qos link
exit
port 1/1/2
lacp active administrative-key 32768
no shutdown
----------------------------------------------
config>router# info
----------------------------------------------
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "Core2"
address 192.168.1.2/30
port 1/2/2
exit
interface "system"
exit
----------------------------------------------
config>redundancy# info
----------------------------------------------
multi-chassis
peer 192.168.1.1 create
source-address 192.168.1.2
mc-lag
lag 1 lacp-key 1 system-id 00:00:00:00:00:01 system-priority
100
no shutdown
exit
no shutdown
exit
exit
synchronize boot-env
----------------------------------------------
config>eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000100"
bridge-identifier 100
exit
ccm-interval 1
remote-mepid 100
exit
exit
redundancy
mc-lag
standby-mep-shutdown
exit
exit
----------------------------------------------
config>service>vpls# info
----------------------------------------------
stp
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
shutdown
exit
sap lag-1:100.100 create
eth-cfm
mep 101 domain 3 association 1 direction down
exit
ccm-enable
mac-address d0:0d:1e:00:01:01
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
# show lag 1
===============================================================================
Lag Data
===============================================================================
Lag-id Adm Opr Port-Threshold Up-Link-Count MC Act/Stdby
-------------------------------------------------------------------------------
1 up down 0 0 standby
===============================================================================
# show port
===============================================================================
Ports on Slot 1
===============================================================================
Port Admin Link Port Cfg Oper LAG/ Port Port Port C/QS/S/XFP/
Id State State MTU MTU Bndl Mode Encp Type MDIMDX
-------------------------------------------------------------------------------
… snip …
1/1/2 Up Yes Link Up 1522 1522 1 accs qinq xcme
…snip…
==========================================================================
config>lag# info
----------------------------------------------
mode access
encap-type qinq
access
adapt-qos link
exit
port 1/1/2
lacp active administrative-key 32768
no shutdown
----------------------------------------------
config>router# info
----------------------------------------------
#--------------------------------------------------
echo "IP Configuration"
#--------------------------------------------------
interface "Core1"
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
address 192.168.1.1/30
port 1/2/1
exit
interface "system"
exit
----------------------------------------------
config>redundancy# info
----------------------------------------------
multi-chassis
peer 192.168.1.2 create
source-address 192.168.1.1
mc-lag
lag 1 lacp-key 1 system-id 00:00:00:00:00:01 system-priority
100
no shutdown
exit
no shutdown
exit
exit
synchronize boot-env
----------------------------------------------
config>eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000100"
bridge-identifier 100
exit
ccm-interval 1
remote-mepid 100
exit
exit
redundancy
mc-lag
standby-mep-shutdown
exit
exit
----------------------------------------------
config>service>vpls# info
----------------------------------------------
stp
shutdown
exit
sap lag-1:100.100 create
eth-cfm
mep 101 domain 3 association 1 direction down
exit
ccm-enable
mac-address d0:0d:1e:00:01:01
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
# show lag 1
===============================================================================
Lag Data
===============================================================================
Lag-id Adm Opr Port-Threshold Up-Link-Count MC Act/Stdby
-------------------------------------------------------------------------------
1 up up 0 1 active
===============================================================================
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
# show port
===============================================================================
Ports on Slot 1
===============================================================================
Port Admin Link Port Cfg Oper LAG/ Port Port Port C/QS/S/XFP/
Id State State MTU MTU Bndl Mode Encp Type MDIMDX
-------------------------------------------------------------------------------
…snip…
1/1/2 Up Yes Up 1522 1522 1 accs qinq xcme
…snip…
===============================================================================
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
As described in the 7450 ESS, 7750 SR, 7950 XRS, and VSR OAM and Diagnostics Guide, MEPs can be
implemented at the service or the facility level. The focus of this guide is on how the ETH-CFM MPs are
configured within the service hierarchy level. However, because of the wide range of features that the ITU-
T has defined in recommendation Y.1731 (Fault Management, Performance Management and Protection
Mechanisms) the features may be applied to other features and hierarchies. For example, Ethernet Ring
Protection (G.8032) also make use of various ETH-CFM functions. Different section in this guide may
contain ETH-CFM specific material as it applies to that specific feature.
The following is an example of how domains and associations could be constructed, illustrating how the
different services are linked to the contexts.
config>eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000101"
bridge-identifier 100
exit
exit
exit
domain 4 format none level 4
association 1 format icc-based name "04-0000000102"
bridge-identifier 100
remote-mepid 200
ccm-interval 60
exit
exit
exit
The following configuration examples illustrate how different services make use of the domain and
association configuration. An Epipe, VPLS, and IES service are shown in this example. See the previous
table that shows the supported services and the management points.
Note:
The following examples cannot all be configured at the same instance because the service ID
100 cannot be spread across multiple services.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
mep 111 domain 3 association 1 direction down
mac-address d0:0d:1e:00:01:11
no shutdown
exit
exit
exit
sap 1/1/10:100.31 create
eth-cfm
mep 101 domain 4 association 1 direction up
mac-address d0:0d:1e:00:01:01
ccm-enable
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
A Virtual MEP (vMEP) is a MEP that is configured at the service level instead of on a SAP or SDP binding.
A vMEP sends ETH-CFM to all the SAPs and SDP bindings in the VPLS, depending on the type of traffic.
If it is multicast traffic, the packets forward out all SAPs and SDP bindings. Unicast traffic is forwarded
appropriately based on the type of ETH-CFM packet and the forwarding tables. Packets inbound to a
context containing a vMEP performs normal processing and forwarding through the data plane with a
copying of the ETH-CFM packet delivered to the local MEP for the appropriate levels. The local MEP
determines whether it should process a copied inbound ETH-CFM frame acting in accordance with
standard rules.
Configuring a vMEP is similar in concept to placing down MEPs on the individual SAPs and SDP bindings
in the associated VPLS. This ensures that packets inbound to the service get redirected to the vMEP for
processing. Correct domain nesting must be followed to avoid ETH-CFM error conditions.
vMEPs support VPLS, M-VPLS, BVPLS, and I-VPLS contexts.
A vMEP in an I-VPLS context can only extract packets inbound on local SAP and SDP bindings. This
extraction does not include packets that are mapped to the I-VPLS from an associated B-VPLS context.
If this type of extraction is required in an I-VPLS context then UP MEPs are required on the appropriate
SAPs and SDP bindings in the I-VPLS service.
The wider scope of the vMEP feature requires all the SAPs within the service and every network port on
the node to be FP2 or higher hardware.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
As with the original vMEP functionality introduced for B-VPLS contexts, DOWN MEPs are supported on
the individual SAPs or SDP bindings as long as domain nesting rules are not violated. Of course, local UP
MEPs are only supported at the same level as the vMEP otherwise various CCM defect conditions are
raised, assuming CCM is enabled, and leaking of ETH-CFM packets occurs (lower level ETH-CFM packets
arriving on a lower level MEP). Domain nesting must be properly deployed to avoid unexpected defect
conditions and leaking between ETH-CFM domains.
MIPs map be configured on the SAPs and spoke SDPs at or above level of the vMEP.
An optional vmep-filter provides a coarse means of silently dropping all ETH-CFM packets that would
normally be redirected to the CPU following egress processing. These includes any ETH-CFM level equal
to or lower than the vMEP and any level equal to and lower than any other Management Points on the
same SAP or SDP binding that includes the vmep-filter. MIPs are automatically deleted when they coexist
on the same SAP or spoke SDP as the vmep-filter. Because DOWN MEPs are ingress processed they
are supported in combination with a vMEP and operate normally regardless of any vmep-filter. Domain
nesting rules must be adhered to.
If the operator requires an MP on the SAP or SDP binding an UP MEP may be created at the same level
as the vMEP on the appropriate SAP or SDP binding to perform the same function as the filter but at the
specific level of the MEP. Scalability needs to be clearly understood because this redirects the ETH-CFM
packets to the CPU (consider using CPU protection). Consideration must also be given to the impact this
approach could have on the total number of MEPs required. There are a number of other approaches that
may lend themselves to the specific network architecture.
vMEP filtering is not supported within the a PBB VPLS because it already provides separation between B-
components (typically the core) and I-components (typically the customer)
vMEPs do not support any ETH-AIS functionality and do not support fault propagation functions.
The following shows a configuration example to configure a vMEP in a VPLS context.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
config>group-encryption
— group-encryption-label encryption-label
config# group-encryption
config>grp-encryp# group-encryption-label 34
domain1>config>grp-encryp# info
-------------------------------------------------------
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
group-encryption-label 34
-------------------------------------------------------
domain1>config>grp-encryp#
config# group-encryption
— encryption-keygroup keygroup-id [create]
— description description-string
— esp-auth-algorithm {sha256|sha512}
— esp-encryption-algorithm {aes128|aes256}
— keygroup-name keygroup-name
— security-association spi spi authentication-key authentication-key encryption-
key encryption-key [crypto]
— active-outbound-sa spi
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
Note:
After assigning a key group to the PW template, the following tools command must be executed:
tools>perform>service>eval-pw-template>allow-service-impact
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
The following examples display a key group assigned to an SDP, VPRN service, or PW template:
config>service# vprn 22
config>service>vprn# encryption-keygroup 2 direction inbound
config>service>vprn# encryption-keygroup 2 direction outbound
The following example displays key group configuration for an SDP or a VPRN service.
domain1>config>service# info
----------------------------------------------
...
sdp 61 create
shutdown
far-end 10.10.10.10
exit
encryption-keygroup 4 direction inbound
encryption-keygroup 4 direction outbound
exit
...
vprn 22 customer 1 create
shutdown
encryption-keygroup 2 direction inbound
encryption-keygroup 2 direction outbound
exit
...
----------------------------------------------
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
— agg-rate
— burst-limit size [bytes|kilobytes]
— limit-unused-bandwidth
— queue-frame-based-accounting
— rate kilobits-per-second
— policer-control-policy name
— scheduler-override
— scheduler scheduler-name [create]
— parent {[weight weight]
— [cir-weight cir-weight]}
— rate pir-rate [cir cir-rate]
— scheduler-policy scheduler-policy-name
— ingress
— policer-control-policy name
— scheduler-override
— scheduler scheduler-name [create]
— parent {[weight weight]
— [cir-weight cir-weight]}
— rate pir-rate [cir cir-rate]
— scheduler-policy scheduler-policy-name
— phone phone-number
config>service# customer 27 create
— config>service>customer$ description ‟Western Division”
— config>service>customer# contact ‟John Dough”
— config>service>customer# no phone ‟(650) 237-5102”
Note:
When created, the SDP encapsulation type cannot be modified.
config>service# sdp 79
— config>service>sdp# description ‟Path-to-107”
— config>service>sdp# shutdown
— config>service>sdp# far-end ‟10.10.10.107”
— config>service>sdp# path-mtu 1503
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
— config>service>sdp# no shutdown
config>service# no sdp 79
config# group-encryption
— encryption-keygroup keygroup-id
— no active-outbound-sa
— no security-association spi spi
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
— exit
config# group-encryption
— encryption-keygroup keygroup-id
— security-association spi spi authentication-key auth-key encryption-key encrypt-
key
— esp-encryption-algorithm {aes128|aes256}
— exit
The following example displays the commands used to modify a key group. The first example deconfigures
the key group items and the second example reconfigures them. The encryption algorithm is changed from
128 to 256, the keys are changed, and the active outbound SA is changed to SPI 2.
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
domain1>config>grp-encryp#
Note:
After removing a key group to the PW template, the following tools command must be executed:
tools>perform>service>eval-pw-template>allow-service-impact
The following examples display a key group removed from an SDP, VPRN service, or PW template:
config>service# sdp 61
config>service>sdp# no encryption-keygroup direction inbound
config>service>sdp# no encryption-keygroup direction outbound
config>service# vprn 22
config>service>vprn# no encryption-keygroup direction inbound
config>service>vprn# no encryption-keygroup direction outbound
config>service# pw-template 12
config>service>pw-template# no encryption-keygroup direction inbound
config>service>pw-template# no encryption-keygroup direction outbound
tools>perform>service>eval-pw-template>allow-service-impact
The following example shows that the key group configuration has been removed from an SDP or a VPRN
service.
domain1>config>service# info
----------------------------------------------
...
sdp 61 create
shutdown
far-end 10.10.10.10
exit
exit
...
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
...
vprn 22 customer 1 create
shutdown
exit
...
----------------------------------------------
domain1>config>service# info
2.18.3.1 Changing the key group for an SDP, VPRN service, or PW template
Changing key groups for an SDP, VPRN service, or PW template must be performed on all nodes for the
service.
The following CLI syntax changes the key group on an SDP. The syntax for a VPRN service or PW
template is similar.
Note:
For PW template changes, the following tools command must be executed after the encryption-
keygroup changes are made:
tools>perform>service>eval-pw-template>allow-service-impact
In the example below, the inbound and outbound key groups are changed from key group 4 to key group 6.
config>service# sdp 61
config>service>sdp# no encryption-keygroup direction inbound
config>service>sdp# encryption-keygroup 6 direction outbound
config>service>sdp# encryption-keygroup 6 direction inbound
The following example shows that the key group configuration has been changed for the SDP or the VPRN
service.
domain1>config>service# info
----------------------------------------------
...
sdp 61 create
shutdown
far-end 10.10.10.10
exit
encryption-keygroup 6 direction inbound
encryption-keygroup 6 direction outbound
exit
...
----------------------------------------------
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Services overview
domain1>config>service# info
Note:
When deleting a key group from a PW template, the following tools command must be executed
after the encryption-keygroup changes are made:
tools>perform>service>eval-pw-template>allow-service-impact
To locate the key group bindings, use the CLI command show>group-encryption> encryption-keygroup
keygroup-id.
Use the following CLI syntax to delete a key group:
config# group-encryption
— no encryption-keygroup keygroup-id
config>grp-encryp# no encryption-keygroup 8
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
RFC 7130, Bidirectional Forwarding Detection (BFD) on Link Aggregation Group (LAG) Interfaces
RFC 7880, Seamless Bidirectional Forwarding Detection (S-BFD)
RFC 7881, Seamless Bidirectional Forwarding Detection (S-BFD) for IPv4, IPv6, and MPLS
RFC 7883, Advertising Seamless Bidirectional Forwarding Detection (S-BFD) Discriminators in IS-IS
RFC 7884, OSPF Extensions to Advertise Seamless Bidirectional Forwarding Detection (S-BFD) Target
Discriminators
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
RFC 4659, BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN
RFC 4684, Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching
(BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs)
RFC 4724, Graceful Restart Mechanism for BGP - helper mode
RFC 4760, Multiprotocol Extensions for BGP-4
RFC 4798, Connecting IPv6 Islands over IPv4 MPLS Using IPv6 Provider Edge Routers (6PE)
RFC 5004, Avoid BGP Best Path Transitions from One External to Another
RFC 5065, Autonomous System Confederations for BGP
RFC 5291, Outbound Route Filtering Capability for BGP-4
RFC 5396, Textual Representation of Autonomous System (AS) Numbers - asplain
RFC 5492, Capabilities Advertisement with BGP-4
RFC 5549, Advertising IPv4 Network Layer Reachability Information with an IPv6 Next Hop
RFC 5575, Dissemination of Flow Specification Rules
RFC 5668, 4-Octet AS Specific BGP Extended Community
RFC 6286, Autonomous-System-Wide Unique BGP Identifier for BGP-4
RFC 6793, BGP Support for Four-Octet Autonomous System (AS) Number Space
RFC 6810, The Resource Public Key Infrastructure (RPKI) to Router Protocol
RFC 6811, Prefix Origin Validation
RFC 6996, Autonomous System (AS) Reservation for Private Use
RFC 7311, The Accumulated IGP Metric Attribute for BGP
RFC 7607, Codification of AS 0 Processing
RFC 7674, Clarification of the Flowspec Redirect Extended Community
RFC 7752, North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP
RFC 7854, BGP Monitoring Protocol (BMP)
RFC 7911, Advertisement of Multiple Paths in BGP
RFC 7999, BLACKHOLE Community
RFC 8092, BGP Large Communities Attribute
RFC 8212, Default External BGP (EBGP) Route Propagation Behavior without Policies
RFC 8571, BGP - Link State (BGP-LS) Advertisement of IGP Traffic Engineering Performance Metric
Extensions
RFC 9086, Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing BGP Egress
Peer Engineering
3.6 Broadband Network Gateway (BNG) Control and User Plane Separation
(CUPS)
3GPP 23.007, Restoration procedures
3GPP 29.244, Interface between the Control Plane and the User Plane nodes
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
3GPP 29.281, General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U)
BBF TR-459, Control and User Plane Separation for a Disaggregated BNG
RFC 8300, Network Service Header (NSH)
3.9 Ethernet
IEEE 802.1AB, Station and Media Access Control Connectivity Discovery
IEEE 802.1ad, Provider Bridges
IEEE 802.1ag, Connectivity Fault Management
IEEE 802.1ah, Provider Backbone Bridges
IEEE 802.1ak, Multiple Registration Protocol
IEEE 802.1aq, Shortest Path Bridging
IEEE 802.1ax, Link Aggregation
IEEE 802.1D, MAC Bridges
IEEE 802.1p, Traffic Class Expediting
IEEE 802.1Q, Virtual LANs
IEEE 802.1s, Multiple Spanning Trees
IEEE 802.1w, Rapid Reconfiguration of Spanning Tree
IEEE 802.1X, Port Based Network Access Control
IEEE 802.3ac, VLAN Tag
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
RFC 6515, IPv4 and IPv6 Infrastructure Addresses in BGP Updates for Multicast VPNs
RFC 6516, IPv6 Multicast VPN (MVPN) Support Using PIM Control Plane and Selective Provider Multicast
Service Interface (S-PMSI) Join Messages
RFC 6625, Wildcards in Multicast VPN Auto-Discover Routes
RFC 6826, Multipoint LDP In-Band Signaling for Point-to-Multipoint and Multipoint-to-Multipoint Label
Switched Path
RFC 7246, Multipoint Label Distribution Protocol In-Band Signaling in a Virtual Routing and Forwarding
(VRF) Table Context
RFC 7385, IANA Registry for P-Multicast Service Interface (PMSI) Tunnel Type Code Points
RFC 7716, Global Table Multicast with BGP Multicast VPN (BGP-MVPN) Procedures
RFC 7761, Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)
RFC 8279, Multicast Using Bit Index Explicit Replication (BIER)
RFC 8296, Encapsulation for Bit Index Explicit Replication (BIER) in MPLS and Non-MPLS Networks -
MPLS encapsulation
RFC 8401, Bit Index Explicit Replication (BIER) Support via IS-IS
RFC 8444, OSPFv2 Extensions for Bit Index Explicit Replication (BIER)
RFC 8487, Mtrace Version 2: Traceroute Facility for IP Multicast
RFC 8534, Explicit Tracking with Wildcard Routes in Multicast VPN - (C-*,C-*) wildcard
RFC 8556, Multicast VPN Using Bit Index Explicit Replication (BIER)
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
RFC 4945, The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2 and PKIX
RFC 5019, The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume
Environments
RFC 5282, Using Authenticated Encryption Algorithms with the Encrypted Payload of the IKEv2 Protocol
RFC 5903, ECP Groups for IKE and IKEv2
RFC 5996, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 5998, An Extension for EAP-Only Authentication in IKEv2
RFC 6379, Suite B Cryptographic Suites for IPsec
RFC 6380, Suite B Profile for Internet Protocol Security (IPsec)
RFC 6960, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC 7296, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 7321, Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating
Security Payload (ESP) and Authentication Header (AH)
RFC 7383, Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation
RFC 7427, Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
RFC 3584, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network
Management Framework
RFC 3826, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security
Model
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
3.40 Timing
GR-1244-CORE Issue 3, Clocks for the Synchronized Network: Common Generic Criteria
GR-253-CORE Issue 3, SONET Transport Systems: Common Generic Criteria
IEEE 1588-2008, IEEE Standard for a Precision Clock Synchronization Protocol for Networked
Measurement and Control Systems
ITU-T G.781, Synchronization layer functions
ITU-T G.813, Timing characteristics of SDH equipment slave clocks (SEC)
ITU-T G.8261, Timing and synchronization aspects in packet networks
ITU-T G.8262, Timing characteristics of synchronous Ethernet equipment slave clock (EEC)
ITU-T G.8262.1, Timing characteristics of an enhanced synchronous Ethernet equipment slave clock
(eEEC)
ITU-T G.8264, Distribution of timing information through packet networks
ITU-T G.8265.1, Precision time protocol telecom profile for frequency synchronization
ITU-T G.8275.1, Precision time protocol telecom profile for phase/time synchronization with full timing
support from the network
RFC 3339, Date and Time on the Internet: Timestamps
RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms Specification
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
SERVICES OVERVIEW GUIDE RELEASE 21.10.R1 Standards and protocol support
SPACER TEXT
Customer document and product support
Customer documentation
Customer documentation welcome page
Technical support
Product support portal
Documentation feedback
Customer documentation feedback