OAM Guide
OAM Guide
© 2022 Nokia.
Use subject to Terms available at: www.nokia.com/terms/.
Nokia is committed to diversity and inclusion. We are continuously reviewing our customer
documentation and consulting with standards bodies to ensure that terminology is inclusive and
aligned with the industry. Our future customer documentation will be updated accordingly.
This document includes Nokia proprietary and confidential information, which may not be distributed
or disclosed to any third parties without the prior written consent of Nokia.
This document is intended for use by Nokia’s customers (“You”/”Your”) in connection with a product
purchased or licensed from any company within Nokia Group of Companies. Use this document
as agreed. You agree to notify Nokia of any errors you may find in this document; however, should
you elect to use this document for any purpose(s) for which it is not intended, You understand and
warrant that any determinations You may make or actions You may take will be based upon Your
independent judgment and analysis of the content of this document.
Nokia reserves the right to make changes to this document without notice. At all times, the
controlling version is the one available on Nokia’s site.
Copyright and trademark: Nokia is a registered trademark of Nokia Corporation. Other product
names mentioned in this document may be trademarks of their respective owners.
© 2022 Nokia.
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
Table of contents
1 Getting started......................................................................................................................................... 11
1.1 About this guide................................................................................................................................ 11
1.2 Router configuration process............................................................................................................12
1.3 Conventions.......................................................................................................................................12
1.3.1 Precautionary and information messages................................................................................ 12
1.3.2 Options or substeps in procedures and sequential workflows................................................. 13
2 Mirror services.........................................................................................................................................14
2.1 Mirror implementation....................................................................................................................... 14
2.1.1 Mirror components....................................................................................................................15
2.1.2 Mirror source.............................................................................................................................15
2.1.2.1 Types and sources...........................................................................................................16
2.1.2.2 Mirror source priority........................................................................................................ 17
2.1.3 Mirror destination...................................................................................................................... 17
2.1.3.1 General local and remote mirroring................................................................................. 18
2.1.3.2 Mirror destination type IP-only......................................................................................... 18
2.1.3.3 Mirror destination type PPP with port-ID insertion...........................................................19
2.1.3.4 Layer 3 encapsulation......................................................................................................20
2.1.3.5 PCAP packet capture.......................................................................................................22
2.1.3.6 Mirrored traffic transport using MPLS-TP SDPs.............................................................. 23
2.1.3.7 Slicing and sampling........................................................................................................ 30
2.1.4 Mirroring performance.............................................................................................................. 31
2.2 Lawful Intercept.................................................................................................................................31
2.2.1 LI activation through RADIUS.................................................................................................. 31
2.2.2 Routable Lawful Intercept encapsulation................................................................................. 34
2.2.3 Lawful Intercept and NAT.........................................................................................................37
2.2.3.1 Carrier grade NAT............................................................................................................37
2.2.3.2 L2-Aware NAT.................................................................................................................. 38
2.2.4 Lawful Intercept management interfaces................................................................................. 39
2.2.4.1 LI management using the classic CLI engine..................................................................39
2.2.4.2 LI management using the MD-CLI engine.......................................................................42
2.2.4.3 Lawful Intercept in NETCONF......................................................................................... 43
2.2.4.4 Lawful Intercept in gNMI.................................................................................................. 44
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Table of contents
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Getting started
1 Getting started
Note: Unless otherwise indicated, this guide uses classic CLI command syntax and configuration
examples.
For a list of unsupported features by platform and chassis, see the SR OS R22.x.Rx Software Release
Notes, part number 3HE 18412 000 x TQZZA.
Command outputs shown in this guide are examples only; actual displays may differ depending on
supported functionality and user configuration.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Getting started
Note:
The SR OS CLI trees and command descriptions can be found in the following guides:
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI Command Reference Guide
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor, Show, and Tools Command
Reference Guide (for both MD-CLI and Classic CLI)
• 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference Guide
Note:
This guide generically covers Release 22.x.Rx content and may contain some content that will
be released in later maintenance loads. See the SR OS R22.x.Rx Software Release Notes, part
number 3HE 18412 000 x TQZZA, for information about features supported in each load of the
Release 22.x.Rx software.
1.3 Conventions
This section describes the general conventions used in this guide.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Getting started
DANGER: Danger warns that the described activity or situation may result in serious personal
injury or death. An electric shock hazard could exist. Before you begin work on this equipment,
be aware of hazards involving electrical circuitry, be familiar with networking environments, and
implement accident prevention procedures.
WARNING: Warning indicates that the described activity or situation may, or will, cause
equipment damage, serious performance problems, or loss of data.
Caution: Caution indicates that the described activity or situation may reduce your component or
system performance.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
2 Mirror services
When troubleshooting complex operational problems, customer packets can be examined as they
traverse the network. Nokia’s service mirroring provides the capability to mirror customer packets to
allow for trouble shooting and offline analysis. One way to accomplish this is with an overlay of network
analyzers established at multiple PoPs, together with skilled technicians to operate them to decode the
data provided. This method of traffic mirroring often requires setting up complex filters in multiple switches
or routers. These, at best, are only able to mirror from one port to another on the same device.
Nokia’s service mirroring extends and integrates these capabilities into the network and provides significant
operational benefits. Each router can mirror packets from a specific service to any destination point in the
network, regardless of interface type or speed.
This capability also extends beyond troubleshooting services. Telephone companies can obtain itemized
calling records and wire-taps where legally required by investigating authorities. The process can be very
complex and costly to carry out on data networks. Service mirroring greatly simplifies these tasks, as well
as reduces costs through centralization of analysis tools and skilled technicians.
Nokia routers support service-based mirroring. While some Layer 3 switches and routers can mirror on a
per-port basis within the device, Nokia routers can mirror on an n-to-1 unidirectional service basis and re-
encapsulate the mirrored data for transport through the core network to another location, using either IP or
MPLS tunneling as required (Figure 1: Service mirroring).
Original packets are forwarded while a copy is sent out the mirrored port to the mirroring (destination) port.
Service mirroring allows an operator to see the actual traffic on a customer’s service with a sniffer sitting in
a central location. In many cases, this reduces the need for a separate, costly overlay sniffer network.
The mirrored frame size that is to be transmitted to the mirror destination can be explicitly configured by
using slicing features. This enables mirroring only the parts needed for analysis. For example, only the
headers can be copied for analysis, protecting the integrity and security of customer data, or conversely,
copying the full packet, including customer data.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
source before the actual subscriber exists on the node and before the subscriber ID is active (the mirroring
starts when the subscriber is created or logs in and the subscriber ID becomes active).
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
In classic CLI mode, mirror destination supports the following mirror-type values:
• ether
• ppp
• ip-only
• satop-e1
• cesopsn
• cesopsn-cas
In mixed and MD-CLI mode, only the following mirror-type values are supported: ether and ip-only.
To switch from classic to mixed or MD-CLI mode, all mirror types other than ether and ip-only must be
manually removed first.
The following mirror destinations are supported:
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
interface out of which the packet travels must exist in the routing instance that is configured in the mirror
destination.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Packet capture is a troubleshooting tool. Therefore, all CLI commands except for the FTP URL destination
are located under debug. This allows the administrator to set up a CLI profile specifically for packet
capture with debug privileges.
The packet capture uses FTP for file transfer and can be routed to the destination using the management
port or through the IOM port. If the FTP server destination is routed through the management port,
consider the maximum bandwidth available.
Caution: Typically, the management port is used for logging, SNMP, SSH/Telnet, AAA, and
other management services. A high-throughput packet capture may disrupt these management
services. Therefore, use packet capture transfers using the management port with caution.
Mechanisms are built in to prevent mirroring or packet captures that result in loops or daisy-chains.
However, it is possible to form a loop or daisy-chain if routing re routes or configuration changes. When a
packet capture becomes looped or daisy-chained, the packet capture stops.
Note: When executing an admin rollback for a configuration under the config mirror mirror-
dest service-id pcap CLI context, the pcap must first be stopped by executing the debug pcap
session-name capture stop command. If the pcap is not stopped, the rollback fails.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Note that mirroring traffic is usually unidirectional, flowing from ‟source” nodes (B or C) to ‟destination”
nodes (D or E). However, in case of MPLS-TP, the control channel status packets may flow in the reverse
direction.
The following is an example of a mirror service configuration using MPLS-TP spoke SDPs:
Source node B
#--------------------------------------------------
echo "Mirror Configuration"
#--------------------------------------------------
mirror
mirror-dest 300 create
endpoint "X" create
revert-time 100
exit
endpoint "Y" create
revert-time 100
exit
remote-source
spoke-sdp 230:1300 endpoint "Y" icb create
ingress
vc-label 13301
exit
egress
vc-label 13301
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.2:13301
taii-type2 1:10.20.1.3:13301
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
exit
spoke-sdp 240:300 endpoint "X" create
ingress
vc-label 2401
exit
egress
vc-label 2401
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.2:2401
taii-type2 1:10.20.1.4:2401
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
spoke-sdp 250:300 endpoint "X" create
ingress
vc-label 6501
exit
egress
vc-label 6501
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.2:6501
taii-type2 1:10.20.1.5:6501
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
spoke-sdp 230:300 endpoint "X" icb create
ingress
vc-label 12301
exit
egress
vc-label 12301
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.2:12301
taii-type2 1:10.20.1.3:12301
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
no shutdown
exit
exit
exit all
Destination node C
#--------------------------------------------------
echo "Mirror Configuration"
#--------------------------------------------------
mirror
mirror-dest 300 create
endpoint "X" create
revert-time 100
exit
endpoint "Y" create
revert-time 100
exit
remote-source
spoke-sdp 230:1300 endpoint "Y" icb create
ingress
vc-label 13301
exit
egress
vc-label 13301
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.3:13301
taii-type2 1:10.20.1.2:13301
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
exit
spoke-sdp 340:300 endpoint "X" create
ingress
vc-label 6501
exit
egress
vc-label 6501
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.3:6501
taii-type2 1:10.20.1.4:6501
exit
control-channel-status
refresh-timer 10
no shutdown
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
no shutdown
exit
spoke-sdp 350:300 endpoint "X" create
ingress
vc-label 2401
exit
egress
vc-label 2401
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.3:2401
taii-type2 1:10.20.1.5:2401
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
spoke-sdp 230:300 endpoint "X" icb create
ingress
vc-label 12301
exit
egress
vc-label 12301
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.3:12301
taii-type2 1:10.20.1.2:12301
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
no shutdown
exit
exit
Source node D
#--------------------------------------------------
echo "Mirror Configuration”
#--------------------------------------------------
mirror
mirror-dest 300 create
endpoint "X" create
revert-time 100
exit
endpoint "Y" create
revert-time 100
exit
remote-source
spoke-sdp 240:300 endpoint "Y" create
ingress
vc-label 2401
exit
egress
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
vc-label 2401
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.4:2401
taii-type2 1:10.20.1.2:2401
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
spoke-sdp 340:300 endpoint "Y" create
ingress
vc-label 6501
exit
egress
vc-label 6501
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.4:6501
taii-type2 1:10.20.1.3:6501
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
spoke-sdp 450:1300 endpoint "Y" icb create
ingress
vc-label 13301
exit
egress
vc-label 13301
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.4:13301
taii-type2 1:10.20.1.5:13301
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
exit
sap lag-10:300.1 endpoint "X" create
exit
spoke-sdp 450:300 endpoint "X" icb create
ingress
vc-label 12301
exit
egress
vc-label 12301
exit
control-word
pw-path-id
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
agi 1:1
saii-type2 1:10.20.1.4:12301
taii-type2 1:10.20.1.5:12301
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
no shutdown
exit
exit
Destination node E
#--------------------------------------------------
echo "Mirror Configuration"
#--------------------------------------------------
mirror
mirror-dest 300 create
endpoint "X" create
revert-time 100
exit
endpoint "Y" create
revert-time 100
exit
remote-source
spoke-sdp 250:300 endpoint "Y" create
ingress
vc-label 6501
exit
egress
vc-label 6501
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.5:6501
taii-type2 1:10.20.1.2:6501
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
spoke-sdp 350:300 endpoint "Y" create
ingress
vc-label 2401
exit
egress
vc-label 2401
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.5:2401
taii-type2 1:10.20.1.3:2401
exit
control-channel-status
refresh-timer 10
no shutdown
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
exit
no shutdown
exit
spoke-sdp 450:1300 endpoint "Y" icb create
ingress
vc-label 13301
exit
egress
vc-label 13301
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.5:13301
taii-type2 1:10.20.1.4:13301
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
exit
sap lag-10:300.1 endpoint "X" create
exit
spoke-sdp 450:300 endpoint "X" icb create
ingress
vc-label 12301
exit
egress
vc-label 12301
exit
control-word
pw-path-id
agi 1:1
saii-type2 1:10.20.1.5:12301
taii-type2 1:10.20.1.4:12301
exit
control-channel-status
refresh-timer 10
no shutdown
exit
no shutdown
exit
no shutdown
exit
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
transmitted to the mirror destination. The original frame is not affected by the truncation. Mirrored
frames, most likely, become larger as encapsulations are added when packets are transmitted through
the network core or out the mirror destination SAP to the packet or protocol decode equipment. Slice
size is not supported by CEM encap-types or IP mirroring.
The transmission of a sliced or non-sliced frame is also dependent on the mirror destination SDP
path MTU and the mirror destination SAP physical MTU. Packets that require a larger MTU than the
mirroring destination supports are discarded if the defined slice size does not truncate the packet to an
acceptable size.
• sampling
Mirror sampling rate defines a packet sampling rate for a mirror service. The sampling rate is applicable
to all endpoints in the mirror source ingress and egress and supported on FP4-based cards.
This capability can be useful for analytics purposes such as DDoS telemetry to provide a subset of
traffic while still maintaining statistical accuracy using packet sampling.
Packet sampling can be configured concurrently with mirror slicing to further limit the amount of traffic
sent to the collector.
For endpoints in the mirror source on FP2- and FP3-based cards, all the packets are mirrored without
sampling.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Note: The term ‟activation” in this section represents both ‟activation and de-activation”.
The activation of an LI session via RADIUS applies to the 7450 ESS and 7750 SR and can occur in one of
two ways:
• when the RADIUS Access-Accept message is received by the 7450 ESS or 7750 SR. The target (either
a host or a set of hosts) is implicit. The target acts as the same host (or set of hosts) that is within the
scope of the Access-Accept and interception occurs for this entire set of hosts (or a single host).
• through RADIUS CoA messages. The target (set of hosts) is identified through one of the following
methods:
– Acct-Session-Id (which can represent a single host or a collection of hosts)
– a sap-id;ip-addr carried in the NAS-Port-Id (attr 87) and the Framed-Ip-Address (attr 8).” for IPv4
hosts
– a sap-id;IPv6_addr carried in the NAS-Port-ID (attr 87) and one of Alc-Ipv6-Address, Framed-Ipv6-
Prefix, or Delegated-Ipv6-Prefix for IPv6 hosts
– Alc-Subsc-ID-Str
The following set of VSAs is used to activate LI sessions via RADIUS:
• Alc-LI-Action – ON/OFF/NONE
• Alc-LI-Destination - <string> and has two options:
– the mirror destination service ID
– at real time, specify the IP destination, the UDP port, and the router instance of the LI mediation
device
The format for the VSA is ip-address [:port] [router instance]. The IP address must be of type IPv4
and is the only mandatory parameter.
• Alc-LI-Direction – INGRESS/EGRESS
• Alc-LI-FC – be/l1/l2/af/ef
• (optional) Alc-LI-Use-Outside-IP
Use this VSA when the subscriber is an L2-aware NAT subscriber and uses the outside IP address
instead of the private IP address for packet mirroring. See L2-Aware NAT for more details.
The Alc-LI-FC VSA can be present several times if more than one forwarding class (FC) is subject to LI.
The VSAs Alc-LI-Direction and Alc-LI-FC are optional. If either is not included, both directions (ingress and
egress) as well as all FCs are mirrored.
The Alc-LI-Destination VSA can be used in one of the following ways:
• A mirror destination must first be provisioned on SR. To use the mirror destination, the VSA specifies
the mirror destination service ID in the Access-Accept message or a CoA.
• The VSA specifies the IP address of the mirror destination through the Access-Accept message or a
CoA. The reserved range of service IDs and the mirror destination template must be configured first.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
This VSA provisions the mirror destination using a combination of parameters from the LI template and
RADIUS VSAs. The following should be considered when using this VSA:
– Only Layer 3 encapsulation is supported as the mirror destination.
– The VSA has the format ipv4-address [:port] [router {Base | svc-id}]. The VSA must include the LI
destination IPv4 address, while the port and the routing instance are optional. If the destination port
and routing instance are not specified in the VSA, the configuration from the LI mirror destination
template is used.
– With the LI mirror destination reservation, a list of service IDs is reserved for configuring the mirror
destination via RADIUS. The LI mirror destination is shared with the mirror destination used for
debugging purposes. Therefore, it is suggested to reserve enough for LI purposes, and leave
enough for debugging and configuration. The VSA triggers the creation of a mirror destination
automatically and uses one of the service IDs in the reservation range. An LI source that matches
the IP source, IP destination, UDP destination, UDP source, and direction bit, reuses the same
LI mirror destination service ID. The LI mirror destination reservation range can be expanded
or reduced in real time. The range can be changed completely when there are no LI sources
referenced in the mirror reservation range.
– The LI mirror destination template specifies the parameters for the Layer 3 encapsulation. It is
mandatory to provision the IP source, IP destination, UDP source, and UDP destination parameters.
– It is possible to configure up to eight LI mirror destination templates. The mirror destination template
can be switched in real time, if, for example, a parameter such as the source IP address is to be
updated.
– The system can block RADIUS from generating the mirror destination by removing a template
reference under the config>li>radius context.
VSAs in the Access-Accept messages also activate LI for a newly-created host. In this case, the LI
activation is not addressed by the Acct-Session-Id, as this is not yet known during session authorization.
Different attributes can be used in a CoA to identify one or more subscriber hosts. Typically, only a single
attribute or set of attributes is used to target a host or several: NAS-Port-Id + IP, Acct-Session-Id, or Alc-
Subsc-ID-Str. In the case where ‟NAS-Port-Id + IP” is used in a Wholesale or Retail model, the Alc-Retail-
Serv-Id VSA must be included in the CoA.
The ability to delete all li-source entries from a mirror service is also available via RADIUS. This function
may be useful when an LI mediation device loses synchronization with the SR OS state and needs to
reset a mirror service to a known state with no LI sessions. This clear function is performed by sending the
following attributes in a RADIUS CoA. If the CoA does not contain exactly the following three VSAs (each
with a valid value matching the configuration on SR OS), the CoA is silently dropped without a NAK:
• Alc-LI-Action
Alc-LI-Action = ‛clear-dest-service’
• Alc-LI-Destination
The destination can specify the service ID of the mirror destination or it can pass the VSA in the mirror
destination IP, where the mirror destination IP was automatically created by RADIUS.
– Alc-LI-Destination = service-id, if a mirror destination service ID was used for LI
– Alc-LI-Destination = ip-address [:port] [router instance]. The system deletes RADIUS auto-
generated mirror destinations based on three parameters: the IP destination, the UDP destination
port, and the router instance. These parameters can be passed in from the Alc-LI-Destination VSA. If
the VSA provides only some of the parameters, for example, only the destination IP, the parameters
from the mirror destination template is used (from config>li>mirror-dest-template). The three
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
parameters determine the mirror service ID to delete and any combination of the IP source, UDP
source port, and direction bit can be deleted. It is possible that a template change can prevent the
VSA from deleting the mirror destination service. To manually delete a mirror destination, a CLI
command is provided under clear li radius mirror-dest svc-id. To determine the service ID to
delete, a manual login is required.
• Alc-Authentication-Policy-Name
This VSA is only required in a specific configuration. The VSA is not required when a RADIUS server
policy is configured under configure subscriber-mgmt authentication-policy and the RADIUS server
policy servers are used as CoA servers.
This VSA is required in the configuration where the servers configured inside the authentication policy
are used as CoA servers, with the following:
– a list of servers is configured under config>subscr-mgmt>auth-plcy>radius-auth-server
– accept-authorization-change is enabled under config>subscr-mgmt>auth-plcy
– the authentication policy does not reference the RADIUS server policy
When the above conditions are met, the Alc-Authentication-Policy-Name VSA is required and must
reference the authentication policy that contains the IP address of the LI CoA client.
The LI-related VSAs cannot be combined in one CoA message with other action-related VSAs (force
renew, change of SLA profile, and so on). The only exception to this rule is for the CoA used to create a
new subscriber host. In this case, LI-related VSAs can be included, along with other VSAs.
If LI is activated through CLI or SNMP, the activation through RADIUS takes precedence. The precedence
in this context means that RADIUS activation of LI fully overrides whatever was configured at CLI or SNMP
level for this host. If the RADIUS LI is de-activated, the CLI or SNMP configuration becomes active again.
The LI-related VSAs are not shown in debug messages. The show li li-source command shows all sub-
hosts for which LI was activated using RADIUS VSAs. This command is only accessible to CLI users with
LI privileges.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Some of the supported attributes and scenarios for the routable LI encapsulation feature include the
following:
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
• The part of the customer packet that is copied and placed into the routable encapsulation can be either
the IP packet (with none of the original Layer2 encap) or an Ethernet packet by selecting either ip-only
or ether as the mirror-dest type.
• The ability to inject into the Base routing instance (for forwarding out network interfaces or IES SAPs for
example) or a VPRN service.
• The ability to forward the encapsulated packets out VPRN SDPs, IGP/BGP shortcuts and SDP spoke
interfaces.
• Options to use ip, udp, li-shim or ip, gre routable encapsulation (applies to the 7450 ESS and 7750 SR).
• An optional direction bit in the li-shim; if the use of the direction bit is configured, then a bit from the
intercept-id (configure under mirror-dest) is ‟stolen”. Only a 29b intercept-id is allowed for li-source
entries if the mirror destination is configured to use a direction bit.
Note: For NAT based Lawful Intercept, routable LI encap is available, as well as the
MAC or Layer 2-based encapsulation for NAT LI as configured under config>li>li-
source>nat>ethernet-encap (applies to the 7450 ESS and 7750 SR)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
• Fragmentation of the resulting mirror packet is supported. Note that fragmentation is supported for
NAT LI with the routable encapsulation, but fragmentation is not supported for NAT LI with Ethernet
encapsulation (applies to the 7450 ESS and 7750 SR).
The following restrictions apply to the routable LI encapsulation feature:
• Only applicable to Lawful Intercept and is not available for debug or MS-ISA based Application
Assurance mirrors. MS-ISA based Application Assurance is applicable to the 7450 ESS and 7750 SR.
• Not applicable to PPP, SAToP, or CESoPSN mirror-dest types.
• IPv4 transport only (the routable encapsulation cannot be IPv6).
• On the mirror source node, forwarding of routable encapsulated LI packets out of an R-VPLS interface
is not supported. A mirror destination configured with routable encapsulation can be bound to a routing
instance that also has an R-VPLS bound to it, but the operator must ensure that the destination of the
LI packets is not reachable via any R-VPLS interfaces. Any routable encapsulated LI packets that arrive
at the egress of an R-VPLS interface are discarded. Parallel use of routable LI encapsulation and R-
VPLS in the same routing instance is supported if the mirrored packets do not egress out of the R-VPLS
interface.
• ip | gre encap is supported for the ip-only mirror destination type only, and only for subscriber li-source
entries (CLI, SNMP, or RADIUS based). Subscriber management is not supported on the 7950 XRS.
The contents of the GRE header are all zeros (all optional bits zero, no optional headers/fields
like checksum, offset, key, seq, and so on) except for the Protocol field which contains 0x0800 for
IPv4 packets or 0x86DD for IPv6 packets. The far-end receiver of the intercepted packets must be
configured to expect no GRE options (that is, no key, no checksum, and so on).
• On the source node where LI mirroring occurs, the operator must configure the mirror-dest to inject into
the routing instance (that is, base or VPRN) in which the actual destination address is reachable without
having to hop into a different instance using GRT leaking. In other words, the interface out, which the
packet travels, must exist in the routing instance that is configured in the mirror-dest.
For example, if the LIG is at 110.120.130.140 and is in the base instance, but VPRN-1 has a default
route to the GRT (for example, 0.0.0.0->GRT) then the operator must configure the mirror destination
to inject into the base (even though theoretically address 110.120.130.140 is reachable from VPRN-1).
If the operator attempts to configure the mirror destination to inject into VPRN-1, and VPRN-1 itself
does not have reachability to 110.120.130.140 out an interface that is part of the VPRN, then the mirror
destination is operationally down.
Care must be taken in the configuration of LI mirrors and the destination IP address for the routable LI
encapsulation. Incorrect selection of the destination IP could send packets to unintended destinations (for
example, configuring the encapsulation with a subscriber's IP address), and combinations of mirrors and
routable encapsulation can create loops in the network.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
A simplified Ethernet encapsulation (with an optional Intercept ID) is used for all NAT traffic. When
mirroring NAT traffic, the mirror destination must be of type ether. The customer packet from the (outside)
IP header onwards (including the IP header) is mirrored. The operator has the configuration option of
embedding the intercept ID into the LI packet using an explicit intercept-id command. Both packet formats
are described below:
The contents of the highlighted fields are configurable using the following CLI:
li
li-source service-id
nat
classic-lsn-sub router name ip address
intercept-id id
dslite-lsn-sub router name b4 ipv6-address
intercept-id id
l2-aware-sub sub-ident
intercept-id id
The default Ethernet-header is to use etype 0x600 and system MAC address for both the source and
destination addresses. The configurable Ethertype and Intercept ID is only added when an intercept ID is
present for the subscriber in the NAT configuration.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Table 4: Classic CLI engine properties for classic and mixed configuration mode
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Table 5: Reference types for classic and mixed configuration mode lists the reference types for classic and
mixed configuration mode.
1 Loose reference means that the referenced object does not have to exist before it can be referenced. In
addition, the referenced object can be deleted at any time. For example, li-source references subscriber-
1 even if subscriber-1 is not created on the system. With loose reference, an LI administrator can become
completely independent from regular administrators. An LI administrator can provision a list of targets for
LI without having to wait for the regular administrator to create them (such as SAP and subscribers). In
reverse order, when the regular administrator wants to remove SAPs, there is no need to wait for the LI
administrator to remove the reference beforehand. Loose reference allows LI independence and is the
recommended model for LI provisioning.
2 Hard reference means that the object must first be created in the system before it can be referenced. In
addition, after an object is referenced by LI, the object must be unreferenced before it can be removed. For
example, ip-filter 10 must first exist in the system before it can be referenced using the li>li-source>ip-
filter command.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Classic CLI engine for mixed mode MD-CLI engine for mixed and model-
driven mode
li>li-source (ID with name) /li/li-source (name only)
li>li-source>nat>classic-lsn-sub>router /li/li-source/nat/nat44
li>li-source>nat>dslite-lsn-sub>router /li/li-source/nat/dslite
li>li-source>nat>nat64-lsn-sub>router /li/li-source/nat/nat64
(router ID or name) (router name only)
li>mirror-dest-template>layer-3- /li/mirror-dest-template/layer-3-encap
encap>router (router name only)
(router ID or name)
Compared to classic configuration mode, mixed and model-driven configuration modes primarily use
loose references, where the object referenced does not have to exist in the system before it is referenced.
For example, subscriber-1 is referenced in li-source but does not need to be created on the system
beforehand.
In classic configuration mode, when an LI filter (li-ip-filter, li-ipv6-filter, and li-mac-filter) is configured:
• LI filter entries can be referenced even if the LI filter is not associated (under the config>li>li-filter-
associations context) with a filter in the config>filter context.
• After an LI filter entry is referenced in the li-source, the LI filter association that contains the specified LI
filter cannot be deleted. Therefore, the LI filter association can only be deleted if the LI filter entries are
no longer referenced in the li-source.
• When an LI filter entry is not referenced in li-source:
– If li-filter-associations associates an LI filter name with a filter ID, the deletion of either the filter ID
or the LI filter name, also deletes the li-filter-associations.
– After li-filter-associations associates an LI filter name with filter name, the deletion of either the LI
filter name or the filter name is always denied and no roll back to a configuration mode is completed
without the LI filter name or the filter name.
In mixed configuration mode:
• An LI filter entry can be referenced in li-source, when the LI filter is first associated with a filter in the
config>filter context under the config>li>li-filter-associations context.
• LI filter association between an LI filter name and a filter ID is not allowed.
• After an LI filter entry is referenced in the li-source, the LI filter association that contains the specified LI
filter cannot be deleted. Therefore, the LI filter association can only be deleted if the LI filter entries are
no longer referenced in the li-source.
• When an LI filter entry is not referenced in li-source; after li-filter-associations associates an LI filter
name with filter name, the deletion of either the LI filter name or the filter name is always denied and no
roll back to a configuration mode is completed without the LI filter name or the filter name.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Note: The LI administrator should coordinate configuration mode migrations with the network
administrator, who is normally expected to perform the configuration mode migrations.
In LI there are two configuration modes of operations dictated by using the bof li-separate command:
• When li-separate is enabled, the LI management is controlled by the LI administrator who is given
‟access li” rights to access the LI region. It is highly recommended to consider adjusting the member
profile. See Mandatory LI profile migration for information about profiles.
• When li-separate is disabled (no li-separate), ‟access li” no longer determines who has access to
LI. Instead, access to the LI region is governed by the ‟AAA profile” (MD-CLI) or ‟profile” (Classic
CLI) applied against the user. Inside the ‟AAA profile” there are CLI filters, for example, configure,
show, and clear, to allow or deny which CLI commands can be accessed. It is highly recommended to
consider the following when operating with no li-separate.
– A good practice is to add ‟access li” to users who require access to LI.
– See Mandatory LI profile migration for information about profiles.
Note: When performing a configuration mode migration from classic to mixed or model-driven
configuration mode, migration steps may be required (see Configuration mode migration check
list). Migrating from mixed or model-driven configuration mode to classic configuration mode does
not require any migration steps.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Note: The ‟li access” profile is not a default profile created by SR OS. It is a profile created by
the administrator. Search for entries with configure li, show li, admin save li, and clear li inside
created profiles. A profile that allows LI access typically allows these commands. It is highly
recommended that only users who have access rights to LI apply the LI profile. It is also highly
recommended that all other profiles deny configure li, show li, admin save li, and clear li
commands for all other users.
Profiles are not automatically updated for MD-CLI commands. The administrator is responsible for creating
an LI filter list for the MD-CLI that is equivalent to the classic CLI. This is highly recommended for the li-
separate and no li-separate commands. This step must be performed before the configuration mode
migration.
The existing profile for LI access should, at a minimum, include the following:
config>system>security>profile
li
entry n
match "configure li"
action permit
At minimum, add the following MD-CLI commands to the existing LI profile that grants user access to LI
commands:
entry n
match "li"
action permit
entry n+1
match "edit-config li"
action permit
entry n+2
match "admin save li"
action permit
entry n+3
match "commit"
action permit
entry n+4
match "compare"
action permit
entry n+5
match "tools perform management-interface configuration-mode"
action permit
entry n+6
match "quit-config li"
action permit
entry n+7
match ‟state li”
action permit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
It is recommended to block the following access for all other users. This is accomplished either through
default-action deny or through explicit deny commands. The following are the recommended MD-CLI
commands that deny access to specific users:
entry n
match "li"
action deny
entry n+1
match "edit-config li"
action deny
entry n+2
match "admin save li"
action deny
entry n+3
match ‟state li”
action deny
config>system>security>profile
li
entry n
match "configure li"
action permit
If the network administrator attempts to perform the configuration mode migration and the LI configuration
requires migration, the following message appears:
Action required: LI configuration requires updating before configuration mode
switch
To track details of the LI migration steps for a configuration mode migration, the LI administrator’s
configuration must include ‟access li”. The LI administrator can then use the tools perform system mgmt-
itf>configuration-mode [mixed | model-driven] check li command. This command serves two purposes:
• verifies the steps necessary for the configuration mode migration
• ensures all configuration can be migrated
The LI administrator should follow the instruction returned by the tools command to prepare the LI
configuration for migration. See Migrating from classic to mixed or model-driven configuration mode for
information about the list of migration steps. After completing the migration steps, the network administrator
can execute the config system mgmt-itf configuration-mode [mixed | model-driven] command, and
then the configuration mode migration immediately takes effect.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Note: Failing to execute the admin save li command after a configuration mode migration may
cause LI configuration bootup failure.
If the LI configuration fails to boot because the admin save li command is not performed immediately after
a configuration mode migration, both log 99 and console dump inform the LI configuration field to load
because the LI format does not match the primary configuration format file. The format of both the li.cfg
file and the main configuration must match. To recover, the main configuration must be rolled back to the
previous configuration mode to match the li.cfg file saved format (as indicated by console dump or log 99),
and then rebooted.
It is important not to perform a save li command when there is a configuration mode mismatch between
the main configuration (default config.cfg) file and the li.cfg file. Saving the li.cfg file creates a new file
without any configuration. The previously generated li.cfg file is archived as li.cfg.1 file. If a save li
command is accidentally executed, perform the following steps:
1. Roll back to the previous configuration mode in which the li.cfg.1 file is saved (as indicated by console
dump or log 99).
2. Reboot the system.
3. Restore the li.cfg.1 file using the exec li.cfg.1 command.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
‟one” associated with ip-filter 1, and then apply li-ip-filter ‟one” entry 1 to li-source. Then remove
the ip-filter from li-source and remove the entry from the ip-filter 1 to make li-ip-filter effective. This
migration can help minimize the disruption to the LI service.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
For LI configuration over NETCONF information, see the Datastores and URLs and NETCONF Operations
and Capabilities sections in the 7450 ESS, 7750 SR, 7950 XRS, and VSR System Management Guide.
Figure 10: State engine for redundant service to a redundant mirror service
It is important to note that to provide protection if the active SDP between node A and D fails and the need
to limit the number of lost data for LI the ICB between node A and B must be supported. As a result, when
the SDP connecting nodes A and D fails the data on its way from the source switch to node A and the data
in node A must be directed by the ICB to node B and from there to node D.
This functionality is already supported in when providing pseudo wire redundancy for VLLs and must be
extended to mirror or LI service redundancy.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Figure 11: State engine for redundant service to a non-redundant mirror service
The notable difference with scenarios standard pseudo wire redundancy scenarios is that provided the
customer service is redundant on nodes A and B (Figure 10: State engine for redundant service to a
redundant mirror service and Figure 11: State engine for redundant service to a non-redundant mirror
service) both aggregation node A and Aggregation node B maintain an active Pseudo wire to Node D
who in turn has an active link to the destination switch. If in Figure 10: State engine for redundant service
to a redundant mirror service, the link between D and the destination switch is disconnected, then both
aggregation A and B must switch to use pseudowire connection to Node C.
Figure 12: State engine for a non-redundant service to a redundant mirror service
In the case where a non-redundant service is being mirrored to a redundant mirror service (Figure 12:
State engine for a non-redundant service to a redundant mirror service ) the source aggregation node (A)
can only maintain a pseudo wire to the active destination aggregation node (D). Should the link between
aggregation node D and the destination switch fail then the pseudo wire must switch to the new active
aggregation node (C).
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Figure 14: Remote mirroring example shows a remote mirror service configured as ALA B as the mirror
source and ALA A as the mirror destination. Mirrored traffic ingressing and egressing port 5/2/1 (the
source) on ALA B is handled the following ways:
• Port 5/2/1 is specified as the mirror source port. Parameters are defined to select specific traffic
ingressing and egressing this port.
• Destination parameters are defined to specify where the mirrored traffic is to be sent. In this case,
mirrored traffic is sent to a SAP configured as part of the mirror service on port 3/1/3 on ALA A (the
mirror destination).
• ALA A decodes the service ID and sends the traffic out of port 3/1/3.
• The sniffer is physically connected to this port (3/1/3). SAP, encapsulation requirements, packet slicing,
and mirror classification parameters are configured in the destination parameters.
Figure 15: Mirror configuration and implementation flow shows the process to provision basic mirroring
parameters.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Figure 16: Lawful intercept configuration and implementation flow shows the process to provision LI
parameters.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
• Both destination mirroring service IDs (including service parameters) and config mirror source (defined
in config>mirror>mirror-source) are persistent between router (re)boots and are included in the
configuration saves.
Debug mirror source (defined debug>mirror>mirror-source) and lawful intercept source (defined in
config>li>li-source) criteria configurations are not preserved in a configuration save (admin save).
Debug mirror source configuration can be saved using admin>debug-save. Lawful intercept source
configuration can be saved using config>li>save.
• Subscriber based lawful intercept source criteria is persistent across creation/existence of the
subscriber. Filter or SAP-based LI source criteria is removed from the LI source configuration if the filter
entry or SAP is deleted. Applies to the 7450 ESS and 7950 SR.
• Physical layer problems such as collisions, jabbers, and so on, are not mirrored. Typically, only
complete packets are mirrored.
• Starting and shutting down mirroring:
mirror destinations
– The default state for a mirror destination service ID is shutdown. Execute a no shutdown command
to enable the feature.
– When a mirror destination service ID is shutdown, mirrored packets associated with the service
ID are not accepted from its mirror source or remote source. The associated mirror source is put
into an operationally down mode. Mirrored packets are not transmitted out the SAP or SDP. Each
mirrored packet is silently discarded. If the mirror destination is a SAP, the SAP’s discard counters
are incremented.
– Issuing the shutdown command causes the mirror destination service or its mirror source to be put
into an administratively down state. Mirror destination service IDs must be shut down first to delete a
service ID, or SAP, or SDP association from the system.
mirror sources
– The default state for a mirror source for a mirror-dest service ID is no shutdown. Enter a shutdown
command to deactivate (disable) mirroring from that mirror-source.
– Mirror sources do not need to be shutdown to remove them from the system. When a mirror source
is shutdown, mirroring is terminated for all sources defined locally for the mirror destination service
ID.
The following are lawful intercept configuration restrictions.
To address network management, operators without LI permission cannot view or manage the LI data on
the node nor can they view or manage the data on the Network Management platform.
Entries within LI filters (li-ip-filter, li-ipv6-filter, and li-mac-filter) are typically used to match a specific IP
or MAC address as LI targets. When these LI filters are associated with a filter in the main configuration
region (ip-filter, ipv6-filer, or mac-filter), the system does not insert the entries in a sequence for
performance reasons. For example, it is possible that filter entry 2 can take place before filter entry 1. This
does not affect the LI functionality. However, in cases where the entries overlap, it is possible for a latter
entry to first match the IP or the MAC address.
LI mirroring does not allow the configuration of ports and ingress labels as a source parameter.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
If the separation of access is not required and any administrator can manage lawful intercept or plain
mirroring, then it is not necessary to configure the li-separate parameter in the BOF configuration.
However, to ensure logical separation, the following must occur:
1. An administrator must create a user and configure the user as LI capable
(config>system>security>user>access context). Furthermore, the administrator must assure that
both CLI and SNMP access permission is granted for the LI operator.
2. Finally, before turning the system into two separate administration domains, the CLI user must
be granted a profile that limits the LI operator to those tasks relevant to the job (config>system>
security>profile>li context).
It is important to remember that the LI operator is the only entity who can grant LI permission to any other
user when in li-separate mode.
Provided the above procedure is followed, the LI administrator must decide whether to allow the LI (source)
configuration to be saved onto local media. This is also subject to local regulations.
At this point, the BOF file can be configured with the li-separate and li-local-save parameters. If the local
save is not configured then the LI information must be reconfigured after a system reboot.
Assuming li-separate is configured, the node should be rebooted to activate the separate mode. At
this point the system administrators without LI permission cannot modify, create or view any LI- specific
configurations. For this to occur, the BOF file must be reconfigured and the system rebooted. This
combined with other features prohibits an unauthorized operator from modifying the administrative
separation without notifying the LI administrator.
The following example shows an SNMP configuration with views, access groups, and attempts
parameters.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
A:ALA-23>config>system>security# info
----------------------------------------------
...
user "liuser"
access console snmp li
console
no member "default"
member "liprofile"
exit
snmp
authentication md5 <auth-key> privacy des <priv-key>
group "snmp-li-rw"
exit
exit
...
----------------------------------------------
A:ALA-23>config>system>security#
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
In the configuration, when an LI operator specifies that an entry must be used as an LI entry then this
fact is hidden from all non-LI operators. Modification of a filter entry is not allowed if it is used by LI, see
Configurable filter lock for Lawful Intercept. However, an event is generated, directed to the LI operator,
indicating that the filter has been compromised.
Debug mirroring source has the lowest priority compared to both config mirror source and li source, for
example, when a SAP is referenced in a debug mirror source. It is possible for the config mirror source
or li source to reference the same SAP. The debug mirror source SAP is silently deleted.
The following order applies for both ingress and egress traffic:
• port mirroring (debug only)
• SAP mirroring (debug or LI)
• subscriber mirroring (debug or LI) for the 7450 ESS and 7750 SR
• filter mirroring (debug or LI)
For frames from network ports:
• port mirroring (debug only)
• label mirroring (debug only, ingress only)
• filter mirroring (debug or LI)
Filters can be created by all users that have access to the relevant CLI branches.
When an LI mirror source using a specific service ID is created and is in the no shutdown state, the
corresponding mirror destination on the node cannot be modified (including shutdown/no shutdown
commands) or deleted.
In the separate mode, the anonymity of the source is protected. After source criterion is attached to the LI
source, the following applies:
• In SAP configurations, only modifications that stop the flow of LI data while the customer receives data
is blocked unless the li-filter-lock-state is unlocked, see Configurable filter lock for Lawful Intercept.
• In filter configurations, if a filter entry is attached to the LI source, modification and deletion of both the
filter and the filter entry are blocked.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
LI MAC filters are associated by configuration with normal MAC filters, and entries created in the LI MAC
filters are inserted into the associated normal MAC filter before the filter is downloaded to the data plane
hardware and applied. The combined filter list is not visible to any users which maintains a separation
between LI operators and operators doing other normal filter configuration work (for example, interface
ACLs).
A configurable li-filter-block-reservation is used to reserve a range of entries in the normal filter into
which the LI entries are inserted.
2.6.2.5 LI logging
A logging collector is supported in addition to existing main, security, change, and debug log collectors. LI
log features include the following:
• Only visible to LI operators (such as show command output).
• Encrypted when transmitted (SNMPv3).
• Logging ability can only be created, modified, or deleted by an LI operator.
• The LI user profile must include the ability to manage the LI functions.
*A:ALA-A>config>mirror# info
----------------------------------------------
mirror-dest 103 create
sap 2/1/25:0 create
egress
qos 1
exit
exit
no shutdown
exit
----------------------------------------------
*A:ALA-A>config>mirror#
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
exit
exit
*A:ALA-A>debug>mirror-source# exit
The following example shows a configuration of a remote mirrored service where the source is a port on
ALA-A and the destination is a SAP is on ALA-B:
*A:ALA-A>config>mirror# info
----------------------------------------------
mirror-dest 1000 create
spoke-sdp 2:1 egr-svc-label 7000
no shutdown
exit
----------------------------------------------
*A:ALA-A>config>mirror# exit all
*A:ALA-A# show debug
debug
mirror-source 1000
port 2/1/2 egress ingress
no shutdown
exit
exit
*A:ALA-A#
*A:ALA-B>config>mirror# info
----------------------------------------------
mirror-dest 1000 create
remote-source
far-end 10.10.10.104 ing-svc-label 7000
exit
sap 3/1/2:0 create
egress
qos 1
exit
exit
no shutdown
exit
----------------------------------------------
*A:ALA-B>config>mirror#
2.6.3.1.1 Port
The port command associates a port to a mirror source. The port is identified by the port ID.
The following shows the port-id syntax for the port command:
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Table 7:
port-id: slot/mda/port[.channel]
eth-sat-id esat-id/slot/port
esat keyword
id 1 to 20
pxc-id pxc-id.sub-port
pxc keyword
id 1 to 64
sub-port a, b
aps-id aps-group-id[.channel]
aps keyword
group-id 1 to 64
bundle-type-slot/mda.bundle-num
bundle keyword
bundle-num 1 to 336
ccag-id - ccag-id.path-id[cc-type]:cc-id
ccag keyword
id 1o8
path-id a,b
cc-id 0 to 4094
lag-id 1 to 800
egress keyword
ingress keyword
Note: On the 7950 XRS, the XMA ID takes the place of the MDA.
The defined port can be an Ethernet port, a SONET/SDH path, a multilink bundle, a TDM channel, a Cross
Connect Aggregation Group (CCAG), or a Link Aggregation Group (LAG) ID. If the port is a SONET/SDH
or TDM channel, the channel ID must be specified to identify which channel is being mirrored. When a LAG
ID is specified as the port ID, mirroring is enabled on all ports making up the LAG. Ports that are circuit-
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
emulation (CEM) and PPP bundle groups cannot be used in a mirror source (applies to the 7750 SR).
SONET/SDH applies to the 7450 ESS and 7750 SR, and multilink bundle and TDM channel apply to the
7750 SR.
Mirror sources can be ports in either access or network mode. Port mirroring is supported in the following
combinations:
2.6.3.1.2 SAP
More than one SAP can be associated within a single mirror-source. Each SAP has its own ingress and
egress parameter keywords to define which packets are mirrored to the mirror-dest service ID. A SAP that
is defined within a mirror destination cannot be used in a mirror source.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
entry-id [entry-id …]
2.6.3.1.4 IP filter
IP filters are configured in the config>filter>ip-filter or config>filter>ipv6-filter context. The ip-filter
command causes all the packets matching the explicitly defined list of entry IDs to be mirrored to the mirror
destination specified by the service-id of the mirror source.
Ingress mirrored packets are mirrored to the mirror destination before any ingress packet modifications.
Egress mirrored packets are mirrored to the mirror destination after all egress packet modifications.
2.6.3.1.6 Subscriber
The subscriber command is used to add hosts of a subscriber to a mirroring service. This command
applies to the 7450 ESS and 7750 SR only.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
[sap...]
Note: When mirroring an LAC subscriber, family (IPv4 and IPv6) is not applicable. Both IPv4 and
IPv6 traffic are mirrored.
*A:ALA-A>config>mirror# info
----------------------------------------------
mirror-dest 103 create
sap 2/1/25:0 create
egress
qos 1
exit
exit
no shutdown
exit
----------------------------------------------
*A:ALA-A>config>mirror#
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
*A:ALA-A>debug>mirror-source# exit
*A:ALA-A>config>mirror# info
mirror-source 103
no shutdown
port 2/1/24 egress ingress
ip-filter 2 entry 1
exit
The IP filter and entry referenced by the mirror source must exist and must be applied to an object for
traffic to be mirrored:
*A:ALA-A>config>service>vprn>if# info
----------------------------------------------
sap 1/1/3:63 create
ingress
filter ip 2
exit
exit
----------------------------------------------
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Procedure
Step 1. Select an originating node.
Step 2. Create an SDP ID.
Step 3. Select an encapsulation type.
Step 4. Select the far-end node.
Note: When specifying the far-end IP address, a tunnel is created, the path from Point A to Point
B. Use the show service sdp command to display the qualifying SDPs.
On the mirror source router, configure an SDP pointing toward the mirror destination router (or use an
existing SDP).
On the mirror destination router, configure an SDP pointing toward the mirror source router (or use an
existing SDP).
The following example shows SDP configurations on both the mirror source and mirror destination routers.
*A:ALA-A>config>service# info
-------------------------------------------
sdp 1 create
description "to-10.10.10.104"
far-end 10.10.10.104
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
no shutdown
exit
-------------------------------------------
*A:ALA-A>config>service#
*A:ALA-B>config>service# info
----------------------------------------------
sdp 4 create
description "to-10.10.10.103"
far-end 10.10.10.103
no shutdown
exit
-------------------------------------------
*A:ALA-B>config>service#
The following example shows the CLI output showing the configuration of remote mirrored service 1216.
The traffic ingressing and egressing port 1/1/60 on 10.10.0.92 (ALA-B) is mirrored to the destination SAP
1/1/58:0 on ALA-A.
*A:ALA-A>config>mirror# info
----------------------------------------------
mirror-dest 1216 create
description "Receiving mirror traffic from .91"
remote-source
far-end 10.10.0.91 ing-svc-label 5678
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
exit
sap 1/1/58:0 create
egress
qos 1
exit
exit
no shutdown
exit
----------------------------------------------
*A:ALA-A>config>mirror#
The following example shows the remote mirror destination configured on ALA-B:
*A:ALA-B>config>mirror># info
----------------------------------------------
mirror-dest 1216 create
description "Sending mirrored traffic to .92"
fc h1
spoke-sdp 4:60 create
egress
vc-label 5678
exit
no shutdown
exit
slice-size 128
no shutdown
exit
----------------------------------------------
*A:ALA-B>config>mirror#
The following example shows the mirror source configuration for ALA-B:
*A:ALA-B# config>mirror#info
mirror-source 1216
port 1/1/60 egress ingress
no shutdown
exit
*A:ALA-B#
The following example shows the SDP configuration from ALA-A to ALA-B (SDP 2) and the SDP
configuration from ALA-B to ALA-A (SDP 4):
*A:ALA-A>config>service>sdp# info
---------------------------------------------
description "GRE-10.10.0.91"
far-end 10.10.0.01
no shutdown
---------------------------------------------
*A:ALA-A>config>service>sdp#
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
*A:ALA-B>config>service>sdp# info
----------------------------------------------
description "GRE-10.10.20.92"
far-end 10.10.10.103
no shutdown
----------------------------------------------
*A:ALA-B>config>service>sdp#
A:ALA-48>config# info
#--------------------------------------------------
...
(LI Source Config)
li-source 1
sap 1/5/5:1001 egress ingress
no shutdown
exit
li-source 2
subscriber "test" sla-profile "test" fc l2 ingress egress
no shutdown
exit
li-source 3
mac-filter 10 entry 1
no shutdown
exit
li-source 4
ip-filter 11 entry 1
no shutdown
exit
...
(LI Log Config)
log-id 1
filter 1
from li
to session
exit
log-id 11
from li
to memory
exit
log-id 12
from li
to snmp
exit
...
#--------------------------------------------------
A:ALA-48>config#
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
Figure 19: State engine for redundant service to a redundant mirror service
The mirror traffic needs to be forwarded from configured debug mirror-source together with mirror-dest/
remote-source (ICB or non-ICB) to either SAP endpoint or SDP endpoint.
A SAP endpoint is an endpoint with a SAP and with or without an additional ICB spoke. An SDP endpoint
is an endpoint with regular and ICB spokes.
Only one tx-active can be chosen for either SAP endpoint or SDP endpoint. Traffic ingressing into a
remote-source ICB has only ingressing traffic while an ICB spoke has only egressing traffic.
The ingressing traffic to a remote-source ICB cannot be forwarded out of another ICB spoke.
The following example shows a high-level summary of a configuration; it is not intended to be syntactically
correct:
Node A:
config mirror mirror-dest 100
endpoint X
sdp to-C endpoint X
sdp to-D endpoint X
sdp to-B endpoint X icb // connects to B’s remote-source IP-A, traffic A->B only
remote-source IP-B icb // connects to B’s sdp to-A, traffic B->A only
Node B:
config mirror mirror-dest 100
endpoint X
sdp to-C endpoint X
sdp to-D endpoint X
sdp to-A endpoint X icb // connects to A’s remote-source IP-B, traffic B->A only
remote-source IP-A icb // connects to Node A’s sdp to-B, traffic A->B only
Node C:
config mirror mirror-dest 100
endpoint X
sap lag-1:0 endpoint X
sdp to-D endpoint X icb // connects to D’s remote-source IP-C, traffic C->D only
remote-source IP-A
remote-source IP-B
remote-source IP-D icb // connects to D’s sdp to-C, traffic D->C only
Node D:
config mirror mirror-dest 100
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
endpoint X
sap lag-1:0 endpoint X
sdp to-C endpoint X icb // connects to C’s remote-source IP-D, traffic D->C only
remote-source IP-A
remote-source IP-B
remote-source IP-C icb // connects to C’s sdp to-D, traffic C->D only
*A:ALA-A>config>mirror# info
----------------------------------------------
mirror-dest 103 create
no shutdown
fc be
remote-source
exit
sap 3/1/5:0 create
egress
qos 1
exit
exit
slice-size 128
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
*A:ALA-A>debug>mirror-source#
SR3># debug
debug# mirror-source 104
debug>mirror-source# port 551/1/2 ingress egress
debug>mirror-source# no shutdown
*A:ALA-A>config>mirror# info
----------------------------------------------
mirror-dest 104 create
remote-source
far-end 10.10.10.3 ing-svc-label 3500
exit
sap 2/1/15:0 create
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
egress
qos 1
exit
exit
no shutdown
exit
A:SR3>config>mirror# info
----------------------------------------------
mirror-dest 104 create
spoke-sdp 4:60 egress vc-label 3500
no shutdown
exit
----------------------------------------------
A:SR3>config>mirror#
In the example, the mirror-destination service ID 105 was removed from the configuration on ALA-A and
ALA-B, therefore, it does not appear in the info command output.
*A:ALA-A>config>mirror# info
----------------------------------------------
----------------------------------------------
*A:ALA-A>config>mirror# exit
*A:ALA-B>config>mirror# info
----------------------------------------------
----------------------------------------------
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Mirror services
*A:ALA-B>config>mirror# exit
Because the mirror destination was removed from the configuration on ALA-B, the port information was
automatically removed from the debug mirror-source configuration.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
3.1.2 LSP ping and LSP trace for an LSP using a BGP IPv4 or IPv6 label route
This feature adds support of the Target FEC Stack TLV of type BGP Labeled IPv4 /32 Prefix as defined in
RFC 8029.
The new TLV is structured as shown in Figure 20: Target FEC stack TLV for a BGP labeled IPv4 and IPv6
prefixes.
Figure 20: Target FEC stack TLV for a BGP labeled IPv4 and IPv6 prefixes
The user issues a LSP ping using the existing CLI command and specifying a new type of prefix:
oam lsp-ping bgp-label prefix ip-prefix/mask [src-ip-address ip-address] [fc fc-name [profile {in | out}]]
[size octets] [ttl label-ttl] [send-count send-count] [timeout timeout] [interval interval] [path-destination
ip-address [interface if-name | next-hop ip-address]] [detail]
This feature supports BGP label IPv4 prefixes with a prefix length of 32 bits only and supports IPv6
prefixes with a prefix length of 128 bits only.
The path-destination option is used to exercise specific ECMP paths in the network when the LSR
performs hashing on the MPLS packet.
Similarly, the user issues a LSP trace using the following command:
oam lsp-trace bgp-label prefix ip-prefix/mask [src-ip-address ip-address] [fc fc-name [profile {in | out}]]
[max-fail no-response-count] [probe-count probes-per-hop] [size octets] [min-ttl min-label-ttl] [max-ttl
max-label-ttl] [timeout timeout] [interval interval] [path-destination ip-address [interface if-name | next-
hop ip-address]] [detail]
The following is the process to send and respond to an LSP ping or LSP trace packet. This process is valid
when the downstream mapping is set to the DSMAP TLV. The detailed procedures with the DDMAP TLV
are presented in Using DDMAP TLV in LSP stitching and LSP hierarchy.
• The next-hop of a BGP label route for a IPv4 /32 or an IPv6 /128 can be resolved to either an IPv4
transport tunnel or to an IPv6 transport tunnel. Thus, the sender node encapsulates the packet of the
echo request message with a label stack which consists of the transport label stack as the outer labels
and the BGP label as the inner label.
If the packet expires on a node which acts as an LSR for the outer transport LSP, and does not
have context for the BGP label prefix, the outer label in the stack is validated and if the validation is
successful it replies as in the case when it receives an echo request message for an LDP FEC which is
stitched to a BGP IPv4 label route. In other words, it replies with return code 8 Label switched at stack-
depth <RSC>.
• An LSR node which is the next-hop for the BGP label prefix as well as the LER node which originated
the BGP label prefix have full context for the BGP IPv4 or IPv6 target FEC stack and can therefore
perform full validation of it.
• If a BGP IPv4 label route is stitched to an LDP FEC, the egress LER for the resulting LDP FEC does not
have context for the BGP IPv4 target FEC stack in the echo request message and replies with return
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
code 4 Replying router has no mapping for the FEC at stack- depth <RSC>. This is the same behavior
as that of an LDP FEC which is stitched to a BGP IPv4 label route when the echo request message
reaches the egress LER for the BGP prefix.
Note that only BGP label IPv4 /32 prefixes and BGP IPv6 /128 prefixes are supported because only these
are usable as tunnels on the Nokia router platforms. The BGP IPv4 or IPv6 label prefix is also supported
with the prefix SID attribute if BGP segment routing is enabled on the routers participating in the path of the
tunnel.
The responder node must have an IPv4 address to use as the source address of the IPv4 echo reply
packet. SR OS uses the system interface IPv4 address. When an IPv4 BGP label route resolves to an IPv6
next-hop and uses an IPv6 transport tunnel, any LSR or LER node which responds to an lsp-ping or lsp-
trace message must have an IPv4 address assigned to the system interface or the reply is not sent. In the
latter case, the lsp-ping or lsp-trace probe times out at the sender node.
Similarly, the responder node must have an IPv6 address assigned to the system interface so that it gets
used in the IPv6 echo reply packet in the case of a BGP-LU IPv6 label route when resolved to an IPv4 or
an IPv4-mapped IPv6 next-hop which itself is resolved to an IPv4 transport tunnel.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• If the user initiates an lsp-trace of the FEC with the path-destination option specified but configured
not to include a downstream mapping TLV in the MPLS echo request message using the CLI command
downstream-map-tlv {none}, then the sender node does not include the Downstream Mapping TLV.
However, the user can use the interface option, part of the same path-destination option, to direct the
echo request message at the sender node to be sent out a specific outgoing interface which is part of
an ECMP path set for the FEC.
• If the user initiates an lsp-trace of the FEC with the path-destination option specified, then the sender
node includes the multipath information in the Downstream Mapping TLV in the echo request message
(multipath type=8). The path-destination option allows the user to exercise a specific path of a FEC
in the presence of ECMP. This is performed by having the user enter a specific address from the 127/8
range which is then inserted in the multipath type 8 information field of the Downstream Mapping TLV.
The CPM code at each LSR in the path of the target FEC runs the same hash routine as the data path
and replies in the Downstream Mapping TLV with the specific outgoing interface the packet would have
been forwarded to if it did not expire at this node and if DEST IP field in the packet’s header was set to
the 127/8 address value inserted in the multipath type 8 information. This hash is based on:
– the {incoming port, system interface address, label-stack} when the lsr-load-balancing option of
the incoming interface is configured to lbl-only. In this case the 127/8 prefix address entered in the
path-destination option is not used to select the outgoing interface. All packets received with the
same label stack maps to a single and same outgoing interface.
– the {incoming port, system interface address, label-stack, SRC/DEST IP fields of the packet} when
the lsr-load-balancing option of the incoming interface is configured to lbl-ip. The SRC IP field
corresponds to the value entered by the user in the src-ip-address option (default system IP
interface address). The DEST IP field corresponds to the 127/8 prefix address entered in the path-
destination option. In this case, the CPM code maps the packet, as well as any packet in a sub-
range of the entire 127/8 range, to one of the possible outgoing interface of the FEC.
– the {SRC/DEST IP fields of the packet} when the lsr-load-balancing option of the incoming
interface is configured to ip-only. The SRC IP field corresponds to the value entered by the user in
the src-ip-address option (default system IP interface address). The DEST IP field corresponds to
the 127/8 prefix address entered in the path-destination option. In this case, the CPM code maps
the packet, as well as any packet in a sub-range of the entire 127/8 range, to one of the possible
outgoing interface of the FEC.
In all above cases, the user can use the interface option, part of the same path-destination option, to
direct the echo request message at the sender node to be sent out a specific outgoing interface which is
part of an ECMP path set for the FEC.
Note that if the user enabled the system-ip-load-balancing hash option (config>system>system-ip-
load-balancing), then the LSR hashing is modified by applying the system IP interface, with differing
bit-manipulation, to the hash of packets of all three options (lbl-only, lbl-ip, ip-only). This system level
option enhances the LSR packet distribution such that the probability of the same flow selecting the
same ECMP interface index or LAG link index at two consecutive LSR nodes is minimized.
• The ldp-treetrace tool always uses the multipath type=8 and inserts a range of 127/8 addresses
instead of a single address in order multiple ECMP paths of an LDP FEC. As such, it behaves the same
way as the lsp-trace with the path-destination option enabled described above.
• Note that the path-destination option can also be used to exercise a specific ECMP path of an LDP
FEC, which is tunneled over a RSVP LSP or of an LDP FEC stitched to a BGP FEC in the presence
of BGP ECMP paths. The user must however enable the use of the new DDMAP TLV either globally
(config>test-oam>mpls-echo-request-downstream-map ddmap) or within the specific ldp-treetrace
or lsp-trace test (downstream-map-tlv ddmap option).
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The DDMAP TLV format is derived from the DSMAP TLV format. The key change is that variable length
and optional fields have been converted into sub-TLVs. The fields have the same use and meaning as in
RFC 8029 as shown in Figure 22: FEC stack change sub-TLV.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The operation type specifies the action associated with the FEC stack change. The following operation
types are defined.
Type # Operation
------ ---------
1 Push
2 Pop
More details on the processing of the fields of the FEC stack change sub-TLV are provided later in this
section.
The user can configure which downstream mapping TLV to use globally on a system by using the following
command:
configure test-oam mpls-echo-request-downstream-map {dsmap | ddmap}
This command specifies which format of the downstream mapping TLV to use in all LSP trace packets and
LDP tree trace packets originated on this node. The Downstream Mapping (DSMAP) TLV is the original
format in RFC 4379 (obsoleted by RFC 8029) and is the default value. The Downstream Detailed Mapping
(DDMAP) TLV is the new enhanced format specified in RFC 6424 and RFC 8029.
This command applies to LSP trace of an RSVP P2P LSP, a MPLS-TP LSP, a BGP label route, or LDP
unicast FEC, and to LDP tree trace of a unicast LDP FEC. It does not apply to LSP trace of an RSVP
P2MP LSP which always uses the DDMAP TLV.
The global Downstream Mapping TLV setting impacts the behavior of both OAM LSP trace packets and
SAA test packets of type lsp-trace and is used by the sender node when one of the following events
occurs:
• An SAA test of type lsp-trace is created (not modified) and no value is specified for the per-test
downstream-map-tlv {dsmap | ddmap | none} option. In this case the SAA test downstream-map-tlv
value defaults to the global mpls-echo-request-downstream-map value.
• An OAM test of type lsp-trace test is executed and no value is specified for the per-test downstream-
map-tlv {dsmap | ddmap | none} option. In this case, the OAM test downstream-map-tlv value
defaults to the global mpls-echo-request-downstream-map value.
A consequence of the rules above is that a change to the value of mpls-echo-request-downstream-map
option does not affect the value inserted in the downstream mapping TLV of existing tests.
The following are the details of the processing of the new DDMAP TLV:
• When either the DSMAP TLV or the DDMAP TLV is received in an echo request message, the
responder node includes the same type of TLV in the echo reply message with the correct downstream
interface information and label stack information.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• If an echo request message without a Downstream Mapping TLV (DSMAP or DDMAP) expires at a
node which is not the egress for the target FEC stack, the responder node always includes the DSMAP
TLV in the echo reply message. This can occur in the following cases:
– The user issues a LSP trace from a sender node with a min-ttl value higher than 1 and a max-ttl
value lower than the number of hops to reach the egress of the target FEC stack. This is the sender
node behavior when the global configuration or the per-test setting of the Downstream Mapping TLV
is set to DSMAP.
– The user issues a LSP ping from a sender node with a ttl value lower than the number of hops
to reach the egress of the target FEC stack. This is the sender node behavior when the global
configuration of the Downstream Mapping TLV is set to DSMAP.
– The behavior in (a) is changed when the global configuration or the per-test setting of the
Downstream Mapping TLV is set to DDMAP. The sender node includes in this case the DDMAP TLV
with the Downstream IP address field set to the all-routers multicast address as per Section 3.4 of
RFC 8029. The responder node then bypasses the interface and label stack validation and replies
with a DDMAP TLV with the correct downstream information for the target FEC stack.
• A sender node never includes the DSMAP or DDMAP TLV in an lsp-ping message.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
When the user configures the use of the DDMAP TLV on a trace for an LSP that does not undergo stitching
or tunneling operation in the network, the procedures at the sender and responder nodes are the same as
in the case of the existing DSMAP TLV.
This feature however introduces changes to the target FEC stack validation procedures at the sender
and responder nodes in the case of LSP stitching and LSP hierarchy. These changes pertain to the
processing of the new FEC stack change sub-TLV in the new DDMAP TLV and the new return code 15
Label switched with FEC change. The following is a description of the main changes which are a superset
of the rules described in Section 4 of RFC 6424 to allow greater scope of interoperability with other vendor
implementations.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
FEC TLV and resend the echo request message with the same TTL value as described in (5) below.
The responder node performs exactly the same operation as described in this step until all FECs are
popped or until the topmost FEC in the Target FEC Stack TLV matches the tunneled or stitched FEC. In
the latter case, processing of the Target FEC Stack TLV follows again steps (1) or (2).
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The CLI options for lsp-ping and lsp-trace are under OAM and SAA for the following types of Segment
Routing tunnels:
• SR-ISIS and SR-OSPF node SID tunnels
• SR-TE LSP
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• Prefix Length
The Prefix Length field is one octet, it gives the length of the prefix in bits (values can be 1 to 128).
• Protocol
This field is set to 1 if the IGP protocol is OSPF and is set to 2 if the IGP protocol is IS-IS.
An SR-TE LSP, as a hierarchical LSP, uses the Target FEC Stack TLV, which contains a FEC element for
each node SID and for each adjacency SID in the path of the SR-TE LSP. Because the SR-TE LSP does
not instantiate state in the LSR other than the ingress LSR, MPLS OAM is just testing a hierarchy of node
SID and adjacency SID segments toward the destination of the SR-TE LSP. The format of the node-SID
is as illustrated above. Figure 25: IGP-Adjacency segment ID illustrates the format for the IGP-Adjacency
segment ID is as follows:
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
This field specifies the advertising node identifier. When the Protocol field is set to 1, then the 32
rightmost bits represent the OSPF router ID. If the Protocol field is set to 2, this field carries the 48-bit
IS-IS system ID.
• Receiving Node Identifier
This field specifies the downstream node identifier. When the Protocol field is set to 1, then the 32
rightmost bits represent OSPF router ID. If the Protocol field is set to 2, this field carries the 48-bit IS-IS
system ID.
Both lsp-ping and lsp-trace apply to the following contexts:
• SR-ISIS or SR-OSPF shortest path IPv4 tunnel
• SR-ISIS or SR-OSPF3 (OSPFv3 instance ID 0-31) shortest path IPv6 tunnel
• IS-IS SR-TE IPv4 LSP and OSPF SR-TE IPv4 LSP
• IS-IS SR-TE IPv6 LSP
• SR-ISIS IPv4 tunnel stitched to an LDP IPv4 FEC
• BGP IPv4 LSP or BGP IPv6 LSP (with an IPv4 or an IPv4-mapped-IPv6 next-hop) resolved over an SR-
ISIS IPv4 tunnel, an SR-OSPF IPv4 tunnel, or an SR-TE IPv4 LSP. This includes support for BGP LSP
across AS boundaries and for ECMP next-hops at the transport tunnel level.
• BGP IPv4 LSP (with an IPv6 next-hop) or a BGP IPv6 LSP resolved over an SR-ISIS IPv6 tunnel, an
SR-OSPF3 IPv6 tunnel, or an SR-TE IPv6 LSP; including support for BGP LSP across AS boundaries
and for ECMP next-hops at the transport tunnel level.
• SR-ISIS or SR-OSPF IPv4 tunnel resolved over IGP IPv4 shortcuts using RSVP-TE LSPs
• SR-ISIS IPv6 tunnel resolved over IGP IPv4 shortcuts using RSVP-TE LSPs
• LDP IPv4 FEC resolved over IGP IPv4 shortcuts using SR-TE LSPs
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Considering this topology, the following is an output example for LSP-PING on DUT-A for target Node SID
of DUT-F:
The following is an output example for LSP-TRACE on DUT-A for target node SID of DUT-F (DSMAP TLV):
The following is an output example for LSP-TRACE on DUT-A for target node SID of DUT-F (DDMAP
TLV):
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
than the incoming label stack size. The return code in the echo reply message can be one of:
‟rc=4(NoFECMapping)”, ‟rc=5(DSMappingMismatched)”, or ‟rc=10(DSRtrUnmatchLabel)”.
This is true when the downstream-map-tlv option is set to any of the ddmap, dsmap, or none values.
The following are example outputs for lsp-ping and lsp-trace for some SR-TE LSPs. The first one uses
a path with strict hops, each corresponding to an adjacency SID, while the second one uses a path with
loose hops, each corresponding to a node SID. Assume the topology shown in Figure 27: Testing MPLS
OAM with SR-TE LSP.
The following is an output example for LSP-PING and LSP-TRACE on DUT-A for strict-hop adjacency SID
SR-TE LSP, where:
• source = DUT-A
• destination = DUT-F
• path = A-B, B-C, C-E, E-D, D-F
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The following is an output example for LSP-PING and LSP-TRACE on DUT-A for loose-hop Node SID SR-
TE LSP, where:
• source = DUT-A
• destination = DUT-F
• path = A, B, C, E
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• The ICMP tunneling feature is supported for SR-ISIS tunnel stitched to a LDP FEC.
The following is an output example of the lsp-trace command with the DDMAP TLV for LDP-to-SR
direction (symmetric topology LDP-SR-LDP):
The following is an output example of the lsp-trace command with the DDMAP TLV for SR-to-LDP
direction (symmetric topology LDP-SR-LDP):
3.1.7.5 Operation on a BGP IPv4 LSP resolved over an SR-ISIS IPv4 tunnel, SR-OSPF IPv4
tunnel, or SR-TE IPv4 LSP
SR OS enhances lsp-ping and lsp-trace of a BGP IPv4 LSP resolved over an SR-ISIS IPv4 tunnel, an
SR-OSPF IPv4 tunnel, or an SR-TE IPv4 LSP. The SR OS enhancement reports the full set of ECMP next-
hops for the transport tunnel at both ingress PE and at the ABR or ASBR. The list of downstream next-
hops is reported in the DSMAP or DDMAP TLV.
When the user initiates an lsp-trace of the BGP IPv4 LSP with the path-destination option specified,
the CPM hash code, at the responder node, selects the outgoing interface to be returned in DSMAP or
DDMAP. This decision is based on the modulo operation of the hash value on the label stack or the IP
headers (where the DST IP is replaced by the specific 127/8 prefix address in the multipath type 8 field of
the DSMAP or DDMAP) of the echo request message and the number of outgoing interfaces in the ECMP
set.
Figure 28: Example topology for BGP over SR-OSPF, SR-TE (OSPF), SR-ISIS, and SR-TE (ISIS) depicts
an example topology used in the subsequent BGP over SR-OSPF, BGP over SR-TE (OSPF), BGP over
SR-ISIS, and BGP over SR-TE (ISIS) examples.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Figure 28: Example topology for BGP over SR-OSPF, SR-TE (OSPF), SR-ISIS, and SR-TE (ISIS)
The following are example outputs of the lsp-trace command for a hierarchical tunnel consisting of a BGP
IPv4 LSP resolved over an SR-ISIS IPv4 tunnel, an SR-OSPF IPv4 tunnel, or an SR-TE IPv4 LSP.
BGP over SR-OSPF example output:
*A:Dut-A# oam lsp-trace bgp-label prefix 11.21.1.6/32 detail downstream-map-tlv ddmap path-
destination 127.1.1.
lsp-trace to 11.21.1.6/32: 0 hops min, 0 hops max, 168 byte packets
1 10.20.1.3 rtt=2.31ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.5.5 ifaddr=10.10.5.5 iftype=ipv4Numbered MRU=1496
label[1]=27506 protocol=5(OSPF)
label[2]=262137 protocol=2(BGP)
DS 2: ipaddr=10.10.11.4 ifaddr=10.10.11.4 iftype=ipv4Numbered MRU=1496
label[1]=27406 protocol=5(OSPF)
label[2]=262137 protocol=2(BGP)
DS 3: ipaddr=10.10.11.5 ifaddr=10.10.11.5 iftype=ipv4Numbered MRU=1496
label[1]=27506 protocol=5(OSPF)
label[2]=262137 protocol=2(BGP)
2 10.20.1.4 rtt=4.91ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.9.6 ifaddr=10.10.9.6 iftype=ipv4Numbered MRU=1492
label[1]=27606 protocol=5(OSPF)
label[2]=262137 protocol=2(BGP)
3 10.20.1.6 rtt=4.73ms rc=3(EgressRtr) rsc=2
3 10.20.1.6 rtt=5.44ms rc=3(EgressRtr) rsc=1
*A:Dut-A#
*A:Dut-A# oam lsp-trace bgp-label prefix 11.21.1.6/32 detail downstream-map-tlv ddmap path-
destination 127.1.1.1
lsp-trace to 11.21.1.6/32: 0 hops min, 0 hops max, 236 byte packets
1 10.20.1.2 rtt=2.13ms rc=3(EgressRtr) rsc=4
1 10.20.1.2 rtt=1.79ms rc=8(DSRtrMatchLabel) rsc=3
DS 1: ipaddr=10.10.4.4 ifaddr=10.10.4.4 iftype=ipv4Numbered MRU=1492
label[1]=3 protocol=5(OSPF)
label[2]=262104 protocol=5(OSPF)
label[3]=262139 protocol=2(BGP)
2 10.20.1.4 rtt=3.24ms rc=3(EgressRtr) rsc=3
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
A:Dut-A# oam lsp-trace bgp-label prefix 11.21.1.6/32 detail downstream-map-tlv ddmap path-
destination 127.1.1.1
lsp-trace to 11.21.1.6/32: 0 hops min, 0 hops max, 168 byte packets
1 10.20.1.3 rtt=3.33ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.5.5 ifaddr=10.10.5.5 iftype=ipv4Numbered MRU=1496
label[1]=28506 protocol=6(ISIS)
label[2]=262139 protocol=2(BGP)
DS 2: ipaddr=10.10.11.4 ifaddr=10.10.11.4 iftype=ipv4Numbered MRU=1496
label[1]=28406 protocol=6(ISIS)
label[2]=262139 protocol=2(BGP)
DS 3: ipaddr=10.10.11.5 ifaddr=10.10.11.5 iftype=ipv4Numbered MRU=1496
label[1]=28506 protocol=6(ISIS)
label[2]=262139 protocol=2(BGP)
2 10.20.1.4 rtt=5.12ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.9.6 ifaddr=10.10.9.6 iftype=ipv4Numbered MRU=1492
label[1]=28606 protocol=6(ISIS)
label[2]=262139 protocol=2(BGP)
3 10.20.1.6 rtt=8.41ms rc=3(EgressRtr) rsc=2
3 10.20.1.6 rtt=6.93ms rc=3(EgressRtr) rsc=1
*A:Dut-A# oam lsp-trace bgp-label prefix 11.21.1.6/32 detail downstream-map-tlv ddmap path-
destination 127.1.1.1
lsp-trace to 11.21.1.6/32: 0 hops min, 0 hops max, 248 byte packets
1 10.20.1.2 rtt=2.60ms rc=3(EgressRtr) rsc=4
1 10.20.1.2 rtt=2.29ms rc=8(DSRtrMatchLabel) rsc=3
DS 1: ipaddr=10.10.4.4 ifaddr=10.10.4.4 iftype=ipv4Numbered MRU=1492
label[1]=3 protocol=6(ISIS)
label[2]=262094 protocol=6(ISIS)
label[3]=262139 protocol=2(BGP)
2 10.20.1.4 rtt=4.04ms rc=3(EgressRtr) rsc=3
2 10.20.1.4 rtt=4.38ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.9.6 ifaddr=10.10.9.6 iftype=ipv4Numbered MRU=1492
label[1]=3 protocol=6(ISIS)
label[2]=262139 protocol=2(BGP)
3 10.20.1.6 rtt=6.64ms rc=3(EgressRtr) rsc=2
3 10.20.1.6 rtt=5.94ms rc=3(EgressRtr) rsc=1
Assuming the topology in Figure 29: Example topology for BGP over SR-ISIS in inter-AS option C and
BGP over SR-TE (ISIS) in inter-AS option C has the addition of an External Border Gateway Protocol
(eBGP) peering between nodes B and C, the BGP IPv4 LSP spans the AS boundary and resolves to an
SR-ISIS tunnel or an SR-TE LSP within each AS.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Figure 29: Example topology for BGP over SR-ISIS in inter-AS option C and BGP over SR-TE (ISIS) in
inter-AS option C
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
3.1.7.6 Operation on an SR-ISIS IPv4 tunnel, IPv6 tunnel, or SR-OSPF IPv4 tunnel resolved
over IGP IPv4 shortcuts using RSVP-TE LSPs
When IGP shortcut is enabled in an IS-IS or an OSPF instance and the family SRv4 or SRv6 is set to
resolve over RSVP-TE LSPs, a hierarchical tunnel is created whereby an SR-ISIS IPv4 tunnel, an SR-ISIS
IPv6 tunnel, or an SR-OSPF tunnel resolves over the IGP IPv4 shortcuts using RSVP-TE LSPs.
The following example outputs are of the lsp-trace command for a hierarchical tunnel consisting of an SR-
ISIS IPv4 tunnel and an SR-OSPF IPv4 tunnel, resolving over an IGP IPv4 shortcut using a RSVP-TE LSP.
The topology, as shown in Figure 30: Example topology for SR-ISIS over RSVP-TE and SR-OSPF over
RSVP-TE, is used for the following SR-ISIS over RSVP-TE and SR-OSPF over RSVP-TE example
outputs.
Figure 30: Example topology for SR-ISIS over RSVP-TE and SR-OSPF over RSVP-TE
*A:Dut-F# oam lsp-trace sr-isis prefix 10.20.1.1/32 detail path-destination 127.1.1.1 igp-
instance 1
lsp-trace to 10.20.1.1/32: 0 hops min, 0 hops max, 180 byte packets
1 10.20.1.4 rtt=5.05ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.4.2 ifaddr=10.10.4.2 iftype=ipv4Numbered MRU=1500
label[1]=262121 protocol=4(RSVP-TE)
label[2]=28101 protocol=6(ISIS)
2 10.20.1.2 rtt=5.56ms rc=8(DSRtrMatchLabel) rsc=2
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
*A:Dut-F# oam lsp-trace sr-ospf prefix 10.20.1.1/32 detail path-destination 127.1.1.1 igp-
instance 2
lsp-trace to 10.20.1.1/32: 0 hops min, 0 hops max, 180 byte packets
1 10.20.1.4 rtt=3.24ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.4.2 ifaddr=10.10.4.2 iftype=ipv4Numbered MRU=1500
label[1]=262125 protocol=4(RSVP-TE)
label[2]=27101 protocol=5(OSPF)
2 10.20.1.2 rtt=5.77ms rc=8(DSRtrMatchLabel) rsc=2
DS 1: ipaddr=10.10.1.1 ifaddr=10.10.1.1 iftype=ipv4Numbered MRU=1500
label[1]=262124 protocol=4(RSVP-TE)
label[2]=27101 protocol=5(OSPF)
3 10.20.1.1 rtt=7.19ms rc=3(EgressRtr) rsc=2
3 10.20.1.1 rtt=8.41ms rc=3(EgressRtr) rsc=1
3.1.7.7 Operation on an LDP IPv4 FEC resolved over IGP IPv4 shortcuts using SR-TE LSPs
When IGP shortcut is enabled in an IS-IS or an OSPF instance and the family IPv4 is set to resolve over
SR-TE LSPs, a hierarchical tunnel is created whereby an LDP IPv4 FEC resolves over the IGP IPv4
shortcuts using SR-TE LSPs.
The following are example outputs of the lsp-trace command for a hierarchical tunnel consisting of a LDP
IPv4 FEC resolving over a IGP IPv4 shortcut using a SR-TE LSP.
The topology, as shown in Figure 31: Example topology for LDP over SR-TE (ISIS) and LDP over SR-TE
(OSPF), is used for the following LDP over SR-TE (ISIS) and LDP over SR-TE (OSPF) example outputs.
Figure 31: Example topology for LDP over SR-TE (ISIS) and LDP over SR-TE (OSPF)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
10.20.1.1/32 262070U --
10.20.1.4:0 --
--
10.20.1.1/32 -- 262138
fc00::a14:101[0] --
--
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
-------------------------------------------------------------------------------
No. of IPv4 Prefix Bindings: 7
===============================================================================
===============================================================================
LDP Bindings (IPv4 LSR ID 10.20.1.6)
(IPv6 LSR ID fc00::a14:106)
===============================================================================
Label Status:
U - Label In Use, N - Label Not In Use, W - Label Withdrawn
WP - Label Withdraw Pending, BU - Alternate For Fast Re-Route
e - Label ELC
FEC Flags:
LF - Lower FEC, UF - Upper FEC, M - Community Mismatch, BA - ASBR Backup FEC
===============================================================================
LDP IPv4 Prefix Bindings
===============================================================================
Prefix IngLbl EgrLbl
Peer EgrIntf/LspId
EgrNextHop
-------------------------------------------------------------------------------
10.20.1.1/32 -- 262143
10.20.1.1:0 LspId 655467
10.20.1.1
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
10.20.1.1/32 262089U --
10.20.1.4:0 --
--
10.20.1.1/32 -- 262143
fc00::a14:101[0] --
--
-------------------------------------------------------------------------------
No. of IPv4 Prefix Bindings: 7
===============================================================================
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The endpoint and color commands test the active path (or instance) of the identified SR policy only.
The lsp-ping and lsp-trace commands can test one segment list at a time by specifying one segment list
of the active instance of the policy or active candidate path. In this case, the segment-list id command is
configured or segment list 1 is tested by default. The segment-list ID corresponds to the same index that
was used to save the SR policy instance in the SR policy database. In the case of a static SR policy, the
segment-list ID matches the segment list index entered in the configuration. In both the static and the BGP
SR policies, the segment-list ID matches the index displayed for the segment list in the output of the show
command of the policies.
The exercised segment list corresponds to a single SR-TE path with its own NHLFE or super NHLFE in the
data path.
The ICMP tunneling feature support with SR policy is described in ICMP-tunneling operation and does not
require additional CLI commands.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
– Allow the responder node to hide from the sender node a FEC element that it is pushing or stitching
to by adding a NIL FEC TLV with a PUSH or a POP and PUSH (equivalent to a SWAP) operation
into the FEC stack change sub-TLV.
SR OS does not support this application in a sender node role but can process the NIL FEC if
received by a third-party implementation.
• In the case of lsp-ping, the sender node builds a target FEC Stack TLV which contains a single NIL FEC
element corresponding to the last segment of the tested segment list of the SR policy.
• In the case of lsp-trace, the sender node builds a target FEC Stack TLV which contains a NIL FEC
element for each SID in the segment list.
• To support the processing of the NIL FEC in the context of the SR policy and the applications in RFC
8029, SR OS in a receiver node role performs the following operations:
1. Look-up the label of the NIL FEC in the SR database to match against the SID of a resolved node, a
resolved adjacency, a resolved adjacency SET or a binding SID.
2. If a match exists, continue processing of the NIL FEC.
3. Otherwise, look up the label of the NIL FEC in the Label Manager.
4. If a match exists, then process the FEC as per the POP or SWAP operation provided by the lookup
and following the NIL FEC procedures in RFC 8029.
5. Otherwise, fail the validation and send a return code of 3 < Replying router has no mapping for the
FEC at stack-depth <RSC>> in the MPLS echo reply message. The sender node fails the probe at
this point.
• A SID label associated with a NIL FEC and which is popped at an LSR, acting in a receiver node role, is
first looked up. If the label is valid, then the processing results in a return code of 3 <Replying router is
an egress for the FEC at stack-depth <RSC>>.
A label is valid if the LSR validates it in its Segment Routing (SR) database. Because the LSR does
not know the actual FEC type and FEC value, it successfully validates it if the SR database indicates a
programmed POP operation with that label for a node SID exists.
• A SID label associated with a NIL FEC and which is swapped at an LSR, acting in a receiver node role,
is first looked up. If the label is valid, then the processing results in the return code of 8 Label switched
at stack-depth <RSC> as per RFC 8029.
A label is valid if the LSR validates it in its Segment Routing (SR) database. Because the LSR does
not know the actual FEC type and FEC value, it successfully validates it if the SR database indicates
a programmed SWAP operation with that label for either a node SID, an adjacency SID, an adjacency
SET SID, or a binding SID exists.
The swap operation corresponds to swapping the incoming label to an implicit-null label toward the
downstream router in the case of an adjacency and toward a set of downstream routers in the case of
an adjacency set.
The swap operation corresponds to swapping the incoming label to one or more labels toward a set of
downstream routers in the case of a node SID and a binding SID.
• The lsp-trace command is supported with the inclusion of the DSMAP TLV, the DDMAP TLV or none
of them by the sender node in the ECHO request message. The responder node returns in the DSMAP
or DDMAP TLV the downstream interface information along with the egress label and protocol ID that
corresponds to the looked up node SID, adjacency SID, adjacency SET SID, or binding SID.
• When the Target FEC Stack TLV contains more than one NIL FEC element, the responder node that is
the termination of a FEC element indicates the FEC POP operation implicitly by replying with a return
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
code of 3 <Replying router is an egress for the FEC at stack-depth <RSC>>. When the sender node
gets this reply, the sender node adjusts the Target FEC Stack TLV by stripping the top FEC before
sending the next probe for the same TTL value. When the responder node receives the next echo
request message with the same TTL value from the sender node, the responder node processes the
next FEC element in the stack.
• The responder node performs validation of the top FEC in the target FEC stack TLV provided that the
depth of the incoming label stack in the packet's header is strictly higher than the depth of the target
FEC stack TLV.
• The ttl value in lsp-ping context can be set to a value lower than 255 and the responder node replies
if the NIL FEC element in the Target FEC Stack TLV corresponds to a node SID resolved at that node.
The responder node, however, fails the validation if the NIL FEC element in Target FEC Stack TLV
corresponds to adjacency of a remote node. The return code in the echo reply message can be one of:
rc=4(NoFECMapping), and rc=10(DSRtrUnmatchLabel).
• The min-ttl and max-ttl commands in lsp-trace context can be set to values other than default.
The min-ttl can, however, properly trace the partial path of a SR policy only if there is not segment
termination before the node that corresponds to the min-ttl value. Otherwise, the validation fails and
returns an error as the responder node receives a Target FEC Stack depth that is higher than incoming
label stack size. The return code in the echo reply message can be one of: rc=4(NoFECMapping),
rc=5(DSMappingMismatched), and rc=10(DSRtrUnmatchLabel).
This is true when the downstream-map-tlv option is set to any of ddmap, dsmap, or none values.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
As shown in Figure 32: SRv6 OAM network setup, the network administrator originates a ping or a
traceroute probe on node R1 to test the path of an SRv6 locator of node D, an SRv6 segment identifier
(SID) owned by node D, or an IP prefix resolved to an SRv6 tunnel toward node D. R1 is referred to
as the sender node. Node D is referred to as the target node because it owns the target locator or SID
that is being tested. A target node can be any router in the SRv6 network domain which either owns the
target locator or SID, or a router in which the OAM probe was extracted because a local route matches or
because of the value of the hop-limit field setting in the packet.
The primary path to D is through R2 and R4. The link-protect TI-LFA backup path is through R3 as a PQ
node and then R2 and R4.
The classic ping and traceroute OAM CLI commands are used to test an IPv4 or IPv6 prefix in a virtual
routing and forwarding (VRF) table or in the base router table when resolved to an SRv6 tunnel, for
example:
ping address [detail] [source ip-address]
traceroute address [detail] source ip-address]
The same CLI commands are used to test the address of an SRv6 locator or a SID. In this case, the user
enters the IPv6 address of the target locator prefix or the target SID.
The source address encoded in the outer IPv6 header of the ping or traceroute packet is derived from the
following steps, in ascending order:
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
1. the user-entered source IPv6 address in the ping or traceroute command, which is checked for validity
against a local interface address or a local locator prefix or SID
2. the globally-configured IPv6 source address from the source-address application6 ping or source-
address application6 traceroute commands
3. the preferred primary IPv6 address of the system interface
4. the IPv6 address of outgoing interface
3.1.9.1 Ping or traceroute of SRv6 remote locator or remote SID (End, End.X, End.DT4,
End.DT6, End.DT46)
The features in this section comply to draft-ietf-6man-spring-srv6-oam, Operations, Administration, and
Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6).
The outer IPv6 header hop-limit field is set according to the operation of the probe. For ping, the hop limit
uses the default 254 or a user-entered value.
For traceroute, the hop limit is incrementally increased using one of the following:
• from 1 until the packet reaches the egress PE
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• from the configured minimum value to the maximum value or until the packet reaches the egress PE
The ingress PE looks up the prefix of the locator or SID in the routing table and if a route exists, it forwards
the packet to the next hop. The ingress PE does not check if the target SID or locator has been received in
ISIS or BGP.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The source address is set to the system IPv6 address if configured or the address of the interface used
to forward the packet to the next hop.
The target node copies into the payload of the reply message the leading bytes (up to 128 bytes) in the
received packet encapsulation, and which include the outer IPv6 header and the SRH if any.
The responder node copies into the payload of the reply message the leading bytes (up to 128 bytes) in
the received packet encapsulation, and including the outer IPv6 header and the SRH, if any.
When the traceroute is carried over a TCP transport and the destination is not an interface address, there
is no indication whether the TCP port is open or closed.
Figure 34: End-to-end packet encapsulation for ping or traceroute of a remote locator or SID (1) and Figure
35: End-to-end packet encapsulation for ping or traceroute of a remote locator or SID (2) illustrate the
packet encapsulation from ingress PE to egress PE for both the primary path and the backup path. For the
backup path, both the PSP and USP types of the LFA SRH are shown.
Figure 34: End-to-end packet encapsulation for ping or traceroute of a remote locator or SID (1)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Figure 35: End-to-end packet encapsulation for ping or traceroute of a remote locator or SID (2)
3.1.9.1.4 Ping or traceroute of an IPv4 or IPv6 VRF prefix resolved to an SRv6 tunnel
This feature implements the existing behavior of a ping or a traceroute packet, originated at the ingress
PE node, for a prefix resolved to a SRv6 tunnel.If the OAM ping or traceroute packet is received from the
CE router and expires (hop- limit field value equal to or less than 1), the ingress PE node responds as per
current behavior. If the packet does not expire (hop-limit field value greater than 1), it is forwarded over the
SRv6 tunnel as a data path packet.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Figure 36: Packet encapsulation for ping or traceroute of a VRF IPv6 prefix over an SRv6 tunnel
The outer IPv6 header hop-limit field is set to the default value 254.
3.1.9.1.5 Ping or traceroute of an IPv4 or IPv6 global routing instance prefix resolved to an
SRv6 tunnel
This behavior acts the same as described in Ping or traceroute of an IPv4 or IPv6 VRF prefix resolved to
an SRv6 tunnel.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
3.1.10 LDP tree trace: end-to-end testing of paths in an LDP ECMP network
Figure 37: Network resilience using LDP ECMP shows an IP/MPLS network which uses LDP ECMP for
network resilience. Faults that are detected through IGP or LDP are corrected as soon as IGP and LDP re-
converge. The impacted traffic is forwarded on the next available ECMP path as determined by the hash
routine at the node that had a link failure.
However, there are faults which the IGP/LDP control planes may not detect. These faults may be because
of a corruption of the control plane state or of the data plane state in a node. Although these faults are
very rare and mostly caused by misconfiguration, the LDP tree trace OAM feature is intended to detect
these ‟silent” data plane and control plane faults. For example, it is possible that the forwarding plane of
a node has a corrupt Next Hop Label Forwarding Entry (NHLFE) and keeps forwarding packets over an
ECMP path only to have the downstream node discard them. This data plane fault can only be detected by
an OAM tool that can test all possible end-to-end paths between the ingress LER and the egress LER. A
corruption of the NHLFE entry can also result from a corruption in the control plane at that node.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The following figure illustrates the behavior through the following example adapted from RFC 8029:
LSR A has two downstream LSRs, B and F, for PE2 FEC. PE1 receives an echo reply from A with the
Multipath Type set to 4, with low/high IP addresses of 127.1.1.1->127.1.1.255 for downstream LSR B and
127.2.1.1->127.2.1.255 for downstream LSR F. PE1 reflects this information to LSR B. B, which has three
downstream LSRs, C, D, and E, computes that 127.1.1.1->127.1.1.127 would go to C and 127.1.1.128-
> 127.1.1.255 would go to D. B would then respond with 3 Downstream Mappings: to C, with Multipath
Type 4 (127.1.1.1->127.1.1.127); to D, with Multipath Type 4 (127.1.1.127->127.1.1.255); and to E, with
Multipath Type 0.
The router supports multipath type 0 and 8, and up to a maximum of 36 bytes for the multipath length and
supports the LER part of the LDP ECMP tree building feature.
A user configurable parameter sets the frequency of running the tree trace capability. The minimum and
default value is 60 minutes and the increment is 1 hour.
The router LER gets the list of FECs from the LDP FEC database. New FECs are added to the discovery
list at the next tree trace and not when they are learned and added into the FEC database. The maximum
number of FECs to be discovered with the tree building feature is limited to 500. The user can configure
FECs to exclude the use of a policy profile.
The echo request message is sent on the active P2MP instance and is replicated in the data path over all
branches of the P2MP LSP instance. By default, all egress LER nodes which are leaves of the P2MP LSP
instance replies to the echo request message.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The user can reduce the scope of the echo reply messages by explicitly entering a list of addresses for
the egress LER nodes that are required to reply. A maximum of 5 addresses can be specified in a single
execution of the p2mp-lsp-ping command. If all 5 egress LER nodes are router nodes, they can parse the
list of egress LER addresses and reply. RFC 6425 specifies that only the top address in the P2MP egress
identifier TLV must be inspected by an egress LER. When interoperating with other implementations,
the router egress LER responds if its address is anywhere in the list. Furthermore, if another vendor
implementation is the egress LER, only the egress LER matching the top address in the TLV may respond.
If the user enters the same egress LER address more than once in a single p2mp-lsp-ping command, the
head-end node displays a response to a single one and displays a single error warning message for the
duplicate ones. When queried over SNMP, the head-end node issues a single response trap and issues no
trap for the duplicates.
The timeout parameter should be set to the time it would take to get a response from all probed leaves
under no failure conditions. For that purpose, its range extends to 120 seconds for a p2mp-lsp-ping from a
10 second lsp-ping for P2P LSP. The default value is 10 seconds.
The router head-end node displays a ‟Send_Fail” error when a specific S2L path is down only if the user
explicitly listed the address of the egress LER for this S2L in the ping command.
Similarly, the router head-end node displays the timeout error when no response is received for an S2L
after the expiry of the timeout timer only if the user explicitly listed the address of the egress LER for this
S2L in the ping command.
The user can configure a specific value of the ttl parameter to force the echo request message to expire
on a router branch node or a bud LSR node. The latter replies with a downstream mapping TLV for each
branch of the P2MP LSP in the echo reply message. Note that a maximum of 16 downstream mapping
TLVs can be included in a single echo reply message. It also sets the multipath type to zero in each
downstream mapping TLV and not include any egress address information for the reachable egress LER
nodes for this P2MP LSP.
If the router ingress LER node receives the new multipath type field with the list of egress LER addresses
in an echo reply message from another vendor implementation, it ignores but not cause an error in
processing the downstream mapping TLV.
If the ping expires at an LSR node which is performing a re-merge or cross-over operation in the data path
between two or more ILMs of the same P2MP LSP, there is an echo reply message for each copy of the
echo request message received by this node.
The output of the command without the detail parameter specified provides a high-level summary of error
codes or success codes received.
The output of the command with the detail parameter specified shows a line for each replying node as in
the output of the LSP ping for a P2P LSP.
The display is delayed until all responses are received or the timer configured in the timeout parameter
expired. No other CLI commands can be entered while waiting for the display. A control-C (^C) command
aborts the ping operation.
For more information about P2MP, see the 7450 ESS, 7750 SR, 7950 XRS, and VSR MPLS Guide.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The LSP trace capability allows the user to trace the path of a single S2L path of a P2MP LSP. Its
operation is similar to that of the p2mp-lsp-ping command but the sender of the echo reply request
message includes the downstream mapping TLV to request the downstream branch information from a
branch LSR or bud LSR. The branch LSR or bud LSR then also includes the downstream mapping TLV to
report the information about the downstream branches of the P2MP LSP. An egress LER does not include
this TLV in the echo response message.
The probe-count parameter operates in the same way as in LSP trace on a P2P LSP. It represents the
maximum number of probes sent per TTL value before giving up on receiving the echo reply message. If
a response is received from the traced node before reaching maximum number of probes, then no more
probes are sent for the same TTL. The sender of the echo request then increments the TTL and uses the
information it received in the downstream mapping TLV to start sending probes to the node downstream of
the last node which replied. This continues until the egress LER for the traced S2L path replied.
Because the command traces a single S2L path, the timeout and interval parameters keep the same value
range as in LSP trace for a P2P LSP.
The P2MP LSP Trace makes use of the Downstream Detailed Mapping (DDMAP) TLV. The following
excerpt from RFC 6424 details the format of the new DDMAP TLV entered in the path-destination belongs
to one of the possible outgoing interface of the FEC.
0 1 2
3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MTU | Address Type | DS Flags
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Downstream Address (4 or 16 octets)
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Downstream Interface Address (4 or 16 octets)
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Return Code | Return Subcode | Subtlv Length
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.
.
. List of SubTLVs
.
.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The Downstream Detailed Mapping TLV format is derived from the Downstream Mapping (DSMAP) TLV
format. The key change is that variable length and optional fields have been converted into sub-TLVs. The
fields have the same use and meaning as in RFC 8029.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Similar to p2mp-lsp-ping, an LSP trace probe results on all egress LER nodes eventually receiving the
echo request message but only the traced egress LER node replies to the last probe.
Also any branch LSR node or bud LSR node in the P2MP LSP tree may receive a copy of the echo request
message with the TTL in the outer label expiring at this node. However, only a branch LSR or bud LSR
which has a downstream branch over which the traced egress LER is reachable must respond.
When a branch LSR or BUD LSR node responds to the sender of the echo request message, it sets the
global return code in the echo response message to RC=14 - "See DDMAP TLV for Return Code and
Return Sub-Code" and the return code in the DDMAP TLV corresponding to the outgoing interface of the
branch used by the traced S2L path to RC=8 - "Label switched at stack-depth <RSC>".
Because a single egress LER address, for example an S2L path, can be traced, the branch LSR or bud
LSR node sets the multipath type of zero in the downstream mapping TLV in the echo response message
as no egress LER address need to be included.
3.1.14.1 LSP trace behavior when S2L path traverses a re-merge node
When a 7450 ESS, 7750 SR or 7950 XRS LSR performs a re-merge of one or more ILMs of the P2MP
LSP to which the traced S2L sub-LSP belongs, it may block the ILM over which the traced S2L resides.
This causes the trace to either fail or to succeed with a missing hop.
The following is an example of this behavior.
S2L1 and S2L2 use ILMs which re-merge at node B. Depending on which ILM is blocked at B, the TTL=2
probe either yields two responses or times out.
A
/ \
B -- C
|
D
| \
F E
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
For TTL=2, B drops the copy coming on interface A-B. It receives a copy coming on interface B-C but
drops it as the ILM does not contain S2L2. Node A times out. Next, node A generates a probe with
TTL=3 without a DDMAP TLV. This time node D responds with a success and includes its downstream
DDMAP TLV to node E. The rest of the path is discovered correctly. The traced path for S2L2 looks like:
A-B-(*)-D-E.
The router ingress LER detects a re-merge condition when it receives two or more replies to the same
probe, such as the same TTL value. It displays the following message to the user regardless if the trace
operation successfully reached the egress LER or was aborted earlier:
This warning message indicates to the user the potential of a re-merge scenario and that a p2mp-lsp-ping
command for this S2L should be used to verify that the S2L path is not defective.
The router ingress LER behavior is to always proceed to the next ttl probe when it receives an OK
response to a probe or when it times out on a probe. If however it receives replies with an error return
code, it must wait until it receives an OK response or it times out. If it times out without receiving an OK
reply, the LSP trace must be aborted.
Possible echo reply messages and corresponding ingress LER behaviors are described in Table 9: Echo
reply messages and ingress LER behavior.
OK + one or more error return codes Display OK return code. Proceed to next ttl probe
right after receiving the OK reply but keep state that
more replies received. Display warning message at
end of trace.
One error return code + timeout Abort LSP trace and display error code. Ingress
LER cannot tell the error occurred of a re-merge
condition.
More than one error return code + timeout Abort LSP trace and display first error code.
Display warning message at end of trace.
Timeout on probe without any reply Display ‟*” and proceed to next ttl probe.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The new MPLS Label Stack object allow an LSR to include label stack information including label value,
EXP, and TTL field values, from the encapsulation header of the packet that expired at the LSR node. The
ICMP message continues to include the IP header and leading payload octets of the original datagram.
• If the length attribute is zero, it is treated as a compliant message and the router implementation
processes the original datagram field of size equal to 128 bytes and with no extension header.
• If the length attribute is not included, it is treated as a non-compliant message and the router
implementation processes the original datagram field of size equal to 128 bytes and also look for a valid
extension header following the 128 byte original datagram field. If the extension is valid, it is processed
accordingly, if not it is assumed the remainder of the packet is still part of the original datagram field and
process it accordingly. Note that the router implementation only validates the ICMP extension version
number and not the checksum field in the extension header. The checksum of the main time exceeded
message is also not validated as per prior implementation.
• An ICMP reply message is dropped if it includes more than one MPLS label object. In general when a
packet is dropped because of an error in the packet header or structure, the traceroute timeouts and an
error message is not displayed.
• When processing the received ICMP reply packet, an unsupported extension header is skipped.
In the transmit side, when the MPLS Label Stack object is added as an extension to the ICMP reply
message, it is appended to the message immediately following the "original datagram" field taken from
the payload of the received traceroute packet. The size of the appended "original datagram" field contains
exactly 128 octets. If the original datagram did not contain 128 octets, the "original datagram" field is zero
padded to 128 octets.
For example output of the traceroute OAM tool when the ICMP tunneling feature is enabled see,
Traceroute with ICMP tunneling in common applications.
3.1.17 Summary of UDP traceroute behavior with and without ICMP tunneling
At a high level, the major difference in the behavior of the UDP traceroute when ICMP tunneling is enabled
at an LSR node is that the LSR node tunnels the ICMP reply packet toward the egress of the LSP without
looking up the traceroute sender's address. When ICMP tunneling is disabled, the LSR looks it up and
replies if the sender is reachable. However there are additional differences in the two behaviors and they
are summarized in the following.
• icmp-tunneling disabled/IPv4 LSP/IPv4 traceroute
Ingress LER, egress LER, and LSR attempt to reply to the UDP traceroute of both IPv4 and VPN-IPv4
routes.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
For VPN-IPv4 routes, the LSR attempts to reply but it may not find a route and in such a case the
sender node times out. In addition, the ingress and egress ASBR nodes in VPRN inter-AS option B do
not respond as in current implementation and the sender times out.
• icmp-tunneling disabled/IPv4 LSP/IPv6 traceroute
Ingress LER and egress LER reply to traceroute of both IPv6 and VPN-IPv6 routes. LSR does not reply.
• icmp-tunneling enabled/IPv4 LSP/IPv4 traceroute
Ingress LER and egress LER reply directly to the UDP traceroute of both IPv4 and VPN-IPv4 routes.
LSR tunnels the reply to endpoint of the LSP to be forwarded from there to the source of the traceroute.
For VPN-IPv4 routes, the ingress and egress ASBR nodes in VPRN inter-AS option B also tunnels the
reply to the endpoint of the LSP and therefore there is no timeout at the sender node like in the case
when icmp-tunneling is disabled.
• icmp-tunneling enabled/IPv4 LSP/IPv6 traceroute
Ingress LER and egress LER reply directly to the UDP traceroute of both IPv6 and VPN-IPv6 routes.
LSR tunnels the reply to endpoint of the LSP to be forwarded from there to the source of the traceroute.
For VPN-IPv6 routes, the ingress and egress ASBR nodes in VPRN inter-AS option B also tunnels the
reply to the endpoint of the LSP like in the case when icmp-tunneling is disabled.
In the presence of ECMP, CPM generated UDP traceroute packets are not sprayed over multiple ECMP
next-hops. The first outgoing interface is selected. In addition, a LSR ICMP reply to a UDP traceroute
is also forwarded over the first outgoing interface regardless if ICMP tunneling is enabled or not. When
ICMP tunneling is enabled, it means the packet is tunneled over the first downstream interface for the LSP
when multiple next-hops exist (LDP FEC or BGP label route). In all cases, the ICMP reply packet uses the
outgoing interface address as the source address of the reply packet.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• MAC ping provides an end-to-end test to identify the egress customer-facing port where a customer
MAC was learned. MAC ping can also be used with a broadcast MAC address to identify all egress
points of a service for the specified broadcast MAC.
• MAC trace provides the ability to trace a specified MAC address hop-by-hop until the last node in the
service domain. An SAA test with MAC trace is considered successful when there is a reply from a far-
end node indicating that they have the destination MAC address on an egress SAP or the CPM.
• CPE ping provides the ability to check network connectivity to the specified client device within the
VPLS. CPE ping returns the MAC address of the client, as well as the SAP and PE at which it was
learned.
• MAC populate allows specified MAC addresses to be injected in the VPLS service domain. This triggers
learning of the injected MAC address by all participating nodes in the service. This tool is generally
followed by MAC ping or MAC trace to verify if correct learning occurred.
• MAC purge allows MAC addresses to be flushed from all nodes in a service domain.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The Reply Mode is either 3 (that is, reply using the control plane) or 4 (that is, reply through the data
plane), depending on the reply-control option. By default, the data plane request is sent with Reply Mode 3
(control plane reply).
The Ethernet DLC header source MAC address is set to either the system MAC address (if no source
MAC is specified) or to the specified source MAC. The destination MAC address is set to the specified
destination MAC. The EtherType is set to IP.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
This approach should only be considered for unmanaged solutions where standard Ethernet CFM (ETH-
CFM) functions cannot be deployed. ETH-CFM has a robust set of fault and performance functions that are
purpose-built for Ethernet services and transport.
Connection types used to support VPLS and Epipes include SAPs, SDP bindings, B-VPLS, BGP-AD, BGP-
VPWS, BGP-VPLS, and MPLS-EVPN.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
service. This allows the provider to craft a learning history and engineer packets in a particular way to test
forwarding plane correctness.
The MAC populate request is sent with a VC TTL of 1, which means that it is received at the forwarding
plane at the first hop and passed directly up to the management plane. The packet is then responded to by
populating the MAC address in the forwarding plane, similar to a conventional learn, although the MAC is
an OAM-type MAC in the FDB to distinguish it from customer MAC addresses.
This packet is then taken by the control plane and flooded out the flooding domain (squelching,
appropriately, the sender and other paths that would be squelched in a typical flood).
This controlled population of the FDB is very important to manage the expected results of an OAM
test. The same functions are available by sending the OAM packet as a UDP/IP OAM packet. It is then
forwarded to each hop and the management plane has to do the flooding.
Options for MAC populate are to force the MAC in the table to type OAM (in case it already existed as
dynamic or static or an OAM-induced learning with some other binding). This prevents new dynamic
learning from overwriting the existing OAM MAC entry, to allow customer packets with this MAC to either
ingress or egress the network, while still using the OAM MAC entry.
Finally, an option to flood the MAC populate request causes each upstream node to learn the MAC,
populate the local FDB with an OAM MAC entry, and to flood the request along the data plane using the
flooding domain.
An age can be provided to age a particular OAM MAC after a different interval than other MACs in a FDB.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
are three possible methods of encapsulating a VCCV message in a VLL which translates into three types
of control channels:
• Use of a Router Alert Label immediately above the VC label. This method has the drawback that
if ECMP is applied to the outer LSP label (for example, transport label), the VCCV message does
not follow the same path as the user packets. This effectively means it does not troubleshoot the
appropriate path. This method is supported by the 7450 ESS, 7750 SR, and 7950 XRS routers.
• Use of the OAM control word as shown:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 0 0 1| FmtID | Reserved | Channel Type |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The first nibble is set to 0x1. The Format ID and the reserved fields are set to 0 and the channel type
is the code point associated with the VCCV IP control channel as specified in the PWE3 IANA registry
(RFC 4446). The channel type value of 0x21 indicates that the Associated Channel carries an IPv4
packet.
The use of the OAM control word assumes that the draft-martini control word is also used on the user
packets. This means that if the control word is optional for a VLL and is not configured, the PE node
only advertises the router alert label as the CC capability in the Label Mapping message. This method is
supported by the 7450 ESS, 7750 SR and 7950 XRS routers.
• Set the TTL in the VC label to 1 to force PE2 control plane to process the VCCV message. This
method is not guaranteed to work under all circumstances. For instance, the draft mentions some
implementations of penultimate hop popping overwrite the TTL field. This method is not supported by
the 7450 ESS, 7750 SR, and 7950 XRS routers.
When sending the label mapping message for the VLL, PE1 and PE2 must indicate which of the above
OAM packet encapsulation methods (for example, which control channel type) they support. This is
accomplished by including an optional VCCV TLV in the pseudowire FEC Interface Parameter field. The
format of the VCCV TLV is shown below:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 0x0c | 0x04 | CC Types | CV Types |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Note that the absence of the optional VCCV TLV in the Interface parameters field of the pseudowire FEC
indicates the PE has no VCCV capability.
The Control Channel (CC) Type field is a bitmask used to indicate if the PE supports none, one, or many
control channel types.
• 0x00 None of the following VCCV control channel types are supported
• 0x01 PWE3 OAM control word
• 0x02 MPLS Router Alert Label
• 0x04 MPLS inner label TTL = 1
If both PE nodes support more than one of the CC types, then the router PE uses of the one with the
lowest type value. For instance, OAM control word is used in preference to the MPLS router alert label.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The Connectivity Verification (CV) bitmask field is used to indicate the specific type of VCCV packets to be
sent over the VCCV control channel. The valid values are:
0x00 None of the below VCCV packet type are supported.
0x01 icmp ping. Not applicable to a VLL over a MPLS or GRE SDP and is therefore not supported by the
7450 ESS, 7750 SR, and 7950 XRS routers.
0x02 LSP ping. This is used in VCCV ping application and applies to a VLL over an MPLS or a GRE SDP.
This is supported by the 7450 ESS, 7750 SR, and 7950 XRS routers.
A VCCV ping is an LSP echo request message as defined in RFC 8029. It contains an L2 FEC stack
TLV which must include within the sub-TLV type 10 ‟FEC 128 Pseudowire”. It also contains a field which
indicates to the destination PE which reply mode to use. There are four reply modes defined in RFC 8029:
Reply mode, meaning:
• Do not reply. This mode is supported by the routers.
• Reply via an IPv4/IPv6 UDP packet. This mode is supported by the routers.
• Reply with an IPv4/IPv6 UDP packet with a router alert. This mode sets the router alert bit in the IP
header and is not be confused with the CC type which makes use of the router alert label. This mode is
not supported by the routers.
• Reply via application level control channel. This mode sends the reply message inband over the
pseudowire from PE2 to PE1. PE2 encapsulates the Echo Reply message using the CC type
negotiated with PE1. This mode is supported by the routers.
The reply is an LSP echo reply message as defined in RFC 8029. The message is sent as per the reply
mode requested by PE1. The return codes supported are the same as those supported in the router LSP
ping capability.
The VCCV ping feature is in addition to the service ping OAM feature which can be used to test a service
between router nodes. The VCCV ping feature can test connectivity of a VLL with any third party node
which is compliant to RFC 5085.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
time. Pseudowire switching is also used whenever there is a need to deploy a VLL service across two
separate routing domains.
In the network, a Termination PE (T-PE) is where the pseudowire originates and terminates. The Switching
PE (S-PE) is the node which performs pseudowire switching by cross-connecting two spoke SDPs.
VCCV ping is able to ping to a destination PE. A VLL FEC ping is a message sent by T-PE1 to test
the FEC at T-PE2. The operation at T-PE1 and T-PE2 is the same as in the case of a single-segment
pseudowire. The pseudowire switching node, S-PE1, pops the outer label, swaps the inner (VC) label,
decrements the TTL of the VC label, and pushes a new outer label. The PE1 node does not process the
VCCV OAM Control Word unless the VC label TTL expires. In that case, the message is sent to the CPM
for further validation and processing. This is the method described in draft-hart-pwe3-segmented-pw-vccv.
Note that the originator of the VCCV ping message does not need to be a T-PE node; it can be an S-PE
node. The destination of the VCCV ping message can also be an S-PE node.
VCCV trace to trace the entire path of a pseudowire with a single command issued at the T-PE. This
is equivalent to LSP trace and is an iterative process by which T-PE1 sends successive VCCV ping
messages while incrementing the TTL value, starting from TTL=1. The procedure for each iteration is the
same as above and each node in which the VC label TTL expires checks the FEC and replies with the FEC
to the downstream S-PE or T-PE node. The process is terminated when the reply is from T-PE2 or when a
timeout occurs.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
An MFIB ping packet is sent through the data plane and goes out with the data plane format containing
a configurable VC label TTL. This packet traverses each hop using forwarding plane information for
next hop, VC label, and so on. The VC label is swapped at each service-aware hop, and the VC TTL is
decremented. If the VC TTL is decremented to 0, the packet is passed up to the management plane for
processing. If the packet reaches an egress node, and would be forwarded out a customer facing port
(SAP), it is identified by the OAM label below the VC label and passed to the management plane.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The global-id/node-id are only used as the target node identifiers if the vccv-ping is not end-to-end (for
example, a TTL is specified in the vccv-ping or trace command and it is < 255), otherwise the value in the
PW Path ID is used. For vccv-ping, the dest-node-id may be entered as a 4-octet IP address <a.b.c.d> or
32-bit integer <1 to 4294967295>. For vccv-trace, the destination node-id and global-id are taken form the
spoke SDP context.
The same command syntax is applicable for SAA tests configured under configure saa test a type.
3.1.35.1 VCCV ping and VCCV trace between static MPLS-TP and dynamic PW segments
The 7450 ESS, 7750 SR, and 7950 XRS routers support end to end VCCV Ping and VCCV trace between
a segment with a static MPLS-TP PW and a dynamic T-LDP segment by allowing the user to specify
a target FEC type for the VCCV echo request message that is different from the local segment FEC
type. That is, it is possible to send a VCCV Ping / Trace echo request containing a static PW FEC in the
target stack TLV at a T-PE where the local egress PW segment is signaled, or a VCCV Ping or Trace
echo request containing a PW ID FEC (FEC128) in the target stack TLV at a T-PE where the egress PW
segment is a static MPLS-TP PW.
Note that all signaled T-LDP segments and the static MPLS-TP segments along the path of the MS-PW
must use a common associated channel type. Because only the IPv4 associated channel is supported in
common between the two segments, this must be used. If a user selects a non-IP associated channel on
the static MPLS-TP spoke SDP, then vccv-ping and vccv-trace packets are dropped by the S-PE.
The target-fec-type option of the vccv-ping and vccv-trace command is used to indicate that the remote
FEC type is different from the local FEC type. For a vccv-ping initiated from a T-PE with a static PW
segment with MPLS-TP parameters, attempting to ping a downstream FEC128 segment, then a target-
fec-type of pw-id is configured with a static PW type. In this case, an assoc-channel type of non-ip is
blocked, and the other way around. Likewise the reply-mode must be set to control-channel. For a vccv-
ping initiated from a T-PE with a FEC128 PW segment, attempting to ping a downstream static PW FEC
segment, a target-fec-type of static is configured with a pw-id PW type, then a control-channel type of non-
ip is blocked, and the other way around. Likewise the reply-mode must also be set to control-channel.
When using VCCV Trace, where the first node to be probed is not the first-hop S-PE. the initial TTL must
be set to >1. In this case, the target-fec-type refers to the FEC at the first S-PE that is probed.
The same rules apply to the control-channel type and reply-mode as for the vccv-ping case.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
MEP ID are taken from the context of the LSP. The tunnel-number <tunnel-num> and lsp-num <lsp-
num> for the far-end MEP are always taken from the context of the path under test.
The following commands are only valid if the sub-type static option is configured, implying that the lsp-
name refers to an MPLS-TP tunnel LSP:
path-type - Values: active, working, protect. Default: active.
dest-global-id <global-id> dest-node-id <node-id> - Default: to global-id:node-id from the LSP ID.
assoc-channel: If this is set to none, then IP encapsulation over an LSP is used with a destination address
in the 127/8 range. If this is set to ipv4, then IPv4 encapsulation in a G-ACh over an LSP is used with a
destination address in the 127/8 range The source address is set to the system IP address, unless the
user specifies a source address using the src-ip-address option. If this is set to non-ip, then non-IP
encapsulation over a G-ACh with channel type 0x00025 is used. This is the default for sub-type static. Note
that the encapsulation used for the echo reply is the same as the encapsulation used for the echo request.
downstream-map-tlv: LSP Trace commands with this option can only be executed if the control-channel is
set to none. The DSMAP/DDMAP TLV is only included in the echo request message if the egress interface
is either a numbered IP interface, or an unnumbered IP interface. The TLV is not included if the egress
interface is of type unnumbered-mpls-tp.
For lsp-ping, the dest-node-id may be entered as a 4-octet IP address in the format a.b.c.d, or as a 32-
bit integer in the range of 1 to 4294967295. For lsp-trace, the destination node-id and global-id are taken
form the spoke-sdp context.
The send mode and reply mode are always taken to be an application level control channel for MPLS-TP.
The force parameter causes an LSP ping echo request to be sent on an LSP that has been brought oper-
down by Bi-directional Forwarding Detection (BFD) (LSP-Ping echo requests would normally be dropped
on oper-down LSPs). This parameter is not applicable to SAA.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The LSP ID used in the LSP ping packet is derived from a context lookup based on lsp-name and path-
type (active/working/protect).
dest-global-id and dest-node-id refer to the target global/node ID. They do not need to be entered for
end-to-end ping and trace, and the system uses the destination global ID and node ID from the LSP ID.
The same command syntax is applicable for SAA tests configured under config>saa>test.
3.1.39 BFD
The existing show>router>bfd is enhanced for MPLS-TP, as follows:
show>router>bfd>mpls-tp-lsp
This command displays the MPLS –TP paths for which BFD is enabled.
show>router>bfd>session [src ip-address [dest ip-address | detail]] | [mpls-tp-path lsp-id… [detail]]
This command shows the details of the BFD session on a particular MPLS-TP path, where lsp-id is the fully
qualified lsp-id to which the BFD session is in associated.
An example output is shown below:
Mpls-tp Association
privatebed-oam-template
===============================================================================
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
* indicates that the corresponding row element may have been truncated.
*A:mlstp-dutA# show router bfd session
===============================================================================
BFD Session
===============================================================================
Interface/Lsp Name State Tx Intvl Rx Intvl Multipl
Remote Address/Info Protocols Tx Pkts Rx Pkts Type
-------------------------------------------------------------------------------
wp::lsp-32 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-33 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-34 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-35 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-36 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-37 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-38 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-39 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-40 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
wp::lsp-41 Down (1) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-32 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-33 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-34 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-35 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-36 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-37 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-38 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-39 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-40 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
pp::lsp-41 Up (3) 1000 1000 3
0::0.0.0.0 mplsTp N/A N/A cpm-np
-------------------------------------------------------------------------------
No. of BFD sessions: 20
-------------------------------------------------------------------------------
wp = Working path pp = Protecting path
===============================================================================
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Measurement for MPLS Networks, defines the source IP information to include in the UDP Path Return
TLV so the responding node can reach the querier using an IP network. The MPLS DM PDU does not
natively include any IP header information. With MPLS TP there is no requirement for the TLV defined in
RFC 7876.
The function of MPLS delay measurement is similar regardless of LSP type. The querier sends the MPLS
DM query message toward the responder, transported in an MPLS LSP. The responder extracts the
required PDU information to respond appropriately.
Launching MPLS DM tests are configured in the config>oam-pm>session session-name test-family
mpls context. Basic architectural OAM PM components are required to be completed along with the MPLS
specific configuration. The test PDU includes the following PDU settings:
• Channel Type: 0x000C (MPLS DM)
• Flags: Query
• Control Code: out-of-band (unidirectional LSP) and in-band (bidirectional LSP)
• Querier Timestamp Format: IEEE 1588-2008 (1588v2) Precision Time Protocol truncated timestamp
format
• Session Identifier: The configured oam-pm>session>mpls>dm test-id test-id
• DSCP: The configured oam-pm>session>mpls>dscp dscp-name (this value is not used to convey or
influence the CoS setting in the MPLS TC field, on the querier or reflector. The profile {in | out} and fc
fc-name must be used to influence CoS markings at launch, and the MPLS TC influences CoS handling
and marking upon reception.
• Timestamp 1: Set to the local transmit time in PTP format
• Timestamp 2 and 3: set to 0
TVLs can also be included, based on the configuration.
• Padding (Type 0)
Copy in Response: Padding is returned in the response when the oam-
pm>session>mpls>dm>reflect-pad is configured.
• Padding (Type 128)
Do not copy in Response: Padding is not returned in the response when the oam-
pm>session>mpls>dm>pad-tlv-size is configured without the reflect-pad command. This is the
typical configuration with unidirectional LSPs.
• UDP Return (Type 131)
UDP Return object: The IP information used by the reflector to reach the querier for an out-of-band
response, when the oam-pm>session>mpls>lsp is rsvp or rsvp-auto and the udp-return-object
information is configured.
The maximum pad size of 257 is a result of the structure of the defined TLV. The length field is one byte,
limiting the overall value filed to 255 bytes.
The reflector processes the inbound MPLS DM PDU and respond back to the querier based on the
received information, using the response flag setting. Specific to the timestamp, the responder responds
using the Query Timestamp Format, filling in the Timestamp 2 and Timestamp 3 values.
When the response arrives back at the querier, the delay metrics are computed. The common OAM-
PM computation model and naming are used to simplify and rationalize the different technologies that
leverage the OAM-PM infrastructure. The common methodology reports unidirectional and round trip delay
metrics for Frame Delay (FD), InterFrame Delay Variation (IFDV), and Frame Delay Range (FDR). The
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
term, "frame" is not indicative of the underlying technology being measured. It represents a normal cross
technology naming with applicability to the appropriate naming for the measured technology. The common
normal naming requires a mapping to the supported delay measurements included in RFC 6374.
Because OAM-PM uses a common reporting model, unidirectional (forward and backward, and round trip)
are always reported. With unidirectional LSPs, the T4 and T3 timestamps are zeroed but the backward
and round trip directions are still reported. In the case of unidirectional LSPs, the backward and round trip
values are of no significance for the measured MPLS network.
An MPLS DM test may measure the endpoints of the LSP when the TTL is set equal to or higher than the
termination point distance. Midpoints along the path that support MPLS DM response functions can be
queried by a test setting a TTL to expire along the path. The MPLS DM launch and reflection, including
mid-path transit nodes, capability is disabled by default. To launch and reflect MPLS DM test packets
config>test-oam>mpls-dm must be enabled.
The SR OS implementation supports MPLS DM Channel Type 0x000C from RFC 6374 function for the
following:
• Label Switched Path types
– RSVP-TE and RSVP-TE Auto LSPs set out-of-band response request and require the configuration
of the UDP-Return-Object.
– MPLS-TP sets in-band response request.
• Querier and Responder
• Traffic class indicator set to on (1)
• Querier Timestamp format PTP
• Mandatory TLV 0 – Copy padding
• Optional TLV 128 – Do not copy padding
• Optional TLV 131 – UDP-Return-Object (RFC 7876)
The following functions are not supported:
• Packet Loss measurement
• Throughput management
• Dyadic measurements
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• Loopback
• Mandatory TLVs
– TLV 1 – Return Address
– TLV 2 – Session Query Interval
– TLV 3 – Loopback Request
• Optional TLVs
– TLV 129 – Destination Address
– TLV 130 – Source Address
config>log# info
----------------------------------------------
file-id 1
description "OAM PM XML file Parameters"
location cf2:
rollover 10 retention 2
exit
accounting-policy 1
description "Default OAM PM Collection Policy for 5-min Bins"
record complete-pm
collection-interval 5
to file 1
no shutdown
exit
log-id 1
exit
config>test-oam> #info
----------------------------------------------
mpls-dm
no shutdown
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
config>router> #info
--------------------------------------------
mpls
path "path-1"
no shutdown
exit
lsp "LSP-PE-2-PE-1-via29" //lsp-name for oam-pm//
to 192.0.2.1
cspf
include "via-P-3"
primary "path-1"
exit
no shutdown
exit
config>router> #info
-----------------------------------------------------
mpls
path "path-1"
no shutdown
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
exit
config>router> #info
--------------------------------------------
mpls
mpls-tp
global-id 135
node-id 0.0.0.2
tp-tunnel-id-range 100 200
protection-template "ptcTemplate"
exit
oam-template "bfd-template"
bfd-template "bfdTemplate"
exit
no shutdown
exit
lsp "LSP-PE-2-PE-1-static" mpls-tp 100
to node-id 0.0.0.1
dest-global-id 135
dest-tunnel-number 100
working-tp-path
in-label 129
out-label 131 out-link "int-PE-2-P-3" next-hop 192.168.23.1
mep
oam-template "bfd-template"
bfd-enable cc
no shutdown
exit
no shutdown
exit
no shutdown
exit
config>oam-pm# info
----------------------------------------------
bin-group 2 fd-bin-count 10 fdr-bin-count 10 ifdv-bin-count 10 create
bin-type fd
bin 1
lower-bound 1000
exit
bin 2
lower-bound 2000
exit
bin 3
lower-bound 3000
exit
bin 4
lower-bound 4000
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
bin 5
lower-bound 5000
exit
bin 6
lower-bound 6000
exit
bin 7
lower-bound 7000
exit
bin 8
lower-bound 8000
exit
bin 9
lower-bound 9000
exit
exit
bin-type fdr
bin 1
lower-bound 1000
exit
bin 2
lower-bound 1500
exit
bin 3
lower-bound 2000
exit
bin 4
lower-bound 2500
exit
bin 5
lower-bound 3000
exit
bin 6
lower-bound 3500
exit
bin 7
lower-bound 4000
exit
bin 8
lower-bound 4500
exit
bin 9
lower-bound 5000
exit
exit
bin-type ifdv
bin 1
lower-bound 500
exit
bin 2
lower-bound 750
exit
bin 3
lower-bound 1000
exit
bin 4
lower-bound 1250
exit
bin 5
lower-bound 1500
exit
bin 6
lower-bound 1750
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
bin 7
lower-bound 2000
exit
bin 8
lower-bound 2250
exit
bin 9
lower-bound 2500
exit
exit
no shutdown
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
3.1.42 ICMP ping check connectivity checking using ICMP echo request and response
In specific network configurations, it is not always possible to deploy preferred standards-based purpose-
built robust connectivity verification tools such as Bidirectional Forwarding Detection (BFD), or Ethernet
Connectivity Fault Management Continuity Check Message (ETH-CCM), or other more suited tools. When
circumstances prevent the preferred connectivity validation methods, ICMP echo request and response
ping connectivity check (icmp ping check) using ping templates can be used as an alternate connectivity
checking method. Before deploying this approach an understanding of the treatment of these types of
packets on the involved network elements is required. The ping check affects the operational state of the
VRPN or IES service IPv4 interface (the service IP interface) being verified.
Deployment of this feature requires the following:
• configuring the ping template
• the assignment of the ping template to a service IP interface
• optionally, configuring the distributed CPU protection for the icmp-ping-check protocol
The ping template defines timers and thresholds that determine the basis for connectivity verification and
influence the service IP interface operational state. The configuration of the ping template is located in the
config>test-oam>icmp context. The configuration options are separated to allow different failure detection
and recovery behaviors.
The transmission frequency (interval), loss detection (timeout) and threshold (failure-threshold)
are used to check connectivity when the service IP interface is steady and operationally up, or steady
and operationally down. When these values are monitoring connectivity and the service IP interface
is operationally up, consecutive failures that reach the failure threshold transitions the interface to
operationally down. When these values are monitoring connectivity and the service IP interface is
operationally down, a first success triggers the recovery values to complete the validation. For example, if
the interval 10 (seconds), timeout 5 (seconds) and failure-threshold 3 (count) the failure detection takes
30 seconds.
When a service IP interface transitions from operationally up to operationally down because of icmp ping
check the log event ‟UTC WARNING: SNMP #2004 vprn1000999 int-PE-CE-999. Interface
int-PE-CE-999 is not operational” is generated.
When a service IP interface has transitioned from operationally up to the operationally down state because
of icmp ping check, the transmission continues at the specified interval until there is a successful ICMP
echo response related to the ICMP echo request. When the first success is received, there is a possible
transition from operationally down to operationally up and the function moves to the recovering phase. The
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
icmp ping check packets for the affected service IP interface starts to transmit at frequency (reactivation-
interval), invoking loss detection (reactivation-timeout) and consecutive success count (reactivation-
threshold). If the reactivation threshold is reached, the service IP interface transitions from operationally
down to operationally up. The transmission frequency (interval), loss detection (timeout) and threshold
(failure-threshold) are used to monitor the service IP interface.
When a service IP interface transitions from operationally down to operationally up because of icmp ping
check the log event ‟UTC WARNING: SNMP #2005 vprn1000999 int-PE-CE-999. Interface int-PE-CE-999
is operational” is generated.
If a failure occurs in the recovering phase, the reactivation-failure-threshold is consulted to determine
the number of retries that should be attempted in this phase. This option allows a service IP interface a
specified number of retries in this phase before returning to transmitting at interval and those associated
values. The reactivation-failure-threshold parameter is bypassed if there was a previous success for the
service IP interface in the recovery phase for the latest transition. This parameter determines the number
of consecutive failures, without a previous success, before declaring the recovering is not proceeding and
returns to the interval values. In larger scale environments this value may need to be increased.
Only packets related to the icmp ping check, ICMP echo request and ARP packets specifically associated
with the assigned local ping template, can be sent when the interface is operationally down because of
an icmp ping check failure. Only packets related to the icmp ping check, ICMP echo response and ARP
packets specifically associated with the assigned local ping template, can be received when the interface is
operationally down because of the ping check failure.
A ping check function should never be configured on both peers. This leads to deadlock conditions that can
only be resolved by manually disabling the ping template under the interface. As previously stated, only
packets associated with the local ping template can be transmitted and received on a service IP interface
when the interface is operationally down because of icmp check.
The configured ping template values can be updated without having to change the administrative state or
existing references. However, the service IP interfaces that reference a specific ping template configuration
imports the values when the ping-template is administratively enabled under the service IP interface. There
is no automatic updating of modified ping template values on service IP interfaces referencing a ping-
template. To push the changes to the referencing service IP interface the command tools>perform>test-
oam>icmp>ping-template-sync template-name is available. This command updates all interfaces
that reference the specified ping-template. Executing this command updates all the referencing service
IP interfaces in the background after the command is accepted. If there is an HA event and the tools
command has not completed updating, all the interfaces that had were not updated at the time of the HA
event do not receive the new values. If an HA event occurs and there is a concern that all interfaces may
not have received the update the command should be executed again on the newly active. The command
does not survive an HA event.
For a service IP interface to import and start using the icmp ping check, the ping-template template-name
must be enabled and the destination-address ip-address, must be configured. When the ping-template
is added to the service IP interface the values associated with that ping-template are imported. When the
ping-template’s administrative state under the service IP interface is enabled, the values are checked again
to ensure the latest values associated with the ping-template are being used. The source ip address of
the packet is the primary IPv4 address of the service IP interface. This is not a configurable parameter.
When the ping-template command is administratively enabled under a service IP interface that is
operationally up, the interface is assumed to have connectivity until proven otherwise. This means the
interface state is not affected unless the ping template determines that there are connectivity issues based
on the interval, timeout, and failure-threshold commands. If the wanted behavior is for the ping-template
to validate service IP interface connectivity before allowing the service IP interface to become operational,
the service IP interface can be administratively disabled, the ping-template enabled under that interface,
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
and then the interface administratively enabled. This is considered to be operationally down because of
underlying conditions.
When the ping-template command is administratively enabled under a service IP interface that is
operationally down because of an underlying condition unrelated to icmp ping check, when the underlying
condition is cleared, the icmp ping check prevents the interface from entering the operationally up state
until it can verify the connectivity. When the underlying condition is cleared the icmp ping check function
enters the recovering phase using the reactivation-interval, reactivation-timeout, reactivation-
threshold, and the reactivation-failure-threshold values.
When a node is rebooted, service IP interfaces, with administratively enabled ping templates, must verify
the interface connectivity before allowing it to progress to an operationally up state. This ensures that
the interface does not bounce from operationally up to operationally down after a reboot and the service
IP interface state is properly reflected when the reboot is complete. Service IP interfaces that have an
administratively enabled ping-template enter the recovering phase using the reactivation-interval,
reactivation-timeout, reactivation-threshold and the reactivation-failure-threshold values following a
reboot.
When a soft reset condition is raised icmp ping check state for the service IP interface is held in the
same state it entered the process until the soft reset is complete. The interfaces exit the soft reset
in the same phase they entered but all counters are cleared. The service IP interfaces that have an
administratively enabled ping template enter this held state if they are in any way related to any hardware
that is undergoing a soft reset. Two examples to demonstrate the expected behavior are shown below.
When a service IP interface is related to a LAG, if a single port member in that LAG is affected by the soft
reset, the interface enters this held state. Similarly, if the service IP interface is connected using an R-VPLS
configuration it enters the held state.
The protocol used to determine the icmp ping check function has been added to the distributed CPU
protection list of protocols, icmp-ping-check. The distributed CPU protection function can be used to limit
the amount of icmp ping check packets received on a service IP interface with an enabled ping template.
This is an optional configuration that would prevent crossover impact on unrelated service IP interfaces
using icmp ping check because of a rogue interface.
The show>service>id>interface ip-int-name detail command has been updated with the ping-template
values and operational information. The most effective way to view the output is to use a match criterion for
‟Ping Template Values in Use”. The ‟Ping Template Values in Use” section of the output reports the current
values that were imported from the referenced config>test-oam>icmp>ping-template. The ‟Operational
Data” section of the output includes the administrative state (Up or Down) and destination address being
tested (IP address or notConfigured). It also includes the current interval in use (interval or reactivation-
interval) and the current state being reported, (operational, notRunning, failed). There are also pass and
fail counters reporting, while in the current state, the number of consecutive passes or fails that have
occurred. This provides a stability indicator. If these values are low, it may indicate that even though no
operational state transitions have occurred there are intermittent but frequent failures. If neither of these
counter are incrementing it is likely an underlying condition has been detected and the icmp ping check is
not attempting to send and cannot receive connectivity packets. These counters are cleared when moving
between different intervals, and for a soft reset.
show service id <service-id> interface <ip-int-name> detail | match "Ping Template Values in
Use" post-lines 29
Ping Template Values in Use
Name : customer-access-basic
Description : basic service detection and recovery
Dscp : nc1
Dot1p : 7
Interval : 10
Timeout : 1
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Failure Threshold: 3
React Fail Thresh: 9
React Interval : 1
React Timeout : 1
React Threshold : 3
Size : 56
TTL : 1
Ping Template Operational Data
Admin State : Up
Destination : 192.9.99.2
Current Interval : Interval
Current State : Operational
Ping Template Counters
Fail Counter : 0
Pass Counter : 107
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
3.2.1 TWAMP
Two-Way Active Measurement Protocol (TWAMP) provides a standards-based method for measuring the
IP performance (packet loss, delay, and jitter) between two devices. TWAMP leverages the methodology
and architecture of One-Way Active Measurement Protocol (OWAMP) to define a way to measure two-way
or round-trip metrics.
There are four logical entities in TWAMP: the control-client, the session-sender, the server, and the
session-reflector. The control-client and session-sender are typically implemented in one physical device
(the ‟client”) and the server and session-reflector in a second physical device (the ‟server”). The router acts
as the ‟server”.
The control-client and server establish a TCP connection and exchange TWAMP-Control messages over
this connection. When a server accepts the TCP control session from the control-client, it responds with a
server greeting message. This greeting includes the various modes supported by the server. The modes
are a bit mask. Each bit in the mask represents a functionality supported on the server. When the control-
client wants to start testing, the client communicates the test parameters to the server, requesting any
of the modes that the server supports. If the server agrees to conduct the described tests, the test begin
as soon as the client sends a Start-Sessions or Start-N-Session message. As part of a test, the session-
sender sends a stream of UDP-based test packets to the session-reflector, and the session-reflector
responds to each received packet with a response UDP-based test packet. When the session-sender
receives the response packets from the session-reflector, the information is used to calculate two-way
delay, packet loss, and packet delay variation between the two devices. The exchange of test PDUs is
referred to as TWAMP Test.
The TWAMP test PDU does not achieve symmetrical packet size in both directions unless the frame is
padded with a minimum of 27 bytes. The session-sender is responsible for applying the required padding.
After the frame is appropriately padded, the session-reflector reduces the padding by the number of bytes
needed to provide symmetry.
Server mode support includes:
• Individual Session Control (Mode Bit 4: Value 16)
• Reflected Octets (Mode Bit 5: Value 32)
• Symmetrical Size Test Packet (Mode Bit 6: Value 64)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Note: The TWAMP Light Reflector udp-port udp-port-number range configured as part of the
config>service | router>twamp-light create command implements a restricted reserved UDP
port range that must adhere to a range of 862,64364 to 64373 before an upgrade or reboot.
Configurations outside of this range result in a failure of the TWAMP Light Reflector or prevent
the upgrade operation. With an In-Service Software Upgrade (ISSU) function invoked, the udp-
port udp-port-number outside the allowable range, and the TWAMP Light Reflector in a no
shutdown state, the ISSU operation cannot proceed until, at a minimum, the TWAMP Light
Reflector is shutdown. If the TWAMP Light Reflector is shutdown, the ISSU can proceed,
but the TWAMP Light Reflector is not allowed to be activate in a no shutdown state until the
range is within the allowable range. A non-ISSU upgrade is can proceed regardless of the state
(shutdown or no shutdown) of the TWAMP Light Reflector. The configuration can load, but
the TWAMP Light Reflector remains inactive following the reload when the range is outside the
allowable range. When the udp-port udp-port-number for a TWAMP Light Reflector is modified,
all tests that were using the services of that reflector must update the dest-udp-port udp-port-
number configuration parameter to match the new reflector listening port.
If the source IP address in the TWAMP Light packet arriving on the responder does not match a configured
IP address prefix, the packet is dropped. Multiple prefix entries may be configured per context on the
responder. Configured prefixes can be modified without shutting down the reflector function. An inactivity
timeout under the config>oam-test>twamp>twamp-light command hierarchy defines the amount of time
the reflector keeps the individual reflector sessions active in the absence of test packets. A responder
requires CPM3 and beyond hardware.
Launching TWAMP Light test packets is under the control of the OAM Performance Monitoring (OAM-PM)
architecture and therefore adheres to those rules. This functionality is not available through interactive
CLI or interactive SNMP, it is only available under the OAM-PM configuration construct. OAM-PM reports
TWAMP Light delay and loss metrics. The OAM-PM architecture includes the assignment of a Test-ID. This
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
protocol does not carry the 4-byte test ID in the packet. This is for local significance and uniformity with
other protocols under the control of the OAM-PM architecture.
The OAM-PM construct allows various test parameters to be defined. These test parameters include
the IP session-specific information which allocates the test to the specific routing instance, the source
and destination IP address, the destination UDP port (which must match the UDP listening port on the
reflector), the source UDP port and a number of other parameters that allow the operator to influence the
packet handling. The source UDP port should only be configured when TWAMP distributed mode is being
deployed. The probe interval and TWAMP Light packet padding size can be configured under the specific
session. The pad size, the size of the all 0's pad, can configured to ensure that the TWAMP packet is the
same size in both directions. The session-sender role facilitated by the OAM-PM TWAMP Light testing only
sets the multiplier bits in the Error Estimate field contained in the TWAMP test packet. The 8-bit multiplier
field is set to 00000001. The preceding 8 bits of the Error Estimate field composed of S (1 bit - Time Sync),
Z (1 bit MBZ) and Scale (6 bits) are set to 0.
TWAMP Session Reflector and TWAMP-Light through the OAM-PM infrastructure allow for the
configuration of the allow-ipv6-udp-checksum-zero command to accept and process IPv6 TWAMP test
packets that arrive with a UDP checksum of zero.
TWAMP Test uses a single packet to gather both delay and loss metrics. This means there is special
consideration over those approaches that use a specific tool per metric type.
In the TWAMP-Light case the interval parameter, which defines the probe spacing, is a common option
applicable to all metrics collected under a single session. This requires the parameter to be removed from
any test specific configurations, like the timing parameter associated with loss, specifically availability.
Packet processing marks all fields in the PDU to report both delay and loss. The record-stats option can
be used to refine which fields to process as part of the OAM-PM architecture. The default collection routine
includes delay field processing only, record-stats delay. This is to ensure backward compatibility with
previous releases that only supported the processing delay fields in the PDU. Enabling the processing
of loss information requires the modification of the record-stats parameter. Adding loss to an active test
requires the active test to be shutdown, modified and activate with the no shutdown command.
WARNING: It is critical to remember that the no shutdown action clears all previously allocated
system memory for every test. Any results not written to flash or collected through SNMP are lost.
The record-stats setting do not change the configuration validation logic when a test is activated with the
no shutdown command. Even if the loss metrics are not being processed and reported the configuration
logic must ensure that the TWAMP test parameters are within the acceptable configuration limits, this
includes default loss configuration statements. An operator has the ability to configure a TWAMP Light
interval of 10s (10000ms) and record only delay statistics. The default timing parameter, used to compute
and report availability and reliability, should allow for the activation of the test without a configuration
violation. This requires the frame-per-delta-t frames default value of 1. An availability window cannot
exceed 100s regardless of the record-stats setting. Computing the size of the availability window is a
product of (interval*frames-per-delta-t*consec-delta-t).
The statistics display for the session with show all statistics that are being collected based on the record-
stats configuration. If either of the metrics is not being recorded the statistics display ‟NONE” for the
excluded metrics.
Multiple tests sessions between peers are allowed. These test sessions are unique entities and may have
different properties. Each test generates TWAMP packets specific to their configuration.
TWAMP Light is supported on deployments that use IPv4 or IPv6 addressing, which may each have their
own hardware requirements. All IP addressing must be unicast. IPv6 addresses cannot be a reserved or a
link local address. Multiple test sessions may be configured between the same source and destination IP
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
endpoints. The tuple Source IP, Destination IP, Source UDP, and Destination UDP provide a unique index
for each test point.
The OAM-PM architecture does not validate any of the TWAMP Light test session information. A test
session is allowed to be activated regardless of the validity of session information. For example, if the
source IP address configured is not local within the router instance that the test is allocated, the session
controller starts sending TWAMP Light test packets but does not receive any responses.
See OAM Monitoring and Reporting for more information about the integration of TWAMP Light and the
OAM-PM architecture, including hardware dependencies.
3.3 MPLS PM
RFC 6374, Packet Loss and Delay Measurement for MPLS Networks, provides a standard packet format
and process for measuring delay of a unidirectional or bidirectional label switched path (LSP) using the
General Associated Channel (G-ACh), channel type 0x000C. Unidirectional LSPs, such as RSVP-TE,
require an additional TLV to return a response to the querier (the launch point). RFC 7876, UDP Return
Path for Packet Loss and Delay Measurement for MPLS Networks, defines the source IP information to
include in the UDP Path Return TLV so the responding node can reach the querier using an IP network.
The MPLS DM PDU does not natively include any IP source information. With MPLS TP there is no
requirement for the TLV defined in RFC 7876.
The function of MPLS delay measurement is similar regardless of LSP type. The querier sends the MPLS
DM query message toward the responder, transported in an MPLS LSP. he responder extracts the required
PDU information to response appropriately.
Launching MPLS DM tests is configured in the config>oam-pm>session session-name test-family mpls
context. Basic architectural OAM PM components are required to be completed along with the MPLS
specific configuration. The test PDU includes the following PDU settings;
For the base PDU:
• Channel Type: 0x000C (MPLS DM)
• Flags: Query
• Control Code: out-of-band (unidirectional LSP) and in-band (bidirectional LSP)
• Querier Timestamp Format: IEEE 1588-2008 (1588v2) Precision Time Protocol truncated timestamp
format
• Session Identifier: The configured oam-pm>session>mpls>dm test-id test-id
• DSCP: The configured oam-pm>session>mpls>dscp dscp-name (this value is not used to convey or
influence the CoS setting in the MPLS TC field. The profile {in | out} and fc fc-name must be used to
influence CoS markings.
• Timestamp 1: Set to the local transmit time in PTP format
• Timestamp 2 and 3: set to 0
TVLs can also be included, based on the configuration.
• Padding (Type 0)
Copy in Response: Padding is returned in the response when the oam-
pm>session>mpls>dm>reflect-pad is configured.
• Padding (Type 128)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Do not copy in Response: Padding is not returned in the response (the typical configuration with
unidirectional LSPs) when the oam-pm>session>mpls>dm>pad-tlv-size is configured without the
reflect-pad command.
• UDP Return (Type 131)
UDP Return object: The IP information used by the reflector to reach the querier for an out-of-band
response, when the oam-pm>session>mpls>lsp is rsvp or rsvp-auto and the udp-return-object
information is configured.
The maximum pad size of 257 is a result of the structure of the defined TLV. The length field is one byte,
limiting the overall value to 255 bytes.
The reflector processes the inbound MPLS DM PDU and respond back to the querier based on the
received information, using the response flag setting. Specific to the timestamp, the responder responds to
the Query Timestamp Format, filling in the Timestamp 2 and Timestamp 3 values.
When the response arrives back at the querier, the delay metrics are computed. The common OAM-
PM computation model and naming is used to simplify and rationalize the different technologies that
leverage the OAM-PM infrastructure. The common methodology reports unidirectional and round trip delay
metrics for Frame Delay (FD), InterFrame Delay Variation (IFDV), and Frame Delay Range (FDR). The
term, "frame" is not indicative of the underlying technology being measured. It represents a normal cross
technology naming with applicability to the appropriate naming for the measured technology. The common
normal naming requires a mapping to the supported delay measurements included in RFC 6374.
Because OAM-PM uses a common reporting model, unidirectional (forward and backward), round-trip is
always reported. With unidirectional measurements, the T4 and T3 timestamps are zeroed but the round-
trip and backward direction are still reported. With unidirectional measurements, the backward and round
trip values are not of any significance.
An MPLS DM test may measure the endpoints of the LSP when the TTL is set to or higher than the
termination point. Midpoints along the path that support MPLS DM response functions can be targeted by
a test by setting a TTL to expire along the path. The MPLS DM launch and reflection, including mid-path
transit nodes, capability is disabled by default. To launch and reflect MPLS DM test packets config>test-
oam>mpls-dm must be enabled.
The SR OS implementation supports the following MPLS DM Channel Type 0x000C from RFC 6374
function:
• Label Switched Path types
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
– RSVP-TE and RSVP-TE Auto LSPs: sets out-of-band response request and requires the
configuration of the UDP-Return-Object
– MPLS-TP: sets in-band response request
• Querier and Responder
• Traffic class indicator set to on (1)
• Querier Timestamp format PTP
• Mandatory TLV 0 – Copy padding
• Optional TLV 128 – Do not copy padding
• Optional TLV 131 – UDP-Return-Object (RFC 7876)
The following functions are not supported:
• Packet Loss measurement
• Throughput management
• Dyadic measurements
• Loopback
• Mandatory TLVs
– TLV 1 – Return Address
– TLV 2 – Session Query Interval
– TLV 3 – Loopback Request
• Optional TLVs
– TLV 129 – Destination Address
– TLV 130 – Source Address
3.4 ETH-CFM
The IEEE and the ITU-T have cooperated to define the protocols, procedures and managed objects
to support service based fault management. Both IEEE 802.1ag standard and the ITU-T Y.1731
recommendation support a common set of tools that allow operators to deploy the necessary
administrative constructs, management entities and functionality, Ethernet Connectivity Fault Management
(ETH-CFM). The ITU-T has also implemented a set of advanced ETH-CFM and performance management
functions and features that build on the proactive and on demand troubleshooting tools.
CFM uses Ethernet frames and is distinguishable by ether-type 0x8902. In specific cases, the different
functions use a reserved multicast Layer 2 MAC address that could also be used to identify specific
functions at the MAC layer. The multicast MAC addressing is not used for every function or in every case.
The Operational Code (OpCode) in the common CFM header is used to identify the PDU type carried in
the CFM packet. CFM frames are only processed by IEEE MAC bridges.
IEEE 802.1ag and ITU-T Y.1731 functions that are implemented are available on the SR and ESS
platforms.
This section of the guide provides configuration example for each of the functions. It also provides the
various OAM command line options and show commands to operate the network. The individual service
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
guides provides the complete CLI configuration and description of the commands to build the necessary
constructs and management points.
Table 12: ETH-CFM acronym expansions lists and expands the acronyms used in this section.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
2 (String)
raw ASCII, excluding 0-31 decimal/0-1F hex (which are control characters) form the ASCII
table
3 (2-octet integer)
values 0 to 65535
4 (VPN ID)
Hex value as described in RFC 2685, Virtual Private Networks Identifier
32 (icc-format)
exactly 13 characters from the ITU-T recommendation T.50
Note: When a VID is used as the short MA name, 802.1ag does not support VLAN translation
because the MA-ID must match all the MEPs. The default format for a short MA name is an
integer. Integer value 0 means the MA is not attached to a VID. This is useful for VPLS services
on SR OS platforms because the VID is locally significant.
Note: The double quote character (‟) included as part of the ITU-T recommendation T.50 is not a
supported character on the SR OS.
Maintenance Domain Level (MD Level)/Maintenance Entity Group Level (MEG Level) is the numerical
value (0-7) representing the width of the domain. The wider the domain (higher the numerical value)
the farther the ETH-CFM packets can travel. It is important to understand that the level establishes the
processing boundary for the packets. Strict rules control the flow of ETH-CFM packets and are used to
ensure correct handling, forwarding, processing and dropping of these packets. ETH-CFM packets with
higher numerical level values flows through MEPs on MIPs on endpoints configured with lower level
values. This allows the operator to implement different areas of responsibility and nest domains within each
other. Maintenance association (MA) includes a set of MEPs, each configured with the same MA-ID and
MD level used to verify the integrity of a single service instance.
Note: Domain format and requirements that match that format, as well as association format and
those associated requirements, and the level must match on peer MEPs.
Maintenance Endpoints/MEG Endpoints (MEP) are the workhorses of ETH-CFM. A MEP is the unique
identification within the association (1-8191). Each MEP is uniquely identified by the MA-ID, MEP-ID tuple.
This management entity is responsible for initiating, processing and terminating ETH-CFM functions,
following the nesting rules. MEPs form the boundaries which prevent the ETH-CFM packets from flowing
beyond the specific scope of responsibility. A MEP has direction, up or down. Each indicates the directions
packets are generated; up toward the switch fabric, down toward the SAP away from the fabric. Each
MEP has an active and passive side. Packets that enter the active point of the MEP are compared to
the existing level and processed accordingly. Packets that enter the passive side of the MEP are passed
transparently through the MEP. Each MEP contained within the same maintenance association and with
the same level (MA-ID) represents points within a single service. MEP creation on a SAP is allowed only
for Ethernet ports with NULL, q-tags, q-in-q encapsulations. MEPs may also be created on SDP bindings.
A vMEP is a service level MEP configuration that installs ingress (down MEP-like) extraction on the
supported ETH-CFM termination points within a VPLS configuration.
Maintenance Intermediate Points/MEG Intermediate Points (MIPs) are management entities between the
terminating MEPs along the service path. MIPs provide insight into the service path connecting the MEPs.
MIPs only respond to Loopback Messages (LBM) and Linktrace Messages (LTM). All other CFM functions
are transparent to these entities.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
MIP creation is the result of the mhf-creation mode and interaction with related MEPs, and with the
direction of the MEP. Two different authorities can be used to determine the MIPs that should be
considered and instantiated. The domain and association or the default-domain hierarchies match the
configured bridge identifier and VLAN to the service ID and any configured primary VLAN. When a primary
VLAN MIP is not configured, the VLAN is either ignored or configured as none.
The domain and association MIP creation function triggers a search for all ETH-CFM domain association
bridge identifier matches to the service it is linked to. A MIP candidate is then be evaluated using the mhf-
creation mode and the rules that govern the algorithm. The domain association mhf-creation modes and
their uses are listed below:
• none
A MIP is not a candidate for creation using this domain association bridge identifier. This is the default
mhf-creation mode for every bridge identifier under this hierarchy.
• explicit
A MIP is a candidate for creation using this domain association bridge identifier only if a lower-level
MEP exists.
• default
A MIP is a candidate for creation using this domain association bridge identifier regardless of the
existence of a lower-level MEP. If a lower-level MEP is present, this creation mode behaves in the same
manner as explicit creation mode.
• static
A MIP is a candidate for creation using the domain association bridge identifier at the level of the
domain. This creation mode is specific to MIPs with the primary-vlan-enabled parameter configured.
Different VLANs maintain their own level hierarchies. Primary VLAN creation under this context requires
static mode.
For all modes except static mode, only a single MIP can be created. All candidates are collected and the
lowest-level valid MIP is created. In static mode, all valid MIPs are created for the bridge identifier VLAN
pair. A MIP is considered invalid if the level of the MIP is equal to or below a downward-facing MEP, or
below the level of an upward-facing MEP and the MIP shares the same service component as the Up MEP.
Not all creation modes require the mip creation statement within the service. The explicit and default mhf-
creation modes may instantiate a MIP without the mip creation statement under the service if a lower-level
MEP exists for the domain association bridge identifier. If a lower-level MEP does not exist, the default and
static mhf-creation modes require the mip creation statement on the service connection.
MEPs require the domain and association configurations to ensure that all ETH-CFM PDUs can be
supported. MIPs have restricted ETH-CFM PDU support: ETH-LB and ETH-LT. These two protocols do
not require the configuration of a domain and association. MIPs may be created outside of the association
context using the default-domain table.
The default-domain table is an object table populated with values that are used for MIP creation. The
table is indexed by the bridge identifier and VLAN. An index entry is automatically added when the mip
creation statement is added under a SAP or SDP binding. When an index entry is added, the bridge
identifier is set to the service ID and the VLAN is set to the primary-vlan-enable vlan-id. If the MIP does
not use primary VLAN functionality, the VLAN is configured as none. When the entry has been added
to the default-domain table, the default values can be configured. The default-domain table defers to the
system-wide, read-only values.
Because there are two different locations able to process the MIP creation logic, a per-bridge identifier
VLAN authority must be determined. The authority is a component, table, or configuration that is
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
responsible for executing the MIP creation algorithm. In general, any domain association bridge identifier
that could be used to create a specific MIP is authoritative. Other configurations influence the authority,
such as the type of MIP (primary VLAN or non-primary VLAN), the different mhf-creation modes, the
interaction of those modes with MEPs, and the direction of the MEP.
The following rules provide some high-level guidelines to determine the authority:
• rule 1
The original model predating the default-domain is always applied first. If a MIP is created using
the original model, the new model is not applied. The original model includes complex Up MEP MIP
creation rules. If an Up MEP exists on a service connection, any service connection other than the one
with the active Up MEP attempts to create the lowest higher-level MIP using the domain association
bridge identifier table. If a higher-level MIP cannot be created, and no higher-level association exists,
the default-domain table is consulted.
• rule 2
A mip creation statement is required under the service connection to use the default-domain table. This
is different from the domain association table. The domain association table does not require the mip
creation statement when the mhf-creation mode is configured as either explicit or default and a lower-
level MEP is present.
• rule 3
If no domain association bridge identifier matches the service ID, the default-domain table is consulted.
• rule 4
If a domain association bridge identifier matches a service ID for the sole purpose of MEP creation, and
no higher or lower domain association with the same bridge identifier exists, the default-domain table is
consulted.
– rule 4a
Any domain association bridge identifier matching a service ID with a configured VLAN and a static
mhf-creation mode is authoritative for all matching service IDs and MIPs with primary-vlan-enable
configured with the same VLAN.
– rule 4b
Any domain association bridge identifier attempting to create a MIP with primary-vlan-enable
configured is considered non-authoritative if the mhf-creation mode is anything other than static.
When the authority for MIP creation is determined, the MIP attributes are derived from that creation table.
The default domain table defers to the read-only, system-wide MIP values and inherits those defaults.
Some of the objects under the default-domain hierarchy must be configured using the same statement to
avoid transient and unexpected MIP creation while the configuration is being completed. To this end, the
mhf-creation mode and level have been combined in the same configuration statement.
The standard mhf-creation modes (none, default, explicit) are configurable as part of the default-domain
table. Static mode can only be configured under the domain association bridge identifier. This is because
default domain table indexing precludes multiple MIPs at different levels.
MIP creation requires configuration. The default values in both the domain association and the default
domain table prevent MIP instantiation.
The show eth-cfm mip-instantiation command can be used to check the authority for each MIP.
There are two locations in the configuration where ETH-CFM is defined. The first location, where the
domains, associations (including links to the service), MIP creation method, common ETH-CFM functions,
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
and remote MEPs are defined under the top-level eth-cfm command. The second location is within the
service or facility.
Table 13: ETH-CFM support matrix is a general table that indicates ETH-CFM support for the different
services and SAP or SDP binding. It is not meant to indicate the services that are supported or the
requirements for those services on the individual platforms.
PW-SAP No No Yes —
VPLS — — — — Yes
B-VPLS — — — — Yes
I-VPLS — — — — No
M-VPLS — — — — No
PBB Epipe — — — — No
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SAP Yes No No —
IES — — — — No
SAP Yes No No —
VPRN — — — — No
SAP Yes No No —
Figure 41: MEP creation illustrates the usage of an Epipe on two different nodes that are connected using
ether SAP 1/1/2:100.31. The SAP 1/1/10:100.31 is an access port that is not used to connect the two
nodes.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
NODE1
config>eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000101"
bridge-identifier 100
exit
exit
exit
domain 4 format none level 4
association 1 format icc-based name "04-0000000102"
bridge-identifier 100
exit
exit
exit
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
mep 111 domain 3 association 1 direction down
mac-address d0:0d:1e:00:01:11
no shutdown
exit
exit
exit
sap 1/1/10:100.31 create
eth-cfm
mep 101 domain 4 association 1 direction up
mac-address d0:0d:1e:00:01:01
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
NODE 2
eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000101"
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
bridge-identifier 100
exit
exit
exit
domain 4 format none level 4
association 1 format icc-based name "04-0000000102"
bridge-identifier 100
exit
exit
exit
----------------------------------------------
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
mep 112 domain 3 association 1 direction down
mac-address d0:0d:1e:00:01:12
no shutdown
exit
exit
exit
sap 1/1/10:100.31 create
eth-cfm
mep 102 domain 4 association 1 direction up
mac-address d0:0d:1e:00:01:02
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
Examining the configuration from NODE1, MEP 101 is configured with a direction of UP causing all ETH-
CFM traffic originating from this MEP to generate into the switch fabric and out the mate SAP 1/1/2:100.31.
MEP 111 uses the default direction of DOWN causing all ETH-CFM traffic that is generated from this MEP
to send away from the fabric and only egress the SAP on which it is configured, SAP 1/1/2:100.31.
Further examination of the domain constructs reveal that the configuration properly uses domain nesting
rules. In this case, the Level 3 domain is completely contained in a Level 4 domain.
Figure 42: MIP creation example (NODE1) illustrates the creation of an explicit MIP using the association
MIP construct.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
NODE1
config>eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000101"
bridge-identifier 100
exit
exit
exit
domain 4 format none level 4
association 1 format icc-based name "04-0000000102"
bridge-identifier 100
exit
exit
association 2 format icc-based name "04-MIP0000102"
bridge-identifier 100
mhf-creation explicit
exit
exit
exit
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
mep 111 domain 3 association 1 direction down
mac-address d0:0d:1e:00:01:11
no shutdown
exit
exit
exit
sap 1/1/10:100.31 create
eth-cfm
mep 101 domain 4 association 1 direction up
mac-address d0:0d:1e:00:01:01
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
NODE 2
eth-cfm# info
----------------------------------------------
domain 3 format none level 3
association 1 format icc-based name "03-0000000101"
bridge-identifier 100
exit
exit
exit
domain 4 format none level 4
association 1 format icc-based name "04-0000000102"
bridge-identifier 100
exit
exit
association 2 format icc-based name "04-MIP0000102"
bridge-identifier 100
mhf-creation explicit
exit
exit
exit
----------------------------------------------
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
mep 112 domain 3 association 1 direction down
mac-address d0:0d:1e:00:01:12
no shutdown
exit
exit
exit
sap 1/1/10:100.31 create
eth-cfm
mep 102 domain 4 association 1 direction up
mac-address d0:0d:1e:00:01:02
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
An addition of association 2 under domain 4 includes the mhf-creation explicit statement. This means
that when the level 3 MEP is assigned to the SAP 1/1/2:100.31 using the definition in domain 3 association
1, creating the higher level MIP on the same SAP. Because a MIP does not have directionality ‟Both” sides
are active. The service configuration and MEP configuration within the service did not change.
Figure 43: MIP creation default illustrates a simpler method that does not require the creation of the lower
level MEP. The operator simply defines the association parameters and uses the mhf-creation default
setting, then places the MIP on the SAP of their choice.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
NODE1:
config>eth-cfm# info
----------------------------------------------
domain 4 format none level 4
association 1 format icc-based name "04-0000000102"
bridge-identifier 100
exit
exit
association 2 format icc-based name "04-MIP0000102"
bridge-identifier 100
mhf-creation default
exit
exit
exit
----------------------------------------------
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
mip mac d0:0d:1e:01:01:01
exit
exit
sap 1/1/10:100.31 create
eth-cfm
mep 101 domain 4 association 1 direction up
mac-address d0:0d:1e:00:01:01
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
NODE2:
config>eth-cfm# info
----------------------------------------------
domain 4 format none level 4
association 1 format icc-based name "04-0000000102"
bridge-identifier 100
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
exit
exit
association 2 format icc-based name "04-MIP0000102"
bridge-identifier 100
mhf-creation default
exit
exit
exit
----------------------------------------------
config>service>epipe# info
----------------------------------------------
sap 1/1/2:100.31 create
eth-cfm
mip mac d0:0d:1e:01:01:02
exit
exit
sap 1/1/10:100.31 create
eth-cfm
mep 102 domain 4 association 1 direction up
mac-address d0:0d:1e:00:01:02
no shutdown
exit
exit
exit
no shutdown
----------------------------------------------
Figure 44: MEP, MIP and MD levels shows the detailed IEEE representation of MEPs, MIPs, levels and
associations, using the standards defined icons.
SAPs support a comprehensive set of rules including wild cards to map packets to services. For example,
a SAP mapping packets to a service with a port encapsulation of QinQ may choose to only look at
the outer VLAN and wildcard the inner VLAN. SAP 1/1/1:100.* would map all packets arriving on port
1/1/1 with an outer VLAN 100 and any inner VLAN to the service the SAP belongs to. These powerful
abstractions extract inbound ETH-CFM PDUs only when there is an exact match to the SAP construct.
In the case of the example when then an ETH-CFM PDU arrives on port 1/1/1 with a single VLAN with
a value of 100 followed immediately with e-type (0x8902 ETH-CFM). Furthermore, the generation of the
ETH-CFM PDUs that egress this specific SAP are sent with only a single tag of 100. The primary VLAN is
required if the operator needs to extract ETH-CFM PDUs or generate ETH-CFM PDUs on wildcard SAPs
and the offset includes an additional VLAN that was not part of the SAP configuration.
Table 14: Extraction comparison with primary VLAN shows how packets that would normally bypass the
ETH-CFM extraction would be extracted when the primary VLAN is configured. This assumes that the
processing rules for MEPs and MIPs is met, E-type 0x8902, Levels and OpCodes.
Port encapsulation E-type Ingress tags Ingress No primary VLAN With primary VLAN
SAP ETH-CFM extraction (10)
ETH-CFM
extraction
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Port encapsulation E-type Ingress tags Ingress No primary VLAN With primary VLAN
SAP ETH-CFM extraction (10)
ETH-CFM
extraction
The mapping of the service data remains unchanged. The primary VLAN function allows for one additional
VLAN offset beyond the SAP configuration, up to a maximum of two VLANs in the frame. If a fully qualified
SAP specifies two VLANs (SAP 1/1/1:10.10) and a primary VLAN of 12 is configured for the MEP there is
no extraction of ETH-CFM for packets arriving tagged 10.10.12. That exceeds the maximum of two tags.
The mapping or service data based on SAPs has not changed. ETH-CFM MPs functionality remains
SAP specific. In instances where as service includes a specific SAP with a specified VLAN (1/1/1:50) and
a wildcard SAP on the same port (1/1/1:*) it is important to understand how the ETH-CFM packets are
handled. Any ETH-CFM packet with etype 0x8902 arriving with a single tag or 50 would be mapped to a
classic MEP configured under SAP 1/1/1:50. Any packet arriving with an outer VLAN of 50 and second
VLAN of 10 would be extracted by the 1/1/1:50 SAP and would require a primary VLAN enabled MEP
with a value of 10, assuming the operator would like to extract the ETH-CFM PDU of course. An inbound
packet on 1/1/1 with an outer VLAN tag of 10 would be mapped to the SAP 1/1/1:*. If ETH-CFM extraction
is required under SAP 1/1/1:* a primary VLAN enabled MEP with a value of 10 would be required.
The packet that is generated from a MEP or MIP with the primary VLAN enabled is include that VLAN. The
SAP encapsulates the primary VLAN using the SAP encapsulation.
Primary VLAN support includes UP MEPs, DOWN MEPs and MIPs on Ethernet SAPs, including LAG, as
well as SDP bindings for Epipe and VPLS services. Classic MEPs, those without a primary VLAN enabled,
and a primary VLAN enabled MEPs can coexist under the same SAP or SDP binding. Classic MIPs and
primary VLAN-enabled MIPs may also coexist. The enforcement of a single classic MIP per SAP or SDP
binding continues to be enforced. However, the operator may configure multiple primary VLAN-enabled
MIPs on the same SAP or SDP binding. MIPs in the primary VLAN space must include the mhf-creation
static configuration under the association and must also include the specific VLAN on the MIP creation
statement under the SAP. The no version of the mip command must include the entire statement including
the VLAN information.
The eight MD Levels (0 to 7) are specific to context in which the Management Point (MP) is configured.
This means the classic MPs have a discrete set of the levels from the primary VLAN enabled space. Each
primary VLAN space has its own eight Level MD space for the specified primary VLAN. Consideration must
be extended before allowing overlapping levels between customers and operators should the operator be
provision a customer facing MP, like a MIP on a UNI. CPU Protection extensions for ETH-CFM are VLAN
unaware and based on MD Level and the OpCode. Any configured rates are applied to the Level and
OpCode as a group.
There are two configuration steps to enable the primary VLAN. Under the bridging instance, contained
within the association context (config>eth-cfm>domain>assoc>bridge), the VLAN information must be
configured. Until this is enabled using the primary-vlan-enable option as part of the MEP creation step or
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
An operator may see the following INFO message (during configuration reload), or MINOR (error)
message (during configuration creation) when upgrading to 11.0r4 or later if two MEPs are in a previously
undetected conflicting configuration. The messaging is an indication that a MEP, the one stated in the
message using format (domain md-index/association ma-index/mep mep-id), is already configured and
has allocated that context. During a reload (INFO) a MEP that encounters this condition is created but its
state machine is disabled. If the MINOR error occurs during a configuration creation this MEP fails the
creation step. The indicated MEP must be correctly re-configured.
INFO: ETH_CFM #1341 Unsupported MA ccm-interval for this MEP - MEP 1/112/
21 conflicts with sub-second config on this MA
MINOR: ETH_CFM #1341 Unsupported MA ccm-interval for this MEP - MEP 1/112/
21 conflicts with sub-second config on this MA
Service data arriving at an ingress SAP performs several parsing operations to map the packet to the
service as well as to VLAN functions. VLAN functions include determinating the service-delineated
VLANs based on the ingress configuration. Locally-generated CFM packets are unaware of the ingress
VLAN functions. This may lead to service data and CFM data tagging alignment issues when the
egress connection is a binding. For example, if the SDP is configured with vc-type vlan and the binding
referencing the SDP does not specify the VLAN tag with the optional vlan-vc-tag vlan-id configuration,
the service data crossing the service and the locally-generated CFM packets can use different VLAN tags.
A problem can occur if this VLAN is significant to the peer. Similarly, an EVPN service cannot specify the
vlan-vc-tag vlan-id to be used on the binding.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The optional cfm-vlan-tag <qtag1[.<qtag2>]> command used for MEP and MIP configurations supports
the alignment of service data and the locally generated CFM packet VLAN tags for bindings that require
matching VLAN tags. The qtag configuration should typically match the ingress SAP configuration. For
example, a SAP that is configured with an enacp-type qinq and the associated SAP of 100.* should
consider using the cfm vlan- tag 100 configuration option under the MEP or MIP, when a situation
describing misalignment of VLAN tags is encountered.
The cfm-vlan-tag <qtag1[.<qtag2>]> command option is supported for VPLS and Epipe services only.
The cfm-vlan-tag <qtag1[.<qtag2>]> command option is not supported for the following cases:
• when the configuration requires the CFM to include more than two VLAN tags, which may cause a
configuration error; invalid configurations include a MEP or MIP configured with a primary-vlan-enable
vlan-id and both tags specified of the cfm-vlan-tag <qtag1[.<qtag2>]>
• when the MIP creation does not include the MIP configuration statement under the service, specifically,
the default behavior MIP that is created solely based on the associated MHF creation
• when the context is config>service>template vpls-sap-template
• for G.8031 (ETH-tunnel) and G.8032 (ETH-ring)
• for a MIP on a PW-SAP
3.4.2 Loopback
A loopback message is generated by an MEP to its peer MEP or a MIP (Figure 45: CFM loopback). The
functions are similar to an IP ping to verify Ethernet connectivity between the nodes.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• SenderID TLV may optionally be configured to carry the ChassisID. When configured, this information is
included in LBM messages.
– Only the ChassisID portion of the TLV is included.
– The Management Domain and Management Address fields are not supported on transmission.
– As per the specification, the LBR function copies and returns any TLVs received in the LBM
message. This means that the LBR message includes the original SenderID TLV.
– Supported for both service (id-permission) and facility MEPs (facility-id-permission).
– Supported for both MEP and MIP.
• Displays the loopback test results on the originating MEP.
The ETH-LBM (loopback) function includes parameters for sub second intervals, timeouts, and new
padding parameters.
When an ETH-LBM command is issued using a sub second interval (100ms), the output success is
represented with a ‟!” character, and a failure is represented with a ‟.” The updating of the display waits for
the completion of the previous request before producing the next result. However, the packets maintain the
transmission spacing based on the interval option specified in the command.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!.!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!
When the interval is one seconds or higher, the output provides information that includes the number of
bytes (from the LBR), the source MEP ID (format md-index/ma-index/mepid), and the sequence number as
it relates to this test and the result.
Because ETH-LB does not support standard timestamps, no indication of delay is produced as these times
are not representative of network delay.
By default, if no interval is included in the command, the default is back to back LBM transmissions. The
maximum count for such a test is 5.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
3.4.4 Linktrace
A linktrace message is originated by an MEP and targeted to a peer MEP in the same MA and within
the same MD level (Figure 46: CFM linktrace). Linktrace traces a specific MAC address through the
service. The peer MEP responds with a linktrace reply message after successful inspection of the linktrace
message. The MIPs along the path also process the linktrace message and respond with linktrace replies
to the originating MEP if the received linktrace message that has a TTL greater than 1 and forward the
linktrace message if a look up of the target MAC address in the Layer 2 FDB is successful. The originating
MEP shall expect to receive multiple linktrace replies and from processing the linktrace replies, it can put
together the route to the target bridge.
A traced MAC address is carried in the payload of the linktrace message, the target MAC. Each MIP and
MEP receiving the linktrace message checks whether it has learned the target MAC address. To use
linktrace the target MAC address must have been learned by the nodes in the network. If so, a linktrace
message is sent back to the originating MEP. Also, a MIP forwards the linktrace message out of the port
where the target MAC address was learned.
The linktrace message itself has a multicast destination address. On a broadcast LAN, it can be received
by multiple nodes connected to that LAN. But, at most, one node sends a reply.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
An MEP may be configured to generate ETH-CC packet using a unicast destination Layer 2 MAC address.
This may help reduce the overhead in some operational models where Down MEPs per peer are not
available. For example, mapping an I-VPLS to a PBB core where a hub is responsible for multiple spokes
is one of the applicable models. When ETH-CFM packets are generated from an I-context toward a
remote I-context, the packets traverse the B-VPLS context. Because many B-contexts are multipoint,
any broadcast, unknown or multicast packet is flooded to all appropriate nodes in the B-context. When
ETH-CC multicast packets are generated, all the I-VPLS contexts in the association must be configured
with all the appropriate remote MEPids. If direct spoke to spoke connectivity is not part of the validation
requirement, the operational complexity can be reduced by configuring unicast DA addressing on the
‟spokes” and continuing to use multicast CCM from the ‟hub”. When the unicast MAC is learned in the
forwarding database, traffic is scoped to a single node.
Defect condition, reception, and processing remains unchanged for both hub and spokes. When an ETH-
CC defect condition is raised on the hub or spoke, the appropriate defect condition is set and distributed
throughout the association from the multicasting MEP. For example, should a spoke raise a defect
condition or timeout, the hub sets the RDI bit in the multicast ETH-CC packet which is received on all
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
spokes. Any local hub MEP defect condition continues to be propagated in the multicast ETH-CC packet.
Defect conditions are cleared as per normal behavior.
The forwarding plane must be considered before deploying this type of ETH-CC model. A unicast packet
is handled as unknown when the destination MAC does not exist in local forwarding table. If a unicast
ETH-CC packet is flooded in a multipoint context, it reaches all the appropriate I-contexts. This causes the
spoke MEPs to raise the ‟DefErrorCCM” condition because an ETH-CC packet was received from a MEP
that has not been configured as part of the receiving MEPs database.
The remote unicast MAC address must be configured and is not automatically learned. A MEP cannot
send both unicast and multicast ETH-CC packets. Unicast ETH-CC is only applicable to a local association
with a single configured remote peer. There is no validation of MAC addresses for ETH-CC packets.
The configured unicast destination MAC address of the peer MEP only replaces the multicast class 1
destination MAC address with a unicast destination.
Unicast CCM is not supported on any MEPs that are configured with sub second CCM-intervals.
The following functions are supported:
• Enable and disable CC for an MEP
• Configure and delete the MEP entries in the CC MEP monitoring database manually. It is only required
to provision remote MEPs. Local MEPs shall be automatically put into the database when they are
created.
• CCM transmit interval: 10ms, 100ms, 1s, 10s 60s, 600s. Default: 10s. Interval support is platform
dependent. When configuring MEPs with sub-second CCM intervals, bandwidth consumption must
be taken into consideration. Each CCM PDU is approximately 100 bytes (800 bits). Taken individually,
this is a small value. However, the bandwidth consumption increases rapidly as multiple MEPs are
configured with 10ms timers, 100 packets per second.
The following section describes some basic hierarchical considerations and the software requirements
and configurations that need to be met when considering sub-second enabled MEPs.
– Down MEPs only
– Single peer only
– Any MD Level
• As long as lower MD level MEPs are not CCM or ETH-APS enabled
G.8031 Ethernet-Tunnels enables OpCode39 Linear APS
G.8032 Ethernet-Rings enables OpCode 40 Ring APS
• As long as lower MD levels MEPs are not receiving ETH-CCM or ETH-APS PDUs, even if they
not locally enabled or configured to do so
The reception of the lower MD level ETH-CCM and ETH-APS PDUs are processed by the sub
second CCM enabled MEP, regardless of MD Level
All other ETH-CFM PDUs are handled by the MEP at the MD level matching the PDU that has
arrived, assuming one has been configured
– Service MEPs (excluding primary VLAN MEPs)
• Ethernet SAPs configured on Port with any Ethernet Encapsulation (null, dot1q or QinQ)
– Facility MEPs
• Ethernet Port Based MEPs
• Ethernet LAG Based MEPs
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• An alarm is raised and a trap is sent if the defect is greater than or equal to the configured low-priority-
defect value.
• Remote Defect Indication (RDI) is supported but by default is not recognized as a defect condition
because the low-priority-defect setting default does not include RDI.
• SenderID TLV may optionally be configured to carry the ChassisID. When configured, this information is
included in CCM messages.
– Only the ChassisID portion of the TLV is included.
– The Management Domain and Management Address fields are not supported on transmission.
– SenderID TLV is not supported with sub second CCM enabled MEPs.
– Supported for both service (id-permission) and facility MEPs (facility-id-permission).
• Alarm notification alarm and reset times are configurable under the MEP. By default, the alarm
notification times are set to zero, which means the behavior is immediate logging and resetting. When
the value is zero and a previous higher level alarm is reset, if a lower level alarm exists, and is above
the low-priority defect, a log event is created. However, when either of the alarm notification timers are
non-zero and a lower priority alarm exists, it is not logged.
– Alarm (fng-alarm-time) delays the generation of the log event by the value configured. The alarm
must be present for this amount of time before the log event is created. This is for only log event
purposes.
– Reset (fng-reset-time) is the amount of time the alarm must be absent before it is cleared.
The optional ccm-tlv-ignore command ignores the reception of interface-status and port-status TLVs in the
ETH-CCM PDU on Facility MEPs (port, LAG, QinQ, tunnel and router). No processing is performed on the
ignored ETH-CCM TLVs values.
Any TLV that is ignored is reported as absent for that remote peer and the values in the TLV do not have
an impact on the ETH-CFM state machine. This the same behavior as if the remote MEP never included
the ignored TLVs in the ETH-CCM PDU. If the TLV is not properly formed, the CCM PDU fails the packet
parsing process, which causes it to be discarded and a defect condition is raised.
There are various display commands that are available to show the status of the MEP and the list of
remote peers.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
new MEPs can be added, the ‟unexpected MEP” condition raises the defErrorCCM defect condition. This
is because the MEP was not added to the association and the remote MEP is still transmitting CCM.
The clear eth-cfm auto-discovered-meps [mep-id] domain md-index association ma-index is available
to remove auto discovered MEPs from the association. When the optional mep-id is included as part of
the clear command, only that specific MEP-ID within the domain and association is cleared. If the optional
mep-id is omitted when the clear command is issued, all auto discovered MEPs that match the domain and
association are cleared. The clear command is only applicable to auto-discovered MEPs.
If there is a failure to add a MEP to the MEP database and the action was manual addition using the
‟remote-mepid” configuration statement, the error ‟MINOR: ETH_CFM #1203 Reached maximum number
of local and remote endpoints configured for this association” is produced. When failure to add a MEP to
the database through an auto discovery, no event is created. The CCM Last Failure indicator tracks the last
CCM error condition. The decode can be viewed using the show eth-cfm mep mep-id domain md-index
association ma-index command. An association may include both the manual addition of remote peers
using the remote-mepid and the auto-mep-discovery option.
The all-remote-mepid display includes an additional column AD to indicate where a MEP has been auto
discovered, using the indicator T.
Auto discovered MEPs do not survive a system reboot. These are not permanent additions to the MEP
database and are not reloaded after a reboot. The entries are relearned when the CCM is received. Auto
discovered MEPs can be changed to manually created entries simply by adding the appropriate remote-
mepid statement to the correct association. At that point, the MEP is no longer considered auto discovered
and can no longer be cleared.
If a remote-mepid statement is removed from the association context and auto-mep-discovery is configured
and a CC message arrives from that remote MEP, it is added to the MEP database, this time as an auto
discovered MEP.
The individual MEP database for an association must not exceed the maximum number of MEPs allowed.
A MEP database consists of all local MEPs plus all configured remote-mepids and all auto-discovered
MEPs. If the number of MEPs in the association has reached capacity, no new MEPs may be added.
The number of MEPs must be brought below the maximum value before MEPs can be added. Also, the
number of MEPs across all MEP databases must not exceed the system maximum. The number of MEPs
supported per association and the total number of MEPs across all associations is platform dependent.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
of a specific IOM or line card. This means that all MEPs enter a grace state, regardless of their location on
the local node.
The grace process prevents the local MEP from presenting a new timeout condition, and prevents its peer,
also supporting a complementary grace process, from declaring a new timeout defect (DefRemoteCCM).
Other defects, unrelated to timeout conditions, are processed as during normal operation. This includes
the setting, transmission, and reception processing of the RDI flag in the CCM PDU. Because the timeout
condition has been prevented, it can be assumed that the RDI is caused by some other unrelated CCM
defect condition. Entering the grace period does not clear existing defect conditions, and any defect
condition that exists at the start of the grace period is maintained and cleared using normal operation.
Two approaches are supported for ETH-CFM grace:
• ETH-VSM grace (Nokia SR OS vendor-specific)
• ITU-T Y.1731 ETH-ED
Both approaches use the same triggering infrastructure but have unique PDU formats and processing
behaviors. Only one grace transmission function can be active under an individual MEP. MEPs can be
configured to receive and process both grace PDU formats. If a MEP receives both types of grace PDUs,
the last grace PDU received becomes the authority for the grace period, using its procedures. If the
operator needs to clear a grace window or expected defect window on a receiving peer, the appropriate
authoritative reception function can be disabled.
Active AIS server transmissions include a vendor-specific TLV that instructs the client to extend the timeout
of AIS during times of grace. When the grace period is completed, the server MEP removes the TLV and
the client reverts to standard timeout processing based on the interval in the AIS PDU.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Expected Defect (ETH-ED) standard. As specified in the standards, when a node does not support a
specific optional function such as ETH-VSM, the message is ignored and no processing is performed.
The ETH-VSM function is enabled by default for reception and transmission. The per-MEP configuration
statements under the grace>eth-vsm-grace context can affect the transmission, reception, and
processing of the ETH-VSM grace function.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
It is possible to change this command on the fly without deleting it first. Entering the command with the new
values change the values without having to first delete the command.
It is possible to change the ccm-interval of a MEP on the fly without first deleting it. This means it is
possible to change a sub-second CCM-enabled MEP to 1 second or more. The operator is prevented from
changing an association from a sub second CCM interval to a non-sub second CCM interval when a ccm-
hold-timer is configured in that association. The ccm-hold-timer must be removed using the no option
before allowing the transition from sub second to non-sub second CCM interval.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Therefore, upon receiving a frame with ETH-AIS information, the MEP suppresses alarms for all peer
MEPs whether there is still connectivity or not.
Only a MEP, including a server MEP, is configured to issue frames with ETH-AIS information. Upon
detecting a defect condition the MEP can immediately start transmitting periodic frames with ETH-AIS
information at a configured client MEG Level. A MEP continues to transmit periodic frames with ETH-AIS
information until the defect condition is removed. Upon receiving a frame with ETH-AIS information from its
server (sub) layer, a client (sub) layer MEP detects AIS condition and suppresses alarms associated with
all its peer MEPs. A MEP resumes alarm generation upon detecting defect conditions when AIS condition
is cleared.
AIS may also be triggered or cleared based on the state of the entity over which it has been enabled.
Including the optional command interface-support-enable under the ais-enable command tracks the
state of the entity and invoke the appropriate AIS action. This means that operators are not required to
enable CCM on a MEP to generate AIS if the only requirement is to track the local entity. If a CCM enabled
MEP is enabled in addition to this function then both are used to act upon the AIS function. When both
CCM and interface support are enabled, a fault in either triggers AIS. To clear the AIS state, the entity
must be in an UP operational state and there must be no defects associated with the MEP. The interface
support function is available on both service MEPs and facility MEPs both in the Down direction only,
with the following exception. An Ethernet QinQ Tunnel Facility MEP does not support interface-support-
enable. Many operational models for Ethernet QinQ Tunnel Facility MEPs are deployed with the SAP in the
shutdown state.
The following specific configuration information is used by a MEP to support ETH-AIS:
client MEG level MEG level at which the most immediate client layer MIPs and MEPs exist
ETH-AIS determines the transmission period of frames with ETH-AIS information
transmission period
priority identifies the priority of frames with ETH-AIS information
drop eligibility frames with ETH-AIS information are always marked as drop ineligible
interface-support- optional configuration to track the state of the entity over which the MEP is
enable configured
low-priority-defect optional configuration to exclude the CCM RDI condition from triggering the
generation of AIS
A MIP is transparent to frames with ETH-AIS information and therefore does not require any information to
support ETH-AIS functionality.
It is important to note that Facility MEPs do not support the generation of AIS to an explicitly configured
endpoint. An explicitly configured endpoint is an object that contains multiple individual endpoints, as in
pseudowire redundancy.
AIS is enabled under the service and has two parts, receive and transmit. Both components have their own
configuration option. The ais-enable command under the SAP allows for the processing of received AIS
packets at the MEP level. The client-meg-level command is the transmit portion that generates AIS if the
MEP enter a fault state.
When MEP 101 enters a defect state, it starts to generate AIS out the passive side of the MEP, away from
the fault. In this case, the AIS generates out sap 1/1/10:100.31 because MEP 101 is an up MEP on that
SAP. The Defect Flag indicates that an RDI error state has been encountered. The Eth-Ais Tx Counted
value is increasing, indicating that AIS is actively being sent.
A single network event may, in turn, cause the number of AIS transmissions to exceed the AIS transmit
rate of the network element. A pacing mechanism is in place to assist the network element to gracefully
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
handle this overload condition. Should an event occur that causes the AIS transmit requirements to exceed
the AIS transmit resources, a credit system is used to grant access to the resources. Once all the credits
have been used, any remaining MEPs attempting to allocate a transmit resource are placed on a wait
list, unable to transmit AIS. If a credit be released, when the condition that caused the MEP to transmit
AIS is cleared, a MEP on the wait list consumes the newly available credit. If it is critical that AIS transmit
resources be available for every potential event, consideration must be given to the worst case scenario
and the configuration should never exceed the potential. Access to the resources and the wait list are
ordered and maintained in first come first serve basis.
A MEP that is on the wait list only increments the ‟Eth-Ais Tx Fail” counter and not the ‟Eth-Ais TxCount”
for every failed attempt while the MEP is on the wait list.
There is no synchronization of AIS transmission state between peer nodes. This is particularly important
when AIS is used to propagate fault in ETH-CFM MC-LAG linked designs.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
MEP. Any ETH-TST packet generated that exceeds the MTU is silently dropped by the lower level
processing of the node.
Specific configuration information required by a MEP to support ETH-test is the following:
• MEG level (MEG level at which the MEP exists)
• unicast MAC address of the peer MEP for which ETH-test is intended
• data (optional element whose length and contents are configurable at the MEP)
• priority (identifies the priority of frames with ETH-Test information)
• drop eligibility (identifies the eligibility of frames with ETHTest information to be dropped when
congestion conditions are encountered)
A MIP is transparent to the frames with ETH-Test information and does not require any configuration
information to support ETH-Test functionality.
Both nodes require the eth-test function to be enabled to successfully execute the test. Because this is a
dual-ended test, initiate on sender with results calculated on the receiver, both nodes need to be check to
see the results.
Note: Accuracy relies on the nodes ability to timestamp the packet in hardware, and the support
of PTP for clock sync.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
This synthetic loss measurement approach is a single-ended feature that allows the operator to run on-
demand and proactive tests to determine ‟in”, ‟out” loss and ‟unacknowledged” packets. This approach
can be used between peer MEPs in both point to point and multipoint services. Only remote MEP peers
within the association and matching the unicast destination respond to the SLM packet.
The specification uses various sequence numbers to determine in which direction the loss occurred. Nokia
has implemented the required counters to determine loss in each direction. To properly use the information
that is gathered the following terms are defined:
• count
This is the number of probes that are sent when the last frame is not lost. When the last frames are lost,
the count + unacknowledged equals the number of probes sent.
• out-loss (far-end)
This represents packets lost on the way to the remote node, from test initiator to test destination.
• in-loss (near-end)
This represents packets lost on the way back from the remote node to the test initiator.
• unacknowledged
This is the number of packets at the end of the test that were not responded to.
The per probe specific loss indicators are available when looking at the on-demand test runs, or
the individual probe information stored in the MIB. When tests are scheduled by Service Assurance
Application (SAA) the per probe data is summarized and per probe information is not maintained. Any
‟unacknowledged” packets are recorded as ‟in-loss” when summarized.
The on-demand function can be executed from CLI or SNMP. The on demand tests are meant to provide
the carrier a means to perform on the spot testing. However, this approach is not meant as a method for
storing archived data for later processing. The probe count for on demand SLM has a range of one to
100 with configurable probe spacing between one second and ten seconds. This means it is possible that
a single test run can be up to 1000 seconds in length. Although possible, it is more likely the majority of
on demand case are run up to 100 probes or less at a one second interval. A node may only initiate and
maintain a single active on demand SLM test at any one time. A maximum of one storage entry per remote
MEP is maintained in the results table. Subsequent runs to the same peer overwrite the results for that
peer. This means when using on demand testing the test should be run and the results checked before
starting another test.
The proactive measurement functions are linked to SAA. This backend provides the scheduling, storage
and summarization capabilities. Scheduling may be either continuous or periodic. It also allows for the
interpretation and representation of data that may enhance the specification. As an example, an optional
TLV has been included to allow for the measurement of both loss and delay/jitter with a single test. The
implementation does not cause any interoperability because the optional TLV is ignored by equipment
that does not support this. In mixed vendor environments loss measurement continues to be tracked but
delay and jitter only reports round trip times. It is important to point out that the round trip times in this
mixed vendor environment include the remote nodes processing time because only two time stamps are
included in the packet. In an environment where both nodes support the optional TLV to include time
stamps unidirectional and round trip times are reported. Because all four time stamps are included in the
packet, the round trip time in this case does not include remote node processing time. Of course, those
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
operators that want to run delay measurement and loss measurement at different frequencies are free to
run both ETH-SL and ETH-DM functions. ETH-SL is not replacing ETH-DM. Service Assurance is only
briefly discussed here to provide some background on the basic functionality.
The ETH-SL packet format contains a test-id that is internally generated and not configurable. The test-id
is visible for the on demand test in the display summary. It is possible a remote node processing the SLM
frames receive overlapping test-ids as a result of multiple MEPs measuring loss between the same remote
MEP. For this reason, the uniqueness of the test is based on remote MEP-ID, test-id and source MAC of
the packet.
ETH-SL is applicable to up and down MEPs and as per the recommendation transparent to MIPs. There
is no coordination between various fault conditions that could impact loss measurement. This is also true
for conditions where MEPs are placed in shutdown state as a result of linkage to a redundancy scheme
like MC-LAG. Loss measurement is based on the ETH-SL and not coordinated across different functional
aspects on the network element. ETH-SL is supported on service based MEPs.
It is possible that two MEPs may be configured with the same MAC on different remote nodes. This causes
various issues in the FDB for multipoint services and is considered a misconfiguration for most services.
It is possible to have a valid configuration where multiple MEPs on the same remote node have the same
MAC. In fact, this is somewhat likely. Only the first responder is used to measure packet loss. The second
responder is dropped, because the same MAC for multiple MEPs is only truly valid on the same remote
node.
There is no way for the responding node to understand when a test is completed. For this reason a
configurable inactivity-timer determines the length of time a test is valid. The timer maintains an active
test as long as it is receiving packets for that specific test, defined by the test-id, remote MEP ID and
source MAC. When there is a gap between the packets that exceeds the inactivity timer value, the
responding node releases the index in the table and responds with a sequence number of 1, regardless of
the sequence number sent by the instantiating node. Expiration of this timer causes the reflecting peer to
expire the previous test. Packets that follow the expiration of a text are viewed as a new test. The default
for the inactivity-timer is 100 second and has a range of ten to 100 seconds.
Only the configuration is supported by HA. There is no synchronization of data between active and
standby. Any unwritten, or active tests are lost during a switchover and the data is not recoverable.
ETH-SL provides a mechanism for operators to pro-actively trend packet loss.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
or maximum. A running total of all transmit and receive values is used to determine the average Frame
Loss Ratio (FLR) at the completion of the measurement interval. The data set includes the protocol
information in the opening header, followed by the frame counts in each direction, and finally the FLR
percentages.
The user must understand the restrictions of service before selecting this method of loss measurement.
Statistics are maintained per forwarding complex. Multiple path environments may spread frames between
the same two peers across different forwarding complexes (for example, link aggregation groups). The
ETH-LMM protocol has no method to rationalize different transmit and receive statistics when there
are complex changes or when any statistics are cleared on either of the peer entities. The protocol
resynchronizes but the data collected for that measurement interval is invalid. The protocol has no method
to determine if the loss is true loss or whether some type of complex switch has occurred or statistics
were cleared. Consequently, the protocol cannot use any suspect flag to mark the data as invalid. Higher
level systems must coordinate network events and administrative actions that can cause the counters to
become non-representative of the service data loss.
Packet reordering also affect frame loss and gain reporting. If there is queuing contention on the local node
or if path differences in the network cause interleaved or delayed frames, the counter stamped into the
LMM PDU can introduce frame gain or loss in either direction. For example, if the LMM PDU is stamped
with the TxFCf counter and the LMM PDU traffic is interleaved, the interleaving cannot be accounted for
in the counter and a potential gain is realized in the forward direction. This is because the original counter
included as the TxFCf value does not include the interleaved packets and the RxFCf counter on the remote
peer includes them. Gains and losses even out over the life of the measurement interval. Absolute values
are used for any negative values, per interval or at the end of the measurement interval.
Launching a single-ended test is under the control of the OAM Performance Monitoring (OAM-PM)
architecture, and the test adheres to the rules of OAM-PM. The ETH-LMM functionality is only available
under the OAM-PM configuration. This feature is not available through interactive CLI or SAA. OAM-PM
requires the configuration of a test ID for all OAM-PM tests. The ETH-LMM protocol does not define the
necessity for this ID, nor does it carry the 4-byte test ID in the packet. This is for local significance and
uniformity with other protocols under the control of the OAM-PM architecture.
Support is included for point-to-point Up and Down Service MEPs and Down Facility MEPs (port, LAG, and
base router interfaces). Base router interface accuracy may be affected by the Layer 2 or Layer 3 inter-
working functions, routing protocol, ACLs, QoS policies, and other Layer 3 functions that were never meant
to be accounted for by an Ethernet frame loss measurement tool. Launch functions require IOM/IMM or
later, as well as a SF/CPM3 or later.
Resource contention extends beyond the sharing of common LMM resources used for packet counting and
extraction. There is also protocol-level contention. For example, Cflowd cannot be counted or sampled on
an entity that is collecting LMM statistics. Collection of statistics per Ethernet SAP, per MPLS SDP binding,
or per facility is not enabled by default.
ETH-LMM is not supported in the following models:
• up MEPs in an I-VPLS or PBB Epipe that crosses a PBB infrastructure. This configuration results in
LMM PDUs being discarded on the remote BVPLS node.
• ETH-LMM when primary VLANs are configured against the MEP
• nonoperational SAP or MPLS SDP bindings over which the Up MEP is configured. This configuration
causes LMM or LMR transmissions to fail because the SAP which stores the counters is unavailable to
the LMM PDU.
QinQ tunnel collection is the aggregate of all outer VLANs that share the VLAN with the tunnel. If the QinQ
is configured to collect LMM statistics, then any service MEP that shares the same VLAN as the QinQ
tunnel is blocked from configuring the respective collect-lmm-stats command. The reverse is also true; if
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
a fully qualified SAP is configured to collect LMM statistics, the QinQ tunnel that shares the outer VLAN is
blocked from configuring the respective collect-lmm-stats command.
QoS models contribute significantly to the accuracy of the LMM counters. If the QoS function is beyond the
LMM counting function, it can lead to mismatches in the counter and transmit and receive information.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
MAC address for the remote peer, the test runs to completion with the initial MAC address. If the table does
not contain the required entry, the test terminates after the lesser window of either the full test run or 300 s.
A run that cannot successfully determine a unicast MAC address designates the last test result as ‟failed”.
If a test is configured with the continuous configuration option, it is rescheduled; otherwise, the test is not
rescheduled.
OAM-PM Ethernet test families, specifically DMM, SLM, and LMM, support the remote-mepid mep-id
option as an alternative to the dest-mac ieee-address configuration. If the learned remote MAC table
contains a unicast learned remote MAC address for the remote peer, the test uses this MAC address
as the destination. OAM-PM adapts to changes for MAC addressing during the measurement interval
when the remote-mepid mep-id option is configured. It should be expected that the measurement interval
includes update-induced PM errors during the transition. If the table does not contain the required entry,
the test does not attempt to transmit test PDUs, and presents the ‟Dest Remote MEP Unknown” detectable
transmission error.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
A complementary QoS configuration is required to allow the system to process nominal bandwidth updates
from the CFM engine. The configure port ethernet no eth-bn-egress-rate changes CLI command
is required to enable the QoS function to update the port egress rates based on the current available
bandwidth updates from the CFM engine. By default, the function is disabled.
Both the CFM and the QoS functions must be enabled for the changes in current bandwidth to dynamically
update the egress rate.
When the MEP enters a state that prevents it from receiving the ETH-BNM, the current bandwidth last sent
for processing is cleared and the egress rate reverts to the configured rate. Under these conditions, the
last update cannot be guaranteed as current. Explicit notification is required to dynamically update the port
egress rate. The following types of conditions lead to ambiguity:
• administrative MEP shutdown
• port admin down
• port link down
• eth-bn no receive transitioning the ETH-BN function to disable
If the configure port ethernet eth-bn-egress-rate-changes command is disabled using the no option,
CFM continues to send updates, but the updates are held without affecting the port egress rate.
The ports supporting ETH-BN MEPs can be configured for network, access, or hybrid modes. When ETH-
BN is enabled on a port MEP and the config>port>ethernet>eth-cfm>mep>eth-bn>receive and the
QoS config>port>ethernet>eth-bn-egress-rate-changes contexts are configured, the egress rate is
dynamically changed based on the current available bandwidth indicated by the ETH-BN server.
The port egress rate is capped by the minimum of the configured egress rate and the maximum port rate.
The minimum egress rate is one kbyte. If a current bandwidth of zero is received, it does not affect the
egress port rate and the previously processed current bandwidth continues to be used.
The client MEP requires explicit notification of changes to update the port egress rate. The system does
not timeout any previously-processed current bandwidth rates using a timeout condition. The specification
does allow a timeout of the current bandwidth if a message has not been received in 3.5 times the ETH-
BN interval. However, the implicit approach can lead to misrepresented conditions and has not been
implemented.
When starting or restarting the system, the configured egress rate is used until an ETH-BNM arrives on the
port with a new bandwidth request from the ETH-BN server MEP.
An event log is generated each time the egress rate is changed based on reception of an ETH-BNM. If an
ETH-BNM is received that does not result in a bandwidth change, no event log is generated.
The destination MAC address can be a Class 1 multicast MAC address (that is, 01-80-C2-00-0x) or the
MAC address of the port MEP configured. Standard CFM validation and identification must be successful
to process any CFM PDU.
For information about the eth-bn-egress-rate-changes command, see the 7450 ESS, 7750 SR,
7950 XRS, and VSR Interface Configuration Guide.
The PDU used for ETH-BN information is called the Bandwidth Notification Message (BNM). It is identified
by a sub-OpCode within the Ethernet Generic Notification Message (ETH-GNM).
Table 15: BNM PDU format fields shows the BNM PDU format fields.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Label Description
MEG Level Carries the MEG level of the client MEP (0 to 7). This field
must be set to either 0 or 1 to be recognized as a port MEP.
Current Bandwidth The current bandwidth of the link in Mbytes/s. The value is
used to influence the egress rate.
Port ID A non-zero unique identifier for the port associated with the
ETH-BN information, or zero if not used.
This information is reported in the display, but is not used to
influence QoS egress rates.
The show eth-cfm mep eth-bandwidth-notification display output includes the ETH-BN values received
and extracted from the PDU, including the last reported value and the pacing timer. If n/a appears in the
field, it means that field has not been processed.
The base show eth-cfm mep output is expanded to include the disposition of the ETH-BN receive function
and the configured pacing timer.
The show port port-id detail is expanded to include an ETH-BNM section. This section includes the
egress rate disposition and the current egress BN rate being used.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
do not include the counting of sub-second CCM, ETH-CFM PDUs that are generated by non-ETH-CFM
functions (which includes OAM-PM and SAA) or are filtered by an applicable security configuration.
SAA and OAM-PM use standard CFM PDUs. The reception of these packets are included in the receive
statistics. However, these two functions are responsible for launching their own test packets and do not
consume ETH-CFM transmission resources.
Per system and per MEP statistics are available with a per OpCode breakdown. Use the show>eth-
cfm>statistics command to view the statistics at the system level. Use the show>eth-cfm>mep mep-
id domain md-index association ma-index statistics command to view the per MEP statistics. These
statistics may be cleared by substituting the clear command for the show command. The clear function
only clears the statistics for that function. For example, clearing the system statistics does not clear the
individual MEP statistics, each maintain their own unique counters.
All known OpCodes are listed in transmit and receive columns. Different versions for the same OpCode are
not distinguished for this display. This does not imply the network element supports all listed functions in
the table. Unknown OpCodes are dropped.
It is also possible to view the top ten active MEPs on the system. The term active can be defined as any
MEP that is in a no shutdown state. The tools dump eth-cfm top-active-meps command can be used
to see the top ten active MEPs on the system. The counts are based from the last time to command was
issued with the clear option. MEPs that are in a shutdown state are still terminating packets, but these do
not appear on the active list.
These statistics help operators to determine the busiest active MEPs on the system as well a breakdown of
per OpCode processing at the system and MEP level.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Any standard fields in the PDU that are defined for a specific length with a Must Be Zero (MBZ) attribute
in the specification are decoded based on the specification field length. There is no assumption that
packets adhere to the MBZ requirement in the byte field; for example, the MEP-ID is a 2-byte field with
three reserved MBZ bits, which translates into a standard MEP-ID range of 0 to 8191. If the MBZ bits are
violated, then the 2-byte field is decoded using all non-zero bits in the 2-byte field.
The decoding function is logically positioned between ETH-CFM and the forwarding plane. Any ETH-CFM
PDU discarded by an applicable security configuration is not passed to the debug function. Any packet
that is discarded by squelching (using the config>service>sap>eth-cfm>squelch-ingress-levels and
config>service>sap>eth-cfm>squelch-ingress-ctag-levels commands) or CPU protection (using the
config>service>sap>eth-cfm>cpu-protection eth-cfm-monitoring command), bypasses the decoding
function. Care must be taken when interpreting specific ETH-CFM PDU decodes. Those PDUs that have
additional, subsequent, or augmented information applied by the forwarding mechanisms may not be part
of the decoded packet. Augmentation includes the timestamp (the stamping of hardware based counters
[LMM]) applied to ETH-CFM PDUs by the forwarding plane.
This function allows for enhanced troubleshooting for ETH-CFM PDUs to and from tagged MEPs and
MIPs. Only defined and node-supported functionality are decoded, possibly with truncation. Unsupported
or unknown functionality on the node is treated on a best-effort basis, typically handled with a decode
producing a truncated number of hex bytes.
This functionality does not support decoding of sub-second CCM, or any ETH-CFM PDUs that are
processed by non-ETH-CFM entities (which includes SAA CFM transmit functions), or MIPs created using
the default-domain table.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
provides the highest possible chance of the response returning to the source. Operators may configure
the linktrace response priority of the MEP using the ccm-ltm-priority. MIPs inherit the MEPs priority
unless the mip-ltr-priority is configured under the bridging instance for the association (config>eth-
cfm>domain>assoc>bridge).
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
enabled, a fault detected by one of them is propagated to the other, which in turn propagates fault in its
own direction.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
In general the Ipipe service requires the ce-address information to be learned or manually configured as
part of the Ethernet SAP object before the legacy interface connection can be established. IPv6 includes
an optimization that uses the Link Local IPv6 address to start the legacy negotiation process and does not
require the ce-addressing described previously. This IPv6 optimization does not align well with fault inter-
working functions and is disabled when the eth-legacy-fault-notification function is enabled.
Fault propagation is not active from the Ethernet SAP to the legacy connection if the ce-address
information for the Ethernet SAP has not been learned or configured. If both IPv4 and IPv6 are configured,
each protocol requires ce-addressing to be learned or configured enabling fault inter-working for that
protocol. When the ce-address has been learned or configured for that protocol, fault inter-working is active
for that protocol. If either IPv4 or IPv6 ce-addressing from the Ethernet SAP is resident, the access legacy
SAP is operational. The NCP layer indicates which unique protocol is operational. Fault propagation toward
the Ethernet SAP from the legacy connection is still propagated even if the ce-address is not resident
within the Ipipe under the following conditions; if any SAP or the Service is shutdown, or the legacy SAP is
not configured.
The learned Ethernet ce-address is a critical component in Ipipe service operation and fault propagation.
To maintain the address information the keep option must be configured as part of the ce-address-
discovery command. If the keep command is not configured, the address information is lost when the
Ethernet SAP transitions to a non-operational state. When the address information is flushed, the Ipipe
service propagates the fault to the legacy PPP, MLPPP and Cisco HDLC connections. The lack of the
ce-addressing on the Ethernet SAPs may cause a deadlock condition that requires operator intervention
to resolve the issue. The keep command must be configured when the eth-legacy-fault-notification
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
functionality is enabled with PPP, MLPPP and Cisco HDLC legacy interfaces, and fault propagation is
required using this type of aggregation deployment. The keep option is specific to and only supported
when eth-legacy-fault-notification is configured. If the keep option is configured as part of the ce-
address-discovery command, the eth-legacy-fault-propagation cannot be removed. Configuration changes
to the ce-address-discovery command may affect the stored ce-address information. For example, if
the eth-legacy-fault-notification ipv6 keep is changed to ce-address-discovery keep, the stored IPv6
ce-address information is flushed. If the keep option is removed, all discovered ce-address information is
flushed if the SAP is operationally down.
The ce-address stored in the Ipipe service as part of the discovery process is updated if a new ARP arrives
from the layer three device connected to the Ethernet SAP. If the layer three device connected to the
Ethernet SAP does not send an ARP to indicate the addressing information has been changed, the ce-
address stored locally as part of the previous discovery function is maintained. If changes are made to the
layer three device connected to the Ethernet SAP that would alter the ARP information and that device
does not generate an ARP packet, or the Ipipe inter-working device does not receive the ARP packet,
for example, the Ethernet SAP is admin down for IPv4, or the service is operationally down for IPv6, the
stored ce-address retained by the Ipipe as a result of the keep operation is stale. This stale information
results in a black hole for service traffic. The clear service id service-id arp can be used to flush stale ARP
information. This does not solicit an arp from a peer.
The keep option does not maintain the ce-address information when the Ethernet SAP is administratively
shutdown or when the node reboots.
After all of the ce-addressing has been populated in the Ipipe the legacy interfaces, establishment
commences. The successful establishment of these connections render the Ipipe service functional.
Legacy connection faults and Ethernet SAP faults may now be propagated.
Should the Ethernet SAP enter a non-operational state as a result of a cable or validation protocol (ETH-
CCM), the fault is inter-worked with the specific legacy protocol. Ethernet faults inter-work with the legacy
interfaces in the following manner.
• PPP
LCP and all NCPs are shutdown and a terminate-request is sent to the far-end.
• MLPPP
LCP remains operational but the NCP is shutdown.
• HDLC
Suspension of the keepalive messages. The keepalive interval influences the recovery time. If the
recovery timer (discussed later) is equal to the keepalive interval, recovery of the legacy interface
recovery may occur after a fault is propagated toward the Ethernet network.
As previously stated, inter-working faults on the legacy connection with the Ethernet infrastructure requires
a Down MEP with CCM-enabled configured on the Ethernet SAP with fault-propagation enabled. There
are two different methods to propagate fault from a CCM-enabled MEP; use-int-tlv or suspend-ccm.
The use-int-tlv approach causes the CCM message to include the Interface Status TLV with a value
of is Down. This raises a defMACStatus priority error on the peer MEP. The suspend-ccm approach
causes the local MEP to suspend transmissions of the CCM messages to the peer MEP. This raises a
defRemoteCCM timeout condition on the peer. The peer must accept these notifications and processes
these fault conditions on the local MEP. When the MEP receives these errors, it must not include a defect
condition in the CCM messages it generates that is above the peers low-priority-defect setting. In
standard operation, the MEP receiving the error should only set the RDI bit in the CCM header. If the MEP
improperly responds with a defect condition that is higher than the low-priority-defect of the MEP that had
generated the initial fault then a deadlock condition occurs and operator intervention is required. The two
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
CFM propagation methods and the correct responses are shown in Figure 52: Fault propagation from
legacy to Ethernet.
From a protocol (NCP) perspective, PPP and MLPPP connections have a micro view. Those connections
understand the different protocols carried over the PPP and MLPPP connections, and individual protocol
errors that can occur. The Ethernet SAP has a macro view without this layer three understanding. When
the dual stack IPv4 and IPv6 is deployed, fault can only be propagated from the legacy connection toward
the associated Ethernet SAP if both protocols fail on the PPP or MLPPP. If either of the protocols are
operational then PPP or MLPPP does not propagate fault in the direction of the Ethernet connection.
Ethernet connection faults are prioritized over legacy faults. When an Ethernet fault is detected, any
fault previously propagated from the PPP, MLPPP or Cisco HDLC is squelched in favor of the higher
priority Ethernet SAP failure. All legacy fault conditions, including admin port down, are dismissed for
the duration of the Ethernet fault and are not rediscovered until the expiration of the recovery-timer. This
configurable timer value is the amount of time the process waits to allow the legacy connections to recover
and establish following the clearing of the Ethernet fault. If the timer value is too short then false positive
propagation occurs from the legacy side to the Ethernet connection. If the timer value is too long then
secondary legacy faults are not propagated to the associated Ethernet SAP for an extended period of
time, delaying the correct state on the layer three device connected to the Ethernet SAP. Any packets
arriving on the Ethernet SAP are dropped until the legacy connection has recovered. As soon as the legacy
connection recovers, forwarding across the Ipipe occurs regardless of the amount of time remaining for the
recovery timer. Operators are required to adjust this timer value to their specific network requirements. If
the timer adjustment is made while the service is active, the new timer replaces the old value and the new
value starts counting down when called.
If the eth-legacy-fault-notification command is disabled from an active Ipipe service then any previously
reported fault is cleared and the recovery-timer starts. If the eth-legacy-fault-notification command is
added to an active Ipipe service, the process checks for outstanding faults and takes the appropriate
action.
Cisco HDLC behavior must be modified to better align with the fault inter-working function. To enable the
eth-legacy-fault-notification, keepalives must be enabled. The following describes the new behavior for
the Cisco HDLC port:
• operationally up if it is receiving keepalives and has physical link (same behavior in either case)
• operationally up if keepalives are disabled locally and has physical link (irrelevant for this feature
because keepalives must be enabled). This is included for completeness.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• operationally down when no keepalives are received and keepalives are locally enabled (same behavior
in either case)
• operationally down when there is no physical port (same behavior in either case)
• operationally down if it is part of a SAP but there no ce-address and has physical link (altered behavior)
• operationally down if it is part of a SAP but the SAP is shutdown and has physical link (altered behavior)
• operationally down if it is part of a SAP and the service is shutdown and has physical link (altered
behavior)
The show service command has been expanded to include the basic Ethernet Legacy Fault Notification
information and the specific SAP configuration.
The ‟Eth Legacy Fault Notification” section displays the configured recovery-timer value and whether the
eth-legacy-fault-notification is active ‟Admin State: inService” (no shutdown) or inactive ‟Admin State:
outOfService” (shutdown).
The ‟Ipipe SAP Configuration Information” displays the current Ethernet fault propagated to the associated
legacy connection state; ‟Legacy Fault Notify”: False indicates no fault is currently being propagated and
True indicates fault is currently being propagated. The ‟Recvry Timer Rem” is used to show the amount of
time remaining before the recovery timer expires. A time in seconds is only displayed for this parameter if
an Ethernet fault has cleared and the recovery timer is currently counting down to 0.0 seconds.
A number of examples have been included using the service configuration below to demonstrate the
various conditions. Many of the display commands have been trimmed in an effort to present feature
relevant information.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
-------------------------------------------------------------------------------
Ipipe SAP Configuration Information
-------------------------------------------------------------------------------
Configured CE IPv4 : n/a Discovered CE IPv4: 32.32.32.1
SAP MAC Address : fe:ed:01:01:00:04 Mac Refresh Inter*: 14400
-------------------------------------------------------------------------------
Ipipe SAP IPv4 ARP Entry Info
-------------------------------------------------------------------------------
32.32.32.1 fe:4e:01:01:00:03 dynamic
-------------------------------------------------------------------------------
Ipipe SAP IPv6 Neighbor Entry Info
-------------------------------------------------------------------------------
fe80::fc2e:ffff:fe00:0 fe:4e:01:01:00:03 dynamic
3ffe::2020:2001 fe:4e:01:01:00:03 dynamic
. . . snip . . .
-------------------------------------------------------------------------------
Eth-Cfm MEP Configuration Information
-------------------------------------------------------------------------------
Md-index : 1 Direction : Down
Ma-index : 45 Admin : Enabled
MepId : 22 CCM-Enable : Enabled
IfIndex : 35782656 PrimaryVid : 21
Description : (Not Specified)
FngAlarmTime : 0 FngResetTime : 0
FngState : fngReset ControlMep : False
LowestDefectPri : macRemErrXcon HighestDefect : none
Defect Flags : None
Mac Address : fe:ed:01:01:00:04 Collect LMM Stats : disabled
CcmLtmPriority : 7 CcmPaddingSize : 0 octets
CcmTx : 471 CcmSequenceErr : 0
CcmIgnoreTLVs : (Not Specified)
Fault Propagation : useIfStatusTLV FacilityFault : n/a
MA-CcmInterval : 1 MA-CcmHoldTime : 0ms
MA-Primary-Vid : Disabled
Eth-1Dm Threshold : 3(sec) MD-Level : 1
Eth-Ais : Disabled
Eth-Ais Tx defCCM : allDef
Eth-Tst : Disabled
Eth-CSF : Disabled
Redundancy:
MC-LAG State : n/a
LbRxReply : 0 LbRxBadOrder : 0
LbRxBadMsdu : 0 LbTxReply : 0
LbSequence : 1 LbNextSequence : 1
LtRxUnexplained : 0
* indicates that the corresponding row element may have been truncated.
-------------------------------------------------------------------------------
SAP 2/2/1.1.2.1
-------------------------------------------------------------------------------
Service Id : 201
SAP : 2/2/1.1.2.1 Encap : ipcp
Description : Default sap description for service id 201
Admin State : Up Oper State : Up
Flags : None
Multi Svc Site : None
Last Status Change : 01/07/2015 15:08:03
Last Mgmt Change : 01/07/2015 15:07:54
Sub Type : regular
Split Horizon Group: (Not Specified)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
-------------------------------------------------------------------------------
Ipipe SAP IPv6 Neighbor Entry Info
-------------------------------------------------------------------------------
fe80::13:9295:9ba:5e2 dynamic
. . . snip . . .
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Keepalive statistics
The same service is used to demonstrate an Ethernet SAP failure condition propagating fault to the
associated PPP connection. In this case an ETH-CCM time out has occurred. Only the changes have been
highlighted.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
The log events below are specific to the failure type and the protocols involved.
-------------------------------------------------------------------------------
ETH-CFM service specifics
-------------------------------------------------------------------------------
Tunnel Faults : ignore
-------------------------------------------------------------------------------
Service Destination Points(SDPs)
-------------------------------------------------------------------------------
No Matching Entries
-------------------------------------------------------------------------------
Service Access Points
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
SAP 1/1/4:21
-------------------------------------------------------------------------------
Service Id : 201
SAP : 1/1/4:21 Encap : q-tag
Description : Default sap description for service id 201
Admin State : Up Oper State : Up
Flags : OamDownMEPFault
Multi Svc Site : None
Last Status Change : 01/07/2015 15:07:53
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
. . . snip . . .
-------------------------------------------------------------------------------
Eth-Cfm MEP Configuration Information
-------------------------------------------------------------------------------
Md-index : 1 Direction : Down
Ma-index : 45 Admin : Enabled
MepId : 22 CCM-Enable : Enabled
IfIndex : 35782656 PrimaryVid : 21
Description : (Not Specified)
FngAlarmTime : 0 FngResetTime : 0
FngState : fngDefectReported ControlMep : False
LowestDefectPri : macRemErrXcon HighestDefect : defRemoteCCM
Defect Flags : bDefRemoteCCM
Mac Address : fe:ed:01:01:00:04 Collect LMM Stats : disabled
CcmLtmPriority : 7 CcmPaddingSize : 0 octets
CcmTx : 650 CcmSequenceErr : 0
CcmIgnoreTLVs : (Not Specified)
Fault Propagation : useIfStatusTLV FacilityFault : n/a
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Redundancy:
MC-LAG State : n/a
LbRxReply : 0 LbRxBadOrder : 0
LbRxBadMsdu : 0 LbTxReply : 0
LbSequence : 1 LbNextSequence : 1
LtRxUnexplained : 0
* indicates that the corresponding row element may have been truncated.
-------------------------------------------------------------------------------
SAP 2/2/1.1.2.1
-------------------------------------------------------------------------------
Service Id : 201
SAP : 2/2/1.1.2.1 Encap : ipcp
Description : Default sap description for service id 201
Admin State : Up Oper State : Up
Flags : PortOperDown
Multi Svc Site : None
Last Status Change : 01/07/2015 15:08:03
Last Mgmt Change : 01/07/2015 15:07:54
Sub Type : regular
Split Horizon Group: (Not Specified)
-------------------------------------------------------------------------------
Ipipe SAP IPv4 ARP Entry Info
-------------------------------------------------------------------------------
No Ipipe SAP IPv4 ARP entries
-------------------------------------------------------------------------------
Ipipe SAP IPv6 Neighbor Entry Info
-------------------------------------------------------------------------------
No Ipipe SAP IPv6 Neighbor entries
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
. . . snip . . .
===============================================================================
PPP Protocols for 2/2/1.1.2.1
===============================================================================
Protocol State Last Change Restart Count Last Cleared
-------------------------------------------------------------------------------
lcp initial 01/07/2015 15:18:07 1 01/07/2015 15:07:22
ipcp initial 01/07/2015 15:18:07 1 01/07/2015 15:07:22
mplscp initial 11/30/2014 09:20:08 0 01/07/2015 15:07:22
bcp initial 11/30/2014 09:20:08 0 01/07/2015 15:07:22
osicp initial 11/30/2014 09:20:08 0 01/07/2015 15:07:22
ipv6cp initial 01/07/2015 15:18:07 1 01/07/2015 15:07:22
===============================================================================
===============================================================================
PPP Statistics
===============================================================================
Local Mac address : fe:ee:02:02:00:01 Remote Mac address :
Local Magic Number : 0x0 Remote Magic Number: 0x0
Local IPv4 address : 0.0.0.0 Remote IPv4 address: 0.0.0.0
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Keepalive statistics
The following output displays an example when the Ethernet fault condition clears a transitional state
occurs.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
-------------------------------------------------------------------------------
ETH-CFM SAP specifics
-------------------------------------------------------------------------------
Tunnel Faults : n/a AIS : Disabled
MC Prop-Hold-Timer : n/a
Squelch Levels : None
-------------------------------------------------------------------------------
Ipipe SAP Configuration Information
-------------------------------------------------------------------------------
Configured CE IPv4 : n/a Discovered CE IPv4: 32.32.32.1
SAP MAC Address : fe:ed:01:01:00:04 Mac Refresh Inter*: 14400
-------------------------------------------------------------------------------
Ipipe SAP IPv4 ARP Entry Info
-------------------------------------------------------------------------------
32.32.32.1 fe:4e:01:01:00:03 dynamic
-------------------------------------------------------------------------------
Ipipe SAP IPv6 Neighbor Entry Info
-------------------------------------------------------------------------------
fe80::fc2e:ffff:fe00:0 fe:4e:01:01:00:03 dynamic
3ffe::2020:2001 fe:4e:01:01:00:03 dynamic
. . . snip . . .
-------------------------------------------------------------------------------
Eth-Cfm MEP Configuration Information
-------------------------------------------------------------------------------
Md-index : 1 Direction : Down
Ma-index : 45 Admin : Enabled
MepId : 22 CCM-Enable : Enabled
IfIndex : 35782656 PrimaryVid : 21
Description : (Not Specified)
FngAlarmTime : 0 FngResetTime : 0
FngState : fngReset ControlMep : False
LowestDefectPri : macRemErrXcon HighestDefect : none
Defect Flags : None
Mac Address : fe:ed:01:01:00:04 Collect LMM Stats : disabled
CcmLtmPriority : 7 CcmPaddingSize : 0 octets
CcmTx : 1603 CcmSequenceErr : 0
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Redundancy:
MC-LAG State : n/a
LbRxReply : 0 LbRxBadOrder : 0
LbRxBadMsdu : 0 LbTxReply : 0
LbSequence : 1 LbNextSequence : 1
LtRxUnexplained : 0
* indicates that the corresponding row element may have been truncated.
-------------------------------------------------------------------------------
SAP 2/2/1.1.2.1
-------------------------------------------------------------------------------
Service Id : 201
SAP : 2/2/1.1.2.1 Encap : ipcp
Description : Default sap description for service id 201
Admin State : Up Oper State : Up
Flags : PortOperDown
Multi Svc Site : None
Last Status Change : 01/07/2015 15:08:03
Last Mgmt Change : 01/07/2015 15:07:54
Sub Type : regular
Split Horizon Group: (Not Specified)
-------------------------------------------------------------------------------
Ipipe SAP IPv6 Neighbor Entry Info
-------------------------------------------------------------------------------
No Ipipe SAP IPv6 Neighbor entries
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
. . . snip . . .
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Keepalive statistics
An example of the legacy fault propagation to the associated Ethernet SAP and the remote peer using the
ETH-CFM fault propagation, assuming no Ethernet Fault is taking precedence.
-------------------------------------------------------------------------------
ETH-CFM service specifics
-------------------------------------------------------------------------------
Tunnel Faults : ignore
-------------------------------------------------------------------------------
Service Destination Points(SDPs)
-------------------------------------------------------------------------------
No Matching Entries
-------------------------------------------------------------------------------
Service Access Points
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
SAP 1/1/4:21
-------------------------------------------------------------------------------
Service Id : 201
SAP : 1/1/4:21 Encap : q-tag
Description : Default sap description for service id 201
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
. . . snip . . .
-------------------------------------------------------------------------------
Eth-Cfm MEP Configuration Information
-------------------------------------------------------------------------------
Md-index : 1 Direction : Down
Ma-index : 45 Admin : Enabled
MepId : 22 CCM-Enable : Enabled
IfIndex : 35782656 PrimaryVid : 21
Description : (Not Specified)
FngAlarmTime : 0 FngResetTime : 0
FngState : fngReset ControlMep : False
LowestDefectPri : macRemErrXcon HighestDefect : none
Defect Flags : bDefRDICCM
Mac Address : fe:ed:01:01:00:04 Collect LMM Stats : disabled
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Redundancy:
MC-LAG State : n/a
LbRxReply : 0 LbRxBadOrder : 0
LbRxBadMsdu : 0 LbTxReply : 0
LbSequence : 1 LbNextSequence : 1
LtRxUnexplained : 0
* indicates that the corresponding row element may have been truncated.
-------------------------------------------------------------------------------
SAP 2/2/1.1.2.1
-------------------------------------------------------------------------------
Service Id : 201
SAP : 2/2/1.1.2.1 Encap : ipcp
Description : Default sap description for service id 201
Admin State : Up Oper State : Down
Flags : PortOperDown
Multi Svc Site : None
Last Status Change : 01/07/2015 15:35:03
Last Mgmt Change : 01/07/2015 15:07:54
Sub Type : regular
Split Horizon Group: (Not Specified)
-------------------------------------------------------------------------------
Ipipe SAP IPv4 ARP Entry Info
-------------------------------------------------------------------------------
No Ipipe SAP IPv4 ARP entries
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
-------------------------------------------------------------------------------
Ipipe SAP IPv6 Neighbor Entry Info
-------------------------------------------------------------------------------
No Ipipe SAP IPv6 Neighbor entries
. . . snip . . .
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
===============================================================================
Local Mac address : fe:ee:02:02:00:01 Remote Mac address :
Local Magic Number : 0x0 Remote Magic Number: 0x0
Local IPv4 address : 32.32.32.1 Remote IPv4 address: 0.0.0.0
Local IPv6 address : fe80::fc2e:ffff:fe00:0
Remote IPv6 address: ::
Keepalive statistics
This feature is only supported for an Ipipe service that has a single legacy connection with an encap-type
PPP, MLPPP or Cisco-HDLC and an Ethernet SAP. No other combinations are supported. Deployments
using APS cannot use this fault propagation functionality.
The propagation of fault is based on the interaction of a number of resources and software functions. This
means that propagation and recovery vary based on the type of failure, the scale of the failure, the legacy
protocol, the system overhead at the time of the action, and other interactions.
Before maintenance operations are performed the operation should be aware of the operational state of
the service and any fault propagation state. Admin legacy port state down conditions do not cause fault
propagation, it is the operational port state that conveys fault. During a Major ISSU operation, legacy
faults are cleared and not propagated toward the Ethernet network. To prevent this clearing of faults,
the operator may consider shutting down the Ethernet port or shutdown the ETH-CFM MEPs to cause a
timeout upstream.
Note: The CLI commands for these functions can be found in the 7450 ESS, 7750 SR,
7950 XRS, and VSR Layer 2 Services and EVPN Guide: VLL, VPLS, PBB, and EVPN.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
When only one of the pseudowire is faulty, SMGR does not notify CFM. The notification only occurs when
both pseudowires become faulty. Then the SMGR propagates the fault to CFM. Because there is no fault
handling in the pipe service, any CFM fault detected on a SDP-binding is not used in the pseudowire
redundancy’s algorithm to choose the most suitable SDP-binding to transmit on.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• If the service is a B-VPLS service, the SMGR propagates the fault to OAM components on all SAP and
SDP-bindings in the service as well as all pipe services that are associated with the B-VPLS instance.
3.8.10 802.3ah EFM OAM mapping and interaction with service manager
802.3ah EFM OAM declares a link fault when any of the following occurs:
• loss of OAMPDU for a specific period of time
• receiving OAMPDU with link fault flags from the peer
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
When 802.3ah EFM OAM declares a fault, the port goes into operation state down. The SMGR
communicates the fault to CFM MEPs in the service.
OAM fault propagation in the opposite direction (SMGR to EFM OAM) is not supported.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Field Description
Vers The version number of the protocol. The initial protocol version is 0.
Diag A diagnostic code specifying the local system’s reason for the last transition of the
session from Up to some other state.
Possible values are:
0-No diagnostic
1-Control detection time expired
2-Echo function failed
3-Neighbor signaled session down
4-Forwarding plane reset
5-Path down
6-Concatenated path down
7-Administratively down
P Bit The poll bit. If set, the transmitting system is requesting verification of connectivity,
or of a parameter change.
F Bit The final bit. If set, the transmitting system is responding to a received BFD control
packet that had the poll (P) bit set.
Rsvd Reserved bits. These bits must be zero on transmit and ignored on receipt.
My Discriminator A unique, non-zero discriminator value generated by the transmitting system, used
to demultiplex multiple BFD sessions between the same pair of systems.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
Field Description
Your Discriminator The discriminator received from the corresponding remote system. This field
reflects back the received value of my discriminator, or is zero if that value is
unknown.
Desired Min TX Interval This is the minimum interval, in microseconds, that the local system would like to
use when transmitting BFD control packets.
Required Min RX Interval This is the minimum interval, in microseconds, between received BFD control
packets that this system is capable of supporting.
Required Min Echo RX This is the minimum interval, in microseconds, between received BFD echo packets
Interval that this system is capable of supporting. If this value is zero, the transmitting
system does not support the receipt of BFD echo packets.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
configure
bfd
seamless-bfd
[no] reflector <name>
discriminator <value>
description <string>
local-state up | admin-down
[no] shutdown
The discriminator value must be allocated from the S-BFD reflector pool, 524288 - 526335. When the
router receives an S-BFD packet from the initiator, with the local router's S-BFD discriminator as the
‟YourDiscriminator” field, then the local node sends the S-BFD packet back to the initiator via a routed
path. The state field in the reflected packet is populated with either the Up or AdminDown state value
based on the local-state configuration.
Note: Only a single reflector discriminator per node is supported, and the reflector cannot be no
shutdown unless at least a discriminator is configured.
Seamless BFD control packets are discarded when the reflector is not configured, is shutdown, or
the ‟YourDiscriminator” field does not match the discriminator of the reflector. Both IPv4 and IPv6 are
supported, but in the case of IPv6, the reflector can only reflect BFD control packets with a global unicast
destination address.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
config>router>bfd
seamless-bfd
peer <ip-address> discriminator <remote-discriminator>
peer <ip-address> discriminator <remote-discriminator>
...
exit
The S-BFD initiator immediately starts sending S-BFD packets if the discriminator value of the far-end
reflector is known, no session setup is required.
With S-BFD sessions, there is no INIT state. The initiator state changes from AdminDown to Up when it
begins to send (initiate) S-BFD packets.
The S-BFD initiator sends the BFD packet to the reflector using the following fields:
Src IP
This field contains the local session IP address. For IPv6, this is a global unicast address
belonging to the node.
Dst IP
This field contains the reflector's IP address (configured).
MyDiscriminator
This field contains the locally assigned discriminator.
YourDiscriminator
This field contains the reflector's discriminator value.
If the initiator receives a valid response from the reflector with an Up state, the initiator declares the S-BFD
session state as Up.
If the initiator fails to receive a specific number of responses, as determined by the BFD multiplier in the
BFD template for the session, the initiator declares the S-BFD session state as Failed.
If any of the discriminators change, the session fails and the router attempts to restart with the new values.
If the reflector discriminator changes at the far-end peer, the session fails, but the mapping may not have
been updated locally before the system checks for a new reflector discriminator from the local mapping
table. The session is bounced, bringing it up with the new values. If any discriminator is deleted, the
corresponding S-BFD sessions are deleted.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
advertise-router-capability
This encodes the S-BFD discriminator in OSPF or IS-IS opaque Router Information TLVs.
The following is an example of an OSPF configuration output:
A:Router-A>config>router>ospf# info
----------------------------------------------
router-id 10.20.1.1
traffic-engineering
advertise-router-capability area
area 0.0.0.0
interface "system"
no shutdown
exit
interface "to_Router-C"
hello-interval 2
dead-interval 10
metric 1000
no shutdown
exit
interface "to_Router-B"
hello-interval 2
dead-interval 10
metric 1000
no shutdown
exit
exit
no shutdown
----------------------------------------------
*A:Dut-A>config>router>ospf#
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
3.10.1 BGP-LDP stitching and ASBR/ABR/data path RR for BGP IPv4 label route
ASBR1 ASBR2
-------- D ------- E --------
| |
| |
A -------- C F -------- B
DSLAM1 PE1 PE2 DSLAM2
| |
| |
-------- G ------- H --------
ASBR3 ASBR4
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
*A:Dut-
A# traceroute 10.20.1.6 detail wait 100 traceroute to 10.20.1.6, 30 hops max, 40 byt
e packets
1 1 10.10.1.1 (10.10.1.1) 12.4 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
1 2 10.10.1.1 (10.10.1.1) 11.9 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
1 3 10.10.1.1 (10.10.1.1) 12.7 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
2 1 10.10.4.2 (10.10.4.2) 11.6 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262143, Exp = 7, TTL = 1, S = 0
entry 2: MPLS Label = 262139, Exp = 7, TTL = 1, S = 1
2 2 10.10.4.2 (10.10.4.2) 13.5 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262143, Exp = 7, TTL = 1, S = 0
entry 2: MPLS Label = 262139, Exp = 7, TTL = 1, S = 1
2 3 10.10.4.2 (10.10.4.2) 11.9 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262143, Exp = 7, TTL = 1, S = 0
entry 2: MPLS Label = 262139, Exp = 7, TTL = 1, S = 1
3 1 10.10.6.4 (10.10.6.4) 9.21 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
3 2 10.10.6.4 (10.10.6.4) 9.58 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
3 3 10.10.6.4 (10.10.6.4) 9.38 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
4 1 10.10.10.5 (10.10.10.5) 12.2 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262143, Exp = 7, TTL = 1, S = 0
entry 2: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
4 2 10.10.10.5 (10.10.10.5) 11.5 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262143, Exp = 7, TTL = 1, S = 0
entry 2: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
4 3 10.10.10.5 (10.10.10.5) 11.5 ms
returned MPLS Label Stack Object
entry 1: MPLS Label = 262143, Exp = 7, TTL = 1, S = 0
entry 2: MPLS Label = 262138, Exp = 7, TTL = 1, S = 1
5 1 10.20.1.6 (10.20.1.6) 11.9 ms
5 2 10.20.1.6 (10.20.1.6) 12.2 ms
5 3 10.20.1.6 (10.20.1.6) 13.7 ms
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
ASBR1 ASBR2
-------- D ------- E --------
| |
| |
A -------- C F -------- B
CE1 PE1 PE2 CE2
| |
| |
-------- G ------- H --------
ASBR3 ASBR4
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
4 3 3.3.3.6 6.96 ms
5 1 3.3.3.4 8.32 ms
5 2 3.3.3.4 11.6 ms
5 3 3.3.3.4 8.45 ms
3.10.3 VPRN inter-AS option C and ASBR/ABR/data path RR for BGP IPv4 label route
ASBR1 ASBR2
-------- D ------- E --------
| |
| |
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
A -------- C F -------- B
CE1 PE1 PE2 CE2
| |
| |
-------- G ------- H --------
ASBR3 ASBR4
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
4 3 16.1.1.1 5.85 ms
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
• Ethernet>Payload Ethernet>MPLS>IPv4>GRE>IPv4>Payload
• Ethernet>IPv4>Payload Ethernet>MPLS>Control-Word>Ethernet>Payload
• Ethernet>IPv4>IPSec>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv4>Payload
• Ethernet>IPv4>UDP>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv4>UDP>Payload
• Ethernet>IPv4>UDP>GTP-U>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv4>TCP>Payload
• Ethernet>IPv4>UDP>IPSec>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv6>Payload
• Ethernet>IPv4>UDP>L2TP>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv6>UDP>Payload
• Ethernet>IPv4>TCP>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv6>TCP>Payload
• Ethernet>IPv4>GRE>IPv4>Payload Ethernet>MPLS>IPv4>IPSec>Payload
• Ethernet>IPv6>Payload Ethernet>MPLS>Ethernet>IPv4>IPSec>Payload
• Ethernet>IPv6>UDP>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv4>IPSec>Payload
• Ethernet>IPv6>TCP>Payload Ethernet>MPLS>IPv6>IPSec>Payload
• Ethernet>IPv6>IPSec>Payload Ethernet>MPLS>Ethernet>IPv6>IPSec>Payload
• Ethernet>IPv6>UDP>IPSec>Payload Ethernet>MPLS>Control-Word>Ethernet>IPv6>IPSec>Payload
• Ethernet>IPv6>UDP>GTP-U>Payload Ethernet>MPLS>IPv4>UDP>IPSec>Payload
• Ethernet>IPv6>UDP>L2TP>Payload Ethernet>MPLS>IPv6>UDP>IPSec>Payload
• Ethernet>MPLS>Payload Ethernet>MPLS>Ethernet>IPv4>UDP>IPSec>Payload
• Ethernet>MPLS>Control-Word>Payload Ethernet>MPLS>Ethernet>IPv6>UDP>IPSec>Payload
config>test-oam>build-packet
header 1 create
ethernet
src-mac-address AA:BB:CC:DD:EE:FF
dst-mac-address FF:EE:DD:CC:BB:AA
header 2 create
udp
src-port 12345
dest-port 54321
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
header 3 create
ipv4
dscp 0
src-ipv4-address 11.22.33.44
dst-ipv4-address 55.66.77.88
debug>oam>build-packet>packet <pkt-id>
field-override
header 1
ethernet
src-mac-address 11:22:33:44:55:66
dst-mac-address 22:33:44:55:66:77
header-sequence ‟h1/h3/h2”
What to do next
Execute the test with the oam find-egress packet packet-id ingress-port port-id command. This causes
the specified test frame or packet to be injected at specified port and this reports the result.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
In some scenarios, this additional tagging principle is not displayed and this may result in conflicts and
collisions. For example, as shown in Figure 57: ETH-CFM collision between OAM domains, an additional
pair of Domain Level 4 UP MEPs are configured on the aggregation nodes. These aggregation nodes
are c-tag aware. The ETH-CFM packets that are transmitted from the CE pass transparently through the
passive side of the MEP (the side facing away from the ETH-CFM packet transmission) and arrive on the
active side of the unintended peer MEP. This could cause a number of defect conditions to occur on the
unexpectedly terminating MEP and on the unreachable MEP. For simplicity, only the direction from left CE
to right side of the network is shown, although the problem exists in both directions.
These issues can be resolved through communication of ETH-CFM domain-level ownership using a
business agreement. However, this communication is only a business agreement and could be violated by
misconfiguration. Network-level enforcement of this agreement is important to protect both the ETH-CFM
OAM domains of responsibility.
ETH-CFM ingress squelching capabilities are available to enforce the agreement and prevent unwanted
ETH-CFM packets from entering a domain of responsibility that should not be exposed to ETH-CFM
packets from outside its domain. Figure 58: Enforcement of the CFM level agreement using squelching
shows the generic enforcement of the agreement using squelching. In this agreement, Domain Levels
4 and lower are reserved by the provider of the EVC. Domain Levels 5 and above are outside the EVC
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
provider’s scope and must pass transparently through the Ethernet CFM OAM domain. The EVC provider’s
boundaries are configured to enforce this agreement and silently discard all ETH-CFM packets that arrive
on the ingress points of the boundary at Domain Level 4 and below.
Two different squelch functions are supported, using the squelch-ingress-levels command and the
squelch-ingress-ctag-levels command.
The squelch-ingress-levels command configures an exact service delineation SAP and binding match
at the ingress followed immediately by Ethernet type 0x8902. This configuration silently discards the
appropriate ETH-CFM packets according to the configured levels of the command, regardless of the
presence of an ingress ETH-CFM management point, MEP or MIP. This squelch function occurs before
other ETH-CFM packet processing functions.
The squelch-ingress-ctag-levels command is supported for Epipe and VPLS services only. It configures
an exact service delineation SAP and binding match of the ingress skipping one addition tag at the ingress,
for a maximum total tag length of two tags, followed by Ethernet type 0x8902. This configuration silently
discards the appropriate ETH-CFM packets according to the levels that match the configured squelch
levels, if an addition tag beyond the service delineation exists. It ignores the value of the additional tag
exposing that entire range to this squelch function, if there is no ingress ETH-CFM management point,
MEP or MIP, at one of the configured levels covered by the squelch configuration. This squelch function is
different from the option configured by squelch-ingress-levels, because it occurs after the processing of
an ingress MEP or ingress MIP configured with a primary VLAN within the configured squelch levels. When
a primary VLAN ingress MEP or ingress MIP is configured at a VLAN within the squelch level, that entire
primary VLAN ETH-CFM function follows regular ETH-CFM primary VLAN rules. In this configuration, the
ingress ETH-CFM packets that do not have an ingress MEP or ingress MIP configured for that VLAN are
exposed to the squelching rules instead of the primary VLAN rules of ETH-CFM processing. In this case,
ETH-CFM primary VLAN ingress processing occurs before the squelch-ingress-ctag-levels functions.
Both variants can be configured together on supported connections and within their supported services.
Figure 59: Logical processing chain and interaction shows the logical processing chain and interaction
using an ingress QinQ SAP in the form VID.* and various ingress ETH-CFM MEPs. Although not shown
in the Figure 59: Logical processing chain and interaction, the processing rules are the same for ingress
MIPs, which are ETH-LBM (loopback) and ETH-CFM-LTM (linktrace) aware.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM fault and performance tools
and protocols
There is no requirement to configure ingress MEPs or ingress MIPs if the goal is simply to silently discard
ETH-CFM packets matching a domain level criterion. The squelch commands require contiguous levels
configuration.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
The delay command configures the delay metric (minimum, maximum, or average) that is used for
comparison against any configured thresholds. This metric is the same for both types of measurement
windows, the sample-window and aggregate-sample-window.
The unidirectional-measurement specifies the method used to compute the unidirectional delay. If the
clock synchronization between nodal clocks used by the OAM timestamp function is not synchronized to
near exact accuracy, the derived option must be used. Specifying this option calculates the unidirectional
measurement using the roundtrip delay divided by two computation. If synchronization can meet near exact
accuracy, the actual option can be used. Specifying this option calculates the forward delay using the
forward direction timestamps, T2-T1 computation.
When the operational state of the link measurement test transitions to down, the OAM function instructs
the routing engine to clear the last reported delay value at the expiration of the last-reported-delay-hold.
A previously reported delay is considered valid for the duration of this period and is cleared if the timer
reaches zero. If the operational state returns to up before the timer expires, no action is taken to clear the
previous value. The counter is reset to the configured value, waiting for the next operational down event.
The operation state for the interface delay test is determined by administrative actions and system events.
The administrative events that determine the operational state are:
• administratively disabling the measurement template associated with the interface
• administratively disabling the active IP protocol that is being used to generate the test packet under the
config>router>interface>if-attribute>delay>dynamic-delay context
The resource issue system events that drive the operational state are:
• unavailability of the UDP port
• internal errors
The aging timer does not start a count to zero for failure conditions that do not affect the interface delay
test operational state. The delay measurement last reported is maintained when conditions external to the
interface delay test, such as fault conditions on the port, IP interface, routing changes, and so on, occur.
If the last-reported-delay-timer is set to zero, previously reported delay values from that test are cleared
when the operational state changes to down without any additional time.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
4.1.1.3 Protocol
The protocol parameters influence the format of the test packet, processing, and QoS handling.
TWAMP Light, also called Simple Two-way Activation Monitoring Protocol (STAMP), is the test packet used
to gather IP link measurement delay. The link measurement request source is the session-sender.
TWAMP Light requires the explicit configuration of a reflector on the peer. For SR OS, TWAMP Light
reflectors are configured in the config>router>twamp-light> reflector context. The reflector is referred to
as the session-reflector, the responder to the request.
The session-sender and the session-reflector must agree on the UDP port used to identify TWAMP
Light test packets. The SR OS configuration of the session-sender (configured using the dest-udp-port
command) and session-reflector (configured using the udp-port command) must match.
The TWAMP Light test packet was first introduced to support the Network Time Protocol (NTP) encoding
of the timestamp in the packet. Updates since the initial standardization of TWAMP Light supports the use
of the truncated Precision Time Protocol (PTP) timestamp format. A bit in the TWAMP Light test packet
header is repurposed to indicate the timestamp format encoded by the session-sender and the session-
reflector. This change leads to some interoperability considerations. The timestamp format should be
consistent with the session-sender and session-reflector behavior. The link measurement session-sender
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
can be configured to encode NTP (default) or PTP and set the ‟z-bit” in the Error Estimate field accordingly.
This bit indicates the timestamp format carried in the packet. If the session-reflector sets the ‟z-bit” in the
Error Estimate field to indicate the timestamp format of the reply, the link measurement session-sender
can perform the necessary conversion (format and epoch) to produce the correct results. However, if the
session-reflector only reflects the original ‟z-bit” it received from the session-sender and uses a different
timestamp format in the packet, the delay calculations are not reliable because of the misinterpretation of
the returned timestamp format. SR OS session-reflectors running Release 21.5 and earlier always reflect
the ‟z-bit” received from the session-sender. Regardless of the ‟z-bit”, these session-reflectors always
encode an NTP timestamp format in the packet. When these session-reflectors receive a TWAMP Light
test packet with the PTP timestamp format, there is a mismatch between the actual timestamp format and
the timestamp it has encoded. There is no mechanism for the session-reflector to detect this mismatch and
report the correct delay. To ensure accurate delay measurements, any session-sender sending TWAMP
Light test packets to an SR OS TWAMP Light reflector that is running Release 21.5 and earlier, must use
a timestamp format of NTP. Release 21.7 session-reflectors reply in kind for the timestamp format and
properly set the timestamp format bit to match the timestamp encoded by the session-reflector.
IPv6 packets arriving with a UDP checksum of zero are discarded. However, recent work in the IETF is
suggesting that selected protocols may register on the local router to accept and process IPv6 packets
with a UDP checksum of zero. To provide interoperability, the allow-ipv6-udp-checksum-zero command
allows the session-sender and the session-reflector to process IPv6 TWAMP Light test packets that arrive
with a UDP checksum of zero. This is specific to the link measurement template session-sender and
session-reflector and only for the specific UDP ports for TWAMP Light test packets.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
4.1.2.1 IP addressing
To enable dynamic measurements for the interface, the user must configure a link measurement template
and enable the test protocol using the ipv4 or ipv6 command. The link measurement template does not
include interface-specific requirements, such as the IP protocol encapsulating the test packet or IP source
and destination addressing. It is possible to enable the IPv4 or IPv6 protocol under the dynamic>twamp-
light context without including any source or destination information.
When the IPv4 protocol is enabled with no addressing configured, the source address is automatically
assigned to the primary IPv4 address of the IP interface. The destination address is automatically assigned
if the primary IPv4 address has a prefix length of 30 or 31. In other cases, such as shorter prefix lengths
or unnumbered interfaces, the destination address cannot be resolved and must be configured manually.
The source and destination commands take precedence over the auto-assigned addressing; the IPv4
addresses must be unicast.
When the IPv6 protocol is enabled without any source and destination address configuration, the IPv6
addresses are not automatically assigned. The source and destination address must be configured.
The source and destination can be globally routable unicast addresses of the link identifying the directly
connected peers or the link local addresses connecting the peers. The link local address must follow the
format fe80::/64 as described in RFC 4291, IP Version 6 Addressing Architecture.
Auto-assigned addressing is not updated for operationally up interface delay tests when the IP addressing
associated with that interface is changed. Two options are suggested to update the auto-assigned
addressing in this case:
• administratively disable and enable the protocol used for the interface delay test
• disable and enable the IP interface under which the IP address has changed
TWAMP Light test packets consult the routing table to determine how to reach the destination. The test
should be configured to use local IP interface source and directly connected IP peer interface destination
addressing to ensure the packet egresses and returns over the same IP interface. The destination must be
reachable from the IP interface where the interface delay test is configured. Using indirect IP addressing,
such as unnumbered interfaces, does not guarantee that the measurement is reporting the delay for the
expected interface.
Only one protocol, IPv4 or IPv6, can be enabled for an interface delay test at any time.
Interfaces defined as loopback do not support interface delay tests and are an invalid interface type. The
configuration exists under these interfaces, but a detectable transmission error prevents the sending of
packets.
The system interface does not support interface delay tests and the configuration is hidden.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
When all audit conditions successfully pass, the delay collection begins. When no thresholds are
configured, the test collects delay information as history, but without at least one configured threshold
value, reporting updates to the routing engine are disabled. If at least one threshold is configured,
the interface enters the first report phase. Because no previous delay value has been reported, the
first measurement window with a configured threshold that completes with integrity triggers the delay
measurement report. After this benchmark is set, all subsequent thresholds use the delay measurement
last reported as the comparison.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
OAM-PM configurations are not dynamic environments. All aspects of the architecture must be carefully
considered before configuring the various architectural components, making external references to
other related components, or activating the OAM-PM architecture. No modifications are allowed to
any components that are active or have any active sub-components. Any function being referenced
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
by an active OAM-PM function or test cannot be modified or shut down. For example, to change any
configuration element of a session, all active tests must be in a shutdown state. To change any bin group
configuration (described later in this section), all sessions that reference the bin group must have every test
shut down. The description parameter is the only exception to this rule.
Session source and destination configuration parameters are not validated by the test that uses that
information. When the test is activated with a no shutdown command, the test engine attempts to send
the test packets even if the session source and destination information does not accurately represent the
entity that must exist to successfully transmit packets. If the entity does not exist, the transmit count for the
test is zero.
OAM-PM is not a hitless operation. If a high availability event occurs that causes the backup CPM or
CPIOM to become the active CPM or CPIOM, or when ISSU functions are performed, the test data is
not correctly reported. There is no synchronization of state between the active and the backup control
modules. All OAM-PM statistics stored in volatile memory are lost. When the reload or high availability
event is completed and all services are operational, the OAM-PM functions commence.
It is possible that during times of network convergence, high CPU utilizations, or contention for resources,
OAM-PM may not be able to detect changes to an egress connection or allocate the necessary resources
to perform its tasks.
4.2.1 Session
The session is the overall collection of test information fields, including the test parameters, measurement
intervals, and mapping to configured storage models. The container defines the attributes of the session.
The fields are as follows:
• session type
The impetus of the test, which is either proactive (default) or on-demand. Individual test timing
parameters are influenced by this setting. A proactive session starts immediately following the execution
of a no shutdown command for the test. A proactive test continues to execute until a manual shutdown
stops the individual test. On-demand tests also start immediately following the no shutdown command.
However, the operator can override the no test-duration default and configure a fixed amount of time
that the test executes, up to 24 hours (86 400 seconds).
If an on-demand test is configured with a test duration, it is important to shut down tests when they are
completed. In the event of a high availability event causing the backup CPM or CPIOM to become the
active CPM or CPIOM, all on-demand tests that have a test duration statement restart and run for the
configured amount of time regardless of their progress on the previously active CPM or CPIOM.
• test family
The main branch of testing that addresses a specific technology. The available tests for the session are
based on the test family. The destination, source, and priority are common to all tests under the session
and are defined separately from the individual test parameters.
• test parameters
The parameters included in individual tests, as well as the associated parameters including start and
stop times and the ability to activate and deactivate the individual test.
• measurement interval
The assignment of collection windows to the session with the appropriate configuration parameters and
accounting policy for that specific session.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
The session can be viewed as the single container that brings all aspects of individual tests and the various
OAM-PM components together. If any aspects of the session are incomplete, the individual test cannot be
activated with a no shutdown command, and an ‟Invalid Ethernet session parameters” error occurs.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
Measurement intervals can be 15 minutes (15-min), one hour (1-hour), and 1 day (1-day) in duration.
The boundary-type defines the start of the measurement interval and can be aligned to the local time-of-
day clock, with or without an optional offset. The boundary-type can be aligned using the test-aligned
option, which means that the start of the measurement interval coincides with the activation of the test.
By default, the start boundary is clock-aligned without an offset. When this configuration is deployed, the
measurement interval starts at zero, in relation to the length.
When a boundary is clock-aligned and an offset is configured, the specified amount of time is applied to
the measurement interval. Offsets are configured on a per-measurement interval basis and only applicable
to clock-aligned measurement intervals. Only offsets less than the measurement interval duration are
allowed. Table 18: Measurement interval start times lists examples of the start times of each measurement
interval.
10 minutes 10, 25, 40, 55 10 min after the hour 10 min after midnight
Although test-aligned approaches may seem beneficial for simplicity, there are some drawbacks that
need to be considered. The goal of the time-based and well-defined collection windows allows for the
comparison of measurements across common windows of time throughout the network and for relating
different tests or sessions. It is suggested that proactive sessions use the default clock-aligned boundary
type. On-demand sessions may use test-aligned boundaries. On-demand tests are typically used for
troubleshooting or short term monitoring that does not require alignment or comparison to other PM data.
The statistical data collected and the computed results from each measurement interval are maintained
in volatile system memory by default. The number of intervals stored is configurable per measurement
interval. Different measurement intervals have different defaults and ranges. The interval-stored
parameter defines the number of completed individual test runs to store in volatile memory. There is an
additional allocation to account for the active measurement interval.
To look at the statistical information for the individual tests and a specific measurement interval stored in
volatile memory, the show oam-pm statistics … interval-number command can be used. If there is an
active test, it can be viewed by using the interval number 1. In this case, the first completed record would
be interval number 2, and previously completed records would increment up to the maximum intervals
stored value plus one.
As new tests for the measurement interval are completed, the older entries are renumbered to maintain
their relative position to the current test. If the retained test data for a measurement interval consumes the
final entry, any subsequent entries cause the removal of the oldest data.
There are drawbacks to this storage model. Any high availability function that causes an active CPM or
CPIOM switch flushes the results that are in volatile memory. Another consideration is the large amount
of system memory consumed using this type of model. Considering the risks and resource consumption
this model incurs, an alternate method of storage is supported. An accounting policy can be applied to
each measurement interval to write the completed data in system memory to non-volatile flash memory
in an XML format. The amount of system memory consumed by historically completed test data must be
balanced with an appropriate accounting policy.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
Nokia recommends that only necessary data be stored in non-volatile memory to avoid unacceptable risk
and unnecessary resource consumption. It is further suggested that a large overlap between the data
written to flash memory and stored in volatile memory is unnecessary.
The statistical information in system memory is also available through SNMP. If this method is chosen, a
balance must be struck between the intervals retained and the times at which the SNMP queries collect the
data. Determining the collection times through SNMP must be done with caution. If a file is completed while
another file is being retrieved through SNMP, the indexing changes to maintain the relative position to the
current run. Correct spacing of the collection is key to ensuring data integrity.
Table 19: OAM-PM XML keywords and MIB reference describes the keywords and MIB references
contained in the OAM-PM XML file.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
frr frame delay range bin record, round-trip None - header only
frf frame delay range bin record, forward None - header only
frb frame delay range bin record, backward None - header only
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
fvr inter-frame delay variation bin record, round- None - header only
trip
frr frame delay range bin record, round-trip None - header only
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
frb frame delay range bin record, backward None - header only
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
frr frame delay range bin record, round-trip None - header only
frf frame delay range bin record, forward None - header only
frb frame delay range bin record, backward None - header only
By default, the 15-min measurement interval stores 33 test runs (32+1) with a configurable range of 1 to
96, and the 1-hour measurement interval stores 9 test runs (8+1) with a configurable range of 1 to 24. The
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
only storage for the 1-day measurement interval is 2 (1+1). This value for the 1-day measurement interval
cannot be changed.
All three measurement intervals may be added to a single session if required. Each measurement interval
that is included in a session is updated simultaneously for each test that is executing. If a measurement
interval length is not required, it should not be configured.
In addition to the three predetermined length measurement intervals, a fourth ‟always on” raw
measurement interval is allocated at test creation. Data collection for the raw measurement interval
commences immediately following the execution of a no shutdown command. It is a valuable tool for
assisting in real-time troubleshooting as it maintains the same performance information and relates to
the same bins as the fixed length collection windows. The operator may clear the contents of the raw
measurement interval and flush stale statistical data to look at current conditions. This measurement
interval has no configuration options, cannot be written to flash memory, and cannot be disabled; it is a
single never-ending window.
Memory allocation for the measurement intervals is performed when the test is configured. Volatile memory
is not flushed until the test is deleted from the configuration; a high availability event causes the backup
CPM or CPIOM to become the newly active CPM or CPIOM, or some other event clears the active CPM or
CPIOM system memory. Shutting down a test does not release the allocated memory for the test.
Measurement intervals also include a suspect flag. The suspect flag is used to indicate that data collected
in the measurement interval may not be representative. The flag is set to true only under the following
conditions:
• The time-of-day clock is adjusted by more than 10 seconds.
• The test start does not align with the start boundary of the measurement interval. This would be
common for the first execution for clock-aligned tests.
• The test is stopped before the end of the measurement interval boundary.
The suspect flag is not set when there are times of service disruption, maintenance windows, discontinuity,
low packet counts, or other such events. Higher-level systems would be required to interpret and
correlate those types of events for measurement intervals that executed during the time that relates to the
specific interruption or condition. Because each measurement interval contains a start and stop time, the
information is readily available for higher-level systems to discount the specific windows of time.
FD, IFDV, and FDR statistics are binnable results. FD, IFDV, FDR, and MFD all include minimum,
maximum, and average values. Unidirectional and round-trip results are stored for each metric.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
Unidirectional frame delay and frame delay range measurements require exceptional time-of-day clock
synchronization. If the time-of-day clock does not exhibit extremely tight synchronization, unidirectional
measurements is not representative. In one direction, the measurement is artificially increased by the
difference in the clocks. In the other direction, the measurement is artificially decreased by the difference
in the clocks. This level of clocking accuracy is not available with NTP. To achieve this level of time-of-day
clock synchronization, Precision Time Protocol (PTP) 1588v2 should be considered.
Round-trip metrics do not require clock synchronization between peers, because the four timestamps
allow for accurate representation of the round-trip delay. The mathematical computation removes remote
processing and any difference in time-of-day clocking. Round-trip measurements do require stable local
time-of-day clocks.
Any delay metric that is negative is treated as zero and placed in bin 0, the lowest bin, which has a lower
boundary of 0 microseconds.
Delay results are mapped to the measurement interval that is active when the result arrives back at the
source.
There are no supported log events based on delay metrics.
Loss metrics are only unidirectional and report Frame Loss Ratio (FLR) and availability information. FLR is
the computation of loss (lost/sent) over time. Loss measurements during periods of unavailability are not
included in the FLR calculation as they are counted against the unavailability metric.
Availability requires relating three different functions. First, the individual probes are marked as available
or unavailable based on sequence numbers in the protocol. A number of probes are rolled up into a
small measurement window, typically 1 s. FLR is computed over all the probes in a small window. If the
resulting percentage is higher than the configured threshold, the small window is marked as unavailable.
If the resulting percentage is lower than the threshold, the small window is marked as available. A sliding
window is defined as some number of small windows, typically 10. The sliding window is used to determine
availability and unavailability events. Switching from one state to the other requires every small window in
the sliding window to be the same state and different from the current state.
Availability and unavailability counters are incremented based on the number of small windows that have
occurred in all available and unavailable windows.
Availability and unavailability using synthetic loss measurements is meant to capture the loss behavior
for the service. It is not meant to capture and report on service outages or communication failures.
Communication failures of a bidirectional or unidirectional nature must be captured using some other
means of connectivity verification, alarming, or continuity checking. During times of complete or extended
failure periods it becomes necessary to timeout individual test probes. It is not possible to determine the
direction of the loss because no response packets are being received back on the source. In this case, the
statistics calculation engine maintains the previous state, updating the appropriate directional availability
or unavailability counter. At the same time, an additional per-direction undetermined counter is updated.
This undetermined counter is used to indicate that the availability or unavailability statistics could not be
determined for a number of small windows.
During connectivity outages, the higher-level systems can be used to discount the loss measurement
interval, which covers the same span as the outage.
Availability and unavailability computations may delay the completion of a measurement interval. The
declaration of a state change or the delay to a closing a measurement interval could be equal to the length
of the sliding window and the timeout of the last packet. Closing of a measurement interval cannot occur
until the sliding window has determined availability or unavailability. If the availability state is changing, and
the determination is crossing two measurement intervals, the measurement interval does not complete
until the declaration has occurred. Typically, standard bodies indicate the timeout per packet. In the case of
Ethernet, DMMv1, and SLM, timeout values are set at 5 s and cannot be configured.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
-------------------------------------------------------------------------------
Configured Lower Bounds for Delay Measurement (DMM) Tests, in microseconds
-------------------------------------------------------------------------------
Group Description Admin Bin FD(us) FDR(us) IFDV(us)
-------------------------------------------------------------------------------
1 OAM PM default bin group (not* Up 0 0 0 0
1 5000 5000 5000
2 10000 - -
-------------------------------------------------------------------------------
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
• close-time (UTC)
• sample-count (number of samples used to compute delay)
• suspect (equal to or greater than the window-integrity percentage = no | lower = yes)
• delay (compute value over the window in micro-seconds)
No history is maintained on the node for this information. The single statistic is overwritten every time
a sample window closes for a test configured to use a delay template. The higher-level systems are
responsible for storing and using this data.
4.2.8 Monitoring
The following configuration examples demonstrate the show and monitoring commands available to check
OAM-PM.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
bin 8
lower-bound 800
exit
bin 9
lower-bound 1000
exit
exit
no shutdown
exit
session "eth-pm-service-4" test-family Ethernet session-
type proactive create
bin-group 2
no description
meas-interval 15-mins create
no accounting-policy
boundary-type clock-aligned
clock-offset 0
intervals-stored 32
exit
Ethernet
dest-mac 00:00:00:00:00:30
priority 0
source mep 28 domain 12 association 4
dmm test-id 10004 create
data-tlv-size 1000
interval 1000
no test-duration
no shutdown
exit
slm test-id 10004 create
data-tlv-size 1000
flr-threshold 50
no test-duration
timing frames-per-delta-t 10 consec-delta-t 10 interval 100
chli-threshold 4
no shutdown
exit
exit
exit
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
8 8000 - 800
9 10000 - 1000
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
* indicates that the corresponding row element may have been truncated.
-------------------------------------------------------------------------------
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
Ethernet Configuration
-------------------------------------------------------------------------------
Source MEP : 28 Priority : 0
Source Domain : 12 Dest MAC Address : 00:00:00:00:00:30
Source Assoc'n : 4
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
DMM Test Configuration and Status
-------------------------------------------------------------------------------
Test ID : 10004 Admin State : Up
Oper State : Up Data TLV Size : 1000 octets
On-Demand Duration: Not Applicable On-Demand Remaining: Not Applicable
Interval : 1000 ms
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
SLM Test Configuration and Status
-------------------------------------------------------------------------------
Test ID : 10004 Admin State : Up
Oper State : Up Data TLV Size : 1000 octets
On-Demand Duration: Not Applicable On-Demand Remaining: Not Applicable
Interval : 100 ms
CHLI Threshold : 4 HLIs Frames Per Delta-T : 10 SLM frames
Consec Delta-Ts : 10 FLR Threshold : 50%
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
15-mins Measurement Interval Configuration
-------------------------------------------------------------------------------
Duration : 15-mins Intervals Stored : 32
Boundary Type : clock-aligned Clock Offset : 0 seconds
Accounting Policy : none
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Configured Lower Bounds for Delay Measurement (DMM) Tests, in microseconds
-------------------------------------------------------------------------------
Group Description Admin Bin FD(us) FDR(us) IFDV(us)
-------------------------------------------------------------------------------
2 Up 0 0 0 0
1 1000 5000 100
2 2000 - 200
3 3000 - 300
4 4000 - 400
5 5000 - 500
6 6000 - 600
7 7000 - 700
8 8000 - 800
9 10000 - 1000
-------------------------------------------------------------------------------
----------------------------------------------------------------------
Bin Type Direction Minimum (us) Maximum (us) Average (us)
----------------------------------------------------------------------
FD Forward 0 8330 712
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
---------------------------------------------------------------
Frame Delay (FD) Bin Counts
---------------------------------------------------------------
Bin Lower Bound Forward Backward Round Trip
---------------------------------------------------------------
0 0 us 624 53 0
1 1000 us 229 266 135
2 2000 us 29 290 367
3 3000 us 4 195 246
4 4000 us 7 71 94
5 5000 us 5 12 28
6 6000 us 1 7 17
7 7000 us 0 1 5
8 8000 us 1 4 3
9 10000 us 0 1 5
---------------------------------------------------------------
---------------------------------------------------------------
Frame Delay Range (FDR) Bin Counts
---------------------------------------------------------------
Bin Lower Bound Forward Backward Round Trip
---------------------------------------------------------------
0 0 us 893 875 873
1 5000 us 7 25 27
---------------------------------------------------------------
---------------------------------------------------------------
Inter-Frame Delay Variation (IFDV) Bin Counts
---------------------------------------------------------------
Bin Lower Bound Forward Backward Round Trip
---------------------------------------------------------------
0 0 us 411 162 96
1 100 us 113 115 108
2 200 us 67 84 67
3 300 us 56 67 65
4 400 us 36 46 53
5 500 us 25 59 54
6 600 us 25 27 38
7 700 us 29 34 22
8 800 us 41 47 72
9 1000 us 97 259 325
---------------------------------------------------------------
------------------------------------------------------
Frames Sent Frames Received
------------------------------------------------------
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
-------------------------------------------
Frame Loss Ratios
-------------------------------------------
Minimum Maximum Average
-------------------------------------------
Forward 0.000% 0.000% 0.000%
Backward 0.000% 0.000% 0.000%
-------------------------------------------
-------------------------------------------------------------------------------
Availability Counters (Und = Undetermined)
-------------------------------------------------------------------------------
Available Und-Avail Unavailable Und-Unavail HLI CHLI
-------------------------------------------------------------------------------
Forward 900 0 0 0 0 0
Backward 900 0 0 0 0 0
-------------------------------------------------------------------------------
----------------------------------------------------------------------
Bin Type Direction Minimum (us) Maximum (us) Average (us)
----------------------------------------------------------------------
FD Forward 0 11670 632
FD Backward 0 11710 2354
FD Round Trip 1118 14902 2704
FDR Forward 0 11670 611
FDR Backward 0 11710 2353
FDR Round Trip 0 13784 1543
IFDV Forward 0 10027 410
IFDV Backward 0 10436 784
IFDV Round Trip 0 13542 1070
----------------------------------------------------------------------
---------------------------------------------------------------
Frame Delay (FD) Bin Counts
---------------------------------------------------------------
Bin Lower Bound Forward Backward Round Trip
---------------------------------------------------------------
0 0 us 1465 252 0
1 1000 us 454 628 657
2 2000 us 62 593 713
3 3000 us 8 375 402
4 4000 us 11 114 153
5 5000 us 7 26 41
6 6000 us 2 10 20
7 7000 us 0 2 8
8 8000 us 1 10 11
9 10000 us 1 1 6
---------------------------------------------------------------
---------------------------------------------------------------
Frame Delay Range (FDR) Bin Counts
---------------------------------------------------------------
Bin Lower Bound Forward Backward Round Trip
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
---------------------------------------------------------------
0 0 us 2001 1963 1971
1 5000 us 11 49 41
---------------------------------------------------------------
---------------------------------------------------------------
Inter-Frame Delay Variation (IFDV) Bin Counts
---------------------------------------------------------------
Bin Lower Bound Forward Backward Round Trip
---------------------------------------------------------------
0 0 us 954 429 197
1 100 us 196 246 197
2 200 us 138 168 145
3 300 us 115 172 154
4 400 us 89 96 136
5 500 us 63 91 108
6 600 us 64 53 89
7 700 us 61 55 63
8 800 us 112 82 151
9 1000 us 219 619 771
---------------------------------------------------------------
------------------------------------------------------
Frames Sent Frames Received
------------------------------------------------------
Forward 20329 20329
Backward 20329 20329
------------------------------------------------------
-------------------------------------------
Frame Loss Ratios
-------------------------------------------
Minimum Maximum Average
-------------------------------------------
Forward 0.000% 0.000% 0.000%
Backward 0.000% 0.000% 0.000%
-------------------------------------------
-------------------------------------------------------------------------------
Availability Counters (Und = Undetermined)
-------------------------------------------------------------------------------
Available Und-Avail Unavailable Und-Unavail HLI CHLI
-------------------------------------------------------------------------------
Forward 2033 0 0 0 0 0
Backward 2033 0 0 0 0 0
-------------------------------------------------------------------------------
The monitor command can be used to automatically update the statistics for the raw measurement
interval.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
Test Description
Background Tasks are configured outside the SAA hierarchy that consume
OAM task resources. Specifically, these include SDP keepalive,
static route CPE check, filter redirect policy, ping test, and
VRRP policy host unreachable. These are critical tasks that
ensure the network operation and may affect data forwarding or
network convergence.
SAA non-continuous SAA tests that are not configured as continuous, and are
scheduled outside the SAA application. The oam saa test-name
start command is required to initiate the test run.
Non-SAA (Directed) Tasks that do not include any configuration under SAA. These
tests are SNMP or via the CLI that is used to troubleshoot or
profile network condition. This would take the form ‟oam test-
type”, or ping or traceroute with the specific test parameters.
Y.1731 defines two approaches for measuring frame delay and frame delay variation: single-ended and
dual-ended. SAA supports the single-ended approach.
SAA test types are restricted to tests that use a request response mechanism; that is, single-ended tests.
Dual-ended tests that initiate the test on one node but require the statistical gathering on the other node
are not supported under SAA.
Post-processing analysis of individual test runs can be used to determine the success or failure of these
runs. The operator can set rising and lowering thresholds for delay, jitter, and loss. Exceeding the threshold
causes the Last Test Result field to display the Failed keyword. A trap can be generated when the test fails.
The operator can also configure a probe failure threshold and trap when these thresholds are exceeded.
Each supported test type has test-specific configuration properties. Not all options, intervals, and
parameters are available for all tests. Some configuration parameters, such as the sub-second probe
interval, require specific hardware.
Trace type tests apply the timeout to each individual packet, which may affect spacing. Packet timeout
is required to move from one probe to the next probe. For tests that do not require this type of behavior,
typically ping and ETH-CFM PM functions, the probes are sent at the specified interval and the timeout is
only applied at the end of the test if any probe is lost during the run. When the timeout is applied at the end
of the run, the test is considered complete either when all responses are received or the timeout expires at
the end of the test run. For tests marked continuous (always scheduled), the spacing between runs may be
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 OAM monitoring and reporting
delayed by the timeout value when a packet is lost. The test run is complete when all probes have either
been received back or the timeout value has expired.
To preserve system resources, specifically memory, the operator should only store summarized history
results. By default, summary results are stored for tests configured with sub-second probe intervals
or a probe count above 100, or is written to a file. By default, per-probe information is stored for tests
configured with an interval of one second counters or above and probe counts of 100 or less, and is not
written to a file. The operator may choose to override these defaults using the probe-history {keep | drop
| auto} command options. The auto option sets the preceding defaults. The other options override the
default retention schemes based on the operator requirements. The keep option retains and stores per-
probe information and the drop option stores summary-only information. The probe data can be viewed
using the show saa test command. If the per-probe information is retained, this data is available at the
completion of the test run. The summary data is updated throughout the test run. The overall memory
system usage is available using the show system memory-pools command. The OAM entry represents
the overall memory usage. This includes the history data stored for SAA tests. A clear saa testname option
is available to release the memory and flush test results.
SAA-launched tests maintain the two most recently completed tests and one in progress test. It is
important to ensure that the collection and accounting record process is configured to write the data to file
before it is overwritten. After the results are overwritten, they are lost.
Any data not written to file is lost on a CPU switchover.
The operator can use the following show, clear, and monitor commands to monitor the test OAM toolset:
• The show test-oam oam-config-summary command provides information about the configured tests.
• The show test-oam oam-perf command provides the transmit (launched form me) rate information and
remotely launched test receive rate on the local network element.
• The clear test-oam oam-perf command provides the ability to clear the test OAM performance
statistics for a current view of the different rates in the preceding oam-perf command.
• The monitor test-oam oam-perf command provides time sliced performance statistics for test oam
functions.
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
5.5 Broadband Network Gateway (BNG) Control and User Plane Separation
(CUPS)
3GPP 23.007, Restoration procedures
3GPP 29.244, Interface between the Control Plane and the User Plane nodes
3GPP 29.281, General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U)
BBF TR-459, Control and User Plane Separation for a Disaggregated BNG
RFC 8300, Network Service Header (NSH)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
5.8 Ethernet
IEEE 802.1AB, Station and Media Access Control Connectivity Discovery
IEEE 802.1ad, Provider Bridges
IEEE 802.1ag, Connectivity Fault Management
IEEE 802.1ah, Provider Backbone Bridges
IEEE 802.1ak, Multiple Registration Protocol
IEEE 802.1aq, Shortest Path Bridging
IEEE 802.1ax, Link Aggregation
IEEE 802.1D, MAC Bridges
IEEE 802.1p, Traffic Class Expediting
IEEE 802.1Q, Virtual LANs
IEEE 802.1s, Multiple Spanning Trees
IEEE 802.1w, Rapid Reconfiguration of Spanning Tree
IEEE 802.1X, Port Based Network Access Control
IEEE 802.3ac, VLAN Tag
IEEE 802.3ad, Link Aggregation
IEEE 802.3ah, Ethernet in the First Mile
IEEE 802.3x, Ethernet Flow Control
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
ISO/IEC 10589:2002 Second Edition, Intermediate system to Intermediate system intra-domain routeing
information exchange protocol for use in conjunction with the protocol for providing the connectionless-
mode Network Service (ISO 8473)
RFC 1195, Use of OSI IS-IS for Routing in TCP/IP and Dual Environments
RFC 2973, IS-IS Mesh Groups
RFC 3359, Reserved Type, Length and Value (TLV) Codepoints in Intermediate System to Intermediate
System
RFC 3719, Recommendations for Interoperable Networks using Intermediate System to Intermediate
System (IS-IS)
RFC 3787, Recommendations for Interoperable IP Networks using Intermediate System to Intermediate
System (IS-IS)
RFC 4971, Intermediate System to Intermediate System (IS-IS) Extensions for Advertising Router
Information
RFC 5120, M-ISIS: Multi Topology (MT) Routing in IS-IS
RFC 5130, A Policy Control Mechanism in IS-IS Using Administrative Tags
RFC 5301, Dynamic Hostname Exchange Mechanism for IS-IS
RFC 5302, Domain-wide Prefix Distribution with Two-Level IS-IS
RFC 5303, Three-Way Handshake for IS-IS Point-to-Point Adjacencies
RFC 5304, IS-IS Cryptographic Authentication
RFC 5305, IS-IS Extensions for Traffic Engineering TE
RFC 5306, Restart Signaling for IS-IS – helper mode
RFC 5307, IS-IS Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)
RFC 5308, Routing IPv6 with IS-IS
RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols
RFC 5310, IS-IS Generic Cryptographic Authentication
RFC 6119, IPv6 Traffic Engineering in IS-IS
RFC 6213, IS-IS BFD-Enabled TLV
RFC 6232, Purge Originator Identification TLV for IS-IS
RFC 6233, IS-IS Registry Extension for Purges
RFC 6329, IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging
RFC 7775, IS-IS Route Preference for Extended IP and IPv6 Reachability
RFC 7794, IS-IS Prefix Attributes for Extended IPv4 and IPv6 Reachability
RFC 7987, IS-IS Minimum Remaining Lifetime
RFC 8202, IS-IS Multi-Instance – single topology
RFC 8570, IS-IS Traffic Engineering (TE) Metric Extensions – Min/Max Unidirectional Link Delay metric for
flex-algo
RFC 8919, IS-IS Application-Specific Link Attributes
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
RFC 5656, Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer – ECDSA
RFC 5925, The TCP Authentication Option
RFC 5926, Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)
RFC 6398, IP Router Alert Considerations and Usage – MLD
RFC 6528, Defending against Sequence Number Attacks
RFC 7011, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow
Information
RFC 7012, Information Model for IP Flow Information Export
RFC 7230, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing
RFC 7231, Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
RFC 7232, Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests
RFC 7301, Transport Layer Security (TLS) Application Layer Protocol Negotiation Extension
RFC 7616, HTTP Digest Access Authentication
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
RFC 4541, Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener
Discovery (MLD) Snooping Switches
RFC 4604, Using Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener
Discovery Protocol Version 2 (MLDv2) for Source-Specific Multicast
RFC 4607, Source-Specific Multicast for IP
RFC 4608, Source-Specific Protocol Independent Multicast in 232/8
RFC 4610, Anycast-RP Using Protocol Independent Multicast (PIM)
RFC 4611, Multicast Source Discovery Protocol (MSDP) Deployment Scenarios
RFC 5059, Bootstrap Router (BSR) Mechanism for Protocol Independent Multicast (PIM)
RFC 5186, Internet Group Management Protocol Version 3 (IGMPv3) / Multicast Listener Discovery
Version 2 (MLDv2) and Multicast Routing Protocol Interaction
RFC 5384, The Protocol Independent Multicast (PIM) Join Attribute Format
RFC 5496, The Reverse Path Forwarding (RPF) Vector TLV
RFC 6037, Cisco Systems' Solution for Multicast in MPLS/BGP IP VPNs
RFC 6512, Using Multipoint LDP When the Backbone Has No Route to the Root
RFC 6513, Multicast in MPLS/BGP IP VPNs
RFC 6514, BGP Encodings and Procedures for Multicast in MPLS/IP VPNs
RFC 6515, IPv4 and IPv6 Infrastructure Addresses in BGP Updates for Multicast VPNs
RFC 6516, IPv6 Multicast VPN (MVPN) Support Using PIM Control Plane and Selective Provider Multicast
Service Interface (S-PMSI) Join Messages
RFC 6625, Wildcards in Multicast VPN Auto-Discover Routes
RFC 6826, Multipoint LDP In-Band Signaling for Point-to-Multipoint and Multipoint-to-Multipoint Label
Switched Path
RFC 7246, Multipoint Label Distribution Protocol In-Band Signaling in a Virtual Routing and Forwarding
(VRF) Table Context
RFC 7385, IANA Registry for P-Multicast Service Interface (PMSI) Tunnel Type Code Points
RFC 7716, Global Table Multicast with BGP Multicast VPN (BGP-MVPN) Procedures
RFC 7761, Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)
RFC 8279, Multicast Using Bit Index Explicit Replication (BIER)
RFC 8296, Encapsulation for Bit Index Explicit Replication (BIER) in MPLS and Non-MPLS Networks –
MPLS encapsulation
RFC 8401, Bit Index Explicit Replication (BIER) Support via IS-IS
RFC 8444, OSPFv2 Extensions for Bit Index Explicit Replication (BIER)
RFC 8487, Mtrace Version 2: Traceroute Facility for IP Multicast
RFC 8534, Explicit Tracking with Wildcard Routes in Multicast VPN – (C-*,C-*) wildcard
RFC 8556, Multicast VPN Using Bit Index Explicit Replication (BIER)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC 3526, More Modular Exponential (MODP) Diffie-Hellman group for Internet Key Exchange (IKE)
RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPsec
RFC 3706, A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers
RFC 3947, Negotiation of NAT-Traversal in the IKE
RFC 3948, UDP Encapsulation of IPsec ESP Packets
RFC 4106, The Use of Galois/Counter Mode (GCM) in IPsec ESP
RFC 4109, Algorithms for Internet Key Exchange version 1 (IKEv1)
RFC 4301, Security Architecture for the Internet Protocol
RFC 4303, IP Encapsulating Security Payload
RFC 4307, Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)
RFC 4308, Cryptographic Suites for IPsec
RFC 4434, The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)
RFC 4543, The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH
RFC 4754, IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)
RFC 4835, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload
(ESP) and Authentication Header (AH)
RFC 4868, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
RFC 4945, The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2 and PKIX
RFC 5019, The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume
Environments
RFC 5282, Using Authenticated Encryption Algorithms with the Encrypted Payload of the IKEv2 Protocol
RFC 5903, ECP Groups for IKE and IKEv2
RFC 5996, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 5998, An Extension for EAP-Only Authentication in IKEv2
RFC 6379, Suite B Cryptographic Suites for IPsec
RFC 6380, Suite B Profile for Internet Protocol Security (IPsec)
RFC 6960, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC 7296, Internet Key Exchange Protocol Version 2 (IKEv2)
RFC 7321, Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating
Security Payload (ESP) and Authentication Header (AH)
RFC 7383, Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation
RFC 7427, Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
RFC 4222, Prioritized Treatment of Specific OSPF Version 2 Packets and Congestion Avoidance
RFC 4552, Authentication/Confidentiality for OSPFv3
RFC 4576, Using a Link State Advertisement (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual
Private Networks (VPNs)
RFC 4577, OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks
(VPNs)
RFC 5185, OSPF Multi-Area Adjacency
RFC 5187, OSPFv3 Graceful Restart – helper mode
RFC 5243, OSPF Database Exchange Summary List Optimization
RFC 5250, The OSPF Opaque LSA Option
RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols
RFC 5340, OSPF for IPv6
RFC 5642, Dynamic Hostname Exchange Mechanism for OSPF
RFC 5709, OSPFv2 HMAC-SHA Cryptographic Authentication
RFC 5838, Support of Address Families in OSPFv3
RFC 6549, OSPFv2 Multi-Instance Extensions
RFC 6987, OSPF Stub Router Advertisement
RFC 7471, OSPF Traffic Engineering (TE) Metric Extensions – Min/Max Unidirectional Link Delay metric
for flex-algo
RFC 7684, OSPFv2 Prefix/Link Attribute Advertisement
RFC 7770, Extensions to OSPF for Advertising Optional Router Capabilities
RFC 8362, OSPFv3 Link State Advertisement (LSA) Extensibility
RFC 8920, OSPF Application-Specific Link Attributes
5.25 OpenFlow
TS-007 Version 1.3.1, OpenFlow Switch Specification – OpenFlow-hybrid switches
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
RFC 4447, Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP)
RFC 4448, Encapsulation Methods for Transport of Ethernet over MPLS Networks
RFC 5085, Pseudowire Virtual Circuit Connectivity Verification (VCCV): A Control Channel for Pseudowires
RFC 5659, An Architecture for Multi-Segment Pseudowire Emulation Edge-to-Edge
RFC 5885, Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity
Verification (VCCV)
RFC 6073, Segmented Pseudowire
RFC 6310, Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping
RFC 6391, Flow-Aware Transport of Pseudowires over an MPLS Packet Switched Network
RFC 6575, Address Resolution Protocol (ARP) Mediation for IP Interworking of Layer 2 VPNs
RFC 6718, Pseudowire Redundancy
RFC 6829, Label Switched Path (LSP) Ping for Pseudowire Forwarding Equivalence Classes (FECs)
Advertised over IPv6
RFC 6870, Pseudowire Preferential Forwarding Status bit
RFC 7023, MPLS and Ethernet Operations, Administration, and Maintenance (OAM) Interworking
RFC 7267, Dynamic Placement of Multi-Segment Pseudowires
RFC 7392, Explicit Path Routing for Dynamic Multi-Segment Pseudowires – ER-TLV and ER-HOP IPv4
Prefix
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
5.36 Timing
GR-1244-CORE Issue 3, Clocks for the Synchronized Network: Common Generic Criteria
GR-253-CORE Issue 3, SONET Transport Systems: Common Generic Criteria
IEEE 1588-2008, IEEE Standard for a Precision Clock Synchronization Protocol for Networked
Measurement and Control Systems
ITU-T G.781, Synchronization layer functions
ITU-T G.813, Timing characteristics of SDH equipment slave clocks (SEC)
ITU-T G.8261, Timing and synchronization aspects in packet networks
ITU-T G.8262, Timing characteristics of synchronous Ethernet equipment slave clock (EEC)
ITU-T G.8262.1, Timing characteristics of an enhanced synchronous Ethernet equipment slave clock
(eEEC)
ITU-T G.8264, Distribution of timing information through packet networks
ITU-T G.8265.1, Precision time protocol telecom profile for frequency synchronization
ITU-T G.8275.1, Precision time protocol telecom profile for phase/time synchronization with full timing
support from the network
RFC 3339, Date and Time on the Internet: Timestamps
RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms Specification
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
RFC 6038, Two-Way Active Measurement Protocol (TWAMP) Reflect Octets and Symmetrical Size
Features
RFC 8545, Well-Known Port Assignments for the One-Way Active Measurement Protocol (OWAMP) and
the Two-Way Active Measurement Protocol (TWAMP) – TWAMP
RFC 8762, Simple Two-Way Active Measurement Protocol – unauthenticated
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
OAM AND DIAGNOSTICS GUIDE RELEASE 22.5.R1 Standards and protocol support
SPACER TEXT
Customer document and product support
Customer documentation
Customer documentation welcome page
Technical support
Product support portal
Documentation feedback
Customer documentation feedback