Table Of Contents
Configuring the Cisco 7600 Series Ethernet Services 20G Line Card
Required Configuration Tasks
Identifying Slots and Subslots for the Cisco 7600 Series Ethernet Services 20G Line Card
Configuring High-Availability Features
Configuring UDE on ES20 Line Cards
Restrictions and Usage Guidelines
Configuring Unidirectional Link Detection (UDLD) on Ports with EVCs
Restrictions and Usage Guidelines
Configuring UDLD Aggressive Mode
Enabling UDLD on Ports With EVC Configured
Disabling Individual UDLD on Ports With EVC Configured
Resetting Disabled UDLD on Ports With EVC Configured
Verification
ISSU Support for ES20 Line Card
Configuring IEEE 802.1ag-2007 Compliant CFM
Supported Line Cards
Scalable Limits
Restrictions and Usage Guidelines
Support for IEEE 802.1ad
Prerequisites for IEEE 802.1ad
Restrictions for IEEE 802.1ad
Information About IEEE 802.1ad
How to Configure IEEE 802.1ad
Troubleshooting Dot1ad
Configuring Layer 2 Features
Cross-Bundling
Configuring EVC EtherChannel and LACP over EVC Port Channel
Restrictions and Usage Guidelines
Multichassis Support for Link Aggregation Control Protocol
Requirements and Restrictions
Troubleshooting
Pseudo MLACP Support on Cisco 7600
Failover Operations
Failure Recovery
Restrictions for PMLACP
Configuring PMLACP on Cisco 7600
Configuration Examples
Verification
Troubleshooting Tips
Configuring Custom Ethertype for EVC Interfaces
Supported Rewrite Rules for a Custom Ethertype Configuration
Supported Rewrites for Non Range on a C-Tag on an NNI
Supported Rewrites for Range on C-Tag with an NNI
Restrictions and Usage Guidelines
Configuring Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE
Restrictions and Usage Guidelines
Troubleshooting
Configuring Flexible Service Mapping Based on CoS and Ethertype
Restrictions and Usage Guidelines
Configuring MultiPoint Bridging over Ethernet on 7600-ESM-2X10GE and 7600-ESM-20X1GE
Restrictions and Usage Guidelines
Configuring Gigabit Ethernet Link Aggregation with Advanced Load Balancing
Restriction and Usage Guidelines
Troubleshooting Load Balancing Features
Configuring Virtual Private LAN Service (VPLS) with Port-Channel as a Core Interface
TE-FRR Support on VPLS LAG NNI
Load Balancing
Fat Pseudo-Wire Load Balancing
Provider Router Load Balancing
BPDU PW Over LAG NNI
Restrictions and Usage Guidelines
Configuring BPDU PW on a Port Channel
Configuring the Backup Interface for Flexible UNI
Restriction and Usage Guidelines
Troubleshooting
Configuring Layer2 Access Control Lists (ACLs) on an EVC
Restrictions and Usage Guidelines
Configuring Broadcast Storm Control on Switchports and Ports with Ethernet Virtual Connections
Detecting a Broadcast Storm
Traffic Storm Control on ES20 Switchports
Restrictions and Usage Guidelines
Traffic Storm Control on ES20 with EVCs
Restrictions and Usage Guidelines
Troubleshooting
Configuring Asymmetric Carrier-Delay
Restrictions and Usage Guidelines
Configuring MST on EVC Bridge Domain
Overview of MST and STP
Overview of MST on EVC Bridge Domain
Restrictions and Usage Guidelines
Examples
Verification
DHCP Snooping with Option-82 on EVC
Restrictions and Usage Guidelines
Verification
Configuring MAC Address Security for EVC Bridge-Domain
Restrictions and Usage Guidelines
Configuring MAC Address Security for EVC Bridge-Domain
Enabling MAC Address Security for EVC Bridge-Domain
Disabling MAC Address Security for EVC Bridge-Domains on an EFP
Configuring Whitelisted MAC Address on an EFP
Configuring Sticky MAC Addresses on an EFP
Configuring Secure MAC Address Aging on an EFP
Configuring MAC Address Limiting on an EFP
Configuring MAC Address Limiting on a Bridge-Domain
Configuring Violation Response on an EFP
Troubleshooting
Configuring Static MAC on Ethernet Flow Point and Pseudowire
Restrictions and Usage Guidelines
Configuring Static MAC over EFP for the Cisco 7600 Router
Configuring MPLS on Core-Facing Interface
Configuring Static MAC over Pseudowire for the Cisco 7600 Router
Troubleshooting
Configuring Resilient Ethernet Protocol
REP Edge No-Neighbor
Configuring REP over Ethernet Virtual Circuit
Restrictions and Usage Guidelines
Configuring REP over EVC for the Cisco 7600 Router
Configuring REP over EVC using Cross connect for the Cisco 7600 Router
Configuring REP over EVC using connect for the Cisco 7600 Router
Configuring REP over EVC using bridge domain for the Cisco 7600 Router
Configuring Resilient Ethernet Protocol Configurable Timers
Restrictions and Usage Guidelines
Configuring REP Configurable Timers for the Cisco 7600 Router
Configuring the REP Link Status Layer Retries
Configuring the REP Link Status Layer Age Out Timer
Configuring the REP Link Status Layer Age Out Timer
Troubleshooting
Configuring CFM over EFP Interface with cross connect
Restrictions and Usage Guidelines
Configuring CFM over EFP with xconnect for the Cisco 7600 Router
Configuring CFM over EFP Interface with Cross Connect—Basic Configuration
Configuring CFM over EFP Interface with Cross Connect—Single Tag VLAN Cross Connect
Configuring CFM over EFP Interface with Cross Connect—Double Tag VLAN Cross Connect
Configuring CFM over EFP Interface with Cross Connect—Selective QinQ Cross Connect
Configuring CFM over EFP Interface with Cross Connect—Port-Based Cross Connect Tunnel
Configuring CFM over EFP Interface with Cross Connect—Port Channel-Based Cross Connect Tunnel
Troubleshooting CFM Features
Configuring Reverse Layer 2 Gateway Ports for the Cisco 7600 Router
Restrictions and Usage Guidelines
Configuring Reverse L2GP for the Cisco 7600 Router
Troubleshooting Tips
Configuring Private Host Switch Virtual Interface (VLAN and VPLS)
Port Classification
Requirements and Restrictions
Verifying the Private Hosts SVI configuration
Sample Configuration For Private Hosts VPLS Configuration
Sample configuration for Private Hosts Interface Vlan configuration
Configuring Multicast Features
Configuring IGMP/PIM Snooping for VPLS Pseudowire on 7600-ESM-2X10GE and 7600-ESM-20X1GE
Restrictions and Usage Guidelines
Configuring Link State Tracking (LST)
Restrictions and Usage Guidelines
Configuring Link-State Tracking
Verification
Troubleshooting the Link State Tracking
Configuring Multicast VLAN Registration
Using MVR in a Multicast Television Application
Configuring MVR
Configuring Layer 3 and Layer 4 Features
Configuring Layer 3 and Layer 4 Access Control List on a Service Instance
Restrictions and Usage Guidelines
VRF aware IPv6 tunnel
Restrictions for VRF aware IPv6 tunnels
Configuring VRF aware IPv6 tunnel
Configure IPv6 overlay addresses in VRF and IPv4 transport addresses in Global RT
Configure IPv6 overlay addresses in VRF and IPv4 transport addresses in VRF
Verifying the Configuration
Troubleshooting Tips
IPv6 Policy Based Routing
Policy Based Routing
Restrictions for IPv6 PBR
Configuring IPv6 PBR
Configuring MPLS Features
Configuring Any Transport over MPLS
Scalable EoMPLS on 7600-ESM-2X10GE and 7600-ESM-20X1GE
Restrictions and Usage Guidelines
Configuring MPLS Traffic Engineering Class-Based Tunnel Selection
Restrictions and Usage Guidelines
Creating Multiple MPLS Member TE or DS-TE Tunnels with the Same Headend and the Same Tailend
Creating a Master Tunnel, Attaching Member Tunnels, and Making the Master Tunnel Visible
Configuring Virtual Private LAN Service
Hierarchical Virtual Private LAN Service (H-VPLS) with MPLS to the Edge
Configuring SVI-Based IP/Routed Interworking
Restrictions and Usage Guidelines
Resetting a Cisco 7600 Series Ethernet Services 20G Line Card
SFP-GE-T Support
Configuring the Cisco 7600 Series Ethernet Services 20G Line Card
This chapter provides information about configuring the Cisco 7600 Series Ethernet Services 20G (ES20) line card on the Cisco 7600 series router. It includes the following sections:
•Required Configuration Tasks
•Configuring High-Availability Features
•Configuring UDE on ES20 Line Cards
•Configuring Unidirectional Link Detection (UDLD) on Ports with EVCs
•Configuring IEEE 802.1ag-2007 Compliant CFM
•Support for IEEE 802.1ad
•Configuring Layer 2 Features
•Cross-Bundling
•Multichassis Support for Link Aggregation Control Protocol
•Pseudo MLACP Support on Cisco 7600
•Configuring Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE
•Configuring Flexible Service Mapping Based on CoS and Ethertype
•Configuring MultiPoint Bridging over Ethernet on 7600-ESM-2X10GE and 7600-ESM-20X1GE
•Configuring Gigabit Ethernet Link Aggregation with Advanced Load Balancing
•Configuring Virtual Private LAN Service (VPLS) with Port-Channel as a Core Interface
•Configuring the Backup Interface for Flexible UNI
•Configuring Broadcast Storm Control on Switchports and Ports with Ethernet Virtual Connections
•Traffic Storm Control on ES20 Switchports
•Traffic Storm Control on ES20 with EVCs
•Configuring Asymmetric Carrier-Delay
•Configuring MST on EVC Bridge Domain
•DHCP Snooping with Option-82 on EVC
•Configuring MAC Address Security for EVC Bridge-Domain
•Configuring Static MAC on Ethernet Flow Point and Pseudowire
•Configuring Resilient Ethernet Protocol
•Configuring CFM over EFP Interface with cross connect
•Configuring Reverse Layer 2 Gateway Ports for the Cisco 7600 Router
•Configuring Private Host Switch Virtual Interface (VLAN and VPLS)
•IPv6 Policy Based Routing
•Configuring Multicast Features
•Configuring IGMP/PIM Snooping for VPLS Pseudowire on 7600-ESM-2X10GE and 7600-ESM-20X1GE
•Configuring Link State Tracking (LST)
•Configuring Multicast VLAN Registration
•Configuring Layer 3 and Layer 4 Features
•Configuring Layer 3 and Layer 4 Access Control List on a Service Instance
•VRF aware IPv6 tunnel
•Configuring MPLS Features
•Configuring Any Transport over MPLS
•Configuring MPLS Traffic Engineering Class-Based Tunnel Selection
•Configuring Virtual Private LAN Service
•Configuring SVI-Based IP/Routed Interworking
•Resetting a Cisco 7600 Series Ethernet Services 20G Line Card
For information about managing your system images and configuration files, refer to the Cisco IOS Configuration Fundamentals Configuration Guide and Cisco IOS Configuration Fundamentals Command Reference publications that correspond to your Cisco IOS software release.
For more information about some of the commands used in this chapter, see
Chapter A, "Command Summary for the Cisco 7600 Series Ethernet Services 20G Line Card," and the Cisco IOS Release 12.2 SR Command References at http://www.cisco.com/en/US/products/ps6922/prod_command_reference_list.html
Also refer to the related Cisco IOS software command reference and master index publications. For more information about accessing these publications, see the "Related Documentation" section.
Required Configuration Tasks
As of Cisco IOS Release 12.2SRB, there are not many features that require direct configuration on the ES20 line card. You do not need to attach to the ES20 line card itself to perform any configuration.
Identifying Slots and Subslots for the Cisco 7600 Series Ethernet Services 20G Line Card
The ES20 line card supports In-Service Software Upgrade (ISSU) with Enhanced Fast Software Upgrade (eFSU). ISSU allows for the upgrade and downgrade of Cisco IOS images at different release levels on the active and standby supervisors. ISSU procedure also applies to upgrade and downgrade of line card images. A new line card image is loaded, as necessary, when the supervisor engine software is upgraded or downgraded.
For more information, see the Cisco 7600 Series Cisco IOS Software Configuration Guide, 12.2SR at http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SR/configuration/guide/swcg.html
Configuring High-Availability Features
This section provides information about configuring high-availability features specific to the ES20 line card.
Configuring UDE on ES20 Line Cards
Unidirectional Ethernet (UDE) feature allows interfaces to operate as unidirectional links, that is, either in receive (Rx) only mode or transmit (Tx) only mode. Unidirectional Ethernet uses only one strand of fiber for either transmitting or receiving one-way traffic for Gig Ports instead of two strands of fiber for a full duplex operation.
UDLR mechanism allows a set of feeds and receivers, which are directly connected by a unidirectional link, to send datagrams as if they were all connected by a bidirectional link.
Unidirectional Routing is used in applications with a great amount of data traffic flowing in one direction and little control traffic flowing in the opposite direction.
When an interface is configured as unidirectional send-only or receive-only, the following actions take place:
•For ports configured as send-only, the port ONLY transmits data and ignores any received data. Similarly receive-only ports do not transmit data.
•UDLD is automatically disabled on the interface.
•Autonegotiation is disabled on the interface.
Restrictions and Usage Guidelines
The following restrictions apply to the UDE links on ES20 line cards:
•Uni Directional Link Routing (UDLR) is configured only on routed ports. Configure the IPv4 address on the UDLR tunnel. Each UDE can either be a switched port or a routed port and has a separate UDLR tunnel. UDLR handles bidirectional communication over the back channel.
•Configuring unidirectional links may cause STP Loops. You must configure protocols correctly to avoid problems with the network.
•For unidirectional links, you should manually configure the encapsulation and trunk mode to fixed values on each side. The protocol is not aware of the link type and will continue to try and negotiate if it is configured to do so. If both sides of a unidirectional link are negotiating, it is possible to get a trunk mismatch where the receive-only side becomes a trunk while the send-only side is access.
•For send-only unidirectional links, switches cannot receive any CDP information about neighbors and VLAN mismatches cannot be detected.
•VTP will not work if the VTP server is downstream of the unidirectional link. VTP pruning on send-only unidirectional links should preferably be disabled.
•Dot1x is incompatible with ULDR.
•If the link between a switch and a host is made unidirectional, IGMP snooping will not work because either the host will not receive IGMP queries from the switch or the switch will not receive IGMP reports from the host.
•If two network devices are connected by a unidirectional link, then ARP requests and the response mechanism will not work. Additionally, static entries need to be created for proper functionality of protocols depending on such a mechanism.
•Link Detection does not work on unidirectional interfaces.
•Unidirectional Ethernet with EtherChannel configuration is not supported on ES20 line cards.
•Receive-only transceivers are not supported.
•UDE is only supported on a single fiber .
•ISIS does not work with UDE/UDLR.
•Auto-rp discovery packets are not received on the UDE receive-only port if UDE is configured with SVI. UDE links configured on routed ports do not have this issue.
•The loopback mac command should not be configured explicitly when UDE is configured on an ES20 port. Similarly UDE should not be configured if loopback mac is configured on an ES20 port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface
4. unidrectional {send-only | receive-only}
5. ip-address ip_address mask
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface
Example:
Router(config)# interface
tengigabitethernet 1/0/0
|
Enters interface mode.
|
Step 4
|
unidirectional {send-only |
receive-only}
Example:
Router(config-if)# unidirectional
send-only
or
Router(config-if)# unidirectional
receive-only
|
Configures the interface as a unidirectional send-only or a unidirectional receive-only link.
Note To enable UDE, a link can be configured either as send-only or as receive-only, but not both.
|
Step 5
|
ip-address {ip_address mask}
Example:
Router(config-if)# ip address
11.0.0.2 255.201.220.10
|
Assigns an IP address and subnet mask to the unidirectional link.
|
Examples
Router A Configuration
In this example, interface 10.1.0.1 on Router A is configured as the send-only port while the tunnel running from 11.0.0.1 to 11.0.0.2 is configured as the receive-only interface.
interface tengigabitethernet 1/0/0
ip address 10.1.0.1 255.255.0.0
! Configure tunnel as receive-only UDLR tunnel!
tunnel destination 11.0.0.2
tunnel udlr receive-only tengigabitethernet 1/0/0
Router B Configuration
In this example, interface 10.1.0.2 on Router B is configured as the receive-only port while the tunnel running from 11.0.0.2 to 11.0.0.1 is configured as the receive-only interface.
interface tengigabitethernet 1/0/0
unidirectional receive-only
ip address 10.1.0.2 255.255.0.0
! Configure tunnel as send-only UDLR tunnel.
tunnel destination 11.0.0.1
tunnel udlr send-only tengigabitethernet 1/2
tunnel udlr address-resolution
interface GigabitEthernet1/0/0
switchport access vlan 100
ip address 10.0.1.1 255.255.255.0
Switched Port UDE Configuration
This example shows UDE configuration on a switched port with an SVI interface, with OSPF enabled.
[UDE-R1]-----UDE--------->[UDE-R2]
UDE-R1#sh run int gig2/0/5
Building configuration...
Current configuration : 165 bytes
interface GigabitEthernet2/0/5
switchport access vlan 300
UDE-R1#sh run int tunnel 10
Building configuration...
Current configuration : 150 bytes
ip address 70.10.10.1 255.255.255.0
tunnel destination 50.0.0.2
tunnel udlr receive-only Vlan300
UDE-R1#sh run int vlan 300
Building configuration...
Current configuration : 104 bytes
ip address 90.90.90.99 255.255.255.0
network 20.0.0.0 0.0.0.255 area 0
network 90.90.90.0 0.0.0.255 area 0
############ config on R2####################
UDE-R2#sh run int gig2/0/1
Building configuration...
Current configuration : 170 bytes
interface GigabitEthernet2/0/1
switchport access vlan 300
unidirectional receive-only
UDE-R2#sh run int tunnel 10
Building configuration...
Current configuration : 179 bytes
ip address 70.10.10.2 255.255.255.0
tunnel destination 50.0.0.1
tunnel udlr send-only Vlan300
tunnel udlr address-resolution
UDE-R2#sh run int vlan 300
Building configuration...
Current configuration : 82 bytes
ip address 90.90.90.90 255.255.255.0
network 30.0.0.0 0.0.0.255 area 0
network 90.90.90.0 0.0.0.255 area 0
Verification
Use the following commands to verify operation.
Command
|
Purpose
|
Router#sh interface interface-id unidirectional
Example:
Router# sh interface gigabitEthernet 2/0/5
unidirectional
Unidirectional configuration mode: send only
CDP neighbour unidirectional configuration mode: off
|
Displays information about the UDE configuration on a specific interface.
|
Configuring Unidirectional Link Detection (UDLD) on Ports with EVCs
UDLD (Unidirectional Link Detection) is a Layer 2 protocol that interacts with a Layer 1 protocol to determine the physical status of a link. At Layer 1, physical signaling and fault detection is auto-negotiated. UDLD detects the neighbor link, identifies, and disables the wrongly connected LAN ports. When you enable auto-negotiation and UDLD, Layer 1 and Layer 2 detections prevent physical and logical unidirectional connections, and malfunctioning of other protocols.
A unidirectional link occurs when the neighbor link receives the traffic transmitted by the local device, but the local device does not receive the transmitted traffic from its neighbor. If auto-negotiation is active, and one of the fiber strands in a pair is disconnected, the link is disabled. The logical link is undetermined, and UDLD does not take any action. At Layer 1, if both fibers are normal, UDLD at Layer 2 determines if the fibers are accurately connected, and traffic is relayed bidirectionally between the right neighbors. In this scenario, auto-negotiation operates in Layer 1, and the link status is unchecked.
The UDLD protocol monitors physical configuration of the cables, and detects unidirectional links of devices connected to LAN ports via Ethernet cables. When a unidirectional link is detected, UDLD disables the affected LAN port, and alerts the user.
The Cisco 7600 series router periodically transmits UDLD packets to neighboring devices on LAN ports with UDLD. If the packets are returned within a specific time frame, and there is no acknowledgement, the link is flagged as unidirectional, and the LAN port is disabled.
Restrictions and Usage Guidelines
Follow these restrictions and usage guidelines while configuring UDLD on ports with EVCs:
•You can configure UDLD only on a port.
•To identify and disable the unidirectional links, devices at both ends must support UDLD.
•Service bridge domain should be available on the router.
•Any of the supported EVC encapsulation can be configured.
•Cisco IOS Release 15.1(1)S supports EVC port-channels.
Note If UDLD is enabled on an EVC port with service type connect or xconnect and encapsulation type default or untagged, the port is disabled.
For more information on UDLD, see the Cisco 7600 Series Cisco IOS Software Configuration Guide, 12.2SR at the following URL:
http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SR/configuration/guide/udld.html
Configuring UDLD Aggressive Mode
As UDLD aggressive mode is disabled by default, you can configure UDLD aggressive mode in point-to-point links between network devices that support UDLD aggressive mode.
When UDLD aggressive mode is enabled:
•A port on a bidirectional link with UDLD neighbor relationship does not receive UDLD packets.
•UDLD tries to reestablish the connection with the neighbor.
•After eight failed retries, the port is disabled.
To prevent spanning tree loops, ensure that you set the non aggressive UDLD value interval to 15 seconds. This disables the unidirectional link before blocking the port transitions in the forwarding state (with default spanning tree parameters).
The benefits of enabling UDLD aggressive mode are:
•Port on one side of a link is disabled (both Tx and Rx).
•One side of a link is enabled even if the other side of the link fails.
In the above scenario, UDLD aggressive mode disables the port that prevents traffic from being discarded.
If UDLD...
|
Then the...
|
Detects a unidirectional link,
|
interface with its EVCs are disabled.
|
Is enabled on a port with an EVC bridge-domain, and encapsulation value set to default or untagged,
|
selected EVC is not shut down, and prevents the port from being disabled.
|
Enabling UDLD on Ports With EVC Configured
SUMMARY STEPS
1. enable
2. configure terminal
3. {udld | no udld} enable aggressive
4. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
Example:
|
Enables privileged EXEC mode. Enter your password if prompted.
|
Step 2
|
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
{udld | no udld} enable aggressive
Example:
Router# udld enable aggressive
|
Enables the UDLD aggressive mode.
|
Step 4
|
exit
|
Exits configuration mode.
|
SUMMARY STEPS
1. interface type/ slot/ port
2. {udld port | no udld port } aggressive
3. show udld type/ slot/ port
4. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
interface type/ slot/ port
Example:
Router(config)# gigethernet 1/0/0
|
Selects the LAN port to configure.
|
Step 2
|
{udld port | no udld port } aggressive
Example:
Router(config-if)# udld port aggressive
Router(config-if)# no udld port
aggressive
|
Enables a UDLD on a specific LAN port. Enter the aggressive keyword to enable aggressive mode. On a fiber-optic LAN port, this command overrides the udld enable global configuration command.
Or
Disables a UDLD on a non- fiber-optic LAN port.
|
Step 3
|
show udld type/ slot/ port
Example:
Router# show udld 1/0/0
|
Verifies the configuration.
|
Step 4
|
exit
|
Exits the configuration mode.
|
Disabling Individual UDLD on Ports With EVC Configured
SUMMARY STEPS
1. interface type/ slot/ port
2. {udld port | no udld port } disable
3. show udld type/ slot/ port
4. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
interface type/ slot/ port}
Example:
Router(config)# gigethernet 1/0/0
|
Selects the LAN port to configure.
|
Step 2
|
{udld port | no udld port } disable
Example:
Router(config-if)# udld port disable
Router(config-if)# no udld port disable
|
Disables a UDLD on the LAN port.
Or
Reverts to the udld enable global configuration command setting.
Note This command is supported only on fiber-optic LAN ports.
|
Step 3
|
show udld type/ slot/ port
Example:
Router# show udld 1/0/0
|
Verifies the configuration.
|
Step 4
|
exit
|
Exits the configuration mode.
|
Resetting Disabled UDLD on Ports With EVC Configured
SUMMARY STEPS
1. udld reset
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
udld reset
Example:
|
Resets all the LAN ports disabled by UDLD.
|
Example
This example displays the global configuration values at router 1:
Router(config)#udld enable
This example displays the ESM20 port at router 1:
Router(config)# inter gi 2/0/1
Router(config-if)# udld port aggressive
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 100
Router(config-if-srv)# rewrite ingess tag translate 1-to2 dot1q 5 second-dot1q 5 symmetric
Router(config-if-srv)# bridge-domain 100
This example displays the configuration for a port that is part of a port channel:
Router(config)#interface Port-channel1
Router(config-if)#no ip address
Router(config-if)#service instance 1 ethernet
Router(config-if)#encapsulation untagged
Router(config-if)#bridge-domain 100
Router(config)#interface GigabitEthernet3/0/13
Router(config-if)#ip arp inspection limit none
Router(config-if)#no ip address
Router(config-if)#udld port aggressive
Router(config-if)#no mls qos trust
Router(config-if)#channel-group 1 mode on
Verification
Use the show udld and show udld interface commands to verify the UDLD configuration:
Router(config)show udld gi 3/0/13
---Port enable administrative configuration setting: Enabled / in aggressive mode
Port enable operational state: Enabled / in aggressive mode
Current bidirectional state: Bidirectional
Current operational state: Advertisement - Single neighbor detected
Current neighbor state: Bidirectional
Neighbor echo 1 device: 0FF71CA880
Neighbor echo 1 port: Gi1/3
ISSU Support for ES20 Line Card
The ES20 line card supports In-Service Software Upgrade (ISSU) with Enhanced Fast Software Upgrade (eFSU). ISSU allows for the upgrade and downgrade of Cisco IOS images at different release levels on the active and standby supervisors. ISSU procedure also applies to upgrade and downgrade of line card images. A new line card image is loaded, as necessary, when the supervisor engine software is upgraded or downgraded.
Configuring IEEE 802.1ag-2007 Compliant CFM
A Metro Ethernet network consists of networks from multiple operators supported by one service provider and connects multiple customer sites to form a virtual private network (VPN). Networks provided and managed by multiple independent service providers have restricted access to each other's equipment. Because of the diversity in these multiple-operator networks, failures must be isolated quickly. As a Layer 2 network, Ethernet must be capable of reporting network faults at Layer 2.
IEEE 802.3ah is a point-to-point and per- physical- wire OAM protocol that detects and isolates connectivity failures in the network. IEEE 802.1ag draft 8.1 Metro Ethernet Connectivity Fault Management (CFM) incorporates several OAM facilities that allow you to manage Metro Ethernet networks, including an Ethernet continuity check, end-to-end Ethernet traceroute facility using Linktrace message (LTM), Linktrace reply (LTR), Ethernet ping facility using Loopback Message (LBM), and a Loopback Reply (LBR). These Metro Ethernet CFM protocol elements quickly identify problems in the network.
Ethernet Connectivity Fault Management (CFM) is an end-to-end per-service-instance Ethernet layer operations, administration, and maintenance (OAM) protocol. It includes proactive connectivity monitoring, fault verification, and fault isolation for large Ethernet metropolitan-area networks (MANs) and WANs. Connectivity Fault Management (CFM) is the indispensable capability that service providers require to deploy large-scale, multivendor Metro Ethernet services. This feature upgrades the implementation of CFM to be compliant with the IEEE 802.1ag with the current standard, 802.1ag-2007 and implementation of CFM over L2VFI (Layer 2 Virtual Forwarding Instance Information), cross connect, EVC, and Switchport.
Key CFM mechanisms are:
•Maintenance domains (MDs) that break up the responsibilities for the network administration of a given end-to-end service.
•Maintenance associations (MAs) that monitor service instances within a specified MD.
•Maintenance points, (MPs or MIPs), such as Maintenance end points (MEP's) that transmit and receive CFM protocol messages, and MIPs that catalog information received from MEPs, and respond to Linktrace and Loopback messages.
•Protocols (Continuity Check, Loopback, and Linktrace) that are used to manage faults.
For more information on CFM, see Cisco IOS Carrier Ethernet Configuration Guide, Release 12.2SR at
http://www.cisco.com/en/US/docs/ios-xml/ios/cether/configuration/12-2sr/ce-12-2sr-book.html
For more information about the commands used in this section, see Cisco IOS Ethernet Command Reference Guide at http://www.cisco.com/en/US/docs/ios/cether/command/reference/ce_book.html
Supported Line Cards
Use the ethernet cfm global command to enable the CFM D8.1 feature on the following line cards:
•ES20 and ES40:Switchports, routed ports, and EVC BD.
•SIP400:Routed ports, and Layer 2 Virtual Forwarding Instance ( L2VFI).
•SIP600:Switchports, and routed ports.
•67xx: Switchports, and routed ports.
The complete support matrix for the CFM D8.1 feature is given in Table 2-1and Table 2-2.
Note Table 2-1 and Table 2-2 are part of the same table. The table is split into two for better readability.
Table 2-1 Supported Matrix1
Line card
|
CFM on
Switchport or CFM on Switch + BD for SVI Based EoMPLS for VPLS
|
CFM on
Routed Port
|
CFM
on
Service Instance with BD
for SVI based EoMPLS
for VPLS
|
CFM
on
Switchport
or
CFM on Switch + BD
|
WS-SUP720-3BXL
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-SUP720-3B
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
RSP720-3CXL-10GE
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
RSP720-3C-10GE
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
RSP720-3CXL-GE
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
RSP720-3C-GE
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-SUP32-GE-3B
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-SUP32-10GE-3B
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6148A
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6148-FE-SFP
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6516A-GBIC
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6524-100FX-MM
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6548-RJ-21
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6548-GE-TX
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6704-10GE
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6708-10G-3C
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6708-10G-3CXL
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6724-SFP
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6748-GE-TX
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
WS-X6748-SFP
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Applicable
|
Up MEP
Down MEP
Port MEP
|
SIP-400 + V2 GE SPAs
or
SIP-400 + WAN SPA
|
Not Supported
( SIP-400 + WAN SPA
or
SIP-400 + v2 GE SPA as uplink)
No Transparency with CFM Enabled on the box
|
Not Supported
|
Not Supported
|
Not Supported
|
SIP-400 + V2 FE SPA
or
SIP-400 + WAN SPA
|
Not Supported
SIP-400 + WAN SPA
or
SIP-400 + V2 GE SPA as uplink
No Transparency with CFM Enabled on the box
|
Not Supported
|
Not Supported
|
Not Supported
|
SIP-600 + V2 GE
or
V2 10GE SPA
or
WAN SPA
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Not Supported
|
Up MEP
Down MEP
Port MEP
|
ES20-GE
or
ES20-10GE
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Up MEP
Down MEP
|
Up MEP
Down MEP
Port MEP
|
ES+ GE /10GE
|
Up MEP
Down MEP
Port MEP
|
Down MEP
Port MEP
|
Up MEP
Down MEP
|
Up MEP
Down MEP
Port MEP
|
Table 2-2 Supported Matrix 2
Line card
|
CFM
on
Service Instance + xconnect
|
CFM
on
Service Instance + BD
for SVI based EoMPLS
for VPLS
|
CFM
on
L2-VFI
|
CFM
on
Routed Port
|
WS-SUP720-3BXL
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-SUP720-3B
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
RSP720-3CXL-10GE
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
RSP720-3C-10GE
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
RSP720-3CXL-GE
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
RSP720-3C-GE
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-SUP32-GE-3B
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-SUP32-10GE-3B
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6148A
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6148-FE-SFP
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6516A-GBIC
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6524-100FX-MM
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6548-RJ-21
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6548-GE-TX
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6704-10GE
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6708-10G-3C
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6708-10G-3CXL
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6724-SFP
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6748-GE-TX
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
WS-X6748-SFP
|
Not Applicable
|
Not Applicable
|
Not Applicable
|
Down MEP
Port MEP
|
SIP-400 + V2 GE SPAs
or
SIP-400 + WAN SPA
|
Not Supported
No Transperency
|
Not Supported
No Transperency
|
Down MEP
|
Down MEP
Port MEP
|
SIP-400 + V2 FE SPA
or
SIP-400 + WAN SPA
|
Not Supported
|
Not Supported
No Transperency
|
Down MEP
|
Down MEP
Port MEP
|
SIP-600 + V2 GE
or
V2 10GE SPA
or
WAN SPA
|
Not Supported
|
Not Supported
|
Down MEP
|
Down MEP
Port MEP
|
ES20-GE
or
ES20-10GE
|
Up MEP
Down MEP
|
Up MEP
Down MEP
|
Down MEP
|
Down MEP
Port MEP
|
ES+ GE /10GE
|
Up MEP
Down MEP
|
Up MEP
Down MEP
|
Down MEP
|
Down MEP
Port MEP
|
Scalable Limits
Table 2-3 maps the supported interfaces with the CFM points and their scalability values:
Table 2-3
Interfaces
|
CFM Points
|
Scalability Values
|
Switchports and EVC Bridge Domain (BD)
|
Up MEP Down MEP MIP Port MEP
Remote MEP
|
8K MEPs per box (4K MEPs per LC) at 10 sec CC interval or higher CC intervals. 1K MEPs at 1 sec CC interval or higher CC intervals. 100 MEPs at 100 msec CC interval or higher CC intervals.
|
Routed Ports
|
Down MEP Port MEP
Remote MEP
|
1K MEPs at 1 sec CC interval or higher CC intervals. 100 MEPs at 100 msec CC interval or higher CC intervals. 4K MEPs per box at 10 sec CC interval or higher CC intervals.
|
Scalable Limits
Restrictions and Usage Guidelines
When configuring CFM D8.1, follow these restrictions and usage guidelines:
• Hardware EoMPLS is not supported.
•Supports interworking between routed ports, switch ports, and EVC BD.
•CFM D8.1 QinQ configuration on a subinterface is not supported.
•You can ping or traceroute to a MEP where Continuity Check (CC) is disabled. However, you cannot use ping and traceroute for an down MEP on a STP blocked port configured on either a supervisor port or a LAN port.
•CFM is not supported with a EVC manual load balancing configuration on a EVC bridge-domain and a EVC cross-connect interface.Though configuration is not rejected, the feature may not work as expected.
•With lower CC intervals, CC packets are transmitted in bursts. Ensure that you appropriately configure the MLS rate limiters to avoid flapping of remote MEPs.
•Ping and traceroute on trunk ports for Port-MEP's and down MEP's configured on native vlan is supported only on ES20 and ES40 line cards.
•In 802.3ah E-OAM, the remote-loopback TEST status is not retained across switchovers. The remote loopback works with a longer OAM timeout value that is greater than 10 seconds.
•Migrating CFM D1.0 to D8.1 works with a reduced scale of 2k MEPs on the routed ports. If there is an EVC service configured within a domain in D1, the link fails while migrating to D8.1. To avoid this, ensure that you configure the VLAN and the EVC within the domain in D1, as shown in the next example.
Sample D1 configuration during migration:
ethernet cfm domain 2OUT493 level 2 direction outward
Sample configuration to avoid the migration issue:
ethernet cfm domain 2OUT493 level 2 direction outward
SUMMARY STEPS (COMMON CONFIGURATIONS FOR EVC, SWITCHPORT, AND ROUTED PORTS)
1. enable
2. configure terminal
3. ethernet cfm domain domain-name level level-id
4. service { short-ma-name | number MA-number | vlan-id primary-vlan-id | vpn-id vpn-id } {vlan vlan-id | port | evc evc-name } direction {up | down}
5. continuity-check
6. continuity-check {interval CC-interval }
7. end
DETAILED STEPS (COMMON CONFIGURATIONS FOR EVC, SWITCHPORT, AND ROUTED PORTS)
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
ethernet cfm domain domain-name
level level-id
Example:
PE1(config)#ethernet cfm domain L4
level 4
|
Defines a CFM maintenance domain at a particular maintenance Level. It sets the router into config-ecfm configuration mode, where parameters specific to the maintenance domain can be set.
|
Step 4
|
service { short-ma-name | number
MA-number | vlan-id primary-vlan-id
| vpn-id vpn-id } {vlan vlan-id |
port | evc evc-name } direction {up
| down}
Example:
Router(config-ecfm)#service s41 evc
41 vlan 41
|
Configures the maintenance association and sets a universally unique ID for a customer service instance (CSI) or the maintenance association number value, primary VLAN ID and VPN ID within a maintenance domain in Ethernet connectivity fault management (CFM) configuration mode or the direction. The default value for direction is up.
|
Step 5
|
continuity-check
Example:
Router(config-ecfm-srv)#continuity-c
heck
|
Configures the transmission of continuity check messages (CCMs), in Ethernet connectivity fault management (CFM) service configuration mode.
|
Step 6
|
continuity-check {interval
CC-interval }
Example:
Router(config-ecfm-srv)#continuity-c
heck interval 10s
|
Configures the per-service parameters and sets the interval at which Continuity Check Messages are transmitted.
•The supported interval values are:
–100ms 100 ms
–10m 10 minutes
–10ms 10 ms
–10s 10 seconds
–1m 1 minute
–1s 1 second
–3.3ms 3.3 ms
–The default is 10seconds.
|
Step 7
|
end
|
Exits the interface.
|
SUMMARY STEPS TO CONFIGURE CFM MEP AND MIP ON A EVC
1. enable
2. configure terminal
3. interface
4. service instance {id} ethernet {evc-name}
5. encapsulation {encapsulation-type}
6. bridge-domain {number}
7. cfm mep domain {domain-name} mpid {id}
8. cfm mip level {level}
9. cfm encapsulation
10. end
DETAILED STEPS TO CONFIGURE CFM MEP AND MIP ON A EVC
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface
Example:
Router(config)# interface
tengigabitethernet 1/0/0
|
Enters the interface mode.
|
Step 4
|
service instance {id} ethernet
{evc-name}
Example:
Router(config-interface)#service
instance 41 ethernet 41
|
Configures the service instance and the ethernet virtual connections.
|
Step 5
|
encapsulation {encapsulation-type}
Example:
Router(config-if-srv)#encapsulation
dot1q 41
|
Configures the encapsulation type.
|
Step 6
|
bridge-domain {number}
Example:
Router(config-if-srv)#bridge-domain
41
|
Configures the bridge domain values.The default domain number is zero; this is the domain number required when communicating to IEEE bridges that do not support this domain extension.
|
Step 7
|
cfm mep domain {domain-name} mpid
{id}
Example:
Router(config-if-srv)#cfm mep domain
L4 mpid 4001
|
Configures the MEP domain and the ID.
|
Step 8
|
cfm mip level {level}
Example:
PE1(config-if-srv)#cfm mip level 4
|
Automatically creates a MIP in the Ethernet interface and sets the maintenance level number. The acceptable range of maintenance levels is 0-7.
|
Step 9
|
cfm encapsulation
Example:
PE1#(config-if-srv)#cfm
encapsulation dot1q 100 second-dot1q
200
|
Configures the CFM encapsulation type.
|
Step 10
|
end
Example:
PE1#(config-if-srv)#exit
|
Exits the service instance interface mode.
|
SUMMARY STEPS TO CONFIGURE CFM MEP AND MIP ON A SWITCH PORT
1. enable
2. configure terminal
3. interface
4. switchport
5. switchport mode {trunk}
6. ethernet cfm mep domain domain-name mpid mpid {vlan vlan-id | port}
or
7. ethernet cfm mip level {0 to 7} {vlan vlan-id }
8. end
DETAILED STEPS TO CONFIGURE CFM MEP AND MIP ON A SWITCHPORT
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface
Example:
Router(config)# interface
tengigabitethernet 1/0/0
|
Enters the interface mode.
|
Step 4
|
switchport
Example:
Router(config-interface)#switchport
|
Configures the Layer 3 mode into Layer 2 mode for Layer 2 configuration.
|
Step 5
|
switchport mode {trunk}
Example:
Router(config-if)#switchport mode
trunk
|
Configures a trunking VLAN Layer 2 interface.
|
Step 6
|
ethernet cfm mep domain domain-name
mpid mpid {vlan vlan-id | port}
Example:
Router(config-if)#ethernet cfm mep
domain L4 mpid 1 vlan 41
|
Sets a port as internal to a maintenance domain, and defines it as a maintenance endpoint. It sets the device into config-if-ecfm-mep configuration mode, where parameters specific to the MEP can bet set.
•domain-name: String, maximum length of 43 characters
•mpid: 1 to 8191
•vlan-id: 1 to 4094
•port: a port MEP, untagged and valid only for outward direction to configure MEP with no VLAN association.
|
or
|
Step 7
|
ethernet cfm mip level {0 to 7}
{vlan vlan-id }
Example:
PE1(config-if)#ethernet cfm mip
level 4 vlan 10
|
Sets a port as internal to a maintenance domain, and defines it as a maintenance intermediate point.
|
Step 8
|
end
Example:
PE1(config-if)#end
|
Exits the service instance interface mode.
|
SUMMARY STEPS TO CONFIGURE CFM MEP ON A ROUTED PORT
1. enable
2. configure terminal
3. interface gigabitethernet
4. no ip address
5. no mls qos trust
6. ethernet cfm mep domain domain-name mpid mpid {vlan vlan-id}
7. interface gigabitethernet
8. encapsulation dot1Q vlan-id
9. end
DETAILED STEPS TO CONFIGURE CFM MEP ON A ROUTED PORT
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
Example:
Router(config)# interface
tengigabitethernet 1/0/0
|
Enters the interface mode.
|
Step 4
|
no ip address
Example:
Router(config-interface)# no ip
address
|
Removes the configured IP address or disables IP processing.
|
Step 5
|
no mls qos trust
Example:
Router(config-if)#no mls qos trust
|
Configures the multilayer switching (MLS) quality of service (QoS) port trust state and traffic by examining the class of service (CoS) or differentiated services code point (DSCP) value. Use the no form of this command to return a port to its untrusted state.
|
Step 6
|
ethernet cfm mep domain domain-name
mpid mpid {vlan vlan-id }
Example:
Router(config-if)#ethernet cfm mep
domain routed mpid 4001 vlan 4001
|
Sets a port as internal to a maintenance domain, and defines it as a maintenance end point. It sets the device into config-if-ecfm-mep configuration mode, where parameters specific to the MEP can be set.
•domain-name: String, maximum length of 43 characters
•mpid: 1 to 8191
•vlan-id: 1 to 4094
|
Step 7
|
interface gigabitethernet
subinterface
Example:
Router(config)# interface
tengigabitethernet subinterface
1/0/0.1
|
Configures the subinterface.
|
Step 8
|
encapsulation dot1Q vlan-id
Example:
PE1(config-if)#encapsulation dot1Q
vlan-id 10
|
Configures the IEEE 802.1Q encapsulation of traffic on a specified subinterface in a virtual LAN (VLAN) on a routed port. The acceptable range of a VLAN is from 1 to 4094.
|
Step 9
|
end
Example:
PE1(config-if)#end
|
Exits the service instance interface mode.
|
Verification
Use the following commands to verify operation.
Command
|
Purpose
|
show ethernet cfm maintenance-points local
|
Displays the local maintenance points.
|
show ethernet cfm maintenance-points remote
|
Displays the remote maintenance end points.
|
show ethernet cfm errors
|
Displays all the CFM Continuity Check error conditions logged on the device.
|
show ethernet cfm mpdb
|
Displays the remote maintenance points.
|
The following example shows a configuration of MEP in a switchport:
ethernet cfm domain L4 level 4
service s41 evc 41 vlan 41
int TenGigabitEthernet2/0/0
ethernet cfm mep domain L4 mpid 1 vlan 41
The following example shows a configuration of MIP in a switchport:
ethernet cfm domain L4 level 4
service s41 evc 41 vlan 41
int TenGigabitEthernet2/0/0
ethernet cfm mip level 4 vlan 41
The following example shows a configuration of MEP in a EVC bridge domain:
ethernet cfm domain L4 level 4
service s41 evc 41 vlan 41
int TenGigabitEthernet4/0/0
service instance 41 ethernet 41
cfm mep domain L4 mpid 4001
The following example shows a configuration of MIP in a EVC bridge domain:
ethernet cfm domain L4 level 4
service s41 evc 41 vlan 41
int TenGigabitEthernet4/0/0
service instance 41 ethernet 41
The following example shows a configuration of MEP on a routed port:
ethernet cfm domain routed level 5
service s2 evc 2 vlan 2 direction down
interface GigabitEthernet8/0/0
ethernet cfm mep domain routed mpid 4001 vlan 4001
interface GigabitEthernet8/0/0.10
The following example shows CFM configuration over a EVC with cross connect in the global domain configuration mode:
ethernet cfm domain L6 level 6
The following example shows CFM configuration over a EVC with cross connect in the interface configuration mode:
ethernet cfm domain L6 level 6
service instance 100 ethernet 100
xconnect 3.3.3.3 1 encapsulation mpls
cfm mep domain L6 mpid 602
!
The following example shows CFM configuration on a L2VFI:
Router(config)# l2 vfi vfi2 manual evc2
Router(config-vfi)# vpn id 2
Router(config-vfi)# bridge-domain 2 vlan
Router(config-vfi)# no shut
Router(config-vfi)# neighbor 5.5.5.5 encap mpls
Router(config-vfi-neighbor)# interface vlan 2
Router(config-if)# xconnect vfi vfi2
Router(config-if)# no shut
Router(config-if)# ethernet cfm domain vik-vfi-ofm level 4
Router(config-ecfm)# service vlan-id 2 evc evc2 vlan 2 direction down
Router(config-ecfm-srv)# continuity-check
Router(config-ecfm-srv)# continuity-check interval 10s
Support for IEEE 802.1ad
Provider networks handle traffic from a large number of customers. It is important that one customer's traffic is isolated from the other customer's traffic. IEEE 802.1ad implements standard protocols for double tagging of data. The data traffic coming from the customer side are double tagged in the provider network where the inner tag is the customer-tag (C-tag) and the outer tag is the provider-tag (S-tag). The control packets are tunneled by changing the destination MAC address in the provider network.
Cisco 7600 series routers already support VLAN double tagging through a feature called QinQ. 802.1ad is the standardized version of QinQ. It also extends the support for Layer 2 Protocol Tunneling Protocol (L2PT). By offering transparent Layer 2 connectivity, the service provider does not get involved in the customer's Layer 3 network. This makes provisioning and maintenance simple, and reduces the operational cost.
Prerequisites for IEEE 802.1ad
•The ethertype should be programmable per port.
Restrictions for IEEE 802.1ad
Follow these restrictions and guidelines when you configure 802.1ad:
•The l2protocol forward command is available only on the main interface of switchports and L3 ports. The command is not available on the subinterfaces. All the subinterfaces on a port inherit the behavior from the main interface. The l2protocol forward command is also available on EVC service instance.
•The l2protocol peer and l2protocol drop commands are not supported.
•The l2protocol forward command on a main interface and on EVCs supports only cdp, dtp, vtp, stp, and dot1x.
•You cannot configure Dot1ad if custom ethertype is configured on port.
•802.1ad is supported on the following port types:
Port
|
EVC
|
Switchport
|
Layer Interfaces
|
C-UNI
|
Ethertype 0x8100
C-VLAN BPDU
Any EVCs
|
Ethertype 0x8100
C-VLAN BPDU
Trunk or Access
|
Ethertype 0x8100
C-VLAN BPDU
|
S-UNI
|
Ethertype 0x88a8
S-VLAN BPDU (Only Encapsulation default is supported)
|
Ethertype 0x88a8
S-VLAN BPDU
Access only
|
Not supported
|
S-NNI
|
Ethertype 0x88a8
S-VLAN BPDU
Any EVC
|
Ethertype 0x88a8
S-VLAN BPDU
Trunk
|
Ethertype 0x88a8
S-VLAN BPDU
Trunk
|
Information About IEEE 802.1ad
To configure IEEE 802.1ad support, you should understand the following concepts:
•How Provider Bridges Work
•Guidelines for Handling BPDU
•Interoperability of QinQ and Dot1ad
How Provider Bridges Work
Provider bridges pass the network traffic of many customers, and each customer's traffic flow must be isolated from one another. For the Layer 2 protocols within customer domains to function properly, geographically separated customer sites must appear to be connected through a LAN, and the provider network must be transparent.
The IEEE has reserved 33 Layer 2 MAC addresses for customer devices operating Layer 2 protocols. If a provider bridge uses these standard MAC addresses for its Layer 2 protocols, the customers' and service provider's Layer 2 traffic will be mixed together. Provider bridges solve this traffic-mixing issue by providing Layer 2 protocol data unit (PDU) tunneling for customers using a provider bridge (S-bridge) component and a provider edge bridge (C-bridge) component. Figure 2-1 shows the topology.
Figure 2-1
Layer 2 PDU Tunneling
S-Bridge Component
The S-bridge component is capable of inserting or removing a service provider VLAN (S-VLAN) for all traffic on a particular port. IEEE 802.1ad adds a new tag called a Service tag (S-tag) to all the ingress frames from a customer to the service provider.
The VLAN in the S-tag is used for forwarding the traffic in the service provider network. Different customers use different S-VLANs, which results in each customer's traffic being isolated. In the S-tag, provider bridges use an Ethertype value that is different from the standard 802.1Q Ethertype value, and do not understand the standard Ethertype. This difference makes customer traffic tagged with the standard Ethertype appear as untagged in the provider network so customer traffic is tunneled in the port VLAN of the provider port. The 802.1ad service provider user network interfaces (S-UNIs) and network to network interfaces (NNIs) implement the S-bridge component.
For example, a VLAN tag has a VLAN ID of 1, the C-tag Ethertype value is 8100 0001, the S-tag Ethertype value is 88A8 0001, and the class of service (CoS) is zero.
-------------------------------------------------------
-----------------------------------------------
0x8100 | Priority bits | CFI | C-VLAN-ID 0x88A8 | Priority bits | 0 | S-VLAN-ID
-------------------------------------------------------
-----------------------------------------------
C-Bridge Component
All the C-VLANs entering on a UNI port in an S-bridge component are provided the same service (marked with the same S-VLAN). Although, C-VLAN components are not supported, a customer may want to tag a particular C-VLAN packet separately to differentiate between services. Provider bridges allow C-VLAN packet tagging with a provider edge bridge, called the C-bridge component of the provider bridge. C-bridge components are C-VLAN aware and can insert or remove a C-VLAN 802.1Q tag. The C-bridge UNI port is capable of identifying the customer 802.1Q tag and inserting or removing an S-tag on the packet on a per service instance or C-VLAN basis. A C-VLAN tagged service instance allows service instance selection and identification by C-VLAN. The 802.1ad customer user network interfaces (C-UNIs) implement the C-component.
MAC Addresses for Layer 2 Protocols
Customers' Layer 2 PDUs received by a provider bridge are not forwarded, so Layer 2 protocols running in customer sites do not know the complete network topology. By using a different set of addresses for the Layer 2 protocols running in provider bridges, IEEE 802.1ad causes customers' Layer 2 PDUs entering the provider bridge to appear as unknown multicast traffic and forwards it on customer ports (on the same S-VLAN). Customers' Layer 2 protocols can then run transparently.
Table 2-4 shows the Layer 2 MAC addresses reserved for the C-VLAN component.
Table 2-4 Reserved Layer 2 MAC Addresses for a C-VLAN Component
Assignment
|
Value
|
Bridge Group Address
|
01-80-c2-00-00-00
|
IEEE Std 802.3 Full Duplex PAUSE operation
|
01-80-c2-00-00-01
|
IEEE Std. 802.3 Slow_Protocols_Multicast address
|
01-80-c2-00-00-02
|
IEEE Std. 802.1X PAE address
|
01-80-c2-00-00-03
|
Reserved for future standardization - media access method-specific
|
01-80-c2-00-00-04
|
Reserved for future standardization - media access method- specific
|
01-80-c2-00-00-05
|
Reserved for future standardization
|
01-80-c2-00-00-06
|
Reserved for future standardization
|
01-80-c2-00-00-07
|
Provider Bridge Group Address
|
01-80-c2-00-00-08
|
Reserved for future standardization
|
01-80-c2-00-00-09
|
Reserved for future standardization
|
01-80-c2-00-00-0a
|
Reserved for future standardization
|
01-80-c2-00-00-0b
|
Reserved for future standardization
|
01-80-c2-00-00-0c
|
Provider Bridge GVRP Address
|
01-80-c2-00-00-0d
|
IEEE Std. 802.1AB Link Layer Discovery Protocol multicast address
|
01-80-c2-00-00-0e
|
Reserved for future standardization
|
01-80-c2-00-00-0f
|
Table 2-5 shows the Layer 2 MAC addresses reserved for an S-VLAN component. These addresses are a subset of the C-VLAN component addresses, and the C-bridge does not forward the provider's bridge protocol data units (BPDUs) to a customer network.
Table 2-5 Reserved Layer 2 MAC Addresses for an S-VLAN Component
Assignment
|
Value
|
IEEE Std 802.3 Full Duplex PAUSE operation
|
01-80-c2-00-00-01
|
IEEE Std. 802.3 Slow_Protocols_Multicast address
|
01-80-c2-00-00-02
|
IEEE Std. 802.1X PAE address
|
01-80-c2-00-00-03
|
Reserved for future standardization - media access method specific
|
01-80-c2-00-00-04
|
Reserved for future standardization - media access method specific
|
01-80-c2-00-00-05
|
Reserved for future standardization
|
01-80-c2-00-00-06
|
Reserved for future standardization
|
01-80-c2-00-00-07
|
Provider Bridge Group Address
|
01-80-c2-00-00-08
|
Reserved for future standardization
|
01-80-c2-00-00-09
|
Reserved for future standardization
|
01-80-c2-00-00-0a
|
Guidelines for Handling BPDU
The general BPDU guidelines are listed here:
UNI-C Ports
The guidelines pertaining to UNI-C ports are:
•VLAN-aware L2 protocols can be peered, tunneled, or dropped.
•Port L2 protocols can either be peered or dropped. They cannot be tunneled.
Table 2-6 shows the Layer 2 PDU destination MAC addresses for customer-facing C-bridge UNI ports, and how frames are processed.
Table 2-6 Layer 2 PDU Destination MAC Addresses for Customer-Facing C-Bridge UNI Ports
Assignment
|
Protocol
|
Significance on C-UNI Port
|
Default Action
|
01-80-C2-00-00-00
|
Bridge Group Address (End-to-End BPDUs)
|
BPDU
|
Peer
|
01-80-C2-00-00-01
|
802.3X Pause Protocol
|
BPDU
|
Drop
|
01-80-C2-00-00-02
|
Slow Protocol address: 802.3ad LACP, 802.3ah OAM, CDP Pagp, VTP, DTP, UDLD
|
BPDU
|
Peer
|
01-80-C2-00-00-03
|
802.1X
|
BPDU
|
May peer
|
01-80-C2-00-00-04
|
Reserved for future media access method
|
None
|
Drop
|
01-80-C2-00-00-05
|
Reserved for future media access method
|
None
|
Drop
|
01-80-C2-00-00-06
|
Reserved for future bridge use
|
None
|
Drop
|
01-80-C2-00-00-07
|
Reserved for future bridge use
|
None
|
Drop
|
01-80-C2-00-00-08
|
Provider STP (BPDU)
|
None
|
Drop
|
01-80-C2-00-00-09
|
Reserved for future bridge use
|
None
|
Drop
|
01-80-C2-00-00-0A
|
Reserved for future bridge use
|
None
|
Drop
|
01-80-C2-00-000-0B
|
Reserved for future S-bridge purpose
|
None
|
Drop
|
01-80-C2-00-00-0C
|
Reserved for future S-bridge purpose
|
None
|
Drop
|
01-80-C2-00-00-0D
|
Provider Bridge GVRP address
|
None
|
Drop
|
01-80-C2-00-00-0E
|
802.1ab-LLDP
|
BPDU
|
May peer
|
01-80-C2-00-00-0F
|
Reserved for future C-bridge or Q-bridge use
|
None
|
Drop
|
01-80-C2-00-00-10
|
All bridge addresses
|
Read Data
|
Snoop if implemented. Else, discard
|
01-80-C2-00-00-20
|
GMRP
|
Data/BPDU
|
May peer
|
01-80-C2-00-00-21
|
GVRP
|
Data/BPDU
|
May peer
|
01-80-C2-00-00-22 - 2F
|
Other GARP addresses
|
Data/BPDU
|
May peer
|
01-00-0C-CC-CC-CC
|
Cisco's CDP DTP VTP PagP UDLD (End-to-End)
|
BPDU
|
Peer
|
01-00-0C-CC-CC-CD
|
Cisco's PVST(End-to-End)
|
BPDU
|
May peer
|
UNI-S Ports
The guidelines pertaining to UNI-S ports are:
•Packets with C-Bridge addresses (00 - 0F) that are not part of S-Bridge addresses (01 - 0A) are treated as data packet (tunneled).
• VLAN-aware L2 protocols cannot be peered because the port is not C-VLAN aware. They can only be tunneled or dropped.
•Port L2 protocols can be peered, tunneled, or dropped.
Table 2-7 shows the Layer 2 PDU destination MAC addresses for customer-facing S-bridge UNI ports, and how frames are processed.
Table 2-7 Layer 2 PDU Destination MAC Addresses for Customer-Facing S-Bridge UNI Ports
Assignment
|
Protocol
|
Significance on S-UNI Port
|
Default Action
|
01-80-C2-00-00-00
|
Bridge Group Address (BPDUs)
|
Data
|
Data
|
01-80-C2-00-00-01
|
802.3X Pause Protocol
|
BPDU
|
Drop
|
01-80-C2-00-00-02
|
Slow Protocol address: 802.3ad LACP, 802.3ah
|
BPDU
|
Peer
|
01-80-C2-00-00-03
|
802.1X
|
BPDU
|
Peer
|
01-80-C2-00-00-04
|
Reserved for future media access method
|
BPDU
|
Drop
|
01-80-C2-00-00-05
|
Reserved for future media access method
|
BPDU
|
Drop
|
01-80-C2-00-00-06
|
Reserved for future bridge use
|
BPDU
|
Drop
|
01-80-C2-00-00-07
|
Reserved for future bridge use
|
BPDU
|
Drop
|
01-80-C2-00-00-08
|
Provider STP (BPDU)
|
BPDU
|
Drop (peer on NNI)
|
01-80-C2-00-00-09
|
Reserved for future bridge use
|
BPDU
|
Drop
|
01-80-C2-00-00-0A
|
Reserved for future bridge use
|
BPDU
|
Drop
|
01-80-C2-00-00-0B
|
Reserved for future bridge use
|
Data if not implemented
|
Drop
|
01-80-C2-00-00-0C
|
Reserved for future bridge use
|
Data if not implemented
|
Treat as data until implemented
|
01-80-C2-00-00-0D
|
Reserved for future GVRP address
|
Data if not implemented
|
Treat as data until implemented
|
01-80-C2-00-00-0E
|
802.1ab-LLDP
|
BPDU
|
May peer
|
01-80-C2-00-00-0F
|
Reserved for future C-bridge or Q-bridge use
|
Data
|
Data
|
01-80-C2-00-00-10
|
All bridge addresses
|
Data
|
Data
|
01-80-C2-00-00-20
|
GMRP
|
Data
|
Data
|
01-80-C2-00-00-21
|
GVRP
|
Data
|
Data
|
01-80-C2-00-00-22 - 2F
|
Other GARP addresses
|
Data
|
Data
|
01-00-0C-CC-CC-CC
|
Cisco's CDP DTP VTP PagP UDLD
|
Data
|
Data
|
01-00-0C-CC-CC-CD
|
Cisco's PVST
|
Data
|
Data
|
NNI Ports
The Dot1add NNI ports behave in the same way as the customer facing S-bridge ports, with the following exceptions:
•On NNI ports, frames received with DA 01-80-C2-00-00-08 contain STP BPDU. The frames are received and transmitted. On S-UNI ports, any such frames that are received are dropped, and none are sent.
•On NNI ports, frames received with DA 01-80-C2-00-00-02 include CDP Pagp, VTP, DTP, and UDLD protocols.
7600 Action Table
Table 2-8 lists the actions performed on a packet when the packet is received with a specified destination MAC address.
Table 2-8 7600 Action Table
MAC Address
|
Protocol
|
C-UNI Action
|
S-UNI Action
|
NNI Action
|
01-80-C2-00-00-00
|
Bridge Group Address (BPDUs)
|
Peer
|
Data
|
Data
|
01-80-C2-00-00-01
|
802.3X Pause Protocol
|
Drop
|
Drop
|
Drop
|
01-80-C2-00-00-02
|
Slow Protocol address: 802.3ad LACP, 802.3ah
|
Peer
|
Peer
|
Peer
|
01-80-C2-00-00-03
|
802.1X
|
May peer
|
May peer
|
May peer
|
01-80-C2-00-00-04
|
Reserved
|
Drop
|
Drop
|
Drop
|
01-80-C2-00-00-05
|
Reserved
|
Drop
|
Drop
|
Drop
|
01-80-C2-00-00-06
|
Reserved
|
Drop
|
Drop
|
Drop
|
01-80-C2-00-00-07
|
Reserved
|
Drop
|
Drop
|
Drop
|
01-80-C2-00-00-08
|
Provider STP (BPDU)
|
Drop
|
Drop
|
Peer
|
01-80-C2-00-00-09
|
Reserved for future bridge use
|
Drop
|
Drop
|
Drop
|
01-80-C2-00-00-0A
|
Reserved for future bridge use
|
Drop
|
Drop
|
Drop
|
01-80-C2-00-00-0B
|
Reserved for future bridge use
|
Drop
|
Data
|
Data
|
01-80-C2-00-00-0C
|
Reserved for future bridge use
|
Drop
|
Data
|
Data
|
01-80-C2-00-00-0D
|
Reserved for future GVRP address
|
Drop
|
Data
|
Data
|
01-80-C2-00-00-0E
|
802.1ab-LLDP
|
May peer
|
Data
|
Data
|
01-80-C2-00-00-0F
|
Reserved for future C-bridge or Q-bridge use
|
Drop
|
Data
|
Data
|
01-80-C2-00-00-10
|
All bridge addresses
|
Snoop if implemented. Else drop
|
Data
|
Data
|
01-80-C2-00-00-20
|
GMRP
|
May peer
|
Data
|
Data
|
01-80-C2-00-00-21
|
GVRP
|
May peer
|
Data
|
Data
|
01-80-C2-00-00-22 - 2F
|
Other GARP addresses
|
May peer
|
Data
|
Data
|
01-00-0C-CC-CC-CC
|
Cisco's CDP DTP VTP PagP UDLD
|
Peer
|
Data
|
Data
|
01-00-0C-CC-CC-CD
|
Cisco's PVST
|
May peer
|
Data
|
Data
|
Interoperability of QinQ and Dot1ad
The interoperability of QinQ and Dot1ad network enables the exchange of data frames between the networks. The 802.1Q network outer tag VLANs are mapped to the provider S-VLANs of the 802.1ad network.
Figure 2-2 illustrates the interoperability of a Dot1ad network and a QinQ network.
Figure 2-2
Interoperability of Dot1ad Network and a QinQ Network
How to Configure IEEE 802.1ad
This section contains the information about following procedures:
•Configuring a Switchport
•Configuring a Layer 2 Protocol Forward
•Configuring a Switchport for Translating QinQ to 802.1ad
•Configuring a Switchport (L2PT)
•Configuring a Customer-Facing UNI-C Port with EVC
•Configuring a Customer-Facing UNI-C Port and Switchport on NNI with EVC
•Configuring a Customer-Facing UNI-S Port with EVC
•Configuring a Layer 3 Termination
•Displaying a Dot1ad Configuration
Configuring a Switchport
A switchport can be configured as a UNI-C port, UNI-S port, or NNI port.
UNI-C Port
A UNI-C port can be configured as either a trunk port or an access port. Perform the following tasks to configure a UNI-C port as an access port for 802.1ad.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. switchport
6. switchport mode {access | trunk}
7. switchport access vlan vlan-id
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni c-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI-C port.
|
Step 5
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 6
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode access
|
Sets the interface type. In this example, it is Access.
|
Step 7
|
switchport access vlan vlan-id
Example:
router(config-if)# switchport access 1000
|
Sets the VLAN when an interface is in access mode. In this example, the VLAN is set to 1000.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Perform the following tasks to configure a UNI-C port as a trunk port for 802.1ad.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. switchport
6. switchport mode {access | trunk}
7. switchport trunk allowed vlan vlan-list
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni c-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI-C port.
|
Step 5
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 6
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode trunk
|
Sets the interface type. In this example, it is Trunk.
|
Step 7
|
switchport trunk allowed vlan vlan-list
Example:
router(config-if)# switchport trunk allowed
vlan 1000, 2000
|
Sets the list of allowed VLANs that transmit traffic from this interface in tagged format when in trunking mode.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
UNI-S Port
On a UNI-S port, all the customer VLANs that enter are provided with the same service. The port allows only access configuration. In this mode, the customer's port is configured as a trunk port. Therefore, the traffic entering the UNI-S port is tagged traffic.
Perform the following tasks to configure a UNI-S port as an access port for 802.1ad.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. switchport
5. switchport mode {access | trunk}
6. ethernet dot1ad {nni | uni {c-port | s-port}}
7. switchport access vlan vlan-id
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 5
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode access
|
Sets the interface type. In this example, it is Access.
|
Step 6
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni s-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI-S port.
|
Step 7
|
switchport access vlan vlan-id
Example:
router(config-if)# switchport access 999
|
Sets the VLAN when an interface is in access mode. In this example, the VLAN is set to 999.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
NNI Port
NNI port allows only trunk configuration. On an NNI port, the frames received on all the allowed VLANs are bridged to the respective internal VLANs.
Perform the following tasks to configure an NNI port as a trunk port for 802.1ad.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. switchport
5. switchport mode {access | trunk}
6. ethernet dot1ad {nni | uni {c-port | s-port}}
7. switchport trunk allowed vlan vlan-list
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 5
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode trunk
|
Sets the interface type. In this example, it is Trunk.
|
Step 6
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad nni
|
Configures a dot1ad NNI port or UNI port. In this example, it is an NNI.
|
Step 7
|
switchport trunk allowed vlan vlan-list
Example:
router(config-if)# switchport trunk allowed
vlan 999
|
Sets the list of allowed VLANs that transmit traffic from this interface in tagged format when in trunking mode.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to configure a UNI-C port as an access port. In this example, all the frames that are received are bridged to one internal VLAN 1000. The transmitted frames do not have the access VLAN Dot1q tag.
router# configure terminal
router(config)#interface gig2/1
router(config-if)#ethernet dot1ad uni c-port
router(config-if)#switchport
router(config-if)#switchport mode access
router(config-if)#switchport access vlan 1000
The following example shows how to configure a UNI-C port as a trunk port. In this example, all the frames that are received on all allowed VLANs (1000 and 2000) are bridged to the respective internal VLANs. The transmitted frames have the respective internal VLAN Dot1q tag.
router# configure terminal
router(config)# interface gig2/1
router(config-if)# ethernet dot1ad uni c-port
router(config-if)# switchport
router(config-if)# switchport mode trunk
router(config-if)# switchport access vlan 1000, 2000
The following example shows how to configure a UNI-S port. In this example, all the frames that are received are bridged to one internal VLAN (999). The transmitted frames do not have the access VLAN Dot1q tag.
router# configure terminal
router(config)#interface gig2/1
router(config-if)#switchport
router(config-if)#switchport mode access
router(config-if)#ethernet dot1ad uni s-port
router(config-if)#switchport access vlan 999
The following example shows how to configure an NNI port. Only trunk configuration is allowed on an NNI port. In this example, all the frames that are received on all the allowed VLANs (999) are bridged to the respective internal VLANs. The transmitted frames have the respective internal VLAN Dot1q tag.
router# configure terminal
router(config)#interface gig2/1
router(config-if)#switchport
router(config-if)#switchport mode trunk
router(config-if)#ethernet dot1ad nni
router(config-if)#switchport trunk allowed vlan 999
The following example shows how to configure Dot1ad on an SVI:
router# configure terminal
router(config)#interface gig2/1
router(config-if)#ethernet dot1ad nni
router(config-if)#switchport
router(config-if)#switchport mode trunk
router(config-if)#switchport trunk allowed vlan 999
router(config)#interface vlan 999
router(config-if)#ip address 1.2.3.4 255.255.0.0
Configuring a Layer 2 Protocol Forward
Perform the following tasks to configure the Layer 2 protocol forward:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. switchport access valn vlan-id
5. ethernet dot1ad {nni | uni {c-port | s-port}}
6. l2protocol [ forward] [protocol]
7. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 3/0
|
Configures an interface.
|
Step 4
|
switchport access vlan vlan-id
Example:
router(config)# switchport access vlan 500
|
Sets the VLAN when an interface is in access mode.
|
Step 5
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni s-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI S-port.
|
Step 6
|
l2 protocol [forward] [protocol]
Example:
router(config-if)# l2 protocol forward vtp
|
Processes or forwards the Layer 2 BPDUs. In this example, all the BPDUs are forwarded except VTP PDUs.
|
Step 7
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to configure a Layer 2 protocol forward:
router# configure terminal
router(config)#interface gig3/0
router(config-if)#switchport access vlan 500
router(config-if)#ethernet dot1ad uni s-port
router(config-if)#l2protocol forward vtp
Configuring a Switchport for Translating QinQ to 802.1ad
Translating a QinQ port to 802.1ad involves configuring the port connecting to QinQ port and NNI port.
Perform the following tasks to configure a port connecting to the QinQ port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. switchport mode {access | trunk}
5. switchport trunk allowed vlan vlan-list
6. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router# interface gigabitethernet 1/1
|
Configures an interface.
|
Step 4
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode trunk
|
Sets the interface type. In this example, it is Trunk.
|
Step 5
|
switchport trunk allowed vlan vlan-list
Example:
router(config-if)# switchport trunk allowed
vlan 1000
|
Sets the list of allowed VLANs that transmit traffic from this interface in tagged format when in trunking mode.
|
Step 6
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Perform the following tasks to configure an NNI port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. switchport
6. switchport mode {access | trunk}
7. switchport trunk allowed vlan vlan-list
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router# interface gigabitethernet 4/1
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad nni
|
Configures a dot1ad NNI port or UNI port. In this example, it is an NNI.
|
Step 5
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 6
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode trunk
|
Sets the interface type. In this example, it is Trunk.
|
Step 7
|
switchport trunk allowed vlan vlan-list
Example:
router(config-if)# switchport trunk allowed
vlan 999-1199
|
Sets the list of allowed VLANs that transmit traffic from this interface in tagged format when in trunking mode.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to translate a QinQ port to 802.1ad. In this example, the peer router to gig1/1 multiplexes various customer VLANs into VLAN 1000.
router# configure terminal
router(config)#interface gig1/1
router(config-if)#switchport mode trunk
router(config-if)#switchport trunk allowed vlan 1000
router# configure terminal
router(config)#interface gig4/0
router(config-if)#ethernet dot1ad nni
router(config-if)#switchport
router(config-if)#switchport mode trunk
router(config-if)#switchport trunk allowed vlan 1000,1199
Configuring a Switchport (L2PT)
Configuring the switchport for L2PT is required to tunnel the STP packets from a customer on the dot1ad network to a customer on the QinQ network.
Perform the following tasks to configure the port connecting to the customer.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. switchport
5. ethernet dot1ad {nni | uni {c-port | s-port}}
6. no l2 protocol [peer | forward] [protocol]
7. l2protocol-tunnel [cdp | stp | vtp]
8. switchport mode {access | trunk}
9. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 5
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni s-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI S-port.
|
Step 6
|
no l2 protocol [peer | forward] [protocol]
Example:
router(config-if)# no l2 protocol forward
|
Disables L2 protocol forwarding.
|
Step 7
|
l2protocol-tunnel [cdp | stp | vtp]
Example:
router(config-if)# l2protocol-tunnel stp
|
Enables protocol tunneling for STP.
|
Step 8
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode trunk
|
Sets the interface type. In this example, it is Trunk.
|
Step 9
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Perform the following tasks to configure an NNI port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. switchport
5. ethernet dot1ad {nni | uni {c-port | s-port}}
6. switchport mode {access | trunk}
7. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 5
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad nni
|
Configures a dot1ad NNI or UNI port. In this example, it is an NNI.
|
Step 6
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode trunk
|
Sets the interface type. In this example, it is Trunk.
|
Step 7
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to tunnel the STP packets from a customer on the Dot1ad network to a customer on a QinQ network:
router# configure terminal
router(config)#interface gig1/0
router(config-if)#switchport
router(config-if)#ethernet dot1ad uni s-port
router(config-if)#no l2protocol forward
router(config-if)#l2protocol-tunnel stp
router(config-if)#switchport mode access
router# configure terminal
router(config)#interface gig4/0
router(config-if)#switchport
router(config-if)#ethernet dot1ad nni
router(config-if)#switchport mode trunk
Configuring a Customer-Facing UNI-C Port with EVC
Perform the following tasks to configure a UNI-C port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. service instance id service-type
6. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
7. bridge-domain vlan-id
8. service instance id service-type
9. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
10. bridge-domain vlan-id
11. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni c-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI C port.
|
Step 5
|
service instance id service-type
Example:
router(config-if)# service instance 1 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 1.
|
Step 6
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 1-100
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 7
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 1000
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 8
|
service instance id service-type
Example:
router(config-if)# service instance 2 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 2.
|
Step 9
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 102-4094
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 10
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 500
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 11
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Perform the following tasks to configure an NNI port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. service instance id service-type
6. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
7. rewrite ingress tag pop 1 symmetric
8. bridge-domain vlan-id
9. service instance id service-type
10. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
11. rewrite ingress tag pop 1 symmetric
12. bridge-domain vlan-id
13. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni c-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI C port.
|
Step 5
|
service instance id service-type
Example:
router(config-if)# service instance 1 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 1.
|
Step 6
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 1000
second-dot1q 1-100
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 7
|
rewrite ingress tag pop 1 symmetric
Example:
router(config-if)# rewrite ingress tag pop 1
symmetric
|
Specifies the encapsulation adjustment that is to be performed on the frame ingress to the service instance.
|
Step 8
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 1000
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 9
|
service instance id service-type
Example:
router(config-if)# service instance 2 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 2.
|
Step 10
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 500
second-dot1q 102-4904
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 11
|
rewrite ingress tag pop 1 symmetric
Example:
router(config-if)# rewrite ingress tag pop 1
symmetric
|
Specifies the encapsulation adjustment that is to be performed on the frame ingress to the service instance.
|
Step 12
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 500
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 13
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to configure a customer-facing UNI port. In this example, a dot1q frame coming on VLAN 50 matches service instance 1, and on the ingress port, the rewrite command pushes the 1000 outer-vlan.
router# configure terminal
router(config)#interface gig1/1
router(config-if)#ethernet dot1ad uni c-port
router(config-if)#service instance 1 ethernet
router(config-if)#encapsulation dot1q 1-100
router(config-if)#bridge-domain 1000
router(config-if)#service instance 2 ethernet
router(config-if)#encapsulation dot1q 102-4904
router(config-if)#bridge-domain 500
router# configure terminal
router(config)#interface gig4/1
router(config-if)#ethernet dot1ad nni
router(config-if)#service instance 1 ethernet
router(config-if)#encapsulation dot1q 1000 second dot1q 1-100
router(config-if)#rewrite ingress tag pop 1 symmetric
router(config-if)#bridge-domain 1000
router(config-if)#service instance 2ethernet
router(config-if)#encapsulation dot1q 500 second dot1q 102-4904
router(config-if)#rewrite ingress tag pop 1 symmetric
router(config-if)#bridge-domain 500
Configuring a Customer-Facing UNI-C Port and Switchport on NNI with EVC
Perform the following tasks to configure a UNI-C port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. service instance id service-type
6. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
7. bridge-domain vlan-id
8. service instance id service-type
9. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
10. bridge-domain vlan-id
11. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni c-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI C port.
|
Step 5
|
service instance id service-type
Example:
router(config-if)# service instance 1 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 1.
|
Step 6
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 1-100
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 7
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 1000
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 8
|
service instance id service-type
Example:
router(config-if)# service instance 2 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 2.
|
Step 9
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 102-4094
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 10
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 500
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 11
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Perform the following tasks to configure an NNI port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. switchport
6. switchport mode {access | trunk}
7. switchport trunk allowed vlan vlan-list
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router# interface gigabitethernet 4/1
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad nni
|
Configures a dot1ad NNI port or UNI port. In this example, it is an NNI.
|
Step 5
|
switchport
Example:
router(config-if)# switchport
|
Put the interface into Layer 2 mode.
|
Step 6
|
switchport mode {access | trunk}
Example:
router(config-if)# switchport mode trunk
|
Sets the interface type. In this example, it is Trunk.
|
Step 7
|
switchport trunk allowed vlan vlan-list
Example:
router(config-if)# switchport trunk allowed
vlan 1000-500
|
Sets the list of allowed VLANs that transmit traffic from this interface in tagged format when in trunking mode.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to configure a customer-facing UNI-C port and switchport on NNI with EVC:
router# configure terminal
router(config)#interface gig1/1
router(config-if)#ethernet dot1ad uni c-port
router(config-if)#service instance 1 ethernet
router(config-if)#encapsulation dot1q 1-100
router(config-if)#bridge-domain 1000
router(config-if)#service instance 2 ethernet
router(config-if)#encapsulation dot1q 102-4904
router(config-if)#bridge-domain 500
router# configure terminal
router(config)#interface gig4/0
router(config-if)#switchport
router(config-if)#ethernet dot1ad uni
router(config-if)#switchport mode trunk
router(config-if)#switchport allowed vlan 1000,500
Configuring a Customer-Facing UNI-S Port with EVC
Perform the following tasks to configure a UNI-S port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. service instance id service-type
5. ethernet dot1ad {nni | uni {c-port | s-port}}
6. encapsulation default
7. bridge-domain vlan-id
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
service instance id service-type
Example:
router(config-if)# service instance 1 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 1.
|
Step 5
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni s-port
|
Configures a dot1ad NNI port or UNI port. In this example, it is a UNI-S port.
|
Step 6
|
encapsulation default
Example:
router(config-if)# encapsulation default
|
Configures the default service instance on a port. Anything that does not meet the criteria of other service instances on the same physical interface falls into this service instance.
|
Step 7
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 1000
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Perform the following tasks to configure an NNI port.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. service instance id service-type
5. ethernet dot1ad {nni | uni {c-port | s-port}}
6. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
7. rewrite ingress tag pop 1 symmetric
8. bridge-domain vlan-id
9. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 4
|
service instance id service-type
Example:
router(config-if)# service instance 1 ethernet
|
Configures an Ethernet service instance. In this example, the service instance is 1.
|
Step 5
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad uni c-port
|
Configures a dot1ad NNI or UNI port. In this example, it is a UNI C port.
|
Step 6
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 1000
second-dot1q 1-100
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 7
|
rewrite ingress tag pop 1 symmetric
Example:
router(config-if)# rewrite ingress tag pop 1
symmetric
|
Specifies the encapsulation adjustment that is to be performed on the frame ingress to the service instance.
|
Step 8
|
bridge-domain vlan-id
Example:
router(config-if)# bridge-domain 1000
|
Binds a service instance or a MAC tunnel to a bridge domain.
|
Step 9
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to configure an NNI port:
router# configure terminal
router(config)#interface gig1/1
router(config-if)#service instance 1 ethernet
router(config-if)#ethernet dot1ad nni
router(config-if)#encapsulation dot1q 1000
router(config-if)#rewrite ingress tag pop 1 symmetric
router(config-if)#bridge-domain 1000
Configuring a Layer 3 Termination
Perform the following tasks to configure a Layer 3 termination.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ethernet dot1ad {nni | uni {c-port | s-port}}
5. interface type number
6. encapsulation dot1q vlan-id second-dot1q {any | vlan-id} [native]
7. ip address ip-address mask
8. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type number
Example:
router(config)# interface gigabitethernet 3/0
|
Configures an interface.
|
Step 4
|
ethernet dot1ad {nni | uni {c-port | s-port}}
Example:
router(config-if)# ethernet dot1ad nni
|
Configures a dot1ad NNI or UNI port. In this example, it is an NNI port.
|
Step 5
|
interface type number
Example:
router(config)# interface gigabitethernet
3/0/.1
|
Configures an interface.
|
Step 6
|
encapsulation dot1q vlan-id second-dot1q {any |
vlan-id} [native]
Example:
router(config-if)# encapsulation dot1q 10
second-dot1q 10
|
Enables IEEE 802.1Q encapsulation of traffic on a specified subinterface in a VLAN.
|
Step 7
|
ip address
Example:
router(config-if)# ip address 1.2.3.4
255.255.0.0
|
Sets a primary or secondary IP address for an interface.
|
Step 8
|
end
Example:
router(config-if)# end
|
Returns the CLI to privileged EXEC mode.
|
Examples
The following example shows how to configure a Layer 3 termination. Note that Layer 3 is supported only on trunk interfaces.
router# configure terminal
router(config)#interface gig3/0
router(config-if)#ethernet dot1ad nni
router(config)#interface gig3/0/0.1
router(config-if)#encapsulation dot1q 10 second dot1q 10
router(config-if)#ip address 1.2.3.4 255.255.0.0
The following example shows how to configure a Layer 3 termination on an SVI:
router# configure terminal
router(config)#interface gig4/1
router(config-if)#ethernet dot1ad nni
router(config-if)#service instance 1 ethernet
router(config-if)#encapsulation dot1q 200 second dot1q 300
router(config-if)#rewrite ingress tag pop 2 symmetric
router(config-if)#bridge-domain 50
router(config-if)#service instance 2 ethernet
router(config-if)#encapsulation dot1q 300
router(config-if)#rewrite ingress tag pop 1 symmetric
router(config-if)#bridge-domain 60
router(config)#interface vlan 50
router(config-if)#ip address 2.3.4.5 255.255.0.0
router(config)#interface vlan 60
router(config-if)#ip address 3.4.5.6 255.255.0.0
Displaying a Dot1ad Configuration
You can display a Dot1ad configuration using the show ethernet dot1ad command. This command displays the Dot1ad configuration for all interfaces. To display the configuration on a particular interface, use the show ethernet dot1ad interface command.
The following example shows how to display a Dot1ad configuration on all interfaces:
router# show ethernet dot1ad
Interface: GigabitEthernet4/0/1
L2protocol pass cdp stp vtp dtp pagp dot1x lacp
Interface: GigabitEthernet4/0/2
L2protocol pass cdp stp vtp dtp pagp dot1x lacp
Troubleshooting Dot1ad
The following section describes how to troubleshoot Dot1ad.
Note The show commands in these examples should be run from a line card console.
•How do I verify the Dot1ad configuration on a switchport on an X40G card?
Run the following command to verify the Dot1ad configuration:
XYZ-PE1-dfc1#show platform npc switchport interface gi 1/2
status [valid, -, applied, enabled]
xlif_handle [type:[3] hwidb:[0x20E97F08] if_number:[1121]]
mode ingress [NORMAL] egress [NORMAL]
PVLAN isolated or community [No] promiscuous [No]
ingress vlan-translation [No] BPDU [No]
egress vlan-translation [No] BPDU [No]
dot1ad [Yes] <<<<<<<<<<<<
ethertype [0x88A8] <<<<<<<<<<<
•How do I verify the Dot1ad configuration on the ports with EVCs on an X40G card?
Run the following command to verify the Dot1ad configuration:
XYZ-PE1-dfc1#show platform npc xlif interface gi 1/2 efp 1
EFP XLIF(GigabitEthernet1/2, efp1)[np0] = 4136
Ingress XLIF table fields
Feature common enable: 0x1
Control feature bits: 0x0
Control rewrite opcode: 0x0
Feature data: 00000000 40000000 AAA80000 E0000829
layer2_acl_index: 0x00000000
evc_feat_data.ip_src_guard : 0x0
evc_feat_data.mst_evc : 0x1
evc_feat_data.layer2_acl : 0x0
evc_feat_data.layer2_acl_statid: 0
EFP dot1ad port type 0x3 <<<<<<<<
EFP CDP forward 0x1 <<<<<<<<
Feature common enable: 0x1
Control common bits: 0x00
Control feature bits: 0x00
Control rewrite opcode: 0x00
Feature data 0 0x00000000
Post Filter Opcode 0x00000008
Pre Filter Opcode 0x00000000
Post Filter Vlan high 0x00000064
Post Filter Vlan low 0x00000064
Post Filter Vlan outer 0x00000000
•How do I verify the L2protocol forwarding on a regular L3 switchports?
Run the following command to verify the L2protocol forwarding:
XYZ-PE1-dfc1# show platform npc xlif 0 port_sram 1
dot1ad port type: 0x0002 <<<<<<<<<
l2proto cdp fwd: 0x0001 <<<<<<<<<
l2proto dot1x fwd: 0x0000
..............................................
•How do I verify the Dot1ad configuration on ES20 cards?
–For switchports, run the following command:
XYZ-PE1-dfc1#show platform hardware dot1ad l2protocfg port <port-num>
–For EVCs, run the following command:
XYZ-PE1-dfc1# show platform soft efp-client interface gi x/0/y efp-id l2protocfg
–To display the default values, run the following commands:
XYZ-PE1-dfc1#show platform hardware dot1ad l2protocfg defaults ?
<0-2> 0=c-uni, 1=s-uni, 2=nni
XYZ-PE1-dfc1#show platform hardware dot1ad l2protocfg defaults 0 ?
XYZ-PE1-dfc1#show platform hardware dot1ad l2protocfg defaults 0 2
Raw Data :000FFF77 FFFCFF51
------------------------------------
802.1d protocols : 01:80:C2:00:00:XX
XX | Config XX | Config XX | Config XX | Config
----------- ----------- ----------- -----------
00 : PEER 01 : DROP 02 : PEER 03 : PEER
04 : FRWD 05 : FRWD 06 : FRWD 07 : FRWD
08 : DROP 09 : FRWD 0A : FRWD 0B : FRWD
0C : FRWD 0D : FRWD 0E : FRWD 0F : FRWD
All Bridge (0180C2000010)= FRWD
Configuring Layer 2 Features
This section provides ES20 line card-specific information about configuring the Layer 2 interworking features on the Cisco 7600 series router. It includes the following topics:
•Cross-Bundling
•Configuring Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE
•Configuring Flexible Service Mapping Based on CoS and Ethertype
•Configuring the Backup Interface for Flexible UNICross-Bundling
•Multichassis Support for Link Aggregation Control Protocol
•Configuring the Backup Interface for Flexible UNI
•Troubleshooting
•Configuring Broadcast Storm Control on Switchports and Ports with Ethernet Virtual Connections
•Configuring Asymmetric Carrier-Delay
•Configuring MST on EVC Bridge Domain
Cross-Bundling
Follow these restrictions and guidelines during cross-bundling various linecards:
•ES20 and ES+ cross-bundling is not supported.
•Any LAN card, and ES20/ES+ cross-bundling is not supported.
Configuring EVC EtherChannel and LACP over EVC Port Channel
An Ethernet link bundle or port channel is an aggregation of up to eight physical Ethernet links to form a single logical link for L2/L3 forwarding. Bundled Ethernet ports are used to increase the capacity of the logical link and provide high availability and redundancy. The EVC EtherChannel feature provides support for EtherChannels on Ethernet Virtual Connection Services (EVCS) service instances.
For more information on EtherChannels, and how to configure EtherChannels on Layer 2 or Layer 3 LAN ports, refer: http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SXF/configuration/guide/channel.html
The EVC EtherChannel feature supports MPBE, local connect, and cross connect service types. IEEE 802.3ad/Link Aggregation Control Protocol (LACP) provides an association of port channels. This feature supports service instances over bundled Ethernet links.
Ethernet flow points (EFPs) are configured on a port channel. The traffic, carried by the EFPs, is load balanced across member links. EFPs on a port channel are grouped and each group is associated with one member link. Ingress traffic for a single EVC can arrive on any member of the bundle. All egress traffic for an EFP uses only one of the member links. Load balancing is achieved by grouping EFPs and assigning them to a member link. In default load balancing, the user has no control over how the EFPs are grouped together, and sometimes the EFP grouping is not ideal. As a workaround, use manual load balancing to control the EFP grouping.
The scalability for a link-bundling EVC is 16k per chassis. Port Channel EVC scalability for ES20 cards is dependent on the same factors as EVCs configured on physical interfaces, with the number of member links and their distribution across PXFs as an additional parameter. EVC port channel QoS leverages EVC QoS infrastructure
Restrictions and Usage Guidelines
When configuring EVC EtherChannel, follow these restrictions and usage guidelines:
•All member links of the port channel are on Cisco 7600-ES20-GE line cards.
•Bridge-domain, cross connect, connect EVCs, switchports, and IP subinterfaces are allowed over the port-channel interface and the main interface.
Note For a port with a switchport, you can use the service instance ethernet command to create a service instance to support OAM requirements and not data traffic.
•The EFP limit decreases by the number of member links on the NP. Egs: If there are 4 members within the same NP, the EVC limit on the NP decreases to 2000 that ie (8000/4).
•If you configure a physical port as part of a channel group, you cannot configure EVCs on that physical port.
•SPAN is not supported on an EVC source and destination.
•You cannot configure switchport on a physical port that is part of an EVC port channel.
•You can apply QoS policies on EVCs on a port channel, except that ingress microflow policing is not supported. For more information on configuring QoS with EVCs, see "Configuring QoS on the Cisco 7600 Series Ethernet Services 20G Line Card".
•For HQoS and flat policies applied on an EVCS at the egress, the total guaranteed bandwidth of all policies on the EVCS belonging to the port channel cannot exceed the link rate (1 Gbps for 7600-ESM-20X1GE and 10 Gbps for 7600-ESM-2X10GE).
•You cannot use the bandwidth percent command on EVC port channels with Cisco 7600-ES20-GE line cards.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface port channel
4. [no] ip address
5. [no] service instance id {Ethernet service-name}
6. encapsulation dot1q vlan-id
7. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
8. [no] bridge-domain bridge-id
9. channel-group 5 mode on | off
or
channel-group 5 mode active | passive
Note The channel-group command options on/off are applicable when configuring port channel over EVC and the options active/passive are applicable when configuring port channel over EVC with LACP.
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
Router(config)# interface port channel
number
Example:
Router(config)# interface port channel
1
|
Creates the port channel interface.
|
Step 4
|
Router(config-if)# ip address
ip_address mask
Example:
Router(config-if)# ip address 10.0.0.11
255.255.255.0
|
Assigns an IP address and subnet mask to the EtherChannel.
|
Step 5
|
[no] service instance id {Ethernet
[service-name]}
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 6
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 7
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric]
Example:
Router(config-if-srv)# rewrite ingress
tag push dot1q 20
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 8
|
[no] bridge-domain bridge-id
Example:
Router(config-subif)# bridge domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Step 9
|
channel-group 5 mode on |off
Example:
Router(config-if)# channel-group 5 mode
on
OR
channel-group 5 mode active |passive
Example:
Router(config-if)# channel-group 5 mode
active
|
Enables EVC port channel.
Enables LACP on the configured EVC port channel.
|
Examples
In this example, a single port channel interface is created with three possible member links from slots 1 and 2.
Router(config)# interface port channel5
Router(config-if)# no ip address
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 350
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-subif)# bridge-domain 350
!
Router(config-if)# service instance 2 ethernet
Router(config-if-srv)# encapsulation dot1q 400
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-subif)# bridge-domain 350
Router(config-if)# service instance 3 ethernet
Router(config-if-srv)# encapsulation dot1q 500
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-subif)# bridge-domain 370
!
Router(config)# interface port channel5.1
Router(config-if-srv)# encapsulation dot1Q 500 second-dot1q 300
Router(config-if)# ip address 60.0.0.1 255.0.0.0
!
Router(config)# interface GigabitEthernet1/0/0
Router(config-if)# channel-group 5 mode on
Router(config)# interface GigabitEthernet1/0/1
Router(config-if)# channel-group 5 mode on
Router(config)# interface GigabitEthernet2/0/1
Router(config-if)# channel-group 5 mode on
The next example shows scalable Eompls and EVC connect sample configuration.
Router#
configure terminal
Router(config)#
interface GigabitEthernet 3/0/0
Router(config-if)#
service instance 10 ethernet
Router(config-srv)#
encapsulation dot1q 20
Router(config-if-srv)#
rewrite ingress tag pop 1 sym
Router(config-if-srv)#
exit
Router(config)#
interface GigabitEthernet 3/0/1
Router(config-if)#
service instance 12 ethernet
Router(config-srv)#
encapsulation dot1q 30
Router(config-if-srv)#
rewrite ingress tag pop 1 sym
Router(config-if-srv)#
exit
Router(config)#
connect TEST GigabitEthernet 3/0/0 10 GigabitEthernet 3/0/1 12
ID Name Segment 1 Segment 2 State
================================================================================
57 TEST Gi3/0/0:10 Gi3/0/1:12 UP
Here is a typical QoS configuration.
Router(config)# interface port channel10
Router(config-if)# no ip address
Router(config-if)# mls qos trust cos
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 11
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if)# service-policy input x
Router(config-if)# service-policy output y
Router(config-subif)# bridge-domain 1500
Here is the configuration for LACP over a configured EVC port channel, on an interface:
Router(config-if)# channel-group 5 mode ?
active Enable LACP unconditionally
auto Enable PAgP only if a PAgP device is detected
desirable Enable PAgP unconditionally
on Enable EtherChannel only
passive Enable LACP only if a LACP device is detected
Router(config-if)#channel-group 5 mode active
Router(config-if)#channel-group 5 mode passive
Here are LACP EVC Port channel for Fast Switchover (1:1 redundancy) sample configuration outputs.
Port channel Configuration
Router(config-if)#interface port channel102
Router(config-if)#mtu 9216
Router(config-if)#no ip address
Router(config-if)#lacp fast-switchover
Router(config-if)#lacp max-bundle 1
Router(config-if)#service instance 50 ethernet
Router(config-if)# encapsulation dot1q 50
Router(config-if)# rewrite ingress tag pop 1 symmetric
Router(config-if)# service-policy output lacp-parent
Router(config-if)# bridge-domain 50
Member links configuration
Router(config-if)#interface GigabitEthernet3/0/12
Router(config-if)#mtu 9216
Router(config-if)#no ip address
Router(config-if)#no mls qos trust
Router(config-if)#lacp rate fast
Router(config-if)#channel-protocol lacp
Router(config-if)#channel-group 102 mode active
Verification
Use the following commands to verify operation.
Command
|
Purpose
|
Use the following commands to verify EVC configuration
|
Router# show ethernet service evc [id evc-id |
interface interface-id] [detail]
|
Displays information pertaining to a specific EVC if an EVC ID is specified, or pertaining to all EVCs on an interface if an interface is specified. The detailed option provides additional information on the EVC.
|
Router# show ethernet service instance [id
instance-id interface interface-id | interface
interface-id] [detail]
|
Displays information about one or more service instances: If a service instance ID and interface are specified, only data pertaining to that particular service instance is displayed. If only an interface ID is specified, displays data for all service instances on the given interface.
|
Router# show ethernet service interface
[interface-id] [detail]
|
Displays information in the Port Data Block (PDB).
|
Use the following commands to verify LACP over EVC
|
Router#show etherchannel 15 port channel
|
Displays details for port channel 15. This command is common to EVC port channel, switchport port channel and L3 Port channel. The CLI is run at the RP.
|
Multichassis Support for Link Aggregation Control Protocol
Configured at the edge of a provider's network, Multichassis Link Aggregation Control Protocol (MLACP) features performs the following actions:
•Uses dual-homed devices (DHD) to provide network redundancy between two or more service provider networks.
•Allows the LACP state machine and protocol to operate in a dual- homed mode.
Each switch is a point of attachments (PoA), where one PoA is active, and the other is a standby, and the active PoA executes the multichassis link aggregation group with a DHD. A virtual LACP peer on the PoA is created giving the impression that a DHD is connected to one node.
Figure 2-3 shows the placement of PoAs and DHDs in an MLACP configuration.Figure 2-2
Figure 2-3 Placement of PoAs and DHDs in an MLACP Implementation
The status of the PoAs during traffic relay are:
•The two PoAs form a redundancy group, and only one of the PoAs is active at any given time.
•Only two PoAs form a redundancy group; however, you can configure a maximum of 50 redundancy groups connecting to other DHDs.
• Active links exist only between a DHD and active PoAs. None of the links between the DHD and the standby PoA relay traffic other than Bridge Protocol Data Unit (BPDU)s.
• The state of the etherchannel interface on a standby PoA is UP.
A switchover from an active PoA to a standby PoA occurs when there is a failure on the:
• Uplink port on the DHD
•DHD's uplink
•Downlink port on an active PoA
•Active PoA node
•Active PoA uplinks
•Cable failure
The default switchover mechanism uses dynamic port priority changes on the port channel and member link(s) to provide revertive mode and nonrevertive mode options. The default operation in a multi- chassis LACP is revertive.
Bruteforce is a switchover mechanism where the member link is in a err-disable state after a switchover. To recover the port channel and enable the member link on a new standby PoA, use the err disable recovery cause mlacp-minlink command in the global configuration mode.
Use the lacp max-bundle command in the following modes:
•PoA based: Command is executed on the PoA.
•Shared based: Command is executed on the PoA and DHD.
•DHD based: Command is executed on the DHD.
Use the lacp max-bundle command on all the PoAs to operate in the PoA control and shared control modes. The max-bundle value argument should not be less than the total number of links in the Link Aggregation Group (LAG) that are connected to the PoA. Each PoA may be connected to the DHD with a different number of links for the LAG and, therefore, configured with a different value for the max-bundle value argument.
Note The lacp failover brute-force command cannot be used with a nonrevertive configuration.
Requirements and Restrictions
Follow these requirements and restrictions when configuring the MLACP feature in a ES20 line card:
•Supported only on ES20 and ES40 line cards, all member links on a port-channel should be on same type of line card.
•Cisco IOS Release 12.2(33)SRE supports service instances only on an MLACP port-channel.
•A PoA may be active for one port-channel, and standby for a different port-channel.
•The maximum number of port-channels supported on a PoA is 256.
•In any LACP configuration, ensure that the numerical value of the system-priority of the virtual LACP instance on the PoAs is lower (higher priority) than that on the DHD for all control variants.
•It is not recommended to configure different max bundle configurations on a PoA. For example, if DHD 1 to PoA has 4 links, PoA2 should also have 4 links.
•Links can be successfully aggregated based on the following constraints:
–Links should be from the same line card type.
–QoS should be validated.
–Port-channel hashing should be identical for two links.
–Flowcontrol should match.
•When Cisco 7600 routers are used to form a redundancy group within a PoA, the member links should adhere to the constraints listed in the previous paragraph. These constraints are not validated across PoAs and you should ensure that configuration between the two PoAs are identical.
•Ensure that the etherchannel usage configuration is identical on the two PoAs.
•The maximum bundle value on a PoA is 8.
•A maximum of two PoAs in a redundancy group and 50 redundancy groups per node are supported.
• Multiple Spanning Tree (MST) on an EVC is not supported on MLACP etherchannel ports.
•Reverse Layer 2 Gateway Protocol (RL2GP) with MLACP is not supported.
•DHD port-channel cannot use Spanning Tree Protocol (STP) or Resilient Ethernet Protocol (REP) or Reverse Layer 2 Gateway Protocol (RL2GP) as a redundancy option. DHD port-channel disables the STP enabled by default.
• Subinterfaces on port-channels are not supported.
•You can configure the channel-group command as active and configuring the channel-group command as passive is not supported.
•As the lacp direct-loadswap command is not applicable on a PoA, member links on a PoA are not protected with links on the same PoA.
• We do not recommend you to have different bundle configurations on a DHD. For example, if DHD 1 to PoA1 has four links, DHD 1 to PoA 2 should also have the same number of links.
• Use the port-channel min-link command to configure each PoA with the minimum number of links. This maintains the LAG in an active state.
•The lacp max-bundle command must be used on all the PoAs to operate in PoA control and shared control modes. The value of the max-bundle should not be less than the total number of interfaces in the LAG that are connected to the PoA.
•If you use the lacp failover command with brute force, then after the switchover, the port-channel member link moves to a errdisabled state.By default, the interval is 300 seconds (tunable range is 30 seconds to 300 seconds).To recover the port-channel, use the errdisable recovery cause mlacp-minlink command. EVC with connect as forwarding function is not supported.
•The lacp failover non-revertive and lacp failover brute-force commands are mutually exclusive within the same port-channel.
•Connectivity Fault Management configuration on an MLACP port-channel is not permissible.
•For best switchover perforamance, configure LACP fast-switchover in PoAs and DHDs.
•You cannot use MLACP port-channel for IP forwarding.
•You cannot configure REP on a MLACP port-channel.
•Use the errdisable recovery cause mlacp-minlink command to auto-recover the port-channel after timer expiration.
•The core interfaces in a VPLS core should be a ES20 or ES40 line card.
The recommended configuration sequence is:
•Configure interchassis group and MLACP commands.
•Configure MLACP interchassis group and other port-channel commands.
•Add member links.
SUMMARY STEPS
1. enable
2. configure terminal
3. redundancy
4. interchassis group {number}
5. monitor peer {BFD}
6. member IP {IP address}
7. mlacp node-id {number}
8. mlacp system-mac {IP address}
9. mlacp system-priority priority
10. backbone interface any interface
11. exit
12. interface port-channel {port-channel number}
13. lacp max-bundle {max-bundle value}
14. lacp failover { non-revertive| brute force }
15. mlacp interchassis group {group-id}
16. backbone int member
17. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
redundancy
Example:
Router(config)# redundency
|
Enters redundancy configuration mode.
|
Step 4
|
interchassis group {number}
Example:
Router(configure-red)# interchassis
group 400
|
Configures an interchassis group within the redundancy configuration mode and assigns a group number.
|
Step 5
|
monitor peer {BFD}
Example:
Router(configure-red)#
|
Configures the BFD option to monitor the state of the peer. The default option is route-watch.
|
Step 6
|
member ip {IP address}
Example:
Router(configure-red)# member ip
172.3.3.3
|
Configures the IP address of the mlacp peer member group.
|
Step 7
|
mlacp node-id {number}
Example:
Router(config-r-ic)# mlacp node-id 5
|
Defines the node ID to be used in the LACP port-id field. Valid value range is 0 - 7, and the value should be different from the peer values.
|
Step 8
|
mlacp system-mac {address}
Example:
Router(config-r-ic)# mlacp
aaaa.aaaa.aaab
|
Defines and advertises the system MAC address value to the MLACP members of the redundancy group.
|
Step 9
|
mlacp system-priority priority
Example:
Router(config-r-ic)# mlacp
system-priority 100
|
Defines the system priority advertised to the other MLACP members of the redundancy group. System priority values are from 1 to 65535, the default value being 32768. The assigned values should be lower than the DHD.
|
Step 10
|
backbone interface any interface
Example:
Router(config-r-ic)# ethernet cfm domain L4 level 4
|
Defines the backbone interface for the MLACP configuration.
|
Step 11
|
exit
Example:
Router(config-r-ic)#exit
|
Exits the redundancy mode.
|
Step 12
|
interface port-channel {port-channel
number}
Example:
Router# interface Port-channel1
|
To identify the PoA uplink failure, configure the port- channel interface or any physical interface.
|
Step 13
|
lacp max-bundle {max-bundle value}
Example:
Router (config-int)# lacp max-bundle 4
|
Configures the max-bundle links that are connected to the PoA. The value of the max-bundle links argument should not be less than the total number of links in the LAG that are connected to the PoA.
|
Step 14
|
lacp failover { non-revertive| brute
force}
Example:
P19_C7609-S(config-if)#lacp failover ?
brute-force Brute force interface
failover
non-revertive Non revertive interface
failover
|
Sets the MLACP switchover to nonrevertive or brute force. Default value is revertive. If you configure brute force, a minimum link or last link failure for every MLACP failure occurs or the dynamic lag priority value is modified.
|
Step 15
|
mlacp interchassis group {group-id}
Example:
Router(config-red)#interchassis group
230
|
Specifies that the port-channel is an MLACP port-channel. The group-id should match the configured redundancy group.
|
Step 16
|
backbone int member
Example:
Router(config-r-ic)# backbone interface
GigabitEthernet2/4
|
Sets the backbone interface member.
|
Step 17
|
exit
|
Exits the port-channel interface mode.
|
Examples
The following is a configuration example for Virtual Private Wire Services (VPWS):
ACTIVE POA
backbone interface GigabitEthernet2/3
backbone interface GigabitEthernet2/4
mlacp system-priority 200
lacp failover brute-force
mlacp interchassis group 100
service instance 2 ethernet
rewrite ingress tag pop 1 symmetric
xconnect 172.2.2.2 2 pw-class mlacp
backup peer 172.4.4.4 2 pw-class mlacp
status peer topology dual-homed
mpls ldp graceful-restart
ip address 172.1.1.1 255.255.255.255
interface GigabitEthernet2/3
ip address 120.0.0.1 255.255.255.0
bfd interval 100 min_rx 100 multiplier 3
interface GigabitEthernet2/9
channel-group 1 mode active
Use the show lacp multi-chassis group command to display the interchassis redundancy group value and the operational LACP parameters.
MLACP-PE1# show lacp multi-chassis group 100
Interchassis Redundancy Group 100
Operational LACP Parameters:
System-Id: 200.000a.f331.2680
Backbone Uplink Status: Connected
System-Id: 200.000a.f331.2680
System-Id: 2000.0014.6a8b.c680
Channel State Priority Active Links Inactive Links
Group Local/Peer Local/Peer Local/Peer Local/Peer
1 A/S 28000/32768 4/4 0/0
Use the show lacp multi-chassis portchannel command to display the interface port-channel value channel group, LAG state, priority, inactive links peer configuration, and standby links.
MLACP-PE1# show lacp multi-chassis port-channel 1
Use the show mpls ldp iccp command to display the LDP session and ICCP state information.
MLACP-PE1# show mpls ldp iccp
rg_id: 100, peer addr: 172.3.3.3
ldp_session 0x3, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM RGID Table total ICCP sessions: 1
rg_id: 100, peer addr: 172.3.3.3
ldp_session 0x3, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM LDP Session Table total ICCP sessions: 1
Use the show mpls l2transport command to display the local interface and session details, destination address, and status.
MLACP-PE1# show mpls l2transport vc 2
Local intf Local circuit Dest address VC ID Status
------------- -------------------------- --------------- ---------- ----------
Po1 Eth VLAN 2 172.2.2.2 2 UP
Po1 Eth VLAN 2 172.4.4.4 2 STANDBY
Use the show etherchannel summary command to display the status and identity of the MLACP member links.
MLACP-PE1# show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
U - in use f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
Number of channel-groups in use: 2
Group Port-channel Protocol Ports
------+-------------+-----------+-----------------------------------------------
1 Po1(RU) LACP Gi2/9(P) Gi2/20(P) Gi2/31(P)
Use the show lacp internal command to display the device, port, and member- link information.
MLACP-PE1# show lacp internal
Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting Fast LACPDUs
A - Device is in Active mode P - Device is in Passive mode
LACP port Admin Oper Port Port
Port Flags State Priority Key Key Number State
Gi2/9 SA bndl-act 28000 0x1 0x1 0x820A 0x3D
Gi2/20 SA bndl-act 28000 0x1 0x1 0x8215 0x3D
Gi2/31 SA bndl-act 28000 0x1 0x1 0x8220 0x3D
Gi2/40 SA bndl-act 28000 0x1 0x1 0x8229 0x3D
Peer (MLACP-PE3) mLACP member links
Gi3/11 FA hot-sby 32768 0x1 0x1 0xF30C 0x5
Gi3/21 FA hot-sby 32768 0x1 0x1 0xF316 0x5
Gi3/32 FA hot-sby 32768 0x1 0x1 0xF321 0x7
Gi3/2 FA hot-sby 32768 0x1 0x1 0xF303 0x7
POA2
backbone interface GigabitEthernet3/3
backbone interface GigabitEthernet3/5
mlacp system-priority 2000
lacp failover brute-force
mlacp interchassis group 100
service instance 2 ethernet
rewrite ingress tag pop 1 symmetric
xconnect 172.2.2.2 2 pw-class mlacp
backup peer 172.4.4.4 2 pw-class mlacp
status peer topology dual-homed
mpls ldp graceful-restart
ip address 172.3.3.3 255.255.255.255
interface GigabitEthernet3/2
channel-group 1 mode active
interface GigabitEthernet3/3
ip address 123.0.0.2 255.255.255.0
bfd interval 100 min_rx 100 multiplier 3
Use the show lacp multi-chassis group command to display the LACP parameters, local configuration, status of the backbone uplink, peer information, node ID, channel, state, priority active, and inactive links.
MLACP-PE3# show lacp multi-chassis group 100
Interchassis Redundancy Group 100
Operational LACP Parameters:
System-Id: 200.000a.f331.2680
Backbone Uplink Status: Connected
System-Id: 2000.0014.6a8b.c680
System-Id: 200.000a.f331.2680
Channel State Priority Active Links Inactive Links
Group Local/Peer Local/Peer Local/Peer Local/Peer
1 S/A 32768/28000 4/4 0/0
Use the show lacp multi-chassis portchannel command to display the interface port-channel value channel group, LAG state, priority, inactive links peer configuration, and standby links.
MLACP-PE3# show lacp multi-chassis port-channel 1
Use the show mpls ldp iccp command to display the LDP session and ICCP state information.
MLACP-PE3# show mpls ldp iccp
rg_id: 100, peer addr: 172.1.1.1
ldp_session 0x2, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM RGID Table total ICCP sessions: 1
rg_id: 100, peer addr: 172.1.1.1
ldp_session 0x2, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM LDP Session Table total ICCP sessions: 1
MLACP-PE3# sh mpls l2transport vc 2
Local intf Local circuit Dest address VC ID Status
------------- -------------------------- --------------- ---------- ----------
Po1 Eth VLAN 2 172.2.2.2 2 STANDBY
Po1 Eth VLAN 2 172.4.4.4 2 STANDBY
Use the show etherchannel summary command to display the status and identity of the MLACP member links.
MLACP-PE3# show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
U - in use f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
Number of channel-groups in use: 2
Group Port-channel Protocol Ports
------+-------------+-----------+-----------------------------------------------
1 Po1(RU) LACP Gi3/2(P) Gi3/11(P) Gi3/21(P)
Use the show lacp internal command to display the device, port, and member- link information.
MLACP-PE3# show lacp 1 internal
Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting Fast LACPDUs
A - Device is in Active mode P - Device is in Passive mode
LACP port Admin Oper Port Port
Port Flags State Priority Key Key Number State
Gi3/2 FA bndl-sby 32768 0x1 0x1 0xF303 0x7
Gi3/11 FA bndl-sby 32768 0x1 0x1 0xF30C 0x5
Gi3/21 FA bndl-sby 32768 0x1 0x1 0xF316 0x5
Gi3/32 FA bndl-sby 32768 0x1 0x1 0xF321 0x7
Peer (MLACP-PE1) mLACP member links
Gi2/20 SA bndl 28000 0x1 0x1 0x8215 0x3D
Gi2/31 SA bndl 28000 0x1 0x1 0x8220 0x3D
Gi2/40 SA bndl 28000 0x1 0x1 0x8229 0x3D
Gi2/9 SA bndl 28000 0x1 0x1 0x820A 0x3D
The following is a configuration example for a Virtual Private Lan Service (VPLS):
Active POA
backbone interface GigabitEthernet2/3
backbone interface GigabitEthernet2/4
mlacp system-priority 200
mlacp interchassis group 100
service instance 4000 ethernet
rewrite ingress tag pop 1 symmetric
neighbor 172.2.2.2 encapsulation mpls
neighbor 172.4.4.4 encapsulation mpls
mpls ldp graceful-restart
ip address 172.1.1.1 255.255.255.255
interface GigabitEthernet2/3
ip address 120.0.0.1 255.255.255.0
bfd interval 100 min_rx 100 multiplier 3
interface GigabitEthernet2/9
channel-group 1 mode active
Use the show lacp mg command to display the LACP parameters, local configuration, status of the
backbone uplink, peer information, node ID, channel, state, priority active, and inactive links.
MLACP-PE1# show lacp multi-chassis group 100
Interchassis Redundancy Group 100
Operational LACP Parameters:
System-Id: 200.000a.f331.2680
Backbone Uplink Status: Connected
System-Id: 200.000a.f331.2680
System-Id: 2000.0014.6a8b.c680
Channel State Priority Active Links Inactive Links
Group Local/Peer Local/Peer Local/Peer Local/Peer
1 A/S 28000/32768 4/4 0/0
Use the show lacp multi-chassis portchannel command to display the interface port-channel value
channel group, LAG state, priority, inactive links peer configuration, and standby links.
MLACP-PE1# show lacp multi-chassis port-channel 1
Use the show mpls ldp iccp command to display the LDP session and ICCP state information.
MLACP-PE1# show mpls ldp iccp
rg_id: 100, peer addr: 172.3.3.3
ldp_session 0x3, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM RGID Table total ICCP sessions: 1
rg_id: 100, peer addr: 172.3.3.3
ldp_session 0x3, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM LDP Session Table total ICCP sessions: 1
Use the show mpls l2transport command to display the local interface and session details, destination address, and the status.
MLACP-PE1# show mpls l2transport vc 4000
Local intf Local circuit Dest address VC ID Status
------------- -------------------------- --------------- ---------- ----------
VFI VPLS VFI 172.2.2.2 4000 UP
VFI VPLS VFI 172.4.4.4 4000 UP
Use the show etherchannel summary command to display the status and identity of the MLACP member links.
MLACP-PE1# show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
U - in use f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
Number of channel-groups in use: 2
Group Port-channel Protocol Ports
------+-------------+-----------+-----------------------------------------------
1 Po1(RU) LACP Gi2/9(P) Gi2/20(P) Gi2/31(P)
Use the show lacp internal command to display the device, port, and member-link information.
MLACP-PE1# show lacp internal
Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting Fast LACPDUs
A - Device is in Active mode P - Device is in Passive mode
LACP port Admin Oper Port Port
Port Flags State Priority Key Key Number State
Gi2/9 SA bndl-act 28000 0x1 0x1 0x820A 0x3D
Gi2/20 SA bndl-act 28000 0x1 0x1 0x8215 0x3D
Gi2/31 SA bndl-act 28000 0x1 0x1 0x8220 0x3D
Gi2/40 SA bndl-act 28000 0x1 0x1 0x8229 0x3D
Peer (MLACP-PE3) mLACP member links
Gi3/11 FA hot-sby 32768 0x1 0x1 0xF30C 0x5
Gi3/21 FA hot-sby 32768 0x1 0x1 0xF316 0x5
Gi3/32 FA hot-sby 32768 0x1 0x1 0xF321 0x7
Gi3/2 FA hot-sby 32768 0x1 0x1 0xF303 0x7
Configuration example on a standby PoA:
backbone interface GigabitEthernet3/3
backbone interface GigabitEthernet3/5
mlacp system-priority 2000
mlacp interchassis group 100
service instance 4000 ethernet
rewrite ingress tag pop 1 symmetric
neighbor 172.2.2.2 encapsulation mpls
neighbor 172.4.4.4 encapsulation mpls
mpls ldp graceful-restart
ip address 172.3.3.3 255.255.255.255
interface GigabitEthernet3/2
channel-group 1 mode active
interface GigabitEthernet3/3
ip address 123.0.0.2 255.255.255.0
bfd interval 100 min_rx 100 multiplier 3
Use the show lacp multi-chassis group interchassis group number command to display the LACP parameters, local configuration, status of the backbone uplink, peer information, nodeID, channel, state, priority, active, and inactive links.
MLACP-PE3# show lacp multi-chassis group 100
Interchassis Redundancy Group 100
Operational LACP Parameters:
System-Id: 200.000a.f331.2680
Backbone Uplink Status: Connected
System-Id: 2000.0014.6a8b.c680
System-Id: 200.000a.f331.2680
Channel State Priority Active Links Inactive Links
Group Local/Peer Local/Peer Local/Peer Local/Peer
1 S/A 32768/28000 4/4 0/0
Use the show lacp multi-chassis portchannel command to display the interface port-channel valuechannel group, LAG state, priority, inactive links peer configuration, and standby links.
MLACP-PE3# show lacp multi-chassis port-channel 1
MLACP-PE3# show mpls ldp iccp
rg_id: 100, peer addr: 172.1.1.1
ldp_session 0x2, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM RGID Table total ICCP sessions: 1
rg_id: 100, peer addr: 172.1.1.1
ldp_session 0x2, client_id 0
iccp state: ICPM_ICCP_CONNECTED
app state: ICPM_APP_CONNECTED, ptcl ver: 0
ICPM LDP Session Table total ICCP sessions: 1
MLACP-PE3# sh mpls l2transport vc 2
Local intf Local circuit Dest address VC ID Status
------------- -------------------------- --------------- ---------- ----------
VFI VPLS VFI 172.2.2.2 4000 UP
VFI VPLS VFI 172.4.4.4 4000 UP
Use the show etherchannel summary command to display the status and identity of the MLACP
member
MLACP-PE3#show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
U - in use f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
Number of channel-groups in use: 2
Group Port-channel Protocol Ports
------+-------------+-----------+-----------------------------------------------
1 Po1(RU) LACP Gi3/2(P) Gi3/11(P) Gi3/21(P)
Use the show lacp internal command to display the device, port, and member- link information.
MLACP-PE3# show lacp 1 internal
Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting Fast LACPDUs
A - Device is in Active mode P - Device is in Passive mode
LACP port Admin Oper Port Port
Port Flags State Priority Key Key Number State
Gi3/2 FA bndl-sby 32768 0x1 0x1 0xF303 0x7
Gi3/11 FA bndl-sby 32768 0x1 0x1 0xF30C 0x5
Gi3/21 FA bndl-sby 32768 0x1 0x1 0xF316 0x5
Gi3/32 FA bndl-sby 32768 0x1 0x1 0xF321 0x7
Peer (MLACP-PE1) mLACP member links
Gi2/20 SA bndl 28000 0x1 0x1 0x8215 0x3D
Gi2/31 SA bndl 28000 0x1 0x1 0x8220 0x3D
Gi2/40 SA bndl 28000 0x1 0x1 0x8229 0x3D
Gi2/9 SA bndl 28000 0x1 0x1 0x820A 0x3D
Troubleshooting
Table 2-9 provides troubleshooting solutions for Multichassis Support for LACP feature.
Table 2-9
Problem
|
Solution
|
If the MLACP or ICCP is down or if the the links between the POA are down or theICCP is in a different state
|
Use the debug lacp multi-chassis command to verify the MLACP interface, database, interchassis redundancy group and user interface. Share the output with TAC for further investigation.
|
Connection timer has expired or ICCP is disconnected or attempting to establish an ICCP connection
|
Use the show lacp multi-chassis group command to verify if the connection timer is enabled. Share the output with TAC for further investigation.
|
LAG state failure or RG is synchronized or timed out LAG is enabled for member links, but the hold down timer is running or RG is waiting Member links are not enabled or link failure detected
|
Use the show lacp multi-chassis port-channel commandand share the output with TAC for further investigation.
|
Traffic loss after reversal
|
Use the test lacp multichassis reversion-delay delay_in_seconds command to extend the amount of time before mLACP reverts to the previous active state after failure recovery. This allows the pseudowires additional time to come UP before the PoA reverts to active state.
|
Failover performance
|
Complete these steps:
1. Reduce the pesudowire number to 100and check if the performance issue is corrected.
2. Check the DHD configuration. Remove any min-links configuration from the DHD as it slows down failovers and provides no additional value.
3. Ensure that lacp fast-switchover is configured on DHD and PoAs.
|
Unexpected active/standby roles or priorities
|
Complete these steps:
1. Use the show run int port-ch and show lacp mp command to check if the configured priorities match the operational priorities. If they don't match, it implies that there was a failover.
2. Use the monitor event-trace mlacp command on the SP to verify the reasons for any failovers that caused swapping of active/standby roles or dynamic priority changes.
|
Troubleshooting Multichassis Support for LACP
Pseudo MLACP Support on Cisco 7600
In dual homing, a device is connected to the network using two independent access points or points of attachments (POAs). One POA is the primary connection and the other is a standby connection that is activated in the event of a failure of the primary connection. The Multi-chassis Link Aggregation Protocol (MLACP) solution is an active and standby Provider Edge (PE) redundancy mechanism. The Pseudo MLACP (PMLACP) feature introduced in Cisco IOS release 15.1(3)S, provides a flexible dual homing redundancy mechanism where both the connections are in the active mode (active-active mode). In PMLACP implementation, a PMLACP application is implemented on the PE router. Both the POA ports are placed in active mode with manual VLAN load balancing.
PMLACP provides higher bandwidth utilization than MLACP and other active and standby link level schemes. PMLACP provides VLAN based redundancy by allowing you to configure one primary and one secondary interface pair for each member VLAN. The POAs determine which POA is active and standby for each VLAN on a Multi-Chassis Link Aggregation (MLAG) and only the active POA forwards frames for the respective VLAN. Additionally PMLACP allows maximum flexibility for the PE-CE inter operability in terms of dual-homing redundancy and failover recovery.
Figure 2-4 explains the PMLACP implementation with manual VLAN load-balancing configuration.
Figure 2-4 PMLACP Implementation
In the illustration, POA ports are configured for a PMLACP role, and ports are configured in active-active mode with manual VLAN load-balancing. The POAs are configured to allow certain VLANs on one of their downlinks but not the other VLANs. The POA activates its uplinks for locally active VLANs. DHD is configured to enable all VLANs on both its uplinks. Traffic from DHD is initially flooded on both uplinks until DHD learns which uplink is active for which VLANs.
Failover Operations
The PMLACP feature provides network resiliency by protecting against port, link, and node failures.
Figure 2-5 explains the failure points in a network.
Figure 2-5
PMLACP Failover Protection
These failures can be categorized into five types.
•A—Failure of the uplink port on the DHD
•B—Failure of the ethernet link
•C—Failure of the downlink port on the POA
•D—Failure of the POA node
•E—Failure of the active POA uplinks
The failover operations are triggered by three different events.
•Access side link or port failure (failure types A- C): PMLACP on the failing POA initiates a failover to the peer for any VLANs that were active on the failed link or links. This failover is initiated by sending an MLACP port state Type Length Value (TLV) message, indicating that the port state is down.
• Node failure (failure type D): PMLACP on the surviving POA receives a node failure notification and initiates a failover of all VLANs in standby mode on all shared MLAGs.
•POA uplink failure (failure type E): The failing POA sends a message to the peer about the core isolation using the MLACP system state TLV, indicating that the POA is isolated. It will then place all VLANs in the blocking mode.
All the three failover events involve the peer POA receiving a notification of the failure. At this point the receiving standby POA completes the following steps:
1. Unblocks any of the affected VLANs which were in standby or blocked mode.
2. Sends a MAC flush message to the access side network device through a Multiple VLAN Registration Protocol (MVRP) message. This message reflects all the VLANs which are being activated only for the associated interface. When DHD receives the MVRP message, DHD responds by flushing the MAC address tables for those VLANs.
3. Triggers the core network edge MAC flushing.
Failure Recovery
PMLACP uses revertive mode after a failure recovery to support the active-active model. The reversal process is also similar to the failover process. The standby POA initates the reversal for each VLAN by indicating that the POA is relinquishing its active role for the VLAN. This is done though an ICCP PLACP interface state TLV message, which indicates that it is no longer in active mode for the affected VLANs. Upon TLV receipt, the recovering POA unblocks the affected VLANs and triggers the MAC flushes towards access side and core side.
Revertive mode is enabled by default. If you want to choose when to trigger reversion after the failover recovery, you can configure non revertive mode. The non revertive mode is enabled by configuring the command lacp failover non-revertive under port channel.
Restrictions for PMLACP
Follow this restrictions and usage guidelines while configuring PMLACP.
•PMLACP is supported on ES+ and ES 20 line cards.
•PMLACP is supported on SUP 720 and RSP 720.
•PMLACP configuration on a port channel supports only service instances.
•If PMLACP is enabled on a port channel, Resilient Ethernet Protocol (RTP), Spanning Tree Protocol (STP), Link Aggregation Control Protocol (LACP), VLAN Trunking Protocol (VTP), or other layer 2 control protocols are not supported.
•The ethernet VLAN color blocking needs to be configured on all VLANs under the port channel if it has EVC xconnect or MTP configured on it. Use the ethernet vlan color-block vlan all command for configuring it.
•Both POAs must contain the same configuration of manual-load balance VLAN list and LAG.
•The bridge-domain that is configured under a PMLACP port channel EVC should not be part of any other non PMLACP interfaces.
•Only one port channel of MLACP or PMLACP type is supported on a single redundancy group (RG). There can be one MLACP port channel and another PMLACP port channel on a single RG, but not two port channels of the same type.
•Active VLAN list configuration needs to be the same on both POAs.
•The port-channel configuration on both POAs must be the same, but port-channel members need not be the same.
•The recommended configuration sequence for PMLACP is:
–Configure interchassis group and PMLACP commands.
–Configure MLACP interchassis group and other port channel commands.
–Add member links.
Configuring PMLACP on Cisco 7600
Complete the following steps to configure PMLACP on the Cisco 7600 router.
SUMMARY STEPS
1. enable
2. configure terminal
3. pseudowire-class pw-class-name
4. encapsulation mpls
5. status peer topology dual-homed
6. exit
7. l2 vfi name manual
8. vpn id vpn-id
9. neighbor remote-id encapsulation mpls
10. exit
11. redundancy
12. interchassis group number
13. monitor peer bfd
14. member IP IP-address
15. mlacp node-id number
16. mlacp system-priority priority
17. backbone interface interface
18. exit
19. interface port-channel port-channel number
20. no ip address
21. mlacp interchassis group group-id
22. mlacp mode active-active
23. mlacp load-balance primary vlan range
24. mlacp load-balance secondary vlan range
25. ethernet vlan color-block all
26. service instance id ethernet
27. encapsulation dot1q vlan id
28. rewrite ingress tag pop {1 | 2} symmetric
29. xconnect peer-id vc-id pw-class pw-class-name
or
brige-domain bridge-domain-id
30. backup peer peer-id vc-id pw-class pw-class-name
31. exit
32. interface vlan bridge-domain-id
33. xconnect vfi vfi-name
34. end
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode, and if prompted enter your password.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
pseudowire-class pw-class-name
Example:
Router(config)# pseudowire-class vpws
|
Specifies the name of a pseudowire class and enters pseudowire class configuration mode.
|
Step 4
|
encapsulation mpls
Example:
Router(config-pw-class)# encapsulation
mpls
|
Specifies that MPLS is used as the data encapsulation method for tunneling Layer 2 traffic over the pseudowire.
|
Step 5
|
status peer topology dual-homed
Example:
Router(config-pw-class)# status peer
topology dual-homed
|
Enables the reflection of the attachment circuit status on both the primary and secondary pseudowires. This configuration is necessary if the peer PEs are connected to a dual-homed device.
|
Step 6
|
exit
Example:
Router(config-pw-class)# service s41 evc 41 vlan 41
|
Exits pseudowire class configuration mode.
|
Step 7
|
l2 vfi name manual
Example:
Router(config)# l2 vfi vpls manual
|
Creates a named Layer 2 Virtual Forwarding Instance (VFI) and enables the Layer 2 VFI manual configuration mode.
Note Perform steps 7 to 10 only if you are configuring PMLACP over VPLS. Else go to step 11.
|
Step 8
|
vpn id vpn-id
Example:
Router(config-vfi)# vpn id 17
|
Configures a VPN ID for the VPLS domain.
|
Step 9
|
neighbor remote-id encapsulation mpls
Example:
Router(config-vfi)# neighbor 1.5.1.1
encapsulation mpls
|
Specifies the remote peering router ID, which is the IP address of the router, and the tunnel encapsulation type for the emulated VC.
|
Step 10
|
exit
Example:
Router(config-vfi)# exit
|
Exits the L2 VFI manual configuration mode.
|
Step 11
|
redundancy
Example:
Router(config)# redundancy
|
Enters redundancy configuration mode.
|
Step 12
|
interchassis group number
Example:
Router(configure-red)# interchassis
group 100
|
Configures an interchassis group within the redundancy configuration mode and assigns a group number.
|
Step 13
|
monitor peer bfd
Example:
Router(configure-r-ic)# monitor peer
bfd
|
Configures the BFD option to monitor the state of the peer.
Note The monitor peer bfd command is optional. If this command is not specified, the default option is route-watch.
|
Step 14
|
member ip IP-address
Example:
Router(configure-r-ic)# member ip
172.3.3.3
|
Configures the IP address of the MLACP peer member group.
|
Step 15
|
mlacp node-id node-id
Example:
Router(config-r-ic)# mlacp node-id 5
|
Specifies the node ID to be used in the LACP port-id field.
node-id — Valid range is 0 - 7, and the value should be different from the peer values.
|
Step 16
|
mlacp system-priority priority
Example:
Router(config-r-ic)# mlacp system-pri-
ority 100
|
Specifies the system priority advertised to the other MLACP members of the redundancy group.
priority — Acceptable range is 1 to 65535. The default value is 32768. The assigned values should be lower than the DHD.
|
Step 17
|
backbone interface interface
Example:
Router(config-r-ic)# continuity-check
|
Specifies the backbone interface for the MLACP configuration.
|
Step 18
|
exit
Example:
Router(config-r-ic)# int TenGigabitEthernet2/0/0
|
Exits the redundancy mode.
|
Step 19
|
interface port-channel number
Example:
Router(config)# interface Port-channel
10
|
Specifies the port-channel interface.
|
Step 20
|
no ip address
Example:
Router(config-if)# no ip address
|
Removes the IP address from the interface.
|
Step 21
|
mlacp interchassis group group-id
Example:
Router(config-if)# mlacp interchassis
group 100
|
Specifies that the port-channel is an MLACP port-channel. The group-id should match the configured redundancy group.
|
Step 22
|
mlacp mode active-active
Example:
Router(config-if)# mlacp mode
active-active
|
Specifies the MLACP mode as active-active.
|
Step 23
|
mlacp load-balance primary vlan range
Example:
Router(config-if)# mlacp load-balance
primary vlan 100-109
|
Specifies the primary VLAN range for manual load balancing.
range — Specifies the VLAN ID range. Values range from 1 to 4094.
|
Step 24
|
mlacp load-balance secondary vlan range
Example:
Router(config-if)# mlacp load-balance
secondary vlan 110-120
|
Specifies the secondary VLAN range for manual load balancing.
|
Step 25
|
ethernet vlan color-block all
Example:
Router(config-if)# ethernet vlan
color-block all
|
Blocks VLANs on EVCs with connect and cross-connect.
devices.
Note This configuration is required if EVC cross connect or MTP is used on the PMLACP port channel.
|
Step 26
|
service instance id ethernet
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance on an interface.
|
Step 27
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 100
|
Configures the encapsulation. Defines the matching criteria to be used in order to map the ingress dot1q frames on an interface to the appropriate service instance.
|
Step 28
|
rewrite ingress tag pop {1 | 2}
symmetric
Example:
Router(config-if-srv)# rewrite ingress
tag pop 1 symmetric
|
Specifies the tag manipulation that is to be performed on the frame in ingress direction to the service instance.
|
Step 29
|
xconnect peer-id vc-id pseudowire-class
pw-classname
or
brige-domain bridge-domain-id
Example:
Router(config-if-srv)# xconnect 3.3.3.3
90 pseudowire-class vpws
|
Binds the 802.1Q VLAN attachment circuit to a virtual circuit (VC).
Binds the attachment circuit to a pseudowire VC.
•peer-id— specifies the IP address of the peer PE router.
•vc-id— specifies the 32-bit value that identifies the VC between the peer PE routers at each endpoint of the VC. You must configure the same VC ID on the peer PE router.
•pw-classname— Specifies the pseudowire class.
Note Use the bridge-domain command if you are configuring PMLACP on VPLS.
|
Step 30
|
backup peer peer-id vc-id pseudow-
ire-class pw-classname
Example:
Router(config-if-srv)# backup peer
4.3.3.3 90 pseudowire-class vpws
|
Specifies a redundant peer for a pseudowire virtual circuit.
|
Step 31
|
exit
Example:
Router(config-if-srv)# end
|
Exits from the interface configuration mode.
|
Step 32
|
interface vlan bridge-domain-id
Example:
Router(config-if)# interface vlan 201
|
Creates or accesses a dynamic switched virtual interface (SVI).
Note You need to perform steps 32 and 33 only if you are configuring VPLS.
|
Step 33
|
xconnect vfi vfi-name
Example:
Router(config-if)# xconnect vfi vpls
|
Specifies the Layer 2 VFI that you are binding to the VLAN port.
|
Step 34
|
end
Example:
Router(config-if)# end
|
Exits the port-channel interface mode.
|
Configuration Examples
This is a configuration example for PMLACP with EVC xconnect on two POAs, A and B. In this example primary VLAN range is configured as 100-109 on router A and 110-120 on router B. The VLAN range is interchanged so that the primary VLAN range of router A becomes the secondary VLAN range in router B and the secondary VLAN range of router A becomes the primary VLAN range in router B.
RouterA# configure terminal
RouterA(config)# pseudowire-class vpws
RouterA(config-pw-class)# encapsulation mpls
RouterA(config-pw-class)# status peer topology dual-homed
RouterA(config-pw-class)# exit
RouterA(config)# l2 vfi vpls manual
RouterA(config-vfi)# vpn id 100
RouterA(config-vfi)# neighbor 3.3.3.3 encapsulation mpls
RouterA(config-vfi)# exit
RouterA(config)# redundancy
RouterA(config-red)# interchassis group 100
RouterA(config-r-ic)# monitor peer bfd
RouterA(config-r-ic)# member ip 2.2.2.2
RouterA(config-r-ic)# backbone interface GigabitEthernet8/0/10
RouterA(config-r-ic)# mlacp system-priority 100
RouterA(config-r-ic)# mlacp node-id 1
Router(config)# interface Port-channel10
RouterA(config-if)# no ip address
RouterA(config-if)# mlacp interchassis group 100
RouterA(config-if)# mlacp mode active-active
RouterA(config-if)# mlacp load-balance primary vlan 100-109
RouterA(config-if)# mlacp load-balance secondary vlan 110-120
RouterA(config-if)# ethernet vlan color-block all
RouterA(config-if)# service instance 10 ethernet
RouterA(config-if-srv)# encapsulation dot1q 100
RouterA(config-if-srv)# rewrite ingress tag pop 1 symmetric
RouterA(config-if-srv)# xconnect 3.3.3.3 90 pseudowire-class vpws
RouterA(config-if-srv)# backup peer 4.3.3.3 91
RouterA(config-if)# service instance 11 ethernet
RouterA(config-if-srv)# encapsulation dot1q 101
RouterA(config-if-srv)# rewrite ingress tag pop 1 symmetric
RouterA(config-if-srv)# bridge-domain 201
RouterA(config-if-srv)# exit
RouterA(config)# interface vlan 201
RouterA(config-if)# no shutdown
RouterA(config-if)# xconnect vfi vpls
RouterB# configure terminal
RouterB(config)# pseudowire-class vpws
RouterB(config-pw-class)# encapsulation mpls
RouterB(config-pw-class)# status peer topology dual-homed
RouterB(config-pw-class)# exit
RouterB(config)# l2 vfi vpls manual
RouterB(config-vfi)# vpn id 100
RouterB(config-vfi)# neighbor 3.3.3.3 encapsulation mpls
RouterB(config-vfi)# exit
RouterB(config)# redundancy
RouterB(config-red)# interchassis group 100
RouterB(config-r-ic)# monitor peer bfd
RouterB(config-r-ic)# member ip 1.1.1.1
RouterB(config-r-ic)# backbone interface GigabitEthernet8/0/10
RouterB(config-r-ic)# mlacp system-priority 100
RouterB(config-r-ic)# mlacp node-id 2
Router(config)# interface Port-channel 10
RouterB(config-if)# no ip address
RouterB(config-if)# mlacp interchassis group 100
RouterB(config-if)# mlacp mode active-active
RouterB(config-if)# mlacp load-balance primary vlan 110-120
RouterB(config-if)# mlacp load-balance secondary vlan 100-109
RouterB(config-if)# ethernet vlan color-block all
RouterB(config-if)# service instance 10 ethernet
RouterB(config-if-srv)# encapsulation dot1q 100
RouterB(config-if-srv)# rewrite ingress tag pop 1 symmetric
RouterB(config-if-srv)# xconnect 3.3.3.3 90 pseudowire-class vpws
RouterB(config-if-srv)# backup peer 4.3.3.3 91
RouterB(config-if)# service instance 11 ethernet
RouterB(config-if-srv)# encapsulation dot1q 101
RouterB(config-if-srv)# rewrite ingress tag pop 1 symmetric
RouterB(config-if-srv)# bridge-domain 201
RouterB(config-if-srv)# exit
RouterB(config)# interface vlan 201
RouterB(config-if)# no shutdown
RouterB(config-if)# xconnect vfi vpls
Verification
Use the show lacp multi-chassis load-balance port-channel number command to verify the PMLACP configuration information on the port channel interface.
PE1# show lacp multi-chassis load-balance port-channel 10
Interface Port-Channel 10
Revertive Mode: Non-Revertive
Primary VLANs: 4001-4002,4004-4005,4007-4010
Secondary VLANs: 4012-4013,4015-4016,4018-4021
Primary VLAN State: Standby
Secondary VLAN State: Standby
Primary VLAN State: Active
Secondary VLAN State: Active
Use the show lacp multi-chassis group command to display the interchassis redundancy group and the operational LACP parameters.
PE1# show lacp multi-chassis group
Interchassis Redundancy Group 100
Operational LACP Parameters:
System-Id: 32768.001b.0de6.3080
Backbone Uplink Status: Connected
System-Id: 32768.001b.0de6.3080
System-Id: 32768.f866.f2d2.6680
Channel State Priority Active Links Inactive Links
Group Local/Peer Local/Peer Local/Peer Local/Peer
10 A/A 32768/32768 2/2 0/0
Redundancy Group 100 (0x64)
Applications connected: mLACP, Pseudo-mLACP
member ip: 2.2.2.2 "PE2", CONNECTED
BFD neighbor: GigabitEthernet2/9, next hop 192.168.41.2, UP
Pseudo-mLACP state: CONNECTED
backbone int GigabitEthernet8/0/9: UP (IP)
ICRM fast-failure detection neighbor table
IP Address Status Type Next-hop IP Interface
========== ====== ==== =========== =========
2.2.2.2 UP BFD 192.168.41.2 GigabitEthernet2/9
Use the show lacp multi-chassis load-balance group command to display the PMLACP configuration information including redundancy group, link states and interface status.
PE2#sh lacp multi-chassis load-balance group
Interchassis Redundancy Group 100
Backbone Uplink Status: Connected
States: Active - ACT Standby - SBY
Down - DN AdminDown - ADN
Unknown - UN Reverting - REV
Interface Port State Local VLAN State Peer VLAN State
ID Local Primary/Secondary Primary/Secondary
Troubleshooting Tips
Table 2-10 Troubleshooting
Command
|
Purpose
|
debug lacp load-balance [all | database |
redundancy-group | vlan]
|
Enables debugging of the PMLACP activity. Use this command from the switch processor (SP).
|
debug redundancy interchassis [all |
application | error | event | monitor]
|
Enables debugging of the interchassis redundancy manager.
|
debug mpls ldp iccp
|
Enables debugging of the Inter Chassis Control Protocol (ICCP). Use this command from the RP.
|
Tips
Configuring Custom Ethertype for EVC Interfaces
Custom Ethertype feature allows you to customize the Ethernet settings on an ES20 line card. This feature enables you to configure an ethertype with the outer tag for dot1Q and QinQ packets. Both EVCs (802.1Q and QinQ) and QinQ routed subinterfaces support custom ethertype. By default Cisco 7600 series router supports Ethertype 0x8100 for dot1Q and Q-in-Q outer tag. You can use the custom ethertype feature to configure the following ethertypes for each port on ES20 line cards:
•0x8100 - 802.1q
•0x9100 - Q-in-Q
•0x9200 - Q-in-Q
•0x88a8 - 802.1ad
Use this command to configure a custom ethertype on a physical port.
dot1q tunneling ethertype <0x88A8 | 0x9100 | 0x9200>
In this sample configuration, Ethertype is set to 0x9100, service instance is created, and rewrite is initiated:
interface GigabitEthernet 1/0/0
dot1q tunneling ethertype 0x9100
service instance <number> ethernet
encapsulation dot1q <vlan 1> [second-dot1q <vlan 2>]
Note 802.1q (0x8100) is the default ethertype setting.
Supported Rewrite Rules for a Custom Ethertype Configuration
Rewriting allows you to add or remove VLAN tags in the packets that are transferred between two customer sites within a service provider network.
These rewrites are supported on a Network Network Interface (NNI):
•Non range on C-Tag on an NNI
•Range on C-Tag on an NNI
Supported Rewrites for Non Range on a C-Tag on an NNI
When a custom ethertype is configured within the NNI physical interface, and VLAN range is not specified, the following rewrites are supported for a provider bridge:
•For encapsulation untagged:
–No rewrite
–Rewrite ingress tag push dot1q vlan1 [second-dot1q vlan2] symmetric
•For encapsulation default:
–No rewrite
•For encapsulation dot1q vlan:
–No rewrite
–Rewrite ingress tag pop 1 symmetric
–Rewrite ingress tag translates 1-to-1 dot1q vlan symmetric
–Rewrite ingress tag translate 1-to-2 dot1q vlan 1 second-dot1q vlan 2 symmetric
•For encapsulation dot1q vlan1 second-dot1q vlan2
–No rewrite
–Rewrite ingress tag pop 1 symmetric
–Rewrite ingress tag pop 2 symmetric
–Rewrite ingress tag translate 1-to-1 dot1q vlan symmetric
–Rewrite ingress tag translate 1-to-2 dot1q vlan 1 second dot1q vlan 2 symmetric
–Rewrite ingress tag translate 2-to-1 dot1q vlan symmetric
–Rewrite ingress tag translate 2-to-2 dot1q vlan 1 second-dot1q vlan 2 symmetric
Supported Rewrites for Range on C-Tag with an NNI
When a VLAN range is specified on the C-Tag, push Rewrites are not supported. These rewrites are supported for a VLAN range on C-Tag:
•For encapsulation dot1q vlan1 - vlan2:
–No rewrite
•For encapsulation dot1q vlan1 second-dot1q vlan2 - vlan3:
–No rewrite
–Rewrite ingress tag pop 1 symmetric
–Rewrite ingress tag translate 1-to-1 dot1q vlan symmetric
–Rewrite ingress tag translate 1-to-2 dot1q vlan 1 second-dot1q vlan 2 symmetric
Note To avoid hierarchical provider bridges during custom ethertype configuration, NNI interface does not support ingress push rewrite except for encap untagged.
Restrictions and Usage Guidelines
Follow these restrictions and usage guidelines while configuring custom ethertype:
•Cisco IOS Release 15.1(1)S supports custom ethertype on port-channels.
•Custom ethertype is configured within a physical interface and is applicable to all service instances and subinterfaces of the physical interface.
•Mixed custom ethertype is not supported. If you configure the ingress interface values as 8100/9100/9200/88a8, then traffic other than the corresponding ethertype in the outer tag is not supported. If a packet is received with outer-tag other than the configured custom ethertype, then it is treated as untagged. However, when a packet with outer tag 8100 is received, it is treated as tagged packet, irrespective of the configured custom ethertype.
•When a custom ethertype is configured on the egress port with connect/cross connect configuration, the egress port does not filter the VLAN, and mismatched VLANs are relayed through the egress port.
•If a custom ethertype is configured on the port-channel, the same ethertype is implicitly configured for all the other member interfaces.
•You cannot configure custom ethertype explicitly under a member interface of a port-channel.
•An interface configured with custom ethertype cannot be a part of port-channel.
This example shows ingress and egress port configuration:
Dot1q tunnel ethertype 0x9100
service instance 1 ethernet
Encap dot1q [second-dot1q]
Dot1q tunneling ethertype 0x9200
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet {ethernet |tengigabit Ethernet}
4. dot1q tunneling ethertype [0x9100| 0x9200| 0x88A8]
5. service instance Ethernet id [Ethernet service name]
6. [no] encapsulation untagged, dot1q {any | vlan-id[vlan-id[vlan-id]} second-dot1q {any | vlan-id[vlan-id[vlan-id]]}
7. Rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id}| 2-to-1 dot1q vlan-id }| 1-to-2 {dot1q vlan-id second-dot1q vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id dot1q vlan-id}} symmetric
8. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port[.subinterface-number]
or
interface tengigabitethernet
slot/subslot/port[.subinterface-number]
Example:
Router# int Gigabit 1/0/0
Router# int Gigabit slot/port ES20
Router# interface Tengigabit
slot/subslot/port
|
Specifies the Gigabit Ethernet or the 10-Gigabit Ethernet interface to configure.
|
Step 4
|
dot1q tunneling ethertype [0x9100|
0x9200| 0x88A8]
Example:
Router# dot1q tunneling ethertype
[0x9100 | 0x9200 | 0x88A8]
|
Configure Custom Ethertype as 9100, 9200, or 88A8 within the physical interface because all service instances on physical interface use the configured Ethertype.
|
Step 5
|
service instance Ethernet id [Ethernet
service name]
Example:
Router# service instance Ethernet <id>
[Ethernet service name]
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 6
|
[no] encapsulation untagged, dot1q {any
| "<vlan-id>[,<vlan-id>[-<vlan-id>]]"}
second-dot1q {any |
"<vlan-id>[,<vlan-id>[-<vlan-id>]]"}
Example:
Router# encap dot1q 100 second dot1q
200
|
Defines the matching criteria that maps the ingress dot1q, QinQ, or untagged frames on an interface for the appropriate service instance.
|
Step 7
|
Rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id dot1q vlan-id} | pop {1 | 2} |
translate {1-to-1 {dot1q vlan-id}|
2-to-1 dot1q vlan-id }| 1-to-2 {dot1q
vlan-id second-dot1q vlan-id dot1q
vlan-id} | 2-to-2 {dot1qvlan-id
second-dot1q vlan-id dot1q vlan-id}}
symmetric
Example:
Router(config-if-srv)# Rewrite ingress
tag push dot1q 20
|
Specifies the Rewrite operation.
|
Step 8
|
exit
Example:
Router(config-if-srv)#exit
|
Exits the configuration mode.
|
Examples
Single Tag Encap with Connect with Custom Ethertype Configured
In this example, custom ethertype is configured on a single tag encap using the connect configuration:
Router#sh running-config int Gi1/0/0
//Building configuration...
interface GigabitEthernet1/0/0
dot1q tunneling ethertype 0x9100
service instance 1 ethernet
interface GigabitEthernet1/0/2
dot1q tunneling ethertype 0x9100
service instance 1 ethernet
Router)#connect LC1 GigabitEthernet 1/0/0 1 GigabitEthernet 1/0/2 1
Single Tag Encap with Bridge Domain
In this example, custom ethertype is configured on a single tag encap using bridge domain configuration:
interface GigabitEthernet1/0/0
dot1q tunneling ethertype 0x9100
service instance 1 ethernet
interface GigabitEthernet1/0/2
dot1q tunneling ethertype 0x9100
service instance 1 ethernet
Single Tag Encap with Cross Connect
In this example, custom ethertype is configured on a single tag encap with cross connect configuration:
interface GigabitEthernet1/0/0
dot1q tunneling ethertype 0x9100
service instance 1 ethernet
xconnect 3.3.3.3 10 encapsulation mpls
interface GigabitEthernet1/0/1
ip address 10.10.10.2 255.255.255.0
Custom Ethertype Support with Sub Interfaces
In this example, custom ethertype is configured on a subinterface. Custom ethertype is always configured within the main physical interface and QinQ encap is configured within the subinterface.
interface GigabitEthernet1/0/0
dot1q tunneling ethertype 0x9100
interface GigabitEthernet1/0/0.10
encapsulation dot1Q 10 second-dot1q 20
ip address 20.20.20.2 255.255.255.0
Verification
Use these commands to verify operations.
Command
|
Purpose
|
Router# show ethernet service instance [id instance-id
| interface interface-id | interface interface-id]
[detail]
|
Displays information about:
•Specific EVCs if an EVC ID is specified.
•All the EVCs on an interface, if an interface is specified.
The detail option provides additional information about the EVC. This can be given on a route processor of a line card console to determine if the Custom Ethertype is configured within a physical port.
|
Configuring Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE
The Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE feature allows service providers to offer triple-play services, residential internet access from a DSLAM, and business Layer 2 and Layer 3 VPN by providing for termination of double-tagged dot1q frames onto a Layer 3 subinterface at the access node.
The access node connects to the DSLAM through the 7600-ESM-2X10GE or 7600-ESM-20X1GE. This provides a flexible way to identify the customer instance by its VLAN tags, and to map the customer instance to different services.
Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE is supported only through Ethernet Virtual Connection Services (EVCS) service instances.
EVCS uses the concepts of EVCs (Ethernet virtual circuits) and service instances. An EVC is an end-to-end representation of a single instance of a Layer 2 service being offered by a provider to a customer. It embodies the different parameters on which the service is being offered. A service instance is the instantiation of an EVC on a given port on a given router.
Figure 2-6 shows a typical metro architecture where the access switch facing the DSLAM provides VLAN translation (selective QinQ) and grooming functionality and where the service routers (SR) provide QinQ termination into a Layer 2 or Layer 3 service.
Figure 2-6
Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE provides the following functionality:
•VLAN connect with local significance (VLAN local switching)
–Single tag Ethernet local switching where the received dot1q tag traffic from one port is cross connected to another port by changing the tag. This is a 1-to-1 mapping service and there is no MAC learning involved.
–Double tag Ethernet local switching where the received double tag traffic from one port is cross connected to another port by changing both tags. The mapping to each double tag combination to the cross-connect is 1-to-1. There is no MAC learning involved.
–Hairpinning:is a cross connect between two EFPS on the same port.
•Selective QinQ (1-to-2 translation)
–Cross connect—Selective QinQ adds an outer tag to the received dot1q traffic and then tunnels it to the remote end with Layer 2 switching or EoMPLS.
•Double tag translation (2-to-2 translation) Layer 2 switching— Two received tagged frames are popped and two new tags are pushed.
–Cross connect—Selective QinQ adds an outer tag to the received dot1q traffic and then tunnels it to the remote end with Layer 2 switching or EoMPLS.
–Layer 2 switching—Selective QinQ adds an outer tag to the received dot1q traffic and then performs Layer 2 switching to allow SVI based on the outer tag for configuring additional services.
•Double tag translation (2-to-2 translation) Layer 2 switching— Two received tagged frames are popped and two new tags are pushed.
•Double tag termination (2-to-1 tag translation)
–Ethernet MultiPoint Bridging over Ethernet (MPBE)—The incoming double tag is uniquely mapped to a single dot1q tag that is then used to do MPBE
–Double tag MPBE—The ingress line uses double tags in the ingress packet to look up the bridging VLAN. The double tags are popped and the egress line card adds new double tags and sends the packet out.
–Double tag routing—Same as regular dot1q tag routing except that double tags are used to identify the hidden VLAN.
•Local VLAN significance—VLAN tags are significant only to the port.
•Scalable EoMPLS VC—Single tag packets are sent across the tunnel.
•QinQ policing and QoS
•Layer 2 protocol data unit (PDU) packet—If the Layer 2 PDUs are tagged, packets are forwarded transparently; if the Layer 2 PDUs are untagged, packets are treated per the physical port configuration.
Restrictions and Usage Guidelines
When configuring Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE, follow these restrictions and usage guidelines:
•Service Scalability:
–Service Instances per port / NP: 8, 000
–Service instances per Line Card: 16, 000
–Service instances per port-channel: 8000. This is subject to the number of members per NP. This value would reduce by the factor of the member links per NP. If the members links are spread across various NPs, then the max number of service instances per port channel is unchanged.
–TCAM Entry Usage: The number of TCAMs an EVC uses depends on the encapsulation configured on the TCAM as shown in the following examples.
Example 1
TCAMS used - 1
Example 2
encap dot1q 200 second dot1q 300
TCAMs used - 1
Example 3
TCAMs used - 2 (one for each encapsulation)
Example 4
TCAMs used - 4
First entry to match vlans 20-23
Second entry to match vlans 24-31
Third entry to match vlans 32-39
Fourth entry to match vlan 40
A range does not always mean multiple TCAMs as shown in the following example where one TCAM entry is used.
Example 5 -
service instance 1 ethernet
service instance 2 ethernet
encap dot1q 2000 second-dot1q 96-127
TCAM usage per EVC : 1
–Service instances per router: 32, 000
–Bridge-domains per router: 4, 000
–Local switching: 16, 000
–Xconnect: 16, 000
–Subinterface: 2, 000
–Number of service instance on a particular domain: 110 per NP
•QoS Scalability:
–Shaping - parent queue is 2,000 and child queue is 16,000
–Marking - parent queue is 2,000 and child queue is 16,000
•Modular QoS CLI (MQC) actions supported include:
–Shaping
–Bandwidth
–Two priority queues per policy
–The set cos command, set cos-inner command, set cos cos-inner command, and set cos-inner cos command
–WRED aggregate
–Queue-limit
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port[.subinterface-number] or interface tengigabitethernet slot/subslot/port[.subinterface-number]
4. [no] service instance id {Ethernet service-name}
5. encapsulation dot1q vlan-id
6. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port[.subinterface-number]
or
interface tengigabitethernet
slot/subslot/port[.subinterface-number]
Example:
Router(config)# interface
gigabitethernet 4/0/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
•subinterface-number—(Optional) Specifies a secondary interface (subinterface) number.
|
Step 4
|
[no] service instance id {Ethernet
[service-name}
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instantiation of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric]
Example:
Router(config-if-srv)# rewrite ingress
tag push dot1q 20
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Examples
Single Tag VLAN Connect
The following example shows a typical configuration of a DSLAM facing port of the first PE router.
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config)# interface TenGigabitEthernet1/0/2
Router(config-if)# service instance 101 ethernet
Router(config-if-srv)# encapsulation dot1q 11
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router# connect EVC1 TenGigabitEthernet1/0/1 100 TenGigabitEthernet1/0/2 101
Double Tag VLAN Connect
In this example, an incoming frame with an outer dot1q tag of 10 and inner tag of 20 enters TenGigabitEthernet1/0/1. It is index directed to TenGigabitEthernet1/0/2 and exits with an outer dot1q tag of 11 and inner tag 21. No MAC learning is involved.
The following example shows a typical configuration of a MPLS core facting port of the first PE router.
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q second-dot1q 20
Router(config-if-srv)# rewrite ingress tag pop 2 symmetric
Router(config)# interface TenGigabitEthernet1/0/2
Router(config-if)# service instance 101 ethernet
Router(config-if-srv)# encapsulation dot1q 11 second-dot1q 21
Router(config-if-srv)# rewrite ingress tag pop 2 symmetric
Router# connect EVC1 TenGigabitEthernet1/0/1 100 TenGigabitEthernet1/0/2 101
Selective QinQ with Connect
This configuration uses EoMPLS to perform packet forwarding. This is index directed.
! DSLAM facing port - single tag packet from link
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 10-20,30,50-60
!L2/QinQ facing port double tag packets
Router(config)# interface TenGigabitEthernet1/0/2
Router(config-if)# service instance 101 ethernet
Router(config-if-srv)# encapsulation dot1q 11 second-dot1q any
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
! connecting service instances
Router# connect EVC1 TenGigabitEthernet1/0/1 100 TenGigabitEthernet1/0/2 101
Selective QinQ with Xconnect
This configuration uses EoMPLS under single tag subinterface to perform packet forwarding. The following example shows a typical configuration of a MPLS core facing port of the second PE router.
DSLAM facing port
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 10-20,30,50-60
Router(config-if-srv)# xconnect 2.2.2.2 999 pw-class vlan-xconnect
Router(config)# interface Loopback1
Router(config-if)# ip address 1.1.1.1 255.255.255.255
MPLS core facing port
Router(config)# interface TenGigabitEthernet2/0/1
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# mpls ip
Router(config-if)# mpls label protocol ldp
Router(config)# interface Loopback1
Router(config-if)# ip address 2.2.2.2 255.255.255.255
CE facing EoMPLS configuration
Router(config)# interface TenGigabitEthernet1/0/2
Router(config-if)# service instance 1000
Router(config-if-srv)# encapsulation dot1q 1000 second-dot1q any
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if-srv)#xconnect 1.1.1.1 999 pw-class vlan-xconnect
Selective QinQ with Layer 2 Switching
This configuration uses Layer 2 Switching to perform packet forwarding. The forwarding mechanism is the same as MPB-E, only the rewrites for each service instance are different.
DSLAM facing port, single tag incoming
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 10-20
Router(config-subif)# bridge-domain 11
QinQ VLAN
Router(config)# interface VLAN11
Router(config)# interface TenGigabitEthernet1/0/2
Router(config-if)# switchport
Router(config-if)# switchport mode trunk
Router(config-if)# switchport trunk vlan allow 11
Double Tag Translation (2-to-2 Tag Translation)
In this case, double-tagged frames are received on ingress. Both tags are popped and two new tags are pushed. The packet is then Layer 2 switched to the bridge-domain VLAN.
QinQ facing port
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 100 second-dot1q 10
Router(config-if-srv)# rewrite ingress tag translate 2-to-2 dot1q 200 second-dot1q 20
second-dot1q 10
Router(config-subif)# bridge-domain 200
QinQ VLAN
Router(config)# interface VLAN200
Router(config)# interface TenGigabitEthernet1/0/2
Router(config-if)# service instance 101 ethernet
Router(config-if-srv)# encapsulation dot1q 200 second-dot1q 20
Router(config-subif)# bridge-domain 200
Double Tag Termination (2 to 1 Tag Translation)
This example falls under the Layer 2 switching case.
Double tag traffic
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 200 second-dot1q 20
Router(config-if-srv)# rewrite ingress tag pop 2 symmetric
Router(config-subif)# bridge-domain 10
Router(config)# interface TenGigabitEthernet1/0/2
Router(config-if)# service instance 101 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-subif)# bridge-domain 10
Router(config)# interface TenGigabitEthernet1/0/3
Router(config-if)# service instance 101 ethernet
Router(config-if-srv)# encapsulation dot1q 30
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-subif)# bridge-domain 10
Verification
Use the following commands to verify operation.
Command
|
Purpose
|
Router# show ethernet service evc [id evc-id | interface interface-id] [detail]
|
Displays information pertaining to a specific EVC if an EVC ID is specified, or pertaining to all EVCs on an interface if an interface is specified. The detailed option provides additional information on the EVC.
|
Router# show ethernet service instance [id instance-id interface interface-id | interface interface-id] [detail]
|
Displays information about one or more service instances: If a service instance ID and interface are specified, only data pertaining to that particular service instance is displayed. If only an interface ID is specified, displays data for all service instances s on the given interface.
|
Router# show ethernet service interface [interface-id] [detail]
|
Displays information in the Port Data Block (PDB).
|
Router# show mpls l2 vc detail
|
Displays detailed information related to the virtual connection (VC).
|
Router# show mpls forwarding (Output should have the label entry l2ckt)
|
Displays the contents of the Multiprotocol Label Switching (MPLS) Label Forwarding Information Base (LFIB).
|
Troubleshooting
Use these debug commands to troubleshoot Flexible QinQ feature.
Debug commands
Command
|
Purpose
|
[no] debug ethernet service evc [id <evc-id>]
|
Enables EVC debugging on the RP. If no EVC ID is specified, debugging is enabled for all EVCs on the system.
|
[no] debug ethernet service instance [id <instance-id> interface <interface-id> | interface <interface-id>]
|
Enables EFP debugging on the RP. If no options are specified, debugging for all EFPs is enabled. If an EFP ID and interface are specified, only those debug messages associatedwith the EFP are displayed as the output. If only an interface is specified, debug messages for all EFPs on that interface is displayed.
|
[no] debug ethernet service interface [<interface-id>]
|
Enables PDB debugging.
|
[no] debug ethernet service api
|
Enables debugging between Ethernet Services Infrastructure and its clients.
|
debug ethernet service oam-mgr
|
Enables OAM Manager debugging, to debug OAM inter-working.
|
[no] debug ethernet service error
|
Enables ethernet service error debugging.
|
[no] debug ethernet service all
|
Enables EI debugging messages for all PDBs, EVCs and EFPs
|
Table 2-11 provides the troubleshooting solutions for the Flexible mapping feature.
Table 2-11
Problem
|
Solution
|
Erroneous TCAM entries.
|
Use the show hw-module subslot subslot tcam command to verify and the TCAM entries. Share the output with TAC for further investigation.
|
Incorrect virtual VLAN IDs on a QinQ subinterface.
|
Use the test hw-mod subslot subslot command to verify the virtual VLAN ID values on a QinQ subinterface. Share the output with TAC for further investigation.
|
Wrong interface configured and tag manipulation incorrectly programmed.
|
Use the command show platform np interface detail to verfiy the interface and tag details. Share the output with TAC for further investigation.
|
VLAN ID is incorrectly programmed
|
Use the command show hw-module subslot subslot tcam all_entries vlan to verify the VLAN ID details. Share the output with TAC for further investigation.
|
Inner, outer start/end VLANs incorrectly programmed.
|
Use the show platform np efp command to verify the VLAN details. Share the output with TAC for further investigation.
|
Erroneous TCAM entries on the platform
|
Use the show plat soft qos tcamfeature and show plat soft qos tcamt commands to verify the TCAM entries. Share the output with TAC for further investigation.
|
Troubleshooting Flexible mapping feature
Configuring Flexible Service Mapping Based on CoS and Ethertype
The Flexible Serivce Mapping based on CoS and Etherytpe feature enhances the current capability of mapping packets to service instance. It uses CoS and Ethertypes to classify traffic into different service instances and consumes less number of VLANs on the module.
Prior to the implementation of this feature, three different VLANs were required to relay voice, data, and video services. This feature distinguishes an EVC based on the CoS value, and implements one EVC with CoS, and another EVC with inner CoS. You can also use the same VLANs for eight different EVCs (CoS values 0-7 = 8 values) saving the usage of VLANs . These EVCs are associated with bridge domain, cross connect (xconnect), and connect.
This feature extends the following capabilities to the current implementation of mapping the service instances:
•Match on a single CoS value (either inner CoS or outer CoS, but not both simultaneously, and applicable only for QinQ).
•Match on a range or list of CoS values when a single VLAN is specified in the encapsulation criteria in dot1q/QinQ EVCs.
•Match support for a single CoS value for a range or list of VLANs. Acceptable range of CoS value is 0-7.
•Match the following supported payload ethertypes
–IPv4 (etype 0x0800)
–IPv6 (etype 0x086dd)
–pppoe-all (0x8863 and 0x8864)
•In the case of QinQ, inner VLAN can have a range when the outer VLAN is a single VLAN.
•Match on range or list of CoS values when both outer and inner VLANs are single.
•Match on ethertype is supported both in the case of a single VLAN or in QinQ.
•Supports pppoe-all command (matches both 0x8863 and 0x8864).
•Matching on pppoe-session and pppoe-discovery commands are individually not supported.
You can use CoS and ethertype to classify the traffic into various service instances to reduce the number of vlans.
Restrictions and Usage Guidelines
When configuring Flexible Service Mapping based on CoS and Ethertype, follow these restrictions and guidelines:
•This release supports pppoe-all (matches both pppoe-discovery and pppoe-session), and does not individually support pppoe-discovery and pppoe-session as ethertypes.
•This feature supports both Dot1Q and QinQ.
•Egress behavior implemented for mismatched CoS and Ethertype forwards the packet without re-write. There is no filtering on egress, based on the CoS or Layer 3 Ethertype. Even if CoS or Etherype mismatches, if egress VLAN information matches, the frames are forwarded.
•Neither pppoe-discovery or pppoe-session are supported individually as Ethertypes. Cisco IOS 12.2(33) SRE release supports pppoe-all.
•Service instances on port-channels are supported.
•You cannot match Etherype and CoS for the same service instance.
•In the case of QinQ, a service instance can match on either outer Cos or inner Cos, but not simultaneously for the same service instance.
•You cannot specify a range or list of outer VLANs in double-tag cases.
•MAC learning occurs with bridge-domain, but does not occur with xconnect and connect.
•Egress checking of VLAN matching does not occur with xconnect and local connect.
Summary Steps
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port or interface port-channel number
4. [no] shut
5. service instance id {Ethernet [service-name]}
6. encapsulation dot1q vlan-id {cos | comma| hyphen| etype} or encapsulation dot1q vlan-id second-dot1q {any | vlan-id[vlan-id[vlan-id]]} or
7. encapsulation dot1q vlan-id cos [0-7] or encapsulation dot1q vlan-id etype [IPv4|IPv6|pppoe-all] or
8. encapsulation dot1Q vlan-id {vlan id} second-dot1q {{any | vlan-id[vlan-id[vlan-id]} } cos {0-7} or
9. encapsulation dot1Q vlan-id {vlan id} second-dot1q {{any | vlan-id[vlan-id[vlan-id]} } etype {etype string} or
10. encapsulation dot1Q vlan-id {vlan id} cos [0-7] second-dot1q {{any | vlan-id[vlan-id[vlan-id]} }
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet slot/port
or
interface tengigabitethernet slot/port
or
interface port-channel number
Example:
Router(config)# interface
gigabitethernet4/0/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/port—Specifies the location of the interface.
•Creates the port-channel interface.
|
Step 4
|
[no] shut
Example:
Router(config-if)# no sh
|
Initiates the selected interface.
|
Step 5
|
service instance id {Ethernet
service-name}
Example:
R1(config-if)#serv inst 1 eth
|
Creates a service instance on the selected ethernet interface.
|
|
Note The commands that follow are used for dot1q or QinQ configurations. Read the purpose of each command to determine which to use.
|
Step 6
|
encapsulation dot1q vlan-id {cos|
comma|hyphen|etype}
Example:
R1(config-if-srv)#encap dot1q 100?
|
Defines the matching criteria to map dot1Q ingress frames on an interface to the appropriate service instance.The value of a VLAN ID is an integer in the range from 1 to 4094. Enter hyphens to separate the starting and ending VLAN IDS used to define a range of VLAN IDs. Available options are CoS and ethertype.
Note If range is used on VLANS, then range on CoS cannot be used, and vice versa.
|
|
or
|
|
encapsulation dot1q vlan-id
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 cos 2-5 second-dot1q 60
|
Defines the matching criteria to map Q-in-Q ingress frames on an interface to the appropriate service instance.
|
or
|
|
encapsulation dot1q vlan-id cos [0-7]
Example:
Router(config-if-srv)# encapsulation
dot1q 100 cos 5-6
|
Specifies the CoS value in the match criteria for the ingress frames on the service instance.
|
or
|
|
encapsulation dot1q vlan-id etype
[IPv4|IPv6|pppoe-all]
Example:
Router(config-if-srv)# encapsulation
dot1q 100 etype ipv4
|
Specifies the payload ethertype value in the match criteria for the ingress frames on the service instance.
|
|
or
|
|
encapsulation dot1Q vlan id
second-dot1q {{any |
vlan-id[vlan-id[vlan-id]}} cos {0-7}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second-dot1q 60 cos 5
|
Specifies the encapsulation for QinQ with inner CoS.
|
|
|
or
|
|
encapsulation dot1Q vlan-id {vlan id}
second-dot1q {{any |
vlan-id[vlan-id[vlan-id]}} etype {etype
string}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second-dot1q 60 etype ipv6
|
Specifies the encapsulation for QinQ with ethertype.
|
|
|
or
|
|
encapsulation dot1Q vlan-id {vlan id}
cos [0-7] second-dot1q {{any |
vlan-id[vlan-id[vlan-id]} }
Example:
Router(config-if-srv)# encapsulation
dot1q 100 cos 2-5 second-dot1q 60
|
Specifies the encapsulation for QinQ with outer CoS.
|
Support Configurations
The following are the supported Ethertype and CoS configurations:
Supported payload ethertype configurations for a single tag:
Router(config)#
interface gigabitethernet 1/1
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q vlan id etype ipv4
Supported payload Ethertype configurations for a double tag:
Router(config)#
interface gigabitethernet 1/1
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q vlan id second-dot1q vlan id etype ipv4
Supported payload Ethertype configurations for a single tag with a single VLAN:
Router(config)#
interface gigabitethernet 1/1
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q 10 etype ipv4
Router(config-if-srv)#
exit
Router(config-if)#
service instance 2 ethernet
Router(config-if-srv)#
encapsulation dot1q 10 etype ipv6
Router(config-if-srv)#
exit
Router(config-if)#
service instance 3 ethernet
Router(config-if-srv)#
encapsulation dot1q 10 etype pppoe-all
Supported payload Ethertype configurations for a single tag with range of VLANs:
Router(config)#
interface gigabitethernet 1/1
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q 11-15 etype ipv4
Router(config-if-srv)#
exit
Router(config-if)#
service instance 2 ethernet
Router(config-if-srv)#
encapsulation dot1q 11-15 etype ipv6
Router(config-if-srv)#
exit
Router(config-if)#
service instance 3 ethernet
Router(config-if-srv)#
encapsulation dot1q 11-15 etype pppoe-all
Supported payload Ethertype configurations for a double tag with no range:
Router(config)#
interface gigabitethernet 1/1
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q 10 second-dot1q 1001 etype ipv4
Router(config-if-srv)#
exit
Router(config-if)#
service instance 2 ethernet
Router(config-if-srv)#
encapsulation dot1q 10 second-dot1q 1001 etype ipv6
Router(config-if-srv)#
exit
Router(config-if)#
service instance 3 ethernet
Router(config-if-srv)#
encapsulation dot1q 10 second-dot1q 1001 etype pppoe-all
Supported payload Ethertype configurations for double tag with range on inner VLANs:
Router(config)#
interface gigabitethernet 1/1
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q 10 second-dot1q 11-15 etype ipv4
Router(config-if-srv)#
exit
Router(config-if-srv)#
encapsulation dot1q 10 second-dot1q 11-15 etype ipv6
Router(config-if-srv)#
exit
Router(config-if-srv)#
encapsulation dot1q 10 second-dot1q 11-15 etype pppoe-all
Supported CoS configurations for a single tag:
Router(config)# interface gigabitethernet 1/1
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 100 cos 5
Router(config)# interface gigabitethernet 1/1
Router(config-if)# service instance 2 ethernet
Router(config-if-srv)# encapsulation dot1q 100 cos 6-7
Router(config)# interface gigabitethernet 1/1
Router(config-if)# service instance 3 ethernet
Router(config-if-srv)# encapsulation dot1q 100 cos 0-3
Supported CoS configurations for a double tag:
Inner Cos:
Router(config)# interface gigabitethernet 1/1
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 100 second-dot1q 60 cos 5
Outer CoS:
Router(config-if)#
service instance 2 ethernet
Router(config-if-srv)#
encapsulation dot1q 100 cos 5 second-dot1q 200
The following example displays EVCs with encap dot1q and CoS within a bridge domain:
R1#
sh runn int gi 3/0/11
Building configuration...
Current configuration : 84 bytes
interface GigabitEthernet3/0/11
R1# sh runn int gi 3/0/12
Building configuration...
Current configuration : 72 bytes
interface GigabitEthernet3/0/12
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# int gi 3/0/11
R1(config-if)# serv inst 1 eth
R1(config-if-srv)# encap dot1q 100 ?
etype payload ethertype after Vlan Field
second-dot1q inner 802.1Q Virtual LAN or C-VLAN
R1(config-if-srv)# encap dot1q 100 cos ?
R1(config-if-srv)# encap dot1q 100 cos 5
R1(config-if-srv)# bridge-domain 202
R1(config-if-srv)# int gi 3/0/12
R1(config-if)# serv inst 1 eth
R1(config-if-srv)# encap dot1q 100 cos 5
R1(config-if-srv)# bridge-domain 202
Bridge-domain 202 (2 ports in all)
State: UP Mac learning: Enabled
GigabitEthernet3/0/11 service instance 1
GigabitEthernet3/0/12 service instance 1
The following example shows EVC with encap dot1q and etype ipv4 with bridge-domain:
R1(config)# int gi 3/0/11
R1(config-if)# serv inst 1 eth
R1(config-if-srv)# encap dot1q 100 etype ?
R1(config-if-srv)# encap dot1q 100 etype ipv4
R1(config-if-srv)# bridge-domain 202
R1(config-if-srv)# int gi 3/0/12
R1(config-if)# serv inst 1 eth
R1(config-if-srv)# encap dot1q 100 etype ipv4
R1(config-if-srv)# bridge-domain 202
Bridge-domain 202 (2 ports in all)
State: UP Mac learning: Enabled
GigabitEthernet3/0/11 service instance 1
GigabitEthernet3/0/12 service instance 1
Supported payload ether type configurations for a single tag:
service instance 1 ethernet
encapsulation dot1q
100 etype ipv4
Supported payload ether type configurations for a double tag:
service instance 2 ethernet
encapsulation dot1q 100 second-dot1q 60 etype ipv6
service instance 3 ethernet
encapsulation dot1q 100 second-dot1q 60 etype ipv4
service instance 4 ethernet
encapsulation dot1q 100 second-dot1q 60 etype pppoe-all
Supported CoS configurations for a single tag:
service instance 1 ethernet
encapsulation dot1q 100 cos 5
SupportedCoS configurations for a double tag:
service instance 2 ethernet
encapsulation dot1q 100 second-dot1q 60 cos 5
service instance 3 ethernet
encapsulation dot1q 100 cos 6-7 second-dot1q 60
Supported CoS configurations for local connect:
Router(config)#
interface TenGigabitEthernet2/3
Router(config-if)#
no ip address
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q 2 second-dot1q 2-3 cos 5
Router(config)#
interface TenGigabitEthernet2/4
Router(config-if)#
no ip address
Router(config-if)#
service instance 1 ethernet
Router(config-if-srv)#
encapsulation dot1q 2 second-dot1q 2-3 cos 5
Router(config-if-srv)#
connect local1 te2/3 1 te2/4 1
Supported flexible service mapping configurations for cross connect:
Router 1(config)#
interface TenGigabitEthernet2/3
Router 1(config-if)#
no ip address
Router 1(config-if)#
service instance 1 ethernet
Router 1(config-if-srv)#
encapsulation dot1q 2 second-dot1q 2-3 cos 5
Router 1(config-if-srv)#
xconnect 75.1.1.5 10000 encapsulation mpls
Router 1(config-if-srv)#
end
The peer side router configuration is below:
Router 2(config)#
interface GigabitEthernet3/0/14
Router 2(config-if)#
no ip address
Router 2(config-if)#
service instance 1 ethernet
Router 2(config-if-srv)#
encapsulation dot1q 2 second-dot1q 2-3 cos 5
Router 2(config-if-srv)#
xconnect 75.1.1.1 10000 encapsulation mpls
Router 2(config-if-srv)#
end
Verification
Use the following commands to verify operation.
Command
|
Purpose
|
Router# show ethernet service instance [detail | id id interface type number [detail | mac security [address | last violation | statistics] | platform | stats] | interface type number [detail | platform | stats | summary] | mac security [address | last violation | statistics] | platform | policy-map | stats | summary]
|
Displays information about one or more service instances: If a service instance ID and interface are specified, only data pertaining to that particular service instance is displayed. If only an interface ID is specified, displays data for all service instances on the given interface.
|
Router# show bridge-domain [bridge-id [mac security [address | last violation | statistics] | split-horizon [group {group-number | all | none}]] | stats]
|
Displays the bridge domain information.
|
Sample output for the show ethernet service instance command:
Router# show ethernet service instance id 5 interface gigabitethernet3/1 detail
Associated Interface: GigabitEthernet3/1
Encapsulation: dot1q 11 vlan protocol type 0x8100 cos 3
Interface Dot1q Tunnel Ethertype: 0x8100
Pkts In Bytes In Pkts Out Bytes Out
2253215 225321500 2248193 224819300
Sample output for the show ethernet service instance stats command:
Router 1# show ethernet service instance interface port-channel stats
Port maximum number of service instances: 8000
Service Instance 1, Interface Port-channel
Pkts In Bytes In Pkts Out Bytes Out
2253215 225321500 2248193 224819300
Service Instance 2, Interface Port-channel
Pkts In Bytes In Pkts Out Bytes Out
2253215 225321500 2248193 224819300
Service Instance 3, Interface Port-channel
Pkts In Bytes In Pkts Out Bytes Out
2253215 225321500 2248193 224819300
Router 1# show ethernet service instance interface port-channel detail
Associated Interface: Port-channel
Port-channel load-balance interface: None
Encapsulation: dot1q 10 vlan protocol type 0x8100 second-dot1q 50 vlan protocol type
0x8100 cos 5
Interface Dot1q Tunnel Ethertype: 0x8100
Pkts In Bytes In Pkts Out Bytes Out
2253215 225321500 2248193 224819300
Microblock type: Bridge-domain
Associated Interface: Port-channel1
Port-channel load-balance interface: None
Encapsulation: dot1q 101 vlan protocol type 0x8100 second-dot1q 205 vlan protocol type
0x8100 payload etype pppoe-all
Interface Dot1q Tunnel Ethertype: 0x8100
Pkts In Bytes In Pkts Out Bytes Out
2253215 225321500 2248193 224819300
Microblock type: Bridge-domain
Associated Interface: Port-channel
Port-channel load-balance interface: None
Encapsulation: dot1q 5 vlan protocol type 0x8100 cos 6-7
Interface Dot1q Tunnel Ethertype: 0x8100
Pkts In Bytes In Pkts Out Bytes Out
2253215 225321500 2248193 224819300
Microblock type: Bridge-domain
Router 1# sh run int port-channel
Building configuration...
Current configuration : 361 bytes
service instance 1 ethernet
encapsulation dot1q 10 second-dot1q 50 cos 5
! service instance 2 ethernet
encapsulation dot1q 101 second-dot1q 205 etype pppoe-all
! service instance 3 ethernet
encapsulation dot1q 5 cos 6-7
Configuring MultiPoint Bridging over Ethernet on 7600-ESM-2X10GE and 7600-ESM-20X1GE
The MultiPoint Bridging over Ethernet (MPBE) on 7600-ESM-2X10GE and 7600-ESM-20X1GE feature provides Ethernet LAN switching with MAC learning, local VLAN significance, and full QoS support. MPBE also provides Layer 2 switchport-like features without the full switchport implementation. MPBE is supported only through Ethernet Virtual Connection Services (EVCS) service instances.
EVCS uses the concepts of EVCs (Ethernet virtual circuits) and service instances. An EVC is an end-to-end representation of a single instance of a Layer 2 service being offered by a provider to a customer. It embodies the different parameters on which the service is being offered. A service instance is the instantiation of an EVC on a given port on a given router.
For MPBE, an EVC packet filtering capability prevents leaking of broadcast/multicast bridge-domain traffic packets from one service instance to another. Filtering occurs before and after the rewrite to ensure that the packet goes only to the intended service instance.
You can use MPBE to:
•Simultaneously configure Layer 2 and Layer 3 services such as Layer 2 VPN, Layer 3 VPN, and Layer 2 bridging on the same physical port.
•Define a broadcast domain in a system. Customer instances that are part of a broadcast domain can be in the same physical port or in different ports.
•Configure multiple service instances with different encapsulations and map them to a single bridge domain.
•Perform local switching between service instances on the same bridge domain.
•Span across different physical interfaces using service instances that are part of the same bridge domain.
•Use encapsulation VLANs as locally significant (physical port).
•Replicate flooded packets from the core to all service instances on the bridge domain.
•Configure a Layer 2 tunneling service or Layer 3 terminating service on the bridge domain VLAN.
MPBE accomplishes this by manipulating VLAN tags for each service instance and mapping the manipulated VLAN tags to Layer 2 or Layer 3 services. Possible VLAN tag manipulations include:
•Single tag termination
•Single tag tunneling
•Single tag translation
•Double tag termination
•Double tag tunneling
•Double tag translation
•Selective QinQ translation
Restrictions and Usage Guidelines
When configuring the MultiPoint Bridging over Ethernet on 7600-ESM-2X10GE and 7600-ESM-20X1GE feature, follow these restrictions and usage guidelines:
•Each service instance is considered as a separate circuit on the bridge-domain.
•Encapsulation can be dot1q or QinQ packets.
•60 MPB VCs per 10G Complex ( or 120 MPB VCs per ES20 line card) are supported on one bridge-domain.
•IGMP snooping is supported with MPB VCs.
•Split Horizon is supported with MPB VCs.
•BPDU packets are either tunneled or dropped.
•For ingress policing, only the drop action and the accept action for the police command are supported. Marking is not supported as part of the policing.
•Ingress shaping is not supported.
•For ingress marking, supports match vlan command, match vlan-inner command, match cos command, match cos-inner command, set cos command, and set cos-inner command.
•For egress marking, set cos command and set cos-inner command are supported; match inner-cos command and match inner-vlan command are not supported.
Summary Steps
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port[.subinterface-number] or interface tengigabitethernet slot/subslot/port[.subinterface-number]
4. [no] service instance id {Ethernet [service-name}
5. encapsulation dot1q vlan-id
6. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
7. [no] bridge-domain bridge-id
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port[.subinterface-number]
or
interface tengigabitethernet
slot/subslot/port[.subinterface-number]
Example:
Router(config)# interface
gigabitethernet4/0/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
•subinterface-number—(Optional) Specifies a secondary interface (subinterface) number.
|
Step 4
|
[no] service instance id {Ethernet
[service-name}
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instantiation of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 10
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
[no] rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric]
Example:
Router(config-if-srv)# rewrite ingress
tag push dot1q 200
|
This command specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
Note If this command is not configured, then the frame is left intact on ingress (the service instance is equivalent to a trunk port).
|
Step 7
|
[no] bridge-domain bridge-id
Example:
Router(config-subif)# bridge domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Examples
Single Tag Termination Example
In this example, the single tag termination unidentified customers based on a single VLAN tag and maps the single-VLAN tag to the bridge-domain.
Router(config)# interface TenGigabitEthernet1/2/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if-srv)# bridge domain 12
Single Tag Tunneling Example
In this single tag tunneling example, the incoming VLAN tag is not removed but continues with the packet.
Router(config)# interface TenGigabitEthernet1/2/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# bridge-domain 200
Single Tag Translation Example
In this single-tag translation example, the incoming VLAN tag is removed and VLAN 200 is added to the packet.
Router(config)# interface TenGigabitEthernet3/0/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# rewrite ingress tag translate 1-to-1 dot1q 200 symmetric
Router(config-if-srv)# bridge-domain 200
Double Tag Termination Configuration Example
In this double-tag termination example, the ingress receives double tags that identify the bridge VLAN; the double tags are stripped (terminated) from the packet.
Router(config)# interface TenGigabitEthernet2/0/0
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 10 inner 20
Router(config-if-srv)# rewrite ingress tag pop 2 symmetric
Router(config-if-srv)# bridge-domain 200
Router(config-if)# service instance 2
Router(config-if-srv)# encapsulation dot1q 40 inner 30
Router(config-if-srv)# rewrite ingress tag pop 2 symmetric
Router(config-if-srv)# bridge-domain 200
Double-Tag Translation Configuration Example
In this example, double tagged frames are received on ingress. Both tags are popped and two new tags are pushed. The packet is then Layer 2-switched to the bridge-domain VLAN.
Router(config)# interface TenGigabitEthernet1/0/0
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 10 second-dot1q 20
Router(config-if-srv)# rewrite ingress tag translate 2-to-2 dot1q 40 second-dot1q 30
symmetric
Router(config-if-srv)# bridge-domain 200
Router(config-if)# service instance 2 ethernet
Router(config-if-srv)# encapsulation dot1q 40 second-dot1q 30
Router(config-if-srv)# rewrite ingress tag translate 2-to-2 dot1q 10 second-dot1q 20
symmetric
Router(config-if-srv)# bridge-domain 200
Selective QinQ Configuration Example
In this example, a range of VLANs is configured and plugged into a single MPB VC.
Router(config)# interface TenGigabitEthernet1/0/0
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 10-20
Router(config-if-srv)# bridge-domain 200
Router(config)# interface TenGigabitEthernet2/0/0
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 10-30
Router(config-if-srv)# bridge-domain 200
Untagged Traffic Configuration Example
In this example, untagged traffic is bridged to the bridge domain and forwarded to the switchport trunk.
Router(config)# interface GigabitEthernet2/0/1
Router(config-if)# no ip address
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation untagged
Router(config-if-srv)# bridge-domain 11
Router(config)# interface TenGigabitEthernet1/0/0
Router(config-if)# switchport
Router(config-if)# switchport mode trunk
Router(config-if)# switchport allowed vlan 11
MPBE with Split Horizon Configuration Example
In this example, unknown unicast traffic is flooded on the bridge domain except for the interface from which the traffic originated.
Router(config)# interface GigabitEthernet2/0/0
Router(config-if)# no ip address
Router(config-if)# service instance 1000 ethernet
Router(config-if-srv)# encapsulation dot1q 100 second-dot1q 10-20
Router(config-if-srv)# bridge-domain 100 split-horizon
Router(config-if)# service instance 1001 ethernet
Router(config-if-srv)# encapsulation dot1q 101 second-dot1q 21-30
Router(config-if-srv)# bridge-domain 101 split-horizon
Router(config-if)# service instance 1010 ethernet
Router(config-if-srv)# encapsulation dot1q 100
Router(config-if-srv)# rewrite ingress tag symmetric translate 1-to-2 dot1q 10
second-dot1q 100 symmetric
Router(config-if-srv)# bridge-domain 10 split-horizon
Router(config-if)# mls qos trust dscp
In this example, service instances are configured on Ethernet interfaces and terminated on the bridge domain.
Router(config)# interface GigabitEthernet2/0/0
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 1000
Router(config-if-srv)# bridge-domain 10
Router(config)# interface GigabitEthernet1/0/0
Router(config-if)# switchport
Router(config-if)# switchport mode trunk
Router(config-if)# switchport trunk allowed vlan 10
In this example, VPLS is configured in the core with multiple bridge domains.
neighbor 20.0.0.2 encapsulation mpls
neighbor 20.0.0.2 encapsulation mpls
neighbor 20.0.0.2 encapsulation mpls
Verification
Use the following commands to verify operation.
Command
|
Purpose
|
Router# show ethernet service evc [id evc-id | interface interface-id] [detail]
|
Displays information pertaining to a specific EVC if an EVC ID is specified, or pertaining to all EVCs on an interface if an interface is specified. The detailed option provides additional information on the EVC.
|
Router# show ethernet service instance [id instance-id interface interface-id | interface interface-id] [detail]
|
Displays information about one or more service instances: If a service instance ID and interface are specified, only data pertaining to that particular service instance is displayed. If only an interface ID is specified, displays data for all service instances s on the given interface.
|
Router# show ethernet service interface [interface-id] [detail]
|
Displays information in the Port Data Block (PDB).
|
Router# show mpls l2 vc detail
|
Displays detailed information related to the virtual connection (VC).
|
Router# show mpls forwarding (Output should have the label entry l2ckt)
|
Displays the contents of the Multiprotocol Label Switching (MPLS) Label Forwarding Information Base (LFIB).
|
.
Configuring Gigabit Ethernet Link Aggregation with Advanced Load Balancing
When you configure an Ethernet Flow Point (EFP) within a port-channel interface, you can specify a primary and multiple backup member-links to use as the egress interface for that EFP when the interface state is set to UP and it is part of the port-channel group. When the preferred member link is not available (interface is state is set to DOWN or not part of the port-channel group), a backup member link is used to manually load balance the EFP traffic over the port-channel. For each port-channel member link, you can configure a unique link ID within an acceptable range of 1-16 within the channel group. For each of the member links, you can specify a list of Ethernet Virtual Connections (EVC)s in the member link to relay egress traffic.
If none of the backup links are available, or you have not configured the primary or the backup links, the router selects an egress interface for the specific EFP. The backup link is selected based on the order of the configured list of backup link IDs. The first backup link in the list is used if available or the next backup link in the list is used. This continues until an available backup link is found.
In bridge domains, ingress traffic can access any port with an EFP in the same bridge domain and port channel. In local switching (connect) and cross-connect (xconnect), ingress traffic is received at the EVC port specified in the connect or cross-connect configurations.
To associate an EFP, or a set of EFPs to an EFP Port channel member link, you should:
•Assign a link ID to the port-channel member link at the interface configuration level.
•Associate a list of EFPs to an egress member link in the port-channel interface configuration level.
Restriction and Usage Guidelines
Follow these restrictions and guidelines when you configure a Gigabit Ethernet Link Aggregation with Link Aggregation Control Protocol with Advanced Load Balancing:
•When you configure a link ID for a port-channel member link, and configure that member link as the preferred egress link for the same service instances in that port-channel and the traffic is redistributed based on the following scenarios:
– Service instances configured to be relayed over the preferred egress member links are relayed over the preferred member link. This is an expected behavior.
•If you have not configured the preferred member link, traffic is not redistributed based on the following scenarios:
–For example, if there are 8 member links in a port-channel, the port manager allocates the load share of the member links as follows:
Member 1 - Load share bit 0, Member 2 - Load share bit 1,
Member 3 - Load share bit 2, Member 4 - Load share bit 3,
Member 5 - Load share bit 4, Member 6 - Load share bit 5,
Member 6 - Load share bit 6, Member 7 - Load share bit 7.
When you configure Member 1 with link ID 2, the port manager allocates the load share bit of 2 to member 1. So, the new assignments are:
Member 1 - Load share bit 2, Member 3 - Load share bit 0 [Load share of the other members remain the same].
If the platform relays data over an egress link that has the load share bit 2, before the user has configured the link ID = 2 for Member 1, this EFP traffic is relayed over Member 3. After the user configuration happens, member 1 has the load share bit = 2, this traffic is relayed over member 1. The reverse also happens; traffic relayed over member 1 before the user configuration is relayed over member 3.
SUMMARY STEPS TO ASSIGN A LINK ID TO THE PORT- CHANNEL MEMBER LINK
1. enable
2. configure terminal
3. interface gigabitethernet type|slot|port
4. channel-group {group} mode {active | on | passive} {link {ID}
5. exit
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
type/slot/port
Example:
Router(config)#interface
gigabitethernet 4/0/0
|
Specifies the Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
channel-group channel-group-number mode
{active | on | passive} link id
Router(config-if)#channel-group 100
mode on link 1
|
Assigns a link identifier to load balance the links in the channel group.
|
Step 5
|
exit
|
Exits the configuration mode.
|
DETAILED STEPS TO ASSIGN A LINK ID TO THE PORT- CHANNEL MEMBER LINK
SUMMARY STEPS TO CREATE EVCS AND RELAY EGRESS TRAFFIC THROUGH ITS MEMBER LINKS
1. enable
2. configure terminal
3. interface PortChannel {ID}
4. PortChannel load-balance link {ID}
5. backup link {ID1} [...[ID8]]
6. service-instance {service instance list}
7. exit
8. enable
9. configure terminal
10. interface gigabitethernet type| slot|port
11. channel-group {group} mode {mode} {link {ID}}
DETAILED STEPS TO CREATE EVCS AND RELAY EGRESS TRAFFIC THROUGH ITS MEMBER LINKS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface PortChannel{ID}
Example:
Router#(config)#interface PortChannel
100
|
Specifies the port-channel interface.
|
Step 4
|
PortChannel load-balance link {ID}
Example:
Router(config-if)#port-channel
load-balance link 1
|
Assigns the link ID used for egress load balancing.
|
Step 5
|
backup link {ID1} [...[ID8]]
Example:
Router#(config-if-lb)#backup link 3
|
Configures the backup link ID of a member link.
|
Step 6
|
service-instance {service instance
list}
Example:
Router#(config-if-lb)#service-instance
1
|
Configures a list of ethernet service instances whose egress traffic over the member link identified by Step 4.
|
Step 7
|
exit
Example:
Router#(config-if-lb)#exit
|
Exits from port-channel load-balance config mode.
|
Step 8
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 9
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 10
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)#interface
gigabitethernet 4/0/0
|
Specifies the Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 11
|
channel-group {group} mode {mode}
{link| link {ID}
Example:
Router(config-if)#channel-group 100
mode on link 2
|
Associates the specified member link to the EVC.
|
Examples
The following example shows the assignment of a link identified to a port-channel member link and its running configuration.
Router-EoM1#show runn int Gig 3/0/2
Building configuration...
Current configuration : 149 bytes
interface GigabitEthernet3/0/2
ip arp inspection limit none
channel-group 100 mode on link 2
Router-EoM1#show runn int Gig 3/0/3
Building configuration...
Current configuration : 119 bytes
interface GigabitEthernet3/0/3
channel-group 100 mode on link 3
Router-EoM1#show runn int PortChannel 100
Building configuration...
Current configuration : 350 bytes
PortChannel load-balance link 1
PortChannel load-balance link 2
service instance 1 ethernet
service instance 2 ethernet
Router-EoM1#show etherchannel summary
Flags: D - down P - bundled in PortChannel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
U - in use f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
Number of channel-groups in use: 2
Group PortChannel Protocol Ports
------+-------------+-----------+-----------------------------------------------
100 Po100(RU) - Gi3/0/1(P) Gi3/0/2(P) Gi3/0/3(P)
The following example shows the creation of EVCS and relaying the egress traffic through its member links.switchport
Router-EoM1#
show ethernet service instance load-balance
Manually Assigned Load-Balancing Status for PortChannel100
Link ID 1: GigabitEthernet3/0/1 (Active)
Backup: Link ID 3 GigabitEthernet3/0/3
Link ID 2: GigabitEthernet3/0/2 (Active)
Backup: Link ID 3 GigabitEthernet3/0/3
Port maximum number of service instances: 8000
Service Instance 1, Interface PortChannel100
Pkts In Bytes In Pkts Out Bytes Out
Service Instance 2, Interface PortChannel100
Pkts In Bytes In Pkts Out Bytes Out
Router-EoM1#show ethernet service instance interface PortChannel 100 lo
Router-EoM1#$et service instance interface PortChannel 100 load-balance
Manually Assigned Load-Balancing Status for PortChannel100
Link ID 1: GigabitEthernet3/0/1 (Active)
Backup: Link ID 3 GigabitEthernet3/0/3
Link ID 2: GigabitEthernet3/0/2 (Active)
Backup: Link ID 3 GigabitEthernet3/0/3
Router-EoM1#$et service instance interface PortChannel 100 summ
Router-EoM1#$et service instance interface PortChannel 100 summary
Associated interface: PortChannel100
Total Up AdminDo Down ErrorDi Unknown Deleted BdAdmDo
Router-EoM1#show etherchannel ?
<1-564> Channel group number
detail Detail information
load-balance Load-balance/frame-distribution scheme among ports in
PortChannel PortChannel information
protocol protocol enabled
summary One-line summary per channel-group
Router-EoM1#show etherchannel Por
Router-EoM1#show etherchannel Port-c
Router-EoM1#show etherchannel PortChannel 100 ?
Router-EoM1#show etherchannel Port-channe
Router-EoM1#show etherchannel PortChannel ?
Router-EoM1#show etherchannel PortChannel
ESM-20G-3#show platform interface PortChannel 100 efp all
index 0x10000001 if_number 38 efp ID 1
slot 3 port 2 pseudo_slotunit 140
slot 3 port 3 pseudo_slotunit 138
slot 3 port 4 pseudo_slotunit 136
egress interface: Gi3/0/1
index 0x10000002 if_number 38 efp ID 2
slot 3 port 2 pseudo_slotunit 141
slot 3 port 3 pseudo_slotunit 139
slot 3 port 4 pseudo_slotunit 137
egress interface: Gi3/0/2
Verification
Use the following commands to verify operation.
Table 2-12 Commands for Displaying Traffic Storm Control Status and Configuration
Command
|
Purpose
|
Router# show ethernet service instance interface interface
load-balance
|
Displays the current egress memberlink assignments for service instances configured with port-channel load-balancing.
|
Router# show ethernet service instance id <efp> interface
port-channel <group> detail
|
Displays detailed status for the specified service instance, including the egress memberlink assignment, if any.
|
Troubleshooting Load Balancing Features
Table Table 2-13 provides troubleshooting solutions for the LoadBalancing features.
Table 2-13 Troubleshooting Scenarios for Load Balancing features
Problem
|
Solution
|
Link group creation command is rejected with an error message "Incomplete command".
|
Re-configure the link group with the specific link ID and these keywords:
•port-channel load-balance link:<< Missing link ID>>
•no port-channel load-balance link : << Missing link ID>>
•default port-channel load-balance link: << Missing link ID
•port-channel load-balance: << Missing 'link' keyword
•port-channel: << Missing 'load-balance' keyword>>
|
Error message "Invalid input detected".
|
Re-configure the link group with valid IDs.
|
Back up link command is rejected and an error message displayed
|
Ensure that:
•The back up link ID does not overlap with the primary link ID.
•You have not exceeded the permissible number of back up links.
•You have not entered a sub-mode command in a deleted load-balance group.
|
Invalid input
|
1. Execute the show run command to confirm if duplicate back up link IDs exists between two link groups.
2. Ensure that the configured EFPs have valid IDs.
3. Ensure that you have not configured an existing EFP ID in a different link group.
|
Member link is disabled
|
Use the show etherchannel port-channel command to verify the load share of each member link. Study the derived output and share the information with TAC for further investigation.
|
Traffic is not dsitributed equally among all members (Port channel load balancing issue)
|
Use the show ethernet service instance interface port-channel load-balance command to verify the load balancing information for all the port channels. Share the output with TAC for further investigation.
|
Traffic is not dsitributed equally among all members (EFP load balancing issues)
|
Use the show ethernet service instance id efp interface port-channel group detail command to verify and display the the load balancing information for the EFPs. Share the output with TAC for further investigation.
|
Configuring Virtual Private LAN Service (VPLS) with Port-Channel as a Core Interface
Virtual Private LAN Service interconnects geographically disparate LAN segments as a single bridged domain over a packet switched network, such as MPLS Core.
The current Cisco IOS L2VPN implementation builds a point-to-point connection to interconnect the VCs of peer customer sites. To communicate directly among all the L2VPN sites, a distinct emulated VC is created between each pair of peer VCs. For instance, when two sites of the same L2VPN is connected to the same Provider Edge (PE) router, two separate emulated VCs are mapped to the remote site instead of sharing a common emulated VC.
For an L2VPN customer who uses the service provider backbone to interconnect its LAN segments, the multi-access broadcast network is transformed into a fully meshed point-to-point network. This requires extensive reconfiguration on the existing Customer Edge (CE) devices.
In a VPLS deployment model, the service provider backbone network acts as a logical bridge. The topology and signaling of the backbone is transparent to the interconnected LAN segments.
You can use this feature to:
•Configure VPLS/H-VPLS on the port-channel interfaces of the ES20 line card as a core facing interface to provide port-channel member link redundancy and load balancing. The load-balancing is per-flow based, i.e. traffic of a VPLS VC is loadbalanced across member links based on the flow. For more information on the advanced load balancing options, see "Fat Pseudo-Wire Load Balancing" section and "Provider Router Load Balancing" section.
• Match the capabilities and requirements of the VPLS in a single link. Due to multiple links in a Link Aggregation Group, the packets of a particular flow are always transmitted only to one link.
•Configure VPLS with port-channel interfaces as the core facing interface, where the member links of the port-channel are from a ES20 or a ES40 line card.
TE-FRR Support on VPLS LAG NNI
In an MPLS environment, traffic engineering (TE) provides a fast protection mechanism for link and node failures using fast reroute (FRR). On the Cisco 7600 series router, TE/FRR across port channel bundles is supported using Bidirectional Forwarding Detection (BFD), Reservation Protocol (RSVP) fast hello packets, min-link or max-bundle configuration. The default interval for hello packets is 200 milliseconds. It takes three hello packets (600 milliseconds) to detect the downtime of a bundle.
The Link Aggregation Control Protocol (LACP) fast switchover with fast link detection, takes about 200 to 600 milliseconds from the time a link has failed to the time the line card has processed the membership change request. TE/FRR measurements are highly dependent on LACP convergence, RSVP fast hello intervals, and LTL programming.
Traffic engineering fast reroute (TE-FRR) for VPLS over port-channel (PoCH) is supported in Cisco IOS Release 15.0(1)S.
For more information on MPLS TE- FRR, see the MPLS Traffic Engineering (TE) - Fast Reroute (FRR) Link and Node Protection feature guide at the following url:
http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_te_frr_node_prot.html
Load Balancing
Load balancing ensures that the packets reach their destination in an orderly fashion. You can use the port-channel as the core facing interface in the PE routers to load balance per flow for the VCs mapped to this port-channel. To maintain the load balancing at the PE routers, you can use Fat Pseudo-Wire Load Balancing and Provider Router Load Balancing.
Fat Pseudo-Wire Load Balancing
Fat pseudo-wire load balancing balances the VPLS VC traffic across the core network. An additional load balance label is inserted along with the VPLS VC labels such as VC label, and IGP label at the PE side. The remote end PE removes the load-balance label on the packet. For a single VC, the load-balance label is calculated based on the flow information of a VC.
At the core router, you can use the fat pseudo-wire to perform the following load balancing types:
•Equal Cost Multi-Path (ECMP): In a core network, multiple ECMP paths are used to reach the remote PE. Application of the load-balance label balances the traffic load across the multiple paths. This is because the load-balance label is different for different flows of a VC,and the hash algorithm using the mpls label for load-balancing generates a different hash to distribute the traffic.
•Port-channel: In a core network, if the selected path is a port-channel, the member links are load balanced due to modifications in the load balance label.
You can use the platform vfi load-balance-label vlan [vlan|vlan-vlan] command to configure the Fat pseudo-wire load balancing per vlan on a PE router. This is irrespective of the core facing interface being a port-channel or a non port-channel.
Provider Router Load Balancing
This is not supported in the ES20 line card. For more information about its support on a ES40 line card, see Cisco 7600 Series Ethernet Services + Line Card Configuration Guide located at the following URL:
http://www.cisco.com/en/US/docs/routers/7600/install_config/ES40_config_guide/es40_sw_config.html
BPDU PW Over LAG NNI
BPDU PW can be provisioned over a port channel interface. Provisioning BPDU PW on a port channel enables you to benefit from the link redundancy provided by LAG NNI. The redundancy helps pseudowire to remain always UP.
Effective from Cisco IOS Release 15.1(2)S, this feature is supported on the Cisco 7600 series routers. For configuration information, see Configuring BPDU PW on a Port Channel.
Restrictions and Usage Guidelines
Follow these restrictions and guidelines to configure H-Virtual Private LAN Service (VPLS) within a port-channel core interface:
•Provider Edge (PE) router LAG is supported on the ES-20 line card, for VPLS imposition or disposition functions.
•Provider router load balancing is not supported on the ES20 line card.
•A highly scaled VPLS setup or a highly scaled multicast configuration over VPLS on port-channel interfaces, can impact LACP fast switchover convergence.
•Existing port-channel features are supported.
•A maximum of six VPLS port-channel core interfaces are supported in the core router.
•QoS is not supported on ES20 port-channel interfaces, member-links, and port-channel subinterfaces.
•When a fat pseudowire (P/W) is configured, the core facing interface should be from a ES20 or a ES40 line card.
•A fat P/W is supported through a configurable command and should be uniformly enabled across all the peer PE routers.
SUMMARY STEPS
1. enable
2. configure terminal
3. platform vfi load-balance-label vlan [vlan|vlan-vlan]
or
port-channel load-balance src-dst-mixed-ip-port
or
[no] port-channel load-balance mpls
or
[no] platform mpls load-balance ingress-port
4. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters the global configuration mode.
|
Step 3
|
platform vfi load-balance-label vlan
[vlan|vlan-vlan]
Example:
Router(config)# platform vfi
load-balance-label vlan 5
|
Configures fat pseudowire load balance label.
|
or
|
|
[no] port-channel load-balance
src-dst-mixed-ip-port
Example:
Router(config)# port-channel
load-balance src-dst-mixed-ip-port
|
Configures port channel load balancing.
The src-dst-mixed-ip-port mode allows load balance of IPV4 packets by source and destination MAC address, source and destinationIP address and TCP/UDP port number.
|
or
|
|
[no] port-channel load-balance mpls
[label|label-ip]
Example:
Router(config)# Router(config)#
port-channel load-balance mpls label
|
Configures port channel load balancing. The mpls mode uses the MPLS label or IP address during load balancing. Load-balance label balances the traffic across the multiple paths
|
or
|
|
[no] platform mpls load-balance
ingress-port
Example:
Router(config)# platform mpls
load-balance ingress-port
|
Configures ingress port-based load balancing on the P-router. Use the no form of the command to disable the configuration.
|
Step 4
|
exit
|
Exits from the configuration mode.
|
Verification
You can execute the show running-config | include load-balance command to confirm if the load balance label is applied, and the fat pseudowire is enabled on the router.
Router#
configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router#
show running-config | include load-balance
platform vfi load-balance-label vlan 6-100
port-channel load-balance src-dst-mixed-ip-port
Configuring BPDU PW on a Port Channel
Configure BPDU PW on a port channel between two PEs. Before you begin, you need to configure a VFI on a remote peer enabling BPDU PW on it. Complete the following steps:
SUMMARY STEPS
1. enable
2. configure terminal
3. l2 vfi name manual
4. vpn id id-number
5. forward permit l2protocol all
6. neighbor remote-router-id vc-id {encapsulation encapsulation-type | pw-class pw-name} [no-split-horizon]
7. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
Example:
Router(config)# l2 vfi vfi10 manual
|
Creates a layer 2 VFI and enters layer 2 VFI manual configuration mode.
|
Step 4
|
Example:
Router(config-vfi)# vpn id 110
|
Specifies the VPN ID.
|
Step 5
|
forward permit l2protocol all
Example:
Router(config-vfi)# forward permit l2protocol
all
|
Creates a pseudowire that is to be used to transport BPDU data between the two N-PE routers.
|
Step 6
|
neighbor remote-router-id vc-id {encapsulation
encapsulation-type | pw-class pw-name}
[no-split-horizon]
Example:
Router(config-vfi)# neighbor 10.10.10.2
encapsulation mpls
|
Specifies the peer IP address of the redundant N-PE router and the type of tunnel signaling and encapsulation mechanism. Valid encapsulation types are L2TPv3 and MPLS.
|
Step 7
|
Example:
|
Ends the current configuration session and returns to privileged EXEC mode.
|
This example shows the enabling of BPDU PW on a remote peer:
Router# configure terminal
Router(config)# l2 vfi vfi10 manual
Router(config-vfi)# vpn id 110
Router(config-vfi)# forward permit l2protocol all
Router(config-vfi)# neighbor 10.10.10.2 encapsulation mpls
Configuring the MPLS Enabled Port Channel
Once you configure the BPDU PW on a peer, configure the MPLS enabled port channel towards the core:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface port-channel channel-number
4. ip address ip-address
5. mpls ip
6. mls qos trust dscp
7. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface port-channel channel-number
Example:
Router(config)# interface Port-channel 1
|
Creates the EtherChannel (or port channel) virtual interface.
|
Step 4
|
channel-group port-channel-number mode on
Example:
Router(config)# channel-group 1 mode on
|
Assign a Fast Ethernet interface to an EtherChannel group. All possible modes such as, pagp,lacp, and none are valid here.
|
Step 5
|
ip address ip-address subnet-mask
Example:
Router(config-if)# ip address 100.0.0.1
255.255.255.0
|
Assigns the protocol IP address and subnet mask to the interface.
|
Step 6
|
Example:
Router(config-if)# mpls ip
|
Enables MPLS forwarding of IPv4 packets along normally routed paths for the associated interface.
|
Step 7
|
Example:
Router(config-if)# mls qos trust dscp
|
Classifies incoming packets that have packet DSCP values (the most significant 6 bits of the 8-bit service-type field).
|
Step 8
|
Example:
|
Ends the current configuration session and returns to privileged EXEC mode.
|
This example shows the configuration of an MPLS enabled port channel:
Router# configure terminal
Router(config)# interface Port-channel 1
Router(config)# channel-group 1 mode on
Router(config-if)# ip address 100.0.0.1 255.255.255.0
Router(config-if)# mpls ip
Router(config-if)# mls qos trust dscp
Binding the VFI to the VLAN
Bind the VFI to the VLAN you configured.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface vlan vlan-id
4. no ip address
5. xconnect vfi vfi name
6. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
Example:
Router(config-if)# interface vlan 1
|
Creates or accesses a dynamic switched virtual interface (SVI).
|
Step 4
|
Example:
Router(config-if)# no ip address
|
Disables IP processing. (You configure a Layer 3 interface for the VLAN if you configure an IP address.)
|
Step 5
|
Example:
Router(config-if)# xconnect vfi vfi10
|
Specifies the Layer 2 VFI that you are binding to the VLAN port.
|
This example shows an interface VLAN configuration:
Router(config-if)# interface vlan 1
Router(config-if)# no ip address
Router(config-if)# xconnect vfi vfi10
This example shows how to use the show vfi command for VFI statu:
VFI name: vfi10, state: up
Local attachment circuits:
Neighbors connected via pseudowires:
100.0.0.1 100.0.1.1 100.0.2.2 100.0.4.4 100.0.7.7
Troubleshooting
This section describes how to troubleshoot BPDU PW issues.
Scenarios/Problems
|
Solution
|
How to verify whether or not the BPDU PW status is in the UP.
|
Use the show mpls l2transport vc command:
Router# show mpls l2transport vc 210
Local intf Local circuit Dest address VC ID Status
------------- -------------------------- --------------- ---------- ----------
VFI 210 VFI 10.144.144.144 210 UP
|
How to verify whether or not a port-channel BPDU PW pseudoport is added to the MST tree.
|
Use the show spanning-tree mst command:
Router# show spanning-tree mst
##### MST0 vlans mapped: 1-4094
Bridge address 001a.3029.d400 priority 32768 (32768 sysid 0)
Root address 0026.527c.5300 priority 24577 (24576 sysid 1)
port Gi5/3 path cost 200019
Regional Root this switch
Operational hello time 2 , forward delay 15, max age 20, txholdcount 6
Configured hello time 2 , forward delay 15, max age 20, max hops 20
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------
Gi1/19 Desg FWD 20000 128.19 P2p
Gi1/20 Desg FWD 20000 128.20 P2p
Gi5/3 Root FWD 200000 128.1027 P2p Bound(STP)
Gi6/3 Altn BLK 200000 128.1283 P2p Bound(STP)
Gi8/0/3 Desg FWD 20000 128.1796 P2p
Gi8/0/5 Desg FWD 20000 128.1798 P2p Bound(STP)
Gi8/0/7 Desg FWD 20000 128.1800 P2p
This example shows the detailed output:
Router# show spanning-tree mst detail
##### MST0 vlans mapped: 1-4094
Bridge address 001a.3029.d400 priority 32768 (32768 sysid 0)
Root address 0026.527c.5300 priority 24577 (24576 sysid 1)
port Gi5/3 path cost 200019
Regional Root this switch
Operational hello time 2 , forward delay 15, max age 20, txholdcount 6
Configured hello time 2 , forward delay 15, max age 20, max hops 20
GigabitEthernet1/19 of MST0 is designated forwarding
Port info port id 128.19 priority 128 cost 20000
Designated root address 0026.527c.5300 priority 24577 cost 200019
Design. regional root address 001a.3029.d400 priority 32768 cost 0
Designated bridge address 001a.3029.d400 priority 32768 port id 128.19
Timers: message expires in 0 sec, forward delay 0, forward transitions 1
Bpdus sent 140561, received 0
.................................................
|
Configuring the Backup Interface for Flexible UNI
The Backup Interface for Flexible UNI feature allows you to configure redundant user-to-network interface (UNI) connections for Ethernet interfaces, which provides redundancy for dual-homed devices.
You can configure redundant (flexible) UNIs on a network provider-edge (N-PE) device in order to supply flexible services through redundant user provider-edge (U-PE) devices. The UNIs on the N-PEs are designated as primary and backup and have identical configurations. If the primary interface fails, the service is automatically transferred to the backup interface.
The primary interface is the interface for which you configure a backup. During operation, the primary interface is active and the backup (secondary) interface operates in standby mode. If the primary interface goes down (due to loss of signal), the router begins using the backup interface.
While the primary interface is active (up) the backup interface is in standby mode. If the primary interface goes down, the backup interface transitions to the up state and the router begins using it in place of the primary. When the primary interface comes back up, the backup interface transitions back to standby mode. While in standby mode, the backup interface is effectively down and the router does not monitor its state or gather statistics for it.
This feature provides the following benefits:
•Supports the following Ethernet virtual circuit (EVC) features:
–Frame matching: EVC with any supported encapsulation (Dot1q, default, untagged)
–Frame rewrite: Any supported (ingress and egress with push, pop, and translate)
–Frame forwarding: MultiPoint Bridging over Ethernet (MPB-E), xconnect, connect
–Quality of Service (QoS) on EVC
•Supports Layer 3 (L3) termination and L3 Virtual Routing and Forwarding (VRF)
•Supports several types of uplinks: MultiProtocol Label Switching (MPLS), Virtual Private LAN Service (VPLS), and switchports
The Backup Interface for Flexible UNI feature makes use of these Ethernet components:
•Ethernet virtual circuit (EVC)—An association between two or more UNIs that identifies a point-to-point or point-to-multipoint path within the provider network. For more information about EVCs, see the "Configuring Flexible QinQ Mapping and Service Awareness on 7600-ESM-2X10GE and 7600-ESM-20X1GE" section.
•Ethernet flow point (EFP)—The logical demarcation point of an EVC on an interface. An EVC that uses two or more UNIs requires an EFP on the associated ingress interface and egress interface of every device that the EVC passes through.
Restriction and Usage Guidelines
Observe these restrictions and usage guidelines as you configure a backup interface for Flexible UNI on the router:
•Hardware and software support:
–Supported on Cisco 7600 Series ES+ and ES20 line cards.
–Supported with the Route Switch Processor 720, Supervisor Engine 720, and Supervisor Engine 32.
–Requires Cisco IOS Release 12.2SRB1 or later.
•You can use the same IP address on both the primary and secondary interfaces. This enables the interface to support L3 termination (single or double tagged).
•The configurations on the primary and backup interfaces must match. The router does not check that the configurations match; however, the feature does not work if the configurations are not the same.
Note If the configuration includes the xconnect command, you must specify a different VCID on the primary and backup interfaces.
•The duplicate resources needed for the primary and secondary interfaces are taken from the total resources available on the router and thus affect available resources. For example, each xconnect consumes resources on both the primary and backup interfaces.
•Local switching (connect) between primary and backup interfaces uses twice the number of physical interfaces. This limitation is due to lack of support for local switching on EVCs on the same interface.
•Any features configured on the primary and backup interfaces (such as bridge-domain, xconnect, and connect) transition up or down as the interface itself transitions between states.
•Switchover time between primary and backup interfaces is best effort. The time it takes the backup interface to transition from standby to active mode depends on the link-state detection time and the amount of time needed for EVCs and their features to transition to the up state.
•Configuration changes and administrative actions made on the primary interface are automatically reflected on the backup interface.
•The router monitors and gathers statistics for the active interface only, not the backup. During normal operation, the primary interface is active; however, if the primary goes down, the backup becomes active and the router begins monitoring and gathering statistics for it.
•When the primary interface comes back up, the backup interface always transitions back to standby mode. Once the signal is restored on the primary interface, there is no way to prevent the interface from being restored as the primary.
Configuration Instructions
To configure a backup interface for a flexible UNI on an Ethernet port, perform the following steps:
|
Command or Action
|
Purpose
|
Step 1
|
Router(config)# interface type
slot/subslot/port
Example:
Router(config)# interface gigabitethernet3/0/0
|
Selects the primary interface. This is the interface you are creating a backup interface for. For example, interface gigabitEthernet 3/0/0 selects the interface for port 0 of the Gigabit Ethernet card installed in slot 3, subslot 0.
•type specifies the interface type. Valid values are gigabitethernet or tengigabitethernet.
•slot/subslot/port specifies the location of the interface.
|
Step 2
|
Router(config-if)# backup interface type
interface
Example:
Router(config)# backup interface
gigabitethernet4/0/1
|
Selects the interface to serve as a backup interface.
|
Note You must apply the same configuration to both the primary and backup interfaces or the feature does not work. To configure EVC service instances on the interfaces, use the service instance, encapsulation, rewrite, bridge-domain, and xconnect commands. For information, see the "Configuring Flexible Service Mapping Based on CoS and Ethertype" section and the "Configuring Any Transport over MPLS" section.
|
Step 3
|
Router(config-if)# backup delay enable-delay
disable-delay
Example:
Router(config-if)# backup delay 0 0
|
(Optional) Specifies a time delay (in seconds) for enabling or disabling the backup interface.
•enable-delay is the amount of time to wait after the primary interface goes down before bringing up the backup interface.
•disable-delay is the amount of time to wait after the primary interface comes back up before restoring the backup interface to the standby (down) state
Note For the backup interface for Flexible UNI feature, do not change the default delay period (0 0) or the feature may not work correctly.
|
Step 4
|
Router(config-if)# backup load enable-percent disable-percent
Example:
Router(config-if)# backup load 50 10
|
(Optional) Specifies the thresholds of traffic load on the primary interface (as a percentage of the total capacity) at which to enable and disable the backup interface.
•enable-percent—Activate the backup interface when the traffic load on the primary exceeds this percentage of its total capacity.
•disable-percent—Deactivate the backup interface when the combined load of both primary and backup returns to this percentage of the primary's capacity.
Applying the settings from the example to a primary interface with 10-Mbyte capacity, the router enables the backup interface when traffic load on the primary exceeds 5 Mbytes (50%), and disables the backup when combined traffic on both interfaces falls below 1 Mbyte (10%).
|
Step 5
|
Router(config-if)# exit
|
Exits interface configuration mode and returns to global configuration mode.
|
Step 6
|
Router(config)# connect primary interface srv-inst interface srv-inst
Router(config)# connect backup interface srv-inst interface srv-inst
Example:
Router(config-if)# connect primary gi3/0/0 2 gi3/0/1 2 Router(config-if)# connect backup gi4/0/0 2 gi4/0/1 2
|
(Optional) Creates a local connection between a single service instance (srv-inst) on two different interfaces.
The connect primary command creates a connection between primary interfaces, and connect backup creates a connection between backup interfaces.
In the example, a local connection is configured between service instance 2 on primary interfaces (gi3/0/0 and gi3/0/1) and on backup interfaces (gi4/0/0 and gi4/0/1).
|
Step 7
|
Router(config)# connect primary interface srv-inst1 interface srv-inst2
Router(config)# connect backup interface srv-inst1 interface srv-inst2
Example:
Router(config-if)# connect primary gi3/0/0 2 gi3/0/0 3 Router(config-if)# connect backup gi4/0/0 2 gi4/0/0 3
|
(Optional) Enables local switching between different service instances (srv-inst1 and srv-inst2) on the same port.
Use the connect primary command to create a connection on a primary interface, and connect backup to create a connection on a backup interface.
In the example, we are configuring local switching between service instances 2 and 3 on both the primary (gi3/0/0) and backup interfaces (gi4/0/0).
|
Step 8
|
Router(config-if)# exit
|
Exits interface configuration mode.
|
The following example shows a sample configuration in which:
•gi3/0/1 is the primary interface and gi4/0/1 is the backup interface.
•Each interface supports two service instances (2 and 4), and each service instance uses a different type of forwarding (bridge-domain and xconnect).
•The xconnect command for service instance 2 uses a different VCID on each interface.
service instance 4 ethernet
rewrite ingress tag pop 1 symmetric
service instance 2 ethernet
rewrite ingress tag pop 1 symmetric
xconnect 10.0.0.0 2 encap mpls
service instance 4 ethernet
rewrite ingress tag pop 1 symmetric
service instance 2 ethernet
rewrite ingress tag pop 1 symmetric
xconnect 10.0.0.0 5 encap mpls
Verification
This section lists the commands to display information about the primary and backup interfaces configured on the router. In the examples that follow, the primary interface is gi3/0/0 and the secondary (backup) interface is gi3/0/11.
•To display a list of backup interfaces, use the show backup command in privileged EXEC mode. Our sample output shows a single backup (secondary) interface:
Primary Interface Secondary Interface Status
----------------- ------------------- ------
GigabitEthernet3/0/0 GigabitEthernet3/0/11 normal operation
•To display information about a primary or backup interface, use the show interfaces command in privileged EXEC mode. Issue the command on the interface for which you want to display information. The following examples show the output displayed when the command is issued on the primary (gi3/0/0) and backup (gi3/0/11) interfaces:
GigabitEthernet3/0/0 is up, line protocol is up (connected)
Hardware is GigEther SPA, address is 0005.dc57.8800 (bia 0005.dc57.8800)
Backup interface GigabitEthernet3/0/11, failure delay 0 sec, secondary disable delay
0 sec, kickin load not set, kickout load not set
GigabitEthernet3/0/11 is standby mode, line protocol is down (disabled)
If the primary interface goes down, the backup (secondary) interface is transitioned to the up state, as shown in the command output that follows. Notice how the command output changes if you reissue the show backup and show interfaces commands at this time: the show backup status changes, the line protocol for gi3/0/0 is now down (not connected), and the line protocol for gi3/0/11 is now up (connected).
NPE-11# !!! Link gi3/0/0 (active) goes down...
22:11:11: %LINK-DFC3-3-UPDOWN: Interface GigabitEthernet3/0/0, changed state to down
22:11:12: %LINK-DFC3-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to up
22:11:12: %LINEPROTO-DFC3-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/0,
changed state to down
22:11:13: %LINEPROTO-DFC3-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11,
changed state to up
Primary Interface Secondary Interface Status
----------------- ------------------- ------
GigabitEthernet3/0/0 GigabitEthernet3/0/11 backup mode
GigabitEthernet3/0/0 is down, line protocol is down (notconnect)
Hardware is GigEther SPA, address is 0005.dc57.8800 (bia 0005.dc57.8800)
Backup interface GigabitEthernet3/0/11, failure delay 0 sec, secondary disable delay
0 sec,
GigabitEthernet3/0/11 is up, line protocol is up (connected)
Example
The configuration includes several EVCs (service instances), configured as follows:
•Service instance EVC4 is configured on primary and backup interfaces (links) that terminate in a bridge domain, with a VPLS uplink onto NPE12.
•Service instance EVC2 is configured as scalable Ethernet over MPLS, peering with an SVI VPLS on NPE12.
NPE10 Configuration:
description npe10 to npe11 gi3/0/11 -
backup - bridged
ip address 100.4.1.33 255.255.255.0
description npe10 to npe11 gi3/0/11 -
backup - xconnect
ip address 100.2.1.33 255.255.255.0
NPE14 Configuration:
description npe14 to npe11 gi3/0/0 -
primary - bridged
ip address 100.4.1.22 255.255.255.0
description npe14 to npe11 gi3/0/0 -
primary - xconnect
ip address 100.2.1.22 255.255.255.0
|
72a Configuration:
description 72a to npe12 - bridged
ip address 100.4.1.12 255.255.255.0
description 72a to npe12 - xconnect
ip address 100.2.1.12 255.255.255.0
|
interface gigabitEthernet3/0/0
backup interface gigabitEthernet3/0/11
service instance 2 ethernet
rewrite ingress tag pop 1 symmetric
xconnect 12.0.0.1 2 encapsulation mpls
service instance 4 ethernet
rewrite ingress tag pop 1 symmetric
interface gigabitEthernet3/0/11
service instance 2 ethernet
rewrite ingress tag pop 1 symmetric
xconnect 12.0.0.1 21 encapsulation
mpls
service instance 4 ethernet
rewrite ingress tag pop 1 symmetric
|
description npe11 to npe12
ip address 10.3.3.1 255.255.255.0
neighbor 12.0.0.1 4 encapsulation mpls
|
neighbor 11.0.0.1 4 encap mpls
description npe12 to npe11 xconnect
neighbor 11.0.0.1 2 encap mpls
neighbor 11.0.0.1 21 encap mpls
description npe12 to npe11
ip address 10.3.3.2 255.255.255.0
|
NPE12 facing the customer:
interface fastEthernet 8/2
switchport trunk encap dot1q
switchport trunk allowed vlan 2-4
|
Primary interface is enabled:
Primary interface Secondary interface
Status
------------------------------------------
--
GigabitEthernet3/0/0GigabitEthernet3/0/11
normal operation
GigabitEthernet3/0/0 is up, line protocol
is up (connected)
Hardware is GigEther SPA, address is
0005.dc57.8800(bia 0005.dc57.8800)
Backup interface GigabitEthernet3/0/11,
failure delay 0 sec, secondary disable
delay 0 sec,kicking load not set, kickout
load not set,
GigabitEthernet 3/0/11 is standby mode,
line protocol is down (disabled)
|
Primary link is disabled:
NPE 11#!!!Link gi3/0/0 (active) goes down
22:11:11: % LINK-DFC3-3-UPDOWN:Interface
GigabitEthernet3/0/0, changed state to
down
22:11:12: % LINK-DFC3-3-UPDOWN:Interface
GigabitEthernet3/0/0, changed state to up
22:11:12: % LINKPROTO-DFC3-3-5-UPDOWN:Line
protocol on Interface
GigabitEthernet3/0/0, changed state to
down
22:11:13: % LINKPROTO-DFC3-3-5-UPDOWN:Line
protocol on Interface
GigabitEthernet3/0/11, changed state to up
Primary interface Secondary interface
Status
------------------------------------------
--
GigabitEthernet3/0/0GigabitEthernet3/0/11
backup mode
GigabitEthernet3/0/0 is down, line
protocol is down (notconnect)
Hardware is GigEther SPA, address is
0005.dc57.8800(bia 0005.dc57.8800)
Backup interface GigabitEthernet3/0/11,
failure delay 0 sec, secondary disable
delay 0 sec
GigabitEthernet 3/0/11 is up, line
protocol is up (connected)
|
Troubleshooting
Table 2-14 provides troubleshooting solutions for the backup interface of the Flexible UNI feature.
Table 2-14 Troubleshooting Scenarios for backup interface of the Flexible UNI feature
Problem
|
Solution
|
The backup interface is in a standby state or the line protocol is down
|
Use the show interfaces command on the specific interface in privileged EXEC mode to display interface and line protocol details. Share the output with TAC for further investigation.
This sample output of the command displayed when the command on the primary (gi3/0/0) and backup (gi3/0/11) interfaces:
switchport mode trunk
ethernet cfm mep domain L4 mpid 1 vlan 41
ethernet cfm domain L4 level 4
service s41 evc 41 vlan 41
continuity-check
int TenGigabitEthernet2/0/0
switchport
switchport mode trunk
|
Configuring Layer2 Access Control Lists (ACLs) on an EVC
ACLs (Access Control Lists) perform the following tasks:
•Apply security and QoS at the interface, sub-interface, and service levels.
•Filter the packets in a modular manner.
You can use a collection of sequential ACL rules to filter network traffic. Though the ACLs are applied on a network interface, you can use this feature to apply Layer 2 on different Ethernet Virtual Connections (EVCs). Table 2-15 maps the supported layers with their parameters.
Table 2-15
Layer
|
Based on
|
Layer 2
|
•MAC Source and destination
|
Mapping between the ACL supported layers to the parameters
Table 2-16 ACL commands
Layer
|
Action
|
Command
|
Layer 2
|
Create a L2 Access List
|
mac access-list extendend {aclname}
|
Apply a Access list within the EVC
|
mac access- group aclname in
|
Restrictions and Usage Guidelines
Follow these restrictions and usage guidelines when you configure ACLs on a EVC:
•L2 ACL is supported only on ingress.
•You can apply a single ACL to more than one EFP.
•If a Layer 2 ACL is applied to an EFP with a Layer 2 ACL, the new ACL replaces the previous ACL.
•L2 ACL configuration applied on the EVC interface should contain the source MAC address, destination MAC address, and the address mask.
•You can apply a maximum of 256 unique ACLs on all the EVCs.
•Maximum number of 16 ACEs (Access Control Elements) per ACL are supported.
•The counters are supported per ACL per EVC.
•Per ACL permit or deny counters are not supported on ES20 interfaces.
•ACL configurations with QoS, Vlan, or Ethertype filtering are ignored when applied on an ES20 EVC interface.
•L2 ACL is not supported in an ES20 EVC on the port-channel of an ES20 interface.
SUMMARY STEPS TO CREATE A L2 ACL
1. enable
2. configure terminal
3. mac access-list extendend aclname {permit | deny} {host a.b.c host x.y.z}
4. exit
DETAILED STEPS TO CREATE A L2 ACL
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
mac access-list extendend aclname {permit
| deny} {host a.b.c host x.y.z}
Example:
me7600-5(config)#mac access-list extended
test-l2-acl
|
Creates a Layer 2 Access List on the selected interface.
|
Step 4
|
exit
|
Exits the configuration mode.
|
SUMMARY STEPS TO APPLY A L2 ACL
1. enable
2. configure terminal
3. interface gigabitethernet type/ slot/port [.subinterface-number] or interface tengigabitethernet type/ slot/port [subinterface-number]
4. [no] service instance id {Ethernet}
5. encapsulation dot1q vlan id
6. mac access- group aclname in
7. exit
DETAILED STEPS TO APPLY A L2 ACL
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet type/ slot/port
[subinterface-number]
or
interface tengigabitethernet type/
slot/port [subinterface-number]
Example:
Router(config)# interface gigabitethernet
4/0/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
•subinterface-number—(Optional) Specifies a secondary interface (sub-interface) number.
|
Step 4
|
[no] service instance id {Ethernet
[service-name}
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance on an interface and sets the device to the config-if-srv configuration mode.
|
Step 5
|
encapsulation dot1q vlan id
Example:
Router(config-if-srv)# encapsulation
dot1q 5
|
Defines the matching criteria to map ingress dot1q frames on an interface to the appropriate service instance.
Note Use the encapsulation dot1q default command to configure the default service instance on a port. Use the encapsulation dot1q untagged command to map the untagged Ethernet frames on an ingress interface to a service instance.
|
Step 6
|
mac access- group aclname in
Example:
me7600-5(config-if-srv)# mac access-group
test-l2-acl in
|
Applies a L2 ACL on the selected EVC.
Note L2 ACL displays only positive permit and deny counts.
|
Step 7
|
exit
|
Exits the configuration mode.
|
Examples
You can view the ACL counters for an EVC as shown in the following example:
LLB-India-7#sh ethernet service instance id 1 int gig3/0/0 detail
L2 ACL (inbound): l2acl <=====
Associated Interface: GigabitEthernet3/0/0
Interface Dot1q Tunnel Ethertype: 0x8100
L2 ACL permit count: 0 <=====
L2 ACL deny count: 0 <=====
Pkts In Bytes In Pkts Out Bytes Out
Configuring Broadcast Storm Control on Switchports and Ports with Ethernet Virtual Connections
A traffic storm occurs when data packets flood the LAN, creates excessive traffic, and degrades network performance.
The traffic storm control level is a percentage of the total available bandwidth of the port. Each port has a single traffic storm control level that is used for all types of traffic (broadcast, multicast, and unicast).
In LAN cards, traffic storm control (also called traffic suppression), performs the following tasks:
•Monitors the incoming traffic levels over a 1-second traffic storm control interval.
•Compares the traffic level with the configured traffic storm control level during the interval time.
When the ingress traffic (for which the traffic storm control is enabled) reaches the configured level on the port, the traffic storm control terminates the traffic till the traffic storm control interval ends.
Detecting a Broadcast Storm
Broadcast storms can be prevented by configuring a network to block broadcast traffic. The mechanism to detect and control such storm event(s) is referred to as storm control or broadcast suppression.You can detect a broadcast storm when the following occurs:
•The port receives multicast and broadcast traffic in excess of the configured bandwidth value.
•The value in the `TotalSuppDiscards' counter increments.This value is displayed when you use the show interface gigabitEthernet <slot/port> counters storm-control command.
Traffic Storm Control on ES20 Switchports
For more information on traffic storm control on ES20 switchports, refer to the Cisco 7600 Series Cisco IOS Software Configuration Guide, 12.2SR located at the following URL:
http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SR/configuration/guide/swcg.html
Restrictions and Usage Guidelines
•The Traffic Storm Control feature is not supported on:
–Layer 3 interfaces
–Unicast traffic
•Traffic storm control is supportedon layer 2 interfaces.
•Storm Control cannot be applied on an ES20 port configured as a switchport in a
dot1q-tunnel mode.
•Rx SPAN is not supported on an ES20 port with switchports and Storm Control configuration.
•You can configure a maximum of 40% link rate (or 4Gbps) on a 10-gigabyte port.
•If you have configured Storm Control on an ES20 switchport, you cannot apply port access control lists (ACLs).
•Storm control feature is not supported onthe following line cards and also on other line cards based on the same ASIC:
–WS-X6248-RJ-45
–WS-X6348-RJ-45
–WS-X6148-RJ-45
–WS-X6148-RJ21
–WS-X6248-RJ21
–WS-X6196-RJ21
–WS-X6148X2-RJ-45
–WS-X6548-RJ-45
–WS-X6548-RJ21
Traffic Storm Control on ES20 with EVCs
Traffic Storm Control is supported for an EVC-configured port at the interface level.
In Cisco IOS Release 15.0 (1)S and later releases, the following enhancements are covered as part of this feature on the 67xx, 6196, ES20 and ES+ line cards:
•Support is extended to port channel interfaces.
•When a storm is detected and the storm traffic exceeds the accepted threshold, the affected interface moves to error disable state. The traffic threshold is calculated as a percentage of the total bandwidth of the port (%BW). You can use the error disable detection and the recovery feature or the shut/no shut command to re-enable the port on the affected interface.
•An SNMP trap can be sent, when the storm is detected.
Restrictions and Usage Guidelines
•The Traffic Storm Control feature is supported on ports with EVC on an ES20 card.
•Storm control is configured per-interface level and not per EVC.
•Unicast traffic is not supported on port channel interfaces.
•We do not recommend using 0 or 100 to configure the level for broadcast or multicast traffic.
•Untagged frames can be subjected to storm control by having a service instance which marks all untagged frames. Once such a service instance is created, these frames behave like any storm control on any other EVC.
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server enable traps storm-control trap-rate trap rate
4. interface type/ slot/port
5. storm-control {{broadcast | multicast } level level | action {shutdown | trap}}
6. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router# enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
snmp-server enable traps storm-control
trap-rate trap rate
Example:
Router(config)# snmp-server enable traps
storm-control trap-rate 2
|
(Optional) Enables SNMP storm control trap parameters. The trap-rate range is 0 to 1000 traps per minute. However, the number of traps generated for storm control cannot exceed six per minute (by design).
|
Step 4
|
interface type slot/bay/port
Example:
Router(config)# interface gigabitEthernet
1/0/18
or
Router(config)# interface port-channel 1
|
Selects an interface to configure.
|
Step 5
|
storm-control {{broadcast | multicast}
level level | action {shutdown | trap}}
Example:
Router(config-if)# storm-control
broadcast level 50
Router(config-if)# storm-control action
shutdown
|
Sets the broadcast and multicast suppression level for traffic storm control on the interface. Enables an action for traffic storm control on a port channel, such as, shuts down a port channel or sends an SNMP trap. However, broadcast or multicast level supression must be enabled before setting the action on the interface.
Note A suppression level of 100% means no suppression will occur and 0% suppression means no traffic of the suppressed type will be allowed.
Use the no form of the command to disable storm control for broadcast or multicast traffic or to disable the specified storm-control action, on the selected interface.
Note Unicast level traffic suppression is not supported on port channel interfaces.
|
Step 6
|
end
|
Exits the configuration mode.
|
Example
This is a sample output of traffic storm control configured at the physical interface.
interface GigabitEthernet9/0/3
storm-control broadcast level 10.00
storm-control multicast level 10.00
storm-control action shutdown
storm-control action trap
This is a sample output of traffic storm control configured on ports with EVCs.
Router# show run interface gig1/18
Building configuration...
Current configuration : 380 bytes
interface GigabitEthernet1/18
storm-control broadcast level 23.45
storm-control multicast level 23.45
service instance 1 ethernet
service instance 2 ethernet
service instance 100 ethernet
service instance 120 ethernet
This is a sample output of traffic storm control configured on a port channel.
Router# show run interface port-channe1
Building configuration...
Current configuration : 141 bytes
storm-control broadcast level 75.00
storm-control action shutdown
storm-control action trap
Verification
Use the show interfaces interface counters storm-control command to display the total suppression percentage of packets for the broadcast, multicast and unicast storm control traffic on all interfaces or on a specified interface. The storm control shutdown on an interface depends on the `TotalSuppDiscards' counter (displayed in the example). This counter increments when a traffic storm occurs.
Router# show interfaces counters storm-control
Port UcastSupp % McastSupp % BcastSupp % TotalSuppDiscards
Gi1/1 100.00 100.00 100.00 0
Gi1/2 100.00 100.00 100.00 0
Gi1/3 100.00 100.00 100.00 0
Gi1/4 100.00 100.00 100.00 0
Gi1/5 100.00 100.00 100.00 0
Gi1/6 100.00 100.00 100.00 0
Gi1/7 100.00 20.00 20.00 2943374677
Gi1/8 100.00 100.00 100.00 0
Gi1/9 100.00 100.00 100.00 0
Gi1/10 100.00 100.00 100.00 0
Gi1/11 100.00 100.00 100.00 0
Gi1/12 100.00 100.00 100.00 0
Gi1/13 100.00 100.00 100.00 0
Gi1/14 100.00 100.00 100.00 0
Gi1/15 100.00 100.00 100.00 0
Gi1/16 100.00 100.00 100.00 0
Gi1/17 100.00 100.00 100.00 0
Gi1/18 100.00 100.00 100.00 434529474
Gi1/19 100.00 100.00 100.00 0
Gi1/20 100.00 100.00 100.00 0
Gi1/21 100.00 100.00 100.00 0
Port UcastSupp % McastSupp % BcastSupp % TotalSuppDiscards
Gi1/22 100.00 100.00 100.00 499018427
Gi1/23 100.00 100.00 100.00 0
Gi1/24 100.00 100.00 100.00 0
Gi1/25 100.00 100.00 100.00 0
Gi1/26 100.00 100.00 100.00 0
Gi1/27 100.00 100.00 100.00 0
Gi1/28 100.00 100.00 100.00 0
Gi1/29 100.00 100.00 100.00 0
Gi1/30 100.00 100.00 100.00 0
Gi1/31 100.00 100.00 100.00 0
Gi1/32 100.00 100.00 100.00 0
Gi1/33 100.00 100.00 100.00 0
Gi1/34 100.00 100.00 100.00 0
Gi1/35 100.00 100.00 100.00 0
Gi1/36 100.00 100.00 100.00 0
Gi1/37 100.00 100.00 100.00 0
Gi1/38 100.00 100.00 100.00 0
Gi1/39 100.00 100.00 100.00 0
Gi1/40 100.00 100.00 100.00 0
Router# show interfaces gig1/18 counters storm-control
Port UcastSupp % McastSupp % BcastSupp % TotalSuppDiscards
Gi1/18 100.00 100.00 100.00 434529474
Troubleshooting
Contact TAC for troubleshooting scenarios.
Configuring Asymmetric Carrier-Delay
During redundant link deployments where the remote network element is enabled, a link or port may be displayed as UP before the port or link is ready to forward data. This anomaly leads to traffic loss during switchover as UP events are notified faster than the required routing protocol convergence time. With existing conventional carrier delay, both UP and DOWN events are notified within equal time that might not be feasible in certain network deployments. Asymmetric Carrier-Delays ensure stable topologies compared to conventional Carrier-Delay implementation.
Table 2-17 lists the differences between the conventional Carrier-Delay and Asymmetric Carrier-Delay implementations.
Table 2-17
Conventional Carrier -Delay implementation
|
Asymmetric Carrier-Delay implementation
|
You can configure Carrier-Delay on a main physical interface.
|
You can configure Asymmetric Carrier-Delay on a main physical interface.
|
The acceptable limit to configure carrier delay can be as low as 0. If you configure 0, it will be treated as 1 msec.
|
The acceptable limit to configure Asymmetric Carrier-Delay:
•UP time is 4 seconds and above
•DOWN time is 11 msec
|
You can configure a single delay value used by both Up and Down events.
|
You can configure separate delay values for each DOWN and UP timers.
|
Traffic losses and timer optimization issues due to single configurable delay values for both UP and Down events.
|
Optimal timer configurations are achieved due to separate for timer values for UP and Down events.
|
Conventional Carrier-Delay versus Asymmetric Carrier-Delay
Restrictions and Usage Guidelines
•The acceptable limit to configure Carrier-Delay DOWN time is eleven milliseconds and above. By default, Carrier-Delay is configured to 10 milliseconds during a card bootup. However, even if you configure a value less than 11msec, there will not be any impact on the carrier delay.
•As the Fast Link feature and Carrier-Delay features are mutually exclusive, Fast Link feature is enabled by default.
•If you configure Carrier-Delay values, Fast Link feature is disabled on a line card.
•Though the Fast Link feature is configured by default in the card, the Carrier-Delay feature overwrites the Fast Link feature when configured.
•If you have not configured the Carrier-Delay values, Fast link feature values are utilized for DOWN event notification.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type/ slot/port
4. carrier-delay [{up | down} [seconds]{msec| sec}]
5. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
config # interface type/ slot/port
Example:
P19_C7609-S(config)#int gig8/0/14
|
Selects the maininterface to configure.
|
Step 4
|
carrier-delay [{up | down}
[seconds]{msec| sec}]
Example:
P19_C7609-S(config-if)#carrier-delay up 8
P19_C7609-S(config-if)#carrier-delay down
5
|
Configures the Asymmetric Carrier-Delay up or down value in milliseconds or seconds.
|
Step 5
|
end
|
Exits the configuration mode.
|
Verification
You can use the show run command to display the Carrier-Delay configurations on an ES20 physical interface.
interface GigabitEthernet8/0/14
Configuring MST on EVC Bridge Domain
The Multiple Spanning Tree (MST) on EVC Bridge Domain feature enables MST on EVC interfaces. It complements the H-VPLS N-PE Redundancy for QinQ and MPLS Access feature released in Cisco IOS Release 12.2(33)SRC. For more information on this feature, see http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_hvpls_npe_red.html.
This section describes how to configure MST on EVC Bridge Domain. It contains the following topics:
•Overview of MST and STP
•Overview of MST on EVC Bridge Domain
•Restrictions and Usage Guidelines
•Examples
Overview of MST and STP
Spanning Tree Protocol (STP) is a Layer 2 link-management protocol that provides path redundancy while preventing undesirable loops in the network. For a Layer 2 Ethernet network to function properly, only one active path can exist between any two stations. STP operation is transparent to end stations, which cannot detect whether they are connected to a single LAN segment or a switched LAN of multiple segments.
Cisco 7600 series routers use STP (the IEEE 802.1D bridge protocol) on all VLANs. By default, a single instance of STP runs on each configured VLAN (provided you do not manually disable STP). You can enable and disable STP on a per-VLAN basis.
MST maps multiple VLANs into a spanning tree instance, with each instance having a spanning tree topology independent of other spanning tree instances. This architecture provides multiple forwarding paths for data traffic, enables load balancing, and reduces the number of spanning tree instances required to support a large number of VLANs. MST improves the fault tolerance of the network because a failure in one instance (forwarding path) does not affect other instances (forwarding paths).
For routers to participate in MST instances, you must consistently configure the routers with the same MST configuration information. A collection of interconnected routers that have the same MST configuration comprises an MST region. For two or more routers to be in the same MST region, they must have the same VLAN-to-instance mapping, the same configuration revision number, and the same MST name.
The MST configuration controls the MST region to which each router belongs. The configuration includes the name of the region, the revision number, and the MST VLAN-to-instance assignment map.
A region can have one or multiple members with the same MST configuration; each member must be capable of processing RSTP bridge protocol data units (BPDUs). There is no limit to the number of MST regions in a network, but each region can support up to 65 spanning tree instances. Instances can be identified by any number in the range from 0 to 4094. You can assign a VLAN to only one spanning tree instance at a time.
For additional information on STP and MST on the Cisco 7600 series routers, see Configuring STP and MST at:
http://www.cisco.com/en/US/docs/routers/7600/ios/15S/configuration/guide/spantree.html
Overview of MST on EVC Bridge Domain
The MST on EVC Bridge-Domain feature uses VLAN IDs for service-instance-to-MST-instance mapping. EVC service instances with the same VLAN ID (the outer VLAN IDs in the QinQ case) as the one in another MST instance will be mapped to that MST instance.
EVC service instances can have encapsulations with a single tag as well as double tags. In case of double tag encapsulations, the outer VLAN ID shall be used for the MST instance mapping, and the inner VLAN ID is ignored.
A single VLAN per EVC is needed for the mapping with the MST instance. The following service instances without any VLAN ID or with multiple outer VLAN IDs are not supported:
•Untagged (encapsulation untagged)
•Priority-tagged (encapsulation priority-tagged)
•Default (encapsulation default)
•Multiple outer tags (encapsulation dot1q 200 to 400 second-dot1q 300)
Restrictions and Usage Guidelines
Follow these restrictions and usage guidelines while configuring MST on EVC bridge domain:
•Cisco IOS Release 15.1(1)S supports EVC port-channels.
•Main interface where the EFP is configured must be up and running with MSTP as the selected Spanning Tree Mode (PVST and Rapid-PVST are not supported).
•The SPT PortFast feature is not supported with EFPs.
•The co-existence of REP and mLACP with MST on the same port is not supported.
•Any action performed on VPORT (which represents a particular VLAN in a physical port) affects the bridge domain and other services.
•This feature cannot co-exist with Ethernet Bridging on FR/ATM that support only PVST.
•Supports 64 MSTs and one CIST (common and internal spanning tree).
•Supports one MST region.
•Scales to 32000 EFP.
•Service instances without any VLAN ID in the encapsulation are not supported, because a unique VLAN ID is required to map an EVC to an MST instance.
•Supports EFPs with unambiguous outer VLAN tag (that is, no range, list on outer VLAN, neither default nor untagged).
•ES20 and ES+ line cards support this feature.
•Removing dot1q encapsulation removes the EVC from MST.
•Changing the VLAN (outer encapsulation VLAN of EVC) mapping to a different MST instance will move the EVC port to the new MST instance.
•Changing an EVC service instance to a VLAN that is not defined in MST 1 will result in mapping of EVC port to MST 0.
•The peer router of the EVC port must also be running MST.
•MST is supported only on EVC BD. EVCs without BD configuration will not participate in MST.
•When an MST is configured on the outer VLAN, you can configure any number of service instances with the same outer VLAN as shown in the following configuration example.
Building configuration...
Current configuration : 373 bytes
interface GigabitEthernet12/5
description connected to CE1
service instance 100 ethernet
encapsulation dot1q 100 second-dot1q 1
service instance 101 ethernet
encapsulation dot1q 100 second-dot1q 2
service instance 102 ethernet
encapsulation dot1q 100 second-dot1q 120-140
Building configuration...
Current configuration : 373 bytes
interface GigabitEthernet12/6
description connected to CE1
service instance 100 ethernet
encapsulation dot1q 100 second-dot1q 1
service instance 101 ethernet
encapsulation dot1q 100 second-dot1q 2
service instance 102 ethernet
encapsulation dot1q 100 second-dot1q 120-140
Spanning tree enabled protocol mstp
Port 2821 (GigabitEthernet12/5)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32768 (priority 32768 sys-id-ext 0)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- --------------------------------
Gi12/5 Root FWD 20000 128.2821 P2p
Gi12/6 Altn BLK 20000 128.2822 P2p
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port
4. service instance id Ethernet [service-name]
5. encapsulation dot1q vlan-id
6. [no] bridge-domain bridge-id
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/1/1
|
Specifies the gigabit ethernet or the ten gigabit ethernet interface to configure.
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
[no] service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (EVC instance) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
[no] bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Examples
In this example, two interfaces participate in MST instance 0, the default instance to which all VLANs are mapped:
Router# configure terminal
Router(config)# interface g4/1/1
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 2
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# interface g4/3
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encapsulation dot1q 2
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# end
Verification
Use this command to verify the configuration:
Router# show spanning-tree vlan 2
Spanning tree enabled protocol mstp
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32768 (priority 32768 sys-id-ext 0)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- --------------------------------
Gi4/1 Desg FWD 20000 128.1537 P2p
Gi4/3 Back BLK 20000 128.1540 P2p
In this example, interface gi4/1/1 and interface gi4/1/3 are connected back-to-back. Each has a service instance (EFP) attached to it. The EFP on both interfaces has an encapsulation VLAN ID of 2. Changing the VLAN ID from 2 to 8 in the encapsulation directive for the EFP on interface gi4/1/1 stops the MSTP from running in the MST instance to which the old VLAN is mapped and starts the MSTP in the MST instance to which the new VLAN is mapped:
Router(config-if)# interface g4/1/1
Router(config-if)# service instance 1 ethernet
Router(config-if-srv)# encap dot1q 8
Router(config-if-srv)# end
Use this command to verify the configuration:
Router# show spanning-tree vlan 2
Spanning tree enabled protocol mstp
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- --------------------------------
Gi4/3 Desg FWD 20000 128.1540 P2p
Router# show spanning-tree vlan 8
Spanning tree enabled protocol mstp
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32770 (priority 32768 sys-id-ext 2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- --------------------------------
Gi4/1 Desg FWD 20000 128.1537 P2p
In this example, interface gi4/1/3 (with an EFP that has an outer encapsulation VLAN ID of 2 and a bridge domain of 100) receives a new service:
Router# configure terminal
Router(config)# interface g4/1/3
Router((config-if)# service instance 2 ethernet
Router((config-if-srv)# encap dot1q 2 second-dot1q 100
Router((config-if-srv)# bridge-domain 200
Now there are two EFPs configured on interface gi4/1/3 and both have the same outer VLAN 2.
interface GigabitEthernet4/3
service instance 1 ethernet
service instance 2 ethernet
encapsulation dot1q 2 second-dot1q 100
The preceding configuration does not affect the MSTP operation on the interface; there is no state change for interface gi4/1/3 in the MST instance it belongs to.
Router# show spanning-tree mst 1
##### MST1 vlans mapped: 2
Bridge address 0009.e91a.bc40 priority 32769 (32768 sysid 1)
Root this switch for MST1
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Gi4/3 Desg FWD 20000 128.1540 P2p
This example shows MST on port channels:
Router# show spanning-tree mst 1
##### MST1 vlans mapped: 3
Bridge address 000a.f331.8e80 priority 32769 (32768 sysid 1)
Root address 0001.6441.68c0 priority 32769 (32768 sysid 1)
port Po5 cost 20000 rem hops 18
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Gi2/0/0 Desg FWD 20000 128.257 P2p
Po5 Root FWD 10000 128.3329 P2p
Po6 Altn BLK 10000 128.3330 P2p
Router# show spanning-tree vlan 3
Spanning tree enabled protocol mstp
Port 3329 (Port-channel5)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- --------------------------------
Gi2/0/0 Desg FWD 20000 128.257 P2p
Po5 Root FWD 10000 128.3329 P2p
Po6 Altn BLK 10000 128.3330 P2p
DHCP Snooping with Option-82 on EVC
DHCP snooping determines whether traffic sources are trusted or untrusted. An untrusted source may initiate traffic attacks or other hostile actions. To prevent such attacks, DHCP snooping filters messages traffic from untrusted sources.
To do this, DHCP snooping dynamically builds and maintains the DHCP snooping database using information extracted from intercepted DHCP messages. The database contains an entry for each untrusted host with a leased IP address if the host is associated with a VLAN that has DHCP snooping enabled. The database does not contain entries for hosts connected through trusted interfaces.
Each entry in the DHCP snooping database includes the MAC address of the host, the leased IP address, the lease time, the binding type, and the VLAN number and interface information associated with the host.
Additionally, the DHCP Snooping with Option-82 feature can centrally manage the IP address assignments for a large number of subscribers. When this feature is enabled on the router, a subscriber device is identified by the router port through which it connects to the network (in addition to its MAC address). Multiple hosts on the subscriber LAN can be connected to the same port on the access router and are uniquely identified.
However, EVCs require additional information. If each EVC on an interface is mapped to a single VPN, it would be possible to use the internal VLAN to identify the path for reply packets. However, because multiple EVCs with different encapsulations can map to the same VPN, it is necessary to use the actual EVC encapsulation to distinguish between EVCs.
The DHCP Snooping with Option-82 on EVC feature allows the user to provide this additional information required for EVC-enabled interfaces. This information is inserted into the option 82 and is also stored in the binding table for retrieval by other services.
Use the ip dhcp snooping information option allow-untrusted command to enable the switch to accept incoming DHCP snooping packets with option 82 information from the edge switch. DHCP option 82 data insertion is enabled by default. Accepting incoming DHCP snooping packets with option 82 information from the edge switch is disabled by default.
Use the ip dhcp relay information option subscriber-id command to configure a subscriber string for an EVC that can be inserted into the option 82 field along with other information when relaying the DHCP packets to the server. The server can parse the option 82 information to match the subscriber string and act accordingly. The subscriber string configured for an EVC is not stored in the binding table and is only used when sending DHCP packets to the server by inserting into the option 82 field.
For additional information on DHCP Snooping and Option-82 on the Cisco 7600 router, see Configuring DHCP Snooping at http://www.cisco.com/en/US/docs/routers/7600/ios/15S/configuration/guide/snoodhcp.html.
Restrictions and Usage Guidelines
Follow these restrictions and usage guidelines while you configure DHCP Snooping with Option-82:
•An EVC with multiple encapsulations is not supported.
•These EVCs are supported on the same interface and bridge-domain:
–dot1q encapsulation
–QinQ encapsulation
–Untagged encapsulation
•4000 EVCs are supported per port.
•32000 EVCs are supported per router.
•Multiple EVCs are supported on same port, all having the same or different bridge domains.
•Multiple EVCs are supported on different ports, all having the same or different bridge domains.
•With Cisco IOS Release 15.1(1)S, DHCP snooping with Option 82 is supported on EVC port-channels.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/port or interface tengigabitethernet slot/port or interface port-channel number
4. [no] ip address
5. negotiation {forced | auto}
6. service instance id Ethernet [service-name]
7. encapsulation dot1q vlan-id
8. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} symmetric
9. ip dhcp relay information option subscriber-id value
10. [no] bridge-domain bridge-id
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port[.subinterface-number]
or
interface tengigabitethernet
slot/subslot/port[.subinterface-number]
or
interface port-channel number
Example:
Router(config)# interface gigabitethernet 4/1
|
Specifies the gigabit ethernet or the ten gigabit ethernet or the port-channel interface to configure.
|
Step 4
|
no ip address
Example:
Router# Router(config-if)# no ip address
|
Removes an IP address or disables IP processing.
|
Step 5
|
negotiation {forced | auto}
Example:
Router(config-if)# negotiation auto
|
Enables advertisement of speed, duplex mode, and flow control on a gigabit ethernet interface.
|
Step 6
|
[no] service instance id Ethernet [service-name}
Example:
Router(config-if)# service instance 101 ethernet
|
Creates a service instance (an instantiation of an EVC) on an interface, and sets the device into the config-if-srv submode.
|
Step 7
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 8
|
rewrite ingress tag {push {dot1q vlan-id | dot1q
vlan-id second-dot1q vlan-id | dot1ad vlan-id
dot1q vlan-id} | pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q
vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id
second-dot1q vlan-id | dot1ad vlan-id dot1q
vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}}
symmetric
Example:
Router(config-if-srv)# rewrite ingress tag push
dot1q 20 symmetric
|
Specifies the tag manipulation to be performed on the frame ingress to the service instance.
|
Step 9
|
ip dhcp relay information option subscriber-id
value
Example:
Router(config)# ip dhcp relay information option
subscriber-id 123
|
Configures a subscriber string that uniquely identifies the interface from where the DHCP packets originate.
|
Step 10
|
[no] bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Example
This example shows a typical configuration on the relay agent and the server. This is a configuration on the relay agent:
Router# configure terminal
Router(config)# interface GigabitEthernet8/1
Router(config-if)# no ip address
Router(config-if)# negotiation auto
Router(config-if)# service instance 2 ethernet
Router(config-if-srv)# encapsulation dot1q 2
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
ip dhcp relay information option subscriber-id 11
Router(config-if-srv)# bridge-domain 100
Router(config)# interface Vlan100
Router(config-if)# ip address 10.0.0.1 255.255.255.0
Router(config-if)# ip helper-address global 20.0.0.2
Router(config-if)# ip helper-address 20.0.0.2
Router(config)# interface GigabitEthernet 2/1
Router(config-if)# ip dhcp snooping packets
Router(config-if)# ip address 20.0.0.1 255.255.255.0
Router(config-if)# negotiation auto
This is the configuration on the server:
Router# configure terminal
Router(config)# interface GigabitEthernet 1/1
Router(config-if)# ip address 20.0.0.2 255.255.255.0
Router(config-if)# negotiation auto
Router(config)# ip dhcp pool pool1
Router(dhcp-config)# network 10.0.0.0 255.255.0.0
Router(dhcp-config)# update arp
address range 10.0.0.2 10.0.0.10
address range 10.0.0.11 10.0.0.20
Router(config)# ip dhcp pool pool2
Router(config)# network 11.0.0.0 255.255.0.0 lease 2
Router(config)# ip dhcp pool pool3
Router(config)# ip dhcp use vrf remote
Router(config)# network 10.0.0.0 255.255.255.0 lease 0 0 2
ip dhcp class C1 <-----------Class C1 maps to the subcriber-id string aabb11.
relay-information hex 00000000000000000000000000000006616162623131 mask
fffffffffffffffffffffffffffffff0000000000000
relay-information hex 00000000000000000000000000000006313162626161 mask
fffffffffffffffffffffffffffffff0000000000000
******************************************************************************************
Verification
Use these commands to verify operation.
Command
|
Purpose
|
Router# show ip dhcp snooping
|
Displays all VLANs (both primary and secondary) that have DHCP snooping enabled.
|
Router# show ip dhcp snooping binding
|
Checks the DHCP snooping database.
|
Router# show ethernet service instance
|
Displays the ethernet customer service instances.
|
Configuring MAC Address Security for EVC Bridge-Domain
Cisco 7600 series routers currently support port security on a per-port basis. For more information, see Configuring Port Security at: http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SR/configuration/guide/port_sec.html
The Media Access Control (MAC) Address Security for EVC Bridge-Domain feature addresses port security with EVCs by providing the capability to control and filter MAC address learning behavior at the granularity of a per-EFP basis. For instance, when a violation requires a shutdown, only the customer assigned to a given EFP is affected rather than all customers using the port.
Port Security and the MAC Address Security for EVC Bridge-Domain feature operate independently of each other. From the point of view of MAC Security, a secured port is not secure. From the point of view of Port Security, a secured EFP is not secure.
Restrictions and Usage Guidelines
•System-wide, the following limits apply to the total configured whitelist and learned MAC addresses:
–Total number of MAC addresses supported on MAC Security is limited to 32,000.
–Total number of MAC addresses supported on MAC Security, per bridge-domain, is limited to 10,000.
–Total number of MAC addresses supported on MAC Security, per EFP, is limited to 1000.
•You can configure or remove the various MAC security elements irrespective of whether MAC security is enabled on the EFP. However these configurations will become operational only after MAC security is enabled.
•Upon enabling the MAC Address Security for EVC Bridge-Domain feature, existing MAC address table entries on the EFP are removed.
•Upon disabling the MAC Address Security for EVC Bridge-Domain feature, existing MAC address table entries on the EFP are removed.
•The MAC Address Security for EVC Bridge-Domain feature can be configured on an EFP only if the EFP is a member of a bridge domain.
•If you disassociate the EFP from the BD, the MAC security feature is completely removed.
•For port-channel, this configuration is propagated to all member links in the port-channel. Consistent with the already implemented bridge domain EVC port-channel functionality, packets on a secured EFP is received on any member link, but all the egress packets are sent out to one of the selected member link.
Configuring MAC Address Security for EVC Bridge-Domain
These sections describe how to configure port security:
•Configuring MAC Address Security for EVC Bridge-Domain
•Enabling MAC Address Security for EVC Bridge-Domain
•Disabling MAC Address Security for EVC Bridge-Domains on an EFP
•Configuring Whitelisted MAC Address on an EFP
•Configuring Sticky MAC Addresses on an EFP
•Configuring Secure MAC Address Aging on an EFP
•Configuring MAC Address Limiting on an EFP
•Configuring MAC Address Limiting on a Bridge-Domain
•Configuring Violation Response on an EFP
Enabling MAC Address Security for EVC Bridge-Domain
This section describes how to enable MAC address security for EVC bridge-domain.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port or interface port-channel number
4. service instance id Ethernet [service-name]
5. encapsulation dot1q vlan-id
6. bridge-domain bridge-id
7. mac security
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/1/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Step 7
|
mac security or no mac security
Example:
Router(config-if-srv)# mac security
|
Enables MAC Security on the EFP.
|
Examples
This example shows how to enable MAC address security for EVC bridge-domains.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security
Disabling MAC Address Security for EVC Bridge-Domains on an EFP
This section describes how to disable MAC address security for EVC bridge-domains.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port
4. service instance id Ethernet [service-name]
5. no mac security
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/1/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
no mac security
Example:
Router(config-if-srv)# no mac security
|
Disables MAC Security on the EFP.
|
Examples
This example shows how to disable MAC address security for EVC bridge-domains.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# no mac security
Configuring Whitelisted MAC Address on an EFP
This section describes how to configure whitelisted MAC addresses on an EFP which is a member of the bridge-domains.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port or interface port-channel number
4. service instance id Ethernet [service-name]
5. encapsulation dot1q vlan-id
6. bridge-domain bridge-id
7. mac security address permit mac address
8. mac security
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
or
interface port-channel number
Example:
Router(config)# interface
gigabitethernet 4/1/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Step 7
|
mac security address permit mac address
Example:
Router(config-if-srv)# mac security
address permit 0000.1111.2222
|
Adds the specified MAC Address as a whitelist (permitted) MAC Address for the EFP.
|
Step 8
|
mac security
Example:
Router(config-if-srv)# mac security
|
Enables MAC Security on the EFP.
|
Examples
This example shows how to configure whitelisted MAC addresses on an EFP which is a member of a bridge-domain.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security address permit 0000.1111.2222
Router(config-if-srv)# mac security
Configuring Sticky MAC Addresses on an EFP
MAC addresses learned dynamically on the EFP after mac security sticky is configured are retained during a link-down condition. Stickly Mac is shown in the MAC table as static addresses. However, you should copy the running config details to retain the mac address details.
This section describes how to configure sticky MAC addresses on an EFP.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port or interface port-channel number
4. service instance id Ethernet [service-name]
5. encapsulation dot1q vlan-id
6. bridge-domain bridge-id
7. mac security sticky
8. mac security
9. no mac security
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
interface port-channel number
Example:
Router(config)# interface
gigabitethernet 4/1/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Step 7
|
mac security sticky
Example:
Router(config-if-srv)# mac security
sticky
|
Enables Sticky feature causing all dynamic secure MAC addresses to become sticky MAC addresses. Any new MAC address learnt from then on becomes sticky.
Note To retain the sticky MAC addresses across reloads, ensure that you saved the running-config to startup-config.
|
Step 8
|
mac security
Example:
Router(config-if-srv)# mac security
|
Enables MAC Security on the EFP.
|
Step 9
|
no mac security
Example:
Router(config-if-srv)# no mac security
|
Disables MAC Security on the EFP.
|
Examples
This example configures sticky MAC addresses on an EFP.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security sticky
Router(config-if-srv)# mac security
Configuring Secure MAC Address Aging on an EFP
This section shows how to configure aging of secured MAC addresses on MAC Security. Secured MAC addresses are not subject to the normal aging of MAC table entries in the system. If aging is not configured, secured MAC addresses are never aged out.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port or interface port-channel number
4. service instance id Ethernet [service-name]
5. encapsulation dot1q vlan-id
6. bridge-domain bridge-id
7. mac security aging time m [inactivity]
8. mac security aging static
9. mac security aging sticky
10. mac security
11. no mac security
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
or
interface port-channel number
Example:
Router(config)# interface
gigabitethernet 4/1/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Step 7
|
mac security aging time m [inactivity]
Example:
Router(config-if-srv)# mac security
aging time 200
|
Sets the aging time for secure addresses to m minutes (range is 0-1440). The optional inactivity keyword specifies that the aging out of addresses is based on inactivity of the sending hosts (as opposed to absolute aging).
|
Step 8
|
mac security aging static
|
Applies aging controls to statically configured addresses.
|
Step 9
|
mac security aging sticky
|
Applies aging controls to sticky addresses.
|
Step 10
|
mac security
Example:
Router(config-if-srv)# mac security
|
Enables MAC Security on the EFP. Stickly Mac will be shown in the MAC table as static addresses.
|
Step 11
|
no mac security
Example:
Router(config-if-srv)# no mac security
|
Disables the MAC Security on the EFP.
|
Examples
This examples shows how to configure the aging time for secure addresses to 10 minutes.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security aging time 10
Router(config-if-srv)# mac security
This examples shows a configuration where the aging out of addresses is based on inactivity of the sending hosts (as opposed to the aging time of 10 minutes).
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security aging time 10 inactivity
Router(config-if-srv)# mac security
The mac security aging time command only ages out secure addresses that are learned. To enable aging out of whitelist or sticky addresses when the mac security aging time command is configured, use the mac security aging static command (applies aging controls to statically configured addresses) or the mac security aging sticky command (applies aging controls to persistent, that is, sticky, addresses). The configuration below shows an example of applying aging to a sticky address.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security
Router(config-if-srv)# mac security sticky
Router(config-if-srv)# mac security aging sticky
Router(config-if-srv)# mac security aging time 100
Configuring MAC Address Limiting on an EFP
This section describes how to configure an upper limit for the number of secured MAC addresses allowed on an EFP. This includes addresses added as part of a whitelist, as well as dynamically learned MAC addresses. If the upper limit is decreased, one or more learned MAC entries may be removed. The default limit is 1.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port or interface port-chanel number
4. service instance id Ethernet [service-name]
5. encapsulation dot1q vlan-id double tagged
6. bridge-domain bridge-id
7. mac security maximum addresses n
8. mac security
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
or
interface port-channel number
Router(config)# interface
gigabitethernet 4/1/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance. The acceptable
|
Step 6
|
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge-domain instance where bridge-id is the identifier for the bridge-domain instance.
|
Step 7
|
mac security maximum addresses n
Example:
Router(config-if-srv)# mac security
maximum addresses 10
|
Sets (or changes) the maximum number of secure addresses permitted on the EFP to the integer value n. The acceptable range secure addresses is 1-1024.
|
Step 8
|
mac security
Example:
Router(config-if-srv)# mac security
|
Enables MAC Security on the EFP.
|
Examples
This example configures an upper limit of 10 for the number of secured MAC addresses allowed on an EFP.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security maximum addresses 10
Router(config-if-srv)# mac security
Configuring MAC Address Limiting on a Bridge-Domain
This section describes how to configure an upper limit for the number of secured MAC addresses that resides on the bridge domain.
SUMMARY STEPS
1. enable
2. configure terminal
3. bridge-domain vlan-id [access | dot1q [tag] | dot1q-tunnel] [broadcast] [ignore-bpdu-pid] [pvst-tlv CE-vlan] [increment] [lan-fcs] [split-horizon]
4. mac limit maximum addresses [n]
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
bridge-domain bridge-id
Example:
Router(config)# bridge-domain 12
|
Configures a bridge domain instance with bridge-id as the identifier. This command allows you to globally configure the features within the bridge domain instance.
|
Step 4
|
mac limit maximum addresses [n]
Example:
Router(config-bdomain)# mac limit
maximum addresses 1000
|
Sets the maximum number of secured MAC address. The maximum default value is 10240.
|
Examples
This example configures an upper limit of 10240 for the number of secured MAC addresses.
Router# configure terminal
Router(config)# bridge-domain 100
Router(config-if-srv)# mac limit maximum address 10240
Configuring Violation Response on an EFP
This section describes how to specify the expected behavior of the device when an attempt to dynamically learn a MAC address fails because of a violation of the configured MAC security policy on the EFP. The default violation behavior is EFP shutdown.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port or interface tengigabitethernet slot/subslot/port or interface port-channel number
4. service instance id Ethernet [service-name]
5. encapsulation dot1q vlan-id
6. bridge-domain bridge-id
7. [no] mac security violation restrict or [no] mac security violation protect
8. mac security
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
or
interface tengigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/1/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan-id
Example:
Router(config-if-srv)# encapsulation
dot1q 13
|
Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Step 7
|
mac security violation restrict
or
mac security violation protect
Example:
Router(config-if-srv)# mac security
violation restrict
|
Sets the violation mode to one of restrict or protect.
The no version of this command sets the violation response back to default( default is shutdown). In a Restrict scenario the packets are dropped and an error message is displayed about the log warning level; in the Protect scenario, the packets are silently dropped and no messages are displayed.
|
Step 8
|
mac security
Example:
Router(config-if-srv)# mac security
|
Enables MAC Security on the EFP.
|
Examples
This example configures a restrict violation response on EFP.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac security violation restrict
Router(config-if-srv)# mac security
Troubleshooting
Table 2-18 provides troubleshooting solutions for the MAC Security feature.
Table 2-18 Troubleshooting Scenarios for MAC Security feature
Problem
|
Solution
|
MAC security errors on the RP
|
Use the debug ethern serv instance id id interface int mac sec errors and debug ethern serv instance id id interface int mac table errors commands. Share the output with TAC for further investigation.
|
MAC security errors on the SP
|
Use the debug ethernet service instance mac security errors and debug ethernet service instance mac table errors commands to troubleshoot mac security issues on the RP.
|
EFP is disabled and is unable to automatically recover from error disable state
|
Use the configuration command errdisable recovery cause mac-security interval or clear ethernet service instance id id interface interface-name errdisable to re-enable the EFP.
|
Mac security aging timer is inactive
|
When mac security aging time inactivity is configured, the hardware mac table aging timer for the EFP VLAN is set with the configuration command mac address-table aging-time time [vlan <vlan id>] command. To resolve aging timer inactivity, re-set the aging time to the default value of 300 seconds.
|
Configuring Static MAC on Ethernet Flow Point and Pseudowire
Static MAC on Ethernet Flow Point (EFP) and Pseudowire (PW) provides the functionality to configure static unicast or multicast MAC address on EFP and PW. A MAC address can be statically added on an EFP under port channel. This feature provides the functionality to:
•Avoid dynamically learning the traffic in both the directions.
•Configure MAC address for Service Instance (SI) and PW.
•Limit the scope of the data traffic flood by creating multicast groups.
•Implement security by explicitly enabling a single MAC address.
•Resolve the problem of MAC address aging out as the dynamic learning is disabled.
•Optimize L2 table performance by limiting the table size.
•Configure static MAC on EFPs on port channels.
•Configure fully meshed pseudowire network between core facing routers and place them under single multicast group.
Restrictions and Usage Guidelines
When configuring static MAC on EFP and PW for the Cisco 7600 routers, follow these guidelines and restrictions:
•You cannot configure unicast static MAC address and MAC security on the same EFP simultaneously. For multicast addresses, static MAC and MAC security can be simultaneously supported under EFP.
•No support for static MAC on PWs on C-MAC Bridge-domain.
•Static MACs are related to a L2 Bridge-domain table, so only the bridged services are supported.
•When static MAC is configured on VPLS PW, and core-facing interface fails resulting in egress interface to move to available interface, the traffic may be delayed.
•Static MAC configuration is supported only on EVC bridge-domain interfaces and VFI pseudowires.
•Static Mac configuration on EFP is supported on ES+ and ESM20 line cards
•Static Mac configuration on VFI PW is supported on ES+, ESM20 and SIP 400 line cards.
•Number of MACs per PW (unicast and multicast) is limited to 1024.
•Number of MACs per Bridge-domain or VFI (unicast and multicast) is limited to 1024.
Number of MACs per system (unicast and multicast) is limited to 1024.This section describes how to configure Static MAC on EFP and PW for the Cisco 7600 router. You need to configure MPLS on core-facing router before configuring static MAC on PW. The information about configuring MPLS on core-facing router is included as a separate section.
Configuring Static MAC over EFP for the Cisco 7600 Router
This section describes how to configure static MAC over EFP or SIs.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/port or interface tengigabitethernet slot/port
4. service instance id Ethernet [service-name]
5. encapsulation dot1q | untagged | default vlan-id
6. bridge-domain bridge-id
7. mac static address mac_address [auto-learn | disable-snooping]
8. mac static address mac_address
9. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet slot/port
or interface tengigabitethernet
slot/port
Example:
Router(config)# Interface
GigabitEthernet2/0/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where slot/port specifies the location of the interface.
|
Step 4
|
encapsulation dot1q {any | vlan-id
[vlan-id[vlain-id]]} second-dot1q {any
| vlan-id[vlan-id[vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second-dot1q 200
|
Configuring the encapsulation. Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 5
|
bridge-domain bridge-id
Example:
Router(config-if-srv)# bridge-domain 12
|
Configuring the bridge domain. Binds the service instance to a bridge domain instance where bridge-id is the identifier for the bridge domain instance.
|
Step 6
|
mac static address mac_address
[auto-learn | disable-snooping]
Example:
Router(config-if-srv)# mac static
address 0002.1122.0010
|
Configuring the static mac address for service instance. The option:
•auto-learn is used for unicast static MAC address only. This option is not available for multicast static mac address.
•disable-snooping is used for multicast static MAC address. This option disables IGMP snooping on the multicast MAC address.
The mac_address is in hexadecimal format.
|
Step 7
|
exit
Example:
Router(config-if-srv)# exit
|
Exits interface configuration mode.
|
Examples
This example shows how to configure static MAC over EFP or SIs:
Router# configure terminal
Router(config-if)# service instance 10 ethernet
Router(config-srv)# encapsulation dot1q 20
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# mac static address 0002.1122.0010
Router(config-if-srv)# mac static address 0100.5e00.1111 disable-snooping
Router(config-if-srv)# mac static address 0002.1122.0011 auto-learn
Router(config-if-srv)# mac static address 0100.5e00.1112
Router(config-if-srv)# mac static address 0002.1122.0012 auto-learn
Router(config-if-srv)# mac static address 0100.5e00.1113 disable-snooping
Router(config-if-srv)# exit
Configuring MPLS on Core-Facing Interface
You need to configure MPLS on the core-facing router before configuring static MAC over pseudowire. This section describes how to configure MPLS on the core-facing router interface.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port
4. ip address ip_Address mask
5. mpls ip
6. mpls label protocol ldp
7. exit
8. interface loopback Loopback_Id
9. ip address loopback_address mask
10. exit
11. mpls ldp router-id loopback loopback_Id force
12. router ospf ospf_Id
13. network loopback_network wildcard_mask area 0
14. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 3/0/0
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
ip address ip_Address mask
Example:
Router(config-if)# ip address
10.192.0.2 255.255.0.0
|
Configures ip address for the interface.
|
Step 5
|
mpls ip
Example:
Router(config-if)# mpls ip
|
Enables MPLS.
|
Step 6
|
mpls label protocol ldp
Example:
Router(config-if)# mpls label protocol
ldp
|
Configures the mpls parameters.
|
Step 7
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Step 8
|
interface loopback loopback_Id
Example:
Router(config)# interface loopback 0
|
Creates a loopback with the specified loopback_Id.
|
Step 9
|
ip address loopback_address mask
Example:
Router(config-if)# ip address 1.1.1.1
mask 255.255.255.255
|
Creates an IP address for the loopback.
|
Step 10
|
exit
Example:
Router(config)# exit
|
Exits interface configuration mode.
|
Step 11
|
mpls ldp router-id loopback loopback_Id
force
Example:
Router(config)# mpls ldp router-id
loopback 0 force
|
Configures loopback address as router-id.
|
Step 12
|
router ospf ospf_Id
Example:
Router(config)# router ospf 50
|
Enables OSPF router configuration mode.
|
Step 13
|
network loopback_network wildcard_mask
area 0
Example:
Router(config)# network 192.168.1.1
255.255.255.225 area 0
|
Defines an interface on which OSPF runs and define the area ID for that interface.
|
Step 14
|
exit
Example:
outer(config)# exit
|
Exits the interface configuration mode.
|
Configuring Static MAC over Pseudowire for the Cisco 7600 Router
This section describes how to configure static MAC over pseudowire.
SUMMARY STEPS
1. enable
2. configure terminal
3. l2 vfi vfi_Id manual
4. vpn id vpn_id
5. bridge-domain bd_number vlan
6. neighbor ip_address encapsulation mpls
7. mac static address mac_address
8. exit
9. Interface vlan vlan_Id
10. xconnect vfi vfi_Id
11. no shutdown
12. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
l2 vfi vfi_name manual
Example:
Router(config-vfi)# l2 vfi smac_vfi
manual
|
Creates a VFI and enters L2 VFI configuration mode.
|
Step 4
|
vpn id vpn_id
Example:
Router(config-vfi)# vpn id 30
|
Configure the VPN Identifier.
|
Step 5
|
bridge-domain bd_number vlan
Example:
Router(vfi-config)# bridge-domain 40
vlan
|
Configures the bridge domain.
|
Step 6
|
neighbor ip_address encapsulation mpls
Example:
Router(vfi-config)# neighbor
192.168.1.1 encapsulation mpls
|
Configures the remote peering router-id and tunnel encapsulation type.
|
Step 7
|
mac static address mac_address
[auto-learn | disable-snooping]
Example:
Router(config-vfi-neighbor)# mac static
address 2222.1111.1000
|
Configures the unicast and/or multicast static MAC address to the interface. MAC address is in hexadecimal format.
Configuring the static mac address for service instance. The option:
•auto-learn is used for unicast static MAC address only. This option is not available for multicast static mac address.
•disable-snooping is used for multicast static MAC address. This option disables IGMP snooping on the multicast MAC address.
|
Step 8
|
exit
Example:
Router(config)# exit
|
Exits the VFI configuration mode.
|
Step 9
|
Interface vlan vlan_Id
Example:
Router(config)# interface vlan 40
|
Creates an interface VLAN, where the VLAN Id should be same as the bd_number configured in step 5.
|
Step 10
|
xconnect vfi VFI_Id
Example:
Router(config-if)# xconnect vfi
smac_vfi
|
Binds the Ethernet or VLAN port to the L2 VFI.
|
Step 11
|
exit
Example:
Router(config-if)# exit
|
Exits the interface configuration mode.
|
Examples
This example shows how to configure static MAC over pseudowire.
Router# configure terminal
Router(config)# interface GigabitEthernet 4/1/0
Router(config)# l2 vfi foo-core manual
Router(config-vfi)# vpn id 100
Router(config-vfi)# bridge-domain 10 vlan
Router(config-vfi)# neighbor 11.0.0.1 encapsulation mpls
Router(config-vfi-neighbor)# mac static address 0002.1122.0010 auto-learn
Router(config-vfi-neighbor)# mac static address 0100.5e00.1111
Router(config-vfi-neighbor)# mac static address 0002.1122.0011
Router(config-vfi-neighbor)# mac static address 0100.5e00.1112 disable-snooping
Router(config-vfi-neighbor)# mac static address 0002.1122.0012 auto-learn
Router(config-vfi-neighbor)# mac static address 0100.5e00.1113 disable-snooping
Router(config-vfi-neighbor)# interface vlan 10
Router(config-if)# xconnect vfi foo-core
Verification
•You can use the show bridge-domain domain_Id mac static address command to verify the configuration:
Static MAC count : System : 8, bridge-domain : 8 Port Address Action
vfi foo-core neighbor 1.1.1.1 100 0000.0200.1112
vfi foo-core neighbor 1.1.1.1 100 0000.1111.1001 auto-learn
vfi foo-core neighbor 1.1.1.1 100 0100.5e11.1002
vfi foo-core neighbor 1.1.1.1 100 0100.5e11.1003 disable-snooping
0000.1111.1004 auto-learn
Po500 ServInst 1 0100.5e00.1111 disable-snooping
•You can use the show ethernet service instance id si_Id interface interface mac static address command to verify the configuration:
Router#Router# show ethernet service instance id 1 interface Gi 2/0/0 mac static
address
Port static MAC count : 2
Gi2/0/0 ServInst 1 0000.1111.1001
Gi2/0/0 ServInst 1 0000.1111.1002 auto-learn
•You can use the show vfi { name vfi_name> | neighbor peer_ip_address vcid id } mac static address command to verify the configuration:
Router#show vfi neighbor 1.1.1.1 vcid 100 mac static address
vfi foo-core neighbor 1.1.1.1 100 0000.0200.1112
vfi foo-core neighbor 1.1.1.1 100 0000.1111.1001
vfi foo-core neighbor 1.1.1.1 100 0000.1111.1002 auto-learn
vfi foo-core neighbor 1.1.1.1 100 0100.5e11.1002
Troubleshooting
Table 2-19 provides the troubleshooting solutions for the Static MAC binding feature.
Table 2-19
Problem
|
Solution
|
Pseudowire (PW) state changes
|
Complete these steps:
1. If a PW is down, flush all the static MAC addresses configured within the PW.
2. If the PW is up, re-install all the static MAC addresses configured within the PW.
3. If there is a PW change in egress due to load-balancing or FRR, update all static MAC addresses configured within the PW in the HW MAC table to use the new egress information.
|
MAC address is not installed or deleted from the MAC address table Data is not synchronized with the standby supervisor EFP or PW is disabled
|
Use the debug mac static [event | error | ha | issu] command to confirm if the MAC address (configured through static mac over EFP/PW feature) is installed or deleted from the mac address table and if the data is synchronized to the standby supervisor. Share the output with TAC for further investigation.
|
Troubleshooting Static MAC binding feature
Configuring Resilient Ethernet Protocol
Resilient Ethernet Protocol (REP) is a Cisco proprietary protocol that provides an alternative to Spanning Tree Protocol (STP) to support L2 resiliency, and fast switchover with Ethernet networks. REP is a segment protocol that integrates easily into existing Carrier Ethernet networks. It allows network architects to limit the scope of STP domains. A REP segment is a connected chain of ports configured with a segment ID. Each segment consists of standard (non-edge) segment ports, and two user-configured edge ports. REP is supported on Layer 2 trunk interfaces and EVC ports.
REP provides functionality to:
•Control network loops
•Handle link failures
•Improve convergence time
•Control a group of ports connected in a segment
•Ensure that the segment does not create any bridging loops
•Respond to link failures within the segment
•Provide a basis for constructing more complex networks
•Support VLAN load balancing at service instance level
•Extend the network resiliency across Cisco IP Next-Generation Network (NGN) Carrier Ethernet Design
•Notify the STP about potential topology changes, allowing interoperability with Spanning Tree
•Control data traffic
The ports on a C7600 platform are classified into three different types: switchports, routed ports, and EVC ports. By default, a port is a routed port. REP is not supported on routed ports. You need to configure a port to a switchport or EVC port to configure REP on it. A port that is configured with one or more service instances is called an EVC port.
REP is a distributed and secure protocol and does not rely on a master node controlling the status of the ring. Hence, the failures can be detected locally either through loss of signal (LOS) or loss of neighbor adjacency. Any REP port can initiate a switchover after acquiring the secure key to unblock the alternate port. An REP segment is a chain of ports connected to each other and configured with the same segment ID. Each end of a segment terminates on an edge switch. The port where the segment terminates is called the edge port.
REP Edge No-Neighbor
Effective from Cisco IOS release 15.1(01)S, a new functionality provides capability to configure the non-rep switch facing ports as edge no-neighbor ports. These ports inherit the properties of edge ports, and overcome the limitation of not being able to converge quickly during a failure.
Figure 2-7 Edge No-Neighbor Ports
In access ring topologies, the neighboring switch might not support REP, as shown in Figure 4-2. In this case, you can configure the non-REP facing ports (E1 and E2) as edge no-neighbor ports. These ports inherit all the properties of edge ports. You can configure these no-neighbor ports as any other edge port and also enable the ports to send STP or REP topology change notices to the aggregation switch. In this case the STP Topology Change Notice (TCN) that is sent is a Multiple Spanning-Tree (MST) STP message.
These sections describes how to configure REP for the Cisco 7600 router:
•Configuring REP over Ethernet Virtual Circuit
•Configuring Resilient Ethernet Protocol Configurable Timers
Configuring REP over Ethernet Virtual Circuit
The REP over Ethernet Virtual Circuit (EVC) feature allows you to configure and manage ports on the interface, and not per service instance and can be used to block and unblock encapsulated vlans at service level.
An EVC port can have multiple service instances. Each service instance corresponds to a unique Event Flow Processor (EFP). By default, REP is disabled on all ports. REP can be configured only REP can selectively block or forward data traffic on particular VLANs. For EVC, the VLAN Id refers to the outer tag of the dot1q encapsulation that is configured on a service instance. REP is supported on a bridge-domain service. If ethernet vlan color-block all command is configured, REP is supported on connect and cross connect services.
Restrictions and Usage Guidelines
When configuring REP over EVC for the Cisco 7600 router, follow these guidelines and restrictions:
•REP is not supported on service instances configured with encapsulation, untagged, or default type.
•Cisco recommends that you begin by configuring one port and then configure the contiguous ports to minimize the number of segments and the number of blocked ports.
•REP is not supported on mLACP.
•If more than two ports in a segment fail when no external neighbors are configured, one port goes into a forwarding state to maintain connectivity during configuration.
•REP ports must be Layer 2 trunk ports or EVC ports.
•To avoid misconfiguration, you must configure all trunk ports in the segment with the same set of allowed VLANs.
•Since REP blocks all VLANs until another REP interface sends a message to unblock it, you might loose connectivity to the port. This happens if you enable REP in a Telnet session that accesses the EVC port through the same interface.
•You cannot execute REP and STP/MST, or REP and Flex Links on the same segment or interface.
•You cannot run REP and STP/MST, or REP and Flex Links on the same segment or interface.
•If you connect an STP network to the REP segment, ensure that the connection is at the segment edge. An STP connection that is not at the edge causes a bridging loop because STP does not run on REP segments. All STP BPDUs are dropped at REP interfaces.
•On a router if REP is enabled on two ports for a segment, both ports must either be a regular segment ports or edge ports. REP ports follow these rules on a router:
–If only one port is configured in a segment, the port should be an edge port.
–If two ports belong to the same segment, both ports must be edge ports or the regular segment ports.
–If two ports belong to the same segment and one is configured as an edge port and other as a regular segment port, the edge port is treated as a regular segment port.
–There can be only two edge ports in a segment, if there are two edge routers in a segment, each router can have only one edge port. All the other ports on the edge router function as normal ports.
•REP interfaces come up in a blocked state and remains in a blocked state until notified that it is safe to unblock.
•REP relays all LSL PDUs in untagged frames on the native VLAN andonly HFL packets are relayed on the admin vlan. However, BPA messages are untagged as well.
•REP ports cannot be configured as:
–SPAN destination port
–Private VLAN port
–Tunnel port
–Access port
•REP is supported on EtherChannels, but not on an individual port that belongs to an EtherChannel. It is supported on Swichports and EVC port-channels. REP is implemented on port-channels instead of its individual member links.
•In case of double VLAN tagged frame, REP is implemented only on the outer VLAN tag.
•When an edge no-neighbor is configured on a router, configuring and unconfiguring an edge port is not allowed.
Configuring REP over EVC for the Cisco 7600 Router
This section describes how to configure REP over EVC for the Cisco 7600 router:
•Configuring REP over EVC using Cross connect for the Cisco 7600 Router
•Configuring REP over EVC using connect for the Cisco 7600 Router
•Configuring REP over EVC using bridge domain for the Cisco 7600 Router
Configuring REP over EVC using Cross connect for the Cisco 7600 Router
This section describes how to configure REP over EVC using cross connect at the global configuration level.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitEthernet slot/subslot/port
4. ether vlan color-block all
5. service instance id {ethernet [service-name}
6. encapsulation dot1q vlan_id
7. rewrite ingress tag
8. xconnect loopback_ip vc_id encapsulation mpls
9. rep segment segment_id [edge [no-neighbor][primary]] [preferred]
10. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/0/5
|
Specifies the Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
ether vlan color-block all
Example:
Router(config-if)# ether vlan
color-block all
|
Configures REP to block xconnect type of service instances.
|
Step 5
|
service instance id ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 6
|
encapsulation dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second-dot1q 200
|
Configures the encapsulation. Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 7
|
rewrite ingress tag
Example:
Router(config-if-srv)# rewrite ingress
tag dot1q single symmetric
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 8
|
xconnect loopback_id vc_id
encapsulation mpls
Example:
Router(config-if-srv)# xconnect
10.0.0.2 999 encapsulation mpls
|
Configures forwarding mechanism on a service instance. Ensure that the MPLS connectivity is up.
|
Step 9
|
rep segment segment_id [edge
[no-neighbor][primary]] [preferred]
Example:
Router(config-if)# rep segment 3 edge
|
Configures the REP over EVC. The segment ID range is from 1 to 1024.
Note You must configure two edge ports, including one primary edge port for each segment.
These optional keywords are available.
•Enter edge to configure the port as an edge port. Entering edge without the primary keyword configures the port as the secondary edge port. Each segment has only two edge ports.
•On an edge port, enter primary to configure the port as the primary edge port, the port on which you can configure VLAN load balancing.
Note Although each segment can have only one primary edge port, if you configure edge ports on two different switches and enter the primary keyword on both switches, the configuration is allowed. However, REP selects only one of these ports as the segment primary edge port. You can identify the primary edge port for a segment by using the show rep topology privileged EXEC command.
•On an edge port, use the no-neighbor keyword to configure the segment edge with no external rep neighbor.
•Enter preferred to indicate that the port is the preferred alternate port, or the preferred port for VLAN load balancing.
Configuring a port as preferred does not guarantee that it becomes the alternate port; it merely gives it a slight edge among equal contenders. The alternate port is usually a previously failed port.
|
Step 10
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Examples
This example shows how to configure REP over EVC using cross connect.
Router# configure terminal
Router(config)# interface GigabitEthernet 5/3
Router(config-if-srv)# rep segment 3 edge
Router(config-if)# service instance 10 ethernet
Router(config-srv)# encapsulation dot1q 20
Router(config-if-srv)# rewrite ingress tag pop 2 sym
Router(config-if-srv)# xconnect 10.0.0.2 999 encapsulation MPLS
Router(config-if-srv)# exit
Configuring REP over EVC using connect for the Cisco 7600 Router
This section describes how to configure REP over EVC using connect at global configuration level.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. ether vlan color-block all
5. service instance id {Ethernet [service-name}
6. encapsulation dot1q vlan_id
7. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
8. exit
9. rep segment segment_id [edge [no-neighbor] [primary]] [preferred]
10. exit
11. interface type slot/subslot/port
12. ether vlan color-block all
13. service instance id {Ethernet [service-name}
14. encapsulation dot1q vlan_id
15. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
16. exit
17. rep segment segment_id [edge [no-neighbor] [primary]] [preferred]
18. exit
19. connect <connect_name> <interface> <service_instance_id> <interface> <service_instance_id>
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 3/0/0
|
Specifies the Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
ether vlan color-block all
Example:
Router(config-if)# Ether vlan
color-block all
|
Configures REP to block connect type of service instances.
|
Step 5
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 10
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 6
|
encapsulation dot1q {any |
vlan-id[vlan-id[-vlain-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 10
|
Configures the encapsulation. Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 7
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric] tag pop id
symmetric
Example:
Router(config-if-srv)# rewrite ingress
tag pop 1 symmetric
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 8
|
exit
Example:
Router(config-if-srv)# exit
|
Exits service instance mode.
|
Step 9
|
rep segment segment_id [edge
[no-neighbor][primary]] [preferred]
Example:
Router(config-if)# rep segment 2 edge
primary
|
Configures REP over EVC. The segment ID range is from 1 to 1024.
Note You must configure two edge ports, including one primary edge port for each segment.
These optional keywords are available.
•Enter edge to configure the port as an edge port. Entering edge without the primary keyword configures the port as the secondary edge port. Each segment has only two edge ports.
•On an edge port, enter primary to configure the port as the primary edge port, the port on which you can configure VLAN load balancing.
Note Although each segment can have only one primary edge port, if you configure edge ports on two different switches and enter the primary keyword on both switches, the configuration is allowed. However, REP selects only one of these ports as the segment primary edge port. You can identify the primary edge port for a segment by using the show rep topology privileged EXEC command.
•On an edge port, use the no-neighbor keyword to configure the segment edge with no external rep neighbor.
•Enter preferred to indicate that the port is the preferred alternate port, or the preferred port for VLAN load balancing.
Configuring a port as preferred does not guarantee that it becomes the alternate port; it merely gives it a slight edge among equal contenders. The alternate port is usually a previously failed port.
|
Step 10
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Step 11
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/0/0
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 12
|
ether vlan color-block all
Example:
Router(config-if)# Ether vlan
color-block all
|
Configures REP to block connect type of service instances.
|
Step 13
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 102
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 14
|
encapsulation dot1q {any |
vlan-id[vlan-id[-vlain-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second dot1q 200
|
Configures the encapsulation. Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 15
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric] tag pop id
symmetric
Example:
Router(config-if-srv)# rewrite ingress
tag push dot1q 20
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 16
|
exit
Example:
Router(config-if-srv)# exit
|
Exits service instance mode.
|
Step 17
|
rep segment segment_id [edge
[no-neighbor][primary]] [preferred]
Example:
Router(config-if)# rep segment 2 edge
primary
|
Configures REP over EVC.
|
Step 18
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Step 19
|
connect <connect_name> <interface>
<service_instance_id> <interface>
<service_instance_id>
Example:
outer(config)# connect test
gigabitEthernet 3/0/0 10
gigabitEthernet 4/0/0 20
|
Configures local connect between the two service instances of two different interfaces.
|
Examples
This example shows how to configure REP over EVC using connect.
Router# configure terminal
Router(config)# interface gigabitEthernet 3/0/0
Router(config-if)# ether vlan color-block all
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if-srv)# exit
Router(config-if)# rep segment 2 edge primary
Router(config)# interface gigabitEthernet 4/0/0
Router(config-if)# service instance 20 ethernet
Router(config-if-srv)# encapsulation dot1q 20
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if-srv)# exit
Router(config-if)# rep segment 2 edge
Router(config)#connect test gigabitEthernet 3/0/0 10 gigabitEthernet 4/0/0 20
Router(config-connection)#end
Configuring REP over EVC using bridge domain for the Cisco 7600 Router
This section describes how to configure REP over EVC using bridge domain at service instance level.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. service instance id {Ethernet [service-name}
5. encapsulation dot1q vlan_id
6. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} {symmetric}
7. bridge-domain bd_Id
8. exit
9. rep segment segment_id [edge [no-neighbor] [primary]] [preferred]
10. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 3/0/0
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second dot1q 200
|
Configures the encapsulation. Defines the matching criteria to be used in order to map ingress dot1q frames on an interface to the appropriate service instance.
|
Step 6
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} ethernet cfm mip level 4 vlan 41
symmetric}
Example:
Router(config-if-srv)# rewrite ingress
tag push dot1q 20
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 7
|
bridge-domain bd_Id
Example:
Router(config-if-srv)# bridge-domain 10
|
Configures bridge-domain to add another VLAN tag of type bridge-domain to the incoming packet.
|
Step 8
|
exit
Example:
Router(config-if-srv)# exit
|
Exits service instance mode.
|
Step 9
|
rep segment segment_id [edge
[no-neighbor] [primary]] [preferred]
Example:
Router(config-if)# rep segment 2 edge
primary
|
Configures REP over EVC. The segment ID range is from 1 to 1024.
Note You must configure two edge ports, including one primary edge port for each segment.
These optional keywords are available.
•Enter edge to configure the port as an edge port. Entering edge without the primary keyword configures the port as the secondary edge port. Each segment has only two edge ports.
•On an edge port, enter primary to configure the port as the primary edge port, the port on which you can configure VLAN load balancing.
Note Although each segment can have only one primary edge port, if you configure edge ports on two different switches and enter the primary keyword on both switches, the configuration is allowed. However, REP selects only one of these ports as the segment primary edge port. You can identify the primary edge port for a segment by using the show rep topology privileged EXEC command.
•On an edge port, use the no-neighbor keyword to configure the segment edge with no external rep neighbor.
•Enter preferred to indicate that the port is the preferred alternate port, or the preferred port for VLAN load balancing.
Configuring a port as preferred does not guarantee that it becomes the alternate port; it merely gives it a slight edge among equal contenders. The alternate port is usually a previously failed port.
|
Step 10
|
exit
Example:
Router(config-if)# end
|
Exits global configuration mode.
|
Examples
This example shows how to configure REP over EVC using bridge domain.
Router# configure terminal
Router(config)# interface gigabitEthernet 3/0/0
Router(config-if)# service instance 10 ethernet
Router(config-if-srv)# encapsulation dot1q 10
Router(config-if-srv)# rewrite ingress tag pop 1 symmetric
Router(config-if-srv)# bridge-domain 100
Router(config-if-srv)# exit
Router(config-if)# rep segment 2 edge
This example shows how to configure REP with the edge no-neighbor keyword.
Router# configure terminal
Router(config)# interface gigabitEthernet 7/1
Router(config-if)# switchport
Router(config-if)# switchport mode trunk
Router(config-if)# rep segment 1 edge no-neighbor primary
Verification
You can use the show rep topology, show rep topology detail and show interface rep commands to verify the REP over EVC configuration. This information is displayed as sample output:
•Specific EVCs if an EVC ID is specified.
•All the EVCs on an interface if an interface is specified.
•The detailed option provides additional information about the EVC. This can be given on RP and LC consoles to determine custom ethertype configured under a physical port.
Example of show rep topology command:
BridgeName PortName Edge Role
---------------- ---------- ---- ----
Example of show rep topology detail command.
Router#show rep topology segment 3 detail
Router, Gi4/0/0 (Primary Edge)
Open Port, all vlans forwarding
Bridge MAC: 0015.fa66.ff80
Neighbor Number: 1 / [-6]
REP-ALPHA, Gi2/12 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.cd00
Neighbor Number: 2 / [-5]
REP-ALPHA, Fa3/1 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.cd00
Neighbor Number: 3 / [-4]
REP-BETA, Fa1/1 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.c900
Neighbor Number: 4 / [-3]
REP-BETA, Gi6/1 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.c900
Neighbor Number: 5 / [-2]
Router, Gi3/4 (Secondary Edge)
Alternate Port, some vlans blocked
Bridge MAC: 0015.fa66.ff80
Neighbor Number: 6 / [-1]
Example of show interface <> rep command:
Router#show interface gig4/0/0 rep detail
GigabitEthernet4/0/0 REP enabled
Segment-id: 3 (Primary Edge)
Operational Link Status: TWO_WAY
Current Key: 02040015FA66FF804050
Preempt Delay Timer: disabled
Configured Load-balancing Block Port: none
Configured Load-balancing Block VLAN: none
BPA (STCN, LSL) TLV rx: 0, tx: 0
BPA (STCN, HFL) TLV rx: 0, tx: 0
EPA-ELECTION TLV rx: 6, tx: 5
EPA-COMMAND TLV rx: 0, tx: 0
EPA-INFO TLV rx: 135, tx: 136
Show outputs for REP with Edge No-Neighbor keyword
Example of show rep topology command with REP edge no-neighbor keyword:
BridgeName PortName Edge Role
---------------- ---------- ---- ----
sw8-ts8-51 Gi0/2 Pri* Open
sw8-ts8-51 Gi0/1 Sec* Open
Example of show rep topology detail command with REP edge no-neighbor keyword:
Router#show rep topology segment 3 detail
Router, Gi4/0/0 (Primary Edge No-Neighbor)
Open Port, all vlans forwarding
Bridge MAC: 0015.fa66.ff80
Neighbor Number: 1 / [-6]
REP-ALPHA, Gi2/12 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.cd00
Neighbor Number: 2 / [-5]
REP-ALPHA, Fa3/1 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.cd00
Neighbor Number: 3 / [-4]
REP-BETA, Fa1/1 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.c900
Neighbor Number: 4 / [-3]
REP-BETA, Gi6/1 (Intermediate)
Open Port, all vlans forwarding
Bridge MAC: 0005.7495.c900
Neighbor Number: 5 / [-2]
Router, Gi3/4 (Secondary Edge)
Alternate Port, some vlans blocked
Bridge MAC: 0015.fa66.ff80
Neighbor Number: 6 / [-1]
Example of show interface <> rep command with REP edge no-neighbor keyword:
Router#show interface gig4/0/0 rep detail
GigabitEthernet4/0/0 REP enabled
Segment-id: 3 (Primary Edge No-Neighbor)
Operational Link Status: TWO_WAY
Current Key: 02040015FA66FF804050
Preempt Delay Timer: disabled
Configured Load-balancing Block Port: none
Configured Load-balancing Block VLAN: none
BPA (STCN, LSL) TLV rx: 0, tx: 0
BPA (STCN, HFL) TLV rx: 0, tx: 0
EPA-ELECTION TLV rx: 6, tx: 5
EPA-COMMAND TLV rx: 0, tx: 0
EPA-INFO TLV rx: 135, tx: 136
Configuring Resilient Ethernet Protocol Configurable Timers
The REP Configurable Timer (REP Fast Hellos) feature provides a fast re-convergence in a ring topology with higher timer granularity and quicker failure detection on the remote side. The feature also supports improved convergence of REP segments having nodes with copper based SFP's, where the link detection time varies between 300ms to 700 ms.
With the REP Link Status Layer (LSL) ageout timer configuration, the failure detection time can be configured between a range of 120 millisecond to 10,000 millisecond, in multiples of 40ms. The result of this configuration is that, even if the copper pull takes about 700 ms to notify the remote end about the failure, the REP Configurable Timers process will detect it much earlier and takes subsequent action for the failure recovery with in 200 ms.
Restrictions and Usage Guidelines
Follow these guidelines and restrictions:
•The LSL Age Out Timer configuration is available on switchports, EVC, L2 Port-channel and Port-channel EVC interfaces.
•The SUP 720, RSP 720, RSP 10G supervisors and the ES20, ES40, and LAN line cards support the REP Configurable Timers configuration.
•While configuring REP configurable timers, we recommend you shut the port, configure REP and only then use the no shut command. This prevents the REP from flapping and generating large number of internal messages.
•If incompatible switches are neighbors, configure the correct LSL Age Out value first. In some scenarios, you might not get the expected convergence range.
•In order to inter-operate with switches running old IOS versions, the default LSL Age Out time is set to 5 seconds, default LSL retries is 5, and the hello packet is sent every one second.
•Except for the LSL Age Out time, all the other timer values are retained. For example, the EPA (End Port Advertisement) hello timer continues to be 4 seconds, as it is not required to send EPA PDUs at a higher frequency.
•While configuring REP configurable timers, we recommend you configure the REP LSL number of retries first and then configure the REP LSL age out timer value.
•Effective from Cisco IOS release 15.1(2)S:
–The REP Configurable Timers feature is SSO compliant for RSP720, RSP10G (endor) and SUP720 supervisors.
–The REP Configurable Timers feature on SSO is not supported with SUP32 supervisor.
–The REP LSL Age Out value can be configured as low as 1520 ms (approximately 500 ms * 3) for HA systems as this prevents traffic loss.
•The REP Configurable Timers feature is supported only on Cisco 7600 S-chassis.
Configuring REP Configurable Timers for the Cisco 7600 Router
This section describes how to configure the LSL age out timer and the LSL number of retries on a Cisco 7600 router:
•Configuring the REP Link Status Layer Retries
•Configuring the REP Link Status Layer Age Out Timer
Configuring the REP Link Status Layer Retries
This section describes how to configure REP link status layer number of retries at interface configuration level.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. rep segment segment_id [edge [no-neighbor] [primary]] [preferred]
5. rep lsl-retries <no-of-retries>
6. end
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 2/0/3
|
Specifies the Gigabit Ethernet, Ten Gigabit Ethernet and Port Channel interfaces to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
rep segment segment_id [edge
[no-neighbor] [primary]] [preferred]
Example:
Router(config-if)# rep segment 2 edge
primary
|
Configures the REP. The segment ID range is from 1 to 1024.
Note You must configure two edge ports, including one primary edge port for each segment.
These optional keywords are available.
•Enter edge to configure the port as an edge port. Entering edge without the primary keyword configures the port as the secondary edge port. Each segment has only two edge ports.
•On an edge port, enter primary to configure the port as the primary edge port, the port on which you can configure VLAN load balancing.
Note Although each segment can have only one primary edge port, if you configure edge ports on two different switches and enter the primary keyword on both switches, the configuration is allowed. However, REP selects only one of these ports as the segment primary edge port. You can identify the primary edge port for a segment by using the show rep topology privileged EXEC command.
•On an edge port, use the no-neighbor keyword to configure the segment edge with no external rep neighbor.
•Enter preferred to indicate that the port is the preferred alternate port, or the preferred port for VLAN load balancing.
Configuring a port as preferred does not guarantee that it becomes the alternate port; it merely gives it a slight edge among equal contenders. The alternate port is usually a previously failed port.
|
Step 5
|
rep lsl-retries <no-of-retries>
Example:
Router(config-if)# rep lsl-retries 4
|
Configures the number of retries before the REP link is disabled. The acceptable range of retries is 3-10. The default LSL number of retries is 5.
|
Step 6
|
end
Example:
Router(config-if)# end
|
Exits configuration mode.
|
Examples
This example shows how to configure REP link status layer number of retries.
Router# configure terminal
Router(config)# interface gigabitethernet 2/0/3
Router(config-if)# rep segment 2 edge primary
Router(config-if)# rep lsl-retries 4
Router(config-if)# end
Configuring the REP Link Status Layer Age Out Timer
This section describes how to configure the REP Link Status Layer Age Out Timer at interface configuration level.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. rep segment segment_id [edge [no-neighbor] [primary]] [preferred]
5. rep lsl-age-timer <lsl-age-timer>
6. end
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 5/0/2
|
Specifies the Gigabit Ethernet, Ten Gigabit Ethernet and Port Channel interfaces to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
rep segment segment_id [edge
[no-neighbor] [primary]] [preferred]
Example:
Router(config-if)# rep segment 1 edge
primary
|
Configures the REP. The segment ID range is from 1 to 1024.
Note You must configure two edge ports, including one primary edge port for each segment.
These optional keywords are available.
•Enter edge to configure the port as an edge port. Entering edge without the primary keyword configures the port as the secondary edge port. Each segment has only two edge ports.
•On an edge port, enter primary to configure the port as the primary edge port, the port on which you can configure VLAN load balancing.
Note Although each segment can have only one primary edge port, if you configure edge ports on two different switches and enter the primary keyword on both switches, the configuration is allowed. However, REP selects only one of these ports as the segment primary edge port. You can identify the primary edge port for a segment by using the show rep topology privileged EXEC command.
•On an edge port, use the no-neighbor keyword to configure the segment edge with no external rep neighbor.
•Enter preferred to indicate that the port is the preferred alternate port, or the preferred port for VLAN load balancing.
Configuring a port as preferred does not guarantee that it becomes the alternate port; it merely gives it a slight edge among equal contenders. The alternate port is usually a previously failed port.
|
Step 5
|
rep lsl-age-timer <lsl-age-timer>
Example:
Router(config-if)# rep lsl-age-timer
2000
|
Configures REP link status layer age out timer value. The acceptable range of lsl-age-timer is between 120ms and 10000ms, in multiples of 40ms. The default LSL Age Out time is 5 seconds.
|
Step 6
|
end
Example:
Router(config-if)# end
|
Exits configuration mode.
|
Examples
This example shows how to configure REP link status layer number of retries.
Router# configure terminal
Router(config)# interface gigabitethernet 2/0/3
Router(config-if)# rep segment 2 edge primary
Router(config-if)# rep lsl-retries 4
Router(config-if)# end
Configuring the REP Link Status Layer Age Out Timer
This section describes how to configure the REP Link Status Layer Age Out Timer at interface configuration level.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. rep segment segment_id [edge [primary]] [preferred]
5. rep lsl-age-timer <lsl-age-timer>
6. end
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface type slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 5/0/2
|
Specifies the Gigabit Ethernet, Ten Gigabit Ethernet and Port Channel interfaces to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
rep segment segment_id [edge [primary]]
[preferred]
Example:
Router(config-if)# rep segment 1 edge
primary
|
Configures the REP. The segment ID range is from 1 to 1024.
Note You must configure two edge ports, including one primary edge port for each segment.
These optional keywords are available.
•Enter edge to configure the port as an edge port. Entering edge without the primary keyword configures the port as the secondary edge port. Each segment has only two edge ports.
•On an edge port, enter primary to configure the port as the primary edge port, the port on which you can configure VLAN load balancing.
Note Although each segment can have only one primary edge port, if you configure edge ports on two different switches and enter the primary keyword on both switches, the configuration is allowed. However, REP selects only one of these ports as the segment primary edge port. You can identify the primary edge port for a segment by entering the show rep topology privileged EXEC command.
•Enter preferred to indicate that the port is the preferred alternate port or the preferred port for VLAN load balancing.
Configuring a port as preferred does not guarantee that it becomes the alternate port; it merely gives it a slight edge among equal contenders. The alternate port is usually a previously failed port.
|
Step 5
|
rep lsl-age-timer <lsl-age-timer>
Example:
Router(config-if)# rep lsl-age-timer
2000
|
Configures REP link status layer age out timer value. The acceptable range of lsl-age-timer is between 120ms and 10000ms, in multiples of 40ms. The default LSL Age Out time is 5 seconds.
|
Step 6
|
end
Example:
Router(config-if)# end
|
Exits configuration mode.
|
Examples
This example shows how to configure REP link status layer ageout timer value.
Router# configure terminal
Router(config)# interface GigabitEthernet 5/0/2
Router(config-if)# rep segment 1 edge primary
Router(config-if)# rep lsl-age-timer 2000
Verification
Use the show interfaces <interface name> rep detail command to view the configured LSL number of retries and the LSL Age Out timer values.
7600-1#show interfaces GigabitEthernet11/0/1 rep detail
GigabitEthernet11/0/1 REP enabled
Operational Link Status: NO_NEIGHBOR
Current Key: 0A010009B6D8F700EEA1
Port Role: Fail No Ext Neighbor
Preempt Delay Timer: disabled
Configured Load-balancing Block Port: none
Configured Load-balancing Block VLAN: none
BPA (STCN, LSL) TLV rx: 0, tx: 0
BPA (STCN, HFL) TLV rx: 0, tx: 0
EPA-ELECTION TLV rx: 0, tx: 0
EPA-COMMAND TLV rx: 0, tx: 0
EPA-INFO TLV rx: 0, tx: 0
Troubleshooting
Table 2-20 provides troubleshooting solutions for the REP feature.
Table 2-20 Troubleshooting Reverse REP feature
Problem
|
Solution
|
RL2GP configuration issues
|
Use the show spanning-tree pseudo-information [id [configuration | interface]] and debug spanning-tree pseudo-information commands to trace the configuration sequence of the R-L2GP commands and the messages between the route and switch processor. Share the output with TAC for further investigation.
|
Disabled STP or MST instances
|
Use the show spanning-tree [active | detail | interface] command to verify the state of the STP or MST. Share the output with TAC for further investigation.
|
spanning-tree pseudo-information transmit command is rejected
|
Verify if :
•All MST instances within the pseudo-information are configured within the MST global configuration.
•MSTI 0 (IST) is configured within the pseudo-information.
|
Cannot configure MST
|
Re-configure MSTE and ensure that priority, MAC address and cost are the same on both the network processor engines.
|
System loops
|
Re-configure all the 64 VLAN instances per RL2GP within a Pseudo ID.
|
Configuration is rejected when the MST region ID is modified.
|
As IOS supports only single region MST, remove the multiple MSTregion IDs that have been configured and configure only a single MST ID.
|
Configuring CFM over EFP Interface with cross connect
Ethernet Connectivity Fault Management (CFM) is an end-to-end per-service-instance Ethernet layer OAM protocol that includes proactive connectivity monitoring, fault verification, and fault isolation. Currently, Ethernet CFM supports Up facing and Down facing Maintenance Endpoints (MEPs). For information on Ethernet Connectivity Fault Management, see http://www.cisco.com/en/US/docs/ios/12_2sr/12_2sra/feature/guide/srethcfm.html
The CFM over EFP Interface with xconnect feature allows you to:
•Forward continuity check messages (CCM) towards the core over cross connect pseudowires.
•Receive CFM messages from the core.
•Forward CFM messages to the access side (after Continuity Check Database [CCDB] based on maintenance point [MP] filtering rules).
Restrictions and Usage Guidelines
When configuring CFM over EFP Interface with cross connect, follow these restrictions and usage guidelines:
•The following line cards are supported:
–ES20 line cards
–ES+ line cards
•Only a single down-facing MEP is allowed on the L2VFI.
•As the number of PEs in a VPLS instance scale up, the number of CFM CC messages processed increases. Accordingly, the configuration of the down-facing MEP on L2VFI for large fully meshed PW topologies should be considered for only premium valued networks.
•In the design of CFM domains, the maintenance level of an Down-facing MEP on the L2VFI interface must be lower than the level from the AC.
•Up MEP, Down MEP, and MIPs are supported.
Configuring CFM over EFP with xconnect for the Cisco 7600 Router
This section describes how to configure REP over EVC for the Cisco 7600 router:
•Configuring CFM over EFP Interface with Cross Connect—Basic Configuration
•Configuring CFM over EFP Interface with Cross Connect—Single Tag VLAN Cross Connect
•Configuring CFM over EFP Interface with Cross Connect—Double Tag VLAN Cross Connect
•Configuring CFM over EFP Interface with Cross Connect—Selective QinQ Cross Connect
•Configuring CFM over EFP Interface with Cross Connect—Port-Based Cross Connect Tunnel
•Configuring CFM over EFP Interface with Cross Connect—Port Channel-Based Cross Connect Tunnel
Configuring CFM over EFP Interface with Cross Connect—Basic Configuration
This section describes how to configure CFM over EFP Interface with cross connect.
SUMMARY STEPS
1. enable
2. configure terminal
3. pseudowire-class [pw-class-name]
4. encapsulation mpls
5. exit
6. interface gigabitethernet slot/port or interface tengigabitethernet slot/port
7. service instance id {Ethernet [service-name}
8. encapsulation untagged, dot1q vlan_id
9. xconnect peer-ip-address vc-id {encapsulation {l2tpv3 [manual] | mpls [manual]} | pw-class pw-class-name }[pw-class pw-class-name] [sequencing {transmit | receive | both}]
10. cfm mep domain domain-name [up | down] mpid mpid-value [cos cos-value]
11. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
pseudowire-class [pw-class-name]
Example:
Router(config)# pseudowire-class
vlan-xconnect
|
Specifies the name of a Layer 2 pseudowire class and enter pseudowire class configuration mode.
|
Step 4
|
encapsulation mpls
Example:
Router(config-if)# encapsulation mpls
|
Specifies that Multiprotocol Label Switching (MPLS) is used as the data encapsulation method for tunneling Layer 2 traffic over the pseudowire.
|
Step 5
|
exit
Example:
Router(config-if-srv)# exit
|
Exits the pseudowire class configuration mode.
|
Step 6
|
interface gigabitethernet slot/port or
interface tengigabitethernet slot/port
Example:
Router(config-if-srv)# interface
Gi2/0/2
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure.
|
Step 7
|
service instance id ethernet
[service-name]
Example:
Router(config-if-srv)# service instance
101 ethernet
|
Creates a service instance (an instantiation of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 8
|
encapsulation dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second dot1q 200
|
Configures the encapsulation. Defines the matching criteria that maps the ingress dot1q, QinQ, or untagged frames on an interface for the appropriate service instance.
|
Step 9
|
xconnect peer-ip-address vc-id
{encapsulation {l2tpv3 [manual] | mpls
[manual]} | pw-class pw-class-name
}[pw-class pw-class-name] [sequencing
{transmit | receive | both}]
Example:
Router(config-if-srv)# xconnect
10.0.3.201 123 pw-class vlan-xconnect
|
Binds an attachment circuit to a pseudowire, and configures an Any Transport over MPLS (AToM) static pseudowire.
|
Step 10
|
cfm mep domain domain-name [up | down]
mpid mpid-value [cos cos-value]
Example:
Router(config-if-srv)# cfm mep down
mpid 100 domain Core
|
Configures a maintenance endpoint (MEP) for a domain.
|
Step 11
|
exit
Example:
Router(config-if-srv)# exit
|
Exits the interface configuration mode.
|
Examples
This example shows how to configure CFM over EVC using cross connect.
Enter configuration commands, one per line. End with CNTL/Z.
PE3(config)#ethernet cfm domain L6 level 6
PE3(config-ecfm)# service s256 evc 256
PE3(config-ecfm-srv)# continuity-check
PE3(config)#int ten 2/0/0
PE3(config-if)#no ip address
PE3(config-if)# service instance 256 ethernet 256
PE3(config-if-srv)# encapsulation dot1q 256
PE3(config-if-srv)# xconnect 1.1.1.1 1 encapsulation mpls
PE3(cfg-if-ether-vc-xconn)# cfm mep domain L6 mpid 256
PE3(config-if-srv-ecfm-mep)#end
PE3(config)#ethernet cfm domain L2 level 2
PE3(config-ecfm)# service s256 evc 256 direction down
PE3(config-ecfm-srv)# continuity-check
PE3(config)#int ten 2/0/0
PE3(config-if)#no ip address
PE3(config-if)# service instance 256 ethernet 256
PE3(config-if-srv)# encapsulation dot1q 256
PE3(config-if-srv)# xconnect 1.1.1.1 1 encapsulation mpls
PE3(cfg-if-ether-vc-xconn)# cfm mep domain L6 mpid 256
PE3(config-if-srv-ecfm-mep)#end
Configuring CFM over EFP Interface with Cross Connect—Single Tag VLAN Cross Connect
This section describes how to configure CFM over EFP Interface with Single Tag VLAN cross connect.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port or interface tengigabitethernet slot/port
4. service instance id {Ethernet [service-name}
5. encapsulation untagged dot1q {any | vlan-id[vlan-id[vlan-id]} second-dot1q {any |vlan-id[vlan-id[vlan-id]]}
6. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
7. xconnect peer-ip-address vc-id {encapsulation {l2tpv3 [manual] | mpls [manual]} | pw-class pw-class-name }[pw-class pw-class-name] [sequencing {transmit | receive | both}]
8. cfm mep domain domain-name [up | down] mpid mpid-value [cos cos-value]
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters the global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface Gi2/0/2
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instantiation of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second dot1q 100
|
Configures the encapsulation. Defines the matching criteria that maps the ingress dot1q, QinQ, or untagged frames on an interface for the appropriate service instance.
|
Step 6
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric]
Example:
Router(config-if-srv)# rewrite dot1q
single symmetric
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 7
|
xconnect peer-ip-address vc-id
{encapsulation {l2tpv3 [manual] | mpls
[manual]} | pw-class pw-class-name
}[pw-class pw-class-name] [sequencing
{transmit | receive | both}]
Example:
Router(config)# xconnect 10.0.3.201 123
pw-class vlan-xconnect
|
Binds an attachment circuit to a pseudowire, and configures an Any Transport over MPLS (AToM) static pseudowire.
|
Step 8
|
cfm mep domain domain-name [up | down]
mpid mpid-value [cos cos-value]
Example:
Router# cfm mep up mpid 100 domain Core
|
Configures a maintenance endpoint (MEP) for a domain.
|
Examples
This example shows how to configure CFM over EFP Interface with Single Tag VLAN cross connect:
PE3(config)#ethernet cfm domain L2 level 2
PE3(config-ecfm)# service s256 evc 256 direction down
PE3(config-ecfm-srv)# continuity-check
PE3(config)#int ten 2/0/0
PE3(config-if)#no ip address
PE3(config-if)# service instance 256 ethernet 256
PE3(config-if-srv)# encapsulation dot1q 256
PE3(config-if-srv)# xconnect 1.1.1.1 1 encapsulation mpls
PE3(cfg-if-ether-vc-xconn)# cfm mep domain L6 mpid 256
PE3(config-if-srv-ecfm-mep)#end
Configuring CFM over EFP Interface with Cross Connect—Double Tag VLAN Cross Connect
This section describes how to configure CFM over EFP Interface with Double Tag VLAN cross connect.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. service instance id {Ethernet [service-name}
5. encapsulation untagged dot1q {any | vlan-id[vlan-id[vlan-id]} second-dot1q {any |vlan-id[vlan-id[vlan-id]]}
6. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
7. xconnect peer-ip-address vc-id {encapsulation {l2tpv3 [manual] | mpls [manual]} | pw-class pw-class-name }[pw-class pw-class-name] [sequencing {transmit | receive | both}]
8. cfm mep domain domain-name [up | down] mpid mpid-value [cos cos-value]
9. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface Gi2/0/2
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 100
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation untagged dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 100 second-dot1q 200
|
Configures the encapsulation. Defines the matching criteria that maps the ingress dot1q, QinQ, or untagged frames on an interface for the appropriate service instance.
|
Step 6
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric]
Example:
Router(config-if-srv)# rewrite dot1q
double symmetric
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 7
|
xconnect peer-ip-address vc-id
{encapsulation {l2tpv3 [manual] | mpls
[manual]} | pw-class pw-class-name
}[pw-class pw-class-name] [sequencing
{transmit | receive | both}]
Example:
Router(config)# xconnect 1.1.1.1 100
pw-class vlan-xconnect
|
Binds an attachment circuit to a pseudowire, and configures an Any Transport over MPLS (AToM) static pseudowire.
|
Step 8
|
cfm mep domain domain-name [up | down]
mpid mpid-value [cos cos-value]
Example:
Router# cfm mep down mpid 100 domain
Core
|
Configures a maintenance endpoint (MEP) for a domain.
|
Examples
This example shows how to configure CFM over EFP Interface with Double Tag VLAN cross connect:
PE3(config)#ethernet cfm domain L2 level 2
PE3(config-ecfm)# service s256 evc 256 direction down
PE3(config-ecfm-srv)# continuity-check
PE3(config)#int ten 2/0/0
PE3(config-if)#no ip address
PE3(config-if)# service instance 256 ethernet 256
PE3(config-if-srv)# encapsulation dot1q 256 second-dot1q 257
PE3(config-if-srv)# xconnect 1.1.1.1 1 encapsulation mpls
PE3(cfg-if-ether-vc-xconn)# cfm mep domain L6 mpid 256
PE3(config-if-srv-ecfm-mep)#end
Configuring CFM over EFP Interface with Cross Connect—Selective QinQ Cross Connect
This section describes how to configure CFM over EFP Interface with Selective QinQ cross connect.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. exit
5. service instance id {Ethernet [service-name}
6. encapsulation untagged dot1q {any | vlan-id[vlan-id[vlan-id]} second-dot1q {any |vlan-id[vlan-id[vlan-id]]}
7. xconnect peer-ip-address vc-id {encapsulation {l2tpv3 [manual] | mpls [manual]} | pw-class pw-class-name }[pw-class pw-class-name] [sequencing {transmit | receive | both}]
8. cfm mep domain domain-name [up | down] mpid mpid-value [cos cos-value]
9. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface Gi2/0/2
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation untagged dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
default
|
Configures the encapsulation. Defines the matching criteria that maps the ingress dot1q, QinQ, or untagged frames on an interface for the appropriate service instance.
|
Step 6
|
xconnect peer-ip-address vc-id
{encapsulation {l2tpv3 [manual] | mpls
[manual]} | pw-class pw-class-name
}[pw-class pw-class-name] [sequencing
{transmit | receive | both}]
Example:
Router(config)# xconnect 10.0.3.201 123
pw-class vlan-xconnect
|
Binds an attachment circuit to a pseudowire, and configures an Any Transport over MPLS (AToM) static pseudowire.
|
Step 7
|
cfm mep domain domain-name [up | down]
mpid mpid-value [cos cos-value]
Example:
Router# cfm mep down mpid 100 domain
Core
|
Configures a maintenance endpoint (MEP) for a domain.
|
Examples
This example shows how to configure CFM over EFP Interface with Selective QinQ cross connect:
PE3(config)#ethernet cfm domain L2 level 2
PE3(config-ecfm)# service s256 evc 256 direction down
PE3(config-ecfm-srv)# continuity-check
PE3(config)#int ten 2/0/0
PE3(config-if)#no ip address
PE3(config-if)# service instance 256 ethernet 256
PE3(config-if-srv)# encapsulation dot1q 256 second-dot1q 257 cos 7
PE3(config-if-srv)# xconnect 1.1.1.1 1 encapsulation mpls
PE3(cfg-if-ether-vc-xconn)# cfm mep domain L6 mpid 256
PE3(config-if-srv-ecfm-mep)#end
Configuring CFM over EFP Interface with Cross Connect—Port-Based Cross Connect Tunnel
This section describes how to configure CFM over EFP Interface with Port-Based cross connect Tunnel.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. service instance id {Ethernet [service-name}
5. encapsulation untagged dot1q {any | vlan-id[vlan-id[vlan-id]} second-dot1q {any |vlan-id[vlan-id[vlan-id]]}
6. xconnect peer-ip-address vc-id {encapsulation {l2tpv3 [manual] | mpls [manual]} | pw-class pw-class-name }[pw-class pw-class-name] [sequencing {transmit | receive | both}]
7. cfm mep domain domain-name [up | down] mpid mpid-value [cos cos-value]
8. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface Gi2/0/2
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 100
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation untagged dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 10-20, 30, 50-60
|
Configures the encapsulation. Defines the matching criteria that maps the ingress dot1q, QinQ, or untagged frames on an interface for the appropriate service instance.
|
Step 6
|
xconnect peer-ip-address vc-id
{encapsulation {l2tpv3 [manual] | mpls
[manual]} | pw-class
pw-class-name}[pw-class pw-class-name]
[sequencing {transmit | receive |
both}]
Example:
Router(config)# xconnect 1.1.1.1 100
pw-class vlan-xconnect
|
Binds an attachment circuit to a pseudowire, and configures an Any Transport over MPLS (AToM) static pseudowire.
|
Step 7
|
cfm mep domain domain-name [up | down]
mpid mpid-value [cos cos-value]
Example:
Router# cfm mep up mpid 100 domain Core
|
Configures a maintenance endpoint (MEP) for a domain.
|
Examples
This example shows how to configure CFM over EFP Interface with Port-Based cross connect Tunnel:
PE3(config)#ethernet cfm domain L2 level 2
PE3(config-ecfm)# service s256 evc 256 direction down
PE3(config-ecfm-srv)# continuity-check
PE3(config)#int ten 2/0/0
PE3(config-if)#no ip address
PE3(config-if)# service instance 256 ethernet 256
PE3(config-if-srv)# encapsulation dot1q 256
PE3(config-if-srv)# xconnect 1.1.1.1 1 encapsulation mpls
PE3(cfg-if-ether-vc-xconn)# cfm mep domain L6 mpid 256
PE3(config-if-srv-ecfm-mep)#end
Configuring CFM over EFP Interface with Cross Connect—Port Channel-Based Cross Connect Tunnel
This section describes how to configure CFM over EFP Interface with Port Channel-Based cross connect Tunnel.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type slot/subslot/port
4. service instance id {Ethernet [service-name}
5. encapsulation untagged dot1q {any | vlan-id[vlan-id[vlan-id]} second-dot1q {any |vlan-id[vlan-id[vlan-id]]}
6. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
7. xconnect peer-ip-address vc-id {encapsulation {l2tpv3 [manual] | mpls [manual]} | pw-class pw-class-name }[pw-class pw-class-name] [sequencing {transmit | receive | both}]
8. cfm mep domain domain-name [up | down] mpid mpid-value [cos cos-value]
9. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface Port-channel
1
|
Specifies the Gigabit Ethernet interface to configure, where:
slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id Ethernet
[service-name]
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instance of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation untagged dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
second-dot1q {any |
vlan-id[vlan-id[-vlan-id]]}
Example:
Router(config-if-srv)# encapsulation
dot1q 20 second-dot1q 30
|
Configures the encapsulation. Defines the matching criteria that maps the ingress dot1q, QinQ, or untagged frames on an interface for the appropriate service instance.
|
Step 6
|
rewrite ingress tag {push {dot1q
vlan-id | dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| pop {1 | 2} | translate {1-to-1
{dot1q vlan-id | dot1ad vlan-id}|
2-to-1 dot1q vlan-id | dot1ad vlan-id}|
1-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q vlan-id}
| 2-to-2 {dot1q vlan-id second-dot1q
vlan-id | dot1ad vlan-id dot1q
vlan-id}} [symmetric]
Example:
Router(config-if-srv)# rewrite ingress
tag pop 2 symmetric
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 7
|
xconnect peer-ip-address vc-id
{encapsulation {l2tpv3 [manual] | mpls
[manual]} | pw-class pw-class-name
}[pw-class pw-class-name] [sequencing
{transmit | receive | both}]
Example:
Router(config)# xconnect 1.1.1.1 100
pw-class vlan-xconnect
|
Binds an attachment circuit to a pseudowire, and configures an Any Transport over MPLS (AToM) static pseudowire.
|
Step 8
|
cfm mep domain domain-name [up | down]
mpid mpid-value [cos cos-value]
Example:
Router# cfm mep up mpid 100 domain Core
|
Configures a maintenance endpoint (MEP) for a domain.
|
Examples
This example shows how to configure CFM over EFP Interface with Port Channel-Based cross connect Tunnel:
PE3(config)#ethernet cfm domain L2 level 2
PE3(config-ecfm)# service s256 evc 256 direction down
PE3(config-ecfm-srv)# continuity-check
PE3(config-if)#no ip address
PE3(config-if)# service instance 256 ethernet 256
PE3(config-if-srv)# encapsulation dot1q 256
PE3(config-if-srv)# xconnect 1.1.1.1 1 encapsulation mpls
PE3(cfg-if-ether-vc-xconn)# cfm mep domain L6 mpid 256
PE3(config-if-srv-ecfm-mep)#end
Verification
•Use the following commands to verify a configuration:
You can use the show ethernet cfm ma remote commands to verify the CFM over EVC configuration. This command shows the basic configuration information for CFM.
Router-30-PE1#show ethernet cfm ma local
--------------------------------------------------------------------------------
MPID Domain Name Lvl MacAddress Type CC
--------------------------------------------------------------------------------
1 L6 6 000a.f393.56d0 XCON Y
3 L5 5 0007.8478.4410 XCON Y
* = MIP Manually Configured
--------------------------------------------------------------------------------
Level Port MacAddress SrvcInst Type Id
--------------------------------------------------------------------------------
7 Te2/0/0 0007.8478.4410 1 XCON N/A
•Use the show ethernet cfm ma remote to verify the MEP configuration:
Router-30-PE1#show ethernet cfm ma remote
--------------------------------------------------------------------------------
MPID Domain Name MacAddress IfSt PtSt
RDI MA Name Type Id SrvcInst
--------------------------------------------------------------------------------
4 L5 000a.f393.56d0 Up Up
5 L5 Te2/0/0:(2.2.2.2, 1)
2 L6 000a.f393.56d0 Up Up
6 L6 Te2/0/0:(2.2.2.2, 1)
•Use the show ethernet cfm mpdb command to verify the catalouge of CC with MIP in intermediate routers.
PE2#show ethernet cfm mpdb
* = Can Ping/Traceroute to MEP
--------------------------------------------------------------------------------
MPID Domain Name MacAddress Version
Expd MA Name Type Id SrvcInst
--------------------------------------------------------------------------------
600 * L6 0021.d8ca.d7d0 IEEE-CFM
700 L7 001f.cab7.fd01 IEEE-CFM
•Use the show mpls l2 vc 1 detail commaned to show detailed configuration information:
Local interface: Te8/0/1 up, line protocol up, Eth VLAN 200 up
Interworking type is Ethernet
Destination address: 3.3.3.3, VC ID: 1, VC status: up
Output interface: Te8/0/0, imposed label stack {21}
Preferred path: not configured
Create time: 21:13:27, last status change time: 02:55:33
Signaling protocol: LDP, peer 3.3.3.3:0 up
Targeted Hello: 2.2.2.2(LDP Id) -> 3.3.3.3, LDP is UP
Status TLV support (local/remote) : enabled/supported
LDP route watch : enabled
Label/status state machine : established, LruRru
Last local dataplane status rcvd: No fault
Last local SSS circuit status rcvd: No fault
Last local SSS circuit status sent: No fault
Last local LDP TLV status sent: No fault
Last remote LDP TLV status rcvd: No fault
Last remote LDP ADJ status rcvd: No fault
MPLS VC labels: local 21, remote 21
Group ID: local 0, remote 0
MTU: local 1500, remote 1500
Remote interface description:
Sequencing: receive disabled, send disabled
Control Word: On (configured: autosense)
transit packet totals: receive 37, send 1067452272
transit byte totals: receive 4181, send 72586757556
transit packet drops: receive 0, seq error 0, send 0
•Use show mpls forwarding-table command to verify the cross connect VC:
PE1#show mpls forwarding-table
Local Outgoing Prefix Bytes Label Outgoing Next Hop
Label Label or Tunnel Id Switched interface
17 Pop Label 3.3.3.3/32 23038746624 Te8/0/0 20.1.1.2
21 No Label l2ckt(1) 4181 Te8/0/1 point2point
•Use show ethernet cfm error command to view the error report:
PE2#show ethernet cfm error
--------------------------------------------------------------------------------
MPID Domain Id Mac Address Type Id Lvl
--------------------------------------------------------------------------------
- L3 001d.45fe.ca81 BD-V 200 3
Troubleshooting CFM Features
Table 2-21 provides troubleshooting solutions for the CFM features.
Table 2-21
Problem
|
Solution
|
When you configure CFM, the message "Match registers are not available" is displayed.
|
Use the show platform mrm info command on the SP console to verify the match registers. Based on the derived output, perform these tasks:
1. Check the hardware limitations on the affected ports.
2. Enable CFM across the system to allow co-existence with other protocols.
3. Ensure that no CFM traffic is present in any supervisor or ports.
4. Configure STP mode to Multiple Spanning Tree (MST) and re-enable CFM or disable CFM completely.
For more information on match registers, see Ethernet Connectivity Fault Management at http://www.cisco.com/en/US/docs/ios/12_2sr/12_2sra/feature/guide/srethcfm.html.
CFM uses two match registers to identify the control packet type and each VLAN spanning tree also uses a match register to identify its control packet type. For both protocols to work on the same system, each line card should support three match registers, and at least one supporting only a 44 bit MAC match.
|
CFM configuration errors
|
CFM configuration error occurs when when a MEP receives a continuity check with an overlapping MPID. To verify the source of the error, use the command show ethernet cfm errors configuration or show ethernet cfm errors.
|
CFM ping and traceroute result is "not found"
|
Complete these steps:
1. Use show run ethernet cfm to view all CFM global configurations.
2. Use show ethernet cfm location main to view local MEPs and their CCM statistics
3. Use show ethernet cfm peer meps command to View CFM CCM received from Peer MEPs.
4. Use trace ethernet cfm command to start a CFM trace.
|
CFM connectivity is down and issues at the maintenance domain levels
|
Use the ping ethernet {mac-address | mpid id | multicast} domain domain-name { vlan vlan-id | port | evc evc-name } or traceroute ethernet {mac-address | mpid id } domain domain-name { vlan vlan-id | port | evc evc-name } commands to verify ethernet CFM connectivity. Share the output with TAC for further investigation.
|
Loop trap error
|
Use the show ethernet cfm error command to check for Loop Trap errors as shown here:
CE(config-if)#do sh ethernet cfm err
--------------------------------------------------
-----------------------------
Level Vlan MPID Remote MAC Reason
Service ID
--------------------------------------------------
-----------------------------
5 711 550 1001.1001.1001 Loop Trap Error
OUT
--------------------------------------------------
-----------------------------
Level Vlan MPID Remote MAC Reason
Service ID
--------------------------------------------------
-----------------------------
5 711 550 1001.1001.1001 Loop Trap Error
OUT
|
Module has insufficient match registers
|
Complete these steps:
1. Verify and confirm if a unsupported line card is inserted into the router.
2. If yes, perform a OIR to remove the unsupported line card.
|
CFM is deactivated
|
Complete these steps:
1. Check if all the line cards have free match reagisters.
2. Check if CFM is activated on supervisor cards. CFM is not supported on supervisor cards that has two match registers. In this scenario, CFM is automatically disabled on the SUP ports and enabled on rest of the line cards.
|
Troubleshooting Scenarios for CFM features
Configuring Reverse Layer 2 Gateway Ports for the Cisco 7600 Router
Layer 2 Gateway Ports (L2GP) is a proposed IEEE standard (802.1ah) to address the issues that arise when two independent bridged domains are connected redundantly through an arbitrary number of links. Layer 2 Gateway Ports define how the forwarding gateways are selected so that only redundant ports are blocked, and there are no temporary loops. The transitions can be at least as fast as STP L2GP resolves the transient loop problem during the re-convergence as it does not require cooperation from the outside domain.
Reverse L2GP (R-L2GP) is a variation of L2GP. In case of R-L2GP, the pseudo information of the R-L2GP is transmitted by NPEs, instead of uPEs. R-L2GP provides a mechanism to send out static preconfigured BPDUs on each ring access port of nPEs to stimulate a per-access ring instantiation of the protocol. In order for this to work, the pair of nPEs are programmed to send out BPDUs on the access ring ports in such a way that they appear to be either:
•The root bridge itself (the bridge with the lowest bridge id/priority).
•The bridge with the second lowest bridge ID/priority, and with a 0 cost path to the root.
Using R-L2GP, you can configure static BPDUs instead of dynamic configuration.
Effective with Release 15.1(3)S, multiple Bridge Protocol Data Unit (BPDU) pseudowires (PW) are supported for the R-L2GP protocol. Note that only one BPDU PW is supported for Multiple Spanning Tree (MST) protocol.
Multiple BPDU PWs are created on the NPE when it participates in multiple layer 2 domains. Multiple BPDU PWs are required to propagate Topology Change Notices (TCNs) over BPDU PW within an layer 2 ring. For instance, if any topology change is observed in a particular layer 2 domain, the TCN should be propagated across the MPLS backbone to only that layer 2 domain and not to the other layer 2 domains in the MPLS backbone.
For R-L2GP, the maximum number of BPDU PWs supported on Cisco 7600 platform is ten.
Restrictions and Usage Guidelines
When configuring Reverse L2GP for the Cisco 7600 router, follow these guidelines and restrictions:
•Because VLAN ID is required for EVC service instance to MST instance mapping, EVC service instances without any VLAN ID in the encapsulation are not supported. This includes:
–Untagged encapsulation
–Priority-tagged encapsulation
–Default encapsulation
•Service instances with multiple outer tags are not supported.
•MST and R-L2GP can co-exist on the same router as long as MST ports do not create parallel links to Reverse L2GP link in a L2 domain.
•Multiple BPDU PW is supported only on R-L2GP. MST and R-L2GP cannot co-exist with multiple BPDU PW.
•R-L2GP does not provide any automatic detection or recovery mechanisms for BPDU data.
•The R-L2GP pseudo information should be the same on the local and remote PE. For instance, mac-address, remote ID, local ID, and so on.
•Before you attach an R-L2GP instance to a port, you should configure the MST instance 0 within the R-L2GP.
•You can remove an R-L2GP instance only when the total number of BPDU PW in the system is one.
•Under the R-L2GP configuration (pseudo-information), the configuration for MST instance 0 should be the same on both N-PEs.
•If you are creating multiple BPDU PWs in the PE, then each BPDU should have separate R-L2GP instance, and they cannot share the same R-L2GP instance.
•We recommended that you configure multiple BPDU PW on the trunk VLAN 1.
•Cisco IOS Release 15.1(1)S supports EVC port-channels.
Configuring Reverse L2GP for the Cisco 7600 Router
To enable R-L2GP on a port, you need to:
•Configure MST
•Configure R-L2GP instance
•Attach R-L2GP instance to a port
•Configure VPLS BPDU pseudowire
Configuration of MST must be done before configuring RL2GP and attaching it to a port. For MST configuration, you need to configure:
•Provider Bridge Mode
•Hello Time
•Name
•Revision
•MSTI information (VLAN mapping, bridge priority, port priority, and cost)
•Priority Vector information (bridge ID, port ID, Root Bridge ID)
Since the R-L2GP configuration is bundled with the MSTI configuration, the above parameters can be recycled from the MSTI and MST region (currently only one MST region is supported on IOS) configurations.
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mode mst
4. spanning-tree mst configuration
5. [no] name name
6. [no] revision version
7. [no] instance vlan
8. exit
9. spanning-tree pseudo-information transmit identifier
10. remote-id id
11. mst instance root mac-address mac
12. mst instance_id range root priority priority
13. mst instance root priority mac
14. mst instance cost cost
15. exit
16. interface gigabitethernet slot/port or interface tengigabitethernet slot/port
17. spanning-tree pseudo-information transmit identifier
18. exit
19. l2 vfi vfi name manual
20. vpn id vpn_id
21. forward permit l2protocol all
22. neighbor ip-address vc-id encapsulation mpls
23. exit
24. interface vlan vlanid
25. xconnect vfi vfi_name
26. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
spanning-tree mode mst
Example:
Router(config)# spanning-tree mode mst
|
Enters the MST mode.
|
Step 4
|
spanning-tree mst configuration
Example:
Router(config)# spanning-tree mst
configuration
|
Enters MST-configuration submode.
|
Step 5
|
[no] name name
Example:
Router(config-mst)# name Cisco
|
Sets the name of a Multiple Spanning Tree (MST) region.
|
Step 6
|
[no] revision version
Example:
Router(config-mst)# revision 5
|
Sets the revision number for the Multiple Spanning Tree (802.1s) (MST) configuration.
|
Step 7
|
[no] instance vlan
Example:
Router(config-mst)#instance 2 vlan
30-35
|
Maps the MST instance to a range of VLANs.
|
Step 8
|
exit
Example:
Router(config-mst)#exit
|
Exits MST configuration mode.
|
Step 9
|
spanning-tree pseudo-information
transmit identifier
Example:
Router(config)#spanning-tree
pseudo-information transmit 20
|
Configures the R-L2GP instance.
|
Step 10
|
remote-id id
Example:
Router(config-pseudo)# remote-id 30
|
Configures the remote R-L2GP instance ID that pairs with the specified R-L2GP instance ID.
|
Step 11
|
mst instance root mac-address mac
Example:
Router(config-pseudo)#mst 1 root
mac-address 2.3.4
|
Adds the MST instance list to R-L2GP instance and configures R-L2GP root bridge MAC address for MST instance (or multiple MST instances).
|
Step 12
|
mst instance_id range root priority
priority
Example:
Router(config-pseudo)#mst 1-10 root
priority 8192
|
Adds the MST instance list to RL2GP instance and configures the R-L2GP bridge priority (in multiples of 4096) for instances.
|
Step 13
|
mst instance root priority mac
Example:
Router(config-pseudo)#mst 1 root 8192
A.A.A
|
Adds the MST instances to RL2GP instances and configures the MAC address and priority for MST instances.
|
Step 14
|
mst instance cost cost
Example:
Router(config-pseudo)#mst 1-2 cost 2000
|
Adds the MST instance list to R-L2GP instance and configures R-L2GP path cost for MST instance (or multiple MST instances).
|
Step 15
|
exit
Example:
Router(config-pseudo)# exit
|
Exits the MST configuration mode.
|
Step 16
|
interface gigabitethernet slot/port
or
interface tengigabitethernet slot/port
Example:
Router(config)# interface
gigabitethernet 4/1
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure.
•slot/port—Specifies the location of the interface.
|
Step 17
|
spanning-tree pseudo-information
transmit identifier
Example:
Router(config-if)#spanning-tree
pseudo-information transmit 10
|
Attaches the R-L2GP instance to a port.
|
Step 18
|
exit
Example:
Router(config)# exit
|
Exits the interface configuration mode.
|
Step 19
|
l2 vfi vfi_name manual
Example:
Router(config)# l2 vfi vfitest1 manual
|
Creates a Layer 2 VFI and enters the Layer 2 VFI manual configuration submode.
|
Step 20
|
vpn id vpn_id
Example:
Router(config-vfi)# vpn id 303
|
Sets or updates a Virtual Private Network (VPN) ID on a VPN routing and forwarding (VRF) instance.
|
Step 21
|
forward permit l2protocol all
Example:
Router(config-vfi)# forward permit
l2protocol all
|
Defines the VPLS pseudowire that is used to transport bridge protocol data unit (BPDU) information between two network provider edge (N-PE) routers.
|
Step 22
|
neighbor ip-address [vc-id]
encapsulation mpls
Example:
Router(config-vfi)# neighbor
10.10.10.10 encapsulation mpls
|
Specifies the routers that should form a point-to-point Layer 2 virtual forwarding interface (VFI) connection.
|
Step 23
|
exit
Example:
Router(config-vfi)# exit
|
Exits the VFI manual configuration mode.
|
Step 24
|
interface vlan-id
Example:
Router(config)# interface vlan 1
|
Creates a dynamic Switch Virtual Interface (SVI).
|
Step 25
|
xconnect vfi vfi name
Example:
Router(config-if)# xconnect vfi
vfitest1
|
Specifies the Layer 2 VFI you bind to the VLAN port.
|
Step 26
|
exit
|
Exits the global configuration mode.
|
Configuration Examples
This example shows how to configure R-L2GP and a single BPDU PW for the Cisco 7600 router.
Router# configure terminal
Router(config)# spanning-tree mode mst
Router(config)# spanning-tree mst configuration
Router(config-mst)# name cisco
Router(config-mst)# revision 1
Router(config-mst)# instance 1 vlan 100
Router(config-mst)# instance 2 vlan 101-103
Router(config-mst)# instance 3 vlan 104
Router(config)# spanning-tree pseudo-information transmit 30
Router(config-pseudo)# remote-id 40
Router(config-pseudo)# mst 0 root mac-address 0000.0000.0001
Router(config-pseudo)# mst 1 root mac-address 0000.0000.0002
Router(config-pseudo)# mst 2 root mac-address 0000.0000.0003
Router(config-pseudo)# exit
Router(config)# interface Gi8/0/0
Router(config-if)# switchport
Router(config-if)# switchport mode trunk
Router(config-if)# no shutdown
Router(config-if)# spanning-tree pseudo-information transmit 30
Router(config)# l2 vfi vfi_test1 manual
Router(config-vfi)# vpn id 300
Router(config-vfi)# forward permit l2protocol all
Router(config-vfi)# neighbor 1.1.1.1 encapsulation mpls
Router(config)# interface vlan 1
Router(config-if)# xconnect vfi vfi_test1
Router(config-if)# no shutdown
This example shows how to configure MST before you configure R-L2GP instance.
PE1(config)# spanning-tree mode mst
PE1(config)# spanning-tree mst configuration
PE1(config-mst)# name cisco
PE1(config-mst)# revision 1
PE1(config-mst)# instance 1 vlan 100
PE1(config-mst)# instance 2 vlan 101-103
Note The CE routers should have the same configuration as shown above.
This example shows how to configure an R-L2GP instance 30 for the first layer 2 domain connected to the interface 8/0/0. Similarly, in the remote PE2, configure instance as 40 and remote-ID as 30 with the same root mac and priority.
PE1(config)# spanning-tree pseudo-information transmit 30
PE1(config-pseudo)# remote-id 40
PE1(config-pseudo)# mst 0 root mac-address 0000.0000.0001
PE1(config-pseudo)# mst 1 root mac-address 0000.0000.0002
PE1(config-pseudo)# mst 2 root mac-address 0000.0000.0003
PE1(config)# interface Gi8/0/0
PE1(config-if)# switchport
PE1(config-if)# switchport mode trunk
PE1(config-if)# no shutdown
PE1(config-if)# spanning-tree pseudo-information transmit 30
This example shows how to configure an R-L2GP instance 10 for the second layer 2 domain connected to the interface 7/0/0. Similarly, in the remote PE3, configure instance as 10 and remote-ID as 20 with the same root mac and priority.
PE1(config)# spanning-tree pseudo-information transmit 20
PE1(config-pseudo)# remote-id 10
PE1(config-pseudo)# mst 0 root mac-address 0000.0000.0001
PE1(config-pseudo)# mst 1 root mac-address 0000.0000.0002
PE1(config-pseudo)# mst 2 root mac-address 0000.0000.0003
PE1(config)# interface Gi7/0/0
PE1(config-if)# switchport
PE1(config-if)# switchport mode trunk
PE1(config-if)# no shutdown
PE1(config-if)# spanning-tree pseudo-information transmit 20
This example shows how to configure multiple BPDU PWs.
PE1(config)# l2 vfi vfi_mpdu manual
PE1(config-vfi)# vpn id 1
PE1(config-vfi)# forward permit l2protocol all
PE1(config-vfi)# neighbor 1.1.1.1 1 encapsulation mpls ===> for the first L2 domain
PE1(config-vfi)# neighbor 2.2.2.2 1 encapsulation mpls ====>for the second L2 domain
PE1(config)# interface vlan 1
PE1(config-if)# xconnect vfi vfi_mpdu
PE1(config-if)# no shutdown
Verification
Use the show spanning-tree pseudo-information command to check the R-L2GP global configuration and instances:
Router#
show spanning-tree pseudo-information
Pseudo id 5, type transmit:
mst_region_id 0, port_count 1, update_flag 0x0
mrecord 0x4ACE3BD8, mrec_count 2:
msti 0: root_id 4096.0000.9c6d.2ec0, root_cost 0, update_flag 0x0
msti 1: root_id 4097.0000.9c6d.2ec0, root_cost 0, update_flag 0x0
Pseudo id 10, type transmit:
mst_region_id 0, port_count 1, update_flag 0x0
mrecord 0x4ACE3B9C, mrec_count 2:
msti 0: root_id 24576.0018.7415.c980, root_cost 0, update_flag 0x0
msti 1: root_id 24577.0018.7415.c980, root_cost 0, update_flag 0x0
Use the show spanning-tree mst command to check MSTI instances:
##### MST0 vlans mapped: 1-99,101-199,201-249,251-4094
Bridge address 0018.7415.c980 priority 24576 (24576 sysid 0)
Root this switch for the CIST
Operational hello time 2 , forward delay 15, max age 20, txholdcount 6
Configured hello time 2 , forward delay 15, max age 20, max hops 20
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Gi1/5 Desg FWD 20000 128.5 P2p R-L2GP
Gi5/0/0 Desg FWD 20000 128.1025 P2p R-L2GP
PW 2.2.2.2:160 Desg FWD 200 128.1055 P2p R-L2GP
##### MST1 vlans mapped: 100,250
Bridge address 0018.7415.c980 priority 24577 (24576 sysid 1)
Root this switch for MST1
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Gi1/5 Desg FWD 20000 128.5 P2p R-L2GP
Gi5/0/0 Desg FWD 20000 128.1025 P2p R-L2GP
PW 2.2.2.2:160 Desg FWD 200 128.1055 P2p R-L2GP
Use the show spanning-tree command to check STP and some MSTI instances:
Router#
show spanning-tree detail
Port 1025 (GigabitEthernet5/0/0) of MST0 is designated forwarding
Port path cost 20000, Port priority 128, Port Identifier 128.1025.
Designated root has priority 24576, address 0018.7415.c980
Designated bridge has priority 24576, address 0018.7415.c980
Designated port id is 128.1025, designated path cost 0
Timers: message age 0, forward delay 0, hold 0
Number of transitions to forwarding state: 1
Link type is point-to-point by default, Internal
Pseudo-info (id 10) is running
BPDU: sent 119967, received 239360
hd-uut2#sho span mst interface gig5/0/0
GigabitEthernet5/0/0 of MST0 is designated forwarding
Edge port: no (default) port guard : none (default)
Link type: point-to-point (auto) bpdu filter: disable (default)
Boundary : internal bpdu guard : disable (default)
Pseudo-info (id 10) is running
Bpdus sent 120090, received 239606
Instance Role Sts Cost Prio.Nbr Vlans mapped
-------- ---- --- --------- -------- -------------------------------
0 Desg FWD 20000 128.1025 1-99,101-199,201-249,251-4094
1 Desg FWD 20000 128.1025 100,250
2 Desg FWD 20000 128.1025 200
Troubleshooting Tips
Table 2-22 Troubleshooting Reverse L2GP feature
Problem
|
Solution
|
RL2GP configuration issues
|
Use the show spanning-tree pseudo-information [id [configuration | interface]] and debug spanning-tree pseudo-information commands to trace the configuration sequence of the R-L2GP commands and the messages between the route and switch processor. Share the output with TAC for further investigation.
|
Disabled STP or MST instances
|
Use the show spanning-tree [active | detail | interface] command to verify the state of the STP or MST. Share the output with TAC for further investigation.
|
spanning-tree pseudo-information transmit command is rejected
|
Verify if :
•All MST instances within the pseudo-information are configured within the MST global configuration.
•MSTI 0 (IST) is configured within the pseudo-information.
|
Cannot configure MST
|
Re-configure MSTE and ensure that priority, MAC address and cost are the same on both the network processor engines.
|
System loops
|
Re-configure all the 64 VLAN instances per RL2GP within a Pseudo ID.
|
Configuration is rejected when the MST region ID is modified.
|
As IOS supports only single region MST, remove the multiple MSTregion IDs that have been configured and configure only a single MST ID.
|
Configuring Private Host Switch Virtual Interface (VLAN and VPLS)
The Private Hosts feature allows automatic insertion of Router Switch Virtual Interface (SVI) MAC into the private host configuration. Private hosts track the L2 port that a server is connected to, and limits undesired traffic through MAC-layer access control lists (ACLs). Hosts can carry multiple traffic types via trunk ports, remain isolated from each other, and still communicate to a common server. Private hosts work at the Layer 2 interface level.
From 12.2(33)SRD4 onwards, this feature redirects broadcast and unicast traffic from isolated ports over VPLS Virtual Circuit. You can add a VPLS enabled VLAN ( cross-connect configured in a VLAN) in the Private Host Vlan-list along with regular VLAN and SVI.
Private Host limits VPLS support for only one VLAN. You cannot add another VPLAS VLAN if a VPLS VLAN exists in the Private Host VLAN-list. Similary , if any VLAN in the Vlan-list has cross-connect configured, you cannot configure another cross-connect on another VLAN in the Vlan-list.
Port Classification
You can classify the Ports into the following groups:
•Isolated ports: The hosts which need to be isolated will be directly or indirectly connected through DSLAMs to this type of ports. The unicast traffic received on these ports should be always destined towards specified upstream devices
•Promiscuous ports: The ports facing the core network or devices like BRAS and multicast servers are called promiscuous ports. These ports can allow any unicast or broadcast traffic received from upstream devices.
Private hosts traffic is treated as Layer 2 traffic and routing needs an external router to be configured. Instead of configuring a server MAC address into Private Hosts, you must configure the router MAC address. This feature adds the SVIs into the Private Host configuration, eliminating the need for the external router. For more information on Private Hosts, see Cisco 7600 Series Cisco IOS Software Configuration Guide, 12.2SR at http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SR/configuration/guide/pacl.html
Requirements and Restrictions
When you configure a Private Host SVI, follow these requirements and restrictions:
•Many VLANs can be associated with Private host feature.
•However only one of those VLANs can have cross-connect configured for Private host with VPLS.
•Other VLANs in the router can have cross-connect, but they cannot be associated with Private host feature.
•You cannot restrict Private Host SVIs to a configured subset of VLANs. If you want a subset of VLANs to use SVI's, you must ensure there are no SVIs on the VLANs that are not to be routed.
•This feature is not supported on hybrid systems.
•This feature installs protocol independent Protocol-Independent MAC Access Control Lists (PACLs) and enables MAC classification on the VLAN. As a result features likeRouting ACLs (RACLs) do not work with it.
•This feature is supported only in PFC-3BXL or cards higher than the PFC-3BX L configuration.
•This feature is not supported on EARL6 or below.
•Private Host limits VPLS support for only one VLAN. If the Private Host VLAN-list already has a VPLS VLAN (VLAN with cross-connect), addition of another VPLS VLAN is blocked. Similary, if cross-connect is configured in any VLAN in the VLAN-list, you cannot configure cross-connect on another VLAN in the VLAN-list.
To configure the private hosts SVI feature, perform the following steps in the global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# [no] private-hosts
|
This command is used enable or disable private hosts feature on a Cisco 7600 device globally. A [no] form of the command disables the private hosts feature globally. This command is in disabled mode by default .
|
Step 2
|
Router(config)# [no] private-hosts
mac-list <mac-list name> <mac address >
|
This command is used to populate the MAC address list. A [no] form of the command is used to delete MAC address from the list. The list itself is deleted after the deletion of last MAC address .
|
Step 3
|
Router(config)# [no] private-hosts
vlan-list <VLAN-ID>
|
This command is used to provide list of VLANs that need to be isolated. A [no] form will remove the given VLANs from the isolated VLAN list.
Note This VLAN -list is also used to program the promiscuous devices' MAC addresses.
|
Step 4
|
Router(config)# [no] private-hosts
promiscuous <mac-list name> [vlan-list
<VLAN IDs>]
|
This command is used to provide list of promiscuous MAC addresses and optional VLAN-list on which these devices might exist.
If the VLAN-list is not given, the VLAN list is taken from the global isolated VLAN- list configured. This command can be executed multiple times with different MAC-list and vlan-list combination.
|
Verifying the Private Hosts SVI configuration
Use the following show commands to verify the Private Hosts SVI (Interface VLAN) configuration:
Command
|
Purpose
|
Router# show private-hosts configuration
|
Displays the global private hosts configuration.
|
Router# show private-hosts access-lists
|
Displays the private hosts related access lists.
|
Router# show private-hosts interface configuration
|
Displays the ports on which the feature is enabled with the configured mode.
|
Router# show private-hosts mac-list
|
Displays the configured mac-lists and their members.
|
Router-sp# show private-hosts vlans
|
Displays the private host related VPLS enabled vlans.
|
Router-sp# show private-hosts index
|
Displays the redirect index of the private hosts.
|
Sample Configuration For Private Hosts VPLS Configuration
The following example shows the Private Hosts VPLS configuration:
Router(config)#
pseudowire-class mpls
Router(config-pw-class)#
encapsulation mpls
Router(config)#
l2 vfi 200 manual
Router(config-vfi)#
vpn id 200
Router(config-vfi)#
neighbor 2.2.2.2 pw-class mpls
Router(config)#
private-hosts vlan-list 200-202,204-205
Router(config)#
private-hosts promiscuous maclist-1
Router(config)#
private-hosts promiscuous maclist-2
Router(config)#
private-hosts mac-list maclist-1 0000.1111.9991
Router(config)#
private-hosts mac-list maclist-2 0000.1111.9992
Router(config)#
private-hosts layer3
Router(config)#
private-hosts
Router(config)#
int vlan 200
Router(config-if)#
no shutdown
Router(config-if)#
xconnect vfi 200
! Router(config-if)#
interface GigabitEthernet3/2
Router(config-if)#
switchport
Router(config-if)#
switchport trunk encapsulation dot1q
Router(config-if)#
switchport trunk allowed vlan 200-205
Router(config-if)#
switchport mode trunk
Router(config-if)#
private-hosts mode isolated
PE17_C7606# show private-hosts ?
access-lists Show the private hosts related access lists
configuration Show private hosts global configuration
interface Show private hosts interface related configuration
mac-list Show the mac lists and their members
PE17_C7606# show private-hosts configuration
Private hosts enabled. BR INDEX 1
Layer-3 switching on Private Hosts is enabled
All mandatory configurations configured
Privated hosts vlans lists:
Private promiscuous MAC configuration:
A '*' mark behind the mac list indicates non-existent mac-list
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
server_list *** Uses the isolated vlans ***
--------------------------------------------------------------------------------
VLAN intf MAC addr VLAN list
--------------------------------------------------------------------------------
Sample configuration for Private Hosts Interface Vlan configuration
The following example shows a typical configuration of the private hosts SVI (Interface VLAN) feature:
Router(config)#
private-hosts vlan-list 200-202,204-205
Router(config)#
private-hosts promiscuous maclist-1
Router(config)#
private-hosts promiscuous maclist-2
Router(config)#
private-hosts mac-list maclist-1 0000.1111.9991
Router(config)#
private-hosts mac-list maclist-2 0000.1111.9992
Router(config)#
private-hosts layer3
Router(config)#
private-hosts
Router(config)#
interface GigabitEthernet3/1
Router(config-if)#
switchport
Router(config-if)#
switchport access vlan 201
Router(config-if)#
switchport mode access
Router(config-if)#
private-hosts mode promiscuous
Router(config-if)#
interface GigabitEthernet3/2
Router(config-if)#
switchport
Router(config-if)#
switchport trunk encapsulation dot1q
Router(config-if)#
switchport trunk allowed vlan 200-205
Router(config-if)#
switchport mode trunk
Router(config-if)#
private-hosts mode isolated
Configuring Multicast Features
This section provides information about configuring ES20 line card-specific multicast features.
Configuring IGMP/PIM Snooping for VPLS Pseudowire on 7600-ESM-2X10GE and 7600-ESM-20X1GE
The Internet Group Management Protocol (IGMP)/Protocol Independent Multicast (PIM) Snooping for VPLS Pseudowire on 7600-ESM-2X10GE and 7600-ESM-20X1GE feature provides the ability to send Layer 2 multicast frames from customer equipment (CE) in a VPLS virtual forwarding instance (VFI) or from a multipoint bridging VLAN only to those remote peer CEs that have sent an IGMP request to join the multicast group.
IGMP)/PIM Snooping for VPLS Pseudowire on 7600-ESM-2X10GE and 7600-ESM-20X1GE manages multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward multicast traffic only to those ports that want to receive it. In VPLS or multipoint bridging, IGMP snooping can be set up on per- VLAN or per-VFI basis to build the membership tree because each of the remote legs of a VLAN or VFI can be identified with a virtual port and VLAN ID.
Note If a Layer2 pseudowire is configured on an interface VLAN instead of the phisycal interface and the pseudowire traffic on Layer2 reaches the destination (core facing) through an ES20 line card, the PIM and IGMP traffic crossing the pseudowire is switched to the Route Processor (software switched) resulting in high CPU utilization. To enable hardware switching for the PIM and IGMP traffic, disable IGMP snooping.
Restrictions and Usage Guidelines
When configuring the IGMP/PIM Snooping for VPLS Pseudowire on 7600-ESM-2X10GE and 7600-ESM-20X1GE feature, follow these restrictions and usage guidelines:
•IGMP/PIM snooping is enabled by default on the bridge-domain VLAN (use the no ip igmp snooping command to disable default behavior).
•When IGMP snooping is globally enabled, it enables IGMP snooping on all the existing VLAN interfaces. When IGMP snooping is globally disabled, it disables IGMP snooping on all the existing VLAN interfaces.
•System support for 32,000 IGMP groups with no line card-specific limitation.
•Supports MultiPoint Bridging over Ethernet on 7600-ESM-2X10GE and 7600-ESM-20X1GE
•Supports Virtual Private LAN Service (VPLS)
•Use the show ip igmp snooping privileged EXEC command to verify your IGMP settings.
•IGMP snooping only works when there is no tunneling operation (there should not be any VLAN tags in the packet when it is put on the bridge-domain VLAN).
SUMMARY STEPS
1. enable
2. configure terminal
3. interface vlan vlanid
4. no ip address ip-address mask [secondary]
5. ip igmp snooping
6. ipv6 mld snooping
7. xconnect vfi vfi name
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
enable
Example:
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface vlan vlanid
Example:
Router(config)# interface vlan 12
|
Creates a unique VLAN ID number and enters subinterface configuration mode.
|
Step 4
|
no ip address ip-address mask [secondary]
Example:
Router(config)# no ip address
|
Disables IP processing and enters interface configuration mode.
|
Step 5
|
Example:
Router(config-if)# ip igmp snooping
|
Enables IGMP snooping. To disable IGMP snooping, use the no form of this command.
|
Step 6
|
Example:
Router(config)# ipv6 mld snooping
|
Enables Multicast Listener Discovery version 2 (MLDv2) snooping globally. To disable the MLDv2 snooping globally, use the no form of this command.
|
Step 7
|
Example:
Router(config-if)# xconnect vfi vfi16
|
Specifies the Layer 2 VFI that you are binding to the VLAN port.
|
Example
This is a VLAN configuration.
Router(config)# interface Vlan700
Router(config)# no ip address
Router(config-if)# ip igmp snooping
Router(config-if)# ipv6 mld snooping
Router(config-if)# xconnect vfi vfi700
Verification
Use the show ip igmp interface vlan command to verify a configuration.
Configuring Link State Tracking (LST)
When a link failure occurs on a REP and MST segment, the associated protocols handle the link failure event. However, if the primary link to the switch is enabled even though the corresponding uplink ports on the switch are disabled, the REP and MST protocol is unaware of backbone side, and does not trigger a failover. The router continues to receive the traffic from the access side and then drops it discreetly due to lack of backbone connectivity. Link state tracking provides a solution to this problem by allowing the uplink interfaces to bind the link status to the down link ports. Uplink state tracking is configured such that when a set of uplink ports are disabled, other ports linked through CLI commands are disabled as well. The state of all the downlink interfaces are error-disabled only when all the upstream interfaces are disabled.
The LST triggers REP/MST re-convergence on the access side depending on the state of the core-facing interface. The link state of the core facing interface and the access facing interface are bound by link state tracking group.
LST facilitates:
–Enabling and disabling of link state group tracking.
–Removal of downstream interfaces from a link state group.
–Performing shut/no shut on error disabled interface.
Restrictions and Usage Guidelines
Follow these restrictions and usage guidelines when you configure the LST:
• Ensure that the management interfaces are not part of a link state group.
•REP port cannot be configured as uplink port.
•LST does not allow any interface, upstream or downstream, to be part of more than one link state group.
•You can configure a maximum of 10 link state groups.
•When you configure LST for the first time, you must add upstream interfaces to the link state group before adding downstream, otherwise the state of the downlink interfaces are error-disabled.
•The configurable interfaces are physical (both routed and switch port), port-channel, sub-interface and VLAN.
•Upstream interfaces are required to be among:
–L3 interface(physical or portchannel)
–SVI
•Downstream interfaces are required to be among:
–L2 interface
–L2 Port-channel
–EVC
Configuring Link-State Tracking
Perform the following tasks to configure a LST.
SUMMARY STEPS
1. enable
2. configure terminal
3. link state track number
4. interface slot/port
5. link state group [number] {upstream | downstream}
6. end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
link state track number
Example:
Router(config)# link state track 1
|
Creates a link-state group, and enables LST. The acceptable range is 1-10; the default value is 1.
|
Step 4
|
interface slot/port
Example:
Router(config)# interface gigabitethernet 2/1
|
Configures an interface.
|
Step 5
|
link state group [number] {upstream |
downstream}
Example:
Router(config-if)# link state group 1 upstream
|
Specifies a link-state group and configures the interface as either an upstream or downstream interface in the group.The group number can be 1 to 10; the default value is 1.
|
Step 6
|
end
Example:
Router(config-if)# end
|
Exits the CLI to privileged EXEC mode.
|
This example shows how to create a link-state group and configure the interfaces:
Router# configure terminal
Router(config)# link state track 1
Router(config)# interface gigabitethernet3/1
Router(config-if)# link state group 1 upstream
Router(config-if)# interface gigabitethernet3/3
Router(config-if)# link state group 1 upstream
Router(config-if)# interface gigabitethernet3/5
Router(config-if)# link state group 1 downstream
Router(config-if)# interface gigabitethernet3/7
Router(config-if)# link state group 1 downstream
Verification
Use the show link state group command to display the link-state group information.
Router> show link state group 1
Link State Group: 1 Status: Enabled, Down
Use the show link state group detail command to display detailed information about the group.
Router> show link state group detail
(Up):Interface up (Dwn):Interface Down (Dis):Interface disabled
Link State Group: 1 Status: Enabled, Down
Upstream Interfaces : Gi3/5(Dwn) Gi3/6(Dwn)
Downstream Interfaces : Gi3/1(Dis) Gi3/2(Dis) Gi3/3(Dis) Gi3/4(Dis)
Link State Group: 2 Status: Enabled, Down
Upstream Interfaces : Gi3/15(Dwn) Gi3/16(Dwn) Gi3/17(Dwn)
Downstream Interfaces : Gi3/11(Dis) Gi3/12(Dis) Gi3/13(Dis) Gi3/14(Dis)
(Up):Interface up (Dwn):Interface Down (Dis):Interface disabled
Troubleshooting the Link State Tracking
Table 2-23 lists the troubleshooting issues while configuring LST:
Table 2-23 Troubleshooting LST
Problem
|
Solution
|
The downstream interface is in error-disabled state even though the upstream interfaces are up.
|
Use the show interfaces <interface> status err-disabled command to check why the interface is in such state.
Use the show errdisable recovery command to view information about the error-disable recovery timer.
|
Issues
Configuring Multicast VLAN Registration
Multicast VLAN Registration (MVR) is used to deploy multicast traffic across an Ethernet ring-based service-provider network. For example, the broadcast of multiple television channels over a service-provider network.
MVR performs the following:
•Identifies the MVR IP multicast streams and their associated IP multicast groups in the Layer 2 forwarding table.
•Intercepts the IGMP messages.
•Allows a subscriber on a port to subscribe and unsubscribe to a multicast stream on the multicast VLAN.
•Allows a single multicast VLAN to be shared in the network while subscribers remain in separate VLANs.
•Provides the ability to continuously send multicast streams in the multicast VLAN and isolate the streams from the subscriber VLANs for bandwidth and security reasons.
•Modifies the Layer 2 forwarding table to include or remove the subscriber as a receiver of the multicast stream, even though the receivers might be in a different VLAN from the source. This forwarding behavior selectively allows traffic to cross between different VLANs.
The router forwards multicast data for MVR IP multicast streams only to MVR ports on which hosts have joined, either by IGMP reports or by MVR static configuration. The router forwards IGMP reports received from MVR hosts only to the source (uplink) port. This eliminates using unnecessary bandwidth on MVR data port links.
Note Only layer 2 ports participate in MVR. You must configure ports as MVR receiver ports. Only one MVR multicast VLAN per router is allowed.
During MVR, subscriber ports subscribe and unsubscribe multicast streams by sending out IGMP join and leave messages. These messages can originate from an IGMP version-2-compatible host with an Ethernet connection. Although MVR operates on the underlying mechanism of IGMP snooping, the two features operate independent of each other. However, if IGMP snooping and MVR are both enabled, MVR reacts only to join and leave messages from multicast groups configured under MVR. Join and leave messages from all other multicast groups are managed by IGMP snooping.
Using MVR in a Multicast Television Application
In a multicast television application, a PC or a television with a set-top box receives the multicast stream. Multiple set-top boxes or PCs can be connected to one subscriber port, which is a switch port configured as an MVR receiver port. Figure 2-8 illustrates this configuration.
The MVR feature in a multicast television application functions in this sequence:
•DHCP assigns an IP address to the set-top box or the PC. When a subscriber selects a channel, the set-top box or PC sends an IGMP report to Switch A to join the appropriate multicast. If the IGMP report matches one of the configured IP multicast group addresses, the Source Port (SP) CPU modifies the hardware address table to include this receiver port and VLAN as a forwarding destination of the specified multicast stream when it is received from the multicast VLAN. Uplink ports that send and receive multicast data to and from the multicast VLAN are called MVR source ports.
Figure 2-8 Multicast VLAN Registration
•When a subscriber changes channels or switches off the television, the set-top box sends an IGMP leave message to the multicast stream. The SP CPU sends a MAC-based general query through the receiver port VLAN. If there is another set-top box in the VLAN still subscribing to this group, that set-top box must respond within the maximum response time specified in the query. If the CPU does not receive a response, it eliminates the receiver port as a forwarding destination for this group.
•Unless the Immediate Leave feature is enabled, when the router receives an IGMP leave message from a subscriber on a receiver port, it sends out an IGMP query on that port and waits for IGMP group membership reports. If no reports are received in a configured time period, the receiver port is removed from multicast group membership. With the Immediate Leave feature enabled, an IGMP query is not sent from the receiver port on which the IGMP leave was received. As soon as the leave message is received, the receiver port is removed from multicast group membership, which speeds up leave latency. Enable the Immediate Leave feature only on receiver ports to which a single receiver device is connected.
•MVR eliminates the need to duplicate television-channel multicast traffic for subscribers in each VLAN. Multicast traffic for all channels is only sent around the VLAN trunk once—only on the multicast VLAN. The IGMP leave and join messages are in the VLAN to which the subscriber port is assigned. These messages dynamically register for streams of multicast traffic in the multicast VLAN on the layer 3 device, Switch B. The access layer switch, Switch A, modifies the forwarding behavior to allow the traffic to be forwarded from the multicast VLAN to the subscriber port in a different VLAN, selectively allowing traffic to cross between two VLANs.
•IGMP reports are sent to the same IP multicast group address as the multicast data. The Switch A CPU must capture all IGMP join and leave messages from receiver ports and forward them to the multicast VLAN of the source (uplink) port.
Configuring MVR
For information on configuring and troubleshooting the MVR, see: http://www.cisco.com/en/US/docs/routers/7600/ios/15S/configuration/guide/snooigmp.html
Configuring Layer 3 and Layer 4 Features
This section provides information about configuring Layer 3 and Layer 4 features on the Cisco 7600 Series ES20 line card on the Cisco 7600 series router. It includes the following topic:
•Configuring Layer 3 and Layer 4 Access Control List on a Service Instance
For more information about the commands used in this chapter, see the Cisco IOS Release 12.2 SR Command References at http://www.cisco.com/en/US/docs/routers/7600/ios/12.2SR/configuration/guide/swcg.html.
Configuring Layer 3 and Layer 4 Access Control List on a Service Instance
An Access Control List (ACL) is a series of rules with ACEs (Access Control Elements). These ACEs define the network traffic profile, and permit or deny network traffic to Layer 3 or 4. You can use sequential ACL rules to filter network traffic. Each rule contains a filter element based on source address, destination address, protocol, and ports. For more information on the supported criteria, refer Table 2-24.
Layer 3 and Layer 4 ACL on Service Instance feature permits you to configure ACLs within an Ethernet Virtual Circuit (EVC) on the Cisco 7600 Series ES20 line cards. For more detailed information on the commands used this section, see Cisco IOS Security Configuration Guide, Release 12.2SR at
http://www.cisco.com/en/US/docs/ios/sec_secure_connectivity/configuration/guide/12_2sr/sec_secure_connectivity_12_2sr_book.html
Table 2-24 maps the Layer 3 and 4 ACL criterion.
Table 2-24
Layer
|
Based on
|
Layer 3 and Layer 4
|
•Source
•Destination IP address
•Differentiated Services Code Point
•Precedence
•TOS (Type of Service)
•Protocols
•Fragmentation
|
Layer 4
|
•Source and Destination Ports
|
Supported Layers versus Criterion
Restrictions and Usage Guidelines
When configuring the Layer 3 and Layer 4 ACLs on a Cisco 7600 Series ES20 line cards, follow these restrictions and usage guidelines:
• L3 and L4 ACLs are supported only in ingress.
•You cannot simultaneously apply L2 ACL or L3/L4 ACLs on an EVC. You can either apply a L2 ACL, or a L3/L4 ACL within an EVC.
•L3 and L4 ACLs are not supported on EVCs in port-channels.
•IPv6 ACLs are not supported.
•Per ACE counters are not supported.
•You can apply a maximum of 4000 unique ACLs.
•You can configure a maximum of 8000 ACEs in a ES20 line card.
•In a L3 or L4 ACLs, if you apply the ACL name or number without actually creating the ACL, all the packets are permitted. However, in L2 ACLs, if you apply the ACL name,the packets are dropped.
•For eq and neq L4 operators, a maximum of 10 ports are used to relay the parameters. However, you can apply the ACLs only on the first port.
•Though the ACEs contain many rules based on which network traffic is filtered, only the criterion listed in Table 2-24 are supported.
SUMMARY STEPS TO CREATE A STANDARD L3 or L4 ACL
1. enable
2. configure terminal
3. ip access-list standard {access-list-number | access-list-name}
4. permit {source [source-wildcard] | any}
5. exit
DETAILED STEPS TO CREATE A STANDARD L3 or L4 ACL
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
ip access-list standard
{access-list-number|access-list-name}
Example:
Router(config)#ip access-list standard
test
|
Creates a standard ACL on the selected interface. The acceptable range for a standard ACL list is 1-99 and an expanded range of 1300-1999.
|
Step 4
|
permit|deny {source [source-wildcard] |
any}
Example:
Router(config-standard-nacl)#permit udp
any host 1.2.3.4
|
Denies or allows the packets on the selected interface.
|
Step 5
|
exit
|
Exits the configuration mode.
|
SUMMARY STEPS TO CREATE A NON UDP or TCP EXTENDED LIST
1. enable
2. configure terminal
3. ip access-list extended {access-list-number|access-list-name}
4. [sequence-number] deny|permit protocol source source-wildcard destination destination-wildcard [[precedence precedence] [tos tos] | dscp dscp] [fragments]
5. Repeat Step 4 as necessary
6. end
7. show ip access-lists {name|number}
DETAILED STEPS TO CREATE CREATE A NON UDP or TCP EXTENDED LIST
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
ip access-list extended
{access-list-number|access-list-name}
Example:
Router(config)#ip access-list extended
test
|
Creates a standard or extended ACL on the selected interface. The acceptable range for a extended ACL is 100-199 and the expanded range is 2000-2699.
|
Step 4
|
[sequence-number] deny|permit protocol
source source-wildcard destination
destination-wildcard [[precedence
precedence] [tos tos] | dscp dscp]
[fragments]
Example:
Router(config-ext-nacl)# deny ip any any
|
(Optional) Specifies a Deny statement in the selected IP access list mode.
•This access list uses a deny statement first, but a permit statement could appear first, depending on the order of statements you need.
•Use the no sequence-number form of this command to delete an entry.
|
Step 5
|
Repeat Step 4 as necessary
|
Allows you to revise the access list.
|
Step 6
|
end
Example:
ethernet cfm domain L4 level 4
|
(Optional) Exits the configuration mode and returns to the privileged EXEC mode.
|
Step 7
|
show ip access-lists {name|number}
Example:
service s41 evc 41 vlan 41
|
(Optional) Displays the contents of the IP access list and allows you to review the output to verify the inclusion of the new access list entry.
|
SUMMARY STEPS TO CREATE A TCP and UDP BASED EXTENDED LIST
1. enable
2. configure terminal
3. ip access-list extended access-list-name
4. [sequence-number] {permit|deny} {tcp|udp} source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [precedence precedence] [tos tos] [fragments]
5. Repeat Step 4 as necessary, adding statements by sequence number where you planned. Use the no sequence-number command to delete an entry.
6. end
7. show ip access-lists {name|number}
DETAILED STEPS TO CREATE A A TCP and UDP BASED EXTENDED LIST
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
ip access-list extended access-list-name
Example:
Router(config)#ip access-list extended
test
|
Creates a standard IP access list or an extended ACL on the selected interface. The acceptable range for a extended ACL is 100-199 and the expanded range is 2000-2699.
|
Step 4
|
[sequence-number] {permit|deny} {tcp|udp}
source source-wildcard [operator [port]]
destination destination-wildcard
[operator [port]] [precedence precedence]
[tos tos] [fragments]
Example:
continuity-check
|
Specifies a permit statement in named IP access list mode.
•This access list uses a permit statement first, but a deny statement could appear first, depending on the order of statements you need.
•Use the TCP or the UDP command syntax of the permit command.
|
Step 5
|
Repeat Step 4 as necessary, adding statements by sequence number where you planned. Use the no sequence-number command to delete an entry.
|
Allows you to revise the access list.
|
Step 6
|
end
Example:
int TenGigabitEthernet4/0/0
|
(Optional) Exits the configuration mode and returns to privileged EXEC mode.
|
Step 7
|
show ip access-lists {name|number}
Example:
service instance 41 ethernet 41
|
(Optional) Displays the contents of the IP access list and allows you to review the output to verify that the access list includes the new entry.
|
SUMMARY STEPS TO APPLY A L3 or L4 ACL
1. enable
2. configure terminal
3. interface gigabitethernet type/ slot/port
4. service instance id Ethernet
5. ip access-group {list name|number} in
6. exit
DETAILED STEPS TO APPLY A L3 or L4 ACL
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router#enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router#configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet type/ slot/port
[subinterface-number]
Example:
Router(config)#interface gigabitethernet
4/0/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
|
Step 4
|
service instance id {Ethernet
[service-name}
Example:
Router(config-if)#service instance 101
ethernet
|
Creates a service instance on an interface and sets the device to the config-if-srv configuration mode.
|
Step 5
|
ip access-group {list name|number} in
Example:
encapsulation dot1q 41
|
Applies a ACL on the selected EVC.
Note The ACL displays only positive permit and deny counts.
|
Step 6
|
exit
|
Exits the configuration mode.
|
Examples
You can view the L3/L4 ACL counters for an EVC as shown in the following example:
7600bb# sh access-list test
Extended IP access list test
10 permit udp any host 1.2.3.4 eq 5
7600bb#sh run int gi 13/0/5
Building configuration...
Current configuration : 186 bytes
interface GigabitEthernet13/0/5
service instance 1 ethernet
7600bb# show ethernet service instance interface gigabitEthernet 13/0/5 detail
Associated Interface: GigabitEthernet13/0/5
Encapsulation: dot1q 100 vlan protocol type 0x8100
Interface Dot1q Tunnel Ethertype: 0x8100
Pkts In Bytes In Pkts Out Bytes Out
Microblock type: Bridge-domain
7600bb#show ethernet service instance interface gigabitEthernet 13/0/5 stats
Port maximum number of service instances: 8000
Service Instance 1, Interface GigabitEthernet13/0/5
Pkts In Bytes In Pkts Out Bytes Out
VRF aware IPv6 tunnel
The current IPv6 tunneling feature on c7600 does not support Virtual Routing and Forwarding (VRF) awareness. The forwarding table lookups for IPv6 overlay addresses and IPv4 transport addresses are performed in the global routing tables. This feature extends the tunneling support for IPv6 overlay addresses in VRF.
These scenarios explain the VRF aware IPv6 tunnel function:
•IPv6 overlay address in VRF and IPv4 transport address in Global routing table (RT).
•IPv6 overlay address in VRF and IPv4 transport address in VRF.
Figure 2-9 illustrates the topology for the IPv6 overlay address in VRF, and the IPv4 transport address in VRF.
Figure 2-9 Topology for VRF aware IPv6 Tunnel
The VRF Aware IPv6 over IPv4 Tunnel can have any line card towards the core facing side.
.
Restrictions for VRF aware IPv6 tunnels
Following restrictions apply to the VRF aware IPv6 tunnels feature:
•This feature supports the IPv6IP and 6to4 tunnels mode.
•Due to EARL limitation, the same source tunnels across VRFs are not supported.
•The tunnel source and the tunnel destination should be in the same VRF instance.
•The tunnel IPv4 transport addresses and the physical interface where the tunnel traffic exits, should be in the same VRF instance.
•The incoming IPv6 interface and the tunnel should be in the same VRF instance.
•This feature does not support IPv6IP auto-tunnels and ISATAP.
Configuring VRF aware IPv6 tunnel
The following sections describe how to configure VRF aware IPv6 tunnel on c7600:
•Configure IPv6 overlay addresses in VRF and IPv4 transport addresses in Global RT
•Configure IPv6 overlay addresses in VRF and IPv4 transport addresses in VRF
Configure IPv6 overlay addresses in VRF and IPv4 transport addresses in Global RT
Complete the following steps to configure IPv6 overlay addresses in VRF and IPv4 transport addresses in Global RT:
SUMMARY STEPS
Step 1 enable
Step 2 configure terminal
Step 3 ipv6 unicast-routing
Step 4 mls ipv6 vrf
Step 5 vrf definition vrf name
Step 6 rd {ASN:nn | IP address: nn}
Step 7 route-target [import | export | both]{ASN:nn | IP address: nn}
Step 8 address-family ipv6
Step 9 exit
Step 10 address-family ipv4
Step 11 exit
Step 12 exit
Step 13 interface gigabitethernet slot/subslot/port
Step 14 vrf forwarding vrf name
Step 15 ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length}
Step 16 exit
Step 17 interface gigabitethernet slot/subslot/port
Step 18 ip address ip-address
Step 19 exit
Step 20 interface loopback interface-number
Step 21 ip address ip-address
Step 22 exit
Step 23 interface tunnel tunnel-number
Step 24 vrf forwarding vrf name
Step 25 ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length}
Step 26 tunnel source {ip-address | interface-type interface-number}
Step 27 tunnel destination {hostname | ip-address | ipv6-address}
Step 28 tunnel mode ipv6ip
Step 29 end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router# enable
|
Enables privileged EXEC mode. Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
ipv6 unicast-routing
Example:
Router(config)# ipv6
unicast-routing
|
Enables the forwarding of IPv6 unicast datagrams.
|
Step 4
|
mls ipv6 vrf
Example:
Router(config)# mls ipv6
vrf
|
Enables IPv6 globally in a VRF instance.
|
Step 5
|
vrf definition vrf name
Example:
Router(config)# vrf
definition VRF_RED
|
Configures a VRF instance and enters the VRF configuration mode.
|
Step 6
|
rd {ASN:nn | IP address:
nn}
Example:
Router(config-vrf)# rd 1:1
|
Specifies a route distinguisher (RD).
•ASN:nn: Specifies an autonomous system number and an arbitrary number.
•IP address: nn: Specifies an IP address and an arbitrary number.
|
Step 7
|
route-target [import |
export | both]{ASN:nn | IP
address: nn}
Example:
Router(config-vrf)#route-ta
rget export 1:1
Router(config-vrf)#route-ta
rget import 1:1
|
Creates a route-target extended community for a VRF instance. Route target extended community attributes are used to identify a set of sites and VRF instances that can receive routes with a configured route target.
•import: Imports routing information from the target VPN extended community.
•export: Exports routing information to the target VPN extended community.
•both: Imports both import and export routing information to the target VPN extended community.
•ASN:nn: Specifies an autonomous system number and an arbitrary number.
•IP address: nn: Specifies an IP address and an arbitrary number.
|
Step 8
|
address-family ipv6
Example:
Router#(config-vrf)#address
-family ipv6
|
Selects an address family type for a VRF table and enters VRF address family configuration mode. This command configures the separate route-target policies for IPv6.
|
Step 9
|
exit
Example:
Router#(config-vrf-af)#exit
|
Exits the address family configuration mode.
|
Step 10
|
address-family ipv4
Example:
Router#(config-vrf)#address
-family ipv4
|
Selects an address family type for a VRF table and enters VRF address family configuration mode. This command configures the separate route-target policies for IPv4.
|
Step 11
|
exit
Example:
Router#
(config-vrf-af)#exit
|
Exits the address family configuration mode.
|
Step 12
|
exit
Example:
Router#(config-vrf)#exit
|
Exits the VRF configuration mode.
|
Step 13
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 3/0/1
|
Enters the interface configuration mode and specifies the Gigabit interface to configure.
•slot/subslot/port —Specifies the location of the interface.
Note This command configures the interface towards the IPv6 network.
|
Step 14
|
vrf forwarding vrf name
Example:
Router(config-if)#vrf
forwarding VRF_RED
|
Associates a VRF instance with an interface or a subinterface.
|
Step 15
|
ipv6 address
{ipv6-address|prefix-length
| prefix-name sub-bits
|prefix-length}
Example:
Router (config-if)# ipv6
address 1::2/64
|
Specifies the IPv6 address assigned to the interface and enables IPv6 processing on the interface.
|
Step 16
|
exit
Example:
Router (config-if)#exit
|
Exits interface configuration mode.
|
Step 17
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/0/1
|
Enters the interface configuration mode and specifies the Gigabit interface to configure.
•slot/subslot/port —Specifies the location of the interface.
Note This command configures the interface towards the IPv4 network.
|
Step 18
|
ip address ip-address
Example:
Router(config-if)#ip
address 10.1.1.1
255.255.255.0
|
Assigns an IP address and subnet mask to the interface.
|
Step 19
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Step 20
|
interface loopback
interface-number
Example:
Router(config)# interface
Loopback 666
|
Enters interface configuration mode and names the new loopback interface.
Note This command configures a loopback interface for the tunnel source
|
Step 21
|
ip address ip-address
Example:
Router(config-if)#ip
address 66.66.66.66
255.255.255.255
|
Assigns an IP address and subnet mask to the loopback interface.
|
Step 22
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Step 23
|
interface tunnel
tunnel-number
Example:
Router(config)# interface
tunnel 666
|
Specifies a tunnel interface and enters the interface configuration mode.
Note This command configures the IPv6 tunneling over IPv4 Transport.
|
Step 24
|
vrf forwarding vrf name
Example:
Router# (config-if)#vrf
forwarding VRF_RED
|
Associates a VRF instance with an interface or a subinterface.
Note This command specifies the VRF instance to which the tunnel belongs, that is, the VRF instance used for IPv6 overlay address lookup.
|
Step 25
|
ipv6 address
{ipv6-address/prefix-length |
prefix-name
sub-bits/prefix-length}
Example:
Router(config-if)# ipv6
address 3::1/120
|
Specifies the IPv6 address assigned to the interface and enables IPv6 processing on the interface.
|
Step 26
|
tunnel source {ip-address |
interface-type
interface-number}
Example:
Router(config-if)# tunnel
source loopback 666
|
Specifies the source interface type and number for the tunnel interface.
|
Step 27
|
tunnel destination
{host-name | ip-address |
ipv6-address}
Example:
Router(config-if)# tunnel
destination 10.66.66.1
|
Specifies the destination address for a tunnel interface.
|
Step 28
|
tunnel mode ipv6ip [6rd |
6to4 | auto-tunnel |
isatap]
Example:
Router(config-if)# tunnel
mode ipv6ip
|
Configures a static IPv6 tunnel interface.
|
Step 29
|
end
Example:
Router(config-if)# end
|
Ends the current configuration session.
|
Configuration Example
This example shows how to configure the IPv6 overlay addresses in VRF, and the IPv4 transport addresses in the Global Routing Table:
Router# configure terminal
Router(config)# ipv6 unicast-routing
Router(config)# mls ipv6 vrf
Router(config)# vrf definition VRF_RED
Router(config-vrf)# rd 1:1
Router(config-vrf)# route-target export 1:1
Router(config-vrf)# route-target import 1:1
Router(config-vrf)# address-family ipv6
Router(config-vrf-af)# exit
Router(config-vrf)# address-family ipv4
Router(config-vrf)# (config-vrf-af)# exit
Router(config)# interface gigabitethernet 3/0/1
Router(config-if)# vrf forwarding VRF_RED
Router(config-if)# ipv6 address 1::2/64
Router(config)# interface gigabitethernet 4/0/1
Router(config-if)# ip address 10.1.1.1 255.255.255.0
Router(config)# interface Loopback 666
Router(config-if)# ip address 66.66.66.66 255.255.255.255
Router(config)# interface tunnel 666
Router(config-if)# vrf forwarding VRF_RED
Router(config-if)# ipv6 address 3::1/120
Router(config-if)# tunnel source loopback 666
Router(config-if)# tunnel destination 10.66.66.1
Router(config-if)# tunnel mode ipv6ip
Configure IPv6 overlay addresses in VRF and IPv4 transport addresses in VRF
Complete the following steps to configure IPv6 overlay addresses in VRF, and IPv4 transport addresses in VRF:
SUMMARY STEPS
Step 1 enable
Step 2 configure terminal
Step 3 ipv6 unicast-routing
Step 4 mls ipv6 vrf
Step 5 vrf definition vrf name 1
Step 6 rd {ASN:nn | IP address: nn}
Step 7 route-target [import | export | both] {ASN:nn | IP address: nn}
Step 8 address-family ipv6
Step 9 exit
Step 10 address-family ipv4
Step 11 exit
Step 12 exit
Step 13 vrf definition vrf name 2
Step 14 rd {ASN:nn | IP address: nn}
Step 15 route-target [import | export | both] {ASN:nn | IP address: nn}
Step 16 address-family ipv4
Step 17 exit
Step 18 exit
Step 19 interface gigabitethernet slot/subslot/port
Step 20 vrf forwarding vrf name 1
Step 21 ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length}
Step 22 exit
Step 23 interface gigabitethernet slot/subslot/port
Step 24 vrf forwarding vrf name 2
Step 25 ip address ip-address
Step 26 exit
Step 27 interface loopback interface-number
Step 28 vrf forwarding vrf name 2
Step 29 ip address ip-address
Step 30 exit
Step 31 interface tunnel tunnel-number
Step 32 vrf forwarding vrf name 1
Step 33 ipv6 address {ipv6-address/prefix-length | prefix-name sub-bits/prefix-length}
Step 34 tunnel source {ip-address | interface-type interface-number}
Step 35 tunnel destination {hostname | ip-address | ipv6-address}
Step 36 tunnel mode ipv6ip
Step 37 tunnel vrf vrf name 2
Step 38 end
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router# enable
|
Enables privileged EXEC mode. Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
ipv6 unicast-routing
Example:
Router(config)# ipv6
unicast-routing
|
Enables the forwarding of IPv6 unicast datagrams.
|
Step 4
|
mls ipv6 vrf
Example:
Router(config)# mls ipv6
vrf
|
Enables IPv6 globally in a VRF instance.
|
Step 5
|
vrf definition vrf name 1
Example:
Router(config)# vrf
definition VRF_RED
|
Configures a VRF instance and enters the VRF configuration mode.
|
Step 6
|
rd {ASN:nn | IP address:
nn}
Example:
Router(config-vrf)# rd 1:1
|
Specifies a route distinguisher (RD).
•ASN:nn: Specifies an autonomous system number and an arbitrary number.
•IP address: nn: Specifies an IP address and an arbitrary number.
|
Step 7
|
route-target [import |
export | both]{ASN:nn | IP
address: nn}
Example:
Router(config-vrf)#route-t
arget export 1:1
Router(config-vrf)#route-t
arget import 1:1
|
Creates a route-target extended community for a VRF instance. Route target extended community attributes are used to identify a set of sites and VRF instances that can receive routes with a configured route target.
•import: Imports routing information from the target VPN extended community.
•export: Exports routing information to the target VPN extended community.
•both: Imports both import and export routing information to the target VPN extended community.
•ASN:nn: Specifies an autonomous system number and an arbitrary number.
•IP address: nn: Specifies an IP address and an arbitrary number.
|
Step 8
|
address-family ipv6
Example:
Router(config-vrf)#address
-family ipv6
|
Select san address family type for a VRF table and enters VRF address family configuration mode. This command configures the separate route-target policies for IPv6.
|
Step 9
|
exit
Example:
Router(config-vrf-af)#exit
|
Exits the address family configuration mode.
|
Step 10
|
address-family ipv4
Example:
Router(config-vrf)#address
-family ipv4
|
Selects an address family type for a VRF table and enters VRF address family configuration mode. This command configures the separate route-target policies for IPv4.
|
Step 11
|
exit
Example:
Router
(config-vrf-af)#exit
|
Exits the address family configuration mode.
|
Step 12
|
exit
Example:
Router(config-vrf)#exit
|
Exits the VRF configuration mode.
|
Step 13
|
vrf definition vrf name 2
Example:
Router(config)# vrf
definition VRF_GREEN
|
Configures a VRF instance and enters the VRF configuration mode.
|
Step 14
|
rd {ASN:nn | IP address:
nn}
Example:
Router(config-vrf)# rd 1:1
|
Specifies a route distinguisher (RD).
•ASN:nn: Specifies an autonomous system number and an arbitrary number.
•IP address: nn: Specifies an IP address and an arbitrary number.
|
Step 15
|
route-target [import |
export | both]{ASN:nn | IP
address: nn}
Example:
Router(config-vrf)#route-t
arget export 1:1
Router(config-vrf)#route-t
arget import 1:1
|
Creates a route-target extended community for a VRF instance. Route target extended community attributes are used to identify a set of sites and VRF instances that can receive routes with a configured route target.
•import: Imports routing information from the target VPN extended community.
•export: Exports routing information to the target VPN extended community.
•both: Imports both import and export routing information to the target VPN extended community.
•ASN:nn: Specifies an autonomous system number and an arbitrary number.
•IP address: nn: Specifies an IP address and an arbitrary number.
|
Step 16
|
address-family ipv4
Example:
Router(config-vrf)#address
-family ipv4
|
Selects an address family type for a VRF table and enters VRF address family configuration mode. This command configures the separate route-target policies for IPv4.
|
Step 17
|
exit
Example:
Router
(config-vrf-af)#exit
|
Exits the address family configuration mode.
|
Step 18
|
exit
Example:
Router(config-vrf)#exit
|
Exits the VRF configuration mode.
|
Step 19
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 3/0/1
|
Enters the interface configuration mode and specifies the Gigabit interface to configure.
•slot/subslot/port —Specifies the location of the interface.
Note This command configures the interface towards the IPv6 network.
|
Step 20
|
vrf forwarding vrf name 1
Example:
Router(config-if)#vrf
forwarding VRF_RED
|
Associates a VRF instance with an interface or a subinterface.
|
Step 21
|
ipv6 address
{ipv6-address|prefix-lengt
h | prefix-name sub-bits
|prefix-length}
Example:
Router(config-if)# ipv6
address 1::2/64
|
Specifies the IPv6 address assigned to the interface and enables IPv6 processing on the interface.
|
Step 22
|
exit
Example:
Router# (config-if)# exit
|
Exits interface configuration mode.
|
Step 23
|
interface gigabitethernet
slot/subslot/port
Example:
Router(config)# interface
gigabitethernet 4/0/1
|
Enters the interface configuration mode and specifies the Gigabit interface to configure.
•slot/subslot/port —Specifies the location of the interface.
Note This command configures the interface towards the IPv4 network.
|
Step 24
|
vrf forwarding vrf name 2
Example:
Router(config-if)#vrf
forwarding VRF_GREEN
|
Associates a VRF instance with an interface or a subinterface.
|
Step 25
|
ip address ip-address
Example:
Router(config-if)#ip
address 10.1.1.1
255.255.255.0
|
Assigns an IP address and subnet mask to the interface.
|
Step 26
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Step 27
|
interface loopback
interface-number
Example:
Router(config)# interface
Loopback 666
|
Enters interface configuration mode and names the new loopback interface.
Note This command configures a loopback interface for the tunnel source
|
Step 28
|
vrf forwarding vrf name 2
Example:
Router(config-if)#vrf
forwarding VRF_GREEN
|
Associates a VRF instance with an interface or a subinterface.
|
Step 29
|
ip address ip-address
Example:
Router(config-if)#ip
address 66.66.66.66
255.255.255.255
|
Assigns an IP address and subnet mask to the loopback interface.
|
Step 30
|
exit
Example:
Router(config-if)# exit
|
Exits interface configuration mode.
|
Step 31
|
interface tunnel
tunnel-number
Example:
Router(config)# interface
tunnel 666
|
Specifies a tunnel interface and enters the interface configuration mode.
Note This command configures the IPv6 tunneling over IPv4 Transport.
|
Step 32
|
vrf forwarding vrf name 1
Example:
Router(config-if)#vrf
forwarding VRF_RED
|
Associates a VRF instance with an interface or a subinterface.
Note This command specifies the VRF instance to which the tunnel belongs, that is, the VRF instance used for IPv6 overlay address lookup.
|
Step 33
|
ipv6 address
{ipv6-address/prefix-length |
prefix-name
sub-bits/prefix-length}
Example:
Router(config-if)# ipv6
address 3::1/120
|
Specifies the IPv6 address assigned to the interface and enables IPv6 processing on the interface.
|
Step 34
|
tunnel source {ip-address
| interface-type
interface-number}
Example:
Router(config-if)# tunnel
source loopback 666
|
Specifies the source interface type and number for the tunnel interface.
|
Step 35
|
tunnel destination
{host-name | ip-address |
ipv6-address}
Example:
Router(config-if)# tunnel
destination 10.66.66.1
|
Specifies the destination address for a tunnel interface.
|
Step 36
|
tunnel mode ipv6ip
Example:
Router(config-if)# tunnel
mode ipv6ip
|
Configures a static IPv6 tunnel interface.
|
Step 37
|
tunnel vrf vrf name 2
Example:
Router(config-if)# tunnel
vrf VRF_GREEN
|
Configures a VRF instance with a specific tunnel destination, interface or a subinterface.
Note This command specifies the VRF instance used for tunnel IPv4 transport address lookup, that is, the tunnel source and the tunnel destination.
|
Step 38
|
end
Example:
Router(config-if)# end
|
Ends the current configuration session.
|
Configuration Example
This example shows how to configure the IPv6 overlay addresses in VRF, and the IPv4 transport addresses in VRF:
Router# configure terminal
Router(config)# ipv6 unicast-routing
Router(config)# mls ipv6 vrf
Router(config)# vrf definition VRF_RED
Router(config-vrf)# rd 1:1
Router(config-vrf)# route-target export 1:1
Router(config-vrf)# route-target import 1:1
Router(config-vrf)# address-family ipv6
Router(config-vrf-af)# exit
Router(config-vrf)# address-family ipv4
Router(config-vrf-af)# exit
Router(config)# vrf definition VRF_GREEN
Router(config-vrf)# rd 1:1
Router(config-vrf)# route-target export 1:1
Router(config-vrf)# route-target import 1:1
Router(config-vrf)# address-family ipv4
Router(config-vrf-af)# exit
Router(config)# interface gigabitethernet 3/0/1
Router(config-if)# vrf forwarding VRF_RED
Router(config-if)# ipv6 address 1::2/64
Router(config)# interface gigabitethernet 4/0/1
Router(config-if)# vrf forwarding VRF_GREEN
Router(config-if)# ip address 10.1.1.1 255.255.255.0
Router(config)# interface Loopback 666
Router(config-if)# vrf forwarding VRF_GREEN
Router(config-if)# ip address 66.66.66.66 255.255.255.255
Router(config)# interface tunnel 666
Router(config-if)# vrf forwarding VRF_RED
Router(config-if)# ipv6 address 3::1/120
Router(config-if)# tunnel source loopback 666
Router(config-if)# tunnel destination 10.66.66.1
Router(config-if)# tunnel mode ipv6ip
Router(config-if)# tunnel vrf VRF_GREEN
Verifying the Configuration
Use these commands to verify the configuration of VRF aware IPv6 tunnel on c7600:
Name Default RD Protocols Interfaces
vrf-red 100:1 ipv4,ipv6 Tu666
Router# show interface tunnel 666
Tunnel666 is up, line protocol is up
Internet address is 80.1.1.1/24
MTU 17916 bytes, BW 100 Kbit/sec, DLY 50000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation TUNNEL, loopback not set
Tunnel source 66.66.66.66 (Loopback666), destination 66.66.66.65
Tunnel666 source tracking subblock associated with Loopback666
Set of tunnels with source Loopback666, 1 member (includes iterators), on
interface <OK>
Tunnel protocol/transport GRE/IP
Key disabled, sequencing disabled
Checksumming of packets disabled
Tunnel TTL 255, Fast tunneling enabled
Tunnel transport MTU 1476 bytes
Tunnel transmit bandwidth 8000 (kbps)
Tunnel receive bandwidth 8000 (kbps)
Last input 00:07:00, output 00:02:39, output hang never
Last clearing of "show interface" counters 00:07:19
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Output queue: 0/0 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
L2 Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes
L3 in Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes mcast
L3 out Switched: ucast: 0 pkt, 0 bytes mcast: 0 pkt, 0 bytes
20 packets input, 1944 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
26 packets output, 2504 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 output buffer failures, 0 output buffers swapped out
Troubleshooting Tips
For troubleshooting information, contact Cisco Technical Assistance Center (TAC) at:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
IPv6 Policy Based Routing
IPv6 policy-based routing (PBR) provides a flexible mechanism to route packets and define policy for the traffic flows. It extends and complements the existing mechanisms provided by routing protocols. PBR also provides a basic packet-marking capability.
PBR performs the following tasks:
•Classifies traffic based on extended access list criteria. It provides access to lists and then establishes the match criteria.
•Sets IPv6 precedence bits and enables the network to differentiate classes of service.
•Routes packets to specific traffic-engineered paths. You can route the packets to allow a specific quality of service (QoS) through the network.
The Cisco 7600 Series Router implements this feature using the Earl7 forwarding engines capability to classify traffic through an Access Control List (ACL) Ternary Content Addressable Memory (TCAM) lookup. The ACL TCAM lookup classifies traffic based on the combination of a variety of Layer 3 and Layer 4 traffic parameters. Once classified, the ACL TCAM drives results for matching flows. The Feature Manager (FM) component converts the route map policy configured on an interface into a series of values, masks and results (VMRs) and programs these in the ACL TCAM.
Policy Based Routing
All packets received on a PBR-enabled interface are passed through enhanced packet filters known as route maps. Route maps are composed of statements that are marked as permit or deny, and they are interpreted in these ways:
•If a packet matches all match statements for a route map that is marked as permit, the router subjects the packet to PBR using the set statements.
•If the packet matches any match statements for a route map that is marked as deny, the router does not subject the packet to PBR and forwards it normally.
•If the statement is marked as permit and the packets do not match any route map statements, the router sends the packets back through the normal forwarding channels and performs destination-based routing.
Packet Matching
The IPv6 PBR match criterion for a sequence is specified through a combination of IPv6 access-lists and packet length operations. Match statements are evaluated first by the criteria specified in the match ipv6 address command and then by criteria specified in the match length command. Therefore, if both an ACL and a length statement are used, a packet is first subjected to an ACL match. Only packets that pass the ACL match are subjected to the length match. Finally, only packets that pass both the ACL and the length statement are policy routed.
Packet Forwarding Using Set Statements
PBR for IPv6 packet forwarding is controlled using a number of set statements in the PBR route map. Listed below are the forwarding actions in order of decreasing priority, and the manner in which these options are reflected in the result from the VMRs programmed in the ACL TCAM. When more than one kind of packet forwarding action is specified in a sequence, the one with the highest priority is chosen.
Table 2-25 Packet Forwarding Set Statements
Set Statement
|
Notes
|
set vrf vrf name
|
Specifies the VPN Routing and Forwarding (VRF) instance to which the packet should be sent, based on packet attributes. By default the VRF that a packet is forwarded on is the same as the VRF that receives the packet.
|
set ipv6 next-hop next-hop ipv6 address
|
Specifies the next hop for the packet. The next hop must be present in the Routing Information Base (RIB); it must be directly connected, and it must be a global IPv6 address. If the next hop is invalid, the set statement is ignored.
|
set interface next-hop interface
|
Specifies the next hop interface for the packet. A packet is forwarded out of a specified interface. An entry for the packet destination address must exist in the IPv6 RIB, and the specified output interface must be in the path set. If the interface is invalid, the set statement is ignored.
|
set ipv6 default next-hop default next-hop ipv6 address
|
Specifies the connected next hop for the packet if the usual forwarding method fails to produce the default result. It must be a global IPv6 address. This set statement is used only when there is no explicit entry for the packet destination in the IPv6 RIB.
|
set default interface default next-hop interface
|
Specifies the default next-hop interface, from which the matching packets are forwarded if the usual forwarding method fails to produce a result. This set statement is used only when there is no explicit entry for the packet destination in the IPv6 RIB.
|
Restrictions for IPv6 PBR
Following restrictions apply to the IPv6 PBR:
•Match length is not supported in the hardware, and the PBR is applied to the software.
•Packet marking actions are not supported in the hardware, and packets requiring marking due to PBR are punted to the software.
•Set interface is supported in the hardware only for the serial interface. Other interfaces are supported on the software.
•Packets containing an IPv6 hop-by-hop header need to be examined by the router and are punted to the software. Such packets are subjected to PBR in the software.
•PBR policies using access-lists matching on IPv6 flow label, DSCP value and extension headers such as, routing, mobility, destination headers cannot be fully classified in the hardware, and are punted to the software after partial classification.
•It is not possible to completely classify traffic in hardware, when access-lists matching on non compressible addresses are used. In such cases, the PBR is applied to the software.
•On Tycho based systems, fragment packets that require matching on layer 4 protocol are punted to the software .
•IPv6 PBR on SVI interfaces is applied to the software, and hardware provides only partial classification.
•IPv6 PBR when applied to hardware will also be applied on packets destined to a router address.
•A set next-hop action where the next-hop is at the other end of a tunnel is not supported in the hardware.
•For set interface and set default interface, the interface should be a point-to-point one.
•PBR is not applied to multicast traffic and the traffic destined to link local addresses.
•When there is no traffic flow, the TCAM entry does not change from punt to policy-route.
Configuring IPv6 PBR
To configure, verify and troubleshoot the IPv6 PBR, see: Configuring IPv6 PBR.
Configuring MPLS Features
This section describes the MPLS features that have ES20 line card-specific configuration guidelines.
This section includes the following topics:
•Configuring Any Transport over MPLS
•Configuring MPLS Traffic Engineering Class-Based Tunnel Selection
•Configuring Virtual Private LAN Service
Configuring Any Transport over MPLS
Any Transport over MPLS (AToM) transports Layer 2 packets over a Multiprotocol Label Switching (MPLS) backbone. AToM uses a directed Label Distribution Protocol (LDP) session between edge routers for setting up and maintaining connections. Forwarding occurs through the use of two levels of labels, switching between the edge routers. The external label (tunnel label) routes the packet over the MPLS backbone to the egress Provider Edge (PE) at the ingress PE. The VC label is a demuxing label that determines the connection at the tunnel endpoint (the particular egress interface on the egress PE as well as the virtual path identifier [VPI]/virtual channel identifier [VCI] value for an ATM Adaptation Layer 5 [AAL5] protocol data unit [PDU], the data-link connection identifier [DLCI] value for a Frame Relay PDU, or the virtual LAN [VLAN] identifier for an Ethernet frame).
Scalable EoMPLS on 7600-ESM-2X10GE and 7600-ESM-20X1GE
The Scalable EoMPLS on 7600-ESM-2X10GE and 7600-ESM-20X1GE feature improves EoMPLS scalability on the Cisco 7600 router. With Scalable EoMPLS, the CE-facing line card performs all EoMPLS imposition and disposition label processing. From the core-side line card perspective, the AToM packets in and out of the router appear as generic MPLS frames.
Restrictions and Usage Guidelines
When configuring the Scalable EoMPLS on 7600-ESM-2X10GE and 7600-ESM-20X1GE feature, follow these restrictions and usage guidelines:
•Scalable EoMPLS is supported with EVCs (Ethernet Virtual Circuits). An EVC is an end-to-end representation of a single instance of a layer 2 service being offered by a provider to a customer.
•Scalable EoMPLS is supported as a mapped service for the QinQ termination
•Service Instances supported- 16, 000 per line card (32, 000 per Cisco 7600 series router)
•VC type 4 and VC type 5 are supported.
•Control word operation is supported.
•For ingress policing, only the drop action and the accept action for the police command are supported.
•Ingress CoS marking is not supported.
•For QoS marking, mapping of the incoming VLAN dot1q p-bits to the outgoing MPLS EXP bits is supported.
•For QoS marking, mapping of the incoming MPLS EXP bits to the outgoing VLAN dot1q p-bits is supported.
•For QoS shaping, egress pseudowire shaping is supported. Matching is based on the MPLS EXP bits.
•The Dot1q Transparency for EoMPLS feature is supported.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface gigabitethernet slot/subslot/port[.subinterface-number] or interface tengigabitethernet slot/subslot/port[.subinterface-number]
4. [no] service instance id {Ethernet [service-name}
5. encapsulation dot1q vlad id
6. rewrite ingress tag {push {dot1q vlan-id | dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | pop {1 | 2} | translate {1-to-1 {dot1q vlan-id | dot1ad vlan-id}| 2-to-1 dot1q vlan-id | dot1ad vlan-id}| 1-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id} | 2-to-2 {dot1q vlan-id second-dot1q vlan-id | dot1ad vlan-id dot1q vlan-id}} [symmetric]
7. xconnect peer-id vc-id encapsulation mpls
DETAILED STEPS
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router> enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
interface gigabitethernet
slot/subslot/port[.subinterface-number]
or
interface tengigabitethernet
slot/subslot/port[.subinterface-number]
Example:
Router(config)# interface gigabitethernet
4/0/0
|
Specifies the Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:
•slot/subslot/port—Specifies the location of the interface.
•subinterface-number—(Optional) Specifies a secondary interface (subinterface) number.
|
Step 4
|
[no] service instance id {Ethernet
[service-name}
Example:
Router(config-if)# service instance 101
ethernet
|
Creates a service instance (an instantiation of an EVC) on an interface and sets the device into the config-if-srv submode.
|
Step 5
|
encapsulation dot1q vlan id
Example:
Router(config-if-srv)# encapsulation
dot1q 5
|
Defines the matching criteria to map ingress dot1q frames on an interface to the appropriate service instance.
Note Use the encapsulation dot1q default command to configure the default service instance on a port. Use the encapsulation dot1q untagged command to map untagged Ethernet frames on an ingress interface to a service instance.
|
Step 6
|
rewrite ingress tag {push {dot1q vlan-id
| dot1q vlan-id second-dot1q vlan-id |
dot1ad vlan-id dot1q vlan-id} | pop {1 |
2} | translate {1-to-1 {dot1q vlan-id |
dot1ad vlan-id}| 2-to-1 dot1q vlan-id |
dot1ad vlan-id}| 1-to-2 {dot1q vlan-id
second-dot1q vlan-id | dot1ad vlan-id
dot1q vlan-id} | 2-to-2 {dot1q vlan-id
second-dot1q vlan-id | dot1ad vlan-id
dot1q vlan-id}} [symmetric]
Example:
Router(config-if-srv)# rewrite ingress
tag dot1q single symmetric
|
Specifies the tag manipulation that is to be performed on the frame ingress to the service instance.
|
Step 7
|
xconnect peer-id vc-id encapsulation mpls
Example:
Router(config-if-srv)# xconnect 10.0.0.1
123 encapsulation mpls
|
Configures scalable EoMPLS on a service instance. On the ingress side, after proper encapsulation manipulations, a packet is tunneled in an EoMPLS VC and transmitted on the core.
|
Examples
The following is an example of a basic configuration:
This is the customer-facing port at router 1.
Router(config)# interface TenGigabitEthernet1/0/1
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 100
Router(config-if-srv)# rewrite ingress tag translate 1-to-2 dot1q 5 second-dot1q 5
symmetric
Router(config-if-srv)# xconnect 2.2.2.2 100 encapsulation mpls
This is the global configuration at router 1.
Router(config)# interface loopback1
Router(config-if)# ip address 1.1.1.1 255.255.255.255
Router(config-if)# ip address 20.1.1.1 255.255.255.0
Router(config-if)# mpls label protocol ldp
Router(config-if)# mpls ip
This is the customer-facing port at router 2.
Router(config)# interface TenGigabitEthernet2/0/2
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 100
Router(config-if-srv)# rewrite ingress tag translate 1-to-2 dot1q 5 second-dot1q 5
symmetric
Router(config-if-srv)# xconnect 1.1.1.1 100 encapsulation mpls
This is the global configuration at router 2.
Router(config)# interface loopback1
Router(config-if)# ip address 2.2.2.2 255.255.255.255
!MPLS core facing port
Router(config-if)# ip address 20.1.1.2 255.255.255.0
Router(config-if)# mpls label protocol ldp
Router(config-if)# mpls ip
The following is an example of single tag VLAN configuration for tunneling a single VLAN service instance.
! Customer facing port
Router(config)# interface TenGigabitEthernet2/0/2
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 100
Router(config-if-srv)# rewrite ingress tag translate 1-to-2 dot1q 5 second-dot1q 5
symmetric
Router(config-if-srv)# xconnect 1.1.1.1 100 encapsulation mpls
The following is an example of double tag VLAN configuration for tunneling double tag VLAN frames.
! Customer facing port
Router(config)# interface TenGigabitEthernet2/0/2
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 100 second-dot1q 200
Router(config-if-srv)# rewrite ingress tag translate 2-to-2 dot1q 5 second-dot1q 5
symmetric
Router(config-if-srv)# xconnect 1.1.1.1 100 encapsulation mpls
The following is an example of a selective QinQ cross connect configuration.
! Customer facing port
Router(config)# interface TenGigabitEthernet2/0/2
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation dot1q 10-20, 30, 50-60
Router(config-if-srv)# xconnect 1.1.1.1 100 encapsulation mpls
The following is an example of a port-based cross connect tunnel configuration that tunnels all incoming packets to the remote peer.
!All tag and non-tag packets aggregation
Router(config)# interface TenGigabitEthernet2/0/2
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation default
Router(config-if-srv)# xconnect 1.1.1.1 100 encapsulation mpls
!All non-tag packets aggregation
Router(config)# interface TenGigabitEthernet2/0/2
Router(config-if)# service instance 100 ethernet
Router(config-if-srv)# encapsulation untagged
Router(config-if-srv)# xconnect 1.1.1.1 100 encapsulation mpls
Verification
Use the following commands can be used to verify operation.
Command
|
Purpose
|
Router# show ethernet service evc [id evc-id | interface interface-id] [detail]
|
Displays information pertaining to a specific EVC if an EVC ID is specified, or pertaining to all EVCs on an interface if an interface is specified. The detailed option provides additional information on the EVC.
|
Router# show ethernet service instance [id instance-id interface interface-id | interface interface-id] [detail]
|
Displays information about one or more service instances. If a service instance ID and interface are specified, only data pertaining to that particular service instance is displayed. If only an interface ID is specified, displays data for all service instances s on the given interface.
|
Router# show ethernet service interface [interface-id] [detail]
|
Displays information in the Port Data Block (PDB).
|
Router# show mpls l2 vc min VC ID max VC ID detail
|
Displays detailed information related to the virtual connection (VC).
|
Router# show mpls l2transport vc
|
Displays the state of VCs.
|
Router# show mpls forwarding (Output should have the label entry l2ckt)
|
Displays the contents of the Multiprotocol Label Switching (MPLS) Label Forwarding Information Base (LFIB).
|
.
Configuring MPLS Traffic Engineering Class-Based Tunnel Selection
Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Class-Based Tunnel Selection (CBTS) enables you to dynamically route and forward traffic with different class of service (CoS) values onto different TE tunnels between the same tunnel headend and the same tailend. The TE tunnels can be regular TE tunnels or DiffServ-aware TE (DS-TE) tunnels.
The set of TE (or DS-TE) tunnels from the same headend to the same tailend that you configure to carry different CoS values is referred to as a "tunnel bundle." Tunnels are "bundled" by creating a master tunnel and then attaching member tunnels to the master tunnel. After configuration, CBTS dynamically routes and forwards each packet into the tunnel that meets the following requirements:
•Is configured to carry the CoS of the packet
•Has the right tailend for the destination of the packet
Because CBTS offers dynamic routing over DS-TE tunnels and requires minimum configuration, it greatly eases deployment of DS-TE in large-scale networks.
CBTS can distribute all CoS values on eight different tunnels.
CBTS also allows the TE tunnels of a tunnel bundle to exit headend routers through different interfaces.
CBTS configuration involves performing the following tasks:
•Creating multiple (DS-) TE tunnels with the same headend and tailend and indicating on each of these tunnels which CoSs are to be transported on the tunnel.
•Creating a master tunnel, attaching the member tunnels to it, and making the master tunnel visible for routing.
Restrictions and Usage Guidelines
When configuring MPLS Traffic Engineering Class-Based Tunnel Selection (CBTS), follow these restrictions and usage guidelines:
•CBTS has the following prerequisites:
–MPLS enabled on all tunnel interfaces
–Cisco Express Forwarding (CEF) or distributed CEF (dCEF) enabled in general configuration mode
•CBTS has the following restrictions:
–For a given destination, all CoS values are carried in tunnels terminating at the same tailend. Either all CoS values are carried in tunnels or no values are carried in tunnels. In other words, for a given destination, you cannot map some CoS values in a DS-TE tunnel and other CoS values in a Shortest Path First (SPF) Label Distribution Protocol (LDP) or SPF IP path.
–No LSP is established for the master tunnel and regular traffic engineering attributes (bandwidth, path option, fast reroute) are irrelevant on a master tunnel. TE attributes (bandwidth, bandwidth pool, preemption, priorities, path options, and so on) are configured completely independently for each tunnel.
–CBTS does not allow load-balancing of a given EXP value in multiple tunnels. If two or more tunnels are configured to carry a given experimental (EXP) value, CBTS picks one of these tunnels to carry this EXP value.
–CBTS supports aggregate control of bumping (that is, it is possible to define default tunnels to be used if other tunnels go down. However, CBTS does not allow control of bumping if the default tunnel goes down. CBTS does not support finer-grain control of bumping. For example, if the voice tunnel goes down, redirect voice to T2, but if video goes down, redirect to T3.
–The operation of CBTS is not supported with Any Transport over MPLS (AToM), MPLS TE Automesh, or label-controlled (LC) ATM.
Creating Multiple MPLS Member TE or DS-TE Tunnels with the Same Headend and the Same Tailend
Perform the following task to create multiple MPLS member TE or DS-TE tunnels with the same headend and same tailend and to configure EXP values to be carried by each of these tunnels. The procedure begins in global configuration mode.
SUMMARY STEPS
1. interface tunnel number
2. ip unnumbered type number
3. tunnel destination {hostname | ip-address}
4. tunnel mode mpls traffic-eng
5. tunnel mpls traffic-eng bandwidth [sub-pool | global] bandwidth
6. tunnel mpls traffic-eng exp [list-of-exp-values] [default]
7. exit
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
interface tunnel number
Example:
Router(config)# interface tunnel 7
|
Configures a tunnel interface type and enters interface configuration mode.
•number—Number of the tunnel interface that you want to create or configure.
|
Step 2
|
ip unnumbered type number
Example:
Router(config-if)# ip unnumbered loopback0
|
Enables IP processing on an interface without assigning an explicit IP address to the interface.
•type—Type of another interface on which the router has an assigned IP address.
•number—Number of another interface on which the router has an assigned IP address. It cannot be another unnumbered interface.
|
Step 3
|
tunnel destination {hostname | ip-address}
Example:
Router(config-if)# tunnel destination 10.5.5.5
|
Specifies the destination of the tunnel for this path option.
•hostname—Name of the host destination.
•ip-address—IP address of the host destination expressed in four-part, dotted decimal notation.
|
Step 4
|
tunnel mode mpls traffic-eng
Example:
Router(config-if)# tunnel mode mpls traffic-eng
|
Sets the mode of a tunnel to MPLS for TE.
|
Step 5
|
tunnel mpls traffic-eng bandwidth [sub-pool |
global] bandwidth
Example:
Router(config-if)# tunnel mpls traffic-eng bandwidth
100
|
Configures the bandwidth for the MPLS TE tunnel. If automatic bandwidth is configured for the tunnel, use the tunnel mpls traffic-eng bandwidth command to configure the initial tunnel bandwidth, which is adjusted by the auto-bandwidth mechanism.
•sub-pool—(Optional) Indicates a subpool tunnel.
•global—(Optional) Indicates a global pool tunnel. Entering this keyword is not necessary, because all tunnels are global pool in the absence of the sub-pool keyword. But if users of pre-DiffServ-aware Traffic Engineering (DS-TE) images enter this keyword, it is accepted.
•bandwidth—Bandwidth, in kilobytes per second, set aside for the MPLS traffic engineering tunnel. Range is between 1 and 4294967295.
Note You can configure any existing mpls traffic-eng command on these TE or DS-TE tunnels.
|
Step 6
|
tunnel mpls traffic-eng exp [list-of-exp-values]
[default]
Example:
Router(config-if)# tunnel mpls traffic-eng exp 9
|
Specifies an EXP value or values for an MPLS TE tunnel.
•list-of-exp-values—EXP value or values that are are to be carried by the specified tunnel. Values range from 0 to 7.
•default—The specified tunnel is to carry all EXP values that are:
–Not explicitly allocated to another tunnel
–Allocated to a tunnel that is currently down
|
Step 7
|
exit
Example:
Router(config-if)#
|
Exits to global configuration mode.
|
Repeat Step 1 through Step 7 on the same headend router to create additional tunnels from this headend to the same tailend.
|
Creating a Master Tunnel, Attaching Member Tunnels, and Making the Master Tunnel Visible
Perform the followings task to create a master tunnel, attach member tunnels to it, and make the master tunnel visible for routing. The procedure begins in global configuration mode.
Summary Steps
1. interface tunnel number
2. ip unnumbered type number
3. tunnel destination {hostname | ip-address}
4. tunnel mode mpls traffic-eng exp-bundle master
5. tunnel mode mpls traffic-eng exp-bundle member tunnel-id
6. tunnel mpls traffic-eng autoroute announce
7. tunnel mpls traffic-eng autoroute metric {absolute | relative} value
DETAILED STEPS
|
Command
|
Purpose
|
Step 1
|
interface tunnel number
Example:
Router(config)# interface tunnel 7
|
Configures a tunnel interface type and enters interface configuration mode.
•number—Number of the tunnel interface that you want to create or configure.
|
Step 2
|
ip unnumbered type number
Example:
Router(config-if)# ip unnumbered loopback0
|
Enables IP processing on an interface without assigning an explicit IP address to the interface.
•type—Type of another interface on which the router has an assigned IP address.
•number—Number of another interface on which the router has an assigned IP address. It cannot be another unnumbered interface.
|
Step 3
|
tunnel destination {hostname | ip-address}
Example:
Router(config-if)# tunnel destination 10.5.5.5
|
Specifies the destination of the tunnel for this path option.
•hostname—Name of the host destination.
•ip-address—IP address of the host destination expressed in four-part, dotted decimal notation.
|
Step 4
|
tunnel mode mpls traffic-eng exp-bundle master
Example:
Router(config-if)# tunnel mode mpls traffic-eng
exp-bundle master
|
Specifies this is the master tunnel for the CBTS configuration.
|
Step 5
|
tunnel mode mpls traffic-eng exp-bundle member
tunnel-id
Example:
Router(config-if)# tunnel mode mpls traffic-eng
exp-bundle member Tunnel20000
|
Attaches a member tunnel to the master tunnel.
•tunnel-id—Number of the tunnel interface to be attached to the master tunnel.
Repeat this command for each member tunnel.
|
Step 6
|
tunnel mpls traffic-eng autoroute announce
Example:
Router(config-if)# tunnel mpls traffic-eng autoroute
announce
|
Specifies that the Interior Gateway Protocol (IGP) should use the tunnel (if the tunnel is up) in its enhanced shortest path first (SPF) calculation.
|
Step 7
|
tunnel mpls traffic-eng autoroute metric {absolute |
relative} value
Example:
Router(config-if)# tunnel mpls traffic-eng autoroute
metric relative -1
|
(Optional) Specifies the MPLS TE tunnel metric that the IGP-enhanced SPF calculation uses.
•absolute—Indicates the absolute metric mode; you can enter a positive metric value.
•relative—Indicates the relative metric mode; you can enter a positive, negative, or zero value.
•value—Metric that the IGP enhanced SPF calculation uses. The relative value can be from -10 to 10.
Note Even though the value for a relative metric can be from -10 to +10, configuring a tunnel metric with a negative value is considered a misconfiguration. If the metric to the tunnel tailend appears to be 4 from the routing table, then the cost to the tunnel tailend router is actually 3 because 1 is added to the cost for getting to the loopback address. In this instance, the lowest value that you can configure for the relative metric is -3.
|
Note Alternatively, static routing could be used instead of autoroute to make the TE or DS-TE tunnels visible for routing.
EXAMPLE
The following example shows how to configure Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) Class-Based Tunnel Selection (CBTS). Tunnel1, Tunnel2, and Tunnel3 are member tunnels, and Tunnel4 is the master tunnel.
Router(config)# interface Tunnel1
Router(config-if)# ip unnumbered loopback0
Router(config-if)# interface destination 24.1.1.1
Router(config-if)# tunnel mode mpls traffic-eng
Router(config-if)# tunnel mpls traffic-eng bandwidth sub-pool 30000
Router(config-if)# tunnel mpls traffic-eng exp 5
Router(config)# interface Tunnel2
Router(config-if)# ip unnumbered loopback0
Router(config-if)# interface destination 24.1.1.1
Router(config-if)# tunnel mode mpls traffic-eng
Router(config-if)# tunnel mpls traffic-eng bandwidth 50000
Router(config-if)# tunnel mpls traffic-eng exp 3 4
Router(config)# interface Tunnel3
Router(config-if)# ip unnumbered loopback0
Router(config-if)# interface destination 24.1.1.1
Router(config-if)# tunnel mode mpls traffic-eng
Router(config-if)# tunnel mpls traffic-eng bandwidth 10000
Router(config-if)# tunnel mpls traffic-eng exp default
Router(config)# interface Tunnel4
Router(config-if)# interface destination 24.1.1.1
Router(config-if)# tunnel mpls traffic-eng exp-bundle master
Router(config-if)# tunnel mpls traffic-eng exp-bundle member Tunnel1
Router(config-if)# tunnel mpls traffic-eng exp-bundle member Tunnel2
Router(config-if)# tunnel mpls traffic-eng exp-bundle member Tunnel3
Router(config-if)# tunnel mpls traffic-eng autoroute enable
Verifying That the MPLS TE or DS-TE Tunnels Are Operating and Announced to the IGP
The following show commands can be used to verify that the MPLS TE or DS-TE tunnels are operating and announced to the IGP. The commands are all entered in privileged EXEC configuration mode.
Command
|
Purpose
|
show mpls traffic-eng topology {A.B.C.D | igp-id
{isis nsap-address | ospf A.B.C.D} [brief]}
|
Shows the MPLS traffic engineering global topology as currently known at this node.
•A.B.C.D—Specifies the node by the IP address (router identifier to interface address).
•igp-id—Specifies the node by IGP router identifier.
•isis nsap-address—Specifies the node by router identification (nsap-address) if you are using Integrated Intermediate System-to-Intermediate System (IS-IS).
•ospf A.B.C.D—Specifies the node by router identifier if you are using Open Shortest Path First (OSPF).
•brief—Provides a less-detailed version of the topology.
|
show mpls traffic-eng exp
|
Displays EXP mapping.
|
show ip cef [type number] [detail]
|
Displays entries in the forwarding information base (FIB) or displays a summary of the FIB.
•type number —Identifies the interface type and number for which to display FIB entries.
•detail—Displays detailed FIB entry information.
|
show mpls forwarding-table [network {mask | length}
[detail]]
|
Displays the contents of the MPLS label forwarding information base (LFIB).
•network—Identifies the destination network number.
•mask—Identifies the network mask to be used with the specified network.
•length—Identifies the number of bits in the destination mask.
•detail—Displays information in long form (includes length of encapsulation, length of MAC string, maximum transmission unit [MTU], and all labels).
|
show mpls traffic-eng autoroute
|
Displays tunnels that are announced to the Interior Gateway Protocol (IGP).
|
The show mpls traffic-eng topology command output displays the MPLS TE global topology:
Router# show mpls traffic-eng topology 10.0.0.1
IGP Id: 10.0.0.1, MPLS TE Id:10.0.0.1 Router Node (ospf 10 area 0) id 1
link[0]: Broadcast, DR: 180.0.1.2, nbr_node_id:6, gen:18
frag_id 0, Intf Address:180.0.1.1
TE metric:1, IGP metric:1, attribute_flags:0x0
physical_bw: 100000 (kbps), max_reservable_bw_global: 1000 (kbps)
max_reservable_bw_sub: 0 (kbps)
Total Allocated Reservable Reservable
BW (kbps) BW (kbps) BW (kbps)
--------------- ----------- ----------
link[1]: Broadcast, DR: 180.0.2.2, nbr_node_id:7, gen:19
frag_id 1, Intf Address:180.0.2.1
TE metric:1, IGP metric:1, attribute_flags:0x0
physical_bw: 100000 (kbps), max_reservable_bw_global: 1000 (kbps)
max_reservable_bw_sub: 0 (kbps)
Total Allocated Reservable Reservable
BW (kbps) BW (kbps) BW (kbps)
--------------- ----------- ----------
The show mpls traffic-eng exp command output displays EXP mapping information about a tunnel:
Router# show mpls traffic-eng exp
Master: Tunnel10 Status: IP
Members: Status Conf EXP Actual EXP
Tunnel2 UP/ACTIVE default 0 1 2 3 4 6 7
(T)=Tailend is different to master
(NE)=There is no exp value configured on this tunnel.
The show ip cef detail command output displays detailed FIB entry information for a tunnel:
Router# show ip cef tunnel1 detail
IP CEF with switching (Table Version 46), flags=0x0
31 routes, 0 reresolve, 0 unresolved (0 old, 0 new), peak 2
2 instant recursive resolutions, 0 used background process
8 load sharing elements, 8 references
6 in-place/0 aborted modifications
34696 bytes allocated to the FIB table data structures
universal per-destination load sharing algorithm, id 9EDD49E1
Resolution Timer: Exponential (currently 1s, peak 1s)
short mask protection disabled
31 leaves, 23 nodes using 26428 bytes
Table epoch: 0 (31 entries at this epoch)
Adjacency Table has 13 adjacencies
10.0.0.9/32, version 45, epoch 0, per-destination sharing
tag information set, all rewrites inherited
via 0.0.0.0, Tunnel1, 0 dependencies
next hop 0.0.0.0, Tunnel1
tag rewrite with Tu1, point2point, tags imposed {12304}
0 packets, 0 bytes switched through the prefix
tmstats: external 0 packets, 0 bytes
internal 0 packets, 0 bytes
The show mpls forwarding-table detail command output displays detailed information from the MPLS LFIB:
Router# show mpls forwarding 10.0.0.9 detail
Local Outgoing Prefix Bytes tag Outgoing Next Hop
tag tag or VC or Tunnel Id switched interface
Tun hd Untagged 10.0.0.9/32 0 Tu1 point2point
MAC/Encaps=14/18, MRU=1500, Tag Stack{12304}, via Fa6/0
00027D884000000ED70178A88847 03010000
No output feature configured
Untagged 10.0.0.9/32 0 Tu2 point2point
MAC/Encaps=14/18, MRU=1500, Tag Stack{12305}, via Fa6/1
00027D884001000ED70178A98847 03011000
No output feature configured
Untagged 10.0.0.9/32 0 Tu3 point2point
MAC/Encaps=14/18, MRU=1500, Tag Stack{12306}, via Fa6/1
00027D884001000ED70178A98847 03012000
No output feature configured
Untagged 10.0.0.9/32 0 Tu4 point2point
MAC/Encaps=14/18, MRU=1500, Tag Stack{12307}, via Fa6/1
00027D884001000ED70178A98847 03013000
No output feature configured
The show mpls traffic-eng autoroute command output displays tunnels that are announced to the Interior Gateway Protocol (IGP).
Router# show mpls traffic-eng autoroute
MPLS TE autorouting enabled
destination 10.0.0.9, area ospf 10 area 0, has 4 tunnels
Tunnel1 (load balancing metric 20000000, nexthop 10.0.0.9)
Tunnel2 (load balancing metric 20000000, nexthop 10.0.0.9)
Tunnel3 (load balancing metric 20000000, nexthop 10.0.0.9)
Tunnel4 (load balancing metric 20000000, nexthop 10.0.0.9)
Configuring Virtual Private LAN Service
Virtual Private LAN Service (VPLS) enables geographically separate LAN segments to be interconnected as a single bridged domain over a packet switched network, such as IP, MPLS, or a hybrid of both.
VPLS solves the network reconfiguration problems at the customer equipment (CE) that is associated with Layer 2 Virtual Private Network (L2VPN) implementations. The current Cisco IOS software L2VPN implementation builds a point-to-point connection to interconnect the two attachment VCs of two peering customer sites. To communicate directly among all sites of an L2VPN network, a distinct emulated VC needs to be created between each pair of peering attachment VCs.
For example, when two sites of the same L2VPN network are connected to the same PE, you must establish two separate emulated VCs towards a given remote site, instead of sharing a common emulated VC between these two sites. For an L2VPN customer who uses the service provider backbone to interconnect its LAN segments, the current implementation effectively turns its multiaccess broadcast network into a fully meshed point-to-point network, which requires extensive reconfiguration on the existing CE devices.
VPLS is a multipoint L2VPN architecture that connects two or more customer devices using EoMPLS bridging techniques. VPLS with EoMPLS uses an MPLS-based provider core, where the PE routers have to cooperate to forward customer Ethernet traffic for a given VPLS instance in the core.
VPLS uses the provider core to join multiple attachment circuits together to simulate a virtual bridge that connects the multiple attachment circuits together. From a customer point of view, there is no topology for VPLS. All of the CE devices appear to connect to a logical bridge emulated by the provider core.
Hierarchical Virtual Private LAN Service (H-VPLS) with MPLS to the Edge
In a flat or nonhierarchical VPLS configuration, a full mesh of pseudowires (PWs) is needed between all PE nodes. A pseudowire defines a VLAN and its corresponding pseudoport.
Hierarchical Virtual Private LAN Service (H-VPLS) reduces both signaling and replication overhead by using a combination of full-mesh and hub-and-spoke configurations. Hub-and-spoke configurations operate with split horizon to allow packets to be switched between PWs, which effectively reduce the number of PWs between PEs.
Figure 2-10 H-VPLS with MPLS to the Edge Network
In the H-VPLS with MPLS to the edge architecture, Ethernet Access Islands (EAIs) work in combination with a VPLS core network, with MPLS as the underlying transport mechanism. EAIs operate like standard Ethernet networks. In Figure 2-10, devices CE1, CE2a and CE2b reside in an EAI. Traffic from any CE devices within the EAI is switched locally within the EAI by the user-facing provider edge (UPE) device along the computed spanning-tree path. Each UPE device is connected to one or more network-facing provider edge (NPE) devices using PWs. The traffic local to the UPE is not forwarded to any network-facing provider edge (NPE) devices.
VPLS Configuration Guidelines
When configuring VPLS on a Cisco 7600 Series Ethernet Services 20G line card, consider the following guidelines:
•The Cisco 7600 Series Ethernet Services 20G line card supports up to 4000 VPLS domains per Cisco 7600 series router.
•The Cisco 7600 Series Ethernet Services 20G line card supports up to 60 VPLS peers per domain per Cisco 7600 series router.
Note From Cisco IOS release12.2(33) SRD onwards, the Cisco 7600 Series Ethernet Services 20G line card supports up to 110 VPLS peers per domain per Cisco 7600 series router.
•The Cisco 7600 Series Ethernet Services 20G line card supports up to 30,000 pseudowires, used in any combination of domains and peers up to the 4000-domain or 60-peer maximums. For example, support of up to 4000 domains with 7 peers, or up to 60 peers in 500 domains. However, although 30, 000 vcs are supported, these are not the recommended system operating limits.
•When configuring VPLS on a Cisco 7600 Series Ethernet Services 20G line card, consider the following guidelines:
–H-VPLS with QinQ edge—Requires a Cisco 7600 Series Ethernet Services 20G line card in the uplink, and any LAN port or Cisco 7600 Series Ethernet Services 20G line card on the downlink.
•H-VPLS with MPLS edge requires either an optical service module, Cisco 7600 SIP-600, Cisco 7600 SIP-400, or Cisco 7600 Series Ethernet Services 20G line cards in both the downlink (facing UPE) and uplink (MPLS core).
•The Cisco 7600 Series Ethernet Services 20G line cards provide Transparent LAN Services (TLS) and Ethernet Virtual Connection Services (EVCS).
•The Cisco 7600 Series Ethernet Services 20G line cards support the following VPLS features:
–H-VPLS with MPLS edge
–H-VPLS with QinQ edge
–VPLS with point-to-multipoint EoMPLS and fully-meshed PE configuration
•For information about configuring VPLS on the Cisco 7600 Series Ethernet Services 20G line cards, consider the guidelines in this document:
http://www.cisco.com/en/US/docs/interfaces_modules/shared_port_adapters/configuration/7600series/76cfgeth.html
•VPLS is supported only with intelligent cards as core facing cards. If both intelligent and non-intelligent cards are used as core facing cards, then route change events can cause VPLS VC to go over non-intelligent cards, and under such conditions, VPLS may not work as expected.
Configuring SVI-Based IP/Routed Interworking
Interworking interconnects two heterogeneous Attachment Circuits (ACs).
The types of interworking functions used depends on the following criteria:
•AC types used.
•Data type relayed.
•Level of functions supported by the router.
The interworking functions currently supported are:
•Bridged Interworking —Used with the Layer 2 (L2) packets regardless of the Layer 3 (L3) contents. The Internet Service Provider (ISP) do not participate in the routing.
•Ethernet Interworking— Used with a Ethernet (Port) over Multiprotocol Label Switching (MPLS) pseudowire for bridged interworking.
•Routed Interworking—Used to relay L3 packets. There are different routed interworking for each protocol type. Internet Protocol (IP) Interworking or Switched Virtual Interface (SVI)/VLAN-based IP/Routed interworking uses IP over MPLS (Multiprotocol Label Switching) pseudowires to relay data.
As Ethernet-to-Ethernet or PPP-to-PPP supports Layer 2 transport over MPLS and IP, L2VPN Interworking augments this functionality and connects disparate attachment circuits. Interworking function translates data between the different Layer 2 encapsulations. ES 20 line card supports IP routed interworking, also known as IP interworking.
Note If a Layer2 pseudowire is configured on an interface VLAN instead of the phisycal interface and the pseudowire traffic on Layer2 reaches the destination (core facing) through an ES20 line card, the PIM and IGMP traffic crossing the pseudowire is switched to the Route Processor (software switched) resulting in high CPU utilization. To enable hardware switching for the PIM and IGMP traffic, disable IGMP snooping.
In a Routed mode AToM (Any Transport over MPLS) interworking:
•Address Resolution Protocol (ARP) is terminated on the ethernet PE.
•When the payload is sent to core, there is no ethernet header and cannot relay to the PE using Frame Relay or ATM.
•ATM or FR side does not handle L2 encapsulation.
When you execute the interworking {ethernet | ip} command in pseudowire- class configuration mode:
•The attachment circuits are locally terminated.
•The ethernet keyword removes the Ethernet frames from the attachment circuit, and relays them over the pseudowire.
•Ethernet end-to-end transmission is assumed.
•Nonethernet attachment circuit frames are dropped.
•The VLAN tag is removed, and the untagged Ethernet frame is retained.
Restrictions and Usage Guidelines
•ES20 supports only SVI- based interworking.
•ES20 does not support ATM/FR/PPP.
SUMMARY STEPS TO CONFIGURE Ethernet VLAN to ATM AAL5
1. enable
2. configure terminal
3. pseudowire-class pw-class-name
4. encapsulation mpls
5. interworking ip
6. vlan vlan-id
7. interface vlan vlan-id
8. no ip address
9. xconnect destination-id vc-id pw-class pw-class-name
10. exit
DETAILED STEPS TO CONFIGURE Ethernet VLAN to ATM AAL5
|
Command or Action
|
Purpose
|
Step 1
|
enable
Example:
Router# enable
|
Enables privileged EXEC mode.
•Enter your password if prompted.
|
Step 2
|
configure terminal
Example:
Router# configure terminal
|
Enters global configuration mode.
|
Step 3
|
pseudowire-class pw-class-name
Example:
Router (config)# pseudowire-class abc
|
Defines the pseudowire class instance in the pseudowire class.
|
Step 4
|
encapsulation mpls
Example:
Router# (config-pw-class)# encapsulation
mpls
|
Defines the encapsulation in the pseudowire class.
|
Step 5
|
interworking ip
Example:
Router# (config-pw-class)# interworking
ip
|
Defines the interworking type in the pseudowire class.
|
Step 6
|
vlan vlan-id
Example:
Router# bridge-domain 41
|
Sets a VLAN instance on the router mode.
|
Step 7
|
interface vlan vlan-id
Example:
Router (config)# cfm mep domain L4 mpid 4001
|
Creates a VLAN interface in the configuration mode.
|
Step 8
|
no shut
Example:
Router (config-if)# Router# |
Releases the VLAN interface.
|
Step 9
|
xconnect destination-id vc-id pw-class
pw-class-name
Example:
Router (config-if)# Router# |
Creates the pseudowire VC to the remote end.
|
Step 10
|
exit
|
Exits the configuration mode.
|
Example
Use the following commands to configure Ethernet VLAN to ATM AAL5 on an SVI interface:
Router(config)#
Router(config-if)#
Router(config-srv)#
Router(config-if-srv)#
Router(config-if-srv)#
Router(config-if)#
Router(config)#
Router(config-if)#
Router(config-srv)#
Verification
Use the show mpls l2 vc or show mpls l2 vc <vc-id> detail command to verify the status of the VC or the pseudowire.
Resetting a Cisco 7600 Series Ethernet Services 20G Line Card
To reset an ES20 line card, use the following command in privileged EXEC configuration mode:
Command
|
Purpose
|
Router# hw-module module slot reset
|
Turns power off and on to the ES20 line card in the specified slot, where:
•slot—Specifies the chassis slot number where the ES20 line card is installed.
|
SFP-GE-T Support
The SFP-GE-T on the Cisco 7600-ES20-GE line card supports speeds of 10 Mbps, 100 Mbps, and 1000 Mbps. Speed is not autonegotiated; you must configure it using the speed command. Only full-duplex mode is supported.
Note Auto negotiation of duplex mode is not supported, hence, manually configure the remote port for full-duplex mode.
You can configure each Ethernet interface independently using any combination of 10 Mbps, 100 Mbps, or 1000 Mbps.
To set the interface speed, use the following command in the interface configuration mode.
Command
|
Purpose
|
Router (config-if)# speed
Example:
Router(config-if)# speed 10
|
Configures the interface speed.
Accepted values are:
•10 for 10 Mbps operation
•100 for 100 Mbps operation
•1000 for 1000 Mbps operation
|