Configuring the Fast Ethernet and Gigabit Ethernet SPAs

Table Of Contents

Configuring the Fast Ethernet and Gigabit Ethernet SPAs

Configuration Tasks

Required Configuration Tasks

Specifying the Interface Address on a SPA

Modifying the MAC Address on the Interface

Gathering MAC Address Accounting Statistics

Configuring HSRP

Customizing VRRP

Modifying the Interface MTU Size

Configuring the Encapsulation Type

Configuring Autonegotiation on an Interface

Configuring an Ethernet VLAN

Configuring a Subinterface on a VLAN

Configuring Layer 2 Switching Features

Configuring Flow Control Support on the Link

Configuring EtherChannels

Configuring Virtual Private LAN Service (VPLS) and Hierarchical VPLS

Configuring Connectivity Fault Management

Configuring Maintenance Domains and Maintenance Points

Configuring Ethernet Operations, Administration, and Maintenance

Configuring IP Subscriber Awareness over Ethernet

Configuring a Backup Interface for Flexible UNI

Configuring QoS Features on Ethernet SPAs

Saving the Configuration

Shutting Down and Restarting an Interface on a SPA

Verifying the Interface Configuration

Verifying Per-Port Interface Status

Configuration Examples

Basic Interface Configuration Example

MAC Address Configuration Example

MAC Address Accounting Configuration Example

HSRP Configuration Example

MTU Configuration Example

VLAN Configuration Example

AToM over GRE Configuration Example

mVPNoGRE Configuration Examples

EoMPLS Configuration Example

Backup Interface for Flexible UNI Configuration Example

Changing the Speed of a Fast Ethernet SPA Configuration Example

Ethernet OAM Configuration Example


Configuring the Fast Ethernet and Gigabit Ethernet SPAs


This chapter provides information about configuring the 4-Port Fast Ethernet SPA, 8-Port Fast Ethernet SPA, 1-Port 10-Gigabit Ethernet SPA, 2-Port Gigabit Ethernet SPA, 5-Port Gigabit Ethernet SPA, and 10-Port Gigabit Ethernet SPA on the Cisco 7600 series router. It includes the following sections:

Configuration Tasks

Verifying the Interface Configuration

Configuration Examples

For more information about the commands used in this chapter, first see Chapter 40, "SIP, SSC, and SPA Commands," which documents new and modified commands, and then the Cisco 7600 Series Router Command Reference publication that corresponds to your Cisco IOS software release. Also refer to the related Cisco IOS software command reference and master index publications. For more information about accessing these publications, see the "Related Documentation" section on page xlviii.

For information about managing your system images and configuration files, refer to the Cisco IOS Configuration Fundamentals Configuration Guide, and Cisco IOS Configuration Fundamentals Command Reference publications that correspond to your Cisco IOS software release.

Configuration Tasks

This section describes how to configure the Fast Ethernet and Gigabit Ethernet SPAs and includes information about verifying the configuration.

This section includes the following topics:

Required Configuration Tasks

Specifying the Interface Address on a SPA

Modifying the MAC Address on the Interface

Gathering MAC Address Accounting Statistics

Configuring HSRP

Customizing VRRP

Modifying the Interface MTU Size

Configuring the Encapsulation Type

Configuring Autonegotiation on an Interface

Configuring an Ethernet VLAN

Configuring a Subinterface on a VLAN

Configuring Layer 2 Switching Features

Configuring Flow Control Support on the Link

Configuring EtherChannels

Configuring Virtual Private LAN Service (VPLS) and Hierarchical VPLS

Configuring Connectivity Fault Management

Configuring Ethernet Operations, Administration, and Maintenance

Configuring IP Subscriber Awareness over Ethernet

Configuring a Backup Interface for Flexible UNI

Ethernet SPA QoS Configuration Guidelines

Saving the Configuration

Shutting Down and Restarting an Interface on a SPA

Required Configuration Tasks

This section lists the required configuration steps to configure the Fast Ethernet and Gigabit Ethernet SPAs. The commands in the section are applicable for both Fast Ethernet and Gigabit Ethernet SPAs; however, the examples below are for configuring a Gigabit Ethernet SPA. If you are configuring a Fast Ethernet SPA, replace the gigabitethernet command with the fastethernet command.

Some of the required configuration commands implement default values that might be appropriate for your network. If the default value is correct for your network, then you do not need to configure the command. These commands are indicated by "(As Required)" in the Purpose column.


Note Cisco Discovery Protocol (CDP) is disabled by default on Cisco 7600 SIP-400 interfaces.


To configure the Fast Ethernet or Gigabit Ethernet SPAs, complete the following steps:

 
Command
Purpose

Step 1 

Router# configure terminal

Enters global configuration mode.

Step 2 

Router(config)# interface fastethernet slot/subslot/port[.subinterface-number]

or

Router(config)# interface gigabitethernet slot/subslot/port[.subinterface-number]

or

Router(config)# interface tengigabitethernet slot/subslot/port[.subinterface-number]

Specifies the Fast Ethernet, Gigabit Ethernet or the Ten Gigabit Ethernet interface to configure, where:

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section.

.subinterface-number—(Optional) Specifies a secondary interface (subinterface) number.

Step 3 

Router(config-if)# ip address [ip-address mask {secondary} | dhcp {client-id interface-name}{hostname host-name}]

Sets a primary or secondary IP address for an interface that is using IPv4, where:

ip-address—Specifies the IP address for the interface.

mask—Specifies the mask for the associated IP subnet.

secondary—(Optional) Specifies that the configured address is a secondary IP address. If this keyword is omitted, the configured address is the primary IP address.

dhcp—Specifies that IP addresses will be assigned dynamically using DHCP.

client-id interface-name—Specifies the client identifier. The interface-name sets the client identifier to the hexadecimal MAC address of the named interface.

hostname host-name—Specifies the hostname for the DHCP purposes. The host-name is the name of the host to be placed in the DHCP option 12 field.

Note The DHCP options with this command are not available for all Gigabit Ethernet SPAs and Fast Ethernet SPAs.

Step 4 

Router(config-if)# ip accounting mac-address {input | output}

(Optional) Enables MAC address accounting. MAC address accounting provides accounting information for IP traffic based on the source and destination MAC addresses of the LAN interfaces, where:

input—Specifies MAC address accounting for traffic entering the interface.

output—Specifies MAC address accounting for traffic leaving the interface.

Step 5 

Router(config-if)# mtu bytes

(As Required) Specifies the maximum packet size for an interface, where:

bytes—Specifies the maximum number of bytes for a packet.

The default is 1500 bytes.

Step 6 

Router(config-if)# standby [group-number] ip [ip-address [secondary]]

(Required for HSRP Configuration Only) Creates (or enables) the HSRP group using its number and virtual IP address, where:

(Optional) group-number—Specifies the group number on the interface for which HSRP is being enabled. The range is 0 to 255; the default is 0. If there is only one HSRP group, you do not need to enter a group number.

(Optional on all but one interface if configuring HSRP) ip-address—Specifies the virtual IP address of the hot standby router interface. You must enter the virtual IP address for at least one of the interfaces; it can be learned on the other interfaces.

(Optional) secondary—Specifies the IP address is a secondary hot standby router interface. If neither router is designated as a secondary or standby router and no priorities are set, the primary IP addresses are compared and the higher IP address is the active router, with the next highest as the standby router.

This command enables HSRP but does not configure it further. For additional information on configuring HSRP, refer to the HSRP section of the Cisco IP Configuration Guide publication that corresponds to your Cisco IOS software release.

Step 7 

Router(config-if)# no shutdown

Enables the interface.

Specifying the Interface Address on a SPA

SPA interface ports begin numbering with "0" from left to right. Single-port SPAs use only the port number 0. To configure or monitor SPA interfaces, you need to specify the physical location of the SIP, SPA, and interface in the CLI. The interface address format is slot/subslot/port, where:

slot—Specifies the chassis slot number in the Cisco 7600 series router where the SIP is installed.

subslot—Specifies the secondary slot of the SIP where the SPA is installed.

port—Specifies the number of the individual interface port on a SPA.

The following example shows how to specify the first interface (0) on a SPA installed in the first subslot of a SIP (0) installed in chassis slot 3:

Router(config)# interface serial 3/0/0

This command shows a serial SPA as a representative example, however the same slot/subslot/port format is similarly used for other SPAs (such as ATM and POS) and other non-channelized SPAs.

Modifying the MAC Address on the Interface

The Gigabit Ethernet SPAs use a default MAC address for each port that is derived from the base address that is stored in the electrically erasable programmable read-only memory (EEPROM) on the backplane of the Cisco 7600 series router.

To modify the default MAC address of an interface to some user-defined address, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# mac-address ieee-address

Modifies the default MAC address of an interface to some user-defined address, where:

ieee-address—Specifies the 48-bit Institute of Electrical and Electronics Engineers (IEEE) MAC address written as a dotted triple of four-digit hexadecimal numbers (xxxx.yyyy.zzzz).


To return to the default MAC address on the interface, use the no form of the command.

Verifying the MAC Address

To verify the MAC address of an interface, use the show interfaces gigabitethernet privileged EXEC command and observe the value shown in the "address is" field.

The following example shows that the MAC address is 000a.f330.2e40 for interface 1 on the SPA installed in subslot 0 of the SIP installed in slot 2 of the Cisco 7600 series router:

Router# show interfaces gigabitethernet 2/0/1
GigabitEthernet2/0/1 is up, line protocol is up 
  Hardware is GigEther SPA, address is 000a.f330.2e40 (bia 000a.f330.2e40)
  Internet address is 2.2.2.1/24
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, 
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  Keepalive not supported
  Full-duplex, 1000Mb/s, link type is force-up, media type is SX
  output flow-control is on, input flow-control is on
(Additional output removed for readability)

Gathering MAC Address Accounting Statistics

The ip accounting mac-address [input | output] command can be entered to enable MAC Address Accounting on an interface. After enabling MAC Address Accounting, MAC address statistics can be gathered by entering the show interfaces mac-accounting command.

Configuring HSRP

Hot Standby Router Protocol (HSRP) provides high network availability because it routes IP traffic from hosts without relying on the availability of any single router. HSRP is used in a group of routers for selecting an active router and a standby router. (An active router is the router of choice for routing packets; a standby router is a router that takes over the routing duties when an active router fails, or when preset conditions are met).

HSRP is enabled on an interface by entering the standby [group-number] ip [ip-address [secondary]] command. The standby command is also used to configure various HSRP elements. This document does not discuss more complex HSRP configurations. For additional information on configuring HSRP, see the refer to the HSRP section of the Cisco IP Configuration Guide publication that corresponds to your Cisco IOS software release. In the following HSRP configuration, standby group 2 on GigabitEthernet port 2/1/0 is configured at a priority of 110 and is also configured to have a preemptive delay should a switchover to this port occur:

Router(config)# interface GigabitEthernet 2/1/0

Router(config-if)# standby 2 ip 120.12.1.200

Router(config-if)# standby 2 priority 110

Router(config-if)# standby 2 preempt

Verifying HSRP

To display HSRP information, use the show standby command in EXEC mode:

Router# show standby
Ethernet0 - Group 0 
Local state is Active, priority 100, may preempt 
Hellotime 3 holdtime 10 
Next hello sent in 0:00:00 
Hot standby IP address is 198.92.72.29 configured 
Active router is local 
Standby router is 198.92.72.21 expires in 0:00:07 
Standby virtual mac address is 0000.0c07.ac00 
Tracking interface states for 2 interfaces, 2 up: 
UpSerial0 
UpSerial1 

Customizing VRRP

Customizing the behavior of VRRP is optional. Be aware that as soon as you enable a VRRP group, that group is operating. It is possible that if you first enable a VRRP group before customizing VRRP, the router could take over control of the group and become the master virtual router before you have finished customizing the feature. Therefore, if you plan to customize VRRP, it is a good idea to do so before enabling VRRP.

To customize your VRRP configuration, use any of the following VRRP commands in interface configuration mode:

 
Command
Purpose

Step 1 

Router(config-if)# vrrp group authentication text text-string

Authenticates VRRP packets received from other routers in the group. If you configure authentication, all routers within the VRRP group must use the same authentication string, where:

group—Virtual router group number for which authentication is being configured. The group number is configured with the vrrp ip command.

text text-string—Authentication string (up to eight alphanumeric characters) used to validate incoming VRRP packets.

Step 2 

Router(config-if)# vrrp group description text

Assigns a text description to the VRRP group, where:

group—Virtual router group number.

text—Text (up to 80 characters) that describes the purpose or use of the group.

Step 3 

Router(config-if)# vrrp group priority level

Sets the priority level of the router within a VRRP group. The default value is 100, where:

group—Virtual router group number.

level —Priority of the router within the VRRP group. The range is from 1 to 254. The default is 100.

Step 4 

Router(config-if)# vrrp group preempt [delay seconds]

Configures the router to take over as master virtual router for a VRRP group if it has a higher priority than the current master virtual router. This command is enabled by default. You can use it to change the delay, where:

group—Virtual router group number of the group for which preemption is being configured. The group number is configured with the vrrp ip command.

delay seconds(Optional) Number of seconds that the router will delay before issuing an advertisement claiming master ownership. The default delay is 0 seconds.

Step 5 

Router(config-if)# vrrp group timers advertise [msec] interval

Configures the interval between successive advertisements by the master virtual router in a VRRP group, where:

group—Virtual router group number to which the command applies.

msec—(Optional) Changes the unit of the advertisement time from seconds to milliseconds. Without this keyword, the advertisement interval is in seconds.

interval—Time interval between successive advertisements by the master virtual router. The unit of the interval is in seconds, unless the msec keyword is specified. The default is 1 second.

Step 6 

Router(config-if)# vrrp group timers learn

Configures the router, when it is acting as backup virtual router for a VRRP group, to learn the advertisement interval used by the master virtual router, where:

group—Virtual router group number to which the command applies.

Enabling VRRP

To enable VRRP on an interface, use the following commands beginning in global configuration mode:

 
Command
Purpose

Step 1 

Router(config)# interface type number

Configures an interface, where:

type—Interface type.

number—Interface number.

Step 2 

Router(config-if)# vrrp group ip ipaddress

Enables VRRP on an interface and identifies the primary IP address of the virtual router, where:

group—Virtual router group number to which the command applies.

ipaddress—IP address of the virtual router.

Step 3 

Router(config-if)# vrrp group ip ipaddress [secondary]

(Optional) Enables VRRP on an interface. After you identify a primary IP address, you can use the vrrp ip command again with the secondary keyword to indicate additional IP addresses supported by this group, where:

group—Virtual router group number to which the command applies.

ipaddress—IP address of the virtual router.

secondary—(Optional) Indicates additional IP addresses supported by this group.

Verifying VRRP

To verify VRRP, use either of the following commands in EXEC mode:

Command
Purpose

Router# show vrrp [brief | group]

Displays a brief or detailed status of one or all VRRP groups on the router, where:

brief—(Optional) Provides a summary view of the group information.

group—(Optional) Virtual router group number of the group for which information is to be displayed. The group number is configured with the vrrp ip command.

Router# show vrrp interface type number [brief]

Displays the VRRP groups and their status on a specified interface, where:

type—Interface type.

number—Interface number.

brief—(Optional) Provides a summary view of the group information.


Modifying the Interface MTU Size

The Cisco IOS software supports three different types of configurable maximum transmission unit (MTU) options at different levels of the protocol stack:

Interface MTU—Checked by the SPA on traffic coming in from the network. Different interface types support different interface MTU sizes and defaults. The interface MTU defines the maximum packet size allowable (in bytes) for an interface before drops occur. If the frame is smaller than the interface MTU size, but is not smaller than the minimum frame size for the interface type (such as 64 bytes for Ethernet), then the frame continues to process.

IP MTU—Can be configured on an interface or subinterface and is used by the Cisco IOS software to determine whether fragmentation of a packet takes place. If an IP packet exceeds the IP MTU size, then the packet is fragmented.

Tag or Multiprotocol Label Switching (MPLS) MTU—Can be configured on an interface or subinterface and allows up to six different labels, or tag headers, to be attached to a packet. The maximum number of labels is dependent on your Cisco IOS software release.

Different encapsulation methods and the number of MPLS MTU labels add additional overhead to a packet. For example, Subnetwork Access Protocol (SNAP) encapsulation adds an 8-byte header, dot1q encapsulation adds a 2-byte header, and each MPLS label adds a 4-byte header (n labels x 4 bytes).

For the Fast Ethernet and Gigabit Ethernet SPAs on the Cisco 7600 series router, the default MTU size is 1500 bytes. When the interface is being used as a Layer 2 port, the maximum configurable MTU is 9216 bytes. The SPA automatically adds an additional 22 bytes to the configured MTU size to accommodate some of the additional overhead.

Interface MTU Configuration Guidelines

When configuring the interface MTU size on a Fast Ethernet and Gigabit Ethernet SPA on a Cisco 7600 series router, consider the following guidelines:

The default interface MTU size accommodates a 1500-byte packet, plus 22 additional bytes to cover the following additional overhead:

Layer 2 header—14 bytes

Dot1q header—4 bytes

CRC—4 bytes


Note Depending on your Cisco IOS software release, a certain maximum number of MPLS labels are supported. If you need to support more than two MPLS labels, then you need to increase the default interface MTU size.


If you are using MPLS, be sure that the mpls mtu command is configured for a value less than or equal to the interface MTU.

If you are using MPLS labels, then you should increase the default interface MTU size to accommodate the number of MPLS labels. Each MPLS label adds 4 bytes of overhead to a packet.

Interface MTU Guidelines for Layer 2 Ports

On Layer 2 ports, it is important to understand the idea of the "jumbo MTU." The "jumbo MTU" can be configured using the system jumbomtu command, although this command is only supported under the following scenarios:

The port is a member of a Layer 2 EtherChannel.

The new MTU size on the Layer 2 port is less than the currently configured maximum MTU for the port.

If neither of the above conditions applies to your configuration, neither does "jumbo MTU."


Note Fast Ethernet SPAs cannot function as Layer 2 ports.


Interface MTU Configuration Task

To modify the MTU size on an interface, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# mtu bytes

Configures the maximum packet size for an interface, where:

bytes—Specifies the maximum number of bytes for a packet.

The default is 1500 bytes and the maximum configurable MTU is 9216 bytes.


To return to the default MTU size, use the no form of the command.

Verifying the MTU Size

To verify the MTU size for an interface, use the show interfaces gigabitethernet privileged EXEC command and observe the value shown in the "MTU" field.

The following example shows an MTU size of 1500 bytes for interface port 1 (the second port) on the Gigabit Ethernet SPA installed in the top subslot (0) of the SIP that is located in slot 2 of the Cisco 7600 series router:

Router# show interfaces gigabitethernet 2/0/1
GigabitEthernet2/0/1 is up, line protocol is up 
  Hardware is GigEther SPA, address is 000a.f330.2e40 (bia 000a.f330.2e40)
  Internet address is 2.2.2.1/24
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, 
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  Keepalive not supported

Configuring the Encapsulation Type

By default, the interfaces on the Fast Ethernet and Gigabit Ethernet SPAs support Advanced Research Projects Agency (ARPA) encapsulation. They do not support configuration of service access point or SNAP encapsulation for transmission of frames; however, the interfaces will properly receive frames that use service access point and SNAP encapsulation.

The only other encapsulation supported by the SPA interfaces is IEEE 802.1Q encapsulation for virtual LANs (VLANs).

Configuring Autonegotiation on an Interface

Fast Ethernet and Gigabit Ethernet interfaces use a connection-setup algorithm called autonegotiation. Autonegotiation allows the local and remote devices to configure compatible settings for communication over the link. Using autonegotiation, each device advertises its transmission capabilities and then agrees upon the settings to be used for the link.

For the Fast Ethernet and Gigabit Ethernet interfaces on the Cisco 7600 series router, flow control is autonegotiated when autonegotiation is enabled. Autonegotiation is enabled by default.

The following guidelines should be followed regarding autonegotiation:

If autonegotiation is disabled on one end of a link, it must be disabled on the other end of the link. If one end of a link has autonegotiation disabled while the other end of the link does not, the link will not come up properly on both ends.

Autonegotiation is not supported on the 10-Port Gigabit Ethernet SPA on the Cisco 7600 SIP-600.

Flow control can be configured separately of autonegotiation when Ethernet SPAs are installed in a Cisco 7600 SIP-600.

Flow control is enabled by default.

Flow control will be on if autonegotiation is disabled on both ends of the link.

Flow control cannot be disabled on a Fast Ethernet SPA.

Disabling Autonegotiation

Autonegotiation is automatically enabled and can be disabled on the Fast Ethernet interfaces on the Cisco 7600 SIP-200, and the Gigabit Ethernet interfaces on the Cisco 7600 SIP-400 or Cisco 7600 SIP-600. During autonegotiation, advertisement for flow control, speed, and duplex occurs. If the Gigabit Ethernet interface is connected to a link that has autonegotiation disabled, autonegotiation should either be re-enabled on the other end of the link or disabled on the Fast Ethernet or Gigabit Ethernet SPA, if possible. Both ends of the link will not come up properly if only one end of the link has disabled autonegotiation.


Note Speed and duplex configurations are negotiated using autonegotiation. However, the only values that are negotiated are 100 Mbps for speed and full-duplex for duplex for Fast Ethernet SPAs, and 1000 Mbps for speed and full-duplex for duplex for Gigabit Ethernet SPAs. Therefore, from a user's perspective, these settings are not negotiated, but enabled using autonegotiation.


To disable autonegotiation on Fast Ethernet or Gigabit Ethernet SPAs, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# no negotiation auto

Disables autonegotiation on a Fast Ethernet SPA interface on the Cisco 7600 SIP-200 or a Gigabit Ethernet SPA interfaces on the Cisco 7600 SIP-400. No advertisement of flow control occurs.

Router(config-if)# speed nonegotiate

Disables autonegotation of speed on Gigabit Ethernet SPA interfaces on the Cisco 7600 SIP-600.


Enabling Autonegotiation

Autonegotiation is automatically enabled and can be disabled unless it is on a SPA installed in a Cisco 7600 SIP-400, or on a 10-Port Gigabit Ethernet SPA, 5-Port Gigabit Ethernet SPA, or a 10-Port Gigabit Ethernet SPA when installed in a Cisco 7600 SIP-600. See the "Configuring Flow Control for an Ethernet SPA Interface on a Cisco 7600 SIP-600" section. To re-enable autonegotiation on a Fast Ethernet or Gigabit Ethernet interface, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# negotiation auto

Enables autonegotiation on a Fast Ethernet SPA interface on a Cisco 7600 SIP-200 or a Gigabit Ethernet SPA interfaces on the Cisco 7600 SIP-400. Advertisement of flow control occurs.

Router(config-if)# no speed nonegotiate

Re-enables autonegotation on Gigabit Ethernet SPA interfaces on the Cisco 7600 SIP-600.


Configuring an Ethernet VLAN

For information on configuring Ethernet VLANs, see the "Creating or Modifying an Ethernet VLAN" section of the "Configuring VLANs" chapter in the Cisco 7600 Series Cisco IOS Software Configuration Guide publication that corresponds to your Cisco IOS software release.

Configuring a Subinterface on a VLAN

You can configure subinterfaces on the Fast Ethernet SPA interfaces and Gigabit Ethernet SPA interfaces on a VLAN using IEEE 802.1Q encapsulation. Cisco Discovery Protocol (CDP) is disabled by default on the 2-Port Gigabit Ethernet SPA interfaces and subinterfaces on the Cisco 7600 SIP-400.

To configure a SPA subinterface on a VLAN, use the following commands beginning in interface configuration mode:


Note On any Cisco 7600 SIP-600 Ethernet port subinterface using VLANs, a unique VLAN ID must be assigned. This VLAN ID cannot be in use by any other interface on the Cisco 7600 series router.


 
Command
Purpose

Step 1 

Router(config)# interface fastethernet slot/subslot/port.subinterface-number

or

Router(config)# interface gigabitethernet slot/subslot/port.subinterface-number

or

Router(config)# interface tengigabitethernet slot/subslot/port.subinterface-number

Specifies the Fast Ethernet, Gigabit Ethernet or Ten Gigabit Ethernet interface to configure, where:

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section.

.subinterface-number—Specifies a secondary interface (subinterface) number.

Step 2 

Router(config-subif)# encapsulation dot1q vlan-id

Defines the encapsulation format as IEEE 802.1Q ("dot1q"), where vlan-id is the number of the VLAN (1-4094).

Step 3 

Router(config-if)# ip address ip-address mask [secondary]

Sets a primary or secondary IP address for an interface, where:

ip-address—Specifies the IP address for the interface.

mask—Specifies the mask for the associated IP subnet.

secondary—(Optional) Specifies that the configured address is a secondary IP address. If this keyword is omitted, the configured address is the primary IP address.

Verifying Subinterface Configuration on a VLAN

To verify the configuration of a subinterface and its status on the VLAN, use the show vlans privileged EXEC command.

The following example shows the status of subinterface number 1 on port 0 on the SPA in VLAN number 200:

Router# show vlans
VLAN ID:200 (IEEE 802.1Q Encapsulation)

Protocols Configured:         Received:       Transmitted:
          IP                  0                  2

VLAN trunk interfaces for VLAN ID 200:

GigabitEthernet4/1/0.1 (200)

      IP:12.200.21.21

      Total 0 packets, 0 bytes input
      Total 2 packets, 120 bytes output

Configuring Layer 2 Switching Features

The Cisco 7600 series router supports simultaneous, parallel connections between Layer 2 Ethernet segments. After you review the SPA-specific guidelines described in this document, refer to the "Configuring Layer 2 Ethernet Interfaces" section of the Cisco 7600 Series Router Cisco IOS Software Configuration Guide for more information about configuring the Layer 2 switching features.

Configuring Multipoint Bridging

Multipoint bridging (MPB) enables the connection of multiple ATM PVCs, Frame Relay PVCs, BCP ports, and WAN Gigabit Ethernet subinterfaces into a single broadcast domain (virtual LAN), together with the LAN ports on that VLAN. This enables service providers to add support for Ethernet-based Layer 2 services to the proven technology of their existing ATM and Frame Relay legacy networks. Customers can then use their current VLAN-based networks over the ATM or Frame Relay cloud. This also allows service providers to gradually update their core networks to the latest Gigabit Ethernet optical technologies, while still supporting their existing customer base.

For MPB configuration guidelines and restrictions and feature compatibility tables, see the "Configuring Multipoint Bridging" section on page 4-23 of Chapter 4, "Configuring the SIPs and SSC."

Configuring the Bridging Control Protocol

The Bridging Control Protocol (BCP) enables forwarding of Ethernet frames over SONET networks and provides a high-speed extension of enterprise LAN backbone traffic through a metropolitan area. The implementation of BCP on the SPAs includes support for IEEE 802.1D, IEEE 802.1Q Virtual LAN (VLAN), and high-speed switched LANs.

For BCP configuration guidelines and restrictions and feature compatibility tables, see the "Configuring PPP Bridging Control Protocol Support" section on page 4-35 of Chapter 4, "Configuring the SIPs and SSC."

Configuring AToM over GRE

MPLS over generic routing encapsulation (MPLSoGRE) encapsulates MPLS packets inside IP tunnels, creating a virtual point-to-point link across non-MPLS networks. This allows users of primarily MPLS networks to continue to use existing non-MPLS legacy networks until migration to MPLS is possible. AToM (any transport over MPLS) over GRE includes support the following transports:

ATM over MPLS

Frame Relay over MPLS (FRoMPLS)

HDLC over MPLS

Scalable Ethernet over MPLS (EoMPLS)

CEoP

Hardware-based EoMPLS

AToMoGRE is supported only on the following hardware:

SIP-400, 5x1 GE SPA, 2x1 GE SPA (Core facing)

ATM SPA (SPA-2xOC3-ATM, SPA-4xOC3-ATM, SPA-1xOC12-ATM, SPA-1xOC48-ATM, CEoPs SPA (such as OC3, 24T1/E1) with IMA support, and all Ethernet interfaces

Sup32, Sup720, RSP720

AToMoGRE supports the following features:

PE-to-PE, P-to-PE, and P-to-P tunneling of MPLS packets (See Figure 15-1, Figure 15-2, and Figure 15-3.)

Figure 15-1 PE-to-PE GRE Tunnel

Figure 15-2 P-to-PE GRE Tunnel

Figure 15-3 P-to-P GRE Tunnel

IPv4 on CE facing interfaces.

IPv4 on core facing interfaces.

GRE 4-byte headers (no option fields).

Nondedicated physical interface supporting both tunneled and non-tunneled traffic.

Multiple routes for the tunnel between the Cisco 7600 SIP-400 physical interface or subinterface and the IP cloud may exist. The routing protocol will pick only one route for MPLSoGRE traffic.

No software-imposed limit on the maximum number of tunnels. The Cisco 7600 SIP-400 supports a maximum number of 128 tunnels. Tunnel traffic can be routed through Cisco 7600 SIP-400 main interfaces or subinterfaces.

The Cisco 7600 SIP-400 physical interface or subinterface used for the tunnel endpoint can be used to carry native MPLS and AToMoMPLS and its variations: Hardware-based EoMPLS, FRoMPLS, PPPoMPLS, HDLCoMPLS, Scalable EoMPLS, and CEoP.

AToMoGRE Configuration Guidelines

The following guidelines apply to AToMoGRE:

Ingress/egress features are not supported on the tunnel interface; they are supported on the physical interface or subinterface.

Unsupported GRE options are: sequencing, checksum, key, source route.

Some Tunnel options not supported: Carry Security Options of Client Packet, Unidirectional Link Routing, Mobile IP Path MTU Discovery.

The Cisco 7600 SIP-400 physical interface or subinterface used for the tunnel endpoint cannot be used to carry Software-based EoMPLS and VPLS. Advanced features such as Carrier Supporting Carrier (CSC) and Inter-Autonomous Systems (Inter-AS) are not supported.

AToM over GRE cannot be combined with the AToM Tunnel Select feature.

Configuring mVPNoGRE

The multicast Virtual Private Network over generic routing encapsulation (mVPNoGRE) provides a mechanism to send unicast and multicast packets across a non-MPLS network. This is accomplished by creating a GRE Tunnel across the non-MPLS network. When MPLS (unicast VRF) or mVPN (multicast VRF) packets are sent across the non-MPLS network, they are encapsulated within a GRE packet and transverse the non-MPLS network through the GRE tunnel. Upon receiving the GRE packet at the other side of the non-MPLS network, it removes the GRE header and forwards the inner MPLS or unicast VRF or mVPN packet to its final destination.


Note For mVPNoGRE, there is one outer packet and two inner packets. The outer packet is unicast GRE. The first inner packet is multicast GRE (mVPN), and the second inner packet is normal (customer) multicast.



Note mVPNoGRE is not supported on Fast Ethernet SPAs on the Cisco 7600 SIP-200.


PE-to-PE Tunneling

mVPNoGRE uses the Provider Edge-to-Provider Edge (PE-to-PE) tunneling variation. mVPNoGRE provides a scalable way to connect multiple customer networks across a non-MPLS network. It does this by multiplexing traffic destined to multiple customer networks through a single GRE tunnel.

On each side of the non-MPLS network, each Customer Edge (CE) router is assigned a VPN Routing and Forwarding (VRF) number by the PE router. The IP networks behind the CE routers are learned by the PE router through a routing protocol such as BGP, OSPF or RIP. Routes to these networks are then stored in the VRF routing table for that CE router.

The PE router on one side of the non-MPLS network is learned by the PE router on the other side of the non-MPLS network though a routing protocol running within the non-MPLS network. Routes between the PE routers are stored in the main or default routing table.

Routes of the customer networks behind the PE router are learned by the other PE router through BGP and are not known to the non-MPLS network. This is accomplished by defining a static route to the BGP neighbor (the other PE router) through a GRE tunnel across the non-MPLS network. When routes are learned from the BGP neighbor, they will have the next-hop of the GRE tunnel and thus all customer network traffic will be sent using the GRE tunnel.

GRE Tunnel Attached to a Cisco 7600 SIP-400 Interface or Subinterface

For the Cisco 7600 series router to perform the MPLS and mVPN processing and have the Cisco 7600 SIP-400 perform the GRE processing, interfaces or subinterfaces must have an IP address. The MPLS and PIM configuration must be on the tunnel interface. The Cisco 7600 series router views the Cisco 7600 SIP-400 main interface or subinterface as an MPLS or PIM interface, so MPLS and mVPN processing is performed, and provides the Cisco 7600 SIP-400 with the correlation information needed to perform GRE processing.

Tunnel Interface Configuration

The ip pim sparse-mode command must be configured on the tunnel interface. It should not be configured on the physical interface or subinterface facing core. It is automatically configured on the Cisco 7600 SIP-400 interface or subinterface when a tunnel is attached to the interface or subinterface. The tunnel source IP address is typically a lookback address.

Displaying Unicast Routes

The display of unicast routes (Main Routing Table) shows the next hop for the BGP neighbor to be the Cisco 7600 SIP-400 interface or subinterface. On a router that natively supports this feature, the next hop for the BGP neighbor is the tunnel interface.

The following example shows the output from the show ip route command:

router# show ip route | inc Tunnel
S       4.4.4.4 is directly connected, Tunnel0
C       1.0.0.0 is directly connected, Tunnel0

Displaying Multicast Routes

The display of multicast routes (groups) shows the output interface for the 239.0.0.0/8 group to be the Cisco 7600 SIP-400 interface or subinterface. On a router that natively supports this feature, the output interface is the tunnel interface.

The following example shows the output from the show ip mroute command:

router# show ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
       L - Local, P - Pruned, R - RP-bit set, F - Register flag,
       T - SPT-bit set, J - Join SPT, M - MSDP created entry,
       X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
       U - URD, I - Received Source Specific Host Report, 
       Z - Multicast Tunnel, z - MDT-data group sender, 
       Y - Joined MDT-data group, y - Sending to MDT-data group
       V - RD & Vector, v - Vector
Outgoing interface flags: H - Hardware switched, A - Assert winner
 Timers: Uptime/Expires
 Interface state: Interface, Next-Hop or VCD, State/Mode

(*, 224.0.1.40), 01:23:02/00:03:22, RP 2.2.2.2, flags: SJCL
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    Tunnel0, Forward/Sparse-Dense, 00:03:45/00:03:22
    Loopback0, Forward/Sparse-Dense, 01:23:02/00:02:30

(*, 239.1.1.2), 01:23:01/00:02:35, RP 2.2.2.2, flags: SJCZ
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    Tunnel0, Forward/Sparse-Dense, 00:03:45/00:02:34
    MVRF vpn1, Forward/Sparse-Dense, 01:23:01/00:02:12

(2.2.2.2, 239.1.1.2), 01:22:50/00:03:29, flags: T
  Incoming interface: Loopback0, RPF nbr 0.0.0.0, RPF-MFD
  Outgoing interface list:
    Tunnel0, Forward/Sparse-Dense, 00:03:45/00:02:54, H

(4.4.4.4, 239.1.1.2), 00:03:33/00:02:59, flags: TZ
  Incoming interface: Tunnel0, RPF nbr 1.0.0.2, RPF-MFD
  Outgoing interface list:
    MVRF vpn1, Forward/Sparse-Dense, 00:03:33/00:02:26, H

(*, 239.1.1.1), 01:23:01/stopped, RP 2.2.2.2, flags: SJCZ
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    MVRF vpn3, Forward/Sparse-Dense, 01:23:01/00:02:11

(2.2.2.2, 239.1.1.1), 01:22:50/00:02:59, flags: PT
  Incoming interface: Loopback0, RPF nbr 0.0.0.0, RPF-MFD
  Outgoing interface list: Null

router# show ip mroute vrf vpn1
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
       L - Local, P - Pruned, R - RP-bit set, F - Register flag,
       T - SPT-bit set, J - Join SPT, M - MSDP created entry,
       X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
       U - URD, I - Received Source Specific Host Report, 
       Z - Multicast Tunnel, z - MDT-data group sender, 
       Y - Joined MDT-data group, y - Sending to MDT-data group
       V - RD & Vector, v - Vector
Outgoing interface flags: H - Hardware switched, A - Assert winner
 Timers: Uptime/Expires
 Interface state: Interface, Next-Hop or VCD, State/Mode

(*, 224.0.1.40), 01:23:11/00:02:24, RP 200.200.200.200, flags: SJCL
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    Loopback200, Forward/Sparse-Dense, 01:23:11/00:02:24
    Tunnel16, Forward/Sparse-Dense, 00:03:40/00:02:32

(*, 224.1.2.3), 00:02:43/stopped, RP 200.200.200.200, flags: S
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    Tunnel16, Forward/Sparse-Dense, 00:02:43/00:02:43

(100.0.1.2, 224.1.2.3), 00:00:17/00:03:20, flags: T
  Incoming interface: GigabitEthernet2/0/0.1, RPF nbr 0.0.0.0, RPF-MFD
  Outgoing interface list:
    Tunnel16, Forward/Sparse-Dense, 00:00:17/00:03:12, H

(*, 224.1.2.2), 00:02:43/stopped, RP 200.200.200.200, flags: S
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    Tunnel16, Forward/Sparse-Dense, 00:02:44/00:02:42

(100.0.1.2, 224.1.2.2), 00:00:18/00:03:20, flags: T
  Incoming interface: GigabitEthernet2/0/0.1, RPF nbr 0.0.0.0, RPF-MFD
  Outgoing interface list:
    Tunnel16, Forward/Sparse-Dense, 00:00:18/00:03:11, H

(*, 224.1.2.1), 00:02:44/stopped, RP 200.200.200.200, flags: S
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    Tunnel16, Forward/Sparse-Dense, 00:02:44/00:02:44

(100.0.1.2, 224.1.2.1), 00:00:19/00:03:19, flags: T
  Incoming interface: GigabitEthernet2/0/0.1, RPF nbr 0.0.0.0, RPF-MFD
  Outgoing interface list:
    Tunnel16, Forward/Sparse-Dense, 00:00:19/00:03:10, H

Displaying Tunnel-to-Interface Mappings

The show cwan mplsogre command displays the tunnel-to-interface mappings. The following example illustrates the output of this new show cwan mplsogre command:

Router# show cwan mplsogre
gigabitethernet 2/0/0
  Tunnel1 is attached
    Interface
      VLAN: 1022, STATE: UP
      IP Address: 6.0.0.1          IP Mask: 255.0.0.0
    Tunnel
      VLAN: 1017, STATE: UP
      IP Address: 8.0.0.1          IP Mask: 255.0.0.0
      Src Address: 6.0.0.1, Dst Address: 7.0.0.1
      Static Routes to Tunnel: 1
        IP Address: 4.0.0.1          IP Mask: 255.255.255.255

Scalable EoMPLS

As of the 12.2(33)SRA release, Scalable EoMPLS now allows a Cisco 7600 SIP-400-based linecard to face the CE. This configuration allows the platform to scale the number of EoMPLS VCs that it can support from 4K to 12K. When AToM xconnect commands are placed on Cisco 7600 SIP-400 subinterfaces, the linecard performs AToM imposition and disposition. Supervisor hardware will perform only MPLS switching on traffic from these interfaces. Additionally, configuring xconnect commands on Cisco 7600 SIP-400 subinterfaces will not consume globally significant VLANs on a per xconnect basis. This change also provides the ability to support FRR on EoMPLS VCs with the same model as other CEF/MFI-based AToM configurations.

To achieve this scalability, Cisco 7600 SIP-400 must be the CE facing linecard as opposed to the current model of a LAN linecard facing the CE. With Cisco 7600 SIP-400 configured for Scalable EoMPLS, any linecard capable of switching MPLS packets may be core facing.

On a Sup720 system, configuring EoMPLS under a non-VLAN interface is considered hardware-based EoMPLS. Configuring EoMPLS on a VLAN interface is considered to be software-based MPLS. Configuring EoMPLS on Cisco 7600 SIP-400 sub-interfaces is considered to be Scalable EoMPLS.

Configuring Flow Control Support on the Link

Flow control is turned on or off based on the result of autonegotiation. Flow control is not supported on the Cisco 7600 SIP-200 and Cisco 7600 SIP-400, so it will always negotiate to off. Flow control can be configured independently of autonegotiation on the Cisco 7600 SIP-600. For information on this process, see the "Configuring Autonegotiation on an Interface" section.

This section discusses the following topics:

Verifying Flow Control Status for an Ethernet SPA Interface on a Cisco 7600 SIP-200

Verifying Flow Control Status for a Gigabit Ethernet SPA Interface on a Cisco 7600 SIP-400

Configuring Flow Control for an Ethernet SPA Interface on a Cisco 7600 SIP-600

Verifying Flow Control Status for an Ethernet SPA Interface on a Cisco 7600 SIP-200

The following example shows how to verify that flow control pause frames are being transmitted and received for a Fast Ethernet SPA on the Cisco 7600 SIP-200.

Router# show hw sub 2 counter mac
	Show counters info for Subslot 2:
	port:0
	good_octets_received: 2046026640038
	bad_octets_received: 0
	good_frames_received: 31969140675
	bad_frames_received: 0
	broadcast_frames_received: 2
	multicast_frames_received: 3562
	good_octets_sent: 1373554315151
	good_frames_sent: 22892514199
	broadcast_frames_sent: 0
	multicast_frames_sent: 0
	mac_transfer_error: 0
	excessive_collision: 0
	unrecog_mac_control_received: 0
	fc_sent: 11232431
	good_fc_received: 0
	rx_over_flow_events: 234082101
	undersize: 0
	fragments: 0
	oversize: 0
	jabber: 0
	mac_rcv_error: 0
	bad_crc: 0
	collisions: 0
	late_collision: 0
	rate_limit_dropped: 0
	tx_fifo_full_packet_drops : 0
	spi4_rx_frames: 2814271686
	spi4_tx_frames: 1328805298

Verifying Flow Control Status for a Gigabit Ethernet SPA Interface on a Cisco 7600 SIP-400

To verify flow control status on a Gigabit Ethernet interface on a SPA, use the show interfaces gigabitethernet privileged EXEC command and view the "output flow-control is" and "input flow-control is" output lines to see if input and output flow control is on or off. The "pause input" and "pause output" counters of the output of this command can be used to view the number of pause frames sent or received by the interface.

The following example shows that zero pause frames have been transmitted and received by the MAC device for interface port 1 (the second port) on the SPA located in subslot 0 of the SIP that is installed in slot 2 of the Cisco 7600 series router:

Router# show interfaces gigabitethernet 2/0/1
GigabitEthernet2/0/1 is up, line protocol is up 
  Hardware is GigEther SPA, address is 000a.f330.2e40 (bia 000a.f330.2e40)
  Internet address is 2.2.2.1/24
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, 
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  Keepalive not supported
  Full-duplex, 1000Mb/s, link type is force-up, media type is SX
 output flow-control is off, input flow-control is off
  ARP type: ARPA, ARP Timeout 04:00:00
  Last input 03:18:49, output 03:18:44, output hang never
  Last clearing of "show interface" counters never
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
  Queueing strategy: fifo
  Output queue: 0/40 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     1703 packets input, 638959 bytes, 0 no buffer
     Received 23 broadcasts (0 IP multicasts)
     0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
     0 watchdog, 1670 multicast, 0 pause input
     1715 packets output, 656528 bytes, 0 underruns
     0 output errors, 0 collisions, 4 interface resets
     0 babbles, 0 late collision, 0 deferred
     0 lost carrier, 0 no carrier, 0 pause output
     0 output buffer failures, 0 output buffers swapped out

Configuring Flow Control for an Ethernet SPA Interface on a Cisco 7600 SIP-600

On the Cisco 7600 SIP-600, flow control can be configured on Ethernet SPA interfaces by entering the flowcontrol send command to configure the interface to transmit pause frames or the flowcontrol receive command to configure the interface to receive pause frames.

Command
Purpose

Router(config-if)# flowcontrol send

Enables transmission of outgoing pause frames. The following options can be configured with this command:

desired—Allows, but does not require, outgoing pause frames to leave the interface.

off—Disables transmission of outgoing pause frames.

on—Enables transmission of outgoing pause frames.

Router(config-if)# flowcontrol receive

Enables the interface to receive incoming pause frames. The following options can be configured with this command:

desired—Allows, but does not require, the interface to receive incoming pause frames.

off—Does not allow incoming pause frames to enter the interface.

on—Allows incoming pause frames to enter the interface.



Note When a user configures flowcontrol for either the transmit or receive direction, it is automatically enabled for both transmit and receive directions simultaneously.

Fast Ethernet SPAs have flow control enabled by default and it cannot be disabled.


Configuring EtherChannels

An EtherChannel bundles individual Ethernet links into a single logical link that provides the aggregate bandwidth of up to eight physical links.


Note EtherChannel is only supported on the 10-Port Gigabit Ethernet SPA and the 1-Port 10-Gigabit Ethernet SPA on the Cisco 7600 SIP-600. EtherChannel is not supported on the 2-Port Gigabit Ethernet SPA on the Cisco 7600 SIP-400 or on a Fast Ethernet SPA on the Cisco 7600 SIP-200.


For additional information on EtherChannels, see the "Configuring EtherChannels" section in the "Configuring Layer 3 and Layer 2 EtherChannel" chapter of the Cisco 7600 Series Router Cisco IOS Software Configuration Guide publication that corresponds to your Cisco IOS software release.

Configuring Virtual Private LAN Service (VPLS) and Hierarchical VPLS

VPLS enables geographically separate LAN segments to be interconnected as a single bridged domain over a packet switched network, such as IP, MPLS or hybrid of both bridging techniques.

VPLS with EoMPLS uses an MPLS-based provider core, where the PE routers have to cooperate to forward customer Ethernet traffic for a given VPLS instance in the core. VPLS uses the provider core to join multiple attachment circuits together to simulate a virtual bridge that connects the multiple attachment circuits together. From a customer point of view, there is no topology for VPLS. All of the CE devices appear to connect to a logical bridge emulated by the provider core.

For VPLS and H-VPLS configuration guidelines and restrictions and feature compatibility tables, see the "Configuring Virtual Private LAN Service" section on page 4-46 of Chapter 4, "Configuring the SIPs and SSC."


Note H-VPLS is not available on Fast Ethernet SPAs.


Configuring Connectivity Fault Management

Ethernet Connectivity Fault Management (CFM) is an end-to-end per-service-instance Ethernet layer operation, administration, and management (OAM) protocol. It includes proactive connectivity monitoring, fault verification, and fault isolation for large Ethernet metropolitan-area and wide-area networks (MANs and WANs). See the Ethernet Connectivity Fault Management document for more information on this feature.

Ethernet CFM Configuration Guidelines

The following apply to the Cisco 7600 SIP-400:

Ethernet SPAs cannot be configured as switchport.

Multiple domains with the same level can be configured, i.e. different domain names at the same maintenance level. Associating a single domain name with multiple maintenance levels is not supported.

The user must first configure the MIP level on an interface before configuring inward MEPs on that interface. The exceptions to this are when configuring inward MEPs of Level 7 or when configuring outward facing MEPs, which are allowed without having to configure any MIPs.

Routed (layer 3) ports may only have outward facing MEPs, no MIPs are allowed. MIP configuration on a routed port will be rejected and an error message will be generated.

Note that all MEPs and MIPs must be removed from a port before MEPs of Level 7 can be configured. Also, when unconfiguring MEPs of Level 7, the user should remove any lower level MEPs first.

Configuring a MEP on an interface with a level higher than the MIP level, will generate an error message.

A single interface may belong to multiple domains, configuring multiple instances of the ethernet cfm mep level for different domains is supported.

A specified domain must be configured or an error message will be displayed.

If an interface is provisioned to be a MIP for a certain Maintenance Level, and MEP is configured for a VLAN on the same Level, an error message will be displayed.

When specifying an outward MEP, the domain-name must be provided. If the specified domain has not been configured or if the specified domain has not been tagged as outward, an error message will be displayed.

If the VLAN for which a MEP is configured gets removed from an interface, the MEP configuration will be removed as well, since the definition of the MEP is tied to the VLAN.

Configuring Maintenance Domains and Maintenance Points

This section describes configuring maintenance domains and maintenance points.

Configuring the Ethernet Domain

Command
Purpose

Router(config)# ethernet cfm domain domain-name level {0 to 7} [direction outward]

Defines a CFM Maintenance Domain at a particular Maintenance Level. It sets the router into config-ether-cfm configuration mode, where parameters specific to the Maintenance Domain can be set.

Direction outward (optional)—Specifies the domain direction. Specifying a domain as outward allows for the creation of multiple outward domains at the same level containing an overlapping set of vlans. The set of vlans in an outward domain can also overlap with inward domains. Note that the set of vlans between inward domains at the same level must still be unique.


Configuring Maintenance Points

To set a port as internal to a maintenance domain, and define it as a Maintenance End Point (MEP), use the following command:

Command
Purpose

Router(config-interface)# ethernet cfm mep level {0 to 7} {inward | outward domain-name} mpid id vlan {,vlan-id | any | vlan-id-vlan-id [vlan-id-vlan-id}

inward—Indicates the direction of the MEP as either inward (towards the bridge) or outward (towards the wire). The default is inward facing.

id—A string of maximum length of 256 characters.

vlan-id—An integer from 1 to 4095.

domain-name—A string of maximum length of 256 characters.

(Optional)—A comma must be entered to separate each VLAN ID range from the next range.


Note Hyphen must be entered to separate the starting and ending VLAN ID values that are used to define a range of VLAN IDs.



\

Verifying Ethernet CFM Configuration

The following commands can be used to verify CFM configuration:

Command
Purpose

Router# show ethernet cfm maintenance-points local [mep | mip] [interface interface-name | domain domain-name | level {0 to 7}]

Displays the local maintenance points configured on the device. Allows filtering of output as follows:

Displays all maintenance points independent of domain or interface.

Displays all maintenance points on a particular interface independent of domain

Displays all maintenance points on a particular interface belonging to a given domain

Displays all maintenance Points belonging to a given Domain independent of interface

The display may also be restricted to either MEPs or MIPs.

domain-name (optional)A string of maximum length of 256 characters.


The show ethernet cfm maintenance-points local displays the local maintenance points configured:

Router# show ethernet cfm maintenance-points local
MPID DomainName           Level Type  VLAN Port       CC-Status MAC
1522 DOMAIN_PROVIDER_L5_1 5     MEP I 2    Et2/0.1    Enabled   aabb.cc00.0100
1502 DOMAIN_PROVIDER_L5_1 5     MEP O 2    Et0/0.1    Enabled   aabb.cc00.0100
1523 DOMAIN_PROVIDER_L5_1 5     MEP O 3    Et2/0.2    Enabled   aabb.cc00.0100
1503 DOMAIN_PROVIDER_L5_1 5     MEP I 3    Et0/0.2    Enabled   aabb.cc00.0100
1302 DOMAIN_OPERATOR_L3_1 3     MEP I 2    Et0/0.1    Enabled   aabb.cc00.0100
1303 DOMAIN_OPERATOR_L3_1 3     MEP I 3    Et0/0.2    Enabled   aabb.cc00.0100

Level Type  Port                      MAC
7     MIP   Et2/0.2                   aabb.cc00.0100
7     MIP   Et2/0.1                   aabb.cc00.0100
7     MIP   Et0/0.2                   aabb.cc00.0100
7     MIP   Et0/0.1                   aabb.cc00.0100

Command
Purpose

Router# ping ethernet <mac-address> {domain domain-name | level {0 to 7}} vlan vlan-id [source mpid]

Sends Ethernet CFM loopback messages to the destination MAC address.

mac-address—MAC Address of remote maintenance point, in the format abcd.abcd.abcd.

vlan-id—An integer from 1 to 4095.

domain-name—A string of maximum. length of 256 characters.


The ping ethernet command shows loopback messages on the destination MAC address:

Router# ping ethernet
Sending 5, 100-byte Ethernet CFM Echoes to <mac-address>, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/4 ms

Configuring Ethernet Operations, Administration, and Maintenance

The Gigabit Ethernet SPAs support Ethernet Operations, Administration, and Maintenance (OAM) as defined by IEEE 802.3ah, Ethernet in the First Mile. IEEE 802.3ah operates on a single point-to-point link between two devices using slow protocol packets called OAM protocol data units (OAMPDUs) that are never forwarded.

IEEE 802.3ah defines five functional areas, of which the Gigabit Ethernet SPAs on the Cisco 7600 series router support the following three:

OAM discovery—Supports identification of OAM support and capabilities on a peer device.

Link monitoring—Provides event notification and link information. It also supports polling and response (but not writing) of the 802.3ah MIB.

Remote failure indication—Supports informing a peer device that the receive path is down. This requires support of unidirectional operation on the link.

Ethernet OAM Configuration Guidelines

When configuring Ethernet OAM on the SPAs, consider the following guidelines:

See Table 15-1 for information about where the OAM features for SPA interfaces are supported.

On Gigabit Ethernet links, the unidirectional fault signaling support in OAM and the autonegotiation capabilities of Gigabit Ethernet (802.3z) are mutually exclusive. You must disable autonegotiation for OAM fault signaling to be sent over unidirectional links.

Ethernet OAM requires point-to-point links where OAMPDUs are created and terminated.

When configuring Ethernet OAM interface modes, consider the following guidelines:

At least one of the peer interfaces must be in active mode.

The peer interfaces either can be both in active mode, or one can be in active mode and the other in passive mode.

You can change Ethernet OAM modes without disabling OAM.

When using templates to configure Ethernet OAM interfaces, consider the following guidelines:

If you use a template to configure common or global OAM characteristics and apply it an interface, you can override any of the configuration statements in the template by configuring the same command at the interface with a different value.

You can define multiple templates to create different sets of link monitoring characteristics.

You can only apply one template to any single Ethernet OAM interface.

Table 15-1 provides information about where the OAM features for SPA interfaces are supported.

Table 15-1 Ethernet OAM Feature Compatibility by SIP and SPA Combination

Feature
Cisco 7600 SIP-200
Cisco 7600 SIP-400
Cisco 7600 SIP-600

OAM discovery

Link monitoring

Remote failure indication (Dying Gasp only)

Not supported.

In Cisco IOS Release 12.2(33)SRA:

2-Port Gigabit Ethernet SPA

In Cisco IOS Release 12.2(33)SRA:

1-Port 10-Gigabit Ethernet SPA

5-Port Gigabit Ethernet SPA

10-Port Gigabit Ethernet SPA

Remote loopback

Not supported.

Not supported.

Not supported.

MIB variable retrieval

Not supported.

Not supported.

Not supported.


Ethernet OAM Configuration Tasks

The following sections describe the Ethernet OAM configuration tasks:

Enabling OAM on an Interface (required)

Enabling and Disabling a Link Monitoring Session (optional)

Starting and Stopping Link Monitoring Operation (optional)

Configuring Link Monitoring Options (optional)

Configuring Remote Failure Indication Actions (optional)

Configuring Global Ethernet OAM Options Using a Template (optional)

Enabling OAM on an Interface

OAM is disabled on an interface by default. When you enable OAM on an interface, the interface automatically advertises to the remote peer that it supports link monitoring during OAM discovery. Link monitoring support must be agreed upon by the peer interfaces for monitoring to operate across the link.

Once link monitoring support is achieved between the peer interfaces, the interface will start the link monitoring operation, and send event OAMPDUs when errors occur locally, and interpret event OAM PDUs received by the remote peer.

You do not need to explicitly configure link monitoring support, or start the link monitoring operation on the link unless you have previously disabled monitoring support or operation on the interface.

To enable OAM features on a Gigabit Ethernet interface, use the following commands beginning in global configuration mode:

 
Command
Purpose

Step 1 

Router(config)# interface type slot/subslot/port

Specifies the Ethernet SPA interface, where

type—Specifies the type of Ethernet interface, such as gigabitethernet or tengigabitethernet.

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section.

Note Ethernet OAM can be defined on a main Gigabit Ethernet interface only—not on subinterfaces.

Step 2 

Router(config-if)# ethernet oam [max-rate oampdus | min-rate num-seconds | mode {active | passive} | timeout seconds]

Enables OAM on a Gigabit Ethernet interface, where:

max-rate oampdus—(Optional) Specifies the maximum number of OAMPDUs that can be sent per second as an integer in the range of 1 to 10. The default is 10.

min-rate num-seconds—(Optional) Specifies the number of seconds (in the range 1-10) during which at least one OAMPDU must be sent. The default is 1 second.

mode {active | passive}—(Optional) Specifies the client mode for OAM discovery and link negotiation, where:

active— Specifies that the interface initiates OAMPDUs for protocol negotiation as soon as the interface becomes active. This is the default. At least one of the OAM peers must be configured in active mode.

passive—Specifies that the interface waits in a listening mode to receive an incoming OAMPDU for protocol negotiation from a peer. The passive interface begins sending OAMPDUs once it receives OAMPDUs from the peer.

   

Note If you configure an interface in passive mode, then you must be sure that the peer is in active mode for successful OAM operation.

timeout seconds—Specifies the amount of time, in seconds (in the range 2-30), after which a device declares its OAM peer to be nonoperational and resets its state machine. The default is 5 seconds.

Enabling and Disabling a Link Monitoring Session

The OAM peer interfaces must establish a link monitoring session before the actual operation of link monitoring can begin. If you have enabled OAM on the interface, and have not explicitly disabled link monitoring support on the interface, then you do not need to explicitly configure link monitoring support on the interface to establish a session.

The ethernet oam link-monitor supported command automatically runs in the background when you configure the ethernet oam interface configuration command. Be sure that at least one of the Ethernet OAM peers is configured for active mode so that a session can be established.

To explicitly configure and enable a link monitoring session on an interface, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor supported

Enables link monitoring support on an Ethernet OAM interface.


To disable a link monitoring session on an interface, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# no ethernet oam link-monitor supported

Disables link monitoring support on an Ethernet OAM interface.


Starting and Stopping Link Monitoring Operation

If a link monitoring session is established among the Ethernet OAM peer interfaces, then sending and receiving of Event Notification OAMPDUs can begin between the peers. This link monitoring operation across the link automatically starts when you enable OAM on the interface.

The ethernet oam link-monitor on command automatically runs in the background when you configure the ethernet oam interface configuration command.

You can stop and restart the operation of link monitoring (or, the sending and receiving of Event Notification OAMPDUs on a link). Stopping link monitoring operation is not the same thing as disabling link monitoring support. When you stop link monitoring operation, the interface is still configured to support link monitoring with its peer, but just is not actively sending and receiving Event Notification OAMPDUs.

To explicitly configure and start link monitoring operation on an interface, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor on

Starts link monitoring on an Ethernet OAM interface.


To stop link monitoring operation on an interface, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# no ethernet oam link-monitor on

Stops link monitoring on an Ethernet OAM interface.


Configuring Link Monitoring Options

When OAM link monitoring is active, Event Notification OAMPDUs are sent to a remote OAM client when errors are detected locally. You can configure certain windows and thresholds to define when these error event notifications are triggered. If you do not modify the link monitoring options, default values are used for the window periods and low thresholds.

The Gigabit Ethernet SPAs support the following types of error events as defined by IEEE 802.3ah:

Errored Symbol Period (errored symbols per second)—This event occurs when the number of symbol errors during a specified period exceeds a threshold. These are coding symbol errors (for example, a violation of 4B/5B coding).

Errored Frame (errored frames per second)—This event occurs when the number of frame errors during a specified period exceeds a threshold.

Errored Frame Period (errored frames per N frames)—This event occurs when the number of frame errors within the last N frames exceeds a threshold.

Errored Frame Seconds Summary (errored seconds per M seconds)—This event occurs when the number of errored seconds (one second intervals with at least one frame error) within the last M seconds exceeds a threshold.

Cisco Systems adds the following types of vendor-specific error events:

Receive CRC (errored frames per second)—This event occurs when the number of frames received with CRC errors during a specified period exceeds a threshold.

Transmit CRC (errored frames per second)—This event occurs when the number of frames transmitted with CRC errors during a specified period exceeds a threshold.

The link monitoring options can be configured in a global template that can be applied to one or more interfaces, and also can be explicitly configured at the interface.

Specifying Errored Symbol Period Link Monitoring Options

The errored symbol period link monitoring options include the ability to specify the number of symbols to be tracked or counted for errors, and the high and low thresholds for triggering the Errored Symbol Period Link Event.

To specify errored symbol period link monitoring options, use the following commands in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor symbol-period window million-symbol-units

(Optional) Specifies the number of symbols (in the range 1-65535, as a multiple of 1 million symbols) to be included in the error counting according to the specified thresholds. The default window unit is 100, or 100 million symbols.

Router(config-if)# ethernet oam link-monitor symbol-period threshold low low-symbols

(Optional) Specifies the low errored symbol threshold as a number of symbol errors (in the range 0-65535). If the number of error symbols in the window period is equal to or greater than low-symbols, then the Errored Symbol Period Link Event will be generated. The default low threshold is 0 symbols.

Router(config-if)# ethernet oam link-monitor symbol-period threshold high {none | high-symbols}

(Optional) Specifies the high errored symbol threshold as a number of error symbols (in the range 1-65535). If the number of error symbols in the window period is equal to or greater than high-symbols, then a user defined action will be triggered. There is no default for the high threshold, so you must explicitly configure a value to enable it.

For more information about configuring a user-defined action, see "Specifying a High Threshold Action" section.


Specifying Errored Frame Link Monitoring Options

The errored frame link monitoring options include the ability to specify a period of time during which frame errors are tracked or counted, and the high and low thresholds for triggering the Errored Frame Link Event. The Gigabit Ethernet SPAs on the Cisco 7600 series router count general frame errors, such as CRC errors and corrupted packets, as errored frames.

To specify errored frame link monitoring options, use the following commands in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor frame threshold low low-frames

(Optional) Specifies the low error frame threshold as a number of frames (in the range 0-65535). If the number of error frames in the window period is equal to or greater than low-frames, then the Errored Frame Link Event will be generated. The default low threshold is 0 frame errors.

Router(config-if)# ethernet oam link-monitor frame threshold high {none | high-frames}

(Optional) Specifies the high error frame threshold as a number of error frames (in the range 1-65535). If the number of error frames in the window period is equal to or greater than high-frames, then a user defined action will be triggered. There is no default for the high threshold, so you must explicitly configure a value to enable it.

Use the none keyword to disable the high threshold.

For more information about configuring a user-defined action, see "Specifying a High Threshold Action" section.


Specifying Errored Frame Period Link Monitoring Options

The errored frame period link monitoring options include the ability to specify the number of error frames to be tracked or counted for errors, and the high and low thresholds for triggering the Errored Frame Period Link Event. The Gigabit Ethernet SPAs on the Cisco 7600 series router count general frame errors, such as CRC errors and corrupted packets, as errored frames.

To specify errored frame period link monitoring options, use the following commands in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor frame-period threshold low low-frames

(Optional) Specifies the low error frame threshold as a number of frames (in the range 0-65535). If the number of error frames in the window period is equal to or greater than low-frames, then the Errored Frame Period Link Event will be generated. The default low threshold is 0 frame errors.

Router(config-if)# ethernet oam link-monitor frame-period threshold high {none | high-frames}

(Optional) Specifies the high error frame threshold as a number of frames (in the range 1-65535). If the number of error frames in the window period is equal to or greater than high-frames, a user defined action will be triggered. There is no default for the high threshold, so you must explicitly configure a value to enable it.

Use the none keyword to disable the high threshold.

For more information about configuring a user-defined action, see "Specifying a High Threshold Action" section.


Specifying Errored Frame Seconds Summary Link Monitoring Options

The errored frame seconds summary link monitoring options include the ability to specify a period of time during which tracking of a number of errored-seconds periods (one-second intervals with at least one frame error) occurs, and the high and low thresholds for triggering the Errored Frames Seconds Summary Link Event.

To specify errored frame seconds summary link monitoring options, use the following commands in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor frame-seconds window 100-millisecond-units

(Optional) Specifies a period of time (in the range 100-9000, as a multiple of 100 milliseconds) during which tracking of an errored-seconds period occurs according to the specified thresholds. The default window unit is 100, or 10000 milliseconds.

Router(config-if)# ethernet oam link-monitor frame-seconds threshold low low-errored-seconds

(Optional) Specifies the low errored seconds threshold as a number of errored seconds (in the range 0-900). If the number of errored seconds in the window period is equal to or greater than low-errored-seconds, then the Errored Frame Seconds Summary Link Event will be generated. The default low threshold is 0 error seconds.

Router(config-if)# ethernet oam link-monitor frame-seconds threshold high {none | high-errored-seconds}

(Optional) Specifies the high errored seconds threshold as a number of errored seconds (in the range 1-900). If the number of errored seconds in the window period is equal to or greater than high-errored-seconds, then a user defined action will be triggered. There is no default for the high threshold, so you must explicitly configure a value to enable it.

Use the none keyword to disable the high threshold.

For more information about configuring a user-defined action, see "Specifying a High Threshold Action" section.


Specifying Receive CRC Link Monitoring Options

The receive CRC link monitoring options include the ability to specify a period of time during which tracking of frames received with CRC occurs, and the high and low thresholds for triggering the error. Receive CRC link monitoring is a Cisco-specific implementation and is only locally significant to the Ethernet OAM interface on the Cisco 7600 series router.

To specify receive CRC link monitoring options, use the following commands in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor receive-crc window 100-millisecond-units

(Optional) Specifies a period of time (in the range 10-1800, as a multiple of 100 milliseconds) during which tracking of frames received with CRC errors occurs according to the specified thresholds. The default window unit is 10, or 1000 milliseconds.

Router(config-if)# ethernet oam link-monitor receive-crc threshold low low-frames

(Optional) Specifies the low CRC threshold as a number of frames (in the range 0-65535). If the number of frames received with CRC errors in the window period is equal to or greater than low-frames, then the Receive CRC error will be generated. The default low threshold is 1 frame.

Router(config-if)# ethernet oam link-monitor receive-crc threshold high {none | high-frames}

(Optional) Specifies the high CRC threshold as a number of frames (in the range 1-65535). If the number of frames received with CRC errors in the window period is equal to or greater than high-frames, a user defined action will be triggered. There is no default for the high threshold, so you must explicitly configure a value to enable it.

Use the none keyword to disable the high threshold.

For more information about configuring a user-defined action, see "Specifying a High Threshold Action" section.


Specifying Transmit CRC Link Monitoring Options

The transmit CRC link monitoring options include the ability to specify a period of time during which tracking of frames transmitted with CRC occurs, and the high and low thresholds for triggering the error. Transmit CRC link monitoring is a Cisco-specific error event and is only locally significant to the Ethernet OAM interface on the Cisco 7600 series router.

To specify transmit CRC link monitoring options, use the following commands in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor transmit-crc window 100-millisecond-units

(Optional) Specifies a period of time (in the range 10-1800, as a multiple of 100 milliseconds) during which tracking of frames received with CRC errors occurs according to the specified thresholds. The default window unit is 10, or 1000 milliseconds.

Router(config-if)# ethernet oam link-monitor transmit-crc threshold low low-frames

(Optional) Specifies the low CRC threshold as a number of frames (in the range 0-65535). If the number of frames transmitted with CRC errors in the window period is equal to or greater than low-frames, then the Receive CRC error will be generated. The default low threshold is 1 frame.

Router(config-if)# ethernet oam link-monitor transmit-crc threshold high {none | high-frames}

(Optional) Specifies the high CRC threshold as a number of frames (in the range 1-65535). If the number of frames transmitted with CRC errors in the window period is equal to or greater than high-frames, a user defined action will be triggered. There is no default for the high threshold, so you must explicitly configure a value to enable it.

Use the none keyword to disable the high threshold.

For more information about configuring a user-defined action, see "Specifying a High Threshold Action" section.


Specifying a High Threshold Action

When you configure high thresholds for OAM link monitoring, you can specify an action to be taken when the high threshold is exceeded.

When configuring high threshold actions, consider the following guidelines:

There is no default action.

If you configure a high threshold but do not configure any corresponding action, only a message appears on the syslog and no other action is taken on the interface.

If you want to associate different high threshold actions for different kinds of link monitoring functions, you can use configuration templates. However, only one configuration template can be applied to any Ethernet OAM interface.

Only one high threshold action can be configured for any Ethernet OAM interface.

To configure an action when a high threshold for an error is exceeded on an Ethernet OAM interface, use the following command in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam link-monitor high-threshold action {error-disable-interface | failover}

(Optional) Configures the action when a high threshold error is exceeded, where:

error-disable-interface—Shuts down the Ethernet OAM interface.

failover—(EtherChannel interface only) Configures the interface for an automatic failover of traffic from one port in an EtherChannel to another port in the same EtherChannel when one of the ports in the channel exceeds the high error threshold within the specified interval. The port failover only occurs if there is at least one operational port available in the EtherChannel.

The failed port will be put into an error disable state. If the failed port is the last port in the EtherChannel, the port will not be put into an error disable state and continues to pass traffic regardless of the type of errors being received. Single, nonchanneling ports go into the error disable state when the error threshold is exceeded within the specified interval.


Configuring Remote Failure Indication Actions

When an RFI event occurs locally, the local client sends an Information OAMPDU to its peer with a bit selected that indicates the type of failure. The Gigabit Ethernet SPAs on the Cisco 7600 series router process all of the following types of Remote Failure Indication (RFI) conditions as defined by IEEE 802.3ah:

Critical Event—This type of RFI is sent when an unspecified critical event has occurred. These events are vendor specific, and the failure indication might be sent immediately and continuously.

Dying Gasp—This type of RFI is sent when an unrecoverable condition (for example, a power failure) has occurred. The conditions for a dying gasp RFI are vendor specific, and the failure indication might be sent immediately and continuously. The Gigabit Ethernet SPAs on the Cisco 7600 series router generate a Dying Gasp RFI when an interface is error-disabled or administratively shut down. This is the only type of RFI that the Gigabit Ethernet SPAs on the Cisco 7600 series router generate.

Link Fault—This type of RFI is sent when a loss of signal is detected by the receiver (for example, a peer's laser is malfunctioning). A link fault is sent once per second in the Information OAMPDU. The link fault RFI applies only when the physical sublayer is capable of independent transmit and receive.

When the Gigabit Ethernet SPAs receive an OAMPDU with an RFI bit selected, a syslog message is created providing the failure reason, as shown in the following example:

%ETHERNET_OAM-SP-6-RFI: The client on interface Gi1/1 has received a remote failure 
indication from its remote peer (failure reason = remote client administratively turned 
off)

You can configure a response, or action, by the local client to shut down the OAM interface when it receives Information OAMPDUs with a Dying Gasp RFI bit selected.

To configure an error disable action for the local Ethernet OAM interface, use the following command in interface configuration or template configuration mode:

Command
Purpose

Router(config-if)# ethernet oam remote-failure dying-gasp action error-disable-interface

(Optional) Specifies that the local Ethernet OAM interface is shut down upon receipt of an Information OAMPDU from its peer that indicates a Dying Gasp.


Configuring Global Ethernet OAM Options Using a Template

Create configuration templates when you have a common set of link-monitoring or remote-failure characteristics that you want to apply to multiple Ethernet OAM interfaces. This streamlines Ethernet OAM interface configuration.

Although you can configure multiple configuration templates, only one template can be associated with any single Ethernet OAM interface. You can override any commands defined within a template by explicitly configuring the same command (that is predefined by the template) in interface configuration mode.

To configure global Ethernet OAM interface options using a template, use the following command beginning in global configuration mode:

 
Command
Purpose

Step 2 

Router(config-template)# ethernet oam link-monitor command

or

Router(config-template)# ethernet oam remote-failure command

Specify one or more ethernet oam configuration commands. Repeat this step for the number of commands that you want to configure. For information about link monitoring commands, see the "Configuring Link Monitoring Options" section.

Step 3 

Router(config-template)# exit

Exit template configuration mode and return to global configuration mode.

Step 4 

Router(config)# interface type slot/subslot/port

Specifies the Ethernet SPA interface, where

type—Specifies the type of Ethernet interface, such as gigabitethernet or tengigabitethernet.

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section.

Note Ethernet OAM only can be defined on a main Gigabit Ethernet interface—not on subinterfaces.

Step 5 

Router(config-if)# source template template-name

Attaches the template called template-name and applies the set of configuration commands defined by the named template to the specified interface.

Verifying Ethernet OAM Configuration

To verify the Ethernet OAM configuration, use the following commands in privileged EXEC configuration mode:

Command
Purpose

Router# show ethernet oam discovery [interface type slot/subslot/port]

Displays information about OAM functions negotiated during the OAM discovery phase of establishing an OAM session, where:

type—Specifies the type of Ethernet interface, such as gigabitethernet or tengigabitethernet.

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section.

Router# show ethernet oam statistics [interface type slot/subslot/port]

Displays statistics for information OAMPDUs and local and remote faults, where:

type—Specifies the type of Ethernet interface, such as gigabitethernet or tengigabitethernet.

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section

Router# show ethernet oam status [interface type slot/subslot/port]

Displays information about link monitoring configuration and status on the local OAM client, where:

type—Specifies the type of Ethernet interface, such as gigabitethernet or tengigabitethernet.

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section

Router# show ethernet oam summary

Displays information about the OAM session with the remote OAM client, where:

type—Specifies the type of Ethernet interface, such as gigabitethernet or tengigabitethernet.

slot/subslot/port—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section


This section includes the following topics:

Verifying an OAM Session

Verifying OAM Discovery Status

Verifying Information OAMPDU and Fault Statistics

Verifying Link Monitoring Configuration and Status

Verifying an OAM Session

To verify an OAM session, use the show ethernet oam summary command.

The following example shows that the local OAM client is established on the second Gigabit Ethernet SPA interface (1) located in subslot 1 of the SIP installed in chassis slot 6 of the Cisco 7600 series router (Gi6/1/1).

The local client interface is in session with a remote client with MAC address 0012.7fa6.a700 and organizationally unique identifier (OUI) 00000C, which is the OUI for Cisco Systems. The remote client is in active mode, and has established capabilities for link monitoring and remote loopback for the OAM session.

Router# show ethernet oam summary
Symbols:          * - Master Loopback State,  # - Slave Loopback State
Capability codes: L - Link Monitor,  R - Remote Loopback
                  U - Unidirection,  V - Variable Retrieval

  Local                       Remote
Interface       MAC Address    OUI    Mode    Capability

  Gi6/1/1       0012.7fa6.a700 00000C active   L R 

Verifying OAM Discovery Status

To verify OAM Discovery status on the local client and remote peer, use the show ethernet oam discovery command as shown in the following example:

Router# show ethernet oam discovery interface gigabitethernet6/1/1

GigabitEthernet6/1/1
Local client
------------
  Administrative configurations:
    Mode:              active
    Unidirection:      not supported
    Link monitor:      supported (on)
    Remote loopback:   not supported
    MIB retrieval:     not supported
    Mtu size:          1500

  Operational status:
Port status:       operational
    Loopback status:   no loopback
    PDU permission:    any
    PDU revision:      1

Remote client
-------------
  MAC address: 0030.96fd.6bfa
  Vendor(oui): 0x00 0x00 0x0C (cisco)

  Administrative configurations:
    Mode:              active
    Unidirection:      not supported
    Link monitor:      supported
    Remote loopback:   not supported
    MIB retrieval:     not supported
    Mtu size:          1500

Verifying Information OAMPDU and Fault Statistics

To verify statistics for information OAMPDUs and local and remote faults, use the show ethernet oam statistics command as shown in the following example:

Router# show ethernet oam statistics interface gigabitethernet6/1/1

GigabitEthernet6/1/1
Counters:
---------
Information OAMPDU Tx                   : 588806
  Information OAMPDU Rx                   : 988
  Unique Event Notification OAMPDU Tx     : 0
  Unique Event Notification OAMPDU Rx     : 0
  Duplicate Event Notification OAMPDU TX  : 0
  Duplicate Event Notification OAMPDU RX  : 0
  Loopback Control OAMPDU Tx              : 1
  Loopback Control OAMPDU Rx              : 0
  Variable Request OAMPDU Tx              : 0
  Variable Request OAMPDU Rx              : 0
  Variable Response OAMPDU Tx             : 0
  Variable Response OAMPDU Rx             : 0
  Cisco OAMPDU Tx                         : 4
  Cisco OAMPDU Rx                         : 0
  Unsupported OAMPDU Tx                   : 0
  Unsupported OAMPDU Rx                   : 0
  Frames Lost due to OAM                  : 0

Local Faults:
-------------
  0 Link Fault records
  2 Dying Gasp records
    Total dying gasps       : 4
    Time stamp              : 00:30:39

    Total dying gasps       : 3
    Time stamp              : 00:32:39

  0 Critical Event records

Remote Faults:
--------------
  0 Link Fault records
  0 Dying Gasp records
  0 Critical Event records

Local event logs:
-----------------
  0 Errored Symbol Period records
  0 Errored Frame records
  0 Errored Frame Period records
  0 Errored Frame Second records

Remote event logs:
------------------
  0 Errored Symbol Period records
  0 Errored Frame records
  0 Errored Frame Period records
  0 Errored Frame Second records

Verifying Link Monitoring Configuration and Status

To verify link monitoring configuration and status on the local client, use the show ethernet oam status command. The highlighted "Status" field in the following example shows that link monitoring status is supported and enabled (on).

Router# show ethernet oam status interface gigabitethernet6/1/1

GigabitEthernet6/1/1
General
-------
  Mode:                  active
  PDU max rate:          10 packets per second
  PDU min rate:          1 packet per 1 second
  Link timeout:          5 seconds
  High threshold action: no action

Link Monitoring
---------------
  Status: supported (on)

  Symbol Period Error
    Window:              1 million symbols
    Low threshold:       1 error symbol(s)
    High threshold:      none

  Frame Error
    Window:              10 x 100 milliseconds
    Low threshold:       1 error frame(s)
    High threshold:      none
Frame Period Error
    Window:              1 x 100,000 frames
    Low threshold:       1 error frame(s)
    High threshold:      none

  Frame Seconds Error
    Window:              600 x 100 milliseconds
    Low threshold:       1 error second(s)
    High threshold:      none

Verifying Status of the Remote OAM Client

To verify the status of a remote OAM client, use the show ethernet oam summary and show ethernet oam status commands.

To verify the remote client mode and capabilities for the OAM session, use the show ethernet oam summary command and observe the values in the Mode and Capability fields. The following example shows that the local client (local interface Gi6/1/1) is connected to the remote client

Router# show ethernet oam summary
Symbols:          * - Master Loopback State,  # - Slave Loopback State
Capability codes: L - Link Monitor,  R - Remote Loopback
                  U - Unidirection,  V - Variable Retrieval

  Local                       Remote
Interface       MAC Address    OUI    Mode    Capability

  Gi6/1/1       0012.7fa6.a700 00000C active   L R 

Configuring IP Subscriber Awareness over Ethernet

Container interfaces are used to apply hardware specific features like Security ACL and PBR which then can be inherited to all IP session interfaces attached to a container interface.

To form the association between a container interface and an IP session interface/subinterface, use the container command under IP session interfaces/subinterfaces.

It is required to configure the VRF (not required in the case of global VRF) on the container and the subinterface in order to make an association between them using the container command.

 
Command
Purpose

Step 1 

Router(config)# interface gigabitethernet slot/subslot/port.subinterface-number access

Specifies the GigabitEthernet interface to configure, where:

slot/subslot—Specifies the location of the interface. See the "Specifying the Interface Address on a SPA" section.

port.subinterface-number—Specifies a secondary interface (subinterface) number.

access—Indentifies the subscriber in the access-side network on subinterfaces.

Step 2 

Router(config)# ip vrf forwarding vrf-name

Defines the VRF.

Step 3 

Router(config-subif)# container container number

Defines the virtual interface and that would be allocated as the internal VLAN which would be shared by all the IP session interfaces which are tied with the container interface.

Step 4 

Router(config-subif)# encapsulation dot1q vlan-id

Defines the encapsulation format as IEEE 802.1Q ("dot1q"), where vlan-id is the number of the VLAN (1-4095).

IP Subscriber Awareness over Ethernet Restrictions

There are restrictions being imposed because the internal VLAN is shared by multiple subinterfaces: The restrictions are as follows:

IP Subscriber awareness over Ethernet is only supported on a Cisco 7600 SIP-400.

Security ACL will not be supported on per IP subscriber interface basis. However, security ACL feature will be supported on a per group basis.

Only single route-map policy can be applied on all sub-interfaces which are sharing the Internal VLAN. If route-map is defined based on source IP address then source IP address range should be easily definable and should not cause a configuration bloat.

uRPF check can be done only on an internal VLAN level which is shared by subinterfaces and not at subinterface level. Because of this restriction, a subscriber sharing the same internal VLAN may be able to spoof the IP address of some other subscribers.

IPv4 multicast is not supported on IP session interfaces. IPv4 multicast does not have any functionality on a per group basis as replication is always required on a interface basis and not on a group basis.

There are also some configuration restrictions for link redundancy:

There is no mechanism to synchronize the route installed by the DHCP to multiple routers; it will be difficult to use IP unnumbered' on and IP session interface. Instead, numbered IP addresses will be used on IP session interface and DHCP will assign IP addresses to the subscriber from the same subnet assigned to IP session interface.

It is required to configure the HSRP group for each IP session interface so the Cisco 7600 series router can scale to a 16K HSRP group.

Configuring a Backup Interface for Flexible UNI

The Backup Interface for Flexible UNI feature allows you to configure redundant user-to-network interface (UNI) connections for Ethernet interfaces, which provides redundancy for dual-homed devices.

You can configure redundant (flexible) UNIs on a network provider-edge (N-PE) device in order to supply flexible services through redundant user provider-edge (U-PE) devices. The UNIs on the N-PEs are designated as primary and backup and have identical configurations. If the primary interface fails, the service is automatically transferred to the backup interface.

Figure 15-4 shows an example of how Flexible UNIs can be used when the Cisco 7600 series router is configured as a dual-homed N-PE (NPE1) and as a dual-homed U-PE (UPE2).

Figure 15-4 Backup Interface for Dual-Homed Devices


Note The configurations on the primary and backup interfaces must be identical.


The primary interface is the interface for which you configure a backup. During operation, the primary interface is active and the backup (secondary) interface operates in standby mode. If the primary interface goes down (due to loss of signal), the router begins using the backup interface.

While the primary interface is active (up) the backup interface is in standby mode. If the primary interface goes down, the backup interface transitions to the up state and the router begins using it in place of the primary. When the primary interface comes back up, the backup interface transitions back to standby mode. While in standby mode, the backup interface is effectively down and the router does not monitor its state or gather statistics for it.

This feature provides the following benefits:

Supports the following Ethernet virtual circuit (EVC) features:

Frame matching: EVC with any supported encapsulation (Dot1q, default, untagged)

Frame rewrite: Any supported (ingress and egress with push, pop, and translate)

Frame forwarding: MultiPoint Bridging over Ethernet (MPB-E), xconnect, connect

Quality of Service (QoS) on EVC

Supports Layer 3 (L3) termination and L3 Virtual Routing and Forwarding (VRF)

Supports several types of uplinks: MultiProtocol Label Switching (MPLS), Virtual Private LAN Service (VPLS), and switchports

The Backup Interface for Flexible UNI feature makes use of these Ethernet components:

Ethernet virtual circuit (EVC)—An association between two or more UNIs that identifies a point-to-point or point-to-multipoint path within the provider network. For more information about EVCs, see the description of "Flexible QinQ Mapping and Service Awareness" at the following URL:

http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_chapter09186a00807f3f97.html#wp1433597

Ethernet flow point (EFP)—The logical demarcation point of an EVC on an interface. An EVC that uses two or more UNIs requires an EFP on the associated ingress interface and egress interface of every device that the EVC passes through.

Configuration Guidelines

Observe these guidelines as you configure a backup interface for Flexible UNI on the router:

Hardware and software support:

Supported on the Cisco 7600-ES20-2x10G and 7600-ES20-20x1G line cards.

Supported on the Cisco 7600 SIP-400 with Gigabit Ethernet SPAs. In an EVC configuration, version 2 SPAs are required. For IP termination, the SPAs can be version 1 or version 2.

Supported with the Route Switch Processor 720, Supervisor Engine 720, and Supervisor Engine 32.

Requires Cisco IOS Release 12.2SRB1 or later.

You can use the same IP address on both the primary and secondary interfaces. This enables the interface to support L3 termination (single or double tagged).

The configurations on the primary and backup interfaces must match. The router does not check that the configurations match; however, the feature does not work if the configurations are not the same.


Note If the configuration includes the xconnect command, you must specify a different VCID on the primary and backup interfaces.


The duplicate resources needed for the primary and secondary interfaces are taken from the total resources available on the router and thus affect available resources. For example, each xconnect consumes resources on both the primary and backup interfaces.

Local switching (connect) between primary and backup interfaces uses twice the number of physical interfaces. This limitation is due to lack of support for local switching on EVCs on the same interface.

Any features configured on the primary and backup interfaces (such as bridge-domain, xconnect, and connect) transition up or down as the interface itself transitions between states.

Switchover time between primary and backup interfaces is best effort. The time it takes the backup interface to transition from standby to active mode depends on the link-state detection time and the amount of time needed for EVCs and their features to transition to the up state.

Configuration changes and administrative actions made on the primary interface are automatically reflected on the backup interface.

The router monitors and gathers statistics for the active interface only, not the backup. During normal operation, the primary interface is active; however, if the primary goes down, the backup becomes active and the router begins monitoring and gathering statistics for it.

When the primary interface comes back up, the backup interface always transitions back to standby mode. Once the signal is restored on the primary interface, there is no way to prevent the interface from being restored as the primary.

Configuration Instructions

To configure a backup interface for a flexible UNI on an Ethernet port, perform the following steps:

 
Command or Action
Purpose

Step 1 

Router(config)# interface type slot/subslot/port

Example:

Router(config)# interface gigabitethernet3/0/0

Selects the primary interface. This is the interface you are creating a backup interface for. For example, interface gigabitEthernet 3/0/0 selects the interface for port 0 of the Gigabit Ethernet card installed in slot 3, subslot 0.

type specifies the interface type. Valid values are gigabitethernet or tengigabitethernet.

slot/subslot/port specifies the location of the interface.

Step 2 

Router(config-if)# backup interface type interface

Example:

Router(config)# backup interface gigabitethernet4/0/1

Selects the interface to serve as a backup interface.

Note You must apply the same configuration to both the primary and backup interfaces or the feature does not work. To configure EVC service instances on the interfaces, use the service instance, encapsulation, rewrite, bridge-domain, and xconnect commands. For information, see the following URLs:

http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_chapter09186a00807f3f97.html#wp1341419

http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_chapter09186a00807f3f97.html#wp1433480

Step 3 

Router(config-if)# backup delay enable-delay disable-delay

Example:

Router(config-if)# backup delay 0 0

(Optional) Specifies a time delay (in seconds) for enabling or disabling the backup interface.

enable-delay is the amount of time to wait after the primary interface goes down before bringing up the backup interface.

disable-delay is the amount of time to wait after the primary interface comes back up before restoring the backup interface to the standby (down) state

Note For the backup interface for Flexible UNI feature, do not change the default delay period (0 0) or the feature may not work correctly.

Step 4 

Router(config-if)# backup load enable-percent disable-percent

Example:

Router(config-if)# backup load 50 10

(Optional) Specifies the thresholds of traffic load on the primary interface (as a percentage of the total capacity) at which to enable and disable the backup interface.

enable-percent—Activate the backup interface when the traffic load on the primary exceeds this percentage of its total capacity.

disable-percent—Deactivate the backup interface when the combined load of both primary and backup returns to this percentage of the primary's capacity.

Applying the settings from the example to a primary interface with 10-Mbyte capacity, the router enables the backup interface when traffic load on the primary exceeds 5 Mbytes (50%), and disables the backup when combined traffic on both interfaces falls below 1 Mbyte (10%).

Step 5 

Router(config-if)# exit

Exits interface configuration mode and returns to global configuration mode.

Step 6 

Router(config)# connect primary interface srv-inst interface srv-inst

Router(config)# connect backup interface srv-inst interface srv-inst

Example:

Router(config-if)# connect primary gi3/0/0 2 gi3/0/1 2
Router(config-if)# connect backup gi4/0/0 2 gi4/0/1 2

(Optional) Creates a local connection between a single service instance (srv-inst) on two different interfaces.

The connect primary command creates a connection between primary interfaces, and connect backup creates a connection between backup interfaces.

In the example, a local connection is configured between service instance 2 on primary interfaces (gi3/0/0 and gi3/0/1) and on backup interfaces (gi4/0/0 and gi4/0/1).

Step 7 

Router(config)# connect primary interface srv-inst1 interface srv-inst2

Router(config)# connect backup interface srv-inst1 interface srv-inst2

Example:

Router(config-if)# connect primary gi3/0/0 2 gi3/0/0 3
Router(config-if)# connect backup gi4/0/0 2 gi4/0/0 3

(Optional) Enables local switching between different service instances (srv-inst1 and srv-inst2) on the same port.

Use the connect primary command to create a connection on a primary interface, and connect backup to create a connection on a backup interface.

In the example, we are configuring local switching between service instances 2 and 3 on both the primary (gi3/0/0) and backup interfaces (gi4/0/0).

Step 8 

Router(config-if)# exit

Exits interface configuration mode.

The following example shows a sample configuration in which:

gi3/0/1 is the primary interface and gi4/0/1 is the backup interface.

Each interface supports two service instances (2 and 4), and each service instance uses a different type of forwarding (bridge-domain and xconnect).

The xconnect command for service instance 2 uses a different VCID on each interface.


int gi3/0/1
  backup interface gi4/0/1
  service instance 4 ethernet
    encapsulation dot1q 4
    rewrite ingress tag pop 1 symmetric
    bridge-domain 4
  service instance 2 ethernet
    encapsulation dot1q 2
    rewrite ingress tag pop 1 symmetric
    xconnect 10.0.0.0 2 encap mpls

int gi4/0/1
  service instance 4 ethernet
    encapsulation dot1q 4
    rewrite ingress tag pop 1 symmetric
    bridge-domain 4
  service instance 2 ethernet
    encapsulation dot1q 2
    rewrite ingress tag pop 1 symmetric
    xconnect 10.0.0.0 5 encap mpls

Verifying the Flexible UNI Backup Interface Configuration

This section lists the commands to display information about the primary and backup interfaces configured on the router. In the examples that follow, the primary interface is gi3/0/0 and the secondary (backup) interface is gi3/0/11.

To display a list of backup interfaces, use the show backup command in privileged EXEC mode. Our sample output shows a single backup (secondary) interface:


NPE-11# show backup 
Primary Interface     Secondary Interface    Status
-----------------     -------------------    ------
GigabitEthernet3/0/0  GigabitEthernet3/0/11  normal operation

To display information about a primary or backup interface, use the show interfaces command in privileged EXEC mode. Issue the command on the interface for which you want to display information. The following examples show the output displayed when the command is issued on the primary (gi3/0/0) and backup (gi3/0/11) interfaces:


NPE-11# show int gi3/0/0 
GigabitEthernet3/0/0 is up, line protocol is up (connected)
  Hardware is GigEther SPA, address is 0005.dc57.8800 (bia 0005.dc57.8800)
  Backup interface GigabitEthernet3/0/11, failure delay 0 sec, secondary disable delay 
0 sec, kickin load not set, kickout load not set
[...]

NPE-11# show int gi3/0/11 
GigabitEthernet3/0/11 is standby mode, line protocol is down (disabled)


If the primary interface goes down, the backup (secondary) interface is transitioned to the up state, as shown in the command output that follows. Notice how the command output changes if you reissue the show backup and show interfaces commands at this time: the show backup status changes, the line protocol for gi3/0/0 is now down (notconnect), and the line protocol for gi3/0/11 is now up (connected).


NPE-11# !!! Link gi3/0/0 (active) goes down... 
22:11:11: %LINK-DFC3-3-UPDOWN: Interface GigabitEthernet3/0/0, changed state to down
22:11:12: %LINK-DFC3-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to up
22:11:12: %LINEPROTO-DFC3-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/0, 
changed state to down
22:11:13: %LINEPROTO-DFC3-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11, 
changed state to up

NPE-11# show backup      
Primary Interface     Secondary Interface    Status
-----------------     -------------------    ------
GigabitEthernet3/0/0  GigabitEthernet3/0/11  backup mode

NPE-11# show int gi3/0/0 
GigabitEthernet3/0/0 is down, line protocol is down (notconnect)
  Hardware is GigEther SPA, address is 0005.dc57.8800 (bia 0005.dc57.8800)
  Backup interface GigabitEthernet3/0/11, failure delay 0 sec, secondary disable delay 
0 sec,

NPE-11# show int gi3/0/11 
GigabitEthernet3/0/11 is up, line protocol is up (connected)

Configuring QoS Features on Ethernet SPAs

The SIPs and SPAs support many QoS features using modular QoS CLI (MQC) configuration. For information about the QoS features supported by the Ethernet SPAs, see the "Configuring QoS Features on a SIP" section on page 4-61 of Chapter 4, "Configuring the SIPs and SSC."

Ethernet SPA QoS Configuration Guidelines

For Fast Ethernet SPAs and the 2-Port Gigabit Ethernet SPA, the following QoS behavior applies:

In both the ingress and egress directions, all QoS features calculate packet size similarly to how packet size calculation is performed by the FlexWAN and Enhanced FlexWAN modules on the Cisco 7600 series router.

Specifically, all features consider the IEEE 802.3 Layer 2 headers and the Layer 3 protocol payload. The CRC, interframe gap, and preamble are not included in the packet size calculations.


Note For Fast Ethernet SPAs, QoS cannot change the speed of an interface (for example, Fast Ethernet SPAs cannot change QoS settings whenever an interface speed is changed between 100M to 10M). When the speed is changed, the user must also adjust the QoS setting accordingly.


Saving the Configuration

To save your running configuration to nonvolatile random-access memory (NVRAM), use the following command in privileged EXEC configuration mode:

Command
Purpose

Router# copy running-config startup-config

Writes the new configuration to NVRAM.


For information about managing your system image and configuration files, refer to the Cisco IOS Configuration Fundamentals Configuration Guide and Cisco IOS Configuration Fundamentals Command Reference publications that correspond to your Cisco IOS software release.

Shutting Down and Restarting an Interface on a SPA

You can shut down and restart any of the interface ports on a SPA independently of each other. Shutting down an interface stops traffic and enters the interface into an "administratively down" state.

There are no restrictions for online insertion and removal (OIR) on Fast Ethernet or Gigabit Ethernet SPAs. Fast Ethernet and Gigabit Ethernet SPAs can be removed from a SIP at any time. SIPs populated with any type of SPAs can be removed from the router at any time.

If you are preparing for an OIR of a SPA, it is not necessary to independently shut down each of the interfaces prior to deactivation of the SPA. The hw-module subslot [x/y] reload command automatically stops traffic on the interfaces and deactivates them along with the SPA in preparation for OIR.

In similar fashion, you do not need to independently restart any interfaces on a SPA after OIR of a SPA or SIP.

To shut down an interface on a SPA, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# shutdown

Disables an interface.


To restart an interface on a SPA, use the following command in interface configuration mode:

Command
Purpose

Router(config-if)# no shutdown

Restarts a disabled interface.


Verifying the Interface Configuration

Besides using the show running-configuration command to display your router configuration settings, you can use the show interfaces gigabitethernet command to get detailed information on a per-port basis for your Gigabit Ethernet SPAs, and the show interfaces fastethernet command to get detailed information on a per-port basis for your Fast Ethernet SPAs.

Verifying Per-Port Interface Status

To find detailed interface information on a per-port basis for the Fast Ethernet and Gigabit Ethernet SPAs, use the show interfaces fastethernet and show interfaces gigabitethernet commands respectively. For a description of the command output, see Chapter 40, "SIP, SSC, and SPA Commands."

The following example provides sample output for interface port 1 on the SPA located in the top subslot (0) of the SIP that is installed in slot 2 of the Cisco 7600 series router:

Router# show interfaces gigabitethernet 2/0/1
GigabitEthernet2/0/1 is up, line protocol is up 
  Hardware is GigEther SPA, address is 000a.f330.2e40 (bia 000a.f330.2e40)
  Internet address is 2.2.2.1/24
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, 
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  Keepalive not supported
  Full-duplex, 1000Mb/s, link type is force-up, media type is SX
  output flow-control is on, input flow-control is on
  ARP type: ARPA, ARP Timeout 04:00:00
  Last input 03:18:49, output 03:18:44, output hang never
  Last clearing of "show interface" counters never
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
  Queueing strategy: fifo
  Output queue: 0/40 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     1703 packets input, 638959 bytes, 0 no buffer
     Received 23 broadcasts (0 IP multicasts)
     0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
     0 watchdog, 1670 multicast, 0 pause input
     1715 packets output, 656528 bytes, 0 underruns
     0 output errors, 0 collisions, 4 interface resets
     0 babbles, 0 late collision, 0 deferred
     0 lost carrier, 0 no carrier, 0 pause output
     0 output buffer failures, 0 output buffers swapped out 

Configuration Examples

This section includes the following configuration examples:

Basic Interface Configuration Example

MAC Address Configuration Example

MAC Address Accounting Configuration Example

MAC Address Accounting Configuration Example

VLAN Configuration Example

mVPNoGRE Configuration Examples

EoMPLS Configuration Example

Backup Interface for Flexible UNI Configuration Example

Changing the Speed of a Fast Ethernet SPA Configuration Example

Ethernet OAM Configuration Example

Basic Interface Configuration Example

The following example shows how to enter global configuration mode to specify the interface that you want to configure, configure an IP address for the interface, and save the configuration. This example configures interface port 1 on the SPA that is located in subslot 0 of the SIP, that is installed in slot 3 of the Cisco 7600 series router:

! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

! Specify the interface address.

!

Router(config)# interface gigabitethernet 3/0/1

!

! Configure an IP address.

!

Router(config-if)# ip address 192.168.50.1 255.255.255.0

!

! Start the interface.

!

Router(config-if)# no shut

!

! Save the configuration to NVRAM.

!

Router(config-if)# exit

Router# copy running-config startup-config

MAC Address Configuration Example

The following example changes the default MAC address on the interface to 1111.2222.3333:

! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

! Specify the interface address

!

Router(config)# interface gigabitethernet 3/0/1

!

! Modify the MAC address.

!

Router(config-if)# mac-address 1111.2222.3333

MAC Address Accounting Configuration Example

The following example enables MAC Address Accounting:

! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

! Enable MAC address accounting

Router(config)# ip accounting mac-address {input | output}

Router(config-if)# ip accounting ?

access-violations Account for IP packets violating access lists on this interface

mac-address Account for MAC addresses seen on this interface

output-packets Account for IP packets output on this interface

precedence Count packets by IP precedence on this interface

<cr>

Router(config-if)# ip accounting mac

Router(config-if)# ip accounting mac-address ?

input Source MAC address on received packets

output Destination MAC address on transmitted packets

Router(config-if)# ip accounting mac-address ip

Router(config-if)# ip accounting mac-address input ?

<cr>

! Specify MAC address accounting for traffic entering the interface.

!

Router(config-if)# ip accounting mac-address input

! Specify MAC address accounting for traffic leaving the interface.

!

Router(config-if)# ip accounting mac-address output

Router(config-if)# end

! Verify the MAC Address on the interface.

!

Router# show interfaces GigabitEthernet 4/0/2 mac-accounting

GigabitEthernet4/0/2

Input (511 free)

000f.f7b0.5200(26 ): 124174 packets, 7450440 bytes, last: 1884ms ago

Total: 124174 packets, 7450440 bytes

Output (511 free)

000f.f7b0.5200(26 ): 135157 packets, 8109420 bytes, last: 1884ms ago

Total: 135157 packets, 8109420 bytes

HSRP Configuration Example

The following section provides a configuration example of Router A and Router B each belonging to three VRRP groups:

Router A

! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

Router# interface ethernet 1/0 
ip address 10.1.0.2 255.0.0.0 
Router# vrrp 1 priority 120 
Router# vrrp 1 authentication cisco 
Router# vrrp 1 timers advertise 3 
Router# vrrp 1 timers learn 
Router# vrrp 1 ip 10.1.0.10 
Router# vrrp 5 priority 100 
Router# vrrp 5 timers advertise 30
Router# vrrp 5 timers learn
Router# vrrp 5 ip 10.1.0.50 
Router# vrrp 100 timers learn
Router# no vrrp 100 preempt 
Router# vrrp 100 ip 10.1.0.100
no shutdown


Router B

! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

Router# interface ethernet 1/0 
ip address 10.1.0.1 255.0.0.0 
Router# vrrp 1 priority 100 
Router# vrrp 1 authentication cisco 
Router# vrrp 1 timers advertise 3 
Router# vrrp 1 timers learn 
Router# vrrp 1 ip 10.1.0.10 
Router# vrrp 5 priority 200 
Router# vrrp 5 timers advertise 30
Router# vrrp 5 timers learn
Router# vrrp 5 ip 10.1.0.50 
Router# vrrp 100 timers learn
Router# no vrrp 100 preempt 
Router# vrrp 100 ip 10.1.0.100
Router# no shutdown


In this configuration, each group has the following properties:

Group 1:

Virtual IP address is 10.1.0.10.

Router A will become the master for this group with priority 120.

Advertising interval is 3 seconds.

Preemption is enabled.

Group 5:

Router B will become master for this group with priority 200.

Advertising interval is 30 seconds.

Preemption is enabled.

Group 100:

-Router A will become master for this group first because it has a higher IP address (10.1.0.2).

-Advertising interval is the default 1 second.

-Preemption is disabled.

MTU Configuration Example

The following example sets the interface MTU to 9216 bytes:


Note The SPA automatically adds an additional 38 bytes to the configured interface MTU size.


! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

! Specify the interface address

!

Router(config)# interface gigabitethernet 3/0/1

!

! Configure the interface MTU.

!

Router(config-if)# mtu 9216

VLAN Configuration Example

The following example creates subinterface number 268 on SPA interface port 2 (the third port), and configures the subinterface on the VLAN with ID number 268, using IEEE 802.1Q encapsulation:


Note The SPA does not support ISL encapsulation.


! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

! Specify the interface address

!

Router(config)# interface gigabitethernet 3/0/1.268

!

! Configure dot1q encapsulation and specify the VLAN ID.

!

Router(config-subif)# encapsulation dot1q 268

AToM over GRE Configuration Example

The following example illustrates an AToM over GRE tunnel configuration between PE1 and PE2:


PE1:

interface GigabitEthernet4/3/0
 ip address 25.25.25.1 255.255.255.0
 negotiation auto
end

interface Tunnel10
 ip unnumbered Loopback1
 mpls label protocol ldp
 mpls ip
 tunnel source 12.12.12.12
 tunnel destination 6.6.6.6
end

interface Loopback1
 ip address 13.13.13.13 255.255.255.255
end

interface Loopback10
 ip address 12.12.12.12 255.255.255.255
end
ip route 2.2.2.2 255.255.255.255 Tunnel10


PE2:

interface GigabitEthernet2/3/0
 ip address 26.26.26.2 255.255.255.0
 negotiation auto
end

interface Tunnel10
 ip unnumbered Loopback1
 mpls ip
 tunnel source 6.6.6.6
 tunnel destination 12.12.12.12
end

interface Loopback1
 ip address 7.7.7.7 255.255.255.255
end

interface Loopback0
 ip address 6.6.6.6 255.255.255.255
end

ip route 3.3.3.3 255.255.255.255 Tunnel10

mVPNoGRE Configuration Examples

The following example shows the commands to configure the mVPNoGRE feature on a Cisco 7600 SIP-400 interface or subinterface; however, this example uses a Cisco 7600 SIP-400 interface that does not support subinterfaces:

! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.

!

! Specify the Gigabit Ethernet interface to configure.
!
Router(config)# interface gigabitethernet 2/0/0
! Attach a GRE Tunnel to a Cisco 7600 SIP-400 subinterface.
!
Router(config-if)# tunnel-interface tu1
! Define the IP traffic that should be tunneled.
!
Router(config-if-ti)# ip route 10.0.0.1 255.255.255.0
Router(config-if-ti)# exit

When the tunnel-interface command is configured on the Cisco 7600 SIP-400 interface or subinterface, ip pim sparse-mode and tag-switching ip are automatically added to the interface. A static route to IP address contained on the ip route command is internally created. The following example shows the output of a show running interface command after adding or configuring the tunnel-interface command; however, this example uses a Cisco 7600 SIP-400 interface that does not support subinterfaces:

Router# show running interface gigabitethernet 2/0/0
!
interface gigabitethernet2/0/0
 ip address 10.1.0.1 255.255.255.0
 ip pim sparse-mode
 no keepalive
 tunnel-interface Tunnel1
    ip route 10.11.0.1 255.255.255.0
    exit-tunnel-interface
 tag-switching ip
 clock source internal
end

Note You do not need to configure a static route (globally or on the tunnel) to the BGP neighbor on the Cisco 7600 series router. This is automatically done by the ip route command under the tunnel-interface command on the Cisco 7600 SIP-400 interface or subinterface.


The following example illustrates the Tunnel interface configuration on the Cisco 7600 series router:

interface Tunnel0
 ip address 10.0.0.1 255.255.255.0
 ip pim sparse-dense-mode
 mpls ip
 tunnel source 22.22.22.22
 tunnel destination 44.44.44.44

EoMPLS Configuration Example

The following example shows the commands to configure software-based EoMPLS:

! Enter global configuration mode.

!

Router# configure terminal

! Enter configuration commands, one per line. End with CNTL/Z.
Router# vlan 101
! 
Router(config)# interface VLAN101
Router(config-if)# xconnect 7.7.7.7 73829 encapsulation MPLS
! 
Router(config)# interface gigabitethernet 4/1/0.1
Router(config-subif)# encapsulation dot1Q 100

The following example shows the commands to configure Scalable EoMPLS (only for a Cisco 7600 SIP-400 Ethernet interface):

Router(config)# interface GigabitEthernet 1/2/1
Router(config-if)# no ip address
Router(config-if)# no cdp enable
!
Router(config-if)# interface GigabitEthernet 1/2/1.2
Router(config-subif)# encapsulation dot1Q 2
Router(config-subif)# xconnect 5.5.5.5 20002 encapsulation mpls
!
[Snip ...]
!
Router(config-if)# interface GigabitEthernet 1/2/1.4095
Router(config-subif)# encapsulation dot1Q 4095
Router(config-subif)# xconnect 5.5.5.5 24095 encapsulation mpls

The following example shows the commands to configure hardware EoMPLS (other ethernet interfaces):

Router(config)# interface GigabitEthernet 1/1
Router(config-if)# no ip address
Router(config-if)# no cdp enable
! 
Router(config-subif)# interface GigabitEthernet 1/1.2
Router(config-subif)# encapsulation dot1Q 2
Router(config-subif)# xconnect 5.5.5.5 10002 encapsulation mpls
!
[Snip ...]
Router(config)# interface GigabitEthernet 1/1.3095
Router(config-subif)# encapsulation dot1Q 3095
Router(config-subif)# xconnect 5.5.5.5 13095 encapsulation mpls
!

Backup Interface for Flexible UNI Configuration Example

Figure 15-5 and the table that follows show a sample configuration that includes several EVCs (service instances), configured as follows:

Service instance EVC4 is configured on primary and backup interfaces (links) that terminate in a bridge domain, with a VPLS uplink onto NPE12.

Service instance EVC2 is configured as scalable Ethernet over MPLS, peering with an SVI VPLS on NPE12.

Figure 15-5 Backup Interface for Flexible UNI Configuration


NPE10 Configuration:

int ge2/4.4
  description npe10 to npe11 gi3/0/11 - backup - bridged
  encap dot1q 4
  ip address 100.4.1.33 255.255.255.0

int ge2/4.2
  description npe10 to npe11 gi3/0/11 - backup - xconnect
  encap dot1q 2
  ip address 100.2.1.33 255.255.255.0

U-PE2 Configuration:

int ge1/3.4
  description npe14 to npe11 gi3/0/0 - primary - bridged
  encap dot1q 4
  ip address 100.4.1.22 255.255.255.0

int ge1/3.2
  description npe14 to npe11 gi3/0/0 - primary - xconnect
  encap dot1q 2
  ip address 100.2.1.22 255.255.255.0 


U-PE2 Configuration:

int fa1/0.4
  description 72a to npe12 - bridged
  encap dot1q 4
  ip address 100.4.1.12 255.255.255.0

int fa1/0.2
  description 72a to npe12 - xconnect
  encap dot1q 2
  ip address 100.2.1.12 255.255.255.0 
interface gigabitEthernet3/0/0
  backup interface gigabitEthernet3/0/11
  service instance 2 ethernet
    encapsulation dot1q 2
    rewrite ingress tag pop 1 symmetric
    xconnect 12.0.0.1 2 encapsulation mpls
  service instance 4 ethernet
    encapsulation dot1q 4
    rewrite ingress tag pop 1 symmetric
    bridge-domain 4

interface gigabitEthernet3/0/11
  service instance 2 ethernet
    encapsulation dot1q 2
    rewrite ingress tag pop 1 symmetric
    xconnect 12.0.0.1 21 encapsulation mpls
  service instance 4 ethernet
    encapsulation dot1q 4
    rewrite ingress tag pop 1 symmetric
    bridge-domain 4

interface GE-WAN 4/3
  description npe11 to npe12
  ip address 10.3.3.1 255.255.255.0
  mpls ip
l2 vfi vlan4 manual
  vpn id 4
  neighbor 12.0.0.1 4 encapsulation mpls
interface Vlan 4
  xconnect vfi vlan4 
l2 vfi vlan4 manual
  vpn id 4
  neighbor 11.0.0.1 4 encap mpls
interface Vlan4
  description npe12 to npe11 xconnect
  xconnect vfi vlan4
l2 vfi vlan2 manual
  vpn id 2
  neighbor 11.0.0.1 2 encap mpls
  neighbor 11.0.0.1 21 encap mpls
Interface Vlan2
  xconnect vfi vlan2
interface GE-WAN 9/4
  description npe12 to npe11
  ip address 10.3.3.2 255.255.255.0
  mpls ip

interface fastEthernet 8/2
  description npe12 to 72a
  switchport
  switchport trunk encap dot1q
  switchport mode trunk
  switchport trunk allowed vlan 2-4


Changing the Speed of a Fast Ethernet SPA Configuration Example

The following example shows the commands to change the speed of a Fast Ethernet SPA:

Note In order to change the speed of a Fast Ethernet SPA, autonegotiation must be disabled.


Router# show run interface fastethernet 5/0/1
Building configuration...
Current configuration : 86 bytes
!
! Disable Autonegotiation
!
interface FastEthernet5/0/1
ip address 10.1.0.2 255.255.0.0
negotiation auto
end
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface fastethernet 5/0/1
Router(config-if)# no negotiation auto 
Router(config-if)# speed 10
Router(config-if)# 
Router(config-if)# end
Router# show run interface fastethernet 5/01
Building configuration...
Current configuration : 112 bytes
!
interface FastEthernet 5/0/1
ip address 10.1.0.2 255.255.0.0
speed 10
duplex full
no negotiation auto
end
Router# show interface fastethernet 5/0/1
FastEthernet5/0/1 is up, line protocol is up 
Hardware is FastEthernet SPA, address is 000a.8b3e.cc00 (bia 000a.8b3e.cc00)
Internet address is 10.1.0.2/16
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, 
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive not supported
Full-duplex, 10Mb/s
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:04, output 00:00:04, output hang never
Last clearing of "show interface" counters 1d00h
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1608 packets input, 547102 bytes, 0 no buffer
Received 1 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog
0 input packets with dribble condition detected
1606 packets output, 548403 bytes, 0 underruns
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface fastethernet 5/0/1
Router(config-if)# speed 100
Router(config-if)# end
Router# 
*Apr 25 21:10:36: %SYS-5-CONFIG_I: Configured from console by console
Router# show interface fastethernet 5/0/1
FastEthernet5/0/1 is down, line protocol is down 
Hardware is FastEthernet SPA, address is 000a.8b3e.cc00 (bia 000a.8b3e.cc00)
Internet address is 10.1.0.2/16
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, 
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive not supported
Full-duplex, 100Mb/s
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:23, output 00:00:22, output hang never
Last clearing of "show interface" counters 1d00h
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1608 packets input, 547102 bytes, 0 no buffer
Received 1 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored

Ethernet OAM Configuration Example

The following Ethernet OAM example shows configuration of Ethernet OAM options using a template, and overriding that configuration with direct configuration at an interface. In this example, the network supports a Gigabit Ethernet interface between the customer edge device and provider edge device:

! Configure a global OAM template for both PE and CE configuration.
!
Router(config)# template oam
Router(config-template)# ethernet oam link-monitor symbol-period threshold low 10
Router(config-template)# ethernet oam link-monitor symbol-period threshold high 100
Router(config-template)# ethernet oam link-monitor frame window 100
Router(config-template)# ethernet oam link-monitor frame threshold low 10
Router(config-template)# ethernet oam link-monitor frame threshold high 100
Router(config-template)# ethernet oam link-monitor frame-period window 100
Router(config-template)# ethernet oam link-monitor frame-period threshold low 10
Router(config-template)# ethernet oam link-monitor frame-period threshold high 100
Router(config-template)# ethernet oam link-monitor frame-seconds window 1000
Router(config-template)# ethernet oam link-monitor frame-seconds threshold low 10
Router(config-template)# ethernet oam link-monitor frame-seconds threshold high 100
Router(config-template)# ethernet oam link-monitor receive-crc window 100
Router(config-template)# ethernet oam link-monitor receive-crc threshold high 100
Router(config-template)# ethernet oam link-monitor transmit-crc window 100
Router(config-template)# ethernet oam link-monitor transmit-crc threshold high 100
Router(config-template)# ethernet oam remote-failure dying-gasp action 
error-disable-interface
Router(config-template)# exit
!
! Enable Ethernet OAM on the CE interface
!
Router(config)# interface gigabitethernet 4/1/1
Router(config-if)# ethernet oam
!
! Apply the global OAM template named "oam" to the interface.
!
Router(config-if)# source template oam
!
! Configure any interface-specific link monitoring commands to 
! override the template configuration. The following example disables the high threshold
! link monitoring for receive CRC errors.
!
Router(config-if)# ethernet oam link-monitor receive-crc threshold high none
!
! Enable Ethernet OAM on the PE interface
!
Router(config)# interface gigabitethernet 8/1/1
Router(config-if)# ethernet oam
!
! Apply the global OAM template named "oam" to the interface.
!
Router(config-if)# source template oam