To show the adjacency created after a PPPoE session is enabled for an L2TPv3 tunnel (Tunnel1), enter the show adjacency encapsulation and show adjacency detail commands on the Cisco CSR 1000v. The PPPoE session goes from the vBNG on the Cisco CSR 1000v VM to the Agg/Edge router (for example, a Cisco ASR 9000). The following examples
vBNG# show adjacency encapsulation
RAW Tunnel1 point2point(3)
Encap length 70
60000000000073FF1111222200000000
000000000000CDEF1111110100000000
000000000000ABCD0000000100000004
00000004000000000000AAAABBBB1101
810001918864
Provider: TUNNEL
Protocol header count in macstring: 1
HDR 0: ipv6
dst: static, 1111:1101::ABCD
src: static, 1111:2222::CDEF
prot: static, 115
tc: static, 0
flow: static, 0
hops: static, 255
per packet fields: payload_length
vBNG# show adjacency detail
IPV6 GigabitEthernet1 FE80::AA0C:DFF:FE53:2061(3)
0 packets, 0 bytes
epoch 0
sourced in sev-epoch 45988
Encap length 14
A80C0D53206152540000010186DD
L2 destination address byte offset 0
L2 destination address byte length 6
Link-type after encap: ipv6
IPv6 ND
Show the running configuration for the L2TPv3 tunnel interface.
vBNG# show running-configuration interface Tunnel1
Load for five secs: 1%/0%; one minute: 0%; five minutes: 0%
No time source, *10:58:51.169 UTC Wed Oct 18 2017
Building configuration...
Current configuration : 440 bytes
!
interface Tunnel1
mac-address aaaa.bbbb.1101
no ip address
ip verify unicast source reachable-via rx
pppoe enable group global
tunnel source GigabitEthernet1
tunnel mode ethernet l2tpv3 manual
tunnel destination 1111:1101::ABCD
tunnel path-mtu-discovery
tunnel vlan 401
l2tp static remote session 1
l2tp static remote cookie size 8 value 0x4 0x4
l2tp static local session 1
l2tp static local cookie size 8 value 0x4 0x4
To show the L2TPv3 tunnel interface, enter the show interface command as shown in the following example.
vBNG# show interface Tunnel1
Load for five secs: 0%/0%; one minute: 0%; five minutes: 0%
No time source, *10:59:18.610 UTC Wed Oct 18 2017
Tunnel1 is up, line protocol is up
Hardware is Tunnel
MTU 1460 bytes, BW 100 Kbit/sec, DLY 50000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation TUNNEL, loopback not set
Keepalive not set
Tunnel linestate evaluation up
Tunnel source 1111:2222::CDEF (GigabitEthernet1), destination 1111:1101::ABCD
Tunnel Subblocks:
src-track:
Tunnel1 source tracking subblock associated with GigabitEthernet1
Set of tunnels with source GigabitEthernet1, 41 members (includes iterators), on interface <OK>
Tunnel protocol/transport L2TP/IPV6
L2TPv3
remote session-id:1
local session-id:1
local cookie size:8, low value:0x4, high value:0x4
remote cookie size:8, low value:0x4, high value:0x4
Tunnel TTL 255
Path MTU Discovery, ager 10 mins, min MTU 1280
Tunnel transport MTU 1460 bytes
Tunnel transmit bandwidth 8000 (kbps)
Tunnel receive bandwidth 8000 (kbps)
Last input never, output 1d03h, output hang never
Last clearing of "show interface" counters 3d03h
Input queue: 0/375/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/0 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
9583487 packets input, 9983601325 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
13458 packets output, 1739662 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops
0 output buffer failures, 0 output buffers swapped out
vBNG#
The following command shows the IPsec Cisco Quantum Flow Processor (QFP) information about tunnel1.
vBNG# show platform hardware qfp active feature tunnel interface tunnel1
Load for five secs: 0%/0%; one minute: 0%; five minutes: 0%
No time source, *10:56:51.924 UTC Wed Oct 18 2017
General interface info:
Interface name: Tunnel1
Platform interface handle: 11
QFP interface handle: 8
QFP complex: 0
Rx uIDB: 65530 Tx uIDB: 65528
Hash index : 0x0003f6
Hash element ppe addr : 0xe89bf440
ESP Hash element ppe addr : 00000000
AH Hash element ppe addr : 00000000
UDP Hash element ppe addr : 00000000
Output sb ppe addr : 0xe816fc20
Decap chk sb ppe addr : 00000000
DMVPN sb ppe addr input: 00000000 output: 00000000
SGRE input sb ppe addr : 00000000
L2TPOIPV6 input sb ppe addr : 0xe75c6000
Config:
mode: L2TPV3oIPV6
src IP: 1111:2222:0000:0000:0000:0000:0000:cdef dest IP: 1111:1101:0000:0000:0000:0000:0000:abcd
ipv4_intf_vrf: 0 tun_vrf: 0 tun_vrf_egress: 0
key: 0 flags: 0x0081 app_id: TUN_APP_CLI app_data: 0
ttl: 255 tos: 0
tunnel_protection: FALSE
virtual MAC: aaaa.bbbb.1101
lport: 0 rport: 0
tunnel_enable_entropy: FALSE
remote_session_id: 1 vlan id for l2tpoipv6: 401
remote_cookie_size: 8 local_cookie_size: 8 local_cookie_secondary_size: 255
remote_cookie_low: 4 remote_cookie_high: 4
local_cookie_low: 4 local_cookie_high: 4
local_cookie_secondary_low: 0 local_cookie_secondary_high: 0
The following show running-configuration command, shows the Cisco CSR 1000v VM configuration on the x86 server.
vBNG# show running-configuration
Building configuration...
Current configuration : 4401 bytes
!
! Last configuration change at 13:38:48 IST Tue Oct 17 2017
!
version 16.6
service timestamps debug datetime msec
service timestamps log datetime msec
platform qfp utilization monitor load 80
no platform punt-keepalive disable-kernel-core
!
hostname vBNG
!
boot-start-marker
boot system harddisk:asr1000rpx86-universalk9.2017-06-16_14.49_vijasin3.SSA.bin
boot-end-marker
!
!
vrf definition Mgmt-intf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
logging buffered 10000000
no logging console
!
aaa new-model
!
!
aaa group server radius GROUP1
server name RAD1
!
aaa group server radius acct
server name RAD1
!
aaa authentication login CONSOLE none
aaa authentication ppp default local
aaa authorization network default local
aaa authorization subscriber-service default local
aaa accounting update periodic 1
aaa accounting network default start-stop group GROUP1
aaa accounting network List1 start-stop group GROUP1
!
aaa session-id common
clock timezone IST 5 30
!
subscriber templating
subscriber accounting accuracy 10000
!
ipv6 unicast-routing
!
!
multilink bundle-name authenticated
vpdn enable
vpdn authen-before-forward
!
vpdn-group test1
accept-dialin
protocol l2tp
virtual-template 1
terminate-from hostname CSR_TENGIG
l2tp tunnel password 0 cisco
!
!
crypto pki trustpoint TP-self-signed-336246438
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-336246438
revocation-check none
rsakeypair TP-self-signed-336246438
!
!
crypto pki certificate chain TP-self-signed-336246438
!
!
license udi pid ASR1006 sn NWG123704SS
license accept end user agreement
license boot level adventerprise
spanning-tree extend system-id
diagnostic bootup level minimal
!
!
username user1@cisco.com password 0 cisco
username lac@cisco.com password 0 cisco
username user1lac@cisco.com password 0 cisco
username user2lac@cisco.com password 0 cisco
username lacupsrl@cisco.com password 0 cisco
username lacdownsrl@cisco.com password 0 cisco
!
redundancy
mode sso
!
!
interface GigabitEthernet0/0/0
ip address 9.45.102.50 255.255.0.0
ip nat outside
negotiation auto
!
<commands removed for brevity>
interface TenGigabitEthernet0/2/0
ip address 40.1.1.2 255.255.255.0
ip nat inside
!
interface TenGigabitEthernet0/3/0
ip address 50.1.1.1 255.255.255.0
!
interface GigabitEthernet0
vrf forwarding Mgmt-intf
no ip address
negotiation auto
!
interface Virtual-Template1
ip unnumbered TenGigabitEthernet0/2/0
peer default ip address pool test1
peer default ipv6 pool test1_v6
ipv6 unnumbered TenGigabitEthernet0/2/0
ppp mtu adaptive
ppp authentication pap chap
!
interface Virtual-Template2
ip unnumbered GigabitEthernet0/0/3
ppp authentication pap
!
ip local pool test1 2.1.1.1 2.1.1.254
ip nat inside source list 1 interface GigabitEthernet0/0/0 overload
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip tftp source-interface GigabitEthernet0/0/0
ip tftp blocksize 8192
ip route 0.0.0.0 0.0.0.0 9.45.0.1
ip route 1.1.0.0 255.255.0.0 40.1.1.1
ip route 10.1.1.0 255.255.255.0 40.1.1.1
ip route 20.1.1.0 255.255.255.0 40.1.1.1
ip route 30.1.1.0 255.255.255.0 40.1.1.1
ip route 100.1.0.0 255.255.0.0 60.1.1.1
ip route 200.1.0.0 255.255.0.0 60.1.1.1
ip route 202.153.144.25 255.255.255.255 9.45.0.1
!
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
access-list 1 permit 30.1.1.0 0.0.0.255
access-list 1 permit any
ipv6 local pool test1_v6 5555::/48 64
!
radius server RAD1
address ipv4 10.64.67.97 auth-port 1645 acct-port 1646
key cisco123
!
!
control-plane
!
line con 0
stopbits 1
line vty 0 4
!
end