Virtual Private LAN Services Commands on Cisco IOS XR Software
This chapter describes the commands used to configure, monitor, and troubleshoot Virtual Private LAN Services (VPLS).
For detailed information about MPLS concepts, configuration tasks, and examples, refer to the Cisco IOS XR MPLS Configuration Guide.
action (VPLS)
To configure the bridge behavior when the number of learned MAC addresses exceed the MAC limit configured, use the action command in l2vpn bridge group bridge domain MAC limit configuration mode. To disable this feature, use the no form of this command.
action {flood | no-flood | shutdown}
no action {flood | no-flood | shutdown}
Syntax Description
flood |
Configures the action to flood all unknown unicast packets when the MAC limit is reached. If the action is set to flood, all unknown unicast packets are flooded over the bridge. |
no-flood |
Configures the action to no-flood so all unknown unicast packets are dropped when the MAC limit is reached. If the action is set to no-flood, all unknown unicast packets are dropped. |
shutdown |
Stops forwarding when the MAC limit is reached. If the action is set to shutdown, all packets are dropped. |
Defaults
No action is taken when the MAC address limit is reached.
Command Modes
l2vpn bridge group bridge domain MAC limit configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the action command to specify the type of action to be taken when the action is violated.
The configured action has no impact if the MAC limit has not been reached.
Examples
The following example shows how to configure the bridge bar to flood all unknown unicast packets when more than 10 MACs are learned on the bridge:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# action flood
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# maximum 10
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
limit (VPLS) |
Sets the MAC address limit for action, maximum, and notification and enters l2vpn bridge group bridge domain MAC limit configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
maximum (VPLS) |
Configures the specified action when the number of MAC addresses learned on a bridge is reached. |
notification (VPLS) |
Specifies the type of notification that is sent when the number of learned MAC addresses exceeds the configured limit. |
aging (VPLS)
To enter the MAC aging configuration submode to set the aging parameters such as time and type, use the aging command in l2vpn bridge group bridge domain configuration mode. To return to the default value for all parameters that are attached to this configuration submode, use the no form of this command.
aging
no aging
Syntax Description
This command has no arguments or keywords.
Defaults
No defaults are attached to this parameter since it is used as a configuration submode. See the defaults that are assigned to the time (VPLS) and the type (VPLS) parameters.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the aging command to enter l2vpn bridge group bridge domain MAC aging configuration mode.
Examples
The following example shows how to enter MAC aging configuration submode and to set the MAC aging time to 120 seconds:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# aging
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-aging)# time 120
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters L2VPN bridge group bridge domain MAC configuration mode. |
time (VPLS) |
Configures the maximum aging time. |
type (VPLS) |
Configures the type for MAC address aging. |
bridge-domain (VPLS)
To establish a bridge domain and to enter l2vpn bridge group bridge domain configuration mode, use the bridge-domain command in l2vpn bridge group configuration mode. To return to a single bridge domain, use the no form of this command.
bridge-domain bridge-domain name
no bridge-domain bridge-domain name
Syntax Description
bridge-domain name |
Name of the bridge domain. |
Defaults
The default value is a single bridge domain.
Command Modes
l2vpn bridge group configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the bridge-domain command to enter l2vpn bridge group bridge domain configuration mode.
Examples
The following example shows how to configure a bridge domain:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)#
Related Commands
|
|
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
bridge group (VPLS)
To create a bridge group so that it can contain bridge domains and then to assign network interfaces to the bridge domain, use the bridge group command in l2vpn configuration mode. To remove all the bridge domains that are created under this bridge group and to remove all network interfaces that are assigned under this bridge group, use the no form of this command.
bridge group bridge group name
no bridge-group bridge group name
Syntax Description
bridge group name |
Number of the bridge group to which the interface belongs. The range is from 1 to 255. |
Defaults
No bridge group is created.
Command Modes
l2vpn configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the bridge group command to enter l2vpn bridge group configuration mode.
Examples
The following example shows that bridge group 1 is assigned:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)#
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
l2vpn |
Enters L2VPN configuration mode. |
clear l2vpn bridge-domain (VPLS)
To clear the MAC addresses and to restart the bridge domains on the router, use the clear l2vpn bridge-domain command in EXEC mode.
clear l2vpn bridge-domain {all | bd-name name | group group}
Syntax Description
all |
Clears and restarts all the bridge domains on the router. |
bd-name name |
Clears and restarts the specified bridge domain. The name argument specifies the name of the bridge-domain. |
group group |
Clears and restarts all the bridge domains that are part of the bridge group. |
Defaults
No default behavior or values
Command Modes
EXEC
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
This is the method that allows a bridge to forward again after it was put in Shutdown state as a result of exceeding the configured MAC limit.
Examples
The following example shows how to clear all the MAC addresses and to restart all the bridge domains on the router:
RP/0/RP0/CPU0:router# clear l2vpn bridge-domain all
Related Commands
flooding disable (VPLS)
To configure flooding for traffic at the bridge domain level or at the bridge port level, use the flooding disable command in l2vpn bridge group bridge domain configuration mode. To return the bridge to normal flooding behavior when all unknown unicast packets, all broadcast packets, and all multicast packets are flooded over all other bridge domain network interfaces, use the no form of this command.
flooding disable
no flooding disable
Syntax Description
This command has no arguments or keywords.
Defaults
The default behavior is that packets are flooded when their destination MAC address is not found.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the flooding disable command to override the parent bridge configuration.
By default, bridge ports inherit the flooding behavior of the bridge domain.
When flooding is disabled, all unknown unicast packets, all broadcast packets, and all multicast packets are discarded.
Examples
The following example shows how to disable flooding on the bridge domain called bar:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# l2vpn
RP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# flooding disable
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mtu (VPLS) |
Adjusts the maximum packet size or maximum transmission unit (MTU) size for the bridge domain. |
interface (VPLS)
To add an interface to a bridge domain that allows packets to be forwarded and received from other interfaces that are part of the same bridge domain, use the interface command in l2vpn bridge group bridge domain configuration mode. To remove an interface from a bridge domain, use the no form of this command.
interface interface name
no interfaceinterface name
Syntax Description
interface name |
Configures the name of the interface or attachment circuit in rack/slot/instance/port format. |
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the interface command to enter l2vpn bridge group bridge domain attachment circuit configuration mode. In addition, the interface command enters the interface configuration submode to configure parameters specific to the interface.
By default, an interface is not part of a bridge.
Examples
The following example shows how to configure the bundle Ethernet interface as an attachment circuit:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# l2vpn
RP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# interface bundle-ether 5
RP/0/0/CPU0:router(config-l2vpn-bg-bd-ac)#
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
learning disable (VPLS)
To override the MAC learning configuration of a parent bridge or to set the MAC learning configuration of a bridge, use the learning disable command in l2vpn bridge group bridge domain MAC configuration mode. To disable this feature, use the no form of this command.
learning disable
no learning disable
Syntax Description
This command has no arguments or keywords.
Defaults
By default, learning is enabled on all bridge domains and all interfaces on that bridge inherits this behavior.
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
When set, the learning disable command stops all MAC learning either on the specified interface or the bridge domain.
Examples
In the following example, MAC learning is disabled on all ports in the bridge domain called bar, which is applied to all interfaces in the bridge unless the interface has its own MAC learning enable command.
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# l2vpn
RP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# learning disable
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
limit (VPLS)
To set the MAC address limit for action, maximum, and notification and to enter l2vpn bridge group bridge domain MAC limit configuration mode, use the limit command in l2vpn bridge group bridge domain MAC configuration mode. To remove all limits that were previously configured under the MAC configuration submodes, use the no form of this command.
limit
no limit
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the limit command to enter l2vpn bridge group bridge domain MAC limit configuration mode. The limit command specifies that one syslog message is sent or a corresponding trap is generated with the MAC limit when the action is violated.
Examples
The following example shows how the MAC limit for the bridge bar is set to 100 with an action of shutdown. After the configuration, the bridge allows only up to 100 MAC addresses to be learned until the bridge stops all forwarding. When this happens, a syslog message and an SNMP trap are created.
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# maximum 100
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# action shutdown
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# notification both
Related Commands
|
|
action (VPLS) |
Configures the bridge behavior when the number of learned MAC addresses exceed the MAC limit configured. |
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
maximum (VPLS) |
Configures the specified action when the number of MAC addresses learned on a bridge is reached. |
notification (VPLS) |
Specifies the type of notification that is sent when the number of learned MAC addresses exceeds the configured limit. |
mac (VPLS)
To enter l2vpn bridge group bridge domain MAC configuration mode, use the mac command in l2vpn bridge group bridge domain configuration mode. To disable all configurations added under the MAC configuration submodes, use the no form of this command.
mac
no mac
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the mac command to enter l2vpn bridge group bridge domain MAC configuration mode.
Examples
The following example shows how to enter l2vpn bridge group bridge domain MAC configuration mode:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)#
Related Commands
|
|
aging (VPLS) |
Enters MAC aging configuration submode to set the aging parameters such as time and type. |
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
learning disable (VPLS) |
Overrides the MAC learning configuration of a parent bridge or sets the MAC learning configuration of a bridge. |
limit (VPLS) |
Sets the MAC address limit for action, maximum, and notification and enters l2vpn bridge group bridge domain MAC limit configuration mode. |
static-address (VPLS) |
Adds static entries to the MAC address for filtering. |
withdrawal (VPLS) |
Enables MAC address withdrawal for a specified bridge domain. |
maximum (VPLS)
To configure the specified action when the number of MAC addresses learned on a bridge is reached, use the maximum command in l2vpn bridge group bridge domain MAC limit configuration mode. To disable this feature, use the no form of this command.
maximum value
no maximum value
Syntax Description
value |
Maximum number of learned MAC addresses. The range is from 5 to 65536. |
Defaults
The default maximum value is 4000.
Command Modes
l2vpn bridge group bridge domain MAC limit configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
The action can either be flood, no flood, or shutdown. Depending on the configuration, a SYSDB, an SNMP trap notification, or both are issued.
Examples
The following example shows when the number of MAC address learned on the bridge exceeds 5000 and the bridge stops learning but continues flooding:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# maximum 5000
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# action no-flood
Related Commands
|
|
action (VPLS) |
Configures the bridge behavior when the number of learned MAC addresses exceed the MAC limit configured. |
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
limit (VPLS) |
Sets the MAC address limit for action, maximum, and notification and enters l2vpn bridge group bridge domain MAC limit configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
notification (VPLS) |
Specifies the type of notification that is sent when the number of learned MAC addresses exceeds the configured limit. |
mpls static label (VPLS)
To configure the MPLS static labels and the static labels for the access pseudowire configuration, use the mpls static label command in l2vpn bridge group bridge domain VFI pseudowire configuration mode. To assign the dynamic MPLS labels to either the virtual forwarding interface (VFI) pseudowire or the access pseudowire, use the no form of this command.
mpls static label local value {remote value}
no mpls static label local value {remote value}
Syntax Description
local value |
Configures the local pseudowire label. The range is from 16 to 15999. |
remote value |
Configures the remote pseudowire label. The range is from 16 to 15999. |
Defaults
By default, the router attempts to assign dynamic labels to the pseudowire.
Command Modes
l2vpn bridge group bridge domain VFI pseudowire configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Ensure that both ends of the pseudowire have matching static labels.
Examples
The following example shows how to configure the VFI pseudowire 10.1.1.2 with pseudowire ID of 1000 to use MPLS label 800 and remote MPLS label 500:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# l2vpn
RP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# vfi model
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)# mpls static label local 800 remote 500
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
neighbor (VPLS) |
Adds an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI). |
pw-class (VFI) |
Configures the pseudowire class template name to use for the pseudowire. |
vfi (VPLS) |
Configures virtual forwarding interface (VFI) parameters and enters l2vpn bridge group bridge domain VFI configuration mode. |
mtu (VPLS)
To adjust the maximum packet size or maximum transmission unit (MTU) size for the bridge domain, use the mtu command in l2vpn bridge group bridge domain configuration mode. To disable this feature, use the no form of this command.
mtu bytes
no mtu
Syntax Description
bytes |
MTU size, in bytes. The range is from 64 to 65535. |
Defaults
The default MTU value is 1500.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Each interface has a default maximum packet size or MTU size. This number generally defaults to the largest size possible for that interface type. On serial interfaces, the MTU size varies, but cannot be set smaller than 64 bytes.
The MTU for the bridge domain includes only the payload of the packet. For example, a configured bridge MTU of 1500 allows tagged packets of 1518 bytes (6 bytes DA, 6 bytes SA, 2 bytes ethertype, or 4 bytes qtag).
Examples
The following example specifies an MTU of 1000 bytes:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mtu 1000
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
flooding disable (VPLS) |
Configures flooding for traffic at the bridge domain level or at the bridge port level. |
l2vpn |
Enters L2VPN configuration mode. |
neighbor (VPLS)
To add an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI), use the neighbor command in the appropriate l2vpn bridge group bridge domain configuration submode. To remove the pseudowire either from the bridge or from the VFI, use the no form of this command.
neighbor A.B.C.D {pw-id value}
no neighbor A.B.C.D {pw-id value}
Syntax Description
A.B.C.D |
IP address of the cross-connect peer. |
pw-id value |
Configures the pseudowire ID and ID value. Range is 1 to 4294967295. |
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
l2vpn bridge group bridge domain VFI configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the neighbor command to enter l2vpn bridge group bridge domain VFI pseudowire configuration mode. Alternatively, use the neighbor command to enter l2vpn bridge group bridge domain access pseudowire configuration mode.
Examples
The following example shows how to configure an access pseudowire directly under a bridge domain in l2vpn bridge group bridge domain configuration mode:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# neighbor 10.1.1.2 pw-id 1000
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-pw)#
The following example shows how to configure the parameters for any pseudowire in l2vpn bridge group bridge domain VFI configuration mode:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)#
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mpls static label (VPLS) |
Configures the MPLS static labels and the static labels for the access pseudowire configuration. |
pw-class (VFI) |
Configures the pseudowire class template name to use for the pseudowire. |
static-mac-address (VPLS) |
Configures the static MAC address to associate a remote MAC address with a pseudowire or any other bridge interface. |
vfi (VPLS) |
Configures virtual forwarding interface (VFI) parameters and enters l2vpn bridge group bridge domain VFI configuration mode. |
notification (VPLS)
To specify the type of notification that is sent when the number of learned MAC addresses exceeds the configured limit, use the notification command in l2vpn bridge group bridge domain MAC limit configuration mode. To use the notification as only a syslog entry, use the no form of this command.
notification {both | none | trap}
no notification {both | none | trap}
Syntax Description
both |
Sends syslog and trap notifications when the action is violated. |
none |
Specifies no notification. |
trap |
Sends trap notifications when the action is violated. |
Defaults
By default, only a syslog message is sent when the number of learned MAC addresses exceeds the maximum configured.
Command Modes
l2vpn bridge group bridge domain MAC limit configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
A syslog message and an SNMP is generated. Alternatively, an SNMP is generated. Finally, no notification is generated.
Examples
The following example shows how both a syslog message and an SNMP trap are generated with the bridge bar and learns more MAC addresses than the configured limit:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# limit
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-limit)# notification both
Related Commands
|
|
action (VPLS) |
Configures the bridge behavior when the number of learned MAC addresses exceed the MAC limit configured. |
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
maximum (VPLS) |
Configures the specified action when the number of MAC addresses learned on a bridge is reached. |
pw-class (VFI)
To configure the pseudowire class template name to use for the pseudowire, use the pw-class command in l2vpn bridge group bridge domain VFI pseudowire configuration mode. To delete the pseudowire class, use the no form of this command.
pw-class class name
no pw-class class name
Syntax Description
class name |
Pseudowire class name. |
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain VFI pseudowire configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Examples
The following example shows how to attach the pseudowire class to the pseudowire:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)# pw-class canada
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mpls static label (VPLS) |
Configures the MPLS static labels and the static labels for the access pseudowire configuration. |
neighbor (VPLS) |
Adds an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI). |
vfi (VPLS) |
Configures virtual forwarding interface (VFI) parameters and enters l2vpn bridge group bridge domain VFI configuration mode. |
show l2vpn bridge-domain (VPLS)
To display information for the bridge ports such as attachment circuits and pseudowires for the specific bridge domains, use the show l2vpn bridge-domain command in EXEC mode.
show l2vpn bridge-domain [bd-name bridge-domain name | brief | detail | group bridge-domain group name | interface type interface-path-id | neighbor IP address [pw-id value] | summary]
Syntax Description
bd-name bridge-domain name |
(Optional) Displays the bridges by the bridge ID. The bridge-domain name argument is used to name a bridge domain. |
brief |
(Optional) Displays brief information about the bridges. |
detail |
(Optional) Displays the output for the Layer 2 VPN (L2VPN) to indicate whether or not the MAC withdrawal feature is enabled and the number of MAC withdrawal messages that are sent or received from the pseudowire. |
group bridge-domain group name |
(Optional) Displays filter information on the bridge-domain group name. The bridge-domain group name argument is used to name the bridge domain group. |
interface |
(Optional) Displays the filter information for the interface on the bridge domain. |
type |
Interface type. For more information, use the question mark (?) online help function. |
interface-path-id |
Physical interface or a virtual interface. Note Use the show interfaces command to see a list of all possible interfaces currently configured on the router. For more information about the syntax for the router, use the question mark (?) online help function. |
neighbor IP address |
(Optional) Displays only the bridge domain that contains the pseudowires to match the filter for the neighbor. The IP address argument is used to configure IP address of the neighbor. |
pw-id value |
(Optional) Displays the filter for the pseudowire ID. The range is from 1 to 4294967295. |
summary |
(Optional) Displays the summary information for the bridge domain. |
Defaults
No default behavior or values
Command Modes
EXEC
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the interface keyword to display only the bridge domain that contains the specified interface as an attachment circuit. In the sample output, only the attachment circuit matches the filter that is displayed. No pseudowires are displayed.
Examples
The following sample output shows information for the bridge ports such as attachment circuits and pseudowires for the specific bridge domains:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)
Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)
Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0
Table 97 describes the significant fields shown in the display.
Table 97 show l2vpn bridge-domain Field Descriptions
|
|
Bridge group |
Name of bridge domain group is displayed. |
bridge-domain |
Name of bridge domain is displayed. |
id |
ID assigned to this bridge domain is displayed. |
state |
Current state of the bridge domain is displayed. |
ShgId |
ID for the default Split Horizon Group assigned to all attachment circuits and access pseudowires that are part of this bridge domain is displayed. Note Members of the special Split Horizon Group ID 0 forwards to other members of the same SPG. |
The following example shows sample output for a bridge named bd1:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain bd-name bd1
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)
Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)
Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0
The following sample output shows brief information about the bridges:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain brief
Bridge Group/Bridge-Domain Name ID State Num ACs/up Num PWs/up
-------------------------------- ----- ---------- -------------- --------------
Table 98 describes the significant fields shown in the display.
Table 98 show l2vpn bridge-domain brief Field Descriptions
|
|
Bridge Group/Bridge-Domain Name |
Bridge domain group name followed by the bridge domain name are displayed. |
ID |
ID assigned to this bridge domain is displayed. |
State |
Current state of the bridge domain is displayed. |
Num ACs/up |
Total number of attachment circuits that are up in this bridge domain is displayed. |
Num PWs/up |
Total number of pseudowires that are up in this bridge domain is displayed. The count includes both VFI pseudowires and access psuedowires. |
The following sample output shows detailed information:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain detail
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: disabled
ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)
AC: GigabitEthernet0/1/0/0, state is up
MTU 1500; XC ID 0x2000001; interworking none; MSTi 0 (unprotected)
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: disabled
packet totals: receive 3919680,send 9328
byte totals: receive 305735040,send 15022146
PW: neighbor 1.1.1.1, PW ID 1, state is up ( established )
PW class mpls, XC ID 0xff000001
Encapsulation MPLS, protocol LDP
PW type Ethernet, control word disabled, interworking none
PW backup disable delay 0 sec
------------ ------------------------------ -------------------------
Control word disabled disabled
PW type Ethernet Ethernet
(LSP ping verification) (LSP ping verification)
(router alert label) (router alert label)
------------ ------------------------------ -------------------------
Create time: 12/03/2008 14:03:00 (17:17:30 ago)
Last time status changed: 13/03/2008 05:57:58 (01:22:31 ago)
MAC withdraw message: send 0 receive 0
packet totals: receive 3918814, send 3918024
byte totals: receive 305667492, send 321277968
drops: illegal VLAN 0, illegal length 0
The following sample output shows that when a bridge operates in VPWS mode, the irrelevant information for MAC learning is suppressed:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain detail
Bridge group: foo_group, bridge-domain: foo_bd, id: 0, state: up, ShgId: 0
ACs: 1 (0 up), VFIs: 1, PWs: 2 (2 up)
AC: GigabitEthernet0/5/1/4, state is admin down
Type Ethernet MTU 1500; XC ID 1; interworking none
packet totals: receive 0,send 0
byte totals: receive 0,send 0
PW: neighbor 1.1.1.1, PW ID 1, state is up ( established )
Encapsulation MPLS, protocol LDP
PW type Ethernet, control word enabled, interworking none
------------ ------------------------------ ------------------------------
Group ID unassigned unknown
Interface siva/vfi siva/vfi
Control word enabled enabled
PW type Ethernet Ethernet
(LSP ping verification) (LSP ping verification)
(control word) (control word)
(router alert label) (router alert label)
------------ ------------------------------ ------------------------------
Create time: 25/06/2007 05:29:42 (2w0d ago)
Last time status changed: 27/06/2007 06:50:35 (1w5d ago)
PW: neighbor 1.1.1.1, PW ID 2, state is up ( established )
Encapsulation MPLS, protocol LDP
PW type Ethernet, control word enabled, interworking none
------------ ------------------------------ ------------------------------
Group ID unassigned unknown
Interface siva/vfi siva/vfi
Control word enabled enabled
PW type Ethernet Ethernet
(LSP ping verification) (LSP ping verification)
(control word) (control word)
(router alert label) (router alert label)
------------ ------------------------------ ------------------------------
Create time: 25/06/2007 05:29:42 (2w0d ago)
Last time status changed: 27/06/2007 06:50:35 (1w5d ago)
drops: illegal VLAN 0, illegal length 0
Table 99 describes the significant fields shown in the display.
Table 99 show l2vpn bridge-domain detail Field Descriptions
|
|
Bridge group |
Name of bridge domain group is displayed. |
bridge-domain |
Name of bridge domain is displayed. |
ID |
ID assigned to this bridge domain is displayed. |
state |
Current state of the bridge domain is displayed. |
ShgId |
ID for the default Split Horizon Group assigned to all attachment circuits and access pseudowires that are part of this bridge domain is displayed. Note Members of the special Split Horizon Group ID 0 forwards to other members of the same SPG. |
MSTi |
ID for the Multiple Spanning Tree. |
The following sample output shows filter information about the bridge-domain group named g1:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain group g1
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)
Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)
Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0
The following sample output shows display the filter information for the interface on the bridge domain:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain interface gigabitEthernet 0/1/0/0
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)
Gi0/1/0/0, state: up, Static MAC addresses: 2, MSTi: 0 (unprotected)
The following sample output shows that the bridge domain contains the pseudowires to match the filter for the neighbor:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain neighbor 1.1.1.1
Bridge group: g1, bridge-domain: bd1, id: 0, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
ACs: 1 (1 up), VFIs: 1, PWs: 1 (1 up)
Neighbor 1.1.1.1 pw-id 1, state: up, Static MAC addresses: 0
The following sample output shows the summary information for the bridge domain:
RP/0/RP0/CPU0:router# show l2vpn bridge-domain summary
Number of groups: 1, bridge-domains: 1, Up: 1, Shutdown: 0
Number of ACs: 1 Up: 1, Down: 0
Number of PWs: 1 Up: 1, Down: 0
Table 100 describes the significant fields shown in the display.
Table 100 show l2vpn bridge-domain summary Field Descriptions
|
|
Number of groups |
Number of configured bridge domain groups is displayed. |
bridge-domains |
Number of configured bridge domains is displayed. |
Shutdown |
Number of bridge domains that are in Shutdown state is displayed. |
Number of ACs |
Number of attachment circuits that are in Up state and Down state are displayed. |
Number of PWs |
Number of pseudowires that are in Up state and Down state are displayed. This includes the VFI pseudowire and the access pseudowire. |
Related Commands
show l2vpn forwarding bridge-domain (VPLS)
To display information on the bridge that is used by the forwarding layer, use the show l2vpn forwarding bridge-domain command in EXEC mode.
show l2vpn forwarding bridge-domain [bridge-domain-name] {detail | hardware {egress | ingress}} {location node-id}
Syntax Description
bridge-domain-name |
(Optional) Name of a bridge domain. |
detail |
Displays all the detailed information on the attachment circuits and pseudowires. |
hardware |
Displays the hardware location entry. |
egress |
Reads information from the egress PSE. |
ingress |
Reads information from the ingress PSE. |
location node-id |
Displays the bridge-domain information for the specified location. The node-id argument is entered in the rack/slot/module notation. |
Defaults
No default behavior or values
Command Modes
EXEC
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
For each bridge, you can display summary information about the number of split-horizon groups, bridge ports, number of MAC addresses, and so forth.
The detail keyword displays detailed information on the attachment circuits and pseudowires, and is meant for field investigation by a specialized Cisco engineer.
Note All bridge ports in the bridge domain on that line card are displayed. Therefore, if the bridge domain contains non-local bridge ports, those are displayed as well.
Examples
The following sample output shows bridge-domain information for location 0/1/CPU0:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain location 0/1/CPU0
Bridge-Domain Name ID Ports addr Flooding Learning State
-------------------------------- ------ ----- ------ -------- -------- ---------
Bridge-domain name: g1:bd1, id: 0, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 2
Number of MAC addresses: 65536
Multi-spanning tree instance: 0
GigabitEthernet0/1/0/0, state: oper up
Sent(Packets/Bytes): 0/21838568
Received(Packets/Bytes): 5704781/444972918
Received(Packets/Bytes): 5703987/444910986
0 2 65536 Enabled Enabled UP
The following sample output shows detailed information for hardware location 0/1/CPU0 from the egress pse:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain hardware egress detail location
0/1/CPU0
Bridge-domain name: g1:bd1, id: 0, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 2
Number of MAC addresses: 65536
Multi-spanning tree instance: 0
================ GSR HW Information ================
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
Rewrite HW Address : 0x00060000
[ 0x04018180 04018190 040181a0 040181b0 ]
[ 0x04018170 00000000 80360000 000bfff4 ]
[ 0x00000000 00000000 00000000 00000000 ]
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
Base MGIDs for default mgid
MGID Entries for default mgid
-----------------------------------------------
-----------------------------------------------
Value: 0xc0 0x00 0x1f 0xff 0xff 0xff 0xff 0xff 0xfd
Mask : 0x00 0x00 0x1f 0xff 0xff 0xff 0xff 0xff 0xe0
====================================================
GigabitEthernet0/1/0/0, state: oper up
Sent(Packets/Bytes): 749/22989834
Received(Packets/Bytes): 5732104/447104112
================ GSR HW Information ================
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
unicast flooding enabled: 0
multicast flooding enabled: 0
broadcast flooding enabled: 0
-----------------------------------------------
-----------------------------------------------
Rewrite HW Address : 0x59eff314
HFA Bits 0x0 gp 0 mtu 1580 (REW)
OI 0x3fffc OutputQ 0 Output-port 0x36 local_outputq 0x0
[ 0x00000000 0036062c 0003fffc 00000000 ]
[ 0x00000000 00000000 0d103600 00000010 ]
[ 0x00000000 00000000 00000000 00000000 ]
-----------------------------------------------
-----------------------------------------------
oi[0]: 0x00000000 oq[0] 16384
oi[1]: 0x00000000 oq[1] 65535
oi[2]: 0x00000000 oq[2] 65535
oi[3]: 0x00000000 oq[3] 65535
oi[4]: 0x00000000 oq[4] 65535
oi[5]: 0x00000000 oq[5] 65535
oi[6]: 0x00000000 oq[6] 65535
oi[7]: 0x00000000 oq[7] 65535
-----------------------------------------------
-----------------------------------------------
====================================================
Received(Packets/Bytes): 5731250/447037500
================ GSR HW Information ================
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
-----------------------------------------------
oi[0]: 0x00000000 oq[0] 65535
oi[1]: 0x00000000 oq[1] 65535
oi[2]: 0x00000000 oq[2] 65535
oi[3]: 0x00000000 oq[3] 65535
oi[4]: 0x00000000 oq[4] 65535
oi[5]: 0x00000000 oq[5] 65535
oi[6]: 0x00000000 oq[6] 65535
oi[7]: 0x00000000 oq[7] 65535
-----------------------------------------------
-----------------------------------------------
====================================================
The following sample output shows the bridge-domain information for the specified location:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 location 0/1/CPU0
Bridge-Domain Name ID Ports addr Flooding Learning State
-------------------------------- ------ ----- ------ -------- -------- ---------
g1:bd1 0 2 65536 Enabled Enabled UP
The following sample output shows the hardware information for a specific bridge-domain on the Cisco CRS-1 router:
RP/0/RP0/CPU0:router#show l2vpn bridge-domain hardware
Bridge group: aa, bridge-domain name: g1, id:0
FGID Boardcast [version 1]:
Allocate_count: 2048, Retry_count: 0, Realloc_on: Off
Status_flag: (0x4) Replay-end
Bridge group: aa, bridge-domain name: g2, id:1
FGID Boardcast [version 1]:
Allocate_count: 2048, Retry_count: 0, Realloc_on: Off
Status_flag: (0x4) Replay-end
The following sample output shows the hardware information for the line card, for a specific bridge-domain on the ingress detail location, on the Cisco CRS-1 router:
RP/0/RP0/CPU0:router#show l2vpn forwarding bridge-domain hardware ingress detail location
0/2/CPU0
Bridge-domain name: aa:g1, id: 0, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 4
Number of MAC addresses: 0
Multi-spanning tree instance: 0
INGRESS BRIDGE [version, state]: [1, CREATED]
TCAM entry seq#: 1024 Key: [BID: 0 MAC: default]
HW: 0x4c000000 0x000080ac 0x00010000 0x80ac0100
SW: 0x4c000000 0x000080ac 0x00010000 0x80ac0100
SMAC: action: PUNT state: NO REFRESH
DMAC: action: FLOOD, flood_enable: enable
FGID: All: 44032, VFI: 44033, MCAST_Sponge_q: 16
Fabric_multicast1: 1 Fabric_multicast2: 1
Number of MAC addresses: 1 (0 MAC + 1 default)
ACL NAME (ACL-ID): VPLS Special (4096)
GigabitEthernet0/2/0/1.1, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
INGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 1 (0x1280001)
Bridge ID: 0, Split Horizon ID: 0
INGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [1] TCAM-Key: (UIDB:0x2 O-vlan:1 I-vlan:0 Ether-Type:0x8100)
HW: 0x24001000 0x01280001 0x10128000 0xc7ff7d00
SW: 0x24001000 0x01280001 0x10128000 0xc7ff7d00
Service type: 4 (bridging pmp)
Rewrite supported: 0 (No)
Interface handle: 0x128000
Ingress AC stats: 0x7ff7d
GigabitEthernet0/2/0/1.2, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
INGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 2 (0x1280002)
Bridge ID: 0, Split Horizon ID: 0
INGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [2] TCAM-Key: (UIDB:0x2 O-vlan:2 I-vlan:0 Ether-Type:0x8100)
HW: 0x24001000 0x01280002 0x10128002 0xc7ff7a00
SW: 0x24001000 0x01280002 0x10128002 0xc7ff7a00
Service type: 4 (bridging pmp)
Rewrite supported: 0 (No)
Interface handle: 0x128002
Ingress AC stats: 0x7ff7a
GigabitEthernet0/2/0/1.3, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
INGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 3 (0x1280003)
Bridge ID: 0, Split Horizon ID: 0
INGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [3] TCAM-Key: (UIDB:0x2 O-vlan:3 I-vlan:0 Ether-Type:0x8100)
HW: 0x24001000 0x01280003 0x10128004 0xc7ff7700
SW: 0x24001000 0x01280003 0x10128004 0xc7ff7700
Service type: 4 (bridging pmp)
Rewrite supported: 0 (No)
Interface handle: 0x128004
Ingress AC stats: 0x7ff77
packets: received 0, sent 0
bytes: received 0, sent 0
INGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 127/15/CPU0 : 1 (0xfff80001)
Bridge ID: 0, Split Horizon ID: 1
Control-word supported: No
Bridge-domain name: aa:g2, id: 1, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 2
Number of MAC addresses: 0
Multi-spanning tree instance: 0
INGRESS BRIDGE [version, state]: [1, CREATED]
TCAM entry seq#: 1025 Key: [BID: 1 MAC: default]
HW: 0x4c000000 0x000080ac 0x02010000 0x80ac0300
SW: 0x4c000000 0x000080ac 0x02010000 0x80ac0300
SMAC: action: PUNT state: NO REFRESH
DMAC: action: FLOOD, flood_enable: enable
FGID: All: 44034, VFI: 44035, MCAST_Sponge_q: 16
Fabric_multicast1: 1 Fabric_multicast2: 1
Number of MAC addresses: 1 (0 MAC + 1 default)
ACL NAME (ACL-ID): VPLS Special (4097)
GigabitEthernet0/2/0/1.4, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
INGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 4 (0x1280004)
Bridge ID: 1, Split Horizon ID: 0
INGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [4] TCAM-Key: (UIDB:0x2 O-vlan:4 I-vlan:0 Ether-Type:0x8100)
HW: 0x24003001 0x01280004 0x10128006 0xc7ff7400
SW: 0x24003001 0x01280004 0x10128006 0xc7ff7400
Service type: 4 (bridging pmp)
Rewrite supported: 0 (No)
Interface handle: 0x128006
Ingress AC stats: 0x7ff74
packets: received 0, sent 0
bytes: received 0, sent 0
INGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 127/15/CPU0 : 2 (0xfff80002)
Bridge ID: 1, Split Horizon ID: 1
Control-word supported: No
The following sample output shows the hardware information of the route processor, for a specific bridge-domain on the ingress detail location, on the Cisco CRS-1 router:
RP/0/RP0/CPU0:router#show l2vpn forwarding bridge-domain hardware ingress detail location
0/RP0/CPU0
Bridge-domain name: aa:g1, id: 0, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 4
Number of MAC addresses: 0
Multi-spanning tree instance: 0
BRIDGE [version, state]: [1, CREATED]
FGID1: 44032 NodeCount: 1 Info_len: 24 XID_count: 4
FGID2: 44033 NodeCount: 1 Info_len: 20 XID_count: 3
node-id: 0/2/CPU0 (0x21) RSI: 0x25 XID_count: 4
XID: 0x1280001 0x1280002 0x1280003 0xfff80001
node-id: 0/2/CPU0 (0x21) RSI: 0x25 XID_count: 3
XID: 0x1280001 0x1280002 0x1280003
GigabitEthernet0/2/0/1.1, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
AC [version, state]: [1, BOUND]
XID: 0x1280001 RSI: 0x25 Bridging: TRUE
GigabitEthernet0/2/0/1.2, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
AC [version, state]: [1, BOUND]
XID: 0x1280002 RSI: 0x25 Bridging: TRUE
GigabitEthernet0/2/0/1.3, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
AC [version, state]: [1, BOUND]
XID: 0x1280003 RSI: 0x25 Bridging: TRUE
Bridge-domain name: aa:g2, id: 1, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 2
Number of MAC addresses: 0
Multi-spanning tree instance: 0
BRIDGE [version, state]: [1, CREATED]
FGID1: 44034 NodeCount: 1 Info_len: 16 XID_count: 2
FGID2: 44035 NodeCount: 1 Info_len: 12 XID_count: 1
node-id: 0/2/CPU0 (0x21) RSI: 0x25 XID_count: 2
XID: 0x1280004 0xfff80002
node-id: 0/2/CPU0 (0x21) RSI: 0x25 XID_count: 1
GigabitEthernet0/2/0/1.4, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
AC [version, state]: [1, BOUND]
XID: 0x1280004 RSI: 0x25 Bridging: TRUE
The following sample output shows the hardware information of the line card, for a specific bridge-domain on the egress detail location, on the Cisco CRS-1 router:
RP/0/RP0/CPU0:router#show l2vpn forwarding bridge-domain hardware egress detail location
0/2/CPU0
Bridge-domain name: aa:g1, id: 0, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 4
Number of MAC addresses: 0
Multi-spanning tree instance: 0
EGRESS BRIDGE [version, state]: [1, CREATED]
BID: 0 Total_oif_count: 4
AC: oif_count: 3 head_ptr: 0x9ff6e4f8 tail_ptr: 0x9ff6e480
PW: oif_count: 1 head_ptr: 0x9ff6e570
PLU RESULT Key[Bridge-ID: 0]
HW: 0x04008000 0x000a01c0 0x00000000 0x00000000
SW: 0x04008000 0x000a01c0 0x00000000 0x00000000
OIF[0] seg_type: AC xid: 0x1280003 Gi0/2/0/1.3 (ifh: 0x1280042)
TLU RESULT tlu_addr: 0x3000a01 ch: 3 seg_type: 1
HW: 0x80000002 0x00ba0080 0x01280003 0x00000000
SW: 0x80000002 0x00ba0080 0x01280003 0x00000000
OIF[1] seg_type: AC xid: 0x1280002 Gi0/2/0/1.2 (ifh: 0x1280022)
TLU RESULT tlu_addr: 0x200ba00 ch: 2 seg_type: 1
HW: 0x80000002 0x000a00c0 0x01280002 0x00000000
SW: 0x80000002 0x000a00c0 0x01280002 0x00000000
OIF[2] seg_type: AC xid: 0x1280001 Gi0/2/0/1.1 (ifh: 0x1280002)
TLU RESULT tlu_addr: 0x3000a00 ch: 3 seg_type: 1
HW: 0x80000002 0x00ba0180 0x01280001 0x00000000
SW: 0x80000002 0x00ba0180 0x01280001 0x00000000
OIF[3] seg_type: PW xid: 0xfff80001 ecd_ptr: 0x5206
TLU RESULT tlu_addr: 0x200ba01 ch: 2 seg_type: 0
HW: 0x01005206 0x00000000 0xfff80001 0x03e86000
SW: 0x01005206 0x00000000 0xfff80001 0x03e86000
GigabitEthernet0/2/0/1.1, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
EGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 1 (0x1280001)
Bridge ID: 0, Split Horizon ID: 0
EGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [1] TLU2-entry-addr: [0x200a001]
HW: 0x8018b000 0x0000000b 0x00004001 0xfb7ba000
SW: 0x8018b000 0x0000000b 0x00004001 0xfb7ba000
Outer Ether Type: 0 (dot1q)
Default EgressQ (SharqQ): 11
Rewrite supported: 0 (No)
Control-word supported: 0 (No)
GigabitEthernet0/2/0/1.2, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
EGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 2 (0x1280002)
Bridge ID: 0, Split Horizon ID: 0
EGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [2] TLU2-entry-addr: [0x200a002]
HW: 0x8018b000 0x0000000b 0x00004002 0xfb7b4000
SW: 0x8018b000 0x0000000b 0x00004002 0xfb7b4000
Outer Ether Type: 0 (dot1q)
Default EgressQ (SharqQ): 11
Rewrite supported: 0 (No)
Control-word supported: 0 (No)
GigabitEthernet0/2/0/1.3, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
EGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 3 (0x1280003)
Bridge ID: 0, Split Horizon ID: 0
EGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [3] TLU2-entry-addr: [0x200a003]
HW: 0x8018b000 0x0000000b 0x00004003 0xfb7ae000
SW: 0x8018b000 0x0000000b 0x00004003 0xfb7ae000
Outer Ether Type: 0 (dot1q)
Default EgressQ (SharqQ): 11
Rewrite supported: 0 (No)
Control-word supported: 0 (No)
packets: received 0, sent 0
bytes: received 0, sent 0
EGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 127/15/CPU0 : 1 (0xfff80001)
Bridge ID: 0, Split Horizon ID: 1
Control-word supported: No
Bridge-domain name: aa:g2, id: 1, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 2
Number of MAC addresses: 0
Multi-spanning tree instance: 0
EGRESS BRIDGE [version, state]: [1, CREATED]
BID: 1 Total_oif_count: 2
AC: oif_count: 1 head_ptr: 0x9ff6e534 tail_ptr: 0x9ff6e534
PW: oif_count: 1 head_ptr: 0x9ff6e5ac
PLU RESULT Key[Bridge-ID: 1]
HW: 0x04004000 0x000a02c0 0x00000000 0x00000000
SW: 0x04004000 0x000a02c0 0x00000000 0x00000000
OIF[0] seg_type: AC xid: 0x1280004 Gi0/2/0/1.4 (ifh: 0x1280062)
TLU RESULT tlu_addr: 0x3000a02 ch: 3 seg_type: 1
HW: 0x80000002 0x00ba0280 0x01280004 0x00000000
SW: 0x80000002 0x00ba0280 0x01280004 0x00000000
OIF[1] seg_type: PW xid: 0xfff80002 ecd_ptr: 0x5200
TLU RESULT tlu_addr: 0x200ba02 ch: 2 seg_type: 0
HW: 0x01005200 0x00000000 0xfff80002 0x03e88000
SW: 0x01005200 0x00000000 0xfff80002 0x03e88000
GigabitEthernet0/2/0/1.4, state: oper up
packets: received 0, sent 0
bytes: received 0, sent 0
EGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 4 (0x1280004)
Bridge ID: 1, Split Horizon ID: 0
EGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [4] TLU2-entry-addr: [0x200a004]
HW: 0x8018b000 0x0000000b 0x00004004 0xfb7a8000
SW: 0x8018b000 0x0000000b 0x00004004 0xfb7a8000
Outer Ether Type: 0 (dot1q)
Default EgressQ (SharqQ): 11
Rewrite supported: 0 (No)
Control-word supported: 0 (No)
packets: received 0, sent 0
bytes: received 0, sent 0
EGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 127/15/CPU0 : 2 (0xfff80002)
Bridge ID: 1, Split Horizon ID: 1
Control-word supported: No
Table 101 describes the significant fields shown in the display.
Table 101 show l2vpn forwarding bridge-domain Field Descriptions
|
|
Bridge-Domain Name |
Name of bridge domain is displayed. |
Bridge ID |
ID assigned to this bridge domain is displayed. |
Ports |
Number of ports that are part of this bridge domain is displayed. |
MAC Addr |
Number of MAC addresses that are learned on this bridge domain is displayed. |
Flooding |
Flooding of packets are displayed if they are enabled on this bridge domain. |
Learning |
Learning of MAC addresses are displayed if they are enabled on this bridge domain. |
State |
Current state of the bridge domain is displayed. |
Related Commands
show l2vpn forwarding bridge-domain mac-address (VPLS)
To display the summary information for the MAC address, use the show l2vpn forwarding bridge-domain mac-address command in EXEC mode.
show l2vpn forwarding bridge-domain [bridge-domain-name] mac-address {MAC address | detail | hardware {egress | ingress} | interface type interface-path-id | neighbor address {pw-id pw-id}} {location node-id}
Syntax Description
bridge-domain-name |
(Optional) Name of a bridge domain. |
MAC address |
MAC address. |
detail |
Displays detailed information for the MAC address. |
hardware |
Reads information from the hardware. |
egress |
Reads information from the egress PSE. |
ingress |
Reads information from the ingress PSE. |
interface |
Displays the match for the attachment circuit subinterface. |
type |
Interface type. For more information, use the question mark (?) online help function. |
interface-path-id |
Physical interface or a virtual interface. Note Use the show interfaces command to see a list of all possible interfaces currently configured on the router. For more information about the syntax for the router, use the question mark (?) online help function. |
neighbor address |
Displays the match for the neighbor IP address. |
pw-id pw-id |
Displays the match for the pseudowire ID. |
location node-id |
Displays the bridge-domain information for the MAC address of the specified location. The node-id argument is entered in the rack/slot/module notation. |
Defaults
No default behavior or values
Command Modes
EXEC
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Examples
The following sample output shows the specified location of the bridge-domain name g1:bd1 for the MAC address:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 location 0/1/CPU0
Bridge-Domain Name ID Ports addr Flooding Learning State
-------------------------------- ------ ----- ------ -------- -------- ---------
g1:bd1 0 2 65536 Enabled Enabled UP
The following sample output shows the list of MAC addresses that are learned on a specified bridge and summary information for the addresses:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain mac-address location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age
--------------------------------------------------------------------------------
0000.0000.0000 static Gi0/1/0/0 N/A N/A
0000.0001.0101 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0102 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0103 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0104 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0105 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0106 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0107 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0108 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0109 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.010a dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.010b dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.010c dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.010d dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.010e dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.010f dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0110 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0111 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
0000.0001.0112 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 22s
The following sample output shows the MAC address on a specified interface on a specified bridge:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 mac-address 1.2.3
location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age
--------------------------------------------------------------------------------
0001.0002.0003 static Gi0/1/0/0 N/A N/A
The following sample output shows the hardware information for a MAC address:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 mac-address location
0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age
--------------------------------------------------------------------------------
0000.0000.0000 static Gi0/1/0/0 N/A N/A
0000.0001.0101 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0102 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0103 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0104 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0105 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0106 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0107 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0108 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0109 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.010a dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.010b dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.010c dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.010d dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.010e dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.010f dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0110 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0111 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0112 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0113 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
0000.0001.0114 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 24s
The following sample output shows the MAC addresses that are learned on a specified pseudowire on a specified bridge:
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain mac-address neighbor 1.1.1.1
pw-id 1 location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age
--------------------------------------------------------------------------------
0000.0003.0101 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0102 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0103 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0104 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0105 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0106 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0107 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0108 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0109 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.010a dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.010b dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.010c dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.010d dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.010e dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.010f dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0110 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0111 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0112 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0113 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0114 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
0000.0003.0115 dynamic 1.1.1.1, 1 0/1/CPU0 0d 0h 0m 30s
The following sample output shows the detailed information for MAC addresses that are learned on a specified interface and on specified bridge of a specified interface card. The sample output lists all the MAC addresses, the learned location, and the current age.
RP/0/RP0/CPU0:router# show l2vpn forwarding bridge-domain g1:bd1 mac-address interface
gigabitEthernet 0/1/0/0 location 0/1/CPU0
Mac Address Type Learned from/Filtered on LC learned Age
--------------------------------------------------------------------------------
0000.0000.0000 static Gi0/1/0/0 N/A N/A
0000.0001.0101 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0102 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0103 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0104 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0105 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0106 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0107 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0108 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0109 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.010a dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.010b dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.010c dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.010d dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.010e dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.010f dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0110 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0111 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0112 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0113 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
0000.0001.0114 dynamic Gi0/1/0/0 0/1/CPU0 0d 0h 2m 14s
The following sample output shows the MAC address hardware information on the line card, for a specific bridge-domain on the ingress detail location, on the Cisco CRS-1 router:
RP/0/RP0/CPU0:router#show l2vpn forwarding bridge-domain mac hardware ingress detail
location 0/2/CPU0
Bridge-domain name: aa:g1, id: 0, state: up
Broadcast & Multicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
DHCPv4 snooping: profile not known on this node
Number of bridge ports: 4
Number of MAC addresses: 10
Multi-spanning tree instance: 0
INGRESS BRIDGE [version, state]: [1, CREATED]
TCAM entry seq#: 1024 Key: [BID: 0 MAC: default]
HW: 0x4c000000 0x000080ac 0x00010000 0x80ac0100
SW: 0x4c000000 0x000080ac 0x00010000 0x80ac0100
SMAC: action: PUNT state: NO REFRESH
DMAC: action: FLOOD, flood_enable: enable
FGID: All: 44032, VFI: 44033, MCAST_Sponge_q: 16
Fabric_multicast1: 1 Fabric_multicast2: 1
Number of MAC addresses: 11 (10 MAC + 1 default)
ACL NAME (ACL-ID): VPLS Special (4096)
GigabitEthernet0/2/0/1.1, state: oper up
packets: received 0, sent 121515
bytes: received 0, sent 7290900
INGRESS BRIDGE PORT [version, state]: [1, BOUND]
XID: 0/2/CPU0 : 1 (0x1280001)
Bridge ID: 0, Split Horizon ID: 0
INGRESS AC [version, state]: [1, BOUND]
Xconnect-ID: [1] TCAM-Key: (UIDB:0x2 O-vlan:1 I-vlan:0 Ether-Type:0x8100)
HW: 0x24001000 0x01280001 0x10128000 0xc7ff7d00
SW: 0x24001000 0x01280001 0x10128000 0xc7ff7d00
Service type: 4 (bridging pmp)
Rewrite supported: 0 (No)
Interface handle: 0x128000
Ingress AC stats: 0x7ff7d
Mac Address: 0000.0022.2222, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
INGRESS MAC [version, state]: [1, CREATED]
TCAM entry seq#: 0 Key: [BID: 0 MAC: 0000.0022.2222]
HW: 0x22004c00 0x00000001 0x00000000 0x01280001
SW: 0x22004c00 0x00000001 0x00000000 0x01280001
SMAC: action: FWD state: REFRESH
XID: 0/2/CPU0 : 1 (0x1280001)
DMAC: action: FWD, BridgePort type: AC
Control-word supported: No
Destination AC: Gi0/2/0/1.1 (ifh: 0x1280002)
[HW: 0x00000000 0x00013c00 0x00000000 0x00000100]
label: 0 num of labels: 0
entry type: FWD next ptr: 0x00013c00
[HW: 0x00000008 0x00000000 0x00001000 0x00ba0000]
num of labels: 1 next ptr: 0x0000ba00
[HW: 0x00010000 0x00000000 0x00000000 0x000c0000]
[HW: 0x00000000 0x20082000 0x01280040 0x00020000]
Mac Address: 0000.0022.2223, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
INGRESS MAC [version, state]: [1, CREATED]
TCAM entry seq#: 1 Key: [BID: 0 MAC: 0000.0022.2223]
HW: 0x22004c00 0x00000001 0x00000000 0x01280001
SW: 0x22004c00 0x00000001 0x00000000 0x01280001
SMAC: action: FWD state: REFRESH
XID: 0/2/CPU0 : 1 (0x1280001)
DMAC: action: FWD, BridgePort type: AC
Control-word supported: No
Destination AC: Gi0/2/0/1.1 (ifh: 0x1280002)
[HW: 0x00000000 0x00013c00 0x00000000 0x00000100]
label: 0 num of labels: 0
entry type: FWD next ptr: 0x00013c00
[HW: 0x00000008 0x00000000 0x00001000 0x00ba0000]
num of labels: 1 next ptr: 0x0000ba00
[HW: 0x00010000 0x00000000 0x00000000 0x000c0000]
[HW: 0x00000000 0x20082000 0x01280040 0x00020000]
Mac Address: 0000.0022.2224, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
INGRESS MAC [version, state]: [1, CREATED]
TCAM entry seq#: 2 Key: [BID: 0 MAC: 0000.0022.2224]
HW: 0x22004c00 0x00000001 0x00000000 0x01280001
SW: 0x22004c00 0x00000001 0x00000000 0x01280001
SMAC: action: FWD state: REFRESH
XID: 0/2/CPU0 : 1 (0x1280001)
DMAC: action: FWD, BridgePort type: AC
Control-word supported: No
Destination AC: Gi0/2/0/1.1 (ifh: 0x1280002)
[HW: 0x00000000 0x00013c00 0x00000000 0x00000100]
label: 0 num of labels: 0
entry type: FWD next ptr: 0x00013c00
[HW: 0x00000008 0x00000000 0x00001000 0x00ba0000]
num of labels: 1 next ptr: 0x0000ba00
[HW: 0x00010000 0x00000000 0x00000000 0x000c0000]
[HW: 0x00000000 0x20082000 0x01280040 0x00020000]
Mac Address: 0000.0022.2225, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
INGRESS MAC [version, state]: [1, CREATED]
TCAM entry seq#: 3 Key: [BID: 0 MAC: 0000.0022.2225]
HW: 0x22004c00 0x00000001 0x00000000 0x01280001
SW: 0x22004c00 0x00000001 0x00000000 0x01280001
SMAC: action: FWD state: REFRESH
XID: 0/2/CPU0 : 1 (0x1280001)
DMAC: action: FWD, BridgePort type: AC
Control-word supported: No
Destination AC: Gi0/2/0/1.1 (ifh: 0x1280002)
[HW: 0x00000000 0x00013c00 0x00000000 0x00000100]
label: 0 num of labels: 0
entry type: FWD next ptr: 0x00013c00
[HW: 0x00000008 0x00000000 0x00001000 0x00ba0000]
num of labels: 1 next ptr: 0x0000ba00
[HW: 0x00010000 0x00000000 0x00000000 0x000c0000]
[HW: 0x00000000 0x20082000 0x01280040 0x00020000]
Mac Address: 0000.0022.2226, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
INGRESS MAC [version, state]: [1, CREATED]
TCAM entry seq#: 4 Key: [BID: 0 MAC: 0000.0022.2226]
HW: 0x22004c00 0x00000001 0x00000000 0x01280001
SW: 0x22004c00 0x00000001 0x00000000 0x01280001
SMAC: action: FWD state: REFRESH
XID: 0/2/CPU0 : 1 (0x1280001)
DMAC: action: FWD, BridgePort type: AC
Control-word supported: No
Destination AC: Gi0/2/0/1.1 (ifh: 0x1280002)
[HW: 0x00000000 0x00013c00 0x00000000 0x00000100]
label: 0 num of labels: 0
entry type: FWD next ptr: 0x00013c00
[HW: 0x00000008 0x00000000 0x00001000 0x00ba0000]
num of labels: 1 next ptr: 0x0000ba00
[HW: 0x00010000 0x00000000 0x00000000 0x000c0000]
[HW: 0x00000000 0x20082000 0x01280040 0x00020000]
Mac Address: 0000.0022.2227, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
INGRESS MAC [version, state]: [1, CREATED]
TCAM entry seq#: 5 Key: [BID: 0 MAC: 0000.0022.2227]
HW: 0x22004c00 0x00000001 0x00000000 0x01280001
SW: 0x22004c00 0x00000001 0x00000000 0x01280001
SMAC: action: FWD state: REFRESH
XID: 0/2/CPU0 : 1 (0x1280001)
DMAC: action: FWD, BridgePort type: AC
Control-word supported: No
Destination AC: Gi0/2/0/1.1 (ifh: 0x1280002)
[HW: 0x00000000 0x00013c00 0x00000000 0x00000100]
label: 0 num of labels: 0
entry type: FWD next ptr: 0x00013c00
[HW: 0x00000008 0x00000000 0x00001000 0x00ba0000]
num of labels: 1 next ptr: 0x0000ba00
[HW: 0x00010000 0x00000000 0x00000000 0x000c0000]
[HW: 0x00000000 0x20082000 0x01280040 0x00020000]
Mac Address: 0000.0022.2228, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
INGRESS MAC [version, state]: [1, CREATED]
TCAM entry seq#: 6 Key: [BID: 0 MAC: 0000.0022.2228]
HW: 0x22004c00 0x00000001 0x00000000 0x01280001
SW: 0x22004c00 0x00000001 0x00000000 0x01280001
SMAC: action: FWD state: REFRESH
XID: 0/2/CPU0 : 1 (0x1280001)
DMAC: action: FWD, BridgePort type: AC
Control-word supported: No
Destination AC: Gi0/2/0/1.1 (ifh: 0x1280002)
[HW: 0x00000000 0x00013c00 0x00000000 0x00000100]
label: 0 num of labels: 0
entry type: FWD next ptr: 0x00013c00
[HW: 0x00000008 0x00000000 0x00001000 0x00ba0000]
num of labels: 1 next ptr: 0x0000ba00
[HW: 0x00010000 0x00000000 0x00000000 0x000c0000]
[HW: 0x00000000 0x20082000 0x01280040 0x00020000]
Mac Address: 0000.0022.2229, LC learned: 0/2/CPU0
Age: 0d 0h 0m 21s, Flag: local
Related Commands
shutdown (Bridge Domain)
To shut down a bridge domain to bring the bridge and all attachment circuits and pseudowires under it to admin down state, use the shutdown command in l2vpn bridge group bridge domain configuration mode. To re-enable the bridge domain, use the no form of this command.
shutdown
no shutdown
Syntax Description
This command has no arguments or keywords.
Defaults
By default, the bridge is not shutdown.
Command Modes
l2vpn bridge group bridge domain configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
When a bridge domain is disabled, all VFIs associated with the bridge domain are disabled. You can still attach or detach members to or from the bridge domain as well as the VFIs associated with the bridge domain.
Examples
The following example shows how to disable the bridge domain named bar:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# shutdown
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
shutdown (VFI)
To disable virtual forwarding interface (VFI), use the shutdown command in l2vpn bridge group bridge domain VFI configuration mode. To re-enable VFI, use the no form of this command.
shutdown
no shutdown
Syntax Description
This command has no arguments or keywords.
Defaults
By default, the VFI is not shutdown.
Command Modes
l2vpn bridge group bridge domain VFI configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Examples
The following example shows how to disable VFI:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# shutdown
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mpls static label (VPLS) |
Configures the MPLS static labels and the static labels for the access pseudowire configuration. |
neighbor (VPLS) |
Adds an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI). |
static-address (VPLS)
To add static entries to the MAC address for filtering, use the static-address command in l2vpn bridge group bridge domain MAC configuration mode. To remove entries profiled by the combination of a specified entry information, use the no form of this command.
static -address MAC address {drop}
no static -address MAC address {drop}
Syntax Description
MAC address |
Static MAC address that is used to filter on the bridge domain. |
drop |
Drops all traffic that is going to the configured MAC address. |
Defaults
No static MAC address is configured.
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Examples
The following example shows how to add static MAC entries in l2vpn bridge group bridge domain MAC configuration mode. This entry causes all packets with destination MAC address 1.1.1 to be dropped.
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# static-address 1.1.1 drop
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
static-mac-address (VPLS)
To configure the static MAC address to associate a remote MAC address with a pseudowire or any other bridge interface, use the static-mac-address command in the appropriate l2vpn bridge group bridge domain configuration submode. To disable this feature, use the no form of this command.
static-mac-address MAC address
no static-mac-address MAC address
Syntax Description
MAC address |
Static address to add to the MAC address. |
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain VFI pseudowire configuration
l2vpn bridge group bridge domain attachment circuit configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Examples
The following example shows how to associate a remote MAC address with a pseudowire:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi model
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)# neighbor 10.1.1.2 pw-id 1000
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi-pw)# static-mac-address 1.1.1
The following example shows how to associate a GigabitEthernet interface from a bridge domain to static MAC address 1.1.1:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# interface GigabitEthernet 0/1/0/0
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-ac)# static-mac-address 1.1.1
The following example shows how to associate an access pseudowire to static MAC address 2.2.2:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# neighbor 10.1.1.2 pw-id 2000
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-pw)# static-mac-address 2.2.2
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mpls static label (VPLS) |
Configures the MPLS static labels and the static labels for the access pseudowire configuration. |
neighbor (VPLS) |
Adds an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI). |
vfi (VPLS) |
Configures virtual forwarding interface (VFI) parameters and enters l2vpn bridge group bridge domain VFI configuration mode. |
time (VPLS)
To configure the maximum aging time, use the time command in l2vpn bridge group bridge domain MAC aging configuration mode. To disable this feature, use the no form of this command.
time seconds
no time seconds
Syntax Description
seconds |
MAC address table entry maximum age. The range is from 120 to 1000000 seconds. Aging time is counted from the last time that the switch saw the MAC address. The default value is 300 seconds. |
Defaults
seconds: 300
Command Modes
l2vpn bridge group bridge domain MAC aging configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
If no packets are received from the MAC address for the duration of the maximum aging time, the dynamic MAC entry previously learned is removed from the forwarding table.
Examples
The following example shows how to increase the maximum aging time to 600 seconds. After 600 seconds of inactivity from a MAC address, the MAC address is removed form the forwarding table.
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# aging
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-aging)# time 600
Related Commands
|
|
aging (VPLS) |
Enters MAC aging configuration submode to set the aging parameters such as time and type. |
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
type (VPLS) |
Configures the type for MAC address aging. |
type (VPLS)
To configure the type for MAC address aging, use the type command in l2vpn bridge group bridge domain MAC aging configuration mode. To disable this feature, use the no form of this command.
type {absolute | inactivity}
no type {absolute | inactivity}
Syntax Description
absolute |
Configures the absolute aging type. |
inactivity |
Configures the inactivity aging type. |
Defaults
By default, the inactivity type is configured.
Command Modes
l2vpn bridge group bridge domain MAC aging configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
In general, the type is set to inactivity. With an inactivity type configuration, a MAC address is removed from the forwarding table after the MAC address is inactive for the configured aging time.
With an absolute type configuration, a MAC address is always removed from the forwarding table after the aging time has elapsed once it is initially learned.
Examples
The following example shows how to configure the MAC address aging type to absolute for every member of the bridge domain named bar:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac)# aging
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-mac-aging)# type absolute
Related Commands
|
|
aging (VPLS) |
Enters MAC aging configuration submode to set the aging parameters such as time and type. |
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |
time (VPLS) |
Configures the maximum aging time. |
vfi (VPLS)
To configure virtual forwarding interface (VFI) parameters and to enter l2vpn bridge group bridge domain VFI configuration mode, use the vfi command in l2vpn bridge group bridge domain configuration mode. To remove all configurations that are made under the specified VFI, use the no form of this command.
vfi vfi name
no vfi vfi name
Syntax Description
vfi name |
Name of the specified virtual forwarding interface. |
Defaults
No default behavior or values
Command Modes
l2vpn bridge group bridge domain configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
This command was supported on the Cisco CRS-1. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Use the vfi command to enter l2vpn bridge group bridge domain VFI configuration mode.
On the Cisco XR 12000 Series Router, you cannot configure a pseudowire directly under a bridge domain. Therefore, a psuedowire must be configured under a VFI, which is configured under a bridge domain.
Examples
The following example shows how to create a VFI:
RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# l2vpn
RP/0/RP0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/RP0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd)# vfi v1
RP/0/RP0/CPU0:router(config-l2vpn-bg-bd-vfi)#
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mpls static label (VPLS) |
Configures the MPLS static labels and the static labels for the access pseudowire configuration. |
neighbor (VPLS) |
Adds an access pseudowire port to a bridge domain or a pseudowire to a bridge virtual forwarding interface (VFI). |
withdrawal (VPLS)
To enable MAC address withdrawal for a specified bridge domain, use the withdrawal command in l2vpn bridge group bridge domain MAC configuration mode. To disable this feature, use the no form of this command.
withdrawal
no withdrawal
Syntax Description
This command has no arguments or keywords.
Defaults
By default, MAC address withdrawal is disabled.
Command Modes
l2vpn bridge group bridge domain MAC configuration
Command History
|
|
Release 3.7.0 |
This command was introduced on the Cisco XR 12000 Series Router. |
Release 3.8.0 |
No modification. |
Usage Guidelines
To use this command, your Cisco IOS XR software system administrator must assign you to a user group associated with a task group that includes the corresponding command task IDs. If you need assistance with your task group assignment, contact your system administrator. For detailed information about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide.
Cisco IOS XR supports only the wildcard MAC address withdrawal.
Examples
The following example shows how to enable MAC withdrawal:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# l2vpn
RP/0/0/CPU0:router(config-l2vpn)# bridge group 1
RP/0/0/CPU0:router(config-l2vpn-bg)# bridge-domain bar
RP/0/0/CPU0:router(config-l2vpn-bg-bd)# mac
RP/0/0/CPU0:router(config-l2vpn-bg-bd-mac)# withdrawal
Related Commands
|
|
bridge-domain (VPLS) |
Establishes a bridge domain and enters l2vpn bridge group bridge domain configuration mode. |
bridge group (VPLS) |
Creates a bridge group so that it can contain bridge domains and then assigns network interfaces to the bridge domain. |
l2vpn |
Enters L2VPN configuration mode. |
mac (VPLS) |
Enters l2vpn bridge group bridge domain MAC configuration mode. |