Working with MPLS-TP Tunnels
MPLS-Transport Profile (MPLS-TP) is considered to be the next generation transport for those using SONET/SDH TDM technologies as they migrate to packet-switching technology. Although still under definition by the IETF, MPLS-TP provides:
- Predetermined and long-lived connections.
- Emphasis on manageability and deterministic behavior.
- Fast fault detection and recovery.
- Inband OAM.
MPLS-TP features include:
- Manually provisioned MPLS-TP LSPs.
- Reserved bandwidth for static MPLS-TP LSPs.
- One-to-one path protection for MPLS-TP LSPs.
- Working/Protected LSP switchover.
- Continuity Check (CC), Proactive Continuity Verification (CV), and Remote Defect Indication (RDI) based on BFD.
- New fault OAM functions resulting from the MPLS-TP standardization effort.
Prime Network automatically discovers network MPLS-TP tunnels from end to end, including LSPs, tunnel endpoints, and bandwidth. Network LSPs contain LSP endpoints and midpoints and are identified as working or protected.
Prime Network links the MPLS-TP tunnel components appropriately, provides a visual representation in Vision client maps, and displays the properties in logical inventory.
Prime Network employs warm start technology when rebooting. That is, when rebooting, Prime Network compares existing MPLS-TP tunnel information to topology changes that occur while Prime Network is down and updates MPLS-TP tunnel accordingly when Prime Network returns to operation.
The following options are available for working with MPLS-TP tunnels in the Vision client:
Adding an MPLS-TP Tunnel
Prime Network automatically discovers MPLS-TP tunnels, endpoints, and midpoints and enables you to add MPLP-TP tunnels to maps.
To add an MPLS-TP tunnel to a map:
Step 1
In the Vision client, display the map to which you want to add the MPLS-TP tunnel.
Step 2
Do either of the following:
- From the File menu, choose Add to Map > MPLS-TP Tunnel.
- In the main toolbar, click Add to Map, then choose Add to Map > MPLS-TP Tunnel.
The Add MPLS-TP Tunnel dialog box is displayed.
Step 3
Do either of the following:
- Choose a search category, enter a search string, then click Go to narrow search results to a range of MPLS-TP tunnels or a specific MPLS-TP tunnel. Search categories include:
–
Description
–
Name
–
System Name
- Choose Show All to display all the MPLS-TP tunnels.
Step 4
Select the MPLS-TP tunnel that you want to add to the map.
Step 5
Click OK.
The MPLS-TP tunnel is added to the map and to the navigation pane.
In Figure 17-3:
- The devices are on the left side of the map, and the MPLS-TP tunnel is displayed in a thumbnail on the right.
- The devices are connected to each other and to the MPLS-TP tunnel via tunnels.
- Physical links connect the devices to the Working and Protected LSPs.
- A redundancy service badge is displayed next to the Protected LSP in the navigation and map panes.
- In the thumbnail:
–
The tunnel endpoints are connected to each other via a tunnel.
–
A physical link connects the Working and Protected LSPs.
–
Business links connect the Working and Protected LSPs to each endpoint.
Figure 17-3 MPLS-TP Tunnel in Vision Map
If an LSP is in lockout state, it is displayed with the lock badge (
).
By expanding all aggregations in the MPLS-TP tunnel (see Figure 17-4), you can see components and links in the MPLS-TP tunnel, including:
- MPLS-TP tunnel endpoints
- LSP endpoints
- LSP midpoints
Figure 17-4 MPLS-TP Tunnel Expanded
If an LSP is configured for redundancy service, a redundancy service badge is applied to the secondary (backup) LSP in the navigation and map panes in the navigation and map panes.
For more information about LSP redundancy service, see Viewing LSP Endpoint Redundancy Service Properties.
Viewing MPLS-TP Tunnel Properties
Prime Network discovers and displays MPLS-TP attributes in the MPLS-TP branch in logical inventory as described in this topic.
Additional information about MPLS-TP tunnel properties are available in the following branches:
To view MPLS-TP tunnel properties:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > MPLS-TP > MPLS-TP Global.
The routing information is displayed as shown in Figure 17-5.
Figure 17-5 MPLS-TP Tunnel Properties in Logical Inventory
Table 17-3 describes the information that is available for MPLS-TP tunnels. The information that is displayed depends on the configuration.
Table 17-3 MPLS-TP Tunnel Properties in Logical Inventory
|
|
Global ID |
Globally unique Attachment Interface Identifier (AII) for MPLS-TP derived from the Autonomous System Number (ASN) of the system hosting the PEs. |
Router ID |
MPLS-TP source node identifier for this element in the form of an IPv4 address. |
Protection Mode |
Whether the transmitting endpoint is in revertive or nonrevertive mode:
- Revertive—If the protection mode is revertive and a failed path is restored, the traffic automatically returns, or reverts, to the original path.
- Nonrevertive—If the protection mode is nonrevertive and a failed path is restored, the traffic does not return to the original path. That is, the traffic does not revert to the original path.
|
Redundancy Mode |
Level of redundancy for the MPLS-TP tunnel: 1:1, 1+1, or 1:N. |
MPLS-TP Tunnel Endpoints Tab
|
ID |
Tunnel endpoint identifier as a Tunnel-tp interface on the selected network element. |
Tunnel ID |
Unique tunnel identifier. |
Admin Status |
Administrative status of the tunnel: Up or Down. |
Oper Status |
Operational status of the tunnel: Up or Down. |
Bandwidth (kbps) |
Configured bandwidth (in Kb/s) for the tunnel. |
Description |
Tunnel description. |
|
Link ID |
Identifier assigned to the MPLS-TP interface. |
Interface |
Hyperlink to the interface in physical inventory. |
Next Hop |
IP address of the next hop in the path. |
|
LSP ID |
LSP identifier, derived from both endpoint identifiers and using the format src-node-ID :: src-tunnel-number :: dest-node-ID :: dest-tunnel-number where:
- src-node-ID represents the identifier of the node originating the signal exchange.
- src-tunnel-number represents source tunnel identifier.
- dest-node-ID represents the identifier of the target node.
- dest-tunnel-number represents the destination tunnel identifier.
|
LSP Type |
Indicates whether the LSP is active (Working) or backup (Protect). |
In Label |
Incoming label identifier. |
Out Label |
Outgoing label identifier. |
Out Interface |
Outgoing interface hyperlinked to the relevant entry in physical inventory. |
Bandwidth (kbps) |
Bandwidth specification in Kb/s. |
Role (Oper Status) |
Role of the LSP endpoint (Active or Standby) with the operational status (UP or DOWN). |
|
LSP ID |
LSP identifier, derived from both endpoint identifiers and using the format src-node-ID :: src-tunnel-number :: dest-node-ID :: dest-tunnel-number where:
- src-node-ID represents the identifier of the node originating the signal exchange.
- src-tunnel-number represents source tunnel identifier.
- dest-node-ID represents the identifier of the target node.
- dest-tunnel-number represents the destination tunnel identifier.
|
LSP Type |
Indicates whether the LSP is active (Working) or backup (Protect). |
Forward In Label |
Incoming label identifier in the forward direction (source to destination). |
Forward Out Label |
Label selected by the next hop device in the forward direction. |
Reverse In Label |
Incoming label identifier in the reverse direction (destination to source). |
Reverse Out Label |
Label selected by the next hop device in the reverse direction. |
Forward Out Interface |
Outgoing interface in the forward direction, hyperlinked to its entry in physical inventory. |
Forward Bandwidth (kbps) |
Bandwidth specification in Kb/s for the forward direction. |
Reverse Out Link ID |
Link identifier assigned to the outgoing interface in the reverse direction. |
Reverse Out Interface |
Outgoing interface in the reverse direction, hyperlinked to its entry in physical inventory. |
Reverse Bandwidth |
Bandwidth specification in Kb/s for the reverse direction. |
Internal ID |
Identifier associated with the parent entity of the link. Using an internal identifier ensures that individual LSP links do not participate in multiple network LSPs. |
Step 3
To view additional MPLS-TP tunnel endpoint properties, double-click the required entry in the MPLS-TP Tunnel Endpoints table.
The MPLS-TP Tunnel Properties window is displayed as shown in Figure 17-6.
Figure 17-6 MPLS-TP Tunnel Properties Window
Table 17-4 describes the information available in the top portion of the MPLS-TP Tunnel Properties window. For information about the tabs that are displayed, see Table 17-3 .
Table 17-4 MPLS-TP Tunnel Properties Window
|
|
Tunnel ID |
Unique tunnel identifier. |
Peer Tunnel ID |
Unique identifier of peer tunnel. |
Bandwidth (kbps) |
Configured bandwidth (in Kb/s) for the tunnel. |
Admin Status |
Administrative status of the tunnel: Up or Down. |
Oper Status |
Operational status of the tunnel: Up or Down. |
Local Info |
MPLS-TP source node identifier for this element in the form of an IPv4 address. |
Peer Info |
MPLS-TP peer node identifier in the form of an IPv4 address. |
Global ID |
Globally unique Attachment Interface Identifier (AII) for MPLS-TP derived from the Autonomous System Number (ASN) of the system hosting the PEs. |
Peer Global ID |
Globally unique AII for the peer. |
Working LSP Number |
Number assigned to the working LSP. By default, the working LSP number is 0 and the protected LSP number is 1. |
Protect LSP Number |
Number assigned to the protected LSP. By default, the working LSP number is 0 and the protected LSP number is 1. |
BFD Template |
BFD template associated with this MPLS-TP tunnel. |
Working LSP BFD State |
Configured state of the working LSP BFD template: Up or Down. |
Protect LSP BFD State |
Configured state of the protected LSP BFD template: Up or Down. |
Working LSP Fault OAM |
Indicates that a fault has been detected on the working LSP. |
Protect LSP Fault OAM |
Indicates that a fault has been detected on the protected LSP. |
Tunnel Name |
Tunnel name. |
Adjacent |
Hyperlink to the adjacent endpoint in logical inventory. |
Viewing LSPs Configured on an Ethernet Link
A single Ethernet link can support a number of LSPs. The Vision client enables you to view all LSPs on a single Ethernet link and to identify the source and destination labels.
To view LSPs configured on an Ethernet link:
Step 1
In the map view, right-click the required link and choose Properties.
Step 2
In the link properties window, choose the required Ethernet link.
The link properties window refreshes and displays the Labels button as shown in Figure 17-7.
Figure 17-7 Link Properties Window with All Labels Button
Step 3
Click Labels.
The All Labels window is displayed as shown in Figure 17-8 with the LSP sources and destinations.
Figure 17-8 All Labels Table
Step 4
To identify a specific path, click an outgoing label in the Source table. The corresponding in label is selected in the Destination table.
Viewing MPLS-TE and P2MP-MPLS-TE links in a map
Using the link filter available in Prime Network, you can view only the MPLS-TE and P2MP-MPLS-TE links in a map.
Note
The MPLS Point-to-Multipoint Traffic Engineering (P2MP TE) feature enables you to forward Multiprotocol Label Switching (MPLS) traffic from one source to multiple destinations.
To view the MPLS-TE and P2MP-MPLS-TE links in a map:
Step 1
Open the required map.
Step 2
Click the Link filter icon in the navigation menu.
Step 3
In the Link Filter window, select the MPLS-TE and P2MP MPLS-TE check boxes.
Step 4
Click OK. The map refreshes and displays only the MPLS-TE and P2MP MPLS-TE links.
Step 5
Right-click on the link and choose the Properties option.
Step 6
In the Link Properties window, the type of link is displayed in the Link Type field, which can be either MPLS-TE and P2MP MPLS-TE based on the link that you have selected. Additional details about the link such as the MPLS TE tunnel, operational status of the tunnel, TE tunnel type are displayed in the Label Switching section. For more information about the Link Properties window, see Viewing LSPs Configured on an Ethernet Link.
Viewing LSP Endpoint Redundancy Service Properties
If an LSP endpoint in an MPLS-TP tunnel is configured for redundancy service, a redundancy service badge is applied to the secondary (backup) LSP endpoint in the navigation and map panes in the Vision client. Additional redundancy service details are provided in the LSP endpoint properties window and the inventory window for the element on which the MPLS-TP tunnel is configured.
To view LSP endpoint redundancy service properties:
Step 1
To determine if an LSP endpoint on an MPLS-TP tunnel is configured for redundancy service, expand the required MPLS-TP tunnel in the navigation or map pane.
If the LSP endpoint is configured for redundancy service, the redundancy service badge is displayed in the navigation and map panes as shown in Figure 17-9.
Figure 17-9 LSP Endpoint with Redundancy Service Badge
Step 2
To view properties for the LSP endpoint, navigate to and right-click the required endpoint in the map or navigation pane, and choose Properties.
The LSP endpoint properties window is displayed as shown in Figure 17-10.
Figure 17-10 LSP Endpoint Properties Window
Table 17-5 describes the information displayed in the LSP Endpoint Properties window.
Table 17-5 LSP Endpoint Properties Window
|
|
LSP Type |
Indicates whether the LSP is active (Working) or backup (Protected). |
LSP ID |
LSP identifier, derived from both endpoint identifiers and using the format src-node-ID :: src-tunnel-number :: dest-node-ID :: dest-tunnel-number where:
- src-node-ID represents the identifier of the node originating the signal exchange.
- src-tunnel-number represents source tunnel identifier.
- dest-node-ID represents the identifier of the target node.
- dest-tunnel-number represents the destination tunnel identifier.
|
In Label |
Incoming label identifier. |
Out Label |
Outgoing label identifier. |
Bandwidth (kbps) |
Bandwidth specification in Kb/s. |
Out Link ID |
Link identifier assigned to the outgoing interface. |
Out Interface |
Outgoing interface hyperlinked to the relevant entry in physical inventory. |
Role (Oper Status) |
Role of the LSP endpoint (Active or Standby) with the operational status (UP or DOWN) |
Step 3
To view LSP endpoint redundancy status in inventory, double-click the element on which the MPLS-TP tunnel is configured.
Step 4
Choose Logical Inventory > MPLS-TP > MPLS-TP Global > LSP End Points.
Step 5
The LSP End Points tab contains the following information related to LSP redundancy service (see Figure 17-11):
- Whether the LSP endpoint is Working or Protected.
- The LSP endpoint role, either Active or Standby.
- The operational status of the LSP endpoint, either Up or Down.
Figure 17-11 LSP End Points Tab in Logical Inventory
Applying an MPLS-TP Tunnel Overlay
You can select and display an overlay of a specific MPLS-TP tunnel on top of the devices displayed in a map view. The overlay is a snapshot of the network that visualizes the flows between the sites and tunnel peers. When an MPLS-TP tunnel is selected in the map, the following elements are highlighted in the map:
- Elements on which TP endpoints and LSPs are configured.
- Links that carry TP traffic.
All elements and links that are not part of the MPLS-TP tunnel are dimmed.
To apply an MPLS-TP tunnel overlay:
Step 1
In the Vision client, display the network map on which you want to apply an overlay.
Step 2
From the main toolbar, click Choose Overlay Type and choose MPLS-TP tunnel.
The Select MPLS-TP tunnel Overlay dialog box is displayed.
Step 3
Do one of the following:
- Choose a search category, enter a search string, then click Go to narrow the search results to a range of MPLS-TP tunnels or a specific MPLS-TP tunnel. Search categories include:
–
Description
–
Name
–
System Name
The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” the Vision client displays VPNs “net” and “NET” in the names whether net appears at the beginning, middle, or at the end of the name: for example, Ethernet.
- Choose Show All to display all MPLS-TP tunnels.
Step 4
Select the MPLS-TP tunnel overlay you want to apply to the map.
The elements and links used by the selected MPLS-TP tunnel are highlighted in the network map, and the MPLS-TP tunnel name is displayed in the window title bar as shown in Figure 17-12.
Figure 17-12 MPLS-TP Tunnel Overlay
Note
An overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the main toolbar.
Monitoring MPLS Services
The following topics provide details for viewing MPLS services and technologies:
Viewing VPN Properties
To view the properties of a VPN:
Step 1
In the Vision client navigation pane or map view, do either of the following:
- If the VPN icon is of the largest size, click the Properties button.
- Right-click the VPN and choose Properties.
The VPN Properties window displays the following information:
- Name—Name of the VPN.
- ID—Unique identifier assigned to the VPN.
Step 2
Click Close to close the VPN Properties dialog box.
Viewing Site Properties
The Vision client enables you to view site properties, including the interfaces that are configured on the PE device. The displayed properties reflect the configuration that Prime Network automatically discovered for the device.
To view site properties, in the Vision client navigation pane or map view, right-click the required site and choose Properties.
Table 17-8 describes the information that is displayed in the Router IP Interface Properties window:
Table 17-8 Router IP Interface Properties Window for Sites
|
|
Name |
Name of the site, such as FastEthernet4/1.252. |
State |
Interface state, either Up or Down. |
IP Address |
IP address of the interface. |
Mask |
Network mask. |
Interface Description |
Description applied to the interface. |
Associated Entity |
Element and interface associated with the site, hyperlinked to its entry in physical inventory. |
|
Subnet |
IP address and subnet mask. Note If the site is an IPv6 VPN over MPLS with IPv6 addresses provisioned, the IPv6 addresses are displayed. For more information, see Viewing IPv6 Information (6VPE). |
Type |
Address type, such as Primary, Secondary, or IPv6 Unicast. |
Viewing VRF Properties
The Vision client enables you to view VRF properties, including the VRF route distinguisher, import and export route targets, and any provisioned sites and VRF routes.
To view VRF properties, do either of the following in map view:
- Double-click the element configured for VRFs.
- Expand the required VPN and double-click the virtual router.
The VRF properties window is displayed as shown in Figure 17-16.
Figure 17-16 VRF Properties
The VRF Properties window contains the VRF routing table for the device. The table is a collection of routes that are available or reachable to all the destinations or networks in the VRF. The forwarding table also contains MPLS encapsulation information.
Table 17-9 describes the information displayed in the VRF Properties window.
Note
The VRF Properties window only displays properties and attributes that are provisioned in the VRF. You might not see all the fields and tabs described in Table 17-9.
Table 17-9 VRF Properties
|
|
Route Distinguisher |
Route distinguisher configured in the VRF.
|
Name |
VRF name. |
Associate VNI |
The Associated VNI field in the content pane displays the VXLAN ID associated with the VRF. You can click the link to go to the corresponding VNI row in the VNI Details pane. |
Description |
Description of the VRF. |
|
Export Route Targets |
IPv4 export route targets contained by the VRF. |
Import Route Targets |
IPv4 import route targets contained by the VRF. |
Route Maps |
Route maps for the VRF. |
|
Export Route Targets |
IPv6 export route targets contained by the VRF. |
Import Route Targets |
IPv6 import route targets contained by the VRF. |
Route Maps |
Route maps for the VRF. |
|
Destination |
Destination of the specific network. |
Prefix Length |
Length of the network prefix in bits. |
Next Hop |
Next routing hop. |
Outgoing Interface |
Name of the outgoing interface; displayed if the Routing Protocol type is local. |
Type |
Route type: Direct (local), Indirect, or Static. |
Routing Protocol |
Routing protocol used to communicate with the other sites and VRFs: BGP or local. |
BGP Next Hop |
Border Gateway Protocol (BGP) next hop. This is the PE address from which to continue to get to a specific address. This field is empty when the routing entry goes to the CE. |
Bottom In Label |
Innermost label that is expected when MPLS traffic is received. |
Bottom Out Label |
Innermost label sent with MPLS traffic. |
Outer Label |
Outermost or top label in the stack used for MPLS traffic. |
|
Source Address |
The source IP address from where the multicast information is sent. |
Group Address |
The group IP address of the multicast. |
Flags |
The flag information pertaining to the multicast. |
Up Time |
The amount of time the interface has been active. |
Protocol |
The protocol information, which can be 4 or 6. |
|
Name |
Site name. |
IP Address |
IP address of the interface. |
Mask |
Subnet mask. |
State |
State of the subinterface: Up or Down. |
Associated Entity |
Element and interface associated with the site, hyperlinked to its entry in physical inventory. |
Description |
Interface description. |
Input Access List |
Access list applied to the inbound traffic. |
Output Access List |
Access list applied to the outbound traffic. |
Rate Limits |
If a rate limit is configured on an IP interface, the limit is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface, meaning the access list is a rate limit access list. IP interface traffic is measured and includes the average rate, normal burst size, excess burst size, conform action, and exceed action. Note Double-clicking a row displays the properties of the IP interface. When a rate limit is configured on the IP interface, the Rate Limits tab is displayed. For more information about rate limits, see Viewing Rate Limit Information. Note The Input Access, Output Access, and Rate Limits parameters apply only to certain operating systems, such as Cisco IOS. |
IP Sec Map Name |
IP Security (IPsec) map name. |
Site Name |
Name of the business element to which the interface is attached. |
Viewing VRF Multicast Configuration details
To view global multicast configuration details for a VRF:
Step 1
Right-click on the required device and select Inventory.
Step 2
In the Inventory window, choose Logical Inventory > VRFs > vrf (where vrf is the required VRF) > IPV4VRF Multicast Configuration or IPV6VRF Multicast Configuration. The route policies configured on the device are displayed in the content pane.
Table 17-10 describes the information that is displayed in the Router IP Interface Properties window:
Table 17-10 Global Multicast Configuration Details
|
|
VPN ID |
The VPN ID configured for the VRF. |
RoutePolicy |
The name of the multicast route policy. |
BgpAD |
The BgpAd enabled on the device. |
MdtSourceif |
The Multicast Distribution Tree (MDT) source interface. |
MdtPartioned |
The MDT partitioned permission. |
NSF |
The non-stop forwarding (NSF) information configured for the VRF. |
MdtAddress |
The MDT address. |
MdtData |
The MDT data that can be handled. |
Address Family |
The address family, which can be IPV4 or IPV6. |
RP Address |
The rendezvous point (RP) address configured for the VRF. |
Viewing VRF Egress and Ingress Adjacents
The Vision client enables you to view the exporting and importing Neighbours by displaying the VRF egress and ingress adjacents. In addition, you can view the connectivity between the VRFs for the route targets and view their properties. For example, if VRF A retrieved route target import X, you can view all VRFs that export X as a route target whether it is in the same or another VPN.
To display the VRF egress and ingress adjacents, you can use either an element configured for VRFs or a virtual router:
- To use an element configured for VRFs:
a.
Double-click the element configured for VRFs.
b.
In the Inventory window, choose Logical Inventory > VRFs > vrf where vrf is the required VRF.
c.
Right-click the required VRF and choose Show VRF Egress Adjacents or Show VRF Ingress Adjacents.
- To use a virtual router, right-click the required VRF in the navigation pane, and choose Show VRF Egress Adjacents or Show VRF Ingress Adjacents.
Table 17-11 describes the information displayed in the Adjacents window.
Table 17-11 VRF Adjacents Properties Window
|
|
Name |
VRF name. |
Route Distinguisher |
Route distinguisher configured in the VRF. |
VRF V6 Table |
IPv6 route distinguisher if IPv6 is configured. |
Viewing Routing Entities
To view routing entities:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity.
The routing information is displayed as shown in Figure 17-17.
Figure 17-17 Routing Entity Table
Table 17-12 describes the information that is displayed in the Routing Entity table.
Table 17-12 Routing Entity Table
|
|
Name |
Name of the routing entity. |
|
Name |
Site name. |
IP Address |
IP address of the interface. |
Mask |
Network mask. |
State |
State of the subinterface: Up or Down. |
Associated Entity |
Interface associated with the routing entity, hyperlinked to its location in physical inventory. |
Description |
Description of the interface. |
Input Access List |
If an input access list is assigned to an IP interface, the list is shown as an IP interface property, and a hyperlink highlights the related access list in the Access List table. When an access list is assigned to the inbound traffic on an IP interface, the actions assigned to the packet are performed. |
VRRP Group |
If a VRRP group is configured on an IP interface, the information is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface. Note Double-clicking a row displays the properties of the IP interface. When a VRRP group is configured on an IP interface, the VRRP Groups tab is displayed in the IP Interface Properties window. For more information, see Viewing VRRP Information. |
Output Access List |
If an output access list is assigned to an IP interface, the list is shown as an IP interface property, and a hyperlink highlights the related access list in the Access List table. When an access list is assigned to the outbound traffic on an IP interface, the actions assigned to the packet are performed. |
Rate Limits |
If a rate limit is configured on an IP interface, the limit is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface, meaning the access list is a rate limit access list. IP interface traffic is measured and includes the average rate, normal burst size, excess burst size, conform action, and exceed action. Note Double-clicking a row displays the properties of the IP interface. When a rate limit is configured on the IP interface, the Rate Limits tab is displayed. For more information, see Viewing Rate Limit Information. Note The Input Access, Output Access, and Rate Limits parameters apply only to certain operating systems, such as Cisco IOS. |
IP Sec Map Name |
IP Security (IPsec) crypto map name. |
Site Name |
Name of the business element to which the interface is attached. |
IPv4 and IPv6 Routing Table Tabs
|
Destination |
Destination of the specific network. |
Outgoing If Name |
Name of the outgoing interface. |
Type |
Routing type: Direct, Indirect, Static, Other, Invalid, or Unknown. |
Next Hop |
IP address from which to continue to get to a specific address. This field is empty when the routing entry goes to a PE router. |
Prefix Length |
Length of the network prefix in bits. |
Route Protocol Type |
Routing protocol used to communicate with other routers. |
IPv4 and IPv6 Multicast Routing Tabs |
Source Address |
The source IP address from where the multicast information is sent. |
Group Address |
The group IP address of the multicast. |
Flags |
The flag information pertaining to the multicast. |
Up Time |
The amount of time the interface has been active. |
Protocol |
The protocol information, which can be 4 or 6. |
IPv4 and IPv6 BGP Label Routing Table Tabs |
Destination |
Destination of the specific network |
Prefix Length |
Length of the network prefix in bits |
Next Hop |
Next routing hop |
Incoming Label |
Incoming BGP label identifier |
Outgoing Interfaces |
Name of the outgoing interface |
Outgoing label |
Outgoing label for the network. |
Type |
Route type: Direct (local), Indirect, or Static |
Routing Protocol |
Routing protocol used to communicate with the other sites: BGP |
Viewing IPv4 Label in BGP Routes
The labeled BGP IPv4 (RFC 3107) enables BGP to distribute MPLS label along the routes it advertises. The label mapping information for a particular route is added in the same BGP update message that is used to distribute the route itself. The label mapping information is carried as a part of the Network Layer Reachability Information (NLRI) in the multiprotocol extension attributes. Hence, the use of any other label distribution protocol is eliminated.
The outer label again identifies the LSP and the inner label identifies the MPLS service. In this case, the RFC 3107 edge device replaces the outer label with two labels, generating a three-label stack.
In Prime Network, the IPv4 BGP Label Routing table displays incoming and outgoing labels. Path tracer follows a service that relies on RFC 3107 and it reflects the BGP label in the MPLS label stack.
RFC3107 is supported on the following device types: ASR9K, ASR901, ASR903, and ME3600/3800X.
To view the BGP label information:
Step 1
Double-click the required element in the Vision client.
Step 2
Choose Logical Inventory > Routing Entities > Routing Entity.
Step 3
In the IPv4 BGP Label Routing table, view the details of incoming and outgoing labels.
Table 17-13 describes the information in the IPv4 BGP Label Routing Table tab.
Table 17-13 IPv4 BGP Label Routing Table Properties
|
|
Destination |
Destination of the specific network |
Prefix Length |
Length of the network prefix in bits |
Next Hop |
Next routing hop |
Incoming Label |
Incoming BGP label identifier |
Outgoing Interfaces |
Name of the outgoing interface |
Outgoing label |
Outgoing label for the network. |
Type |
Route type: Direct (local), Indirect, or Static |
Routing Protocol |
Routing protocol used to communicate with the other sites: BGP |
Viewing the ARP Table
To view the ARP table:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP.
Table 17-14 describes the information that is displayed in the ARP table.
Table 17-14 ARP Table
|
|
MAC |
Interface MAC address. |
Interface |
Interface name. |
IP Address |
Interface IP address. |
State |
Interface state:
- Dynamic—The entry was learned by the device according to network traffic.
- Static—The entry was learned by a local interface or from a user configuring a static route.
- Other—The entry was learned by another method not explicitly defined.
- Invalid—In SNMP, this type is used to remove an ARP entry from the table.
|
Viewing the NDP Table
Neighbor Discovery Protocol (NDP) is used with IPv6 to discover other nodes, determine the link layer addresses of other nodes, find available routers, and maintain reachability information about the paths to other active Neighbour nodes.
NDP functionality includes:
- Router discovery
- Autoconfiguration of addresses (stateless address autoconfiguration [SLAAC])
- IPv6 address resolution (replaces Address Resolution Protocol [ARP])
- Neighbour reachability (neighbour unreachability detection [NUD])
- Duplicate address detection (DAD)
- Redirection
To view the NDP table:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP Entity.
Step 3
Click the NDP Table tab.
Figure 17-18 shows an example of the NDP Table tab.
Figure 17-18 NDP Table in Logical Inventory
Table 17-15 describes the information displayed for NDP.
Table 17-15 NDP Table
|
|
MAC |
Interface MAC address. |
Interface |
Interface name. |
IP Address |
Interface IPv6 address. |
Type |
Entry type:
- ICMP (Incomplete)—Address resolution is being performed on the entry. A Neighbour solicitation (NS) message has been sent to the solicited-node multicast address of the target, but the corresponding Neighbour advertisement (NA) message has not yet been received.
- REACH (Reachable)—Positive confirmation was received via an NA that the forward path to the Neighbour was functioning properly. While in REACH state, the device takes no special action as packets are sent.
- STALE—Too much time has elapsed since the last positive confirmation was received that the forward path was functioning properly. While in STALE state, the device takes no action until a packet is sent.
- DELAY—Too much time has elapsed since the last positive confirmation was received that the forward path was functioning properly. If no reachability confirmation is received within a specified amount of time, the device sends an NS message and changes the state to PROBE.
- PROBE—A reachability confirmation is actively sought by resending Neighbour solicitation messages until a reachability confirmation is received.
|
Viewing Rate Limit Information
To view rate limit information:
Step 1
Right-click the required element in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity.
Step 3
In the IP Interfaces tab, double-click the required interface to view the IP interface properties. If a rate limit is configured on the IP interface, the Rate Limits tab is displayed.
Note
Rate Limit information applies only to certain operating systems, such as Cisco IOS.
Table 17-16 describes the information that is displayed in the Rate Limits tab of the IP Interface Properties dialog box.
Table 17-16 Rate Limits Information
|
|
Type |
Rate limit direction, either Input or Output. |
Max Burst |
Excess burst size in bytes. |
Normal Burst |
Normal burst size in bytes. |
Bit Per Second |
Average rate in bits per second. |
Conform Action |
Action that can be performed on the packet if it conforms to the specified rate limit (rule), for example, continue, drop, change a bit, or transmit. |
Exceed Action |
Action that can be performed on the packet if it exceeds the specified rate limit (rule), for example, continue, drop, change a bit, or transmit. |
Access List |
Hyperlink that highlights the related access list in the Access List table. |
Viewing VRRP Information
Virtual Router Redundancy Protocol (VRRP) is a non-proprietary redundancy protocol that is designed to increase the availability of the static default gateway servicing hosts on the same subnet. This increased reliability is achieved by advertising a virtual router (a representation of master and backup routers acting as a group) as a default gateway to the hosts instead of one physical router. Two or more physical routers are then configured to stand for the virtual router, with only one doing the actual routing at any given time. If the current physical router that is routing the data on behalf of the virtual router fails, another physical router automatically replaces it. The physical router that forwards data on behalf of the virtual router is called the master router; physical routers standing by to take over for the master router if needed are called backup routers.
To view VRRP information:
Step 1
Double-click the required element in the Vision client.
Step 2
In logical inventory, choose Logical Inventory > Routing Entities > Routing Entity.
Step 3
In the IP Interfaces tab, double-click the required interface to view the IP interface properties. If VRRP is configured on the IP interface, the VRRP Groups tab is displayed.
Figure 17-19 VRRP Properties in IP Interface Properties Window
Table 17-17 describes the information in the VRRP Groups tab.
Table 17-17 VRRP Group Properties
|
|
Group Number |
Number of the VRRP group associated with the interface. |
Priority |
Value that determines the role each VRRP router plays and what happens if the master virtual router fails. Values are 1 through 254, with lower numbers having priority over higher numbers. |
Master IP Address |
IP address of the VRRP group, taken from the physical Ethernet address of the master virtual router. |
Admin State |
Administrative status of the VRRP group: Up or Down. |
Operation State |
State of the VRRP group: Master or Backup. |
Preempt Mode |
Whether or not the router is to take over as the master virtual router for a VRRP group if it has a higher priority than the current master virtual router: Enabled or Disabled. |
Virtual IP Address |
IP address of the virtual router. |
Virtual MAC Address |
MAC address of the virtual router. |
Advertisement Interval |
Amount of time (in seconds) between successive advertisements by the master virtual router. |
Viewing Label Switched Entity Properties
Logical inventory can display any or all of the following tabs for label switched entities, depending on the configuration:
- Label Switching Table—Describes the MPLS label switching entries used for traversing MPLS core networks.
- LDP Neighbours—Details all MPLS interface peers that use the Label Distribution Protocol (LDP). LDP enables Neighbouring provider (P) or PE routers acting as label switch routers (LSRs) in an MPLS-aware network to exchange label prefix binding information, which is required to forwarding traffic. The LSRs discover potential peers in the network with which they can establish LDP sessions in order to negotiate and exchange the labels (addresses) to be used for forwarding packets.
Two LDP peer discovery types are supported:
–
Basic discovery—Used to discover directly connected LDP LSRs. An LSR sends hello messages to the all-routers-on-this-subnet multicast address, on interfaces for which LDP has been configured.
–
Extended discovery—Used between indirectly connected LDP LSRs. An LSR sends targeted hello messages to specific IP addresses. Targeted sessions are configured because the routers are not physically connected, and broadcasting would not reach the peers. The IP addresses of both peers are required for extended discovery.
If two LSRs are connected with two separate interfaces, two LDP discoveries are performed.
- MPLS Interfaces—Contains information on MPLS interfaces and whether traffic engineering tunnels are configured on an interface.
- MPLS Label Range—Identifies whether MPLS uses static or dynamic routing, and the label range.
- Traffic Engineering LSPs—Describes the MPLS traffic engineering Label Switched Paths (LSPs) provisioned on the switch entity. MPLS traffic engineering LSP, an extension to MPLS TE, provides flexibility when configuring LSP attributes for MPLS TE tunnels.
- VRF Table—Describes MPLS paths that terminate locally at a VRF.
To view information for label switched entities:
Step 1
Double-click the required device in the Vision client.
Step 2
In the logical inventory window, choose Logical Inventory > LSEs > Label Switching.
Table 17-18 describes the information that is displayed for label switched entities.
Table 17-18 Label Switching Properties in Logical Inventory
|
|
Local LDP ID |
Local Label Distribution Protocol (LDP) identifier. |
LDP Process State |
State of the LDP process, such as Running, Down, or Unknown. |
|
ID |
Identifier for MPLS interface, as a combination of IP address and interface name. |
Distribution Protocol Type |
Distribution protocol used: Null, LDP, TDP (Tag Distribution Protocol), RSVP, or TDP and LDP. |
MPLS TE Properties |
Whether or not traffic engineering (TE) properties are configured on the interface:
- Checked—MPLS TE properties are configured on the interface.
- Unchecked—MPLS TE properties are not configured on the interface.
|
Discovery Protocols |
Discovery protocols used on the interface. |
|
Incoming Label |
Incoming MPLS label identifier. |
Action |
Type of switching action: Null, Pop, Swap, Aggregate, Untagged, or Act. If an action is defined as Pop, an outgoing label is not required. If an action is defined as Untagged, an outgoing label is not present. |
Outgoing Label |
Outgoing label. |
Out Interface |
Name of the outgoing interface, displayed as a hyperlink to the port subinterface in physical inventory. |
IP Destination |
Destination IP address. |
Destination Mask |
Subnet mask of the destination. |
Next Hop |
IP address of the next hop in the path. The IP address is used for resolving the MAC address of the next MPLS interface that you want to reach. |
|
Incoming Label |
Incoming VRF label identifier. |
Action |
Type of switching action: Null, Pop, Swap, Aggregate, Untagged, or Act. |
VRF |
VRF name, hyperlinked to its location in logical inventory. |
IP Destination |
Destination IP address. |
Destination Mask |
Subnet mask of the destination. |
Next Hop |
IP address of the next hop in the path. The IP address is used for resolving the MAC address of the next MPLS interface that you want to reach. |
Out Interface |
Name of the outgoing interface, displayed as a hyperlink to the port subinterface in physical inventory. |
|
LSP Name |
Label switched path (LSP) name. |
LSP Type |
Segment type: Head, Midpoint, or Tail. |
Source Address |
Source IP address. |
Destination Address |
Destination IP address. |
In Label |
Incoming label, if not a head segment. |
In Interface |
Incoming interface, if not a head segment. |
Out Interface |
Outgoing interface, if not a tail segment. |
Out Label |
Outgoing label, if not a tail segment. |
Average Bandwidth (Kbps) |
Current bandwidth (in Kb/s) used to automatically allocate the tunnel’s bandwidth. |
LSP ID |
LSP identifier. |
Burst (Kbps) |
Tunnel bandwidth burst rate, in Kb/s. |
Peak (Kbps) |
Tunnel bandwidth peak rate, in Kb/s. |
FRR TE Tunnel |
Fast Reroute (FRR) TE tunnel name, hyperlinked to the routing entity in logical inventory. |
FRR TE Tunnel State |
State of the FRR TE tunnel:
- Active—A failure exists in the primary tunnel and the backup is in use.
- Not Configured—The primary tunnel has no designated backup tunnel.
- Ready—The primary tunnel is in working condition.
|
|
MPLS Label Type |
Type of MPLS label: Dynamic or Static. |
Minimum Label Value |
Lowest acceptable MPLS label in the range. |
Maximum Label Value |
Highest acceptable MPLS label in the range. |
|
LDP ID |
Identifier of the LDP peer. |
Transport IP Address |
IP address advertised by the peer in the hello message or the hello source address. |
Session State |
Current state of the session: Transient, Initialized, Open Rec, Open Sent, or Operational. |
Protocol Type |
Protocol used by the peer to establish the session: LDP, TDP, or Unknown. |
Label Distribution Method |
Method of label distribution: Downstream, Downstream On Demand, Downstream Unsolicited, or Unknown. |
Session Keepalive Interval |
Length of time (in milliseconds) between keepalive messages. |
Session Hold Time |
The amount of time (in milliseconds) that an LDP session can be maintained with an LDP peer, without receiving LDP traffic or an LDP keepalive message from the peer. |
Discovery Sources |
Whether the peer has one or more di scovery sources:
- Checked—Has one or more discovery sources.
- Unchecked—Has no discovery sources.
Note To see the discovery sources in the LDP Neighbor Properties window, double-click the row of the peer in the table. |
Step 3
Double-click an entry in any of the tables to view additional properties for that entry.
Table 17-19 Additional Properties Available from Label Switching in Logical Inventory
Double-click an entry in this tab...
|
To display this window...
|
Label Switching Table |
Label Switching Properties |
LDP Neighbors |
LDP Peer Properties |
MPLS Interfaces |
MPLS Link Information - MPLS Properties |
MPLS Label Range |
MPLS Label Range Properties |
Traffic Engineering LSPs |
Tunnel Properties |
VRF Table |
MPLS Aggregate Entry Properties |
Multicast Label Switching (mLADP)
Multicast Label Distribution protocol (mLDP) provides extensions to the Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) Label Switched Paths (LSPs) in MPLS networks. A P2MP LSP allows traffic from a single root (or ingress) node to be delivered to a number of leaf (or egress) nodes.
A MP2MP LSP allows traffic from multiple ingress nodes to be delivered to multiple egress nodes. Only a single copy of the packet will be sent on any link traversed by a multipoint LSP. Container is the holder of MPLS MLDP databases and neighbors instances for Multicast.
Viewing MLDP Database Information
To view the MLDP database information:
Step 1
Double-click the required device in the Vision client.
Step 2
In the logical inventory window, choose Logical Inventory > LSEs > Label Switching > Multicast Label Switching > Databases. The database information is displayed in the MLDP Databases content pane.
Step 3
Select a database from the content pane, right-click and choose the Properties option. The MLDP Database Properties dialog box is displayed. You can click on the tabs to view more details.
Table 17-20 describes the information that is displayed for MLDP Database Properties dialog box.
Table 17-20 MLDP Database Properties Dialog Box
|
|
LSM ID |
The unique ID assigned to a LSP. |
Tunnel Type |
The tunnel type. |
FEC Root |
The root IP address of the MDT. |
Opaque Value |
The stream information that uniquely identifies the tree to the root. To receive label switched multicast packets, the Egress Provider Edge (PE) indicates to the upstream router (the next hop closest to the root) which label it uses for the multicast source by applying the label mapping message. |
Is Root |
Indicates whether Forwarding Equivalence Class (FEC) is the root. |
Downstream Clients Tab |
Egress Interface Name |
The egress interface name. |
Associated Entity |
The entity associated with the LSP. Click this link to view the associated entity details. |
Uptime |
The amount of time from when the interface is active. |
Table ID |
The unique Table ID of the label through which the packet was received. |
Ingress State |
The status of the ingress interface, which can be Enabled or Disabled. |
PPMP State |
The status of the Point-to-Point Multipoint, which can be Enabled or Disabled. |
Local Label |
The label used to identify the label stack of the route within the local VPN network. |
Viewing the MLDP Neighbors Information
To view information of MLDP neighbors:
Step 1
Double-click the required device in the Vision client.
Step 2
In the logical inventory window, choose Logical Inventory > LSEs > Label Switching > Multicast Label Switching > MLDP Neighbors. The MLDP peer information is displayed in the MLDP Peers content pane.
Step 3
Select a peer id from the content pane, right-click and choose the Properties option. The Peer ID Properties dialog box is displayed.
Table 17-21 describes the information that is displayed for Peer ID Properties dialog box.
Table 17-21 Peer ID Properties Dialog Box
|
|
Peer ID |
The IP address of the MLDP peer. |
Capabilities |
The capabilities supported by the LDP LSR. |
MLDP GR |
Indicates whether graceful restart is enabled for the LDP. Note LDP graceful restart provides a control plane mechanism to ensure high availability and allows detection and recovery from failure conditions while preserving Non Stop Forwarding (NSF) services. |
Path Count |
The number of LSP’s configured. |
Uptime |
The amount of time from when the peer id is working. |
Peer Paths tab |
IP Address |
The IP address of the MLDP peer. |
Interface Name |
The interface name. |
Associated Entity |
The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. |
Protocol |
The protocol type used for communication. |
Peer Adjacent List |
IP Address |
The IP address of the MLDP peer. |
Interface Name |
The interface name. |
Associated Entity |
The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node. |
Viewing BGP Neighbor Service Alarm with VRF Name
BGP neighbor loss VRF due to oper and BGP neighbor found service alarms are raised on the BGP links for any mis-configurations that shuts down physical interfaces or any other scenario that might break the BGP neighborship. If a BGP neighbor service alarm is configured with the VRF, the VRF name is displayed as part of the Location links for a BGP neighbor loss VRF due to oper and BGP neighbor found service alarms. For example, Figure 17-20 shows the BGP neighbor service alarms displayed with the VRF Name.
Figure 17-20 Service Alarm with VRF Name
To view the VRF details, click the links available in the Location field. For example, the following figure 17-21, shows a link properties of a BGP Service alarm with VRF Name.
Figure 17-21 Link Properties with VRF Information
Viewing MP-BGP Information
The MP-BGP branch displays information about a router’s BGP neighbors and cross-connect VRFs.
Note
If there are multiple MP-BGP links between two devices, the Vision client displays each link in the content pane map view.
To view MP-BGP information:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP.
Table 17-22 describes the information that is displayed for MP-BGP.
Table 17-22 MP-BGP Information in Logical Inventory
|
|
Local AS |
Identifier of the autonomous system (AS) to which the router belongs. |
BGP Identifier |
BGP identifier, represented as an IP address. |
|
VRF Name |
Name of the VRF. |
Cross VRF Routing Entries |
Group of cross VRFs that share a single destination. |
|
Peer AS |
Identifier of the AS to which the remote peer belongs. |
Peer State |
State of the remote peer: Active, Connect, Established, Open Confirm, Open Sent, or Null. |
Peer Address |
Remote peer IP address. |
AFI |
Address family identifier: IPv4, IPv6, L2VPN, VPNv4, or VPNv6. Address Type identifier: Unicast, Multicast, Labeled-unicast, Vpls, MDT, EVPN. |
AF Peer State |
Address family peer state: Established or Idle. |
Peer Up/Down Since |
Specifies a BGP Peer Up/Down time property. Note Use Poll Now to view the latest value. |
Peer BGP ID |
Identifier of the remote peer, represented as an IP address. |
Local BGP ID |
Local peer IP address. |
VRF Name |
Remote peer VRF name. |
BGP Neighbor Type |
Neighbor type: Null, Client, or Non Client. |
Hold Time (secs) |
Established hold time in seconds. |
Keepalive (secs) |
Established keepalive time in seconds. |
BGP Neighbor Entry |
BGP neighbor IP address. |
Viewing 6rd Tunnel Properties
IPv6 rapid deployment (6rd) is a mechanism that allows stateless tunneling of IPv6 over IPv4. For information on the devices that support 6rd, refer to Cisco Prime Network 5.1 Supported VNEs.
To view 6rd tunnel properties:
Step 1
In the Vision client, double-click the required device.
Step 2
In the Inventory window, choose Logical Inventory > 6rd Tunnels.
The 6rd tunnel properties are displayed as shown in Figure 17-22.
Figure 17-22 6rd Tunnel Properties in Logical Inventory
Table 17-23 describes the information displayed for 6rd tunnels.
Table 17-23 6rd Tunnel Properties in Logical Inventory
|
|
Tunnel Name |
6rd tunnel name. |
IPv6 Prefix |
IPv6 prefix used to translate the IPv4 address to an IPv6 address. |
Source Address |
Tunnel IPv4 source IP address. |
Tunnel SubMode |
Tunnel type:
- 6rd—Static IPv6 interface.
- 6to4—IPv6 address with the prefix embedding the tunnel source IPv4 address.
- Auto-tunnel—IPv4-compatible IPv6 tunnel.
- ISATAP—Overlay tunnel using an Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) address.
|
Prefix Length |
IPv4 prefix length used to derive the delegated IPv6 prefix. |
Suffix Length |
IPv4 suffix length used to derive the delegated IPv6 prefix. |
MTU |
Maximum transmission unit (MTU) configured on the 6rd IPv4 tunnel. |
Viewing BFD Session Properties
Bidirectional Forwarding Detection (BFD) is used to detect communication failures between two elements, or endpoints, that are connected by a link, such as a virtual circuit, tunnel, or LSP. BFD establishes sessions between the two endpoints over the link. If more than one link exists, BFD establishes a session for each link.
Prime Network supports BFD with the following protocols: BGP, IPv4 (static), IPv6 (static), IS-IS, LAG (Ether channel), MPLS TE, MPLS-TP, and OSPF.
To view BFD session properties that are configured on an element:
Step 1
In the Vision client, double-click the required device.
Step 2
In the Inventory window, choose Logical Inventory > Bidirectional Forwarding Detection.
The properties for BFD sessions are displayed as shown in Figure 17-23.
Figure 17-23 BFD Session Properties
Table 17-24 describes the information displayed for BFD sessions.
Table 17-24 BFD Session Properties
|
|
Process |
Process name, such as Bidirectional Forwarding Detection. |
Process State |
Process state, such as Running. |
|
Source IP |
Source IP address of the session. |
Destination IP |
Destination IP address of the session. |
State |
Session state, such as Up or Down. |
Interface |
Interface used for BFD communications, hyperlinked to the routing entity in logical inventory. |
Registered Protocols |
Routing protocol being monitored for communication failures, such as BGP or OSPF. |
For MPLS-TP BFD sessions, the information in Table 17-25 is displayed.
Table 17-25 MPLS-TP BFD Session Properties in Logical Inventory
|
|
Process |
Process name: Bidirectional Forwarding Detection. |
Process State |
Process state, such as Running. |
MPLS-TP BFD Sessions Table
|
Interface |
Interface used for BFD communications, hyperlinked to the routing entity in logical inventory. |
LSP Type |
Type of LSP: Working or Protected. |
State |
Session state: Up or Down. |
Registered Protocols |
Routing protocol being monitored for communication failures: MPLS-TP. |
Step 3
To view additional properties, double-click the required entry in the Sessions table.
Table 17-26 describes the information that is displayed in the Session Properties window.
Table 17-26 Session Properties Window
|
|
Source IP |
Source IP address of the session. |
Destination IP |
Destination IP address of the session. |
State |
Session state: Up or Down. |
Interface |
Hyperlink to the routing entity in logical inventory. |
Registered Protocols |
Routing protocol being monitored for communication failures. |
Offload Host |
BFD offload property: Software (applicable when configuring BFD on BVI interface). Displays BFD session hosted in software. |
|
Protocol |
Protocol used for this session. |
Interval |
Length of time (in milliseconds) to wait between packets that are sent to the neighbor. |
Multiplier |
Number of times a packet is missed before the neighbor is declared down. |
BFD Single-Hop Authentication
The BFD Single-Hop Authentication feature enables authentication for single-hop Bidirectional Forwarding Detection (BFD) sessions between two directly connected devices. This feature supports Message Digest 5 (MD5) and Secure Hash Algorithm 1 (SHA-1) authentication types. The BFD templates can be configured only if the BFD sessions are enabled.
BFD Templates Support
BFD (Bidirectional Forwarding Detection Templates) are the new features added in CPT devices. Prime Network uses the below Telnet or CLI Command to get the BFD templates in existing CPT devices.
Show running-config|section bfd-template
Cerent Trap Support
Cerent traps are alarms supported for CPT devices. There are 170 traps supported.There are various kinds of traps supported which are listed below:
- Communications
- Equipment
- Environmental
- Integrity Violation
- Quality of Service
The alarms can be categorized by their severity such as Critical, Major, Minor, Not Reported and Not Alarmed. Examples of each severity categories are as follows:
- Critical- Equipment failure
- Major- High Voltage, Battery Failure
- Minor- Loss of frame, Loss of signal
- Not Reported- Unqualified PPM Inserted
- Not Alarmed- Transit Node Clock Traceable
Change Settings in Cisco Transport Controller (CTC)
Any configurations settings made in CPT should be done through CTC. To receive traps in a particular server, that server IP needs to be entered in the device through CTC. Most of the traps are on device dependencies.
CMP Tool
The default trap format can be used to send the alarms through CMP tool which can be generated in Prime Network. The default trap format is given as follows:
<key name="trap"><key name=""><entry name="">sendtrap -V2 10.105.39.217 -ccellbus -r162 -o1.3.6.1.2.1.1.3.0 -mt1166470595 -o1.3.6.1.6.3.1.1.4.1.0 -md1.3.6.1.4.1.3607.6.10.30.0.1670 -o1.3.6.1.4.1.3607.6.10.100.10.20 -mo03/Nov/2001 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.80.1.1670 -mi50 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.20.1.1670 -mi50 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.60.1.1670 -mi1 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.30.1.1670 -mi0 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.40.1.1670 -mi1 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.50.1.1670 -mi0 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.100.1.1670 -md1.3.6.1.4.1.3607.6.10.30.0.2110 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.120.1.1670 -mi30 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.130.1.1670 -mi10 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.140.1.1670 -mi10 -o1.3.6.1.6.3.18.1.3.0 -ma10.104.120.46</entry></key></key>
Link and Port Parameters
The link and port parameters are scripts which can be navigated from Device->Port->Interface-> right click Commands->Configuration->Scripts. The link and port parameters are supported for the following auto populated UI attributes:
Ethernet Parameter Configuration
- MTU
- Link State
- Expected Speed
- Expected Duplex
- Operating Flow Control
- Carrier Delays
- Auto Negotiation
Port Parameter Configuration
- Port Name
- Admin State
- AINS Soak
- Reach
- Wavelength
L2 Parameter Configuration
- CDP
- DOTIX
- DTP
- LACP
- PAGP
- VTP
- STP
The following are the configuration scripts supported,
- Add Loopback
- Remove Loopback
- Configure CDP
- Configure Ethernet
- Configure L2 Control Protocol
- Configure Port Parameters
- Show Ethernet Parameters
- Show L2 Control Parameters
- Show Port Parameters
Viewing Configuration Scripts in Prime Network
Add Loopback
To view the Add Loopback script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Add Loopback
Step 4
Select the value Loopback from the Attribute combo box.
Step 5
Click on Execute Now button.
Step 6
Verify if Loopback is successfully added.
Remove Loopback
To view the Remove Loopback script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Remove Loopback
Step 4
Click on Execute Now button.
Step 5
Verify if Loopback is successfully removed.
Configure CDP
To view the Configure CDP script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure CDP
Step 4
Select the value CDP from the Attribute combo box.
Step 5
Click on Execute Now button.
Step 6
Verify if CDP is successfully configured.
Configure Ethernet
To view the Configure Ethernet script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure Ethernet
Step 4
Select the value Admin Status from the Attribute combo box.
Step 5
Click on Execute Now button.
Step 6
Verify if Ethernet is successfully configured.
Configure L2 Control Protocol
To view the Configure L2 Control Protocol script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure L2 Control Protocol
Step 4
Select the value STP from the Attribute combo box.
Step 5
Click on Execute Now button.
Step 6
Verify if L2 Control Protocol is successfully configured.
Configure Port Parameters
To view the Configure Port Parameters script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure Port Parameters
Step 4
Select the value Reach from the Attribute combo box.
Step 5
Click on Execute Now button.
Step 6
Verify if Port Parameters are successfully added.
Show Port Parameters
To view the Show Port Parameters script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show Port Parameters
Step 4
Click on Execute Now button.
Step 5
Verify if all Port Parameters are listed.
Show Ethernet Parameters
To view the Show Ethernet Parameters script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show Ethernet Parameters
Step 4
Click on Execute Now button.
Step 5
Verify if Show Ethernet Parameters are listed.
Show L2 Control Parameters
To view the Show L2 Control Parameters script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show L2 Control Parameters.
Step 4
Click on Execute Now button.
Step 5
Verify if all L2 Control Parameters are listed.
Show Configure Ethernet
To view the Show Configure Ethernet script:
Step 1
Model the device in Cisco Prime Network Administration.
Step 2
Launch the Cisco Prime Network Vision client and choose Inventory
Step 3
In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show Configure Ethernet
Step 4
Click on Execute Now button.
Step 5
Verify if all the configured Ethernets are listed.
Viewing Cross-VRF Routing Entries
Cross-VRF routing entries display routing information learned from the BGP neighbors (BGP knowledge base).
To view properties for cross-VRF routing entries:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP.
Step 3
Click the Cross VRFs tab.
Step 4
Double-click the required entry in the list of cross-VRFs.
The Cross VRF Properties window is displayed, containing the information described in Table 17-27 .
Table 17-27 Cross-VRF Properties Window
|
|
Name |
Cross-VRF name. |
Cross VRF Routing Entries Table
|
Destination |
IP address of the destination network. |
Prefix |
Length of the network prefix in bits. |
Next Hop |
IP address of the next hop in the path. |
Out Going VRF |
Outgoing VRF identifier, hyperlinked to its entry in logical inventory. |
Out Tag |
Outgoing virtual router tag, such as 50 or no tag. |
In Tag |
Incoming virtual router tag, such as 97 or no tag. |
Viewing Pseudowire End-to-End Emulation Tunnels
The Pseudowires branch in logical inventory displays a list of the Layer 2 tunnel edge properties (per edge), including tunnel status and VC labels.
To view pseudowire properties:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > Pseudowires.
The Tunnel Edges table is displayed and contains the information described in Table 17-28 .
Table 17-28 Pseudowires Branch Tunnel Edges Table
|
|
Local Interface |
Name of the subinterface or port. Strings, such as Aggregation Group, EFP, VLAN, and VSI, are included in the interface name, and the entry is hyperlinked to the relevant entry in logical or physical inventory:
- Aggregation groups are linked to Ethernet Link Aggregation in logical inventory.
- ATM interfaces are linked to the port in physical inventory and the ATM interface.
- ATM VCs are linked to the port in physical inventory and the Port IP Properties table.
- CEM groups are linked to the port in physical inventory and the CEM Group table.
- EFPs are linked to the port in physical inventory and the EFPs table.
- IMA groups are linked to IMA Groups in logical inventory.
- Local switching entities are linked to Local Switching Entity in logical inventory.
- VLANs are linked to Bridges in logical inventory.
- VSIs are linked to the VSI entry in logical inventory.
|
VC ID |
Tunnel identifier, hyperlinked to the PTP Layer 2 MPLS Tunnel Properties window. |
SAII |
Specifies the Source Access Individual Identifier (SAII) of the tunnel.
Note The SAII attribute can be configured only if the Pseudowire type is FEC129 TYPE II.
|
TAII |
Specifies the Target Attachment Individual Identifier (TAII) of the tunnel.
Note The TAII can be configured only if the Pseudowire type is FEC129 TYPE II.
|
Pseudowire Type |
Type of pseudowire, such as Ethernet, Ethernet Tagged, CESoPSN Basic, PPP, SAToP or FEC129 TYPE II. |
Peer |
Details of the selected peer, hyperlinked to the peer pseudowire tunnel in logical inventory. |
Status |
Operational state of the tunnel: Up or Down. |
Pseudowire Role |
If the pseudowire is in a redundancy configuration, indicates whether its role is as the primary or secondary pseudowire in the configuration. If the pseudowire is not configured for redundancy, this field is blank. |
Preferred Path Tunnel |
Path to be used for MPLS pseudowire traffic. |
Local Router IP |
IP address of this tunnel edge, which is used as the MPLS router identifier. |
Peer Router IP |
IP address of the peer tunnel edge, which is used as the MPLS router identifier. |
Local MTU |
Size, in bytes, of the MTU on the local interface. |
Remote MTU |
Size, in bytes, of the MTU on the remote interface. |
Local VC Label |
MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the local router. |
Peer VC Label |
MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the peer router. |
Signaling Protocol |
Protocol used by MPLS to build the tunnel, for example, LDP or TDP. |
Peer Status |
Status of the peer link. |
Associated EVC Name |
Specifies the name of the associated Ethernet Virtual Circuits (EVC) |
Viewing MPLS TE Tunnel Information
Prime Network automatically discovers MPLS TE tunnels and enables you to view MPLS TE tunnel information in inventory.
To view MPLS TE tunnel information:
Step 1
Right-click the required device in the Vision client and choose Inventory.
Step 2
In the logical inventory window, choose Logical Inventory > Traffic Engineering Tunnels.
Table 17-29 describes the information that is displayed in the Tunnel Edges table.
Table 17-29 Tunnel Edges Table
|
|
Name |
Name of the TE tunnel; for Cisco devices it is the interface name. |
Tunnel Type |
Whether the tunnel is Point-to-Point or Point-to-Multipoint. |
Tunnel Destination |
IP address of the device in which the tunnel ends. |
Administrative Status |
Administrative state of the tunnel: Up or Down. |
Operational Status |
Operational state of the tunnel: Up or Down. |
Outgoing Label |
TE tunnel’s MPLS label distinguishing the LSP selection in the next device. |
Description |
Description of the tunnel. |
Outgoing Interface |
Interface through which the tunnel exits the device. |
Bandwidth (KBps) |
Bandwidth specification for this tunnel in Kb/s. |
Setup Priority |
Tunnel priority upon path setup. |
Hold Priority |
Tunnel priority after path setup. |
Affinity |
Tunnel preferential bits for specific links. |
Affinity Mask |
Tunnel affinity bits that should be compared to the link attribute bits. |
Auto Route |
Whether or not destinations behind the tunnel are routed through the tunnel: Enabled or disabled. |
Lockdown |
Whether or not the tunnel can be rerouted:
- Enabled—The tunnel cannot be rerouted.
- Disabled—The tunnel can be rerouted.
|
Path Option |
Tunnel path option:
- Dynamic—The tunnel is routed along the ordinary routing decisions after taking into account the tunnel constraints such as attributes, priority, and bandwidth.
- Explicit—The route is explicitly mapped with the included and excluded links.
|
Average Rate (Kbps) |
Average bandwidth for this tunnel (in Kb/s). |
Burst (Kbps) |
Burst flow specification (in Kb/s) for this tunnel. |
Peak Rate (Kbps) |
Peak flow specification (in Kb/s) for this tunnel. |
LSP ID |
LSP identifier. |
Policy Class |
Value of Policy Based Tunnel Selection (PBTS) configured. Values range from 1-7. |
FRR |
TE Fast Reroute (FRR) status: Enabled or Disabled. |
Type |
|
The Traffic Engineering LSPs tab in the LSEs branch in logical inventory displays TE tunnel LSP information.
For details about the information displayed for TE tunnel LSPs, see Traffic Engineering LSPs.
Configuring MPLS-TP
The following MPLS-TP commands are launched by right-clicking the appropriate node and choosing MPLS-TP Global > Commands > Configuration. Your permissions determine whether you can run these commands (see Permissions for Managing MPLS Services). To find out if a device supports these commands, see the Cisco Prime Network 5.1 Supported Cisco VNEs.
Note
To run the Global Configuration, BFD Configuration, and Link Configuration commands on the Cisco Carrier Packet Transport (CPT) System, right-click the device in the Vision client list or map view, and click Logical Inventory > CPT Context Container.
|
|
Tunnel Ping Tunnel Trace LSP Ping LSP Trace LSP Lockout LSP Path Lockout LSP Path No Lockout |
These actions are performed at the command the launch point. LSP Path Lockout can be accessed at both the tunnel level and endpoint level. If you run the command at the tunnel level, you must indicate whether the Lsp is protected or working. |
Add Global Configuration Update Global Configuration Remove Global Configuration |
Configure Global configuration with Router-id, Global-id, Fault OAM refresh timer value, Wait before restoring timer value. The remove operation is performed at the command the launch point. |
BFD Global Configuration |
BFD minimum interval and multiplier. |
Add Link Configuration Remove Link Configuration |
MPLS-TP link number, Next hop router address. Only the link number is require for the remove operation. |
Add BFD Template Configuration Remove BFD Template Configuration |
Template type and name, interval type and value, For compute hold down Check/UnCheck Multiplier, multiplier value. The remove operation requires a template type and name. |
Show BFD Template Show BFD Template at Tunnel |
Show BFD Template requires a template name. The Show BFD Template at Tunnel is performed at the command launch point. |
Add Label Range Configuration Remove Label Range Configuration |
Minimum and maximum values for dynamic and static labels. The remove operation is performed at the command launch point. |
Locking/Unlocking MPLS-TP Tunnels in Bulk
An MPLS-TP network has one or multiple LSPs running between endpoint devices. If you want to shutdown one of the interfaces in the network, the MPLS-TP packet must be diverted through an alternative LSP. This can be achieved by locking the interface. Before attempting to lock or unlock a tunnel, ensure that MPLS-TP tunnels have been configured for the link. Also, ensure that you have the appropriate rights (Configurator and above) to lock or unlock a tunnel.
The MPLS-TP bulk lockout/unlock option in Prime Network allows you to lock or unlock multiple MPLS-TP tunnels on different VNEs at the same time.
Your permissions determine whether you can run these commands (see Permissions for Managing MPLS Services). To find out if a device supports these commands, see the Cisco Prime Network 5.1 Supported Cisco VNEs.
Locking MPLS-TP Tunnels
To lock MPLS-TP tunnels in bulk:
Step 1
In the map view, right-click the required link and choose Properties.
Step 2
In the link properties window, right-click on the required physical link and choose the Show MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed, which lists all the tunnels in the selected link.
Step 3
In the MPLS-TP tunnels’ commands dialog box, choose the tunnels that you want to lock and select the Lock Out option in the Commands field.
Step 4
Click Execute Now. You are prompted to confirm the lockout operation.
Step 5
Click Yes to confirm. A message is displayed confirming that the selected tunnels have been locked. The status of the tunnel is automatically updated as Lockout(UP) after this operation.
Unlocking MPLS-TP Tunnels
To unlock MPLS-TP tunnels in bulk:
Step 1
In the map view, right-click the required link and choose Properties.
Step 2
In the link properties window, right-click on the required physical link and choose the Show MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed, which lists all the tunnels in the selected link.
Step 3
In the MPLS-TP tunnels’ commands dialog box, select the locked tunnels that you want to unlock and select the Unlock option in the Commands field.
Step 4
Click Execute Now. You are prompted to confirm the unlock operation.
Step 5
Click Yes to confirm. A message is displayed confirming that the selected tunnels have been unlocked. The status of the tunnels is automatically updated as Active(UP) after this operation.
Note
If you attempt to unlock a tunnel that is not locked, a message is displayed indicating that there are no valid tunnels to perform the unlock operation.
Linear Protection for MPLS-TP
As explained earlier, MPLS-TP is the transport profile that fulfills the deployment in the network for the MPLS technology. This technology provides fast protection switching for end-to-end segments wherein the protection switching time is generally less than 50 milliseconds.
Protection switching is a mechanism wherein route and resources of a protection path are reserved for a selected working path or set of working paths.
Linear protection provides rapid and simple protection switching because it can operate between any pair of points within the network. For every working Label Switched Paths (LSP) in the network, there is a protected LSP that is not related to any other working entity. When a working LSP fails, the protected LSP is ready to take up transmission of data.
In Prime Network, the following commands are available for linear protection:
- Force Switch (Lockout)—This command is used to switch normal traffic from a working LSP to a protected LSP. This command can only be applied on a working LSP. If Force Switch is enabled, then the Working LSP becomes standby and the Protected LSP becomes active.
- Manual Switch—This command is used to switch normal traffic from a working LSP to a protected LSP. This command can be applied only on a working LSP. If Manual Switch is enabled, then the working LSP becomes standby and the protected LSP becomes active.
Note
The Force Switch and Manual Switch commands are both used to switch traffic from the working LSP to the protected LSP. However, if the Manual Switch command is used, and there is a failure in the protecting LSP, then the working LSP becomes active. In case of the Force Switch command, then the working LSP does not become active if there is a failure in the protecting LSP.+
- Lockout of Protecting (Lockout)—This command is used to switch traffic from the protected LSP to the working LSP. This command can be applied only on a protected LSP. If Lockout of Protecting is enabled, then the working LSP becomes active and the protected LSP becomes standby.
- Clear Force Switch (no Lockout)—This command is used to clear the force switch on a working LSP after which the working LSP becomes active and the protected LSP becomes standby.
- Clear Manual Switch—This command is used to clear the manual switch made on a working LSP, after which the working LSP becomes active and the protected LSP becomes standby.
- Clear Lockout of Protecting (no Lockout)—This command is used to clear the lockout of protecting made on a protected LSP. The working LSP becomes standby and the protected LSP becomes active after this command is executed.
Figure 17-24 depicts the MPLS-TP topology along with the working and protected LSPs:
Figure 17-24 Linear Protection for MPLS-TP
Note
In the above figure, you can find working and protected LSPs between two routers. In case of maintenance or network upgrade, the Force Switch and Manual Switch commands can be used to shut down the working LSP link. Similarly, the Lockout of Protecting command can be used to shut down the protected LSP link.
To switch traffic using the Force Switch or Manual Switch command:
Step 1
In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.
Step 2
Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.
Note
If there are no MPLS-TP tunnels configured for the selected link, then a message indicating the absence of MPLS-TP tunnels is displayed.
Step 3
In the MPLS-TP tunnels’ commands dialog box, select the working LSP tunnel and select Force Switch (Lockout) or Manual Switch in the Commands field.
Step 4
Click Execute Now. You are prompted to confirm the operation.
Step 5
Click Yes to confirm. The status of the working LSP is updated as Standby and the status of the protected LSP is updated as Active after this operation.
To switch traffic using the Lockout of Protecting command:
Step 1
In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.
Step 2
Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.
Step 3
In the MPLS-TP tunnels’ commands dialog box, select the protected LSP tunnel and select Lock of Protecting in the Commands field.
Step 4
Click Execute Now. You are prompted to confirm the operation.
Step 5
Click Yes to confirm. The status of the working LSP is updated as Active and the status of the protected LSP is updated as Standby after this operation.
To clear the Force Switch or Manual switch on a working LSP:
Step 1
In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.
Step 2
Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.
Step 3
In the MPLS-TP tunnels’ commands dialog box, select the working LSP tunnel that has been locked and select Clear Force Switch or Clear Manual Switch in the Commands field.
Step 4
Click Execute Now. You are prompted to confirm the operation.
Step 5
Click Yes to confirm. The status of the working LSP is updated as Active and the status of the protected LSP is updated as Standby after this operation.
To clear the Lockout of Protecting on a protected LSP:
Step 1
In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.
Step 2
Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.
Step 3
In the MPLS-TP tunnels’ commands dialog box, select the protected LSP tunnel that has been locked and select Clear Lockout of Protecting in the Commands field.
Step 4
Click Execute Now. You are prompted to confirm the operation.
Step 5
Click Yes to confirm. The status of the protected LSP is updated as Active and the status of the working LSP is updated as Standby after this operation.
Visualization Status Enhancements- MPLS TP Tunnel
In the MPLS TP Tunnel, the following visualization status enhancements have been carried out:
Non Eligible LSPs
If the tunnel is not configured with protected LSP, i.e., the tunnel is configured with working LSP (Active-UP); the information column displays the value as Protected LSP is not configured. See Figure 17-26.This information is displayed for all non-eligible LSPs which are not eligible for bulk flow operations like FS, LOP, MS, LOCK.
Figure 17-25 Viewing the Working LSPs and Protected LSPs
In the above Figure 17-25, both the status of Working LSP and the Protected LSP are in up state. So, the Information field is blank.
Lockout State
In the Lockout State, information value has been changed. If the Working LSP is down, it displays Working LSP is Locked Out. If the Protected LSP is down, it displays that the Protected LSP is Locked Out
Figure 17-26 Viewing the Lockout States of LSP
Figure 17-27 Viewing the Commands for Eligible LSPs
In the above Figure 17-27 the commands that are executed on LSPs on the link are displayed.
It will be enabled only when an eligible LSP is working/protected on the link.
Other Descriptions displayed in the Information Column are :
- If only the Working LSP is configured, you will not be allowed to Lock the Working LSP since, there is no Protected member to carry the traffic; the information column displays the value as Protected LSP is not configured.
- If both the “Working LSP EndPoints” and “Protected LSP EndPoints” are configured in the same physical link, which informs that this tunnel will not be allowed for performing the Lockout operations; the information column displays the value as Both LSPs are configured on the same physical link.
- If the device's Software Version in which the “Manual Switch” feature is disabled; the information column displays the value as Manual switch is disabled.
- If both the Working (Active) and Protected LSPs are in Down state; the information column displays the value as Working and protected LSPs are down.
- If the tunnel is not eligible for any Linear Protection operations as it is disabled, the information column displays the value as Linear Protection is disabled.
FEC 129-based Pseudowire Service Discovery
The Cisco Prime Network delivers FEC 129-based discovery for various support services such as bridge domains, pseudowires, Virtual Connections, and VPLS.
The Cisco Prime Network release supports the following service discoveries:
- Bridge Domain Discovery—Discovers bridges domains such as I-Bridges, B-Bridges, and regular bridges that are not associated to VFIs or pseudowires. For more information, refer to Working with PBB-VPLS.
- Pseudowire Discovery—Discovers pseudowires in any one of the following ways:
–
Pseudowires that are associated to I-Bridges and B-Bridges in addition to regular bridges.
Note
As specified in the Bridge Domain discovery, the regular bridges associated to pseudowires, cannot be discovered from the Bridge Domain services.
–
All the pseudowires that are associated to Ethernet such as FEC 128, FEC 129 Type II, which in turn has an EFP configured. This service discovers the end-to-end pseudowire peers (FEC 128 or FEC 129 Type II) along with the Ethernet attachments.
Note
The FEC 129 Type II end-to-end tunnels are identified from the Pseudowire service using the SAII and TAII values.
- VPLS Discovery—Discovers VPLS in any one of the following ways:
–
VFIs associated to I-Bridges, B-Bridges, and regular bridges.
Note
As specified in the Bridge Domain discovery, the regular bridges associated to VFIs, cannot be discovered from the Bridge Domain services.
–
VFIs associated to pseudowires such as FEC 128, FEC 129 Type I pseudowires (pseudowires which are attached to VFIs which in turn attached to bridges (B-Bridges)) are discovered. This service discovers the end-to-end VFIs, which on expanding from the VPLS map view, displays the end-to-end pseudowire peers (FEC 128 or FEC 129 type I pseudowires).
Note
The FEC 129 Type I end-to-end tunnels are identified from the VPLS service using the Attachment Group Identifier (AGI) value along with SAII and TAII values.
Note
In order to view the B-bridges attached to the VFIs, the bridges must be selected from the Bridge Domain service.
- Virtual Connection or EVC Discovery—Creates an end-to-end complex circuit representing the network associations in the core network of all the above discovered elements. Using the Virtual Connection map view, the complete topology of the pseudowire is displayed instead of selecting each plugin separately from the VPLS or pseudowire map view.
–
FEC 129 Type I—Instead of selecting FEC 129 Type I pseudowires and their associated VFIs (from the VPLS service) and the associated B-bridges (from the bridge domain service), the FEC-129 type 1 end-to-end tunnels can be viewed as a single instance from the Virtual Connection service.
The FEC 129 Type I end-to-end tunnels are identified using the AGI value along with SAII and TAII values.
–
FEC 129 Type II—The FEC 129 Type II end-to-end tunnels and the Ethernet attachments can be viewed as a single instance from the Virtual Connections service.
The FEC 129 Type II end-to-end tunnels are identified using the SAII and TAII values.
The following topics explain how to view the FEC 129-based pseudowire from service discovery:
Viewing FEC 129 Type II-based Pseudowire Tunnel from Pseudowire Map View
To discover the links between the FEC Type II pseudowires:
Step 1
Choose Add to Map > Pseudowire to open the Add Pseudowire to Specific plugins dialog box.
Step 2
In the Add Pseudowire to Specific plugins dialog box, select Show All to display the list of pseudowires.
Step 3
To view a specific FEC Type II pseudowire, filter using the pseudowire ID (SAII or TAII) to identify the FEC Type II pseudowire.
Step 4
Click OK to add the selected FEC 129 type II pseudowire to the map.
Step 5
The selected pseudowire component in the map displays the following links. Click the expand (+) icon to view the links:
- Association between the EFP of one router (for example, router 1) to the FEC 129 type II pseudowire.
- Link between the two associated FEC 129 type II pseudowires that are peers.
- Association between the FEC 129 type II pseudowire of the other router (for example, router 2) to the EFP.
Viewing FEC 129 Type II-based Pseudowire Tunnels from Virtual Connection Map View
The Virtual Connection view displays the logical association between the FEC 129 type II pseudowires in a single view.
To view the end-to-end connection between the FEC 129 type II pseudowire peers:
Step 1
Open the Add Virtual Connection to Specific plugin dialog box in either of the following ways:
- In the toolbar, choose Add to Map > Virtual Connection.
- In the menu bar, choose File > Add to Map > Virtual Connection.
Step 2
In the Add Virtual Connection to Specific plugins dialog box, select the virtual connection that you want to view.
Step 3
To view a specific FEC type II pseudowire, filter using the pseudowire ID (SAII or TAII) to identify the FEC Type II pseudowire.
Step 4
Click OK to add the selected virtual connection component to the map.
Step 5
For the selected virtual connection component in the map, you can view the following FEC 129 Type II pseudowire information:
Viewing FEC 129 Type II Pseudowire Links from Virtual Connection View
To view the end-to-end connection between the FEC 129 type II pseudowire peers:
Step 1
Click the expand (+) icon to view the links:
- Association between the EFP of one router (for example, router 1) to the FEC 129 type II pseudowire.
- Link between the two associated FEC 129 type II pseudowires that are peers.
- Association between the FEC 129 type II pseudowire of the other router (for example, router 2) to the EFP.
Viewing FEC 129 Type II Pseudowire Properties from Virtual Connection View
To view the FEC 129 type II pseudowire properties:
Step 1
Right-click the selected virtual connection component in the map.
Step 2
Click the Properties tab to display the EVC hyperlink.
Step 3
Click the EVC hyperlink to view the EVC terminating points.
Viewing FEC 129 Type I-based Pseudowire Tunnel from VPLS Map view
The FEC 129 Type I pseudowires are associated to VFIs, which in turn are associated to PBB bridges (that is VFIs are attached to B-bridges, and B-bridges are attached to I-bridges on both the FEC 129 Type I pseudowire peers).
The following services help in viewing the components involved in forming the FEC 129 Type I-based pseudowire topology:
- VPLS view—You can view the FEC 129 Type I pseudowires that are attached to the VFIs from the VPLS view. These VFIs are in turn attached to the PBB bridges. To view the VFIs, refer Viewing VPLS.
- Bridge Domain view—From the bridge domains service, you can view the PBB bridges (I-bridges linked to the B-bridges). To view the bridge domains, refer Viewing Bridge domains.
Note
In addition to PBB bridges, regular bridges, with no associations to pseudowires or VFIs, can also be discovered in the Bridge Domain service.
Viewing VPLS
To view the VFIs:
Step 1
Choose Add to Map > VPLS to open the Add VPLS Instance to map dialog box.
Step 2
In the Add VPLS Instance to map dialog box, select Show All to display the list of VPLS instances.
Step 3
Add the required VPLS instance from the VPLS list. It can be filtered either using the VPN-id or the names of the associated VFIs.
Step 4
Once the VPLS instance is added to the map, it displays the link between the two associated VFIs. On further expanding these VFI components, you can view the associated FEC 129 Type 1 pseudowire peers, linked to these VFIs on either ends.
Step 5
Click the link between the two associated FEC 129 Type 1 pseudowire peers to display the topology link properties window. This link is specific to these FEC 129 Type 1 pseudowire peers.
Unlike the Map view, topology properties which display all the topology links between the two VNEs are added to the map. Refer Viewing FEC 129 links from Topology View.
Viewing Bridge domains
To view the bridge domains associated to the VFIs, follow the steps provided below:
Step 1
Open the Add Bridge Domain dialog box in one of the following ways:
- Choose File Add to Map > Bridge Domain.
- In the toolbar, click Add to Map and choose Bridge Domain.
Note
The Bridge Domains must be added to the map containing the VPLS instances to view the associations between them.
Step 2
In the Add Bridge Domain dialog box, select Show All to display the list of bridge domains.
Step 3
For both the peers, select the PBB bridges associated to the VFIs. The bridges can be filtered using the name of the bridges.
Note
I-SID can also be used for filtering I-bridges.
Step 4
On adding the PBB-bridges to the map:
- A link is formed between the associated VPLS plugin and the B-bridges for both the peers.
- A link is formed between the I-bridges and the B-bridges for both the peers.
Viewing FEC 129 Type I-based Pseudowire Tunnels from Virtual Connection Map View
The Virtual Connection view displays the logical association between the FEC 129 type I pseudowire peers in a single view.
To view the end-to-end connection between the FEC 129 type I pseudowire peers:
Step 1
Open the Add Virtual Connection to Specific plugin dialog box in either of the following ways:
- In the toolbar, choose Add to Map > Virtual Connection.
- In the menu bar, choose File > Add to Map > Virtual Connection.
Step 2
In the Add Virtual Connection to Specific plugins dialog box, select the FEC 129 type I-based pseudowire virtual connection that you want to view.
Step 3
To view a specific FEC type I pseudowire, filter using the I-SID, VPN-id, or the names of the associated VFIs to identify the FEC Type I pseudowire.
Step 4
Click OK to add the selected virtual connection component to the map.
Step 5
You can view the following FEC 129 Type I pseudowire information for the selected virtual connection component added to the map:
Viewing FEC 129 Type I Pseudowire Links from Virtual Connection View
To view the end-to-end connection between the FEC 129 Type I-based pseudowire peers:
Step 1
Click the Expand (+) icon to view the associated components and the links:
- Association between the VPLS instances. Click the Expand (+) icon on the VPLS instances.
- Association between the VFIs, which on further expansion, displays the corresponding components.
- Association between the FEC-129 Type I-based pseudowire peers. To view the topology Link Properties window, click the link between the two associated FEC 129 Type I-based pseudowire peers.
If the above topology has PBB bridges configured on either ends, then the following are displayed in addition to the above components and links:
- Association between the I-bridges and the B- bridges (of both the FEC 129 Type I pseudowire peers).
- Association between the B-bridges and the VPLS instances. For further viewing the components attached to the VPLS instances, navigate to Step 1.
Viewing FEC 129 Type I Pseudowire Properties from Virtual Connection View
To view the virtual connection properties of FEC 129 type I pseudowire peers:
Step 1
Right-click the selected virtual connection component in the map.
Step 2
Click the Properties tab to display the EVC hyperlink.
Step 3
Click the EVC hyperlink to view the EVC terminating points.